text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Study of oyster shell as a potential substrate for constructed wetlands. We tested the suitability of oyster shell (OS) as a substrate for phosphorus removal in constructed wetlands (CWs) treating swine wastewater. OS is proven to have a significant phosphorus adsorption capacity; significant phosphorus removal was achieved in vertical subsurface flow constructed wetlands (VSSFs) that were filled with OS and used to treat swine wastewater. In the VSSF system, OS adsorption and precipitation played the greatest role in phosphorus removal, and the phosphorus distribution in the substrate layers was attributed to the vertical flow state of wastewater in the system. Ca-P was the predominant form of phosphorus in the system. Overall, the study results showed that OS could be used for phosphorus removal in CWs. OS also allowed for reuse of a waste substance, making the overall system more environmentally friendly. | High | [
0.660377358490566,
30.625,
15.75
] |
//-----------------------------------------------------------------------
// <copyright file="Path.cs">(c) http://www.codeplex.com/MSBuildExtensionPack. This source is subject to the Microsoft Permissive License. See http://www.microsoft.com/resources/sharedsource/licensingbasics/sharedsourcelicenses.mspx. All other rights reserved.</copyright>
//-----------------------------------------------------------------------
namespace MSBuild.ExtensionPack.Framework
{
using System.Globalization;
using Microsoft.Build.Framework;
/// <summary>
/// <b>Valid TaskActions are:</b>
/// <para><i>ChangeExtension</i> (<b>Required: </b> Filepath, Extension <b>Output: </b>Value)</para>
/// <para><i>Combine</i> (<b>Required: </b> Filepath, Filepath2 <b>Output: </b>Value)</para>
/// <para><i>GetDirectoryName</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetExtension</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetFileName</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetFileNameWithoutExtension</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetFullPath</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetPathRoot</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>GetRandomFileName</i> (<b>Output: </b>Value)</para>
/// <para><i>GetTempPath</i> (<b>Output: </b>Value)</para>
/// <para><i>HasExtension</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><i>IsPathRooted</i> (<b>Required: </b> Filepath <b>Output: </b>Value)</para>
/// <para><b>Remote Execution Support:</b> NA</para>
/// </summary>
/// <example>
/// <code lang="xml"><![CDATA[
/// <Project ToolsVersion="4.0" DefaultTargets="Default" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
/// <PropertyGroup>
/// <TPath>$(MSBuildProjectDirectory)\..\MSBuild.ExtensionPack.tasks</TPath>
/// <TPath Condition="Exists('$(MSBuildProjectDirectory)\..\..\Common\MSBuild.ExtensionPack.tasks')">$(MSBuildProjectDirectory)\..\..\Common\MSBuild.ExtensionPack.tasks</TPath>
/// </PropertyGroup>
/// <Import Project="$(TPath)"/>
/// <Target Name="Default">
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="ChangeExtension" Filepath="c:\temp\filename.txt" Extension="log">
/// <Output TaskParameter="Value" PropertyName="NewFilename" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="NewFilename = $(NewFilename)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="Combine" Filepath="c:\temp" Filepath2="filename.txt">
/// <Output TaskParameter="Value" PropertyName="CombinedFilename" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="CombinedFilename = $(CombinedFilename)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetDirectoryName" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="JustTheDirectory" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="JustTheDirectory = $(JustTheDirectory)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetExtension" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="JustTheExtension" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="JustTheExtension = $(JustTheExtension)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetFileName" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="JustTheFilename" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="JustTheFilename = $(JustTheFilename)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetFileNameWithoutExtension" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="JustTheFilename" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="JustTheFilename = $(JustTheFilename)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetFullPath" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="FullPath" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="FullPath = $(FullPath)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetPathRoot" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="PathRoot" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="PathRoot = $(PathRoot)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetRandomFileName">
/// <Output TaskParameter="Value" PropertyName="RandomFilename" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="RandomFilename = $(RandomFilename)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="GetTempPath">
/// <Output TaskParameter="Value" PropertyName="TempPath" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="TempPath = $(TempPath)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="HasExtension" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="FileHasAnExtension" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="FileHasAnExtension = $(FileHasAnExtension)"/>
/// <MSBuild.ExtensionPack.Framework.Path TaskAction="IsPathRooted" Filepath="c:\temp\filename.txt">
/// <Output TaskParameter="Value" PropertyName="FileIsRooted" />
/// </MSBuild.ExtensionPack.Framework.Path>
/// <Message Text="FileIsRooted = $(FileIsRooted)"/>
/// </Target>
/// </Project>
/// ]]></code>
/// </example>
public class Path : BaseTask
{
public const string ChangeExtensionTaskAction = "ChangeExtension";
public const string CombineTaskAction = "Combine";
public const string GetDirectoryNameTaskAction = "GetDirectoryName";
public const string GetExtensionTaskAction = "GetExtension";
public const string GetFileNameTaskAction = "GetFileName";
public const string GetFileNameWithoutExtensionTaskAction = "GetFileNameWithoutExtension";
public const string GetFullPathTaskAction = "GetFullPath";
public const string GetPathRootTaskAction = "GetPathRoot";
public const string GetRandomFileNameTaskAction = "GetRandomFileName";
public const string GetTempPathTaskAction = "GetTempPath";
public const string HasExtensionTaskAction = "HasExtension";
public const string IsPathRootedTaskAction = "IsPathRooted";
/// <summary>
/// The file path to use
/// </summary>
public string Filepath { get; set; }
/// <summary>
/// The file path to use for the second filepath parameter for the Combine task
/// </summary>
public string Filepath2 { get; set; }
/// <summary>
/// The file extension to use for the ChangeExtension task
/// </summary>
public string Extension { get; set; }
/// <summary>
/// Gets value returned from the invoked Path method
/// </summary>
[Output]
public string Value { get; set; }
protected override void InternalExecute()
{
if (!this.TargetingLocalMachine())
{
return;
}
if (!string.IsNullOrEmpty(this.Filepath))
{
this.LogTaskMessage(string.Format(CultureInfo.CurrentCulture, "Invoking: {0} on: {1}", this.TaskAction, this.Filepath));
}
switch (this.TaskAction)
{
case ChangeExtensionTaskAction:
this.Value = System.IO.Path.ChangeExtension(this.Filepath, this.Extension);
break;
case CombineTaskAction:
this.Value = System.IO.Path.Combine(this.Filepath, this.Filepath2);
break;
case GetDirectoryNameTaskAction:
this.Value = System.IO.Path.GetDirectoryName(this.Filepath);
break;
case GetExtensionTaskAction:
this.Value = System.IO.Path.GetExtension(this.Filepath);
break;
case GetFileNameTaskAction:
this.Value = System.IO.Path.GetFileName(this.Filepath);
break;
case GetFileNameWithoutExtensionTaskAction:
this.Value = System.IO.Path.GetFileNameWithoutExtension(this.Filepath);
break;
case GetFullPathTaskAction:
this.Value = System.IO.Path.GetFullPath(this.Filepath);
break;
case GetPathRootTaskAction:
this.Value = System.IO.Path.GetPathRoot(this.Filepath);
break;
case GetRandomFileNameTaskAction:
this.LogTaskMessage("Getting Random File Name");
this.Value = System.IO.Path.GetRandomFileName();
break;
case GetTempPathTaskAction:
this.LogTaskMessage("Getting Temp Path");
this.Value = System.IO.Path.GetTempPath();
break;
case HasExtensionTaskAction:
this.Value = System.IO.Path.HasExtension(this.Filepath).ToString(CultureInfo.InvariantCulture);
break;
case IsPathRootedTaskAction:
this.Value = System.IO.Path.IsPathRooted(this.Filepath).ToString(CultureInfo.InvariantCulture);
break;
default:
this.LogError("Invalid TaskAction passed: {0}", this.TaskAction);
return;
}
}
protected virtual void LogError(string format, params object[] args)
{
Log.LogError(string.Format(CultureInfo.CurrentCulture, format, args));
}
}
} | Mid | [
0.556390977443609,
37,
29.5
] |
Vault.com for jobs, careers, top employers and education programs, job search advice, salary info, job listings, employee message boards and surveys. Click on the icon and create an account using your Davidson email address to view guides on the following career field areas: Biotech Energy Industry Top Energy, Oil and Gas Employers Top Pharmaceutical and Biotech Employers Technology Electrical Engineering Prepare for Jobs, Internships or Graduate School Davidson Coursework and Experiences The Center for Interdisciplinary StudiesOffers students the opportunity to create a major around a topic, issue, scientific problem, region, historical era or genre. Relevant majors created in the past include Neuroscience and Genomics. Biotech and Pharmaceutical BioBiotechnology Industry Organization is a professional association design to provide information and support for those in the biotechnology field. Their website provides excellent information on specific fields, current research and career opportunities.BioSpaceNews and job opportunities for those interested in the biotech and pharmaceutical fields.PhRMAPhRMA's mission is to conduct effective advocacy for public policies that encourage discovery of important new medicines for patients by biopharmaceutical research companies. This website provides a variety of resources on the field. Math American Academy of ActuariesThe American Academy of Actuaries serves the public on behalf of the U.S. actuarial profession. Uniting actuaries from all practice areas, the Academy is the voice of the profession on public policy and professionalism issues. The website contains excellent information on the actuarial exam process and listings of internships and job opportunities.Mathematical Association of AmericaThe MAA provides mathematicians with the best expository articles, engaging problems, and articles devoted to teaching collegiate mathematics. The MAA also provides research funding opportunities.The Society for Industrial and Applied MathematicsInternational community of over 13,000 individual members. Almost 500 academic, manufacturing, research and development, service and consulting organizations, government, and military organizations worldwide are institutional members. The website has an excellent career-related section that lists internships and jobs within the field and provides career information and advice. Medical Science Physics CompadreResources on scholarships for students interested in physics and astronomy.Energy.gov Find information on internship and fellowship opportunities with the U.S. Department of Energy.NASA Pathways Program NASA Pathways Programs provide opportunities for students and recent graduates to be considered for federal employment through the Internship Employment Program (IEP), Recent Graduates Program (RGP) and Presidential Management Fellows (PMF) Program.National Science FoundationList of physics REU sites, both theoretical and experimental. | High | [
0.693935119887165,
30.75,
13.5625
] |
Q: Defining equilibrium points of a 2D system with a variable as an equilibrium Given the nonlinear system, $$ x' = xy = f(x,y)$$ $$ y' = x(1-x) = g(x,y) $$ The two points where $f=g=0$ are $(0,y)$ and $(1,0)$. I am confused about the theory on how one would continue the stability analysis with the 'point' $(0,y)$ even though it's not really a point. By looking at the phase portrait, the flow tends away from $y$ axes, indicating that it's possibly unstable? I've tried to look for material on this but I'm not entirely sure how to phrase what I'm searching for properly. Thanks! A: $E=\{(0,y),\; y\in \mathbb R\}$ is a set of equilibrium points. The fact that there are infinitely many equilibrium points and they are not isolated does not prevent us from applying known stability theory results to them. For example, one can apply the Chetaev instability theorem to prove the instability of equilibrium points from the subset $E_+=\{(0,y),\; y>0\}$. Consider the function $$ V(x,y)=x. $$ For any point $(0,y_0)$ from $E_+$ it satisfies the conditions of the theorem, thus, the equilibrium points from $E_+$ are unstable. For the system under consideration, however, this is not required, since it admits the first integral $(x-1)^2+y^2$. If we take into account that the direction of movement along the circles i.e. along the level lines $(x-1)^2+y^2=C$ is clockwise in the right half-plane and counterclockwise in the left half-plane, then the behavior of the system becomes clear: | High | [
0.6922126081582199,
35,
15.5625
] |
Apollo We learn in grade school that the Moon, our nearest neighbor in space, causes tides on the Earth’s oceans. It does so through its gravitational attraction to the Earth. But the gravitation interplay between Earth and Moon has other, subtler effects as well. | High | [
0.671428571428571,
35.25,
17.25
] |
Nikolay Gritsenko Nikolay Nikolayevich Gritsenko (Russian:Николай Николаевич Гриценко; 8 May 1856, Novokuznetsk - 8 December 1900, Menton, France) was a Russian painter who specialized in maritime art and seascapes. Biography His father was a physician and his mother was a midwife. When he was nineteen, he enrolled at the , from which he graduated and was assigned to several vessels, including the cruiser, Vladimir Monomakh. At that time, he was already trying his hand at painting watercolors. His talent was noted by his superiors and, in 1885, he became a "guest-student" (auditor) at the Imperial Academy of Fine Arts, where he came under the guidance of the maritime artist, Lev Lagorio. In 1887, he was sent to Paris, at government expense, to study with Professor Alexey Bogolyubov. While there, he also attended workshops by Fernand Cormon. He would return to France throughout his career. Although he never had a showing at the Salon, in 1896, he had one at the galleries of Paul Durand-Ruel. In 1890, he took part in the Eastern journey of Nicholas II, joining his retinue in Trieste.. He resigned from the service in 1894, and was appointed an official artist for the . He exhibited at the Imperial Academy and with the Peredvizhniki. He died of tuberculosis while in Menton, France, and is buried in the Russian cemetery there. In 1902, a major exhibition of his paintings was held in St. Petersburg. His wife, Lyubov Pavlovna Tretyakova (1870-1928), was the daughter of the philanthropist and art collector, Pavel Tretyakov. After his death, she married the artist Léon Bakst. References Further reading Biographical notes from the Brockhaus and Efron Encyclopedic Dictionary @ WikiSource Biography @ the Russian Art Gallery External links More works by Gritsenko @ ArtNet Biographical notes and works @ Воскресный день Category:1856 births Category:1900 deaths Category:Russian painters Category:Maritime paintings Category:Imperial Academy of Arts alumni Category:Russian sailors Category:20th-century deaths from tuberculosis | High | [
0.6962750716332371,
30.375,
13.25
] |
Q: Prove subspace with orthogonal I really have no idea how to go about this proof. Any help is greatly appreciated. Let $W$ be a subspace of an inner product space $V$. Show that $W^\bot = \{ v ∈ V | \langle v , w \rangle = 0, \ \forall w \in W \}$ is a subspace of $V$. A: This is a pretty straightforward exercise, so if you have problems with that you should reread the definitions of scalarproduct and subspaces. The proof of your statement only requires the basic definitions of these two things. For the following I will suppose that $V$ is a vectorspace over $\mathbb{C}$. 1) $W^{\perp}$ is not empty since clearly $\langle 0 \,, w \rangle = 0 $ for all $w \in W$ and therefore holds $0 \in W^{\perp}$. (Check the definition of inner product.) 2) If $x \in W^{\perp}$ then it also holds $\lambda * x \in W^{\perp}$ for all $\lambda \in \mathbb{C}$, since by the assumption that $x \in W^{\perp}$ it holds for all $w \in W$ that $\langle x \,, w \rangle = 0$ and by the defintions of the inner product we see that $\langle \lambda*x \,, w \rangle = \overline{\lambda} * \langle v \,, w \rangle = \overline{\lambda} * 0 = 0$ 3) If $x \in W^{\perp}$ and $y \in W^{\perp}$ then also $x+y \in W^{\perp}$, since for all $w \in W$ it holds (again by the definition of the inner product): $\langle x+y \,, w \rangle = \langle x \,, w \rangle + \langle y \,, w \rangle = 0 + 0 = 0$ The 3 steps above proof your claim, I hope I could help. | Mid | [
0.648648648648648,
39,
21.125
] |
Get EVIL on your phone CATCH UP ON THE EVIL INC STORYLINES EASILY! eCOMICS, STARTING AT 99¢ Best and Worst of the Week in Comics: Sept. 17, 2009 The world of comics seems to be obsessed with seconds lately. The second-to-last Wednesday Comics is on stands as we speak, the Bat-family is awash with former second bananas (Tim Drake, Damian Wayne and Dick Garyson), and Scott Summers and Emma Frost find themselves calling an island “home” for the second time. So let’s take a few seconds and survey a few highlights and lowlights. Click on the thumbnails for a larger view. Getting to Second Secret Six #13 The best comeback of the week, by far, is scored to the Secret Six’s Deadshot. With a defeated Wonder Woman, lying prostate at their feet, our anti-heroes are pressed by their benefactor into the next phase of their mission. Meanwhile, Ragdoll scrutinizes the boots on the princess of power: Hmm…Do you think these things would fit me? As the conversation later turns to him, he has donned both the boots and the tiara. Ragdoll:What? wait. Sorry. Wasn’t listening. What are we discussing again?…Hey… I wonder, could I get into that bustier? Deadshot: Dunno. Lotsa people tried. Second in Command Green Lantern Corps #40 With the Guardians of the Universe missing in action, the Clarissi assumes leadership of the Green Lantern Corps — and that’s Salaak. It’s not unusual for a newly appointed leader to borrow the inspirational words of another great leader to rally his troops. In a way, it’s like channeling the essence of the leadership into the new one — until experience earns him the trust he needs and he doesn’t need to borrow it any longer. But Salaak’s choice is a little strange, considering his past. Just listen as Clarissi explains it all: Salaak:I’m not usually fond of quoting him, but as Lantern [Guy] Gardner would say in his own inimitable way: Get your red-and-blue metal asses out of here and defend Oa and the Corps against those vile abominations before there is nothing left! Second Act Dark Avengers / Uncanny X-Men: Exodus Danielle Moonstar, having made a deal with Asgardian death-godess Hela in a very sexy scene, has once again regained her Valkyrie powers. How cool was it, by the way, that Hela hangs out in Vegas? And she uses these powers with extreme prejudice to level the god of war, Ares, himself. It looks as if she has been reunited with her winged steed, Brightwind, as well, which connotes a tremendous new era for Moonstar. Until it’s time to offer recompense for this gift. And then, there’s gonna be Hela to pay. Until then, enjoy her choice in words as she faces off against the Dark Avenger. Moonstar:I borrowed power from Mistress Hela herself to make sure you stay the hell down. (Emphasis mine.) Second Feature Doom Patrol #2 OK. I know I had this book on last week’s Five to Pull. I made a mistake. I couldn’t make it through this book for the life of me. And I really tried. I was relieved to have a Metal Men second feature, but that was a disappointment, too. This is doubly daunting because, as I said, the MM feature was done by one of my all-time favorite teams in comics. But it felt as if their hearts just weren’t in this one. And when I got to the panel to the right, I began to wonder if they kinda felt that way, too. Second Chance Dark Reign: The List / Avengers #1 Meanwhile, in a safehouse in Brooklyn, the underground Avengers struggle with how to deal with the uberthreat that Norman Osborn has become. The first ten pages in this book are some of the finest reading I remember in a long time. Clint “Hawleye” Barton argues furiously that there’s only one option — to kill Osborn (“like Spidey should have done in High School”). His fellow heroes disagree. Clint fumes that Luke Cage’s wife, Jessica, should have a vote. “Because she’d side with me,” he reasons. Sounds like a good reason to me. Then he moves into that old question of scruples that has been handed down from generation to generation: “If you could go back in time and kill Hitler, wouldn’t you?” And here’s where we really see how difficult an adjustment this new Marvel Universe is for Captain America, who sits, quietly, hands folded, near a desk lamp. Cap.: I did. Miss Marvel: You did what?Cap.: I, uh, killed Hitler. pause Cap.:Um, what were you saying? Barton proceeds to storm Avengers Tower alone and manages to soundly thrash a fair number of Dark Avengers — including throwing Mac “Venom” Gargan out a window by his ear — before being subdued and imprisoned. No Second Shot Thunderbolts #135 This issue of T’bolts was among the very best in a series with a lot to love. An awful lot of plot comes to a head in this one (sorry, Nick), including the realization of a prediction that Yours Truly made about Ghost: Just don’t think that we’ve completely forgotten about Ghost, though, Diggle. It’s been about two or three issues since his character was sniffing a little too close to a few of Osborn’s secrets, so it’s just… about… now that he should be popping out of nowhere with the results of his ill-gotten gains. OK, so I was close. Ghost pops out of the woods to assist Natasha “Black Widow” Romanov (who had been spying on Norman Osborn as Black Widow II) and Songbird. Of course, it’s a double-cross, and he allows them to lead him and his co-horts straight to Nick Fury’s safehouse (below the new Yankees Stadium). At this point, Natasha finds out that her undercover mission was orchestrated by none other than Norman Osborn himself. Osborn: All he [Nick Fury] ever was to you was a grainy hologram on a secure channel. Just make him sound like every word’s being growled through gritted teeth, and the rest is easy.Natasha: It was you the whole time.Osborn: Of course. I was the one who assigned you to impersonate Yelena Belova [Black Widow II] and “infiltrate” the Thunderbolts. And all the while, you were pressure testing the loyalty of my team… You were unwittingly reporting your findings back to me. Once the T’bolt boys give Fury a good-old-fashioned Film Noir working over, Osborn aims a handgun at Nick’s bruised and battered skull. Nick Fury responds with a single sentence — one we can only imagine as being delivered through gritted teeth: You better not miss. Fear not, true believers. In the ensuing kill shot, Fury is flung backwards by three point-blank shots to the forehead, and we can see no blood nor visible gore. It’s gotta be one of Fury’s many robotic doubles. Still, that ‘bot had balls. Wait Just a Second New Avengers #56 And as we wind to a close, let’s leave on a note that holds incredible promise for the Marvel Universe. It’s a direction that I desperately want to see this story go towards. It’s the retreat of the Dark Avengers and the defeat of Norman Osborn at the hands of… | Low | [
0.482758620689655,
28,
30
] |
Asphalt shingles is one of the most widely used roofing covers because they are relatively inexpensive and fairly easy installation. Asphalt shingles will also last a rather long time - on average 30 year, which depends on factors like geographic location, roof underlayment, roof slop, etc. As a professional manufacturer in China, Hongyuan is the foremost enterprise to bring in and pass the double certification system: ISO9001:2008 and ISO14001:2004. 2. Raw Materials Advantages: 1) Basalt colored sand: Through the vitrified and colored technology under 800ºC high temperature, guaranteeing bright color and not to fade, with excellent UV-resistance and anti-aging properties keep a long service life of entire tile. 2) Oxidized Liquid Asphalt: purchased from CNPC, ensuring the good adaptability to the high and low temperature.3) Fiberglass: 90g/m2 horizontal and vertical reinforced fiberglass felt, imported from Johns Manville Company (the largest manufacturer of glass fiber in the world).4) Full Adhesive Layer: Mosaic and Gothic type, enhancing the wind resistance function. 3. Product Features:1) Various appearance and colors for your choice.2) Unrestricted climate, wide application.3) Good colorant package, never fade.4) Light and environmental roof system.5) Correctly installing, no repair.6) Wide scope of application. Asphalt shingle made from glass felt is one kind of flexible tile and free-cutting and bases roof, also can be applied for cone, round, camber and other complex sloping roofs.7) New architectural style.8) No special accessory, save cost.9) Self-cleaning dust.10) High temperature (135ºC) resistance and heat insulation, reduce noise.11) Durable and low service rate.12) Harmonious aesthetic style.13) Fire resistance and wind resistance. 2) 3-Tab Asphalt Shingles:3-Tab asphalt shingles have very good resistance and adaptability. Because of high quality, durable feature and rich colors, there surely will be one color for your choice. 3) Goethe Asphalt Shingles:Irregular and interlaced appearance, makes the roof colorful and infinitely dynamic. And utterly self-adhesive enhances the service life and the wind resistance of the product. | High | [
0.684729064039408,
34.75,
16
] |
EU leaders will discuss a nerve agent attack on a Russian ex-spy in Britain at a Brussels summit next week, with president Donald Tusk saying the bloc would send a “clear message”. AFP file photo BRUSSELS: EU leaders will discuss a nerve agent attack on a Russian ex-spy in Britain at a Brussels summit next week, with president Donald Tusk saying... “It is a blatant violation of international obligations, international law, and violation of our citizens’ rights,” Maya Grishina said. Earlier in the day, Ukraine’s Interior Minister Arsen Avakov said that Kiev would not allow Russian citizens to visit Russian diplomatic missions on the territory of Ukraine to vote in the Sunday... WASHINGTON — With the nomination and likely confirmation of Mike Pompeo as secretary of state, President Trump will soon have a trusted adviser who can prepare him for his upcoming summit with North Korean dictator Kim Jong Un. Pompeo’s first job is to make sure Trump understands one thing going into those talks: North Korea has no plans to... By Barry WoodPutin rules like a Czar, deeply conservative, fearful of unrest, placing stability above all else. In August 1991, reporter David Remnick stood in the crowd outside the Russian parliament when Boris Yeltsin mounted a tank to denounce an attempted coup that would have brought back communism. On that day, as Remnick writes in his 1994... Juventus were given a chance to avenge last year’s Champions League final defeat by Real Madrid when the two sides were drawn together for the quarter-finals of this year’s competition yesterday. The last eight also produced an all English pairing as Premier League leaders Manchester City were drawn against Liverpool, the only team to... Russians living in Ukraine will be unable to vote in Russia’s presidential election because access to Moscow’s diplomatic missions will be blocked, Kyiv said March 16. …read more Source: Radio Free Europe / Radio... Napoli skipper Marek Hamsik insists his side are still in the Serie A title race as they battle to avoid falling seven points behind Juventus before the international break. “Napoli aren’t giving up anything,” said Hamsik, after six-time defending champions Juventus pulled four points clear in midweek. “Anything can definitely happen. The... Ukraine’s decision to prohibit Russian citizens from voting in the Russian embassy and Consulate General in Ukraine on March 18 contradicts international human rights norms and does not fit in the definition of a civilized state, the Russian Foreign Ministry said in a statement on Friday. “The decision of the Ukrainian authorities released... The US accused Russia on Thursday of orchestrating cyberattacks against American energy facilities. The US accused Russia on Thursday of orchestrating cyberattacks against American energy facilities. The hackers have been targeting US interests since at least 2015. Reports indicate the hackers could have shut down nuclear power plants, water, and... | Low | [
0.536885245901639,
32.75,
28.25
] |
Q: SelectChannelConnector alternative class in Jetty 9 and above What is the alternative class of SelectChannelConnector for jetty 9 and above version? Also what is the use of SelectChannelConnector class? And also what is the use of connector classes in jetty/servlet architechture? Can we use ServerConnector or NetworkTrafficSelectChannelConnector (deprecated in jetty 9.x) class instead of SelectChannelConnector? A: A Connector in jetty terms is the component that binds to a port, accepts incoming connections, negotiates the protocols (in case of SSL/TLS/ALPN and things like HTTP/2), and hands off the raw endpoint to the appropriate jetty internal component to process the request. Gone are the days of listening on port 8080 and answering only in HTTP/1.x Now you can listen on port 8080, and the incoming connection negotiates SSL > TLS > > ALPN > HTTP/2 (native) > HTTP/1.1 > HTTP/2 (h2c upgrate) etc. Essentially picking the appropriate connection setup based on what both the client and the server can handle. There is only ServerConnector left, and it has many configuration options to tell it what you want it to support. See the embedded examples or the documentation to understand how to configure it. | High | [
0.6615384615384611,
32.25,
16.5
] |
Wouldn't it be great if, when landing a robotic mission on another planet, the lander or rover could just scoop a sample, drop it into a chemical analyzer and get a "positive" or "negative" result for extraterrestrial life? Well, this chemistry test isn't so far fetched and scientists at NASA's Jet Propulsion Laboratory in Pasadena, Calif., are working on a method that is 10,000 times more sensitive than any other method currently employed by spacecraft. Focused on the detection of specific types of amino acid tied to life, the researchers propose mixing a liquid sample collected from the surface of an alien world with a chemical known as a liquid reagent. Then, by shining a laser across the mixture, the molecules it contains can be observed moving at different speeds when exposed to an electric field. From this, the different molecules can be identified and the whole thing can be done autonomously, no humans required. The method known as "capillary electrophoresis" can be used to detect many different types of amino acids simultaneously. "Our method improves on previous attempts by increasing the number of amino acids that can be detected in a single run," said researcher Jessica Creamer in a statement. "Additionally, it allows us to detect these amino acids at very low concentrations, even in highly salty samples, with a very simple 'mix and analyze' process." RELATED: Stormy Alien Atmospheres May Spark Seeds of Life The team has already tested the method on water taken from Mono Lake in California - a mass of salty water with an extreme alkalinity - and simultaneously analyzed 17 different amino acids. "Using our method, we are able to tell the difference between amino acids that come from non-living sources like meteorites versus amino acids that come from living organisms," said Peter Willis, the project's principal investigator also at JPL. Molecules like amino acids come in two different "chiralties" that are mirror images of one another. Non-organic sources contain roughly equal "left-" and "right-handed" chirality amino acids, whereas amino acids from living organisms are predominantly left-handed - for life on Earth in any case. This differentiation can be detected by capillary electrophoresis. This method is exceedingly powerful for several reasons. Currently, NASA is putting great efforts into looking for habitable environments on Mars. We know that the Red Planet used to be a very wet place and there's evidence that suggests very briny sources of liquid water exists to this day. If life has ever taken hold on Mars, and if a future mission can directly sample this salty, toxic water, it's sensitive chemical analyses such as this that will likely track it down. Also, in the future, it is hoped that a mission may be sent to Jupiter's moon Europa, which is known to possess an extensive subsurface ocean. Many components for life as we know it exists on Europa, so if a robotic mission can be sent to the moon's ice-encrusted surface, or even dropped into the ocean itself, finding out whether there's life elsewhere in the solar system could be one simple chemistry test away. WATCH VIDEO: Could Life On Earth Have Come From A Comet? | High | [
0.67381974248927,
39.25,
19
] |
INTRODUCTION ============ *Helicobacter pylori*, a Gram-negative human pathogen, colonizes the stomach and is associated with several gastrointestinal disorders including peptic ulcers and gastric cancers ([@B1]). Over half of the world\'s population is estimated to harbor *H. pylori*, but only 15--20% of those infected develop severe disease. *Helicobacter pylori* is known for its remarkably high level of genetic diversity. A comparison of the fully sequenced genomes of three clinical isolates revealed substantial differences in chromosomal structure and a large number of genes that are variably present or absent among strains (up to 25% of the total coding regions) ([@B2],[@B3]). These observations have raised many questions, including how genetic diversity is generated in *H. pylori* and how variable genes contribute to disease outcome. One class of highly variable genes are restriction--modification (R--M) systems ([@B2]), which are typically composed of both a restriction endonuclease (REase) and a cognate DNA methyltransferase (MTase). Generally, the REase cleaves a specific DNA sequence unless it is methylated by the cognate MTase. R--M systems have been divided in type I, II or III, according to their cofactor requirement, molecular structure, mode of action and structure of the recognition sequence site ([@B4]). Typical type II R--M systems consist of two independent enzymes that act on the same sequence, usually a 4- to 8-bp palindrome. The recent sequencing of more than 400 bacterial and archaeal genomes has revealed that ∼90% of the genomes contain at least one R--M system and over 80% contain multiple R--M systems ([@B5]), but only a small fraction have been comprehensively studied. The *H. pylori* chromosome encodes a large number of active and inactive R--M systems. Analysis of the sequenced genomes of *H. pylori* strain 26695 and J99 predicted 26 putative R--M systems including 14 and 16 type II R--M systems, respectively. Comparative genomics of these systems suggests they have a high degree of sequence heterogeneity and that only a small fraction retained full activity ([@B6],[@B7]). Interestingly, for some R--M systems, MTase activity may be preserved despite inactivation of the respective REase. Although still under debate, R--M systems may carry out several biological roles. They have traditionally been implicated in bacterial defense from bacteriophage infection, which have in turn evolved a variety of anti-restriction defense mechanisms ([@B8]). R--M systems also regulate genetic exchange among bacteria, particularly relevant for bacteria like *H. pylori* that are naturally competent for DNA uptake ([@B9]). By constituting an effective barrier against DNA transformation in a bacterial population, R--M systems may provide the genetic isolation required for adaptation of the organisms to a special ecological niche ([@B10]). Paradoxically, R--M systems were also suggested to promote homologous recombination from the small DNA fragments produced by the incomplete digestion of incoming DNA by REases ([@B11]). Kobayashi and colleagues have suggested that R--M systems have attributes of selfish genes, and may act as invasive elements independent of any selective advantage to their host ([@B12],[@B13]). This hypothesis emerged from the findings that several R--M systems are horizontally transferred and that a fully active type II R--M system cannot easily be lost from its host because of postsegregational killing. Finally, DNA methylation may have important biological properties independent of the endonuclease function by regulating the interactions between proteins and DNA, in a similar manner to the stand-alone DNA methyltransferase Dam in both α- and γ-Proteobacteria ([@B14],[@B15]). In *H. pylori*, R--M systems may carry out other biological roles. Several R--M systems have been classified as 'chronic atrophic gastritis (ChAG) associated genes' by comparing the genome content of eight ChAG strains to a *H. pylori* 'pangenome' defined previously ([@B3],[@B16]). Other R--M genes were acid-regulated ([@B3]), undergo phase variation ([@B17],[@B18]) and several R--M systems were identified as candidate colonization factors using a mouse model of infection ([@B19]). Expression of the REase encoded by gene *iceA1* was upregulated upon contact with gastric epithelial cells and its presence was associated with peptidic ulcer disease ([@B20]). A mutant in the endonuclease R.HpyC1I, isolated from *H. pylori* clinical isolate NTUH-C1, exhibited cell elongation and decreased adherence to a gastric cell line ([@B21]). In another report, DNA methylation by M.HpyAIV was shown to alter transcription of a selected number of genes including catalase (*katA*) ([@B22]). Here, we annotate a previously uncharacterized *H. pylori* R--M system M.HpyAXII/R.HpyAXII encoded by the locus HP0502/0503/0504/0505. We present biochemical and genetic analyses of this R--M system. We additionally explored its conservation among clinical isolates and its role during establishment of infection to query alternative biological functions of M.HpyAXII/R.HpyAXII. MATERIALS AND METHODS ===================== Bacterial strains and growth conditions --------------------------------------- *Helicobacter pylori* strains ([Supplementary Table S1](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)) were grown on solid horse blood agar (HB) plates containing 4% Columbia agar base (Oxoid, Hampshire, UK), 5% defibrinated horse blood (HemoStat Labs, Dixon, CA), 0.2% β-cyclodextrin (Sigma, St Louis, MO), 10 µg/ml vancomycin (Sigma), 5 µg/ml cefsulodin (Sigma), 2.5 U/ml polymyxin B (Sigma), 5 µg/ml trimethoprim (Sigma) and 8 µg/ml amphotericin B (Sigma) at 37°C either under a microaerobic atmosphere generated using a CampyGen sachet (Oxoid) in a gas pack jar or in an incubator equilibrated with 14% CO~2~ and 86% air. For liquid culture, *H. pylori* was grown in Brucella broth (Difco, Franklin Lakes, NJ) containing 10% fetal bovine serum (BB10; Invitrogen, Carlsbad, CA) with shaking in a gas pack jar containing a CampyGen sachet. For resistance marker selections, bacterial media were additionally supplemented with 15 µg/ml chloramphenicol (Cm, Sigma), 25 µg/ml kanamycin (Kan, Fisher Scientific, Pittsburgh, PA) or 60 mg/ml sucrose (Fisher Scientific). When culturing bacteria from mouse stomachs, 200 μg/ml bacitracin (Sigma) was added to eliminate normal mouse microbiota contamination. DNA manipulations ----------------- DNA manipulations, such as restriction digestion, PCR and agarose gel electrophoresis, were performed according to standard procedures ([@B23]). *Helicobacter pylori* genomic DNA was prepared by Wizard genomic DNA preparation kits (Promega, Madison, WI). Primers used for PCR and sequencing are in [Supplementary Table S2](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1). Plasmid DNA ([Supplementary Table S3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)) was isolated and prepared from *Escherichia coli* or *H. pylori* using Qiagen Midiprep kit (Qiagen, Valencia, CA). Sequencing of plasmid DNA and PCR products was performed by the FHCRC Genomics Shared Resource and the resulting sequences analyzed using Sequencher (Gene Codes Corporation, Ann Harbor, MI). Generation of *H. pylori* knockout isogenic mutants --------------------------------------------------- Knockout alleles were constructed using a vector-free allelic replacement strategy to generate alleles in which a chloramphenicol acetyl transferase (*cat*) resistance cassette ([@B24]), a nonpolar kanamycin resistance (*aphA3*) cassette ([@B25]), or a *cat* cassette fused to a sucrose sensitivity marker (*sacB*) ([@B26]) replaced 80--90% of the coding sequence of the gene while preserving the start and stop codons. The primers used for this procedure are designated as 1 through 4 and are given in [Supplementary Table S2](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1). The *catsacB* cassette was generated by fusing *cat* to *sacB* with elimination of the terminator sequence using PCR (primers C2SA4 and SB1). After natural transformation ([@B27]) with the appropriate PCR product and selection on Cm- or Kan- containing media, four clones were evaluated by PCR to confirm replacement of the wild-type allele with the null allele. Urease activity and flagella-based motility were also confirmed for all the clones generated. Single clones were used for infection experiments and phenotypic characterization. Generation of *H. pylori* knockin isogenic mutants -------------------------------------------------- Null alleles generated by replacement with the *catsacB* cassette were subsequently replaced with alternate alleles by sucrose counter-selection. *H. pylori* strain NSH57 Δ*hpyAXIIM/R::catsacB* was naturally transformed with the appropriate plasmid or genomic DNA, and recombinants were selected on sucrose-containing HB plates, screened on Cm-containing media, and evaluated by PCR to confirm they lost the *catsacB* cassette. Site-directed mutagenesis ------------------------- To generate a catalytically inactive DNA MTase in *H. pylori* strain NSH57, an asparagine in conserved motif IV was replaced by alanine (N87A). A DNA fragment including *hpyAXIIM/R* was amplified from NSH57 by PCR and cloned into TA vector pCR-TOPO (TOPO cloning, Invitrogen). pCR-TOPO/*hpyAXII* was digested with EcoRI (NEB, Ipswich, MA) and subcloned into plasmid Bluescript SK+ (Stratagene, La Jolla, CA). Site-directed mutagenesis was performed on *hpyAXIIM* using the QuikChange kit (Stratagene) following the manufacturer instructions and confirmed by sequencing. Natural transformation ---------------------- *H. pylori* bacteria were freshly grown for 24--32 h on HB plates, transferred as patches onto fresh plates and grown for an additional 6--8 h. Donor DNA (plasmid, genomic or PCR product) was diluted as appropriate in distilled water and 10 μl was added to each patch and incubated overnight. The transformation mixture was harvested from the plate surface and resuspended in 350 μl phosphate buffer saline (PBS). Serial 10-fold dilutions were inoculated onto selective or nonselective HB plates. Transformation frequency was calculated as the number of Kan or Cm resistant colonies per recipient cell per nanogram of donor DNA. Expression of M.HpyAXII and R.HpyAXII proteins ---------------------------------------------- *hpyAXIIM* was amplified from DNA of wild-type NSH57 and NSH79 *H. pylori* by PCR and cloned into a pET-15b vector (Novagen, Gibbstown, NJ) in frame with the N-terminal His-Tag sequence using NdeI and XhoI (New England Biolabs). The resulting pET15b/*hpyAXIIM* plasmids were transformed into *E. coli* strain ER2925(DE3), derived from strain ER2925 \[NEB and ([@B28])\] and engineered to become a λDE3 lysogen using a lysogenization kit (Novagen). Plasmid pET15b/*hpyAXIIR* was transformed into *E. coli* strain BL21CodonPlus(DE3)-RIL. Protein expression was induced using 1 mM isopropyl-1-thio-β-[d]{.smallcaps}-galactopyranoside (IPTG) induction for 3 h at 37°C for M.HpyAXII and overnight at 16°C for R.HpyAXII to minimize endonuclease activity. Bacterial pellets were resuspended in lysis buffer (50 mM Tris pH 7.9, 100 mM NaCl, 1 mM DTT, 2% glycerol), incubated with 1 mg/ml lysozyme (Sigma) for 30 min on ice, and sonicated. For R.HpyAXII, soluble and insoluble fractions were separated by centrifugation at 18 000 r.p.m. for 20 min at 4°C. Antibody-based M.HpyAXII methylation activity assays ---------------------------------------------------- M. HpyAXII DNA MTase activity was assessed in a dot-blot assay using a rabbit primary antibody raised against DNA with N6-methyladenine (m6A) ([@B29]). *Escherichia coli* ER2925(DE3) transformed with pET15b and pET15b/*hpyAXIIM* was grown to log phase and induced with 1 mM IPTG for 3 h at 37°C. Genomic DNA of the cultures was isolated and 3 μl cross-linked to a nylon membrane (Hybond-XL, Amersham Biosciences, Piscataway, NJ) by UV (1.2 mJ/cm^2^ for 30 s). The membrane was blocked in a 3% nonfat dry milk solution and incubated with the m6A polyclonal rabbit antibody (1:10 000 dilution) overnight at 4°C. After a series of washes in PBST (PBS and 0.1% Tween-20), anti-rabbit IgG antibody conjugated to horseradish peroxidase (1:1000 dilution) was added to the membrane and detected using ECL Western Blotting reagent (Amersham Biosciences). Biochemical R.HpyAXII endonuclease activity assay ------------------------------------------------- One microliter of freshly prepared soluble fraction obtained from *E. coli* BL21(DE3) expressing R.HpyAXII was incubated for 3 h at 37°C with 500 ng *E. coli* ER2925 genomic DNA or pET15b plasmid DNA isolated from *E. coli* DH10B in presence of NEB buffer 1 (New England Biolabs). The product DNA was separated on a 0.8% agarose gel. Genetic R.HpyAXII endonuclease activity assay --------------------------------------------- To assess R.HpyAXII activity in a large number of *H. pylori* strains, we replaced the null allele in *H. pylori* strain NSH57Δ*hpyAXIIM/R::catsacB* with that from other strains as described above (Generation of *H. pylori* knockin isogenic mutants section**)**. R.HpyAXII activity was determined by transforming these *H. pylori* clones with PCR constructs Δ*hpyXIIM::cat* and ΔHP0368::*cat* and enumerating recombinants recovered on Cm- containing HB plates. Mouse infections ---------------- Female C57BL/6 mice 24- to 28-days old were obtained from Charles River Laboratories and certified free of endogenous *Helicobacter* infection by the vendor. The mice were housed in sterilized microisolator cages with irradiated PMI 5053 rodent chow, autoclaved corn cob bedding, and acidified, reverse-osmosis purified water provided ad libitum. All studies were done under practices and procedures of Animal Biosafety Level 2. The facility is fully accredited by the Association for Assessment and Accreditation of Laboratory Animal Care, International, and all activities were approved by the FHCRC Institutional Animal Care and Use Committee. Competition experiments were performed as described previously ([@B24]) with 5.0 × 10^8^ bacteria of each strain in the inocula. *In silico* genomic analysis ---------------------------- *Helicobacter pylori* sequences were retrieved from the Comprehensive Microbial Resource (CMR) ([@B30]). Homologs of M. and R.HpyAXII and were sought using REBASE Blast, a tool of REBASE ([@B5]). Protein structure prediction analysis for M.HpyAXII and R.HpyAXII was carried out using the Protein Homology/Analogy Recognition Engine PHYRE ([@B31]). Sequence alignments were carried out with CLUSTALW2 ([@B32]) and 3D molecular structures were visualized and modified using PyMOL ([@B33]). The genome-wide distribution and frequency of GTAC sites was determined using genome-scale DNA pattern in Regulatory Sequence Analysis (RSA) Tools (<http://rsat.ulb.ac.be/rsat/>). For *H. pylori* strain NSH57, the sequence of the derivative strain G27 was used (D.A. Baltrus, M.R. Amieva, A. Covacci, D.S. Merrell, K. M. Ottemann, M. Stein, N.R. Salama, K. Guillemin, personal communication) and genomic GTAC sites were analyzed with the genome tools/restriction digest option of the CMR website. Sequences are available from the GenBank/EMBL/DDBJ databases with accession numbers FJ233107 to FJ233133. RESULTS ======= Structure-based prediction uncovers the existence of a novel *H. pylori* R--M system ------------------------------------------------------------------------------------ We set out to further characterize the HP0502/0503/0504/0505 locus that we previously identified in our genome-wide screen for candidate colonization factors ([@B19]). BLAST search of DNA sequences of these genes from *H. pylori* strain 26695 failed to identify any homologs. However, several lines of evidence suggested that HP0502/0503 encodes a DNA MTase and that it is organized in an R--M system along with the downstream gene, HP0504/0505. Nobusato *et al.* ([@B7]) previously predicted that this locus encodes a R--M system based on sequence analysis. In agreement with this finding, we used structure prediction algorithms of the program PHYRE ([@B31]) and found that the N-terminal domain of the HP0502/0503 polypeptides could be threaded onto a tertiary structure of the M.TaqI DNA MTase, crystallized from *Thermus aquaticus* ([Supplementary Figure S1](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1), *E*-value 6.1 × 10^−15^). Despite weak protein sequence homology, several amino acid motifs were shared between HP0502/0503 and M.TaqI ([Figure 1](#F1){ref-type="fig"}A) and mapped to the catalytic domain of M.TaqI ([Supplementary Figure S1](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)), further supporting the function of HP0502/0503 as an adenine MTase ([@B34]). More recently, the REase R.PabI from *Pyrococcus abyssi* was characterized and HP0504/0505 was identified as a homolog (28% protein sequence identity) and suggested to recognize the same target sequence, 5′-GTAC-3′ ([@B35]). Based on the proposed nomenclature for R--M systems ([@B4]), we have named this novel *H. pylori* R--M system M.HpyAXII/R.HpyAXII, encoded by genes *hpyAXIIM* and *hpyAXIIR*, respectively. Since R--M systems are highly polymorphic among *H. pylori* strains ([@B6]), we evaluated the genomic organization of M.HpyAXII/R.HpyAXII in several isolates. As illustrated in [Figure 1](#F1){ref-type="fig"}B, gene *hpyAXIIM* encodes a polypeptide of 331 amino acids and is predicted to be active in strains J99, HPAG1 and NSH57 but is likely inactive in 26695 and NSH79 where the expected protein products are truncated and fused with R.HpyAXII, respectively. Gene *hpyAXIIR* encodes a protein of 252 amino acids and is only expected to be functional in strains J99 and HPAG1 based on DNA sequences. Figure 1.Genomic organization of the HpyAXII R--M system. (**A**) Amino acid sequence alignment of 26695 HP0502/0503, NSH57 M.HpyAXII and M.TaqI from *Thermus aquaticus* reveals conserved motifs (highlighted in gray) in the N-terminal portion of the protein. (\*) - identical residues, (:) conserved substitution, (.) semi-conserved substitution. (**B**) Genomic organization of genes *hpyAXIIM* and *hpyAXIIR* in *H. pylori* strains 26695, J99, HPAG1 and two mouse adapted strains NSH57 and NSH79. The expected phenotype for this R-M system in each strain is given based on DNA sequences. M, DNA MTase; R, REase; +, active; --, inactive. M.HpyAXII is truncated in 26695 and fused to R.HpyAXII in NSH79. R.HpyAXII is truncated in 26695, partially deleted in NSH57 (dashed lines), and fused to M.HpyAXII in NSH79 (in-frame deletion represented with dashed lines). M.HpyAXII functions as a γ-adenine MTase ---------------------------------------- To validate the function of M.HpyAXII as a DNA MTase, we inducibly expressed Histidine-tagged M.HpyAXII from *H. pylori* strain NSH57 and Histidine-tagged M.HpyAXII fused to R.HpyAXII from strain NSH79 in *E. coli* ([Figure 2](#F2){ref-type="fig"}A). M.HpyAXII activity was studied using *E. coli* strain ER2925(DE3) ([Supplementary Table S1](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)), defective for all known R--M systems, and presumably harboring chromosomal DNA devoid of adenine or cytosine methylation (Materials and methods section). Genomic DNA from the *E. coli* cultures expressing M.HpyAXII was isolated and adenine methylation assessed using antibodies against N6-methyladenine. Adenine MTase activity could be detected when M.HpyAXII from NSH57 but not NSH79 was expressed in *E. coli* ([Figure 2](#F2){ref-type="fig"}B). The lack of MTase activity by NSH79 M.HpyAXII probably reflects the genetic rearrangements observed at the NSH79 locus ([Figure 1](#F1){ref-type="fig"}B). To further confirm that M.HpyAXII acts as an adenine MTase, we used site-directed mutagenesis on the predicted catalytic site of this enzyme. We identified conserved motif IV (D/N/S)PP(Y/F) \[[Figure 1](#F1){ref-type="fig"}A and ([@B34])\] and the substitution of asparagine with alanine (point mutation designated N87A) in NSH57 M.HpyAXII completely abolished adenine MTase activity without affecting the expression levels of this protein ([Supplementary Figure S2](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)). Along with our genomic data, this finding supports the re-annotation of this *H. pylori* protein as a γ-adenine MTase. Figure 2.Biochemical demonstration that HypAXII functions as an R--M system targeting GTAC sites. (**A** and **B**) NSH57 M.HpyAXII methylates genomic DNA on adenines when expressed in *E. coli*. (A) *Escherichia coli* ER2925(DE3) extracts expressing NSH57 or NSH79 M.HpyAXII (arrowheads) separated by SDS--PAGE gel and stained with Coomassie blue. Control - empty plasmid. Two separate *E. coli* clones (1 and 2) were analyzed. (B) The indicated amount of genomic DNA from the respective *E. coli* cultures was cross-linked to a nitrocellulose membrane. DNA N-6 adenine methylation (m6A) was detected using anti-m6A antibodies and showed a signal during NSH57 M.HpyAXII but not NSH79 M.HpyAXII expression. (**C--F)** The HpyAXII R--M system targets the tetramer 5′-GTAC-3′. (C) *Helicobacter pylori* strain NSH57 wild-type and Δ*hpyAXIIM* genomic DNA was isolated and digested with RsaI. Agarose gel separation showed fragmentation for Δ*hpyAXIIM* genomic DNA but not wild-type. (D) *hpyAXIIR* from *H. pylori* strain HPAG1 was cloned and expressed *E. coli* BL21(DE3) under inducible conditions. Soluble (sol) and insoluble (insol) fractions were separated by SDS--PAGE gel and stained with Coomassie blue. R.HpyAXII was mostly insoluble (arrowhead). Control, empty plasmid. The soluble fractions shown in C were incubated with unmethylated genomic DNA (E) or plasmid DNA (F) and separated by agarose gel. DNA fragmentation was only observed when R.HpyAXII was expressed. Similar DNA restriction patterns (F) indicate that these enzymes cleave the same DNA sequence. Bands of higher sizes seen for with R.HpyAXII suggest incomplete digestion. Two separate *E. coli* clones are shown (1 and 2). The HpyAXII R-M system targets the tetramer 5′-GTAC-3′ ------------------------------------------------------ Two independent approaches defined the target sequence of this novel R--M system. First, using an array of methylation-sensitive endonucleases, we sought to identify an enzyme that could digest *H. pylori* NSH57 chromosomal DNA isolated from a Δ*hpyAXIIM* mutant but not from wild-type. Only the enzyme RsaI digested DNA from the Δ*hpyAXIIM::cat* mutant but not wild-type ([Figure 2](#F2){ref-type="fig"}C), indicating that the DNA MTase M.HpyAXII and the endonuclease RsaI act on the same target sequence, 5′-GTAC-3′, where the adenine residue is methylated by M.HpyAXII. Using this result, we investigated M.HpyAXII activity in the *H. pylori* strains where the HpyAXII R-M system was sequenced ([Figure 1](#F1){ref-type="fig"}B). Genomic DNA from *H. pylori* strains 26695 and NSH79 could be digested with RsaI, whereas J99, NSH57 and HPAG1 DNA were protected from RsaI digestion (data not shown), indicating that M.HpyAXII is only active in these three strains and agreeing with our predictions from the genomic sequences. RsaI digestion of DNA isolated from the NSH57*hpyAXIIM*^N87A^ mutant showed fragmentation when separated on agarose gel (data not shown), confirming that this single amino acid substitution abolishes MTase catalytic activity. In the second approach, we cloned and expressed the putative endonuclease gene *hpyAXIIR* in *E. coli* under the control of an inducible promoter ([Figure 2](#F2){ref-type="fig"}D). We chose *hpyAXIIR* from *H. pylori* strain HPAG1 because this protein is expected to be functional based on sequence analysis ([Figure 1](#F1){ref-type="fig"}). Incubation of the *E. coli* soluble fraction expressing HPAG1 R.HpyAXII with genomic DNA unmethylated for GTAC sites showed endonuclease activity as indicated by the resulting smear on agarose gel ([Figure 2](#F2){ref-type="fig"}E). To determine R.HpyAXII cleavage site, the same experiment was carried out with unmethylated plasmid DNA. R.HpyAXII-containing extract cleaved plasmid DNA and gave an identical fragmentation pattern as RsaI ([Figure 2](#F2){ref-type="fig"}F) confirming that R.HpyAXII acts on GTAC sites. In contrast to HPAG1 R.HpyAXII, no endonuclease activity was detected when R.HpyAXII from *H. pylori* strain J99 was expressed in *E. coli* (data not shown). While the exact cutting site of R.HpyAXII within the tetramer GTAC remains to be defined, our demonstration that *hpyAXIIM* and *hpyAXIIR* encode two independent enzymes suggests that they together constitute a class II R-M system ([@B4]). GTAC sites are scarce in the *H. pylori* chromosome but are found at high frequency in the rDNA genes ----------------------------------------------------------------------------------------------------- We determined the frequency and distribution of GTAC sites in four sequenced strains of *Helicobacter pylori*: 26695 (122 sites), J99 (184 sites), HPAG1 (114 sites), G27 (115 sites). This total number of sites is \>50-fold lower than the expected number based on frequency of nucleotides and confirms previous observations ([@B35]). Interestingly, a significant fraction of the GTAC sites are located within the ribosomal RNA (rRNA) genes. The 23SrRNA contains eight or nine sites depending on the strain analyzed and the 16SrRNA contains two sites ([Table 1](#T1){ref-type="table"}). Since two copies of each gene exist in the *H. pylori* chromosome, a total of 20 or 22 GTAC sites are located within the rRNA genes. We were particularly interested in GTAC sites that are strictly conserved among *H. pylori* strains since they may be biologically important. Of all intragenic sites, ten are conserved in all four *H. pylori* strains and can be mapped to a total of 10 genes that belong to various functional categories ([Table 1](#T1){ref-type="table"}). Interestingly, three of these genes belong to the cag pathogenicity island (*cagT*, *cagL* and *cagH*). Some of these sites are located in the promoter region of genes and may influence transcription efficiency. Table 1.Distribution of all conserved GTAC sites in four *H. pylori* strainsGene number[^a^](#TF1){ref-type="table-fn"}Gene name[^a^](#TF1){ref-type="table-fn"}Gene descriptionCharacteristics[^b^](#TF2){ref-type="table-fn"}23S rDNARibosomal DNA8 sites16S rDNARibosomal DNA2 sitesHP0200*rpl32*Predicted ribosomal protein L328 bp after start of HP0200 and 200 bp from start of HP0201HP0486*hofC*Outer membrane proteinHP0499*pldA*Phospholipase A1 precursorHP0532*cagT*cag pathogenicity island protein THP0539*cagL*cag pathogenicity island protein L200 bp from start of cagIHP0541*cagH*cag pathogenicity island protein HHP0613Predicted ABC transporter87 bp after start of HP0613HP0630*mda66*Modulator of drug activity11 bp after start of HP0630 and 170 bp from start of HP0631HP1197*rps12*Predicted ribosomal protein S12190 bp from start of HP1198HP1228*invA*Diadenosine polyphosphate hydrolase50 bp from start of HP1229[^1][^2] The HpyAXII R-M system effectively restricts incoming plasmid DNA ----------------------------------------------------------------- Bacterial R--M systems protect host genomes from invading DNA such as viral, plasmid and other foreign DNA by cleaving exogenous DNA at specific sites when unmethylated. We determined whether the endonuclease R.HpyAXII could restrict incoming plasmid DNA during natural transformation of *H. pylori*. As shown above, R.HpyAXII is biochemically active in *H. pylori* HPAG1, a strain difficult to transform (data not shown). We thus replaced the endogenous locus encoding M.HpyAXII/R.HpyAXII in the easily transformable NSH57 strain with that from HPAG1 (Materials and methods section). This engineered strain, NSH57*hpyAXIIM/R*~HPAG1~, encodes a fully active HpyAXII R-M system (R + M + phenotype). For comparison, we deleted the endonuclease component R.HpyAXII in the same strain and replaced it with an antibiotic resistance cassette to create a null allele (Δ*hpyAXIIR::aphA3*, R--M + phenotype). As donor DNA, we used plasmid pTM113-*cat* (Materials and methods and [Supplementary TableS3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)) that we isolated from *H. pylori* strain NSH57 wild-type (fully methylated, denoted 'M+'), from the catalytically inactive mutant NSH57*hpyAXIIM*^N87A^ (unmethylated for GTAC sites, denoted 'M−'), or from *E. coli* (unmethylated at all sites, denoted 'all M−'). We first verified that the numerous R--M systems encoded by *H. pylori* strain NSH57 could effectively restrict unmethylated (all M−) plasmid DNA as compared to methylated (M+) plasmid. Transformation frequency of wild-type *H. pylori* NSH57 decreased over 200-fold when completely unmethylated plasmid DNA prepared from *E. coli* was used as compared to methylated (M+) plasmid (data not shown), in agreement with previous work ([@B37]). We similarly found that transformation frequency involving M− plasmid decreased over 60-fold in the bacteria harboring an active R.HpyAXII endonuclease (R+) (ratio R−/R+, [Table 2](#T2){ref-type="table"}), demonstrating that this enzyme constitutes an effective barrier against incoming plasmid DNA *in vivo*. Table 2.R.HpyAXII effectively restricts incoming plasmid DNADonor DNA[^a^](#TF3){ref-type="table-fn"}Transformation frequency (\# transformants/recipient cell/ng × 10^−8^)[^b^](#TF4){ref-type="table-fn"}, mean (SEM)RatioRecipient strain[^c^](#TF5){ref-type="table-fn"}R+R−R−/R+M−12 (8.8)760 (120)63M+1900 (400)2500 (180)1.3[^3][^4][^5] The HpyAXII R--M system effectively restricts incoming chromosomal DNA ---------------------------------------------------------------------- To investigate the role of the endonuclease R.HpyAXII in restricting incoming chromosomal DNA *in vivo*, we assessed transformation using donor genomic DNA harboring a kanamycin resistance marker (*aphA3*) at the 23S rDNA locus. This marker contains a GTAC site and is susceptible to cleavage by R.HpyAXII. As described for plasmid DNA, donor chromosomal DNA was isolated from bacteria encoding an active (M+) or inactive (M−) M.HpyAXII MTase. We determined if the endonuclease R.HpyAXII could restrict incoming chromosomal DNA by comparing transformation efficiency in NSH57 harboring either an active (R+) or inactive (R−) restriction endonuclease R.HpyAXII. When genomic DNA isolated from *H. pylori* lacking M.HpyAXII MTase activity (M−) was transformed into the bacteria harboring an active R.HpyAXII endonuclease (R+), a 240-fold decrease in transformation frequency was observed (R−/R+, [Table 3](#T3){ref-type="table"}). We also digested the same donor genomic DNA *in vitro* with RsaI prior to transformation, which lowered the transformation frequency further to undetectable levels ([Table 3](#T3){ref-type="table"}). We suggest that cleavage of the GTAC site in gene *aphA3* by the endonucleases RsaI and R.HpyAXII inactivates this marker and results in the subsequent decrease in transformation frequency. Overall, we demonstrated that active R.HpyAXII endonuclease effectively limits the incorporation of unmethylated exogenous homologous DNA into the *H. pylori* chromosome. Table 3.R.HpyAXII effectively restricts incoming genomic DNADonor