text
stringlengths
7
4.92M
TwinLab's Alpha Lipoic Acid 50mg 60Caps Well tolerated by most highly allergic individuals. Packaged in a glass bottle for maximum stability, quality and freshness. Alpha lipoic acid is a powerful sulfer containing ingredient. It works sygergistically with antioxidants such as Vitamins C, E and glutahione. Directions As a dietary supplement, take one capsule daily, preferably with a meal, or as directed by a physician. Disclaimer Statements contained herein have not been evaluated by the Food and Drug Administration. These products are not intended to diagnose, treat and cure or prevent disease. Always consult with your professional health care provider before changing any medication. Other Popular Products The products and the claims made about specific products on or through this site have not been evaluated by The House of Nutrition Online or the United States Food and Drug Administration and are not approved to diagnose, treat, cure or prevent disease. The information provided on this site is for informational purposes only and is not intended as a substitute for advice from your physician or other health care professional or any information contained on or in any product label or packaging. You should not use the information on this site for diagnosis or treatment of any health problem or for prescription of any medication or other treatment. You should consult with a healthcare professional before starting any diet, exercise or supplementation program, before taking any medication, or if you have or suspect you might have a health problem.
#!/usr/bin/env python # -*- coding: utf-8 -*- import six from bson import ObjectId from easydict import EasyDict as edict from tornado.concurrent import return_future from motorengine import ASCENDING from motorengine.query_builder.transform import update class BaseAggregation(object): def __init__(self, field, alias): self._field = field self.alias = alias @property def field(self): return self._field class PipelineOperation(object): def __init__(self, aggregation): self.aggregation = aggregation def to_query(self): return {} class GroupBy(PipelineOperation): def __init__(self, aggregation, first_group_by, *groups): super(GroupBy, self).__init__(aggregation) self.first_group_by = first_group_by self.groups = groups def to_query(self): group_obj = {'$group': {'_id': {}}} for group in self.groups: if isinstance(group, BaseAggregation): group_obj['$group'].update(group.to_query(self.aggregation)) continue if isinstance(group, six.string_types): field_name = group else: field_name = self.aggregation.get_field(group).db_field if self.first_group_by: group_obj['$group']['_id'][field_name] = "$%s" % field_name else: group_obj['$group']['_id'][field_name] = "$_id.%s" % field_name return group_obj class Match(PipelineOperation): def __init__(self, aggregation, **filters): super(Match, self).__init__(aggregation) self.filters = filters def to_query(self): from motorengine import Q match_obj = {'$match': {}} query = self.aggregation.queryset.get_query_from_filters(Q(**self.filters)) update(match_obj['$match'], query) return match_obj class Unwind(PipelineOperation): def __init__(self, aggregation, field): super(Unwind, self).__init__(aggregation) self.field = self.aggregation.get_field(field) def to_query(self): return {'$unwind': '$%s' % self.field.db_field} class OrderBy(PipelineOperation): def __init__(self, aggregation, field, direction): super(OrderBy, self).__init__(aggregation) self.field = self.aggregation.get_field(field) self.direction = direction def to_query(self): return {'$sort': {self.field.db_field: self.direction}} class Aggregation(object): def __init__(self, queryset): self.first_group_by = True self.queryset = queryset self.pipeline = [] self.ids = [] self.raw_query = None def get_field_name(self, field): if isinstance(field, six.string_types): return field return field.db_field def get_field(self, field): return field def raw(self, steps): self.raw_query = steps return self def group_by(self, *args): self.pipeline.append(GroupBy(self, self.first_group_by, *args)) self.first_group_by = False return self def match(self, **kw): self.pipeline.append(Match(self, **kw)) return self def unwind(self, field): self.pipeline.append(Unwind(self, field)) return self def order_by(self, field, direction=ASCENDING): self.pipeline.append(OrderBy(self, field, direction)) return self def fill_ids(self, item): if not '_id' in item: return if isinstance(item['_id'], (dict,)): for id_name, id_value in list(item['_id'].items()): item[id_name] = id_value def get_instance(self, item): return self.queryset.__klass__.from_son(item) def handle_aggregation(self, callback): def handle(*arguments, **kw): if arguments[1]: raise RuntimeError('Aggregation failed due to: %s' % str(arguments[1])) results = [] for item in arguments[0]: self.fill_ids(item) results.append(edict(item)) callback(results) return handle @return_future def fetch(self, callback=None, alias=None): coll = self.queryset.coll(alias) coll.aggregate(self.to_query()).to_list(None, callback=self.handle_aggregation(callback)) @classmethod def avg(cls, field, alias=None): from motorengine.aggregation.avg import AverageAggregation return AverageAggregation(field, alias) @classmethod def sum(cls, field, alias=None): from motorengine.aggregation.sum import SumAggregation return SumAggregation(field, alias) def to_query(self): if self.raw_query is not None: return self.raw_query query = [] for pipeline_step in self.pipeline: query_steps = pipeline_step.to_query() if isinstance(query_steps, (tuple, set, list)): for step in query_steps: query.append(step) else: query.append(query_steps) return query
Also Available On: Kills on Wheels (Blu-ray) In this wildly original action-comedy, two teenaged boys living with disabilities find escape from their humdrum lives when they’re enlisted by a gruff ex-con to be his accomplices… as wheelchair hit men! Thrust into a surreal world of gangsters and guns, the partnership soon blossoms into friendship as their mentor reveals a soft heart beneath his tough exterior and the boys help him come to terms with his own disability. Hungary’s official submission to the 89th Academy Awards®, Kills on Wheels features stellar cinematography, a mix of live action and comic book-style animation, and a wickedly dark sense of humor. It deftly blends genres, confronting issues of invisibility, prejudice, and loneliness as it boldly flouts all stereotypes and expectations. Newly Re-mastered in HD! Noel Holcroft (Michael Caine, The Destructors, Billion Dollar Brain) is a New York architect who receives an unexpected inheritance from his ex-Nazi father: $40 billion in... More Newly Re-mastered in HD! Noel Holcroft (Michael Caine, The Destructors, Billion Dollar Brain) is a New York architect who receives an unexpected inheritance from his ex-Nazi father: $40 billion in... More John Bookman (Fred Williamson), a former hood who went on to become a big time football star, returns to his old turf when the gang he founded ends up killing his father. Bookman decides to round up... More Eddie Cusack (Chuck Norris) is a Chicago detective who plays by his own rules - a dangerous habit, especially when he breaks the "code of silence" to blow the lid off a deadly police cover-up. Now an... More Eddie Cusack (Chuck Norris) is a Chicago detective who plays by his own rules - a dangerous habit, especially when he breaks the "code of silence" to blow the lid off a deadly police cover-up. Now an... More Don Murray (Hoodlum Priest, Bus Stop) plays Lacy, a blatantly bigoted New York cop, whose rabid hatred forces him into a bloody rampage in order to save himself and his job in this gritty and rivetin... More White Lightning will give you the jolt of your life! Burt Reynolds (Sam Whiskey) is Gator McKlusky, a moonshine runner who wages war against corrupt police officials in this two-fisted, four-wheeling... More White Lightning will give you the jolt of your life! Burt Reynolds (Sam Whiskey) is Gator McKlusky, a moonshine runner who wages war against corrupt police officials in this two-fisted, four-wheeling... More While prosecuting the three Italian teens who murdered a 15-year-old blind Puerto Rican boy from a rival gang in East Harlem, Assistant D.A. Hank Bell (Burt Lancaster) learns that there's is more to... More While prosecuting the three Italian teens who murdered a 15-year-old blind Puerto Rican boy from a rival gang in East Harlem, Assistant D.A. Hank Bell (Burt Lancaster) learns that there's is more to... More
<div class="subblock"> <h3><%= t('.owner_tools') %></h3> <div> <%= link_to t('.force_update'), act_content_path(action_name: 'manual_refresh'), method: :put, class: "btn info" %> <%= link_to t('.purge_children'), act_content_path(action_name: 'delete_children'), method: :put, class: "btn info" %> </div> </div>
Refugee camps spring up around the world in response to the needs of displaced populations. Always intended to be temporary, these camps often become long term homes for their residents. From the outside, they're seen as a humanitarian crisis by aid workers and a security challenge by host governments. What does life look like for those who call a refugee camp home? Journalist Ben Rawlence spent years documenting life in Dadaab, a group of refugee camps in northern Kenya. The camps make up a small city of almost half a million people, mostly Somalis who fled civil war and violence. How does this population address the challenges of education, employment, healthcare and meeting other basic needs? Why has this camp, and others like it, become a more permanent settlement for so many? Rawlence will share the stories of a few of Dadaab’s citizens, exploring both individual lives and the wider political forces that have kept them from returning home.
Inherited thrombotic disorders: an update. Significant advances in identification of etiologies of inherited thrombosis have been recently reported. A point mutation in coagulation factor V (factor V Leiden) results in resistance to activated protein C and probably represents the most common genetic risk factor for venous thrombosis. A metabolic disorder, homocysteinemia, is now known to be an important risk factor for both arterial and venous thrombosis. Many patients with recurrent thrombosis will have more than one genetic risk factor identified. Recognition of these new disorders should permit a diagnosis to be achieved in at least half of patients evaluated for inherited thrombosis.
Portland Thunder WR/KR Duane Brooks (5-10, 185, Stephen F. Austin) has broken the Arena Football League record for kickoff return touchdowns in a season with his eighth runback, a 56 yard return coming at the 14:46 mark of the third quarter against the Las Vegas Outlaws Saturday evening. Last week was one of the most unusual weeks in the history of the Arena Football League. One third of the teams were scheduled to be out on a bye when the league also cancelled the Las Vegas-New Orleans game and declared it a tie. It made for a bizarre week in Quickplay where successful teams had to put two players from the East Division into their lineups despite the fact none of them played in Week 18. The Sharks savaged Tampa Bay and moved to the grownups table this week, entering just 0.02 points behind Philadelphia in the latest weighted rankings. Arizona also saw a nice uptick, and the Shock didn’t go up much, but jumped from 12th to ninth in the rankings. Tim Capper and Adam Markowitz are back with the 18th episode of AFL Tonight for the 2015 season. We discuss the aftermath of the Outlaws-VooDoo cancellation, playoff race, Tampa Bay rant and much more. Our interview this week is AFL Commissioner Scott Butera. PORTLAND – The Portland Thunder host the expansion Las Vegas Outlaws in their 2015 home finale this Saturday at Moda Center. Kickoff is set for 7:00PM. Fans can listen on 750 AM The GAME starting at 6:30pm, and also watch live on CSNNW, or stream via ESPN3 and the WatchESPN.com app. PORTLAND – The Portland Thunder are set to host ‘Fan Appreciation Night, presented by Aaron’s’ at their final home game of the 2015 AFL schedule, this Saturday night against the Las Vegas Outlaws, from Moda Center. Kickoff is set for 7:00pm. Despite a light schedule in Week 18 of the Arena Football League schedule, the postseason lineup came into sharper focus with Jacksonville locking up an appearance in the American Conference while Spokane doing the same in the National Conference.
Online casinos are the best places to have fun while earning money at the same time. Gambling is entertaining and addictive. With the busy life, it is becoming extremely difficult for Australians to take some time out and enjoy playing casinos. The online casino websites bring the entertainment to wherever you are. Modern free pokies can be played using a mobile device and you can really have fun on the go. When you play the casino online games with real money and beat the machine, you can earn real cash that can be withdrawn to your bank account. Choose a licensed casino If you plan on spending your money on casino games, you should always choose a casino with an appropriate license. Due to the popularity of online games and pokies, numerous websites on the internet claim to provide the best casino experience. You should always choose a legal casino to ensure that you do business only with the right type of people. Play multiple games Australians enjoy playing blackjack, roulette, craps, and other live dealer tables. If you enjoy card games, play video poker to maximize the fun. You just can’t get enough of pokies and the casino website should allow you to play as many slots as you want. Even though you enjoy a couple of casino games, you should always choose a casino website that provides multiple gaming options because you will never know what game will spike your interest. Easy deposit and withdrawal options The free casino games are enjoyable, but they fail to provide the thrill of betting your money. Before playing a game with your money, you should try the game for free. Once you learn the art of winning the machine, you can make a deposit and play with real cash. The casino website you choose must provide you multiple deposit options. You must also check out the withdrawal options to ensure that you can withdraw your winnings easily to your bank account. Gambling is highly addictive and it is your responsibility to exercise control when you play with real money. Playing options The casino online games offer a well deserving relaxation when you are stressed out at your job. Many casino websites require you to download a software to play the games. Browser based casinos are ideal if you are looking for some quick pokies refreshment. Many casino games can now be played on the mobile devices which enable you to play the games during your commute to and from work. It is better to choose online casinos that provide multiple playing options using a single account. Welcome bonus and member benefits Almost all the casino websites offer a welcome bonus in the form of real cash that you can use to play pokies for real. This will encourage the players to play for money instead of just playing for fun. The winnings can be either withdrawn or used for subsequent plays. Members will also get deals and discounts that are useful to lower the cost of play while maximizing benefits.
Nissan launches new Micra Active Nissan launches Micra refresh Nissan launched a new version of its premium hatchback Micra at a significantly low starting price of Rs. 3.5 lakh in Mumbai on Wednesday. The new version called Micra Active, powered by a 1.2-litre petrol engine, comes without the push start button feature that is available in its higher end variants. The company said the new car is 30 kilograms lighter and clocks a mileage of 19.3 kilometres per litre. Nissan, working towards tripling its domestic sales to 100,000 units this financial year and increasing its market share from 1.5% to 10% by 2016, will later launch its low-cost Datsun brand under which it would sell casr priced below Rs. 4 lakh. However Kenichiro Yomura, Nissan India's president was non-committal when asked if the upcoming Datsun car would be significantly cheaper than the Micra Active. Yomura added that Nissan does not plan to increase prices as 88-90% localisation in its cars helps shield the company from the rupee's depreciation.
10d. Mount Pleasant Road, Repton. Located on a rather rural section of this road is a somewhat out-of-place installation: an 8 m column supporting a Thorn Alpha 9 90 W SOX lantern on an otherwise column-free road. The fact that the column does not carry a local authority maintenance number perhaps gives you an idea that all is not quite what it seems with this installation...in fact, the truth is that the column is in private ownership - it was originally installed as a means of providing illumination to the car park for a nearby public house; however, this car park later fell into disuse (and indeed, is nowadays unrecognisable as such; the land having reverted to nature after being closed), with the column's bracket being rotated in order that the lantern was instead positioned over the carriageway, allowing it to continue serving a purpose, and being maintained by a contractor as and when required. Despite not being in the best of conditions, and the fact that it is somewhat surplus to requirements, the lantern is (at the time of writing), still operational at night. The detector for the Royce Thompson P42 two-part photocell can be seen attached to the lantern's canopy; the control gear for the lamp being situated in the column base. This close-up reveals the damage that has occurred to the front of the bowl, resulting in dirt forming within the inside of the luminaire. This damage can be more clearly seen directly below the lantern. When viewing the installation from the other side, evidence of the former car park's existence is limited at best; the only sign of the land's previous use being the (barely visible) wooden bollards just behind the grass verge. The column is believed to have been installed by the East Midlands Electricity Board (as was) in the 1980s; given the extensive growth of the bushes and trees within the area, the column cannot have served its intended purpose for long before the car park was abandoned in favour of a more convenient piece of land located adjacent the pub - these pictures were taken in April 2015.
Q: Error in Iterating through Pandas DataFrame with if statement I have the following pandas DataFrame. Id UserId Name Date Class TagBased 0 2 23 Autobiographer 2016-01-12T18:44:49.267 3 False 1 3 22 Autobiographer 2016-01-12T18:44:49.267 3 False 2 4 21 Autobiographer 2016-01-12T18:44:49.267 3 False 3 5 20 Autobiographer 2016-01-12T18:44:49.267 3 False 4 6 19 Autobiographer 2016-01-12T18:44:49.267 3 False I want to iterate through "TagBased" column and put the User Ids in a list where TagBased=True. I have used the following code but I am getting no output which is incorrect because there are 18 True values in TagBased. user_tagBased = [] for i in range(len(df)): if (df['TagBased'] is True): user_TagBased.append(df['UserId']) print(user_TagBased) Output: [] A: As others are suggesting, using Pandas conditional filtering is the best choice here without using loops! However, to still explain why your code did not work as expected: You are appending df['UserId'] in a for-loop while df['UserId'] is a column. Same goes for df['TagBased'] check, which is also a column. I assume you want to append the userId at the current row in the for-loop. You can do that by iterating through the df rows: user_tagBased = [] for index, row in df.iterrows(): if row['TagBased'] == 'True': # Because it is a string and not a boolean here user_tagBased.append(row['UserId'])
Testing by DHS in late 2017 showed all eight prototypes, including the steel slats, were vulnerable to breaching, according to an internal February 2018 U.S. Customs and Border Protection report Receive the latest national-international updates in your inbox A test of a steel prototype for the proposed border wall showed it could be sawed through. President Donald Trump has repeatedly advocated for a steel slat design for his border wall. But Department of Homeland Security testing of a steel slat prototype proved it could be cut through with a saw, according to a government report. A photo exclusively obtained by NBC News shows the results of the test after experts from the Marine Corps were instructed to attempt to destroy the barriers with common tools. Testing by DHS in late 2017 showed all eight prototypes, including the steel slats, were vulnerable to breaching, according to an internal February 2018 U.S. Customs and Border Protection report. Photos of the breaches were not included in a redacted version of the CBP report, which was first obtained in a Freedom of Information Act request by San Diego public radio station KPBS.
PICTURES: Celebrating the creatures that keep Cornish town alive Crowds line the harbour at the Newlyn Fish Festival yesterday. Below left, MP Sheryll Murray at the blessing of the fleet, and right, fishmonger John Bernasconi and daughter Erin, 5 Pictures: Colin Higgs Near-perfect weather saw the number of visitors to the historic Newlyn Fish Festival in Cornwall almost double yesterday, with the event organisers delighted as it aimed to re-engage with its fishing roots. The annual fundraiser for the Royal National Mission to Deep Sea Fishermen celebrates the fishing industry at its location dotted around Newlyn Harbour on the edge of Penzance. Guests of honour in the past have included celebrity chef Rick Stein, and last year actress Caroline Quentin in pouring rain. However, this year's event saw a change of tone with Brittany fishing expert Yan Giron opening the festival. Yet, despite the change in approach the festival retained many of its popular events, including cooking demonstrations and its Fish Monger of the Year competition and on Sunday night, the traditional blessing of the fleet took place in the fishing port. Steve Ryman, festival secretary, said: "It's been pretty good. I suppose with the good weather, the car park filled up very early on. It's been a massive turn around on last year, the weather has been just perfect, almost too perfect at times, but as a consequence, we have probably got double the amount of people as last year. It's back to what the festival has always been like, we don't know the numbers yet but we think they are very high. I think what's happened over the years is that it's become a really fun family event but perhaps that engagement with the fishing industry has been lost so it's crucial that we turned that around and do our best to reengage with the fishing industry.
“It’s come to my attention that women are having their accounts banned for showing menstrual blood (and no nudity),” Louelle Denor wrote on Instagram recently. “This is very seriously fucked up.” If a picture features “blood from a finger laceration, there’d be no issue,” she wrote. Commenters were not pleased. She received disturbing messages telling her to kill herself, among things. “Feminazis should be put in a shower dispersing male semen onto their faces,” another commented. These startling reactions, she later wrote, ultimately prove her point. “We see blood all the time,” she wrote in a Medium post about the experience. “It is socially acceptable to show blood shooting out of the human body on the news and in every form of media we consume.” In fact, the average American child sees more than 200,000 acts of violence and 16,000 simulated murders on TV before they turn 18, according to the American Psychiatric Association. But should that blood be “associated with the vagina, even when the vagina is not shown,” Denor wrote, then we “don’t tolerate” it and even, as she found out, threaten women’s lives over it. This intolerance was recently evident in March, when Instagram twice removed a photo series titled “Period,” created by poet-artist Rupi Kaur in collaboration with her sister. “I will not apologize for not feeding the ego and pride of misogynist society that will have my body in an underwear but not be okay with a small leak,” Kaur wrote on Tumblr in response to this ban. Denor similarly refused to bow to haters. “Look, you don’t have to like my picture,” Denor wrote on Medium. “But am I wrong in hoping that I can post a picture of some bloody fingers and a weird disk without the threat of being sprayed with sperm and set on fire?” Ultimately, Denor wrote, the entire incident reveals that the period double standard is about so much more than irrational disgust. It indicates the way society is seemingly unable to view a woman “as more than a sex object” and, furthermore, resorts to drastic, misogynistic measures when that is called into question. “Violence is not merely physical,” Denor wrote. “Violence against women online is as ubiquitous as blood is in entertainment. And I suppose, I’ll leave you with that.”
package org.intellij.markdown.parser.sequentialparsers.impl import org.intellij.markdown.MarkdownElementTypes import org.intellij.markdown.MarkdownTokenTypes import org.intellij.markdown.parser.sequentialparsers.LocalParsingResult import org.intellij.markdown.parser.sequentialparsers.RangesListBuilder import org.intellij.markdown.parser.sequentialparsers.SequentialParser import org.intellij.markdown.parser.sequentialparsers.TokensCache class ReferenceLinkParser : SequentialParser { override fun parse(tokens: TokensCache, rangesToGlue: List<IntRange>): SequentialParser.ParsingResult { var result = SequentialParser.ParsingResultBuilder() val delegateIndices = RangesListBuilder() var iterator: TokensCache.Iterator = tokens.RangesListIterator(rangesToGlue) while (iterator.type != null) { if (iterator.type == MarkdownTokenTypes.LBRACKET) { val referenceLink = parseReferenceLink(iterator) if (referenceLink != null) { iterator = referenceLink.iteratorPosition.advance() result = result.withOtherParsingResult(referenceLink) continue } } delegateIndices.put(iterator.index) iterator = iterator.advance() } return result.withFurtherProcessing(delegateIndices.get()) } companion object { fun parseReferenceLink(iterator: TokensCache.Iterator): LocalParsingResult? { return parseFullReferenceLink(iterator) ?: parseShortReferenceLink(iterator) } private fun parseFullReferenceLink(iterator: TokensCache.Iterator): LocalParsingResult? { val startIndex = iterator.index val linkText = LinkParserUtil.parseLinkText(iterator) ?: return null var it = linkText.iteratorPosition.advance() if (it.type == MarkdownTokenTypes.EOL) { it = it.advance() } val linkLabel = LinkParserUtil.parseLinkLabel(it) ?: return null it = linkLabel.iteratorPosition return LocalParsingResult(it, linkText.parsedNodes + linkLabel.parsedNodes + SequentialParser.Node(startIndex..it.index + 1, MarkdownElementTypes.FULL_REFERENCE_LINK), linkText.rangesToProcessFurther + linkLabel.rangesToProcessFurther) } private fun parseShortReferenceLink(iterator: TokensCache.Iterator): LocalParsingResult? { val startIndex = iterator.index val linkLabel = LinkParserUtil.parseLinkLabel(iterator) ?: return null var it = linkLabel.iteratorPosition val shortcutLinkEnd = it it = it.advance() if (it.type == MarkdownTokenTypes.EOL) { it = it.advance() } if (it.type == MarkdownTokenTypes.LBRACKET && it.rawLookup(1) == MarkdownTokenTypes.RBRACKET) { it = it.advance() } else { it = shortcutLinkEnd } return LocalParsingResult(it, linkLabel.parsedNodes + SequentialParser.Node(startIndex..it.index + 1, MarkdownElementTypes.SHORT_REFERENCE_LINK), linkLabel.rangesToProcessFurther) } } }
Valentine's day, my boyfriend got me a 66 Chevy for my own rebuild project from an elderly gentleman that road the fields in it. Just yesterday, we got to back 'him' into the shop to begin my project. I've searched the truck over and can't find the vin plate. We have removed hood, front cap, and doors - I thought some numbers stamped on front frame could have been it, but it's only 8 digits. We are removing the bed tonight. Could the vin be stamped on the back section of frame? It's not on dash, under dash by fuse box, or inside door frame. HELP!! We've looked in all the "obvious" places - but with no luck. No plate in dash, drivers door jamb, under dash beside fuse box, etc. We are hoping that somewhere on this truck it's stamped in metal cause there is no plate... I'm on hold with Chevrolet now. Been here over 30 minutes - since the truck is so old, they don't have info in their database any longer so they are having to call out to a different 'information station' to ask them. Surely they will come up with something! Did you get a title? If so, you could start backwards. See if the engine still has the partial VIN stamped into it, the last six digits should match the last six on the title if it hasn't been changed out. Thank you all for your great advice. We've found the plate on the driver's side door 'roof'. Turns out the 8 digits I found on the frame where the last 8 of the vin. From your replies, I not only found the plate, I learned where it was assembled and what number it came off production line! Very cool. Thanks again - dee Register Now In order to be able to post messages on the Hot Rod Forum : Hotrodders Bulletin Board forums, you must first register. Please enter your desired user name (usually not your first and last name), your email address and other required details in the form below. User Name: Password Please enter a password for your user account. Note that passwords are case-sensitive. Password: Confirm Password: Email Address Please enter a valid email address for yourself. Email Address: Insurance Please select your insurance company (Optional) Log-in User Name Remember Me? Password Human Verification In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic.
Broncos bag Wales international London Broncos have continued preparing for life in the Kingstone Press Championship by signing Wales international centre/wing Rhys Williams on a two-year deal for the 2015 season. The 24-year-old played 29 games for Warrington having made his Wolves debut 2010 while he has also played for Crusaders, Castleford Tigers and Salford. Williams, who has 13 caps for Wales, has been playing for Central Queensland Capras in the Intrust Super Cup in Australia and is looking forward to moving to the capital. "I'm very excited to be joining the Broncos next season,\" he said. "Living in London, where my brother and sister won't be too far away, is a big advantage after being in Australia for a year. "The challenge of getting back into Super League is one I'm looking forward to as well as playing under Joey. His enthusiasm certainly shines through and his plans for changing the culture at the club are exciting. "I'm looking forward to playing alongside Josh Cordoba. He's played under Joey before and is an experienced player who will know the standards that Joey will set in order for the culture to change to make this team successful. He could be very instrumental in doing this.\" Head coach Joey Grima is delighted to add Williams to his squad saying: "I'm really pleased that Rhys will join us next season. He will add some pace to our back line and has the versatility, strength and speed to play at centre and wing. "Rhys will move from Australia to London in time for our pre-season which begins at the start of November as we prepare for the season ahead in the Championship.\"
I don't know if anyone would accuse you of being pro anorexia. That girl seems to be at a normalish weight (at least lower bodywise) and could be considered overweight by ridiculous Korean idol standards.
ISSUE: Axle assemblies having 10.25 inch ring gears are not being identified as having either a Ford or Dana design limited slip differential. ACTION: Identify the differential design for correct repair service procedure and part ordering. Refer to the following Service Tip for details. SERVICE TIP If after road or other test it is determined the limited slip differential may require service, check axle build date located on embossed metal identification tag bolted to rear axle cover. Prior to approximately 5/1/96, limited slip differentials used in the manufacture of 10.25 inch ring gear axle assemblies were of Dana design. Beginning approximately 5/1/96, Ford integrated the new Ford design limited slip differential concurrent with the Dana design in the manufacture of 10.25 inch ring gear axles. Identify as follows: Raise the vehicle on a hoist. Clean all dirt from the area of the rear axle cover. Refer to the 1996 F-Series Powertrain, Drivetrain Service Manual, Section 05-2A, for rear axle cover removal and installation. Place a drain pan under the axle and remove the axle housing cover bolts. Refer to the 1996 F-Series Powertrain, Drivetrain Service Manual, Section 05-02-C, for service details. Refer to the Parts Catalog if other parts are required for the Dana design differential. The Dana design limited slip differential assembly part number is E7TZ-4026-B. If the differential is of Ford design and new clutch packs are required, order Clutch Pack Kit F75Z-4947-AB. Refer to the Parts Catalog if other parts are required for servicing the Ford design differential. The Ford design limited slip differential assembly part number is F75Z-4026-DA. The 1997 F-Series Powertrain, Drivetrain Service Manual, Section 05-02B, shows disassembly/assembly procedures for the Ford design limited slip differential. While the procedures shown are correct, the illustrations show the Dana differential case which has radial ribs between the ring gear bolt holes. The Ford case (which should have been shown) flange is flat, and has a cast (raised) “10.25” and “Ford” oval insignia. In addition, the Traction-lok Clutch Gauge Tool (T97T-4946-AH) shown on Pages 05-02B-7 and 05-02B-10 is incorrect. The correct part number is T97T-4946-B. Refer to Figures 1 and 2 for Ford vs. Dana differential case identification and clutch gauge tool with correct part number.
Right now DS is using K12 for pre algebra. It is mostly review for him at this point but I worry about when new topics come up I won't be much help for him. I'm looking for a program that will explain the concepts to him and give him time to practice then review the answers if necessary. I also want it to be self paced so he can move on to the next lesson if he understands it quick or can spend extra time if needed. We're trying Life of Fred at theTrigonometry level this year with my oldest. It is supposed to be self-teaching and fun. They have books for elementary, middle school, high school, and college. I'll let you know how it goes._________________Many blessings, Susan Self-teaching will give positive result when it goes in right direction. Regular exercise and followup of subject required in self-teaching. But lack of attention distract the whole thing. So plz let us know the result how it is working.
Vegans needed to taste test new vegan Quorn products We’ve just received an interesting email from Solent Vegetarians and Vegans…. “All Quorn products currently available aren’t vegan since they contains eggs and sometimes milk, but Quorn Foods tell us that they have made a vegan version and they want vegans to try it and give their opinion on two different vegan quorn products. They’ve arranged with Allsorts Psychic Cafe (fully veggie cafe at 22 Carlton Place, Southampton, SO15 2DY) to provide a free food tasting next Saturday 21st June. You will be given a free meal, including some vegan quorn (nuggets I think) and a free drink. They will ask you questions about what you think of it, etc. Also, they will give you a small amount of money as a thankyou, around £5 I think. Ruth from Allsorts will be doing the cooking, and a few people from the market research organisation that Quorn have appointed will be there to quiz the people who take part in the trial. If you’re vegan and you’re sure you can make it, please email info@solentveg.org.uk saying roughly what time-slot you can be there for (10am – noon, noon – 2pm, or 2pm – 4pm). Allsorts is a small cafe which is why they’re trying to spread people out throughout the day, hence the time slots. Here’s a few facts and figures we’ve been told - They say that they’ve been working on a vegan version for the last three years, but have struggled to get the taste and texture right. They’ve recently had a breakthrough using potato protein, amongst other things, to replace the egg and milk. - They will have the full ingredients list at the tasting. - The vegan quorn will be made in the same factory as standard quorn, but will use a different production line and equipment, so the risk of contamination with eggs and milk is minimal.” Can you help us expand our Community Corner info library? We are seeking leaflets and posters on relevant issues, and donations of books to help us create our 'Rice Up Borrow Library'. Contact us or pop in to the shop for more information. Thank you! Check out our freezer section to see Amy's Kitchen Blackbean Enchiladas, the all new and improved Good Life Nut Burgers.
News & blog Video Conferencing For Business: A Beginner's Guide Thanks to technology, events don’t have to be held in just one geographical location any more. People can gather virtually, using screens, video cameras and phones to experience an engaging conference or meeting without having to shell out for costly plane, train or taxi fares or worry about where they are going to stay the night before. From conference calls to sales seminars; award ceremonies to product launches, video-conferencing sessions can replace the more traditional business get together very successfully indeed. What are the benefits? Once the initial outlay for equipment has been accounted for, video conferencing is much cheaper than arranging meetings in person. It can spread the message to more people, more quickly and efficiently too. It allows people to log in wherever is most convenient to them and to have all their paperwork and files to hand without needing to lug them halfway across the world. Video conferencing also opens up huge possibilities in terms of accessibility and helping colleagues with restricted mobility or other additional needs participate fully in proceedings. What are the downfalls? Capturing and maintaining peoples’ attention and interest can be harder when attempted virtually, as they will have other distractions around them, instead of being contained in one meeting room as a group. It can feel easier to pull out of attending the event at the last minute if no effort has been made to physically get there. Content must therefore be doubly compelling to keep people engaged and logged on. The equipment must be carefully checked too, as technological hiccups are more prone to happen during video conferencing, and it is most off-putting to be cut off, or have interference on the screen disturb the quality of the conference delivery. How to plan a video conference event When it comes to the pre-event admin, video conferences should be handled the same way as a traditional meeting with lots of notice given, invitations and agendas issued and reminders sent. Use all appropriate methods of contact open to you, such as email, phone, social media and ‘hard copy’ letters. You could offer incentives for delegates who agree to take part, such as prizes, preview clips or competitions on LinkedIn or via the company’s web page. Keep track of replies and chase up any outstanding ones. Don’t forget to send step-by-step instructions for how to join the video conference on the day. How to run things on the day First and foremost, you must ensure that the equipment works smoothly throughout. It is worth employing someone with the right level of expertise to focus solely on this element of the day. Try to have a back-up plan ready for the worst-case scenario of transmission failure. Keep people’s expectations realistic – make sure delegates know what they can simply listen to or watch, and how they can interact, e.g. via webcam, phone or via an internet chat facility. Make sure speakers are both loud and clear enough, and tell them to speak slightly slower than they would to a traditional meeting to allow time for the message to be transmitted and digested by their virtual audience. Try to have some eye contact with the camera so as not to alienate those not in the room. Schedule in regular comfort breaks, with clear instructions for when (and how) to return. Make sure the microphone and camera is switched off if you want to say or do something that you don’t want to be transmitted as part of the event. What happens afterwards? Another advantage of video conferencing is that you will normally have access to everything that took place in the form of a video recording. This can be edited and sent out to delegates and interested parties, such as the media, government policy makers or other key stakeholders. Don’t forget to thank people for participating and to seek feedback, both on the content and the technology involved. You could fix a time to hold a follow-up session for people to discuss the content of the video conference and make plans for future events.
Forgot Password Complete the information below to create a new password for your online account. Login User ID Date of Birth / / Card Expiration Date / Card Security Code Please enter the code shown below Maintaining the security of your password is your responsibility. No Customer Service Representative knows or can retrieve your password for you. Representatives will never ask you for your Online Account password. The Amscot Prepaid MasterCard is issued by MetaBank™, Member FDIC, pursuant to license by MasterCard International Incorporated. MasterCard is a registered trademark of MasterCard International Incorporated. Important information for opening a Card account: To help the federal government fight the funding of terrorism and money laundering activities, the USA PATRIOT Act requires all financial institutions and their third parties to obtain, verify, and record information that identifies each person who opens a Card account. What this means for you: When you open a Card account, we will ask for your name, address, date of birth, and other information that will allow us to identify you. We may also ask to see your driver’s license or other identifying documents.
Kristen Stewart on the People Who Critique Her Red Carpet Poses: “I Don’t Care About the Voracious, Starving Shit Eaters” “I have been criticized a lot for not looking perfect in every photograph,” Kristen Stewart tells Vanity Fair contributing editor Ingrid Sischy in July’s cover story. “I get some serious shit about it. I’m not embarrassed about it. I’m proud of it. If I took perfect pictures all the time, the people standing in the room with me, or on the carpet, would think, What an actress! What a faker! That thought embarrasses me so much that I look like shit in half my photos, and I don’t give a fuck. What matters to me is that the people in the room leave and say, ‘She was cool. She had a good time. She was honest.’ I don’t care about the voracious, starving shit eaters who want to turn truth into shit. Not that you can say that in Vanity Fair!” On top of battling personal reluctance, Stewart also struggles with the public’s preconceived notions about her personality. “People have decided how they are going to perceive her,” Robert Pattinson tells V.F. of Stewart. “No matter how many times she smiles, they’ll put in the one picture where she’s not smiling.” But for all her nose-thumbing at critics who demand perfection, she looks pretty perfect in the photographs from July’s Vanity Fair, in which she poses at locations across Paris in spring’s couture for contributing photographer Mario Testino. In some of the most glamorous photographs, Stewart wears haute couture at the ballet, posing with dancer Jérémie Bélingard in a pantless Jean Gaultier corset and dripping in Fabergé diamonds and emeralds, at right. Of her personal style, she tells us she’s evolved into loving wearing “some cool shit” from the world’s most respected and avant-garde designers, although she wasn’t always attuned to the power of fashion. “Look at a picture of me before I was 15. I am a boy. I wore my brother’s clothes, dude! Not like I cared that much, but I remember being made fun of because I wasn’t wearing Juicy jeans. I didn’t even think about it. I wore my gym clothes. But it’s not like I didn’t care that they made fun of me. It really bothered me. I remember this girl in sixth grade looked at me in gym and was like, ‘Oh my God! That’s disgusting—you don’t shave your legs!” Now past the initial sting of her harsh childhood critics, Stewart has developed into a wry and at-ease adult, and Sischy caught her in the mood for modest adventures—like when she takes the actress to a quiet, tucked-away table in the back of a Parisian seafood restaurant, where they are offered escargot, a dish that Stewart has never tried. After warily eyeing the snails, she dives right in—washing them down with white wine and bread—and says with a grin, “Pretty good. Though I just don’t want to eat a whole plate of them.” Of her life as a major star, she reflects on the moment when she realized that Twilight had changed her life. “You can Google my name and one of the first things that comes up is images of me sitting on my front porch smoking a pipe with my ex-boyfriend and my dog. It was [taken] the day the movie came out. I was no one. I was a kid. I had just turned 18. In [the tabloids] the next day it was like I was a delinquent slimy idiot, whereas I’m kind of a weirdo, creative Valley Girl who smokes pot. Big deal. But that changed my daily life instantly. I didn’t go out in my underwear anymore.” For her part, author Sischy sees “something so endearing, so human, about [Stewart’s] combination of bravado, kindness, self-preservation, self-assertion, and revved-up fierceness that I found her cheering. Of course, her idealism and drive to tell it as she sees it—the voracious, starving shit eaters be damned!–could be just a product of her youth. She could grow up to be another narcissistic snore, but my sense is that’s not in the cards here.”
You’re a legendary NFL quarterback, a Super Bowl winner, with a sea of fans wearing your No. 12 jersey. Your name is synonymous with the cold-weather East Coast market you represent. QB to the sports world, and GQ to the celebrity scene, you finish your illustrious career in the other conference and under the swaying palms in a sunny corner of the country. You’re Tom Brady. And Joe Namath. As Brady prepared Wednesday to leave New England for his new team, the Tampa Bay Buccaneers, Namath was at home in Southeastern Florida and could empathize with what the superstar quarterback likely was feeling. “For me, I felt very sad, very awkward about leaving the people in the city, the people in New York, the fans, the guys I made buddies with throughout the years,” said Namath, 76, recalling when he left the New York Jets after 12 seasons to finish his career with the Los Angeles Rams. Namath was one of three Super Bowl quarterbacks to speak to The Times about different aspects of Brady’s big transition. Joe Namath can relate to what Tom Brady will be going through when the long-time Patriots quarterback joins the Buccaneers. (Michael Owens / Getty Images) “If it hadn’t been for Chuck being there — maybe sort of like Bruce Arians being in Tampa Bay — I’m not sure I would have gone.” Joe Namath on Chuck Knox being head coach of Rams when he came to L.A. Brad Johnson, the only quarterback to hoist the Lombardi Trophy for the Buccaneers, discussed the transition — and excitement — that awaits the Patriots icon. Matt Hasselbeck, who was 40 in his final season with the Indianapolis Colts, understands the challenge of connecting with teammates who are nearly a generation younger. Brady will turn 43 in training camp. Four decades separate the Hall of Fame careers of Brady and Namath, and the game has changed on and off the field. For instance, whereas Brady has a chain of TB12 stores, Broadway Joe had the nightclub Bachelors III. “It was a different life when you were an athlete back in the ‘70s than it is today,” Namath said. “The support system from the organization today is like 24/7 as far as nutrition, training, all that stuff. The facility is almost open 24 hours a day to you. Back then, we had a normal routine of meetings, and, say, you’d spend four hours at the facility. The rest of the day you’d have studying or going out to socialize. It was a different life.” But Namath and Brady knew when it was time to leave the franchise they knew so well. And both left to play for teams coached by men steeped in Pennsylvania football. For Brady, that’s Buccaneers coach Bruce Arians, raised in York, Pa. And for Namath, the coach was Chuck Knox, who was born and raised in Sewickley, Pa. “Chuck and I first met when I was a junior high basketball player in Pennsylvania,” said Namath, who grew up in nearby Beaver Falls. “We maintained a relationship through the years and it was important. If it hadn’t been for Chuck being there — maybe sort of like Bruce Arians being in Tampa Bay — I’m not sure I would have gone. The relationship I had with Chuck was huge.” For Brady, getting comfortable in Tampa as quickly as possible is going to be key. That’s how Johnson sees it, having played for five different franchises in his 16-year NFL career. “The odd things for Tom will be, ‘Man, I’m wearing a different colored uniform. Where do I line up in the huddle? How do I get in the building? Where do I park? These shoes are different. Where do I live? How do I get to the game?’ ” Johnson said. Brad Johnson won a Super Bowl with Tampa Bay in the 2002-03 season. (Wally Skalij / Los Angeles Times) “Tom’s a great guy, and he’s going to make himself available to everybody, but it’s going to be awkward for him.” Brad Johnson, on Tom Brady adjusting to life in Tampa Bay. “I went through a move a few times in my career, and that’s what you need to get over real quick. He needs to get a media guide and find out who are the secretaries, who are the cooks, who are the equipment managers, who are the trainers? Just being comfortable. That’s the No. 1 thing.” Likewise, Johnson said, people in the Buccaneers facility are going to have to get used to having a world-famous celebrity walking their halls. Brady, the only quarterback to win six Super Bowl rings, is no ordinary player. “Everyone there is going to be star struck at some point,” Johnson said. “Like, ‘Here he comes.’ You can’t help it for someone coming in with that much weight. But Tom’s a great guy, and he’s going to make himself available to everybody, but it’s going to be awkward for him.” Arians is regarded by many as one of the all-time great quarterback coaches, but Brady is different than the ones under his tutelage in recent years — players such as Ben Roethlisberger, Andrew Luck, Carson Palmer, and Jameis Winston, each of whom took a beating standing in the pocket and slinging it down the field. “Tom’s a rhythm quarterback,” Johnson said. “He plants his feet, and that ball’s coming out.” That’s not to suggest Brady lacks toughness. In fact, he’s remarkably durable. “Playing quarterback, it’s like riding a bull in a rodeo; you’re going to get hit,” Johnson said. “That comes with it. But Tom’s pretty athletic in a weird way in the pocket. So he knows where his outlets are. He knows the weaknesses of protection schemes and being able to get into a better play. Trying not to waste plays. That’s why he’s lasted so long. He really hasn’t missed games.” Johnson said Brady will supercharge the Buccaneers fan base the way that Jon Gruden did when he arrived as coach in 2002 and promptly won a Super Bowl. “I remember when Gruden came to town,” he said. “That flag got raised. The excitement was there immediately.” After news broke Tuesday that Brady was headed to Tampa, ticket sales spiked. The virtual line to buy tickets on the team’s website was more than 6,000 people long. But fan interest in the Buccaneers has risen and fallen dramatically over the years. Tampa isn’t Green Bay or Cleveland, where ticket sales aren’t so dependent on the team’s performance. In that respect, it’s not always sunny in Tampa. “When you win, they cheer,” Johnson said. “When you lose, they boo.” Judging by his history, Brady is unwavering in his approach to the game. But in many ways, he’ll have to be flexible in his new environment. “He’s like ‘The Terminator’ now,” Johnson said. “This is the way he’s done it. This is his schedule. This is the way [Patriots coach] Bill Belichick presented Mondays and Wednesday mornings, and how they did the installations. It’s going to be different. He’s going to be, ‘Well, why are we doing it this way?’ Some of the things aren’t going to make sense to him. “To be able to deal with change, that’s the huge element.” Some changes are inevitable no matter where you are. Brady for years has said he wants to play until he’s 45, but every year a new wave of players in their early 20s comes in. That age gap only grows, and outside interests and obligations change. Matt Hasselbeck played 10 seasons in Seattle, and led the Seahawks to a Super Bowl, but also played for Green Bay, Tennessee and Indianapolis. (Scott Cohen / US Presswire) “You’re real people, and these are real decisions based on more than Xs and O’s.” Matt Hasselbeck, on family issues when players decide to switch teams “As you get older and you’re in your 40s, your kids are getting older too,” said Hasselbeck, who played 17 seasons — including reaching a Super Bowl with Seattle — and now is an ESPN analyst. “It almost becomes a family decision. Obviously, your wife is very involved in whatever decision, I don’t care what business you’re in. But as your kids are getting older, getting to the point where maybe they’re playing organized sports, or having an opinion. “I remember my last year, I had an eighth grader. We were making decisions like, ‘OK, what sports are you good at? Where are we going to go to high school?’ I had two hockey players and three lacrosse players. You can’t do that everywhere.” Brady is the same way. The fact his wife and children live in Manhattan factored into his team choice, and is believed to be one of the reasons he turned down the Chargers. “Sometimes in the media or as fans, we talk about these players as if it’s fantasy football,” Hasselbeck said. “We forget about parents and grandparents, being close to family, and whatever those things are that appeal to some of these players. “You’re real people, and these are real decisions based on more than Xs and O’s.” And that generation gap is real too. “In my last three years in Indy, Andrew Luck came over to my house,” Hasselbeck said. “It was the first time he came over. The adults were in the kitchen and the kids were in the family room. Andrew was in the family room more than he was in the kitchen. I made a joke, like, ‘Hey, why don’t you come hang out with the adults?’ “He clipped back at me in a real witty way, ‘The people in here are closer to my age than you are.’ And I did the math and thought, ‘Wait a second, that’s true.’ ” Then again, Brady is seemingly ageless. That’s why Namath predicts a lot of smiling faces among the fans of the three AFC East teams that had to face Brady twice a season. “Fans that grew to be Patriot haters because they were so successful over the years,” he said. “Those kinds of fans are more than likely all happy to see Tom get out of there, get away from that Patriot uniform.”
