text
stringlengths
8
5.77M
Welcome to the blog for A Self-Storage Depot and Fairview Self-Storage Depot in Western North Carolina. We pride ourselves in being the EXCLUSIVE One-Stop Shop in Hendersonville and Asheville, North Carolina for movers and people in need of extra space. We offer everything a mover needs under one roof: Climate-Controlled and Standard Storage Units, Penske Truck Rentals, and the widest variety of boxes, moving and packing supplies in Western North Carolina! This saves YOU Time and Money! Loading... Monday, November 12, 2012 HAPPY VETERAN'S DAY! To all those who served our country, we at "A Self-Storage Depot" in Hendersonville / Fletcher, NC and "Fairview Self-Storage Depot & Penske" in Asheville / Fairview, NC, would like to wish you: a HAPPY VETERAN's DAY and THANK YOU from the bottom of our hearts for SERVING OUR COUNTRY! 2 comments: Well, a storage unit rental is better than warehousing. If you are an entrepreneur, contractor or small business owner who's looking to getting the self storage facility than there are many self storage websites helps you lot.
Lawsuit alleges wrongful death in police shooting Shares April 5, 2012 8:54AM (UTC) PASADENA, Calif. (AP) — The parents of a college student who was shot and killed by Pasadena police alleged in a federal lawsuit that their son's death was part of a pattern of abuse by the department and that the investigation "reeks" of a cover up. Kenneth McDade and Anya Slaughter alleged in the wrongful death and civil rights lawsuit filed Tuesday that the department tried to cover up its wrongdoing in the shooting death of their 19-year-old son Kendrec McDade on March 24. Advertisement: Police blamed McDade's fatal shooting on Oscar Carrillo's 911 call claiming he had been robbed at gunpoint by two men. Police said the phone call by Oscar Carrillo led officers to believe McDade was armed when they spotted him in an alley and opened fire after they say he made a motion at his waistband. McDade did not have a weapon. Police said Carrillo later admitted to lying about the gun to speed up response, but in an interview with KNBC television on Wednesday, the 26-year-old said he really believed the college student was armed at the time. "I thought they had guns or something or they were going to shoot me," Carrillo told NBC, his face obscured. Police held Carrillo for six days on suspicion of involuntary manslaughter, but prosecutors declined to file those charges. After being shot multiple times in the chest, witnesses said McDade tried to talk to the officers, according to the lawsuit. Officers handcuffed McDade and he began to "twitch," the suit said. The teen died at a hospital. Grief still evident in her red eyes and tired stare, Slaughter told The Associated Press that Pasadena police took "her baby." Advertisement: Slaughter gave birth to her third child at Huntington Memorial Hospital. A week later she returned to the same hospital because her first-born, Kendrec, died there. "I want the world to know that he's not what the Pasadena police has portrayed him to be. He was one of those kids who stayed in school," she said. Kendrec's father, Kenneth McDade, said Slaughter calls her son's cellphone just to hear his voice, and put a pair of shorts he wore just before he died underneath her pillow. "He doesn't get to watch his little brother grow up. The only thing that was kind of a blessing is that he did get a chance to see his little brother, to hold him and enjoy him for one week," he said, tears rolling down his cheeks. Advertisement: The federal lawsuit alleges McDade's death was part of a pattern of abuse and killings of black people in Pasadena at the hands of police, including the shooting death of Leroy Barnes Jr., who was shot 11 times in 2009 by the department's officers.
//******************************************************************* // Copyright (C) 2000 ImageLinks Inc. // // License: See LICENSE.txt file in the top level directory. // // Author: Garrett Potts // //******************************************************************* // $Id: ossimGeoAnnotationSource.h 17932 2010-08-19 20:34:35Z dburken $ #ifndef ossimGeoAnnotationSource_HEADER #define ossimGeoAnnotationSource_HEADER #include <iostream> #include <ossim/imaging/ossimAnnotationSource.h> #include <ossim/imaging/ossimImageGeometry.h> #include <ossim/base/ossimViewInterface.h> class ossimGeoAnnotationObject; class ossimProjection; class OSSIM_DLL ossimGeoAnnotationSource : public ossimAnnotationSource, public ossimViewInterface { public: friend std::ostream& operator <<(std::ostream& out, const ossimGeoAnnotationSource& rhs); ossimGeoAnnotationSource(ossimImageGeometry* geom=NULL, bool ownsProjectionFlag=false); ossimGeoAnnotationSource(ossimImageSource* inputSource, ossimImageGeometry* geom=NULL, bool ownsProjectionFlag=false); /*! * Will add an object to the list. * it will own the object added. If the * object is not geographic */ virtual bool addObject(ossimAnnotationObject* anObject); virtual void computeBoundingRect(); virtual void transformObjects(ossimImageGeometry* geom=0); virtual void setGeometry(ossimImageGeometry* projection); virtual bool setView(ossimObject* baseObject); virtual ossimRefPtr<ossimImageGeometry> getImageGeometry(); virtual ossimObject* getView(); virtual const ossimObject* getView()const; /** * Saves the current state of this object. */ virtual bool saveState(ossimKeywordlist& kwl, const char* prefix=0)const; /** * Method to the load (recreate) the state of an object from a keyword * list. Return true if ok or false on error. */ virtual bool loadState(const ossimKeywordlist& kwl, const char* prefix=0); protected: virtual ~ossimGeoAnnotationSource(); ossimRefPtr<ossimImageGeometry> m_geometry; TYPE_DATA }; #endif
#version 120 uniform float time; varying vec3 v_texCoord3D; void main( void ) { gl_Position = gl_ModelViewProjectionMatrix * gl_Vertex; v_texCoord3D = gl_Vertex.xyz; }
A senior member of Australia’s ruling Coalition has conceded that Australian consumers are ready to leave the grid, and rely instead on solar and storage, and suggested that state-owned assets such as electricity networks need to be sold quickly before they lose too much value. The admission was made on ABC News Radio on Friday morning by Steve Ciobo, a parliamentary secretary in the Tony Abbott government and the Federal Member for Moncrieff, in Queensland, where the state government is looking to privatise its energy assets. The comments are interesting because it is the first time that a senior Abbott government member has acknowledged that rooftop solar and the emergence of battery storage is going to disrupt the market and devalue network assets. It is signifiant because it recognises what is widely accepted within the industry itself – that cleaner and distributed energy is going to grow, and underlines why the Coalition governments in Queensland and NSW are keen to privatise their electricity grid sooner rather than later. “If you look at for example, the poles and wires business, there is no doubt that there is massive change happening,” Ciobo said in the interview. “That’s a market where I have little doubt in the future that you’ll see more and more people drop off the electricity grid, because they’ve got batteries and solar panels. So I think that the sooner we lease assets like that and realise their value, the better, because it’s an asset that just becomes worth less every single day.” Interviewer Marius Benson then asked if the assets held any value, given the likelihood of grid defection. Ciobo said that would be up to the market, but the governments would be wrong to hang on to the assets if they were going to be worth less in the future. Ciobo is the Parliamentary Secretary to the Minister for Foreign Affairs (Julie Bishop), and the Parliamentary Secretary to the Minister for Trade and Investment (Andrew Robb). Australian network operators are becoming increasingly aware of the threat of mass grid defection. A CSIRO study that included the networks suggested nearly half of the country’s energy requirements could be sourced from distributed generation within a few decades, and one third of consumers could quit the grid if networks did not offer an economically competitive service. Numerous analyst reports have spoken about the economic drivers of grid defection – it will be cheaper for consumers to have solar and storage than remain connected to the grid within a few years – and some networks are beginning to re-callibrate their business models.
LBMA Podcast: Pulsate’s Beacon-Based Marketing, Presence Orb Welcome to This Week in Location Based Marketing, a weekly video podcast from the Location Based Marketing Association. Top stories of the week include Facebook & Moves, Storefront, Google’s contact lens camera, Pulsate’s beacon-based marketing platform, Baidu’s mobile wallet launch in China, Bleamcard, Xaxis, the Museum of History of Polish Jews display, Verizon’s Relevant Mobile Advertising platform and Presence Orb. Our feature of the week is Grand St. — a marketplace for creative technology.
Stigmergy Stigmergy is a mechanism of indirect coordination between agents or actions.[1] The principle is that the trace left in the environment by an action stimulates the performance of a next action, by the same or a different agent. In that way, subsequent actions tend to reinforce and build on each other, leading to the spontaneous emergence of coherent, apparently systematic activity. Stigmergy is a form of self-organization. It produces complex, seemingly intelligent structures, without need for any planning, control, or even direct communication between the agents. As such it supports efficient collaboration between extremely simple agents, who lack any memory, intelligence or even individual awareness of each other.[1] Contents The term "stigmergy" was introduced by French biologist Pierre-Paul Grassé in 1959 to refer to termite behavior. He defined it as: "Stimulation of workers by the performance they have achieved." It is derived from the Greek words στίγμαstigma "mark, sign" and ἔργονergon "work, action", and captures the notion that an agent’s actions leave signs in the environment, signs that it and other agents sense and that determine and incite their subsequent actions.[2] Later on, a distinction was made between the stigmergic phenomenon, which is specific to the guidance of additional work, and the more general, non-work specific incitation, for which the term sematectonic communication was coined[3] by E. O. Wilson, from the Greek words σῆμαsema "sign, token", and τέκτωνtecton "craftsman, builder": "There is a need for a more general, somewhat less clumsy expression to denote the evocation of any form of behavior or physiological change by the evidences of work performed by other animals, including the special case of the guidance of additional work." Stigmergy was first observed in social insects. For example, ants exchange information by laying down pheromones (the trace) on their way back to the nest when they have found food. In that way, they collectively develop a complex network of trails, connecting the nest in the most efficient way to the different food sources. When ants come out of the nest searching for food, they are stimulated by the pheromone to follow the trail towards the food source. The network of trails functions as a shared external memory for the ant colony. In computer science, this general method has been applied in a variety of techniques called ant colony optimization, which search for solutions to complex problems by depositing "virtual pheromones" along paths that appear promising. Other eusocial creatures, such as termites, use pheromones to build their complex nests by following a simple decentralizedrule set. Each insect scoops up a 'mudball' or similar material from its environment, invests the ball with pheromones, and deposits it on the ground, initially in a random spot. However, termites are attracted to their nestmates' pheromones and are therefore more likely to drop their own mudballs on top of their neighbors'. The larger the heap of mud becomes, the more attractive it is, and therefore the more mud will be added to it (positive feedback). Over time this leads to the construction of pillars, arches, tunnels and chambers.[5] Stigmergy has even been observed in bacteria, various species of which differentiate into distinct cell types and which participate in group behaviors that are guided by sophisticated temporal and spatial control systems.[6] Spectacular examples of multicellular behavior can be found among the myxobacteria. Myxobacteria travel in swarms containing many cells kept together by intercellular molecular signals. Most myxobacteria are predatory: individuals benefit from aggregation as it allows accumulation of extracellular enzymes which are used to digest prey microorganisms. When nutrients are scarce, myxobacterial cells aggregate into fruiting bodies, within which the swarming cells transform themselves into dormant myxospores with thick cell walls. The fruiting process is thought to benefit myxobacteria by ensuring that cell growth is resumed with a group (swarm) of myxobacteria, rather than isolated cells. Similar life cycles have developed among the cellular slime molds. The best known of the myxobacteria, Myxococcus xanthus and Stigmatella aurantiaca, are studied in various laboratories as prokaryotic models of development.[7] Stigmergy also occurs with social movements, such as the arc from Wikileaks’ cable release in Summer 2010 to the developments in global Occupy movement.[8] The steady rise of Wikipedia and the Open Source software movement has been one of the big surprises of the 21st century, threatening stalwarts such as Microsoft and Britannica, while simultaneously offering insights into the emergence of large-scale peer production and the growth of gift economy.[9]Bitcoin was created, and has evolved, in a stigmergic fashion, and its protocol can be used to apply this organizational structure to everyday life.[10] The Occupy movement itself operates stigmergically, with innovations developed by one node becoming part of the total movement’s common toolkit.[11] Stigmergy Society is government without politicians. Under the influence of stigmergy, new forms of governance would be based on systems, not land mass, and that governance would be generated by user groups, not elected officials. Stigmergy is the most effective way for those user groups to govern systems.[12] Systems are currently primarily run by competitive organizations. Competition creates redundancy, is slow and wastes resources on idea protection, advertisement, and more.[12] The alternative to competition has traditionally been collaboration. This is most effective only in groups of two to eight people.[12] With stigmergy, an initial idea is freely given, and the project is driven by the idea, not by a personality or group of personalities. No individual needs permission (competitive) or consensus (collaborative) to propose an idea or initiate a project.[13][14][15] For example, David Graeber's study of Betafo, a rural community in Madagascar, inspired him to launch a revolutionary Occupy Movement worldwide.[16][17][18] Betafo is a stigmergy Society made up of the descendants of nobles and their slaves. Because of spending cuts mandated by the International Monetary Fund, the Malagasy central government had abandoned the area, leaving the inhabitants to fend for themselves. They did, creating an egalitarian society where 10,000 people made decisions by stigmergic consensus. When necessary, criminal justice was carried out by a mob, but even there a particular sort of consensus pertained: a lynching required permission from the accused’s parents. Stigmergy is not restricted to eusocial creatures, or even to physical systems. On the Internet there are many collective projects where users interact only by modifying local parts of their shared virtual environment. Wikipedia is an example of this.[19] The massive structure of information available in a wiki,[20] or an open source software project such as the FreeBSD kernel[20] could be compared to a termite nest; one initial user leaves a seed of an idea (a mudball) which attracts other users who then build upon and modify this initial concept, eventually constructing an elaborate structure of connected thoughts.[21][22] The term is also employed in experimental research in robotics,[23] multi-agent systems and communication in computer networks. In these fields there exist two types of stigmergy: active and passive. The first kind occurs when a robotic or otherwise "intelligent" "agent" alters its environment so as to affect the sensory input of another agent. The second occurs when an agent's action alters its environment such that the environmental changes made by a different agent are also modified. A typical example of active stigmergy is leaving behind artifacts for others to pick up or follow. An example of passive stigmergy is when one agent tries to remove all artifacts from a container, while another agent tries to fill the container completely.[citation needed] In addition the concept of stigmergy has also been used to describe how cooperative work such as building design may be integrated. Designing a large contemporary building involves a large and diverse network of actors (e.g. architects, building engineers, static engineers, building services engineers). Their distributed activities may be partly integrated through practices of stigmergy.[24][25] ^Heather Marsh on Sat, 12/24/2011 A proposal for governance in the post 2011 world "Optimism is a political act. In fact, these days, cynicism is obedience." - Alex Steffen http://wlcentral.org/node/2389 ^Ranjbar-Sahraei, B., Weiss G., and Nakisaee, A. (2012). A Multi-Robot Coverage Approach based on Stigmergic Communication. In Proc. of the 10th German Conference on Multiagent System Technologies, Vol. 7598, pp. 126-138. ^Christensen, L. R. (2007). Practices of stigmergy in architectural work. In Proceedings of the 2007 international ACM Conference on Conference on Supporting Group Work (Sanibel Island, Florida, USA, November 04–07, 2007). GROUP 2007. ACM, New York, NY, 11-20.
As semiconductor technology continues to inch closer to practical limitations in terms of increases in clock speed, architects are increasingly focusing on parallelism in processor architectures to obtain performance improvements. At the integrated circuit device, or chip level, multiple processing cores are often disposed on the same chip, functioning in much the same manner as separate processor chips, or to some extent, as completely separate computers. In addition, even within cores, parallelism is employed through the use of multiple execution units that are specialized to handle certain types of operations. Pipelining is also employed in many instances so that certain operations that may take multiple clock cycles to perform are broken up into stages, enabling other operations to be started prior to completion of earlier operations. Multithreading is also employed to enable multiple instruction streams to be processed in parallel, enabling more overall work to performed in any given clock cycle. The net result of applying the aforementioned techniques is an ability to provide multithreaded processing environment with a pool of hardware threads distributed among one or more processing cores in one or more processor chips and in one or more computers, and capable of processing a plurality of instruction streams in parallel. It is expected that as technology increases, processor architectures will be able to support hundreds or thousands of hardware threads, and when multiple processors are combined into high performance computing systems such as supercomputers and massively parallel computers, a potential exists to support millions of hardware threads. However, effective parallel processing requires that the software applications that run in a multithreaded processing environment take suitable advantage of multithreading capabilities. Software developers are typically more comfortable with developing single threaded applications since they typically follow the sequences of steps needed to perform desired tasks. Support for multithreading is often not as intuitive, and often requires consideration for minimizing conflicts and dependencies to minimize the frequency that threads may spend waiting for other threads to complete work that they need before they can complete their own work. For example, if one thread needs to calculate an average of some set of values that are being calculated by other threads, that thread will not be able to perform its operation until all of the other threads calculate their respective values. Threads that perform completely independent tasks, on the other hand, typically do not suffer from dependency concerns, so much of the effort associated with developing for multithreaded applications is devoted to breaking tasks up into relatively independent threads so that inter-thread dependencies are minimized. Given the difficulties associated with developing multithreaded applications, a significant need has existed in the art for techniques for simplifying the development of multithreaded applications. For example, significant efforts have been made to programmatically convert single threaded application code into multithreaded application code during compilation, e.g., using an optimizing compiler. With one methodology, for example, fine grained parallelism is employed to convert in-order code in an instruction stream into multiple, small out-of-order code segments, and instructions are inserted into the instruction streams to pass data between the code segments in the form of variables. One type of instruction is a “put” instruction, which sends a variable to another thread, and another type of instruction is a “get” instruction, which retrieves a variable from another thread. Through the use of these instructions, synchronization between code segments executing on multiple threads can be maintained by stalling a code segment that has issued a get statement for a particular variable until another code segment has issued a corresponding put instruction for that variable. While the use of put and get instructions can effectively maintain synchronization between dependent code segments executing on different hardware threads, any time that a thread is stalled waiting for a variable from another thread represents lost productivity, so it is desirable to minimize the latency associated with communicating variables between threads. Therefore, a significant need exists in the art for a manner of efficiently communicating data between multiple threads in a multithreaded processing environment to minimize latencies for inter-thread dependencies.
Q: AWS S3 Sync very slow when copying to large directories When syncing data to an empty directory in S3 using AWS-CLI, it's almost instant. However, when syncing to a large directory (several million folders), it takes a very long time before even starting to upload / sync the files. Is there an alternative method? It looks like it's trying to take account of all files in an S3 directory before syncing - I don't need that, and uploading the data without checking beforehand would be fine. A: The sync command will need to enumerate all of the files in the bucket to determine whether a local file already exists in the bucket and if it is the same as the local file. The more documents you have in the bucket, the longer it's going to take. If you don't need this sync behavior just use a recursive copy command like: aws s3 cp --recursive . s3://mybucket/ and this should copy all of the local files in the current directory to the bucket in S3.
Q: Check whether an HTTP Request is from an android mobile or not using servlet/jsp I would like to ask how can I ensure if an HttpRequest is from an android mobile without passing variable, using java servlet? Thanks for the help. A: You can check the User-Agent header. Here's a list. I guess you can check whether it contains "Android" or not. if (request.getHeader("User-Agent").toLowerCase().contains("android")) { .. }
# # Makefile for the HISILICON network device drivers. # ccflags-y := -Idrivers/net/ethernet/hisilicon/hns3 obj-$(CONFIG_HNS3_HCLGE) += hclge.o hclge-objs = hclge_main.o hclge_cmd.o hclge_mdio.o hclge_tm.o obj-$(CONFIG_HNS3_ENET) += hns3.o hns3-objs = hns3_enet.o hns3_ethtool.o
Blackburn Tavern Blackburn Tavern Overview Website: N/A Locations: Gloucester, MA Employees: 10 Founded: N/A President: Bob Vallis Industry: Drinking Places Revenue: $408,000 A drinking places company, Blackburn Tavern is located at Gloucester, MA. It has an annual revenue of $408,000 and employs ten people. The niche appeal of Blackburn Tavern has made it quite noticeable within the boutique market. The firm's success rests upon President Bob Vallis.
Q: MySQL query help with grouping and adding I have a table called user_logins which tracks user logins into the system. It has three columns, login_id, user_id, and login_time login_id(INT) | user_id(INT) | login_time(TIMESTAMP) ------------------------------------------------------ 1 | 4 | 2010-8-14 08:54:36 1 | 9 | 2010-8-16 08:56:36 1 | 9 | 2010-8-16 08:59:19 1 | 3 | 2010-8-16 09:00:24 1 | 1 | 2010-8-16 09:01:24 I am looking to write a query that will determine the number of unique logins for each day if that day has a login and only for the past 30 days from the current date. So for the output should look like this logins(INT) | login_date(DATE) --------------------------- 1 | 2010-8-14 3 | 2010-8-16 in the result table 2010-8-16 only has 3 because the user_id 9 logged in twice that day and him logging into the system only counts as 1 login for that day. I am only looking for unique logins for a particular day. Remember I only want the past 30 days so its like a snapshot of the last month of user logins for a system. I have attempted to create the query with little success what I have so far is this, SELECT DATE(login_time) as login_date, COUNT(login_time) as logins FROM user_logins WHERE login_time > (SELECT DATE(SUBDATE(NOW())-1)) FROM DUAL) AND login_time < LAST_DAY(NOW()) GROUP BY FLOOR(login_time/86400) I know this is wrong and this returns all logins only starting from the beginning of the current month and doesn't group them correctly. Some direction on how to do this would be greatly appreciated. Thank you A: You need to use COUNT(DISTINCT ...): SELECT DATE(login_time) AS login_date, COUNT(DISTINCT login_id) AS logins FROM user_logins WHERE login_time > NOW() - interval 30 day GROUP BY DATE(login_time) I was a little unsure what you wanted for your WHERE clause because your question seems to contradict itself. You may need to modify the WHERE clause depending on what you want.
PROJECT SUMMARY/ABSTRACT The Jackson Laboratory (JAX) proposes to renew the existing summer research experience in neurobiology and continue to support a focused neurobiology cohort within the existing JAX Summer Student Program, an internationally recognized research education program for undergraduates and high school students. Under the proposed renewal, six undergraduate students will conduct neurobiology research in the labs of 11 NIH- funded neuroscientists who lead cutting-edge, collaborative research programs in Alzheimer's disease, peripheral neuropathies, motor neuron degeneration, synaptic development, retinal disease and glaucoma, addiction, Rett syndrome, and sensory disorders. The 10-week residential internship will provide each participant a summer salary and funds to support student research supplies and travel to national meetings to present findings. The proposed program will offer an intense research internship in neurobiology with a focus on the laboratory mouse as an investigative tool to probe the basic mechanisms of human biology and disease. As a member of the mentor's laboratory team, each student will design and conduct an independent, hypothesis-driven project using advanced analysis methods and tools and the outstanding genetic resources available at JAX. The defined research education curriculum will include asynchronous online learning modules, bioinformatics bootcamps, workshops on the ethical conduct of research within historical and modern scientific contexts, and science communication. JAX institutional commitment includes student access to intellectual and research resources such as on-campus courses and conferences, state-of-the-art instrumentation and bioinformatics databases, dedicated program direction by JAX Genomic Education, and a staffed on-campus residential program. The neurobiology cohort will join the Summer Student Program, which is supported by institutional funds, private foundations, and federal grants, and has well-established administrative procedures for recruitment and selection, mentor training and support, and program design, management, and evaluation. The program will identify participants through a national recruitment and competitive application process. JAX will recruit students underrepresented in biomedicine through targeted outreach and partnerships. JAX offers a stimulating environment in which motivated, talented students from diverse backgrounds can learn the fundamentals of scientific inquiry, contribute to real research progress, and make great strides in intellectual and personal growth that will guide them toward a career in research.
Import the model into ModelEditor and use the shape tool to make a box around the mesh. Then click the purple shape and click "Create Body". It will turn green here. Click the shape again and change its mass to about 20 (since it is a box). This gives it physics. Then go to the tab on the right that says "Attachments", pick the "Submesh" button, "Attach", and pick the box mesh. Click Done and now it is a basic entity. NOTE: If you click the configuration button on the bottom (looks like cog wheels), you can play around with the model. NOW go back to the editing windows and pick "User Defined Variables" and change "StaticProp" To "Object" and Type to "Grab". Save the .ent and you should be able to pick it up now. (04-02-2012 09:16 PM)Statyk Wrote: Import the model into ModelEditor and use the shape tool to make a box around the mesh. Then click the purple shape and click "Create Body". It will turn green here. Click the shape again and change its mass to about 20 (since it is a box). This gives it physics. Then go to the tab on the right that says "Attachments", pick the "Submesh" button, "Attach", and pick the box mesh. Click Done and now it is a basic entity. NOTE: If you click the configuration button on the bottom (looks like cog wheels), you can play around with the model. NOW go back to the editing windows and pick "User Defined Variables" and change "StaticProp" To "Object" and Type to "Grab". Save the .ent and you should be able to pick it up now.
Q: Possibly the worst weed ever? A bad type of thistle? Do you know what kind of weed this is, and how to eradicate it? It's not possible to pull it out from the root, and they are sharp and thorny. They grow quickly and spread rapidly. I've avoided spraying herbicides since I don't want to impact the soil and future plantings; but I also haven't planted anything new because I'm scared it will be a waste if it's just taken over by these weeds. I live in DC suburbs in Maryland. Would it be OK to just spray Roundup on the entire bed, let them wither and die, and then start from scratch? I've heard varying information on how Roundup affects the soil. A: They're no worse than any thistle -if you let one flower and set seed, that seed gets distributed all over the place and germinates easily, which is why you have so many. If you want to use a weedkiller, at least just buy glyphosate concentrate rather than Round Up - glyphosate on its own is bad enough, but Round Up is much worse because of the other additives it has. If you do use glyphosate, when you mix it up, add a squirt of washing up liquid to the mix - this acts as a surfactant, and water on with a can, rather than spraying (less risk of contamination to you and the surrounding area). Otherwise, if your soil isn't too heavy to dig, use a garden fork and lever them up by the roots. A: Looks like thistles yes. I wouldn't use round-up, that stuff is not good for the environment and not good for your health (it is so close to your home). Why not old fashion removal with your hands? Buy some good gloves to protect from the sting. Or buy a hoe, and do some dutch hoeing. My father always used a push or thrust hoe for his garden (of course he was a Dutchman...).
MTT: Easy Lamb Koftas With Tzatziki June 10, 2011 Greece and Greek food (like these Easy Lamb Koftas!) is very special to our little family. The in-laws lived on the beautiful island of Meganissi for a long time and my father-in-law is buried there so we will continue to return for holidays as often as possible. It’s the least touristy place I’ve ever visited in Greece; the Onassis family own the next-door island and the summer season attracts wealthy Greeks and Italians rather than lager-lout Brits. Don’t tell anyone – I like to think it’s our secret. One of the best things about Meganissi is the food. Stifados – fried aubergine – fish – salads – tzatziki. I always come home about 2 stone heavier with a renewed enthusiasm for feta, olives and Greek yoghurt. Lovely Lamb Koftas As I’m still trying to lose the last couple of pounds of baby weight I try not to indulge too much but I recently made the discovery that 0% fat Greek yoghurt pretty much tastes the same as the fattening stuff. So now it’s going on everything; breakfast, posh prawn cocktail, pudding, and my personal favourite: tzatziki. These lamb koftas are super easy to make, healthy and really delicious. Plus, when cooked, they look a little bit like poo. Always good. Mix together the mince, herbs, spices, onion and seasoning in a large mixing bowl. I like to use a fork or a knife to break up the meat, but then I get in there with my hands to smoosh it all together. Yum. Use your hands to make small sausages, about half the size of regular sausages. Put to one side. In a smaller bowl mix together the remaining mint, cucumber, seasoning and yoghurt. Slice the red onion and put to one side. Heat half a tbsp in a pan on a medium heat and cook the lamb sausages until browned all over, about 5 minutes on each side. Make up the wraps with the sausages, yoghurt mixture and sliced red onion. Lettuce optional. Thanks for this – I love lamb koftes but I have never tried making them myself. I’ll be going to Greece in August for the first time ever. Can you believe this?? We’ll be going to Paros in August. Hot, hot, hot! Last check Ibiza was at 26 which is pretty perfect for us (Will can’t handle the heat) and we usually go to Greece in late June so the precious little poppet doesn’t get sunstroke. It’ll be scorching in August, how wonderful!
Most people have strong opinions about Michelle and Jim Bob Duggar and their brood of 19 children. While some commend them for putting their family first and having as many children as God feels fit, many others feel they are being irresponsible to have so many children and to potentially put Michelle’s health in jeopardy with more pregnancies at an advanced age. Whatever your personal opinion is, there is no denying that many Americans could learn to manage their money as effectively as the Duggars. Here are some of their money management strategies that have allowed to live debt free despite raising 19 children. 1. Buy used and save the difference. If you watch their show, 19 Kids and Counting, you will see the Duggars recite their mantra, “Buy used and save the difference” over and over. They buy almost everything used–clothing, cars, RVs, baby equipment, beds, the list goes on and on. 2. Barter. In addition to buying used, the Duggars aren’t afraid to barter and ask for a lower cost. They barter successfully quite often. Of course, it helps when you pay cash and have all of the money to pay upfront. 3. Pay cash. The Duggars pay cash for their expenses. While they might be able to play the credit card reward system and accrue points to get free services and items, they instead choose to pay with cash and avoid credit cards completely. 4. Avoid debt. The Duggars don’t just avoid credit card debt, they avoid all types of debt. Their sprawling home, which features a 2,000 square foot great room including living room, dining room and kitchen, was paid for upfront. They do not owe anything on the house; it is paid in full. Not many Americans can say that, let alone those with the expense of 19 children. 5. Do it yourself. One of the ways the Duggars were able to pay cash for their home was to learn how to do much of the building themselves. They did hire people to help, but then they worked beside those they hired to learn to do much of the work themselves. Do it yourself can save some big bucks! 6. Help others. The Duggars were routinely shown going to help a fellow large family, the Bates, to renovate their house to accommodate their own growing family. The Duggars are always volunteering to help their friends, and in return, their friends gladly help them. This cooperative agreement helps them get things done without hiring others to assist them. 7. Be willing to delay gratification. Before the Duggars built their home, they were in a cramped, small house. While they wanted nothing more than to move into their new, spacious home, they had to be willing to delay gratification so that it would be paid in full when they moved in. The house took several years to complete. 8. Be willing to tell your children no. In their book, Michelle recounts the early days of their marriage when they had very little money coming in. One of their older daughters wanted a pink blanket, but they could not afford to buy her one because it wasn’t in the budget. How many of us routinely tell our children no for such a small expenditures? Because they have the ability to live within their budget and tell their children no, they are able to remain debt free. Of course, many will argue that the Duggars are able to be debt free because they have a television show and book deals. I am not disputing that those deals probably do bring them a substantial amount of money and a more comfortable lifestyle. However, how many athletes or other celebrities do we routinely see who blow through millions in just a few years? The Duggars are being responsible stewards of their money. In addition, they were already living this way long before the television deal came along. What other financial lessons do you learn from the Duggars or another famous family?
