text
stringlengths
8
25.3k
Q: Analogies between VNP and NP Valiant introduced the class VNP with respect to "arithmetic circuits" over 35 years ago in a "rough" analogy to NP. Recently, there have been major advances in the area of arithmetic circuits eg as cited by Fortnow. What is the intuition that VNP and NP are similar/ analogous in some way? Is there analysis/ results since its introduction that point toward or away from this analogy? Has/ can the study of VNP lead to some insights on NP? A: The basic idea is that summing over all Boolean strings (VNP) is like counting the solutions to an NP problem. Even from this perspective, one sees that VNP is more like #P than NP. This is also true as permanent is complete for both VNP and #P. Indeed, the Boolean part of VNP is essentially just #P/poly (it contains #P/poly and is contained in $\mathsf{FP}^{\mathsf{\# P}}/poly$ [Burgisser]. Valiant already observed that $\mathsf{P/poly} \neq \mathsf{NP/poly}$ implies $\mathsf{VP} \neq \mathsf{VNP}$ over $\mathbb{F}_2$, so separating VP from VNP is necessary on the way to proving that NP is not in P/poly. Not only is it a formally necessary first step, but because of the connection between VNP and counting solutions to NP problems, one could imagine that a better understanding of VNP would yield some insight into NP as well.
Detailed Investigation of the OH Radical Quenching by Natural Antioxidant Caffeic Acid Studied by Quantum Mechanical Models. The effectiveness of naturally occurring antioxidant caffeic acid in the inactivation of the very damaging hydroxyl radical has been theoretically investigated by means of hybrid density functional theory. Three possible pathways by which caffeic acid may inactivate free radicals were analyzed: hydrogen abstraction from all available hydrogen atoms, hydroxyl radical addition to all carbon atoms in the molecule, and single electron transfer. The reaction paths were traced independently, and the respective thermal rate constants were calculated using variational transition-state theory including the contribution of tunneling. The more reactive sites in caffeic acid are the C4OH phenolic group and the C4 carbon atom, for the hydrogen abstraction and radical addition, respectively. The single electron transfer process seems to be thermodynamically unfavored, in both polar and nonpolar media. Both hydrogen abstraction and radical addition are very feasible, with a slight preference for the latter, with a rate constant of 7.29 × 10(10) M(-1) s(-1) at 300 K. Tunnel effects are found to be quite unimportant in both cases. Results indicate caffeic acid as a potent natural antioxidant in trapping and scavenging hydroxyl radicals.
A. Technical Field The present subject matter is directed to items that are usable to help educate children in learning activities. More specifically, the present subject matter is directed to the field of educational devices for teaching people about wave action and the dynamics of liquids. B. Description of Related Art Duck races are a popular pastime. It is not uncommon to see hundreds or thousands of people converge on a river to put ducks, which are almost universally yellow, into a river to see whose duck reaches the finish line first. Often, there is an entry fee and the proceeds may go to the winner or be given to a charity. It is fun for all, but the outcome is determined solely by luck. It is an object of the present subject matter to provide a water raceway device designed for racing ducks or other floating objects, where skill is a factor in the outcome of the race. It is a further object of the present subject matter to provide a water raceway device where the floating objects are conveyed down a first sluice primarily by the action of waves and are conveyed down a second sluice primarily under the force of currents. It is a further object of the present subject matter to provide an insert that can be positioned in a tub to convert the tub into a device for racing floating objects. It is a further object of the present subject matter to provide an educational experience that is so much fun that participants may not realize that they are learning about fluid dynamics and currents and waves. It remains desirable to provide improvements in water raceway devices
Investigations Editor, The Age Sharia law ... A woman is caned in Aceh for selling food during Ramadan in October. A woman and a man will soon be caned publicly for adultery. Photo: AFP Sharia police in the Indonesian province of Aceh will publicly flog a young woman for adultery after she was turned in by eight vigilantes who had already gang-raped her as punishment. The woman, a 25-year-old widow, and her alleged partner, a married 40-year old man, were caught inside her home last Thursday by a group of eight who were intent on enforcing the sharia prohibition on sex outside marriage, local media reports say. The eight, who included a 13-year-old boy, tied up and beat the man and repeatedly raped the woman before dousing both in raw sewage. They then marched the couple to the office of the local sharia police. Advertisement Ibrahim Latif, the head of the sharia police, or Wilayatul Hisbah in the town of Langsa, in Aceh’s far south-east, was quoted in TheJakarta Globe saying: “We want the couple caned because they violated the religious bylaw on sexual relations”. Under the sharia law, which is peculiar to Aceh, each of the couple faces nine strokes of the cane in a public place. The woman’s ordeal at the hands of her accusers would not be taken into account in delivering the sentence, Mr Ibrahim said. “They have to be [caned] as a form of justice … they’ve confessed to having sex several times before, even though the man is married and has five children”. The Jakarta Globe newspaper reported that Teungku Faisal Ali, the head of the Aceh chapter of the country’s largest Islamic organisation, Nahdlatul Ulama had backed the caning. The organisation is usually considered part of Indonesia’s moderate muslim maintream. However, Mr Faisal said the alleged rapists themselves should be treated more harshly than the couple, because they had “set back efforts to uphold sharia in Aceh”. He said vigilantes should not act directly, but report offences to the sharia police. Three of the alleged rapists including the boy are in police custody, and police have appealed for the families of the other five to give them up. They are facing investigation and conviction by the ordinary criminal courts. Aceh is the only province of Indonesia which enforces sharia law, after the central government in Jakarta granted its religious leaders the right to impose it in 2001 to try to quell separatist sentiment. A recent bylaw in the province extended its provisions to all residents and visitors, including non-Muslims. The law is enforced patchily, but Langsa is known to be strict. In nearby Lhokseumawe, women are prohibited from wearing tight jeans and riding astride motor scooters — they are required to go side saddle. Women are also expected to cover their hair, and young unmarried couples are not allowed to sit together in public in case sexual feelings emerge. The law has often been abused by vigilantes and overzealous officials. In one tragic case in 2012, a 16-year old girl was at a concert with friends in Langsa when the sharia police harangued her as a prostitute. When local media picked up the story the next day, repeated the accusation and published her full name, the girl hanged herself. In 2010, three sharia policemen raped a 20-year-old university student after they found her riding a motorcycle with her boyfriend.
/* * Copyright (c) 2017 The WebRTC project authors. All Rights Reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "api/video/video_content_type.h" // VideoContentType stored as a single byte, which is sent over the network. // Structure: // // 0 1 2 3 4 5 6 7 // +---------------+ // |r r e e e s s c| // // where: // r - reserved bits. // e - 3-bit number of an experiment group counted from 1. 0 means there's no // experiment ongoing. // s - 2-bit simulcast stream id or spatial layer, counted from 1. 0 means that // no simulcast information is set. // c - content type. 0 means real-time video, 1 means screenshare. // namespace webrtc { namespace videocontenttypehelpers { namespace { static constexpr uint8_t kScreenshareBitsSize = 1; static constexpr uint8_t kScreenshareBitsMask = (1u << kScreenshareBitsSize) - 1; static constexpr uint8_t kSimulcastShift = 1; static constexpr uint8_t kSimulcastBitsSize = 2; static constexpr uint8_t kSimulcastBitsMask = ((1u << kSimulcastBitsSize) - 1) << kSimulcastShift; // 0b00000110 static constexpr uint8_t kExperimentShift = 3; static constexpr uint8_t kExperimentBitsSize = 3; static constexpr uint8_t kExperimentBitsMask = ((1u << kExperimentBitsSize) - 1) << kExperimentShift; // 0b00111000 static constexpr uint8_t kTotalBitsSize = kScreenshareBitsSize + kSimulcastBitsSize + kExperimentBitsSize; } // namespace bool SetExperimentId(VideoContentType* content_type, uint8_t experiment_id) { // Store in bits 2-4. if (experiment_id >= (1 << kExperimentBitsSize)) return false; *content_type = static_cast<VideoContentType>( (static_cast<uint8_t>(*content_type) & ~kExperimentBitsMask) | ((experiment_id << kExperimentShift) & kExperimentBitsMask)); return true; } bool SetSimulcastId(VideoContentType* content_type, uint8_t simulcast_id) { // Store in bits 5-6. if (simulcast_id >= (1 << kSimulcastBitsSize)) return false; *content_type = static_cast<VideoContentType>( (static_cast<uint8_t>(*content_type) & ~kSimulcastBitsMask) | ((simulcast_id << kSimulcastShift) & kSimulcastBitsMask)); return true; } uint8_t GetExperimentId(const VideoContentType& content_type) { return (static_cast<uint8_t>(content_type) & kExperimentBitsMask) >> kExperimentShift; } uint8_t GetSimulcastId(const VideoContentType& content_type) { return (static_cast<uint8_t>(content_type) & kSimulcastBitsMask) >> kSimulcastShift; } bool IsScreenshare(const VideoContentType& content_type) { return (static_cast<uint8_t>(content_type) & kScreenshareBitsMask) > 0; } bool IsValidContentType(uint8_t value) { // Any 6-bit value is allowed. return value < (1 << kTotalBitsSize); } const char* ToString(const VideoContentType& content_type) { return IsScreenshare(content_type) ? "screen" : "realtime"; } } // namespace videocontenttypehelpers } // namespace webrtc
Cartridge Loaders: Recomended Spare Parts The following recommend spare parts and quantities are what typically would be suggested for a customer in a remote location or situated outside of North America. The order of importance is highest at the top of the list in a descending order. This is helpful if you have to adhere to a set budget. At the bottom of the list of spare parts is the TA201R Air Valve complete assembly. Some of our customers prefer to have a complete spare air valve to send underground if the loader has a problem rather than sending multiple parts.
<?php /** * @file * Contains the block display plugin. */ /** * The plugin that handles a block. * * @ingroup views_display_plugins */ class views_content_plugin_display_ctools_context extends views_plugin_display { function get_style_type() { return 'context'; } function defaultable_sections($section = NULL) { if (in_array($section, array('style_options', 'style_plugin', 'row_options', 'row_plugin',))) { return FALSE; } return parent::defaultable_sections($section); } function option_definition() { $options = parent::option_definition(); $options['admin_title'] = array('default' => '', 'translatable' => TRUE); // Overrides for standard stuff: $options['style_plugin']['default'] = 'ctools_context'; $options['row_plugin']['default'] = 'fields'; $options['defaults']['default']['style_plugin'] = FALSE; $options['defaults']['default']['style_options'] = FALSE; $options['defaults']['default']['row_plugin'] = FALSE; $options['defaults']['default']['row_options'] = FALSE; return $options; } /** * The display block handler returns the structure necessary for a block. */ function execute() { $this->executing = TRUE; return $this->view->render(); } function preview() { $this->previewing = TRUE; return $this->view->render(); } /** * Render this display. */ function render() { if (!empty($this->previewing)) { return theme($this->theme_functions(), $this->view); } else { // We want to process the view like we're theming it, but not actually // use the template part. Therefore we run through all the preprocess // functions which will populate the variables array. $hooks = theme_get_registry(); $info = $hooks[$this->definition['theme']]; if (!empty($info['file'])) { @include_once('./' . $info['path'] . '/' . $info['file']); } $this->variables = array('view' => &$this->view); if (isset($info['preprocess functions']) && is_array($info['preprocess functions'])) { foreach ($info['preprocess functions'] as $preprocess_function) { if (function_exists($preprocess_function)) { $preprocess_function($this->variables, $this->definition['theme']); } } } } return $this->variables; } /** * Provide the summary for page options in the views UI. * * This output is returned as an array. */ function options_summary(&$categories, &$options) { // It is very important to call the parent function here: parent::options_summary($categories, $options); $categories['context'] = array( 'title' => t('Context settings'), ); $admin_title = $this->get_option('admin_title'); if (empty($admin_title)) { $admin_title = t('Use view name'); } if (strlen($admin_title) > 16) { $admin_title = substr($admin_title, 0, 16) . '...'; } $options['admin_title'] = array( 'category' => 'context', 'title' => t('Admin title'), 'value' => $admin_title, ); } /** * Provide the default form for setting options. */ function options_form(&$form, &$form_state) { // It is very important to call the parent function here: parent::options_form($form, $form_state); switch ($form_state['section']) { case 'row_plugin': // This just overwrites the existing row_plugin which is using the wrong options. $form['row_plugin']['#options'] = views_fetch_plugin_names('row', 'normal', array($this->view->base_table)); break; case 'admin_title': $form['#title'] .= t('Administrative title'); $form['admin_title'] = array( '#type' => 'textfield', '#default_value' => $this->get_option('admin_title'), '#description' => t('This is the title that will appear for this view context in the configure context dialog. If left blank, the view name will be used.'), ); break; } } /** * Perform any necessary changes to the form values prior to storage. * There is no need for this function to actually store the data. */ function options_submit(&$form, &$form_state) { // It is very important to call the parent function here: parent::options_submit($form, $form_state); switch ($form_state['section']) { case 'admin_title': $this->set_option($form_state['section'], $form_state['values'][$form_state['section']]); break; } } /** * Block views use exposed widgets only if AJAX is set. */ function uses_exposed() { return FALSE; } }
After countless hours of development, DJR Team Penske believe their newly unveiled Mustang will keep them at the top of Supercars in the 2019 season. Series champion Scott McLaughlin and teammate Fabian Coulthard unveiled the new livery in Melbourne on Monday. Ahead of testing at Phillip Island on Thursday, McLaughlin endorsed Ford's first new build in a decade, saying it "looks fast standing still". The two-door coupe has largely unchanged colours and one major difference – the galloping horse badge on the grill. But there's been a decidedly mixed reaction to the Mustang's homologation to meet Supercars standards. The enormous wing is a particular sore point with many, but not McLaughlin. "I love it. The rear wing is a big talking point with a lot of people," he said. "It’s nice to see it with the proper colours ... those stickers on it it looks really cool. I reckon it looks tough." The Mustang reveal took place with the help of team legend Dick Johnson, replacing the soft launch last month when the Mustang was covered head-to-toe in a blue camouflage. "From when everybody first saw it with the blue camo, it disguised the look of the car probably too good," Coulthard said. "Now you see the shape of the car, the lines, I think it looks awesome." The car will debut on a race track in testing at Phillip Island, before the season-opening Adelaide 500 begins February 28. Team director Ryan Story cut a delighted, if fatigued, figure at the launch. "We're ecstatic with how the car has come together and how it looks in our 2019 warpaint ... and are hopeful of continuing the success we've enjoyed," he said. Story acknowledged the divisive reaction, agreeing there was always a trade-off between form and function. "It was always going to be a little bit polarising in terms of the decisions we had to make to make sure we met the rules of Supercars and effectively fitting a Mustang into the controlled chassis," he said. "The primary player in the development of the car was Ford Performance so the hint is probably in the name. Brian Novak form Ford Performance put it best when he said 'there are no ugly cars in victory lane'." Supercars: Scott McLaughlin says title defence looking good After countless hours of development, DJR Team Penske believe their newly unveiled Mustang will keep them at the top of Supercars in the 2019 season. HORSEPOWER: Supercars champion Scott McLaughlin and the new DJR Team Penske Ford Mustang. Series champion Scott McLaughlin and teammate Fabian Coulthard unveiled the new livery in Melbourne on Monday. Ahead of testing at Phillip Island on Thursday, McLaughlin endorsed Ford's first new build in a decade, saying it "looks fast standing still". The two-door coupe has largely unchanged colours and one major difference – the galloping horse badge on the grill. But there's been a decidedly mixed reaction to the Mustang's homologation to meet Supercars standards. The enormous wing is a particular sore point with many, but not McLaughlin. "I love it. The rear wing is a big talking point with a lot of people," he said. "It’s nice to see it with the proper colours ... those stickers on it it looks really cool. I reckon it looks tough." The Mustang reveal took place with the help of team legend Dick Johnson, replacing the soft launch last month when the Mustang was covered head-to-toe in a blue camouflage. "From when everybody first saw it with the blue camo, it disguised the look of the car probably too good," Coulthard said. "Now you see the shape of the car, the lines, I think it looks awesome." The car will debut on a race track in testing at Phillip Island, before the season-opening Adelaide 500 begins February 28. Team director Ryan Story cut a delighted, if fatigued, figure at the launch. "We're ecstatic with how the car has come together and how it looks in our 2019 warpaint ... and are hopeful of continuing the success we've enjoyed," he said. Story acknowledged the divisive reaction, agreeing there was always a trade-off between form and function. "It was always going to be a little bit polarising in terms of the decisions we had to make to make sure we met the rules of Supercars and effectively fitting a Mustang into the controlled chassis," he said. "The primary player in the development of the car was Ford Performance so the hint is probably in the name. Brian Novak form Ford Performance put it best when he said 'there are no ugly cars in victory lane'."
The seizure prognosis of juvenile myoclonic epilepsy. Thirty-two patients with juvenile myoclonic epilepsy (JME) were studied to evaluate the seizure prognosis. The response to antiepileptic drugs was excellent in 68%, but the patients, who had much more focal discharges on EEG and were sensitive to neuropsychological EEG activations at the beginning of treatment, had an unfavorable outcome. A combination of absence seizure alone resulted in the excellent prognosis for both absence and myoclonic seizures, and a combination of generalized tonic-clonic seizure on awakening related to rare myoclonic seizures. These findings suggest that the outcome of JME would be predicted by the EEG abnormality and the combination of the other types of seizures, which are probably determined by the pathophysiology at the beginning of treatment.
BOSTON -- On the hottest day of the year in Boston, David Ortiz led the Red Sox to their biggest offensive attack of the season. Ortiz continued his torrid hitting with a grand slam for one of their four homers as they set a season high in runs, beating the Miami Marlins 15-5 on Wednesday night. The Red Sox pounded out 16 hits and won their fourth straight game and sixth in their last seven on a night when the game-time temperature was 95 degrees. "The weather warmed up a little. Guys felt loose," Boston manager Bobby Valentine said. Ortiz hit his 18th homer of the season, his third in three games and fourth in six, a span in which he is 9 for 20. The grand slam in a six-run fourth inning was the 11th of his career. "I don't get many opportunities (with pitches) over the plate," he said. "I just try to be patient for that one pitch they give me to hit." The Red Sox moved out of last place in the AL East at 35-33, passing Toronto after the Blue Jays lost 8-3 to Milwaukee. Mike Aviles, Jarrod Saltalamacchia and Will Middlebrooks also homered one night after Ortiz hit one of Boston's three homers in a 7-5 victory over Miami. "Hitting is definitely contagious and so is winning," Aviles said. "Any time you get a couple of wins together you just get that good confidence going and you just keep rolling with it and that's where we're at right now." The Marlins lost for the 12th time in 14 games despite getting four runs and nine hits in six innings against Felix Doubront (8-3). Ricky Nolasco (6-6) gave up nine runs and nine hits in 3 1/3 innings. "I just think we're all trying to get on a positive run right now," he said. "It's just not happening. The last two games we swung the bats well. We just haven't pitched (well)." The Red Sox offense has come alive in the past week with at least seven runs in four of their last six games.
/* * Copyright (C) 2015 - 2018, IBEROXARXA SERVICIOS INTEGRALES, S.L. * Copyright (C) 2015 - 2018, Jaume Olivé Petrus ([email protected]) * * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * Neither the name of the <organization> nor the * names of its contributors may be used to endorse or promote products * derived from this software without specific prior written permission. * * The WHITECAT logotype cannot be changed, you can remove it, but you * cannot change it in any way. The WHITECAT logotype is: * * /\ /\ * / \_____/ \ * /_____________\ * W H I T E C A T * * * Redistributions in binary form must retain all copyright notices printed * to any local or remote output device. This include any reference to * Lua RTOS, whitecatboard.org, Lua, and other copyright notices that may * appear in the future. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL <COPYRIGHT HOLDER> BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * Lua RTOS, BH1721FVC sensor (Ambient Light) * */ #include "sdkconfig.h" #if CONFIG_LUA_RTOS_LUA_USE_SENSOR #if CONFIG_LUA_RTOS_USE_SENSOR_BH1721FVC #define BH1721FVC_I2C_ADDRESS 0b0100011 #include <math.h> #include <string.h> #include <sys/driver.h> #include <sys/delay.h> #include <drivers/sensor.h> #include <drivers/i2c.h> driver_error_t *BH1721FVC_presetup(sensor_instance_t *unit); driver_error_t *BH1721FVC_acquire(sensor_instance_t *unit, sensor_value_t *values); driver_error_t *BH1721FVC_set(sensor_instance_t *unit, const char *id, sensor_value_t *setting); // Sensor specification and registration static const sensor_t __attribute__((used,unused,section(".sensors"))) BH1721FVC_sensor = { .id = "BH1721FVC", .interface = { {.type = I2C_INTERFACE}, }, .data = { {.id = "illuminance", .type = SENSOR_DATA_FLOAT}, }, .properties = { {.id = "resolution", .type = SENSOR_DATA_INT}, {.id = "calibration",.type = SENSOR_DATA_FLOAT}, }, .presetup = BH1721FVC_presetup, .acquire = BH1721FVC_acquire, .set = BH1721FVC_set }; /* * Operation functions */ driver_error_t *BH1721FVC_presetup(sensor_instance_t *unit) { // Set default values, if not provided if (unit->setup[0].i2c.devid == 0) { unit->setup[0].i2c.devid = BH1721FVC_I2C_ADDRESS; } if (unit->setup[0].i2c.speed == 0) { unit->setup[0].i2c.speed = 400000; } unit->properties[0].integerd.value = 1; // H-Resolution Mode unit->properties[1].floatd.value = 0; // Calibration = 0 return NULL; } driver_error_t *BH1721FVC_acquire(sensor_instance_t *unit, sensor_value_t *values) { uint8_t i2c = unit->setup[0].i2c.id; int16_t address = unit->setup[0].i2c.devid; driver_error_t *error; int transaction = I2C_TRANSACTION_INITIALIZER; uint8_t buff[2]; // Power on buff[0] = 0x01; error = i2c_start(i2c, &transaction);if (error) return error; error = i2c_write_address(i2c, &transaction, address, 0);if (error) return error; error = i2c_write(i2c, &transaction, (char *)&buff, 1);if (error) return error; error = i2c_stop(i2c, &transaction);if (error) return error; delay(16); // Set resolution mode if (unit->properties[0].integerd.value == 0) { // Auto-Resolution Mode buff[0] = 0b00010000; } else if (unit->properties[0].integerd.value == 1) { // H-Resolution Mode buff[0] = 0b00010010; } else if (unit->properties[0].integerd.value == 2) { /// L-Resolution Mode buff[0] = 0b00010011; } error = i2c_start(i2c, &transaction);if (error) return error; error = i2c_write_address(i2c, &transaction, address, 0);if (error) return error; error = i2c_write(i2c, &transaction, (char *)&buff, 1);if (error) return error; error = i2c_stop(i2c, &transaction);if (error) return error; delay(180); // Read error = i2c_start(i2c, &transaction);if (error) return error; error = i2c_write_address(i2c, &transaction, address, 1);if (error) return error; error = i2c_read(i2c, &transaction, (char *)buff, 2);if (error) return error; error = i2c_stop(i2c, &transaction);if (error) return error; // Power down buff[0] = 0x00; error = i2c_start(i2c, &transaction);if (error) return error; error = i2c_write_address(i2c, &transaction, address, 0);if (error) return error; error = i2c_write(i2c, &transaction, (char *)&buff, 1);if (error) return error; error = i2c_stop(i2c, &transaction);if (error) return error; values[0].floatd.value = ((buff[0] << 8) + buff[1]) / 1.2; values[0].floatd.value += unit->properties[1].floatd.value; return NULL; } driver_error_t *BH1721FVC_set(sensor_instance_t *unit, const char *id, sensor_value_t *setting) { if (strcmp(id,"resolution") == 0) { if ((setting->integerd.value < 0) || (setting->integerd.value > 2)) { return driver_error(SENSOR_DRIVER, SENSOR_ERR_INVALID_VALUE, NULL); } memcpy(&unit->properties[0], setting, sizeof(sensor_value_t)); } else if (strcmp(id,"calibration") == 0) { memcpy(&unit->properties[1], setting, sizeof(sensor_value_t)); } return NULL; } #endif #endif
Q: How to check the docker-compose file version? I would like to make sure that I'm using version 3 of the compose file format. However, on https://docs.docker.com/compose/compose-file/ I was not able to find out how to do this. My Docker version is 17.04.0-ce, build 4845c56, and my Docker-Compose version is docker-compose version 1.9.0, build 2585387. I'm not sure since when version 3 of the compose file format was introduced, however. How can I find this out? A: It's on your docker-compose.yml file. First parameter is Docker Compose version. version: '3' Docker Compose version file 3 was introduced in release 1.10.0 of Docker Compose and 1.13.0 release of Docker Engine. Here you can see release notes for Docker Compose 1.10.0 which introduces version file 3: https://github.com/docker/compose/releases/tag/1.10.0
The Los Angeles Kings boast some impressive features going into 2011-12. They have a great goalie duo, with a productive and growing starter in Jonathan Quick and a backup who makes scouts drool in Jonathan Bernier. After years of asking a lot from Anze Kopitar, the team will ease his burden with the addition of Mike Richards (and there could be a nice trickle down effect for Jarret Stoll, who slides into a more appropriate third line center role). From Drew Doughty to Willie Mitchell and Rob Scuderi, the Kings rock a hockey nerd’s dream of a defense and have the head coach to make it all work. Yup, the Kings look like serious contenders on paper. There’s only one position that troubles many observers: the wings. That’s a compelling group, but the problem is that both Gagne and Williams have a long history of injury issues in their careers. Penner lost favor with a lot of Kings fans in his struggles after a splashy trade deadline move, but if nothing else, he was supposed to join Brown as the healthy ones. After all, Penner has only missed four games in the last five seasons. It’s listed as a lower-body injury, with no clear indication of how severe it might be. Penner scored just six points in 19 regular season games and two points in six playoff games while drawing the ire of Kings fans. I have a strange feeling that he could make a more positive impact this season – at least on offense – because he’s in a contract year. (The Anaheim Ducks won the Stanley Cup the last year he was fighting for a new deal, for one thing.)