Jason's Bus Ride Written by Harriet Ziefert • Illustrated by Simms Taback Reviewed by Colin C. (age 8) This story is about a boy named Jason that went on a bus ride and the bus goes through town. The dog got in the way of the bus and it did not move. Everybody on the bus tried to move the dog but it would not move. Jason got out of the bus and patted the dog on the head and the dog moved. I like this book because there a colorful pictures and it was funny because the dog didn't move. Everybody tried to move the dog but the dog didn't move until Jason patted it on the head. My favorite part was when the dog didn't move and when Jason patted the dog on the head and it moved. It was my favorite part because the dog wagged its tail and moved. This story reminded me about when five deer crossed the road in front of our truck. The fifth deer came and we didn't know it was coming and we ran into it. We stopped and we got out and the deer was still moving and we had to move it out of our way. I would recommend this book because people on the bus worked together to solve a silly problem. I think that kindergarten students would enjoy this book. I think they would like the pictures and the story.
Body cameras implemented at county jail Monday Nov 26, 2018 at 12:01 AMNov 26, 2018 at 9:00 PM ASHEBORO — Body cameras for on-duty detention officers have officially been implemented at the Randolph County Jail. The detention center is the first division of the Randolph County Sheriff’s Office to receive the body cameras, and the second law enforcement agency in the county. The Liberty Police Department is the only other agency to arm its officers with the technology. “It’s a big topic in law enforcement now — the body cameras,” Major Chris Toriello, who oversees the jail, said. According to Toriello, through research and talking with other detention centers that have introduced body cameras, the Sheriff’s Office decided to contact Axon Enterprise Inc., the company through which their tasers are provided, in order to conduct a trial run with the body cameras in April. “They left them with us for a month and we put it on two of our officers that are actively working,” Toriello said, “and immediately the officers came back after using and said that just the mere presence of it was having a more secure effect for the officer.” Following the success of the trial run, officials at the jail knew they wanted to continue to have access to the cameras. Sheriff Robert Graves went before the county commissioners in July in order to request approval for the purchase of 20 body cameras and the necessary storage. The memo from the July 9 County Commissioners meeting states: “I am here today to request the expenditure of $74,009 in law enforcement restricted funds. The funds will be used to lease body cameras for our Detention Officers.” The sheriff’s request was approved, and on Nov. 8, a representative from Axon visited the jail in order to train staff. The detention officers were taught how to use the cameras, and the administrative staff learned how to log in and access the system in order to review and document evidence. How do they work? “A full shift has 13 personnel on the shift,” Toriello explained. “That’s a lieutenant, sergeant, corporal and then the detention officers. So all 10 detention officers will have (a body camera) on the day shift and then when they come in to report, or to check out, the incoming shift takes the extra 10 that are in the loading docks and uses those. “The other cameras — as soon as they’re put in the docking station — automatically download all the content to our system … and then they’re fully charged.” When an officer is wearing a body camera, the camera is constantly buffering, but recordings aren’t saved unless the camera is turned on. The previous 30 seconds of buffering are automatically saved with the video, allowing an officer to add to the video 30 seconds of what led to an event. Thirty seconds are also recorded after the officer manually stops the device from recording. “So, besides the added cameras that we have hard-mounted in our pods and around the facility, these are audio and video and it gives a different perspective. It gives the perspective of the officer,” Toriello said. The footage downloaded from the cameras at the end of each shift can be used as evidence if an incident warrants charges be filed, or if clarification of what happened is needed. “We — as administrators — will go in and dismiss what we don’t need to keep, that way we keep the storage free. If there’s an incident and an incident report has happened, we get those reports, so we’ll know about the date and time that something may have happened, and was recorded, and we can go back and capture it and put it in an actual case file. “When things happen, you might not see or hear everything,” Toriello said, “… but you can go back and reflect upon what you heard and saw to refresh your memory. … When things are happening, sometimes we can get focused on one and the camera can pick up other things.” Reaction from inmates The impact that the presence of the recording devices have on the attitude of the inmates is one reason for the decision to go through with the purchase of the body cameras. “The inmates will pick up on anything new or different and immediately the inmates knew that this was a recording device,” Toriello said. “The positive response we like to hear is that they don’t really like to talk to the officers because they feel like they’re constantly being recorded. So that’s kind of two-fold.” According to Toriello, interaction between the inmates and the detention officers is important. There needs to be a communication between the two parties for a successful working relationship. The inmates who stay quiet in the presence of the body cameras are inmates who were saying things they shouldn’t have. “For the ones who choose not to talk as much, maybe they were using vulgarities, maybe they weren’t treating others with respect,” Toriello said. He says affrays and arguments will always still happen in jails, but that the cameras are instrumental is either putting a stop to conflict or capturing it so that the incident is well documented. The future The contract between Axon and the Randolph County Jail lasts for three years. After that, the contract will need to be renewed in order to continue the use of the cloud memory storage system. Though the full impact of the implentation of the body cameras has likely yet to be realized, Toriello hopes that the jail’s success with the body cameras will be influential and result in greater access to the cameras within Randolph County law enforcement. The body cameras have proved their value at the jail, and Toriello thinks they could prove to be just as useful for patrol officers. “My hope is that the cameras do so well here that other divisions and agencies can get them,” he said. Never miss a story Choose the plan that's right for you. Digital access or digital and print delivery.
As of Sept. 22nd there are only 20 spaces still available...Register Today to secure your spot! General Information The Midwest Partners in Preparedness Conference will bring together emergency management and disability stakeholders from states throughout the Midwest to discuss the latest issues in preparing and responding to disability communities during emergencies and disasters. This day and a half conference is hosted by enableUS and the Community Emergency Preparedness Information Network (CEPIN) and will examine some of the greatest challenges that emergency management and disability communities face when responding to disasters and emergencies. The conference will focus on new FEMA sheltering guidelines, regional issues such as ice storms, flooding and tornados as well as the effectiveness of special needs registries, information sharing networks and accessible communications. Speakers from national, state and local government agencies and organizations will focus on programs that have worked in their communities as well as continued shortfalls and challenges that they experience. Through networking breaks between each phase, attendees will have the opportunity to interact with speakers and other attendees to exchange information about best practices and share personal experiences fostering an environment of cooperation and education. Conference Location A room block has been reserved for this event of $110 a night, to reserve your room please contact the Drury Plaza Hotel at 1-800-378-7946 and mention the "Group Code: 2085343" The room block has expired, rooms at the $110 may still be available but attendees must call the hotel directly and mention the group code! Sponsors and Partners Interested in showcasing your products and solutions to an audience of government agency decision makers? Budget-conscious sponsorship packages are available for this conference. Click here for a sponsorship package or contact Brian Lake 703-894-7414 for further information.
#ifndef PARDENSEMATRIX_H #define PARDENSEMATRIX_H #include "MatrixDef.h" #include "DenseMatrix.h" #include "DenseVector.h" #include "MPI_Wrappers.h" #include "ATC_Error.h" using ATC::ATC_Error; #include <algorithm> #include <sstream> namespace ATC_matrix { /** * @class ParDenseMatrix * @brief Parallelized version of DenseMatrix class. */ template <typename T> class ParDenseMatrix : public DenseMatrix<T> { public: MPI_Comm _comm; ParDenseMatrix(MPI_Comm comm, INDEX rows=0, INDEX cols=0, bool z=1) : DenseMatrix<T>(rows, cols, z), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const DenseMatrix<T>& c) : DenseMatrix<T>(c), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const SparseMatrix<T>& c) : DenseMatrix<T>(c), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const Matrix<T>& c) : DenseMatrix<T>(c), _comm(comm) {} ////////////////////////////////////////////////////////////////////////////// //* performs a matrix-vector multiply void ParMultMv(const Vector<T> &v, DenseVector<T> &c, const bool At, T a, T b) { // We can't generically support parallel multiplication because the data // types must be specified when using MPI MultMv(*this, v, c, At, a, b); } }; template<> class ParDenseMatrix<double> : public DenseMatrix<double> { public: MPI_Comm _comm; ParDenseMatrix(MPI_Comm comm, INDEX rows=0, INDEX cols=0, bool z=1) : DenseMatrix<double>(rows, cols, z), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const DenseMatrix<double>& c) : DenseMatrix<double>(c), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const SparseMatrix<double>& c) : DenseMatrix<double>(c), _comm(comm) {} ParDenseMatrix(MPI_Comm comm, const Matrix<double>& c) : DenseMatrix<double>(c), _comm(comm) {} void ParMultMv(const Vector<double> &v, DenseVector<double> &c, const bool At, double a, double b) const { // We don't support parallel vec-Mat multiplication yet if (At) { MultMv(*this, v, c, At, a, b); return; } const INDEX nRows = this->nRows(); const INDEX nCols = this->nCols(); if (c.size() != nRows) { c.resize(nRows); // set size of C c.zero(); // do not add result to C } else c *= b; // Determine how many rows will be handled on each processor int nProcs = MPI_Wrappers::size(_comm); int myRank = MPI_Wrappers::rank(_comm); int *majorCounts = new int[nProcs]; int *offsets = new int[nProcs]; #ifdef COL_STORAGE // Column-major storage int nMajor = nCols; int nMinor = nRows; int ParDenseMatrix::*majorField = &ParDenseMatrix::_nCols; int ParDenseMatrix::*minorField = &ParDenseMatrix::_nRows; #else // Row-major storage int nMajor = nRows; int nMinor = nCols; int ParDenseMatrix::*majorField = &ParDenseMatrix::_nRows; int ParDenseMatrix::*minorField = &ParDenseMatrix::_nCols; #endif for (int i = 0; i < nProcs; i++) { // If we have an uneven row-or-col/processors number, or too few rows // or cols, some processors will need to receive fewer rows/cols. offsets[i] = (i * nMajor) / nProcs; majorCounts[i] = (((i + 1) * nMajor) / nProcs) - offsets[i]; } int myNMajor = majorCounts[myRank]; int myMajorOffset = offsets[myRank]; // Take data from an offset version of A ParDenseMatrix<double> A_local(_comm); A_local._data = this->_data + myMajorOffset * nMinor; A_local.*majorField = myNMajor; A_local.*minorField = nMinor; #ifdef COL_STORAGE // Column-major storage // When splitting by columns, we split the vector as well, and sum the // results. DenseVector<double> v_local(myNMajor); for (int i = 0; i < myNMajor; i++) v_local(i) = v(myMajorOffset + i); // Store results in a local vector DenseVector<double> c_local = A_local * v_local; // Sum all vectors onto each processor MPI_Wrappers::allsum(_comm, c_local.ptr(), c.ptr(), c_local.size()); #else // Row-major storage // When splitting by rows, we use the whole vector and concatenate the // results. // Store results in a small local vector DenseVector<double> c_local(myNMajor); for (int i = 0; i < myNMajor; i++) c_local(i) = c(myMajorOffset + i); MultMv(A_local, v, c_local, At, a, b); // Gather the results onto each processor allgatherv(_comm, c_local.ptr(), c_local.size(), c.ptr(), majorCounts, offsets); #endif // Clear out the local matrix's pointer so we don't double-free A_local._data = nullptr; delete [] majorCounts; delete [] offsets; } }; // Operator for dense Matrix - dense vector product template<typename T> DenseVector<T> operator*(const ParDenseMatrix<T> &A, const Vector<T> &b) { DenseVector<T> c; A.ParMultMv(b, c, 0, 1.0, 0.0); return c; } } // end namespace #endif
Thursday, 15 January 2009 TORIES ABSTAIN ON EQUAL TREATMENT AT WORK MEPs today voted on a Report on the implementation of Directive 2002/73/EC, a Directive on putting into practice the principle of equal treatment for men and women as regards access to employment, vocational training and promotion, and working conditions. Written by Spanish Socialist Teresa Riera Madurell, the report concerns the implementation of the Directive rather than any policy change. The UK has, in fact, done all it should and fully implemented the terms of the Directive. Strange indeed then that nearly all Tories voted as a bloc and abstained on the final vote to accept the Report. Those who abstained were: By abstaining, the Tories have again broken with the EPP (the centre-right group in the European Parliament to which the Tories loosely belong). The first draft of Theresa Madurell's Report was objected to by the EPP who tabled many amendments which watered it down. However, in the end, true to the spirit of European compromise the EPP, PSE (Socialists), ALDE (Liberals) and the Greens came together to propose a jointly amended text. All of these parties therefore voted in favour of the report - with the not so honourable exception of the British Tories. It will, of course, come as no surprise that UKIP Members Bloom, Clark and Farage together with the far right, including father and daughter Le Pen, voted against the Madurell Report. The Tories are certainly keeping interesting company these days.
"God comes to us in a thousand different forms, each one perfectly adapted to the individual." 3 "Woudst thou know my meaning? Lie down in the Fire….See and taste the flowing godhead through thy being." Mechtild of Magdeburg 4 "All living forms – an angel created, witnessed, gone; a dog, a horse, a tree, an old man or a little child, births and deaths, creation and dissolution, the rivers and the ocean beds, Christ and Krishna, volcanos and earthquakes, an absence and a fullness, saints and devils – All are composed of the fire of love. God taking form." 5 "There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is." Albert Einstein 6 "If you love a being for his beauty you love none other than God, for he is the Beautiful Being." Ibn Al-Arabi 7 "I saw that everything was perfect, and all was composed of love." 8 "All types of meditation…lead to the same golden center, for at the mystical level all religions have more in common than they differ, and all derive from the same source and long for the same goal." 9 "All is divine, every atom, every particle of light, singing wildly in its joy….Everything is alive with praise!" 10 "I have come around full circle and think I didn't need to look for God; He was staring me in the face….I was looking everywhere but in the right place. The face of God. It swims in the heat of a summer day. It glistens in the icy rainbows glittering off the frozen limbs of winter trees. In the rain. In the sky. In a clod of dirt." 11 "The Divine Mother revealed to me that…it was she who had become everything…that everything was full of consciousness. The image was consciousness, the altar was consciousness…the door-sills were consciousness… I found everything in the room soaked as it were in bliss – the bliss of God… That was why I fed a cat with the food that was to be offered to the Divine Mother. I clearly perceived that all this WAS the Divine Mother – even the cat." Sri Ramakrishna, 19th century Hindu saint 12 "The son of Pandu (Arjuna) beheld the entire universe in all its multitudinous diversity, lodged as one being within the body of the God of gods." Bhagavad Gita 11:11 13 "This urge to see God must run deep in us. 'What I have been striving and pining to achieve these thirty years', wrote Mahatma Gandhi, 'is to see God face to face.'"
The open wounds of Iran’s Khuzestan The ancient city of Susa in Khuzestan Known as one of Iran’s most polluted provinces, southwestern Iranian province of Khuzestan, bordering with Iraq and the Persian Gulf, encompasses a collection of contrasting social mores, different ethnic minorities and an appetizing wealth of natural resources, especially oil, making it one of the provinces on which the national economy largely depends on. Having mainly visited tourist places such as Isfahan, Yazd or Tehran itself, as soon as we crossed the imaginary line dividing Khuzestan province from Lorestan I felt it was a different world. Home to a large Arab Iranian community (its previous name was Arabestan), this was the only place where I saw women fully covering their face, even though in Iran it’s illegal. With the earliest settlements believed to date back to 6000 BC and the first urban centers to 4000 BC, Khuzestan was the heart of the Elamite empire that established its capital in Susa, ancient city today enlisted among the UNESCO world heritage sites. As it often happens when I explore places that are new to me, an ancient historical site defined my first form of communication with the province of Khuzestan, relation that I’m still processing as it has by all means been the most difficult region of my Iranian journey so far. Chogha Zanbil An expansive panorama of distinctive historical layers offers the best introduction to a province that locals like to describe as the cradle of Iranian civilization where it all started, even though this is a record every Iranian province claims. Bearing the relics and vibe of the country’s different periods and cultures including the Parthians and the Persians, Susa consists of archaeological remains of urban structures and buildings, some of which have been identified as the palaces of Achaemenid kings Darius and Artaxerxes, and the Ardeshir’s palace. Susa is not the only UNESCO-listed site Khuzestan boasts, and the nearby ancient city of Chogha Zanbil, originally Dur Untashi, built in 1250 BC under Elamite ruler Untash-Gal is another claim to fame locals cling onto to defend their status of regional founders and creators. A stormy past of conquests, mutual invasions, wars and countless battles outlines the history of the region, and in Khuzestan probably more than other provinces, you can sense the flavor of turbulence. Truth be said, the proximity to Iraq, referred to as Karbala (کربلا) on the road signs for the not-so-remote Iraq Iran war, very much alive in people’s memories and talks, does play a role in forging this obstreperous character. “I can never forget the times of war,” told me Zohreh, a tour guide in Khuzestan, still cringing with anxiety at the mere thoughts of it. “I was in high school and one morning, Iraqi shelling on my village blocked the door of my classroom preventing us from leaving. I thought this was the end, we hid behind a wall and waited for a miracle. When the miracle arrived and someone opened the door we rushed outside just to see the mangled bodies of kindergarten children, main victims of that tragic morning, their bodies in pieces scattered all around the playground. I still have nightmares.” Barbed wire at the border with Iraq “My uncle is a martyr of the Iraq Iran war,” added Ali, young Arab Iranian who welcomed us in his family’s mozif in Bardiyeh village, a traditional hut-like structure where families receive their guests with the inevitable cup of tea. When Saddam invaded Iran in 1980, he was hoping he could count on tribal solidarity to push the Arab Iranians to join the fight by his side and turn their back to the regime of the newly established Islamic Republic. It didn’t take long, though, for him to understand that he had counted his chickens before they were hatched. The Arabs on this side of the border showed unequivocally their position, defending their own country from the Iraqis, become foreign all of a sudden, by volunteering with a makeshift war strategy even before the Iranian army recruited them. Similarly, Saddam showed little to no ethnic sympathy, and in less than no time, the Iraqi army started bulldozing flat entire cities in Khuzestan to allow a better further view, and bombing and contaminating the area with mines and deadly chemical weapons. The outcome was twofold: a soaring resentment against the neighboring Arab country and a tighter consent of Iranians around the fatherly figure of Imam Khomeini. Every family in Khuzestan counts one or more relatives among the war casualties, their wounds far from being healed. Having tea at an Arab mozif in Bardiyeh village Proudly speaking Arabic, women ambling about in their abayah (loose full-length garment usually black) or sometimes niqab (abayah but with face covered), men with a keffiyeh, typical Arabs’ head cover, both Shushtar and Ahvaz gave me a different vibe than what I had previously experienced in other Iranian cities. From a rumor of hostility towards tourists that during our stay didn’t prove to be true, to an almost exclusive men’s presence in day and night open markets, to being quite stared at especially after they realized I wasn’t Iranian, our adventure did feel more challenging than the usual tourist trail. At Shushtar local market Although I hadn’t planned it, I happened there right before Arbaeen, the ceremony Shia Muslims attend in Karbala to commemorate the martyrdom of Imam Husayn grandson of Prophet Muhammad in 680 AD, after forty days of mourning and grief celebrations started with Ashura, the tenth day of Muharram. Iranian pilgrims reach Karbala on foot every year, and the closer we got to the border, the more pilgrims we ran across, the more cups of tea we were offered at the several temporary mozifs arranged on the side of the road to provide refreshment and rest for the travelers. Decorations at the makeshift service station for pilgrims going to Karbala Iranian pilgrims going to Karbala for Arbaeen An intriguing sequence of mourning ceremonies, songs, prayers, whimsical plays even, were the main features that welcomed me in Khuzestan, one of the most conservative areas I’ve been to while journeying an already pretty conservative Iran. A sense of roots and belonging, a strong religious spirit that permeates the air wherever you are, a plethora of conflicting microcosms and layers of social expectations make this a challenging province, not really for me that I was quickly passing by but especially for the Iranian leadership whose duty is to meet the country’s diverse needs and demands. Tea, music and plays reproducing the martyrdom of Imam Husayn in Karbala “We are all Arabs, we are all brothers,” was Ali’s response when I asked him if they felt resentful towards the Iraqis living just a stone’s throw away and that not so long ago waged war to the same people today share tea and prayers with. Some don’t understand him, others do, it’s hard for sure to chit-chat with the same people whose bombs twenty years ago killed your little brother, but “what can we do?” they retort. This is one of those moments when whatever you say is wrong, so the best thing you can do is limit yourself to listen, whether you understand or not, you approve or not. The only thought everyone shares and agrees on is always the same, the absurdity of war that no one likes and no one wants. Chasing The Unexpected is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com, Amazon.co.uk, Amazon.fr, Amazon.de, Amazon.it, Amazon.es. We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
first-rate point here in the post, writing Monster Muscle X is simply huge, thank you for the post.My friend, you did this very very well. Thumbs up.Many thanks for posting this, It?s just what I used to be researching for on bing. I?d a lot relatively hear opinions from an individual, slightly than.For more ==== >>>>>> http://guidemesupplements.com/monster-muscle-x/ Neurorise is wearing the power along with the immune protection system to reduce stress. New reports uncover meditation as good for mind health also. Such studies show that relaxation can actually thicken the brain's cortex. This aids concentration, memory and emphasis. Ironically this means we must exercise of letting go of feelings to be able to think better towards not contemplating at-all the method. http://blackdiamondskinserumsite.com/neurorise/ Let a secret is shared by me with you-not anything you learn about on the internet is not false. Needless to say that can also imply that the above assertion is not true which then translates to the Instant Lifting Cream fact this total post can be a scam. In either case, feel free to interpret it however, you see fit. Here are some myths that I identified and Instant Lifting Cream have researched to become really wanting. On this page I will separate and yourselves and the sweetness details.>>>>> http://svelmeblog.com/instant-lifting-cream/ For more information on Test Boost Elite our site visit with. On our site we shall even have numerous rankings of diverse type of division chain amino acids. We pre work out division chain proteins and will rank the top post-work out. We will also have what we consider to be the highest quality protein grains which contain Test Boost Elite good quality division chain proteins. http://testrx360site.com/test-boost-elite/
Pages Jun 19, 2012 I will not grow weary..... I will not grow weary....I will not grow weary....I will NOT grow weary... These are the words I repeat over and over.... Every minute,every second..... Breathe................. It's in the waiting I tend to go from one extreme to the other. It's in the waiting I find at times I am unbalanced. I want the happy medium, the place where I see my natural circumstances but walk so strong in faith that I see the other side before I even reach it. I find that I stand strong in the beginning, push harder than I ever had before, run like no tomorrow...... And then it happens.... I allow my flesh to get weary and spill over to my spiritual.... So glad my daddy God understands me....... ~sigh~ Galatians 6:9 : "So let's not get tired of doing what is good. At just the right time we will reap a harvest of blessing if we don't give up" We all have walls to climb, hurdles to jump and mountains to conquer in life. I can remember when my youngest daughter ran track. There she was on the last leg of the race, her counter part hands her the baton , and off she goes. Her team was a little behind and it appeared they were going to place second, however when she turned the corner, there we moms were, yelling and cheering her on. "Kick it up!" ....... "Turn it on Chels!!" "Push hard Chels, You got this!!" And many, many more cheers came from the stands. She was tired, this was her fourth event, and she had grown "weary". However with arms pumping, legs pushing, and a look of victory on her face, she pushed her way to the finish line and her team took first place! She and the rest of her team conquered their mountain on that track that day. Whether our mountain is a financial crisis, healing for a loved one, restoration for a relationship, our children walking a path not intended for them, a job, a spouse, a new project, a new season, or a new ministry. Do not grow weary....Do no give up!!! Time for us all to "Kick it up!!" Our blessings and break through are coming, God's word tells us to continue to do good....("Press in and press forward") We will reap a harvest of blessings :) As I remind myself to continue to press in and not grow weary, I encourage you all to continue to push, climb, run, jump, or walk to get to your intend blessing your Daddy God has waiting. 2 comments: I needed to read this too! Thank you for the encouragement. I go from one extreme to the next as well, pushing hard one minute then tired and weary the next, I wish I could stay balanced from beginning to end :) So glad He understands me too About Us Best friends since the age of 11 and soul sisters for life. A kindred spirit that God knitted together to bring hope and love to those who feel unworthy and unlovable. To share our life stories and the grace of God in each and every season we have walked.
# Application to the Class of 2020🎓 This pull request template helps you complete an application to the **Class of 2020**. Use the checklist below to verify you have followed the instructions correctly. ## Checklist ✅ - [ ] I have read the instructions on the README file before submitting my application. - [ ] I made my submission by creating a folder on the `_data` folder and followed the naming convention mentioned in the instructions (`<username>`), added my profile picture and markdown file. - [ ] I have used the Markdown file template to add my information to the Year Book. - [ ] I understand that a reviewer will merge my pull request after examining it or ask for changes in case needed. - [ ] I understand I should not tag or add a reviewer to this Pull Request. - [ ] I understand the photo added to the template will be used in the ceremony "Graduate Walk". - [ ] I have [added the event](http://www.google.com/calendar/event?action=TEMPLATE&dates=20200615T160000Z%2F20200615T183000Z&text=%24%20git%20remote%20%3Cgraduation%3E%20%F0%9F%8E%93&location=https%3A%2F%2Fwww.twitch.tv%2Fgithubeducation&details=) to my Calendar.
Penang Prawn Noodle at Kent’s Garden Talking about prawn Mee or Har Mee, it’s a popular food in Penang. This dish is what I used to eat as my dinner during weekends when I was on the way to Lutong in Miri. In Kent’s Garden Miri, you can find it. What really makes this a great bowl of hot & spicy soup instead of the noodles is the combinations of ingredients, inside there are hard boiled egg slices, spinach or Ong Choi, juicy prawns, fried toufu fish and of course with chilli sprinkled on top! The taste is just like Ibumie Har Mee product you will find in the market.
The Colorado Mammoth secured its first victory of the season during an 8-7 overtime win while playing spoiler to the Calgary Roughnecks’ championship celebrations as the 2018-19 NLL league victors raised its championship banner Saturday night. The evening featured a scrappy, defensive battle and was headlined by career-first goals for forwards Will Malcom and Dylan Kinnear and Calgary native Brett Craig. Calgary got off to a quick start when Curtis Dickson converted a shot from just inside the restriction line to open the scoring for the Roughnecks less than two minutes into the first period before Tyler Pace added a second goal three minutes later. Jacob Ruest got the Mammoth on the board with six minutes to play in the first by converting a precise feed from Chris Wardle past the right leg of Roughnecks goaltender Christian Del Bianco. Dan Taylor increased Calgary’s lead to 3-1 with a late first quarter power-play conversion by diving into the crease and beating Dillon Ward. Will Malcom sparked an offensive second quarter for the Mammoth by netting his first career goal at the 11:37 mark to bring Colorado back within one. Just over two minutes later, Malcom logged his second career marker with a quick strike from the right side to tie the game at 3-3. “It was a great feeling to get my first one and I’m glad I was able to help out the team,” said rookie forward Will Malcom, reflecting on his first NLL goal. “We did a great job tonight taking the game shift-by-shift and staying active at both ends of the floor. We have a good amount of speed on the squad, so we’ll look to continue using that to our advantage next week in Georgia.” Jacob Ruest established Colorado’s first lead of the contest with six minutes left in the second quarter by converting a rebound from a Ryan Lee shot for his second goal of the evening and team-high fifth goal. Dylan Kinnear kept the momentum in favor of Colorado after receiving a behind-the-back pass from Chris Wardle and blindly chucking the ball on net as he fell to the ground for the no-look conversion. Roughnecks forward Marshall King brought Calgary back within a goal near the end of the second quarter after a quick pump fake and conversion over Ward’s left shoulder as physical tendencies continued to escalate on the turf as the half came to an end. Colorado headed to the locker room with a combined five goals and nine assists on 20 shots. Roughnecks defenseman Eli Salama provided the lone third quarter goal with a speedy shot to beat Dillon Ward and tie the game at 5-5. Solid goaltending and defensive spacing were key for both teams, as the third period came to an end with only one goal allowed. Brett Craig re-established Colorado’s lead five minutes into the fourth quarter with his first career goal by streaking down the field on a breakaway and bouncing a low, spinning shot past Calgary’s Christian Del Bianco to make the contest 6-5 in favor of the Mammoth. Marshall King logged his second goal of the game less than three minutes later to knot the game at 6-6 with seven minutes in regulation remaining. After holding the ball and surveying his options, Kyle Killen converted a diving goal from behind Del Bianco’s crease at the 10:08 mark before Calgary’s Dan Taylor provided yet another equalizer less than 30 seconds later to force overtime. Following seven minutes of an intense, high-energy overtime session, Jordan Gilles scooped up a loose ball and sprinted down the field before providing the game-winning goal on a breakaway conversion past Del Bianco on the right side of the net. The 8-7 overtime victory against the divisional opponent Roughnecks marks Colorado’s first road trip and first win for the 2019-20 campaign, bringing the team to a 1-1 record. Led by Dillon Ward’s 46 saves, the goaltender picked up his first win of the season and has registered 100 total saves in his first two games, which ranks second in the league (Del Bianco ranks first with 104.) “After dropping our first game by one goal, we wanted to come out and secure a win before the holidays – I think we executed our game plan and we got a good bounce at the end,” goaltender Dillon Ward said following the Mammoth’s road victory. “I love how composed and confident our defense is playing right now – We’ve established a core defensively and have built around these guys and I think we’re going to do some great things this year defensively.” Through two games, the competitive West Division boasts four teams with 1-1 records while the San Diego Seals sit at 0-2 through four weeks of league play. Colorado will look to continue its consistent defensive efforts as the Mammoth travel to Georgia to face off with the Swarm at Infinite Energy Arena Dec. 28. Through two contests, forward Jacob Ruest leads the Mammoth in goals (5) and points (7) as Eli McLaughlin continues to pace Colorado players with four assists. Robert Hope’s 22 loose balls ties him for first overall in the league alongside San Diego’s Kyle Rubisch. Tickets to Colorado’s Jan. 4 matchup against the Vancouver Warriors and all Mammoth home games can be purchased at AltitudeTickets.com. Mammoth road games can be streamed live via Bleacher Report Live.
// +build acceptance package k8s import ( "fmt" "testing" "github.com/kyma-project/kyma/tests/console-backend-service/internal/domain/shared/auth" "github.com/kyma-project/kyma/tests/console-backend-service/internal/graphql" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) type selfSubjectRulesQueryResponse struct { SelfSubjectRules []*selfSubjectRule `json:"selfSubjectRules"` } type selfSubjectRule struct { Verbs []string `json:"verbs"` APIGroups []string `json:"apiGroups"` Resources []string `json:"resources"` } func TestSelfSubjectRules(t *testing.T) { c, err := graphql.New() require.NoError(t, err) t.Log("Querying for SelfSubjectRules...") var selfSubjectRulesRes selfSubjectRulesQueryResponse err = c.Do(fixSelfSubjectRulesQuery(), &selfSubjectRulesRes) require.NoError(t, err) assert.True(t, len(selfSubjectRulesRes.SelfSubjectRules) > 0) err = c.Do(fixNamespacedSelfSubjectRulesQuery("foo"), &selfSubjectRulesRes) require.NoError(t, err) assert.True(t, len(selfSubjectRulesRes.SelfSubjectRules) > 0) t.Log("Checking authorization directives...") ops := &auth.OperationsInput{ auth.CreateSelfSubjectRulesReview: {fixSelfSubjectRulesQuery(), fixNamespacedSelfSubjectRulesQuery("foo")}, } AuthSuite.Run(t, ops) } func fixSelfSubjectRulesQuery() *graphql.Request { query := fmt.Sprintf( `query { selfSubjectRules { verbs resources apiGroups } }`) return graphql.NewRequest(query) } func fixNamespacedSelfSubjectRulesQuery(namespace string) *graphql.Request { query := fmt.Sprintf( `query ($namespace: String){ selfSubjectRules (namespace: $namespace){ verbs resources apiGroups } }`) req := graphql.NewRequest(query) req.SetVar("namespace", namespace) return req }
NOTICE: Pre-applications submitted in response to this Funding Opportunity Announcement (FOA) for Federal assistance must be submitted electronically through Grants.gov (http://www.grants.gov) using the SF424 Research and Related (R&R) forms and the SF424 (R&R) Application Guide. APPLICATIONS MAY NOT BE SUBMITTED IN PAPER FORMAT. This FOA must be read in conjunction with the application guidelines included with this announcement in Grants.gov/Apply for Grants (hereafter called Grants.gov/Apply). A registration process is necessary before submission and applicants are highly encouraged to start the process at least four (4) weeks prior to the grant submission date. See Section IV. Purpose.The NIH Director’s New Innovator Awards Program (http://nihroadmap.nih.gov/newinnovator/) was created in 2007 to support a small number of new investigators of exceptional creativity who propose bold and highly innovative new research approaches that have the potential to produce a major impact on broad, important problems in biomedical and behavioral research. The research proposed need not be in a conventional biomedical or behavioral discipline but must be relevant to the mission of NIH. The New Innovator Awards complement ongoing efforts by NIH and its Institutes and Centers to fund new investigators through R01 grants, which continue to be the major source of NIH support for new investigators. The purpose of this FOA is to solicit pre-applications for the NIH Director’s New Innovator Award. Pre-applications are a necessary first step in applying for a 2009 New Innovator Award. Pre-applications will be evaluated by a group of external reviewers. Those investigators whose submissions are judged to be the most outstanding will be notified of the opportunity to submit full (DP2) applications under RFA-RM-09-003. All awards will be made under RFA-RM-09-003. No awards will be made under this announcement. For additional information, consult the FAQs at http://nihroadmap.nih.gov/newinnovator/faq.aspx. Mechanism of Support. This FOA utilizes the X02 grant mechanism for submission of pre-applications. Funds Available and Anticipated Number of Awards.No awards will be made in response to this FOA. Through the associated FOA (RFA-RM-09-003), NIH expects to commit approximately $55.7 million for the five-year period. It is anticipated that up to 24 awards will be made in 2009. Budget and Project Period.No awards will be made under this announcement. Awards through RFA-RM-09-003 will be for up to $300,000 in direct costs each year for five years, plus applicable Facilities and Administrative costs, which will be determined at the time of award. Eligible Project Directors/Principal Investigators (PDs/PIs). Individuals with the skills, knowledge, and resources necessary to carry out the proposed research are invited to work with their institution/organization to develop a pre-application for support. Women and individuals from underrepresented racial and ethnic groups as well as individuals with disabilities are always encouraged to apply for NIH support. Investigators (PD/PIs) must hold an independent research position at a domestic (U.S.) institution as of September 19, 2009 and must have received their most recent doctoral degree (e.g., Ph.D., M.D., D.D.S., D.V.M., PharmD, or equivalent) or completed their medical internship and residency no earlier than 1999 and no later than the due date for pre-applications. For the purpose of this FOA, “independent research position” means a position that automatically confers eligibility by the researcher’s institutional policy for an investigator to apply for R01 grants, with an appropriate commitment of facilities to be used for the conduct of the proposed research. Investigators still in training or mentored status (postdoctoral fellows) are not eligible to apply unless they have a written commitment of an independent faculty position as of September 19, 2009; submission of the pre-application from that institution serves as the written commitment of an independent faculty position. PDs/PIs must meet the definition of “new investigator.” For the purpose of this FOA, “new investigators” are defined as those PDs/PIs who have never been awarded an R01 or equivalent NIH grant (e.g., R23, R29, R33, R37, DP1, DP2, U01, P01 or center grant) or been the leader of a P01 or center grant peer-reviewed project. Individuals who are PDs/PIs on multi-PI R01 or equivalent NIH grants are not eligible to apply for the New Innovator Award. Current or past recipients of K awards are eligible except for the following: K99/R00 or other Independent Scientist and other non-mentored career awards (K02, K04, K05, K24, and K26). Investigators may submit or have an R01 (or equivalent) grant application pending concurrently with their New Innovator Award pre-application or application. However, if that pending grant is awarded in Fiscal Year 2009 with a start date of September 30 or earlier, the applicant is no longer eligible to receive the New Innovator Award. Awardees are required to commit at least 25% of their research effort each year to activities supported by the New Innovator Award. Applicants who were not selected for an award in prior years may submit pre-applications this year if the applicant still meets all the eligibility criteria. There are no citizenship or residency requirements. Number of PDs/PIs.Only one PD/PI may be designated on the pre-application. Number of Pre-Applications. An individual may submit no more than one pre-application. There is no limit to the number of pre-applications that institutions may submit. Resubmissions. Resubmissions are not allowed. All pre-applications must be submitted as “new,” regardless of any previous submissions to the New Innovator Award Program. The NIH Director’s New Innovator Award is designed to support new investigators of exceptional creativity who propose bold and highly innovative new research approaches that have the potential to produce a major impact on broad, important problems in biomedical and behavioral research. The term “award” is used to mean a grant for conducting research, rather than a reward for past achievements. Biomedical and behavioral research is defined broadly in this announcement as encompassing scientific investigations in the biological, behavioral, clinical, social, physical, chemical, computational, engineering, and mathematical sciences. The research proposed for a New Innovator Award may be in any scientific area relevant to the mission of NIH (biological, behavioral, clinical, social, physical, chemical, computational, engineering, and mathematical sciences) but need not be in a conventional biomedical or behavioral discipline. The focus is on innovation and potential impact. This FOA announces the 2009 New Innovator Award competition for fiscal year 2009 and solicits pre-applications. This announcement utilizes the X02 mechanism for submission of pre-applications. Pre-applications are a necessary first step in applying for a 2009 New Innovator Award. Pre-applications will be evaluated by a group of external reviewers. Those investigators whose submissions are judged to be the most outstanding will be notified of the opportunity to submit full (DP2) applications under RFA-RM-09-003. The Project Director/Principal Investigator (PD/PI) will be solely responsible for planning, directing, and executing the proposed project. 2. Funds Available Not applicable. No awards will be made under this FOA. All awards will be made under RFA-RM-09-003. Any individual with the skills, knowledge, and resources necessary to carry out the proposed research as the PD/PI is invited to work with his/her organization to develop a pre-application. Women and individuals from underrepresented racial and ethnic groups as well as individuals with disabilities are always encouraged to apply for NIH support. Only one PD/PI (i.e., no multiple PDs/PIs) may be designated on the pre-application. NIH intramural investigators are not eligible for support under this program. PDs/PIs must hold an independent research position at a domestic (U.S.) institution as of September 19, 2009 and must have received their most recent doctoral degree (e.g., Ph.D., M.D., D.D.S., D.V.M., PharmD, or equivalent) or completed their medical internship and residency no earlier than 1999 and no later than the due date for pre-applications. Any request for an exception to the eligibility requirement of time from last doctoral degree must be based upon additional medical training (e.g., clinical fellowship) or unusual circumstances. For requests based on clinical fellowship training, only the time spent in clinical training, not in research training, will be considered. Requests must be specifically justified in the Biographical Sketch in the pre-application and will be considered on a case-by-case basis. Investigators who do not meet these eligibility requirements and whose pre-applications lack an explicit and justified request for an exception in the Biographical Sketch will be considered ineligible. For the purpose of this FOA, “independent research position” means a position that automatically confers eligibility, by the researcher’s institutional policy, for an investigator to apply for R01 grants, with an appropriate commitment of facilities to be used for the conduct of the proposed research. Investigators still in training or mentored status (postdoctoral fellows) are not eligible to apply unless they have a written commitment of an independent faculty position as of September 19, 2009; submission of the pre-application from that institution will serve as the written commitment of an independent faculty position. PDs/PIs must meet the definition of “new investigator.” For the purpose of this FOA, “new investigators” are defined as those applicants who have never been the PI on an R01 or equivalent grant (e.g., R23, R29, R33, R37, DP1, DP2, U01, P01 or center grant) or leader of a P01 or center grant peer-reviewed project that was reviewed in the investigator’s name. Multiple PIs have the same leadership status on grants as individual PIs; therefore, researchers who have served as one of multiple PIs on any ineligible grant are no longer considered new investigators and are not eligible to apply for a New Innovator Award. Current or past recipients of K awards are eligible except for the following: K99/R00 or other Independent Scientist and other non-mentored career awards (K02, K04, K05, K24, and K26). Investigators may submit or have an R01 (or equivalent) grant application pending concurrently with their New Innovator Award pre-application. However, if that pending grant is awarded in Fiscal Year 2009 with a start date of September 30 or earlier, the applicant is no longer eligible to receive the New Innovator Award. Awardees are required to commit at least 25% of their research effort each year to activities supported by the New Innovator Award. An applicant who was not selected for an award in prior years may submit a pre-application this year if the applicant still meets all the eligibility criteria; however, all pre-applications must be submitted as “new” regardless of any previous submissions to the New Innovator Award program. There are no citizenship or residency requirements. The proposed research need not be in a conventional biomedical or behavioral discipline but must be relevant to the mission of NIH. This initiative is to support new investigators proposing new and innovative research with potential for exceptionally high impact on biomedical problems. An individual may not submit more than one pre-application. There is no limit to the number of pre-applications an institution may submit. All pre-applications will be considered “new,” regardless of any previous submissions to the New Innovator Award Program Section IV. Application and Submission Information To download a SF424 (R&R) Application Package and SF424 (R&R) Application Guide for completing the SF424 (R&R) forms for this FOA, use the “Apply for Grant Electronically” button in this FOA or link to http://www.grants.gov/Apply/ and follow the directions provided on that Web site. See the detailed instructions below regarding choosing a pre-application package (Section 1- Request Application Information). A one-time registration is required for institutions/organizations at both: The individual designated as PD/PI on the pre-application must be registered also in the NIH eRA Commons. The PD/PI must hold a PD/PI account in the Commons. Applicants should not share a Commons account for both an Authorized Organization Representative/Signing Official (AOR/SO) role and a PD/PI role; however, if they have both a PD/PI role and an NIH Internet Assisted Review (IAR) role, both roles should exist under one Commons account. This registration/affiliation must be done by the AOR/SO or his/her designee who is already registered in the Commons. Both the PD/PI and AOR/SO need separate accounts in the NIH eRA Commons since both are authorized to view the application image. Note that if a PD/PI is also an NIH peer reviewer with an Individual DUNS and CCR registration, that particular DUNS number and CCR registration are for the individual reviewer only. These are different than any DUNS number and CCR registration used by an applicant organization. Individual DUNS and CCR registration should be used only for the purposes of personal reimbursement and should not be used on any grant applications submitted to the Federal Government. Several of the steps of the registration process could take four weeks or more. Therefore, applicants should immediately check with their business official to determine whether their organization/institution is already registered in both Grants.gov and the Commons. The NIH will accept electronic applications only from organizations that have completed all necessary registrations. 