text
stringlengths
7
4.92M
Many people use their monitor VESA mount in order to attach it to an arm, but what about screwing in a case instead? Marketed as an easily manageable and upgradable all-in-one type solution, even a case carry handle is included in order to help you transport your whole system around the office, to LAN parties or to a friends place. VIEW GALLERY - 3 IMAGES Set to be released on Indiegogo soon as a finance campaign, we have been contacted by Crono Labs with some pre-release renders of exactly what the final product should look like. The Crono Labs C1 case doesn't have much public information available just yet, but it looks like a Mini-ITX sized chassis and we know that it comes complete with the IO ports pointing towards your desk in order to increase cable management from your monitor to the components. Crono Labs further stated that you should expect around 80% less dust in your system too, this is due to the case being raised off the ground. Expect a review from us when the final chassis is created.
[Pseudo-angina pectoris and acute formation of an esophageal diverticulum. Description of 2 cases]. After a short introduction aiming at outlining the etiopathogenesis of fore thorax acute pain occurring in quite healthy individuals, the authors describe two cases of individuals who complained of retrosternal pains to be related, in their opinion, to acute neoformation of a diverticulum of the esophagus. The Authors conclude by remarking how such newly formed diverticulum of the esophagus is to be included among the etiopathogenetic causes of both fore and back thoracic pains and they underline the necessity of an X-ray examination of the esophagus on subjects where the cause of acute thoracic pain in uncertain.
What will the Democrats do NOW? The Democratic NARRATIVE is collapsing and that will mean arrests SOON! Former FBI Director James Comey WILL NOT testify that President Trump obstructed justice in the FBI’s investigation into alleged ties between the Trump campaign and Russia, according to a new report that several news agencies are carrying. The Democratic Party leadership made a huge mistake with the whole Russian narrative. It was designed to take the public’s eye off the fact that the DNC — an organization supposedly committed to fair elections by their own charter — had blatantly fixed an election. The fix had only one purpose — to elect a woman who was guilty of multiple felony crimes concerning her use and abuse of a private email server. That abuse led to a massive cover-up, because it was a window into multiple other additional felonies she committed as Secretary of State. We know the facts above to be provably true because of the Wikileaks dump, because Comey told us it was so on national TV, because of documents already obtained by Senator Grassley concerning bribery, coercion, and blackmail in foreign countries — and finally because of the Clinton’s own testimony, behavior, and admissions. Mrs. Clinton, Bill Clinton, Loretta Lynch, Susan Rice – probably President Obama — and most assuredly Mr. Scumbag Podesta — all collaborated to use the office of the Attorney General, the offices of the State Department, the NSA, and the CIA — capped off by the illegal UNMASKING of thousands of American citizens. We know this to be provably true because of a massive FISA Court report, saying so. The DNC, Donna Brazille, CNN, NBC, CBS, the NYT and the Washington Post, along with about 100 other liberal reporters, purposeful mislead the American public through their media channels in a coordinated conspiracy to slander the Trump campaign with the blame for all this “smoke” around the Russian election connection. Smoke it turns out, they made up. While this is underhanded and despicable, it is probably not illegal. If liberal reporters want to be idiots and get taken advantage of by lying crooked politicians, they should know better than to trust — that’s their fault. Senator Warner and other Democratic Senators on the intelligence committees have repeatedly admitted there is NO evidence of collusion between the Trump campaign and Russia whatsoever. That statement is pivotal, it means Trump was treated unfairly, or spied upon — by his own government — while RUNNING for President. I believe he suspected and/or knew this was happening, and let it run it’s course, because he’s smarter than these Dumb-o-crats. Warner, NORMALLY a Democratic partisan, went so far as to say “No fire here — smoke but no fire.” What does it mean when you look everywhere for months and cannot find a fire, but there is still smoke? It means you need to look for who was releasing all that fake smoke to mislead people into thinking there is a fire. That investigation is happening right now, we just don’t see it. What about Comey’s investigation into Trump? Back to ABC – A source familiar with Comey’s thinking on the matter told ABC News that Comey will not say Trump interfered with the FBI’s investigation, but will dispute Trump’s assertion that the former FBI director told me three times that he is not under investigation. “He is not going to Congress to make accusations about the President’s intent, instead he’s there to share his concerns,” the source told ABC News. Wow, So in other words, NO CRIME HERE WHATSOEVER. Where does that leave us as a country after tonight? We have an avalanche of provable felony crime by the Democrats, the DNC, multiple high level elected and/or appointed officials, AND one of their presidential candidates, a former President (Clinton) and possibly a sitting President (Obama). This bunch were all committing crimes that border on treason – and to counter balance ALL that — we have Trump — possibly mis-speaking about whether Comey told him something or not. And what is the media doing, while this DEMOCRATIC PARTY ONLY shit storm grows and grows? They are covering every single thing in America they can think to print –EXCEPT, these stories. This will ALL turn out to be embarrassing for the country but not fatal. The Democratic leaders responsible for this will be arrested, they will plead out and down, some will disappear into obscurity, a few will hold on, but most of them close to this mess — will at least be arrested. The media will spin, lie, obfuscate, and twist while the arrests are being made — BUT the American people will get the message, they will re-elect Trump in 4 years, and by the time he gets out of office, all these disloyal Americans that held and hold office for the Democratic Party will be gone, stripped of power and/or converted into Trump fans. Think I’m crazy? Look back to what happened during the Reagan years. The newspapers lied about him mercilessly, he prevailed with the pubic — as Trump will — AND most of his arch enemies either disappeared, or converted.
March 13, 2008 Each year for Saint Patrick's Day, I pull out my favorite Irish Soda Bread recipe and start baking. Sometimes, we'll even eat three loaves all before Saint Patrick's Day has even arrived. After so many years of a great baking tradition, why was I contemplating changing things? It all boiled down to a new challenge, the Irish Soda Farl. The farl is a soda bread cooked on a griddle placed either in or on the embers of the kitchen fire, whereas the cake form was cooked in the oven. Soda bread can be found in a wide variety of versions from white or brown, cake or farl, and treacle or wheaten. Every day soda breads were eaten plain and those served for tea time were made with fruits. Many may know of soda farls as the bread served with the Ulster breakfast, an awe inspiring meal of fried foods. I was set with a new recipe for a variation on one of my favorite breads. I began baking in a blast of happiness that didn't diminish as my first batch of farls turned out simply gorgeous. Yet all was not well, if the looks on my family's faces were anything to go by. One by one they meandered over to the kitchen trash can and said they were to horrible to save for the birds. I hurried to taste them and was shocked to find my tongue assaulted by the intense flavor of leavening. The writer of the recipe I had chosen used not only soda, but cream of tartar to ensure that the farls would rise to lofty heights. This was more than human taste buds could stand, so off I went in search of another recipe. Late in the evening, I happened upon the website European Cuisines. They have a history of soda bread, a recipe and a few handy tutorials on YouTube for anyone interested in learning how to make farls. I made a quick note of how much leavening they used in their recipe and was delighted to see a much more tasty quantity. I worked up my gluten free conversion, selected my flours and off I went to try again. This batch turned out richly colored and very tasty, with just a hint of soda. They were the perfect accompaniment to a breakfast of scrambled eggs and sausage. My husband and I enjoyed how the tang of the soda blended with the creamy flavor of the butter we spread on the farls. Our children, however didn't care for the slight tangy flavor of the bread at all. Which we thought was interesting, because they like sourdough. 4. Pour about 3/4 of the milk mixture into the well and begin stirring. The dough should have a dry and slightly ragged appearance. Add the rest of the milk mixture to the bowl (if needed) and stir until the dough looks raggy. 5. Turn the dough out onto a sheet of parchment paper. Dust your hands with flour as you need to and work the dough just until it forms a cohesive ball. For large farls use one ball of dough, for smaller farls divide the ball into two smaller balls. Then press the dough into a circle that is about 1/2 inch high. Cut the circle in half and then cut it into quarters. 6. Preheat the skillet or griddle on medium low heat until a drop of water sizzles. Melt a bit of butter or shortening in the skillet or griddle. Then place the soda farls into the skillet or onto the griddle. Cook each side of the farls for 20 to 30 minutes. You may need to stand the farls on their edge or cut them in half to cook them all the way through. Keep checking the farls to make sure they aren't burning. If they start to burn, turn down the heat on the burner a little. Allow to cool before serving. Makes 4 large farls or 8 small farls. * How to make soured milk or soured nut/seed/grain milk: Add 1 tsp white vinegar to 1 cup milk or non-dairy milk. If you don't have any white vinegar, then use regular milk or non-dary milk and 1/2 tsp of baking powder. I just discovered your blog which looks great! I am a dutch girl but I live in France so I have a french blog with glutenfree recipes:www.gourmandsansgluten.frDo you mind if I add your blog to my list of glutenfree blogs? Have a nice St. Patrick's Day!Kristien Diane aka "EuroCuisinLady" - Thank you for visiting my blog and leaving a note. I had so much fun visiting your website and watching all your YouTube videos. They were very educational on how exactly to go about making Soda Bread. You have done a wonderful job on your site and videos.
export default{ fieldName:'classList', label:'Contextual', widget:'OpSelect', defaultValue:'', list:{ 'badge-primary':'Primary', 'badge-secondary':'Secondary', 'badge-success':'Success', 'badge-danger':'Danger', 'badge-warning':'Warning', 'badge-info':'Info', 'badge-light':'Light', 'badge-dark':'Dark', }, }
Enggano cuckoo-dove The Enggano cuckoo-dove (Macropygia cinnamomea) is a species of bird in the family Columbidae. It is endemic to Enggano Island in Indonesia. Until 2016, it was considered a subspecies of the ruddy cuckoo-dove. References Ng, E.Y.X., J.A. Eaton, P. Verbelen, R.O. Hutchinson, and F.E. Rheindt. 2016. Using bioacoustic data to test species limits in an Indo-Pacific island radiation of Macropygia cuckoo doves. Biological Journal of the Linnean Society 118: 786–812. Category:Macropygia Category:Birds described in 1892
Todd Ross/HuffPost Former sailor Todd Ross is shown in 1989 and 2017. Todd Ross came out in front of a two-way mirror as strangers lurked. When he repeated the word moments later, at last giving those men in grey pants and sportcoats what they had long sought to push out of him, Ross was strapped to a polygraph machine. "Yes," he said. Finally. There was no release. No sense that the heaviness Ross lugged around for two decades had been lifted. Only tears, and the aching feeling that his life had vanished in an instant of courageous truth that felt that day like defeat. "Almost like I had been physically forced down and I was being held," Ross explains one summer afternoon over coffee in Toronto's Leslieville neighbourhood. SUBSCRIBE AND FOLLOW POLITICS Get the top stories emailed every day. Newsletters may offer personalized content or advertisements. Privacy Policy Newsletter Please enter a valid email address Thank you for signing up! You should receive an email to confirm your subscription shortly. There was a problem processing your signup; please try again later Twitter Facebook Instagram Flipboard Ross knew the question was coming. He had already told them he wasn't gay, time and again over an 18-month military investigation that began in 1989. He told them in words as plain as the ones he used to defend his love and loyalty to Canada and the fact that he had never visited Russia. "At that time, I was still 19. I think just turning 20. And I wasn't even out to myself at that point," Ross says. Todd Ross Todd Ross is shown in 1989. But the question tailed him as much as the image of that light blue K-car, the one they'd send for him. The one he was certain he could spot following him down the street some days. Ross knew that people from the special investigations unit had visited his small hometown of St. Stephen, N.B. They had spoken with the former commanding officer from Ross' time in the army cadets, where he excelled as the province's best. They even interviewed the guy who owned the camera shop next to the bank where his mother worked. "I felt like there was no stone left unturned that they didn't go after. That they had fully dissected every part of my history." Whenever they came by, flashing cards identifying themselves as SIU, Ross would be called to the gangplank over the ship's public address system. It was unfathomable to his shipmates on the HMCS Saskatchewan, docked at Canadian Forces Base Esquimalt in B.C., that he was ostensibly being probed for espionage, Ross says. At the time, he was a naval combat information operator. The interrogations were a lot like what you'd see on crime TV shows, Ross says. Usually they'd put him in a room alone for about an hour before coming in to pepper him. "I knew absolutely it was because I was gay," he says. One day, he'd had enough. "So, when they came to the question... 'Are you gay?'... I said yes. It was almost like they closed the book at that point." He knew it meant the end of his military career but the death of something else, too. "I really thought that if I wished it strong enough that I would get settled down, have kids with a wife, and that I could lead a straight life," Ross says. "That was part of what was in my mind that had collapsed as well." *** An official apology from the federal government will come on Nov. 28 for the so-called purge of LGBT Canadians from the Canadian Armed Forces, federal public service, and Royal Canadian Mounted Police over the course of more than three decades. Policies that included surveillance and demeaning interrogations about the private lives of public employees continued long after a justice minister named Pierre Trudeau proclaimed the state had no place in the bedrooms of the nation and Canada decriminalized consensual homosexual acts in 1969. It is estimated that from the late 1950s to early 1990s, thousands of gay and lesbian Canadians were fired, released from the military, denied promotions, or otherwise demoted because of their sexuality. It's a shameful chapter of this country's past that one expert believes is not fully understood by many Canadians, continuing the legacy of secrecy surrounding a Cold War-era program initiated at the very highest levels of the federal government. Adrian Wyld/CP Prime Minister Justin Trudeau takes part in a Pride flag raising ceremony on Parliament Hill on June 1, 2016. "The ostensible reason (for the purge) was that lesbians and gay men were supposed to be a national security risk because we suffered from this supposed character weakness," explains Laurentian University sociologist Gary Kinsman. The enduring belief of the day was that gay or lesbian Canadians in the public service or military, then mostly closeted, would be more vulnerable to blackmail from Soviet agents or other foreign enemies. But Kinsman, who co-authored "The Canadian War on Queers: National Security as Sexual Regulation," is quick to note purges happened before the 1950s. During the Second World War, for example, homosexuals could be discharged for having "a psychopathic personality with abnormal sexuality." A panel to weed out national security threats was established by the cabinet defence committee in 1946 and later expanded to include the RCMP and other government departments. After 1958, the panel began aggressively searching for gay civil servants through interrogations and surveillance of bars and hangouts. It initially focused largely on the navy and External Affairs and broadened to other parts of the public service in the 1960s, Kinsman says. Friends and acquaintances turned on each other under the threat of criminal charges. The campaign in the U.S. was very public, very visible against what they would have referred to as sexual deviants in the public service. The campaign in Canada was kept as secret and as privatized as possible.Gary Kinsman, Laurentian University sociologist Though gay Canadians were supposed to be the ones susceptible to coercion and intimidation, Kinsman says it was actually the RCMP and security forces doing the blackmailing, resulting in a database of 9,000 "suspected homosexuals" by the late 1960s. The campaign was initiated later than a similar effort in the United States and much more discreetly, he says. "The campaign in the U.S. was very public, very visible against what they would have referred to as sexual deviants in the public service," Kinsman says. "The campaign in Canada was kept as secret and as privatized as possible." It's one reason a public apology is so needed, he says, adding that the "network of surveillance and interrogation" expelled people from the fabric of the nation and pushed some to take their own lives. Germany has already accepted recommendations of compensation for LGBT people who faced historic discrimination. Daniel Andrews, premier of the Australian state of Victoria, apologized last year for similar policies of "state-sanctioned homophobia" that ruined lives. "These purge campaigns are a major part of how the social relations of the closet — what some people would describe as having to live a double-life, being heterosexual at work in the public service or military but being lesbian or gay underground, on the side — these policies helped put that in place," Kinsman says. And not only did the decriminalization of homosexual acts in 1969 and passage of the Charter of Rights and Freedoms in 1982 fail to make things easier, such steps may have paradoxically helped ramp up efforts because of a sense that the window to act was closing. At least that's the position of the activist lawyer now leading a multi-million dollar class action lawsuit against the federal government, seeking redress for all those who were wronged. *** Martine Roy remembers a K-car, too. She was just pretending to be a victim that day at CFB Borden, 100 kilometres north of Toronto, when the strange vehicle showed up on the base. Roy, who joined the military in 1981 at the age of 19, was training at the time to become a medical assistant. Roy naively thought she was being asked for directions when called over to meet the men in the vehicle. "I really thought they were lost civilians that ended up in the field and that I had to take them back," she says over the phone while preparing for Pride events in her native Montreal. After she got in the car, the men from the SIU drove her to a small building at the edge of the base that she didn't know existed. Roy was interrogated for almost five hours about her sex life. They had received word that she was a lesbian. Martine Roy Martine Roy joined the military in 1981 at the age of 19. Roy told them she had a boyfriend, which was technically true. At that point she had fallen for a young woman she met at a hospital but both decided it would look better to keep their male partners. "I could not tell you if I was gay or straight or bi or what," Roy says now. "I knew I liked people." Her interrogators pressed for intimate details about the boyfriend. How many times do you see him? How many times have you had sex? What type of intercourse do you have? Is there penetration? After a while, Roy says she was told that if she was honest about her "perversions," she could continue to serve. So, she opened up about her secret relationship and promised never to see that girl again. "They told me they would keep me because I was honest." She soon began a two-year contract at the DND's medical centre in Ottawa but dread followed her. Roy was always worried she was being watched, always felt a chip on her shoulder. Roy was summoned to see a psychiatrist to determine if she was abnormal and, over several sessions, tried to make the case she wasn't a sexual deviant. Martine Roy Martine Roy is shown with her daughter, Cascia. "I tried to tell them I made a mistake. Sorry. I won't do it again," Roy says. "You want to survive. You don't want anything to happen to you." In 1984, Roy landed a new job as a communications officer in Kingston, which came with top secret clearance and a boost to her confidence. She celebrated by buying a brand new car — a Hyundai Pony. Two months after signing her contract, the floor fell out beneath her. She was called into the office of the base colonel to learn she was being dishonourably released. She had nine days to pack her things and go. "They just throw me out on the street. Tell me I'm no good. My self esteem just went in the drain," she says. "It took me about 10 years to make it back from that." She returned to Quebec without a pension, she says, feebly seeking answers from everyone from her local MP to her priest. "I was destroyed," Roy says of the reckless, restless years that followed. "And like a good destroyed person, I went into drugs." I tried to tell them I made a mistake. Sorry. I won't do it again.Martine Roy Roy says she has since been diagnosed with post-traumatic stress disorder. "Everything comes back when I start talking about it again," she says. Even after getting sober, the feeling of being cast aside from the military often made it a struggle for her to sustain the trust needed in relationships. Roy says a job at IBM, where she was finally comfortable enough to be her authentic self, helped her regain the years she lost. She's embraced activistism and became a founding member of Pride At Work Canada, a non-profit organization promoting workplaces that support LGBT employees. She got married in April and along with her wife, Jessica Paul, is raising a daughter named Cascia, who is almost two. The couple is expecting a second child in November. Roy, now 53, counts herself lucky compared to others who were not able to fight their way back. "It changed my whole life. It made me, maybe, stronger," she reflects. "But not everybody made it. Some died; some just got married because they didn't want anybody to know they were gay. The impact on people from something like that is astronomical." She never thought, decades later, she would be bracing for the apology she deserves. "Imagine. Thirty years." *** Ross wanted to kill himself. The first time, back on the ship, he took a bunch of vitamins because he couldn't find pills. "That didn't work, obviously," he says, laughing. "I had a healthy glow afterwards." The second time, shortly after his release, Ross was clawing at his wrists. "I could not envision a life as a gay person. That, to me, was an unavailable scenario for anyone," Ross says. "I didn't think it was something that people could do." After the final interrogation, Ross agreed to give SIU access to all his documents, from personal photos to shoeboxes filled with letters, including ones from his grandmother. Todd Ross Todd Ross was selected as the top army cadet in New Brunswick in 1987. Ross was later told his security clearance was being stripped because of a picture of him and his three colleagues standing behind a large radar computer in their workspace. A radio frequency could be seen on a wall. He was offered an honourable discharge or a demotion that would mean performing general duties on the base, such as sweeping. He took the discharge in June 1990 because at that point his passion for the military had been snuffed out. Ross received about $1,500 he paid into his pension over two-and-a-half years — money he later blew hitchhiking in Europe — and had his futon shipped back East. He returned to St. Stephen, but couldn't come to terms with explaining why his budding military career had ended. After a year at the University of New Brunswick — where Ross had a girlfriend "just to confuse Mom," he teases — he headed back to B.C. and found work at a vegetarian juice bar. "I still had that fear of judgment and disgracing my family and all of those things that go through your mind. So, I moved to the farthest point in Canada where there was a gay community." It probably took me 20 years before I was able to sing the words to 'O Canada.'Todd Ross When he finally told his family the truth, Ross says they were very supportive. His brother, who also joined the military in the '80s, is still active in the armoured corps. Ross chokes up when he recalls the message he received one day from his sister, now a RCMP officer, who wrote: "I just realized what you went through." "The realization of the year-and-a-half investigation that I'd always talked about was actually an investigation about me being gay, that hit them when I came out," he says. "So, they had a fuller understanding of what I'd gone through." He returned to Toronto chasing love and, after years working sales at Holt Renfrew, landed a job with Ontario MPP George Smitherman. When Smitherman was appointed health minister in 2003, Ross moved with him to that office but initially feared the Ontario Provincial Police might deny him clearance because of his discharge. In 2013, Ross sought a federal Liberal nomination for a byelection in Toronto Centre. He had to explain the "blemish" on his military record to the party's green-light committee. Ross lost the nomination battle to Chrystia Freeland, now the minister of foreign affairs. "Should I have been successful, if I had won the nomination, if I had become an MP, would that have been on my record when I went to Ottawa? I don't know." An acute feeling of betrayal has stayed with him. "It took me a long time before I regained my pride in Canada," he says, tears welling up in his eyes. "It probably took me 20 years before I was able to sing the words to 'O Canada.'" *** Ross and Roy are two of the lead plaintiffs in a class action suit launched against the Government of Canada last March in Federal Court. A third plaintiff, former postal clerk Alida Satalic from Nova Scotia, says in court documents that she also took an honourable release in 1989 after admitting she was gay after similar, graphic interrogations. The class action combines separate lawsuits into one, with legal teams in Toronto, Montreal, and Halifax. One of the driving forces behind the action, Douglas Elliott, is perhaps best known as a leading lawyer in the successful fights for marriage equality and securing survivor pension benefits for widowed same-sex partners. Elliott estimates as many as 9,000 people could end up being included in the class action. They are seeking in excess of $600 million in damages. Aaron Harris/CP Douglas Elliott speaks at a press conference in Toronto on Nov. 27, 2001. Elliott says he was motivated to take action because the government did not respond promptly to the recommendations from a report he helped author for Egale, a national group promoting LGBT rights. The "Just Society" report, released the day after a massacre at an Orlando gay nightclub in June 2016, urged the government to, among many other things, provide an apology, pardons, and redress for those swept up in the LGBT purge. "Days went by and weeks went by and we had many positive statements from the prime minister but no action," Elliott says. The class action is filed on behalf of current or former members of the CAF or federal public service who were "investigated, discharged, terminated, sanctioned or faced threat of sanction" from the government because of their sexual orientation, gender expression or gender identity between June 27, 1969 to the present day. The 1969 cutoff was chosen because that is when homosexual acts were decriminalized and Elliott says the government could likely have argued "they were entitled to fire criminals." It was a logical call, but a tough one. Elliott is hoping a compensation package could be in place, at least in principle, in time to harmonize with Prime Minister Justin Trudeau's apology. The government has also promised legislation to expunge the records of gay and lesbian Canadians convicted of crimes because of their sexuality, including gross indecency. Elliott is optimistic the case will settle, avoiding a messy legal battle. "I've never had the federal government come to the table so quickly and with as much goodwill as I've seen in this case," Elliott says, adding he's told younger associates not to be lulled into thinking negotiations are usually so smooth. "I'm not saying that they're giving away the store, far from it. But it's very clear to me that they would like to get this resolved sooner rather than later on a basis that is fair to everyone and that includes Canadian taxpayers." Elliott believes a legal victory on this matter will stand on equal footing with same-sex marriage as a moment when Canada took a giant leap forward. "Same-sex marriage was really about the future of Canada... but it really didn't address the past injustices done," he says. "There's been an attitude in Canada that, well, let's just forget about the past and move on. I think we've learned from residential schools, in particular, that's not good enough. "You can't really move on until you've addressed the injustices of the past." *** Michelle Douglas still feels badly for that young woman who was made to feel like a criminal, not so long ago. The one who was forced to concede she was gay, to catch up to her government's label, while attached to a polygraph machine after a "very intense period of harassment." The one who was dismissed in 1989 as being "not advantageously employable due to homosexuality." "All I knew was that I was just in love with a woman," Douglas says. Her first love, in fact. She took to the military in a way she didn't expect and says she graduated as a top candidate in every course she took. Michelle Douglas Michelle Douglas sued the federal government after the military deemed her not advantageously employable due to homosexuality. But Douglas always knew her sexuality was something to be hidden, despite the discreet club of lesbians in the military. When she was moved into the SIU as an officer, a unit tasked with the investigation of very serious crime and allegations of homosexuality, Douglas feared it wouldn't be long until she faced questions. It happened about a month into her post. Douglas denied her relationship as she was grilled for two days in a hotel. When she was later flown to Ottawa to face a lie detector, Douglas decided to tell the truth. "It didn't matter how good you were. It didn't matter how much you were prepared to serve your country and indeed die for your country," she says. "It only mattered what your sexual orientation was." But Douglas opted to fight, to "lean in" as they say today. In so doing, she changed the course of Canadian history. She filed a lawsuit in Federal Court against the Department of National Defence in 1990, with noted civil rights lawyer Clayton Ruby in her corner, arguing her Charter rights had been violated. It didn't matter how good you were. It didn't matter how much you were prepared to serve your country and indeed die for your country. It only mattered what your sexual orientation was.Michelle Douglas The case never made it to trial, however, and was settled in 1992 after the Progressive Conservative government abolished policies overtly barring gay and lesbian soldiers from serving. "I realized that I did have a role to play and I did step into that role," Douglas says. "Maybe I have the military's leadership training to thank for some of that piece." Douglas, now 53 and a federal government employee, has dedicated the last 25 years fighting for LGBT equality with a front-row seat to a succession of court cases breaking down legal barriers, including ones preventing same-sex marriage. She says she has remained optimistic and grateful through it all and has never regretted signing up to serve her country. "I gave them my best. I guess I felt that it was their loss that they could not have a place for me in the military of the day," she says. "Of course, today it's completely different. I like to think that I played a small role in helping bring about that change." She wants to be in the same room as the prime minister when he expresses regret and remorse this year. "I need to hear those words." *** Before the days of polygraphs, two vexing issues confronted members of the security panel tasked with uncovering homosexuals: the sheer cost of field investigations and growing resistance in gay and lesbian networks to co-operate. So, they came up with the "fruit machine." A scientific way of determining homosexuality — a sort of gaydar — was seen as a possible solution to both. In 1961, the federal government sent Carleton University psychology professor Frank Robert Wake to the U.S. to study the development of technology to detect if someone was gay. He returned with a proposal for what he dubbed the "special project," a battery of tests to determine who was gay by monitoring everything from anxiety to sweat. Justin Tang/CP Chief of the Defence Staff Jonathan Vance marched in the Ottawa Pride parade on Aug. 27, 2017. It marked the first time Canada's top soldier has participated in a Pride parade.