Budding food analysis website ClearFood.com claims that your hot dog may contain human DNA, and that not all veggie dogs are meat free. Menlo Park, California-based Clear Food analyzes food on the “molecular level” and claims that testing in its first official report reveals that 2 per cent of samples tested showed evidence of human DNA. 345 hot dogs and sausages were analyzed in the report. Of those, 14.4 per cent were said to be “problematic.” The new food researcher is listed in a kickstarter campaign that counted 207 backers, $74,413 dollars in donation pledges and 25 days left to meet its $100k goal as of Monday afternoon. The kickstarter campaign denotes the hot dog report as the group’s first, calling the product the “ultimate mystery meat.” A few brands were singled out in study results as superior, according to Fox 25 Boston. Those brands noted were Butterball, McCormick, Eckrich, Hebrew National, Gardein, and a special mention for Oscar Mayer’s Premium Jumbo Beef Franks. Three “top retailers” were singled out as well: Target, Walmart and Safeway. Vegetarians were warned that study results showed 4 of the 21 vegetarian samples had “hygienic issues” and 10 per cent contained meat. Those found containing meat included “chicken in a vegetarian breakfast sausage and pork in a vegetarian hot dog.” Additionally, two-thirds of the human DNA discoveries were uncovered in the vegetarian products. The study also noted pork as a substitute for other meats. “We found pork substitution in 3% of the samples. In most cases pork was substituted for chicken or turkey. We found that this issue occured in products of all price ranges.” If abstaining from pork is important, Clear Food recommends a kosher brand, such as Hebrew National. Follow Michelle Moons on Twitter @MichelleDiana
/* EDC16 Demo code, made by Javier Vazquez (Bi0H4z4rD) It can read/write flash on these ECUS and read their info. Supports EDC16U31/34 This is the code for the DEMO presented on Blackhat Arsenal USA 2013 and DEFCON 21 The dump from the ECU will be named EDC16RD.SKF, and it is a plain binary (512kB). The encrypted files will be called EDC16RD.CR1 and EDC16RD.CR2 as every encrypted block must be 256kB. The only hardware required for this demo to work is a k-line level shifter (MC33290 for example) and a 510ohm resistor connected between 12V and the K-Line (pins 1 and 4 of the MC33290, but different for other level shifters). The pinout between the arduino and the MC33290 is as follows: MC33290**********Arduino Mega 2560 5(TX)----------------16(TX2) 6(RX)----------------17(RX2) 7+8(VDD+CEN)---------+5V 3(GND)---------------GND Pin 4 of the MC33290 goes to the K-Line of the ECU, and pin 1 to +12V from the OBD2 connector (or external power source). The pinout for the ECU is extremely easy to find on google. We only need +12V (two pins), GND, and K-line. */ /*Notes: This version of the software will read and write the flash of an EDC16U31/34 (Without flash counter limit). It is a proof of concept code, and NOT to be used for normally flashing ECU's (you are warned!), but for understanding (and eventually testing if you are brave!). It does not bypass the immo, so for bench flashing test you will need to wait for the full release, or have a immo disabled ECU. Otherwise, you will only be able to read the flash, but not to write it. I will release a bugless (hopefully) version that will have all menus and functions implemented, and that will work with the portable version of the device, so please be patient! Some variables and functions are from the definitive code, even though they are not used in the demo code. I am that lazy to clean them up, yes :P This code will run on an Arduino Mega 2560 with an ethernet shield (with SD), and the MC33290 connected on USART2. It is exactly the one that was shown in the demo. Shall you have any doubts, contact me at brd_gsm@hotmail.com */ //*Trick to save RAM*//// #define flp(string) flashprint(PSTR(string)); byte FlashType; /*This determines the type of flash as follows: type 0=29BL802CB is for ecu type 0 type 1=M58BW016xB is for ecu type 1 and 2 */ //This is for the menus: byte optionset=0; /*SD stuff * SD card attached to SPI bus as follows: ** MOSI - pin 11 ** MISO - pin 12 ** CLK - pin 13 ** CS - pin 10 */ byte SDbuffer[258];//General purpose buffer word SDcounter=0;//counter to know how many bytes will be written to the SD #include <SdFat.h> #include <SdFatUtil.h> SdFat SD; Sd2Card card; SdVolume volume; const uint8_t SD_CHIP_SELECT = 4; SdFile myFile; SdFile myFile2; // store error strings in flash to save RAM #define error(s) error_P(PSTR(s)) boolean fail=0;//Used to determine wether a proccess has failed, and therefor, return to main menu #define K_IN 17 //RX2 #define K_OUT 16 //TX2 #define ISORequestByteDelay 7 //Used to determine byte b=0;//Buffer to hold the incoming byte and other operations boolean EDC16ReadDone;//Determines whether the flash has been read or not. long setspeed=10400; //Determines the connection speed boolean success=0; byte iscrc=0;//Determines if the byte received is the CRC of a string byte EcuType;//determines which ecu is connected word checksum1=0;//Checksum for the first writing block word checksum2=0;//And for the second one byte kill=0;//Determines if we are going to kill the ECU //*****************************These bytes represent the replies that the ECU gives during common parts******************************** //EDC16 stuff const char EDC16_ECUBytes[] PROGMEM = { //Commonstart 0x83,0xF1,0x10,0xC1,0xEF,0x8F }; const char Req250k_ECUBytes[] PROGMEM = { 0x83,0xF1,0x10,0x50,0x86,0xA7,//OK TO 250KBPS }; const char M58BW016xB_Read_ECUBytes[] PROGMEM = { 0x82,0xF1,0x10,0x75,0xFF//READY TO SEND }; const char M58BW016xB_WriteAck_ECUBytes[] PROGMEM = { 0x82,0xF1,0x10,0x74,0xFD//Write accepted }; const char M58BW016xB_AddrAck_ECUBytes[] PROGMEM = { 0x82,0xF1,0x10,0x71,0xC4//Address accepted }; const char Lvl3Sec_ECUBytes[] PROGMEM = {//Answer to correct LVL3 security access 0x83,0xF1,0x10,0x67,0x04,0x34 }; const char Lvl1Sec_ECUBytes[] PROGMEM = {//Answer to correct LVL1 security access 0x83,0xF1,0x10,0x67,0x02,0x34 }; //********************************These bytes represent the replies that Arduino gives during common processes //EDC16 stuff const char EDC16ArduBytes[] PROGMEM = { //Commonstart 0x81,0x10,0xF1,0x81 }; const char EDC16Info_ArduBytes[] PROGMEM = { //Request for info 0x82,0x10,0xF1,0x1A,0x80 }; const char Req250k_ArduBytes[] PROGMEM = { 0x83,0x10,0xF1,0x10,0x86,0xA7//REQUEST FOR 250KBPS (A7) }; const char Req124k_ArduBytes[] PROGMEM = { 0x83,0x10,0xF1,0x10,0x85,0x87//REQUEST FOR 124KBPS (87) }; const char M58BW016xB_Read_ArduBytes[] PROGMEM = {//ADDRESSING FOR THIS FLASH 0x88,0x10,0xF1,0x35,0x18,0x00,0x00,0x00,0x08,0x00,0x00 }; const char Lvl3Sec_ArduBytes[] PROGMEM = {//Request for LVL3 security access (Flash read) 0x82,0x10,0xF1,0x27,0x03 }; const char Lvl1Sec_ArduBytes[] PROGMEM = {//Request for LVL1 security access (Flash write) 0x82,0x10,0xF1,0x27,0x01 }; const char EDC16Erase_ArduBytes[] PROGMEM = { //Check if erase is complete 0x82,0x10,0xF1,0x33,0xC4 }; //*******************************Main software************************** void setup() { Serial.begin(115200); pinMode(4, OUTPUT);//CS for SD on ethernet shield pinMode(K_OUT, OUTPUT);//We set the pins to the proper condition for the bitbang pinMode(K_IN, INPUT); digitalWrite(K_OUT, HIGH); Serial.println(); Serial.println(); flp("EDC16 ECU tool HW V0.1 FW R0.2D"); Serial.println(); Serial.println(); delay(2000); flp("Checking SD..."); //SD card INIT if (!SD.begin(SD_CHIP_SELECT, SPI_HALF_SPEED)) { flp("SD Error...");//If we cannot access the SD, print out an error fail=1; while (fail){} } flp("Done!"); Serial.println(); flp("********************************************"); Serial.println(); Serial.println(); delay(1000); EcuType=1; FlashType=1; } void loop()//Now that we know with which ECU we will work, we show the action menu { VariablesInit(); flp("EDC16 tool demo"); Serial.println(); Serial.println(); flp("Press any key to begin"); Serial.println(); flp("********************************************"); Serial.println(); CheckButtonPressed();//Waits for user input on the serial console to start info();//reads the ECU info Serial.println(); flp("********************************************"); Serial.println(); readext();//Reads the external flash Serial.println(); flp("********************************************"); Serial.println(); KillECU();//Disables the ECU Serial.println(); flp("********************************************"); Serial.println(); info();//We try to read the info to see that it is really dead Serial.println(); flp("********************************************"); Serial.println(); revive();//Writes the external flash and makes the ECU work again Serial.println(); flp("********************************************"); Serial.println(); info();//And we read the info again to check that it is working! Serial.println(); flp("********************************************"); Serial.println(); flp(" Done with demo! "); Serial.println(); flp(" Press any key "); CheckButtonPressed(); Serial.println(); Serial.println(); flp("********************************************"); Serial.println(); Serial.println(); } void revive() { VariablesInit(); flp("Will reactivate ECU"); Serial.println(); flp("Press any key"); Serial.println(); Serial.println(); CheckButtonPressed(); delay(2000); SelectWrite(); Serial.println(); flp("Power cycle ECU!"); Serial.println(); flp("Press any button"); Serial.println(); CheckButtonPressed(); } void info() { VariablesInit(); flp("Will read info..."); Serial.println(); flp("Press any key"); Serial.println(); Serial.println(); CheckButtonPressed(); SelectInfo(); } void KillECU() { VariablesInit(); flp("Will now disable ECU"); Serial.println(); flp("Press any key"); Serial.println(); Serial.println(); CheckButtonPressed(); kill=1; SelectWrite(); // We will write just a little part of the flash to have a wrong CRC Serial.println(); flp("Power cycle ECU!"); Serial.println(); flp("Press any key"); Serial.println(); CheckButtonPressed(); } void readext() { VariablesInit(); flp("Will read ext.flash"); Serial.println(); flp("Press any key"); Serial.println(); Serial.println(); CheckButtonPressed(); SelectRead(0); Serial.println(); flp("Remove SD to inspect dump and insert it back"); Serial.println(); flp("Press any key"); Serial.println(); CheckButtonPressed(); if (!SD.begin(SD_CHIP_SELECT, SPI_HALF_SPEED)) { flp("SD Error..."); Serial.println(); fail=1; while (fail){} } } /***********************************Here goes all the operation routines for the menu actions***************/ //***************Read info operations**************// void SelectInfo() { if (!EDC16CommonStart())//We wake up the ECU { return; } if (!LVL3Key())//We auth with LVL3 sec { return; } DisplayInfo();//We request and parse the info } void DisplayInfo()//Reads and parses the data from the ECU { iso_sendstring(5,6); while (Serial2.available()<1) { } iso_read_byte(); if (b==0x83) { delay(1); while (Serial2.available()>0) { iso_read_byte(); delay(1); } while (Serial2.available()<1) { } iso_read_byte(); } SDbuffer[0]=b; int crap=1; delay(1); while (Serial2.available()>0) { iso_read_byte(); SDbuffer[crap]=b; crap++; delay(1); } CloseEDC16Ecu(); //32-33 and 35-36 are the sw date //79-95 are the VIN //131-142 are the SW version //144-147 are the SW revision //158-168 is the engine type flp("SW: ");//Print ECU version for (byte crap=87;crap<98;crap++) { char asciiconvert= SDbuffer[crap]; Serial.print(asciiconvert); } Serial.println(); flp("Engine: "); for (byte crap=147;crap<158;crap++) { char asciiconvert= SDbuffer[crap]; Serial.print(asciiconvert); } Serial.println(); flp("VIN: "); for (byte crap=73;crap<84;crap++) { char asciiconvert= SDbuffer[crap]; Serial.print(asciiconvert); } Serial.println(); flp("ECU SW date: "); for (byte crap=32;crap<37;crap++) { char asciiconvert= SDbuffer[crap]; Serial.print(asciiconvert); } Serial.println(); Serial.println(); flp("Press any key to continue"); CheckButtonPressed(); } //*************Flash operations***************/ void SelectRead(byte op)//Reads the flash { boolean check=EDC16CommonStart(); if (!check) { return; } check=LVL3Key(); if (!check) { return; } EDC16ReadStart(op); ReadEDC16Flash(op); delay(1000); } void SelectWrite()//Writes the flash { PrepareFile(); if (!SlowInit()) { flp("No response!"); Serial.println(); delay(2000); return; } if (!LVL1Key()) { return; } SetSpeed(); if (kill==0) { flp("Will Write 2 blocks"); Serial.println(); flp("Block 1..."); EDC16WriteBlock("EDC16RD.CR2",7,1,1);//we write block 7 (0x1C0000-0x1FFFFF) Serial.println(); flp("Block 2..."); EDC16WriteBlock("EDC16RD.CR1",6,2,2);//then block 6 (0x180000-0x1BFFFF) Serial.println(); flp("Done!"); Serial.println(); CloseEDC16Ecu(); delay(2000); } if (kill==1)//If we wanna kill the ECU { flp("Deactivating ECU..."); EDC16WriteBlock("EDC16RD.CR2",7,1,1); flp("Done!"); Serial.println(); delay(2000); } } void EDC16WriteBlock(char filename[],byte blockno,byte pos,byte crc) { //We send the block start and size to be written if (!myFile.open(filename, O_READ)) {//We do it the fast way // if the file didn't open, print an error: flp("SD card error: Missing "); Serial.println(filename); return; } SendAddress(blockno); //We send the erase command SendErase(blockno); while (!CheckErase())//wait until flash is erased... { delay(100); } WriteEDC16FlashBlock(blockno,filename,pos); myFile.close(); if (kill==1)//if we want to kill the ECU, we dont need to send checksum, right? :D { return; } FinishWrite(blockno, crc); } void FinishWrite(byte blockno, byte crc) //CRC and other stuff that is done after writing to flash { delay(75); iso_write_byte(0x81); iso_write_byte(0x10); iso_write_byte(0xF1); iso_write_byte(0x37); iso_write_byte(0xB9); while(Serial2.available()<1) {} CheckRec(0x81); CheckRec(0xF1); CheckRec(0x10); CheckRec(0x77); CheckRec(0xF9); delay(75); for (byte crap=0;crap<2;crap++) { iso_write_byte(0x81); iso_write_byte(0x10); iso_write_byte(0xF1); iso_write_byte(0x3E); iso_write_byte(0xC0); CheckRec(0x81); CheckRec(0xF1); CheckRec(0x10); CheckRec(0x7E); CheckRec(0x00); delay(75); } SDbuffer[0]=0x8A; SDbuffer[1]=0x10; SDbuffer[2]=0xF1; SDbuffer[3]=0x31; SDbuffer[4]=0xC5; SDbuffer[5]=blockno*4; SDbuffer[6]=0x00; SDbuffer[7]=0x00; blockno++; SDbuffer[8]=blockno*4; SDbuffer[8]--; if (blockno==8)//must be incremented by one { SDbuffer[9]=0xDF; } else { SDbuffer[9]=0xFF; } SDbuffer[10]=0xFF; if (crc==1) { b=checksum1>>8; } if (crc==2) { b=checksum2>>8; } SDbuffer[11]=b;//These two bytes are the file checksum if (crc==1) { b=checksum1; } if (crc==2) { b=checksum2; } SDbuffer[12]=b; SDbuffer[13]=iso_checksum(SDbuffer,13); delay(75); WriteString(14); CheckRec(0x82); CheckRec(0xF1); CheckRec(0x10); CheckRec(0x71); CheckRec(0xC5); CheckRec(0xB9); FinalCheck(); } void FinalCheck() //We make sure that the CRC was accepted { delay(75); boolean crap=0; while (!crap) { iso_write_byte(0x82); iso_write_byte(0x10); iso_write_byte(0xF1); iso_write_byte(0x33); iso_write_byte(0xC5); iso_write_byte(0x7B); ReadString(); if (SDbuffer[3]!=0x7F) { crap=1; } delay(100); } } //Writes a block of data for a range of address void WriteEDC16FlashBlock(byte blockno, char filename[],byte pos) { long BlockStart=0; long BlockEnd; if (blockno==7) { BlockEnd=0x3E000; } else { BlockEnd=0x40000; } blockno++; byte before=0; byte Writebyte[4]; Writebyte[0]=0x00; Writebyte[2]=0x36; while (BlockEnd>BlockStart) { //build the message to be sent byte stringcount=0; while (BlockEnd>BlockStart && stringcount <= 0xF8) { BlockStart++; stringcount++; } myFile.read(SDbuffer,stringcount); Writebyte[1]=stringcount+1;//set the header with the length Writebyte[3]=iso_checksum(Writebyte,3);//calculate checksumm Writebyte[3]=Writebyte[3]+iso_checksum(SDbuffer,stringcount); //Thread composed, now need to send it for (byte sendcount=0; sendcount < 3; sendcount++)//send the header { iso_write_byte(Writebyte[sendcount]); } for (byte sendcount=0; sendcount < stringcount; sendcount++)//send the data { iso_write_byte(SDbuffer[sendcount]); } iso_write_byte(Writebyte[3]);//send the checksumm CheckAck(); if (kill==1) //If we want to kill the ECU, we dont keep on sending data, so we are done { myFile.close(); return; } byte percent=(BlockStart*100)/BlockEnd; //We calculate the percent of data written and print it back if (percent == before+10) { Serial.print(percent); flp("%"); Serial.print(".."); before=percent; } } } boolean CheckErase() //Keeps on bugging the ECU until flash is erased { iso_sendstring(5,8); while (Serial2.available()<1) { } byte crap=0; delay(1); while (Serial2.available()>0) { iso_read_byte(); SDbuffer[crap]=b; crap++; delay(1); } if (SDbuffer[3]==0x7F) { return 0; } else { return 1; } } void EDC16ReadStart(byte op) { delay(75); SetSpeed(); delay(75); if (FlashType==0)//Not yet implemented { } if (FlashType==1) { if (op==0) { iso_sendstring(11,2); } iso_readstring(5,2); } } void ReadEDC16Flash(byte op) { if (op==0) { if (myFile.open("edc16rd.skf", O_READ))//We make sure we delete any existing previous readout so we have a valid dump afterwards { myFile.remove(); myFile.close(); } if (!myFile.open("EDC16RD.skf", O_CREAT | O_WRITE))//We create the file that will contain the dump {//We do it the fast way // if the file didn't open, print an error: flp("SD card error"); Serial.println(); return; } } delay(75); flp("Reading Flash..."); byte before=0; long start=0; long End; if (op==0) { End=0x7FFFF; } while (!EDC16ReadDone) { EDC16ReadRequest();//To read the flash, we just send the address range, and the ECU will keep on sending data until it is done, so until then, we keep on sending requests EDC16ReadString(); start=start+254; byte percent=(start*100)/End;//We print the percent of dump done if (percent == (before+10)) { Serial.print(percent); flp("%"); Serial.print(".."); before=percent; } } flp("Done"); Serial.println(); myFile.close();//Close the file to save the dump! CloseEDC16Ecu();//We need to close communications with ECU after we are done } void EDC16ReadString() { byte header[5]; CheckRec(0x80);//We store the header to be able to proccess the checksum later header[0]=b; CheckRec(0xF1); header[1]=b; CheckRec(0x10); header[2]=b; iso_read_byte(); header[3]=b; if (b!=0xFF)//If the length of the packet is less than 0xFF... { EDC16ReadDone=1;//let the function know that it is the last packet that ECU will send over } CheckRec(0x76); header[4]=b; SDcounter=0; while (SDcounter < (header[3]-1)) { iso_read_byte(); SDbuffer[SDcounter]=b; SDcounter++; } //Check that the checksum is correct iso_read_byte(); byte checkCRC; checkCRC=iso_checksum(SDbuffer,SDcounter); checkCRC=checkCRC+iso_checksum(header,5); if (checkCRC != b)//This is for debugging, but we need to add resend for wrong received packets! { flp("CRC error, got "); Serial.println(b,HEX); flp("Expected "); Serial.println(checkCRC,HEX); fail=1; while(fail){} } myFile.write(SDbuffer, SDcounter); } void EDC16ReadRequest()//Sends a request for a flash data packet { delay(15); iso_write_byte(0x80);//Send the flash packet request iso_write_byte(0x10); iso_write_byte(0xF1); iso_write_byte(0x01); iso_write_byte(0x36); iso_write_byte(0xB8); } //*******************Memory addressing*************/ void SendAddress(byte blockno)// this function is checked { SDbuffer[0]=0x88; SDbuffer[1]=0x10; SDbuffer[2]=0xF1; SDbuffer[3]=0x34;//This is the address command SDbuffer[4]=blockno*4;//Start address SDbuffer[5]=0x00; SDbuffer[6]=0x00; SDbuffer[7]=0x02; if (blockno==7) { SDbuffer[8]=0x03;//This indicates the length of the block that will be written (256kb) SDbuffer[9]=0xE0; SDbuffer[10]=0x00; } else { SDbuffer[8]=0x04;//This indicates the length of the block that will be written (256kb) SDbuffer[9]=0x00; SDbuffer[10]=0x00; } SDbuffer[11]=iso_checksum(SDbuffer,11); delay(75); WriteString(12); iso_readstring(5,6);//check the ACK } void SendErase(byte blockno)//this function is confirmed { SDbuffer[0]=0x8E; SDbuffer[1]=0x10; SDbuffer[2]=0xF1; SDbuffer[3]=0x31;//This is the Erase command SDbuffer[4]=0xC4; SDbuffer[5]=blockno*4; SDbuffer[6]=0x00; SDbuffer[7]=0x00; byte endblock=blockno+1; SDbuffer[8]=endblock*4; SDbuffer[8]--; SDbuffer[9]=0xFF; SDbuffer[10]=0xFF; SDbuffer[11]=0x00; SDbuffer[12]=0x00; SDbuffer[13]=0x00; SDbuffer[14]=0x00; SDbuffer[15]=0x18;//these are static independent from the block length SDbuffer[16]=0xB5; SDbuffer[17]=iso_checksum(SDbuffer,17); delay(75); WriteString(18); iso_readstring(5,7);//check the ACK } /***************Speed handling************/// void SetSpeed() { if (!Set250kSpeed())//We will try to do the stuff fast, but if it fails, we will set a lower speed { Set124kSpeed(); } } boolean Set124kSpeed() { delay(75); iso_sendstring(6,9);//change speed to 124kbps ReadString(); if (SDbuffer[3]==0x7F) { ReadString(); } delay(75); setspeed=124800; Serial2.begin(124800); return 1; } boolean Set250kSpeed() { delay(75); iso_sendstring(6,3);//change speed to 250kbps ReadString(); if (SDbuffer[3]==0x7F) { return 0; } delay(75); setspeed=250000; Serial2.begin(250000); return 1; } /***************File handling operations**************/ void PrepareFile() { flp("Process RSA..."); if (!myFile.open("EDC16RD.skf", O_READ)){//If there is no file to encrypt... flp("Source file Error, please make sure there is a valid file inside the SD!"); } if (myFile2.open("EDC16RD.CR2", O_READ))//We remove previous files if they are present, so we dont mess it up { myFile2.remove(); myFile2.close(); } if (myFile2.open("EDC16RD.CR1", O_READ)) { myFile2.remove(); myFile2.close(); } //Encrypt first block myFile2.open("EDC16RD.CR1", O_CREAT | O_WRITE); checksum2=Encrypt(0x0000,0x40000); //Encrypt second block myFile2.open("EDC16RD.CR2", O_CREAT | O_WRITE); checksum1=Encrypt(0x40000,0x7E000); flp("Done!"); Serial.println(); delay(1000); myFile.close(); } word Encrypt(long start, long finish)//This is the function than encrypts the file to be sent to the ECU { word checksum=0; long EAX=0x10000; long ECX=0x27C0020; long EDX=0x3FE45D9A; long EBX=0x0; long ESP=0x12E794; byte EBP=0x3; long EDI=0x10000; myFile.seekSet(start); int counter=0; byte buff[128]; byte buffcount=0; while (start<finish) { EAX=EDX; ECX=EDX; EAX=EAX>>20; EAX=EAX&0x400; ECX=ECX&0x400; EAX=EAX^ECX; ECX=EDX; ECX=ECX>>31; EAX=EAX>>10; ECX=ECX&0x01; EBX=EDX; EAX=EAX^ECX; ECX=EDX; EBX=EBX&0x01; ECX=ECX>>1; EBX=EBX^EAX; if (EBX ==0) { EDI=EDI&0xFFFFFFFE; } if (EBX !=0) { EDI=EDI|0x01; } EAX=0; EDX=EDI; EDX=EDX&0x01; EDX=EDX|EAX; if (EDX ==0) { ECX=ECX&0x7FFFFFFF; } if (EDX !=0) { ECX=ECX|0x80000000; } EBP--; EDX=ECX; if (EBP ==0) { if (buffcount==0) { myFile.read(buff,128); } EAX=buff[buffcount]; checksum=checksum+EAX; buffcount++; byte a=EAX&0xFF; byte b=ECX&0xFF; a=a^b; SDbuffer[counter]=a; counter++; start++; byte c=buff[buffcount]; checksum=checksum+c; buffcount++; EBX=EBX&0xFFFFFF00; EBX=EBX+c; EAX=ECX; EAX=EAX>>8; a=EAX&0xFF; b=EBX&0xFF; a=a^b; EBX=EBX&0xFFFFFF00; EBX=EBX+a; EAX=ECX; a=EBX&0xFF; SDbuffer[counter]=a; counter++; start++; c=buff[buffcount]; checksum=checksum+c; buffcount++; EBX=EBX&0xFFFFFF00; EBX=EBX+c; EAX=EAX>>0x10; a=EAX&0xFF; b=EBX&0xFF; a=a^b; EBX=EBX&0xFFFFFF00; EBX=EBX+a; EAX=0x10000; a=EBX&0xFF; SDbuffer[counter]=a; counter++; start++; c=buff[buffcount]; checksum=checksum+c; buffcount++; EBX=EBX&0xFFFFFF00; EBX=EBX+c; ECX=ECX>>0x18; a=ECX&0xFF; b=EBX&0xFF; a=a^b; EBX=EBX&0xFFFFFF00; EBX=EBX+a; EAX--; a=EBX&0xFF; SDbuffer[counter]=a; counter++; start++; if (counter>=254) { myFile2.write(SDbuffer,counter); counter=0; } EBP=3; if (buffcount==128) { buffcount=0; } } } myFile2.close(); return checksum; } ////*****************Seed/Key operations**************////// //This is the authentication stage, the seed is requested to the ECU, and then the calculated key is sent boolean LVL3Key()//Authentication to read the flash { flp("Bypass auth..."); delay(25); iso_sendstring(5,4);//Request LVL3 security access for(byte s=0; s<10; s++) { iso_read_byte(); SDbuffer[s]=b; } b=iso_checksum(SDbuffer,9); if (b !=SDbuffer[9]) { flp("Seed CRC mismatch!"); Serial.println(); delay(2000); return 0; } long tempstring; tempstring = SDbuffer [5]; tempstring = tempstring<<8; long KeyRead1 = tempstring+SDbuffer[6]; tempstring = SDbuffer [7]; tempstring = tempstring<<8; long KeyRead2 = tempstring+SDbuffer[8]; KeyRead1=KeyRead1<<16; KeyRead1=KeyRead1+KeyRead2; if (EcuType==1) { KeyRead1=KeyRead1+0x2FC9; } SDbuffer[0]=0x86; SDbuffer[1]=0x10; SDbuffer[2]=0xF1; SDbuffer[3]=0x27; SDbuffer[4]=0x04; //Extract the key bytes SDbuffer[8]=KeyRead1; KeyRead1 = KeyRead1>>8; SDbuffer[7]=KeyRead1; KeyRead1 = KeyRead1>>8; SDbuffer[6]=KeyRead1; KeyRead1 = KeyRead1>>8; SDbuffer[5]=KeyRead1; SDbuffer [9]=iso_checksum(SDbuffer,9); //done, now send the bytes delay(25); WriteString(10); boolean check =iso_readstring(6,4); if (!check) { flp("Seed auth failed!"); Serial.println(); delay(2000); return 0; } flp("Done!"); Serial.println(); return 1; } boolean LVL1Key()//Authorisation to write the flash { flp("Bypass auth..."); delay(25); iso_sendstring(5,5);//request LVL1 security access for(byte s=0; s<10; s++) { iso_read_byte(); SDbuffer[s] = b; } b=iso_checksum(SDbuffer,9); if (b !=SDbuffer[9]) { flp("Seed CRC mismatch!"); Serial.println(); delay(2000); return 0; } //now we handle the seed bytes long tempstring; tempstring = SDbuffer [5]; tempstring = tempstring<<8; long KeyRead1 = tempstring+SDbuffer[6]; tempstring = SDbuffer [7]; tempstring = tempstring<<8; long KeyRead2 = tempstring+SDbuffer[8]; byte counter=0; long Magic1 = 0x1C60020; while (counter<5) { long temp1; tempstring = KeyRead1; tempstring = tempstring&0x8000; KeyRead1 = KeyRead1 << 1; temp1=tempstring&0xFFFF;//Same as EDC15 until this point if (temp1 == 0)//this part is the same for EDC15 and EDC16 { long temp2 = KeyRead2&0xFFFF; long temp3 = tempstring&0xFFFF0000; tempstring = temp2+temp3; KeyRead1 = KeyRead1&0xFFFE; temp2 = tempstring&0xFFFF; temp2 = temp2 >> 0x0F; tempstring = tempstring&0xFFFF0000; tempstring = tempstring+temp2; KeyRead1 = KeyRead1|tempstring; KeyRead2 = KeyRead2 << 1; } else { long temp2; long temp3; tempstring = KeyRead2+KeyRead2; KeyRead1 = KeyRead1&0xFFFE; temp2=tempstring&0xFF;//Same as EDC15 until this point temp3=Magic1&0xFFFFFF00; temp2= temp2|1; Magic1=temp2+temp3; Magic1 = Magic1&0xFFFF00FF; Magic1 = Magic1|tempstring; temp2=KeyRead2&0xFFFF; temp3=tempstring&0xFFFF0000; temp2=temp2 >> 0x0F; tempstring=temp2+temp3; tempstring=tempstring|KeyRead1; Magic1=Magic1^0x1289; tempstring=tempstring^0x0A22; KeyRead2=Magic1; KeyRead1=tempstring; } counter++; } SDbuffer[0]=0x86; SDbuffer[1]=0x10; SDbuffer[2]=0xF1; SDbuffer[3]=0x27; SDbuffer[4]=0x02; //Extract the key bytes SDbuffer[6]=KeyRead1; KeyRead1 = KeyRead1>>8; SDbuffer[5]=KeyRead1; SDbuffer[8]=KeyRead2; KeyRead2 = KeyRead2>>8; SDbuffer[7]=KeyRead2; SDbuffer [9]=iso_checksum(SDbuffer,9); //done, now send the bytes delay(25); WriteString(10); boolean check=iso_readstring(6,5);//Ack for correct key sent if (!check) { flp("Seed auth failed!"); Serial.println(); delay(2000); return 0; } flp("Done!"); Serial.println(); return 1; } //*************ECU wakeup operations****************// boolean EDC16CommonStart() { flp("Connecting..."); setspeed=10400; byte countercrap=0; boolean pitipoop=0; while (!pitipoop && countercrap<20) { pitipoop=ShortBurst(); countercrap++; } if (countercrap==20) { flp("No response!"); Serial.println(); delay(2000); return 0; } flp("Done!"); Serial.println(); return 1; } boolean Bitbang()//Since we cannot set the serial port at 5 baud, we must go digital! { serial_tx_off(); //Send address 0x01@5baud serial_rx_off(); digitalWrite(K_OUT, HIGH); delay(300); digitalWrite(K_OUT, LOW); delay(200); digitalWrite(K_OUT, HIGH); delay(200); digitalWrite(K_OUT, LOW); delay(1400); digitalWrite(K_OUT, HIGH); setspeed=10400; Serial2.begin(10400); if (!CheckRec(0x55)) { return 0; } return 1; } boolean SlowInit() { flp("Connecting..."); byte counter=0; boolean pitipoop=0; while (!pitipoop && counter<6)//We will try to connect 6 times { pitipoop=Bitbang(); counter++; } if (counter==6) { return 0; } iso_read_byte(); iso_read_byte(); delay(45); iso_write_byte(~b); CheckRec(0xFE); delay(45); iso_sendstring(4,1); iso_readstring(6,1); flp("Done!"); Serial.println(); return 1; } boolean ShortBurst() { serial_tx_off(); //disable UART so we can "bit-Bang" the fast init. serial_rx_off(); digitalWrite(K_OUT, LOW); delay(25); digitalWrite(K_OUT, HIGH); serial_rx_on_(); delay(25); iso_sendstring(4,1); byte counter=0; while (counter < 200 && Serial2.available()<1)//We will try to connect to it a few times { delay(1); counter++; } if (Serial2.available()<1) { return 0; } iso_readstring(6,1); delay(75); return 1; } /**********Response handling operations********/ void CheckAck()//Acknowledge from ECU during write proccess { CheckRec(0x00); CheckRec(0x01); CheckRec(0x76); CheckRec(0x77); } void CloseEDC16Ecu()//Closing communications with the ECU { delay(10); iso_write_byte(0x81); iso_write_byte(0x10); iso_write_byte(0xF1); iso_write_byte(0x82); iso_write_byte(0x04); CheckRec(0x81); CheckRec(0xF1); CheckRec(0x10); CheckRec(0xC2); CheckRec(0x44); } //**************Serial ports handling***************// void serial_rx_on_() { Serial2.begin(setspeed); } void serial_rx_off() { UCSR2B &= ~(_BV(RXEN2)); //disable UART RX } void serial_tx_off() { UCSR2B &= ~(_BV(TXEN2)); //disable UART TX delay(20); //allow time for buffers to flush } //***********Single byte ISO reading and writing***********// void iso_read_byte() { int READ_ATTEMPTS=600; int readData; boolean success = true; int t=0; b=0; while(t != READ_ATTEMPTS && Serial2.available() < 1) { delay(1); t++; } if (t >= READ_ATTEMPTS) { success = false; } if (success) { b = Serial2.read(); } } void iso_write_byte(byte j) { serial_rx_off(); Serial2.write(j); if (setspeed ==10400) { delay(1); } if (setspeed !=10400) { delayMicroseconds(30); } serial_rx_on_(); } //******************Read and send strings of data************// boolean iso_readstring(byte leng, byte op)//Expected strings from ECU { byte tmpc = 0; byte ff; for (tmpc=0;tmpc<leng;tmpc++) { if (op==1)//Commonstart { ff=pgm_read_byte(&EDC16_ECUBytes[tmpc]); } if (op==2) { ff=pgm_read_byte(&M58BW016xB_Read_ECUBytes[tmpc]); } if (op==3) { ff=pgm_read_byte(&Req250k_ECUBytes[tmpc]);//Answer to request to change speed to 250k } if (op==4) { ff=pgm_read_byte(&Lvl3Sec_ECUBytes[tmpc]); } if (op==5) { ff=pgm_read_byte(&Lvl1Sec_ECUBytes[tmpc]); } if (op==6) { ff=pgm_read_byte(&M58BW016xB_WriteAck_ECUBytes[tmpc]); } if (op==7) { ff=pgm_read_byte(&M58BW016xB_AddrAck_ECUBytes[tmpc]); } CheckRec(ff); SDbuffer[tmpc]=ff; } SDbuffer [tmpc]=iso_checksum(SDbuffer,tmpc); //Checks that the checksum is correct iscrc=1; boolean check= CheckRec(SDbuffer[tmpc]); if (!check) { iscrc=0; return 0; } iscrc=0; return 1; } void iso_sendstring(byte leng, byte op)//Sends a string stored in flash { byte tmpc = 0; for (tmpc=0;tmpc<leng;tmpc++) { if (op==1)//Commonstart { b=pgm_read_byte(&EDC16ArduBytes[tmpc]); } if (op==2) { b=pgm_read_byte(&M58BW016xB_Read_ArduBytes[tmpc]); } if (op==3) { b=pgm_read_byte(&Req250k_ArduBytes[tmpc]); } if (op==4) { b=pgm_read_byte(&Lvl3Sec_ArduBytes[tmpc]); } if (op==5) { b=pgm_read_byte(&Lvl1Sec_ArduBytes[tmpc]); } if (op==6) { b=pgm_read_byte(&EDC16Info_ArduBytes[tmpc]); } if (op==8) { b=pgm_read_byte(&EDC16Erase_ArduBytes[tmpc]); } if (op==9) { b=pgm_read_byte(&Req124k_ArduBytes[tmpc]); } iso_write_byte(b); SDbuffer[tmpc]=b; } b=iso_checksum(SDbuffer,tmpc); iso_write_byte(b); } void WriteString(byte leng)//Writes an entire string stored in SDbuffer { for (byte crap=0; crap<leng; crap++) { iso_write_byte(SDbuffer[crap]); } } void ReadString()//Reads an entire string and stores it to SDbuffer { while(Serial2.available()<1) {} byte crap=0; while(Serial2.available()>0) { iso_read_byte(); SDbuffer[crap]=b; crap++; delay(1); } } //***************Data handling and checks**************// //CRC calculation byte iso_checksum(byte *data, long len) { byte crc=0; for(word i=0; i<len; i++) crc=crc+data[i]; return crc; } //Checks if the byte we receive is the one we expect boolean CheckRec(byte p) { iso_read_byte(); if ( b == 0 && p != 0) { iso_read_byte(); } if ( b!= p ) { if (iscrc == 1)//This needs to be implemented, all results will return 0 now { return 0; } if (b==0) { return 0; } if (b!=0) { return 0; } } return 1; } //********************Menu and buttons handling**************// byte CheckButtonPressed()//Just waits for the user input for the next action { while(Serial.available() < 1){} optionset=Serial.read(); return 0; } //************************Other operations****************// void VariablesInit()//Restarts the variables { fail=0; setspeed=10400; success = 0; iscrc=0; EDC16ReadDone=0; checksum1=0; checksum2=0; kill=0; } void flashprint (const char p[])//Helps saving lots of RAM by storing strings on the flash { byte g; while (0 != (g = pgm_read_byte(p++))) { char j=g; Serial.print(j); } } ///////////////////////////////////
Invos Cerebral Oximeter compared with the transcranial Doppler for monitoring adequacy of cerebral perfusion in patients undergoing carotid endarterectomy. The aim of this prospective study was to assess the correlation between signals obtained during carotid endarterectomy (CEA) under local (LA) or general anesthesia from the Somanetics Invos cerebral oximeter (CO) and transcranial Doppler (TCD). Forty patients were enrolled in the study. The percentages fall in TCD mean flow velocity (FVm) and CO regional oxygen saturation (rSO2) on the ipsilateral side following clamping were recorded and the correlation coefficient and Spearman's coefficient of rank correlation were calculated. Fourteen patients were not included in the statistical analysis because either no TCD window or reliable TCD signal was obtained. The remaining 26 patients had a fall in either FVm, rSO2 or both during carotid clamping. There was a highly statistically significant correlation between the percentage fall in FVm and rSO2 with a correlation coefficient of 0.73, P<0.0001, with a 95% confidence interval (CI) for r=0.48 to 0.87; Spearman's coefficient of rank correlation (rho) =0.67, P=0.0008, with a 95% CI for rho=0.384 to 0.84. A significant decline in both TCD and rSO2 was noted in 3 patients under LA out of which 2 required shunts for alteration in conscious level. In 2 LA patients there was a significant decline in TCD but not in rSO2 and the endarterectomy was completed without a shunt. Regional oxygen saturation correlates well with FVm during carotid clamping. However, the inability to obtain reliable TCD FVm readings in 35% of patients is a serious disadvantage for this monitor. It appears that CO is a satisfactory and possibly superior device for monitoring adequacy of cerebral perfusion and oxygenation during CEA in comparison with the TCD.
Jan Mølby Jan Mølby (; born 4 July 1963) is a Danish former professional footballer and manager. As a player, he was a midfielder from 1982 to 1998. After starting his career with Kolding, he moved on to Ajax before spending twelve years playing in England with Liverpool. He was capped 33 times by Denmark, scoring twice. After leaving Liverpool he became player-manager of Swansea City, where he spent two years, and then managed Kidderminster Harriers, guiding them to promotion to the Football League in 2000. He later had a brief spell as manager of Hull City and then a brief spell back in charge of Kidderminster Harriers. Club career Born in Kolding, Mølby started his senior playing career at the biggest football club of his hometown of Kolding (Kolding), where he became team captain at the age of 19, before joining AFC Ajax, where he won the Dutch Championship in 1983. Liverpool manager Joe Fagan invited Mølby to have a 10-day trial and finally signed him on 22 August 1984. He made his debut three days later on the 25th in the 3–3 league draw with Norwich City at Carrow Road. His first goal for Liverpool came on 1 December 1984 in the 3–1 league defeat to Chelsea at Stamford Bridge. He failed to shine for Liverpool in his first season as the team endured a comparatively poor season, failing to win a major trophy for the first time since 1975. In 1985–86, new player-manager Kenny Dalglish put faith in Mølby, installing him as a regular in the first team. On a number of occasions, Mølby began matches as a third central defender or deep-lying sweeper, before moving into midfield alongside Steve McMahon, often with devastating effect, as the match wore on. He scored 21 goals in 1985–86 from midfield in what was undoubtedly his best season. The season culminated in a man of the match performance in the first-ever all Merseyside FA Cup final. Having lost the league title to Liverpool a week earlier, derby rivals Everton were looking for revenge and took a 1–0 lead into the half-time break, courtesy of a Gary Lineker strike. After the break Liverpool, led by Mølby, began to make inroads into the Blues' defence. In the 57th minute he set up the equaliser for Ian Rush and followed that up six minutes later by setting up Craig Johnston to take the lead. Mølby was also involved in the third goal, when Rush latched on to a chipped pass from Ronnie Whelan to put the final out of Everton's reach and complete the double. Mølby also began to establish himself as a regular and successful penalty taker around this time, starting with two penalties converted at home to Tottenham Hotspur in the league on 28 September 1985. Other fine performances included a brace in open play in a 3–0 home win over Aston Villa in the league on 7 December, and two goals (one a penalty) as they eliminated Manchester United from the Football League Cup in a 2–1 win at Anfield in late November. He remained a regular in the team in 1986–87, in which Liverpool finished 2nd in the League. During their Littlewoods Cup run, which ended with a 1–2 defeat at Wembley against Arsenal, he scored a hat-trick of penalties in a 4th round replay at Anfield against Coventry City. Mølby scored another penalty against Coventry in a league match at Anfield the following Saturday. During pre-season training in the summer of 1987, Mølby suffered a foot injury, which turned out to be a crucial turning point in his career. He missed the first three months of the 1987–88 season, and with the arrival of John Barnes to play on the left wing, Mølby's place in central midfield was taken by Ronnie Whelan (who had hitherto played left midfield). Whelan's partnership with McMahon proved a great success and, although Whelan was himself injured later in the season, Mølby's return to fitness came too late to resume his place in midfield, which went to Nigel Spackman for the rest of the season. He was never again an automatic choice in midfield under Dalglish as Whelan and McMahon became the first choice partnership. In 1988–89, Mølby returned to regular first team football, playing in central defence in the absence of the injured Alan Hansen, and scoring the winning goal against Manchester United at Anfield in the second league game of the season. However, in October 1988 he was sentenced to three months' imprisonment for reckless driving following an incident earlier in the year. The club decided to stand by him, and he returned to the first team in January 1989 in Hansen's continued absence, but suffered another injury in March which kept him out for the rest of the season. In April 1989, Mølby, along with his teammates, rallied round the bereaved families of the Hillsborough disaster attending a number of the funerals. In the following season, 1989–90 (Liverpool's last title-winning season to date), Mølby was a frustrated figure, unable to command a first team place despite often impressing during his occasional appearances. He started only 12 of 38 league games, although he enjoyed a successful return to the team in the championship run-in, deputising for the injured Whelan. The following season threatened more of the same for Mølby, as he was again a regular substitute. In September 1990, before an away league match against Everton, Radio 5 Live commentator Mike Ingham remarked that "Mølby's still only a substitute even though he'd probably walk into any other first division team". Later that season, after Liverpool had knocked Brighton out of the FA Cup, Brighton manager Barry Lloyd expressed bemusement in a BBC post-match interview that Mølby was not being selected regularly. Mølby was very close to signing for F.C. Barcelona in November 1990, after a fee had been agreed of £1.6 million and he had agreed a four-year contract. When he scored a penalty in a 4–0 home win over Luton Town it was expected to be his farewell to the Liverpool fans. However, this was followed by a breakdown in negotiations and he remained at Anfield. It would be more than five years before he finally did leave the club. Another injury to Whelan in a home league game against Everton in February 1991 gave Mølby another chance to re-establish himself, and he enjoyed his longest run of matches for four years. He once again became the club's regular penalty taker that season, scoring from all eight of his spot-kicks. However, after injury to McMahon and the surprise resignation of Dalglish, Liverpool could only finish runners-up in the league, despite having won their first nine matches of the campaign. After initially extolling Mølby's virtues, new manager Graeme Souness changed his mind early in the 1991–92 season, leaving Mølby out as Whelan and McMahon again started in midfield. However, after Whelan suffered another injury, he turned to Mølby, who went on to feature heavily in the Liverpool side that season, starring in the UEFA Cup and playing an important part in their FA Cup winning season. After suffering injury in a 2–2 Premier League draw against Manchester United at Old Trafford on 18 October 1992, Mølby's career began to decline. He had suffered from fluctuating weight for most of his career, routinely gaining weight when injured and unable to train. This led to longer recovery periods being required, so his injuries generally led to an absence of at least 3 months. Over the first three Premier League seasons (Mølby's last), he started just over 30 games in total and all his goals came from penalties, including one in Liverpool's first game of the 1994–95 season when Molby opened the scoring with a penalty in a 6–1 away win against Crystal Palace at Selhurst Park. Early in the 1995–96 season, manager Roy Evans loaned him out to Barnsley and Norwich (where he scored once in the League Cup against Birmingham City), and in February 1996, he finally called time on more than a decade at Liverpool to take over as player-manager of Swansea City. Just before taking the job at the Vetch Field, Ron Atkinson unsuccessfully tried to sign him for Coventry City. At that stage, still only 32, he was the youngest manager of any Football League or Premier League club. While at Liverpool, he scored a total of 62 goals, 42 of which were from penalties. During Mølby's time with Liverpool, he only failed to score three times from the penalty spot (penalties against Sheffield Wednesday and QPR in 1985–86 and Chelsea in 1989–90 were saved). His record as a penalty-taker in the top flight is thought to be second only to Matthew Le Tissier. He held the club record of most penalties scored by a Liverpool player until Steven Gerrard surpassed his record in August 2014. International career Mølby made his debut in the Danish international side at the age of 18, against Norway on 15 June 1982. He won 33 caps for Denmark from 1982 to 1990, scoring two goals. He was a squad player (appearing generally as a substitute) with the Danish international side which competed in the 1984 European Championship and 1986 World Cup. Competition for places in the Danish midfield often saw Mølby overlooked in favour of Frank Arnesen and Jens-Jørn Bertelsen. Jan Mølby's international career came to an end when Richard Møller Nielsen took over as Denmark manager in 1990. The new national manager only used Mølby in two games – both in 1990. Once as a substitute in a friendly against Wales and later in the starting line-up in the 2–0 home defeat against Yugoslavia in the qualification for the Euro 1992. Management career He became manager of Swansea City in February 1996 but was sacked in October 1997 along with his assistant, Billy Ayre. He had taken Swansea to the Division Three playoff final five months earlier, but they lost to a last-minute goal by Northampton's John Frain. A dismal start to the 1997–98 season had seen Swansea struggling near the foot of the Football League, and the board decided that it was time for a new manager to be appointed, asserting that the team's good performances the previous season were more down to Mølby's qualities as a top class player, rather than as a manager. No offers of managerial jobs were forthcoming for some time. Pursuing a career as a TV pundit, Mølby was finally offered the manager's job at Kidderminster Harriers, then in the Football Conference. He took over in April 1999. Utilising the existing squad of players, but adding his own in a few key positions (ex-Liverpool teammate Mike Marsh was drafted in to great success) Harriers won the Conference title (and promotion to the Football League) in Mølby's first season in charge. Two seasons of decent Division Three form followed, before overtures from Hull City prompted Mølby's departure for East Yorkshire. His tenure was brief however, as internal strife cast a shadow over his brief term in charge. A return to Kidderminster in October 2003 was unsuccessful, ending with his resignation a year later. Kidderminister were relegated back to the Conference that season and have yet to reclaim their Football League place. Following Kenny Jackett's resignation as Swansea manager in early 2007, Mølby was linked with a return to the club. However, Mølby has responded by saying that he is unlikely to ever return to football management. Recent years In April 2009, Mølby was made an 'Honorary Scouser' by the Lord Mayor of Liverpool. Molby appears on a podcast called "Molby on the Spot" presented by Trevor Downey from a field in rural Ireland. Statistics Honours Player Ajax Eredivisie: 1982–83 KNVB Cup: 1982–83 Liverpool Football League First Division (3): 1985–86, 1987–88, 1989–90 FA Cup (2): 1985–86, 1991–92 FA Charity Shield (3): 1986, 1988, 1989 Manager Kidderminster Harriers Football Conference: 1999–2000 References External links Official website Player profile at LFChistory.net National team profile Career information at ex-canaries.co.uk Category:1963 births Category:Living people Category:People from Kolding Category:Danish footballers Category:Denmark under-21 international footballers Category:Denmark international footballers Category:Association football midfielders Category:AFC Ajax players Category:Liverpool F.C. players Category:Barnsley F.C. players Category:Norwich City F.C. players Category:Eredivisie players Category:Premier League players Category:English Football League players Category:UEFA Euro 1984 players Category:1986 FIFA World Cup players Category:Danish football managers Category:Swansea City A.F.C. managers Category:Kidderminster Harriers F.C. managers Category:Hull City A.F.C. managers Category:English Football League managers Category:National League (English football) managers Category:Danish expatriate footballers Category:Danish expatriate sportspeople in the Netherlands Category:Expatriate footballers in the Netherlands Category:Expatriate footballers in England Category:Expatriate footballers in Wales Category:Danish poker players Category:Expatriate football managers in England Category:Expatriate football managers in Wales Category:Danish expatriate football managers Category:Kolding IF players
With a few inspired efforts and one highly regarded slasher under his belt, Dave Parker has the horror community once again buzzing, as he tackles a new chiller, ColdWater. While The Hills Run Red has earned a place among many a horrorhound’s collection, ColdWater remains, for the most part, a mystery, and as you’ll find out by reading this interview, Dave likes it that way. Of course, Dave’s an open, well-spoken guy, and he’s more than willing to share his inght into a handful of differing topics, from the best film of the year, to the release of the upcoming The Thing prequel, the man is talking; I suppose it’s time you all tuned in! Matt Molgaard/Horrorbid: First off, what inspired you to make films, and what continually draws you to the horror genre? Dave Parker: It just came to me when I was little, tting in that dark theater watching these amazing stories flash before my eyes and feeling genuine emotion while watching them, whether it was excitement, sadness, happiness, or terror. I saw how it affected a theater full of people and how that collective energy was unlike anything else I had experienced. I just knew that I wanted to be able to, even in my own small way, do that.As far as what draws me to the horror, that’s hard to answer because it’s really just an organic thing. I mean when I was a kid I was drawn to dinosaurs, and that grew to monsters like King Kong and Godzilla and then that grew to ghost stories and then to the special effects in the 80’s and on and on. The older you get the more refined your taste gets sometimes and certainly different things scare or affect you in different ways. There is always the power in good horror films to give you that rush, it does happen less and less, but there’s always that hope that you’ll see one that can give you that feeling, to make you cringe, curl up in a ball, t on the edge of your seat to see what’s going to happen next.Also the genre is limitless in what you can do. You can create new worlds and characters seemingly pulled from your own nightmares. You have the ability to mix genres to show a new take on a clasc story. It allows you to, at least at times, challenge an audience, to really make them question or think about something they might not have before. You also can just serve up really fun bloody good popcorn movie that’s a thrill ride. Like Clive Barker said – there are no limits.HB: Anyone who has (or does) inspire you? They are all great storytellers first and foremost, and if you look at what films they’ve done, even with all the amazing special effects that they have in them, it really comes down to how they tell their stories and engage an audience. Recently I’m honestly inspired by my circle of peers and people I’m lucky enough to call friends who are putting their hearts and souls into the genre. We are all doing very different kinds of movies and really doing it for the love of it. It’s a very supportive group to be apart of, and one that always makes you strive to do better. HB: Is there any chance you’d revit The Hills and give fans a sequel? DP: Well it’s really flattering that fans would like to see more, but the reality is that these things are dependent on many factors out of my control. One of course is money, does the studio that made the film, and who own the rights, feel that they made enough money to warrant doing another one? Another factor is, is the studio even making those kinds of films anymore? Another is, are there really enough fans out there that want another one? These are questions I don’t have the answers to. For my part I honestly never set out to make it a franchise, I was just trying to make the best one that I could make. Sometimes one is enough and I’m certainly okay with that. Nothing would make me happier to see it grow into something more and would love to be apart of it, if that happened. If nothing else ever happens than just that one movie, I hope that we did a good enough job for it not to be forgotten.HB: There are a lot of “slasher” figures popping up recently; quite a few have won audiences over. How do you think Babyface stacks up to villains like Victor Crowley, Chromeskull and Leslie Vernon? DP: Hmmm, that’s hard to say. I mean they are all milar and yet all very different which I think is awesome. I guess the best way to answer that is, all those killers have sequels and are emerging as franchises. They are getting a chance to explore more with those characters. So if nothing else Babyface has a little more mystery behind him which allows the audience make up their own theories about the character. That’s pretty cool. HB: There’s been plenty of chatter in regards to Coldwater. Bring me up to speed if you will: What is the film about, and when can we hope to see the film released? DP: I felt with The Hills Run Red I stepped up a notch in my directing ability, but I also realize I still have a lot to learn. The reality in this buness is that there are only so many jobs out there and you can end up hitting your head against the wall and waiting a long time to get another chance to make a movie. Or, you can go make one yourself. That’s what ColdWater is. It’s myself, and co-writer/producer/star Ivan Djurovic making our own opportunity. I really wanted to do something much different, so it was a calculated choice to make a movie that was more about creating tenon and suspense. We really want to creep the audience out and unsettle them with this movie. We want to make them question what the hell is really going on. Is it supernatural? Is it a home invaon movie? Is it both or neither? I don’t mean to sound vague, but part of what we really have committed ourselves to is not spell out what the movie is for the audience. Let them see it, go through the ride and be surprised. So much is spoiled today before people see the movie that I don’t know how the fans get excited. If you don’t have big stars and special effects, if you aren’t based on a comic book, video game or something well known, how do you get the people interested? It does make getting people to want to see and be engaged in the movie that much harder. So we’re hoping that by not telling them everything, by giving the movie some mystery, it will pull them in.Right now the movie is in the final stages of postproduction and will be playing at film festivals, and then being released sometime in 2012. For more information and inght on how we made the movie people can go to these places. HB: What are your picks for best horror films of the year thus far? DP: Indious leads the pack for me by far. I had a blast with that one and the execution in terms of filmmaking is really fantastic, and it actually scared me. It proved PG-13 horror doesn’t mean that’s it’s for kids. People forget that Poltergeist was PG when it came out, so was the 1978 Invaon of the Body Snatchers. It shows that if you have a good story, cast and a director with vion and imagination, you don’t need blood and guts for it to be a horror movie. I think that had been forgotten by the studios and fans. On the total other end of the spectrum I have to say I was really surprised how much fun I had watching Final Destination 5. Honestly I have been so immersed in making ColdWater that I’ve missed a lot. I’m playing catch up now. HB: If you had the opportunity to work with anyone in the buness, who would that be? DP: Such a hard question especially if you play by the rules and just pick one person. Who do you pick? Actor? Writer? Director? Producer? Right now today - aim high – Steven Spielberg. He would push me to do the best and make sure I had the best to work with. HB: There are a lot of remakes surfacing these days, and it seems everyone has a different opinion about rehashing old material. What’s your take? DP: My take is remakes have been around as long as movies have been being made. Sure there’s a lot of crap ones made, and made for the wrong reasons, but we’ve seen really great remakes. If there is something new, bedes better state of the art special effects, to bring to it, a new perspective or vion then I’m all for it. In the past 10 years the film industry has been remake happy because it’s eaer to market to the masses, so honestly it would be nice if they took a break from it all and let some original ideas comes out – so they can remake those in 30 years.HB: Speaking of remakes/reboots, The Thing is days away from release, and the Alien prequel, Prometheus is headed to theaters next year. Given how incredible these franchises have proven to be in the past, are you interested in either film? DP: I’m curious about The Thing, because I would love if it were a good movie and not just a rehash. Prometheus I’m definitely interested because it’s Ridley Scott. He’s just one of the finest filmmakers working today and you know he’s not going to do something he’s already mastered before. He will give us something totally new, and that’s exciting. HB: Any message for your fans out there Dave? DP: The fans are the reason people like me get to do what I do. They are the reason I want to do what I do, because I’m a fan too. For that I will be always flattered, humbled and incredibly grateful that they have been, and I hope continue to be, interested in whatever movies I get to make.