1. Request Application Information Individuals submitting a pre-application must download the SF424 (R&R) application forms and the SF424 (R&R) Application Guide for this FOA through Grants.gov/Apply. After clicking “Apply for Grant Electronically,” individuals will be presented with a list of ten pre-application packages corresponding to ten scientific areas, as described in the Special Instructions in Section 2 below. The selection of scientific area by investigators is solely to aid in selection of the most appropriate group of peer reviewers. The pre-application requirements and instructions below are identical for all ten packages. All ten scientific areas are considered as a single competition, are reviewed in the same time period, and compete for a single source of funds. Note: Only the forms package directly attached to a specific FOA can be used. You will not be able to use any other SF424 (R&R) forms (e.g., sample forms, forms from another FOA), although some of the "Attachment" files may be useable for more than one FOA. Prepare all pre-applications using the SF424 (R&R) application forms and in accordance with the SF424 (R&R) Application Guide for this FOA through Grants.gov/Apply. The SF424 (R&R) Application Guide is critical to submitting a complete and accurate pre-application to NIH. Some fields within the SF424 (R&R) application components, although not marked as mandatory, are required by NIH (e.g., the “Credential” log-in field of the “Research & Related Senior/Key Person Profile” component must contain the PD/PI’s assigned eRA Commons User ID). Agency-specific instructions for such fields are clearly identified in the Application Guide. For additional information, see “Frequently Asked Questions – Application Guide, Electronic Submission of Grant Applications.” The SF424 (R&R) pre-application has several components. Some components are required, others are optional. The forms package associated with this FOA in Grants.gov/APPLYincludes all applicable components, required and optional. A completed pre-application in response to this FOA includes the data in the following components: Optional Components: PHS 398 Cover Letter File Note: Cover letters should be submitted only when submitting a Changed/Corrected Pre-application after the submission date and should include an explanation for the late submission. SPECIAL INSTRUCTIONS Pre-applications with multiple PDs/PIs are not allowed. ADDITIONAL PRE-APPLICATION INSTRUCTIONS The following instructionsare specific to the New Innovator Award X02 pre-applications and are exceptions to the general SF424 instructions. Pre-applications that do not conform to the specific instructions detailed below will not be reviewed. There are significant changes to the instructions from previous years, so please review all instructions carefully. All of the following must be submitted for the pre-application to be considered complete: I. Area of Science Designation: Individuals must designate one of the following ten areas of science for their pre-application: The areas of science are used by NIH staff to assist in assigning pre-applications to the most appropriate reviewers. To designate a science area, the investigator must do the following: 1. Download and submit the pre-application with the Grants.gov application package for the chosen science area. There are 10 separate pre-application packages (Competition IDs) in Grants.gov for this Funding Opportunity Announcement (FOA), one for each of the above areas of science. Individuals must download and submit the pre-application package for their chosen area of science. The pre-application requirements and instructions are identical for all ten packages. The only difference between the packages istheindicated category of scientific research. The selection of scientific area by the PD/PI is solely to aid in selection of the most appropriate group of peer reviewers and does not in itself affect the PD’s/PI’s funding potential. All ten scientific areas are considered as a single competition and are reviewed by the same process, in the same time period, and compete for a single source of funds. PDs/PIs may download and submit only one of the ten pre-application packages. 2. Include the area of science and the project title at the top of the abstract page. The area of science and project title will not be included in the 300 word limit. 3. Verify that the pre-application has been submitted to the appropriate science area. The PD/PI must check the Competition ID field on the first page of their pre-application (the transmittal sheet) in the Commons. If the pre-application has been submitted to the wrong science area, the PD/PI must notify program staff immediately by e-mail to newinnovator@nih.gov. Failure to correct the science area of the pre-application may adversely affect the pre-application’s review as it may not be reviewed by the most appropriate group of external reviewers. II. Abstract: An abstract of no more than 300 words and not to exceed one page, describing the goals of the project. Include the Project Title and Area of Science at the top of the abstract page; these do not count toward the 300 word limit. The abstract must contain text only – no figures, animations, or web links to provide further information. The Abstract is uploaded as an attachment for item 6, Project Summary/Abstract, on the Other Project Information component of the pre-application. III. Public Health Relevance Statement: A brief statement written in plain language about how the proposed research can positively impact public health. This statement is uploaded for Item 7, Project Narrative, on the Other Project Information component of the pre-application. IV. Essay: An essay of no more than 10 pages that addresses (1) the significance and potential impact of the project, (2) what makes the approaches exceptionally innovative and how the PD/PI will address risks and challenges, and (3) the applicant’s qualifications for this award. A scientific plan should be provided, written with a level of detail appropriate for reviewers who are broadly knowledgeable but who may not be directly involved in the proposed area of research. To focus the essay on the goals of the New Innovator Award program and the review criteria for pre-applications, presentation of the proposed research as a series of specific aims is discouraged. The essay should include the following sections within the 10-page limit, in the following order, with the headings shown: Project description: Describe the scientific problem that you propose to address, its importance, and how solving this problem would have a major impact on a broad area of biomedical/behavioral science. Why is the planned research uniquely suited to the New Innovator Award program, rather than a traditional grant mechanism? How is this project distinct from other research that may be supported in your laboratory? Innovativeness: State clearly and concisely what makes your project unusually innovative. If the approaches entail a high degree of risk, what will you do if these approaches are not successful? Investigator qualifications: Provide evidence to support your claim of innovativeness and creativity in your research. For example, which personal qualities and experiences demonstrate your inclination to challenge paradigms and take intellectual risks, develop unique collaborations, integrate diverse sources of information, or develop novel approaches when new challenges or opportunities arise? Preliminary data are allowed but not required. Bibliographic citations (references), figures, and illustrations may be included, but must fit within the 10-page limit. Do not include links to websites to provide further information. No animations (movies) are allowed in any documents. The Essay is uploaded in the Research Design and Methods attachment of the Research Plan Component. Omit the Specific Aims, Background and Significance, and Preliminary Studies Sections. V. Biographical sketch: A two-page biographical sketch for the PD/PI only. (Use the format for biographical sketches shown in Section 4.5.2 of the Application Guide, omitting Section C, Research Support.) Biographical sketches for other key personnel should not be submitted and will not be accepted. A request for an exception to the eligibility requirement of time from last doctoral degree must be specifically justified in this section of the pre-application and must be based upon additional medical training, such as a clinical fellowship, or unusual circumstances, such as time away from research for care of young children or for military service. Requests will be considered on a case-by-case basis when the pre-application is received. Pre-applications from investigators who exceed the time from last doctoral degree or completion of medical internship/residency and who fail to provide a well-justified request for an exception to this eligibility requirement will not be reviewed. The Biographical Sketch is uploaded on the Research & Related Senior/Key Person Component form. VI. List of Current and Pending Research Support: A list of current and pending research support from all sources, including current year direct costs and percent effort devoted to each project. (Use the format shown in the Application Guide, Part III, Section 3.1.8). The PD/PI must include an Effort Commitment statement, described below. Applicants must also include in this section a brief statement of the facilities to be used for the conduct of the research. This document is uploaded on the Research & Related Senior/Key Person Component form. VII. Effort Commitment: Awardees are required to commit at least 25% of their research effort to the project supported by the New Innovator Award. In the list of current and pending support, the PD/PI must include a statement that, if chosen to receive an award under RFA-RM-09-003, the PD/PI will commit a minimum of 25% of his/her research effort to the project supported by the New Innovator Award. Special requirements for completing the SF424 (R&R) pre-application are specified below. In addition: For Budget request, enter zero for all categories. No awards will be made in response to the pre-application FOA. No other documentation, such as letters of collaboration or biographical sketches of other personnel will be accepted. Information about personnel other than the PD/PI is not required, but may be included within the 10-page essay. All instructions outlined in the SF 424 (R&R) Application Guide (http://grants.nih.gov/grants/funding/424/SF424_RR_Guide_General_Ver2.pdf) are to be followed, incorporating “Just-in-Time” information concepts, with the following exceptions, which are specific requirements for New Innovator Award pre-applications. Pre-applications that do not conform to the specific instructions detailed below will not be reviewed. 1. SF424 (R&R) COVER COMPONENT Item Number and Title Instructions 1. Type of Submission Must be “Pre-Application” 8. Type of Application Must be “New” 13. Proposed Project Enter start date: 09/30/2009; Enter end date: 08/31/2014 Estimated Project Funding Enter $0 2. RESEARCH & RELATED PROJECT/PERFORMANCE SITE LOCATIONS Complete as appropriate 3. RESEARCH & RELATED OTHER PROJECT INFORMATION COMPONENT: Item Number and Title Instructions 1. Are Human Subjects Involved? Check “No” – Detailed plans regarding protection of human subjects, inclusion of women and minorities, targeted/planned enrollment, and inclusion of children are not required and should not be submitted with this pre-application. This information will be required from only those individuals who submit full applications in response to RFA-RM-09-003. 2. Are Vertebrate Animals Used? Check “No” – Detailed information regarding the use of vertebrate animals is not required at the time of submission. This information will be required only from those individuals who submit full applications in response to RFA-RM-09-003. 6. Project Summary/Abstract Attach Abstract (maximum of 300 words and not to exceed one page). Include Project Title and Science Area at top of page. PDF format; text only – no figures, animations, or web links. 7. Project Narrative Attach Public Health Relevance Statement (2-3 sentences), explaining the relevance of the research to public health); PDF format 8. Bibliography & References Cited Do not use. If you choose to include figures or reference citations, they must be included in the Essay, subject to the 10-page limit. 9. Facilities & Other Resources Do not use. 10. Equipment Do not use. 11. Other Attachments Do not use. Note: Pre-applications found not to comply with the page limit requirements or that contain attachments other than those specified will be rejected during the agency validation process. 4. SF424 (R&R) SENIOR/KEY PERSON PROFILE COMPONENT: Complete items only for Project Director/Principal Investigator. Do not submit profiles for other senior/key personnel. Item Title Instructions Profile- PD/PI – Attach Biographical Sketch Attach biographical sketch here (two-page maximum; PDF format). Use the form shown in the URL in Section 4.5.2 of the Application Guide, omitting Section C, Research Support (see below). Any request for an exception to the eligibility requirement of time from last doctoral degree or medical internship/residency must be specifically justified in this section of the application, as described in Section IV.2. Profile- PD/PI – Attach Current & Pending Support Attach a list of Current and Pending Support here (no page limit; PDF format). Use the format shown in Part III, Section 3.1.8 of the Application Guide. Be sure to include a statement affirming that you will devote at least 25% of research effort to New Innovator Award project. Also, include in this section a brief statement of the facilities to be used for the conduct of the research. Profile – Senior Key Person 1 Do not use. Submit information only for PD/PI. Information on collaborators may be included in the essay. Note: Pre-applications found not to comply with the page limit requirements will not be reviewed. No other documentation, such as letters of reference or collaboration or other biographical sketches will be accepted. Information about personnel other than the PD/PI is not required but may be included within the 10-page essay. 4. PHS398 COVER PAGE SUPPLEMENT Item Title Instructions 2. Human Subjects Omit. 4. Human Embryonic Stem Cells Omit. 5. PHS398 Research Plan Component Sections Item Number and Title Instructions 1. Introduction to Application (for Resubmission or Revision only) Omit 2. Specific Aims Omit 3. Background and Significance Omit 4. Preliminary Studies/Progress Report Omit 5. Research Design and Methods Attach 10- page essay (PDF format). Include the area of science (e.g., (01 – Behavioral and Social Sciences) and project title on the first page of essay. Literature references are not required but if included must fit within the 10-page limit. Figures and illustrations may be included but must also fit within the 10-page limit. Do not include links to websites for further information. Do not include animations. 6. PHS 398 Cover Letter File (Optional): Cover letters should be included only when submitting late pre-applications or Changed/Corrected pre-applications after the submission deadline. Do not submit cover letters for initial submissions or for changed/corrected pre-applications submitted before the submission deadline. The cover letter should contain only the following information: To submit a pre-application in response to this FOA, PDs/PIs should access this FOA via http://www.grants.gov/applicants/apply_for_grants.jsp and follow Steps 1-4. Note: Pre-applications must only be submitted electronically. PAPER APPLICATIONS WILL NOT BE ACCEPTED. 3.C. Application Processing Pre-applications may be submitted on or after the opening date and must be successfully received by Grants.gov no later than 5:00 p.m. local time (of the PDs/Pis institution/organization) on the pre-application due date. (See Section IV.3.A. for all dates.) If an pre-application is not submitted by the due date and time, the pre-application may be delayed in the review process or not reviewed. Once a pre-application package has been successfully submitted through Grants.gov, any errors have been addressed, and the assembled pre-application has been created in the eRA Commons, the PD/PI and the Authorized Organization Representative/Signing Official (AOR/SO) have two weekdays (Monday – Friday, excluding Federal holidays) to view the pre-application image to determine if any further action is necessary. If everything is acceptable, no further action is necessary. The pre-application will automatically move forward to the Division of Receipt and Referral in the Center for Scientific Review for processing after two weekdays, excluding Federal holidays. Prior to the submission deadline, the AOR/SO can “Reject” the assembled pre-application and submit a changed/corrected pre-application within the two-day viewing window. This option should be used if it is determined that some part of the pre-application was lost or did not transfer correctly during the submission process, the AOR/SO will have the option to “Reject” the pre-application and submit a Changed/Corrected pre-application. In these cases, please contact the eRA Help Desk to ensure that the issues are addressed and corrected. Once rejected, PDs/PIs should follow the instructions for correcting errors in Section 2.12, including the requirement for cover letters on late applications. The “Reject” feature should also be used if you determine that warnings are applicable to your pre-application and need to be addressed now. Remember, warnings do not stop further pre-application processing. If a pre-application submission results in warnings (but no errors), it will automatically move forward after two weekdays if no action is taken. Some warnings may need to be addressed later in the process. If the two-day window falls after the submission deadline, the AOR/SO will have the option to “Reject” the pre-application if, due to an eRA Commons or Grants.gov system issue, the pre-application does not correctly reflect the submitted pre-application package (e.g., some part of the application was lost or didn’t transfer correctly during the submission process). The AOR/SO should first contact the eRA Commons Helpdesk to confirm the system error, document the issue, and determine the best course of action. NIH will not penalize the applicant for an eRA Commons or Grants.gov system issue. If the AOR/SO chooses to “Reject” the image after the submission deadline for a reason other than an eRA Commons or Grants.gov system failure, a changed/corrected pre-application still can be submitted, but it will be subject to the NIH late policy guidelines and may not be accepted. The reason for this delay should be explained in the cover letter attachment. Both the AOR/SO and PD/PI will receive e-mail notifications when the pre-application is rejected or the pre-application automatically moves forward in the process after two weekdays. Upon receipt, pre-applications will be evaluated for completeness by the Center for Scientific Review, NIH. Incomplete pre-applications will not be reviewed. There will be an acknowledgement of receipt of pre-applications from Grants.gov and the Commons. The submitting AOR/SO receives the Grants.gov acknowledgments. The AOR/SO and the PI receive Commons acknowledgments. Information related to the assignment of a pre-application to a Scientific Review Group is also in the Commons. Note: Since email can be unreliable, it is the responsibility of the applicant to check periodically on their pre-application status in the Commons. The NIH will not accept any pre-application in response to this FOA that is essentially the same as one currently pending initial review, unless the applicant withdraws the pending application. When a previously unfunded application, originally submitted as an investigator-initiated application, is to be submitted in response to a funding opportunity, it is to be prepared as a NEW application. That is, the application for the FOA must not include an “Introduction” describing the changes and improvements made, and the text must not be marked to indicate the changes from the previous unfunded version of the application. The PI/PD organization must include its DUNS number in its Organization Profile in the eRA Commons. This DUNS number must match the DUNS number provided at CCR registration with Grants.gov. For additional information, see “Frequently Asked Questions – Application Guide, Electronic Submission of Grant Applications.” Appendix Materials Appendices are not allowed and will not be accepted. Pre-applications that contain attachments other than those specified may be rejected during the agency validation process. Resource Sharing Plan(s) The following resource sharing policies do not apply to this FOA: Data Sharing Plan. Not Applicable Sharing Model Organisms. Not Applicable Genome Wide Association Studies (GWAS). Not Applicable Section V. Application Review Information 1. Criteria (Update: Enhanced review criteria have been issued for the evaluation of research applications received for potential FY2010 funding and thereafter - see NOT-OD-09-025). Only the review criteria described below will be considered in the review process. 2. Review and Selection Process Pre-applications that are complete and responsive will be evaluated by a group of external reviewers, which will include eminent scientists with expertise in the ten science areas designated in the “Additional Pre-Application Instructions” section above. Those investigators whose submissions are judged to be the most outstanding will be notified of the opportunity to submit full (DP2) applications under RFA-RM-09-003. Given the nature of the review, no summary statement or other written critique will be provided to the submitting individual. The review criteria will emphasize the importance and potential impact of the scientific problem in biomedical and behavioral research, the novelty and innovativeness of the approach, and evidence of the PD’s/PI’s potential for creative and innovative research as a “new investigator.” Specifically, reviewers will evaluate: The scientific problem to be addressed: The importance of the scientific problem and the likelihood that, if successful, the project will have a major impact on a broad area of biomedical or behavioral research. Innovativeness of the research proposed: Evidence that the proposed scientific problem and/or the approaches are significantly more innovative and creative than would normally be expected, especially for a new investigator, and evidence that the investigator has considered and addressed the potential risks and challenges. Investigator qualifications: Evidence of the investigator’s creativity and potential for innovation and the commitment of the investigator to devote 25% or more of his/her research effort on the New Innovator Award project. 2.A. Additional Review Criteria None. 2.B. Additional Review Considerations For this FOA, no specific budget information is to be submitted either with the application or just-in-time. 2.C. Sharing Research Data The following resource sharing policies do not apply to this FOA: Data Sharing Plan. Not Applicable Sharing Model Organisms. Not Applicable Genome Wide Association Studies (GWAS). Not Applicable 3. Anticipated Announcement and Award Dates Those investigators whose submissions are judged to be the most outstanding will be notified in April 2009 of the opportunity to submit full (DP2) applications under RFA-RM-09-003. Awards will be made under RFA-RM-09-003. Awards under RFA-RM-09-003 will be announced in September 2009 and will begin September 30, 2009. Section VI. Award Administration Information 1. Award Notices Not Applicable 2. Administrative and National Policy Requirements Not Applicable 3. Reporting Not Applicable Section VII. Agency Contacts Many questions are addressed in the FAQs on the New Innovator web site at http://nihroadmap.nih.gov/newinnovator/. We encourage your inquiries concerning this funding opportunity and welcome the opportunity to answer questions from potential applicants. Inquiries may fall into three areas: scientific/research (program), peer review, and financial or grants management issues: NOTE: Information responsive to the following federal citations should not be submitted with the X02 New Innovator Award pre-application. Applicants who are invited to submit DP2 applications will be asked to submit the following information as part of the DP2 application. Human Subjects Protection:Federal regulations (45 CFR 46) require that applications and proposals involving human subjects must be evaluated with reference to the risks to the subjects, the adequacy of protection against these risks, the potential benefits of the research to the subjects and others, and the importance of the knowledge gained or to be gained (http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.htm). Data and Safety Monitoring Plan:Data and safety monitoring is required for all types of clinical trials, including physiologic toxicity and dose-finding studies (Phase I); efficacy studies (Phase II); efficacy, effectiveness and comparative trials (Phase III). Monitoring should be commensurate with risk. The establishment of data and safety monitoring boards (DSMBs) is required for multi-site clinical trials involving interventions that entail potential risks to the participants (“NIH Policy for Data and Safety Monitoring,” NIH Guide for Grants and Contracts, http://grants.nih.gov/grants/guide/notice-files/not98-084.html). Access to Research Data through the Freedom of Information Act:The Office of Management and Budget (OMB) Circular A-110 has been revised to provide access to research data through the Freedom of Information Act (FOIA) under some circumstances. Data that are: (1) first produced in a project that is supported in whole or in part with Federal funds; and (2) cited publicly and officially by a Federal agency in support of an action that has the force and effect of law (i.e., a regulation) may be accessed through FOIA. It is important for applicants to understand the basic scope of this amendment. NIH has provided guidance at http://grants.nih.gov/grants/policy/a110/a110_guidance_dec1999.htm. Applicants may wish to place data collected under this funding opportunity in a public archive, which can provide protections for the data and manage the distribution for an indefinite period of time. If so, the application should include a description of the archiving plan in the study design and include information about this in the budget justification section of the application. In addition, applicants should think about how to structure informed consent statements and other human subjects procedures given the potential for wider use of data collected under this award. Inclusion of Women And Minorities in Clinical Research:It is the policy of the NIH that women and members of minority groups and their sub-populations must be included in all NIH-supported clinical research projects unless a clear and compelling justification is provided indicating that inclusion is inappropriate with respect to the health of the subjects or the purpose of the research. This policy results from the NIH Revitalization Act of 1993 (Section 492B of Public Law 103-43). All investigators proposing clinical research should read the "NIH Guidelines for Inclusion of Women and Minorities as Subjects in Clinical Research” (http://grants.nih.gov/grants/guide/notice-files/NOT-OD-02-001.html); a complete copy of the updated Guidelines is available at http://grants.nih.gov/grants/funding/women_min/guidelines_amended_10_2001.htm. The amended policy incorporates: the use of an NIH definition of clinical research; updated racial and ethnic categories in compliance with the new OMB standards; clarification of language governing NIH-defined Phase III clinical trials consistent with the SF424 (R&R) application; and updated roles and responsibilities of NIH staff and the extramural community. The policy continues to require for all NIH-defined Phase III clinical trials that: a) all applications or proposals and/or protocols must provide a description of plans to conduct analyses, as appropriate, to address differences by sex/gender and/or racial/ethnic groups, including subgroups if applicable; and b) investigators must report annual accrual and progress in conducting analyses, as appropriate, by sex/gender and/or racial/ethnic group differences. Inclusion of Children as Participants in Clinical Research:The NIH maintains a policy that children (i.e., individuals under the age of 21) must be included in all clinical research, conducted or supported by the NIH, unless there are scientific and ethical reasons not to include them. All investigators proposing research involving human subjects should read the "NIH Policy and Guidelines" on the inclusion of children as participants in research involving human subjects (http://grants.nih.gov/grants/funding/children/children.htm). Required Education on the Protection of Human Subject Participants:NIH policy requires education on the protection of human subject participants for all investigators submitting NIH applications for research involving human subjects and individuals designated as key personnel. The policy is available at http://grants.nih.gov/grants/guide/notice-files/NOT-OD-00-039.html. Human Embryonic Stem Cells (hESC):Criteria for Federal funding of research on hESCs can be found at http://stemcells.nih.gov/index.asp and at http://grants.nih.gov/grants/guide/notice-files/NOT-OD-02-005.html. Only research using hESC lines that are registered in the NIH Human Embryonic Stem Cell Registry will be eligible for Federal funding (http://escr.nih.gov/). It is the responsibility of the applicant to provide in the project description and elsewhere in the application as appropriate, the official NIH identifier(s) for the hESC line(s) to be used in the proposed research. Applications that do not provide this information will be returned without review. NIH Public Access Policy Requirement: In accordance with the NIH Public Access Policy, investigators funded by the NIH must submit or have submitted for them to the National Library of Medicine’s PubMed Central (see http://www.pubmedcentral.nih.gov/), an electronic version of their final, peer-reviewed manuscripts upon acceptance for publication, to be made publicly available no later than 12 months after the official date of publication. The NIH Public Access Policy is available at (http://grants.nih.gov/grants/guide/notice-files/NOT-OD-08-033.html).For more information, see the Public Access webpage at http://publicaccess.nih.gov/. Standards for Privacy of Individually Identifiable Health Information:The Department of Health and Human Services (HHS) issued final modification to the "Standards for Privacy of Individually Identifiable Health Information", the "Privacy Rule", on August 14, 2002. The Privacy Rule is a federal regulation under the Health Insurance Portability and Accountability Act (HIPAA) of 1996 that governs the protection of individually identifiable health information, and is administered and enforced by the HHS Office for Civil Rights (OCR). Decisions about applicability and implementation of the Privacy Rule reside with the researcher and his/her institution. The OCR website (http://www.hhs.gov/ocr/) provides information on the Privacy Rule, including a complete Regulation Text and a set of decision tools on "Am I a covered entity?" Information on the impact of the HIPAA Privacy Rule on NIH processes involving the review, funding, and progress monitoring of grants, cooperative agreements, and research contracts can be found at http://grants.nih.gov/grants/guide/notice-files/NOT-OD-03-025.html. URLs in NIH Grant Applications or Appendices: All applications and proposals for NIH funding must be self-contained within specified page limitations. For publications listed in the appendix and/or Progress report, Internet addresses (URLs) or PubMed Central (PMC) submission identification numbers must be used for publicly accessible on-line journal articles. Publicly accessible on-line journal articles or PMC articles/manuscripts accepted for publication that are directly relevant to the project may be included only as URLs or PMC submission identification numbers accompanying the full reference in either the Bibliography & References Cited section, the Progress Report Publication List section, or the Biographical Sketch section of the NIH grant application. A URL or PMC submission identification number citation may be repeated in each of these sections as appropriate. There is no limit to the number of URLs or PMC submission identification numbers that can be cited. Healthy People 2010:The Public Health Service (PHS) is committed to achieving the health promotion and disease prevention objectives of "Healthy People 2010," a PHS-led national activity for setting priority areas. This FOA is related to one or more of the priority areas. Potential applicants may obtain a copy of "Healthy People 2010" at http://www.health.gov/healthypeople. Authority and Regulations:This program is described in the Catalog of Federal Domestic Assistance at http://www.cfda.gov/ and is not subject to the intergovernmental review requirements of Executive Order 12372. Awards are made under the authorization of Sections 301 and 405 of the Public Health Service Act as amended (42 USC 241 and 284) and under Federal Regulations 42 CFR Part 52 and 45 CFR Parts 74 and 92. All awards are subject to the terms and conditions, cost principles, and other considerations described in the NIH Grants Policy Statement. The PHS strongly encourages all grant recipients to provide a smoke-free workplace and discourage the use of all tobacco products. In addition, Public Law 103-227, the Pro-Children Act of 1994, prohibits smoking in certain facilities (or in some cases, any portion of a facility) in which regular or routine education, library, day care, health care, or early childhood development services are provided to children. This is consistent with the PHS mission to protect and advance the physical and mental health of the American people. Loan Repayment Programs:NIH encourages applications for educational loan repayment from qualified health professionals who have made a commitment to pursue a research career involving clinical, pediatric, contraception, infertility, and health disparities related areas. The LRP is an important component of NIH's efforts to recruit and retain the next generation of researchers by providing the means for developing a research career unfettered by the burden of student loan debt. Note that an NIH grant is not required for eligibility and concurrent career award and LRP applications are encouraged. The periods of career award and LRP award may overlap providing the LRP recipient with the required commitment of time and effort, as LRP awardees must commit at least 50% of their time (at least 20 hours per week based on a 40 hour week) for two years to the research. For further information, please see: http://www.lrp.nih.gov/.
# -*- coding: utf-8 -*- from .common import *
Economic and Environmental Role of Wetlands Interview with Nick Davidson, Ramsar Convention’s Deputy Secretary General at CBD, COP11. The key role that rapidly diminishing wetlands play in supporting human life and biodiversity needs to be recognized and integrated into decision-making as a vital component of the transition to a resource-efficient, sustainable world economy, according to a new TEEB report released today. How cleaner stoves can save lives and tackle climate change Kenya unveils new plans to tackle rising problem of e-waste WHO estimates indoor air pollution was linked to 4.3 million deaths in 2012 in households cooking over coal, wood and biomass stoves GENEVA, 25 March 2014 - In new estimates released today, the World Health Organization (WHO) reports that in 2012 around 7 million people died - one in eight of total global deaths as a result of air pollution exposure. This finding more than doubles previous estimates and confirms that air pollution is now the world's largest single environmental health risk. Reducing air pollution could save millions of lives. Further Resources In particular, the new data reveal a stronger link between both indoor and outdoor air pollution exposure and cardiovascular diseases, such as strokes and ischaemic heart disease, as well as between air pollution and cancer. This is in addition to air pollution's role in the development of respiratory diseases, including acute respiratory infections and chronic obstructive pulmonary diseases. The new estimates are not only based on more knowledge about the diseases caused by air pollution, but also upon better assessment of human exposure to air pollutants through the use of improved measurements and technology. This has enabled scientists to make a more detailed analysis of health risks from a wider demographic spread that now includes rural as well as urban areas. Regionally, low- and middle-income countries in the WHO South-East Asia and Western Pacific Regions had the largest air pollution-related burden in 2012, with a total of 3.3 million deaths linked to indoor air pollution and 2.6 million deaths related to outdoor air pollution. "Cleaning up the air we breathe prevents noncommunicable diseases as well as reduces disease risks among women and vulnerable groups, including children and the elderly," says Dr Flavia Bustreo, WHO Assistant Director-General Family, Women and Children's Health. "Poor women and children pay a heavy price from indoor air pollution since they spend more time at home breathing in smoke and soot from leaky coal and wood cook stoves." Included in the assessment is a breakdown of deaths attributed to specific diseases, underlining that the vast majority of air pollution deaths are due to cardiovascular diseases as follows: Outdoor air pollution-caused deaths breakdown by disease: 40% - ischaemic heart disease; 40% - stroke; 11% - chronic obstructive pulmonary disease (COPD) 6% - lung cancer; 3% - acute lower respiratory infections in children. Indoor air pollution-caused deaths breakdown by disease: 34% - stroke; 26% - ischaemic heart disease; 22% - COPD; 12% - acute lower respiratory infections in children; 6% - lung cancer. The new estimates are based on the latest WHO mortality data from 2012 as well as evidence of health risks from air pollution exposures. Estimates of people's exposure to outdoor air pollution in different parts of the world were formulated through a new global data mapping. This incorporated satellite data, ground-level monitoring measurements and data on pollution emissions from key sources, as well as modelling of how pollution drifts in the air. "The risks from air pollution are now far greater than previously thought or understood, particularly for heart disease and strokes," says Dr Maria Neira, Director of WHO's Department for Public Health, Environmental and Social Determinants of Health. "Few risks have a greater impact on global health today than air pollution; the evidence signals the need for concerted action to clean up the air we all breathe." After analysing the risk factors and taking into account revisions in methodology, WHO estimates indoor air pollution was linked to 4.3 million deaths in 2012 in households cooking over coal, wood and biomass stoves. The new estimate is explained by better information about pollution exposures among the estimated 2.9 billion people living in homes using wood, coal or dung as their primary cooking fuel, as well as evidence about air pollution's role in the development of cardiovascular and respiratory diseases, and cancers. In the case of outdoor air pollution, WHO estimates there were 3.7 million deaths in 2012 from urban and rural sources worldwide. Many people are exposed to both indoor and outdoor air pollution. Due to this overlap, mortality attributed to the two sources cannot simply be added together, hence the total estimate of around 7 million deaths in 2012. "Excessive air pollution is often a by-product of unsustainable policies in sectors such as transport, energy, waste management and industry. In most cases, healthier strategies will also be more economical in the long term due to health-care cost savings as well as climate gains," says Dr Carlos Dora, WHO Coordinator for Public Health, Environmental and Social Determinants of Health. "WHO and health sectors have a unique role in translating scientific evidence on air pollution into policies that can deliver impact and improvements that will save lives." The release of today's data is a significant step in advancing a WHO roadmap for preventing diseases related to air pollution. This involves the development of a WHO-hosted global platform on air quality and health to generate better data on air pollution-related diseases and strengthened support to countries and cities through guidance, information and evidence about health gains from key interventions. Later this year, WHO will release indoor air quality guidelines on household fuel combustion, as well as country data on outdoor and indoor air pollution exposures and related mortality, plus an update of air quality measurements in 1600 cities from all regions of the world.
A 21-year-old man was hospitalized in intensive care in Murdoch, Australia (near Perth), in December following a barroom stunt in which he put on a helmet connected to a beer jug, with a hose that ran between the jug and a pump powered by an electric drill. The idea was to facilitate drinking a large quantity of beer without the laborious tasks of lifting a glass and swallowing, but the flow was so powerful that he had to be rushed to the hospital with a 10-centimeter tear in his stomach. [The West Australian, 12-15-04] Wellard takes off his hat bows his head and offers the man involved a moment’s respectful silence. Is there any greater sacrifice than to risk your life for the potential benefit of you’re fellow beer drinker? When he gets out of hospital I suggest we award him a medal (made from bottle tops of course) What should we call the medal? __________________ fossils - natures way of laughing at creationists for over 3 billion years __________________Too set in his ways to ever relate If he could set that aside, there'd be heaven to pay But weathered and aged, time swept him to grave Love conquers all? Damn, I'd say that area's gray
Company Matches Trump threatens China with new $100 billion tariff plan President Donald Trump ratcheted up the trade war rhetoric with China on Thursday evening, saying he was considering another wave of steep tariffs on the country's exports to the United States. "In light of China's unfair retaliation, I have instructed the [United States Trade Representative] to consider whether $100 billion of additional tariffs would be appropriate," the president said in a statement. Earlier this week, the United States announced new tariffs on $50 billion worth of Chinese goods, claiming that China is stealing US intellectual property. China responded within hours by announcing $50 billion worth of tariffs on US goods. The moves follow US tariffs that were imposed earlier this year on Chinese steel and aluminum, which also prompted retaliatory measures from China. Trump's announcement late Thursday that his administration could target another $100 billion of Chinese goods rattled markets and drew criticism from businesses and from within his own party. The Chinese government responded by reiterating that it doesn't want "to fight a trade war, but we are not afraid of fighting it." "If the United States disregards the opposition of China and the international community, and insists on unilateralist and protectionist trade practices, the Chinese side will follow through to the end and will not hesitate to fight back at any cost," the Chinese Commerce Ministry said in a statement Friday. "We are prepared and have already formulated very detailed countermeasures," Gao Feng, a ministry spokesman, told reporters at a hastily arranged press conference later on Friday. The Dow fell sharply at the open on Friday, but recovered some lost ground to trade 0.5% lower. US stocks had gained on Thursday as investors appeared to warm to the idea that the barbs between Washington and Beijing were all talk. Investors were reassured by Larry Kudlow, the director of the White House National Economic Council, who also characterized the tariffs as just proposals in remarks on Thursday. He told reporters there is "nothing around the corner" regarding any concrete tariff plans. Asian stock markets showed little sign of alarm over Trump's latest announcement, with most indexes posting moderate gains or losses on Friday. Stocks in Hong Kong, where the market had been closed Thursday, gained more than 1%. Exchanges in mainland China were shut Friday for a public holiday. Trump's latest tariff threat was met with criticism from members of his own Republican party. Nebraska Senator Ben Sasse called the move "the dumbest possible way to do this." "Hopefully the President is just blowing off steam again but, if he's even half-serious, this is nuts," he said in a statement. "China is guilty of many things, but the President has no actual plan to win right now. He's threatening to light American agriculture on fire," Sasse added. Richard Quest: The US-China trade war has begun US retailers also slammed Trump's announcement, accusing him of "playing a game of chicken with the nation's economy." The National Retail Federation, an industry group, said in a statement that while it agreed on the need to address China's unfair trade practices, "these tit-for-tat trade actions could ... make it harder for Americans across the country to afford everyday products and basic necessities." The US government on Tuesday threatened to levy import taxes on more than 1,300 Chinese products, including TVs, dishwashers and printers. In turn, China vowed to target key US exports, including soybeans. "Rather than remedy its misconduct, China has chosen to harm our farmers and manufacturers," Trump said in his statement Thursday. Trump said he instructed the US Trade Representative to "identify the products upon which to impose" the additional tariffs he suggested. US Trade Representative Robert Lighthizer in a statement late Thursday called Trump's request "appropriate." "China has chosen to respond thus far with threats to impose unjustified tariffs on billions of dollars in US exports, including our agricultural products," Lighthizer said. "Such measures would undoubtedly cause further harm to American workers, farmers, and businesses. Under these circumstances, the president is right to ask for additional appropriate action to obtain the elimination of the unfair acts, policies, and practices identified in USTR's report." Trump said he had also instructed the Secretary of Agriculture "to use his broad authority to implement a plan to protect our farmers and agricultural interests." He also left the door open for further discussion with the Chinese government. "The United States is still prepared to have discussions in further support of our commitment to achieving free, fair, and reciprocal trade and to protect the technology and intellectual property of American companies and American people," he said. Chinese officials this week also said they were eager to engage, but the tone had changed by Friday. Gao, the spokesperson for the Commerce Ministry, told reporters that China and the United States were not currently engaged in trade negotiations, and Trump's latest comments made talks even more unlikely. "The US-China trade rhetoric fluctuates between escalation and negotiation," said Kerry Craig, global market strategist at JP Morgan Asset Management. He warned that talks "could be complex and various factors such as [intellectual property] and technology will linger beyond a single trade dispute."
Sounds stadium financing unclear, but taxpayers likely to play a part Dean wants to limit public payments 5:46 AM, Sep. 8, 2013 Loading Photo Galleries ... Written by Michael Cass | The Tennessean If the Nashville Sounds build a new ballpark north of downtown, taxpayers almost certainly will play a role in financing the facility, just as they have in other cities around the country. But Mayor Karl Dean and his top aides say they're working to limit public participation as much as they can. "The mayor has made it really clear: A baseball stadium would be a nice thing to do, but it's not a must," Metro Finance Director Rich Riebeling said Friday. "To do that, we've got to put together a financing plan that shows that it has minimal impact on the taxpayers of Davidson County. ...
My first date idea is to go to a shopping mall with my partner and spend a couple of hours with him and get to know him better. My other first date idea is meet up at a park, have a picnic, play his or my favorite sport more>> My first date idea is to go to a shopping mall with my partner and spend a couple of hours with him and get to know him better. My other first date idea is meet up at a park, have a picnic, play his or my favorite sport, and just talk and enjoy my time with him less<<
Goal Setting for Freelancers: How to Focus on What Matters Most in 2019 What Really Happens When You Follow Up with Clients With just a few minutes of follow up per client, freelance writer and editor Joy Drohan got 6 new clients. Freelance writer Brandon May did the same thing—and got 3 new clients. Joy and Brandon have found a simple way to… Why Clients Need Freelancers They Can Trust It’s been 11 years since Keith D’Oria and I worked together. But when Keith was looking for freelance help for his new company, he contacted me—because he trusted me. “Having worked with Lori in the past with much success, I decided to ‘go back to the well’ and work with someone who… How Professional Associations Make it Easy for Freelancers to Get High-Paying Clients Do you belong to professional associations? If you do, are you active in your professional associations? The answer to both of these questions should be Yes!—because professional associations make it easy…
Palo Alto University professor Christine Blasey Ford, who came forward with accusations of sexual assault against Supreme Court nominee Brett Kavanaugh, said in a letter on Monday to Senate Judiciary Committee chair Chuck Grassley that she felt “agony yet urgency” to tell her story. Ford wrote the letter to Grassley on Sept. 22, while she was still in ongoing negotiations with the Republican-led committee to testify against Kavanaugh. Grassley released the letter on Monday, along with a letter from Kavanaugh himself in which he flatly denies Ford’s allegations. In the letter, Ford explains her motive for coming forward, and the timing of her allegations — which, being just ahead of the Senate vote on Kavanaugh, Republicans including Senate Majority Leader Mitch McConnell have called into question. Ford has accused Kavanaugh of attempting to rape her when both were in high school and at a party in the early 1980s; she came forward in an article published Sept. 16. “Mr. Kavanaugh’s actions, while many years ago, were serious and have had a lasting impact on my life,” Ford wrote in the letter. “I thought that knowledge of his actions could be useful for you and those in charge of choosing among the various candidates. My original intent was first and foremost to be a helpful citizen — in a confidential way that would minimize collateral damage to all families and friends involved.” Ford goes on to say that since coming forward, she has faced threats and media intrusion into her life. “While I am frightened, please know, my fear will not hold me back from testifying and you will be provided with answers to all of your questions,” Ford wrote. “I ask for fair and respectful treatment.”