Spikes, synchrony, and attentive learning by laminar thalamocortical circuits. This article develops the Synchronous Matching Adaptive Resonance Theory (SMART) neural model to explain how the brain may coordinate multiple levels of thalamocortical and corticocortical processing to rapidly learn, and stably remember, important information about a changing world. The model clarifies how bottom-up and top-down processes work together to realize this goal, notably how processes of learning, expectation, attention, resonance, and synchrony are coordinated. The model hereby clarifies, for the first time, how the following levels of brain organization coexist to realize cognitive processing properties that regulate fast learning and stable memory of brain representations: single-cell properties, such as spiking dynamics, spike-timing-dependent plasticity (STDP), and acetylcholine modulation; detailed laminar thalamic and cortical circuit designs and their interactions; aggregate cell recordings, such as current source densities and local field potentials; and single-cell and large-scale inter-areal oscillations in the gamma and beta frequency domains. In particular, the model predicts how laminar circuits of multiple cortical areas interact with primary and higher-order specific thalamic nuclei and nonspecific thalamic nuclei to carry out attentive visual learning and information processing. The model simulates how synchronization of neuronal spiking occurs within and across brain regions, and triggers STDP. Matches between bottom-up adaptively filtered input patterns and learned top-down expectations cause gamma oscillations that support attention, resonance, learning, and consciousness. Mismatches inhibit learning while causing beta oscillations during reset and hypothesis testing operations that are initiated in the deeper cortical layers. The generality of learned recognition codes is controlled by a vigilance process mediated by acetylcholine.
Practice Patterns and Perioperative Outcomes of Laparoscopic Pancreaticoduodenectomy in China: A Retrospective Multicenter Analysis of 1029 Patients. The aim of the study was to analyze the outcomes of patients who have undergone laparoscopic pancreaticoduodenectomy (LPD) in China. LPD is being increasingly used worldwide, but an extensive, detailed, systematic, multicenter analysis of the procedure has not been performed. We retrospectively reviewed 1029 consecutive patients who had undergone LPD between January 2010 and August 2016 in China. Univariate and multivariate analyses of patient demographics, changes in outcome over time, technical learning curves, and the relationship between hospital or surgeon volume and patient outcomes were performed. Among the 1029 patients, 61 (5.93%) required conversion to laparotomy. The median operation time (OT) was 441.34 minutes, and the major complications occurred in 511 patients (49.66%). There were 21 deaths (2.43%) within 30 days, and a total of 61 (5.93%) within 90 days. Discounting the effects of the early learning phase, critical parameters improved significantly with surgeons' experience with the procedure. Univariate and multivariate analyses revealed that the pancreatic anastomosis technique, preoperative biliary drainage method, and total bilirubin were linked to several outcome measures, including OT, estimated intraoperative blood loss, and mortality. Multicenter analyses of the learning curve revealed 3 phases, with proficiency thresholds at 40 and 104 cases. Higher hospital, department, and surgeon volume, as well as surgeon experience with minimally invasive surgery, were associated with a lower risk of surgical failure. LPD is technically safe and feasible, with acceptable rates of morbidity and mortality. Nonetheless, long learning curves, low-volume hospitals, and surgical inexperience are associated with higher rates of complications and mortality.
Q: Deserialize Json with invalid markup I'm currently trying to tackle a situation where we have invalid Json that we are trying to deserialize. The clinch point is we're supplied Json where property assignment is declared with an = instead of a : character. Example Json: { "Field1" = "Hello", "Field2" = "Stuff", "Field3" = "I am non-Json Json, fear me", "Field4" = 8 } Has anyone had any luck using Json.Net to deserialize this into an object of relating structure into C# where = is in use instead of : I've been trying to write a JsonConverter to read past the = but it always complains it's got an = instead of a : and throws an exception with the message "Expected ':' but got: =. Path ''". I don't see any way past this except for writing my own deserialization process and not using the Json.Net library. which sucks for something so close to being valid Json (But I suppose is fair enough as it is invalid) When reader.ReadAsString(); is hit it should read Field1 out but obviously it hasn't met its friend the : yet and so proceeds to fall over saying "what the hell is this doing here?!". I've not got any JsonConverter implementation examples because there's really not much to show. just me attempting to use any of the "Read..." methods and failing to do so. A: If property assignment is declared with an = instead of a : character then it is not JSON. If you don't expect any = in the values of the object then you can do a string json = invalidData.Replace("=", ":"); and then try to parse it. As mentioned by @Icepickle, there are risks involved in doing this. My answer works as a quick fix/workaround, but you will eventually need to make sure that the data you are receiving is valid JSON. There is no point in trying to deserialize invalid JSON.
Hannover. Mit einem eindringlichen Appell an Kunden und Politik hatte ein Unternehmer aus Hannover binnen Stunden etliche Menschen auf Facebook und erreicht. Millionen Nutzer sahen, wie Gerhard Bosselmann, Inhaber der Bäckereikette Bosselmann, mit teils tränenerstickter Stimme auch an seine Kunden appellierte: "Gehen sie zu ihrem Bäcker um die Ecke! [...] Und es ist scheißegal wie der heißt, sie retten damit Arbeitsplätze."
KK Gostivar KK Gostivar () is a basketball club based in Gostivar, North Macedonia. In the past it was known as Nikol Fert for sponsorship reasons. History The team was established in 1954 under name KK Mavrovo. It changed its name numerous times over the year. KK Goteks, KK Vardar-Komerc, KK Gostivar and KK Nikol-Fert Gostivar. KK Gostivar is three times republic league champion of Macedonia. In the golden age of its existence it won three title in: 1965, 1967 and 1968. They waited for a long time for their fourth title but after 32 years they won their 4th title in 2000. Next year in the season 2000-01 they won their first Macedonian Basketball Cup by beating KK Rabotnički in the final 72–65. Next season they once again defeated Rabotnički 88-82 to claim back to back Cup titles. League Achievements Macedonian Republic League Champion - 1965, 1967, 1968 Macedonian League Champion - 2000 Macedonian Cup Winner - 2001, 2002 Macedonian Super Cup Champion - 2000, 2002 Current roster Depth chart KK Gostivar (Nikol Fert) in FIBA competitions They played 4 times in European competition. In the season 1996/97, 1999/00 and 2000/01 they played in FKC/FIBA Korac Cup. In the 2002/03 season they played in FRC/FIBA-Europe Regional Challenge. Scores of KK Nikolfert Gostivar in Europe: 1996 Radivoj Korać Cup 1999 Radivoj Korać Cup 1999 Radivoj Korać Cup 2002 Europe Champions Cup Former players Milan Sotirovski Todor Gečevski Jordančo Davitkov Dejan Dimov Marjan Janevski Dejan Jovanovski Slobodan Petrovski Vlatko Vladičevski Vojislav Zivčević Pero Blazevski Gjorgji Knjazev Budimir Jolović Bojan Trajkovski Josip Sičić Dušan Sučević Dejan Jeftić Michail Misunov Artan Kuqo References External links Eurobasket.com KK Gostivar Page Category:Basketball teams in North Macedonia Category:Basketball teams in Yugoslavia Category:Gostivar
"Gazeteci" Fatih Tezcan kişisel Twitter hesabından Hatay ve Adana cemevlerini açıkça hedef gösterdi. Kaçak Saray'a ve AKP'ye yakınlığıyla tanınan yandaş "gazeteci" Fatih Tezcan, kişisel Twitter hesabında Alevileri ve cemevlerini hedef gösterdi. Tezcan, dün paylaştığı tweette, "Hatay ve Adana cemevlerinde silah yığıldığına dair duyum var. Bassan 'Mezhepçiler cemevi bastı.' Basmasan Silahlı Gezi, Esatçı katliam" diye yazdı.
1. Field of the Disclosure The disclosure relates to wood shaping devices and more particularly pertains to a new wood shaping device particularly well suited for coping the end of trim to allow two pieces of trim, coming together at an angle, to be abutted against each other in a flush manner. 2. Summary of the Disclosure An embodiment of the disclosure meets the needs presented above by generally comprising a support frame having an upper support and a plurality of legs attached to and extending downwardly from the upper support. A cutting assembly includes a saw blade and motor for rotating the saw blade. A panel is mounted to the support frame. The panel has a planar upper surface and the saw blade extends above and below the upper surface. The panel and the cutting assembly are movable with respect to each other to allow a portion of wall trim extending over an edge of the panel to be cut by the saw blade. A control guide is in communication with the panel and is configured to follow contouring on a face of a piece of guide trim to restrict movement of the panel and the cutting assembly with respect to each other to allow the cutting assembly to cope an ending of the piece of wall trim. There has thus been outlined, rather broadly, the more important features of the disclosure in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional features of the disclosure that will be described hereinafter and which will form the subject matter of the claims appended hereto. The objects of the disclosure, along with the various features of novelty which characterize the disclosure, are pointed out with particularity in the claims annexed to and forming a part of this disclosure.
There’s more to being a freelancer than working with clients; we explore 20 new tools to help you take charge of all areas of your business. Dec.03 Explore browser-based VR, get the low-down on web typography and steal performance secrets from the BBC in net issue #288. Welcome to the new world: the VR web is finally here. This month, Liv Erickson plunged head-first into the world of browser-based virtual reality and the tools and frameworks that are making it more accessible than ever before. In the latest issue she shares her findings. Dec.03 In the past, web designers put a particular focus on showing off their skills and design portfolios by packing sites with flashy illustrations and animations that supposedly wowed their visitors. Then came a shift toward skeuomorphic design, which attempted to bring real life to the screen, with faux-realistic textures, drop shadows and real object characteristics. That gave way to the flat design, which opposes all of these ‘artificial’ design techniques, in favour of a more simplified, classically digital aesthetic. This user-centric web design style has been around for a while now, but if you’re still not sure what it’s all about this guide might be just what you need…
Ask you to find a word in dictionary because you can't spell it Can't find it because you can't spell it 179,983 shares
Edvard Persson Carl Edvard Persson (born 17 January 1888 in Sankt Pauli parish, Malmö, Scania – died 19 September 1957 in Helsingborg, Scania) was a celebrated Swedish actor, director and singer. During his time, he was well-known in the entire country, but through many of his films and songs, he is often associated with his home province, Scania (Swedish and Danish: Skåne). He was also a popular entertainer in Denmark<ref>Swedish National Archive , "I Danmark var P:s popularitet inte mindre än i Sverige." or "In Denmark was his popularity no less than in Sweden".</ref> and after an American 1947 inviting, he made a 100 day tour in the US "Swedish communities" and made 100 concerts in New York City and in 35 other American cities. Biography and career He got his first role in the 1923 silent film Studenterna på Tröstehult. Overall, Persson made 45 feature films, among those were South of the Highway and Kalle på Spången. He was one of the most popular film actors of his time, often playing the same kind of character - the jovial and good-natured man from Scania. As a singer he released numerous records. Among his more famous songs were Kalle på Spången, Jag har bott vid en landsväg, Jag är en liten gåsapåg från Skåne and Vi klarar oss nog ändå. Partial filmography Studenterna på Tröstehult (1924) - Tobias Bruce, informator Den gamla herrgården (1925) - Tutor Miljonär för en dag (1926) - Kalle 'Blixten' Svensson Kvick som Blixten (1927) - Kalle 'Blixten' Svensson Vad kvinnan vill (1927) - Kalle Pettersson På kryss med Blixten (1927) - Kalle 'Blixten' Svensson Hattmakarens bal (1928) - Cederström The Southsiders (1932) - 'Lasse' Larsson Sten Stensson Stéen från Eslöv på nya äventyr (1932) - Karlsson Två hjärtan och en skuta (1932) - Johansson Augustas lilla felsteg (1933) - Smulle Månsson The Dangerous Game (1933) - Vredberg Lördagskvällar (1933) - Nappe Johansson Secret Svensson (1933) - August Olsson Flickorna från Gamla sta'n (1934) - Edvard Larsson The Women Around Larsson (1934) - Lasse Larsson Tjocka släkten (1935) Larsson i andra giftet (1935) - Lasse Larsson, baker Our Boy (1936) - Lars Blomquist South of the Highway (1936) - Edward Månsson Än leva de gamla gudar (1937) - Napoleon Pettersson Baldwin's Wedding (1938) - Baldevin Skanör-Falsterbo (1939) - Henrik Karlsson Kalle's Inn (1939) - Kalle Jeppsson Bashful Anton (1940) - Karl Anton Malm A Sailor on Horseback (1940) - Lasse Borg Sunny Sunberg (1941) - Gunnar Solberg Snapphanar (1941) - Grimme Jens Sun Over Klara (1942) - Ararat Stinsen på Lyckås (1942) - Carl Malm Livet på landet (1943) - Zakarias Bräsig När seklet var ungt (1944) - Squire Munthe The Happy Tailor (1945) - Sören Sörenson Klockorna i Gamla sta'n (1946) - Carl Magnus Berg Jens Mansson in America (1947) - Jens Månsson Unconquered (1947) - Indian (uncredited) Each Heart Has Its Own Story (1948) - Baron Henric Löwencrona af Löwstaborg Sven Tusan (1949) - Sven 'Tusan' Jönsson Number 17 (1949) - Calle Svensson Pimpernel Svensson (1950) - Anders 'Pimpernel' Svensson Count Svensson (1951) - Anders Svensson The Girl from Backafall (1953) - Silla-Sven A Night at Glimmingehus (1954) - Nils Jeppsen Blue Sky (1955) - Fridolf Rundquist When the Mills are Running'' (1956) - Blomster-Pelle Pettersson (final film role) References External links Category:1888 births Category:1957 deaths Category:Swedish male film actors Category:Swedish male silent film actors Category:20th-century Swedish male actors Category:Swedish male singers Category:Actors from Malmö Category:20th-century singers Category:20th-century male singers Category:Singers from Malmö
Popular Articles Term of the Day Family law is the section of law that encompasses all statutes, rulings, and federal and state constitutional provisions that deal with the family. This can include laws about divorce, adoption, marriage, etc. Family laws can vary significantly from state to state. Read more Roslyn Bazzelle Associate Ms. Bazzelle advises and represents clients in real estate, business transactions, corporate planning, corporate structuring and entertainment law. She assists clients in the purchase, sale, financing, development, and leasing of commercial and residential properties. Ms. Bazzelle also counsels national and international companies on a wide range of general corporate matters, including, corporate compliance with federal and state regulations, contracts, mergers and acquisitions, intellectual property protection and corporate structuring. She provides her entertainment expertise to individual artists and entertainment companies with entertainment contracts and copyright and trademark matters. Email Roslyn Bazzelle Sending email... Your Name: Your Email: Your Phone: Subject: Message: We don't display the email address publicly, but this page will go to the organization's information that we have on file.
592 P.2d 1332 (1978) Jane WOOD, Plaintiff-Appellant, v. Charles Foster ROWLAND, M.D., Lutheran Hospital and Medical Center, a Colorado Non-Profit Corporation, and James C. Kisicki, M.D., Defendants-Appellees. No. 77-600. Colorado Court of Appeals, Div. I. November 16, 1978. As Modified On Denial of Rehearings December 28, 1978. Certiorari Denied April 2, 1979. *1333 Elliott & Greengard, Richard D. Greengard, Denver, for plaintiff-appellant. Zarlengo, Mott & Zarlengo, John C. Mott, Denver, for defendant-appellee Charles Foster Rowland, M.D. Marshall Quiat, Hansen, Anstine & Hill, Robert W. Hansen, Denver, for defendant-appellee Lutheran Hospital and Medical Center. Yegge, Hall & Evans, Paul D. Cooper, Denver, for defendant-appellee James C. Kisicki, M.D. BERMAN, Judge. Plaintiff filed suit against defendants alleging medical malpractice on the part of the two doctors and negligence on the part of the hospital in the care of plaintiff's husband. She appeals from a judgment in favor of the hospital directed at the close of the evidence and a judgment in favor of the two doctors entered after the return of a jury verdict. We affirm the verdict in favor of the doctors and reverse as to the hospital. Plaintiff lists as error: (1) the refusal of the trial court to allow plaintiff to present the testimony of Dr. Lawrence Repsher in either direct or rebuttal testimony; (2) the refusal of the court to allow a registered nurse to testify; and (3) the granting of the directed verdict on behalf of the hospital. I. No pretrial conference was held in this case. Dr. Repsher was not named in the original list of witnesses. On November 9, 1976, seven days prior to trial, plaintiff filed a supplemental pretrial memorandum pursuant to Local Rule 21 of the First Judicial District, which provides: "At least 30 days prior to trial, counsel for each party shall supply all other counsel with a list of names of witnesses intended to be called at the trial, together with their names, addresses, and a brief statement of the nature of the testimony of each. Not less than ten days before trial, such information as to any additional witnesses not known at the time of such previous listing must be furnished opposing counsel. Any witness listed may be called by any party. . . . . . These rules are in lieu of a pretrial conference.. . ." Plaintiff's supplemental memorandum contained the following supplement to witnesses previously listed: "Any doctor or doctors who examined, treated or ran or supervised tests performed during the treatment of the decedent, Cecil E. Wood, at Lutheran Hospital *1334 and Medical Center during the period from April 24, 1973, through April 27, 1973. Such witnesses will testify on standards of care, causation, and all other matters, including care, treatment and the necessity of treatment of the decedent, Cecil E. Wood." Defendants' counsel first learned at the commencement of the trial that Dr. Repsher had been subpoenaed to testify. This was six days prior to his being called; however, during this six-day period, Dr. Repsher was unavailable until the weekend prior to his scheduled testimony, when he could be reached by telephone. No summary of Dr. Repsher's testimony was made available to the defendants, and their first opportunity to interview him occurred the morning of his scheduled appearance. Noting that numerous doctors had provided care and treatment to Mr. Wood during the course of his illness, and upon objection by defendants' counsel, the court refused to allow Dr. Repsher to testify because his name had not appeared on the pretrial list of witnesses. C.R.C.P. 16(d)(3), relative to pretrial procedure, provides: "If a party fails or refuses to name the witnesses he intends to call at trial or fails to state the general substance of the testimony he intends to elicit from each witness, he may be precluded thereafter from calling such witnesses at the time of trial or eliciting such testimony from another witness not designated for such testimony." As stated in Estate of Gardner v. First National Bank, 31 Colo.App. 361, 505 P.2d 50 (1972): "The purpose of such pre-trial disclosure of witnesses is to enable all parties to prepare for trial. . . . Under C.R. C.P. 16, wide discretion is vested in the trial court to determine whether a witness who has not been listed on the pre-trial order and whose name has not been disclosed to the opposing party may testify." In as much as the statement contained in plaintiff's "supplemental statement" was not timely and was so broad as to be equivalent to no statement at all, plaintiff failed to comply with Local Rule 21. Thus, under the circumstances of this case, whether to allow Dr. Repsher to testify on direct examination was within the discretion of the court. See Short v. Downs, 36 Colo.App. 109, 537 P.2d 754 (1975). There is also no merit in plaintiff's argument that Dr. Repsher should have been allowed to testify on rebuttal. There is no transcript of any testimony in the record which was presented by defendants after plaintiff rested her case. Consequently, we cannot determine what evidence there was which his testimony would tend to rebut and thus, since we are bound by the record see Noice v. Jorgenson, 151 Colo. 459, 378 P.2d 834 (1963), we find no error. II. Plaintiff next contends that the trial court erred in holding that registered nurse Miller was not qualified to testify as an expert witness. The determination of whether a witness is competent to give opinion evidence as an expert is a question addressed to the discretion of the trial court, and "unless there is an abuse of that discretion, the court's ruling will not be disturbed." Baird v. Power Rental Equipment, Inc., Colo., 552 P.2d 494 (1976). We conclude that the trial court abused that discretion here. Mrs. Miller was graduated from St. Joseph's Hospital School of Nursing in 1963 and worked as a "charge" nurse at that hospital for approximately three years. She was employed as an office nurse from 1966 to 1968. She was not employed from 1968 to May 1973. From May 1973 to the time of the trial (November 1976) she was employed as a "float" nurse at General Rose Hospital. The incident in question occurred April 7, 1973. Mrs. Miller testified that as a result of her training and experience she was familiar with the standards of nursing care in the Denver metropolitan area. *1335 The trial court concluded that Mrs. Miller was not qualified because as of April 1973, she had been employed in only one hospital and the policies at that hospital may have differed from those at the hospital in question here. The court observed that doctors, on the other hand, are permitted to testify as to standards of care in hospitals in general, including hospitals in which they have not practiced, because they practice in many hospitals. Therefore they are able to draw conclusions as to general community standards. "`An expert is one who has superior knowledge of a subject, and is therefore able to afford the tribunal having the matter under consideration a special assistance, and his knowledge may have been acquired by professional, scientific, or technical training or by practical experience in some field of human activity, conferring on him an especial knowledge not shared by men in general.'" Stone v. People, 157 Colo. 178, 401 P.2d 837 (1965) (emphasis added). Mrs. Miller's education and experience are not common to the average person, and the offer of proof, which we summarize below, makes it clear that her testimony would have aided the jury in determining whether or not the nurses in this case were negligent. The offer of proof shows that Mrs. Miller would have opined that, based on her review of the pertinent hospital records, the nurses on duty failed to perform in accordance with reasonable standards of nursing care in the following particulars. First, after the patient had been examined by a doctor, one nurse failed to report to the doctor the patient's history of a heart condition and that he was taking medication for it. At the same time this nurse also failed to report vomiting by the patient. Second, the nurses failed to perform their duties properly by not taking the patient's vital signs as ordered by the doctor and, when the vital signs were finally taken, by not entering them on the patient's chart. Third, the patient's vital signs were not taken, as they should have been, before he was injected with Demerol. Finally, the testing done in the emergency room did not meet the standard of reasonable nursing care. The effect of the trial court's holding is to prohibit any nurse who has worked in only one hospital from testifying as to the standards of nursing care existing in the community. While such a rule may be correct as to administrative standards or procedures employed by hospitals, the offer of proof shows that Mrs. Miller's testimony concerned professional nursing standards rather than administrative standards or procedures. What a hospital may require of its nurses has little, if anything, to do with the obligations that specialized training and experience may impose on nurses in the community. Therefore as to nursing standards, we reject this rule. The practice of nursing is a highly regulated profession in this state, see § 12-38-201 et seq., C.R.S. 1973, and therefore, the applicable standard of care is that of the reasonable professional. See Valentin v. LaSociete Francaise de Bienfaisance Mutuelle, 76 Cal.App.2d 1, 172 P.2d 359 (1946). Cf. Artist v. Butterweck, 162 Colo. 365, 426 P.2d 559 (1967). See generally Note, Acts of Diagnosis by Nurses and the Colorado Professional Nursing Practice Act, 45 Den.L.J. 467 (1968); Note, A Revolution in White—New Approaches in Treating Nurses as Professionals, 30 Vand.L.Rev. 839 (1977). This minimum standard is not affected by standards which may be adopted by various hospitals. The fact that she had worked in only one hospital would affect, if anything, the weight of her testimony but not its admissibility. See Stone v. People, supra. III. Plaintiff also contends that the court should have submitted to the jury the issue of Lutheran Hospital's negligence in caring for Mr. Wood. Because of our holding above regarding the testimony of Mrs. Miller, the directed verdict in favor of the hospital must be reversed. *1336 Since the offer of proof shows that Mrs. Miller's testimony would not have concerned the defendant doctors, the jury verdict in their favor must be affirmed. The judgment is affirmed in part and reversed in part, and the cause is remanded for further proceedings in accordance with the views expressed herein. SMITH, J., concurs. COYTE, J., dissents and would grant Appellees petition for rehearing. COYTE, Judge, dissenting: I dissent. I agree with the majority opinion where it states that: "It is within the discretion of the trial court to determine the competence of an expert witness to testify." Martin v. Bralliar, 36 Colo.App. 254, 540 P.2d 1118 (1975). Here, the problem is that the nurse was never qualified to testify as an expert witness. She was first called and examined by plaintiff's counsel. Defendants objected that proper foundation had not been laid and extensively examined the witness. Then she was again examined by plaintiff's counsel, and in the course of the examination, she was asked: "You don't know the standards of nursing care in other hospitals, the standards of procedures of nurses in other hospitals that you have [not] worked in do you?" She replied, "No." Furthermore, during questioning relative to being qualified as an expert, she gave a number of inconsistent answers. Merely because the witness was a registered nurse does not automatically qualify her as an expert. The offer of proof is interesting, but before she can testify to the matters set forth in the offer of proof she should first be determined to be an expert. This the trial court understandably refused to do. Accordingly, I find no basis for this court to conclude that the trial judge abused his discretion in refusing to allow this nurse to testify as an expert, and I would therefore affirm the judgment.
