text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Q: Composer conflicts Magento 2 What is the best way on resolving git conflicts with composer.json and composer.lock . I have two extensions created from master installed through composer , one is approved to be merge , the other extension got the approved later on to be merged but while synchronizing files of master in the second extension got conflicts on those 2 files composer.json and composer.lock . Im using git, bitbucket , phpstorm for this . Is there any fix on this (i don`t want to delete that branch and create a new one from master and install the second extension again. I want to fix the conflicts. ) ? A: Managed to fix the problem by comparing composer.lock and composer.json that has conflict with the composer.lock and composer.json of master. Took the rows i need to commit . Did a git push and now the conflict is gone .
Mid
[ 0.584415584415584, 28.125, 20 ]
This page is an archive. The contents have been moved from another page for reference purposes only, and should be preserved in their current form. Discussion or voting on this page is not current. Any additions you make will probably not be read. The current version of this page can be found at Uncyclopedia:Conservation Week. Zim (Invader Zim) page - Finished rewriting it on 22:18, July 14, 2010 after a few days. I may edit it some more afterwards though... Was also moved from the page Invader ZIM to Zim (Invader Zim) Pikachu page - Finished rewriting it on 1:02, July 18, 2010 after a few days. Pikachurized the better, updated way with an actual pikachu-related subjet. I previously put an unfinished version on pee reviews. Uncyclopedia:Pee Review/Pikachu Much better nonesense than it was 5 days ago in the nonesense template/catagory. Angel page - Done on 16:04, July 15, 2010 after a few minutes of tweaking. Hopefully people will be able to understand the "ever-so great" subjet of obese and cute angels in the Mathematic world this time. Dr. Nefarious - Finished rewriting one of the funniest, if not the best article I ever read in my opinion. (I made it even better than when I laughed my ass off the first time I read it.) 6:37, July 17, 2010. In the process of updating, spell/grammer checking, linking, rewriting (cutting the gay refrences by half (if possible))...and putting on the last coats of non-pink, purple paint. Gir page - Unfinished. Sadley the page is a peice of choclate muffin shit and is in dire need of the truth... Its to random in other words. Johnny the Homicidal Maniac - Unfinished. "Oh, I'll be sure to kill the stupidity on that fucking article you call, AN ARTICLE!? Whats that Nail Bunny, why of course I'll be nice you damn, DAMN... I'll be right back to let you know what I did. I'll be back once I do my job. You'll be sure I will. You will be SURE...". Martin Scorsese While the current article is actually pretty decent, I've had an angle for a while now I think might be pretty funny UnPoetia:Paradise Abridged I also plan on fixing this up a bit per Saberwolf's pee advice during the week(s) in question - Using my butter judgement, I can't allow this one to be counted as a rewrite as you just wrote it and had it pee reviewed. Sorry, Guildy. MegaPleb•Dexter111344•Complain here 22:37, July 1, 2010 (UTC) Actually I'm probably going to dump that as a rewrite as it's not that bad, if a little listy. When I said I'd do that one I was just stuffing around and trying to see if there was an article of that name. There are more deserving of rewrite articles out there. • Puppy's talk page • 00:40, June 5, 2009Monday, 03:21, Jul 5 2010 UTC What do you mean bad stuff... this was one of the first articles ive ever read and its basically why i joined uncyclopedia...i mean he deleted all the facts about canadians and a whole little motion picture thing near the bottom...its been like that for months, and noones complained about it. ROFL - I was in the process of removing a ton of shit and vanity from this article when I discovered a great intro which I hope to expand on. —Pelozurian(talk)03:07, 5 July 2010 (UTC) Disregard that I suck cocks. —fj0j3ddjoaw;rfjaew(r30qjd)08:23, 15 July 2010 (UTC)
Low
[ 0.49492385786802, 24.375, 24.875 ]
Don't flatter yourself. It's not about you, it's about him. It's about his ego. It's his desire to gather as many experiences as he can. It's his loneliness. It's his emptiness. It's for his entertainment. He needs someone to fixate on like a drug. That's how empty he must be. Correct me if I'm wrong, but you're always available, aren't you? You're within his reach?He always gets to see you and talk to you without effort or difficulty from his end? I repeat, it's not about you. It's about his convenience. Follow your intuition. Do not, in any way, believe his stories without probing. He's a good plotter. He will take advantage of your trust. I've always doubted his stories, always been curious of how his versions change from time to time, always have had a nagging feeling that something is not right, but I chose to keep my mouth shut. I chose not to ask. I chose to blindly trust. I chose to shut off my intuition. I chose to ignore that little voice screaming: "He's lying!!!". Follow your gut feeling. When something's amiss, it's because he's leaving out the truth. Do not make the same mistake that I did---do not choose to be silent to avoid argument. Do not turn a blind eye because you don't want things to get awkward. Your silence will not change anything. Do not consider his feelings, because he never and will never consider yours. Give him a hard time. Don't be always available when he needs you. Don't always answer his texts (he seldom calls because, you bet...he's always out of cash). Be busy with other things so you will see if he's determined enough to keep up with you. Challenge him. Make him chase you. Don't stroke his ego by making him your priority. You've got better things to do with your time, believe you me. Don't lend him money. Not because you want to be ruthless, but because that's the right thing to do. Teach him to be responsible with his finances. Make him desperate to get out of the rat race that he's in. (If you've lent him, list it down. He's got selective amnesia). While we're on the subject of money, don't let him know that you have money. Consider this as a word of caution from a concerned citizen. This time, it is not about him, it's about you. It's about us women putting an end to all scumbags. He will overwhelm you with praises and compliments. Know that you are already beautiful and you don't need his sweet nothings to make you feel better. He needs it to make himself feel better. He will tell you you've changed him. You made him better. Remember this: he will not change unless he wants to. You've got nothing to do with it. Nothing at all. Don't be impressed with the trivia he will throw at you. There's Google if you want to know facts. Ask him about practical things instead. "How much money have you saved up so far?" and wait to be impressed...or not by the answer. You will not live nor survive with the knowledge he's got from books. But, your life will be saved by practicality and wisdom. Those are what you should be seeking. He will promise you the sun, the moon, the stars and what-have-yous. He will try to sweep you off your feet. He will make up stories to capture your heart (how miserable his life is, how much he's sacrificed for his loved ones, how different he is from your exes, and all those bullshit. by the way, the last one is true. he'll be different from your ex. he'll be worse, that i know for sure). I'll leave it to you to choose your own entertainment. Just don't believe his story of heroism and valor. Most of them are made up or exaggerated. Ask him to define big words he often use, e.g. lifetime, forever, promise, other half. He's got his own definition. He doesn't understand the weight of the words he's using. If for some mind boggling reason due to unforeseen circumstances maybe, hes' finally made you fall for him (this letter is way too late, I know) don't you ever, ever, ever, ever, ever, EVER leave his sight or go somewhere far for quite a long time. He will need you to guide him (he's got no backbone, honey). Plus, he's quick to forget things...you and the promises he's told you included. To avoid disappointment, do not expect him to be there when you need him the most. He'll be busy flirting and fixating on someone else. Thus, he'll have no time to the less important things---your emotional turmoil, your tribulations, your "inner struggle". He will just tell you, "That's your own personal battle. I've got nothing to do with it. I can't help you there anymore." If he's too careless again and forget to log out and you happen to see his message exchange with his ex, ask him to open his messages in front of you. Or ask him about his ex. Don't be surprised if he tells you his mail notification has gone haywire or that he is not communicating with his ex anymore. I'll leave it to you how you will respond or react to this outright denial. If you catch him reading your messages, don't expect him to apologize. He will justify it. If you're confused, angry at me (perhaps because I didn't warn you earlier), or you just want to rub it on my face that he chose you (oh, please. don't make me laugh), feel free to drop me an email. I'd love to help you out. If one day you will find yourself left in the cold, fixing your broken heart and desperately trying to regain your self-worth, don't say I didn't warn you. I maybe too late (the inspiration just struck today), but I did warn you. And don't expect him to apologize. He did it for the greater good. You owe him one. Please---and I say this with all sincerity, be smarter than I was then. Sincerely, The Girl Who's Been There Done That P. S. He will try to act tough or valiant. He will make a speech. When he does, tell him to go see me in person. That's when you'll see how tough he really is. P.P.S. If you're in it because you also need him for your own convenience (i.e. you're using him as he's using you), please disregard this letter. I wish someone had gotten this knowledge through to my sister... sigh. Our entire family would be better off. But, I am glad you can now be free and comfortable enough to be straightforward with it all. I love this! I can't tell you how many times I wished I could have gone back and told myself, "Walk away NOW." I stayed in bad relationships way too long out of personal insecurity. Someone once had a fortune cookie that I found WAY profound: "Don't let go too soon. Don't hang on too long." The tricky part is you don't know the difference when you're in it. Hindsight is 20/20! Sounds like you have gained a lot of wisdom in the pain. So true about the compulsion to collect women to fill the void. I have a girlfriend that is empty and shops. So that really caught my attention!
Low
[ 0.489443378119001, 31.875, 33.25 ]
FOR any addict, the first step to recovery is making the decision to change. And for a drug addict, it is the beginning of what will be a long, painful, but ultimately rewarding journey. When actress Melanie Griffith checked into a clinic last November, she declared she was ready to take that route. Bravely, she also decided do so in public. Through her own website, she has charted her battle to beat her addiction to sleeping pills and painkillers. She also has a message board where she replies to pleas for help and expressions of support. She is just one of many big-name stars - and even more ordinary people in the UK - who have found that their addiction has been fuelled entirely innocently. In fitness-crazy Hollywood, sports injuries are common. Griffith, Matthew Perry, James Brown and Johnny Cash say injuries started them off on prescribed sleeping pills or painkillers. Michael Jackson, NFL superstar Brett Favre and Cindy McCain, wife of Senator John McCain, have also had addictions. Without realising it, people can easily become addicted after suffering a genuine problem. One expert says 12 per cent of those using strong painkillers become hooked on them. Of course, if any substance can create feel-good highs, there will always be people ready to abuse it. Hollywood is gripped by a new addiction epidemic. The painkillers (Vicodin, Percodan, and Percocet) and tranquillisers (Xanax, Ativan and Valium) have replaced cocaine and heroin as the trendy drugs. These pills have become fashionable and socially acceptable because they are legal and easy to obtain. They don't make you twitch and you don't get arrested. Rap star Eminem even has a tattoo of a Vicodin pill on his left arm. The drugs have become so accepted that bowls of them are served at parties. On party-goer said: "It isn't like the old drug parties where everyone's off in their own world. You can listen to music, eat dinner and talk. If you didn't know people were doing this stuff, you'd never guess. "Vikes (Vicodin) are like smoking a joint. You go home, sleep well and on Monday morning, you feel great. No hangover." But the dangers posed by the misuse of painkillers or tranquillisers are just as real as those associated with illegal drugs. An overdose can be fatal or may damage the liver or kidneys. They are also addictive. Regular users require bigger doses in pursuit of their buzz - and this produces unpleasant and distressing side-effects, such as extreme anxiety, depression, palpitations and even hallucinations when the supply is cut off. So what about the thousands of people in this country addicted to painkillers and tranquillisers through no fault of their own? They are the ones who, many years ago, were prescribed these drugs by their GPs for pain, panic attacks or sleepless nights and had the dosage repeated, or upped, until the cycle of dependency became unbearable. Former teacher Mavis Strudwick, 70, now lives on Orkney. Like many other people, she began to take an interest in environmental issues in the late Seventies. She was passionate about protecting the planet, but became increasingly emotional about the subject. She said: "I kept getting upset and started having anxiety attacks." Mavis was living in England and her then doctor prescribed the tranquilliser Ativan. Mavis said: "The attacks weren't that bad. If I had been given advice about relaxation techniques, which I'm using now, that would have been all I needed." That's what would happen now if someone consults their GP about anxiety. Unfortunately for Mavis, and many others, this was not the approach 30 years ago. She said: "I began to feel that I couldn't function without Ativan each day. I ended up taking it for 20 years." The irony for Mavis was that the symptoms she had been prescribed Ativan for had become a side-effect of taking the drug. She said: "I had dreadful episodes of panic and I was virtually hysterical sometimes. I was in an appalling state in the supermarket one day and my husband Frank had to help me out." The couple decided she needed help to get off Ativan. Mavis said: "There ar programmes to help people off illegal drugs and alcohol, but there seemed nothing for people addicted to prescribed drugs." Then Mavis discovered the Council for Involuntary Tranquilliser Addiction (CITA).She said: "You can't do this yourself. The withdrawal must be gradual and you need people to guide you. CITA were marvellous. "Withdrawing from the tranquillisers was hell. You suffer from tremors, hallucinations and depression, but CITA were always on the phone telling me I'd get through it." Mavis began her recovery on October 17, 1997 and by the end of August 1999, she was off Ativan and was taking a little Valium." But sadly, as Mavis grew stronger, Frank become ill and died. Now on her own, Mavis feels that there is no follow-up service for people like her. She said: "I had to phone an organisation in Liverpool for help. I can't consider myself completely recovered, I still have problems,though I'm learning to cope." Mavis is not considered disabled and can't claim benefit help. But that may change. Last October, a conference of scientists and campaigners demanded a change in the use of the tranquilliser drugs known as benzodiazepines (which includes Ativan and Valium). Some believe that the manufacturers have known for years these drugs have dangerous side-effects and there is now a campaign for compensation. In the meantime, there is help there for people who are addicted to prescription drugs. Organisations such as Benzo or CITA have a vital role to play for those who are addicted. But a doctor's help is vital and should always be a first port of call. That is after doing what Melanie Griffith recommends: "Decide to take control of your life."
Mid
[ 0.595744680851063, 31.5, 21.375 ]
<?php namespace Drupal\Tests\tour\Functional\Rest; use Drupal\Tests\rest\Functional\EntityResource\EntityResourceTestBase; use Drupal\tour\Entity\Tour; abstract class TourResourceTestBase extends EntityResourceTestBase { /** * {@inheritdoc} */ public static $modules = ['tour']; /** * {@inheritdoc} */ protected static $entityTypeId = 'tour'; /** * @var \Drupal\tour\TourInterface */ protected $entity; /** * {@inheritdoc} */ protected function setUpAuthorization($method) { $this->grantPermissionsToTestedRole(['access tour']); } /** * {@inheritdoc} */ protected function createEntity() { $tour = Tour::create([ 'id' => 'tour-llama', 'label' => 'Llama tour', 'langcode' => 'en', 'module' => 'tour', 'routes' => [ [ 'route_name' => '<front>', ], ], 'tips' => [ 'tour-llama-1' => [ 'id' => 'tour-llama-1', 'plugin' => 'text', 'label' => 'Llama', 'body' => 'Who handle the awesomeness of llamas?', 'weight' => 100, 'attributes' => [ 'data-id' => 'tour-llama-1', ], ], ], ]); $tour->save(); return $tour; } /** * {@inheritdoc} */ protected function getExpectedNormalizedEntity() { return [ 'dependencies' => [], 'id' => 'tour-llama', 'label' => 'Llama tour', 'langcode' => 'en', 'module' => 'tour', 'routes' => [ [ 'route_name' => '<front>', ], ], 'status' => TRUE, 'tips' => [ 'tour-llama-1' => [ 'id' => 'tour-llama-1', 'plugin' => 'text', 'label' => 'Llama', 'body' => 'Who handle the awesomeness of llamas?', 'weight' => 100, 'attributes' => [ 'data-id' => 'tour-llama-1', ], ], ], 'uuid' => $this->entity->uuid(), ]; } /** * {@inheritdoc} */ protected function getNormalizedPostEntity() { // @todo Update in https://www.drupal.org/node/2300677. } /** * {@inheritdoc} */ protected function getExpectedCacheContexts() { return [ 'user.permissions', ]; } /** * {@inheritdoc} */ protected function getExpectedUnauthorizedAccessMessage($method) { if ($this->config('rest.settings')->get('bc_entity_resource_permissions')) { return parent::getExpectedUnauthorizedAccessMessage($method); } return "The following permissions are required: 'access tour' OR 'administer site configuration'."; } }
Mid
[ 0.581497797356828, 33, 23.75 ]
During DNA biosynthesis, ribonucleoside diphosphates are converted into their deoxyribonucleoside equivalents via the enzymatic activity of ribonucleotide reductase (class I--III)^[@R8]^. Crucially, a (3′,2′)-spin center shift occurs, resulting in β-C--O scission and elimination of water ([Fig. 1a](#F1){ref-type="fig"}). Considering the efficiency of this mild enzymatic process to cleave C--O bonds to generate transient radicals, we postulated whether an analogous chemical process could occur with simple alcohols, such as methanol, to access radical intermediates for use in challenging bond constructions ([Fig. 1b](#F1){ref-type="fig"}). In the medicinal chemistry community, there is growing demand for the direct introduction of alkyl groups -- especially methyl groups -- to heteroarenes, given their influence on drug metabolism and pharmacokinetic profiles^[@R9]^. The open-shell addition of alkyl radical intermediates to heteroarenes, known as the Minisci reaction^[@R10]^, has become a mainstay transformation with broad application within modern drug discovery^[@R11]^. Unfortunately, many current methods are limited in their application to late-stage functionalization of complex molecules due to their dependence upon the use of strong stoichiometric oxidants or elevated temperatures to generate the requisite alkyl radicals^[@R3]--[@R6]^. DiRocco and coworkers recently demonstrated a photoredox-catalyzed alkylation protocol using peroxides as the alkyl radical precursors^[@R7]^. Given the state of the art, we recently questioned whether a general alkylation protocol could be devised in which a broad range of substituents could be installed from simple commercial alcohols under mild conditions. Visible light-mediated photoredox catalysis has emerged in recent years as a powerful technique in organic synthesis that facilitates single-electron transfer (SET) events with organic substrates^[@R12]--[@R14]^. This general strategy allows for the development of bond constructions that are often elusive or currently impossible via classical two-electron pathways. Recently, our laboratory introduced a novel dual photoredox-organocatalytic platform to enable the functionalization of unactivated *sp*^3^-C--H bonds^[@R15]--[@R17]^. This catalytic manifold provides access to radical intermediates via C--H abstraction, resulting in the construction of challenging C--C bonds via a radical--radical coupling mechanism. With the insight gained from this dual catalytic system and our recent work on the development of a photoredox-catalyzed Minisci reaction^[@R18]^, we questioned whether it would be possible to generate alkyl radicals from alcohols and employ them as alkylating agents in a heteroaromatic C--H functionalization reaction ([Fig. 1c](#F1){ref-type="fig"}). While there are a few early reports of alcohols as alkyl radical precursors formed via high-energy irradiation (UV light and gamma rays)^[@R19]--[@R21]^, a general and robust strategy for using alcohols as latent alkylating agents has been elusive. This transformation would represent a direct C--H alkylation of heteroaromatics with alcohols via a spin-center shift pathway, eliminating H~2~O as the only byproduct. We recognized that this mild alkylating procedure would serve as a powerful and general method in late-stage functionalization, using commercially available and abundant alcohols as latent alkylating agents. A detailed description of our proposed dual catalytic mechanism for the alkylation of heteroarenes with alcohols is outlined in [Fig. 2](#F2){ref-type="fig"}. Irradiation of Ir(ppy)~2~(dtbbpy)^+^ (**1**) (ppy = 2-phenylpyridine, dtbbpy = 4,4′-di-*tert*-butyl-2,2′-bipyridine) will generate the long-lived ^\*^Ir(ppy)~2~(dtbbpy)^+^ (**2**) excited state (τ = 557 ns)^[@R22]^. As ^\*^Ir(ppy)~2~(dtbbpy)^+^ (**2**) can function as a reductant or an oxidant, we postulated that **2** would undergo a single-electron transfer event with a sacrificial quantity of protonated heteroarene **3** to initiate the first catalytic cycle and provide the oxidizing Ir(ppy)~2~(dtbbpy)^2+^ (**4**). Given the established oxidation potential of Ir(ppy)~2~(dtbbpy)^2+^ (**4**) \[*E*~1/2~^red^ = +1.21 V vs. saturated calomel electrode (SCE) in CH~3~CN\]^[@R22]^, we anticipated that single-electron transfer (SET) from the thiol catalyst **5** (*E*~1/2~^red^ = +0.85 V vs. SCE for cysteine)^[@R23]^ to Ir(ppy)~2~(dtbbpy)^2+^ (**4**) would occur and, after deprotonation, furnish the thiyl radical **6** while returning Ir(ppy)~2~(dtbbpy)^+^ (**1**) to the catalytic cycle. At this stage, we presumed that the thiyl radical **6** would undergo hydrogen atom transfer with the alcohol **7** (a comparable thiol, methyl 2-mercaptoacetate S--H BDE = 87 kcal/mol^[@R24]^, MeOH α-C--H BDE = 96 kcal/mol^[@R25]^) to provide the α-oxy radical **8** and regenerate the thiol catalyst **5**, driven by the polar effect in the transition state^[@R26]^. The polar effect is a remarkable property that enables significantly endergonic C--H abstractions that would not be possible otherwise^[@R27]^. The nucleophilic α-oxy radical **8** would then add to the protonated electron-deficient 00heteroarene **3** in a Minisci-type pathway to afford the aminyl radical cation **9**. The resulting α-C--H bond of **9** is sufficiently acidic to undergo deprotonation to form the α-amino radical **10**^[@R28]^. At this juncture, intermediate **10** is primed to undergo a spin-center shift to eliminate H~2~O and generate benzylic radical **11**. The resulting open-shell species would then undergo protonation followed by a second SET event with the excited photocatalyst to regenerate the active oxidant Ir(ppy)~2~(dtbbpy)^2+^ (**4**) while providing desired alkylation product **12**. We first examined this new alkylation protocol using isoquinoline and methanol as the coupling partners and evaluated a range of photocatalysts and thiol catalysts. We were pleased to discover that using Ir(ppy)~2~(dtbbpy)PF~6~ (**1**) and ethyl 2-mercaptopropionate (**5**), along with *p*-toluenesulfonic acid and blue LEDs as the light source, we were able to achieve the desired C--C coupling to provide 1-methylisoquinoline (**15**) in 92% yield (see [Supplementary Information](#SD1){ref-type="supplementary-material"}). Importantly, we observed none of the desired product in the absence of photocatalyst, thiol catalyst, acid, or light, demonstrating the requirement of all components in this dual catalytic protocol. Notably, this method requires only weak visible light and ambient temperature to install methyl substituents using methanol as the alkylating agent. With the optimal conditions in hand, we sought to evaluate the generality of this dual catalytic alkylation transformation. As highlighted in [Fig. 3a](#F3){ref-type="fig"}, a wide range of heteroaromatics are methylated under the reaction conditions. Isoquinolines with electron-donating or -withdrawing substituents (such as methyl substituents, esters, and halides) are functionalized in excellent efficiencies (**15**--**18**, 85--98% yield). Quinolines perform effectively, including those that contain non-participating functionality (**19**--**23**, 65--95% yield), in addition to phthalazine and phenanthridine coupling partners (**24** and **25**, 70% and 93% yield). Moreover, a wide range of pyridine derivatives containing diverse functionality (such as esters, amides, arenes, nitriles, and trifluoromethyl groups) can be converted into the desired methylation products in high yield (**26**--**32**, 65--91% yield). Next, we sought to investigate the nature of the alcohol coupling partner, as demonstrated in [Fig. 3b](#F3){ref-type="fig"}. A broad array of primary alcohols can effectively serve as alkylating agents in this new alkylation reaction. In contrast to the methylation conditions highlighted above, alcohols in [Fig. 3b](#F3){ref-type="fig"} typically employ methyl thioglycolate **13** as the C--H abstraction catalyst. Importantly, simple aliphatic alcohols such as ethanol and propanol deliver the alkylated isoquinoline product in high yields (**33** and **34**, 95% and 96% yield). Steric bulk proximal to the alcohol functionality is tolerated, as exemplified by the presence of isopropyl, β-tetrahydropyran, β-aryl, and β-adamantyl substituents (**35--38**, 87--92% yield). The presence of an electron-withdrawing trifluoromethyl (CF~3~) group distal to the alcohol decreases the rate of the reaction; however, employing the more electrophilic thiol catalyst, 2,2,2-trifluoroethanethiol (**14**) can promote the transformation more efficiently, possibly due to the polar effect on the HAT transition state (**39**, 93% yield)^[@R26]^. To our delight, diols also participate readily in this alkylation protocol (**40** and **41**, 88% and 81% yield). It should be noted that 1,3-butanediol demonstrates exceptional chemoselectivity and undergoes alkylation exclusively at the primary alcohol site. We speculate that the corresponding α-oxy radical at the secondary alcohol position does not attack the protonated heteroarene due to its increased steric hindrance. For these alkylating agents with multiple reactive sites (**41**, **43**, and **44**), thiol catalyst **5** is the most effective HAT catalyst -- mechanistic studies are ongoing to elucidate the origin of these differences in catalyst reactivity. Ethers, in the form of differentially substituted tetrahydrofurans, are also competent alkylating agents in this dual catalytic platform (**42**--**44**, 72--90% yield). In the elimination step, the tetrahydrofuran ring opens to reveal a pendent hydroxyl group. Interestingly, 3-hydroxytetrahydrofuran and tetrahydrofurfuryl alcohol react regioselectively at the ether α-oxy site distal to the alcohol to afford alkylation products with terminal pinacol motifs. We attribute this exclusive regioselectivity to a subtle influence on C--H BDE due to the inductive influence of the oxygen atoms. The application of these substrates represents an effective method to install vicinal diol motifs that would be inaccessible using traditional oxidative alkylation methods. Finally, the utility of this mild alkylation protocol has been demonstrated by the late-stage functionalization of several pharmaceutical compounds. Using methanol as a simple methylating agent, fasudil, a potent Rho-associated protein kinase inhibitor and vasodilator, can be methylated in 82% yield (product **45**). Additionally, milrinone, a phosphodiesterase 3 inhibitor and vasodilator, can be alkylated with 3-phenylpropanol in 43% yield (product **46**). Mechanistic studies have been conducted to support the proposed pathway outlined in [Fig. 2](#F2){ref-type="fig"}. Stern--Volmer fluorescence quenching experiments have demonstrated that the \*Ir^III^ excited state **2** is quenched in the presence of protonated heteroarene **3**, but not in the presence of the unprotonated heteroarene or thiol catalyst **5**, implying an oxidative quenching pathway (see [Supplementary Information](#SD1){ref-type="supplementary-material"}). Additionally, a series of experiments were conducted to investigate the proposed spin-center shift elimination. Upon exposing hydroxylated intermediate **47** to the reaction conditions, only a modest amount of the methylated isoquinoline **15** is observed (8% yield, entry 1, [Fig. 4a](#F4){ref-type="fig"}). In the absence of an acid additive, only trace yields of the desired product is formed (2% yield, entry 2, [Fig. 4a](#F4){ref-type="fig"}). However, in the presence of a stoichiometric reductant and *p*-toluenesulfonic acid, the elimination of oxygen can be achieved in good efficiency (60% yield, entry 3, [Fig. 4a](#F4){ref-type="fig"}). Crucially, this elimination pathway is shut down in the absence of either light or photo-catalyst (entries 4 and 5, [Fig. 4a](#F4){ref-type="fig"}). Therefore, this net reductive process supports the proposed generation of α-amino radical **48**, which could readily form deoxygenated product **15** via a spin-center shift pathway to β-amino radical **49** ([Fig. 4b](#F4){ref-type="fig"}). This elimination pathway is further corroborated by a series of radical trapping experiments ([Fig. 4c](#F4){ref-type="fig"} and [SI](#SD1){ref-type="supplementary-material"}). In the presence of styrene, hydroxymethyl arene **47** is transformed to adduct **50** ([Fig. 4c](#F4){ref-type="fig"}, 65% yield), presumably via the intermediacy of β-amino radical **49**. Finally, while we support the mechanism outlined in [Figure 2](#F2){ref-type="fig"}, we cannot rule out the possibility of a radical chain pathway in which radical **11** abstracts an H-atom from alcohol **7** or thiol catalyst **5**. In summary, this alkylation strategy represents the first general use of alcohols as simple alkylating agents and enables rapid late-stage derivatization of medicinally relevant molecules. Given the influence on drug pharmacokinetics and ADME properties, this method of installing inert alkyl groups will likely find wide application in the medicinal chemistry community. We have developed a mild and operationally simple alkylation reaction via the synergistic merger of photoredox and thiol HAT organocatalysis to forge challenging heteroaryl C--C bonds using alcohols as latent nucleophiles. This bio-inspired strategy mimics the key step in enzyme-catalyzed DNA biosynthesis via a novel spin-center shift elimination of H~2~O to generate radical intermediates from simple alcohols. Supplementary Material {#S1} ====================== Financial support was provided by NIHGMS (R01 GM103558-03) and kind gifts from Merck and Amgen. J.J. thanks Jack A. Terrett for assistance in preparing this manuscript. [Supplementary Information](#SD1){ref-type="supplementary-material"} is linked to the online version of the paper at [www.nature.com/nature](www.nature.com/nature). **Author Contributions** J.J. performed and analyzed experiments. J.J. and D.W.C.M. designed experiments to develop this reaction and probe its utility, and also prepared this manuscript. The authors declare no competing financial interests. Readers are welcome to comment on the online version of this article at [www.nature.com/nature](www.nature.com/nature). ![Bio-inspired alkylation process using alcohols as spin-center shift equivalents via a dual catalytic platform\ (**a**) DNA biosynthesis occurs via a spin-center shift (SCS) process, catalyzed by ribonucleotide reductase (RNR) class I to generate a carbon-centered radical. (**b**) Alcohols as radical intermediates when SCS-allowed. (**c**) Proposed direct installation of alkyl groups using alcohols under mild photoredox organocatalytic conditions.](nihms703713f1){#F1} ![Proposed mechanism for the direct alkylation of heteroaromatic C--H bonds via photoredox organocatalysis\ The catalytic cycle is initiated via excitation of photocatalyst **1** to give the excited state **2**. A sacrificial amount of heteroarene **3** oxidizes ^\*^Ir^III^ **2** to Ir^IV^ **4**, which then oxidizes thiol catalyst **5** to generate thiyl radical **6** and regenerate catalyst **1**. Thiyl radical **6** then abstracts a hydrogen atom from alcohol **7** to form α-oxy radical **8**. Radical **8** adds to heteroarene **3**, producing radical cation **9**, which after deprotonation forms α-amino radical **10**. Spin-center shift elimination of H~2~O forms radical intermediate **11**. Protonation and reduction by ^\*^Ir^III^ **2** delivers alkylated product **12**.](nihms703713f2){#F2} ![Substrate scope for the alkylation of heteroaromatic C--H bonds with alcohols via the dual photoredox organocata-lytic platform\ A broad range of heteroaromatics and alcohols are efficiently coupled to produce alkylated heterocycles under the standard reaction conditions (top, generalized reaction). (**a**) A variety of isoquinolines, quinolines, phthalazines, phenanthridines, and pyridines are efficiently methylated using methanol as the alkylating reagent. (**b**) A diverse selection of alcohols serve as effective alkylating agents in this dual catalytic protocol. (**c**) Ethers are also amenable to the transformation -- the products are the corresponding ring opened alcohols. (**d**) Two pharmaceuticals, fasudil and milrinone, can be alkylated using this protocol, demonstrating its utility in late-stage functionalization. Isolated yields are indicated below each entry. See [Supplementary Information](#SD1){ref-type="supplementary-material"} for experimental details.](nihms703713f3){#F3} ![Mechanistic studies support spin-center shift elimination pathway\ (**a**) Hydroxymethyl intermediate **47** can be converted to methylated **15** under net reductive conditions upon addition of formic acid-tributylamine and *p*-toluenesulfonic acid. (**b**) Deoxygenation of **47** likely proceeds via a spin-center shift pathway to cleave the alcohol C--O bond. (**c**) In the presence of styrene, **47** is converted to **50**, presumably by trapping of radical **49**.](nihms703713f4){#F4}
Mid
[ 0.6337662337662331, 30.5, 17.625 ]
In the prior art, as FIGS. 1 to 4 show, a raised pattern is provided around ports 11 (fluid inlet and fluid outlet) of a heat exchange plate of a plate-type heat exchanger, to increase the strength of the plate-type heat exchanger and cause a larger pressure drop between the port 11 and a fluid channel, and thereby achieve better fluid distribution between fluid channels. With regard to the structural design of existing products, since the strength is low, it is necessary to make the plates relatively thick to increase strength, so costs are high. As FIG. 1 shows, existing raised patterns include a spider's web design, but such a raised pattern has low strength under certain conditions, and the layout is determined by a fish bone pattern of a heat exchange part. As FIG. 2 shows, the raised pattern shown in FIG. 2 is not limited by the pattern of the heat exchange part, but the protrusions are independent, so in certain situations, strength is low. The raised pattern shown in FIG. 3 is formed by cutting away a part of long protrusions; this raised pattern has low strength, and poor manufacturability. In addition, when the raised pattern formed by long protrusions shown in FIG. 4 is employed, the strength of the plate-type heat exchanger is low, and stresses are not borne uniformly. In the various types of structure above, there must be a section of plane flush with a basic plane between every two adjacent protrusions, i.e. a transitional part between two adjacent protrusion points is a lower plane. As a result, the distance between every two protrusions cannot be too small, so strength is limited and restrictions are increased.
Mid
[ 0.545816733067729, 34.25, 28.5 ]
Poetry Society The Poetry Society is a membership organisation, open to all, whose stated aim is "to promote the study, use and enjoyment of poetry". The Society was founded in London in February 1909 as the Poetry Recital Society, becoming the Poetry Society in 1912. Its first President was Lady Margaret Sackville. From its current Covent Garden, London, premises, The Poetry Society publishes Poetry Review, Britain's leading poetry magazine, which provides a forum for poems from both new and established poets. Its current Editor is the poet Emily Berry, who succeeded Maurice Riordan in 2017. The magazine's editor from 2005 to 2012 was Fiona Sampson. The Society organises several competitions, including the British National Poetry Competition, the Foyle Young Poets of the Year Award, The Popescu Prize, The Ted Hughes Award for New Work in Poetry and the Geoffrey Dearmer Award. The society also ran the Alice Hunt Bartlett Prize from 1986 to 1997. There is a Poetry Café on its Ground Floor, and performance space in the basement, rooms being available for hire. References External links Category:Poetry organizations Category:British writers' organisations Category:1909 establishments in the United Kingdom Category:Arts organizations established in 1909 Category:British poetry
High
[ 0.70204081632653, 32.25, 13.6875 ]
Related literature {#sec1} ================== For transition metal complexes with imino­phospho­ranyl derivatives, see: Avis *et al.* (1996[@bb1], 1997[@bb2]). For the catalytic activity of bis­(imino­phospho­ran­yl)methane and its derivatives, see: Hill & Hitchcock (2002[@bb4]); Ma *et al.* (2011[@bb5]). For the crystal structure of an analogous compound, see: Hill & Hitchcock (2002[@bb4]). Experimental {#sec2} ============ {#sec2.1} ### Crystal data {#sec2.1.1} C~35~H~30~N~4~P~2~*M* *~r~* = 568.57Monoclinic,*a* = 22.505 (7) Å*b* = 9.142 (3) Å*c* = 29.606 (9) Åβ = 102.877 (5)°*V* = 5938 (3) Å^3^*Z* = 8Mo *K*α radiationμ = 0.18 mm^−1^*T* = 293 K0.40 × 0.30 × 0.20 mm ### Data collection {#sec2.1.2} Bruker APEXII CCD area-detector diffractometerAbsorption correction: multi-scan (*SADABS*; Bruker, 2007[@bb3]) *T* ~min~ = 0.753, *T* ~max~ = 1.00016500 measured reflections6035 independent reflections4510 reflections with *I* \> 2σ(*I*)*R* ~int~ = 0.041 ### Refinement {#sec2.1.3} *R*\[*F* ^2^ \> 2σ(*F* ^2^)\] = 0.060*wR*(*F* ^2^) = 0.126*S* = 1.156035 reflections370 parametersH-atom parameters constrainedΔρ~max~ = 0.39 e Å^−3^Δρ~min~ = −0.28 e Å^−3^ {#d5e473} Data collection: *APEX2* (Bruker, 2007[@bb3]); cell refinement: *APEX2* and *SAINT* (Bruker, 2007[@bb3]); data reduction: *SAINT*; program(s) used to solve structure: *SHELXS97* (Sheldrick, 2008[@bb6]); program(s) used to refine structure: *SHELXL97* (Sheldrick, 2008[@bb6]); molecular graphics: *SHELXTL* (Sheldrick, 2008[@bb6]); software used to prepare material for publication: *SHELXTL* and *PLATON* (Spek, 2009[@bb7]). Supplementary Material ====================== Crystal structure: contains datablock(s) I, global. DOI: [10.1107/S1600536811037007/ez2257sup1.cif](http://dx.doi.org/10.1107/S1600536811037007/ez2257sup1.cif) Structure factors: contains datablock(s) I. DOI: [10.1107/S1600536811037007/ez2257Isup2.hkl](http://dx.doi.org/10.1107/S1600536811037007/ez2257Isup2.hkl) Supplementary material file. DOI: [10.1107/S1600536811037007/ez2257Isup3.cml](http://dx.doi.org/10.1107/S1600536811037007/ez2257Isup3.cml) Additional supplementary materials: [crystallographic information](http://scripts.iucr.org/cgi-bin/sendsupfiles?ez2257&file=ez2257sup0.html&mime=text/html); [3D view](http://scripts.iucr.org/cgi-bin/sendcif?ez2257sup1&Qmime=cif); [checkCIF report](http://scripts.iucr.org/cgi-bin/paper?ez2257&checkcif=yes) Supplementary data and figures for this paper are available from the IUCr electronic archives (Reference: [EZ2257](http://scripts.iucr.org/cgi-bin/sendsup?ez2257)). The authors are grateful for financial support from Applied and Basic Research Foundation of Yunnan Province (No. 2009CD154), Open Foundation of Key Laboratory of Ethnic Medicine Resource Chemistry, State Ethnic Affairs Commission & Ministry of Education, Yunnan University of Nationalities (No. MZY100101). Comment ======= Bis(iminophosphorany)methane and its derivatives are attracting much attention due to their flexible coordination behavior (Avis *et al.*, 1996, 1997) and the catalytic activity of their transition metal complexes (Hill & Hitchcock, 2002; Ma *et al.*, 2011).Herein, we report the crystal structure of a mono-phosphinimine, namely ((N-2-pyridylimino)diphenylphosphoranyl)(N-2-pyridyl-N-diphenylphosphinoamino) methane. In the crystal structure of the title compound, the (N-2-pyridylimino)diphenylphosphoranyl and the N-2-pyridyl-N-diphenylphosphinoamino groups are attached to the methyl with a P2---C6---N1 angle of 114.09 (2)°. The P2=N3 bond length of 1.593 (2) Å is comparable to that of P=N distances of 1.555 (3) and 1.573 (3) Å in bis(iminophosphorany)methane (Hill & Hitchcock, 2002). The molecules stack along the *b* axis and interconnect through C32---H32(pyridyl)···N2^i^(pyridyl) interactions (D···A 3.577 (3)Å, Table 1), forming an infinite chain. These parallel chains are further interconnected via C21---H21(benzene)··· N3^ii^(amino) and C28---H28(benzene)···Cg^iii^ interactions to form a three-dimensional framework (Cg represents the C7 to C12 benzene ring, Table 1). Symmetry codes: i: x, y+1, z; ii: x, -y-1, z-0.5; iii: -x, y-1, -z+0.5. Experimental {#experimental} ============ To a solution of 0.4g (0.1 mmol) N-((pyridin-2-ylamino)methyl)pyridind-2-amine in 40 ml CH~2~Cl~2~ at room temperature a solution of 0.45 g (0.2 mmol) chlorodiphenylphosphine in the presence of Et~3~N in 10 ml toluene was added dropwise, during which N~2~ gas evolved. After 2 h stirring the resultant yellow solution was evaporated, giving a white powder. The white powder was then separated and purified by column chromatography on silica gel (column of 2 cm diameter, eluent: dichloromethane/acetate = 95:5, v/v), and the title compound was obtained in 60% yield. Orange crystals of the title compound having average dimensions of 0.40 × 0.30 × 0.20 mm^3^ were obtained by slow evaporation from a solution of dichloromethane/*N,N*-dimethylformamide 1/1 (v/v). Refinement {#refinement} ========== The hydrogen atoms were placed in idealized positions and allowed to ride on the relevant carbon atoms, with C---H = 0.93 Å and 0.97 Å for aryl and methylene hydrogens, respectively. *U~iso~*(H) = 1.2*U~eq~*(C). Figures ======= ![The atom-numbering scheme of the title compound. Displacement ellipsoids are drawn at the 30% probability level and H atoms are omitted for clarity.](e-67-o2683-fig1){#Fap1} ![A view of the packing of the title compound. The red dashed lines represent C32---H32(pyridyl)···N2i(pyridyl) interactions that connect the molecules along the b axis (symmetry code: i: -x+1, -y, -z). The other interactions are omitted for clarity. Color codes: Green P, Blue N,Gray C.](e-67-o2683-fig2){#Fap2} Crystal data {#tablewrapcrystaldatalong} ============ ---------------------- -------------------------------------- C~35~H~30~N~4~P~2~ *F*(000) = 2384 *M~r~* = 568.57 *D*~x~ = 1.272 Mg m^−3^ Monoclinic, *C*2/*c* Mo *K*α radiation, λ = 0.71073 Å *a* = 22.505 (7) Å Cell parameters from 241 reflections *b* = 9.142 (3) Å θ = 2.1--26.3° *c* = 29.606 (9) Å µ = 0.18 mm^−1^ β = 102.877 (5)° *T* = 293 K *V* = 5938 (3) Å^3^ Block, orange *Z* = 8 0.40 × 0.30 × 0.20 mm ---------------------- -------------------------------------- Data collection {#tablewrapdatacollectionlong} =============== ------------------------------------------------------------ -------------------------------------- Bruker APEXII CCD area-detector diffractometer 6035 independent reflections Radiation source: fine-focus sealed tube 4510 reflections with *I* \> 2σ(*I*) graphite *R*~int~ = 0.041 ω scans θ~max~ = 26.3°, θ~min~ = 2.1° Absorption correction: multi-scan (*SADABS*; Bruker, 2007) *h* = −27→28 *T*~min~ = 0.753, *T*~max~ = 1.000 *k* = −11→9 16500 measured reflections *l* = −36→33 ------------------------------------------------------------ -------------------------------------- Refinement {#tablewraprefinementdatalong} ========== ------------------------------------- ------------------------------------------------------------------------------------------------- Refinement on *F*^2^ Primary atom site location: structure-invariant direct methods Least-squares matrix: full Secondary atom site location: difference Fourier map *R*\[*F*^2^ \> 2σ(*F*^2^)\] = 0.060 Hydrogen site location: inferred from neighbouring sites *wR*(*F*^2^) = 0.126 H-atom parameters constrained *S* = 1.15 *w* = 1/\[σ^2^(*F*~o~^2^) + (0.0394*P*)^2^ + 6.1976*P*\] where *P* = (*F*~o~^2^ + 2*F*~c~^2^)/3 6035 reflections (Δ/σ)~max~ \< 0.001 370 parameters Δρ~max~ = 0.39 e Å^−3^ 0 restraints Δρ~min~ = −0.28 e Å^−3^ ------------------------------------- ------------------------------------------------------------------------------------------------- Special details {#specialdetails} =============== ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Geometry. All esds (except the esd in the dihedral angle between two l.s. planes) are estimated using the full covariance matrix. The cell esds are taken into account individually in the estimation of esds in distances, angles and torsion angles; correlations between esds in cell parameters are only used when they are defined by crystal symmetry. An approximate (isotropic) treatment of cell esds is used for estimating esds involving l.s. planes. Refinement. Refinement of F^2^ against ALL reflections. The weighted R-factor wR and goodness of fit S are based on F^2^, conventional R-factors R are based on F, with F set to zero for negative F^2^. The threshold expression of F^2^ \> 2sigma(F^2^) is used only for calculating R-factors(gt) etc. and is not relevant to the choice of reflections for refinement. R-factors based on F^2^ are statistically about twice as large as those based on F, and R- factors based on ALL data will be even larger. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Fractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å^2^) {#tablewrapcoords} ================================================================================================== ----- --------------- ------------- -------------- -------------------- -- *x* *y* *z* *U*~iso~\*/*U*~eq~ P1 −0.01563 (3) 0.63607 (8) 0.14930 (2) 0.03712 (18) P2 0.16356 (3) 0.73616 (7) 0.14753 (2) 0.02853 (16) N1 0.05842 (8) 0.5832 (2) 0.15430 (7) 0.0323 (5) N2 0.11485 (10) 0.3691 (3) 0.17411 (7) 0.0408 (5) N3 0.15628 (10) 0.9082 (2) 0.13974 (7) 0.0357 (5) N4 0.14031 (12) 0.8766 (3) 0.05916 (7) 0.0501 (6) C1 0.08083 (10) 0.4717 (3) 0.18710 (8) 0.0320 (6) C2 0.06822 (12) 0.4749 (3) 0.23102 (9) 0.0411 (6) H2 0.0448 0.5498 0.2393 0.049\* C3 0.09084 (13) 0.3661 (4) 0.26186 (10) 0.0487 (7) H3 0.0828 0.3661 0.2914 0.058\* C4 0.12536 (14) 0.2572 (4) 0.24880 (10) 0.0550 (8) H4 0.1410 0.1817 0.2690 0.066\* C5 0.13608 (14) 0.2634 (4) 0.20499 (10) 0.0548 (8) H5 0.1595 0.1896 0.1961 0.066\* C6 0.09627 (10) 0.6230 (3) 0.12172 (8) 0.0320 (6) H6A 0.0713 0.6761 0.0960 0.038\* H6B 0.1101 0.5341 0.1094 0.038\* C7 −0.01288 (12) 0.8317 (3) 0.13863 (11) 0.0451 (7) C8 −0.01064 (15) 0.9233 (4) 0.17666 (13) 0.0719 (11) H8 −0.0121 0.8834 0.2053 0.086\* C9 −0.0062 (2) 1.0736 (5) 0.1719 (2) 0.110 (2) H9 −0.0043 1.1339 0.1975 0.132\* C10 −0.00475 (19) 1.1337 (5) 0.1302 (2) 0.113 (2) H10 −0.0017 1.2345 0.1273 0.135\* C11 −0.00772 (16) 1.0462 (5) 0.09285 (19) 0.0899 (14) H11 −0.0070 1.0877 0.0643 0.108\* C12 −0.01182 (13) 0.8961 (4) 0.09660 (13) 0.0601 (9) H12 −0.0139 0.8377 0.0706 0.072\* C13 −0.05681 (12) 0.5681 (3) 0.09276 (9) 0.0415 (6) C14 −0.03331 (15) 0.4781 (4) 0.06367 (11) 0.0565 (8) H14 0.0080 0.4557 0.0708 0.068\* C15 −0.07070 (19) 0.4202 (4) 0.02363 (12) 0.0731 (11) H15 −0.0541 0.3603 0.0042 0.088\* C16 −0.1314 (2) 0.4510 (5) 0.01285 (13) 0.0787 (12) H16 −0.1563 0.4120 −0.0138 0.094\* C17 −0.15543 (17) 0.5391 (5) 0.04118 (15) 0.0806 (12) H17 −0.1969 0.5602 0.0338 0.097\* C18 −0.11885 (14) 0.5978 (4) 0.08082 (12) 0.0607 (9) H18 −0.1360 0.6581 0.0998 0.073\* C19 0.17852 (10) 0.7135 (3) 0.20950 (8) 0.0297 (5) C20 0.21447 (11) 0.6004 (3) 0.23177 (8) 0.0373 (6) H20 0.2324 0.5353 0.2147 0.045\* C21 0.22379 (12) 0.5835 (4) 0.27910 (9) 0.0472 (7) H21 0.2477 0.5070 0.2939 0.057\* C22 0.19752 (14) 0.6807 (4) 0.30441 (9) 0.0545 (8) H22 0.2040 0.6698 0.3364 0.065\* C23 0.16185 (14) 0.7935 (4) 0.28284 (10) 0.0534 (8) H23 0.1442 0.8584 0.3002 0.064\* C24 0.15210 (12) 0.8109 (3) 0.23526 (9) 0.0403 (6) H24 0.1280 0.8874 0.2207 0.048\* C25 0.22768 (11) 0.6569 (3) 0.12830 (8) 0.0323 (6) C26 0.23091 (12) 0.5109 (3) 0.11729 (9) 0.0423 (7) H26 0.1993 0.4478 0.1195 0.051\* C27 0.28149 (14) 0.4588 (4) 0.10292 (10) 0.0559 (8) H27 0.2831 0.3611 0.0945 0.067\* C28 0.32934 (14) 0.5506 (4) 0.10102 (11) 0.0604 (9) H28 0.3637 0.5143 0.0923 0.072\* C29 0.32629 (14) 0.6950 (5) 0.11197 (12) 0.0644 (10) H29 0.3586 0.7570 0.1105 0.077\* C30 0.27536 (12) 0.7498 (4) 0.12529 (10) 0.0498 (7) H30 0.2732 0.8487 0.1322 0.060\* C31 0.14809 (12) 0.9659 (3) 0.09597 (8) 0.0365 (6) C32 0.14870 (16) 1.1179 (3) 0.09068 (10) 0.0561 (8) H32 0.1532 1.1783 0.1165 0.067\* C33 0.14268 (19) 1.1772 (4) 0.04781 (11) 0.0737 (11) H33 0.1427 1.2782 0.0440 0.088\* C34 0.1366 (2) 1.0861 (4) 0.01011 (11) 0.0878 (14) H34 0.1333 1.1235 −0.0196 0.105\* C35 0.1355 (2) 0.9390 (4) 0.01768 (10) 0.0770 (12) H35 0.1310 0.8776 −0.0079 0.092\* ----- --------------- ------------- -------------- -------------------- -- Atomic displacement parameters (Å^2^) {#tablewrapadps} ===================================== ----- ------------- ------------- ------------- -------------- -------------- -------------- *U*^11^ *U*^22^ *U*^33^ *U*^12^ *U*^13^ *U*^23^ P1 0.0288 (3) 0.0405 (4) 0.0426 (4) 0.0037 (3) 0.0091 (3) 0.0017 (3) P2 0.0308 (3) 0.0285 (4) 0.0267 (3) 0.0002 (3) 0.0074 (2) 0.0001 (3) N1 0.0263 (10) 0.0357 (13) 0.0360 (11) 0.0026 (9) 0.0094 (8) 0.0051 (9) N2 0.0424 (12) 0.0394 (14) 0.0400 (12) 0.0099 (11) 0.0078 (10) −0.0005 (10) N3 0.0459 (12) 0.0303 (12) 0.0310 (11) 0.0001 (10) 0.0089 (9) −0.0006 (9) N4 0.0818 (18) 0.0345 (14) 0.0315 (12) −0.0078 (13) 0.0071 (11) −0.0018 (10) C1 0.0263 (12) 0.0317 (14) 0.0379 (14) −0.0039 (11) 0.0066 (10) −0.0003 (11) C2 0.0362 (14) 0.0461 (18) 0.0442 (15) 0.0032 (13) 0.0159 (12) 0.0044 (13) C3 0.0500 (17) 0.056 (2) 0.0418 (16) −0.0007 (15) 0.0136 (13) 0.0111 (14) C4 0.0609 (19) 0.0467 (19) 0.0528 (18) 0.0083 (16) 0.0030 (15) 0.0159 (15) C5 0.0578 (18) 0.048 (2) 0.0556 (18) 0.0198 (16) 0.0067 (14) 0.0010 (15) C6 0.0301 (12) 0.0380 (15) 0.0281 (12) −0.0013 (11) 0.0070 (10) 0.0008 (11) C7 0.0306 (14) 0.0343 (16) 0.0661 (19) 0.0075 (12) 0.0013 (13) −0.0053 (14) C8 0.058 (2) 0.062 (2) 0.082 (2) 0.0150 (18) −0.0128 (18) −0.029 (2) C9 0.079 (3) 0.064 (3) 0.156 (5) 0.021 (2) −0.042 (3) −0.051 (3) C10 0.066 (3) 0.038 (2) 0.201 (6) −0.006 (2) −0.038 (3) 0.002 (3) C11 0.048 (2) 0.055 (3) 0.157 (4) 0.0017 (19) 0.003 (2) 0.035 (3) C12 0.0427 (17) 0.046 (2) 0.090 (3) 0.0077 (14) 0.0112 (16) 0.0131 (18) C13 0.0417 (15) 0.0305 (15) 0.0494 (16) −0.0043 (12) 0.0041 (12) 0.0082 (13) C14 0.0552 (18) 0.050 (2) 0.063 (2) −0.0137 (16) 0.0117 (15) −0.0091 (16) C15 0.099 (3) 0.059 (2) 0.060 (2) −0.030 (2) 0.014 (2) −0.0107 (18) C16 0.095 (3) 0.061 (3) 0.062 (2) −0.032 (2) −0.020 (2) 0.013 (2) C17 0.059 (2) 0.070 (3) 0.093 (3) −0.007 (2) −0.026 (2) 0.014 (2) C18 0.0442 (17) 0.054 (2) 0.076 (2) 0.0047 (15) −0.0049 (15) 0.0022 (17) C19 0.0283 (12) 0.0321 (14) 0.0286 (12) −0.0041 (10) 0.0059 (9) −0.0005 (10) C20 0.0334 (13) 0.0443 (17) 0.0342 (14) 0.0005 (12) 0.0073 (11) 0.0013 (12) C21 0.0410 (15) 0.057 (2) 0.0401 (15) −0.0001 (14) 0.0013 (12) 0.0097 (14) C22 0.0610 (19) 0.073 (2) 0.0270 (14) −0.0051 (18) 0.0056 (13) 0.0026 (15) C23 0.0640 (19) 0.061 (2) 0.0374 (16) 0.0020 (17) 0.0171 (14) −0.0099 (15) C24 0.0469 (15) 0.0382 (16) 0.0357 (14) 0.0028 (13) 0.0088 (12) −0.0018 (12) C25 0.0311 (12) 0.0385 (16) 0.0284 (12) 0.0005 (11) 0.0085 (10) 0.0032 (11) C26 0.0397 (14) 0.0426 (18) 0.0480 (16) 0.0052 (13) 0.0167 (12) 0.0013 (13) C27 0.0609 (19) 0.053 (2) 0.0583 (19) 0.0199 (17) 0.0230 (15) 0.0017 (15) C28 0.0475 (18) 0.085 (3) 0.0563 (19) 0.0178 (18) 0.0281 (15) 0.0078 (18) C29 0.0432 (17) 0.084 (3) 0.073 (2) −0.0059 (17) 0.0275 (16) 0.005 (2) C30 0.0432 (15) 0.0495 (19) 0.0613 (19) −0.0042 (14) 0.0211 (14) −0.0022 (15) C31 0.0419 (14) 0.0353 (16) 0.0309 (13) −0.0026 (12) 0.0050 (11) −0.0006 (11) C32 0.097 (2) 0.0338 (17) 0.0373 (16) −0.0079 (17) 0.0133 (16) −0.0033 (13) C33 0.133 (3) 0.0322 (18) 0.051 (2) −0.006 (2) 0.010 (2) 0.0100 (15) C34 0.167 (4) 0.055 (2) 0.0338 (18) −0.021 (3) 0.006 (2) 0.0096 (16) C35 0.146 (4) 0.049 (2) 0.0304 (16) −0.021 (2) 0.0057 (18) −0.0011 (15) ----- ------------- ------------- ------------- -------------- -------------- -------------- Geometric parameters (Å, °) {#tablewrapgeomlong} =========================== ----------------------- -------------- ----------------------- ------------- P1---N1 1.710 (2) C14---H14 0.9300 P1---C7 1.820 (3) C15---C16 1.362 (6) P1---C13 1.832 (3) C15---H15 0.9300 P2---N3 1.593 (2) C16---C17 1.359 (6) P2---C19 1.802 (2) C16---H16 0.9300 P2---C25 1.816 (2) C17---C18 1.383 (5) P2---C6 1.853 (2) C17---H17 0.9300 N1---C1 1.421 (3) C18---H18 0.9300 N1---C6 1.468 (3) C19---C20 1.386 (3) N2---C1 1.321 (3) C19---C24 1.389 (3) N2---C5 1.343 (4) C20---C21 1.379 (4) N3---C31 1.373 (3) C20---H20 0.9300 N4---C35 1.336 (4) C21---C22 1.378 (4) N4---C31 1.342 (3) C21---H21 0.9300 C1---C2 1.391 (3) C22---C23 1.374 (4) C2---C3 1.369 (4) C22---H22 0.9300 C2---H2 0.9300 C23---C24 1.386 (4) C3---C4 1.370 (4) C23---H23 0.9300 C3---H3 0.9300 C24---H24 0.9300 C4---C5 1.372 (4) C25---C26 1.379 (4) C4---H4 0.9300 C25---C30 1.387 (4) C5---H5 0.9300 C26---C27 1.386 (4) C6---H6A 0.9700 C26---H26 0.9300 C6---H6B 0.9700 C27---C28 1.376 (5) C7---C12 1.382 (4) C27---H27 0.9300 C7---C8 1.395 (4) C28---C29 1.365 (5) C8---C9 1.388 (6) C28---H28 0.9300 C8---H8 0.9300 C29---C30 1.386 (4) C9---C10 1.359 (7) C29---H29 0.9300 C9---H9 0.9300 C30---H30 0.9300 C10---C11 1.354 (7) C31---C32 1.399 (4) C10---H10 0.9300 C32---C33 1.359 (4) C11---C12 1.382 (5) C32---H32 0.9300 C11---H11 0.9300 C33---C34 1.375 (5) C12---H12 0.9300 C33---H33 0.9300 C13---C14 1.379 (4) C34---C35 1.364 (5) C13---C18 1.389 (4) C34---H34 0.9300 C14---C15 1.396 (4) C35---H35 0.9300 N1---P1---C7 102.86 (11) C14---C15---H15 119.9 N1---P1---C13 105.55 (12) C17---C16---C15 119.6 (3) C7---P1---C13 101.82 (13) C17---C16---H16 120.2 N3---P2---C19 104.52 (11) C15---C16---H16 120.2 N3---P2---C25 114.34 (12) C16---C17---C18 120.7 (4) C19---P2---C25 106.98 (11) C16---C17---H17 119.6 N3---P2---C6 116.32 (12) C18---C17---H17 119.6 C19---P2---C6 107.81 (11) C17---C18---C13 121.0 (4) C25---P2---C6 106.35 (12) C17---C18---H18 119.5 C1---N1---C6 117.21 (19) C13---C18---H18 119.5 C1---N1---P1 116.91 (15) C20---C19---C24 119.5 (2) C6---N1---P1 124.78 (16) C20---C19---P2 121.79 (19) C1---N2---C5 117.0 (2) C24---C19---P2 118.66 (19) C31---N3---P2 120.27 (18) C21---C20---C19 120.5 (3) C35---N4---C31 117.1 (3) C21---C20---H20 119.8 N2---C1---C2 122.6 (2) C19---C20---H20 119.8 N2---C1---N1 116.8 (2) C22---C21---C20 119.6 (3) C2---C1---N1 120.6 (2) C22---C21---H21 120.2 C3---C2---C1 119.0 (3) C20---C21---H21 120.2 C3---C2---H2 120.5 C23---C22---C21 120.6 (3) C1---C2---H2 120.5 C23---C22---H22 119.7 C2---C3---C4 119.3 (3) C21---C22---H22 119.7 C2---C3---H3 120.4 C22---C23---C24 120.2 (3) C4---C3---H3 120.4 C22---C23---H23 119.9 C3---C4---C5 117.9 (3) C24---C23---H23 119.9 C3---C4---H4 121.1 C23---C24---C19 119.6 (3) C5---C4---H4 121.1 C23---C24---H24 120.2 N2---C5---C4 124.2 (3) C19---C24---H24 120.2 N2---C5---H5 117.9 C26---C25---C30 119.7 (2) C4---C5---H5 117.9 C26---C25---P2 123.20 (19) N1---C6---P2 114.09 (16) C30---C25---P2 117.1 (2) N1---C6---H6A 108.7 C25---C26---C27 119.7 (3) P2---C6---H6A 108.7 C25---C26---H26 120.2 N1---C6---H6B 108.7 C27---C26---H26 120.2 P2---C6---H6B 108.7 C28---C27---C26 120.5 (3) H6A---C6---H6B 107.6 C28---C27---H27 119.8 C12---C7---C8 117.8 (3) C26---C27---H27 119.8 C12---C7---P1 125.7 (2) C29---C28---C27 119.9 (3) C8---C7---P1 116.5 (3) C29---C28---H28 120.0 C9---C8---C7 120.2 (4) C27---C28---H28 120.0 C9---C8---H8 119.9 C28---C29---C30 120.4 (3) C7---C8---H8 119.9 C28---C29---H29 119.8 C10---C9---C8 120.6 (5) C30---C29---H29 119.8 C10---C9---H9 119.7 C29---C30---C25 119.8 (3) C8---C9---H9 119.7 C29---C30---H30 120.1 C11---C10---C9 119.8 (4) C25---C30---H30 120.1 C11---C10---H10 120.1 N4---C31---N3 119.9 (2) C9---C10---H10 120.1 N4---C31---C32 121.1 (2) C10---C11---C12 120.9 (5) N3---C31---C32 119.0 (2) C10---C11---H11 119.6 C33---C32---C31 120.0 (3) C12---C11---H11 119.6 C33---C32---H32 120.0 C11---C12---C7 120.7 (4) C31---C32---H32 120.0 C11---C12---H12 119.7 C32---C33---C34 119.2 (3) C7---C12---H12 119.7 C32---C33---H33 120.4 C14---C13---C18 117.5 (3) C34---C33---H33 120.4 C14---C13---P1 125.9 (2) C35---C34---C33 117.8 (3) C18---C13---P1 116.2 (2) C35---C34---H34 121.1 C13---C14---C15 120.9 (3) C33---C34---H34 121.1 C13---C14---H14 119.5 N4---C35---C34 124.8 (3) C15---C14---H14 119.5 N4---C35---H35 117.6 C16---C15---C14 120.3 (4) C34---C35---H35 117.6 C16---C15---H15 119.9 C7---P1---N1---C1 143.92 (19) C14---C15---C16---C17 0.3 (6) C13---P1---N1---C1 −109.72 (19) C15---C16---C17---C18 0.0 (6) C7---P1---N1---C6 −48.4 (2) C16---C17---C18---C13 −0.2 (6) C13---P1---N1---C6 58.0 (2) C14---C13---C18---C17 0.0 (5) C19---P2---N3---C31 175.99 (19) P1---C13---C18---C17 −173.4 (3) C25---P2---N3---C31 59.4 (2) N3---P2---C19---C20 −148.8 (2) C6---P2---N3---C31 −65.3 (2) C25---P2---C19---C20 −27.2 (2) C5---N2---C1---C2 1.7 (4) C6---P2---C19---C20 86.8 (2) C5---N2---C1---N1 −179.9 (2) N3---P2---C19---C24 32.5 (2) C6---N1---C1---N2 −31.0 (3) C25---P2---C19---C24 154.1 (2) P1---N1---C1---N2 137.68 (19) C6---P2---C19---C24 −91.9 (2) C6---N1---C1---C2 147.4 (2) C24---C19---C20---C21 0.4 (4) P1---N1---C1---C2 −43.9 (3) P2---C19---C20---C21 −178.3 (2) N2---C1---C2---C3 −1.3 (4) C19---C20---C21---C22 −0.5 (4) N1---C1---C2---C3 −179.6 (2) C20---C21---C22---C23 0.4 (5) C1---C2---C3---C4 0.2 (4) C21---C22---C23---C24 −0.2 (5) C2---C3---C4---C5 0.5 (5) C22---C23---C24---C19 0.1 (4) C1---N2---C5---C4 −1.0 (5) C20---C19---C24---C23 −0.2 (4) C3---C4---C5---N2 −0.1 (5) P2---C19---C24---C23 178.5 (2) C1---N1---C6---P2 −75.7 (3) N3---P2---C25---C26 −157.5 (2) P1---N1---C6---P2 116.67 (18) C19---P2---C25---C26 87.3 (2) N3---P2---C6---N1 −97.21 (19) C6---P2---C25---C26 −27.7 (2) C19---P2---C6---N1 19.7 (2) N3---P2---C25---C30 23.1 (2) C25---P2---C6---N1 134.16 (18) C19---P2---C25---C30 −92.1 (2) N1---P1---C7---C12 79.6 (3) C6---P2---C25---C30 152.9 (2) C13---P1---C7---C12 −29.6 (3) C30---C25---C26---C27 −0.6 (4) N1---P1---C7---C8 −99.3 (2) P2---C25---C26---C27 −179.9 (2) C13---P1---C7---C8 151.5 (2) C25---C26---C27---C28 2.1 (4) C12---C7---C8---C9 −1.3 (5) C26---C27---C28---C29 −2.0 (5) P1---C7---C8---C9 177.7 (3) C27---C28---C29---C30 0.4 (5) C7---C8---C9---C10 0.8 (6) C28---C29---C30---C25 1.2 (5) C8---C9---C10---C11 0.1 (7) C26---C25---C30---C29 −1.0 (4) C9---C10---C11---C12 −0.5 (6) P2---C25---C30---C29 178.3 (2) C10---C11---C12---C7 −0.1 (5) C35---N4---C31---N3 −176.9 (3) C8---C7---C12---C11 1.0 (4) C35---N4---C31---C32 2.4 (5) P1---C7---C12---C11 −177.9 (2) P2---N3---C31---N4 6.4 (3) N1---P1---C13---C14 7.1 (3) P2---N3---C31---C32 −172.9 (2) C7---P1---C13---C14 114.2 (3) N4---C31---C32---C33 −1.4 (5) N1---P1---C13---C18 179.8 (2) N3---C31---C32---C33 177.8 (3) C7---P1---C13---C18 −73.1 (3) C31---C32---C33---C34 −0.5 (6) C18---C13---C14---C15 0.4 (5) C32---C33---C34---C35 1.4 (7) P1---C13---C14---C15 173.0 (2) C31---N4---C35---C34 −1.5 (6) C13---C14---C15---C16 −0.5 (5) C33---C34---C35---N4 −0.4 (7) ----------------------- -------------- ----------------------- ------------- Hydrogen-bond geometry (Å, °) {#tablewraphbondslong} ============================= -------------------------------------- Cg is the centroids of C7--C12 ring. -------------------------------------- --------------------- --------- --------- ----------- --------------- *D*---H···*A* *D*---H H···*A* *D*···*A* *D*---H···*A* C32---H32···N2^i^ 0.93 2.71 3.577 (3) 155\. C21---H21···N3^ii^ 0.93 2.73 3.569 (4) 150\. C28---H28···Cg^iii^ 0.93 2.87 3.603 (3) 136\. --------------------- --------- --------- ----------- --------------- Symmetry codes: (i) *x*, *y*+1, *z*; (ii) −*x*+1/2, *y*−1/2, −*z*+1/2; (iii) −*x*, *y*−1, −*z*+1/2. ###### Hydrogen-bond geometry (Å, °) *Cg* is the centroids of C7--C12 ring. *D*---H⋯*A* *D*---H H⋯*A* *D*⋯*A* *D*---H⋯*A* --------------------- --------- ------- ----------- ------------- C32---H32⋯N2^i^ 0.93 2.71 3.577 (3) 155 C21---H21⋯N3^ii^ 0.93 2.73 3.569 (4) 150 C28---H28⋯*Cg*^iii^ 0.93 2.87 3.603 (3) 136 Symmetry codes: (i) ; (ii) ; (iii) .