Introduction ============ The mammary gland is an interesting model for studying gene expression since this organ experiences different cycles of differentiation and regression during adult life. In eukaryotes, gene expression is a complex process that involves DNA methylation, chromatin modification, imprinting, and interfering RNA ([@b45-gmb-36-465]). Although Fire and Mello received the Nobel Prize for their discovery of double-strand interfering RNA in *Caenorhabditis elegans* ([@b17-gmb-36-465]), the first miRNA (Lin 4) was in fact discovered years before by two groups and published simultaneously in 1993 ([@b39-gmb-36-465]; [@b60-gmb-36-465]). In 2000, a second miRNA (Lin 7) was identified in the same nematode ([@b53-gmb-36-465]) and soon after in many other species ([@b50-gmb-36-465]). By 2001, it was clear that miRNAs represent a class of small conserved RNAs ([@b33-gmb-36-465]; [@b34-gmb-36-465]; [@b38-gmb-36-465]). Three main categories of interfering RNAs have been recognized: microRNA (miRNA), short interfering RNA (siRNA) and piwi interactive RNA (piRNA). These three RNAs are of similar size (∼23 nucleotides in length) but have sequence-specific inhibitory functions ([@b10-gmb-36-465]; [@b4-gmb-36-465]). siRNAs are excised from long, fully complementary double-stranded RNAs ([@b57-gmb-36-465]; [@b4-gmb-36-465]) and were initially considered to protect the host genome from foreign nucleic acids (such as viruses, transposons and transgenes) but that view changed with the discovery of abundantly expressed endogenous siRNAs in animal cells ([@b21-gmb-36-465]). piRNAs are small RNAs that bind the piwi subfamily of argonaute proteins and protect the germline ([@b3-gmb-36-465]) and embryonic stem cells ([@b47-gmb-36-465]) from invasive transposable elements. miRNAs regulate gene expression at a post-transcriptional level either by causing RNA degradation or by blocking translation through base-pairing with complementary sequences within mRNA. Since partial miRNA complementarities are enough to target an mRNA, each miRNA has the ability to regulate a large number of genes ([@b28-gmb-36-465]). Another feature is that a conserved miRNA can regulate different genetic pathways and developmental processes in various organisms ([@b3-gmb-36-465]). In recent years, many miRNAs have been identified in plants and animals by experimental and computational approaches. Adequate characterization of the actions of miRNAs in the mammary gland in different physiological states could provide new insights into the regulation of gene expression. The goals of this review are to outline and integrate the experimental and computational studies on miRNA in healthy and mastitic mammary gland and to address the stability of miRNA in milk and possible inter-species transmission. Biogenesis of miRNA =================== miRNAs are DNA-derived RNA transcripts that are not translated into proteins. miRNA biosynthesis is a complex process that involves several steps. The canonical pathway for miRNA biogenesis requires two RNaseIII enzymes, Drosha and Dicer. In this process, miRNAs are initially transcribed by RNA polymerase II as long transcript hairpin-shaped units. As with mRNA, these molecules are spliced, capped and polyadenylated to produce primary miRNA (pri-miRNA). This precursor is processed by the enzyme Drosha to yield pre-miRNA that is then transported to the cytoplasm where it is cleaved by Dicer to the mature length. The functional strand of mature miRNA is loaded onto an argonaute (Ago) protein, the main constituent of the RNA-induced silencing complex (RISC), while the other strand is degraded ([@b40-gmb-36-465]; [@b16-gmb-36-465]; [@b56-gmb-36-465]) ([Figure 1](#f1-gmb-36-465){ref-type="fig"}). [@b13-gmb-36-465] used Dicer- and Drosha-knock-out mice to confirm the requirement of both enzymes for this canonical miRNA biosynthesis. However, not all miRNAs are formed by this pathway. It is now known that there are variations in many of the steps involved and that this can influence the biogenesis results ([@b49-gmb-36-465]; [@b61-gmb-36-465]). Deep sequencing technology has revealed marked variability in miRNA biogenesis and has shown that many different sequences can share the same miRNA precursor. Identification of miRNA in mammary gland and milk ================================================= miRNAs have been identified in cells and in fluids such as saliva, amniotic fluid, blood, urine and milk. In fluids, miRNAs are enclosed in exosomes ([@b66-gmb-36-465]). The number of miRNAs reported for mammary gland varies considerably ([Table 1](#t1-gmb-36-465){ref-type="table"}). [@b12-gmb-36-465] used high-throughput sequencing technology to search for expressed small RNA in cow colostrum and milk. After classifying the molecules based on size, they found a similar number of reads in both fluids (1,594,965 in colostrum vs 1,418,136 in milk). A search in the miRBase (a database of published miRNA sequences and annotation) resulted in the identification of 230 and 213 known miRNAs in colostrum and mature milk, respectively. Among the differently expressed miRNAs, 108 were up-regulated and only eight were down-regulated in colostrum compared to mature milk. These results indicate a dynamic gene expression during lactation. [@b26-gmb-36-465] identified a smaller number of miRNAs than [@b12-gmb-36-465], with 100 being unique for colostrum and 53 for mature milk. It should be noted that whereas [@b12-gmb-36-465] prepared RNA from a larger amount of milk and purified small RNA by PAGE, [@b26-gmb-36-465] started with a smaller amount of milk and used microarray analysis. [@b44-gmb-36-465] reported 11,964,909 and 15,968,116 clean reads from mammary gland tissues in the lactating and non-lactating periods, respectively. After aligning the reads against the *Bos taurus* genome and miRBase, 885 pre-miRNAs were identified and encoded for 921 miRNAs; ∼60% of these miRNAs were expressed during the lactation and non-lactation period; of these, 248 miRNAs were known, 57 were conserved and 239 were new identifications. In human milk, [@b66-gmb-36-465] identified exosomes containing pre-miRNA from four libraries. Four of the top ten miRNAs (30b, 182, 200a and 148a) were related to different aspects of the immune system, with the most abundant of them being miRNA 148a, which is also expressed in bovine milk ([@b12-gmb-36-465]). In a sheep mammary gland library constructed from early pregnancy tissue, [@b18-gmb-36-465] identified 54 sequences already described in the miRBase; two of these miRNAs (27e and 36e) were identified for the first time in mammals and only miRNA 379 had previously been shown to occur in sheep. In goats, [@b29-gmb-36-465] characterized miRNAs from a pool of five Laoshan breed animals. A total of 18,031,615 read sequences were obtained after discarding ∼2.6% that did not meet the control criteria (*i.e.*, they were of low quality, had contaminants formed by adapter-adapter ligation, and contained reads without insert tags). Of these reads, 9,093,530 had a perfect match to the *Ovis aries* genome and 305,711 were new sequences. Furthermore, 290 conserved miRNAs and 38 novel miRNAs were identified, and this total of 338 miRNAs was very similar to that reported by [@b43-gmb-36-465] for dairy goats (441 miRNAs). The biological material (mammary gland tissue or milk), the amount of sample used, and the species and breed examined can influence the results. Moreover, differences in the quality control criteria used to classify the sequencing products (raw and clean reads) and discrepancies associated with library normalization may also contribute to variations in the number of miRNAs reported. Finally, some degree of variation may be introduced by the mode of sample preparation. [@b37-gmb-36-465] observed no changes in the 3′ end of a 22-nucleotide-long synthetic RNA introduced into RNA samples, but a fraction of the synthetic sequences were truncated at the 5′ end. These authors concluded that the changes in the 5′ end may have been caused by premature termination during the production of synthetic RNA. This finding suggests that at least part of the variation reported for end-region sequences may be linked to sample processing prior to sequence analysis. An additional source of diversity is that many miRNAs may vary from the published reference sequences. To address the latter phenomenon, [@b47-gmb-36-465] proposed the terminology "isomers" to refer to sets of miRNAs that show similarity in their sequences. These authors suggested that isomer variability could be related to variation in the cleavage positions for the enzymes Dicer or Drosha within the pre-miRNA hairpin and showed results in which the variability among isomers influenced the differential expression of miRNA. Functions of miRNA in mammary gland and milk ============================================ An important question in assessing miRNA function is whether the miRNAs present in milk are derived from blood or are specific for mammary gland. To address this issue, [@b12-gmb-36-465] compared the miRNA profile of milk with that of serum from healthy cows and found that the total number of miRNAs in milk was about two-fold higher than in serum; they also identified 47 miRNAs unique to milk. Human breast milk also has a different pattern of miRNA expression compared to blood plasma ([@b32-gmb-36-465]). These results clearly indicate that mammary alveolar cells express their own miRNAs. Another question is whether the pattern of miRNA expression in mammary gland is constant throughout the lactation period. Of the 1,692,810 reads described by [@b44-gmb-36-465], 34% were expressed only in the dry period compared to the peak period of milk production. Moreover, analysis of the expression patterns of 173 differentially expressed miRNAs showed that 165 were down-regulated during peak lactation compared to the dry period. Among the sequences reported by [@b44-gmb-36-465], 56 showed significant differences in expression between lactating and non-lactating cows, as assessed using the IDEG6 package ([@b54-gmb-36-465]); of these, nine were expressed only in lactating animals and six in non-lactating animals. However, 48 of these were confirmed by deep sequencing ([@b44-gmb-36-465]), indicating that deep sequencing may be more sensitive and reliable than microarray analysis in identifying differentially expressed miRNAs. Together, these findings indicate that the pattern of miRNA expression varies according to the animals physiological state. To examine the expression of specific miRNAs associated with cellular proliferation, metabolism and the innate immune response during lactation, [@b59-gmb-36-465] assessed the expression of 13 miRNAs in cows during the dry period (30 d prepartum), fresh period (7 d postpartum) and early lactation (30 d postpartum). Twelve of the miRNAs identified (miRNAs 10a, 15b, 16, 21, 33b, 145, 146b, 155, 181a, 205, 221 and 223) were down-regulated in the dry period compared to during lactation. The exception was miRNA 31, which showed greater expression in early lactation compared to the dry period. Under normal conditions and using bioinformatic assays and biological experiments, [@b63-gmb-36-465] demonstrated that miRNA 31 up-regulated IL-2 (interleukin 2) expression by reducing the levels of the cytokines upstream kinase suppressor, KSR2 (kinase suppressor of ras 2). Interleukins are present in human milk ([@b9-gmb-36-465]) and have an important role in modulating the offsprings immunological system ([@b7-gmb-36-465]). These findings indicate that miRNA 31 may have an indirect immunological role in the neonate. Based on microarray analysis, [@b18-gmb-36-465] identified three major patterns of miRNA expression in sheep. In pattern 1, expression was down-regulated during pregnancy, in pattern 2, miRNA expression was induced during pregnancy, and in pattern 3, miRNA expression was induced during lactation. The authors selected one miRNA from each pattern to confirm their expression by RT-qPCR in four animals per pattern. miRNA 21, which is expressed in alveolar epithelial cells, was up-regulated in non-pregnant sheep and at the beginning of pregnancy. This expression profile was attributed to a role for miRNA 21 in adipogenic differentiation. In this regard, [@b31-gmb-36-465] showed that the activity of miRNA 21 in adipogenic tissue was mediated through TGF-β signaling. In contrast, miRNA 205 was expressed mainly in the basement membrane of normal mammary ducts and lobules during the first half of pregnancy and miRNA 200 was expressed in epithelial cells throughout pregnancy but was up-regulated at the end of pregnancy and lactation. Bioinformatic analysis using the program RNA hybrid identified a miRNA 15a target sequence on the growth hormone receptor ([@b41-gmb-36-465]). However, this miRNA was not identified in a sequence search by [@b12-gmb-36-465]. To confirm their finding, [@b41-gmb-36-465] transfected this small RNA in mammary epithelial cells and observed a reduction in growth hormone receptor (GHR) transcription and in the expression of β casein. Growth hormone is the most relevant galactopoietic hormone in ruminants ([@b8-gmb-36-465]) and triggers casein expression ([@b55-gmb-36-465]). These results therefore indicated that miRNA 15a indirectly decreases milk production by blocking the expression of growth hormone receptor and thus identified a novel regulatory mechanism for GHR. Some miRNAs have been suggested to have immunosuppressive roles. *In silico* analyses of two members of the miRNA 30 family (miRNAs 30a-5p and 30d-5p) predicted binding sites in several suppressors of cytokine signaling inhibitors of the JAK/STAT pathway that regulate IL-10 transcription ([@b20-gmb-36-465]). This miRNA has also been implicated in the formation of the adipose pad in mammary gland. Le [@b22-gmb-36-465] constructed transgenic mice over-expressing miRNA 30b and observed (based on histological analysis) that these animals had acinar structures with abnormally small lumens. Even when there were no differences in the concentration of major milk proteins, the number of lipid droplets was smaller and did not show the spherical shape seen in the wild type. Microarray analyses of animals that did not express miRNA 30b showed that 164 genes were up-regulated and 56 genes were down-regulated. All of the up-regulated genes were associated with tissue development, except for seven that were involved in the inflammatory response. It is remarkable that the blockade of just a single miRNA altered the expression levels of 222 genes. Further studies are needed to understand the biological roles of most of the reported miRNAs. After identifying miRNAs in mammary gland by sequencing procedures or computational searches, it is important to validate the results in functional experiments and to study their expression pattern in physiological and pathological conditions ([@b25-gmb-36-465]). The purpose of expression studies is to compare patterns between groups, *e.g.*, disease *vs.* healthy and lactation *vs.* dry. The subsequent variation observed between experimental groups should reflect differences in expression between the groups and not be attributable to other sources of variation such as sampling methods, stabilization procedures and extraction methods. A normalizer or internal control should be used. This control is generally an RNA that exhibits invariant expression across all samples, is expressed along with the target miRNA in the cells of interest, and demonstrates equivalent storage stability and efficiency of extraction and quantification as the target miRNA of interest ([@b58-gmb-36-465]; [@b51-gmb-36-465]). Selecting an optimal normalizer (an aspect that is frequently undervalued) may help to avoid inconsistent results. [@b22-gmb-36-465] proposed a set of miRNAs for porcine milk studies. These authors compared the expression of six porcine milk miRNAs from different lactation periods and proposed three of them (miRNAs 17, 107 and 103) as internal controls because they were stabled throughout the periods studied (1 h and 3, 7, 14, 21 and 28 days postpartum). In cow, [@b26-gmb-36-465] normalized the samples using a synthetic cel-miRNA 39. [@b48-gmb-36-465] normalized the data using miRNA 320 and miRNA U6. The usefulness of the latter miRNA has been questioned because of its stability in serum ([@b11-gmb-36-465]). For the next generation of sequencing technology, normalization will be challenging because different sequencing experiments may generate quite different total numbers of reads ([@b42-gmb-36-465]). The total count normalization is inadequate for data generated by new generation sequencing technologies ([@b19-gmb-36-465]). To overcome this limitation various statistical models have been proposed for the normalization of data. Although there is still no general agreement about the most adequate internal controls and the best methods for normalizing data, it is nevertheless essential to establish criteria for selecting which controls should be used for each species and tissue and which method should be used to normalize the data in order to decrease the false discovery rate. Functions of miRNA in mastitis ============================== Mastitis, or inflammation of the mammary gland, is one of the most prevalent and costly diseases in dairy animals (for specific reviews see [@b23-gmb-36-465]; [@b2-gmb-36-465]; [@b15-gmb-36-465]). Intra-mammary infection occurs when bacteria cross the teat sphincter and reach the alveolar lumen after passing through the teat and gland cisterns. The first response of the immune system is a neutrophil influx via chemotaxis to establish the inflammatory process ([@b1-gmb-36-465]). Understanding the molecular mechanisms involved in mastitis would be helpful in developing new strategies to prevent and treat this condition. *Streptococcus uberis* is one of the major etiological agents of mastitis. This Gram-positive bacterium can cause contagious or environmental mastitis ([@b52-gmb-36-465]). Two recent studies examined the miRNA expression pattern in *S. uberis*-induced mastitis: one focused on *in vivo* infection and miRNA expression at 12 h post-infection while the other examined the expression pattern at different times in cultured mammary epithelial cells. Both studies provided interesting insights into the rapid and diverse response triggered after infection. In the first of these studies, [@b48-gmb-36-465] examined the expression pattern of 14 miRNAs in mammary gland 12 h after a challenge with *S. uberis*. The resulting data plus the microarray gene expression patterns of 2,102 genes were used in bioinformatic analyses to identify miRNA targets and the biological pathways involved. The results showed down-regulation of miRNAs 15b, 16a, 31, 145 and 181a, and up-regulation of miRNA 223 in mastitis compared with healthy control animals ([Figure 2, panel A](#f2-gmb-36-465){ref-type="fig"}). The target genes identified were mostly associated with immunological regulation, metabolic processes and cellular proliferation/differentiation. The change in miRNA 16a expression was associated with the up-regulation of some interleukins (IL-6, IL-8 and IL-10). The authors suggested that miRNA 16a might control the level of key inflammatory components in bovine mammary gland and could play a role in regulating the response to mastitis. Mastitis caused the down-regulation of miRNA 181a which has a role in the immune system (such as an increase in toll-like receptor and B cell receptor signaling). However, the decrease in miRNA 181a was the opposite of that observed in mice with an acute inflammatory response ([@b62-gmb-36-465]). In the latter case, the levels of miRNA 181a increased within 2 h after the induction of inflammation and remained high for up to 6 h post-treatment; however, 12 h later the expression was lower than in control animals. The discrepancy between these two studies may be related to the sampling intervals since [@b48-gmb-36-465] obtained the mammary biopsies 20 h after the bacterial challenge. However, differences among species should also be considered. The only miRNA that was up-regulated in udder mastitis was miRNA 223, which can inhibit several cellular signaling pathways mediated via the down-regulation of IGF1R (insulin growth factor 1 receptor). Negative modulation of the immune response may be required to avoid damage to the host tissue. In the second study, [@b35-gmb-36-465] identified 15 miRNAs that showed altered expression in cultured bovine mammary epithelial cells challenged with *S. uberis.* No changes were observed in the first hour after inoculation but at 2 h, miRNA 29e and miRNA 708 were up-regulated. This was followed by the up-regulation of miRNA 7b and miRNA 98 at 4 h post-challenge. At 6 h, 12 miRNAs were up-regulated (miRNAs 7b, 7d, 7e, 24-2, 128-1, 128-2, 185, 200c, 210, 494, 652 and 2342). Down-regulation was first observed only at 4 h and involved miRNAs 29b-2, 193a and 130a. Two miRNAs (29b-2 and 130a) were down-regulated at 4 h and 6 h ([Figure 2, Panel B](#f2-gmb-36-465){ref-type="fig"}). Although a large number of 5′ isomers were identified, they were expressed at a low rate. The prediction of target genes showed that only the miRNAs down-regulated at 4 h and 6 h post-inoculation were significantly enriched in genes with a role in innate immunity. [Table 2](#t2-gmb-36-465){ref-type="table"} summarizes the different miRNAs reported in mammary gland and milk and their level of expression in cow and sheep. The mammary alveolus cell is a three-dimensional structure in which the extracellular matrix plays an active role in epithelial function such as casein expression ([@b30-gmb-36-465]). Therefore, the time intervals studied and the biological model used (*in vivo* vs. cell culture) could account for the divergent miRNA expression reported in these studies. Nevertheless, the results clearly suggest that *S. uberis* can coordinate different processes by regulating target miRNAs. Another aspect to emphasize is the variability in miRNA expression and their rapid and dynamic temporal expression patterns that can modulate the ability of mammary epithelial cells to mobilize the innate immune system. miRNA and biotechnology ======================= Lactoglobulin (LGB) is the major whey protein in ruminants whereas human milk contains no LGB ([@b6-gmb-36-465]). This difference in milk composition accounts for some of the milk allergy problems in infants. LGB intolerance in infants has been known since 1965 ([@b14-gmb-36-465]). One strategy to reduce the allergenic potential of milk is to produce LGB-free milk. In pigs, [@b46-gmb-36-465] reported the effectiveness of short hairpin RNAs and artificial miRNAs in blocking LGB. [@b27-gmb-36-465] designed a successful strategy to block LGB synthesis by constructing a transgenic cow that expressed a tandem miRNAs construct (miRNA 6 and miRNA 4) against bovine LGB (see [Figure 3](#f3-gmb-36-465){ref-type="fig"}). By controlling the artificial miRNAs through a lactation-specific-promoter it is possible to express miRNAs only during the lactation period when LGB is being produced. The analysis of milk samples by SDS-PAGE and HPLC showed that milk from miRNA 4 and 6 calves contained no LGB, but there was a strong, compensatory effect on the levels of other milk proteins. Consequently, artificial miRNAs could be an alternative for abolishing the production of specific proteins ([@b27-gmb-36-465]). Stability of miRNA in milk ========================== One of the interesting features of miRNAs is their stability. miRNAs are resistant to acidic conditions, digestion by RNAse, incubation at room temperature and various freeze/thaw cycles ([@b24-gmb-36-465]; [@b32-gmb-36-465]; [@b22-gmb-36-465]; [@b26-gmb-36-465]; [@b66-gmb-36-465]). In milk, this resistance to degradation is explained by the fact that miRNAs are contained in exosomes or microvesicles. Treatment with Triton-X, a detergent that disrupts lipid membranes, results in the degradation of miRNAs by RNAse ([@b65-gmb-36-465]). The resistance to acidic conditions ensures passage through the stomach and absorption into the bloodstream, and this in turn allows the exchange of genetic information between mother and offspring. An important recent finding is the isolation of miRNAs from industrially processed foods for infants ([@b26-gmb-36-465]). This raises new questions about the possible role that cow miRNAs could have in the end-consumer, especially children. Could cross-species miRNAs have an epigenetic role? In this regard, the study by [@b64-gmb-36-465] have provided interesting results regarding cross-kingdom transmission and regulation since these authors isolated a plant miRNA (miRNA168a) from the blood of mice fed with rice. They also demonstrated that this miRNA could bind to low density lipoprotein receptor adapter 1 mRNA in liver and that this binding led to a decrease in low density proteins in mouse plasma. This plant-derived miRNA was also identified in people consuming a rice-based diet. Even though plant and animal miRNAs have undergone independent evolutionary adaptations and are unrelated ([@b5-gmb-36-465]), these findings show that plant miRNA can still exert a cross-kingdom effect. The identification of cross-kingdom miRNA transmission raises significant questions. To what extent can miRNAs present in the diet regulate mammalian genes? How many miRNAs are incorporated through a normal diet? What are the effects of these miRNAs in health and disease? Milk provides a variety of bioactive components such as lactoferrin, defensin and immunoglobulin. In this regard, miRNAs represent yet another group of molecules transported by milk that could influence the immunological system in neonates. Conclusion ========== The identification of small non-coding RNAs has provided new insights into cell regulation and intercellular communication. Studies of the mammary gland in lactation and mastitis show that the temporal expression of miRNAs regulates the innate immune system. The discovery of cross-species and cross-kingdom miRNA regulation provides a basis for new research into the regulatory mechanisms involved and the impact of epigenetic regulation. As stated by [@b64-gmb-36-465]: "like vitamins, minerals and other essential nutrients derived from food sources, plant (or milk) miRNAs may serve as a novel functional component of food and make a critical contribution to maintaining and shaping animal body structure and function". We are in an exciting time of new discoveries and a new understanding of gene regulation and epigenetic effects. Future research will improve our understanding of the role of miRNAs in health and disease and their importance as food resources. Associate Editor: Carlos F.M. Menck ![A schematic representation of the canonical biogenesis of miRNA. Initially, a long hairpin-shaped (pri-miRNA) is transcribed by RNA polymerase II and then cleaved by Drosha (to yield pre-miRNA) prior to leaving the nucleus; the molecule is subsequently cleaved by a Dicer enzyme to yield double-stranded mature miRNA. Finally, miRNA is incorporated into the RNA-induced silencing complex (RISC), thereby allowing separation of the functional strand that interferes with mRNA by repressing translation or cleaving mRNA.](gmb-36-465-g001){#f1-gmb-36-465} ![Diagram of the mammary epithelial cell response to infection by *Streptococcus uberis in vivo* and *in vitro*. (A) Mammary alveolus showing (a) epithelial cells, (b) myoepithelial cells, (c) basement membrane, (d) extracellular matrix and (e) capillary. In the alveolar lumen: (f) bacterial infiltration and (g) neutrophil infiltration. The accompanying box shows that 12 h after inoculation with *S. uberis* there was a decrease in the expression of miRNAs 15b, 16a, 31, 145 and 181a and an increase in miRNA 223 to modulate the inflammatory response ([@b48-gmb-36-465]). (B) Mammary epithelial cells inoculated with *S. uberis*. No changes were observed at 1 h but there was an increase in miRNAs 29e and 708 at 2 h, an increase in miRNAs 7b and 98 and a decrease in miRNAs 29b-2, 193 and 130a at 4 h and, finally, an increase in 12 miRNAs (7b, 7d, 7e, 200c, 210, 24-2, 128-2, 128-1, 185, 652, 494 and 2342) concomitantly with a decrease in miRNA 29b2, 29e, 29c, 100 and 130a at 6 h ([@b35-gmb-36-465]).](gmb-36-465-g002){#f2-gmb-36-465} ![*Bos taurus* lactoglobulin B (LGB) mRNA sequence (GenBank accession number BC108213.1) showing the positions of miRNA6 and miRNA4 that targeted LGB, as designed by [@b27-gmb-36-465]. The numbers refer to the nucleotide positions.](gmb-36-465-g003){#f3-gmb-36-465} ###### Total number of miRNAs reported in colostrum, milk and mammary gland in cow, goat and sheep. Number of miRNAs Methods Reference ------- ------------------ --------- ----------- --------------------------------- ------------------- Cow 230 213 Solexa deep sequencing analysis [@b12-gmb-36-465] Cow 921 Solexa deep sequencing analysis [@b44-gmb-36-465] Goat 100 53 Microarray-real time PCR [@b26-gmb-36-465] Goat 328 Solexa deep sequencing analysis [@b29-gmb-36-465] Goat 180 441 Solexa deep sequencing analysis [@b43-gmb-36-465] Sheep 101 cDNA sequencing [@b18-gmb-36-465] ###### Summary of miRNA expression in mammary gland, mammary epithelial cell lines and milk in cow and sheep. miRNA Tissue or biological fluid Species Expression level Reference ------------- ---------------------------- ----------- --------------------------------------------------------------------------- --------------------------------------------------------- miRNA 7b Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 7d Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 7e Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 10a MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 15a MECL Cow Elevated in transfected cells [@b41-gmb-36-465] miRNA 15b MGT Cow Elevated in lactation and reduced in mastitis [@b59-gmb-36-465]; [@b48-gmb-36-465] miRNA 16 MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 16a MGT Cow Reduced in mastitis [@b48-gmb-36-465] miRNA 21 MGT Cow/sheep Elevated in cow during lactation and in sheep during early pregnancy [@b18-gmb-36-465]; [@b59-gmb-36-465] miRNA 24-2 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 29-b2 Milk Cow Reduced in mastitis [@b35-gmb-36-465] miRNA 29c Milk Cow Reduced in mastitis [@b35-gmb-36-465] miRNA 29e Milk Cow Elevated and then reduced in mastitis [@b35-gmb-36-465] miRNA 31 MGT/milk Cow Reduced in lactation and mastitis [@b59-gmb-36-465]; [@b48-gmb-36-465]; [@b35-gmb-36-465] miRNA 33b MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 98 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 100 Milk Cow Reduced in lactation [@b35-gmb-36-465] miRNA 128-1 Milk Cow Elevated in lactation [@b35-gmb-36-465] miRNA 128-2 Milk Cow Elevated in lactation [@b35-gmb-36-465] miRNA 130a MGT Cow Reduced in mastitis [@b35-gmb-36-465] miRNA145 MGT Cow Elevated in lactation and reduced in mastitis [@b59-gmb-36-465]; [@b48-gmb-36-465] miRNA 146b MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 148a Milk Cow Elevated in lactation [@b12-gmb-36-465] miRNA 155 MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 181a MGT Cow Elevated in lactation and reduced in mastitis [@b59-gmb-36-465]; [@b48-gmb-36-465] miRNA 185 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 193a MGT Cow Reduced in mastitis [@b35-gmb-36-465] miRNA 200 MGT Sheep Elevated in lactation [@b18-gmb-36-465] miRNA 200c MGT/milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 205 MGT Cow/sheep Elevated in cow lactation and mastitis and second half of sheep pregnancy [@b18-gmb-36-465]; [@b59-gmb-36-465] miRNA 210 MGT/milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 221 MGT Cow Elevated in lactation [@b59-gmb-36-465] miRNA 223 MGT Cow Elevated in lactation and mastitis [@b59-gmb-36-465]; [@b48-gmb-36-465] miRNA 494 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 652 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 708 Milk Cow Elevated in mastitis [@b35-gmb-36-465] miRNA 2342 Milk Cow Elevated in mastitis [@b35-gmb-36-465] ECL: mammary epithelial cell line, MGT: mammary gland tissue.
New York-based Rialto Pictures will release John Carpenter’s horror movie “The Fog” on Oct. 26 in its first-ever major restoration, (via Variety) “The Fog,” which has received a full 4K restoration from StudioCanal, will open for limited runs at the Metrograph in New York, Landmark’s Nuart Theatre in Los Angeles, and the Music Box Theatre in Chicago. Additional screenings will occur during Halloween week throughout the Alamo Drafthouse circuit and other specialty theaters. “The Fog” was released in 1980 as Carpenter’s first title after “Halloween.” He directed, co-wrote the screenplay, and created the music for the film. “The Fog” tells the story of a strange, glowing fog that sweeps over a small coastal town in California, bringing with it the vengeful ghosts of mariners who were killed in a shipwreck 100 years before. The pic was remade in 2005. HorrorFan is a non profit FANSITE created to provide information and up to date news about horror movies. We are in no way affiliated with any actor, family or management of the movies we share. The material used in the fansite is not owned by us, unless explicitly stated. If you own any images or resources present on this site, please contact us immediately to take it down. We take cases like this very seriously.
Government To Pay You $3,000 To Get Flu As part of an effort to create a better flu vaccine, the National Institutes of Health announced it will pay 100 individuals up to $3,000 each to volunteer to have the flu virus sprayed into their nostrils so that they become sick and then observe them over the next nine days in a hospital. What do you think? “Could they make it so I can eat the flu like a hamburger?” Mary Pinza – Unemployed “If you truly love getting sick like I do, you don’t do it for the money.”
@using System.Globalization @using Microsoft.Azure.Devices.Applications.RemoteMonitoring.Common.Extensions @using Microsoft.Azure.Devices.Applications.RemoteMonitoring.Common.Helpers @using Microsoft.Azure.Devices.Applications.RemoteMonitoring.DeviceAdmin.Infrastructure.Models @using Microsoft.Azure.Devices.Applications.RemoteMonitoring.DeviceAdmin.Web.Helpers @using GlobalResources @model Microsoft.Azure.Devices.Applications.RemoteMonitoring.DeviceAdmin.Web.Models.DeviceDetailModel @{ DateTime? resolvedDate; var tags = Model.DevicePropertyValueModels.Where(m => m.Name.StartsWith("tags.") && !m.Name.IsReservedTwinName()); var desiredProperties = Model.DevicePropertyValueModels.Where(m => m.Name.StartsWith("properties.desired.") && !m.Name.IsReservedTwinName()); var reportedProperties = Model.DevicePropertyValueModels.Where(m => m.Name.StartsWith("properties.reported.") && !m.Name.IsReservedTwinName()); var deviceProperties = Model.DevicePropertyValueModels.Except(tags).Except(desiredProperties).Except(reportedProperties).Where(m => !m.Name.IsReservedTwinName()); var utcNow = DateTime.UtcNow; } <div class="header_grid header_grid_general"> <h3 class="grid_subheadhead_detail grid_subheadhead">@Strings.DeviceTwin</h3> <img src="~/Content/img/icon_info_gray.svg" class="details_grid_info" title="@Strings.DeviceTwinHeader" /> @Html.ActionLink(@Strings.DownloadTwinJson, "DownloadTwinJson", "Device", new { deviceId = Model.DeviceID }, new { id = "download_link", @class = "link_grid_subheadhead_detail", @style = "margin-top: 1ch;" }) </div> <hr class="details_grid_twin_begin_line" /> <div class="header_grid_left_space"> <div class="header_grid header_grid_general"> <img id="tagClose" src="~/Content/img/expanded.svg" class="details_grid_info pull-left cursor_pointer tag_toggle_target tag_toggle_source" /> <img id="tagOpen" src="~/Content/img/collapsed.svg" class="details_grid_info pull-left cursor_pointer display_none tag_toggle_target tag_toggle_source" /> <h3 class="grid_subheadhead_detail_collapsable cursor_pointer tag_toggle_source">@Strings.Tags</h3> @if (Model.IsDeviceEditEnabled) { @Html.ActionLink(@Strings.Edit, "EditTags", "Device", new { deviceId = Model.DeviceID }, new { id = "edit_tags_link", @class = "link_grid_subheadhead_detail", }) } </div> <section class="details_grid_general tag_toggle_target" id="tagsGrid"> @if (tags.Any()) { foreach (var val in tags) { <h4 class="grid_subhead_detail_label">@val.Name.Substring(5)</h4> if (val.PropertyType == PropertyType.DateTime && (resolvedDate = DynamicValuesHelper.ConvertToDateTime(CultureInfo.InvariantCulture, val.Value)).HasValue) { <p class="grid_detail_value" name="tagField_@val.Name">@resolvedDate.Value.ToString()</p> } else { <p class="grid_detail_value" name="tagField_@val.Name">@val.Value</p> } } } else { <p class="grid_detail_value">@Strings.NoTags</p> } </section> <div class="header_grid header_grid_general"> <img id="desiredPropertyClose" src="~/Content/img/expanded.svg" class="details_grid_info pull-left cursor_pointer desiredproperty_toggle_target desiredproperty_toggle_source" /> <img id="desiredPropertyOpen" src="~/Content/img/collapsed.svg" class="details_grid_info pull-left cursor_pointer display_none desiredproperty_toggle_target desiredproperty_toggle_source" /> <h3 class="grid_subheadhead_detail_collapsable cursor_pointer desiredproperty_toggle_source">@Strings.DesiredProperties</h3> @if (Model.IsDeviceEditEnabled) { @Html.ActionLink(@Strings.Edit, "EditDesiredProperties", "Device", new { deviceId = Model.DeviceID }, new { id = "edit_desiredProperties_link", @class = "link_grid_subheadhead_detail", }) } </div> <section class="details_grid_general desiredproperty_toggle_target" id="desiredPropertiesGrid"> @if (desiredProperties.Any()) { foreach (var val in desiredProperties) { <h4 class="grid_subhead_detail_label">@val.Name.Substring(19)</h4> <div> <p class="grid_detail_value" name="desiredPropertyField_@val.Name"> @if (val.PropertyType == PropertyType.DateTime && (resolvedDate = DynamicValuesHelper.ConvertToDateTime(CultureInfo.InvariantCulture, val.Value)).HasValue) { @resolvedDate.Value.ToString() } else { @val.Value } <span class="grid_detail_lastUpdated pull-right" name="desiredPropertyField_lastUpdated_@val.Name">@TimeSpanExtension.ToFloorShortString(utcNow - val.LastUpdatedUtc, Strings.LastUpdatedFormatString)</span> </p> </div> } } else { <p class="grid_detail_value">@Strings.NoDesiredProperties</p> } </section> @if (reportedProperties.Any()) { <div class="header_grid header_grid_general"> <img id="reportedPropertyClose" src="~/Content/img/expanded.svg" class="details_grid_info pull-left cursor_pointer reportedproperty_toggle_target reportedproperty_toggle_source" /> <img id="reportedPropertyOpen" src="~/Content/img/collapsed.svg" class="details_grid_info pull-left cursor_pointer display_none reportedproperty_toggle_target reportedproperty_toggle_source" /> <h3 class="grid_subheadhead_detail_collapsable cursor_pointer reportedproperty_toggle_source">@Strings.ReportedProperties</h3> </div> <section class="details_grid_general reportedproperty_toggle_target" id="reportedPropertiesGrid"> @foreach (var val in reportedProperties) { <h4 class="grid_subhead_detail_label">@val.Name.Substring(20)</h4> <div> <p class="grid_detail_value" name="reportedPropertyField_@val.Name"> @if (val.PropertyType == PropertyType.DateTime && (resolvedDate = DynamicValuesHelper.ConvertToDateTime(CultureInfo.InvariantCulture, val.Value)).HasValue) { @resolvedDate.Value.ToString() } else { @val.Value } <span class="grid_detail_lastUpdated pull-right" name="reportedPropertyField_lastUpdated_@val.Name">@TimeSpanExtension.ToFloorShortString(utcNow - val.LastUpdatedUtc, Strings.LastUpdatedFormatString)</span> </p> </div> } </section> } </div> <hr class="details_grid_twin_end_line" /> <div class="grid_subheadhead_left_space"> <div class="header_grid header_grid_general"> <img id="deviceDetailsClose" src="~/Content/img/expanded.svg" class="details_grid_info cursor_pointer devicedetails_toggle_target devicedetails_toggle_source" /> <img id="deviceDetailsOpen" src="~/Content/img/collapsed.svg" class="details_grid_info cursor_pointer display_none devicedetails_toggle_target devicedetails_toggle_source" /> <h3 class="grid_subheadhead cursor_pointer devicedetails_toggle_source">@Strings.DeviceProperties</h3> </div> <section class="details_grid_general devicedetails_toggle_target" id="deviceDetailsGrid"> @foreach (var propVal in deviceProperties) { <h4 class="grid_subhead_detail_label">@DeviceDisplayHelper.GetDevicePropertyFieldLocalName(propVal.Name)</h4> if (DeviceDisplayHelper.GetIsCopyControlPropertyName(propVal.Name)) { string classname = "text_copy_container__input--details_grid"; string class_styles_modifier = "text_copy_container--details_grid"; string button_style_modifier = "details_grid_general__copy_button"; @IoTHelpers.TextCopy(propVal.Name, classname, propVal.Value, class_styles_modifier, button_style_modifier); } else { if ((propVal.PropertyType == PropertyType.DateTime) && (resolvedDate = DynamicValuesHelper.ConvertToDateTime(CultureInfo.InvariantCulture, propVal.Value)).HasValue) { <p class="grid_detail_value" name="deviceField_@propVal.Name">@resolvedDate.Value.ToString()</p> } else { <p class="grid_detail_value" name="deviceField_@propVal.Name">@propVal.Value</p> } } } @if (Model.HasKeyViewingPerm) { <p class="grid_detail_value"> <a href="#" id="deviceExplorer_authKeys" class="not_disable">@Strings.ViewAuthenticationKeys</a> </p> } </section> <div class="header_grid header_grid_general"> <img id="jobClose" src="~/Content/img/expanded.svg" class="details_grid_info cursor_pointer job_toggle_target job_toggle_source" /> <img id="jobOpen" src="~/Content/img/collapsed.svg" class="details_grid_info cursor_pointer display_none job_toggle_target job_toggle_source" /> <h3 class="grid_subheadhead cursor_pointer job_toggle_source">@Strings.RecentJobs</h3> </div> <section class="details_grid_general job_toggle_target" id="deviceJobGrid"> <div id="deviceJobLoadingElement" class="loader_container_panel"> <div class="loader_container__loader loader_container__loader--large_top_margin" /> </div> </section> </div> <script type="text/javascript"> (function () { 'use strict'; IoTApp.DeviceDetails.loadDeviceJobs("@Model.DeviceID"); })(); </script>
I am 63 years old. As long as I can remember this was in my grandfathers basement in Baltimore. I've heard of American Beer. What I want to know is how old it is and is there any value in it. It measures 13" X 19". Thanks for any help. Comments You don't say what it is made of -- and look to see if there is a mark on it that says who made it. Might have a date too. Looks like plaster/chalk. Looks to be in excellent condition. A similar one sold on ebay for $33, but yours is much nicer. I'd estimate $75-$100 value. History of American Brewery: Built in 1887 by John Frederick Wiessner, a German immigrant, the American Brewery in East Baltimore was one of the largest breweries in the state of Maryland. At its peak, the brewery employed 61 workers; 16 in brewery work, 17 drivers, 14 bottling house, 8 garage men, and 6 office workers.[3] The central tower of the building housed a 10,000 bushel grain elevator.[4] Prohibition forced the shut down of the facility in 1920. The Weissner family sold the brewery to the American Malt Company in 1931,[5] who modernized the interior equipment and operated the brewery until 1973.
Epp & AssociatesLand Surveying Epp & Associates is a Land Surveying firm located in Craig, Colorado with over 55 years of surveying experience. We are licensed in Colorado and New Mexico, and provide a wide range of surveying services using state of the art equipment. Contact us today to ask how we can help with your next project.
MSNBC’s All In With Chris Hayes – Sun Block GFA’s Nikki Silvestri joins Chris Hayes to talk about attempts to kill solar power, the single biggest threat to the fossil fuel industry and those who profit from it — including ALEC and the Koch brothers.
package org.spigotmc; /** * FINDME * * @author Hexeption admin@hexeption.co.uk * @since 11/11/2019 - 08:06 am */ public interface FINDME { }
Growing up I ate the peppery root once a year, when a scoop of white or beet-stained prepared horseradish played a starring role as the "bitter herb" at my family's Passover seder. Today, the pungent, nose-tickling condiment immediately conjures up thoughts of springtime, my parents' dining room table, and how my brother and I would compete to see who could eat the most horseradish without crying. Recently though, while having brunch with friends, I discovered horseradish being used in an entirely unfamiliar context: as a mix-in to scrambled eggs. Was it a life changing meal? Not particularly. But it was delicious, and the experience got me thinking that maybe horseradish deserved year-round attention. With other fiery condiments like wasabi increasingly gaining favor in American kitchens, now seems like a perfect time for a horseradish renaissance. Native to Eastern Europe, horseradish is relative to mustard greens, broccoli rabe and, yes, radishes. It is a particularly ugly thing — not much more than a dry and gnarled brown root — and for centuries it was used only in medicinal contexts before catching on as a culinary ingredient. My Lithuanian ancestors likely ate it as a topping on fish, cold meat, and kugel. And by the late 1600s, horseradish had traveled to central and western Europe, where Englanders favored it as a pairing for beef and oysters. They knew then what I'm learning now: despite its fierce bite, horseradish is a surprisingly versatile ingredient. Particularly when left raw (heat mellows the spiciness), it makes a natural companion to red meat and creamy root vegetable soups, where its heat cuts through the dishes' richness. It also perks up lighter fare from springtime salad dressings to pickled beets and eggs, adds a little kick to certain sweet dishes like applesauce, and is a classic mix-in to drinks like the bloody Mary. *DISCLAIMER*: The information contained in or provided through this site section is intended for general consumer understanding and education only and is not intended to be and is not a substitute for professional advice. Use of this site section and any information contained on or provided through this site section is at your own risk and any information contained on or provided through this site section is provided on an "as is" basis without any representations or warranties.