DNA[^a^](#TF6){ref-type="table-fn"}Transformation frequency (\# transformants/recipient cell/ng × 10^−10^)[^b^](#TF7){ref-type="table-fn"}, mean (SEM)RatioRecipient strain[^c^](#TF8){ref-type="table-fn"}R +R−R−/R+M+18 (0.16)44 ([@B17])2.4M+ RsaI49 (9.3)95 ([@B30])1.9M−0.42 (0.26)100 ([@B11])240M− RsaI01.4 (0.60)inf [^d^](#TF9){ref-type="table-fn"}[^6][^7][^8][^9] The HpyAXII R--M system follows the selfish hypothesis ------------------------------------------------------ Kobayashi and colleagues suggested that type II R--M systems act as selfish genetic elements and cannot be easily replaced with a homologous stretch of DNA ([@B36]). This phenomenon, more commonly known as postsegregational killing, has been attributed to the gradual dilution of the modification and restriction enzymes in the descendants of the cell that lost the R--M system. Since there is asymmetry between the roles of the MTase and REase, newly replicated chromosomes will be inadequately protected by methylation and rendered susceptible to cleavage by the residual REase, leading to cell death. To determine whether the type II HpyAXII R--M system follows the selfish hypothesis, we deleted this chromosomal locus by allelic replacement from *H. pylori* strain NSH57 engineered to harbor an active (R+) or inactive (R−) R.HpyAXII endonuclease. We found that R− but not R+ recipient bacteria were easily transformed with donor NSH57 genomic DNA in which *hpyAXIIM/R* was replaced with a *catsacB* marker (strain NSH57 Δ*hpyAXIIM/R::catsacB*) ([Table 4](#T4){ref-type="table"}, Δ*hpyAXIIM/R*::*catsacB*). This 2100-fold decrease in transformation frequency seen for the R + recipient strain is independent of the digestion of GTAC sites in the donor DNA because they are fully protected by DNA methylation. We verified that the recipient strains were not generally defective at transforming DNA by showing allelic replacement at a different chromosomal region (ΔHP0368). In summary, we showed that chromosomal type II HpyAXII R--M system resists its replacement with an empty site in the presence of the active endonuclease R.HpyAXII, as described for other bacterial type II R--M systems ([@B38],[@B39]). Table 4.The HpyAXII R-M system follows the selfish hypothesisDonor DNATransformation frequency (\# transformants/recipient cell/ng DNA × 10^−10^)[^c^](#TF12){ref-type="table-fn"}, mean (SEM)RatioRecipient strain[^d^](#TF13){ref-type="table-fn"}R+R−R−/R+Δ*hpyAXIIM/R*::*catsacB*[^a^](#TF10){ref-type="table-fn"}0.15 (0.08)[^e^](#TF15){ref-type="table-fn"}320 ([@B21])2100Δ*hpyAXIIM*::*cat*[^b^](#TF11){ref-type="table-fn"}0.17 (0.17)[^f^](#TF15){ref-type="table-fn"}1100 (350)6500ΔHP0368::*cat*[^b^](#TF11){ref-type="table-fn"}310 (9.2)180 ([@B38])0.58[^10][^11][^12][^13][^14][^15] An active R.HpyAXII REase can only exist in the presence of its active DNA MTase partner ---------------------------------------------------------------------------------------- We predicted that bacteria harboring a functional REase must also encode an active cognate DNA MTase to protect the genome from digestion. The R + M− phenotype should therefore be lethal, a condition especially relevant for the HpyAXII R-M system since many of the cognate sites are present within the rRNA genes ([Table 1](#T1){ref-type="table"}). Thus we deleted *hpyAXIIM* by allelic replacement using the Δ*hpyAXIIM*::*cat* PCR construct in bacteria harboring active (R+) or inactive (R−) endonuclease R.HpyAXII ([Supplementary Figure S3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)). We observed a dramatic reduction in transformation efficiency (6500-fold) for the R + bacteria ([Table 4](#T4){ref-type="table"}). In comparison, allelic replacement at a different chromosomal region (ΔHP0368) was carried out at a similar efficiency in R + and R- bacteria ([Table 4](#T4){ref-type="table"}). Importantly, the observed decrease in transformation efficiency is independent of the cleavage of incoming Δ*hpyAXIIM*::*cat* donor DNA by the endonuclease R.HpyAXII since this fragment is devoid of GTAC sites. Rather, recombinants for the R+ bacteria probably died from double-stranded breaks in their chromosomal DNA. We were intrigued by the rare transformants obtained when gene *hpyAXIIM* was deleted in the R+ bacteria because it suggests that the R+M− phenotype is occasionally viable. We investigated these clones further and found evidence of gene amplification and adaptive mutations at the M.HpyAXII/R.HpyAXII locus. From three independent transformations, we analyzed a total of 16 clones; seven displayed evidence of gene amplification and nine showed adaptive mutations. For gene amplification, *hpyAXIIM* was present in both a wild-type and a mutated form at the same locus ([Supplementary Figure S3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)), overall resulting in the phenotype R+ M+. This diploidy for *hpyAXIIM* was unstable and the mutant form of the gene was generally lost after several passages *in vitro* (data not shown). In other clones, point mutations were found in the promoter region of gene *hpyAXIIR*, specifically in the ribosome binding sequence and in the start codon of the gene ([Figure 3](#F3){ref-type="fig"}). In all cases, these mutations likely prevent effective translation of the endonuclease R.HpyAXII; the overall phenotype of these clones therefore became R−M−. We conclude that *H. pylori* bacteria only harbor an active R.HpyAXII endonuclease in the presence of an active M.HpyAXII MTase. Figure 3.Deletion of *hpyAXIIM* from a *H. pylori* strain harboring an active endonuclease R.HpyAXII yielded rare transformants that display adaptive mutations in the promoter region of *hpyAXIIR*. Gene *hpyAXIIR* was sequenced in nine surviving recombinants obtained following *hpyAXIIM* deletion. When compared to wild-type, single base deletions and substitutions (highlighted in gray) were detected in the transformants in both the ribosomal binding site (RBS) and start codon (START) of *hpyAXIIR*. The adenine MTase M.HpyAXII is highly conserved among *H. pylori* strains ------------------------------------------------------------------------- *Helicobacter pylori* R--M systems are remarkably heterogeneous among strains. Some are present in a fraction of strains, absent in others, or inactivated by deletion or frameshift mutations. It has been estimated that less than one-third of *H. pylori* R--M systems are fully active ([@B6]). We were interested in determining whether M.HpyAXII is present and active in a panel of *H. pylori* clinical isolates. We found that the HpyAXII R--M system is well conserved as we amplified this locus from all 50 pediatric clinical isolates isolated from 47 patients (S. Talarico, J. Fero, D.T. Thompson, J. Guarner, S. Czinn. B.D. Gold, N.R. Salama, personal communication) though its size was reduced in four (8%) strains (data not shown). To assess M.HpyAXII MTase activity for the clinical isolates, we digested each strain\'s genomic DNA with the REase RsaI, which only cleaves unmethylated GTAC sites. Of the 50 clinical isolates DNA, only four strains were digested with RsaI, all of which displayed a smaller amplified product for the HpyAXII R--M system (data not shown). M.HpyAXII activity is therefore remarkably conserved among *H. pylori* strains (92% active as tested). To determine how M.HpyAXII was inactivated in the four *H. pylori* strains lacking DNA MTase activity, we sequenced the HpyAXII R--M system. In all strains, most of *hpyAXIIM* and *hpyAXIIR* coding region was substituted by a gene in reverse orientation ([Figure 4](#F4){ref-type="fig"}). This replacing gene, that we name *hrgC* (HpyAXII replacing gene C), shows strong homology to *Helicobacter acinonychis sheeba* Hac_1467 (80% nucleotide identity). Hac_1467 is present at a different chromosomal region in this species (557 kb away from the HpyAXII locus) and encodes a 94 amino acid protein of unknown function. In the four clinical isolates where gene replacement occurred, *hrgC* encodes a protein of 94- or 128-amino acids. A search for orthologs of Hac_1467 at the *H. acinonychis* locus using a PCR approach was negative for all 50 clinical isolates and only positive for *H. pylori* strain NSH57. Surprisingly, in both *H. acinonychis sheeba* and *H. pylori* NSH57, Hac_1467 is preceded by a 165 bp DNA fragment (Hac_1466) that shows high homology to the 5′-end of *hpyAXIIM* (89% sequence identity, [Figure 4](#F4){ref-type="fig"}), suggesting that some recombination event took place at this locus. In summary, we demonstrated that the activity of the DNA MTase M.HpyAXII is highly conserved among *H. pylori* strains but can be disrupted by insertion of the alternate gene *hrgC* at the same locus in several unrelated strains. Figure 4.M.HpyAXII MTase activity is occasionally disrupted by insertion of the alternate gene *hrgC*. The HpyAXII R--M system was sequenced in the *H. pylori* clinical isolates where M.HpyAXII was found inactivated (M−). In all M− strains, most of the HpyAXII locus was replaced with alternate gene *hrgC* that shows strong homology to Hac_1467 (80% nucleotide identity) from *Helicobacter acinonychis sheeba*. Depending on the strain analyzed, gene *hrgC* is either 285- or 387-bp long. The REase R.HpyAXII is poorly conserved among *H. pylori* strains ----------------------------------------------------------------- The conservation of M.HpyAXII MTase activity in *H. pylori* isolates led us to evaluate R.HpyAXII activity in these same isolates. We developed a genetic assay to assess R.HpyAXII endonuclease activity based on the previous finding that the MTase M.HpyAXII cannot be deleted in the presence of an active REase. Since *H. pylori* strains vary in their ability to be transformed by exogenous DNA, we chose to engineer strain NSH57 to contain the HpyAXII R-M system from the different clinical isolates using allelic replacement and a knockin approach (Materials and methods section). We transformed the resulting clones with the Δ*hpyAXIIM*::*cat* donor DNA to delete gene *hpyAXIIM*. When a large number of transformants were recovered, we deduced that R.HpyAXII from that particular strain lost endonuclease activity. In contrast, when few or no transformants were obtained, we concluded that R.HpyAXII must be active because of the lethality of the R + M− phenotype. The DNA fragment ΔHP0368 was used as transformation control. We first evaluated R.HpyAXII activity in the NSH57 clones engineered to contain the HpyAXII R-M system from *H. pylori* strains NSH57, J99, NSH79 and HPAG1. As expected from our genomic and biochemical results ([Figures 1](#F1){ref-type="fig"}B and [2](#F2){ref-type="fig"}), only the clone harboring the HpyAXII R--M system from strain HPAG1 showed a dramatic reduction in transformation efficiency when gene *hpyAXIIM* was deleted ([Supplementary Figure S4](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)). In contrast, clones harboring HpyAXII from strain NSH57, NSH79 and J99 yielded a large number of transformants, confirming that the endonuclease R.HpyAXII is inactive in these strains. This result therefore validates the use of our genetic assay to investigate R.HpyAXII endonuclease activity. We constructed NSH57 clones harboring the HpyAXII R-M system from 37 clinical isolates and found that R.HpyAXII was only active in seven clones (18.9%) based on the number of transformants recovered. All strains could successfully be transformed with the ΔHP0368 PCR product, ruling out a general defect in transformation. We examined the nature of mutations that inactivated R.HpyAXII in the 30 *H. pylori* isolates by sequencing gene *hpyAXIIR*: nine strains (30%) contain a large deletion (39AA) similar to the one found in strain NSH57 ([Figure 1](#F1){ref-type="fig"}B), seven strains (23%) harbor nonsense mutations that result in a truncated protein, two strains (7%) have both the deletion and nonsense mutations, and 12 strains (40%) contain single nucleotide polymorphisms (SNPs) in the coding region of gene *hpyAXIIR*. For four strains, we confirmed that the *hpyAXIIR* sequence was identical in the engineered strain and in the original isolate, ruling out the possibility that mutations were introduced during the genetic manipulations. To analyze the inactivating SNPs in more details, we aligned the protein sequences from the 12 inactive and seven active R.HpyAXII enzymes with that of *H. pylori* strain HPAG1, shown to be active. We identified between two and five amino acid substitutions per strain that may inactivate R.HpyAXII function, resulting in a total of 31 distinct coding SNPs. The nature and frequency of these substitutions are described in [Figure 5](#F5){ref-type="fig"}A and the SNPs for each strain are described in [Supplementary Table S3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1). These coding SNPs were mapped on the primary protein sequence of R.HpyAXII ([Figure 5](#F5){ref-type="fig"}B) as well as on the three-dimensional model based on R.PabI crystal structure ([Figure 5](#F5){ref-type="fig"}C) ([@B40]). Out of these 31 SNPs, two (\#5 and \#18) overlap with residues previously shown to be required for R.PabI activity ([@B40]), and seven are found in multiple *H. pylori* strains ([Figure 5](#F5){ref-type="fig"}A). Several structural motifs (β3, α3, β6, β8, β10 and α4 based on R.PabI) contain a high density of SNPs and may be crucial for R.HpyAXII endonuclease activity. Figure 5.Protein sequence analysis of 12 inactive R.HpyAXII enzymes reveal 31 distinct coding SNPs. (A) Comparison of R.HpyAXII protein sequences in 12 *H. pylori* strains harboring inactive enzyme and in seven strains harboring active enzyme with that from strain HPAG1 identified 31 coding SNPs, enumerated \#1 through \#31 with the conservation and frequency of each substitution indicated. (C) - conserved, (S) - semiconserved, (-) - unrelated. Changes highlighted in gray were found in multiple strains and changes highlighted in purple were previously shown to be required for R.PabI activity ([@B40]). (**B**) HPAG1 R.HpyAXII and R.PabI protein sequences were aligned and the position of each SNP highlighted. Red, potentially inactivating SNPs numbered \#1 through \#31; cyan, previously shown to be required for R.PabI activity and target the predicted DNA-binding domain; purple, coding SNPs in R.HpyAXII also required for R.PabI activity. (\*) - identical residues, (:) - conserved substitution, and (.) semi-conserved substitution. (**C**) Coding SNPs were mapped on the three-dimensional model generated for R.HpyAXII based on the R.PabI crystal structure using the same color code used in (B). *H. pylori* M.HpyAXII MTase activity is not required for establishing infection in mice --------------------------------------------------------------------------------------- The remarkable preservation of M.HpyAXII activity in *H. pylori* strains and the intriguing distribution of chromosomal GTAC sites led us to investigate whether this DNA MTase confers a selective advantage to *H. pylori* during infection. We were also interested in determining whether M.HpyAXII has a role during infection that is independent of its DNA MTase activity. For this reason, we infected mice with *H. pylori* NSH57 deletion mutant (Δ*hpyAXIIM*::*cat*) and with the catalytically inactive mutant (*hpyAXIIM*^N87A^), which MTase can presumably still bind DNA but not methylate it. Mouse stomachs were harvested after one week of infection and viable bacteria were recovered and enumerated to calculate the competitive index for each infection \[colony forming units (CFU) mutant bacteria/CFU wild-type bacteria\] (Materials and methods section). When mice were infected with NSH57Δ*hpyAXIIM*::*cat* mutant and wild-type bacteria, equal number of bacteria were recovered (*n* = 9, [Figure 6](#F6){ref-type="fig"} left) indicating that they could establish infection at a similar efficiency. M.HpyAXII protein expression is therefore not required for establishing infection in *H. pylori* strain NSH57. We also infected mice in competition with the catalytically inactive mutant *hpyAXII*^N87A^ and the deletion mutant Δ*hpyAXIIM*::*cat*. Both strains infected mice similarly (*n* = 9, [Figure 6](#F6){ref-type="fig"} right) indicating that M.HpyAXII does not have a role during establishment of infection that is independent of its DNA MTase activity. Figure 6.M.HpyAXII MTase activity is not required by *H. pylori* for establishing infection in a mouse infection model. Mice were infected in 1:1 competition with the indicated *H. pylori* strains and the competitive index (CI) determined after one week of infection. The CI was calculated by dividing colony forming units (CFU) recovered of null mutant bacteria over CFU wild-type or point mutant bacteria and corrected by dividing the actual input ratio enumerated from plating the inoculums. Left, mice (*n* = 9) were infected with *H. pylori* NSH57 wild-type and an isogenic null mutant *ΔhpyAXIIM*::*cat*. Both strains infected mice at a similar efficiency (geometric mean CI slightly above one). Right, mice (*n* = 9) were infected with the NSH57*ΔhpyAXIIM*::*cat* mutant and the catalytically inactive mutant (*hpyAXIIM*^N87A^) constructed in strain NSH57. DISCUSSION ========== *Helicobacter pylori* naturally takes up exogenous DNA, a condition thought to promote genetic diversification by spreading new alleles in the population. However, genetic exchange is limited by the large number and heterogeneity of *H. pylori* R--M systems ([@B6]). The contribution of individual R--M systems in restricting incoming DNA remains for the most part undetermined since only a few of these systems have individually been tested in *H. pylori* ([@B37],[@B41]). In addition, it is possible that R--M systems carry out other biological roles. In our study, we have biochemically characterized a novel *H. pylori* type II R--M system, M.HpyAXII/R.HpyAXII, and showed that it targets GTAC sites thus confirming prior predictions ([@B35]). The endonuclease R.HpyAXII effectively restricted both unmethylated plasmid (60-fold) and genomic (240-fold) DNA ([Tables 2](#T2){ref-type="table"} and [3](#T3){ref-type="table"}). Our results agree with previous reports documenting effective restriction of plasmid DNA by R.HpyAIII (encoded by HP0091, GATC) ([@B37]), and of chromosomal DNA by R.HpyAII (encoded by HP1366, GAAGA) ([@B41]). Since R--M systems are highly polymorphic in *H. pylori*, we analyzed the conservation of both M.HpyAXII MTase and R.HpyAXII endonuclease activities in a panel of clinical isolates. We found a striking asymmetry between the highly conserved MTase activity (92% active, *n* = 50) and that of the REase (18.9% active, *n* = 37). In fact, our data indicate that M.HpyAXII is the third most highly conserved adenine MTase in *H. pylori*, preceded only by M.HpyAI (CATG, 100% conserved) and M.HpyAIII (GATC, 97% conserved) ([@B42],[@B43]). Other studies have suggested that MTase activities are generally selected for in *H. pylori* ([@B6],[@B29],[@B44]) but how DNA methylation benefits the organism is unknown. To begin to probe how M.HpyAXII affects *H. pylori* biology, we generated a null allele in gene *hpyAXIIM* in mouse-adapted strain NSH57 either by deletion or by targeted mutation of the catalytic site of the enzyme (*hpyAXIIM*^N87A^). Mouse infection with these strains indicated that M.HpyAXII expression is not required by *H. pylori* for the establishment of infection ([Figure 6](#F6){ref-type="fig"}) in contrast to previous work ([@B19]). As this study did not complement the mutant phenotype, it is possible that second site mutations or polar effects accounted for the defect observed. Further experiments are needed to determine if M.HpyAXII activity is important during persistent infection and to elucidate how GTAC methylation provides a selective advantage in *H. pylori*. It was proposed that the maintenance of an active MTase allows reactivation of a given R--M system through recombination with the genomic DNA of a strain that encodes an active REase. However, the probability of this event must be relatively low given that R.HpyAXII is active in a small number of strains. It was also postulated that 'orphan' MTases are conserved because they act as a 'molecular vaccine' against the parasitism of R--M systems. This hypothesis was based on the finding that Dcm in *E. coli* can alleviate postsegregational killing induced by the EcoRII R--M complex that recognizes the same sequence as Dcm ([@B45]). This also seems unlikely because no R--M system that acts on the same site as HpyAXII has been identified in *H. pylori*. DNA methylation may alternatively be selected for in *H. pylori* because it confers immunity from the action of the cognate REase and therefore increases the chances that an entire gene is successfully propagated in a population. However, the finding that the average size of recombined fragment is unusually small (417 bp) in *H. pylori* as compared to other bacteria indicates that incoming DNA is generally susceptible to cleavage by REases ([@B46]). Another important role of DNA methylation is to modulate the interaction between proteins and DNA as demonstrated for the stand-alone adenine MTase Dam in α- and γ-Proteobacteria ([@B14],[@B15],[@B47]). DNA MTases involved in R--M systems that are not coupled to an active REase may have evolved similar regulatory functions since they are no longer under the pressure to act on all chromosomal sites and may therefore preferentially methylate sequences required for transcription. The genome-wide analysis of conserved GTAC sites identified genes of various functional classes including several genes of the cag pathogenicity island but it is unknown whether their expression is affected by M.HpyAXII methylation. Although GTAC sites are scarce in the *H. pylori* chromosome, they are present at high frequency in the 23S and 16S rRNA genes. Our preliminary experiments showed no effect of M.HpyAXII methylation on 23S rRNA transcripts levels or on *in vitro* growth of the bacteria (data not shown), arguing against a role for GTAC methylation in *H. pylori* ribosomal biogenesis. It is possible that ribosomal GTAC sites are preserved because they are crucial for the folding of the RNA into functional secondary structures in Helicobacter species and that methylation of these sites does not have any biological role. In agreement with this hypothesis, the analysis of 23S rRNA sequences in 55 Helicobacter strains representing 41 taxa ([@B48]) shows conservation of most GTAC sites even though many of these species probably lack a M.HpyAXII enzyme. Alternatively, ribosomal GTAC sites may not have been erased from these chromosomal regions because they evolve at a different rate than the rest of the genome; these elements are duplicated in *H. pylori* and are subjected to homogenization processes such as gene conversion ([@B49]). Overall, the significance of ribosomal GTAC sites in *H. pylori* remains unsolved but echoes a similar anomaly in site distribution with the tetramer CTAG that is very rare in *E. coli* and in other proteobacterial genomes and over-represented in rRNA genes ([@B50],[@B51]). The comparison of tetranucleotide combinations in 27 representative microbial genomes revealed that ACGT, GTAC and TCGA are strongly underrepresented in both coding and noncoding DNA in *H. pylori* ([@B52]). A significant correlation between the avoidance of palindromic words and type II R--M systems was suggested ([@B53]) presumably because these systems exert significant pressure on an organism when restriction is intact but methylation is incomplete. However, the highly conserved *H. pylori* R--M systems M.HpyAI/*iceA* (CATG) or M.HpyAIII/R.HpyAIII (GATC) target sites are not underrepresented in the *H. pylori* genome. Since cognate site avoidance is probably dependent on the timing of acquisition of a given R--M system during evolution, the HpyAXII R--M system must have been acquired a long time ago, consistent with the finding that this system is present in all *H. pylori* isolates analyzed. Interestingly, GTAC sites are also scarce in the *Helicobacter hepaticus* genome even though it does not encode an M.HpyAXII/R.HpyAXII ortholog. This can either be explained by the recent loss of this system or by the existence of a different R--M system that acts on GTAC sites in *H. hepaticus*. Our study of the conservation of M.HpyAXII MTase activity uncovered the occasional replacement of the HpyAXII R-M system with an alternate gene that we re-annotate as *hrgC* (HpyAXII replacing gene C). Other *H. pylori* R--M systems encoding the two most highly conserved MTases M.HpyAI and M.HpyAIII are similarly replaced with genes of unknown function. In the HpyAIII R--M system, gene *hrgA* inactivated the REase R.HpyAIII in 33% of the 208 strains analyzed but rarely inactivated M.HpyAIII function ([@B54]). *hrgA* encodes a 370 amino acid protein of unknown function and this gene was associated with gastric cancer in *H. pylori* isolates from Asian patients but not among Western strains ([@B55]). In the HpyAI R--M system, the REase encoded by *iceA1* was replaced with *iceA2* in 44% of the strains analyzed ([@B56]). *iceA2* (renamed *hrgB*) encodes a polymorphic protein of unknown function ranging from 24 to 59 amino acid long depending on the strain studied, and epidemiological studies have correlated the presence of gene *iceA1* in *H. pylori* strains with the incidence of peptidic ulcers disease ([@B57]). In our study, we showed that similarly to *hrgA* and *hrgB*, *hrgC* encodes a protein of unknown function but its origin could be traced to a different locus in *H. acinonychis sheeba* and *H. pylori* strain NSH57 (G27). Unlike *hrgA* and *hrgB*, *hrgC* replacement always compromised both the MTase and REase activities in our analysis of 37 clinical isolates. Further work will define whether *hrgC* has any role in *H. pylori* pathogenicity. As predicted for a type II R--M system, we showed that deletion of gene *hpyAXIIM* is lethal in the presence of an active R.HpyAXII endonuclease. The lethal phenotype R+M− can be rescued by adaptive mutations, in the form of gene amplification of *hpyAXIIM* and null mutations in the promoter region of *hpyAXIIR*. This result is reminiscent of extensive research describing stress-induced mutations in *E. coli* with the Lac assay system ([@B58]). Based on these findings, we suggest that these adaptive mutations preexisted in the *H. pylori* population and were selected for as a result of *hpyAXIIM* deletion. Tandem amplification was previously documented for R--M systems, as when the entire BamHI R--M system was deleted from *Bacillus subtilis* ([@B38]). In another study, large-scale genomic rearrangements were demonstrated when the PaeR71 R--M system was deleted from *E. coli* ([@B39]). These rearrangements involved recombination between copies of the transposon IS3 and were proposed to have resulted from multiple rounds of unequal crossing-over or rolling circle amplification. Our study of the deletion of the MTase gene in the HpyAXII R-M system is the first to demonstrate the occurrence of compensatory mutations in the promoter of the respective REase gene. Orthologs of M.HpyAXII generally show poor sequence homology except for one gene of unknown function from *Campylobacter upsaliensis* RM3195 (CUP1644) that shows 43% identity with M.HpyAXII. Other adenine MTase that target GTAC sites such as M. PabI from *Pyroccoccus abyssi* and M.CviQI from Chlorella virus only show 14.6% and 17.8% protein identity, respectively. M.RsaI (7.9% protein identity) from *Rhodopseudomonas sphaeroides* and M.MjaV from *Methanococcus janaschii* (12.7% protein identity) act on the same sequence but methylates cytosines (m4C). GTAC sites are strongly avoided from the genomes of *R. sphaeroides* and *M. jannashi* but not from *P. abyssi*, suggesting that the PabI R--M system invaded this organism recently as discussed previously ([@B35],[@B59]). The crystal structure of the endonuclease R.PabI was recently solved and unveiled a novel protein fold termed 'half-pipe' ([@B40]). Although the two isochizomers R.PabI and R.HpyAXII show relatively weak sequence identity (25.4%), several conserved motifs are shared between the two proteins ([Figure 5](#F5){ref-type="fig"}B). The R.HpyAXII polypeptide could be threaded with high confidence onto the tertiary structure of R.PabI (PHYRE, *E*-value 3e-26, [Figure 5](#F5){ref-type="fig"}C) suggesting that R.HpyAXII folds into a similar half-pipe structure. Among the thousands of confirmed and hypothetical REase enzymes identified, Orlowski and Bujnicki predicted that only eight present the half-pipe fold ([@B60]). R.HpyAXII therefore constitutes an excellent candidate for refined biochemical analyses that will enrich our understanding of this new class of enzymes. SUPPLEMENTARY DATA ================== [Supplementary Data](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1) are available at NAR Online. FUNDING ======= National Institutes of Health (AI054423 and DK53708 to N.R.S., AI55396 to O.H.). Funding for open access charges: National Institutes of Health (AI054423). *Conflict of interest statement*. The project\'s contents are solely the responsibility of the authors and do not necessarily represent the official views of the NIH. Supplementary Material ====================== ###### \[Supplementary Data\] We thank Marion Dorer for critical reading of the article, Laura Sycuro for generating the *catsacB* cassette, New England Biolabs for providing the m6A antibodies and Barry Stoddard for helpful discussions. [^1]: ^a^Based on 26695 annotation ([@B61]). [^2]: ^b^The number of conserved sites is given when higher than one. The exact position of the site is given only when within 200bp from the start codon of a gene. [^3]: ^a^Donor plasmid pTM113-*cat* contains a total of five GTAC sites and was constructed by substituting *cat* for *aphA3* in pTM113 ([Supplementary Table S3](http://nar.oxfordjournals.org/cgi/content/full/gkn718/DC1)). pTM113-*cat* was isolated from *H. pylori* strain NSH57 wild-type (M+) or NSH57*hpyAXIIM*^N87A^ (M−). A total of 3.3 ng of plasmid DNA was used for each transformation. [^4]: ^b^Transformation frequency was calculated by dividing the number of transformants recovered by the total number of recipient bacteria and was based on the average of three replicates. [^5]: ^c^Strain NSH57*hpyAXII*~HPAG1~ (R+) encodes an active R.HpyAXII and strain NSH57*hpyAXIIM/R*~HPAG1~ Δ*hpyAXIIR*::*aphA3* (R−) lacks this enzyme. [^6]: ^a^Donor genomic DNA was constructed by inserting the *aphA3* cassette at position 2586bp (from start codon) in one of the two copies of 23S rDNA genes. One GTAC site is present in *aphA3* at position \#94 bp and three flanking GTAC sites are found in close proximity to the marker at positions \#2527, \#2660 and \#2745**.** Chromosomal DNA was isolated from *H. pylori* strain NSH57 wild-type (M+) or NSH57Δ*hpyAXIIM::cat* (M−), and predigested or not with RsaI. A total of 10 ng genomic DNA per tranformation was used for M− and 7.9 ng for M+. [^7]: ^b^Transformation frequency was based on the average of three replicates. [^8]: ^c^Strain NSH57*hpyAXIIM/R*~HPAG1~ (R+) encodes an active R.HpyAXII and strain NSH57*hpyAXIIM/R*~NSH57~ (R−) encodes an inactive enzyme. [^9]: ^d^Ratio is infinite because no transformants were recovered for R+ recipient strain [^10]: ^a^NSH57 wild-type genomic DNA was constructed by replacing the entire HpyAXII R-M system with the *catsacB* marker. 500ng genomic DNA per transformation was used. [^11]: ^b^A PCR product was engineered to disrupt genes *hpyAXIIM* or HP0368. The 5′ and 3′ homologous ends of the respective gene was fused to the antibiotic resistance cassette and transformed to generate a null allele by allelic replacement. A 150ng DNA per transformation was used for Δ*hpyAXIIM*::*cat* and ΔHP0368::*cat*. [^12]: ^c^Transformation efficiency was based on the average of three replicates. [^13]: ^d^As in [Table 2](#T2){ref-type="table"}. [^14]: ^e^A total of two clones was recovered. [^15]: ^f^A total of five clones was recovered. | Mid | [
0.654450261780104,
31.25,
16.5
] |
Afterimage - Optical Illusions Afterimage Afterimages are optical illusions that occur after looking away from a direct gaze at an image. This is closely related to the phenomenon called the persistence of vision, which is used in animation and cinema. One of the most common afterimages is the bright glow that seems to float before one's eyes after staring at a light bulb or a headlight for a few seconds. Afterimages are caused when the eye's photoreceptors, primarily those known as cone cells, "tire" from the over stimulation and lose sensitivity. Normally the eye deals with this problem by rapidly moving the eye small amounts, the motion later being "filtered out" so it is not noticeable. However if the color image is large enough that the small movements are not enough to change the color under one area of the retina, those cones will eventually tire and stop responding. The rod cells can also be affected by this. When the eyes are then diverted to a blank space, the tired photoreceptors send out little signal and those colors remain muted. However, the surrounding cones that were not being used are still "fresh", and send out a strong signal. The signal is exactly the same as if looking at the opposite color, which is how the brain interprets it. For example, a lime green image will produce a purple afterimage, because the lime green color does not tire out the purple photoreceptors. To see an afterimage of the picture below, stare at it for 45 seconds, then immediately look at a blank wall or piece of white paper to see the afterimage. In the afterimage, an image of Jesus will appear - blink a couple of times if you don't see the image. | Mid | [
0.6085192697768761,
37.5,
24.125
] |
It's time to put your knowledge to the test! We've created a repository of over 3000 high-yield Flashcards specifically designed to increase the quality and duration of your study efforts for the NABNE licensing exams, NPLEXI and NPLEXII What's The Difference We're Continually Evolving This website was made by successful students for successful students. The difference is in our attitude. We believe in continual improvement. The cue cards and categories on this website are continually evolving to reflect the needs of the student body. Feedback from our students is encouraged! We listen, and want to make a product that works for you. "THANK YOU! I felt like I had hit a wall with my studying and was just doing the same things over and over. Your flashcards were exactly what I needed in this last push for passing NPlex!" -CCNM Student" We're Unique and Portable One of the pillars of Naturopathic medicine is individualized care, but we also believe in individualized study approaches. Some people need cue cards. Some people need their NPLEX resources to be portable. Carrying 3000+ cue cards to the library, school, or coffee shop is just not feasible… until now. This website provides the most comprehensive list of questions currently on the market. Best of all, with over 150 sub-categories, such as ECG tests or Esophageal Pathologies, you can refine your study deck to be as specific as you want! We’re Making Information Manageable Have you found learning Bot. med and Pharm. monographs cumbersome and overwhelming? You’re not alone! That’s why we break down our categories into specialized sub-categories such as: Name the Botanical, Name the Medication, or Name the Homeopathic Remedy. These categories allow you to digest 2-3 high yield facts at a time, rather than being bombarded by actions and side effects. We’re the Best of ALL Worlds These cue cards can be used as a stand-alone study guide, an adjunct to popular NPLEX guides, or as a measure of assessing your current understanding of a given topic. How well did you learn the common pediatric infections? Find out by reviewing the equally named sub-category. | High | [
0.785714285714285,
33,
9
] |
DULUTH -- For the first time in two months, the Gwinnett Gladiators are playing a non-division opponent. Since beating Wheeling on Nov. 25, the Gladiators have been battling their three division rivals for the top spot in the South, but now face conference-leading Elmira tonight and Saturday. Trenton rounds out the weekend set in Sunday afternoon's matinee. It's the start of an eight-game home stand and head coach John Wroblewski said it will be good for the team to see someone new. "It's always nice to have a fresh opportunity," Wroblewski said. "It's tough to show video on the same tendencies. It gets a little monotonous. This gives us a little different charge." The Jackals present a big challenge as well. They lead the East 53 points and are 8-1-1-0 in their last 10 games. Rookie Dustin Gazley leads the offense and ranks among the league's top 10 in points with 12 goals and 27 assists in 39 games. "There really are no holes in their game," Wroblewski said. "They have a very steady defensive corps that moves the puck. They are diligent in all areas and it's going to take a tremendous effort to win those games." The Gladiators throttled back a little bit in practice after playing three games in 48 hours over the weekend. "It was a pretty taxing weekend," said Wroblewski, whose team was 1-1-1 in the set. "We tried to downscale the pace in practice to give the guys a little break physically. We worked on strategic things -- the neutral zone defense and the forecheck -- and also special teams." After pushing its home record to 12-5-0-5 with a win over Florida on Friday, Gwinnett lost in regulation and overtime in Greenville. "I didn't think they were exceptional games," Wroblewski said of the road trip. "Greenville did a really nice job of controlling the play, especially Saturday. They're a very difficult team to break out against. They played a real nice possession game. "We adjusted and made some different moves for Sunday's game." The Gladiators lost in overtime Sunday, but rallied from a 4-2 deficit with less than five minutes remaining in regulation to earn a point. It kept them tied with red-hot South Carolina for the division lead. With another three games over 72 hours and forward Chris Clackson called up to AHL Houston, Wroblewski is waiting to hear from affiliate Portland on a possible player assignment. If that doesn't happen, he said they might have to get a guy from the SPHL for tonight's 7:05 start against Elmira. | Mid | [
0.6125760649087221,
37.75,
23.875
] |
Provides good energy whenever he is on the ice. Has a history of point production at lower levels. Can play both wing and center, which adds to his overall value. Lacks both size and strength (5-11, 171 pounds), so he needs to add more bulk and get physically stronger to maximize his appearances at the NHL level. | Mid | [
0.599542334096109,
32.75,
21.875
] |
While many popular policies that require individuals to share the costs of their health care can be counter-productive, as when high deductible health insurance plans discourage people from seeking necessary care, Christopher Robertson’s “scaled cost-sharing” proposal offers considerable promise. Robertson observes that employers typically use a one-size-fits-all approach to the cost-sharing features of their health insurance plans. Whether workers earn $40,000 or $400,000, they face the same deductibles, copayments, and other cost-sharing features that kick in when individuals seek care. In particular, these cost-sharing requirements come with an annual cap on out-of-pocket spending that is the same for all employees. Plans that cap out-of-pocket spending at $5,000 apply that cap to all workers, and plans with $10,000 caps also apply their cap to all workers. The Affordable Care Act (ACA) reinforces the practice of standard caps with its maximum amounts for in-network, out-of-pocket spending. As Robertson notes, fixed annual caps come with a number of problems. For example, they are regressive in the way that flat tax rates are regressive, and highly so. If employers peg their annual cap for family plans at $8,000, the $40,000 wage-earner would have to pay as much as 20 percent of income on health care while the $400,000 wage-earner would have to pay only up to 2 percent of income. In addition, standard annual caps distort health care decision making. For the highly paid employee, a cap at only 2 percent of income may encourage overconsumption of health care. For the poorly paid employee, a cap at 20 percent of income may result in underconsumption of health care. To address the problems with fixed caps, Robertson would switch from a dollar-based annual cap to an income-based annual cap. That is, instead of using a standard cap of $8,000, employers might peg their caps at 6 percent of income. A worker earning $40,000 would face an annual cap of $2,400, while a worker earning $400,000 would face an annual cap of $24,000. Such a switch would be desirable from a number of perspectives. It would be fairer to low-paid workers, it would reduce the distortions in health care decision making, and it would be financially advantageous to employers. Employers would benefit because their higher-paid employees would bear a larger share of the company’s insurance costs. Nevertheless, the health of those workers should not suffer—income-based annual caps address the incentive that fixed caps create for overconsumption of health care by highly-paid employees. Indeed, writes Robertson, empirical data indicate that cost-sharing leads higher-income persons to reduce their consumption of health care without compromising their health. Robertson also considers the barriers to adopting income-based annual caps. For example, health insurance is a group-based benefit, making it difficult for employers to treat workers differently under their plans. In addition, changes in the law are needed to facilitate the adoption of income-based caps. In particular, Congress needs to revise—or the Department of Health and Human Services waive—the ACA’s maximums for annual caps. Currently, out-of-pocket annual caps may not exceed $6,600 for an individual plan or $13,200 for a family plan. An income-based cap of 6 percent would work up to incomes of $110,000 for individuals or $220,000 for families. Hence, while it is possible to fully implement income-based caps for low-income workers, ACA limits their use for high-income workers. In the meantime, Robertson provides an intriguing argument for why current law might actually require some degree of income-based caps (i.e., income-based caps when fixed caps present a barrier to care for low-income workers). As Robertson observes, federal health insurance law includes anti-discrimination provisions to prevent employers from favoring their highly-compensated employees. But when low-income employees must pay a higher percentage of their income for their care, they are less able to afford care and therefore less able to draw on their health care benefits. Fixed annual caps very much favor highly-compensated employees. And the disfavoring of low-income employees can come with harms to health. As Robertson points out, much of the problem with cost-sharing in health insurance comes from its impact on low-income individuals who are more likely to suffer an adverse impact on their health when increases in cost-sharing lead them to reduce their demand for medical care. By tying cost sharing to income, employers can better ensure that all of their employees realize the benefits to health from health care insurance. Feeds & Subscriptions Search Search for: Annual Archives JOTWELL: THE JOURNAL OF THINGS WE LIKE (LOTS) ISSN 2330-1295 (ONLINE)Jotwell is indexed on HeinOnline Authors retain copyright to their articles, but have given us a non-exclusive license to publish it under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License which gives readers certain rights to non-commercial re-use with proper attribution; authors also permit JOTWELL to include their work in commercial compilations. | High | [
0.698564593301435,
36.5,
15.75
] |
ARROGANT, selfish and an inflated sense of self-worth. All these things have been leveled at Daniel Sturridge in recent times, but even more so after reports started that his 3 and a half year spell at Chelsea was to come to an end, with a £12m move to Liverpool. Are these tags fair? And just how good is the left footed forward? When news broke that Liverpool were to sign another young British player for a significant transfer fee, several ex-players and media pundits had their say on the matter. Stan Collymore used his newspaper column to state his belief that Sturridge is not the answer to Liverpool’s goalscoring problems, and Steve Nicol told ESPN that he did not think Sturridge was the right player for Liverpool to target. Both felt that a pure number 9 in the mould of Darren Bent would be more suitable. Let’s take a look at Sturridge’s career this far, his suitability to Liverpool’s football, and whether all the pre-conceptions about him have any merit. After coming through the ranks at Manchester City, he left the club at the end of his contract to join Chelsea. He always maintained it was because he saw his first-team chances at City being limited by the imminent arrival of numerous big-name strikers. This did not ring true to many, especially as Chelsea had a strong striking pool, but the club had not generally been spending big money since the second summer under Mourinho, and Sturridge arrived at Chelsea as the third choice central striker. “Studge” had to bide his time under Carlo Ancelotti in that first season, making only 6 starts in all competitions. He did, however, score 4 goals in the 3 FA Cup games he started as the centre forward, and ended the season with 5 goals in total. In his second season at the club, he only started 3 games in the first half of the season, one being in the League Cup and the two others in the Champions League. He scored in both of those Champions League starts. With Fernando Torres’ £50m move to the club in January, Sturridge departed on loan to Bolton. 8 league goals arrived in just 12 appearances (11 starts), and he appeared to grow up as a player. This meant that in two seasons, Sturridge had scored 15 goals in just 20 starts. What he really needed was a chance to play regularly, and that arrived under André Villas-Boas, who used Sturridge as an inverted winger on the right flank – a role similar to the one Hulk had played for Villas-Boas at Porto. The young left-footer responded to the confidence shown in him. In his first 19 games of last season, Sturridge scored 10 goals in just 1322 minutes. That’s a goal every 1.5 games on average, which is a fantastic return from the right flank. 9 of those goals came in the Premier League, so it’s not as if his total was inflated by goals in the Carling Cup. He scored 7 of those 10 goals away from home. His goals came against Sunderland (A), Bolton (A), Everton (H), Everton (A), Wolves (H), Newcastle (A), Liverpool (H), Wigan (A) and Tottenham (A). He was scoring goals against strong opposition. Of those 10 goals, 2 were equalisers, 3 were the first goal in games, and 2 proved to be the match winning goals. Again, he was not scoring the the 4’th or 5’th goal in a comfortable win. After this, with the side struggling, Villas-Boas changed tactics. He switched to a much deeper defensive line, no pressing high up the pitch, and asked the wide players to drop far deeper, instead of pressing the opposition fullbacks as before. This was not a role that suited Sturridge, and his goals unsurprisingly dried up. After Roberto Di Matteo took over as manager, the wide players were required to do even more defensive work. Sturridge lost his place in the first-choice XI. Although he started 10 games under the Italian, it was usually wide on the left, and in a completely changed lineup as Chelsea rested players for the Champions League. Sturridge ended the season with 13 goals and 9 assists. He was Chelsea’s top scorer in all competitions from open-play. This was despite only playing 45 minutes as a central striker all season. That start was at Blackburn in the league, but he was moved back to the flank at half-time after Florent Malouda’s poor performance. Faith was instead shown in Fernando Torres, despite a 25-hour run without a goal. Although he has always been an extremely direct player, often dribbling or shooting instead of passing, his reputation appeared to reach a tipping point after an FA Cup game against Leicester. With Chelsea cruising to victory, Sturridge spent the last 30 minutes shooting from every angle, and ignoring better placed teammates. Although this is something that had been seen on occasion in the past, a raft of “Sturridge is selfish” articles and blog posts were published after the game. What people did not realise was that Sturridge had been wearing a “Pray 4 Muamba” shirt and had been desperate to score to pay tribute to his friend. No matter, the damage to his reputation was irreversible. If people bothered to delve a bit deeper, they would remember his superb wing-play to beat Gaël Clichy and then Patrice Evra to set up goals in crucial home games against the Manchester clubs. Off the field, Sturridge is an excellent professional who has had a good upbringing. In 2010, he made it clear in an interview that he prefers quiet evenings with his girlfriend rather than going out partying: My girlfriend is a drama student so I rehearse lines with her. We go to watch a lot of shows together. I’m not like everyone else. I only have one girlfriend, I don’t go out to clubs and go drinking. This season has practically been a write-off for him after a severe case of Meningitis meant he had no real preseason before the Olympics. He had the occasional appearance from the substitutes bench, but only one start in the Capital One Cup and one in the Premier League. After starting on the wing, and then moving up front in the league defeat at West Brom, Sturridge missed a couple of gilt-edge chances. However, his absolutely sublime movement impressed everyone, and he appeared in line to start the crucial Champions League fixture in Turin against Juventus. However, he injured his hamstring the day before the game and was ruled out for a number of weeks. This was his second serious hamstring injury of the season – hardly surprising considering his lack of preseason training. It will interesting to see where Sturridge fits in at Liverpool. Click below to read page 2. | Mid | [
0.5968819599109131,
33.5,
22.625
] |
#include <cstdint> #ifndef RecoLocalMuon_GEMRecHit_GEMCluster_h #define RecoLocalMuon_GEMRecHit_GEMCluster_h class GEMCluster { public: GEMCluster(); GEMCluster(int fs, int ls, int bx); ~GEMCluster(); int firstStrip() const; int lastStrip() const; int clusterSize() const; int bx() const; void merge(const GEMCluster& cl); bool operator<(const GEMCluster& cl) const; bool operator==(const GEMCluster& cl) const; bool isAdjacent(const GEMCluster& cl) const; private: uint16_t fstrip; uint16_t lstrip; int16_t bunchx; }; #endif | High | [
0.6747352496217851,
27.875,
13.4375
] |
The hero, of course, is George Bailey (Stewart), a man who never quite makes it out of his quiet birthplace of Bedford Falls. As a young man he dreams of shaking the dust from his shoes and traveling to far-off lands, but one thing and then another keeps him at home -- especially his responsibility to the family savings and loan association, which is the only thing standing between Bedford Falls and the greed of Mr. Potter (Lionel Barrymore), the avaricious local banker. George marries his high school sweetheart (Donna Reed, in her first starring role), settles down to raise a family, and helps half the poor folks in town buy homes where they can raise their own. Then, when George's absentminded uncle (Thomas Mitchell) misplaces some bank funds during the Christmas season, it looks as if the evil Potter will have his way after all. George loses hope and turns mean (even his face seems to darken, although it's still nice and pink in the colorized version). He despairs, and is standing on a bridge contemplating suicide when an Angel 2nd Class named Clarence (Henry Travers) saves him and shows him what life in Bedford Falls would have been like without him. Frank Capra never intended "It's a Wonderful Life" to be pigeonholed as a "Christmas picture." This was the first movie he made after returning from service in World War II, and he wanted it to be special--a celebration of the lives and dreams of America's ordinary citizens, who tried the best they could to do the right thing by themselves and their neighbors. After becoming Hollywood's poet of the common man in the 1930s with an extraordinary series of populist parables ("It Happened One Night," "Mr. Deeds Goes to Town," "Mr. Smith Goes to Washington," "You Can't Take It With You"), Capra found the idea for "It's a Wonderful Life" in a story by Philip Van Doren Stern that had been gathering dust on studio shelves. For Stewart, also recently back in civilian clothes, the movie was a chance to work again with Capra, for whom he had played Mr. Smith. The original trailer for the movie (included on the Criterion disk) played up the love angle between Stewart and Donna Reed and played down the message--but the movie was not a box office hit, and was all but forgotten before the public domain prints began to make their rounds. "It's a Wonderful Life" is not just a heart-warming "message picture." The conclusion of the film makes such an impact that some of the earlier scenes may be overlooked--such as the slapstick comedy of the high school hop, where the dance floor opens over a swimming pool, and Stewart and Reed accidentally jitterbug right into the water. (This covered pool was not a set but actually existed at Hollywood High School). There's also the drama of George rescuing his younger brother from a fall through the ice, and the scene where Donna Reed loses her bathrobe and Stewart ends up talking to the shrubbery. The telephone scene--where an angry Stewart and Reed find themselves helplessly drawn toward each other--is wonderfully romantically charged. And the darker later passages have an elemental power, as the drunken George Bailey staggers through a town he wants to hate, and then revisits it through the help of a gentle angel. Even the corniest scenes in the movie--those galaxies that wink while the heavens consult on George's fate--work because they are so disarmingly simple. A more sophisticated approach might have seemed labored. | Mid | [
0.655,
32.75,
17.25
] |
So if all Scream fans were thinking that the MTV Scream series was going to rejuvenate the film series, you are sadly mistaken. While fans have been crying out for a new Scream film, I think deep down we all knew it would never happen, and now one half of the Weinstein’s, Bob, has confirmed that there are no plans for a fifth Scream film, and that Ghostface can now live on in TV form, should the new series be a success. In an interview with WSJ, Weinstein said “there won’t be any more “Scream” movies, and that MTV is the right place for the property to find its next life. It’s like putting an art-house movie in an art-house theater—where the teens reside is MTV.” “The trick for a slasher story to sustain the long pace of a TV series”, he adds, “is by layering the whodunit mystery with more characters and subplots” I agree with that, and if anyone has seen the superb horror TV series Harper’s Island, I am sure they’ll agree that the slasher genre can work just fine as a TV series. Scream, based on what I have seen so far, does not look as great as I was hoping it would. However, its early days, and the series kicks off in a few days, so who knows, it might turn out OK? As for no Scream 5, personally I felt that Scream had its day, and ran its course, and horror has plenty of other tricks up its sleeve. Lets leave Scream, the movie series, alone as it worked fine with just the four films (which steadily got worse). Matt Wavish A keen enthusiast and collector of all horror and extreme films. I can be picky as i like quality in my horror. This doesn't necessarily mean it has to be a classic, but as long as it has something to impress me then i'm a fan. I watch films by the rule that if it doesn't bring out some kind of emotive response then it aint worth watching. | Mid | [
0.6353467561521251,
35.5,
20.375
] |
Will the five-pronged government strategy steady the Indian economy? Publish Date: September 17, 2018 Strong capital flight has hobbled the Indian economy. While outflows may not be as bad as other emerging markets, a $10 billion outflow in the first quarter of this financial year has been a sucker punch to the system. Contagion fears among foreign investors has consequently roiled the current account deficit (CAD) and the strength of the rupee. Keeping the current turmoil in mind, the Indian government on Friday sounded out a raft of measures to increase capital flow in the country. The initiatives announced to keep CAD and rupee crises in check include: 1) Mandatory hedging conditions for infrastructure loans (ECBs) will be reviewed: If the hedging clause is not mandatory, the cost of borrowings will become lower, enabling companies to raise more loans in US dollars. Taking external commercial borrowings (ECBs) will become more attractive than domestic borrowings. Unhedged borrowings can be a shot in the arm for infrastructure companies, who have recently suffered financing constraints in the domestic market. 2) Maturity of ECBs availed by manufacturing sector reduce to one year: Earlier, the maturity period was three years, which increased the borrowing costs. Now, with a shorter maturity period, manufacturing companies can take short-term loans up to $50 million at a lower rate. 3) 20% of FPI’s corporate bond portfolio to a single corporate group and 50% of any issue of corporate bonds will be reviewed: Removing the upper limit is likely to boost capital inflow. People looking for high yields may opt for NCDs, especially in real estate companies, according to a Business Standard report. 4) Exemption from withholding tax for masala bonds issued in FY2019: Masala bonds are issued by an Indian company overseas. The difference is that the bonds are denominated in India rupee instead of the overseas currency. The government’s decision to not retain any tax on returns will boost capital inflow from overseas markets. That’s because withholding even a tiny percentage of tax does lower an investor’s proceeds. It’s a win-win for both the company that’s issuing and the investor. The company can raise more money, while absence of any tax cut would improve an investor’s end returns. 5) Removal of restrictions on Indian banks’ market making in masala bonds, including underwriting: This is a shot in the arm for the banking industry. Now, banks don’t have to get in touch with foreign stock exchanges and underwriters to issue masala bonds. This may ease the process of offering rupee-denominated bonds to overseas investors. The government is also looking to reduce its non-essential goods import and boost exports. But it has yet to divulge which goods fall under the ‘non-essential’ bracket. The dispensary will seek advice from different ministries and pore over the international trade agreement before it announces the list. New Delhi, though, will have to be careful because there may be reprisals (read: hiked tariffs) from affected countries. Efficacy of the measures Media reports suggest that these measures is likely to result about $8-10 billion investment from overseas investors. We also feel that the central bank may look to adopt aggressive forex intervention and allow currency swap for oil marketing companies. These measures are likely to stabilize the rupee, at least for the short-term. But the pressure on the rupee is unlikely to alleviate until the ravaging trade wars and global crude oil prices settle down. Meeting the fiscal target, however, still appears to be an uphill task. The government reiterated its stance of meeting its fiscal deficit target of 3.3%. It remains hopeful of raising enough money through direct tax revenues and divestment programmes. But, the overall picture looks uncertain. We would have to keep an eye on pace and quality of revenue and capital expenditure, GST revenues (we are currently behind the required run rate) and progress on divestments. Any slippages would result in a burgeoning fiscal and current account deficits. The one big positive is that the government has refrained from announcing any root-and-branch overhaul. That’s because instead of making any knee-jerk decisions, it needs to focus on maintaining macro stability. The government needs to address issues such as the twin deficit challenge, inflation and consumption-savings behavior in order to improve the underlying fundamentals of the economy. No need to issue cheques by investors while subscribing to IPO. Just write the bank account number and sign in the application form to authorise your bank to make payment in case of allotment. No worries for refund as the money remains in investor's account. KYC is one time exercise while dealing in securities markets - once KYC is done through a SEBI registered intermediary (broker, DP, Mutual Fund etc.), you need not undergo the same process again when you approach another intermediary. Attention Investors Prevent Unauthorized Transactions in your demat / trading account --> Update your Mobile Number/ email Id with your stock broker / Depository Participant. Receive information of your transactions directly from Exchanges on your mobile / email at the end of day and alerts on your registered mobile for all debits and other important transactions in your demat account directly from NSDL/ CDSL on the same day." - Issued in the interest of investors. Circular No.: NSDL/POLICY/2014/0094, NSE/INSP/27436, BSE - 20140901-21 Kindly note that as per NSE circulars nos: NSE/INVG/36333 dated November 17, 2017, NSE/INVG/37765 dated May 15.2018 and BSE circular nos: 20171117-18 dated November 17, 2017, 20180515-39 dated May 15.2018, trading in securities in which unsolicited messages are being circulated is restricted. The list of such stocks are available on the website of NSE & BSE. In case of any queries, request you to kindly get in touch with Customer Service on 18002099191/9292 Kotak Securities Ltd. bearing licence no. CA0268 is a Corporate Agent of Kotak Mahindra Old Mutual Life Insurance Ltd. We have taken reasonable measures to protect security and confidentiality of the Customer Information. The Stock Exchange, Mumbai is not in any manner answerable, responsible or liable to any person or persons for any acts of omission or commission, errors, mistakes and/or violation, actual or perceived, by us or our partners, agents, associates etc., of any of the Rules, Regulations, Bye-laws of the Stock Exchange, Mumbai, SEBI Act or any other laws in force from time to time. The Stock Exchange, Mumbai is not answerable, responsible or liable for any information on this Website or for any services rendered by our employees, our servants, and us. That by submitting the above mentioned details, you are authorising Kotak Securities & its sub-brokers & agents to call you and send promotional communication even though you may be registered under DNC. | Mid | [
0.5829596412556051,
32.5,
23.25
] |
Q: Class Inheritance and Casting So I was given this code in a folder of bits and pieces that were to be for a project which has since halted development. However, being new to Java there are several questions I have (and I'm aware the code does not compile, but that works into one of my questions). interface Executable { public int execute (Object o); } public class Biv implements Executable { public int execute (String s) { System.out.println (s); return s.length(); } public static void main (String[] args) { Executable e = new Biv(); System.out.println( e.execute ("Hello World!")); } } 1) My first question is to do with the variable e. It is declared with the Executable object type, however I don't understand why it can then be instantiated with a new Biv object. What is going on here, what does it mean? 2) The error is in the execute method within the Biv class. This seems to be because it expects an object rather than a String. However, can you not replace a Object with a String because String is a subclass of Object? I could understand if you replaced String with Object it would have an error (I think) but not how it is currently done. A: I don't understand why it can then be instantiated with a new Biv object Because Biv implements Executable, so any instance of Biv is also an instance of Executable. The error is in the execute method within the Biv class Yes it is, it [Biv] does not implement execute(Object). The method execute(String) is just a different method that happen to have the same name, since they don't have the same signature. Any class that implements the interface Executable must override the method execute(Object). There is no co-variance of arguments in java for overriding methods, because it will be unsafe. What if you invoked e.execute(new Object())? [where e is referencing a Biv object] Biv will not know what to do with it. | High | [