Mid
[ 0.648, 30.375, 16.5 ]
Q: Combine Print Ranges from Multiple Worksheets VBA EXCEL I am trying to figure out how to print the "ActiveSheet" or Sheet1 along with "Sheet5" (rows 1-6, A:M) being displayed at the bottom with a 2 row space in between the end of Sheet1 and the beginning of data from Sheet5. I've been trying to look up similar questions and read something about a "Union" but I wasn't sure how it would fit here. Private Sub CommandButton1_Click() Dim Sel_Manager As String 'Headers repeated at the top Application.PrintCommunication = False With ActiveSheet.PageSetup .PrintTitleRows = "$2:$2" .PrintTitleColumns = "$B:$M" .Orientation = xlLandscape .Zoom = False .FitToPagesWide = 1 .FitToPagesTall = 1 End With 'Manager selection through ComboBox dropdown Sel_Manager = ComboBox1 'Inserting autofilters for worksheet Cells.Select Selection.AutoFilter 'Manager defined in the dropdown ComboBox ActiveSheet.Range("B2", Range("M2").End(xlDown)).AutoFilter Field:=1, Criteria1:=Sel_Manager ActiveSheet.Range("B2", Range("M2").End(xlDown)).AutoFilter Field:=2, Criteria1:="A" 'Here I select range to be printed and specify manager in filename ActiveSheet.Range("B2", Range("M2").End(xlDown)).Select Selection.ExportAsFixedFormat Type:=xlTypePDF, Filename:= _ Sel_Manager + ".pdf", Quality:=xlQualityStandard, _ IncludeDocProperties:=True, IgnorePrintAreas:=False, OpenAfterPublish:=True ActiveSheet.ShowAllData Application.PrintCommunication = True End Sub A: This may give you some ideas. I created two worksheets. One, called "Main", contains data that has "names" in column B and some As in column C. The other, called "Extra" contains the six rows to appear at the bottom of the filtered data. I do not use Excel's identifiers when referencing worksheets. The first sheet will have an identifier of Sheet1 and a name of "Sheet1". If you immediately create another sheet it will have an identifier of Sheet2 and a name of "Sheet2". However, if Sheet1 is renamed before the second sheet is created, it will have an identifier of Sheet2 and a name of "Sheet1". It can all get very confusing. I have hardcoded the selected manager as "Aaaaa" rather than make it a user entered parameter. I have prepared worksheet "Main" for printing but have not output it. Option Explicit Sub Test() Dim Manager As String Dim RngFiltered As Range Dim RowSht1Last As Long Manager = "Aaaaa" With Worksheets("Main") .AutoFilterMode = False ' Switch off auto filtering if on ' Find last row containing a value RowSht1Last = .Cells.Find("*", .Range("A1"), xlFormulas, , xlByRows, xlPrevious).Row With .Range("B2:M2") .AutoFilter Field:=1, Criteria1:=Manager .AutoFilter Field:=2, Criteria1:="A" End With Set RngFiltered = .Cells.SpecialCells(xlCellTypeVisible) ' Just to show the filtered range. Note, I cannot find a documented limit ' on the number of sub-ranges within a range. If there is a limit, I have ' never managed to reach it. However Range.Address has a limit which is a ' little under 255. Debug.Print Replace(RngFiltered.Address, "$", "") Worksheets("Extra").Range("A1:M6").Copy Destination:=.Cells(RowSht1Last + 2, "A") ' ###### Output visible rows ' Delete rows copied from Sheet5 .Rows(RowSht1Last + 2 & ":" & RowSht1Last + 8).Delete End With End Sub
Low
[ 0.5192743764172331, 28.625, 26.5 ]
They Call Her… Cleopatra Wong There are certain films that become associated with one indelible image. For example, it’s hard to think of North by Northwest without conjuring a mental picture of Cary Grant being chased by that crop-duster, or of Singin’ in the Rain without immediately seeing Gene Kelly hanging off of that lamppost. In the case of the Filipino action film They Call Her… Cleopatra Wong, the image that invariably comes to mind – for those familiar with the film, at least – is that of comely star Marrie Lee brandishing an imposing looking, quadruple-barreled, sawed-off shotgun while dressed in a nun’s habit and wimple (thanks, El Santo). Marrie’s character is wearing that get-up for the purpose of infiltrating a gang of criminals who are also disguised as nuns. Though, of course, knowing the context of the image doesn’t do anything to reduce its fetishistic sexual charge. In fact, to my mind, the whole scenario is a perfect example of a filmmaker trying to have it both ways. In a country as deeply hit by the Catholic whammy as the Philippines, a nun’s habiliments carry a not inconsiderable amount of symbolic freight, and producer/writer/director Bobby Suarez here uses the criminals’ sacrilegious employment of that garb as a “how bad are they” demonstration of the depths of those criminals’ villainy, but then also employs it in much the same manner himself in order to titillate and scandalize his audience. This is a classic exploitation movie gambit, of course, but I think that, in this case, it’s also representative of an ambivalence that’s characteristic of both modern Catholicism (how many “ex-Catholics” do you know who aren’t still as deeply affected by the religion as they were when they were practicing it?) and of Filipino culture. After all, only the Philippines could have produced a movie like Elwood Perez’ Silip, a film that, for all intents and purposes, seems to be a screed against religious-based sexual repression and its resultant perversion of desire, but which couches its message in so much harrowing imagery of blood sacrifice and martyrdom that it’s difficult to fully enjoy the abundant full-frontal nudity and near-hardcore sex that it puts in service of expressing it. True, it’s still possible for the dedicated viewer to appreciate the naked form of the film’s gorgeous star Maria Isabel Lopez, but not without paying a certain amount of penance. It’s as if we’re seeing played out in the film the battle between the desire to cast off the punitive, bloody-minded version of Catholicism inherited from the country’s Spanish colonizers and the deeply ingrained practice of that religion forged from hundreds of years of observance. Thankfully, Cleopatra Wong‘s version of this ambivalence is not so jarring as to beg inquiry into its cultural roots, with the result that we can simply enjoy it as a film about a hot chick who dresses up like a church lady and blows shit up. This is clearly how both God and Bobby Suarez intended it. They Call Her… Cleopatra Wong was the second film to be produced by Suarez’s BAS Film Productions, and the first to be directed by him — although he did so under the pseudonym George Richardson, presumably to enhance the film’s export-friendly “international” feel. Like the previous BAS production, The Bionic Boy, the film relied on partial financial backing from Singapore, and drew from the local Singaporean talent pool for its star. In the case of The Bionic Boy, that star was a nine-year-old karate champion by the name of Johnson Yap, and, in the case of Cleopatra Wong, it was a seventeen year old typist with precious little film experience by the name of Doris Young. Young was chosen by Suarez from over three hundred applicants drawn from casting calls held in Singapore, Hong Kong, Malaysia and the Philippines, and was soon re-christened by the director with the name Marrie Lee — an attempt by Suarez to encourage associations with Bruce Lee in the minds of his intended audience. I couldn’t find any information about what kind of martial arts background Young might have had at the time of making Cleopatra Wong, aside from whatever training she was given in preparation for the film, but it really doesn’t matter. The goal with the film was to combine elements of Hong Kong action movies and the Bond films, while at the same time — and most obviously — creating an Asian counterpart to blaxploitation heroines like Tamara Dobson’s Cleopatra Jones. And in terms of the authenticity of its kung fu action, the finished product bares a far stronger family resemblance to American blaxploitation cinema than to any of its other inspirations. This is the type of martial arts film where the emphasis is placed firmly on striking bad-ass looking poses as opposed to actually executing any convincing looking moves. In fact, one actor in particular – playing a track-suited crime boss who, in the English dub, welcomes Cleo to his “viller” – exhibits a style very similar to that of the type of over-enthusiastic Kung Fu Theater fan you’d see practicing his moves in a 7-11 parking lot back in the day. In any case, Young deserves to be commended for the fact that she reportedly performed the majority of her own stunts in the movie, and ended up with her fair share of scrapes, bruises and powder burns to prove it. Young’s character, the titular Ms. Wong, is a Singapore-based Interpol agent who’s called upon by her superiors to investigate a mysterious counterfeiting ring. Said counterfeiters, it seems, are seeking to undermine the ASEAN nations by flooding their economies with fake currency, though from where and through what channels is unknown. Leaving her latest boy-toy in her hotel room in Manila, Cleo cuts her vacation short and heads back to Singapore to start the hunt. Her first move is to try and draw the attention of the criminals by going into a department store and buying an expensive watch with a wad of fake cash. Fortunately, it’s obviously a slow news day in Singapore, and once she’s apprehended by the store’s security guards — who easily identify the money as counterfeit despite us just being told how completely indistinguishable it was from the real thing — it ends up getting splashed across the next day’s front page headlines. And they don’t even try to sex it up. The headline just reads “WOMAN NABBED IN DEPT. STORE”, which suggests to me that the paper’s “B” section is probably filled with breathless accounts of people short tipping in restaurants and staring threateningly at small dogs. This is obviously what passes for lurid criminal exploits in a country where you can get arrested for chewing gum. Anyway, Cleo’s newfound notoriety as “Woman Nabbed in Dept. Store” leads to her being abducted and taken to the “viller” of Argo, the aforementioned track-suited boss of the counterfeiting ring’s Singapore operation. Given her reputation as a woman who allegedly tries to obtain watches through illegal means, Argo naturally wants to see a demonstration of her kung fu skills, and so a pair of fights are staged on the spot. The first fight, between Cleo and a trio of middle-aged wrestlers, is settled when Cleo whips off her skirt at a key moment to reveal the bright yellow hot pants jumpsuit she’s wearing underneath, with the result that her opponents become too preoccupied with making boner eyes at her to evade her lightning fists. The next involves a couple dozen karate guys, and ends when Cleo does one of those reverse-motion assisted leaps over the viller wall. Her encounter with Argo having provided nothing more than the opportunity for a couple of pointless but entertaining action set pieces, Cleo next follows a lead provided by her superiors to the film’s next exciting international location, Hong Kong. Despite the film’s Asian pedigree, said locale is introduced with the kind of “ching chong chopsticks” musical cue you’d expect to hear in a Mr. Wong movie from the thirties — whereas elsewhere Cleopatra Wong’s score is of a jaunty variety situated squarely in the no man’s land between blaxploitation funk and seventies shopping mall music. Cleo’s HK jaunt leads to the discovery that the phony bills are being smuggled inside jars of strawberry jam that are being shipped in from the Philippines. After a return to the P.I., several changes of outfits, and a couple more shambolic kung fu battles, Cleo’s diligent detective work leads to her uncovering the counterfeiters’ hideout: a catholic monastery located on a remote hillside. The bad guys, we will see, have imprisoned the nuns who are the rightful dwellers of the place, and are using its grounds to both print the fake bills and produce the jars of delicious breakfast spread in which they’re being smuggled. Cleo’s suspicions are confirmed when she observes, in the course of doing some helicopter surveillance, that the nuns who patrol the grounds are dudes, and that they are concealing automatic weapons under their habits. In those moments in They Call Her… Cleopatra Wong when Doris Young isn’t engaging in faux kung fu battles, or gamely performing motorcycle stunts, it can’t be said that she exactly burns up the screen with her charisma and sex appeal. This is not to say, however, that she lacks presence entirely. It’s just that hers is a fairly low key presence. Overall I’d say that she comes across as being pleasant and likable, though that impression on my part might just as easily have come from viewing her current website, where she devotes more space to her two dogs than to her entire film career. In any case, her low intensity performance suits the film well, because, compared to more bloody, revenge-minded action fare like Suarez’s later One Armed Executioner, it’s a fairly lighthearted affair, obviously intended not to be taken too seriously by anyone. To this end, Suarez does a passable job of keeping things breezing along, though he makes a mistake all too common in low budget action films: that of not distinguishing between action and mere movement. In the Hong Kong sequence, we’re treated to a scene of Cleo tailing a very slow moving truckload of strawberry jam in what seems to be real time — and every time we think that the scene has ended, we find that we’re only cutting to another leg of the journey. In addition, the lengthy sequence in which Cleo escape from Argo and his goons includes a “chase” between two aerial cable cars that depends entirely for its suspense on its audience being ignorant of how aerial cable cars actually function. Still, these are just isolated instances, as the movie’s thrills are for the most part adequately thrilling — if only by virtue of their silliness, or of Doris Young’s dogged commitment to selling them. They Call Her… Cleopatra Wong‘s crowning action set piece, the one that we’ve all tuned in for, gratifyingly takes up almost the entirety of the film’s final act. Cleo returns to her superior and tells him of her discovery of the gang’s hideout, hoping to secure a warrant so that she can make a search of the monastery. Unfortunately, her boss refuses, saying that there’s not enough evidence. Concerns over separation of church and state are also raised. Given such very understandable sensitivities, and the corresponding need to proceed with tact and caution, it is determined that the only alternative is to stage an armed, guerrilla-style raid on the monastery, shooting all of the bad guys inside and then blowing it up with plastic explosives once done. To this end, Cleo recruits four generously mustached cohorts — including the One-Armed Executioner himself, Franco “Chito” Guerrero — to assist her. Soon the drop is made, and the five, after making quick work of some guards on the monastery’s periphery, have all kitted themselves out as gun-wielding brides of Christ, ready to rain hell on the godless gang of funny-money makers. At one point during the closing moments of They Call Her… Cleopatra Wong, I paused to reflect upon the fact that I had been watching mustached men dressed as nuns shooting each other in slow motion for what seemed like twenty minutes, and that, while I had been moderately entertained by the spectacle, it certainly hadn’t inspired anything close to the stunned incredulity that such a scenario would seem to warrant. It is at times like these, I reckon, that I need to watch something made in Japan during the seventies — preferably directed by Norifumi Suzuki — in order to stir my jaded sensibilities back into a state appropriate to a sensate human being with a fully developed moral core. So preoccupied did I become with this troubling state of affairs that I almost failed to register the film’s climax, in which Cleopatra Wong chases the lead villain on a tricked out, MegaForce-worthy motorcycle equipped with rear-mounted machine guns and then, in the film’s lone instance of conspicuous production value, use her archery skills to blow up his helicopter with a rocket-tipped arrow. Bobby Suarez would bring Doris Young and Cleopatra Wong back to the big screen, shortly after the debut of They Call Her… Cleopatra Wong, in Dynamite Johnson, a film that was essentially an all-purpose sequel to both Cleopatra Wong and The Bionic Boy, in which Young costarred with Johnson Yap. After that, production on a third Cleopatra Wong film, Code Name: The Destroyers, was begun in Malaysia, but was hastily aborted after things went sour with the Malaysian backers and Suarez and crew had to flee the country. To recoup the loss from that debacle, Suarez then churned out an even-cheaper-than-usual final entry in the series, Pay or Die, which he hastily sold off at a bargain price. Soon after that, in 1981, Doris Young, aka Marrie Lee, hung up her wimple and shotgun for good and retired from the entertainment business. Today she runs a business selling healthcare products, but obviously – judging from her apparent willingness to cheerfully hold forth on the subject – looks back on her days as Cleopatra Wong with fondness And that fact adds yet another dimension to that oh-so-famous image of Marrie Lee. Because we can now gaze upon it, happy in the knowledge that the woman behind it got in, made her contribution, and then got out before the price of fame became too much. After all, any story concerning a shotgun-wielding nun deserves a happy ending, and we can all thank Doris Young for giving us one. hi, basically i dont have comment on the review, maybe i need to watch the whole movie first. i just want to say that i am really interested on knowing more things regarding Mr. Suarez. for me i think he is genius, anyway that is my opinion. i have not heard so much of him on the industry where he worked with. how come that this guy who have the ability to do create such movies that has a guts of biting an international markets doesnt have much recognition from our film industry? (or maybe i just didnt know, maybe?) anyway i really thinks his life and works are interesting. Alvin, of coz I remember you. I wonder if you will get to read this as it is over a year since your comment but if u do, please leave me a message at the enquiry page on my website cleopatrawong.com… I do hope we can get in touch again. I was in Bulacan this year Feb to attend Bobby’s funeral. Got to meet some of the cast and crew but it was like 30 years since I last met them. Anyway I hope to hear from you again…Cheers Cleo
Low
[ 0.51380042462845, 30.25, 28.625 ]
Q: How to sort and get max score for each name from 3 array of objects in JavaScript and assign it and the missing keys and values to another array? How to sort and get max score for each name from 3 array of objects in javascript and assign it and the missing keys and values to another array? I want to sort the arrays test1, test2, test3 and get the max score for each student and assign it and the missing keys and values to the array results as an object like: results = [{name: name, age: age score: score}] With the following code I am able to get the object with the highest score like: resutls = [ { name: 'sam', age: 15, score: 30 } ] const test1 = [ { name: 'vikash', score: 1 }, { name: 'krish', score: 2 }, { name: 'kunz', score: 3 }, ]; const test2 = [ { name: 'kunz', score: 0 }, { name: 'vikash', score: 5 }, { name: 'krish', score: 6 }, { name: 'sam', age: 15, score: 30 }, ]; const test3 = [ { name: 'krish', score: 7 }, { name: 'kunz', age: 10, score: 8 }, { name: 'vikash', score: 10 }, { name: 'sam', score: '' }, ]; const topScore = (...arrays) => { let result = [...arrays].flat().reduce((max, obj) => { return max.score < obj.score ? obj : max; }); return [result]; }; console.log(topScore(test1, test2, test3)); The results array should look like this at the end of it .. resutls = [ { name: 'vikash', age: '', score: 10 }, { name: 'sam', age: 15, score: 30 }, { name: 'krish', age: '', score: 7 }, { name: 'kunz', age: 10, score: 8 }, ] A: You could group by name and get all values from the object with the max score objects. const test1 = [{ name: 'vikash', score: 1 }, { name: 'krish', score: 2 }, { name: 'kunz', score: 3 }], test2 = [{ name: 'kunz', score: 0 }, { name: 'vikash', score: 5 }, { name: 'krish', score: 6 }, { name: 'sam', age: 15, score: 30 }], test3 = [{ name: 'krish', score: 7 }, { name: 'kunz', age: 10, score: 8 }, { name: 'vikash', score: 10 }, { name: 'sam', score: '' }], result = Object.values([...test1, ...test2, ...test3].reduce((r, o) => { if (!r[o.name] || r[o.name].score < o.score) { r[o.name] = { ...(r[o.name] || { name: '', age: '', score: 0 }), ...o }; } return r; }, {})); console.log(result);
Low
[ 0.529411764705882, 25.875, 23 ]
Jack Thomas (swimmer) Jack Thomas (born 30 May 1995) is a British parasport swimmer. Thomas competes in the S14 classification for swimmers with intellectual disabilities, mainly freestyle and backstroke preferring shorter distances. In 2014 he competed at the Commonwealth Games in Glasgow representing Wales and took the bronze medal in the 200m freestyle S14. Personal history Thomas was born in Swansea, Wales in 1995 to Mark and Wendy Thomas. When Jack was two years old he was diagnosed as having learning difficulties. He was educated at Morriston Comprehensive. Career History Thomas first began swimming at the age of four, when his parents took him to the local pool in an attempt to help him burn off excess energy. As he matured he showed promise as a competitive swimmer and won several junior competitions but the decision made by the IPC, after a controversy at the 2000 Summer Paralympics meant a competitive ban on all events for athletes with an intellectual disability, saw him unable to compete at meets for disabled swimmers. His parents petitioned the Equality and Human Rights Commission, the director of which stated in 2008 that the Thomas' letter was a major factor in seeing the Youth Sports Trust lift the ban for children competing in Britain. In 2013 Thomas was selected to compete at his first major tournament for the Great Britain. He came fifth in the 100m backstroke S14 and sixth 200m individual medley SM14. The next year he was selected to play for Wales at the 2014 Commonwealth Games in Scotland. There he competed in the 200m freestyle S14, the first event for swimmers with a learning disability. In the finals Thomas took bronze with a time of 2:01.27, behind Australia's Daniel Fox and England's Thomas Hamer. A month later he was back in the Great Britain team, this time travelling to Eindhoven to take part in the 2014 IPC Swimming European Championships. In Eindhoven Thomas was entered into three events the 100m backstroke, 200m freestyle S14 and the 200m individual medley SM14. He won bronze in the 50m backstroke and silver in the medley and freestyle. A wrist injury ruled Thomas out of the 2015 World Championships in Glasgow. References Category:Living people Category:1995 births Category:Welsh male swimmers Category:Sportspeople from Swansea Category:Male freestyle swimmers Category:Male backstroke swimmers Category:Swimmers at the 2014 Commonwealth Games Category:Commonwealth Games bronze medallists for Wales Category:Commonwealth Games medallists in swimming
High
[ 0.6763990267639901, 34.75, 16.625 ]
Q: Printing .DOC with variable height in continuous paper (paper roll) with "Aspose Words" I'm programatically building a .DOC (using Aspose Words) with variable height according with the contents that will be printed, and it will be printed in a roll of paper (see thermal printers). What kind of approach should I take ? I thought two ways: Create a paper with a minimum height but with zero top and bottom margins, so the pages could have the effect of being in the same page, or dynamically change the page height ? Any solution is welcome, and of course how to do them. But I would prefer to have the doc inside a unique page (long as needed), because these printers can cut the paper in some events, like on each page break (hardware/driver feature out of the application control). A: I got success with the approach to stretch the page to fit the contents in only 1 page. However, as the Aspose Words doesn't seem to have ways to measure the remaining space of the last page in the Aspose Words API, I worked around in this way: I defined the document page height multiplying the PageCount by the useful page height (margins subtracted), and so, applied tries to adjust the remaining space dividing the useful page height by 2 on each try and increasing or decreasing it, like the foundation of any ordinary binary search algorithm. It works, and how the foundation of binary algorithms has a logarithmic scale, in the worse case it will cost me less than 10 tries to fit the page (my useful height won't exceed 30cm, but even thus, if it had 1 meter will cost about 14 tries at the worse case).
High
[ 0.661904761904761, 34.75, 17.75 ]
Q: compilation using roslyn and modifications on the fly I've seen a lot of people talk about the Roslyn compiler and its ability to compile as a service. There's a feature in Java when developing in Eclipse (not sure if it's only Eclipse) that allows you to modify the code without stopping or pausing the application. This is really useful when debugging render in games (that's what I use it for). Will the new abilities that Roslyn brings allow such a thing in .Net development? A: Will the new abilities that Roslyn brings allow such a thing in .Net development? No, Roslyn is still mostly a traditional compiler: code comes in and an assembly (.exe or .dll) comes out. What's different with Roslyn is that it lets you manipulate code. But it doesn't do anything regarding manipulating assemblies, which I think would be required for what you're asking.
Low
[ 0.30206896551724105, 13.6875, 31.625 ]
805 F.Supp. 126 (1992) Benjamin J. ANDREWS, Jr., Frances C. Andrews, Plaintiffs, v. UNITED STATES of America, Defendant. No. 90-CV-724A. United States District Court, W.D. New York. September 17, 1992. *127 Kenneth Bersani, Gough, Skipworth, Summers, Eves & Trevett, PC, Rochester, N.Y., for plaintiffs. Steven E. Cole, U.S. Dept. of Justice, Tax Div., Washington, D.C., for defendant. ORDER ARCARA, District Judge. This Court, having carefully reviewed Magistrate Judge Carol E. Heckman's Report and Recommendation of August 13, 1992, as well as the pleadings and materials submitted by both parties; and no objections having been timely filed to the *128 Magistrate Judge's Report in the above-captioned matter, it is hereby ORDERED, that pursuant to 28 U.S.C. § 636(b)(1), the Magistrate Judge's Report and Recommendation is accepted in its entirety. IT IS FURTHER ORDERED that the Government's motion for summary judgment is granted. Further, that the Clerk of the Court is directed to enter final judgment in favor of the Government and against the plaintiff. It is so ordered. REPORT AND RECOMMENDATION HECKMAN, United States Magistrate Judge. In this case, Plaintiffs seek to estop the Government from collecting taxes which are admittedly due, arguing that they relied on the erroneous advice of an IRS employee. For the reasons set forth below, it is recommended that summary judgment be granted to the Government. This matter was referred to the undersigned by the Hon. Richard J. Arcara to hear and report on Defendant's motion for summary judgment, pursuant to 28 U.S.C. § 636(b)(1)(B). The following constitutes the undersigned's proposed findings and recommendations for the disposition of the motion. FACTS In accordance with Local Rule 25, the Government filed a Statement of Undisputed Facts as part of its motion for summary judgment. Plaintiffs, however, failed to comply with Local Rule 25. Since Plaintiffs have not controverted Defendant's statement, the material facts set forth in that statement are deemed admitted for purposes of this motion. Rule 25, Local Rules of the Western District of New York. This suit was filed under § 7422 of the Internal Revenue Code to recover income taxes and interest alleged to be erroneously collected by the IRS for the tax years 1978 through 1982. Plaintiff Benjamin J. Andrews, Jr. is an attorney, and Plaintiff Frances C. Andrews is his wife. In their original Form 1040 for tax year 1980, Plaintiffs claimed a loss of $27,321 for an investment in a partnership known as "Lighthouse Hill Associates" ("LHA"). The Plaintiffs claimed a deduction of $30,137 in 1979 for this partnership, and of $52,500 in 1978 for another partnership loss. The Internal Revenue Service subsequently audited these returns, as well as the returns for 1981 and 1982. On April 6, 1984, the Andrews' received a statutory Notice of Deficiency for the year 1980, stating that Plaintiffs owed an increase of tax for that year in the amount of $10,953. This Notice of Deficiency was based primarily upon the full disallowance of the loss Plaintiffs had claimed for LHA (Gov't Ex.A, attached to Defendant's Memorandum in Support of Motion for Summary Judgment, Item 9). Plaintiffs then petitioned the United States Tax Court for a redetermination of this deficiency, claiming that the IRS disallowance of their $27,321 deduction relating to LHA was erroneous. On October 31, 1984, this petition was dismissed as untimely (id., Gov't Exs.B & C). On May 10, 1985, the IRS assessed the $10,953 tax deficiency (plus interest) against the Plaintiffs for 1980. Plaintiffs then filed a Form 1040X, Amended U.S. Individual Income Tax Return for 1980, wherein they claimed that their tax assessment of $10,953 should be reduced to $8,347, representing allowance by the IRS of a deduction for Plaintiffs' out-of-pocket expenditures for the partnership, as well as a deduction for $672 for income which was turned over to Mr. Andrews' law firm (then Saperston & Day) (id., Gov't Ex.D). According to this Form 1040X, Plaintiffs still owed an additional $5,264. This return was accompanied by a cover letter from Plaintiff Benjamin Andrews, which stated: After you have had an opportunity to examine [the amended return], I trust that you will forward a revised bill, including the breakdown of interest owed. Id. In the meantime, the IRS began to examine Plaintiffs' 1978, 1979, 1981 and 1982 *129 returns as well. Eventually, all five years were considered together. On September 26, 1985, Plaintiffs accepted an offer by the IRS to settle their 1980 case for allowance of a deduction in the amount of their out-of-pocket expenses of $7,500 relating to LHA (id., Gov't Ex.E). Plaintiffs also accepted the IRS offer to settle their 1979 tax case for an allowance of a $10,000 deduction for out-of-pocket expenses. On October 18, 1985, the IRS sent the Plaintiffs a letter informing them that their claim for partial abatement of their 1980 income tax liability had been allowed (id., Gov't Ex.F). Enclosed with this October 18, 1985 letter was a Form 1902-B, Report of Individual Income Tax Examination Changes, reflecting allowance of a deduction for Plaintiffs' out-of-pocket investment of $7,500 to LHA and $673 for non-employment compensation (id., Ex.F, p. 2). The October 18, 1985 letter clearly stated: A partial abatement is shown on the report enclosed. The remaining balance is due and payable immediately. (id., Ex.F, p. 1). On the next page, the computation sheet stated that the assessment for 1980 would be reduced by $4,544 as a result of the adjustment, but on another line it erroneously stated that there had been a $4,544 "overpayment." It is this erroneous statement, made three weeks after the settlement was agreed upon, that Plaintiffs rely upon for their claim that all of the liability arising from the settlement should be abated. On November 1, 1985, Plaintiffs signed Form 906, "Closing Agreement on Final Determination Covering Specific Matters," which was subsequently signed by the IRS on December 6, 1985 (id., Gov't Ex.G). In that agreement, the Plaintiffs were allowed a deduction for out-of-pocket expenses in the amount of $7,500 for investments in LHA for 1980 and $10,000 for 1979. Plaintiffs also executed a closing agreement for 1978 wherein they were allowed out-of-pocket expenses of $15,000 relating to the partnership in that year, as well as closing agreements for 1981 and 1982. Plaintiffs also executed and submitted the examination reports for 1978 through 1982 (id., Gov't Exs.I-M). Plaintiffs contend, and the Government does not dispute, that they were verbally advised by the IRS agent assigned to their case that the total cost of the settlement, including interest, would be $27,000.[1] In fact, at oral argument, the Government stipulated for purposes of this motion that the IRS employee at some point advised the taxpayers orally that the total amount owed would be $27,000 for all five years. Plaintiffs paid the $27,000, believing that this would resolve the matter entirely. In July of 1986, the IRS sent Plaintiffs a bill for an additional $12,465 for 1980. This amount was based on the original assessment of $10,953, plus interest, less the abatement of $4,544 and corresponding abated interest. On September 25, 1986, Plaintiffs filed a second Form 1040X, Amended U.S. Individual Income Tax Return, for the years 1978 through 1982, which stated in pertinent part as follows (id., Gov't Ex.H): At the time the Andrews settled their case, they requested from the Service a calculation of the tax and interest due for all five years, which was approximately $27,000, and paid this amount prior to the end of 1985. In 1986, the Andrews were contacted by this Service concerning additional amounts allegedly owed for 1980, 1981 and 1982. They had paid the additional amounts for 1981 and 1982. The amount allegedly owed for 1980 is in suspense. The amounts allegedly owed for 1980, 1981 and 1982 are in excess of those amounts which the Andrews were told would be owed when they settled the case. The apparent discrepancy is one which was created by the Service. The document which the Andrews signed for 1980 shows that an overpayment is due them in the amount of $4,544. The Service now alleges that an amount in excess of $12,000 is in fact owed for that year. *130 This was not the statement made by the Service to the Andrews at the time that they settled. Instead, they were advised by the Service that the net adjustments would result in an overpayment in 1980 of $4,544, as is reflected in the attached report dated 10/17/85. DISCUSSION Plaintiffs now claim that they were induced to enter into closing agreements with the Internal Revenue Service for the years 1978 through 1982 based on misrepresentations by the IRS as to the total amount due under the settlement agreement with respect to the years in question. The United States has moved for summary judgment on the basis that Plaintiffs cannot, as a matter of law, set aside the closing agreements in question. Furthermore, the United States argues that even if the closing agreements were to be set aside, the Plaintiffs have not claimed, nor may they now attempt to claim, that they are entitled to allowance of deductions in excess of the amounts they were allowed under the settlement agreement. Finally, since Plaintiffs' complaint sounds in estoppel, the Government argues that estoppel will not lie against the United States in matters involving the United States Treasury. Pursuant to Rule 56(c) of the Federal Rules of Civil Procedure, summary judgment "shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to summary judgment as a matter of law." Fed.Rule Civ.P. 56(c). [T]he plain language of Rule 56(c) mandates the entry of summary judgment, after adequate time for discovery and upon motion, against a party who fails to make a showing essential to that party's case, and on which that party will bear the burden of proof at trial. Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 2552, 91 L.Ed.2d 265 (1986). As already discussed, the record in this case leaves all essential facts undisputed, making this case strictly a question of law. The Internal Revenue Code states that the Commissioner "may enter into a closing agreement which, if approved by the designated official, is final and conclusive in the absence of fraud, malfeasance, or misrepresentation." 26 U.S.C. § 7121. For a closing agreement to be set aside for misrepresentation of a material fact, there must be a mutual mistake of fact which is more than a misstatement. "[I]nnocent mistakes should be buried in a closing agreement." Commissioner v. Ingraham, 87 F.2d 915, 916 (3rd Cir.1937). A mere mistake of fact or law, whether unilateral or mutual, no matter how material, is not a misrepresentation. Id.; see also, Cramp Shipbuilding Company v. Commissioner, 14 Tax Ct. 33 (1950). It is apparent from a review of Form 1902-B (Item 9, Govt. Ex.F) that it contains a mistake. On the cover letter, the document indicates that "a partial abatement is shown on the report enclosed or the remaining balance is due and payable immediately." On the next page, the report contains the mechanical computations showing an adjustment in income in favor of the taxpayer in the amount of $8,173 and an over-assessment in tax in the amount of $4,544. Then, the over-assessment is again entered under the column that is described as "overpayment." It is readily apparent that the IRS employee merely entered this figure on the wrong line and that additional tax was due for the year 1980. Furthermore, the record in this case shows that Plaintiffs were well aware that they had a net tax due for the year 1980. Plaintiffs agreed to settle their 1978 to 1982 tax cases with the IRS on September 26, 1985, some three weeks prior to the date of Form 1902-B. Form 1902-B merely constituted the mechanical computation based upon the prior settlement agreement. Thus, the alleged misrepresentation made by the IRS could have had no effect upon the Plaintiffs' decision to agree to settle that issue, and cannot provide a basis for a *131 refund of amounts paid pursuant to the settlement. Further support for this view is found in the first Form 1040X (Item 9, Gov't Ex.D), filed by Plaintiffs in June of 1985. In their cover letter enclosing the form, Plaintiffs recognized that, even if the IRS allowed their proposed deductions in full, additional tax and interest would remain due and owing for 1980. Thus, even if this error amounted to a "misrepresentation," it is apparent that it was not material because the Plaintiffs had previously agreed to the adjustments in the closing agreements and previously acknowledged that additional tax was due. In response, Plaintiffs have attempted to obfuscate the facts by intimating, but not specifically stating, that the alleged misrepresentations may have occurred prior to September 26, 1985, the date Plaintiffs accepted IRS's offer to settle their 1980 case (Item 9, Gov't Ex.E). However, when specifically questioned on this point at oral argument, Plaintiffs' counsel could only cite the affidavit of Benjamin J. Andrews, dated October 3, 1991, in support of this position. Nothing in the Andrews affidavit provides any time frame when the alleged misrepresentation was made. Moreover, the attachment to Form 1040X (id., Gov't Ex.H), filed by Plaintiffs and quoted above at length, states that the Plaintiffs were told the total cost would be $27,000 at the time that they settled their case. Plaintiffs also contended at oral argument that the document by which Plaintiffs accepted the IRS's offer of settlement (Item 9, Gov't Ex.E) was executed with the implicit understanding that it would not be binding. However, there is nothing in the Andrews affidavit or in any other part of the record which would support this position. To the contrary, as already noted, in June of 1985, Plaintiffs clearly contemplated additional tax due and owing for 1980. But, even if Plaintiffs had successfully disputed the timing of the alleged misrepresentations, such that they could establish a basis for contending that the closing agreements should be set aside, it would nevertheless be insufficient to defeat the motion for summary judgment. Plaintiffs do not assert that their deductions for losses relating to LHA should have been allowed by the IRS in full. See Jones v. Liberty Glass Co., 332 U.S. 524, 531, 68 S.Ct. 229, 232, 92 L.Ed. 142 (1947). As a matter of law, Plaintiffs cannot establish an overpayment which should be refunded to them. In establishing an overpayment, Plaintiffs are limited to the grounds set forth in their claims for a refund. See, e.g., United States v. Felt & Tarrant Co., 283 U.S. 269, 51 S.Ct. 376, 75 L.Ed. 1025 (1931); Ronald Press v. Shea, 114 F.2d 453 (2d Cir.1940). In the second Form 1040X, filed on September 25, 1986, Plaintiffs' sole contention is an estoppel claim — i.e., "[t]he amounts allegedly owed for 1980, 1981 and 1982 are in excess of those amounts which the Andrews were told would be owed when they settled the case" (Item 9, Gov't Ex.H). Thus, Plaintiffs contend that they are entitled to a refund of taxes due for 1980 based on an alleged miscalculation of tax due with respect to the settlement agreement for 1978 to 1982, such that they were induced to settle with the IRS for those years based on incorrect information provided by the IRS. This claim sounds only in estoppel. This claim must fail for a number of reasons. First, the essential elements of estoppel are missing. Heckler v. Community Health Services, 467 U.S. 51, 59, 104 S.Ct. 2218, 2223, 81 L.Ed.2d 42 (1984). The settlement was agreed upon before the computation was made and therefore there could be no reasonable reliance. In addition, any misrepresentation was one of law — i.e., the legal computation of the agreed upon deduction — not one of fact. Finally, Plaintiffs cannot show that they changed their position for the worse in reliance on advice from the IRS. To the contrary, all indications are that Plaintiffs did know of this IRS mistake because they acknowledged that taxes were due as early as June of 1985 (see Ex.D). *132 But even if the required elements of estoppel were present in this case, estoppel will not lie against the United States under the circumstances presented. Office of Personnel Management v. Richmond, 496 U.S. 414, 110 S.Ct. 2465, 110 L.Ed.2d 387 (1990). There, the Supreme Court held that erroneous advice given by a government employee concerning a claimant's eligibility for disability benefits did not estop the Government from denying benefits not otherwise permitted by law. The Court noted that it was undisputed that the award sought by the claimant was in direct contravention of the federal statute. Relying on the Appropriations Clause of the Constitution, the Supreme Court refused to apply the equitable doctrine of estoppel because the payment of public funds had not been authorized by Congress. Id., 496 U.S. at 426, 110 S.Ct. at 2472. The Court stated: Extended to its logical conclusion, operation of estoppel against the Government in the context of payment of money from the Treasury could in fact render the Appropriations Clause a nullity. If agents of the Executive were able, by their unauthorized oral or written statements to citizens, to obligate the Treasury for the payment of funds, the control over public funds that the Clause reposes in Congress in effect could be transferred to the Executive. . . . . . As for monetary claims, it is enough to say that this Court has never upheld an assertion of estoppel against the Government by a claimant seeking public funds. In this context there can be no estoppel, for courts cannot estop the Constitution. Id., 496 U.S. at 428, 434, 110 S.Ct. at 2473, 2476; accord, Heckler v. Community Health Services, 467 U.S. 51, 104 S.Ct. 2218, 81 L.Ed.2d 42 (1984) (government cannot be estopped from recovering medicare overpayments even though recipient relied on express authorization of government agent in making expenditures). This case is on all fours with Richmond and Heckler. Here, Plaintiffs cannot show an entitlement under the Internal Revenue Code to the refund they seek. Since Plaintiffs' claim has not been authorized by an Act of Congress, it is prohibited by the Appropriations Clause. The final argument made by Plaintiffs relates to the statute of limitations. Plaintiffs consented to waive the statute of limitations for assessment under 26 U.S.C. § 6501(a) by filing Forms 872-a (Special Consent to Extend the Time to Assess Tax), which consents were terminated by assessments of tax deficiencies for 1978 to 1982. Plaintiffs argue that those assessments were illegal or erroneous, and that because the consents were terminated, it is now too late to make a correct assessment. This argument is without merit. Plaintiffs must demonstrate that they have overpaid a certain amount of tax in order to be entitled to a refund of that overpayment. Plaintiffs are not entitled to have the entire assessment invalidated. United States v. Schroeder, 900 F.2d 1144, 1148 (7th Cir.1990). The case cited by Plaintiffs, Roszkos v. Commissioner, 850 F.2d 514 (9th Cir.1988), does not support their theory. Roszkos merely held that an invalid notice of deficiency issued by the IRS did not terminate the taxpayer's consent to extend the statute of limitations on assessment. It has no applicability to the facts before this Court. Moreover, Section 6501 does not forbid the Government from collecting and retaining taxes voluntarily paid without assessment and which do not constitute an overpayment. Ewing v. U.S., 914 F.2d 499, 503-504 (4th Cir.1990). Thus, even if the assessments were invalid, because the Plaintiffs voluntarily paid the tax and have not established any overpayment, the Government is entitled to retain those amounts as a matter of law. For the foregoing reasons, it is recommended that summary judgment be granted to the Government. Pursuant to 28 U.S.C. § 636(b)(1), it is hereby ORDERED, that this Report and Recommendation be filed with the Clerk of the Court. *133 ANY OBJECTIONS to this Report and Recommendation must be filed with the Clerk of this Court within ten (10) days after being served with this Report and Recommendation in accordance with the above statute, Fed.R.Civ.P. 72(b) and Local Rule 30(a)(3). Failure to file objections within the specified time or to request an extension of such time waives the right to appeal the District Court's Order. Thomas v. Arn, 474 U.S. 140, 106 S.Ct. 466, 88 L.Ed.2d 435 (1985); Wesolek, et al. v. Canadair Ltd., et al., 838 F.2d 55 (2d Cir.1988). The parties are reminded that, pursuant to Rule 30(a)(3) of the Local Rules for the Western District of New York, "written objections shall specifically identify the portions of the proposed findings and recommendations to which objection is made and the basis for such objection and shall be supported by legal authority." Failure to comply with the provisions of Rule 30(a)(3), or with the similar provisions of Rule 30(a)(2) (concerning objections to a Magistrate Judge's Decision and Order), may result in the District Court's refusal to consider the objection. Let the Clerk send a copy of this Order and a copy of the Report and Recommendation to the attorneys for the Plaintiff and the Defendants. SO ORDERED. NOTES [1] The closing documents themselves do not specify the total tax bill.
Low
[ 0.5107758620689651, 29.625, 28.375 ]
Folding bikes are usually heavy and ride funny due to their smaller wheels. This lightweight but strong folding bike prototype uses helical hinges to help it fold down to almost the size of the full-sized wheels.
Mid
[ 0.544600938967136, 29, 24.25 ]
Khypar Khypar (, lit. News) is a Chuvash language newspaper. It was founded in 1906 in Kazan, moving to Cheboksary in 1918. Previous names: «Канаш», «Чăваш коммунĕ», «Коммунизм ялавĕ». It received the current name on 30 August 1990. Newspaper's founder and first editor N. Nikolsky defined the main task - to serve the Chuvash people. Links Official site Страница газеты на портале «СМИ Чувашии» Category:Newspapers published in Russia Category:Newspapers published in the Soviet Union Category:Chuvash-language media Category:Media in Cheboksary
Mid
[ 0.593495934959349, 27.375, 18.75 ]
package cloudcallcenter //Licensed under the Apache License, Version 2.0 (the "License"); //you may not use this file except in compliance with the License. //You may obtain a copy of the License at // //http://www.apache.org/licenses/LICENSE-2.0 // //Unless required by applicable law or agreed to in writing, software //distributed under the License is distributed on an "AS IS" BASIS, //WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. //See the License for the specific language governing permissions and //limitations under the License. // // Code generated by Alibaba Cloud SDK Code Generator. // Changes may cause incorrect behavior and will be lost if the code is regenerated. import ( "github.com/aliyun/alibaba-cloud-sdk-go/sdk/requests" "github.com/aliyun/alibaba-cloud-sdk-go/sdk/responses" ) // QueryNumber400RealName invokes the cloudcallcenter.QueryNumber400RealName API synchronously // api document: https://help.aliyun.com/api/cloudcallcenter/querynumber400realname.html func (client *Client) QueryNumber400RealName(request *QueryNumber400RealNameRequest) (response *QueryNumber400RealNameResponse, err error) { response = CreateQueryNumber400RealNameResponse() err = client.DoAction(request, response) return } // QueryNumber400RealNameWithChan invokes the cloudcallcenter.QueryNumber400RealName API asynchronously // api document: https://help.aliyun.com/api/cloudcallcenter/querynumber400realname.html // asynchronous document: https://help.aliyun.com/document_detail/66220.html func (client *Client) QueryNumber400RealNameWithChan(request *QueryNumber400RealNameRequest) (<-chan *QueryNumber400RealNameResponse, <-chan error) { responseChan := make(chan *QueryNumber400RealNameResponse, 1) errChan := make(chan error, 1) err := client.AddAsyncTask(func() { defer close(responseChan) defer close(errChan) response, err := client.QueryNumber400RealName(request) if err != nil { errChan <- err } else { responseChan <- response } }) if err != nil { errChan <- err close(responseChan) close(errChan) } return responseChan, errChan } // QueryNumber400RealNameWithCallback invokes the cloudcallcenter.QueryNumber400RealName API asynchronously // api document: https://help.aliyun.com/api/cloudcallcenter/querynumber400realname.html // asynchronous document: https://help.aliyun.com/document_detail/66220.html func (client *Client) QueryNumber400RealNameWithCallback(request *QueryNumber400RealNameRequest, callback func(response *QueryNumber400RealNameResponse, err error)) <-chan int { result := make(chan int, 1) err := client.AddAsyncTask(func() { var response *QueryNumber400RealNameResponse var err error defer close(result) response, err = client.QueryNumber400RealName(request) callback(response, err) result <- 1 }) if err != nil { defer close(result) callback(nil, err) result <- 0 } return result } // QueryNumber400RealNameRequest is the request struct for api QueryNumber400RealName type QueryNumber400RealNameRequest struct { *requests.RpcRequest PageSize requests.Integer `position:"Query" name:"PageSize"` CurrentPage requests.Integer `position:"Query" name:"CurrentPage"` Status string `position:"Query" name:"Status"` } // QueryNumber400RealNameResponse is the response struct for api QueryNumber400RealName type QueryNumber400RealNameResponse struct { *responses.BaseResponse RequestId string `json:"RequestId" xml:"RequestId"` Success bool `json:"Success" xml:"Success"` Code string `json:"Code" xml:"Code"` Message string `json:"Message" xml:"Message"` HttpStatusCode int `json:"HttpStatusCode" xml:"HttpStatusCode"` Data DataInQueryNumber400RealName `json:"Data" xml:"Data"` } // CreateQueryNumber400RealNameRequest creates a request to invoke QueryNumber400RealName API func CreateQueryNumber400RealNameRequest() (request *QueryNumber400RealNameRequest) { request = &QueryNumber400RealNameRequest{ RpcRequest: &requests.RpcRequest{}, } request.InitWithApiInfo("CloudCallCenter", "2017-07-05", "QueryNumber400RealName", "", "") request.Method = requests.POST return } // CreateQueryNumber400RealNameResponse creates a response to parse from QueryNumber400RealName response func CreateQueryNumber400RealNameResponse() (response *QueryNumber400RealNameResponse) { response = &QueryNumber400RealNameResponse{ BaseResponse: &responses.BaseResponse{}, } return }
Low
[ 0.508771929824561, 29, 28 ]
;===- ./lib/Target/PowerPC/TargetInfo/LLVMBuild.txt ------------*- Conf -*--===; ; ; The LLVM Compiler Infrastructure ; ; This file is distributed under the University of Illinois Open Source ; License. See LICENSE.TXT for details. ; ;===------------------------------------------------------------------------===; ; ; This is an LLVMBuild description file for the components in this subdirectory. ; ; For more information on the LLVMBuild system, please see: ; ; http://llvm.org/docs/LLVMBuild.html ; ;===------------------------------------------------------------------------===; [component_0] type = Library name = PowerPCInfo parent = PowerPC required_libraries = Support add_to_library_groups = PowerPC
Low
[ 0.5219047619047611, 34.25, 31.375 ]
Please note that the kernel crypto API contains the AEAD givcrypt API (crypto_aead_giv* and aead_givcrypt* function calls in include/crypto/aead.h). This API is obsolete and will be removed in the future. To obtain the functionality of an AEAD cipher with internal IV generation, use the IV generator as a regular cipher. For example, rfc4106(gcm(aes)) is the AEAD cipher with external IV generation and seqniv(rfc4106(gcm(aes))) implies that the kernel crypto API generates the IV. Different IV generators are available.
Low
[ 0.50956937799043, 26.625, 25.625 ]
Cloning and expression of activation induced cytidine deaminase from Bos taurus. Activation induced cytidine deaminase is an enzyme crucial to somatic hypermutation and gene conversion, processes that are essential for the diversification of Ig V genes. The bovine Ig repertoire appears to be diversified by mechanisms that are significantly different to those that operate in humans and mice. This study set out to test the hypothesis that differences in the organization, coding sequence, expression or genomic location of the bovine AICDA gene enables the encoded enzyme to catalyse the unusual Ig diversification mechanism seen in cattle as well as conventional antigen-driven mutation. Characterization of bovine AICDA excluded the first two possibilities. AICDA expression was detected in lymphoid tissues from neonatal and older cattle, but AICDA cDNA could not be detected in muscle tissue. The pattern of gene expression did not therefore differ from that in other vertebrates. The AICDA cDNA was cloned and expressed successfully in Escherichia coli generating a phenotype consistent with the mutating action of this deaminase. Using a whole genome radiation hybrid panel, bovine AICDA was mapped to a region of bovine chromosome 5 syntenic with the location of human AICDA on chromosome 12. We conclude that the unusual nature of Ig diversification in cattle is unlikely to be attributable to the structure, sequence, activity or genomic location of bovine AICDA.
Mid
[ 0.6374695863746951, 32.75, 18.625 ]
User login warning: Parameter 2 to ed_classified_link_alter() expected to be a reference, value given in /home/soloneconomist/www/www/includes/common.inc on line 2968. warning: Parameter 2 to ed_classified_link_alter() expected to be a reference, value given in /home/soloneconomist/www/www/includes/common.inc on line 2968. Actor Kirk Cameron to keynote Heritage school fundraiser Submitted by admin on Mon, 02/06/2012 - 11:00pm CORALVILLE– Heritage Christian School will hold the Heritage Christian School Educating for Eternity fundraising event on Saturday, Feb. 25, at the Marriott Hotel Ballroom, 300 E. Ninth St., Coralville. Everyone is invited. The reception and chance to meet the teachers is at 5:30 p.m., with the full dinner followed by Kirk Cameron, at 6:20 p.m. Tickets are $35 per person. Call 319-626-4777 for more information. Kirk Cameron is a television and film actor, noted recently for his work in the inspirational film, “Fireproof.” He is also known for his memorable roles on ABC’s “Growing Pains,” the “Left Behind” movies, and co-host of “The Way of the Master” television series. Cameron spends much of his time producing new television and film projects and speaking to people around the country, teaching them how to share their faith and live out a gospel centered marriage and family. At the end of the evening attendees will be given the opportunity to pledge support for Heritage Christian School.
Low
[ 0.53012048192771, 33, 29.25 ]
Tennessee Titans general manager Ruston Webster said this week that wide receiver Kenny Britt is recovering well from the knee injury that prematurely ended his season, and should be ready by the start of the preseason. "Kenny's been working hard, and he's coming fast, probably even a little faster than I thought he would, so I'm real happy about that," the general manager said. "We expect to have him out there for training camp. "The good thing about this injury, if there was a good thing, is it happened early. And he's a very strong young man and bounces back pretty quickly from these things." Britt had surgery on the anterior cruciate and medial collateral ligaments that he tore in September, knocking him out for the rest of the 2011 season. Prior to his injury, Britt had recorded 17 catches for 289 yards and three touchdowns in three games. Since being picked in the first round by the Titans in the 2009 NFL Draft, Britt has 101 catches for 1,765 yards and 15 touchdowns in three seasons.
Mid
[ 0.569789674952198, 37.25, 28.125 ]
<?xml version="1.0" encoding="UTF-8"?> <interface> <!-- interface-requires gtk+ 2.12 --> <!-- interface-requires kiwiwidgets 0.0 --> <!-- interface-naming-policy toplevel-contextual --> <object class="GtkWindow" id="DeviceSettingsEditor"> <property name="can_focus">True</property> <property name="default_width">440</property> <property name="default_height">250</property> <child> <object class="GtkTable" id="table1"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="border_width">6</property> <property name="n_rows">5</property> <property name="n_columns">4</property> <property name="column_spacing">6</property> <property name="row_spacing">6</property> <child> <object class="GtkLabel" id="label5"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Device Type:</property> </object> <packing> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkAlignment" id="alignment1"> <property name="visible">True</property> <property name="can_focus">True</property> <child> <object class="GtkHSeparator" id="hseparator1"> <property name="visible">True</property> <property name="can_focus">True</property> </object> </child> </object> <packing> <property name="right_attach">4</property> <property name="top_attach">1</property> <property name="bottom_attach">2</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label6"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Brand:</property> </object> <packing> <property name="top_attach">2</property> <property name="bottom_attach">3</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label7"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Port:</property> </object> <packing> <property name="top_attach">3</property> <property name="bottom_attach">4</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyComboBox" id="type_combo"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">int</property> <property name="model_attribute">type</property> </object> <packing> <property name="left_attach">1</property> <property name="right_attach">2</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyComboBox" id="brand_combo"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">str</property> <property name="model_attribute">brand</property> </object> <packing> <property name="left_attach">1</property> <property name="right_attach">2</property> <property name="top_attach">2</property> <property name="bottom_attach">3</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyComboBox" id="device_combo"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">str</property> <property name="model_attribute">device_name</property> </object> <packing> <property name="left_attach">1</property> <property name="right_attach">2</property> <property name="top_attach">3</property> <property name="bottom_attach">4</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label10"> <property name="visible">True</property> <property name="can_focus">True</property> </object> <packing> <property name="left_attach">2</property> <property name="right_attach">4</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label8"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Model:</property> </object> <packing> <property name="left_attach">2</property> <property name="right_attach">3</property> <property name="top_attach">2</property> <property name="bottom_attach">3</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label9"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Host:</property> </object> <packing> <property name="left_attach">2</property> <property name="right_attach">3</property> <property name="top_attach">3</property> <property name="bottom_attach">4</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyComboBox" id="model_combo"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">str</property> <property name="model_attribute">model</property> </object> <packing> <property name="left_attach">3</property> <property name="right_attach">4</property> <property name="top_attach">2</property> <property name="bottom_attach">3</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyComboEntry" id="station"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">object</property> <property name="mandatory">True</property> <property name="model_attribute">station</property> </object> <packing> <property name="left_attach">3</property> <property name="right_attach">4</property> <property name="top_attach">3</property> <property name="bottom_attach">4</property> <property name="x_options">GTK_FILL</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="ProxyCheckButton" id="is_active_button"> <property name="label" translatable="yes">Active</property> <property name="visible">True</property> <property name="can_focus">True</property> <property name="receives_default">False</property> <property name="use_action_appearance">False</property> <property name="draw_indicator">True</property> <property name="data_type">bool</property> <property name="model_attribute">is_active</property> </object> <packing> <property name="left_attach">2</property> <property name="right_attach">4</property> <property name="top_attach">4</property> <property name="bottom_attach">5</property> <property name="y_options">GTK_FILL</property> </packing> </child> <child> <object class="GtkLabel" id="label1"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="xalign">1</property> <property name="label" translatable="yes">Baudrate:</property> </object> <packing> <property name="top_attach">4</property> <property name="bottom_attach">5</property> </packing> </child> <child> <object class="ProxyComboBox" id="baudrate"> <property name="visible">True</property> <property name="can_focus">True</property> <property name="data_type">int</property> </object> <packing> <property name="left_attach">1</property> <property name="right_attach">2</property> <property name="top_attach">4</property> <property name="bottom_attach">5</property> </packing> </child> </object> </child> </object> </interface>
Mid
[ 0.566448801742919, 32.5, 24.875 ]
--- abstract: | We study entire functions whose zeros and one-points lie on distinct finite systems of rays. General restrictions on these rays are obtained. In particular, we show that the zeros and one-points can lie on two different lines only for quadratic polynomials and exponential functions. Non-trivial examples of entire functions with zeros and one-points on different rays are constructed, using the Stokes phenomenon for second order linear differential equations. MSC 2010: 30D20, 30D35, 34M40, 30D05. Keywords: entire function, radially distributed value, linearly distributed value, value distribution, linear differential equation, Stokes phenomenon, spectral determinants. author: - 'Walter Bergweiler, Alexandre Eremenko[^1]$\;$ and Aimo Hinkkanen' title: Entire functions with two radially distributed values --- Introduction {#sec1} ============ The zeros of an entire function can be arbitrarily assigned, but in general one cannot assign the preimages of two values [@Nev]. Since this work of Nevanlinna, various necessary conditions which the sets of zeros and $1$-points of an entire function must satisfy were found; see, e.g., [@Ozawa; @RubelYang; @Winkler]. Besides an intrinsic interest, these conditions are relevant to control theory [@Bl; @BE; @E]. In this paper we study the simplest setting when the zeros and $1$-points lie on finitely many rays, or are close to finitely many rays. We begin by recalling some classical results. The word “ray” in this paper will always mean a ray from the origin. For an entire function $f$, we say that a value $a$ is [*radially distributed*]{} if the set $f^{-1}(a)$ is contained in the union of finitely many rays. [(A. Edrei [@Edr])]{} Suppose that all zeros and $1$-points of an entire function $f$ are distributed on a finite set of rays, and let $\omega$ be the smallest angle between these rays. Then the order of $f$ is at most $\pi/\omega$. [(I. N. Baker [@Ba], T. Kobayashi [@Kob])]{} Suppose that all zeros of a transcendental entire function $f$ lie on a line $L_1$ and all $1$-points lie on a different line $L_2$ parallel to $L_1$. Then $f(z)=P(e^{az})$ with some $a\in\C$ and a polynomial $P$. We complement the theorem of Baker and Kobayashi with the following result. \[thm1\] Suppose that all zeros of an entire function $f$ lie on a line $L_1$ and all $1$-points lie on a different line $L_2$ intersecting $L_1$. Then $f$ is either of the form $f(z)=e^{az+b}$ or $f(z)=1-e^{az+b}$, or a polynomial of degree at most $2$. As a corollary we obtain that if the zeros and $1$-points of an entire function $f$ lie on two distinct rays, then $f$ is a polynomial of degree at most $2$. It is remarkable that there are non-trivial examples of entire functions whose zeros lie on the positive ray and all $1$-points lie on two rays that are not contained in the real line. \[thm2\] For every integer $m\geq 3$, there exists an entire function $f$ of order $1/2+1/m$ whose zeros are positive and whose $1$-points lie on the two rays $\left\{ z \colon \arg z=\pm 2\pi/(m+2)\right\}$. Theorem \[thm1\] implies that such functions do not exist for $m=2$. Taking $f(z^n)$ we obtain an entire function whose zeros lie on $n$ rays and whose $1$-points lie on $2n$ rays distinct from those rays where the zeros lie. Now we relax the condition that the zeros and $1$-points are radially distributed. We use the standard notation of the theory of entire and meromorphic functions [@GO]. Let $$A=\bigcup_{j=1}^n A_j,\quad A_j=\{ te^{i\alpha_j} \colon t\geq 0\}, \quad 0\leq \alpha_1\ldots<\alpha_n<2\pi,$$ be a finite union of rays. For $\varepsilon>0$ let $A_\varepsilon$ be the union of the sectors $$A_\varepsilon=\bigcup_{j=1}^n\{ z \colon |\arg z-\alpha_j|<\varepsilon\}.$$ We say that the $a$-points of an entire function $f$ are [*close*]{} to the set $A$ if, for every $\varepsilon>0$, we have $$n(r,\C\backslash A_\varepsilon,a,f)=o(\log M(r)),\quad r\to\infty,$$ where the left hand side is the number of $a$-points in $\{ z\in \C\backslash A_\varepsilon \colon |z|\leq r\}$ and $M(r)=\max \{ |f(z)| \colon |z|\leq r \} $. Our next result concerns the situation when the zeros are close to a finite union of rays $A$ and the $1$-points are close to a finite union of rays $B$, where the sets $A$ and $B$ are disjoint, apart from the origin. We will assume that the system of rays $A\cup B$ is [*minimal*]{} is the sense that for every ray $\{ t e^{i\alpha}\colon t\geq0\}\subset A\cup B$ there is a sequence $(z_k)$ tending to $\infty$ such that $f(z_k)\in\{0,1\}$ for all $k$ and $\arg z_k\to \alpha$ as $k\to\infty$. \[thm3\] Let $f$ be a transcendental entire function of order $\rho<\infty$ whose zeros are close to $A$ and whose $1$-points are close to $B$, with $A\cap B=\{ 0 \} $. Suppose that the system $A\cup B$ is minimal. Then $$\label{piomega} \rho=\frac{\pi}{\omega}>\frac12,$$ where $\omega$ is the [*largest*]{} angle between adjacent rays in $A\cup B$, and there exists a system of rays $C=\bigcup_{j=1}^{2m}C_j \subset A\cup B$, with $m\geq 1$, partitioning the plane into $2m$ sectors $S_j$ such that $\partial S_j=C_j\cup C_{j+1}$ for $1\leq j \leq 2m-1$ and $\partial S_{2m} = C_{2m} \cup C_1$, with the following properties: $(i)$ The angle of $S_j$ at $0$ is $\pi/\rho$ when $j$ is even, and at most $\pi/\rho$ when $j$ is odd. $(ii)$ Both boundary rays of an odd sector belong to the same set, $A$ or $B$. $(iii)$ There are no rays of $A\cup B$ inside the even sectors. $(iv)$ If there are rays of $A$ inside an odd sector, then the boundary rays of this sector belong to $B$. If there are rays of $B$ inside an odd sector, then the boundary rays of this sector belong to $A$. $(v)$ If there are no rays of $A\cup B$ in an odd sector, then its opening angle is $\pi/\rho$. The next result – whose proof we will only sketch – shows that Theorem \[thm3\] is best possible. \[thm4\] Let $A$ and $B$ be systems of rays, satisfying conditions $(i)$–$(v)$ of Theorem $\ref{thm3}$ for some $\rho\in(0,\infty)$. Then there exists an entire function of order $\rho$ whose zeros are close to $A$ and whose $1$-points are close to $B$. Moreover, for all finite systems of rays $A$ and $B$ there exists an entire function of infinite order whose zeros are close to $A$ and whose $1$-points are close to $B$. We illustrate our results by considering the case of three distinct rays. First we note the following consequence of Theorems \[thm1\] and \[thm3\]. Let $f$ be a transcendental entire function whose zeros lie on a ray $L_0$ and whose $1$-points lie on two rays $L_1$ and $L_{-1}$. Suppose that the numbers of zeros and $1$-points are infinite. Then $\angle(L_0,L_1)=\angle(L_0,L_{-1})<\pi/2$. Now we consider three rays $$L_j=\{ te^{ij\alpha}:t\geq 0\},\quad j\in\{-1,0,1\},$$ with $\alpha\in (0,\pi)$. Theorems \[thm1\]–\[thm3\] imply the following: Theorem \[thm2\] shows that for certain $\alpha\in(0,\pi/2)$ there exists a transcendental entire function of order $\pi/(2\pi-2\alpha)$ whose zeros lie on $L_0$ while its $1$-points lie on $L_1\cup L_{-1}$. It remains open whether this holds for all $\alpha\in(0,\pi/2)$; see the discussion at the end of the paper on possible generalizations of this theorem. If $\alpha=\pi/2$, then, according to Theorem \[thm1\], there is no transcendental entire function with infinitely many zeros on $L_0$ and infinitely many $1$-points on $L_1\cup L_{-1}$. However, the entire function $f(z)=1/\Gamma(-z)$ has zeros on $L_0$ and $1$-points close to the imaginary axis. This follows from Stirling’s formula. Finally, Theorem \[thm3\] implies that if $\alpha\in (\pi/2,\pi)$, then there is no transcendental entire function whose zeros are close to $L_0$ and whose $1$-points are close to $L_1\cup L_{-1}$. Theorems \[thm1\] and \[thm2\] answer questions 3.1 and 3.2 asked by Gary Gundersen in [@Gunder]. We thank him for drawing our attention to these questions and for interesting discussions which stimulated this work. The plan of the paper is the following. In section \[sec2\] we prove Theorem \[thm3\] and the corollary. The proof of Theorem \[thm4\] showing the sharpness of Theorem \[thm3\] is then sketched in section \[proofthm4\]. In section \[sec3\] we will use Theorem \[thm3\] to prove Theorem \[thm1\]. The proof of Theorem \[thm2\] is independent of the rest and will be given in section \[sec4\]. Proof of Theorem \[thm3\] and the corollary {#sec2} =========================================== *Proof of Theorem* [\[thm3\]]{}. If the $a$-points of $f$ are close to a finite system of rays, then evidently $f(z+c)$ has the same property for every $c\in\C$, with the same rays. Therefore we may assume without loss of generality that $$\label{B} f(0)\not\in\{0,1\}.$$ Let $(r_k)$ be a sequence tending to $\infty$ with the property that $$\label{A} \log M(tr_k)=O(\log M(r_k)),\quad k\to\infty,$$ for every $t>0$. Such sequences always exist for functions of finite order. A sequence $(r_k)$ is called a sequence of [*Pólya peaks of order $\lambda\in [0,\infty)$*]{} for $\log M(r)$, if for every $\varepsilon>0$ we have $$\label{pp} \log M(tr_k)\leq (1+\varepsilon)t^{\lambda}\log M(r_k), \quad \varepsilon\leq t\leq \varepsilon^{-1},$$ when $k$ is large enough. It is clear that every sequence of Pólya peaks satisfies (\[A\]). According to a result of Drasin and Shea [@DS], Pólya peaks of order $\lambda$ exist for all finite $\lambda\in[\rho_*,\rho^*]$, where $$\label{rho1} \rho^*=\sup\left\{ p>0 \colon \limsup_{r,A\to\infty} \frac{\log M(Ar)}{A^p\log M(r)}=\infty\right\}$$ and $$\rho_*=\inf\left\{ p>0 \colon \liminf_{r,A\to\infty} \frac{\log M(Ar)}{A^p\log M(r)}=0\right\}.$$ We always have $$0\leq\rho_*\leq\rho\leq\rho^*\leq\infty,$$ so when $\rho<\infty$, then there exist Pólya peaks of some (finite) order $\lambda$. We refer to [@Hor Ch. III], [@Hor2 Ch. III] and [@Ran] for the basic results on subharmonic functions used below. Fixing a sequence $(r_k)$ with the property (\[A\]), we consider the two sequences $(u_k)$ and $(v_k)$ of subharmonic functions given by $$u_k(z) = \frac{\log|f(r_kz)|}{\log M(r_k)}\quad\mbox{and}\quad v_k(z) = \frac{\log|f(r_kz)-1|}{\log M(r_k)}.$$ In view of (\[A\]), these sequences are bounded from above on every compact subset of $\C$. It follows from (\[B\]) that the sequences $u_k(0)$ and $v_k(0)$ tend to $0$. According to a well known compactness principle (see, for example, [@Hor Theorems 4.1.8, 4.1.9] or [@Hor2 Theorems 3.2.12, 3.2.13]), one can choose a subsequence of $(r_k)$, which we do without changing notation, such that the limit functions $$\label{lim} u(z)=\lim_{k\to\infty}\frac{\log|f(r_kz)|}{\log M(r_k)}\quad\mbox{and}\quad v(z)=\lim_{k\to\infty}\frac{\log|f(r_kz)-1|}{\log M(r_k)}$$ exist and are subharmonic. Here the convergence is in the Schwartz space $\mathscr{D}'$. It implies the convergence of the Riesz measures, as the Laplacian is continuous in $\mathscr{D}'$. The functions $u$ and $v$ are non-zero subharmonic functions, and they have the following properties: $(a)$ $u^+=v^+$. $(b)$ $\{ z \colon u(z)<0\}\cap\{ z \colon v(z)<0\}=\emptyset$. $(c)$ $u$ is harmonic in $\C\backslash A$ and $v$ is harmonic in $\C\backslash B$. If $(r_k)$ is a sequence of Pólya peaks of order $\lambda>0$, then we have the additional property $(d)$ $u(0)=v(0)=0$, and $\max\{u(z),v(z)\}\leq |z|^\lambda$ for all $z\in {\mathbb C}$. Properties $(a)$ and $(b)$ are evident. Property $(c)$ holds because the Laplacian is continuous in $\mathscr{D}^\prime$. Property $(d)$ is a consequence of (\[B\]) and (\[pp\]). Indeed, (\[B\]) and $$u(0)\geq\limsup_{k\to\infty} u_k(0),$$ (see [@Hor (4.1.8)]) imply that $u(0)\geq 0$, while (\[pp\]) yields $u(z)\leq|z|^\lambda$ and thus, in particular, $u(0)=0$. The same argument applies to $v$. The components of the complement $\C\backslash(A\cup B)$ will be called [*sectors of the system*]{} $A\cup B$. \[le1\] Let $u$ and $v$ be two non-zero subharmonic functions in the plane which satisfy $(a)$, $(b)$ and $(c)$. Then either $u(z)\equiv v(z)\equiv c$ for some $c>0$, or there exist an even number of rays $C_1,\ldots,C_{2m}$, with $m\geq 1$, that belong to $A\cup B$ and partition the plane into sectors $S_j$, so that $\partial S_j=C_j\cup C_{j+1}$ for $1\leq j\leq 2m-1$ and $\partial S_{2m}= C_{2m}\cup C_1$, such that $u(z)=v(z)>0$ for $z$ in the even sectors while $u(z)\leq 0$ and $v(z)\leq 0$ for $z$ in the odd sectors. If $u$ and $v$ are given by , where $f$ is the function from Theorem [[\[thm3\]]{}]{} and $(r_k)$ is a sequence satisfying , then in each odd sector, one of the functions $u$ and $v$ is negative while the other one is equal to zero. Moreover, properties $(ii)$ and $(iv)$ of Theorem [[\[thm3\]]{}]{} hold. [*Proof of Lemma*]{} \[le1\]. If $D$ is a sector of the system $A\cup B$, and if at some point $z_0$ in $D$, we have $\max\{ u(z_0),v(z_0)\}>0$, then $u(z)=v(z)>0$ for all points $z\in D$. Indeed, both $u$ and $v$ are harmonic in $D$ by $(c)$, and $(a)$ gives $$\label{aa} u(z_0)=v(z_0)>0.$$ If $\min\{ u(z_1),v(z_1)\}<0$ for some $z_1\in D$, then this also holds in a neighborhood of $z_1$, and one of the functions $u$ and $v$ must be zero in this neighborhood by $(b)$. Then it is identically equal to zero in $D$ which contradicts (\[aa\]). Thus $u$ and $v$ are non-negative in $D$, and the minimum principle implies that they are positive. Then they are equal in $D$ by $(a)$. Such sectors $D$ will be called [*positive*]{} sectors. If one of the functions $u$ and $v$ is constant, then both functions are equal to the same positive constant. This follows from $(a)$ and $(b)$. For the rest of the proof we assume that they are non-constant. Suppose that some ray $L\subset A\cup B$ has the property that positive sectors $D_1$ and $D_2$ are adjacent to $L$ on both sides, that is, $L=\partial D_1\cap\partial D_2$. (We will see in a moment that $D_1\neq D_2$). Then we have $u(z)=v(z)$ for $z\in D=D_1\cup D_2\cup L$, in view of $(a)$, and $u$ and $v$ must be positive and harmonic in $D$ in view of $(c)$. If there are no non-positive sectors, then $u$ and $v$ are equal, positive and harmonic is $\C\backslash\{0\}$, which is impossible under the current assumption that they are non-constant. So there is at least one non-positive sector. In particular, $D_1\neq D_2$ in the previous paragraph. Let $D$ be a positive sector. Let $z_0$ be a point on $\partial D\cap\partial D'$, where $D'$ is a non-positive sector. This means that $u(z)\leq 0$ and $v(z)\leq 0$ in $D'$. Then $u(z_0)=v(z_0)=0$. Indeed, $u(z_0)=v(z_0)\geq 0$ by the upper semi-continuity of subharmonic functions. As $D'$ is not thin at $z_0$ (in the sense of potential theory, see [@Ran]) we obtain that $u(z_0)=v(z_0)=0$. Let $C$ be the union of those rays in $A\cup B$ which separate a positive and a non-positive sector. It follows from the above considerations that $C$ can be written in the form $C=\bigcup_{j=1}^{2m}C_j$, with $m\geq 1$, with rays $C_j\subset A\cup B$ so that in the sector $S_j$ between $C_j$ and $C_{j+1}$ the functions $u$ and $v$ are positive for even $j$ and non-positive for odd $j$. Moreover, we have $u(z)=v(z)=0$ for $z\in C$. Note that the sectors with respect to the system $C$ may be unions of several sectors and rays of the system $A\cup B$. Suppose now that $u$ and $v$ are given by (\[lim\]), where the sequence $(r_k)$ satisfies (\[A\]). Let $S_{2j-1}$ be an odd sector. Then $u(z)\leq 0$ in $S_{2j-1}$. If $u(z)=0$ in $S_{2j-1}$, then $u$ is not harmonic on either of the two rays in $\partial S_{2j-1}$, so $f$ has infinitely many zeros close to these two rays. Therefore $f$ cannot have infinitely many $1$-points close to either one of these two rays, and thus $v$ is harmonic in a neighborhood of $\partial S_{2j-1}\backslash \{0\}$. As $v(z)=0$ on $\partial S_{2j-1}$, we conclude that $v(z)<0$ in $S_{2j-1}$. The same argument applies with the roles of $u$ and $v$ interchanged. Thus in each odd sector $S_{2j-1}$ one of the two functions $u$ and $v$ is strictly negative, and the other function is equal to zero. If $u(z)<0$ in $S_{2j-1}$ then both rays of $\partial S_{2j-1}$ belong to $B$ and all rays of $A\cup B$, if any, inside $S_{2j-1}$ belong to $A$, and analogously if $v(z)<0$ in $S_{2j-1}$. This proves Lemma \[le1\]. We return to the proof of Theorem \[thm3\]. Lemma \[le1\] does not exclude the possibility that the set of rays $C_j$ is empty, and thus the whole plane coincides with one positive sector. In this case $u$ and $v$ are identically equal to the same positive constant. The following argument shows that this is impossible. We will in fact show that there are no rays of $A\cup B$ inside the even sectors $S_{2j}$, that is, the even sectors of the system $C$ coincide with the positive sectors of the system $A\cup B$. Consider an even sector $S_{2j}$. As $u$ is positive and harmonic in $S_{2j}$ and zero on the boundary, it must have the form $$\label{ord} u(re^{it})=c_jr^{\gamma_j}\cos(\gamma_j t-t_j),$$ where $\pi/\gamma_j$ is the angle of this sector at the origin. This can be seen by transforming the sector $S_{2j}$ to a half-plane, for which the result is standard [@Boas Theorem I]. For a given system $A\cup B$, there are only finitely many possibilities for these numbers $\gamma_j$. Thus if $(r_k)$ is a sequence of Pólya peaks of order $\lambda>0$, so that $(d)$ holds, we obtain by comparing $(d)$ with (\[ord\]) that $\gamma_j=\lambda$ for all $j$. As the possible values of $\lambda$ always fill a closed set $[\rho_*,\rho^*]$, where $\rho^*\leq+\infty$, we conclude that this closed set is degenerate to a point, that is, $\rho^*=\rho_*=\rho$. In particular, $\rho^*<\infty$, and (\[rho1\]) implies that [*every*]{} sequence $(r_k)$ tending to $\infty$ satisfies (\[pp\]). Also this shows that the angle of every even sector at the origin is equal to $\pi/\rho$, proving the first statement of $(i)$. For $r_0>0$ such that $M(r_0)>1$ we consider the curve mapping $[r_0,\infty)$ to $\mathscr{D}'\times\mathscr{D}'$ given by $$r\mapsto\left(\frac{\log|f(rz)|}{\log M(r)},\frac{\log|f(rz)-1|}{\log M(r)} \right).$$ Let $F$ be the limit set of this curve when $r\to\infty$. It consists of pairs $(u,v)$ satisfying $(a)$, $(b)$ and $(c)$ and thus satisfying the conclusions of Lemma \[le1\]. As a limit set of a curve, $F$ is connected. In each sector of the system $A\cup B$ either both of the functions $u$ and $v$ are positive, or one is negative. We conclude that the sectors $S_j$ can be chosen independently of the sequence $(r_k)$. Now suppose that a ray $L=\{ te^{i\beta} \colon t\geq 0\}$ of the set $A$ lies inside an even sector $S_{2j}$. By assumption, there is an infinite sequence of zeros $(z_k)$ of the form $z_k=r_ke^{i\beta_k}$ with $r_k\to\infty$ and $\beta_k\to \beta$. Passing to a subsequence we may assume that the limits in (\[lim\]) exist. Let $$u_k(z)=\frac{\log|f(r_kz)|}{\log M(r_k)}.