FILED July 27, 2016 TENNESSEE WORKERS ' COMPENSATION APPEALS BOARD Time: 1 :04 P.M. TENNESSEE BUREAU OF WORKERS' COMPENSATION WORKERS' COMPENSATION APPEALS BOARD Lazaro Valladares ) DocketNos. 2015-01-0117 ) 2015-01-0118 v. ) ) Transco Products, Inc., et al. ) State File Nos. 91964-2014 ) 39859-2014 and ) ) Williams Specialty Services, LLC, et al. ) ) and ) ) Abigail Hudgens, Administrator of the ) Bureau of Workers' Compensation, ) Second Injury Fund ) ) Appeal from the Court of Workers' ) Compensation Claims, ) Thomas Wyatt, Judge ) Affirmed and Remanded - Filed July 27, 2016 In these consolidated interlocutory appeals, an employer and the Second Injury Fund present procedural issues questioning the trial court's denial of motions to dismiss the employee's claims and motions to alter or amend status conference orders. Additionally, the Second Injury Fund questions the trial court's authority to set a scheduling hearing sua sponte. Following a show cause hearing, which was set when no party requested a hearing within sixty days after the filing of dispute certification notices, the trial court held a status conference that resulted in the employee's being allowed more time to file a request for an expedited hearing. The trial court's orders instructed the parties to participate in a second status conference if the employee did not file a request for an expedited hearing by a specified date. Following a hearing on motions for dismissal and other motions by the employers and the Second Injury Fund, the trial court denied the motions and set a scheduling hearing. One employer and the Second Injury Fund have appealed. We affirm the trial court' s denial of the various motions and remand the case for further proceedings as may be necessary. 1 Judge Timothy W. Conner delivered the opinion of the Appeals Board, in which Judge Marshall L. Davidson, III, joined. Judge David F. Hensley filed a separate concurring opm10n. Allison Lowry, Knoxville, Tennessee, for the appellant, Second Injury Fund Joseph Ballard, Atlanta, Georgia, for the employer-appellant, Transco Products, Inc. Chadwick Rickman, Knoxville, Tennessee, for the employee-appellee, Lazaro Valladares David Weatherman, Memphis, Tennessee for the employer, Williams Specialty Services, LLC Factual and Procedural Background On May 27, 2015, Lazaro Valladares ("Employee") filed two petitions for benefit determination with the Bureau of Workers' Compensation ("Bureau"). In the first petition, he alleged he slipped on gravel and fell on October 2, 2014, resulting in work- related injuries to his left arm, low back, and body while in the employment of Specialty Services, LLC ("Specialty Services"). In the second petition, he alleged he slipped and fell in the rain on November 5, 2014, while in the employment of Transco Products, Inc. (" ransco Products"), which caused work-related injuries to his right leg, left shoulder, 2 and body. 1 Both petitions included the Second Injury Fund ("SIF") as a party. Employee alleged he reported both injuries to his employers. He apparently neither sought nor received medical care following the October 2, 2014 incident. After reporting the second incident, he was provided a panel of physicians by Transco Products. 3 He was seen twice by Dr. Rickey Hutcheson, the physician he selected from the panel, but he declined to return to Dr. Hutcheson after the second visit and requested that he be provided a different physician. Since that time, Employee has received medical care from a physician he selected on his own who was not authorized by Specialty Services or Transco Products. Except for Employee's indication that he has had surgery on his cervical spine, there is no information in the record regarding the nature or extent of Employee's medical treatment. 1 No testimony has been given in this case and no affidavits or declarations made under penalty of perjury have been filed with the trial court. Accordingly, the limited facts presented herein are taken from the documents filed with the Bureau that are included in the technical record on appeal. 2 The two claims were consolidated by the trial court. 3 In numerous places throughout the record, reference is made to Employee's not having been provided a panel of physicians. However, it appears to be undisputed that he was given a panel as a result of his second alleged injury and that he chose a physician from that panel. 2 Following the filing of the petitions and unsuccessful efforts to resolve the claims through the Bureau's mediation process, dispute certification notices were filed on July 20, 2015. Because no party filed a request for hearing in either claim within 60 days of the filing of the dispute certification notices, on November 24, 2015, the claims were placed on a dismissal calendar for a show cause hearing, which was scheduled for December 21, 2015. 4 At Employee's request, the parties agreed to continue the show cause hearing to January 12, 2016. Following the hearing, the trial court issued show cause orders that extended the time for Employee to decide how to proceed until January 29, 2016 and scheduled a status conference for that date. These orders required Employee's attorney to inform the court during the January 29, 2016 status conference how Employee intended to proceed and addressed the dates by which requests for an expedited hearing or an initial hearing were to be made: If [Employee's attorney] informs the Court at the Status Conference that his client intends to file a Request for Expedited Hearing, the Court will enter an order requiring that he file the Request for Expedited Hearing within five business days from January 29, 2016, or, failing such, his claim will be dismissed without prejudice. If [Employee's attorney] informs the Court at the Status Conference that his client requests an Initial (Scheduling) Hearing, the Court will schedule [the claims] for a Compensation Hearing. Following the January 29, 2016 status conference, orders were entered noting Employee's request for additional time to obtain an expert medical opinion and the SIF's objection to the request and its own requests that the court schedule a compensation hearing. The trial court granted Employee until February 29, 2016 to file requests for expedited hearings, stating in its February 5, 2016 orders that "[i]f [Employee] has not filed a Request for Expedited Hearing on or before February 29, 2016, the parties shall call . . . on March 10, 2016, to schedule a Compensation Hearing and the attendant deadlines." In addition, the orders provided that, should Employee file requests for expedited hearings on or before February 29, 2016, "the Court will not conduct the scheduling conference on March 10, 2016." The orders allowed the parties "to engage in discovery at this time .... " The February 5, 2016 orders were not appealed. Employee did not file a request for a hearing, and on March 4, 2016, the court clerk issued docketing notices setting an initial hearing on March 10, 2016. However, prior to the March 10 hearing, but more than 30 days after entry of the February 5, 2016 4 See Tenn. Comp. R. & Regs. 0800-02-21-.12( 1) (2015) ("Immediately after a dispute certification notice has been filed with the clerk, either party seeking further resolution of any disputed issues shall file a request for a hearing .... If no request for hearing is filed within sixty (60) calendar days after the date of issuance of the dispute certification notice, the clerk shall docket the case and place the case on a separate dismissal calendar for a show cause hearing.") 3 status conference order, the SIF filed a motion to alter or amend the February 5, 2016 status conference order and for entry of a dismissal order. The SIF contended in its motion that the trial court had no authority to set an initial hearing, arguing that "since no request for hearing has been filed, it is the position of the SIF that this matter can only be set sua sponte by this Court for a Show Cause hearing." The SIF requested the trial court to "alter or amend its Status Conference Orders insofar as those Orders [and the subsequent Docketing Notices] set this matter for an initial/scheduling conference on March 10, 2016, and instead set this matter for a final show cause hearing on that date for entry of an Order of Dismissal in accordance with this Court's Order of January 13, 2016 .... " (Brackets in original.) On March 8, 2016, the SIF filed a "Motion to Set Final Show Cause Hearing on March 10, 2016, or, in the Alternative, to Continue Initial Hearing." On the same date, the SIF filed a "Supplemental Motion to Alter or Amend Status Conference Orders and to Set for Final Show Cause Hearing." The SIF again asserted in its motions that "since no request for hearing has been filed, it is the position of the SIF that this matter can only be set sua sponte by this Court for a Show Cause hearing." The SIF requested that, rather than conduct an initial/scheduling conference on March 10, 2016, the court "instead set this matter for a final show cause hearing on that date." At the March l 0, 2016 hearing, the parties announced they were in agreement to continue the initial/scheduling hearing. Based on the parties' discussions with the court, the court continued "the Initial (Scheduling) Hearing" to March 29, 2016 and allowed "[a]ny party wishing to file written opposition to the [SIF's] motions [to] do so no later than March 22, 2016." The trial court's March 11, 2016 order stated that Employee's counsel "shall further report on his client's medical progress during the ... hearing." Additionally, the court's order stated that the court "informed counsel that, at the motion hearing, they should announce their clients' positions as to whether a bifurcated hearing on the disputed legal/causation issues in these claims is in order to move this claim forward more expeditiously." Thereafter, Transco Products filed a motion to dismiss pursuant to Rule 12 of the Tennessee Rules of Civil Procedure, asserting that the dispute certification notice filed in the claim against it limited the issues to "whether Employee is entitled to a second opinion following the selection of his authorized treating physician." Contending Employee was not entitled to a second opinion, Trancso Products asserted that Employee could not prevail against it without such opinion and that the claim against it should, therefore, be dismissed. Specialty Services likewise filed a motion to dismiss asserting "the mere fact that Employee fell at work is not sufficient to maintain an action against (Specialty Services] when there is no evidence of any resulting injury." In addition, Specialty Services adopted the SIF's motion to dismiss. Alternatively, Specialty Services moved the court for a more definite statement of the claims asserted against it. 4 Employee filed a response to the SIF's motions, requesting that the trial court "schedule these matters for a Compensation Hearing." Because both employers filed potentially dispositive motions, to which the Practices and Procedures of the Court of Workers' Compensation Claims allows an employee thirty days to respond, the trial court issued a docketing notice on April 11, 2016 scheduling an in-person hearing to address all pending motions on May 18, 2016. On the scheduled hearing date, Employee filed a response to Transco Products' motion to dismiss, requesting again that the trial court "schedule this matter for a Compensation Hearing." Following the May 18, 2016 hearing, the trial court entered an order denying the SIF's motion to alter or amend the status conference orders. The trial court determined that "it is not required to await a party's request for an Initial (Scheduling) Hearing, but may schedule an Initial (Scheduling) Hearing sua sponte if it deems such is necessary to move a case toward an efficient and timely conclusion." Additionally, the trial court determined the SIF's argument for dismissal of Employee's claim was based on "an incorrect interpretation of the Court's January 13, 2016 order," and was without merit. Finally, the trial court set an initial hearing for June 15, 2016 "at which time it will schedule the Compensation [Hearing] and attendant deadlines in these claims." Similarly, the trial court denied Transco Products' motion to dismiss, determining that although "the Court considered Transco's motion unopposed," the lack of opposition to a motion does not require the court to "automatically grant the relief moved for." Determining that Transco Products' Rule 12 motion was "based on the allegation that [Employee's] [petition for benefit determination] ... failed to state a claim recognized by law," the trial court concluded that Employee provided "a short and plain statement communicating that he sought workers' compensation benefits for the described work- related injury." The trial court also determined that the dispute certification notice did not limit his request for relief to a second medical opinion, but sought "a new treating physician and, potentially, other remedies for Transco's failure to provide him a panel of physicians." The trial court considered "it appropriate to review the [dispute certification notice] in considering whether [Employee] has sufficiently stated a claim," and concluded that "[c]learly, [Employee] seeks remedies other than a second opinion." The trial court also denied Specialty Services' motion to dismiss and its motion to alter or amend the status conference orders. However, in light of Employee's counsel's agreement during the May 18 hearing, the trial court granted Specialty Services' motion for a more definite statement, ordering that Employee "file ... a more definite statement regarding the alleged injury he sustained in the course and scope of his employment [with Specialty Services]." On June 7, 2016, the SIF filed a motion to stay the proceedings pending an appeal, asserting that "[i]n the event the Appeals Board modifies or reverses [the trial court's] interlocutory order, it would be in the interest of judicial economy and efficiency to stay 5 the Initial Hearing and further proceedings in this Court until prompt resolution of the appeal." The trial court granted the motion and stayed "all further proceedings in these claims pending the completion of the [SIF's] appeal" and cancelled "the Initial (Scheduling) Hearing scheduled for June 15, 2016." Both the SIF and Transco Products have appealed. Standard of Review The standard we apply in reviewing a trial court's decision is statutorily mandated and limited in scope. Specifically, "[t]here shall be a presumption that the findings and conclusions of the workers' compensation judge are correct, unless the preponderance of the evidence is otherwise." Tenn. Code Ann. § 50-6-239(c)(7) (2015). The trial court's decision must be upheld unless the rights of a party "have been prejudiced because findings, inferences, conclusions, or decisions of a workers' compensation judge: (A) Violate constitutional or statutory provisions; (B) Exceed the statutory authority of the workers' compensation judge; (C) Do not comply with lawful procedure; (D) Are arbitrary, capricious, characterized by abuse of discretion, or clearly an unwarranted exercise of discretion; or (E) Are not supported by evidence that is both substantial and material in the light of the entire record." Tenn. Code Ann. § 50-6-217(a)(3) (2015). Like other courts applying the standards embodied in section 50-6-217(a)(3), we will not disturb the decision of the trial court absent the limited circumstances identified in the statute. Analysis Transco Products 'Appeal In its brief on appeal, Transco Products raises two issues, which we have restated as whether the trial court erred in allowing Employee to present oral argument at the May 18, 2016 hearing in opposition to Transco Products' motion to dismiss, and whether the trial court erred in determining that Employee sufficiently stated a claim for relief. We find no merit in either issue. Whether Trial Court Erred in AlJowing Oral Argument Opposing Transco Products' Motion to Dismiss Rule 4.0l(B) of the Practices and Procedures of the Court of Workers' Compensation Claims provides the following guidance with respect to the time within which a party must respond to a dispositive motion: 6 If a dispositive motion is opposed, a response to the motion must be filed and served . . . on or before thirty calendar days after the filing of the dispositive motion. The response shall be in writing and shall state with particularity the grounds for the opposition. If no opposition is, filed, the dispositive motion will be considered unopposed. Employee filed a response to Transco Products' March 18, 2016 motion to dismiss the morning of the May 18, 2016 hearing, which was significantly more than 30 days after the filing of the dispositive motion. Transco Products objected to the late filing, and the trial court refused to consider the written filing, stating it was "going to consider the motion to be unopposed" in accordance with Rule 4.0l(B). Nonetheless, the trial court allowed Employee's counsel to argue his position at the hearing and granted Transco Products' request for time to respond in writing to the Employee's oral argument. However, in its June 2, 2016 order denying the motion to dismiss, the court noted that it "does not consider the term 'unopposed' as used in Rule 4.0l(B) as a requirement that it automatically grant the relief moved for. The moving party must still show entitlement under the law to the relief moved for." The trial court did not address Employee's oral argument in its order denying the motion to dismiss, but determined that the motion to dismiss was based on Employee's alleged failure to state a claim for relief under Rule 12.02(6) of the Tennessee Rules of Civil Procedure. Transco Products asserts on appeal that "if any rational[] basis exists to grant an unopposed motion, the Trial Court is bound to grant said motion." Transco Products has cited no authority in support of this argument. Neither Rule 4.0l(B) nor any other applicable rule prohibits a trial court from deciding motions on their merits. Likewise, the Bureau's regulations do not prohibit a trial court from considering the merits of an unopposed motion. Cf Rochelle v. Oscar Mayer Foods Corp., No. 01-S-01-9207-CH- 00087, 1992 Tenn. LEXIS 748, at *12 (Tenn. Workers' Comp. Panel Jan. 19, 1993) (Local rules of practice requiring a response to an opposed motion to be filed and providing that the court may dispose of the motion as unopposed if no response is filed "do[] not prohibit any court from deciding questions on their merits."). Accordingly, under the circumstances presented, we discern no error in the trial court's allowing Employee to orally express his opposition to Transco Products' motion to dismiss at the hearing. We also find no error in the trial court's decision to consider the merits of the motion despite the lack of a written response. Whether mp loyee Sufficiently Stated a Claim for Relief The second issue Transco Products raises on appeal is whether Employee stated an actionable claim against it. In its brief on appeal, it asserts that "[t]o test the sufficiency of Employee's pleading, [it] filed a Motion to Dismiss to determine whether Employee has set forth a valid claim for which relief can be granted." Noting the trial court's reliance on Trau-Med of Am., Inc. v. Allstate Ins. Co., 71 S.W.3d 691, 696 (Tenn. 2002), 7 and asserting that the trial court "essentially equates Employee's [petition for benefit determination] to the filing of a complaint," Transco Products contends "the sparse facts contained within the [petition for benefit determination], without more, do not survive a Motion to Dismiss." In analyzing this issue, the trial court noted that Employee filed his claim against Transco Products by completing a petition for benefit determination. The trial court observed that "[w]hen read as a whole, [Employee's] petition for benefit determination against Transco states that he injured his 'right leg, left shoulder and body' when he 'slipped and fell in rain while carrying [an] MRI panel' on '11/05/2014."' The court concluded that "the petition for benefit determination filed by [Employee] provided Transco a short and plain statement communicating that he sought workers' compensation benefits for the described work-related injury. Accordingly, Transco is not entitled to dismissal under Rule 12.02(6)." We agree. In order to commence a cause of action within the applicable limitations period, an injured worker must timely file a petition for benefit determination. Tenn. Code Ann. § 50-6-203(b ). A petition for benefit determination is defined as "a request for the [Bureau] to provide assistance in the resolution of any disputed issues in a workers' compensation claim." Tenn. Comp. R. & Regs. 0800-02-21-.02(19) (2015). We have noted that a petition for benefit determination is the general equivalent of a complaint because it initiates the process for resolving disputes whether or not benefits have been paid. See Duck v. Cox Oil Co., No. 2015-07-0089, 2016 TN Wrk. Comp. App. Bd. LEXIS 2 (Tenn. Workers' Comp. App. Bd. Jan. 21, 2016); see also Black's Law Dictionary (6th ed. 1990) (defining a "complaint" as "the original or initial pleading by which an action is commenced" and a "petition" as "a formal written application to a court requesting judicial action on a certain matter."). 5 This means that, when faced with the type of motion to dismiss as was filed in this case, the trial court will consider whether, assuming the truth of the employee's averments, the employee can prove no set of facts entitling him or her to relief. 6 5 In his concurrence, our colleague argues that the filing of a petition for benefit determination and a dispute certification notice "occurs before the point in time at which the Tennessee Rules of Civil Procedure have attached to the process." While we agree with this statement in the abstract, we find nothing in the statute or regulations that prohibits a trial court from examining these filings once the Rules of Civil Procedure are applicable, as they are here, to determine their sufficiency in the context of a pending motion. Moreover, our colleague asserts that "the analysis fails to address the procedure established in the Reform Act for presenting disputed issues to the trial court." We disagree. Nothing in the statute or regulations prohibits a party from utilizing Tenn. R. Civ. P. 15.01 or Tennessee Code Annotated section 50-6-239(b), as applicable, to amend such filings by use of a motion, as opposed to filing a request for expedited hearing. Indeed, the trial court in this case granted an employer's motion for more definite statement, thereby giving the employee an opportunity to amend the allegations in his petition for benefit determination. 6 Tennessee Rule of Civil Procedure 12.02(6) governs motions to dismiss for failure to state a claim upon 8 As noted above, Employee's petition for benefit determination naming Transco Products as a party alleged an injury to his "right leg, left shoulder and body" when he "slipped and fell in rain while carrying [an] MRI panel" on "11/05/2014." He characterized the disputed issue as the "right to medical treatment under Tenn. Code Ann. 50-6-204." He indicated that he had not been provided a panel of physicians, identified the doctor he had seen for the injury, and described the medical care provided to include "x-ray of right leg, MRI." In addition, he indicated that the SIF was involved. The trial court determined Employee's petition sufficiently stated a cause of action and declined to dismiss the case. Taking the assertions in the petition as true for purposes of Rule 12.02(6) as we must, see Bell, 986 S.W.2d at 554, we find no error in the trial court's denial of Transco Products' motion to dismiss. The Second Injury Fund's Appeal The SIF presents two issues on appeal. First, it alleges the trial court erred in setting the cases for an initial hearing when the parties did not request a hearing. Second, it alleges the trial court erred "in failing to dismiss [Employee's] claims in accordance with [the trial court's] prior order(s)." Following the trial court's issuance of the June 2, 2016 order denying the SIF's motions, the SIF filed a motion to stay the proceedings pending its appeal, representing that it would timely appeal the trial court's June 2, 2016 order. The motion to stay the proceedings noted that the trial court's June 2, 2016 order scheduled an initial hearing on June 15, 2016, and asserted that "[i]n the event the Appeals Board modifies or reverses this Court's interlocutory order, it would be in the interest of judicial economy and efficiency to stay the Initial Hearing and further proceedings in this Court until prompt resolution of the appeal." On June 8, 2016, the trial court stayed the proceedings, finding "that a stay of these proceedings serves the interest of judicial economy." The June 8, 2016 order cancelled the June 15, 2016 initial hearing and arguably rendered the SIF's first issue on appeal moot. We note, however, that although Rule 0800-02-21-.12 does not explicitly authorize trial courts to schedule initial hearings where no party has requested a hearing, nothing in the regulations precludes a trial court from doing so. Specifically, Rule 0800-02-21-.13(1) requires parties to participate in an initial hearing "no more than thirty (30) calendar days after a request for hearing is filed," but the rule does not preclude the possibility that such a hearing could be scheduled by the court earlier. Tenn. Comp. R. & Regs. 0800-02-21-.13(1) (2015) (emphasis added). It is which relief can be granted. Such a motion challenges only the legal sufficiency of the complaint or request for relief, not the strength of the proof. See Bell ex rel. Snyder v. Icard, Merrill, Cul/is, Timm, Furen & Ginsburg, P.A., 986 S.W.2d 550, 554 (Tenn. 1999) ("Such a motion admits the truth of all relevant and material averments contained in the complaint, but asserts that such facts do not constitute a cause of action as a matter of law."). Thus, a trial court should grant a Rule 12.02(6) motion to dismiss only when it appears the employee can prove no set of facts in support of the claim that would warrant relief. Doe v. Sunquist, 2 S.W.3d 919, 922 (Tenn. 1999). 9 consistent with common practice, applicable regulations, the Tennessee Rules of Civil Procedure, and the need to control its docket and the progress of cases to allow a trial court to set a scheduling hearing in the absence of a request by a party to do so. The SIF's second issue questions the trial court's failure to dismiss Employee's claims pursuant to the trial court's January 13, 2016 order. In its brief, the SIF states "[t]he position of the SIF is that [Employee's] claim should have been dismissed for failure to show cause after being given a multitude of opportunities to do so." We note that a show cause hearing was held on January 12, 2016, and that the trial court issued a show cause order the following day granting Employee "time to decide how to proceed .. . until January 29, 2016, on which date the Court scheduled a telephonic Status Conference." No one appealed the January 13, 2016 show cause order or the February 5, 2016 status conference orders. Rather, the SIF filed motions to alter or amend the status conference orders on March 7, 2016, which the trial court denied in the order on appeal. Focusing on the trial court's explanation in the June 2, 2016 order on appeal addressing why the January 13, 2016 show cause order did not mandate dismissal of Employee's claims, the SIF contends that "based on the totality of the circumstances, it is clear that [Employee's attorney] in fact communicated to the Court on January 29, 2016, that he was filing a Request for Expedited Hearing, not a Request for Initial Hearing." Asserting that "[s]ince [Employee's attorney] was ordered to inform the Court which of the two hearings he intended to pursue and the Court did not schedule a compensation hearing at that time, an inference should be drawn that [the attorney] communicated to the Court he was pursuing an expedited hearing." As noted in the SIF's brief, "no audio recordings of either January hearing were preserved." Beyond what the transcripts of the March 10, 2016 and May 18, 2016 hearings and the trial court's orders reveal, we cannot know what the "totality of the circumstances" might be, nor can we draw inferences concerning what a party or counsel communicated or represented to the court without the aid of transcripts of the proceedings or orders identifying such communications. It is the responsibility of the appealing party to ensure a complete record on appeal by either filing a transcript prepared by a licensed court reporter or, alternatively, filing a statement of the evidence. See Tenn. Comp. R. & Regs. 0800-02-22-.02(2). Here, transcripts of the March 10, 2016 and May 18, 2016 hearings were filed with the trial court, but neither transcripts of the January 12, 2016 and January 29, 2016 hearings nor a statement of the evidence presented in those hearings was included in the record. We are unable to discern the "totality of the circumstances" as suggested by the SIF without such transcripts. Moreover, the January 13, 2016 order upon which the SIF relies included the following language that the SIF contends bound the trial court to a specific course of action that it failed to take: 10 If [Employee's attorney] informs the Court at the [January 29, 2016] Status Conference that his client intends to file a Request for Expedited Hearing, the Court will enter an order requiring that he file the Request for Expedited Hearing within five business days from January 29, 2016, or, failing such, his claim will be dismissed without prejudice. If [Employee's attorney] informs the Court at the Status Conference that his client requests an Initial (Scheduling) Hearing, the Court will schedule this claim for a Compensation Hearing. In the order on appeal, the trial court addressed the January 13, 2016 order and concluded it did not mandate a dismissal of Employee's claims, stating "the condition precedent in the order for the Court's imposition of the five-day deadline to file Requests for Expedited Hearing never occurred; therefore, the Court was not under a self-imposed mandate to dismiss [Employee's] claims because he did not file Requests for Expe~ited Hearings within a deadline that never came into effect." The January 13, 2016 orders were interlocutory in nature and did not resolve all of the issues or claims before the trial court. Thus, they were subject to revision by the trial court at any time before entry of a final order. See Tenn. R. Civ. P. 54.02 (An "order or other fonn of decision is subject to revision at any time before the entry of the judgment adjudicating all the claims and the rights and liabilities of all the parties."). Here, the trial court did not modify the January 13, 2016 order; rather, it interpreted its own order as not requiring dismissal of Employee's claims on the sole basis of Employee's not requesting an expedited hearing. Not knowing the "totality of the circumstances" as communicated or represented by the parties in the January 12, 2016 or January 29, 2016 hearings, we cannot say that the trial court erred in interpreting its own orders and denying the SIF's motion to alter or amend the February 5, 2016 status conference orders, or in denying the SIF's motion to dismiss Employee's claims. Discretion to Control Docket Before concluding, we must address the trial court's observations that "a majority" of the Appeals Board in Smith v. The Newman Group, No. 2015-08-0075, 2015 TN Wrk. Comp. App. Bd. LEXIS 30 (Tenn. Workers' Comp. App. Bd. Sept. 21, 2015), held that trial courts have the discretion to control their dockets. Specifically, the trial court observed that "a majority of the Appeals Board held [in Smith] that trial judges in the Court of Workers' Compensation Claims possess discretion to control the pace of litigation in their courts to ensure equitable and efficient disposition of the claims litigated therein." The trial court reiterated the point a second time, noting that "the majority in Smith held that a workers' compensation trial judge has broad discretion to manage its docket." 11 While we were divided in Smith as to whether the trial court acted within its discretion in denying an employer's motion to dismiss following a show cause hearing, the observations made by the trial judge in this case reflect an overly narrow construction of our views expressed in Smith. Consistent with well-established law, we were then, and are now, unanimous in our belief that a trial court has the necessary discretion to control the pace of litigation through the use of case supervision and docket 7 management. But we are also unanimous that such discretion is not without its limits. In Smith, we differed over where the discretionary line should be drawn under the particular circumstances presented in that case, but not over whether such discretion exists. Conclusion For the foregoing reasons, we conclude that the trial court did not err in denying Transco Products' motion to dismiss Employee's claim or in denying the SIF's motions to alter or amend the status conference orders or to dismiss Employee's claims. We additionally conclude that the trial court's decisions did not violate any of the standards set forth in Tennessee Code Annotated section 50-6-217(a)(3). Accordingly, the trial court's decisions are affirmed and these consolidated cases are remanded for any further proceedings that may be necessary. -~ W. Conner, Judge rs' Compensation Appeals Board 7 See, e.g., Sissom v. Bridgestone/Firestone, Inc., No. M2011-00363-WC-R3-WC, 2012 Tenn. LEXIS 411, at *3 n.2 (Tenn. Workers' Comp. Panel June 20, 2012) ("trial judges have been charged with controlling the pace of litigation through the use of supervision and docket management which will ensure efficient disposition of civil cases"); Lewis v. Dana Holding Corp., No. W2010-01863-WC-R3- WC, 2011 Tenn. LEXIS 461, at *9 (Tenn. Workers' Comp. Panel June 6, 2011) ("[a] trial court has broad discretion in managing its courtroom and docket"). 12 TENNESSEE BUREAU OF WORKERS’ COMPENSATION WORKERS’ COMPENSATION APPEALS BOARD Lazaro Valladares ) Docket Nos. 2015-01-0117 ) 2015-01-0118 v. ) ) State File Nos. 91964-2014 Transco Products, Inc., et al. ) 39859-2014 ) and ) ) Williams Specialty Services, et al. ) ) and ) ) Abigail Hudgens, Administrator of the ) Bureau of Workers’ Compensation, ) Second Injury Fund ) ) ) Appeal from the Court of Workers’ ) Compensation Claims, ) Thomas Wyatt, Judge ) Concurring Opinion - Filed July 27, 2016 I concur with the conclusions in the lead opinion that the trial court did not err in denying the motions at issue. Additionally, as noted in the lead opinion, the Appeals Board is unanimous in our belief that a trial court has the necessary discretion to control the pace of litigation through the use of case supervision and docket management and in our belief that such discretion is not without its limits. I write separately to express my opinion that it was error for the trial court to analyze Transco Products’ motion to dismiss under Rule 12.02(6) of the Tennessee Rules of Civil Procedure. In my opinion, the appropriate procedure Transco Products should have followed to present its disputed issue would have included (1) properly identifying the issue in the dispute certification notice filed with the Bureau, and (2) requesting that 1 the trial court hear its dispute on an expedited basis in accordance with Tennessee Code Annotated section 50-6-239(d) (2015). Tenn. Comp. R. & Regs. 0800-02-21-.02(19) defines a petition for benefit determination as a “request for the [Bureau] to provide assistance in the resolution of any disputed issues in a workers’ compensation claim.” It further provides that “[a]ny party may file a petition for benefit determination, on a form approved by the [Bureau], with the [Bureau] at any time after a dispute arises in a claim for workers’ compensation benefits.” Id. The form approved by the Bureau provides a checklist from which the petitioner can select the type of relief being requested, and it includes an area for the petitioner to explain any disputed issues in addition to providing information about the employee, the employer, the injury, the insurance carrier, and whether the Second Injury Fund is involved. Although the Appeals Board has equated a petition for benefit determination to a complaint filed with the clerk of the court to commence a civil action, see Duck v. Cox Oil Co., No. 2015-07-0089, 2016 TN Wrk. Comp. App. Bd. LEXIS 2 (Tenn. Workers’ Comp. App. Bd. Jan. 21, 2016), it is essentially a fill-in-the-blank document and checklist intended to initiate a request that the Bureau provide assistance in resolving disputed issues in a workers’ compensation claim. Once a petition for benefit determination has been filed, the parties are required to participate in alternative dispute resolution measures designed to help the parties resolve claims by agreement. See Tenn. Code Ann. § 50-6-236(b) (2015). If the parties are unable to reach an agreement, the mediator prepares and issues a dispute certification notice, “setting forth all unresolved issues for hearing before a workers’ compensation judge.” Tenn. Code Ann. § 50-6-236(d)(1). However, “[n]o party is entitled to a hearing before a workers’ compensation judge to determine temporary or permanent benefits . . . unless a workers’ compensation mediator has issued a dispute certification notice setting forth the issues for adjudication by a workers’ compensation judge.” Tenn. Code Ann. § 50-6-236(d)(3)(A). See also Tenn. Code Ann. § 50-6-203(a) (“No request for a hearing by a workers’ compensation judge . . . shall be filed with the court of workers’ compensation claims, other than a request for settlement approval, until a workers’ compensation mediator has issued a dispute certification notice certifying issues in dispute for hearing before a workers’ compensation judge.”). Tennessee Code Annotated section 50-6-239(a) provides the procedure for “a party seeking further resolution of disputed issues” to present those issues to the workers’ compensation judge. This section provides that such party “shall file a request for a hearing,” and subdivision 50-6-239(b)(1) limits the issues that may be presented to those “issues that have been certified by a workers’ compensation mediator within a dispute certification notice.” Tenn. Code Ann. § 50-6-239(a), (b)(1) (2015). Here, Transco Products identified “compensability” as an issue in the dispute certification notice, but it did not include as a defense or as a disputed issue whether the petition for benefit determination fails to state a claim upon which relief can be granted. Instead of 2 requesting an expedited hearing to resolve the disputes identified in the dispute certification notice, Transco Products filed a separate motion to dismiss grounded in Rule 12 of the Tennessee Rules of Civil Procedure, which presented an issue that was not included or identified in the dispute certification notice. In its brief on appeal, it asserts that “[t]o test the sufficiency of Employee’s pleading, [it] filed a Motion to Dismiss to determine whether Employee has set forth a valid claim for which relief can be granted.” Tennessee Code Annotated section 50-6-239(c)(1) provides that the Tennessee Rules of Civil Procedure “shall govern proceedings at all hearings before a workers’ compensation judge unless an alternate procedural . . . rule has been adopted by the administrator.” Tenn. Code Ann. § 50-6-239(c)(1) (emphasis added). “[T]he phrase ‘proceedings at all hearings’ as used in section 50-6-239(c)(1) encompasses all filings made by the parties as a result of any request for or notice of a hearing filed after the issuance of a dispute certification notice.” Syph v. Choice Food Group, Inc., No. 2015- 06-0288, 2016 TN Wrk. Comp. App. Bd. LEXIS 18, at *13 (Tenn. Workers’ Comp. App. Bd. Apr. 21, 2016). The filing with the Bureau of both a petition for benefit determination by any party and an initial dispute certification notice by a workers’ compensation mediator occurs prior to any request for or notice of a hearing before the Court of Workers’ Compensation Claims. Thus, the filing of these documents occurs before the point in time at which the Tennessee Rules of Civil Procedure have attached to the process. It necessarily follows that, at the time both a petition for benefit determination and an initial dispute certification notice are filed, neither is subject to the requirements applicable to a civil complaint or an answer to a civil complaint as contemplated in the Tennessee Rules of Civil Procedure. In these consolidated cases, the analysis by both the trial court and in the lead opinion applies the pleading requirements of the Tennessee Rules of Civil Procedure to Employee’s petition for benefit determination, but that analysis fails to address the procedure established in the Reform Act for presenting disputed issues to the trial court, focusing instead on whether the information in the petition for benefit determination states a claim upon which relief can be granted. In my opinion, this is an incorrect analysis. Neither analysis addressed whether Transco Products identified the issue in the dispute certification notice or whether Transco Products initiated the appropriate procedure for presenting the issue to the trial court by requesting an expedited hearing pursuant to Tennessee Code Annotated section 50-6-239(d). In my view, the purpose of the expedited hearing process is to allow any party the opportunity to have the trial court hear and resolve disputes over issues included in the dispute certification notice concerning the provision of benefits. See Tenn. Code Ann. § 50-6-239(d)(1). Transco Products failed to comply with section 50-6-239(a) when it did not request an expedited hearing, and it avoided the prohibition in section 50-6-239(b) against presenting issues not certified by the workers’ compensation mediator by filing a motion to dismiss under Rule 12 of the Tennessee Rules of Civil Procedure. While I agree that the motion to 3 dismiss should have been denied, in my opinion, the trial court erred in analyzing Transco Products’ motion to dismiss based on Rule 12.02(6). 4 TENNESSEE BUREAU OF WORKERS’ COMPENSATION WORKERS’ COMPENSATION APPEALS BOARD Lazaro Valladares ) Docket Nos. 2015-01-0117 ) 2015-01-0118 v. ) ) State File Nos. 91964-2014 Transco Products, Inc., et al. ) 39859-2014 ) and ) ) Williams Specialty Services, LLC, et al. ) ) and ) ) Abigail Hudgens, Administrator of the ) Bureau of Workers’ Compensation, ) Second Injury Fund ) ) Appeal from the Court of Workers’ ) Compensation Claims, ) Thomas Wyatt, Judge ) CERTIFICATE OF SERVICE I hereby certify that a true and correct copy of the Appeals Board’s decision in the referenced case was sent to the following recipients by the following methods of service on this the 27th day of July, 2016. Name Certified First Class Via Fax Via Email Address Mail Mail Fax Number Email Chad Rickman X chad@loringjustice.com Joseph Ballard X Joseph.Ballard@thehartford.com David Weatherman X David.weatherman@zurichna.com Allison Lowry X Allison.Lowry@tn.gov Thomas Wyatt, Judge X Via Electronic Mail Kenneth M. Switzer, X Via Electronic Mail Chief Judge Penny Shrum, Clerk, X Penny.Patterson-Shrum@tn.gov Court of Workers’ Compensation Claims Matthew Salyer Clerk, Workers’ Compensation Appeals Board 220 French Landing Dr., Ste. 1-B, Nashville, TN 37243 Telephone: 615-253-1606 Electronic Mail: Matthew.Salyer@tn.gov
within Buildings.Electrical.DC.Storage; model Battery "Simple model of a battery" parameter Modelica.SIunits.Efficiency etaCha(max=1) = 0.9 "Efficiency during charging"; parameter Modelica.SIunits.Efficiency etaDis(max=1) = 0.9 "Efficiency during discharging"; parameter Real SOC_start(min=0, max=1, unit="1")=0.1 "Initial state of charge"; parameter Modelica.SIunits.Energy EMax(min=0, displayUnit="kWh") "Maximum available charge"; parameter Modelica.SIunits.Voltage V_nominal "Nominal voltage (V_nominal >= 0)"; Modelica.Blocks.Interfaces.RealInput P(unit="W") "Power stored in battery (if positive), or extracted from battery (if negative)" annotation (Placement(transformation(extent={{-20,-20},{20,20}}, rotation=270, origin={0,108}), iconTransformation(extent={{-20,-20},{20,20}}, rotation=270, origin={0,100}))); Modelica.Blocks.Interfaces.RealOutput SOC(min=0, max=1, unit="1") "State of charge" annotation (Placement(transformation(extent={{100,50},{120,70}}))); Buildings.Electrical.DC.Interfaces.Terminal_p terminal "Generalized terminal" annotation (Placement(transformation(extent={{-110,-10},{-90,10}}))); protected Buildings.Electrical.DC.Storage.BaseClasses.Charge cha( final EMax=EMax, final SOC_start=SOC_start, final etaCha=etaCha, final etaDis=etaDis) "Charge model" annotation (Placement(transformation(extent={{40,50},{60,70}}))); Loads.Conductor bat( final mode=Buildings.Electrical.Types.Load.VariableZ_P_input, final V_nominal=V_nominal) "Power exchanged with battery pack" annotation (Placement(transformation(extent={{40,-10},{60,10}}))); Modelica.Blocks.Math.Gain gain(final k=-1) annotation (Placement(transformation(extent={{22,10},{42,30}}))); equation connect(cha.SOC, SOC) annotation (Line( points={{61,60},{110,60}}, color={0,0,127}, smooth=Smooth.None)); connect(cha.P, P) annotation (Line( points={{38,60},{0,60},{0,108},{8.88178e-16,108}}, color={0,0,127}, smooth=Smooth.None)); connect(bat.terminal, terminal) annotation (Line( points={{40,0},{-100,0}}, color={0,0,255}, smooth=Smooth.None)); connect(P, gain.u) annotation (Line( points={{8.88178e-16,108},{8.88178e-16,20},{20,20}}, color={0,0,127}, smooth=Smooth.None)); connect(gain.y, bat.Pow) annotation (Line( points={{43,20},{68,20},{68,8.88178e-16},{60,8.88178e-16}}, color={0,0,127}, smooth=Smooth.None)); annotation ( Icon(coordinateSystem( preserveAspectRatio=false, extent={{-100,-100},{100,100}}), graphics={ Polygon( points={{-62,40},{-62,-40},{72,-40},{72,40},{-62,40}}, smooth=Smooth.None, fillColor={215,215,215}, fillPattern=FillPattern.Solid, pattern=LinePattern.None, lineColor={0,0,0}), Polygon( points={{58,32},{58,-30},{32,-30},{10,32},{58,32}}, smooth=Smooth.None, pattern=LinePattern.None, lineColor={0,0,0}, fillColor={0,127,0}, fillPattern=FillPattern.Solid), Polygon( points={{-34,32},{-12,-30},{-32,-30},{-54,32},{-34,32}}, smooth=Smooth.None, pattern=LinePattern.None, lineColor={0,0,0}, fillColor={0,127,0}, fillPattern=FillPattern.Solid), Polygon( points={{-2,32},{20,-30},{0,-30},{-22,32},{-2,32}}, smooth=Smooth.None, pattern=LinePattern.None, lineColor={0,0,0}, fillColor={0,127,0}, fillPattern=FillPattern.Solid), Polygon( points={{-74,12},{-74,-12},{-62,-12},{-62,12},{-74,12}}, smooth=Smooth.None, fillColor={215,215,215}, fillPattern=FillPattern.Solid, pattern=LinePattern.None, lineColor={0,0,0}), Text( extent={{-50,68},{-20,100}}, lineColor={0,0,0}, fillColor={215,215,215}, fillPattern=FillPattern.Solid, textString="P"), Line( points={{-74,0},{-100,0},{-100,0}}, color={0,0,0}, smooth=Smooth.None), Text( extent={{-150,70},{-50,20}}, lineColor={0,0,0}, textString="+"), Text( extent={{-150,-12},{-50,-62}}, lineColor={0,0,0}, textString="-"), Text( extent={{44,70},{100,116}}, lineColor={0,0,0}, fillColor={215,215,215}, fillPattern=FillPattern.Solid, textString="SOC"), Text( extent={{44,154},{134,112}}, lineColor={0,0,255}, textString="%name")}), Documentation(info="<html> <p> Simple model of a battery. </p> <p> This model takes as an input the power that should be stored in the battery (if <i>P &gt; 0</i>) or that should be extracted from the battery. The model uses a fictitious conductance (see <a href=\"modelica://Buildings.Electrical.DC.Loads.Conductor\">Buildings.Electrical.DC.Loads.Conductor</a>) <i>G</i> such that <i>P = u &nbsp; i</i> and <i>i = u &nbsp; G,</i> where <i>u</i> is the voltage difference across the pins and <i>i</i> is the current at the positive pin. </p> <p> The output connector <code>SOC</code> is the state of charge of the battery. This model does not enforce that the state of charge is between zero and one. However, each time the state of charge crosses zero or one, a warning will be written to the simulation log file. The model also does not limit the current through the battery. The user should provide a control so that only a reasonable amount of power is exchanged, and that the state of charge remains between zero and one. </p> </html>", revisions="<html> <ul> <li> September 24, 2015 by Michael Wetter:<br/> Removed binding of <code>P_nominal</code> as this parameter is disabled and assigned a value in the <code>initial equation</code> section. This is for <a href=\"https://github.com/lbl-srg/modelica-buildings/issues/426\">issue 426</a>. </li> <li> March 19, 2015, by Michael Wetter:<br/> Removed redeclaration of phase system in <code>Terminal_n</code> and <code>Terminal_p</code> as it is already declared to the be the same phase system, and it is not declared to be replaceable. This avoids a translation error in OpenModelica. </li> <li> June 2, 2014, by Marco Bonvini:<br/> Revised documentation. </li> <li> January 8, 2013, by Michael Wetter:<br/> First implementation. </li> </ul> </html>")); end Battery;
Memories of War Memories of War: So powerful yet often so fragmentary W.J. Astore Memories of war are powerful and fragmentary. At a national level, we do best at remembering our own war dead while scarcely recognizing the damage to others. This is one cost of nationalism. Nationalism is violent, bigoted, and discriminatory. It elevates a few at the expense of the many. It fails fully to recognize common human experience, even one as shattering as war. One example. I’ve visited the Vietnam War Memorial in Washington, D.C. In seeing all those names of American dead on the wall, I was moved to tears. It’s a remarkable memorial, but what it fails to capture is any sense of the magnitude of death from that war visited upon Vietnam, Laos, and Cambodia. As I wrote for Alternet, to visualize the extent of death from America’s war in Southeast Asia, the Vietnamese would need a wall that would be roughly 20 to 50 times as long as ours. Think about that for a moment. A wall perhaps 50 times as long as our Vietnam memorial wall. It’s a staggering mental image. Sadly, today in America the only wall garnering much media interest is Trump’s wall along our border with Mexico, yet another manifestation of nationalist bigotry and bias. John Dower challenges us to think differently. To explore our common humanity. To remember the war dead of other nations and peoples, and to record the true cost of America’s wars, both to others and to ourselves. His latest article at TomDispatch.com explores how Americans both remember and forget their wars. Here’s an excerpt: While it is natural for people and nations to focus on their own sacrifice and suffering rather than the death and destruction they themselves inflict, in the case of the United States such cognitive astigmatism is backlighted by the country’s abiding sense of being exceptional, not just in power but also in virtue. In paeans to “American exceptionalism,” it is an article of faith that the highest values of Western and Judeo-Christian civilization guide the nation’s conduct — to which Americans add their country’s purportedly unique embrace of democracy, respect for each and every individual, and stalwart defense of a “rules-based” international order. Such self-congratulation requires and reinforces selective memory. “Terror,” for instance, has become a word applied to others, never to oneself. And yet during World War II, U.S. and British strategic-bombing planners explicitly regarded their firebombing of enemy cities as terror bombing, and identified destroying the morale of noncombatants in enemy territory as necessary and morally acceptable. Shortly after the Allied devastation of the German city of Dresden in February 1945, Winston Churchill, whose bust circulates in and out of the presidential Oval Office in Washington (it is currently in), referred to the “bombing of German cities simply for the sake of increasing the terror, though under other pretexts.” Too often, Americans believe they’re waging a war on terror, forgetting that war itself is terror. That war itself is evil. That doesn’t mean that war is never justified, as it was, I believe, in the struggle against Nazi tyranny in World War II. Even in justifiable wars, however, we need to recognize that war breeds corruption; that war, in essence, is corruption, a corruption of the human spirit, of a humanity which should be held in common and nourished, but which during war is degraded if not destroyed. John Dower recognizes this. It’s a theme he explores in his new book, The Violent American Century: War and Terror Since World War Two. Consider it a primer on war’s many corruptions, and a precis of America’s tendency toward a nationalism of callous indifference when it comes to the damages we inflict on others. It’s not happy reading, but then again wars shouldn’t be a subject for happiness. A remarkable primer and meditation on America’s endless wars Wars and rumors of war seem always to be with us. Some would say they’re an inevitable part of the human condition. Our historical record seems to support that grim conclusion. Yet there is another way, a more pacific path, a path toward peace. But to walk that path, we must first fully recognize the tangled undergrowth of war that imperils our every footstep. Dower’s latest book helps us to do just that. Post navigation 11 thoughts on “Memories of War” Although I agree with most everything written above, something you posited before, about “..people not having a reason to care…,” leaves me continually dispirited. That is to say, that meaningful, intraspective writing, does little more than ‘sing to the choir,’ as it were. How can we break through the strengthening forces of hyper partisanship? If citizens are unwilling to care about the ongoing wars, what will words do? I ask only rhetorically. By no means do I condone giving up. If only we could somehow get people to care as much about their country as they do their favorite sports team or television programs? And if people did pay attention? Would we have less war, or more? Once upon a time I believed the answer was clear. Today, not so much. Yes. I’d say first that the choir needs to hear preaching too. Why go to church every week if we’re already “saved”? Because there’s meaning to the repetition. Second, I’d say that even in our hyper-partisan times, you never know when and where your seeds might take root and grow. We need to keep scattering our “seeds,” hoping they’ll take root, even among the thistle. Finally, I’m amazed at how the parables of Christ have stayed with me, but that’s because I learned them when I was young. So maybe that’s the way forward: educate our children in the ways of peace, and perhaps as adults they’ll do better than us at avoiding war. Thanks. I don’t know if I mentioned to you that I have been teaching history for the first time this year. I’m Currently on a bus returning from Washington with 250 8th graders. We also spent a day in Gettysburg. This is my 6th trip and each time I grow more conflicted about traipsing 14 year olds through monuments and cemeteries with insufficient context and a tour guide who solemnly intones, “and all these people died for your freedom.” Well, no. A lot of them died for imperialism and wrong-headed notions of whatAmerica means. A lot of them were young and poor and died to defend the money of rich, old white guys. I, too, am moved to tears at these places where the sheer waste of life can barely be conveyed. It’s hard to get them to look up from their phones to think about any of this. I noticed that what Wilfred Owen called “the old lie” is inscribed on the amphitheater near the tomb of the unknown soldier: “Dulce et decorum est pro patria mori.” I’ll teach that poem in the coming week and encourage them to question, as I always do. For right now, the rain, the Trump hats, the New Jersey turnpike, and the memory of the fatuous tour guide have all got me feeling more than a little discouraged. In 2008, I wrote about my own experience visiting Gettysburg. Here it is: Visiting Gettysburg Last week, I finally made it to Gettysburg, site of the great three-day battle between Union and Confederate forces in July 1863 that ended with the defeat of General Robert E. Lee’s army. Walking the battlefield was a sobering experience. I found myself on Little Round Top at 5:00 PM, just about the time of day that Union generals rushed men to reinforce the hill against a determined Confederate assault at the close of the battle’s second day. Earlier, I was at the Angle, just when, almost a century and a half ago, Pickett’s Charge failed to pierce the Union center, sealing Lee’s fate on the third day. As these events played through my mind, I marveled that I had the battlefield largely to myself. Not that I was alone, mind you. Tour buses circled; cars, trucks, and SUVs whizzed about, but many, perhaps most, Americans who visit Gettysburg get surprisingly little tactile or sensory experience of its difficult topography. Yes, a few kids (and fewer adults) joined me in clambering about the huge, claustrophobically placed boulders of Devil’s Den, and I did spy a couple of guided tour groups on foot. But at the site of a bloodcurdling, distinctly septic nineteenth century battle, most visitors were clearly having a distinctly bloodless, even antiseptic, twenty-first century experience. That day, I learned a lot about Gettysburg the battle — and maybe a little about us as well. As surely as my fellow tourists were staying in their cars and buses, we, as a people, are distancing ourselves from the realities of war. As we seal ourselves away from war’s horrors, we’re correspondingly finding it easier to speak of “warfighters” and to boast of having the world’s best military. As we catch a glimpse, from the comfort of our living rooms, of a suicide bombing in Iraq or an American outpost attacked, then abandoned, in Afghanistan, are we not like those tourists in buses at Gettysburg, listening to sanitized recordings telling us what to see and think about the (expurgated) reality in front of us? And who dares challenge the “expert” commentary? Who dares turn off the canned talking heads and stare into the face of war? But if we are to end our militaristic, yet curiously sanitized, “warfighter” moment, if we are ever to return to our citizen-soldier ethos and heritage, this is just what we must do. Perfect — thank you. I had just read This a Republic of Suffering– which definitely help banish any “curiously sanitized” notions from my head. I guess you can’t really blame anybody for making a living, but the stores full of tchotchkes and fudge are distasteful to me. The battlefield guides used to be pretty good about getting the kids out of the bus and moving over the landscape, but this year we mostly stayed in the bus– don’t know why. Thanks for giving me a place to process all this as we ride home. Perfect — thank you. I had just read This a Republic of Suffering– which definitely help banish any “curiously sanitized” notions from my head. I guess you can’t really blame anybody for making a living, but the stores full of tchotchkes and fudge are distasteful to me. The battlefield guides used to be pretty good about getting the kids out of the bus and moving over the landscape, but this year we mostly stayed in the bus– don’t know why. Thanks for giving me a place to process all this as we ride home. I once took a group of high-school freshmen to visit the Huntington Library in San Marino (near Pasadena), California. I can’t say what the kids got out of the trip, but for me, I happened to take notice of a decorative plaque prominently displayed on a wall of the room in which we found ourselves. It read: “Tis the good reader that makes the good book; in every book he finds passages which seem confidences or asides hidden from all else and unmistakenly meant for his ear; the profit of books is according to the sensibility of the reader; the profoundest thought or passion sleeps as in a mine, until it is discovered by an equal mind and heart.” ― Ralph Waldo Emerson How timeless and approprate that observation. I especially recall Emerson’s words whenever I think of memory and memorials. Memory exists in living biology, especially human animal consciousness, whereas memorials consist of dead rock and wood fashioned by human hands into something deliberately suggestive of something else. But what the memorial — or any material artifact — suggests to us depends critically upon what individual human memory and experience we bring to the viewing of it. In our books and memorials we read something reflected — much or little — of ourselves. For years I put off visiting the Vietnam Veterans Memorial because I had so many mixed emotions about my own “war” and what I remember of it. I kept thinking that I would go see it once a sane and competent American administration took power and brought our many serial Vietnams to an end. But then I realized that this would probably never happen in my lifetime. So I finally made the pilgrimage along with my wife, two sons, and a high-school classmate and her husband (also in D.C. at the time). I could tell that everyone expected me to feel sad, and I tried to put on the appropriate mask for their benefit, but the whole scene really only made me angry. They brought themselves to the wall and thought they heard it say something about sorrow and weeping; but I brought me, and I heard nothing but lies, screams, and curses. The good memory makes the good memorial, and I have a pretty good memory. Really well put, Mike. I didn’t have your sense of anger at the wall; I was far too young to have served in Vietnam, and knew no one who had died. What I did get from the wall was a sense of loss, a sense of waste, a sense of sorrow. I recall a scene from “The Empire Strikes Back,” as Luke prepares to enter the cave where the Dark Side is strong. He asks Yoda, What’s in there?, and the Jedi Master replies, Only that which you take with you. And so it proves, as Luke confronts the shadows of his own dark destiny, a destiny he barely averts by refusing to submit to hate and anger. Speaking of memorials and America’s War on Southeast Asia (Vietnam, Cambodia, and Laos), I remember once coming out of the front gate of Tan Son Nhut Airbase on my way into downtown Saigon. While waiting to catch a xyclo (motorscooter taxi) ride, I noticed a little plot of ground off to one side of the road, overgrown with weeds and coated with the choking dust kicked up by all the passing traffic. Upon closer inspection, I realized that I had stumbled upon a tiny graveyard, with tombstones tilted or falling over amidst the rank tropical vegetation. Then I saw a rusted sign, itself leaning over at a crazy angle which proclaimed (in English): “The Vietnamese people will never forget the sacrifices of the brave French legionaires,” or words to that effect. Yeah. Sure. In later years, when I read Barbara Tuchman’s fine book, Stilwell and the American Experience in China, I had the perfect image in mind as I read her summary sentence: “In the end, China went her own way as if the Americans had never come.” I realized then that, like the French in Southeast Asia before us, we Americans had some weed-choked, long neglected memorials of our own in store for us in many a forgotten corner of our rotting, collapsing “empire.” And who knows, but perhaps — after the sacking of Washington D.C. that surely lies not too far down the road — our surviving descendants will see such ruined memorials in our own “homeland” as well, with no one alive who can read the rusting words or remember what all the delapidated junk once represented. I can see this all as plain as day. I have seen it. I can hear it whisper, too: the empty echoes of a great desolation, as Shelley once spoke of it in “Ozymandias”: I met a traveller from an antique land, Who said—“Two vast and trunkless legs of stone Stand in the desert. . . . Near them, on the sand, Half sunk a shattered visage lies, whose frown, And wrinkled lip, and sneer of cold command, Tell that its sculptor well those passions read Which yet survive, stamped on these lifeless things, The hand that mocked them, and the heart that fed; And on the pedestal, these words appear: ‘My name is Ozymandias, King of Kings; Look on my Works, ye Mighty, and despair!’ Nothing beside remains. Round the decay Of that colossal Wreck, boundless and bare The lone and level sands stretch far away.” We hear it said that “Time waits for no man.” Yes, but its vast forgetfullness does lie in store for us all. In the meantime, while we live and breathe and can think anything at all, our own little minds and memories will have to tell us what to make of our memorials.