Benton Springs Benton Springs may refer to: Benton Springs, Tennessee, an unincorporated community Benton Springs Fault, a geological fault in Nevada See also Benton Hot Springs, California
Enzyme Therapy Ozone/ Prolozone Ozone and prolozone (ozone combined with various proliferative agents such as blood, platelets or lidocaine/dextrose mixtures) can be administered into joint spaces, rectally, intravenously or topically to the skin and wounds. Ozone has the following properties: It activates the immune system in infectious and auto-immune diseases. It improves the cellular utilization of oxygen that reduces ischemia in cardiovascular diseases, and in many of the infirmities of aging. It causes the release of growth factors that stimulate damaged joints and degenerative discs to regenerate. It can dramatically reduce or even eliminate many cases of chronic pain through its action on pain receptors. Intravenous Hydrogen Peroxide Hydrogen peroxide is commonly known as an excellent topical antiseptic for cuts, scrapes and other wounds. However, very few know that the human body produces minute amounts of hydrogen peroxide for various functions ranging from anti-microbial to energy metabolism and normalization of hormonal function. On entering the blood stream hydrogen peroxide immediately supersaturates the blood and surrounding tissues with oxygen and reacts to do the following: Increase the production of interferon by white blood cells. Increases the ability of the body to engulf microbes and eliminate them. Optimize energy production and utilization by optimizing carbohydrate, fat, vitamin and mineral metabolism. Intravenous Vitamins and Anti-oxidants IV nutrients are immediately available to the body’s cells and this route of administration allows very high blood concentrations of nutrients to be achieved. Many people also suffer from digestive issues that compromise the breakdown and absorption of vitamins and minerals in food. The benefits of high dose IV therapy are: Enhance the immune system Helps to eliminate viruses, bacteria, parasites and cancer Optimizes metabolism and hormonal function Ultraviolet Blood Irradiation (UVBI, BPT) BioPhotonic Therapy is a proven medical procedure that causes the body to auto-vacinate against bacteria, viruses, parasites and cancer cells. DMSO (dimethyl sulfoxide) DMSO can be administered into joint spaces, orally, by rectal suppository, on the skin or intravenously. DMSO has the following properties which allows it to be a wonderful therapeutic agent in the alleviation of pain: DETOXIFICATION Far Infrared Sauna (FIR) Sauna Due to the fact that we all live in such a polluted world, we should probably sauna once a week just to stay healthy! We all carry a chemical load because of our polluted environment – we cannot avoid this; but we can try to keep it as low as possible by a combination of avoiding chemicals where possible, detoxing with good micronutrient supplements and proper utilization of detoxifying therapies. For example, in multiple chemical sensitivity (MCS), sufferers’ reactions are often triggered by overwhelming exposures to chemicals such as pesticides, volatile organic compounds, heavy metals, toxic gases (carbon monoxide, NOX, SOX) etc. With proper detoxification protocols these chemicals can be safely removed and patients will reduce their own sensitivity. This will enable them to tolerate inadvertent exposures to chemicals when they stray outside their own safe environment. Chemicals are detoxified primarily through the liver; they can also be removed directly through the skin with FIR sauna. Time-honored methods of detoxification include traditional heat/steam saunas, Turkish baths and spa therapies. However, the problem with these treatments is that not only do they warm up the skin and subcutaneous tissues, but the whole body is warmed up. This means that chemicals are mobilized from the fat and go into the blood-stream. This can cause acute poisoning. However, Far infrared rays constitute the main energy-source that comes from the sun and are responsible for warming our skin when we sit in direct sunshine. The rays penetrate several centimeters through the skin and heat up subcutaneous tissues. This causes the skin to sweat and chemicals from fat will be removed and pass out through sweat. Hence, toxic substances are removed without causing systemic poisoning. Far Infrared Sauna does not damage the skin (it is the sun’s ultra-violet light which is at the other end of the spectrum which does that), so have no fears on this count. Indeed, primitive man evolved running naked under the African sun, and so to have far infra red rays playing on the skin and warming it is an entirely natural process. Ozone Sauna The use of a sauna should be an important part of any detoxification program. The sauna increases the eliminative, detoxifying and cleansing capacity of the skin by stimulation of the sweat glands and also promotes healthy skin tone and texture due to increased blood circulation. Using the steam sauna with ozone allows the steam to surround the body and ozone can be introduced through the skin. Humid heat opens the pores, which allows the ozone through the skin to the bloodstream, where it can travel to the fat and lymph tissue. It is very important to cleanse the lymph tissue of toxins and the ozone/steam sauna is an excellent way to accomplish this. Artificially induced hyperthermia (rising body temperature results in the destruction of bacteria and viruses) combined with heavy sweating and a cleansing effect initiated by ozone will result in elimination of toxins accumulated mainly in the lymphatic system relieving the liver from the difficult task of dealing with them. Through the centuries, men and women have used steam to purify the skin, soothe sore muscles, boost circulation and to simply relax. The combined action of moist heat and ozone cleanse the lymphatic system, which carries 90% of the body’s fluids. Ozone brings oxygen to the tissues for enhanced health and vitality. The combination of steam and ozone is a natural, effective way to promote a refreshing sense of well-being. We believe that an Ozone/Steam Sauna cabinet represents a pleasant and easy to follow form of body cleansing. Benefits of ozone sauna: Relaxes and loosens muscles by reducing the buildup of lactic acid and increasing muscle flexibility. Oxidizes toxins so they can be eliminated through the skin, lungs, kidneys and colon. Boosts blood circulation, helping injured muscles to repair quicker. Stimulates vasodilatation of peripheral blood vessels relieving pain and speeding the healing process. Eliminates bacterial and viral infections of all kinds. Speeds up the metabolic processes of the inner organs and endocrine glands resulting in a loss of 200-450 calories in a 20 minute session. Newest research shows steam hyperthermia combined with ozone is an effective treatment for: Coffee Enema Enemas have been around since the dawn of time and have even been recorded in biblical scripts. There are numerous studies done on the detoxifying benefits of coffee enema’s, and are a key part in treating cancer patients naturally. Coffee enemas are powerful detoxifiers, due to some amazing compounds within the coffee that stimulate the liver to produce Glutathione S transferase, a chemical which is known to be the master detoxifier in our body. Glutathione S transferase binds to toxins and the toxins are then released out of the body along with coffee. Detoxifying our bodies on a regular basis is more important than ever due to the increasing amount of toxins our bodies need to deal with everyday, from home to office, man made products, food, water, the air we breathe, and our busy stressful lifestyles. Benefits of Coffee Enemas: Reduces levels of toxicity by up to 600% Cleans and heals the colon, improving peristali Increases energy levels, improves mental clarity and mood Helps with depression, bad moods, sluggishness Helps eliminate parasites and candid Improves digestion, bile flow, eases bloating Detoxifies the liver and helps repair the liver Can help heal chronic health conditions Helps ease “die-off” or detox reactions during periods of fasting or juice fasting, cleansing or healing Coffee enemas are very safe and are sometimes taken up to 6 times a day in chronically ill patients. If you are healing, on a detox program, or cleansing, I recommend daily enemas. For maintenance, I recommend weekly enemas. Suggestion: Google “U-Tube Coffee Enema”. Human Growth Hormone Why HGH Works: By age 30, virtually everyone is, at some level, deficient in Growth Hormone. Most people think about hGH as some body building drug or “new age” anti-aging potential. However, the reality is that Growth Hormone is the master hormone in charge of all the other hormones in our endocrine system. When these levels are low, our minds are slower, we heal slower, we feel slower and our quality of life is increasingly robbed from us… and usually, we have no idea why. Except for now! The decline of Growth Hormone levels with age is directly linked to many of the symptoms usually associated with the disease called “aging”. This includes wrinkling, gray hair, decreased energy and sexual function, increased body fat, cardiovascular disease, osteoporosis and much more. Because it’s been scientifically proven that these manifestations are a direct result of flailing GH levels, the logical answer to helping to reverse these age related ailments is by replacing GH levels through the means of bio-identical hGH replacement therapy. Further confirming that low GH levels are directly associated with age related maladies is the observation that many of these symptoms have been associated to younger adults whom naturally suffer from Growth Hormone deficiency. In a sense, the biological age of these adults has exceeded their chronological age and the manifestations of this physical glitch are all reflections of ailments normally only associated with elderly patients. Again, the good news is clinical evidence demonstrates that by replacing and raising Growth Hormone levels to reflect numbers attributed to people in their youth, these new, healthier levels will dramatically reverse symptoms accredited to low levels of GH helping to restore hair color, lean muscle growth, regain bone tissue, increase energy levels, significantly reduce body fat, plus many other life transforming, quality of life optimizing, energy and mood boosting benefits, even far beyond what you could ever expect from commencing a real, physician supervised, bio-identical hGH protocol.
Constructed of hard anodized, aircraft grade aluminum, this mount quickly mounts on your carrying handle allowing you to mount a holosight and still see your iron sights. This mount allows attachment of the Eotech Holosight to the rifle carry handle. The mount places the Holosight forward of the carry handle allowing co-witness of the iron sights and optic. (Both sights visible at the same time). Hard anodized aircraft grade aluminum construction.
EcM fungal community structure, but not diversity, altered in a Pb-contaminated shooting range in a boreal coniferous forest site in Southern Finland. Boreal forests contain diverse fungal communities that form essential ectomycorrhizal symbioses with trees. To determine the effects of lead (Pb) contamination on ectomycorrhizal fungal communities associated with the dominant pine (Pinus sylvestris L.), we surveyed sporocarps for 3 years, analyzed morphotyped ectomycorrhizal root tips by direct sequencing, and 454-sequenced fungal communities that grew into in-growth bags during a 2-year incubation at a shooting range where sectors vary in the Pb load. We recorded a total of 32 ectomycorrhizal fungi that formed conspicuous sporocarps, 27 ectomycorrhizal fungal phylotypes from 294 root tips, and 116 ectomycorrhizal fungal operation taxonomic unit (OTUs) from a total of 8194 internal transcribed spacer-2 454 sequences. Our ordination analyses by nonparametric multidimensional scaling (NMS) indicated that the Pb enrichment induced a shift in the ectomycorrhizal community composition. This was visible as indicative trends in the sporocarp and root tip data sets, but was explicitly clear in the communities observed in the in-growth bags. The compositional shift in the ectomycorrhizal community was mainly attributable to an increase in the frequencies of OTUs assigned to genus Thelephora and to a decrease in the OTUs assigned to Pseudotomentella, Suillus, and Tylospora in Pb-contaminated areas when compared with the control. While the compositional shifts are clear, their functional consequences for the dominant trees or soil ecosystem function remain undetermined.
import configure from '@jimp/custom'; import { PNG } from 'pngjs'; import JGD from './jgd'; function configureJimp() { return configure({ types: [ () => ({ mime: { 'image/png': ['png'] }, constants: { MIME_PNG: 'image/png' }, hasAlpha: { 'image/png': true }, decoders: { 'image/png': PNG.sync.read }, encoders: { 'image/png': data => { const png = new PNG({ width: data.bitmap.width, height: data.bitmap.height, bitDepth: 8, deflateLevel: data._deflateLevel, deflateStrategy: data._deflateStrategy, filterType: data._filterType, colorType: data._rgba ? 6 : 2, inputHasAlpha: true }); png.data = data.bitmap.data; return PNG.sync.write(png); } } }) ] }); } const Jimp = typeof window !== 'undefined' && window.Jimp ? window.Jimp : configureJimp(); /** * Jimp constructor (from a JGD object) * @param data a JGD object containing the image data * @param cb a function to call when the image is parsed to a bitmap */ Jimp.appendConstructorOption( 'build from JGD object', jgd => typeof jgd === 'object' && typeof jgd.width === 'number' && typeof jgd.height === 'number' && typeof jgd.data.length === 'number', function(resolve, reject, jgd) { // `this` points to a Jimp instance this.bitmap = JGD.decode(jgd); resolve(); } ); /** * Converts the image to a JGD object (sync fashion) * @returns {JGD} JGD object */ Jimp.prototype.getJGDSync = function() { return JGD.encode(this.bitmap); }; /** * Converts the image to a JGD object (async fashion) * @param {function(Error, Jimp)} cb a Node-style function to call with the buffer as the second argument * @returns {Jimp} this for chaining of methods */ Jimp.prototype.getJGD = function() { return new Promise((resolve, reject) => { try { resolve(this.getJGDSync()); } catch (error) { return reject(error); } }); }; export default Jimp;
Immediate effects of individualized heparin and protamine management on hemostatic activation and platelet function in adult patients undergoing cardiac surgery with tranexamic acid antifibrinolytic therapy. This randomized prospective study was initiated to clarify whether individualized heparin and protamine dosing has immediate effects on hemostatic activation and platelet function in adult cardiac surgery. Sixty adults undergoing elective coronary artery bypass grafting (CABG) were assigned to receive individualized heparin and protamine (HMS group, n= 29) or a standard dose (ACT group, n=24). Measures of thrombin generation and Multiplate (Verum Diagnostica, Munich, Germany) platelet function tests were performed before and after cardiopulmonary bypass (CPB). HMS patients received higher heparin (p = 0.006) and lower protamine (p<0.001) doses. Post-CPB, HMS managed patients showed significantly lower thrombin generation (thrombin-antithrombin (TAT) p<0.02) than the ACT group. Moreover, HMS managed patients had a better preservation of platelet function (COL p = 0.013; ADP p = 0.04; TRAP p = 0.04). An individualized and stable heparin concentration and appropriate dosing of protamine can reduce thrombin generation and preserve platelet function, even in short-time CPB.
Q: Speeding up website"speed"? We use Google Analytics to measure traffic on one of our websites (who doesn't?). One of the thing that strikes us is the "page speed" tab. It shows that our website takes on average 5.69 seconds to load over the last 30 days. This is clearly way too slow, and we want to make that much faster. We are a PHP and Apache site, but we use Google's Site Optimizer module for Apache. The content itself. With ab, I find that it takes on average 150ms to serve each and every document, also, a single document is loaded with 5 calls (1 CSS, 1 JS and 2 images). However, these assets should obviously be cached after the first request. When I look at the "Network" tab in Google Chrome, I find that my site is slow mostly due to adsense, analytics, Google+, doubleclick... or even Facebook (we show a widget). These should obviously not be counted in the "load time" for our page, because these are not part of the content. The site is Jobetudiant and you can access a version of it with no extra JS calls by adding noext&nopub to any URL. What would you do to optimize the load and rendering times? A: If the performance bottleneck is GA, AdSense, etc. then you need to look into non-blocking JavaScript. Since these are non-essential libraries, they can also be loaded asynchronously after the page has loaded. You might also consider reducing the amount of widgets and ads you include on each page. There's probably no need to serve up content from more than a single ad network at a time, and having 6 ad units above the fold is a bit excessive. Besides that, there's not a whole lot you can do. If you want to stuff your pages with a massive widget that shows 20 fan thumbnails and large skyscraper and leaderboard ads, etc. then there's gonna be some performance overhead for that. A: You should check out: Steve Souders who does performance work at Google, Yahoo's Best Practices for Speeding Up Your Web Site, Google's Speed Insights and a good watch is Velocity 2010: Nicole Sullivan, "The Top 5 Mistakes of Massive CSS" on YouTube. Personally I find enabling gzip compression on my pages to be a huge benefit. You've made the best start by actually gathering the measurements before you start trying to improve anything.
KC Star predicts at least 70 catches for Jamaal Charles Here’s a prediction. Running back Jamaal Charles will not rush for 1,509 yards this season, as he did in 2012. He may not rush for much more than 1,000 yards. But he still may gain close to 1,500 yards from scrimmage as a rusher and as a receiver. New Chiefs coach Andy Reid loves throwing to his backs, and Charles, who caught 35 passes for 236 yards last year, will more than double that this season based on what we’ve seen in training camp. Charles splits out wide in some formations, and has caught the ball on screens as well as flares to the flats and on check-downs when receivers downfield are covered. “I think it’s a great opportunity for me,” Charles said. “And my future is bright. When my opportunity has come to catch the ball, I have to step up and do it. I love football, and now I love it even more because of the coach we have, with his confidence and his belief of me … I have to prove I’m up to high expectations.” Fantasy Impact: If history is a guide, LeSean McCoy averaged 17.5 carries and 3.8 catches in his last 27 games. That works out to 280 carries and 61 catches over a full season. We currently have Charles projected for 274 carries and 57 receptions. The Star is projecting at least 70 receptions. He's our #3 RB in PPR formats, but we wouldn't have any problem with an owner drafting him ahead of Arian Foster if they're worried about Foster's health/workload.