ZODB Documentation Tuesday, November 29, 2011 A new version of ZODB has been released, 3.10.5. You can find more information at python package index, http://pypi.python.org/pypi/ZODB3/3.10.5 also while lurking on the zodb-dev mailing list; it appears that ZODB 3.11 has been getting some work. It is possible Q1 2012 a new release emerges. Still looking for people who are interested in contributing to the ZODB documentation. Saturday, April 2, 2011 ZODB.org is having problems with git integration. We are temporarily moving to http://readthedocs.org to have documents built on commit. Please give us feedback! This is the first comprehensive documentation on the transaction package. ACID (atomicity, consistency, isolation, durability) is a very convienent feature of ZODB. Along with transactions it makes programming ZODB an enjoyable experience for the Python programmer. All persistent ZODB operations are controlled by commit/abort using the transaction package. Carlos describes integration points including datamanagers, synchronizers, and commithooks -- all integration points to wire custom code into participating with transactions. One such integration is zope.sqlalchemy which provides coordination of transactions between ZODB and SQLAlchemy data sources. This chapter is longer than all three of the preceding chapters. It is the first comprehensive documentation on the transaction package. And it's the first chapter to use our favorite web framework Pyramid to demonstrate usage in a web context. Remember the transaction package does not depend on the ZODB. Spread the word. Monday, November 1, 2010 Carlos has been busy polishing up for release the 3rd chapter. As I understand this is the last of the introduction to ZODB. Now the next chapters are more detailed about theory and implementation of ZODB. Explanation of MVCC, transactions, etc. You can see the latest sphinx documentation at http://www.zodb.org/zodbbook/. Thanks to Carlos and Jens for making the ZODB book building daily on zodb.org and enabling disqus on the pages. The bar for participating is very low -- please participate. Add a comment. Even if you like it. We need to hear more peoples thoughts. The draft for chapter three of the ZODB book is now in the github repository. There is now enough material that we felt ready to put it up somewhere for easy reading and possibly a bit of discussion. Jens Vagelpohl helped me get it up on the zodb.org web site and I added Disqus comments to the text. We'd very much appreciate any feedback on the work so far. Tuesday, September 21, 2010 August saw no advance on the book due to vacation time and the mad overwork period that usually follows. However, the draft for chapter two is now available on github, for those who'd like to review it. A word of warning, though. People with experience on the ZODB will most likely find the material and tone are way too entry-level to be useful for them. That is because the audience that we will try to reach with part one of the book are Python developers in general. We assume no knowledge of the ZODB, not even of its existence. If you look at the book outline, you'll see that the book is divided in three parts. The first part is this beginners guide, while the second part will contain much more detailed and advanced information. So, what I'm saying is, please be patient. I'll try to get going something from the second part for the next update. Wednesday, August 4, 2010 A draft of the first chapter of the ZODB book has been committed to our GitHub repository. It's just the introductory chapter, so it might not seem like much. However, the introduction is very important when starting a technical book, since it sets the tone and helps define the audience more clearly. If you can spend a few minutes to read it and comment, that would be very helpful. By the way, there is now a portlet at the top right of the blog that shows the latest commits to the repository. This may make it easier to keep track of the book's progress.
Title Authors Document Type Article Publication Version Published Version Publication Date 1992 Journal or Book Title Transactions of the ASAE Volume 35 Issue 6 First Page 1859 Last Page 1867 Abstract Fines (material smaller than whole corn kernels) are troublesome and continually increase as corn lots move from harvest to utilization. This article reviews characteristics of fines in corn, including constituents, size distribution, nutritive and economic values, density, and airflow resistance, and presents analysis of them. These characteristics are related to corn grading, handling, and processing issues. Comments This article is from Transactions of the ASAE 35 (1992): 1859–1867. Posted with permission.
DiCaprio is at the top of his game, with everyone buzzing about Inception. He has a seat at any Martin Scorsese table read and has solidly moved from teen heartthrob to serious leading man. If anyone could actually save a Mel Gibson project, it would be him. So good for Leo for putting ethical concerns before a buck, if the reports are indeed true. I would hope most actors would shy away from working with Mel Gibson after his misogynistic, racist, and violent rants were made public. There's no denying he's a sick man with little value for women, minorities, or even the safety of his own baby. The real news will be if Mel gets another project -- who will line up to work with him?
Q: PlaceAutocompleteFragment - null cannot be cast to non-null type (Kotlin) I'm trying to add a Place Autocomplete Fragment into my fragment by following the official documentation here I get the error kotlin.TypeCastException: null cannot be cast to non-null type com.google.android.gms.location.places.ui.PlaceAutocompleteFragment I get that PlaceAutocompleteFragment can't be set to null, so i've tried added an if statement in my getAutoCompleteSearchResults() to check if fragmentManager != null, but no luck still AddLocationFragment.kt override fun onCreate(savedInstanceState: Bundle?) { super.onCreate(savedInstanceState) getAutoCompleteSearchResults() } private fun getAutoCompleteSearchResults() { val autocompleteFragment = fragmentManager?.findFragmentById(R.id.place_autocomplete_fragment2) as PlaceAutocompleteFragment autocompleteFragment.setOnPlaceSelectedListener(object : PlaceSelectionListener { override fun onPlaceSelected(place: Place) { // TODO: Get info about the selected place. Log.i(AddLocationFragment.TAG, "Place: " + place.name) } override fun onError(status: Status) { Log.i(AddLocationFragment.TAG, "An error occurred: $status") } }) } } XML for the fragment: <?xml version="1.0" encoding="utf-8"?> <android.support.constraint.ConstraintLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:background="@android:color/darker_gray" tools:context=".AddLocationFragment" tools:layout_editor_absoluteY="81dp"> <fragment android:id="@+id/place_autocomplete_fragment2" android:layout_width="0dp" android:layout_height="wrap_content" android:name="com.google.android.gms.location.places.ui.PlaceAutocompleteFragment" android:theme="@style/AppTheme" app:layout_constraintStart_toStartOf="parent" app:layout_constraintTop_toBottomOf="@+id/etAddress" app:layout_constraintEnd_toEndOf="parent"/> </android.support.constraint.ConstraintLayout> A: i figured it out. Since i'm trying to find a fragment within a fragment, i have to do the following: val autocompleteFragment = activity!!.fragmentManager.findFragmentById(R.id.place_autocomplete_fragment2) as PlaceAutocompleteFragment We need to get the parent activity
# Created by: Johannes M Dieterich <jmd@FreeBSD.org> # $FreeBSD$ PORTNAME= flang-clang DISTVERSION= 7.0-g20191020 CATEGORIES= devel lang MAINTAINER= jmd@FreeBSD.org COMMENT= Fortran compiler targeting LLVM (modified clang part) LICENSE= LLVM LICENSE_NAME= LLVM Release License LICENSE_FILE= ${WRKSRC}/LICENSE.TXT LICENSE_PERMS= dist-mirror dist-sell pkg-mirror pkg-sell auto-accept ONLY_FOR_ARCHS= amd64 LLVM_VER= 70 BUILD_DEPENDS= llvm${LLVM_VER}>=0:devel/llvm${LLVM_VER} RUN_DEPENDS= llvm${LLVM_VER}>=0:devel/llvm${LLVM_VER} USES= cmake gnome libedit perl5 python shebangfix tar:xz USE_LDCONFIG= ${PREFIX}/flang/lib USE_GNOME= libxml2 SHEBANG_FILES= tools/scan-view/bin/scan-view \ tools/clang-format/git-clang-format \ tools/clang-format/clang-format-diff.py \ utils/hmaptool/hmaptool USE_GITHUB= yes GH_ACCOUNT= flang-compiler GH_PROJECT= flang-driver GH_TAGNAME= 984936a CMAKE_ARGS+= -DLLVM_CONFIG=${LOCALBASE}/bin/llvm-config${LLVM_VER} \ -DLLVM_DIR=${LOCALBASE}/llvm${LLVM_VER}/lib/cmake/llvm CMAKE_INSTALL_PREFIX= ${PREFIX}/flang CC= ${LOCALBASE}/llvm${LLVM_VER}/bin/clang CXX= ${LOCALBASE}/llvm${LLVM_VER}/bin/clang++ post-patch: @${REINPLACE_CMD} -e 's|%%LOCALBASE%%|${LOCALBASE}|' ${WRKSRC}/lib/Driver/ToolChains/FreeBSD.cpp post-install: @${GZIP_CMD} ${STAGEDIR}/${PREFIX}/flang/man/man1/scan-build.1 ${RLN} ${STAGEDIR}${PREFIX}/flang/bin/flang ${STAGEDIR}${PREFIX}/bin/flang .include <bsd.port.mk>
Balthasar H. Meyer Balthasar Henry Meyer (May 28, 1866 – February 9, 1954) was an American government official and professor of economics and sociology. He served for 28 years as a member of the Interstate Commerce Commission. Early life Meyer was born near Mequon, Wisconsin, the son of Henry and Louise (Wiepking) Meyer. He attended Oshkosh State Normal School, receiving his bachelor's degree, and then took two degrees, including his doctorate in 1897, from the University of Wisconsin, after doing graduate work at the University of Berlin in 1894–95. He taught school from 1884 to 1886. He was principal of the Fredonia, Wisconsin, schools from 1887 to 1889. He was principal of the high school at Port Washington, Wisconsin, from 1889 to 1892. After receiving his degrees, he stayed on in Madison to be a sociology instructor. He was promoted to assistant professor in 1899, and to full professor of political economy in 1900. While there, he taught what is believed to be the first course in insurance in the United States. He married Alice Elizabeth Carlton of Wauwatosa, Wisconsin, on August 29, 1901. Government official In 1905, he took leave from his professorship to become a member of the Wisconsin Railroad Commission, and then, in 1907, became its chairman. In 1910, President William Howard Taft appointed him to the U.S. Railroad Security Commission. In 1910, Taft appointed him to the Interstate Commerce Commission. Confirmed by the Senate on December 21, 1910, he took the oath of office on December 31, 1910. Meyer was thereafter appointed to successive terms by Presidents Wilson, Coolidge, Hoover, and Franklin Roosevelt. Following his 1939 retirement, he served as a consultant and mediator for the transportation industry. Meyer also gave attention to improving the ICC's internal capabilities. Meyer and his ally, fellow Commissioner Franklin K. Lane, supported increasing the Commission's ability to compute marginal rates, and the Commission engaged noted economist Max O. Lorenz (inventor of the Lorenz curve) for this task. In 1937, Meyer was attacked by Senator Harry S. Truman for allegedly giving a railroad attorney information about a 1932 Commission decision before it was publicly released. Meyer explained that while he had no recollection of the specific case, it was routine in uncontested cases such as this to give information to the applicant without waiting for a formal decision. While Meyer's fourth and final term expired in 1938, he continued to serve until the following year pending Senate confirmation of a replacement. President Franklin D. Roosevelt appointed Representative Thomas R. Amlie. The Amlie nomination proved contentious and was withdrawn, and Meyer, wishing to retire, resigned on May 1, 1939. Meyers wrote several books about the transportation industry, including Railroad Legislation in the United States (1903) and History of Transportation in the United States before 1860 (1917). He was a member of the American Economic Association, the American Academy of Political and Social Science, the Wisconsin Academy of Letters Arts and Sciences, the Wisconsin Educational Round Table, the Wisconsin Teachers' Association, the Press Club of the University of Wisconsin, and the Wisconsin Historical Society. Writings and publications Notes External links Category:1866 births Category:1954 deaths Category:People from Mequon, Wisconsin Category:University of Wisconsin–Oshkosh alumni Category:University of Wisconsin–Madison alumni Category:University of Wisconsin–Madison faculty Category:People of the Interstate Commerce Commission Category:Writers from Wisconsin
Few if any other cable news analyst, commentator, or host has this issue with maintaining a level of decorum on set or respect for their fellow guests the way that CNN’s Angela Rye does. On Wednesday night, Rye’s disdain for respectful discourse surfaced on Erin Burnett OutFront as she insisted that “America has never been great” and not only rolled her eyes but turned away from the camera at the notion of Trump campaign board member Gina Loudon have an adopted minority son with Down Syndrome. Rye first was incensed by Loudon’s points about the lack of diversity within the Trump White House and that while she wants to see more diversity there, it’s been difficult for anyone to express even tepid support for the President without being ostracized. Nonetheless, Loudon argued that presidents not having a minority-laden stuff didn’t exactly guarantee success/failure as the real focus should be on the positive policies coming as a result of the Trump presidency. Given a chance to respond, Rye lashed out (click “expand” for more): RYE: I think I got stuck at Gina saying that American presidents have done a great deal for people of color like ending slavery? Like I think I'm stuck in 1865 right now. Like I can't believe that's the justification. LOUDON: That was a Republican president. RYE: You know what, sis? And that's great, but you just really missed the mark. For you to have to say, right, that we don't necessarily need diversity in this White House. LOUDON: That's not what I said. That is not what I said. RYE: Let me just tell you what I heard because I don't think you hardly understand. LOUDON: No because I want to address my words, Angela. RYE: White — because Gina, what you're not going to keep doing is talking over me because my black life matters and so does my voice. So, what you’re going to do right now is listen to what I'm saying to you. What you said was deeply offensive and what I am telling you is you can't say, at least you shouldn't feel comfortable saying it in 2018 that, you know, this White House not having diversity can be akin to presidents who didn't have any black people on their staff....but for slavery, freeing slaves. Like that's not okay in 2018....Ma’am, I let you talk through all of that nonsense. I just need you to let me finish my point[.] Rye insisted that Loudon should kill “those talking points tonight” because “they should never be resurrected” and that she shouldn’t dare cite HUD Secretary Ben Carson as a black member of the administration. Loudon told Rye that “I understand your feelings on this” and Rye said “no, you don’t” on race, so Loudon revealed this as Rye rolled her eyes, sighed, and turned her head away from the camera (click “expand” to see more) LOUDON: I have — I have an adopted minority son, yes, I do, who happens to have Down's Syndrome and he experiences bigotry every single day in a myriad of ways, not just skin color, but also because of his disability and I understand that you and I don't agree, but I would not support a president I believed would be a threat to his future. So, what I would like to have — RYE: Well, you are. LOUDON: — is a constructive conversation and I think, you know, I think points like yours that are — that are focusing only on the negative and not even acknowledging 700,000 new jobs for black people in this country, record low unemployment[.] Okay, so to recap, Rye basically mocked her guest for having a minority son with Down Syndrome and suggested that Loudon is a danger to her own child’s future. How tasteless. It got worse as Loudon brought up New York Democratic Governor Andrew Cuomo’s insistence that America was never great and Rye agreed as she shouted over Loudon And America has never been great. It is not great because people like you come on and lie for the president of the United States and then — and then — and then tout, bring out your son as an example? You should be completely ashamed of yourself. All the while, Burnett did nothing to interject or call out Rye’s immature antics. This is CNN. (h/t: our friend Amber Athey with the Daily Caller) To see the relevant transcript from CNN’s Erin Burnett OutFront on August 15, click “expand.”
McClain was attempting to cross Route 14 from north to south near D’Andrea Banquet’s on his bicycle when he struck an eastbound vehicle, a news release stated. He was not wearing a helmet. He died from severe chest trauma, the McHenry County Coroner's Office said. The driver of the vehicle was not injured, and no citations have been issued. Traffic was diverted in the area for more than three hours. The investigation is ongoing. sizzling summer special Subscribe now to get full, unlimited access to NWHerald.com for just $7.99 per month. Save 38%!
Pages Tuesday, August 21, 2012 When Your day Starts With... Alison, you live on a farm. With horses. You are quite familiar with 'literal shit', as a matter of fact you spend your mornings literally moving 'literal shit'. Quite right, italics voice, however, this day started off a little differently. I poured myself out of bed on this fine Monday morning (insert appropriate 'I hate Mondays' look here), pulled on my wonderful bright yellow muck boots (first good choice of the day) and headed out to the barn to feed, turn out then clean only to step in THIS as soon as I entered the barn: This is not the actual pile I stepped in. This is a borrowed image representing the actors portrayalof the incident because my camera was out of battery All over my aisle mats... cow manure!One of your horses could have gotten out and left that mess, you know. No. No they could not have. For one, all four horses were happily chowing down in their respective stalls, for the other all horse people are some what obsessed with the bodily functions of their horses... Are they pooping enough? Too much? Has the consistency changed? Do they need to be wormed? Are they dehydrated? Sick? Is there and impaction? Oh god, it's colic! Moral of this story is that horse people know their poo. This, for instance, is horse poo. What was in my barn aisle was NOT horse poo. It was cow poo. Which means that at some point last night, a cow moseyed into my yard, infiltrated my barn, was herded out and headed home all without waking me or my useless useless dogs. Comforting. Now, what kind of person comes to their neighbors farm in the middle of the night to collect their wayward livestock and doesn't come back to clean up the mess left by said livestock? Sigh. Fortuneatly I had stellar rides on RC, Delight, and Tilly that afternoon, so my day wasn't bad at all. Though I could have used a nap...
#!/usr/bin/env python # Rekall # Copyright 2016 Google Inc. All Rights Reserved. # # Authors: # Michael Cohen <scudette@google.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or (at # your option) any later version. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """Installation and deployment script.""" __author__ = "Michael Cohen <scudette@google.com>" import os import sys from setuptools import find_packages, setup, Command ENV = {"__file__": __file__} exec(open("rekall_lib/_version.py").read(), ENV) VERSION = ENV["get_versions"]() rekall_description = "Rekall Support Libraries" def find_data_files(source): result = [] for directory, _, files in os.walk(source): files = [os.path.join(directory, x) for x in files] result.append((directory, files)) return result install_requires = [ "arrow==0.10.0", "future==0.16.0", # We need to upgrade but this seems to break Rekall. # "sortedcontainers >= 2.0, < 3.0", "sortedcontainers==1.5.7", ] data_files = (find_data_files("test_data") + find_data_files("messages")) class CleanCommand(Command): description = ("custom clean command that forcefully removes " "dist/build directories") user_options = [] def initialize_options(self): self.cwd = None def finalize_options(self): self.cwd = os.getcwd() def run(self): if os.getcwd() != self.cwd: raise RuntimeError('Must be in package root: %s' % self.cwd) os.system('rm -rf ./build ./dist') commands = {} commands["clean"] = CleanCommand setup( name="rekall_lib", version=VERSION["pep440"], cmdclass=commands, description=rekall_description, long_description="Support libraries for the Rekall framework.", license="GPL", url="https://www.rekall-forensic.com/", author="The Rekall team", author_email="rekall-discuss@googlegroups.com", classifiers=[ "Development Status :: 4 - Beta", "Environment :: Console", "Operating System :: OS Independent", "Programming Language :: Python", ], package_dir={'.': 'rekall_lib'}, packages=find_packages('.'), data_files=data_files, entry_points=""" """, zip_safe=False, install_requires=install_requires, test_suite="nose2.collector.collector", )
Q: Access WebSphere Application Server resources from the adapters Which is the relation between the adapters and WAS? Is the adapter executed inside the webcontainer? For example using java inside the adapters do I have access to the WAS resources like jdbc datasources or distributed map cache or ....? Can I use the dynacache of WAS for HTTP Adapters? For caching the adapter response and also for caching the final services, invoked from the adapter, response. Thank you. A: You can access these resources using Java through adapters. I have used adapters calling Java and JDBC datasources to return stored procedure out parameters (not supported in the SQL adapters). Here is an article to invoke EJB 3.1 statelesss session beans from an adapter and the EJB client: https://www.ibm.com/developerworks/community/blogs/e4210f90-a515-41c9-a487-8fc7d79d7f61/entry/part_5_integrate_the_ibm_worklight_adapter_with_ejb_3_1_application?lang=en
Fossil Fuels Re "For students, fossil fuels become an issue of conscience," Aug. 26 Congratulations to the students of San Francisco State University who persuaded the trustees of their college to divest from fossil fuel companies. However, this article has an egregious omission: the carbon bubble. This bubble will likely pop and fossil fuel stocks will crash in the next decade or so if we are to preserve the planet for future generations. According to the climate change activist group 350.org, the planet cannot handle more than 565 gigatons of carbon emissions before 2050. Pitzer College, a liberal arts school in Claremont, has joined the vanguard of U.S. campuses deciding to sell off its investments in fossil fuel companies as a statement of concern about global warming. Pitzer's board of trustees recently voted to approve a divestment plan to sell off about $4.4 million in fossil-fuel related investments, mainly in oil and gas companies, by the end of this year from the school's $125-million endowment. The remaining $1 million or so in fossil fuels investments, mainly those in large multi-industry funds, will be sold off soon after, officials said. Re "Energy boom may augur a new export era," March 23 Every dollar invested to expand the use of fossil fuels here or abroad is a bad investment. Spending a single penny or drilling any new wells to find more dirty energy is wrongheaded. We have more fossil fuels in the ground than we can afford to burn. To avoid a climate catastrophe, most of that dirty energy must remain where it is. Talking about gas as if it were the 1970s is not productive. We must go green by passing a revenue-neutral carbon tax. Our country can be off fossil fuels within the next few decades - or even sooner once entrepreneurs and innovators understand that the days of dirty energy are over. Re "Energy boom may augur a new export era," March 23 Every dollar invested to expand the use of fossil fuels here or abroad is a bad investment. Spending a single penny or drilling any new wells to find more dirty energy is wrongheaded. We have more fossil fuels in the ground than we can afford to burn. To avoid a climate catastrophe, most of that dirty energy must remain where it is. Talking about gas as if it were the 1970s is not productive. We must go green by passing a revenue-neutral carbon tax. Our country can be off fossil fuels within the next few decades - or even sooner once entrepreneurs and innovators understand that the days of dirty energy are over. Renewable energy is surpassing fossil fuels for the first time in new power-plant investments, shaking off setbacks from the financial crisis and an impasse at the United Nations global warming talks. Electricity from the wind, sun, waves and biomass drew $187 billion last year compared with $157 billion for natural gas, oil and coal, according to calculations by Bloomberg New Energy Finance using the latest data. Accelerating installations of solar- and wind-power plants led to lower equipment prices, making clean energy more competitive with coal. Here's the president on March 31, announcing his plan to lift a longstanding moratorium on offshore drilling: "Given our energy needs, in order to sustain economic growth and produce jobs and keep our businesses competitive, we are going to need to harness traditional sources of fuel even as we ramp up production of new sources of renewable, homegrown energy." And here he is on May 26, as political pressure started to really build over BP's hole in the bottom of the sea: "We're not going to be able to sustain this kind of fossil fuel use. The planet can't sustain it." Last week, the Senate voted on a proposal by New Jersey Sen. Robert Menendez to end some of the billions of dollars in handouts enjoyed by the fossil-fuel industry. The Repeal Big Oil Tax Subsidies Act was a curiously skimpy bill that targeted only oil companies, and just the five richest of them at that. Left out were coal and natural gas. Even so, the proposal didn't pass. But that hasn't stopped President Obama from calling for an end to oil subsidies at every stop on his early presidential-campaign-plus-fundraising blitz. World leaders at the Group of 20 summit are set to pledge to phase out subsidies for fossil fuels, according to a copy of a declaration scheduled for release this afternoon. The pledge is purposely vague, though it clearly intends to eliminate tax breaks and direct government assistance for oil, coal and other fossil fuels. It does not set a date for that subsidy phaseout, nor does it specify what would count as a "subsidy" or how countries would police compliance. Environmentalists hailed the pledge as a building block for international efforts to curb global warming and as a small burst of momentum in the run-up to international climate change treaty negotiations in Copenhagen in December. President Obama on Tuesday night capped his Oval Office address on the massive gulf oil spill with a call for new efforts to reduce U.S. dependence on oil, saying "the tragedy unfolding on our coast is the most painful and powerful reminder yet that the time to embrace a clean-energy future is now." In a bow to political reality and the still-troubled economy, however, he stopped short of spelling out specifics for dealing with a problem that has bedeviled presidents since Richard Nixon in the 1970s and goes straight to the heart of such bread-and-butter issues as consumer prices, jobs and the viability of major industries. A U.N. scientific panel on climate change says it is now convinced that global temperatures have warmed over the last century because of human activity, a newspaper reports today. The experts say new computer studies have given them confidence in data that suggests the cause of the global temperature rise of 1 degree Fahrenheit since 1900, the New York Times said. SACARAMENTO - Californians, who already pay some of the highest gasoline prices in the nation, could soon be asked to pay more. Pump prices are likely to climb more than 12 cents per gallon starting Jan. 1, both the oil industry and environmental experts agree. That's when the state's complex cap-and-trade system for pollution credits expands to cover vehicle fuels and their emissions. As a result, gasoline producers would need to buy pollution credits, and they are expected to pass the cost along at the pump. Re "Free the pipeline, Obama," Opinion, Feb. 4 Those who oppose Keystone XL aren't doing so primarily to make the pipeline a "litmus test issue for climate seriousness," as Jonah Goldberg writes. Rather, they're taking a principled stand. We must stop the juggernaut of business-as-usual that is leading inexorably to climate disruption. Environmentalists recognize that our civilization depends on vast amounts of energy and we cannot stop using fossil fuels overnight. But with more frequent extreme weather showing up right on schedule and rising sea levels, we absolutely must replace fossil fuels with sustainable energy as soon as possible. Tom Steyer is standing upright near the corner of a small, beige meeting room at Georgetown University, arms at his sides, eyes shut intently. Half a dozen ministers and priests surround him, laying hands on his torso. Together, the pastors begin to pray, asking for divine help in shaping public opinion: "Soften them.... Open them to you … for your purpose.... Claim the promise made to Moses. " It is a curious warmup for a technical conference about an oil pipeline. But like many other environmentalists concerned that America is dawdling as the world burns, these ministers, each a leader in efforts to mobilize churchgoers against climate change, see Steyer as, quite literally, a godsend. Re "Studies raise urgent climate alarms," Dec. 4 It's senseless to argue that burning fossil fuels isn't driving the rise of heat-trapping greenhouse gases in the atmosphere to levels that scientific core samples show have not been seen in millions of years. Clearly the Earth's internal system of environmental balances can be pushed out of whack by human actions. Foolish farming practices caused the Dust Bowl, and it didn't take centuries. I hope we are not past the global warming tipping point. Re "Governor signs emissions pact with neighbors," Oct. 29 Gov. Jerry Brown is right to seek new ways to address climate change, but he's sabotaging his own efforts by greenlighting fracking for dirty oil in our state. The governor's support for fracking is out of step with both climate science and the electorate here, where a poll this summer found that 58% of Californians want a moratorium on the practice. To have a decent chance of avoiding the worst impacts of climate change, we have to leave most fossil fuels buried safely in the ground, as noted by the recently released report from the Intergovernmental Panel on Climate Change. WASHINGTON - A new study has detected air pollutants, including carcinogens, in areas downwind of Canada's main fossil fuel hub in Alberta at levels rivaling those of major metropolises such as Beijing and Mexico City. The study by researchers from UC Irvine and the University of Michigan also found a high incidence of blood cancers such as leukemia and non-Hodgkin's lymphoma among men in the area, compared with the rest of Alberta and Canada. "When you get cancers that can be caused by the carcinogens we are seeing, that is reason for concern," said Isobel J. Simpson, a lead author of the study and a researcher at UC Irvine's chemistry department. Re "The Highest Patriotism Lies in Weaning U.S. From Fossil Fuels," Commentary, Dec. 2: Robert Redford has it right. While California is making a determined effort to encourage energy conservation through legislation and public advertisements, with good initial success, the Bush administration gives only minimum lip service to this critical need. As seen in California, the public is ready and willing to make sacrifices if called upon by its leaders. Is the White House so deeply obligated to big oil and other energy corporations that it is unable to call upon the public to conserve energy? Corals and other marine creatures are threatened by chemical changes in the ocean caused by the carbon dioxide from burning fossil fuels, a panel of scientists warned Wednesday. Much of this added carbon dioxide is dissolving in the oceans, making them more acidic. Such a change can damage coral and other sea life, according to the panel of researchers convened by the National Science Foundation, National Oceanic and Atmospheric Administration and U.S. Geological Survey. Re "For students, fossil fuels become an issue of conscience," Aug. 26 Congratulations to the students of San Francisco State University who persuaded the trustees of their college to divest from fossil fuel companies. However, this article has an egregious omission: the carbon bubble. This bubble will likely pop and fossil fuel stocks will crash in the next decade or so if we are to preserve the planet for future generations. According to the climate change activist group 350.org, the planet cannot handle more than 565 gigatons of carbon emissions before 2050. In the 1980s, student protests against apartheid led universities to sell off stocks in companies doing business in South Africa. More recently, concerns about genocide in Darfur, the health effects of tobacco and handgun violence led to more college divestments. Now another issue - the effect of fossil fuels on global temperatures - is rousing a new generation of student activists to press their schools to drop coal, petroleum and natural gas investments from campus endowments. Student campaigns, such as "Fossil Free UC," are underway at about 300 colleges and universities nationwide, organizers estimate.
725 F.2d 671 U.S.v.Faison (James Raymond) NO. 83-5364 United States Court of Appeals,Third circuit. DEC 19, 1983 Appeal From: D.N.J., Biunno, J., 564 F.Supp. 514 1 AFFIRMED.
Over-expression of heat shock proteins in carcinogenic endometrium. We have previously shown that the subcellular localization of beta-catenin changes according to the cell proliferation status of the human endometrium, suggesting a role of intercellular transduction in cell growth control in human endometrium not only in the physiological but also in the carcinogenic condition. To further study the possible role of heat shock proteins (HSPs) in growth control, we immunohistochemically analyzed 92 endometrial samples, 30 of normal endometrium, 20 of endometrial hyperplasia and 42 of endometrial cancer, for expression of HSP27, HSP70, HSP90, estrogen receptor (ER) and progesterone receptor. HSP27 and HSP90 were detected in endometrial epithelium strongly in the proliferative phase and weakly in the secretory phase during the menstrual cycle according to the serum estradiol level. However, they were over-expressed in endometrial hyperplasia, especially HSP27. In endometrial cancer, HSP27 expression was heterogenic among the glands and lower than that in the proliferative phase and endometrial hyperplasia. HSP27 over-expression was also observed in samples including endometrial cancer and associated hyperplasia. Results of Western blotting followed those of immunohistochemistry. HSP70 was not changed during the menstrual cycle, as HSP27 and HSP90 were, and was rather stably expressed in endometrial hyperplasia and cancer. Our results suggest that HSP27 and HSP90 contribute to cell proliferation in endometrial epithelium and that over-expression of HSP27 in endometrial hyperplasia occurs as a result of the activated condition of ER, though in cancer it decreases according to the loss of function of ER.
Share this: As an organization, the Red Sox put up with a lot from Manny Ramirez. Usually, it was in their best interest to do so. So maybe he showed up late to spring training, maybe he would take a day off from time to time, maybe he didn't bust it down the line on every ground ball, but, well, the good generally outweighed the bad. The same could be said for the fans. They put up with the bad because the good was, quite simply, really, really good. Despite this shaky track record in Boston, there is one precise moment in which Manny crossed the line, and it took place in the visitors' locker room at Minute Maid Park. With the Red Sox in Houston for an interleague series in late June of 2008, Ramirez reportedly requested 16 tickets to a game without giving a day's notice. Jack McCormick, the Sox' traveling secretary, informed Ramirez that he may not be able to supply him with that many tickets, which set Ramirez off. Ramirez, according to reports, shouted, "Just do your job!" at McCormick, and an argument ensued. When it ended, Ramirez had pushed McCormick to the ground. McCormick was 64 years old at the time. Despite the altercation, Ramirez was in the lineup that day, and, in typical Manny fashion, he went 1-for-2 with two RBIs and two runs scored. Normally, that type of performance would nullify the negative effects of Manny's actions, but this time, things were clearly different. Many of Manny's biggest fans argued that McCormick, a former police officer, was not some frail, old man. That was obviously not a winning argument. Manny was not suspended, but he was fined. He apologized to McCormick behind closed doors, only telling the media, "That's over. We're fine now." Perhaps, in the short term, Ramirez, McCormick and the Red Sox were fine, but the incident marked a turning point in the enigmatic slugger's relationship with the team. For the first time since the Sox put Ramirez on irrevocable waivers in October of 2003, it seemed that Ramirez's time with the club was actually nearing its end. His teammates, including his unofficial spokesmen David Ortiz and Mike Lowell, no longer seemed amused to have to answer questions about him. Obviously, Manny had done some stupid things in the past, but this one was clearly different. He crossed a line that no man should ever cross. Though the Red Sox didn't point to the incident as the major driving force that pushed the superstar out of town for good, it's hard to look back and see it as anything else. Each day leading up to Manny's return to Boston on June 18, NESN.com will run through one highlight and one lowlight from his career with the Red Sox.
Swiss Cheese Land By franki786 Watch 4 Favourites 0 Comments 986 Views Rendered this one out this morning. What do you think? Hope you like it, and if so, watch for more! Here's the params if you wanna use them: Mandelbulb3Dv18{ g.....k1...E9...w....2....kXF9ohKF9uzusyAa3b6/tjMBAb3kkUcyXzeIeP6a/tzkuTS1xZ6Nyj ................................j1GB0jrQ8/2........Y./..................y.2...wD ...Uz6....k4..../M.0/......X....a0....E3.....wintT027MlD/..........G1dkpXm1..... //....kD12../2........./.pAnAnAnAHxjOaNaNaNa/.A...........U0.....y1...sD...../.. .z1...sD.tPaxzARHw9ZEZQ/gYzvygLPe6AAJAkDXBESET47ZvfwTMeD/6N3z86JzOvbfoiDUZjzg59. 2wXrGxszzb7sy.LSP1UN4ClDU.....Ib..............sD.6....sD..G..................... .............oAnAt1...sD....zw1.........................................c....k1. .....Ksulz1.....yyDy0sdbSK.U.66.x....w0....U......z17.5.kQ.B....6/...6ov....SNbW ...U.4YQ3yQdk8euU3aVJIJJz1c62k/.zzSi1.kzfUhpuN.k6sEaqWXXzzv.o........Ek26VDMVN6. .A72QifFDzH.H0/bvOonz0........../6U0.YnFP/..fjrwdvgqz60Fbf24LNyD/.........E.2c.. zzzz.................................2./8.kzzzD............8.................... /EU0.wzzz1...................................wjoG1.E./2EexEe4LD../2E.3m5U08c..2E ./oSi.8cU0.E./2EFonzTz9../2E.VSGU08c..2E./2zJ/8cU0.E./2Ez4ajHXD../2E.VQPU08c..2E ./okulfrS1.E./2E...cU08czz/cU08cyz1cU08cxz3cU08c................................ E....6E.F2U5....I....c.....FjFKNX34OZFaQjtKG4B3...........................U/4MU/ 4M........U0LD8QxcQ/.xllMe7Wy1zD...........GdzmBjPwoz........UtD................ ................................................................................ .....................I.....3....4....2JRVFqA274................................. ......U......................4zD.......k..2.......M../..................2.2..... ..kF./.......................................................................... ................................} {Titel: swiss_cheese_land} IMAGE DETAILS Image size 3840x2880px 6.31 MB Show More Published : Mar 14, 2016
Golf tournament boosts program that builds homes for wounded veterans Monday Jul 30, 2007 at 12:01 AMJul 30, 2007 at 1:33 AM Monday, more than than 100 golfers teed off as part of the second annual 890 ESPN Boston Celebrity Golf Invitational at the Hopkinton Country Club to benefit a program that builds homes for severely wounded veterans. John Gonsalves' life changed three years ago when he saw a news report about an American soldier who had lost both of his legs while serving in Iraq. Touched by the soldier's plight, the Wareham-based construction supervisor and contractor was eager to do anything he could to help. He wanted to lend his talents to an organization that built and adapted homes for severely wounded veterans. The only problem was he couldn't find one. ``I found out that nothing like this ever existed,'' Gonsalves said. So Gonsalves dropped his construction business and decided to start his own group called Homes for Our Troops, which builds or remodels homes for veterans who were severely wounded in the wars in Iraq and Afghanistan. Yesterday, more than than 100 golfers teed off yesterday as part of the second annual 890 ESPN Boston Celebrity Golf Invitational at the Hopkinton Country Club to benefit Gonsalves' non-profit organization. The list of celebrities who were scheduled to compete in the event included former Celtic Jo Jo White, former Boston Bruin Glen Featherstone and comedian Steve Sweeney. Len Weiner, program director for 890 ESPN Boston, said the mission of Gonsalves' organization `` really struck a chord'' with those who organized yesterday's event. Homes for Our Troops completed its first home two years ago in Middleboro for Sgt. Peter Damon and his family. Damon lost both of his arms in an explosion while he was changing a tire on a Black Hawk helicopter. Since then, the organization has completed 14 more homes for injured veterans, and 20 more are currently being built in 18 states, Gonsalves said. One of the homes that's currently being built in Massachusetts is for a injured soldier in Plymouth. Gonsalves said these types of fundraising activities like the one yesterday in Hopkinton do more than bring in much needed money to build and adapt homes for injured veterans. It also opens of the eyes of many who don't know the organization exists, he said. ``With events like this, it's not all just about the money we raise - it's about awareness,'' Gonsalves said. Also participating in yesterday's event was Staff Sgt. Larry Gill, who was wounded in Oct. 7, 2003 in a grenade explosion in Baghdad. He met Gonsalves while he was recovering from his injuries at Walter Reed Army Medical Center and now serves on the advisory board of Homes for Our Troops and is a veteran's advocate. Gill is currently looking to raise money for a home for an injured soldier in his native state of Alabama. ``I think I was meant to help these guys,'' said Gill, who has twice been awarded the Purple Heart. Gonsalves' organization has already received widespread support across the country. Pro golfer Phil Mickelson has publicly supported Home for Our Troops by taking part in a campaign called ``Birdies for the Brave'' where fans can join Mickelson in donating money to the organization every time Mickelson makes a birdie or eagle. ``The more people that know about what we're doing, the more of these houses we're going to be able to build,'' Gonsalves said. Richard Conn of The MetroWest Daily News (Framingham, Mass.) can be contacted at 508-626-4338 or rconn@cnc.com. Community Info Sports Original content available for non-commercial use under a Creative Commons license, except where noted. St. James Plaindealer - St. James, MN ~ 604 1st Ave. So., (P.O. Box 67), St. James, MN 56081 ~ Privacy Policy ~ Terms Of Service
import("//llvm/utils/TableGen/tablegen.gni") tablegen("X86GenDisassemblerTables") { visibility = [ ":Disassembler" ] args = [ "-gen-disassembler" ] td_file = "../X86.td" } static_library("Disassembler") { output_name = "LLVMX86Disassembler" deps = [ ":X86GenDisassemblerTables", "//llvm/lib/MC/MCDisassembler", "//llvm/lib/Support", "//llvm/lib/Target/X86/MCTargetDesc", "//llvm/lib/Target/X86/TargetInfo", ] include_dirs = [ ".." ] sources = [ "X86Disassembler.cpp", "X86DisassemblerDecoder.cpp", ] }
Q: Добавить многомерный массив в БАЗУ php Есть такой массив, его нужно добавить в БАЗУ. Не могу никак сделать запрос на добавление. Если кто знает, помогите. [name] => Array ( [0] => 115000917 [1] => 115000916 [2] => 115000915 ) [text] => Array ( [0] => Щит R1 C асмодианина 54-го уровня [1] => Щит R1 B асмодианина 54-го уровня [2] => Щит R1 A асмодианина 54-го уровня ) [img] => Array ( [0] => 54 [1] => 54 [2] => 54 ) [tegs] => Array ( [0] => - [1] => - [2] => - ) Запрос такой INSERT INTO `table`(`name`, `text`, `img`, `tegs`) VALUES ('.....') Возможно, это не лучший вариант, но работает четко: $n = $t = ''; $arr = array('name'=>array(115000917,115000916,115000915),'text'=>array('Щит R1 C асмодианина 54-го уровня','Щит R1 B асмодианина 54-го уровня','Щит R1 A асмодианина 54-го уровня'));//ваш массив $arr_res = array(); foreach($arr as $k => $v) { foreach($v as $key => $val) { $arr_res[$key][$k] = $val; } } print "<pre>"; print_r($arr_res); //смотрим, что за массив получился, можно и не распечатывать foreach($arr_res as $val) { $n = $val["name"]; $t = $val["text"]; $sql = "INSERT INTO `table`(`name`, `text`) VALUES ('$n','$t')"; $res = mysql_query($sql); } A: //INSERT INTO `table`(`name`, `text`, `img`, `tegs`) VALUES ('.....') $query = "INSERT INTO `table`(`name`, `text`, `img`, `tegs`) VALUES ('"; foreach ($name as $key=>$name_val){ $query .= $name_val.','.$text[$key].','.$img[$key].','.tegs[$key]; } $query .= "')"; Запрос готов, можно запускать.