Why did the US stock market crash on Monday? Blame the central banks — RT Op-ed The crash itself was significant—Donald Trump’s favorite index, the Dow Jones Industrial (DJIA) fell 4.6 percent in one day. This is about four times the standard range of the index—and so according to conventional economics, it should almost never happen. Of course, mainstream economists are wildly wrong about this, as they have been about almost everything else for some time now. In fact, a four percent fall in the market is unusual, but far from rare: there are well over 100 days in the last century that the Dow Jones tumbled by this much. Crashes this big tend to happen when the market is massively overvalued, and on that front this crash is no different. It’s like a long-overdue earthquake. Though everyone from Donald Trump down (or should that be “up”?) had regarded Monday’s level and the previous day’s tranquillity as normal, these were in fact the truly unprecedented events. In particular, the ratio of stock prices to corporate earnings is almost higher than it has ever been. There is only one time that it’s been higher: during the DotCom Bubble, when Robert Shiller’s “cyclically adjusted price to earnings” ratio hit the all-time record of 44 to one. That means that the average price of a share on the S&P500 was 44 times the average earnings per share over the previous 10 years (Shiller uses this long time-lag to minimize the effect of Ponzi Scheme firms like Enron). The S&P500 fell more than 11 percent that day, so Monday’s fall is minor by comparison. And the market remains seriously overvalued: even if shares fell by 50 percent from today’s level, they’d still be twice as expensive as they have been, on average, for the last 140 years. After the 2000 crash, standard market dynamics led to stocks falling by 50 percent over the following two years, until the rise of the Subprime Bubble pushed them up about 25 percent (from 22 times earnings to 28 times). Then the Subprime Bubble burst in 2007, and shares fell another 50 percent, from 28 times earnings to 14 times. This was when central banks thought The End of the World Is Nigh, and that they’d be blamed for it. But in fact, when the market bottomed in early 2009, it was only just below the pre-1990 average of 14.5 times earnings. Safe Havens That valuation level, before central banks (staffed and run by people with PhDs in mainstream economics) decided that they knew how to manage capitalism, is where the market really should be. It implies a dividend yield of about six percent in real terms, which is about twice what you used to get on a safe asset like government bonds—which are safe, not because the governments and the politicians and the bureaucrats that run them are saints, but because a government issuing bonds in its own currency can always pay whatever interest level it promises. There’s no risk that it can’t pay, and it can’t go bankrupt, whereas a company might not pay dividends, and it can go bankrupt. Now shares are trading at a valuation that implies a three percent return, as if they’re as safe as government bonds issued by a government which owns the bank that pays interest on those bonds. That’s nonsense. And it’s a nonsense for which, ironically, central banks are responsible. The smooth rise in stock market prices which led to the levels that preceded Monday’s crash began when central banks decided to rescue the economy by “Quantitative Easing (QE).” They promised to do “whatever it takes” to drive shares up from the entirely reasonable values they reached in late 2009, and did so by buying huge amounts of government bonds back from private banks and other financial institutions (pension funds, insurance companies, etc.). In the USA’s case, this amounted to $1 trillion per year—equal to about seven percent of America’s annual output of goods and services (GDP or “gross domestic product”). The Bank of England brought about £200 billion worth, which was an even larger percentage of GDP. With central banks buying that volume of bonds, private financial institutions found themselves awash with money, and spent it buying other assets to get yields—which meant that QE drove up share prices as banks, pension funds and the like bought them with money created by QE. Blind Oversight So this is the first central bank-created stock market bubble in history, and central banks have just had the first stock market crash where the blame is entirely theirs. Were this a standard, private hysteria and leverage driven bubble, we could well be facing a further 50 percent fall in the market—like what happened after the DotCom crash. This would bring shares back to the long-term average of 17 times earnings. Instead, what I believe will happen is that central banks, having recently announced that they intend to end QE, will restart it and try to drive shares back to what think are “normal” levels, but which are at least twice what they should be. As I said in my last book ‘Can we avoid another financial crisis?’ QE was like Faust’s pact with the Devil: once you signed the contract, you could never get out of it. They’ll turn on their infinite money printing machine, buy bonds off financial institutions once more, and give them liquidity to pour back into the markets, pushing them once more to levels that they should never rightly have reached. This, of course, will help to make the rich richer and the poor poorer by further increasing inequality. Which is arguably the biggest social problem of the modern era. So, as well as being incompetent economists these mainstreamers are today’s Marie Antoinette. Let them eat cake, indeed. Everyone who’s asking “why did the stock market crash Monday?” is asking the wrong question. The real poser is “why did it take so long for this crash to happen?” The statements, views and opinions expressed in this column are solely those of the author and do not necessarily represent those of RT.
Seventy-nine sets of human remains dating to the seventh century were discovered inside a stone wall at the remote Kuelap fortress in northern Peru, which was built around 1000 A.D. Archaeologist Alfredo Narvaez explained that the people building the fortress brought their dead with them for reburial. A genetic study of mitochondrial DNA taken from […] There’s more information on the HMS Investigator, discovered by Parks Canada archaeologists in the icy Arctic waters near Bank’s Island. “It’s in surprisingly good condition. The reason we were so lucky in a way was because the ship had not moved too much from the place it was abandoned,” said Marc-Andre Bernier, head of underwater […]
News Next show opens October 24th. Park Life presents FUNHOUSE, a group exhibition exploring the work of 7 emerging artists that work primarily in figuration. Artist portrayal of the figure has varied from generation to generation, with each new generation establishing its own fresh voice. This group of artists leans heavily on pop culture, comics, bright colors, grotesque humor, low-fi representation and unapologetic irony. Each artist in this exhibition has created a unique vision to animate the narrative that follows. This group of New York based artists will be showing new works that include paintings, drawings and sculpture.
idTech editing hints & tips Below is a list of essential editing hints and tips for idTech4 powered games (formally known as the 'Doom 3' engine); currently Quake Wars, Quake 4, Prey and Doom 3, but future idTech games may be support. For full list click here ». The better way to change the name of the *.exe produced by compiling doom3.gpl is to modify the compiler output so it writes the name(space) correctly - changing the program executable or shortcut is possible but not the correct approach to use, neither is renaming any part of the project Visual Studio's Solution Explorer (in relation to naming the *.exe this does nothing, it only changes the name of the Solution project). Changing the name of 'projects' in the Solution Explorer don't effect the name of the executable To correctly change the exe name, in the Solution Explorer; Step 1 Under "exes" right-click "DoomDLL" to open "DoomDLL Properties Pages". To the right of "Command" (not "Commend Arguments") click "$(OutDir)DOOM3.exe" to highlight for editing, replace "DOOM3" with the name of choice, e.g. "Catacombs" - string should read "$(OutDir)[custom name].exe", i.e. "$(OutDir)Catacombs.exe". Click "Apply", then optionally if not continuing to 'Step 2', click "OK" to exit the Properties Page manage. To the right of "Output File" select "$(OutDir)DOOM3.exe" to highlight for editing, replace "DOOM3" with the name of choice, e.g. "Catacombs" - string should read "$(OutDir)[custom name].exe", i.e. "$(OutDir)Catacombs.exe". Click "Apply", then "OK" to exit the Properties Page manage. Change "Linker" properties to reflect the name of the executable to be compiled The doom3.gpl source code uses a standard 'icon' bitmap image to illustrate the compiled exe. To change this replace the respective 'icon' files, i.e. *.ico/Win, *.icns/OSx, *.png/Linux, in the following locations; Images can be 24bit or 32 bit, the latter being required if the icon is to appear shaped or 'masked' in some way, a function that requires the use of image based alpha mask/channels, or where black (0,0,0) represents 0% opaque (100% transparent) pixels. Instructions below relate to using Windows 7 to compile Doom3.gpl using Microsoft Visual Studio 2013 Community edition (not tested or checked on Windows 8/8.1 or Windows 10 - modified code as per below DOES NOT build with Visual Studio 2015). Code is extracted and used with minor modification (explained below). How to installThe installation process for Visual Studio 2013 differs slightly to that of Visual Studio 2010 in that a number of components previously requiring separate download are now included by default during install (although still optional so need to be selected for inclusion), i.e. Microsoft Visual C++ library. Install Visual Studio Community 2013, Multibyte MFC Library and the DirectX SDK to the suggested location(s) - typically "C:\Program Files (x86)\[path to install]" which allows the software to set up default system paths for reference within the project. Create a separate project/development folder and in to it unpack/extract the contents of Doom3.gpl.zip (this should be a completely separate folder/location to the Visual Studio 2013 installation files/directories, the location the eventual game/project is to be worked upon). How to useThe source code likely won't compile without error by default but it shouldn't need any modification itself, all necessary changes are typically simple edits to the projects properties and settings. Step 1: project updateThe below loads the *.sln file into Visual Studio (may need to be opened from the application if more than one version of Visual Studio is available) and updates the data to be fully compatible with 2013. Browse the 'doom3' project/development folder just created and find "\neo". Double-click "doom.sln" (.solution file). Visual Studio 2013 will open the project asking if it's OK to update to latest version. Click "Yes/Agree" (this is necessary for the files to be compiled with VS2013, without it build fails). When the *.sln project file opens in Visual Studio the program will want to update the selected files Files are displayed in the status bar as they are parsed and updated Step 2: project propertiesSetting up the projects environment, settings and properties. Once the project is loaded and updated, next; In the Solution Explorer (panel on the right) right-click "Game" (under "dlls") and select "Properties" from the menu, then; - In "Configuration Properties" expand "C/C++" properties and left-click "Preprocessor".- To the right, click "Preprocessor Definitions" - currently displaying "DEBUG;%(PreprocessorDefinitions)".- Type "_XKEYCHECK_H;" between "DEBUG;" and "%(PreprocessorDefinitions)", i.e. "DEBUG;_XKEYCHECK_H;%(PreprocessorDefinitions)" (important note: "DEBUG;" may display as "_DEBUG;", "DEBUG;", "_NDEBUG;" or "NDEBUG;" et al if the project has been previously built and/or cleaned, or depending upon the build type selected [see below]).- Click "Apply" then "OK". Ensure Visual Studio 2013 lists the correct 'version' data in 'debug' settings, the "VC" (Visual C/C++) version used should be shown as "12" for Visual Studio 2013 (optional may not be required). To access, in the Solution Explorer right-click "Solution 'doom3' (7 projects)" and select "Properties" from the menu that appears. Expand "Common Properties" and select "Debug Source Files". Make sure the correct "VC" is listed, for 2013 it should be "12" Step 3: modify snd_system.cpp In the Solution Explorer, expand "DoomDLL", then "Sound". Double-click "snd_system.cpp" to edit and scroll down to line 167; Step 4: BuildIf the code is to be used as is without modifying anything, before compiling the 'build type' should be set to "Release" or "Dedicated Release" to ensure all the files and data are included in the appropriate *.exe, *.dll and other core files. Successful compileIf successful a series of files are produced and saved to "build\Win32\Dedicated Release" in the project directory (where the source files were unpacked and the *.sln was double-clicked - note: a separate folder is created per build type within which output is saved). These are; DOOM3.exe Game.exp Game.lib gamex86.dll idLib.lib TypeInfo.exe Once available copy to actual development folder (should contain folder/directory structure replicating that of Doom 3). How to compile doom 3 with visual studio 2010 [Obsolete: Visual Studio 2010 is no longer supported/provided by Microsoft directly (2012 is the last archive available). In addition, some of the 'Properties' management requirements, i.e. providing path information, may not be required as Visual Studio should pull that data in from Windows Systems paths defined during component installation]. ProblemAlthough 'volume' based levels can be made using 3DS Max, because the eventual format used needs to be specially compiled, it's not possible to export content from Max directly to *.bsp. BSP is a data structure rather than just a file-dump. This means the contents of a working file are analysed and broken down into a series of structures that are optimised in a way that removes some material. This isn't possible through a simple 'export' mechanism, so content has to exported to another format. However, it's not possible to simply export the contents of a Scene to a single model because the way those are handled in game would result in an unusable level (models are processes and culled based on bounding-box not surfaces). That being said models can still be used... SolutionThe general solution to exporting volume based content from 3DS Max is essentially two-fold; use a *.map export script. section the level and export a series of models. If a *.map export script exists divide the level into simple 'convex' shapes and complex molded structures, i.e. flat walls, floors and other architectural features that describe the level versus statues, shaped fittings and features. Export the former group to *.map and the latter to a supported mesh format such as *.ase, *.obj etc. Both can then be opened in a level-editor like GtkRadiant and once rebuilt as the content was originally in Max, can then be properly compiled to BSP using a MAP2BSP compiler (dmap, q3map2 etc.). An alternative to the above is to export content from Max to *.3ds which can then be opened and processed in Gmax before being compiled using the BSP compiler included with the Tempest Gamepack. This approach woul typically mean rebuilding certain elements of the level and retagging content so the Tempest gamepack knows what to do with certain structures. KatsBits provides freely available game and content making tutorials and resources, helping Visitors build their own games, or go further, Game Design Studios!. At KatsBits we strive to bring relevant material to our Readers and forefront Blender as a general game development tool.
{%- import '_macros.j2' as macros with context -%} {%- set config_name_default = 'www' -%} {%- set config_default = { 'listen': '/run/php/php7.1-fpm.sock', 'pm.max_children': 20 } -%} {%- set config_extra = { } -%} {% include manala_php_version|string ~ '/_base.j2' %}
// Copyright 2012 Citrix Systems, Inc. Licensed under the // Apache License, Version 2.0 (the "License"); you may not use this // file except in compliance with the License. Citrix Systems, Inc. // reserves all rights not expressly granted by the License. // You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // // Automatically generated by addcopyright.py at 04/03/2012 package com.cloud.test.stress; import java.util.Arrays; import java.util.Iterator; import java.util.List; import org.apache.log4j.Logger; import com.trilead.ssh2.Connection; import com.trilead.ssh2.Session; public class SshTest { public static final Logger s_logger = Logger.getLogger(SshTest.class.getName()); public static String host = ""; public static String password = "password"; public static String url = "http://google.com"; public static void main (String[] args) { // Parameters List<String> argsList = Arrays.asList(args); Iterator<String> iter = argsList.iterator(); while (iter.hasNext()) { String arg = iter.next(); if (arg.equals("-h")) { host = iter.next(); } if (arg.equals("-p")) { password = iter.next(); } if (arg.equals("-u")) { url = iter.next(); } } if (host == null || host.equals("")) { s_logger.info("Did not receive a host back from test, ignoring ssh test"); System.exit(2); } if (password == null){ s_logger.info("Did not receive a password back from test, ignoring ssh test"); System.exit(2); } try { s_logger.info("Attempting to SSH into host " + host); Connection conn = new Connection(host); conn.connect(null, 60000, 60000); s_logger.info("User + ssHed successfully into host " + host); boolean isAuthenticated = conn.authenticateWithPassword("root", password); if (isAuthenticated == false) { s_logger.info("Authentication failed for root with password" + password); System.exit(2); } String linuxCommand = "wget " + url; Session sess = conn.openSession(); sess.execCommand(linuxCommand); sess.close(); conn.close(); } catch (Exception e) { s_logger.error("SSH test fail with error", e); System.exit(2); } } }
{ "acno": "D40572", "acquisitionYear": 1856, "additionalImages": [ { "copyright": null, "creativeCommons": null, "filenameBase": "D40572", "sizes": [ { "caption": "Enhanced image", "cleared": true, "file": "enhanced_images/D405/D40572_E.jpg", "height": 337, "resolution": 512, "size": "large", "width": 512 } ] } ], "all_artists": "Joseph Mallord William Turner", "catTextResId": 1129878, "catalogueGroup": { "accessionRanges": "D05491-D05617; D40568-D40574; D41505", "completeStatus": "COMPLETE", "finbergNumber": "XC", "groupType": "Turner Sketchbook", "id": 65737, "shortTitle": "Studies for Pictures: Isleworth Sketchbook" }, "classification": "on paper, unique", "contributorCount": 1, "contributors": [ { "birthYear": 1775, "date": "1775\u20131851", "displayOrder": 1, "fc": "Joseph Mallord William Turner", "gender": "Male", "id": 558, "mda": "Turner, Joseph Mallord William", "role": "artist", "startLetter": "T" } ], "creditLine": "Accepted by the nation as part of the Turner Bequest 1856", "dateRange": { "endYear": 1805, "startYear": 1805, "text": "1805" }, "dateText": "1805", "depth": "", "dimensions": "support: 150 x 258 mm", "finberg": null, "foreignTitle": null, "groupTitle": "Studies for Pictures: Isleworth Sketchbook", "height": "258", "id": 64321, "inscription": null, "medium": "Pen and ink on paper", "movementCount": 0, "pageNumber": 98, "subjectCount": 1, "subjects": { "children": [ { "children": [ { "children": [ { "id": 1827, "name": "tree" } ], "id": 1809, "name": "trees" } ], "id": 60, "name": "nature" } ], "id": 1, "name": "subject" }, "thumbnailCopyright": null, "thumbnailUrl": "http://www.tate.org.uk/art/images/work/D/D40/D40572_8.jpg", "title": "A View on the Thames", "units": "mm", "url": "http://www.tate.org.uk/art/artworks/turner-a-view-on-the-thames-d40572", "width": "150" }
what's best for a one acre garden veggievicki(7b)November 24, 2012 Hubby and I are trying to figure out what to do for a large garden that we might eventually enlarge enough to do some farmer's market sales with. We have a brand new John Deere 110. There is a different brand tiller you can get for it, but not much else you can do with it. Those kubota's have the pto that would let me run some different attachments, but they seem awfully pricey. Appreciate the input. My opinion is that your acre is a lot of area for a lawn tractor with aftermarket tiller. More of a toy than a useable setup. Not really designed for that much of a garden. I went with a used Japanese compact tractor and 3-pt tiller, cost about $3500 for the pair. The combo is perfect for getting the work done in a reasonable time. And if you look around there are low prices on used equipment. I used to have a walk-behind tiller but it wore me out. Check the link below for an example of what's available. Thanks. That's what I've been looking toward. I'm regularly surfing eBay. Kubotas run very high here. John deere slightly lower. Massey seems to havE some subcomPacts that are more in my budget but not sure of the quality Don't know if this plan would work for you, but- Maybe hire out the initial tilling to someone with the proper sized equipment. Use your own smaller equipment on a "staggered" timeline as different crops are harvested to "maintain" tillage. You need a good garden tractor or even a CUT. You will be better off buying a used 10-year-old good tractor at the same cost as a new lesser tractor. If you are serious about making a go of the farmer's market, the Kubota can be written off as an investment and, amortized over its lifetime, will come out cheaper than a lawn tractor. I don't know anything about the new Massey tractors, but in the old days, they were good machines and the same tractor as Ford. My brother runs a 15-acre garden for farmer's market sales. He uses 1950's-era Allis Chalmers tractors to do all the work. To get an idea of what these fellows are telling you--take a spade and a pick, and a long-handled shovel out to where you are intending to put a garden, and get to work! You will soon see why they tell you to have somebody plow and till it first! And why a small lawn tractor won't be able to handle the work! First time ground breaking takes lots of muscle, not contained in most all lawn and light duty garden tractors, as foisted off on the average home-owner. You need a machine that uses a hard steel drive-line, not an el-cheapo with belts! JMHO: Rustyj I market garden, have for years. My main power is an Massey ferguson 35 w a 60 inch tiller. But I also use 3 cub cadet 12-14 hp tractors. I pull a plow, cultivators and peg tooth drags with them. These are 60s and 70s made by international Harvestor, real tractotrs in small size. The older john deeres and other makes are slo good tools. You can find them for 200 and up depending on condition and area of the country. I collect and restore them, and use em. Riding mowers which look like a ractor or only mowers.The wheels are held on by only 3-4 bolts or even just a split ring. Garden tractors should have a 5 bolt system to hold the tires to the axles, rearends should be cast iron, you should be able to change the trans oil, not a sealed rear. Hydraulics are nice but a spring assited lift works fine. All small tractors are made overseas, the Massey, Fords, and others are all made for AGCO, deetres todays larger Cubs are Yanmars, Kubotas is made by>>>KUbota!! Actually, most all of the sub compacts and really all tractor colors are pretty well made today; ergonomics might be a factor for some tho, usere friendly can mean different things to different folks. The problem with most small garden tractors, like the Cubs, is only around 6 inches of ground clearance, I get around that by using wide rows where the tractor isnt required to straddle the ros for cultivating. When I think of all the work required to plow, prep, and plant a one acre garden, and then add the time to weed and hoe and spray; and then comes the harvesting, Whew! I get tired. And I suppose you want to do this and actually make money too. If so do not sink a lot of money in equipment that will take forever to pay for out of a one acre garden. I have neighbors living all around me who own tractors, and not one of them get enough use out of them to justify the cost. But it's handy to have them. If I want a garden cultivated, or a field mowed, I just give them a call, and they are happy to help me out. I do pay them a little something. i have also had a market garden ( 5-7 acres) and just lately bought a kubota 46 hp, but for years,(and i mean 30+) i did just fine with hiring the big stuff. please do not try to do too much with to little a mach. what you break will end up costing more than hiring it done and 3-4 years from now you will still have a machine that isn't worth much no matter how many new parts it has. I have Case Garden Tractors with tiller, turn plow they pull 12 inch turn plow you find deals on package on craiglist by using search tempest. There online help at coltcaseIngersoll dot com all ever need. It take serval hours to get know these tractors, but help you on any Garden tractor you pick I have 7 Case Ingersoll tractors oldest 1974 446 with 3 pt category 0 hitch sleeve adapter and 41" hydraulic tiller reverse-able rotating tines. If buy wisely it sell next Gardner. Come out best buying package. IMHO you can't go wrong with an old, but ugly, good running Ford or AC tractor from the 50's. You can buy one with several attachments for around $1,000 here in SC. The reason for adding ugly is if it has been restored and it is pretty it will cost a lot more but will not necessarily be a better tractor. The old Ford 8N or 9N would be a better choice on availability of attachments. The old AC's seem to have less mechanical and starting problems than the Fords. But attachments are harder to come by because they use a different hitch system than the Fords. The Ford system is still in use today, while the old AC system isn't. I have a 1954 AC-CA and it starts right away after sitting all winter. My Dad and my neighbor both had Fords and I had to help them get them started every spring. My Dad had an AC-B also and it would start up right away after sitting all winter. I also had to do a lot of repairs on the Fords, nothing major. I rebuilt the hydraulic pumps on both of them and replaced and/or repaired many starters and generators on the Fords. But hardly any repairs on the AC's. The only thing that I have had to do to my AC-CA is repack the lift cylinders when they started leaking. My Dads AC-B had problems with the magneto a couple of times and I converted it to a coil and solved that problem.
Former New Orleans Saints player Norman Hand's death has shaken some former players At 6 feet 3 and 270 pounds, there are not many things that put fear into former New Orleans Saints Pro Bowl offensive guard Steve Korte. But with each passing obituary, he begins to grow increasingly nervous, if not downright scared. Ellis Lucia/The Times-PicayuneFormer New Orleans Saints defensive lineman Norman Hand's death has shook up some former players. In the wake of the death of former Saints defensive tackle Norman Hand, who died May 14 of heart disease at the age of 37 in South Carolina, Korte said he's concerned about the life expectancy of not just himself but of current and former NFL linemen, who typically are larger than 300 pounds. "If you think about it there are not very many great big old men," Korte said. While Hand's death may have sounded the latest alarm, there has been warning signs for years, as the list of former NFL linemen who have died because of heart conditions or undetermined causes is growing. The Saints certainly have had their share of tragedies. In recent years several former Saints lineman have died from heart or weight-related issues, including Steve Trapilo, who was 39; Frank Warren, who was 39; and Tony Elliot, who was 48. According to several studies, football linemen, who are typically classified as obese, have higher risks of diabetes and cardiovascular disease. "It is alarming in general when you realize what the consequences are to a lot of guys who played the game," said former Saints guard Brad Edelman, who has dropped nearly 40 pounds from his playing days and weighs 245 pounds. "On a personal level I'm not aware of having any conditions like that and my weight has not been an issue. But certainly it's an issue that a lot of guys need to be concerned about. Former Saints lineman Frank Warren also died from heart disease. "But it's very difficult when you have stopped playing the game and you are working in your profession to find the time to exercise. But for as many guys who are not exercising and can't find the time to exercise there are just as many who are keeping themselves in shape. It's really on an individual basis, but yes I am concerned about it for all my former players." Local fitness guru Mackie Shilstone, who trained Hand in the early 2000s and helped the defensive tackle shed more than 30 pounds when Hand played for the Saints, said he believes that many more linemen could face a similar fate as Hand once their playing careers have ended. Shilstone pointed to studies that showed linemen had greater instances of medical disorders, including hypertension, diabetes and heart disease to back up his assertion. "I've been doing this for 30 years and I classify the O- and D-line with waist measurements of greater than 40 as the land of the walking dead," said Shilstone, the executive director of The Fitness Principle at East Jefferson General Hospital. "They just don't know they are dead." Risk debated Just as word of Hand's death was beginning to spread last weekend, doctors at Tulane Medical Center were putting the finishing touches on their planned health screening of former NFL players. The event was in partnership with a national program sponsored by the NFL Player Care Foundation and supported by the Living Heart Foundation and the American Urological Association Foundation. Dr. Patrice Delafontaine, who led the study that screened 28 former NFL players for heart disease and prostate cancer, acknowledged that NFL linemen are at greater risk than other NFL players for future heart problems. "In some players, particularly the linemen who are the bigger players it is a significant issue, yes," said Delafontaine, the director of the Tulane Heart and Vascular Institute. "In these linemen, compared to even other football players that are non-linemen, the incidence is really quite a lot higher. So they have an increased risk of cardiac events such as strokes, heart attacks and etc." Still, the NFL isn't convinced that its players are at greater health risk. As evidence, the league pointed to a study done last year by Dr. Andrew M. Tucker, a cardiologist at Union Memorial Hospital in Baltimore. Tucker's study said that despite being larger in size and heavier in weight, an analysis of the cardiovascular disease risk factors of about 500 NFL players found that overall, they have a similar cardiovascular risk profile compared to the general population. The study also showed that the NFL population was found to have a lower incidence of impaired fasting glucose, and similar prevalence of abnormal cholesterol and triglyceride levels as compared to a sample of healthy young-adult men, but have an increased prevalence of high blood pressure. NFL spokesman Greg Aiello reissued a statement to The Times-Picayune that was released last May when Tucker's study was released. "This study confirms that, despite their generally larger size, NFL players are at no greater overall risk for developing cardiovascular risk factors than men of the same age in the general population. The research underscores the importance of exercise and fitness given the favorable cholesterol and glucose levels of our players. We will share this information with our team medical staffs so that they can take appropriate steps to monitor blood pressure among our players. "In addition, we will do more specific research on the blood pressure of our players under the guidance of our cardiovascular medical committee. We appreciate the work of our cardiovascular medical committee in providing our players and medical staffs with important information to help them better understand and address their risk factors for heart disease." Staying healthy While Hand's death is the latest among massive former NFL linemen, it's not the one Delafontaine is most familiar with. His brother-in-law was Trapilo, the former Saints offensive guard who played for the Black and Gold from 1987-1990 and again in 1992. Delafontaine said Trapilo struggled with staying fit after his playing days and eventually died of a heart attack while on vacation in New Hampshire in 2004. "When he stopped playing his diet wasn't the best," Delafontaine said. "He continued to put on weight and eat, and he died of the same condition (as Hand). He died of sudden cardiac arrest at 39 years old. That clearly illustrates some of the problems that these players have, particularly after they retire and they are exercising a lot less." In a league that almost mandates that its linemen weigh at least 300 pounds, life after football can be more dangerous than the violent hits that the players take on the gridiron. According to the Saints roster, of the 20 offensive linemen and interior defensive linemen, only four players are listed as weighing less than 300 pounds. But the problem isn't simply with weight, Delafontaine said, it's the type of weight an athlete carries. "Personally, there is no problem putting on weight if it is muscle, but I would be against this idea of putting on weight and it being fat," Delafontaine said. "That's bad. And that clearly should be avoided. I'm not sure that a lineman that is 250 or 260 pounds that has a lower fat content can't be successful. I would say that they probably could be as successful as a 300-pounder." Shilstone, who has offered to consult the NFL Players Association on health and fitness issues, agreed. But ultimately he said it is up to the players to take care of their bodies after they leave the NFL. "The first thing that has got to happen is that the player, himself, has got to quit renting his health and take ownership of it," Shilstone said. "He needs to get counseling and help and he's going to have to do ultimate training from what's done in football because the type of training you do in football is not the type of training you can spend 15 years doing and not do something else. "They are going to have to pay emphasis to their cardio-respiratory system which, ironically, is not really that important to playing football." But the rigors of a long football career aren't always conducive to training and exercising after the playing days have finished, formers players said. Knee injuries and other ailments often keep former players from running and doing other cardiovascular workouts. Korte, though, said he isn't taking any chances. He said his weight has dropped about 10 pounds from his playing days and he talks to and visits regularly with a cardiologist. "Who knows, I could not be here tomorrow," Korte said. "But hopefully with the stuff that I have done as far as me being very involved in the cardiovascular field, it's helped me with my diet. I've never really been heavy or overweight. I don't have diabetes. My cholesterol is really good. I watch those things all the time. It is important to me to be healthy. "Am I prolonging my life? Maybe, maybe not. You just don't know." ••••••• Nakia Hogan can be reached at nhogan@timespicayune.com or 504.826.3405.
Audrina Patridge Covers Maxim October 2009 ‘Sorority Row’ star Audrina Patridge strips down to her bikini on the October 2009 cover of Maxim magazine. “As the college killfest Sorority Row hits theaters and her final season of The Hills takes over your TV, the time has come for Audrina Patridge to come clean about her plans to dominate your world.” (Maxim)
// // Created by Dusan Klinec on 28.12.17. // #include <gtest/gtest.h> #include "../WBAES.h" #include "../WBAESGenerator.h" #include "../EncTools.h" #include "Commons.h" using namespace std; TEST(WBAES, GenerateKey) { initDefaultModulus(); shared_ptr<WBAES> wbaes(new WBAES()); WBAESGenerator generator; ExtEncoding coding; generator.generateExtEncoding(&coding, 0); generator.generateTables(const_cast<BYTE *>(test_key), KEY_SIZE_16, wbaes.get(), &coding, true); generator.generateTables(const_cast<BYTE *>(test_key), KEY_SIZE_16, wbaes.get(), &coding, false); W128b plain{}, cipher{}, state{}; arr_to_W128b(const_cast<BYTE *>(test_plaintext), 0, plain); arr_to_W128b(const_cast<BYTE *>(test_plaintext), 0, state); arr_to_W128b(const_cast<BYTE *>(test_ciphertext), 0, cipher); generator.applyExternalEnc(state, &coding, true); wbaes->encrypt(state); generator.applyExternalEnc(state, &coding, false); EXPECT_TRUE(compare_W128b(state, cipher)); generator.applyExternalEnc(state, &coding, true); wbaes->decrypt(state); generator.applyExternalEnc(state, &coding, false); EXPECT_TRUE(compare_W128b(state, plain)); std::stringstream inout; generator.save(inout, wbaes.get(), &coding); } TEST(WBAES, EncDec) { initDefaultModulus(); std::stringstream inout; // Generating part // Different scope to prevent unwanted access after generation. { shared_ptr<WBAES> wbaes(new WBAES()); WBAESGenerator generator; ExtEncoding coding; generator.generateExtEncoding(&coding, 0); generator.generateTables(const_cast<BYTE *>(test_key), KEY_SIZE_16, wbaes.get(), &coding, true); generator.generateTables(const_cast<BYTE *>(test_key), KEY_SIZE_16, wbaes.get(), &coding, false); generator.save(inout, wbaes.get(), &coding); } // Load phase shared_ptr<WBAES> wbaes2(new WBAES()); WBAESGenerator generator2; ExtEncoding coding2; generator2.load(inout, wbaes2.get(), &coding2); W128b plain{}, cipher{}, state{}; arr_to_W128b(const_cast<BYTE *>(test_plaintext), 0, plain); arr_to_W128b(const_cast<BYTE *>(test_plaintext), 0, state); arr_to_W128b(const_cast<BYTE *>(test_ciphertext), 0, cipher); generator2.applyExternalEnc(state, &coding2, true); wbaes2->encrypt(state); generator2.applyExternalEnc(state, &coding2, false); EXPECT_TRUE(compare_W128b(state, cipher)); generator2.applyExternalEnc(state, &coding2, true); wbaes2->decrypt(state); generator2.applyExternalEnc(state, &coding2, false); EXPECT_TRUE(compare_W128b(state, plain)); } TEST(WBAES, TestVectors) { initDefaultModulus(); WBAESGenerator generator; shared_ptr<WBAES> wbaes(new WBAES()); // Test WB AES with test vectors. // This test also demonstrates usage of external encodings by wrapping AES int errors = generator.testWithVectors(false, wbaes.get()); EXPECT_EQ(errors, 0); // Test WB AES with test vectors - no external encoding. errors = generator.testWithVectors(false, wbaes.get(), WBAESGEN_EXTGEN_ID); EXPECT_EQ(errors, 0); }
GLOBAL (with Printed Access Card) Why Rent from Knetbooks? Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way! Related Products Great book. Used it for my international business course. Easy to understand. Reads kind of like a magazine. The chapters are short, but has all the main points. Review cards that you can tear out of the back of the book for each chapter. Best part is the price. Even new, it was about half the cost of some of my other books that were used. Probably one of the best textbooks Iíve had to purchase it was an easy read to study for exams. The Textbook is also extremely affordable so I was expecting a raggidy textbook, but it was in good condition and it even included review cards for every chapter at the back of the textbook.
Roger Emery, a space scientist with the Rutherford-Appleton Laboratory in England, and who helped build the Infrared Space Observatory (ISO) satellite for the European Space Agency (ESA), responded. Satellites are made of lots of materials. Each has to be tested to make sure it does not change in the high vacuum of space and can withstand the temperatures which can be very cold. Space agencies keep long lists of materials and components which they have tested for use in space, to help the engineers. These are often materials which combine strength with lightness, such as aluminium alloys or carbon fibre for the structure, since the cost of launching the satellite is mainly determined by its weight. Apart from the structure of the satellite, there are many other parts, much of which involve electronics and the use of semiconductors, like silicon. These are needed for the satellite to receive command signals from the Earth and to send signals back, all controlled by a computer. This electronics looks much like the insides you find in a radio or television, but made using components selected for space, and specifically components that are not easily affected by the radiation in space. To provide the power for all this, photocells are used in the form of large panels to convert sunlight into electricity, and batteries are also used to store this power. With these basic parts of the satellite sorted out, it also needs to include instruments so that it can perform its special jobs. Examples are cameras to look down at the Earth for weather satellites (Meteosat) or telescopes to look up for astronomy (Hubble Space Telescope). Some of these need the satellite to be controlled very carefully in position. For this, small gas jets are used, often with the actual position being measured by a camera designed to look at the stars. So you can see, metals, special plastics and glasses are used to make satellites - with great care being taken in their selection and testing - and sometimes even gas or liquids in special containers.
fileFormatVersion: 2 guid: 012c135e7de4d094baea093d738625b2 folderAsset: yes DefaultImporter: userData: assetBundleName:
Stocks dipped on Wall Street on Monday as a drop in Apple partly offset gains in energy and financial stocks, some of the market's worst-performing sectors so far this year. Banks are expected to perform better in a steepening-yield curve environment, in which bonds with longer maturities need higher rates to attract investors. (Reuters) Stocks dipped on Wall Street on Monday as a drop in Apple partly offset gains in energy and financial stocks, some of the market’s worst-performing sectors so far this year. Energy, the worst-performing S&P 500 sector so far in 2017, and banks, widely underperforming the benchmark year-to-date, attracted bids despite a drop in crude prices and a yield curve that is near its flattest in eight months. Banks are expected to perform better in a steepening-yield curve environment, in which bonds with longer maturities need higher rates to attract investors. Monday’s data showed services sector activity slowed in May as new orders tumbled. Together with an April fall in orders for manufactured goods and worker productivity unchanged in the first quarter, data suggest limited scope for faster economic growth. Despite the softening economic numbers, traders still bet the Federal Reserve will raise rates at its June 13-14 meeting. Reuters data points to a 93.6-percent chance of a quarter-point hike. With the U.S. 10-year Treasury yield near its lowest in seven months, traders are looking for an upward spike and looking at which sectors could benefit from higher rates, said Brian Jacobsen, chief portfolio strategist at Wells Fargo Funds Management in Menomonee Falls, Wisconsin. “With people starting to bottom-fish the 10-year (yield), you bet on financials,” he said. Utilities, expected to underperform as yields rise, fell 0.48 percent. Watch this also: The Dow Jones Industrial Average fell 22.25 points, or 0.1 percent, to 21,184.04, the S&P 500 lost 2.97 points, or 0.12 percent, to 2,436.1 and the Nasdaq Composite dropped 10.11 points, or 0.16 percent, to 6,295.68. Energy stocks rose despite a decline in crude prices. Oil fell on concerns that Saudi Arabia cutting off ties with Qatar over its alleged support of extremist views inside Islam could hamper a global deal to reduce oil production. Traders are keeping an eye on other political developments coming up including a British election, testimony from former FBI director James Comey regarding the Trump campaign’s possible collusion with Russia, and the French legislative vote. UK opinion polls in the past week have put Prime Minister Theresa May’s Conservatives ahead, though with a narrowing lead over the Labour opposition. Apple shares fell 1.0 percent to $153.93 as the iPhone maker unveiled products and services in its annual developers conference. Alphabet’s A-class shares edged above the $1,000 mark for the first time and were among the biggest boosts to the S&P and the Nasdaq. Bristol-Myers Squibb shares fell 4.7 percent to $52.36 after an underwhelming presentation at the American Society of Clinical Oncology’s annual meeting in Chicago over the weekend. Herbalife was down 6.7 percent to $68.99 after the nutritional supplement maker lowered its sales outlook for the current quarter a month after a rosy guidance followed results. Declining issues outnumbered advancing ones on the NYSE by a 1.64-to-1 ratio; on Nasdaq, a 1.83-to-1 ratio favored decliners. The S&P 500 posted 28 new 52-week highs and 11 new lows; the Nasdaq Composite recorded 82 new highs and 70 new lows. Volume on US exchanges was about 5.52 billion shares, among the lowest of the year, below the 6.6 billion average over the last 20 trading days.
“Author of the Declaration of American Independence[,] of the Statute of Virginia for religious freedom & Father of the University of Virginia”: when Thomas Jefferson composed the epitaph for his tombstone, these were the three achievements which he listed, as he put it, “as testimonials that I have lived” (Jefferson, Writings 706). Instead of enumerating, for instance, his various political offices – secretary of state, vice president, and president of the United States among them – Jefferson chose to present himself to posterity as a man of the Enlightenment committed to the ideas of political and religious liberty, member of a generation who had given, as he claimed in his last political statement, “the … Please log in to consult the article in its entirety. If you are a member (student of staff) of a subscribing institution (see List), you should be able to access the LE on campus directly (without the need to log in), and off-campus either via the institutional log in we offer, or via your institution's remote access facilities, or by creating a personal user account with your institutional email address. If you are not a member of a subscribing institution, you will need to purchase a personal subscription. For more information on how to subscribe as an individual user, please see under Individual Subcriptions. 2354Thomas Jefferson1Historical context notes are intended to give basic and preliminary information on a topic. In some cases they will be expanded into longer entries as the Literary Encyclopedia evolves. The Literary Encyclopedia is supplied without charge to higher education institutions in countries where per capita income is below the world average. If you are in a relatively wealthy country, reading The Literary Encyclopedia and recommending it to others helps us to afford these free supplies.
Kanchan’s Story, “I’ll serve you, but you sort the rest out.” “My earliest memories are of primary school singing hymns and hearing stories about Jesus from a supply teacher. A little later I heard the story of Elijah and the prophets of Baal. A classmate said it was from the Bible, quoting chapter and verse. I was really impressed. I found the story in the public library and another friend told me where I could get a free Bible. I went to Sunday school and learned the weekly memory verses to get a Bible of my own. I was fascinated with the idea of knowing God, but who Jesus was felt like a dangerous challenge. So I focused on the Old Testament stories about Moses, David and Samson. Eventually my parents became concerned so they took my Bible away and I no longer went to church. During this time a Sunday school teacher met me occasionally and gave me Bible lesson material. My friends would tell me stories and teach me songs like I Have Decided to Follow Jesus. I heard about a church summer camp, but I knew I would never be allowed to go. Then someone from the church visited my parents and miraculously I was allowed to attend. One day when I was about 15 I was walking up the hill to my house thinking about the claims of Jesus- the cross, the sin and how to be clean. I distinctly said to God: “If this true, if you are real, I will serve you, but you sort the rest out.” At that stage I was not a good Christ follower, but God was a good keeper. I saved up my dinner money and bought a Bible from the OM bookshop. As a secret believer there were classmates and school teachers who became light bearers in my life. At 17 I refused to participate in arti – a Hindu worship ritual. My parents were very upset and sought many ways to draw me back to Hindu practices and beliefs. My late teens and early 20s were fraught with identity struggles leading to depression and a suicide attempt. The shame of being a failure to my family and failing with my higher education and not being able to attend church was just overwhelming. Years later I met other South Asian Christ followers. I have learned the difference between the cultural Western Christianity that my parents feared would cause us to live immoral lives and being a British Gujarati Christ follower. As I learn how compatible following Christ is to my Indian values and morals, I am restoring and building relationships with the South Asian community, including my family. I understand that Christ and my Indian culture are my places of belonging. These experiences have made it possible for me to reach out to Asian single, divorced women and struggling mums of toddlers many of whom bear some sort of shame and limits their acceptance as part of the respectable Asian community. I journey with them through hardships. My life continues to be a constant reminder of what Jesus brought me through. I often have dreams of being 15 and a never ending walk up that hill. It is a poignant reminder that God is still sorting out the rest.
Healthliterature Almost everyone receives much less magnesium in their diets than people have in the past. This has lead to deterioration in the condition of asthmatics. Nevertheless, this problem has not been well investigated. The less magnesium you get, the larger is the risk of colon cancer - plus asthma and imbalances in the muscle- and nerve function. Diuretic pills and empty calories is the major cause of magnesium deficiency. Even though researchers mutually disagree on how old we may become, it is still worth making sure that the time that we do have on this earth is as good as possible. This could give us more good years. A study of more than 1000 HIV-infected, pregnant, African women has shown that a daily multivitamin supplement not only causes fewer symptoms and thereby improves the quality of life. It also reduces the risk of developing AIDS.
Menu About me My name is Vasco Ferreira, i'm a young Portuguese investor who likes to share and receive constructive feedback on his stock analysis. I first graduated in Business Administration, worked for a couple of years at PricewaterhouseCoopers on financial report auditing and i'm currently doing a Master in Finance at Faculdade de Economia do Porto, University of Porto. During my first degree I was seduced by financial markets! Its complexity was a big challenge at first and everytime I learn some more it just gets more challenging. I started investing (mostly in company stocks) in 2009, but I have to admit experience came with a price. It was until I lost some money, that I started to understand a bit more about the dinamics of the stock market. Obviously I still have a long way ahead until I can say I'm a professional analyst, but my results improved a lot since I started to actually read the full reports and know the story of the company, analyse its fundamentals and graph patterns before I take a decision. This Blog serves my intention of sharing my analysis to those who like me in 2009 don't know how to start investing and at the same time allows me to improve my analysis with the feedback from the internet community.