$$ We have $u_k\to u$ in $\mathscr{D}'$. According to Azarin [@A], this convergence also holds in the following sense: for every $\varepsilon>0$ the set $$\{ z \colon |u(z)-u_k(z)|>\varepsilon\}$$ can be covered by discs the sum of whose radii is at most $\varepsilon$, when $k$ is large enough. Let $D$ be the closed disk with the center at $e^{i\beta}$ of radius $\delta$ so small that $D\subset S_{2j}$. Then $\mu:=\min\{ u(z) \colon z\in D\}>0$. Choosing $\varepsilon<\min\{\delta/2,\mu/2\}$ we see that, for each large $k$, there is a circle $T_k$ around $e^{i\beta}$ such that $z_k/r_k=e^{i\beta_k}\in B_k\subset D$, where $B_k$ is the disk with $T_k= \partial B_k$, and $$u_k(z)\geq \mu/2,\quad z\in T_k.$$ This means that $\log|f(z)|\geq(\mu/2)\log M(r_k)$ for $z$ on the circles $$\label{circ} \{ z \colon z/r_k\in T_k\}.$$ Each of these circles encloses a zero of $f$, namely $z_k$. Thus, by Rouche’s theorem, each of them also contains a $1$-point. This is a contradiction, because the circles (\[circ\]) remain inside closed subsectors of $S_{2j}$ that do not contain rays from $B$. A similar argument shows that there are no rays from $B$ inside any even sector $S_{2j}$. Thus no rays of the system $A\cup B$ are contained in the even sectors. As $f$ is transcendental, Picard’s theorem yields that the system $A\cup B$ contains at least one ray. We conclude that $u$ and $v$ are not constant, no matter what sequence $(r_k)$ was used to define them. This also implies (\[piomega\]), and proves $(iii)$ and the fact that the even sectors of the system $C$ coincide with the positive sectors of the system $A\cup B$. It remains to prove $(v)$ and the second statement of $(i)$. Let $S_{2j-1}$ be an odd sector with angle $\pi/\gamma$ at the origin. Let us consider again the limit functions $u$ and $v$ obtained from the Pólya peaks $r_k$. Then we have $(d)$ with $\lambda=\rho$. One of the two subharmonic functions, say $u$, is negative in $S_{2j-1}$, and zero on the boundary of $S_{2j-1}$. Let $h$ be the least harmonic majorant of $u$ in $G=S_{2j-1}\cap\{ z\colon |z|<1\}$. Then $h$ is a negative harmonic function in $G$, equal to zero on the straight segments of $\partial G$. Similarly as in  it follows that $$\int_{re^{it}\in G} h(re^{it})\, dt\leq -cr^\gamma, \quad r<1,$$ where $c>0$. Then $u$ satisfies the same inequality, and combined with property $(d)$ and using $$0=u(0)\leq\int_0^{2\pi}u(re^{it})\, dt$$ this implies that $\gamma\geq\rho$ so that $\pi/\gamma\leq\pi/\rho$. This proves the second part of $(i)$. Finally, if there are no rays of $A$ inside $S_{2j-1}$, then $u$ is harmonic in $S_{2j-1}$, so it is of the form (\[ord\]), and it is a harmonic continuation from an adjacent even sector, so we must have $\gamma=\rho$. A similar argument applies if $v$ is negative and there are no rays of $B$ inside $S_{2j-1}$. This proves $(v)$ and completes the proof of Theorem \[thm3\]. *Proof of the Corollary*. We assume without loss of generality that $L_0$ is the positive ray. The order of $f$ must be finite by Theorem A, so Theorem \[thm3\] is applicable. As there are only three rays, the number $m$ in Theorem \[thm3\] must be $1$. So we have one even sector of opening $\pi/\rho$ and one odd sector of opening at most $\pi/\rho$. In view of $(ii)$, the common boundary of the odd and even sector is $L_1\cup L_{-1}$. So $L_0$ lies inside the odd sector. Thus $\rho\leq 1$. The possibility that $\rho=1$ is excluded by (\[piomega\]) and Theorem 1. As $\rho<1$, the function $f$ is of genus zero and thus of the form $$f(z)=cg(z),\quad g(z)=z^n\prod_{j=1}^\infty\left(1-\frac{z}{z_k}\right),$$ where $n$ is a non-negative integer and $(z_k)$ is a sequence of positive numbers tending to $\infty$. If $c$ is real, we conclude that the rays $L_1$ and $L_{-1}$ are symmetric with respect to $L_0$ which proves the corollary in this case. Suppose now that $L_{1}$ and $L_{-1}$ are not symmetric with respect to $L_0$ so that $c$ is not real. Let us set $a=1/c$. Then $f(z)=1$ is equivalent to $g(z)=a$. We consider the function $h(z)=(g(z)-a)/(\overline{a}-a)$. In view of the symmetry of $g$, the zeros of $h$ lie on the rays $L_1$ and $L_{-1}$, while the $1$-points lie on the reflected rays $\overline{L_1}$ and $\overline{L_{-1}}$. Since $L_0$ lies in the odd sector, which has angle $<\pi$ at the origin, it follows that the two rays $L_1$, $L_{-1}$ are interlaced with the two rays $\overline{L_1}$, $\overline{L_{-1}}$. This contradicts $(ii)$ and $(iii)$ of Theorem \[thm3\], and completes the proof of the corollary. Sketch of the proof of Theorem \[thm4\] {#proofthm4} ======================================= We only indicate the construction of examples showing that Theorem \[thm3\] is best possible, as this construction is well-known, see for example [@Drasin], where a similar construction was used for the first time. We fix $\rho\in (1/2,\infty)$ and construct a $\rho$-trigonometrically convex function $h$ such that the union of the even sectors coincides with the set $$\{ re^{it}\colon r> 0,\; h(t)>0\},$$ and such that $h$ is trigonometric except at the arguments of some rays inside the odd sectors. If there are no rays of $A\cup B$ in the odd sectors at all, then $\rho$ must be an integer, and we just take $h$ to be of the form (\[ord\]) with $\gamma_j=\rho$. Then we discretize the Riesz mass of the subharmonic function $$w(re^{it})=r^\rho h(t),$$ as it is done in [@A], and obtain an entire function $g$ with zeros on some rays $A\cup B$ which lie in the odd sectors, and such that $$\lim_{r \to\infty}r^{-\rho}\log|f(rz)|=w(z).$$ If there are odd sectors with opening $\pi/\rho$, then $h$ must be trigonometric on the intervals corresponding to these sectors, so we multiply $f$ by a canonical product of order smaller than $\rho$ to achieve that $f$ has infinitely many zeros on all those rays of the system $A\cup B$ which belong to the odd sectors. Then we label the odd sectors with labels $0$ and $1$: if the boundary of an odd sector belongs to $A$, we label it with $1$, and if the boundary belongs to $B$ we label it with $0$. Let $S_j$ be an odd sector labeled with $1$. Consider the component $D_j$ of the set $\{ z \colon |f(z)|<2\}$ which is asymptotic to $S_j$. Let $p$ be a quasiconformal map of the disk $\{ z \colon |z|<2\}$ onto itself, equal to the identity mapping on the boundary, and such that $p(0)=1$, whose complex dilatation is supported by the set $\{ z \colon 3/2\leq |z|\leq 2\}$. We define $$G(z)=\left\{\begin{array}{ll} p(g(z)),& z\in\bigcup_j D_j,\\ g(z),&\mbox{otherwise}.\end{array}\right.$$ Here the union is over all odd sectors labeled with $1$. This $G$ is a quasiregular map of the plane, whose dilatation is supported by a small set $E$ in the sense that $$\int_E\frac{dxdy}{x^2+y^2}<\infty.$$ Then the theorem of Teichmüller–Wittich–Belinski [@LV §V.6] guarantees the existence of a quasiconformal map $\phi$ such that $f=G\circ\phi$ is an entire function, and $\phi(z)\sim z$ as $z\to\infty$. It is easy to verify that $f$ has all the required properties. For the construction of infinite order functions, let $A=\bigcup_{j=1}^m \{te^{i\alpha_j}\colon t\geq 0\}$ and $B=\bigcup_{k=1}^n \{te^{i\beta_k}\colon t\geq 0\}$ be two finite systems of rays with $A\cap B=\{0\}$. Again we only sketch the argument. First we note that by [@PolyaSzego Part III, Problems 158–160] there exists an entire function $E$ such that $z^2(E(z)+1/z)$ is bounded outside the half-strip $S=\{z\colon \re z> 0,|\im z|< \pi\}$. In particular, $E$ is bounded outside $S$. Considering $F(z)=\delta(E(z)-c)/((z-a)(z-b))$, where $\delta>0$ is small, $c\in\C$, and $a$ and $b$ are $c$-points of $E$, we obtain an entire function $F$ such that $$|F(z)|\leq \frac{1}{|z|^2} \leq \frac{1}{\dist(z,S)^2}, \quad z\notin S,$$ where $\dist(z,S)$ denotes the distance from $z$ to $S$. For some large $R>0$ we now consider the functions $$a_j(z)=1+z\exp F(e^{-i\alpha_j}z-R) \quad\text{and}\quad b_k(z)=z\exp F(e^{-i\beta_k}z-R).$$ With $S_j=\{e^{i\alpha_j}(z+R)\colon z\in S\}$ we find, noting that $|e^w-1|\leq 2|w|$ for $|w|\leq 1$, that $$\begin{aligned} |a_j(z)-z-1|&\leq \left|z\left(\exp F(e^{-i\alpha_j}z-R)-1\right)\right| \leq 2|z F(e^{-i\alpha_j}z-R)| \\ & \leq \frac{2|z|}{\dist(e^{-i\alpha_j}z-R,S)^2} = \frac{2|z|}{\dist(z,S_j)^2}, \quad z\notin S_j.\end{aligned}$$ Similarly, with $T_k=\{e^{i\beta_k}(z+R)\colon z\in S\}$ we have $$|b_k(z)-z| \leq \frac{2|z|}{\dist(z,T_k)^2}, \quad z\notin T_k.$$ We choose $\varepsilon>0$ so small that the sectors $U_j=\{z\colon |\arg(z- e^{i \alpha_j} R/2)-\alpha_j|\leq \varepsilon\}$ and $V_k=\{z\colon |\arg(z- e^{i \beta_k} R/2)-\beta_k|\leq \varepsilon\}$ are disjoint and put $$G(z)= \begin{cases} a_j(z), \quad z\in U_j,\\ b_k(z), \quad z\in V_k. \end{cases}$$ Then $$G(z)=z+O(1), \quad z\in \bigcup_{j=1}^m\partial U_j \cup \bigcup_{k=1}^n\partial V_k .$$ This allows to extend $G$ to a quasiregular map of the plane which satisfies $$G(z)=z+O(1), \quad z\in \C\backslash \left(\bigcup_{j=1}^m U_j \cup \bigcup_{k=1}^n V_k \right)$$ and whose dilatation $K_G$ satisfies $K_G(z)=1+O(1/|z|)$ as $z\to\infty$. Again the theorem of Teichmüller–Wittich–Belinski yields the existence of a quasiconformal map $\phi$ such that $f=G\circ\phi$ is entire and $\phi(z)\sim z$ as $z\to\infty$. It is not difficult to show that the zeros of $f$ are close to $A$ and the $1$-points of $f$ are close to $B$. We note that the method does not actually require that the rays that form $A$ are distinct from those that form $B$. Indeed, if we want that both zeros and $1$-points accumulate at $\{te^{i\alpha_j}\colon t\geq 0\}$, we only have to choose $a_j(z)=c+z\exp F(e^{-i\alpha_j}z-R)$ with a constant $c$ different from $0$ and $1$. Proof of Theorem \[thm1\] {#sec3} ========================= According to Theorem A, the order $\rho$ of $f$ is finite. First we deal with the case when $f$ is a polynomial, following Baker [@Ba0]. Without loss of generality, we may assume that $L_1$ is the real line. Then $f=cg$, where $g$ is a real polynomial with all zeros real. Then all zeros of $f'$ are real. Similarly we conclude that all zeros of $f'$ lie on $L_2$, and hence the point $z_0$ of intersection of $L_1$ and $L_2$ is the only possible zero of $f'$. Hence $f(z)=c_1(z-z_0)^n+c_2$ for some $n\geq 1$ and some $c_1,c_2\in {\mathbb C}$ with $c_1\not= 0$. Such a function $f$ can satisfy the assumptions of Theorem \[thm1\] only if $f$ is a polynomial of degree at most $2$. Notice that this argument can be extended to functions of order less than $2$, but we do not use this. Suppose now that $f$ is transcendental. Then we use Theorem \[thm3\]. This theorem implies that there exists at least one even sector. If there is only one even sector, and its angle is greater than $\pi$, then the odd sector does not contain rays of $A\cup B$, so by $(v)$ its opening must be the same as the opening of the even sector, which is a contradiction. If there are two even sectors, then the odd sectors contain no rays of $A\cup B$. It follows from $(i)$ and $(v)$ that all sectors must have opening $\pi/2$. Then by $(ii)$ the zeros are close to the boundary of a quadrant, and the $1$-points are close to the the boundary of the opposite quadrant. But by hypothesis the zeros lie on a line and the $1$-points lie on a line. We conclude that the zeros are actually close to one ray and the $1$-points are close to another ray. But then there is only one even sector, contradicting our assumption at the beginning of this paragraph. The only remaining possibility is that there is one even sector with opening $\pi$. Then $\rho=1$, and we assume without loss of generality that this sector is the upper half plane and the $1$-points are real. This means that $B$ consists of two rays whose union is the real line. Using the notation of the proof of Theorem \[thm3\], and choosing a sequence $(r_k)$ of Pólya peaks of order $1$, we obtain $u(z)=\Ima z$ and $v(z)= \Ima^+ z$. This implies that $$\label{N} N(r_k,1,f)\sim \frac{1}{\pi}\log M(r_k),\quad k\to\infty.$$ Now let $g(z)=f(z)\overline{f(\overline{z})}$. As all $1$-points of $f$ are real, $f(z)=1$ implies that $g(z)=1$, so if $g\not\equiv 1$, we will have from (\[N\]) that $$\label{Ng} N(r_k,1,g)\geq (1-o(1) \frac{1}{\pi} \log M(r_k),\quad k\to\infty.$$ Now define the subharmonic function $$w(z)=\lim_{k\to\infty}\frac{\log|g(r_kz)|}{\log M(r_k)}.$$ It is evident that $w(z)=u(z)+u(\overline{z})=0$. Together with (\[Ng\]) this implies that $g(z)\equiv 1$. We conclude that with this normalization, $f$ has the form $f(z)=\exp(icz+id)$, where $c$ and $d$ are real. This completes the proof of Theorem \[thm1\]. Proof of Theorem \[thm2\] {#sec4} ========================= We consider differential equations $$\label{1} -y^{\prime\prime}+ \left((-1)^\ell z^m+E\right)y=0, \quad\ell\in\{0,1\}, \quad m\geq 3, \quad E\in {\mathbb C}.$$ Here $m$ is an integer, so all solutions are entire functions. The equation has the following symmetry property. Set $$\varepsilon=e^{\pi i/(m+2)},\quad \omega=\varepsilon^2.$$ If $y_0(z,E)$ is a solution of (\[1\]) then $$\label{df} y_k(z,E)=y_0(\omega^{-k}z,\omega^{2k}E)$$ satisfies the same equation, while $$y_0(\varepsilon^{-k}z,\varepsilon^{2k}E)$$ with an odd $k$ satisfies (\[1\]) with the sign at $z^m$ switched. The Stokes sectors are defined as follows. When $\ell=0$, they are $S_0=\{ z \colon |\arg z|<\pi/(m+2)\}$, and $S_k=\omega^kS_0$ for $k\in\Z$. When $\ell=1$, the Stokes sectors are $S_0=\{ z \colon 0<|\arg z|<2\pi/(m+2)\}$ and $S_k=\omega^kS_0$ for $k\in\Z$. To obtain a discrete sequence of eigenvalues, one imposes boundary conditions of the form $$\label{bc} y(z)\to 0,\quad z\to\infty,\quad z\in S_n\cup S_k,$$ for some $n$ and $k$. The exact meaning of (\[bc\]) is that $y(z)\to 0$ when $z\to\infty$ along any interior ray from the origin contained in the union of the two sectors. We will denote such a boundary condition by $(n,k)$. It is known [@S] that when $n\neq k\pm1$ (modulo $m+2$), then the boundary value problem $(n,k)$ has a discrete spectrum with a sequence of eigenvalues tending to infinity. (For completeness, we include the argument below.) Moreover, K. Shin [@Shin2] proved that these eigenvalues always lie on a ray from the origin. In particular, when $S_n$ and $S_k$ are symmetric with respect to the positive ray, these eigenvalues are positive. All other cases can be reduced to this case using the symmetry of the differential equation stated above: if $\omega_1$ and $\omega_2$ are bisectors of $S_m$ and $S_n$, then the eigenvalues lie on the ray $\{ t/(\omega_1\omega_2)\colon t\geq 0\}$. From now on we assume that $\ell=0$ in (\[1\]). For each $E$ the equation (\[1\]) has a solution tending to zero as $z\to\infty$ in $S_0$. More precisely, there is a unique solution $y_0(z,E)$ satisfying $$\label{as} y_0(z,E)=(1+o(1))z^{-m/4}\exp\left(-\frac{2}{m+2}z^{(m+2)/2}\right)$$ as $z\to\infty$ in any closed subsector of $S_0\cup S_1\cup S_{-1}$; see [@S Thm 6.1]. Notice the simple but important fact that this principal part of the asymptotics does not depend on $E$. The function $y_0(z,E)$ is actually an entire function of the two variables $z$ and $E$, and its asymptotics when $E\to\infty$ while $z$ is fixed are also known [@S Thm 19.1]; this implies that the entire function $E\mapsto y_0(z_0,E)$ has order $$\rho=\frac{1}{2}+\frac{1}{m}.$$ Now we define $y_k$ by (\[df\]). Then $y_k\to 0$ as $z\to\infty$ in $S_k$. The boundary problem $(n,k)$ thus has a solution when $y_n$ and $y_k$ are linearly dependent as functions of $z$. This means that their Wronskian vanishes. But the Wronskian, evaluated at $z=0$, is an entire function of $E$, and its order is less than $1$. Thus its zeros, which are the eigenvalues of the problem, form a sequence tending to infinity, as mentioned above. As $y_0,y_1,y_{-1}$ satisfy the same differential equation, we have $$y_{-1}=C(E)y_0+\tilde{C}(E)y_{1}.$$ The asymptotics of $y_{1}$ and $y_{-1}$ in $S_0$ (which follow from (\[as\])) show that $\tilde{C}=-\omega$, so $$\label{2} y_{-1}=C(E)y_0-\omega y_{1}.$$ By differentiating this with respect to $z$ we obtain $$\label{2'} y_{-1}^\prime=C(E)y_0^\prime-\omega y_{1}^\prime.$$ Solving (\[2\]) and (\[2’\]) by Cramer’s rule, we obtain $$C(E)=W_{-1,1}/W_{0,1},$$ where $W_{i,j}$ is the Wronskian of $y_i$ and $y_j$. This shows that $C$ is an entire function (because $W_{0,1}$ is never $0$). It has the same order $\rho$ that $y_0$ has as a function of $E$. In view of (\[2\]), the zeros of $C$ are exactly the eigenvalues $\lambda_j$ of the problem (\[bc\]) with $(n,k)=(-1,1)$. So all zeros of $C$ are positive by Shin’s result. Substituting $(z,E)\mapsto (\omega^{-1}z,\omega^2E)$ to (\[2\]), we obtain $$y_0=C(\omega^2E)y_1-\omega y_2.$$ Using this to eliminate $y_0$ from (\[2\]) we obtain $$y_{-1}=\left(C(E)C(\omega^2E)-\omega\right)y_1-C(E)\omega y_2.$$ We conclude that the zeros of the entire function $$\label{sib} g(E):=C(E)C(\omega^2E)-\omega$$ are the eigenvalues of the problem $(-1,2)$. Therefore, these zeros lie on the ray $\{ z=t\omega^{-1}\colon t\geq 0\}$. So if we define $f(E)=-\omega^{-1} g(\omega^{-1}E)$ and $h(E)=C(E)/\sqrt{\omega}$, then $$f(E)=1-h(\omega^{-1}E)h(\omega E),$$ the zeros of $f$ are on the positive ray and the $1$-points on two other rays. This completes the proof of Theorem \[thm2\]. [*Remarks.*]{} Once it is known that two entire functions $C$ and $g$ satisfy (\[sib\]) and zeros of each function lie on a ray, the order of both functions and the angles between the rays can be determined from Theorem \[thm3\]. Equations of the type (\[sib\]) occur for the first time in the work of Sibuya and his students [@S; @S2; @S3] for the simplest case when $m=3$. It was later discovered that these equations also arise in the context of exactly solvable models of statistical mechanics on two-dimensional lattices and in quantum field theory [@DDT1; @DDT2]. The interesting question is to which angles Theorem \[thm2\] generalizes. If $m>2$ is not an integer, equation (\[1\]) and its solutions are defined on the Riemann surface of the logarithm, but Sibuya’s solution $y_0$ is still entire as a function of $E$. We found no source where this fact is proved, but it is stated and used in [@DDT1 p. 576], [@DDT2 p. R231] and [@Tabara]. Shin’s result, which we used above seems to generalize to non-integer $m\geq 4$, see [@Shin2 Theorem 11] which we use with $\ell=1$ and $\ell=2$. On the other hand, numerical evidence in [@Bender] (see Figs. 14, 15, 20) shows that for $m<4$ our function $g(E)$ in (\[sib\]) does not have radially distributed zeros on one ray, even if finitely many of the zeros are discarded. And of course, it would be interesting to know whether there are any other entire functions like in Theorem \[thm2\], not related to the differential equations (\[1\]). [11]{} V. S. Azarin, Asymptotic behavior of subharmonic functions of finite order, (Russian) Mat. Sb. (N.S.) 108(150) (1979), no. 2, 147–167, 303. English transl.: Math. USSR, Sb. 36, 135–154 (1980). I. N. Baker, Entire functions with linearly distributed values, Math. Z. 86 (1964) 263–267. I. N. Baker, Entire functions with two linearly distributed values, Ann. Acad. Sci. Fenn. Ser. A I Math. 5 (1980), no. 2, 381–386. C. M. Bender, S. Boettcher and P. N. Meisinger, $PT$-symmetric quantum mechanics, J. Math. Phys. 40 (1999), no. 5, 2201–2229. W. Bergweiler and A. Eremenko, Goldberg’s constants, J. Anal. Math. 119, no. 1, (2013) 365–402. V. Blondel, Simultaneous stabilization of linear systems, Springer, Berlin, 1994. H. P. Boas and R. P. Boas, Short proofs of three theorems on harmonic functions, Proc. Amer. Math. Soc. 102 (1988), no. 4, 906–908. P. Dorey, C. Dunning and R. Tateo, On the relation between Stokes multipliers and the T-Q systems of conformal field theory, Nuclear Physics B 563 (1999) 573–602. P. Dorey, C. Dunning and R. Tateo, The ODE/IM correspondence, J. Phys. A 40 (2007), no. 32, R205–R283. D. Drasin, Value distributions of entire functions in regions of small growth, Ark. Mat. 12 (1974), 281–296. D. Drasin and D. F. Shea, Pólya peaks and the oscillation of positive functions, Proc. Amer. Math. Soc.  34 (1972), 403–411. A. Edrei, Meromorphic functions with three radially distributed values, Trans. Amer. Math. Soc. 78 (1955), 276–293. A. Eremenko, Value distribution and potential theory, Proceedings of the ICM, Vol. II (Beijing, 2002), 681–690, Higher Ed. Press, Beijing, 2002. A. Eremenko, Simultaneous stabilization, avoidance and Goldberg’s constants, arXiv:1208.0778. A. A. Goldberg and I. V. Ostrovskii, Distribution of values of meromorphic functions, Amer. Math. Soc., Providence, RI, 2008. G. Gundersen, Questions on meromorphic functions and complex differential equations, preprint, arXiv: 1509.02225. L. Hörmander, The analysis of linear partial differential operators I, 2nd ed., Springer, Berlin, 1990. L. Hörmander, Notions of convexity, Birkhäuser, Boston, 1994. T. Kobayashi, An entire function with linearly distributed values, Kodai Math. J. 2 (1979), no. 1, 54–81. O. Lehto and K. I. Virtanen, Quasiconformal mappings in the plane, Springer, New York – Heidelberg, 1973. B. Ya. Levin, Distribution of zeros of entire functions, Amer. Math. Soc., Providence, RI, 1970. R. Nevanlinna, Über die Konstruktion von meromorphen Funktionen mit gegebenen Wertzuordnungen, Festschrift zur Gedächtnisfeier für Karl Weierstra[ß]{}, Westdeutscher Verlag, Köln – Opladen, 1966, pp. 579–582. M. Ozawa, On the zero-one set of an entire function, Kodai Math. Sem. Rep. 28 (1977), no. 4, 311–316. G. Pólya and G. Szegő, Problems and theorems in analysis. Vol. I: Series, integral calculus, theory of functions, Springer, New York, 1972. T. Ransford, Potential theory in the complex plane, Cambridge Univ. Press, 1995. L. A. Rubel and C.-C. Yang, Interpolation and unavoidable families of meromorphic functions, Michigan Math. J. 20 (1974), no. 4, 289–296. K. Shin, The potential $(iz)^m$ generates real eigenvalues only, under symmetric rapid decay boundary conditions, J. Math. Phys. 46 (2005), no. 8, 082110, 17pp. Y. Sibuya, Global theory of a second order linear ordinary differential equation with a polynomial coefficient, North-Holland, Amsterdam, 1975. Y. Sibuya, Non-trivial entire solutions of the functional equation $f(\lambda)+f(\omega\lambda)f(\omega^{-1}\lambda)=1$, Analysis 8 (1998), 271–295. Y. Sibuya and R. Cameron, An entire solution of the functional equation $f(\lambda)+f(\omega\lambda)f(\omega^{-1}\lambda)=1$, Lecture Notes Math. 312, Springer, Berlin, 1973, pp. 194–202. T. Tabara, Asymptotic behavior of Stokes multipliers for $y''-(x^\sigma+\lambda)y=0,\; (\sigma\geq 2)$ as $\lambda\to\infty$, Dynamics of Continuous, Discrete and Impulsive Systems 5 (1999), 93–105. J. Winkler, Zur Existenz ganzer Funktionen bei vorgegebener Menge der Nullstellen und Einsstellen, Math. Z. 168 (1979), 77–86. *W. B.: Mathematisches Seminar* Christian-Albrechts-Universität zu Kiel Ludewig-Meyn-Str. 4 24098 Kiel Germany A. E.: Department of Mathematics Purdue University West Lafayette, IN 47907 USA A. H.: Department of Mathematics University of Illinois at Urbana–Champaign 1409 W. Green St. Urbana, IL 61801 USA [^1]: Supported by NSF grant DMS-1361836.
Mid
[ 0.6151761517615171, 28.375, 17.75 ]
Novel approaches for understanding the mechanisms of wound repair. Mechanisms that drive wound repair are complex and have challenged wound-healing investigators for many years. In this review, we present four examples of new tools that are being utilized to discover events that drive wound repair and regeneration. Laser capture microdissection facilitates the focused collection of tissue for purposes of genomic or proteomic analysis from specific cell populations within the wound bed. Tissue profiling and protein imaging by matrix-assisted laser desorption ionization mass spectrometry are two proteomic-based tools that permit rapid analysis with spatial orientation and relative abundance of hundreds to thousands of molecules from intact tissues. Another approach uses an in vivo porcine model to harness a strategy of adenoviral-driven receptor overexpression. This biological model closely mimics the human setting and permits transient stimulation along a specific cytokine pathway to tip the balance in favor of accelerated repair. The advent of new approaches that collect cell samples from within their in vivo circumstance while preserving discrete cellular localizations is likely to move the field of wound repair forward.
High
[ 0.680534918276374, 28.625, 13.4375 ]
In February 1945, with the 5 July implementation of Great Britain's new National Health Services Act still months away, Aneurin Bevan, Labour's minister of health, wasted no time challenging the opposition. Bevan believed that doctors and dentists receiving a salary equivalent to $1,200 a year plus $3 per patient for participating in the National Health Service were being fairly rewarded for their services. He wasn't about to shed tears on their behalf; nor was he willing let his Conservative opponents undermine Labour's achievement. Responding to the Conservative party's RA Butler, who declared the health programme a "great danger", Bevan insisted that the diehard opponents of National Health had "poisoned" parliamentary debate and, in the wake of their defeat, were engaged in a "squalid political conspiracy." Sixty-five year later, the Obama administration could use an American Aneurin Bevan. The provisions of the healthcare bill that went into effect last week hold out great benefits for a broad cross-section of Americans. They should be a cause for celebration. Insurance companies will no longer be permitted to exclude children because of pre-existing health conditions. Preventive procedures, such as colonoscopies and mammograms, must be covered without co-payments, and children under 26 may now be covered under their parents' insurance policies. But on the day healthcare reform went into effect, there was no dancing in the streets by Democrats and the Obama administration. They seemed almost embarrassed by their accomplishment. The day before, the president had quietly travelled to Falls Church, Virginia, to listen to stories from patients who will be helped by the new healthcare bill. But otherwise, he and the Democrats were silent and seem determined to remain so. In this fall's campaign, no Democrats are expected to be running ads promoting their vote for healthcare legislation. By contrast, Republicans are openly running against healthcare reform. They believe that by chipping away at the bill congress passed, they can make big gains in the 2010 house and senate elections. On the day provisions of the Patient Protection and Affordable Health Care Act went into effect, Republicans dominated television news coverage by unveiling their "Pledge to America", which has as its centerpiece retaining the Bush tax cuts for couples earning more than $250,000 a year and individuals earning more than $200,000, and will add nearly $700bn more to the national debt that the Obama administration's proposals. In their silence on healthcare reform, it is hard to imagine a surer Democratic strategy for electoral defeat. At a time when 50.7m Americans lack health insurance, a figure that marks a 10% rise for 2009, Democrats are running away from their most important legislative achievement of the last two years. Never have today's Democrats had more need for someone with the backbone of an Aneurin Bevan. The good news is that if Democrats don't want to look to England and its post-second world war battle for national healthcare, they always have the example of President Franklin Roosevelt. Faced with criticism from a Scrooge-like Republican party during the Depression, FDR was as outspoken as Bevan on what a governing party should do during hard times. Speaking before an overflow crowd at Madison Square Garden on the eve of the 1936 election, Roosevelt reminded his listeners that he had kept faith with those who first elected him. For anyone who doubted the political ground on which his administration stood, Roosevelt had an answer that left no room for ambiguity: "Your government is still on the same side of the street with the Good Samaritan and not with those who pass by on the other side."
Mid
[ 0.5913043478260871, 34, 23.5 ]
The Honolulu Police Department is urging all parents to inspect their children’s Halloween candy prior to consumption. HPD is presently investigating a report of a needle inserted into a chocolate bar that was collected on Halloween night in the Kihapai area of Kailua Town. A reckless endangering case has been initiated. Anyone with information about this or other candy tampering should contact HPD.
Mid
[ 0.6143790849673201, 35.25, 22.125 ]
Erucic acid metabolism by cultured beating heart cells of the postnatal rat. Cardiac erucic acid metabolism has been studied with beating heart cells in culture. It has been shown that erucate is taken up by these cultured cardiac myocytes. These cells are unable to oxidize it directly but require delaying intermediary steps to shorten the erucic acid chain before its complete oxidation. This long latency time of erucate oxidation would explain its accumulation within the different cellular lipid classes. It is suggested that the occurrence of large amounts of erucate in the different phospholipids might affect cellular and mitochondrial membrane structures. Evidence is reported that erucate does not affect the oxidative capacity of the myocardial cell but because of its accumulation dilutes other fatty acids which will then be oxidized at a lower rate.
Mid
[ 0.643243243243243, 29.75, 16.5 ]
Just back from a stay in Yosemite Valley. Just awesome…as it always has been. So of course I came back and had to check on some of the history and other interesting information about the valley at the Archive. There’s a wealth of stuff found by simply searching “yosemite“. This one from 1905 is one of the earliest with photos. Lots of changes in the man-made aspects of the valley but not to the natural landforms that are so familiar and, well, awesome in the real sense of the word.
High
[ 0.670859538784067, 40, 19.625 ]
US President Donald Trump (Reuters, file photo) WASHINGTON: US President Donald Trump chaired a meeting on the Afghanistan peace deal with his national security team that, the White House said, went "very well" and negotiations are proceeding. The talks, attended by Vice-President Mike Pence , secretary of state Mike Pompeo and national security adviser John Bolton among others, were held at Trump's golf resort in Bedminster, New Jersey , on Friday. Soon after the meeting, the President tweeted: "Many on the opposite side of this 19-year war, and us, are looking to make a deal - if possible!" According to the White House, discussions centred around ongoing negotiations and eventual peace and reconciliation agreement with the Taliban and the government of Afghanistan. The meeting went very well and negotiations are proceeding, it said. After briefing the President on the progress of the negotiations in the war-torn country, Pompeo issued a statement, saying, "Led by the President, we are working diligently on the path forward in Afghanistan." "In continued close cooperation with the government of Afghanistan, we remain committed to achieving a comprehensive peace agreement, including a reduction in violence and a ceasefire, ensuring that Afghan soil is never again used to threaten the United States or her allies, and bringing Afghans together to work towards peace," the secretary of state said. The meeting was also attended by defence secretary Mark Esper, special representative for Afghanistan reconciliation Zalmay Khalilzad, chairman of the joint chiefs of staff Joseph Dunford and CIA director Gina Haspel. Trump chaired the meeting after Taliban and US negotiators wrapped up their latest round of talks for a deal on Monday that would see America shrink its troop presence in Afghanistan. Details of a possible deal with the Taliban is yet to be made public, but administration officials have said that the President wants the troops back from Afghanistan as soon as possible. Early in the day, Trump also had a telephonic conversation with Pakistani Prime Minister Imran Khan on the Afghanistan peace talks and the India-Pakistan relationship.
Mid
[ 0.5768500948766601, 38, 27.875 ]
Background ========== Expectation of neutrality regarding the mutation-drift equilibrium for microsatellite variation is not always valid due to demographic changes, including genetic bottlenecks and admixture (e.g. \[[@B1],[@B2]\]), and selection at linked sites (e.g. \[[@B3],[@B4]\]). In contrast to demographic processes, which affect the entire genome, selection operates at specific sites associated with phenotypic traits, such as important quantitative trait loci (QTLs) and candidate genes. Selection leaves its signature in the chromosomal regions surrounding the sites, where significantly reduced or elevated levels of genetic variation can be maintained at linked neutral loci. Thus, selection not only affects the selected sites but also linked neutral loci and the footprints of selection acting on specific functional loci can be detected by genotyping polymorphic microsatellites in the adjacent non-coding regions \[[@B5]\]. Different statistical methods have been developed to identify outlier loci under the influence of selection \[[@B6]-[@B13]\] and adaptations have been attempted to improve the original methods of Lewontin and Krakauer \[[@B14]\], which have been criticized because of their sensitivity to population structure and history (e.g. \[[@B15]\]). Nevertheless, recent studies have shown somewhat inconsistent results obtained by applying the above statistical tests to the same data (e.g. \[[@B7],[@B12],[@B16],[@B17]\]). The Lewontin- Krakauer test \[[@B14]\] is the oldest of these multilocus-comparison methods. Broadly speaking, these methods are derived by using one of the two general approaches detailed below. The first approach is to develop methods with Lewontin and Krakauers\' original idea and to use the distribution of estimates of genetic differentiation coefficient *F*~ST~and diversity parameters from individual genetic loci to detect the effects of selection, hereafter termed the *F*~ST~-based approach, such as the FDIST program-based method \[[@B9]\], Bayesian regression \[[@B12]\], and population-specific \[[@B7]\] methods. Schlötterer and colleagues have proposed alternative multilocus simulation-based tests that use summary statistics other than *F*~ST~, such as the ln RV \[[@B10]\], the ln RH \[[@B6]\], and the ln Rθ\' \[[@B13]\] tests. These tests involve considering the idea of a \'selective sweep\' that arises from natural and artificial selection, and recent genetic exchanges driven by the selective sweep leave a record or \"genetic signature\" in the genome covering the selected sites and their linked neutral loci. Given that microsatellite loci associated with a recent selective sweep differ from the remainder of the genome, they are expected to fall outside the distribution of neutral estimates of ln RV, ln RH or ln Rθ\' values. As reviewed by \[[@B18]-[@B20]\], all the methods have potential advantages and drawbacks, which can be due to different underlying assumptions regarding the demographic and mutational models on which they are based, as well as on uncertainty associated with the robustness of the approaches. The recent increased availability of large genomic data sets and the identification of a few genes or loci as the targets of domestication or subsequent genetic improvement in cattle have renewed the investigation of the genomic effects of selection. Candidate genes and QTL have been described on both BTA1 \[[@B21]-[@B25]\] and BTA 20 \[[@B26]\]. On BTA1, the *POLL*gene, characterized by two alleles: *P*(polled) dominant over *H*(horn), is responsible for the polled (i.e. hornless) and horn phenotypes in cattle and has been subjected to both natural and artificial selection. Georges et al. \[[@B21]\] have demonstrated genetic linkage between the *POLL*gene and two microsatellites, *GMPOLL-1*and *GMPOLL-2*. These loci are syntenic to the highly conserved gene for superoxide dismutase 1 (*SOD1*). In addition, in various breeds the *POLL*gene has been found to be linked to the microsatellites *TGLA49*, *AGLA17*, *INRA212*and *KAP8*, located in the centromeric region of BTA1 close to the *SOD1*locus \[[@B22],[@B23],[@B25]\]. To date, on BTA20 several QTL and candidate genes have been reported e.g. growth hormone and prolactin receptor genes \[[@B27]\] affecting conformation and milk production traits, such as body depth (e.g. \[[@B28]\]), udder (e.g. \[[@B29]\]), udder attachment (e.g. \[[@B30]\]), milk yield (e.g. \[[@B31]\]), fat percentage (e.g. \[[@B28]\]), and especially protein content (e.g. \[[@B28]-[@B30]\]). In this study on *Bos taurus*, we present microsatellite data using a relatively larger number of loci than previously reported, which mainly included the 30 microsatellite markers recommended by the International Society for Animal Genetics (ISAG)/Food and Agriculture Organization of the United Nations (FAO) working group (e.g. \[[@B2],[@B24]\]; but see also \[[@B32]\]). Among the 51 microsatellites genotyped on 10 representative cattle populations of different origins (native and modern commercial) and horn statuses (polled and horned) in the northern territory of the Eurasian subcontinent, seven were on BTA1 and 16 on BTA20. We applied four tests to detect molecular signatures of selection, ranging from tests for loci across populations and the recently proposed pairwise population tests using a dynamically adjusted number of linked microsatellites \[[@B13]\]. We compared the consistency of the different neutrality tests available to identify loci under selection in the north Eurasian cattle populations investigated here. Materials and methods ===================== Population samples and genetic markers -------------------------------------- Microsatellite data from 10 different cattle (*Bos taurus*) populations including 366 individuals were analyzed. Finnish populations were represented by Finnish Ayrshire (modern commercial, horned, *n*= 40), Finnish Holstein-Friesian (modern commercial, horned, *n*= 40), Eastern Finncattle (native, mostly polled, *n*= 31), Western Finncattle (native, mostly polled, *n*= 37), and Northern Finncattle (native, mostly polled, *n*= 26). We were able to inference the heterozygotic status at the *POLL*locus in 19 phenotypically polled cattle of the three Finnish native populations, on the basis of their offspring/parent phenotypes. In addition, there were 19 animals horned (recessive homozygotic) in the Finnish native populations. Istoben (native, horned, *n*= 40), Yakutian (native, horned, *n*= 51), and Kholmogory (native, horned, *n*= 32) cattle were sampled in Russia. Ukrainian Grey (native, horned, *n*= 30) and Danish Jersey (modern commercial, horned, *n*= 39) were sampled in Ukraine and Denmark, respectively. During sample collection, the pedigree information and the herdsman\'s knowledge were used to ensure the animals were unrelated. Additional information on these populations has been reported in previous publications \[[@B2],[@B33]\]. Genotypes of the 51 microsatellites were used (for details on the microsatellites, see \[[@B33]-[@B35]\]) among which data of the 30 markers from the panel of loci recommended for genetic diversity studies in cattle <http://www.projects.roslin.ac.uk/cdiv/markers.html> were taken from the literature \[[@B2]\]. The 23 microsatellites (21 new ones and two from the recommended panel) on BTA1 and BTA20 were chosen on the basis of their vicinity to genes and QTL, which could be considered as candidate loci for selection because of their assumed involvement in the polled/horned phenotype \[[@B22]\] and in milk yield and body composition \[[@B35]\]. Details of the primers and microsatellite analysis protocols can be found in CaDBase <http://www.projects.roslin.ac.uk/cdiv/markers.html> and \[[@B34]\]. In this study, GHRJA.UP, 5\'-GGTTCGTTATGGAGGCAATG-3\', and GHRJA.DN, 5\'-GTCACCGCTGGCAGTAGAT-3\' primers were designed based on the sequence of the promoter region of the growth hormone receptor gene \[[@B35]\] containing microsatellite GHRJA. Danish Jersey animals were analyzed only at 41 loci (see Table [1](#T1){ref-type="table"}). A full list of the loci studied and their chromosomal and genomic locations, as well as population and basic statistics, are available in Table [1](#T1){ref-type="table"}. ###### Summary of the microsatellites and basic population genetic estimates for the microsatellites Locus BTA Genomic position (bp) ***A***~**R**~ ***H***~**E**~ ***F***~**IS**~ FDIST2 test Ewens-Watterson test ----------- ----- ----------------------- ---------------- ---------------- ----------------- ------------- ---------------------- ----------- ------- ------- ----------- ----------- AGLA17 1 641402 641615 1.37 0.08 -0.049 0.017 0.010\*\* 0.907 0.754 0.978\* 0.976\* DIK4591 1 1704734 1705228 2.60 0.32 0.064 0.128 0.660 0.467 0.442 0.844 0.622 DIK1044 1 2829429 2829737 4.86 0.70 0.015 0.118 0.631 0.324 0.329 0.136 0.243 SOD1 1 2914373 2915349 4.78 0.65 0.083 0.173 0.968\* 0.331 0.379 0.037\* 0.047\* DIK5019 1 3900549 3900808 5.42 0.59 0.190 0.164 0.954\* 0.381 0.380 0.005\*\* 0.008\*\* BMS2321 1 10949260 10949302 3.58 0.45 0.154 0.094 0.410 0.429 0.486 0.424 0.052 BM1824 1 122531990 122532171 3.95 0.72 -0.083 0.122 0.655 0.450 0.487 0.030\* 0.231 TGLA304 20 11460907 11460992 3.30 0.49 0.113 0.114 0.573 0.497 0.531 0.237 0.238 BMS1754 20 18439757 18439877 3.47 0.58 0.014 0.094 0.384 0.503 0.536 0.153 0.126 NRDIKM033 20 15598470 15598176 5.20 0.75 -0.004 0.098 0.372 0.234 0.213 0.415 0.466 ILSTS068 20 21675187 21675451 2.07 0.25 0.095 0.146 0.760 0.734 0.751 0.383 0.223 TGLA126 20 21808628 21808745 6.27 0.71 -0.009 0.079 0.170 0.493 0.443 0.085 0.057 BMS2461 20 25278607 25278662 4.83 0.62 0.028 0.180 0.985\* 0.227 0.246 0.453 0.760 BMS1128 20 26364064 26364112 3.54 0.52 0.032 0.109 0.534 0.472 0.446 0.503 0.203 BM713 20 26977228 26977280 3.36 0.62 -0.074 0.162 0.907 0.439 0.486 0.197 0.674 DIK2695 20 30452613 30452786 3.60 0.58 -0.027 0.075 0.186 0.432 0.411 0.565 0.274 TGLA153 20 31240022 31240154 4.64 0.71 0.025 0.109 0.521 0.345 0.353 0.101 0.269 GHRpromS 20 31023202 31023306 3.12 0.43 0.006 0.114 0.581 0.426 0.446 0.726 0.268 BMS2361 20 34597279 34597368 5.10 0.72 0.019 0.125 0.698 0.329 0.351 0.045\*\* 0.017\*\* DIK4835 20 35915540 35916040 4.96 0.65 0.022 0.136 0.788 0.293 0.329 0.252 0.046 AGLA29 20 3842995 38843142 5.49 0.78 -0.006 0.087 0.202 0.363 0.412 0.000\*\* 0.000\*\* BMS117 20 40015465 40015564 3.88 0.67 -0.018 0.078 0.197 0.377 0.376 0.398 0.272 UMBTL78 20 40177064 40177157 4.22 0.58 -0.033 0.102 0.462 0.298 0.256 0.884 0.229 BM2113 2 88476 88616 5.44 0.79 -0.052 0.119 0.673 0.353 0.379 0.003\*\* 0.005\*\* INRA023 3 35576043 35576259 4.85 0.70 0.009 0.113 0.564 0.309 0.306 0.238 0.107 ETH10 5 55333999 55334220 4.57 0.67 0.002 0.134 0.789 0.432 0.446 0.049\* 0.031\* ETH152 5 NA NA 4.56 0.71 0.012 0.081 0.171 0.425 0.486 0.008\*\* 0.020 ILSTS006 7 86555402 86555693 5.14 0.77 -0.007 0.076 0.110 0.331 0.351 0.032\* 0.057 HEL9 8 NA NA 5.04 0.70 0.020 0.134 0.792 0.262 0.289 0.240 0.245 ETH225 9 8089454 8089601 5.02 0.71 0.013 0.113 0.560 0.410 0.478 0.009\*\* 0.009\*\* MM12 9 NA NA 7.76 0.67 0.017 0.123 0.671 0.312 0.347 0.244 0.112 ILSTS005 10 93304132 93304315 2.17 0.43 -0.026 0.083 0.356 0.686 0.664 0.358 0.390 CSRM60 10 70549981 70550081 7.03 0.72 0.011 0.073 0.094 0.405 0.418 0.046\* 0.038\* HEL13 11 NA NA 3.14 0.51 0.081 0.125 0.678 0.402 0.407 0.529 0.564 INRA032 11 49569411 49569592 3.81 0.62 -0.010 0.142 0.812 0.511 0.537 0.063 0.016 INRA037 11 70730695 70730819 4.54 0.58 0.030 0.129 0.717 0.266 0.243 0.830 0.462 INRA005 12 71751518 71751656 3.18 0.56 0.032 0.088 0.321 0.594 0.596 0.114 0.096 CSSM66 14 6128576 6128773 5.91 0.74 0.002 0.137 0.873 0.312 0.352 0.000\*\* 0.003\*\* HEL1 15 NA NA 3.99 0.67 0.020 0.072 0.138 0.468 0.445 0.119 0.155 SPS115 15 NA NA 5.40 0.58 0.039 0.096 0.416 0.478 0.482 0.228 0.146 INRA035 16 62926476 62926577 2.72 0.23 0.391 0.072 0.266 0.521 0.488 0.746 0.421 TGLA53 16 22214785 22214925 12.25 0.74 0.071 0.099 0.354 0.195 0.213 0.063 0.037 ETH185 17 36598852 36599086 8.31 0.68 0.039 0.146 0.877 0.336 0.303 0.186 0.196 INRA063 18 37562469 37562645 3.31 0.57 0.031 0.110 0.546 0.537 0.487 0.270 0.135 TGLA227 18 60360145 60360234 10.71 0.82 0.005 0.076 0.075 0.282 0.315 0.005\*\* 0.012\* ETH3 19 NA NA 4.44 0.65 0.009 0.135 0.787 0.407 0.406 0.073 0.139 HEL5 21 11850292 11850455 4.64 0.66 0.038 0.151 0.903 0.424 0.410 0.023\* 0.104 TGLA122 21 50825795 50825936 11.36 0.74 0.007 0.069 0.065 0.210 0.213 0.538 0.152 HAUT24 22 45733839 45733962 7.09 0.70 0.025 0.143 0.861 0.406 0.424 0.004\*\* 0.027\* BM1818 23 35634770 35635033 4.03 0.63 0.019 0.102 0.458 0.538 0.486 0.144 0.013\* HAUT27 26 26396836 26396987 8.85 0.61 0.126 0.103 0.453 0.376 0.396 0.083 0.003\*\* BTA, *Bos taurus*autosome; *A*~R~, allelic richness; *H*~E~, expected heterozygosity, *F*~IS~, inbreeding coefficient, observed homozygosity, *F*~OBS~, and expected homozygosity, *F*~EXP~, NA, not available; the probabilities for the Ewens-Watterson test were calculated based on homozygosity (*P*~H~) or Fishers\'s exact test (*P*~E~); \*, the significance level of *P*\< 0.05, \*\*, the significance level of *P*\< 0.01; the genomic positions for the loci are BLASTed against STS or primer sequence in ENSEMBL cow genome Btau4.0 <http://www.ensembl.org/Bos_taurus/Info/Index> updated until 11/02/2010 Microsatellite variability measures and test for linkage disequilibrium ----------------------------------------------------------------------- Microsatellite variability, expected heterozygosity (*H*~EXP~), allelic richness (*A*~R~), and Weir and Cockerham\'s *F*~ST~\[[@B36]\], were estimated with the FSTAT program, version 2.9.3.2 \[[@B37]\]. The *D*\' metric used to estimate the LD was calculated using Multiallelic Interallelic Disequilibrium Analysis Software (MIDAS; \[[@B38]\]). Values of *D*\' were calculated for all syntenic marker pairs on BTA1 and BTA20 across the populations. A more detailed description of the estimation of *D*\' can be found in \[[@B39]\]. The statistical significance of the observed association between pairs of alleles under the null hypothesis of random allelic assortment was tested using a Monte-Carlo approximation of Fisher\'s exact test as implemented in the software ARLEQUIN \[[@B40]\] using a Markov chain extension to Fisher\'s exact test for *R*× *C*contingency tables \[[@B41]\]. A total of 100 000 alternative tables were explored with the Markov chain and probabilities were typically estimated with a standard error of \< 0.001. Estimation of the *D*\' metric for LD and tests for their significance were conducted only in three Finnish native breeds, i.e. Northern Finncattle, Eastern Finncattle and Western Finncattle. The graphic summary of the significance of LD determinations was displayed using the HaploView program, version 4.0 \[[@B42]\]. Fisher\'s exact tests in the GENEPOP v 4.0 \[[@B43]\] were applied to assess LD determinations between all locus pairs across the sample. Tests to detect loci under selection across populations ------------------------------------------------------- Possible departures from the standard neutral model of molecular evolution - potentially revealing demographic events or the existence of selective effects at certain loci - were examined for each locus using the Ewens-Watterson test \[[@B44],[@B45]\] and the Beaumont and Nichols\'s modified frequentist method \[[@B9]\], as well as a more robust Bayesian test \[[@B12]\]. The Ewens-Watterson test of neutrality was performed with the ARLEQUIN program \[[@B40]\] assuming an infinite allele mutation model. To obtain sufficient precision with this test, the probability was recorded as the mean of 20 independent repeats of 1,000 simulations. The frequentist method used was that proposed by \[[@B9]\], further developed by \[[@B12]\], and implemented in the FDIST2 program <http://www.rubic.rdg.ac.uk/~mab/software.html>, a currently distributed version of the original FDIST program as described by \[[@B12]\]. FDIST2 calculates *θ*, Weir & Cockerham\'s \[[@B36]\] estimator of diversity for each locus in the sample. Coalescent simulations are then performed to generate data sets with a distribution of *θ*centered on the empirical estimates. Then, the quantiles of the simulated *F*~ST~within which the observed *F*~ST~\'s fell and the *P*-values for each locus were determined. Initially an island model of population differentiation was used and the procedure repeated 50,000 times to generate 95% confidence intervals for neutral differentiation and to estimate *P*-values for departure of the loci from these expectations. Simulation parameters were under an infinite allele mutation model for 100 demes, 10 sample populations, sample sizes of 100, and a weighted *F*~ST~similar to the trimmed mean *F*~ST~calculated from the empirical distribution. Computed by removing the 30% highest and lowest *F*~ST~values observed in the empirical data set, the trimmed mean *F*~ST~is an estimate of the average \"neutral\" *F*~ST~value uninfluenced by outlier loci (see \[[@B46]\]). This method provides evidence for selection by looking for outliers with higher/lower observed *F*~ST~-values, controlling for *P*-values \[[@B12]\]. The approach is fairly robust regarding variation in mutation rate between loci, sample size, and whether populations are at equilibrium or not \[[@B9]\]. Beaumont & Balding\'s \[[@B12]\] hierarchical-Bayesian method was performed using the BAYESFST program <http://www.reading.ac.uk/Statistics/genetics/software.html> package, which generates 2,000 Markov chain Monte Carlo (MCMC) simulated loci on the basis of the distribution of *F*~ST~given the data. The method combines information over loci and populations in order to simultaneously estimate *F*~ST~at the *i*^th^locus and the *j*^th^population, *F*~ST~(*i*, *j*), for all *i*loci and *j*populations. A hierarchical model is implemented for *F*~ST~(*i*, *j*) as $$F_{ST}(i,j) = \frac{\exp(\alpha_{i} + \beta_{i} + \gamma_{ij})}{1 + \exp(\alpha_{i} + \beta_{i} + \gamma_{ij})}$$ where α~i~, β~j~and γ~ij~are locus, population and locus-by-population parameters, respectively \[[@B12]\]. In this study, the interpretations of the potential outliers are based on the locus effect (*α*~i~). Outliers from our data set were identified on the basis of the distribution following \[[@B12]\]. Rather than a fixed *F*~ST~as assumed in the above frequentist method of \[[@B9]\], this BAYESFST test uses more information from the raw data and does not assume the same *F*~ST~for each population \[[@B5],[@B12]\]. Tests to detect loci under selection for pairwise populations ------------------------------------------------------------- To test for additional evidence of selection, we used the combination of statistics lnRH, lnRV and lnRθ\' in the population pairwise comparisons. The principle behind these tests is that variability at a neutral microsatellite locus is given by θ = 4 *N*~e~*μ*, where *N*~e~is the effective population size and *μ*is the mutation rate. A locus linked to a beneficial mutation will have a smaller effective population size and consequently a reduction in variability below neutral expectations. The relative variance in variability, lnRθ, can be assessed instead by estimating the relative variance in repeat number, lnRV, or heterozygosity, lnRH, for loci between populations. The lnRV was calculated using the equation lnRV = ln (*V*~pop1~/*V*~pop2~) where *V*~pop1~and *V*~pop2~are the variance in repeat number for population 1 and population 2, respectively \[[@B10]\]. The lnRH test is based on the calculation of the logarithm of the ratio of *H*for each locus for a pair of populations as follows $$\ln\text{RH} = \ln\frac{\left( \frac{1}{1 - H_{\text{pop1}}} \right)^{2} - 1}{\left( \frac{1}{1 - H_{\text{pop2}}} \right)^{2} - 1}$$ where *H*denotes expected heterozygosity (see equation 2 in \[[@B6]\]). In addition, we attempted to calculate ln Rθ by estimating θ directly using a coalescence-based Bayesian Markov chain Monte Carlo simulation approach employing the MSVAR program \[[@B47]\]. The tests have been shown to be relatively insensitive to mutation rate, deviation from the stepwise mutation model, demographic history of population and sample size \[[@B16]\]. As suggested by \[[@B48]\], to detect the most recent and strong selective sweeps, the combination of lnRH and lnRV statistics is as powerful as lnRV alone, but using both statistics together lowers the rate of false positives by a factor of 3 because the variance in repeat number and the heterozygosity of a population measure different aspects of the variation at a locus. Thus, combinations of any two of the three tests were implemented here and significance of lnRH, lnRV and lnRθ\' for each comparison was calculated according to standard methods \[[@B6],[@B10],[@B48]\]. These statistics are generally normally distributed, and simulations have confirmed that outliers (e.g. more than 1.96/2.58 standard deviations from the mean for 95%/99% confidence intervals, respectively) are likely to be caused by selection \[[@B48]\]. The tests were implemented for every pairwise comparison involving native populations from different trait categories (Eastern Finncattle, Western Finncattle and Northern Finncattle vs. Yakutian, Istoben, Kholmogory and Ukrianian Grey), i.e. 12 population pairs for the horn (polled/horned) trait. Tests to detect loci under selection within a population -------------------------------------------------------- The coalescence simulation approach using the DetSel 1.0 program \[[@B49]\] was used to detect outlier loci within the Finnish native populations (Eastern Finncattle, Western Finncattle and Northern Finncattle). It has the advantage of being able to take into account a wide range of potential parameters simultaneously and giving results that are robust regarding the starting assumptions. For each pair of populations (*i*, *j*), and for all loci, we calculated *F*~i~and *F*~j~(*F*~i~and *F*~j~are the population-specific divergence; for details see \[[@B7],[@B49]\]) and generated the expected joint distribution of *F*~i~and *F*~j~by performing 10,000 coalescent simulations. Thus, every locus falling outside the resulting confidence envelope can be seen as potentially under selection. The following nuisance parameters were used to generate null distributions with similar numbers of allelic stages as in the observed data set: mutation rates (infinite allele model) *μ*= 1 × 10^-2^, 1 × 10^-3^, and 1 × 10^-4^; ancestor population size *N*~e~= 500, 5,000, and 50,000; times since an assumed bottleneck event *T*~0~= 50, 500, and 5,000 generations; time since divergence *t*= 50 and 500; and population size before the split *N*~0~= 50 and 500. In order to detect outlier loci potentially selected for the polled trait within the three Finnish native cattle populations, the DetSel program was run for comparison between the two subpopulations representing the definitely polled (*n*= 19) and horned (*n*= 19) animals, respectively. Results ======= Genetic diversity and differentiation ------------------------------------- A complete list of loci and their variability in the 10 cattle populations are shown in Table [1](#T1){ref-type="table"}. The overall genetic differentiation across loci was 0.117 (*F*~ST~= 0.117, 95% CI 0.108 - 0.125). *F*~ST~values for an individual locus varied from 0.017 (SD = 0.011) at *AGLA17*on BTA1 to 0.180 (SD = 0.057) at *BMS2461*on BTA20. Mean population differentiations for loci on BTA1 and BTA20 were 0.126 (*F*~ST~= 0.126, 95% CI 0.103 - 0.143) and 0.118 (*F*~ST~= 0.118, 95% CI 0.100 - 0.139), respectively. Neither of the values indicated significant difference from the average for loci on other chromosomes (*F*~ST~= 0.114, 95% CI 0.104 - 0.124). Levels of variation across populations, including allelic richness (*A*~R~) and expected heterozygosity (*H*~E~), were in similar ranges as for microsatellites on BTA1, BTA20 and other autosomes, with the smallest variations observed at *AGLA17*(*A*~R~= 1.37, *H*~E~= 0.08). The highest *H*~E~of 0.79 was observed at *BM2113*(BTA2) and the highest *A*~R~of 11.36 at *TGLA122*(BTA21). Most *F*~IS~values were positive and for some loci significantly positive. Of the 13 negative *F*~IS~values, seven occurred for loci on BTA20, and two for loci on BTA1. Loci on BTA1 and BTA20 did not show a significant reduction or increase in mean *F*~IS~compared with the loci on other autosomes (other bovine autosomes, mean *F*~IS~= 0.038; BTA1, mean *F*~IS~= 0.053, Mann-Whitney test *U*= 118, *P*= 0.409; BTA20, mean *F*~IS~= 0.011, Mann-Whitney test *U*= 273.5, *P*= 0.227). Given the range of observations of *F*~IS~at an individual locus, there were no marked difference among the three classes of loci (BTA1, -0.083 - 0.190; BTA20, -0.074 - 0.113; other BTAs, -0.052 - 0.391). Linkage disequilibrium ---------------------- The strength of pairwise linkage disequilibrium (LD) between markers was estimated and the average *D*\' value of pairwise syntenic markers was 0.32 across BTA1 and 0.28 across BTA20, both of which are significantly (*P*\< 0.05) higher than for non-syntenic markers (0.15; only the *D*\' \> 0.3 are shown in Figure [1](#F1){ref-type="fig"}). Figure [1](#F1){ref-type="fig"} also shows matrices of LD significance levels for all possible locus combinations of the loci on BTA1 or BTA20 in their chromosomal order. Of the 120 pairwise comparisons of the 16 loci on BTA20, a total of 22 (22/120, 18.3%) tests showed *P*values below 0.05. Likewise, LD between markers on BTA1 provided seven (7/21, 33.3%) significant observations. However, a substantially smaller proportion (34/1124, 3.0%) of significant (*P*\< 0.05) pairs was found between non-syntenic markers. In general, significantly higher levels of LD were observed for syntenic markers on BTA1 and BTA20 than that for non-syntenic markers. There was no evidence of LD blocks on either of the chromosomes. ![**Detailed view of the extent and significance of LD in the cattle populations using the Haploview 4.0 program**. Numbers in the blocks indicate the percentage of the LD metric *D*\' values \> 0.3; shadings indicate Fisher\'s exact test significance levels: white, *P*\> 0.05; light shading, *P*\< 0.05.](1297-9686-42-32-1){#F1} Evidence for selection across the populations --------------------------------------------- The Ewens-Watterson test enables detection of deviations from a neutral-equilibrium model as either a deficit or an excess of genetic diversity relative to the number of alleles at a locus (see \[[@B50]\]). When applying the tests for all the microsatellites, we detected 13 loci (*AGLA17*, *DIK5019*, *SOD1*, *AGLA29*, *BMS2361*, *BM2113*, *ETH10*, *ETH225*, *CSSM66*, *ETH152*, *TGLA227*, *HAUT24*, and *CSRM60*) on 10 different chromosomes exhibiting significant probabilities for the Ewens-Watterson test based on both homozygosity (*P*~H~) and Fisher\'s exact test (*P*~E~) (see Table [1](#T1){ref-type="table"}). Of the 13 loci, one (*AGLA17*) exhibited a significant (*P*\< 0.05) deficit of heterozygosity and all the other 12 loci exhibited a significant (*P*\< 0.05) excess in genetic diversity relative to the expected values; these patterns are consistent with directional and balancing selection, respectively. The 12 loci generated average *P*values significantly (Student\'s *t*test: $\overset{ª}{P_{H}}$ = 0.020, *t*= -5.65, *P*\< 0.0001; $\overset{ª}{P_{E}}$ = 0.014, *t*= -5.69, *P*\< 0.0001) below than the expected median value of 0.5. However, average *P*values of 0.313 for *P*~H~(*t*= -4.63, *P*\> 0.1) and 0.232 for *P*~E~(*t*= -8.69, *P*\> 0.1) were observed in the remaining 38 loci which were not under selection. The observation provided further evidence that selection affected genetic diversity at the microsatellites under selection. The results of the analyses with the FDIST2 program are presented in Table [1](#T1){ref-type="table"} and Figure [2a](#F2){ref-type="fig"}. This summary-statistic method, based on simulated and observed *F*~ST~values, identified four loci (*SOD1*, *BMS2461*, *DIK5019*and *AGLA17*) as outliers showing footprints of selection in the analyses, including all 10 populations, at the 5% significance level. Of the four significant loci, three (*SOD1*, *BMS2461*and *DIK4519*) with higher *F*~ST~values indicated a sign of directional selection and one locus (*AGLA17*) appearing in the lower tail of the *F*~ST~distribution suggested a signature potentially affected by balancing selection (Figure [2a](#F2){ref-type="fig"}). In the Bayesian *F*~ST~-test (Figure [2b](#F2){ref-type="fig"}), which was based on a hierarchical regression model, three loci (*HEL5*, *DIK4591*and *SOD1*) were detected as being directionally selected and two (*AGLA17*and *TGLA227*) as under balancing selection. Overall, across all the populations, two loci, *AGLA17*and *SOD1*, exhibited the strongest evidence of selection with all three statistical approaches, which provided good support to their status as outliers due to selection. Two loci (*DIK5019*and *TGLA227*) exhibited significant departure from the neutral expectations in two out of the three selection tests. Furthermore, 12 loci (*AGLA29*, *BMS2361*, *BM2113*, *ETH10*, *ETH225*, *CSSM66*, *ETH152*, *HAUT24*, *CSRM60, BMS2461, HEL5*and *DIK4591*) can be regarded as candidates affected by selection, but were revealed only in one of the three tests. Interestingly, according to ENSEMBL cow genome <http://www.ensembl.org/Bos_taurus/Info/Index> the significant locus *AGLA17*under balancing selection was about 1.78 cM upstream from the candidate locus for *POLL*, whereas locus *SOD1*under directing selection was located about 3.87 cM downstream from the candidate locus. It should be noted that the *F*~ST~-based tests of selection are prone to false positives because of sensitivity to demographic history \[[@B51]\], heterozygosity among loci in mutation rate \[[@B52]\] and locus-specific phenomena not related to selection \[[@B48]\]. Nevertheless, we expect the set of loci identified by *F*~ST~-based tests to be enriched for the true positives in further tests. ![**Results of (A) the FDIST2 and (B) BAYESFST tests**. The solid lines indicate the critical cutoff for the *P*-value at the 0.05 level.](1297-9686-42-32-2){#F2} Tests for selection for pairwise populations -------------------------------------------- Since each of the five tests used above relies on somewhat different assumptions, loci that are repeatedly found to be outside the range expected for neutrality are extremely good candidates for markers under selection. Moreover, LD is known to be extremely high for the six BTA1 microsatellites near the candidate gene affecting the presence or absence of horns in *Bos taurus*, thus the region under selection is likely to be quite wide. Despite the possible presence of a few false positives, the full set of seven loci (*SOD1*, *BMS2461*, *DIK5019*, *HEL5*, *DIK4591*, *TGLA227*and *AGLA17*) was used for further analyses. The lnRθ methods (lnRH, lnRV and lnRθ\') use heterozygosity or variance difference, rather than population divergence, to test for selection. Significant results for the lnRθ tests for selective sweeps involve the two loci (*AGLA17*and *SOD1*) detected by the Ewens-Watterson test and the *F*~ST~-based tests for pairwise combinations (*n*= 12) of three native Finnish cattle populations and four old native populations from Russia and Ukraine (Table [2](#T2){ref-type="table"}). ###### Estimates of lnRV, lnRH and lnRθ\' for the pairwise comparisons Pairwise comparison lnRV lnRH lnRθ\' -------------------------------------- ------ ------ -------- ------ ------ ------ Eastern Finncattle - Istoben \* \* n.s. n.s. \* n.s. Eastern Finncattle - Yakutian \* \*\* \* \*\* \*\* \* Eastern Finncattle - Ukrainian Grey \*\* \*\* \* \* \*\* \* Eastern Finncattle - Kholmogory \* \*\* \* \* \* \* Western Finncattle - Istoben \*\* \* \*\* \*\* \* \* Western Finncattle - Yakutian \*\* \*\* \* \* \* \*\* Western Finncattle - Ukrainian Grey \* \* \*\* \* \* \* Western Finncattle - Kholmogory \* \* \* \* \* \*\* Northern Finncattle - Istoben \* n.s \* n.s. n.s. \* Northern Finncattle - Yakutian \* n.s. n.s. \* n.s. n.s. Northern Finncattle - Ukrainian Grey \*\* \* n.s. n.s. n.s. n.s. Northern Finncattle - Kholmogory \* n.s. n.s. \* n.s. n.s. \* Significance *P*\< 0.05, \*\* *P*\< 0.01, n.s., not significant Significant results for selective sweeps at loci *AGLA17*and *SOD1*were obtained for 12 pairwise population comparisons for each of the three different measures of lnRθ (Table [2](#T2){ref-type="table"}). Of the pairwise comparisons, a total of 28 and 26 significant (*P*\< 0.05) or very significant (*P*\< 0.01) results were observed at *AGLA17*and *SOD1*, respectively, in the three tests. Both loci (*AGLA17*and *SOD1*) appeared in all three different measures of lnRθ for eight or more comparisons (Table [2](#T2){ref-type="table"}), that is, lnRθ (lnRH, lnRV and lnRθ\') values deviating by more than 1.96 standard deviations from the mean. Accordingly, the pairwise comparisons between either of Eastern Finncattle and Western Finncattle and populations of Yakutian, Kholmogory and Ukrainian Grey were significant for all three estimators. All the comparisons between populations yielded at least two significant results for the three estimators. In total, 54 (75% 54/72) significant comparisons involved *AGLA17*or *SOD1*in the comparisons between Finnish native populations (Northern Finncattle, Eastern Finncattle and Western Finncattle) vs. the native populations from Russia and Ukraine (Istoben, Ukrainian Grey, Kholmogory and Yakutian Cattle), which suggested that selective sweeps had taken place in the Finnish native populations. Tests for selection within the Finnish native populations --------------------------------------------------------- The coalescent simulation, which was based on a population split model \[[@B49]\], was performed with the DetSel program within the Finnish native populations with very similar demographical backgrounds (Eastern Finncattle, Northern Finncattle and Western Finncattle). Among the six BTA1 microsatellites around the candidate loci, all are polymorphic in the three populations involved in the pairwise-subpopulation comparison. In the pairwise comparison between definitely polled (*n*= 19) and horned (*n*= 19) cattle, loci *AGLA17*and *SOD1*were significantly outside the 99% confidence interval (Figure [3](#F3){ref-type="fig"}), while locus *DIK4591*fell slightly outside the 95% confidence envelope in the three comparisons, which are thus considered as false positives, i.e., the locus was detected as an outlier because of the 5% type I error. The outlier behavior for loci *AGLA17*and *SOD1*was deemed to be the result of strong local effects of hitchhiking selection. ![**Pairwise comparison of Finnish native cattle populations performed with DetSel**. The test was at the 95% confidence envelope: plot of *F*~2~against *F*~1~estimates for the subpopulation pair polled vs. horned.](1297-9686-42-32-3){#F3} Discussion ========== In this study, besides 28 microsatellites on other cattle autosomes used as a reference set of markers, seven microsatellites on BTA1 and 16 on BTA20 around candidate loci were screened for the footprints of selection among 10 cattle populations with divergent horn or production traits. Across different statistical analyses, a highly divergent pattern of genetic differentiation and large differences in levels of variability were revealed at the loci *SOD1*and *AGLA17*among populations, which was inconsistent with neutral expectations. The results indicated divergent \'selective sweeps\' at *AGLA17*and *SOD1*, probably caused by selection of the closely-linked candidate loci for the horned/polled trait, e.g. the *POLL*gene. Evidence of selection of microsatellites surrounding the *POLL*gene ------------------------------------------------------------------- Because revealing outlier loci in genome scans currently depends on statistical tests, one of the main concerns is to highlight truly significant loci while minimizing the detection of false positives \[[@B44]\]. Using a multilocus scan of differentiation based on microsatellite data, we compared three different methods that aimed at detecting outliers from simulated neutral expectations: 1) the Ewens-Watterson method \[[@B44],[@B45]\], 2) the FDIST2 method \[[@B9]\], and 3) a BAYESFST method \[[@B12]\]. Outliers were identified for 15 loci using a 5% threshold, which was robust across methods for two loci (*SOD1*and *AGLA17*). The locus *SOD1*presented a higher differentiation (*F*~ST~value) than expected, suggesting that it could have been affected by the action of diversifying selection among homogeneous gene pools and populations. In contrast, the locus *AGLA17*presented a lower genetic differentiation than expected, which could represent signatures of homogenizing selection among populations and/or balancing selection within populations. All three methods identified loci *SOD1*and *AGLA17*as good candidates for selection on the polled trait. However, several significant loci were detected only by one or two of the tests and thus could not be accepted as reliable outliers with the remaining tests. The results obtained by the three methods are not totally consistent, probably because of the difference in statistical power using multiple measures of variability, each of which measures different parameters and relies on different assumptions, e.g. heterozygosity and variance in allele size \[[@B48]\], as detailed in e.g. \[[@B53]-[@B55]\]. Besides the global analyses, detection of outlier loci was also done using pairwise analyses. This helped to reveal loci with a major overall effect as well as loci responding with different strengths to artificial selection on the individual populations. Among the population chosen for the pairwise analyses, the lnRθ (lnRV, lnRH and lnRθ\') tests yielded a high number of significant (*P*\< 0.05) results at *SOD1*and *AGLG17*according to the three estimators of lnRθ (Table [2](#T2){ref-type="table"}). This finding conforms well to the previous results of selective sweeps associated with hitchhiking selection with one or more genes with locally beneficial mutations. Although there is difference in the statistical power to detect selection, as discussed in \[[@B6],[@B48],[@B56]\], the three estimators of lnRθ provide additional robust evaluation of potential selective sweeps for the pairwise population comparisons. Neutrality tests for microsatellites focus mainly on unlinked loci and are based on either population differentiation (*F*~ST~) or reduced variability (lnRθ). Our proposed tests consider lnRθ of several linked loci for the inference of selection. While the single-locus lnRθ-test is largely independent of the demographical past, the additional power of linked loci is balanced by the cost of an increasing dependence of the demographic past due to the fact that LD is extremely sensitive to the demographic history. Thus, pairwise analyses between sub-populations may decrease the demographic effects in accounting for the selection. As indicated in Figure [3](#F3){ref-type="fig"}, the great majority of loci always fall in the confidence region of the conditional pairwise-subpopulation distributions of branch length estimates, while some loci do not. Overall, we identified two loci (*SOD1*and *AGLA17*) that were probably subject to selection in the three Finnish native populations. Thus, we concluded that the distribution of variability at these loci could have been shaped by forces other than demographic effects e.g. genetic drift. Although the locus *DIK4591*was located on the edge or fell just outside the high probability region of the expected conditional distribution in the Finnish native populations, we must be cautious about the locus because the estimation of *F*~i~parameters is discontinuous as a result of the discrete nature of the data, i.e. the allele counts (e.g. \[[@B7]\]). However, it is worth noting that not all significant loci detected by other methods could be accepted as trustworthy outliers with DetSel due to technical constraints, which means that if a locus is monomorphic in one population of the pair analyses with DetSel are not possible. Tests to detect outlier loci that deviate from neutral expectation cannot identify false positives (type I errors). Thus, we conducted the three different neutrality tests (the Ewens-Watterson test, the FDIST test and the BAYESFST test), setting a 95% *P*level criterion to identify loci under selection pressure, at which the expected number of false positive loci is 51 × 0.05 = 2.55. We still found 13, four and five outlier loci, respectively, indicating that at least some of the outlier loci are unlikely to be false positives. As suggested by \[[@B5]\], a practical approach to strengthen the candidate status of identified outlier loci is to apply two or more neutrality tests simultaneously based on different assumptions and parameter estimation and only consider outlier loci that are supported by several methods for subsequent validation steps. Thus, the fact that some loci are identified by one neutrality test, but not by others, suggests that their status as candidate loci under selection must be regarded with considerable caution. However, significant deviations from neutrality expectation using multiple tests do not necessarily mean that a particular locus has been affected by hitchhiking selection. In this case, we applied three different pairwise population neutrality tests in 12 separate comparisons using two loci (across the populations: 3 × 12 × 2 = 72 separate tests). This is expected to result in approximately four false positives at the 95% *P*level. The fact that we observed as many as 54 deviations (Table [2](#T2){ref-type="table"}) at the 95% *P*level indicates that it is unlikely that all the outliers identified by pairwise analyses are due to type I errors. Moreover, no locus showed only one significant deviation in one pairwise population comparison (see Table [2](#T2){ref-type="table"}). Therefore, it can be considered that the approach was quite robust and conservative in the detection of the effects of hitchhiking selection, particularly when additional pairwise analyses were applied. Interpretation of the outlier loci and caveats ---------------------------------------------- Actually microsatellites are unlikely to be the target of selection, but are merely tightly linked to the candidate genes. Since the microsatellites used are located close to some functional candidate genes (or QTLs) on the same chromosome, this indicates a high probability that one or several good candidate genes (or QTLs) is/are tightly linked to some of the microsatellites. In many of the cases examined to date, selective sweeps have affected only a very small region, potentially containing only one or a few genes, except in the case of extremely strong selection (see \[[@B57]\]). Empirical studies indicate that the negligible LD between a hitchhiking locus and a candidate gene underlying selection varied from tens of bp (e.g. \[[@B55]\]) to tens or even hundreds of kb (see \[[@B58],[@B59]\]), which depends on a variety of factors such as the genomic regions (e.g. sex chromosome vs. autosome) and populations (e.g. domesticated vs. wild) investigated, and the type of markers (e.g. EST- or MHC-microsatellites vs. microsatellites) used. It has also been suggested that the LD between loci and candidate genes affected by selection is determined mainly by the strength of selection, local recombination rate, population history, and the age of the beneficial allele \[[@B60]\]. Whatever the reason, significant LD was detected with inter-marker genomic distances between *ca*.1100 kb and *ca*.10300 kb in this study (see Figure [1](#F1){ref-type="fig"}), a considerably wider interval than reported previously. We detected two microsatellite loci (*AGLA17*and *SOD1*) probably linked to the candidate gene for the polled trait in the populations investigated. The polled trait is an autosomal dominant trait in cattle and to date the genes controlling this trait have not been specifically identified. However, the gene causing the absence of horns is known to be at the centromeric end of BTA1. Several factors have potentially driven evolution of the functionally important candidate locus including artificial selection and mating system. In Finnish native cattle populations, polled animals were particularly favored during selective breeding. However, we did not detect any locus under selection on BTA20 despite that the fact that several microsatellites including GHRJA surround the growth hormone receptor gene. Growth hormone receptor belongs to the large superfamily of class 1 cytokine receptors. It has various roles in growth, lactation and reproduction in cattle and has been identified as a candidate gene affecting a few key quantitative traits. Therefore, it is not specific to dairy traits but to traits related with growth, lactation and reproduction. Among the cattle populations investigated here, no contrasting differences in growth, lactation or reproduction was observed. In addition, a recent study on the evolution of the cytoplasmic domains of the growth hormone receptor gene in Artiodactyla (see \[[@B61]\]) has suggested that possible effects of selective sweeps on growth hormone receptor gene in bovine occurred before domestication and not among the domestic breeds. Unfortunately, due to the lack of information on the mutation and recombination rates, as well as the effective population size for these data, estimation of the selection coefficient is not possible here (see \[[@B59]\]). Given that the genomic interval of significant LD is comparable with the findings of hitchhiking around two anti-malarial resistance genes in humans \[[@B58]\] and microsatellite hitchhiking mapping in the three-spined stickleback \[[@B59]\], the hitchhiking selection in this genomic region might be fairly strong. Moreover, the availability of genomic resources (e.g. NCBI Bovine Genome Resources; <http://www.ncbi.nlm.nih.gov/projects/genome/guide/cow/>)in bovine makes it possible to develop more precise approaches with other much more frequent markers such as SNP. Genotyping an additional set of high density SNP between *AGLA17*and *SOD1*markers in the populations investigated will definitely give more precise information on selection and LD in the region. Because the populations studied here are not experimental, they differ for many characteristics other than the polled and horned traits. Thus, some of the genetic differentiation could have been due to other selective forces, e.g. pathogens. In addition, since our data violate at least partly the model assumptions of equal population size and migration rates between populations for the FDIST2 test, the outliers from the test alone should be considered with caution although the multiple neutrality tests based on different assumptions and parameter estimation can minimize the possibility of false positives. Moreover, selection is not the only possibility for changes in the distribution of variation to occur at particular loci, reduced variation or increased differentiation can result from chance alone, e.g. genetic drift, bottlenecks or founder events \[[@B57]\]. To obtain clear evidence for selection of these markers, we must analyze nucleotide variations between polled and horned populations. Conclusions =========== Our microsatellite data from northern Eurasian cattle populations empirically indicate a practical approach for identifying the best candidate loci under hitchhiking selection by simultaneously applying multiple neutrality tests based on different assumptions and parameter estimations. By analyzing microsatellite markers adjacent to functional genes, we identified two loci (*SOD1*and *AGLA17*) that are \"selection candidate\" targets associated with the horned/polled trait in cattle. This result could be further confirmed by using a more densely spaced set of markers. It would also be of great interest to see if similar patterns of selection around the *POLL*gene are observed in commercial beef breeds such as Australian Brangus, Angus and Hereford breeds, where dehorning and breeding practices for polled cattle have been an accepted part of cattle management for generations. Another future challenge is to verify the signal of artificial selection on the *POLL*gene, possibly using the next generation sequencing technology to detect the nucleotide variation of the gene between polled and horned cattle. In addition, the approach we have taken in this paper can be easily extended to other cases and marker types. For example, diversity among cattle has been directed by man towards different goals (e.g. draft, milk, meat, fatness, size, color, horn characteristics, behavior, and other characteristics) during many generations of selection. Each of these selection events has potentially left a signature of selection on the genes and their neighboring loci that could be detected by using tests such as we have applied here. As a marker technology, SNP would offer the advantage of higher throughput when scanning the genome for evidence of hitchhiking selection. Competing interests =================== The authors declare that they have no competing interests. Authors\' contributions ======================= MHL designed the study, performed the data analysis and wrote the manuscript. TI-T did the laboratory work and contributed to the manuscript writing and data analysis. HL did the laboratory work, contributed to the manuscript writing and data analysis. JK planned and coordinated the whole study, and contributed to the manuscript writing. All the authors read and approved the final manuscript. Acknowledgements ================ The study includes parts of the data sets from projects of SUNARE (Sustainable Use of NAtural REsources; <http://www.aka.fi/sunare>), Russia In Flux, and N-EURO-CAD (North European Cattle Diversity). The projects were funded by the Academy of Finland, the Ministry of Agriculture and Forestry in Finland, the Nordic Gene Bank for Farm Animals (NGH), and the Nordic Council of Ministers. We also thank Tatyana Kiselyova, Zoya Ivanova, Ruslan Popov, Innokentyi Ammosov, Elena V. Krysova, Nikolai G. Bukarov, Aleksandr D. Galkin, Boris E. Podoba, Ljudmila A. Popova, and Valerij S. Matjukov for their help in collecting the samples.