When it was first created, Apache Kafka® had a client API for just Scala and Java. Since then, the Kafka client API has been developed for many other programming languages which enables you to pick the language you want. This freedom of choice ultimately allows you to build an event streaming platform with the language best suited to your business needs. At Confluent, we have an engineering team dedicated to the development of these Kafka clients. They are constantly adding new features, running functionality, scalability and soak tests, and testing interoperability against different Kafka versions. They make these clients more robust so that you can confidently deploy them in production. Over time Confluent Platform has started providing Kafka clients for the most popular languages, including: C/C++ Go Java .NET Python Scala The open source community also offers Kafka client functionality in an extensive ecosystem of additional programming languages, including: Erlang Groovy Haskell Kotlin Lua Node.js OCaml PHP Ruby Rust Tcl Swift …and others… Many of these extensions are built on the C client library for the Kafka protocol called librdkafka, which is itself maintained and supported by Confluent and recently reached v1.0.0. As a result, you can write Kafka client applications in pretty much any language of your choosing. You can run them with an on-prem cluster, or you can use the fully managed services in Confluent Cloud. Over the past few weeks, we tweeted 12 tech tips, each of which showcased a different language along with a simple example of how to write a producer and consumer to Confluent Cloud. Those examples, plus others, are available to run in GitHub at confluentinc/examples, and we have compiled a list of them below for reference: We hope this helps you get started with Kafka. If you have any questions or feedback, please don’t hesitate to reach out to us on Slack—there’s a #clients channel, too! Interested in more? To learn more, check out Confluent Cloud—a fully managed event streaming service based on Apache Kafka, and listen to the Streaming Audio podcast with Magnus Edenhill on librdkafka 1.0.
Q: how to solve catch or finally expected error? How to solve "'catch' or 'finally' expected" error in android studio..? a screenshot of the error public class FragmentRecent extends Fragment { View root_view, parent_view; private RecyclerView recyclerView; private AdapterChannel adapterChannel; private SwipeRefreshLayout swipeRefreshLayout; private Call<CallbackChannel> callbackCall = null; private int post_total = 0; private int failed_page = 0; private InterstitialAd interstitialAd; private OfflineDatabase databaseHelper; int counter = 3; @Nullable @Override public View onCreateView(LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { root_view = inflater.inflate(R.layout.fragment_recent, null); parent_view = getActivity().findViewById(R.id.main_content); loadInterstitialAd(); swipeRefreshLayout = (SwipeRefreshLayout) root_view.findViewById(R.id.swipe_refresh_layout_home); swipeRefreshLayout.setColorSchemeResources(R.color.orange, R.color.green, R.color.blue, R.color.red); recyclerView = (RecyclerView) root_view.findViewById(R.id.recyclerViewHome); recyclerView.setLayoutManager(new LinearLayoutManager(getActivity())); recyclerView.setHasFixedSize(true); //set data and list adapter adapterChannel = new AdapterChannel(getActivity(), recyclerView, new ArrayList<Channel>()); recyclerView.setAdapter(adapterChannel); // on item list clicked adapterChannel.setOnItemClickListener(new AdapterChannel.OnItemClickListener() { @Override public void onItemClick(View v, Channel obj, int position) { Intent intent = new Intent(getActivity(), ActivityDetailChannel.class); intent.putExtra(Constant.KEY_CHANNEL_CATEGORY, obj.category_name); intent.putExtra(Constant.KEY_CHANNEL_ID, obj.channel_id); intent.putExtra(Constant.KEY_CHANNEL_NAME, obj.channel_name); intent.putExtra(Constant.KEY_CHANNEL_IMAGE, obj.channel_image); intent.putExtra(Constant.KEY_CHANNEL_URL, obj.channel_url); intent.putExtra(Constant.KEY_CHANNEL_DESCRIPTION, obj.channel_description); startActivity(intent); showInterstitialAd(); } }); // detect when scroll reach bottom adapterChannel.setOnLoadMoreListener(new AdapterChannel.OnLoadMoreListener() { @Override public void onLoadMore(int current_page) { if (post_total > adapterChannel.getItemCount() && current_page != 0) { int next_page = current_page + 1; requestAction(next_page); } else { adapterChannel.setLoaded(); } } }); // on swipe list swipeRefreshLayout.setOnRefreshListener(new SwipeRefreshLayout.OnRefreshListener() { @Override public void onRefresh() { if (callbackCall != null && callbackCall.isExecuted()) callbackCall.cancel(); adapterChannel.resetListData(); requestAction(1); } }); requestAction(1); return root_view; } private void displayApiResult(final List<Channel> channels) { adapterChannel.insertData(channels); swipeProgress(false); if (channels.size() == 0) { showNoItemView(true); } } private void requestListPostApi(final int page_no) { ApiInterface apiInterface = RestAdapter.createAPI(); callbackCall = apiInterface.getPostByPage(page_no, Config.LOAD_MORE); callbackCall.enqueue(new Callback<CallbackChannel>() { @Override public void onResponse(Call<CallbackChannel> call, Response<CallbackChannel> response) { CallbackChannel resp = response.body(); if (resp != null && resp.status.equals("ok")) { post_total = resp.count_total; displayApiResult(resp.posts); } else { onFailRequest(page_no); } } @Override public void onFailure(Call<CallbackChannel> call, Throwable t) { if (!call.isCanceled()) onFailRequest(page_no); } }); } private void onFailRequest(int page_no) { failed_page = page_no; adapterChannel.setLoaded(); swipeProgress(false); if (NetworkCheck.isConnect(getActivity())) { } else { //showToast("Internet Not"); if (databaseHelper.getOfflineData("FragmentCategory").length() != 0) { setJson(databaseHelper.getOfflineData("FragmentCategory"), false); } } } //databaseHelper.removeAll(); private void requestAction(final int page_no) { showFailedView(false, ""); showNoItemView(false); if (page_no == 1) { swipeProgress(true); } else { adapterChannel.setLoading(); } new Handler().postDelayed(new Runnable() { @Override public void run() { requestListPostApi(page_no); } }, Constant.DELAY_TIME); } @Override public void onDestroy() { super.onDestroy(); swipeProgress(false); if (callbackCall != null && callbackCall.isExecuted()) { callbackCall.cancel(); } } private void showFailedView(boolean show, String message) { View lyt_failed = (View) root_view.findViewById(R.id.lyt_failed_home); ((TextView) root_view.findViewById(R.id.failed_message)).setText(message); if (show) { recyclerView.setVisibility(View.GONE); lyt_failed.setVisibility(View.VISIBLE); } else { recyclerView.setVisibility(View.VISIBLE); lyt_failed.setVisibility(View.GONE); } ((Button) root_view.findViewById(R.id.failed_retry)).setOnClickListener(new View.OnClickListener() { @Override public void onClick(View view) { requestAction(failed_page); } }); } private void showNoItemView(boolean show) { View lyt_no_item = (View) root_view.findViewById(R.id.lyt_no_item_home); ((TextView) root_view.findViewById(R.id.no_item_message)).setText(R.string.no_post_found); if (show) { recyclerView.setVisibility(View.GONE); lyt_no_item.setVisibility(View.VISIBLE); } else { recyclerView.setVisibility(View.VISIBLE); lyt_no_item.setVisibility(View.GONE); } } private void swipeProgress(final boolean show) { if (!show) { swipeRefreshLayout.setRefreshing(show); return; } swipeRefreshLayout.post(new Runnable() { @Override public void run() { swipeRefreshLayout.setRefreshing(show); } }); } public void setJson(String result, Boolean isOnline) { try { //inseting result to database if(isOnline) { ContentValues offline_data = new ContentValues(); offline_data.put(OfflineDatabase.KEY_OFFLINE_DATA, result); if(databaseHelper.getOfflineData("FragmentCategory").length()!=0) { databaseHelper.update("FragmentCategory",offline_data); } else { offline_data.put(OfflineDatabase.KEY_ACTIVITY_NAME, "FragmentCategory"); databaseHelper.addOfflineData(offline_data, null); //handle both exceptions } }}} private void loadInterstitialAd() { if (Config.ENABLE_ADMOB_INTERSTITIAL_ADS) { interstitialAd = new InterstitialAd(getActivity()); interstitialAd.setAdUnitId(getResources().getString(R.string.admob_interstitial_unit_id)); interstitialAd.loadAd(new AdRequest.Builder().build()); interstitialAd.setAdListener(new AdListener() { @Override public void onAdClosed() { interstitialAd.loadAd(new AdRequest.Builder().build()); } }); } else { Log.d("AdMob", "AdMob Interstitial is Enabled"); } } private void showInterstitialAd() { if (Config.ENABLE_ADMOB_INTERSTITIAL_ADS) { if (interstitialAd != null && interstitialAd.isLoaded()) { if (counter == Config.ADMOB_INTERSTITIAL_ADS_INTERVAL) { interstitialAd.show(); counter = 1; } else { counter++; } } else { Log.d("AdMob", "Interstitial Ad is Disabled"); } } else { Log.d("AdMob", "AdMob Interstitial is Disabled"); } }} A: there you start with try: public void setJson(String result, Boolean isOnline) { try { ... } ... } which has to continue with: try { ... } catch(Exception e) { } finally { } where either catch or finally are optional (depending where the Exception shall be handled).
module.exports = { directory: { // The list of directories we should not traverse blacklist: ['node_modules', '.git', '.settings'], }, confirmation: { fileName: '_CONFIRMATION_', }, arguments: { snapFingers: 'snap-fingers', withGlove: 'with-infinity-gauntlet-glove', noMercy: 'no-mercy', }, };
Q: DB2 - Invalid use of an aggregate function SQLCODE=-120 Can anyone help me to understand what is wrong with this Db2 query syntax,it is failing with SQLCODE -120 because i am trying to use row_number()? SELECT COUNT(ORDER_ID) OVER() TOTAL_NO_OF_RECORDS, ROW_NUMBER() OVER (ORDER BY CREATED_DATE DESC) AS ROW_NUM FROM ( SELECT DISTINCT A.ORDER_ID ORDER_ID, B.AgencyName AS AGENCY_NAME, C.FirstName FIRST_NAME, C.LastName LAST_NAME, DEMOGRAPHIC.State STATE, A.CreatedTS CREATED_DATE, E.WritingTIN WRITING_TIN, E.ParentTIN PARENT_TIN FROM DBO.TABLE1 A INNER JOIN DBO.TABLE2 TABLE2 ON TABLE2.ORDER_ID=A.ORDER_ID INNER JOIN DBO.TABLE3 TABLE3 ON TABLE3.QuoteId=TABLE2.QuoteId INNER JOIN DBO.Demographic DEMOGRAPHIC ON DEMOGRAPHIC.DemographicId=TABLE3 .DemographicId INNER JOIN DBO.Agent E ON E.AgentId=DEMOGRAPHIC.AgentId INNER JOIN DBO.User USER ON USER.WebAcctID=AGENT.WebAcctId INNER JOIN DBO.Shopper SHOPPER ON SHOPPER.ShopperId=DEMOGRAPHIC.ShopperId LEFT OUTER JOIN DBO.Subsidy D ON D.demographicId=DEMOGRAPHIC.demographicId LEFT OUTER JOIN DBO.Employer EMPLOYER ON DEMOGRAPHIC.demographicId=EMPLOYER.demographicId WHERE E.WritingTIN = 'XYZ' AND E.ParentTIN = 'XYZ' AND DEMOGRAPHIC.State='OH' AND A.Status IN ('X','Y','Z') )AS ORDER_DETAILS where ROW_NUMBER() OVER (ORDER BY CREATED_DATE DESC) BETWEEN ((1*50)-50)+1 AND 1*50 ORDER BY CREATED_DATE DESC ERROR SHOWN:Invalid use of an aggregate function or OLAP function.. SQLCODE=-120, SQLSTATE=42903, DRIVER=4.18.60 A: You have multiple errors: X is not defined in the subquery. B.CREATED_DATE is referenced in the outer query, but it is not defined. ROW_NUMBER() is used in the WHERE clause. This would seem to be the intention of the query you write: SELECT COUNT(*) OVER () NO_OF_RECORDS, ROW_NUM FROM (SELECT A.ID, B.FirstName as FIRST_NAME, B.LastName as LAST_NAME, MAX(B.CREATED_DATE) as CREATED_DATE, ROW_NUMBER() OVER (ORDER BY MAX(CREATED_DATE) DESC) AS ROW_NUM FROM SCHEMANAME.A A INNER JOIN SCHEMANAME.B B ON B.ShopperId = A.ShopperId LEFT OUTER JOIN SCHEMANAME.C C ON C.demographicId = B.demographicId WHERE A.WritingTIN = 'XYZ' AND A.ParentTIN = 'XYZ' AND B.State = 'OH' AND C.Status IN ('X', 'Y', 'Z') GROUP BY A.ID, B.FirstName, B.LastName ) ORDER_DETAILS WHERE ROW_NUM BETWEEN ((1*50)-50)+1 AND 1*50 ORDER BY CREATED_DATE DESC; I'm not sure that this result makes sense, but it should fix your error.
Q: Create new column with sum of vector column in pandas I have a dataframe that looks like this: df = pd.DataFrame({'A':[[1,2,3],[4,5,6,7],[8,9]]}) All entries are integers. I want to make a make a new column, 'B', that would read [5,22,17]. I can do this with a loop, but is there a one-line solution? Thanks! A: Check with re-construct your list columns , then do sum pd.DataFrame(df.A.tolist()).sum(1) 0 6.0 1 22.0 2 17.0 dtype: float64 df['New']=pd.DataFrame(df.A.tolist()).sum(1)
Daily Stormer February 16, 2014 Instead of Whites paying reparations to blacks for slavery, we demand that blacks pay reparations to us for the destruction of our once prosperous cities and colonies. These reparations can take the form of manual labor on our plantations. And while we’re at it, we should demand extra repayment from the Jamaicans for the scourge of reggae music and rasta culture that has corrupted our youth. From the Telegraph: A coalition of 14 Caribbean states, including Jamaica… is now mounting the first united campaign for reparations from Britain over its role in the Atlantic slave trade. The group is ready to sue in the courts and has hired Leigh Day, the London law firm that last year won £20 million for Kenyans tortured by the British during the Mau Mau rebellion of the 1950s. This month it will unveil a list of 10 demands for Britain, France and Holland, including funds likely to total billions, an apology, and assurances slavery will never be repeated, The Telegraph can disclose. Professor Verene Shepherd, the chairman of Jamaica’s reparations committee, said British colonisers had “disfigured the Caribbean,” and that their descendants must now pay to repair the damage. “If you commit a crime against humanity, you are bound to make amends,” Prof Shepherd told The Telegraph. “The planters were given compensation, but not one cent went to the freed Jamaicans”.
/* Predefined Classes */ .row { margin: 0 -10px; } .row > [class*="col-"] { padding: 0 10px; } .m-auto { margin: 0 auto !important; } .wrapper { padding: 15px !important; } .semi-bold { font-weight: 600 !important; } .overflow-auto { overflow: auto !important; } .overflow-hidden { overflow: hidden !important; } .overflow-visible { overflow: visible !important; } .overflow-scroll { overflow: scroll !important; } .overflow-x-hidden { overflow-x: hidden !important; } .overflow-x-visible { overflow-x: visible !important; } .overflow-x-scroll { overflow-x: scroll !important; } .overflow-y-hidden { overflow-y: hidden !important; } .overflow-y-visible { overflow-y: visible !important; } .overflow-y-scroll { overflow-y: scroll !important; } .f-w-100 { font-weight: 100 !important; } .f-w-200 { font-weight: 200 !important; } .f-w-300 { font-weight: 300 !important; } .f-w-400 { font-weight: 400 !important; } .f-w-500 { font-weight: 500 !important; } .f-w-600 { font-weight: 600 !important; } .f-w-700 { font-weight: 700 !important; } .text-center { text-align: center !important; } .text-left { text-align: left !important; } .text-right { text-align: right !important; } .pull-left { float: left !important; } .pull-right { float: right !important; } .pull-none { float: none !important; } /* LOOP - Row Space */ .row-space-generator(@counter) when (@counter > -1) { @nameCounter: (2 * @counter); .row.row-space-@{nameCounter} { margin: 0 -(1px * @counter) !important; & > [class*="col-"] { padding: 0 (1px * @counter) !important; } } .row-space-generator((@counter - 1)); } .row-space-generator(15); /* LOOP - Margin & Padding */ .margin-padding-css-generator(@counter) when (@counter > -1) { .m-@{counter} { margin: (@counter * 1px) !important; } .m-t-@{counter} { margin-top: (@counter * 1px) !important; } .m-r-@{counter} { margin-right: (@counter * 1px) !important; } .m-b-@{counter} { margin-bottom: (@counter * 1px) !important; } .m-l-@{counter} { margin-left: (@counter * 1px) !important; } .p-@{counter} { padding: (@counter * 1px) !important; } .p-t-@{counter} { padding-top: (@counter * 1px) !important; } .p-r-@{counter} { padding-right: (@counter * 1px) !important; } .p-b-@{counter} { padding-bottom: (@counter * 1px) !important; } .p-l-@{counter} { padding-left: (@counter * 1px) !important; } .margin-padding-css-generator((@counter - 1)); } .margin-padding-css-generator(40); /* LOOP - Font Size */ .font-size-css-generator(@counter) when (@counter > 7) { .f-s-@{counter} { font-size: (@counter * 1px) !important; } .font-size-css-generator((@counter - 1)); } .font-size-css-generator(20); .table-valign-middle th, .table-valign-middle td { vertical-align: middle !important; } .table-th-valign-middle th, .table-td-valign-middle td { vertical-align: middle !important; } .table-valign-top th, .table-valign-top td { vertical-align: top !important; } .table-th-valign-top th, .table-td-valign-top td { vertical-align: top !important; } .table-valign-bottom th, .table-valign-bottom td { vertical-align: bottom !important; } .table-th-valign-bottom th, .table-td-valign-bottom td { vertical-align: bottom !important; } .vertical-box { display: table; table-layout: fixed; border-spacing: 0; height: 100%; width: 100%; } .vertical-box-column { display: table-cell; vertical-align: top; height: 100%; } .vertical-box-row { display: table-row; height: 100%; } .vertical-box-row > .vertical-box-cell { position: relative; height: 100%; width: 100%; float: none; } .vertical-box-row > .vertical-box-cell > .vertical-box-inner-cell { position: absolute; top: 0; bottom: 0; left: 0; right: 0; overflow: hidden; } .panel-expand .vertical-box .vertical-box-column { display: table-cell; } .page-content-full-height .content { position: absolute; left: 0; top: 54px; right: 0; bottom: -1px; } .no-rounded-corner { .border-radius(0) !important; } .rounded-corner { .border-radius(50%) !important; } .no-border { border: 0 !important; } .border-top-1 { border-top: 1px solid #eee !important; } .border-right-1 { border-right: 1px solid #eee !important; } .border-bottom-1 { border-bottom: 1px solid #eee !important; } .border-left-1 { border-left: 1px solid #eee !important; } .no-box-shadow { .box-shadow(none) !important; } .text-inverse { color: @black !important; } a.text-inverse:hover, a.text-inverse:focus { color: @light_black !important; } .text-success { color: @green !important; } a.text-success:hover, a.text-success:focus { color: @light_green !important; } .text-info { color: @aqua !important; } a.text-info:hover, a.text-info:focus { color: @light_aqua !important; } .text-primary { color: @blue !important; } a.text-primary:hover, a.text-primary:focus { color: @light_blue !important; } .text-warning { color: @orange !important; } a.text-warning:hover, a.text-warning:focus { color: @light_orange !important; } .text-danger { color: @red !important; } a.text-danger:hover, a.text-danger:focus { color: @light_red !important; } .text-white { color: #fff !important; } a.text-white:hover, a.text-white:focus { color: #f0f3f4 !important; } .bg-white { background: #ffffff !important; } .bg-silver-lighter { background: @light_silver !important; } .bg-silver { background: @silver !important; } .bg-silver-darker { background: @dark_silver !important; } .bg-black { background: @black !important; } .bg-black-darker { background: @dark_black !important; } .bg-black-lighter { background: @light_black !important; } .bg-grey { background: @grey !important; } .bg-grey-darker { background: @dark_grey !important; } .bg-grey-lighter { background: @light_grey !important; } .bg-red { background: @red !important; } .bg-red-darker { background: @dark_red !important; } .bg-red-lighter { background: @light_red !important; } .bg-orange { background: @orange !important; } .bg-orange-darker { background: @dark_orange !important; } .bg-orange-lighter { background: @light_orange !important; } .bg-yellow { background: @yellow !important; } .bg-yellow-darker { background: @dark_yellow !important; } .bg-yellow-lighter { background: @light_yellow !important; } .bg-green { background: @green !important; } .bg-green-darker { background: @dark_green !important; } .bg-green-lighter { background: @light_green !important; } .bg-blue { background: @blue !important; } .bg-blue-darker { background: @dark_blue !important; } .bg-blue-lighter { background: @light_blue !important; } .bg-aqua { background: @aqua !important; } .bg-aqua-darker { background: @dark_aqua !important; } .bg-aqua-lighter { background: @light_aqua !important; } .bg-purple { background: @purple !important; } .bg-purple-darker { background: @dark_purple !important; } .bg-purple-lighter { background: @light_purple !important; } .no-bg { background: none !important; } .height-xs { height: 150px !important; } .height-sm { height: 300px !important; } .height-md { height: 450px !important; } .height-lg { height: 600px !important; } .height-full { height: 100% !important; } .height-50 { height: 50px !important; } .height-100 { height: 100px !important; } .height-150 { height: 150px !important; } .height-200 { height: 200px !important; } .height-250 { height: 250px !important; } .height-300 { height: 300px !important; } .height-350 { height: 350px !important; } .height-400 { height: 400px !important; } .height-450 { height: 450px !important; } .height-500 { height: 500px !important; } .height-550 { height: 550px !important; } .height-600 { height: 600px !important; } .width-xs { width: 150px !important; } .width-sm { width: 300px !important; } .width-md { width: 450px !important; } .width-lg { width: 600px !important; } .width-full { width: 100% !important; } .width-50 { width: 50px !important; } .width-100 { width: 100px !important; } .width-150 { width: 150px !important; } .width-200 { width: 200px !important; } .width-250 { width: 250px !important; } .width-300 { width: 300px !important; } .width-350 { width: 350px !important; } .width-400 { width: 400px !important; } .width-450 { width: 450px !important; } .width-500 { width: 500px !important; } .width-550 { width: 550px !important; } .width-600 { width: 600px !important; } .animated { -webkit-animation-duration: .6s; animation-duration: .6s; -webkit-animation-fill-mode: both; animation-fill-mode: both; } .fade { .opacity(0); .transition(opacity .3s linear); } .fade.in { .opacity(1); } .text-ellipsis { white-space: nowrap !important; overflow: hidden !important; text-overflow: ellipsis !important; } .underline { border-bottom: 1px solid #e2e7eb !important; }
258 Md. 387 (1970) 266 A.2d 17 MONMONIER v. MONMONIER, ET AL. [No. 406, September Term, 1969.] Court of Appeals of Maryland. Decided June 4, 1970. The cause was argued before HAMMOND, C.J., and McWILLIAMS, FINAN, SINGLEY, SMITH and DIGGES, JJ. Peter B. Turney for appellant. F. Duncan Cornell for appellee J. (Joseph) Carroll Monmonier. *388 No brief filed for appellee Edward Paul Swiss, Executor. HAMMOND, C.J., delivered the opinion of the Court. The contest before us is between two members of the Monmonier family, each known as J. Carroll Monmonier and each claiming to be the "John Carroll Monmonier" intended to take under paragraph 2 (a) of the will of their aged spinster cousin, Emma Lou Monmonier. Judge Haile, in the Circuit Court for Baltimore County, found that Joseph Carroll Monmonier (Jay) was the intended beneficiary, and his cousin, John Carroll Monmonier (John), has appealed. Testimony that put the Court in the armchair of the testatrix came in by stipulation or without objection and showed the following: a Francis Monmonier is the common ancestor of the testatrix, Jay, and John. By his first wife he had a son, John Francis who had a son Louis who had another John Francis, who in turn had John, the appellant. John is thus a great, great grandson of the common ancestor and, as the testatrix puts it in her will, her "distant cousin." By his second wife the common ancestor, Francis, had two sons, Louis and Joseph Carroll. Emma Lou, the testatrix, is the daughter of Louis. Louis' brother Joseph Carroll had a son also named Joseph Carroll, who is the father of Joseph, the appellee. Thus Jay is the great grandson of the common ancestor Francis and, as the testatrix puts it in her will, her "second cousin" (perhaps more technically, or as in some places below Mason and Dixon's Line, her first cousin once removed). Emma Lou, the testatrix, made her will in 1960 when she was eighty-five and died nine years later without immediate family. When she was thirty-three (1908) Jay, her cousin of the whole blood once removed, was born in Catonsville. He resided there much of his life and lived at 200 Beechwood Avenue when the will was made, as he now does. He has always used the name J. Carroll Monmonier, *389 as did his father and his grandfather before him, and is known as Carroll to his family and friends. Neither he nor his father or grandfather used the name Joseph. His father and grandfather lived side by side in Catonsville and Emma Lou often visited his father there. After he became an adult, Jay did not see Emma Lou for many years. Several months before the will was made, he visited her with another cousin, a visit occasioned by the death of a Monmonier relative. After that she sent him her father's watch, saying she wanted him to have it (he is a jeweler and watchmaker). Several months after the execution of the will — of which he then knew nothing — he had another pleasant visit with Emma Lou. The appellant John and his wife and son visited Emma Lou more often during the years and they had some correspondence, including the exchange of Christmas cards. John worked for the B. & O. Railroad and resided on Birch Drive in Woodlawn when the will was made. In her will Emma Lou Monmonier mentioned the name "John Carroll Monmonier" in three separate paragraphs. In paragraph 2 (a) after giving conditional life estates in her home property at Hydes, Maryland which failed, she gave and devised "said premises and the furniture contained therein to my second cousin, John Carroll Monmonier, presently residing on Beech Avenue, Catonsville, Maryland, to have and to hold as his property absolutely" (italics supplied). In paragraph 3 the testatrix said "I give, devise and bequeath unto my distant cousin, John Carroll Monmonier (who is presently working for the Baltimore and Ohio Railroad) my `School-house' property located on Sunshine Avenue, Baltimore County, Maryland * * * in Trust for his son Mark Monmonier * * *" (italics supplied). In paragraph 4 Emma Lou bequeathed "to my cousin, John Carroll Monmonier, the sum of Two Thousand ($2,000.00) Dollars." Everyone agreed that John took under paragraph 3. Judge Haile found that the testatrix had in mind two *390 cousins, thought of both cousins as Carroll and that to her "her cousin Carroll, of Catonsville, and her cousin Carroll, the railroad man, were both named John Carroll Monmonier." He held that Jay was intended to take the home property under paragraph 2 (a) and John the $2,000 under paragraph 4. No appeal was taken from the holding as to paragraph 4, and we think Judge Haile was right as to paragraph 2 (a). John urges that there is a latent ambiguity in the will and therefore the testimony of the scrivener and of John and his wife, which he says shows that the testatrix intended him to take under paragraph 2 (a) of the will should be considered. A latent ambiguity exists "where the words of the instrument are apparently definite and specific, but are susceptible of application with equal certainty to each of several subjects or objects." E. Miller, Construction of Wills, § 42, at 122. If there is a latent ambiguity, parol evidence is admissible to show intent. Bradford v. Eutaw Savings Bank, 186 Md. 127, 136. We see no latent ambiguity in the will and therefore parol evidence to show intent was inadmissible. We add that had the testimony as to intent of the scrivener and of John or his wife been admissible, it would not, in our view, prove that John was the intended beneficiary under paragraph 2 (a) of the will.[1] The case essentially is not too different from Douglas v. Blackford, 7 Md. 8, where the Court found no ambiguity and identified a farm devised by analysis of the facts about the farm mentioned by the testator. The reason we see no latent ambiguity in the present will is because *391 it is clear to us that the testatrix had in mind two different beneficiaries. Thinking that both her cousins were named John Carroll, she undertook to identify them by the closeness of their family relationship to her and by a place of residence on the one hand and an occupation on the other. Joseph was a closer cousin of the whole blood and he lived in Catonsville, an area she knew well and with which she identified him from his youth, and he is described by reference to these facts in paragraph 2 (a), with no reference to any child. John is the more distant cousin of the half blood and he worked for the B. & O. Railroad. He is identified in paragraph 3 by reference to these facts and the further fact that he is the father of Mark. We find the intention of the testatrix to be clear. Decree affirmed, with costs. NOTES [1] The scrivener said that the testatrix told him that "he was the one who worked for the B. and O. Railroad and was the father of Mark," and that at no other time did she mention any other male Monmonier, other than Mark or John Carroll. But the scrivener also said that the will was prepared completely in accordance with the instructions of the testatrix. "She was a maiden lady and insisted that the will be prepared just the way I prepared it." The testimony of John and his wife was only that long before the will was made, Emma Lou Monmonier asked casually on one occasion if he would like the Hydes property and on another said something about having it to help with Mark's education.
Following a young person's experience of trauma, they are at risk of developing a range of poor mental health outcomes, of which the most widely studied is posttraumatic stress disorder (PTSD; Alisic et al. [@CR1]; Hiller et al. [@CR22]). While elevated PTSD symptoms (PTSS) can be common in the posttrauma period, for many young people initial symptoms will naturally recede without the need for formal support (Hiller et al. [@CR22]; Le Brocque et al. [@CR25]), with 10--20% experiencing more chronic distress (Alisic et al. [@CR1]; Hiller et al. [@CR22]). However, PTSD is just one potential adverse psychological outcome following trauma -- other internalising difficulties (e.g., anxiety, depression) and externalising difficulties (e.g., attention and behaviour problems) can also be elevated in trauma-exposed young people (e.g., Pine and Cohen [@CR38]; Scheeringa and Zeanah [@CR41]). While relatively robust empirical evidence has identified key psychological mechanisms that contribute to the maintenance of chronic PTSS (e.g., Ehlers and Clark [@CR12]; Trickey et al. [@CR48]), the role of these processes in relation to other posttrauma psychological outcomes has been little studied. Such investigation is important for understanding the extent to which targeting trauma-related psychological processes in intervention is likely to address other adverse mental health outcomes, beyond PTSD. It also has theoretical implications, especially for understanding whether current models specific to the maintenance of PTSD may more accurately represent models of children's broader posttrauma mental health. Theories of the development and maintenance of PTSD highlight several key psychological processes that may lead to, or maintain, PTSS (Brewin et al. [@CR4]; Ehlers and Clark [@CR12]; Foa et al. [@CR16]; Meiser-Stedman [@CR30]). For example, Ehlers and Clark's cognitive model of PTSD (Ehlers and Clark [@CR12]) identifies three core posttrauma processes that maintain PTSD, particularly by contributing to a sense of current threat. First, the individual makes strong negative appraisals of the event or their own responses (e.g., "I'll never get over what happened"). Second, the trauma memory is proposed to be encoded in such a way that it is particularly prone to retrieval via direct triggering through matching cues and has 'flashback' like properties (e.g., due to a high level of sensory content, and limited contextual or semantic encoding). Third, engagement in maladaptive coping strategies is hypothesised to maintain maladaptive appraisal and trauma memory properties (e.g., due to cognitive avoidance), and directly exacerbate symptoms (e.g., due to counterproductive attempts to suppress trauma memories). The empirical literature, including a number of meta-analytic reviews, provides strong support for the central role of posttrauma cognitive processes in the maintenance of traumatic stress. For example, meta-analytic reviews of the child and adolescent trauma literature have concluded that the use of thought suppression (a maladaptive cognitive coping strategy) is moderately to strongly positively associated with PTSS severity (Trickey et al. [@CR48]), and that there is a strong association between maladaptive appraisals and PTSS (Mitchell et al. [@CR34]; Trickey et al. [@CR48]). The role of trauma-related memory quality is more well-established in the adult PTSD field (Brewin [@CR3]), although there is some evidence for a significant association between sensory-laden trauma memories and higher PTSS among children following trauma (Salmond et al. [@CR40]; Meiser-Stedman et al. [@CR31]; McKinnon et al. [@CR29]). Moreover, trauma-focused cognitive behavioural therapy (tf-CBT), the recommended first-line treatment for PTSD in children (Cohen et al. [@CR7]; Perrin et al. [@CR37]), specifically targets the reduction of maladaptive appraisals, unhelpful coping strategies, and problematic memory qualities. While trauma-related cognitive processes are relatively well-established in the development and maintenance of PTSS, there has been less extensive examination of their potential role in relation to broader posttrauma psychopathology. This omission is important, as other internalising difficulties such as anxiety and depression, as well as externalising difficulties such as behaviour problems, are also all relatively common sequelae of trauma exposure in young people, and are commonly comorbid with PTSD (e.g., Cénat and Derivois [@CR5]; Scheeringa and Zeanah [@CR41]; Scheeringa [@CR42]). Notably, trauma-related maladaptive appraisals have been found to be significantly cross-sectionally associated with posttrauma anxiety and depression following sexual assault (e.g., Mannarino and Cohen [@CR28]); with internalising and externalising symptoms in a community sample of children and teens (Liu and Chen [@CR27]); and with depression, but not carer-reported externalising, following maltreatment (Leeson and Nixon [@CR26]). This is consistent with the centrality of maladaptive, dysfunctional or distorted cognitions about the self, others, and/or world, to models of child depression (e.g., Birmaher et al. [@CR2]), anxiety (e.g., Ellis and Hudson [@CR14]; Rapee and Heimberg [@CR39]), and conduct problems (e.g., Dodge and Pettit [@CR10]). The role of posttrauma coping and memory quality in relation to broader psychopathology has been less well established. However, rumination has been associated with non-trauma specific depression in children (e.g., see Hitchcock et al. [@CR23]), while avoidant coping is central to the maintenance of a broad range of child internalising difficulties (e.g., Murray et al. [@CR35]). Equally, researchers have highlighted the presence of negative intrusive memories in depression and in anxiety disorders (e.g., Hackmann and Holmes [@CR19]; Patel et al. [@CR36]) The primary aim of the current study was to investigate the potential role of key trauma-related cognitive processes in relation to a range of psychological outcomes in children, in a longitudinal study of an acute-trauma exposed sample (Hiller et al. [@CR22]). We examined whether: a) trauma related appraisals, memory qualities, and maladaptive coping strategies showed cross-sectional associations with anxiety, depression and externalising symptoms, measured 1-month posttrauma, as well as with symptoms of PTSD; and b) whether changes in cognitive processes from 1 to 7 months were associated with internalising and externalising severity across this period. Given that there is overlap between symptoms of PTSD and those of depression and anxiety problems, we also examined whether posttrauma cognitive mechanisms made a unique contribution to the prediction of anxiety, depression, and/or externalising symptoms once levels of PTSS were controlled for. Although a particularly stringent analysis, this allowed for stronger inferences in relation to whether posttrauma psychological processes are relevant intervention targets even in the absence of significant PTSS. Method {#Sec1} ====== Participants {#Sec2} ------------ Participants were 132 children aged 6--13 years old, and their caregivers, recruited following the child's involvement in a trauma and subsequent attendance at the emergency department (ED). Participants were recruited between April 2014 and January 2016, from four EDs in the UK, as previously reported (Hiller et al. [@CR22]). Exclusion criteria were: significant learning difficulty or neurodevelopmental disorder; organic traumatic brain injury; suspicion that the injury was caused by the young person themselves or their carer. Thirty-nine percent of all potentially eligible participants were recruited to the final study (main reason for non-participation was that families could not be contacted). We found no evidence that study participants differed from the eligible population. Complete recruitment details are presented in Hiller et al. [@CR22], while the recruitment flow-chart is available in [supplementary materials](#Sec14){ref-type="sec"} (S1). Index traumas were: motor vehicle accident (*n* = 68, 52%), fall from a height (*n* = 25, 19%), significant bicycle accident (*n* = 9, 7%), acute medical episode (*n* = 10, 8%; e.g., acute anaphylaxis), sport injury (*n* = 6, 5%), and assault (*n* = 3, 2%) or other event (*n* = 17, 13%, e.g., house fire, dog attack, near drowning, sports injury). Procedure {#Sec3} --------- ED staff initially approached families and obtained permission for the research team to make contact in order to confirm eligibility and recruit them to the study. Informed consent was provided by the caregiver, while informed assent was provided by the young person. Data presented in the current paper are from home assessments completed independently by parents and children at 2--6 weeks post-ED attendance (T1) and 6-months later (T2; i.e., 7-months posttrauma). Dyads received GBP20 at each time point, as a thank you for their time. An additional 3-month postal questionnaire assessment also took place, as reported in Hiller et al. [@CR22]. Ninety-six percent of the sample were retained at the 6-month assessment. Measures {#Sec4} -------- Demographic and trauma-related information were obtained from ED notes and parent interview. Objective trauma severity was assigned using the Manchester Triage System (nurse rating of urgency of care), ranging from 1 = *immediate care required* to 4 = *standard* (i.e., less urgent). Key study indices were then obtained through child and parental questionnaires, completed at both T1 and T2. Specifically, we utilised child self-report measures of cognitive processes, PTSS, anxiety and depressive symptoms. By contrast, we used parental report as our main measure of child externalising, as is recommended in the literature (Stanger and Lewis [@CR46]). ### Maladaptive Trauma Appraisals {#FPar1} Children completed the Children's Posttraumatic Cognitions Inventory (CPTCI), a 25-item self-report measure suitable for children as young as 6 years old (Meiser-Stedman et al. [@CR33]). The CPTCI measures appraisals relating to: (i) permanent and disturbing change (e.g., "My reactions since the event mean I have changed for the worse") and (ii) being a fragile person in a scary world (e.g., "Anyone could hurt me"). Young people rate their agreement with each statement from 1 = *don't agree at all* to 4 = *agree a lot*, with the total score providing an overall index of maladaptive appraisals (ranging from 25 to 100; α = 0.93). ### Posttrauma Coping {#FPar2} Children completed the Child Posttrauma Coping Questionnaire (CPCQ), an 11-item self-report scale created for this study based on cognitive coping items used in previous research (Ehlers and Clark [@CR12]; Ehlers et al. [@CR13]; Stallard [@CR45]). The measure includes 5 items on rumination (e.g., "I can't stop thinking if only the event hadn't happened to me") and 6 items on thought suppression (e.g., "I've tried to keep any memories of what happened out of my head"), each rated on a four-point scale from 0 = *not at all or only one time* to 3 = *a lot of the time*, and summed to yield a total score (between 0 and 30). The measure shows good internal consistency (α = 0.89) and validity against a measure of child PTSS symptoms (Hiller et al. [@CR22]). ### Trauma Memory Quality {#FPar3} Children completed an adapted version of the Trauma Memory Quality Questionnaire (TMQQ; Meiser-Stedman et al. [@CR31]). This 18-item measure covers the original scale's 11-items on the sensory quality of the trauma-memory and sense of "nowness" (e.g., "My memories of the event are mostly pictures of images"; "When I think about the frightening event I can sometimes smell things that I smelt when the frightening event happened"), and an additional 7-items on disorganised memories (e.g., "I get mixed up about what order things happened in during the frightening event"), adapted from an equivalent adult scale (e.g., Halligan et al. [@CR20]). Items are rated on a scale from 1 = *disagree a lot* to 4 = *agree a lot* and summed to yield a total score (range, 18--72). Internal consistency of the 18-item scale was α = 0.86, compared to α = 0.80 for the original 11-item scale. ### PTSS {#FPar4} Children completed the child self-report version of the PTSD Reaction Index (PTSD-RI), which has established reliability and validity for children as young as 6 years old (Steinberg et al. [@CR47]). The PTSD-RI assesses 17 DSM-IV-TR PTSD symptoms. Responses to each item are rated on a 5-point Likert scale, ranging from 0 = *none of the time* to 4 = *most of the time,* and yielding a total symptom score as the main outcome (ranging from 0 to 68; α = 0.89). ### Anxiety and Depression {#FPar5} Children completed the 25-item short version of the Revised Child Anxiety and Depression Scale (RCADS; Chorpita et al. [@CR6]; Ebesutani et al. [@CR11]), a widely used, self-report measure, validated with children aged 7 years and over (Ebesutani et al. [@CR11]). Items are rated on a 4-point scale ranging from 0 = *never* to 3 = *always*, measuring 15 symptoms of anxiety (e.g., "I worry about being away from my parents"; total score range 0--45; α = 0.89) and 10 depressive symptoms (e.g., "I feel worthless"; total score range 0--30; α = 0.86). ### Parent-Report on Child Internalising and Externalising {#FPar6} Parents completed the Strengths and Difficulties Questionnaire (SDQ) parent-report version, a widely used measure of children's emotional and behavioural difficulties, suitable for reporting on children as young as 4 years of age (Goodman [@CR18]). Parents rate items from 0 = *not true* to 2 = *certainly true*. We utilised the 10-item externalising subscale which comprises items covering hyperactivity and conduct problems (e.g., "Often has temper tantrums or hot tempers", "Easily distracted"; total score range 0--20; α = 0.76); and the 10-item internalising scale, which assesses emotional and peer problems (e.g., "Many worries, often seems worried"; "Picked on by other children"; total score range 0--20; α = 0.80). The SDQ was added to the T1 assessment during the course of the study; consequently, T1 data is only available for 106 participants. Data Analytic Plan {#Sec5} ------------------ Data were analysed using IBM SPSS Statistics for Windows v22 (2013, IBM Corp., Armonk, NY). All mental-health outcome measure scores were positively skewed, so a square-root transformation was applied. As most 6-month data remained significantly skewed, associations were checked against non-parametric tests (Spearman's rho), with any discrepancies noted in Table [2](#Tab2){ref-type="table"}. Our primary aims were to explore (1) whether the three cognitive processes (appraisals, memory, coping) would be associated with acute (1-month, T1) symptom severity, and (2) whether change in these processes from 1 to 7 months posttrauma (T1 -- T2) would be associated with change in symptoms over this period. In all cases, we also examined whether cognitive processes would continue to be significantly associated with symptom outcomes, even after controlling for PTSS. We used preliminary correlational analyses to establish which cognitive variables showed significant univariate associations with mental health outcomes (*p* \< .05), for inclusion in subsequent regression analyses. To index T1-T2 change in cognitions we generated residual change scores via linear regressions. Next, we ran separate linear regressions to explore which of the three cognitive processes (measured at T1) most strongly predicted 1-month symptom severity (T1 PTSS, anxiety, depression, parent-reported internalising and externalising), when they were examined simultaneously (i.e., entered into a single step in the regression). For non-PTSS outcomes, additional models tested for predictive effects after controlling co-occurring PTSS. Next, to explore the longitudinal association between cognitions and symptoms, we looked at whether change in cognitive processes was associated with change in symptoms, by running linear regression models with T2 symptoms as the dependent variable, whilst controlling for T1 symptoms in the model. In particularly conservative analyses, these regressions for non-PTSS outcomes were re-run also controlling for change in PTSS (residual change scores), to explore whether change in the cognitive processes would continue to predict depression/anxiety/internalising/externalising symptoms change, even above what is explained by PTSS. Age, sex and triage (a marker of objective trauma severity) were explored as potential covariates. Overall there was little missing data (maximum missing data was less than 10%). The only exception to this was the T1 SDQ, which was added after the study begun and was missing for 20% of the sample. In all cases data were missing completely at random. As a sensitivity analysis, to account for missing data, key analyses were run using multiple imputation with 50 iterations and predictive mean matching. The pattern of results was the same and completer-only data are presented here. Results {#Sec6} ======= Descriptive Information {#Sec7} ----------------------- Sample characteristics are presented in Table [1](#Tab1){ref-type="table"}. The sample comprised 132 children (62% boys), aged 6--13 years old, and their participating parent (90% mothers). Child age, sex, and triage category were assessed as potential covariates. The child's age was negatively associated with PTSS at both time points (*r* \> −0.18, *p* \> 0.04). Sex was significantly associated with initial anxiety (*r* = 0.21, *p* = 0.04) and depression (*r* = 0.20, *p* = 0.049) symptom severity, with higher symptom scores associated with being female. Triage ratings were not significantly associated with any measures of mental health (all *ps* \> 0.13). Age and sex were controlled in all subsequent analyses.Table 1Descriptive informationDemographic characteristicsStatistic (*N* = 132)Parent characteristics Age in years (*M \[SD\]*)39.7 (7.0) Proportion mothers119 (90%) Proportion married or cohabiting97 (74%) Education status: School until 16 years or younger36 (27%)  Further education50 (38%)  Higher education46 (35%)Child characteristics Age in years, *M (SD*)9.87 (1.8) Male82 (62.1%) Ethnicity -- Caucasian121 (91.7%)Triage category 1 (immediate attention required)61 (46%) 2 (very urgent)29 (22%) 3 (urgent)26 (20%) 4 (less urgent)16 (12%)Days in hospital (Min -- Max, *M* \[*SD*\])0--28, 2.64 (4.83)Days of school missed^a^ (Min -- Max, *M* \[*SD*\])0--28, 5.52 (5.98)Proportion requiring ambulance/helicopter90 (70%)Proportion with head injury33 (25%)^a^Days of school missed represents days missed prior to their first assessment Paired samples *t*-tests indicated that children's self-reported symptoms significantly reduced from 1-month to 6-months across all measures (*M* and *SDs* presented in Table [2](#Tab2){ref-type="table"}; PTSS, *p* \< 0.001; Anxiety, *p \<* 0*.