As the holiday season is just around the corner, British officials are warning buyers about cheap, counterfeit ‘hoverboards’ – one of the top gifts in 2015 – that are very dangerous and may even catch on fire. Since October, more than 17,000 ‘hoverboards’ – which are wheeled, self-balancing scooters – have been examined, and about 88 percent of them (or 15,000) are considered dangerous to users. There have also been incidents in which hoverboards caught on fire, because the battery cut-off switch failed to work, making the product overheat. Leon Livermore, chief executive of the Charted Trading Standards Institute (CTSI) said that in an attempt to flood the market, irresponsible manufacturers will often produce cheap and unsafe products. According to Consumer Minister Nick Boles, around the holidays customers are usually under pressure to buys the prefect presents, but they should always keep in mind that safety always comes first. Livermore advises customers to remain vigilant especially during the holidays, to avoid purchasing an unsafe product, and to not let their judgement be clouded by a new craze or fashion. NetNames, a company that provides internet domain name management services and online brand protection, found that for the IO Hawk hoverboard about 99 percent of the online listings were fake. The World Customs Organization stated that counterfeit products are on the rise especially on online marketplaces. Each year, about $500 billion are made from sales of counterfeit goods, which account for ten percent of global trade. Jeff Hardy, director of Business Action to Stop Counterfeiting and Piracy at the International Chamber of Commerce, said that counterfeit goods are already hard enough to track down in the real world, not to mention the virtual world. Moreover, online marketplaces make it difficult for buyers to make a distinction between the counterfeit and the real product. Gary Mcllraith, Chief Executive Officer (CEO) at NetNames, said that counterfeiters take advantage of the growing numbers of online shoppers, by infringing the trademarks, products, and packaging of popular brands. The UK National Trading Standards advises people who are looking to buy a hoverboard for their loved ones as a holiday gift, to research the company before making the purchase. Customers should also be wary of the extremely low prices, which may indicate that the product is in fact ‘too good to be true’. Image Source: redditmedia
Go To Page: [ 1 · 2 ] In this tutorial you will learn how to create a very cool and unique Bamboo Text Effect that looks amazing when used on many different types of projects. Here is what you will be creating with this tutorial: This effect works great on a travel agency brochure, or even a vacation website as shown in this example: Note: This tutorial is intended for use with Adobe Photoshop CS and CS2 software. Page 2 of 2 Step 8.) Once again, merge all of these layers together as we have done in step #6. Hold down the SHIFT key on your keyboard and click each layer once to select it. Once all layers are highlighted except the background layer, press go to Layer->Merge. Press CTRL + J on your keyboard to duplicate this layer. Press CTRL + T on your keyboard to open up the Freeform Transform Tool. Right click the layer and select 'Warp': PS 7 Users: You may be able to create this effect by going to "Filter->Distort->Shear" and adjusting the settings until you have something similar to what we have come up with. Get out Move Tool () and position this duplicate layer as l have done here. Step 10.) Duplicate the layer we named "Straight Bamboo" by clicking it once to select it, and pressing CTRL+ J on your keyboard. Go to Edit->Transform->Rotate 90° Change the layer mode of this layer to "Linear Dodge": Using the Move Tool () position it on the top of the pieces as l have done here, to create a "T" shape. Step 11.) Similarly create the other characters that you need for your text using the same techniques. Simply duplicate the straight, and curved pieces that we have already created and use them to build the other letters you need for your logo, or signature text. By looking at this image, you should be able to tell where l have used the curved pieces, and where l have used the straight ones: Step 12.) Select and merge all layers. CS Hold down the SHIFT key on your keyboard and click each layer once to select it. Once all layers are highlighted except the background layer, press go to Layer->Merge. Press CTRL + U on your keyboard to open up the HUE/SATURATION window, and apply the following settings: Make sure Colorize is checked Step 14.) Duplicate this layer and change the layer mode to "Color Dodge", to give the text effect a little more depth: This completes our tutorial on how to create "Bamboo Text". It takes a little time to get used to it, but once you have the pieces made, the rest of the work falls into place very easily. Here is how my final result ended up: Here is how something like this might look on a travel brochure, or vacation website header: Related Tutorials: Glossy ButtonsIn this tutorial you will learn how to make quick and effective looking round gl ... Easy ApophysisThis tutorial will explian how to create a great Apophysis effect w/out using an ... Cristillic IceLearn how to make the widely popular "cristillic-ice" effect that you see used o ...
Q: porting win32 code (windows.h) to linux I'm working on a c++ project where I have bunch of Visual Studio generated project files that I want to port to linux. I essentially am using windows.h header file in multiple files on Windows. Now, I'm unsure as there explicitly exists no linux.h file (incase it does, please guide me where to look at). On linux I'm using Eclipse CDT for development. I've two ideas in mind of how possibly it would work on linux but I want your input to know what the right direction is: (1) To remove the windows API calls with Linux API calls in the C++ files. But this would mean, I've to find equivalent function in linux which I am not sure where to look at. eg. Filetime in Win32 is equivalent to something in linux (haven't found this thing yet). (2) I copy the basic syntax of these functions (as written in windows.h) and just create a header file (lets say i name it linux.h) and include this header file in project on linux. So, apparently you might have figured out that I'm confused of how to move things ahead. I just want to work this thing out. Please suggest me ideas/views other than following: (1) No, I don't want to use Boost. (2) I don't want to rewrite the files in Visual Studio. A: Linux implements the POSIX API. If you follow path (1), you'll need to find the replacement headers and calls from here. Alternatively, you could use Winelib to try to compile your Windows code "natively" on Linux. The Wine Project implements much of the Windows API, so it could work, and it's theoretically possible to recompile your Windows program to run on Linux for ARM, for instance, but they make no guarantees about that. However, if you want to follow that second path, you'll need to recompile for each version of Wine that your users might have installed, so if they're on x86, it makes more sense to just give them the binary along with a custom wine prefix configured to a state known to work. A third alternative is to drop all of that, and rewrite using a toolkit like Qt that will cross-compile across Windows/Mac/Linux, and drop direct calls to the underlying operating system. If you find your code often needing to work across different operating systems, this is probably the best choice. A: It sounds like you want the Windows APIs on Linux. I would think that you should also consider making your C++ code portable by replacing the Windows API calls with portable libraries like STL and Boost. But, if you really can't do that, then look into WineHQ, which is an implementation of Windows APIs on Linux. A: It really depends on your application. If its a non-gui app command line only. You should look at replacing your win32 calls with posix versions of the functions which are compatible with different platforms (linux, Mac OS X). So that is option 1. You can convert Filetime to posix here and wrap it with your own function that has an #ifdef for each os you want to compile on. Options 2 is a pain, been there done that. But it can still be an option, it really depends on how many Win32 functions you have in your source code and how different they are from the posix version. I do not recommend this option. Option 1 is better once you learn the posix versions of the win32 functions and just stop using the win32 function as much as possible.
"The United States participated actively and effectively in the negotiation of the Convention . It marks a significant step in the development during this century of international measures against torture and other inhuman treatment or punishment. Ratification of the Convention by the United States will clearly express United States opposition to torture, an abhorrent practice unfortunately still prevalent in the world today. The core provisions of the Convention establish a regime for international cooperation in the criminal prosecution of torturers relying on so-called 'universal jurisdiction.' Each State Party is required either to prosecute torturers who are found in its territory or to extradite them to other countries for prosecution."
Talos Secure Workstation – New, Lower Pricing - mpartel https://www.crowdsupply.com/raptor-computing-systems/talos-secure-workstation/updates/new-lower-pricing ====== __d Yeah, but ... it's still insane :-( ------ whyagaindavid Wish them well but I cant afford :-(
Beyond ‘Dark Knight': What if Wes Anderson made Batman reboot? Feb. 06, 2012 | 6:36 p.m. BATFILMS OF THE FUTURE? The end is near — when the credits roll on “The Dark Knight Rises” this July, it will mark the end of Christopher Nolan’s Batman trilogy and the final adventure for Christian Bale as the caped crusader of Gotham City. Warner Bros. executives have made it clear they won’t leave the iconic property sitting on a shelf, however, and a new director and star tandem could be inhabiting Wayne Manor by 2014. But how on earth will any filmmaker follow the work of Nolan and company? Working together, Hero Complex lead writer Geoff Boucher and graphic artist Sean Hartter came up with 15 imaginary Batman reboots — and, yes, they did it with tongue in cheek. Matthew Vaughn: "Batman: Mad City" (Sean Hartter / For Hero Complex) Matthew Vaughn’s “Batman: Mad City”: Maybe the future of Gotham is in the past? That approach worked in a big way for Fox’s Marvel mutant franchise, which was losing its mojo before “X-Men: First Class” found a retro energy that managed to channel both Jack Kennedy and Jack Kirby. How great would it be to see “First Class” director Matthew Vaughn and star Michael Fassbender jump over to the DC Universe to give us a Bruce Wayne of the “Mad Men” era that might sync up nicely with Darwyn Cooke’s vintage vision of the caped crusader in comics? Todd Phillips’ “Dude, Where’s My Batmobile?”: After the grimmer-than-grim Nolan films, maybe we could all use a laugh. When Batman (Bradley Cooper) goes on vacation, his housesitter, Billy “Matches” Malone (Ashton Kutcher) decides to smoke up and take the ultimate joyride at the wheel of the Batmobile — but what happens when the villains of Gotham City mistakenly think the affable pothead is the real caped crusader? With Dwayne Johnson as Killer Croc, Zach Galifianakis as the Penguin, Emma Stone as Barbara Gordon and Elisha Cuthbert as Harley Quinn. Wes Anderson’s “Alfred Pennyworth, the Life Nocturnal”: Hey Gotham City, why so serious? Bill Murray stars in this quirky, existential Wes Anderson film about the aging manservant who keeps an eye on the demons and delusions of a billionaire recluse named Bruce Wayne (Luke Wilson) who likes to wear a cape and pretend he is a masked vigilante. The film also stars as Danny Glover as Jim Gordon, Gwyneth Paltrow as Selina Kyle, Jason Schwartzman as Dick Grayson and Owen Wilson as Harvey Dent. Gene Hackman makes a cameo appearance as the ghost of Thomas Wayne. Comments 16 Responses to Beyond ‘Dark Knight': What if Wes Anderson made Batman reboot? I think it should definitely go in a direction with a little more "fantasy" but not campy. I think for a BIG name.. GUILLERMO DEL TORO would be great because look at his work of blending reality/fantasy …i.e. PAN'S LABRYNTH. Del Toro & Chris also did a Q & A last year that was great. They seemed to get on well… Look it up. 2nd idea, I think it should also be MUCH darker. Never found Batman to be as dark or imitimdating as he could be. He should be full of RAGE as the bat. Remember this is the guy who walks a fine line, where he should be portrayed as the guy that any minute can cross over & BE the villian. My 2nd idea for a director (well out there) would be ROB ZOMBIE. Look at his work & then when you see LORDS OF SALEM. I think that will sell you on it. 3rd choice.. like Çhris (who only had 3 films under his belt at the time of his hiring)… I suggest ZAL BATMANGLIJ. I think he's the next Christopher Nolan in general. Don't believe me? Wait till 2012 is over. SOUND OF MY VOICE & THE EAST. Enough will be said after that & he'l be on ALL of your radars. Out of the above choices that were suggested… I dig RIDLEY SCOTT'S the most. DO YOU WANT BATMAN TO BE TERRIBLE? DO YOU HAVE A MENTAL DISABILITY?!!!!! Rob Zombie???????? HE WOULD RUIN the movie. Rob Zombie is one of the worst directors ever. His reboot of Halloween was pathetic. ROB ZOMBIE? Seriously, was that a joke???? Do you even want the movie to be good? Rob Zombie should be the last person on the list that you contact. I'd rather have someone who has only directed spanish soap operas as director that Rob Zombie. There are experssions batman makes in the Hush series that look like Bale. I'll never like any other Batman, considering I know every possible actor in the world right now and they all just don't have what it takes. It's too bad they can't just go from movie to tv, with the way the writing and directing is on person of interest, it might be smarter than letting some idiot nephew of some exec make a new batman. There are over a hundred thousand actors in SAG. You know them all? Or just the fifty most common faces of the lot? And I'm glad producers don't think like you; otherwise, we never would have seen a new Batman in the form of Christian Bale. In fact, there might be a seven-year-old out there who will one day don the cape crusader's cowl and when he does someone like you will say, "…I'll never like any other Batman…" i have to say ur right they need to talk nolan into something were he over looks the movies i even think azreal needs to be add and make three more movies and let batman heal up and then they wont have to replace bale,as well i would love to see nolans take on scar face,the mad hatter,killer croc and depending on the end of rises have bane come back in the thrid one as well and even try to get bale back and now they could use azreal losing his mind with bane wanting pay back and batman forced out of retirement to bring both of them down and they could push it father. and in the next three movie have little cameos were it shows bruce training a young man not robin but nightwing forming and molding him to take the mantal but at the end of the 3rd movie have him tell bruce there will never be another batman and he dont want to try to fill in that he well make his own name and now they have more movies and it leaves bale and nolans batman alone without worry.then they could use pinguen moving in the city to take over as a mob boss,ridder but make him more like arkham city ridder there just so many ways they could do it and leave nolans batman world alone,but they always need to have nolan over looking the making of these movies couse nobody wants to relive the 90s batman Christopher Nolan didn't just reboot Batman – he reboot movies. After Batman Begins, his movies have been mentioned as inspiration for nearly every superhero and sci-fi movie to have been released since, including The Amazing Spider-Man. The thing Nolan avoided though was something that got away from the realistic tone of the movies. He had to ditch the immortality of Ras al-Ghul and the chemical bath the Joker got. Now he has shifted Bane from a chemically-induced strong-man into an asthmatic with radical headgear. It all works, but the approach essentially eliminated a number of characters whose realistic version would have been difficult to render. No matter what approach the next version takes (even though it should ride very close if not parallel to Chris Nolan's), as so long as the filmmakers care enough about having a story to tell and characters to develop, as the Nolans have, then it should be fine. And on that note, Chris Nolan is rumored to be producing the next version for Warner Brothers. Honestly, give the director's chair to Jonathan Nolan. I don't want anyone else having creative control over this character other than the Nolans and maybe David S Goyer.
Altered transforming growth factor-beta pathway expression pattern in rat endometrial cancer. Endometrial cancer is the most abundant female gynecologic malignancy, ranking fourth in incidence among invasive tumors in women. Females of the BDII inbred rat strain are extremely prone to endometrial adenocarcinoma (EAC), and approximately 90% of virgin females spontaneously develop EAC during their lifetime. Thus, these rats serve as a useful model for the genetic analysis of this malignancy. In the present work, gene expression profiling, by means of cDNA microarrays, was performed on cDNA from endometrial tumor cell lines and from cell lines derived from nonmalignant lesions/normal tissues of the endometrium. We identified several genes associated with the transforming growth factor-beta (TGF-beta) pathway to be differentially expressed between endometrial tumor cell lines and nonmalignant lesions by using clustering and statistical inference analyses. The expression levels of the genes involved in the TGF-beta pathway were independently verified using semiquantitative reverse-transcription polymerase chain reaction. Repressed TGF-beta signaling has been reported previously in EAC carcinogenesis, but this is the first report demonstrating aberrations in the expression of TGF-beta downstream target genes. We propose that the irregularities present in TGF-beta pathway among the majority of the EAC tumor cell lines may affect EAC carcinogenesis.
Q: How make a select with "repeated" condition in SQL? I have the following select that need to be done: select top 1 a, b, c, d from Products where CodDep = 10 or CodDep = 11 or CodDep = 12 or CodDep = 13 or CodDep = 26 or CodDep = 27 or CodDep = 32 or CodDep = 34 or CodDep = 248442 or CodDep = 259741 order by LastUpdate Is there an easy way to do this without all this repetition? A: select top 1 a, b, c, d from Products where CodDep IN (10,12,12,13,26,27,32,34,248442,259741) order by LastUpdate
Q: Struggling with return data from a jQuery call to vb.Net asmx web service I am writing my first HTML5 based app, I am also writing my first web service and attempting inner connectivity between the two. Too facilitate a test bed for this I have setup a simple local .vb based web service which is as follows: <System.Web.Script.Services.ScriptService()> _ <WebService(Namespace:="http://tempuri.org/")> _ <WebServiceBinding(ConformsTo:=WsiProfiles.BasicProfile1_1)> _ <Global.Microsoft.VisualBasic.CompilerServices.DesignerGenerated()> _ Public Class Verify Inherits System.Web.Services.WebService <WebMethod()> _ Public Function HelloWorld() As String Return "Hello World" End Function <System.Web.Services.WebMethod()> _ Public Function UsernameVerify(ByVal username As String) _ As Boolean Return (username = "Username") End Function <System.Web.Services.WebMethod()> _ Public Function PasswordVerify(ByVal pass As String) _ As Boolean Return (pass = "RandomPassword123") End Function End Class I wanted to test that my app was able to connect to the web service, send the data, and receive the appropriate return. To do this I used jQuery: function verifyInfo(){ $.ajax( { Type: 'Post', url: 'http://localhost/TestWebService/Verify.asmx/HelloWorld', success: function(data){alert(data);}, error: function (XMLHttpRequest, textStatus, errorThrown) { debugger; } }); } The problem right now is that the value stored in data is printed as [object Document] and I am not entirely sure where to proceed from here. From the call to HelloWorld function invoke I would expect to return a string Hello World. When I do a browser based test via debugging in visual studio the invokes work fine and return appropriate XML outputs such as: <string xmlns="http://tempuri.org/">Hello World</string> Sorry for such a long post but hoping to get some guidance on how to get the expected data back as a return after POSTing to the web service. Thank you in advance for any tips/hints/suggestions. A: ASMX returns results in "d" wrapper. See this very nice article http://encosia.com/never-worry-about-asp-net-ajaxs-d-again/ so try something like: success: function(data){alert(data.d);} UPDATE: Also try to define proper content type of your ajax call: $.ajax({ type: 'POST', url: [your url] data: [your data], contentType: 'application/json; charset=utf-8', dataType: 'json', success: function (data) {alert(data.d);} }); UPDATE 2: Try to also change your web method to this (add a response format): <WebMethod()> _ <ScriptMethod(ResponseFormat:=ResponseFormat.Json)> _ Public Function HelloWorld() As String Return "Hello World" End Function
[The influence of left atrial cuff rejection on pulmonary hemodynamics after canine lung allotransplantation]. Several factors influence pulmonary hemodynamics after lung transplantation: reimplantation response, lung rejection reaction and imperfect anastomosis technique. In this experiment, five cases presented marked elevation of mean pulmonary artery pressure at the time or right pulmonary artery occlusion test performed two weeks postoperatively. Left atrial cuff rejection reaction arose in one case in which edema and stenosis of the pulmonary vein outflow tract were evidenced. This finding demonstrated that the changes in pulmonary hemodynamics after transplant suggest the possibility of inducement by left atrial cuff rejection reaction.
MLB Players Primed for Breakout Seasons Paul Sancya/Associated PressBilly Hamilton is one of the many names that could breakout in 2014. 2.1K Reads 0 Comments YasielPuig, Gerrit Cole and Michael Wacha were three of many players who busted onto the scene in the MLB in 2013. Their breakout seasons have people looking to find the next breakout star. There are a few names you may have heard of because of a certain skill, but there are also names you may not have heard of. Here are a few players you need to keep an eye out for during the 2014 MLB season. Nathan Eovaldi, SP, MIA Alan Diaz/Associated Press The Miami Marlins could have a scary one-two punch in their rotation if Nathan Eovaldi pans out. There are not many bright spots in Miami, so do not look for 15-plus wins from Nathan Eovaldi. But expect him to be a perfect complement to Jose Fernandez in the Marlins rotation. According to FanGraphs.com, Eovaldi had the hardest fastball out of any pitcher who had similar innings pitched. His 96.2 mph is absurd. The Marlins could have a top of the rotation that can throw the ball hard as well as get batters out with an off-speed pitch or two. Eovaldi went 4-6 in 18 starts for the Marlins, but he had a 3.39 ERA, which is definitely something to be excited about in Miami. Look for the 24-year-old right-hander to turn some heads during the 2014 season. James Paxton, SP, SEA Elaine Thompson/Associated Press The Seattle Mariners are excited for the breakout of their young left-hander. No, he isn't Felix Hernandez. But he did turn heads in the latter part of the 2013 season for the Seattle Mariners. James Paxton went 3-0 with a 1.50 ERA in four starts down the stretch for Seattle. He shows a little deception in his delivery to the plate by creating a three-quarter arm angle. Placing him in the back of the rotation could be a possibility for the Mariners. Look for Paxton to come out and make a name for himself in 2014. Anthony Rendon, IF, WAS Dale Zanine-USA TODAY Sports Anthony Rendon will break out for the Nationals in 2014. Anthony Rendon has been on many people's list of breakout players, and that is why he is on this list. Rendon spent time at second base, shortstop and third base during the course of his 2013 campaign. He looks to have a chance to play every day with the Washington Nationals. The sixth overall pick in the 2011 draft hit .265 with seven home runs and 35 RBI last season. He will get a chance to open eyes and turn heads with a breakout 2014 season. Didi Gregorius, SS, ARI Gregory Bull/Associated Press Didi Gregorius is looking to become a household name in the MLB this season. The Arizona Diamondbacks started their young shortstop Didi Gregorius 97 times in 2013. There were a lot of learning curves, especially at the plate. Gregorius managed to hit .252 in 404 plate appearances, despite striking out 65 times. He did manage to get on base, however, drawing 37 walks and sporting a .332 on-base percentage. Gregorius has a full offseason to work with coaches and will have the opportunity to make Arizona fans excited for the rest of his career. Christian Yelich, OF, MIA Alan Diaz/Associated Press Christian Yelich can swipe a few bags for the Marlins in 2014. Remember how there were only a few bright spots for the Marlins in 2013? Well, Christian Yelich was one of them. The speedy outfielder came in and impressed during his 62 games with the ballclub. Yelich stole 31 bases, hit .288 and had a .360 OBP in those games. He has shown promise at the plate, and his defense isn't too shabby either. Yelich can become a complete player with more games and chances to succeed. Look for him to stand out in Miami. Nolan Arenado, 3B, COL Gregory Bull/Associated Press/Associated Press Nolan Arenado is a young player looking to break out and already one of the best defensive players in the National League. The Colorado Rockies may have one of the best defensive third basemen in the entire league. His name is Nolan Arenado, and he hit .267 last season. According to FanGraphs.com, he was the fifth-best defensive player in the majors during the 2013 season. What stands out about Arenado is that he will be hitting in the same lineup as Michael Cuddyer, Carlos Gonzalez and Troy Tulowitzki, which means there will be plenty of chances to hit this season. Playing at Coors Field helps out as well. Arenado is already a great defender, but he could also become a more complete player this season. Keep an eye out for him this season. Billy Hamilton, OF, CIN Frank Victores-USA TODAY Sports The Cincinnati Reds may have the next-best base stealer in Billy Hamilton. Everyone heard of Billy Hamilton at one point last season. Why? His speed. Hamilton played 13 games for the Cincinnati Reds last season. He hit .368, but only had 19 at bats. He did have a one-steal-per-game pace, stealing 13 bases in the final month of the season. If Hamilton is placed on the bench and used as a pinch runner, the Reds could have themselves a huge threat in late-game situations. Look for Hamilton to be a top-tier base stealer in the majors during the 2014 season. Well, now that you have seen the names, it is your job to be attentive and look out for these players. They are on the upward spring, so be prepared for several new names in baseball this season.