0.669333333333333,
31.375,
15.5
] |
--- abstract: 'In this comment on [*Davidsen et al.,*]{} “Deep generative models for T cell receptor protein sequences”, [*eLife*]{} 2019;8:e46935, we compare the performance of the variational auto-encoder presented in that article to a previously proposed approach for which a software implementation, SONIA, has been recently released. We find that SONIA performs as well as the variational auto-encoder, at a lower computational cost.' author: - Giulio Isacchini - Zachary Sethna - Yuval Elhanati - Armita Nourmohammad - 'Aleksandra M. Walczak' - Thierry Mora title: 'On generative models of T-cell receptor sequences' --- [^1] [^2] Davidsen et al. [@Davidsen2018] describe an elegant approach for learning the distribution of T-cell receptor beta sequences (TCR), based on a Variational Auto-Encoder (VAE). The method makes it possible to generate new sequences with the same statistics as real repertoires, and to evaluate the frequency of individual sequences. Its main strength is that it does not take any information about the origin of these sequences through VDJ recombination and thymic and peripheral selection. Yet it manages to extract statistical regularities imprinted by these processes. An alternative approach [@Murugan2012; @Elhanati2014; @Marcou2018] has been to learn interpretable, knowledge-guided models of VDJ recombination and selection. First, a recombination model for the probability of generation of a sequence $\sigma$, denoted by $P_{\rm gen}(\sigma)$, is learned from failed nonproductive rearrangements which are free of selection biases [@Murugan2012; @Marcou2018]. This model describes in detail the probabilities of V, D, and J usages, and of deletion and insertion profiles. Second, a model of selection is learned on top of the generation probability $P_{\rm gen}$ to describe the distribution of productive sequences, $P_{\rm post}(\sigma)=Q(\sigma)P_{\rm gen}(\sigma)$, where $Q(\sigma)=(1/Z)\exp[\sum_i \theta_ix_i(\sigma)]$ is a selection factor calculated through a combination of sequence features $x_i(\sigma)$: sequence length, identity of amino acids at each position, and the choice of V and J segments [@Elhanati2014]. Davidsen et al. [@Davidsen2018] compared their VAE approach to a [reduced]{} version of this selection model (not examined in [@Elhanati2014]), which they call `OLGA.Q`. [Because no software implementation was provided with the original article]{}, only VJ choice and sequence length were included in $Q(\sigma)$, leading to mediocre performance relative to the VAE. Here, using SONIA, a new publicly available software package of selection inference, we fill this gap to offer a more complete comparison. Fig. \[fig\] repeats the analyses of Fig. 2, 3, and 4 of the commented article, but shows the results of the full selection model of [@Elhanati2014] (‘SONIA’). In constrast to `OLGA.Q`, SONIA performs at least as well as the VAE in predicting individual sequence frequencies (Fig. \[fig\]a). The VAE captures some of the rules of recombination and selection encoded by SONIA, but not as much as it did with `OLGA.Q` (Fig. \[fig\]b). In return, SONIA seems to capture most of the characteristics of the real sequences learned by the VAE (Fig. \[fig\]c). {width="\linewidth"} In summary, both approaches, VAE and SONIA, perform equally well, with perhaps a slight advantage for the latter. SONIA is an order of magnitude faster than the VAE, which uses Monte-Carlo sampling to calculate predicted frequencies. The average computing time for $P_{\rm post}^{\rm SONIA}(\sigma)$ is 14ms per sequence on a laptop computer and 3ms on a 16-core computer, versus 0.18s for the `basic` version of the VAE, and 0.87s for its refined version `count_match` (no parallelization possible). SONIA took 30 minutes on a laptop computer (using an IGoR model trained on $10^5$ sequences, which took 1 hour on a 64-core cluster node), versus 9.5 hours for VAE training. These results suggest that, while knowledge-free approaches such as the VAE perform well, there is still value in preserving the structure implied by the VDJ recombination process as a baseline for learning complex distributions of immune repertoires. Extending the SONIA model considered here beyond a simple linear combination of features offers interesting directions for future improvement in repertoire modeling. [**Code availability.**]{} All code for reproducing the figures of this comment can be found at <https://github.com/statbiophys/compare_selection_models_2019/>. The SONIA package upon which that code builds is available at <https://github.com/statbiophys/SONIA/>. [1]{} Davidsen K, [et al.]{} (2019) [Deep generative models for T cell receptor protein sequences]{}. *eLife* 8:e46935. Murugan A, Mora T, Walczak AM, Callan CG (2012) [Statistical inference of the generation probability of T-cell receptors from sequence repertoires]{}. *Proc. Natl. Acad. Sci.* 109:16161–16166. Elhanati Y, Murugan A, Callan CG, Mora T, Walczak AM (2014) [Quantifying selection in immune receptor repertoires]{}. *Proc. Natl. Acad. Sci.* 111:9875–9880. Marcou Q, Mora T, Walczak AM (2018) [High-throughput immune repertoire analysis with IGoR]{}. *Nat. Commun.* 9:561. Emerson RO, [et al.]{} (2017) [Immunosequencing identifies signatures of cytomegalovirus exposure history and HLA-mediated effects on the T cell repertoire]{}. *Nat. Genet.* 49:659–665. N, [et al.]{} (2019) [Memory CD4+ T cell receptor repertoire data mining as a tool for identifying cytomegalovirus serostatus]{}. *Genes and Immunity* 20:255–260. [^1]: [These authors contributed equally.]{} [^2]: [These authors contributed equally.]{} | Mid | [
0.539682539682539,
34,
29
] |
[Posttraumatic pleurisy during corrective operations on scoliosis patients]. Analyzed in the study are data from 153 patients with severe scoliosis who had undergone thoracic spine corrective surgery and developed posttraumatic exudative pleurisy. Transudate evacuation in pleurocentesis was consistent with a diagnosis of the above complication. | High | [
0.685131195335277,
29.375,
13.5
] |
UPDATE: The Los Angeles District Attorney's Office confirms to E! News that Farrah Abraham is being charged with one misdemeanor count of battery and one misdemeanor count of resisting an officer. If convicted, she faces a maximum of 18 months in jail. E! News has reached out to Abraham's rep for comment. A source says she plans to plead not guilty, and calls the charges "fake news." ______ Farrah Abraham is defending herself in a new statement to E! News, saying, "This was all blown out of proportion. I was a guest at the hotel and I did not touch anyone. I was targeted and that's why these men sold stories." Abraham was photographed leaving the Beverly Hills Police Department on Wednesday wearing a tropical bikini top and pants set. She also took to Instagram Live in the hours after her arrest with a message for fans. "Hey guys, I just wanted to say thank you for all the well wishes and concern," she said to the camera. "It's sort of sad sometimes when you're out and you just can't have fun and people want to attack you and get you all in that trouble. I'm blessed by God and I don't ever want to be attacked again at a hotel." ______ Farrah Abraham allegedly put up a fight that landed her with police. The Teen Mom alum allegedly got into a fight at The Beverly Hills Hotel early Wednesday morning, according to the Beverly Hills Police Department. Per the BHPD, a male hotel security officer claimed Abraham struck him in the face with her forearm, grabbed his ear and pushed him in the face as he attempted to prevent her from re-entering the hotel after he asked her to leave. Abraham was allegedly having a "verbal altercation" with hotel guests when she was asked to exit. The security guard sustained minor injuries and was not taken to a hospital. | Low | [
0.522072936660268,
34,
31.125
] |
93 Ill. App.3d 710 (1981) 417 N.E.2d 812 THE COUNTY OF COOK, Plaintiff-Appellee, v. ILLINOIS WINE & SPIRITS CO. et al., Defendants-Appellants. No. 80-928. Illinois Appellate Court First District (1st Division). Opinion filed February 23, 1981. Rehearing denied March 23, 1981. Morton Siegel and Michael Moses, both of Morton Siegel, Ltd., of Chicago, for appellants. Richard M. Daley, State's Attorney, of Chicago (Paul P. Biebel and Michael Sheridan, Assistant State's Attorneys, of counsel), for appellee. Judgment affirmed as modified. Mr. JUSTICE O'CONNOR delivered the opinion of the court: County of Cook (plaintiff) filed in the circuit court of Cook County a complaint for mandamus against defendants, Illinois Wine & Spirits Co. *711 (Illinois Wine) and James Edelstein, individually and as president of Illinois Wine, directing defendants to produce all corporate books, records and reports in their possession and control for inspection by agents of plaintiff. The complaint was brought under a Cook County Ordinance to Provide For a Tax on the Retail Sale of Alcoholic Beverages approved May 5, 1975, as amended (the Ordinance). Plaintiff also sought the imposition of a penalty against each defendant pursuant to section 5 of the Ordinance and any further relief the court deemed equitable and just. The complaint alleged: Illinois Wine is a wholesale alcoholic beverage dealer located in Plainfield, Illinois, and James Edelstein is its president. During 1976, 1977 and 1978, Illinois Wine "conducted its business within the County of Cook by selling and delivering alcoholic beverages to retail alcoholic beverage dealers located within the County of Cook." The Ordinance (section 4) provides: "The Bureau or such other agency of Cook County Government as it shall designate shall have the right to inspect all books, records, and reports of all retail and wholesale dealers as defined in this Ordinance." The Ordinance (section 8(d)) defines a wholesale alcoholic beverage dealer as "[a]ny person who engages in the business of selling or supplying alcoholic beverages to any person for resale in the County of Cook." The complaint further alleged: On May 31, 1979, an authorized agent of Cook County requested that he be given access to the books, records and reports of Illinois Wine. On or about June 1, 1979, defendant James Edelstein informed that agent that the books, records and reports of Illinois Wine would not be produced for inspection. Unless defendants are affirmatively ordered by the court to produce all books, records and reports for inspection, plaintiff will suffer irreparable harm and injury in that no determination of the amount of taxes which may be due to the County of Cook pursuant to the Ordinance can be made; and such taxes due, if any, cannot be collected. Plaintiff has a clear legal right to inspect all books, records and reports maintained and kept by defendants. Section 5 of the Ordinance provides for a fine or imprisonment for violation of the Ordinance. Defendants' actions, as described, are in violation of the Ordinance. Defendants moved under sections 45 and 48 of the Civil Practice Act (Ill. Rev. Stat. 1979, ch. 110, pars. 45, 48) to strike the complaint for failure to state with sufficient particularity a claim upon which a writ of mandamus could issue and on the ground that the complaint violates the fourteenth amendment to the United States Constitution. In support, they filed the affidavit of defendant James Edelstein. On February 26, 1980, the circuit court denied defendants' motion to dismiss and, on plaintiff's motion, struck the affidavit of Edelstein. Defendants stood on their *712 motion to dismiss. On March 28, 1980, the circuit court ordered that a writ of mandamus issue forthwith directing defendants to produce pursuant to the Ordinance all their corporate books, records and reports in their possession and control for inspection and examination by agents of the County of Cook. The court stayed its order pending appeal upon the condition that the defendants shall maintain and preserve all corporate books, records and reports, including all invoices of sales for the years 1976 and subsequent years. Defendants appeal from the issuance of the writ of mandamus and from the order denying their motion to dismiss and from the order striking defendant's affidavit in support. They contend that (1) plaintiff's complaint fails to state with sufficient particularity a claim upon which the court could base the issuance of a writ of mandamus and the possible imposition of fines and imprisonment, and (2) the issuance of the writ of mandamus violates the due process clause of the Federal and State constitutions. Defendants admit that they are not contesting the validity of the Ordinance which was sustained in Mulligan v. Dunne (1975), 61 Ill.2d 544, 338 N.E.2d 6. In that case, the court summarized the Ordinance (61 Ill.2d 544, 546-47): "Section 1 of the ordinance imposes a tax `on the retail sale in Cook County of all alcoholic beverages * * * according to the following schedule: (a) Wines containing 14% or less alcohol by volume, a tax at the rate of 12 cents per gallon or the pro rata portion thereof. (b) Wines containing more than 14% alcohol by volume, a tax at the rate of 30 cents per gallon or the pro rata portion thereof. (c) Alcohol and spirits, a tax at the rate of $1 per gallon or the pro rata portion thereof. (d) Beer, a tax at the rate of 4 cents per gallon or the pro rata portion thereof.' The ordinance states the tax is not a `tax upon the occupation of retail or wholesale alcoholic beverage dealers,' but is to be borne by the consumer and any failure by retailers to include the tax in the sale price or any effort to otherwise absorb the tax is a violation of the ordinance. The tax is to be collected and paid to the Cook County collector by wholesalers who sell alcoholic beverages to retailers doing business in Cook County. The wholesalers are to collect the tax from the retailers, who in turn collect it from the consumer by including it in the sale price. Section 2 requires wholesalers to register with the Bureau of Administration of Cook County (the Bureau) and report their monthly sales to the county collector on forms prescribed by the Bureau within 45 days of the last day of the month for which return is due, remitting the tax due with each report. Section 3 authorizes the Bureau to promulgate reasonable rules, definitions *713 and regulations in order to accomplish its duties under the ordinance and specifically provides that the `Bureau may appoint wholesale dealers of alcoholic beverages and any other person within or without the County of Cook as agents for the tax herein levied.' Section 3 also requires retailers doing business in Cook County to file with the Bureau a sworn inventory of all alcoholic beverages possessed on the effective date of the ordinance and to pay within 60 days to the county collector the tax due from the retail sale of such inventory unless the tax has already been collected and paid by a wholesaler. Section 4 allows the Bureau the right to inspect all books, records and reports of retailers and wholesalers. Section 5 prescribes penalties for violations of the ordinance and authorizes civil proceedings by the county to recover delinquent taxes. Section 6 declares that the tax is in addition to all other taxes imposed by Federal, State or local governments. Section 7 grants an exemption from the tax for sales of all alcoholic beverages to purchasers who are passengers on interstate carriers and for sales of wine `intended for use and used by any church or religious organization for sacramental purposes.' Section 9 is a severability clause, declaring that the validity of the remainder of the ordinance shall not be affected by a holding that one or more of its provisions are unconstitutional." Defendants contend that the complaint fails to state a cause of action in mandamus because (a) it does not specify the retail alcoholic beverage dealers within Cook County to whom defendants sold or delivered alcoholic beverages and (b) it does not allege that any sales were made by defendants for "resale" in Cook County. We disagree. The Civil Practice Act provides that pleadings shall be liberally construed with a view to doing substantial justice between the parties (Ill. Rev. Stat. 1979, ch. 110, par. 33(3)) and pleadings need only reasonably inform the opposite party of the nature of the claim or defense (Ill. Rev. Stat. 1979, ch. 110, par. 42(2)). 1-3 A complaint is not required to set out evidence, only ultimate facts. (Board of Education v. Kankakee Federation of Teachers Local No. 886 (1970), 46 Ill.2d 439, 446-47, 264 N.E.2d 18.) The necessary elements for the issuance of a writ of mandamus are set forth in People ex rel. Endicott v. Huddleston (1976), 34 Ill. App.3d 799, 802, 340 N.E.2d 662: "* * * A petition for a writ of mandamus must contain the following: (1) a clear right to have the requested act performed (People ex rel. Pignatelli v. Ward, 404 Ill. 240, 243); (2) every material fact necessary to demonstrate the plaintiff's clear right to the writ (Anderson v. Board of Education, 390 Ill. 412, 435); (3) a showing that the requested act is the duty of the defendant to *714 perform (Anderson); (4) a showing that the requested act is within the power and authority of the defendant (People ex rel. Canella v. City of Chicago, 7 Ill.2d 416, 418); and (5) in the case of a private (as distinguished from a public) right the plaintiff must show a demand and the defendant's refusal to act (People ex rel. Edelman v. Hunter, 350 Ill. App. 75). * * *" The allegations of the complaint fully satisfy these conditions. Section 4 gives an explicit right to inspect the books and reports of wholesale dealers. Defendants admit that Illinois Wine is a wholesaler and that Edelstein is its president, but argue that there is no right to inspect as to it unless the retail dealers in Cook County are specifically identified. An analogous situation was present in City of Chicago v. Larson (1961), 31 Ill. App.2d 450, 176 N.E.2d 675, appeal denied (1961), 22 Ill.2d 625. In that case, the city brought an action to compel the defendants to permit the city officials to inspect a building to determine if it conformed to the regulations of the Municipal Code. The court, in sustaining the complaint, said (31 Ill. App.2d 450, 453): "No motion was made to strike the complaint but the answer criticized it for lack of facts and for conclusions of law and fact. The allegations in the complaint concerning the existence of an emergency and the requirements for immediate action were indeed conclusions not predicated on pleaded facts nor on specific building code violations. The complaint was deficient in detail, however it appeared to be as complete as the nature of the case allowed. Under the circumstances the City had to proceed on information and belief; until an inspection was made it could not be expected to make positive and more detailed averments. Where the facts are of necessity within the defendant's knowledge and not within the plaintiff's knowledge, but are stated by the plaintiff to be true, a complaint is not perforce defective. 21 I.L.P. Injunctions, sec. 162." So here, too, the complaint is as complete as the nature of the case allowed. Defendants argue that instead of inspecting their records, plaintiff should get the records from the retailers in Cook County. This contention is without merit because of the great number of retailers of alcoholic beverages in Cook County. Plaintiff would not know to which of them defendants sold or delivered alcoholic beverages. Alleging that defendants sold or delivered to retailers in Cook County was as complete as the nature of the case allowed. In Larson, the court also pointed out that the building code was designed to protect the occupants of buildings and the public in general *715 and its purpose would be thwarted if inspections could be prevented because facts, not within the knowledge of the municipal body, could not be stated with specificity. So, too, here. The purpose of the Cook County ordinance is the raising of revenue with obligations for the remittance of those taxes to the county imposed successively on the wholesalers and then the retailer, with the tax to be borne by the customer and with wholesalers selling to retailers in Cook County being required to register with the Bureau. If the county could be prevented from ascertaining whether the tax had been collected in conformity with the ordinance solely because it did not know which wholesalers were required to so register because of a lack of knowledge of the specific retailers in Cook County, the purpose of the ordinance would be defeated. The specific identification of retailers in Cook County cannot be held to be a condition precedent to the county's right under section 4 to inspect the books and records of a wholesaler whether located in or outside of Cook County in order to determine whether it has complied with the ordinance. In addition, the complaint sufficiently alleged that any sales made by defendants were for "resale" in Cook County. The definition of "retail alcoholic beverage dealer" and "wholesale alcoholic beverage dealer" in sections 8(c) and (d) of the ordinance make this clear: "(c) RETAIL ALCOHOLIC BEVERAGE DEALER: Any person who engages in the business of selling alcoholic beverages in the County of Cook to a purchaser for use or consumption, and not for resale in any form. (d) WHOLESALE ALCOHOLIC BEVERAGE DEALER: Any person who engages in the business of selling or supplying alcoholic beverages to any person for resale in the County of Cook." Obviously defendant Edelstein, as president of Illinois Wine, was a proper party and was properly ordered to permit the inspection. It was alleged that it was he who had refused the inspection. The motion to strike so admitted. 4 One further matter should be considered with reference to the claim that the complaint fails to state a cause of action. Defendants' motion, filed under sections 45 and 48 of the Civil Practice Act, is a hybrid whose use has been criticized. (Denton Enterprises, Inc. v. Illinois State Toll Highway Authority (1979), 77 Ill. App.3d 495, 497, 396 N.E.2d 34.) Section 45 (Ill. Rev. Stat. 1979, ch. 110, par. 45) is directed to the legal sufficiency of the complaint on its face. It is not to be supported by affidavit. (Johnson v. Nationwide Business Forms, Inc. (1976), 41 Ill. App.3d 128, 359 N.E.2d 171.) Affidavits are permissible only with motions *716 under section 48 (Ill. Rev. Stat. 1979, ch. 110, par. 48) where any of the grounds specified in that section do not appear from the face of the pleading. Here, defendants improperly seek to use the affidavit of defendant Edelstein to show that the complaint does not state a cause of action because Illinois Wine was not selling or delivering alcoholic beverages to retailers in Cook County. The complaint alleges that it was so doing. The only purpose of the affidavit would be to contradict that allegation. That is a factual defense rather than a legal one. It is not available on a motion to dismiss under section 45. It can only be raised by answer: "* * * A motion brought pursuant to section 45 attacks the legal sufficiency of the complaint, not its factual sufficiency. (Ill. Rev. Stat. 1975, ch. 110, par. 45.) `[D]efenses which are factual in their nature rather than legal are not available to defendants on a motion to dismiss, but should be set forth in their answer.' (Cain v. American National Bank & Trust Co. (1975), 26 Ill. App.3d 574, 586, 325 N.E.2d 799, 808.) * * *." Browder v. Hanley Dawson Cadillac Co. (1978), 62 Ill. App.3d 623, 628, 379 N.E.2d 1206. Although defendants seek to interpret the affidavit of defendant Edelstein as proving that the court lacked jurisdiction of the subject matter of the complaint (Ill. Rev. Stat. 1979, ch. 110, par. 48(1)(a)) because Illinois Wine, located in the County of Will, did not sell to retailers in the County of Cook, it does not so state. It merely alleges: "2. Illinois Wine & Spirits Co. is an Illinois corporation with its sole office located at 914 Eastern Avenue, in the Village of Plainfield, County of Will, State of Illinois, and during the years 1976, 1977 and 1978 engaged in the principal business of selling alcoholic beverages to persons located in the Counties of Will, Kane, Kendall, Kankakee, Grundy, DeKalb, LaSalle, Iroquois and DuPage, State of Illinois. 3. Neither Illinois Wine & Spirits Co. nor its employees within the scope of their employment maintained telephone listings, warehouses, distribution facilities or solicited orders for the sale of alcoholic beverages to persons located in Cook County, Illinois during the years 1976, 1977 or 1978. 4. Illinois Wine & Spirits Co. has at no time owned any real or personal property located within Cook County, Illinois." Assuming these allegations to be factually correct, they do not negative sales by Illinois Wine to retailers in Cook County. The affidavit is silent as to sales to retailers in Cook County. It is insufficient to sustain a dismissal under section 48(1)(a). People ex rel. Scott v. Carriage Way West, Inc. (1980), 88 Ill. App.3d 297, 410 N.E.2d 384, appeal allowed (1/30/81, No. 54118), ___ Ill.2d ___, *717 is factually different. That was a suit under the Illinois Anti-Trust Act. The complaint alleged that there were two groups of defendants, each group charged differently, but the individual defendants in each group were not identified. The complaint was held thus to be ambiguous and properly dismissed. Defendants also contend that issuance of the writ of mandamus violates the due process clause of the Federal and State constitutions in that it gives extraterritorial effect to the taxing power of Cook County. We need not address that question because the writ is confined to the right of inspection of books and records of out-of-county wholesalers selling alcoholic beverages to in-county retailers. As stated above, sufficient facts were alleged under the circumstances to bring defendants within the terms of the ordinance as to the right of inspection. We also note that in sustaining the validity of the Ordinance, the supreme court in Mulligan v. Dunne stated (61 Ill.2d 544, 558): "But the crucial inquiry is not whether home-rule units have extraterritorial powers rather, it is whether any local unit of government is exercising its taxing power extraterritorially by collecting a tax from sellers located outside the boundaries of the local unit which do business within those boundaries. We think it is not." and then concluded: "An ordinance is presumed valid, and the burden of establishing invalidity rests upon those asserting it; that burden has not been met in this case. Perhaps factual situations may be hypothesized in which enforcement of this ordinance as to out-of-county wholesalers would raise substantial constitutional questions. Those facts are not presented here, and we may not assume that enforcement of the ordinance will be attempted under circumstances which would constitute an extraterritorial exercise of taxing power. We add only that it should be clear that no modification of the rule set forth in Van Natta [City of Carbondale v. Van Natta (1975), 61 Ill.2d 483, 338 N.E.2d 19] is intended by our decision of this issue." Similarly, in this case we "may not assume that enforcement of the ordinance will be attempted under circumstances which would constitute an extraterritorial exercise of taxing power." An attempt, if any, to collect taxes must await further litigation in which any claimed unconstitutionality can properly be considered. Although the complaint alleged that the sales took place in 1976, 1977 and 1978, the trial court granted the right of inspection without limitation as to time and the condition imposed by the court in staying its order pending appeal required defendants to maintain and preserve all their books and records for 1976 and subsequent years. This relief thus granted *718 was too broad. The inspection and preservation of books and records should be limited to the years 1976, 1977 and 1978. The trial court's writ of mandamus and order are accordingly modified. The writ of mandamus and the order of the circuit court of Cook County are modified to limit the right of inspection and preservation of defendants' books and records to the years 1976, 1977 and 1978. As modified, the writ and order are affirmed. Affirmed as modified. McGLOON and CAMPBELL, JJ., concur. | Low | [
0.5274261603375521,
31.25,
28
] |
Norway internationals John Carew(photo) and John Arne Carew both scored for their clubs on Wednesday. Riise scored the opener when Roma beat Parma 2-0. Carew equalized for Villa in their 1-1 draw against Sunderland. | Low | [
0.5274261603375521,
31.25,
28
] |
Q: Making a ball/circle move in cocoa using nsbezierpath(objective -c))? I am trying to Create a point on an image when the application runs and then try to move the point slowly to a different location. here is my code.This code works but there are two problems. First, The processing has already happened before the window loads so I see only the finished result.(I want to show one point moving to another point in the image) Second,The previous point is not removed when I create a new point.So it doesn't look like the point is moving rather it looks like it is being duplicated.How do I remove a point. - (void)applicationDidFinishLaunching:(NSNotification *)aNotification { // Insert code here to initialize your application NSGraphicsContext* gc = [NSGraphicsContext currentContext]; // Save the current graphics context settings [gc saveGraphicsState]; // Set the color in the current graphics context for future draw operations [[NSColor blackColor] setStroke]; [[NSColor redColor] setFill]; for(int i=1;i<100;i++){ NSRect rect = NSMakeRect(130+i, 130, 10, 10); NSBezierPath* circlePath = [NSBezierPath bezierPath]; [circlePath appendBezierPathWithOvalInRect: rect]; // Outline and fill the path [circlePath stroke]; [circlePath fill]; // // Restore the context to what it was before we messed with it // [gc restoreGraphicsState]; } } A: EDIT: Here's a working implementation: @interface AppDelegate () @property ( nonatomic, readonly ) CALayer * ballLayer ; @end @implementation AppDelegate @synthesize ballLayer = _ballLayer ; - (void)applicationDidFinishLaunching:(NSNotification *)aNotification { [ ((NSView*)self.window.contentView) setWantsLayer:YES ] ; [ self performSelectorOnMainThread:@selector( doAnimation ) withObject:nil waitUntilDone:NO ] ; } -(void)doAnimation { [ self.ballLayer addAnimation:[ self createBallLayerAnimation ] forKey:nil ] ; } -(CALayer*)ballLayer { if ( !_ballLayer ) { CALayer * layer = [ CALayer layer ] ; NSImage * image = [[ NSImage alloc ] initWithContentsOfURL:[ NSURL URLWithString:@"http://etc-mysitemyway.s3.amazonaws.com/icons/legacy-previews/icons/glossy-black-icons-sports-hobbies/044450-glossy-black-icon-sports-hobbies-ball-beach.png" ] ] ; layer.contents = image ; layer.bounds = (CGRect){ .size = { 100, 100 } } ; [((NSView*)self.window.contentView).layer addSublayer:layer ] ; _ballLayer = layer ; } return _ballLayer ; } -(CAAnimation*)createBallLayerAnimation { CAKeyframeAnimation * anim = [ CAKeyframeAnimation animationWithKeyPath:@"position" ] ; { CGPathRef p = [ self createBallAnimationPath ] ; anim.path = p ; CGPathRelease( p ) ; } anim.duration = 3.0 ; anim.repeatCount = FLT_MAX ; return anim ; } -(CGPathRef)createBallAnimationPath { CGRect bounds = ((NSView*)self.window.contentView).bounds ; CGPathRef p = CGPathCreateWithEllipseInRect( CGRectInset( bounds, bounds.size.width * 0.25, bounds.size.width * 0.25 ), NULL ) ; return p ; } @end You'll want to read up on CGPath and CALayer... As others have said, don't do this in your applicationDidFinishLaunching method--you should do it after your window/view appears. If you have your own NSView subclass loaded from a nib, one option might be to override -awakeFromNib: -(void)awakeFromNib { [ super awakeFromNib ] ; [ self performSelectorOnMainThread:@selector( doAnimation ) withObject:nil waitUntilDone:NO ] ; // when the main thread runs again, call `-doAnimation` } Then in your view subclass also have a -doAnimation method (called from -awakeFromNib, above) -(void)doAnimation: { CAAnimation * animation = [ CAKeyframeAnimation animationForKeyPath:@"position" ] ; CGPathRef path = [ self createBallAnimationPath ] ; // method -createBallAnimationPath is defined below... animation.path = path ; CGPathRelease( path ) ; [ self.ballLayer addAnimation:animation forKey:nil ] ; // ballLayer is the property that contains a reference to layer that contains the image you want to animate along the path } Have a method to create your path: -(CGPathRef)createBallAnimationPath { CGMutablePathRef result = CGPathCreateMutable() ; CGPathMoveToPoint( result, 100, 100 ) ; CGPathAddLineToPoint( result, 1000, 1000 ) ; return result ; } | Low | [
0.47951807228915605,
24.875,
27
] |
Moulin, a new bistro in the shadow of John Wayne Airport, is filling up fast with folks chattering in French. Open since September, Moulin is the passion project of Paris native Laurent Vrignaud ... he’s living his longtime dream of owning an authentic bistro, serving the classics, selling oven-fresh baguettes, and peddling wines and other French pantry items. Event Calendars O.C. abounds with restaurants eager to pamper couples looking for a special night out. Katherine Nguyen offers seven suggestions for date-night destinations, from casual Kettlebar to sumptuous Studio at the Montage. More Life in O.C. Just across the freeway from downtown San Juan Capistrano, Marbella Plaza offers top-notch restaurants and an upscale boutique, each with a distinct style and vibe, away from the hustle and bustle of the historic district. More O.C. Guides We surveyed more than 100 dining insiders in Orange County to come up with this list. Where do our favorite O.C. chefs go on date night? What's the dive bar of choice for the county's star bartenders? Where do the hot chefs hang out after hours? Read on. Login / Register The Doctor is In: New Developments in Wine & Health As a retired physician and wine enthusiast, I follow all the peer-reviewed scientific literature on wine and health. Here are summaries of recently published studies. Red Wine May Be Healthy For Your Teeth: Journal of Agricultural and Food Chemistry Research from universities in Madrid, Spain, and Zurich, Switzerland, indicates that the antimicrobial properties of red wine may prevent periodontal disease and dental cavities that can result in tooth loss. The scientists exposed a biofilm model of human dental plaque containing bacteria to red wine, de-alcoholized red wine, red wine with grape seed extract, water, and an ethanol solution. Red wine with added grape-seed extract was the best antibacterial agent. And red wine, either de-alcoholized or not, was only slightly less effective. This study suggests that moderate red wine consumption could prevent dental cavities, and a grape seed extract could be incorporated in the formulation of oral care products to prevent caries. Wine May Reduce the Risk of Cardiovascular Disease in Diabetics: Diabetes Care Scientists at the University of Turku in Finland studied the effects of alcohol use on cardiovascular health in type 2 (adult onset) diabetics. They found that patients who reported moderate alcohol consumption, compared with abstainers, had a lower incidence of cardiovascular death, myocardial infarction (heart attack), stroke, less kidney and retina microvascular disease, and lower all-cause mortality. The most benefits were observed in those who drank wine. Those who reported heavy alcohol consumption had an increased risk of cardiovascular disease and all-cause mortality. Resveratrol Supplements Improve Short-term Memory: Journal of Neuroscience Researchers from Charité University in Berlin studied the effects of resveratrol on overweight people. Resveratrol is a polyphenol compound found in red wine that has been studied extensively for its potential health benefits. The study found that those who took resveratrol supplements had better short-term recall. This is the first study to show a connection between the red wine compound and cognition in overweight adults. The study participants who took resveratrol also showed reduced levels of a blood sugar marker indicating there might be a link between sugar metabolism and brain memory. Wine May Keep Bugs Away: Presented at National Conference on Urban Entomology in Atlanta, Georgia The researcher at University of Nebraska-Lincoln exposed adult bed bugs, which survive on human blood, to samples of 200-proof ethanol mixed into expired blood and a control sample containing no alcohol from the Nebraska Blood Bank. He found that bed bugs preferred alcohol-free blood to blood with alcohol in it. Since there is a link between blood intake and reproduction rates, bugs exposed to alcohol-containing blood laid fewer eggs. The implications for pest control are not clear, since even the bed bugs fed the alcohol-laced blood laid enough eggs to cause an infestation. Further studies are planned. Binge Drinking More Dangerous than Previously Thought: PLOS ONE Scientists at the University of Massachusetts Medical School found that a single episode of binge drinking in healthy individuals can lead to a rapid increase in blood endotoxins (toxins contained within the cell wall of bacteria that are released when the cell is damaged), which in turn can cause the body to produce immune cells involved in inflammation and tissue destruction, particularly in the liver. The finding of bacterial DNA markers in the blood indicated that bacteria had left the gut and entered the bloodstream. Binge drinking is defined as consuming five or more drinks for men, or four or more drinks for women, in about two hours, and is dependent on body weight. Women had higher blood alcohol levels and circulating endotoxin levels compared to men. The lesson here is that binge drinking is never a good idea and can lead to lasting liver damage. For more reading about the relationship between wine, alcohol, and health, I suggest you read “The Good News About Booze,” by Tony Edwards, published in 2013. | Mid | [
0.6092233009708731,
31.375,
20.125
] |
My Self Anup Kumar Mridha . My Family Means Only My Mother and My Sister . Our Own Village Ambaguda But We are Now Leav in Kotpad Town Because My Mother is Working Agriclture Oversar Officer and My Youngest Sister Working in Postal Assitance . I have Own Shop and Working Csc Center . Govt Work | Mid | [
0.6114942528735631,
33.25,
21.125
] |
This slide shows ground scarring at a multiple rocket-launch site on the Russian side of the border oriented in the direction of Ukrainian military units within Ukraine. July 25-26, 2014 This slide shows ground scarring at a multiple rocket-launch site on the Russian side of the border oriented in the direction of Ukrainian military units within Ukraine. Office of the Director of National Intelligence Images from the Office of the Director of National Intelligence suggest evidence that Russian forces have fired across the border at Ukrainian military forces. State Department images suggest evidence that Russian forces have fired across the border at Ukrainian military forces. State Department images suggest evidence that Russian forces have fired across the border at Ukrainian military forces. The Obama administration on Sunday released overhead surveillance images it said were evidence that Russia has fired artillery rounds from its side of the border against Ukrainian military units. The grainy photographs, taken between Wednesday and Saturday, are labeled as indicating fire from multiple rocket launchers inside Russia and targets they have struck inside Ukraine. The release came as Secretary of State John F. Kerry and Russian Foreign Minister Sergei Lavrov agreed in a telephone call Sunday that “despite disagreements fighting must be stopped” and talks initiated between the warring parties in Ukraine, according to a Russian government statement reported in Moscow by the Interfax news agency. The State Department said the five-minute call included discussions of both Ukraine and Gaza. As the ground war between Russia-backed separatist forces in eastern Ukraine and government troops has escalated this past week, charges and countercharges between Russia and the West have reached fever pitch. A Russian Defense Ministry spokesman, Maj. Gen. Igor Konashenkov, charged Sunday that the United States is getting most of its intelligence data on the Russian military from social media and suggested it turn to more “trustworthy” information, the ITAR-TASS news agency reported. Konashenkov denied recent U.S. statements that Russia, after first decreasing the number of troops it has deployed along the Ukrainian border, has now increased them to at least 15,000. Regular international inspections under the international Open Skies Treaty, he said, “have not registered any violations or undeclared military activity on the part of Russia in the areas adjacent to the Ukrainian border.” Under the treaty, member governments regularly conduct overflights, after providing advance notice, of neighboring countries. Although such flights were common in the early days of the Ukrainian conflict, it is unclear whether any have been conducted recently. The U.S. photographs, disseminated by the State Department as “evidence of Russia firing into Ukraine,” were declassified by the U.S. Office of the Director of National Intelligence and presumably taken by U.S. surveillance assets flying overhead. Konashenkov said that similar inspections of “Ukrainian armed forces’ active combat actions in the areas adjacent to the Russian border” would “register high concentration of Ukrainian troops, armaments and military equipment that regularly shell Russian settlements and have already killed and injured our citizens there.” The Pentagon and State Department first accused Russian artillery of firing directly into Ukraine on Thursday. The charges were repeated Friday, although no evidence was offered. The high-altitude images released Sunday “provide evidence that Russian forces have fired across the border at Ukrainian military forces, and that Russia-backed separatists have used heavy artillery, provided by Russia, in attacks on Ukrainian forces from inside Ukraine,” according to labels on the pictures by the Office of the Director of National Intelligence. The most recent photograph, taken Saturday, shows what is described as “blast marks” from rocket launcher fire on the Russian side of the border, and “impact craters” inside Ukraine. A photograph labeled as taken Wednesday shows a row of vehicles described as “self-propelled artillery only found in Russian military units, on the Russian side of the border, oriented in the direction of a Ukrainian military unit within Ukraine.” On the other side of the border, “the pattern of crater impacts near the Ukrainian military unit indicates strikes from artillery fired from self-propelled or towed artillery, vice multiple rocket launchers,” it said. 1 of 35 Full Screen Autoplay Close July 28, 2014 July 27, 2014 July 26, 2014 July 25, 2014 July 21, 2014 Skip Ad × Clashes break out in eastern Ukraine city View Photos Fighting between pro-Russian separatists and government forces in the rebel stronghold of Donetsk leaves five dead. Caption Kiev government officials are optimistic after Ukraine’s military ousts pro-Russian forces near the separatist bastion. A person looks at damage in Donetsk. Bulent Kilic/AFP/Getty Images Buy Photo Wait 1 second to continue. The Obama administration has said that direct Russian participation in Ukraine, along with its failure to use its influence on the separatists to allow international inspectors to reach the site of the July 17 Malaysian airliner crash inside separatist territory, should lead to increased sanctions against Russia. In a statement following President Obama’s call to Netherlands Prime Minister Mark Rutte on Thursday, the White House said the two “agreed that Russia must not be permitted to destabilize the situation in Ukraine without incurring costs and that, accordingly, the international community will need to enact additional sanctions.” The administration has said it is considering its own additional measures against Russia, while European officials are scheduled to meet this week in Brussels to discuss activating new sanctions against key Russian economic sectors. Deputy national security adviser Ben Rhodes said Sunday that the United States and Europe are likely to develop stronger sanctions this week against Russia. “We still think that the best thing the United States can do is send a message to Russia through very strong sanctions coordinated with the Europeans, and I’d expect in the coming days you will see the Europeans move out on stronger sanctions,” Rhodes said on CNN’s “State of the Union.” Rhodes also said European leaders were open to sanctions against Russia’s energy, arms and financial sectors during talks with Obama in the past week. Josh Hicks contributed to this report. | Mid | [
0.601522842639593,
29.625,
19.625
] |
Hi! I'm a registered nurse so I was gonna ask a couple more questions. You said you had blood work done but exactly what kind of blood work. There are many things that physiologically can cause hair thinning such as anemia, thyroid disease, autoimmune diseases, androgenetic alopecia, polycystic ovary syndrome, and skin conditions. I would recommend seeing a dermatologist about this, maybe one who specializes in hair and scalp conditions. Since you mention the hair loss is along your hairline, there is such a thing as traction alopecia caused from placing too much tension on your hairline with ponytails, braiding, etc. I think as long as you are using a color rinse on your hair that doesn't contain peroxide or ammonia you should be fine. I only use semi-permanent color on my hair by Loreal Healthy Look or Clairol Natural Instincts. This color won't lighten hair at all but just coats the hair shaft and rinses out over a number of washes. You should also be doing weekly deep conditioning. There are several out there that are great and don't have to be expensive either. Keep in mind that the Curly Girl method doesn't work for everyone. It didn't work for me and my hair at all. My hair does fine whether I use sulfate shampoo or not. | Mid | [
0.578260869565217,
33.25,
24.25
] |
Interrelations between carbohydrates, lipids, and the hemostatic system in relation to the risk of thrombotic and cardiovascular disease. Metabolic diseases, such as obesity, impaired glucose tolerance, type I and type II diabetes, hypercholesterolemia, and hypertriglyceridemia, are among the main risk factors for the development of atherothrombosis. Various abnormalities of the hemostatic system (platelet hyperaggregability, hypercoagulability, and hypofibrinolysis) have been described in all these situations. The individual effect of each of these disease on the hemostatic system is difficult to evaluate because these states are often associated in the same patient and the treatment of one can benefit the others. Therefore it may be queried if a common abnormality of these pathologic states might explain their impact on the cardiovascular system. We have been interested by hyperinsulinemia, which is observed in obesity, impaired glucose tolerance, type II diabetes, and hypertriglyceridemia, and we have shown a very strong correlation between plasma insulin, body mass index, triglyceride levels, and one of the main inhibitors of the fibrinolytic system, plasminogen activator inhibitor-1. Partial correlation analysis showed that only the correlation between insulin and plasminogen activator inhibitor-1 was independent. Therefore a high plasma insulin level could be responsible for elevated levels of plasminogen activator inhibitor-1, which by inducing an hypofibrinolysis, could play a role in the deposition of fibrin and the development of atherothrombosis. The description of some interrelations between metabolic diseases and hemostasis is satisfactory but does not exclude specific effects of these diseases on hemostasis, such as glycation of the coagulation and fibrinolytic factors in diabetes or toxic action of lipoprotein on endothelial cells in hyperlipoproteinemia. | High | [
0.699481865284974,
33.75,
14.5
] |
Sort -17/2, 1, 4/3, 5, -2/51 in increasing order. -17/2, -2/51, 1, 4/3, 5 Sort 2/5, 3, -3/4, -0.1, -195 in increasing order. -195, -3/4, -0.1, 2/5, 3 Sort -16, 67, 5, -5, 8 in decreasing order. 67, 8, 5, -5, -16 Put -12, -7, -1, 1, 6 in decreasing order. 6, 1, -1, -7, -12 Put 8, -2667, -23 in descending order. 8, -23, -2667 Sort -0.3, 2/5, 4, 5, 5/314. -0.3, 5/314, 2/5, 4, 5 Put 5, 217, 304 in descending order. 304, 217, 5 Sort -9.2, -0.1, 1 in increasing order. -9.2, -0.1, 1 Sort 3/10, 5, -37, 0.4 in descending order. 5, 0.4, 3/10, -37 Put -129, -144, 4 in ascending order. -144, -129, 4 Sort 4, -4, 14, -19. -19, -4, 4, 14 Sort -26, 81, -3, 2, 4 in decreasing order. 81, 4, 2, -3, -26 Sort 2/3, -93, -1, -15. -93, -15, -1, 2/3 Sort -105/8, 1, 49/6, 2/7. -105/8, 2/7, 1, 49/6 Sort 5, 39, -144 in decreasing order. 39, 5, -144 Sort 2, 0, 0.6, -3, 3, -235. -235, -3, 0, 0.6, 2, 3 Put -2, 12, 2, -114, 4 in increasing order. -114, -2, 2, 4, 12 Sort 3, -4, 1256 in increasing order. -4, 3, 1256 Sort -1, 213, -45. -45, -1, 213 Sort -6, 5, 0, -2632, 2. -2632, -6, 0, 2, 5 Sort -3, -4759353, 3. -4759353, -3, 3 Sort 5, 0, 4, -69, -2, -4. -69, -4, -2, 0, 4, 5 Sort 44.69, 23, 3/5 in decreasing order. 44.69, 23, 3/5 Sort -18435, -2, -1, 3. -18435, -2, -1, 3 Put 4, -104, -37, 5 in descending order. 5, 4, -37, -104 Sort 0, -3, 2.1, 1.2, -0.1 in descending order. 2.1, 1.2, 0, -0.1, -3 Sort 0.046, 2/3, 1/3, 102 in descending order. 102, 2/3, 1/3, 0.046 Put 0.3, 5, -402, -1, -8 in descending order. 5, 0.3, -1, -8, -402 Put -5, -55, -32, 55, -1 in increasing order. -55, -32, -5, -1, 55 Put 183, 3, -5, 4, -12 in decreasing order. 183, 4, 3, -5, -12 Put 2/11, 5, 67524 in decreasing order. 67524, 5, 2/11 Sort -2, 56, -473, -4 in increasing order. -473, -4, -2, 56 Put -94, -0.4, 2.2, -4 in descending order. 2.2, -0.4, -4, -94 Sort 247, 2, 3, 5, -75 in decreasing order. 247, 5, 3, 2, -75 Put 0.04114, 19, 1 in decreasing order. 19, 1, 0.04114 Sort 0, 3, -1079893. -1079893, 0, 3 Sort -2, 0, 1811, -1 in descending order. 1811, 0, -1, -2 Put -23, -29, -0.03, 3/8, 5, -0.2 in increasing order. -29, -23, -0.2, -0.03, 3/8, 5 Sort 1.0137, -2/7, 0.3, -16, -1 in decreasing order. 1.0137, 0.3, -2/7, -1, -16 Sort -4/3, 3/2, -5408, -2. -5408, -2, -4/3, 3/2 Put -9, -5, -3, 6611, 0 in descending order. 6611, 0, -3, -5, -9 Sort -6, 2, -1, -5, 17, -4 in decreasing order. 17, 2, -1, -4, -5, -6 Sort 0.3, 4, 2, 120, -0.4, 1426 in increasing order. -0.4, 0.3, 2, 4, 120, 1426 Sort 1, -203, 3, 7, 0, 14 in descending order. 14, 7, 3, 1, 0, -203 Sort 4, 35623, 24, -5 in decreasing order. 35623, 24, 4, -5 Put 39, 5, -1062 in descending order. 39, 5, -1062 Sort -1958, -2, 166. -1958, -2, 166 Sort -2779/3, -5, 4/5. -2779/3, -5, 4/5 Sort 5/4, 4/7, 95.8, -1/5 in decreasing order. 95.8, 5/4, 4/7, -1/5 Sort 4, 1, 7, -4, -19, -2 in increasing order. -19, -4, -2, 1, 4, 7 Sort 5, 0, -21, 14, -2, -10 in descending order. 14, 5, 0, -2, -10, -21 Sort 1.3, 46, -1/9, 0. -1/9, 0, 1.3, 46 Sort -0.2, 7462, -0.1 in decreasing order. 7462, -0.1, -0.2 Put -1/117, 0.36, -0.2, 4 in descending order. 4, 0.36, -1/117, -0.2 Sort 11054, 3, -352 in descending order. 11054, 3, -352 Sort -2, -3, -25, -1229, 0. -1229, -25, -3, -2, 0 Put 1, -239212, 2 in decreasing order. 2, 1, -239212 Sort 8, -3, 0.3, -4, -2/19, -17 in decreasing order. 8, 0.3, -2/19, -3, -4, -17 Sort -1, 1235, -10/11 in ascending order. -1, -10/11, 1235 Sort -5, -2, -3, -12, -1, -23 in increasing order. -23, -12, -5, -3, -2, -1 Put 5, 23718, -2 in decreasing order. 23718, 5, -2 Sort -44, -5, 4168 in decreasing order. 4168, -5, -44 Sort 5, -11, 51. -11, 5, 51 Put 384, 0, 405 in ascending order. 0, 384, 405 Sort 4, -2, -5, 4027 in descending order. 4027, 4, -2, -5 Put 2, -4, 3, 8, -3, -28 in increasing order. -28, -4, -3, 2, 3, 8 Sort 8, -4, -4357 in decreasing order. 8, -4, -4357 Sort 260, 1, 6, -4 in ascending order. -4, 1, 6, 260 Sort -46.6, 5, -11 in decreasing order. 5, -11, -46.6 Sort -221, -1/4, 2/7, 1.9. -221, -1/4, 2/7, 1.9 Put 1, -287, -56, 0, -1 in increasing order. -287, -56, -1, 0, 1 Put -4, 4, 1.48, 57, -3/8 in descending order. 57, 4, 1.48, -3/8, -4 Sort 0, -1167, 3, -2. -1167, -2, 0, 3 Sort 99094, 0, -5. -5, 0, 99094 Sort 3823, -2, 5, 1 in decreasing order. 3823, 5, 1, -2 Put -5, 79, 152 in decreasing order. 152, 79, -5 Sort -2, -4, -3/8, 0.5, 22, 0.0955 in ascending order. -4, -2, -3/8, 0.0955, 0.5, 22 Put 4, 0, -5, 5, -13, -132 in decreasing order. 5, 4, 0, -5, -13, -132 Sort -1, 143, 49 in decreasing order. 143, 49, -1 Sort -1, -2, -0.4273, -0.2, -4, 5. -4, -2, -1, -0.4273, -0.2, 5 Put 142, 35, 4 in ascending order. 4, 35, 142 Sort 13, -727, 5, -14 in ascending order. -727, -14, 5, 13 Sort -2, -111, 2/13, -172 in increasing order. -172, -111, -2, 2/13 Sort 6, 2/7, -58, -0.5, -5, -19 in decreasing order. 6, 2/7, -0.5, -5, -19, -58 Sort 5, 7.105, 179 in ascending order. 5, 7.105, 179 Put 2, 5, 0, 3, 263, -2 in descending order. 263, 5, 3, 2, 0, -2 Sort -5, 4, 7, -111, 3, 54 in ascending order. -111, -5, 3, 4, 7, 54 Sort -1/2, -3, -0.01, 0.31, -4, -9 in ascending order. -9, -4, -3, -1/2, -0.01, 0.31 Sort -3, -4.8, 1, -2/11 in increasing order. -4.8, -3, -2/11, 1 Put -1, 76, -46, -163 in decreasing order. 76, -1, -46, -163 Put 3, 4, 513, -3, -4 in descending order. 513, 4, 3, -3, -4 Put 1, -17, 13, 4, 17 in ascending order. -17, 1, 4, 13, 17 Sort 0.3, 2/5583, 6 in decreasing order. 6, 0.3, 2/5583 Put 6, -11, -177, -5, 5 in ascending order. -177, -11, -5, 5, 6 Sort -158, -9.5, -2, 0 in descending order. 0, -2, -9.5, -158 Sort 5, 4, -2, 2/5, 0.3, -4 in ascending order. -4, -2, 0.3, 2/5, 4, 5 Sort -2/7, 43.9, -0.11 in ascending order. -2/7, -0.11, 43.9 Sort 18/7, -0.2, -2/13, -0.3, -0.5 in descending order. 18/7, -2/13, -0.2, -0.3, -0.5 Sort -2, -2/7, 0.1, -5, -2454, 1/8 in increasing order. -2454, -5, -2, -2/7, 0.1, 1/8 Put 18, -287, 2, 4, -4, 12 in ascending order. -287, -4, 2, 4, 12, 18 Sort -0.3, 18, 42, 2/7 in decreasing order. 42, 18, 2/7, -0.3 Sort 0.19, 0.03, -3, 2/15, 0.17 in descending order. 0.19, 0.17, 2/15, 0.03, -3 Sort -3, 0, 14825. -3, 0, 14825 Sort -1, 57, -17, 1 in decreasing order. 57, 1, -1, -17 Sort -4.2, 30, -0.046 in descending order. 30, -0.046, -4.2 Sort -152, -5, -4, -15, 6, 1 in ascending order. -152, -15, -5, -4, 1, 6 Sort -3, 1, 4, 0, 1/6, 155/2 in descending order. 155/2, 4, 1, 1/6, 0, -3 Sort 3384, -1, 1, -2, 5, 3 in ascending order. -2, -1, 1, 3, 5, 3384 Put -0.6, 1/4, 0.084, 5/6, 0.5 in descending order. 5/6, 0.5, 1/4, 0.084, -0.6 Sort 212, 26, -5, 0, 2. -5, 0, 2, 26, 212 Sort 4, 30, 0, 1, -147. -147, 0, 1, 4, 30 Sort -8, 3, 0, -2, -445 in ascending order. -445, -8, -2, 0, 3 Put -0.3, -2/97, 12, 1/5, -4 in descending order. 12, 1/5, -2/97, -0.3, -4 Sort 39, 4, -1985 in decreasing order. 39, 4, -1985 Put 8/43, -5, -1, -3, -0.3, 0 in descending order. 8/43, 0, -0.3, -1, -3, -5 Sort 0, -4, 3098, -1/4, -9. -9, -4, -1/4, 0, 3098 Put 1, -0.4864, -0.1, 0, -1 in decreasing order. 1, 0, -0.1, -0.4864, -1 Put -0.17, -2/3, -2/15, 8 in ascending order. -2/3, -0.17, -2/15, 8 Sort -369, -5, -4, -2, 7, -3 in increasing order. -369, -5, -4, -3, -2, 7 Sort -8/5, -0.2, 13, 0.3, 3/4, -4 in descending order. 13, 3/4, 0.3, -0.2, -8/5, -4 Sort -231, 8126, 2 in descending order. 8126, 2, -231 Put 4, -3017, 1 in decreasing order. 4, 1, -3017 Sort -2, 7, -7, 20 in ascending order. -7, -2, 7, 20 Sort 1, -5, 11, -328 in descending order. 11, 1, -5, -328 Sort 1, -194, -4. -194, -4, 1 Sort -5, 33, -3/5, -39 in increasing order. -39, -5, -3/5, 33 Sort 0, -35, -5, -1, -24 in descending order. 0, -1, -5, -24, -35 Sort 82896, 5, -5, 3. -5, 3, 5, 82896 Sort -28, 4, -1, -1349, -4. -1349, -28, -4, -1, 4 Sort 5, -68, -9/23, 2, -0.5 in decreasing order. 5, 2, -9/23, -0.5, -68 Sort 0, -24, -1, -6, -2, 8 in ascending order. -24, -6, -2, -1, 0, 8 Put 2/5, -3/13, -13 in ascending order. -13, -3/13, 2/5 Put -3, 74, 2, 0, 3 in decreasing order. 74, 3, 2, 0, -3 Sort -4, 3, -9953. -9953, -4, 3 Put -1, 5, 9, -146, 31, 3 in descending order. 31, 9, 5, 3, -1, -146 Put -0.3, -1/6, 0.38, -7.6, 5 in ascending order. -7.6, -0.3, -1/6, 0.38, 5 Put 9.02, -0.4, 3, -0.3 in ascending order. -0.4, -0.3, 3, 9.02 Put 4, 5, 872, -27 in decreasing order. 872, 5, 4, -27 Sort 1 | Mid | [
0.5418502202643171,
30.75,
26
] |
Q: How to Create a Newsfeed (Rails)? I have users who follow projects. Projects have blog posts. My goal is to aggregate blog posts on the projects that a user follows and list it by most recent. Right now, I am only able to list all the blog posts of one project before listing the blog posts of the next project, and so on. Is there a simple way to fix it so that it lists all the blog posts by all projects by most recent? user.rb has_many :projects scope :newest, order("created_at desc") project.rb has_many :blogposts, :dependent => :destroy blogpost.rb belongs_to :project belongs_to :user scope :newest, order("created_at desc") users_controller.rb def show @user = User.find_by_permalink(params[:permalink]) @projectsfollowed = @user.followed_projects.newest.page(params[:projectsfollowed_page]).per_page(10) end show.html.erb <% @projectsfollowed.each do |project| %> <% project.blogposts.newest.each do |blogpost| %> <%= render blogpost %> <% end %> <% end %> UPDATE I have been trying to use an Array in my controller but I cannot get it to list out by most recent, along with pagination. Please see below: blogids = Array.new @projectsfollowed.each do |project| project.blogposts.each do |blogpost| blogids.push(blogpost[:blogpost.id]) end end @blog_posts = Blogpost.find(blogids) updated show.html.erb <% @blog_posts.each do |blogpost| %> <%= render blogpost %> <% end %> A: @blog_posts BlogPost.where(:project_id => @user.followed_projects.map {|p| p.id}) @blog_posts = @blog_posts.order("created_at desc") | Mid | [
0.5425531914893611,
25.5,
21.5
] |
Filling your belly shouldn't empty your wallet. Tag Archives: satsuma oranges One a day: enjoying seasonal fruit like Meyer lemons and satsuma oranges is a resolution that's easy to keep. We all do it: After an indulgent holiday season, we crawl into the new year with promises to do it better this time. Lose a few pounds, hit the gym regularly, revamp our diet. We set resolutions with all the hopefulness of the newborn year, but we’re barely into the first week of 2009, and I know some friends’ resolve is already wavering. I’m a big believer in small, positive changes. It’s easier to embrace an enjoyable behavior than it is to break a bad habit. So in that spirit, I’ve asked friends and colleagues to share their food-related resolutions for 2009. I’ll focus on one a day for the next week or so, with tips to help them stick. The first one up is courtesy of Cooking Light contributing editor and NourishNetwork.com founder Lia Huber: Eat one piece of seasonal fruit a day. “I’m not much of a fruit person, so I tend to just skip over them,” she confesses. “But when I do finally bite into an apple or peel an orange, it makes me feel so grounded and good and vibrant.” I’m in the same boat; fruit isn’t the first thing I reach for when I’m hungry, and I have to make a point of eating the stuff. Which is odd, because I have an impressive sweet tooth that fruit can satisfy. Lia’s resolution to focus on seasonal fruit is a smart way to expand your palate and enjoy a terrific variety throughout the year. This time of year, I love citrus fruit, and especially satusma oranges. Once you start focusing a bit of attention on seasonal fruit, you’ll realize that there are many ways to incorporate it in your diet Here are three simple strategies: Expand your fruit vocabulary. If you see something that looks interesting at the farmer’s market, or even the supermarket, pick it up. You can always ask the farmer or store produce manager for ideas on how to enjoy unfamiliar fruits. Or check out the produce distributor Melissa’s Web site. It has a helpful tool that allows you to search for fruit and other produce by season, with tips to buy, store, and cook with it. Incorporate fruit into recipes. Of course, you can always enjoy a piece of fruit out of hand as a snack, but fruit can play many roles in sweet and savory recipes. This time of year, sectioned citrus pairs wonderfully with salad greens. You can use different fruits in salsa (depending on the season, try pineapple, mango, or peach), or in a smooth sauce (try tart cherries in summer) to pair with roasted meat or chicken. Fruit-based desserts can satisfy a sweet tooth and boost your nutritional profile; the Culinary Institute of America has some great tips for putting fruit front and center in desserts. Melissa’s site has plenty of recipes, too, from big-name chefs, as well as from Melissa’s test kitchen. (I want to try their Meyer Lemon Custard to use up some sweet lil’ Meyers I picked up the other day.) Discover the range of flavors and textures. Many of us associate fruit with sweet flavors, but that isn’t always the case. Consider the avocado. It’s a fruit that boasts creamy texture and mellow vegetal flavor. And I’m always happy to eat one. | Mid | [
0.5966386554621841,
35.5,
24
] |