I say it's spinach I say it's spinach (sometimes given in full as I say it's spinach and I say the hell with it or further abbreviated to just spinach) is a twentieth-century American idiom with the approximate meaning of "nonsense" or "rubbish". It is usually spoken or written as an anapodoton, thus only first part of the complete phrase ("I say it's spinach") is given to imply the second part, which is what is actually meant: "I say the hell with it." Rose and White's cartoon The phrase originated as the caption of a gag cartoon published in The New Yorker on December 8, 1928. Drawn by Carl Rose and captioned by E. B. White, the cartoon shows a mother at table trying to convince her young daughter to eat her vegetable, the dialogue being Mother: "It's broccoli, dear." Daughter: "I say it's spinach and I say the hell with it." (Broccoli was a relative novelty at that time, just then being widely introduced by Italian immigrant growers to the tables of East Coast cities.) Catching on in the 1930s What White called "the spinach joke" quickly became one of the New Yorker cartoon captions to enter the vernacular (later examples include Peter Arno's "Back to the drawing board!" and Peter Steiner's "On the Internet, nobody knows you're a dog"), becoming a bon mot of the 1930s, with continued, though diminishing, use into the early 21st century. For instance, Alexander Woolcott in his 1934 collection While Rome Burns: "This eruption of reticence... will, I am sure, be described by certain temperaments as an exercise in good taste. I do not myself so regard it. I say it's spinach.") At the first awards ceremony of the New York Drama Critics' Circle in 1936, Percy Hammond of the New York Herald Tribune gave a speech dissenting from the choice of Maxwell Anderson's Winterset as the Best Play winner, calling it "spinach, and I say to hell with it." Elizabeth Hawles titled her 1938 autobiographical critique and exposé of the fashion industry Fashion is Spinach and made her meaning clear by reproducing Rose and White's cartoon following the title page. S. J. Perelman titled a 1944 story for the Saturday Evening Post "Dental or Mental, I Say It’s Spinach". Berlin's song Irving Berlin's song "I Say It's Spinach (And the Hell with It)", which appeared in the 1932 musical Face the Music, used the full phrase: "Long as I'm yours, long as you're mine/Long as there's love and a moon to shine/I say it's spinach and the hell with it/The hell with it, that's all!". Gammon and spinach In Britain in the 19th century, "spinach" also meant "nonsense". Dickens uses the phrase "gammon and spinach" in this sense with Miss Mowcher in David Copperfield (published in 1849) saying "What a world of gammon and spinnage it is though, ain't it!" ("spinnage" being a now-obsolete variant of "spinach"). The same phrase, although with unclear meaning, is also seen in the nursery rhyme "A Frog He Would A-Wooing Go" ("With a rowley, powley, gammon and spinach/heigh ho! says Anthony Rowley"). The 1989 second edition of the Oxford English Dictionary lists these two close senses as letters below the same number in the entry for "spinach". Cassell's Dictionary of Slang gives just the American sense (but listed as extant 1900–1950) while conversely Partridge gives only the British, perhaps echoing the first edition of the Oxford English Dictionary which also does so. References Category:American English idioms Category:Editorial cartoons Category:Quotations from comics Category:Words and phrases introduced in the 1920s Category:Works originally published in The New Yorker
350 F.Supp.2d 910 (2005) UNITED STATES of America, Plaintiff, v. James Joseph WILSON, Defendant. No. 2:03-CR-00882-PGC. United States District Court, D. Utah, Central Division. January 13, 2005. *911 Barbara Bearnson, Esq., U.S. Attorney's Office, Salt Lake City, UT, for Plaintiff. Mark S. Kouris, Esq., Utah Federal Defender Office, Scott C. Williams, Salt Lake City, UT, for Defendant. MEMORANDUM ORDER AND OPINION GIVING GREAT WEIGHT TO THE SENTENCING GUIDELINES IN DETERMINING APPROPRIATE SENTENCES CASSELL, District Judge. I. INTRODUCTION Yesterday the Supreme Court handed down its decision in United States v. Booker,[1] finding certain provisions of the Federal Sentencing Guidelines, promulgated pursuant to the Sentencing Reform Act of 1984,[2] unconstitutional. The Court first held that the Guidelines violated the defendant's Sixth Amendment right to a jury trial because they require judges to find facts which in turn increase a defendant's sentence beyond what could be imposed based solely on the jury's verdict. In the second part of the decision, the Court considered whether the unconstitutional portions of the Guidelines could be severed and the rest of the statutory scheme preserved. The Court held that by severing the two provisions in the Act that make the Guidelines mandatory, the rest of the sentencing scheme could be preserved. Specifically, the Court held that 18 U.S.C. § 3553(b)(1), and 18 U.S.C. § 3742(e), were "incompatible with today's constitutional holding."[3] The former provision stated that courts "shall impose a sentence ... within the range" established by the Guidelines.[4] The latter provision mandated a de novo standard of review — a standard which, according to the Court, "depends upon the Guidelines' mandatory nature."[5] "So modified," the Court continued, "the Federal Sentencing Act ... makes the Guidelines effectively advisory."[6] In light of the Supreme Court's holding, this court must now consider just how "advisory" the Guidelines are. The court has before it for sentencing defendant James Joseph Wilson, who has pled guilty *912 to armed bank robbery. In view of his lengthy criminal record and his brandishing of a sawed-off shotgun at several tellers, the Guidelines advise a prison sentence of no less than 188 months. What weight should the court give to this recommended sentence? This issue of the weight to be given to the advisory Guidelines will, of course, recur in all of the court's sentencings unless and until Congress responds to Booker. Having reviewed the applicable congressional mandates in the Sentencing Reform Act, the court concludes that considerable weight should be given to the Guidelines in determining what sentence to impose. The Sentencing Reform Act requires the court to impose sentences that "reflect the seriousness of the offense, promote respect for the law, provide just punishment, afford adequate deterrence, [and] protect the public."[7] The court must also craft a sentence that "afford[s] adequate deterrence to criminal conduct" and "protect[s] the public from further crimes of the defendant."[8] Finally, the court should "avoid unwarranted sentence disparities among defendants with similar records who have been found guilty of similar conduct."[9] Over the last 16 years, the Sentencing Commission has promulgated and honed the Guidelines to achieve these congressional purposes. Congress, too, has approved the Guidelines and indicated its view that Guidelines sentences achieve its purposes. Indeed, with respect to the congressionally-mandated goal of achieving uniformity, the Guidelines are the only way to create consistent sentencing as they are the only uniform standard available to guide the hundreds of district judges around the country. Therefore, in all future sentencings, the court will give heavy weight to the Guidelines in determining an appropriate sentence. In the exercise of its discretion, the court will only depart from those Guidelines in unusual cases for clearly identified and persuasive reasons. In this particular case, the court will follow the Guidelines and give Wilson a sentence of 188 months. II. THE GUIDELINES ARE "ADVISORY" IN THE WAKE OF BOOKER. Yesterday's decision in Booker breaks down into two parts. The Court first determined that the Guidelines were unconstitutional because they required judicial fact-finding inconsistent with the Sixth Amendment. This court and a number of others anticipated that outcome six months ago.[10] More unexpected was the Court's decision as to the remedy for that constitutional defect. The Court held that, with the exception of two provisions severed from the federal sentencing statutes, the rest of the system remains in place. As Booker explained, Congress would have wanted "to maintain all provisions of the [Sentencing Reform] Act and engraft today's constitutional requirement onto that statutory scheme."[11] Thus, the Court severed a provision rendering the Guidelines mandatory — 18 U.S.C. § 3553(b) — but left *913 in place the adjoining provision — § 3553(a). Section 3553(a) lists the general purposes of sentencing and directs that the sentencing courts "shall consider" certain factors when imposing sentence. Among the factors listed are "the kinds of sentence and the sentencing range established" by the Guidelines.[12] This provision, according to Booker, "requires a sentencing court to consider Guidelines ranges ... but it permits the court to tailor the sentence in light of other statutory concerns as well."[13]Booker also directs courts to abide by the other provisions of the Sentencing Reform Act: Without the "mandatory" provision, the Act nonetheless requires judges to take account of the Guidelines together with other sentencing goals.... The Act ... requires judges to consider the Guidelines sentencing range established for ... the applicable category of offense committed by the applicable category of defendant, the pertinent Sentencing Commission policy statements, the need to avoid unwarranted sentencing disparities, and the need to provide restitution to victims. And the Act ... requires judges to impose sentences that reflect the seriousness of the offense, promote respect for the law, provide just punishment, afford adequate deterrence, protect the public, and effectively provide the defendant with needed educational or vocational training and medical care.[14] Booker finally held that "the Act continues to provide for appeals from sentencing decisions."[15] This means that sentences imposed by district courts must be reasonable given the factors set forth in the Act. One of those factors is the recommended Guidelines sentence. Specifically, "Section 3553(a) remains in effect, and sets forth numerous factors that guide sentencing [one of them being the applicable Guidelines range]. Those factors in turn will guide appellate courts, as they have in the past, in determining whether a sentence is unreasonable."[16] In sum, Booker held that while the Guidelines are no longer mandatory, the rest of the Sentencing Reform Act is. And the remaining provisions of the Act require the court to consider the Guidelines as one factor in crafting a "reasonable" sentence. III. THE COURT SHOULD CONTINUE TO GIVE CONSIDERABLE WEIGHT TO THE SENTENCING GUIDELINES. To comply with Booker, this court must now determine how to consider the Guidelines in determining the appropriate a sentence. As Booker held, "the district courts, while not bound to apply the Guidelines, must consult those Guidelines and take them into account when sentencing."[17] The critical question then becomes how much weight should the Guidelines carry in crafting a sentence. In his dissent in Booker, Justice Scalia stated that "logic compels the conclusion that the sentencing judge, after considering the recited factors (including the Guidelines) has full discretion, as full as what he possessed before the Act was passed, to sentence anywhere within the *914 statutory range."[18] As a general statement of a sentencing judge's legal authority, Justice Scalia's description appears accurate. The wise exercise of that discretionary authority, however, requires a judge to consider how the legal and factual background has changed since the Act was passed. When imposing a sentence today, a district judge has clear congressional directives that a sentence must achieve. Accordingly, the court's discretion is limited to imposing a sentence that satisfies these congressional mandates. In all but the most unusual cases, the appropriate sentence will be the Guidelines sentence. A. The Court Must Impose a Sentence that Achieves the Congressionally-Mandated Purposes of Sentencing. In imposing sentence, the court is of course circumscribed by any statutory maximum or minimum sentence. In this case, for example, defendant Wilson has pled guilty to armed bank robbery.[19] The statutory maximum for this offense is twenty-five years in prison; there is no mandatory minimum sentence, so the lowest possible sentence is probation, without prison time. The court's discretion must operate within these statutory boundaries. This discretion, however, must also be exercised so as to comply with additional congressional mandates. Even as modified by Booker, the Sentencing Reform Act continues to direct that "[t]he court shall impose a sentence sufficient, but not greater than necessary, to comply with the purposes set forth" in the Sentencing Reform Act.[20] Those purposes are: (A) to reflect the seriousness of the offense, to promote respect for the law, and to provide just punishment for the offense; (B) to afford adequate deterrence to criminal conduct; (C) to protect the public from further crimes of the defendant; and (D) to provide the defendant with needed educational or vocational training, medical care, or other correctional treatment in the most effective manner ....[21] In light of the congressional command that the court "shall" impose a sentence that is sufficient "to comply with the[se] purposes," the court must impose a sentence that achieves, for example, "just punishment" for an offense and which "afford[s] adequate deterrence to criminal conduct." B. Guidelines Sentences Generally Achieve the Congressionally-Mandated Purposes of Punishment. To determine what particular sentence achieves such things as "just punishment" and "adequate deterrence," the court has information that was not available before the passage of the Sentencing Reform Act — specifically, the Sentencing Guidelines. When it passed the Sentencing Reform Act, Congress created the Sentencing Commission. The Commission is an expert agency specifically designed to assist the courts in imposing sentences that achieve the purposes of punishment. Congress gave the Commission significant staff and broad fact-finding powers.[22] In 1987, the Commission promulgated the first comprehensive set of Guidelines. For more than fifteen years, the Commission *915 has refined the Guidelines so that they achieve the congressionally-mandated purposes. This process is on-going. As Booker reminds us, "[t]he Sentencing Commission will continue to collect and study [trial court] and appellate court decisionmaking. It will continue to modify its Guidelines in light of what it learns, thereby encouraging what it finds to be better sentencing practices."[23] Congress has also had an opportunity to review both the initial Guidelines and all subsequent amendments to insure that they fulfill congressional purposes.[24] With regard to various crimes, Congress has adopted "sense of the Congress" resolutions, encouraging and even requiring that the Commission make various amendments to the Guidelines.[25] For some crimes, Congress even directly amended the Guidelines to provide what it believes is appropriate punishment to achieve its objectives.[26] The result is a congressionally-approved Guidelines system. As Senators Hatch, Kennedy, and Feinstein explained in their amicus brief in Booker: The 1984 Act represents the most comprehensive effort ever undertaken by Congress to reform the federal sentencing system. It is the product of more than a decade of inter-branch and bipartisan legislative efforts in both Houses of Congress.... Since 1984, Congress has continued to monitor this area of law and has made revisions to the sentencing guidelines system through amendments to the 1984 Act and other legislation[27] Congress' creation of the Commission and subsequent approval of the Commission's Guidelines provide strong reason for believing that Guidelines sentences satisfy the congressionally-mandated purposes of punishment. It would be startling to discover that while Congress had created an expert agency, approved the agency's members, directed the agency to promulgate Guidelines, allowed those Guidelines to go into effect, and adjusted those Guidelines over a period of fifteen years, that the resulting Guidelines did not well serve the underlying congressional purposes. The more likely conclusion is that the Guidelines reflect precisely what Congress believes is the punishment that will achieve its purposes in passing criminal statutes. Congress has reconfirmed that its expectations that courts follow the Guidelines in the recently-adopted "Feeney Amendment." [28]*916 In 2003, Congress passed the Feeney Amendment to the Act, which was designed to address what is called "the serious problem of downward departures from the Federal Sentencing Guidelines by judges across the country."[29] The Feeney Amendment was meant to "put strict limitations on departures by allowing sentences outside the guidelines range only upon grounds specifically enumerated in the guidelines as proper for departure. This would eliminate ad hoc departures based on vague grounds, such as `general mitigating circumstances.' "[30] Among the Feeney Amendment's provisions was one requiring district courts to state in writing their reasons for departing from the sentencing guidelines: The court, at the time of sentencing, shall state in open court the reasons for its imposition of the particular sentence, and, if the sentence— ... is outside the [Guideline] range ... the specific reason for the imposition of a sentence different from that described, which reasons must also be stated with specificity in the written order of judgment and commitment ....[31] This provision, like all other provisions in the Feeney Amendment, remains in effect after Booker. Accordingly, it serves as a congressional reminder to the district courts that the Guidelines are to receive significant weight, and that if departure occurs, the court must provide a written explanation that will be closely examined on appellate review. For all these reasons, the congressional intent underlying the Sentencing Reform Act, as modified by the Feeney Amendment, will generally be best implemented by a Guidelines sentence. C. The Guidelines Generally Achieve "Just Punishment." Even apart from congressional approval of the Guidelines, considerable evidence suggests that Guidelines sentences serve the congressionally-mandated purposes of punishment.[32] Congress' first-identified purpose of punishment is for the sentence "to reflect the seriousness of the offense, to promote respect for law, and to provide just punishment for the offense."[33] The Guidelines well serve this fundamental purpose of sentencing. Just punishment means, in essence, that the punishment must fit the crime. In the Senate Report accompanying the Sentencing Reform Act, the Act's sponsors explained: [Just punishment] — essentially the "just deserts" concept — should be reflected clearly in all sentences; it is another way of saying that the sentence should reflect the gravity of the defendant's conduct. From the public's standpoint, the sentence should be of a type and length that will adequately reflect, among other things, the harm done or threatened by the offense, and the public interest in preventing recurrence of the offense. From the defendant's standpoint the sentence should not be unreasonably harsh under all the circumstances of the case and should not *917 differ substantially from the sentence given to another similarly situated defendant convicted of a similar offense under similar circumstances.[34] The concept of "just punishment" requires the court to consider society's views as to appropriate penalties, not just a judge's own personal instincts. As the Senate Report noted, the court should consider "the public's standpoint" in developing an appropriate sentence. Moreover, Congress expected that the Sentencing Reform Act would generally produce sentences that did "not differ substantially" between similarly-situated offenders. If "just punishment" meant nothing more than what a single judge thought was just punishment, then such uniformity of penalties would be impossible. In determining society's views as to the appropriateness of federal sentences, we are fortunate to have very concrete data. In their informative book Just Punishments: Federal Guidelines and Public Views Compared, Professors Peter Rossi and Richard Berk systematically compare Guidelines sentences with sentences that the public would impose. By means of national public opinion survey, they studied 89 separate crimes, ranging in seriousness from illegal drug possession to kidnaping, including many of the crimes most frequently prosecuted in federal court. Professors Rossi and Berk found considerable convergence between Guidelines sentences and the public's view of appropriate sentences. To provide a few illustrations: • The Guidelines call for 39.2 years in prison for kidnaping when a victim is killed; the public believes 39.2 years is appropriate. • The Guidelines call for 9.1 years in prison for trafficking in cocaine; the public believes 10 years is appropriate. • The Guidelines call for 4.8 years in prison for bank robbery without a weapon; the public believes 4 years is appropriate. • The Guidelines call for 2.5 years for a firearms dealer keeping poor sales records; the public believes 3 years is appropriate.[35] From their data, Professors Rossi and Berk concluded that the Guidelines generally track public opinion: [T]here is a fair amount of agreement between sentences prescribed in the guidelines and those desired by the members of the sample. The agreement is quite close between the means and the medians of respondents' sentences and the guidelines prescribed sentences. There is also quite close agreement between how individual respondents rank crimes and the way in which the guidelines rank the same crimes. . . . . . We interpret this major finding to mean that the ideas about sentencing in the guidelines and the interviews with respondents reflect societal norms concerning publishment for those who violate the criminal laws. Both the [sentencing] commission and the public converge on roughly the same sentences, because the commission sought to write guidelines that would be acceptable to major constituencies.... [T]he commission relied heavily on the central tendencies in past sentencing practices in federal courts as a kind of template for its sentencing rules, a *918 strategy that used those practices as a proxy for public preferences. Using this template, the commission avoided both overly lenient and overly harsh sentences and wrote sentencing rules that came close to the mainstream consensus.[36] It is important to note a few areas of disagreement between the public's views and Guidelines sentences. The public failed to support the Guidelines' differentially harsh treatment of distribution of crack cocaine (as compared to powder cocaine); nor did it support the tough sentences for environmental crimes, violations of civil rights, and certain bribery and extortion crimes.[37] On the other hand, the public supported somewhat longer sentences for marijuana trafficking and for crimes endangering the physical safety of victims and bystanders (e.g., adding poison to over-the-counter drugs).[38] But these disagreements were the exceptions; the rule was that public opinion tracked Guidelines sentences. Apart from the details of this public opinion polling, it is hardly surprising to find that the Guidelines track public views on appropriate punishment. The Guidelines were, after all, created through a democratic process. The public's elected representatives — Congress — created the Commission, approved the Guidelines, and then adjusted them over the years in an on-going dialog with the Commission. In light of these facts, it should be generally presumed that the Guidelines reflect the public's views on appropriate punishment. This general convergence between public opinion and Guidelines sentences creates a strong reason for generally following Guidelines. Because sentencing must "promote respect for the law" and "provide just punishment for the offense,"[39] sentences generally ought to track societal norms. After all, criminal sentencing is the way in which society expresses its views on the seriousness of criminal conduct. To be sure, it is possible that a case can be made for deviating downward (or upward) from public opinion. In the area of civil rights offenses, for example, a criminal sentence might well seek to lead, rather than follow, public opinion by specially protecting minority rights. But aside from such unusual circumstances, Guidelines sentences will generally create "just punishment" by reflecting the public's judgment about the seriousness of an offense. D. The Guidelines Generally Achieve Crime Control Purposes. The court is also required to impose a sentence that serves crime control purposes — e.g., deterrent and incapacitative purposes. Congress has specifically directed that all sentences must "afford adequate deterrence to criminal conduct" and "protect the public from further crimes of the defendant."[40] Essentially, these provisions require the court to determine whether a particular sentence is a cost-effective means of preventing crime, either by deterring potential criminals (general deterrence) or incapacitating criminals who would otherwise have committed more crimes (specific deterrence or incapacitation). It is difficult for an individual judge to make such determinations. Focusing on "adequate deterrence," for example, the *919 court must assess the potential impact of its sentences on potential offenders. As a starting point, this might require the court to take judicial notice of the fact that crime rates are now at their lowest levels in thirty years. Violent crime victimization rates have dropped from 47.7 per 1,000 population in 1973 to 22.8 in 2002, an amazing 52% reduction.[41] In other words, Americans today are only half as likely to fall victim to violent crime as they were in 1973. That drop in the crime rate has coincided with an increase in the number of prisoners behind bars, including substantial increases in the number of federal prisoners. Statistics reveal that 2002 was not only the year of the lowest victimization rate in recent history, but also the year with the highest prison population. Is this purely a coincidence? Or a consequence? One recently published study by a well-known social scientist concluded that a significant part of the decline in violent crime is attributable to increased incarceration. Professor Steven Levitt concluded that increases in the size of the prison population, along with increases in the number of police and a few other factors could fully explain the drop in crime in the 1990s.[42] His study is not the only one to point in this direction. An expanding body of literature suggests that incarceration of dangerous persons in recent years has demonstrably reduced crime, through both incapacitative and deterrent effects. Of particular interest in considering Guidelines sentences may be a recent study assessing the deterrent effect of state truth-in-sentencing laws.[43] Since 1994, Congress has provided some incentive grants to states who can demonstrate that violent offenders serve at least 85% of their sentences. Interestingly, these state truth-in-sentencing laws would track the Guidelines, which demand that prisoners serve 85% of their sentences. A sophisticated regression analysis comparing states with and without such truth-in-sentencing programs found that the laws decreased murders by 16%, aggravated assault by 12%, robberies by 24%, rapes by 12%, and larcenies by 3%. There was a "substitution" by offenders into less risky property crimes: burglaries increased by 20% and auto thefts by 15%. Overall, the net reductions in crime were substantial. These studies focus on a deterrence effect from criminal penalties. Other studies confirm the obvious point that incarcerating an offender prevents him from repeating his crimes while he is in prison.[44] More generally, estimates of both a deterrent and an incapacitative effect have suggested that each 1% increase in the prison population produces approximately *920 0.10% to 0.30% fewer index crimes.[45] Renowned criminologist James Q. Wilson, for example, has opined that this "elasticity" of crime with respect to incarceration is between 0.10% and 0.20%.[46] Professors Thomas Marvell and Carlisle Moody have examined crime statistics and prison populations for 49 states over the period 1971-89.