Fragments of Aeterna Arl'Wynn Largest continent on Aeterna and home to the old capital city of Bolderann, now the current base of operations of the NARP. The continent is shaped like an upright bean, making for a diverse range of climates and biomes. Hell’s Maw Mountains: Second highest mountain range on Aeterna, and home to the Kinnigof nation-state. Home to expansive lava tubes that have emptied out since the beginning of the Lavamancer activity, the tubes are reported to be a possible location of the King’s Bane base of operations. The mountains get its name for the reddish soil, which under the setting sun seems to burn like fire. The Great Forest: Bordering the Hell’s Maw mountain range to the south, this is the tallest forest in Aeterna. It hugs against the mountain range and extends southward and cups the Central Plains. Central Plains: Stretching from nearly the western coast to the eastern coast, these flat, rolling plains are home to Bolderann as well as many other cities and towns. The plains are fertile and good for farming. East Coast: Western end of the Central Plains, home to fishing villages and coastal cities like Chrysalis. The Shattered Isles lie just across the water. Southern Tundra: Craggy, icy, rockscape home to some trade towns. The waterway that lies between here and the Southern Ice Planes is heavily trafficked for trade between Chrysalis and Eastern Carridas and Oriias.
Effect of chronic opioid treatment on phagocytosis in Tetrahymena. Opioid inhibition of phagocytosis in the protozoan ciliate Tetrahymena is antagonized by naloxone and this antagonism can be surmounted by increasing agonist concentration, which suggests a receptor-mediated mechanism. Desensitization of the opioid effect is time dependent in addition to concentration dependent. Chronic exposure to opioids results in the development of tolerance to the inhibitory effect of the agonists, and withdrawal of the latter results in a decrease in phagocytic capacity, which suggests that a state akin to dependence has been developed in these cells. Naloxone appears to behave as a partial agonist in tolerant cells, and there seems to exist cross-tolerance to mu and delta agonists.
On Dreams On Dreams (Ancient Greek: Περὶ ἐνυπνίων; Latin: De insomniis) is one of the short treatises that make up Aristotle's Parva Naturalia. The short text is divided into three chapters. In the first, Aristotle tries to determine whether dreams "pertain to the faculty of thought or to that of sense-perception." In the second chapter, he considers the circumstances of sleep and how the sense organs operate. Finally, in the third chapter he explains how dreams are caused, proposing that it is the residual movements of the sensory organs that allow them to arise. Content Aristotle explains that during sleep there is an absence of external sensory stimulation. While sleeping with our eyes closed, the eyes are unable to see, and so in this respect we perceive nothing while asleep. He compares hallucinations to dreams, saying "...the faculty by which, in waking hours, we are subject to illusion when affected by disease, is identical with that which produces illusory effects in sleep." When awake and perceiving, to see or hear something incorrectly only occurs when one actually sees or hears something, thinking it to be something else. But in sleep, if it is still true that one does not see, hear, or experience sense perception in the normal way, then the faculty of sense, he reasons, must be affected in some different way. Ultimately, Aristotle concludes that dreaming is due to residual movements of the sensory organs. Some dreams, he says, may even be caused by indigestion: We must suppose that, like the little eddies which are formed in rivers, so the movements are each a continuous process, often remaining like what they were when first started, but often, too, broken, into other forms by collisions with obstacles. This gives the reason why no dreams occur in sleep after meals, or to sleepers who are extremely young, e.g., to infants. The movement in such cases is excessive, owing to the heat generated from the food. Hence, just as in a liquid, if one vehemently disturbs it, sometimes no reflected image appears, while at other times one appears, indeed, but utterly distorted, so as to seem quite unlike its original; while, when once the motion has ceased, the reflected images are clear and plain; in the same manner during sleep the images, or residuary images are clear and plain; in the same manner during sleep the images, or residuary movements, which are based upon the sensory impressions, become sometimes quite obliterated by the above described motion when too violent; while at other times the sights are indeed seen, but confused and weird, and the dreams are incoherent, like those of persons who are atrabilious, or feverish, or intoxicated with wine. For all such affections, being spirituous, cause much commotion and disturbance. Aristotle also describes the phenomenon of lucid dreaming, whereby the dreamer becomes aware that he is dreaming. Legacy The 17th century English philosopher Thomas Hobbes generally adopted Aristotle's view that dreams arise from continued movements of the sensory organs during sleep, writing that "dreames are caused by the distemper of some inward parts of the Body." He thought this explanation would further help in understanding different types of dreams, for example, "lying cold breedeth Dreams of Feare, and raiseth the thought and Image of some fearfull object." The neurologist Sigmund Freud cited Aristotle in his 1899 work, The Interpretation of Dreams, as the first to recognize that dreams "do not arise from supernatural manifestations but follow the laws of the human spirit." He held Aristotle's definition of dreams to be "the mental activity of the sleeper in so far as he is asleep." References Notes Sources External links On Dreams, translated by J. I. Beare HTML Greek text: Mikros apoplous Category:Works by Aristotle Category:Philosophical literature
--- layout: projectimage title: matrix-rocketchat categories: - bridge description: This is an application service that bridges Matrix to Rocket.Chat, written in Rust. author: exul maturity: Beta language: Rust license: MIT repo: https://github.com/exul/matrix-rocketchat screenshot: /docs/projects/images/matrix-rocketchat.png featured: true bridges: RocketChat reponame: matrix-rocketchat thumbnail: /docs/projects/images/rocketchat-logo.png --- This is an application service that bridges Matrix to Rocket.Chat, written in Rust. Find it on [GitHub](https://github.com/exul/matrix-rocketchat).
The liver is an important organ which has various functions such as metabolic regulation and storage of sugar, protein and lipid which are three major nutrients, and decomposition and detoxification of substances unnecessary to the living body. These functions suffer acute or chronic disorders due to an excessive in take of alcohol, viral infection, bad eating habits, stress, smoking, etc. The advance of these disorders results in diseases such as acute hepatitis, chronic hepatitis, hepatic cirrhosis, alcoholic fatty liver, hepatitis B and liver cancer. When liver cells are damaged by virus, alcohol, etc., enzymes such as aspartate aminotransferase (glutamic-oxaloacetic transaminase, hereinafter abbreviated as GOT) and alanine aminotransferase (glutamic-pyruvic transaminase, hereinafter abbreviated as GPT) in the cells leak into the blood, which raise the values indicating the activities of these enzymes. Accordingly, the levels of GOT and GPT activities in the blood are known as indices of the levels of the liver function disorders. Known drugs used for the prevention or treatment of the liver function disorders include antiviral agents such as acyclovir, immunosuppressive agents, glutathione and the like. Foods and drinks which are recognized to be effective for protecting, strengthening and improving the liver functions include for example, turmeric, milk thistle, sesame lignan, oyster extract, liver extract and the like. However, a strong need consistently exists for the development of pharmaceutical agents which are effective in prevention or treatment of liver diseases, and of health foods and drinks or animal feeds which enable prevention or treatment of hepatopathy by daily intake. In connection with stilbenoid compounds, anti-allergic activities, anti-oxidative activities and anti-bacterial activities have been conventionally investigated on compounds isolated from Hydrangeae Dulcis Folium which is a herbal medicine [Summary of Lectures at the 2nd Symposium on Medicines and Foods, p. 85, 1999, Nihon Yakuyou Shokuhin Gakkai Zyunbi Iinkai (Japanese Society of Medicated Foods, Preparatory Committee)], and the like. Reports have been made as follows on in vitro activities of the stilbenoid compounds. In regard to the anti-allergic activities, it is reported that release of histamine from mast cells induced by compound 48/80 or calcium ionophore A23187 is suppressed by thunberginol A-G (50% inhibitory concentration: 9.4-92 μM), but is not suppressed by phyllodulcin or phyllodulcin 8-O-glucoside, hydrangenol, hydrangenol 8-O-glucoside, hydramacrophyllol A and B at 100 μM [Bioorganic & Medicinal Chemistry, 7, 1445 (1999)]. The extract of Hydrangeae Dulcis Folium (2000 mg/kg) is reported to suppress rat skin passive anaphylaxis through oral administration [Journal of the Pharmaceutical Society of Japan, 114(6), 401 (1994)]. In addition, it is reported that phyllodulcin 8-O-glucoside (300 and 500 mg/kg), hydrangenol (500 mg/kg), hydrangenol 8-O-glucoside (300 and 500 mg/kg), thunberginol A (300 and 500 mg/kg), thunberginol F (300 and 500 mg/kg) suppress rat skin passive anaphylaxis through oral administration, but phyllodulcin (300 and 500 mg/kg) does not suppress rat skin passive anaphylatic reaction [Biological & Pharmaceutical Bulletin, 22(8), 870 (1999)]. In connection with the anti-oxidative activities, it is reported that: as to DPPH (1,1-Diphenyl 2-Picrylhydrazyl) radical capturing capacity, the extract of Hydrangeae Dulcis Folium exhibits 50% capturing action at 0.099 mg, while phyllodulcin exhibits this activity at 0.208 mg, and hydrangenol at 1.074 mg; as to linoleic acid oxidation (iron rhodanate method), phyllodulcin exhibits more potent suppressive activity than α-tocopherol or BHA (Butylated Hydroxyanisole), while hydrangenol exhibits a weak suppressive activity thereto; and as to NADP (Nicotinamide Adenine Dinucleotide Phosphate) H dependent lipid peroxidation in rat liver microsome, phyllodulcin exhibits a suppressive activity at a similar level to α-tocopherol, while hydrangenol exhibits a weak suppressive activity thereto [Natural Medicine, 49(1), 84(1995)]. In regard to anti-bacterial activity, it is reported that phyllodulcin at 1000 ppm exhibits a proliferation suppressive activity on Staphylococcus aureus and Staphylococcus epidemidis (Japanese Published Unexamined Patent Application No. 43460/93), and phyllodulcin and hydrangenol exhibit an anti-bacterial activity on Bacteroides melaninogenicus and Fusobacterium nucleatum with the minimum growth inhibitory concentration of 1.25-2.5 ppm (Japanese Published Unexamined Patent Application No. 92829/94). In regard to differentiation-inducing activity on leukocyte [Chemical & Pharmaceutical Bulletin, 48(4), 566 (2000)], isocoumarins such as thunberginol A (active at 100 μM) are reported to have more potent activity in vitro than dihydroisocoumarin such as phyllodulcin or hydrangenol (active at 300 μM). In addition, hydrangenol is reported to have a hyaluronidase inhibitory activity [Planta Medica, 54, 385 (1988)]. Moreover, it is reported that the extract of Hydrangeae Dulcis Folium (500 mg/kg) exhibits a cholagogic activity in an in vitro test, however, phyllodulcin (200 mg/kg) and hydrangenol (200 mg/kg) do not exhibit this activity [Journal of the Pharmaceutical Society of Japan, 114(6), 401 (1994)]. Furthermore, it is reported that the extract of Hydrangeae Dulcis Folium (200 and 400 mg/kg, oral administration) suppresses rat gastric ulcer induced by ethanol hydrochloride, however, phyllodulcin (75 mg/kg, oral administration) and hydrangenol (75 mg/kg, oral administration) do not suppress the ulcer [Journal of the Pharmaceutical Society of Japan, 114(6), 401 (1994)]
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.iceberg.data; import java.io.Serializable; import java.util.Map; import org.apache.iceberg.CombinedScanTask; import org.apache.iceberg.FileScanTask; import org.apache.iceberg.MetadataColumns; import org.apache.iceberg.Schema; import org.apache.iceberg.TableScan; import org.apache.iceberg.avro.Avro; import org.apache.iceberg.data.avro.DataReader; import org.apache.iceberg.data.orc.GenericOrcReader; import org.apache.iceberg.data.parquet.GenericParquetReaders; import org.apache.iceberg.expressions.Evaluator; import org.apache.iceberg.expressions.Expression; import org.apache.iceberg.expressions.Expressions; import org.apache.iceberg.io.CloseableGroup; import org.apache.iceberg.io.CloseableIterable; import org.apache.iceberg.io.CloseableIterator; import org.apache.iceberg.io.FileIO; import org.apache.iceberg.io.InputFile; import org.apache.iceberg.orc.ORC; import org.apache.iceberg.parquet.Parquet; import org.apache.iceberg.relocated.com.google.common.collect.Iterables; import org.apache.iceberg.relocated.com.google.common.collect.Sets; import org.apache.iceberg.types.TypeUtil; import org.apache.iceberg.util.PartitionUtil; class GenericReader implements Serializable { private final FileIO io; private final Schema tableSchema; private final Schema projection; private final boolean caseSensitive; private final boolean reuseContainers; GenericReader(TableScan scan, boolean reuseContainers) { this.io = scan.table().io(); this.tableSchema = scan.table().schema(); this.projection = scan.schema(); this.caseSensitive = scan.isCaseSensitive(); this.reuseContainers = reuseContainers; } CloseableIterator<Record> open(CloseableIterable<CombinedScanTask> tasks) { Iterable<FileScanTask> fileTasks = Iterables.concat(Iterables.transform(tasks, CombinedScanTask::files)); return CloseableIterable.concat(Iterables.transform(fileTasks, this::open)).iterator(); } public CloseableIterable<Record> open(CombinedScanTask task) { return new CombinedTaskIterable(task); } public CloseableIterable<Record> open(FileScanTask task) { DeleteFilter<Record> deletes = new GenericDeleteFilter(io, task, tableSchema, projection); Schema readSchema = deletes.requiredSchema(); CloseableIterable<Record> records = openFile(task, readSchema); records = deletes.filter(records); records = applyResidual(records, readSchema, task.residual()); return records; } private CloseableIterable<Record> applyResidual(CloseableIterable<Record> records, Schema recordSchema, Expression residual) { if (residual != null && residual != Expressions.alwaysTrue()) { InternalRecordWrapper wrapper = new InternalRecordWrapper(recordSchema.asStruct()); Evaluator filter = new Evaluator(recordSchema.asStruct(), residual, caseSensitive); return CloseableIterable.filter(records, record -> filter.eval(wrapper.wrap(record))); } return records; } private CloseableIterable<Record> openFile(FileScanTask task, Schema fileProjection) { InputFile input = io.newInputFile(task.file().path().toString()); Map<Integer, ?> partition = PartitionUtil.constantsMap(task, IdentityPartitionConverters::convertConstant); switch (task.file().format()) { case AVRO: Avro.ReadBuilder avro = Avro.read(input) .project(fileProjection) .createReaderFunc( avroSchema -> DataReader.create(fileProjection, avroSchema, partition)) .split(task.start(), task.length()); if (reuseContainers) { avro.reuseContainers(); } return avro.build(); case PARQUET: Parquet.ReadBuilder parquet = Parquet.read(input) .project(fileProjection) .createReaderFunc(fileSchema -> GenericParquetReaders.buildReader(fileProjection, fileSchema, partition)) .split(task.start(), task.length()) .filter(task.residual()); if (reuseContainers) { parquet.reuseContainers(); } return parquet.build(); case ORC: Schema projectionWithoutConstantAndMetadataFields = TypeUtil.selectNot(fileProjection, Sets.union(partition.keySet(), MetadataColumns.metadataFieldIds())); ORC.ReadBuilder orc = ORC.read(input) .project(projectionWithoutConstantAndMetadataFields) .createReaderFunc(fileSchema -> GenericOrcReader.buildReader(fileProjection, fileSchema, partition)) .split(task.start(), task.length()) .filter(task.residual()); return orc.build(); default: throw new UnsupportedOperationException(String.format("Cannot read %s file: %s", task.file().format().name(), task.file().path())); } } private class CombinedTaskIterable extends CloseableGroup implements CloseableIterable<Record> { private final CombinedScanTask task; private CombinedTaskIterable(CombinedScanTask task) { this.task = task; } @Override public CloseableIterator<Record> iterator() { CloseableIterator<Record> iter = CloseableIterable.concat( Iterables.transform(task.files(), GenericReader.this::open)).iterator(); addCloseable(iter); return iter; } } }
Temporal trends in spontaneous abortion associated with Type 1 diabetes. The objective of this study was to investigate temporal changes in the reported rates of spontaneous abortion associated with Type 1 diabetes. Individuals from the Children's Hospital of Pittsburgh Type 1 Diabetes Registry for 1950-1964 (n=495) completed a self-report reproductive history questionnaire in 1981 that was updated in 1990. Data from both surveys, which proved to be valid and reliable, were utilized for this report. More spontaneous abortions (26.8 vs. 7.7%, P<0.001), stillbirths (4.7 vs. 1.2%, P<0.001) and induced abortions (7.0 vs. 0.9%, P<0.001) were reported for Type 1 diabetic women than for the non-diabetic partners of Type 1 diabetic men. A significant temporal decline in the rates of spontaneous abortion for Type 1 diabetic women was observed (< or = 1969: 26.4%; 1970-1979: 31.0%; 1980-1989: 15.7%; P<0.05). No differences were apparent for the non-diabetic partners of Type 1 diabetic men (< or = 1969: 4.2%; 1970-1979: 9.5%; 1980-1989: 5.7%; P>0.05). Temporal changes in medical care for women with diabetes (i.e. self-monitoring of glycemic control) may have contributed to a recent reduction in spontaneous abortions associated with maternal Type 1 diabetes.
The man page at http://xmonad.org/manpage.html says: "When running with multiple monitors (Xinerama), .... If you switch to a workspace which is currently visible on another screen, xmonad simply switches focus to that screen." In the current darcs version (and in version 0.3), that isn't true. The behavior can be made to agree with the man page by changing W.greedyView to W.view in Config.hs. Or is the man page out of date?
Q: Probability of sum of uniform variables I need to estimate the probability of a sum of uniform variables. More exactly $P(S_{100} \geq 70)$ where $S_{100}=\sum_{i=1}^{100} X_i$ and $X_1, X_2, \cdots, X_{100}$, are iid with $\mathcal{U}$(0,1) distribution. I find solution for other distribution but can't apply it for variables with uniform distribution. I want to use central limit theorem and struggle to write the probability with an expression of sum and pdf (if possible). Please help. A: HINT - CLT: For uniform distribution $U_X(0,1): \ \ E(X) = \frac{1}{2},\ \ D(X) = \frac{1}{12}$ For sum of 100 variables $ U_X(0,1): \ \ E(S_{100})=100\cdot\frac{1}{2} = 50, \ \ D(S_{100})=100\cdot \frac{1}{12}=\frac{25}{3}$ Then $P(S_{100} \geq 70)=1-P(S_{100} < 70)\sim 1-F(70), \ \ F(x) = \ $ distribution function of normal distribution $N(\mu,\sigma^2) =N(50, 25/3).$
Q: ngOnChanges doesn't trigger changes https://next.plnkr.co/edit/0LHeJ3Fyz5gdjJqQ?open=lib%2Fapp.ts&deferRun=1 Here's a plunkr. It's just for example. In real project i got something like <input [(ngModel)]='_data.name' [name]='name' /> I pass some data for input by using ngOnInit lifehook And i cant understand why my ngOnChanges hook doesn't trigger changes when i write something in my <input> The _data takes data from json/server by using services http request, then i get name in my <input>, or something on The question is: how to detect changes with ngOnChange lifehook in my situation I try to set [name]='name' and then take it using @Input like that @Input() name: string; Then in ngOnChanges ngOnChanges(changes: SimpleChanges) { console.log(changes.name.currentValue); } Why i do not see anything in my console? Why ngOnChanges is not working this way? I need to take value from my input, then detect it changes using ngOnChanges No errors in console, no data, just nothing, empty A: That's because the relation between two components is not well implemented. We should have a deal firstly that @input() decorators are implementend only in a child component, that means, you have to make your changes in the father component and pass those changes to the child so it will invoke its ngOnChanges method. That is to say: in your Father component: @Component({ selector: 'my-app', template: ` <div> <example [name]="name"></example> <!-- Here you intend to call your child --> <input [(ngModel)]="name"/> </div> `, }) export class App { name: string; constructor() { this.name = `Angular! v${VERSION.full}`; } } And Remove that <input [(ngModel)]="name"/> from Example template. A working stackblitz.