*001; Depression, *p* \< 0.001). By contrast, there was no significant change in parent-report of child internalising (*p* = 0.75) or externalising symptoms (*p* = 0.47).Table 2Bivariate correlation matrix for associations between study variables1.2.3.4.5.6.7.8.9.10.11.12.13.1-mo Processes1. Appraisals2. Coping0.61\*\*3. Memory0.59\*\*0.63\*\*1-mo Outcomes4. PTSS0.68\*\*0.79\*\*0.75\*\*5. Anxiety0.74\*\*0.68\*\*0.61\*\*0.74\*\*6. Depression0.70\*\*0.69\*\*0.58\*\*0.79\*\*0.84\*\*7. Internalising0.37\*\*0.23\*^a^0.22\*0.25\*\*0.18^+^0.24\*8. Externalising0.29\*\*0.090.030.21^+^0.24\*0.29\*\*0.51\*\*6-mo Outcomes9. PTSS0.59\*\*0.54\*\*0.39\*\*0.62\*\*0.68\*\*0.68\*\*0.21\*0.30\*\*10. Anxiety0.62\*\*0.43\*\*0.35\*\*0.54\*\*0.67\*\*0.64\*\*0.120.29\*\*0.75\*\*11. Depression0.61\*\*0.45\*\*0.30\*\*0.54\*\*0.67\*\*0.71\*\*0.25\*0.34\*\*0.79\*\*0.84\*\*12. Internalising0.28\*\*0.13^a^0.17^+^0.29\*\*0.36\*\*0.41\*\*0.53\*\*0.55\*\*0.49\*\*0.39\*\*0.55\*\*13. Externalising0.23\*−0.0030.060.130.26\*0.21^+^0.33\*\*0.61\*\*0.29\*\*0.27\*0.39\*\*0.67\*\**M* (*SD*)40.20\ (13.47)14.52\ (8.86)37.51\ (10.31)18.84\ (13.54)9.65\ (8.40)6.30\ (6.67)3.84\ (3.71)6.01\ (3.89)12.86\ (11.88)6.67\ (7.18)4.08\ (4.82)3.72\ (4.05)6.27\ (4.79)^a^Using Spearman's rho, 1-mo parent-report internalising was no longer significantly correlated with coping (*r*~*s*~ = 0.20, *p* = 0.06) but 6-mo parent-reported internalising was significantly correlated with coping (*r*~*s*~ = 0.26, *p* = 0.02). Coping was retained in the regression models. There were no other discrepancies between parametric (Bivariate) and non-parametric (Spearman's Rho) tests^+^*p* \< 0.10, \**p \<* 0*.*05, *\*\*p* \< 0.001. PTSS = child-reported posttraumatic stress symptom severity. 'Internalising' and 'Externalising' based on parent-report on the SDQ, all other questionnaires were child self-report. Possible ranges of scores for each measure are presented in the Method Posttraumatic Stress Symptoms {#Sec8} ----------------------------- Significant bivariate correlations were present between all cognitive processes (i.e., appraisals, trauma memory, cognitive coping) and PTSS at T1, and change in each process was significantly associated with change in PTSS scores from T1 to T2 (see correlation matrices in Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}). In a regression model controlling for age and sex, the combined T1 cognitive processes explained 72% of variance in T1 PTSS, *F*(3,114) = 115.98, *p* \< 0.001, with appraisals (*β* = 0.30, *p* \< 0.001), memory (*β* = 0.33, *p* \< 0.001) and coping (*β* = 0.41, *p* \< 0.001) each being unique predictors in the model. We next tested whether change in cognitive processes predicted change in PTSS, by examining prediction of T2 PTSS by cognitive change scores, in a regression model controlling for T1 PTSS (as well as age, sex). Combined cognitive processes explained 41% of variance, *F*(3,102) = 43.11, *p* \< 0.001, and each remained a unique predictor in this longitudinal model (appraisals *β* = 0.43, *p* \< 0.001; memory *β* = 0.15, *p* = 0.034; coping *β* = 0.17, *p* = 0.018).Table 3Bivariate correlations between residual change scores1.2.3.4.5.6.7.1. Appraisals2. Coping0.59\*\*3. Memory0.55\*\*0.50\*\*4. PTSS0.77\*\*0.56\*\*0.56\*\*5. Anxiety0.63\*\*0.51\*\*0.41\*\*0.67\*\*6. Depression0.61\*\*0.47\*\*0.36\*\*0.67\*\*0.72\*\*7. Internalising0.25\*0.33\*\*0.160.28\*\*0.31\*\*0.40\*\*8. Externalising0.22\*^a^0.190.080.120.130.27\*\*0.52\*\*^a^Using Spearman's Rho, change in appraisals was not significantly associated with change in externalising (*r =* 0.12, *p* = 0.29). There were no other discrepancies between parametric (Bivariate) and non-parametric (Spearman's Rho) tests\**p* \< 0.05, \*\* *p* \< 0.01. All scores are 1--6 month residual change scores. Internalising and Externalising based on parent report, all other scores based on child self-report Anxiety Symptoms {#Sec9} ---------------- Each cognitive process was significantly positively correlated with child reported anxiety at T1, and change in each process was associated with equivalent change in anxiety scores from T1 to T2 (see Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}). In a regression model controlling for age and sex, combined T1 cognitive processes explained 63% of variance in T1 anxiety scores, with each being a unique predictor (see Table [4](#Tab4){ref-type="table"}). When additionally controlling for T1 PTSS, the combined cognitive processes still explained 12% of variance in T1 anxiety, and maladaptive appraisals and coping remained unique predictors (see Table [4](#Tab4){ref-type="table"}).Table 4Results of linear regressions for T1 cognitive predictors of T1 symptoms, after controlling for age and sex (Model 1) and T1 PTSS (Model 2)Model 1Model 2Child Report Anxiety*R*^*2*^ = 0.63*, F*(3,114) = 77.6\*\**R*^*2*^ = 0.12, *F*(3,113) = 14.7\*\*  Appraisals0.51\*\*0.45\*\*  Memory0.16\*0.10  Coping0.28\*\*0.21\*\* Depression*R*^*2*^ = 0.59*, F*(3,114) = 62.6\*\*\**R*^*2*^ = 0.05, *F*(3,113) = 6.04\*\*\*  Appraisals0.44\*\*0.29\*\*  Memory0.19\*0.06  Coping0.30\*\*0.15^+^Parent Report Internalising*R*^*2*^ = 0.15*, F*(3,92) = 5.4\*\**R*^*2*^ = 0.06, *F*(3,91) = 2.2^+^  Appraisals0.36\*\*0.34\*  Memory0.060.03  Coping−.01−0.05 Externalising*R*^*2*^ = 0.07*, F*(1,94) = 7.5\*\**R*^*2*^ = 0.07*, F*(1,93) = 4.2  Appraisals0.28\*\*0.28\**R*^2^ and *F* statistics relate to the change in model fit following the inclusion of cognitive variables, controlling for age and sex of the child (Model 1) and additionally for PTSS (Model 2)\*\* *p ≤* 0.01, *\*p* \< 0.05, ^+^*p* \< 0.10 We next tested whether change in cognitive processes significantly predicted change in anxiety from T1 to T2, by controlling for T1 anxiety scores (and age and sex) in a regression model with T2 anxiety as the dependent variable. In combination, cognitive change scores explained 28% of variance in this model, with change in maladaptive appraisals and cognitive coping, but not trauma-memory, uniquely predicting change in anxiety symptoms across the 6-months (see Table [5](#Tab5){ref-type="table"}). When additionally controlling for change in PTSS, combined cognitive processes remained a significant predictor of anxiety, explaining 3% of variance, although no individual cognitive processes uniquely predicted anxiety change (Table [5](#Tab5){ref-type="table"}).Table 5Results of linear regressions analyses of longitudinal data examining change in cognitive processes as a predictor of symptom change (Model 1), including when controlling for change in PTSS (Model 2)Model 1Model 2Child Report Anxiety*R*^*2*^ = 0.28, *F*(3,102) = 22.4\*\**R*^*2*^ = 0.03, *F*(3,101) = 3.0\*  Appraisals0.38\*\*0.19^+^  Memory0.02−0.03  Coping0.20\*0.15^+^ Depression*R*^*2*^ = 0.28, *F*(3,102) = 23.3\*\*\**R*^*2*^ = 0.03, *F*(3,101) = 2.4^+^  Appraisals0.41\*\*0.17^+^  Memory0.003−0.06  Coping0.19\*0.12Parent Report Internalising*R*^*2*^ = 0.10, *F*(2,81) = 6.6\*\**R*^*2*^ = 0.03, *F*(2,80) = 2.2  Appraisals0.03−0.16  Coping0.30\*0.24\* Externalising*R*^*2*^ = 0.02*, F*(1,82) = 3.4^+^*R*^*2*^ = 0.01*, F*(1,81) = 2.0  Appraisals0.16^+^0.19*R*^2^ and *F* statistics relate to the change in model fit following the inclusion of cognitive variables. For the change models, we examined whether T1 to T2 residualized change scores for cognitive processes predicted T2 symptom severity, controlling for age, sex and T1 symptoms (Model 1), and then once also controlling for residualized change in PTSS (Model 2)\*\* *p ≤* 0.01, *\*p* \< 0.05, ^+^*p* \< 0.10 Depressive Symptoms {#Sec10} ------------------- Each cognitive process showed significant positive associations with T1 depression and with change in depression from T1 to T2 (see Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}). In a regression analysis, combined T1 cognitive processes explained 59% of variance in T1 depression, *F*(3,114) = 62.64, *p* \< 0.001, with all three processes being significant independent predictors (see Table [4](#Tab4){ref-type="table"}). When additionally controlling for T1 PTSS, cognitive processes explained 5% of the variance in depression scores, and maladaptive appraisals remained uniquely associated with depression severity (Table [4](#Tab4){ref-type="table"}). Next, after controlling for initial depression severity (and age and sex), change in cognitions from T1 to T2 significantly predicted T2 depression scores, explaining 28% of variance. Here change in maladaptive appraisals and cognitive coping both uniquely predicted depression severity. However, after additionally controlling for change in PTSS scores, change in cognitive processes no longer significantly predicted changes in depression (see Table [5](#Tab5){ref-type="table"}). Parent-Reported Child Internalising Symptoms {#Sec11} -------------------------------------------- Each cognitive process was correlated with parent-reported child internalising scores at T1, but only maladaptive appraisals and coping (not memory) were significantly associated with change in symptoms from T1 to T2 (see Table [3](#Tab3){ref-type="table"}). At T1, in combination, the acute cognitive processes explained 15% of variance in parent-reported internalising, with maladaptive appraisals being a significant unique predictor (see Table [4](#Tab4){ref-type="table"}). After additionally controlling for T1 PTSS, cognitive processes no longer explained significant variance in T1 parent-report internalising, although maladaptive appraisals remained a unique significant predictor (Table [4](#Tab4){ref-type="table"}). As only change in appraisals and coping from T1 to T2 were significantly associated with change in internalising severity (Table [3](#Tab3){ref-type="table"}), only these processes were examined further in regression models. In a model controlling for initial internalising scores, cognitive change scores in combination explained a significant 10% of variance in 6-month internalising problems. Here, change in the child's cognitive coping was uniquely associated with change in internalising severity, but appraisal change was not (Table [5](#Tab5){ref-type="table"}). After controlling for change in PTSS, combined cognitive processes no longer explained significant variance, although change in cognitive coping remained a unique significant predictor of change in parent-report internalising (Table [5](#Tab5){ref-type="table"}). Parent-Reported Child Externalising Symptoms {#Sec12} -------------------------------------------- Only maladaptive appraisals showed significant bivariate associations with externalising symptoms at either T1 or with change at T2, and was considered in regression models (see Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}). After controlling for age and sex, initial maladaptive appraisal scores were significantly associated with parent-reported externalising symptoms at T1, explaining 7% of variance. This effect remained significant after controlling for concurrent 1-month PTSS, explaining 4% of variance in parent-reported child externalising symptoms (see Table [4](#Tab4){ref-type="table"}). However, after controlling for initial externalising symptoms (and age and sex), **c**hange in maladaptive appraisals from T1 to T2 was not significantly predictive of T2 externalising (Table [5](#Tab5){ref-type="table"}). Discussion {#Sec13} ========== We examined trauma-related psychological processes (appraisals, coping, memory) as potential predictors of children's broader psychological outcomes following exposure to acute trauma. We replicated findings that all three processes explain unique variance in acute PTSS and reductions in PTSS over time. We also found robust evidence that children's posttrauma cognitive processes were cross-sectionally and longitudinally associated with non-PTSD internalising problems, based on both self- and parent-report. These associations with wider child internalising symptoms were particularly reliable for child-reported maladaptive appraisals and maladaptive cognitive coping strategies (i.e., thought suppression and rumination); and were partially retained even after levels of PTSS were controlled for. There was less evidence for the role of trauma related cognitive processes in predicting externalising difficulties. Our findings add to the limited literature showing trauma-related cognitive processes are important for children's broader mental health following trauma. In particular, it builds on cross-sectional studies that have demonstrated associations between trauma-related negative appraisals and broader psychopathology (e.g., Leeson and Nixon [@CR26]; Liu and Chen [@CR27]). The current study found that maladaptive appraisals, coping and trauma memory quality at 1-month posttrauma were each moderately to strongly correlated with children's self-reported depression and anxiety symptoms, and showed slightly smaller associations with parent-reported child internalising symptoms. Each cognitive process explained unique variance in child reported non-PTSD internalising symptoms at 1-month posttrauma, whereas negative appraisals were the only independent predictor of parent-reported internalising at this timepoint. Longitudinal analyses examining change in cognitive processes over time found a similar pattern of results. Together, changes in maladaptive cognitive processes explained a relatively large 28% of variance in change in anxiety and depression across a 6-month follow-up, and a smaller 10% of variance in change in parent-reported internalising problems. Changes in appraisals and coping were identified as uniquely associated with symptom change when cognitive processes were examined simultaneously as predictors. Although not the main focus of the current study, we also found robust longitudinal evidence that appraisals, memory and maladaptive coping strategies each explain unique variance in children's PTSS, consistent with cognitive models (e.g., Ehlers and Clark [@CR12]). In particularly stringent analyses, we examined whether cognitive processes could predict broader internalising symptoms when controlling for co-occurring PTSS. This substantially reduced the variance explained by cognitive factors, which is unsurprising given the strong correlation and symptom overlap between PTSS, anxiety and depression. Nevertheless, even after controlling for concurrent PTSS we still found that maladaptive appraisals (e.g., "the world is unsafe", "I'll never get over what happened") and cognitive coping (i.e., thought suppression, rumination), remained cross-sectionally associated with children's non-PTSD internalising at 1-month posttrauma. Moreover, in longitudinal analyses, reductions in maladaptive cognitive coping over time continued uniquely to predict change in parent-reported child internalising problems, while the combined cognitive processes significantly predicted reductions in child reported anxiety. This indicates that associations are unlikely to be secondary to PTSD symptoms, but rather that cognitive processes potentially make a direct contribution to children's wider internalising problems following trauma. It is notable that whereas negative appraisals and maladaptive coping strategies were relatively consistently associated with children's anxiety and depression, there was less robust evidence for the role of trauma-related memory qualities in relation to longer-term broader psychopathology. Thus, although trauma memory quality showed a clear pattern of bivariate associations with child internalising symptoms, it did not emerge reliably as a unique predictor of distress over and above other processes, particularly in longitudinal models; and there was no evidence that memory quality predicted wider internalising problems once PTSS was controlled for. Caution is warranted when interpreting these null findings, due to the strong overlap between all three processes and sets of symptoms. Nonetheless, in this case we cannot rule out the possibility that associations with anxiety and depression are accounted for by the co-occurrence of PTSD symptomatology. Whereas negative appraisals and maladaptive coping strategies are widely implicated in models of anxiety (e.g., thought suppression) and depression (rumination), trauma-memory quality may be a unique driver of traumatic stress. This is consistent with theoretical perspectives that highlight traumatic memories as a key defining feature of PTSD versus other emotional disorders, both phenomenologically and in terms of underlying neural processes (e.g., Elzinga and Bremner [@CR15]). Overall, our evidence highlights the potential utility of considering trauma-related maladaptive coping strategies and appraisals as potential treatment targets in depressed or anxious youth who present following trauma exposure. That the same processes that maintain PTSS also contribute to non-PTSD internalising may also explain why many CBT trials targeting PTSD see concurrent reductions in internalising comorbidities (e.g., Deblinger et al. [@CR9]; Goldbeck et al. [@CR17]; Smith et al. [@CR44]). Our findings suggest that this change in broader psychopathology likely particularly results from the targeting of children's maladaptive appraisals and coping strategies. While our findings suggest that a robust focus on appraisals and maladaptive coping may be particularly clinically useful when young people present with internalising problems linked to trauma, replication is required before drawing clinical conclusions. We found substantially less evidence that posttrauma cognitive processes contribute to child externalising symptoms. Our findings build on Liu and Chen's ([@CR27]) study with a community-sample of adolescents, replicating a cross-sectional association between appraisals and externalising, but additionally suggest that changes in trauma-related appraisals do not drive longer-term adjustment in terms of externalising behaviour. We found no evidence that trauma memory quality or maladaptive cognitive coping relate to children's posttrauma externalising symptoms. The suggestion that these psychological processes may be less relevant to the maintenance of child externalising is consistent with some findings from treatment studies. For example, Deblinger et al. ([@CR9]) found that externalising was more effectively targeted in a treatment that had a larger focus on parent-training, compared to a treatment that placed more focus on children's trauma-related memories and appraisals. Thus, characteristics of children's posttrauma social environment may be more relevant to managing posttrauma externalising behaviours (Deblinger et al. [@CR8]; Silverman et al. [@CR43]). Findings should be interpreted in the light of limitations. First, as this is an observational longitudinal study, causation cannot be determined. Second, we did not include a child-report measure of externalising symptoms in our study, and we were unable to compare exact measures of internalising (i.e., anxiety and depression) across child- versus parent-report. The approach we took to symptom measurement is consistent with best practice: parent or teacher reports are considered the gold standard for measuring children's externalising (Stanger and Lewis [@CR46]), whereas child-report is recommended for measurement of PTSS (e.g., Kassam-Adams et al. [@CR24]; Meiser-Stedman et al. [@CR32]). Our observation that posttrauma child internalising problems reduced from 1-month to 6-months according to child-report but not parent-report may suggest that parents are reporting on children's pre-established psychological profiles, rather than detecting changes in their posttrauma mental health. This is consistent with the view that parents may be relatively poor at detecting children's posttrauma symptoms. Parental perceptions of their child's distress may also be influenced by their own posttrauma distress. Nonetheless, single-informant bias may substantially inflate associations in the context of psychopathology, and associations between child-reported symptoms and cognitions should be considered with this in mind. Null findings should also be considered in the light of the relatively modest overall sample size. The sample size also meant we were not appropriately powered to run more sophisticated analyses, such as structural equation models, which may be better able to account for covariance between the different symptom outcomes. Finally, it is notable that, as is typical of low-risk acute-incident emergency department samples, overall internalising and externalising symptoms in our sample were relatively low. For the majority of participants the index trauma was an acute accidental injury, and while families were from a range of socio-economic backgrounds, the sample was mostly culturally- and ethnically-homogenous, and captured children up to 13 years old. Findings cannot be generalised to more complex traumas or high-risk groups, or to adolescents or other cultural contexts. In conclusion, cognitive processes that are known to be important in the maintenance of PTSD are also likely to be relevant for children's broader posttrauma internalising difficulties. Our findings particularly highlight the role of maladaptive coping and maladaptive appraisals, in predicting acute distress and reductions in non-PTSD internalising problems, and suggest that it may be beneficial to take a trauma-informed approach to addressing posttrauma internalising problems by targeting these processes. What remains to be seen is whether trauma informed treatment frameworks may effectively target trauma-related anxiety and depression in the absence of clinical-level PTSD. Electronic supplementary material ================================= {#Sec14} ESM 1(DOCX 35 kb) We thank families for their generosity in participating; clinical teams at the Bristol Royal Hospital for Children, Royal United Hospital Bath, Great Western Hospital, and the Gloucestershire Royal Hospital for supporting our research; and Hope Christie, Claire Dixon and Victoria Williamson for their assistance with this research. CC is funded by an NIHR Research Professorship (RP_2014-04-018) and RMS is an NIHR Career Development Fellow (CDF-2015-08-073). The views expressed are those of the authors and not necessarily those of the NHS, the NIHR or the Department of Health. This research was funded by an Economic and Social Research Council (ESRC) grant awarded to SLH (ES/K006290/1). Conflicts of Interest {#FPar7} ===================== None. Ethical Approval ================ Ethical approval was obtained from the University of Bath Research Ethics Committee and the NHS Research Ethics Committee South Central - Oxford A (Ref 137454). Data Access {#FPar8} =========== Halligan, Sarah and Hiller, Rachel (2017). The role of trauma specific behaviours and parenting style in facilitating child psychological adjustment. \[Data Collection\]. Colchester, Essex: UK Data Archive 10.5255/UKDA-SN-852668
MLS Power Rankings: Week 3 Week 3 saw a series of comebacks, golazos and great saves. What it didn’t produce was any kind of clear consensus, since more than half the week’s games ended tied and a couple of the league’s best had a bye. Still, there are always some winners and losers in the rankings, and if you've got an issue with ours, vote for your own! All match times for this week's games are ET. Rank Trending Last Club Comment 1 1 Nothing anyone in the league did this past weekend could have knocked RSL out of the top spot: a 4-0-1 mark in all competitions heading into Tuesday’s CONCACAF Champions League semifinal second leg, Nick Rimando the Player of the Month for March and every reason to believe the RSL machine will keep chugging along indefinitely. Which isn’t to say the Rapids are far behind. It’s not often MLS Cup champs get better and deeper, but it looks like that’s exactly what happened this offseason with the addition of Caleb Folan and Sanna Nyassi. A midweek US Open Cup play-a loss at the Chicago Fire in which the Rapids played largely a reserve squad – is a blip, not a trend. New York are not the first team to have their night ruined by Tally Hall, but Juan Agudelo and especially Thierry Henry were complicit in the 1-1 scoreline. Despite the addition of Dwayne De Rosario, there are real questions to ask of this team, first and foremost being, “Where are the goals going to come from?” No definitive answers yet. The Power Rankings committee was right to give LA a mulligan for their 4-1 drubbing at RSL last week. The return of some key starters – none more so than Omar Gonzalez – and a clever tactical shift from Bruce Arena provided the best defensive performance of any team this year, even while down a man. The Union kept their core pieces from 2010, but look like a totally different team. They’re now defined by a lock-down defensive unit and a solid veteran 'keeper. Gone too, though, is the attacking verve and creativity that was the highlight of the inaugural season. They need Sebastien Le Toux and Justin Mapp to get healthy — and Danny Mwanga to rediscover his confidence. The place of the Fire is still up for debate since they’ve played most of the season up a man and then beat a Colorado side in the Open Cup play-in that was short-handed. But there’s no denying the attacking power of Gastón Puerari, Diego Cháves, Marco Pappa and Patrick Nyarko. Things are looking good in the Windy City. The Quakes still have some kinks to work out with Frank Yallop’s new 4-3-3, but there’s no question they’re generating chances and playing some good soccer. With Ike Opara returning to full health and fighting for minutes, there’s a good chance the defense will improve as well. On First Kick weekend, the Revs played a 1-1 draw at LA that probably felt like a win. This past Saturday, their 1-1 home result against the Timbers probably felt like a loss. The good news, though, is that last year’s leaky defense is a thing of the past and central defender A.J. Soares is an early Rookie of the Year contender. For about 65 minutes they were climbing up the rankings behind some of the most exciting attacking play in the league. Then the questions about their outmanned defense cropped up again in what was a stomach-punch of a draw. How they bounce back can reveal a lot about this team. It’s looking very likely that the ‘Caps aren’t your run-of-the-mill expansion franchise. Their 3-3 comeback draw sent the crowd into delirium – rightly so – and spoke to a heart and solidarity that any team in the world would envy. When Eric Hassli and Russell Teibert get back, and Jay DeMerit and Davide Chumiento get healthy, Vancouver could be a force. Getting a point from a very good San Jose team at their house is a positive result. Doubly so when two goals are part of the package, and newest signing Mauro Rosales shows his playmaking chops in the final third. Also, Steve Zakuani looks like he’s made the leap and become one of the top five players in the league. The Crew finally got the ship headed in the right direction with their 2-0 win over FC Dallas on Friday. Emilio Renteria provided the spark and Eddie Gaven iced the cake, but the questions about the team’s form in front of net will continue to be real until Andres Mendoza starts scoring from the run of play. For the second straight week, Tally Hall stood on his head and got his team a point on the road. He has faced nearly 50 shots in the last 180 minutes, and only two have found their way into the back of his net. It’s great to have a goalkeeper who can get you points, but Hall’s teammates are going to have to do some heavy lifting of their own soon. Hand-wringing about De Rosario, debates about sacred locker rooms and the miss of the century overshadowed what was a strong last 70 minutes from TFC. Tony Tchani protected the back line, Danleigh Borman got up and down the left wing and their shape was solid throughout. The new beginning looked good, even though the result was disappointing. This marks the second straight week that DC conceded goals in bunches, a worrying trend for Ben Olsen. Relying on rookie Perry Kitchen to come back and right the ship is promising but dangerous as Kitchen is just 19 years old. The offense, however, still looks good – even when playing at the champs, and even without a number of starters. It’s not crisis time in Dallas just yet: FCD were equally bad to start the 2010 season. But it looks like the loss of all the “little things” Dax McCarty did has taken a big-picture toll. Add in some defensive injuries, under-performing rookies and the fact that they keep giving their opponents a man advantage, and it’s been an ugly start to 2011 in Big D. The Timbers got their first win in MLS with a midweek victory over Chivas USA in a US Open Cup play-in game, then got their first point in the league by going on the road and playing pretty well at New England. Jack Jewsbury was the key man in both results, and the Timbers now have something to build upon. A point on the road is a good result for a team looking for anything at all to be positive about. But they were lucky to get that much, and haven’t consistently been threatening in the final third. Robin Fraser & Co. have a lot of work yet to do to prevent a long season for the Rojiblancos.
Masters in Neuroscience​ programs prepare students to conduct, analyze and communicate critical research on the human brain and nervous system. As a sub-field of biology, Neuroscience is an interdisciplinary science that examines the structure, evolution and functioning of the nervous system in relation to behavioral patterns. It draws from a spectrum of other fields that includes biology, chemistry, physics, linguistics, math, computer science and philosophy, which could contribute to your Masters in Neuroscience. Masters in Neuroscience programs provide additional and intensive laboratory research and academic training to students who have completed an undergraduate major in neuroscience or a closely related scientific area, and wish to extend their studies before moving on to a Ph.D. research program or professional employment. Physicians who are seeking to expand their expertise about the nervous system may also benefit from a Masters degree in Neuroscience. Prerequisite education for a Masters of Neuroscience degree is a Bachelor’s degree in physical, behavioral or biological science; a strong background in math and physics is also recommended. There are both thesis and non-thesis options; students who prefer to enter the workforce upon graduation may take a non-thesis master's program. Choosing a Masters Programs in Neuroscience: On-Campus or Online? GradSchools.com makes it easy to find Neuroscience Masters Programs by learning format. If you prefer traditional on-campus learning, you may want to initiate a search by location; use the city, state or country tabs to browse listings. If distance-learning is more convenient to you, look into online masters in neuroscience degrees. Some of the choices might include MS Cognitive and Computational Neuroscience, or Master of Science in Neuroscience. Neuroscience Masters Programs Potential Coursework Each Masters of neuroscience degree program may have its own specific course requirements. Some programs may include elements of biology, statistics, physiology and pharmacology. Curricula tend to be lab-intensive, and students have the opportunity to develop their analytical science skills in addition to their general competence in neuroscience and its sub-areas. Some of the common course topics students might expect to encounter may include: Neurophysiology and neurobiology Cell and molecular biology Language and the brain Neuroendocrinology Neuroanatomy Psychopharmacology Physiology and anatomy Biostatistics Masters in Neuropsychology | Areas of Specializations in Neuroscience Students may decide to specialize in a wide variety of areas. Some potential concentrations might include: Neuroplasticity Synaptic transmission Homeostatic regulatory systems Biological bases of neuropsychiatric disorders Cognitive / Behavioral neuroscience Developmental neuroscience Affective neuroscience Molecular neuroscience Neuroimaging Neurophysiology Neuro-linguistics Potential Careers For Masters in Neuroscience Graduates Graduates of master's programs in neuroscience may pursue a variety of potential career opportunities in diverse areas, though level of education may matter; if your ultimate goal is to become a medical scientist, neurologist, academic, or higher-level researcher, an MS in Neuroscience is a springboard, rather than a qualifying degree. This being said, employment growth for Neurology technicians, which is included in the category of Medical and Clinical Laboratory Technologists and Technicians is projected to increase by 16% between 2014 and 2024. The Bureau of Labor Statistics considers this much faster than average growth.[i] Other potential careers might include: Neurogenetic Counselors.: According to the BLS, more genetic counselors are specializing in fields such as cardiovascular health, genomic medicine, neurogenetics, and psychiatry, and employment of genetic counselors is projected to grow 29% from 2014 to 2024[ii] Neuropsychologists: Study the effects of brain injuries, brain disease, developmental disorders, or mental health conditions on behavior and thinking. Employment growth for Psychologists is also favorable; a 19% growth is projected between 2014 and 2024[iii] Ready to Pursue a Masters Degree in Neuroscience? Earning a Masters in Neuroscience is a degree that has the potential to prepare you to either enter the workforce upon graduation, or pursue higher education and thus open yourself to other professional options. Why not begin reviewing the Neuroscience Masters Programs on GradSchool.com to find one that aligns with your goals! By entering my email address and clicking "Sign Up" I agree to be contacted by EducationDynamics for additional education products and services, this submission is not required to use our site. Privacy Policy. EducationDynamics maintains business relationships with the schools it features. The sources for school statistics and data is the U.S. Department of Education's National Center for Education Statistics and the Integrated Postsecondary Education Data System.
Monoclonal gammopathy of unknown significance in a bone marrow donor. We report on a patient suffering from multiple myeloma, for whom allogeneic bone marrow transplantation was planned. Donor workup revealed monoclonal gammopathy of unknown significance. We discuss this finding and stress the importance of performing complete donor examinations.
Alexis Sanchez says he will discuss his Arsenal future with Arsene Wenger at the end of the season, but is frustrated he has not been able to win the big titles he feels can make a player become truly great. The Chile international is out of contract in 2018 and has been the subject of intense speculation throughout the campaign, with the Gunners struggling to secure a top-four Premier League finish, the FA Cup final representing their only chance of silverware. Sanchez has impressed individually this season, scoring 24 goals in all competitions, but he insists it is the chance to win league titles and the Champions League that drives him, which will play a part when he thinks about his next move after 2016-17. Asked if there was any news on his future following optimistic comments from Wenger, Sanchez told Sky Sports: "No, we have said that the two of us will sit down together to discuss the topic in terms of what will happen and what we are going to do, what is best for the club, what is best for me, what is best for him. "We will speak once the season is over because if I speak now, that would take my focus away from what I want, which is qualifying for the Champions League and winning the FA Cup. "It depends. What I want to do now is to finish the season well and then I will sit down with the club to decide what I'm going to do. "I'm very happy about [my goal tally], but, as always, I demand more from myself. I think that if a player wants to be at the very top, he needs to win the Champions League and league titles. That's what makes the great players truly great. "I don't think it has been a very good season for me because I came here to win trophies, to be competing in the Champions League semi-finals and to win the Premier League. "I want to win the Champions League which is every footballer's dream. I want to win the Premier League because I play here. "I feel disappointed that we are not in a position to win the Premier League or the Champions League, but we do have the FA Cup final coming up and we will give it our all to try to win it. "When I got here, I thought, 'I will win the title with this squad'. I feel that we should win more games 3-0 or 4-0, of course, that does sometimes happen when we play very well. I think Arsenal play the best brand of football in England. "I have played for other clubs and I have to say that the quality of the players here is very impressive. There isn't a very big difference." Sanchez insists his frustrated body language during some disappointing Arsenal performances simply highlights his desire to succeed. "Players who want success in football and people who want to achieve greatness in life get angry when it's not going well and demand more from themselves," he said. "Sometimes I am frustrated, sometimes I'm not. There have been games when we have been in a position to kick on and win, but we have made a small mistake and found ourselves 2-0 down. "Sometimes that gets to me because winning those points is so important if you want to win the Premier League. "No, I'm not normally like that [an angry character]. I sometimes get angry with myself because there are moments on the pitch when I make mistakes and I don't like it when that happens."
Posts Tagged ‘child’ Middle Child leaves for Europe this week. It’s the same kind of trip that Oldest Child took two years ago, a few days in France, a few days in Spain, but Middle Child will be going to different cities than his brother did. The same teacher is heading up the group and it’s a good, responsible, group of kids, so I’m not worried about logistics or crazy behavior. Of course, I am very jealous because I am a ridiculous Europhile, but I am genuinely glad that he’s getting this opportunity, the same as his brother did. I had my first out-of-the-country experience when I was sixteen. Of course, I’d been to Canada several times before that, but as it is for any Detroiter, going to Canada was so not a big deal. No, I had the opportunity to go to Australia and Hawaii with the Michigan Lions All-State Band and it was a fabulous time. I’ve written about it before, so I won’t go on about it too much, but that trip was a pivotal time in my life. It was on that trip that he realization sunk in that the U.S. was not the only place in the world, that there were other realities for other people, and that the places where they lived were just as important to them as mine was to me. Granted, Australia isn’t shockingly different from the U.S., and Hawaii, while culturally different, is a state, but it was just enough to give me a hunger to see what else is out there, not just in my own backyard. This isn’t discounting anything that is here in the U.S., there are some pretty amazing places in my own country, but I think for people to have a balanced view of the world, they should see more of it with an open mind, not with the expectation that everyone should be like us. That is what I hope Middle Child takes away from his experience. His first trip overseas will be different than mine, however, because it will be to two countries where English isn’t the first language, and he’s in for a real eye-opener. Even if you take the time beforehand to study the language, using the words around native speakers for the first time is a scary thing. Of course, in the big cities, many people do speak English because there are so many tourists, but I found out that even a little effort to try the native language is appreciated by most people. Middle Child hasn’t done a lot of studying, so he may be in for some surprises. I said that I wasn’t worried, and I’m not, but there is that part of me that is nervous about letting my baby go for an extended period of time over the ocean without me. It has nothing to do with the threat of terrorism, that’s a risk that we take anywhere we are today, unfortunately, but more of the I’ve-taught-you-everything-I-can-now-you’re-on-your-own kind of thing. Don’t get me wrong, he’s a smart kid and he’s going to be just fine, but I think every mother would feel the same, at the least the first time. When Oldest Child went back to Europe this last summer for work study, I wasn’t concerned at all because he did so well when he went to France and Spain. All in all, it’s another sign that my kids are growing up. They are moving on to make their own wonderful memories, and that’s a very, very, good thing. Middle Child leaves in just a few days and it’s taking a lot for me not to jump on that plane with him. Maybe sometime in the future, one of them will let me tag along. There are things that I’m thinking about when I look at you and you say, “What?”. Here’s some insight as to what may be running through my mind. You see, memories from when you were very new stay with me, and I love to go back and revisit the flashes of you that I still see today. Things like: – Taking a pregnancy test to prove your father wrong, happily finding out that it was me who was wrong. – Going to the doctor because I thought I broke a rib riding horseback, only to find out I would be a mama. – Taking a pregnancy test because The Wizard of Oz made me sob. – The secret, flutterby, kicks that made me smile. -The never-ending waiting for you to be born. Christmas doesn’t hold a candle to a due date. – Tiny. So, so, very tiny. – Baby sighs and phantom smiles in your sleep. – Those baby giggles when I pretended to sneeze. – The absolute contentment when you would fall asleep on my chest, warm and cozy. – The protective instinct. I could quite easily kill anyone who hurt you, even now. – Picking you up from preschool. You were so happy to see me, unashamed to hug me as tight as you could and tell me all about your day. – The first time another kid rejected you. I never wanted to hit a 7-year-old before. (Just to clarify, I would never hit a 7-year-old.) – The joy of your joy, whether it was a bug friend, a song you sang to me, or a baby lamb, the sight of you deliriously happy was my whole world. -You sleeping in a fuzzy blanket, dark lashes on pale cheeks. -The three of you on the couch arms and legs entwined like a pile of puppies while watching tv. – The ache of watching you become more independent, knowing that every accomplishment takes you a small step away from me, but knowing that it is meant to be. So when you catch me staring at you, with a funny look on my face, chances are something like these thoughts are racing through my brain. It’s because I love you. I love who you are, I love who you were, and I love who you are becoming.
Q: how to save html page in pdf format include contents like text, image using jquery I want to save HTML page into pdf format, Im using jsPDF script this works only in text format but if any URL or image in this page, script not working. A: DOMPDF will be useful for HTML to pdf and it will support for images and links also. Please go through https://github.com/dompdf/dompdf
Monday, August 8, 2011 Hoisin Noodles with Turkey and Green Beans If I had actually followed the recipe for tonight's dinner, the calories in this meal would have been significantly lower. Also, if I had followed the recipe, this dinner would have qualified as a dish requested by one of my MFP pals: a meal involving pasta and chicken. Here is where the problem lay.. My grocery store didn't have ground chicken and I really wasn't in the mood to travel around to different stores to find a place that did. I decided to settle for turkey, because I figured it would be closer in calories to chicken than like.. beef. I mean, that's still probably right, but holy shoot did it rocket my initial estimate really high. I use the website myfitnesspal and I asked my friends over there to tell me what they wanted to see me cook. Every suggestion I got has been worked into my meal plans for the next two weeks. Every day I'll be posting at least one dish. At least one dish will be something I made per the request of an MFP friend. Today's dish.. well, just pretend there's chicken in it instead. If you can find ground chicken that is. It's obviously not the easiest thing to find in the whole world. The flavor was really yummy, kind of spicy, but generally just good. 1. Bring a large pot of salted water to a boil. Boil the green beans for 6 minutes. Add the ramen and boil for 4 more minutes. Drain. 2. In small bowl combine the hoisin sauce, lime juice, and chili paste. 3. In a skillet heat the olive oil. Add the turkey and cook until no longer pink. Add the garlic and cook until tender. Add the green beans and ramen and stir to combine. Add the green onions and combine more.