Mid
[ 0.6351351351351351, 35.25, 20.25 ]
5 - 10340*r**4 + 137*r**3 - 3069202*r**2 - 7? -60*r**2 - 248160*r + 822 Find the second derivative of 558637127*q**3 + 23024396*q + 5 wrt q. 3351822762*q Find the third derivative of -292339*l**4*r + 2*l**3 - 10*l**2*r - 2*l**2 + 680*l*r + 2*l - 37*r wrt l. -7016136*l*r + 12 What is the second derivative of 16*v**3 + 664115*v**2 - 58212*v + 9 wrt v? 96*v + 1328230 Find the second derivative of 59384442*s**4 - 334*s - 28516 wrt s. 712613304*s**2 Differentiate -1206*z**2 - 153*z + 6789252. -2412*z - 153 Differentiate 665018*k**4*y + 5*k**2*y**2 + k*y + 611*y**2 - 2*y + 133 wrt k. 2660072*k**3*y + 10*k*y**2 + y What is the first derivative of 155955835*c - 132488222 wrt c? 155955835 What is the second derivative of 22480*z**4 - 7078*z**2 + 66468363*z wrt z? 269760*z**2 - 14156 Find the third derivative of 63826*d**6 - 210*d**4 + 204967269*d**2. 7659120*d**3 - 5040*d What is the second derivative of -19127*n**2*p**2 + 3*n**2*p - 2*n**2 + 35*n*p + 282*n + 6147*p**2 + p + 293 wrt p? -38254*n**2 + 12294 What is the second derivative of -440176997*u**3 - 60*u + 276225 wrt u? -2641061982*u Find the third derivative of -161473722*t**4 + 14*t**2 + 278*t + 6169 wrt t. -3875369328*t Find the first derivative of -4*d**2*m*p + 3361*d**2*p - 62*d**2 - 64*d*m*p + 66*d*m + 2*d*p + 2*m wrt m. -4*d**2*p - 64*d*p + 66*d + 2 Find the third derivative of 41*l**5*o**2 - 78860*l**3*o**3 + 23*l**2*o**3 + 5*l*o**3 - 8071*l*o wrt l. 2460*l**2*o**2 - 473160*o**3 Find the second derivative of 127*t*z**3 - 24*t*z**2 - t*z + 10*t - 2*z**3 - 48*z**2 - 10*z + 864 wrt z. 762*t*z - 48*t - 12*z - 96 Differentiate 87*l**2*m**2 + 114*l**2*m - 4637*l*m + 4*m**2 - 63818149 with respect to l. 174*l*m**2 + 228*l*m - 4637*m What is the third derivative of 1160499033*y**6 - 486990900*y**2? 139259883960*y**3 What is the second derivative of 46*h**3*t**2*x + 15064*h**3*t**2 + 57*h**3*t - 2*h**3 - 9*h**2*t + h*x + 8*x + 1 wrt t? 92*h**3*x + 30128*h**3 What is the second derivative of 5262409*s**3 + 5404683*s? 31574454*s Find the first derivative of -44247969*x - 61498830 wrt x. -44247969 Differentiate -10486970*p - 14252267 with respect to p. -10486970 What is the second derivative of 39*a**3*m - 14*a**3 - 261*a**2*m - 3*a**2 - 4169*a*m + 7*m + 37 wrt a? 234*a*m - 84*a - 522*m - 6 Find the second derivative of 272*q**5 - 2156*q**4 - 6*q**3 - 23183192*q. 5440*q**3 - 25872*q**2 - 36*q What is the third derivative of 526585224*k**6 + 2953*k**2 - 430*k - 33 wrt k? 63190226880*k**3 Find the third derivative of -416815*d**4 + 24*d**3 - 57*d**2 + 222594. -10003560*d + 144 Find the third derivative of -566281006*x**3 + 10277965*x**2 - 9 wrt x. -3397686036 What is the first derivative of -146099879*u + 152132171? -146099879 Find the first derivative of -156*f**2*z - 104069847*f**2 + 2*f*z + f - 112678*z wrt z. -156*f**2 + 2*f - 112678 Find the second derivative of 40123857*d*h**2 - 51587098*d*h wrt h. 80247714*d What is the second derivative of 104977*s**3 - 35*s**2 + 18596122*s? 629862*s - 70 What is the second derivative of -2*y**4 - 23016465*y**3 + 2*y**2 - 198403848*y wrt y? -24*y**2 - 138098790*y + 4 What is the first derivative of 10113089*g**3 - 7686015 wrt g? 30339267*g**2 What is the second derivative of 2421401*f**3 - 34540*f + 17? 14528406*f What is the second derivative of -548823215*j**2 + 31671614*j - 16 wrt j? -1097646430 What is the third derivative of -22168098*v**3 + 2*v**2 + 8941294*v? -133008588 Find the third derivative of 36*w*x**3 + 14489*w*x**2 - 30663*x**3 + 37 wrt x. 216*w - 183978 What is the derivative of 1021014*h**2 - 36939332? 2042028*h Find the first derivative of 1718644*c**3*i + c**3 - 2*i - 1101389 wrt c. 5155932*c**2*i + 3*c**2 What is the first derivative of 21781817*g - 12544272 wrt g? 21781817 What is the third derivative of 13226329*i**6 - 9959239*i**2? 1587159480*i**3 Find the third derivative of -2*j**3*y**2 + 1170808*j**3*y - 2*j**3 + 8*j**2*y**2 + 4588*j*y**2 - 2*j*y - 2 wrt j. -12*y**2 + 7024848*y - 12 What is the second derivative of 58718*b**2*i**2 - 80*b**2 - 22*b*i**2 + 7*b + 160988*i**2 wrt b? 117436*i**2 - 160 Find the second derivative of -2557*t**4 - 6636*t**3 + t**2 - 83921474*t. -30684*t**2 - 39816*t + 2 What is the third derivative of -47261747*c**3*p - 10*c**2*p - 4*c**2 + 2165*c*p - c - 257 wrt c? -283570482*p What is the first derivative of 10073668*r**4 - 10960849 wrt r? 40294672*r**3 What is the second derivative of -135002*b**4*z**3 - 1064*b**3*z + 60*b*z**3 + 3132*b*z**2 + 11*b*z - 3*z**3 wrt b? -1620024*b**2*z**3 - 6384*b*z Find the first derivative of -702*i**2 + 235465*i*m**2 + 373894*m**2 - 2*m - 500 wrt i. -1404*i + 235465*m**2 What is the third derivative of 33887700*l**5 - 241847490*l**2 wrt l? 2033262000*l**2 What is the second derivative of d**2*u**3 - 9*d**2*u**2 - 42290*d**2*u + 543*d*u**3 - 6*d*u - 4*u**3 + 4*u**2 - 2*u - 131 wrt d? 2*u**3 - 18*u**2 - 84580*u What is the third derivative of 2*f**4*p**2 + 73882580*f**4 + f**2*p**2 + f**2 + 1618*f*p**2 + 233*p**2 wrt f? 48*f*p**2 + 1773181920*f What is the third derivative of -1128074*h**2*u**3 + 6*h**2*u**2 - h**2 + 2*h*u**3 + 25*u**3 - 2*u**2 + 278*u - 206 wrt u? -6768444*h**2 + 12*h + 150 Find the second derivative of -612*m**3*r**2 - 6*m**3 - 5*m**2*r - 2*m*r**2 - m*r - 13*m + 326*r**2 + r wrt r. -1224*m**3 - 4*m + 652 Differentiate -58333300*i**4 + 69075663. -233333200*i**3 Find the second derivative of -538*a*s**2*z**2 + a*s**2 + 47*a*z**3 + 2*a*z**2 + a*z + 37*a + 86*s**2 + 14*s*z - 6*z wrt z. -1076*a*s**2 + 282*a*z + 4*a What is the derivative of -593582191*b**4 - 501691570 wrt b? -2374328764*b**3 What is the third derivative of 582499699*q**3 - 1594704196*q**2 wrt q? 3494998194 What is the third derivative of 143729052*c**3 + 115411515*c**2 wrt c? 862374312 Differentiate 115*b*h**3*y + 2*b*h*y + 25*b*y - 50*b - h**3 + h**2*y - 9*h**2 - 2657*y - 3 with respect to b. 115*h**3*y + 2*h*y + 25*y - 50 Find the first derivative of 3099507*a**4 - 58160113 wrt a. 12398028*a**3 Find the third derivative of -576345283*w**3 - 659*w**2 + 95677. -3458071698 Differentiate -w*x**3 + 33634004*w - 130562335*x**4 with respect to x. -3*w*x**2 - 522249340*x**3 Find the third derivative of 3*f**4*m - 388032*f**3*m - 10263*f**2*m - 11*f*m wrt f. 72*f*m - 2328192*m Find the first derivative of -61847340*c - 10368310 wrt c. -61847340 Differentiate 22173637*d - 32995072 wrt d. 22173637 Differentiate 57*p**2 - 7509*p - 36569418. 114*p - 7509 What is the first derivative of -8*p**2*v + p**2 - 180574*p*v**3 - 38683*p wrt v? -8*p**2 - 541722*p*v**2 What is the third derivative of f**2*o**3 - 139256*f**2*o**2 - 382*f**2 + 28529277*f*o**3 wrt o? 6*f**2 + 171175662*f What is the second derivative of 3690*v*y**3 + 1348*v*y**2 - 1358*v*y + 3*v + 5*y**3 - 21*y - 171 wrt y? 22140*v*y + 2696*v + 30*y What is the second derivative of 4*b**3*i**2 + 2*b**3 - 12032*b**2*i**2 - 19*b*i**2 + 2*i**2 - 8345900*i wrt i? 8*b**3 - 24064*b**2 - 38*b + 4 Find the second derivative of 194*s**5 + 60594*s**3 + 235299*s + 28 wrt s. 3880*s**3 + 363564*s What is the third derivative of 6*h**3*u**2*w + 13221696*h**3*u*w + 7038*h**2*u**2 + 14*h**2 + 16*h*u**2*w - 4*w wrt h? 36*u**2*w + 79330176*u*w Find the second derivative of 646*a**3 + 130936*a**2 - 18608*a - 21236 wrt a. 3876*a + 261872 Find the first derivative of 4*w**4 - 340428*w**3 - 1495893. 16*w**3 - 1021284*w**2 What is the second derivative of 3632*f**3*r - 7*f**2*r + 4122*f**2 - 2*f*r - f + 1797647*r + 7 wrt f? 21792*f*r - 14*r + 8244 What is the second derivative of 11*j**2*t**2*u**3 - 4426401*j**2*t*u - 1309007*j*t*u + j*u**3 + 4*t**2*u**3 wrt j? 22*t**2*u**3 - 8852802*t*u Differentiate 133*l**2 - 213596*l - 49326930. 266*l - 213596 Differentiate 1999*v**2*y**2 + 2*v**2*y + 313696*v**2 + 22*v*y**2 + 3 with respect to y. 3998*v**2*y + 2*v**2 + 44*v*y Differentiate 59*y**3 - 815023*y**2 - 430012577 with respect to y. 177*y**2 - 1630046*y Find the first derivative of 441044434*u**2 - 551521200. 882088868*u What is the derivative of -24*j**2 + 68*j*o + 6516*j + 31346*o + 163 wrt j? -48*j + 68*o + 6516 Find the second derivative of -1084*u**4 + 5545*u**3 - 2*u**2 - 8887899*u wrt u. -13008*u**2 + 33270*u - 4 What is the second derivative of -1614*w**4 - 6*w**3 + 2
Low
[ 0.48131868131868105, 27.375, 29.5 ]
Q: No data from rest call I am simply wanting to return data from a url localhost:8080/rest/items. Below is the ember code but it does seem to return or make a call to get any data; App = Ember.Application.create({ }); var attr = DS.attr; App.Item = DS.Model.extend({ name : attr(), }); App.Store = DS.Store.extend({ revision: 12, adapter: 'DS.FixtureAdapter' }); App.Store = DS.Store.extend({ revision: 12, adapter: DS.RESTAdapter.create({ url: 'rest' }) }); App.ItemRoute = Ember.Route.extend({ model: function () { App.Item.find(); } }); I am new to ember and do not know what is incorrect with this code. A: switch to a newer version of ember data (http://builds.emberjs.com/tags/v1.0.0-beta.3/ember-data.js), and do it like this DS.RESTAdapter.reopen({ namespace: 'rest' }); App = Ember.Application.create({}); var attr = DS.attr; App.Item = DS.Model.extend({ name : attr(), }); App.ApplicationAdapter = DS.RESTAdapter; App.ItemRoute = Ember.Route.extend({ model: function () { this.store.find('item'); } });
Mid
[ 0.6025, 30.125, 19.875 ]
package onactivityresult.compiler; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertTrue; import org.junit.Test; public class ParameterListTest { @Test public void addShouldNotAddNonNull() { final ParameterList parameters = new ParameterList(); assertEquals(0, parameters.size()); parameters.add(null); assertEquals(0, parameters.size()); } @Test public void addShouldAddNonNull() { final ParameterList parameters = new ParameterList(); assertEquals(0, parameters.size()); parameters.add(Parameter.createIntent()); assertEquals(1, parameters.size()); } @Test public void hasNumberOfDifferentParameters() { final ParameterList parameters = new ParameterList(); assertTrue(parameters.hasNumberOfDifferentParameters(0)); parameters.add(Parameter.createIntent()); assertTrue(parameters.hasNumberOfDifferentParameters(1)); parameters.add(Parameter.createIntent()); // Adding the same is not different assertTrue(parameters.hasNumberOfDifferentParameters(1)); parameters.add(Parameter.createResultCode()); // Adding different is different assertTrue(parameters.hasNumberOfDifferentParameters(2)); parameters.add(Parameter.createResultCode()); // Adding the same is not different assertTrue(parameters.hasNumberOfDifferentParameters(2)); } }
Mid
[ 0.6208651399491091, 30.5, 18.625 ]
Pulmonary intravascular macrophages in deer. Pulmonary intravascular macrophages (PIMs) have been found in the septal capillaries of deer lungs. Lung samples from adult deer were fixed in 2.5% glutaraldehyde, and then routinely processed for electron microscopy. The main features of the PIMs were the presence of tubular invaginations in the membrane (micropinocytosis vermiformis), phagosomes, and junctions with endothelial cells. A mean of 4.4 of these junctions was recorded per cell. They comprised segments ranging from 67 to 289 nm in length, where the plasma membranes were separated by spaces from 10 to 25 nm wide. In these areas the cytoplasm underlying the membranes showed evidence of increased electron density. When PIMs were compared with alveolar macrophages, it could be seen that although the PIMs were more numerous (more than twice), they were also smaller than the alveolar macrophages (47.625 versus 101.260 microns2 respectively.
Mid
[ 0.584905660377358, 31, 22 ]
Henrik Lynggaard's blog Tuesday, 7 February 2012 I have previously written about the challenges of integrating an Ivy based subproject (like the play framework) into a build that is otherwise Maven based. After some work it is now working although the support feels a bit rudimentary.Here are the highlights on how to make it work Saturday, 14 January 2012 It might seem very counter intuitive to start using Hudson's XML format to manage Hudson jobs when it has such a great web interface, especially since it is the web interface which has made Hudson so approachable and easy to use. Don't get me wrong. I still love the web interface and think it is the right way to get people to use the tool, however I also think there comes a time when you outgrow the web interface and this is why I built the jobcreator tool. These are the requirements and issues that caused me to outgrow the web interface: Manual changes doesn't scale Using the web interface to make changes to individual jobs is very easy, but it doesn't really scale if you need to change a lot of jobs on the same time. One example could be changing the git branch from "master" to a release branch for all the jobs related to a environment, Such a change could involve upwards of 30 jobs. Another example could be that there are changes to the content and/or structure of the jobs and those must be propagated up through the environments in sync with project code.This would be even more manual changes. Managing this with manual changes in the web interfaces introduces a big risk for human error and inconsistencies. Hudson jobs are code If you want to be able to reproduce a build or deployment at a later time it is important that you can also reproduce the Hudson jobs. In order to do this you need to store and version your Hudson job configurations. This is naturally best done in a SCM like Git or Subversion. Doing so also gives you the option to do branched development of your jobs. Testing and more than one Hudson instance. Before making changes to the jobs being actively used the changes should naturally be tested somewhere. This normally means creating the same set of jobs somewhere else or targeted towards a different environment. Having the jobs defined as templates makes it easy for a developer to load the jobs into a private Hudson instance to experiment or share it on the testing instance. Overall Of course Hudson can be managed via the web interface, but for me it is just another step in the automation. Friday, 13 January 2012 I have finally had the chance to pull together the last changes before announcing the first version of the Hudson Job Creator tool. The idea behind the tool is that you can write FreeMarker based templates and combine those with properties defined in a "pipeline" specification in order to generate Hudson's job config.xml files. This is mainly useful if you maintain a number of similar jobs, or have a series of jobs that you need to specify for multiple environments. I know working with Hudson's xml files directly can seem counter intuitive since one of Hudson's main strengths is its approachability and easy to use web interface, so later this week I will post a more in depth blog post explaining why I chose to go this route. This bug has now been fixed and a new version of the release plugin has been released. So if you update the release plugin to version 2.2.2, Hudson's maven3 integration will now work for releases also. Every hour deploy and test the latest successfully build artefacts to dev #1 Every day deploy and test the latest artefacts which have been successfully tested in dev #1 to dev #2 On demand do a Maven release of the latest artefacts that have passed testing in dev #2 The tricky part of this pipeline comes in the dev #2 environment because it needs a way to select the latest artefacts which have been tested in dev #1 instead of just the latest artefacts produced. The same goes for making the release, I need some way to identify which artefacts have been tested successfully in dev #2. This means I cannot rely on just picking the latest snapshot deployed to the internal repository. We have considered different options: Publish the snapshot to a internal repository and carry around the timestamp of the specific snapshot version. This would allow us to pin out the version, but gives us a problem with regards to cleaning up unused snapshots as Nexus can only do keep X days or X versions, but not remove a set of artefacts based on a timestamp. Also it has the downside of people questioning why we should even do Maven releasing if we already have a unique identifier. A second approach would be to use the "copy artefacts" Hudson feature, but then the way we get artefacts would be different between dev and the upper environments. The approach we have settled on is to not deploy the snapshots to the nexus repo, but use the hudson maven repository plugin. This plugin exposes each build as its own repository. In order to get the right artefacts we use a custom settings.xml to mirror the snapshot repository to the URL of the specific build as exposed by the Hudson plugin. This plugin only works with either the jobs Maven 2 jobs or the new Maven 3 integration, since it relies on Hudson understanding the build and the artefacts. We use the promoted builds plugin to identify the correct build, and we use the promotion status for easy clean up of non used artefacts. We haven't looked too much into using nexus pro's features such as staging repositories or adding metadata, since the above approach works fairly well for us. The new challenge: The reason for writing this post and asking for help is a possible change to our process which I am not sure how to best integrate. There is a wish to integrate a component (playframework based webapp) build using ivy into this framework and specifically into this project. I can see this causing some integration pains Firstly the project is one big Maven multi module project and we prefer to keep it that way. As a very least we want to keep things as one build i.e one Hudson job for building. Is it possible to have a Maven submodule defer execution to Ivy ? If we get the component built using ivy only, then Hudson will not be able to see the outcome as a Maven artefact, and as thus wont be able to expose it as part of the "repository per build". That is at least my strong suspicion. What to do ? So does anyone have a suggestions on how to resolve this ? Can we cleanly integrate Ivy into our current build, if so how ? Do we need to find another approach than using the "repository per build" plugin ? if so, what is the suggested alternative. Would Nexus/Artifactory paid editions make this easier ? Just to be clear my requirements are: From the outside it must appear as one build i.e. one Hudson job. For a developers desktop build it is okay to be a multi step process We need to be able to specify a particular build to deploy in dev #2 and for releasing. We would like to continue the use the promoted builds plugin to visualize good builds Wednesday, 26 October 2011 This is a review of Apache Maven 3 Cookbook written by "Srirangan". I got a free copy from Packt publishing for the purpose of the review. I have been using Maven for some years now and this book is a introductory book, so it was clear from the beginning that I am not in the target audience. The style of splitting the book into 50 recipes makes for a good format which is easy to read and breaks the book into small achievements for the reader. Instead of focusing solely on how Maven is configured, the author tries to tie some of the subjects to software development practices e.g. covering Nexus and Hudson while explaining team collaboration. It serves the book well to put Maven into a development perspective, but it doesn't always fit with the recipe format. For instance in the Nexus case from above the "How it Work" section becomes more a "why it is good" section. I like the fact that the book covers a wide range of different project types and topics. Many times when you read tutorials or other documentation only the simplest project types are covered leaving the reader to add plugins as needed. This book covers many project types and framework and some non-Java areas. It also covers things like setting up Nexus,Hudson, various IDEs. It even has a single chapter on plugin development. In the first chapter the level of information in each recipe is appropriate, but as the chapters get more complex the level of information does not. This results in many of the recipes being too simplistic. A prime example the is set-up of remote repositories, it describes in great many screen shots how to install tomcat 7 and deploy nexus, but only has a single line of information on how to set-up the remote repository, plus only mentions (incorrectly) changing the settings.xml and not the required changes to the project object model. So it fails to help the reader define and use the remote repository possible leaving the reader with a broken set-up This simplistic approach has another side effect. In many of the recipes there is clear copy-paste'able examples but very little explanation of why things are the they are. An example would be the first recipe which introduce multi-module projects. In the top level project definition the dependencies are placed in "<dependencyManagment>" section instead of the normal "<dependencies>" section without an explanation of why. Conclusion: While I like the style and long list of topics covered in this book, I think the decision not the explain the details of why things work like they do e.g. <dependencies> vs <dependencyManagment> or how repositories works, does the book a big disservice. I would not recommend learning Maven from this book alone, since I think explaining the "why" is an essential part of learning a new tool. If you want to learn Maven use the free sonatype book Maven: The Complete Reference and buy a copy of this book if you like a quick introduction to the various project types and plugins. Thursday, 13 October 2011 The tool itself is pretty good and makes it very easy to test that our soap based web-services are working as intended. The fact that is actually provides Maven and Junit integration out of the box is even better and fits very nicely with our CI environment. There is however a few things that are not obvious when using the plugin. The documentation page is really old, e.g. it refers to an old (2.5.1) version of the plugin. The trick here is that you should in general use the same version, as the desktop version you are running. In my case that is 4.0.0 It isn't documented on the page but there here is both a "maven-soapui-plugin" and "maven-soapui-pro-plugin" version of the plugin. In order to fully use project created using the pro version you need the pro version of the plugin The version 4.0.0 of the plugin has a misconfiguration so you will need to manually add some dependencies to the plugin. The version I got working looks like this.
Mid
[ 0.5521327014218, 29.125, 23.625 ]
Q: jQuery: A problem with .each function I send to the javascript an array like: $.each(data, function (value, name) { $('#visitStart').append($('<option></option>').val(value).html(value)); }); and as a result I see that the visitStart input is filled by values from 0 to 241. Why ? A: $.each sends an index, and value into the callback function - http://api.jquery.com/jQuery.each/ $.each(data, function (i, obj) { $('#visitStart').append($('<option></option>').val(obj.value).html(obj.value)); });
Mid
[ 0.5714285714285711, 29, 21.75 ]
How the US Pushed Sweden to Take Down the Pirate Bay - pawal https://torrentfreak.com/how-the-us-pushed-sweden-to-take-down-the-pirate-bay-171212/ ====== cup-of-tea The copyright industry has had far too much power for many years now. But when I talk to people about this nobody cares. For most people the products of this industry are just "content" which they use to waste their time so I suppose it makes sense that they don't care too much about it. The tragedy is that the copyright industry controls a large and continually growing part of our culture and their power is only increasing. I was there when a UK music tracker called OiNK's Pink Palace was shut down. The police raided the home of the site owner before dawn and even the home of his father who had no idea what his son was up to. Copyright industry writers wrote the news article, claiming it was "extremely lucrative" and included gems such as "Within a few hours of a popular pre-release track being posted on the OiNK site, hundreds of copies can be found". The site's owner was found not guilty in court several years later, but not before the copyright industry essentially ruined his life. But how does this happen? If you talk to most people they don't understand copyright at all. They think it's some kind of privileged status that you have to pay for, like a trademark or something. Most people are not even aware that they hold copyrights. And why would they? Can the average person summon the police to help protect their copyright? Of course not. It's not even a criminal matter. The police being involved seems nothing short of corruption. ~~~ marcoperaza He was running a website that revolved around violating millions of copyrights. Why shouldn't he go to jail? What gives you the right to take someone else's painstakingly created artistic creation and give it away for free to thousands of people, depriving them of the exclusive right to sell their own work. Copyright is both a criminal and civil matter. The civil court system is useful for many things, but it is limited to monetary damages, which is not very helpful when the damages are in the millions and the defendant isn't very wealthy. The penal power of the criminal system is not appropriate for individual people downloading music, but it certainly is for a sophisticated operation involving the illegal distribution of millions of copyrighted works to hundreds of thousands of users. == Edit == Some responses, since I'm rate-limited: > _In most cases i read about it 's more a matter of the current copyright > holder versus the facilitator. Not a matter of the creator versus the actual > downloader._ Two points. 1\. How do you think the current copyright holder got the copyright? They acquired it from the creator by either paying in advance or after the fact or as part of some ongoing deal. 2\. If you run a market that you know is used almost exclusively by people selling contraband, do you think that's legal just because you're not the buyer or the seller? In case you don't know, it's not, and you'll go to jail just as if you had sold the contraband. > _If the defendant isn 't wealthy after distributing all that content, is the > content worth millions? Or is the government-enforced business model worth > millions?_ Yes, intellectual property isn't worth anything without government enforcement. But we've decided to, as individual societies and as an entire world by treaty, to provide such enforcement, because we think recognizing such property rights is good for our society. And as for the first point, how much you make by violating other people's rights isn't that relevant. If I steal a truckload of iPhones and give them away for free, I still stole them. I realize IP is very different from physical property, but the profit of the crook isn't that relevant in either. ~~~ gatmne Legality aside, whether sharing copyrighted information is amoral or not is determined by one's own values. Some people, myself included, see a person's right-to-share to be far more important to humanity than the authors ability to employ an ill-suited business model to profit off his or her work. There are many ways to generate profit other than to infringe on others' right to share. Humanity does not owe you a successful business model, and certainly not at the expense of it's right to share. > What gives you the right to take someone else's painstakingly created > artistic creation and give it away for free to thousands of people, > depriving them of the exclusive right to sell their own work. Users sharing copyrighted work does nothing to prevent authors from profiting off their work. Conflating sharing and business is what got us in this mess in the first place. ~~~ msc1 Think about 3rd world countries. I'm relatively better off than my peers (2 cars, own a house etc.) but I can no way afford Hex Rays IDA Pro, Burp Site Professional, Navicat Premium or JetBrains and this list goes on... They cost more than my two or three months of rent. My parents are both medical doctors and their medical books are not affordable if they were sold in US prices but they have 3rd world print editions and they can legally buy these copies. Software vendors have to adapt to tthis too. Gaming companies already adapted this and I've never pirated any games since Steam. I'm a paying netflix, spotify customer because they are priced for the country they operate and as you can guess I'm not torrenting music or movies either. Internet is global but purchasing power is not. Ethically, I see no problem in torrenting. Human knowledge is "on the shoulders of giants" and in philosophical perspective -I'm not advocating this- even copyright is on shaky grounds (Property is theft! - Pierre-Joseph Proudhon) ~~~ freeflight > Gaming companies already adapted this and I've never pirated any games since > Steam. The first to adopt this, very successfully, had actually been Apple with their approach to selling mp3s. While everybody was still busy trying to sell overpriced physical albums, complaining about the "digital thievery", Apple took this as an opportunity with iTunes. iTunes made buying music digitally as convenient as it was pirating it, at the same time iTunes allowed customers to only buy specific songs (at reasonable prices), instead of forcing them to buy whole albums. Valve did something similar for gaming with Steam, that's true, but it took Steam way longer to get there than it did take iTunes. Imho Steam has also regressed quite a bit in that regard, it used to be a place for good deals but increasingly feels like a platform to shovel around shovelware for badges and trading cards. ~~~ drewmol Apple is an interesting case. While they may have flirted with 'legal' music as a revenue stream, the big bucks came from adding utility and simplicity to the ubiquitous collections of 'stolen' music. A very small subset of iPods were filled up with the plus +$10K cost of 'legal' music. No strong opinion, but it's a somewhat unique situation in the economics of IP. ~~~ freeflight > A very small subset of iPods were filled up with the plus +$10K cost of > 'legal' music. But they were actually filled with some legal music, prior to iTunes there wasn't really "one unified place" for purchasing digital music, most mp3's came from physical CD's people ripped privately. A couple of flatrate services popped up before/around the same time, but these mostly turned out to be illegal offerings, so it was mostly iTunes which stuck around in the beginning and formed the market. > While they may have flirted with 'legal' music as a revenue stream They still have impressive market shares in digital music distribution, they have started to lose ground to streaming services like Spotify and music labels finally adapting to the digital age but afaik iTunes was and still is a major player in digital music distribution. ~~~ drewmol Certainly. I wanted to provide some insight to the dynamics of the iPod/iTunes situation. Interestingly as you noted >A couple of flatrate services popped up before/around the same time, but these mostly turned out to be illegal offerings, so it was mostly iTunes which stuck around in the beginning and formed the market. I think Apples success at creating this market was a byproduct of it being fundemental pairing for the iPod's sucesss. Without the iPod, iTunes would likely have gone the same way as the rest of the early legal digital music sellers. Without the existence of a large collection of mostly 'pirated' mp3's sitting on home desktops and office networks across the globe, the iPod probably would not have taken off. Apple provided great utility for those collections by selling the iPod. Apple only briefly had any barriers to allowing the seamless transfer/sharing of entire iPod collections of copyrighted music, before concluding it would be much more lucritive to embrace the prevelance of 'pirated' music collections by investing in software to clean & organize it, and simple to use hardware that makes it portable. ~~~ freeflight > Apple only briefly had any barriers to allowing the seamless > transfer/sharing of entire iPod collections of copyrighted music, before > concluding it would be much more lucritive to embrace the prevelance of > 'pirated' music collections by investing in software to clean & organize it, > and simple to use hardware that makes it portable. True enough, and you most certainly have a point about the iPod also helping, that's something I haven't really factored in that much. To me, iTunes was mostly a great example how usability, pricing, and ease of legal access to content matters. Much earlier versions of iTunes UI was very reminiscent of mp3 sharing clients popular at that time (Limewire/Napster/Whatnot) by sorting titles in long lists and making getting them as easy as pressing a "download" button right next to it. The choice of pricing, single songs for $.99 [0], also felt like it contributed a lot to a paradigm shift how music is sold and consumed, acknowledging established trends in priacy by allowing legitimate customers more freedom in paying for only those songs they want. [0] [https://apple.slashdot.org/story/03/04/28/1723226/apple- intr...](https://apple.slashdot.org/story/03/04/28/1723226/apple-introduces- itunes-music-store-itunes-4-new-ipod) ------ coldtea > _At the time there were some rumors that Sweden would be placed on the US > Trade Representative’s 301 Watch List. This could possibly result in > negative trade implications. However, in a cable written April 2006, the US > Embassy in Sweden was informed that, while there were concerns, it would not > be listed. Not yet at least. “We understand that a specialized organization > for enforcement against Internet piracy currently is under consideration,” > the cable reads, while mentioning The Pirate Bay once again._ Typical, not so subtle, blackmail. One wonders what would happen if, say, the leader of some disclosure website was residing in Sweden and a superpower wanted him... (From a comment below on TPB case: "The judge was Thomas Norström. Swedish public radio revealed that the judge, Thomas Norström, is a member of several copyright protection associations, whose members include Monique Wadsted and Peter Danowsky – attorneys who represented the music and movie industries in the case. According to the report, Judge Norström also serves as a board member on one of the groups of which Mrs. Wadsted, the Motion Picture Association of America’s attorney, is a member." \-- hurray for independent justice in any case..) ~~~ robert_foss Overall the whole series of events was pretty offensive, and it paints the picture of the US being a schoolyard bully. ~~~ RobertoG Business as usual, but better the bully than the psychopath. From Wikipedia's "1954_Guatemalan_coup_d'état": "[..] The United Fruit Company (UFC), whose highly profitable business had been affected by the end to exploitative labor practices in Guatemala, engaged in an influential lobbying campaign to persuade the U.S. to overthrow the Guatemalan government. U.S. President Harry Truman authorized Operation PBFORTUNE to topple Árbenz in 1952; although the operation was quickly aborted, it was a precursor to PBSUCCESS." Reading about those things, one get the impression that the Department of State works for the Camber of Commerce, instead of the USA citizens. (1). [https://en.wikipedia.org/wiki/1954_Guatemalan_coup_d%27%C3%A...](https://en.wikipedia.org/wiki/1954_Guatemalan_coup_d%27%C3%A9tat) ~~~ paganel > Reading about those things, one get the impression that the Department of > State works for the Camber of Commerce, instead of the USA citizens. If I'm not mistaken the first permanent "embassies" were set up by the Venetians (mostly) and the Genoese, and their role was essentially just that, i.e. protecting the economic interests of their "home" entities. It so happened that most of the time protecting the citizens who happened to reside in foreign countries also meant protecting their home-city economic interests, but that mainly happened because the citizens involved were traders themselves. So, in a way, you could say that what the Department of State is now doing is just the continuation of the initial idea of a "foreign embassy". ~~~ RobertoG Surely, the role of the embassy of a power, ruled by a oligarchy of merchants and aristocrats, it's very different from the expected role of the embassy of a democratic federal republic. Just joking. As you say, business as usual. ------ ckastner It never ceases to amaze me how much influence the MPAA has. Movies, while extremely popular, don't generate _that_ much money: in 2016, total box office results in the US were under $12bn [1]. That's _the entire industry_. Apple alone makes that much money in three weeks' time. Amazing, that you can apply such pressure to politics, with so little. [1] [https://www.statista.com/statistics/187069/north-american- bo...](https://www.statista.com/statistics/187069/north-american-box-office- gross-revenue-since-1980/) ~~~ digi_owl It's because so few care about copyright. It is seen as something dry and stodgy that only affect artists and their publishers/labels. This perhaps because once the cassette recorder, never mind the VCR, came to be, most nations on the western side of the wall decided to not go full police state and thus added a "friends and family" clause to their copyright laws. This meant that a person could create a copy, if it was meant for a direct friend or a relative. This avoided having to park a copyright cop in every home in the nation. Never mind that producing analog copies from tape to tape cause of a noticeable loss of content with each generation removed from the original. But the computer, never mind the internet, changed all that. It made mass copying not something that required massive machinery in a warehouse, but something every kid could do in their own home. Especially as bandwidth and storage capacity kept improving at a massive rate. And digital copies do not degrade like an analog one does. ~~~ icebraining The organizations also play a game of the Boy Who Cried Wolf. Remember _Home Taping Is Killing Music_? By their propaganda, the music industry should have died multiple times in the past few decades. ------ jakobegger And despite all these efforts, I'm still a happy user of the pirate bay whenever I want to watch something that I can't find on iTunes or Amazon. For me, the Pirate Bay has been the most reliable way to find stuff over the last years, for so many things it's still better than all the paid alternatives that I use. So much money wasted on futile attempts to suppress a website... ~~~ sveme There's the extremely annoying tendency at least at German streaming providers (iTunes, Amazon/Google Video) to remove rental access to movies about nine months after DVD release or when a second movie of a series is about to arrive at the theatres. Only buy access remains accessible. Now that physical video rental stores are on terminal decline, online stores have an effective oligopoly without real competition and push customers towards paying a maximum. The only alternative in this case remains thepiratebay. ~~~ madez Aren't you afraid of receiving a 'Abmahnung' for torrenting? ~~~ tekmate I'm still dumbfounded that the practise of setting up torrent honeypots by agencies like waldorf&frommer is actually legal ------ ploggingdev If you're interested in learning more about The Pirate Bay, the founders and the trial, watch the documentary called TPB AFK (The Pirate Bay : Away From Keyboard) : [https://www.youtube.com/watch?v=eTOKXCEwo_8](https://www.youtube.com/watch?v=eTOKXCEwo_8) One of the founders of TPB, Peter Sunde started: * Njalla ([https://njal.la/](https://njal.la/)) - a privacy focused domain registration service * Flattr ([https://flattr.com/](https://flattr.com/)) - a tipping/micropayment service to support content creators * A VPN service - [https://ipredator.se/](https://ipredator.se/) Another link that you might find interesting, his interview with Vice : [https://motherboard.vice.com/en_us/article/qkjpbd/pirate- bay...](https://motherboard.vice.com/en_us/article/qkjpbd/pirate-bay-founder- peter-sunde-i-have-given-up) ~~~ Marazan Does it talk much about the financier Carl Lundström's role in TPB? He never gets mentioned much for some reason* * Because of his far right connections ~~~ ploggingdev IIRC it does, but only briefly. He bought advertising space on TPB and it became a controversy. The TPB guys were falsely accused of being right wing extremists for doing business with Carl Lundström. ~~~ Marazan Woah, woah. He was a co-defendant at the trial. He was more that just a dude who bought some ad space. ------ beloch I'm sure there are many reading this who have absolutely no sympathy for pirates. They're stealing and that's that. Well, how do you feel about your government blackmailing, extorting, or otherwise "strong-arming" other sovereign nations in order to foist its laws upon them and then hiding that from you? (It really is a minor miracle this cable was released _at all_.) Is it truly worth stooping to such measures to ensure that Micky Mouse remains copyright protected for all time _everywhere_? Don't other nations have the right to make their own laws? How would you feel if some other nation foisted it's laws on the U.S. in such a manner? Why does the U.S. government go to such extremes for private enterprise anyways?[1] Piracy is bad. What the U.S. government has done in response is worse. [1]I suggest you google the United Fruit Company's history the next time you're eating a Chiquita banana for a _real_ eye opener. ~~~ Daycrawler Copyright holders lose customers because of piracy, but that's not stealing. If I sell some object and my logistics is that I sell 3 per months, then I manufacture 3 objects per months and wait for customers to buy them. If someone steals one, then I've only 2 remaining objects. I've the choice between telling the 3rd expected customer that I'm out, or to manufacture one extra, which in any case result in a direct loss of money. I'm a victim of theft. If I'm a film producer and my logistics is that I sell N viewings per month, and someone pirates the movie, then this doesn't interfere with my ability to sell the N viewings to my expected customers. So this isn't theft. Of course, I would like the pirate to be my customer so that I can step up to N+1 viewing per month, but if I want to enforce that I need to turn to who made the copy available to the pirate, which is counterfeit. ------ realusername I remember the piratebay trial being a gigantic farce where some of the judges had ties to copyright organisations. It's crazy how much power have these mafia-like organisations. (edit: spelling) ~~~ draugadrotten The judge was Thomas Norström. Swedish public radio revealed that the judge, Thomas Norström, is a member of several copyright protection associations, whose members include Monique Wadsted and Peter Danowsky – attorneys who represented the music and movie industries in the case. According to the report, Judge Norström also serves as a board member on one of the groups of which Mrs. Wadsted, the Motion Picture Association of America’s attorney, is a member. That this passed without causing a conflict of interest is astonishing. [https://www.csmonitor.com/World/Global- News/2009/0423/pirate...](https://www.csmonitor.com/World/Global- News/2009/0423/pirate-bay-judge-under-fire-for-conflict-of-interest) Also worth mentioning is that the lead investigating police got a job from Warner Brothers very soon after the trial was successful. Thank you, job well done. [https://techcrunch.com/2008/04/18/officer-who- investigated-p...](https://techcrunch.com/2008/04/18/officer-who-investigated- pirate-bay-took-job-with-warner-brothers-will-still-testify-against-pirate- bay/) In recent news, the chair of Swedens Supreme court judge Stefan Lindskog has been implied in shady financial transactions, and is under investigation by the police. The belief we once had that Sweden had a low level of corruption can be put to history. And of course even having a low level still means there is some corruption. [https://www.expressen.se/nyheter/polisen-utreder-hogsta- doms...](https://www.expressen.se/nyheter/polisen-utreder-hogsta-domstolens- ordforande/) YMMV. ~~~ Cthulhu_ > Also worth mentioning is that the lead investigating police got a job from > Warner Brothers very soon after the trial was successful. Can you blame them? Thanks to that case the guy got a lot of experience in the area of copyright violations and online piracy, that's valuable knowledge to have and they could use someone to advise them. You're implying that he did it for the cushy job he got for it, but I have my doubts. Maybe if you can prove he got the offer before the investigations started? ~~~ tonyedgecombe It's hard to prove but there is still a dirty smell around it all. ------ thomastjeffery Let's get one thing straight: Torrent sites _do not host content_. They host _community_. The only thing thepiratebay.org, what.cd, kickasstorrents.cr, etc. did or continue to do is the _same_ that a forum or news site like reddit or hackernews does: provide a community with a purpose. While hackernews is a community for discussing news or interesting things, etc. WhatCD was a place for discussing music, quality releases, and sharing good encodings, rather than the transcoded lossy->lossy formats you see flying around most places. Naturally, WhatCD's _as a community_ wasn't concerned with things like copyright owner's profits, etc., even though many of its users certainly were, but _simply couldn 't find an alternative_, as a lot of music is not even to be found, let alone sold in particularly high quality lossless formats. When what.cd was taken down, _none_ of the copies of _copyrighted content_ were deleted. The _community_ was broken up. If piracy is to be considered such a serious crime, taking down torrent trackers is like going to a meeting of known criminals, and - rather than arresting them - evicting them. It has only a minimal effect, as they are free to gather elsewhere. What bothers me the most is that the only thing being dismantled is the thing that clearly contains the most value to individuals, and society at large. Community is a _good thing_. When WhatCD was taken down, a countless amount of valuable data that could be found practically nowhere else was suddenly destined to be hidden from society at large, and the community it had cultivated was scattered, without a care for what that meant. Sure, quite a few people find that, while using copyright enforcement as a business model, piracy significantly detracts from sales. Sure, there is a culture that undervalues creators, but it is not a black and white problem, and most popular solutions have serious consequences that go practically ignored. ------ pferde Got to love the 'privacy' instead of 'piracy' typo in the first cable screenshot: "2\. Summary. In a visit to Sweden last month to raise the growing concerns about Internet privacy in Sweden, the Motion Picture Association of America (MPA), together with ..." ~~~ gcb0 was it a typo or a huge backdoor of piracy into privacy talks? ------ upofadown Canada has been on the 301 watch list for a long time now. There have been some attempts to get off it (theatre camcording law) but it turned out that that the real reason a country is put on the list is a lack of fawning obedience to the US copyright cartel. A country that is perceived to not be toeing the line is put on the list. If there no actual policy reason to be there the copyright cartel just makes stuff up. So these days the list is meaningless and is roundly ignored by Canada. Sweden probably should of did the same thing. ------ fsloth "The new confessions of an economic hitman" by John Perkins is a very good exposition of the close ties of state and corporate powers in the US and how they co-operate to increase the capital wealth of the elite. It's more autobiographical than a research document, and has some unproven claims, but no one has punched holes in the important claims there AFAIK. ------ jesperlang Wow, 10 years ago already? This was quite big here in Sweden back when it happened. It's scary how quickly these things slip out of our conscience (at least mine). It's chilling what you can get away with by just staying cool for while... Or is the short term damage in PR not worth waiting it out for the long? ------ dghughes People aren't stupid they know it's wrong to download a movie or music they didn't buy. But everyone agrees the response by the US law enforcement is overreaching and out of proportion. Convenience is the real reason people went to websites such as the Pirate bay not stealing, people don't buy fast food for their health. The rise of cheap and reliable streaming video websites such as Netflix changed that. That's all anyone wanted a convenient reliable way to legally watch and pay a reasonable amount. ------ wimagguc To remove pirated movies from the interwebs there are two options really: either attack content providers / trackers etc, or, find the users directly. In Germany, as soon as you start a torrent client, your traffic is being monitored by bots and agents, and if you upload something inappropriate you (or your host) will get a letter from a law firm with a heavy fine. (I know of two friends who had to pay $600 and $3000.) ~~~ _Codemonkeyism "In Germany, as soon as you start a torrent client, your traffic is being monitored by bots and agents" How is traffic monitored when I start a client? Don't I need to download/upload something to get monitored? Is the monitoring connected to trackers I download from or ISP monitored? "[...] with a heavy fine." Was it a fine or some kind of fee? ("Abmahngebühr") ~~~ wimagguc I'm not familiar with the German legal system but the sum did depend on what they've uploaded. (It was detailed in the letter, if I remember correctly, $600 for half an episode-of-whatever and $3000 for multiple movies.) As for the traffic monitoring, indeed, I'd imagine it to be honeypot tracker where all content/traffic is visible rather than something installed on the ISP side. ~~~ JohnStrange No it's not the tracker, it also works for magnet links and people get letters for downloading. There are companies who join the download swarm and register all other downloading parties. That's very easy with bittorrent, since the protocol is (originally) designed for fast download sharing without any regard to anonymity or pseudonymity.[1] The process is not reliable for providing evidence of copyright infringement, though, and the German system mostly works by scare tactics of lawyers - many people don't want to risk a lawsuit even if they could win it. [1] [https://torrentfreak.com/thousands-of-spies-are-watching- tra...](https://torrentfreak.com/thousands-of-spies-are-watching-trackerless- torrents-151004/) ~~~ zaarn These companies are the scum of the scum, tbh, I recall I once got a letter claiming I must pay about 6000€ for illegally downloading "Debian 5 Linux Netboot ISO" and "Ubuntu 12.04 x86 Full ISO" or something along those lines. They sent some awfully scary letters for what amounts to legally obtaining an ISO file. ~~~ notzorbo3 I used to run an abandoned warez site when I was young. I received a lot of cease and desist letters from "lawyers". They usually failed to identify the infringing material, failed to show they had the right to act on the copywriters behalf and a staggering amount of them confused trademark infringement with copyright infringement. Also, every last one I received via email. Yeah, right, like that's going to hold up. I ignored all of them and never got even so much as a follow up. In other words, such things are considered low-hanging fruit by these companies. Just throw it out there and see what sticks. ~~~ zaarn Luckily the german system is less strict than the DMCA, you can fact-check any letters you get, you only need to act if you know (for certain) it's illegal ------ vinceguidry The copyright industry is a direct arm of American soft power projection into the rest of the world. For the content industry it's about money, but for policy makers and the geopolitical strategists who have the ear of those policy makers, it's about furthering the nation's position in the world. The content industry punches above its weight in getting the government to protect it overseas for this reason. ------ koliber Interesting aside: is the redacting technique vulnerable to an analogue of the "timing attack" on certain crypto? The name of the employee in the wires has been redacted. I wonder if the physical size of the redacted box, together with the fact that this is a name, together with a database of public employees, could be used to uncover the identity of the person. By comparing the size of the redacting box with the lines above and below, we can guess that 6-9 characters are masked out (including the space). This is an a rough parallel to a timing attack used against crypto. The DB of public employees could be thought of as a list of candidate inputs. Weak redacting? This reminds me of a law in Poland where a person accused of a crime can not be named. Media will blur out photos and state something to the effect of "Mark W. an executive at XYZ Corp., stands accused of ...". If the accused is a well known actor with a unique first name, this becomes a running joke. ~~~ andrewla The 2008 Underhanded C Contest [1] had an exercise in "leaky" redaction. The winner, [2], used a very fun approach. [1] [http://www.underhanded-c.org/_page_id_17.html](http://www.underhanded-c.org/_page_id_17.html) [2] [http://notanumber.net/archives/54/underhanded-c-the-leaky- re...](http://notanumber.net/archives/54/underhanded-c-the-leaky-redaction) ------ ksk It's interesting that even after all the scummy things the movie industry has done, people still desperately want to pirate their content. People who base their opinion on a principled opposition to copyright, should be leading the charge in promoting other means of compensating content creators. Stop signalling how much you desire the copyrighted product, and start signalling how much you desire the non-copyrighted one! IMHO The only people who should be pirating are the people who don't have a principled stance on copyright. ------ thriftwy I wonder why isn't there torrent-search-over-DHT yet? I mean, this is known point of vulnerability. Maybe it's because owners of popular bittorrent software don't want that feature? ~~~ jokoon btdb.io and btdig btdig seems better as it doesn't have annoying pop ups, which are constantly brought up on btdb, even with ublock origin and noscript. I would not be surprised that btdb is buying ads from an ad provider that sell js injections to a MPAA operated third party. btdb is nice because you can sort by seeds, you cannot with btdig. To be honest I stopped using classic torrent indexers entirely since I started using DHT indexes. They have much larger choice. The issue is that you cannot "post" magnets links on the DHT automatically (I think you cannot), so the DHT works as long as people are finding magnets or torrents elsewhere. It's bringing more decentralization, which mean more chaos but much less traceability. ------ belorn Many interesting points which contradict the behavior of the lawyers of said MPA during the court hearings. “However, it is not clear to us what constraints Sweden and even U.S. authorities would be under in pursuing a case like this when the site is legally well advised and studiously avoids storing any copyrighted material.” A focus by the prosecutor was the claim that the founders did not have well legal advice. The idea was to prove to the court that the accused did the infringement knowingly and was aware that what they did was illegal. Here we can read that this supposedly obviousness of wrong doing was not so clear to the very high paid lawyers arguing it. _" Both Bodström and Eliasson denied any direct involvement of the Justice Ministry with the work of the police and prosecutors in the Pirate Bay case."_ That they surely did. It is very illegal for them to directly act in any specific legal case. If it ever was proven it would directly end any political carer. When similar document was earthened it was said that just because the US believe they influenced Swedish politicians it still doesn't mean that they did it, so no proof of foul play has been made. ------ implosificated I wouldn’t be as miserably ashamed for this as I am, if it weren’t for the fact that the popular artists my country has produced since, oh... 1996? Aren’t worth defending from piracy. You can harp on how there’s no accounting for taste, but the truth is that the industry this sort of thing protects certainly does account for taste, and only invests in the kind of lowest-common-denominator/mass-appeal trash that makes them the most money. And so, we are left to suffer the guilt trip that because we don’t adhere to an honor system of donating funds for better artists (paying and not pirating, copying, stealing, sharing, music and movies), we get the artists we deserve. But that’s clearly not true, because the money made off the garbage produced today, doesn’t make it into any kind of honor system that benefits the interests of better artists. How about producers of bad music and movies demonstrate that they are willing to donate into the honor system first? The profits that the industry sees are not reinvested. The artists, mysteriously, continue to worsen. ------ spodek The framers of the U.S. Constitution knew the risks of the government creating and granting monopolies, however limited. The incentives are to remove the limitations and expand them. The industries formed by these government-granted and defended monopolies have removed most of their limitations and keep growing. We see the benefit to them. They make big blockbusters that people enjoy watching, so we see that benefit. The costs keep growing too, such as this article and the deprivation from the public domain of nearly a century of work. Meanwhile, technology has lowered the costs of production and distribution, making investment for most works unnecessary, obviating the need for a monopoly. Have the costs grown to outweigh the benefits? The monopolists' power can maintain the monopolies past when that point so it's hard to tell, and people with different values will disagree, but this article points in that direction. ------ Feniks Still up though. I use it every once in a while because its on TOR. My ISP has to block some pirate sites now. I'm from the generation that grew up with digital piracy. I am accustomed to have all media available. From nineties anime shows to strategy guides for videogames. ------ frabbit Why is the name of the official who spearheaded this initiative REDACTED? Is this undercover, spy-type work as opposed to public, legal actions carried out by a legitimate government agency? ------ louhike I've discovered some days ago that the thepiratebay.org domain was available again. Is it linked to the original one or is it just a proxy? ~~~ kowdermeister I use it often so somebody keeps it running, actually there are dozens of mirrors running on various ccTLD-s. The source must be available somewhere online so you can spin up your own instance. ~~~ Mayzie It is. As The Pirate Bay don't host any .torrent files, only magnet links, on memory the entire site came to under 200mb. ------ l33tbro Funny, the "brand equity" of The Pirate Bay is really something. After over 10 years of use, there's almost a nostalgic bond to the site for me now which makes the downloading of material a familiar ritual with only positive associations. Not necessarily proud of this, just something I've noticed. ------ casualtech I don't care indeed, but someone has to think about the potentials and ecosystem that it could lead. Don't block the possibilities and help them to be in right way. ------ kwhitefoot > U.S. authorities provide concrete suggestions for improvement I don't think improvement is quite the right word. ------ parski "In your face, Hollywood." ------ paul7986 With Net neutrality repealed say hello the blocking sites like this one .. well without a vpn. ------ scopecreep You mean the one I used last night to watch Dunkirk? Great detective work there Lou. ------ ketsa Amazing how Yankees are annoying g the whole world... ------ antigirl do people still use piratebay ? there are better alternatives now ~~~ mac01021 For example? ~~~ jokoon DHT indexes, btdig and btdb.io ------ ronjouch Honest question: why is this surprising / newsworthy? ~~~ jacobush At least to me a Swede, this [datacenter] _"... was raided by 65 Swedish police officers"_ is so incredibly out of touch with normal reality in this country, on so many levels. * Copyright infringement case assigned to that many officers? Unheard of. High profile murder investigations don't get that many. * We have this peculiar law, that ministers are NOT TO meddle in the running of government agencies. Yet, this is what we got. * From cautious "see what happens" attitude among prosecutors with regards to copyright infringement and copying for personal use - to a big leap: not only an attempted (though only partially successful) witch hunt of Pirate Bay founders, but _also_ inventing a whole new crime, called "accessory to copyright infringement". Not that I don't agree that what Pirate Bay did was at times shady, but the whole thing made me believe without a doubt a few things: \- US as a case of "wag the dog". The trade associations (RIAA etc) in the US can easily make the state do their bidding. And the US state as an institution is quite weak, when it does these things so quickly. What that implies, is that there is no thinking things through. No serious cost/benefit analysis can possibly have been made. "How much ill will from foreign countries is this move worth? Fuck that, do it now." \- That Sweden would be pushed around so quickly. I must have been naive, but it _was_ surprising how not even a symbolic attempt at saving face was made here. Our domestic response was decisive and swift. Can't help but make you wonder what we could be made to do to ourselves over something more serious than fucking copyright infringement. Dance, monkey, dance. ~~~ staticelf Yes especially when pretty much all other crimes except murder and stuff like that are disregarded nowadays. Swedens judicial system is completely broken. ~~~ bionoid Norway is the same for the record. There was a local case recently where the police knocked down an innocent man on the street, handcuffed him, and charged him with assaulting a police officer. There were something like 30 eye witnesses, still he lost in court, police clearly giving false testimony. Luckily he did win the appeal. ~~~ staticelf The difference is that in Sweden the police doesn't do anything. Even if you give them a lot of evidence they drop the cases all the time. I have personal experience of this. ~~~ digi_owl "Henlagt grunnet bevisets stilling" (effectively claiming that the case will not be investigated due to lack of evidence) have become a running joke in Norway. ------ redm I don't understand why there is so much controversy over this. I've been reading about the reasons TPB is a bastion of freedom for years and they read like a list of reasons its ok to cheat on taxes, or put recyclable materials in the compost bin. We all know its illegal in the US, we know TPB knows it, and instead of changing copyright laws, it is continually justified. It feels disingenuous. I'm tired of the same conversation for the last 20 years. ~~~ spraak 20 years seems like a huge exaggeration unless you're talking about something more than just TPB. ~~~ redm On the Internet, the conversation about mainstream piracy goes all the way back to Napster (1999). ------ jmull (rant, sorry in advance) Eh, f--- Pirate Bay and everyone else who makes a living stealing the efforts of others. (And F-you too if you're a supporter/user of theirs.) Of course the various governments were stupid, clumsy, ham-fisted, and in the pockets of corporations. So what else is new? How does that make it OK to steal stuff? People want to talk about what total hipocrite jackasses they are (which is true) to deflect attention from the fact that they are casually and constantly taking stuff they don't have a right to (also true, come on why don't you want to talk about that?!?). If you don't like the terms, prices, availability, etc, of the Taxi reruns they are selling, well, then, don't watch the Taxi reruns. Trust me, despite Danny Devito, you aren't missing much. Likewise for all the pop music, old software, movies and virtually all the other content people are stealing through PB and similar. Is this the stuff you really what you want to sell your integrity out for? Think about it. If you all were mainly -- well, even just somewhat sporadically -- taking enlightening, high-quality stuff with an ounce or 1/2 of cultural importance that was otherwise too expensive, then I might be able to understand. But no. You're just mainly swiping bad superhero movies and video editing software that you'll never learn to use. I think we need to proceed on all the right paths here: 1\. yes, the governments and their associated law-enforcement, and regulatory bodies are a-holes who are beholden to petty, stupid, obsolete, obnoxious corporate ip holders. AND 2\. Stealing is wrong (and that doesn't change if you are stealing from 1.) ~~~ executesorder66 Piracy is not stealing. If I make an exact copy of your car and drive off in the copy, did I just steal your car? ~~~ jmull Your analogy is terrible, but let's go with it: If I spend a million dollars inventing a nice car that can be freely replicated I don't have to sell it for a million dollars to break even. I could sell a copy of it to 1100 people for $1000 each and everyone wins: Nice cars are inexpensive for everyone and I make a living, so I can keep inventing nice things. But if there are 200 pirates among the 1100 who take a copy of the car but don't pay the $1000 things are different. Now I'm selling 900 cars and losing money so I have to do something. Such as: * charge $1200 per car. Pirates win but car buyers lose, to the tune of $200 per car. Don't call it stealing if you don't want to, but your pirates are getting something and someone else has less money as a result. And of course you can't simply raise the price without losing some customers, so this can only go so far. * invest less to make up the difference (making a crappier car). Pirates win and car buyers lose. The pirates don't win as much, though, since they have to drive the crappy cars too. * enact stringent anti-copying mechanisms to try to precent unauthorized copying by pirates. This costs money, raising the price of the cars and is inevitably user hostile. So, again pirates win and customers lose. But again, the pirates don't win as much because they have to deal with the user-hostile anti-copying features as well. Note this is a vicious circle. As piracy makes the product more expensive and crappier, more people will be motivated to pirate rather than pay, causing the product to get even crappier or more expensive. And anything that makes buyers lose also makes my car company lose, with fewer sales at lower prices to less satisfied customers. * Ultimately, I might find I can't make money doing this at all: that there isn't a price high enough to make up for the piracy and low enough that anyone will pay for my crappy cars and I just stop making things altogether. Here pirates lose, buyers lose, and, of course, I lose. Don't call it stealing if you don't want, but you are getting something without paying for it and it is costing other people more money as a result. Not only is your piracy making stuff more expensive for everyone else, it's also making it crappier for everyone and ultimately lead to less nice stuff being available at all. ~~~ executesorder66 > If I spend a million dollars inventing a nice car that can be freely > replicated I don't have to sell it for a million dollars to break even. So do filmmakers make movies or an implementation of the bittorrent protocol? That analogy is terrible. ------ marcoperaza And why shouldn't the US have pressured Sweden to take down the Pirate Bay? The people running that site are openly and proudly flouting copyright laws and allowing American-owned (among other) content to be downloaded without payment to the owners. Very large portions of the US economy are dependent on international enforcement of copyright and patent law. If the US isn't using its leverage over other countries to make them enforce intellectual property laws, then it is failing to protect its citizens' economic security. ~~~ Strom Yes it might be very much fine from the US perspective to do this. Things change however once you look from the other side. It can easily be in the economic interest of other countries to not pay the US copyright holders, especially 100 years after something was created. So this is not so much about claiming the US is doing something against the interest of US citizens. This is about other country politicans/judges/police being corrupt, taking benefits from USA and acting against the best interests of the people they promised to defend.
Low
[ 0.498777506112469, 25.5, 25.625 ]
Enhanced N input to Lake Dianchi Basin from 1980 to 2010: drivers and consequences. Due to a rapid increase in human population and development of neighborhood economy over the last few decades, nitrogen (N) and other nutrient inputs in Lake Dianchi drainage basin have increased dramatically, changing the lake's trophic classification from oligotrophic to eutrophic. Although human activities are considered as main causes for the degradation of water quality in the lake, a numerical analysis of the share of the effect of different anthropogenic factors is still largely unexplored. We use the net anthropogenic N input (NANI) method to estimate human-induced N inputs to the drainage basin from 1980 to 2010, which covers the period of dramatic socioeconomic and environmental changes. For the last three decades, NANI increased linearly by a factor of three, from 4700 kg km(-2)year(-1) in 1980 to 12,600 kg km(-2)year(-1) in 2010. The main reason for the rise of NANI was due to fertilizer N application as well as human food and animal feed imports. From the perspective of direct effects of food consumption on N inputs, contributions of drivers were estimated in terms of human population and human diet using the Logarithmic Mean Divisia Index (LMDI) factor decomposition method. Although human population density is highly correlated to NANI with a linear correlation coefficient of 0.999, human diet rather than human population is found to be the single largest driver of NANI change, accounting for 47% of total alteration, which illustrates that the role of population density in the change of NANI may be overestimated through simple relational analysis. The strong linear relationships (p<0.01) between NANI and total N concentrations in the lakes over time may indicate that N level in the lake is able to respond significantly to N inputs to the drainage basin.
High
[ 0.6833114323258871, 32.5, 15.0625 ]
sleep(2) ret: 0 after sleep(2) between 2 and 3: 1 errno: 0 usleep(3000000) ret: 0 after usleep(3000000) between 3 and 4: 1 errno: 0
Mid
[ 0.549872122762148, 26.875, 22 ]
Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more! Wasn't that the kid who said he was gonna kill himself on IRC, then went out and stabbed himself before attacking the police? -Diploid --------------------Republican Values: 1) You can't get married to your spouse who is the same sex as you. 2) You can't have an abortion no matter how much you don't want a child. 3) You can't have a certain plant in your possession or you'll get locked up with a rapist and a murderer.
Low
[ 0.49407114624505905, 31.25, 32 ]
Q: Proof for Induction Question Hey having trouble finishing this question. Prove by induction that $n^3 \le 2^n$ for all natural numbers $n\ge 10$. This is what I have so far: Base step: For $n = 10$ $1000 \le 1024$ Assumption Step: For $n = k$ Assume $k^3 \le 2^k$ Induction step: For $n = (k+1)$ $(k+1)^3 \le 10^{k+1}$ $k^3 +3k^2 + 3k +1 \le 10^k*10$ Not really sure where to go from here A: Hint: We have to show that $(k+1)^3<2^{k+1}$. Note that: $$(k+1)^3=k^3\cdot\frac{(k+1)^3}{k^3}=k^3\left(\frac{k+1}k\right)^3\;.$$ Since $k\ge 10$, $\frac{k+1}k=1+\frac1k\le 1+\frac1{10}=\frac{11}{10}$, and therefore $$\left(\frac{k+1}k\right)^3\le \,\, ??$$
High
[ 0.685279187817258, 33.75, 15.5 ]
#!/bin/bash set -eu java -cp $(./tools/classpath.sh) \ jp.vmi.selenium.selenese.utils.CommandDumper --side-commands-info | tee docs/side-commands-info.txt
Mid
[ 0.570881226053639, 37.25, 28 ]
/* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright (c) 2017 Oracle and/or its affiliates. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common Development * and Distribution License("CDDL") (collectively, the "License"). You * may not use this file except in compliance with the License. You can * obtain a copy of the License at * https://oss.oracle.com/licenses/CDDL+GPL-1.1 * or LICENSE.txt. See the License for the specific * language governing permissions and limitations under the License. * * When distributing the software, include this License Header Notice in each * file and include the License file at LICENSE.txt. * * GPL Classpath Exception: * Oracle designates this particular file as subject to the "Classpath" * exception as provided by Oracle in the GPL Version 2 section of the License * file that accompanied this code. * * Modifications: * If applicable, add the following below the License Header, with the fields * enclosed by brackets [] replaced by your own identifying information: * "Portions Copyright [year] [name of copyright owner]" * * Contributor(s): * If you wish your version of this file to be governed by only the CDDL or * only the GPL Version 2, indicate your decision by adding "[Contributor] * elects to include this software in this distribution under the [CDDL or GPL * Version 2] license." If you don't indicate a single choice of license, a * recipient has the option to distribute your version of this file under * either the CDDL, the GPL Version 2 or to extend the choice of license to * its licensees as provided above. However, if you add GPL Version 2 code * and therefore, elected the GPL Version 2 license, then the option applies * only if the new code is made subject to such option by the copyright * holder. */ package test.beans; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; import java.lang.annotation.ElementType; import javax.inject.Qualifier; /** * @author <a href="mailto:[email protected]">Phil Zampino</a> */ @Qualifier @Retention(RetentionPolicy.RUNTIME) @Target({ElementType.METHOD, ElementType.FIELD, ElementType.PARAMETER, ElementType.TYPE}) public @interface Preferred { }
Low
[ 0.528517110266159, 34.75, 31 ]
1. Technical Field of the Invention The present invention relates to an electrostatic capacitance sensor and a method for determining a failure of an electrostatic-type capacitance sensor. For those designated countries which permit the incorporation by reference, the contents described and/or illustrated in the documents relevant to Patent Application No. 2010-217316 filed with Japan Patent Office on Sep. 28, 2010 and Patent application No. 2010-291780 filed with Japan Patent Office on Dec. 28, 2010 will be incorporated herein by reference as a part of the description and/or drawings of the present application. 2. Description of the Related Art An electrostatic capacitance detection apparatus is known which detects an object on the basis of an electrostatic capacitance between an electrode and a grounded section and which is provided with an independent auxiliary electrode that functions as a dummy object, thereby to self-diagnose a failure of the electrostatic capacitance sensor (Patent Literature 1: Published Patent Application No. 2001-264448).
Mid
[ 0.641148325358851, 33.5, 18.75 ]
Fast System Calibration With Coded Calibration Scenes for Magnetic Particle Imaging. Magnetic particle imaging (MPI) is a relatively new medical imaging modality, which detects the nonlinear response of magnetic nanoparticles (MNPs) that are exposed to external magnetic fields. The system matrix (SM) method for MPI image reconstruction requires a time consuming system calibration scan prior to image acquisition, where a single MNP sample is measured at each voxel position in the field-of-view (FOV). The scanned sample has the maximum size of a voxel so that the calibration measurements have relatively poor signal-to-noise ratio (SNR). In this paper, we present the coded calibration scene (CCS) framework, where we place multiple MNP samples inside the FOV in a random or pseudo-random fashion. Taking advantage of the sparsity of the SM, we reconstruct the SM by solving a convex optimization problem with alternating direction method of multipliers using CCS measurements. We analyze the effects of filling rate, number of measurements, and SNR on the SM reconstruction using simulations and demonstrate different implementations of CCS for practical realization. We also compare the imaging performance of the proposed framework with that of a standard compressed sensing SM reconstruction that utilizes a subset of calibration measurements from a single MNP sample. The results show that CCS significantly reduces calibration time while increasing both the SM reconstruction and image reconstruction performances.
Mid
[ 0.640350877192982, 36.5, 20.5 ]
Anti-social 'Ned Shed' taken down by Glasgow City Council Published duration 25 May 2018 image copyright Google image caption The "Ned Shed" (top left) has now been destroyed A local hut that became a hub for anti-social behaviour has been taken down by Glasgow City Council. The "Ned Shed" in Drumchapel attracted groups of up to 40 youths from as far afield as Coatbridge. Local residents claimed it led to wheelie bins being stolen and set alight and their windows smashed. The council said it had stepped in and demolished the structure after the youths ignored repeated warnings about their behaviour. The metal structure in Southdeens Play Are was originally built for residents to sit and relax in, but had fallen into disrepair. 'Absolutely delighted' A special meeting took place last month between the council, police, residents and community groups, writes Local Democracy Reporter Alan Ferguson. They agreed to give G15 Youth Group a week to appeal to the youths, which reportedly went unheeded. Councillor Paul Carey said: "I am absolutely delighted this hut has been demolished - it has been the source of hell for neighbours." image copyright Google image caption The park at Southdeens Play Area reportedly turned into a hub for nuisance behaviour. He said it had been destroyed by graffiti and vandalism and then used for drinking and drug-taking sessions. Mr Carey said families had to endure the mess and trouble created in the popular park. Residents of Southdeen Avenue presented a petition to Glasgow City Council demanding the demolition of the hut. 'Long time coming' It was discussed at the meeting in Glasgow City Chambers last month with all representatives present. Mr Carey added: "It's been a long time coming for residents, to get rid of what's known locally as the 'Ned Shed'. "Time was given to try and sort out the problems going on there, but this has obviously not worked out. "The police, petitioning residents, Drumchapel Housing Co-operative and I all wanted to get rid of it as soon as possible. "Hopefully, this will address the issues facing residents in the area, but I am all too aware this is not a silver bullet to the wider problem."