Hyūga-class helicopter destroyer The is a class of helicopter carrier built for the Japan Maritime Self-Defense Force (JMSDF). Two - Hyūga and Ise - were built; upon completion the class were the largest ships built for the Japanese navy since the Second World War. Hyūga was described in a PBS documentary as the "first Japanese aircraft carrier built since WWII." The Hyūgas were followed by the larger , the first being commissioned in March 2015. The Izumos will replace the helicopter destroyers; the Hyūgas were originally meant to replace the Shiranes. The specifications of the Hyūga class are comparable to light aircraft carriers, such as the Italian and Spanish . Under the JMSDF's naming conventions, the ships are called Goei-kan (護衛艦, lit. escort ship) in Japanese and destroyer in English, as same as all the other combatant ships of JMSDF. During development, Hyūga and Ise were provisionally named "16DDH" and "18DDH" respectively. The numbers derived from the Japanese calendar, specifically the 16th year and 18th year of the Heisei reign (2004 and 2006), when the provisional name were given. Design and specifications The Hyūgas are primarily anti-submarine warfare carriers operating SH-60K anti-submarine helicopters. They also have enhanced command-and-control capabilities to serve as flagships. During peacetime, Hyūgas and ships could operate together to conduct military operations other than war, peacekeeping and relief operations. The ships are armed with a 16-cell VLS carrying the Evolved Sea Sparrow Missile surface-to-air missile, and Phalanx close in weapon system for self-defense. They are also equipped with the ATECS command system and FCS-3 fire control with active electronically scanned array radar system. Globalsecurity.org suggests a maximum capacity of 18-24 H-60 class helicopters, or a smaller number of larger helicopters, even though the official complement was reported as three SH-60 and one EH-101 helicopters, or three SH-60J and one CH-53E helicopters. It has been speculated that future modifications may allow the operation of VTOL/STOVL fixed-wing aircraft, such as Harriers or F-35 Lightning II. In 2013, USMC V-22 Ospreys practiced operations on Hyūga. In 2016, MV-22 Ospreys operated off Hyūga in the participation of relief efforts following the Kumamoto earthquake. Ships in the class Construction of the first ship, JS Hyūga, was started in 2006 and it was launched on 23 August 2007. The second was launched and named JS Ise on 21 August 2009. Hyūga was named after (present-day Miyazaki Prefecture) on the east coast of Kyūshū, and Ise after (present-day Mie Prefecture). They inherited the names of the battleships and of the Imperial Japanese Navy. These two ships had been built during World War I and served in World War II. Following the Battle of Midway, Hyūga and Ise were converted into a hybrid battleship/aircraft carriers in 1943 with the replacement of the aft gun turrets and barbettes by a small flight deck and hangar deck with which they could launch a squadron of Yokosuka D4Y dive-bombers and Aichi E16A seaplanes. In November 2009, Hyūga participated in "Annualex 21G" joint naval exercise with the US aircraft carrier and other USN and JMSDF ships to maintain the interoperability between the two navies. On 11 March 2011, the 2011 Tōhoku earthquake and tsunami struck the northeast part of Japan. Hyūga immediately moved to off the coast of Miyagi prefecture and started search and rescue operations. Ise, which went into service on 16 March, also will join aid delivery operation for refuge shelters. On 8 November 2013, Super-Typhoon Haiyan crossed the Visayas, Philippines. Ise joined the relief operation, using its helicopters to provide relief supplies to remote areas cut off by the storm. Gallery Notes References External links Hyuga Class helicopter destroyer Japan Launches Carrier... Sorta Color Image (Ships of the World No.650 ) Photos Category:Destroyer classes
Instead, Hayes will donate proceeds sent to the Venmo account on his “Broke College Athlete Anything Helps” sign to the Boys & Girls Clubs of Dane County, according to ESPN. Venmo is an app that allows users to send and receive money, then link it to their bank account. Hayes told ESPN that the sign was strictly to generate conversation and that since he can’t accept money, he used a friend’s account. Hayes made noise at Big Ten Media Day by discussing the issue of college athletes’ compensation. Hayes spurned the NBA last spring and returned to Wisconsin for his senior season after averaging 15.7 points and 5.8 boards per game in 2015-16. He was named Big Ten Preseason Player of the Year before this year.
Q: Is there a closed-form way to make a matrix hollow? Let $A\in\mathbb{R}^{N\times N}$ a matrix with entries $a_{ij} \ge 0$ and $\mathrm{det}(A)\neq 0$. I am interested in finding a closed matrix form operation such that $A$ becomes hollow. In other words, if I want to obtain $$ \tilde{A}\in\mathbb{R}^{N\times N}\quad\text{such that}\quad \tilde{a}_{ij}=a_{ij}\;\forall (i\neq j)\quad\text{and}\quad\tilde{a}_{ii}=0 $$ with constant matrices $P$ and $Q$ such that $$ \tilde A=PAQ $$ is it possible? I tried a simple example, when $N=2$ and with brute force I found an interesting correlation with a transformation matrix $Q$ (here $P=I$), but I do not know how (and if) it is generalizable to $N>2$: $$ A=\begin{pmatrix} a & b\\ c & d \end{pmatrix} $$ $$ \tilde{A}=\begin{pmatrix} 0 & b\\ c & 0 \end{pmatrix}=PAQ=IAQ=AQ=A\cdot\frac{1}{\det{A}}\begin{pmatrix} -bc & bd\\ ac & -bc \end{pmatrix} $$ EDIT From the comments, it has been pointed out that what I seek is not possible, meaning $P$ and $Q$ do not exist. Is there a way to prove this? A: If I understand the question, you would like to have $$P\begin{bmatrix}1&1\\1&1\end{bmatrix}Q=\begin{bmatrix}0&1\\1&0\end{bmatrix}$$ This is not possible, since the left side has determinant $0$, and the right side has determinant $-1$. With $N>2$, the story is the same using a matrix of all $1$s, which we can denote $\mathbf{1}$. In that case, you want $$P\mathbf{1}Q=\mathbf{1}-I$$ The left side has determinant $0$. As for the right side, note that $$(\mathbf{1}-I)\left(\frac{1}{N-1}\mathbf{1}-I\right)=\frac{N}{N-1}\mathbf{1}-\mathbf{1}-\frac{1}{N-1}\mathbf{1}+I=I$$ so the right side is invertible, and has nonzero determinant. The question now stipulates that $\det A$ is nonzero. Consider a sequence $\{A_n\}$ of invertible matrices converging to $\mathbf{1}$. Then assuming such $P,Q$ exist: $$ \begin{align} PA_nQ&=A_n-\operatorname{diag}(A_n)\\ \lim_{n\to\infty}\left(PA_nQ\right)&=\lim_{n\to\infty}\left(A_n-\operatorname{diag}(A_n)\right)\\ P\left(\lim_{n\to\infty}A_n\right)Q&=\lim_{n\to\infty}\left(A_n\right)-\operatorname{diag}\left(\lim_{n\to\infty}\left(A_n\right)\right)\\ P\mathbf{1}Q&=\mathbf{1}-I \end{align} $$ which we have shown is impossible. So unless you further refine "in general" to exclude invertible matrices converging to $\mathbf{1}$, this can't be done. Perhaps you are interested in a different question than what is posted: For which matrices $A$ does there exist matrices $P,Q$ such that $PAQ=A-\operatorname{diag}{A}$?"
[Indications for surgical therapy of gallstones]. 4675 patients which underwent a cholecystectomy because of gallstone disease were included in a prospective multi-institutional study from 01/09/1994 to 31/08/1995 at 29 east-german hospitals. 3,207 (68.6%) patients had done a laparoscopic cholecystectomy (LCE). 1,468 (31.4%) patients received a primary open cholecystectomy (KCE). A conversion rate of 7.7% (n = 247) was seen. In 32.8% of LCE and in 39.5% of KCE diagnostic procedures of the common bile duct were not performed at all. The rate of open revision of the common bile duct was 4.5% (n = 211). The highest postoperative morbidity and operative mortality were found in KCE with revision of the common bile dutct.
Verify we can build a ubuntu-systemd-container image.
Environmental groups have filed a federal lawsuit pushing for more action to prevent the toxic algae blooms that plague Lake Erie's western basin each summer. The lawsuit says the U.S. Environmental Protection Agency isn't moving fast enough and must hold Ohio accountable for reducing the polluting runoff that feeds the algae. The Environmental Law & Policy Center's lawsuit filed late Thursday in Toledo claims Ohio's efforts to prevent blooms have had little impact. An Ohio EPA spokeswoman says the agency is reviewing the lawsuit. She says the agency intends to roll out new initiatives to help the lake. The lawsuit seeks a court order that sets a series of deadlines between now and 2025 for progress on lake protections.
Action role-playing hack and slash Ragnarok Odyssey and skeletal puzzle platformer Dokuro will launch this winter for PS Vita in Europe. Both games will be available to download from the PlayStation Store, GungHo Online Entertainment America announced. Ragnarok Odyssey, developed by Game Arts, launched in Japan in February 2012 and has sold 100,000 copies. Dokuro, already out in the US, was developed by GungHo Online Entertainment. Screenshots for both games are below. This content is hosted on an external platform, which will only display it if you accept targeting cookies. Please enable cookies to view. Manage cookie settings
<?php /* * This file is part of the Symfony package. * * (c) Fabien Potencier <[email protected]> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\Validator\Constraints; use Symfony\Component\Validator\Context\ExecutionContextInterface; use Symfony\Component\Validator\Constraint; use Symfony\Component\Validator\ConstraintValidator; use Symfony\Component\Validator\Exception\UnexpectedTypeException; /** * @author Bernhard Schussek <[email protected]> */ class IsTrueValidator extends ConstraintValidator { /** * {@inheritdoc} */ public function validate($value, Constraint $constraint) { if (!$constraint instanceof IsTrue) { throw new UnexpectedTypeException($constraint, __NAMESPACE__.'\IsTrue'); } if (null === $value) { return; } if (true !== $value && 1 !== $value && '1' !== $value) { if ($this->context instanceof ExecutionContextInterface) { $this->context->buildViolation($constraint->message) ->setParameter('{{ value }}', $this->formatValue($value)) ->setCode(IsTrue::NOT_TRUE_ERROR) ->addViolation(); } else { $this->buildViolation($constraint->message) ->setParameter('{{ value }}', $this->formatValue($value)) ->setCode(IsTrue::NOT_TRUE_ERROR) ->addViolation(); } } } }
Matt Breida is on the move to the Dolphins. (Photo by Sean M. Haffey/Getty Images) It wouldn’t be a surprise if Breida ends up with a large share of the load, if he can stay healthy. He’s a dynamic player and athlete, which Howard is not. Breida was undrafted out of college but the 49ers placed a second-round tender on him when he became a restricted free agent this year. Breida is one of the fastest running backs in the NFL, and averaged 5 yards per carry in his three 49ers seasons. He’s also capable in the passing game. The Dolphins are still building and don’t have much reason to hold back in giving Breida touches in the final year of his contract. With a chance to finally get a larger role, Breida should be pleased with this draft-day trade.
Q: How to write a numpy array to a csv file? I want to open up a new text file and then save the numpy array to the file. I wrote this bit of code: foo = np.array([1,2,3]) abc = open('file'+'_2', 'w') np.savetxt(abc, foo, delimiter=",") I get this error: TypeError Traceback (most recent call last) <ipython-input-33-fea41927952b> in <module>() 2 model = cool 3 abc = open('file'+'_2', 'w') ----> 4 np.savetxt(abc, foo, delimiter=",") /usr/local/lib/python3.4/site-packages/numpy/lib/npyio.py in savetxt(fname, X, fmt, delimiter, newline, header, footer, comments) 1071 else: 1072 for row in X: -> 1073 fh.write(asbytes(format % tuple(row) + newline)) 1074 if len(footer) > 0: 1075 footer = footer.replace('\n', '\n' + comments) TypeError: must be str, not bytes Does anyone know whats wrong? Additionally, I found an empty file created in the terminal called file_2, but nothing is written inside it. EDIT: I am using Python3.4 A: It appears you are using Python3. Therefore, open the file in binary mode (wb), not text mode (w): import numpy as np foo = np.array([1,2,3]) with open('file'+'_2', 'wb') as abc: np.savetxt(abc, foo, delimiter=",") Also, close the filehandle, abc, to ensure everything is written to disk. You can do that by using a with-statement (as shown above). As DSM points out, usually when you use np.savetxt you will not want to write anything else to the file, since doing so could interfere with using np.loadtxt later. So instead of using a filehandle, it may be easier to simply pass the name of the file as the first argument to np.savetxt: import numpy as np foo = np.array([1,2,3]) np.savetxt('file_2', foo, delimiter=",")
Haunted Legends: The Queen of Spades Collector's Edition iOS iPhoneGames Captain Gerard Froussard has reached out to you for help. After Lieutenant Pierre Disparu disappears searching for a missing young lady, it’s up to you to investigate the haunted mansion. Discover the secrets behind a magical deck of cards in Haunted Legends: Queen of Spades! Find The Countess and stop her curse before it claims another victim in this astounding Hidden Object Puzzle Adventure game. ☆☆☆☆☆ Features ☆☆☆☆☆ ✓Investigate murders in a haunted mansion!✓Outsmart a sinister Countess and her many traps!✓Spooky scenes and evocative puzzles✓Solve the mystery a deck of cards holds! ✓ Unlock the Collector’s Edition to get exciting extra content, including: -- Bonus game play TRY IT FREE, THEN UNLOCK THE FULL ADVENTURE FROM WITHIN THE GAME! For the best experience, we recommend setting your device to display in English or another supported language while playing this game. We’re big believers that everyone is a gamer at heart and that games are a great source of joy and relaxation. Founded in 2002, Big Fish Games is a developer, publisher and distributor of casual games. We offer a virtually endless selection of interactive games that you can enjoy anytime, anywhere — on your PC, Mac, mobile phone, or tablet. Renowned for offering A New Game Every Day!® on www.bigfishgames.com, Big Fish Games distributes more than two million games per day worldwide.
1. Field of the Invention The present invention relates to a dosing device for the volumetric dosing of a liquid additive which is added in a certain volume ratio to a fluid flowing in a first hose line via a second hose line which feeds directly or indirectly into the first hose line. The dosing device of the present invention includes a hose or tube section, which is called a drip tube, which extends downstream from the junction, and has a drip chamber connecting downstream from the drip tube and a light barrier. The direction of action of the light barrier is arranged transversely to the fall path of the drops. Such a dosing device is used in particular within a system for the collection and retransfusion of autologous blood in order to add an anticoagulant liquid or a sedimentation accelerator to blood drawn, or sucked-off and intended for retransfusion, for example during an operation or similar. 2. Discussion of Background and/or Material Information A system for the collection and retransfusion of autologous blood is, for example, known from EP-OS 0 483 703. In the known system, a collection vessel is subjected to an underpressure which is used, by means of a hose attached to the collecting vessel, to suck off blood from an operative field, i.e. from the body of a patient. The sucked-off blood, which is called drainage blood, flows through the hose line and passes a quantity dosing device before it drips into the collection container. Arranged upstream of the quantity dosing device is a Y-shaped branching or junction into which a second hose feeds which is connected to a reservoir for an anticoagulant liquid and/or a sedimentation accelerator. Situated between the reservoir for the anticoagulant liquid and the Y-shaped branching is a valve means which can be triggered via the previously mentioned quantity dosing device. Conventional dosing devices, known from the prior art, operate according to the principle of drop counting, whereby the fluid which flows in a tube and is to be measured or monitored, is guided to a drip chamber which is surrounded by a light barrier. A drop of liquid falling in the drip chamber breaks the light beam from the light barrier and so generates a counting pulse which can be fed to a microprocessor or similar means for further evaluation. It is a disadvantage with this type of volume measurement of a flowing liquid that, the greater the viscosity fluctuations experienced by the liquid to be measured, the more inaccurate is the measured result. The reason for this is that changing kinematic tenacity, i.e. viscosity, and changing density bring with them a change in the volume of an individual drop. As it is only the absolute number of fallen drops which can be determined by the light barrier, this leads the actual volumetric mixture ratio to change when a certain volume of additive is added to a certain number of fallen drops, for example, by a signal being generated by the quantity dosing device after a certain number of fallen drops, ascertained by means of the light barrier, by means of which the valve means arranged in the hose line and connected to the reservoir of the anticoagulant liquid is triggered and opened for a certain time interval. On the other hand, the principle of volume determination by means of a drip chamber and light barrier is cheap and easy to put into practice and operates, at least as far as the light barrier component is concerned, without contact, which, in particular in the case of systems and devices which process blood of patients, is highly desirable for reasons of hygiene.
By: Kerri Fivecoat-Campbell | Pet360.com An elderly couple who left their 13 ½ year old Dachshund tied outside of the Baldwin Park Animal Shelter near Los Angeles with a note asking for him to put to sleep because they could not afford to care for him will be reunited with the dog. The heartbreaking note reads, "Our dog is 13 1/2 years old he is sick starting yesterday with bloody stools, vomiting. Had a skin disease for a few years. We are both seniors, sick with no money. We cannot pay for vet bills, or to put him to sleep. He has never been away from us in all those years, he cannot function without us, please put him to sleep." Instead, shelter workers called Leave No Paws Behind, Inc., an all breed, all foster based rescue that specializes in seniors, who picked up the dog and initially named him Harley. When the dog was taken to a veterinarian, it was determined he could not only be treated, but most likely had a "couple of more years" left in him, according to an update on the organization's Facebook page. The rescue realized the little dog had been well-cared for and according to the note, very much loved, so they decided to try to reach out to the dog's owners. When the dog owners came forward, they explained they are indeed both sick and cannot even afford their medical treatments or tires for their vehicle. They had taken their dog, who is actually named Otto Wolfgang Maximus, to a veterinarian and were told that they would need to run costly tests. When they realized they couldn't even afford to have their dog euthanized by the vet, they were "hysterical" and didn't know what else to do aside from leaving him at the shelter. "We just are living week to week," one of the pet parents, who wished to remain anonymous, told KTLA in an interview. "We can't even go to the hospital to get our treatment." Although they had read the judgments people were making about their decision after the story was made public, they reached out to the rescue anyway. "I was in tears when I realized that their love for this darling little man outweighed their fear of what people may say about them and I knew instantly, our decision to try to reunite Otto with his humans was the right decision!" reads the post on Leave No Paws Behind. Story continues The organization believes the Otto's owners loves him very much and just felt they had no other choice. "Ninety eight percent of the rescues we take in belong with us," said Toby Wisneski, founder of Leave No Paws Behind. "There are 1-2 percent of owners who love their animals very much and just believe they have no other option but to surrender them." Wisneski has decided to make the couple a permanent foster for Otto and return the dog to them with the provision they can make regular, weekly visits to the home. The organization will maintain the cost of Otto's food and veterinary care for the rest of his life. The couple lives outside of California and was on a ministry trip when they dropped Otto at the shelter. They will pick the dog up at the end of the month when they are able to get enough money to purchase new tires for their vehicle. According to Pet Insurance Zone, the average cost of a visit to the vet has soared to $190 for cats and $360 for dogs. The cost rose 64 percent between 1998 and 2006. The cost of having a beloved pet euthanized is not cheap, either. One veterinarian paper put the total cost between $150-$800, which includes veterinarian services, drugs and cremation. According to the most recent study by the National Council on Pet Population Study and Policy (NCPPSP), a total of 13 percent of the dogs relinquished by owners to shelters is due to the financial inability to care for the animal, personal problems or a pet's illness. An estimated 1.5-3.5 million animals each year are relinquished to shelters by their owners. Wisneski said pet owners should check with local rescues and shelters, many of which have accounts to help owners in financial crisis. Leave No Paws Behind even has a memorial fund set up to help people with euthanasia if they cannot afford it and the pet is terminally ill. Explore More at Pet360.com Puppy with a Heart Shaped Nose Survives Attack and Leg Amputation 22-Pound Cat Attacks! Family Forced to Barricade Themselves in Bedroom Puppies Left for Dead on the Side of the Highway, Nursed Back to Health Move Over Grumpy Cat: Stray Cat's Angry Face Finds Him a Home Ellen Does it Again! Earns $1.5 Million for Animals with Oscar Selfie This Family Lost Everything in a Fire. Help Them Find Their Dog.
What do you think of my golden salmon boy? His name is Eddie! (From Ed Hess) he is 4 months old. I was thinking of breeding him to my golden cuckoos and then line breeding back to him. He's the only golden salmon I have. Eddie, read your post, how goes your search for golden salmon marans? I love this color variety and would like to work toward a flock... Thanks, Laura Click to expand... Hi Laura, There are three closed flocks of correctly bred Golden Salmon Marans in the US. Marie Cantrell in MT; Bev Davis in FL and a lady in Grayling, Mich. Don't count on getting any birds from them. They will just keep putting you off. Search elsewhere. Try Connie Zullo at Harmony Hill Farm in Barnesville, Georgia.1094 HarmonyHillFarm 343 HarmonyHill Ranch PT, AI Clean Rd Barnesville 30204 , 770-358-0577Her GSM hatch 75% Black Tailed Buff and 25% Golden Salmon Marans. So buy 3 dozen eggs from her and you should get maybe 8 GSM. Do not cross that strain with any other strains. Work within that strain. Connie founded her strain with outcross stock so there is much variation there already. Inbreed to set type and get the birds pure-breeding for GSM. Treasure the Black Tailed Buff when they show up. They should carry the desired Mahogany gene and be valuable to other BTB breeders. Do not cross BTB with GSM. You will see a lot of mismarked cockerels in this gene pool. That's just the sex-linked gold/silver thing at work. Just cull them and move on. Do not breed them back into your gene pool, they cannot help you and will pollute your gene pool with mismarks. When you start getting properly colored females then you are getting somewhere. Go by the female color, not the male. It is possible to have the males hide undesirable colors in their plumage because there is so much black there. But the females reveal all. Analyze your males by the females he throws. When you start getting properly colored females from a male, then you know you are getting there with your males. Almost 2 years go, I shipped a couple of stunning pure BTB hens to a gentleman in Ohio whose f[rst name is Russ . They came from Golden Salmon parents which carried BTB genes. The neat thing about them was they carried the Mh gene which gave them that lovely rich color. Something not often seen in BTB Marans. Their parents came from Harmony Hill farm in Barnesville Georgia, whose Golden Salmon Marans were known for siring both GSM and BTB Marans, a very valuable thing. Anyway, I know Russ's info is on the Net as is Harmony Hills Farm. Golden Salmon ( e+/e+ s+/s(-), is recessive to BTB. So when BTB shows up from GSM parents, it is pure BTB. I shipped them out because I was looking to breed GSM and couldn't use them. Russ had a cock which needed hens. I don't know how his breeding program is progressing, have not heard from him in many months as I gave up on GSM and moved to Light Sussex which I really like. Best, Karen Tewart in western PA, USA Where did the Mh gene come from if both parents were GSM? If I researched the purebred cock's ancestry correctly, and I think I did, I believe he was a carrier of the Mh gene while manifesting proper GSM coloring. I believe he only carried one copy of Mh as he sired both BTB and GSM. I do believe he was a proper GSM and not crossed with Wheaton. I do not believe there was any Wheaton in the parents of my birds. I humbly request that those who are working on a GS project....please....do not sell your "BTB" females as BTB. For those who are working on the BTB variety, having mixed up genes in the BTB pool is a nightmare. BTB are not supposed to be e+/e+ but there are folks selling birds that hatched out wild type but mature to look like BTB and are then sold as such. Correct BTB are wheaten based. Thanks Question: since gs are pure wild type, they are very much like Welsumer, light brown leghorn, or red and silver dorking? Wels have an Mh though, yes? So gs are genetically closer then to leghorns and dorkings? Since it is nearly impossible to get a gs marans, how hard would it be to re-create it? Would that an option?
Prenez note que cet article publié en 2014 pourrait contenir des informations qui ne sont plus à jour. Le cas, médiatisé, d'un cycliste sauvagement agressé en décembre 2012 à Montréal a trouvé son dénouement avec la condamnation de l'agresseur, qui a plaidé coupable à des accusations de voies de fait avec lésions. Vendredi dernier au palais de justice de Montréal, le juge a condamné Luc Jr Domingue à 6 mois de sursis avec assignation à résidence ou 60 jours de prison ferme, et à 140 heures de travaux communautaires. Ce fait divers avait d'autant plus attiré l'attention qu'il avait été rapporté par le journaliste de Radio-Canada, Alain Gravel, dans le blogue que signait ce dernier le 17 décembre 2012  (Nouvelle fenêtre) . La victime de l'incident, Florent Daudens, également journaliste à Radio-Canada, avait été roué de coups alors qu'il roulait en vélo rue Saint-Hubert. Après avoir invectivé le cycliste, l'agresseur était descendu de voiture sans crier gare pour asséner à M. Daudens quatre coups de poing au visage. La victime, qui n'a dit mot de tout l'incident, s'est retrouvée avec deux dents cassées et des contusions. L'agresseur, lui, a fui les lieux. L'auteur de l'agression était passager d'une voiture conduite par une jeune femme. Considérée comme complice, Karine Dutilly a été condamnée à 30 jours d'emprisonnement à purger les fins de semaine et à deux ans de probation avec suivi par un agent. Karine Dutilly ne s'est pas présentée en cour pour son procès. Les altercations opposant cyclistes et automobilistes sont légion. « Mais rarement donnent-elles lieu à une telle violence gratuite », estime Florent Daudens qui se dit soulagé de la condamnation des deux individus. « J'ai l'impression de boucler un cycle », dit-il sans jeu de mots.