"Bible?" "Paris!" "Help me!" "Help me!" "Please!" "Hey you!" "I'll kill you, stop!" "thief!" "Miss!" "Miss..." "Miss..." "Miss!" "The bets have been placed!" "Paris." "Twelve thousand..." "She's very beautiful... and you don't have a blonde." "Three hundred." "Three hundred... and fifty with the shoe." "That's a bonus!" "Get out!" "Get Out!" "Ask her... what she's doing in Yuck Yen!" "She's not talking!" "Idiot!" "How can she?" "Tell us about yourself, Miss..." "If you need help..." "I'll be glad to help." "Answer!" "Idiot!" "Escaped from where?" "From a convent to find her father." "What's a convent?" "Convent?" ""Convent: boarding school where girls are instructed by Catholic nuns"." "In Chinese!" "Nice... the story about seeing her father..." "In a dream!" "And having a premonition of the danger he's in!" "Translate!" "Translate!" "I don't know how to say 'premonition'." "Amateur!" "Go away!" "Let's see if she's made like a Chinese girl..." "Watch out!" "I don't give a shit about the stuff in the crates." "Or about the bastard who tried to kill me." "But I do give a shit when you screw me around." "Now, if you pay me back like a good boy, I might forget it." "Because I'm not the vindictive type." "Hurry up!" "I want to see your hand moving." "That's right." "You understand me when you choose to." "That's for your staffing costs." "Oh, bugger." "I'm Gwendoline." "He owed me $859." "Here." "Look in her hand!" "She killed them all!" "Run!" "Miss!" "Those filthy scoundrels dared to lay their hands on you." "My dress is all torn." " This is awful." " Can you mend it?" "It was from Mother." "Of course, Miss." "I shouldn't have helped you make this journey." "You were nearly killed." "Yes." "He was wonderful!" "His big, blue eyes, his strong, soft hands..." " Put that money back." " We have to search for your father." "How else will we survive in this godforsaken backwater?" " We are not stealing this!" " Very well, but it won't be easy." "Your fine principles will be the death of you." "And me." "Hide!" "They were here!" " Beth!" "Beth, it's him." " Alright." " You're going to lose again, Willard." " I'm not, I feel lucky tonight." "Help us!" "They're after us!" "Tell them we didn't kill their friends." "I don't help people." "Everything on seven." "Seven." "That's it." "Excuse me." "I won." "Just because Yuki was unwell, there's no need to upset me." "I'm playing." " I'm so grateful." " You just made me lose $60." "Beat it." "Or else..." "Or else I'll stuff you in that bag." "We need you." "Don't desert us." "Run along home." "Mummy will be worried about you." "This dress belonged to her, but she never had a chance to wear it." " Really?" " That's enough!" "This girl came more than 4,000 miles in a filthy cargo hold to find her father." " And what does her father do?" " He's a butterfly collector." "Well, you're in luck." "This is Inspector Kataceo, the chief of police." "Him?" "Inspector, please protect us!" "Hey, that's enough." "Stop it!" "What are you doing?" "Let's have a little dance up on stage and I'll see what I can do for you." "Let go of her, or else..." " Or else what?" " You monster!" "Leave me alone!" "If it's black, you help us;" "if it's red, you never see us again." "Go ahead." "We won!" "Get your hands off me!" "We lost." "Let her go." "I said,"We lost"." "Let her go." "Here's a present for you." "Let's go." "Hi, Shirku." "I've brought you some guests." "See?" "You're not disturbing him at all." "He's listening." " We're looking for a man who..." " Collects butterflies." "Yes, I know him." "Have you seen him recently?" "He wanted me to go with him on his expedition." "I told him what he would be up against." "It was like talking about syphilis to a virgin." "Going off to risk his life for some shitty little butterfly." "But he's devoted his life to this." "If he finds this butterfly, it will be named after him..." "I know, I know." "I'll tell you where to find this insect of yours in need of a name." "This is Eastern Katiwan." " We're in Yuk Yen..." " Yuk Yen." " Next there's jungle and swamp..." " Swamp." " then the River Chu Chi Yu..." " Chu Chi Yu." "on which you sometimes see very mysterious junks." "And then there's nothing." "The Yek Yeik." "All of this is the Yek Yeik." "This is a great map of the Yek Yeik." "There's nothing on it." "Just a few squiggles going nowhere to let you know that you're lost." "No one has ever gone there." "No one has ever gone there and no one will ever come back." "Sometimes a wind blows from the south." "It's the Kalibidu, a supernatural force." "This wind is lethal." "I'm sorry, but I can't help it... if your butterfly chooses to live in the Yek Yeik desert." "In the Yek Yeik, is there a huge crack in the ground... where there are explosions that rock the earth?" "So people say." "But that's just a legend, the Legend of Pikaho." "That's what I saw in my dream." " I have to go there." " Bon voyage, Miss." "The last time I saw your father, he was in Tacoma." "Right, take us to Tacoma." "What?" "No." "No way." "Sorry." " Bye, Shirku." " Ciao." "I'm taking you in." "We've found traces of the virus that killed Yuki." "And the girls don't have passports." " Ow!" " Be careful!" " So you're playing it nasty?" " I've got a bit of a sore cheek." "What?" "Are you scared of dirtying your strong, soft hands?" "Thank you." "So much for all your fine words." "Let her go!" "That's enough messing about!" "Let go!" "What are you waiting for?" "Aren't you going to scream?" " More!" " Hit me!" "Defend yourself!" " More!" " More?" "Scream, for Christ's sake." "What an idiot!" "There you go." "I'll never forget what you've done." "If you ever cross my path again, you're for it." "Didn't you hear me?" "Get lost!" "I'm sorry, but you can't just abandon us here." "Take them to the port..." "OK?" "Come with me." "There's a nice ship that's going to take you back to Europe." "There you go." "Bon voyage, kiddo." "It's better this way, believe me." "Got a light, Willard?" "Scottie wants to see you." "I don't want to see him." "Tell him yourself." "You wanted to see me?" " Another little racket?" " I've got 20 of these." "They may be small, but they're worth a fortune." "You'll find an old junk as you come out of Ogao." "No messing around, Willard." "They're worth a fortune." "What will you pay me to deliver them?" " Two?" " Four." "Let's say three." " Three and a quarter." " Right." "When is it for?" "We'll get it to you tomorrow morning." " You know where to find me?" " The whole world knows." " What the hell...?" " My father's in danger." "With you as a daughter, it's hardly surprising." " Can you swim?" " No!" "It doesn't take long to learn." "Bon voyage." "Right, let's make a start on Lesson Two." " Off you go!" " Help!" " Off with you!" " Get your dirty great hands off me!" "Nobody tells me what to do." "Oh, I forgot to tell you." "Two gentlemen came this morning with your packages, but you were asleep." "I told them to be quiet so as not to wake you, but don't worry, I've got the packages." "Thank you." "That's very kind of you." "If you're still there when I get back, I'll throw you a rubber ring." "That's awfully kind, but there's a slight problem." "I can't..." "I can't remember where I put the packages." "I've got an idea." "Beth, once we're out of the water and we've found my father, we might make a real effort to remember where we put them." "Otherwise this poor boy might never be able to go back to Yuk Yen, which would be a real shame." "Did the packages you hid look like this?" "Yes." "It's obvious you've done this before." "Let me give you some advice." "Keep your heads down." "Otherwise once we've found Daddy, you're on your own." "Willard?" "Is there anything I can do for you?" "Yes, if you know how to fight." "I want it back in the same condition as it is now." "Understand?" " Ready to die?" " When I'm with you, I feel safe." "That's funny." "When I'm with you, I feel the opposite." "Maybe they won't come." "They're already there." "Hiding." "Watching." "I'm sorry we're causing you so much trouble." "Will you forget about yesterday when you kissed me?" "It was my first ever kiss." "I don't know what came over me." "If something happened to one of us, I couldn't bear it." "Love will always find a way." "If a man came out with crap like that, I'd smack his face in." "Now you go off and have a little nap until Daddy calls you for supper." "Don't move." "Here they come." "Your junk sure looks loaded down..." "What's wrong with it?" "I want... everybody on your junk's deck!" "Don't you trust me?" "That'll do, Taouto." "You know the place is teeming with pirates." "Get everyone on deck, or the deal's off." "Everybody out!" "Two men will be enough." " Only two?" " Yes, two." "OK, two of you go check the bags!" "Get a move on!" "Quick!" "What's with this need to check up?" "Don't you trust me?" "It seems there are pirates around here!" "Hey!" "Catch!" "This might speed you up a bit." "Go and get him!" "Kill him!" "Don't move!" "I'll never forget this, Willard!" "Nice work." "Perfect." "You're hired." " Willard?" " Yes, Miss?" " What's that?" " What do you think?" "It's Tacoma." "Catch!" "Tell Tom that Willard just blew in." "If your father came this way, Tom will have seen him." "He always knows what's going on." "If he's not here, that's that." "End of journey." "I've repaid my debt." "What does your father look like?" "When he's out on expeditions, he always wears a white jacket, white trousers and a brown hat." "On his last expedition..." "Willard, you old bugger!" " No!" " No!" "Oh, Miss!" "Help me." "Where did you find those clothes, Tom?" "We found his body tangled up in some roots along by the river." "Judging by the state he was in," "I would say he had ventured out as far as the Kiops." "Unfortunately for him, the Kalibidu was very strong that night." "There's no doubt in my mind that he was a victim of their superstition." "What do you mean?" "It's not a pretty story." "You tell them." " No." " Tell us." "The Kalibidu is a poisonous desert wind." "It makes you retch, it makes you puke, it can kill you." "The Kiops are terrified of it and believe they can appease its fury with human sacrifices." "They sacrificed my father to appease the spirits?" "The bizarre thing is that the Kiops sacrifice only men to their gods." "They tie them up live to a sort of web they weave and then the Kalibidu comes along and the bodies disappear." "The bodies disappear." "Without trace." "End of story." "But what was most surprising was that your father's body had a gunshot wound in it." "The Kiops don't have any firearms." " Could it have been a trafficker?" " I know my stuff." "No one trades with them." "They don't have money." "What I find hard to understand is why a white man would go all that way just for a butterfly." "I wouldn't do it for $1,000." "What about $2,000?" "$2,000 all in one go?" "There's no such thing." "That's enough, Willard." "We leave tomorrow." " Where for?" " The Yek Yeik." "Why?" "Your father is dead." "It's pointless." "I'm going to find the butterfly and name it after my father." " I'm going to pursue his dream." " Well, you can count me out." " Are you scared?" " Are you paying?" "You'll get it tomorrow morning." "Tom, I need to speak to you." "And you can go and wash." "You stink." "But where is she going to find all that money?" "If Willard finds out about this, I'm done for." "Think about it." "You'll make a big profit." "I'll have to keep out of the way of Scottie's pals, or that's me done for again." "What a fascinating job yours is." "I hate to see all that money wasted for the sake of a mere butterfly." "Consider it carefully." "No one has ever come back from the Yek Yeik alive." "What do you want those labels for?" "That's more like it." "I suppose this will be enough for all my kit." "Such a pretty girl." "You did that on purpose." "I could have lost." "Get up and let's go." "This is neither the time northe place to count it, but it's all there." "Where did this spring from?" "If you knew, you wouldn't be happy." "I don't like waiting." "Gentlemen." "Sorry, boys." "I'll do anything for science." "Willard!" "Where are you?" "Got one!" " Got it!" " You're lagging." "There!" "I'm in training forthe great butterfly hunt." "I just can't do it." "Willard, stop!" "You're going too fast." "You're doing it on purpose." "While you're down there, you might as well fill this up." "I might need it for my bath tonight." "Well, here we are, the gates of hell." "Your very own hell." "I don't suppose you were thinking of giving up, because I was..." "No?" " You really want to go on?" "OK." " Oh, just stop it." " What's up?" "Come on." " You're not very funny." "I thought we were rationing the water." "Gwendoline!" "Don't move." "Don't move your foot." "Beth, the flask." "Sapricus Orantis, rose of the desert." "It lives 30 years on three drops of water." "What's got into you?" "Have you gone crazy, or what?" "Look, if we haven't found your bloody butterfly by the time our flasks are empty, we're going home." "You're a bastard, Willard." "That's why I hired you." "You have to help me." "We have a contract." "Isn't that word a bit stupid in our current situation?" "I order you to go on." "What's more, you're going to carry Beth." "And, when I'm tired, you're going to carry me." " No, there's no need." "Don't do that!" " Goodbye and good luck!" "What do I care about your insects and your family problems?" "I'm not risking my life in a godforsaken uncharted desert with a hysterical girl, a useless maid and a bloody butterfly net!" " Wasn't your father's death enough?" " Come back!" "You can't desert us!" "Willard, you're going to come with us because I'm telling you to." "You're nothing but a swindler, a dirty, opportunistic nobody." " He's going!" " I don't like goodbyes." "Come back, Willard!" "Maybe now is the time to count your money." "You never know." "Shit!" "You'll get your money." "Don't get worked up." "If you're a good boy, you'll be paid when we get back." "Let's go, Beth." "Miss." "Good work, Willard." "This will speed us up." "With each swing of the machete, I'm picturing it slicing your head off." "Don't move." " Somebody's been this way." " Could it have been my father?" "No, it's too recent." "Don't mess with us." "We're not in the mood." " Is that a boa?" " Of course not." "It's a goldfish." " Are you sure this is the way?" " I don't know." "Ask him, he's local." "Hey!" "Where are you?" "Wait for me!" "What's he doing?" "Is he ill?" "Take your clothes off!" "Quickly!" " I told you to get undressed!" " He's mad." "We'll catch our deaths." "Would you rather die of thirst?" "Come on." "Do as I'm doing." "You're useless!" "Go and fetch me some wood." "We have to make a fire." "Hurry up!" "We're doing our best." "Here." " Where is this from?" " I can't remember." "Why?" "Try to remember." "There." "I've seen crates like these before." "I don't think we're alone." "Let's keep going anyway." "Stand up!" "That's more like it." "Willard!" "Willard!" "Haven't you ever been in love?" "Yes." "With every woman in the world except you." "I won't have you telling me how to live my life." "I decide." " That's not what I was asking you." " Really?" "No!" "No!" "The first time I saw you, I was reminded of a panther I once found." "She was beautiful, with magnificent eyes." "She followed me everywhere, slept in my bed." "One day, she was killed by a hunter, and I cried." "Jesus!" "How totally ridiculous!" " Willard?" " Shh." "Be quiet." "I can hear something." "It sounds like a waterfall." "I said, "Be quiet"." " Yes, it's water." " Come back!" " Ow!" "What are you doing?" " Don't move!" "Stop it!" "But..." "Goodness!" "How did you guess?" "Instinct." "I'm infallible." " Come on." " Let's get out of here." "Shit!" "The Kiops." "Pretty, aren't they?" " Are those your father's binoculars?" " Yes." "My mother gave them to him." " For his last expedition." " I see." "Look at his tattoo." "Isn't that your stupid butterfly?" "All I know is that we're nearing our goal." "Great." "Now we can die in peace." " Are you OK?" " Yes." "Are they going to kill us?" "The Kiops don't actually kill." "Tonight, they'll stir up their dogs and tomorrow they'll turn you out and you'll have to run." "If you can outrun the dogs, you might just see my money again." "Feel free to send it my love." " What will they do with you?" " Tie me to one of their webs." "By sacrificing me to the Kalibidu, they save one of their warriors." "When you're running away from the dogs tomorrow, if they haven't caught you after 300 yards, run in zigzags." "They'll get disorientated and tire more quickly." "Do we have any chance at all?" "None at all." "Willard..." "Forgive me." "Oh, please." "Whatever you want, but not that." "It's my last night on earth." "I want a good night's sleep." "Oh, brilliant." "Don't you think it's a bit late to start blubbing?" "What did you expect?" "A walk in the park?" "A picnic?" "Maybe you'll feel differently about butterflies when the dogs are feeding on your entrails." "Keep your comments to yourself." "You'll never be a hero without being paid." "Gwendoline..." "Let me tell you something." "If I were your father, looking down from heaven, I'd be so proud of you." "If we ever get out of here, I promise you we'll find your butterfly." "It will be the most beautiful butterfly in the world, and it will be named after you." "Willard, I feel so guilty." "Gwendoline..." "Have you ever made love?" "No." "No?" "You can't die without having made love." "Come closerto me." "You mustn't feel ashamed." "Imagine your body against mine." "You're trembling." "I'm kissing you, burying my face in your neck." "You close your eyes." "You can feel my kisses on your skin." "Oh, your lips are so soft." "I'm stroking your hair." "You can feel my hands in your hair." "I'm running my hands down your body." "You can feel my hands on your breasts." "You shiver." "You're beautiful." "Let yourself go." "I'm in your mouth." "I'm stroking yourthighs," "I'm stroking your stomach..." "Let yourself go." "Don't be ashamed of what you're feeling." "I want to come inside you." "I want you." "You can feel my skin against yours." "You can feel how much I want you." "Gently, gently..." "I'm coming into you..." "Slowly." "I'm coming." "I'm inside you." "I can feel you." "I can feel you." "Feel me." "It feels good." "Feel it!" "Beth!" "I've done it." "Oh, no!" "I've had enough." "Enough, enough, enough!" "Enough of walking, running, falling, swimming, dying..." "I just want to catch this stupid butterfly and go home." "So if one of you little savages raises a finger to stop us leaving, he'll pay." "Why can't we be left to walk through the jungle in peace?" "I won't have it!" "Right, let's go." "I can't take any more." "She's right, you know." "You're beginning to get on my tits." "Oh, shit." " This way." " Quick!" " Hurry up!" " We've done it." "We've escaped." "Yes." "It's odd, though, isn't it?" "Well, we've reached the Yek Yeik, anyway." "Of course!" "That's why they didn't follow us." "I should have known." "It's the Kalibidu." "Lie down!" "Come on, lie down." "Lie down flat." "Breathe as little as possible." "Lie down." "Lie down and don't breathe!" "Do as I say." "Cover up your mouth, otherwise you'll die." " How long will it last?" " I don't know." "Alright, guys?" "Are you still alive?" "If you know someone who likes solitude and wide open spaces, this is the place for him." "Yes." "Yes, this is it." "It's here." "I'm sure of it." "The footsteps in the sand." "The bodies in my dream..." "The butterfly is in the chasm ahead." "This is fantastic!" "Wait!" "What's she doing?" " This is it!" " What's up with her?" "It's exactly like in my dream." "Come on!" " Does this mean it's all over?" " Come on!" " The Kalibidu has gone to her head." " Maybe." "Nice place." "This is it." "We'll catch the butterfly and go home." " You think your bug is down there?" " Of course." "Throw something down..." "Not my cap!" " What are we waiting for?" " Have you got the net?" " I'm so happy." " Can I go down first?" " Excuse me." " Go ahead." " Willard, have you been to Paris?" " What?" " We could go there." " Hang on." "This is my kind of place." "If you try to force me to go to Paris, I'll smash your face in." "I see, because we had a romantic moment last night, we have to print the wedding invites" "I see." "What happened last night was just a game for you." " I'm down!" " You're horrible." "I don't need you any more, Willard." "You're dismissed." "I've got it!" "I've got it!" "It's beautiful." "Come on down!" "No!" "No, no." "It's wonderful!" "Beth!" "Beth!" "Beth, what's happening?" "Beth, Beth!" "We have to do something." " Yes, but what?" " I don't know." "Climb the wall." "There must be a way through." "Beth!" "Well done." "That was subtle." " Nobody's perfect." " Let's go." " We killed her." " We'll say the butterfly killed her." "You didn't tell me the end of your dream." "There's a tunnel over there." "Let's go." "There are only women." "No men at all." "What are we going to do to find Beth?" "What?" "What?" " No!" " Oh, yes." "This is ridiculous." "They'll realise at once." "They've all got huge breasts." "Relax." "Even with your beard, you look stunning." "Right, I've had enough." "I'm throwing you overthe wall." "You can find Beth and carry on your childish games elsewhere." "Go ahead." "What are you waiting for?" "It won't help you, though." "You'll never see your money again." "You know how I got the money?" "I sold your packages to Tom." "I always knew Tom was a shit." "Really?" "Well, there's no reason he should look up to you." "You're a coward, Willard." "You're afraid of feelings." " Oh, yeah?" "Feelings are for wimps." " Really?" "You're never going to find anyone who loves you for what you are because you lack the courage to say, "I love you"." "Goodbye." "Don't cry over me." "I'm not worth it." "Fine." "Let go, then." "But it's your name I'll cry out as I hit the ground." "I belong to you, body and soul." "Are you joking?" "Gwendoline!" "Let me go!" "I don't know how to say those kinds of things." "Jesus Christ!" "Gwendoline, I love you!" "I hope that was genuine." "Let's go." "Look!" "Idiot!" "Come on." " What's that?" "Are those diamonds?" " Come on." "I'm sure of it, look at the pipes, the machinery, the buckets..." "It's diamonds!" "I love your butterfly." "Pikaho is real." "Let's find Beth and go." "We'll be rich!" "Let him go." "You'll suffocate him." "That way!" "Quick!" "Come on." "The Kiops." "The Kiops, the storm..." "The storm..." "It was real." "I don't believe it." "The bodies in my dream were theirs..." "I can't leave you alone for five minutes." "I'm doubling my fee." "Behind you!" "I don't believe it." "Beth!" "Don't bother with me." "Have you lost something, Gwendoline?" "Oh, you're beautiful." "Come over here." "Welcome." "We're not used to visitors." "This is a quiet spot." "Let Beth go, now!" "Ah, Beth." "From now on, she's U89." "Your friend has been punished, Gwendoline." "We were just having a quiet chat when suddenly she killed herself." "Such a pity." "I have so little chance to practise your charming language." "I'm surrounded by idiots here." " What have you come here for?" " Just to catch a butterfly." " And who is with you?" " Nobody." "I hate lies." "The kingdom needs discipline." "These girls tried to bring a man into the building without my permission." "I find disobedience loathsome." "Take her away and untie the other one." " Ah, there you are." " Superb." "You're superb." "I never know how to introduce you, Darcy." "Just call me Darcy, as usual." "What do you think of her?" "Superb." " She's superb." " That'll do, Darcy." "What about me?" "What do you think of me?" "You're superb." "I'm most honoured." "Welcome." "You're hopeless, Daroy." "I've told you before, you don't kiss a girl's hand." "You must excuse him, Gwendoline." "He was dragged up." "But he's right." "You really are superb." "It's stupid of you to refuse my friendship." "It's your only chance." "Right, that's enough." "Stop your stupid games!" "Gwendoline's coming with me." "We've got a lot to do." "Mr Willard, I presume." "You're not in a position to make demands." " Is he, Darcy?" " You're superb." "Right, you're going to let her go and we'll leave now and forget everything." "Gwendoline, could you forget everything?" " You're hunting a butterfly?" " Yes." "My father's." "Ah, yes." "The old gentleman who also claimed to be hunting the butterfly." " Do you remember, Darcy?" " I never forget what you make me do." "Bring him to me." "Smile, Gwendoline." "I hate sulky people." "There." "Are you sure you don't know the Legend of Pikaho, Gwendoline?" " Willard?" " Never heard of it." "I'm sure you could tell it beautifully." "I'd be surprised." "Let me help you out." "In the 12th Century, a volcano, extinct for 10,000 years, started to spew out diamonds." "The earth split open, the volcano was swallowed up and Pikaho was never heard of again." "According to the legend, no one survived, but it seems some bastards are still profiting from the situation." "Beautiful, Willard." "I love educated people, don't I, Darcy?" "Very educated." "The legend also says that the volcano takes vengeance on those who rob it." "So be careful, your alchemical games might blow up in your face." "Impossible." "Everything is precisely tuned." "So, you came to hunt the butterfly?" "Yes." "I'm under contract to the young lady." " What do you think of him?" " Superb." "He's superb." "You've lost, Willard, but I'm not vindictive, so I'll let you into my legend." "When the earth split open, nature went awry and few survived." "Most were women." "Such men, as there were died off mysteriously." "I need men like you, Willard, to keep my civilisation alive." "Darcy will set up a trial to find out which of my top girls will have you." "You'll give her a child." "I want a male." "Really?" "Why not get your odd-jobber to make you one?" "Fortunately for him, that's not on his list of duties." "Because here, you have to pass exams before you're allowed to make love?" "If I accept, will you let Gwendoline go?" "Oh, you can do whatever you want afterwards." " But you'll be worn out by then." " Don't insult me." "I could repopulate this place single-handed." "You're wrong to boast, young man." "I wouldn't like to be in your shoes." " No one asked you, Darcy." " I said nothing." "You're superb." "Just give in." "Here, we hope to be able to love." "You have nothing left to defend or protect." " Forget the man who was with you." " Willard?" "Why?" "Here, all men die after mating." "When nature transformed the mountain, the natural order also changed." "We live like insects." "The female kills during her climax." "I don't want him to die." " You're mad." "You'll never get to him." " I must try." "It's my fault he's here." " No." "It's too dangerous." " Let me go!" "Beth!" "Sorry, Beth." "Willard, these are my top warriors." "They're prepared to fight to the death to make love to you." " Choose four of them." " I don't want to." "Perfect." "Willard!" " Willard!" " Coming!" "Kill her!" "You must kill her, you stupid, pathetic idiots!" "Give me the reins." " Let's find Beth, find an exit and go." " Have you seen an exit?" "No." "This is serious..." "No, let me speak." "We'll be fine." "Not a word!" "It's horrible." "Willard, be serious." "You're in danger." "If you ever make love..." "Willard!" "Here, when a man makes love, he dies." "What?" " Beth!" " Put on her helmet, quickly." "Now Gwendoline is going to kill Gwendoline off." "If you take her place, you can join the fight and save Willard." " But I don't know how to fight." " Shh!" "Be brave." " No!" " Poor, poor Gwendoline." "I saw the fight." "It was fantastic." "Unbelievable." "Amazing." " Mind your own business, Darcy." " Bad luck." "Willard, that child had no class." "Don't cry over her." "You won't miss her." "You don't understand." "You're already dead." "You're a coward, numb to all feeling." " You'll never say, "I love you"." " That's for wimps." "Well, maybe I am a wimp." "But now I've lost everything." "Everything!" "You won't get anything out of me." "You're no queen, you're a joke!" " Darcy, I forbid you to laugh!" " You're superb." "I'll blow up your mountain!" "I'll kill you, you joke of a queen!" "Darcy, go and prepare the trial." "I want everything perfect, as usual." "Farewell, Gwendoline." "Those girls are perfectly trained." "You don't stand a chance." "Drop this mad idea and come with me." "I'll blow up the city so we can escape." "Otherwise the Queen will kill you for real." "You killed my father." "You crawl in front of that mad woman." "You're vile..." "Superb." "She was superb." "All the men were mad about her and I was a little physicist with nothing." "I wanted her so much that, to win her, I set out to find her famous Pikaho." "She used my love to turn me into what I've become, to foroe me to do things that go against nature." "But I can harness the energy of the volcano and turn its fury against her." "I can dominate the Queen." "I shall crush her in one of her horrible machines and go back to a normal world, where the power of money is different." "Go on, then." "What are you waiting for?" "Courage." "Be my courage." "Forget this nightmare, forget your butterflies." "Don't touch me!" "These are precise instruments." "When I press that button, the volcano will spew out its fortune." "When I press this one, the earth will close over again." "The legend will become nothing but a legend once again." " I can help you." " You disgust me." " Can't you knock?" " Thanks for reminding me." "I found this." "Deal with it." "Make it spectacular." "I will." " Arsehole." " What?" " Superb." "You're superb." " Good." "What?" "What have you done with Willard?" "How inventive." "Naughty bird." "These girls will fight to the death for you in a contest without rules." "You'll get the winner." "Do me the honour of starting them." "Go!" "Come on!" "That one doesn't stand a chance, does she?" "More chance than you'd stand against me." " Shall we bet on a colour?" " I don't give a shit about your bets." "But just to make a fool of you, I bet the one who's losing will win." "You're making a mistake, Willard." " You're losing." "Green is going down." " I'll kill you anyway." "Don't be so positive." "It's annoying." "You're not one of us!" "Who are you?" "Take off your helmet so that the Queen can see your face." "No!" "No!" " Stop this carnage, you swine!" " I can't go against the Queen." "I'm bored." "This isn't interesting." "Yes, it is." "But all you like is violence." "It will be your downfall." "I hope the next part is more original and picturesque, Darcy." "I think you'll find it traditional, but to yourtaste." " Who are these butterflies?" " That's a surprise." " Beth?" " Don't talk." "I'll shield you." "You're going to win." "You have to." " Don't get involved." " Too late." "Now we're together, we'll win." "Come on." "Ready..." "Go!" "Look out!" " Beth, I can't go on any longer." " You have to." " I can't." " You have no choice." "Look out!" "Bring her over here." "My luck is turning." "Green is superb..." "Yellow is superb!" "You're going to die!" "Go on!" "Look." "She's going to die." "Winning the bet doesn't change things." "You have to be the champion tonight." "Pick her up." "Take off her mask." "Leave it on for the ceremony." "It will add to the mystery." "Well done, Darcy." "You're coming on." "I know you love surprises." "You're mad!" "You're risking your life." "That doesn't matter." "I just had to see you one last time." "You've been amazing." "I'll never forget you." "I don't know what will become of me, but I'll try to be as brave as you've been." "I wish I could help you." "I'm so scared." "But you're going to get together with Willard and you'll be free." "Come on, now." "This isn't the moment to lose heart." " I'm afraid, Beth." " After all you've done?" "I don't know how to make love." "Let me tell you, it's a lot easier than fighting with your hands tied behind your back." "How?" "You remember that night with the Kiops?" "No, that's not..." "Well, Willard..." "No..." "It's the same thing..." "Well, not quite..." "But I'm afraid." "I'm afraid I won't know what to do." "Your helmet!" "Quick!" "Gwendoline, the Queen will see through your scheme and you'll die." "I can win, if you have an ounce of feeling for me." "I have." "I've come to fetch you and take you outside." "You'll be free." "You've always betrayed everyone." "Leave me alone." "All you care about is getting out of Pikaho with your diamonds." "The butterflies have started circling and I've sped the process up." "I'll make a fine lady of you." "You'll have all you could want." "All the diamonds of Pikaho will never make me forget the place." "Gwendoline, I'm begging you." "I want to love you." "There's nothing I can do for you." "The Queen wants me destroyed, but I still have the same desires as other men." "Leave me alone, I tell you." "Please, Gwendoline." "Quickly." " Or I'll tell the Queen everything." " Pig!" "Where's Darcy?" "Do I have to do everything?" "What is this charade?" "I'm beginning to get tired of it." "You can't just make love like anyone else." "Oh, no." "You need whips, torture, contests." "You know, your head is full of shit, Your Majesty." "Come here and I can sort it out for you." "Nice and clean." "Don't be vulgar." "And keep your criticisms for later." "You'll need them." "You're a joke." "I'm not making love to anyone." "I knew you'd be reluctant, but I'm prepared." "You won't even give me an erection." "They've been training for years." "Failure is not an option." "You're sick." "I didn't want to hurt you, so I haven't yet told you everything." "That's good, girls." "Keep it up." " I see it's having an effect." " Jesus!" "It's time to share with you what was amusing Darcy." "Here, men can only make love once." "They die immediately afterwards." " That's the law of Pikaho." " No!" "Bring her in." "No!" "No!" " You'll be a fine lady." " You're pathetic." " Wait." "This is important." " What?" " Untie me first." " I'm listening." "Everything's going to blow up." "I've set the timer." "I can't stop it." "Everything will be swallowed up." "Nothing will be left." "Nothing!" "Just dust and lava." " Pikaho will become a legend again." " How long have we got?" "No!" "Willard." " Gwendoline?" " What's he saying?" "Yes, Willard." "Gwendoline." "Come on, come on." "Darcy is totally useless." "I can't see a bloody thing." "That wasn't in the plan." "What's that imbecile Daroy up to?" "That'll do." "Take off your mask." "Willard must die face to face with his executioner." "No!" "Gwendoline has destroyed your power." "Now the volcano will avenge itself." "You're going to die." "You've lost." "Lost everything, you joker queen." "Willard, Gwendoline!" "Darcy has opened the security gates." "Everything's going to blow up any minute now." "Hurry up!" "Completely crazy." "Joker queen!" "I'm a queen." "I'm the Queen, I'm the Queen!" "Not that way." "Quick!" " Go ahead." "I'll catch up." " Don't go in: it's hell." "I need something to make up for the bad memories." "Don't be like Darcy." "Come on!" "We don't need the diamonds." "Willard!" "Willard!" "Hurry up!" "Quick!" "I don't believe it." "Willard!" "Willard!" "Stop!" "You owe me $2,000." "My butterfly!" "Just Jaeckin especially thanks Claude Renard and Françoise Schuiten... for their original designs for the costumes and set decoration." | Low | [
0.498069498069498,
32.25,
32.5
] |
the beauty of tokyo architecture, design and others Main menu Despite this Ando`s work is not one of his best, it is in the central Area of Omotesando where several others cutting edge designer are proving their innovative ideas as I reported many times in this blog. This work come from the nineties although it was finished only in 2005, here the wikipedia link. Another source of information is this blog by a peruvian architect living in Japan. I am sure also there must be some books about this billionnaire construction. Despite this complex has a Luxury fame you feel yourself at ease without be an affluent since shops are for all ages and pockets. The great thing is the smell, the parfume better said. I could not figure out where it came from, but I am sure it is intentionally spreaded in the air by the management, or even envisaged since the sketch. I liked a lot the railing details and the total view from the central ladder portrayed in the picture above. Here below A splendid view from the Store upfront some months later (beginning of April). You can see also the apartments on the higher floors and what seems a garden roof. | Mid | [
0.5654885654885651,
34,
26.125
] |
--- title: "通用配置" nav-parent_id: filesystems nav-pos: 0 --- <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> Apache Flink 提供了一些对所有文件系统均适用的基本配置。 * This will be replaced by the TOC {:toc} ## 默认文件系统 如果文件路径未明确指定文件系统的 scheme(和 authority),将会使用默认的 scheme(和 authority): {% highlight yaml %} fs.default-scheme: <default-fs> {% endhighlight %} 例如默认的文件系统配置为 `fs.default-scheme: hdfs://localhost:9000/`,则文件路径 `/user/hugo/in.txt` 将被处理为 `hdfs://localhost:9000/user/hugo/in.txt`。 ## 连接限制 如果文件系统不能处理大量并发读/写操作或连接,可以为文件系统同时打开的总连接数设置上限。 例如在一个大型 Flink 任务建立 checkpoint 时,具有少量 RPC handler 的小型 HDFS 集群可能会由于建立了过多的连接而过载。 要限制文件系统的连接数,可将下列配置添加至 Flink 配置中。设置限制的文件系统由其 scheme 指定: {% highlight yaml %} fs.<scheme>.limit.total: (数量,0/-1 表示无限制) fs.<scheme>.limit.input: (数量,0/-1 表示无限制) fs.<scheme>.limit.output: (数量,0/-1 表示无限制) fs.<scheme>.limit.timeout: (毫秒,0 表示无穷) fs.<scheme>.limit.stream-timeout: (毫秒,0 表示无穷) {% endhighlight %} 输入和输出连接(流)的数量可以分别进行限制(`fs.<scheme>.limit.input` 和 `fs.<scheme>.limit.output`),也可以限制并发流的总数(`fs.<scheme>.limit.total`)。如果文件系统尝试打开更多的流,操作将被阻塞直至某些流关闭。如果打开流的时间超过 `fs.<scheme>.limit.timeout`,则流打开失败。 为避免不活动的流占满整个连接池(阻止新连接的建立),可以在配置中添加无活动超时时间,如果连接至少在 `fs.<scheme>.limit.stream-timeout` 时间内没有读/写操作,则连接会被强制关闭。 连接数是按每个 TaskManager/文件系统来进行限制的。因为文件系统的创建是按照 scheme 和 authority 进行的,所以不同的 authority 具有独立的连接池,例如 `hdfs://myhdfs:50010/` 和 `hdfs://anotherhdfs:4399/` 会有单独的连接池。 {% top %} | Mid | [
0.5691318327974271,
11.0625,
8.375
] |
Menu Testimonials I can’t tell you enough how pleased I am with the results of my vaginal repair. I have struggled with confidence issues during intimate moments that has robbed both me and my partner from the intimacy we could have had. I was too obsessed with the way my private parts weren’t right. Well that is over now, and I have found a new confidence and pleasure in a very important area of my life. My only regret is not finding you sooner. Emilly L. (Los Angeles, Ca) Dr.Bonni preformed a Tubal Ligation Reversal on me Jan 2016. I am very happy with his professionalism and patient care. I would highly recommend Dr.Bonni | Low | [
0.373259052924791,
16.75,
28.125
] |
.row .alpha.three.columns = f.field_container :amount do = f.label :amount, raw(t(:amount) + content_tag(:span, " *", :class => "required")) = text_field :adjustment, :amount, :class => 'fullwidth' = f.error_message_on :amount .omega.three.columns = f.field_container :tax_rate_id do = f.label :tax_rate_id, t(:tax_rate) = select_tag :tax_rate_id, options_from_collection_for_select(Spree::TaxRate.all, :id, :name), prompt: t(:none), class: 'select2 fullwidth' = f.error_message_on :tax_rate_id .row .alpha.omega.twelve.columns = f.field_container :label do = f.label :label, raw(t(:description) + content_tag(:span, " *", :class => "required")) = text_field :adjustment, :label, :class => 'fullwidth' = f.error_message_on :label | Mid | [
0.605150214592274,
35.25,
23
] |
Gaili Schoen Gaili Schoen (born Susan Gaili Schoen, in Venice, California) is an American film composer, orchestrator, and pianist. She is best known for her scores for the films Festival in Cannes starring Maximilian Schell, Anouk Aimée, Ron Silver, and Greta Scacchi, and Déjà Vu, starring Stephen Dillane and Vanessa Redgrave, both directed by Henry Jaglom. Her television work includes the score for the 2007 PBS documentary Annie Leibovitz: A Life Through A Lens which she composed with score producer James Newton Howard. Schoen composed a 52-piece orchestral score for the 2008 feature film Noble Things starring Michael Parks, Ryan Hurst, and country singer Lee Ann Womack, and scored the 2011 documentary The Ghost of War, about the RMS Queen Mary. In 2012-2015 Schoen published a piano method book series called Upper Hands Piano: A Method for Adults 50+ to Spark the Mind, Heart and Soul. The books teach the art of playing the piano, while enhancing brain functioning. External links Official website Upper Hands Piano website The New York Times Category:American film score composers Category:Female film score composers Category:Living people Category:Year of birth missing (living people) | High | [
0.717781402936378,
27.5,
10.8125
] |
The Karnataka State Open University made on first June 1996 vide Karnataka Govt. Warning No. ED 1 UOV 95 dated twelfth February 1996 - KSOU Act 1992 is acknowledged to be a presumed Open University around the open studying foundations in the nation. Keeping in perspective the instructive needs of our nation, when all is said in done, and state specifically the strategies and programmes have been outfitted to pander to the poor. | High | [
0.6578947368421051,
31.25,
16.25
] |
Subdural hemorrhage secondary to extramedullary hematopoiesis in postpolycythemic myeloid metaplasia. A 64-year-old woman with a 20-year history of polycythemia vera and a 2-month history of postpolycythemic myeloid metaplasia ( PPMM ) became comatose because of bilateral subdural hematomas. Biopsy of the dura mater at operation demonstrated extramedullary hematopoiesis ( EMH ). The subdural hemorrhage was secondary to dural invasion by hematopoietic tissue and vascular dilation with a predisposing element of thrombocytopenia. This is the second case of central nervous system (CNS) EMH in a case of polycythemia vera. Only 8 cases of symptomatic CNS EMH and 16 cases overall have been reported, and these were primarily due to agnogenic myeloid metaplasia. Symptoms were secondary to the mass effect of dural tumor-like hematopoietic tissue or to an elevated cerebrospinal fluid protein content. The survival after a diagnosis of PPMM with CNS EMH has been less than 6 months in all cases. CNS EMH is an unusual and a potentially critical complication of polycythemia vera that should be considered in the evaluation of the patient with polycythemia vera and myeloid metaplasia. | High | [
0.656069364161849,
28.375,
14.875
] |
Q: How does Zion population square with how it's built? The Architect says that The One must choose 23 people (16 female, 7 male) to create new Zion. After which, you will be required to select from the Matrix 23 individuals - 16 female, 7 male - to rebuild Zion. But this doesn't seem to make any sense considering the following two statements (listed in un-cited form on Matrix Wikia) Zion, according to the Architect, has been completely destroyed five times by the time of the sixth One, Neo, meets the Architect. As a result, the actual year on Earth is estimated to be closer to 2699, not 2199. This means that Zion grows to its final pre-destruction size in only 100 years. Yet, the current Zion has - at least according to Wikia - a population of over 250,000 humans. How can one square those 3 facts? It seems completely impossible to both generate a population of quarter million, AND all that advanced Zion infrastructure, in just the space of under 5-6 generations (100 years) if you start with 23 people. (Even allowing for non-natural population growth - i.e., culling out people from the Matrix, the way Neo was extracted. That seems a very labor intensive and non-scalable process - one ship can not extract more than a couple of people a day given its size and medical facilities). Is there some canon explanation for this discrepancy? Are one of the two facts that Wikia lists incorrect/noncanonical? Did Architect lie to Neo? Do the machines somehow help build up Zion and populate it further? A: Even in the present day, there are some countries with birth rates of ~7 children per generation. It's also not clear what the rates of extraction are; if the founders could manage an extraction a month for the first decade, and kept up the 2/1 male-to-female ratio, they could cut the births-of-women per woman down to about 5.15 to get 250k population after ~5 generations. If they could additionally maintain a skewed gender ratio, this could be consistent with what's observed today. Thus, while certainly not consistent with lifestyle in modern industrialized countries, it is not completely impossible. Here's an example scenario, assuming a first child at 15, two children every five years (equally likely to be male or female), a last child at 40 (a total of 11), that people are extracted at age 18 (including the founders) and are extracted once per month for the first 15 years, twice for the next 15, three times for the next 15, etc., that lifespan is 75, and that all extractions and births are gender-balanced: However, even though this generates the right number of people, the age distribution is kind of screwy; the median age is 11. Still, there are a non-negligible number of adults (~100k over 15). A: IIRC there is no verifiable information as to what year it is. For all we know its 3199 or something. Plenty of time to rebuild a few times. Also remember minds are being freed. So you have to add that to the formula above. The rate at which minds are freed will likely increase as the cycle continues and we closer to the anomaly. OR Zion could just be part of the second level of the Matrix, and therefor not require any justification at all :) | Low | [
0.521739130434782,
25.5,
23.375
] |
377 A.2d 382 (1977) Lucille STARKEY et al., Appellants, v. DISTRICT OF COLUMBIA, Appellee. No. 11288. District of Columbia Court of Appeals. Argued January 17, 1977. Decided August 1, 1977. Nathan L. Silberberg, Arlington, Va., with whom Howard B. Silberberg, Washington, D. C., was on the brief, for appellants. Richard W. Barton, Deputy Corp. Counsel, with whom John R. Risher, Jr., Corp. Counsel, Louis P. Robbins, Principal Deputy Corp. Counsel, E. Calvin Golumbic, Asst. Corp. Counsel, Washington, D. C., at the time the brief was filed, and Nancy R. Dorsch, Asst. Corp. Counsel, Washington, D. C., were on the brief, for appellee. Before KELLY and KERN, Associate Judges, and PAIR, Associate Judge, Retired. KELLY, Associate Judge: We review here the probate court's construction of the will of Paul Prentice, deceased. The document itself is simple. In the body of the will the testator left a watch and a ring to his "nephew."[1] He disposed of the rest of the estate as follows: 3. All the rest, residue and remainder of my estate, real and personal, wheresoever situate, I devise and bequeath to my sister-in-law, . . . my niece, . . . my nephew, . . . and to Dr. S. H. Roberts, . . . share and share alike. In the event any of the persons mentioned in this Paragraph 3 of my LAST WILL AND TESTAMENT do not survive *383 me, then, in that event, his or her devise and bequest shall lapse. Dr. Roberts predeceased the testator by several months. In a lengthy opinion[2] the probate court held that in view of the testator's instructions that in such event the bequest would lapse, Roberts' share passed by intestacy and as the testator had no heirs, Roberts' share of the estate escheated to the District of Columbia. Lucille and James Starkey, co-executors of the estate, contend on appeal that contrary to the court's ruling, the testator intended that any share which lapsed according to his instructions should be divided equally among the other residuary legatees. They urge as controlling that portion of D.C.Code 1973, § 18-308, which provides that any gift which is void or fails or is otherwise incapable of taking effect should pass under the residuary clause.[3] The issue is, therefore, whether the testator's direction that if a legatee did not survive him the bequest shall "lapse" precludes the antilapse statute from operating to save the one-fourth share of his estate from passing by intestacy. In reaching its decision, the probate court relied on George Washington University v. Riggs National Bank of Washington, D. C., 66 App.D.C. 389, 88 F.2d 771 (1936). In that case the testator left his residuary estate to four institutions as tenants in common. One of the residuary gifts was void under then § 42, Title 29 of the District of Columbia Code [the Mortmain Statute].[4] As the testator had made no provision for such contingency, the court held that the void share must pass by intestacy rather than to the other residuary legatees. Specifically, the court held: We are therefore clearly of the opinion that in the absence of definite language in the will giving the void legacy to the other residuary legatees, it must be held that the testator died intestate as to the void legacy. It cannot go to increase the shares of the other tenants in common. [Id. at 392, 88 F.2d at 774.] In the case before us, the testator did anticipate that a residuary legatee might predecease him and provided that in such event his or her share would lapse. The significance of that instruction is only that the heirs of the predeceased legatee would not share in the estate. And in the absence of any ambiguity in this language, extrinsic evidence was inadmissible to prove what the testator intended should happen to the lapsed share. In re Estate of Kerr, 139 U.S.App.D.C. 321, 332, 433 F.2d 479, 492 (1970); Baker v. National Savings and Trust Co., 86 U.S.App.D.C. 161, 162, 181 F.2d 273, 274 (1950). Thus, as in George Washington University, we are left with a void or lapsed gift and no indication as to what the testator desired to happen to that legatee's share of the estate. As the cases are indistinguishable, the trial court correctly held that the lapsed share passed by intestacy and escheated by law to the District of Columbia.[5] Appellants' argument that under D.C.Code 1973, § 18-308 (the anti-lapse statute) the lapsed share should pass to the residuary clause and thence to the remaining tenants in common is not convincing. *384 Although it is now settled that § 18-308 does apply to gifts in residuary clauses,[6]In re Estate of Kerr, supra, 139 U.S.App.D.C. at 325, 433 F.2d at 483, the lapsed share in this case was already in a residuary clause containing clear language that the testator did not wish the issue of the residuary legatees to take under the will and lacking any direction that the lapsed bequest be divided among the remaining legatees.[7] Furthermore, the anti-lapse statute does not apply when vesting of a gift is conditioned on surviving the testator, as was explicitly the case here. In re Estate of Kerr, supra at 326, 433 F.2d at 484. As we find appellants' other arguments for reversal unpersuasive, the order on appeal is Affirmed. NOTES [1] The decedent had no heirs. Gifts to his "nieces" and "nephews" were to his wife's relatives, who do not take under the intestacy statute. D.C.Code 1973, § 19-309, et seq. [2] 104 Wash.D.L.Rep. 172 at 1525 (Sept. 2, 1976). [3] D.C.Code 1973, § 18-308 provides: Unless a different disposition is made or required by the will, if a devisee or legatee dies before the testator, leaving issue who survive the testator, the issue shall take the estate devised or bequeathed as the devisee or legatee would have done if he had survived the testator. Unless a contrary intention appears by the will, the property comprised in a devise or bequest in a will that fails or is void or is otherwise incapable of taking effect, shall be deemed included in the residuary devise or bequest, if any, contained in the will. [4] The current equivalent of this section is D.C. Code 1973, § 18-302. This court has recently held § 18-302 unconstitutional as a violation of both due process and equal protection principles. Estate of French v. Doyle, D.C.App., 365 A.2d 621 (1976), cert. granted, ___ U.S. ___, 97 S.Ct. 2917, 53 L.Ed.2d 1058 (No. 76-1057, 1977 Term). [5] None of the cases cited by appellants for the proposition that George Washington University has been so eroded as to no longer be authoritative are persuasive. [6] The court in George Washington University followed the common law rule that anti-lapsed statutes do not apply to residuary clauses. This does not affect either the applicability of that case to ours or our holding, for the reason that our testator explicitly directed that the share in question shall lapse, thus precluding passage to the legatees' heirs. [7] If the first sentence of § 18-308 were to apply, it would operate to pass Dr. Roberts' share to his heirs, not to the other residuary legatees, a construction urged neither by the heirs nor any of the parties. | Low | [
0.49885057471264305,
27.125,
27.25
] |
Surfer Stripe Backpack by Room It Up Item# TC6184AN $30.99 Product Description Are you tired of those plain single colored run of the mill backpacks? If you answered yes then we have a bag for you. This Room It Up Surfer Stripe Backpack uses a fun pattern and colors that make you want to sling it over your shoulder. The backpack is made of 100% polyester and measure approximately 13" wide x 18" high. It has a padded back and shoulder straps for your comfort. Their is a front exterior zipper pocket and inner pockets for plenty of storage for little items. | Mid | [
0.611398963730569,
29.5,
18.75
] |
Inside every living cell are molecule-building factories called ribosomes. These tiny machines read blueprints of genetic information and fabricate the molecules that make up all life. They are hugely important to genetic engineers and researchers, because controlling ribosomes could be the way to synthesize the custom-made biological nano-machines of the future—ones that could make anything from therapeutic human antibodies to the next generation of unfathomably complex super-materials. There's a problem: Engineering a ribosome to do interesting tricks often means paralyzing and killing its parent cell. But today, a team of biologists and biological engineers at Northwestern University and the University of Illinois have made a fascinating breakthrough that could help scientists get around this roadblock. As they report in a new study in the journal Nature, the scientists have created unique, experimental ribosomes they're calling Ribo-T that are the first ever to passively co-exist with a living cell's natural ribosomes. It means that for the first time, researchers will be able to tinker with ribosomes in living organisms, such as bacteria, without worrying about killing the lifeforms they're studying. "You can think of it like this: Imagine you only have one family car and you want to start modifying it, say, putting a truck bed in," says Alexander Mankin, a biologist with the team at the University of Illinois. "With each modification, you risk breaking down important processes, like losing the back seat your kids need. This is the same with these ribosomes. But here, [having Ribo-T] is a bit like having two cars, instead of one." So you can modify Ribo-T in any way you want without worrying about destroying the whole setup, he says. The genetic lasso What makes ribosomes so hard to work with is their fundamentally weird nature. Here's an oversimplification of the strange setup: In all living cells, ribosomes are broken up into two independently floating parts. There's a smaller "reader" half of a ribosome, which attaches to a strip of genetic data, and a larger half that assembles the molecules. Each cell is a sea of ribosomes halves. Those halves randomly join together to read and create a molecule, then split up and promiscuously recouple with totally different halves. Based on what we know about cell biology, this really shouldn't have worked. According to Mankin, that two-parted nature has made genetically engineering these molecules machines almost impossible. You either genetically engineer the whole sea, or nothing at all. But Mankin and his fellow scientists had an idea, one that totally went against what scientists thought they understood about ribosomes. Why not just tie the two halves of certain ribosomes together indefinitely? Based on what we know about cell biology, this really shouldn't have worked. The reason is that the two ribosome halves need to move around relative to each other as they built molecules, which a tether might prevent. Researchers also didn't know how such a tied-together ribosome would find the strips of genetic data blueprints it reads. For the most part, it didn't work. Mankin and his colleagues tried to tie the ribosome halves together tethers of basically nonsense sticky RNA. They tried 91 different combinations, and most of them failed. A few of them worked, albeit it very poorly. But here's where the team did something really clever: They let a cutthroat competition decide which tether was best. By joining the RNA of the large and small ribosomal subunits into a unique chimaeric molecule, it was possible to engineer functional ribosome with tethered ribosomal subunits (Ribo-T) Eric Carlson The researchers were thinking that the length of the tethers might impact how well the combined ribosomes were able to function, since the ribosome halves need to shift around without breaking their connection. So Mankin and his team genetically engineered a handful of bacteria with tied-together ribosomes, each with different tether lengths. Then the scientists let them compete on a petri dish with limited food for two days to see which bacteria out-competed the rest. "This way the cells told us themselves what was the best ribosome tether design in the smorgasbord of options we offered," he says. In the end, bacteria with two sticky tethers 8 and 9 RNA nucleotides long was the champion. Having found the optimal length, the scientists did one last round of bacterial gladiator battle to se whether—with enough time—some bacteria might spontaneously evolve some trait that would make the combined ribosomes more efficient. "After several dozens of generations, a bacteria did," Mankin says, and it dominated a different petri dish with more gusto than any other strain. (Exactly why this random mutation allowed a bacterial with a combined ribosome to grow faster is still a mystery, he says.) Scaffolds for the science of the future "The answers to these questions will illuminate the basic mechanisms of molecule creation." Finally, Mankin and his team had created a combined and tethered ribosome that works surprisingly well: Ribo-T. A bacterial cell using only Ribo-T ribosomes will grow normally, but at about 45 percent the speed of a non-engineered cell. Joseph Puglisi, a biologist at Stanford University who was not involved with the project, says that figure is actually damned impressive. In an essay accompanying the Nature paper, Puglisi confirms that Ribo-T, while a bit slower, can create any of the molecules a normal ribosome can make. That makes Ribo-T—which can be genetically created to appear alongside a population of normal, halved ribosomes—the perfect scaffold for a new wave of genetic engineering experiments. Better still, Puglisi says, because we now have the first platform where we can test and tinker with truly delicate and crucial ribosomal features (without worrying about killing our experiment), Ribo-T may offer new insights into the mysterious inner-workings of the ribosome—which, as Mankin admits, is still poorly understood. We can now ask basic questions like why ribosomes seem unable to create certain types of molecules. "The answers to these questions will illuminate the basic mechanisms [of molecule creation] and will probably cause surprise," Puglisi says. "Armed with this knowledge, thoughtful engineers will continue to tinker with the ribosome. This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io | High | [
0.6769230769230771,
33,
15.75
] |
Johnny Stenbäck Johnny Stenbäck is a Finnish Software Engineer mostly known for his work on the Mozilla browser. Johnny was one of the first developers outside Netscape to get involved with the Mozilla source released by Netscape in March 1998. He started working on the source code soon after the release, then working for the Finnish software company Citec. (Citec created DocZilla, a Mozilla-based SGML browser.) In 2000 he was hired by Netscape and moved to California. In 2003 he joined the Mozilla Foundation. Currently, Johnny Stenbäck is current working at Google. Publications Co-author of "Extending Mozilla or How to Do the Impossible", which was originally prepared as a tutorial for Xtech'99. Editor of Document Object Model (DOM) Level 2 HTML Specification, a W3C Recommendation. Category:Mozilla developers Category:Free software programmers Category:Open source people Category:Computer programmers Category:Living people Category:Finnish computer programmers Category:Year of birth missing (living people) | Mid | [
0.6224489795918361,
30.5,
18.5
] |
Lisk (LSK) Lisk (LSK) Review – Crypto Coin Judge From the past few years, Cryptocurrencies has been gaining more and more grounds as compared to fiat currency market. Although, the world biggies have been seen speaking against it, but fact is undeniable that Cryptocurrency is emerging to dominate the market. Much has been talked and heard of Bitcoin (the largely accepted Crypto coin), but there is one less-known, yet fast enlarging Cryptocurrency – Lisk. The market specialists say, there is something different and unique about it. Why not find out then? Lisk Analysis – What is Lisk all about? Blockchain technology is taking an edge over everything that has ruled the IT market so far. It is a new era, changing the outlook of people for good. Lisk, an online platform, is committed to enabling developers to create Blockchain Applications with their individual Sidechains. Lisk is an open source platform. Being forked from ‘Crypti,’ it was launched in early 2016, by Olivier Beddows and Max Kordek. It has been built using Nodes, thereby it is the fastest suite, data streaming enabled, easily available, real-time features, a perfect solution for all types of database queries, easy on coding and NPM (Node Package Manager) dynamic. To join Lisk, all you are supposed to do is create an account with it and download its wallet. As other blockchains, The platform has coined its own in-platform Cryptocurrency, named LSK, for all sorts of transactions within the platform. Despite the market being saturated, Lisk has been enjoying quite a steady and satisfactory market capitalization. As of December 18th, 2017, Lisk is priced at $14.64. Do you know why LSK is often weighed against Ethereum? It is because the both are based on Blockchain, Smart Contracts technology that enable developers to develop and design DApps as per their respective areas. This is how LISK works – The key objective of it is to simplify the process for developers while they create good and effective decentralized applications. Thereby, followings are the steps – Coding: JavaScript is the only and prime ground on which Lisk creates decentralized Blockchain applications in order to make the most of its influential APIs. The platform allows each App run on its own, respective sidechain, which further ensures that the platform is secure and scalable. Deployment: Unlike many other Blockchain platforms, Lisk is enabled with multiple storage options for Blockchain applications. Creators are allowed to use .zip for code deployment for services such as Web server and Github. As soon as the code is deployed, the platform gets available for the developer to register applications by giving out some details such as tags, descriptions, download link and name only. Finally, use: The minute applications are good to be launched, it starts functioning as decentralized authority for that particular application. With help of their extensive user-base, Lisk allows its developers or end users to discover third party nodes and then implement future Blockchain applications via servers worldwide in a genuine decentralized manner. Do not fret over as the application will be secured by decentralized code computation worldwide. The platform has been designed on DPoS (Delegated proof of work) algos, initially crafted by BitShares. You can as well call it a different level of PoS Blockchain to rank in Top 101 delegates as it forges and secures network actively and continually. Here is how you can use Lisk conveniently and efficiently – As already told, it is an open source, direct Blockchain platform with simple six joining steps mentioned below: #Step 1 Get an account created: Once you are done filling-in your personal credentials, you will receive a password. Then, you have to download Lisk wallet to finally launch the application. #Step 2 Time to avail LSK Tokens: Its ecosystem is powered by LSK tokens. All the activities on this network are powered by LSK, considered a rising Altcoin. World’s all major Cryptocurrency exchanges provide LSK. For example, Bittrex and Poloniex – they both have enlisted this Altcoin. #Step 3 Custom your account: One you register yourself on Lisk, you are allowed to custom-add features to your account. For example, users can add two-factor-authentication in order to protect access to the account. #Step 4 Make the most of tools available: Lisk is featured with most amazing tools for users to maximize their profits. Go to Blockchain Explorer to find the tools. #Step 5 Get set go: Know that this Blockchain-enabled platform is concentrated around Community Growth and Experience. This is the only Blockchain platform where users not only just keep in line with the network, but also be engaged in the growth and virtue of the network. Getting together with the community, users actually do contribute to Lisk’s rise and expansion. #Step 6 Start the development: Using the platform would be more viable if you have expertise in Javascript. You can actually start developing decentralized applications right after launching Lisk on your system. It has an amazing compilation of APIs, which further help the developers with adequate documentation. Little do you know that their developers are as well available for other open source platforms such as Docker and Linux. It schedules regular meetings where developer gets to discuss their project and issues and also interact with the experienced for quick and efficient solutions. What is Lisk’s new innovation? By creating a framework in the most used and popular Javascript, the team of Lisk has evidently planned to be open for more and more developers as they want innovative applications to be built on Blockchain technology. In the past few years, numbers of organizations, companies and insitutions have actually shown interest in adopting and integrating blokchain technology into their system, but finding a suitable resource and reasonable costing has truly been a challenge. With the launch of this platform onto the market, developers get a readymade infrastructure. Today, instead of writing Blockchain codes themselves, developers are getting to custom-develop, market-specific application that will then work on Lisk’s main Blockchain Network. If you are thinking, this platform is what it is now, you are wrong. There are many more plans in the pipeline and to your surprise, they are considering to be more user-friendly in its approach to the mass. In the month of May, 2016, Lisk went Live with its very individual cryptocoin named LSK to support crowdfunding for their on-going projects. In addition to this, LSK is also being used as transactions and fees within its ecosystem. What problem Lisk is solving and how? Lisk claims to be a ‘modular’ cyprocoin – It has been branding itself as the first modular Cryptocoin using sidechains. This means more efficient and successful ICOs. Lisk already enjoys development and compatibility with DApp sidechain – The network brands itself as the most potential Blockchain network because of its modular cryptocoin. Proof of Stake, delegated – Contrasting with Proof of Work (PoW) models, the programmers are enabled to implement any new model for Cryptocurrency generation, which is to sustain here as well as ecological and autonomous. How is Lisk different and better than other solutions, i.e. Bitcoin and Ethereum? Quite similar to many other cryptos such as MaidSafeCoin, MonaCoin, NEM, OmiseGo, BitShares, Cardano, the network is although associated with Cryptocurrency, but primarily it is DApp development platform. To participate, programmer uses LSK token to make all sorts of transactions within its platform and also pay fees with LSK. It has a much boarder and efficient framkework to support better DApps development. On the other hand, Bitcoin has been formed as a stand-alone virtual currency, which is used and accessible worldwide. How stronger Lisk stands against Ethereum? Just as Ethereum, Lisk is as well a platform to develop DApps. As opposed to Ethereum, this Altcoin does not require many programmers to learn the strength of its programming language, but it is completely grounded on Javascript which is pretty much populat and is being used by the most. What is sidechain in LISK? Most Blockchain application developments are concentrated around single Blockchain or it calls for a customized, private Blockchain network. DApps programmed with this network can be used on their individual sidechain, which is a flexible substitute integrated with Lisk’s main Blockchain infrastructure. The best part of developing applications on your own sidechain is that developers enjoy full control over the coding and deployment. How LISK is mined? LSK is mined with Eobot. Eobot, as most of us have no idea about, is the simplest, affordable and most efficient means to mine LSK. Did you know you can actually hash LSK with cloud mining as well? Other than this, programmer can also utilize GPU or CPU for Scrypt or SHA-256, a computer or as many computers to get instant mining results. How to get Lisk wallet? Finding your way to Lisk.io, which brands itself one of the most propitious Blockchain application platforms, you are just a few steps away from becoming its authorized member. Unlike other Blockchain networks, Lisk being an open source platform, has made registration and wallet setup really easy for its prospects. Below are two steps by following which you can quickly setup LSK wallet – Step 1 – Create an account on Lisk On starting into LSK, you find the LSK Nano Sign-in page. If you are new to the platform, there is a radio button ‘New account’ Login at the right bottom of the page. Click to create a new account. In the process, all you will be asked to input are your personal details including contact address and number. Once you are done, you will be given a passphrase aka password that you are supposed to use everytime, you attempt to Sign-in to LSK. Step 2 – Download the LSK Nano wallet Once you are done authorizing yourself on LSK, you are given direct access to download LSK Nano Wallet to then run it successfully. You might again need to sign-in yourself with LSK Nano Wallet to avail a new address, Peet Network and see balance. In case, you already hold some of LSK to your Bittrex account, start moving them all to your new address. If everything goes well, mean now you have your LSK secured in local LSK wallet. How can you buy LSK? Step 1 – Visit the LSK official website and download LSK Nano Wallet. Step 2 – Now, the installation file needs to be run. Step 3 – Click to open the LSK Nano wallet locally and click to create a new account. Step 4 – Well, this part is a bit fun. Once your credential are verified, create a passphrase just by moving your mouse around. On doing it successfully, a 12 digit passphrase will be generated. Copy this to your primary email or anywhere else safe and secure because you can’t lose it anyway. Step 5 – Now you will be prompted with log-in page. Log-in to open your wallet. Step 6 – Once you log-in, you will be given an address, Peer Network and show the balance as well. Step 7 – Now, the situation varies based on your financial possession. If you already hold Bitcoin, you can exchange it with LSK, or else first you have to buy Bitcoin to then exchange it with LSK. To buy bitcoin, you have to go through renowned and reliable Bitcoin Exchange, such as Coinbase or CEX.IO. LISK Vs Bitcoin: Difference that many were unaware of While Bitcoin is just a currency, Lisk serves as the both – a Blockchain-enabled platform as well as a currency, abbreviated as follows – LSK. Undoubtedly, Bitcoin is leading the league of Cryptocurrencies, but Lisk makes a smart investment choice when it comes to small-scale enterprise solutions and proving effective as well. Lisk is incentivizing user behavior in a great way. LSK and how well has it managed to be on the News from the past few days– NEWS 1. MARKET SAGES SAY, LSK TO HIT A NEW HIKE IN NEAR FUTURE – Despite the Cryptocurrency pool being already saturated or LSK being almost a new coin in the industry, this coin is succeeding at widening its acceptance worldwide. Its development team is having quite a positive and bright notion about the coin in 2018. Being built in Javascript, LSK has language choice for individual construction App. Well, to add one more to its many advantages, LSK is setup on sidechains, which sets it apart from all other leading Cryptocurrencies and for it is different to Public Ledger, blockchain. LSK is run in modules that eradicates the chances of bloating unlike other virtual coins. NEWS 2. LISK LOSES QUITE OF ITS LUSTER, BUT THE FUTURE STILL LIGHTS BRIGHT – Being launched and circulated in 2016, the coin has quietly experienced a bitcoin-like surge. It’s no more than 1.5 years, however the coin is facing frequent fluctuations in its value and the credit goes to its marketing department. Looking at the record from past few weeks, LSK has reportedly lost quite its Lusters as the original Blockchain value hiked above $11, 000 for the first time, but just as Bitcoin faces quick surge immediately after a fall, the development team ensures the same with LSK as well, for it being a moduler Cryptocurrency based on sidechains. Price prediction of LSK for 2018 There has been much speculations over ‘should you really invest in LSK by the coming year or not?’ LSK proves to be a brilliant long-term investment-vehicle. Typically, LSK predictions are updated in every quarter of the year, backed by technical analysis and market . According to Walletinvestor.com, investing in LSK will prove better with good, infact higher return. Priced at $14.64 as of 18/12/2017, LSK gives the adopters a bigger and cent percent positive opportunity to expect long-term surge. Put simply, if you are considering investing in an Altcoin, LSK does make a smart choice. Note* Crypto values are dynamic. Google for updates! A quick insight into Lisk and its profit potentials Branding itself as the “first modular Cryptocurrency that uses sidechains,” LSK is concentrated around involving ‘modules,’ which act as the infrastructure for its building and designs. LSK’s overall design is what is considered as ‘Trump Card,’ allowing programmers to utilize the ‘design block’ while developing their individual DApps (Decentralized Applications). For it being coded in Javascript, users get choice of language for application to develop. And, as Javascript is a popular programming language, the applicability value is always thought to be higher. Be the first one to know about new Crypto Coins. Submit your information here! Recommended Reading Trading Cryptocurrency CFDs is a leveraged product and therefore risky. Please ensure you understand the risks involved as you could lose all your account funds. Disclaimer Cryptocoinjudge.com is only a website offering information - not a regulated broker or investment adviser, and none of the information is intended to guarantee future results. All the analyses and reviews are personal opinions of the author. Cryptocoinjudge.com is in no way responsible for any claims, losses or expenses that may result by following our advice. Cryptocoinjudge.com has financial relationships with some of the products and services mentioned on this website, and cryptocoinjudge.com can get compensation for making reviews, if consumers choose to click these links in our content or in any other way possible. By using this website you agree with the limitations and exclusions of liability set out in this disclaimer. If you do not agree with them, you must not use this website. | Mid | [