Mid
[ 0.609452736318407, 30.625, 19.625 ]
-----BEGIN CERTIFICATE----- MIIDzTCCArWgAwIBAgIHBHOJ90PO8TANBgkqhkiG9w0BAQsFADCBmTELMAkGA1UE BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCUxvcyBHYXRvczEU MBIGA1UECgwLTmV0ZmxpeCBJbmMxLTArBgNVBAsMJFBsYXRmb3JtIFNlY3VyaXR5 ICgxMjUyOTM2MTE5NTY2NTY0KTEcMBoGA1UEAwwTTG9jYWwgUm9vdCBmb3IgMjc4 MDAeFw0yMDA3MTQwMzMxMTVaFw0yMTA3MTQwMzA5NDRaMIGeMQswCQYDVQQGEwJV UzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJTG9zIEdhdG9zMRQwEgYD VQQKDAtOZXRmbGl4IEluYzEtMCsGA1UECwwkUGxhdGZvcm0gU2VjdXJpdHkgKDEy NTI5MzYzMDI5NTg0MjEpMSEwHwYDVQQDDBhJbnRlcm1lZGlhdGUgQ0EgZm9yIDI3 ODAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCLX2F5LHmaTOwCJ6Fx AwGDASn3fvObNLrr9Jm1i6diN3YMSI7oJB5LZv9I93OnHUzS+1mHsxyy81CAy5Ka TCWLWkq2ArbpX2Hi6RwdffbjIt6MGfigCutpLb4bCpPY9Y7dUmACXfjkZ/NyoG70 BWFEhUpPOY77Y3XVYnAsgyeVeJdtmSWqPM1SCifTthgQ2vP5UkzMkvUENFtvnB7s jQLMqCAgsC6J2j2OXBBstRp1i/wCeQpHpZ4nuMj3EujN/k27GIrLrx6oFogdSJ5B HwxfCyUqdO4Bi7D0alMLvhgMidxqS/ODLfp2Oope1YbOzXNgO5W/j2XSMotbf2Jt 6uU/AgMBAAGjEzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEB ADusyAyy4JEbTq7Ld0HcnADL5ezb/k/7yYswR/fkkllJuPOPkA6Tn5OIOBjaUaty ZrO5ASImA4GDxAKg7pz2Ofa7e+ePuMsCXYDb4P/t1236rVsenK+qnUBOzQfFttGA wLEU4UedfhXENLc81Hr66OUtfOYLzMXZm/NvKFwzSJkVari0O57utrXOw4c/UyC6 iypq7QGWyXh4Iif8KMV/wfcV4p13muq6woYZ4/DkQB5xHVx14fj72hU781cQkU1R l0VIGTNJnvS3aKeLECBcMtISh3dT42Ts2RBS8TbR0AMmgNTBjVjBM/290Z5wO0Sy rq5vA+gRgEf5u2mQhWtKZlw= -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIECDCCAvCgAwIBAgIHBHOJ7FWE3jANBgkqhkiG9w0BAQsFADCBozELMAkGA1UE BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCUxvcyBHYXRvczEU MBIGA1UECgwLTmV0ZmxpeCBJbmMxLTArBgNVBAsMJFBsYXRmb3JtIFNlY3VyaXR5 ICgxMjUxNjQ1MDA4NDUxNjU2KTEmMCQGA1UEAwwdTmFtZSBDb25zdHJhaW50cyBU ZXN0IFJvb3QgQ0EwHhcNMjAwNzE0MDMzMTE1WhcNMjEwNzE0MDMwOTQ0WjCBmTEL MAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCUxvcyBH YXRvczEUMBIGA1UECgwLTmV0ZmxpeCBJbmMxLTArBgNVBAsMJFBsYXRmb3JtIFNl Y3VyaXR5ICgxMjUyOTM2MTE5NTY2NTY0KTEcMBoGA1UEAwwTTG9jYWwgUm9vdCBm b3IgMjc4MDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJFd7AhUjxlx KZdOmN8Ox8VF6IxHZSpnqvRWvVDQzHiyj8UDZjYdFBKjqvsxq3oh9omw/8V0jNWu eabJHizOeIqSUosijSg7gi/BLS8L0mPksr7b0dL2tFJF4mbK31ItZQZ8wLYxfuYZ h5vOD9acKcsZcGwcm8Uz1e+cjlsqovjYfdkLzg/MxsOx60pLfakEvMBU6bKRy2dZ VVNFx1MyQAVdZ0lt+eGZ6nRWKMCTB6dlH/YcMmDIkicjjlOF/bBO7w3rCqe9Akna 0SMyYl/MoLbO3faoOWr2BuTNPQSz2UeETqVU2b+NqiTsyLre14rCNVVGQDnGdGPi DRoim93ZJmECAwEAAaNJMEcwDwYDVR0TAQH/BAUwAwEB/zA0BgNVHR4BAf8EKjAo oA8wDYILZXhhbXBsZS5uZXShFTAKhwjAqAAA//8AADAHggVsb2NhbDANBgkqhkiG 9w0BAQsFAAOCAQEAg2i+1pfvrNLyXJPjL+p/RaW8I/KHHYrPKyYjnu9YZ6EpxXx6 ErQbxJd7UdaHvKCkk7/Eoh6befycqtqHpDSn/ERmqAxVRmwQhVRn0zhdiWvP4Nx+ NTcUD5N3lW7/9svimXbNRTIwM1AjVVllkblPxQll51UrLZ41qjiKJ+11StxjJfPM OKXRe018qnpl3tObTgYU5AXhvbaOBopq+qBGyh6KHBB/H/fcyHUqKLORtO8DP8N6 haEZeTh/l8kaZQoUuLQ45BZlS4usQcIUVYfk3iJLga3in2s9UT0qXhFVhHVHkGbq c+a8D4ajlBSK+Ul9WOccWD7qVFKGy0wNE0I/0w== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIID3DCCAsSgAwIBAgIHBHJdU5tTvDANBgkqhkiG9w0BAQsFADCBozELMAkGA1UE BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCUxvcyBHYXRvczEU MBIGA1UECgwLTmV0ZmxpeCBJbmMxLTArBgNVBAsMJFBsYXRmb3JtIFNlY3VyaXR5 ICgxMjUxNjQ1MDA4NDUxNjU2KTEmMCQGA1UEAwwdTmFtZSBDb25zdHJhaW50cyBU ZXN0IFJvb3QgQ0EwHhcNMjAwNzE0MDMwOTQ0WhcNMjEwNzE0MDMwOTQ0WjCBozEL MAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCUxvcyBH YXRvczEUMBIGA1UECgwLTmV0ZmxpeCBJbmMxLTArBgNVBAsMJFBsYXRmb3JtIFNl Y3VyaXR5ICgxMjUxNjQ1MDA4NDUxNjU2KTEmMCQGA1UEAwwdTmFtZSBDb25zdHJh aW50cyBUZXN0IFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQCiIhD8HJBlLveXSen5+3nyOOA4HM8H/SDGR7ufNeSHmkdSh7s4fm4pmzNEpDz7 UVv403NnSqE4PsunMx5H7OK8C0E6vUmOIGRmHvSxHbP7bleko4SR9jJ7T3RU1HpJ BYESszrbAvoYEwpyUI6a20bmokAHOgU/BN1SIyMzacVVwhDmmQOcDc37SUSCFKen Clavf1vgtt15SE3oZF7GN8M4SSF/8aKcypt3xaGE0HvRVu9JRBDjIU7GMLcYnWV3 /6UC1GuwgvA9sEGS857kOcwt5V5vF8FHrfXv63/1QcOyWXuGL2oHUqwuKP9lTgkc LZUdXczvLrtW1dxtg05tU6VDAgMBAAGjEzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJ KoZIhvcNAQELBQADggEBAErEOumWJjc7bgQQmnviDl075fnYHidlY5SkjdwFcSCK ZSolT8z7xvtpW10mbM8msvzNreLmNBASEiP7NlI4bxZpQJ1RJ1tR0ybe2cD0171A 23/1kza49x+3IorUwQZrRSAksBpNqggMbmgqy3lMlNy8V2EtmO2I/4C5nsN8/uys j6JmeEcJFa7rr4YgYsDZwosIOX7XQDy3Xb7rJEmLpRs+VmjbgsT/0ncqkfLqDJ5+ UtBofdpGTqCk+0rJf1sVDEtZp/wYo1236W5AAAeWrFlM7ht3CZdQCBsoV4pZ5m6h 2+oC85m5hDidnH5/0Er88jR9kHxdM5dJNOU+vdY/XpA= -----END CERTIFICATE-----
Low
[ 0.516377649325626, 33.5, 31.375 ]
P-Rex1, a PtdIns(3,4,5)P3- and Gbetagamma-regulated guanine-nucleotide exchange factor for Rac. Rac, a member of the Rho family of monomeric GTPases, is an integrator of intracellular signaling in a wide range of cellular processes. We have purified a PtdIns(3,4,5)P3-sensitive activator of Rac from neutrophil cytosol. It is an abundant, 185 kDa guanine-nucleotide exchange factor (GEF), which we cloned and named P-Rex1. The recombinant enzyme has Rac-GEF activity that is directly, substantially, and synergistically activated by PtdIns(3,4,5)P3 and Gbetagammas both in vitro and in vivo. P-Rex1 antisense oligonucleotides reduced endogenous P-Rex1 expression and C5a-stimulated reactive oxygen species formation in a neutrophil-like cell line. P-Rex1 appears to be a coincidence detector in PtdIns(3,4,5)P3 and Gbetagamma signaling pathways that is particularly adapted to function downstream of heterotrimeric G proteins in neutrophils.
High
[ 0.6913946587537091, 29.125, 13 ]
Low-grade intravascular coagulation and reticuloendothelial function. The present study evaluated the influence of experimentally produced intravascular coagulation on reticuloendothelial (RE) stability. Intravascular coagulation was initiated by the intraperitoneal injection of bovine thrombin (500 U/100 g body wt) into male rats. RE function was evaluated by the vascular clearance of an 131I-labeled RE test colloid. Thrombin injection resulted in a transient (0.5-2 h) (P less than .05) depression of the phagocytic index (K) with maximal depression at 1 h postthrombin challenge. The phagocytic index was unaltered after injection of saline or heat-inactivated thrombin. Vascular clearance depression was primarily due to a 37% decrease (P less than .001) in hepatic Kupffer cell colloid clearance and was associated with increments in lung (82%) and marrow (100%) colloid localization with no splenic alterations. While intravascular coagulation was associated with decreased hepatic blood flow at 30 min and 120 min, sinusoidal flow was normal during maximum RE impairment at 60 min. The in vivo clearance depression was not reflected as an intrinsic Kupffer cellular deficit when evaluated in an in vitro system. The results indicate a transient RE dysfunction during intravascular coagulation, the mechanism of which remains to be elucidated.
Mid
[ 0.64751958224543, 31, 16.875 ]
Q: Border on top of paragraph I am trying to put a line over a paragraph in LaTeX. I tried this code: \noindent\makebox[\linewidth]{\rule{\textwidth}{2pt}} \noindent\colorbox{gray}{\parbox{\dimexpr\textwidth-2\fboxsep\relax}{\textbf{Text}}} But there is a small space between the line and the paragraph as shown in this image: Do you know how I can remove this space between the paragraph and the text? A: Try \noindent\makebox[\linewidth]{\rule{\textwidth}{2pt}}\par \nointerlineskip \noindent\colorbox{gray}{\parbox{\dimexpr\textwidth-2\fboxsep\relax}{\textbf{Text}}}
Mid
[ 0.623809523809523, 32.75, 19.75 ]
Q: extract column of numbers and sort I want to create a Java program that has the following text file as input: Calculating KNN parameter Parameter: 1 Positions: 290 Avg. Error: 1.7535227753624112 Parameter: 2 Positions: 290 Avg. Error: 3.7245670622636187 Parameter: 3 Positions: 290 Avg. Error: 3.9362841303832017 Parameter: 4 Positions: 290 Avg. Error: 4.843214570109396 Parameter: 5 Positions: 290 Avg. Error: 5.272961320042017 Parameter: 6 Positions: 290 Avg. Error: 5.470106704332144 Parameter: 7 Positions: 290 Avg. Error: 5.882240503856739 Parameter: 8 Positions: 290 Avg. Error: 6.292034572575386 Parameter: 9 Positions: 290 Avg. Error: 6.768597736578583 Parameter: 10 Positions: 290 Avg. Error: 7.363156542812285 Parameter: 11 Positions: 290 Avg. Error: 7.94830050269379 Parameter: 12 Positions: 290 Avg. Error: 8.66008903038875 Parameter: 13 Positions: 290 Avg. Error: 9.114407610375434 Parameter: 14 Positions: 290 Avg. Error: 9.613416435385924 Parameter: 15 Positions: 290 Avg. Error: 9.996985154183648 Done! Calculating WKNN parameter Parameter: 1 Positions: 290 Avg. Error: 1.7535225490195745 Parameter: 2 Positions: 290 Avg. Error: 2.828108501703112 Parameter: 3 Positions: 290 Avg. Error: 3.103403533760642 Parameter: 4 Positions: 290 Avg. Error: 3.6864500170894723 Parameter: 5 Positions: 290 Avg. Error: 4.040592423213244 Parameter: 6 Positions: 290 Avg. Error: 4.184767230931307 Parameter: 7 Positions: 290 Avg. Error: 4.473391782511176 Parameter: 8 Positions: 290 Avg. Error: 4.682784733026703 Parameter: 9 Positions: 290 Avg. Error: 4.959394725752682 Parameter: 10 Positions: 290 Avg. Error: 5.256765042378009 Parameter: 11 Positions: 290 Avg. Error: 5.5007236666369534 Parameter: 12 Positions: 290 Avg. Error: 5.844052147012272 Parameter: 13 Positions: 290 Avg. Error: 6.120608429925178 Parameter: 14 Positions: 290 Avg. Error: 6.385641690580632 Parameter: 15 Positions: 290 Avg. Error: 6.62154087396507 Done! Calculating MAP parameter Parameter: 1 Positions: 290 Avg. Error: 2.1619860115120555 Parameter: 2 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 3 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 4 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 5 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 6 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 7 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 8 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 9 Positions: 290 Avg. Error: 1.7535225490195743 Parameter: 10 Positions: 290 Avg. Error: 1.7535225490195743 Done! Calculating MMSE parameter Parameter: 1 Positions: 290 Avg. Error: NaN Parameter: 2 Positions: 290 Avg. Error: 1.7498889149108856 Parameter: 3 Positions: 290 Avg. Error: 1.7806398141014868 Parameter: 4 Positions: 290 Avg. Error: 1.8209795860443478 Parameter: 5 Positions: 290 Avg. Error: 1.8764885946976129 Parameter: 6 Positions: 290 Avg. Error: 1.9505246960583114 Parameter: 7 Positions: 290 Avg. Error: 2.041719152989117 Parameter: 8 Positions: 290 Avg. Error: 2.1448642832455125 Parameter: 9 Positions: 290 Avg. Error: 2.253804843291688 Parameter: 10 Positions: 290 Avg. Error: 2.365860366623 Done! And I want tho extract the numbers after avg. error then sort them and finally write them to other text file as output, for example for the previous sample this is the desired output: 1.749888915 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522549 1.753522775 1.780639814 1.820979586 1.876488595 1.950524696 2.041719153 2.144864283 2.161986012 2.253804843 2.365860367 2.828108502 3.103403534 3.686450017 3.724567062 3.93628413 4.040592423 4.184767231 4.473391783 4.682784733 4.84321457 4.959394726 5.256765042 5.27296132 5.470106704 5.500723667 5.844052147 5.882240504 6.12060843 6.292034573 6.385641691 6.621540874 6.768597737 7.363156543 7.948300503 8.66008903 9.11440761 9.613416435 9.996985154 any recommendations on how to achieve this? this is the code to read the files: public class extract2 { public static void main (String[] args) throws java.lang.Exception { File inputFile = new File("offline1.txt"); File tempFile = new File("offline_out.txt"); File inputFile1 = new File("testing.txt"); File tempFile1 = new File("testing_out.txt"); } How I want to do it: read the file line by line and extract the numbers after ": " and sabe it into an arraylist, then sort the elements in the array list, finally write the results of the array list A: Set<Double> set = new TreeSet(); br = new BufferedReader(new InputStreamReader(file, Charset.forName("UTF-8"))); while ((line = br.readLine()) != null) { if(line.contains("Error) { set.add(Double.valueOf(line.split("Error: ")[1])); } } In set you have ordered error values, just print them in a loop.
Low
[ 0.5268817204301071, 30.625, 27.5 ]
Q: 500 error with MEAN Stack I am currently working on a simple project with the MEAN stack. I am attempting to connect to Mongo DB. Everything appears to be working okay until I attempt to place data onto my index.ejs file. Here is my code: Model: var mongoose = require('mongoose'); //mongoose Schema var personSchema = new mongoose.Schema({ firstname: {type: String, required: true}, lastname: {type: String, required: true}, homeworld: String }); //compiling into model module.exports = mongoose.model("Person", personSchema); Index.js in routes folder: var express = require('express'); var router = express.Router(); var Person = require("../models/person"); router.get('/', function(req, res, next) { Person.find({}, function(err, persons) { if(err){ console.log("ERROR!"); } else { res.render('index', { persons: persons }); } }) }); app.js file (Please note that this is only the top half, the only portion that I changed a little): var express = require('express'); var path = require('path'); var favicon = require('serve-favicon'); var logger = require('morgan'); var cookieParser = require('cookie-parser'); var bodyParser = require('body-parser'); require('./app_server/models/db'); var routes = require('./app_server/routes/index'); var users = require('./app_server/routes/users'); var Person = require("./app_server/models/person"); var mongoose = require('mongoose'); var app = express(); //Connecting to mongo DB mongoose.connect("mongodb://localhost/learn2A"); // view engine setup app.set('views', path.join(__dirname, 'app_server', 'views')); app.set('view engine', 'ejs'); Here is my index.ejs page: <h1>Home Page</h1> <h4>Database Items Here:</h4> <!-- Looping through each entry in the database --> <% persons.forEach(function(person) { %> <p><%= person.firstname %></p> <p><%= person.lastname %></p> <% }) %> Everything is connected fine and working until I go to the index.ejs page. Then I do NOT get an error but on my console I am showing: GET / 500 23.966 ms - 35 If I take away all of the following lines: <% persons.foreach(function(person) { %> <p><%= person.firstname %></p> <p><%= person.lastname %></p> <% }) %> Then my index.ejs page loads fine. My folder structure looks something like this: app_server models person.js routes index.js views error.ejs index.ejs app.js Finally, I know that the db is working on the mongo side-I have one entry in there and can see it. Please let me know if more information is needed. Thank you for the help. A: I figured out the answer to my own question. The solution was that I placed the connection to the mongo db in my file for the current model. It was in app.js. So this line: //Connecting to mongo DB mongoose.connect("mongodb://localhost/learn2A"); was moved from app.js over to the models folder and the connection was made and everything worked.
Mid
[ 0.564732142857142, 31.625, 24.375 ]
XVIDEOS.COM Lesbian ecchi hentai As Yuma asks Hotaru for some words of advice in terms of dating, she takes advantage and goes beyond friendship while sabotaging Yuma's relationship. Lovecraft rolling in his grave after he found out Japan turned his Lesbian ecchi hentai horrors into cute and sexy girls? Airi-sama all the way!
Low
[ 0.40235294117647, 21.375, 31.75 ]
At 4935, he remembers he doesn’t have the keys. His mother, Veena, who bankrolled the restaurant, had taken them one morning after she and restaurant staff walked in on her son and two women in the upstairs catering venue. A night of drinking and the drug Molly had turned into a naked slip-and-slide thanks to upturned restaurant-size jugs of olive oil. Ashish yanks the locked panic bar door open, loots the safe and stuffs his pockets with cash. He notices blood on the floor and all over his shirt. His chin is split wide open. He stops at a bodega on the way back to his apartment to buy Super Glue, a hack cooks use to close gashes, stop bleeding and keep working. AD AD At his apartment, the prostitute helps Ashish glue his chin shut. He showers and passes out. When he wakes, she and the cash are gone. A week later, Veena takes her son on a four-hour silent drive to Pennsylvania and drops him off at a 28-day rehabilitation program. Four-and-a-half years later, Ashish, 33, is sober and owns three restaurants, Duck Duck Goose and George’s Chophouse in Bethesda and a second Duck Duck Goose in Baltimore. In November, he was invited to cook at the illustrious James Beard House in New York City and did, just before Christmas. After having served a five-course meal that included line-caught halibut with scallop mousseline and osetra caviar, he posed for a picture arm in arm with his mother, he in immaculate chef whites, she in a stunning, intricately embroidered beige chiffon sari over a navy-blue velvet blouse. A portrait of icon James Beard hung behind them. For Ashish, a nightmare had become a dream come true. Why tell his story? “I want for someone to read it and say, ‘I have a friend who needs to read this,’ ” he said. “I’m not an uber-religious person, but if there wasn’t someone looking out for me, I wouldn’t be here right now.” AD AD Drug and alcohol abuse plagues the restaurant business. According to the 2015 National Survey on Drug Use and Health from the Department of Health and Human Services, hospitality and food service workers had the highest rate of substance abuse among all the industries studied, at 16.9 percent. The rate of alcohol abuse was higher only in the mining and construction fields. The website Chefs with Issues and programs such as Ben’s Friends and Restaurant Recovery provide safe spaces for people in the industry to deal with issues that probably have roots in the past. As with many addicts, Ashish’s journey began before he was born. His mother, a Seventh-day Adventist, was a professor in Pune, India. Rather than remain silent in an abusive marriage, she got divorced, taboo in India. She also began a courtship with Rajish Alfred, a student and her third cousin. AD AD “My brothers told me very clearly that we do not have divorces in our family,” says Veena. “What choice did I have? I came to America.” She settled in Silver Spring in 1982, staying with an American woman she knew from India. She had six suitcases, including bedsheets and a rug, $1,600 (the maximum the United States allowed) and two boys, Shane 12, and George, 6, to raise. Rajish planned to follow once he could get a visa. An immigration lawyer took $800 to apply for her H1 visa. Six months later, she received a letter saying her visitor visa had expired. The lawyer had never filed her papers. Rather than return to India and now with expired documents, she took a job with the lawyer — and a second job at a senior care facility. Rajish arrived in 1984 and held a string of jobs, while keeping his drinking binges under wraps; unbeknown to Veena, he had become a severe alcoholic. They married and bought a condominium in 1985. Ashish was born in 1986. AD AD And so his troubles began. In 1989, Rajish had three DUIs, including one totaling the car, with George inside. He would leave for long periods, then return unannounced. “I was loud and violent. [Veena] had a couple of episodes where she had to go into a shelter with the boys. There were lots of apologies, regrets,” Rajish says. “When Ashish was 2 ½ , he came charging into our room and bounced on my chest. I was half asleep, hung over. I grabbed him by his shoulders and pushed him down hard, and his femur shattered.” The injuries put Ashish in a body cast for months. “I haven’t even begun to think about how I can ask forgiveness for this.” Ashish didn’t know the truth about the incident until his teenage years. “I was told I had fallen down the steps,” he says. Veena got a green card in 1991 and took in three foster children with disabilities to help raise the money to found what would become a chain of AlfredHouse assisted-living facilities, starting in Rockville. (There are now nine.) In 1995, she bought a house in Derwood. Shane, who also struggled with alcohol, had long moved out; George was in California for college. AD AD “That’s where Ashish grew up, where he saw the worst of his father, where he called 911 on him because he was throwing things at me and abusing me,” Veena said. School provided no respite. In fourth grade, at Spencerville Adventist Academy in Beltsville, he didn’t fit in and was bullied. He stopped doing homework. In eighth grade, he was buying pot, stealing liquor and drinking all day. He hacked into his teacher’s computer to change a grade and got suspended. In ninth grade, he got kicked out, repeating the grade at the public Magruder High School in Rockville. “I made friends with some real criminals there,” he says. “That’s when it clicked that the more I drank, the more drugs I did, the more fights I got in, the more popular I was.” AD His father was in and out of his life. Veena divorced Rajish in 2001, remarrying him in 2006, and during his binges she would send Ashish to make sure he hadn’t burned his apartment down with a cigarette or passed out and hit his head. “I stopped being a kid while I was still a kid,” Ashish says. AD He worked various jobs, including at Starbucks, where he got fired for stealing $50 to buy Ecstasy. By 21, he was a VIP host at a gentleman’s club in Baltimore and arranging for drugs for guests. His booze and cocaine habit ballooned. His mother kicked him out, then so did a girlfriend he stayed with, then the friends who let him couch surf. “I burned every bridge, owed everyone money and went home with my tail between my legs,” he says. He spent his days watching Food Network, where he caught the cooking bug. In 2008, he made a lavish Thanksgiving dinner for his mother to persuade her to pay for him to go to the French Culinary Institute in New York. She knew he just wanted to get out of Maryland, and she feared drugs would kill him, but she paid the $40,000-plus tuition plus rent, and let him go. AD AD The day before he was supposed to go to New York and sign an apartment lease, he blew lines of coke until 4 a.m. He took the train up, signed the lease, passed out on the floor of the unfurnished apartment and came back home. Once at the FCI, he excelled. The program included working for the school’s in-house restaurant, where a samosa-like appetizer he created made it on the lunch menu, an honor. Veena was proud, despite cultural misgivings. “Nowadays, chefs have great prestige, but if my grandfather saw this, my father, they would weep, because I come from the ruling class in India, where they have their own kitchens and chefs,” she said. “But because my son was happy, I was happy.” AD Ashish worked in restaurants around New York, such as DBGB, Lupa Osteria Romana and Bar Pitti. Chefs told him he could go far if he put his demons behind him. Instead, he partied on, sometimes missing work and getting fired. He sold coke. On two trips home to see his parents, he was arrested for DUIs. AD He returned to Maryland in 2012, where the 4935 space in Bethesda had become available. Veena sold a property to finance the business. She knew that Ashish was still drinking — he would disappear for days at a time — but not that heroin had entered the picture. “I liked the idea that I could die from it,” he says. “That seemed like a comfortable death.” The best-case scenario, as he saw it, was that he would get a good buzz; the worst-case, that he wouldn’t wake up. “I didn’t do it to the point where I’d get sick if I didn’t have it. If it wasn’t dope, it was [oxycodone] — whatever I could get my hands on. I was doing so much blow, the oxy would even me out, people said. And it worked.” It didn’t work. One day in 2014, Veena gave Ashish an ultimatum. “I told my son, ‘If you are willing to go into rehab, I am with you. I will pay for it. Otherwise, you will not see me and I’ll have nothing to do with you. Call and let me know by Friday night,’ ” Veena says. “I left my son standing there on Cordell Avenue, miserably thin, injured emotionally and physically, with the fear in my heart that I will not see him again, that he will kill himself.” Ashish’s father, recently sober and living in Philadelphia, encouraged his son to go. “Like any good drug addict, I told them to f--- off and I’d figure it out on my own,” Ashish recalls. “But that lasted only a few days.” At the Caron Treatment Center in Wernersville, Pa., counselors asked Ashish to get rid of anything he might have on him. He found some cocaine in his wallet and threw it out. “And that was it,” he said. “I was done. They put me in detox, and I never wanted to go there again. I never wanted to feel that again.” Ashish calls it the best 28 days of his life. “For me, the most value was in the family part of it. There was a three-day workshop with the parents that really changed my life.” Pent-up thoughts and memories surfaced that made the work valuable even if it was excruciating. He recalled that in Silver Spring when he was very young — 5, 6, 7 years old — various workers and tenants were going through the house, and “they got handsy.” He didn’t mention it to his parents until rehab. “What could they say?” he asked. “It wasn’t their fault. I knew as a child that it was a secret not to be told. I don’t think it went too far. No, not too far.” Says Rajish: “We shared a lot of things we never talked about. . . . Ashish and I were in it. Our bond was elevated from father and son.” It wasn’t until years later, though, that Rajish fessed up to the violence and asked forgiveness. “I said, ‘Yes, fine, thank you,’ ” Ashish says, “and kind of kept it moving. And that was the end of it. I mean, I spank my dog and feel terrible. I can only imagine how he must feel.” When he returned to Maryland after rehab, Ashish lived in a halfway house for two months. On the first night, he was slinging drinks at his restaurant, which remained open while he was gone, because a bartender had called in sick. “What was I going to do? I was short-staffed, and no one wanted to work for me.” Ashish now attends Alcoholics Anonymous meetings and sees his sponsor once a week. Until a year-and-a-half ago, he submitted to random drug testing four or five times a week to reassure his mother and staff. He told them if they ever thought they had something to worry about, he would happily submit to testing again. He opened Duck Duck Goose in April 2016 and a Baltimore outpost in June 2018. He bought a house in Baltimore in July and lives there with his dogs, Otis and Marco (after the British chef Marco Pierre White). There have been challenges. George, his half-brother and surrogate father, died suddenly of a heart attack in 2015. Ashish had George’s birth and death dates tattooed on his right hand, and when he rebranded the struggling 4935 Restaurant in 2017, he paid further tribute by naming it George’s Chophouse. He recently went to court for a young woman who works for him. She is new to sobriety, and her mother, with whom she lived, had left. The rent hadn’t been paid in three months, and his employee was going to be evicted. Ashish got her an apartment and took money out of her paycheck for rent. “The judge said, ‘I don’t like the fact that you work in restaurants, because I think that’s a terrible environment for somebody trying to stay sober,’ ” Ashish said. “I don’t necessarily agree with that. I think it’s the environment you create. I think, as a chef and owner, that if I foster an environment where it’s cool to be blowing lines and doing shots at the bar at the end of the night, then, yeah, that’s what’s going to happen there. It’s not acceptable in any of my places. I’ll take them out for a drink after work and buy them one drink and swipe my card and get out of there.” Ashish sees his mother every Saturday, either for lunch or at the Southern Asian Seventh-day Adventist Church in Silver Spring. He says she has made peace with his career. “It really took a long time for her to understand and respect what it is that I actually do,” he says. “But I know she’s happy and she’s happy with me and how far I’ve come. I mean, five years ago I was almost . . . dead, and now I’m cooking at the Beard House. That’s a big deal.” Hagedorn is a Washington writer and cookbook author.
Mid
[ 0.588807785888077, 30.25, 21.125 ]
Size Gettin' it Done in Douglasville $27.99$24.63 (0) 00 Skreened As anyone can tell you, it's a well known fact that in Douglasville folks know how to get it done. For us to not get it done would be impossible. If Christopher Columbus got it done like we get it done, he would have landed the Santa Maria on the Moon. Rock this awesome vintage-style, retro T-shirt and tell the world that Douglasville really knows how to get it done.
Low
[ 0.5036764705882351, 34.25, 33.75 ]
Reply-To: [email protected] (Jeff Hupp) From: [email protected] (Jeff Hupp) Subject: PGP Where to get it? Lines: 16 I am both new to this news group and to the net. I am facinated by the things I have heard about the PGP encryption program. Does anybody out there know where I might get a version of this program that runs under Windows 3.1, MS-Dos, Unix w/source? As of this writting I have no UNIX access and am running on a nifty windows implamentation of uucico. Thanks in advance! _____________________________________________________________________ \Jeff Hupp |Internet: [email protected] \ |9797 Medowglen, Apt. 1807 |Ad: Contract Programming, Novell | |Houston, Texas 77042 | Network Design and Support. | |Voice: (713) 780 - 9419 |"The best govenment doesn't" -- me. | \_____________________________________________________________________\
Low
[ 0.504098360655737, 30.75, 30.25 ]
Meet Iriss and Abyss – the most beautiful twin cats in the world! The 9-month-old sisters are living in Saint-Petersburg where they found their human dad at 3 months old. These inseparable cats both have heterochromatic eyes. Having heterochromatic eyes means that eyes are of different colour. For example, one might be green or brown and the other blue, or there might be a few colours in one eye. Legend says that different coloured eyes allow people or animals to see into both worlds – of the living and the dead. I myself don’t know if that’s true, but I can for sure say that heterochromatic eyes are stunning. More info: Instagram
Low
[ 0.397590361445783, 20.625, 31.25 ]
Welcome to the Nillumbik Plumbing & Gasfitting Guide, your local guide to Plumbing & Gasfitting in the Shire of Nillumbik . The Nillumbik Plumbing & Gasfitting Guide brings together information from a wide range of sources to make it easy for you to find what you're looking for. Established in 1993 and based in Research, Clear Water Plumbing and Gas Fitting is owned and operated by Simon LARKIN, a self-employed plumber who has lived in the Shire of Nillumbik for over 25 years. Simon is a licensed plumber and gas fitter with over 14 years of experience who is qualified Terence Wray is a local tradesman with over 30 years of expertise in the plumbing industry, who has resided in the Shire of Nillumbik for over 25 years.Terry is licensed in all aspects of general plumbing, including gas fitting, mechanical services, roofing, storm water, sanitary, water supply and drainage John COX operates Komplete Plumbing Services Pty. Ltd, a Greensborough based organisation, established in 1987, and servicing the Shire of Nillumbik. John has over 21 years of experience in the industry and is licensed in all aspects of plumbing. S.A. Edwards Plumbing was established in 1992. Scott is qualified in, and offers all general plumbing services including roof plumbing, maintenance of hot water and gas services, and sanitary drainage for both commercial and residential properties. He specialises in clearing blocked drains. Aardee Plumbing is a family oriented business committed to providing an efficient, reliable and courteous service to the public. Russel Dower is a fully licensed plumber and gas fitter with over 26 years of experience who services commercial, industrial and residential properties, specialising in maintenance contracts and high pressure water cleaning of drains All Times Plumbing specialises in the installation, maintenance and repair of gas appliances as well as providing services relating to sanitary and water supply, drains, sewers, spouting, roofing and duct fitting. Ayr Plumbing is owned and operated by Raymond Stekel, servicing both commercial and residential properties within the Nillumbik Shire. Services include installation and service of all gas appliances, including gas and electric hot water service and stove changeovers, clearing of blocked sewers and below ground drainage works, repair of burst pipes, tap re-washering, roof repairs Guardian Plumbing and Gas Services has been a plumbers for 17 years. Our highly developed skills, varies through all facets of Plumbing and Gas maintenance. So passionate about his vocation, he has become a member of the Master Plumbers Association, attending a wide range of seminars to enhance his knowledge. I am Also A bosch Hot Water Hero. The Local Plumbers of Taylor and Sons Plumbing have over 25 years of experience in the residential and commercial sectors providing superior and gasfitting services. We have been working with home improvement companies, architects, builders and home owners for all their plumbing needs. Our goals are to develop a long lasting relationships with our clients based on trust, honesty, reliability and satisfaction. No job is too big or too small for us. Servicing Ringwood, Croydon, Donvale and surrounding suburbs. Plumber Ashburton - Your local plumber in Ashburton and surrounding areas. We are friendly and detail oriented. With Plumber Ashburton you can always expect the finest quality and expert workmanship from the finest plumbing technicians Ashburton has to offer. Welcome to Unibond Plumbing - Your Local Plumber in Essendon We are fully licensed plumbers that are based in the Northern Suburbs and work in all areas of Melbourne. We are members of Master Plumbers and Mechanical Services Association and have all the accredited Occupational Health and Safety Cards. We specialise in many types of roofing, gas fitting, renovations, new construction, maintenance of gas appliances and hot and cold water installations. Taylor & Sons Plumbing, the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. We service most areas of Melbourne and can cater for your needs 24 hours a day, 7 days a week. Welcome to Schultz Plumbing Need emergency plumber in Vermont? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. If you have an blocked drain problem in Balwyn then call us today Balwyn Plumbing the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. If you have an blocked drain problem in Camberwell then call us today. Taylor & Sons Plumbing the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. If you have an blocked drain problem in Ivanhoe then call us today. Taylor & Sons Plumbing the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. If you have an blocked drain problem in Kew then call us today. Taylor & Sons Plumbing the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Blocked drain? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing - Water Tank Eltham Need Water Tank? Burst water pipe? No hot water? Running tap? Schultz Plumbing offers a 24 hour Immediate Responsive Service, 7 days a week, 365 days a year. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. If you are looking for a professional, reliable and qualified plumber, Taylor & Sons Plumbing is here to assist you. We strive to provide our customers with exceptional quality workmanship delivered at competitive prices. Commercial Services - Property Maintenance Albert Park is one of very few cleaning businesses in Albert Park that provide their customers with a one-stop service for property maintenance, from gardening to roof leaks. Commercial Services - Property Maintenance South Melbourne is one of very few cleaning businesses in South Melbourne that provide their customers with a one-stop service for property maintenance, from gardening to roof leaks. Property Maintenance North Melbourne is one of very few cleaning businesses in North Melbourne that provide their customers with a one-stop service for property maintenance, from gardening to roof leaks. Property Maintenance West Melbourne is one of very few cleaning businesses in West Melbourne that provide their customers with a one-stop service for property maintenance, from gardening to roof leaks. Wall Rendering Altona North | Welcome to SHP Wall Boards SHP Wall Boards provides the ultimate rendered outcome in Altona North. Our full time wall rendering team are experts in our field. We use techniques and specialist knowledge that is European in origin. Wall Rendering Toorak | Welcome to SHP Wall Boards SHP Wall Boards provides the ultimate rendered outcome in Toorak. Our full time wall rendering team are experts in our field. We use techniques and specialist knowledge that is European in origin. Wall Rendering Hawthorn | Welcome to SHP Wall Boards SHP Wall Boards provides the ultimate rendered outcome in Hawthorn. Our full time wall rendering team are experts in our field. We use techniques and specialist knowledge that is European in origin. Home Extensions Bayside | Cronin Builders Cronin Builders build home extensions in Bayside and surrounding areas. Our home extensions in Bayside are often praised, and they have estabnlished a large referral base over the last 30 years. Home Extensions Bentleigh | Cronin Builders Cronin Builders build home extensions in Bentleigh and surrounding areas. Their home extensions in Bentleigh are often praised, and they have established a large referral base over the last 30 years. Home Extensions Mornington | Cronin Builders Cronin Builders build home extensions in Mornington and surrounding areas. Their home extensions in Mornington are often praised, and they have established a large referral base over the last 30 years. Home Extensions Camberwell | Cronin Builders Cronin Builders build home extensions in Camberwell and surrounding areas. Their home extensions in Camberwell are often praised, and they have established a large referral base over the last 30 years. Home Extensions Waverley | Cronin Builders Cronin Builders build home extensions in Waverley and surrounding areas. Their home extensions in Waverley are often praised, and they have established a large referral base over the last 30 years. Taylor & Sons Plumbing offers a SAME DAY SERVICE for any East Melbourne suburb. If you need a reliable plumber who can be at your aid in just a matter of hours, then Taylor & Sons Plumbing is the perfect solution. As one of the leading plumbing companies servicing Melbourne's eastern suburbs, including Rosanna, Lower Plenty, Balwyn North & Ivanhoe, Taylor & Sons Plumbing are highly regarded amongst their clientele and peers for providing quality service at an affordable price. Taylor & Sons Plumbing are a locally owned and operated plumbing company that service the entire eastern and south-eastern suburbs of Melbourne, including the outer east region of Heathmont, Kilsyth, Bayswater and Boronia. Our commitment at Jim’s Pest Control – Pest Control Melbourne is to protect the environment and this and with an outstanding safety record this means you can trust Jim’s Pest Control – Pest Control Melbourne will all your pest control needs in Melbourne. For the past 17 years, Guardian Plumbing and Gas Services has been servicing the South Yarra community. We have highly developed skills, that varie through all facets of Plumbing and Gas maintenance. So passionate about our vocation, Guardian Plumbing and Gas Services has become a member of the Master Plumbers Association, attending a wide range of seminars to enhance his knowledge. Guardian Plumbing and Gas Services has been a plumbers for 17 years. Our highly developed skills, varies through all facets of Plumbing and Gas maintenance. So passionate about his vocation, he has become a member of the Master Plumbers Association, attending a wide range of seminars to enhance his knowledge. I am Also A bosch Hot Water Hero. GStore is your one stop Green Shop. Our aim is to provide you with a single design destination to find all products you need to make your home more environmentally sustainable. G is for Green as well as Gottieb's, a family owned building and plumbing supplies business that has been trading for nearly 50 years so we understand our products. And as a member of the Plumbtec Group, we offer very competitive prices. Visit our eco-showroom in Melbourne to view our wide range of products. The Local Plumbers of Taylor and Sons Plumbing have over 25 years of experience in the residential and commercial sectors providing superior and gasfitting services. We have been working with home improvement companies, architects, builders and home owners for all their plumbing needs. Our goals are to develop a long lasting relationships with our clients based on trust, honesty, reliability and satisfaction. No job is too big or too small for us. Servicing Kew, Balwyn, Hawthorn and surrounding suburbs. The Local Plumbers of Taylor and Sons Plumbing have over 25 years of experience in the residential and commercial sectors providing superior and gasfitting services. We have been working with home improvement companies, architects, builders and home owners for all their plumbing needs. Our goals are to develop a long lasting relationships with our clients based on trust, honesty, reliability and satisfaction. No job is too big or too small for us. Servicing Burwood, Camberwell, Ashburton and surrounding suburbs. Emergency Plumber Balwyn North, the blockage specialists, has over 20 years experience unblocking your drains, sewers and storm water lines. Whatever the drain....whatever the plumbing problem, our experienced staff can unblock it. We service most areas of Melbourne and can cater for your needs 24 hours a day, 7 days a week. Need emergency plumber in Blackburn? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Need emergency plumber in Box Hill? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Welcome to Schultz Plumbing Need emergency plumber in Doncaster? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Need emergency plumber in Glen Waverley? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Looking for an experienced 24 hour emergency plumber in Bentleigh? Then look no further than Taylor & Sons Plumbing, your friendly local plumber - call us today for more information. Based in Victoria, Taylor & Sons Plumbing covers all aspects of plumbing and heating including 24 hour emergency call outs. Looking for an experienced 24 hour emergency plumber in Malvern? Then look no further than Y2K Plumbing, your friendly local plumber - call us today for more information. Based in Victoria, Y2K Plumbing covers all aspects of plumbing and heating including 24 hour emergency call outs. A professional and friendly service, all work carried out by Y2K Plumbing is done to the highest workmanship. With experience in all aspects of plumbing, we strive to ensure all work is completed promptly. Need emergency plumber in Mt Waverley? Call 1300 SCHULTZ (1300 724 858) We're on time, every time. Schultz Plumbing is an established company that offers every kind of plumbing and water services for homes and businesses in Melbourne's north and north eastern suburbs. From Heidelberg to Eltham, Doncaster to Greensborough and Balwyn to Bundoora, Schultz Plumbing are the "professionals around the corner" for all areas in the Yarra Valley region of Victoria. At Schultz Plumbing, nothing is more important to us than honouring our commitment to professionalism. Our Customer Response Team keeps track of our workforce at all times - so you can be sure we'll be there when we say we will, every time. Looking for an experienced 24 hour emergency plumber in Sandringham? Then look no further than Y2K Plumbing, your friendly local plumber - call us today for more information. Based in Victoria, Y2K Plumbing covers all aspects of plumbing and heating including 24 hour emergency call outs. A professional and friendly service, all work carried out by Y2K Plumbing is done to the highest workmanship. With experience in all aspects of plumbing, we strive to ensure all work is completed promptly. Go Go Gas and Plumbing - Plumbers Brunswick is a 100% Australian-owned and operated business, which has been in the Melbourne plumbing industry for over 1 year, building a local reputation for 'supreme service'. We will test for gas leaks, run gas lines and get rid of your LPG bottles by connecting your bbq to your household gas.
Mid
[ 0.5957943925233641, 31.875, 21.625 ]
ORONO, Maine — Thornton Wilder’s “Our Town” holds a special place in Sandy Cyrus’ heart. Twenty years ago, when she was teaching at American University in Bulgaria with her late husband, Al Cyrus, a beloved University of Maine theatre professor, he directed the play with his students. It was the last play he directed before his death in 1993. “It’s always been very important to me. There’s a lot of memories there,” said Sandy Cyrus, director of Orono Community Theatre. “I’ve never felt quite right doing it, until now” Cyrus said she has hesitated to tackle the play with the community theatre, but on the 20th anniversary of her husband’s production of the show she felt now was the time. “Our Town” will open at 7 p.m. Thursday, Nov. 29, at the Keith Anderson Community Center on Bennoch Road, and run through Dec. 2. Wilder’s sad, beautiful tale of the people, living and dead, of Grover’s Corner, N.H., has remained a staple of professional and community American theatre since it was first staged nearly 75 years ago. Though much of the story rests on the shoulders of young townsfolk Emily Webb and George Gibbs, played here by Jessie Walker and Will Martin, and the stage manager, played by University of Maine engineering major Michael Cloutier, the cast is in total comprised of 23 people from the Orono area, cast as families and friends, husbands and wives, parents and children. It’s truly a community, and family, affair. “I think there are a lot of parallels you can draw between the world of Grover’s Corner and our lives here in Orono,” said Judy Walker of Orono, who plays one of the deceased townsfolk. “The dynamics in relationships between men and women and parents and children has changed, certainly, but small towns are small towns. We still go to the grocery store and pharmacy. We still know everyone.” Walker is in the play with her husband, Bill Walker (Constable Warren), and her daughter, Jessie Walker, who plays a leading role as Emily Webb. There are a total of four real-life families, in fact, who are in the show together. In addition to the Walkers, the show includes Orono mother and daughter Louise Jolliffe and Elsa Jolliffe Saunders (a dead woman, and Rebecca Gibbs, respectively), Holden sisters Adelaide (11) and Rosie Ross (15), playing townspeople, and Elaine Bard and her sons Logan (16) and Quinn (7), of Bangor, who play Mrs. Webb, Sam Craig and Wally Webb, respectively. “I think it’s nice [to work with your family] because when you go home, you don’t stop working on the play,” said Jessie Walker, 12, an Orono Middle School student. “We run lines. We give each other critiques. You would never probably get that otherwise.” Being in a theater family means that outside of school, you live, breathe and eat theater, at rehearsal, at the dinner table and before bed. Elaine Bard’s three sons, Logan, Quinn and 5-year-old Ferris, have all had their share of star time. Logan was just seen in Ten Bucks Theatre’s production of “Rabbit Hole,” and Quinn was Young Tommy in Husson University’s production of “Tommy” last year, and he stars alongside John Slattery and Margo Martindale in the upcoming feature film “Bluebird,” filmed in northern Maine last winter and set to be released in January at the Sundance Film Festival. “More than just our own family, I think the theater community in the Bangor area is incredibly strong and supportive,” said Elaine Bard. “We all help each other.” Sandy Cyrus works with young actors at Keith Anderson Community Center “I think part of what makes ‘Our Town’ still relevant is part of what we see in our own communities,” said Sandy Cyrus. “Even in our own theater community, we all know each other. We’re all in the same shows. It’s a big family.” And with that in mind, cast members are keenly aware of the play’s central message — that life must be treasured, because it’s gone before you know it. “I think that’s definitely stuck with me, through the process of doing this play,” said Logan Bard. “You’ve got to enjoy every minute of it.” “Our Town” will be performed at 7 p.m. Nov. 29-Dec. 1 and 2 p.m. Dec. 2 at the Keith Anderson Community Center, Bennoch Road, Orono. Tickets are $12 for adults, $8 for students and seniors. The show is made possible by a grant from the Maine Community Foundation Theatre Fund, and Orono-Old Town Kiwanis. There will be a potluck supper prior to the show on Nov. 29 at the Orono Senior Center, and after the Dec. 2 matinee there will be a holiday festival in downtown Orono. For more information, visit Orono Community Theatre on Facebook. print and share: 4/27/10 05:10 PM By TheWeeklyCassie Clemmer will play Anne Shirley in the Orono Community Theatre production of “Anne of Green Gables,” April 30-May 2, at the Anderson Community House. ORONO — The ever-popular play “Anne of Green Gables” will be performed by the Orono Community Theatre Friday through Sunday, April 30-May 2, at the Keith Anderson Community House. Orono Community Theatre Artistic Director Sandy Cyrus has been rehearsing with the 18 cast members, who range in age from 9 to 66, since mid-January. “The story of the spirited orphan girl Anne Shirley is near and dear to the hearts of many,” Cyrus said. “Our cast is doing a great job bringing all of these characters to life, and we’re having a heck of a lot of fun doing it.” Costume designer Claire Bolduc and set designer Jayne Bowler will transport the audience back to the world of Prince Edward Island in the early 1900s. “Without the financial assistance of the Maine Community Foundation and sponsorship from the Orono-Old Town Kiwanis, mounting a large scale production like this would not have been possible,” Cyrus said. “We are very grateful to be able to offer so many opportunities for actors of all ages to be involved.”
High
[ 0.670360110803324, 30.25, 14.875 ]
The effects of intravitreally injected endothelin-1 on the iris-ciliary body microvasculature in rabbits. We previously reported that intravitreal injection of 0.5 microg of endothelin-1 (ET-1) caused both a sustained reduction of intraocular pressure (IOP) and decreased aqueous production in the rabbit eye. On the theory that these effects might have resulted from a sustained reduction of blood flow to the ciliary body due to ET-1-mediated vasoconstriction, in the present study we attempted to determine if ET-1 causes any changes in the vascular caliber of the iris-ciliary body. ET-1 solution (0.5 microg) was injected into the vitreous of one eye of each of 10 albino rabbits; the same amount of vehicle was injected into the contralateral eyes. One h following these injections in five of the rabbits and 24 h following them in the other five rabbits, ocular microvascular castings were obtained under controlled physiologic conditions, and the amount of vasoconstriction of the arterioles branching from the major arterial circle of the iris (MAC) and supplying the iris-ciliary body was measured by a scanning electron microscope and expressed as a percentage. The ET-1 caused a statistically significant focal vasoconstriction in the treated eyes as compared with the contralateral, control eyes (9.9% at 1 h and 6.2% at 24 h; both P = . 0001). Intravitreally injected ET-1 caused statistically significant, but only mild vasoconstriction of the arterioles supplying the ciliary processes.
High
[ 0.661577608142493, 32.5, 16.625 ]
Matt Williamson Ranks West by Position Pete from Bremerton, Wash., is a San Francisco 49ers fan living in Seattle Seahawks country. He has tired of locals assuming Seattle has built the strongest roster in the NFC West, and so he asked through the mailbag how I would rank these division rivals by position. We're going to expand this exercise to cover the entire division with a big assist from ESPN scout Matt Williamson. This has the potential to become a week-long discussion on the blog. I'm going to follow up with Matt on the phone Tuesday. First, though, I've published his rankings in a chart that should get the discussion moving quickly. My rankings would line up with Matt's just about across the board. My initial thought was to rank Arizona's defensive line higher and Seattle's lower. I also might have ranked the 49ers' cornerbacks higher. However, we're talking about small degrees of difference in some cases, so a ranking disparity of three spots can be misleading. Matt and I will pick up the discussion Tuesday. I'll also run through some of the comments left beneath this item. This is a conversation I look forward to continuing. Note: The rankings are for the 2013 season based on existing personnel. We were not projecting for the longer-term future.
High
[ 0.6901960784313721, 33, 14.8125 ]
//===- MakeGuardsExplicit.cpp - Turn guard intrinsics into guard branches -===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This pass lowers the @llvm.experimental.guard intrinsic to the new form of // guard represented as widenable explicit branch to the deopt block. The // difference between this pass and LowerGuardIntrinsic is that after this pass // the guard represented as intrinsic: // // call void(i1, ...) @llvm.experimental.guard(i1 %old_cond) [ "deopt"() ] // // transforms to a guard represented as widenable explicit branch: // // %widenable_cond = call i1 @llvm.experimental.widenable.condition() // br i1 (%old_cond & %widenable_cond), label %guarded, label %deopt // // Here: // - The semantics of @llvm.experimental.widenable.condition allows to replace // %widenable_cond with the construction (%widenable_cond & %any_other_cond) // without loss of correctness; // - %guarded is the lower part of old guard intrinsic's parent block split by // the intrinsic call; // - %deopt is a block containing a sole call to @llvm.experimental.deoptimize // intrinsic. // // Therefore, this branch preserves the property of widenability. // //===----------------------------------------------------------------------===// #include "llvm/Transforms/Scalar/MakeGuardsExplicit.h" #include "llvm/Analysis/GuardUtils.h" #include "llvm/IR/InstIterator.h" #include "llvm/IR/IntrinsicInst.h" #include "llvm/IR/Intrinsics.h" #include "llvm/IR/IRBuilder.h" #include "llvm/Pass.h" #include "llvm/Transforms/Scalar.h" #include "llvm/Transforms/Utils/GuardUtils.h" using namespace llvm; namespace { struct MakeGuardsExplicitLegacyPass : public FunctionPass { static char ID; MakeGuardsExplicitLegacyPass() : FunctionPass(ID) { initializeMakeGuardsExplicitLegacyPassPass(*PassRegistry::getPassRegistry()); } bool runOnFunction(Function &F) override; }; } static void turnToExplicitForm(CallInst *Guard, Function *DeoptIntrinsic) { // Replace the guard with an explicit branch (just like in GuardWidening). BasicBlock *BB = Guard->getParent(); makeGuardControlFlowExplicit(DeoptIntrinsic, Guard); BranchInst *ExplicitGuard = cast<BranchInst>(BB->getTerminator()); assert(ExplicitGuard->isConditional() && "Must be!"); // We want the guard to be expressed as explicit control flow, but still be // widenable. For that, we add Widenable Condition intrinsic call to the // guard's condition. IRBuilder<> B(ExplicitGuard); auto *WidenableCondition = B.CreateIntrinsic(Intrinsic::experimental_widenable_condition, {}, {}, nullptr, "widenable_cond"); WidenableCondition->setCallingConv(Guard->getCallingConv()); auto *NewCond = B.CreateAnd(ExplicitGuard->getCondition(), WidenableCondition); NewCond->setName("exiplicit_guard_cond"); ExplicitGuard->setCondition(NewCond); Guard->eraseFromParent(); } static bool explicifyGuards(Function &F) { // Check if we can cheaply rule out the possibility of not having any work to // do. auto *GuardDecl = F.getParent()->getFunction( Intrinsic::getName(Intrinsic::experimental_guard)); if (!GuardDecl || GuardDecl->use_empty()) return false; SmallVector<CallInst *, 8> GuardIntrinsics; for (auto &I : instructions(F)) if (isGuard(&I)) GuardIntrinsics.push_back(cast<CallInst>(&I)); if (GuardIntrinsics.empty()) return false; auto *DeoptIntrinsic = Intrinsic::getDeclaration( F.getParent(), Intrinsic::experimental_deoptimize, {F.getReturnType()}); DeoptIntrinsic->setCallingConv(GuardDecl->getCallingConv()); for (auto *Guard : GuardIntrinsics) turnToExplicitForm(Guard, DeoptIntrinsic); return true; } bool MakeGuardsExplicitLegacyPass::runOnFunction(Function &F) { return explicifyGuards(F); } char MakeGuardsExplicitLegacyPass::ID = 0; INITIALIZE_PASS(MakeGuardsExplicitLegacyPass, "make-guards-explicit", "Lower the guard intrinsic to explicit control flow form", false, false) PreservedAnalyses MakeGuardsExplicitPass::run(Function &F, FunctionAnalysisManager &) { if (explicifyGuards(F)) return PreservedAnalyses::none(); return PreservedAnalyses::all(); }
Low
[ 0.533653846153846, 27.75, 24.25 ]
Atlanta snow | Jan. 14 HERO driver, Spencer Pass Sr.(left) signals to Beka Cook (right) of Mableton who lost control of her cutlass on the ice where several accidents occurred just before the Northside Drive exit on I-75 North due to icing. John Spink [email protected]
Low
[ 0.5085470085470081, 29.75, 28.75 ]
One versus two eyes makes a difference! Early face perception is modulated by featural fixation and feature context. The N170 event-related potential component is an early marker of face perception that is particularly sensitive to isolated eye regions and to eye fixations within a face. Here, this eye sensitivity was tested further by measuring the N170 to isolated facial features and to the same features fixated within a face, using a gaze-contingent procedure. The neural response to single isolated eyes and eye regions (two eyes) was also compared. Pixel intensity and contrast were controlled at the global (image) and local (featural) levels. Consistent with previous findings, larger N170 amplitudes were elicited when the left or right eye was fixated within a face, compared to the mouth or nose, demonstrating that the N170 eye sensitivity reflects higher-order perceptual processes and not merely low-level perceptual effects. The N170 was also largest and most delayed for isolated features, compared to equivalent fixations within a face. Specifically, mouth fixation yielded the largest amplitude difference, and nose fixation yielded the largest latency difference between these two contexts, suggesting the N170 may reflect a complex interplay between holistic and featural processes. Critically, eye regions elicited consistently larger and shorter N170 responses compared to single eyes, with enhanced responses for contralateral eye content, irrespective of eye or nasion fixation. These results confirm the importance of the eyes in early face perception, and provide novel evidence of an increased sensitivity to the presence of two symmetric eyes compared to only one eye, consistent with a neural eye region detector rather than an eye detector per se.
High
[ 0.6561797752808981, 36.5, 19.125 ]
Turkish President Tayyip Erdogan (L) and his Russian counterpart Vladimir Putin attend a symbolic ground-breaking ceremony for Turkey’s first nuclear power station at the Presidential Palace in Ankara on April 3, 2018. President Vladimir Putin arrived for a visit to Turkey aimed at launching the construction of a nuclear power plant and coordinating policy on the war in Syria. / AFP PHOTO / ADEM ALTAN President Vladimir Putin on Tuesday embarked on a two day visit to Russia’s increasingly close partner Turkey to launch the construction of its first nuclear power plant and coordinate policy on the war in Syria. Putin was to hold an afternoon of talks with his counterpart Recep Tayyip Erdogan before the two strongmen leaders are joined on Wednesday by Iranian President Hassan Rouhani for a summit devoted to Syria. Their meeting in Ankara opened with Putin and Erdogan, via video conference, launching construction of Turkey’s first nuclear power station in the Mediterranean Mersin region, a massive project that will come online in half a decade. In a sign of the importance of the alliance, Putin’s visit to Turkey is his first trip abroad since he won a historic fourth presidential mandate in March 18 polls. Putin and Erdogan — who have both led their post-imperial states out of economic crisis but also into a new era of confrontation with the West — have forged an increasingly close alliance in recent months. The Russian leader was driven to the vast presidential palace surrounded by an escort of Turkish troops in ceremonial dress on horseback and was warmly greeted by Erdogan who was waiting in person at the gate. ‘Close cooperation’ Their meeting comes as ties between Russia and the West are nosediving to post-Cold War lows after the March poisoning of Russian ex-double agent Sergei Skripal and his daughter in the UK. While EU powers have rushed to join Britain in condemning Russia and expelling diplomats over the attack on Skripal, Turkey has been much more circumspect. Erdogan, who in 2017 held eight face-to-face meetings with Putin and has already spoken to the Russian leader seven times by phone this year, has said that Ankara will not act against Moscow “based on an allegation”. In a move that has troubled Turkey’s NATO allies, Ankara has agreed to buy S-400 air defence missile systems from Russia. But Ankara-Moscow relations were also tested by a severe crisis from November 2015 when Turkey shot down a Russian war plane over Syria, a confrontation both sides are trying to put behind each other. Despite being on different sides of the Syrian civil war, key regime backers Russia and Iran have joined with rebel-supporting Turkey to push forward a peace process but also to ensure influence in Syria once the conflict ends. “We are also in close cooperation with Russia to end as soon as possible the terror threat and clashes in Syria,” said Erdogan. ‘New stage for Turkey’ The Akkuyu power station — a project costing over $20 billion (16 billion euros) and heavily disliked by environmentalists — was already launched once before in February 2015 but then put on hold due to the row over the downed Russian plane. “The scale of this project is difficult to exaggerate,” Putin said at the ceremony. “This marks a new stage in the development of Turkey’s economy.” Erdogan declared: “We are witnessing a historic moment.” The project was launched with Erdogan declaiming “in the name of God!” and work immediately began on the site, with the first concrete pouring as celebratory fireworks were let off. Once completed the power station will provide 10 percent of the electricity needs of Turkey, which has few energy resources of its own. The first stage is due to come online in 2023, the 100th anniversary of modern Turkey’s founding, and be completed entirely in 2026. Russia and Turkey are also building the TurkStream gas pipeline under the Black Sea that will allow Moscow to pump gas to Europe avoiding Ukraine and increase Turkey’s importance as a transit hub. Half of the offshore section of the pipeline has already been installed. “We are realising a number of strategic projects with the Russian Federation,” said Erdogan.
Mid
[ 0.6344086021505371, 29.5, 17 ]
If I Could Tell You Just One Thing: Michael McIntyre, Yes Man If I Could Tell You Just One Thing: Michael McIntyre, Yes Man ​I’M ON THE PHONE TRYING to arrange a meeting with Michael McIntyre, the highest-grossing comedian in the world, but I can’t: he’s making me laugh too much. The experience, however, is at least answering a question I’ve always asked myself: are professional comedians funny they’re not on stage? In this case, the answer is: oh yes. When we finally do meet in person, it continues. Michael starts by noting that I’m talking too loudly for a restaurant – almost a noisily as an American, he adds in faux-bitchy whisper. He confesses to suffering from what he calls ‘restaurant hush’, the British middle class need to speak quietly when you are somewhere a bit posh. Surprisingly, for a chat with one of the world’s funniest men, we quickly get into the topic of financial planning: the importance of never spending more than you earn, of avoiding the perils of credit cards and compounding interest. The reason: as a struggling stand-up he spent ten painful years spiraling into a debt before making it big. ‘By the time I was thirty my career had gone nowhere and I’d got myself £40,000 in the hole. I was sitting in my room and thought, my life is not my life, I’m renting everything: the flat’s rented, the furniture’s on credit, the TV I’m playing off at Dixons … even that video needs to go back to Blockbusters.’ It’s funny material now but was serious back then. The bailiffs were called in. The first time they took his car, then the furniture, then his appliances. On one visit he realised there was a man with a boom microphone accompanying the debt collector. When Michael queried the recording equipment, he explained he was making a documentary about bailiffs for Radio 4. ‘I said, “I can’t be in that,” but then I thought maybe this could be the break I’m looking for, so I started to try and be funny, thinking maybe if I’m on the radio someone will get in touch.’ So what took him from those dire straights to center stage? A simple but fundamental thing happened: he had Lucas, his first child. According to Michael, comedians get funnier when they become parents, mainly they have to. For him the effect was instant: the sense of responsibility, the need to provide. ‘I thought I’m going to do whatever it takes to make it before he can speak. I don’t want his first words to be, “Daddy, why is that man taking the video recorder?“‘ So the motivation was clear, but how does a comedian actually make themselves funnier? ‘I was crazed with it. I started doing gigs seven nights a week, for less money, for no money, just to keep practising, to get the jokes together, and to get the stage time. I knew if could get one big laugh, then if I worked hard enough I’d get another and then another.’ Over time he built a twenty-minute set he considered bullet-proof (‘I could make twelve people in a room above a pub who weren’t really listening start to cry with laughter‘), then he rang up the biggest agent in comedy, got him down to a gig in a small club, and gave the best and important performance of his life. When he came off the stage, the agent simply said, ‘You’re a revelation,’ and booked him for his first TV gig on the Royal Variety Performance. And then, boom. Like most overnight successes, it had taken ten years for him to get there. Getting the stage time, never mind screen time, is somewhat easier now for Michael, as the country’s most in-demand comedian. But he still works the small gig circuit, doing dingy clubs on rainy Tuesday nights whenever he’s crafting new material. And he still remembers how painful it can be when you don’t have the money, when things aren’t working, when the situation is looking pretty hopeless. So he passes on this advice to those at that stage: ‘You somehow need to find a way to believe, to keep going. But it’s not enough to just to yourself “be confident”, you can’t just BE confident, you have to surround yourself with people who bring the best from you, who will help you, who will help you grow that confidence. I’m like Britain’s Got Talent. I need my three yeses. I need my wife, my mother and my agent to all say, “Yes, that was good.” then it’s like, all right, that works, I can keep going. I put my success down to that: my wife, my family, my support network. My three yeses.’ This time, he’s not joking. Excerpt from ‘If I Could Tell You Just One Thing…: Encounters with Remarkable People And Their Most Valuable Advice’ by Richard Reed, Nov. 2016
Mid
[ 0.573696145124716, 31.625, 23.5 ]
                 Opinion issued September 11, 2003   In The Court of Appeals For The First District of Texas       NO. 01-02-00106-CV ____________   IP PETROLEUM COMPANY, INC., Appellant   V.   WEVANCO ENERGY, L.L.C.; DAVID L. NEAL, INDIVIDUALLY AND AS ADMINISTRATOR OF THE ESTATE OF FRANCES NEAL; MARK SCHOOMAKER; JANE SCHOOMAKER; BONNIE VAUGHAN; AND MARTIN PHILLIPS, Appellees   * * *   WEVANCO ENERGY, L.L.C.; DAVID L. NEAL, INDIVIDUALLY AND AS ADMINISTRATOR OF THE ESTATE OF FRANCES NEAL; MARK SCHOOMAKER; JANE SCHOOMAKER; BONNIE VAUGHAN; AND MARTIN PHILLIPS, Appellants   V.   IP PETROLEUM COMPANY, INC., Appellee       On Appeal from the 129th District Court Harris County, Texas Trial Court Cause No. 99-24160       OPINION ON REHEARING           We withdraw our opinion of May 8, 2003 and issue the following in its stead. The plaintiffs motion for rehearing is denied.           A jury found that IP Petroleum Company, Inc., appellant, was grossly negligent when it breached its contract with Wevanco Energy, L.L.C.; David L. Neal, Individually and as Administrator of the Estate of Frances Neal; Mark Schoomaker; Jane Schoomaker; Bonnie Vaughan; and Martin Phillips (collectively, “the plaintiffs”). In 11 points of error, IP argues that it did not breach the contract and the award of lost profits and attorneys’ fees was improper. The plaintiffs appeal the trial court’s refusal to award prejudgment interest on purely economic damages. We reverse and render judgment that the plaintiffs take nothing. Factual and Procedural Background The Kerans Theory           In 1993, Dr. Don Snyder read a scientific article in an issue of a professional association bulletin. The article, entitled “Karst-Controlled Reservoir Heterogeneity in Ellenburger Group Carbonates of West Texas,” was written by a geologist, Charles Kerans. It proposed an unconventional new approach to drilling for oil in West Texas.           The article was based on a theory of “karsting,” or cave formation, in the Ellenburger Formation in West Texas. According to the Kerans theory, millions of years ago, caves were formed in West Texas and were slowly filled with sediment. Over time, new rock was formed on top of the caves, collapsing the roofs of the caves and slowly burying the collapsed caves far below the surface. Kerans theorized that the buried, collapsed caves created three distinct strata in the Ellenburger Formation—a “cave roof” zone, a “cave fill” zone, and a “cave floor” zone. Both the cave roof and cave floor zones contain oil, Kerans opined, but existing wells had tapped only the oil in the cave roof zone. According to Kerans, if oil wells were drilled deeper into the Ellenburger Formation, through the cave roof zone and the unproductive cave fill zone, those wells might produce oil if they tapped into a productive area of the cave floor zone.           The Kerans theory marked a significant departure from the conventional approach to drilling in the Ellenburger Formation. The conventional approach, known as the “scratch and sniff” method, was to drill only to the very top of what Kerans called the cave roof zone and siphon off any oil. The concern was that if a well was drilled any deeper, it would be inundated by a zone of water. The Millard E-2 Well           Dr. Snyder decided to test the Kerans theory on the Millard E-2 well in the Penwell Field in Ector County. In 1955, Phillips Petroleum Company had drilled the Millard E-2 to a total depth of 8600 feet—just a few hundred feet short of where Kerans theorized the oil-rich cave floor zone might be found. Dr. Snyder believed that the Millard E-2 presented an opportunity to test the Kerans theory at relatively low cost. Phillips executed a “farmout agreement” with Dr. Snyder, allowing him to deepen the well. The Investors           Dr. Snyder approached Richard Reeve, the owner of Cleveland Oil Company. The two men had previously worked together on several projects. Cleveland Oil paid Snyder $40,000, and Reeve agreed to have Cleveland Oil find investors in exchange for a four percent overriding royalty interest. Cleveland Oil did not have to pay any of the drilling costs, but would receive four percent of the profits.           The promotional materials Cleveland Oil sent to prospective investors indicated that “this is a wildcat test.” The materials also indicated that “mechanical risk is present in re-entries.” This risk disclosure was made because the Millard E-2 had been abandoned for 50 years and it was impossible to predict how badly the well had deteriorated.           Frank Cox, the managing member of Wevanco Energy, L.L.C. had invested with Reeve in the past, and Cox decided that Wevanco would invest in the Millard E-2. Cox’s accountant, David Neal, also invested, as did several of Neal’s friends and family members. Selection of IP Petroleum           Snyder, Reeve, and Cox chose IP as the operator of the well. Snyder presented the proposal to Dr. Mike Senich, a project geologist at IP. Dr. Senich reviewed the promotional materials and found one sentence in the solicitation letter to be of particular interest—“Other than for faulting, the Cave Roof is thought to be reasonably continuous across a field, while the Cave Floor zones are more heterogeneous much like Permian age rock.” Dr. Senich testified that he understood this to mean that if the cave floor contained any oil at all, it might be productive in some areas but unproductive in others. He estimated that the chances of success for the Millard E-2 were one in ten, or possibly one in five.           Scott Nonhof, an engineer, conducted a petroleum engineering analysis on the well. Nonhof’s handwritten notes indicate: “*Bottom Line - Don’t have any production data worth a flip. . . . This is a WILDCAT not supported by Production Data but risk to reward is very high. Supper [sic] low cost to do reentry.”           IP agreed to participate, and IP and Cleveland Oil signed a participation letter agreement that described the objective of the project to “deepen the Phillips Petroleum Millard E #2 from its current TD of 8626' to +/- 9000' to test the Ellenburger Cave Floor Zone.” IP also agreed to pay 50 percent of the drilling costs, in exchange for a 50 percent share of the profits if the project were to succeed. The Joint Operating Agreement           Before drilling began, Cleveland Oil, IP, and all the investors executed a comprehensive Joint Operating Agreement (JOA). The JOA is a form contract promulgated by the American Association of Petroleum Landmen and is used throughout the industry. The two provisions of the JOA that are at issue in this case provide as follows: [IP, as the operator would] continue the drilling of the well with due diligence to a depth of 9125' below the surface of the ground or a depth sufficient to test the Lower Ellenburger Formation, whichever is lesser, unless granite or other practically impenetrable substance or condition in the hole, which renders further drilling impractical, is encountered at a lesser depth, or unless all parties agree to complete or abandon the well at a lesser depth.           . . . .   [IP] shall have no liability as Operator to the other parties for losses sustained or liabilities incurred, except such as may result from gross negligence or willful misconduct. The Drilling           On December 3, 1997, IP began drilling the Millard E-2, and, as warned in the promotional materials, IP encountered mechanical difficulties that ultimately increased the costs of drilling to $383,000, instead of $282,625 as originally projected. IP paid all drilling expenses as they were incurred, expecting a pro rata reimbursement from the other investors in accordance with the JOA.           On the evening of December 31, 1997, Reeve, Senich, and Snyder were losing hope because they were nearing the target depth, and there were no signs of oil. At about 10 p.m., the mudlogger approached the three men and asked what they wanted him to do with the oil and gas “shows” in the sample. Dr. Senich testified he was surprised to have had shows at this depth—he thought they had already drilled too deep and were past the area where he expected to find oil and gas. Likewise, Snyder testified he thought they had a dry hole “because we had drilled past the point that I had predicted that we would encounter this lower collapse zone.” Dr. Senich testified that, in general, operators know that it is critical not to drill past the spill point because, once a well taps into water, it will produce only water and not oil. Dr. Snyder was convinced, based on the Kerans theory, that the well was already past its spill point, and Dr. Senich also thought it was too deep. Most of IP’s employees testified that the Millard E-2 was drilled to a depth sufficient to test the Lower Ellenburger, but the plaintiffs’ experts testified to the contrary. The Agreement to Complete the Well           The shows were good news, but they presented a dilemma. In order to run a test and determine whether the shows actually indicated significant quantities of oil, it would be necessary to set pipe to reinforce the side of the well hole. Setting pipe would narrow the hole, and because of the depth and the age of Millard E-2, the hole was narrow already. After a test was run and the hole was narrowed, it would remain physically possible to deepen the well further, but additional drilling would be pointless. By then, the well would be so narrow that it would be virtually impossible to extract oil from the well in paying quantities.           Cox consulted with Neal and then urged Dr. Senich to run the test immediately. Dr. Senich testified that Cox and Snyder “wanted to stop immediately” at about the 9000' mark, but Senich wanted to drill a little bit further to allow room for the tools that test the well. IP ultimately drilled the well to 9015'.           IP delivered “completion letters” to each investor, which stated in pertinent part that “IP . . . hereby recommends . . . attempting an open hole completion in the Ellenburger formation in the interval of 8,947' - 9,010' . . . . Should you elect to participate, please evidence your election in the space provided.” Each investor signed the completion letters. Cox, however, testified that he thought the E-2 could still be deepened if IP had not reached the Lower Ellenburger. David Neal testified that he signed the letters because he understood them to mean IP had “found the zone.”           The tests indicated that the well would produce three percent oil and 97 percent water, a mix that would not produce oil in paying quantities. The Aftermath           Upon hearing the test results, Cox demanded that IP drill the well deeper. Glynn Broussard, a land man and team leader for IP, testified that Cox refused to take “no” for an answer and, at one point, Broussard told Cox that “IP felt like we had a dry hole and it was—we were done and we weren’t going to pursue drilling the well any deeper. If he wanted to drill the well deeper, he had every right to.” Neither Wevanco nor any other investor exercised its right under the JOA to take over the well. Cox, however, testified that IP misled him into believing IP intended to deepen the well.           In July 1998, IP gave notice of its intent to plug and abandon the well. In accordance with the JOA, at that time, the plaintiffs were given an election either to agree to the abandonment or to disagree and take over the well. The plaintiffs refused to select either option. Thus, the plaintiffs had at least two opportunities—when the completion was proposed and when the abandonment was proposed—to deepen the Millard E-2 themselves and to retain all the profits. They rejected both opportunities.           The plaintiffs argued that they had no motivation to produce oil from the Millard E-2 without a P-4—a regulatory form filed with the Railroad Commission that allows an operator to sell oil from a well. The P-4 on the Millard E-2 gave IP the sole authority to sell oil on the well. The plaintiffs contended that IP was “intentionally holding the rights to the well hostage” until the plaintiffs reimbursed IP for the drilling expenses it believed it was due under the JOA. The Trial           The plaintiffs sued IP, alleging that IP breached its alleged obligation to further deepen the Millard E-2; and IP counterclaimed, seeking reimbursement for its drilling expenses under the JOA. The jury found that IP failed to drill to a depth sufficient to test the Lower Ellenburger Formation and that the failure was the result of gross negligence or willful misconduct. The jury also found that IP had breached the participation letter agreement and that none of the plaintiffs had agreed to the completion of the wells.           The jury found that, had IP deepened the Millard E-2 to a sufficient depth, the plaintiffs would have realized a profit of $534,274. The jury then found that, had the Millard E-2 been a success, the plaintiffs would have realized an additional profit of $3,560,000. The jury also awarded $1,424,000 in attorneys’ fees through trial and $178,000 in appellate attorneys fees. JOA Breach           In issue four, IP asserts that the evidence was legally and factually insufficient to support the jury’s finding that IP’s alleged failure to drill to a sufficient depth under the JOA was the result of gross negligence or willful misconduct. Exculpatory Clause           The exculpatory clause in the JOA establishes a standard of care applicable to drilling operations, but then provides that, if an operator falls short of this standard, it will not be liable, in the absence of gross negligence or wilful misconduct. The clause provides in pertinent part that: IP Petroleum Company, Inc. shall be the Operator of the Contract Area, and shall conduct and direct and have full control of all operations on the Contract Area as permitted and required by, and within the limits of this agreement. It shall conduct such operations in a good and workmanlike manner, but it shall have no liability as Operator to the other parties for losses sustained or liabilities incurred, except as may result from gross negligence or willful misconduct . . . . (Emphasis added.) The plaintiffs globally contend that this clause can never apply to any breach of contract claim against an operator and therefore the clause does not apply to its claims against IP. We disagree.           Generally, exculpatory clauses in a contract are utilized to exempt one party from future liability for negligence. See Allright, Inc. v. Elledge, 515 S.W.2d 266, 267 (Tex. 1974). We have found only two cases discussing exculpatory clauses with respect to liability for breach of contract. See Cone v. Fagadau Energy Corp., 68 S.W.3d 147 (Tex. App.—Eastland 2001, pet. filed); Abraxas Petroleum Corp. v. Hornburg, 20 S.W.3d 741(Tex. App.—El Paso 2000, no pet.).           In Cone, the court was faced with an exculpatory clause in a joint operating agreement identical to the one that we have before us in this case. See Cone 68 S.W.3d at 154. The court noted that, in the operating agreement, the language requiring a showing of gross negligence and wilful misconduct to establish liability immediately followed the provision requiring the operator to conduct its drilling operations in a good and workmanlike manner. Id. at 155. Cone’s breach of contract claim, however, did not allege the failure of the operator to operate in a good and workmanlike manner. In Cone, the operator was alleged to have breached the joint operating agreement by improperly assessing certain charges against an investor’s account and the breach of contract claims were in the nature of an accounting. Id. Therefore, the Eastland Court of Appeals held that the exculpatory clause did not apply to Cone’s breach of contract claims against the operator. Id.           In Abraxas, the court determined that an exculpatory clause provision identical to the one before us was unambiguous. Abraxas Petroleum Corp., 20 S.W.3d at 759. In determining the scope of this exculpatory clause, the court noted that the clause was found in an article which concerned the operator’s authority to conduct operations in the contract area. Id. More significantly, in the clause, the operator’s limitation of liability is directly linked to the imposition of the duty to act as a reasonably prudent operator, which strictly concerns the manner in which the operator conducts drilling operations on the lease. Id. The breach of contract claims, however, did not allege that Abraxas failed to act as a reasonably prudent operator nor did they allege any misconduct arising from the manner in which the operator conducted drilling operations on the lease . In Abraxas, the operator was alleged to have breached the joint operating agreement by improperly sending “authorization for expense” letters to investors for expenses associated with routine repairs and the breach of contract claims concerned the operator’s administrative duties under the JOA. Id. Therefore, the El Paso Court of Appeals held that the exculpatory clause did not pertain to the breach of contract claims against the operator.           Here, the basis of the plaintiffs’ claims is alleged misconduct arising from the manner in which IP, as operator, conducted drilling operations on the lease. Unlike in Cone and Abraxas, the plaintiffs alleged that IP failed to conduct operations in good and workmanlike manner and failed to act as a reasonably prudent operator. In paragraphs 22 and 23 of its Second Amended Original Petition, the plaintiffs alleged the following:                                          BREACH OF CONTRACT 22.     Pursuant to the express terms of the Farmout Agreement, Joint Operating Agreement, and Participation and Purchase and Sale Agreement, [IP] was required to conduct its activities as a reasonably prudent operator, in a good and workmanlike manner, and with due diligence. [IP] breached these duties, and further, acted with gross negligence or with wilful misconduct.   23.     [IP] further breached its agreement with [the plaintiffs] by failing to drill and deepen the oil and gas well in question to the Contract Depth as defined in the Farmout Agreement, Joint Operating Agreement, and the Participation and Purchase and Sale Agreement. Specifically, with regard to the contract depth, [IP] as successor to the Cleveland Oil Company, had the duty to (1) prosecute the re-entry of the test well to its objective depth (as described in Exhibit “A” to the Participation and Purchase and Sale Agreement) with due diligence and in a good and workmanlike manner; and (2) accept responsibility for losses sustained by [the plaintiffs] resulting from [IP’s] gross negligence or from breach of its obligations under the Participation and Purchase Sale Agreement.   (Emphasis added.) Accordingly, the exculpatory clauses in the JOA applied, and the plaintiffs had to establish that IP was grossly negligent or acted with wilful misconduct when it breached the contract. See Cone, 68 S.W.3d at 155; Abraxas Petroleum Corp., 20 S.W.3d at 759. Standard of Review           In reviewing a legal sufficiency challenge, we must view the evidence in a light that tends to support the finding of the disputed fact and disregard all evidence and inferences to the contrary. Weirich v. Weirich, 833 S.W.2d 942, 945 (Tex. 1992). If more than a scintilla of evidence exists, the evidence is legally sufficient. Browning-Ferris, Inc. v. Reyna, 865 S.W.2d 925, 928 (Tex. 1993). To rise above a scintilla, the evidence offered to prove a vital fact must do more than create a mere surmise or suspicion of its existence. Kindred v. Con/Chem, Inc., 650 S.W.2d 61, 63 (Tex. 1983). In determining legal sufficiency, we consider whether the evidence rises to a level that would enable reasonable and fair-minded people to differ in their conclusions. Transp. Ins. Co. v. Moriel, 879 S.W.2d 10, 25 (Tex. 1994). Gross Negligence or Willful Misconduct           The jury affirmatively answered the following question: Did IP Petroleum Company, Inc.’s failure to drill to a depth sufficient to test the Lower Ellenburger Formation result from gross negligence or willful misconduct?   “Gross negligence or willful misconduct” means:   (a)a specific intent by IP Petroleum Company Inc. to cause substantial injury to Plaintiffs; or   (b) an act or omission by IP Petroleum Company, Inc.,   (i)which, when viewed objectively from the standpoint of IP Petroleum Company, Inc. at the time of its occurrence, involved an extreme degree of risk, considering the probability and magnitude of the potential harm to others; and   (ii)of which IP Petroleum Company, Inc. had actual, subjective awareness of the risk involved, but nevertheless proceeded with conscious indifference to the rights, safety, or welfare of others.   This was a significant finding because, under the JOA, for IP to be found liable, the jury had to have found that IP was grossly negligent or acted with willful misconduct.           To support a finding of gross negligence, there must be evidence that IP had “actual subjective knowledge of an extreme risk of serious harm.” Moriel, 879 S.W.2d at 22. The magnitude of the risk is judged from the viewpoint of the defendant at the time the events occurred. Id. at 23. The harm anticipated must be extraordinary harm, not the type of harm ordinarily associated with breaches of contract or even with bad faith denials of contract rights; harm such as “death, grievous physical injury, or financial ruin.” Id. at 24; Bluebonnet Sav. Bank, F.S.B. v. Grayridge Apartment Homes, Inc., 907 S.W.2d 904, 911 (Tex. App.—Houston [1st Dist.] 1995, writ denied).           Here, the plaintiffs, who were seeking monetary lost profits, summarize the evidence to support the jury’s finding of gross negligence as follows: IP apparently did not prepare a written drilling plan for the E-2, which is the normal procedure, and could not explain its failure to do so.   IP got stuck during the drilling operation because of its failure to use drilling mud and spent over $100,000 trying to get unstuck.   IP did not run a drill stem test on the E-2, which many witnesses testified would be the customary, reasonable and prudent thing to do and Wevanco’s witnesses testified would have shown that the well was not in the Lower Ellenburger.   IP failed to tell Cox and Wevanco it thought setting pipe would mean the E-2 could not be deepened if it were not productive.   IP told Cox and others that it was considering deepening the E-2 well when it had absolutely no intention of doing so.   IP allowed the farmout to expire while it was still operating, discovered that fact, and did not do anything about it, requiring Cox to obtain a second farmout to protect the investors’ rights in the E-2.   IP, against the advice of Cox, unsuccessfully attempted to set an inflatable bridge plug down hole.   IP obtained the P-4 on the well, which the jury could reasonably conclude was at best intended to hold up Wevanco over the issue of the unpaid drilling expenses and at worst a deliberate attempt to prevent Cox from deepening the E-2.             While this may be legally sufficient evidence of negligence, this evidence does not rise to the level of gross negligence as defined in the jury charge. Nor was there evidence of willful misconduct. “Throughout the history of Texas law, ‘wilful misconduct’ has been defined in a manner akin to ‘gross negligence.’” Marshall Indep. Sch. Dist. v. U.S. Gypsum Co., 790 F. Supp. 1291, 1300 (E.D. Tex. 1992). Thus, as the jury instruction indicated, a finding of willful misconduct required evidence of “a specific intent by IP Petroleum Company Inc. to cause substantial injury to Plaintiffs.” We hold that the evidence is legally insufficient to support the jury’s finding. We sustain issue four. JOA           In issue one, IP argues the plaintiffs’ claim for breach of the JOA was without merit as a matter of law. The JOA states that IP “shall have no liability as Operator to the other parties for losses sustained or liabilities incurred, except such as may result from gross negligence or willful misconduct.”           Having held there was no evidence of gross negligence or willful misconduct, we sustain IP’s issue one.           Because we have sustained IP’s issues one and four, which are dispositive of the plaintiffs’ claims that IP breached the JOA, we need not consider IP’s issues two, three, five, and six as those issues are moot. Participation Letter Agreement           In issue seven, IP contends that Texas law precludes any liability to the plaintiffs under the participation letter agreement.           The jury affirmatively answered the following question: Did IP Petroleum, Inc. fail to comply with the following agreement? Deepen the Phillips Petroleum Millard E #2 from its current TD of 8626' to +/- 9000' to test the Ellenburger Cave Floor Zone. . . . The well will be deepened from the depleted Ellenburger Cave Roof, through the dense Ellenburger Cave Fill interval, then test the objective, the Ellenburger Cave Floor.   The “agreement” from which the excerpt was taken was the participation letter agreement—a contract entered into between IP and Cleveland Oil. IP argues that, for two reasons, this was an improper question to submit to the jury: (1) the plaintiffs were not parties to the participation letter and cannot seek to enforce it, and (2) the participation letter agreement was superseded by the JOA.           The participation letter agreement was drafted by Cleveland Oil and signed by a land manager from IP. The plaintiffs contend that they signed essentially identical agreements with Cleveland Oil, but they were unable to produce any copies of the signed agreements at trial. They did, however, produce an unsigned copy which was admitted into evidence.           Generally, a plaintiff may not enforce a contract to which he is not a party. Stine v. Stewart, 80 S.W.3d 586, 589 (Tex. 2002). However, a third party may recover on a contract made between other parties only if the parties intended to secure a benefit to that third party, and only if the contracting parties entered into the contract directly for the third party’s benefit. Id. “The intention to contract or confer a direct benefit to a third party must be clearly and fully spelled out or enforcement by the third party must be denied.” MCI Telecomm. Corp. v. Texas Utils. Elec. Co., 995 S.W.2d 647, 651 (Tex. 1998). Any doubt is resolved against a finding that the party was intended to be a third-party beneficiary. Mandell v. Hamman Oil & Ref. Co., 822 S.W.2d 153, 161 (Tex. App.—Houston [1st Dist.] 1991, writ denied). To determine the parties’ intent, courts must examine the entire agreement when interpreting a contract and give effect to all the contract’s provisions so that none are rendered meaningless. Stine, 80 S.W.3d at 589.           Shortly after IP signed the participation letter agreement with Cleveland Oil, Richard Reeve, Cleveland Oil’s owner, sent IP a letter outlining the “burden clarification of the [Penwell] prospect (as described in that participation agreement dated 10/31/97 between The Cleveland Oil Company, L.L.C. . . . and IP. . . .).” In this letter, Reeve explains that “IP shall serve as Operator. IP will maintain the same spirit of operations as would Cleveland, where the Operator is operating for the benefit of all parties . . . .” Stephen Guidry, IP’s land manager, signed this burden clarification. We hold that this clarification indicates that the plaintiffs were third-party beneficiaries of the participation agreement between IP and Cleveland Oil.           IP argues that the participation agreement was superceded by the JOA because the two agreements contain inconsistent drilling obligations and gross negligence provisions.           Instruments pertaining to the same transaction may be read together to ascertain the parties’ intent, even if the parties executed the instruments at different times. Ft. Worth Indep. Sch. Dist. v. City of Ft. Worth, 22 S.W.3d 831, 840 (Tex. 2000). Only when the terms of one contract are so inconsistent with those of the other that the two cannot subsist together is there a presumption that the second superceded the first. Willeke v. Bailey, 189 S.W.2d 477, 479 (Tex. 1945).           We must examine the two agreements and their respective drilling obligations. Participation Letter Agreement JOA “Deepen the Phillips Petroleum Millard E #2 from its current TD of 8626' to +/- 9000' to test the Ellenburger Cave Floor Zone.” “[IP] shall thereafter continue the drilling of the well with due diligence to a depth of 9125' below the surface of the ground or a depth sufficient to test the Lower Ellenburger Formation, whichever is lesser . . . unless all parties agree to complete or abandon the well at a lesser depth.”   The participation letter agreement only addresses drilling to a depth necessary to test the Ellenburger Cave Floor Zone. The JOA, however, authorized IP to stop drilling at 9125' even if it believed it had not yet reached the Lower Ellenburger Formation. Furthermore, the JOA authorized IP to stop drilling at a lesser depth if all parties agreed to complete or abandon the well.           The letter agreement does not allow a consensual completion of the drilling at any point above the Ellenburger Cave Floor Zone. If the parties had signed the completion letters with the understanding that IP had not yet reached the Ellenburger Cave Floor Zone, IP would have been in violation of the participation letter agreement. As such, the two agreements contain mutually inconsistent terms.           We hold that the JOA superseded the participation letter agreement.           We sustain issue seven.           In issue eight, IP argues that, even under the participation letter agreement, it is not liable to the plaintiffs.           Having held that the JOA superseded the participation letter agreement, issue eight is moot. Damages           In issue nine, IP asserts that the plaintiffs failed to establish lost-profits damages with “reasonable certainty” where the lost profits damages were based on (1) a “wildcat” prospect drilled to test a new and unproven scientific theory and (2) seven additional hypothetical wells. In issue 10, IP contends that the trial court erred by awarding attorneys’ fees to the plaintiff. In issue 11, IP argues that the trial court erred by awarding prejudgment interest to the plaintiffs.           Having held that there was legally insufficient evidence to establish that IP breached the JOA, and having held that the JOA superceded the participation letter agreement, we hold that the plaintiffs are not entitled to damages, attorneys’ fees, or prejudgment interest.           We sustain issues 9, 10, and 11. Future Damages           In their sole point of error, the plaintiffs argue that the trial court erred when it refused to award prejudgment interest on the future damages awarded for lost profits.           Damages, in this case, are contingent on the breach of contract finding. We have held there was legally insufficient evidence to establish that IP breached its contract.           We overrule the plaintiffs’ sole point of error. Conclusion           We reverse the judgment of the trial court and render judgment that the plaintiffs take nothing. We affirm the remainder of the trial court’s judgment.                                                                               George C. Hanks, Jr.                                                                         Justice   Panel consists of Chief Justice Radack and Justices Nuchia and Hanks.          