Today Charlottetown MP Shawn Murphy will table a Bill in the House of Commons to remove all GST from bicycle sales across Canada to promote both sustainable transportation and healthy activity. "The best way to encourage something is to provide incentives. By removing the GST on bicycles we can promote their use as one of the healthiest, most environmentally sound forms of transportation and recreation," Joyce Murray, MP for Vancouver Quadra, who will second the Bill today in the House of Commons. "Promoting bike use is a positive policy that I believe all Canadians can and should support," stated Murphy outside of the House of Commons. "Reducing individual car use is one of the biggest steps individuals can take to reduce their carbon emissions," Murphy added. An individual can save 28.2 kg of carbon for every 100kms that they bike instead of drive. "All efforts to increase bicycle use are commendable. Enhanced transportation on bicycles would have an obvious and measurable effect in reducing greenhouse gas emissions, reducing gridlock, decreasing consumption, and enhancing overall human and environmental health. I applaud these efforts." David McGuinty, Environment Critic for the Liberal Party of Canada "I believe by 2010, Canadians can increase our bike usage in the spring, summer and fall months by 80%," said Murphy. "Regions not accustomed to biking can promote increased use through the creation of bike lanes and trails, and by supplying safe places to secure your bike," responded Murphy.
For indispensable reporting on the coronavirus crisis, the election, and more, subscribe to the Mother Jones Daily newsletter. Editors’ note: Mac McClelland is spending a month in her home state of Ohio, reporting on the Wisconsin-style showdown involving Republican Governor John Kasich, public employees, unions, teachers, students, and struggling middle-class families. Yesterday I did something I haven’t done in a really long time: went to school. Middle school. My new/temporary landlord/roommate/reporting subject, Erin, teaches outside Columbus, and I joined her for one of the last days of class before school lets out for summer. Out here, the public schools spend nearly 20 percent less per student than the national average. The lack of resources can be challenging—one local school closed down because its AC broke and the summer heat was too sweltering for the kids. Erin’s school doesn’t even have AC, but she loves loves loves her job. As a writing teacher, she brought me in to talk to her students about what it’s like to be a professional writer. So I spent the day fielding some excellent questions (as well as a couple of racist and homophobic ones) from her seventh and eighth graders. I also heard about their plans for the summer. Lots of them have jobs, mostly with companies or farms owned by their families. Some of those without those types of connections are having more trouble finding work, not totally surprising since job growth in this town is -4.6 percent. As one 14-year-old explained his failure to land summer employment despite having applied at several places, “No jobs to be HAD.” When Anthony, Erin’s husband, got home last night, he told me he’d spent the day talking about employment as well. Since he and so many of his coworkers at the Ohio Consumers’ Counsel are facing layoffs under Gov. Kasich’s proposed budget cuts, his office had brought in people to talk to them about resources for getting new jobs, like résumé services. Anthony has started searching for alternate work, but hasn’t had any more luck than the 14-year-old yet. Since Kasich’s budget also targets schools, I asked Erin if she’s concerned that the threat of becoming a single-income household could actually be a threat of becoming a no-income household. Her school recently had to lay off a couple of teachers already, and cut a few more to half-time. But she thinks her position is secure. Ohio is one of the states where teacher seniority is protected by law, a law that teachers’ unions are fighting to defend. So it’s a good thing Erin’s been teaching for eight years. The bad news is that the governor’s trying to cut her union’s power, too.
Crypto startup TrustToken announced Wednesday that its smart contract has passed three independent security audits conducted by Certik, SlowMist and Zeppelin, with no vulnerabilities found. Moreover, its TrueUSD stablecoin has now exceeded $1.1 billion in monthly trading volume, with a $200 million market cap, according to the firm’s data. As part of its efforts to maintain the stablecoin’s security, TrustToken is now storing the U.S. dollars backing the token in multiple third-party trust companies. Each trust company is regulated through the State of Nevada Financial Institutions Division. The firm now intends to work with trust companies regulated by the Delaware Office of the State Bank Commissioner and the Ohio Department of Commerce as well. As a result, it said, TrueUSD redemption will not be compromised by a single point of failure should any single institution have issues. TrustToken CEO and co-founder Danny An explained that the company will continue to focus on regulatory compliance and transparency, adding: “Over the past year, we have invested heavily in building asset tokenization technology that is not only critical for the cryptocurrency industry, but also equalizes the ability to trade worldwide, and gives people true control over their assets.” Separately, the company announced it has appointed former DoorDash engineer Hendra Tjahayadi as its director of engineering. Tjahayadi has previously worked with Lyft, Dropcam and Google, and will work on TrustToken’s infrastructure security and scalability, according to the company. Green light image via Shutterstock
Monkey made to eat by just using its brain power London, May 29 (ANI): Scientists at the University of Pittsburgh School of Medicine have announced that a monkey in their experiments has been successful in moving a robotic arm to feed itself marshmallows and chunks of fruit by using signals from its brain. The researchers revealed that the monkey performed this task as its arms were restrained for the restrained. Explaining the significance of their study, the researchers said that it might benefit development of prosthetics for people with spinal cord injuries, and those with locked-in conditions like Lou Gehrigs disease or amyotrophic lateral sclerosis. Our immediate goal is to make a prosthetic device for people with total paralysis. Ultimately, our goal is to better understand brain complexity, Nature magazine quoted Dr. Andrew Schwartz, senior author and professor of neurobiology at the University of Pittsburgh School of Medicine, as saying. Now we are beginning to understand how the brain works using brain-machine interface technology. The more we understand about the brain, the better well be able to treat a wide range of brain disorders, everything from Parkinsons disease and paralysis to, eventually, Alzheimers disease and perhaps even mental illness, added Dr. Schwartz. The researcher revealed that the technology is based on computer software that interprets signals picked up by probes the width of a human hair. He revealed that the probes were inserted into neuronal pathways in the monkeys motor cortex, a brain region where voluntary movement originates as electrical impulses, during the study. Dr. Schwatz said that the software programmed with a mathematic algorithm evaluated the neurons collective activity, and then sent it to the arm, he added. As a result, he added, the arm carried out the actions the monkey intended to perform with its own limb. He said that the movements were fluid and natural, and that the monkey was found to regard the robotic device as part of its own body. The monkey learns by first observing the movement, which activates his brain cells as if he were doing it. Its a lot like sports training, where trainers have athletes first imagine that they are performing the movements they desire, he added. (ANI)
If You Have to... You Have to... You have to figure out what is important and what to ignore. Check the syllabus for the course. Check the course description. Check your notes for underlined points that describe major themes, structure, concepts. You need to understand those. Cramming leaves no time for niceties. You need the main points and nothing else. You Need a Plan Now figure out how much time you have. Be conservative. It's no good making a plan that you don't carry out. Allow for sleep, eating, breaks etc. How many hours do you have? Work out a cramming schedule. Spend 30-35% of the remaining time going over the material that you deem the most important. Spend the remaining 65-70% of your time in repeating that material to yourself until you know it. Here's how. Go over the material you have selected for your study effort. Read all the notes, paying attention to underlining or any emphasis that has been recorded. Now use your notes (or the textbook if you must) to create an outline of the material you are studying. Write down the broad concepts, use itemized lists for the details, include any examples taken from lectures, and in particular, any information highlighted in the notes as being emphasized by the instructor (this is why attending lectures/class is important). Now go over the material again, formulating questions that might be asked on an exam or test, and answering those questions using the notes. Record the questions in your outline, along with point form answers. And repeat. And repeat. And repeat. At some point, when you believe you have a decent grasp of the material, start using the outline you created. Essentially you want to memorize the outline, and be able to re-write it from memory. That tells you it should be condensed, with no fluff, just all stuff. That memorized outline is going to be your salvation. SLEEP! If you don't get enough sleep your brain won't retain all the information that you have crammed in there. If You Don't Have Notes If you don't have notes, you need to essentially create some for yourself. Since you don't have a record of what the professor considers most important, you will have to figure it out on your own. Go through the textbook, paying special attention to the introduction, the first paragraph of each chapter, chapter summaries and any questions or study notes at the end of each chapter (sometimes these are included in the body of the chapter as breakout boxes). The introduction should give you a good clue as to where to focus. While going over the material and making notes (as described above) pay particular attention to examples in the text. You need to understand them. If you had taken notes in class, the prof would have presented examples to aid in understanding. You will have to do your best on your own. And that's it. Carry on as above, except that you will have to wade through more material. It is extra important for you to create an outline. You don't want to go through the text more than once (after you have identified what material you will be focusing on). Don't Cover Everything Avoid the temptation to go over everything in a shallow manner. You will then master nothing. Remember, at this point your aim is a pass. Using these cramming strategies, you have already identified the most significant material. And you have focused heavily on it. The questions with the most marks and most of the large mark questions should come from material you studied. Don't do yourself the disservice of just skimming the important information so that you have time to also skim the least important. Avoid Cramming... Why?Your anxiety level will go up You will lose sleep and eat poorly because of this You will get sick more easily because of this You will miss the exam because of this You will take the much harder essay make-up exam because of this You will fail the exam. Seriously, at a minimum you will do worse on the exam than you would have otherwise. Guaranteed.
41 F.3d 662 Kennedyv.Riley* NO. 94-60329United States Court of Appeals,Fifth Circuit. Nov 15, 1994 1 Appeal From: N.D.Miss., No. 1:92-CV-324-S-D 2 VACATED.
Q: How can you detect if it is the first time a user opens an app Is it possible to detect if it is the first time a user opens an iOS application, using Objective-C? I would like to show a welcome message when the user opens up the app for the first time, but not show it to them after that. I'm looking for something like: BOOL firstTime = [AppDelegate isFirstTimeOpeningApplication] A: Look for some value in your app's preferences, or the existence of some file. If you don't find it, your app is running for the first time, so write the expected value to the preferences or create the file so that the next time your app runs you'll know that it's not the first time. If you store the time and date of the first run instead of just a flag, you can determine how long it's been since the app was used. You might want your app to act like it's the first run if the user hasn't used your app in a very long time. Note that this technique only works if the user hasn't deleted your app. When an app is deleted, all its data is removed. If you want to know if your app has ever run on that device before, even if it was deleted afterward, you'll need to record information to identify the device elsewhere, such as on your own server. A: Use NSUserDefaults //In applicationDidFinishLaunching:withOptions: BOOL hasLaunchedBefore = [[NSUserDefaults standardUserDefaults] boolForKey:@"AppHasLaunchedBefore"]; if(!hasLaunchedBefore) { //First launch [[NSUserDefaults standardUserDefaults] setBool:YES forKey:@"AppHasLaunchedBefore"]; } else { //Not first launch } Hope that helps!
The aromatic "trapping" of the catalytic histidine is essential for efficient catalysis in acetylcholinesterase. While substitution of the aromatic residues (Phe295, Phe338), located in the vicinity of the catalytic His447 in human acetylcholinesterase (HuAChE) had little effect on catalytic activity, simultaneous replacement of both residues by aliphatic amino acids resulted in a 680-fold decrease in catalytic activity. Molecular simulations suggested that the activity decline is related to conformational destabilization of His447, similar to that observed for the hexamutant HuAChE which mimics the active center of butyrylcholinesterase. On the basis of model structures of other cholinesterases (ChEs), we predicted that catalytically nonproductive mobility of His447 could be restricted by introduction of aromatic residue in a different location adjacent to this histidine (Val407). Indeed, the F295A/F338A/V407F enzyme is 170-fold more reactive than the corresponding double mutant and only 3-fold less reactive than the wild-type HuAChE. However, analogous substitution of Val407 in the hexamutant HuAChE (generating the heptamutant Y72N/Y124Q/W286A/F295L/F297V/Y337A/V407F) did not enhance catalytic activity. Reactivity of these double, triple, hexa, and hepta mutant HuAChEs was monitored toward covalent ligands such as organophosphates and the transition state analogue TMFTA, which probe, respectively, the facility of the enzymes to accommodate Michaelis complexes and to undergo the acylation process. The findings suggest that in the F295A/F338A mutant the two His447 conformational states, which are essential for the different stages of the catalytic process, seem to be destabilized. On the other hand, in the F295A/F338A/V407F mutant only the state involved in acylation is impaired. Such differential effects on the His447 conformational properties demonstrate the general role of aromatic residues in cholinesterases, and probably in other serine hydrolases, in "trapping" of the catalytic histidine and thereby in optimization of catalytic activity.
Tag: arizona Day 1 + Day 2: Zion National Park Zion was my favorite park from our entire trip! It was absolutely breathtaking. We hiked up to 3,000 feet on the second day, to Observation Point and Angel's Landing, and it was incredible! What to Do: Zion is located in Springdale, Utah. Springdale is the cutest little… Continue reading Utah Travel Diary!
In a world recently freed from evil the people, who were unified against that evil threat, now turn against one another again. In their efforts to rebuild the world begins to come back into conflict again. Amanis AuvreaAnea might have a strange name but in every other way she is a normal 17 year old girl. She goes to high school. She's popular, and gets good grades.That is until one day at school everything changes when she gets a invitation to a party at a house that has been empty for the last... In a world fulled with evil and chaos, a beacon of hope is hidden... and it is growing to be as a strong child should, and would need to be in such a world. All of the lands both near and far, have fallen to evil in its purist form. What would it be like living in a world that was almost... A young fox furry stumbles onto elf land. The elves tell the furry if she wants to get out of there alive, she must preform.... Acts. We all know about Santa, but does anyone ever think about what came before him? Well i have your answers right here an a story that will hopefully bring some fresh air to the Christmas stories! (More to come tomorrow!) A re-re-re written copy of this story. The image was created by a friend who sadly passed away. Aida, the once mortal Princess of the Winter Court, is getting close to the day she takes over the Court as Queen. Her mother has her betrothed to the Prince of the Wolf Clan; the creatures whom Aida despises for they killed her mortal parents. Even being betrothed, Aida falls for a mortal boy.... Aida, the once mortal Princess of the Winter Court, is getting close to the day she takes over the Court as Queen. Her mother has her betrothed to the Prince of the Wolf Clan; the creatures whom Aida despises for they killed her mortal parents. Even being betrothed, Aida falls for a mortal boy.... Litheen is a fantasy realm consisting of elves, orcs, magic, and dragons to name a few. Litheen will be the setting for many planned sequels. In the first story, a group of strangers from our world find themselves trapped in an unknown land, eventually to discover the only way back home it to... The beginning of our story. The druids of Serailas try to hold back the spreading of darkness by the dark seed, but after it becomes too much to contain it is up to two trainees and the grandmaster to try and contain it while fighting off their former allies
Let me add my voice to the lamentations: This has been a rough week. If that’s a massive understatement, so be it—we’ve drowned ourselves in words of grief, and there is nothing I can say that will give a sharper outline to our pain. It’s sharp enough. Instead, I want to focus on a peculiar absence I’ve noticed in the aftermath. By and large, I haven’t seen the Clinton wing of the Democratic party piling blame on the Sanders wing. This is not, thank God, a Ralph Nader situation. I’m sure there are isolated incidents—there are too many voices and too many outlets to ever silence a narrative, no matter how misguided—but overall, I’m getting the (shocking) sense that many Democrats are coming to terms with the fact that Hillary Clinton was a fundamentally flawed candidate who did not provide sufficiently compelling reasons to woo the type of voter that elected Donald Trump. The numbers make this hard to deny—it’s difficult to argue that there was a massive national revolution when Trump secured fewer votes than Mitt Romney in 2012. It’s difficult to pin the whole thing on racism when many of the counties Clinton lost, especially in the critical Rust Belt, had gone to Obama in both 2008 and 2012. Instead, the loss can be attributed to Clinton’s failure as much as Trump’s success, and people seem to be accepting that reality—if only because there are no real alternatives. After the conclusion of the Democratic primary, when Bernie Sanders endorsed Clinton, many of his supporters felt betrayed. They had given him their money and their time and their hearts, and now it appeared as though he was selling out to the corporate wing of the party he had railed against from the beginning—that had, indeed, formed the backbone of his campaign—in service of the “lesser of two evils” argument that encumbered us with our two despised general election candidates in the first place. What happened to the revolution? Indeed, I heard this same argument from many Republicans, both at the time of Sanders’ shift and after the election. Anecdotally, two family members of mine—one a Trump voter, and another who may have voted Trump, but definitely did not vote for Clinton—expressed disgust that he had “sold out” his cause in favor of a politician they knew, in their hearts, he despised. Because that’s the interesting part of the Trump coalition in 2016—deep down, they respected Bernie Sanders. As strange as it felt to feel an affinity for a Jewish socialist, they felt it anyway, and it even wounded them a little when he cast his support for someone they detested. It lends credence to the view from hindsight that many are espousing this week—he would have won this election for the Democrats. He would have succeeded where Clinton failed. However, there is a tendency for both progressive Democrats and sympathetic Republicans to paint Sanders as a pure-white angel who finds himself at sea in the complex world of realpolitik, rather than a savvy politician with decades of experience in Washington. And to do so misses a truth about him that goes beyond his politics—he is also a smart strategist. So let’s re-consider his decision to back Clinton in light of Tuesday’s result. I won’t claim to believe that Sanders expected Trump to win, even though his own populist movement (and a few of his primary wins…especially Michigan) seemed to point to a shifting national mood. In fact, I take him at his word that his primary concern was to keep Trump out of the oval office for the simple fact that he cares about America. But let’s talk strategy, too, because there was en enormous tactical element to his support for Clinton. In the first potential outcome, a Democratic general election victory, the benefit is obvious. Sanders knows that, for better or worse, we’re stuck with a two-party system in America. And he knew that if he stubbornly withheld his support from a victorious Clinton, he and his progressive movement would be on the outside looking in, with no influence over a centrist Democrat who had essentially won without them. He would have neutered himself, and his cause, for pride. On the other hand, if he could take some of the credit for her win, he would have firmly established his own credibility for the battles to come—the fight to holder accountable for the progressive promises she made to accommodate his voters over the course of the primary. If she followed through, great, and if she didn’t, he’d be there to call her out and rally his powerful base. In the second, sadder outcome—the one which actually transpired—his choice to back Clinton was even more important. People in general, but especially people active in American politics today, are loathe to blame themselves for anything. If Sanders had abandoned Clinton, pronounced her brand of governance too corrupt to countenance, and taken his progressive wing with him, angry Democrats would have an easy scapegoat in the wake of the November loss. You can imagine how convenient it would be to dump the blame on Bernie—the defeat was his fault! They would hang the Trump victory on him, pointing to his betrayal, and the takeaway, for many, would be that only a unified (and implicitly centrist) Democratic party could win a general election. Again, progressives would be neutered for the foreseeable future. Instead, look at what’s happened since Tuesday. If anybody blames Bernie, their arguments are gaining no traction. He may have taken a minor hit in some corners for the perception that he put his deepest held beliefs on hold, temporarily, in service of a lost cause, but broadly, he is perceived as a man of integrity who illuminated a path to victory that the Democrats were too stubborn and corrupt to take. Now, more than anything, he looks like a genius. The progressive cause hasn’t just gained strength—it looks like the only viable way forward. The far left is ascendant, and two years ago, that was unthinkable within the party’s neoliberal framework. There are battles to come within the Democratic party in the near future. One, for leadership of the DNC, is already shaping up: Keith Ellison vs. Howard Dean. Progressive vs. moderate, grassroots vs. big money. Bernie has cast his lot with Ellison, and the general clamor—at least as I’ve seen it—has been decidedly against Dean, who represents the middle way that has been tainted with the stink of failed compromise and lost elections. Today, Sanders finds himself in a position of great power within his party. In fact, it’s hard to look across the scorched landscape and see any other Democratic figure with more influence. He has come through this loss with his beliefs vindicated, his integrity barely singed, and his movement ascendant, and none of that would have been possible unless he had swallowed the bitter pill and endorsed Hillary Clinton.
Video shows JaQuavion Slaton shot multiple times by police officers. He also had a self-inflicted gunshot wound, according to the Tarrant County ME. Updated at 6:15 p.m. with additional comments from Fort Worth community. Fort Worth police released Thursday an edited version of body camera footage showing the fatal shooting of a 20-year-old man. Community activists demanded the Fort Worth Police Department release the footage at a City Council meeting Tuesday. They said they believed officers didn't use de-escalation techniques before opening fire on JaQuavion Slaton. Slaton was shot multiple times by police officers and had a self-inflicted gunshot wound, according to the Tarrant County Medical Examiner. But Fort Worth interim police Chief Ed Kraus said Thursday that officers were "in fear for their lives" when they shot Slaton, who was believed to be armed and dangerous. Video shows officers surrounding a truck where Slaton was hiding after he and his cousin fled from police during a traffic stop. An officer broke in one of the windows of the truck moments before the shooting. Kraus said officers saw Slaton moving inside the truck and believed he was reaching for a gun. "De-escalation techniques do not work in every situation," Kraus said of the fatal encounter. Released bodycam video Police released a video containing a series of clips — the first showing officers chasing Slaton and Jevon Monroe. "Today’s clips were for illustration purposes for the release. The combined videos are hours long," Fort Worth police said in a written statement. The second clip in the video shows officers handcuffing a man and asking the man where Slaton was. That encounter appears to take place feet away from the truck where Slaton was hiding. The video then skips ahead to show officers surrounding the truck. That clip shows an officer break the window "Put your hands up," the officers shout. The footage shows movement inside the truck. The clip switches to the view from a different bodycam, as evidenced by the timecode of the video and the bodycam identification number. "He's reaching," one officer yells before the officers fire several times at the truck. "Cease fire," one officer shouts. Monroe told WFAA he believes his cousin was trying to put his hands up when officers shot him. Police said a loaded gun was found inside the truck, police said. “Our officers were not on a mission to take anyone’s life that day," Kraus said. The Tarrant County Medical Examiner determined Slaton died from multiple gunshot wounds to the head and chest. His death was ruled a homicide. Slaton had two "high-velocity gunshot wounds," according to the medical examiner. One of the wounds was to his upper chest. The second was to his upper right shoulder. The man also had gunshot wounds to the right side of his head, right neck, base of his head and upper right arm from 9mm rounds, the medical examiner determined. Slaton also had a "loose contact entry gunshot wound of the right temporal head" that was self-inflicted, the medical examiner said. The medical examiner said it is still working to determine if the gunshot wound was intentional or accidental. Community reaction Stephen Muhammad attended Thursday's new conference but said he still has questions after watching the footage police released. Muhammad lives two houses down from where the shooting occurred. He said he doesn't understand why police were so quick to approach the truck. “If the man's backed up in a corner, all they had to do was step back and wait him out,” Muhammad said. He said he was concerned officers didn't consider the bystanders. “They had their guns out,” Muhammad said. “There were people out, there were children out—my children, my grandchildren. None of that was taken into consideration.” Kraus said the officers positioned themselves in front of the truck to avoid shooting in the direction of any bystanders. Fort Worth city councilwoman Gyna Bivens said she wants to create a policy requiring police to release bodycam videos. She was among those calling for the video to be released. “We need a policy, and that way we don’t need to worry about, 'Can we do it now, Should we do it now,'" she said. Several encounters Kraus said officers believed Slaton was armed and dangerous before the fatal shooting. Police had searched for Slaton three times before they were called Sunday. The shooting occurred around 4 p.m. at East Berry Street and Lauretta Drive. Officers first tried to find him May 6 after police were alerted Slaton was likely in a Fort Worth neighborhood. University of Texas at Tyler officials had contacted Fort Worth police, because Slaton was a suspect in an aggravated assault reported April 28 at a campus apartment. Officers were again called May 22 because there was a domestic disturbance involving Slaton. Police were called again on June 5 but were told Slaton hid from them, Kraus said. Kraus said officers were called again Sunday because Slaton was "yelling at a family member who was too afraid to call police and that he had a knife." The police chief played bodycam footage during the Thursday news conference. The footage slows down the foot chase and then zooms in on Slaton's hand, which appears to be holding something. It appears the footage released is from at least two body cameras. 'Wasn't one of our own' Fort Worth Mayor Betsy Price released a statement after the Thursday news conference saying she continues to "support our outstanding Fort Worth police officers." "Let’s be clear, on Sunday night they were serving a warrant on an individual wanted for aggravated assault with a deadly weapon," Price said. She pointed out that Slaton was not from Fort Worth. "He wasn't one of our own," she said. Price said the Police Department was "very measured" in the updates it gave the public. "I know there is fear and anger among some in our community. But calling for justice and calling our police officers murderers is absolutely appalling and irresponsible," Price said in the written statement. She said the community must come together to offer solutions to "prevent our young people from turning to a life of crime." Though Slaton was not from Fort Worth, the mayor said, "I know there are young men just like him right now across our city that lack opportunity and limited by their own circumstances." Mayor Betsy Price's full written statement: The events that unfolded on Sunday are tragic – no matter where you fall on this issue. A 20-year-old man is dead, much too young with his entire life in front of him. We continue to support our outstanding Fort Worth Police Officers, that go above and beyond every single day to keep this community safe, doing their jobs to keep criminals off the street. Let’s be clear, on Sunday night they were serving a warrant on an individual wanted for aggravated assault with a deadly weapon. I know there is fear and anger among some in our community. But calling for justice and calling our police officers murderers is absolutely appalling and irresponsible. We recognize that releasing these videos and images will not relieve tensions in our community. Our police department has been very measured in updating the public and media in this case. It is irresponsible and negligent to release information without ensuring its accuracy. There is much work to do. But no healing or solutions will happen without our entire community coming together – what are we doing to offer as a solution to prevent our young people from turning to a life of crime. This man was not from Fort Worth, he wasn’t one of our own, but I know there are young men just like him right now across our city that lack opportunity and limited by their own circumstances. We can do better. But we can’t offer solutions without the willingness among the leadership in our community to step up and be a part of creating opportunity, restoring trust and looking for a solution. My door is open, it has been and remains to be. I am in this community and will do the work to ease tension and fear, but I cannot do it alone. Every elected leader, every faith leader, every community organizer is needed to make a difference and make the change that is needed.