0.602015113350125,
29.875,
19.75
] |
[email protected] - 30 May 2007 Getting More from VMs As technology components get more powerful, we're going to start seeing a tidal wave of virtualization. I was happy to read Michael Otey's Top 10: "Tips for Virtual Server 2005" (February 2007, InstantDoc ID 94289), and I understand that 10 is the new 7, but I want to suggest a few more tips for getting the most out of virtual machines (VMs). One, look at the hardware settings for your VM and remove or disable any hardware components you don't need. Floppy devices, USB controllers (currently supported only in VMware), serial ports, and parallel ports are all devices that you might not need—at least not full-time. You can also set things like the optical drive to not connect on startup. These devices can take up virtual CPU cycles from the system for maintenance. Two, you could also change the performance settings of the guest Windows OSs. On the Advanced tab of System Properties, select Performance, Settings. Set to "Adjust for best performance." Unless you write magazine articles, give public presentations, or prepare corporate documentation and need screenshots to match exactly what the audience will use, turn off the cute and glitz. Doing so affords performance gains especially in Windows Vista and also isn't a bad idea in general for production servers. Three, disable the screen saver! Four, reduce the color depth of your display and remove the desktop background. As CPUs speed up and incorporate their own virtualization enhancements, it might not seem necessary to eke out these last CPU cycles, but we could all use a little more conservation in many aspects of our lives. —Rick Stromberg Saving Vista Backup Image Files I have a question for Ed Roth regarding his article "Vista's New Backup and Recovery Technologies" (April 2007, InstantDoc ID 95240). In the article, Ed states that, using Windows Complete PC Backup and Restore, "You can save the backup image files on local hard disks, DVD-R media, and network shares in which the share is specified as a Universal Naming Convention (UNC) path." I don't see the network shares option. Can Ed please explain how that is possible? —Jeff Sears For some reason, Microsoft won't allow you to specify a UNC target location for Complete PC Backup and Restore by using the GUI. The only way I know of to save your Complete Backup image to a network share is to use the WBAdmin utility, as I discussed in the article. I've heard of some odd permissions issues when saving backups to network shares on older OSs, but I didn't experience any trouble in Windows Server 2003 or Windows 2000 Server.—Ed Roth Edge Transport Servers as Domain Members In his article "Backing Up Exchange Server 2007" (May 2007, InstantDoc ID 95527), Brien Posey states that an Exchange 2007 Edge Transport server can't be a domain member because it uses Active Directory Application Mode (ADAM) to give it a local directory replica. This isn't correct. An Edge Transport server can in fact be a domain member. Heck, even Microsoft IT adds each of its six Edge Transport servers to a dedicated AD forest in the perimeter network. This makes it easier to manage the servers and plays better with MOM. I agree that you should never add an Edge Transport server to the corporate forest on the internal network, but that's another thing. —Henrik Walther Thanks for your feedback, Henrik. The sentence you refer to, "More precisely, the Edge Transport role can't be a domain member, and it uses Active Directory Application Mode (ADAM) to give it a local directory replica," should instead state, "The Edge Transport server should be placed into a dedicated forest and must not be a member of your production forest."—Brien Posey The 64-Bit Question Paul Robichaux omitted one major piece of information in his reply to Bill Baltas in [email protected], "Exchange 2003 or 2007: How to Choose?" (April 2007, InstantDoc ID 95380), which is that Exchange 2007 requires a 64-bit OS. Even with Windows 32-bit on Windows 64-bit (WOW64), many drivers or applications won't install or run correctly. The jump from 32-bit to 64-bit is no less a challenge for the user community than moving from DOS to Windows NT was in the early 1990s. It took Microsoft seven years to release a 32-bit OS after the first 32-bit platform was introduced. To quote Paul Robichaux: "This is incomprehensible, given how long the public beta was available." I've had to borrow machines to test 64-bit Vista with my company's applications. Our development machines can load Vista (barely), but without network drivers or video over 800 X 600, I can't adequately test it. My point is that it's hard enough to make development changes to support Vista, but to also have to support a 64-bit alternative? That is incomprehensible. —David Kermott | Low | [
0.5088105726872241,
28.875,
27.875
] |
Q: CallLog not giving the correct NUMBER value (Number dialled) I'm using CallLog, and setting one of my variables to the CACHED_NAME of the contact who the user dialled. This works fine, but in the event that the user dials a number which is not in their contacts I would like it to instead set the variable to the NUMBER value. For some reason when I do this I get results as single digit integers, such as "1" or "7". Here is my code: Uri allCalls = Uri.parse("content://call_log/calls"); String sortOrder = CallLog.Calls.DATE; Cursor c = managedQuery(allCalls, null, null, null, sortOrder); while (c.moveToNext()) { int callType = Integer.parseInt(c.getString(c .getColumnIndex(CallLog.Calls.TYPE))); long date = c.getLong(c.getColumnIndex(Calls.DATE)); String col1; if (callType == CallLog.Calls.OUTGOING_TYPE && date > resetDate) { col1 = c.getString(c.getColumnIndex(Calls.CACHED_NAME)); // if there is no cached name, get the number if (col1 == null) { col1 = String.valueOf(c.getLong(c .getColumnIndex(Calls.NUMBER))); } Am I right in saying that the value for NUMBER should be the phone number that the user dialled? I know that everything is correct except for the last line where I set col1 to the number value. Any ideas? A: You are using getLong for the phone number when you should be using getString: col1 = c.getString(c.getColumnIndex(Calls.CACHED_NAME)); // if there is no cached name, get the number if (col1 == null) { col1 = String.valueOf(c.getString(c .getColumnIndex(Calls.NUMBER))); } | High | [
0.681638044914134,
32.25,
15.0625
] |
965 F.2d 1064 NOTICE: Federal Circuit Local Rule 47.8(b) states that opinions and orders which are designated as not citable as precedent shall not be employed or cited as precedent. This does not preclude assertion of issues of claim preclusion, issue preclusion, judicial estoppel, law of the case or the like based on a decision of the Court rendered in a nonprecedential opinion or order.Alvin J. HEY, Petitioner,v.UNITED STATES POSTAL SERVICE, Respondent. No. 91-3570. United States Court of Appeals, Federal Circuit. April 14, 1992. 1 On Appeal from the Merit Systems Protection Board in Case No. BN07529110157. MSPB 2 AFFIRMED. Judgment 3 (PLAGER, Circuit Judge, BENNETT, Senior Judge, and LOURIE, Circuit Judge). PER CURIAM 4 AFFIRMED. See Fed.Cir.R. 36. | Mid | [
0.619718309859154,
38.5,
23.625
] |
Trump savors his first great victory thanks to his fiscal reform The approval by the Senate of the fiscal reform has allowed President Donald Trump to add today his first great victory after almost a year occupying the White House, in which until now he had not been able to fulfill any of his great electoral promises. Despite having a majority in the two chambers of Congress, in his first months in office the president had received a real lesson from what in the eighties was called “Realpolitik” that led him to discover that it is not enough win the elections to be able to govern. For this reason, it is not surprising that Trump, who in the early hours of today thanked his co-religionists for their “commitment”, will soon take credit for the fact that the tax reform has passed this penultimate obstacle, before it is unified with the version of the House of Representatives, and may be vetoed. “We have to use the word ‘rebate.’ I told everyone that reform may be that taxes go up,” said a plump Trump during a fundraising event held today in New York in which he explained his arguments to convince the republican bancada of the need to give the go-ahead to his proposal. For its part, the White House also welcomed the approval of the tax reform through a statement in which he described the project as “a unique opportunity in life to claim the great destiny of the United States.” But his approval was far from being a path of roses. However, the project was approved at dawn, after a long day of negotiations and concessions by the hard core of Trump to his fellow Republicans, since the meager majority of conservatives in the Upper House seemed insufficient in case produce more than one dissidence. The only vote against the Republican caucus, issued by Senator Bob Corker, and all opposition lawmakers were not enough to bring down a tax cut that has come to be qualified by the leader of the Democratic minority in the House of Representatives. Representatives, Nancy Pelosi, of “betrayal” of the middle class. The possibility that the project might not move forward made the Republican Party fear that the situation could be repeated last summer, when Trump was not able to join the necessary support among his own party colleagues to repeal the health law known as Obamacare. . During the electoral campaign of last year, the now president had attacked with vehemence this health law, considering that it deprived Americans of their freedom of choice and promised to end it as soon as he occupied the Oval Office. However, Trump discovered on the basis of successive defeats in Congress, that the once unpopular law promoted by former President Barack Obama (2009-2017) had gained in recent years enough support for many Republican legislators to be against their repeal for fear of having to pay a high electoral price in the future. As happened with Obamacare, the president had not yet obtained the necessary support to make other big electoral promises, such as the construction of a wall on the border with Mexico or other measures to toughen the entry of emigrants, through decrees that were overturned by different courts because they were considered unconstitutional. And when it was not the lack of political support, it was the lack of political expertise on the part of his Cabinet that made the populist president’s base doubt his ability to fulfill his commitments. A clear example has been his promise to drain “the swamp” in which, according to Trump, Washington’s political class had become, always open to partisan interests and the privileges that come with being part of the Administration. But far from doing it, Trump has had to see how several of the main members of his Cabinet have been accused of abusing the privileges that come with their positions. Especially striking was the wave of accusations received in September by various secretaries of the Executive for their abuse in the use of private flights and ended up costing the charge to the head of the portfolio of Health, Tom Price All these clouds that darkened the sky of the presidency seem to have dissipated, at least a little, after the Republican victory in the Senate this dawn, which has been the first great triumph of Trump. | Mid | [
0.591743119266055,
32.25,
22.25
] |
Should We Really Expect Anything Else? Recently, a correspondent for the Guardian newspaper in the UK visited the Creation Museum. We gave him the privileges and respect we normally give to media representatives, and we also allowed him to interview one of AiG’s PhD scientists, Dr. Andrew Snelling. His piece was published on the Guardian newspaper website. As of the writing of this blog post, it has not appeared in the print edition of the Guardian. As we have come to expect from the largely anti-God media in the United Kingdom, the reporter misrepresented the Creation Museum in his mocking piece. I have always maintained that many of these reporters, especially from the UK, have basically written their article before they come—they just visit to add what they believe is some authenticity to their intended slam against Christianity. He is an admitted atheist, which we knew before he visited. I have reprinted the article below and made comments throughout. ‘We don’t have to be afraid of the real evidence’—Creation Museum A trip to the Creation Museum seems like harmless fun until you see the eager schoolchildren streaming through its doors The secularists really hate to see children being influenced by biblical creationists. There are many blogs and twitter posts by atheists who are really upset anytime they hear about children being taught the truth of God’s Word in Genesis. It is interesting that this journalist, in the title, wrote about “schoolchildren streaming through its doors.” To many people, this would seem to imply great groups of kids from public schools streaming into the Creation Museum—we wish that were so. On the contrary, we receive virtually no visits by public school groups (but they all visit the secular museums). There are some youth groups from churches that come to the Creation Museum, and Christian schools will bring their students from time to time—but lots of families with their children do visit. I’ve talked to a number of theoretical physicists during my tour of America, and often the subject of parallel universes has come up. This week I actually got to visit one, when I spent a disorientating afternoon in Petersburg, Kentucky, at the Creation Museum. The Creation Museum bills itself as a natural history museum, but it’s one from a world in which we are certain that God created the Earth and everything in it, roughly 6,000 years ago, and all in six days. Anything that looks older—fossilised dinosaur bones, multiple strata of sedimentary rock, signs of ancient water erosion and the moving of the continents—were all caused by one catastrophic event, the flood that Noah and his family so adroitly survived by building a massive floating menagerie. Well, God certainly created the original world and its life about six thousand years ago according to the Bible’s history. It is important to understand that everything in the world today was not as it was originally. Before sin, there was no death! Sin and the Curse have changed the world. The Flood of Noah’s day also changed the world. In addition, the Tower of Babel changed the history of the human race in many ways. We certainly believe that most (not all) of the sedimentary layers containing fossils were laid down by the Flood of Noah’s day about 4,300 years ago. However, there has also been post-Flood catastrophism, associated with the Ice Age and also other local catastrophic events. This is nothing you wouldn’t see or hear in your average fundamentalist church, but what makes the Creation Museum different, and controversial, is that it promotes the idea that not only is everything stated in Genesis chapters 1–11 true, but it can be proved … with science. Nowhere at the Creation Museum do we say that we can “prove” the Genesis account by science. We certainly illustrate how observational science confirms the Bible’s account of history. And we also help people understand the difference between observational science (which we rely on to build our technology, for example, and which we all agree on), and historical science (beliefs concerning the past). One cannot “prove” historical science because it has to do with the past when we were not there. This correspondent has certainly misrepresented what is taught at the Creation Museum. And the museum has teams of qualified palaeontologists, geologists, biologists and historians working on this. Oh, and baraminologists too. You haven’t heard of them? Neither had I. I wish we did have “teams” of qualified scientists! We have a few PhD scientists working full time at Answers in Genesis, and we do work with other PhD scientists who have secular jobs and help us in our research, but we have only a fraction of scientists working on research compared to the secular world. However, even with this small group of scientists, they have accomplished a tremendous amount—particularly when one realizes how worried the secularists are about this one Creation Museum compared to the thousands of secular museums that push evolution and millions of years as fact. For anyone not familiar with the early parts of the Bible, these be the facts: God created everything in six 24-hour days; Adam and Eve were the first humans; all the bad stuff in the world, from murder to animals eating other animals, is a result of Eve’s choice of afternoon snack; Noah built an ark to house two of every kind of land-dwelling animal (including dinosaurs) and his extended family, while God wiped everything clean with a worldwide flood; then God linguistically confused Noah’s descendants and dispersed them around the world with the Tower of Babel incident. Well, the journalist used a mocking tone, as any reader can tell. But again, he either deliberately misrepresented or did not understand or did not take the time to understand the account in Genesis correctly. For instance, the “bad stuff in the world” did not result from “Eve’s choice of afternoon snack” (note his mocking, sarcastic tone). The Bible makes it clear that Adam took the fruit from the forbidden tree, then sin entered the world and death by sin (Romans 5:12). The Bible tells us that Eve was deceived, but Adam sinned. Adam was the head of the human race, and it was Adam who was instructed not to eat the fruit (as a test of obedience). The Creation Museum was founded by the organisation Answers in Genesis, led by the Australian fundamentalist Ken Ham. The word “fundamentalist” today is used in a derogatory way by anti-Christians. Yes, I believe in the fundamentals of the Christian faith, but we all know the journalist used this term to imply something negative. I deliberately don’t use the term “fundamentalist” when talking about myself or others associated with AiG because it has become a loaded term (although decades ago that was not the case). It first opened in May 2007, and on the day I was visiting it was celebrating its 5th anniversary. In those five years over a million people have been through its doors, many, if my visit was anything to go by, on school trips. The site is huge, housing both the museum and the headquarters of Answers in Genesis, and provides employment for over 300 people. The museum is entirely privately funded. Despite the erroneous claim to be a natural history museum, the displays of fossils, including casts of many famous examples such as anarchaeopteryx and Lucy the Australopithecine soon give way to expensively mounted dioramas telling the biblical story of creation. There’s also a section where a world that has abandoned God is depicted—picture a Disneyfied crack den where vulnerable teenagers watch porn and consider abortions. It is interesting to see how he portrayed the exhibit we call the “Culture in Crisis” room. We show a church with a wrecking ball called “millions of years” hitting the foundation of the church. Inside the church, a family is listening to a pastor preach that Christians can believe in millions of years and evolution and add them to the Bible. The point we make is that the pastor is undermining the authority of the Word of God and that this really does affect how the next generation views Scripture. Then we depict teenagers of this family inside their home. A girl is on the phone wanting to line up an abortion, and the guys are looking at a computer to find pornography and are also using drugs. It is all very tastefully done. In the context of the exhibit, museum guests understand the point—that when young people no longer believe the authority of God’s Word, they will begin to become just like world, where everyone does what is right in their own eyes. Any actual attempts to present “science” inevitably have a creationist slant. A display on evolution suggests that “Although often viewed as an icon of evolution, Darwin’s finches serve as a perfect model of variation within a created kind Genesis 1:21 we learn that God created ‘every winged bird according to its kind’.” Those baraminologists interpret “kind” to mean “species”. Actually, in most instances, based on the research creation biologists have done, we would say that “kind” is more at the “family” level of classification. In the “Starting Points” room, near the beginning of the Creation Museum walk through, we explain that there are two starting points (God’s Word and man’s word) that people use to develop their worldview, and that is then used to interpret the evidence of the present in relation to the past. Certainly, we admit right at the start of the museum that we unashamedly build our thinking on God’s Word. Then we also show how observational science confirms over and over again that this is the correct starting point. While at the museum I spent some time talking to geologist Andrew Snelling. Another Australian, Snelling has a PhD in geology from theUniversity of Sydney and worked in various capacities for the Australian mining industry before getting into “creation science” full time, first for the Texas-based Institute for Creation Research, and then since 2007 for Answers in Genesis and the Creation Museum. I mention to Andrew that I’m surprised to see animatronic models and fossils of dinosaurs around the museum. “They were real, we have their bones … in fact the Bible even potentially describes creatures that were dinosaurs. We don’t have to be afraid of the real evidence,” he says. “We’re looking at the fossil record—instead of being the order of creatures living and dying and evolving over millions of years—as the burial order during the flood. In other words, dinosaurs were alive during the pre-flood Earth. So were trilobites, so were people.” When I ask him how his background in geology is being used here, he tells me of his fieldwork at the Grand Canyon. “In my research I’ve been involved in sampling rocks, sending them to laboratories, where analysis is done on radio isotopes,” he says. “What we always emphasise is this: we all have the same rocks, the same fossils, the same evidence … We all have the same geological maps … As we emphasise in the museum it’s your starting point.” This is a point that’s made over and over, to the extent that it begins to sound reasonable. Their mantra is, “Hey, we’re all doing science here, there’s just a disagreement about the age.” His first sentence makes me wonder if even for a moment the man started to realize the difference between observational science and historical science. He quoted Andrew discussing the two different starting points, but then his sentence about our supposed “mantra” went against what he stated above. It’s not just a matter of “age”—it’s a matter of starting points! Creation science has a big problem with orthodox radiometric dating and carbon dating. They also use the example of the 1980 Mount St Helens eruption and subsequent pyroclastic flow to show how both the formation of the Grand Canyon and the tectonic shift of the continents could have happened in seconds during the flood, rather than over millions of years. We believe that the formation of layers of sedimentary rock and the formation of the Grand Canyon happened quickly (not slowly over millions of years), but it certainly didn’t happen in “seconds!” As I head for the exit I have mixed feelings about the place. Sure, I think, it’s wacky, but each to their own delusion, and at least the government isn’t funding this. Then another party of wide-eyed, eager-to-learn schoolchildren is ushered past. He really doesn’t like the fact we are influencing children because he wants secularists to indoctrinate young people in their anti-God philosophy. To me, this article clearly illustrates that the writer came to visit the Creation Museum wanting to mock us, and so, as he went through the exhibits, he just grabbed a few bits and pieces to try to justify his mocking article. Should we really expect anything else from a secular journalist? After all, “whose minds the god of this age has blinded, who do not believe, lest the light of the gospel of the glory of Christ, who is the image of God, should shine on them” (2 Corinthians 4:4). But at least he came, and he did hear the Word of God—it is God’s Word that convicts. “Faith comes by hearing and hearing by the Word of God” (Romans 10:17). Let’s pray for him. To read another commentary on the Guardian piece, see Dr. Elizabeth Mitchell’s News to Note feature that was posted over the weekend. Newsletter Thank You! Thank you for signing up to receive email newsletters from Answers in Genesis. Whoops! Your newsletter signup did not work out. Please refresh the page and try again. Answers in Genesis is an apologetics ministry, dedicated to helping Christians defend their faith and proclaim the gospel of Jesus Christ effectively. We focus on providing answers to questions about the Bible—particularly the book of Genesis—regarding key issues such as creation, evolution, science, and the age of the earth. | Low | [
0.504694835680751,
26.875,
26.375
] |
Evaluation of leukocyte stabilisation in TransFix-treated blood samples by flow cytometry and transmission electron microscopy. In this report, we have evaluated the effects of a TransFix-based stabilisation technique on leukocyte scatter characteristics, immunophenotyping, membrane permeability, absolute cell counting and morphology to extend previously reported flow cytometric data focused on the lymphocyte population. We show that scatter characteristics, immunophenotyping and absolute cell counting are well preserved, particularly in the lymphocyte population. Nevertheless, a general increase in membrane permeability, evaluated by propidium iodide (PI) uptake, was observed in TransFix-treated leukocyte subsets. Ultrastructural observations show selective morphological preservation (up to 10 days of storage) of lymphocytes and, to a lesser extent, of monocytes. In contrast, granulocytes have necrosis-like features, although the plasma membrane seems well preserved. Therefore, electron microscopy observations reflect modifications induced in different cell populations as evidenced by flow cytometry (FC). The data indicate that this short-term stabilisation method is particularly suitable for the analysis of human lymphocytes and it is a good procedure for quality control programmes for inter- and intra-laboratory performance evaluation; good results are obtained with respect to antigen definition and absolute cell counting procedures. Any apoptotic pathways in leukocyte subsets are blocked for at least 10 days. | High | [
0.6816901408450701,
30.25,
14.125
] |
Hello, this is one of the developers from Nimble Neuron (original: O’ol Blue). Together with introducing our newly named company, we are here to also announce our new upcoming project. Black Survival : Eternal Return Black Survival : Eternal Return Black Survival : Eternal Return is a battle royal game and the existing Black Survival characters and integration system has moved to a 3D MOBA form. Black Survival : Eternal Return takes place in Black Survival’s parallel universe in 3D. Black Survival : Eternal Return is currently under development progress, and although it is still far from the release date, we would like to listen and take into account from our user’s feedback and active participation in making this game complete its development. We wish for more anticipation and participation from our users. Black Survival : Eternal Return game details and information can be found via the link down below. | Mid | [
0.595744680851063,
35,
23.75
] |
Q: Rails 5.1.4 fields_for for multiple objects I have an Author and Book model. An Author can have many Book, but a Book can only have one Author. During the creation of a new Author, how do I add a "New Book" button which will add a fields_for for the Author form? I want to be able to add more than one Book. So far, the solution that I have found is just to add a fixed number of fields_for, like this: <%= form_with(model: author, local: true) do |form| %> ... <% 5.times do %> <%= form.fields_for :books do |books| %> ... <% end %> <% end %> ... <% end %> I do not want it to be like this, what if the author has more than 5 books? I want to be able to add books dynamically. Any solutions? A: If you fine with adding a new dependency, there's cacoon gem, which allows you easier handle nested forms. It's an additional dependency, but the code for adding a new associated record is simple as: <%= form_for author do |f| %> ... <%= f.fields_for :books do |book| %> <%= render 'book_fields', f: book %> <%= link_to_add_association 'add book', f, :books %> <%end%> | Mid | [
0.634615384615384,
33,
19
] |
The Chinese veto at the Security Council was not a passing fancy influenced by Russia, but the fruit of a long and painful experience. It was primarily motivated by the desire to uphold the norms of international law. Professor Li Qingsi places this concern in its immediate historical context (regime changes orchestrated in North Africa) and within a longer-term perspective (China’s occupation by the West and the difficult Sino-US relations). | High | [
0.7251461988304091,
31,
11.75
] |
Experience the moment Felix Baumgartner broke the sound barrier during his record-setting free fall in this exclusive POV video. Millions watched the Red Bull Stratos mission live, but for the first... | High | [
0.711111111111111,
32,
13
] |
package gocbcore import ( "container/list" "errors" "io" "sort" "sync/atomic" "time" "unsafe" "github.com/couchbase/gocbcore/v9/memd" ) type kvFeatureVerifier interface { HasDurabilityLevelStatus(status durabilityLevelStatus) bool HasCreateAsDeletedStatus(status createAsDeletedStatus) bool } type dispatcher interface { DispatchDirect(req *memdQRequest) (PendingOp, error) RequeueDirect(req *memdQRequest, isRetry bool) DispatchDirectToAddress(req *memdQRequest, pipeline *memdPipeline) (PendingOp, error) CollectionsEnabled() bool SupportsCollections() bool SetPostCompleteErrorHandler(handler postCompleteErrorHandler) } type kvMux struct { muxPtr unsafe.Pointer collectionsEnabled bool queueSize int poolSize int cfgMgr *configManagementComponent errMapMgr *errMapComponent tracer *tracerComponent dialer *memdClientDialerComponent postCompleteErrHandler postCompleteErrorHandler } type kvMuxProps struct { CollectionsEnabled bool QueueSize int PoolSize int } func newKVMux(props kvMuxProps, cfgMgr *configManagementComponent, errMapMgr *errMapComponent, tracer *tracerComponent, dialer *memdClientDialerComponent) *kvMux { mux := &kvMux{ queueSize: props.QueueSize, poolSize: props.PoolSize, collectionsEnabled: props.CollectionsEnabled, cfgMgr: cfgMgr, errMapMgr: errMapMgr, tracer: tracer, dialer: dialer, } cfgMgr.AddConfigWatcher(mux) return mux } func (mux *kvMux) getState() *kvMuxState { muxPtr := atomic.LoadPointer(&mux.muxPtr) if muxPtr == nil { return nil } return (*kvMuxState)(muxPtr) } func (mux *kvMux) updateState(old, new *kvMuxState) bool { if new == nil { logErrorf("Attempted to update to nil kvMuxState") return false } if old != nil { return atomic.CompareAndSwapPointer(&mux.muxPtr, unsafe.Pointer(old), unsafe.Pointer(new)) } if atomic.SwapPointer(&mux.muxPtr, unsafe.Pointer(new)) != nil { logErrorf("Updated from nil attempted on initialized kvMuxState") return false } return true } func (mux *kvMux) clear() *kvMuxState { val := atomic.SwapPointer(&mux.muxPtr, nil) return (*kvMuxState)(val) } // This method MUST NEVER BLOCK due to its use from various contention points. func (mux *kvMux) OnNewRouteConfig(cfg *routeConfig) { oldMuxState := mux.getState() newMuxState := mux.newKVMuxState(cfg) // Attempt to atomically update the routing data if !mux.updateState(oldMuxState, newMuxState) { logErrorf("Someone preempted the config update, skipping update") return } if oldMuxState == nil { if newMuxState.revID > -1 && mux.collectionsEnabled && !newMuxState.collectionsSupported { logDebugf("Collections disabled as unsupported") } // There is no existing muxer. We can simply start the new pipelines. for _, pipeline := range newMuxState.pipelines { pipeline.StartClients() } } else { if !mux.collectionsEnabled { // If collections just aren't enabled then we never need to refresh the connections because collections // have come online. mux.pipelineTakeover(oldMuxState, newMuxState) } else if oldMuxState.collectionsSupported == newMuxState.collectionsSupported { // Get the new muxer to takeover the pipelines from the older one mux.pipelineTakeover(oldMuxState, newMuxState) } else { // Collections support has changed so we need to reconnect all connections in order to support the new // state. mux.reconnectPipelines(oldMuxState, newMuxState) } mux.requeueRequests(oldMuxState) } } func (mux *kvMux) SetPostCompleteErrorHandler(handler postCompleteErrorHandler) { mux.postCompleteErrHandler = handler } func (mux *kvMux) ConfigRev() (int64, error) { clientMux := mux.getState() if clientMux == nil { return 0, errShutdown } return clientMux.revID, nil } func (mux *kvMux) ConfigUUID() string { clientMux := mux.getState() if clientMux == nil { return "" } return clientMux.uuid } func (mux *kvMux) KeyToVbucket(key []byte) (uint16, error) { clientMux := mux.getState() if clientMux == nil || clientMux.vbMap == nil { return 0, errShutdown } return clientMux.vbMap.VbucketByKey(key), nil } func (mux *kvMux) NumReplicas() int { clientMux := mux.getState() if clientMux == nil { return 0 } if clientMux.vbMap == nil { return 0 } return clientMux.vbMap.NumReplicas() } func (mux *kvMux) BucketType() bucketType { clientMux := mux.getState() if clientMux == nil { return bktTypeInvalid } return clientMux.bktType } func (mux *kvMux) SupportsGCCCP() bool { clientMux := mux.getState() if clientMux == nil { return false } return clientMux.BucketType() == bktTypeNone } func (mux *kvMux) NumPipelines() int { clientMux := mux.getState() if clientMux == nil { return 0 } return clientMux.NumPipelines() } // CollectionsEnaled returns whether or not the kv mux was created with collections enabled. func (mux *kvMux) CollectionsEnabled() bool { return mux.collectionsEnabled } // SupportsCollections returns whether or not collections are enabled AND supported by the server. func (mux *kvMux) SupportsCollections() bool { if !mux.collectionsEnabled { return false } clientMux := mux.getState() if clientMux == nil { return false } return clientMux.collectionsSupported } func (mux *kvMux) HasDurabilityLevelStatus(status durabilityLevelStatus) bool { clientMux := mux.getState() if clientMux == nil { return false } return clientMux.durabilityLevelStatus == status } func (mux *kvMux) HasCreateAsDeletedStatus(status createAsDeletedStatus) bool { clientMux := mux.getState() if clientMux == nil { return false } return clientMux.createAsDeletedStatus == status } func (mux *kvMux) RouteRequest(req *memdQRequest) (*memdPipeline, error) { clientMux := mux.getState() if clientMux == nil { return nil, errShutdown } // We haven't seen a valid config yet so put this in the dead pipeline so // it'll get requeued once we do get a config. if clientMux.revID == -1 { return clientMux.deadPipe, nil } var srvIdx int repIdx := req.ReplicaIdx // Route to specific server if repIdx < 0 { srvIdx = -repIdx - 1 } else { var err error if clientMux.bktType == bktTypeCouchbase { if req.Key != nil { req.Vbucket = clientMux.vbMap.VbucketByKey(req.Key) } srvIdx, err = clientMux.vbMap.NodeByVbucket(req.Vbucket, uint32(repIdx)) if err != nil { return nil, err } } else if clientMux.bktType == bktTypeMemcached { if repIdx > 0 { // Error. Memcached buckets don't understand replicas! return nil, errInvalidReplica } if len(req.Key) == 0 { // Non-broadcast keyless Memcached bucket request return nil, errInvalidArgument } srvIdx, err = clientMux.ketamaMap.NodeByKey(req.Key) if err != nil { return nil, err } } else if clientMux.bktType == bktTypeNone { // This means that we're using GCCCP and not connected to a bucket return nil, errGCCCPInUse } } return clientMux.GetPipeline(srvIdx), nil } func (mux *kvMux) DispatchDirect(req *memdQRequest) (PendingOp, error) { mux.tracer.StartCmdTrace(req) req.dispatchTime = time.Now() for { pipeline, err := mux.RouteRequest(req) if err != nil { return nil, err } err = pipeline.SendRequest(req) if err == errPipelineClosed { continue } else if err != nil { if err == errPipelineFull { err = errOverload } shortCircuit, routeErr := mux.handleOpRoutingResp(nil, req, err) if shortCircuit { return req, nil } return nil, routeErr } break } return req, nil } func (mux *kvMux) RequeueDirect(req *memdQRequest, isRetry bool) { mux.tracer.StartCmdTrace(req) handleError := func(err error) { // We only want to log an error on retries if the error isn't cancelled. if !isRetry || (isRetry && !errors.Is(err, ErrRequestCanceled)) { logErrorf("Reschedule failed, failing request (%s)", err) } req.tryCallback(nil, err) } logDebugf("Request being requeued, Opaque=%d", req.Opaque) for { pipeline, err := mux.RouteRequest(req) if err != nil { handleError(err) return } err = pipeline.RequeueRequest(req) if err == errPipelineClosed { continue } else if err != nil { handleError(err) return } break } } func (mux *kvMux) DispatchDirectToAddress(req *memdQRequest, pipeline *memdPipeline) (PendingOp, error) { mux.tracer.StartCmdTrace(req) req.dispatchTime = time.Now() // We set the ReplicaIdx to a negative number to ensure it is not redispatched // and we check that it was 0 to begin with to ensure it wasn't miss-used. if req.ReplicaIdx != 0 { return nil, errInvalidReplica } req.ReplicaIdx = -999999999 for { err := pipeline.SendRequest(req) if err == errPipelineClosed { continue } else if err != nil { if err == errPipelineFull { err = errOverload } shortCircuit, routeErr := mux.handleOpRoutingResp(nil, req, err) if shortCircuit { return req, nil } return nil, routeErr } break } return req, nil } func (mux *kvMux) Close() error { mux.cfgMgr.RemoveConfigWatcher(mux) clientMux := mux.clear() if clientMux == nil { return errShutdown } var muxErr error // Shut down the client multiplexer which will close all its queues // effectively causing all the clients to shut down. for _, pipeline := range clientMux.pipelines { err := pipeline.Close() if err != nil { logErrorf("failed to shut down pipeline: %s", err) muxErr = errCliInternalError } } if clientMux.deadPipe != nil { err := clientMux.deadPipe.Close() if err != nil { logErrorf("failed to shut down deadpipe: %s", err) muxErr = errCliInternalError } } // Drain all the pipelines and error their requests, then // drain the dead queue and error those requests. cb := func(req *memdQRequest) { req.tryCallback(nil, errShutdown) } mux.drainPipelines(clientMux, cb) return muxErr } func (mux *kvMux) handleOpRoutingResp(resp *memdQResponse, req *memdQRequest, err error) (bool, error) { // If there is no error, we should return immediately if err == nil { return false, nil } // If this operation has been cancelled, we just fail immediately. if errors.Is(err, ErrRequestCanceled) || errors.Is(err, ErrTimeout) { return false, err } err = translateMemdError(err, req) // Handle potentially retrying the operation if errors.Is(err, ErrNotMyVBucket) { if mux.handleNotMyVbucket(resp, req) { return true, nil } } else if errors.Is(err, ErrDocumentLocked) { if mux.waitAndRetryOperation(req, KVLockedRetryReason) { return true, nil } } else if errors.Is(err, ErrTemporaryFailure) { if mux.waitAndRetryOperation(req, KVTemporaryFailureRetryReason) { return true, nil } } else if errors.Is(err, ErrDurableWriteInProgress) { if mux.waitAndRetryOperation(req, KVSyncWriteInProgressRetryReason) { return true, nil } } else if errors.Is(err, ErrDurableWriteReCommitInProgress) { if mux.waitAndRetryOperation(req, KVSyncWriteRecommitInProgressRetryReason) { return true, nil } } else if errors.Is(err, io.EOF) { if mux.waitAndRetryOperation(req, SocketNotAvailableRetryReason) { return true, nil } } else if errors.Is(err, io.ErrShortWrite) { // This is a special case where the write has failed on the underlying connection and not all of the bytes // were written to the network. if mux.waitAndRetryOperation(req, MemdWriteFailure) { return true, nil } } if resp != nil && resp.Magic == memd.CmdMagicRes { shouldRetry := mux.errMapMgr.ShouldRetry(resp.Status) if shouldRetry { if mux.waitAndRetryOperation(req, KVErrMapRetryReason) { return true, nil } } } err = mux.errMapMgr.EnhanceKvError(err, resp, req) if mux.postCompleteErrHandler == nil { return false, err } return mux.postCompleteErrHandler(resp, req, err) } func (mux *kvMux) waitAndRetryOperation(req *memdQRequest, reason RetryReason) bool { shouldRetry, retryTime := retryOrchMaybeRetry(req, reason) if shouldRetry { go func() { time.Sleep(time.Until(retryTime)) mux.RequeueDirect(req, true) }() return true } return false } func (mux *kvMux) handleNotMyVbucket(resp *memdQResponse, req *memdQRequest) bool { // Grab just the hostname from the source address sourceHost, err := hostFromHostPort(resp.sourceAddr) if err != nil { logErrorf("NMV response source address was invalid, skipping config update") } else { // Try to parse the value as a bucket configuration bk, err := parseConfig(resp.Value, sourceHost) if err == nil { // We need to push this upstream which will then update us with a new config. mux.cfgMgr.OnNewConfig(bk) } } // Redirect it! This may actually come back to this server, but I won't tell // if you don't ;) return mux.waitAndRetryOperation(req, KVNotMyVBucketRetryReason) } func (mux *kvMux) drainPipelines(clientMux *kvMuxState, cb func(req *memdQRequest)) { for _, pipeline := range clientMux.pipelines { logDebugf("Draining queue %+v", pipeline) pipeline.Drain(cb) } if clientMux.deadPipe != nil { clientMux.deadPipe.Drain(cb) } } func (mux *kvMux) newKVMuxState(cfg *routeConfig) *kvMuxState { poolSize := 1 if !cfg.IsGCCCPConfig() { poolSize = mux.poolSize } pipelines := make([]*memdPipeline, len(cfg.kvServerList)) for i, hostPort := range cfg.kvServerList { hostPort := hostPort getCurClientFn := func() (*memdClient, error) { return mux.dialer.SlowDialMemdClient(hostPort, mux.handleOpRoutingResp) } pipeline := newPipeline(hostPort, poolSize, mux.queueSize, getCurClientFn) pipelines[i] = pipeline } return newKVMuxState(cfg, pipelines, newDeadPipeline(mux.queueSize)) } func (mux *kvMux) reconnectPipelines(oldMuxState *kvMuxState, newMuxState *kvMuxState) { for _, pipeline := range oldMuxState.pipelines { err := pipeline.Close() if err != nil { logErrorf("failed to shut down pipeline: %s", err) } } err := oldMuxState.deadPipe.Close() if err != nil { logErrorf("Failed to properly close abandoned dead pipe (%s)", err) } for _, pipeline := range newMuxState.pipelines { pipeline.StartClients() } } func (mux *kvMux) requeueRequests(oldMuxState *kvMuxState) { // Gather all the requests from all the old pipelines and then // sort and redispatch them (which will use the new pipelines) var requestList []*memdQRequest mux.drainPipelines(oldMuxState, func(req *memdQRequest) { requestList = append(requestList, req) }) sort.Sort(memdQRequestSorter(requestList)) for _, req := range requestList { stopCmdTrace(req) mux.RequeueDirect(req, false) } } func (mux *kvMux) pipelineTakeover(oldMux, newMux *kvMuxState) { oldPipelines := list.New() // Gather all our old pipelines up for takeover and what not if oldMux != nil { for _, pipeline := range oldMux.pipelines { oldPipelines.PushBack(pipeline) } } // Build a function to find an existing pipeline stealPipeline := func(address string) *memdPipeline { for e := oldPipelines.Front(); e != nil; e = e.Next() { pipeline, ok := e.Value.(*memdPipeline) if !ok { logErrorf("Failed to cast old pipeline") continue } if pipeline.Address() == address { oldPipelines.Remove(e) return pipeline } } return nil } // Initialize new pipelines (possibly with a takeover) for _, pipeline := range newMux.pipelines { oldPipeline := stealPipeline(pipeline.Address()) if oldPipeline != nil { pipeline.Takeover(oldPipeline) } pipeline.StartClients() } // Shut down any pipelines that were not taken over for e := oldPipelines.Front(); e != nil; e = e.Next() { pipeline, ok := e.Value.(*memdPipeline) if !ok { logErrorf("Failed to cast old pipeline") continue } err := pipeline.Close() if err != nil { logErrorf("Failed to properly close abandoned pipeline (%s)", err) } } if oldMux != nil && oldMux.deadPipe != nil { err := oldMux.deadPipe.Close() if err != nil { logErrorf("Failed to properly close abandoned dead pipe (%s)", err) } } } func (mux *kvMux) PipelineSnapshot() (*pipelineSnapshot, error) { clientMux := mux.getState() if clientMux == nil { return nil, errShutdown } return &pipelineSnapshot{ state: clientMux, }, nil } func (mux *kvMux) ConfigSnapshot() (*ConfigSnapshot, error) { clientMux := mux.getState() if clientMux == nil { return nil, errShutdown } return &ConfigSnapshot{ state: clientMux, }, nil } | Low | [
0.512605042016806,
30.5,
29
] |
Why is everyone moving into tiny houses?1:03 The Melbourne Home Show, held from August 16-19, will feature a ‘street of Tiny Houses’ this year, including this one from Tiny Footprint. Picture: The Melbourne Home ShowSource:Supplied THE average new home in Australia is 189.8sq m — but now, more and more of us are moving into houses a fraction of that size. That’s thanks to the “tiny house” movement — a concept which has seen scores of Australians and people from all over the world reject traditional homes in favour of more minimal living. While there’s no set definition of tiny houses, they are generally custom-made, transportable and less than 46sq m. Ferne King, co-founder of Australian tiny home company Tiny Footprint, said the “average” Australian tiny house was 7.2m long and 2.5m wide, although they can be up to 12m long and 3.5m wide if the owner gets a special permit to transport the home on the road. She said they were growing in popularity thanks to environmental concerns, cost of living pressures and changing priorities. “People usually think, ‘I can either rent, share rent or get a mortgage’ and they’re the only three choices people typically think they have, as well as living with family. But tiny living is another choice to put on their list,” Ms King told news.com.au. She said most people spent 40 to 50 per cent of their take-home pay on rent or their mortgage, whereas “tiny living” typically cost just 10 per cent of the owner’s take-home pay. GlamXperience will showcase its Safari Tent at the expo. Picture: The Melbourne Home ShowSource:Supplied “I think tiny homes are an absolute necessity given the socio-economic pressures people are facing,” she said. “If you’re renting for $350 a week, you can buy a tiny home for $80,000-$100,000 and a small block of land and if you compare the two over five years, you will have around $60,000 more in your pocket after five years when you are tiny living versus renting.” It’s a sentiment echoed by Australian Tiny House Directory founder Elle Paton, who said people were often surprised by how well-designed and comfortable tiny houses could be. “I think housing affordability is definitely contributing to why tiny houses have become so popular, and I also think there has been a shift in the market with people starting to question their consumer habits and the resources they’re consuming, so there’s an environmental component as well,” she said. “I’m finding people are becoming more motivated to do more with less and to experience more freedom — another big driver is people wanting to break the model of living to work rather than working to live. “There has been a shift in values and there’s a financial component too — people want to reduce and clear debt and save money, so there’s been a big surge in people at the moment wanting to get into tiny homes to save a deposit for a much larger home at a later date, when they’ll either sell off their tiny home or rent it out as an asset.” This home, by Off Grid Tiny Houses, features a king size loft. Picture: The Melbourne Home ShowSource:Supplied She said anyone who was worried about tiny houses being too small or claustrophobic should rent a few on Airbnb to try it on for size. “They’re not for everyone and you need to be committed to the concept, but they are incredibly well-tailored to your needs so it shouldn’t feel too poky. Everything has its place and they are usually well designed with the client in mind to suit their unique lifestyle,” she said. Fernlea Tiny House by Tiny Footprint has a “lift bed” that descends at the touch of a button. Picture: The Melbourne Home ShowSource:Supplied Given the growing popularity of these homes, the upcoming 2018 Melbourne Home Show will feature a “street of Tiny Houses” this year for the first time. The biannual building and renovation event will feature five tiny homes showcasing the latest custom-built tiny homes on the market. Exhibition director Peter O’Flynn said the feature was set to inspire tens of thousands of visitors. A row of five tiny houses will be featured at the event. Picture: The Melbourne Home ShowSource:Supplied “Influenced by the tiny house movement taking Australia and the world by storm, the Street of Houses will showcase some of the latest custom mini-homes on the market,” he said. “Whether you’re on the hunt for a cost-effective new home, looking to reduce your carbon footprint, tight on space or simply on the search for a simpler life, a stroll down the street is sure to inspire.” The expo will be held from held from August 16-19 and further details can be found online. | Mid | [
0.542997542997543,
27.625,
23.25
] |
Tim Brown of the Raiders drops a pass in the second quarter of Super Bowl XXXVIII against the Buccaneers at Qualcomm Stadium in San Diego. / Robert Hanashiro, USA TODAY Sports by Chris Strauss, USA TODAY Sports by Chris Strauss, USA TODAY Sports The impending tenth anniversary of Super Bowl XXXVII between the Oakland Raiders and Tampa Bay Buccaneers had former Raiders wide receiver Tim Brown reminiscing on a radio show Saturday. But they weren't exactly good memories. Brown suggested on Sirius XM NFL Radio that then-Raiders coach Bill Callahan sabotaged the game against his former boss Jon Gruden's Tampa Bay Buccaneers, changing the offensive game plan two days before kickoff. The Buccaneers ended up winning 48-21 in the most lopsided Super Bowl of the past 11 years. "We all called it sabotage . . . because Callahan and (Tampa Bay coach Jon) Gruden were good friends," Brown said. "And Callahan had a big problem with the Raiders, you know, hated the Raiders. You know, only came because Gruden made him come. Literally walked off the field on us a couple of times during the season when he first got there, the first couple years. So really he had become someone who was part of the staff but we just didn't pay him any attention. Gruden leaves, he becomes the head coach. . . . It's hard to say that the guy sabotaged the Super Bowl. You know, can you really say that? That can be my opinion, but I can't say for a fact that that's what his plan was, to sabotage the Super Bowl. He hated the Raiders so much that he would sabotage the Super Bowl so his friend can win the Super Bowl. That's hard to say, because you can't prove it." No, you definitely can't prove it. Also, it makes no sense. What good would it have done Callahan to damage his own coaching career in order to help Gruden? Had Gruden given him a kidney? Saved him from some sort of tragic accident? Had someone murdered on his behalf? The idea that an NFL coach would throw away his chance to add "Super Bowl-winning coach" as a lifelong prefix to his name due to some grudge towards Raiders ownership or current players seems ludicrous. Bringing it up a decade after the fact doesn't exactly lend credibility to the story, either. Asked if he wanted to refute the allegation, Gruden texted USA TODAY Sports' Jon Saraceno with the reply, "Give me a break. No thanks." Brown's main evidence is that Callahan switched the Raiders' game plan against the Bucs from a run-first offense to a passing one, despite the fact his team "averaged 340 pounds on the offensive line." Brown suggested Callahan's last-minute adjustments might have been the trigger that sent center Barret Robbins AWOL in Mexico on a drinking binge and bipolar episode. "Now, should Barret have manned up and tried to do it? Absolutely. But everybody knew Barret was unstable anyway. So to put him in that situation - not that he was putting him in that situation - but for that decision to be made without consulting the players the Friday before the Super Bowl? I played 27 years of football. The coaches never changed the game plan the Friday before the game. I'm not trying to point fingers at anybody here, all I'm saying is those are the facts of what happened. So people look at Barret and they say all these things, but every player in that locker room will tell you, 'You'd better talk to Bill Callahan.' Because if not for Coach Callahan, I don't think we're in that situation." Former Raiders fullback Jon Ritchie didn't exactly deny Brown's claims in an ESPN report, but former Raiders starting quarterback Rich Gannon did on his Sirius NFL show Tuesday. Asked about the Super Bowl game plan, Gannon said "I never got a memo that came across my desk or my locker that said, 'We're going to do something different.' " Saying that Callahan might have intentionally sabotaged a Super Bowl seems a little extreme. Maybe he just wasn't a very good coach. He was fired after going 4-12 in a 2003 season riddled with infighting and was hired by Nebraska the following season, a four-year tenure most Huskers fans view as an utter failure. Brown isn't the only Hall of Fame player to lash out this season about Super Bowl teams of old. Former Bears defensive end Richard Dent told a Chicago radio show this summer that coach Mike Ditka's inability to manage the team's quarterback position cost the Bears multiple Super Bowl wins. | Low | [
0.49327354260089606,
27.5,
28.25
] |
Bible Truth for Today & Christian Counseling for the Soul Tag Archives: talking Powerful. Life Changing. Incredible. Sometimes, not saying anything is priceless! How many times do our words, though seemingly innocent, get us into trouble, or hurt other people? How many times do our words encourage, edify and help those around us? How many Christians are really living like Proverbs teaches. As the school year winds down, finals are administered, and teachers get a restful summer break, what have you and I learned during the school year. When a family has school aged children the year seems to revolve around the school session schedule. So, for this year, what have you learned? Have math skills increased? Has science and history been your thing? How much better is your handwriting? More importantly, what character traits have grown? What spiritual steps have been taken this year? What decisions for serving the Lord have you made? Recently, our family was reading though proverbs and the following 2 verses stood out to me personally. The heart of the wise teacheth his mouth, and addeth learning to his lips. Proverbs 16:23 Excellent speech becometh not a fool: much less do lying lips a prince. Proverbs 17:7 What have you taught your mouth? Taught what? The wise man or woman, son or daughter, will teach his mouth to say only good things. Not always will be win this battle, but again, the wise teacheth his mouth. His lips are guided with learning. No-one wants to talk the fool, or speak foolishly. Verbal discipline is a requirement and expectation for the Christian life. Notice how to not become a fool in Proverbs 17:7. Excellent speech will not result in a person being a fool. One paramount, pinnacle lesson each person must learn is the value of their words. Empty speech, useless conversation, angry words, and bad themes to talk about are not worth talking about! There are some things we should not waste our breath on! Here are some ideas to help these verse be true in your life. Teach or control your mouth. Take a breath before you speak. Pray for God to help you say the right things to the right people, the right way, with the right attitude. Keep learning. Be around good speaking. Avoid listening to cursing, gossip, or evil communication. Be aware of the impact of social media and the “Friends” you follow have on you and your speaking. The people we listen to and look to will inform our mind which in turn impacts what we say or do not say. Expect more. Don’t allow negative, selfish, and evil speaking in your home. Have excellent speech. Make or create time to talking at the dinner table, in the car, and on the porch. The more excellent speech that is expected, the least likely you and your children will be in becoming a fool. Don’t allow useless talk in your home. Be upfront. Notice how verse 7 says a person with lying lips will not become a prince. It is not likely that a lying person is ever truly successful and like a prince in life. It is less likely than a person who says good things to turn out to be a fool. Set down the phone. I read recently that teenagers spend more time on their cell phone than they spend time with their parents. Texting, facebook, twitter, Instagram, video games, snap-chat and more has not increased real life talking! Learn to set the phone or device down and carry on a real conversation with someone. Teach yourself good conversation habits. Make application in your own home and in your own life-stage. How are you doing? Have you taught your tongue yet? It is an area that we must continue to learn and grow in. We never arrive with our words. Keep growing in excellent communication! If ye abide in me, and my words abide in you, ye shall ask what ye will, and it shall be done unto you. John 15:7 “A fifth grade boy who had heard a sermon on persistence in prayer was praying by himself in his room one night. As his dad passed his door, he heard the boy praying over and over again, “Tokyo, Tokyo, Tokyo.” The next day, the dad asked his son what he was doing. The boy replied that he had given the wrong answer on a test for the capital of Mexico, and he was praying that Tokyo would become the capital of Mexico.” Some people pray trying to “fix” a situation or change the way things are. What if prayer changed us more than the situation? It is very possible. Observe. When we pray the will or Word of God, we are “in tune” with God’s plan. When we pray for the will of God, we are asking for more than merely what we think is best. When we pray in the will of God, we are demonstrating faith and confidence that “His way is best.” When we pray the Word of God, we are allowing His presence in us to be more evident. When we pray in God’s will, we are able to rest, have peace, and totally rely on His working it out. All the while, the practice of prayer is also changing us. | Mid | [