All About STEM NEWS All About STEM are proud to be the returning sponsor of the STEM Project of the Year Award at the 2018 Educate Awards. The awards are now open for entries, could you be our 2018 winner? The Educate Awards is an annual awards ceremony celebrating education in Merseyside, Cheshire and Lancashire. Now in its 7th year, the amount of nominations submitted for the awards year upon year continues to grow at an exponential rate. A total of 21 awards are contended for via nominations which are then shortlisted by a panel of judges. The shortlist is released 4 weeks prior to the event with the winner being told of their success during a prestigious and glamorous event in one of Liverpool’s finest venues, Liverpool Cathedral. The All About STEM, STEM Project of the Year Award recognises schools that have developed a STEM based project during the academic year of 2017-18 providing an opportunity to develop an innovative and effective approach to encouraging pupils to engage with science, technology, engineering or maths. It can be a project that has a focus on one element of STEM or can be a project that covers all four areas. In 2017, Mosslands School took the top spot and the sought-after translucent-tick trophy: “The energy and excitement of the evening was an experience in itself, however before the night was over Mosslands was to reach the top step. Generously sponsored by All About STEM, Mosslands was thrilled to be awarded the prestigious STEM Project of the Year Award. We would firstly like to thank Educate Awards for hosting an unforgettable night of anxious waiting, kind words and long red carpet walks from a cathedral full of hard working and dedicated individuals. Mosslands would also like to thank the judges for their recognition and encouraging words about STEAM at Mosslands.” Mosslands School Have you been working on a STEM-sational project? You could be walking down the red carpet in November! We have loads of brilliant stuff to share with people – don’t miss out! Tick to receive our fabulous comms! Please send me the Educator mails (to receive comms related to events, resources, funding etc for young people, provided directly by All About STEM or promoted by All About STEM on behalf of relevant organisations) Please send me the Business/Organisation mails (to receive comms related to opportunities to support activities for children and young people, CSR activities, staff development etc)
I don't think that in 6 days, any one is going to bid on it. Not $50,000, at least. In these economic times, there's no one but no one who can afford to spend $50k on a luxury item which is, for all practical purposes, completely useless. I mean, for that amount of money, one can buy an entire house; a much smarter and more useful property. "Useful" and "useless" is completely immaterial, and you certainly wouldn't want to try to make it useful. You wouldn't want to put any electricity into it at all. This would be an investment in a museum piece, and if not a private collector, then a museum would certainly be the most likely party interested. I can see the Smithsonian investing $50,000 for this. It would be a draw to the museum and worth the money for that and it's investment worth. I'd go to the Smithsonian specifically to see it the next time I'm there. We watched one get snatched up with a Buy it Now a month or two ago for around $16,000, but it was not in this condition and did not have any original papers. This probably is as good an actual artifact as you're going to find, so you might as well start high. I think he's probably going to get it, although yeah, 6 days is a bit short, but $50,000 might even be low. A complete, excellent condition first consumer personal computer in history. Imagine what it'll be worth in 50 or 100 years if it's well preserved. It might even be up there with the Van Gogh's. I tell you the truth, I have to give it to the seller to start that high. Although with the provenance, the other items with it, and Steve Jobs signature on the sales slip it makes it almost impossible to impeach. I say again....Whew!! What's really cool is that this guy still has the original box. There are 2 or 3 pictures floating around with Woz and Jobs sitting at a coffee table with a stack of these white boxes. There is another image floating around from "the garage" showing what appears to be a large stack of these on a table. People spend $100M+ on a single piece of art work, some Russian guy spent $750M on a house in the French Riviera, I can see this going for $100K someday in the near future only it will be at some big name auction house and not ebay. Give it some time, and the stuff we play with will be worth some money (in choice condition and complete). Yes, why go to eBay at all? Sotheby's with a starting bid of $500,000. Place it where it belongs. The original catalyst of the present new age. The original device which has brought about the most major development in human evolution--both technological and biological--since the iron age. At $500,000, too, it would actually be way underpriced. It should be, at a bare minimum, up there with a Navajo blanket. As far as the box and other material goes, it is awesome. Keep in mind that there must have been an additional shipping carton, as well as other boxes for the transformers, that are now missing. I wonder what the condition of the motherboard really is, though. If I was going to buy one at what appears to be a record price, I would ask some questions. 1) Does it currently function? - I suspect not 2) What are the date codes on the chips? - this may give some kind of clue about how many have been replaced through the years. 3) Are the original transformers included? - they are not present in any photos. 4) Was there a keyboard? 5) How much hacking really went on to add that additional socket in the proto area - we'll see if the owner actually puts a picture of the back up on the auction site. In my opinion, any cut traces would drastically reduce value. If additional wires were just soldered on, that could be undone. Only seventeen hours to go and no bidders, but there are people asking him questions, so it might be fun to be there at the close. It looks likes there's going to be some bites. What I would do if I were him is see if the top hotel in Roseville, California would offer a discount on finest accommodations to the winner, with the stipulation that there would be a photo by the local press and Apple-related magazines of the handover in the lobby of the hotel. That is, of course, unless the buyer wants it all to be secret. Hmm, maybe he could talk Steve or someone from Apple into coming down and playing a part. How far is Roseville from Cupertino? There's one thing I find a little curious about this auction--not necessarily suspicious, but curious. The seller's eBay ID is "apple1sale." According to his ID history that's the only ID he has used since he opened his account back in August of 2007. You would think he chose that ID specifically because he was going to put up this auction. What's with the 2 year wait? Second thoughts? Or maybe he did put it up back then but got no bids? Actually, I have no suspicions about this seller. The fact that he's trying very hard to get the buyer to pick it up in person says this is all up and up. Just bring your payment in person too, buyer. Holy &h^#!! As of right now, he's got 19,200 page hits to his auction! Looks like the word has gone out. We should place bets on how much it's going to sell for. Something inside me is saying $83K. Something else is saying $124K. Here's what's going to happen: it's going to sell for $143K, the buyer's going to go pick it up, but instead of flying home with it, he or she is going to stop in New York to have it cataloged by Sotheby's and then it's going to sell at auction there in a year for $875K. You heard it here first! We should place bets on how much it's going to sell for. Something inside me is saying $83K. Something else is saying $124K. Here's what's going to happen: it's going to sell for $143K, the buyer's going to go pick it up, but instead of flying home with it, he or she is going to stop in New York to have it cataloged by Sotheby's and then it's going to sell at auction there in a year for $875K. You heard it here first! One of these things sold for a "Buy it Now" of $17,950 a month ago. Based on that alone someone I'd think you would of have to be a complete and utter idiot to spend $50k on this one. Allegedly one sold for that much in 1999, I guess, but on items like this it's almost impossible to really set a "fair market price". As everyone knows, from a practical standpoint it's completely worthless, and as a semi-rational person I find it difficult to stomach the idea that a 30 year old piece of fiberglass could fetch anything in the same ballpark as a decent Ming Vase. Of course, given enough hype a burnt piece of toast can sell for $28,000, so what do I know? Still, the fact that the last one traded for so much less then $50k, let alone eight-tenths-of-a-million-bucks, argues pretty heavily against Sotheby's setting an action reserve price much over the 20-30K ballpark. As much as I'd love finding an Apple I in the basement myself I think it's fair to say that such a find would be in the "Yay, free car!" category, not "Yay, free mansion!". I was just having fun. I was going to say he should give me a cut if it went over $100K. I did a lot of work here for him. But definitely, it's worth $50K, and sooner or later he's going to get at least that much if he keeps his nerve. We're not talking about just a computer here anymore. We're talking about an artifact. "Completely worthless" in the way you mean it is completely besides the point. A Ming vase is just some clay and glaze. A Van Gogh is just some canvas, various pigments, and hardened linseed oil. What makes value in the art and rare artifact world are various factors. First you start with rarity. There were 50 of these Apple I's made, correct? Out of that 50 how many survive? Out of those survivors how many have the original documents. Out of those with documents, how many have the original packaging? Out of those with documents, how many have the signature of the famous artist? So how many other examples of this artifact with these attributes remain in the world? Do you know of any other examples so complete? That's rarity. This one leaves those other examples way behind in the dust. Differences like these can make a difference in value in factors of 10x, 100x, 1000x when appraising an artifact. The price another fetched on the market may have little to do with the value of a more complete version, or a version which has certain other factors the other does not have. And comparing it to a Buy-it-now purchase is really absurd because you will never know how much it would have sold for in a true auction. That Buy-it-now option was, in my opinion, probably foolish, but how will you ever know? An appraiser is looking for what they sell at open auction as the best determinant. Another factor is emotional appeal. How much is the world attached to their personal computers? How many Apple faithful are there out there and how many are there amongst the world of collectors? How many people know the legend of the two Steves and their little garage beginnings? How many will know that legend in the future and attach significance to it? How much will the legend form in the heart of the culture? Significance is another factor. How significant is this artifact in history? How will that significance develop in the future? How significant will the artifact be appraised by the intellectuals? Another factor is fad. What's the current fad amongst collectors? Collectors are scooping up more than Van Gogh's and Ming vases, and increasingly so, they are snatching up items outside of the world of art. Technology is one of the hot items. Another factor is the prestige of owning an item. What prestige is there when, in fifty years, you pull out the first personal computer with a signature of the Steve when he was an unknown? Steve will forever be a legend in the history of American business, and his legend may increase with time and his passing. The things legends touch become valuable. What will it mean to a businessman in the future to own the beginnings of one of the most famous businessmen in history? Businesswomen too, of course. Prestige and emotional appeal being a couple of participants in an open auction. Yes, I'd say it's a little more than a 30 year old piece of fiberglass. One man's mansion is another man's outhouse, and three quarters of a million does not buy a mansion where I live. The house I'm sitting in right now is worth more than that, and let me assure you, it's no mansion. I'm having a problem keeping the little inflatable pool in the front yard inflated. Is a 30 year old piece of fiberglass worth more than this plot of land and frame of sticks? You and I are not the ones in the position to determine that. And I don't think the vintage systems sub-category in the Apple computers section of eBay is the greatest place to determine value on an object of significant rarity, either. Well, not this time around. 50 grand to you is comparatively 5 dollars to some others, and that 5 dollars when invested correctly can bring high yields. Because it sounds absurd to you, doesn't make it so. There are other worlds within this world. Sometimes it takes a little while for them to intersect. There are other "wild card" factors, too, which you might put in the obsessive or eccentric category. Someone needs to fill a gap in his collection or his soul identifies with a particular object. They will pay a premium. Intersecting with them could take quite awhile. I'd say there's high potential for that kind of sale here, too. Still, like I say, who I'd like to see buy it is the Smithsonian. I'd love to go see a display with a recreation of the garage with wax figures of Steve and Steve and that other guy standing around this thing. That would be a fun sight. Significance is another factor. How significant is this artifact in history? How will that significance develop in the future? How significant will the artifact be appraised by the intellectuals? To be bluntly honest, I think the "significance factor" is being overplayed here. In the grand scheme of things the Apple I *wasn't* a particularly significant computer. Yes, it was the first product churned out by the "Two Steves", but it was just one of many single-board hobby computers on the market at the time, and compared to some of its rivals it wasn't even a particularly good seller. As a technological relic it's a dud. (If you're looking for "first", look at the Altair. If you're looking at "First for the Masses", look at the Apple ][/Commodore PET/TRS-80 Model I trifecta for your museum.) The only thing that makes it special is the Apple name. Which is why frankly I think it compares well to the Virgin Mary Toast. It's a religious icon, not a technological milestone. If Apple had shriveled up and died like Commodore or Processor Tech it'd be worth a lot less the $50,000. ;^) Nope, if that were the case, it wouldn't be worth $50,000 (maybe). But that wasn't the case, and they weren't the machines that went on to significantly revolutionize the world. The revolution was not only in technology, it was in the culture in many of the most profound ways. Like Steve said, do you want to keep selling sugar water, or do you want to change the world--or whatever the line was. You keep looking at it with your computer engineer eyes. When I say intellectuals, I mean partly engineers, etc., but more importantly, anthropologists, sociologists, historians, and other such ilk. How important was Steve's determination and vision? Wallace came up with the theory of evolution too, and was an instigator for Darwin's ideas, but who knows who he was? What do you think is more valuable, Wallace's notes, or Darwin's notes from the Beagle? Wallace may have been the better scientist, but that doesn't make his artifacts more valuable. Darwin's reputation survived. That makes what remains of him more "valuable" than what survives of Wallace. The Virgin Mary Toast was a product of hysteria and hysterical, not much like the Apple I, but you could certainly argue a case of religious icon for the Apple I as well, but it would only be one factor--maybe an important factor to the buyer--amongst a lot of factors, the primary being the place in history of the development of the human race as a whole. I don't think anyone's going to think an Apple II is more valuable than an Apple I even though it was possibly more instrumental in the great change. They're both part of the Apple legend and the Apple I is more rare and closer to the Big Bang. But Eudi, I consider you an important intellectual and your opinion certainly has significance in the evaluation, but it probably doesn't have much in the sale. It's all a game, after all. Value is all a magic trick, much like the value of the dollar. In the world of fiat currency and Fractional Reserve Lending all is based on nothing except what you can convince others what nothing is worth. Smoke and mirrors--that's how value is actually determined in the modern world and what people finally buy into. The world of collection is the same. Yes, it's just a piece of fiberglass. Isn't that funny? The Liberty Bell is just a hunk of metal that sits there doing nothing, and it's not a great example of good manufacturing. It's got that big crack, after all. It is significant not so much because of it's technology, but because it was the first of a breed, the same way that a Ford Model A 1903 is significant. Rarity contributes to value also. Note that there were far fewer Apple 1's made than 1903 model A's. Those model A's go for hundreds of thousands of dollars these days. I expect that autos will always have more widespread appeal than computers, so I don't expect to see 5 figure Apple 1's anytime soon. I never thought that my little Sunday morning eBay report would spark such controversy. lol Personally, I think that the Apple I was the culmination of the "Dream" of the two Steves. The Apple II was the "Reality". You have to remember that Woz had been working the hardware design angle for years before they decided to finally build one. I'm just glad that folks are still interested in the dream and the reality after all these years. .... How important was Steve's determination and vision? Wallace came up with the theory of evolution too, and was an instigator for Darwin's ideas, but who knows who he was? What do you think is more valuable, Wallace's notes, or Darwin's notes from the Beagle? Wallace may have been the better scientist, but that doesn't make his artifacts more valuable. Darwin's reputation survived. That makes what remains of him more "valuable" than what survives of Wallace... Honestly, I think you're running off the rails here. Outside of the little circle of aging fanatics who really *love* Apple computers Steve Jobs just isn't that important. There's a powerful mythic story surrounding him inside that group but outside of it nobody cares. I'm willing to grant that, say, 100 years from now, when historians are writing the history books there's probably a fair chance that his name will come up... historians love finding "personalities" to work into their sepia-tinted fairy tales to give them life. But he's no Charles Darwin. If anything he's more of an Andrew Carnegie or John Pierpont Morgan. Not to say that "Captains of Industry" and railway tycoons and other such characters aren't "interesting", but there will have been a serious miscarriage of historical justice if a greedy, self-centered twit like Steve Jobs is the name parroted as "Father of the Computer Age" by our great, great grandchildren in history class. For crying out loud, I'd rather have it be Bill Gates. For all the damage he's done at least he's akin to Carnegie when it comes to making charitable donations to atone for his cutthroat capitalistic indiscretions. (Perhaps the fact that Steve Jobs is such a profoundly *unlikable* person might actually up his chances of making the history books, but can't help hoping that his true nature is accurately reflected in the accounts. Maybe he'll make it "all right" by donating all his billions of bucks to charity when his new liver wears out, but so far we're not seeing much "nice" from that guy.) And with that said, I'd also make the argument that (assuming our culture lasts that long) an Apple ][ or, even better, an original toaster-shaped Macintosh, would be a wiser museum purchase in 100 years than an Apple I, assuming the "museum" in question here is an educational institution and not someone obsessive personal collection. Either of those is a thing that would be recognized by a visiting child's great grandparents, grandparents, or possibly even parents (depending on how quickly and in what direction user interface technology eventually evolves) as a "computer". Primitive but recognizable in the same sense that a Curved Dash Oldsmobile is still a "Car" to modern eyes, albeit a strange and alien one with obvious ties to a previous technology. (aka, horse-drawn carriages.) A bare Apple I is just a circuit board, indistinguishable to untrained eyes from one ripped from a stereo or television set or any number of other things. It makes a *lousy* public display. No one can relate to that. (That well-known example of an Apple I housed in a wooden console complete with keyboard and crude woodburned/routed "APPLE COMPUTER" sign affixed to the top of it would be an *excellent* display, on the other hand. And for the record, that one is *already* in the Smithsonian. So no, they don't need to buy this guy's.) Anyway. My personal opinion certainly doesn't count for anything, and I'm sure some more Apple I's are going to change hands for ridiculous prices before I'm dead and gone. But I do think there's a lid on just how high they'll go. As noted on the web pages of the creator of the "Rev 0 Apple II replica" motherboard, the prices of good condition early Apple II's are already lapping the "multi-thousand dollar" waterlines. Will they ever sell for "as much" as an Apple I? I'll grant not, but they will trade hands much more often, and thus it will eventually be "predictable" about how much a given one is worth. (Similar to how it's roughly possible to predict how much a given Model T or 1956 Bel Air Chevy can fetch, based on rarity and condition.) Something as rare as an Apple I, and with such limited appeal is almost impossible to price accurately. To make another analogy to car collecting, a bare Apple I isn't a "whole car". It's not even like having a (1903) Model A Ford... it's almost like having the engine from one of Ford's early racing cars or one of the vehicles he built for the failed "Detroit Automobile Company" venture in 1899. Certainly rare, certainly interesting, but something that sort of depends on the viewer having a personal interest in Henry Ford's life and career, not a general interest in automobiles. Find the right guy it's a gold mine, but the total population of people lusting for this object is going to be small. I'm sure it's rough having something "worth" a zillion bucks that you can't find a buyer for. My heart breaks for him. In the end, is it worth $50,000? Sure, whatever. If you want it that bad, go nuts. (And chances are that, yes, someday some obsessive collector with more money than sense will want it that bad.) It's simply my personal opinion that the curator of public institution would have no business wasting that much money on it. Spend it on a fossil or Grecian mural or something else genuinely worthwhile instead. The Smithsonian has one already, one's enough. I don't understand the anger that you seem to have towards this guy. It belongs to him. He can do with it what he wants. You make it sound like it's yours and he is trying to sell your stuff for more than what you paid for it. But no! He's just a greedy little grubber who wants to make a quick $53,000 dollars off of it so he can spend the money on God knows what. I really don't think it's fair to insult the seller because he/she doesn't place the same emotional value to an Apple 1 as others may, and not everyone's in the same financial boat. Heck, if it came to "pay off the majority of my mortgage" or "have a historically interesting 30+ year old computer around the house", believe me, I'd soon have a much smaller mortgage. If I could only get $5K rather than $50K, I'd still sell it. __________________ "Give a man a fire, he's warm for a day. Set a man on fire and he's warm for the rest of his life." (Terry Pratchett) Heck, if it came to "pay off the majority of my mortgage" or "have a historically interesting 30+ year old computer around the house", believe me, I'd soon have a much smaller mortgage. If I could only get $5K rather than $50K, I'd still sell it. Dang, I wished I lived somewhere where $50,000 was the better part of a mortgage... ;^b Eudi, I wasn't trying to imply there were any similarities between Jobs and Darwin. I was only trying to point out that the history of invention is replete with examples of two independent characters coming up with the same "invention" contemporaneously, but only one of the two becomes famous in popular history as the inventor, and so it went with Apple Computer. Apple Computer gets the crown for inventing the personal computer even though that's not the accurate truth, and the main reason it gets that crown is because the Apple story is a good story. It's something that people can remember after they've been told it. Legend becomes myth. The story enters the cultural mythology up there with Graham Bell, Henry Ford, Elvis, and Marilyn. When the American masses conceive of the development of the computer, it'll pretty much go something like, huge military mainframes, punch cards flying through a conveyor system, the HAL 9000 singing "Daisy," the Apple Computer garage, and the internet. Something like that is the popular history of the American computer in people's minds. It's what the mind grasps and carries around. Apple is entrenched there in the mythology. You might say the two Steves, but the truth is, the amount of people who know who Woz is is probably 1% of those who know who Steve Jobs is, so whether he deserves it or not, Steve, and Bill, are the poster boys for the invention of the computer, since in popular conception, the computer means the personal computer. If Andy Warhol was still alive he might be making large prints of multi-colored portraits of Steve and Bill. It's very interesting to hear you dissing Steve so vehemently. I've heard he's difficult, but this is the first time I've heard he's despicable. Columbus and Captain Cook come to mind. Evidently, despite their popular depiction, both of them were actually real creeps. Captains of ships, captains of industry--they've both got total command, so some form a tyranny is available. Somebody fairly recently--Time magazine?--called Jobs the most important leader in American business. I'll keep your depiction under consideration until I stumble on other first-hand experiences. I don't know what he does with his money. You'd have to have the details to try to pass judgment on that, and frankly, I wouldn't myself, bother spending any time trying to pass judgment on Steve Jobs. I really don't care so much, and that kind of judgment is so often based on hearsay. Fire an employee because he was unproductive or not part of the plan, and you immediately have a tyrant at the helm. The wood frame for the Apple I. Where did that come from? Are those all custom made by the buyer? I think the documents this guy's got is probably the most fascinating part of his collection. That letter from Steve typed out on lined binder paper is pretty funny. It just plays right into the mythology. A garage business on the brink of huge success. A character playing the part of a businessman but not yet capable of realizing the need for the proper trappings, or also, someone so determined for success, he doesn't stop to attend to niceties like the correct stationary, but just keeps moving along despite what others may think. This is the kind of stuff that makes a good story and an entertaining sight. The other fact that all there is in hardware is that circuit board plays well, too. People will say, is that all it was? But then you look at the documents and the shipping box and you realize, it's not just the board, the packaging is as important as the board, because that's what the personal computer is, it's a packaging concept. And also, even though it's all packaged, it's not complete in our preconception of complete. There isn't a housing for the board. That's fascinating too. The package requires the buyer to complete the setup--another aspect of the message, "don't worry about EVERYTHING--just get it out there!" You see in that garage, clear as day, the popular conception of the American formula for success. That's why Apple is firmly entrenched in the mythology. It's an easily understandable example with rich characters. I'd rather see that than simply the board in a custom made frame in a glass museum box. The fact that this guy's got the whole picture in his collection is what makes it so valuable, because the board alone says very little except, this is all there was, unless of course, you're a computer engineer and know what you're looking at, and 99.999% of the people out there, aren't. I also really love seeing on the actual receipt the $666.66 price. That'll get the Apocalypse fanatics gasping. That was intentional by Jobs, so yeah, maybe he is the devil, or couldn't help himself from pricking people with the idea. When the American masses conceive of the development of the computer, it'll pretty much go something like, huge military mainframes, punch cards flying through a conveyor system, the HAL 9000 singing "Daisy," the Apple Computer garage, and the internet. Something like that is the popular history of the American computer in people's minds. You're making an incredibly broad assumption regarding what pieces of the story will end up winning the popular imagination. All I'll say is even now if you pick up a book the early era goes: 1971 Federico Faggin and Ted Hoff "invent" the microprocessor 1975 Altair makes the cover of Popular Electronics. Some kid destined to own the universe named Bill Gates writes BASIC for it. The "Homebrew Computer Club" is founded in Silicon Valley, including a couple guys named Steve who were later involved in launching one of... 1977 "The Trifecta", the "first *real* personal computers". 1981 IBM introduces the "PC", asks that Bill Gates kid for an OS, thus spawning the biggest software monopoly in history 1984 Apple and Steve Jobs introduces the first "affordable" example of a GUI operating system, which employed ideas stolen from the Xerox Parc research center. 1985 Microsoft introduces Windows based on stolen goods stolen from Apple, thus marking the beginning of the end of history. There are a whole slew of colorful names that turn up in that 1971-1985 timeslot, such as Gary Kildall, Paul Allen, Dan Bricklin... Steve Jobs isn't actually that important until you get to 1984, and my guess is *that* is what he'll be remembered for. In any case, in a hundred years I doubt he'll exactly be a household name. How many people remember names like Lee De Forest, Edwin Armstrong, or David Sarnoff? Or how about Paul Gottlieb Nipkow, John Logie Baird, or Philo Farnsworth? (For that matter, exactly how much would an original 1927 Farnsworth "Image Dissector" tube be worth on eBay? A thousand bucks? A million? Absolutely nothing or absolutely priceless? The answer of course is "If you think it's priceless eBay would be a stupid place to sell it." And of course, whatever you might think it's worth now, what do you think it was worth in 1957? That's how removed we are from the Apple I. It's *way* too early to be judging its place in history.) Anyway, I'm not going to argue the point anymore. If you think it's such a fabulous buy then why not take out a second mortgage and buy it yourself? Quote: It's very interesting to hear you dissing Steve so vehemently. I've heard he's difficult, but this is the first time I've heard he's despicable. It's only a three day auction, so he probably has very good reason to believe someone overseas might have been ready to bid. More power to him. Eudi, I said I think it's worth $50,000. I didn't say it was necessarily a good deal. It might be a good deal. A good deal would be less than it's worth, and enough less than it's worth that the profit from eventually reselling it would justify the purchase and all the cost and hassle that purchasing and preserving would entail. There are people who do this regularly and are able to weigh all those factors. There are collectors who specialize in technology and know what they're doing and what they're buying and the financial risks involved. If you want to sit at the table, you should know how to play poker. And yeah, it's way out of my price range. I'd have a really hard time buying a collectable Apple II. And you were talking about people in the history books. I'm talking about the people we carry around in our heads, and more importantly, the people the general public carries around in their head. Someone has to get credit for inventing the computer--Bill Gates isn't really associated with any computer, but I wouldn't doubt that a lot of people think he was in that garage too. Collecting is definitely a gamble. Jobs may be remembered more for inventing the iPhone. It's a calculated guess. Now I'm kind of curious what the sellers motivation is. Since he seems to have been planning this for some time, why would he choose now to sell it? Maybe he needs $50000 and this is the only thing he has of value? And now he follows up the unbid auction with a 3 day listing? The only rationale I can think of is he is trying to tempt foreign bidders due to the low dollar valuation. Still it comes to 33000 Euros or 30000 GBPs, and that's shooting quite high in my opinion. It's kind of fun to speculate, but I suppose we'll never really know. And I noticed it doesn't have the power supply. Maybe I should offer the power switch and transformers from my Obtronix for $10000. "Please accept my apology to those outside the United States, who were accidentally excluded from bidding when this item was first listed." This is obviously the reason for the three day auction. Maybe he needs the money for the hospital bill for his suffering child. Maybe to keep the banks from foreclosing on his house. Maybe because he's found the most beautiful hooker of all time. Maybe he's been putting it up on eBay for the past two years and for some reason no one here has noticed it before. Yes, it's NOT necessarily greed when you put a high price ON SOMETHING NO ONE HAS TO BUY. If it sells, that's the new going price. If you can't handle it, and realize you're out of the game, then here's some advice:http://new.wavlist.com/movies/028/lkg-pain.wav If a little girl comes up to your popsickle stand and wants to buy a popsickle and you charge her $5, that's greed. If someone prices his very rare, one of a kind, historically significant computer at $50,000, that's intelligence. Your anger is misplaced. There's plenty of genuine "greedy little grubbers" in the world that your anger would be appropriately directed at. For example, you might consider those who gamble hundreds of billions on derivatives, and when their bets all go bust, they extort the government to sign off their losses onto YOU the taxpayer, and your children, and your grandchildren. These people might deserve your contempt in relation to the topic of greed. Then there are others (or maybe not others) who might, um...control a Congressman from North Carolina and get him to enter into committee a bill that would have, if it had passed, undermined the Paul/Grayson bill to audit the Federal Reserve. These too, might be people to get really really angry at for the greed in the world, but of course, these are just examples, and I in no way intend to enter politics into the discussion, but yeah, get really really angry at the greedy, but realize who you should actually be really really angry at. And you were talking about people in the history books. I'm talking about the people we carry around in our heads, and more importantly, the people the general public carries around in their head. Someone has to get credit for inventing the computer... There probably is someone out there with $50,000 who has the wrong idea in his head that Steve Jobs invented in the computer, sure. That doesn't mean he's right. ;^) Anyway. I still think you're too close to the Steve Jobs story to judge it accurately, but again, that's just my opinion. It would be interesting to conduct a random poll asking shmoes on the street "Who is Bill Gates?" and "Who is Steve Jobs?". My gut tells me Bill Gates is going to win the name recognition award. If nothing else consider the fact that, to be blunt, Steve Jobs is on borrowed time. He's living on someone else's liver *and* he's a cancer survivor. If it was *just* the liver transplant statistics say he has roughly a 75% chance of living long enough to see Apple Computer's 40th anniversary. Liver transplant patents *have* survived 25 years, but frankly the odds suggest there's just not that much time left for him to secure his legacy, whatever it is. Unless his will has a great "just one more thing" paragraph in it there's a distinct chance that no one is going to miss that man when he's gone. (Other then the board of directors at Apple, Inc., of course. I do worry what will happen to Pixar without him, but that's another story.) On the other hand, unless there's something wrong with him we don't know about there's a really good chance that Bill Gates is going to be kicking around for another third of a century. Furthermore, the Bill and Melinda Gates foundation will probably be around long after that. (Andrew Carnegie has been dead for ninety years and yet his name still turns up as a sponsor for *all sorts of things*.) Bill Gates' obituary is going to name him as "one of the" fathers of the personal computer, and he's going to be listed that way on the books of his foundation for perpetuity. There's going to be a *strong lobby* for Bill Gates' case that's likely to last well beyond our lifetimes. And if someone has to be erroneously named "Father of the PC", history points to Bill Gates having a *much* better claim anyway. Two out of three of the 1977 PC introductions came with a variant of Microsoft Basic (three out of three if you count Applesoft), meaning that Mr. Gates' software was the first thing most people who bought a computer ever saw. Gates porting BASIC to the Altair set *the standard* for what an early personal computer was. The Apple I was an evolutionary copy of that template, a stepping stone that *many feet* were hitting at the same time on the path toward real PCs for the masses. And Steve Jobs didn't even build it, he promoted it. Sorry, he loses. Anyway. All that said, best of luck to the seller. The only thing I might suggest (coldly and brutally) is unless you simply *must* sell it maybe you should sit on it for a few years and, uhm... wait for the "Michael Jackson" moment to put it up for auction. That's the window in history where someone might give you a million bucks for it. ;^b (Other then the board of directors at Apple, Inc., of course. I do worry what will happen to Pixar without him, but that's another story.) Pixar will likely be fine. Apple, on the other hand, will crash and burn. Not because it would have lost Jobs' supposed "technological vision" (which is a crock; he's a salesman who simply says "yes" and "no" to ideas that his employees present him), but because Apple shareholders would dump their investments as quickly as they could. Apple shareholders aren't computer experts; they're fat cats (and a few Joe Schmoes too) whose only expertise is how to make money; the only knowledge of Apple they have is what they get from CNN. They hold onto the false belief (as do many ignorant Apple fanboys) that Jobs is the lifeblood of Apple, and without him, Apple will stop innovating. Assuming that article is legit, I hope he did find his sucker for real. A guy in Sacramento selling off everything he has of value... he's probably desperately trying to stave off the inevitable foreclosure of his stupidly over-mortgaged dream McMansion. (Heck, it was probably the HELOC-ed bubble "equity" from said McMansion that bought him the Apple 1 in the first place, back when America suffered from this mass delusion that 1/8th of an acre of grass-covered landfill and a pile of sticks would appreciate 20% a year simply because it existed.) The real question is what profile fits the buyer: "obsessive computer collector", "insane Apple/Steve Jobs zealot", or "Shrewed/Stupid Investor". It had better darn well not have been a museum curator, at least not the curator of a museum funded by public money. :^b From the product description: "It's hard to believe that one man revolutionized computers in the 1970s and '80s (with the Apple II and the Mac), animated movies in the 1990s (with Pixar), and digital music in the 2000s (with the iPod and iTunes). No wonder some people worship Steve Jobs like a god." It makes the mind boggle to think that there are actually folks who think that Jobs came up with the ideas and schematics for the Apple I,the Apple II, and the Mac. He was a salesman for cripes sake. Woz did all the thinking when it came to the actual building of the I and II, and several other folks for the Mac, but Jobs gets all the credit. It's kinda like the vikings getting to the new world first and Columbus getting all the glory and a national holiday. Ooops. I shouldn't say that. Someone will want to have a Steve Jobs Day and make it a national holiday. lol The real question is what profile fits the buyer: "obsessive computer collector", "insane Apple/Steve Jobs zealot", or "Shrewed/Stupid Investor". It had better darn well not have been a museum curator, at least not the curator of a museum funded by public money. :^b I calculate a final value fee of $771. That would be a pretty expensive shill. They could mutually cancel the transaction to avoid the final value fee, but that would put them back at square one, so I don't see any purpose in a shill. Actually, I guess it could have been a shill, if he knew someone were very seriously interested and he wanted to stimulate that person with the idea of not letting it get away. If he did that, that was a big mistake, because now, if he does put it back up for auction after canceling it, then everyone is going to suspect it was a shill, and then everyone is indeed going to be screaming fowl. But as of right now, I'm a little mystified at all the strong urges here to crucify this guy. Where's it all coming from? There's some aspect of a high tide raises all boats, after all. If the Apple I's start selling high, then that might raise the value of all your Apple II's, so you might want to be cheering this guy on. But as of right now, I'm a little mystified at all the strong urges here to crucify this guy. Where's it all coming from? I'm not seeing that at all. In fact, most of the sentiment I'm getting from this thread is that the buyer of a $50k Apple I is an idiot, not the seller. Plenty of people sell crap for much too high of a price (e.g. Bose, Sharper Image, and some even argue Apple) but how is it the seller's fault for wanting to make as much money as they can? Caveat emptor, after all. Remember the immortal words of P.T. Barnum -- this guy can relist the auction as many times as he wants, but ultimately the sucker will be the person who falls for it. I fail to see how the saga of this particular computer is so captivating. This page, the entire Applefritter site, and all subsites of are copyright 1999-2999 by Tom Owad unless otherwise noted. All rights reserved. Apple, the Apple logo, Macintosh, Mac, MacOS, MacBook, iMac, and Mac Pro are trademarks of Apple Computer, Inc. LEGO®is a trademark of the LEGO Group of companies which does not sponsor, authorize or endorse this site (the feeling's mutual).
Although presented as one of the local classics, it's not a route I would quickly recommend. We experienced quite a lot of rockfall and the rock quality, while good in the more difficult sections, was often quite poor elsewhere. The route is not as aesthetically pleasing up close as it appears from afar but the biggest challenge is route finding. Climbed the 6a finish which turned out to be not that difficult. Take care on last abseil not to get your ropes stuck. Climbed the Barre Noire South Pillar and descended the normal route. We did the climb in day from the parking in Pré de Madame Carle which was pretty long but doable. The rock quality is good at the difficult parts of the climb. Be sure to traverse left towards the final wall at bolted belay. A nice alpine climb.
strict pbp creationists I liked Damian Conway's book Perl Best Practices. It had a lot of sound advice that can help a programmer or programming group decide on a set of house rules. For those who aren't interested in making a lot of decisions, it can even be used as a pre-built set of standards (although a few of its suggestions, generally those involving modules releaed by Damian for the book, are untenable). Perl::Critic provided a fantastic way to check your code gains the rules in PBP, or against many other kinds of rules, and it became quite popular. What has begun to really drive me nuts is the application of these rules without regard to how they affect the program. More than once, now, I've seen code changed to comply with PBP, only to be completely broken as a result. To paraphrase Mark Jason Dominus, apparently it is important to these programmers to get the wrong answer as maintainably as possible. Sure, tests would solve this problem, but Perl::Critic can't tell you that you have uncovered branches. It can just tell you that you separated statements with a comma, or that you named a method after a builtin. The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way. Without JavaScript enabled, you might want to use the classic discussion system instead. If you login, you can remember this preference. Please Log In to Continue I've had to fix enough code where the original programmer's intent wasn't clear, or is lost in the mists of time.In the absence of some explicit documentation that says the example function doesn't return anything, the change you show seems reasonable. And if you have explicit documentation that says the example function doesn't return anything, the change also seems reasonable -- it guarantees that someone using your interface can't ignore the documentation, depend on undocumented functionality, and force y Mindlessly putting it one place is just as wrong as mindlessly putting it in another. If you don’t know where it goes, you don’t put it anywhere – you go and look at the docs and the rest of the codebase. If that’s not in the cards, for whatever reason, then you leave damn well alone – even if that means Perl::Critic continues moaning about it. Because it should. Filling in the paperwork just to make it happy without knowing what you’re doing is just self-deception. Well, first of all, there *were* explicit docs that said that text was returned.Beyond that, though, this change caused the entire module to become completely useless, which means that it wasn't desk checked. Why not? Because the module wasn't undergoing any actual maintenance. In the course of other work, someone saw Perl::Critic complain about "no explicit return" and added one, without further testing. Sure, automated testing would've caught this, but if there are no automated tests, you don't make cha The original code doesn’t make it obvious whether anything should be returned or not. Putting in an explicit return – assuming, of course, that you put it in the right place – definitely improves the code. Perhaps that argument might be true for a longer, more complicated subroutine. I agree that implicit returns can be confusing. Perhaps a better standard would be to ban them instead of requiring unnecessary return statements. Then it would be clear that a this function doesn't return anything useful. I'll also note that rjbs didn't say what the subroutine's documentation says. Maybe it reads "Prepares a report and saves it in $file. Doesn't return a damn thing." Euhm. How are you going to ban implicit returns without requiring return statements? What I meant was having a standard that if the function returns a useable value, there should be an explicit return statement. If not, then it's OK to leave it out. This way there are fewer returns cluttering up your code, and the syntax is similar to languages like C and Java that have void functions. The reason that requiring an explicit return is a good idea is that it prevents people from relying on accidental return values. Say I have a method "optimize." It exists only to alter the object, but it happens to end with: My favorite PBP worst practice is adding/xsm to every regular expression. All of a sudden, regexes start to behave oddly, and when asked about this in code reviews, people can only say "Damian says to do that" but can't explain why they should or even what the options do (but hey, that's why I get paid to do code reviews:).It might be good to write new regexes with/x, but unless you want the features that/sm provides (that is, want to change the meaning of., ^, or $), you need to stay away from them. I'm torn. That's a good one, and more likely to be sort of insidious. I really take exception to some of the blanket "use wacky modules!" suggestions. version.pm tends, in my experience, to lead to heartbreak, or at least needlessly-inflated prereqs. The best case I saw was someone who'd uploaded a VERY simple, pure-core module to the CPAN, but then required version.pm and Smart::Comments. I mean, the beauty of Smart::Comments is that it won't be a prereq, isn't it?And then there's... well, other modu I've personally hated the/xsm recommendation because it means I then have to hunt through the expression to find if there are any uses of ^, $,., or whitespace that are being modified. It's far easier to look at an expression and see that its flags are only set when meaningful. Not quite that egregiously, but I did just get bit by such a critter. P::C griped about my "open(FILE, '>filename')" bits, not without justification, so I finally got around to remembering how they were supposed to work.So okay, I changed a bit of code that piped to sendmail (exim, actually). But then, and here's where I ran into trouble, before I tested it I made some other cleanups, one of which involved deciding to replace the hardcoded sendmail with Email::Send.
California Science Center Two decades after the NFL abandoned L.A. and Orange counties, the Los Angeles Memorial Coliseum could once again come into play as an interim home for an NFL team. The San Diego Chargers and the Oakland Raiders have announced that they are pursuing a proposed $1.7 billion stadium in Carson. The owner of the St. Louis Rams has purchased property for a stadium in Inglewood. If any of those teams move to Los Angeles, they will need a place to play while the stadium is erected. USC has played football games at the Coliseum since 1923. In September 2013, the California Science Center gave final approval to a deal that granted USC, a private university, control over the... Related "California Science Center" Articles Two decades after the NFL abandoned L.A. and Orange counties, the Los Angeles Memorial Coliseum could once again come into play as an interim home for an NFL team. The San Diego Chargers and the Oakland Raiders have announced that... Lark Galloway-Gilliam, a longtime community advocate who waged successful campaigns to improve health and environmental quality in South Los Angeles by taking on big oil companies, preserving trees and expanding dining options, has died. She was 61. ... For at least an hour, one of the biggest stars on the planet was the center of attention at the premiere of CBS' science-fiction drama "Extant" at the California Science Center in Exposition Park. Hundreds of invited guests sampling appetizers... The U.S. may not have an operating space shuttle program at the moment, but the new animated series on KCET, "Space Racers," could help inspire the next generation of astronauts and space plane engineers. The new series, which debuts on... The star power under a tented ballroom enclosing a blocklong stretch of Beverly Hills' Crescent Drive was intense. Kevin Spacey, Jodie Foster, Amy Adams, Gwen Stefani, Demi Moore and 1,000 or so other influencers came out in glittering gowns and tuxes for... Atlantis is ready for its close-up. The orbiter that made the final flight of NASA's shuttle program now is in a new $100-million home created for it at the Kennedy Space Center Visitor Complex. The 90,000-square foot attraction — called Space Shuttle... Forget about learning the state capitals, at least, as the sum total of your knowledge of geography. "Geography is about meaning, not knowing place names and memorizing lists — that was school geography," said Daniel Edelson, vice president for... The space shuttle Endeavour. Brought to you by Toyota?Next week, when NASA's recently retired shuttle makes the last leg of its long journey from the Kennedy Space Center in Florida to the California Science Center in Exposition Park, it will be hauled... The space shuttle Endeavour made its final journey across the nation and Los Angeles to its new home at the California Science Center in Exposition Park. How much do you know about the shuttle's storied past? Take our quiz to find out. WASHINGTON -- Sorry, Houston, you didn’t get a space shuttle, but at least you’ll get a glimpse of the last one to fly -- on its way to L.A.NASA’s plans for delivering the retired shuttle Endeavour to its permanent home in California call for the... Space shuttle Endeavour's final 12-mile journey through the streets of South Los Angeles already promises to be a meticulously planned spectacle: a two-day parade, an overnight slumber party in Inglewood and enough hoopla to create a giant traffic... In its 25 missions spanning nearly two decades, the space shuttle Endeavour circled the Earth more than 4,600 times, spending a total of 299 days in space.It carried the crews that assembled the first U.S. component of the International Space Station, and...
About the Louisville Be Trash SMART Program Are you a proud resident of Louisville? Is your home part of the city’s residential trash program? Do you currently use one or more 64- or 96-gallon trash carts? If you answered YES to these questions, you can save at least $5 per month on your monthly trash bill AND you can enter to win a $100 gift card to Alfalfa’s Market. You will be conserving natural resources, reducing your climate impact and helping our local economy! If you already use a small trash cart (32 gallons) you can still enter to win. Tips for reducing waste at home In the Kitchen Get a compost pail or bucket at your local hardware store for your food and paper scraps. Take it out to your compost cart every day to reduce odors. Use durable plates and utensils for all your dining needs. Even outdoor eating is easy with washable, reusable plastic ware. If you are expecting a large party, you can use certified compostable plates, utensils, and cups. (Make sure the products say “certified compostable” before putting them in your curbside compost bin.) In the Bathroom Stick a small compost bin in each bathroom to collect paper towels and tissues. Recycle your shampoo bottles. In the Office Use a small recycle bin to collect office paper, newspapers, mail and magazines. While Shopping Buy products that are minimally packaged. Examples include cereal in plastic bags only instead of boxes, and items that have only one packaging like a box and no outer plastic packaging. Buy products that have packaging that can be reused or recycled. Cardboard can be recycled at the curb, and white block foam packaging and bubble wrap can be recycled at the Center for Hard to Recycle Materials (CHaRM) in Boulder. Fees may apply. Learn more at www.ecocycle.org/charm. Buy in bulk when you can. Grocery stores have bulk dispensers that allow you to purchase the quantity of nuts, grains, beans or rice you need without a lot of extra packaging. When cleaning out the garage or basement Take items like old electronics, white block foam packaging, appliances, yoga mats and much more can be recycled (fees may apply) at the Center for Hard to Recycle Materials (CHaRM) in Boulder. Learn more at www.ecocycle.org/charm. Tips for reducing odors and pests in your compost To reduce odors in your kitchen, take food scraps out to your compost cart every day. Put your food scraps in either a certified compostable bag (available at grocery stores) or paper bag before placing it in your compost cart Cover food waste with newspapers or yard clippings to deter flies Sprinkle baking soda in the bottom of your cart to reduce odors Freeze your stinky items until pick up to prevent both maggots and odors
describe Wordmove::Doctor::Mysql do let(:movefile_name) { 'multi_environments' } let(:movefile_dir) { "spec/fixtures/movefiles" } let(:doctor) { described_class.new(movefile_name, movefile_dir) } context ".new" do it "implements #check! method" do expect_any_instance_of(described_class).to receive(:check!) silence_stream(STDOUT) { doctor.check! } end it "calls mysql client check" do expect(doctor).to receive(:mysql_client_doctor) silence_stream(STDOUT) { doctor.check! } end it "calls mysqldump check" do expect(doctor).to receive(:mysqldump_doctor) silence_stream(STDOUT) { doctor.check! } end it "calls mysql server check" do expect(doctor).to receive(:mysql_server_doctor) silence_stream(STDOUT) { doctor.check! } end it "calls mysql database check" do # expect(doctor).to receive(:mysql_database_doctor) silence_stream(STDOUT) { doctor.check! } end end end
Slayer is devastated to inform that their bandmate and brother, Jeff Hanneman, passed away at about 11AM this morning near his Southern California home. Hanneman was in an area hospital when he suffered liver failure. He is survived by his wife Kathy, his sister Kathy and his brothers Michael and Larry, and will be sorely missed.
I notice that some companies(like the San Jose Ballet Azlan!)cast their adult female dancers in this role;I like the ideal esp in fufilling the dream of a ballerina who may have always wanted to play her-what do yous think?(the Joffrey does the same thing by the way). I agree with the decision to make Clara/Marie an adult role. Not only does it take care of the messy business of casting the part (think lots of crying children), but it also gives the role maturity. I have seen way too many young girls play the role with utter indifference - it can completely ruin the story!<P>I would love to see a production with an adult Clara/Marie! Baryshnikov's Nutcracker had an adult Clara. On the video tape, it was Gelsey Kirkland. As I recall, Gelsey was not able to dance the premiere in New York, and we saw, I believe, Marianna Tcherkassky do a wonderful job with it. (I hope I am telling the truth; it was a long time ago!...). Baryshnikov had adult corps dancers playing the other children's roles as well.<P>Didn't Pacific Northwest also have an adult in that role? I think I saw that production on video tape, too.<P>I got to do the role of Clara when the Boston Ballet came to my college, and had an extensive injury roster. What a thrill that was for me! They only took the Suite on tour, not the whole production, so I didn't have to do much. But it was a great experience (way back in the Dark Ages...). So, at least at some time in the past, Boston cast adults as well. At the RWB [Stuart adds: Royal Winnipeg Ballet]in John Neumier's production of the Nutcracker Maria was danced by Marina Eglevsky and the children were danced by adults. Violet Verdy danced the role of the big sister, and it was filmed for the BBC. Wonder if it is still shown, as I do not get residuals anymore...hmmm? <p>[This message has been edited by Stuart Sweeney (edited July 08, 2001).] I was Maria's friend and partner to Fritz in Act 1, and Chinese tea pas de deux with Drosselmeyer danced by Max Midenet from John's company in Frankfurt. They changed some stuff to make it better for TV, such as adding a 15 pound wig for me to wear. Your turns are vastly different with that much weight on your head, let me tell you. Well, I'm only somebody that buys a ticket, but I'd have to disagree with most of you.<P>Kirkland might have been enchanting on stage, but on video an adult playing a child is kind of sickening. They simply can't be subtle ENOUGH. A grown man trying to "act a kid" is downright silly.<P>They just can't DO it. They are clownish looking.<P>To DATE, the ONLY adult that I have ever seen pull off playing a kid is Martin Short in Clifford. He was as impish as any "real kid" I've ever seen. And that required camera tricks, and him walking on his knees.<P>Most ballets are "adult theme". So let the kids have Nut. It's more "believable" that way. And anyhow, when a kid dances Marie, it means that Snow Queen and Plum get to dance more. 'Cause Marie is usually cast as a character part.<P>I also find it annoying when Sleeping Beauty or Cinderella, or Juliet are danced by some aging Diva with some young guy trying his BEST to look "longingly" at them.<P>It's hard to get caught up in a "fake" moment. _________________'God grant you all your desires and accept my own hearty thanks for all your attention to me. Although indeed, those attentions have tried me more than death can now terrify me.'<P>Lady Jane Grey<BR>Wife of Guildford, Lord Dudley King Consort<BR>Daughter of Henry Grey Marquis of Dorset, Duke of Suffolk The new Sir Peter Wright production for the Royal Ballet has Clara and the Nutcracker played by adults. This was deliberate so that the two lead dancing roles could be enhanced. The production was very well recieved and even I, not a great Nutcracker fan, had lots of fun.<P>I saw Alina Cojacoro and Ivan Petrov, both in their late teens or thereabouts and they were superb. WE don't expect to see a child playing Juliet, so i really don't see why we can't have an adult play Clara, albeit that she stays in the childlike personna unlike Juliet.<P>I can understand that others may prefer to see children in these roles and that's fine as well. I wouldn't try to prescribe for people which version they should prefer. I wouldn't prescribe, either, and I think both approaches are valid. It depends on the concept of the production.<P>JaneGrey, I agree with you that, at times, adults playing children can backfire. I remember in Baryshnikov's Nutcracker, feeling uncomfortable with some of the antics of Fritz and Friends. But some of the women did well with the kids' parts. And I thought both Gelsey (even in the video) and Marianna were wonderful. In this production, Clara is a child on the brink of young womanhood, and I didn't sense a false impulse from either of these ballerinas. It worked completely for me.<P>Re: old Divas, the first thing that came to mind for me was Fonteyn and Nureyev in R&J. She was much older than he. But during that performance, they were both teen-agers. No question about it.<P>Azlan, it was a thrill for me to do that brief stint with Boston. I don't think I was paid. If I was, it wasn't much, I'm sure. There might have been some type of honorarium, but it was a long time ago, and I honestly don't remember. I do remember walking into the Land of the Sweets on the arm of the Prince, being greeted by the Sugar Plum Fairy, and genuinely feeling awe. I didn't have to act it. The dancers were very kind, and the company director Sam Kurkijian (or something like that?) was extremely complimentary. I glowed for weeks. That was better than money. Who is online Users browsing this forum: No registered users and 1 guest You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
Since 1955, millions of investors in the United States and around the globe have relied on Federated Investors, Inc. (NYSE: FII) for world-class investment management. Federated has grown to become one of the nation's largest investment managers with $397.6 billion in assets under management. Federated has honed its disciplined investment process over a half-century to deliver style-consistent investment products, including 123 domestic and international equity, fixed-income and money market funds, as well as a variety of separately managed accounts. Federated's diversified product line is distributed through more than 8,400 financial intermediaries and institutions who assist investors in meeting their unique objectives. For additional information about Federated Investors visit FederatedInvestors.com.