OPINION When stolen intimate photos come out, don’t look We live in an era rich with sexual documentary evidence. Mass text-messaging combined with the rapid spread of hand-held cameras and photo-sharing technology have produced a world where every sexual relationship has a much higher likelihood of producing its own historical record than the trysts of a generation ago. Consequently, we’ve all become archivists of others’ sexual lives: readers of leaked sexts, viewers of dubiously released private photos, knowers of once-secret things. It’s an easy hole to fall into, because eavesdropping is thrilling and snooping even more so, especially when the subject is otherwise remote. The latest example is, of course, Jeff Bezos — the founder and CEO of Amazon who owns The Washington Post — whose intimate text exchanges with Lauren Sanchez were recently leaked by the National Enquirer. Last week, Bezos published a Medium post alleging that the Enquirer has also obtained private, explicit photographs of him, and that the tabloid has threatened to release them unless Bezos ceases his private investigation into how the Enquirer got the texts and pictures in the first place. To which Bezos said thanks but no thanks, meaning the pictures could potentially emerge at any time. He wouldn’t be the first celebrity to turn up dishabille in the press against his wishes. Nor will he be the last, and neither will the stanchless trickle of sexts and nude photographs and the occasional video flow from the accounts of celebrities or other people in whose lives there is arguably some public interest. So it makes sense to develop some kind of principle for dealing with these materials as they emerge. And that’s more complicated than it may initially seem. We tend to make (helpful) distinctions between thinking and doing, which in its best form serves as a bulwark against detecting and prosecuting thought crimes. Thus, having a gander at the daily catch of ill-gotten erotica seems hard to fit into any pre-existing category of wrongdoing. After all, looking at it doesn’t make you responsible for the initial invasion involved in stealing it. Not looking at it won’t put it back where it was, so to speak. What’s public is relentlessly public. Looking also doesn’t mean you have to participate in any kind of public shaming or pile-on. So what’s the harm in simply knowing what somebody texted to somebody else? When it comes to viewing leaked sexual ephemera, the knowing is its own harm. That doesn’t necessarily count for every kind of secret; being aware of somebody’s private dislike of a mutual friend, for instance, doesn’t represent the same kind of violation as having ungranted sexual knowledge of them, because sex is different from other things. The exclusivity, the secrecy, that’s all part of the point — they’re the essential ingredients of intimacy. And simply knowing the details without invitation jeopardizes that. In 2017, Jennifer Lawrence reflected on the 2014 theft of her own private, sexual photographs this way: “When the hacking thing happened, it was so unbelievably violating that you can’t even put it into words … like, there’s not one person in the world that is not capable of seeing these intimate photos of me.” Part of what concerned her was the social response. She mentioned her anxiety that while at an ordinary public event, a stranger could pull up those photos on a phone, apropos of nothing. That’s the uneasy violation that happens mind to mind, when someone suddenly knows something they shouldn’t, and you can’t stop them from knowing it. The law has long had its own ways of dealing with wrongful invasions of privacy, the sorts that cause damage to careers and relationships and reputations and health, or that regard the specific invaders of privacy themselves. But moral harms need no substantive damages to be wrong, and they apply to the world of onlookers as much as to the thieves of private materials. When there is a case of prevailing public interest regarding stolen sexual materials, you’ll know, and that scenario will involve its own weighing of right and wrong. But as for the never-ending reel of things we ought not see ever-flickering across our screens — ignore them, don’t look. There are things better left unknown.
Shipping of vegetable and ornamental plants generally, and more particularly, smaller, fragile plants and seedlings that have yet to reach maturity, has always posed certain challenges for growers, distributors and retailers. Sustaining the plants in a viable condition and protecting them from handling damage very often have been primary concerns. Over time, methods of buying, selling and delivering plants have undergone significant change. Early on, plants were made available and purchased on a carry-out basis at a local nursery. Later, plants became available through more indirect means such as grocery, hardware and discount stores, as well as through various other middleman outlets. More recently, purchasing via mail and telephone order from direct mail catalogs distributed by non-local vendors has become increasingly prevalent. Plants and seedlings ordered from such catalogs typically are delivered to the customer through the mail or other similar means. The advent of long distance shipping of plants through the mail and other means has resulted in the creation of a variety of containers designed to maintain and guard plants during shipment. Some examples of containers created with such purposes in mind can be found in U.S. Pat. Nos. 5,613,605; 4,471,573; 3,342,329; 3,021,046 and 2,736,138. U.S. Pat. No. 5,613,605 discloses a plant package for use in self-service retail sales stores, as well as other sales methods such as mail order. The package is a self supporting, light transmissive polymer shell formed by two separate elements that snap together to fully enclose a single plant. U.S. Pat. No. 4,471,573 discloses a folding package for up to three plant pots filled with soil and plants, bulbs or tubers. The package is used for the transport and display of the plant item in shops and consists of an assembly of three blocks of triangular shape that when folded together enclose the pot and stem region of the plant items contained therein. The package preferably is manufactured from a transparent plastic material. U.S. Pat. No. 3,342,329 discloses a container for transporting up to two potted plants. The container is comprised of up to two inner boxes and an outer box. The inner and outer boxes are made of cardboard. The inner boxes are fixable to the outer box and enclose the plant pot. A rectangular opening in the inner boxes is provided for the plant stem to extend through. U.S. Pat. No. 3,021,046 discloses a shipping container that may be formed from single piece of flat material, such as heavy paper or cardboard or flexible plastic material. The container completely encloses the plant and has a structure for supporting the pot in the container and securing the root ball of the plant. U.S. Pat. No. 2,736,138 discloses a two-piece, collapsible carton used with a transparent, heat-sealed wrapper for shipment and handling and for display of potted or balled plants. While the known container examples listed above provide varying degrees of plant protection and sustenance, all but one have multi-piece constructions that are more costly to produce and more time-consuming to assemble than a single-piece structure. The known single-piece container is not suitable for mail shipment of plants, however, as it provides an enclosure only for the pot, soil and plant root region. Additionally, in the case of the other constructions, a potential disadvantage associated with them arises from their forming a complete enclosure about the plant. A complete enclosure does not afford a plant with an opportunity to breathe and may also trap excess moisture which may promote mold, mildew and other undesirable conditions. On the other hand, the container of the present invention is a single-piece, easily producible, no-assembly, container that not only protects the pot, soil and root region of a plant, but also shields the stem and leaf region with a structure that allows the plant to breathe.
Q: C# Disable checkboxes when number requirement from radio button is met I'm having problems figuring out an assignment in my programming class. I have 4 radio buttons and 8 checkboxes. radioButton1 = 1, radioButton2 = 2, and so on. If I select radioButton1 I only want to be able to select only 1 checkBox and have the rest of the checkboxes disabled. How do I go about this? pizza place I also want everything to be deselected if i change one of my radiobuttons options after selecting everything else. I'm sorry if I didn't explain myself well. Hope you can help A: Let's say that name (id) of your elements are rb1, rb2... cb1, cb2... You can make event (click on element > little lighting > double click on checkChanged to generate method) for each of your radio buttons so you can disable checkboxes you want. Example: private void radioButton1_CheckedChanged(object sender, EventArgs e) { if(rb1.Checked == true){ //if someone just checked that radio button resetAllButtons(); //resetting all checkbox buttons as you wanted cb2.Enabled = false; //making checkbox2 unclickable cb3.Enabled = false; //making checkbox3 unclickable cb4.Enabled = false; //making checkbox3 unclickable /* and so on */ } } Method to reset everything should look like: void resetAllButtons(){ rb1.Checked = false; //unchecking radio button 1 rb2.Checked = false; //unchecking radio button 2 /* and so on */ cb1.Checked = false; //unchecking checkbox1 cb1.Enabled = true; //making checkbox1 clickable again cb2.Checked = false; //unchecking checkbox2 cb2.Enabled = true; //making checkbox2 clickable again /* and so on */ }
In the last blog we looked at the Epworth Questionnaire, as it is a good way for an individual to determine whether they suffer from excessive daytime sleepiness… The degree or severity of daytime sleepiness is a good measure of what a person’s sleep quality is like. However, it is a good idea to look at what your bed partner has to say, as they may be witnessing certain behavior first hand I.e., snoring, gasping for breath, body movement. The questionnaire below is a subjective look at how severe your bed partner feels that your snoring is. Snoring is a strong indicator of Obstructive Sleep Apnea, so it’s good to get the bed-partner’s feed-back if possible. BED PARTNERS QUESTIONNAIRE Please answer the following questions as follows: 1—never, 2—rarely, 3—sometimes, 4—often, 5—always 1. Does your husband/wife snore loudly? 2. Does your husband/wife snore in all positions? 3. How often were you kept awake by snoring? 4. How often were you forced to sleep in another room? The more information the bed partner can give concerning the affected individual, the better. But it goes beyond snoring; anything witnessed that’s of a physical nature, I.e., leg movements or anything heard (teeth grinding, gasping for air or choking, sleep talking) The bed partner’s input is an important part of the patient’s need for more follow up and a definitive diagnosis . To help us obtain a proper diagnosis and an appropriate treatment plan, have your bed partner, if applicable and available, fill out this questionnaire regarding your sleep habits. This information is vitally important for your dentist or sleep doctor to best evaluate your condition. TO BE FILLED OUT BY THE PATIENT’S BED PARTNER 1. YES NO Do you witness the patient snoring?_____________________ 2. YES NO Do you witness the patient choking or gasping for breath during sleep?____________________________________________ 3. YES NO Does the patient pause or stop breathing during sleep? _____________ 4. YES NO Does the patient fall asleep easily, if given the opportunity, during the day (normal wakeful hours)?_______________ 5. YES NO Do you witness the patient clenching and/or grinding his/her teeth during sleep?____________ 6. YES NO Does the patient appear refreshed upon waking? ____________ 7. YES NO Do the patient’s sleep habits disturb your sleep? _____________ 8. YES NO Does the patient sit up in bed, not awake? _________________ 9. Please check those sleep habits of the patient that are disturbing to you:  Snores  Restless  Wakes up often  Loud gasping for breath while sleeping  Stops breathing  Grinds teeth  Becoming very rigid or shaking  Biting tongue  Kicking during sleep  Head rocking or banging  Bed-wetting  Sleep walking  Sleep talking  Other_________________________ Comments:____________________ The two questionnaires above along with the Epworth are really important in order to help evaluate a patient’s condition. Combine this information with any of the symptoms listed in the blog “ Sleep Apnea – Symptoms Revisited “ posted on December 1,st 2013 and what you get is a good indicator of whether an individual may be suffering from some type of sleep deprivation…most likely Obstructive Sleep Apnea. Once we have all of this ‘preliminary information,’ we can move to the next step, which is a sleep study conducted by a Sleep Specialist. Once we have a diagnosis, we can put forth an appropriate treatment plan which will help you to live a healthier and productive life.
Neurologic and developmental disability after extremely preterm birth. EPICure Study Group. Small studies show that many children born as extremely preterm infants have neurologic and developmental disabilities. We evaluated all children who were born at 25 or fewer completed weeks of gestation in the United Kingdom and Ireland from March through December 1995 at the time when they reached a median age of 30 months. Each child underwent a formal assessment by an independent examiner. Development was evaluated with use of the Bayley Scales of Infant Development, and neurologic function was assessed by a standardized examination. Disability and severe disability were defined by predetermined criteria. At a median age of 30 months, corrected for gestational age, 283 (92 percent) of the 308 surviving children were formally assessed. The mean (+/-SD) scores on the Bayley Mental and Psychomotor Developmental Indexes, referenced to a population mean of 100, were 84+/-12 and 87+/-13, respectively. Fifty-three children (19 percent) had severely delayed development (with scores more than 3 SD below the mean), and a further 32 children (11 percent) had scores from 2 SD to 3 SD below the mean. Twenty-eight children (10 percent) had severe neuromotor disability, 7 (2 percent) were blind or perceived light only, and 8 (3 percent) had hearing loss that was uncorrectable or required aids. Overall, 138 children had disability (49 percent; 95 percent confidence interval, 43 to 55 percent), including 64 who met the criteria for severe disability (23 percent; 95 percent confidence interval, 18 to 28 percent). When data from 17 assessments by local pediatricians were included, 155 of the 314 infants discharged (49 percent) had no disability. Severe disability is common among children born as extremely preterm infants.
Ses performances parmi les classes de jeunes de Chelsea ont éveillé l’intérêt des plus grands clubs au monde. Charly Musonda Jr (18 ans) arrive à l’âge de la maturité et aimerait découvrir les joies de jouer avec les grands. La piste numéro 1 se nomme Monaco. Depuis janvier, Monaco rêve de voir Charly Musonda Jr rejoindre ses rangs. Les Monégasques ont tenté le coup cet hiver et sont déjà en train de faire le forcing afin de louer le numéro 10 l’an prochain. Si rien n’est encore fait, les Principautaires sont bel et bien sur la balle et ne comptent pas lâcher le morceau facilement. Chelsea préférerait certainement le voir évoluer en Premier League, mais un club du statut de Monaco est un véritable tremplin. Vu le changement de philosophie du club, mettant désormais les jeunes en avant, Musonda ne peut qu’être rassuré : il pourrait y trouver son compte. Car la seule chose que le jeune joueur recherche est du temps de jeu chez les professionnels. Ses premières sélections avec Chelsea pourraient ne pas tarder. Depuis trois semaines, le jeune médian s’entraîne quotidiennement avec l’équipe fanion du club londonien. Le titre de champion conquis par les Blues le week-end dernier pourrait engendrer un turn over profitable au Belge qui, avec un peu de chance, découvrira la Premier League sous peu.
Still looking for the story "Trials of a Hurt/Comfort Fan" ! Where can it be found ? Guest chapter 1 . 1/7/2013 Love this story, you think there may be a couple chapters or more that could add to this one? Seems to be the makings of a great addition to the already two you have so wonderfully written. The preplanning of the mission, how Richard Gaston came into the picture and the time before, during and up to the point you started this Chapter including when the Warden found out the Chief had been injured. I keep picturing how it all started, but unfortunately I don't have the gift to put my thoughts into words. What you think, do you see any possibilties of it coming to life? Guest chapter 2 . 9/12/2012 Thanks to Arnie for giving you permission and thanks to you for going through with the serious side of such a great story. I've really enjoyed it.
CLANNAD episode 18 Tomoya is such a rebel! Or, how he seems to always call himself, a delinquent. He got himself suspended for taking the blame because of Tomoyo’s fighting. That surprises me because nobody seemed to blame Youhei who is really at fault. If it were not for him choosing to go down that alley where all the gang members were, they wouldn’t have been mad to begin with! But moving on…the competition between almost everyone trying to win over Tomoya is definitely still on. This time they decided to try and win him with food. Difficulties aroused, but Fuko comes to help again and I never expected myself to say this, but she was actually kind of annoying. I have supported Fuko for a long time, but she has reached a point where she feels very repetitive. Also, for someone who everyone supposedly forgotten, they did not seem very surprised that some “random” person is in Tomoya’s house uninvited offering him food. Anyway soon enough Tomoya ends up back in school and the little sports theme they have been following lately continues. This time it is to win votes for Tomoyo. There is also a very big surprise by the end of the episode. I really liked this episode; it was probably my favourite episode form this arc so far. It had lots of funny moments, as per usual, and very sentimental ones as well (as per usual :P) like Tomoyo’s story, which really seemed to affect me for some reason. All the things that led up to the end of this episode made it seem like there will be closure to a lot of things, but I still believe there will be definitely more to it. The next episode revealed something that I didn’t really expect to happen so soon, but I’m happy because of it. It also seems that there will be more mentions about tomoya’s dad and why he hates him so much.
Welcome to the blog for A Self-Storage Depot and Fairview Self-Storage Depot in Western North Carolina. We pride ourselves in being the EXCLUSIVE One-Stop Shop in Hendersonville and Asheville, North Carolina for movers and people in need of extra space. We offer everything a mover needs under one roof: Climate-Controlled and Standard Storage Units, Penske Truck Rentals, and the widest variety of boxes, moving and packing supplies in Western North Carolina! This saves YOU Time and Money! Loading... Monday, November 12, 2012 HAPPY VETERAN'S DAY! To all those who served our country, we at "A Self-Storage Depot" in Hendersonville / Fletcher, NC and "Fairview Self-Storage Depot & Penske" in Asheville / Fairview, NC, would like to wish you: a HAPPY VETERAN's DAY and THANK YOU from the bottom of our hearts for SERVING OUR COUNTRY! 2 comments: Well, a storage unit rental is better than warehousing. If you are an entrepreneur, contractor or small business owner who's looking to getting the self storage facility than there are many self storage websites helps you lot.
Lawsuit alleges wrongful death in police shooting Shares April 5, 2012 8:54AM (UTC) PASADENA, Calif. (AP) — The parents of a college student who was shot and killed by Pasadena police alleged in a federal lawsuit that their son's death was part of a pattern of abuse by the department and that the investigation "reeks" of a cover up. Kenneth McDade and Anya Slaughter alleged in the wrongful death and civil rights lawsuit filed Tuesday that the department tried to cover up its wrongdoing in the shooting death of their 19-year-old son Kendrec McDade on March 24. Advertisement: Police blamed McDade's fatal shooting on Oscar Carrillo's 911 call claiming he had been robbed at gunpoint by two men. Police said the phone call by Oscar Carrillo led officers to believe McDade was armed when they spotted him in an alley and opened fire after they say he made a motion at his waistband. McDade did not have a weapon. Police said Carrillo later admitted to lying about the gun to speed up response, but in an interview with KNBC television on Wednesday, the 26-year-old said he really believed the college student was armed at the time. "I thought they had guns or something or they were going to shoot me," Carrillo told NBC, his face obscured. Police held Carrillo for six days on suspicion of involuntary manslaughter, but prosecutors declined to file those charges. After being shot multiple times in the chest, witnesses said McDade tried to talk to the officers, according to the lawsuit. Officers handcuffed McDade and he began to "twitch," the suit said. The teen died at a hospital. Grief still evident in her red eyes and tired stare, Slaughter told The Associated Press that Pasadena police took "her baby." Advertisement: Slaughter gave birth to her third child at Huntington Memorial Hospital. A week later she returned to the same hospital because her first-born, Kendrec, died there. "I want the world to know that he's not what the Pasadena police has portrayed him to be. He was one of those kids who stayed in school," she said. Kendrec's father, Kenneth McDade, said Slaughter calls her son's cellphone just to hear his voice, and put a pair of shorts he wore just before he died underneath her pillow. "He doesn't get to watch his little brother grow up. The only thing that was kind of a blessing is that he did get a chance to see his little brother, to hold him and enjoy him for one week," he said, tears rolling down his cheeks. Advertisement: The federal lawsuit alleges McDade's death was part of a pattern of abuse and killings of black people in Pasadena at the hands of police, including the shooting death of Leroy Barnes Jr., who was shot 11 times in 2009 by the department's officers.
//******************************************************************* // Copyright (C) 2000 ImageLinks Inc. // // License: See LICENSE.txt file in the top level directory. // // Author: Garrett Potts // //******************************************************************* // $Id: ossimGeoAnnotationSource.h 17932 2010-08-19 20:34:35Z dburken $ #ifndef ossimGeoAnnotationSource_HEADER #define ossimGeoAnnotationSource_HEADER #include <iostream> #include <ossim/imaging/ossimAnnotationSource.h> #include <ossim/imaging/ossimImageGeometry.h> #include <ossim/base/ossimViewInterface.h> class ossimGeoAnnotationObject; class ossimProjection; class OSSIM_DLL ossimGeoAnnotationSource : public ossimAnnotationSource, public ossimViewInterface { public: friend std::ostream& operator <<(std::ostream& out, const ossimGeoAnnotationSource& rhs); ossimGeoAnnotationSource(ossimImageGeometry* geom=NULL, bool ownsProjectionFlag=false); ossimGeoAnnotationSource(ossimImageSource* inputSource, ossimImageGeometry* geom=NULL, bool ownsProjectionFlag=false); /*! * Will add an object to the list. * it will own the object added. If the * object is not geographic */ virtual bool addObject(ossimAnnotationObject* anObject); virtual void computeBoundingRect(); virtual void transformObjects(ossimImageGeometry* geom=0); virtual void setGeometry(ossimImageGeometry* projection); virtual bool setView(ossimObject* baseObject); virtual ossimRefPtr<ossimImageGeometry> getImageGeometry(); virtual ossimObject* getView(); virtual const ossimObject* getView()const; /** * Saves the current state of this object. */ virtual bool saveState(ossimKeywordlist& kwl, const char* prefix=0)const; /** * Method to the load (recreate) the state of an object from a keyword * list. Return true if ok or false on error. */ virtual bool loadState(const ossimKeywordlist& kwl, const char* prefix=0); protected: virtual ~ossimGeoAnnotationSource(); ossimRefPtr<ossimImageGeometry> m_geometry; TYPE_DATA }; #endif
#version 120 uniform float time; varying vec3 v_texCoord3D; void main( void ) { gl_Position = gl_ModelViewProjectionMatrix * gl_Vertex; v_texCoord3D = gl_Vertex.xyz; }
A senior member of Australia’s ruling Coalition has conceded that Australian consumers are ready to leave the grid, and rely instead on solar and storage, and suggested that state-owned assets such as electricity networks need to be sold quickly before they lose too much value. The admission was made on ABC News Radio on Friday morning by Steve Ciobo, a parliamentary secretary in the Tony Abbott government and the Federal Member for Moncrieff, in Queensland, where the state government is looking to privatise its energy assets. The comments are interesting because it is the first time that a senior Abbott government member has acknowledged that rooftop solar and the emergence of battery storage is going to disrupt the market and devalue network assets. It is signifiant because it recognises what is widely accepted within the industry itself – that cleaner and distributed energy is going to grow, and underlines why the Coalition governments in Queensland and NSW are keen to privatise their electricity grid sooner rather than later. “If you look at for example, the poles and wires business, there is no doubt that there is massive change happening,” Ciobo said in the interview. “That’s a market where I have little doubt in the future that you’ll see more and more people drop off the electricity grid, because they’ve got batteries and solar panels. So I think that the sooner we lease assets like that and realise their value, the better, because it’s an asset that just becomes worth less every single day.” Interviewer Marius Benson then asked if the assets held any value, given the likelihood of grid defection. Ciobo said that would be up to the market, but the governments would be wrong to hang on to the assets if they were going to be worth less in the future. Ciobo is the Parliamentary Secretary to the Minister for Foreign Affairs (Julie Bishop), and the Parliamentary Secretary to the Minister for Trade and Investment (Andrew Robb). Australian network operators are becoming increasingly aware of the threat of mass grid defection. A CSIRO study that included the networks suggested nearly half of the country’s energy requirements could be sourced from distributed generation within a few decades, and one third of consumers could quit the grid if networks did not offer an economically competitive service. Numerous analyst reports have spoken about the economic drivers of grid defection – it will be cheaper for consumers to have solar and storage than remain connected to the grid within a few years – and some networks are beginning to re-callibrate their business models.