0.568493150684931,
31.125,
23.625
] |
Sizing strategy is a major determinant of postoperative pressure gradients in commonly implanted stented tissue valves. We compared the haemodynamic performance of two pericardial aortic prostheses with the stent either on the outside (Perimount), or the inside (Mitroflow) of the valve cusps, with regard to sizing strategies and valve dimensions. We analysed discharge echoes from all patients who received an isolated Perimount (n = 537) or Mitroflow (n = 164) between January 2007 and November 2010. We obtained outer valve diameters from the manufacturers, and measured sizer dimensions. We compared pressure gradients (ΔP) and maximum velocity across the valve (V(max)). The majority of implanted valves had a size label 23 (39.7% of the Perimount; 56.1% of the Mitroflow). The metric outer diameter for size label 23 was 31 mm for Perimount, and 26 mm for Mitroflow. Despite the smaller outer diameter of the Mitroflow compared with the Perimount, peak gradients were lowest in the Mitroflow (ΔP mmHg: 22.3 ± 7.8 for Mitroflow vs 23.9 ± 7.3 for Perimount, n.s.), suggesting a design advantage for the Mitroflow. However, the 23 Mitroflow sizer was 26 mm and the 21 sizer was 23 mm. In contrast, the 23 Perimount sizer was indeed 23 mm. Thus, an intrannular sizing strategy for a patient with a 23 mm annulus most likely results in the selection of 21 Mitroflow and 23 Perimount. Haemodynamic comparison of the 21 Mitroflow with the 23 Perimount reversed the above- described difference (ΔP mmHg: 26.0 ± 10.2 for Mitroflow vs 23.9 ± 7.3 for Perimount, P < 0.05). Multivariate analysis identified a 21 valve as a predictor of high pressure gradients, but found no differences between both valve types. The potential haemodynamic advantage of the Mitroflow is lost due to the different sizing strategy. The results underscore the importance of an optimal sizing strategy, possibly by replica sizing. | Mid | [
0.636792452830188,
33.75,
19.25
] |
More Former FC Dallas CEO Cleared In Battery Case NEW YORK (CBSDFW.COM/AP) — The former CEO of soccer club FC Dallas has been cleared of domestic violence charges by prosecutors in New York City who have abandoned their case. An assistant district attorney told a Manhattan judge Wednesday there was “no evidence” that former FC Dallas executive Douglas Quinn intended to injure his wife during a dispute at a New York City hotel on Nov. 10. Quinn had initially been charged with punching his wife, choking her and smothering her with a pillow. His wife was treated by paramedics at the scene for injuries to her arm, legs, face and eye. Defense lawyer Alan Futerfas said Thursday that Quinn maintained from the start that he never battered his wife. He says any injury she sustained had nothing to do with him. | Low | [
0.5146198830409351,
33,
31.125
] |
Q: ManyToMany Relationship between two models in Django I am trying to build a website that users can add the courses they are taking. I want to know how should I add the ManyToMany relationship. Such that we can get all users in a course based on the course code or instructor or any field. And we can also get the courses user is enrolled in. Currently, my Database structure is: class Course(models.Model): course_code = models.CharField(max_length=20) course_university = models.CharField(max_length=100) course_instructor = models.CharField(max_length=100) course_year = models.IntegerField(('year'), validators=[MinValueValidator(1984), max_value_current_year]) def __str__(self): return self.course_code and my user model: class Profile(AbstractUser): bio = models.TextField() image = models.ImageField(default='defaults/user/default_u_i.png', courses = models.ManyToManyField('home.Course',related_name='courses') def __str__(self): return self.username I was wondering should ManyToMany relationship be in User model or the course model? Or will it make any difference at all? EDIT: For adding course to post object now I am using this view but it seems to not work: @login_required def course_add(request): if request.method == "POST": form = CourseForm(request.POST or none) if form.is_valid(): course = form.save() request.user.add(course) else: form = CourseForm context = { 'form':form } return render(request,'home/courses/course_add.html', context) A: For a relational databases, the model where you define the ManyToManyField does not matter. Django will create an extra table with two ForeignKeys to the two models that are linked by the ManyToManyField. The related managers that are added, etc. is all Django logic. Behind the curtains, it will query the table in the middle. You however need to fix the related_name=… parameter [Django-doc]. The related_name specifies the name of the relation in reverse so from Course to Profile in this case. It thus should be something like 'profiles': class Profile(AbstractUser): bio = models.TextField() image = models.ImageField(default='defaults/user/default_u_i.png', courses = models.ManyToManyField('home.Course', related_name='profiles') def __str__(self): return self.username You thus can obtain the people that particiate in a Course object with: mycourse.profiles.all() and you can access the courses in which a Profile is enrolled with: myprofile.courses.all() For more information, see the Many-to-many relationships section of the documentation. You can add a course to the courses of a user with: @login_required def course_add(request): if request.method == 'POST': form = CourseForm(request.POST) if form.is_valid(): course = form.save() request.user.courses.add(course) else: form = CourseForm() context = { 'form': form } return render(request,'home/courses/course_add.html', context) | Mid | [
0.6267281105990781,
34,
20.25
] |
[Diet and lifesyle of a cohort of primary school children]. The obesity is the disease of the new millennium, because it affects about 300 million people in the world, and especially it has a high prevalence in children. Obesity is a significant risk factor for cardiovascular disease, diabetes mellitus type II, hypertension, problems of adaptation and relationship with other, lower self-esteem and depression. The objective of our study is to identify children at risk of overweight/obesity in order to primary prevention. We have organized meetings with children, families and school's members where we discussed the results of our investigation about the importance of healthy diet and lifestyle. The study was carried out on 545 children (282F, 263M), age 6.-10 years, of two primary schools in Catanzaro, from 2008 to 2010. The valuation parameters were: gender, age, weight, height, blood pressure and waist circumference. To children were also administered a questionnaire about dietary habits and lifestyle. Fisher's test. We had that 62% of children was normal weight, 27% overweight, 11% obese. A particularly relevant datum is that the percentage of overweight-obese boys of 8 and 9 years old was higher (56%) than that of normal weight. We found cases of hypertension only in obese children. 98% of obese, 80% of overweight and 24% of normal weight children had a high waist circumference. We did not find differences in food quality among normal weight and overweight/obese children. Instead, we found significant differences in behavior between children: 90% of obese, 64% of overweight and 53% of normal weight children passed more than 2 hours in the afternoon watching television, playing computer and video games. 70% of normal weight, 82% of overweight and 95% of obese children practiced physical activity. Our study shows a alarming fact about the increase of the obesity in children. In particular the most important problem is that this condition could predispose to cardio-metabolic, endocrine, respiratory, musculoskeletal and psychological consequence. So it is important that everybody who lives with children, especially parents and school's members, educates children to have healthy lifestyles. These attentions may slow the worryng epidemic of obesity. | Mid | [
0.651162790697674,
31.5,
16.875
] |
Overview of using T1/T2 and 10-10 subtemporal electrode chains for localizing EEG abnormalities. Evaluation of seizure activity may require the addition of T1/T2 or a subtemporal chain of electrodes based on the 10-10 measurement system. Placement of additional electrodes helps to localize seizure activity in pre-surgical patients and to reveal areas of abnormality which cannot be easily discerned with International 10-20 System of electrode placement. The addition of extra electrodes can be confusing if multiple technologists are involved with the patient's care. Extra steps such as using labeled tape can help clarify what electrodes are being used for each patient. This paper will define correct electrode placement of T1/T2 and the subtemporal chain. It will also demonstrate how to record with specific montages using these electrodes and show their usefulness in localizing abnormalities. | High | [
0.6633416458852861,
33.25,
16.875
] |
Tools of the Trade I often receive emails or comments asking about a particular piece of kitchen equipment or a specific ingredient. As you might imagine, there are some tools and ingredients that I absolutely swear by and that are indispensable to me. I have listed below my most commonly used pieces of kitchen equipment and some of my favorite ingredients, with specific brand and product information included, where possible. Hopefully this will make shopping for new kitchen toys and stocking your pantry even easier! Cocoa Powder: When a recipe calls for unsweetened cocoa powder, I use Hershey’s Cocoa (natural unsweetened), which can be found at your local grocery store. For Dutch-process cocoa powder, I use Penzeys Dutch Process Cocoa Powder. Diastatic Malt Powder: This is used in my bagel recipes and I purchase it from King Arthur Flour. Flour: I use King Arthur Flour exclusively for almost all of my flour. I keep the following flours in my pantry (the first three I can purchase at my local grocery store): All-Purpose Flour, Bread Flour, Whole Wheat Flour and Hi-Gluten Flour. I purchase cake flour from the grocery store and use either Swan’s Down or Softasilk brands. Malted Milk Powder: Some readers have been able to find this at their local grocery store, but I never have and order mine from King Arthur Flour. Maple Syrup: I purchase my maple syrup from the grocery store or Sam’s Club. The key is to buy pure maple syrup, not the artificial syrup most of us grew up putting on our pancakes, or your recipes just won’t turn out. Pastry Bags & Decorating Tips: I use Wilton brand decorating bags and tips, which I purchase at Michael’s craft stores. Peanut Butter: I use either JIF or Skippy brands of peanut butter for my baking. Important Note: Unless a recipe specifically calls for natural peanut butter, using it can wreak havoc on your recipe unless you use a no-stir type that does not need to be refrigerated. Vanilla Beans: Vanilla beans can be extremely expensive, so I find it most economical to buy them in bulk. I purchase Madagascar Vanilla Beans from Penzeys. Vanilla Extract: I love the Madagascar Bourbon Vanilla Extract from King Arthur Flour, and I go through a lot of vanilla extract, so my most economical option is the 32-ounce bottle! Happy Baking! 🙂 welcome to brown eyed baker! Hello and welcome to this delicious little corner of the web! Here you'll find approachable recipes for desserts, comfort foods and easy dinners. I reside in Pittsburgh, Pennsylvania with my husband, our two sons, and Golden Retriever. | Mid | [
0.620842572062084,
35,
21.375
] |
Paris Saint-Germain coach Unai Emery thought his team played "very well" against bitter rivals Marseille in Le Classique, despite drawing 0-0 at Parc des Princes on Sunday, while his players agreed they deserved better. The Spaniard pointed out the French champions "created a number of chances" but "unfortunately failed to put one away" and admitted the result "was not the one we were hoping for." "We often have to play against sides defending very deep and in numbers," Emery said in the post-match news conference. "Despite that, we managed to create a number of chances -- even if we did not manage to score. We still have to fine-tune a few things but we are on the right track." Emery was also quick to defend his decision of substituting Angel Di Maria, and despite the Argentine showing his dissatisfaction at coming off, the former Sevilla coach reckoned it is "normal." "Di Maria is an important player for us. He worked a lot for the team," Emery added. "I believe in him and wait for him to improve. He did not put in a good performance, but it is up to me to help him. I have to give him the confidence to improve. He has a good attitude and will keep working to put in better performances. "It is only normal that he was not happy with his substitution. He did not want to be replaced, but it was my decision. I don't mind players getting upset when they are taken off. That shows they have character. It's a good thing for me." Thiago Silva agreed with Emery's assessment of PSG. FRANCK FIFE/AFP/Getty Images Captain Thiago Silva agreed with Emery and felt his teammates "played well" and "put Marseille in difficult positions." The Brazilian admitted OM were surprisingly good after changing coach just days earlier but recognised Rudi Garcia has some "good players" available to him. "For them, this was a tough game," Silva added. "Unfortunately, we were unable to score. We did everything right this week and prepared well but we just did not score." Asked whether or not Nice's growing lead at the Ligue 1 summit is worrying, Silva responded negatively. "No, last season was won eight weeks in advance and that will not happen every year," Silva said. "We must be careful to not let them get too far ahead though. We have two matches to play against Nice and if we win both, we will be level." Maxwell thought similarly to Emery and Silva and pointed out that PSG "enjoyed a lot of possession" and "limited counter-attacks" before admitting that the goalless draw "leaves a bitter taste." "The league season is always tricky," Maxwell added. "We must keep the positives and remain optimistic. There is a long way to go. Of course, we dropped points. We must recover them and find our way back to the top of the table. "We are aware of it and we are working hard. We know there is a need to improve a lot of things but we must remain positive and confident for the rest of the season." Thiago Motta refuted suggestions that PSG's performance was poor just because of the disappointing nature of the result. "No. It is not worrying," Motta responded. "It is when you do not win but also do not create chances, when you play badly and you let the other team have chances to score that it is worrying. This was completely different. That is my opinion." "Perhaps it is possible to see things differently on the pitch and that vision can change the analysis of the match but I think we deserved more," the Italian midfielder added. "We created chances, we just lacked goals. It is a pity because, obviously, the result is not a good one for us." | Mid | [
0.6536585365853651,
33.5,
17.75
] |
519 F.Supp.2d 39 (2007) BIOVAIL CORPORATION et al., Plaintiffs, v. U.S. FOOD AND DRUG ADMINISTRATION et al., Defendants, and Anchen Pharmaceuticals, Inc., Teva Pharmaceuticals USA, Inc., Impax Laboratories, Inc., Intervenor-defendants. Civil Action No. 06-1487 (RMU). United States District Court, District of Columbia. March 22, 2007. *40 *41 James F. Segroves, Proskauer Rose LLP, Washington, DC, Kevin J. Perra, Ronald S. Rauchberg, New York City, for Plaintiffs. Gerald Cooper Kell, U.S. Department of Justice Washington, DC, for Defendants. Gordon A. Coffee, Winston & Strawn, Jay P. Lefkowitz, Michael D. Shumsky, Kirkland & Ellis LLP, Washington, DC, Don J. Mizerk, John E. Mooney, Maureen L. Rurka, Steven J. Winger, Winston & Strawn LLP, Chicago, IL, for Intervenor-defendants. MEMORANDUM OPINION RICARDO M. URBINA, District Judge. DENYING THE PLAINTIFFS' MOTION FOR INJUNCTIVE RELIEF[1] I. INTRODUCTION The plaintiffs, Biovail Corporation and Biovail Laboratories International SRL (collectively, "the plaintiff' or "Biovail") manufacture the drug Wellbutrin XL. On August 23, 2006, the plaintiff brought suit and filed a motion for a temporary restraining order ("TRO") against the defendants Food and Drug Administration and Andrew C. Von Eschenbach[2] (collectively "the defendant" or "FDA") challenging the FDA's consideration of generic versions of Wellbutrin XL for approval. On August 25, 2006, the court denied the plaintiffs motion for a TRO because the plaintiff, failed to demonstrate a substantial likelihood *42 of success on the merits and irreparable injury. This case now comes before the court on the plaintiffs second motion for injunctive relief. The plaintiffs newest motion emerges from the defendant's approval of intervenor-defendant Anchen's Abbreviated New Drug Application ("ANDA"),[3] clearing Anchen's generic drug for entry into the marketplace. In the instant suit, the plaintiff once again argues that the defendant violated the Administrative Procedures Act ("APA"), 5 U.S.C. § 706, and the Food, Drug and Cosmetic Act ("FDCA"), 21 U.S.C. § 301 et seq., by not applying proper standards in ruling on the bioequivalence of Anchen's product and by not requiring generic products to carry proper labeling. Because the plaintiff has failed to demonstrate a substantial likelihood of success on the merits of its claims and irreparable injury, the court denies the plaintiffs second motion for a temporary restraining order. II. BACKGROUND[4] Intervenor-defendant Anchen Pharmaceuticals, Inc. ("Anchen") manufactures a generic version of Wellbutrin XL. Intervenor-Def. Anchen's Opp'n to Pl.'s Mot. ("Anchen's Opp'n") at 5. In September 2004, Anchen filed an ANDA with the FDA, seeking approval of its generic drug for entry into the marketplace. Id. Anchen's ANDA lists Wellbutrin XL as the reference listed drug ("RLD"),[5] or brand-name drug, for Anchen's generic drug. Pl.'s Second Mot. for a TRO and Prelim. Inj. ("Pl.'s Mot.") at 3-4 (referring to Wellbutrin XL as the innovator drug for Anchen's ANDA); Def. FDA's Opp'n to Pl.'s Mot. ("FDA's Opp'n") at 13; Anchen's Opp'n at 16; Intervenor-Defs. Teva & Impax's Joint Opp'n to Pl.'s Mot. ("Teva & Impax's Joint Opp'n") at 1. Prior to approving brand-name Wellbutrin XL, the FDA required the plaintiff to demonstrate that Wellbutrin XL was the bioequivalent[6] of two previously-approved versions of Wellbutrin Wellbutrin IR (immediate release) and Wellbutrin SR (sustained release). Pl.'s Mot. at 8. Because the plaintiff made that showing, Wellbutrin XL's labeling correctly states that it is the bioequivalent of both of these versions. Id. at 8-9. On December 14, 2006, the FDA approved Anchen's ANDA for a generic formulation of Wellbutrin XL, pursuant to the FDCA. Id. at 1. It concurrently denied the plaintiffs citizen petition which urged the FDA to apply certain standards in approving ANDAs for generic Wellbutrin XL, including a suggestion that the FDA require Anchen to demonstrate that *43 its drug is the bioequivalent to the two previous versions of Wellbutrin. Id On December 18, 2006, in response to the FDA's approval of Anchen's ANDA and its concurrent denial of the plaintiff's citizen petition, the plaintiff filed a motion to amend its complaint and a second motion for a TRO. The plaintiff contends that the FDA's failure to require the additional bioequivalence studies has resulted in false and misleading labeling on Anchen's drug. Id. at 2-4. The plaintiff asks the court to stay the effectiveness of both the FDA's approval of generic drugs as well as its response to the plaintiffs citizen petition, and, thereby, to prevent the distribution of generic versions of Wellbutrin XL. Id. at 4. On January 2, 2007, the court granted a joint motion to intervene brought by Impax Laboratories, Inc., a manufacturer of a generic version of Wellbutrin XL, and Teva Pharmaceuticals USA, Inc., the exclusive United States distributor for Impax's product. Min. Or, granting Teva Pharm. USA, Inc. and Impax Lab., Inc.'s Joint Mot. to Intervene (Jan. 2, 2007). The court now turns to the plaintiffs motion for injunctive relief. III. ANALYSIS A. Legal Standard for Injunctive Relief This court may issue interim in junctive relief only when the movant demonstrates; (1) a substantial likelihood of success on the merits, (2) that it would suffer irreparable injury if the injunction is not granted, (3) that an injunction would not substantially injure other interested parties, and (4) that the public interest would be furthered by the injunction. Mova Pharm. Corp. v. Shalala, 140 F.3d 1060, 1066 (D.C.Cir.1998) (quoting CityFed Fin. Corp. v. Office of Thrift Supervision, 58 F.3d 738, 746 (D.C.Cir.1995)); see also World Duty Free Americas, Inc. v. Summers, 94 F.Supp.2d 61, 64 (D.D.C.2000). It is particularly important for the movant to demonstrate a substantial likelihood of success on the merits. Cf. Benten v. Kessler, 505 U.S. 1084, 1085, 112 S.Ct. 2929, 120 L.Ed.2d 926 (1992) (per curiam). Indeed, absent a "substantial indication" of likely success on the merits, "there would be no justification for the court's intrusion into the ordinary processes of administration and judicial review." Am. Bankers Ass'n v. Nat'l Credit Union Admin., 38 F.Supp.2d 114, 140 (D.D.C.1999) (internal quotation omitted). The four factors should be balanced on a sliding scale, and a party can compensate for a lesser showing on one factor by making a very strong showing on another factor. CSX Transp., Inc. v. Williams, 406 F.3d 667 (D.C.Cir.2005) (citing CityFed Fin. Corp., 58 F.3d at 747). "An injunction may be justified, for example, where there is a particularly strong likelihood of success on the merits even if there is a relatively slight showing of irreparable injury." CityFed Fin. Corp., 58 F.3d at 747. Moreover, the other salient factor in the injunctive-relief analysis is irreparable injury. A movant must "demonstrate at least `some injury'" to warrant the granting of an injunction. CityFed Fin. Corp., 58 F.3d at 747 (quotation omitted). Indeed, if a party makes no showing of irreparable injury, the court may deny the motion for injunctive relief without considering the other factors. Id. Because interim injunctive relief is an extraordinary form of judicial relief, courts should grant such relief sparingly. Mazurek v. Armstrong, 520 U.S. 968, 972, 117 S.Ct. 1865, 138 L.Ed.2d 162 (1997). As the Supreme Court has said, "[i]t frequently is observed that a preliminary injunction is *44 an extraordinary and drastic remedy, one that should not be granted unless the movant, by a clear showing, carries the burden of persuasion." Id. (citation omitted). Therefore, although the trial court has the discretion to issue or deny a preliminary injunction, it is not a form of relief granted lightly. In addition, any injunction that the court issues must be carefully circumscribed and tailored to remedy the harm shown. Nat'l Treasury Employees Union v. Yeutter, 918 F.2d 968, 977 (D.C.Cir. 1990) (citation omitted). B. The Court Denies the Plaintiffs Second Motion for Injunctive Relief In the instant motion, the plaintiff claims that the FDA has violated the APA and the FDCA by failing to require generic versions of Wellbutrin XL to carry the same labeling as Wellbutrin XL.[7] Pl.'s Mot. at 15. Specifically, the plaintiff asserts that Anchen's product cannot legitimately have the same labeling as Wellbutrin XL because the FDA did not first require Anchen's product to demonstrate bioequivalence to the immediate-release and sustained-release versions of Wellbutrin. Id. at 11, 14-15. The plaintiff then argues that if the FDA allows Anchen's product to have the same labeling absent additional bioequivalence studies, the labeling would be false and misleading and contrary to statute. Am. Compl. ¶ 31, Pl.'s Reply at 2. Because the FDA properly applied the relevant statute and regulations, the court concludes that the plaintiff cannot demonstrate a likelihood of' success on the merits. And, because the plaintiff demonstrates only economic and speculative injury, the court concludes that it has made an insufficient showing of irreparable injury. Accordingly, the court denies the plaintiff the extraordinary relief of a TRO. 1. The Plaintiff Fails to Demonstrate a Substantial Likelihood of Success on the Merits The plaintiff's overarching argument is that the defendant has failed to require generic versions of Wellbutrin to have proper labeling in violation of 21 U.S.C. § 352(a). Pl.'s Mot. at 13. Specifically, the plaintiff alleges that the FDA's refusal to require Anchen to conduct additional bioequivalence studies on its generic drug has resulted in its false and misleading labeling. Id. at 3-4. The defendant and intervenor-defendants assert that the relevant statute requires ANDA applicants to demonstrate bioequivalence only to the reference listed drug, here, Wellbutrin XL, not to other versions of the RLD. FDA's Opp'n at 18; Anchen's Opp'n at 19; Teva & Impax's Joint Opp'n at 12-15. In addition, the defendant argues that ANDAs may rely on the safety findings of the RLD and that Anchen's product's labeling is otherwise truthful and not misleading. FDA's Opp'n at 27-28. The court first addresses whether the FDA should have required Anchen's drug to independently demonstrate bioequivalence to two prior versions of Wellbutrin. Second, the court assesses whether, by not imposing such a requirement, the FDA *45 failed to require Anchen's drug to have true and accurate labeling. a. Legal Standard for Judicial Review of Agency Actions The APA entitles "a person suffering legal wrong because of agency action, or adversely affected or aggrieved by agency action . . . to judicial review thereof." 5 U.S.C. § 702. Under the APA, a reviewing court must set aside an agency action that is "arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law." Id. § 706; Taurus Records, Inc. v. Drug Enforcement Admin., 259 F.3d 731, 736 (D.C.Cir.2001). In making this inquiry, the reviewing court "must consider whether the [agency's] decision was based on a consideration of the relevant factors and whether there has been a clear error of judgment." Marsh v. Oregon Natural Res. Council, 490 U.S. 360, 378, 109 S.Ct. 1851, 104 L.Ed.2d 377 (1989) (internal quotations omitted). At a minimum, the agency must have considered relevant data and articulated an explanation establishing a "rational connection between the facts found and the choice made." Bowen v. Am. Hosp. Ass'n, 476 U.S. 610, 626, 106 S.Ct. 2101, 90 L.Ed.2d 584 (1986); Tourus Records, 259 F.3d at 736. An agency action usually is arbitrary or capricious if the agency has relied on factors which Congress has not intended it to consider, entirely failed to consider an important aspect of the problem, offered an explanation for its decision that runs counter to evidence before the agency, or is so implausible that it could not be ascribed to a difference in view or the product of agency expertise. Motor Veh. Mfrs. Ass'n v. State Farm Mut. Auto. Ins. Co., 463 U.S. 29, 43, 103 S.Ct. 2856, 77 L.Ed.2d 443 (1983); see also County of L.A. v. Shalala, 192 F.3d 1005, 1021 (D.C.Cir.1999) ("Where the agency has failed to provide a reasoned explanation, or where the record belies the agency's conclusion, [the court] must undo its action"). As the Supreme Court has explained, however, "the scope of review under the `arbitrary and capricious' standard is narrow and a court is not to substitute its judgment for that of the agency." Motor Veh. Mfrs. Ass'n, 463 U.S. at 43, 103 S.Ct. 2856. Rather, the agency action under review is "entitled to a presumption of regularity." Citizens to Pres. Overton Park, Inc. v. Volpe, 401 U.S. 402, 415, 91 S.Ct. 814, 28 L.Ed.2d 136 (1971), abrogated on other grounds by Califano v. Sanders, 430 U.S. 99, 97 S.Ct. 980, 51 L.Ed.2d 192 (1977). "The requirement that agency action not be arbitrary or capricious includes a requirement that the agency adequately explain its result." Pub. Citizen, Inc. v. Fed. Aviation Admin., 988 F.2d 186, 197 (D.C.Cir.1993). This requirement is not particularly demanding, however. Id. Nothing more than a "brief statement" is necessary, as long as the agency explains "why it chose to do what it did." Tourus Records, 259 F.3d at 737. If the court can "reasonably discern[]" the agency's path, it will uphold the agency's decision. Pub. Citizen, 988 F.2d at 197 (citing Bowman Transp., Inc. v. Arkansas-Best Freight Sys., Inc., 419 U.S. 281, 286, 95 S.Ct. 438, 42 L.Ed.2d 447 (1974)). b. The Plaintiff has Not Shown that the FDA Wrongfully Failed to Require Additional Bioequivalence Studies Wellbutrin XL is the RLD for Anchen's drug and the intervenor-defendant's drug. Pl.'s Mot. at 3-4; FDA's Opp'n at 13; Anchen's Opp'n at 16; Teva & Impax's Joint Opp'n at 1. Because Wellbutrin XL's labeling reflects bioequivalency to the immediate-release and sustained-release versions *46 of Wellbutrin, the plaintiff argues that all generic versions of Wellbutrin XL must also demonstrate bioequivalency to immediate-release and sustained-release Wellbutrin in order to carry the same labeling as the RLD. Pl.'s Mot. at 3-4. The first issue, therefore, is whether the FDA violated the APA and FDCA by not requiring Anchen's drug to demonstrate bioequivalency to other versions of Wellbutrin in order to have proper labeling. Id. at 11. The court begins with the plain text of the statute. In re England, 375 F.3d 1169, 1177 (D.C.Cir.2004). The statute requires an ANDA to provide information to show that the new drug is bioequivalent to the listed drug . . . information to show that the active ingredients of the new drug are of the same pharmacological or therapeutic class as those of the listed drug . . . and the new drug can be expected to have the same therapeutic effect as the listed drug when administered to patients [and] information to show that the labeling proposed for the new drug is the same as the labeling approved for the listed drug . . . 21 U.S.C. § 355(j)(1)(A)(iv)-(v). The FDCA requires an ANDA applicant to demonstrate its generic drug's bioequivalency only to the "listed drug," or the RLD. 21 U.S.C. § 355(j)(2)(a)(iv); Pfizer Inc. v. Shalala, 182 F.3d 975, 977 (D.C.Cir. 1999) (stating that to gain approval of an ANDA, an applicant must show that its generic drug is "bioequivalent to the listed [pioneer] drug") (quoting 21 U.S.C. § 355(j)(4)(F)). Reading the plain words of the text and attributing ordinary meaning to the language used, the court can discern no ambiguity in the statute's requirement for an ANDA applicant to demonstrate bioequivalency between the generic drug and the RLD. The only RLD for Anchen's product is Wellbutrin XL. Therefore, by requiring Anchen to only demonstrate that its drug is the bioequivalent of Wellbutrin XL, the FDA complied strictly with the terms of the statute. Accordingly, the court concludes that plaintiff cannot demonstrate that it is likely to succeed on its claim that the FDA's actions were arbitrary, capricious or otherwise not in accordance with law. Hughes Aircraft Co. v. Jacobson, 525 U.S. 432, 438, 119 S.Ct. 755, 142 L.Ed.2d 881 (1999) (stating that the court's analysis begins and ends "where the statutory language provides a clear answer"). c. The Plaintiff has Not Shown that the FDA Allowed Generic Versions of Wellbutrin XL to have False and Misleading Labeling The plaintiff next argues that if generic versions of Wellbutrin XL bear labels representing that Wellbutrin XL is the bioequivalent of the immediate-release and sustained-release versions of Wellbutrin without conducting the bioequivalency studies, their labels are inherently false and misleading. Pl.'s Reply at 5. The defendant counters that ANDAs for generic drugs are entitled to rely on the proven safety and effectiveness findings of the RLD, FDA's Opp'n at 23, and that Anchen's drug's label is accurate in that it does not state that Anchen has independently demonstrated bioequivalence to the immediate-release and sustained-release versions, id. at 27. The applicable regulation requires a generic drug to prove that it has the same labeling as the RLD except for differences that may include differences in expiration date, formulation, bioavailability, or pharmacokinetics, labeling revisions made to comply with current FDA labeling guidelines or other guidance, or omission of an indication or other aspect *47 of labeling protected by patent or accorded exclusivity. 21 C.F.R. 314.94(a)(8)(iii)-(iv). The FDA interprets this regulation to allow a generic drug's labeling to "include information on scientific studies that were conducted on the RLD" and that, on such a label, "the drug product studies may be identified by its established (chemical) name, rather that its brand-name." FDA's Opp'n at 9. The excerpts of Anchen's drug's approved label that the plaintiff disputes demonstrate that the labels are, in fact, identical to the Wellbutrin XL label except for the substitution of "bupropion hydrochloride extended-release tablets (XL)" for "Wellbutrin XL." Pl.'s Reply at 7-8. The plaintiff does not dispute the. FDA's assertion that substitution of the drug's established name for the RLD's brand name is an acceptable practice. Rather, the plaintiff argues that in this circumstance, the substitution amounts to a representation that bioequivalence has been established among generic Wellbutrin and the sustained-release and immediate-release versions of Wellbutrin. Id. at 13. The administrative record reveals that the FDA considered the purpose of the statute and regulations and the effects of the same-labeling requirement in approving the generic drug label. Clarifying its interpretation of the identical labeling requirement, the FDA stated that "the purpose of the equivalency information . . . in Wellbutrin XL's approved labeling regarding the immediate-release, sustained-release, and extended-release formulations is not to demonstrate substitutability among the three formulations, as these formulations are not therapeutically equivalent and therefore are not substitutable." Id., Ex. 23 at 7. The FDA also asserted that the equivalency information of the three versions of Wellbutrin was intended to "assist prescribers in administering the drug product if they want to convert their patients from one formulation to another." Id. In considering the plaintiff's citizen petition, the FDA explained that once a company demonstrates that its generic product is, inter alia, the bioequivalent to Wellbutrin XL, "the Wellbutrin XL labeling, including equivalence and seizure information, would be applicable to the generic extended-release product." Id. Based on its scientific research and judgment, the FDA then concluded that "Wellbutrin XL's substantive risk information is applicable to Anchen's product without requiring Anchen to conduct the additional bioequivalence studies Biovail proposes." FDA's Opp'n at 25. Therefore, the FDA interpreted the regulatory requirement for the same labeling and concluded that Anchen's drug's label was the same as Wellbutrin XL's label "with permissible differences." FDA's Opp'n at 10. The FDA conducted studies to determine the safety and effectiveness of Wellbutrin XL, and it determined that Anchen's ANDA, including the proposed label, warranted approval. See generally id., Ex. 23 at 7. Because this determination rests squarely on the FDA's "`evaluation of scientific data within its area of expertise,' [it is] entitled to a `high level of deference' from this court." Serono Labs., Inc. v. Shalala, 158 F.3d 1313, 1320 (D.C.Cir.1998) (citing A.L. Pharma, Inc. v. Shalala, 62 F.3d 1484, 1490 (D.C.Cir. 1995)). Reviewing the FDA's considerations reflected in the record, the court cannot presently conclude that the FDA failed to perform necessary evaluations or that it made a clear error of judgment. Citizens to Preserve Overton Park, Inc. v. Volpe, 401 U.S. 402, 416, 91 S.Ct. 814, 28 L.Ed.2d 136 (1971). The court must defer to the defendant's interpretation of the regulation unless it is *48 "plainly erroneous or inconsistent with the regulation." Mistick PBT v. Chao, 440 F.3d 503, 513 (D.C.Cir.2006) (quoting Sec'y of Labor v. Twentymile Coal Co., 411 F.3d 256, 260 (D.C.Cir.2005)). The FDA interpreted the same-label requirement to mean that the generic drugs must bear a label reflecting the tests performed on the RLD, and this practice is consistent with the statutory and regulatory framework. SmithKline Beecham Consumer Healthcare, L.P. v. Watson Pharm., Inc., 211 F.3d 21, 26 (stating that a "generic drug's labeling will include information scientific studies that were conducted on the RLD"). Moreover, this interpretation is expressly consistent with the regulatory requirement that the labeling be the same as that of the RLD. 21 C.F.R. § 314.94(a)(8)(iv). Congress intended generic drug labels to provide the same information as the RLD. SmithKline, 211 F.3d at 28 (concluding that the same labeling requirement trumped copyright concerns because "Congress left no room for [redundant scientific studies] and adopted the `same' labeling requirement [and fulfilling that requirement] will often violate copyrights"). Indeed, it is well accepted that "the plain language of the Hatch-Waxman Amendments, their legislative history, and their interpretation by the FDA all require manufacturers of generic drugs to copy the labeling of pioneer drugs `near-verbatim' to obtain ANDA approval." Id. at 27, n. 2. In sum, the FDA's actions are consistent with the statutory and regulatory requirements, and the plaintiff has not demonstrated a substantial likelihood of success on the merits of its argument that the FDA approved false and misleading labeling. Mineta, 231 F.Supp.2d at 40 (quoting United States Dep't of Interior v. Fed. Energy Reg. Comm'n, 952 F.2d 538, 546 (D.C.Cir.1992)). 2. The Plaintiff has Made an Insufficient Showing of Irreparable Harm Because the plaintiff failed to show a substantial likelihood of success on the merits, it must make a "very strong" showing of irreparable harm to obtain a TRO. Sandoz, Inc. v. Food & Drug Admin., 2006 WL 1897728, at *3 (D.D.C. July 12, 2006) (quoting Apotex, Inc., v. Food & Drug Admin., 2006 WL 1030151, at *16 (D.D.C. April 19, 2006)). In denying the plaintiff's first motion for a TRO, the court concluded that the plaintiff made an insufficient showing of irreparable harm to carry its burden. Mem. Op. (Sept. 6, 2006) ("Mem. Op.") at 15-18. Curiously, in its second motion for a TRO, the plaintiffs arguments regarding irreparable harm are quite similar to those previously rejected by the court. The core of the plaintiff's injury argument is that if unsafe generic versions of Wellbutrin XL reach the market and injure patients, the plaintiff will suffer damage to its reputation,[8] damage to its relationship with customers and nonrecoverable monetary loss. Pl.'s Mot. at 17. The plaintiff argues, in one brief paragraph, that it will suffer "customer loss [and] potential harm to relationships with customers." Id. at 17. Because the court previously rejected the argument that market competition constitutes irreparable harm, Mem. Op. at 16, the court presumes that the plaintiff now alleges that the harm *49 to customer relationships will result from dangerous generic drugs entering the market rather than from competition. Nevertheless, the plaintiff has failed, for the second time, to allege that the generic versions of Wellbutrin XL will cause health problems or that a danger to the public will result from the labeling of the generic drugs.[9] The plaintiff merely asserts that, if the products are mislabeled, "there is a significant risk of inadvertent under-dosing, which may increase the risk of a clinical relapse, or inadvertent overdosing, which may significantly increase the risk of developing seizures." Pl.'s Mot. at 19. The court must again state that, absent evidence that the generic drug pending approval will actually cause harmful health effects, these allegations fail to meet the requisite standard. Bristol-Myers Squibb Co., 923 F.Supp. at 221. The potential for physicians to err in prescribing the generic drugs and the consequent potential for harmful results is insufficient to justify the extraordinary relief of a TRO. Id. (concluding that the plaintiff had not demonstrated the requisite harm when "there [was] nothing before the court which would lead it to conclude that [the generic drug would] cause any harmful health effects"). Finally, the plaintiff argues that the economic harm it will suffer is unrecoverable, and therefore irreparable, because the FDA is immune from suit for damages. Pl.'s Mot. at 18. Tellingly, the plaintiff cites no on-point case law to support this proposition. Indeed, this argument, is peripheral to the plaintiffs ability to show irreparable injury. To demonstrate irreparable injury, a plaintiff must allege a harm that "requir[es] a remedy of more than mere monetary damages. A monetary loss will not suffice unless the movant provides evidence of damage that cannot be rectified by financial compensation." Gen. Textile Printing v. Expromtorg Intern., 862 F.Supp. 1070, 1075 (S.D.N.Y. 1994). Therefore, the plaintiffs inability to recover monetary damages from the FDA is immaterial to the court's consideration, and the plaintiff has failed to demonstrate that it will suffer anything other than economic harm. 3. Other Interested Parties The plaintiff asserts that the harm to itself outweighs any harm to other interested parties because "any claimed investment in developing a generic version of Wellbutrin XL pales in comparison to the expense that was incurred in conducting extensive clinical trials" to gain approval of Wellbutrin XL. Pl.'s Mot. at 21. If realized in precisely the incarnation the plaintiff proposes, the harm to the plaintiff would indeed be great. But, this showing *50 of harm, as discussed supra, is supported by mere speculation. The harm to the intervenor-defendants, however, is both tangible and imminent: if the court stays the effectiveness of the FDA's rulings, their products do not reach the market. Intervenor-defendant Anchen argues that, should the court grant injunctive relief, it will lose its "immediate and unqualified statutory right to manufacture and market" its generic product. Anchen's Opp'n at 28. Anchen is a start up company, and its generic Wellbutrin product "is its first and only approved ANDA product." Id. Moreover, "Teva stands to forever lose millions of dollars even from a temporary interruption of its ongoing sales" of the newly-approved generic product. Teva & Impax's Joint Opp'n at 21. An injunction would also prevent Teva from fulfilling contracts related to its generic product.[10]Id. Anchen, Impax and Teva all stand to lose their 180-day marketing exclusivity period that initiated on December 14, 2006. Impax Opp'n at 20. Therefore, while the court acknowledges the extensive investment expense required to develop and pursue FDA approval of a new drug, it cannot conclude, as the plaintiff claims, that harm to other parties is "greatly outweighed" by the harm that the plaintiff may suffer. Id. at 20. 4. Public Interest The public will suffer harm if the FDA does not follow proper procedures in approving generic drugs and if harmful drugs enter the marketplace as a result. At the same time, and as addressed previously by this court, the public also has a well-recognized interest in "receiving generic competition to brand-name drugs as soon as is possible," Boehringer Ingelheim Corp. v. Shalala, 993 F.Supp. 1, 3 (D.D.C. 1997), and a "delay in the marketing of [the generic] drug could easily be against the public interest in reduced prices," Schering Corp. v. Sullivan, 782 F.Supp. 645, 652 (D.D.C.1992). The plaintiff has not shown that the FDA misapplied the applicable statutes and regulations or that the generic drugs are unsafe. Therefore, the court concludes that injunctive relief, and the consequent delay of generic drugs' entry into the marketplace, would not serve the public interest. IV. CONCLUSION For the foregoing reasons, the court denies the plaintiff's second motion for injunctive relief. An order consistent with this Memorandum Opinion is issued this 22nd day of March, 2007. NOTES [1] The plaintiffs, Biovail Corporation and Biovail Laboratories International SRL (collectively, "the plaintiff" or "Biovail") also bring a motion for leave to file an amended complaint. Pl.'s Mot. for Leave to File Am. Compl. Because the defendant and intervenor-defendants have not filed a responsive pleading and because the plaintiff may amend its complaint once as a matter of right, the court grants the plaintiff's motion. James V. Hurson Assocs., Inc. v. Glickman, 229 F.3d 277, 282-83 (D.C.Cir.2000) (citing FED, R.Ctv.P. 15(a)). [2] Andrew C. Von Eschenbach is sued in his official capacity as Acting Commissioner of Food and Drugs at the FDA. [3] Individuals seeking approval of a generic form of an FDA-approved innovator drug may file an Abbreviated New Drug S Application ("ANDA") which relies on the findings of safety and effectiveness of the innovator, or "brand name," drug. 21 U.S.C. § 355(j); TorPharm, v. Thompson, 260 F.Supp.2d 69, 70 (D.D.C.2003). [4] Because the instant motion is borne out of the same facts as the plaintiff's first motion for a Temporary Restraining Order ("TRO"), the court only discusses new facts pertinent to the plaintiffs second motion for a TRO. For a full recitation of the facts, see the court's September 6, 2006 Memorandum Opinion. [5] The reference listed drug ("RLD") is the brand name drug on whose findings of safety and effectiveness an ANDA can rely in seeking FDA approval. Zeneca, Inc. v. Shalala., 213 F.3d 161, 164 (4th Cir.2000) (citing In re Barr Labs., Inc, 930 F.2d 72, 73 (D.C.Cir.1991)). [6] A drug is the bioequivalent of an innovator drug if "the rate and extent of absorption of the generic drug do not show a significant difference from the rate and extent of absorption of the listed drug." 21 U.S.C. § 355(j)(8)(B). [7] In its reply, the plaintiff states that "[w]hen it submitted its moving papers, Biovail had not yet seen the actual label approved by FDA for generic WELLBUTRIN XL." After having viewed the approved label for generic Wellbutrin XL, the plaintiff understandably appears to abandon its initial contention that the FDA has failed to require Anchen's drug to have identical labeling to Wellbutrin XL. See generally Pl.'s Reply. The plaintiff's primary argument in its reply is that the approved generic drug's label is false and misleading. The court, nevertheless, addresses the argument that the defendant failed to require the same labeling to the extent necessary to analyze the plaintiff's other arguments. [8] Because the court has already ruled on the plaintiff's showing of injury to reputational damage and loss of property interest, it need not linger long to reject these allegations as insufficient. As stated in this court's previous opinion, these arguments evidence economic loss, and it is well established that economic loss is insufficient to demonstrate irreparable injury. Mem. Op. at 15 (citing Wisc. Gas Co. v. FERC, 758 F.2d 669, 674 (D.C.Cir.1985) (per curiam)). [9] In an attempt to demonstrate that the generic drugs are mislabeled and unsafe, the plaintiff asks the court to assume that there is a 4% chance that a given brand name WELLBUTRIN XL tablet is not truly equivalent with the sustained-release or immediate-release forms of bupropion (which falls within FDA's 5% guidelines) [and to a]ssume further that there is a 4% chance that a given Anchen generic tablet is not truly equivalent with WELLBUTRIN XL (again, falling within the 5% guideline). While each individual comparison falls with in the 5% guideline, there may be a greater than 5% chance that each Anchen tablet is not truly equivalent to the sustained-release and immediate-release form . . . Thus, Anchen's labeling is not only false and misleading . . . but it has the potential to understate the important medical risks with its product. Pl.'s Mot. at 16. This argument, however, evidences the speculative nature of the plaintiff's allegations, and their failure serve as an acceptable foundation for injunctive relief. Bristol-Myers Squibb Co. v. Shalala, 923 F.Supp. 212, 221 (D.D.C.1996). The court declines to award injunctive relief on the basis of hypothetical mathematics. [10] The court notes that the cases cited by the plaintiff in support of its argument of irreparable injury to itself directly contradict its argument that the harm to the intervenor-defendant's is insignificant. See Express One Intern., Inc. v. U.S. Postal Serv., 814 F.Supp. 87. 91 (D.D.C.1992) (stating that the court has recognized irreparable injury when a party lost the renewal of a contract to another bidder). | Low | [
0.475161987041036,
27.5,
30.375
] |
Thanks to technology, the dating scene is a brave new world. Now Cathy Reisenwitz, editor of Sex and the State, calls for an end to “radical sexual purity” and the beginning of an era of “radical sexual honesty.” On Federalist Radio, Reisenwitz argues that, reacting to market forces, new hookup technologies like Tinder have liberated women and require a “revaluation of marriage.” In response to this evolution, she calls for a “change in gender roles.” Later Taina Bien-Aimé, Executive Director of the Coalition Against Trafficking in Women, joined the program to discuss the issue of legalized prostitution. Unlike Reisenwitz, Bien-Aimé believes prostitution is “a form of exploitation…where men purchase violence and sexual harassment; they purchase denigration and dehumanization.” Click here or use the link below to listen. | Low | [
0.50733752620545,
30.25,
29.375
] |
Q: Dynamic UNION ALL query in Postgres We are using a Postgres / PostGis connection to get data that is published via a geoserver. The Query looks like this at the moment: SELECT row_number() over (ORDER BY a.ogc_fid) AS qid, a.wkb_geometry AS geometry FROM ( SELECT * FROM test UNION ALL SELECT * FROM test1 UNION ALL SELECT * FROM test2 )a In our db only valid shapefiles will be imported each in a single table so it would make sense to make the UNION ALL part dynamic (loop over each table and make the UNION ALL statement). Is there a way to do this in a standard Postgres way or do I need to write a function and how would the syntax look like? I am pretty new to SQL. The shapefiles have a different data structure and only the ogc_fid column and the wkb_geometry column are always available and we would like to union all tables from the DB. A: This is just general guidelines you need work in the details specially syntaxis. You need create a store procedure Create a loop checking information_schema.tables filter for the tablenames you want DECLARE rec record; strSQL text; BEGIN Then create a strSQL with each table FOR rec IN SELECT table_schema, table_name FROM information_schema.tables LOOP strSQL := strSQL || 'SELECT ogc_fid, wkb_geometry FROM ' || rec.table_schema || '.' || rec.table_name || ' UNION '; END LOOP; -- have to remove the last ' UNION ' from strSQL strSQL := 'SELECT row_number() over (ORDER BY a.ogc_fid) AS qid, a.wkb_geometry AS geometry FROM (' || strSQL || ')'; EXECUTE strSQL; | High | [
0.665116279069767,
35.75,
18
] |
/** * This is information the language plugin needs to supply * in addition to just the Flow types. */ [@gentype] type operationType = | Fragment(string, bool) // Name, isPlural | Mutation(string) | Subscription(string) | Query(string); [@gentype] type connectionInfo = { key: string, atObjectPath: array(string), fieldName: string, }; type unionMember = { name: string, shape: object_, } and union = { members: list(unionMember), atPath: list(string), } and scalarValues = | Int | String | Float | Boolean | CustomScalar(string) | Any and propType = | DataId | Scalar(scalarValues) | StringLiteral(string) | Enum(fullEnum) | Object(object_) | Array(propValue) | FragmentRefValue(string) | TypeReference(string) | Union(union) | TopLevelNodeField(string, object_) and propValue = { nullable: bool, propType, } and propValues = | FragmentRef(string) | Prop(string, propValue) and object_ = { values: array(propValues), atPath: list(string), } and rootType = | Operation(rootStructure) | RawResponse(option(rootStructure)) | Fragment(rootStructure) | Variables(rootStructure) | ObjectTypeDeclaration({ definition: object_, name: string, atPath: list(string), }) | RefetchVariables(object_) | PluralFragment(rootStructure) and fullEnum = { name: string, values: array(string), } and rootStructure = | Union(union) | Object(object_) and fragment = { name: string, plural: bool, definition: rootStructure, }; type obj = { originalFlowTypeName: option(string), definition: object_, foundInUnion: bool, }; type unionInState = { printName: bool, union, }; type finalizedObj = { originalFlowTypeName: option(string), recordName: option(string), atPath: list(string), definition: object_, foundInUnion: bool, }; type intermediateState = { enums: list(fullEnum), objects: list(obj), variables: option(obj), response: option(obj), rawResponse: option(obj), fragment: option(fragment), }; type fullState = { enums: list(fullEnum), unions: list(unionInState), objects: list(finalizedObj), variables: option(object_), response: option(object_), rawResponse: option(object_), fragment: option(fragment), }; [@gentype] type printConfig = {connection: option(connectionInfo)}; | Mid | [
0.5668662674650691,
35.5,
27.125
] |
H. Clay Earles Henry Clay Earles (August 11, 1913 – November 16, 1999) was the founder and chairman of the board of Martinsville Speedway, a NASCAR stock car racing track that Earles built in 1947 in Ridgeway, Virginia that was one of the circuit's first paved oval tracks and stands as one of its shortest. Born in Axton, Virginia on August 11, 1913, Earles started making money as a five-year-old, selling unwanted leaves from his father's tobacco farm. Initially educated in a one-room schoolhouse, he dropped out of school so that he could help support his family with the 25 cents he earned each hour at a furniture factory. His first business venture was a failed pool hall, but a gas station was successful and its profits helped pay for a drive-in restaurant in Martinsville, Virginia. The restaurant was sold to buy another gas station. Having seen the crowds attracted by car racing at temporary tracks at fairgrounds, he built a track on of land he had purchased in 1946. The first scheduled race, predating the establishment of NASCAR, took place on September 7, 1947, drawing more than 6,000 spectators at a facility that only had 750 seats; Seating capacity had grown to 86,000 by the time of Earles' death. In its inaugural year, Bill France, Sr. provided the track with advertising and drivers in exchange for one-fourth of profits, and became the founding president of NASCAR when it was incorporated the next year. Martinsville Speedway is the only one of NASCAR's original tracks still in use. Red Byron was awarded a $500 prize for winning the inaugural race at the track, which had grown to $170,000 by 1999. Earles began a tradition in 1964 of distributing grandfather clocks to race winners, with Richard Petty receiving a track-record of 12, and would have received three more for wins that predated the inception of the practice. The track measures around, with a pair of straightaways and tight turns banked at 12 degrees, described as two dragstrips with tight turns. The track was first paved in 1955. Unlike the superspeedways, Martinsville became a track where the skill and strategy of each individual driver could overcome the big money and horsepower of the larger teams. Earles died at age 86 on November 16, 1999 at his Martinsville home. References Category:NASCAR people Category:People from Henry County, Virginia Category:1913 births Category:1999 deaths Category:People from Martinsville, Virginia | High | [
0.671035386631716,
32,
15.6875
] |
Q: 'Could not load file or assembly System.IO.Compression' on UWP My application is a Universal Window Platform application. I try to implement a Runtime Component to decompress a zipped folder. One of my requirements is that paths which are longer than 260 characters can be handled. public static IAsyncActionWithProgress < string > Unzip(string zipPath, string destination) { return AsyncInfo.Run < string > (async(_, progress) => { var zipFile = await StorageFile.GetFileFromApplicationUriAsync(new Uri(zipPath)); try { Stream stream = await zipFile.OpenStreamForReadAsync(); ZipArchive archive = new ZipArchive(stream); archive.ExtractToDirectory(destination); } catch (Exception e) { Debug.WriteLine(e.Message); } }); } I tried to execute my method getting following exception message: System.IO.FileNotFoundException: Could not load file or assembly 'System.IO.Compression, Version=4.1.1.0, Culture=neutral, PublicKeyToken=b77a5c561934e089' or one of its dependencies. The system cannot find the file specified. at Zip.Zip.<>c__DisplayClass0_0.<<Unzip>b__0>d.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder.Start[TStateMachine](TStateMachine& stateMachine) at Zip.Zip.<>c__DisplayClass0_0.<Unzip>b__0(CancellationToken _, IProgress`1 progress) at System.Thread (~4340) I tried to add System.IO.Compression with NuGet but I still get the same error. The zip file and the destination folder exist. I tried to debug my project on Visual Studio 2015 instead of Visual Studio 2017 and found out that I can use System.IO.Compression in that way but there is a restriction for the length of paths. A: Firstly, by testing on my side, with the newest Visual Studio 2017, your code snippet could work well with file path less than 260 characters by default. If using a longer path than 260 characters visual studio 2017 will throw exception System.IO.PathTooLongException: 'The filename or extension is too long. which is same as Visual Studio 2015. SO please check if you are using the namespace correctly. using System.IO.Compression; One of my requirements is that paths which are longer than 260 characters can be handled. Secondly, the error is thrown when you tried to get the file by GetFileFromApplicationUriAsync method. So this is not the System.IO.Compression namespace issue, what you actually need to resolve is Maximum Path Length Limitation, details please reference this article. For more details about file path too long issue please try to reference this thread. But they may not suit for UWP app. In UWP app you can use a FileOpenPicker to get the file and pass the file to the component for reading the file stream. The file picker will convert the long file name to a shot one like "xxx-UN~1.ZIP" for reading. FileOpenPicker openpicker = new FileOpenPicker(); openpicker.FileTypeFilter.Add(".zip"); var zipfile = await openpicker.PickSingleFileAsync(); Stream stream = await zipfile.OpenStreamForReadAsync(); ZipArchive archive = new ZipArchive(stream); archive.ExtractToDirectory(destination); I recommend you to avoid using long file path. | Low | [
0.525612472160356,
29.5,
26.625
] |