Low
[ 0.527522935779816, 28.75, 25.75 ]
Q: CSS text justify with letter spacing Is there a way to automatically justify words using letter spacing, each in its row, to a defined width, using CSS? For example, "Something like this" would look, well, something like this: Is there a non-obtrusive way to apply such styling to my text? I believe pure CSS doesn't have this option (at least not with CSS versions before 3, CSS3 seems to have a text-justify property, but it's not well supported yet), so js solutions would be fine also. A: Here's a script which can do it. It isn't pretty, but maybe you can hack it to meet your needs. (Updated to handle resizing) function SplitText(node) { var text = node.nodeValue.replace(/^\s*|\s(?=\s)|\s*$/g, ""); for (var i = 0; i < text.length; i++) { var letter = document.createElement("span"); letter.style.display = "inline-block"; letter.style.position = "absolute"; letter.appendChild(document.createTextNode(text.charAt(i))); node.parentNode.insertBefore(letter, node); var positionRatio = i / (text.length - 1); var textWidth = letter.clientWidth; var indent = 100 * positionRatio; var offset = -textWidth * positionRatio; letter.style.left = indent + "%"; letter.style.marginLeft = offset + "px"; //console.log("Letter ", text[i], ", Index ", i, ", Width ", textWidth, ", Indent ", indent, ", Offset ", offset); } node.parentNode.removeChild(node); } function Justify() { var TEXT_NODE = 3; var elem = document.getElementById("character_justify"); elem = elem.firstChild; while (elem) { var nextElem = elem.nextSibling; if (elem.nodeType == TEXT_NODE) SplitText(elem); elem = nextElem; } } #character_justify { position: relative; width: 40%; border: 1px solid red; font-size: 32pt; margin: 0; padding: 0; } #character_justify * { margin: 0; padding: 0; border: none; } <body onload="Justify()"> <p id="character_justify"> Something<br/> Like <br/> This </p> </body> A: The css only solution is text-justify: distribute https://www.w3.org/TR/css-text-3/#text-justify but the support is still very poor. A small experiment using text-align-last: justify and adding spaces between letters. div{ display:inline-block; text-align: justify; text-align-last: justify; letter-spacing: -0.1em; } <div> S o m e t h i n g<br> l i k e<br> t h i s </div> A: I know this is an old topic, but I faced this the other night. And found a suitable solution using tables. Every letter shall be put into a <td> </td> I know it looks tedious, but if you wanna do this, it would be for a word or two, right? Or you always can use JS to fill it if is too much. However, this is only CSS and very versatile solution. Using letter-spacing the letters get distributed properly. You should play around with it, depending on the width of the table. #justify { width: 300px; letter-spacing: 0.5em; } <table id="justify"> <tbody> <tr> <td>J</td> <td>U</td> <td>S</td> <td>T</td> <td>I</td> <td>F</td> <td>Y</td> </tr> </tbody> </table> See the example here Crossbrowser safe, virtually nothing shall differ. Is just CSS. I used it in My website which is in english and spanish. the subtitle under my name in spanish has an additional letter and it will step out the width. Using the tables explained above, it gets distributed to the same width automatically. Spacing it manually I'd had to define a whole condition for each language to go around that.
Mid
[ 0.541044776119402, 18.125, 15.375 ]
Q: PHP form MySql EDIT / UPDATE - Can't get form to populate with data I'm very new to PHP and MySQL. I've created a form which creates rows in my MySQL tables, I created a page that shows all those entries. Now I'm trying to edit those entries. I created another form that should populate with info from the selected row..the only problem is that it's not. Here's all my code including login.php...just in case. Please let me . I've looked everywhere for an answer and couldn't find one. All I found was mysql and not mysqli. <?php //login.php $db_hostname = 'localhost'; $db_database = 'mydata'; $db_username = 'user'; $db_password = '123#'; // Connect to server. $link = mysqli_connect($db_hostname, $db_username, $db_password); if (!$link) { die('Not connected : ' . mysqli_error()); } // Select the database. $db_selected = mysqli_select_db($link, $db_database); if (!$db_selected) { die ('Can\'t use database : ' . mysqli_error()); } ?> edit_client.php <?php $title = "Edit Client Form"; ?> <!DOCTYPE html> <html> <head> <title><?php echo $title ?></title> </head> <body> <div> <!-- form container div --> <form action="" method="post"> <div> <!-- form description div --> <h2><?php echo $title ?></h2> <p>Edit a client here.</p> </div> <?php require_once = 'login.php'; // get value of id that sent from address bar $id=$_GET['id']; if(isset($id)) { $sql="SELECT * FROM `clients` WHERE client_id='$id'"; $result=mysqli_query($sql); $row=mysqli_fetch_assoc($result); ?> <input type="hidden" name="id" value="<?php echo $row['client_id']; ?>"> <input type="text" name="first_name" value="<?php echo $row['first_name']; ?>" required><br /> <input type="text"name="last_name" value="<?php echo $row['last_name']; ?>" required><br /> <input type="text"name="company_name" value="<?php echo $row['company_name']; ?>" ><br /> <input type="text" name="address" value="<?php echo $row['address']; ?>"><br /> <input type="text" name="city" value="<?php echo $row['city']; ?>" required><br /> <input type="text" name="state" value="<?php echo $row['state']; ?>" required><br /> <input type="number" name="zip_code" value="<?php echo $row['zip_code']; ?>" required><br /> <input type="tel" name="tel_number" value="<?php echo $row['tel_number']; ?>" required><br /> <input type="email" name="email" value="<?php echo $row['email']; ?>" required><br /> <input value="Submit" type="submit"> </form> </div> </body> </html> here's the table from "display_client" that sends the ID to the edit_form.php page <td align="left">' . '<a href="\edit_client.php?id=' . $row['client_id'] . '/">Edit</td> any pointers in the right direction would be much appreciated. thank you. As suggested below I have used PDO Prepared statements to achieve my desired result. Thank you thank you! @nomistic ! <?php $title = "Edit Client Form"; ?> <!DOCTYPE html> <html> <head> <title><?php echo $title ?></title> </head> <body> <div> <!-- form container div --> <form action="update_client_submit.php" method="post"> <div> <!-- form description div --> <h2><?php echo $title ?></h2> <p>Edit a client here.</p> </div> <?php require_once 'login.php'; if(!empty($_GET['id'])){ $client_id = intval($_GET['id']); } try { $results = $db -> prepare('SELECT * FROM clients WHERE client_id = ?'); $results -> bindParam(1, $client_id); $results -> execute(); } catch(Exception $e) { echo $e -> getMessage(); die(); } $row = $results -> fetch(PDO::FETCH_ASSOC); ?> <input type="hidden" name="client_id" value="<?php echo $row['client_id']; ?>"> <input type="text" name="first_name" value="<?php echo $row['first_name']; ?>" required><br /> <input type="text" name="last_name" value="<?php echo $row['last_name']; ?>" required><br /> <input type="text" name="company_name" value="<?php echo $row['company_name']; ?>" required><br /> <input type="text" name="address" value="<?php echo $row['address']; ?>" required><br /> <input type="text" name="city" value="<?php echo $row['city'] ?>" ><br /> <input type="text" name="state" value="<?php echo $row['state'] ?>" required><br /> <input type="text" name="zip_code" value="<?php echo $row['zip_code']; ?>" required><br /> <input type="text" name="tel_number" value="<?php echo $row['tel_number']; ?>" required><br /> <input type="text" name="email" value="<?php echo $row['email']; ?>" required><br /> <input type="submit" name="sumbit"> </form> </body> </html> A: Edit, reducing this and correcting a potential problem in you query. you need a loop to get the data. It should be have something like this (using your data) $id=$_GET['id']; if(isset($id)) { $sql="SELECT * FROM clients WHERE client_id=$id"; $result=mysqli_query($sql); $row=mysqli_fetch_assoc($result); while($row=mysqli_fetch_assoc($result)) { echo '<input type="hidden" name="id" value="'.$row['client_id']. '">'; } Note: You may want to look into using prepared statements; they are pretty easy to learn, especially at this stage, and you will have a lot of advantages, such as not having to worry about whether you are quoting int and varchar variables in your query; you'd declare them separately. They are also MUCH more secure (preventing SQL injection) and can make large queries run faster. You would just need to switch to object oriented style. (note, listing your variables in your select is what you should be doing anyway rather than select from *). The select is shortened a little for ease of explanation. Here's an example of how yours would work with mysqli: This is your database connection (not much different, just slightly different syntax) $db_selected = new mysqli($db_hostname, $db_username, $db_password, $db_database) if ($db_selected->connect_error) { die("Connection failed: " . $dbc->connect_error); } Here are your queries. bind_param just identifies the item as an INT and then replaces the ? in the query with the variable $id, and bind_result takes the results of your query and turns them into variables. The rest is fairly self-explanatory $sql = $db_selected->prepare("SELECT client_id, first_name, last_name FROM clients WHERE client_id= ? "); $sql->bind_param("i", $id); $sql->execute(); $sql->store_result(); $sql->bind_result($client_id, $first_name,$last_name); while ($sql->fetch()) { echo '<input type="hidden" name="id" value="'.$client_id. '">'; echo '<input type="text" name="first_name" value="'.$first_name. '" required><br />'; echo '<input type="text" name="last_name" value="'. $last_name. '" required><br />'; } $sql->free_result(); $sql->close(); If you need some more information, here are some resources: mysqli prepared statements
Mid
[ 0.5939393939393941, 24.5, 16.75 ]
Q: Android dialog, removing the thin grey border (~2px) sorrounding dialog I need a way to remove that 2px grey border added by Android to the view content of a dialog. I've tried most of the solution marked as OK on this site. Desired final result is presented in the last image (a dialog showing just my view, without any additional UI elements added by android) This is current code: AlertDialog.Builder builder = new Builder(this); builder.setView(dialogContent); //a view inflated from xml ... chooseActionDialog = builder.create(); ... chooseActionDialog.setView(dialogContent, 0, 0, 0, 0); //this removed the padding between grey border & actual content.. this is why i set view twice chooseActionDialog.show(); ... Drawable d = new ColorDrawable(Color.TRANSPARENT); chooseActionDialog.getWindow().setBackgroundDrawable(d); //this seems to change color of padding area (between grey border & actual content) Note: the Builder contructor with 2 params (context, themeId) doenst work as expected (still have border & dialog gets streched ugly) A: Create ur own style in your style.xml in values folder like below <style name="Theme.Trans" parent="android:Theme.Translucent"> <item name="android:windowFrame">@null</item> <item name="android:windowBackground">@android:color/transparent</item> <item name="android:windowIsFloating">true</item> <item name="android:windowContentOverlay">@null</item> <item name="android:windowTitleStyle">@null</item> <item name="android:windowAnimationStyle">@android:style/Animation.Dialog</item> <item name="android:windowSoftInputMode">stateUnspecified|adjustPan</item> <item name="android:backgroundDimEnabled">false</item> <item name="android:background">@android:color/transparent</item> </style> apply this style to your dialog final Dialog dialog = new Dialog(UrActivity.this, R.style.Theme_Trans);
High
[ 0.7164634146341461, 29.375, 11.625 ]
Prognostic significance of neuroepithelial transforming gene 1 in adenocarcinoma of the oesophagogastric junction. Neuroepithelial transforming gene 1 (NET1) mediates tumour invasion and metastasis in a number of cancers, including gastric adenocarcinoma. It is an indicator of poor prognosis in breast cancer and glioma. This study examined NET1 expression and its prognostic significance in patients with adenocarcinoma of the oesophagogastric junction (AOG). NET1 expression was measured by immunohistochemistry in a tissue microarray, constructed from biobanked tissue collected over a 10-year interval, and linked to a prospectively maintained clinical database. Using the Siewert classification for AOG, type I tumours expressed significantly higher levels of NET1, with lowest expression in type III and intermediate levels in type II (P = 0.001). In patients with AOG type III, NET1-positive patients were more likely to be female (P = 0.043), have advanced stage cancer (P = 0.035), had a higher number of transmural cancers (P = 0.006) and had a significantly higher median number of positive lymph nodes (P = 0.029). In this subgroup, NET1-positive patients had worse median overall (15 versus 23 months; P = 0·025) and disease-free (11 versus 36 per cent; P = 0.025) survival compared with NET1-negative patients. Although existing data show differences in clinical and prognostic indices across AOG subtypes, there are no studies showing differences in tumour biology. These data suggest NET1, a known mediator of an aggressive tumour phenotype in a number of gastrointestinal cancers, is expressed differentially across AOG subtypes and may be of prognostic significance in the clinical management of this condition.
High
[ 0.725373134328358, 30.375, 11.5 ]
import {Widget} from "@phosphor/widgets"; import {deleteAllChildren} from "../dom/common"; import {buildHorizontalTable} from "../dom/horizontalTable"; /** * Helper function to create status monitor table * @param sec PhosphorWidget of the item we are monitoring status of * @param clazz class of the widget * @param data JSON data to populate the horizontal table */ export function createStatusSection(sec: Widget, clazz: string, data: any): void { const table = buildHorizontalTable(data); deleteAllChildren(sec.node); sec.node.appendChild(table); }
Low
[ 0.5239005736137661, 34.25, 31.125 ]
1. Introduction {#sec1} =============== Globally approximately 34 million people were living with HIV in 2011 \[[@B1], [@B2]\]. Still, there were about 2.2 million new infections \[[@B3]\]. Since the beginning of the epidemic nearly 30 million people have died of AIDS (Acquired Immunodeficiency Syndrome) related causes \[[@B1], [@B2], [@B4]\]. About 22.9 million which is 67% of those living with HIV/AIDS globally are in Africa though only about 12% of the world\'s population lives in the region \[[@B2]\]. In terms of mortality, the region represents about 79% of AIDS mortality globally \[[@B5]\]. According to 2011 Ethiopian demographic health survey the overall national adult HIV prevalence is 1.5%. The survey showed the HIV prevalence was 2.2% in Amhara region which is found in North West Ethiopia \[[@B6]\]. Human Immunodeficiency Virus (HIV) infection leads to acquired immunodeficiency syndrome (AIDS) and major causes of morbidity and mortality of such patients are OIs \[[@B7]\]. OIs can occur in up to 40% of PLWHA with a CD4 count less than 250 cells/mm^3^ \[[@B8]\]. A national study in Ethiopia showed HIV patients\' had OIs like Herpes Zoster scar (19.3%), pulmonary tuberculosis (5.2%), and pneumonia (5.2%) \[[@B9]\]. The respective prevalence of OIs in pre-ART HIV patients\' in two studies in Northwest Ethiopia was 88.9% \[[@B10]\] and 82.4% \[[@B11]\]. The problem of HV and OIs is still high in the study area though there is no prior local evidence in the study area thus the current study would give the duration of staying free from acquiring rehappening opportunistic infections after its treatment and its determinant factors. The output of the study will be used to plan resources needed for chronic HIV/AIDS care and to know groups of PLWHA given especial attention during care. The evidence is expected to be used by governmental and nongovernmental organizations working on HIV/AIDS or mainstreaming it in order to inform policy makers and medical practitioners. 2. Methods and Materials {#sec2} ======================== 2.1. Study Setting and Source Population {#sec2.1} ---------------------------------------- The study was conducted in Debre Markos town public health institutions among adult Pre-ART PLWHA included to chronic HIV care between 25 March 2008 and 24 March 2013. Debre Markos town is found 299 kilometer away from Addis Ababa (a capital city of Ethiopia) and it has one referral hospital, three public health centers, two NGO clinics, and ten other private clinics and though only the referral hospital and one health center providing chronic HIV care for the HIV/AIDS patients. Thus we conduct a study using retrospective cohort study design on health institutions providing chronic HIV care in the town. The source populations were all adult with age above 17 years PLWHA who had chronic HIV care in the town public health institutions. PLWHA who were having incompletely documented follow up format; not developing OI while registered on HIV chronic care; not taking standard treatment after developing OI according to the Ethiopian Ministry of Health guideline; and pre-ART pregnant or lactating mothers who were taking zidovidine for prevention of mother to child transmission of HIV/AIDS were excluded from the study. 2.2. Sampling and Data Collection Procedure {#sec2.2} ------------------------------------------- The sample size was calculated based on the two-sided 95% confidence interval and 3.5% margin of error and by using the proportion of pre-ART HIV patients\' having OI in Northwest Ethiopia study, which was 88.9% \[[@B10]\]. The calculated sample size using Open-Epi Version 2.3 May 2009 was 310 then after adding 10% contingency the final was 341. About 2712 PLWHA who fulfill the inclusion criteria were requited from the already available list of PLWHA who were on chronic HIV care in ART clinics. And then selection of participants was made by applying simple random sampling procedure using random number table. The needed data is available on study participants\' treatment card and chronic HIV care follow-up form which it is found in the ART clinic but rarely they may seek treatment out-off their follow-up clinic. Thus in order to reduce falsely survival increment, study participants were asked by data collectors about treatment history out of the follow-up health institution and for those doing it, the treatment was checked and abstracted in the respective health institutions. Seeking treatment out of the follow-up health institution was asked when PLWHA come to health institution for follow-up or treatment or by using registered address on follow-up form like phone number or kebele, house number which was used to get to them. Data collection instrument was developed from federal ministry of health chronic HIV care follow-up form which is used in the ART clinic and also the patient\'s card. The data was collected by reviewing chronic HIV care follow-up form and patients\' card. Among a serious of laboratory measurements (like CD4 count, hemoglobin value, height, and weight) the most nearest to the study period were taken as baseline characteristics. And among the serious measurements performed on PLWHA while she/he is included on the study, the nearest to the OI recurrence or censored was taken as the end line or follow-up values. Approval of OI free duration was done by reviewing chronic HIV care follow-up form or patient card in ART clinic or out of ART clinic if study participants seek treatment out of ART clinic. Study participants who start ART/drop-out/loss follow-up/transferred out/dead by any disease other than OI/cause of death not confirmed while on study or not developing OI at end of the study period were censored. A selected and trained health professionals working in ART clinics in each health institution were used as data collectors and supervisors. 2.3. Operational Definition {#sec2.3} --------------------------- *Survival*. Duration of free of OI rehappening. *Censored*. Nonrelapse of OI in study participant during follow-up on study, but future relapse is uncertain. Recurrence/rehappen/relapse: happening or diagnosis of any type of OIs by health personals working in ART clinic after completing the preceding treatment of any type of OI. *Drop Out*. If a PLWHA on HIV care lost to follow-up for more than three months as recorded by ART health personnel. *Lost to Follow-Up*. If PLWHA on HIV care not seen for equal to or more than one month as recorded by ART health personnel. *Transferred out.* If PLWHA on HIV care in one health institution shift to other health institution. *Good Adherence*. If PLWHA adherent ≥95% that is the percentage of missed dose is \<2 doses of 30 doses or \<3 dose of 60 dose as documented by ART health personnel. *Fair Adherence*. If PLHIV adherent 85--94% that is the percentage of missed dose is 3--5 doses of 30 doses or 3--9 dose of 60 dose as documented by ART health personnel. *Poor Adherence*. If PLHIV adherent \<85% that is the percentage of missed dose is ≥6 doses of 30 doses or \>9 dose of 60 dose as documented by ART health personnel. 2.4. Data Quality Management and Statistical Analysis {#sec2.4} ----------------------------------------------------- To maintain data quality training was given for data collectors and for supervisors. Properly designed data collection material was developed from Ethiopian federal ministry of health chronic HIV care follow-up form and patients\' card. To check correct data collection 10% of the sample was reabstracted by supervisors. The data were double entered by trained data clerk to check correct data entry. After completing data entry, outliers and any missed values were checked using frequency, listing, and sorting and any identified error at any step was corrected by revising the original data abstraction format. After coding each abstraction format, data was entered in to Epi Info version 3.5.1 statistical package. Analysis of data was done using Open-Epi Version 2.3 May 2009, SPSS version 20, and STATA version 11 statistical packages. Incidence rate was calculated by dividing total events to person-weeks. OI free duration was estimated using the actuarial life table and Kaplan Meier survival. Assumption of proportional-hazard was checked by Schoenfeld residual with *P* value ≥0.1 (*α* = 10%) and the assumption was not violated. Multicollinearity was checked using Pearson correlation, tolerance/variance inflation factor and there was no colinearity To determine independent predictors of OI free duration cox proportional-hazard model was used to calculate the hazard rate. Variables having *P* value \<0.05 at bivariate analysis and not collinear were entered in multivariate cox proportional hazard model to determine the adjusted hazard rate. The cut-off point for significant association was *P* value 0.05. 2.5. Ethical Consideration {#sec2.5} -------------------------- Ethical approval and clearance was given by School of Public Health Addis Ababa University ethical committee. Permission was also obtained from the concerned bodies of East Gojam zone and Debre Markos town Health Department and the responsible bodies of hospital and health centers. To maintain confidentiality of PLWHA, health professionals working in ART clinic were abstracting the data. In addition no personal identifier was extracted on medical records and the recorded data was not accessed by a third person. 3. Result {#sec3} ========= In the five year study period among 341 study participants, the median duration of follow-up was 41 weeks (95% CI: 37--47.97) and the minimum, maximum, and interquartile range of follow-up was 1, 234, 50 weeks, respectively. Among the study participants majority of them were females 234 (68.6%), orthodox Christian 316 (92.7%), living in urban 229 (67.2%), not educated 153 (44.9%), married 130 (38.1%), and not employed in governmental or private organizations 291 (85.3%). Their mean age was 33.3 (±10.6) years, in which almost all of them were below 50 years old 318 (93.3%) ([Table 3](#tab3){ref-type="table"}). 3.1. The Baseline and Follow-Up Laboratory, Clinical and Prophylaxis Characteristics {#sec3.1} ------------------------------------------------------------------------------------ At base line, the median values for CD4 count (cells/uL) and hemoglobin value (g/dL) were 383 and 11.6, respectively and the respective end line values were 382.5 and 12.5. The base line and end line body mass index mean values were 19.1 (±3.1) and 19.7 (±3.1) kilogram per meter square units, respectively. At start of the study, majority of participants were having WHO stage II OI 165 (48.4%). About 11 (3.2%) participants were having concomitant chronic diseases like hypertension, cardiac disease, and diabetes mellitus. With regard to functional status, almost all of them were working both at base line 83 (83%) and at end line 297 (87.1%) ([Table 3](#tab3){ref-type="table"}). About three quarters of participants were taking prophylaxis both at base line 244 (71.6%) and at follow-up 255 (74.8%) and almost all of them were having good drug adherence both at base line 225 (92.2%) and at follow-up 231 (90.6%) in which nearly all of them were taking cotrimoxazole both at base line 225 (92.2%) and at follow-up 243 (95.3%) ([Table 3](#tab3){ref-type="table"}). 3.2. Incidence of Recurrence and OI Free Duration {#sec3.2} ------------------------------------------------- The cumulative incidence of OI recurrence was 75.37% (95 CI: 70.6--79.7%) and incidence rate was 15.04 (95 CI: 13.1--16.97%) per 1000 person weeks. Of recurrence OIs, about 12.8% (95 CI: 9.16--17.36%) were self-relapsed and incidence rate of self-relapse was 1.93 (95 CI: 1.35--2.68%) per 1000 person weeks. The most rediagnosed OI was recurrent upper respiratory tract infection 44 (17.1%) whereas chronic diarrhea was most self-relapsed OI (23.7%) ([Table 1](#tab1){ref-type="table"}). According to the Kaplan-Meier survival estimation, the median duration of not acquiring OI recurrence was 54 weeks (95% CI: 46.9--61.1) ([Figure 1](#fig1){ref-type="fig"}). Among participants, those employed were more surviving than unemployed ([Figure 2](#fig2){ref-type="fig"}). As the actuarial life table analysis showed about 91% participants were not acquiring OI at end of 10 weeks and the probability of free of OI recurrence at end of 220 and 230 weeks was about 1% and \<0.01%, respectively ([Table 2](#tab2){ref-type="table"}). In bivariate cox proportional hazard model, the predictor variables that showed significant (*P* \< 0.05) association with the outcome variable were marital status, occupational status, educational status, the base line and follow-up functional status, having exposure for prophylaxis at baseline and adhering to it both at baseline and at follow up, baseline hemoglobin value, follow-up CD4 count, follow-up body mass index, number of OIs diagnosed at one time at start of the study, and being diagnosed wasting syndrome and Herpes Zoster at start of study ([Table 3](#tab3){ref-type="table"}). After adjustment for potential confounders in multivariate cox proportional hazard model, the significant (*P* \< 0.05) predictors preventing repeated diagnosing of OI rediagnosis were being employed in governmental or private sectors, divorced than married, taking prophylaxis at baseline, having a follow-up CD4 count above 100 cells/*μ*L, and having hemoglobin value of 10 g/dl and above, whereas not adhering to prophylaxis both at base line and at follow-up was the risk factors for short time rediagnosing of OIs ([Table 3](#tab3){ref-type="table"}). 4. Discussion {#sec4} ============= In the five-year study period, the cumulative incidence of OI recurrence was seen in about three quarters (75.37%) of participants. Different studies have diverse figures with regard to the proportion of OI. In North India, tuberculosis was the commonest OI (71%) followed by candidiasis (39.3%),*PCP* (7.4%), cryptococcal meningitis, and cerebral toxoplasmosis (3.7% each) \[[@B12]\]. In the same country of southern India, proportion of pulmonary tuberculosis was (14%) \[[@B13]\]. A national study in Ethiopia showed HIV patients\' had OIs like Herpes Zoster scar (19.3%), pulmonary tuberculosis (5.2%), and pneumonia (5.2%) \[[@B9]\]. In Northwest Ethiopia, about 88.9% pre-ART HIV patients had OIs \[[@B10]\]. Another study in similar area also showed that 82.4% pre-ART HIV patients have OIs \[[@B11]\]. The respective prevalence of pulmonary tuberculosis and cryptococcal meningitis among PLWHA in North West Ethiopia was about 7.5% \[[@B14]\] and 8.3% \[[@B15]\]. In about a quarter (22.7%) of PLWHA, chronic diarrhea was seen in Southern Ethiopia \[[@B16]\]. The cumulative incidence of recurrent OIs like recurrent upper respiratory tract infection, chronic diarrhea, bacterial pneumonia, oral candidiasis, herpes zoster, extra pulmonary tuberculosis, PCP, and pulmonary tuberculosis in current study was 17.1%, 14.8%, 9.8%, 9.8%, 9.3%, 9.3%, and 7%, 5.4%, respectively, and this finding is relatively in line with some figures of OIs in the studies \[[@B9], [@B10], [@B12]--[@B14]\] though it is lower than some other studies \[[@B11], [@B15], [@B16]\]. The possible reasons for discrepancy would be different in study design (the prior ones that are cross-sectional), study population (prior ones using PLWHA when coming to initiate ART which will increase the prevalence since ART is initiated using WHO stage of disease and CD4 count), study area, and other sociocultural practices. In this study, chronic diarrhea was most self-relapsed OI (23.7%) and this might be attributed by not using improved drinking water source and sanitation facility since only 50.8% and 8.8% of Ethiopians were using improved drinking water source and sanitation facility according to 2011 Ethiopian demographic health survey \[[@B6]\]. The current finding of being employed in governmental or private sectors as increasing duration of frequent vising of health institutions due to illness of rehappened OIs was in harmony with a cohort study in United States \[[@B17]\]. The current study that comes up as having a follow-up CD4 count above 100 cells/*μ*L compared to ≤100 cells/*μ*L was preventing repeated diagnosing of OI recurrence and this is in agreement with other studies \[[@B18]--[@B22]\]. The HIV cohort study in Switzerland showed that CD4 count is one of the predictor for OI progression; a rise in CD4 count by 50 × 10^6^/L or more by 6 months reduced subsequent OIs with hazard ratio of 0.32 \[[@B19]\]. Another cohort study also showed that higher CD4 cell count was associated with a reduction of risk of new OI progression and with a hazard ratio compared to 100 cells/mL of 0.35 for counts 200 cells/mL, 0.81 for counts 200 to 350 cells/mL, 0.74 for counts 350 to 500 cells/mL, and 0.96 for counts 500 cells/mL or above \[[@B22]\]. In this study, taking prophylaxis at baseline was enhancing duration of frequent diagnosis of recurrent OI and the finding was supported by other studies \[[@B23]--[@B26]\]. Primary prophylaxis with trimethoprim-sulfamethoxazole is preventing life-threatening OIs like PCP, toxoplasmosis, and bacterial infections \[[@B23]\]. Taking cotrimoxazole reduces the risk of PCP and tuberculosis \[[@B24]\]. Taking cotrimoxazole prophylaxis was preventing OIs like diarrhea in an experimental study in Ugandan PLHIV adults \[[@B25]\]. The evidence of preventing OIs like PCP using Cotrimoxazole was also assured in an experimental study \[[@B26]\]. 5. Conclusion and Recommendation {#sec5} ================================ During the historical follow-up period, OIs were rediagnosed in about three quarters (75.37%) of participants. Of rediagnosed OIS, nearly one every ten rediagnosis was self-relapsed (12.8%). In each week the probability of getting new recurrence of any type OI and self-relapse OI was about 15.04 and 1.93 per 1000 person weeks, respectively. Commonly rehappening OIs were recurrent upper respiratory tract infection (17.1%), chronic diarrhea (14.8%), bacterial pneumonia (9.8%), oral candidiasis (9.8%), Herpes Zoster (9.3%), and extra pulmonary tuberculosis (9.3%). According to the Kaplan-Meier survival estimation, the median duration of not acquiring OI recurrence was 54 weeks. After adjustment for potential confounders in multivariate cox proportional hazard model, the significant (*P* \< 0.05) predictors preventing repeated diagnosing of OI recurrence were being employed in governmental or private sectors, divorced than married, taking prophylaxis at baseline, having a follow-up CD4 count above 100 cells/*μ*L and having hemoglobin value of 10 g/dL and above, whereas not adhering to prophylaxis both at base line and at follow-up was the risk factors for frequent diagnosing of OI recurrence. 5.1. Based on This Study Finding, the Following Recommendations Can Be Forwarded {#sec5.1} -------------------------------------------------------------------------------- Providing prophylaxis and counseling to adhere to it should be further enhanced.Treatment and other sportive measures should be given to enhance the CD4 count and hemoglobin value.During giving of HIV chronic care especial attention should be given for those not adhering to prophylaxis drug since they have OI recurrence in short periods.Governmental or nongovernmental organizations should give especial criteria that support PLWHA to win in computation of job at vacancies since being employed reduces duration repeated rediagnosing of OI.Finally we recommend further observational studies with prospective design to ascertain the current findings. The authors would like thank Professor Mitkie Getnet, Dr. Worku Alemayehu, and Dr. Enquselassie Fikre, Addis Ababa University, Debre Markos town health managers, ART clinic staffs, for their contribution in the success of the work. Conflict of Interests ===================== The authors declare that there is no conflict of interests regarding the publication of this paper. ![Kaplan-Meier survival estimation of progressing to OI rediagnosing among pre-ART PLWHA in Debre Markos town between 2008 and 2013.](BMRI2015-146306.001){#fig1} ![Kaplan-Meier survival estimation of progressing to acquiring OI recurrence among employed and unemployed pre-ART PLWHA in Debre Markos town between 2008 and 2013.](BMRI2015-146306.002){#fig2} ###### The rediagnosed OIs of any type and self-relapse among participants\' in Debre Markos town between 2008 and 2013. Rediagnosed OI Frequency of overall rediagnosis (%) Self-relapse --------------------------------------------- -------------------------------------- -------------- ------------ Recurrent upper respiratory tract infection 44 (17.1) 9 (20.5) 35 (79.5) Chronic diarrhea 38 (14.8) 9 (23.7) 29 (76.3) Oral candidacies 25 (9.7) 1 (4) 24 (96) Pneumonia 25 (9.7) 4 (16) 21 (84) Herpes Zoster 24 (9.3) 3 (12.5) 21 (87.5) Extra pulmonary tuberculosis 24 (9.3) 1 (4.2) 23 (95.8) Minor mucocutanous manifestation 15 (5.8) 2 (13.3) 13 (86.7) Wasting syndrome 9 (3.5) 2 (22.2) 7 (77.8) Persistent generalized lymphadenopathy 8 (3.1) 1 (12.5) 7 (87.5) Viral infection 6 (2.3) 1 (16.7) 5 (83.3) Others 39 (15.2) 0 39 (100) Total 257 (100) 33 (12.8) 224 (87.2) ###### The actuarial life table estimation of participants\' duration of diagnosing of rehappening OI in Debre Markos town between 2008 and 2013. Interval start time Number entering interval Number withdrawing during interval Number exposed to risk Number of OIs diagnosed at interval Cumulative proportion surviving at end of interval Hazard rate --------------------- -------------------------- ------------------------------------ ------------------------ ------------------------------------- ---------------------------------------------------- ------------- 0 341 7 337.5 32 0.91 0.01 10 302 11 296.5 41 0.78 0.01 20 250 9 245.5 31 0.68 0.01 30 210 11 204.5 20 0.61 0.01 40 179 11 173.5 18 0.55 0.01 50 150 10 145.0 21 0.47 0.02 60 119 8 115.0 31 0.34 0.03 70 80 7 76.5 18 0.26 0.03 80 55 1 54.5 15 0.19 0.03 90 39 2 38.0 2 0.18 0.01 100 35 1 34.5 8 0.14 0.03 110 26 1 25.5 2 0.13 0.01 120 23 2 22.0 0 0.13 0.00 130 21 0 21.0 3 0.11 0.02 140 18 1 17.5 4 0.08 0.03 150 13 0 13.0 2 0.07 0.02 160 11 0 11.0 4 0.05 0.04 170 7 1 6.5 0 0.05 0.00 180 6 0 6.0 1 0.04 0.02 190 5 0 5.0 0 0.04 0.00 200 5 1 4.5 1 0.03 0.02 210 3 0 3.0 0 0.03 0.00 220 3 0 3.0 2 0.01 0.10 230 1 0 1.0 1 0.00 0.20 ###### The cumulative incidence of diagnosing OI, Kaplan Meier estimation of median duration of not acquiring OI recurrence and cox proportional hazard model of the association between characteristics and OI recurrence among PLWHA in Debre Markos town between 2007 and 2013. Variables Diagnosis of recurrence OI Median KMS CHR (95% CI) AHR (95% CI) ------------------------------------ ---------------------------- ------------ -------------- -------------------- -------------------------- Marital status            Married 101 (39.3) 29 (34.5) 60 1 1  Single 68 (26.5) 11 (13.1) 46 1.65 (1.21--2.26) 1.19 (0.72--1.96)  Divorced 60 (23.3) 32 (38.1) 64 1.02 (0.74--1.41) ***0.57 (0.33--0.99)***  Widowed 28 (10.9) 12 (14.3) 42 1.69 (1.10--2.59) 1.64 (0.79--3.40) Educational status            Not educated 110 (42.8) 43 (51.2) 55 1 1  Grades 1--8 82 (31.9) 16 (19) 41 1.06 (0.79--1.41) 1.17 (0.70--1.94)  Grades 9--12 44 (17.1) 14 (16.7) 55 0.84 (0.59--1.19) 1.38 (0.71--2.68)  Above grade 12 21 (8.2) 11 (13.1) 67 0.49 (0.30--0.80) 1.55 (0.69--3.47) Occupational status            Unemployed 221 (86) 70 (83.3) 53 1 1  Employed 36 (14) 14 (16.7) 76 0.48 (0.33--0.69) ***0.34 (0.16--0.71)*** Functional status^B.^            Working 206 (80.2) 77 (91.7) 60 1 1  Ambulatory/bed-ridden 51 (19.8) 7 (8.3) 32 1.7 (1.25--2.32) 1.59 (0.81--3.12) Functional status^F.^            Working 215 (83.7) 82 (97.6) 60 1 1  Ambulatory/bed-ridden 42 (16.3) 2 (2.4) 37 1.65 (1.17--2.31) 0.97 (0.52--1.81) Number of OIs treated at base line            1 203 (79) 62 (73.8) 59 1 1  ≥2 54 (21) 22 (26.2) 44 1.38 (1.01--1.87) 1.19 (0.69--2.07) Prophylaxis adherence^B.^            Good 170 (91.4) 55 (94.8) 64 1 1  Fair 6 (3.2) 0 (0) 43 2.69 (1.19--6.13) ***14.92 (1.03--215)***  Poor 10 (5.4) 3 (5.2) 23 1.76 (0.92--3.35) ***5.96 (1.21--29.41)*** Prophylaxis adherence^F.^            Good 173 (88.3) 58 (98.3) 64 1 1  Fair 9 (4.6) 0 (0) 55 1.06 (0.54--2.08) ***5.39 (1.77--16.36)***  Poor 14 (7.1) 1 (1.7) 22 2.2 (1.27--3.82) ***5.79 (1.86--17.98)*** Prophylaxis exposure^B.^            No 71 (27.6) 26 (31) 37 1 1  Yes 186 (72.4) 58 (69) 63 0.64 (0.49--0.85) ***0.31 (0.19--0.49)*** CD4 count (cells/*μ*L)^F.^            ≤100 4 (2.2) 1 (1.4) 17 1 1  101--199 19 (10.6) 3 (4.2) 60 0.19 (0.06--0.58) ***0.12 (0.029--0.49)***  200--350 50 (27.8) 27 (37.5) 69 0.14 (0.048--0.39) ***0.21 (0.057--0.79)***  351--499 58 (32.2) 24 (33.3) 66 0.17 (0.058--0.47) ***0.16 (0.045--0.59)***  ≥500 49 (27.2) 17 (23.6) 70 0.13 (0.046--0.38) ***0.17 (0.46--0.62)*** Hemoglobin value (g/dL)^B.^            \<10 61 (31.1) 5 (16.7) 26 1 1  ≥10 135 (68.9) 25 (83.3) 53 0.55 (0.40--0.75) ***0.49 (0.25--0.97)*** Body mass index (kg/m^2^)^F.^            ≤18.4 122 (47.7) 36 (42.9) 46 1 1  18.5--22.9 103 (40.2) 35 (41.7) 54 0.93 (0.71--1.21) 0.89 (0.54--1.46)  ≥23 31 (12.1) 13 (15.5) 69 0.54 (0.37--0.79) 0.61 (0.33--1.14) Herpes Zoster diagnosis^B.^            No 202 (78.6) 73 (86.9) 55 1 1  Yes 55 (21.4) 11 (13.1) 48 1.38 (1.02--1.86) 1.18 (0.65--2.13) Wasting syndrome diagnosis^B.^            No 247 (96.1) 84 (100) 55 1 1  Yes 10 (3.9) 0 (0) 23 2.39 (1.21--4.34) 1.29 (0.36--4.71) ^B^Base line value. ^F^Follow-up value. KMS: Kaplan Meier survival in weeks. CHR: crude hazard rate. AHR: Adjusted hazard rate. [^1]: Academic Editor: Domingo Pere
Mid
[ 0.5390625, 34.5, 29.5 ]
"Lear 251 Delta Lima, this is Burbank tower." "Do you read?" "Lear 251 Delta Lima, this is Burbank tower." "Do you read?" "Acknowledge," "Lear 251 Delta Lima." "They're off course and under the glide slope." "Lear 251 Delta Lima, do you read?" "Come right to 020." "Delta Lima, do you read?" "It's seconds out." "Delta Lima, abort." "Delta Lima, abort!" "Delta Lima, abort!" "Abort!" "Run!" "LA 5x02 ♪ Impact Original air date on October 1, 2013" "== sync, corrected by elderman == @elder_man" "How's he doing?" "Passed his evals, right?" "Oh, with flying colors." "So he's good to go." "Have you talked to Deeks?" "He appears to be screening my calls." "That's brazen." "Indeed." "Oh, my God." "Emoticon overload." "These guys from last night are kind of driving me nuts." "Which one?" "Jesse?" "Alex." "What is that?" "An ear of corn?" "A pickle?" "That actually looks like a-a..." "Oh, my God, here's Jesse." ""Good morning, beautiful."" ""Well, good morning to you," smiley face." "You heard from all three?" "Haven't you?" "Uh, no." "My, uh, phone's off." "I mean, who came up with this Groupster thing anyway?" "You know, three times the rejection doesn't seem psychologically sound." "One-on-one is bad enough." "I know, but Rose was so excited, and, you know, she really needs to get out and meet guys." "Yeah, that have a pulse." "It's supposed to be fun." "Three guys, three girls, no pressure, no expectations." "I'm sorry." "Three's a crowd." "Is that a heart or a butt?" "You know what?" "Here's an example." "Three bears, burgled." "Three little piggies, houses obliterated." "Three blind mice, tails cut off." "I am telling you, people start killing each other when the equation is three." "Wonder if Rose got any calls." "Yeah, only if one of them dropped dead." "You're bad." "Case on deck." "Oh, here we go." "Haircut?" "No, I think it's a new shirt." "Wait a second." "Are those...?" "Yep, I am wearing pants." "Sad face." "What, you got Old MacDonald's entire farm in there?" "Uh, it's just my mom." "Just her mom." "Well, well, well." "Look who's wearing big-boy pants." "Hetty got me these." "I mean, you still have the thongs, but it's a start." "Might as well be wearing a thong." "Stop whining." "Yes, ma'am." "Early this morning, a private jet, on its way from Washington, D.C., crashed at Burbank Airport." "There's no information as to why the plane went down, but at this early hour, it does appear no one on board survived." "What did air traffic control say?" "The tower lost contact with the jet upon approach." "The plane appeared to be on a collision course before veering off at the last moment, crashing." "Pilot error?" "Could have overshot the runway." "Maybe, or whoever was flying the plane had a clear target in mind." "Or maybe they missed a target." "It's who's on board that interests us." "Former Vice Admiral William Gardner." "He was a key player in the War on Terror." "Forced into early retirement ten months ago." "Gardner's uncensored criticism of the administration lost him his job and a seat on the Joint Chiefs of Staff." "What was he doing in L.A.?" "According to this, he was brokering a book deal." ""Unbroken Warrior, a riveting account of the truth behind the headlines."" "Sam and I will check out the airport." "Kensi..." "Uh, you'll be taking Kensi with you," "Mr. Callen." "Oh, great, my third-wheel status made official." "Not today." "Sam has an appointment." "Oh." "With who?" "That would be me." "Nate." "Good morning." "You want me to see another shrink?" "Uh, I don't think" "Mr. Getz is "another shrink."" "He knows you, your past." "And he knows I bounce back fast." "Even the most durable fabric wears out eventually." "Is that what you think," "Hetty?" "You think I'm worn out?" "I worry that you will be if you don't take care of yourself." "Sit down," "Mr. Hanna." "I don't know what more you want from me, Hetty." "I passed my physical my psych assessment." "Have I ever told you about the time I went blind?" "It was in Cambodia." "I was so committed to my assignment that I went for weeks existing on little more than insects and lemongrass." "So when, at last, my target presented itself," "I could barely see to complete my mission." "Vitamin A deficiency." "I take a multivitamin." "Oh, come on." "Sorry, Hetty." "I get it, but I wouldn't be here if I didn't think I could do a good job." "Then, your visit with Mr. Getz will be a mere formality." "How'd you get your sight back?" "Carrots." "Always eat your carrots, Mr. Hanna." "Sorry." "I know you were looking forward to getting back out with Sam." "Yeah, it's the same for you and Deeks." "Well, let's stay positive." "Good idea." "He won't return my calls." "Don't take it personally." "Sam's been staying close to home as well." "I couldn't get him to go to a Lakers game." "Yeah, I bought him a Cronut." "I had courtside..." "You bought him a what?" "A Cronut." "It's a croissant-doughnut hybrid;" "Deeks loves them." "I can only get them in this little bakery in New York City, and I left it on his doorstep, and it's still there." "He'll be okay." "Yeah." "They both will." "I'm gonna call Eric, see if he spoke to the I.T. guys." "NCIS." "Investigating the death of Vice Admiral Gardner." "Chief Howard," "National Transportation Safety Board." "How are you?" "Good luck with that." "Come again?" "Take a look; not much left." "So you haven't been able to find anything that helps explain the crash?" "Well, actually, we've pretty much found everything except the one thing that could help." "The black box?" "The wreck area is pretty small." "But we can't find the box anywhere." "Really?" "Really." "Yeah, you think you can get onto those ATC computers?" "They're not your average laptops, Kensi." "I'm a geek, not a god." "Eric, okay, let us know what else you find." "Fine." "I.T. guys confirmed the tower systems were operating properly." "Did the pilots give any indication that they were having problems?" "No, there was no response to any of the communication attempts." "Total radio silence." "I'm trying to get Eric to verify it, but something's got his panties in a twist." "Maybe it's his new pants." "Busy morning." "Is that your, uh, your mom again?" "A friend." "Friend of you and Kensi's?" "Yeah, just someone I hung out with last night." "With Kensi?" "On a date?" "I don't mean a date with Kensi." "You know what I mean." "Like, Kensi and the guy she's into, you and the guy you're into." "Not into him, not into any of them, and neither is Kensi." "Whoa, whoa, whoa, them?" "Yeah, okay, there's three of them and three of us, but we only went because Rose really needs to get out more, so..." "Oh, Rose came, too." "Yeah, it was like a girls' night." "Ah, girls' night with guys." "Who we are not into." "And yet you hung out with them all evening." "Hey, so should we move this interrogation into the boatshed?" "Oh, sorry, just, uh, curious how this whole thing works." "Why?" "'Cause you want to go on one?" "What?" "Oh, on a date?" "Whoa, with you?" "No, no." "With, like, other people." "Just, come on, not with me." "Oh." "No." "I mean, that's three times the heartache, right?" "For them, I mean." "Right." "Right." "right,ring on the questions." "Is that what you want?" "Me running through a list of questions, seeing if any of them trigger you?" "Trigger me?" "I'm a ticking time bomb?" "Well, is that how you feel?" "I feel fine." "It's just everybody acts like I'm gonna explode." "In what way?" "You know, tiptoeing around," ""watching for signs."" "Can you blame us?" "You went through quite an ordeal." "I've been through a lot worse." "That's not how trauma works, Sam." "Somebody might survive a tsunami no problem, only to be scarred for life by a trip to the dentist." "You might not want to use that example on Deeks." "Noted." "Look, Sam, you and I both know you're more than well-equipped to handle this, and you've got a great support network here." "The other night, Michelle and I got into it over whose turn it was to do the dishes." "That sounds normal." "She wouldn't let me do 'em." "That sound normal to you?" "It sounds like she cares." "And Callen got us these amazing tickets at the Lakers game." "Probably sold a kidney for 'em." "Did you go?" "No, it didn't feel right." "Because he's being too nice to you?" "Everybody is." "It's like they're trying to make me feel better when I'm fine." "Remember to relax and concentrate on the next exercise." "You must breathe very slowly." "Fill what is empty and empty what is full." "Fill what is empty and empty what is full." "Ah-hum-rumas-me." "I am the universe." "Ah-hum-rumas-me." "I am the universe." "My head is relaxing." "My head is relaxing." "My arms are relaxing." "My arms are relaxing." "My abdomen is relaxing." "My abdomen is relaxing." "Relax the buttocks." "Relax the buttocks." "What am I doing?" "Clench, release." "Clench, release." "Clench, release." "Clench, release." "I am one with the universe." "I am one with the universe." "God, Hetty, what are you doing?" "Well, I thought I'd brave the monsoon to come check on you." "Storm sounds-- supposed to make it easier to fall asleep, so..." "You having trouble sleeping?" "Yeah, I'd say I have a little case of insomnia." "Probably all that clenching and releasing." "Wow-wow-wow- wow-wow-wow-wow, you've been busy." "Well, when you don't sleep, you realize how many hours there are in the day you have to fill." "Well, if you're bored... perhaps you could come back to work." "I didn't even know that you were, um," "I didn't know you were coming." "If I knew..." "Do, do you want something?" "Do you want some milk?" "Oh, no, no, no, no, no, I-I can't stay long." "I just came to... see if your phone was working." "43... missed calls." "Fancy that." "Like you said, I've been busy." "So has Kensi." "For the past few weeks." "Without a partner." "I'm gonna need a decision soon." "Especially if I need to find a replacement." "Of course." "I'll leave you to your storm." "Hopefully it'll pass without too much damage." "Feel your troubles melting away as you drift off to a world abstract." "I'll show you, Hetty." "Oh!" "Hello." "Uh, did you ever hear of knocking?" "Sorry." "Last I checked, this was the burn room, not the locker room." "What are you doing?" "What's it look like I'm doing?" "Something really weird?" "Are those your pants?" "Uh... no." "Oh, my..." "God!" "Those are not my pants." "I do not own pants." "Those are Hetty's pants." "Interesting, and you were going to incinerate them?" "Do you have a death wish?" "I didn't have a choice." "Did you have an accident?" "Ew, no." "Those things are driving me nuts, they're so constrictive." "It's like my legs are trapped in a straitjacket." "Eric, they're pants." "People have been wearing them for thousands of years." "Oh, no, no, not my people." "The Beales of the Clan McBeale." "And now you're Scottish?" "As heather and haggis." "So why don't you wear a kilt?" "I do." "I did." "I used to." "Until this little incident with Hetty." "It's easy to forget how short she is." "Her eye line is lower than you think." "Yup, got it!" "Thanks." "Okay, I suggest you take your bag-o-pants and put them back on your body before Hetty finds out, or else it'll be your butt in the incinerator." "And there was a last-minute passenger added to the flight's manifest." "Jason Carter?" "How do I know that name?" "Jason Carter was a journalist." "He had written a number of high profile pieces on a variety of different topics." "He was even nominated for a Pulitzer for an article he wrote on hydraulic fracturing and the oil companies." "That's how I know him." "For the past year or so, he had been writing about the war in Afghanistan, embedding himself in several different units." "Hmm." "Maybe he was interviewing the vice admiral on the flight." "Reasonable assumption." "So I contacted his publisher." "Turns out, he was the ghost writer for the admiral's memoir." "Somebody didn't want this book being published." "Listen, Nate." "I wouldn't jeopardize Callen and the rest of the team if I didn't think I could hold my own." "Look, I appreciate that, Sam, and I believe you." "In fact, I know you put your partner and the rest of the team above your own safety." "Okay, then you know pretty much all there is to know." "Hetty doesn't think so." "Then, maybe you should go talk to Hetty." "You know, you're probably right." "Is that it?" "I'm only here because Hetty worries about you." "Nate..." "The only way to survive is to let go." "I keep a little something behind in case there's a chance to escape or attack, but... the rest of me is gone." "I see 'em wailing on that guy in the chair." "I can't help him." "When it's over, I reconnect." "And the only thing left are some scars." "I'm afraid one day I may drift off... and never reconnect." "Then what happens to the guy in the chair?" "Yeah?" "Special Agent Callen." "Special Agent Blye, NCIS." "We were wondering if we could take a look inside of Jason Carter's apartment." "Yeah, I guess." "I heard he died." "Shame." "Nice guy." "Good tenant." "This have anything to do with the fire?" "I'm sorry, the fire?" "In his apartment." "The place was gutted day before yesterday." "Fire marshal said it could take a week or more to determine what happened." "Had a insurance company out here this morning." "They wanted to take a look, too." "Not much left." "Fortunately nobody was home at the time." "This guy's had a bit of a run of bad luck, huh?" "This is Jason's girlfriend." "Julie, these are the agents from, um..." "NCIS." "His insurance company?" "No..." "Naval Criminal Investigative Service." "Oh." "Shall we?" "Yeah." "Need a hand?" "Oh." "Thank you." "I didn't even know Jason was on his way home until I saw the message on my phone." "What did the message say?" "Just that he was able to get a ride back to L.A. with the vice admiral, and was gonna use the time to interview him." "I fell asleep waiting up for him." "I kept expecting him to crawl into bed and kiss me good night." "When I woke up in the morning and he wasn't there," "I knew something was wrong." "And he wasn't answering his phone, so I came here and the fire department was just leaving." "I was standing here, already in shock when the police called to tell me" "Jason was killed in the plane crash." "Uh, four days ago." "He give you any indication that something might've been wrong?" "He seemed a little stressed maybe?" "Callen?" "Excuse me." "So, super wasn't kidding when he said the place was gutted." "Forensics will be able to tell us more, but the fire was hot and fast." "Pro job." "Julie?" "Do you know anybody that would've wanted to hurt Jason?" "No." "Some of his articles earned him hate mail." "Did he tell you what he was currently working on?" "No, he didn't talk much about work." "Did he ever give you anything to keep for him?" "No." "Why, do you think something he was working on played a part in his death?" "We're considering a lot of possibilities." "Please tell me your presence here is because of your excitement over a startling and revealing piece of valuable evidence that solves this case." "Well..." "You know what, I'll settle for a run-of-the-mill clue." "Actually, I have more bad news." "Is it worse than Jason Carter's apartment being torched?" "Virtually." "What is it?" "Virtually." "What?" "Virtually." "I think he's stuck." "I knew Hetty was a robot, but now him?" "No... virtually as in cyberspace." "As in somebody's been scrubbing through his electronic life." "As in they hijacked his cloud and wiped it clean an hour after he died." "As in they hijacked his cloud This is some serious voodoo." "I'm talking black bag kung fu, ninja warrior assassin level hacking." "Do you have any idea what he's saying?" "I really don't, but I think it's bad." "Either that or his motherboard was fried." "So, who do we know with this level of cyber warcraft?" "I may have a guy." "This is the security cam footage from the airport." "And I think this is the black box." "Orange." "See?" "That's why we didn't find it, because somebody stole it." "Why would someone steal a plane's flight recorder?" "Million-dollar question." "No, the million-dollar question is why is it called the black box if it's always orange?" "If somebody wanted to find out what happened to the aircraft in its last few moments." "Or if they didn't want someone to know." "Then they would get away in the confusion." "Yup." "And I believe the same vehicle entered the airport just 24 hours earlier." "See?" "Plain, inconspicuous." "They probably parked it in a hangar and then re-skinned it as an emergency vehicle." "And then all they had to do was wait for the crash to happen." "So they show up on the scene as emergency workers, and when everyone else is busy, they walk off with the flight recorder." "Which also means that they knew that the crash was going to happen." "Which proves it was sabotage." "I'm running the hangar rental and owner lists now, but still no luck facial rec-ing these guys." "Okay, what about the vehicle?" "Working on that, too." "I doubt you're gonna find it." "These guys haven't left much to chance." "Someone deliberately crashes their plane in what was described as a aborted kamikaze flight into the tower." "There could have been a struggle on board." "Hijacking and a struggle would be the most logical explanation." "But all of these guys are top-drawer." "None of them have anything in their profile or background that would even remotely suggest that they could be responsible for this." "Which is where our black-box-stealing, mystery emergency workers come in." "Could they be responsible for the sabotage?" "It's not likely." "The plane originated in Washington." "They would have had to have sabotaged it a few days before to have been waiting here." "Which would suggest accomplices." "This is starting to sound like a conspiracy nut's fantasy." "Only this might be real." " Okay, good luck." " Thank you." "How was the zoo?" "Did you get a churro?" "That's funny." "It's a good one." "Hey, you sure you want him back?" "Can I have the rest of the week to think about it?" "Ha-ha." "So, just give me the greatest hits." "He's as stubborn as he is big." "I consider both of those to be assets in an agent." "And they don't make them any tougher." "That's also why he's here." "But the trauma and damage he experienced, it's cumulative, physically and psychologically, as you well know." "If it happens too many more times, he could reach a breaking point where he can't take it anymore." "You also know what can happen then." "Thank you, Nate." "Now could you turn your attentions to Detective Deeks?" "Anything I should know?" "I don't want him back if he's not the man he was." "So, what'd Nate have to say?" "Ah, same old shrink mumbo jumbo." "Yeah. "You ever have sexual fantasies about your mom?" "You ever wear her clothes when she's not home?"" "That sort of thing?" "What?" "The hell are you talking about?" "He asked you that kind of stuff before?" "Yeah, but..." "I mean, that's normal... shrink stuff." "Are you messing with me?" "I'm not messing with you." "Don't be messing with me on my first day back, man." "Anyone hear an explosion prior to the plane crash?" "No... and no sign of any sort of explosive devices from what I can see." "This all happened from this plane hitting the ground at several hundred miles per hour." "With a crew with a flawless record." "In a plane that was just as safe." "What do you got?" "Looks like it was a digital recorder in its former life." "Well?" "I'm not sure." "I mean, it's digital, so it should be there." "It's just a matter of the damage." "What else...?" "Afghanistan... never..." "conquered by a foreign army." "The Russians learned..." "the hard..." "Absolutely not... not at war with Afghanistan." "...the country trying to weed out persistent terrorists, bastards... to Pakistan." "...semantics?" "What would it... take to put...?" "Money... money and more troops... private contractors..." "billions." "Whoa, what was that when he said "money, private contractors"?" "Can you dig it out more?" "I can try." "Same... said of... military." "Our people... properly trained." "Theirs are not." "They're a... risk that re..." "lots... cover-ups." "Sounded like he said "cover-ups."" "...risk that re..." "lots... cover-ups." "Hell... proof of what..." "considered war crimes." "That's it." "He was talking about war crimes being committed." "Without the entire recording, we can only ever guess what was actually said, but that's what it sounded like to me, too." "Well, if you had proof that Americans with war contracts committed atrocities overseas while employed by the U.S. government," "I'd say there are those who would kill to keep that buried." "You need to hear this." "Let me guess-- you're stuck in traffic." "No." "Uh, hi, Hetty." "No, I-I thought you were going to be Deeks." "No, he hasn't showed yet." "In fact, he's not answering his phone calls or e-mails." "An amateur plane spotter and his buddy sent this to the Burbank Police Department." "Yeah, they were parked here, listening in on the tower, when they picked up on this from a different radio frequency." "Lear 251 Delta Lima, this is Burbank tower." "Do you read?" "Tower said they never responded." "They thought they were responding to the tower, but they actually weren't." "Burbank tower." "Lear 251 Delta Lima." "We have you loud and clear." "Little foggy down there." "That's the pilot of Admiral Gardner's plane." "Delta Lima, we're still above minimums here, unbroken with a 300-foot ceiling." "If that's not the tower, then who the hell is it?" "Roger." "Glad to hear." "I don't know, I ran it" "Burbank tower, I may have some instrument issues." "Altimeter isn't matching my other displays." "Computer's got me at a thousand feet and altimeter is reading 750." "Altimeter setting is 2886." "We have you descending through 900 feet." "Glide slope is spot-on." "Come left to 024 degrees." "You're cleared to land." "Wilco." "024 and cleared to land." "Look out, look out, pull up, pull up!" "We're going down!" "Three seconds later they crashed." "Somebody intercepted the tower's radio system as well as that of the plane." "And were able to sabotage the jet's instrument system." "Like I said... serious voodoo." "So, an outspoken navy admiral is speaking with a journalist known for controversial stories." "And they want to keep him quiet so they kill the admiral and the writer..." "Making it look like a plane crash..." "Wiping out any evidence of what the journalist was doing." "And we have nothing but a few seconds of interview." "What if the journalist gave his girlfriend copies of his work for safekeeping?" "But he didn't." "Maybe those responsible don't know that." "More evidence is surfacing about the fiery plane crash in Burbank yesterday that killed retired Navy Vice Admiral Gardner." "Another victim has been identified as controversial journalist Jason Carter." "According to sources close to Carter, he was worried about his own safety recently because of the story he was working on, excerpts of which have been released by his girlfriend." "The following conversation between Carter and the vice admiral is believed to have been recorded just moments before the fatal crash." "Our people are properly trained." "Theirs are not." "They're a security risk that resulted in lots of cover-ups." "Hell, we've even seen proof of what would be considered war crimes." "The investigation into the crash that killed" "Vice Admiral Gardner and Jason Carter is ongoing, and this latest development suggests this story is far from over." "Will this be enough to draw them out?" "Whoever's responsible went to extremes to bury this." "I doubt they have any intentions of stopping now." "Our people are properly trained." "Theirs are not." "They're a security risk that resulted in lots of cover-ups." "Hell, we've even seen proof of what would be considered war crimes." "What else do you want to know?" "Afghanistan has never been conquered by a foreign army." "The Russians learned that the hard way." "What are we waiting for?" "Let's go." "Showtime." "You put a surveillance camera inside a garden gnome?" "Yeah, we call it the Hetty-cam." "Hey now, these guys are real pros." "Wouldn't you say so, Hetty?" "I could say many things, many, many." "Look, they're picking the lock." "Absolutely not the same situation." "We're not at war with Afghanistan." "We're in the country trying to weed out persistent terrorists, bastards who migrated to Pakistan." "Isn't that just semantics?" "What would it really take to put an end to...?" "Money." "It'd take more money and more troops, but we're inundated with private contractors who waste billions." "They call Washington corrupt;" "these bastards take the cake." "So now you're talking about multinational corporations." "I've had my flu shot." "What the...?" "Kitty Corner?" "I only read it for the articles." "Federal agent." "Don't even think about it." "What'd I just say?" "You're still thinking about it." ""What if I distract him with the magazine, dive for cover, draw, and fire?"" "That might work, but they'd fill you full of holes." "Good call." "Wish you were out there?" "No such thing as a bad day in the water." "I came." "Even had my hand on the door." "I don't know what happened," "I just couldn't come in." "Pretty sure you'd feel better if we talked." "Pretty sure I wouldn't." "Look... even though I'm here at Hetty's request, and... well, I've got my own opinions, the only one who matters in all this is you." "I have no agenda beyond making sure you're in the best place you can be right now." "And how can you possibly know what that place is when I don't even know?" "Perspective?" "Seldom do we know what we need for ourselves." "What I need... is sleep." "Why do you think you can't sleep?" "Because every time I close my eyes, my mind just keeps running." "With what?" "All sorts of stuff, man." "The abduction?" "Yes, the abduction." "Torture?" "The abduction... torture, when I was shot... falling off my bike when I was eight years old, stepping on a bee, nursery rhymes, grocery lists, infomercials." "It's like someone took all my memories and just put 'em into a blender." "You went through a traumatic experience." "Yeah, but this is not my first traumatic experience." "No, but maybe something about this one had more impact." "Your brain could be trying to make sense of what happened by comparing it to past experiences, but you got nothing that comes close, so it's working a little harder to resolve it." "Okay, so how long's this supposed to last?" "I don't think I have a definitive answer for that, but the more you talk about it out here, the less you're gonna have to work on it in here." "So, what, in the meantime," "I just walk around with the mind of a schizophrenic?" "I don't think you have to worry about being a..." "You know, it's funny, 'cause I already get the Shaggy jokes and how I'm halfway to homeless." "You know, what's crazy is that I see these guys and I hear them talking to themselves and it's scaring the hell out of me because if I were to say what's going on in my mind," "it wouldn't be that different." "Well, that's the real difference." "You're worried about it." "I'd be more concerned if you weren't." "So I'm not crazy?" "Not yet." "If you don't start getting some sleep, you're gonna start to act and feel like it." "What about Kensi?" "What about her?" "You two obviously have something special." "Who told you that?" "You're partners." "That's a special relationship." "Look at Callen and Sam." "Right, of course." "What is it about your partnership that's... unique?" "What do you mean?" "What do you mean, "unique"?" "Different from Callen and Sam or the others." "What's the one ingredient you'd say makes your partnership distinct from the rest?" "I don't know." "Well... once you can answer that truthfully to yourself, everything else will become much clearer." "They're not talking." "Lawyered up before we could zip-tie 'em." "Both are former Special Forces." "Both work for D7-- it's a private company with a couple of billion in government contracts supplying support services in hot spots around the world." "Yeah, we've already called in for a search warrant." "The evidence we'd need will be long gone by then, if it isn't already." "We have to work with what we have." "Well, the guys in the boatshed are small fish." "They're well-trained, they're well-funded, but they didn't order this." "That was somebody higher up." "Somebody who has access to technology that allows them to intercept air traffic control and sabotage a private jet's in-flight computer." "Yeah, Hetty, this is a lot bigger than we initially thought." "I mean, we're talking war crimes by private contractors." "We'll get them, but today you caught two small fish, and sometimes small fish are the most perfect bait for big fish." "This is far from over." "You did well today." "Eric even managed to keep his pants on." "You can drop them off at wardrobe." "I can go back to wearing shorts?" "For a while." "It's a process." "Uh-huh." "Hmm." "I want a job where it's an accomplishment to leave my pants on." "Hmm." "I have sensitive thighs." "Oh..." "He has sensitive thighs." " Yeah." " Hey, come on, guys." "Guys, it's not funny-- it's like restless legs syndrome times a zillion." "Good luck with that." "I'm dead." "I'm the one who cut them." "I couldn't bear to see you suffer." "What are we gonna do?" "Looks like we're going shopping, Beale." "So... what's the good word on our Mr. Deeks?" "He's hurting." "Can he return to work?" "Yes." "Whether he will or not is a question for him." "He's not sleeping." "He can't work through this if he doesn't get some rest." "And his partner?" "It's a complicated relationship." "Aren't they all?" "You asked me if he could come back to work." "And now I'm asking you about his relationship with Kensi." "Are you playing semantics with me?" "He's very close..." "to his partner." "Too close to return?" "I'm co" " I'm co." "Oh." "Hi." "Hey." "I've been calling." "Yeah, I think I must have had my phone off." "Guess what reopened." "Is that Yummy Yummy Heart Attack?" "Yep, three Fs from the health department and still going strong." "Yeah, if "F" stood for "fabulous."" "Did you get the, uh, Drunken Pigs?" "With extra kimchi-- you're welcome." "I think I just felt a shiver." "Want me to, uh, grab something to drink?" "Oh, no, no, no, no, I have got you covered, my friend." "Wow, one day you are going to make somebody the perfect personal assistant." "Got a fork?" "I got a spork." "Yeah, yeah, you do." "All right." "Oh, I have been waiting for this-- the smell in the car..." "Oh, are you kidding me?" "I forgot how good this was." "This is so good." "You think it's bad for us?" "Hmm, ah, you only live once, ha." "Yeah, probably a lot shorter when you eat like this." "You got napkins?" "Uh-huh." "Is that dessert?" "Uh, no, it's nothing." "You got me a Cronut?" "Um, I did, but that was a while ago, and I left it at your doorstep, so that's old, don't eat it." "N-N-N-No, d-don't throw it away." "It's the thought that counts-- I'm gonna frame this thing." "You're so weird." "I mean, look at that." "It's like America and France made slow, sweet love and then had a pastry baby." "Sure you don't want a bite?" "No, seriously it's been out there for a while." "I'll probably still eat that." "Okay." "So, Burnt Offerings is on at 11:00." "It's the bottom of the eighth..." "I don't really know if I'm up for a movie." "Oh, yes, you are because I cannot watch this alone." "It is rated triple-B." "What's that?" "Blood, breasts, and beasts." "What was the last one?" "Beasts." "Well, you know how I like big beasts." "Either way, you're watching it with me." "I thought you loved horror movies." "I do, just not by myself." "Watch it with me." "Watch it with me?" "Watch it with me." "You won me over with the pastry, baby." "Awesome, okay." "Want to use my cat pillow?" "It's pink, very masculine." "So..." "Oliver Reed and Karen Black move into this mansion with their son and their elderly aunt, played by Bette Davis, who I absolutely love, and then Burgess Meredith, who played Mickey in the Rocky films-- it was so sad when he dies," "oh, my God, it's the best scene ever-- um, and his sister play the caretakers of this mansion, and then their mother-- she's like an elderly recluse in the attic, and then flying monkeys from The Wizard of Oz show up" "with guns, and there's a big shoot-out." "Mm, those monkeys are scary." "What happens next?" "It's a love story." "What?" "== sync, corrected by elderman == @elder_man"
Low
[ 0.5068965517241381, 36.75, 35.75 ]
Q: Binary Display with LEDs I tried an example of code to display serial output on an array of LEDs. #define F_CPU 1000000UL #define BAUD 9600UL #include <avr/io.h> #include <util/delay.h> #include <USART.h> #include <pinDefines.h> int main(void) { char serialCharacter; LED_DDR = 0xff; initUSART(); printString("Connection Successful\r\n"); while (1) { serialCharacter = receiveByte(); transmitByte(serialCharacter); PORTB = serialCharacter; } return 0; } The code for the serial connection: #ifndef BAUD #define BAUD 9600 #endif #define USART_HAS_DATA bit_is_set(UCSR0A, RXC0) #define USART_READY bit_is_set(UCSR0A, UDRE0) #include <avr/io.h> #include <util/setbaud.h> void initUSART(void) { #define BAUDRATE ((F_CPU) / (BAUD * 8UL)-1) // Set Baud Rate Value for UBRR // Set register UBRR0H = (BAUDRATE >> 8); UBRR0L = BAUDRATE; UCSR0A |= (1 << U2X0); // Enable USART transmitter and receiver UCSR0B = (1 << TXEN0) | (1 << RXEN0); // Set 8 data bits and 1 stop bit UCSR0C = (1 << UCSZ01) | (1 << UCSZ00); } void transmitByte(uint8_t data) { // Wait for empty transmit buffer loop_until_bit_is_set(UCSR0A, UDRE0); UDR0 = data; } uint8_t receiveByte(void) { // Wait for incoming data loop_until_bit_is_set(UCSR0A, RXC0); return UDR0; } void printString(const char myString[]) { uint8_t i = 0; while (myString[i]) { transmitByte(myString[i]); i++; } } The connection works well and the data I key in will be displayed on a serial terminal as expected. Though the display on the LED array is odd. No matter what I key in, I get the output on LEDS of 00001010 (8 LEDs each representing one bit) on PORTB of the ATMEGA328p. Always the same 2 LEDs light up. When I press a key to be transmitted I get a short flicker of the LEDs and then going back to lighting up Bit 2 and 4. How can I fix this? A: Could your PC terminal program be set up to automatically send an ASCII line feed after every character. That would explain why the final character your MCU receives is 0Ah. Check that the terminal program is set to a simple mode.