LBMA Podcast: Pulsate’s Beacon-Based Marketing, Presence Orb Welcome to This Week in Location Based Marketing, a weekly video podcast from the Location Based Marketing Association. Top stories of the week include Facebook & Moves, Storefront, Google’s contact lens camera, Pulsate’s beacon-based marketing platform, Baidu’s mobile wallet launch in China, Bleamcard, Xaxis, the Museum of History of Polish Jews display, Verizon’s Relevant Mobile Advertising platform and Presence Orb. Our feature of the week is Grand St. — a marketplace for creative technology.
Stigmergy Stigmergy is a mechanism of indirect coordination between agents or actions.[1] The principle is that the trace left in the environment by an action stimulates the performance of a next action, by the same or a different agent. In that way, subsequent actions tend to reinforce and build on each other, leading to the spontaneous emergence of coherent, apparently systematic activity. Stigmergy is a form of self-organization. It produces complex, seemingly intelligent structures, without need for any planning, control, or even direct communication between the agents. As such it supports efficient collaboration between extremely simple agents, who lack any memory, intelligence or even individual awareness of each other.[1] Contents The term "stigmergy" was introduced by French biologist Pierre-Paul Grassé in 1959 to refer to termite behavior. He defined it as: "Stimulation of workers by the performance they have achieved." It is derived from the Greek words στίγμαstigma "mark, sign" and ἔργονergon "work, action", and captures the notion that an agent’s actions leave signs in the environment, signs that it and other agents sense and that determine and incite their subsequent actions.[2] Later on, a distinction was made between the stigmergic phenomenon, which is specific to the guidance of additional work, and the more general, non-work specific incitation, for which the term sematectonic communication was coined[3] by E. O. Wilson, from the Greek words σῆμαsema "sign, token", and τέκτωνtecton "craftsman, builder": "There is a need for a more general, somewhat less clumsy expression to denote the evocation of any form of behavior or physiological change by the evidences of work performed by other animals, including the special case of the guidance of additional work." Stigmergy was first observed in social insects. For example, ants exchange information by laying down pheromones (the trace) on their way back to the nest when they have found food. In that way, they collectively develop a complex network of trails, connecting the nest in the most efficient way to the different food sources. When ants come out of the nest searching for food, they are stimulated by the pheromone to follow the trail towards the food source. The network of trails functions as a shared external memory for the ant colony. In computer science, this general method has been applied in a variety of techniques called ant colony optimization, which search for solutions to complex problems by depositing "virtual pheromones" along paths that appear promising. Other eusocial creatures, such as termites, use pheromones to build their complex nests by following a simple decentralizedrule set. Each insect scoops up a 'mudball' or similar material from its environment, invests the ball with pheromones, and deposits it on the ground, initially in a random spot. However, termites are attracted to their nestmates' pheromones and are therefore more likely to drop their own mudballs on top of their neighbors'. The larger the heap of mud becomes, the more attractive it is, and therefore the more mud will be added to it (positive feedback). Over time this leads to the construction of pillars, arches, tunnels and chambers.[5] Stigmergy has even been observed in bacteria, various species of which differentiate into distinct cell types and which participate in group behaviors that are guided by sophisticated temporal and spatial control systems.[6] Spectacular examples of multicellular behavior can be found among the myxobacteria. Myxobacteria travel in swarms containing many cells kept together by intercellular molecular signals. Most myxobacteria are predatory: individuals benefit from aggregation as it allows accumulation of extracellular enzymes which are used to digest prey microorganisms. When nutrients are scarce, myxobacterial cells aggregate into fruiting bodies, within which the swarming cells transform themselves into dormant myxospores with thick cell walls. The fruiting process is thought to benefit myxobacteria by ensuring that cell growth is resumed with a group (swarm) of myxobacteria, rather than isolated cells. Similar life cycles have developed among the cellular slime molds. The best known of the myxobacteria, Myxococcus xanthus and Stigmatella aurantiaca, are studied in various laboratories as prokaryotic models of development.[7] Stigmergy also occurs with social movements, such as the arc from Wikileaks’ cable release in Summer 2010 to the developments in global Occupy movement.[8] The steady rise of Wikipedia and the Open Source software movement has been one of the big surprises of the 21st century, threatening stalwarts such as Microsoft and Britannica, while simultaneously offering insights into the emergence of large-scale peer production and the growth of gift economy.[9]Bitcoin was created, and has evolved, in a stigmergic fashion, and its protocol can be used to apply this organizational structure to everyday life.[10] The Occupy movement itself operates stigmergically, with innovations developed by one node becoming part of the total movement’s common toolkit.[11] Stigmergy Society is government without politicians. Under the influence of stigmergy, new forms of governance would be based on systems, not land mass, and that governance would be generated by user groups, not elected officials. Stigmergy is the most effective way for those user groups to govern systems.[12] Systems are currently primarily run by competitive organizations. Competition creates redundancy, is slow and wastes resources on idea protection, advertisement, and more.[12] The alternative to competition has traditionally been collaboration. This is most effective only in groups of two to eight people.[12] With stigmergy, an initial idea is freely given, and the project is driven by the idea, not by a personality or group of personalities. No individual needs permission (competitive) or consensus (collaborative) to propose an idea or initiate a project.[13][14][15] For example, David Graeber's study of Betafo, a rural community in Madagascar, inspired him to launch a revolutionary Occupy Movement worldwide.[16][17][18] Betafo is a stigmergy Society made up of the descendants of nobles and their slaves. Because of spending cuts mandated by the International Monetary Fund, the Malagasy central government had abandoned the area, leaving the inhabitants to fend for themselves. They did, creating an egalitarian society where 10,000 people made decisions by stigmergic consensus. When necessary, criminal justice was carried out by a mob, but even there a particular sort of consensus pertained: a lynching required permission from the accused’s parents. Stigmergy is not restricted to eusocial creatures, or even to physical systems. On the Internet there are many collective projects where users interact only by modifying local parts of their shared virtual environment. Wikipedia is an example of this.[19] The massive structure of information available in a wiki,[20] or an open source software project such as the FreeBSD kernel[20] could be compared to a termite nest; one initial user leaves a seed of an idea (a mudball) which attracts other users who then build upon and modify this initial concept, eventually constructing an elaborate structure of connected thoughts.[21][22] The term is also employed in experimental research in robotics,[23] multi-agent systems and communication in computer networks. In these fields there exist two types of stigmergy: active and passive. The first kind occurs when a robotic or otherwise "intelligent" "agent" alters its environment so as to affect the sensory input of another agent. The second occurs when an agent's action alters its environment such that the environmental changes made by a different agent are also modified. A typical example of active stigmergy is leaving behind artifacts for others to pick up or follow. An example of passive stigmergy is when one agent tries to remove all artifacts from a container, while another agent tries to fill the container completely.[citation needed] In addition the concept of stigmergy has also been used to describe how cooperative work such as building design may be integrated. Designing a large contemporary building involves a large and diverse network of actors (e.g. architects, building engineers, static engineers, building services engineers). Their distributed activities may be partly integrated through practices of stigmergy.[24][25] ^Heather Marsh on Sat, 12/24/2011 A proposal for governance in the post 2011 world "Optimism is a political act. In fact, these days, cynicism is obedience." - Alex Steffen http://wlcentral.org/node/2389 ^Ranjbar-Sahraei, B., Weiss G., and Nakisaee, A. (2012). A Multi-Robot Coverage Approach based on Stigmergic Communication. In Proc. of the 10th German Conference on Multiagent System Technologies, Vol. 7598, pp. 126-138. ^Christensen, L. R. (2007). Practices of stigmergy in architectural work. In Proceedings of the 2007 international ACM Conference on Conference on Supporting Group Work (Sanibel Island, Florida, USA, November 04–07, 2007). GROUP 2007. ACM, New York, NY, 11-20.
As semiconductor technology continues to inch closer to practical limitations in terms of increases in clock speed, architects are increasingly focusing on parallelism in processor architectures to obtain performance improvements. At the integrated circuit device, or chip level, multiple processing cores are often disposed on the same chip, functioning in much the same manner as separate processor chips, or to some extent, as completely separate computers. In addition, even within cores, parallelism is employed through the use of multiple execution units that are specialized to handle certain types of operations. Pipelining is also employed in many instances so that certain operations that may take multiple clock cycles to perform are broken up into stages, enabling other operations to be started prior to completion of earlier operations. Multithreading is also employed to enable multiple instruction streams to be processed in parallel, enabling more overall work to performed in any given clock cycle. The net result of applying the aforementioned techniques is an ability to provide multithreaded processing environment with a pool of hardware threads distributed among one or more processing cores in one or more processor chips and in one or more computers, and capable of processing a plurality of instruction streams in parallel. It is expected that as technology increases, processor architectures will be able to support hundreds or thousands of hardware threads, and when multiple processors are combined into high performance computing systems such as supercomputers and massively parallel computers, a potential exists to support millions of hardware threads. However, effective parallel processing requires that the software applications that run in a multithreaded processing environment take suitable advantage of multithreading capabilities. Software developers are typically more comfortable with developing single threaded applications since they typically follow the sequences of steps needed to perform desired tasks. Support for multithreading is often not as intuitive, and often requires consideration for minimizing conflicts and dependencies to minimize the frequency that threads may spend waiting for other threads to complete work that they need before they can complete their own work. For example, if one thread needs to calculate an average of some set of values that are being calculated by other threads, that thread will not be able to perform its operation until all of the other threads calculate their respective values. Threads that perform completely independent tasks, on the other hand, typically do not suffer from dependency concerns, so much of the effort associated with developing for multithreaded applications is devoted to breaking tasks up into relatively independent threads so that inter-thread dependencies are minimized. Given the difficulties associated with developing multithreaded applications, a significant need has existed in the art for techniques for simplifying the development of multithreaded applications. For example, significant efforts have been made to programmatically convert single threaded application code into multithreaded application code during compilation, e.g., using an optimizing compiler. With one methodology, for example, fine grained parallelism is employed to convert in-order code in an instruction stream into multiple, small out-of-order code segments, and instructions are inserted into the instruction streams to pass data between the code segments in the form of variables. One type of instruction is a “put” instruction, which sends a variable to another thread, and another type of instruction is a “get” instruction, which retrieves a variable from another thread. Through the use of these instructions, synchronization between code segments executing on multiple threads can be maintained by stalling a code segment that has issued a get statement for a particular variable until another code segment has issued a corresponding put instruction for that variable. While the use of put and get instructions can effectively maintain synchronization between dependent code segments executing on different hardware threads, any time that a thread is stalled waiting for a variable from another thread represents lost productivity, so it is desirable to minimize the latency associated with communicating variables between threads. Therefore, a significant need exists in the art for a manner of efficiently communicating data between multiple threads in a multithreaded processing environment to minimize latencies for inter-thread dependencies.
Q: AWS S3 Sync very slow when copying to large directories When syncing data to an empty directory in S3 using AWS-CLI, it's almost instant. However, when syncing to a large directory (several million folders), it takes a very long time before even starting to upload / sync the files. Is there an alternative method? It looks like it's trying to take account of all files in an S3 directory before syncing - I don't need that, and uploading the data without checking beforehand would be fine. A: The sync command will need to enumerate all of the files in the bucket to determine whether a local file already exists in the bucket and if it is the same as the local file. The more documents you have in the bucket, the longer it's going to take. If you don't need this sync behavior just use a recursive copy command like: aws s3 cp --recursive . s3://mybucket/ and this should copy all of the local files in the current directory to the bucket in S3.
Q: Check whether an HTTP Request is from an android mobile or not using servlet/jsp I would like to ask how can I ensure if an HttpRequest is from an android mobile without passing variable, using java servlet? Thanks for the help. A: You can check the User-Agent header. Here's a list. I guess you can check whether it contains "Android" or not. if (request.getHeader("User-Agent").toLowerCase().contains("android")) { .. }
# # Makefile for the HISILICON network device drivers. # ccflags-y := -Idrivers/net/ethernet/hisilicon/hns3 obj-$(CONFIG_HNS3_HCLGE) += hclge.o hclge-objs = hclge_main.o hclge_cmd.o hclge_mdio.o hclge_tm.o obj-$(CONFIG_HNS3_ENET) += hns3.o hns3-objs = hns3_enet.o hns3_ethtool.o
Blackburn Tavern Blackburn Tavern Overview Website: N/A Locations: Gloucester, MA Employees: 10 Founded: N/A President: Bob Vallis Industry: Drinking Places Revenue: $408,000 A drinking places company, Blackburn Tavern is located at Gloucester, MA. It has an annual revenue of $408,000 and employs ten people. The niche appeal of Blackburn Tavern has made it quite noticeable within the boutique market. The firm's success rests upon President Bob Vallis.
Q: MySQL query help with grouping and adding I have a table called user_logins which tracks user logins into the system. It has three columns, login_id, user_id, and login_time login_id(INT) | user_id(INT) | login_time(TIMESTAMP) ------------------------------------------------------ 1 | 4 | 2010-8-14 08:54:36 1 | 9 | 2010-8-16 08:56:36 1 | 9 | 2010-8-16 08:59:19 1 | 3 | 2010-8-16 09:00:24 1 | 1 | 2010-8-16 09:01:24 I am looking to write a query that will determine the number of unique logins for each day if that day has a login and only for the past 30 days from the current date. So for the output should look like this logins(INT) | login_date(DATE) --------------------------- 1 | 2010-8-14 3 | 2010-8-16 in the result table 2010-8-16 only has 3 because the user_id 9 logged in twice that day and him logging into the system only counts as 1 login for that day. I am only looking for unique logins for a particular day. Remember I only want the past 30 days so its like a snapshot of the last month of user logins for a system. I have attempted to create the query with little success what I have so far is this, SELECT DATE(login_time) as login_date, COUNT(login_time) as logins FROM user_logins WHERE login_time > (SELECT DATE(SUBDATE(NOW())-1)) FROM DUAL) AND login_time < LAST_DAY(NOW()) GROUP BY FLOOR(login_time/86400) I know this is wrong and this returns all logins only starting from the beginning of the current month and doesn't group them correctly. Some direction on how to do this would be greatly appreciated. Thank you A: You need to use COUNT(DISTINCT ...): SELECT DATE(login_time) AS login_date, COUNT(DISTINCT login_id) AS logins FROM user_logins WHERE login_time > NOW() - interval 30 day GROUP BY DATE(login_time) I was a little unsure what you wanted for your WHERE clause because your question seems to contradict itself. You may need to modify the WHERE clause depending on what you want.
PROJECT SUMMARY/ABSTRACT The Jackson Laboratory (JAX) proposes to renew the existing summer research experience in neurobiology and continue to support a focused neurobiology cohort within the existing JAX Summer Student Program, an internationally recognized research education program for undergraduates and high school students. Under the proposed renewal, six undergraduate students will conduct neurobiology research in the labs of 11 NIH- funded neuroscientists who lead cutting-edge, collaborative research programs in Alzheimer's disease, peripheral neuropathies, motor neuron degeneration, synaptic development, retinal disease and glaucoma, addiction, Rett syndrome, and sensory disorders. The 10-week residential internship will provide each participant a summer salary and funds to support student research supplies and travel to national meetings to present findings. The proposed program will offer an intense research internship in neurobiology with a focus on the laboratory mouse as an investigative tool to probe the basic mechanisms of human biology and disease. As a member of the mentor's laboratory team, each student will design and conduct an independent, hypothesis-driven project using advanced analysis methods and tools and the outstanding genetic resources available at JAX. The defined research education curriculum will include asynchronous online learning modules, bioinformatics bootcamps, workshops on the ethical conduct of research within historical and modern scientific contexts, and science communication. JAX institutional commitment includes student access to intellectual and research resources such as on-campus courses and conferences, state-of-the-art instrumentation and bioinformatics databases, dedicated program direction by JAX Genomic Education, and a staffed on-campus residential program. The neurobiology cohort will join the Summer Student Program, which is supported by institutional funds, private foundations, and federal grants, and has well-established administrative procedures for recruitment and selection, mentor training and support, and program design, management, and evaluation. The program will identify participants through a national recruitment and competitive application process. JAX will recruit students underrepresented in biomedicine through targeted outreach and partnerships. JAX offers a stimulating environment in which motivated, talented students from diverse backgrounds can learn the fundamentals of scientific inquiry, contribute to real research progress, and make great strides in intellectual and personal growth that will guide them toward a career in research.
Import the model into ModelEditor and use the shape tool to make a box around the mesh. Then click the purple shape and click "Create Body". It will turn green here. Click the shape again and change its mass to about 20 (since it is a box). This gives it physics. Then go to the tab on the right that says "Attachments", pick the "Submesh" button, "Attach", and pick the box mesh. Click Done and now it is a basic entity. NOTE: If you click the configuration button on the bottom (looks like cog wheels), you can play around with the model. NOW go back to the editing windows and pick "User Defined Variables" and change "StaticProp" To "Object" and Type to "Grab". Save the .ent and you should be able to pick it up now. (04-02-2012 09:16 PM)Statyk Wrote: Import the model into ModelEditor and use the shape tool to make a box around the mesh. Then click the purple shape and click "Create Body". It will turn green here. Click the shape again and change its mass to about 20 (since it is a box). This gives it physics. Then go to the tab on the right that says "Attachments", pick the "Submesh" button, "Attach", and pick the box mesh. Click Done and now it is a basic entity. NOTE: If you click the configuration button on the bottom (looks like cog wheels), you can play around with the model. NOW go back to the editing windows and pick "User Defined Variables" and change "StaticProp" To "Object" and Type to "Grab". Save the .ent and you should be able to pick it up now.
Q: Possibly the worst weed ever? A bad type of thistle? Do you know what kind of weed this is, and how to eradicate it? It's not possible to pull it out from the root, and they are sharp and thorny. They grow quickly and spread rapidly. I've avoided spraying herbicides since I don't want to impact the soil and future plantings; but I also haven't planted anything new because I'm scared it will be a waste if it's just taken over by these weeds. I live in DC suburbs in Maryland. Would it be OK to just spray Roundup on the entire bed, let them wither and die, and then start from scratch? I've heard varying information on how Roundup affects the soil. A: They're no worse than any thistle -if you let one flower and set seed, that seed gets distributed all over the place and germinates easily, which is why you have so many. If you want to use a weedkiller, at least just buy glyphosate concentrate rather than Round Up - glyphosate on its own is bad enough, but Round Up is much worse because of the other additives it has. If you do use glyphosate, when you mix it up, add a squirt of washing up liquid to the mix - this acts as a surfactant, and water on with a can, rather than spraying (less risk of contamination to you and the surrounding area). Otherwise, if your soil isn't too heavy to dig, use a garden fork and lever them up by the roots. A: Looks like thistles yes. I wouldn't use round-up, that stuff is not good for the environment and not good for your health (it is so close to your home). Why not old fashion removal with your hands? Buy some good gloves to protect from the sting. Or buy a hoe, and do some dutch hoeing. My father always used a push or thrust hoe for his garden (of course he was a Dutchman...).
MTT: Easy Lamb Koftas With Tzatziki June 10, 2011 Greece and Greek food (like these Easy Lamb Koftas!) is very special to our little family. The in-laws lived on the beautiful island of Meganissi for a long time and my father-in-law is buried there so we will continue to return for holidays as often as possible. It’s the least touristy place I’ve ever visited in Greece; the Onassis family own the next-door island and the summer season attracts wealthy Greeks and Italians rather than lager-lout Brits. Don’t tell anyone – I like to think it’s our secret. One of the best things about Meganissi is the food. Stifados – fried aubergine – fish – salads – tzatziki. I always come home about 2 stone heavier with a renewed enthusiasm for feta, olives and Greek yoghurt. Lovely Lamb Koftas As I’m still trying to lose the last couple of pounds of baby weight I try not to indulge too much but I recently made the discovery that 0% fat Greek yoghurt pretty much tastes the same as the fattening stuff. So now it’s going on everything; breakfast, posh prawn cocktail, pudding, and my personal favourite: tzatziki. These lamb koftas are super easy to make, healthy and really delicious. Plus, when cooked, they look a little bit like poo. Always good. Mix together the mince, herbs, spices, onion and seasoning in a large mixing bowl. I like to use a fork or a knife to break up the meat, but then I get in there with my hands to smoosh it all together. Yum. Use your hands to make small sausages, about half the size of regular sausages. Put to one side. In a smaller bowl mix together the remaining mint, cucumber, seasoning and yoghurt. Slice the red onion and put to one side. Heat half a tbsp in a pan on a medium heat and cook the lamb sausages until browned all over, about 5 minutes on each side. Make up the wraps with the sausages, yoghurt mixture and sliced red onion. Lettuce optional. Thanks for this – I love lamb koftes but I have never tried making them myself. I’ll be going to Greece in August for the first time ever. Can you believe this?? We’ll be going to Paros in August. Hot, hot, hot! Last check Ibiza was at 26 which is pretty perfect for us (Will can’t handle the heat) and we usually go to Greece in late June so the precious little poppet doesn’t get sunstroke. It’ll be scorching in August, how wonderful!
Most people have strong opinions about Michelle and Jim Bob Duggar and their brood of 19 children. While some commend them for putting their family first and having as many children as God feels fit, many others feel they are being irresponsible to have so many children and to potentially put Michelle’s health in jeopardy with more pregnancies at an advanced age. Whatever your personal opinion is, there is no denying that many Americans could learn to manage their money as effectively as the Duggars. Here are some of their money management strategies that have allowed to live debt free despite raising 19 children. 1. Buy used and save the difference. If you watch their show, 19 Kids and Counting, you will see the Duggars recite their mantra, “Buy used and save the difference” over and over. They buy almost everything used–clothing, cars, RVs, baby equipment, beds, the list goes on and on. 2. Barter. In addition to buying used, the Duggars aren’t afraid to barter and ask for a lower cost. They barter successfully quite often. Of course, it helps when you pay cash and have all of the money to pay upfront. 3. Pay cash. The Duggars pay cash for their expenses. While they might be able to play the credit card reward system and accrue points to get free services and items, they instead choose to pay with cash and avoid credit cards completely. 4. Avoid debt. The Duggars don’t just avoid credit card debt, they avoid all types of debt. Their sprawling home, which features a 2,000 square foot great room including living room, dining room and kitchen, was paid for upfront. They do not owe anything on the house; it is paid in full. Not many Americans can say that, let alone those with the expense of 19 children. 5. Do it yourself. One of the ways the Duggars were able to pay cash for their home was to learn how to do much of the building themselves. They did hire people to help, but then they worked beside those they hired to learn to do much of the work themselves. Do it yourself can save some big bucks! 6. Help others. The Duggars were routinely shown going to help a fellow large family, the Bates, to renovate their house to accommodate their own growing family. The Duggars are always volunteering to help their friends, and in return, their friends gladly help them. This cooperative agreement helps them get things done without hiring others to assist them. 7. Be willing to delay gratification. Before the Duggars built their home, they were in a cramped, small house. While they wanted nothing more than to move into their new, spacious home, they had to be willing to delay gratification so that it would be paid in full when they moved in. The house took several years to complete. 8. Be willing to tell your children no. In their book, Michelle recounts the early days of their marriage when they had very little money coming in. One of their older daughters wanted a pink blanket, but they could not afford to buy her one because it wasn’t in the budget. How many of us routinely tell our children no for such a small expenditures? Because they have the ability to live within their budget and tell their children no, they are able to remain debt free. Of course, many will argue that the Duggars are able to be debt free because they have a television show and book deals. I am not disputing that those deals probably do bring them a substantial amount of money and a more comfortable lifestyle. However, how many athletes or other celebrities do we routinely see who blow through millions in just a few years? The Duggars are being responsible stewards of their money. In addition, they were already living this way long before the television deal came along. What other financial lessons do you learn from the Duggars or another famous family?