[47] They found that a 1% increase in prison population results in approximately 0.16% fewer reported index crimes. Professor Steven Levitt has found a higher elasticity — about 0.30% or more — in a recent sophisticated, comparative analysis of twelve states that experienced system-wide restraints on prison populations imposed by federal courts. The point of recounting these statistics is not to suggest that the court will make a finding on the elasticity of crime with respect to incarceration before imposing a sentence — far from it. Instead, the point here is that the court is poorly suited to consider elasticities and other factors that would go into a sensible deterrence calculation. On the other hand, the Sentencing Commission with its ability to collect sentencing data, monitor crimes rates, and conduct statistical analyses, is perfectly situated to evaluate deterrence arguments. Further problems abound for an individual court in considering deterrence issues. Congress has directed that a sentence provide "adequate" deterrence to future crimes. Presumably, determining adequacy requires some consideration of not only the number of crimes to be deterred, but also the harm stemming from those crimes. While a court may be well situated to determine the harms of the particular crime before it (through victim impact statements, police reports, and the like), it would be hard pressed to give more than an educated estimate of the general harms imposed by a class of crimes. On this point, the available data suggests that the costs are staggeringly high. One of the most comprehensive analyses was done by Ted R. Miller and his colleagues for the National Institute of Justice in 1996.[48] They evaluated only the costs of crime to crime victims, ignoring costs to the criminal justice system and other social costs associated with the fear of crime. They separated victims' costs into two parts: tangible and intangible losses. Using sophisticated methodology, Miller and his colleagues calculated a total loss per criminal victimization that ranged from $2.9 million for various forms of murder to $87,000 for rape and sexual assault to $8,000 for robbery to $1400 for burglary to $370 for larceny.[49] They also computed the aggregate annual victim cost in the United States from crime — $450 billion as of 1990, or more than $1800 per U.S. resident.[50] Another more recent analysis using a different methodology reported an even higher aggregate burden from crime on the United States — in the neighborhood of $1 trillion annually.[51] *921 To be sure, one can dispute these figures. But the important point for present purposes is that determinations of the "adequacy" of a deterrent to, say, armed bank robbery (the crime at issue in this case) is difficult to make in an individual case. The Sentencing Commission, though, is well situated to evaluate such issues. As Booker explains, "the Sentencing Commission remains in place, writing Guidelines, collecting information about actual district court sentencing decisions, undertaking research, and revising the Guidelines accordingly."[52] If there were any doubt about the Commission's fact-finding abilities on deterrence issues, it would be well to remember — once again — that Congress has approved the Guidelines. Congress has ample data gathering abilities of its own through hearings and other devices. The Supreme Court has recognized that Congress "may inform itself through factfinding procedures ... that are not available to the courts."[53] In light of the congressional sanctioning of the Guidelines, courts should be reluctant to offer judgments about crime control issues. Congress' judgment is entitled to considerable weight on this subject as well. E. Rehabilitation Does Not Justify a Shorter-Than-Guidelines Sentence. The fourth purpose of punishment specified by Congress is "to provide the defendant with needed educational or vocational training, medical care, or other correctional treatment in the most effective manner...."[54] This purpose can be generally described as "rehabilitation." Some might argue that Guidelines sentences are contrary to rehabilitative efforts. But the Commission considered this goal in drafting the Guidelines.[55] More important, it seems clear that in cases such as this one — involving a lengthy prison sentence — rehabilitation is a subordinate consideration to just punishment and crime control. Congress itself directed the Commission to insure that the Guidelines "reflect the inappropriateness of imposing a sentence to a term of imprisonment for the purpose of rehabilitating the defendant or providing the defendant with needed educational or vocation training, medical care, or other correctional treatment."[56] The Senate Report explained that the thinking behind this directive was to place rehabilitation as a secondary consideration where serious crimes were involved: It is understood, of course, that if the commission finds that the primary purpose of sentencing in a particular kind of case should be deterrence or incapacitation, and that a secondary purpose should be rehabilitation, the recommended guideline sentence should be imprisonment if that is determined to be the best means of assuring such deterrence or incapacitation, notwithstanding the fact that such a sentence would not be the best means of providing rehabilitation.[57] Another reason for placing rehabilitation in a secondary position is that the court *922 has no way of determining whether a defendant has been rehabilitated. In this case, for example, the Guidelines call for a sentence of no less than 188 months. The court cannot determine today whether after completing, for example, 100 months of his sentence, defendant Wilson will have rehabilitated himself to the point where he is no longer a threat to society. Nor does any parole mechanism exist under the Sentencing Reform Act to make such a determination. The Sentencing Reform Act not only created the Guidelines but also abolished parole. The Senate Report accompanying the Sentencing Reforming Act suggested that a parole-based sentencing scheme had failed and had led to the many discrepancies between sentences: "[M]ost sentencing judges as well as the parole commission agree that the rehabilitation model is not an appropriate basis for sentencing decisions."[58] After Blakely, some courts and commentators began to consider whether it would be appropriate for judges to revive the parole procedures.[59] For example, it could be argued that "if the [Sentencing Reform Act] is unconstitutional, parole is back."[60]Booker, however, never hints at a possible revival. To the contrary, it makes clear that the only unconstitutional provisions in the Act are two provisions regarding the binding nature of the Guidelines.[61] In light of Booker's silence it must be presumed that the Sentencing Reform Act's abolition of parole remains. Because parole is not a possibility for defendants such as Wilson, the court must follow the Guidelines' lead in giving rehabilitation a subsidiary role in determining the prison sentence. F. The Limited Effect of the Parsimony Provision. One possible reason for avoiding a Guidelines sentence might be the so-called "parsimony provision," which provides that "the court shall impose a sentence sufficient, but not greater than necessary, to comply with the purposes [of punishment] set forth in [the Sentencing Reform Act]."[62] It is possible to argue that this provision requires the courts to impose sentences below the Guidelines range, because Guidelines sentences are not parsimonious.[63] This is an interesting argument worthy of discussion. Determining what the parsimony provision means is difficult. As Professors Marc Miller and Ronald Wright have noted, "[t]he full history and possible meanings of the parsimony provision, and of all of section 3553(a), have not yet been written."[64] While they trace the concept to Professor Norval Morris's 1974 book The *923 Future of Imprisonment,[65] the concept seems to extend all the way to back to general notions of utilitarianism espoused by Jeremy Bentham.[66] With regard to the Sentencing Reform Act, the relevant legislative history shows that, much of the remaining Act originated not in the Senate but in the House (which desired a more flexible guidelines system)[67] After reviewing this history, Professors Miller and Wright concede that the parsimony provision has played "almost no role in caselaw,"[68] but maintain that "the parsimony concept is powerful evidence ... that both the Senate and the House were attempting to pass a statute giving more substantial power to sentencing judges to impose a sentence outside the guidelines range."[69] This conclusion about legislative history seems debatable. But for present purposes, the critical issue is the meaning of the language congress ultimately enacted. It requires a court to impose a sentence "sufficient, but not greater than necessary, to comply" with purposes of Sentencing Reform Act.[70] The court must, therefore, first determine what is a "sufficient" sentence. For the reasons given above, the Guidelines ranges are designed to impose sufficient punishment and appear to impose sufficient punishment in most cases. Moreover, the Commission was itself bound by the parsimony provision.[71] While some have argued that the Commission gave insufficient attention to the provision,[72] the fact remains that the Commission promulgated guidelines that it viewed as parsimonious. If the Commission was mistaken and the ranges were not parsimonious, Congress could have simply rejected them. Congress, of course, did nothing of the sort. To the contrary, in the 15 years since adoption of the Guidelines, the general tenor of Congressional efforts has been to constantly prod the Guidelines upward. There may be an argument that the parsimony provision generally requires a court to impose a sentence at the low end of any applicable Guidelines range. This is something that judges generally do today; the vast majority of judges sentence at or toward the very bottom of any applicable Guidelines range.[73] But the application of the parsimony provision to sentences within a Guidelines range need not be resolved in this case. The government is recommending that defendant Wilson be sentenced at the low end of the Guidelines *924 range that applies to him. Because the court is inclined to follow that recommendation, it is enough to conclude that a low-end sentence within a Guidelines range is parsimonious, leaving for another day whether only a sentence at the low end of the range would be parsimonious. G. The Guidelines Should Be Followed to Avoid Unwarranted Sentencing Disparity. A final reason for giving heavy weight to the Guidelines to avoid unwarranted sentencing disparity. Avoiding unwarranted sentencing disparity was the main goal of the Sentencing Reform Act. The Guidelines were primarily formulated to "eliminate the unwarranted disparities that proliferated under the prior sentencing regime and to foreclose the consideration of race, gender, and other illegitimate factors at sentencing."[74] As Booker explains, Congress'"basic statutory goal in enacting the Guidelines was to provide a sentencing system that diminishes sentencing disparity"[75] and "to move the sentencing system in the direction of increased uniformity."[76] In an effort to achieve this end, "Congress directed the [Sentencing] Commission ... to provide certainty and fairness in sentencing and avoid unwarranted sentencing disparities among defendants with similar records who have been found guilty of similar criminal conduct while maintaining sufficient flexibility to permit individualized sentences when warranted."[77] While Booker renders the Guidelines advisory, the court is still obligated to consider "the need to avoid unwarranted sentencing disparities among defendants with similar records who have been found guilty of similar conduct...."[78] The only way of avoiding gross disparities in sentencing from judge-to-judge and district-to-district is for sentencing courts to apply some uniform measure in all cases. The only standard currently available is the Sentencing Guidelines. If each district judge follows his or her own views of "just punishment" and "adequate deterrence," the result will be a system in which prison terms will "depend on `what the judge ate for breakfast' on the day of sentencing" and other irrelevant factors.[79] Such a result would be intolerable in a society committed to the rule of law and to equal treatment of offenders regardless of race, class, gender, or geographical location. It would, in short, be a return to the pre-Guidelines days, which "produced astounding disparities among the sentences that were imposed on defendants convicted of the same offense with similar backgrounds with different judicial districts across the country — and even among different judges in the same district."[80] To be sure, reasonable minds may differ about whether the Guidelines are the best standard against which to measure the fairness of sentences. It is no secret that some judges believe sentences are too harsh, although the degree of judicial dissatisfaction *925 with the Guidelines is easy to overstate.[81] The fundamental fact remains, however, that the Guidelines are the only standard available to all judges around the country today. For that reason alone, the Guidelines should be followed in all but the most exceptional cases. For all these reasons, the court concludes that in exercising its discretion in imposing sentences, the court will give heavy weight to the recommended Guidelines sentence in determining what sentence is appropriate. The court, in the exercise of its discretion, will only deviate from those Guidelines in unusual cases for clearly identified and persuasive reasons. This is the only course that implements the congressionally-mandated purposes behind imposing criminal sentences. IV. Procedures to Be Followed in all Sentencings. Having set out the substantive considerations that will govern sentences in this court, it is now appropriate to spell out the procedures for future sentencings. Because the court will continue to give considerable weight to the Guidelines in all of its sentencings, the court will continue to follow all procedural components of the Guidelines system. Obviously, the court cannot comply with Booker's mandate to "consider" the Guidelines sentence before imposing the final sentence[82] unless the Guidelines sentence is available. Accordingly, the probation office is directed to continue preparing pre-sentence reports that contain Guidelines calculations, including calculations based on the "real offense" involved with any offense of conviction. Prosecutors and defense attorneys are directed to continue to make objections to any deficiencies in the pre-sentence report, just as they have always done. The court, as it did before Booker, will resolve any disputes at the sentencing hearing.[83] Careful preparation of a pre-sentence report and district court resolution of disputed facts is important for additional reasons as well. Under Booker, both the defendant and the government are authorized to appeal a sentence imposed as a result of an "incorrect application of the sentencing guideline."[84] This may seem a bit odd in view of Booker's determination that the Guidelines are only advisory.[85] But the obligation of a trial judge is to faithfully prepare an appropriate trial court record, leaving it to the appellate court judges to sort out the ultimate implications of that record. One last point about the pre-sentence report and sentencing hearings is important. The Guidelines themselves contain provisions designed to provide necessary flexibility in unusual cases. The Guidelines provide for "departures" where "there exists an aggravating or mitigating circumstance ... of a kind, or to a degree, not adequately taken into consideration by the Sentencing Commission in formulating *926 the Guidelines...."[86] The Guidelines also provide for departures in specified unusual circumstances, such as when a defendant engages in extreme conduct[87] or suffers from diminished capacity.[88] Under these departure provisions, a sentence for an unusual case can comply with the Guidelines systems even though it is outside the Guidelines range. If a defendant (or the government) believes that a departure from the Guidelines range is appropriate, they should present that issue to the probation office for inclusion in the pre-sentence report. They should then be prepared to present their departure argument at the sentencing hearing. At the sentencing hearing, the court will resolve all disputes about application of the Guidelines, and then determine what the advisory Guidelines range is. The court will then give considerable weight to that recommended Guidelines sentence while exercising its discretion in determining the sentence. If the court decides to impose a sentence different than that advised by the Guidelines the court will explain with specificity in writing its reasons as required by the Feeney Amendment.[89] V. Determining Defendant Wilson's Sentence. In light of these principles, the court is now in a position to determine defendant Wilson's sentence. A. Offense Conduct and Criminal History. The court finds the following facts: defendant Wilson robbed three bank tellers at gunpoint. On October 30, 2003, at approximately 9:00 a.m., Wilson ran into the Intermountain Credit Union in Salt Lake City, Utah. He was wearing a hooded mask, a black fleece shirt, dark pants, and white cross-trainer style shoes. He was brandishing what appeared to be a sawed-off shotgun. Wilson leaped onto the teller counter then jumped down behind the counter demanding money. Three tellers were on duty, two behind the teller counter and a third was using a telephone. The defendant pointed his weapon at two of the tellers, demanding they open their money drawers. As they opened their drawers, he stuffed money into his pants pockets and continued to demand more money. After obtaining approximately $13,626, he fled the credit union in a late model 1980s gray or silver sedan. According to the victims, Wilson's hooded mask had unusually large holes for the mouth and eyes. Despite his wearing a mask, the tellers were able to provide detailed descriptions of the defendant's facial features. The tellers were able to approximate the defendant's height at 5 feet 7 inches, and his weight at approximately 160 pounds. Two days later, Wilson was arrested by state authorities for Aggravated Assault after a physical altercation with his girlfriend. During this incident, Wilson allegedly held a sawed-off shotgun to his girlfriend's head as he threatened her. As a similar weapon was used in the robbery, Wilson became a suspect in the robbery. The tellers later identified Wilson as the robber. The police also developed compelling evidence of his guilt, including matching his shoeprints with those left on the teller counter. Police also learned that Wilson was a member of the Black Mafia Gangsters. *927 Wilson ultimately pled guilty to armed bank robbery. The pre-sentence report revealed that Wilson is a five-time felony offender. In 1991, he pled guilty to raping a fourteen-year-old girl in Salt Lake City, Utah. In 1991, he also pled guilty in St. Louis, Missouri, to beating and robbing a victim. And also in 1991, he pled guilty to attempted sexual abuse of a twelve-year-old girl in the same court. While in prison on these charges, he received 78 disciplinary actions and 22 verbal warnings, as well as a misdemeanor conviction for smuggling illegal drugs into the Utah State Prison. After being paroled in 1996, in 1997 he pled guilty in Salt Lake City, Utah, to robbing a victim by simulating the presence of a firearm. Paroled after a year, he absconded from the supervision of the Department of Corrections in 2000, a misdemeanor offense to which he then pled guilty. B. Victim Impact Statement. The court has been made aware of the seriousness of the defendant's current offense through powerful victim impact statements from the three tellers. One of the impact statements will serve to illustrate the devastating consequences of violent crimes such as Wilson's: Your Honor, It is still so difficult for me to talk about this matter, so I appreciate your comprehension on my spell[ing] and construction of the phrases, because the English is not my main language. When I came in from Mexico in 1999 to the United States with my husband, an American citizen, without my children and grandchildren, it was so hard for me. But my goal was to enjoy what this country could offer me and try to do something to help other[s] who may need my help and support, and mainly to help my husband and family in Mexico. I started working and paying taxes, as the government laws, rules and policies are specified, and [to] be a good human being and American resident. When the robbery happened, my life turned 180 degrees and confronted me with the violence of the big cities; I have tried so hard to leave this experience behind me so it would not affect my family, but it did. This part was extremely hurt[ful] for me. Not only the life of my sons, sisters and husband were shocked so badly, but could you imagine the reaction of my 10-year-old grandson, when he knew of the situation? His world is his family: grandparents, parents, aunts, uncles, cousins, etc., besides we have been very close to him. Having [told] him that his "Ita" (nickname for little grandmother) was exposed in an armed robbery was too much for him. Obviously this affected my relationship with my family and the people around me, even though I have tried tenaciously, to not let it happen. I have not been totally successful. I could say sometimes I am still a little paranoid by observing and scrutinizing the customers in my job or the people around [me]. Even when the counseling services were offered to me by the FBI agents, I refused them because I consider myself a brave person, so I will be fighting with this feelings and fears and trying go ahead with my life, avoiding negative thoughts and [] trusting on the good faith of people. I do not know how long it will take me, but I am pretty sure I will get over it, because I have the guidance of the Lord and the love and support of my family. Now I will be glad to tell my grandson that the justice always triumph[s] and the robber will pay for his actions and the most important: HE WON'T HURT *928 ANYMORE PEOPLE or FAMILIES AS HE DID WITH ME AND MY FAMILY. . . . . . If you give me the opportunity to ask you something: please do not leave this criminal to be free to hurt somebody else. Kind regards. [name redacted][90] C. The Appropriate Prison Sentence for Defendant Wilson. As the court understands the parties' positions, both sides agree that the Guidelines range is a level 31. This calculation is derived from a base offense level for robbery of 20,[91] increased by two levels for theft from a financial institution,[92] increased by five levels for brandishing a firearm,[93] and finally increased by one level for loss in excess of $10,000.[94] Wilson's offense level is then increased a further six levels because he is a career offender in light of his extensive criminal history.[95] From this total level of 34, three levels are subtracted for his acceptance of responsibility.[96] The probation office also calculated that Wilson is in criminal history category VI, the highest category. These calculations produce a sentencing range of 188-235 months in prison. The government is recommending the low end of this range — 188 months — in light of Wilson's guilty plea. Wilson argues for a sentence substantially lower than 188 months. For the reasons explained above, the court will, in exercising its discretion, give considerable weight to the recommended Guidelines sentence of no less than 188 months. Having considered all of the purposes of punishment — including the need to impose just punishment, to adequately deter future criminal violations, and to avoid unwarranted disparity in sentencing — the court concludes that the advisory Guidelines sentence is appropriate here. Therefore, the court will impose a sentence of 188 months. The court acknowledges that there is a provision in Wilson's plea agreement that could be interpreted as barring him from taking advantage of the Booker ruling invalidating the Guidelines.[97] Enforcing that provision, however, might create additional litigation about its enforceability. The safest course seems to be to simply not apply that provision against Wilson, and proceed as outlined above. D. Restitution to the Victim Credit Union. The court must also determine whether to order restitution. The pre-sentence report recommends restitution to the credit union of $9,795.15, covering the net loss from the robbery. The court is obligated to award restitution in this amount under the Mandatory Victim Restitution Act (MVRA) because Wilson's crime is a crime of violence.[98] There remains the possibility, however, that Booker *929 renders the MVRA unconstitutional. It could be argued that, like the Guidelines found invalid in Booker, the MVRA requires judicial fact-finding beyond that authorized by the Sixth Amendment. However Booker is not directly controlling on the issue of the constitutionality of the MVRA. Booker focused on the Sentencing Reform Act of 1984, while the MVRA was enacted separately in 1996.[99] Moreover, Booker appears to address only the question of the constitutionality of the Guidelines. While the Guidelines contain their own restitution section,[100] that section is essentially a cross-reference to the statutory provisions of the MVRA. The question of whether the MVRA is constitutional, therefore, was not decided by Booker. Nonetheless, this court has already decided that the Sixth Amendment does not apply to restitution awards under the MVRA. As explained in this court's decision in United States v. Visinaiz,[101] restitution is not a criminal penalty and therefore is not covered by the Sixth Amendment. This conclusion rests on the recognition that restitution is primarily designed to compensate, not punish. The Tenth Circuit has held, for example, that the purpose of restitution "`is not to punish defendants or to provide a windfall for crime victims, but rather to ensure that victims, to the greatest extent possible, are made whole for their losses.'"[102] Similarly, in United States v. Newman,[103] the Seventh Circuit emphasized that "[r]estitution has traditionally been viewed as an equitable device for restoring victims to the position they had occupied prior to a wrongdoer's actions."[104] And even the Supreme Court has noted that the ordinary meaning of restitution is to "restor[e] someone to a position he occupied before a particular event."[105] As explained in Visinaiz, [t]he notion of compensating victims for losses attributable to the defendant's crime is logically and intuitively non-punitive. For example, if a burglar is caught running out of a house with the homeowner's television, we would not say he was "punished" if the police officer took the television and gave it back to its owner. If a bank robber is caught on the bank's front steps, we would not say it is a "penalty" to give the loot bag back to the tellers. Requiring return of the property instead works to prevent a criminal from receiving a windfall by forcing him to disgorge an unjustly obtained benefit. Variations on these fact patterns are simply matters of degree. Thus, even if the burglar or the bank robber have escaped with their stolen property and have even converted it in some way, the return of equivalent value to the homeowner or the bank is better described as compensation to the victim rather than punishment of the criminal.[106] In sum, because restitution is not criminal punishment, it is not subject to the strictures of the Sixth Amendment. *930 Visinaiz also found no basis in history for extending the right to a jury trial to restitution awards. Traditionally, Visinaiz observed, juries did not determine restitution awards.[107] The common law provided, for example, that restitution was a statutory remedy "to be awarded by the justices on a conviction of robbery or larceny."[108] As Visinaiz noted, "[t]his common law rule was recognized by the Supreme Court in 1842 in United States v. Murphy: The statute of 21 Hen. VIII., c. 2, gave full restitution of the property taken, after the conviction of an offender, of robbery. The writ of restitution was to be granted by the justices of the assize...."[109] This rule, moreover, "was retained in several state statutes in the early years of the Republic."[110] Pennsylvania's petit larceny statute provided, for example, that ... if any person or persons shall hereafter feloniously steal, take and carry away any goods, or chattels under the value of twenty shillings ... being thereof legally convicted, shall be deemed guilty of petty larceny, and shall restore the goods and chattels so stolen or pay the full value thereof to the owner or owners thereof ....[111] "Forcible entry and detainer," Visinaiz continued, was another "crime in which it was common to encounter provision of a restitutionary remedy at common law."