A characterization of excitatory postsynaptic potentials in the avian nucleus magnocellularis. 1. The activation of current-clamped neurons in the chick nucleus magnocellularis (nMAG) by eighth nerve stimulation has been studied in a brain slice preparation using patch electrodes. Single presynaptic stimuli produced rapidly rising, suprathreshold, excitatory postsynaptic potentials (EPSPs) with a synaptic delay of approximately 0.4 ms. Spontaneous, miniature EPSPs (mEPSPs) were evident in control extracellular solution and in the presence of tetrodotoxin (TTX). 2. The EPSP was composed of a large, brief component that was sensitive to antagonists of alpha-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid (AMPA) receptors, and a smaller, slowly decaying component that was sensitive to both N-methyl-D-aspartate (NMDA) and AMPA receptor antagonists. 3. Injection of depolarizing current steps revealed a strong outward rectification of the membrane conductance at potentials close to the resting potential. Consequently, neurons could fire only a single, TTX-sensitive action potential during a current step. The conductance responsible for this rectification was sensitive to 1 mM 4-aminopyridine but not to 1 mM tetraethylammonium. 4. Following the termination of depolarizing current pulses, membrane potential decayed with a half-time (t1/2) that decreased as the depolarizing current increased, reaching approximately 0.25 ms for a depolarization from rest of 20 mV. The t1/2 for the decay of EPSPs matched the membrane t1/2, indicating that the underlying synaptic conductance decays more quickly than the membrane t1/2. 5. The slow phase of the EPSP was always longer than the membrane t1/2 and increased in size with hyperpolarization. This result is consistent with the contribution of AMPA receptors to the slow, as well as fast, EPSP. 6. The safety factor for transmission with low-frequency stimuli was large, as indicated by the rise time of the EPSP, the extent to which the EPSP shunted the action potential, and the size of EPSPs after prolongation of the synaptic conductance by cyclothiazide. 7. During repetitive synaptic stimulation, the slow EPSPs summated to produce a plateau depolarization of 10-20 mV. The plateau potential was only partially blocked by NMDA receptor antagonists. 8. During trains of stimuli, the faster EPSPs rode atop the plateau potential and could drive action potentials at rates up to 500 Hz for short periods. Synaptic depression was evident during trains, such that EPSPs often fell below threshold after 5-10 stimuli at rates above 200 Hz. EPSPs could remain suprathreshold for several seconds at 50 Hz.(ABSTRACT TRUNCATED AT 400 WORDS)
Morrison Road Morrison Road is a major road which runs through the suburbs of Woodbridge, Midland, Midvale and Swan View, in the east of Perth, Western Australia. It connects with other major roads and highways including Roe Highway, Lloyd Street, Great Northern Highway and Great Eastern Highway. It also plays a major role in bringing in traffic into the Midland City Centre. With sections of the road originally named Woodbridge Terrace and Boundary Road, the road was later given the one name of Morrison Road after James Morrison who was responsible for subdividing land along the southern side of the road in 1897. The section west of Great Northern Highway is part of National Route 1. It connects the route from that highway to Great Eastern Highway. See also References Category:Roads in Perth, Western Australia Category:Highway 1 (Australia)
SLAVERY IN FOCUS January 16, 2013 The history of slavery is outside my immediate compass since I do not watch contemporary films. My ancestors (I imagine) were either indigenous inhabitants of the islands on the North West coast of the Eurasian landmass,or conceivably they might have been part of the extraordinary migration of boat people from the mainland, who might then have been captured by the Feudal System, which underpinned the conflict there over rights in the 17th Century. I have some experience of wage slavery, of course, and it bears repetition that modern corporations are not fundamentally democratic, which in the very least is deeply contradictory. Perhaps this observation might not be coincidental. History is often reduced to a mythical narrative. I have been criticized, probably correctly, for dabbling in this activity. Some myths, even if contradicted by very apparent evidence, both then and now, such as the Egalitarian Myth may be on balance be positive. However, it is more important to recognize the humanity of all people, and therefor their human potentials. Imara Jones at Colorlines, via Alternet, identifies her list of ten top things everybody should know about the economic history of slavery in the US: 1) Slavery laid the foundation for the modern international economic system. The massive infrastructure required to move 8 to 10 million Africans halfway around the world built entire cities in England and France, such as Liverpool, Manchester and Bordeaux. It was key to London’s emergence as a global capital of commerce, and spurred New York’s rise as a center of finance. The industry to construct, fund, staff, and administer the thousands of ships which made close to 50,000 individual voyages was alone a herculean task. The international financial and distribution networks required to coordinate, maintain and profit from slavery set the framework for the modern global economy. 2) Africans’ economic skills were a leading reason for their enslavement. Africans possessed unique expertise which Europeans required to make their colonial ventures successful. Africans knew how to grow and cultivate crops in tropical and semi-tropical climates. African rice growers, for instance, were captured in order to bring their agricultural knowledge to America’s sea islands and those of the Caribbean. Many West African civilizations possessed goldsmiths and expert metal workers on a grand scale. These slaves were snatched to work in Spanish and Portuguese gold and silver mines throughout Central and South America. Contrary to the myth of unskilled labor, large numbers of Africans were anything but. 3) African know-how transformed slave economies into some of the wealthiest on the planet. The fruits of the slave trade funded the growth of global empires. The greatest source of wealth for imperial France was the “white gold” of sugar produced by Africans in Haiti. More riches flowed to Britain from the slave economy of Jamaica than all of the original American 13 colonies combined. Those resources underwrote the Industrial Revolution and vast improvements in Western Europe’s economic infrastructure. 4) Until it was destroyed by the Civil War, slavery made the American South the richest and most powerful region in America. Slavery was a national enterprise, but the economic and political center of gravity during the U.S.’s first incarnation as a slave republic was the South. This was true even during the colonial era. Virginia was its richest colony and George Washington was one of its wealthiest people because of his slaves. The majority of the new country’s presidents and Supreme Court justices were Southerners. However, the invention of the cotton gin took the South’s national economic dominance and transformed it into a global phenomenon. British demand for American cotton, as I have written before, made the southern stretch of the Mississippi River the Silicon Valley of its era. The single largest concentration of America’s millionaires was gathered in plantations along the Mississippi’s banks. The first and only president of the Confederacy—Jefferson Davis—was a Mississippi, millionaire slave holder. 5) Defense of slavery, more than taxes, was pivotal to America’s declaration of independence. The South had long resisted Northern calls to leave the British Empire. That’s because the South sold most of its slave-produced products to Britain and relied on the British Navy to protect the slave trade. But a court case in England changed all of that. In 1775, a British court ruled that slaves could not be held in the United Kingdom against their will. Fearing that the ruling would apply to the American colonies, the Southern planters swung behind the Northern push for greater autonomy. In 1776, one year later, America left its former colonial master. The issue of slavery was so powerful that it changed the course of history. 6) The brutalization and psychological torture of slaves was designed to ensure that plantations stayed in the black financially. Slave revolts and acts of sabotage were relatively common on Southern plantations. As economic enterprises, the disruption in production was bad for business. Over time a system of oppression emerged to keep things humming along. This centered on singling out slaves for public torture who had either participated in acts of defiance or who tended towards noncompliance. In fact, the most recalcitrant slaves were sent to institutions, such as the “Sugar House” in Charleston, S.C., where cruelty was used to elicit cooperation. Slavery’s most inhumane aspects were just another tool to guarantee the bottom line. 7) The economic success of former slaves during Reconstruction led to the rise of the Ku Klux Klan. In less than 10 years after the end of slavery, blacks created thriving communities and had gained political power—including governorships and Senate seats—across the South. Former slaves, such Atlanta’s Alonzo Herndon, had even become millionaires in the post-war period. But the move towards black economic empowerment had upset the old economic order. Former planters organized themselves into White Citizens Councils and created an armed wing—the Ku Klux Klan—to undermine black economic institutions and to force blacks into sharecropping on unfair terms. Isabel Wilkerson’s Pulitzer Prize-winning book, “The Warmth of Other Suns”, details the targeting of black individuals, as well as entire black communities, for acts of terror whose purpose was to enforce economic apartheid. 8) The desire to maintain economic oppression is why the South was one of the most anti-tax regions of the nation. Before the Civil War, the South routinely blocked national infrastructure protects. These plans, focused on Northern and Western states, would have moved non-slave goods to market quickly and cheaply. The South worried that such investments would increase the power of the free-labor economy and hurt their own, which was based on slavery. Moreover, the South was vehemently opposed to taxes even to improve the lives of non-slaveholding white citizens. The first public school in the North, Boston Latin, opened its doors in the mid-1600s. The first public school in the South opened 200 years later. Maintenance of slavery was the South’s top priority to the detriment of everything else. 9) Many firms on Wall Street made fortunes from funding the slave trade. Investment in slavery was one of the most profitable economic activities throughout most of New York’s 350 year history. Much of the financing for the slave economy flowed through New York banks. Marquee names such as JP Morgan Chase and New York Life all profited greatly from slavery. Lehman Brothers, one of Wall Street’s largest firms until 2008, got its start in the slave economy of Alabama. Slavery was so important to the city that New York was one the most pro-slavery urban municipalities in the North. 10) The wealth gap between whites and blacks, the result of slavery, has yet to be closed. The total value of slaves, or “property” as they were then known, could exceed $12 million in today’s dollars on the largest plantations. With land, machinery, crops and buildings added in, the wealth of southern agricultural enterprises was truly astronomical. Yet when slavery ended, the people that generated the wealth received nothing. The contention that outright theft, rather than the workings of the price system in a free market, was the primary engine of economic wealth in the West will have some ideologues frothing. But if the “market” was so great, why was slavery necessary and why was it maintained. Whatever else it may be slavery is a system of economic and social violence. The History of Slavery in the US provides an overview from the 17th Century to Reconstruction, including reference to Frederick Douglass, Harriet Tubman and James Brown: Related articles The real reason the Second Amendment was ratified, and why it says “State” instead of “Country” (the Framers knew the difference – see the 10th Amendment), was to preserve the slave patrol militias in the southern states, which was necessary to get Virginia’s vote. Founders Patrick Henry, George Mason, and James Madison were totally clear on that . . . and we all should be too. So this contention seems credible, and so it is very significant given the current fervour among many gun ownership advocates. Related With just one click, your heavy garage doors will open, without you having to touch the door. It often comes in two varieties one with dual flexible sides and one that has a hard side and a flexible side that looks a lot like wood molding. Just as you did before, watch for any glowing items, since you’ll want to be able to build a new lock grinder in a moment.
Profile and bioconcentration of minerals by King Bolete (Boletus edulis) from the Płocka Dale in Poland. This study aimed to provide basic data on the composition of metallic elements, including toxicologically important Cd and Hg, in popular and prized wild King Bolete mushrooms. We investigated the importance of soil substratum as a source of these metals. ICP-OES and CV-AAS were applied to determine the profile of Al, Ba, Ca, Cd, Cu, Fe, Hg, K, Mg, Mn, Na, Sr and Zn in caps and stipes of King Bolete mushroom and in the surface layer of soil (0-10 cm) from the Płocka Dale area of Poland. Hg, Cu, Cd, Zn, Mg and K exhibited bioconcentration factors (BCF) > 1. Specifically, Hg, Cu and Cd (mean BCFs for caps were 110, 19 and 16, respectively) were efficiently bioconcentrated by King Bolete, while other elements were bioexcluded (BCF < 1). Cadmium was present in the caps at mean levels of 5.5 ± 2.4 mg kg(-1) dry weight (dw) and mercury at levels of 4.9 ± 1.4 mg kg(-1) dw, both occurring at elevated concentrations in those King Bolete mushrooms surveyed.
TLCA has roughly 4000 members and of those members I would say less than 100 have ham radios. Are you saying screw talking to the other 3900 Toyheads because they don't have the same equipment you have? With that kind of attitude those other 3900 probably don't want to talk to you anyway! Gimme a break. The majority of the 4000 members of TLCA don't take their rigs off the pavement. I bet there are about 800 guys (and a few gals) that actually wheel. When I was on that pre-run to Hotel Rock, half the trucks had Ham and nearly everyone had CB too. Let me put it this way: just because you buy a Hi-Lift jack, you don't leave your bottle jack at home, do you? Both are useful, but one of them is far more useful than the other. Gimme a break. The majority of the 4000 members of TLCA don't take their rigs off the pavement. I bet there are about 800 guys (and a few gals) that actually wheel. When I was on that pre-run to Hotel Rock, half the trucks had Ham and nearly everyone had CB too. Let me put it this way: just because you buy a Hi-Lift jack, you don't leave your bottle jack at home, do you? Both are useful, but one of them is far more useful than the other. Exactly! Thats my counter point to this statement from you..."If you already have a CB and you don't see the need for another radio, no worries. If you have neither and are wondering which one to buy, I'd make the case to go straight to ham." Exactly! Thats my counter point to this statement from you..."If you already have a CB and you don't see the need for another radio, no worries. If you have neither and are wondering which one to buy, I'd make the case to go straight to ham." True. But if I had neither bottle jack nor hi-lift, and they were about the same price, and one was much better than the other... The number of wheelers using Ham Radio is growing rapidly. It soon will no longer be a niche technology. If funds are limited, I recommend buying into the future rather than the past. You'll understand once you get license and radio. People probably argued against lockers before they experienced one, too, back in the dark ages of 1990. You'll understand once you get license and radio. People probably argued against lockers before they experienced one, too, back in the dark ages of 1990. I highly doubt it! Most folks have discovered 35" (and up) tires are superior off highway but I seriously doubt the occasional wheeler will spend the money it takes to run that tall of tires when their 31's and 33's work well for them! On last years GTR, I used both. It was my run, and I didn't want to leave anyone out. Was I talking alot? Yeah, but that is just how I like the GTR, full of nice little details about where we are going, and where we have been. It fits in my opinion. The joke about throwing the CB out in my mind came when Nakman had trouble with his CB during the Argentine part of the GTR. No one knew he was talking. He made the tongue in cheek comment to "throw the CB out the window". The point I will make is that in choosing a setup, having the base knowledge that HAM requires gives most of those folks the basic knowledge to troubleshoot problems with their equipment when they happen. Due to the FCC forming the Citizens Band channels so that everyone could transmit pretty much means that the focus on understanding how it works was left to the user. Many times this was ignored in light of just slapping it together and talking. Granted, CB previously required a license, it was less of a basis for knowledge and more for knowing who was going to be do it. What gets me is the number of people who will still just throw their station together. No consideration for the simple things that can make all the difference. A $15 homebrew antenna and a $40 Radio Shack CB can outperform a Firestik and a $250 Cobra any day of the week. Just depends on the installation. Funny thing? All the folks who insist that HAM is not for them don't realize CB is limited to 5 watts, legally. Since CB is in the 11 meter band (27-28 MhZ), the fiberglass Firestik antennas are poor performers for the frequencies. Remember those guys with the 120" whips with the tennis balls on them? More appropriate length and thusly better performance. Bruce Miller told us a story of using a converted CB radio for 10 Meters on 5 watts. He was talking to people half way round the world, with the right antenna. For the Amateur Radio operator, transmitter power must be the minimum necessary to carry out the desired communications. Unless otherwise noted, the maximum power output is 1500 watts PEP. That's alot 'o power! The greatest thing about being a HAM in comparison to CB? The ability to tinker. As for being elite, I just hope no one thinks their kids are elitists for being a high school grad or passing their driving test. I earned my way into HAM radio just like anyone who has the desire can do. I studied, watched other HAMs and just had a basic interest in it. I'm not here to sell it. I'm just here to enjoy helping people who want to do it be successful at it. On last years GTR, I used both. It was my run, and I didn't want to leave anyone out. Was I talking alot? Yeah, but that is just how I like the GTR, full of nice little details about where we are going, and where we have been. It fits in my opinion. The joke about throwing the CB out in my mind came when Nakman had trouble with his CB during the Argentine part of the GTR. No one knew he was talking. He made the tongue in cheek comment to "throw the CB out the window". The point I will make is that in choosing a setup, having the base knowledge that HAM requires gives most of those folks the basic knowledge to troubleshoot problems with their equipment when they happen. Due to the FCC forming the Citizens Band channels so that everyone could transmit pretty much means that the focus on understanding how it works was left to the user. Many times this was ignored in light of just slapping it together and talking. Granted, CB previously required a license, it was less of a basis for knowledge and more for knowing who was going to be do it. What gets me is the number of people who will still just throw their station together. No consideration for the simple things that can make all the difference. A $15 homebrew antenna and a $40 Radio Shack CB can outperform a Firestik and a $250 Cobra any day of the week. Just depends on the installation. Funny thing? All the folks who insist that HAM is not for them don't realize CB is limited to 5 watts, legally. Since CB is in the 11 meter band (27-28 MhZ), the fiberglass Firestik antennas are poor performers for the frequencies. Remember those guys with the 120" whips with the tennis balls on them? More appropriate length and thusly better performance. Bruce Miller told us a story of using a converted CB radio for 10 Meters on 5 watts. He was talking to people half way round the world, with the right antenna. For the Amateur Radio operator, transmitter power must be the minimum necessary to carry out the desired communications. Unless otherwise noted, the maximum power output is 1500 watts PEP. That's alot 'o power! The greatest thing about being a HAM in comparison to CB? The ability to tinker. As for being elite, I just hope no one thinks their kids are elitists for being a high school grad or passing their driving test. I earned my way into HAM radio just like anyone who has the desire can do. I studied, watched other HAMs and just had a basic interest in it. I'm not here to sell it. I'm just here to enjoy helping people who want to do it be successful at it. Well said Nathanial! In all things, tools are only as good as the quality by which they are made and the knowledge of how to use them! Were there posts edited or removed or something? Talk about a class? This thread is hard to follow in the beginning. I will never throw out my CB because (for now) most of the folks I talk to have a CB. If there was one radio that handled ham and CB, that would be uber cool. As it is, I have so much junk going on in my truck I'm about to run out of room! Handheld, maybe? That could be useful. Such a thing? And before UB says what he is thinking, it is a small price to pay for being able to slink between the trees... [jeez, just what I need, another expensive hobby...] Were there posts edited or removed or something? Talk about a class? This thread is hard to follow in the beginning. I will never throw out my CB because (for now) most of the folks I talk to have a CB. If there was one radio that handled ham and CB, that would be uber cool. As it is, I have so much junk going on in my truck I'm about to run out of room! Handheld, maybe? That could be useful. Such a thing? And before UB says what he is thinking, it is a small price to pay for being able to slink between the trees... [jeez, just what I need, another expensive hobby...] Wes, our awesome webmaster, quickly and expertly split the banter from the class thread to keep the class thread on track. Thanks WES! You are not the first person to wonder about a CB/ham. Never happen, CB and ham are covered under different parts of the FCC rules. So a manufacturer would have to test it to both requirements and it would be such a limited demand that I can't see it being economically viable. I doubt most hams would even consider it and anyone comparing a CB to a CB/ham isn't gonna want to pay $200 for it when a CB costs $40. Oh yeah, hams have some of the nicest handheld radios. I have a VX-7R, what a little wonder. It's 5 watts (roughly the same as the clunky CBs we have), 4 band transmit, receives just about anything, the size of a thick cell phone, built to Mil-Spec 810E, submersible and even has an optional barometer for altitude. Come to the ham class, see what radios that kept evolving look like! I looked up your setup and thats pretty cool! How about a thread in members only section for showing off what everyone has as far as radios and installs go so all can see what the "extreme dark side" of wheeling communications has to offer....
1. Introduction {#sec1-ijms-21-05408} =============== Bisphenol-A (2,2-bis(4-hydroxyphenyl)propane; BPA) is one of the most commonly used endocrine disruptors worldwide, with widespread industrial applications in the manufacture of plastics and epoxy resins \[[@B1-ijms-21-05408],[@B2-ijms-21-05408]\]. It is chemically stable and has been shown to exhibit environmental persistence after leaching from BPA-enriched products at normal or elevated temperature \[[@B3-ijms-21-05408],[@B4-ijms-21-05408]\]. BPA may show bioaccumulation in animals and has been detected in human saliva, blood, plasma, amniotic fluid, placental tissue, breast milk, urine, follicular fluid, and adipose tissue \[[@B5-ijms-21-05408],[@B6-ijms-21-05408]\]. High urinary BPA levels are associated with a reduction in the number of follicles and ovarian volume in women \[[@B7-ijms-21-05408]\]. In males, urinary BPA may be linked to decreased semen quality and increased DNA damage in spermatozoa \[[@B8-ijms-21-05408]\]. Furthermore, other studies have demonstrated the anti-androgenic and estrogenic properties of BPA, both in vitro and in vivo \[[@B9-ijms-21-05408],[@B10-ijms-21-05408]\]. Therefore, BPA can exert widespread effects on several endocrine-related biological pathways and reproductive organs \[[@B11-ijms-21-05408],[@B12-ijms-21-05408]\] and exhibit cellular toxicity toward many cell types, including male germ cells \[[@B13-ijms-21-05408],[@B14-ijms-21-05408],[@B15-ijms-21-05408],[@B16-ijms-21-05408]\]. Spermatozoa are produced from spermatogonial stem cells (SSCs) as the final products of spermatogenesis, which appear that the balance of self-renewal and differentiation should be directly related to the SSCs \[[@B17-ijms-21-05408],[@B18-ijms-21-05408]\]. BPA possibly disrupts endocrine signaling owing to its estrogenic activity \[[@B19-ijms-21-05408]\] and interferes with spermatogenesis. Therefore, several studies have been conducted on the correlation between exposure to BPA and poor sperm characteristics. These results show that including low quality \[[@B20-ijms-21-05408]\], increased DNA damage \[[@B21-ijms-21-05408]\], and alterations in its fertility-related protein levels through intracellular protein profiles \[[@B22-ijms-21-05408]\], of spermatozoa in vitro \[[@B23-ijms-21-05408]\]. Additional studies have attempted to investigate the BPA-induced disruption of meiotic progression \[[@B24-ijms-21-05408]\] and chromosome dynamics \[[@B25-ijms-21-05408]\], aberrant DNA methylation \[[@B26-ijms-21-05408]\], and oxidative stress \[[@B27-ijms-21-05408]\] during spermatogenesis. The adverse health effects associated with BPA have led to the formulation of guidelines regarding permissible exposure limits. As per the guidelines issued by the US Environmental Protection Agency (EPA), the proposed values of the no-observed-adverse-effect-level (NOAEL) and the lowest-observed-adverse-effect level (LOAEL) for BPA exposure are 5 mg/kg body weight (bw)/day and 50 mg/kg bw/day, respectively \[[@B28-ijms-21-05408]\]. Previous studies have shown that BPA is involved in the alteration of the proteome and functional properties of SSCs and testicular germ cells, along with Sertoli cells \[[@B29-ijms-21-05408],[@B30-ijms-21-05408]\]. Further, in vivo studies on the effect of gestational exposure of mice to EPA-proposed BPA doses have shown that it leads to poor sperm characteristics and alterations in the proteome profile in adults of the F1 generation \[[@B31-ijms-21-05408]\]. Low dose neonatal BPA exposure of neonate male mice was shown to cause meiotic arrest and apoptosis of germ cells \[[@B32-ijms-21-05408]\]. Exposure to BPA was also found to have adverse effects on the mitochondria of testicular cells, resulting in apoptosis and compromised reproductive function in adult rodents \[[@B33-ijms-21-05408],[@B34-ijms-21-05408]\]. Moreover, exposure of male rodents to BPA resulted in a reduction of the size of the epididymides, along with a decreased efficiency of sperm production \[[@B35-ijms-21-05408],[@B36-ijms-21-05408]\]. Thus, the wide-ranging effects of BPA on reproductive health have been well-studied, especially in relation to the genetics and proteomics of germline cells, tissues, and organs. Hence, it is necessary to assess the transgenerational effects of BPA exposure in adult age on testis morphology, association of germ cells in testes, and functional properties of SSCs. In the current study, two reference doses of BPA (NOAEL and LOAEL) were applied to adult male mice (F0) for six weeks, and a breeding scheme with outbred females was applied to produce generations (F1--F4). The entire experiment design is illustrated in [Figure 1](#ijms-21-05408-f001){ref-type="fig"}A,B. The offspring of all generations were checked for abnormalities in the morphology of the testis, germ cell staging pattern in seminiferous epithelium (SE), and proportion of germ cells in SE. BPA-induced apoptosis in testicular cells was also evaluated across generations. Finally, stemness properties of BPA-exposed SSCs were measured by transplanting germ cells into the testis of recipient mice. 2. Results {#sec2-ijms-21-05408} ========== 2.1. BPA Increases the Frequency of Abnormal Seminiferous Tubules (STs) in F0--F2 Generations {#sec2dot1-ijms-21-05408} --------------------------------------------------------------------------------------------- For testicular abnormalities, H&E stained testis sections of F0--F4 generations were examined. Abnormal seminiferous tubules (STs) were characterized as abnormal in the case of huge lumen size, abnormal cell mass in the lumen, and presence of abnormal vacuoles resulting in germ cell loss or STs that lack lumen ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}A). We observed a significantly high frequency of abnormal STs in the BPA-exposed groups (F0) ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}B) at both NOAEL and LOAEL doses. This phenomenon persisted, and a relatively high percentage of abnormality was found in F1 generation at the LOAEL dose and in F2 generation at both the NOAEL and LOAEL doses ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}C,D). However, we did not observe any significant changes in the percentage of abnormal STs in F3 and F4 generations ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}E,F). 2.2. BPA Changes the Size of SE and Alters Stages of STs {#sec2dot2-ijms-21-05408} -------------------------------------------------------- A high frequency of BPA-induced abnormal STs was observed in F0, which persisted transgenerationally in F1 and F2. These findings led us to investigate the effect of BPA on the size of SE and the spermatogenesis stages inside the STs. We measured the area of STs and lumens of all generations. Although no remarkable changes were seen in the ST area in F0 (see [Supplementary Figure S1A](#app1-ijms-21-05408){ref-type="app"}) and F1 (see [Supplementary Figure S1B](#app1-ijms-21-05408){ref-type="app"}), a significantly greater lumen area was observed in stages VII and VIII both in F0 (see [Supplementary Figure S1C](#app1-ijms-21-05408){ref-type="app"}) and in F1 (see [Supplementary Figure S1D](#app1-ijms-21-05408){ref-type="app"}) in the LOAEL-exposed groups. A higher lumen area, in fact, represented the thinner SE area because the sizes of STs in all groups were similar. Additionally, we examined the area of the lumen in F2 (see [Supplementary Figure S1E](#app1-ijms-21-05408){ref-type="app"}), F3 (see [Supplementary Figure S1F](#app1-ijms-21-05408){ref-type="app"}), and F4 (see [Supplementary Figure S1G](#app1-ijms-21-05408){ref-type="app"}) but did not observe any significant changes. Next, we scrutinized the SE stages and found that the percentage of stage VII increased significantly in F0, F1, and F2 generations, especially at the LOAEL dose ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}A--C), but that of stage VIII decreased dramatically in these generations exposed to the same dose ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}A--C). However, no significant differences in the SE stages were observed in F3 ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}D) and F4 ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}E) generations. Additionally, significant differences in SE stages were also observed in stage I, III, IV, and VI in F1 generation due to BPA exposure ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}B). 2.3. BPA-Induced Alterations in the Count of Spermatogonia {#sec2dot3-ijms-21-05408} ---------------------------------------------------------- The observation that BPA exposure caused a decrease in the area of the SE in F0 and F1 led us to investigate the changes in the total count of spermatogonia in comparison to the number of Sertoli cells ([Figure 4](#ijms-21-05408-f004){ref-type="fig"}A). We observed a significant reduction in spermatogonia/Sertoli cell ratio at the LOAEL in the BPA-exposed group (F0) ([Figure 4](#ijms-21-05408-f004){ref-type="fig"}B). We did not observe any difference in this ratio in the subsequent generations (F1--F4) ([Figure 4](#ijms-21-05408-f004){ref-type="fig"}C--F). Next, we performed FACS assay to evaluate effect of BPA on the total number of testicular germ cell subpopulations. The results showed three peaks, depending on the DNA content of the cells (1C, 2C, and 4C cells). The type 1C cells represent spermatids, while type 2C cells indicate somatic cells, spermatogonia, and secondary spermatocytes. The type 4C cells represent cells in the G2/M phase including primary spermatocytes ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}A). It was observed that the LOAEL group of F0 generation showed a significant increase in the total spermatid number ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}B) and a remarkable reduction in the number of 2C-type cells ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}C) and 4C-type cells ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}D). A similar scenario was observed in F1; 1C-type cells increased at the LOAEL ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}E), while 2C-type cells decreased both at the NOAEL and LOAEL ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}F), and 4C-type cells also decreased at the LOAEL ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}G). The 1C-type cells increased only at the LOAEL in F2 ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}H), and no effects were observed on the other cell types in this generation ([Figure 5](#ijms-21-05408-f005){ref-type="fig"}I,J). The population proportion of testicular germ cells was also studied in the subsequent generations, but BPA-induced effects were not found in F3 and F4 (see [Supplementary Table S1](#app1-ijms-21-05408){ref-type="app"}). 2.4. BPA Exposure Induces Germ Cell Apoptosis {#sec2dot4-ijms-21-05408} --------------------------------------------- The increase in the number of apoptotic germ cells on BPA exposure was studied using the TUNEL assay ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}A). The results showed a significant increase in the percentage of apoptotic tubules and TUNEL-positive germ cells in both NOAEL- and LOAEL-exposed groups of F0 generation ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}B,G). Additionally, the percentage of apoptotic tubules and apoptotic germ cells per tubule increased in F1 at the LOAEL ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}C,H). In the F2 generation, a high frequency of apoptotic tubules was found at both the NOAEL and LOAEL ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}D), and a high number of apoptotic cells were found in the LOAEL-exposed group ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}I). However, the subsequent generations recovered from this trend of germ cell loss, and no significant changes were observed in the percentage of apoptotic tubules and the number of apoptotic cells per tubule in F3 ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}E,J) and F4 ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}F,K) generations. 2.5. BPA Affects the Stemness Properties of SSCs in F2 Offspring {#sec2dot5-ijms-21-05408} ---------------------------------------------------------------- We observed that BPA-induced effects persisted mostly up to F2 generation and diminished in the subsequent generations. Therefore, we decided to transplant the germ cells from F2 and F3 into the testes of recipient CD1 mice, to observe BPA-related effects on the stemness properties of SSCs. One month after transplantation, germ cells labeled with PKH26 were visualized under a fluorescence microscope ([Figure 7](#ijms-21-05408-f007){ref-type="fig"}A), and donor-derived colonies were counted. We observed a significantly low colony count in F2 at the LOAEL dose along with the EE group ([Figure 7](#ijms-21-05408-f007){ref-type="fig"}B). However, no significant differences were observed in F3 generation ([Figure 7](#ijms-21-05408-f007){ref-type="fig"}C). 3. Discussion {#sec3-ijms-21-05408} ============= In the current study, we investigated the transgenerational effects of BPA exposure on the physiology, health, and stemness characteristics of testicular germ cells, and testicular morphology in adult mice. With the relatively long period (six weeks) of exposure in adult age, we anticipated that the effects would be prevalent mostly in F0 generation (exposure groups), with the possibility of transgenerational transmission. Hence, all generations (F0--F4) were considered for the experiments. In our initial set of experiments, we did not find any significant difference in the testicular weight (data has not been shown) on BPA exposure. Therefore, the next step included a detailed examination of the testes from the exposed groups (F0) and subsequent generations (F1--F4), to detect any abnormalities in the STs. As shown in [Figure 2](#ijms-21-05408-f002){ref-type="fig"}B--D, a high percentage of abnormal tubules were found at almost all BPA doses in F0--F2, except for the NOAEL group in F1 generation ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}C). Therefore, it was speculated that the high frequencies of abnormal tubules due to BPA exposure could have a crucial effect, although the subsequent generations (F3--F4) showed recovery from the effects of the exposure, and no testicular abnormalities were observed in the subsequent generations. A thorough examination of the tubular abnormalities showed that some of the lumen areas were abnormally large, resulting in a relatively narrow area for the SE. Our subsequent studies focused on the BPA-induced alterations in the SE and changes in the size of the STs and lumens. As the volume of tubules and lumens differ at various stages of the SE \[[@B37-ijms-21-05408]\], the measurements were taken according to tubular staging. As shown in [Supplementary Figure S1](#app1-ijms-21-05408){ref-type="app"}, no significant difference was observed in the area of tubules. However, a significantly large lumen area was observed at stages VII and VIII of the LOAEL-exposed group in F0 and F1. These effects were absent in F2--F4 generations. Moreover, BPA-induced effects on the SE staging were also evaluated for all generations. We observed a high frequency of stage VII together with a low frequency of stage VIII at the NOAEL and LOAEL doses in F0 and at the LOAEL dose in F1 and F2 ([Figure 3](#ijms-21-05408-f003){ref-type="fig"}A--C). Although the reasons for the BPA-induced inconsistencies of frequencies between stages VII and VIII are unclear, it can be postulated that the reduction in the percentage of stage VIII tubules could be because of a delay in the process of spermiation that occurs at stage VIII \[[@B24-ijms-21-05408]\]. This is consistent with the results of a previous study that showed a BPA-induced reduction in sperm counts \[[@B24-ijms-21-05408]\]. However, F3 and F4 generations showed recovery from the abnormalities related to SE staging. Next, we examined the BPA-induced changes in the proportion of testicular germ cells, abnormalities in testis morphology, and differences in SE stages. Generally, spermatogonia are classified into three categories---type A, intermediate, and type B spermatogonia, which appear during SE stages I--VI \[[@B38-ijms-21-05408]\]. The calculated ratio of spermatogonia to Sertoli cells from each ST showed that a reduction was seen only in the BPA exposure group (F0) ([Figure 4](#ijms-21-05408-f004){ref-type="fig"}B), while the other generations (F1--F4) did not show any changes. Next, we studied the changes in the total number of cells seen during spermatogenesis and examined them using the FACS analysis. As shown in [Figure 5](#ijms-21-05408-f005){ref-type="fig"}, F0 and F1 generations showed differences in the proportions of germ cells regarding 1C-, 2C-, and 4C-type cells. An increase in the total number of spermatids (1C) was seen in F0--F2 at the LOAEL dose, which could be because of the relatively high number of SEs at stage VII. It was also observed that many of the STs that lacked lumen were filled with cell mass, with their appearance reminiscent of round-shaped spermatids ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}A). The frequency of tubular abnormality was also found to be high at the LOAEL dose ([Figure 2](#ijms-21-05408-f002){ref-type="fig"}B--D), which could be the reason for the high count of 1C-type cells at that dose. However, F0 and F1 showed a low count of 2C- and 4C-type cells at the LOAEL dose. Based on these findings, it can be concluded that BPA exposure transgenerationally alters the germ cell proportion and can hamper spermatogenesis. These results also led us to investigate whether apoptosis occurred among the populations of BPA-exposed germ cells. After BPA is administered subcutaneously to mouse pups from postnatal day (PND) 1 to 21, at PND 22 the pups show an increase in the frequency of apoptotic STs \[[@B32-ijms-21-05408]\]. Similarly, in this study ([Figure 6](#ijms-21-05408-f006){ref-type="fig"}), we observed a high percentage of apoptotic germ cells in the STs and a significantly high number of apoptotic germ cells per ST at the NOAEL and LOAEL doses in F0. In F1 and F2, the effects were limited to only the LOAEL dose and were further diminished in the next generations (F3 and F4). Therefore, BPA exposure can induce abnormal cell death transgenerationally, in addition to causing alterations in the proportions of germ cell populations. The final objective of this study was to examine the effect of transgenerationally BPA exposure on stemness properties of SSCs. For this, germ cell transplantation was performed in busulfan-treated recipient CD-1 male mice. The germ cells were collected from F2 and F3 generations, since these generations were nearly free from the adverse effects of BPA exposure. The results demonstrated a significant decrease in the donor germ cell-derived colony number at the LOAEL dose in F2, with recovery seen in F3 generation (shown in [Figure 7](#ijms-21-05408-f007){ref-type="fig"}). Therefore, it can be concluded that BPA exposure can reduce the stem cell-like characteristics of SSCs until F2 generation, with no effect on the number of total spermatogonia ([Figure 4](#ijms-21-05408-f004){ref-type="fig"}D). To the best of our knowledge, this is the first comprehensive in vivo study on the effects of BPA exposure during the adult period in mice, with the exposed males being examined transgenerationally for testicular morphology, germ cell count, and functional properties of SSCs. The NOAEL dose showed certain adverse effects, especially in the F0 exposure group. BPA induced changes in almost all of the tested parameters in F0--F2 generations at the LOAEL dose, which were subsequently abolished in the next generation (F3). Thus, BPA exposure in the adult period can induce widespread disruption in reproductive health, even at the permissible exposure limits. Since this is a matter of public health and safety, it is crucial to reevaluate the exposure limits of BPA that are deemed to be non-hazardous. 4. Materials and Methods {#sec4-ijms-21-05408} ======================== 4.1. Experimental Animals {#sec4dot1-ijms-21-05408} ------------------------- Breeding stocks of male and female ICR (CD-1) mice were purchased from Dooyeol Biotech (Seoul, Korea). Recipient CD-1 male mice were used for testicular germ cell transplantation. All animal handling and experimental protocols were approved by the "Animal Care and Use Committee of Chung-Ang University" (IACUC Number: 2016-00009, 26, Feb, 2016) and the "Guide for the Care and Use of Laboratory Animals" published by the National Institutes of Health. 4.2. Experimental Design, BPA Exposure, and Breeding to Generate F1--F4 Offspring {#sec4dot2-ijms-21-05408} --------------------------------------------------------------------------------- After 1 week of adaptation, male mice (F0) were administered BPA (239658, Sigma-Aldrich Chemical Co., St. Louis, MO, USA) by gavage for six weeks at two dose levels of 5 mg/kg bw/day (NOAEL) and 50 mg/kg bw/day (LOAEL). Ethinylestradiol (EE), an orally active estrogen, served as a positive control at a dose of 0.4 µg/kg/day \[[@B39-ijms-21-05408]\]. Both BPA and EE were dissolved in corn oil (Sigma, St, Louis. MO, USA). Control animals were administered corn oil alone \[[@B40-ijms-21-05408]\]. Each of the experimental and control groups consisted of 12--15 male mice. In the week following gavage feeding, BPA-exposed male mice were placed with females at a ratio of 1:2 for mating. Females were checked for vaginal plugs to confirm pregnancy. Once pregnancy in the female mice was confirmed by the presence of vaginal plugs, the males were sacrificed for testes collection. The F1 progeny of the pregnant females were allowed to have a three-week lactation period, following which the males were separated and reared for \~95 days before being mated with outbred females. The further week-long mating and sampling procedures followed were similar to that for F0. The process was repeated until F4 generations were obtained ([Figure 1](#ijms-21-05408-f001){ref-type="fig"}B). 4.3. Collection of Testes and Determination of Testicular Abnormalities {#sec4dot3-ijms-21-05408} ----------------------------------------------------------------------- The testes of F0--F4 male mice were collected, weighted, and dissected vertically into two parts; one each for paraffin sectioning and fluorescence-activated cell sorting (FACS) assay. For paraffin sectioning, the testicular parts were fixed in Bouin's solution (Sigma, St, Louis. MO, USA) for 6 h at room temperature, followed by washing with 70--100% ethanol gradient at 5 min intervals for dehydration. The tissue was subsequently washed in xylene and embedded in paraffin wax. Tissue sections of 5 µm thickness were cut and placed on glass slides, some of which were stained with hematoxylin and eosin (H&E) for testicular morphology study and examined under a fluorescence microscope (TE2000-U, Nikon, Chiyoda-ku, Tokyo, Japan). The abnormalities in the testis were classified into several categories: The presence of seminiferous tubules (STs) with huge lumen or with no lumen, presence of abnormal cell mass inside lumen, loss of germ cell in the SE, and presence of vacuole in the SE \[[@B40-ijms-21-05408]\]. All the STs present in one section of the testicular tissue were taken into account while obtaining data. 4.4. Periodic Acid--Schiff (PAS)--H&E Staining, Staging of SE, and Counting of Spermatogonia {#sec4dot4-ijms-21-05408} -------------------------------------------------------------------------------------------- For the staging of SE, 5 µm-thick sections of the testes were stained with PAS and counterstained with H&E \[[@B38-ijms-21-05408]\]. For examination of the sections and measurement of areas of the ST and lumen, a Nikon TE2000-U microscope and NIS-Elements imaging software (Nikon, Chiyoda-ku, Tokyo, Japan) were used. All types of spermatogonia, namely, type A, type B, and intermediate, were observed visually in the SE at stages I--VI \[[@B38-ijms-21-05408]\]. The total number of spermatogonia was counted, together with the number of Sertoli cells from the same ST, and the ratio of spermatogonia per Sertoli cells was obtained. 4.5. Flow Cytometric Analysis {#sec4dot5-ijms-21-05408} ----------------------------- Populations of testicular cells, which are classified as 1C, 2C, and 4C subpopulations based on their DNA content, were measured using FACS. Before FACS, testicular cells were separated from the testis tissue according to Oatley and Brinster \[[@B41-ijms-21-05408]\]. In brief, after removing the tunica albuginea from the testis, the tissue (containing STs) was treated enzymatically with collagenase (1 mg/mL; Gibco, Carlsbad, CA, USA) for 1--2 min at 37 °C with a slight agitation. A solution containing 4:1 ratio of 0.25% trypsin-ethylenediaminetetraacetic acid (Gibco, Carlsbad, CA, USA) and DNase I dissolved in Dulbecco's phosphate buffered saline (DPBS; 7 mg/mL; Roche, Mannheim, Germany) was prepared and used to treat the STs for 5--6 min at 37 °C with flick mixing. Thereafter, fetal bovine serum (FBS) (10% \[*v/v*\], Biotechnics Research, Lake Forest, CA) was added to inactivate the enzymatic action, and a cloudy suspension was prepared by soft pipetting. The cell suspension was filtered using a 40 µm pore size nylon mesh (BD Biosciences, San Jose, CA, USA). Cells were fixed with 70% chilled ethanol and stored at 4 °C overnight. The fixed cells were washed two times with chilled DPBS (Gibco, Carlsbad, CA, USA) and treated with DPBS containing 500 µg/mL RNase (Sigma-Aldrich, St, Louis. MO, USA) and 0.1% Triton X-100 (*v/v*, in DPBS) for 15 min at 4 °C in the dark. Finally, the treated cells were stained with propidium iodide (Sigma, St. Louis, MO, USA) and analyzed using a FACS Aria II Flow Cytometer (BD Biosciences, San Jose, CA, USA) with Cell Quest software (BD Biosciences, San Jose, CA, USA), according to Liu et al. \[[@B24-ijms-21-05408]\]. 4.6. Detection of Germ Cell Apoptosis {#sec4dot6-ijms-21-05408} ------------------------------------- Paraffin-embedded testis sections, which had not been stained with H&E, were used for the detection of apoptotic germ cells in the SE by the terminal deoxynucleotidyl transferase dUTP nick-end labeling (TUNEL) assay using the in situ cell death detection kit, POD (Roche, Mannheim, Germany), following the manufacturer's protocol. Since apoptotic cells exhibit green fluorescence, they were visualized under a fluorescence microscope (TE2000-U, Nikon, Chiyoda-ku, Tokyo, Japan). The number and percentage of STs positive for apoptotic cells were measured. 4.7. Germ Cell Transplantation to Evaluate the Activity of SSCs {#sec4dot7-ijms-21-05408} --------------------------------------------------------------- Transplantation of germ cells into recipient testis is an established method for evaluating the number of functional SSCs in the testis of the donor animal and was performed as described previously \[[@B41-ijms-21-05408],[@B42-ijms-21-05408]\]. Briefly, six-week-old CD-1 male mice were used as the recipient mice. They were prepared for transplantation by the injection of busulfan (35 mg/kg bw; Sigma, St, Louis. MO, USA) into the intraperitoneal cavity (IP) after six weeks used for transplantation. Germ cells were then stained using the PKH26 red fluorescent cell linker kit (Sigma, St, Louis. MO, USA) following the manufacturer's protocol. The proportion of SSCs is 0.03% of the total cells in the testis \[[@B43-ijms-21-05408]\]; therefore, a suspension of 50 × 106 cells/mL was prepared with 10% (*v/v*) FBS and 10% DNase I (7 mg/mL) in a minimum essential medium α (12000-014, powder, Gibco, Carlsbad, CA, USA). Recipient mice were anesthetized with ketamine (75 mg/kg) and medetomidine (0.5 mg/kg) before transplantation. Hair was removed from the lower abdomen, followed by disinfection with iodine and ethanol (70%). A small surgical wound was made, and the testis was pushed out from the abdomen. The suspension of donor germ cells was labeled with 7% (*v/v*) trypan blue and injected into the testes of recipient through efferent ducts as described previously \[[@B41-ijms-21-05408]\]. Each of the testes received \~8--10 µL (\~5.0 × 105 cells) cell suspension, which filled approximately 80% of the surface STs. Analysis of the testes was performed one month after transplantation. The recipient mice were euthanized, and the testes were collected and visualized under a fluorescence microscope (Nikon AZ100, Tokyo, Japan). After the testes were decapsulated and the tubules spread gently, donor cell-derived colonies were visualized separately under the microscope and counted, as described previously \[[@B44-ijms-21-05408]\]. The spherical PKH26-positive colonies (length ≥ 200 µm) were considered to have been produced from one SSC and were counted. Histological examination of the testes using fluorescence microscopy was also performed to confirm the proliferation of spermatogonia at the basement membrane of the recipient STs. Each group consisted of 8--10 recipient mice, and the donor germ cells were injected into both testes of the recipient. The number of donor-derived colonies was calculated as follows: Colonies/105 transplanted cells = Number of colonies × 105/Number of transplanted cells. 4.8. Statistics {#sec4dot8-ijms-21-05408} --------------- One-way analysis of variance was used for analyzing data with the help of SPSS Statistics (version 23.0, IBM, Armonk, NY, USA) and GraphPad Prism (version 5.03; GraphPad Software Inc., La Jolla, CA, USA) software. Significant differences among the mean values were determined using Tukey's Honestly Significant Difference test. A *p*-value of \< 0.05, compared to the control, was considered as statistically significant. Supplementary materials can be found at <https://www.mdpi.com/1422-0067/21/15/5408/s1>. Table S1: Proportion of germ cells in the testis of F3 and F4 generations; Figure S1: Area of seminiferous tubules and lumen. ###### Click here for additional data file. Conceptualization, B.-Y.R. and M.-G.P.; methodology, P.C.K. and S.-E.J.; software, P.C.K. and S.-E.J.; validation, J.S.A. and Y.-H.K.; writing, P.C.K. and J.S.A.; review and editing, J.S.A., Y.-H.K., S.-E.J., B.-J.K., H.-S.L., S.-U.K., M.S.R., and M.-G.P.; supervision, B.-Y.R.; project administration, B.-Y.R.; funding acquisition, B.-Y.R. All authors have read and agreed to the published version of the manuscript. This research was supported by the Basic Science Research Program through the National Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2018R1A6A1A03025159) and the Korea Research Institute of Bioscience and Biotechnology (KRIBB) Research Initiative Program (KGM4252021), Republic of Korea. The authors declare no conflict of interest. ![Experimental design. (**A**) After adaptation for one week, CD-1 male mice (F0) were gavaged with different bisphenol-A (BPA) doses \[no-observed-adverse-effect-level (NOAEL; 5 mg/kg body weight (bw)/day) and lowest-observed-adverse-effect level (LOAEL; 50 mg/kg bw/day); see detailed dose description in the text\], negative control (corn oil), and positive control (ethinylestradiol; EE). (**B**) Mating scheme to produce descendants (F0--F4 generation) where males were allowed to mate with outbred females.](ijms-21-05408-g001){#ijms-21-05408-f001} ![Testicular cross section and abnormal seminiferous tubules (STs) due to bisphenol-A (BPA) exposure. (**A**) Hematoxylin and eosin-stained testicular cross sections in the control, BPA doses \[no-observed-adverse-effect-level (NOAEL), lowest-observed-adverse-effect level (LOAEL)\], and ethinylestradiol (EE). It was showing normal STs along with abnormal STs, characterized as STs with a large lumen, abnormal cell mass, loss of germ cells, and that lack lumen. Arrows in the images indicate the positions of abnormality. Scale bar = 50 µm. Percentages of abnormal tubules are presented as bar graphs; (**B**) exposed group (F0) (*n* = 14 mice/group), (**C**) F1 generation (*n* = 15 mice/group), (**D**) F2 generation (*n* = 12 mice/group), (**E**) F3 generation (*n* = 12 mice/group), and (**F**) F4 generation (*n* = 19 mice/group). Data were analyzed by one-way analysis of variance (ANOVA) where the asterisk (\*) indicates significant differences compared with the control *(*\* *p \< 0.05,* \*\* *p \< 0.01*, and \*\*\* *p \< 0.001*).](ijms-21-05408-g002){#ijms-21-05408-f002} ![Staging of seminiferous epithelium (SE). Testicular sections were stained with periodic acid--Schiff (PAS)-hematoxylin and eosin, and SE staging was performed to assess the differences due to bisphenol-A exposure. The bar graphs show the staging patterns of (**A**) exposed group (F0) (*n* = 9 mice/group), (**B**) F1 generation (*n* = 9 mice/group), (**C**) F2 generation (*n* = 9 mice/group), (**D**) F3 generation (*n* = 9 mice/group), and (**E**) F4 generation (*n* = 9 mice/group). For each stage, the difference between exposed and control groups was assessed by one-way analysis of variance (ANOVA) (\* *p \< 0.05* and \*\* *p \< 0.01*).](ijms-21-05408-g003){#ijms-21-05408-f003} ![Ratio of spermatogonia and Sertoli cells. Ratios were measured as the total number of spermatogonia per Sertoli cell of the same seminiferous epithelium (SE). (**A**) Testicular cross sections showing SE containing spermatogonia (spg). Scale bar = 10 µm. Ratios of spermatogonia and Sertoli cells (ser) from (**B**) exposed group (F0) (*n* = 6 mice/group), (**C**) F1 generation (*n* = 6 mice/group), (**D**) F2 generation (*n* = 6 mice/group), (**E**) F3 generation (*n* = 6 mice/group), and (**F**) F4 generation (*n* = 6 mice/group). Statistical analysis of the difference between exposed and control groups was performed using one-way analysis of variance (ANOVA) (\* *p \< 0.05* and \*\* *p \< 0.01*).](ijms-21-05408-g004){#ijms-21-05408-f004} ![Bisphenol-A (BPA)-induced changes in the proportion of testicular cell populations. (**A**) Representative images of the control, BPA doses \[no-observed-adverse-effect-level (NOAEL), lowest-observed-adverse-effect level (LOAEL)\], and ethinylestradiol (EE), derived from fluorescence-activated cell sorting (FACS). Letters in the images (1C, 2C, and 4C) indicate the proportion of haploid (1C), diploid (2C), and tetraploid (4C) germ cells in the testicle. In the case of exposed group (F0), bar graphs are showing the percentage of (**B**) haploid, (**C**) diploid, and (**D**) tetraploid germ cells among the total cells. Percentage of germ cells in F1 generation; (**E**) haploid, (**F**) diploid, and (**G**) tetraploid. Percentage of germ cells in F2 generation; (**H**) haploid, (**I**) diploid, and (**J**) tetraploid. Data were analyzed by one-way analysis of variance (ANOVA) where significant differences (\*) were calculated as the comparison of exposed group with the control (*n* = 10 mice/group; \* *p \< 0.05* and \*\* *p \< 0.01*).](ijms-21-05408-g005){#ijms-21-05408-f005} ![Bisphenol-A-induced apoptosis on testicular germ cells. The terminal dUTP nick-end labeling (TUNEL) assay was utilized for the detection of apoptotic germ cells in the seminiferous epithelium (SE). (**A**) Images represent the position and number of TUNEL-positive germ cells (green) among the other cells (blue; DAPI-stained) of SE from the control, no-observed-adverse-effect-level (NOAEL), lowest-observed-adverse-effect level (LOAEL), and positive control (ethinylestradiol, EE) groups. Scale bars = 50 µm. Bar graph shows the percentages of apoptotic tubules of (**B**) exposed group (F0), (**C**) F1 generation, (**D**) F2 generation, (**E**) F3 generation, and (**F**) F4 generation. Similarly, the graphical presentation of TUNEL-positive germ cells per tubules of (**G**) exposed group (F0), (**H**) F1 generation, (**I**) F2 generation, (**J**) F3 generation, and (**K**) F4 generation are also shown. Data were generated from at least 12 mice/group and analyzed with one-way analysis of variance (ANOVA), where \* *p \< 0.05*, \*\* *p \< 0.01*, and \*\*\* *p \< 0.001*, are compared with the control.](ijms-21-05408-g006){#ijms-21-05408-f006} ![Germ cell transplantation into recipient mice and analysis of recipient testes. Germ cell transplantation was conducted to evaluate the bisphenol-A-induced effect on the stemness properties of spermatogonial stem cells (SSCs). Donor germ cells collected from F2 and F3 generations were stained with PKH26 (red fluorescent). (**A**) Images of the left panel show fluorescent expression of seminiferous tubules (STs) and the merged image of STs inside the recipient testis of transplanted germ cells for F2 generation (scale bar = 2 mm). The right panel shows a fluorescent and merged view of the colonization of donor germ cells inside the recipient ST. White and black arrows are showing the places of colonization. Scale bar = 200 µm. The bar graph represents the number of donor cell-derived colonies per 10^5^ transplanted germ cells for (**B**) F2 and (**C**) F3 generations. For the F2 generation, the total numbers of mice/testes analyzed were 9/15, 9/16, 10/18, and 8/16 for the control, no-observed-adverse-effect-level (NOAEL), lowest-observed-adverse-effect level (LOAEL), and ethinylestradiol (EE), respectively. For the F3 generation, the total numbers of mice/testes analyzed were 8/15, 9/17, 9/16, and 8/15 for the control, NOAEL, LOAEL, and EE, respectively. The asterisk (\*) indicates significant differences (\* *p \< 0.05*) compared with the control.](ijms-21-05408-g007){#ijms-21-05408-f007} [^1]: These authors contributed equally to this work.