No sooner has Giles Clarke arrived back from draining discussions about Zimbabwe with the ICC in Dubai than he is having to revert to dealing with all issues Twenty20 this week, as well as the little matter of a Lord's Test match. As if the fiasco at Durham is not enough for one week, the ECB chairman and David Collier, his chief executive, are meeting the county chief executives at Edgbaston to appraise them of their thoughts on an English Premier League. The discussions will also focus on whether the format of the domestic Twenty20 group matches can be expanded from two-and-a-half weeks to five weeks. The ECB is receiving any number of proposals and ideas about restructuring the county programme - from the suggestion by Essex that the championship be split into three conferences, to the desire of Jack Simmons, the chairman of the Board's cricket committee, that three-day matches of 120 overs a day would enable a window to be found for an expansion of the Twenty20 game. The simplest answer to finding more space in a cluttered English summer might well be to extend the season into October, which conceivably has been made possible through the effects of global warming, but the chief executives discounted this at their initial meeting last week. Ironically, given the unwitting status of Yorkshire's man of the moment, Azeem Rafiq, there was general agreement on the introduction of more overseas players into Twenty20 cricket and ensuring that when the competition is expanded, the counties themselves receive a fair chunk of the proceeds. That would appear an axiomatic ambition, except that the expectations in terms of salaries of cricketers from overseas have risen dramatically with the advent of the IPL and the sums of monies involved. "IPL has changed the landscape," Mark Newton, the chief executive of Worcestershire, said, "and it has become extremely difficult to bring in players because of that. We can't do this unless the income of county clubs improves and television coverage will play a major part from 2010. There is more and more airtime during June and July when there is no football on. I have never been to a meeting of chief executives at which there has been such consensus." Agreement in particular was reached over expanding the Twenty20 group matches programme from its present two-and-a-half weeks to five weeks' duration. If this means lopping two championship fixtures off the 16 that each county plays, then so be it, although there is no imminent plan to do so. Five home matches in the space of eight days, which was the lot of Warwickshire, were considered too many, not least at a time of so-called credit crunch. Fridays and Sundays proved to be the most popular days for spectators, for obvious reasons, and there was a natural concern that, although gate receipts were higher this year for five home matches than for four in 2007, the formula should not be over-egged. It is conceivable that fixtures against the university centres of excellence in the early part of the season will be squeezed, so as to bring other competitions forward. The ECB is already sufficiently concerned about the coverage of championship cricket in national newspapers to be contemplating writing to sports editors. This has fallen away considerably in recent years, particularly this season, although that, of course, has in part resulted from the best, centrally contracted, players not taking part, as well as an increasing trend by papers to indulge in watching briefs on the likes of Andrew Flintoff and Kevin Pietersen. There is an increasing desire for news and exclusive stories. The football agenda has caught up with cricket. University matches are hardly reported at all, even though centres of excellence, financially supported by MCC, are thriving. Even in the recent past, the Cambridge Evening News, the Oxford Mail, the Daily Telegraph and the Press Association would all have covered the Varsity match, not least because it was staged at Lord's. This was held in the Parks last week and I was the only journalist in attendance. Then again, not all the cricket played in the fixture these days is deserving of first-class status and sports editors could understandably point to the fact that the crowd on each day amounted to around 80, including a fair number of bankers on a jolly in the one marquee, with, insofar as one could tell, old Blues represented only by the two Smiths, M.J.K. and A.C., those ever-loyal supporters of Oxford University. Just as well E.W. Swanton is not still alive. A reduction in one-day competitions and the championship programme was not specifically discussed last week, although no doubt both topics will be aired this week at Edgbaston, informally or otherwise. The ECB's research into what the general public desires to watch is on-going, but Richard Gould, the chief executive of Somerset, reckons it will be able to give the counties notice of how 75-80% of the future domestic programme is to be structured.
Jesus came not to be served, but to serve. We strive to make a difference in the lives of people beyond the walls of the church.1441 NE Englewood Rd.Kansas City, MO 64118(816) 453-2545office@northminsterkc.org VBS was AWESOME! We had a super surfin’ good time at VBS this year. Thanks to everyone who participated, we couldn’t have done it without you. VBS is special to Northminster, it’s time for all of us to come together to have fun, play games and learn new songs. But VBS is also dedicated to children, from inside and outside our church. VBS shows our kids that we care about them and their relationship to God and our Savior, Jesus Christ. We break down the normal adult/kid walls that we often don’t realize are there and talk to them on their level, with love and with fun. They realize we’re not just off-limits adults but adults who are there just for them! And for us, it’s a chance to embrace our inner VBS kid and run amok, get soaked, get silly and spend time with our friends.
Gold is Poised for Liftoff It looks the yellow metal is preparing for another increase. Tonight it is moving above the key $1000 level to $1008 USD. Based upon the inverted Head & Shoulders formation on the medium-term chart, the target on this move is approximately $1379. If this indeed occurs, it means a tremendous selloff in the US Dollar; because gold almost always acts in inverse of the US dollar. The extent to which the dollar falls relative to the other currencies depends on how much gold increases relative to those currencies. As has been predicted for years, we are moving from a confidence based economy into a hard asset based economy. Over then coming weeks, I expect we will see some shocking dollar corrections in the currency markets; which will begin to wreak havoc over the daily lives of billions of people. We are likely to see civil unrest, rapid increases in prices for everyday items and shortages. Elliott Wave Formation in Gold as it Reacts off of its all-time high at $1037. Gold broke out of the recent consolidation wedge, confirming some recent bullish activity.
Developed to Advance The Finest in Visual Art, Four Points Contemporary Is Holding Its 1st Biannual Juried International Competition and 1st Annual All Media Juried Online Exhibition to Recognize The Best in Undiscovered Talents. Does Your Work Pus developed to advance the finest in visual art, four points contemporary is holding its 1st biannual juried international competition and 1st annual all media juried online exhibition to recognize the best in undiscovered talents. does your work pus.
/* * Copyright 2011 David Jurgens * * This file is part of the S-Space package and is covered under the terms and * conditions therein. * * The S-Space package is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as published * by the Free Software Foundation and distributed hereunder to you. * * THIS SOFTWARE IS PROVIDED "AS IS" AND NO REPRESENTATIONS OR WARRANTIES, * EXPRESS OR IMPLIED ARE MADE. BY WAY OF EXAMPLE, BUT NOT LIMITATION, WE MAKE * NO REPRESENTATIONS OR WARRANTIES OF MERCHANT- ABILITY OR FITNESS FOR ANY * PARTICULAR PURPOSE OR THAT THE USE OF THE LICENSED SOFTWARE OR DOCUMENTATION * WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER * RIGHTS. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ package edu.ucla.sspace.graph; import java.util.*; import edu.ucla.sspace.util.OpenIntSet; import org.junit.Ignore; import org.junit.Test; import static org.junit.Assert.*; /** * */ public class DirectedMultigraphTests { @Test public void testConstructor() { Set<Integer> vertices = new HashSet<Integer>(); DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertEquals(0, g.order()); assertEquals(0, g.size()); } @Test(expected=NullPointerException.class) public void testConstructor2NullArg() { Graph<Edge> g = new SparseUndirectedGraph((Graph<DirectedTypedEdge<String>>)null); } @Test public void testAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(0)); assertEquals(1, g.order()); assertTrue(g.contains(0)); // second add should have no effect assertFalse(g.add(0)); assertEquals(1, g.order()); assertTrue(g.contains(0)); assertTrue(g.add(1)); assertEquals(2, g.order()); assertTrue(g.contains(1)); } @Test public void testEquals() { DirectedMultigraph<String> g1 = new DirectedMultigraph<String>(); DirectedMultigraph<String> g2 = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { g1.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); g2.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } } assertEquals(g1, g2); g1 = new DirectedMultigraph<String>(); g2 = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { g1.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); g2.add(new SimpleDirectedTypedEdge<String>("type-1",j, i)); } } assertFalse(g1.equals(g2)); assertFalse(g2.equals(g1)); } @Test public void testEqualGeneric() { DirectedMultigraph<String> g1 = new DirectedMultigraph<String>(); Graph<DirectedTypedEdge<String>> g2 = new GenericGraph<DirectedTypedEdge<String>>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { g1.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); g2.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } } assertEquals(g1, g2); } @Test public void testContainsEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 100; ++i) for (int j = i + 1; j < 100; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); for (int i = 0; i < 100; ++i) { for (int j = i + 1; j < 100; ++j) { g.contains(new SimpleDirectedTypedEdge<String>("type-1",i, j)); g.contains(new SimpleDirectedTypedEdge<String>("type-1",j, i)); g.contains(i, j); g.contains(j, i); } } } @Test public void testAddEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertEquals(2, g.order()); assertEquals(1, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 2)); assertEquals(3, g.order()); assertEquals(2, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 2))); g.add(new SimpleDirectedTypedEdge<String>("type-1",3, 4)); assertEquals(5, g.order()); assertEquals(3, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",3, 4))); } @Test public void testRemoveLesserVertexWithEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 1; i < 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); } assertTrue(g.contains(0)); assertTrue(g.remove(0)); assertEquals(99, g.order()); assertEquals(0, g.size()); } @Test public void testRemoveHigherVertexWithEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 99; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",100, i); g.add(e); } assertTrue(g.contains(100)); assertTrue(g.remove(100)); assertEquals(99, g.order()); assertEquals(0, g.size()); } @Test public void testRemoveVertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 100; ++i) { g.add(i); } for (int i = 99; i >= 0; --i) { assertTrue(g.remove(i)); assertEquals(i, g.order()); assertFalse(g.contains(i)); assertFalse(g.remove(i)); } } @Test public void testRemoveEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 1; i < 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); } for (int i = 99; i > 0; --i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); assertTrue(g.remove(e)); assertEquals(i-1, g.size()); assertFalse(g.contains(e)); assertFalse(g.remove(e)); } } @Test public void testVertexIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } assertEquals(control.size(), g.order()); for (Integer i : g.vertices()) assertTrue(control.contains(i)); } @Test public void testEdgeIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); control.add(e); } assertEquals(control.size(), g.size()); assertEquals(control.size(), g.edges().size()); int returned = 0; for (Edge e : g.edges()) { assertTrue(control.remove(e)); returned++; } assertEquals(g.size(), returned); assertEquals(0, control.size()); } @Test public void testEdgeIteratorSmall() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 5; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); assertTrue(g.add(e)); control.add(e); } assertEquals(control.size(), g.size()); assertEquals(control.size(), g.edges().size()); int returned = 0; for (Edge e : g.edges()) { System.out.println(e); assertTrue(control.contains(e)); returned++; } assertEquals(control.size(), returned); } @Test public void testEdgeIteratorSmallReverse() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 5; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, 0); g.add(e); control.add(e); } assertEquals(control.size(), g.size()); assertEquals(control.size(), g.edges().size()); int returned = 0; for (Edge e : g.edges()) { System.out.println(e); assertTrue(control.contains(e)); returned++; } assertEquals(control.size(), returned); } @Test public void testAdjacentEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); control.add(e); } Set<DirectedTypedEdge<String>> test = g.getAdjacencyList(0); assertEquals(control, test); } @Test public void testAdjacencyListSize() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<DirectedTypedEdge<String>> adjList = g.getAdjacencyList(0); assertEquals(9, adjList.size()); adjList = g.getAdjacencyList(1); assertEquals(9, adjList.size()); adjList = g.getAdjacencyList(2); assertEquals(9, adjList.size()); adjList = g.getAdjacencyList(3); assertEquals(9, adjList.size()); adjList = g.getAdjacencyList(5); assertEquals(9, adjList.size()); } @Test public void testAdjacentEdgesRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); control.add(e); } Set<DirectedTypedEdge<String>> test = g.getAdjacencyList(0); assertEquals(control, test); Edge removed = new SimpleDirectedTypedEdge<String>("type-1",0, 1); assertTrue(test.remove(removed)); assertTrue(control.remove(removed)); assertEquals(control, test); assertEquals(99, g.size()); } @Test public void testAdjacentEdgesAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 1; i <= 100; ++i) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, i); g.add(e); control.add(e); } Set<DirectedTypedEdge<String>> test = g.getAdjacencyList(0); assertEquals(control, test); DirectedTypedEdge<String> added = new SimpleDirectedTypedEdge<String>("type-1",0, 101); assertTrue(test.add(added)); assertTrue(control.add(added)); assertEquals(control, test); assertEquals(101, g.size()); assertTrue(g.contains(added)); assertTrue(g.contains(101)); assertEquals(102, g.order()); } @Test public void testClear() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); g.clear(); assertEquals(0, g.size()); assertEquals(0, g.order()); assertEquals(0, g.vertices().size()); assertEquals(0, g.edges().size()); // Error checking case for double-clear g.clear(); } @Test public void testClearEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); g.clearEdges(); assertEquals(0, g.size()); assertEquals(10, g.order()); assertEquals(10, g.vertices().size()); assertEquals(0, g.edges().size()); // Error checking case for double-clear g.clearEdges(); } @Test public void testToString() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) for (int j = i + 1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); g.toString(); // only vertices g.clearEdges(); g.toString(); // empty graph g.clear(); g.toString(); } /****************************************************************** * * * VertexSet tests * * ******************************************************************/ @Test(expected=UnsupportedOperationException.class) public void testVertexSetAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); assertEquals(control.size(), vertices.size()); assertTrue(vertices.add(100)); assertTrue(g.contains(100)); assertEquals(101, vertices.size()); assertEquals(101, g.order()); // dupe assertFalse(vertices.add(100)); assertEquals(101, vertices.size()); } @Test(expected=UnsupportedOperationException.class) public void testVertexSetAddFromGraph() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); assertEquals(control.size(), vertices.size()); assertTrue(g.add(100)); assertTrue(g.contains(100)); assertTrue(vertices.contains(100)); assertEquals(101, vertices.size()); assertEquals(101, g.order()); // dupe assertFalse(vertices.add(100)); assertEquals(101, vertices.size()); } @Test(expected=UnsupportedOperationException.class) public void testVertexSetRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); assertEquals(control.size(), vertices.size()); assertTrue(g.contains(99)); assertTrue(vertices.remove(99)); assertFalse(g.contains(99)); assertEquals(99, vertices.size()); assertEquals(99, g.order()); // dupe assertFalse(vertices.remove(99)); assertEquals(99, vertices.size()); } @Test public void testVertexSetRemoveFromGraph() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); assertEquals(control.size(), vertices.size()); assertTrue(g.remove(99)); assertFalse(g.contains(99)); assertFalse(vertices.contains(99)); assertEquals(99, vertices.size()); assertEquals(99, g.order()); } @Test(expected=UnsupportedOperationException.class) public void testVertexSetIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); assertEquals(control.size(), vertices.size()); Iterator<Integer> iter = vertices.iterator(); assertTrue(iter.hasNext()); Integer toRemove = iter.next(); assertTrue(g.contains(toRemove)); assertTrue(vertices.contains(toRemove)); iter.remove(); assertFalse(g.contains(toRemove)); assertFalse(vertices.contains(toRemove)); assertEquals(g.order(), vertices.size()); } @Test(expected=NoSuchElementException.class) public void testVertexSetIteratorTooFar() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); Iterator<Integer> iter = vertices.iterator(); int i = 0; while (iter.hasNext()) { i++; iter.next(); } assertEquals(vertices.size(), i); iter.next(); } @Test(expected=UnsupportedOperationException.class) public void testVertexSetIteratorRemoveTwice() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); Iterator<Integer> iter = vertices.iterator(); assertTrue(iter.hasNext()); Integer toRemove = iter.next(); assertTrue(g.contains(toRemove)); assertTrue(vertices.contains(toRemove)); iter.remove(); iter.remove(); } @Test(expected=UnsupportedOperationException.class) public void testVertexSetIteratorRemoveEarly() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<Integer> control = new HashSet<Integer>(); for (int i = 0; i < 100; ++i) { g.add(i); control.add(i); } Set<Integer> vertices = g.vertices(); Iterator<Integer> iter = vertices.iterator(); iter.remove(); } /****************************************************************** * * * EdgeView tests * * ******************************************************************/ @Test public void testEdgeViewAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> edges = g.edges(); assertEquals(g.size(), edges.size()); edges.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1)); assertEquals(2, g.order()); assertEquals(1, g.size()); assertEquals(1, edges.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(edges.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); } @Test public void testEdgeViewRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> edges = g.edges(); assertEquals(g.size(), edges.size()); edges.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1)); edges.remove(new SimpleDirectedTypedEdge<String>("type-1",0, 1)); assertEquals(2, g.order()); assertEquals(0, g.size()); assertEquals(0, edges.size()); assertFalse(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertFalse(edges.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); } @Test public void testEdgeViewIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> edges = g.edges(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 0; i < 100; i += 2) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, i+1); g.add(e); // all disconnected control.add(e); } assertEquals(100, g.order()); assertEquals(50, g.size()); assertEquals(50, edges.size()); Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); for (DirectedTypedEdge<String> e : edges) test.add(e); assertEquals(control.size(), test.size()); for (Edge e : test) assertTrue(control.contains(e)); } @Test public void testEdgeViewIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> edges = g.edges(); Set<DirectedTypedEdge<String>> control = new HashSet<DirectedTypedEdge<String>>(); for (int i = 0; i < 10; i += 2) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, i+1); g.add(e); // all disconnected control.add(e); } assertEquals(10, g.order()); assertEquals(5, g.size()); assertEquals(5, edges.size()); Iterator<DirectedTypedEdge<String>> iter = edges.iterator(); while (iter.hasNext()) { iter.next(); iter.remove(); } assertEquals(0, g.size()); assertFalse(g.edges().iterator().hasNext()); assertEquals(0, edges.size()); assertEquals(10, g.order()); } /****************************************************************** * * * AdjacencyListView tests * * ******************************************************************/ @Test public void testAdjacencyList() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) for (int j = i + 1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); for (int i = 0; i < 10; ++i) { Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(i); assertEquals(9, adjacencyList.size()); for (int j = 0; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); if (i >= j) assertFalse(adjacencyList.contains(e)); else assertTrue(adjacencyList.contains(e)); } } } @Test public void testAdjacencyListRemoveEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) for (int j = i + 1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); Edge e = new SimpleDirectedTypedEdge<String>("type-1",0, 1); assertTrue(adjacencyList.contains(e)); assertTrue(adjacencyList.remove(e)); assertEquals(8, adjacencyList.size()); assertEquals( (10 * 9) / 2 - 1, g.size()); } public void testAdjacencyListAddEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) for (int j = i + 2; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); assertEquals( (10 * 9) / 2 - 9, g.size()); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",0, 1); assertFalse(adjacencyList.contains(e)); assertFalse(g.contains(e)); assertTrue(adjacencyList.add(e)); assertTrue(g.contains(e)); assertEquals(9, adjacencyList.size()); assertEquals( (10 * 9) / 2 - 8, g.size()); } @Test public void testAdjacencyListIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(9, adjacencyList.size()); Iterator<DirectedTypedEdge<String>> it = adjacencyList.iterator(); int i = 0; while (it.hasNext()) assertTrue(test.add(it.next())); assertEquals(9, test.size()); } @Test public void testAdjacencyListNoVertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(0, adjacencyList.size()); } @Test(expected=NoSuchElementException.class) public void testAdjacencyListIteratorNextOffEnd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(9, adjacencyList.size()); Iterator<DirectedTypedEdge<String>> it = adjacencyList.iterator(); int i = 0; while (it.hasNext()) assertTrue(test.add(it.next())); assertEquals(9, test.size()); it.next(); } @Test(expected=UnsupportedOperationException.class) public void testAdjacencyListIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(9, adjacencyList.size()); Iterator<DirectedTypedEdge<String>> it = adjacencyList.iterator(); assertTrue(it.hasNext()); Edge e = it.next(); it.remove(); assertFalse(adjacencyList.contains(e)); assertEquals(8, adjacencyList.size()); assertFalse(g.contains(e)); assertEquals( (10 * 9) / 2 - 1, g.size()); } @Test(expected=UnsupportedOperationException.class) public void testAdjacencyListIteratorRemoveFirst() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(9, adjacencyList.size()); Iterator<DirectedTypedEdge<String>> it = adjacencyList.iterator(); it.remove(); } @Test(expected=UnsupportedOperationException.class) public void testAdjacencyListIteratorRemoveTwice() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<DirectedTypedEdge<String>> test = new HashSet<DirectedTypedEdge<String>>(); Set<DirectedTypedEdge<String>> adjacencyList = g.getAdjacencyList(0); assertEquals(9, adjacencyList.size()); Iterator<DirectedTypedEdge<String>> it = adjacencyList.iterator(); assertTrue(it.hasNext()); it.next(); it.remove(); it.remove(); } /****************************************************************** * * * AdjacentVerticesView tests * * ******************************************************************/ @Test public void testAdjacentVertices() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<Integer> test = new HashSet<Integer>(); Set<Integer> adjacent = g.getNeighbors(0); assertEquals(9, adjacent.size()); for (int i = 1; i < 10; ++i) assertTrue(adjacent.contains(i)); assertFalse(adjacent.contains(0)); assertFalse(adjacent.contains(10)); } @Test(expected=UnsupportedOperationException.class) public void testAdjacentVerticesAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<Integer> test = new HashSet<Integer>(); Set<Integer> adjacent = g.getNeighbors(0); adjacent.add(1); } @Test(expected=UnsupportedOperationException.class) public void testAdjacentVerticesRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<Integer> test = new HashSet<Integer>(); Set<Integer> adjacent = g.getNeighbors(0); adjacent.remove(1); } @Test public void testAdjacentVerticesIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<Integer> test = new HashSet<Integer>(); Set<Integer> adjacent = g.getNeighbors(0); Iterator<Integer> it = adjacent.iterator(); while (it.hasNext()) assertTrue(test.add(it.next())); assertEquals(9, test.size()); } @Test(expected=UnsupportedOperationException.class) public void testAdjacentVerticesIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); for (int i = 0; i < 10; ++i) { for (int j = i + 1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); g.add(e); } } Set<Integer> test = new HashSet<Integer>(); Set<Integer> adjacent = g.getNeighbors(0); Iterator<Integer> it = adjacent.iterator(); assertTrue(it.hasNext()); it.next(); it.remove(); } /****************************************************************** * * * Subgraph tests * * ******************************************************************/ @Test public void testSubgraph() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); } @Test public void testSubgraphContainsVertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); for (int i = 0; i < 5; ++i) assertTrue(subgraph.contains(i)); for (int i = 5; i < 10; ++i) { assertTrue(g.contains(i)); assertFalse(subgraph.contains(i)); } } @Test public void testSubgraphContainsEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); for (int i = 0; i < 5; ++i) { for (int j = i+1; j < 5; ++j) { assertTrue(subgraph.contains(new SimpleDirectedTypedEdge<String>("type-1",i, j))); } } for (int i = 5; i < 10; ++i) { for (int j = i+1; j < 10; ++j) { DirectedTypedEdge<String> e = new SimpleDirectedTypedEdge<String>("type-1",i, j); assertTrue(g.contains(e)); assertFalse(subgraph.contains(e)); } } } @Test public void testSubgraphAddEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < i+2 && j < 10; ++j) assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j))); } assertEquals(9, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals(4, subgraph.size()); // Add an edge to a new vertex assertTrue(subgraph.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 0))); assertEquals(5, subgraph.size()); assertEquals(5, subgraph.order()); assertEquals(10, g.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphAddEdgeNewVertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); // Add an edge to a new vertex assertTrue(subgraph.add(new SimpleDirectedTypedEdge<String>("type-1",0, 5))); assertEquals( (5 * 4) / 2 + 1, subgraph.size()); assertEquals(6, subgraph.order()); assertEquals(11, g.order()); assertEquals( (9*10)/2 + 1, g.size()); } @Test public void testSubgraphRemoveEdge() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); // Remove an existing edge assertTrue(subgraph.remove(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertEquals( (5 * 4) / 2 - 1, subgraph.size()); assertEquals(5, subgraph.order()); assertEquals(10, g.order()); assertEquals( (9*10)/2 - 1, g.size()); // Remove a non-existent edge, which should have no effect even though // the edge is present in the backing graph assertFalse(subgraph.remove(new SimpleDirectedTypedEdge<String>("type-1",0, 6))); assertEquals( (5 * 4) / 2 - 1, subgraph.size()); assertEquals(5, subgraph.order()); assertEquals(10, g.order()); assertEquals( (9*10)/2 - 1, g.size()); } /****************************************************************** * * * SubgraphVertexView tests * * ******************************************************************/ @Test(expected=UnsupportedOperationException.class) public void testSubgraphVerticesAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); Set<Integer> test = subgraph.vertices(); assertEquals(5, test.size()); // Add a vertex assertTrue(test.add(5)); assertEquals(6, test.size()); assertEquals(6, subgraph.order()); assertEquals(11, g.order()); assertEquals( (5*4)/2, subgraph.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphVerticesRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); Set<Integer> test = subgraph.vertices(); assertEquals(5, test.size()); // Add a vertex assertTrue(test.remove(0)); assertEquals(4, test.size()); assertEquals(4, subgraph.order()); assertEquals(9, g.order()); assertEquals( (4*3)/2, subgraph.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphVerticesIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); assertEquals(5, subgraph.order()); assertEquals( (5 * 4) / 2, subgraph.size()); Set<Integer> test = subgraph.vertices(); assertEquals(5, test.size()); Iterator<Integer> it = test.iterator(); assertTrue(it.hasNext()); // Remove the first vertex returned it.next(); it.remove(); assertEquals(4, test.size()); assertEquals(4, subgraph.order()); assertEquals(9, g.order()); assertEquals( (4*3)/2, subgraph.size()); } /****************************************************************** * * * SubgraphEdgeView tests * * ******************************************************************/ @Test public void testSubgraphEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { g.add(i); } g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1)); g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 2)); g.add(new SimpleDirectedTypedEdge<String>("type-1",1, 2)); assertEquals(3, g.size()); Set<Integer> verts = new HashSet<Integer>(); for (int i = 0; i < 3; ++i) verts.add(i); DirectedMultigraph<String> sub = g.subgraph(verts); assertEquals(3, sub.order()); assertEquals(3, sub.size()); Set<DirectedTypedEdge<String>> edges = sub.edges(); assertEquals(3, edges.size()); int j = 0; Iterator<DirectedTypedEdge<String>> iter = edges.iterator(); while (iter.hasNext()) { iter.next(); j++; } assertEquals(3, j); verts.clear(); for (int i = 3; i < 6; ++i) verts.add(i); sub = g.subgraph(verts); assertEquals(3, sub.order()); assertEquals(0, sub.size()); edges = sub.edges(); assertEquals(0, edges.size()); iter = edges.iterator(); assertFalse(iter.hasNext()); } /****************************************************************** * * * SubgraphAdjacencyListView tests * * ******************************************************************/ @Test public void testSubgraphAdjacencyListContains() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<DirectedTypedEdge<String>> adjList = subgraph.getAdjacencyList(0); for (int i = 1; i < 5; ++i) assertTrue(adjList.contains(new SimpleDirectedTypedEdge<String>("type-1",0, i))); for (int i = 5; i < 10; ++i) assertFalse(adjList.contains(new SimpleDirectedTypedEdge<String>("type-1",0, i))); } @Test public void testSubgraphAdjacencyListSize() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<DirectedTypedEdge<String>> adjList = subgraph.getAdjacencyList(0); assertEquals(4, adjList.size()); adjList = subgraph.getAdjacencyList(1); assertEquals(4, adjList.size()); adjList = subgraph.getAdjacencyList(2); assertEquals(4, adjList.size()); adjList = subgraph.getAdjacencyList(3); assertEquals(4, adjList.size()); adjList = subgraph.getAdjacencyList(4); assertEquals(4, adjList.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphAdjacencyListAddNewVertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<DirectedTypedEdge<String>> adjList = subgraph.getAdjacencyList(0); // Add an edge to a new vertex assertTrue(adjList.add(new SimpleDirectedTypedEdge<String>("type-1",0, 5))); } /****************************************************************** * * * SubgraphAdjacentVerticesView tests * * ******************************************************************/ @Test public void testSubgraphAdjacentVertices() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<Integer> adjacent = subgraph.getNeighbors(0); assertEquals(4, adjacent.size()); // check contents for (int i = 1; i < 5; ++i) assertTrue(adjacent.contains(i)); adjacent = subgraph.getNeighbors(1); assertEquals(4, adjacent.size()); adjacent = subgraph.getNeighbors(2); assertEquals(4, adjacent.size()); adjacent = subgraph.getNeighbors(3); assertEquals(4, adjacent.size()); adjacent = subgraph.getNeighbors(4); assertEquals(4, adjacent.size()); adjacent = subgraph.getNeighbors(5); assertEquals(0, adjacent.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphAdjacentVerticesAdd() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<Integer> adjacent = subgraph.getNeighbors(0); adjacent.add(0); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphAdjacentVerticesRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<Integer> adjacent = subgraph.getNeighbors(0); adjacent.remove(0); } @Test public void testSubgraphAdjacentVerticesIterator() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); vertices.remove(0); // now is the adjacent vertices of 0 Set<Integer> adjacent = subgraph.getNeighbors(0); assertEquals(vertices, adjacent); Iterator<Integer> it = adjacent.iterator(); int i = 0; while (it.hasNext()) { i++; vertices.remove(it.next()); } assertEquals(4, i); assertEquals(0, vertices.size()); } @Test(expected=UnsupportedOperationException.class) public void testSubgraphAdjacentVerticesIteratorRemove() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); vertices.remove(0); // now is the adjacent vertices of 0 Set<Integer> adjacent = subgraph.getNeighbors(0); assertEquals(vertices, adjacent); Iterator<Integer> it = adjacent.iterator(); assertTrue(it.hasNext()); it.next(); it.remove(); } /****************************************************************** * * * Tests that create a subgraph and then modify the backing graph * * ******************************************************************/ @Test public void testSubgraphWhenVerticesRemovedFromBacking() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); g.remove(0); assertEquals(4, subgraph.order()); assertEquals((3 * 4) / 2, subgraph.size()); g.remove(1); assertFalse(subgraph.contains(1)); g.remove(2); assertFalse(subgraph.contains(new SimpleDirectedTypedEdge<String>("type-1",2,3))); } @Test public void testSubgraphVertexIteratorWhenVerticesRemovedFromBacking() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); g.remove(0); Iterator<Integer> it = subgraph.vertices().iterator(); int i = 0; while (it.hasNext()) { assertTrue(0 != it.next()); i++; } assertEquals(4, i); } @Test public void testSubgraphEdgesWhenVerticesRemovedFromBacking() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); // fully connected for (int i = 0; i < 10; i++) { for (int j = i+1; j < 10; ++j) g.add(new SimpleDirectedTypedEdge<String>("type-1",i, j)); } // (n * (n-1)) / 2 assertEquals( (10 * 9) / 2, g.size()); assertEquals(10, g.order()); Set<Integer> vertices = new LinkedHashSet<Integer>(); for (int i = 0; i < 5; ++i) vertices.add(i); DirectedMultigraph<String> subgraph = g.subgraph(vertices); Set<DirectedTypedEdge<String>> edges = subgraph.edges(); g.remove(0); assertEquals((4 * 3) / 2, edges.size()); assertFalse(edges.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); } /**************** * * * Tests on graphs with multiple edge types * * ****************/ @Test public void testAddTypedEdges() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertEquals(2, g.order()); assertEquals(1, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertEquals(1, g.edgeTypes().size()); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertEquals(2, g.order()); assertEquals(2, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertEquals(2, g.edgeTypes().size()); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); assertEquals(4, g.order()); assertEquals(3, g.size()); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-3",3, 4))); assertEquals(3, g.edgeTypes().size()); } @Test public void testNeighborsOfDifferentTypes() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 0, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 0, 3))); Set<Integer> neighbors = g.getNeighbors(0); assertEquals(3, g.size()); assertEquals(3, neighbors.size()); assertTrue(neighbors.contains(1)); assertTrue(neighbors.contains(2)); assertTrue(neighbors.contains(3)); // Test bi-directional case assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 0))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 2, 0))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 0))); neighbors = g.getNeighbors(0); assertEquals(3, neighbors.size()); assertEquals(6, g.size()); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 4, 0))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 5, 0))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 6, 0))); neighbors = g.getNeighbors(0); assertEquals(6, neighbors.size()); assertEquals(9, g.size()); for (int i = 1; i <= 6; ++i) assertTrue(neighbors.contains(i)); } @Test public void testSubgraphOfSubtype() { // set up the network DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 3))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); Set<Integer> verts = new HashSet<Integer>(); verts.add(0); verts.add(1); Set<String> types = Collections.singleton("type-1"); DirectedMultigraph<String> sub = g.subgraph(g.vertices(), types); assertEquals(1, sub.edgeTypes().size()); assertEquals(3, sub.size()); assertEquals(g.order(), sub.order()); assertFalse(sub.contains(new SimpleDirectedTypedEdge<String>("type-2", 0, 1))); } /**************** * * * Tests for copy() * * ****************/ @Test public void testCopyAllVertices() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-3",3, 4))); DirectedMultigraph<String> copy = g.copy(g.vertices()); assertEquals(g.order(), copy.order()); assertEquals(g.size(), copy.size()); assertEquals(g, copy); copy.remove(4); assertEquals(4, g.order()); assertEquals(3, copy.order()); } @Test public void testCopy1vertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-3",3, 4))); DirectedMultigraph<String> copy = g.copy(Collections.singleton(1)); assertEquals(1, copy.order()); assertEquals(0, copy.size()); } @Test public void testCopy2vertex() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-3",3, 4))); Set<Integer> verts = new HashSet<Integer>(); Collections.addAll(verts, 0, 1); DirectedMultigraph<String> copy = g.copy(verts); assertEquals(2, copy.order()); assertEquals(2, copy.size()); } @Test public void testCopy3vertexTriangle() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 0, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 2, 0))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 2, 3))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); Set<Integer> verts = new HashSet<Integer>(); Collections.addAll(verts, 0, 1, 2); DirectedMultigraph<String> copy = g.copy(verts); assertEquals(3, copy.order()); assertEquals(7, copy.size()); } @Test public void testCopy3vertexVee() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 1, 2))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1", 2, 3))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); Set<Integer> verts = new HashSet<Integer>(); Collections.addAll(verts, 0, 1, 2); DirectedMultigraph<String> copy = g.copy(verts); assertEquals(3, copy.order()); assertEquals(5, copy.size()); } @Test public void testEmptyCopy() { DirectedMultigraph<String> g = new DirectedMultigraph<String>(); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-1",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-2",0, 1))); assertTrue(g.add(new SimpleDirectedTypedEdge<String>("type-3", 3, 4))); assertTrue(g.contains(new SimpleDirectedTypedEdge<String>("type-3",3, 4))); DirectedMultigraph<String> copy = g.copy(Collections.<Integer>emptySet()); assertEquals(0, copy.order()); assertEquals(0, copy.size()); assertEquals(new DirectedMultigraph<String>(), copy); copy.add(5); assertTrue(copy.contains(5)); assertFalse(g.contains(5)); } /* * To test: * * - remove vertex causes edge type to no longer be present (graph + subgraph) * - remove a vertex and then add the vertex back in (not present in subgraph) * - all of the DirectedGraph methods * */ }
package org.matomo.sdk.dispatcher; import androidx.annotation.Nullable; public enum DispatchMode { /** * Dispatch always (default) */ ALWAYS("always"), /** * Dispatch only on WIFI */ WIFI_ONLY("wifi_only"), /** * The dispatcher will assume being offline. This is not persisted and will revert on app restart. * Ensures no information is lost when tracking exceptions. See #247 */ EXCEPTION("exception"); private final String key; DispatchMode(String key) {this.key = key;} @Override public String toString() { return key; } @Nullable public static DispatchMode fromString(String raw) { for (DispatchMode mode : DispatchMode.values()) { if (mode.key.equals(raw)) return mode; } return null; } }
More Bonds of FMO-Nederlandse Financierings-Maatscap is voor Ontwikkelingslanden N.V. About the FMO-Nederlandse Financierings-Maatscap is voor Ontwikkelingslanden N.V.-Bond (XS0943344548) The FMO-Nederlandse Financierings-Maatscap is voor Ontwikkelingslanden N.V.-Bond has a maturity date of 12/20/2017 I18N_bonds#descriptiontext#couponpart#undefinedcoupon The FMO-Nederlandse Financierings-Maatscap is voor Ontwikkelingslanden N.V.-Bond was issued on the 6/25/2013 with a volume of 9.2 M. .
Now Commenting On: Balfour has surgery, hopeful for Opening Day Email Print Outlook: Balfour, RP, OAK 0:36 Grant Balfour started and wrapped up 2012 as a closer, tallying elite numbers if not totals and enters '13 as the well-deserved front-runner By Jane Lee PHOENIX -- A's right-hander Grant Balfour underwent successful right knee surgery to repair a torn meniscus on Thursday afternoon, leaving Oakland without its closer for approximately four to six weeks. Given that timeline, the A's are hopeful Balfour could still be ready by the start of the regular season, set to begin in a little over the six-week mark. "I'm kind of a glass-half-full guy, so I'm looking at it as, if there was ever a time to have it done, it would be now," manager Bob Melvin said. Balfour, 35, who is entering his third season with Oakland, echoed those sentiments in a statement released by the team. "I feel good about getting it done now," Balfour said. "It will allow me to get ready for Game 1 of the season. I knew the way I was feeling I wouldn't have been able to pitch through it all season long." Melvin said Balfour felt some knee tenderness toward the end of last season, but went about his normal offseason routine without any pain before experiencing some on Wednesday prior to his scheduled bullpen session. Balfour proceeded with his side session, after which the A's opted to be proactive and send him for an MRI that revealed the tear. The operation was performed by local orthopedist Dr. Douglas Freedberg, who also operated on Scott Sizemore last spring, when the A's infielder suffered a torn ACL on the first day of workouts. "He's a grinder," Melvin said of Balfour, "and he feels like he'll be able to rehab very quickly. He keeps himself in great shape." "He'll be ready," reliever Ryan Cook said. "I fully believe he will be. I don't expect him not to be." In the meantime, the A's are more than comfortable with their bountiful bullpen depth. Should Balfour end up missing time during the regular season, Cook and Sean Doolittle are options to close. "Those are the obvious choices, but we'll see how it goes," Melvin said. "Again, depth comes into play. We're not ruling Grant out to start the season, but this is the reason you accumulate as many guys as you can." Balfour compiled 24 saves in 2012, posting a 2.53 ERA and 0.92 WHIP in a career-high 74 2/3 innings spanning 75 games. He also pitched 1 2/3 innings during the postseason, making for a large workload in total. That was why the A's planned to bring the veteran along slowly in camp, and they're now assured his arm will get the needed rest while he rehabs his knee. "That might be a little underlying positive," Melvin said. "We were going to take it easy on him from the start." Jane Lee is a reporter for MLB.com. Read her blog, Major Lee-ague, and follow her on Twitter @JaneMLB. This story was not subject to the approval of Major League Baseball or its clubs.
{ "name": "volumetric_lighting_scattering.comp", "properties": { "name": "volumetric_lighting_scattering.comp", "gpuProgramName": "volumetric_lighting_scattering.comp.glsl", "entryPoint": "main", "preprocessorDefines": "", "gpuProgramType": 3 } }
Pictures of Eternal Celebration Ring Celebration Ring Matching Products Dimensions Testimonials Louis B Regarding the Noelle engagement ring you had made for me it was a great success, I hid it in the garden and told her to come and look I wanted to show her something, she said it better not be a snake or a spider lol (makes me sound mean as if id do that) and when she looked and saw it she burst into tears and I asked her and she said yes it was the happiest day of my life. I want to thank u and 1791 diamonds for everything u did and all the work u went through to get it to me. I just wanna thank u again for the happiest day of my life. Duncan G I had something specific in mind for my wife to celebrate our 5th wedding anniversary, and 1791 couldn't have made it easier. I told Designer Alice roughly what I was after and within a day I had a beautiful rendered image of the ring design sitting on my desktop that you could have sworn was a photo of the real thing. So from idea to reality in about 48 hours, not bad! We were easily able to make a couple of small design tweaks, and the result was stunning. Right through the process from design to the paperwork afterwards was a pleasure and I would highly recommend 1791 to anyone looking for value for money and an outstanding result. I know my wife loved it :) Eternal Celebration Ring Celebration Ring Review The Eternal womens wedding ring is aptly named; the row of beautiful diamonds symbolising a long future of love and romance. Paired with the matching engagement ring - a three stone ring to represent the past, present and future of your love - there is a fairytale magic to this bridal jewellery. As well as the romantic symbolism, there is no denying that the Eternal womens wedding ring simply looks fabulous. With the combined sparkle of several diamonds, multi-stone rings are meant to turn heads. The Eternal womens wedding ring showcases round brilliant diamonds, a shape designed to optimise sparkle, so the effect is all the more stunning. Round brilliant diamonds are also used in the matching Eternal engagement ring. A slender ring band enhances the femininity of the design while also ensuring that the main focus is on the beautiful diamonds. Since the womens wedding ring is designed to be worn together with the engagement ring, a slim band feels more comfortable on the finger.
Barnaby Rudge by Charles Dickens 'No offence I hope?' said the little man. Again John waited leisurely until the observation had thoroughly penetrated to his brain, and then replying, 'No offence as YET,' applied a light to his pipe and smoked in placid silence; now and then casting a sidelong look at a man wrapped in a loose riding-coat with huge cuffs ornamented with tarnished silver lace and large metal buttons, who sat apart from the regular frequenters of the house, and wearing a hat flapped over his face, which was still further shaded by the hand on which his forehead rested, looked unsociable enough. There was another guest, who sat, booted and spurred, at some distance from the fire also, and whose thoughts--to judge from his folded arms and knitted brows, and from the untasted liquor before him--were occupied with other matters than the topics under discussion or the persons who discussed them. This was a young man of about eight-and-twenty, rather above the middle height, and though of somewhat slight figure, gracefully and strongly made. He wore his own dark hair, and was accoutred in a riding dress, which together with his large boots (resembling in shape and fashion those worn by our Life Guardsmen at the present day), showed indisputable traces of the bad condition of the roads. But travel-stained though he was, he was well and even richly attired, and without being overdressed looked a gallant gentleman. Lying upon the table beside him, as he had carelessly thrown them down, were a heavy riding-whip and a slouched hat, the latter worn no doubt as being best suited to the inclemency of the weather. There, too, were a pair of pistols in a holster-case, and a short riding-cloak. Little of his face was visible, except the long dark lashes which concealed his downcast eyes, but an air of careless ease and natural gracefulness of demeanour pervaded the figure, and seemed to comprehend even those slight accessories, which were all handsome, and in good keeping. Towards this young gentleman the eyes of Mr Willet wandered but once, and then as if in mute inquiry whether he had observed his silent neighbour. It was plain that John and the young gentleman had often met before. Finding that his look was not returned, or indeed observed by the person to whom it was addressed, John gradually concentrated the whole power of his eyes into one focus, and brought it to bear upon the man in the flapped hat, at whom he came to stare in course of time with an intensity so remarkable, that it affected his fireside cronies, who all, as with one accord, took their pipes from their lips, and stared with open mouths at the stranger likewise. The sturdy landlord had a large pair of dull fish-like eyes, and the little man who had hazarded the remark about the moon (and who was the parish-clerk and bell-ringer of Chigwell, a village hard by) had little round black shiny eyes like beads; moreover this little man wore at the knees of his rusty black breeches, and on his rusty black coat, and all down his long flapped waistcoat, little queer buttons like nothing except his eyes; but so like them, that as they twinkled and glistened in the light of the fire, which shone too in his bright shoe-buckles, he seemed all eyes from head to foot, and to be gazing with every one of them at the unknown customer.
#!/usr/bin/env python r''' Fix several issues in the Latex file. Latex should be given as input. The following changes are made, and the result is thrown in the standard output: 1. It removes \url{X} and converts it to X for all X that contain a dollar sign. Assumes \url{} doesn't cross line boundaries, which appears to be true. If this is not done, some strange code appears inside the URLs (and it's also made a link, which doesn't make sense). 2. It formats notes, hints and tips the same as warnings. This is because warnings show in a box, which is nice, but the other admonitions only show with a top and bottom line, which can look confusing depending on where in the page it's shown. ''' import re import sys regexp = re.compile(r'''\\url\{ ( [^}]* # Anything (but end of url), \$ # then a dollar sign, [^}]* # then anything (but end of url) ) \} # then end of url ''', flags=re.VERBOSE) def fix_urls(line): return re.sub(regexp, r'\1', line) def fix_admonitions(line): line = line.replace(r'\begin{notice}{tip}', r'\begin{notice}{warning}') line = line.replace(r'\begin{notice}{note}', r'\begin{notice}{warning}') line = line.replace(r'\begin{notice}{hint}', r'\begin{notice}{warning}') return line for line in sys.stdin: line = fix_urls(line) line = fix_admonitions(line) sys.stdout.write(line)