Molecular Libraries and Imaging Program Highlights A compound originally identified with the support of the Molecular Libraries program has led to a drug candidate now entering a Phase 1 clinical trial in patients with multiple myeloma that has proved resistant to two or more established treatment options. The experimental compound, CB-5083, inhibits a protein called p97 that is critical to many cellular functions, including cell division. CB-5083 is derived from a compound called ML240 that was initially identified by Dr. Tsui-Fen Chou, working in the laboratory of Dr. Raymond Deshaies at Caltech. To identify ML240, Drs. Chou and Deshaies collaborated with members of the Molecular Libraries Probe Production Centers Network, including the Scripps Molecular Screening Center and the Specialized Chemistry Center at the University of Kansas. Ongoing research with CB-5083 has shown promise in treating other types of cancer in mice, and Phase 1 clinical trials for CB-5083 in the treatment of solid tumors are expected to start later this year. MOLECULAR LIBRARY PROBE TO BE FURTHER DEVELOPED INTO A THERAPEUTIC ML probe #341, a compound developed by the NIH Molecular Libraries Probe Production Center at the Broad Institute of MIT and Harvard University, which is part of the NIH Common Fund Molecular Libraries Program, has been chosen for further development by The Global Health Innovative Technology (GHIT) fund as a candidate therapeutic for Chagas disease. The GHIT fund was launched in May, 2013 to bring the knowledge and ability of the Japanese pharmaceutical industry to better address infectious diseases that disproportionately affect those living in poverty around the world. The GHIT is a tripartite partnership including a consortium of five of Japan's biggest pharmaceutical companies, the Japanese government, and the Bill and Melinda Gates Foundation. Chagas disease is caused by the parasite Trypanosoma cruzi, which is transmitted to humans and other animals via blood-sucking insects. The disease is endemic to the Americas, chiefly infecting those in poverty-stricken rural areas of Latin America. This new funding lends support that could potentially lead to new therapeutics for this significant parasitic disease. Read more about the new GHIT fund projects here. Read more about ML #341 here. Receptos, Inc. announced in December, 2013 that they have completed an analysis of the Phase 2 portion of its Phase 2/3 trial of RPC1063 in relapsing multiple sclerosis (RMS). A compound initially discovered by the NIH Molecular Libraries Probe Production Center at The Scripps Research Institute, which is part of the NIH Common Fund Molecular Libraries Program, was used as a precursor in the development of RCPT1063 by Receptos Inc. Based on these new findings, the compound has been approved for continuation of the Phase 2 portion as well as initiation of the Phase 3 portion of the study. This is an important milestone, because in phase 3 the treatment is given to large groups of people to while comparing it to commonly used treatments. Phase 3 is the last phase prior to FDA evaluation of a new drug. As of January 2014, Receptos has actively enrolled the first patients for the phase 3 portion of the trial. Mental illness is a serious burden on a global scale. Bipolar disorder is estimated to affect anywhere between 1-3% of the global population. Despite the high burden, little progress has been made for treating the disorder since the introduction of lithium as a treatment in 1949. A major concern is that twice the prescribed dose can be potentially lethal. There are also numerous well-documented side effects. However, a research team from Oxford University has utilized the NIH Common Fund Supported Clinical Collection to discover an enticing lithium replacement. The NIH Clinical Collection comprises small molecules that have a history of use and safety in human clinical trials. In a study published in Nature Communications, the research team has found that the chemical ebselen targets inositol monophosphatase, the enzyme that has been suggested as a possible target for lithium as well. Ebselen appears in mice to more specifically work with this target than lithium, with similar efficacy. These findings show that this target may be used in industry for new drug discoveries and also shows promising results that ebselen, a compound tested in humans, may be a viable option for bipolar disorder treatment. NEW APPROACH TO ATTACKING VIRUSES: RESEARCHERS DISCOVER EFFECTIVE INHIBITOR TO CONTROL HERPESVIRUS INFECTION AND REACTIVATION Members of the herpesvirus family establish life-long dormant infections in people that can reactivate at any time to cause disease. Presently, there has been a focus on treatments that target the late stages of infection in those with herpes, particularly simplex virus (HSV) types 1 and 2, which cause oral and genital herpes. Furthermore, serious illness occurs when immune-compromised patients previously infected with another type of herepesvirus, human cytomegalovirus (CMV) suffer a reactivation. To date, drugs have been developed to target late stages of infection, with some success. In a new study, a probe developed from the NIH Chemical Genomics Center (NCGC), which is funded by the NIH Common Fund Molecular Libraries program, has been shown to be effective during lab studies at repressing early expression genes and therefore preventing infections from establishing. This molecule works by targeting human proteins to fight infections. Their studies also demonstrate that reactivation can be inhibited by the probe compound. Overall, there are implications for the prevention of infections as well as long-term treatment in infected patient to prevent reactivation episodes. This new area of research is beginning to show results for a number of viral diseases. TEACHING OLD DRUGS NEW TRICKS: RESEARCHERS IDENTIFY NEW USES FOR A CLASS OF DRUGS TO TREAT HARMFUL MICROBES Discovering and developing new compounds into human therapeutics is an odious task. Current estimates suggest each new drug takes 10-15 years to develop at a cost upwards of two billion dollars. In addition to this high cost and length of time, several pathogenic microbes are increasingly becoming resistant to multiple antibiotics. For example, multidrug-resistant Acinetobacter infections are becoming a serious issue in hospitals. A population particularly affected has been US soldiers that have suffered combat wounds. One way to aid in the treatment of difficult to manage infections is to examine compounds that have already been approved for human use, a process known as drug repurposing or repositioning. The discovery of a class of known compounds whose repurposing may be useful in treating multidrug-resistant Acinetobacterinfections could lead to the development of broad-spectrum antimicrobials that could become useful in the clinical setting, both for civilians and military personnel. The NIH Clinical Collection (NCC) is an array of approximately 450 small molecules that have been approved by the FDA for use in humans. This collection was assembled and is funded by the NIH Common Fund Molecular Libraries program. Using the collection to testAcinetobacter isolates that were obtained from persistent wounds of US soldiers and Marines injured in the Middle East, researchers were able to identify a class of four compounds, all rifamycins, which were effective in concentrations that are achievable in humans for preventing growth of multidrug-resistant Acinetobacter strains. Furthermore, the compounds were also effective when tested against select agents including the bacterial species responsible for anthrax and plague, providing a potential countermeasure in the event of a biological attack. Cancer cells need more sugar than average mammalian cells so that they can replicate rapidly to form tumors. Pyruvate kinase, an enzyme that is fundamental for converting glucose to cellular building blocks and energy, has been long studied in an attempt to understand cancer cell metabolism. In a new advance for the cancer field, a team of researchers, funded in part by the NIH Common Fund’s Molecular Libraries and Imaging program, have characterized molecules that activate a specific form of the enzyme, pyruvate kinase m2 (PKM2). It has been known that cancer cells use PKM2 instead of PKM1 because its slower activity promotes the accumulation of glucose byproducts that can be used as building blocks for new cancer cells instead of for metabolic energy. The Molecular Libraries and Imaging program supported a collaboration between the laboratory of Dr. Matthew Vander Heiden of the Koch Institute for Integrative Cancer Research at Massachusetts Institute of Technology and the NIH Chemical Genomics Center (NCGC) screening center to identify molecules that selectively activate PKM2. In a newly published study, the research team tested the molecules in mice and illustrated that the addition of the compounds interfered with the ability of cancer cells to form tumors. They then determined the structure and properties of the molecules and showed that the molecules bind to a region of the enzyme different from that bound by the natural activator of PKM2. The novel binding mechanism is critical because it allows the molecules to resist natural inactivating proteins. Thus, discovery of this mechanism may facilitate the design of experimental cancer therapeutics that effectively activate PMK2. This research is still in its early stages, but Dr. Vander Heiden’s team and others now have insightful information that may ultimately prove valuable in the fight against several types of cancers. COMMON FUND RESEARCHERS UNCOVER STRUCTURE OF IMPORTANT TARGET FOR DRUG DESIGN Researchers supported by the NIH Common Fund and the National Institute of General Medical Sciences teamed up to characterize an important G Protein-coupled receptor (GPCR). GPCRs are a class of membrane proteins involved in an array of physiological functions and human diseases, including multiple sclerosis. Importantly, these receptor proteins are the target of approximately 40% of all medications currently on the market. Using technology developed in part through support from the Common Fund’s Structural Biology Program, the research teams of Drs. Raymond Stevens and Hugh Rosen at The Scripps Research Institute teamed up to examine the GPCR sphingosine 1-phosphate 1 (S1P1) bound to different activators and inhibitors developed through the Common Fund’s Molecular Libraries and Imaging Program. S1P1 receptors play critical roles in controlling multiple sclerosis and other diseases, making the discovery useful for advancing treatment options. Advances made in this study allowed the researchers to identify how molecules bind in different ways to the receptor and better understand at a detailed level how access to the binding pocket is gained. These advances pave the way for more targeted drug design that will yield highly effective therapeutics with fewer side effects than current treatments. These findings were published in the February 17, 2012 issue of the journal Science. MOLECULAR IMAGING AND CONTRAST AGENT DATABASE (MICAD): The Molecular Imaging and Contrast Agent Database (MICAD) is an online source of scientific information and a key component of the Molecular Libraries and Imaging program funded by the NIH Common Fund. Currently, there are over 1000 cu rated entries for agents in various categories including but not limited to compounds, antibodies and peptides. MICAD is ranked in the top 5% of page views (hits) for the National Center for Biotechnology Information (NCBI) Bookshelf. MICAD is also ranked in the top 1% for PDF downloads on the NCBI Bookshelf. These statistics demonstrate that MICAD has and will continue to be beneficial to the scientific community. In addition, MICAD is continuously updated to reflect new information about existing compounds which also includes new entries for previously unlisted agents in the database. NEW UNDERSTANDING OF DANGEROUS FLU-RELATED COMPLICATION The immune system is often thought of as an ally in the fight against invading pathogens that make us sick. But in the attempt to destroy pathogens, sometimes the immune system’s response can be more harmful than the invaders it is trying to defend against. In the 1918 Spanish flu pandemic and the recent avian and swine flu outbreaks, scientists have proposed that an excessive immune reaction flooded patients’ lungs with fluid and disease-fighting cells, contributing to the abnormally high fatality rate. This severe immune reaction involves the production of large amounts of proteins called cytokines, and hence is often called a “cytokine storm.” Because cytokine storm can be deadly, medical interventions aimed at blunting this response are extremely desirable. Recent work by Dr. Hugh Rosen, a researcher in the Common Fund’s Molecular Libraries and Imaging program, has led to a breakthrough in our understanding of the biological processes underlying cytokine storm. In a study published in the September 16, 2011 issue of Cell, Dr. Rosen and colleagues identify a small molecule compound that blocks cytokine storm and improves survival in mice infected with a strain of influenza virus that is normally fatal. This compound interacts with a protein called S1P1, a receptor on the surface of cells that binds to specific molecules and elicits a cellular response. When the researchers treated influenza-infected mice with the compound, they discovered that the cytokine storm response was diminished and survival was improved. Intriguingly, the researchers also discovered that the cells coordinating cytokine storm were not immune cells or cells from the inner surface of the lungs, as was previously thought. Instead, the cytokine storm was mediated by endothelial cells, which line the inside of blood vessels. These new insights about the role of endothelial cells and the S1P1 protein in the development of the cytokine storm response may help scientists predict which patients are most at risk for this potentially deadly complication, and also suggests potential new therapeutic targets for drug development efforts. FINDING A PERFECT MATCH – MATCHMAKING BY THE MOLECULAR LIBRARIES PROGRAM A continent apart, synthetic chemist Dr. Gregory Fu, of MIT, Cambridge, MA and Dr. Ben Cravatt of Scripps, La Jolla, CA formed a productive scientific collaboration after a unique series of chemicals Dr. Fu donated to a public repository was found to inhibit a protein of interest to Dr. Cravatt. Dr. Fu created novel aza-β-lactam (ABL) compounds, relatives of penicillin and other β-lactam antibiotics, and provided them to the Common Fund-supported Molecular Libraries Small Molecule Repository. This public resource contains over 350,000 different chemical compounds that are distributed to a network of centers for screening in high throughput assays submitted by the research community. Using an assay designed by Dr. Cravatt, the Molecular Libraries screening center at Scripps discovered that four of Dr. Fu’s novel ABLs inhibited protein phosphatase methyltransferase-1 (PME-1), a protein that has no previously known inhibitors. In work published in PNAS (read the press release), the collaborators discovered that Dr. Fu’s novel inhibitors block PME-1 activity in cells and in mice, resulting in increased activity of PME-1’s target, the major protein phosphatase, protein phosphatase 2A (PP2A). Previous research has suggested that PME-1 and PP2A may play a role in cancer growth and Alzheimer’s disease, but the lack of inhibitors for PME-1 hindered scientists’ ability to investigate these possibilities. The newly discovered inhibitors will help researchers decipher the contributions of PME-1 and PP2A to cancer and neurodegenerative disease. To donate your own chemicals, or to submit an assay for collaboration, see http://mli.nih.gov/mli/mlpcn/. FROM THE LAB TO THE CLINIC: DISCOVERY FROM MOLECULAR LIBRARIES PROGRAM ENTERS CLINICAL TRIALS Researchers in the Common Fund’s Molecular Libraries and Imaging program are tackling a tough biological problem—finding potential drug candidates that target G protein-coupled receptors (GPCRs). Dr. Hugh Rosen, funded in part by the Molecular Libraries and Imaging program, is a scientific founder of Receptos, Inc., a GPCR drug discovery and development company. GPCRs are proteins found on the cell membrane that transmit signals from the outside of the cell to elicit responses inside the cell. GCPRs play many important roles in the body, including hormone signaling, cellular communication in the brain, vision, and cardiac function. Because GPCRs are crucial to many biological processes, they are also implicated in a number of different diseases. One such GPCR, called sphingosine-1-phosphate receptor 1 (S1P1), plays a role in multiple sclerosis, an inflammatory and autoimmune disease which causes damage to the protective myelin sheaths of nerve cells and to the underlying nerve fibers. The current focus of Receptos, Inc. is to conduct clinical trials for a novel compound that targets S1P1, called RPC1063, in the hopes that this potential treatment will suppress circulating immune cells to blunt the underlying cause of multiple sclerosis. The discovery of this novel compound originated from the Molecular Libraries and Imaging program. The first phase 1 clinical safety study of RPC1063 was launched in January 2011, and Phase 2 Proof of Concept studies are expected in 2012. This research has the potential to improve the treatment of multiple sclerosis, and many other diseases that involve signaling by GPCRs. INNOVATIVE APPROACHES TO STUDY COMPLEX SIGNALING PATHWAYS IN CELLS Researchers at John Hopkins University, led by Dr. Toru Komatsu and supported through the Common Fund’s Molecular Libraries and Imaging program, have developed a novel system to target and perturb specific molecular activities and communications pathways within cells. The technique may help elucidate the structure and function of complex signaling networks that perform basic functions within cells and may someday be targeted in disease therapies. The work was published in the journal Nature Methods (2010, 7(3):206-208). | High | [
0.6761290322580641,
32.75,
15.6875
] |
70 F.3d 638 315 U.S.App.D.C. 77 NOTICE: D.C. Circuit Local Rule 11(c) states that unpublished orders, judgments, and explanatory memoranda may not be cited as precedents, but counsel may refer to unpublished dispositions when the binding or preclusive effect of the disposition, rather than its quality as precedent, is relevant.WESTINGHOUSE ELECTRIC COMPANY, Appellee,v.UNITED INDUSTRIAL SERVICES, INC., Appellant. No. 94-7236. United States Court of Appeals, District of Columbia Circuit. Oct. 13, 1995. Before: SILBERMAN, SENTELLE, and HENDERSON, Circuit Judges. JUDGMENT PER CURIAM. 1 This cause came to be heard on the record on appeal from the United States District Court for the District of Columbia, and was briefed and argued by counsel. While the issues presented occasion no need for a published opinion, they have been accorded full consideration by the Court. See D.C.Cir.R. 36(b). On consideration thereof, it is 2 ORDERED and ADJUDGED, by this Court, that the district court's judgment in favor of appellees is affirmed. The magistrate judge did not abuse his discretion in admitting the testimony of Westinghouse's metallurgy expert to prove that United violated its duty of due care in rigging the incident drum. Nor can we quarrel with the magistrate judge's conclusion that Westinghouse was not negligent in selecting the incident drum. The magistrate judge's findings as to damages are supported by the evidence. It is 3 FURTHER ORDERED, by this Court, sua sponte, that the Clerk shall withhold issuance of the mandate herein until seven days after disposition of any timely petition for rehearing. See D.C.Cir.R. 41(a)(2). This instruction to the Clerk is without prejudice to the right of any party at any time to move for expedited issuance of the mandate for good cause shown. | Mid | [
0.549668874172185,
31.125,
25.5
] |
751 F.2d 79 36 Fair Empl.Prac.Cas. 830,26 Wage & Hour Cas. (BN 1656,35 Empl. Prac. Dec. P 34,844The EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, Plaintiff-Appellee,v.The COUNTY OF ERIE and the Erie County Medical Center,Defendants-Appellants. No. 354, Docket 84-6225. United States Court of Appeals,Second Circuit. Argued Nov. 13, 1984.Decided Dec. 12, 1984. Roger J. Wittig, Asst. County Atty., Buffalo, N.Y. (Eugene F. Pigott, Jr., Erie County Atty., Buffalo, N.Y. on brief), for defendants-appellants. Robert L. Zisk, Washington, D.C. (Francis X. Lilly, Solr. of Labor, Joseph M. Woodward, Jay S. Berke, Linda Jan S. Pack, U.S. Dept. of Labor, Johnny J. Butler, Acting Gen. Counsel, Philip B. Sklover, Vella M. Fink, Karen MacRae Smith, E.E.O.C., Washington, D.C., on brief), for plaintiff-appellee. Before OAKES and KEARSE, Circuit Judges, and POLLACK, District Judge.* KEARSE, Circuit Judge: 1 Defendants County of Erie and Erie County Medical Center (the "Hospital"), unsuccessful defendants in this gender discrimination case brought by the government under Sec. 17 of the Fair Labor Standards Act ("FLSA"), 29 U.S.C. Sec. 217 (1982), and the Equal Pay Act, 29 U.S.C. Sec. 206(d) (1982), on behalf of female members of the cleaning staff of the Hospital and its predecessor, appeal from so much of a final judgment of the United States District Court for the Western District of New York, John T. Elfvin, Judge, as orders them to pay prejudgment interest on the backpay awards made by the court to those female employees. On appeal, defendants contend that the court had no power to order them to pay prejudgment interest and that even if it had the power, it abused its discretion both in making such an award and in choosing a rate of interest related to the prime rate of interest quoted by commercial banks to large businesses. Finding no merit in defendants' arguments, we affirm the judgment. BACKGROUND 2 After protracted litigation of this lawsuit, which was begun in 1971, defendants were found to have violated the Equal Pay Act by paying female cleaners less than male employees doing substantially equal work. In a final judgment entered on June 22, 1984, defendants were ordered, inter alia, to pay back wages to female cleaners from October 13, 1969, until such date as the underpayments to those employees ceased. The court held that, in order to make the previously underpaid employees whole, an award of prejudgment interest was appropriate at a rate that "takes into account the effects of inflation over the greater than ten-year period during which the cleaners were underpaid." The court therefore awarded prejudgment interest at the "adjusted prime rate" established by the Secretary of the Treasury pursuant to 26 U.S.C. Sec. 6621 (1982), calculated as to each employee from the midpoint of the period for which back wages were due. The court determined that the overriding consideration was to make the injured employee whole and therefore decided to give "limited weight" to the fact that the employer had not acted in bad faith. 3 Defendants have appealed from so much of the court's judgment as orders them to make such interest payments. They contend that the district court lacked the power to order them to pay prejudgment interest because the Equal Pay Act does not expressly provide for an award of prejudgment interest and because they are government entities. They contend that even if the court had the power, it abused its discretion in making such an award and in setting the rate of interest at the adjusted prime rate. We have considered all of defendants' arguments and find them unpersuasive. DISCUSSION 4 Defendants' most fundamental contention is that prejudgment interest cannot be awarded against a state or local government absent express statutory authorization. This argument lacks merit. The Supreme Court has upheld backpay awards against a state government in an employment discrimination suit under Title VII of the Civil Rights Act of 1964, 42 U.S.C. Secs. 2000e et seq., pointing out that "the Eleventh Amendment, and the principles of state sovereignty which it embodies, ... are necessarily limited by the enforcement provisions of Sec. 5 of the Fourteenth Amendment." Fitzpatrick v. Bitzer, 427 U.S. 445, 456, 96 S.Ct. 2666, 2671, 49 L.Ed.2d 614 (1976). The Court has also noted that the Equal Pay Act applies to municipal employees, see County of Washington, Oregon v. Gunther, 452 U.S. 161, 164 n. 3, 101 S.Ct. 2242, 2245 n. 3, 68 L.Ed.2d 751 (1981), and has ruled in other contexts that the express statutory provision for the award of prejudgment interest is unnecessary, see Rodgers v. United States, 332 U.S. 371, 373, 68 S.Ct. 5, 6, 92 L.Ed. 3 (1947) ("[T]he failure to mention interest in statutes which create obligations has not been interpreted by this Court as manifesting an unequivocal congressional purpose that the obligation shall not bear interest."). 5 In determining whether prejudgment interest should be awarded when Congress has been silent on the subject, the court should determine the "relative equities between the beneficiaries of the obligation and those upon whom it has been imposed," and "weigh [ ] these relative equities in accordance with the historic judicial principle that one for whose financial advantage an obligation was assumed or imposed, and who has suffered actual money damages by another's breach of that obligation, should be fairly compensated for the loss thereby sustained." Id. at 373, 68 S.Ct. at 6. Following that course here, we note that one of the principal purposes of the Equal Pay Act is to make whole employees who have unlawfully been deprived of wages. See, e.g., Marshall v. Board of Education, 470 F.Supp. 517, 519 (D.Md.1979), aff'd, 618 F.2d 101 (4th Cir.1980). In 1974, amendments to the Equal Pay Act redefined "employer" to include public agencies that are political subdivisions of a state, see 29 U.S.C. Secs. 203(d), (x); Pub.L. No. 93-259, Sec. 6, 88 Stat. 55, 58-62 (1974); and as a practical matter, we cannot see that an employee whose wages have unlawfully been withheld is any the less injured because her employer was a municipal entity rather than a private entity. We thus see no valid reason to distinguish between municipal employers and private employers in determining what award should be made to the victims of the employer's discriminatory practices in violation of the Equal Pay Act. See Marshall v. Board of Education, 470 F.Supp. at 519; Brennan v. Board of Education, 374 F.Supp. 817 (D.N.J.1974). 6 Accordingly, the present appeal is largely governed by this Court's recent decision in Donovan v. Sovereign Security, Ltd., 726 F.2d 55 (2d Cir.1984), an action to enforce Sec. 17 of the FLSA in which we reversed an order that had eliminated interest awards from a judgment on the premise that the employer's financial difficulties warranted such an elimination. We ruled that the interest awards must be reinstated, observing that "it is ordinarily an abuse of discretion not to include pre-judgment interest in a back-pay award under the FLSA." Id. at 58 (emphasis added). We see no reason to deviate from this principle here. We are unpersuaded by defendant's argument that the present interest awards were improper because the Hospital had been found to have acted in good faith. The bona fides of the employer is but one factor to be considered by the court in determining the appropriate award to a victim of discrimination. See Hodgson v. American Can Co., 440 F.2d 916, 922 (8th Cir.1971). Where the required wages have been wrongfully withheld from the employee, the employee is normally entitled not only to the amount that has been withheld but also to compensation for the delay in receiving those wages. Donovan v. Sovereign Security, Ltd., 726 F.2d at 58. 7 Finally, we see no error in the court's fixing the rate of interest to be paid as the adjusted prime rate. The appropriate rate for prejudgment interest in a wage discrimination case is "essentially [a matter] for the discretion of the trial judge." EEOC v. Wooster Brush Company Employees Relief Association, 727 F.2d 566, 579 (6th Cir.1984). The adjusted prime rate, established periodically by the Secretary of the Treasury, is equivalent to "the average predominant prime rate quoted by commercial banks to large businesses, as determined by the Board of Governors of the Federal Reserve System." 26 U.S.C. Sec. 6621(c). It is the rate to be "paid by taxpayers on tax deficiencies, and by the government on tax overpayments," S.Rep. No. 1357, 93d Cong., 2d Sess., reprinted in 1974 U.S. Code Cong. & Ad. News 7478, 7479, and was established by Congress for use by the Internal Revenue Service in place of the prior flat six percent rate because "it is sensitive to money market conditions and is widely known and accepted as a good indicator of interest rates generally." Id. at 7497. 8 Since the goal of a suit under the FLSA and the Equal Pay Act is to make whole the victims of the unlawful underpayment of wages, and since the adjusted prime rate has been adopted as a good indicator of the value of the use of money, it was well within the discretion of the district court to order that the rate of prejudgment interest to be paid by the defendants on the backpay awards be the adjusted prime rate. Cf. EEOC v. Wooster Brush Company Employees Relief Association, 727 F.2d at 579 (approving award of interest at adjusted prime rate in Title VII employment discrimination suit); EEOC v. Pacific Press Publishing Association, 482 F.Supp. 1291, 1319-20 (N.D.Cal.1979) (same), aff'd, 676 F.2d 1272 (9th Cir.1982); Marshall v. Burger King Corp., 509 F.Supp. 353 (E.D.N.Y.1981) (using adjusted prime rate in FLSA suit); Donovan v. Agnew, 552 F.Supp. 1027, 1029 (D.Mass.1982) (same). CONCLUSION 9 The judgment of the district court is affirmed. * Honorable Milton Pollack, Senior Judge of the United States District Court for the Southern District of New York, sitting by designation | Mid | [
0.587378640776699,
30.25,
21.25
] |
Serous cystadenoma causing the double duct sign. An asymptomatic 70-year-old man was found to have elevated liver function tests on a routine screening evaluation. Abdominal ultrasound revealed a pancreatic head mass. Magnetic resonance cholangiopancreatography confirmed a heterogeneously enhancing pancreatic mass that was suspicious for malignancy due to obstruction of the common bile duct and pancreatic duct. Consequently a pylorus-sparing pancreaticoduodenectomy was performed. Histology revealed a serous cystadenoma with scattered foci of PanIN III. Serous cystadenomas are benign tumors without significant malignant potential. Unlike pancreatic adenocarcinomas, these tumors tend to be slow growing, well-demarcated, and rarely, as in this case, produce a mass effect. | High | [
0.6743295019157081,
33,
15.9375
] |
B-girl’ trial a cautionary tale for drunk Miami tourists During the height of the tourist season two years ago, a Philadelphia TV weatherman flew down to Miami Beach for a little fun in the sun.At the Delano Hotel, John Bolaris was approached by a couple of the Beach’s finest “bar girls.” The sexy duo said they were visiting from Estonia. They ordered rounds of shots, wine and champagne while pecking him on the cheek. Then they lured the liquored-up Bolaris to a Russian-style nightclub called Caviar Bar on Washington Avenue. Over the next two nights, he signed American Express charge slips for more than $43,000, picking up the tab for extravagantly overpriced Dom Perignon, Beluga caviar and other items, including $2,480 for a modernistic painting of a woman that had been hanging in the bar. Bolaris’ tale of woe and regret and others like it are coming out in Miami federal court during the trial of five business associates accused of being the puppet masters behind South Beach’s “B-girl” scene, as it is known. Among the witnesses: B-girl Marina Turcina, who said Bolaris was so smashed he was vomiting on the way back to the Fontainebleau, where he’d been staying. “He smelled really bad,’’ she said. But the marquee witness is no Estonian temptress. He is bald, burly Alec Simchuk, an admitted Russian mobster straight out of central casting who is the acknowledged leader of the alleged racket. Simchuk, who once lived in a Hallandale Beach penthouse but is now cooperating with the feds from a cell at the Federal Detention Center in downtown Miami, brought Turcina and other women to Florida from Russia and the Baltic States to work in his shady South Beach clubs. After pleading guilty to wire fraud conspiracy and visa violations, he is testifying for the prosecution against the five defendants, among them a Sunny Isles Beach real-estate broker who once ran for the City Commission. They’re accused of operating a string of Washington Avenue clubs that deployed “B-girls” to fancy hotels like the Delano, where they cunningly fleeced customers. The women would target male tourists showing tell-tale signs of wealth, such as expensive watches or shoes. (They referred to cheap customers as “condoms.”) If they had a hot prospect, they would text message bartenders back at their clubs to get the place ready. They would pour their own drinks into flower vases while the guys guzzled theirs, becoming progressively plastered. That made it easier to persuade them to order still more bottles without noticing the exorbitant prices. “He was just signing them without looking at them,” Turcina said of Bolaris, who is expected to testify. Miami Beach police and the FBI launched an undercover investigation into the B-girl network after Bolaris and other customers complained to their credit card companies after the fact about the outrageous bar tabs. As part of the investigation, agents and cops recorded the women in action. To pull off the arrests, the FBI staged a party at one of the clubs for the B-girls and their managers. A Miami Beach officer who had infiltrated the ring as a “dirty cop” and worked as a bouncer invited many of the suspects to the soiree of stone crabs and Russian vodka at Tangia Club on Washington Avenue. Life on the run Eleven defendants, mostly women, have since pleaded guilty and served short prison sentences. Simchuk, 46, left for Latvia (later detouring to Russia) before the FBI rounded up his ring, but he eventually grew tired of life on the lam. In March of this year, he made up his mind to return to Miami, disclosing his plan to a fellow fugitive in Russia. That stirred things up. Soon after, he said he got a “threatening” call from an indicted business associate in Miami on his cellphone. A month later, while smoking a cigarette outside his mother-in-law’s St. Petersburg apartment, he was accosted by strangers, he testified in his thick Russian accent. “One guy pulled gun on my head and said, ‘Good people from Miami don’t want you to testify. You have beautiful wife. Stay at home.’ Another guy just broke my leg, just squeeze it in one shot.” After a year as a fugitive, Simchuk was arrested by FBI agents upon his arrival at Miami International Airport in July. He promptly pleaded guilty, agreeing to testify against his alleged partners and associates. In Simchuk’s plea agreement, he admitted that his organization ran up bogus bills for booze, wine and champagne on the credit cards of blurry-eyed male tourists. All told, the scam cost customers between $400,000 and $1 million, according to the written agreement. The “B-girls” received 20 percent commissions, while Simchuk’s partners pocketed most of the illicit profits. A sixth defendant, Simchuk’s “silent” investment partner, Andrejs Romanovs, is a fugitive in Russia. And a seventh defendant, Mikhail Rasner, a club investor with Albert Takhalov, is not on the docket now because his defense lawyer is currently involved in another trial. According to the charges, Simchuk and the other defendants operated the alleged ring for a year at the Caviar Bar and the Stars Lounge, both at 643 Washington Ave.; the VIP Lounge and Tangia Club, both at 841 Washington Ave; Nowhere Bar, 653 Washington Ave.; Steel Toast, 758 Washington Ave.; and Club Moreno, 1341 Washington Ave. Simchuk, who described himself as an international conman during testimony, would be a classic immigrant-made-good story, if he hadn’t done it by doing bad. Born in Leningrad (now St. Petersburg), he traveled to the United States for the first time in 1989 to study English at Kingsborough Community College in Brooklyn. He was 23. In the mid-1990s, he became a naturalized citizen. By then, he had started an import-export business. He would buy Toyotas, Hummers and other vehicles with a stolen ID and ship them from Mexico to Finland. He also engaged in insurance fraud, for which he was arrested and charged in Pennsylvania in 2000. That’s when he headed to South Florida, where he started promoting “Russian Nights” at local discos and opened his own club at the Ramada Inn Hotel in Hollywood. In Pennsylvania, meanwhile, Simchuk pleaded guilty to the insurance fraud charge and was placed on probation. After failing to get his probation transferred to Miami, he decided to flee the country, heading for Latvia instead of his native Russia because his girlfriend was from Latvia. It was in Latvia, he says, that he perfected the “B-girl” business model. In the city of Riga, Simchuk opened his first “striptease bar,” the Cleopatra, drawing his inspiration from Thee Dollhouse in the Sunny Isles Beach area. “It was my dream to have a striptease club, so that’s how I opened up,” he testified last month. He decided to open another, Foxy Lounge, then two more, La Rouche and Cabaret Miami. But the Latvian government did not like the strip-club scene, so authorities shut it down. Simchuk’s clubs were reborn as lounges. “I told the managers, take poles, take poles out,” Simchuk said in one awkwardly funny moment during his testimony. From that point on, Simchuk said, he was in the business of deploying bar girls. “The girls from now on are going to go to the disco bars and pick up the customers, bring them to the club ... and make them buy expensive bottles of champagne,” Simchuk said. He said he also made the prices “high” and the lettering on the menu “very little” so the patrons could not read it. Another trick: His bartenders would pour vodka into customers’ beers to make them more drunk. But by 2008, the Latvian police closed his clubs because so many customers were demanding “charge backs,” or refunds, on their bar bills. An attempt to replicate the clubs in neighboring Estonia fizzled, and he returned to the States. Simchuk said he opened Caviar Bar with the help of Pavlenko, who ran the credit card operations, and Stars Lounge with the assistance of Albert Takhalov, who also managed the card transactions. His wife, Kristina, worked as a bartender, and Feldman was an investor who had met Simchuk through the Sunny Isles Beach community, home to many Russian immigrants. Sort of like Hefner Simchuk said Feldman, a minority investor, liked hanging out with the women because they made him feel like Hugh Hefner. He imported many of the same bar girls, including Turcina, a 25-year-old Latvian native. Turcina, who has pleaded guilty, described Simchuk as a menacing boss who would threaten to fire the women at his clubs in Latvia if they didn’t have sex with him. “They were scared to lose the job, so they were sleeping with him,” she said. Turcina also said he exerted that same control and fear over the B-girls here. In his testimony, Simchuk acknowledged having an insatiable appetite for sex. Takhalov’s defense attorney, Albert Levin, attacked Simchuk as a habitual liar with connections to the St. Petersburg mob who made up stories in an effort to reduce a potential 20-year prison sentence. Sentencing is pending. Myles Malman, defense attorney for Feldman, pointed out that Simchuk initially told the feds he broke his leg in a slip-and-fall on ice, and only later said it was snapped in an encounter with thugs. During his testimony, Simchuk was asked if the women were instructed on what to say to lure the men into the clubs. | Low | [
0.41987829614604405,
25.875,
35.75
] |
Friday, December 16, 2016 Electors around the country are being harassed with a barrage of emails, phone calls and letters — and even death threats — in an effort to block Donald Trump from being voted in as president by the Electoral College on Monday. The bullying is overwhelming Sharon Geise’s tech devices, but not her resolve to support Trump. The Mesa, Arizona, grandmother woke up Wednesday morning to more than 1,500 emails demanding she not carry out her legal duty to vote for the president-elect. “They just keep coming and coming,” Geise told The Post, estimating she’s received more than 50,000 emails since the election. “They’re overpowering my iPad.” ....Reports of GOP electors being badgered have been reported in numerous states, including Georgia, Idaho, Tennessee, Arizona, Utah and Michigan. Like Geise, Republican Patricia Allen of Tennessee told The Post she’s been bombarded with 2,000 emails, 120 letters and five phone calls all urging her to switch and vote against Trump. But Allen, 74, said that despite the “siege,” she’s not budging. “This has never happened before … Do you know how long it takes to delete all those emails every day?” she asked.... For Michael Banerian, a senior at Oakland University in Michigan and a Republican elector, the harassment comes with a dark side. He said he’s been getting death threats via email, snail mail, Twitter and Facebook. “Somebody threatened to put a bullet in the back of my mouth,” Banerian, 22, told The Post on Wednesday. Whenever there is a story that makes Republicans look bad, every elected Republican is asked by the media to denounce what is going on. I don't see Democrats being forced by the media to denounce such harassment of the electors. And despite Harvard professor Lawrence Lessig's claims that there are 20 GOP electors who might vote against Trump, that doesn't seem to happening. The Associated Press has interviewed more than 330 electors from both parties and doesn't find some major movement for them to vote against their party's candidate. Whether they like Trump or not, and some plainly don't, scores of the Republicans chosen to cast votes in the state-capital meetings told AP they feel bound by history, duty, party loyalty or the law to rubber-stamp their state's results and make him president. Appeals numbering in the tens of thousands - drowning inboxes, ringing cellphones, stuffing home and office mailboxes with actual handwritten letters - have not swayed them. And thinking that a video of Hollywood liberals asking Republican electors not to vote for Trump doesn't seem like a winning tactic to appeal to Republicans whom these same elites are usually contemptuously deriding. Jazz Shaw comments, We are then informed of their true goal. Throw the election to the House of Representatives and allow them to select a qualified candidate. One star after another says, “I stand with you.” This is followed by another group repeating in robotic fashion, “You have my respect.” Really? Your respect? Where was all of that respect for Republicans during the campaign? ....Let’s be honest here for a moment, folks. This is a group of limousine liberals with private jets who wouldn’t spit on the head of a GOP elector if their hair was on fire before their candidate lost. But now they want to convince these electors that they will be well respected “American heroes” if they overturn the election and toss it to the House. If it went into the House, the Republicans control more state delegations so Trump would still win. It just is an effort to throw more sand in the gears. It reminds me that, in 2000, if the count in Florida hadn't been stopped, the state wouldn't have been able to cast their electoral votes and the election would have gone into the House. At that time, the Republicans controlled a narrow majority of state delegations so George W. Bush would have won anyway. Charles Lane argues that Democrats should just shut up about Hillary winning the popular vote. That's not how the game is played. And candidates as well as voters knew about that and behaved accordingly. As all concerned knew going in, the object of the presidential election game is to win the most electoral votes in what are essentially 51 state-level contests (the District included), just as the object of football is to score the most points. Gridiron teams would play differently under instructions to maximize yardage; candidates would campaign differently if maximizing national popular votes were the prime directive. Aiming for 270 electoral votes out of 538, both Clinton and Trump focused on 13 swing states; Trump won that contest-within-a-contest by 816,000 votes. Voters, too, behaved as they did based on the known rules. The popular vote reflects not only true preferences but also strategic voting (or abstention) by people in non-swing states, such as deep-blue California and deep-red Louisiana, who might have done something else in a direct-election scenario. Take Texas, a red state Trump won by roughly 800,000 votes. His share in heavily Republican suburban counties lagged Mitt Romney’s 2012 performance by an average of eight percentage points; Clinton’s beat Obama’s by four, according to a data analysis by Sean Trende, senior election analyst for RealClearPolitics. Meanwhile, exit polling showed Trump beating Clinton by 13 points in a hypothetical two-way race, as opposed to the nine he won by in real life. To Trende, this implies a lot of abstention or third-party voting by Republicans who were uncomfortable with Trump but might have swallowed their doubts if Clinton had a better chance to get the state’s 38 electoral votes — or win in a direct national election. I just gave my midterm in my AP Government class and one of the essay questions was about how having winner-take-all elections impacts voter participation. One of the possible answers is that some voters will not turn out to vote if their state's electoral votes were assuredly going to go for one particular candidate. A Republican might not bother voting in California figuring that it wouldn't make a difference for Republicans. Or emocrat might not show up to vote if they assume that their party has it in the bag. So we have no idea what the results would have been if the election were conducted with the popular-vote winner becoming president. The Senate Finance Committee report, obtained by FoxNews.com, found that while federal guidelines say employees must exercise the same care in incurring expenses as a “prudent person” traveling on personal business, IRS employees who traveled 125 business days or more racked up an average cost of over $52,000 a year. The committee found more than half of the long-term travel time was spent in the Washington D.C., area. It found cases of five employees living in hotels, primarily in the capital, for months at a time without looking for lower-cost housing or having their per diem rates reduced as outlined in federal guidelines. Further, the committee found “the IRS does not routinely or actively seek to reduce per diem rates for employees on long-term travel.” The generous per diem rate allows employees traveling to Washington to spend up to $7,099 a month on lodging alone, despite the committee seeing “virtually no circumstance” in which an employee would need to spend that much on a month-to-month basis. And yet some employees pushed the limits on the taxpayers' dime. The report cites the case of one employee spending more than five months at the Grand Hyatt in Washington, racking up a $38,799 tab, while another stayed in a number of Washington hotels including the Ritz Carlton – Pentagon City in Northern Virginia to the tune of $72,544 for the fiscal year. One employee rented a $1.07 million, four-bedroom townhouse in Arlington, Va., for a year, costing taxpayers $4,950 a month, while another stayed in a luxury apartment building in downtown Chicago overlooking the Chicago River at a price of $4,605 a month. Also, despite the IRS’ own guidance to the contrary, the committee found evidence that some IRS executives are not geographically located where their primary job duties are, adding to the travel expenses. Isn't there some way to get these employees to reimburse the government? Who approved these spending vouchers? All of them should be fired, but I bet no one will lose a job. At the end of the day, even with Clinton’s popular vote margin, the fact is more Americans are voting for Republicans at the local, state, and federal level. If you’re a Democrat, this total electoral dominance by Republicans should scare the stuffing out of you. But when you’re losing the game, you need to play harder—you can’t just make up new rules as you go along. Stop blaming FBI Director Comey. It’s conceivable, per Nate Silver, that the Comey letter in late October gave Trump momentum and possibly swung the election. But my response, like most Americans, is “So what?” If you’re worried about an FBI investigation influencing a presidential election DON’T NOMINATE A CANDIDATE UNDER FBI INVESTIGATION. And you really, really, don’t want to nominate a candidate under investigation whose top aide’s husband is also being investigated by the FBI for child pornography who is also allegedly in possession of emails relevant to the candidate’s FBI investigation that he’s keeping on the same computer as his grody sex pics. Seriously, stop and read those two previous sentences again, and think about why any normal person would be in any way sympathetic to this predicament. As to whether the Clinton email investigation was warranted in the first place, if you take this argument seriously I beg of you to ask one of the millions of Americans who’ve dealt with the rigmarole of getting a security clearance whether they think there’s an obvious double standard. As to the possibility of Comey playing politics, if he was out to get her why didn’t he recommend charges initially? The political influence with the Clinton email investigation ran only in one direction, and that benefited Clinton. The attorney general in the position of bringing charges, Loretta Lynch, was appointed a U.S. attorney by Bill Clinton and later worked for a law firm connected to the Clintons for years. President Obama formally endorsed Hillary Clinton when the FBI investigation was still ongoing. That should have been grounds for a special prosecutor. The issue isn’t that Hillary Clinton was betrayed by Comey; the issue should be that she skated. And stop trying to claim that her private server never endangered national security. On one hand, Democrats have spent the last several months arguing that Clinton did nothing to endanger national security, presumably because we can be certain that Russians couldn’t hack into the server that everyone’s favorite abuela was keeping in the closet right the behind the Rubbermaid containers full of Christmas ornaments. On the other hand, Democrats are now demanding we need a thorough congressional investigation right now because of concerns Russian hackers may have penetrated our entire electoral system across several states to steal the election And the Democrats seem to have come rather late in the game to worrying about Russia. Also, isn’t the fact that Russia is so hostile to us now and allegedly undermining our elections a pretty damning judgment on the competence of the woman in charge of overseeing Obama’s “Russian reset” if the point of that was more friendly relations? The charitable interpretation here is that Russia is, for whatever reason, so afraid of Clinton that they tried to undermine the election. But there was also a time, not that long ago, when intimidating Russians by calling them our “number one geopolitical foe” was a bad thing in the eyes of the media. Oddly, I’m not seeing too much contrition over what they did to Romney (this is about it), even as they are now in an unjustified panic. Then again, we’re talking about a party that has an 80-year history of claiming Republicans were exaggerating the threat of Russia. In fact, “60 Minutes” ran a report about the effort to get Obama to pardon the Rosenbergs on October 16, three weeks before the election and 63 years after they were executed. Since the fall of the Soviet Union, we have all manner of evidence conclusively proving the Rosenbergs were spies. It’s not even a remotely controversial matter, unless, apparently, you’re a member of the media. Now, there is one tangible precedent for the Russkies intervening in our elections. That’s because Ted Kennedy actually asked them to interfere in the 1984 election. For some strange reason this revelation wasn’t the first thing that inexplicably failed to, uh, sink Ted Kennedy’s career. Rather, it’s a story most Americans never even heard about. It seems as if the media only cares about Russian threats insofar as they harm Democrats’ electoral chances. To hear Democrats screaming about the threat of Russia now, after ignoring the problem for decades, isn’t something that ordinary Americans are going to pay much attention to—at least not without more evidence and some real contrition regarding their about-face on the Russian threat. The Washington Post is harsh in its allotment of blame for the horror that is Aleppo. Yes, the Russians and Syrians are to blame, but the Obama administration carries its own weight of blame. Above all, Aleppo represents a meltdown of the West’s moral and political will — and in particular, a collapse of U.S. leadership. By refusing to intervene against the Assad regime’s atrocities, or even to enforce the “red line” he declared on the use of chemical weapons, President Obama created a vacuum that was filled by Vladimir Putin and Iran’s Revolutionary Guard. As recently as October, Mr. Obama set aside options drawn up by his advisers to save Aleppo. Instead, he supported the delusional diplomacy of Secretary of State John F. Kerry, whose endless appeals to Moscow for cease-fires yielded — as Mr. Putin no doubt intended — nothing more than a humiliating display of American weakness. On Tuesday, Mr. Obama’s U.N. ambassador, Samantha Power, delivered an impassioned denunciation of the Aleppo carnage, which she said would “join the ranks of those events in world history that define modern evil, that stain our conscience decades later.” She excoriated the Assad regime, Russia and Iran but offered no acknowledgment that the stain of Aleppo extends also to her, the president and American honor. Those who will live with the long-term consequences of the Syrian catastrophe are unlikely to be so forgiving. Few in American government had the will for a stronger presence in Syria. It is much the same as Rwanda a couple of decades earlier or Darfur. We decline to act and so must take some of the blame when the ultimate in horrors happen. Charles Krauthammer wonders why it's so awful for heads to be nominated to agencies to have a different view of those agencies' missions. The left has been in equally high dudgeon that other Cabinet picks appear not to share the mission of the agency which they have been nominated to head. The horror! As if these agency missions are somehow divinely ordained. Why, they aren’t even constitutionally ordained. The Education Department, for example, was created by President Carter in 1979 as a payoff to the teachers unions for their political support. Now, teachers are wonderful. But teachers unions are there to protect benefits and privileges, not necessarily to improve schooling. Which is why they zealously defend tenure, protect their public-school monopoly and reflexively oppose school choice. Conservatives have the odd view that the purpose of schooling — and therefore of the Education Department — is to provide students with the best possible education. Hence Trump’s nominee, Betsy DeVos, a longtime and passionate proponent of school choice, under whom the department will no longer be an arm of the teachers unions. She is also less likely to allow the department’s Office for Civil Rights to continue appropriating to itself the role of arbiter of social justice, micromanaging everything from campus sexual mores to the proper bathroom assignment for transgender students. If the mission of this department has been to dictate policy best left to the states and localities, it’s about time the mission was changed. The most incendiary nomination by far, however, is Scott Pruitt to head the Environmental Protection Agency. As attorney general of Oklahoma, he has joined or led a series of lawsuits to curtail EPA power. And has been upheld more than once by the courts. Pruitt has been deemed unfit to serve because he fails liberalism’s modern-day religious test: belief in anthropogenic climate change. They would love to turn his confirmation hearing into a Scopes monkey trial. Republicans should decline the invitation. It doesn’t matter whether the man believes the moon is made of green cheese. The challenges to EPA actions are based not on meteorology or theology, but on the Constitution. The issue is that the EPA has egregiously exceeded its authority and acted as a rogue agency unilaterally creating rules unmoored from legislation. What a strange concept that seems - that an agency should be limited by the legislation passed by Congress and signed into law. It's about time for the administrative state to be reined in. And, as Krauthammer writes, the EPA is one of the most egregious violators of the concept that duly passed legislation should be a limit on administrative action. Pruitt’s is the most important nomination because it is a direct attack on the insidious growth of the administrative state. We have reached the point where EPA bureaucrats interpret the Waters of the United States rule — meant to protect American waterways — to mean that when a hard rain leaves behind a pond on your property, the feds may take over and tell you what you can and cannot do with it. (The final rule excluded puddles — magnanimity from the Leviathan.) On a larger scale, Obama’s Clean Power Plan essentially federalizes power generation and regulation, not coincidentally killing coal along the way. This is the administration’s end run around Congress’ rejection of Obama’s proposed 2009-2010 cap-and-trade legislation. And that was a Democratic Congress, mind you. Pruitt’s nomination is a dramatic test of the proposition that agencies administer the law, they don’t create it. That the legislative power resides exclusively with Congress and not with a metastasizing administrative bureaucracy. A coalition of student groups at the University of Maryland — spurred in part by the election of Donald Trump — has issued a list of 64 demands to the school’s administration, including a call to “prevent” on-campus movie screenings that could be deemed offensive by Muslim students. That demand was just one of nine expressed by Muslim student groups within the so-called ProtectUMD coalition, which sent the letter of demands to the administration late last month, the Diamondback student newspaper reported Monday. They're particularly upset that there was an airing of "American Sniper" in the student union. Not only do they not want to watch the movie, they want to make sure no one else does. If they can successfully hold a veto over one movie, that's quite a slippery slope for various groups to start demanding other movies be removed so that their ideological and cultural cocoon can be preserved. Andrea Peyser rightly takes liberals to task for their freakout over Kellyanne Conway's expression of concern that taking a full-time job in the Trump White House might impair her ability to be a good mother to her four children. Conway’s comments came during the misleadingly named “Women Rule Summit’’ put on by Politico, Google and the Tory Burch Foundation in Washington, DC. There, the political pollster and campaign strategist described conversations she’s had with male colleagues: “I do politely mention to them the question isn’t would you take the job, the male sitting across from me who’s going to take a big job in the White House. The question is would you want your wife to,” Conway said. “You really see their entire visage change. It’s like — oh, no, they wouldn’t want their wife to take that job.” That is, she said, some men may discourage their wives from taking on high-powered careers. She exposed a home-front truth. But Conway, who is married to a full-time litigator in a prestigious law firm, never said her husband expected her not to work or to labor less. Nor did she predict the Trump White House would be closed to women and mothers. Quite the opposite. “It’s a great time to be a woman in America,” she said, encouraging women to “go for it’’ and “ask for what we think we deserve.’’ She just suggested that it wasn’t right for her. “My children are 12, 12, 8 and 7, which is bad idea, bad idea, bad idea, bad idea for Mom going inside,” she said. “They have to come first, and those are very fraught ages.” Conway has not shut the door on playing any part in the Trump administration. She said she intends to stay on as an adviser, a role she has already moved into. If women are to achieve true equality, their choices must be respected — whether it’s to serve in a high-pressure job or put one foot on the mommy track. It’s her choice. Millions of mothers make these choices every single day. And it's difficult. I've read all sorts of articles about working in the White Houses of various presidents and how it's a high-pressure, all-consuming job often involving 14-hour days. That is no schedule for parents who want to be there for their children's lives. I wouldn't recommend it for a father or a mother. Before she became Trump's campaign head, she ran a polling company and appeared on TV. I wonder how much of that she could do from home. She can't work in the White House from home. Good for her for having her priorities straight. Hmmm. A Dallas news station has done some research into the Texas GOP elector writing about how he's not going to vote to cast his vote for Donald Trump. And it turns out that little that he's said about his personal resume can be verified. he Republican elector who has gotten national attention for refusing to vote for Donald Trump at the Electoral College on Dec. 19 was apparently not a first responder on September 11, 2001 as he has stated for years and has a questionable career history, according to an investigation by WFAA. Chris Suprun, 42, portrays himself as a heroic firefighter who was among the first on the scene after the third plane flew into the Pentagon on 9/11. In a heavily-publicized editorial this month for the New York Times, Suprun stated that as a member of the Electoral College he will not cast his ballot for Trump because the president-elect “shows daily he is not qualified for the office.” Suprun, a Dallas resident for more than a decade, even used his résumé to establish credibility in the Times piece, writing in the second paragraph: "Fifteen years ago, as a firefighter, I was part of the response to the Sept. 11 attacks against our nation." He has founded a nonprofit called Never Forget and state records show he is a licensed paramedic -- but much of the rest of résumé, publicly available on LinkedIn, is questionable. In addition, on at least two occasions over the last couple years at crowded Major League Baseball games, Suprun has been introduced as a 9/11 veteran before throwing out first pitches. "He claimed to be a first responder with the Manassas Park [Virginia] Fire Department on September 11, 2001 and personally told us stories 'I was fighting fire that day at the Pentagon.’ No, I was on a medic unit that day at the Pentagon and you make a phone call to Manassas Park and you find out that he wasn't even employed there until October 2001,” said a first responder who knows Suprun and only agreed to speak about him if his identity was concealed. The City of Manassas Park confirmed to WFAA that it hired Suprun on October 10, 2001, one month after the 9/11 attacks. Being a paramedic is an extremely honorable profession. Trying to add on a little 9/11 stolen valor is despicable. And then using that stolen valor to pump up his background while bragging about how he's not going to vote for Trump even though he was elected to being an elector after it was clear that Trump would be the nominee is just gratuitous virtue signaling. Jim Geraghty wrote recently to debunk the idea that being a faithless elector is a sign of courage. Republicans chose their 38 electors during the Texas state convention in mid May, about a week after Ted Cruz suspended his presidential campaign, making Trump the presumptive GOP nominee. Suprun knew he would likely be casting his vote from Trump, given Texas’s deep-red tint. In fact, he and the other delegates signed an oath pledging to do so, although it’s not legally binding. In other words, being an anti-Trump Republican presidential elector isn’t like being an anti-Trump Republican politician, consultant, or writer. Suprun didn’t just sign on for this; he actively campaigned for it. He urged other Republicans to trust him. His fellow elector Art Sisneros faced the same crisis of conscience and chose a much more honorable path: He resigned. The remaining Texas electors will select Sisneros’s replacement when they meet on December 19. In such circumstances, faithless electors are not brave or honorable. Their efforts are not going to change things. They’ve been given an entirely predictable nominee whom they didn’t like, and now they want to break their word, take a public stand, and be hailed as heroes by the considerable throngs of Trump critics. Don’t give them this. Mock their lack of foresight or stubborn refusal to accept the consequences of their actions. If you’re not certain that you can support a particular candidate as an elector, don’t ask for the job of elector. These people aren’t iconoclasts, visionaries, or heroic renegades. They’re preening narcissistic idiots who want to be rewarded for refusing to keep a promise, and they should be treated as such. | Low | [
0.48545861297539106,
27.125,
28.75
] |
Area Information State MT County Gallatin City Belgrade Zip Code 59714 Area Belgrade Subarea 3N - Belgrade Area N of I90 Listing Updated: 05/31/2019 MLS Number: 325574Listing Provided By:Jon Bertelsen of Bozeman Realty All information is deemed reliable; however, it is not guaranteed and should be independently verified. Real Estate offerings are subject to error, omissions, prior sale, change, withdrawal without notice and approval of seller. Properties are provided courtesy of Big Sky Country MLS. | Mid | [
0.6107526881720431,
35.5,
22.625
] |
Changes occurring in chloroplasts of Phaseolus following infection by Sclerotinia: a cytochemical study. Dramatic changes occur in the ultrastructure of chloroplasts within host tissues during the infection of Phaseolus by the plant pathogenic fungus Sclerotinia. Electron-opaque deposits develop initially in the peripheral region of the chloroplast stroma, in cells in advance of the hyphal front. As infection continues, the amount and intensity of deposition increases and spreads throughout the chloroplast. The deposits possess a high degree of structural integrity in the form of a crystalline square lattice with 10 nm periodicity. Enzyme digestion studies have been used to show that the deposits are proteinaceous. Similar deposits are also induced by treatment with oxalic and citric acids, but not by the potassium salts of these acids buffered at pH 7.2. It is suggested that a pH change within the chloroplasts, resulting from oxalic acid secretion by the fungus, is responsible for induction of protein deposition. The likelihood that the deposits are ribulose, 1,5-bisphosphate carboxylase-oxygenase is discussed. | Mid | [
0.641758241758241,
36.5,
20.375
] |