Case: 09-30280 Document: 00511027342 Page: 1 Date Filed: 02/12/2010 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT United States Court of Appeals Fifth Circuit FILED February 12, 2010 No. 09-30280 Conference Calendar Charles R. Fulbruge III Clerk UNITED STATES OF AMERICA, Plaintiff-Appellee v. RONALD LELEAUX, Defendant-Appellant Appeal from the United States District Court for the Western District of Louisiana USDC No. 3:08-CR-315-1 Before GARZA, DENNIS, and ELROD, Circuit Judges. PER CURIAM:* The attorney appointed to represent Ronald Leleaux has moved for leave to withdraw and has filed a brief in accordance with Anders v. California, 386 U.S. 738 (1967). Leleaux has filed a response. “This Court must examine the basis of its jurisdiction, on its own motion, if necessary.” Mosley v. Cozby, 813 F.2d 659, 660 (5th Cir. 1987). Article III, section 2, of the Constitution limits federal court jurisdiction to actual cases and controversies. Spencer v. Kemna, 523 U.S. 1, 7 (1998). The case-or-controversy * Pursuant to 5TH CIR . R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR . R. 47.5.4. Case: 09-30280 Document: 00511027342 Page: 2 Date Filed: 02/12/2010 No. 09-30280 requirement demands that “some concrete and continuing injury other than the now-ended incarceration or parole—some ‘collateral consequence’ of the conviction—must exist if the suit is to be maintained.” Id. at 7. Upon revoking his supervised release, the district court sentenced Leleaux to one year and one day of imprisonment, but the court did not impose any additional term of supervised release. During the pendency of this appeal, Leleaux completed his term of imprisonment. Accordingly, there is no case or controversy for us to address. Although Leleaux argues that his underlying 18 U.S.C. § 922(g)(9) conviction was invalid because of a subsequent expungement of the predicate offense, he cannot use his appeal of the revocation of his supervised release to challenge the underlying conviction. See United States v. Willis, 563 F.3d 168, 170 (5th Cir.), cert. denied, 528 U.S. 976 (2009). For the foregoing reasons, this appeal is DISMISSED as moot, and counsel’s motion to withdraw is DENIED as unnecessary. 2
Two inspectors general have asked the Justice Department to open a criminal investigation into whether Hillary Rodham Clinton mishandled sensitive government information on a private email account she used as secretary of state, senior government officials said Thursday. Two inspectors general have asked the Justice Department to open a criminal investigation into whether sensitive government information was mishandled in connection with the personal email account Hillary Rodham Clinton used as secretary of state, senior government officials said Thursday. Here's the first paragraph of an article thepublished shortly before midnight Eastern Time on Thursday night, preserved in digital amber by the invaluable NewsDiffs:And here's the lede as it was rewritten —in dramatic fashion—an hour later:Emphasis added in both instances, and boy could that emphasis not be more different. In the first version,reporters Michael Schmidt and Matt Apuzzo say that these nameless government officials are basing their request on possible misdeeds Clinton herself is alleged to have committed; in the latter, that's transformed into an incredibly vague construction: "mishandled in connection with." What does "in connection with" even mean? It could mean almost anything. What's more, this major alteration was made without any notice to the reader. On top of that, the Times even changed the URL (the old one now redirects to the new one). If it weren't for NewsDiffs and assiduous observers like Zeke Miller, this big edit might have gotten flushed down the memory hole. But in this day and age, fortunately, that sort of shenanigan is difficult to pull off, and "paper of record" will have plenty to answer for Friday morning. In the meantime, here's NewsDiffs' capture of the new lede, just in case the Times decides to finagle with it again.
170 Mich. App. 340 (1988) 427 N.W.2d 552 PEOPLE v. MAGHZAL Docket No. 91080. Michigan Court of Appeals. Decided February 5, 1988. Frank J. Kelley, Attorney General, Louis J. Caruso, Solicitor General, Carl J. Marlinga, Prosecuting Attorney, Don L. Milbourn, Chief Appellate Lawyer, and Edward L. Graham, Assistant Prosecuting Attorney, for the people. State Appellate Defender (by Mardi Crawford), for defendant on appeal. Before: HOLBROOK, JR., P.J., and SHEPHERD and D.L. SULLIVAN,[*] JJ. PER CURIAM. Defendant was convicted of second-degree murder and possession of a firearm during the commission of a felony in a bench trial in Macomb Circuit Court. She was sentenced to thirteen to twenty-five years on the murder conviction and two years on the felony-firearm conviction. Defendant and the deceased had been married for some four months at the time of his death. Defendant is an immigrant from Iraq and had received her green card allowing her to be a permanent resident several days before the shooting. Defendant has significant problems with the English language. The shooting took place on December 19, 1984, at the Sterling Heights home of decedent and defendant. According to a statement given by defendant to the police at 1:00 A.M. that night, decedent had returned home from work late, taken a shower and gone to sleep in the guest bedroom. Defendant was writing Christmas cards in the master bedroom. Defendant later went in to get decedent but he indicated that he would sleep in the guest room because he had already set the alarm clock in that room. The two began to joke, according to defendant, and decedent said that he *342 wanted to die. She asked him if he would like her to shoot him and he said yes. She then went to her brother's bedroom and got a.25 caliber automatic weapon. According to defendant, she asked her husband whether the safety was on, took out the clip and told him it was dangerous to point a gun at anyone. Proofs confirm that the clip was pulled before the gun was fired. She placed the gun to decedent's right temple and the gun went off. Defendant told the officer that she and her husband were joking and she did not think the gun was loaded. Proofs confirm that the gun was placed against the skin of decedent's temple. Immediately after she shot decedent, defendant called a friend in an attempt to locate her brother who was living with decedent and defendant and who owned the gun. She then called decedent's two brothers and they came to the house. Defendant then called the 911 emergency number, indicating that she had shot her husband. By all accounts, defendant was hysterical following the shooting. She repeatedly asked about her husband's condition. She gave a statement to the police officer who drove her back to the station and later gave a taped statement to a detective. Defendant's brothers testified that defendant and her husband had a good marriage. One of decedent's brothers related one incident of a disagreement between defendant and her husband. He also testified that after she received her green card she had joked that she could now get a divorce. No other evidence of motive was presented. The trial court found defendant guilty of murder in the second degree. The trial court's findings on the intent element are crucial to our analysis and we therefore quote the trial court at length: *343 The intent of the Defendant need not be proven directly and in this case it is proven by her acts before and after the killing. Firstly, bearing on intent this Court finds that the Defendant used a dangerous weapon, that is, a handgun. Secondly, this Court takes into consideration the deceased's wounds. This was a contact wound. Dr. Spitz testified and this Court finds that the weapon was pressed firmly against the deceased's right temple. This Court interprets that as being there could be no mistake, no error, that when this gun was discharged the bullet would kill or do great bodily harm to the deceased. In addition, this Court has examined Exhibit Number Seventeen and finds that the clip, that is the cartridge clip, in this weapon was very difficult to remove. It takes two hands to remove this clip and requires some knowledge of guns. Whoever removed the cartridge clip must have had some knowledge or experience with handguns. Although this gun, Exhibit Number Seventeen, has no magazine safety it does have a safety. The safety on Exhibit Number Seventeen locks into the slide of the barrel of this weapon. Anyone with that level of knowledge or experience to know how to remove the clip from the weapon would also have to know how to operate the safety and would know not to press a gun loaded or unloaded with safety on or off, with the clip in or out, against someone's head and pull the trigger. In addition bearing on intent this Court has considered the Defendant's acts after the killing. The Defendant did not call the police or an ambulance immediately. She first placed a call attempting to locate her brother. Secondly, she told her friend when she spoke to her on the phone that her husband had fainted. She didn't ask her friend for assistance, didn't run to the neighbors for assistance. She ignored her friend's earlier suggestion that she call 911 or the emergency number. She told the police on call number one at 11:37 P.M. that her husband had fallen and that she didn't know what happened. Then she asked one of the deceased's brothers to hide the weapon. *344 All of the above are consistent with the intent to kill or cause great bodily harm and they are inconsistent with the accident. [Emphasis added.] The instant case turns on the distinction between second-degree murder, MCL 750.317; MSA 28.549, and involuntary manslaughter, MCL 750.321; MSA 28.553. In People v Dykhouse, 418 Mich 488, 508-509; 345 NW2d 150 (1984), the Supreme Court set forth the elements of second-degree murder, as follows: As refined by this Court, the elements of common-law murder are: (1) a death, (2) caused by an act of the defendant, (3) absent circumstances of justification, excuse, or mitigation, (4) done with an intent to kill, an intent to inflict great bodily harm, or an intent to create a very high risk of death with the knowledge that the act probably will cause death or great bodily harm. People v Hansen, 368 Mich 344, 350-351; 118 NW2d 422 (1962). Common-law murder, as evolved, is what has come to be known as second-degree murder. The criminal offense of common-law involuntary manslaughter, as codified, requires a death caused by the defendant without legal justification or excuse while the defendant was acting in a grossly negligent manner or while committing an unlawful act which was inherently dangerous to human life. People v Duggan, 115 Mich App 269; 320 NW2d 241 (1982). A finding of gross negligence for purposes of involuntary manslaughter requires: (1) Knowledge of a situation requiring the exercise of ordinary care and diligence to avert injury to another. (2) Ability to avoid the resulting harm by ordinary *345 care and diligence in the use of the means at hand. (3) The omission to use such care and diligence to avert the threatened danger when to the ordinary mind it must be apparent that the result is likely to prove disastrous to another. [People v Orr, 243 Mich 300, 307; 220 NW 777 (1928).] The crime of involuntary manslaughter does not require that the defendant be personally aware of the danger or that he knowingly and consciously create that danger. The test only requires the danger to be apparent to the ordinary mind. People v Sealy, 136 Mich App 168; 356 NW2d 614 (1984). [People v Harris, 159 Mich App 401, 406; 406 NW2d 307 (1987).] Further implicated in this case is the statutory felony of manslaughter committed by aiming or pointing a firearm intentionally but without malice, MCL 750.329; MSA 28.561. The distinction between this crime and common-law involuntary manslaughter has been explained this way: "We believe that the legislative intent was to punish the intentional pointing of a firearm which results in death even if the defendant did not act in a grossly negligent manner." Duggan, supra at 272. The general rule appears to be that, when a person points a gun at someone as a joke, reasonably believing the gun not to be loaded, and pulls the trigger and the gun discharges and kills the victim, he is guilty of manslaughter. 40 Am Jur 2d, Homicide, § 95, p 390. The facts in this case contain the elements of these separate felonies. Defendant claimed that the gun went off while she and decedent were joking. She claimed to know little about guns and thought that when she took the clip out the gun was empty. By all accounts, she seemed hysterical after the shooting. Her story was consistent with *346 her defense that the shooting was an accident involving negligence to a greater or lesser degree.[1] The court rules require the judge in a nonjury criminal case to make findings of fact. MCR 2.517; MCR 6.001. People v Jackson, 390 Mich 621; 212 NW2d 918 (1973). Review of Jackson is here instructive. In that case, defendant and two friends went to an address to purchase drugs. Defendant waited off to the side with a shotgun while his two friends went to the door. A man named Holmes answered the door but refused to do business with the two men, one of whom he did not recognize. One of the men at the door reached into his pocket and Holmes opened fire with a gun. Defendant then fired his gun, striking and killing one of his associates, not Holmes. At trial, defendant claimed self-defense. The Supreme Court held, inter alia, that a trial court sitting without a jury is obligated to make findings of fact. In Jackson, the trial court commented to defendant's attorney that he could not see self-defense since the decedent had no gun. His final ruling did not indicate how he resolved this and other questions troubling him. The Supreme Court remanded because there was "sufficient doubt" as to whether the trial court had correctly applied the law to the facts. In this case, the trial judge, after examining the gun and concluding that anyone who could get the clip out must have been knowledgeable about guns, concluded: Anyone with that level of knowledge or experience to know how to remove the clip from the *347 weapon would also have to know how to operate the safety and would know not to press a gun loaded or unloaded with safety on or off, with the clip in or out, against someone's head and pull the trigger. [Emphasis added.] We are not convinced that everyone who reasonably believes that a gun is empty necessarily has sufficient intent to justify a second-degree murder conviction. Also, we find the trial court's failure to specifically address involuntary manslaughter and the lesser statutory manslaughter committed by aiming a gun casts sufficient doubt as to whether the trial court properly applied the law to the facts in this case. We find from the trial judge's comments that he did not consider options other than second-degree murder and that he erroneously believed that, under the facts, second-degree murder was the only possibility. The present case is analogous to those cases in which the jury was not instructed as to lesser offenses. See People v Ora Jones, 395 Mich 379, 394; 236 NW2d 461 (1975). In this case, the trial judge's failure to consider the lesser offenses requires reversal. See Jones; see also Jackson. The defense theory was accidental shooting; defense counsel argued the two lesser offenses in closing argument. We rule that the factfinder must address those theories argued by defendant and which were supported by the facts. We reverse defendant's conviction and remand for a new trial because the trial court, sitting as factfinder, failed to address the possibility of the lesser included offenses. We further hold that defendant's other allegations of error requiring reversal are meritless. Defendant's brother-in-law was questioned as to marital problems between defendant and the victim in a series of leading questions. Defendant's *348 brother-in-law had some difficulty with the English language. The only "problem" he could identify was a joke defendant made about being able to get a divorce shortly after receiving her green card. The decision whether to permit leading questions is within the discretion of the trial court. People v Garland, 152 Mich App 301; 393 NW2d 896 (1986). Given the witness' significant language barrier, we find no abuse. Defendant also objects to testimony by an investigating officer that it "appeared to me that the victim may possibly have been sleeping at the time of the incident." Defendant cites no authority for the proposition that this testimony was error. It is not the job of the appellate court to find support for defendant's case. People v Battle, 161 Mich App 99; 409 NW2d 739 (1987). In any event, the comment was made in the context of the officer's observations of the victim, which included the fact that the victim had his eyes closed, was in his underwear, and that there was no indication of a struggle. We find no error. Finally we note that defendant is an alien who upon release following a felony conviction and absent a recommendation otherwise by the trial court is subject to deportation. 8 USC 1251. Since we have vacated defendant's conviction here and remanded for a new trial, defendant may address the trial court on the issue at the appropriate time under the federal statute. Reversed and remanded. We do not retain jurisdiction.[2] NOTES [*] Circuit judge, sitting on the Court of Appeals by assignment. [1] Defendant presented no expert witness to testify as to whether the gun could have simply gone off absent pressure on the trigger. Detective Blanchard, the investigating detective in this case, testified that the gun could not go off without such pressure. We therefore assume that defendant does not deny pulling the trigger. [2] Since this was a bench trial, we would normally have remanded for further fact-finding on the present record. However, the trial judge is no longer on the Macomb Circuit bench, having recently been appointed to the United States District Court.
(;GM[1]FF[4]CA[UTF-8]AP[CGoban:2]ST[2] RU[Japanese]SZ[19]KM[0.00] PW[White]PB[Black]AW[lc][re]AB[nc][pd]LB[lc:1][nc:2][qd:A][rd:C][re:3][qf:B]C[Whte 3 is hamete. How should Black respond - A, B, or C] (;B[qd]CR[qd] ;W[qh]LB[aa:A][rd:B]CR[qh]C[Play A (tuneki) or B] (;B[rd]CR[rd] ;W[ic]LB[qd:1][rd:2][re:A]CR[ic]C[Black at R16 left a weakness at S16. Black can only defend this weakness with gote and in doing so had to play two moves (1 and 2) to defend against the hamete stone A.]) (;B[aa]CR[aa] ;W[rd]CR[rd] ;B[rc]CR[rc] ;W[rb]CR[rb]C[White responds with a tesuji] (;B[qb]CR[qb] ;W[sc]CR[sc]C[Black ends up overly concentrated in the corner]) (;B[sc]CR[sc] ;W[pb]CR[pb] ;B[qb]CR[qb] ;W[oc]CR[oc] ;B[od]CR[od] ;W[nb]CR[nb]C[Black's position is over concentrated.]) (;B[qc]CR[qc] ;W[sc]CR[sc]C[Black ends up overly concentrated in the corner]))) (;B[qf]CR[qf] ;W[rf]CR[rf] ;B[qg]CR[qg] ;W[qc]CR[qc] ;B[pc]CR[pc] ;W[qb]CR[qb]C[After this exchange, Black's position is too cramped.]) (;B[rd]CR[rd] ;W[od]CR[od]C[S16 is the correct response to S15. However -- white plays another hamete and another problem for Black ensues.] (;B[oc]CR[oc] ;W[qd]CR[qd] (;B[qc]CR[qc] ;W[qe]CR[qe]C[This is what white is expecting] (;B[rc]CR[rc] ;W[pe]CR[pe] ;B[pc]CR[pc] ;W[qi]CR[qi]C[The exchange is very favorable for white]) (;B[pe]CR[pe] ;W[rc]CR[rc] ;B[rb]CR[rb] ;W[sd]CR[sd] ;B[qb]CR[qb] ;W[pf]CR[pf] ;B[of]CR[of] ;W[og]LB[pf:A][og:B]C[These are very strong plays for white. Black's position is over concentrated, and White has taken part of the corner.])) (;B[qe]CR[qe] ;W[qc]CR[qc] ;B[pe]CR[pe] ;W[rc]CR[rc] ;B[rf]CR[rf] ;W[sd]LB[qg:A]CR[sd]C[Black finishes with A. This may seem like a good exchange for Black. But Black's position is too heavy. If you come to understand this, then you are on your way to becoming a stronger player.])) (;B[oe]CR[oe] ;W[qd]CR[qd] ;B[qc]CR[qc] ;W[qe]CR[qe] ;B[rc]CR[rc] (;W[pc]CR[pc]C[CHOICE] ;B[pe]CR[pe] ;W[oc]CR[oc] ;B[nd]CR[nd] ;W[nb]LB[oa:B][mb:A]CR[nb] (;B[mb]CR[mb] ;W[qb]CR[qb] ;B[rb]CR[rb] ;W[ne]CR[ne]C[Ouch. The cut is very painful]) (;B[oa]CR[oa] ;W[qb]CR[qb] ;B[pa]TR[oc][pc][od]CR[pa]C[RIGHT Black uses a tesuji and white loses the marked stones])) (;W[pe]CR[pe] ;B[pc]CR[pc] ;W[nd]CR[nd] ;B[md]CR[md] ;W[ne]CR[ne] ;B[of]CR[of] ;W[oc]CR[oc] ;B[qg]TR[qd][pe][qe][re]CR[qg]C[RIGHT White loses the four marked stones and the White stones on the left are over concentrated. Black now has a good sized corner and room to expand]))))
VHS Variety Special presented by Scarecrow Video Showings Film Info Format: VHS Rating: NR Sponsor(s) Sponsor(s): Scarecrow Video Description Holy crap! It’s another explosion of rare VHS delights culled from the vast archives of Seattle's Scarecrow Video, home to over 117,000 movies. Back in the early days of consumer video there was a plethora of outrageous live performances available for your home viewing pleasure. VHS Variety Special collects some of the best, worst and most obscure routines from the era into a once in a lifetime, absolutely mind-blowing evening of entertainment featuring an astounding array of cantankerous celebrities, spectacular stunts, silly stand-up, burlesque boobies, female impersonators, dirty jokes, and delirious ditties. Plus Howard Cosell and free stuff from Seattle!
Did 'fake news' just jump the shark? The Dominican Republic's oldest and most important newspaper El Nacional on Friday printed a photo of Alec Baldwin doing his impression of President Trump on "Saturday Night Live" in a lead article about Trump and Israel. The photo was used side-by-side with a photo of Israeli Prime Minister Benjamin Netanyahu. While it was not immediately clear whether the image of Baldwin was accidental or an intentional joke, the newspaper later clarified their error... El Nacional published on Friday as Donald Trump a picture of actor Alec Baldwin, who imitates on a television program the president of the United States. The picture was sent that day by Associated Press (AP) with the name of the actor and reported on the program, but was placed as if it were Trump's, a situation that went unnoticed for all who reviewed page 19. National apolgizes to the readers and all those who felt affected by the publication. The newspaper did however get the picture of Shakira criticizing Trump's immigration policy correct...
Since being selected with the 10th overall pick at June’s NHL Draft, Evan Bouchard has been at the front of mind for Oilers fans everywhere because of his potential to be a long-term solution to the Oilers puck moving woes on the back end. He’s big, he has a bomb of a shot, and can move the puck up ice at an elite level which makes him a rare commodity on the Oilers’ defensive depth chart. No one expected Bouchard to fall to the Oilers at 10 and after seeing him play in his first handful of NHL games you can see what a gift that was. With time, I believe that this is a guy that has the ability to make a tremendous impact for this organization and seeing him play only reinforced that idea. The problem, of course, is that expecting him to handle that job right now is a little too much too soon, and I think the Oilers made the right call in sending the 19-year-old back to the OHL for further seasoning. I know some folks said there is nothing left for him to learn at the junior level but I strongly disagree. By going back to London, Bouchard will get the opportunity to play the minutes needed to work on and round out the deficiencies in his game under the watchful eye of Edmonton’s scouts. That extra playing time is a luxury that he wouldn’t have had in Edmonton and the Oilers made the smart choice in making sure he gets it. While there are areas of his game where he already excels, the offensive side in particular, there were times when Bouchard struggled in his own end which is not at all uncommon for a young defenceman trying to learn the ropes at the NHL level. Not only that, Bouchard will now have the opportunity to compete for a spot on Canada’s roster at the World Juniors Tournament, a valuable experience in itself, and also for a Memorial Cup with a London Knights team that is built to compete. In an ideal world, the Oilers would have been able to send Bouchard to the AHL to further his development there, but that’s not an option right now so that makes going back to London the best spot for him right now. The biggest thing at this stage of Bouchard’s development is that the Oilers need him to play and in going back to London, he’ll get a truckload of minutes there that he wouldn’t get nor is he ready for yet in Edmonton. From the asset management side of things, Bouchard’s assignment not only extends team control over the player for another year but also give the Oilers another protected contract in the upcoming expansion draft which will be immensely valuable in itself. All in all, this a smart choice by the organization from a hockey side and an asset management perspective, and I’m thrilled to see them thinking ahead with this player rather than trying to have him learn on the job at the NHL level. So for now, we must say goodbye to our new dad and wish him well on his journey in London. Personally, I’m excited to see how the rest of his season will play out and how much better he’ll be for it by the time next year’s training camp rolls around. All the best in London, Bouche! We’ll see you soon. In seven games played, Bouchard had one goal, 10 shots on net, two PIMs, and a -5 rating. Oilers fans, let’s just stop and appreciate what we finally have. Healthy competition and depth. Take out players like Bouch, Yamo, and Jesse and we have older players like Chiasson, Rattie, and Garrision ready to contribute. We don’t have to rush prospects even if they’re good enough to make the team – we can do what’s best for their player development. Sure guys like Marody, Benson, and McLeod would have made this team in the past, but now they get lots of ice time, leadership experience, and development in the A/OHL! So happy that they brought up Kevin Gravel and have left Ethan Bear in Bakersfield for now – Hopefully Bear is allowed the privilege of a good stretch of games and isn’t forced up early due to injury (or poor play). I think your are not far off. I don’t think the Oil are looking beyond winning games now and if Bouchard was clearly one of their best 7 dmen he would be here. But I think that he hasn’t shown he is clearly better than Garrison, Benning, Gravel or even Bear (is he still injured?) so there is little reason to keep him here. Yeah, it’s interesting how the Oilers look like they will have strength in defence coming up, but they are now weak on the wings. It’s a better place to be though – wingers are easier to come by. That Hall trade was still one-sided, but Larsson is playing so much better this year that it doesn’t look quite so bad. Not crazy about this. IMO he has NHL level talent right now. Playing him against 16/17 year old teenage kids is not going to develop and push him the same way growing his game against adults would. Hopefully he does what Mathews did and goes to Europe for the year. And hopefully they make it so these guys can play in the AHL in the future rather than just juniors. Most players in the OHL are between 18-20. If Bouchard makes Team Canada, most of the competition will be 19-20. Bouchard as an NHL draft choice out of the OHL having signed a contract is precluded from going to Europe. I wouldn’t expect the NHL and the Junior leagues to change this arrangement any time soon, since it benefits both leagues, and there are so few 18-19 old players who would be better off in the AHL, that changing the rules would not be worth it. All that and he’ll develop the confidence to do everything as second nature. The thing I really liked about Bouchard is that he didn’t clam-up when he made a mistake. He made a lot of mistakes, but that’s great at his level, as it shows he wasn’t afraid to make them (unlike some other prospect players on this team). By him shaking off his mistakes and continually trying to be effective he actually was pretty effective. As “B’milk” said, the Oilers will still be working with him to give him development projects with the Knights and those mistakes will become less & less. He will play the game as second nature & know were and what to do, without thinking about it. Now, as said earlier, if we could only get one of our other top prospects to develop this confidence?… We’ll see. An Oakville Blade Eh? Of which I am an alumn. Anyone know if Vern Quigley (H.Coach) is still around? It was Jr. B when I was their. Not sure what league it is now? So does this open up a spot on the 25 man roster or is there another move to make once Rattie comes back? I cant imagine the Oil taking Cagguilla or Chaisson out of the lineup right now, so it comes down to JP, Yama or Kassian getting pushed down. Good on management to send him back to London. He got some time to skate with the Oil, netted a goal and looked very promising. We have a great prospect in Bouchard, nice to see they are thinking ahead in terms of player development and the looming expansion draft. I like how the Oilers handled Bouchard. Keep him up, give him a taste of the NHL and slow play those 7 games. Let him be around the team, practice with the team and especially spend time with Yawney learning. With 3 years of junior already under his belt, it would be better if he could go to the AHL but that can’t happen. He will be a player next year to watch I believe. The next move they need to make is once Rattie is healthy, send down both Yamo and Puljujarvi. I would have them both in a meeting, tell them how important they are to the team, their future as top 6 guys. Then have a conference call with Woodcroft telling him in front of those 2 how critical they are and how the Oilers want them to play a ton and they be given extra attention. Then when Marody is healthy, I would send him down as well. I would call up Malone and have him sit in the press box watching. This cant be seen as a negative. It allows Bouchard to play and hone his skills, gives him a chance to captain London to another MasterCard Cup, and allows him to play for gold at the World Juniors. Fantastic decision. Everyone knew this was coming because for the Oilers to leave Bouchard on the roster wouldn’t have been smart at all especially if he isn’t going to play and only going to get a handful of minutes a night, I am sure they would have loved to have Boucahrd in the AHL playing better competition and a lot of minutes but that option wasn’t available it was on the roster or back to Junior and Juniors was the wise choice. Like Bear the Oiler and fans can see there is tremendous upside to Bouchard and like Bear areas of his game that need work, but when these two shore those areas of their game up and improve on them that is going to be two future decent D men that they have for down the road that are going to challenge guys for spots IMO, this was the best move for both Bouchard and the Oilers. The kid has potential and maybe a bright future in the NHL someday. I am glad that they are not going to rush him. He looked okay, but not so good that he had to stay in the line-up.
At last night’s debate, Sen. Elizabeth Warren was asked straight up if her Medicare for all plan would raise taxes on the middle class and she refused to answer: Warren sidesteps the question of whether she supports middle class tax hikes to pay for Medicare for All. As she does with virtually every targeted question ever. — Jedediah Bila (@JedediahBila) July 31, 2019 Watch: Elizabeth Warren refuses to answer whether she backs middle class tax hikes for government health care takeover. #DemDebate pic.twitter.com/WvrV4L9aYB — Arthur Schwartz (@ArthurSchwartz) July 31, 2019 And the reasons she’s answering with this BS “less out of pocket” is because she KNOWS taxes will have to go up: middle class families will pay "less out of pocket" for M4A, per warren. well, what about taxes? point me to a nation on earth with the universal benefits coming close to anything she's advocating without taking the majority of wages from the middle class. — Tiana Lowe (@TianaTheFirst) July 31, 2019 Warren said a lot there but didn’t answer on middle class tax hikes. — Guy Benson (@guypbenson) July 31, 2019 She dodged when asked about it after the debate as well: “Costs are going to go up for billionaires, they’re going to go up for giant corporations and out-of-pocket costs for middle-class families are going to go down. It’s costs that matter.” Elizabeth Warren continues to refuse to answer whether she is going to increase taxes on millions of hard working Americans pic.twitter.com/2lgXsyb3vY — Ryan Saavedra (@RealSaavedra) July 31, 2019 Hide your wallets: To be clear: The subtext of Elizabeth Warren's answer on whether middle-class taxes will go up was that they almost certainly will, maybe by a lot. — Katherine Mangu-Ward (@kmanguward) July 31, 2019 And she should just be honest: Here is what Warren is not saying. She may in fact raise taxes to pay for more universal health care. When she says middle class costs go down, she means TOTAL costs, total they pay for health care. Which is an important goal. But she is open to raising taxes as part of that. — Lisa Desjardins (@LisaDNews) July 31, 2019 *** Related: Caught on camera! Here's a giddy Elizabeth Warren doing a 'wealth tax hand rub' https://t.co/07QQeje7wV — Twitchy Team (@TwitchyTeam) July 31, 2019 KABOOM: Katie Pavlich drops an irony nuke on how Elizabeth Warren ‘closes the night’ at the #DemDebate https://t.co/4LTVqSYKsX — Twitchy Team (@TwitchyTeam) July 31, 2019
Los Angeles (AFP) - A state of emergency was declared on Friday in the western US state of Washington following a measles outbreak that has affected more than two dozen people, the majority of them children. The disease was declared eliminated in the US in 2000 but has since made a comeback that is tied to imported cases and the rise of the anti-vaccine movement. "Measles is a highly contagious infectious disease that can be fatal in small children," Washington Governor Jay Inslee said in a statement. "The existence of more than 26 confirmed cases in the state of Washington creates an extreme public health risk that may quickly spread to other counties." The outbreak began near Portland, Oregon, at the start of the year and quickly spread to nearby Clark County and King County, both in Washington. Health officials have warned that people infected with the disease had visited schools, churches, a dentist's office, a Costco store, an Ikea store and the Portland airport. The majority of those infected are children, many of whom have not been immunized against the disease, officials said. They added the outbreak could still be in its infancy as the incubation period of the virus averages 14 days. Those infected can spread measles to others four days before and four days after the rash appears. The highly contagious disease can cause severe diarrhea, pneumonia and vision loss, and ultimately can be fatal. The World Health Organization in November warned that measles cases worldwide had jumped more than 30 percent in 2017 compared to the previous year, in part because of children not being vaccinated.
Experiences of military CRNAs with service personnel who are emerging from general anesthesia. We conducted this qualitative study to understand the experiences of military Certified Registered Nurse Anesthetists (CRNAs) working with service personnel who have traumatic brain injury (TBI) and/or posttraumatic stress disorder (PTSD) and are emerging from general anesthesia. This study is important because there are no studies in the literature that describe the experiences of anesthetists working with patients with these specific problems. The leading questions were: "Out of all the anesthesia cases both abroad and stateside (post 9/11/2001), have you noticed service members wake from general anesthesia (not utilizing total intravenous anesthesia (TIVA), in a state of delirium? If so, can you tell me your experiences and thought processes as to why it was occurring?" Five themes emerged: (1) Emergence delirium (ED) exists and to a much higher degree in the military than in the general population. (2) ED was much more prevalent in the younger military population. (3) TIVA was a superior anesthetic for patients thought to have TBI and/or PTSD. (4) Talking to all patients suspected of having TBI and/or PTSD before surgery and on emergence was vital for a smooth emergence. (5) There is something profound happening in regard to ketamine and PTSD and TBI.
Q: Lightweight SQL editor for Eclipse Is there any simple SQL editor in Eclipse? Or do I need to find a simple SQL editor plugin for Eclipse? By simple I mean, the editor does NOT connect to any DB, does syntax highlighting and preferably formatting sql is a bonus. A: for reference to add sql syntax highlighting / coloring to eclipse you can install Data tools platform extender sdk from "install new software", under Database Development or enter site location directly http://download.eclipse.org/datatools/updates A: This Eclipse SQL Editor seems very lightweight. It only does syntax highlighting and provides an outline view. As of now the author is planning to eventually add code folding and completion, but those two features are still on the todo list. A: Use Toad eclipse-extension (community edition), you will get almost everything you want in an SQL editor. Search for 'toad' in eclipse market place. It has very good Oracle, MySQL and PostgreSQL support. Take a look at Installation instructions and screenshots. Alternatively, there is DBeaver (very good in my experience and support almost all DB's) which is built on eclipse platform and available as standalone and eclipse plugin.