[112] So, for example, "[u]pon conviction by a jury of forcible entry and detainer ... Blackstone's Commentaries explains that `besides the fine on the offender, the justices shall make restitution by the sheriff of the possession ....'"[113] In fact, "[m]any states early on criminalized forcible entry upon and detainer of land, and often these statutes authorized the judge to order restitution and the payment of damages upon conviction."[114] Based on these and other historical precedents discussed in Visinaiz, there is no reason for believing that the Sixth Amendment requires jury fact-finding in restitution awards. Visinaiz, however, was decided before yesterday's decision in Booker. Does Booker cast any doubt on the reasoning of Visinaiz? In the court's view, nothing in Booker undercuts Visinaiz. Like the earlier decisions *931 on which it is based, Booker focuses on the unfairness of judicial fact-finding undergirding a longer prison sentence for a criminal defendant. In Booker, for example, the defendant received an additional eight years in prison because of the quantity of cocaine involved in his offense.[115] Moreover, the reasoning of Booker rests on findings of fact essential to "punishment."[116] The Court nowhere indicates what is considered to be "punishment." For all the reasons explained above, restitution should not now be considered punishment and historically never has been considered punishment; it therefore lies outside the Sixth Amendment's jury requirements. Because the provisions of the MVRA are constitutional in the wake of Booker, the court orders defendant Wilson to pay restitution to the victim credit union in the amount of $9,795.15. As explained by this court in its opinion in United States v. Bedonie, this amount is due immediately, payable on a schedule.[117] The court sets a schedule of $25 per quarter while in prison and $100 per month upon release. E. No Continuance of the Proceedings. The court has hastened to produce an opinion on all of these subjects because they will recur in a large number of cases here and perhaps in other courts as well. The court is also reluctant to delay the sentencing in this matter to ponder over the meaning of Booker. The Wilson sentencing has already been delayed more than a month. As noted above, defendant Wilson's crimes are extremely serious and have caused considerable trauma and anxiety to his victims. Congress has recently mandated that victims have the right "to proceedings free from unreasonable delay."[118] The court sees no reason for delay. At the same time, however, the court realizes that its opinion may touch on subjects about Booker that the parties wish to brief. Accordingly, the court will hold the judgment in this matter in abeyance for ten days to give either side an opportunity to file any objection to any of the conclusions in this opinion. CONCLUSION It may be appropriate to offer a concluding observation. The court has determined that it will generally hew to the Guidelines in imposing criminal punishments. No doubt, some criminal defendants will be disappointed by this result. Yet in the long run, such an approach may be the best way to develop a fair and consistent sentencing scheme around the country for the benefit of defendants, victims, and the public. As Booker itself recognized, the judiciary's view on how to proceed "of course, is not the last word: The ball now lies in Congress' court. The National Legislature is equipped to devise and install, long-term, the sentencing system compatible with the Constitution, that Congress judges best for the federal system of justice."[119] The congressional view of how to structure that sentencing system will surely be informed by how judges respond to their newly-granted freedom under the "advisory" Guidelines system. *932 If that discretion is exercised responsibly, Congress may be inclined to give judges greater flexibility under a new sentencing system. On the other hand, if that discretion is abused by sentences that thwart congressional objectives, Congress has ample power to respond with mandatory minimum sentences and the like. The preferable course today is to faithfully implement the congressional purposes underlying the Sentencing Reform Act by following the Guidelines in all but unusual cases. Accordingly, the defendant is sentenced to a term of 188 months in prison — the term the Guidelines prescribe. The defendant is also ordered to pay restitution of $9,795.15 to the credit union he robbed. The judgment will be held in abeyance for ten days to allow briefing on these conclusions from either side. SO ORDERED. NOTES [1] United States v. Booker, ___ U.S. ___, 125 S.Ct. 738, ___ L.Ed.2d ___, 2005 WL 50108 (2005). [2] 18 U.S.C. § 3551 et seq. [3] Booker, ___ U.S. at ___, 125 S.Ct. at 757, 2005 WL 50108, at *16. [4] 18 U.S.C. § 3551(b)(3) (emphasis added). [5] Booker, ___ U.S. at ___, 125 S.Ct. at 757, 2005 WL 50108, at *16. [6] Id. [7] Booker, ___ U.S. at ___, 125 S.Ct. at 764, 2005 WL 50108, at *24. [8] 18 U.S.C. § 3553(a)(2)(B) & (C). [9] 18 U.S.C. § 3553(a)(6). [10] See, e.g., United States v. Croxford, 324 F.Supp.2d 1230 (D.Utah 2004); United States v. Schaefer, 384 F.3d 326, 330 (7th Cir.2004); United States v. Mueffleman, 327 F.Supp.2d 79 (D.Mass.2004); United States v. Medas, 323 F.Supp.2d 436 (E.D.N.Y.2004); United States v. Shamblin, 323 F.Supp.2d 757 (S.D.W.Va.2004). [11] Booker, ___ U.S. at ___, 125 S.Ct. at 767, 2005 WL 50108, at *27 (emphasis added). [12] 18 U.S.C. § 3553(a)(4). [13] Booker, ___ U.S. at ___, 125 S.Ct. at 757, 2005 WL 50108, at *16 (emphasis added). [14] Id. at ___ U.S. at ___, 125 S.Ct. at 764, 2005 WL 50108, *24 (internal quotations omitted). [15] Id. [16] Id. [17] Booker, ___ U.S. at ___, 125 S.Ct. at 767, 2005 WL 50108, at *27 (emphasis added). [18] Booker, ___ U.S. at ___, 125 S.Ct. at 789, 2005 WL 50108, at *47 (Scalia, J. dissenting). [19] 18 U.S.C. § 2113(a) & (d). [20] 18 U.S.C. § 3553(a) (emphases added). [21] 18 U.S.C. § 3553(a)(2). [22] See 28 U.S.C. § 991. [23] Booker, ___ U.S. at ___, 125 S.Ct. at 766, 2005 WL 50108, at *26. [24] 28 U.S.C. § 994(p). [25] See, e.g., PUB. L. 107-273, Div. C, Title I, § 11009(d), Nov. 2, 2002, 116 Stat. 1819 (sense of the Congress that a two-level enhancement should be required where the defendant used body armor); PUB. L. 107-56, Title VIII, § 814(f), Oct. 26, 2001, 115 Stat. 384 (directing Commission to amend Guidelines on computer fraud); PUB. L. 106-310, Div. B, Title XXXVI, § 3651, Oct. 17, 2000, 1143 Stat. 1238 (directing Commission to increase penalties for distributing ephedrine); PUB. L. 105-172, § 2(e), Apr. 24, 1998, 112 Stat. 55 (directing Commission to increase penalties for cloning wireless telephones); PUB. L. 104-237, Title II, § 301, Oct. 3, 1996, 110 Stat. 3102 (directing Commission to amend the Guidelines to increase penalties for distributing methamphetamine; PUB. L. 103-322, Title IV, § 40112, Sept. 13 1994, 108 Stat.1903) (directing Commission to review disparities between sentences for various sex offenses); PUB. L. 100-690, Title VI, § 6482(c), Nov. 18, 1988, 102 Stat. 4382 (directing Commission to increase penalties for operation of common carrier under the influence of alcohol). [26] PUB. L. 108-21, Title IV, § 401(j) Apr. 30, 2003, 117 Stat. 673 (changing departure standards for child sex offenses). [27] Brief of Amici Curiae, United States v. Booker at 2, 4. [28] See generally United States v. Van Leer, 270 F.Supp.2d 1318 (D.Utah 2003). [29] 149 CONG. REC. H3061 (Mar. 27, 2003) (statement of Rep. Feeney). [30] Id. [31] 18 U.S.C. § 3553(c) (emphasis added). [32] See generally, Paul G. Cassell, Too Severe?: A Defense of the Federal Sentencing Guidelines (and a Critique of Federal Mandatory Minimums), STAN. L. REV. 1017 (2004). [33] 18 U.S.C. § 3553(a). [34] S. Rep. 98-225, 1984 U.S.C.C.A.N. 3182, 3258-59. [35] Id. at 92-93, tbl. 5.5 (comparing Guidelines sentence with median sentence from sample). [36] Id. at 208. [37] Id. at 99. [38] Id. [39] 18 U.S.C. § 3553(a)(2). [40] 18 U.S.C. § 3553(a)(2)(B) & (C). [41] U.S. Dept. of Justice, Bureau of Justice Statistics, National Crime Victimization Survey, Violent Crime Trends, 1973-2002, available at www.ojp.usdoj.gov/bjs. [42] Steven D. Levitt, Understanding Why Crime Fell in the 1990s: Four Factors That Expalin the Decline and Seven That Do Not, 18 J. ECON. PERSPECTIVES 163 (2004). [43] Joanna M. Shepherd, Police, Prosecutors, Criminals and Determinate Sentencing: The Truth about Truth-in-Sentencing Laws, 45 J.L. & ECON. 509 (2002). [44] Peter W. Greenwood et al., Three Strikes and You're Out: Estimated Benefits and Costs of California's New Mandatory-Sentencing Law, in THREE STRIKES AND YOU'RE OUT: VENGEANCE AS PUBLIC POLICY 543 (David Schichor & Dale K. Sechrest eds.1996); Joanna M. Shepherd, Fear of the First Strike: The Full Deterrent Effect of California's Two- and Three-Strikes Legislation, 31 J. LEGAL STUD. 159 (2002). [45] Here I draw on the helpful analysis of the studies found in John J. Donohue III & Peter Siegelman, Allocating Resources Among Prisons and Social Programs in the Battle Against Crime, 27 J. LEGAL STUD. 1, 12-14 (1998). [46] James Q. Wilson, Prisons in a Free Society, 117 PUB. INTEREST 37, 38 (Fall 1994). [47] Thomas Marvell & Carlisle Moody, Prison Population Growth and Crime Reduction, 10 J. QUANTITATIVE CRIMINOL. 109 (1994). [48] U.S. DEPT. OF JUSTICE, NAT'L INST. OF JUSTICE, VICTIM COSTS AND CONSEQUENCES: A NEW LOOK (1996). [49] Id. at 9. [50] Id. at 17. [51] David A. Anderson, The Aggregate Burden of Crime, 42 J.L. & ECON. 611 (1999). [52] Booker, ___ U.S. at ___, 125 S.Ct. at 767, 2005 WL 50108, at *27. [53] See e.g., Bush v. Lucas, 462 U.S. 367, 389, 103 S.Ct. 2404, 76 L.Ed.2d 648 (1983). [54] 18 U.S.C. § 3553(a)(2)(D). [55] See U.S.S.G. § 1A1.1 (policy statement). Cf. Marc Miller, Purposes at Sentencing, 66 S. CAL. L. REV. 413 (1992) (arguing that Commission should have delineated its analysis further). [56] 28 U.S.C. § 924(k). [57] S. Rep. 98-225, 1984 U.S.C.A.N. 3182, 3259 n. 288. [58] S. Rep. 98-225, 1984 U.S.C.A.N. 3182, 3224. [59] See, e.g., Mueffelman, 327 F.Supp.2d at 96 ("Plainly there is a problem with reinstituting an indeterminate system, when there is no longer parole."). [60] Ian Weinstein & Nathaniel Z. Marmur, Federal Sentencing During the Interregnum: Defense Practice as the Blakely Dust Settles, 17 FED. SENT. R. 51, 2004 WL 2566155, at *4 (Oct.2004). [61] See Booker, ___ U.S. at ___, 125 S.Ct. at 757, 2005 WL 50108, at *16. [62] 18 U.S.C. 3553(a) (emphasis added). [63] See http://sentencing.typepad.com/sentencing_law_and_policy (Jan. 12, 2005) (The Power of Parsimony (and Justice Breyer's Notable Omission)) (Prof. Douglas Berman tentatively advancing this suggestion). [64] Marc L. Miller & Ronald F. Wright, Your Cheatin' Heart(land): The Long Search for Administrative Sentencing Justice, 2 BUFF. CRIM. L. REV. 723, 810 n. 57 (1999). [65] See NORVAL MORRIS, THE FUTURE OF IMPRISONMENT 60-62 (1974). [66] See JEREMY BENTHAM, OF THE INFLUENCE OF TIME AND PLACE IN MATTERS OF LEGISLATION (1843) (presenting utilitarian theory of punishment that rests on the idea of no unnecessary punishment). [67] See also, H.R. Conf. Rep. 98-1159, 1984 U.S.C.C.A.N. 3710; H.R. Conf. Rep. 98-1159, 1984 U.S.C.C.A.N. 3710, 3711; see generally, Miller & Wright, supra., 2 BUFF. CRIM. L. REV. at 744. [68] Id.; cf. United States v. Davern, 970 F.2d 1490, 1498 (6th Cir. en banc)(finding parsimony provision of limited significance). [69] Id. at 746-47. [70] 18 U.S.C. § 3553(a) (emphasis added). [71] See 28 U.S.C. § 994(b)(1) (Guidelines shall comply with all "pertinent provisions" of Title 18.). [72] See Marc L. Miller, Domination and Dissatisfaction: Prosecutors as Sentencers, 56 STAN. L. REV. 1211, 1269 n. 9 (2004). [73] See Frank O. Bowman, III, Fear of Law: Thoughts on Fear of Judging and the State of the Federal Sentencing Guidelines, 44 ST. LOUIS L. REV. 299, 338 (2000) (about 80% of all drug offenders sentenced at or below the Guidelines minimum and about an addition 10% sentenced in the lower half of the range). [74] Brief of Amici Curiae, United States v. Booker at 3. [75] Booker, ___ U.S. at ___, 125 S.Ct. at 759, 2005 WL 50108, at *19. [76] Id. at ___ U.S. at ___, 125 S.Ct. at 760, 2005 WL 50108, *20. [77] Brief of Amici Curiae, United States v. Booker at 16 (internal citations omitted). [78] 18 U.S.C. § 3553(a)(6). [79] Blakely v. Washington, ___ U.S. ___, ___, 124 S.Ct. 2531, 2533, 159 L.Ed.2d 403 (2004) (Breyer, J., dissenting). See generally Stephen Breyer, The Federal Sentencing Guidelines and Key Compromises Upon Which They Rest, 17 HOFSTRA L.REV. 1 (1988). [80] Brief of Amici Curiae, United States v. Booker at 4. [81] See U.S. SENTENCING COMMISSION, SURVEY OF ARTICLE III JUDGES ON THE FEDERAL SENTENCING GUIDELINES (March 2003) (finding that approximately 38.4% of responding district court judges reported that the Guidelines' attained a "higher achievement," 38.6% reported "middle achievement," and 22.9% reported "lower achievement"). [82] Booker, ___ U.S. at ___, 125 S.Ct. at 757, 2005 WL 50108, at * 16. [83] See Fed. R. Crim. P. 32. [84] 18 U.S.C. § 3742(a)(2) (appeal by defendant); 18 U.S.C. § 3742(b) (appeal by government). [85] Cf. Booker, ___ U.S. at ___, 125 S.Ct. at 793, 2005 WL 50108, at *49 (Scalia, J., dissenting) (arguing that appeals under Booker are out of "Wonderland") [86] U.S.S.G. § 5K2.0 [87] U.S.S.G. § 5K2.8. [88] U.S.S.G. § 5K2.13. [89] 18 U.S.C. § 3553(c). [90] Victim Impact Statement of Bank Teller, Attachment 2 to P.S.R. (punctuation edited for clarity). [91] U.S.S.G. § 2B3.1. [92] U.S.S.G. § 2B3.1(b)(1). [93] U.S.S.G. § 2B3.1(b)(2)(A). [94] U.S.S.G. § 2B3.1(b)(7)(B). [95] U.S.S.G. § 4B1.1. [96] U.S.S.G. § 3E1.1. [97] See Statement in Advance of Plea, ¶ 4 (attempted Blakely "waiver"). [98] 18 U.S.C. § 3663A. [99] See PUB. L. 104-132, Title II, § 204(a), Apr. 24, 1996, 110 Stat. 1227. [100] See U.S.S.G. § 5E1.1. [101] 344 F.Supp.2d 1310, 1314 (D.Utah 2004). [102] United States v. Nichols, 169 F.3d 1255, 1279 (10th Cir.1999)(quoting United States v. Arutunoff, 1 F.3d at 1121). [103] 144 F.3d 531 (7th Cir.1998). [104] Id. at 538. [105] Hughey v. United States, 495 U.S. 411, 416, 110 S.Ct. 1979, 109 L.Ed.2d 408 (1990). [106] 344 F.Supp.2d at 1316. [107] 344 F.Supp.2d at 1323-25. [108] 16 C.J.S. Criminal Law § 3255 (1918) (citing 21 Hen. VIII c 11; 7 & 8 Geo. IV c 29 § 57) (emphasis added). [109] 344 F.Supp.2d at 1323 (quoting U.S. v. Murphy, 41 U.S. 203, 206, 16 Pet. 203, 10 L.Ed. 937 (1842)). [110] Id. (citing Act of September 15, 1786 (12 St.L. 282-283 Ch. 1241 (Penn.))); Ross v. Bruce, 1 Day 100 (Conn.1803) (citing state statute 413 authorizing "treble damages" for theft); Commonwealth v. Andrews, 2 Mass. 14, 24, 1806 WL 735, *7 (Mass.1806) (citing larceny act of March 15, 1785, authorizing award of treble the value of goods stolen to the owner upon conviction). [111] Act of September 15, 1786 (12 St. L., 282-283 Ch. 1241, (Penn.)). [112] 344 F.Supp.2d at 1324.. [113] Id. (quoting 4 BLACKSTONE COMM. p. 117 (2001 Mod. Engl. ed. of the 9th ed. of 1793)). [114] Id. (citing Allen v. Ormsby, 1 Tyl. 345 (Vt.1802)) (citing sec. 5 of the forcible entry and detainer act of February 27, 1797); Crane v. Dod, 2 N.J.L. 340 (N.J.1808) (citing sec. 13 of the state's forcible entry and detainer act providing for an award of "treble costs"); People ex rel. Corless v. Anthony, 4 Johns. 198 (N.Y.Sup.1809) (citing St. 11th Sess. c. 6, forcible entry and detainer statute authorizing an award of restitution and damages to the aggrieved party). But see Commonwealth v. Stoever, 1 Serg. & Rawle 480 (Pa.1815) (no damages allowed under state's forcible entry and detainer statute). [115] Booker, ___ U.S. at ___, 125 S.Ct. at 745, 2005 WL 50108, at *4. [116] Id. at ___ U.S. at ___, 125 S.Ct. at 749, 2005 WL 50108, *8 (recounting Blakely decision). [117] 317 F.Supp.2d 1285, 1329 (D.Utah 2004) (appeal pending). [118] 18 U.S.C. § 3771(a)(7). [119] Booker, ___ U.S. at ___, 125 S.Ct. at 768, 2005 WL 50108, at *28.
Q: HttpURLConnection Only raw data in localhost The java code insert raw data into test.php, but it only works with localhost url, and don't with public ip My urls, //this URL work perfect, output: {"a":"b"} phpOK postJSON("http://192.168.1.100/test.php?username=user&password=pass"); //this URL don't work, output: phpOK postJSON("http://myddns.net/test.php?username=user&password=pass"); Code to send data, public String postJSON(String URL, String jsonStr) { StrictMode.ThreadPolicy policy = new StrictMode.ThreadPolicy.Builder().permitAll().build(); StrictMode.setThreadPolicy(policy); HttpURLConnection urlConnection = null; StringBuffer response = null; try { URL url = new URL(URL); urlConnection = (HttpURLConnection) url.openConnection(); urlConnection.setRequestProperty("Content-Type", "application/json"); urlConnection.setRequestMethod("POST"); urlConnection.setFixedLengthStreamingMode(jsonStr.getBytes().length); urlConnection.setConnectTimeout(5000); urlConnection.setReadTimeout(5000); urlConnection.setUseCaches(false); urlConnection.setDoOutput(true); urlConnection.setDoInput(true); urlConnection.connect(); JSONObject jsonStr= new JSONObject(); jsonStr.put("a", "b"); DataOutputStream printout = new DataOutputStream(urlConnection.getOutputStream()); printout.writeBytes(jsonStr); printout.flush(); printout.close(); //if(urlConnection.getResponseCode() == HttpURLConnection.HTTP_OK) { InputStream is = urlConnection.getInputStream(); BufferedReader br = new BufferedReader(new InputStreamReader(is)); String inputLine; response = new StringBuffer(); while ((inputLine = br.readLine()) != null) { response.append(inputLine); } br.close(); } finally { if(urlConnection != null) urlConnection.disconnect(); if(response != null) return response.toString(); else return ""; } } My PHP, //in test.php <?php $phpInput = file_get_contents('php://input'); echo $phpInput." phpOK"; if(isset($_GET['username']) & isset($_GET['password'])) echo "extra vars catched" ?> I test in a real phone using 3G data and... My server is blocking in some way the public ip, because when I use the local ip it's work perfect. Blocking the writing output stream: urlConnection.getOutputStream() A: I found the problem: The problem is my record type of DDNS. I config my ddns with record type URL, protocol HTTP:// and IP X.X.X.X:1994 I change to record type DNS Host (A), IPv4 Address: myip only X.X.X.X , without port. In my URL client, I set the port in the URL. I change the record type of my DDNS and, http://myddns.net/test.php?username=user&password=pass to this: http://myddns.net:1994/test.php?username=user&password=pass
Pantheon to be robed, say organizers Reed students dress as Greek gods outside humanities lecture in 2012. Nudity at a similar event in 2013 prompted a Title IX investigation. Copyright Reed College. The students who play the part of Greek gods and greet freshmen on their way to the first humanities lecture—collectively known as the Pantheon—will keep their robes on next fall, organizers declared at a community forum held by the Honor Council last week. “No one will be naked next year,” said environmental studies major Elaine Andersen ’16, one of the HumPlayers, the student group that puts on the Pantheon. The event, which has been staged for the last five years, typically involves male and female sophomores and upperclassmen who dress up as Greek divinities on the steps of Vollum Lecture Hall and welcome freshmen to their first Hum 110 lecture. The gods ask for libations, and freshmen respond (if they’ve done their homework) by spilling a few drops of coffee or water on the ground, re-enacting an ancient Homeric tradition. “It’s supposed to be fun and silly,” one student explained. This year, however, some of the participants in the Pantheon, both men and women, were naked and engaged in rowdy behavior, standing at the main entrance to Vollum and demanding libations in loud and insistent tones. A member of the Reed community subsequently filed a Title IX complaint with the college, attracting attention in the media and leading to a campus debate on the propriety of disrobing in public. At last week’s forum, several students voiced unhappiness with the way the Pantheon was conducted. “I was disappointed in this year’s event,” said linguistics major Dean Schmeltz ’14, a former HumPlay director. “And I would have disappointed in it with or without clothes.” The spirit of the occasion, he said, was to welcome freshmen into the community and wish them luck on their voyage through the Humanities syllabus, not to confront, impede, or intimidate them. One of the current HumPlayers agreed that this year’s Pantheon was too confrontational. “We were acting more aggressive than we should have,” he told the forum. Other students suggested that it was the combination of nudity and loud, demonstrative behavior that created an intimidating atmosphere, not the nudity itself. Some students asked if a more appropriate response would have been for the aggrieved parties to pursue resolution through the Honor Principle rather than file a Title IX complaint. Dean of Students Mike Brody emphasized that the Honor Principle and Title IX both require members of the Reed community to consider the impact of their behavior on others. He also said that the judicial machinery associated with the Honor Principle—the Honor Council, the J-Board, and the Sexual Misconduct Board—could be engaged to resolve a Title IX complaint. The HumPlayers (who also stage a show known as the HumPlay at the end of the semester) are now working on a handbook to guide future directors on staging friendlier performances. “The Title IX complaint wasn't about nudity at Reed in general,” Schmeltz later wrote in a Facebook post. “It was about a particular HumPlay event that was poorly managed. This was a very bad year for a tradition that has gone very well in the past, and there are things that we can and will do to make sure the Pantheon is truly welcoming in the future.”
<?php /** * Controller generated using LaraAdmin * Help: http://laraadmin.com */ namespace App\Http\Controllers\LA; use App\Http\Controllers\Controller; use Illuminate\Http\Request; use App\Http\Requests; use Auth; use DB; use Validator; use Datatables; use Collective\Html\FormFacade as Form; use Dwij\Laraadmin\Models\Module; use Dwij\Laraadmin\Models\ModuleFields; use App\Models\Contact; class ContactsController extends Controller { public $show_action = true; /** * Display a listing of the Contacts. * * @return \Illuminate\Http\Response */ public function index() { $module = Module::get('Contacts'); if(Module::hasAccess($module->id)) { return View('la.contacts.index', [ 'show_actions' => $this->show_action, 'listing_cols' => Module::getListingColumns('Contacts'), 'module' => $module ]); } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Show the form for creating a new contact. * * @return \Illuminate\Http\Response */ public function create() { // } /** * Store a newly created contact in database. * * @param \Illuminate\Http\Request $request * @return \Illuminate\Http\Response */ public function store(Request $request) { if(Module::hasAccess("Contacts", "create")) { $rules = Module::validateRules("Contacts", $request); $validator = Validator::make($request->all(), $rules); if ($validator->fails()) { return redirect()->back()->withErrors($validator)->withInput(); } $insert_id = Module::insert("Contacts", $request); return redirect()->route(config('laraadmin.adminRoute') . '.contacts.index'); } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Display the specified contact. * * @param int $id * @return \Illuminate\Http\Response */ public function show($id) { if(Module::hasAccess("Contacts", "view")) { $contact = Contact::find($id); if(isset($contact->id)) { $module = Module::get('Contacts'); $module->row = $contact; return view('la.contacts.show', [ 'module' => $module, 'view_col' => $module->view_col, 'no_header' => true, 'no_padding' => "no-padding" ])->with('contact', $contact); } else { return view('errors.404', [ 'record_id' => $id, 'record_name' => ucfirst("contact"), ]); } } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Show the form for editing the specified contact. * * @param int $id * @return \Illuminate\Http\Response */ public function edit($id) { if(Module::hasAccess("Contacts", "edit")) { $contact = Contact::find($id); if(isset($contact->id)) { $module = Module::get('Contacts'); $module->row = $contact; return view('la.contacts.edit', [ 'module' => $module, 'view_col' => $module->view_col, ])->with('contact', $contact); } else { return view('errors.404', [ 'record_id' => $id, 'record_name' => ucfirst("contact"), ]); } } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Update the specified contact in storage. * * @param \Illuminate\Http\Request $request * @param int $id * @return \Illuminate\Http\Response */ public function update(Request $request, $id) { if(Module::hasAccess("Contacts", "edit")) { $rules = Module::validateRules("Contacts", $request, true); $validator = Validator::make($request->all(), $rules); if ($validator->fails()) { return redirect()->back()->withErrors($validator)->withInput();; } $insert_id = Module::updateRow("Contacts", $request, $id); return redirect()->route(config('laraadmin.adminRoute') . '.contacts.index'); } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Remove the specified contact from storage. * * @param int $id * @return \Illuminate\Http\Response */ public function destroy($id) { if(Module::hasAccess("Contacts", "delete")) { Contact::find($id)->delete(); // Redirecting to index() method return redirect()->route(config('laraadmin.adminRoute') . '.contacts.index'); } else { return redirect(config('laraadmin.adminRoute')."/"); } } /** * Datatable Ajax fetch * * @return */ public function dtajax(Request $request) { $module = Module::get('Contacts'); $listing_cols = Module::getListingColumns('Contacts'); if(isset($request->filter_column)) { $values = DB::table('contacts')->select($listing_cols)->whereNull('deleted_at')->where($request->filter_column, $request->filter_column_value); } else { $values = DB::table('contacts')->select($listing_cols)->whereNull('deleted_at'); } $out = Datatables::of($values)->make(); $data = $out->getData(); $fields_popup = ModuleFields::getModuleFields('Contacts'); for($i=0; $i < count($data->data); $i++) { for ($j=0; $j < count($listing_cols); $j++) { $col = $listing_cols[$j]; if($fields_popup[$col] != null && starts_with($fields_popup[$col]->popup_vals, "@")) { $data->data[$i][$j] = ModuleFields::getFieldValue($fields_popup[$col], $data->data[$i][$j]); } if($col == $module->view_col) { $data->data[$i][$j] = '<a href="'.url(config('laraadmin.adminRoute') . '/contacts/'.$data->data[$i][0]).'">'.$data->data[$i][$j].'</a>'; } // else if($col == "author") { // $data->data[$i][$j]; // } } if($this->show_action) { $output = ''; if(Module::hasAccess("Contacts", "edit")) { $output .= '<a href="'.url(config('laraadmin.adminRoute') . '/contacts/'.$data->data[$i][0].'/edit').'" class="btn btn-warning btn-xs" style="display:inline;padding:2px 5px 3px 5px;"><i class="fa fa-edit"></i></a>'; } if(Module::hasAccess("Contacts", "delete")) { $output .= Form::open(['route' => [config('laraadmin.adminRoute') . '.contacts.destroy', $data->data[$i][0]], 'method' => 'delete', 'style'=>'display:inline']); $output .= ' <button class="btn btn-danger btn-xs" type="submit"><i class="fa fa-times"></i></button>'; $output .= Form::close(); } $data->data[$i][] = (string)$output; } } $out->setData($data); return $out; } }
AN ENTIRE DIGITAL MARKETING TEAM IN ONE PACKAGE AN ENTIRE DIGITAL MARKETING TEAM IN ONE PACKAGE We'll send you updates and monthly reports. It's one thing to be told your small business is succeeding, but it's another to be shown. Every month, your digital marketing specialist will send you detailed reports on your digital marketing campaign's progress and go over them with you. That means you'll have the numbers to back up our results. Featured In Get Found Online Getting found is an important first step to improving your online presence. Fill out the form below, and one of our team members will contact you shortly to talk about your business. First Name* Business Name* Phone Number* Business Zip Code* Email* Email This field is for validation purposes and should be left unchanged. Take Your Business to the Next Level Fill out the form below, and one of our team members will contact you shortly to talk about your business. Service Is Important to Us Fill out the form below, and one of our team members will contact you shortly to talk about your business. Finally. A Marketing Plan That Works for You. Request a demo to see how we can help your business get found online and attract customers, so you can focus on making your business thrive. You’ll see how we can help you manage your website, improve your search engine rankings, target your ideal customers and protect your brand - because running your business is just as important as helping it grow.