language: Greek native: Ελληνικά maintainer: ananias47 & panos kosmo [email protected] & VIRGIN KLM github.com/VIRGINKLM/ # # ./glwskins/flat/ctxmenu/default_details.view # id: Bookmark # Missing translation msg: id: Bookmarked # Missing translation msg: id: Copy to clipboard # Missing translation msg: id: Copy to location... # Missing translation msg: id: Delete msg: Διαγραφή id: Queue msg: Λίστα # # ./glwskins/flat/ctxmenu/plugin_details.view # id: Author: # Missing translation msg: id: Available version: msg: Διαθέσιμη Έκδοση: id: Changelog # Missing translation msg: id: Install msg: Εγκατάσταση id: Installed version: # Missing translation msg: id: Status: # Missing translation msg: id: Uninstall msg: Απεγκατάσταση id: Upgrade msg: Αναβάθμιση # # ./glwskins/flat/ctxmenu/video_details.view # id: Continue from %s msg: Συνέχεια από %s id: Mark as seen msg: Μαρκάρισμα ότι το έχω δει id: Mark as unseen msg: Μαρκάρισμα ότι δεν το έχω δει id: Play from beginning msg: Αναπαραγωγή από την αρχή id: Play until end of list msg: Αναπαραγωγή μέχρι το τέλος της λίστας id: Video Cast # Missing translation msg: # # ./glwskins/flat/items/details/video.view # id: Season %d - Episode %d # Missing translation msg: id: Seen %d times, %s # Missing plural translation for 'Seen %d times, %s' and 'Seen %d time, %s' msg[0]: msg[1]: # # ./glwskins/flat/items/list/add.view # id: Add new entry msg: Προθήκη νέας καταχώρησης # # ./glwskins/flat/items/list/bool.view # id: Off msg: Ανενεργό id: On msg: Ενεργό # # ./glwskins/flat/items/list/font.view # id: Condensed msg: Συνοπτικές id: Subtitles msg: Υπότιτλοι id: User interface msg: Περιβάλλον Χρήστη # # ./glwskins/flat/items/list/tvepisode.view # id: Episode %d - %s # Missing translation msg: # # ./glwskins/flat/loading.view # id: %d kb/s msg: %d kb/s id: Bitrate: msg: Ρυθμός μετάδοσης: # # ./glwskins/flat/log.view # id: System log msg: Καταγραφή Συστήματος # # ./glwskins/flat/mediainfo.view # id: A/V diff # Missing translation msg: id: Audio bitrate # Missing translation msg: id: Audio codec # Missing translation msg: id: Audio packets # Missing translation msg: id: Buffer usage # Missing translation msg: id: No media loaded msg: Δεν φορτώθηκε μέσο id: Remaining buffer # Missing translation msg: id: Source # Missing translation msg: id: Video bitrate # Missing translation msg: id: Video codec # Missing translation msg: id: Video framerate # Missing translation msg: id: Video packets # Missing translation msg: # # ./glwskins/flat/menu/sidebar.view # id: Bookmark page # Missing translation msg: id: Page settings # Missing translation msg: id: Paste # Missing translation msg: id: Reload page # Missing translation msg: id: Remove bookmark # Missing translation msg: id: Settings msg: Ρυθμίσεις # # ./glwskins/flat/menu/sidebar_common.view # id: Activate sleep timer msg: Ενεργοποίηση χρονοδιακόπτη διακοπής λειτουργίας id: Disable sleep timer msg: Απενεργοποίηση χρονοδιακόπτη διακοπής λειτουργίας id: Exit %s msg: Έξοδος από %s id: Hide media info # Missing translation msg: id: Hide system info msg: Απόκρυψη πληροφοριών συστήματος id: Master volume msg: Κεντρική ένταση id: Show media info # Missing translation msg: id: Show system info msg: Εμφάνιση πληροφοριών συστήματος id: Suspend msg: Αναστολή λειτουργείας id: Time until sleep msg: Χρόνος μέχρι να αδρανοποιηθεί το σύστημα id: View log # Missing translation msg: id: dB msg: dB id: min msg: λεπτό # # ./glwskins/flat/osd/osd_audio.view # id: Audio msg: Ήχος # # ./glwskins/flat/osd/osd_main.view # id: Audio settings msg: Ρύθμισης Ήχου id: Subtitle settings msg: Ρυθμίσεις Υποτίτλων id: Video settings msg: Ρυθμίσεις Βίντεο # # ./glwskins/flat/osk.view # id: Default msg: Προεπιλογή id: Keyboard layout: msg: Διάταξη πληκτρολογίου # # ./glwskins/flat/pages/directory.view # id: Album msg: Άλμπουμ id: Artist msg: Καλλιτέχνης id: Custom msg: Τροποποιημένα id: Grid # Missing translation msg: id: List msg: Λίστα id: Page layout # Missing translation msg: id: Search results # Missing translation msg: id: TV Season # Missing translation msg: # # ./glwskins/flat/pages/empty.view # id: No contents # Missing translation msg: # # ./glwskins/flat/pages/home.view # id: Dismiss msg: Ματαίωση id: Home # Missing translation msg: # # ./glwskins/flat/pages/openerror.view # id: Unable to open resource # Missing translation msg: # # ./glwskins/flat/pages/playqueue.view # id: Playqueue msg: Αναπαραγωγή Λίστας # # ./glwskins/flat/pages/searchresults.view # id: Show more # Missing translation msg: id: %d hits # Missing plural translation for '%d hits' and '%d hit' msg[0]: msg[1]: # # ./glwskins/flat/pages/slideshow.view # id: Interval: %ds # Missing translation msg: id: Play/Pause # Missing translation msg: id: Stop # Missing translation msg: # # ./glwskins/flat/pages/stpp.view # id: Remote control - %s # Missing translation msg: id: Remote controlling %s # Missing translation msg: # # ./glwskins/flat/pages/stppstpp.view # id: Nested remote controll is not supported # Missing translation msg: id: Remote control # Missing translation msg: # # ./glwskins/flat/pages/stppvideo.view # id: Audio tracks msg: Μουσικά Κομμάτια id: Audio volume adjustment: %d dB msg: Ρύθμιση έντασης ήχου: %d dB id: CPU is too slow to decode this video msg: Ο CPU είναι πολύ αργός για να αποκωδικοποιήσει αυτό το βίντεο id: Next # Missing translation msg: id: Previous # Missing translation msg: # # ./glwskins/flat/pages/tvseason.view # id: Season %d # Missing translation msg: # # ./glwskins/flat/pages/upgrade.view # id: %s is up to date msg: Το %s είναι ενημερωμένο id: An error occured during download msg: Ένα σφάλμα συνέβη κατά την διάρκεια της λήψης! id: Changelog for %s releases msg: Αλλαγές για την έκδοση %s id: Check for updates now msg: Έλεγχος για ενημερώσεις id: Checking for updates # Missing translation msg: id: Current version: msg: Τρέχουσα έκδοση: id: Download and install # Missing translation msg: id: Downloading %s msg: Λήψη %s id: New version %s is available for download msg: Η καινούργια έκδοση %s είναι διαθέσιμη για λήψη id: No upgrade available msg: Δεν υπάρχει διαθέσιμη αναβάθμιση id: Retry # Missing translation msg: id: Stable msg: Σταθερή id: Testing msg: Δοκιμαστική id: Unable to query for new version msg: Αδυναμία αναζήτησης νέας έκδοσης # # ./glwskins/flat/popups/auth.view # id: Domain msg: Διεύθυνση Δικτύου id: Password msg: Κωδικός id: Remember me msg: Απομνημόνευση id: Username msg: Όνομα Χρήστη # # ./glwskins/flat/popups/common.view # id: Cancel msg: Ακύρωση id: Ok # Missing translation msg: # # ./glwskins/flat/popups/filepicker.view # id: Back # Missing translation msg: id: Close # Missing translation msg: id: Folder select mode, press right to open subfolder # Missing translation msg: # # ./glwskins/flat/popups/resume.view # id: No, Start over msg: Όχι, Ξεκίνημα από την αρχή id: Resume from %s # Missing translation msg: id: Yes msg: Ναι # # ./glwskins/flat/popups/textDialog.view # id: OK msg: OK # # ./glwskins/flat/sysinfo.view # id: CPU Temp msg: Θερμ. CPU id: Connected # Missing translation msg: id: Fragmentation msg: Θρυμματισμός id: Framerate # Missing translation msg: id: GPU Temp msg: Θερμ. GPU id: HDD Avail msg: Ελ. χώρος HDD id: IP Address # Missing translation msg: id: Inactive memory # Missing translation msg: id: Memory usage msg: Χρήση μνήμης id: Network # Missing translation msg: id: Not available # Missing translation msg: id: System Free msg: Διαθέσιμη id: System Total msg: Ολική id: VM Page In/Out # Missing translation msg: id: Version # Missing translation msg: # # ./glwskins/flat/universe.view # id: Audio muted msg: Ήχος σε σίγαση id: Copying %d files # Missing translation msg: id: Master volume: %d dB msg: Ήχος εξόδου: %d dB id: Overscan adjustment\nPosition border at screen edges # Missing translation msg: # # ./src/api/stpp.c # id: Allow remote control # Missing translation msg: id: Device not available # Missing translation msg: id: Movians for remote control # Missing translation msg: # # ./src/api/tmdb.c # id: Language (ISO 639-1 code) msg: Γλώσσα (κωδικοποίηση ISO 639-1) id: Use original title msg: Χρησιμοποίηση πρωτότυπου τίτλου # # ./src/arch/android/android.c # id: Android Storage # Missing translation msg: # # ./src/arch/linux/pulseaudio.c # id: Unable to initialize audio system %s -- %s msg: Αδυναμία προετοιμασίας συστήματος ήχου %s -- %s # # ./src/arch/ps3/ps3_main.c # id: System is low on memory (%d kB RAM available) msg: Το σύστημα είναι χαμηλό σε μνήμη (%d kB RAM διαθέσιμα) # # ./src/arch/ps3/ps3_vdec.c # id: Cell-h264: %d Ref-frames for %d content is incompatible with PS3 HW decoder. Disabling acceleration msg: Cell-h264: %d Ref-frames για το περιεχόμενο %d είναι ασύμβατα με τον επιταχυντή hardware του PS3. Απενεργοπόιηση επιτάχυνσης id: Cell-h264: Broken headers, Disabling acceleration msg: Cell-h264: Κατεστραμένες κεφαλίδες, Απενεργοπόιηση επιτάχυνσης id: Cell-h264: Forcing level 4.2 for content in level %d.%d. This may break video playback. msg: Cell-h264: Εξαναγκασμός του επιπέδου 4.2 σε επίπεδο %d.%d. Η αναπαραγωγή μπορεί να διακοπεί. id: Unable to accelerate %s, library not loaded. msg: Αδυναμία επιτάχυνσης %s, η βιβλιοθήκη δεν φορτώθηκε. id: Unable to open Cell codec. Error 0x%x msg: Αδυναμία ανοίγματος του κώδικα Cell. Σφάλμα 0x%x. id: Unable to open Cell codec. Unable to allocate %d bytes of RAM msg: Αδυναμία ανοίγματος του κώδικα Cell. Αδυναμία ανευρέσεις %d bytes της RAM id: Unable to query Cell codec. Error 0x%x msg: Αδυναμία αναζήτησης του κώδικα Cell. Σφάλμα 0x%x # # ./src/arch/rpi/rpi_audio.c # id: 8 Channel PCM msg: 8 Κανάλια PCM id: AC3 Pass-Through msg: AC3 Pass-Through id: Analog msg: Αναλογικό id: Audio output port msg: Θύρα εξόδου ήχου id: Autodetect msg: Αυτόματη αναγνώριση id: DTS Pass-Through msg: DTS Pass-Through id: HDMI msg: HDMI # # ./src/arch/rpi/rpi_tv.c # id: Match display and content framerate # Missing translation msg: # # ./src/audio2/audio.c # id: Audio delay msg: Καθυστέρηση ήχου id: Audio gain # Missing translation msg: id: Setup audio output msg: Ρύθμιση εξόδου ήχου id: Video playback msg: Αναπαραγωγή Βίντεο # # ./src/audio2/audio_test.c # id: 440Hz sinewave -12dB msg: 440Hz ημιτονοειδές κύμα -12dB id: Audio test msg: Δοκιμή ήχου id: Center msg: Κεντρικά id: Front Left msg: Εμπρόσθιο Αριστερό id: Front Right msg: Εμπρόσθιο Δεξί id: LFE msg: Υπογούφερ id: Pink noise msg: Ροζ θόρυβος id: Play test signal msg: Αναπαραγωγή δοκιμαστικού ήχου id: Rear Left msg: Όπισθιο Αριστερό id: Rear Right msg: Όπισθιο Δεξί id: Speaker position msg: Θέση ηχείων id: Surround Left msg: Surround Αριστερό id: Surround Right msg: Surround Δεξί id: Test signal type msg: Τύπος δοκιμαστικού ήχου # # ./src/backend/bittorrent/bt_backend.c # id: No files in torrent msg: Κανένα αρχείο στο torrent id: Unable to open torrent: %s msg: Αδυναμία ανοίγματος torrent: %s # # ./src/backend/bittorrent/diskio.c # id: Cached torrents use %d MB out of allowed %d MB. Total free space on volume: %d MB msg: Τα torrents χρησιμοποιούν %d MB από τα επιτρεπόμενα %d MB. Συνολικός ελεύθερος χώρος: %d MB # # ./src/backend/bittorrent/fa_torrent.c # id: Connected peers msg: Συνδεδεμένοι χρήστες id: Known peers msg: Γνωστοί χρήστες id: Receiving from msg: Λήψη από id: Torrent leechers msg: Παρασιτικοί χρήστες id: Torrent seeders msg: Διαμοιραστές # # ./src/backend/bittorrent/torrent_settings.c # id: BitTorrent msg: BitTorrent id: Clear cache msg: Καθαρισμός προσωρινής μνήμης id: Enable bittorrent msg: Ενεργοποίηση bittorrent id: Max upload speed # Missing translation msg: id: Max usage of free space for caching torrents msg: Μέγιστη ελεύθερη μνήμη για προσωρινη αποθήκευση torrent(s) id: Status msg: Κατάσταση id: Torrent cache path msg: Διαδρομή προσωρινής αποθήκευσης torrent # # ./src/backend/dvd/dvd.c # id: DVD msg: DVD id: DVD read error, restarting disc msg: Σφάλμα αναπαραγωγής DVD, επανεκκίνηση δίσκου # # ./src/backend/hls/hls.c # id: Primary msg: Πρωταρχικό id: Supplementary # Missing translation msg: # # ./src/backend/htsp/htsp.c # id: Channels # Missing translation msg: id: Invalid HTSP URL msg: Μη έγκυρη διεύθυνση HTSP id: No such channel # Missing translation msg: id: Recorded shows # Missing translation msg: id: Recorder # Missing translation msg: # # ./src/backend/playlist.c # id: Unable to open playlist # Missing translation msg: # # ./src/backend/search.c # id: Search msg: Αναζήτηση id: Search result for: %s msg: Αποτελέσματα αναζήτησης για: %s # # ./src/backend/slideshow/slideshow.c # id: 3 seconds # Missing translation msg: id: 5 seconds # Missing translation msg: id: 7 seconds # Missing translation msg: id: Slideshow speed # Missing translation msg: # # ./src/blobcache_file.c # id: Cache cleared msg: Η μνημη Cache καθαρίστηκε id: Clear cached files msg: Καθάρισμα αρχείων Cache # # ./src/fileaccess/fa_backend.c # id: Can't handle content type %d msg: Αδυναμία χειρισμού τύπων περιεχομένου %d id: Checking file contents msg: Έλεγχος περιεχόμενων αρχείου id: Invalid URL from redirect # Missing translation msg: id: Unable to open file: %s msg: Αδυναμία ανοίγματος του αρχείου: %s # # ./src/fileaccess/fa_filepicker.c # id: Select a file # Missing translation msg: # # ./src/fileaccess/fa_locatedb.c # id: Search using Unix locatedb msg: Αναζήτηση μέσω Unix Locatedb # # ./src/fileaccess/fa_scanner.c # id: Deleted %s msg: Διαγράφηκε %s id: Filename msg: Όνομα Αρχείου id: Include in library # Missing translation msg: id: Newest first # Missing translation msg: id: Oldest first # Missing translation msg: id: Show only supported files msg: Παρουσίαση μόνο υποστηριζόμενων αρχείων id: Sort folders first msg: Ταξινόμηση φακέλων πρώτα id: Sort on msg: Ταξινόμηση id: Unable to delete %s\n%s msg: Αδυναμία Διαγραφής %s\n%s # # ./src/fileaccess/fa_spotlight.c # id: Search using spotlight msg: Αναζήτηση μέσω Spotlight # # ./src/fileaccess/fileaccess.c # id: Are you sure you want to delete: # Missing translation msg: id: Browse archives as folders msg: Περιήγηση αρχείων σε φακέλους id: Enable file deletion from item menu msg: Ενεργοποίηση διαγραφής αρχείων από το μενού εργαλείων id: Show filename extensions msg: Εμφάνιση επεκτάσεων αρχείων id: Store per-file settings in filesystem msg: Αποθήκευση ρυθμίσεων ανα-αρχείο στο σύστημα αρχείων id: %d archive parts msg[0]: %d κομμάτια αρχείου id: %d directories msg[0]: %d κατάλογοι msg[1]: %d κατάλογος id: %d files msg[0]: %d αρχεία msg[1]: %d αρχείο # # ./src/fileaccess/smb/fa_nativesmb.c # id: Access denied msg: Η πρόσβαση απορρίφθηκε id: Account restricted msg: Ο λογαριασμός έχει περιοριστεί id: Bad network share name msg: Λάθος όνομα κοινόχρηστου δικτύου id: Logon failure msg: Σφάλμα κατά την είσοδο id: Object name not found msg: Το όνομα του αντικειμένου δεν βρέθηκε # # ./src/i18n.c # id: 12 Hour # Missing translation msg: id: 24 Hour # Missing translation msg: id: Default character set msg: Προεπιλεγμένος Χαρακτήρας id: Ignore 'The' at beginning of words when sorting msg: Αγνόησε το 'The' στην αρχή τον λέξεων κατά την ταξινόμηση id: Language msg: Γλώσσα id: Language codes should be configured as three character ISO codes, example (eng, swe, fra) msg: Οι κωδικοποιήσεις γλώσσας θα πρέπει να ρυθμίζονται ως τρεις χαρακτήρες κωδικοποίησης ISO, π.χ. (eng, swe, fra) id: Languages msg: Γλώσσες id: Preferred languages msg: Προτιμώμενη γλώσσα id: Primary audio language code msg: Πρωτεύων κωδικοποίηση γλώσσας ήχου id: Primary subtitle language code msg: Πρωτεύων κωδικοποίηση γλώσσας υποτίτλων id: Secondary audio language code msg: Δευτερεύων κωδικοποίηση γλώσσας ήχου id: Secondary subtitle language code msg: Δευτερεύων κωδικοποίηση γλώσσας υποτίτλων id: System default # Missing translation msg: id: Tertiary audio language code msg: Τριτεύων κωδικοποίηση γλώσσας ήχου id: Tertiary subtitle language code msg: Τριτεύων κωδικοποίηση γλώσσας υποτίτλων id: Time format # Missing translation msg: id: Timezone # Missing translation msg: # # ./src/ipc/libcec.c # id: Longpress SELECT for item menu # Missing translation msg: id: Switch TV input source # Missing translation msg: id: Use STOP key for combo input # Missing translation msg: # # ./src/keyring.c # id: Forget remembered passwords msg: Διαγραφή αποθηκεμένων κωδικών id: Rembered passwords erased msg: Οι αποθηκεμένοι κωδικοί σβήστηκαν # # ./src/media/media_settings.c # id: Align on video frame # Missing translation msg: id: Audio volume msg: Ένταση ήχου id: Delay # Missing translation msg: id: Go to standby after video ends msg: Τερματισμός λειτουργίας όταν τελειώσει το βίντεο id: Horizontal pan msg: Οριζόντια επέκταση id: Horizontal position # Missing translation msg: id: Horizontal scale # Missing translation msg: id: Reset defaults for folder '%s' msg: Επαναφορά προεπιλογών για τον φάκελο '%s' id: Save as defaults for folder '%s' msg: Αποθήκευση προεπιλογών για τον φάκελο '%s' id: Save as global default msg: Αποθήκευση ως καθολική προεπιλογή id: Scaling # Missing translation msg: id: Stretch video to fullscreen msg: Αναπαραγωγή βίντεο σε πλήρη οθόνη id: Stretch video to widescreen msg: Αναπαραγωγή βίντεο σε ευρεία οθόνη id: Vertical pan msg: Κάθετη επέκταση id: Vertical position # Missing translation msg: id: Vertical scale # Missing translation msg: id: Video frame interpolation msg: Παρεμβολή video frame id: Video zoom msg: Μεγέθυνση βίντεο # # ./src/metadata/browsemdb.c # id: Indexing msg: Εύρεση # # ./src/metadata/decoration.c # id: Automatic msg: Αυτόματο id: Erase all playback info msg: Διαγραφή πληροφοριών αναπαραγωγής id: Manual msg: Χειροκίνητο id: Mark all as seen msg: Μαρκάρισμα όλων ότι τα έχω δει id: Mark all as unseen msg: Μαρκάρισμα όλων ότι δεν τα έχω δει id: Metadata mode msg: Λειτουργία- Metadata # # ./src/metadata/metadata.c # id: Embedded in file msg: Ενσωματωμένο στο αρχείο id: Track %d msg: Τίτλος %d # # ./src/metadata/metadata_sources.c # id: Enabled msg: Ενεργοποιημένο id: Metadata msg: Metadata id: Metadata configuration and provider settings msg: Διαμόρφωση Metadata και ρυθμίσεις παρόχου id: Providers for Music msg: Πάροχοι Μουσικής id: Providers for Video msg: Πάροχοι Βίντεο # # ./src/metadata/metadb.c # id: %d items deleted msg: %d αρχεία διαγράφηκαν id: Clear all metadata msg: Καθαρισμός όλων των αρχείων metadata id: Clearing all metadata means losing <b>all</b> metadata cached from external sources such as themoviedb.org, etc\n\nInformation about resume-points, playcount, etc will be saved.\nAre you sure you proceed? msg: Ο καθαρισμός όλων των αρχείων metadata σημαίνει απώλεια <b>όλων</b> των αρχείων metadata από εξωτερικές πηγές όπως το themoviedb.org, κλπ\n\nΠληροφορίες όπως σημεία συνέχισης, μετρητές αναπαραγωγών, κλπ θα παραμείνουν.\nΕίστε σίγουροι ότι θέλετε να συνεχίσετε; # # ./src/metadata/mlp.c # id: Custom search query msg: Ερώτημα προσαρμοσμένης αναζήτησης id: Custom title msg: Τροποποιημένος τίτλος id: IMDb ID msg: IMDb ID id: Metadata loaded from <b>%s</b> based on %s # Missing translation msg: id: Metadata source msg: Πηγή Metadata id: Movie msg: Ταινία id: Movie title msg: Τίτλος Ταινίας id: No data found msg: Δεν βρέθηκαν δεδομένα id: None msg: Κανένα id: Refresh metadata msg: Ανανέωση Metadata id: Title, Season, Episode msg: Τίτλος, Σεζόν, Επεισόδιο id: custom IMDb ID msg: Τροποποίηση IMDb ID id: custom query msg: Τροποποιημένη Αναζήτηση id: filename msg: Όνομα αρχείου id: filename as TV episode msg: Όνομα αρχείου ως επεισόδιο TV id: folder name msg: Όνομα φακέλου # # ./src/navigator.c # id: Add and remove items on homepage msg: Προσθήκη και αφαίρεση δυνατοτήτων στην αρχική οθόνη id: Added %s to home page # Missing translation msg: id: Added new bookmark: %s msg: Προσθέθηκε νέος σελιδοδείκτης: %s id: Bookmarks msg: Σελιδοδείκτες id: Icon # Missing translation msg: id: Music msg: Μουσική id: No handler for URL msg: Δεν υπάρχει κρατημένο URL id: Other msg: Άλλα id: Photos msg: Φωτογραφίες id: Removed %s from homepage # Missing translation msg: id: Removed bookmark: %s msg: Αφαιρέθηκε ο σελιδοδείκτης: %s id: TV msg: TV id: Title msg: Τίτλος id: Type msg: Τύπος id: URL msg: URL id: Video msg: Βίντεο # # ./src/networking/connman.c # id: Enable Wi-Fi msg: Ενεργοποίηση Wi-Fi id: Network connections msg: Συνδέσεις Δικτύου # # ./src/networking/ftp_server.c # id: Enable FTP server msg: Ενεργοποίηση FTP-Server id: FTP server msg: FTP-Server id: Server TCP port msg: Θύρα Server TCP # # ./src/networking/http_server.c # id: Power Off # Missing translation msg: id: Rebooting # Missing translation msg: id: Restarting # Missing translation msg: id: Standby msg: Λειτουργία Αναμονής # # ./src/notifications.c # id: Show news on home screen # Missing translation msg: # # ./src/plugins.c # id: Alternate plugin Repository URL msg: Εναλλακτική διεύθυνση URL για τα πρόσθετα id: Audio decoders # Missing translation msg: id: Auto install plugins on demand # Missing translation msg: id: Auto installed plugin %s (Version %s) # Missing translation msg: id: Automatically upgrade plugins msg: Αυτόματη αναβάθμιση επεκτάσεων id: Available plugins msg: Διαθέσιμες επεκτάσεις id: Background msg: Υπόβαθρο id: Beta testing passwords msg: Κωδικοί δοκιμαστικής έκδοσης id: Browse available plugins msg: Περιήγηση διαθέσιμων επεκτάσεων id: Browsing msg: Αναζήτηση id: Cloud services msg: Υπηρεσίες Cloud id: Corrupt plugin bundle msg: Κατεστραμμένο πακέτο πρόσθετου id: Custom backgrounds can now be set in Settings -> Look and Feel # Missing translation msg: id: Disk write error msg: Σφάλμα εγγραφής δίσκου! id: Downloading msg: Λήψη id: File open error msg: Σφάλμα κατά το άνοιγμα αρχείου id: Home page msg: Αρχική Σελίδα id: Images msg: Εικόνες id: Installed # Missing translation msg: id: Installed plugins msg: Εγκατεστημένες επεκτάσεις id: Installed version higher than available msg: Η εγκατεστημένη έκδοση είναι πιο πρόσφατη από την διαθέσιμη id: Installing msg: Εγκατάσταση id: List of albums msg: Λίστες Άλμπουμ id: Loading screen msg: Οθόνη Φόρτωσης id: Movies msg: Ταινίες id: Music streaming msg: Streaming Μουσικής id: Not installable msg: Δεν μπορεί να εγκατασταθεί id: Not installed msg: Δεν εγκαταστάθηκε id: Not upgradable msg: Δεν μπορεί να αναβαθμιστεί id: On Screen Keyboards msg: Πληκτρολογια στην οθόνη id: Online TV msg: Διαδικτυακή TV id: Plugin %s %s has been uninstalled because it may cause problems.\nYou may try reinstalling a different version manually. msg: Το πρόσθετο %s % καταργήθηκε επειδή μπορεί να προκαλέσει προβλήματα. Προσπάθηστε να επανεγκαταστήσετε μια διαφορετική έκδοση χειροκίνητα. id: Plugin %s has been uninstalled - %s # Missing translation msg: id: Plugin categories # Missing translation msg: id: Plugins msg: Πρόσθετα id: Preferred views from plugins msg: Προτιμώμενες προβολές από τα πρόσθετα id: Screen saver msg: Προφύλαξη Οθόνης id: TV channels msg: Κανάλια TV id: Unable to load plugin.json: %s msg: Αδυναμία φόρτωσης plugin.json: %s id: Unable to load plugin.json: Malformed JSON msg: Αδυναμία φόρτωσης plugin.json: Ακατάλληλο JSON id: Uncategorized msg: Χωρίς Κατηγοριοποίηση id: Up to date msg: Ενημερωμένο id: Upgradable msg: Αναβαθμίσιμο id: Upgraded plugin %s to version %s msg: Αναβάθμιση πρόσθετου %s στην έκδοση %s id: User interface extensions msg: Πρόσθετα Περιβάλλοντος Χρήστη id: Version %s is no longer compatible with Movian # Missing translation msg: id: Video streaming msg: Streaming Βίντεο # # ./src/prop/prop_proxy.c # id: Remote exited # Missing translation msg: # # ./src/runcontrol.c # id: Automatic standby msg: Αυτόματος Τερματισμός Λειτουργίας id: Enable SSH server msg: Ενεργοποίηση SSH-Server id: Logout msg: Αποσύνδεση id: Open shell msg: Άνοιγμα Shell id: Power off system msg: Τερματισμός Συστήματος id: Quit msg: Έξοδος id: SSH server msg: SSH-Server # # ./src/sd/sd.c # id: Enabled on home screen msg: Ενεργοποίηση στην αρχική σελίδα id: Name msg: Όνομα # # ./src/service.c # id: Local network msg: Τοπικό Δίκτυο id: Remove from homepage # Missing translation msg: # # ./src/settings.c # id: About # Missing translation msg: id: Applications and installed plugins msg: Εφαρμογές και Εγκατεστημένα Πρόσθετα id: Configure communications with your TV msg: Ρύθμιση επικοινωνίας με την τηλεόραση σας id: Developer settings msg: Επιλογές Προγραμματιστών id: Discovered media sources msg: Ανακαλυφθέντες Πηγές id: File browsing msg: Εξερεύνηση Αρχείων id: Fonts and user interface styling msg: Στυλ και γραμματοσειρά περιβάλλοντος χρήστη id: General msg: Γενικά id: Global settings msg: Γενικές Ρυθμίσεις id: Look and feel msg: Εμφάνιση και Αίσθηση id: Network services, etc msg: Δικτυακές Υπηρεσίες, κλπ. id: Network settings msg: Ρυθμίσεις Δικτύου id: Reset # Missing translation msg: id: Settings useful for developers msg: Ρυθμίσεις χρήσιμες για τους προγραμματιστές id: Software upgrade msg: Αναβάθμιση Προγράμματος id: Starting and stopping msg: Ξεκίνημα και σταμάτημα id: System name msg: Όνομα Συστήματος id: System related settings msg: Ρυθμίσεις σχετιζόμενες με το σύστημα id: TV Control # Missing translation msg: # # ./src/subtitles/subtitles.c # id: Any subtitle in central folder msg: Οποιοσδήποτε υπότιτλος στον κεντρικό φάκελο id: Any subtitle in same folder as video msg: Οποιοσδήποτε υπότιτλος στον ίδιο φάκελο με το βίντεο id: Auto msg: Αυτόματο id: Automatically select from this source msg: Αυτόματη επιλογή από αυτήν την πηγή id: Central subtitle folder msg: Κεντρικός φάκελος υποτίτλων id: Color msg: Χρώμα id: External file msg: Εξωτερικό αρχείο id: Force subtitles to reside on video frame msg: Εξαναγκασμένη προσαρμογή των υπότιτλων στο καρέ του βίντεο id: Generic settings for video subtitles msg: Γενικές ρυθμίσεις για τους υποτίτλους των βίντεο id: Ignore embedded styling msg: Αγνοήστε τα ενσωματωμένα στυλ id: Left msg: Αριστερά id: Outline color msg: Χρώμα περιγράμματος id: Outline size msg: Μέγεθος περιγράμματος id: Path to central folder msg: Διαδρομή για τον κεντρικό φάκελο id: Providers for Subtitles msg: Πάροχοι υποτίτλων id: Right msg: Δεξιά id: Shadow color msg: Σκιώδες χρώμα id: Shadow offset msg: Σκιώδης αντιστάθμιση id: Subtitle horizontal displacement msg: Οριζόντια μετατόπιση υποτίτλων id: Subtitle position msg: Θέση υποτίτλων id: Subtitle size msg: Μέγεθος υποτίτλων id: Subtitle size and positioning msg: Μέγεθος και θέση υποτίτλων id: Subtitle vertical displacement msg: Κάθετη μετατόπιση υποτίτλων id: Subtitles embedded in video file msg: Οι υπότιτλοι είναι ενσωματωμένοι στο βίντεο id: Subtitles with matching filename in central folder msg: Υπότιτλοι με ίδιο άνομα αρχείου στον κεντρικό φάκελο id: Subtitles with matching filename in same folder as video msg: Υπότιτλοι με ίδιο όνομα αρχείου στον ίδιο φάκελο με το βίντεο # # ./src/text/fontstash.c # id: Defaults msg: Προεπιλεγμένα id: Fonts msg: Γραμματοσειρές id: Installed fonts msg: Εγκατεστημένες γραμματοσειρές id: Narrow text msg: Λεπτό κείμενο id: Reset main font to default msg: Επαναφορά κύριας γραμματοσειράς στην προεπιλεγμένη id: Reset narrow font to default msg: Επαναφορά λεπτής γραμματοσειράς στην προεπιλεγμένη id: Reset subtitle font to default msg: Επαναφορά γραμματοσειράς υποτίτλων στην προεπιλεγμένη id: Unable to install font: %s msg: Αδυναμία εγκατάστασης γραμματοσειράς: %s id: Use font %s for msg: Χρήση γραμματοσειράς %s σε # # ./src/ui/clipboard.c # id: Copy failed: %s # Missing translation msg: id: Target folder # Missing translation msg: # # ./src/ui/glw/glw_ps3.c # id: Dual-Shock Remote # Missing translation msg: id: No msg: Όχι id: Seek using L2 and R2 button msg: Μετάβαση με την χρήση των L2 και R2 κουμπιών id: Yes with Select button msg: Επιλογή "ναι" με την χρήση του κουμπιού select # # ./src/ui/glw/glw_settings.c # id: Custom background image # Missing translation msg: id: Emulate Up/Down buttons with mouse wheel # Missing translation msg: id: Folder for screensaver images # Missing translation msg: id: Font and icon size msg: Μέγεθος γραμματοσειράς και εικονιδίων id: Interface horizontal shrink # Missing translation msg: id: Interface vertical shrink # Missing translation msg: id: Screensaver # Missing translation msg: id: Screensaver delay msg: Καθυστέρηση προφύλαξης οθόνης id: Seconds per image # Missing translation msg: id: Use Bing images of the day # Missing translation msg: id: Wrap when reaching beginning/end of lists msg: Ατελείωτες κινήσεις μέσα στους καταλόγους # # ./src/ui/glw/glw_view_eval.c # id: %d days ago # Missing translation msg: id: %d hours ago # Missing translation msg: id: %d minutes ago # Missing translation msg: id: %d months ago # Missing translation msg: id: %d weeks ago # Missing translation msg: id: %d years ago # Missing translation msg: id: Just now # Missing translation msg: id: One day ago # Missing translation msg: id: One hour ago # Missing translation msg: id: One minute ago # Missing translation msg: id: One month ago # Missing translation msg: # # ./src/ui/linux/nvidia.c # id: Auto-switch to this mode msg: Αυτόματη μετάβαση σε αυτήν την λειτουργεία id: DVI-Video color range msg: Εύρος χρωμάτων DVI-Βίντεο id: Switch to this mode now msg: Μετάβαση σε αυτήν την λειτουργία τώρα id: Video modes msg: Λειτουργίες Βίντεο # # ./src/upgrade.c # id: %s version %s is available msg: Η έκδοση του %s %s είναι διαθέσιμη id: Notify about upgrades msg: Ενημέρωση για αναβαθμίσεις id: Open download page msg: Άνοιγμα σελίδας λήψης id: System msg: Σύστημα id: Upgrade to releases from msg: Αναβάθμιση ενημερώσεων από # # ./src/upnp/upnp_browse.c # id: Date (newest first) msg: Ημερομηνία (Νεότερα) id: Date (oldest first) msg: Ημερομηνία (Παλαιότερα) id: Device not found msg: Η συσκευή δεν βρέθηκε id: Malformed URI after device msg: Εσφαλμένη μορφή URI από την συσκευή id: Malformed URI after service msg: Εσφαλμένη μορφή URI από την υπηρεσία id: Service not found msg: Η υπηρεσία δεν βρέθηκε # # ./src/video/video_settings.c # id: Always msg: Πάντα id: Ask msg: Ερώτηση id: Automatically play next video in list msg: Αυτόματη αναπαραγωγή του επόμενου βίντεο στην λίστα id: Count video as played when reaching msg: Υπολόγισε ότι το βίντεο έχει παιχτεί όταν φθάσει στο id: Enable VDPAU msg: Ενεργοποίηση VDPAU id: Hardware accelerated decoding # Missing translation msg: id: Maximum resolution for deinterlacer msg: Μέγιστη ανάλυση για απόπλεξη id: Never msg: Ποτέ id: No limit msg: Χωρίς όριο id: Per-file volume msg: Ένταση ανα-αρχείο id: Preferred VDPAU deinterlacer method msg: Προτιμώμενη μέθοδος απόπλεξης id: Resume video playback msg: Συνέχιση αναπαραγωγής βίντεο id: Show clock during playback # Missing translation msg: id: Step when seeking backward msg: Βήμα κατα την αναζήτηση προς τα πίσω id: Step when seeking forward msg: Βήμα κατα την αναζήτηση προς τα μπροστά id: Temporal msg: Προσωρινός id: Temporal/Spatial msg: Προσωρινός/Με Διαστήματα id: Up / Down during video playback controls msg: Πάνω / Κάτω κατά την αναπαραγωγή video id: Video acceleration and display behaviour msg: Επιτάχυνση βίντεο και ρυθμίσεις αναπαραγωγής id: Video buffer size # Missing translation msg: | Low | [
0.498470948012232,
20.375,
20.5
] |
Results of a survey of owners of miniature swine to characterize husbandry practices affecting risks of foreign animal disease. To characterize husbandry practices that could affect the risks of foreign animal disease in miniature swine. Survey study. 106 owners of miniature swine. An online survey of owners of miniature swine was conducted to obtain information about miniature pig and owner demographics; pig husbandry; movements of pigs; and pig contacts with humans, other miniature swine, and livestock. 12 states, 106 premises, and 317 miniature swine were represented in the survey. More than a third (35%) of miniature swine owners also owned other livestock species. Regular contact with livestock species at other premises was reported by 13% of owners. More than a third of owners visited shows or fairs (39%) and club or association events (37%) where miniature swine were present. More than 40% of owners fed food waste to miniature swine. Approximately half (48%) of the veterinarians providing health care for miniature swine were in mixed-animal practice. Results of this study indicated that miniature swine kept as pets can be exposed, directly and indirectly, to feed and other livestock, potentially introducing, establishing, or spreading a foreign animal disease such as foot-and-mouth disease. In addition, the veterinary services and carcass disposal methods used by miniature swine owners may reduce the likelihood of sick or dead pigs undergoing ante- or postmortem examination by a veterinarian. | High | [
0.6631853785900781,
31.75,
16.125
] |
Design, synthesis and evaluations of acridone derivatives using Candida albicans--search for MDR modulators led to the identification of an anti-candidiasis agent. In order to search for MDR modulators, rationally designed acridone derivatives were investigated for their effect on influx or efflux of Rhodamine6G (R6G) in CAI4 cells. Results of these investigations indicate that in presence of compound 12, inhibition of growth of CAI4 cells and also an increased influx/efflux of R6G in CAI4 cells have been observed. This seems to be occurring due to the cell wall rupturing of Candida albicans. Compound 12 may be a suitable candidate for candidiasis therapy. | High | [
0.6859504132231401,
31.125,
14.25
] |
provider "cloudflare" { email = "[email protected]" token = "api-key-account" } variable "domain" { default = "e-g.com" } resource "cloudflare_record" "www" { domain = "${var.domain}" name = "www" value = "10.10.101.102" type = "A" proxied = true } | Low | [
0.5,
26.875,
26.875
] |
After developing executive compensation and employee compensation plans over the years for so many companies from iRobot to TripAdvisor, we’ve developed our “top ten mistakes” compensation consultants typically make when designing compensation plans: Too many compensation performance metrics “Less is more” when determining the criteria or metrics to use in the plan. Plans with three to five measures can provide balance and focus. Too many measures dilute a participant’s attention and motivation. Performance metrics with a weight less than 10% of the total One of the signs of too many performance measures is when a measure is weighted to be less than 10% in calculating the pay-for-performance incentive. For most participants, a measure that is less than 10% adds very little to individual earnings and so these are easily ignored. Setting goals by metric that are difficult to tie to actual levels of performance For each measure, goals are set. Goals are most effective when the manager and the employee clearly knows when performance has been achieved, has been under achieved and over achieved and how the payouts directly align with those levels of achievement. Binary or yes/no goals present a significant issue for the incentive plan participant. What happens if there is over achievement or the results were actually close to the achievement or “yes” level but not quite? Not tracking performance results on an ongoing regular and frequent basis When designing the plan, one important step is to develop a process for tracking and communicating progress on a regular basis. This is true of company or other types of group goals. Monitoring progress helps maintain focus on the metrics and goals and allows for mid-course corrections or acceleration of the goal. What would happen if no one tracked the score in a basketball game, would the teams know who won the game? Trying to force the metric’s performance range and payout range to be the same The most common range of payout opportunity as a percent of the target incentive is 50% at the threshold (or minimum) and 200% at the maximum. The next step is to determine what is the minimum performance required to earn that 50% of target payout or 80% of the goal at target. What is the exceptional level of performance required to earn 200%? Most commonly 120%. Often there is an assumption that these percentages should be the same, in other words, 80% achievement means 80% of incentive payout. This example may be paying out too much for 80% performance. Not paying out an annual incentive within 45 days of the end of the performance period If compensation earned from an annual incentive plan is not paid out within 2.5 months after year-end it is considered deferred compensation and must be structured to be compliant with IRS code section 409A rules. So, it is best to avoid 409A by paying out prior to 45 days following the end of the performance period. Not being clear about the purpose and/or objectives of the compensation plan Commonly we see either a purpose of many compensation plans being to reward participants for achieving results or to motivate participants to achieve results. Whatever the objectives or purpose of your pay-for-performance plans, first ensure it is stated clearly and then be as specific as possible tying it back to the results or behaviors you want to the plan to reinforce. Without a purpose or objective for your employee’s plan, it is hard to evaluate whether the plan is effective. Focusing on individual metrics when it takes more than one person or function to achieve a goal We had a client introduce bonus eligibility for all employees with a significant weight on individual measures or goals. This caused significant issues when, in fact, many individual employees chose metrics and goals that required significant IT support and IT could not meet this demand. In this example, there needed to be more coordination and communication at the start when finalizing individual and collective performance goals and measures. Not modeling incentive payout scenarios can create multiple negative impacts, such as participants being paid very little for adding significant value or being paid too much for contributing too little One problem with net payout scenarios is that often net payout amounts are not meaningful to employees after standard tax withholdings. This usually happens when there are many payout periods, such as quarterly payouts, but targets payouts can also be small at the lower levels of the organization. Not aligning the performance measures with the right level of the organization Utilizing a layer of performance measures (where appropriate) that include corporate, regional and/or functional areas and job specific measures then weighting these appropriately can create effective line of sight when designing compensation plans. At the higher levels of the organization, weighting for corporate metrics is higher than at the lower levels where increased weighting for job specific measures is appropriate. Better yet, is ensuring that performance metrics below the corporate area are cascaded to connect with each other. These multiple layers of goals help employees understand that when the company has a strong year, strong performance of individual goals maximizes payouts. When the company has a poor year, payouts are only driven by strong individual performance and significantly moderated. What challenges have you experienced in designing your compensation plans for executives and employees? The Wilson Group is available to assist you. | High | [
0.6564102564102561,
32,
16.75
] |
Top Ten Highways to Choose For A Road Trip with Friends The summers call for great time out on the open road. Driving on the highway brings immense joy for people who love driving. There are many highways in the U.S that lead to well-known destinations. Some of these highways have historical significance, whereas some depict conventional architecture. In this article, we will tell you about the top ten highways to choose for a road trip with friends. 1. Big Sur, California The Iconic Route 1 is spread throughout California; however, the best route for road trips is through the way of Big Sur. It constitutes 90 or even more miles and stretches from the Central Coast from San Simeon to Carmel. The beauty of this place is indescribable as you will see the redwood groves and rocky beaches alongside while you drive on the highways. 2. Blue Ridge Parkway, NC and VA This highway stretches at least 469 miles with the southern Appalachian Mountains and connects two well known national parks namely North Carolina’s Great Smoky Mountains and Virginia’s Shehandoah. The place is covered by picnic spots and wonderful hiking trails that are filled with tulip, dogwood and red maple trees. Many people especially make trips to the highway to spend great times with their friends and loved ones. 3. Sun Road, Montana The awesome beauty of Sun Road Montana cannot be overlooked. The glaciers in idyllic northern Montana give a breathtaking view. The road goes up to 50 miles from east to west in the Glacier National Park. The parks remains open throughout the year, but some parts of it are kept closed from the mid of September to the mid of June. 4. Hana Highway, Hawaii Hawaii is well known for its sleepy surf and wild beauty from the olden days. Driving through the route gives the similar feel of the rural east part of the beautiful island. The road is well known for its natural beauty. It is also known as the Road to Hana. It begins in the town of Paia which is about a forty minute drive from the Maui’s well constructed southwest area. This place is definitely worth going if you have the passion to delve into the wild beauty of the old Hawaii. 5. Million Dollar Highway, Colorado This highway is located near the Telluride. It draws the attention of thousands of travel enthusiasts every year form different areas. It connects the very old, yet beautiful mining towns of Quay and Silverton in the San Juan Mountains located in southwestern Colorado. The highway passes through the Uncompahgre Gorge towards the peak of the magnificent Red Mountain Pass that is also a great place to visit. 6. Red Rock Scenic Byway, Arizona The city of Sedona is well known for its commercial sprawl. The enthralling rock formations of the scenic city still stand tall on the Red Rock Scenic Byway. It is a great place to drive even though it is just a small 7.5 mile road. Many people still are not aware of the fact that the place is also known as Route 179. It begins from Sedona and straightaway runs towards the south and ends at Interstate 17. 7. Sea Islands, Georgia This also a great place for people who experience natural beauty and want to spend quality time out with their friends. The scenic islands that run along the Georgian coastal barrier islands offer a view at the momentous blue-blood enclaves that have fascinated naturalists and travelers for a long time. 8. Seward Highway, Alaska The best way to enjoy the massive beauty of Alaska is to go through the Seward Highway that stretches around 127 miles. The highway also connects Anchorage to the small portside area of Seward at the wonderful Resurrection Bay. 9. Sonoma and Napa Valley, California For drivers, road trips from the neighboring valleys of the beautiful Napa and Sonoma give a thrilling experience. However, there are also different historic areas and serene nature besides just the luxurious spots. 10. U.S Route 1, Maine Route 1 becomes a parking lot in the month of August when a large number of people are vacationing. Road trips to the area in early summer offer an open view of the hardy coastal beauty of the state. You should start your tour of this area beginning from Maine in the south and go through Ogunquit before you reach Kennebunkport. Conclusion These are the top 10 highways in the U.S that are great spots for drivers to spend time with friends and family. These places are frequented at different times of the year. Not only have these places attracted local people, but millions of tourists from around the world as well. Author Bio: Angie is a travel writer and writes for various travel magazines. In her spare time, she loves writing and reading non-fiction. She believes that only Eclipse Leisure offer an easy way to book a stag weekend abroad with their all inclusive packages. | Mid | [
0.606280193236715,
31.375,
20.375
] |
My SS got me not one, but two awesome glasses! One is an awesome pint glass from one of my favorite breweries, Terrapin (Athens, GA), specifically their Tree Hugger Ale. The second is a large pilsner-style glass from something local to him, Ellis Island Casino & Brewery in Las Vegas! These are awesome, and I got to try them out myself last night when I finally got home (with a homebrewed Honey Bee Ale)! Thanks so much SS! P.S. Sorry I'm late in posting this gift; it unfortunately arrived the day I went out of town for a week, and though my wife texted me some pics I couldn't get them to upload properly! | Low | [
0.45637583892617406,
25.5,
30.375
] |
Saturday, November 24, 2007 Thanks to Honey, the consummate host and tour guide, our visits to LA are always a foodie whirlwind! The stand-out meal on this trip was dinner at Craft, an outpost of Tom Colicchio's New York City-based "vision of food heaven." (According to the NY Times review when it opened in 2001 - and an apt description of our experience as well!). http://www.craftrestaurant.com/craft_losangeles_style.html As we obsessed over every dish on the menu, we quickly agreed that sharing was the only way to go and ordered these: Monday, November 19, 2007 We entered Okay Okay Diner in search of the consummate brunch spot in Leslieville. At first glance, it certainly seemed to have a number of the requisite ingredients: red leather booths, counter and stools, slightly greasy, slightly smoky smell emanating from the kitchen. We plunked ourselves down at a booth, ordered double lattes and scanned the menu. What to choose: granola and yogurt? buttermilk pancakes? thick slice french toast? the "scramble of the day" with smoked salmon and creme fraiche? We both honed in on the egg burrito, a tortilla filled with fluffy scrambled eggs, grilled peppers, onions and avocado, topped with salsa and sour cream. De-lish! I think our search is over. | Mid | [
0.5488069414316701,
31.625,
26
] |
/* * Copyright (c) 2011 The WebRTC project authors. All Rights Reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #ifndef MODULES_AUDIO_CODING_TEST_UTILITY_H_ #define MODULES_AUDIO_CODING_TEST_UTILITY_H_ #include "modules/audio_coding/include/audio_coding_module.h" #include "test/gtest.h" namespace webrtc { //----------------------------- #define CHECK_ERROR(f) \ do { \ EXPECT_GE(f, 0) << "Error Calling API"; \ } while (0) //----------------------------- #define CHECK_PROTECTED(f) \ do { \ if (f >= 0) { \ ADD_FAILURE() << "Error Calling API"; \ } else { \ printf("An expected error is caught.\n"); \ } \ } while (0) //---------------------------- #define CHECK_ERROR_MT(f) \ do { \ if (f < 0) { \ fprintf(stderr, "Error Calling API in file %s at line %d \n", __FILE__, \ __LINE__); \ } \ } while (0) //---------------------------- #define CHECK_PROTECTED_MT(f) \ do { \ if (f >= 0) { \ fprintf(stderr, "Error Calling API in file %s at line %d \n", __FILE__, \ __LINE__); \ } else { \ printf("An expected error is caught.\n"); \ } \ } while (0) #define DELETE_POINTER(p) \ do { \ if (p != NULL) { \ delete p; \ p = NULL; \ } \ } while (0) class ACMTestTimer { public: ACMTestTimer(); ~ACMTestTimer(); void Reset(); void Tick10ms(); void Tick1ms(); void Tick100ms(); void Tick1sec(); void CurrentTimeHMS(char* currTime); void CurrentTime(unsigned long& h, unsigned char& m, unsigned char& s, unsigned short& ms); private: void Adjust(); unsigned short _msec; unsigned char _sec; unsigned char _min; unsigned long _hour; }; // To avoid clashes with CircularBuffer in APM. namespace test { class CircularBuffer { public: CircularBuffer(uint32_t len); ~CircularBuffer(); void SetArithMean(bool enable); void SetVariance(bool enable); void Update(const double newVal); void IsBufferFull(); int16_t Variance(double& var); int16_t ArithMean(double& mean); protected: double* _buff; uint32_t _idx; uint32_t _buffLen; bool _buffIsFull; bool _calcAvg; bool _calcVar; double _sum; double _sumSqr; }; } // namespace test int16_t ChooseCodec(CodecInst& codecInst); void PrintCodecs(); bool FixedPayloadTypeCodec(const char* payloadName); class VADCallback : public ACMVADCallback { public: VADCallback(); int32_t InFrameType(FrameType frame_type) override; void PrintFrameTypes(); void Reset(); private: uint32_t _numFrameTypes[5]; }; } // namespace webrtc #endif // MODULES_AUDIO_CODING_TEST_UTILITY_H_ | Low | [
0.48518518518518505,
32.75,
34.75
] |
AUSTIN – Just after New Orleans officially kicks off Carnival season 2015, Texas gay marriage and abortion activists will descend on the Crescent City to hear oral arguments in two landmark cases facing the region’s top appeals court. The Fifth Circuit Court of Appeals will hear oral arguments about the constitutionality of Texas’ tough new abortion restrictions on Jan. 7. The law passed in 2013, known as House Bill 2, banned abortions after 20 weeks of pregnancy, placed heavy new restrictions on clinics and doctors who perform the procedure and made it nearly impossible to obtain an abortion using a pill. The court has twice reversed lower court orders that found HB2 unconstitutional. But abortion providers were in-part heartened after the U.S. Supreme Court put on hold for some clinics and doctors a number of the law’s most stringent mandates. On Jan. 9, the same three-judge panel will tackle both Texas and Louisiana’s constitutional bans on same-sex marriage. In February, San Antonio-based U.S. District Judge Orlando Garcia ruled Texas’ ban unconstitutional because it violated gay couples’ 14th Amendment rights to due process and equal protection. Attorney General Greg Abbott, now the governor-elect, appealed the ruling to the New Orleans-based appeals court. Gay marriage is currently legal in 34 states and the District of Columbia. An October ruling upholding Ohio’s gay marriage ban, the first of its kind from a federal appeals court, will likely force the U.S. Supreme Court to review the issue once again. | Mid | [
0.580786026200873,
33.25,
24
] |
// SPDX-License-Identifier: GPL-2.0-or-later /* * Copyright (C) 2008 Marvell International Ltd. */ #include <linux/kernel.h> #include <linux/module.h> #include <linux/sched.h> #include <linux/init.h> #include <linux/cpufreq.h> #include <linux/slab.h> #include <linux/io.h> #include <mach/generic.h> #include <mach/pxa3xx-regs.h> #define HSS_104M (0) #define HSS_156M (1) #define HSS_208M (2) #define HSS_312M (3) #define SMCFS_78M (0) #define SMCFS_104M (2) #define SMCFS_208M (5) #define SFLFS_104M (0) #define SFLFS_156M (1) #define SFLFS_208M (2) #define SFLFS_312M (3) #define XSPCLK_156M (0) #define XSPCLK_NONE (3) #define DMCFS_26M (0) #define DMCFS_260M (3) struct pxa3xx_freq_info { unsigned int cpufreq_mhz; unsigned int core_xl : 5; unsigned int core_xn : 3; unsigned int hss : 2; unsigned int dmcfs : 2; unsigned int smcfs : 3; unsigned int sflfs : 2; unsigned int df_clkdiv : 3; int vcc_core; /* in mV */ int vcc_sram; /* in mV */ }; #define OP(cpufreq, _xl, _xn, _hss, _dmc, _smc, _sfl, _dfi, vcore, vsram) \ { \ .cpufreq_mhz = cpufreq, \ .core_xl = _xl, \ .core_xn = _xn, \ .hss = HSS_##_hss##M, \ .dmcfs = DMCFS_##_dmc##M, \ .smcfs = SMCFS_##_smc##M, \ .sflfs = SFLFS_##_sfl##M, \ .df_clkdiv = _dfi, \ .vcc_core = vcore, \ .vcc_sram = vsram, \ } static struct pxa3xx_freq_info pxa300_freqs[] = { /* CPU XL XN HSS DMEM SMEM SRAM DFI VCC_CORE VCC_SRAM */ OP(104, 8, 1, 104, 260, 78, 104, 3, 1000, 1100), /* 104MHz */ OP(208, 16, 1, 104, 260, 104, 156, 2, 1000, 1100), /* 208MHz */ OP(416, 16, 2, 156, 260, 104, 208, 2, 1100, 1200), /* 416MHz */ OP(624, 24, 2, 208, 260, 208, 312, 3, 1375, 1400), /* 624MHz */ }; static struct pxa3xx_freq_info pxa320_freqs[] = { /* CPU XL XN HSS DMEM SMEM SRAM DFI VCC_CORE VCC_SRAM */ OP(104, 8, 1, 104, 260, 78, 104, 3, 1000, 1100), /* 104MHz */ OP(208, 16, 1, 104, 260, 104, 156, 2, 1000, 1100), /* 208MHz */ OP(416, 16, 2, 156, 260, 104, 208, 2, 1100, 1200), /* 416MHz */ OP(624, 24, 2, 208, 260, 208, 312, 3, 1375, 1400), /* 624MHz */ OP(806, 31, 2, 208, 260, 208, 312, 3, 1400, 1400), /* 806MHz */ }; static unsigned int pxa3xx_freqs_num; static struct pxa3xx_freq_info *pxa3xx_freqs; static struct cpufreq_frequency_table *pxa3xx_freqs_table; static int setup_freqs_table(struct cpufreq_policy *policy, struct pxa3xx_freq_info *freqs, int num) { struct cpufreq_frequency_table *table; int i; table = kcalloc(num + 1, sizeof(*table), GFP_KERNEL); if (table == NULL) return -ENOMEM; for (i = 0; i < num; i++) { table[i].driver_data = i; table[i].frequency = freqs[i].cpufreq_mhz * 1000; } table[num].driver_data = i; table[num].frequency = CPUFREQ_TABLE_END; pxa3xx_freqs = freqs; pxa3xx_freqs_num = num; pxa3xx_freqs_table = table; policy->freq_table = table; return 0; } static void __update_core_freq(struct pxa3xx_freq_info *info) { uint32_t mask = ACCR_XN_MASK | ACCR_XL_MASK; uint32_t accr = ACCR; uint32_t xclkcfg; accr &= ~(ACCR_XN_MASK | ACCR_XL_MASK | ACCR_XSPCLK_MASK); accr |= ACCR_XN(info->core_xn) | ACCR_XL(info->core_xl); /* No clock until core PLL is re-locked */ accr |= ACCR_XSPCLK(XSPCLK_NONE); xclkcfg = (info->core_xn == 2) ? 0x3 : 0x2; /* turbo bit */ ACCR = accr; __asm__("mcr p14, 0, %0, c6, c0, 0\n" : : "r"(xclkcfg)); while ((ACSR & mask) != (accr & mask)) cpu_relax(); } static void __update_bus_freq(struct pxa3xx_freq_info *info) { uint32_t mask; uint32_t accr = ACCR; mask = ACCR_SMCFS_MASK | ACCR_SFLFS_MASK | ACCR_HSS_MASK | ACCR_DMCFS_MASK; accr &= ~mask; accr |= ACCR_SMCFS(info->smcfs) | ACCR_SFLFS(info->sflfs) | ACCR_HSS(info->hss) | ACCR_DMCFS(info->dmcfs); ACCR = accr; while ((ACSR & mask) != (accr & mask)) cpu_relax(); } static unsigned int pxa3xx_cpufreq_get(unsigned int cpu) { return pxa3xx_get_clk_frequency_khz(0); } static int pxa3xx_cpufreq_set(struct cpufreq_policy *policy, unsigned int index) { struct pxa3xx_freq_info *next; unsigned long flags; if (policy->cpu != 0) return -EINVAL; next = &pxa3xx_freqs[index]; local_irq_save(flags); __update_core_freq(next); __update_bus_freq(next); local_irq_restore(flags); return 0; } static int pxa3xx_cpufreq_init(struct cpufreq_policy *policy) { int ret = -EINVAL; /* set default policy and cpuinfo */ policy->min = policy->cpuinfo.min_freq = 104000; policy->max = policy->cpuinfo.max_freq = (cpu_is_pxa320()) ? 806000 : 624000; policy->cpuinfo.transition_latency = 1000; /* FIXME: 1 ms, assumed */ if (cpu_is_pxa300() || cpu_is_pxa310()) ret = setup_freqs_table(policy, pxa300_freqs, ARRAY_SIZE(pxa300_freqs)); if (cpu_is_pxa320()) ret = setup_freqs_table(policy, pxa320_freqs, ARRAY_SIZE(pxa320_freqs)); if (ret) { pr_err("failed to setup frequency table\n"); return ret; } pr_info("CPUFREQ support for PXA3xx initialized\n"); return 0; } static struct cpufreq_driver pxa3xx_cpufreq_driver = { .flags = CPUFREQ_NEED_INITIAL_FREQ_CHECK, .verify = cpufreq_generic_frequency_table_verify, .target_index = pxa3xx_cpufreq_set, .init = pxa3xx_cpufreq_init, .get = pxa3xx_cpufreq_get, .name = "pxa3xx-cpufreq", }; static int __init cpufreq_init(void) { if (cpu_is_pxa3xx()) return cpufreq_register_driver(&pxa3xx_cpufreq_driver); return 0; } module_init(cpufreq_init); static void __exit cpufreq_exit(void) { cpufreq_unregister_driver(&pxa3xx_cpufreq_driver); } module_exit(cpufreq_exit); MODULE_DESCRIPTION("CPU frequency scaling driver for PXA3xx"); MODULE_LICENSE("GPL"); | Low | [
0.522772277227722,
33,
30.125
] |
Dr. Arshad M. Khan Dr. Arshad M. Khan is a former Professor based in the US. Educated at King's College London, OSU and The University of Chicago, he has a multidisciplinary background that has frequently informed his research. Thus he headed the analysis of an innovation survey of Norway, and his work on SMEs published in major journals has been widely cited. He has for several decades also written for the press: These articles and occasional comments have appeared in print media such as The Dallas Morning News, Dawn (Pakistan), The Fort Worth Star Telegram, The Monitor, The Wall Street Journal and others. On the internet, he has written for Antiwar.com, Asia Times, Common Dreams, Counterpunch, Countercurrents, Dissident Voice, Eurasia Review and Modern Diplomacy among many. His work has been quoted in the U.S. Congress and published in its Congressional Record. hen Donald Trump began his presidential campaign no one believed he could possibly be elected. When David Cameron went to the country on EU membership, he could not imagine 'Remain' losing. So it was with Theresa May. Ahead in the polls by 21 points she sought an unassailable majority. his Thursday, June 1, the U.S. decided to withdraw from the Paris Climate Accord. Like Brexit, the process is not like instant coffee; if anything, it is much more of a slow brew to which one could add harvesting or even growing the coffee in the first place. To prevent disruption for other members, it calls for a period of delay and negotiation taking four years. Therefore the final decision will rest on the president's successor -- unless the voters elect Mr. Trump to a second term. he thirst for war is ancient. As old as disputatious neighbors or rival tribes, it is enticing -- a siren call for the strong, presenting as it does a quick, easy and final solution. That it is often not, has hastened the end of royal dynasties (Hohenzollerns, Hapsburgs and Romanovs after WWI) and empires, including the British. There are cogent arguments both world wars could have been avoided: the first, Europe fell into in accidental haste; the second, an end of a trail leading from the first. here is in the U.S. a certain notion of being presidential. Toss missiles at Syria or bomb Afghanistan and everyone reflexively calls it presidential. Added to warmongering is peace making, visiting foreign countries, meeting with foreign leaders, holding joint press conferences with a slew of foreign reporters, all in a whirlwind of activity eagerly seized upon by the home press and guess what? The president is being presidential ... which as a bonus yields positive publicity, bumping up his favorability rating in the polls. his week on Tuesday (May 9), the president fired FBI Director James Comey. The resulting news storm allowed much speculation ... for very good reasons. The U.S. Attorney General's department and officials, the FBI and its agents, are all sworn to uphold the law. They also serve the president and serve at his pleasure. What happens then when the president himself becomes the subject of an investigation? he People's Climate March on Saturday, April 29, 2017, flooded Washington, DC, with over 100,000 protesters. Organizers claimed 150,000, with marches in 330 other cities across the country and in three dozen solidarity events abroad. Coinciding with President Trump's 100th day in office, the marchers also protested his anti-environmental actions. n a continuation of the theater of the absurd, all 100 U.S. senators were driven to the White House to listen to a top-secret intelligence briefing on North Korea. North Korea now has missiles capable of reaching Hawaii and will soon be able to extend its reach to California. ow many books have been authored by Donald Trump? The answer: a steady stream totaling a whopping 17 -- more than enough to keep a full-time writer fully occupied without all of Mr. Trump's other activities. The word 'writer' of course is key, for Mr. Trump has not actually written any of them. He hires a ghost writer and simply pens his name to the finished product. t was Gandhi who said: "An error does not become truth by reason of multiplied propagation, nor does truth become error because nobody sees it." A hasty conclusion based on tenuous evidence from the April 4th incident and the mainstream media, the neocons, the liberal interventionists, all pile on. hooting from the hip with unerring accuracy was the Wild West according to Hollywood. As anyone who has ever fired a pistol will tell you it is improbable, and historically the West's few gun duels were rather unremarkable. The latest hip-shooter is of course Donald J. Trump whose foreign policy seems to turn on a dime -- from not interested in removing Bashar al-Assad to his having no place in a future Syria, all within a week. ABOUT MD Modern Diplomacy is an invaluable platform for assessing and evaluating complex international issues that are often outside the boundaries of mainstream Western media and academia. We provide impartial and unbiased qualitative analysis in the form of political commentary, policy inquiry, in-depth interviews, special reports, and commissioned research. | Mid | [
0.604060913705583,
29.75,
19.5
] |
// Copyright 2015 CNI authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package ipam import ( "net" "syscall" "github.com/containernetworking/cni/pkg/types" "github.com/containernetworking/cni/pkg/types/current" "github.com/containernetworking/plugins/pkg/ns" "github.com/containernetworking/plugins/pkg/testutils" "github.com/vishvananda/netlink" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" ) const LINK_NAME = "eth0" func ipNetEqual(a, b *net.IPNet) bool { aPrefix, aBits := a.Mask.Size() bPrefix, bBits := b.Mask.Size() if aPrefix != bPrefix || aBits != bBits { return false } return a.IP.Equal(b.IP) } var _ = Describe("ConfigureIface", func() { var originalNS ns.NetNS var ipv4, ipv6, routev4, routev6 *net.IPNet var ipgw4, ipgw6, routegwv4, routegwv6 net.IP var result *current.Result BeforeEach(func() { // Create a new NetNS so we don't modify the host var err error originalNS, err = testutils.NewNS() Expect(err).NotTo(HaveOccurred()) err = originalNS.Do(func(ns.NetNS) error { defer GinkgoRecover() // Add master err = netlink.LinkAdd(&netlink.Dummy{ LinkAttrs: netlink.LinkAttrs{ Name: LINK_NAME, }, }) Expect(err).NotTo(HaveOccurred()) _, err = netlink.LinkByName(LINK_NAME) Expect(err).NotTo(HaveOccurred()) return nil }) Expect(err).NotTo(HaveOccurred()) ipv4, err = types.ParseCIDR("1.2.3.30/24") Expect(err).NotTo(HaveOccurred()) Expect(ipv4).NotTo(BeNil()) _, routev4, err = net.ParseCIDR("15.5.6.8/24") Expect(err).NotTo(HaveOccurred()) Expect(routev4).NotTo(BeNil()) routegwv4 = net.ParseIP("1.2.3.5") Expect(routegwv4).NotTo(BeNil()) ipgw4 = net.ParseIP("1.2.3.1") Expect(ipgw4).NotTo(BeNil()) ipv6, err = types.ParseCIDR("abcd:1234:ffff::cdde/64") Expect(err).NotTo(HaveOccurred()) Expect(ipv6).NotTo(BeNil()) _, routev6, err = net.ParseCIDR("1111:dddd::aaaa/80") Expect(err).NotTo(HaveOccurred()) Expect(routev6).NotTo(BeNil()) routegwv6 = net.ParseIP("abcd:1234:ffff::10") Expect(routegwv6).NotTo(BeNil()) ipgw6 = net.ParseIP("abcd:1234:ffff::1") Expect(ipgw6).NotTo(BeNil()) result = ¤t.Result{ Interfaces: []*current.Interface{ { Name: "eth0", Mac: "00:11:22:33:44:55", Sandbox: "/proc/3553/ns/net", }, { Name: "fake0", Mac: "00:33:44:55:66:77", Sandbox: "/proc/1234/ns/net", }, }, IPs: []*current.IPConfig{ { Version: "4", Interface: current.Int(0), Address: *ipv4, Gateway: ipgw4, }, { Version: "6", Interface: current.Int(0), Address: *ipv6, Gateway: ipgw6, }, }, Routes: []*types.Route{ {Dst: *routev4, GW: routegwv4}, {Dst: *routev6, GW: routegwv6}, }, } }) AfterEach(func() { Expect(originalNS.Close()).To(Succeed()) }) It("configures a link with addresses and routes", func() { err := originalNS.Do(func(ns.NetNS) error { defer GinkgoRecover() err := ConfigureIface(LINK_NAME, result) Expect(err).NotTo(HaveOccurred()) link, err := netlink.LinkByName(LINK_NAME) Expect(err).NotTo(HaveOccurred()) Expect(link.Attrs().Name).To(Equal(LINK_NAME)) v4addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) Expect(len(v4addrs)).To(Equal(1)) Expect(ipNetEqual(v4addrs[0].IPNet, ipv4)).To(Equal(true)) v6addrs, err := netlink.AddrList(link, syscall.AF_INET6) Expect(err).NotTo(HaveOccurred()) Expect(len(v6addrs)).To(Equal(2)) var found bool for _, a := range v6addrs { if ipNetEqual(a.IPNet, ipv6) { found = true break } } Expect(found).To(Equal(true)) // Ensure the v4 route, v6 route, and subnet route routes, err := netlink.RouteList(link, 0) Expect(err).NotTo(HaveOccurred()) var v4found, v6found bool for _, route := range routes { isv4 := route.Dst.IP.To4() != nil if isv4 && ipNetEqual(route.Dst, routev4) && route.Gw.Equal(routegwv4) { v4found = true } if !isv4 && ipNetEqual(route.Dst, routev6) && route.Gw.Equal(routegwv6) { v6found = true } if v4found && v6found { break } } Expect(v4found).To(Equal(true)) Expect(v6found).To(Equal(true)) return nil }) Expect(err).NotTo(HaveOccurred()) }) It("configures a link with routes using address gateways", func() { result.Routes[0].GW = nil result.Routes[1].GW = nil err := originalNS.Do(func(ns.NetNS) error { defer GinkgoRecover() err := ConfigureIface(LINK_NAME, result) Expect(err).NotTo(HaveOccurred()) link, err := netlink.LinkByName(LINK_NAME) Expect(err).NotTo(HaveOccurred()) Expect(link.Attrs().Name).To(Equal(LINK_NAME)) // Ensure the v4 route, v6 route, and subnet route routes, err := netlink.RouteList(link, 0) Expect(err).NotTo(HaveOccurred()) var v4found, v6found bool for _, route := range routes { isv4 := route.Dst.IP.To4() != nil if isv4 && ipNetEqual(route.Dst, routev4) && route.Gw.Equal(ipgw4) { v4found = true } if !isv4 && ipNetEqual(route.Dst, routev6) && route.Gw.Equal(ipgw6) { v6found = true } if v4found && v6found { break } } Expect(v4found).To(Equal(true)) Expect(v6found).To(Equal(true)) return nil }) Expect(err).NotTo(HaveOccurred()) }) It("returns an error when the interface index doesn't match the link name", func() { result.IPs[0].Interface = current.Int(1) err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface(LINK_NAME, result) }) Expect(err).To(HaveOccurred()) }) It("returns an error when the interface index is too big", func() { result.IPs[0].Interface = current.Int(2) err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface(LINK_NAME, result) }) Expect(err).To(HaveOccurred()) }) It("returns an error when the interface index is too small", func() { result.IPs[0].Interface = current.Int(-1) err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface(LINK_NAME, result) }) Expect(err).To(HaveOccurred()) }) It("returns an error when there are no interfaces to configure", func() { result.Interfaces = []*current.Interface{} err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface(LINK_NAME, result) }) Expect(err).To(HaveOccurred()) }) It("returns an error when configuring the wrong interface", func() { err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface("asdfasdf", result) }) Expect(err).To(HaveOccurred()) }) It("does not panic when interface is not specified", func() { result = ¤t.Result{ Interfaces: []*current.Interface{ { Name: "eth0", Mac: "00:11:22:33:44:55", Sandbox: "/proc/3553/ns/net", }, { Name: "fake0", Mac: "00:33:44:55:66:77", Sandbox: "/proc/1234/ns/net", }, }, IPs: []*current.IPConfig{ { Version: "4", Address: *ipv4, Gateway: ipgw4, }, { Version: "6", Address: *ipv6, Gateway: ipgw6, }, }, } err := originalNS.Do(func(ns.NetNS) error { return ConfigureIface(LINK_NAME, result) }) Expect(err).NotTo(HaveOccurred()) }) }) | Low | [
0.5259875259875261,
31.625,
28.5
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.