Mid
[ 0.5672268907563021, 33.75, 25.75 ]
Paul Couturier Paul Irénée Couturier (29 July 1881 – 24 March 1953) was a French priest and a promoter of the concept of Christian unity. He was instrumental in the establishment of the Week of Prayer for Christian Unity. Early life and career He was born and educated in educated at Lyon, France, to a family with some Jewish blood, then raised in Algeria, among the largely Muslim population there. Upon returning to France, Couturier was ordained a priest in 1906 as a member of the Society of St. Irenaeus. After spending three years studying physical science, he started teaching at the Institution des Chartreux at Lyon, where he remained through 1946. Ecumenism In the 1920s Fr. Couterier worked with the thousands of Russian refugees and became acquainted with their Russian Orthodox spiritual heritage. Later, in 1932, when he was with the Benedictine Monks of Unity at the Priory of Amay-sur-Meuse, he read an introduction to the work of Cardinal Désiré-Joseph Mercier and was introduced to the work of Dom Lambert Beauduin. These stimulated his own interest in the ecumenical movement. He became an oblate there, and took the name of Benoit-Irenee in acknowledgement of his two primary sources of inspiration. In 1933, he established a Triduum for Christian Unity at Lyon, which later became an Octave in 1934, extending from the feast of the Chair of Saint Peter to the feast of the Conversion of Saint Paul. This was an outgrowth from the Octave for Church Unity which had been established by two Anglicans in 1908. However, Couturier specifically offered his Octave for the unity of any and all baptized into the Christian faith, including Orthodox, Anglican, and other Christian groups. Beginning in 1939, its name was changed to the "Universal Week of Prayer for Christian Unity". He also worked to establish closer ties between the various Christian faiths, arranging meetings at La Trappe des Dombes and at Présinge. One of these meetings, called the Dombes Group, has met regularly since 1937. He also maintained a hugh correspondence, with Jews, Muslims, Hindus, and all kinds of Christians, created and distributed a number of tracts on prayer for unity, and kept in close contact with the World Council of Churches. He also studied the work of Pierre Teilhard de Chardin, a fellow scientist, and was strongly influenced by Chardin's view of the unity of all humanity in Christ, regardless of their beliefs. He personally believed that praying for the increased holiness of all peoples would inevitably lead to a greater understanding of God, and eventually a greater understanding of Christ by all peoples of the world. In 1952, for his work in promoting religious unity he was granted the honorary title of Archimandrite by the Melkite Greek Catholic Church Patriarch of Antioch, Maximos IV Sayegh. He is also commemorated in the Calendar of saints of the Anglican Church of Australia on March 24. Impact Couturier's philosophy of ecumenism is reflected upon during Weeks of Prayer for Christian Unity. Cardinal Walter Kasper of the Pontifical Council for Promoting Christian Unity recently summarised important aspects of Couturier's impact: While [Father Paul] Wattson maintained that the goal of unity was the return to the Catholic Church, Abbé Paul Couturier of Lyons (1881–1953) gave a new impetus to this Week in the 1930s, ecumenical in the true sense of the word. He changed the name "Church Unity Octave" to "Universal Week of Prayer for Christian Unity", thus furthering a unity of the Church that "Christ wills by the means he wills". Paul Couturier's 1944 spiritual testament is very important, profound and moving; it is one of the most inspired ecumenical texts, still worth reading and meditating on today. The author speaks of an "invisible monastery", "built of all those souls whom, because of their sincere efforts to open themselves to his fire and his light, the Holy Spirit has enabled to have a deep understanding of the painful division among Christians; an awareness of this in these souls has given rise to continuous suffering and as a result, regular recourse to prayer and penance". Paul Couturier can be considered the father of spiritual ecumenism. His influence was felt by the Dombes Group and by Roger Schutz and the Taizé Community. Sr. Maria Gabriella also drew great inspiration from him. Today, his invisible monastery is at last taking shape through the growing number of prayer networks between Catholic monasteries and non-Catholics, spiritual movements and communities, centres of male and female religious, Bishops, priests and lay people. - Cardinal Walter Kasper Veneration The Church of England remembers Couturier liturgically on 24 March. See also Week of Prayer for Christian Unity Pontifical Council for Promoting Christian Unity World Council of Churches Ecumenism Catholic Church and ecumenism External links Paul Couturier at faithweb.com Biography of Paul Couturier at faithweb.com References Category:1881 births Category:1953 deaths Category:20th-century Christian saints Category:20th-century Roman Catholic priests Category:Anglican saints Category:Catholic Church and ecumenism Category:French Roman Catholic priests Category:People from Lyon Category:People in Christian ecumenism
High
[ 0.7325428194993411, 34.75, 12.6875 ]
Comments from a conservative-bordering-on-libertarian living in the great State of Maryland Tuesday, September 04, 2007 At least they didn't say it was "for the children" DC Mayor Adrian Fenty and the city’s Attorney General Linda Singer take to the pages of the Washington Post to complain about not being able to continue to ban handguns in the District. Specifically, they discuss their decision to appeal a recent DC Circuit decision overturning the DC ban: “As mayor and attorney general of the District of Columbia, we were deeply disappointed this year when the U.S. Court of Appeals for the D.C. Circuit declared that the District's longstanding handgun ban violates the Second Amendment.” Fighting for Our Handgun Ban The dissent in that case argued, or more accurately, repeated an earlier assertion that the Second Amendment didn’t apply to the District: “Its superfluity is even more pronounced, however, because the meaning of the Second Amendment in the District of Columbia (District) is purely academic. Why? As Judge Walton declared in Seegars v. Ashcroft, 297 F. Supp. 2d 201, 239 (D.D.C. 2004), aff’d in part, rev’d in part sub nom. Seegars v. Gonzales, 396 “the District of Columbia is not a state within the meaning of the Second Amendment and therefore the Second Amendment’s reach does not extend to it.” For the following reasons, I respectfully dissent.” Parker v. DC, Judge Henderson dissenting Judge Henderson does not note in her dissent that Judge Walton had preceded that 2nd –Amendment-does-apply-to-DC line with this factoid: “In any event, while the Fifth Circuit had to cast a shadow on the current viability of Supreme Court precedent that have commented on the scope of the Second Amendment to reach the conclusion that the Second Amendment protects an individual right to possess firearms, the Emerson Court’s assessment is of no moment here because, as noted above, the Fourteenth Amendment does not apply to the District of Columbia. Bolling, 347 U.S. 497.” Bolling was decided the same date as Brown v. Board of Education, involved DC public schools and Chief Justice Warren’s opinion did indeed take note of the non-applicability of the 14th Amendment: “We have this day held that the Equal Protection Clause of the Fourteenth Amendment prohibits the states from maintaining racially segregated public schools. The legal problem in the District of Columbia is somewhat different, however. The Fifth Amendment, which is applicable in the District of Columbia, does not contain an equal protection clause as does the Fourteenth Amendment which applies only to the states.” But CJ Warren managed to apply the 5th Amendment anyway to reach a decision consistent with Brown. Meanwhile, the Mayor and AG argue: “The District should have authority just like that of the states, if for no other reason than to avoid the absurd result that the nation's capital alone would lack the ability to take the steps the local government believes are needed to keep its residents safe.” “Another longstanding Supreme Court precedent, Presser v. Illinois, establishes that the Second Amendment simply does not apply to state regulation of gun possession and use.” Well, don’t take their word for it, read for yourself: “The second amendment declares that it shall not be infringed, but this, as has been seen, means no more than that it shall not be infringed by congress. This is one of the amendments that has no other effect than to restrict the powers of the national government, leaving the people to look for their protection against any violation by their fellow-citizens of the rights it recognizes to what is called in City of New York v. Miln, 11 Pet.” PRESSER v. STATE OF ILLINOIS, 116 U.S. 252 (1886) (emphasis added) Since the District is a creation of the Federal Government, it would be “an absurd result” (to coin a phrase) to think the Federal Government could create such legal entities to which the US Constitution’s protections of US citizens against the vagaries of the federal government do not apply. Clearly, if the 5th amendment applies to the District, the 2nd should also.
Low
[ 0.44, 26.125, 33.25 ]
Recently, Zhang proposed a reversible data hiding scheme for encrypted image with a low computational complexity which is made up of image encryption, data embedding and data-extraction/image-recovery phases. During the last phase, the embedded data are extracted according to a determined smoothness measuring function on each nonoverlapping block. However, not all pixels in a block are considered in his approach. This may cause higher error rate when extracting embedded data. In this paper, we propose a novel smoothness evaluating scheme to overcome the problem. Based on the Zhang's approach, we divide the pixels in each block into three different portions: four corners, four edges, and the rest of pixels. The smoothness of a whole block is determined by summing the smoothness of three portions and is utilized to extract embedded data and recovery image. Experimental results show that the proposed scheme can reduce the error rate of data-extraction/image-recovery effectively. For a given normal testing image, such as Lena, supposing that the size of each block is 8 by 8, the error rate of our approach is less than 0.6% and Zhang's method is higher than 12%. Moreover, the error rate will be zero when the size of each block is defined as 12 by 12.
Mid
[ 0.655086848635235, 33, 17.375 ]
/* * Copyright 2014-2017 Red Hat, Inc. and/or its affiliates * and other contributors as indicated by the @author tags. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.hawkular.metrics.api.jaxrs.handler; import static javax.ws.rs.core.MediaType.APPLICATION_JSON; import static org.hawkular.metrics.api.jaxrs.util.ApiUtils.badRequest; import static org.hawkular.metrics.api.jaxrs.util.ApiUtils.noContent; import static org.hawkular.metrics.api.jaxrs.util.ApiUtils.serverError; import static org.hawkular.metrics.model.MetricType.AVAILABILITY; import java.net.URI; import java.util.List; import java.util.Map; import java.util.regex.PatternSyntaxException; import javax.enterprise.context.ApplicationScoped; import javax.ws.rs.Consumes; import javax.ws.rs.DELETE; import javax.ws.rs.DefaultValue; import javax.ws.rs.GET; import javax.ws.rs.POST; import javax.ws.rs.PUT; import javax.ws.rs.Path; import javax.ws.rs.PathParam; import javax.ws.rs.Produces; import javax.ws.rs.QueryParam; import javax.ws.rs.container.AsyncResponse; import javax.ws.rs.container.Suspended; import javax.ws.rs.core.Context; import javax.ws.rs.core.Response; import javax.ws.rs.core.UriInfo; import org.hawkular.metrics.api.jaxrs.QueryRequest; import org.hawkular.metrics.api.jaxrs.handler.observer.MetricCreatedObserver; import org.hawkular.metrics.api.jaxrs.handler.observer.ResultSetObserver; import org.hawkular.metrics.api.jaxrs.handler.template.IMetricsHandler; import org.hawkular.metrics.api.jaxrs.param.TimeAndBucketParams; import org.hawkular.metrics.api.jaxrs.param.TimeAndSortParams; import org.hawkular.metrics.api.jaxrs.util.ApiUtils; import org.hawkular.metrics.api.jaxrs.util.Logged; import org.hawkular.metrics.core.service.Functions; import org.hawkular.metrics.core.service.Order; import org.hawkular.metrics.core.service.transformers.MinMaxTimestampTransformer; import org.hawkular.metrics.model.ApiError; import org.hawkular.metrics.model.AvailabilityBucketPoint; import org.hawkular.metrics.model.AvailabilityType; import org.hawkular.metrics.model.Buckets; import org.hawkular.metrics.model.DataPoint; import org.hawkular.metrics.model.Metric; import org.hawkular.metrics.model.MetricId; import org.hawkular.metrics.model.MetricType; import org.hawkular.metrics.model.param.BucketConfig; import org.hawkular.metrics.model.param.Duration; import org.hawkular.metrics.model.param.TagNames; import org.hawkular.metrics.model.param.Tags; import org.hawkular.metrics.model.param.TimeRange; import org.jboss.resteasy.annotations.GZIP; import com.fasterxml.jackson.databind.annotation.JsonDeserialize; import io.swagger.annotations.Api; import io.swagger.annotations.ApiOperation; import io.swagger.annotations.ApiParam; import io.swagger.annotations.ApiResponse; import io.swagger.annotations.ApiResponses; import rx.Observable; import rx.schedulers.Schedulers; /** * @author Stefan Negrea * */ @Path("/availability") @Consumes(APPLICATION_JSON) @Produces(APPLICATION_JSON) @GZIP @Api(tags = "Availability") @ApplicationScoped @Logged public class AvailabilityHandler extends MetricsServiceHandler implements IMetricsHandler<AvailabilityType> { @POST @Path("/") @ApiOperation(value = "Create availability metric.", notes = "Same notes as creating gauge metric apply.") @ApiResponses(value = { @ApiResponse(code = 201, message = "Metric created successfully"), @ApiResponse(code = 400, message = "Missing or invalid payload", response = ApiError.class), @ApiResponse(code = 409, message = "Availability metric with given id already exists", response = ApiError.class), @ApiResponse(code = 500, message = "Metric creation failed due to an unexpected error", response = ApiError.class) }) public void createMetric( @Suspended final AsyncResponse asyncResponse, @ApiParam(required = true) Metric<AvailabilityType> metric, @ApiParam(value = "Overwrite previously created metric configuration if it exists. " + "Only data retention and tags are overwriten; existing data points are unnafected. Defaults to false.", required = false) @DefaultValue("false") @QueryParam("overwrite") Boolean overwrite, @Context UriInfo uriInfo ) { if (metric.getType() != null && MetricType.UNDEFINED != metric.getType() && MetricType.AVAILABILITY != metric.getType()) { asyncResponse.resume(badRequest(new ApiError("Metric type does not match " + MetricType .AVAILABILITY.getText()))); } URI location = uriInfo.getBaseUriBuilder().path("/availability/{id}").build(metric.getId()); metric = new Metric<>( new MetricId<>(getTenant(), AVAILABILITY, metric.getMetricId().getName()), metric.getTags(), metric.getDataRetention()); metricsService.createMetric(metric, overwrite).subscribe(new MetricCreatedObserver(asyncResponse, location)); } @GET @Path("/") @ApiOperation(value = "Find tenant's metric definitions.", notes = "Does not include any metric values. ", response = Metric.class, responseContainer = "List") @ApiResponses(value = { @ApiResponse(code = 200, message = "Successfully retrieved at least one metric definition."), @ApiResponse(code = 204, message = "No metrics found."), @ApiResponse(code = 400, message = "Invalid type parameter type.", response = ApiError.class), @ApiResponse(code = 500, message = "Failed to retrieve metrics due to unexpected error.", response = ApiError.class) }) public void getMetrics( @Suspended AsyncResponse asyncResponse, @ApiParam(value = "List of tags filters", required = false) @QueryParam("tags") String tags, @ApiParam(value = "Fetch min and max timestamps of available datapoints") @DefaultValue("false") @QueryParam("timestamps") Boolean fetchTimestamps) { Observable<Metric<AvailabilityType>> metricObservable = null; if (tags != null) { metricObservable = metricsService.findMetricIdentifiersWithFilters(getTenant(), AVAILABILITY, tags) .flatMap(metricsService::findMetric); } else { metricObservable = metricsService.findMetrics(getTenant(), AVAILABILITY); } if(fetchTimestamps) { metricObservable = metricObservable .compose(new MinMaxTimestampTransformer<>(metricsService)); } metricObservable .toList() .map(ApiUtils::collectionToResponse) .subscribe(asyncResponse::resume, t -> { if (t instanceof PatternSyntaxException) { asyncResponse.resume(badRequest(t)); } else { asyncResponse.resume(serverError(t)); } }); } @GET @Path("/{id}") @ApiOperation(value = "Retrieve single metric definition.", response = Metric.class) @ApiResponses(value = { @ApiResponse(code = 200, message = "Metric's definition was successfully retrieved."), @ApiResponse(code = 204, message = "Query was successful, but no metrics definition is set."), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching metric's definition.", response = ApiError.class) }) public void getMetric(@Suspended final AsyncResponse asyncResponse, @PathParam("id") String id) { metricsService.findMetric(new MetricId<>(getTenant(), AVAILABILITY, id)) .compose(new MinMaxTimestampTransformer<>(metricsService)) .map(metric -> Response.ok(metric).build()) .switchIfEmpty(Observable.just(noContent())) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(serverError(t))); } @DELETE @Path("/{id}") @ApiOperation(value = "Deletes the metric and associated uncompressed data points, and updates internal indexes." + " Note: compressed data will not be deleted immediately. It is deleted as part of the normal" + " data expiration as defined by the data retention settings. Consequently, compressed data will" + " be accessible until it automatically expires.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Metric deletion was successful."), @ApiResponse(code = 500, message = "Unexpected error occurred trying to delete the metric.") }) public void deleteMetric(@Suspended AsyncResponse asyncResponse, @PathParam("id") String id) { MetricId<AvailabilityType> metric = new MetricId<>(getTenant(), AVAILABILITY, id); metricsService.deleteMetric(metric).subscribe(new ResultSetObserver(asyncResponse)); } @GET @Path("/tags/{tags}") @ApiOperation(value = "Retrieve availability type's tag values", response = Map.class) @ApiResponses(value = { @ApiResponse(code = 200, message = "Tags successfully retrieved."), @ApiResponse(code = 204, message = "No matching tags were found"), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching tags.", response = ApiError.class) }) public void getTags(@Suspended final AsyncResponse asyncResponse, @ApiParam("Tag query") @PathParam("tags") Tags tags) { metricsService.getTagValues(getTenant(), AVAILABILITY, tags.getTags()) .map(ApiUtils::mapToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(ApiUtils.serverError(t))); } @GET @Path("/{id}/tags") @ApiOperation(value = "Retrieve tags associated with the metric definition.", response = String.class, responseContainer = "Map") @ApiResponses(value = { @ApiResponse(code = 200, message = "Metric's tags were successfully retrieved."), @ApiResponse(code = 204, message = "Query was successful, but no metrics were found."), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching metric's tags.", response = ApiError.class) }) public void getMetricTags( @Suspended final AsyncResponse asyncResponse, @PathParam("id") String id ) { metricsService.getMetricTags(new MetricId<>(getTenant(), AVAILABILITY, id)) .map(ApiUtils::mapToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(ApiUtils.serverError(t))); } @PUT @Path("/{id}/tags") @ApiOperation(value = "Update tags associated with the metric definition.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Metric's tags were successfully updated."), @ApiResponse(code = 500, message = "Unexpected error occurred while updating metric's tags.", response = ApiError.class) }) public void updateMetricTags( @Suspended final AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(required = true) Map<String, String> tags ) { Metric<AvailabilityType> metric = new Metric<>(new MetricId<>(getTenant(), AVAILABILITY, id)); metricsService.addTags(metric, tags).subscribe(new ResultSetObserver(asyncResponse)); } @DELETE @Path("/{id}/tags/{tags}") @ApiOperation(value = "Delete tags associated with the metric definition.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Metric's tags were successfully deleted."), @ApiResponse(code = 400, message = "Invalid tags", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error occurred while trying to delete metric's tags.", response = ApiError.class) }) public void deleteMetricTags( @Suspended final AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "Tag names", allowableValues = "Comma-separated list of tag names") @PathParam("tags") TagNames tags ) { Metric<AvailabilityType> metric = new Metric<>(new MetricId<>(getTenant(), AVAILABILITY, id)); metricsService.deleteTags(metric, tags.getNames()).subscribe(new ResultSetObserver(asyncResponse)); } @POST @Path("/{id}/raw") @ApiOperation(value = "Add data for a single availability metric.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Adding data succeeded."), @ApiResponse(code = 400, message = "Missing or invalid payload", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error happened while storing the data", response = ApiError.class) }) public void addMetricData( @Suspended final AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "List of availability datapoints", required = true) List<DataPoint<AvailabilityType>> data ) { Observable<Metric<AvailabilityType>> metrics = Functions.dataPointToObservable(getTenant(), id, data, AVAILABILITY); Observable<Void> observable = metricsService.addDataPoints(AVAILABILITY, metrics); observable.subscribe(new ResultSetObserver(asyncResponse)); } @Deprecated @POST @Path("/{id}/data") @ApiOperation(value = "Deprecated. Please use /raw endpoint.") public void deprecatedAddAvailabilityForMetric( @Suspended final AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "List of availability datapoints", required = true) List<DataPoint<AvailabilityType>> data) { addMetricData(asyncResponse, id, data); } @POST @Path("/raw") @ApiOperation(value = "Add metric data for multiple availability metrics in a single call.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Adding data succeeded."), @ApiResponse(code = 400, message = "Missing or invalid payload", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error happened while storing the data", response = ApiError.class) }) public void addData( @Suspended final AsyncResponse asyncResponse, @ApiParam(value = "List of availability metrics", required = true) @JsonDeserialize() List<Metric<AvailabilityType>> availabilities ) { Observable<Metric<AvailabilityType>> metrics = Functions.metricToObservable(getTenant(), availabilities, AVAILABILITY); Observable<Void> observable = metricsService.addDataPoints(AVAILABILITY, metrics); observable.subscribe(new ResultSetObserver(asyncResponse)); } @POST @Path("/raw/query") @ApiOperation(value = "Fetch raw data points for multiple metrics. This endpoint is experimental and may " + "undergo non-backwards compatible changes in future releases.") @ApiResponses(value = { @ApiResponse(code = 200, message = "Successfully fetched metric data points."), @ApiResponse(code = 204, message = "Query was successful, but no data was found."), @ApiResponse(code = 400, message = "No metric ids are specified", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching metric data.", response = ApiError.class) }) @Override public void getData( @Suspended AsyncResponse asyncResponse, @ApiParam(required = true, value = "Query parameters that minimally must include a list of metric ids or " + "tags. The standard start, end, order, and limit query parameters are supported as well.") QueryRequest query) { findMetricsByNameOrTag(query.getIds(), query.getTags(), AVAILABILITY) .toList() .flatMap(metricIds -> TimeAndSortParams.<AvailabilityType>deferredBuilder(query.getStart(), query.getEnd()) .fromEarliest(query.getFromEarliest(), metricIds, this::findTimeRange) .sortOptions(query.getLimit(), query.getOrder()) .toObservable() .flatMap(p -> metricsService.findDataPoints(metricIds, p.getTimeRange().getStart(), p.getTimeRange().getEnd(), p.getLimit(), p.getOrder()) .observeOn(Schedulers.io()))) .subscribe(createNamedDataPointObserver(asyncResponse, AVAILABILITY)); } @Deprecated @POST @Path("/data") @ApiOperation(value = "Deprecated. Please use /raw endpoint.") public void deprecatedAddAvailabilityData( @Suspended final AsyncResponse asyncResponse, @ApiParam(value = "List of availability metrics", required = true) @JsonDeserialize() List<Metric<AvailabilityType>> availabilities ) { addData(asyncResponse, availabilities); } @Deprecated @GET @Path("/{id}/data") @ApiOperation(value = "Deprecated. Please use /raw or /stats endpoints.", response = DataPoint.class, responseContainer = "List") public void deprecatedFindAvailabilityData( @Suspended AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "Defaults to now - 8 hours") @QueryParam("start") String start, @ApiParam(value = "Defaults to now") @QueryParam("end") String end, @ApiParam(value = "Total number of buckets") @QueryParam("buckets") Integer bucketsCount, @ApiParam(value = "Bucket duration") @QueryParam("bucketDuration") Duration bucketDuration, @ApiParam(value = "Set to true to return only distinct, contiguous values") @QueryParam("distinct") @DefaultValue("false") Boolean distinct, @ApiParam(value = "Limit the number of data points returned") @QueryParam("limit") Integer limit, @ApiParam(value = "Data point sort order, based on timestamp") @QueryParam("order") Order order ) { if ((bucketsCount != null || bucketDuration != null) && (limit != null || order != null)) { asyncResponse.resume(badRequest(new ApiError("Limit and order cannot be used with bucketed results"))); return; } TimeRange timeRange = new TimeRange(start, end); if (!timeRange.isValid()) { asyncResponse.resume(badRequest(new ApiError(timeRange.getProblem()))); return; } BucketConfig bucketConfig = new BucketConfig(bucketsCount, bucketDuration, timeRange); if (!bucketConfig.isValid()) { asyncResponse.resume(badRequest(new ApiError(bucketConfig.getProblem()))); return; } MetricId<AvailabilityType> metricId = new MetricId<>(getTenant(), AVAILABILITY, id); Buckets buckets = bucketConfig.getBuckets(); if (buckets == null) { if (limit == null) { limit = 0; } if (order == null) { order = Order.defaultValue(limit, start, end); } metricsService .findAvailabilityData(metricId, timeRange.getStart(), timeRange.getEnd(), distinct, limit, order) .toList() .map(ApiUtils::collectionToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(serverError(t))); } else { metricsService.findAvailabilityStats(metricId, timeRange.getStart(), timeRange.getEnd(), buckets) .map(ApiUtils::collectionToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(serverError(t))); } } @GET @Path("/{id}/raw") @ApiOperation(value = "Retrieve availability data.", response = DataPoint.class, responseContainer = "List") @ApiResponses(value = { @ApiResponse(code = 200, message = "Successfully fetched availability data."), @ApiResponse(code = 204, message = "No availability data was found."), @ApiResponse(code = 400, message = "buckets or bucketDuration parameter is invalid, or both are used.", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching availability data.", response = ApiError.class) }) public void getMetricData( @Suspended AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "Defaults to now - 8 hours") @QueryParam("start") String start, @ApiParam(value = "Defaults to now") @QueryParam("end") String end, @ApiParam(value = "Use data from earliest received, subject to retention period") @QueryParam("fromEarliest") Boolean fromEarliest, @ApiParam(value = "Set to true to return only distinct, contiguous values") @QueryParam("distinct") @DefaultValue("false") Boolean distinct, @ApiParam(value = "Limit the number of data points returned") @QueryParam("limit") Integer limit, @ApiParam(value = "Data point sort order, based on timestamp") @QueryParam("order") Order order ) { MetricId<AvailabilityType> metricId = new MetricId<>(getTenant(), AVAILABILITY, id); TimeAndSortParams.<AvailabilityType>deferredBuilder(start, end) .fromEarliest(fromEarliest, metricId, this::findTimeRange) .sortOptions(limit, order) .toObservable() .flatMap(p -> metricsService.findAvailabilityData(metricId, p.getTimeRange().getStart(), p .getTimeRange().getEnd(), distinct, p.getLimit(), p.getOrder())) .toList() .map(ApiUtils::collectionToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(ApiUtils.error(t))); } @GET @Path("/{id}/stats") @ApiOperation(value = "Retrieve availability data.", notes = "Based on buckets or bucketDuration query parameter" + ", the time range between start and end will be divided in buckets of equal duration, and " + "availability statistics will be computed for each bucket.", response = AvailabilityBucketPoint.class, responseContainer = "List") @ApiResponses(value = { @ApiResponse(code = 200, message = "Successfully fetched availability data."), @ApiResponse(code = 204, message = "No availability data was found."), @ApiResponse(code = 400, message = "buckets or bucketDuration parameter is invalid, or both are used.", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching availability data.", response = ApiError.class) }) public void getMetricStats( @Suspended AsyncResponse asyncResponse, @PathParam("id") String id, @ApiParam(value = "Defaults to now - 8 hours") @QueryParam("start") String start, @ApiParam(value = "Defaults to now") @QueryParam("end") String end, @ApiParam(value = "Use data from earliest received, subject to retention period") @QueryParam("fromEarliest") Boolean fromEarliest, @ApiParam(value = "Total number of buckets") @QueryParam("buckets") Integer bucketsCount, @ApiParam(value = "Bucket duration") @QueryParam("bucketDuration") Duration bucketDuration) { MetricId<AvailabilityType> metricId = new MetricId<>(getTenant(), AVAILABILITY, id); TimeAndBucketParams.<AvailabilityType>deferredBuilder(start, end) .fromEarliest(fromEarliest, metricId, this::findTimeRange) .bucketConfig(bucketsCount, bucketDuration) .toObservable() .flatMap(p -> metricsService.findAvailabilityStats(metricId, p.getTimeRange().getStart(), p.getTimeRange().getEnd(), p.getBucketConfig().getBuckets())) .flatMap(Observable::from) .skipWhile(bucket -> Boolean.TRUE.equals(fromEarliest) && bucket.isEmpty()) .toList() .map(ApiUtils::collectionToResponse) .subscribe(asyncResponse::resume, t -> asyncResponse.resume(ApiUtils.error(t))); } @GET @Path("/tags/{tags}/raw") @ApiOperation(value = "Retrieve availability data on multiple metrics by tags.", response = DataPoint.class, responseContainer = "List") @ApiResponses(value = { @ApiResponse(code = 200, message = "Successfully fetched metric data points."), @ApiResponse(code = 204, message = "Query was successful, but no data was found."), @ApiResponse(code = 400, message = "No metric ids are specified", response = ApiError.class), @ApiResponse(code = 500, message = "Unexpected error occurred while fetching metric data.", response = ApiError.class) }) public void getRawDataByTag( @Suspended AsyncResponse asyncResponse, @PathParam("tags") String tags, @ApiParam(value = "Defaults to now - 8 hours") @QueryParam("start") String start, @ApiParam(value = "Defaults to now") @QueryParam("end") String end, @ApiParam(value = "Use data from earliest received, subject to retention period") @QueryParam("fromEarliest") Boolean fromEarliest, @ApiParam(value = "Limit the number of data points returned") @QueryParam("limit") Integer limit, @ApiParam(value = "Data point sort order, based on timestamp") @QueryParam("order") Order order ) { metricsService.findMetricIdentifiersWithFilters(getTenant(), AVAILABILITY, tags) .toList() .flatMap(metricIds -> TimeAndSortParams.<AvailabilityType>deferredBuilder(start, end) .fromEarliest(fromEarliest, metricIds, this::findTimeRange) .sortOptions(limit, order) .toObservable() .flatMap(p -> metricsService.findDataPoints(metricIds, p.getTimeRange().getStart(), p.getTimeRange().getEnd(), p.getLimit(), p.getOrder()) .observeOn(Schedulers.io()))) .subscribe(createNamedDataPointObserver(asyncResponse, AVAILABILITY)); } }
Low
[ 0.518595041322314, 31.375, 29.125 ]
Consult Experts Overview Of Valley Of Flowers Trek Valley of Flowers trek starts from Auli. Auli is itself a beautiful place and the scenario gets better and better as you go up. It is in the Chamoli district in the Nanda Devi Biosphere. It is beautiful trek and apt for summer trekking. It is filled with thousands of blossoms of the alpine region. This is also recognized as the UNESCO Heritage Site. Valley of Flowers is also one of the most different treks in Himalayas as it has a large population of flora and fauna. On the way up in this trek you will find endangered animals, including the Asiatic black bear, snow leopard, musk deer, brown bear, red fox, and blue sheep.Valley of Flowers Trekking is not a very difficult trek and can be done by beginners. It is also one of the most beautiful treks due to its enriched Flora and Fauna. This trek gives a deep insight to the wildlife on Himalayas and is great for photography.Valley of Flowers Trekking Cost is cheap and is affordable by many people. Anyone can go on this trek even with tight pocket and enjoy the nature in its true form. Valley of Flowers Trekking Package is also very reasonable, Travel Banjare makes sure that the trek is done with the most comfort and the safety of the trekkers is our prime concern. Trek Per Person Why Travel Banjare We believe in the concept of small batches with proper safety equipments. We have a team of certified, qualified and experienced team of trek leader and guides. We provide Service of experienced Cook, Helpers, Porters/Mules. We are equipped with best quality equipment with certified first aid support and emergency evacuation plan. We believe in the concept of Green trail by disposing all our trash in our campsites so that we literally leave no trace on our campsites. Our aim is to improve the welfare of local people. Short Itinerary Day 1 : Drive from Haridwar/Rishikesh to Govindghat.(5.998 Ft) Day 2 : Trek from Govindghat to Ghangaria.(10,003 ft). Day 3 : Trek from Ghangria to Valley of Flowers (11.500 ft) and back. Day 4 : Trek from Ghangaria to Hemkund Sahib (14,107 ft ) and back. Day 5 : Trek from Ghangaria to Govindghat. Day 6 : Drive back to Haridwar/Rishikesh from Govindghat. Available Dates Detailed Itinerary How to Prepare? Things To Take Gallery how to reach there?? Day 1: Drive from Haridwar/Rishikesh to Govindghat.(5.998 Ft) Morning after breakfast, drive to reach Joshimath (1828mt / 300Km) which is the winter abode of Lord Badrinath. Lunch enroute. Evening arrive at Govindghat and check into the hotel Overnight: Hotel. Day 2: Trek from Govindghat to Ghangaria.(10,003 ft). The trek traditionally starts from Govindghat but these days there is a possibility to reach Pulna and save a 3 Km hike from Govindaghat. However, the movement of taxis till Pulna is restricted and permits are given to only limited number of vehicles. In case we get a permit, we start from Pulna else we can also start from Goindghat. The entire trail to Ghangaria winds along the river with cascading waterfalls & natural water springs which present a very refreshing sight. It takes about 6 hours to reach Ghangaria which is small village lined with food joints & a Gurudwara. Stay overnight in Guest house/hotel on sharing basis. Day 3: Trek from Ghangria to Valley of Flowers (11.500 ft) and back. Trek to the Valley of Flowers. The whole valley is dotted with varieties of exotic flowers and other flora. Return to Ghangria for overnight stay. Day 4: Trek from Ghangaria to Hemkund Sahib (14,107 ft ) and back. Early in the morning start trekking (7 Km) to reach "HEMKUND SAHIB". One of the most revered of all Sikh Shrines, The Hemkund Sahib, the World’s Highest Gurudwara, is situated at an altitude of 4,329 mts. In the afternoon trek down to reach Ghangariya for overnight stay. Evening is free for rest & relaxation. Overnight stay. Day 5: Trek from Ghangaria to Govindghat. We trek back to Govindghat and from here we drive to Joshimath. Upon arrival at Govindghat / Joshimath check into a hotel. Rest of the day is free to explore this picturesque area. Day 6: Drive back to Haridwar/Rishikesh from Govindghat. Drive back to Haridwar/Rishikesh from Govindghat. GET YOURSELF FIT GET YOURSELF FIT As we gain higher altitude, the air becomes thinner. To overcome this we need to develop our aerobic fitness. The more fitter you are, you will enjoy more during the trek. Accessories: How to reach ?? Haridwar Haridwar is the base location for our Valley of Flowers trek and not Govindghat or Joshimath. Our meeting point in Haridwar is railway station. We will pick you up at 6:00 AM in the morning and start the drive to Govindghat. The entire drive from Haridwar to Govindghat takes around 10 Hours. Reaching Haridwar by Flights Jolly Grant Airport is the nearest Airport to Haridwar and is situated 36 Kms from Haridwar. Taxis are easily available from Jolly Grant Airport to Haridwar.
Mid
[ 0.62532299741602, 30.25, 18.125 ]
Q: Mocking with domain values I am wondering how can i set domain values or range of values on mocking. trait MyInt{ def getInt():Int } trait MyString{ def getName():String } I have tried some but nothing works. I like to define a mock of MyInt to return values from (0,100) and MyString trait to return values from this domain: {"Dani",Jonny",Jessica",....}. How can i write that using scalatest? A: Using mockito plus scalatest import org.mockito.Mockito._ import org.scalatest.FlatSpec import org.scalatest.mock.MockitoSugar import scala.util.Random class FirstSpec extends FlatSpec with MockitoSugar { "The mock" should "pick a value from the interval" in { val mockInt = mock[MyInt] val mockStr = mock[MyString] when(mockInt.getInt()).thenReturn(pickOneFrom(1 to 100 toList)) when(mockStr.getName()).thenReturn(pickOneFrom(List("Dani", "Jonny", "Jessica"))) println(mockInt.getInt()) println(mockStr.getName()) } } where pickOne would be defined as def pickOneFrom[T](domain: List[T]) = domain(Random.nextInt(domain.length))
High
[ 0.671328671328671, 36, 17.625 ]
The object of this proposal is to obtain a better understanding of vitamin D action on intestinal calcium transport. Vitamin D is a principal factor required for the development and maintenance of bone and for the maintenance of calcium homeostasis. It is well established that vitamin D mediates active transcellular transport of calcium in the intestine. Recent findings show that components of tight junctions and cell adhesion proteins are novel targets of vitamin D action in the intestine. The hypothesis to be tested is that vitamin D mediates intestinal calcium transport not only by the established active transport pathway but also via the paracellular pathway. Studies are proposed to examine these novel targets of vitamin D action that include claudin-2, claudin-12 and cadherin-17;proteins that are components of the extracellular matrix between intestinal cells where passive calcium transport occurs. Proposed studies will examine (1) levels of these proteins in the duodenum, jejunum and ileum of vitamin D deficient mice and after 1,25(OH)2D3 administration, and (2) under conditions of high and low dietary calcium conditions. Claudin-2, claudin-12 and cadherin-17 will also be (3) examined in TRPV6/calbindin-D9K DKO mice, where intestinal calcium absorption occurs despite ablation of TRPV6 and calbindin-D9k, proteins thought to be involved in the active transcellular transport of calcium. The proposed research (4) will involve undergraduate students in all phases including experimental design, laboratory preparation, execution of experiments, data collection and analysis, scientific write-up and presentation of the results. The experience will provide undergraduates with a foundation in contemporary research concepts and methodology related to the function of proteins in cell physiology. Experiments proposed will give insight for the first time into the in vivo role of the extracellular matrix proteins claudin-2, claudin-12 and cadherin-17 in vitamin D mediated intestinal calcium transport in the duodenum, jejunum and ileum. Insight into how vitamin D regulates the paracellular process will provide a more complete understanding of 1,25(OH)2D3 mediated intestinal calcium absorption. Elucidation of these mechanisms is critical to the future development of drugs that may influence calcium entry by the intestine, helping to maintain calcium homeostasis in metabolic and degenerative diseases associated with calcium imbalance such as osteoporosis. PUBLIC HEALTH RELEVANCE: Experiments proposed will give insight for the first time into the in vivo role of the extracellular matrix proteins claudin-2, claudin-12 and cadherin-17 in vitamin D mediated intestinal calcium transport in the duodenum, jejunum and ileum. Insight into how vitamin D regulates the paracellular process will provide a more complete understanding of 1,25(OH)2D3 mediated intestinal calcium absorption. Elucidation of these mechanisms is critical to the future development of drugs that may influence calcium entry by the intestine, helping to maintain calcium homeostasis in metabolic and degenerative diseases associated with calcium imbalance such as osteoporosis.
High
[ 0.685573366214549, 34.75, 15.9375 ]
Wednesday Addams Wig - The Addams Family Online Only | SKU: 321654 Price: $16.99 Make every day Wednesday with this Wednesday Addams Wig! The Addams Family Wednesday Addams Wig features the familiar center part and long black pigtails of the Wednesday character from the Addams Family series. 100% synthetic fiber. One size Wednesday Addams Wig fits most adults. Wig cap recommended (sold separately). This is a great wig for the price. It runs a little small, so if your head is larger than normal, this might not work for you. However, it works great for the kids in our production and they look excellent on stage!
Low
[ 0.514522821576763, 31, 29.25 ]
The Glasgow Prognostic Score (GPS) predicts toxicity and efficacy in platinum-based treated patients with metastatic lung cancer. Lung cancer is the most common cause of cancer death. A cumulative prognostic score based on C-reactive protein and albumin, termed the Glasgow Prognostic Score (GPS), indicates the presence of systemic inflammatory response. GPS has been proposed as a powerful prognostic tool for patients with various types of malignant tumors, including lung cancer. The aim of this study was to assess the predictive value of baseline GPS in terms of toxicity and response in lung cancer patients treated with platinum-based chemotherapy. Patients referred to our institution for consideration of first-line platinum-based treatment were eligible. Demographics and disease-related characteristics were recorded. Toxicity was graded according to NCI CTCAE version 3.0 throughout first-line therapy. GPS was calculated before the onset of treatment and was related to the development of toxicity. Response to first-line therapy and survival data were also collected. Totally, 96 lung cancer patients were accrued. GPS was associated with increased mucositis p=0.004), neurotoxicity (p=0.038), neutropenia (p=0.02), dose reductions or/ and need for granulocyte colony-stimulating factor (G-CSF) support (p=0.005), toxicity-related termination of treatment (p=0.001) and chemotherapy-related toxic deaths (p=0.013). GPS was associated with overall survival (p=0.016) and progression-free survival (p=0.016) as well as response to treatment (p=0.05). Our data demonstrate that GPS assessment is predictive of the most important aspects of platinum-related toxicity and this may partly explain its associations with poor clinical outcome in patients with metastatic lung cancer.
High
[ 0.7097661623108661, 32.25, 13.1875 ]
Field of the Invention The present invention relates to a process for producing a target intended to be used in deposition processes carried out in a vacuum or in an inert or reactive atmosphere, especially by magnetron sputtering or by ion beam sputtering. According to another aspect of the invention, it also relates to a molybdenum-based target possibly obtained by implementing said process and to the use of such a target for the purpose of obtaining films based on the material sputtered from said target, and also to a composition of the compound for producing said target by the process according to the invention. Description of Related Art Various techniques for manufacturing targets, including certain powder forming techniques, are known. Thus, the targets in question may result from a casting process or a powder sintering process followed by forming operations, often hot forming, and then assembly on a support, or direct assembly of sintered segments, or less conventionally a technique of thermal spraying and more particularly a plasma spraying technique. These targets are intended to be used in processes commonly employed on an industrial scale for thin film deposition, especially on a glass substrate, such as for example the magnetron sputtering process. In this process, a plasma is created in a high vacuum close to a target comprising the chemical elements to be deposited. The active species of the plasma, by bombarding the target, tear off said elements, which are deposited on the substrate, forming the desired thin film. In the specific case of a target intended for depositing molybdenum, a nonreactive deposition process is used in which the plasma is composed only of a sputtering gas, preferably a noble gas of the Ar, Kr, Xe or Ne type. This process is implemented for large substrates and may enable thin films to be deposited on substrates, for example flat glass sheets with sides of more than 6 m in length. These targets have a planar geometry or a tubular geometry. Planar targets have the advantage of being able to be integrated in cathodes of relatively simple architecture compared with cathodes dedicated to rotary targets, which are much more complex. However, planar targets have a utilization factor which is generally 50% or less, which is not the case for rotary targets that have a utilization factor substantially greater than 50%. In the specific case of thin molybdenum films, molybdenum being a particularly expensive metal, it is preferred to use rotary targets of cylindrical geometry, as described in the U.S. Pat. No. 4,356,073 since these targets have a material yield (representing the proportion of sputtered material relative to the amount of material available on the target for producing a thin film) of greater than 70%, preferably greater than 75%. However, various other magnetron target geometries are known: planar (disk, square, rectangular) geometries and the invention is also applicable to geometries other than cylindrical ones. The following literature data for pure molybdenum are given below: density: 10.28 g/cm3; thermal expansion: 4.8×10−6 K−1; Young's modulus: 324 N/mm2; electrical resistivity: 5.34 μohms·cm; thermal conductivity: 139 W/mK; melting point: 2630° C. Furthermore, there are also other vacuum processes for depositing molybdenum other than magnetron sputtering using a target: these include laser sputtering (laser ablation using a pulsed or continuous laser) and ion beam sputtering for example. These processes may also benefit from the use of a target according to the invention. As regards more particularly molybdenum magnetron targets or those made of other refractory metals, many inventions have been filed relating to the following processes and forming the subject matter of the patent applications listed below: Patent applications EP 1 784 518, US 2008/0193798 and WO 2006/041730: Pressing then sintering of an ingot or a preform (under a pressure of 200 to 250 MPa and at a temperature of 1780 to 2175° C.) followed by hot forming (at about 900° C.) of this preform by rolling or extrusion or forging. Generally, this process also includes a heat treatment in hydrogen or a reducing atmosphere in order to reduce the oxide content in the target and optionally a stress relaxation annealing treatment. Also known, from patent application WO 2006/117145, is the complete or partial construction, or restoration, of targets by cold spraying, which consists in spraying a gas/powder mixture at supersonic velocity, the powder not being in the molten state, thereby differing from the thermal spraying processes. Although the above documents also cover the production of targets having various compositions using these methods, pure molybdenum targets usually have the following properties: purity: >99.95%; density: >95% of the theoretical density; fine-grained microstructure. Targets having these characteristics are sputtered so as to obtain thin films that are used for example as electrodes for photovoltaic applications based on an active material belonging to the chalcopyrite family (CIS or CIGS for example). Molybdenum provides a good compromise between electrical conductivity (less than 30 μohms·cm), temperature resistance (refractory properties: melting point: 2610° C.) and high selenization resistance. This is because molybdenum has a higher resistance to the selenium-rich atmosphere used during the CIS or CIGS deposition step, molybdenum reacting on the surface with selenium to form an MoSe2 passivating layer without losing its electrical conduction properties, or else for TFT (thin film transistor) applications that require extremely low defect (“pinhole”) densities. Maximum pinhole densities of 500/m2 with a size between 1 and 5 μm may especially be mentioned. Such quality levels can be achieved only if the sputtering process is devoid of any electrical instability of the arcing type. This is especially possible when the target has significantly no porosity, i.e. with a density of at least 90%.
Mid
[ 0.6183574879227051, 32, 19.75 ]
You could if your leavening is yeast based, but not if they are baking powder/soda pancakes. Depending on the proportions and technique of your recipe (separated eggs?)you might be able to combine the batch with some sourdough starter the night before the morning you plan to serve them, or alternatively to add extra milk and turn it into a crepe like batter. It depend on what and how much of it is in you recipe. I used to make pancake batter on Sunday night, and then fry up a few pancakes each morning over the next 3-4 days before my daughter went to school. The first couple of days' worth were absolutely fine, as if I had just made the batter. Day 3 and 4, the pancakes had less air and were flatter. And on day 4, if we got that far, the batter was a bit grey, but the odor and flavor was fine.
Mid
[ 0.58695652173913, 33.75, 23.75 ]
Search CS Top 10 Searches Prankerd Jones Prize in Immunology Founded in 1983 in memory of Nicola Prankerd (a former student of the School of Medicine (1976-82), her brother, Richard Prankerd and Alison Jones (a former student of the Slade School of Fine Art (1976-80), all of whom were murdered in Zimbabwe in 1982. The fund was subscribed to by their families and relatives, the Sir Jules Thorn Charitable Trust, the "Friends of University College" and many other benefactors A prize known as the Prankerd Jones Prize in Immunology may be awarded each session. The Prize is awarded by the Council on the recommendation of the Faculty of Life Sciences. The Prize is awarded to the best student in the intercalating year in the Department of Immunology who had previously completed the Basic Medical Sciences course at University College London. The value of the Prize is £50. No application is necessary. The qualification of candidates are considered by the Head of the Department of Immunology. The award is announced in July. The College reserves the right to vary these regulations should it become necessary to do so in order to ensure the continued use of the resources in the fund.
Mid
[ 0.6271604938271601, 31.75, 18.875 ]
Photo: The Howard Stern Show Sacha Baron Cohen returned to the Stern Show on Tuesday to talk to Howard about his newest comedy “The Brothers Grimsby.” The conversation covered an array of topics ranging from his surprise Ali G appearance at the Oscars to a failed attempt at a Freddie Mercury biopic and why he refused to stand down on a Donald Trump joke. Check out all the details below. Becoming a Soccer Hooligan Once Sacha entered the studio, Howard introduced the British comedian’s newest action comedy “The Brothers Grimsby,” which is about two English brothers separated at a very young age. One brother grows up to become the world’s best secret agent (Mark Strong) while the other becomes a soccer hooligan (Sacha Baron Cohen). Howard wanted to know more about what it meant to be a hooligan, so Sacha explained to get into his role he had to visit a few soccer clubs, which is another name for a pub and not the safest place to be hanging around. Sacha hired a bodyguard to go with him to visit one of the most dangerous groups, the Special Crew. The guard told him, “Listen, just so you know I’m going to be blending in … If anyone knows you’ve got a bodyguard, you’re in trouble,” the guard told Sacha. All of the sudden the bodyguard had one beer after another in his hand, Sacha told Howard. Within a half hour of entering the pub, Sacha’s trusty protection was passed out on the floor. The guard was a local guy and apparently got a little too into character while going “undercover.” Curious about the lifestyle, Sacha asked one Special Crew member for a funny story and this is what he was told: “There’s one time I was in Manchester and we kidnapped this man. We brought him back to his house and we put barbed wire on places on his body that we shouldn’t have and then we blew up his garage,” the hooligan told Sacha. Sacha replied, “Uh, have you got any even funnier stories?” Howard was amazed at the length at which Sacha will go to get into his characters but that was only the tip of the iceberg in this rowdy English bar. Getting Past the MPAA Howard wanted to know what drove Sacha to create such wild and over-the-top movies like “Borat” and “Bruno.” “The reality is this, personally I get very bored seeing almost every movie. I find it hard to sit there, I find it hard to get to the end,” Sacha told him. “I try to make these films engaging.” Howard pointed out in Sacha’s new flick there are about five or six moments that are really over the top. Howard asked Sacha if he dreads showing the movie to Sony executives once it’s finished to which Sacha replied, “Yes, but the studio actually loved the movie when they screened it.” The real test for Sacha is getting the movie by the MPAA (the Motion Picture Association of America) since they’re the ones who designate the official movie rating. Sacha recounted how he convinced the MPAA to give Bruno an R rating when by his own admission it should’ve been NC-17 due to a 45-second continuous shot of a penis. “I know that I have a game with the MPAA,” he said, revealing that there is a method to his perceived madness. In his latest flick there’s an insane bit where the two brothers need to “hide inside of an elephant’s vagina” and Sacha knew heading into his meeting with the MPAA that he wanted the scene to be about three minutes long. To get his wish he delivered a cut with a nine-minute version of this scene so that when he cut out six minutes it would seem like the MPAA got a small victory. Using the Top Special Effects Team in the Industry Howard was impressed how realistic the film elephant’s penis looked in the movie. Sacha informed Howard that he hired Ridley Scott’s prosthetics team. Cohen had the same special effects masters from movies like “Star Wars” to replicate the pachyderm’s phallic member. There were months of preparations that went into an “animatronic cock,” he told Howard. Another memorable scene in the movie involved a large amount of elephant ejaculate and Sacha revealed his secret for making realistic-looking animal semen. “I’m going to tell you something about the elephant cum,” Sacha began. “The fluid that most approximates elephant cum is McDonald’s sauce.” And that is indeed what Sacha said he used for the film. A Run in With Wladimir Klitschko Photo: Landmark / PR Photos Howard wanted to know if Sacha had ever offended someone so bad, he feared physical harm. Sacha told Howard a story of how he ran into Olympic gold medalist and former boxing heavyweight champion Wladimir Klitschko at a restaurant a few years ago. Normally, that wouldn’t be a big deal but Mr. Klitschko is from Kazakhstan, the country Sacha’s Borat character claims as home. A waiter approached Sacha at the restaurant and told him that Klitschko would love to meet him. Sacha walked over to his table and extended his hand, which Klitschko firmly gripped with no intention of letting go. Soon Sacha’s wife and fellow actor Isla Fisher came over pretending to be a massive fan and asked for an autograph so Wladimir would release her husband’s hand, but that proved to not work as the former heavyweight pulled Sacha closer and quietly told him: “You humiliated my country. I’m from Kazakhstan. Why did you do that?” “I’m actually looking for stuff on the table to grab hold of and like, get a fork and stab him,” Sacha half-joked to Howard. The actor pleaded with him that it was only a joke and after a painful three minutes, Wladimir started to laugh and told Sacha he was joking and didn’t mind the film at all. In fact, he said he thought it was funny. Dave Chappelle Supported Ali G’s Oscar Appearance At last month’s Academy Awards, Sacha once again pulled one over on the powers that be during Hollywood’s most prestigious award show. They tried to forbid him from doing anything off-script, which turned out to push him even further into the bit. At this year’s event, the lack of diversity amongst nominees was a hot button topic in the weeks leading up to the show. Sacha figured this would be a great impetus for Ali G to make an appearance. Sacha told Howard he knew what he wanted his opening line to be: “I know what yous all are thinking, the academy has brought on another token black presenter.” But before going through with it, Cohen found an English friend to run it past. The friend told him it was a bad idea, so he found someone more fitting to give him the green light to do the joke: Dave Chappelle. Sacha saw Chappelle backstage and he quickly pitched him the line he wanted to say when he walked out. Dave told him that it was “great” and gave him the proverbial thumbs up to do it. Sacha admits that had Dave not given him the go ahead he probably wouldn’t have said the controversial line. It was ultimately Cohen’s wife Isla Fisher who smuggled the Ali G costume in. And to truly prepare, he and his wife had to disappear into a bathroom for 40 minutes so Sacha could apply his character’s facial hair. As producers frantically searched for the actor, Sacha’s publicist told them he had diarrhea and wasn’t feeling well. When he finally came out of the bathroom, Sacha said he had to cover his beard with his hand so no one would be wise to his plan before walking out on stage. He informed his co-presenter, Olivia Wilde, seconds before walking out and she was totally into it, helping him put the final touches on his appearance. Sacha explained that once he walked on stage though, things felt off: “I was worried because I went out there I didn’t hear any … reaction,” he admitted. “And then I realized actually eventually the camera was not on me” yet. Once the camera did land on Cohen, he heard a nice gasp from the audience. “I’m always trying to get fired,” he joked. A Failed Freddie Mercury Biopic Howard also asked about the Freddie Mercury biopic Cohen had reportedly been working on for six years. Sacha said in the end, it just didn’t pan out as he craved a grittier, edgier film than what the remaining Queen band members desired. “There are amazing stories about Freddie Mercury … the guy was wild,” he explained. The band, though, seemed to be more interested in protecting their legacy than promoting the true embodiment of arguably one of the greatest voices rock has ever known, in Cohen’s opinion. Sacha admitted he should’ve dropped out of the project after the first meeting when one of the band members – Sacha wouldn’t say which one – told him that Freddie Mercury’s character would die halfway through the movie. Sacha assumed they wanted to make a “Pulp Fiction” type movie where everything was out of order. But the truth was the band wanted a linear movie that showed how well they all did after Freddie’s untimely death. At the end of the day, Sacha chalked it up to an “artistic difference.” A Controversial Donald Trump Scene In Sacha’s newest movie “The Brothers Grimsby,” there’s a controversial scene that depicts G.O.P. presidential candidate Donald Trump contracting H.I.V. “We actually had an argument with the studio about it,” Sacha told Howard. “They said you have to put in a card at the end saying, ‘Donald Trump was not involved in the movie and is not H.I.V. positive.’ And I fought them on it.” The studio was presumably afraid that the Donald would sue them, not to mention that he might be the next U.S. president. In the end, Sacha pointed out that he couldn’t prove that Donald Trump didn’t have H.I.V. so he wasn’t comfortable putting that card up. Make sure to go out and see “The Brothers Grimsby” in theaters everywhere Friday, March 11.