The surgical management of facial nerve injury. Treatment of facial nerve injuries depends upon a detailed understanding of its anatomic course, accurate clinical examination, and timely and appropriate diagnostic studies. Reconstruction depends upon the extent of injury, the availability of the proximal stump. and the time since injury and duration of muscle denervation. Although no alternative is perfect, these techniques, in combination with static and ancillary procedures. can protect the eye, prevent drooling, restore the smile, and improve facial symmetry. New techniques (including single-stage free tissue transfers and bioengineered nerve grafts), further research on the characteristics of the facial musculature, and methods of preserving the neuromuscular junction will undoubtedly manifest themselves as further refinements of established surgical techniques.
HIGHGROVE ESTATE Wine In the North Willamette Valley, we are proud to join the growing group of Oregon’s small, sustainable winemakers. With the perfect blend of elevation, soil and clonal selection, we are poised to produce the best Pinots - Noir, Gris and Rosé. We strive to be sustainable in our practices, a valuable member of the community and embrace the beauty of life. We hope you will enjoy our wine with your family and friends!
Sunday, June 10, 2012 "I've got some good news and some bad news" the doctor says. "What's the bad news," asked the patient? "The bad news is that unfortunately you've only got 3 months to live." The patient is taken back, "What's the good news then Doctor?" The doctor points over to the secretary at the front desk, "You see that blonde with the big breasts, tight ass and legs that go all the way up to heaven?" The patient shakes his head and the doctor replies, "I'm doing her." Months after military medics from New Mexico made the brave decision to pull a live explosive out of a young Marine, the guardsmen shared their story. A crew of New Mexico National Guardsmen, well-practiced in medevacking wounded troops off the battlefield in Afghanistan, made a decision that few can fathom. "Each of us on the aircraft had to agree to take the patient on," Spc. Mark Edens said. Their patient, Lance Cpl. Winder Perez, had a foot-long rocket-propelled grenade embedded in his left side. It could have exploded at any time. "There was quite a bit of alarm among the crew at the time, as you can imagine," Capt. Kevin Doo said. Perez needed to be flown to the nearest medical unit, which was around 65 miles away. "If the RPG exploded, you know Spc. Edens and Sgt. Hardesty are working on the patient directly over him, shrapnel alone would have been devastating. And about 18 inches behind where the patient is lying is over 300 gallons of jet aviation fuel and it would have been catastrophic," Doo said. When the chopper landed, a Navy trauma nurse ordered his staff to stay away. The young Marine was still fully conscious. "I took him by the hand he said, 'Where is everybody?' and I said, 'You have an RPG in your leg and everybody is staying away from you. I promise you I will not leave you until that thing is out of your leg,'" Lt. Cmdr. James Gennari said. Rescue crews were able to get the live round out of the young Marine. He's still recovering in a Washington D.C. hospital.
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA,  No. 03-10699 Plaintiff-Appellee, v.  D.C. No. CR-02-00411-ACK RICK K. VO, OPINION Defendant-Appellant.  Appeal from the United States District Court for the District of Hawaii Alan C. Kay, District Judge, Presiding Argued and Submitted November 4, 2004—Honolulu, Hawaii Filed June 27, 2005 Before: Robert R. Beezer, Susan P. Graber, and Jay S. Bybee, Circuit Judges. Opinion by Judge Bybee 7627 UNITED STATES v. VO 7629 COUNSEL Peter C. Wolff, Jr., Federal Public Defender, and Michael A. Weight, Assistant Federal Public Defender, Honolulu, Hawaii, for the defendant-appellant. 7630 UNITED STATES v. VO Edward H. Kubo, Jr., United States Attorney, and Thomas Muehleck, Assistant United States Attorney, Honolulu, Hawaii, for the plaintiff-appellee. OPINION BYBEE, Circuit Judge: Petitioner Rick Vo (“Vo”) and his wife Brenda (“Brenda”) were indicted for conspiring to possess more than fifty grams of methamphetamine with intent to distribute and for aiding and abetting each other in the possession of more than fifty grams of methamphetamine with intent to distribute. See 8 U.S.C. § 841(a)(1); 21 U.S.C. § 846. The Vos were arrested after an employee of Mail Boxes, Etc., notified the Federal Bureau of Investigation (“FBI”) that a suspicious package had been dropped off for shipment to California by Federal Express. The shipping label stated that the shipment contained hair products and makeup, and the employee opened the box pursuant to store policy to ensure that it did not contain any aerosol products. Realizing that the package was suspicious (because it did not contain hair products but rather contained fifteen pounds of an unknown substance), the store clerk noti- fied the FBI, and the FBI obtained a search warrant from a federal magistrate judge. The FBI discovered four gallon sized bags of a substance testing positive for methamphet- amine. The Vos were arraigned and indicted in October 2002 for charges stemming from the methamphetamine possession. In April 2003, Brenda pleaded guilty to conspiracy. A jury convicted Rick Vo in May 2003 on one count, aiding and abetting possession with intent to distribute methamphetamine in violation of 21 U.S.C. § 841(a)(1) and 18 U.S.C. § 2. Vo raises three claims on appeal. First, Vo claims that the district court erred by denying his Speedy Trial Act motion to dismiss under 18 U.S.C. § 3161, because more than seventy UNITED STATES v. VO 7631 days elapsed between the filing of the government’s indict- ment and Vo’s trial. Second, Vo claims that the district court erred by allowing Brenda, his wife, to testify about marital communications in violation of his marital communications privilege. Third, Vo argues that the district court erred in admitting evidence of a thirteen-year-old drug conviction in violation of Federal Rules of Evidence 401, 402, 403, and 404(b). Finding no error, we affirm the conviction. Vo also submitted a Rule 28(j) letter regarding the upward enhance- ment of his sentence under the federal sentencing guidelines by the district court. Because Vo did not challenge his sen- tence on Sixth Amendment grounds in the district court, we grant a limited remand pursuant to United States v. Ameline, No. 02-30326, 2005 WL 1291977, at *11 (9th Cir. June 1, 2005) (en banc). I. SPEEDY TRIAL ACT [1] The Speedy Trial Act provides: In any case in which a plea of not guilty is entered, the trial of a defendant charged in an information or indictment with the commission of an offense shall commence within seventy days from the filing date (and making public) of the information or indict- ment, or from the date the defendant has appeared before a judicial officer of the court in which such charge is pending, whichever date last occurs. 18 U.S.C. § 3161(c)(1) (2004). The Act provides that certain “periods of delay shall be excluded . . . in computing the time within which the trial of any such offense must commence.” 18 U.S.C. § 3161(h). The list of excludable delays includes “delay resulting from any pretrial motion, from the filing of the motion through the conclusion of the hearing on, or other prompt disposition of, such motion.” 18 U.S.C. § 3161(h) (1)(F); see, e.g., United States v. Springer, 51 F.3d 861, 865 (9th Cir. 1995) (motion in limine); United States v. Wirsing, 7632 UNITED STATES v. VO 867 F.2d 1227, 1231 (9th Cir. 1989) (motion to detain a defendant in pretrial confinement). “Congress intended sub- section (F) to exclude from the Speedy Trial Act’s 70-day limitation all time between the filing of a motion and the con- clusion of the hearing on that motion, whether or not a delay in holding that hearing is ‘reasonably necessary.’ ” Henderson v. United States, 476 U.S. 321, 330 (1986). In this case there was a 215-day delay between the filing of the indictment and the filing of Vo’s motion to dismiss. Of this period, Vo does not contest the exclusion of some 143 days, leaving more than 70 days that are not excludable. In this appeal he argues that the district court should not have excluded twelve days between October 10-21, 2002. If that period is excluded, then Vo’s trial was held within the con- fines of the Speedy Trial Act. On the other hand, if those days count for Speedy Trial Act purposes, then Vo was not tried in a timely fashion and the Act requires that the court dismiss the indictment either with or without prejudice. 18 U.S.C. § 3161(a)(2); see also United States v. Daychild, 357 F.3d 1082, 1090 (9th Cir. 2004) (“If trial does not commence within the seventy-day limit, after setting aside excluded time, the court must dismiss the indictment . . . . Thus, failure to comply with the Act has grave consequences.”); United States v. Hardeman, 249 F.3d 826, 828-29 (9th Cir. 2001) (per curiam) (“The Act’s 70-day limit was therefore exceeded, see 18 U.S.C. § 3161(c)(1), and the indictment against [defen- dant] must be dismissed.”).1 Rick and Brenda Vo first appeared in district court, where the government moved for their detention, on October 7, 2002. The district court set a detention hearing for three days 1 This court reviews de novo a district court’s application of the Speedy Trial Act. United States v. Gorman, 314 F.3d 1105, 1110 (9th Cir. 2002); United States v. Springer, 51 F.3d 861, 864 (9th Cir. 1995). The court reviews the district court’s factual findings under the Speedy Trial Act for clear error. United States v. Brickey, 289 F.3d 1144, 1150 (9th Cir. 2002). UNITED STATES v. VO 7633 later, on October 10, and remanded them to the custody of the U.S. Marshal’s Service. On October 9, the grand jury returned an indictment against the Vos. They appeared the following day to be arraigned and to request a continuance of the deten- tion hearing from October 10 to October 21 to present addi- tional information from the Pretrial Services Officer. The district court agreed to the continuance and set a trial date for December 10. On October 21, the district court held the detention hearing and granted the government’s motion to detain the defendants. [2] Vo argues that the twelve days between October 10 through October 21, 2002, were not excludable from compu- tation under the Act. He claims that, under United States v. Clymer, 25 F.3d 824, 830 (9th Cir. 1994), a motion that does not result in actual pretrial delay is unexcludable: “[Section] 3161(h)(1)(F) applies only when the delay in bringing the case to trial is the result of the pendency of a pretrial motion.” Id. (emphasis in original). We do not read Clymer to support Vo’s argument. In Clymer the defendant had languished through a 522-day delay, which the government claimed was entirely excludable. The panel’s opinion granted some of the excludable delay, but held that Clymer’s motion to dismiss the indictment for outra- geous government conduct, which the district court decided to refrain from ruling on until after the trial, did not constitute excludable delay under the Act. Id. at 831-32. We found that “[i]n effect, the district court denied the motion without preju- dice to the filing of a renewed submission after the conclusion of the trial.” Id. at 830. If we had held otherwise in Clymer, the government would have had carte blanche in the prepara- tion of its case, so long as it had some motion pending before the court, even if resolution of the motion had been suspended until after the trial. We noted that in the ordinary case “[w]here delay in commencing a trial results from the pen- dency of a motion (as when the district court holds off trial pending a hearing on the motion), the delay will automatically 7634 UNITED STATES v. VO be excluded from the Speedy Trial Act calculation, no matter how unreasonable or unnecessary that delay might seem.” Id. at 830. But in Clymer “that causal relationship was reversed: the pendency of the motion did not delay the start of the trial; rather, the delay in the commencement of the trial caused the delay in hearing the motion.” Id. at 831. [3] Clymer did not, and did not purport to, overrule our prior cases holding that the time a motion is pending is excludable even when the pendency of the motion causes no actual delay in the trial. United States v. Crooks, 826 F.2d 4, 5 (9th Cir. 1987); United States v. Van Brandy, 726 F.2d 548, 551 (9th Cir. 1984); see also Daychild, 357 F.3d at 1095 (“[T]he district court’s five-day exclusion of the period between [defendant’s] arraignment and the detention/bond hearing held at his request . . . was proper.”). We, thus, do not read Clymer as adopting the broad rule Vo advocates.2 As we 2 Our sister circuits have also reached the same conclusion. See, e.g., United States v. Cobb, 697 F.2d 38, 46 (2d Cir. 1982) (“We reject [the dis- trict judge’s] causation analysis which would require that to be excludable under [§ 3161(h)(1)(F)] a particular pretrial motion must have caused an actual delay in the commencement of the trial. We accept, instead, the government’s view that a pretrial motion triggers an automatic exclusion, with the qualification, however, that the amount of time eligible for exclu- sion may not be extended by postponing the hearing date or other disposi- tion of the motion beyond what is reasonably necessary for processing the motion.”), overruled by United States v. Matsushita, 794 F.2d 46, 51 (2d Cir. 1986) (holding that the “reasonableness standard” stated in Cobb is abrogated by Henderson, and stating that “any time consumed between the filing of a pretrial motion and the conclusion of the hearing on that motion is excludable without regard to the reasonableness of the length of time”) (emphasis added); United States v. Novak, 715 F.2d 810, 813 (3d Cir. 1983) (“[T]he legislative history of the Speedy Trial Act clearly indicates that Congress intended the exclusions under section 3161(h)(1)-(7) to operate without requiring a factual determination of causation.”), over- ruled by United States v. Felton, 811 F.2d 190, (3d Cir. 1987) (holding that Henderson abrogated the “reasonableness standard” that the Third Circuit previously imposed in Novak); United States v. Velasquez, 802 F.2d 104, 105-06 (4th Cir. 1986) (“[G]iven the [Supreme Court’s] ruling in [Henderson v. United States] that “all time” is to be excluded, the cau- UNITED STATES v. VO 7635 recently observed, “[i]n the years since Clymer was decided, its holding has been limited to situations in which a motion is postponed until after trial.” United States v. Lewis, 349 F.3d 1116, 1121 (9th Cir. 2003) (per curiam) (citing United States v. Gorman, 314 F.3d 1105, 1115 (9th Cir. 2002); United States v. George, 85 F.3d 1433, 1436 (9th Cir. 1996); Springer, 51 F.3d at 865). Except in the unusual case, such as Clymer, “ ‘a pretrial motion triggers an automatic exclu- sion,’ ” Van Brandy, 726 F.2d at 551 (citing United States v. Cobb, 697 F.2d 38, 46 (2d Cir. 1982)), even though no actual delay results, Crooks, 826 F.2d at 5. Our holding provides a clear rule for district courts and counsel to follow, it puts counsel on notice from the outset as to what is excludable, and it avoids gamesmanship. We affirm the district court’s ruling that the detention motion pending for twelve days between October 10 and October 21, 2002, was excludable delay and that Vo’s Speedy Trial Act motion was properly denied. sation argument must also be rejected under § 3161(h)(1)(F).”); United States v. Brim, 630 F.2d 1307, 1311-12 (8th Cir. 1980) (“The district court considered the theories of each side and concluded that the Act intended automatic exclusion. This interpretation is consistent with the language of the Act, as amended, and with the apparent purpose of the amendment.”); United States v. Vogl, 374 F.3d 976, 986 (10th Cir. 2004) (“Although we have not previously reached this precise question of whether ‘actual delay’ must exist before excluding time under § 3161(h)(1), we find the reason- ing of our sister circuits persuasive and consistent with our prior precedent . . . [and] hold[ ] that no ‘actual delay’ is required for a district court to exclude time under § 3161(h)(1)(F) . . . .” ); United States v. Stafford, 697 F.2d 1368, 1371-72 (11th Cir. 1983) (“We agree with this reasoning [that § 3161(h)(1)(F) creates automatic exclusions] and conclude that the trial court in this case erred in deciding that the exclusions are not automatic.”); United States v. Wilson, 835 F.2d 1440, 1443 (D.C. Cir. 1987) (“[W]e join not only the Second Circuit but several others finding that the exclusion of the time between the filing and disposition of pretrial motions under § 3161(h)(1)(F) is automatic and need not cause actual delay of the trial.”) (citing Van Brandy, 726 F.2d at 551). 7636 UNITED STATES v. VO II. MARITAL COMMUNICATIONS PRIVILEGE Vo argues that the district court should not have permitted Brenda to testify about their marital communications. Vo failed to object at trial, so he must argue here that the admis- sion of her testimony was plain error.3 Brenda testified that Vo had asked her to send a box from a shopping center near Playa del Rey, California, to Honolulu, in September 2001. Although she initially declined to send the box because Vo would not inform her of the contents, she later agreed to Vo’s demands. She testified that when Vo han- dled the box, he handled it in a way that would avoid leaving fingerprints. Vo also had written the name of “Linda Chang” as the sender on the box when he gave the box to Brenda to send. Brenda testified that a month later, in October 2001, Vo asked her to send another box to Honolulu, also with the name “Linda Chang” as the sender. Brenda also testified to other facts regarding the package recovered by the FBI and DEA during trial. Additionally, Brenda testified that in 2002, she observed Vo’s brother, Khanh Vo, give a United Parcel Ser- vice agent a box to send, and testified that she saw Khanh carry the box so as to avoid leaving fingerprints. Finally, Brenda testified that in 2002, while staying at her parents house in Hawaii, Vo asked her to go see a person named “Crash Om” to pick up some money that Vo was owed for drugs. [4] There are two types of marital privileges that may be implicated when spouses testify against each other. “The first permits a witness to refuse to testify against his or her spouse” 3 This court reviews de novo the district court’s construction of a federal rule of evidence. United States v. Montgomery, 384 F.3d 1050, 1056 (9th Cir. 2004); United States v. Angwin, 271 F.3d 786, 798 (9th Cir. 2001). Federal Rule of Evidence 501 provides that “the privilege of a witness, person, government, State or political subdivision thereof shall be gov- erned by the principles of the common law,” and applies to the marital communications privilege at issue in this case. UNITED STATES v. VO 7637 while they are married. United States v. Montgomery, 384 F.3d 1050, 1056 (9th Cir. 2004) (citing Trammel v. United States, 445 U.S. 40, 53 (1980)). This privilege is not impli- cated in this case because Brenda elected to testify against Vo. See id. The second privilege, the marital communications privilege, provides that “[c]ommunications between the spouses, privately made, are generally assumed to have been intended to be confidential, and hence they are privileged.” Wolfle v. United States, 291 U.S. 7, 14 (1934). We have held that “[t]he privilege (1) extends to words and acts intended to be a communication; (2) requires a valid marriage; and (3) applies only to confidential communications, i.e., those not made in the presence of, or likely to be overheard by, third parties.” Montgomery, 384 F.3d at 1056 (citing United States v. Marashi, 913 F.2d 724, 729-30 (9th Cir. 1990)). We con- strue the marital communications privilege narrowly, to pro- mote marriage without thwarting the administration of justice. Id.; Marashi, 913 F.2d at 730. The marital communications privilege is subject to an important exception. The privilege does not shield marital confidences when those confidences concern joint criminal activity. “[T]he marital communications privilege does not apply to statements made in furtherance of joint criminal activity.” Marashi, 913 F.2d at 731. The exception has its own limits: Where, for example, the wife has “not become a participant at the time of her communications, no joint crimi- nal activity ha[s] been undertaken,” and the joint criminal activity exception does not apply. Montgomery, 384 F.3d at 1060; see also United States v. Westmoreland, 312 F.3d 302, 308 (7th Cir. 2002); United States v. Bey, 188 F.3d 1, 6 (1st Cir. 1999); United States v. Evans, 966 F.2d 398, 401 (8th Cir. 1992); United States v. Estes, 793 F.2d 465, 468 (2d Cir. 1986); United States v. Mendoza, 574 F.2d 1373, 1381 (5th Cir. 1978). We need not decide whether Brenda was a partici- pant in joint criminal activity at the time of her communica- tions, because Vo waived the privilege by failing to assert it at trial. 7638 UNITED STATES v. VO Vo argues that, by failing to assert the privilege during trial, he did not waive the marital communications privilege but rather that he forfeited his privilege. This is significant because Vo claims that the marital communications privilege is a right, not a privilege. As Vo correctly asserts, the court may review for plain error under United States v. Perez, 116 F.3d 840, 845 (9th Cir. 1997) (en banc), where a right is for- feited in the trial court because it was not raised at all (as opposed, that is, to having been raised and waived). See id. at 844 (forfeited right reviewed for plain error). [5] We have plainly held, however, that when the defendant “failed to object to his wife’s testimony as to his communica- tions when it was offered,” he has waived the privilege. United States v. Figueroa-Paz, 468 F.2d 1055, 1057 (9th Cir. 1972). Recently, we affirmed that “Figueroa-Paz stands for the rule that the marital communications privilege will be waived if an objection is not timely made.” Montgomery, 384 F.3d at 1057. Because Vo neglected to assert the marital com- munications privilege during pretrial conference or to object at trial to Brenda’s testimony on the basis of the marital com- munications privilege, he has waived the privilege. We there- fore decline to review his claim of plain error. III. EVIDENCE OF PRIOR CONVICTION Finally, Vo argues that the district court erred when it admitted evidence that Vo was convicted in 1989 of two counts of selling cocaine.4 The district court found that the conviction was similar to the current charge, that the evidence was being introduced to prove a material issue, and that the prior conviction was not too remote. It concluded that proba- 4 We review for abuse of discretion a district court’s decision to admit “other crimes” evidence, but the determination that evidence was within the scope of the rule governing “other crimes” evidence is reviewed de novo. United States v. Williams, 291 F.3d 1180, 1189 (9th Cir. 2002) (per curiam) (citing FED. R. EVID. 404(b)). UNITED STATES v. VO 7639 tive value of the prior conviction substantially outweighed any unfair prejudice. See FED. R. EVID. 403, 404(b). Vo stipu- lated to the fact of his prior conviction, while reserving his objection for appeal. The district court instructed the jury to consider the prior conviction “only as it [bore] on his intent, knowledge, absence of mistake, and for no other purpose.” [6] Evidence of a prior conviction, wrong, or act is inad- missible under Rule 404(b) for the purpose of proving the character of a person or that a defendant acted in conformity with such character. FED. R. EVID. 404(b). Such evidence “may, however, be admissible for other purposes, such as proof of motive, opportunity, intent, preparation, plan, knowl- edge, identity, or absence of mistake or accident.” Id. “In making admissibility decisions, the [district] court will admit Rule 404(b) evidence if (1) the evidence tends to prove a material point; (2) the prior act is not too remote in time; (3) the evidence is sufficient to support a finding that the defen- dant committed the other act; and (4) (in cases where knowl- edge and intent are at issue) the act is similar to the offense charged.” United States v. Verduzco, 373 F.3d 1022, 1027 (9th Cir. 2004) (citing United States v. Mayans, 17 F.3d 1174, 1181 (9th Cir. 1994)), cert. denied, 125 S.Ct. 508 (2004). Having made this determination, the district court must deter- mine whether the probative value of admission outweighs the prejudice to the defendant. United States v. Johnson, 132 F.3d 1279, 1282 (9th Cir. 1997); see also United States v. Ross, 886 F.2d 264, 267 (9th Cir. 1989). The government argues that it offered Vo’s prior conviction as evidence of his intent, knowledge, and absence of mistake under Rule 404(b). Vo counters that the prior conviction was old and that it was not relevant to the charged act, because the charged act and prior conviction involve different material elements. The government points out that Vo’s theory at trial was that Brenda was the drug dealer in this scenario5 and that 5 “[Brenda] was a clever girl . . . . The evidence is going to show Brenda knows how to cook crack. She knows how to cook dope. And the evidence 7640 UNITED STATES v. VO she implicated Vo because “by burning somebody else to get herself out from under her awful, awful situation . . . benefits [would] accrue.” United States v. Vo, No. 02-00411ACK, Trial Transcript, 2-27, lines 21-23 (May 15, 2003) (opening argument by Vo’s counsel). The government argues that it offered the evidence of the prior conviction to refute Vo’s claims that he was merely an innocent pawn in Brenda’s scheme.6 [7] “We have consistently held that evidence of a defen- dant’s prior possession or sale of narcotics is relevant under Rule 404(b) to issues of intent, knowledge, motive, opportu- nity, and absence of mistake or accident in prosecutions for possession of, importation of, and intent to distribute narcot- ics.” United States v. Mehrmanesh, 689 F.2d 822, 832 (9th Cir. 1982). When analyzing the similarity of prior drug crimes under FED. R. EVID. 404(b), we look to the type of activity undertaken, rather than the precise identity of the drugs, as the relevant factor. See United States v. Vizcarra-Martinez, 66 F.3d 1006, 1015 (9th Cir. 1995). Indeed, “[w]hen offered to prove knowledge, . . . the prior act need not be similar to the charged act as long as the prior act was one which would tend to make the existence of the defendant’s knowledge more probable than it would be without the evidence.” United States v. Ramirez-Jiminez, 967 F.2d 1321, 1326 (9th Cir. 1992) (citing FED. R. EVID. 401). Additionally, we have found that a thirteen-year-old conviction is not too remote to be admitted under Federal Rule of Evidence 404(b). See Ross, 886 F.2d at 267; see also United States v. Rude, 88 F.3d 1538, is going to show that she was involved with numerous people that cooked crack, sold crack, and that she was not some minor dealer.” United States v. Vo, No. 02-00411ACK, Trial Transcript, 2-21, lines 11, 21-25 (May 15, 2003) (opening argument by Vo’s counsel). 6 “[A]cquit Rick Vo, and let the blame fall where it truly belongs, on the lady who pled guilty.” United States v. Vo, No. 02-00411ACK, Trial Tran- script, 2-29, lines 7-8 (May 15, 2003) (opening argument by Vo’s coun- sel). UNITED STATES v. VO 7641 1550 (9th Cir. 1996) (holding an eight-year-old prior act admissible). The remoteness of Vo’s conviction does not nec- essarily preclude admissibility, because “[t]his court has not identified a particular number of years after which past con- duct becomes too remote.” Johnson, 132 F.3d at 1283. Thus, if “[t]he prior act evidence in this case is sufficiently similar to the charged conduct” it may “render it probative despite the passage of time.” Id. [8] The district court did not abuse its discretion. Vo’s prior conviction was evidence of his knowledge of drug trafficking and distribution in general. The conviction tended to show that Vo was familiar with distribution of illegal drugs and that his actions in this case were not an accident or a mistake. In addition, there is no issue about the sufficiency of evidence of the prior bad act because Vo was convicted in state court. United States v. Arambula-Ruiz, 987 F.2d 599, 603 (9th Cir. 1993). The district court “carefully weighed the probative value versus the prejudicial effect of the evidence” and issued appropriate limiting instructions to the jury, therefore properly exercising its discretion to admit the evidence. United States v. Chea, 231 F.3d 531, 535 (9th Cir. 2000). We therefore affirm the district court’s admission of Vo’s prior conviction. CONCLUSION Vo’s conviction is AFFIRMED. We REMAND to the dis- trict court solely for the purpose of sentencing consistent with United States v. Ameline, No. 02-30326, 2005 WL 1291977, at *11 (9th Cir. June 1, 2005) (en banc).