// Copyright 2015 The etcd Authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package etcdserver import ( "fmt" "path/filepath" "sort" "strings" "time" "golang.org/x/net/context" "github.com/coreos/etcd/pkg/netutil" "github.com/coreos/etcd/pkg/transport" "github.com/coreos/etcd/pkg/types" ) // ServerConfig holds the configuration of etcd as taken from the command line or discovery. type ServerConfig struct { Name string DiscoveryURL string DiscoveryProxy string ClientURLs types.URLs PeerURLs types.URLs DataDir string // DedicatedWALDir config will make the etcd to write the WAL to the WALDir // rather than the dataDir/member/wal. DedicatedWALDir string SnapCount uint64 MaxSnapFiles uint MaxWALFiles uint InitialPeerURLsMap types.URLsMap InitialClusterToken string NewCluster bool ForceNewCluster bool PeerTLSInfo transport.TLSInfo TickMs uint ElectionTicks int BootstrapTimeout time.Duration AutoCompactionRetention int QuotaBackendBytes int64 StrictReconfigCheck bool // ClientCertAuthEnabled is true when cert has been signed by the client CA. ClientCertAuthEnabled bool AuthToken string } // VerifyBootstrap sanity-checks the initial config for bootstrap case // and returns an error for things that should never happen. func (c *ServerConfig) VerifyBootstrap() error { if err := c.hasLocalMember(); err != nil { return err } if err := c.advertiseMatchesCluster(); err != nil { return err } if checkDuplicateURL(c.InitialPeerURLsMap) { return fmt.Errorf("initial cluster %s has duplicate url", c.InitialPeerURLsMap) } if c.InitialPeerURLsMap.String() == "" && c.DiscoveryURL == "" { return fmt.Errorf("initial cluster unset and no discovery URL found") } return nil } // VerifyJoinExisting sanity-checks the initial config for join existing cluster // case and returns an error for things that should never happen. func (c *ServerConfig) VerifyJoinExisting() error { // The member has announced its peer urls to the cluster before starting; no need to // set the configuration again. if err := c.hasLocalMember(); err != nil { return err } if checkDuplicateURL(c.InitialPeerURLsMap) { return fmt.Errorf("initial cluster %s has duplicate url", c.InitialPeerURLsMap) } if c.DiscoveryURL != "" { return fmt.Errorf("discovery URL should not be set when joining existing initial cluster") } return nil } // hasLocalMember checks that the cluster at least contains the local server. func (c *ServerConfig) hasLocalMember() error { if urls := c.InitialPeerURLsMap[c.Name]; urls == nil { return fmt.Errorf("couldn't find local name %q in the initial cluster configuration", c.Name) } return nil } // advertiseMatchesCluster confirms peer URLs match those in the cluster peer list. func (c *ServerConfig) advertiseMatchesCluster() error { urls, apurls := c.InitialPeerURLsMap[c.Name], c.PeerURLs.StringSlice() urls.Sort() sort.Strings(apurls) ctx, cancel := context.WithTimeout(context.TODO(), 30*time.Second) defer cancel() if !netutil.URLStringsEqual(ctx, apurls, urls.StringSlice()) { umap := map[string]types.URLs{c.Name: c.PeerURLs} return fmt.Errorf("--initial-cluster must include %s given --initial-advertise-peer-urls=%s", types.URLsMap(umap).String(), strings.Join(apurls, ",")) } return nil } func (c *ServerConfig) MemberDir() string { return filepath.Join(c.DataDir, "member") } func (c *ServerConfig) WALDir() string { if c.DedicatedWALDir != "" { return c.DedicatedWALDir } return filepath.Join(c.MemberDir(), "wal") } func (c *ServerConfig) SnapDir() string { return filepath.Join(c.MemberDir(), "snap") } func (c *ServerConfig) ShouldDiscover() bool { return c.DiscoveryURL != "" } // ReqTimeout returns timeout for request to finish. func (c *ServerConfig) ReqTimeout() time.Duration { // 5s for queue waiting, computation and disk IO delay // + 2 * election timeout for possible leader election return 5*time.Second + 2*time.Duration(c.ElectionTicks)*time.Duration(c.TickMs)*time.Millisecond } func (c *ServerConfig) electionTimeout() time.Duration { return time.Duration(c.ElectionTicks) * time.Duration(c.TickMs) * time.Millisecond } func (c *ServerConfig) peerDialTimeout() time.Duration { // 1s for queue wait and system delay // + one RTT, which is smaller than 1/5 election timeout return time.Second + time.Duration(c.ElectionTicks)*time.Duration(c.TickMs)*time.Millisecond/5 } func (c *ServerConfig) PrintWithInitial() { c.print(true) } func (c *ServerConfig) Print() { c.print(false) } func (c *ServerConfig) print(initial bool) { plog.Infof("name = %s", c.Name) if c.ForceNewCluster { plog.Infof("force new cluster") } plog.Infof("data dir = %s", c.DataDir) plog.Infof("member dir = %s", c.MemberDir()) if c.DedicatedWALDir != "" { plog.Infof("dedicated WAL dir = %s", c.DedicatedWALDir) } plog.Infof("heartbeat = %dms", c.TickMs) plog.Infof("election = %dms", c.ElectionTicks*int(c.TickMs)) plog.Infof("snapshot count = %d", c.SnapCount) if len(c.DiscoveryURL) != 0 { plog.Infof("discovery URL= %s", c.DiscoveryURL) if len(c.DiscoveryProxy) != 0 { plog.Infof("discovery proxy = %s", c.DiscoveryProxy) } } plog.Infof("advertise client URLs = %s", c.ClientURLs) if initial { plog.Infof("initial advertise peer URLs = %s", c.PeerURLs) plog.Infof("initial cluster = %s", c.InitialPeerURLsMap) } } func checkDuplicateURL(urlsmap types.URLsMap) bool { um := make(map[string]bool) for _, urls := range urlsmap { for _, url := range urls { u := url.String() if um[u] { return true } um[u] = true } } return false } func (c *ServerConfig) bootstrapTimeout() time.Duration { if c.BootstrapTimeout != 0 { return c.BootstrapTimeout } return time.Second } func (c *ServerConfig) backendPath() string { return filepath.Join(c.SnapDir(), "db") }
With three tiers you can easily grow diverse varieties even those requiring different amounts of water fertilizer and maintenance. Great for beginner gardeners-surprise them with a gift. Got a cropped porch or a sloped yard that needs company? Use this garden bed as a stunning nature art that you construct. Crafted of solid wood harvested from the Cypress tree family with decay resistance similar to Western Red Cedar Durable for all seasons Protects roots from becoming waterlogged Compact ideal for smaller gardens Accommodates varieties of many types and sizes Dimensions 48 in.
Q: Rails: how do I set an attribute just by calling it I'm trying to get @user.stripe_customer_id to return a string. If it isn't set, then it should run a call to an external service, set it, and return it. More verbosely here are my tests: context 'Stripe ID' do it 'should not be writable' do expect { @user.stripe_customer_id = 'random_id_123123' } .to raise_error(NoMethodError) end it 'should be generated if it does not exist' do @user.save expect(@user.stripe_customer_id).to include('cus') end end where @user is a valid User << ActiveRecord instance. Rspec fails with the following: Failed examples: rspec ./spec/models/user_spec.rb:87 # User Stripe ID should be generated if it does not exist And the User.rb file has the following lines: def stripe_customer_id if stripe_customer_id.blank? stripe = Stripe::Customer.create( description: "Username: #{username}", email: email ) self.stripe_customer_id = stripe.id save! end stripe_customer_id end private def stripe_customer_id=(new_customer_id) write_attribute(:stripe_customer_id, new_customer_id) end A: You are trying to overwrite the getter method for stripe_customer_id def stripe_customer_id self[:stripe_customer_id] || write_attribute(:stripe_customer_id, new_customer_id) end This is an untested code which i just wrote up. But i'm pretty sure this should work for your case. Please give it a try an let me know.
White House press secretary Stephanie Grisham Stephanie GrishamIvana Trump on Melania as first lady: 'She's very quiet, and she really doesn't go to too many places' The Hill's 12:30 Report: Trump uses White House as campaign backdrop Coronavirus tests not required for all Melania Trump speech attendees: report MORE will return to work on Wednesday after testing negative for the coronavirus, a spokesman said. “Press Secretary Stephanie Grisham, who has been quarantined since coming in contact with Brazilian officials almost two weeks ago and working from home, has received negative COVID-19 test results and will be back to work tomorrow,” White House spokesman Judd Deere said. Grisham, a top aide to President Trump Donald John TrumpBiden leads Trump by 36 points nationally among Latinos: poll Trump dismisses climate change role in fires, says Newsom needs to manage forest better Jimmy Kimmel hits Trump for rallies while hosting Emmy Awards MORE, was with the president at his Mar-a-Lago club in Florida earlier this month when he hosted a Brazilian delegation, including President Jair Bolsonaro. A press aide in the delegation later tested positive for the coronavirus. It was later announced that Grisham would self-quarantine out of an abundance of caution, joining a number of lawmakers and administration officials who have self-quarantined in recent weeks after coming in contact with someone who had tested positive for the virus. The president and his coronavirus task force headed by Vice President Pence have launched a public relations blitz to tout the White House's response to the burgeoning virus outbreak, which has infected more than 53,000 people in the U.S.
There are three basic types of fuel injector systems. Those that use port fuel injection (PFI), gasoline direct injection (GDI), and direct injection (DI). While PFI and GDI use gasoline as the fuel, DI uses diesel fuel. Efforts continue to further develop fuel injector nozzles and fuel injection systems containing the same so as to potentially increase fuel efficiency and reduce hazardous emissions of internal combustion engines, as well as reduce the overall energy requirements of a vehicle comprising an internal combustion engine.
He and his brother Jason recently launched Legal Shred, a mobile service that provides one-time purges or regularly scheduled document destruction on- or off-site for individuals and businesses. The company also destroys all types of X-ray film, hard drives and media, including CDs, DVDs and microfiche. "Customers can actually see their documents being destroyed rather than just handing them over," Sean Fredericks said. "It's a much more secure process. We have cameras mounted inside the truck and a monitor on the side, so everything can be observed curbside." Or, if a customer prefers, the pair will pick up materials and haul them away in locked containers to be shredded at the company's secure location. Once that's done, they provide a document of destruction and recycle the remains in Tampa, where they are pulped. Sean Fredricks, 35, formerly owned a shredding company called Code Shred in Long Island, N.Y, which he sold to Cintas in 2010. He worked as a consultant for Cintas for about a year, oversaw the closing of his business and moved to Apollo Beach to be closer to his family, all of whom live in South Shore communities. He and Jason, 37, incorporated Legal Shred last year, then spent $250,000 to purchase a 24-foot document-shredding truck, which pierces and tears as much as 8,000 pounds of paper an hour. The company began providing service in April. Things are progressing well, Sean Fredricks said. Although home base is Hillsborough County, the company already has clients in Charlotte, Pinellas, Sarasota, Polk and Manatee counties as well. "Right now we're looking for a couple of really large businesses, like a hospital, medical center, financial institution or law firm to add to our customer base," Fredricks said. "Competition is much heavier here and there is more relationship building required, but it's much easier and less expensive to do business. We know it will take time." Pricing is based on the frequency of the job, which can be daily, weekly, monthly or annually, and the size and number of containers the customer chooses, he said. For one-time purges, there's a minimum fee of $49.95, and the company offers monthly service starting at $19.95. "Our service is fast, efficient and secure," Fredricks said. "We can shred 10 boxes of documents in three minutes. You don't have to remove metal clips or binders. There's no breaking or jamming or wait." Legal Shred is a member of the South Shore and Brandon chambers of commerce.
// Copyright (c) AlphaSierraPapa for the SharpDevelop Team (for details please see \doc\copyright.txt) // This code is distributed under the GNU LGPL (for details please see \doc\license.txt) using System; using System.Collections; using System.Drawing; using System.Windows.Forms; using System.Windows.Forms.Design; using ICSharpCode.Core; using ICSharpCode.SharpDevelop.Gui; namespace ICSharpCode.FormsDesigner.Services { public class UIService : IUIService { IDictionary styles = new Hashtable(); public IDictionary Styles { get { return styles; } } public UIService() { styles["DialogFont"] = Control.DefaultFont; styles["HighlightColor"] = Color.LightYellow; } public void SetUIDirty() { // TODO: Fixme! } #region ComponentEditor functions public bool CanShowComponentEditor(object component) { return false; } public bool ShowComponentEditor(object component, IWin32Window parent) { throw new System.NotImplementedException("Cannot display component editor for " + component); } #endregion #region Dialog functions public IWin32Window GetDialogOwnerWindow() { return WorkbenchSingleton.MainWin32Window; } public DialogResult ShowDialog(Form form) { return form.ShowDialog(GetDialogOwnerWindow()); } #endregion #region Show error functions public void ShowError(Exception ex) { MessageService.ShowError(ex.ToString()); } public void ShowError(string message) { MessageService.ShowError(message); } public void ShowError(Exception ex, string message) { MessageService.ShowError(message + Environment.NewLine + ex.ToString()); } #endregion #region Show Message functions public void ShowMessage(string message) { ShowMessage(message, "", MessageBoxButtons.OK); } public void ShowMessage(string message, string caption) { ShowMessage(message, caption, MessageBoxButtons.OK); } public DialogResult ShowMessage(string message, string caption, MessageBoxButtons buttons) { return MessageBox.Show(GetDialogOwnerWindow(), message, caption, buttons); } #endregion public bool ShowToolWindow(Guid toolWindow) { return false; } } }
Retrovirus infections in a sample of injecting drug users in Rio de Janeiro City, Brazil: prevalence of HIV-1 subtypes, and co-infection with HTLV-I/II. Retrovirus infections among injecting drug users (IDUs), a core at-risk population for both HIV-1 and HTLV-I/II infections in Brazil, were assessed within an ongoing cooperative research. The study assessed the seroprevalences of HIV-1 and HTLV-I/II infections, as well as the prevalence of HIV-1 subtypes in a sample of IDUs from Rio de Janeiro, Brazil. An attempt to evaluate HIV incidence was carried out using a dual 'sensitive/less sensitive' testing strategy. Cross-sectional evaluation of 175 IDUs. Serostatus for HIV-1 and HTLV-I/II were established by enzyme-linked immunosorbent assays, and confirmed by western blot. The dual testing strategy aimed to estimate HIV-1 incidence rates. Differentiation between HTLV-I and -II was performed by western blot. DNA samples were polymerase chain reaction amplified by a nested protocol, and HIV-1 subtyping was determined by heteroduplex mobility assay. Forty-six and 29 samples were found to be, respectively, positive for HIV-1 and HTLV-I/II, 15 of them co-infected by both viruses. Among HTLV-I/II-infected patients, 75.9% were infected by HTLV-I. Thirty-one HIV samples were identified as B subtype, with seven of them showing the typical "Brazilian B" pattern in the gp120 V3 loop, and ten were identified as F subtype. The use of less sensitive assays for HIV infection wrongly identified a deeply immunocompromised patient as an incident case. Moderately high seroprevalences were found for both HIV-1 and HTLV-I/II infections, HIV-1/HTLV-I co-infections being of special concern. A non-statistically significant higher prevalence of F subtype was observed, when compared with the distribution of F/B subtypes among Brazilian patients from other exposure categories. No recent HIV-1 infections were detected, but a limitation of the "sensitive/less-sensitive" testing strategy was made evident.
A Teacher on the Front Line as Faith and Science Clash - epi0Bauqu http://www.nytimes.com/2008/08/24/education/24evolution.html?pagewanted=1&_r=1&partner=rssnyt&emc=rss ====== boredguy8 Variation and natural selection is nothing like artistic evolution, and teaching them as though they're the same (or even similar) undermines actual scientific education. Kids aren't dumb, and 'packaging' education rarely succeeds. (It also, on a side note, gives fodder to anti-evolutionists) ~~~ hsmyers Metaphor isn't the map either, but it works. If you read the article a bit more closely, you would read that the problem is to find a bit of traction on students who are primed to walk away. As much as I despise the little rodent, if Mickey makes it, more power to him(or more to the point to a teacher determined enough to make a difference.) ~~~ boredguy8 I read the article quite closely, thankyou. I'd rather have people opposed to a correct understanding of the idea than embracing a caricature of evolution. ~~~ MJC I disagree. First of all, we're talking about highschool, so you have to allow for the fact that we're not going to dive arbitrarily deep into the details with this audience. For most of these kids, this is probably the first and only serious conversation about he topic they've ever seen, and many of them starting from an antagonistic point of view (as was clear in the article). But is talking about Mickey _incorrect_ in any substantial sense? No. The notion that there is a replication/inheritance stage and a death/selection stage is essentially correct and forms the core of the idea of evolution by natural selection. That "drawing" is the replication stage and Walt Disney's managerial decisions (and aesthetic appeal based on which Mickey people find more attractive) is the selection stage in place is, of course, _artificial_ selection, but that just makes the lesson more general. If that's all these kids learn about evolution, that's fine. My only worry is that it puts Walt in the role of God, which plays into the hands of the creationists this teacher is trying to silence, but not that the essential ideas are wrong.
Festival faces friendly fire in the fight for audiences CALL it friendly fire but the annual Sydney Festival faces fierce competition to get bums on seats this month. The battle for audiences is being waged on a number of fronts, from rival Spiegeltents to the steps of the Sydney Opera House, which has its own program of offerings, Summer at the House. The new director of the Sydney Festival, Lieven Bertels, said he had mixed feelings about his competitors. ''I'm totally at peace with the fact that in a free market, it's actually very good,'' he said. One of the roles of the Sydney Festival was to provide a stage for new and experimental shows that might not otherwise be produced, he said. At The Famous Spiegeltent in Hyde Park, for example, proven shows such as the sold-out Cantina helped support new shows such as Inside. ''We can actually only play that role of what I would call planting very exotic trees if we've got the fertile soil to plant them on,'' he said. Bertels also said there's an element of competition that at some point breaks the bank: ''Then as a society we will have to decide what the role of the festival is.'' The Sydney Festival's chief rival is the Opera House's Summer at the House, which includes children's shows Imaginocean and The Cat in the Hat, the dance show Blaze and La Soiree, a cabaret show that includes many performers who previously appeared in the Sydney Festival's Spiegeltent. The Festival's opera productions A Masked Ball and Semele Walk are up against Opera Australia productions of La boheme and Il trovatore. It also competes for family audiences with Belvoir's well reviewed production of Peter Pan. That show, which was turned down by the Sydney Festival, is selling about 200 tickets a day and is on track to sell out, according to Belvoir spokeswoman Elly Clough. The Opera House's director of programming, Jonathan Bielski said the Opera House earns 40 per cent of its revenue from December to March. ''It's fair to say the Opera House is packed to the rafters and going flat out in January,'' he said. Bielski said some of the Sydney Festival's offerings would not work at the Opera House but ''obviously our doors are wide open''. ''But the government is giving them money to go west,'' he said. ''Sydney is much bigger than Bennelong Point.'' One of the priorities listed on NSW Premier Barry O'Farrell's website is a ''dedicated Western Sydney program for Sydney Festival'', which has seen a significant push into Parramatta. In contrast, the CBD opening of the Sydney Festival last weekend was dramatically scaled back to just three events after the NSW government cut its funding. After its subdued opening the festival gathers pace this weekend with highly anticipated productions The Secret River and Semele Walk, as well as the free Summer Sounds concert in the Domain. WEEK ONE AT THE SYDNEY FESTIVAL WHAT'S HOT Daptone Super Soul Revue An uber groovy line-up from Brooklyn soul-funk revivalists Daptone Records had the Domain shaking in a revue. The true grit of James Brown heir Charles Bradley outshone even the high energy of Sharon Jones. The Blind Date Project Anna (the project's creator, Bojana Novakovic) has no idea who her potential suitor will be each night. This unscripted theatre work alternates between erotically charged, horribly awkward and wincingly funny. Cantina Acrobatics, contortionists and illusion are a festival perennial but this sold out Spiegeltent show reinvigorates the adult circus concept. Eraritjaritjaka Part-concert, part-theatre, part-film. Can be demanding and intellectual but what saves it is the performances and theatrical virtuosity which, at the reveal, draws gasps of delight from the audience. WHAT'S NOT Sacre - the Rite of Spring ''Very little movement, none of it dramatic and all of it so basic that you have to wonder why you are there,'' wrote the Herald's Jill Sykes. Fun Run Tristan Meecham's Domain marathon was hampered by small crowds, heat and competition from a five-storey-high duck in Darling Harbour. Murder The twisted turn from a company known for entertaining children divided opinion in combining top-notch puppetry with macabre themes. In the Eruptive Mode A theatrical exploration of the Arab Spring had gripping potential, but wandering monologues depleted its power. This material is subject to copyright and any unauthorised use, copying or mirroring is prohibited.
Evaluation of a UV-light emitting diodes unit for the removal of micropollutants in water for low energy advanced oxidation processes. There is growing interest in using light emitting diodes (LEDs) as alternative to traditional mercury lamps for the removal of micropollutants by advanced oxidation processes due to their low energy consumption and potential for high efficiency and long lifetime. This study investigates the penetration and coverage of the light emitted by LEDs in order to build an optimised LED collimated beam apparatus. From the experimental data, cost analysis was conducted in order to identify when LEDs will become economically viable. It was observed that if their development follows the predictions, LEDs should be a viable alternative to traditional lamps within 7yr for both UV/H2O2 and UV/TiO2 processes. However, parameters such as wall plug efficiency and input power need to improve for LEDs to become competitive.
Three Sacred Portals of Womanhood There are many ways to explore the changing stages of a woman’s life. Though each stage may be symbolized by a woman of a particular age and phase of life, their aspects interweave within us. They exist as archetypes, an aspect of the human experience that continually occurs, a pattern of behavior that becomes represented, or embodied by a symbolic personality. The Emerging Maiden The Nurturing Mother The Conscious Crone Space is limited so contact Ymani for more information, or to make your reservation:
by William Iven Facebookでは以前から「嘘のニュース(フェイクニュース)」やデマの拡散を防ぐための手をいろいろと打っているのですが、新たに、広告のリンク先が事実確認を行う第三者機関によって「虚偽である」と判断された場合に、その広告を表示させない措置を執ることを発表しました。 Blocking Ads from Pages that Repeatedly Share False News | Facebook Newsroom https://newsroom.fb.com/news/2017/08/blocking-ads-from-pages-that-repeatedly-share-false-news/ ・関連記事 Wikipedia創設者ジミー・ウェールズがフェイクニュースと戦う「Wikitribune」を立ち上げる - GIGAZINE 偽ニュースを人工知能を使って検出するプロジェクト「Fake News Challenge」 - GIGAZINE Googleが偽ニュースを垂れ流すサイト200個を追放 - GIGAZINE フェイクニュースやエセメディアの見抜き方をChromebookアプリで教育するGoogleの試み - GIGAZINE 2017年08月29日 15時49分00秒 in ネットサービス, Posted by logc_nt You can read the machine translated English article here.
Great for garages or game rooms OPGI now has these sturdy and great-looking bar stools available with your favorite logo. Perfect for your game room, garage or shop, these bar stools come with a durable, heavy-duty vinyl seat with logo, chromed legs and a ball bearing swivel seat. They're 14" wide and 30" tall and some assembly is required.
Q: Change colors to table lines I have: \documentclass[11pt]{article} \usepackage[table]{xcolor} \definecolor{orangec}{RGB}{255,158,62} \begin{document} \begin{tabular}{|l|l|} \cline{1-2} \rowcolor{orange}\multicolumn{1}{|l}{text} & \\ \cline{1-2} \rowcolor{orangec}text & text \\ \cline{1-2} text & text \\ text & text \\ text & text \\ \cline{1-2} \rowcolor{orangec}text & text \\ \cline{1-2} text & text \\ text & text \\ text & text \\ & text \\ & text \\ \cline{1-2} \end{tabular} \end{document} which gives a table with black lines. However, I can't change the color of the lines at will. The result I want is this one: A: You can use \multicolumn and !{\color{orangec}\vline} instead of | to change the color of a vertical rule midways: \documentclass[11pt]{article} \usepackage[table]{xcolor} \definecolor{orangec}{RGB}{255,158,62} \begin{document} \arrayrulecolor{orangec}\begin{tabular}{|l|l|} \hline \rowcolor{orange}\multicolumn{1}{|l}{text} & \\ \arrayrulecolor{white} \hline \arrayrulecolor{orangec} \multicolumn{1}{!{\color{orangec}\vline} l !{\color{white}\vline}}{\cellcolor{orangec}text} & \multicolumn{1}{l !{\color{orangec}\vline}}{\cellcolor{orangec}text} \\ \hline text & text \\ text & text \\ text & text \\ \hline \multicolumn{1}{!{\color{orangec}\vline} l !{\color{white}\vline}}{\cellcolor{orangec}text} & \multicolumn{1}{l !{\color{orangec}\vline}}{\cellcolor{orangec}text} \\ \hline text & text \\ text & text \\ text & text \\ & text \\ & text \\ \hline \end{tabular} \end{document}
Q: How to create a log file that displays the names of files and the contents of it I have a BAT file that displays the file names of all the CSV files in a specific folder into a log file. It also displays the contents of those CSV files. dir /b > MM.LOG type *.csv >> MM.LOG The way it is outputting is: File1 Name File2 Name File1 Content File2 Content Is there a way to get it to display as: File1 Name / File1 Content File2 Name / File2 Content An additional question, the "log" file seems to be saving as a .txt instead of .LOG. How can I fix this? A: The type command, when wild-cards like ? and * are used, returns the name or path of each typed file at the STDERR stream, which could be redirected to the STDOUT stream: type *.csv > MM.LOG 2>&1 The term > MM.LOG, equivalent to 1> MM.LOG, redirects data at stream 1 (STDOUT) to the log file. 2>&1 redirects data at stream 2 (STDERR) to the same target as for stream 1, hence MM.LOG.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details. Voice Mashups: Telephony power without telephony expertise 2. What’s a voice mashup? <ul><li>A mashup takes services or data from two or more sources, typically through APIs, and combines them into a new application </li></ul><ul><ul><li>Typically quick and easy to deploy </li></ul></ul><ul><ul><li>Doesn’t require you to understand the technology behind the services </li></ul></ul><ul><li>A voice mashup simply uses some capability of the voice channel as part of the application </li></ul><ul><li>Can also describe an app that uses the voice channel to power a Web, mobile, or desktop app </li></ul> 7. Web APIs: Making things easy for the Web developer <ul><li>Web developers are used to using APIs </li></ul><ul><li>RESTful APIs are key </li></ul><ul><ul><li>HTTP+XML </li></ul></ul><ul><ul><li>Stateless </li></ul></ul><ul><ul><li>Client-server relationship </li></ul></ul><ul><li>Supplemented by libraries for specific programming languages </li></ul>Asterisk and VoiceXML are not tools for Web developers! 13. Offering a developer program <ul><li>An API is not enough by itself </li></ul><ul><li>Docs </li></ul><ul><li>Examples </li></ul><ul><li>Forums/Wiki </li></ul><ul><li>Live support </li></ul><ul><li>Getting out there </li></ul> 14. KISS While the VoiceXML and CCXML standards have driven down the cost of custom IVR, these solutions are still too complex and expensive for many independent developers and small businesses. Many…solutions now available in the marketplace tend to be limited in flexibility. Phone mashups require flexibility. Phone mashup APIs need to be usable by any web developer with basic web form coding skills. - Irv Shapiro, Ifbyphone
1. Field of the Invention The present invention relates to an idle rotation speed learning control method and apparatus of an electronically controlled throttle type internal combustion engine. More particularly, the present invention relates to a method and apparatus for learning and correcting a target opening of a throttle valve at the time of idling, in an internal combustion engine having an electronically controlled throttle system for electronically controlling the opening of the throttle valve. 2. Description of the Related Art Heretofore, there is known an electronically controlled throttle system where the throttle valve is opened and closed by an actuator such as a motor or the like, and a target air quantity is set based on an accelerator operation amount, and the opening of the throttle valve is electronically controlled to an opening giving the target air quantity. Moreover, there is known a construction where, at the time of idling the engine, while feedback controlling the intake air quantity of the engine so that the engine rotation speed approaches a target idle rotation speed, when predetermined learning conditions materialized, the air quantity due to the feedback correction is learned as a fluctuation amount of a required intake air quantity due to friction of the engine or variations in the combustion efficiency, and a change amount in an opening area with lapse of time due to soiling or blocking of an intake system or deterioration or replacement of other parts, or the like. The intake air quantity and the target opening of the throttle valve are then corrected based on the learned values. With the system as described above however, which collectively learns the fluctuation amount of the required intake air quantity and the change amount in the opening area only by the feedback control of the engine rotation speed at the idling time, the learning accuracy cannot be increased sufficiently. That is to say, with the above method, a discrepancy between a detection value of the throttle valve opening and the actual opening cannot be learned, and only the discrepancy of the detection value of the throttle valve opening with respect to the fluctuation amount of the required intake air quantity and the change amount in the opening area can be learned. Hence, the target opening of the throttle valve cannot be corrected sufficiently accurately in response to a required engine output. The present invention addresses the above problems with the object of effecting control in an internal combustion engine comprising an electronically controlled throttle system, which makes the opening of the throttle valve correspond very accurately to the required engine output. Moreover, it is another object of the present invention to effect control which makes the opening of the throttle valve correspond very accurately to the required engine output over a long period of time. It is a further object of the present invention to be able to avoid the influence of programming bugs.
AJ-"Applebloom? You okay? You look worse than that time yall caught Hay Fever."BM-"Eeyup"After Applebloom realized how big of a mistake it had been to play with the Ouija she attempted to get rid of it in every way possible. Problem was that the gosh darn thing kept coming back! She was slowly beginning to realize that even if she no longer wished to play with the board, the board wasnt done playing with her. And it was only getting started.(A little continuation from the last Post "Ouija". Find it here: Ouija
Learn some suggestions which will help you grow better organic plants for your family. You may determine all that you should know in order that you don't buy unnecessary equipment. Additionally, you will see the way to keep your plants and make certain that they can do not die from neglect or any other things. It's less than scary knowing the basic principles. http://buckeye4locals.com/history/buckeye-farming-history/ Once your seeds start sprouting make certain they have enough light. Move your plants next to a sunny window or stick them inside a greenhouse. If you fail to do this, use fluorescent lights. Remember that your plants need as much as sixteen hours of light every single day. When starting your organic garden, you should make sure to get the proper size containers because containers are essential for holding your plants. Your containers should be around 2 or 3 inches in depth to allow them to succeed. Additionally, make sure you possess holes in the bottom of the containers for drainage purposes. When beginning your own organic garden, it is best to make sure you moisten your mix that is with the containers prior to deciding to sow the seeds. Should your mix will not be moist, it would dry. This could cause your plant to die before it is given a chance to grow. Be sure your seeds have adequate room to increase. It is actually fine to get many seeds in just one container before they sprout, but you should replant them because they grow. Use containers that are actually adequate enough first plant, and get away from having a couple of plant in each container. Use mulch within your organic garden. Mulching helps retain moisture, so it helps provide nutrients in your growing plants. You should try to use at the very least a three inch layer of mulch in all your beds. It is going to create your garden beds look as though these people were professionally finished. When you have a compost pile, but have hardly any leaves to enhance it this fall, try incorporating straw or hay into your compost pile. This is a wonderful way to add carbon which can be very useful on the growth and health of plants. The straw and hay might have seeds, so it is recommended to utilize an organic weed spray on the compost pile to remove the unwanted weeds. Should you be planting seeds in containers, an excellent general guideline would be that the seed's depth needs to be three times its overall size. However, you should recognize that some seeds require sunlight and should not be covered. Ageratum and petunias belong to this category. When you are uncertain whether your seeds should be exposed to sunlight, resources are usually provided with the seeds or is available online. Rotate your crops to avoid permanent populations of pests in your garden. As with every ecosystem, pests need some time to nest and make up an effective population within a garden. These pests are specially suited for one environment and one source of food. By switching their food source it is possible to essentially make your pest population down basically because they are unable to adjust to the brand new sort of plant. Keep plastic grocery bags convenient to the closest door in your garden. Working in your organic garden could be greatly enjoyable, and also messy. You can re-use plastic bags as impromptu shoe-covers to help you enter your residence without tracking in garden mud. This will enable you to deal with any indoor necessities quickly and get back to your gardening faster. Hand weed your organic garden on a regular basis. Just jump on the knees, put your hands within the dirt, and pull weeds out by their roots. If you this regularly, you can avoid being forced to use harmful pesticides. A garden will continue to be healthy, safe, and organic. Plant your tomatoes in intervals of 3 weeks, starting with the very first strain and they can grow inside a more organized structure. This way, all the tomatoes is definitely not prepared to harvest at once. If something happens to ruin your harvest, you may have time to fix the problem before the next pair of tomatoes arrives, sparing portion of the harvest. Growing an organic garden does not take more effort than any other type of garden. In reality, because organic gardening emphasizes on what nature provides, plants will never should rely on artificial way to thrive, thus saving you amount of time in applying chemicals. Try organic gardening in your home you will end up impressed by the final results. 5 Answers 0 votes Thank you so much for giving everyone such a marvellous possiblity to discover important secrets from this site. It really is so lovely and also jam-packed with a lot of fun for me and my office friends to visit your blog on the least three times per week to study the newest issues you will have. And definitely, I'm just at all times pleased concerning the special methods you serve. Selected two areas on this page are particularly the most suitable I've had. I wanted to say thanks yet again. I'm not certain the things that I could possibly have used in the absence of the type of techniques shown by you on that theme. It has been a real frustrating crisis for me personally, but discovering a new expert manner you managed it took me to weep with joy. I'm just grateful for this work and pray you realize what an amazing job that you're putting in instructing many others via a site. I know that you haven't got to know all of us. Thanks so much for giving everyone remarkably spectacular possiblity to read articles and blog posts from this web site. It's usually so good and as well , jam-packed with a great time for me and my office fellow workers to search your blog minimum 3 times in 7 days to find out the newest items you will have. And definitely, I am just certainly pleased with your surprising inspiring ideas served by you. Certain 2 areas in this article are absolutely the most suitable I have ever had. I'm just writing to make you understand of the wonderful discovery my cousin's girl developed viewing your web site. She realized some issues, including what it is like to have an excellent coaching mood to make most people just fully understand chosen specialized subject areas. You truly did more than my expected results. Many thanks for churning out those priceless, trusted, explanatory. Throughout this grand pattern of things you'll secure a B- with regard to hard work. Where you confused us was first in the specifics. You know, as the maxim goes, details make or break the argument.. And that couldn't be more accurate here. Having said that, permit me tell you what exactly did do the job. Your writing is actually quite persuasive and that is probably why I am making the effort in order to opine. I do not make it a regular habit of doing that. Secondly, although I can notice the jumps in reasoning you make, I am not confident of how you appear to unite the details which help to make your conclusion. For right now I will, no doubt yield to your issue however hope in the near future you actually link the dots much better.
Q: How to get all the metadata keys for any ItemGroup item? Is there a way to get all the metadata keys associated with a given item? I want to do something like the following. Given: <ItemGroup> <MyItems Include="item1"> <key1>val1</key1> <key2>val2</key2> <key3>val3</key3> </MyItems> <MyItems Include="item2"> <key4>val4</key4> </MyItems> </ItemGroup> Be able to determine that item1 has metadata available for key1, key2, and key3, and that item2 has metadata available for key4, without knowing what the names of those keys actually are. In effect, I'm trying to use the metadata to specify attributes that I have no idea about, and then trying to figure out a way to check to see what attributes have been specified. Put another way, I believe the metadata of each item is just a hash containing key/value pairs and I'm trying to figure out what all the keys are. Anyone know how to do this with msbuild? Thanks A: I ended up solving this using a custom inline task similar to the following: <UsingTask TaskName="GetMetadataTask" TaskFactory="CodeTaskFactory" AssemblyFile="$(MSBuildToolsPath)\Microsoft.Build.Tasks.v4.0.dll" > <ParameterGroup> <MyItemGroup ParameterType="Microsoft.Build.Framework.ITaskItem[]" Required="true" /> <MetadataString Output="true" /> </ParameterGroup> <Task> <Using Namespace="System"/> <Code Type="Fragment" Language="cs"> <![CDATA[ StringBuilder command = new StringBuilder(); foreach (ITaskItem item in MyItemGroup ) { command.AppendFormat("ItemName={0}\r\n", item); foreach (string parameter in item.MetadataNames) { command.AppendFormat(" {0}={1}\r\n", parameter, item.GetMetadata(parameter)); } command.AppendFormat("\r\n"); } MetadataString = command.ToString(); ]]> </Code> </Task> </UsingTask> Note that the above will also include all the default metadata that MSBuild automatically adds to every item in an itemgroup (like FullPath, RootDir, Filename, etc). In my implementation I added an extra check to ignore those metadata items that I didn't care about Sample usage: <GetMetadataTask MyItemGroup="@(YourItemGroup)"> <Output TaskParameter="MetadataString" PropertyName="YourMetadataString"/> </GetMetadataTask> <Message Text="$(YourMetadataString)" /> To see message output in Visual Studio's Output window, you may need to change your MSBuild output verbosity to at least Normal.
01 23 777 93 NEWS Blockchain: looking beyond the hype Businesses would be forgiven for not quite understanding blockchain, but the Irish Computer Society (ICS) is hoping to get them on the right track early. It’s hard to escape the hype that surrounds blockchain. While it’s true that its potential is significant, the real benefits can get lost in the bluster surrounding it. Businesses themselves may want to know what it’s about, but might not be sure where to start or who to trust. “It’s not just ICS Skills, it’s the total ecosystem of the Irish Computer Society that’s going to benefit,” explains Friars. “Whatever emerging technologies or groups that are pertinent to our membership are doing, we want to be a part of that. A year and a half ago, I starting looking into blockchain and that’s when I met the guys from the Blockchain Association. They had literally formed the week before I contacted them. “We’ve been working together over the last few years and then we made this decision to come together and bring their sector expertise into our administrative expertise.” Blockchain has taken off in the area of cryptocurrencies, but what is exciting is how it could benefit other industries says Friars. It uses a digital ledger, which effectively treats digital assets the same way as physical assets. “Any of the things you can imagine – like leasing, intellectual property, food safety, pharmaceuticals – anything that requires traceability, that’s where blockchain has massive implications,” he says. “Say for fintech, when you have a distributed ledger embedded into the technologies you’re building, something like blockchain is going to be core to what they’ll be trying to do. This is a strategic move for the ICS because of the way the multiple membership organisation works. “When we bring in something like the Blockchain Association under our umbrella, all of the associations that are under the ICS umbrella . . . can opt to join.” ICS is running a halfday conference on blockchain on March 21 to introduce the concept to other sectors. It mightn’t be adopted straight away – there’s still a considerable amount that needs to happen before it becomes commonplace – but it will give members a head-start in understanding it. Also, the ICS has a reputation for high standards and professionalism. This isn’t just a way to jump on a bandwagon, it’s because it can see the long-term benefits for its members. “We’re the body in Ireland that’s responsible for IT professionals in Ireland and we bring to the Blockchain Association the same kind of rigour,” says Friars. “Continuous professional development is a big part of [what we do] and we’re always making sure we’re at the cutting-edge of it for all of our members. “[We help] people who want to get through the hype but understand what are the applications that can make a difference to both their own knowledge and their organisation. “CIOs are being asked by their boards: ‘What is this blockchain thing?’ And that’s a big question. It needs a lot more time and effort to understand whether there are applications within [a company’s] work environment or strategic plan for their IT. “The reality is, there is a lot of hyperbole about blockchain, that it is the future of the internet, but I really do think it’s a new way of thinking and it’s challenging a lot of people.” Friars likens blockchain to another hot topic for businesses: GDPR. While most businesses only registered it on their radars two years ago when the deadline was announced, ICS members had known about data protection for longer, thanks to its approach. “It’s interesting because everybody has GDPR written on something that they’re promoting. We’re been involved with the Association of Data Protection Officers since 2008 and it’s funny to see the number of organisations that have woken up in the last year and a half. This is something that has been embedded in the way we’ve taught and we’ve grown out the organisation for years now.” The itSMF is the only truly independent and internationally-recognised forum for IT Service Management professionals worldwide. Since 1991, this not-for-profit organisation is a prominent player in the on-going development and promotion of IT Service Management best practice, standards and qualifications.
Children with dyslexia reveal abnormal native language representations: evidence from a study of mismatch negativity. Although a deficit perceiving phonemes, as indexed by the mismatch negativity (MMN), is apparent in developmental dyslexia (DD), studies have not yet addressed whether this deficit might be a result of deficient native language speech representations. The present study examines how a native-vowel prototype and an atypical vowel are discriminated by 9-year-old children with (n = 14) and without (n = 12) DD. MMN was elicited in all conditions in both groups. The control group revealed enhanced MMN to the native-vowel prototype in comparison to the atypical vowel. Children with DD did not show enhanced MMN amplitude to the native-vowel prototype, suggesting impaired tuning to native language speech representations. Furthermore, higher MMN amplitudes to the native-vowel prototype correlated with more advanced reading (r = - .47) and spelling skills (r = - .52).
Statistics can sometimes be deceiving. They can also be revealing. So the question posed to Eagles offensive coordinator Marty Mornhinweg was simple: What does he make out of the fact that the Eagles are 3-0 when LeSean McCoy gets at least 20 carries, and 0-6 when he gets fewer than 20 carries? "I make that we're in four-minute [offense] at the end of the game, so he gets a few more carries," Mornhinweg said. "It's just simple." This is a factual inaccuracy, though. McCoy has had five carries in the final four minutes of wins this season. Five. Told that the Eagles came from behind in their wins, Mornhinweg didn't waver. "I think LeSean is eighth in carries and fourth in total touches; I don't think there's a problem there," Mornhinweg said. "Every game is different. You have to dig into every game. And usually the ball carriers a few more carries when you're ahead in the four minute and toward the end of the game." Mornhinweg was correct about the amount of carries and touches that McCoy has. So it's not as if he isn't being used. But the carries number is telling -- 20 or more, the Eagles win. Twenty or fewer, the Eagles lose.
During the coming year we propose to pursue an examination of the role of the platelet in the pathogenesis of human disease by studies in both experimental animals and in man. Both baboons (Papio cynocephalus) and monkeys (Macaca nemestrina) will be used as experimental animals in carrying out quantitative measurements of endothelial cell loss and proliferation, platelet accumulation and turnover, and measurement of intimal lesion formation in the following experimental settings: 1) hypoxia, 2) antiendothelial cell antibody infusion, and oral sulfinpyrazone administration throughout, 3) three months of sustained homocystinemia, and 4) six months of hyperlipidemia. The relative thrombogenicity of selected prosthetic materials and fabrications will also be determined using the ex vivo baboon A-V shunt. Platelet involvement in human disease will be explored by simultaneously measuring 51Cr-platelet survival, 14C-serotonin platelet survival, and platelet factor IV in selected patients representing a spectrum of vascular disease including: 1) hyperlipidemia; 2) coronary artery disease with a history of successful cardiopulmonary resuscitation; 3) renal vascular disease; 4) diabetes mellitus; 5) scleroderma; and 6) malignancy.