Low
[ 0.5353982300884951, 30.25, 26.25 ]
/* * serial-iec.h * * Written by * Andreas Boose <[email protected]> * * This file is part of VICE, the Versatile Commodore Emulator. * See README for copyright notice. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA * 02111-1307 USA. * */ #ifndef VICE_SERIAL_IEC_H #define VICE_SERIAL_IEC_H #include "types.h" extern int serial_iec_open(unsigned int unit, unsigned int secondary, const char *name, unsigned int length); extern int serial_iec_close(unsigned int unit, unsigned int secondary); extern int serial_iec_read(unsigned int unit, unsigned int secondary, uint8_t *data); extern int serial_iec_write(unsigned int unit, unsigned int secondary, uint8_t data); extern int serial_iec_flush(unsigned int unit, unsigned int secondary); #endif
Mid
[ 0.613810741687979, 30, 18.875 ]
/* * Copyright (c) 1996, 2017, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ /* * The Toolkit class has two functions: it instantiates the AWT * ToolkitPeer's native methods, and provides the DLL's core functions. * * There are two ways this DLL can be used: either as a dynamically- * loaded Java native library from the interpreter, or by a Windows- * specific app. The first manner requires that the Toolkit provide * all support needed so the app can function as a first-class Windows * app, while the second assumes that the app will provide that * functionality. Which mode this DLL functions in is determined by * which initialization paradigm is used. If the Toolkit is constructed * normally, then the Toolkit will have its own pump. If it is explicitly * initialized for an embedded environment (via a static method on * sun.awt.windows.WToolkit), then it will rely on an external message * pump. * * The most basic functionality needed is a Windows message pump (also * known as a message loop). When an Java app is started as a console * app by the interpreter, the Toolkit needs to provide that message * pump if the AWT is dynamically loaded. */ #ifndef AWT_TOOLKIT_H #define AWT_TOOLKIT_H #include "awt.h" #include "awtmsg.h" #include "Trace.h" #include "sun_awt_windows_WToolkit.h" class AwtObject; class AwtDialog; class AwtDropTarget; typedef VOID (CALLBACK* IDLEPROC)(VOID); typedef BOOL (CALLBACK* PEEKMESSAGEPROC)(MSG&); // Struct for _WInputMethod_enable|disableNativeIME method struct EnableNativeIMEStruct { jobject self; jobject peer; jint context; jboolean useNativeCompWindow; }; /* * class JNILocalFrame * Push/PopLocalFrame helper */ class JNILocalFrame { public: INLINE JNILocalFrame(JNIEnv *env, int size) { m_env = env; int result = m_env->PushLocalFrame(size); if (result < 0) { DASSERT(FALSE); throw std::bad_alloc(); } } INLINE ~JNILocalFrame() { m_env->PopLocalFrame(NULL); } private: JNIEnv* m_env; }; /* * class CriticalSection * ~~~~~ ~~~~~~~~~~~~~~~~ * Lightweight intra-process thread synchronization. Can only be used with * other critical sections, and only within the same process. */ class CriticalSection { public: INLINE CriticalSection() { ::InitializeCriticalSection(&rep); } INLINE ~CriticalSection() { ::DeleteCriticalSection(&rep); } class Lock { public: INLINE Lock(const CriticalSection& cs) : critSec(cs) { (const_cast<CriticalSection &>(critSec)).Enter(); } INLINE ~Lock() { (const_cast<CriticalSection &>(critSec)).Leave(); } private: const CriticalSection& critSec; }; friend class Lock; private: CRITICAL_SECTION rep; CriticalSection(const CriticalSection&); const CriticalSection& operator =(const CriticalSection&); public: virtual void Enter() { ::EnterCriticalSection(&rep); } virtual BOOL TryEnter() { return ::TryEnterCriticalSection(&rep); } virtual void Leave() { ::LeaveCriticalSection(&rep); } }; // Macros for using CriticalSection objects that help trace // lock/unlock actions /* Use THIS_FILE when it is available. */ #ifndef THIS_FILE #define THIS_FILE __FILE__ #endif #define CRITICAL_SECTION_ENTER(cs) { \ J2dTraceLn4(J2D_TRACE_VERBOSE2, \ "CS.Wait: tid, cs, file, line = 0x%x, 0x%x, %s, %d", \ GetCurrentThreadId(), &(cs), THIS_FILE, __LINE__); \ (cs).Enter(); \ J2dTraceLn4(J2D_TRACE_VERBOSE2, \ "CS.Enter: tid, cs, file, line = 0x%x, 0x%x, %s, %d", \ GetCurrentThreadId(), &(cs), THIS_FILE, __LINE__); \ } #define CRITICAL_SECTION_LEAVE(cs) { \ J2dTraceLn4(J2D_TRACE_VERBOSE2, \ "CS.Leave: tid, cs, file, line = 0x%x, 0x%x, %s, %d", \ GetCurrentThreadId(), &(cs), THIS_FILE, __LINE__); \ (cs).Leave(); \ J2dTraceLn4(J2D_TRACE_VERBOSE2, \ "CS.Left: tid, cs, file, line = 0x%x, 0x%x, %s, %d", \ GetCurrentThreadId(), &(cs), THIS_FILE, __LINE__); \ } // Redefine WinAPI values related to touch input, if OS < Windows 7. #if (!defined(WINVER) || ((WINVER) < 0x0601)) /* * RegisterTouchWindow flag values */ #define TWF_FINETOUCH (0x00000001) #define TWF_WANTPALM (0x00000002) #define WM_TOUCH 0x0240 /* * Touch input handle */ typedef HANDLE HTOUCHINPUT; typedef struct tagTOUCHINPUT { LONG x; LONG y; HANDLE hSource; DWORD dwID; DWORD dwFlags; DWORD dwMask; DWORD dwTime; ULONG_PTR dwExtraInfo; DWORD cxContact; DWORD cyContact; } TOUCHINPUT, *PTOUCHINPUT; typedef TOUCHINPUT const * PCTOUCHINPUT; /* * Touch input flag values (TOUCHINPUT.dwFlags) */ #define TOUCHEVENTF_MOVE 0x0001 #define TOUCHEVENTF_DOWN 0x0002 #define TOUCHEVENTF_UP 0x0004 #define TOUCHEVENTF_INRANGE 0x0008 #define TOUCHEVENTF_PRIMARY 0x0010 #define TOUCHEVENTF_NOCOALESCE 0x0020 #define TOUCHEVENTF_PEN 0x0040 #define TOUCHEVENTF_PALM 0x0080 #endif /************************************************************************ * AwtToolkit class */ class AwtToolkit { public: enum { KB_STATE_SIZE = 256 }; /* java.awt.Toolkit method ids */ static jmethodID getDefaultToolkitMID; static jmethodID getFontMetricsMID; static jmethodID insetsMID; /* sun.awt.windows.WToolkit ids */ static jmethodID windowsSettingChangeMID; static jmethodID displayChangeMID; BOOL m_isDynamicLayoutSet; AwtToolkit(); ~AwtToolkit(); BOOL Initialize(BOOL localPump); BOOL Dispose(); void SetDynamicLayout(BOOL dynamic); BOOL IsDynamicLayoutSet(); BOOL IsDynamicLayoutSupported(); BOOL IsDynamicLayoutActive(); BOOL areExtraMouseButtonsEnabled(); void setExtraMouseButtonsEnabled(BOOL enable); static UINT GetNumberOfButtons(); bool IsWin8OrLater(); bool IsTouchKeyboardAutoShowEnabled(); bool IsAnyKeyboardAttached(); bool IsTouchKeyboardAutoShowSystemEnabled(); void ShowTouchKeyboard(); void HideTouchKeyboard(); BOOL TIRegisterTouchWindow(HWND hWnd, ULONG ulFlags); BOOL TIGetTouchInputInfo(HTOUCHINPUT hTouchInput, UINT cInputs, PTOUCHINPUT pInputs, int cbSize); BOOL TICloseTouchInputHandle(HTOUCHINPUT hTouchInput); INLINE BOOL localPump() { return m_localPump; } INLINE BOOL VerifyComponents() { return FALSE; } // TODO: Use new DebugHelper class to set this flag INLINE HWND GetHWnd() { return m_toolkitHWnd; } INLINE HMODULE GetModuleHandle() { return m_dllHandle; } INLINE void SetModuleHandle(HMODULE h) { m_dllHandle = h; } INLINE static DWORD MainThread() { return GetInstance().m_mainThreadId; } INLINE void VerifyActive() throw (awt_toolkit_shutdown) { if (!m_isActive && m_mainThreadId != ::GetCurrentThreadId()) { throw awt_toolkit_shutdown(); } } INLINE BOOL IsDisposed() { return m_isDisposed; } static UINT GetMouseKeyState(); static void GetKeyboardState(PBYTE keyboardState); static ATOM RegisterClass(); static void UnregisterClass(); INLINE LRESULT SendMessage(UINT msg, WPARAM wParam=0, LPARAM lParam=0) { if (!m_isDisposed) { return ::SendMessage(GetHWnd(), msg, wParam, lParam); } else { return NULL; } } static LRESULT CALLBACK WndProc(HWND hWnd, UINT message, WPARAM wParam, LPARAM lParam); static LRESULT CALLBACK GetMessageFilter(int code, WPARAM wParam, LPARAM lParam); static LRESULT CALLBACK ForegroundIdleFilter(int code, WPARAM wParam, LPARAM lParam); static LRESULT CALLBACK MouseLowLevelHook(int code, WPARAM wParam, LPARAM lParam); INLINE static AwtToolkit& GetInstance() { return theInstance; } INLINE void SetPeer(JNIEnv *env, jobject wToolkit) { AwtToolkit &tk = AwtToolkit::GetInstance(); if (tk.m_peer != NULL) { env->DeleteGlobalRef(tk.m_peer); } tk.m_peer = (wToolkit != NULL) ? env->NewGlobalRef(wToolkit) : NULL; } INLINE jobject GetPeer() { return m_peer; } // is this thread the main thread? INLINE static BOOL IsMainThread() { return GetInstance().m_mainThreadId == ::GetCurrentThreadId(); } // post a message to the message pump thread INLINE BOOL PostMessage(UINT msg, WPARAM wp=0, LPARAM lp=0) { return ::PostMessage(GetHWnd(), msg, wp, lp); } // cause the message pump thread to call the function synchronously now! INLINE void * InvokeFunction(void*(*ftn)(void)) { return (void *)SendMessage(WM_AWT_INVOKE_VOID_METHOD, (WPARAM)ftn, 0); } INLINE void InvokeFunction(void (*ftn)(void)) { InvokeFunction((void*(*)(void))ftn); } INLINE void * InvokeFunction(void*(*ftn)(void *), void* param) { return (void *)SendMessage(WM_AWT_INVOKE_METHOD, (WPARAM)ftn, (LPARAM)param); } INLINE void InvokeFunction(void (*ftn)(void *), void* param) { InvokeFunction((void*(*)(void*))ftn, param); } INLINE CriticalSection &GetSyncCS() { return m_Sync; } void *SyncCall(void*(*ftn)(void *), void* param); void SyncCall(void (*ftn)(void *), void *param); void *SyncCall(void *(*ftn)(void)); void SyncCall(void (*ftn)(void)); // cause the message pump thread to call the function later ... INLINE void InvokeFunctionLater(void (*ftn)(void *), void* param) { if (!PostMessage(WM_AWT_INVOKE_METHOD, (WPARAM)ftn, (LPARAM)param)) { JNIEnv* env = (JNIEnv *)JNU_GetEnv(jvm, JNI_VERSION_1_2); JNU_ThrowInternalError(env, "Message not posted, native event queue may be full."); } } // cause the message pump thread to synchronously synchronize on the handle INLINE void WaitForSingleObject(HANDLE handle) { SendMessage(WM_AWT_WAIT_FOR_SINGLE_OBJECT, 0, (LPARAM)handle); } /* * Create an AwtXxxx C++ component using a given factory */ typedef void (*ComponentFactory)(void*, void*); static void CreateComponent(void* hComponent, void* hParent, ComponentFactory compFactory, BOOL isParentALocalReference=TRUE); static void DestroyComponentHWND(HWND hwnd); // constants used to PostQuitMessage static const int EXIT_ENCLOSING_LOOP; static const int EXIT_ALL_ENCLOSING_LOOPS; // ... void QuitMessageLoop(int status); UINT MessageLoop(IDLEPROC lpIdleFunc, PEEKMESSAGEPROC lpPeekMessageFunc); BOOL PumpWaitingMessages(PEEKMESSAGEPROC lpPeekMessageFunc); void PumpToDestroy(class AwtComponent* p); void ProcessMsg(MSG& msg); BOOL PreProcessMsg(MSG& msg); BOOL PreProcessMouseMsg(class AwtComponent* p, MSG& msg); BOOL PreProcessKeyMsg(class AwtComponent* p, MSG& msg); /* Checks that an free ID exists. */ jboolean isFreeIDAvailable(); /* Create an ID which maps to an AwtObject pointer, such as a menu. */ UINT CreateCmdID(AwtObject* object); // removes cmd id mapping void RemoveCmdID(UINT id); /* Return the AwtObject associated with its ID. */ AwtObject* LookupCmdID(UINT id); /* Return the current application icon. */ HICON GetAwtIcon(); HICON GetAwtIconSm(void* pAwtWindow = NULL); // Calculate a wave-like value out of the integer 'value' and // the specified period. // The argument 'value' is an integer 0, 1, 2, ... *infinity*. // // Examples: // Period == 3 // Generated sequence: 0 1 2 1 0 ..... // // Period == 4 // Generated sequence: 0 1 2 3 2 1 0 ..... static inline UINT CalculateWave(UINT value, const UINT period) { if (period < 2) { return 0; } // -2 is necessary to avoid repeating extreme values (0 and period-1) value %= period * 2 -2; if (value >= period) { value = period * 2 -2 - value; } return value; } HICON GetSecurityWarningIcon(UINT index, UINT w, UINT h); /* Turns on/off dialog modality for the system. */ INLINE AwtDialog* SetModal(AwtDialog* frame) { AwtDialog* previousDialog = m_pModalDialog; m_pModalDialog = frame; return previousDialog; }; INLINE void ResetModal(AwtDialog* oldFrame) { m_pModalDialog = oldFrame; }; INLINE BOOL IsModal() { return (m_pModalDialog != NULL); }; INLINE AwtDialog* GetModalDialog(void) { return m_pModalDialog; }; /* Stops the current message pump (normally a modal dialog pump) */ INLINE void StopMessagePump() { m_breakOnError = TRUE; } /* Debug settings */ INLINE void SetVerbose(long flag) { m_verbose = (flag != 0); } INLINE void SetVerify(long flag) { m_verifyComponents = (flag != 0); } INLINE void SetBreak(long flag) { m_breakOnError = (flag != 0); } INLINE void SetHeapCheck(long flag); static void SetBusy(BOOL busy); /* Set and get the default input method Window handler. */ INLINE void SetInputMethodWindow(HWND inputMethodHWnd) { m_inputMethodHWnd = inputMethodHWnd; } INLINE HWND GetInputMethodWindow() { return m_inputMethodHWnd; } static VOID CALLBACK PrimaryIdleFunc(); static VOID CALLBACK SecondaryIdleFunc(); static BOOL CALLBACK CommonPeekMessageFunc(MSG& msg); static BOOL activateKeyboardLayout(HKL hkl); static INLINE BOOL EnableNcDpiScaling(HWND hwnd) { return lpEnableNonClientDpiScaling != NULL ? lpEnableNonClientDpiScaling(hwnd) : FALSE; } static INLINE BOOL AdjustWindowRectExForDpi(LPRECT lpRect, DWORD dwStyle, BOOL bMenu, DWORD dwExStyle, UINT dpi) { return lpAdjustWindowRectExForDpi != NULL ? lpAdjustWindowRectExForDpi(lpRect, dwStyle, bMenu, dwExStyle, dpi) : ::AdjustWindowRectEx(lpRect, dwStyle, bMenu, dwExStyle); } HANDLE m_waitEvent; DWORD eventNumber; private: HWND CreateToolkitWnd(LPCTSTR name); void InitTouchKeyboardExeFilePath(); HWND GetTouchKeyboardWindow(); BOOL m_localPump; DWORD m_mainThreadId; HWND m_toolkitHWnd; HWND m_inputMethodHWnd; BOOL m_verbose; BOOL m_isActive; // set to FALSE at beginning of Dispose BOOL m_isDisposed; // set to TRUE at end of Dispose BOOL m_areExtraMouseButtonsEnabled; typedef BOOL (WINAPI *RegisterTouchWindowFunc)(HWND hWnd, ULONG ulFlags); typedef BOOL (WINAPI *GetTouchInputInfoFunc)(HTOUCHINPUT hTouchInput, UINT cInputs, PTOUCHINPUT pInputs, int cbSize); typedef BOOL (WINAPI *CloseTouchInputHandleFunc)(HTOUCHINPUT hTouchInput); BOOL m_isWin8OrLater; BOOL m_touchKbrdAutoShowIsEnabled; TCHAR* m_touchKbrdExeFilePath; RegisterTouchWindowFunc m_pRegisterTouchWindow; GetTouchInputInfoFunc m_pGetTouchInputInfo; CloseTouchInputHandleFunc m_pCloseTouchInputHandle; BOOL m_vmSignalled; // set to TRUE if QUERYENDSESSION has successfully // raised SIGTERM BOOL m_verifyComponents; BOOL m_breakOnError; BOOL m_breakMessageLoop; UINT m_messageLoopResult; class AwtComponent* m_lastMouseOver; BOOL m_mouseDown; HHOOK m_hGetMessageHook; HHOOK m_hMouseLLHook; UINT_PTR m_timer; class AwtCmdIDList* m_cmdIDs; BYTE m_lastKeyboardState[KB_STATE_SIZE]; CriticalSection m_lockKB; static AwtToolkit theInstance; /* The current modal dialog frame (normally NULL). */ AwtDialog* m_pModalDialog; /* The WToolkit peer instance */ jobject m_peer; HMODULE m_dllHandle; /* The module handle. */ CriticalSection m_Sync; static EnableNonClientDpiScalingFunc *lpEnableNonClientDpiScaling; static AdjustWindowRectExForDpiFunc *lpAdjustWindowRectExForDpi; /* track display changes - used by palette-updating code. This is a workaround for a windows bug that prevents WM_PALETTECHANGED event from occurring immediately after a WM_DISPLAYCHANGED event. */ private: BOOL m_displayChanged; /* Tracks displayChanged events */ // 0 means we are not embedded. DWORD m_embedderProcessID; public: BOOL HasDisplayChanged() { return m_displayChanged; } void ResetDisplayChanged() { m_displayChanged = FALSE; } void RegisterEmbedderProcessId(HWND); BOOL IsEmbedderProcessId(const DWORD processID) const { return m_embedderProcessID && (processID == m_embedderProcessID); } private: static JNIEnv *m_env; static DWORD m_threadId; public: static void SetEnv(JNIEnv *env); static JNIEnv* GetEnv(); static BOOL GetScreenInsets(int screenNum, RECT * rect); // If the DWM is active, this function uses // DwmGetWindowAttribute()/DWMWA_EXTENDED_FRAME_BOUNDS. // Otherwise, fall back to regular ::GetWindowRect(). // See 6711576 for more details. static void GetWindowRect(HWND hWnd, LPRECT lpRect); private: // The window handle of a toplevel window last seen under the mouse cursor. // See MouseLowLevelHook() for details. HWND m_lastWindowUnderMouse; public: HWND GetWindowUnderMouse() { return m_lastWindowUnderMouse; } void InstallMouseLowLevelHook(); void UninstallMouseLowLevelHook(); /* AWT preloading (early Toolkit thread start) */ public: /* Toolkit preload action class. * Preload actions should be registered with * AwtToolkit::getInstance().GetPreloadThread().AddAction(). * AwtToolkit thread calls InitImpl method at the beghining * and CleanImpl(false) before exiting for all registered actions. * If an application provides own Toolkit thread * (sun.awt.windows.WToolkit.embeddedInit), the thread calls Clean(true) * for each action. */ class PreloadThread; // forward declaration class PreloadAction { friend class PreloadThread; public: PreloadAction() : initThreadId(0), pNext(NULL) {} virtual ~PreloadAction() {} protected: // called by PreloadThread or as result // of EnsureInited() call (on Toolkit thread!). virtual void InitImpl() = 0; // called by PreloadThread (before exiting). // reInit == false: normal shutdown; // reInit == true: PreloadThread is shutting down due external // Toolkit thread was provided. virtual void CleanImpl(bool reInit) = 0; public: // Initialized the action on the Toolkit thread if not yet initialized. bool EnsureInited(); // returns thread ID which the action was inited on (0 if not inited) DWORD GetInitThreadID(); // Allows to deinitialize action earlier. // The method must be called on the Toolkit thread only. // returns true on success, // false if the action was inited on other thread. bool Clean(); private: unsigned initThreadId; // lock for Init/Clean CriticalSection initLock; // Chain support (for PreloadThread) PreloadAction *pNext; // for action chain used by PreloadThread void SetNext(PreloadAction *pNext) { this->pNext = pNext; } PreloadAction *GetNext() { return pNext; } // wrapper for AwtToolkit::InvokeFunction static void InitWrapper(void *param); void Init(); void Clean(bool reInit); }; /** Toolkit preload thread class. */ class PreloadThread { public: PreloadThread(); ~PreloadThread(); // adds action & start the thread if not yet started bool AddAction(PreloadAction *pAction); // sets termination flag; returns true if the thread is running. // wrongThread specifies cause of the termination: // false means termination on the application shutdown; // wrongThread is used as reInit parameter for action cleanup. bool Terminate(bool wrongThread); bool InvokeAndTerminate(void(_cdecl *fn)(void *), void *param); // waits for the the thread completion; // use the method after Terminate() only if Terminate() returned true INLINE void Wait4Finish() { ::WaitForSingleObject(hFinished, INFINITE); } INLINE unsigned GetThreadId() { CriticalSection::Lock lock(threadLock); return threadId; } INLINE bool IsWrongThread() { CriticalSection::Lock lock(threadLock); return wrongThread; } // returns true if the current thread is "preload" thread bool OnPreloadThread(); private: // data access lock CriticalSection threadLock; // the thread status enum Status { None = -1, // initial Preloading = 0, // preloading in progress RunningToolkit, // Running as Toolkit thread Cleaning, // exited from Toolkit thread proc, cleaning Finished // } status; // "wrong thread" flag bool wrongThread; // thread proc (calls (this)param->ThreadProc()) static unsigned WINAPI StaticThreadProc(void *param); unsigned ThreadProc(); INLINE void AwakeThread() { ::SetEvent(hAwake); } // if threadId != 0 -> we are running unsigned threadId; // ThreadProc sets the event on exit HANDLE hFinished; // ThreadProc waits on the event for NewAction/Terminate/InvokeAndTerminate HANDLE hAwake; // function/param to invoke (InvokeAndTerminate) // if execFunc == NULL => just terminate void(_cdecl *execFunc)(void *); void *execParam; // action chain PreloadAction *pActionChain; PreloadAction *pLastProcessedAction; // returns next action in the list (NULL if no more actions) PreloadAction* GetNextAction(); }; INLINE PreloadThread& GetPreloadThread() { return preloadThread; } private: PreloadThread preloadThread; }; /* creates an instance of T and assigns it to the argument, but only if the argument is initially NULL. Supposed to be thread-safe. returns the new value of the argument. I'm not using volatile here as InterlockedCompareExchange ensures volatile semantics and acquire/release. The function is useful when used with static POD NULL-initialized pointers, as they are guaranteed to be NULL before any dynamic initialization takes place. This function turns such a pointer into a thread-safe singleton, working regardless of dynamic initialization order. Destruction problem is not solved, we don't need it here. */ template<typename T> inline T* SafeCreate(T* &pArg) { /* this implementation has no locks, it just destroys the object if it fails to be the first to init. another way would be using a special flag pointer value to mark the pointer as "being initialized". */ T* pTemp = (T*)InterlockedCompareExchangePointer((void**)&pArg, NULL, NULL); if (pTemp != NULL) return pTemp; T* pNew = new T; pTemp = (T*)InterlockedCompareExchangePointer((void**)&pArg, pNew, NULL); if (pTemp != NULL) { // we failed it - another thread has already initialized pArg delete pNew; return pTemp; } else { return pNew; } } #endif /* AWT_TOOLKIT_H */
Low
[ 0.512359550561797, 28.5, 27.125 ]
Ayat-Ayat Cinta Ayat-Ayat Cinta () is an Indonesian drama film from MD Pictures, Producer Manoj Punjabi and Dhamoo Punjabi. Starring as main casts are , Rianti Cartwright, Carissa Putri, Melanie Putria, and Zaskia Adya Mecca. It is a romantic religious drama based on the bestselling novel with the same title by Habiburrahman El Shirazy. While the story is set in Cairo, Egypt, the film was shot in India and Semarang, Indonesia. Ayat-Ayat Cinta was released on February 28, 2008 in Indonesia, May 8, 2008 in Singapore, and June 19, 2008 in Malaysia. Upon release, it was one of the most successful Indonesian film, and was the first Indonesian film to reach 3.5 million tickets sold, only to be surpassed by Laskar Pelangi a few months later. Both films are the only film to surpass more than 3 million audiences before 2010s. In 2016 during the screening of Rudy Habibie, a sequel was confirmed to be in development; to be released in December 2017. Synopsis The clever Fahri bin Abdillah goes on scholarship to Egypt to undertake study for a master's degree in Islam at Al-Azhar University, Cairo; his parents had to sell their rice field to help him as well. Fahri has a plan for his life to be achieved through his perseverance and discipline. He plans to marry when his thesis is accepted. He has yet to have a close relationship with a woman beyond what he had with his mother and grandmother. Maria Girgis is his first admirer: a Coptic Christian neighbor that, attracted to him for his knowledge of the Al Quran, admits it only in her diary. The Indonesian student Nurul did not recognize her attraction to Fahri. Nurul, a daughter of a well-regarded Muslim cleric in Indonesia, made Fahri think himself unworthy. The humble next door Egyptian neighbor, Noura, had empathy for Fahri since he got a scholarship but she romantically interpreted the feelings and this led to an accusation of rape. Aisha's beautiful eyes captured Fahri's heart and in the metro when Fahri defended Islam from being narrow-minded, Aisha fell in love with him. Before marriage, Fahri sought to satisfy the desire in his heart and follow his religious faith in pursuit of this relationship. Released Ayat-Ayat Cinta had a released date on December 19, 2007, there were problems and it premiered on February 28, 2008. Comparison to novel In the novel: Maria has a younger brother, Youssef; in the film she is an only child. Fahri is arrested and imprisoned on religious grounds by the respected scholars Professor Abdul Rauf, Ismail, Hamada, Haj Rashed and Marwan. In the film, Fahri is accused and imprisoned for being a cruel, yet wise culprit. The American reporter Alicia returns to Egypt to visit Fahri, a recent Muslim convert; in the film she never converts. Soundtrack The film's title track Ayat-Ayat Cinta was selected as the lead single from the album soundtrack to promote the film, and met with critical and commercial success. A music video was also made for the single. "Ayat-Ayat Cinta" (Rossa) — 3:48 "Jalan Cinta" (Sherina) — 4:32 "Takdir Cinta" (Rossa) — 3:32 "Tercipta Untukku" (featuring Rossa) (Ungu) — 4:25 "Andai Ku Tahu" (Ungu) — 4:46 "Opening Scene" (Music Scoring) — 2:41 "Letter From Noura" (Music Scoring) — 1:18 "Thalagi" (Music Scoring) — 1:13 "The Basket" (Music Scoring) 1:06 "Ayat-Ayat Cinta" (Minus One) — 3:47 "Jalan Cinta" (Minus One) — 4:32 "Takdir Cinta" (Minus One) — 3:30 Sequel During the screening of Rudy Habibie, a sequel for the film was confirmed. It is titled Ayat-Ayat Cinta 2, this time, it was directed by Guntur Soehardjanto, while Alim Sudio and Ifan Ismail writing the script. The film was released on December 21, 2017. References External links Review in Warung Fiksi Portal Category:2008 films Category:Indonesian films Category:Indonesian-language films Category:Films based on Indonesian novels Category:Films shot in Indonesia Category:Films directed by Hanung Bramantyo Category:Indonesian drama films Category:2000s drama films
Mid
[ 0.606299212598425, 28.875, 18.75 ]
The invention relates to an arrangement for the exclusive connection of a selectable specimen from a plurality of loads, each of which can be switched on via an individual activation switch between the poles of a voltage source. Arrangements of this type are required if there is a need to prevent various electrical loads being set in operation at the same time, whether it is unintentional or deliberate. In many cases, switching on of more than one load simultaneously can lead to undesirable results, for instance when, a common current supply source is overloaded, or if loads which are switched on simultaneously interfere with one another in their operation or effect. Devices for example, which serve for the spatial adjustment of objects of various sizes, frequently contain a corresponding plurality of electrical drives, the simultaneous activation of which could not be dealt with by the adjustment mechanism or which would make control more difficult for the user or which would overload the current supply source beyond the desired amount. This can arise in motor vehicles, for instance in the devices for adjusting the seat or the steering column. Various devices are known for the mutual interlocking of any number of switch devices such that only one of the switch devices can be switched on, see for instance, known devices described in DE-PS 1 040 111, DE-AS 20 08 460 and 20 57 296 and also DE 30 26 619 C2. In the devices described there, the switch devices are respectively electromechanical relays, each of which contain further contacts besides the main contact forming the actual circuit break, for instance for the lock of the relay and/or for closing and opening of additional auxiliary circuit breaks which interrupt, upon actuation of the relay, the exciting currents of the respective other relays. In a known device described in DE-AS 1 640 995, the simultaneous activation of several relays is prevented by a resistor which is switched on before a common exciting current-supply transmission line to the relays. A large drop in voltage occurs across the resistor, upon simultaneous actuation of two or more switches, such that the residual voltage remaining between the transmission lines no longer suffices to allow a relay coil to respond. This embodiment may function without additional relay contacts, but it is sensitive to fluctuations in the supply voltage and requires very exact designing of the electrical components. A further disadvantage in the above-mentioned known arrangements is that actuation of the switch devices is only possible via contact switches.
Mid
[ 0.55036855036855, 28, 22.875 ]
Related Tags Health Outcomes of American and Canadian IBD Patients Oct 14, 2013 | Laura Joszt At the American College of Gastroenterology’s 78th Annual Scientific Meeting in San Diego, two separate studies analyzed the health outcomes of inflammatory bowel disease (IBD) in the United States and Canada. One study focused on care access for patients with IBD, while the second study presented data on the academic achievements of children with IBD compared to those without. The first study by the Crohn’s and Colitis Foundation of America surveyed 3,802 IBD patients on their access to health care. Of the respondents, 63 percent were working, 17 percent were not working or seeking employment, and 10 percent were unemployed and seeking employment. Sixty-five percent had Crohn’s disease, 32 percent had ulcerative colitis and 3 percent had an indeterminate disease. A quarter of respondents have no insurance or worse coverage than last year and 59% said it was very difficult to find adequate coverage. Even more said costs were an issue, with 70 percent responding that it was very difficult to afford adequate coverage. “This national survey identified a significant number of IBD patients with inadequate access to, or difficulties with, their health care,” lead author David T. Rubin, MD, FACG, professor of medicine at the University of Chicago Medicine, said in a statement. Of the 34 percent of respondents who admitted to ever delaying care because of financial reasons, 25 percent skipped doses of medication, 30 percent took fewer doses, 35 percent delayed filling a prescription, 47 percent delayed an appointment with a physician and 35 percent delayed a scheduled test. “Twenty-five percent of the nearly 4,000 patients surveyed indicated they had delayed getting medical care in the past year, and of that percent, more than half stated this was due to cost of care,” Rubin said. “These numbers, while discouraging, are an important first step to better understand why patients with IBD may not be getting the best treatments possible.” The second study, using population-based datasets from the University of Manitoba IBD Epidemiology Database, found children with IBD and children without IBD reached similar levels of academic achievement in grade 12. The educational outcomes were determined among 337 children with IBD and 3,093 matched controls without IBD. According to the study, children with IBD with lower socio-economic status had lower standardized scores and a lower likelihood of enrollment in grade 12 by age 17. Among children with IBD, diagnosis of mental health problems around the time of IBD diagnosis was also predictive of lower scores. “This study suggests that, along with higher attention to children with lower socio-economic status, it is important to assess mental health conditions, including depression, panic disorder and substance abuse, around the time of the IBD diagnosis, as that may have a long-term effect on the child,” lead author Harminder Singh, MD, MPH, assistant profession of medicine at the University of Manitoba in Canada, said in a statement. An estimated 40% of migraine sufferers also have signs of depression and more than 50% of migraine patients have some form of anxiety disorder. Treating these comorbidities is more art than science, says Mia Minen, MD, Director of Headache Services at NYU Langone Medical Center. In a recent interview she discussed the treatment options ranging from standard drugs like triptans, to Botox, to biofeedback. Researchers conducted a randomized lifestyle intervention study in 165 patients who had undergone RYGB surgery to determine the magnitude of health and comorbidity improvements, change in psychopharmacologic drug use and change in employment over 2 years. Every year, the FBI and its partners in the Internet Crime Complaint Center (IC3) publish a report detailing the number and type of complaints the center receives. These states reported the highest numbers of cyber crimes.
Mid
[ 0.567928730512249, 31.875, 24.25 ]
The incorporation of [3H]fucose into the novel fucosides glucosyl-fucosyl-threonine(FL4a) and fucosyl-threonine(FL3a) has been utilized in this laboratory and by others to predict the tumorigenic and metastatic potential of transformed rat fibroblasts and transformed mouse epithelial cells. During the past year, we have continued our studies of the chemical and metabolic characterization of the parent glycoproteins of FL4a and FL3a. Approximately 90% of the putatively identified parent proteins of FL4a were in the membrane fraction, and a substantial proportion were released into the medium as a function of growth time. For example, after 96 hrs of labeling there were 6-fold more of these components in the growth medium than were cell-associated. Moreover, the incorporation of labeled fucose into the parent glycoproteins appeared to be cell population density-dependent. When the distribution of these compounds was compared in normal versus cancer cells, it was found that a higher proportion of the proteins with O-linked fucose were shed into the medium of the cancer cells. The enhanced shedding could explain the basis for the reduced level of FL4a in cancer cells, since the metabolic labeling experiments did not indicate a marked difference in the metabolism of either the parent protein or in FL4a or FL3a. Despite the apparent wide distribution of these novel fucose substituents in cellular proteins, it seems reasonable to suggest that they have not been routinely observed largely because each represents less than 0.5% of the fucose bound to protein. (A)
High
[ 0.65764546684709, 30.375, 15.8125 ]
# general CPack options set(PROJECT_VERSION ${APPIMAGELAUNCHER_VERSION}) set(CPACK_GENERATOR "DEB") # make sure to only package APPIMAGELAUNCHER and APPIMAGELAUNCHERFS components set(CPACK_COMPONENTS_ALL APPIMAGELAUNCHER APPIMAGELAUNCHER_CLI) if(NOT USE_SYSTEM_APPIMAGELAUNCHERFS) list(APPEND CPACK_COMPONENTS_ALL APPIMAGELAUNCHERFS) endif() # package them all in a single package, otherwise cpack would generate one package per component by default # https://cmake.org/cmake/help/v3.0/module/CPackComponent.html#variable:CPACK_COMPONENTS_GROUPING set(CPACK_COMPONENTS_GROUPING ALL_COMPONENTS_IN_ONE) # global options set(CPACK_PACKAGE_CONTACT "TheAssassin") set(CPACK_PACKAGE_HOMEPAGE "https://github.com/TheAssassin/AppImageLauncher") set(CPACK_PACKAGE_DESCRIPTION_FILE "${CMAKE_SOURCE_DIR}/README.md") set(CPACK_RESOURCE_FILE_LICENSE "${CMAKE_SOURCE_DIR}/LICENSE.txt") # versioning # it appears setting CPACK_DEBIAN_PACKAGE_VERSION doesn't work, hence setting CPACK_PACKAGE_VERSION set(CPACK_PACKAGE_VERSION ${APPIMAGELAUNCHER_VERSION}) # TODO: insert some useful description set(CPACK_COMPONENT_APPIMAGELAUNCHER_PACKAGE_DESCRIPTION "AppImageLauncher") # find more suitable section for package set(CPACK_COMPONENT_APPIMAGELAUNCHER_PACKAGE_SECTION misc)
Mid
[ 0.6531440162271801, 40.25, 21.375 ]
DGAP-Media / Unternehmen: Maricann Group Inc. WKN: A2DQR6 Anlass des Berichts: Update Empfehlung: Strong Buy Kursziel mittelfristig: 3,00 EUR Kursziel langfristig: 5,00 EUR Millionencashflow durch weitere Cannabis-Liefervereinbarung gesichert - Aktie massiv unterbewertet! Unser Cannabis Top-Pick die kanadische Maricann (WKN A2DQR6) verkündete eine weitere Liefervereinbarung. Dies ist bereits das dritte Lieferabkommen innerhalb kürzester Zeit und ein Garant für baldige Millionenumsätze. Wie Maricann (WKN A2DQR6) vermeldete, wurde mit dem Unternehmen Liquor Distribution Branch ("BCLDB", Spirituosenvertriebsstelle der Provinz British Columbia) eine Absichtserklärung unterzeichnet. Als ein bevorzugter lizenzierter Produzent wird das Unternehmen in den ersten 12 Monaten nach der Legalisierung anfänglich ungefähr 3.621.900 Gramm (ca. 3.622kg) nicht medizinisches Cannabis an BCLDB liefern. Die wichtigsten Punkte - Maricann wurde ausgewählt, um Cannabis für Genusszwecke an den Markt in British Columbia zu liefern. - Das Unternehmen stimmt zu, mindestens 3.621.900 Gramm pro Jahr für BCLDB bereitzustellen. - Maricann hat jetzt bestätigte Allokationen von Cannabis zu Genusszwecken für Manitoba, Alberta und British Columbia mit einem annualisierten Volumen von 10.923.100 Gramm (ca. 10.923kg). "Maricann ist begeistert, eine Absichtserklärung mit BCLDB zu schließen und wir sind stolz darauf mit ihnen als Partner während dieser aufregenden Markteinführungsphase zu arbeiten," sagte Geoff Kosar, Vice President Verkauf und Marketing, Maricann Group Inc. Bereits bestehende Liefervereinbarungen: Zuletzt wurden bereits zwei Lieferabkommen zur Versorgung des Marktes in Alberta und Manitoba mit Cannabisprodukten abgeschlossen. Am 29.06.2018 vermeldete das Unternehmen, dass eine Liefervereinbarung mit der Manitoba Liquor & Lotteries Corporation (MLCC) abgeschlossen werden konnte, dies ist ein wichtiger Meilenstein des Unternehmens. Die Liefervereinbarung sieht einen Umfang von 550.000 Gramm verschiedenster Cannabisprodukte innerhalb der ersten 12 Monate vor. Am 05.07.2018 vermeldete das Unternehmen, dass es eine Liefervereinbarung mit Alberta Gaming, Liquor & Cannabis Commission abgeschlossen hat. Das Liefervolumen beträgt 3.375 Kilogramm für einen Zeitraum von 6 Monaten! Umfangreiches Unternehmensupdate: Das Unternehmen ist im Gespräch mit mehreren anderen Provinzen für 2018 und 2019 und wird, wenn zulässig, bekannt geben, wann diese Abkommen geschlossen werden. Obwohl es keine Garantien gibt, dass zusätzliche Lieferabkommen unterzeichnet werden, so haben die laufenden Gespräche mit bestimmten Provinzen eine hohe Wertschätzung der Fähigkeiten und Wettbewerbsfähigkeit des Unternehmens bestätigt, die im Einklang mit viel größeren Unternehmen in dieser Branche stehen. Erweiterung der Anlage in Langton Die Bauarbeiten an der Erweiterung der Anlage des Unternehmens in 138 8th Concession Road, Langton, Ontario (die "Langton-Anlage") machen weitere Fortschritte. Bis Mitte November 2018 (vorbehaltlich des Erhalts der betreffenden Lizenzen von Health Canada) erwartet Maricann, in der Lage zu sein, während Phase 1 der Erweiterung ihrer Langton-Anlage 706kg getrocknetes Cannabis pro Woche zu produzieren. Bis April 2019 erwartet Maricann, in der Lage zu sein, pro Woche 2.023 kg getrocknetes Cannabis zu Gesamtkosten der verkauften Ware von ungefähr 1,30 Dollar pro Gramm zu produzieren. Diese Zahlen sind unter der Annahme, dass alle Gebäudegenehmigungen, Gegenstände mit langen Lieferzeiten wie z. B. HVAC-Geräte rechtzeitig zur Langton-Anlage geliefert werden. Betriebs-Update Deutschland Maricann hat den Umbau der 4.600m2 (ungefähr 49.000 Quadratfuß) großen Anlage für den Betäubungsmittelimport und Vertrieb in Ebersbach, Deutschland, abgeschlossen. Die Besichtigungen der Anlage durch die europäische Arzneimittelagentur wurden ohne signifikante Beanstandungen abgeschlossen. Das Unternehmen wird ein weiteres Update geben, wenn die endgültige Genehmigung der Aufsichtsbehörden erteilt wurde. Diese Zertifizierung, wenn erhalten, wird Maricann den Import ihrer eigenen durch EMA-GMP zertifizierten Produkte und der zertifizierten Produkte anderer zum Vertrieb in Deutschland und im restlichen Europa, wo legal, erlauben und eine Gewinnmarge bewahren, die in den meisten Fällen bei 50% des Großhandelspreises liegt. Malta und VESIsorb(R)-Update Wie erwartet hat Maricann die Bestätigung von Malta Enterprise (die offizielle Wirtschaftsförderungsstelle des Landes) in Form einer Absichtserklärung erhalten, um mit der Lizenzierung der Fertigwarenproduktionsstätten für medizinisches Cannabis fortzufahren. Malta ist ein integraler Bestandteil von Maricanns langfristiger Entwicklungsstrategie einschließlich der Herstellung von Fertigprodukten, die die patentierte VESISorb(R)-Verabreichungstechnologie verwenden. Die Überlegenheit von VESISorb(R) wurde immer wieder in gut konzipierten Pilotstudien und begutachteten veröffentlichten pharmakokinetischen Absorptionsstudien und Studien der Bioverfügbarkeit demonstriert. Maricann hat jetzt beständig THC-Destillate in ihren Anlagen in Langton, Ontario, hergestellt, ein Baustein für zukünftige Produkte für den Genussmarkt sowie vordosierte pharmazeutische Produkte. Maricann verwendete die Dünnschicht-Destillation zur Verarbeitung des Materials. "Wir realisieren und entwickeln alle Aspekte des Unternehmens gemäß unseres Plans, um eine Vorwärtsbewegung für unsere Aktionäre zu erzielen mit Fokus auf den Erhalt von Margen durch die Entwicklung von Geschäftseinheiten und zusätzlicher Fähigkeiten als ein Unternehmen für einen Bruchteil der Kosten, die man in diesem Sektor sieht. Regierungsaufsichtsbehörden unterstützen weiterhin unser Unternehmen, indem sie uns als eines von einer Handvoll Unternehmen mit Lizenzen für medizinisches Cannabis und Produktlieferung vertrauen. Wir sind auf die bis dato erzielten Fortschritten stolz und werden den Unternehmenswert durch strategische Segmentierung unseres Geschäfts nach Geografie, strategische Investitionen, Qualität und wissenschaftlich differenzierte Produkte, die von fachkundigen und qualifizierten Experten entwickelt werden, langfristig steigern," sagte Ben Ward, CEO. Die kürzlich abgeschlossene Liefervereinbarung: Am 29.06.2018 vermeldete das Unternehmen, dass eine Liefervereinbarung mit der Manitoba Liquor & Lotteries Corporation (MLCC) abgeschlossen werden konnte, dies ist ein wichtiger Meilenstein des Unternehmens. Die Liefervereinbarung sieht einen Umfang von 550.000 Gramm verschiedenster Cannabisprodukte innerhalb der ersten 12 Monate vor. Dies markiert Maricanns ersten Provinzliefervertrag und repräsentiert weitere externe Validierung für das Betriebs- und Managementteam von Maricann. Das Unternehmen ist engagiert um ein qualitatives, hochwertiges, sicheres Produkt zu liefern, das in der hochmodernen Anbauanlage in Langton, Ontario produziert wird. Expansion in europäischen Markt schreitet voran In den letzten Wochen hat die Maricann Group (WKN A2DQR6) ihre Aktivitäten auf dem europäischen Markt intensiviert. Die Maricann Group (WKN A2DQR6) konnte sowohl große Fortschritte im Ausbau der Ebersbach Anlage in Deutschland sowie bei der endgültigen Übernahme der Haxxon Anlagen in der Schweiz erzielen. Mit dem zusätzlich Erwerb der maltesischen Medican und der dazugehörigen Lizenz, ist es nun für die Maricann Group (WKN A2DQR6) möglich, Cannabis aus Kanada zu importieren, vor Ort auf Malta zu extrahieren und herzustellen. Zudem erlaubt die Lizenz, den Vertrieb von medizinischen Cannabis Produkten in die Europäische Union. In einer 164 Hektar großen Freiluft-Anlage in Sachsen, nahe des Headquarters in Ebersbach, wurde der erste Samen zum Anbau von Non-THC Cannabis Pflanzen durch Maricanns Tochterfirma Mariplant ausgebracht. Mariplant konzentriert sich auf die Herstellung von CBD und CBG-haltigem Cannabis, dass durch die von Maricann Group (WKN A2DQR6) eigens entwickelte VesiSorb Emulsionstechnologie zu Gelkapseln verarbeitet wird. Als Synergie durch die Übernahme der schweizer Haxxon, können zusätzliche Stoffe wie Terpenoide oder Flavonoide kostengünstig den Kapseln hinzugefügt werden. Die Produkte werden dann als Nahrungsmittelergänzung über den Onlineshop der Mariplant europaweit verkauft. Des Weiteren wird die Ebersbach Anlage derzeit auf einer Fläche von 8.000 m² ausgebaut. Die daraus entstehende Trockenanlage wird nach der Fertigstellung in der Lage sein, ca. 1 Tonne Cannabis pro Stunde zu trocknen. Die Extraktionsanlage sowie Lagerkapazitäten werden zusätzlich genutzt, um 200 kg Cannabis Blüten pro Tag verarbeiten zu können. Mit der erneuten Expansion im europäischen Raum, kann die Maricann Group (WKN A2DQR6) einen weiteren wichtigen Meilenstein vermelden. Die Möglichkeit Cannabis in der europäischen Union produzieren zu können, bedeute einen großen Wettbewerbsvorteil gegenüber der Konkurrenz. Des Weiteren steht die Vergabe einer Lizenz zur Cannabis Produktion in Deutschland weiterhin auf der Agenda der Maricann Group (WKN A2DQR6) . Wir erwarten positiven Newsflow und eine deutliche Erholung des Kurses in den kommenden Wochen! LINK zu unserer umfangreichen Erstempfehlung mit allen Hintergrundinfos True Research ist ein Produkt der BlackX GmbH, Schwetzingerstr. 3 69190 Walldorf E-Mail: [email protected] * Webseite: www.true-research.de Disclaimer / Haftungsausschluss: Die Markteinschätzungen, Hintergrundinformationen und Wertpapier-Analysen, die True Research auf ihren Webseiten und in Newslettern veröffentlicht, stellen weder ein Verkaufsangebot für die genannten Notierungen, noch eine Aufforderung zum Kauf- oder Verkauf von Wertpapieren dar. Die Markteinschätzungen, Hintergrundinformationen und Wertpapier-Analysenstellen auch keine wertpapiermarktanalystische Beratung dar. Den Ausführungen liegen Quellen zugrunde, die der Herausgeber als vertrauenswürdig einstuft. Trotzdem haftet True Research nicht für Schäden materieller oder immaterieller Art, die durch die Nutzung oder Nichtnutzung der dargebotenen Informationen bzw. durch die Nutzung fehlerhafter und unvollständiger Informationen unmittelbar oder mittelbar verursacht werden, sofern ihr nicht nachweislich vorsätzliches oder grob fahrlässiges Verschulden zur Last fällt. Diese Information ist eine Werbemitteilung und beinhaltet weder Anlagestrategieempfehlungen noch Anlageempfehlungen gemäß § 34b WpHG und Artikel 20 der Marktmissbrauchsverordnung. Sie erfüllt deshalb nicht die gesetzlichen Anforderungen zur Gewährleistung der Objektivität von Anlagestrategieempfehlungen/Anlageempfehlungen. Wir geben weiterhin zu bedenken, dass Aktien grundsätzlich immer mit wirtschaftlichen Risiken verbunden sind. Aufgrund von politischen, wirtschaftlichen oder etwaigen anderen Veränderungen kann es zu erheblichen Kursverlusten, im schlimmsten Fall sogar zum Totalverlust des investierten Kapitals kommen. Bei Derivaten ist die Wahrscheinlichkeit extremer Verluste mindestens genauso hoch wie bei Small-Cap-Aktien. Jeglicher Haftungsanspruch auch für ausländische Aktienempfehlungen wird daher ausnahmslos ausgeschlossen. Obwohl die in den Aktienanalysen und Markteinschätzungen von True Research enthaltenen Bewertungen und Aussagenmit der angemessenen Sorgfalt erstellt wurden, übernehmen wir keinerlei Verantwortung oder Haftung für etwaige Fehler, oder falsche Angaben. Dies gilt ebenso für alle von unseren Partnern in den Interviews geäußerten Zahlen, Darstellungen und Beurteilungen. True Research ist um Richtigkeit und Aktualität der auf dieser Internetpräsenz bereitgestellten Informationen bemüht. Gleichwohl können Fehler und Unklarheiten nicht vollständig ausgeschlossen werden. Daher übernimmt True Research keine Gewähr für die Aktualität, Richtigkeit, Vollständigkeit oder Qualität der bereitgestellten Informationen. Alle die den vorliegenden Analysen zugrundeliegenden Aussagen sollten als zukunftsorientierte Aussagen verstanden werden, die sich wegen verschiedener erheblicher Risiken (z.B. politische, wirtschaftliche oder ähnliche andere Veränderungen) durchaus nicht bewahrheiten könnten. True Research gibt daher weder eine Sicherheit noch eine Garantie dafür ab, dass die gemachten zukunftsorientierten Aussagen tatsächlich eintreffen könnten. Daher sollten sich die Leser von True Research nicht auf die Aussagenverlassen und nur auf Grund der Analysen genannte Wertpapiere kaufen oder verkaufen. Durch notwendig werdende Kapitalerhöhungen könnten zudem kurzfristig Verwässerungserscheinungen auftreten, die zu Lasten der Investoren gehen können. Alle vorliegenden Texte, insbesondere Markteinschätzungen, Aktienbeurteilungen und Chartanalysen spiegeln die persönliche Meinung von Herrn Nicholas Hornung wider, die durch Artikel 5 des Grundgesetzes gedeckt ist und dürfen keineswegs als Anlageberatung gedeutet werden. Es handelt sich also um reine individuelle Auffassungen ohne Anspruch auf ausgewogene Durchdringung der Materie. True Research ist kein registrierter oder gar anerkannter Finanzberater. Bevor Sie in Wertpapiere investieren, sollten Sie einen professionellen Anlageberater kontaktieren. Des Weiteren behalten wir uns das recht vor sämtliche Materialien welche auf unserer Website dargestellt werden ohne Ankündigung zu verändern, erweitern oder zu entfernen. Wir weisen nochmal ausdrücklich daraufhin, dass es sich bei den veröffentlichten Analysten um keine Finanzanalysen nach deutschem Kapitalmarktrecht handelt, sondern um journalistische / werbliche Beiträge in Form von Texte, Videos und Grafiken. Die Inhalte unserer Seiten wurden mit größter Sorgfalt erstellt. Für die Richtigkeit, Vollständigkeit und Aktualität der Inhalte können wir jedoch keine Gewähr übernehmen. Als Dienstanbieter sind wir gemäß § 7 Abs.1 TMG für eigene Inhalte auf diesen Seiten nach den allgemeinen Gesetzen verantwortlich. Nach §§ 8 bis 10 TMG sind wir als Dienstanbieter jedoch nicht verpflichtet, übermittelte oder gespeicherte fremde Informationen zu überwachen oder nach Umständen zu forschen, die auf eine rechtswidrige Tätigkeit hinweisen. Verpflichtungen zur Entfernung oder Sperrung der Nutzung von Informationen nach den allgemeinen Gesetzen bleiben hiervon unberührt. Eine diesbezügliche Haftung ist jedoch erst ab dem Zeitpunkt der Kenntnis einer konkreten Rechtsverletzung möglich. Bei Bekannt werden von entsprechenden Rechtsverletzungen werden wir diese Inhalte umgehend entfernen. True Research hat keine Kenntnis über rechtswidrige oder anstößige Inhalten auf den mit ihrer Internetpräsenz verknüpften Seiten fremder Anbieter. Sollten auf den verknüpften Seiten fremder Anbieter dennoch rechtswidrige oder anstößige Inhalte enthalten sein, so distanziert sich True Research ausdrücklich von diesen Inhalten ausdrücklich. Unser Angebot enthält Links zu externen Webseiten Dritter, auf deren Inhalte wir keinen Einfluss haben. Deshalb können wir für diese fremden Inhalte auch keine Gewähr übernehmen. Für die Inhalte der verlinkten Seiten ist stets der jeweilige Anbieter oder Betreiber der Seiten verantwortlich. Die verlinkten Seiten wurden zum Zeitpunkt der Verlinkung auf mögliche Rechtsverstöße überprüft. Rechtswidrige Inhalte waren zum Zeitpunkt der Verlinkung nicht erkennbar. Eine permanente inhaltliche Kontrolle der verlinkten Seiten ist jedoch ohne konkrete Anhaltspunkte einer Rechtsverletzung nicht zumutbar. Bei Bekanntwerden von Rechtsverletzungen werden wir derartige Links umgehend entfernen. Urheberrecht Die durch die Seitenbetreiber erstellten Inhalte und Werke auf diesen Seiten unterliegen dem deutschen Urheberrecht. Vervielfältigung, Bearbeitung, Verbreitung und jede Art der Verwertung außerhalb der Grenzen des Urheberrechtes bedürfen der schriftlichen Zustimmung des jeweiligen Autors bzw. Erstellers. Soweit die Inhalte auf dieser Seite nicht vom Betreiber erstellt wurden, werden die Urheberrechte Dritter beachtet. Insbesondere werden Inhalte Dritter als solche gekennzeichnet. Sollten Sie trotzdem auf eine Urheberrechtsverletzung aufmerksam werden, bitten wir um einen entsprechenden Hinweis. Bei Bekanntwerden von Rechtsverletzungen werden wir derartige Inhalte umgehend entfernen. Offenlegung der Interessenskonflikte: Die auf den Webseiten oder anderen Werbemitteln von TRUE RESEARCH veröffentlichten Empfehlungen, Interviews und Unternehmenspräsentationen erfüllen grundsätzlich werbliche Zwecke und werden von den jeweiligen Unternehmen oder sogenannten third parties bezahlt. Aus diesem Grund kann allerdings die Unabhängigkeit der Analysen in Zweifel gezogen werden. Diese sind per definitionem nur Informationen. Dies gilt auch für die vorliegende Studie. Die Erstellung und Verbreitung des Berichts wurde vom Unternehmen bzw. von dem Unternehmen nahe stehenden Kreisen in Auftrag gegeben und bezahlt. Damit liegt ein entsprechender Interessenkonflikt vor, auf den wir Sie als Leser ausdrücklich hinweisen. Ferner geben wir zu bedenken, dass die Auftraggeber dieser Studie in naher Zukunft beabsichtigen könnten, sich von Aktienbeständen zu trennen oder Aktien am Markt nachzukaufen. Der Auftraggeber könnte von steigenden Kursen der Aktie profitieren. Auch hieraus ergibt sich ein entsprechender Interessenkonflikt. True Research handelt demzufolge im Zusammenwirken mit und aufgrund entgeltlichen Auftrags von weiteren Personen, die ihrerseits signifikante Aktienpositionen halten. Auch hieraus ergibt sich ein entsprechender Interessenkonflikt. Weil andere Research-Häuser und Börsenbriefe den Wert auch covern, kommt es in diesem Zeitraum zu einer symmetrischen Informations-/ und Meinungsgenerierung. True Research oder Mitarbeiter des Unternehmens sowie Personen bzw. Unternehmen die an der Erstellung beteiligt sind (Auftraggeber) halten zum Zeitpunkt der Veröffentlichung Aktien an dem Unternehmen über welche im Rahmen der Internetangebote berichtet wird. True Research oder der Autor / Verfasser behalten sich vor - wie andere Aktionäre auch - jederzeit (auch kurzfristig) Aktien des Unternehmens über die im Rahmen des Internetangebots www.true-research.de berichtet wird, einzugehen (Nachkauf) oder zu verkaufen und könnte dabei insbesondere von erhöhter Handelsliquidität profitieren. Ein Kurszuwachs der Aktien der vorgestellten Unternehmen kann zu einem Vermögenszuwachs von True Research oder des Autors führen. Auch hieraus ergibt sich ein entsprechender Interessenskonflikt Vollständiger Haftungsausschluss und weitere Hinweise gemäß §34b Abs. 1 WpHG in Verbindung mit FinAnV (Deutschland). Natürlich gilt es zu beachten, dass das behandelte Unternehmen in der höchsten denkbaren Risikoklasse für Aktien gelistet ist. Die Gesellschaft weist noch keine Umsätze auf und befindet sich auf Early Stage Level, was gleichzeitig reizvoll wie riskant ist. Es gibt keine Garantie dafür, dass sich die Prognosen der Experten und des Managements tatsächlich bewahrheiten. Damit stellt das Unternehmen einen Wechsel auf die Zukunft aus. Wie bei jedem Explorer gibt es auch hier die Gefahr des Totalverlustes, wenn sich die hohen Erwartungen des Managements nicht auf absehbare Zeit realisieren lassen. Deshalb dient das vorliegende Unternehmen nur der dynamischen Beimischung in einem ansonsten gut diversifizierten Depot. Der Anleger sollte die Nachrichtenlage genau verfolgen. Die segmenttypische Marktenge sorgt für hohe Volatilität. Der erfahrene Profitrader, und nur an diesen und nicht etwa an unerfahrene Anleger und Low-Risk Investoren richtet sich unsere Empfehlung, findet hier aber einen hochattraktiven spekulativen Wert, der über ein extremes Vervielfachungspotenzial verfügt. Canopy Growth Corporation (WKN A140QA), Aurora Cannabis (WKN A12GS7), Cannabis Wheaton ( WKN A2DRE4), Cannabis Science (WKN A0RM6Z).
Mid
[ 0.573298429319371, 27.375, 20.375 ]
Introduction {#s1} ============ *ACTN3* is a gene that encodes for alpha-actinin-3, a protein expressed only in type-II muscle fibers (North et al., [@B52]). A common polymorphism in this gene is R577X (rs1815739), where a C-to-T base substitution results in the transformation of an arginine base (R) to a premature stop codon (X). X allele homozygotes are deficient in the alpha-actinin-3 protein, which is associated with a lower fast-twitch fiber percentage (Vincent et al., [@B69]), but does not result in disease (MacArthur and North, [@B44]). The XX genotype frequency differs across ethnic groups, with approximately 25% of Asians, 18% of Caucasians, 11% of Ethiopians, 3% of Jamaican and US African Americans, and 1% of Kenyans and Nigerians possessing the XX genotype (Yang et al., [@B75]; MacArthur et al., [@B46]; Scott et al., [@B60]). *ACTN3* genotype is associated with speed and power phenotypes. Yang et al. ([@B74]) reported that elite sprint athletes had significantly higher frequencies of the R allele than controls, a finding that has been replicated multiple times in speed, power and strength athletes (Druzhevskaya et al., [@B26]; Roth et al., [@B58]; Eynon et al., [@B28]; Ahmetov et al., [@B2]; Cieszczyk et al., [@B14]; Kikuchi et al., [@B37]; Papadimitriou et al., [@B53]; Weyerstraß et al., [@B71]; Yang et al., [@B76]), although these findings are not unequivocal (Scott et al., [@B60]; Gineviciene et al., [@B31]; Sessa et al., [@B61]). Whilst Yang et al. ([@B74]) found a trend toward an increased XX genotype frequency in endurance athletes vs. controls, this relationship is less robust, with most studies reporting a lack of association between XX genotype and endurance performance (Lucia et al., [@B42]; Saunders et al., [@B59]; Döring et al., [@B25]; Kikuchi et al., [@B37]). In addition, whilst Kenyan and Ethiopian endurance runners are highly successful (Wilber and Pitsiladis, [@B72]), the frequency of the XX genotype within this group is very low at 8% (Ethiopian) and 1% (Kenyan) (Yang et al., [@B75]). As such, the general consensus is that *ACTN3* X allele likely does not modify elite endurance athlete status (Vancini et al., [@B66]). Much of the attention on *ACTN3* has focused on the robust relationship with the R allele and strength/power phenotype, with a number of reviews further exploring this relationship (Eynon et al., [@B29]; Ma et al., [@B43]; Ahmetov and Fedotovskaya, [@B3]). Indeed, a number of papers referenced *ACTN3* as a "gene for speed" (MacArthur and North, [@B44]; Chan et al., [@B13]; Berman and North, [@B8]). However, emerging evidence suggests that this polymorphism may impact a number of other traits, including exercise recovery, injury risk, and training adaptation (Delmonico et al., [@B21]; Pimenta et al., [@B55]; Massidda et al., [@B50]). The purpose of this mini-review is to further explore these potential relationships, as an increased understanding of the role played by *ACTN3* on these traits may lead to improvements in the utilization of genetic information in exercise training. *ACTN3* as a modulator of training response {#s2} =========================================== Over the last 20 or so years, the consistent underlying impact of genetics on exercise adaptation has been well explored (Bouchard et al., [@B11]; Bouchard, [@B10]). Whilst it is clear that genetics has an undoubted influence on both exercise performance (Guth and Roth, [@B34]) and adaptation (Mann et al., [@B49]), fewer studies examine the influence of individual single nucleotide polymorphisms (SNPs) (Delmonico et al., [@B21]), or a combination of SNPs (Jones et al., [@B36]), on this process. In this section, we explore the evidence regarding the impact of *ACTN3* on the post-exercise adaptive response. Following a structured literature search, we found five studies that examined the influence of *ACTN3* on exercise adaptation to a standardized training programme (Table [1](#T1){ref-type="table"}). Four of these studied resistance training (Clarkson et al., [@B15]; Delmonico et al., [@B21]; Pereira et al., [@B54]; Erskine et al., [@B27]), and one focused on aerobic training (Silva et al., [@B64]). An additional study (Mägi et al., [@B48]), monitored changes in VO~2peak~ over a five-year period in elite skiers, with no significant *ACTN3* genotype differences. However, the exercise intervention in this study was not controlled, and so we did not include it within Table [1](#T1){ref-type="table"}. There was considerable variation in the findings. For resistance training, two studies reported that the RR genotype was associated with the greatest increase in strength (Pereira et al., [@B54]) and power (Delmonico et al., [@B21]) following resistance training. One study reported no effect of *ACTN3* genotype on training adaptations following resistance training (Erskine et al., [@B27]). Another reported greater improvement in one-repetition maximum (1RM) in X allele carriers compared to RR genotypes (Clarkson et al., [@B15]). A further study utilized *ACTN3* within a 15-SNP total genotype score (TGS), finding that individuals with a higher number of power alleles (such as *ACTN3* R) exhibited greater improvements following high-intensity resistance training compared to low-intensity resistance training (Jones et al., [@B36]). However, because subjects could have the *ACTN3* XX genotype and still be classed as those who would best respond to high-intensity training (due to the possession of a higher number of alleles in other power-associated SNPs), we did not include this study within Table [1](#T1){ref-type="table"}. ###### Studies examining the interaction between *ACTN3* genotype and exercise adaptation. **Study** **Method** **Sample characteristics** **Main outcome** -------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Clarkson et al., [@B15] 12 weeks progressive resistance exercise training on non-dominant arm. Progression from 3 sets of 12 repetitions to 3 sets of 6 repetitions, with concurrent increase in load. 602 (355 females) aged 18--40 (*n* = 133 XX genotype). In females, the X allele was associated with greater absolute and relative improvements in 1RM vs. RR genotypes. Pereira et al., [@B54] 12-week high-speed power training programme. Progression from 3 sets of 10 repetitions @ 40% 1RM to 3 sets of 4 repetitions @ 75% 1RM. 139 Older (mean = 65.5 years) Caucasian females (*n* = 54 XX genotype). RR genotypes exhibited greater performance improvements (maximal strength, CMJ) compared to X allele carriers. Erskine et al., [@B27] 9-week unilateral knee extension resistance training programme. 51 previously untrained young males (*n* = 7 XX genotype). Responses to resistance training were independent of *ACTN3* genotype. Silva et al., [@B64] 18-week (3 sessions per week) endurance training programme, comprised primarily of 60-min running, individually controlled by heart rate monitor use. 206 male Police recruits (*n* = 33 XX genotype). At baseline, XX genotypes had greater VO~2~ measure scores than RR genotypes. Following training, this difference disappeared; i.e., RR had greater improvements than XX. Delmonico et al., [@B21] 10-week (3 session per week) unilateral knee extensor strength training comprised of 4--5 sets of 10 repetitions. 155 (*n* = 86 females) older (50--85 years) subjects (*n* = 39 XX genotype). Change in absolute peak power greater in RR vs. XX (*p* = 0.07) for males. Relative peak power change greater in RR vs. XX (*p* = 0.02). The variation between studies is likely due to heterogeneity at baseline between genotypes, and differences in exercise prescription. Given the prevalence of the R allele in elite speed-power and strength athletes (Yang et al., [@B74]; Vincent et al., [@B69]), it is speculatively considered that R allele carriers would respond best to speed-power and strength training (Kikuchi and Nakazato, [@B38]). However, as illustrated here, there is perhaps a paucity of data to support this position. Nevertheless, there are some potential molecular mechanisms that could underpin this proposition. Norman et al. ([@B51]) reported that mammalian target of rapamycin (mTOR) and p70S6k phosphorylation was greater in R allele carriers than XX genotypes following sprint exercise. Both mTOR and p70S6k regulate skeletal muscle hypertrophy (Bodine et al., [@B9]; Song et al., [@B65]), providing mechanistic support for the belief that hypertrophy, and hence strength and power improvements, should be greater in R allele carriers following resistance training. In addition, Ahmetov et al. ([@B1]) reported that testosterone levels were higher in male and female athletes with at least one R allele compared to XX genotypes. Whilst the direction of this association is not clear, it again supplies a possible mechanism explaining why R allele carriers may experience greater training-induced strength improvements. A single study examined the impact of this polymorphism on the magnitude of VO~2~ improvements following endurance training (Silva et al., [@B64]). Here, VO~2~ scores at baseline were greater in XX genotypes, but following training this difference was eliminated, indicating that RR genotypes had a greater percentage improvement following training. The population in this cohort were police recruits. Given that the X allele is potentially associated with elite endurance athlete status (Yang et al., [@B74]), it is not clear whether these results would be mirrored in elite endurance athletes. Clearly, further work is required to fully understand what relationship, if any, exists between *ACTN3* and improvements in aerobic capacity following training. *ACTN3* as a modulator of post-exercise recovery {#s3} ================================================ *ACTN3* R577X has also been associated with exercise-induced muscle damage; here, increased muscle damage will likely reduce speed of recovery, suggesting a potential modifying effect of this polymorphism on between-session recovery. Of the eight studies identified that examined the impact of this polymorphism on post-exercise muscle damage (Table [2](#T2){ref-type="table"}), six reported that that the X allele and/or the XX genotype was associated with higher levels of markers associated with muscle damage (Vincent et al., [@B70]; Djarova et al., [@B24]; Pimenta et al., [@B55]; Belli et al., [@B7]; Del Coso et al., [@B18],[@B19]). One study found no effect of the polymorphism (Clarkson et al., [@B17]), and one found that RR genotypes experienced a greater exercise-induced reduction in force compared to XX genotypes (Venckunas et al., [@B68]). An additional study (Del Coso et al., [@B20]) examined the impact of *ACTN3* as part of a TGS on creatine kinase (CK) response following a marathon race. Within this TGS, the R allele was considered protective against increased CK concentrations. The results indicated that those athletes with a higher TGS, and therefore greater genetic protection, had a lower CK response to the marathon. Whilst not direct evidence of the R allele\'s protective effect, as it is possible that the other SNPs used in the TGS conveyed this effect, it nevertheless strengthens the supporting argument. ###### Studies examining the interaction between *ACTN3* genotype and exercise recovery. **Study** **Method** **Sample characteristics** **Main outcome** -------------------------- -------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Pimenta et al., [@B55] Eccentric-contraction based training session. 37 male professional soccer players based in Brazil. (*n* = 9 XX genotype). Greater creatine kinase (CK) activity in XX genotypes vs. RR. Clarkson et al., [@B17] 50 maximal eccentric contractions of the elbow flexor. 157 male (*n* = 78) and female subjects of various ethnicities (*n* = 115 Caucasians; *n* = 48 XX genotype). No association of R577X with increases in CK and myoglobin (Mb) following eccentric exercise. Vincent et al., [@B70] 4 × 20 maximal single leg eccentric knee extensions. 19 healthy young males (*n* = 10 XX genotype). XX genotypes had greater peak CK activity post-training compared to RR genotypes, and reported greater increases in muscle pain. Venckunas et al., [@B68] Two bouts of 50 drop jumps. 18 young males (*n* = 9 XX genotype). RR showed greatest decrease in voluntary force, and slower recovery, compared to XX genotypes. Djarova et al., [@B24] Resting blood sample. 31 South African Zulu males (*n* = 14 Cricketers and *n* = 17 controls). No XX genotypes. R allele associated with lower CK levels (RR vs. RX). Del Coso et al., [@B19] Marathon race, pre- and post-race Counter Movement Jump (CMJ). 71 experienced runners (*n* = 8 XX genotype). X allele carriers had higher CK and Mb levels post-race compared to RR homozygotes. X allele carriers also had a greater reduction in leg muscle power compared to RR genotypes. Del Coso et al., [@B18] Triathlon competition (1.9 km swim, 75 km cycle, 21.1 km run), pre- and post-race CMJ. 23 healthy, experienced triathletes (*n* = 19 males, *n* = 5 XX genotype). X allele carriers had a more pronounced jump height reduction compared to RR genotypes. In X allele carriers, there was a tendency toward higher post-race Mb concentrations (*P* = 0.10) and CK concentrations (*P* = 0.06) compared to RR homozygotes. Belli et al., [@B7] 37.1 km adventure race (22.1 km mountain biking, 10.9 km trekking, 4.1 km water trekking, 30 m rope course). 20 well trained athletes (*n* = 15 males; *n* = 4 XX genotype). XX genotypes had higher concentrations of serum Mb, CK, lactate dehydrogenase (LDH) and AST compared to R allele carriers. The increase in post-exercise muscle damage is likely due to structural changes associated with this polymorphism. Alpha-actinin-3 is expressed only in fast-twitch muscle fibers, and X allele homozygotes are alpha-actinin-3 deficient; instead, they upregulate production of alpha-actinin-2 in these fast-twitch fibers (MacArthur et al., [@B47]; Seto et al., [@B62]). Both alpha-actinin-3 (encoded for by *ACTN3*) and alpha-actinin-2 are major structural components of the Z-disks within muscle fibers (Beggs et al., [@B6]). The Z-disk itself is vulnerable to injury during eccentric contractions (Friden and Lieber, [@B30]), and knock-out mouse models illustrates these Z-disks are less stable during contraction with increased alpha-actinin-2 concentrations (Seto et al., [@B62]). A number of the studies in Table [2](#T2){ref-type="table"} exclusively utilized eccentric contractions, whilst others focused on prolonged endurance events that include running, which incorporates eccentric contractions as part of the stretch shortening cycle with each stride (Komi, [@B41]). The overall consensus of these studies is that the X allele, and/or the XX genotype, is associated with greater markers of muscle damage following exercise that has an eccentric component; either through direct eccentric muscle action (Vincent et al., [@B70]), from sport-specific training (Pimenta et al., [@B55]), or from a competitive event requiring eccentric contractions (Belli et al., [@B7]; Del Coso et al., [@B18],[@B19]). However, there are a number of weaknesses to these studies, potentially limiting the strength of these findings. The overall subject number is modest, with a total of 376 (mean 47) across all eight studies; indeed, the study with the greatest number of subjects, Clarkson et al. ([@B17]), reported no modifying effect of this polymorphism on post-exercise muscle damage. The total number of XX genotypes was also low, with 85 reported across the studies. This is partly a function of the lower prevalence (\~18%) of this genotype, but again the study with the largest number (*n* = 48) of XX genotypes found no effect of this polymorphism (Clarkson et al., [@B17]). It is clear that, in order to increase the robustness of this association, further work with greater subject numbers is required. *ACTN3* as a modulator of exercise-associated injury risk {#s4} ========================================================= We found six studies examining the association between *ACTN3* genotype and sports injury risk (Table [3](#T3){ref-type="table"}). Three of these examined ankle sprains (Kim et al., [@B40]; Shang et al., [@B63]; Qi et al., [@B57]), with one each for non-contact injuries (Iwao-Koizumi et al., [@B35]), professional soccer players (Massidda et al., [@B50]), and exertional rhabdomyolysis (ER) (Deuster et al., [@B23]). Whilst ER is strongly related to increased CK following exercise (Clarkson and Ebbeling, [@B16]; Brancaccio et al., [@B12]), because it requires medical treatment we classified it as an injury. Of these papers, five reported a protective effect of the R allele and/or the RR genotype against injury (Deuster et al., [@B23]; Kim et al., [@B40]; Shang et al., [@B63]; Qi et al., [@B57]; Massidda et al., [@B50]). Specifically, Deuster et al. ([@B23]) found that XX genotypes were almost three times more likely to be ER patients than R allele carriers. Qi et al. ([@B57]) reported a significantly lower frequency of the RR genotype in a group of ankle sprain patients vs. controls. Kim et al. ([@B40]) found that XX genotypes were 4.7 times more likely to suffer an ankle injury than R allele carriers in their cohort of ballerinas. Shang et al. ([@B63]) reported the R allele as significantly under-represented in a cohort of military recruits reporting ankle sprains. Finally, Massidda et al. ([@B50]) demonstrated that XX genotypes were 2.6 times more likely to suffer an injury than RR genotypes, and that these injuries were more likely to be of increased severity. Only one study (Iwao-Koizumi et al., [@B35]) reported that the R allele was associated with an increased risk (OR = 2.52) of a muscle injury compared to X allele carriers in a female cohort. ###### Studies examining the interaction between *ACTN3* genotype and sports injury. **Study** **Method** **Sample characteristics** **Main outcome** ----------------------------- ----------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Iwao-Koizumi et al., [@B35] Sports injury data survey. 99 female students (*n* = 34 XX genotype). R allele associated with an increased odds ratio (OR) of 2.52 of muscle injury compared to X allele. Deuster et al., [@B23] Controls--lower body exercise test. Cases--anonymous blood or tissue sample collected after an exertional rhabdomyolysis (ER) incident. 134 controls and 47 ER patients (*n* = 38 XX genotype) XX genotypes 2.97 times more likely to be to ER cases compared to R allele carriers. Qi et al., [@B57] Ankle sprain case-control analysis. 100 patients with non-acute ankle sprain vs. 100 healthy controls (*n* = 89 XX genotype). Significantly lower frequency of RR genotype in ankle sprain group compared to controls (*p* = 0.001). Kim et al., [@B40] Ankle injury case-control analysis. 97 elite ballerinas and 203 normal female adults (*n* = 65 XX genotype). XX genotypes 4.7 times more likely to suffer an ankle injury than R allele carriers. Shang et al., [@B63] Ankle injury case-control analysis. 142 non-acute ankle sprain patients and 280 physically active controls (*n* = 87 XX genotype). All military recruits. RR genotype and R allele significantly under-represented in the acute ankle injury group. Massidda et al., [@B50] Case control, genotype-phenotype association study. 257 male professional Italian soccer players and 265 non-athletic controls. XX players were 2.6 times more likely to suffer a sports injury than RR genotypes. Severe injuries were also more likely in X allele carriers compared to RR genotypes. Regarding ER, the likely mechanism is similar to that discussed in the post-exercise muscle damage section; increased damage at the Z-disk during exercise. For ankle sprains, the mechanism is potentially related to muscle function. R allele carriers tend to have greater levels of muscle mass (MacArthur and North, [@B45]), and specifically type-II fibers (Vincent et al., [@B69]), indicating that both the RX and RR genotypes tend to have increased strength capabilities (Pimenta et al., [@B56]). For other soft-tissue injury types, again, the decreased potential of damage at the Z-disk likely reduces injury risk. This would be particularly true for eccentric contractions; given the importance of this contraction type in the etiology of hamstring injuries, this could be a further causative mechanism (Askling et al., [@B4]), alongside that of reduced muscle strength (Yamamoto, [@B73]). Alongside the modifying role of *ACTN3* on muscle strength and injury risk, emerging evidence suggests this SNP may also impact flexibility and muscle stiffness. Two studies reported an association between RR genotype and a decreased flexibility score in the sit-and-reach test (Zempo et al., [@B77]; Kikuchi et al., [@B39]). Conversely, Kim et al. ([@B40]) reported that XX genotypes had decreased flexibility in the same test. This lack of consensus is largely due to the small total study number, with greater clarity expected as research in the area evolves. It also mirrors the lack of consensus as to whether flexibility increases or decreases risk of injury (Gleim and McHugh, [@B32]), indicating the complex, multifactorial nature of injuries and their development (Bahr and Holme, [@B5]). In summary, it appears that the R allele of *ACTN3* is somewhat protective against injuries. The mechanisms underpinning this are likely varied, and related to a combination of the modifying effects of this SNP on both strength (particularly eccentric strength), exercise-induced muscle damage, and flexibility. Discussion {#s5} ========== The results of this mini-review indicate that, aside from its established role in sporting performance, the *ACTN3* R577X polymorphism also potentially modifies exercise adaption, exercise recovery, and exercise-associated injury risk. As this polymorphism directly influences both muscle structure and muscle fiber phenotype, this is perhaps unsurprising, and points to the potential use of knowledge of this polymorphism in the development of personalized training programmes. However, it is important to consider the limitations surrounding many of these studies. The subject numbers in the considered studies tended to be low, with large heterogeneity between study cohorts, ranging from untrained subjects to professional sports people, as well as differences in sex. Both of these aspects will impact the study findings; the effect of this polymorphism may be smaller in untrained subjects, for example, whereas in elite, well-trained athletes, who are likely closer to their genetic ceiling, the effect may be greater. The low subject numbers are troubling due to the relatively low XX genotype frequency, which is \~18% in Caucasian cohorts, and even lower in African and African-American cohorts. As such, XX genotypes are considerably under-represented across the considered research. The above limitations indicate further work is required to fully understand the impact of this polymorphism on these phenotypes. That said, there is some consistency between trials, allowing speculative guidelines to be developed for the use of genetic information in the development of personalized training. XX genotypes potentially have increased muscle damage following exercise that includes an eccentric component (Pimenta et al., [@B55]; Belli et al., [@B7]; Del Coso et al., [@B18],[@B19]). This information may, consequently, be used to guide between-session recovery, and during the competitive season recovery times post-competition. For example, in an elite soccer club, *ACTN3* genotype could be utilized alongside other well-established markers to determine training intensity in the days following a match, with players genetically predisposed to increased muscle damage either having a longer recovery period, or increased recovery interventions such as cold-water immersion. In addition, recent research has illustrated the positive impact of Nordic Hamstring Exercises on hamstring injury risk (van der Horst et al., [@B67]), making these exercises increasingly common in professional sports teams. These exercises have a large eccentric component, upon which this polymorphism may have a direct effect. As such, it would be expected that XX genotypes would have increased muscle soreness and damage following these exercises, potentially impacting the timing of their use within a training programme. Focusing on sporting injuries, the general consensus from the studies found is that the X allele increased the risk of ankle injuries (Kim et al., [@B40]; Shang et al., [@B63]; Qi et al., [@B57]) and general sporting injury (Massidda et al., [@B50]). Again, this information could guide training interventions. In this case, X allele carriers might undertake increased general strengthening exercises and neuromuscular training targeting injury risk reduction. Furthermore, knowledge of this information could increase athlete motivation to undertake these exercises (Goodlin et al., [@B33]). Finally, maximizing the training response is crucial, both to elite athletes looking to improve by fractions of a second, and to beginners looking to decrease their risk of disease. Increasingly, there is evidence that polymorphisms, including *ACTN3* R577X, can impact this adaptive process (Delmonico et al., [@B21]; Pereira et al., [@B54]). If further research replicates these early findings, then again, this information could be used in the development of training programmes. Regarding *ACTN3*, at present it appears that R allele carriers potentially exhibit greater increases in strength and power following high-load resistance training (Delmonico et al., [@B21]). As such, Kikuchi and Nakazato ([@B38]) speculate that R allele carriers should prioritize high-load, low-repetition resistance training if improvements in muscle strength are required, and high intensity interval (HIT) training to specifically elicit improvements in VO~2max~. Conclusion {#s6} ========== There is a clear, undoubted impact of genetics on both sporting performance and exercise adaptation. In this regard, one of the most well-studied genes is *ACTN3*, which has been reliably shown to impact speed-power and strength phenotypes. However, emerging research indicates that this polymorphism may also impact other exercise associated variables, including training adaptation, post-exercise recovery, and exercise-associated injuries; this research is summarized in Figure [1](#F1){ref-type="fig"}. This information is important, not just because it illustrates the wide-ranging impact SNPs can have, but also because it represents an opportunity to personalize, and therefore enhance, training guidelines. At present, there are no best-practice guidelines pertaining to the use of genetic information in both elite sport and the general public. However, sports teams have been using genetic information for over 10 years (Dennis, [@B22]), and continue to do so. Consequently, the development of these guidelines represents an important step from lab to practice. Clearly, further research is required to fully develop these guidelines, and at present such information is speculative. Nevertheless, the use of genetic information represents an opportunity to enhance training prescription and outcomes in exercisers of all abilities. ![A summary of the potential wider implications of *ACTN3* genotype on outcomes from exercise.](fphys-08-01080-g0001){#F1} Author contributions {#s7} ==================== CP: Conceived the idea for this manuscript, and wrote the initial draft. JK: Provided feedback on the initial draft, and made valuable changes to the manuscript, as well as providing direction. All the authors made contributions in drafting the manuscript and have approved the final version. Conflict of interest statement ------------------------------ CP is an employee of DNAFit Ltd., a genetic testing company. He received no payment for the production of this article, which was completed as part of his Professional Doctorate studies at the University of Central Lancashire. The other author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Both authors would like to thank Tshepo Mofokeng for his assistance in the design of Figure [1](#F1){ref-type="fig"}. [^1]: Edited by: Kimberly Huey, Drake University, United States [^2]: Reviewed by: Rudy Valentine, Iowa State University, United States; Moh H. Malek, Wayne State University, United States [^3]: This article was submitted to Exercise Physiology, a section of the journal Frontiers in Physiology
High
[ 0.724431818181818, 31.875, 12.125 ]