Budding food analysis website ClearFood.com claims that your hot dog may contain human DNA, and that not all veggie dogs are meat free. Menlo Park, California-based Clear Food analyzes food on the “molecular level” and claims that testing in its first official report reveals that 2 per cent of samples tested showed evidence of human DNA. 345 hot dogs and sausages were analyzed in the report. Of those, 14.4 per cent were said to be “problematic.” The new food researcher is listed in a kickstarter campaign that counted 207 backers, $74,413 dollars in donation pledges and 25 days left to meet its $100k goal as of Monday afternoon. The kickstarter campaign denotes the hot dog report as the group’s first, calling the product the “ultimate mystery meat.” A few brands were singled out in study results as superior, according to Fox 25 Boston. Those brands noted were Butterball, McCormick, Eckrich, Hebrew National, Gardein, and a special mention for Oscar Mayer’s Premium Jumbo Beef Franks. Three “top retailers” were singled out as well: Target, Walmart and Safeway. Vegetarians were warned that study results showed 4 of the 21 vegetarian samples had “hygienic issues” and 10 per cent contained meat. Those found containing meat included “chicken in a vegetarian breakfast sausage and pork in a vegetarian hot dog.” Additionally, two-thirds of the human DNA discoveries were uncovered in the vegetarian products. The study also noted pork as a substitute for other meats. “We found pork substitution in 3% of the samples. In most cases pork was substituted for chicken or turkey. We found that this issue occured in products of all price ranges.” If abstaining from pork is important, Clear Food recommends a kosher brand, such as Hebrew National. Follow Michelle Moons on Twitter @MichelleDiana
Invos Cerebral Oximeter compared with the transcranial Doppler for monitoring adequacy of cerebral perfusion in patients undergoing carotid endarterectomy. The aim of this prospective study was to assess the correlation between signals obtained during carotid endarterectomy (CEA) under local (LA) or general anesthesia from the Somanetics Invos cerebral oximeter (CO) and transcranial Doppler (TCD). Forty patients were enrolled in the study. The percentages fall in TCD mean flow velocity (FVm) and CO regional oxygen saturation (rSO2) on the ipsilateral side following clamping were recorded and the correlation coefficient and Spearman's coefficient of rank correlation were calculated. Fourteen patients were not included in the statistical analysis because either no TCD window or reliable TCD signal was obtained. The remaining 26 patients had a fall in either FVm, rSO2 or both during carotid clamping. There was a highly statistically significant correlation between the percentage fall in FVm and rSO2 with a correlation coefficient of 0.73, P<0.0001, with a 95% confidence interval (CI) for r=0.48 to 0.87; Spearman's coefficient of rank correlation (rho) =0.67, P=0.0008, with a 95% CI for rho=0.384 to 0.84. A significant decline in both TCD and rSO2 was noted in 3 patients under LA out of which 2 required shunts for alteration in conscious level. In 2 LA patients there was a significant decline in TCD but not in rSO2 and the endarterectomy was completed without a shunt. Regional oxygen saturation correlates well with FVm during carotid clamping. However, the inability to obtain reliable TCD FVm readings in 35% of patients is a serious disadvantage for this monitor. It appears that CO is a satisfactory and possibly superior device for monitoring adequacy of cerebral perfusion and oxygenation during CEA in comparison with the TCD.
ZODB Documentation Tuesday, November 29, 2011 A new version of ZODB has been released, 3.10.5. You can find more information at python package index, http://pypi.python.org/pypi/ZODB3/3.10.5 also while lurking on the zodb-dev mailing list; it appears that ZODB 3.11 has been getting some work. It is possible Q1 2012 a new release emerges. Still looking for people who are interested in contributing to the ZODB documentation. Saturday, April 2, 2011 ZODB.org is having problems with git integration. We are temporarily moving to http://readthedocs.org to have documents built on commit. Please give us feedback! This is the first comprehensive documentation on the transaction package. ACID (atomicity, consistency, isolation, durability) is a very convienent feature of ZODB. Along with transactions it makes programming ZODB an enjoyable experience for the Python programmer. All persistent ZODB operations are controlled by commit/abort using the transaction package. Carlos describes integration points including datamanagers, synchronizers, and commithooks -- all integration points to wire custom code into participating with transactions. One such integration is zope.sqlalchemy which provides coordination of transactions between ZODB and SQLAlchemy data sources. This chapter is longer than all three of the preceding chapters. It is the first comprehensive documentation on the transaction package. And it's the first chapter to use our favorite web framework Pyramid to demonstrate usage in a web context. Remember the transaction package does not depend on the ZODB. Spread the word. Monday, November 1, 2010 Carlos has been busy polishing up for release the 3rd chapter. As I understand this is the last of the introduction to ZODB. Now the next chapters are more detailed about theory and implementation of ZODB. Explanation of MVCC, transactions, etc. You can see the latest sphinx documentation at http://www.zodb.org/zodbbook/. Thanks to Carlos and Jens for making the ZODB book building daily on zodb.org and enabling disqus on the pages. The bar for participating is very low -- please participate. Add a comment. Even if you like it. We need to hear more peoples thoughts. The draft for chapter three of the ZODB book is now in the github repository. There is now enough material that we felt ready to put it up somewhere for easy reading and possibly a bit of discussion. Jens Vagelpohl helped me get it up on the zodb.org web site and I added Disqus comments to the text. We'd very much appreciate any feedback on the work so far. Tuesday, September 21, 2010 August saw no advance on the book due to vacation time and the mad overwork period that usually follows. However, the draft for chapter two is now available on github, for those who'd like to review it. A word of warning, though. People with experience on the ZODB will most likely find the material and tone are way too entry-level to be useful for them. That is because the audience that we will try to reach with part one of the book are Python developers in general. We assume no knowledge of the ZODB, not even of its existence. If you look at the book outline, you'll see that the book is divided in three parts. The first part is this beginners guide, while the second part will contain much more detailed and advanced information. So, what I'm saying is, please be patient. I'll try to get going something from the second part for the next update. Wednesday, August 4, 2010 A draft of the first chapter of the ZODB book has been committed to our GitHub repository. It's just the introductory chapter, so it might not seem like much. However, the introduction is very important when starting a technical book, since it sets the tone and helps define the audience more clearly. If you can spend a few minutes to read it and comment, that would be very helpful. By the way, there is now a portlet at the top right of the blog that shows the latest commits to the repository. This may make it easier to keep track of the book's progress.
Title Authors Document Type Article Publication Version Published Version Publication Date 1992 Journal or Book Title Transactions of the ASAE Volume 35 Issue 6 First Page 1859 Last Page 1867 Abstract Fines (material smaller than whole corn kernels) are troublesome and continually increase as corn lots move from harvest to utilization. This article reviews characteristics of fines in corn, including constituents, size distribution, nutritive and economic values, density, and airflow resistance, and presents analysis of them. These characteristics are related to corn grading, handling, and processing issues. Comments This article is from Transactions of the ASAE 35 (1992): 1859–1867. Posted with permission.
DiCaprio is at the top of his game, with everyone buzzing about Inception. He has a seat at any Martin Scorsese table read and has solidly moved from teen heartthrob to serious leading man. If anyone could actually save a Mel Gibson project, it would be him. So good for Leo for putting ethical concerns before a buck, if the reports are indeed true. I would hope most actors would shy away from working with Mel Gibson after his misogynistic, racist, and violent rants were made public. There's no denying he's a sick man with little value for women, minorities, or even the safety of his own baby. The real news will be if Mel gets another project -- who will line up to work with him?
Q: PlaceAutocompleteFragment - null cannot be cast to non-null type (Kotlin) I'm trying to add a Place Autocomplete Fragment into my fragment by following the official documentation here I get the error kotlin.TypeCastException: null cannot be cast to non-null type com.google.android.gms.location.places.ui.PlaceAutocompleteFragment I get that PlaceAutocompleteFragment can't be set to null, so i've tried added an if statement in my getAutoCompleteSearchResults() to check if fragmentManager != null, but no luck still AddLocationFragment.kt override fun onCreate(savedInstanceState: Bundle?) { super.onCreate(savedInstanceState) getAutoCompleteSearchResults() } private fun getAutoCompleteSearchResults() { val autocompleteFragment = fragmentManager?.findFragmentById(R.id.place_autocomplete_fragment2) as PlaceAutocompleteFragment autocompleteFragment.setOnPlaceSelectedListener(object : PlaceSelectionListener { override fun onPlaceSelected(place: Place) { // TODO: Get info about the selected place. Log.i(AddLocationFragment.TAG, "Place: " + place.name) } override fun onError(status: Status) { Log.i(AddLocationFragment.TAG, "An error occurred: $status") } }) } } XML for the fragment: <?xml version="1.0" encoding="utf-8"?> <android.support.constraint.ConstraintLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:background="@android:color/darker_gray" tools:context=".AddLocationFragment" tools:layout_editor_absoluteY="81dp"> <fragment android:id="@+id/place_autocomplete_fragment2" android:layout_width="0dp" android:layout_height="wrap_content" android:name="com.google.android.gms.location.places.ui.PlaceAutocompleteFragment" android:theme="@style/AppTheme" app:layout_constraintStart_toStartOf="parent" app:layout_constraintTop_toBottomOf="@+id/etAddress" app:layout_constraintEnd_toEndOf="parent"/> </android.support.constraint.ConstraintLayout> A: i figured it out. Since i'm trying to find a fragment within a fragment, i have to do the following: val autocompleteFragment = activity!!.fragmentManager.findFragmentById(R.id.place_autocomplete_fragment2) as PlaceAutocompleteFragment We need to get the parent activity
# Created by: Johannes M Dieterich <[email protected]> # $FreeBSD$ PORTNAME= flang-clang DISTVERSION= 7.0-g20191020 CATEGORIES= devel lang MAINTAINER= [email protected] COMMENT= Fortran compiler targeting LLVM (modified clang part) LICENSE= LLVM LICENSE_NAME= LLVM Release License LICENSE_FILE= ${WRKSRC}/LICENSE.TXT LICENSE_PERMS= dist-mirror dist-sell pkg-mirror pkg-sell auto-accept ONLY_FOR_ARCHS= amd64 LLVM_VER= 70 BUILD_DEPENDS= llvm${LLVM_VER}>=0:devel/llvm${LLVM_VER} RUN_DEPENDS= llvm${LLVM_VER}>=0:devel/llvm${LLVM_VER} USES= cmake gnome libedit perl5 python shebangfix tar:xz USE_LDCONFIG= ${PREFIX}/flang/lib USE_GNOME= libxml2 SHEBANG_FILES= tools/scan-view/bin/scan-view \ tools/clang-format/git-clang-format \ tools/clang-format/clang-format-diff.py \ utils/hmaptool/hmaptool USE_GITHUB= yes GH_ACCOUNT= flang-compiler GH_PROJECT= flang-driver GH_TAGNAME= 984936a CMAKE_ARGS+= -DLLVM_CONFIG=${LOCALBASE}/bin/llvm-config${LLVM_VER} \ -DLLVM_DIR=${LOCALBASE}/llvm${LLVM_VER}/lib/cmake/llvm CMAKE_INSTALL_PREFIX= ${PREFIX}/flang CC= ${LOCALBASE}/llvm${LLVM_VER}/bin/clang CXX= ${LOCALBASE}/llvm${LLVM_VER}/bin/clang++ post-patch: @${REINPLACE_CMD} -e 's|%%LOCALBASE%%|${LOCALBASE}|' ${WRKSRC}/lib/Driver/ToolChains/FreeBSD.cpp post-install: @${GZIP_CMD} ${STAGEDIR}/${PREFIX}/flang/man/man1/scan-build.1 ${RLN} ${STAGEDIR}${PREFIX}/flang/bin/flang ${STAGEDIR}${PREFIX}/bin/flang .include <bsd.port.mk>
Balthasar H. Meyer Balthasar Henry Meyer (May 28, 1866 – February 9, 1954) was an American government official and professor of economics and sociology. He served for 28 years as a member of the Interstate Commerce Commission. Early life Meyer was born near Mequon, Wisconsin, the son of Henry and Louise (Wiepking) Meyer. He attended Oshkosh State Normal School, receiving his bachelor's degree, and then took two degrees, including his doctorate in 1897, from the University of Wisconsin, after doing graduate work at the University of Berlin in 1894–95. He taught school from 1884 to 1886. He was principal of the Fredonia, Wisconsin, schools from 1887 to 1889. He was principal of the high school at Port Washington, Wisconsin, from 1889 to 1892. After receiving his degrees, he stayed on in Madison to be a sociology instructor. He was promoted to assistant professor in 1899, and to full professor of political economy in 1900. While there, he taught what is believed to be the first course in insurance in the United States. He married Alice Elizabeth Carlton of Wauwatosa, Wisconsin, on August 29, 1901. Government official In 1905, he took leave from his professorship to become a member of the Wisconsin Railroad Commission, and then, in 1907, became its chairman. In 1910, President William Howard Taft appointed him to the U.S. Railroad Security Commission. In 1910, Taft appointed him to the Interstate Commerce Commission. Confirmed by the Senate on December 21, 1910, he took the oath of office on December 31, 1910. Meyer was thereafter appointed to successive terms by Presidents Wilson, Coolidge, Hoover, and Franklin Roosevelt. Following his 1939 retirement, he served as a consultant and mediator for the transportation industry. Meyer also gave attention to improving the ICC's internal capabilities. Meyer and his ally, fellow Commissioner Franklin K. Lane, supported increasing the Commission's ability to compute marginal rates, and the Commission engaged noted economist Max O. Lorenz (inventor of the Lorenz curve) for this task. In 1937, Meyer was attacked by Senator Harry S. Truman for allegedly giving a railroad attorney information about a 1932 Commission decision before it was publicly released. Meyer explained that while he had no recollection of the specific case, it was routine in uncontested cases such as this to give information to the applicant without waiting for a formal decision. While Meyer's fourth and final term expired in 1938, he continued to serve until the following year pending Senate confirmation of a replacement. President Franklin D. Roosevelt appointed Representative Thomas R. Amlie. The Amlie nomination proved contentious and was withdrawn, and Meyer, wishing to retire, resigned on May 1, 1939. Meyers wrote several books about the transportation industry, including Railroad Legislation in the United States (1903) and History of Transportation in the United States before 1860 (1917). He was a member of the American Economic Association, the American Academy of Political and Social Science, the Wisconsin Academy of Letters Arts and Sciences, the Wisconsin Educational Round Table, the Wisconsin Teachers' Association, the Press Club of the University of Wisconsin, and the Wisconsin Historical Society. Writings and publications Notes External links Category:1866 births Category:1954 deaths Category:People from Mequon, Wisconsin Category:University of Wisconsin–Oshkosh alumni Category:University of Wisconsin–Madison alumni Category:University of Wisconsin–Madison faculty Category:People of the Interstate Commerce Commission Category:Writers from Wisconsin
Few if any other cable news analyst, commentator, or host has this issue with maintaining a level of decorum on set or respect for their fellow guests the way that CNN’s Angela Rye does. On Wednesday night, Rye’s disdain for respectful discourse surfaced on Erin Burnett OutFront as she insisted that “America has never been great” and not only rolled her eyes but turned away from the camera at the notion of Trump campaign board member Gina Loudon have an adopted minority son with Down Syndrome. Rye first was incensed by Loudon’s points about the lack of diversity within the Trump White House and that while she wants to see more diversity there, it’s been difficult for anyone to express even tepid support for the President without being ostracized. Nonetheless, Loudon argued that presidents not having a minority-laden stuff didn’t exactly guarantee success/failure as the real focus should be on the positive policies coming as a result of the Trump presidency. Given a chance to respond, Rye lashed out (click “expand” for more): RYE: I think I got stuck at Gina saying that American presidents have done a great deal for people of color like ending slavery? Like I think I'm stuck in 1865 right now. Like I can't believe that's the justification. LOUDON: That was a Republican president. RYE: You know what, sis? And that's great, but you just really missed the mark. For you to have to say, right, that we don't necessarily need diversity in this White House. LOUDON: That's not what I said. That is not what I said. RYE: Let me just tell you what I heard because I don't think you hardly understand. LOUDON: No because I want to address my words, Angela. RYE: White — because Gina, what you're not going to keep doing is talking over me because my black life matters and so does my voice. So, what you’re going to do right now is listen to what I'm saying to you. What you said was deeply offensive and what I am telling you is you can't say, at least you shouldn't feel comfortable saying it in 2018 that, you know, this White House not having diversity can be akin to presidents who didn't have any black people on their staff....but for slavery, freeing slaves. Like that's not okay in 2018....Ma’am, I let you talk through all of that nonsense. I just need you to let me finish my point[.] Rye insisted that Loudon should kill “those talking points tonight” because “they should never be resurrected” and that she shouldn’t dare cite HUD Secretary Ben Carson as a black member of the administration. Loudon told Rye that “I understand your feelings on this” and Rye said “no, you don’t” on race, so Loudon revealed this as Rye rolled her eyes, sighed, and turned her head away from the camera (click “expand” to see more) LOUDON: I have — I have an adopted minority son, yes, I do, who happens to have Down's Syndrome and he experiences bigotry every single day in a myriad of ways, not just skin color, but also because of his disability and I understand that you and I don't agree, but I would not support a president I believed would be a threat to his future. So, what I would like to have — RYE: Well, you are. LOUDON: — is a constructive conversation and I think, you know, I think points like yours that are — that are focusing only on the negative and not even acknowledging 700,000 new jobs for black people in this country, record low unemployment[.] Okay, so to recap, Rye basically mocked her guest for having a minority son with Down Syndrome and suggested that Loudon is a danger to her own child’s future. How tasteless. It got worse as Loudon brought up New York Democratic Governor Andrew Cuomo’s insistence that America was never great and Rye agreed as she shouted over Loudon And America has never been great. It is not great because people like you come on and lie for the president of the United States and then — and then — and then tout, bring out your son as an example? You should be completely ashamed of yourself. All the while, Burnett did nothing to interject or call out Rye’s immature antics. This is CNN. (h/t: our friend Amber Athey with the Daily Caller) To see the relevant transcript from CNN’s Erin Burnett OutFront on August 15, click “expand.”
McClain was attempting to cross Route 14 from north to south near D’Andrea Banquet’s on his bicycle when he struck an eastbound vehicle, a news release stated. He was not wearing a helmet. He died from severe chest trauma, the McHenry County Coroner's Office said. The driver of the vehicle was not injured, and no citations have been issued. Traffic was diverted in the area for more than three hours. The investigation is ongoing. sizzling summer special Subscribe now to get full, unlimited access to NWHerald.com for just $7.99 per month. Save 38%!
Pages Tuesday, August 21, 2012 When Your day Starts With... Alison, you live on a farm. With horses. You are quite familiar with 'literal shit', as a matter of fact you spend your mornings literally moving 'literal shit'. Quite right, italics voice, however, this day started off a little differently. I poured myself out of bed on this fine Monday morning (insert appropriate 'I hate Mondays' look here), pulled on my wonderful bright yellow muck boots (first good choice of the day) and headed out to the barn to feed, turn out then clean only to step in THIS as soon as I entered the barn: This is not the actual pile I stepped in. This is a borrowed image representing the actors portrayalof the incident because my camera was out of battery All over my aisle mats... cow manure!One of your horses could have gotten out and left that mess, you know. No. No they could not have. For one, all four horses were happily chowing down in their respective stalls, for the other all horse people are some what obsessed with the bodily functions of their horses... Are they pooping enough? Too much? Has the consistency changed? Do they need to be wormed? Are they dehydrated? Sick? Is there and impaction? Oh god, it's colic! Moral of this story is that horse people know their poo. This, for instance, is horse poo. What was in my barn aisle was NOT horse poo. It was cow poo. Which means that at some point last night, a cow moseyed into my yard, infiltrated my barn, was herded out and headed home all without waking me or my useless useless dogs. Comforting. Now, what kind of person comes to their neighbors farm in the middle of the night to collect their wayward livestock and doesn't come back to clean up the mess left by said livestock? Sigh. Fortuneatly I had stellar rides on RC, Delight, and Tilly that afternoon, so my day wasn't bad at all. Though I could have used a nap...
#!/usr/bin/env python # Rekall # Copyright 2016 Google Inc. All Rights Reserved. # # Authors: # Michael Cohen <[email protected]> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or (at # your option) any later version. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """Installation and deployment script.""" __author__ = "Michael Cohen <[email protected]>" import os import sys from setuptools import find_packages, setup, Command ENV = {"__file__": __file__} exec(open("rekall_lib/_version.py").read(), ENV) VERSION = ENV["get_versions"]() rekall_description = "Rekall Support Libraries" def find_data_files(source): result = [] for directory, _, files in os.walk(source): files = [os.path.join(directory, x) for x in files] result.append((directory, files)) return result install_requires = [ "arrow==0.10.0", "future==0.16.0", # We need to upgrade but this seems to break Rekall. # "sortedcontainers >= 2.0, < 3.0", "sortedcontainers==1.5.7", ] data_files = (find_data_files("test_data") + find_data_files("messages")) class CleanCommand(Command): description = ("custom clean command that forcefully removes " "dist/build directories") user_options = [] def initialize_options(self): self.cwd = None def finalize_options(self): self.cwd = os.getcwd() def run(self): if os.getcwd() != self.cwd: raise RuntimeError('Must be in package root: %s' % self.cwd) os.system('rm -rf ./build ./dist') commands = {} commands["clean"] = CleanCommand setup( name="rekall_lib", version=VERSION["pep440"], cmdclass=commands, description=rekall_description, long_description="Support libraries for the Rekall framework.", license="GPL", url="https://www.rekall-forensic.com/", author="The Rekall team", author_email="[email protected]", classifiers=[ "Development Status :: 4 - Beta", "Environment :: Console", "Operating System :: OS Independent", "Programming Language :: Python", ], package_dir={'.': 'rekall_lib'}, packages=find_packages('.'), data_files=data_files, entry_points=""" """, zip_safe=False, install_requires=install_requires, test_suite="nose2.collector.collector", )
Q: Access WebSphere Application Server resources from the adapters Which is the relation between the adapters and WAS? Is the adapter executed inside the webcontainer? For example using java inside the adapters do I have access to the WAS resources like jdbc datasources or distributed map cache or ....? Can I use the dynacache of WAS for HTTP Adapters? For caching the adapter response and also for caching the final services, invoked from the adapter, response. Thank you. A: You can access these resources using Java through adapters. I have used adapters calling Java and JDBC datasources to return stored procedure out parameters (not supported in the SQL adapters). Here is an article to invoke EJB 3.1 statelesss session beans from an adapter and the EJB client: https://www.ibm.com/developerworks/community/blogs/e4210f90-a515-41c9-a487-8fc7d79d7f61/entry/part_5_integrate_the_ibm_worklight_adapter_with_ejb_3_1_application?lang=en