Q: Problem in getting unique elements from list of tuples I got sample input as a=[(1,2),(2,3),(1,1),(2,1)], and the expected ouput is a=[(1,2),(2,3),(1,1)]. Here, (2,1) is removed, since the same combinational pair (1,2) is already available. I tried below code to remove duplicate pairs map(tuple, set(frozenset(x) for x in a)) However, the output is [(1, 2), (2, 3), (1,)]. How to get (1,1) pair as (1,1) instead of (1,). A: You can use a dict instead of a set to map the frozensets to the original tuple values. Build the dict in reversed order of the list so that duplicating tuples closer to the front can take precedence: {frozenset(x): x for x in reversed(a)}.values() This returns: [(1, 2), (2, 3), (1, 1)]
Q: Javascript / Forcing a line break after the point if I have one word As in the picture, I would force a line break when I have one word after the dot, for a aesthetic issue, but especially as a matter of good reading. It's possible? http://i.stack.imgur.com/EkcuR.jpg A: This works too (*same situation - you don't want a text break after a single word. My solution to that is to select the first two words, wrap them with a span with a class and don't let that text break): <style> section{ width:500px; float:left; font:14px; } .first-two-words2 { font-style:italic; white-space: nowrap; } </style> <script> $(document).ready(function($) { $('span').html(function (i, html) { return html.replace(/(\w+\s\w+)/, '<span class="first-two-words2">$1</span>') }); }); </script> <section> <span> Lorem ipsum dolor sit amet, in luctus, at eros nec turpis, malesuada massa vel purus nonummy, lorem quis neque,lorem quis neque, lorem quis zz. </span> <span> Neque ac, ut nunc dui mattis sollicitudin arcu, sed sollicitudin scelerisque enim a. </span> <span> Praesent sit urna ipsum, tortor integer elit in convallis pulvinar mauris. </span> </section> http://jsfiddle.net/MadalinaTn/me76t9vv/1/
Nucleomorph ribosomal DNA and telomere dynamics in chlorarachniophyte algae. Chlorarachniophytes are enigmatic marine unicellular algae that acquired photosynthesis by secondary endosymbiosis. Chlorarachniophytes are unusual in that the nucleus of the engulfed algal cell (a green alga) persists in a miniaturized form, termed a nucleomorph. The nucleomorph genome of the model chlorarachniophyte, Bigelowiella natans CCMP621, is 373 kilobase pairs (kbp) in size, the smallest nuclear genome characterized to date. The B. natans nucleomorph genome is composed of three chromosomes, each with canonical eukaryotic telomeres and sub-telomeric ribosomal DNA (rDNA) operons transcribed away from the chromosome end. Here we present the complete rDNA operon and telomeric region from the nucleomorph genome of Lotharella oceanica CCMP622, a newly characterized chlorarachniophyte strain with a genome ∼610 kbp in size, significantly larger than all other known chlorarachniophytes. We show that the L. oceanica rDNA operon is in the opposite chromosomal orientation to that of B. natans. Furthermore, we determined the rDNA operon orientation of five additional chlorarachniophyte strains, the majority of which possess the same arrangement as L. oceanica, with the exception of Chlorarachnion reptans and those very closely related to B. natans. It is thus possible that the ancestral rDNA operon orientation of the chlorarachniophyte nucleomorph genome might have been the same as in the independently evolved, red algal-derived, nucleomorph genomes of cryptophytes. A U2 small nuclear RNA gene was found adjacent to the telomere in Gymnochlora stellata CCMP2057 and Chlorarachnion sp. CCMP2014. This feature may represent a useful evolutionary character for inferring the relationships among extant lineages.
In a 2009 file photo, 2nd Lt. Nicholas Wilkes, right, works through an interpreter to communicate with a platoon commander with the 3rd Light Armored Reconnaissance Battalion during a land navigation exercise at Camp Mejid, Iraq. WASHINGTON (Tribune News Service) — Military veterans were dumbfounded and furious when it became clear over the weekend that President Donald Trump’s executive order barring the admission to the United States of people from seven majority-Muslim countries keeps out interpreters who risked their lives helping U.S. forces in Iraq. “They better make a damn exception, because we are here because of them,” said Andrew Biggio, a former Marine sergeant who served in Iraq and Afghanistan. “Our lives, our families, we have everything to thank for our interpreters. We owe them, we owe them, we owe them.” Biggio, who voted for Trump, said he and other Marines he served with are waiting for a clarification from the White House. Many of them pushed for years to obtain visas for their interpreters, and then raised money to help them settle in. “They need to do something about this,” he said. “You want to talk about saving American lives from terrorists –– these interpreters did that, they saved a lot of our lives.” Thousands of Iraqis who worked as interpreters and advisers to U.S. troops are barred from obtaining visas and entering the country now risk retaliation against them and their families for collaborating with the U.S. government. Veterans say the interpreters provided invaluable translation, help and intelligence and served on the front lines with U.S. troops. “We asked them to risk their lives for us and they’re being threatened because they worked alongside us,” said Scott Cooper, a Marine veteran who served tours in Iraq, Afghanistan and Bosnia. He now leads Human Rights First’s Veterans for American Ideals project, which advocates for military interpreters and Syrian refugees. “They didn’t think this one through, and it’s completely wrong,” he said. “We all want America to be safe, this is why we put on the uniform.” Cooper said he has never seen the veterans in his organization so desperate to help. “I’ve never seen them more fired up, it’s overwhelming,” he said. “The Facebook messages, texts, tweets, everyone asking ‘what can I do?’ ” He believes veterans will win on the issue of continuing special immigrant visas for Iraqi nationals, who fall under Trump’s ban. “We’re pulling out all the stops,” he said. “This administration cares a lot about being aligned with veterans, and we’re making our voices heard.” As of June 2016, more than 800 applicants and their families were waiting for Iraqi special immigrant visas, according to the most recent State Department data. Those are just the ones who fall into a category of having worked with the U.S. military. About 58,000 other Iraqis who worked with the U.S. government, nonprofits, journalists and other organizations also are waiting for interviews under the Direct Access program. In announcing his order Friday, Trump said it was needed to prevent Islamist militants from coming into the United States among refugees until “extreme vetting” procedures can be put in place. But critics argue that the United States already has one of the strictest processes for refugee admissions in the world. The White House did not return a request for comment on whether it would consider exempting Iraqi interpreters from its limitations of refugee arrivals. Veterans said that honoring the implicit promise made to those who risked their lives to help the United States has nothing to do with politics, and that they can’t believe it would be up for debate. “You will find military veterans unified in support of this; it’s not partisan,” said Brandon Friedman, a former Obama administration official who commanded a platoon during the invasion of Iraq. “This order demonstrates that we don’t have their backs. It’s totally un-American.” U.S. troops in Iraq developed tight bonds with the Iraqis they worked with, crediting them with keeping them safe, Friedman said. He pointed to the case of Hameed Khalid Darweesh, a father of three who worked with the U.S. government in Iraq for a decade and was detained at JFK airport in New York after Trump signed the order. He was released 19 hours later after the American Civil Liberties Union filed a lawsuit on his behalf. When Friedman worked with Darweesh in 2003, he remembered him working in only jeans and a baseball cap while he and other U.S. officers were bundled up in body armor. “Hameed has done more for this country than most people who were born here,” Friedman said. “He was absolutely fearless, totally dedicated to keeping us safe, and it is beyond insulting that the president would sign this executive order betraying him.” He said many veterans also worry that Trump’s order puts U.S. troops in danger, providing local people no incentive to assume the risk of working with them. “I don’t know why they don’t walk off the job today,” he said. “It’s a huge propaganda coup for ISIS.” Rep. Seth Moulton, D-Mass., a former Marine infantry officer who served four tours in Iraq, said in a statement that troops have told him “loud and clear”on overseas visits that Trump’s policies put them at risk. “Trump has never put his life on the line for America … Troops will die for Trump’s ban,” he wrote on Twitter. “Not only does this not do anything to protect America, but it now sends the message that even if you put your life on the line to help America, if you are Muslim we don’t want you here,” said Jon Soltz, an Iraq war veteran and chairman of advocacy group VoteVets. Interpreters and others working with the U.S. government were thoroughly vetted before beginning to work, including having their phones tapped. Then, to obtain even an interview for a visa, they go through years of bureaucratic red tape and roadblocks. In one recent case, it took the State Department, the CIA, the FBI and Homeland Security Department over five years to complete all the background checks on an interpreter’s case, according to Mica Varga, director of resettlement operations for No One Left Behind, a nonprofit that helps people who worked for the U.S. military secure special immigrant visas. “To tell these guys today ‘We’re sorry, after five years of vetting you, you aren’t vetted enough’ is simply absurd,” she said. Some veterans also expressed anger and disappointment in Secretary of Defense James Mattis. The former commander of the U.S. Central Command was sharply critical of Trump’s call to ban Muslim immigrants during his presidential campaign. In July 2016 he said such talk would lead U.S. allies to think “we have lost faith in reason” and said it was causing “great damage.” Many groups had hoped that as someone with direct experience in Afghanistan and Iraq, who understands the reliance of U.S. forces on local employees, Mattis would be an ally in allocating more visas for them. Instead, they said, he stood by as Trump signed the immigration order in the Pentagon’s Hall of Heroes. “Secretary Mattis just stood there and smiled and clapped,” Friedman said. “He needs to figure out really quickly which side he’s on.” ©2017 McClatchy Washington Bureau Visit the McClatchy Washington Bureau at www.mcclatchydc.com Distributed by Tribune Content Agency, LLC.
"""Utility functions, node construction macros, etc.""" # Author: Collin Winter from itertools import islice # Local imports from .pgen2 import token from .pytree import Leaf, Node from .pygram import python_symbols as syms from . import patcomp ########################################################### ### Common node-construction "macros" ########################################################### def KeywordArg(keyword, value): return Node(syms.argument, [keyword, Leaf(token.EQUAL, "="), value]) def LParen(): return Leaf(token.LPAR, "(") def RParen(): return Leaf(token.RPAR, ")") def Assign(target, source): """Build an assignment statement""" if not isinstance(target, list): target = [target] if not isinstance(source, list): source.prefix = " " source = [source] return Node(syms.atom, target + [Leaf(token.EQUAL, "=", prefix=" ")] + source) def Name(name, prefix=None): """Return a NAME leaf""" return Leaf(token.NAME, name, prefix=prefix) def Attr(obj, attr): """A node tuple for obj.attr""" return [obj, Node(syms.trailer, [Dot(), attr])] def Comma(): """A comma leaf""" return Leaf(token.COMMA, ",") def Dot(): """A period (.) leaf""" return Leaf(token.DOT, ".") def ArgList(args, lparen=LParen(), rparen=RParen()): """A parenthesised argument list, used by Call()""" node = Node(syms.trailer, [lparen.clone(), rparen.clone()]) if args: node.insert_child(1, Node(syms.arglist, args)) return node def Call(func_name, args=None, prefix=None): """A function call""" node = Node(syms.power, [func_name, ArgList(args)]) if prefix is not None: node.prefix = prefix return node def Newline(): """A newline literal""" return Leaf(token.NEWLINE, "\n") def BlankLine(): """A blank line""" return Leaf(token.NEWLINE, "") def Number(n, prefix=None): return Leaf(token.NUMBER, n, prefix=prefix) def Subscript(index_node): """A numeric or string subscript""" return Node(syms.trailer, [Leaf(token.LBRACE, "["), index_node, Leaf(token.RBRACE, "]")]) def String(string, prefix=None): """A string leaf""" return Leaf(token.STRING, string, prefix=prefix) def ListComp(xp, fp, it, test=None): """A list comprehension of the form [xp for fp in it if test]. If test is None, the "if test" part is omitted. """ xp.prefix = "" fp.prefix = " " it.prefix = " " for_leaf = Leaf(token.NAME, "for") for_leaf.prefix = " " in_leaf = Leaf(token.NAME, "in") in_leaf.prefix = " " inner_args = [for_leaf, fp, in_leaf, it] if test: test.prefix = " " if_leaf = Leaf(token.NAME, "if") if_leaf.prefix = " " inner_args.append(Node(syms.comp_if, [if_leaf, test])) inner = Node(syms.listmaker, [xp, Node(syms.comp_for, inner_args)]) return Node(syms.atom, [Leaf(token.LBRACE, "["), inner, Leaf(token.RBRACE, "]")]) def FromImport(package_name, name_leafs): """ Return an import statement in the form: from package import name_leafs""" # XXX: May not handle dotted imports properly (eg, package_name='foo.bar') #assert package_name == '.' or '.' not in package_name, "FromImport has "\ # "not been tested with dotted package names -- use at your own "\ # "peril!" for leaf in name_leafs: # Pull the leaves out of their old tree leaf.remove() children = [Leaf(token.NAME, "from"), Leaf(token.NAME, package_name, prefix=" "), Leaf(token.NAME, "import", prefix=" "), Node(syms.import_as_names, name_leafs)] imp = Node(syms.import_from, children) return imp def ImportAndCall(node, results, names): """Returns an import statement and calls a method of the module: import module module.name()""" obj = results["obj"].clone() if obj.type == syms.arglist: newarglist = obj.clone() else: newarglist = Node(syms.arglist, [obj.clone()]) after = results["after"] if after: after = [n.clone() for n in after] new = Node(syms.power, Attr(Name(names[0]), Name(names[1])) + [Node(syms.trailer, [results["lpar"].clone(), newarglist, results["rpar"].clone()])] + after) new.prefix = node.prefix return new ########################################################### ### Determine whether a node represents a given literal ########################################################### def is_tuple(node): """Does the node represent a tuple literal?""" if isinstance(node, Node) and node.children == [LParen(), RParen()]: return True return (isinstance(node, Node) and len(node.children) == 3 and isinstance(node.children[0], Leaf) and isinstance(node.children[1], Node) and isinstance(node.children[2], Leaf) and node.children[0].value == "(" and node.children[2].value == ")") def is_list(node): """Does the node represent a list literal?""" return (isinstance(node, Node) and len(node.children) > 1 and isinstance(node.children[0], Leaf) and isinstance(node.children[-1], Leaf) and node.children[0].value == "[" and node.children[-1].value == "]") ########################################################### ### Misc ########################################################### def parenthesize(node): return Node(syms.atom, [LParen(), node, RParen()]) consuming_calls = {"sorted", "list", "set", "any", "all", "tuple", "sum", "min", "max", "enumerate"} def attr_chain(obj, attr): """Follow an attribute chain. If you have a chain of objects where a.foo -> b, b.foo-> c, etc, use this to iterate over all objects in the chain. Iteration is terminated by getattr(x, attr) is None. Args: obj: the starting object attr: the name of the chaining attribute Yields: Each successive object in the chain. """ next = getattr(obj, attr) while next: yield next next = getattr(next, attr) p0 = """for_stmt< 'for' any 'in' node=any ':' any* > | comp_for< 'for' any 'in' node=any any* > """ p1 = """ power< ( 'iter' | 'list' | 'tuple' | 'sorted' | 'set' | 'sum' | 'any' | 'all' | 'enumerate' | (any* trailer< '.' 'join' >) ) trailer< '(' node=any ')' > any* > """ p2 = """ power< ( 'sorted' | 'enumerate' ) trailer< '(' arglist<node=any any*> ')' > any* > """ pats_built = False def in_special_context(node): """ Returns true if node is in an environment where all that is required of it is being iterable (ie, it doesn't matter if it returns a list or an iterator). See test_map_nochange in test_fixers.py for some examples and tests. """ global p0, p1, p2, pats_built if not pats_built: p0 = patcomp.compile_pattern(p0) p1 = patcomp.compile_pattern(p1) p2 = patcomp.compile_pattern(p2) pats_built = True patterns = [p0, p1, p2] for pattern, parent in zip(patterns, attr_chain(node, "parent")): results = {} if pattern.match(parent, results) and results["node"] is node: return True return False def is_probably_builtin(node): """ Check that something isn't an attribute or function name etc. """ prev = node.prev_sibling if prev is not None and prev.type == token.DOT: # Attribute lookup. return False parent = node.parent if parent.type in (syms.funcdef, syms.classdef): return False if parent.type == syms.expr_stmt and parent.children[0] is node: # Assignment. return False if parent.type == syms.parameters or \ (parent.type == syms.typedargslist and ( (prev is not None and prev.type == token.COMMA) or parent.children[0] is node )): # The name of an argument. return False return True def find_indentation(node): """Find the indentation of *node*.""" while node is not None: if node.type == syms.suite and len(node.children) > 2: indent = node.children[1] if indent.type == token.INDENT: return indent.value node = node.parent return "" ########################################################### ### The following functions are to find bindings in a suite ########################################################### def make_suite(node): if node.type == syms.suite: return node node = node.clone() parent, node.parent = node.parent, None suite = Node(syms.suite, [node]) suite.parent = parent return suite def find_root(node): """Find the top level namespace.""" # Scamper up to the top level namespace while node.type != syms.file_input: node = node.parent if not node: raise ValueError("root found before file_input node was found.") return node def does_tree_import(package, name, node): """ Returns true if name is imported from package at the top level of the tree which node belongs to. To cover the case of an import like 'import foo', use None for the package and 'foo' for the name. """ binding = find_binding(name, find_root(node), package) return bool(binding) def is_import(node): """Returns true if the node is an import statement.""" return node.type in (syms.import_name, syms.import_from) def touch_import(package, name, node): """ Works like `does_tree_import` but adds an import statement if it was not imported. """ def is_import_stmt(node): return (node.type == syms.simple_stmt and node.children and is_import(node.children[0])) root = find_root(node) if does_tree_import(package, name, root): return # figure out where to insert the new import. First try to find # the first import and then skip to the last one. insert_pos = offset = 0 for idx, node in enumerate(root.children): if not is_import_stmt(node): continue for offset, node2 in enumerate(root.children[idx:]): if not is_import_stmt(node2): break insert_pos = idx + offset break # if there are no imports where we can insert, find the docstring. # if that also fails, we stick to the beginning of the file if insert_pos == 0: for idx, node in enumerate(root.children): if (node.type == syms.simple_stmt and node.children and node.children[0].type == token.STRING): insert_pos = idx + 1 break if package is None: import_ = Node(syms.import_name, [ Leaf(token.NAME, "import"), Leaf(token.NAME, name, prefix=" ") ]) else: import_ = FromImport(package, [Leaf(token.NAME, name, prefix=" ")]) children = [import_, Newline()] root.insert_child(insert_pos, Node(syms.simple_stmt, children)) _def_syms = {syms.classdef, syms.funcdef} def find_binding(name, node, package=None): """ Returns the node which binds variable name, otherwise None. If optional argument package is supplied, only imports will be returned. See test cases for examples.""" for child in node.children: ret = None if child.type == syms.for_stmt: if _find(name, child.children[1]): return child n = find_binding(name, make_suite(child.children[-1]), package) if n: ret = n elif child.type in (syms.if_stmt, syms.while_stmt): n = find_binding(name, make_suite(child.children[-1]), package) if n: ret = n elif child.type == syms.try_stmt: n = find_binding(name, make_suite(child.children[2]), package) if n: ret = n else: for i, kid in enumerate(child.children[3:]): if kid.type == token.COLON and kid.value == ":": # i+3 is the colon, i+4 is the suite n = find_binding(name, make_suite(child.children[i+4]), package) if n: ret = n elif child.type in _def_syms and child.children[1].value == name: ret = child elif _is_import_binding(child, name, package): ret = child elif child.type == syms.simple_stmt: ret = find_binding(name, child, package) elif child.type == syms.expr_stmt: if _find(name, child.children[0]): ret = child if ret: if not package: return ret if is_import(ret): return ret return None _block_syms = {syms.funcdef, syms.classdef, syms.trailer} def _find(name, node): nodes = [node] while nodes: node = nodes.pop() if node.type > 256 and node.type not in _block_syms: nodes.extend(node.children) elif node.type == token.NAME and node.value == name: return node return None def _is_import_binding(node, name, package=None): """ Will reuturn node if node will import name, or node will import * from package. None is returned otherwise. See test cases for examples. """ if node.type == syms.import_name and not package: imp = node.children[1] if imp.type == syms.dotted_as_names: for child in imp.children: if child.type == syms.dotted_as_name: if child.children[2].value == name: return node elif child.type == token.NAME and child.value == name: return node elif imp.type == syms.dotted_as_name: last = imp.children[-1] if last.type == token.NAME and last.value == name: return node elif imp.type == token.NAME and imp.value == name: return node elif node.type == syms.import_from: # str(...) is used to make life easier here, because # from a.b import parses to ['import', ['a', '.', 'b'], ...] if package and str(node.children[1]).strip() != package: return None n = node.children[3] if package and _find("as", n): # See test_from_import_as for explanation return None elif n.type == syms.import_as_names and _find(name, n): return node elif n.type == syms.import_as_name: child = n.children[2] if child.type == token.NAME and child.value == name: return node elif n.type == token.NAME and n.value == name: return node elif package and n.type == token.STAR: return node return None
Q: Retrieve and store elements (according to conditions) from an array Given an array of 81 elements (meant to represent a 9x9 grid) how can I go over each element, grabbing the three around it and then performing an operation on those, then continuing to the next three of each row, column, or submatrix. Look below or at a sudoku grid to see the layout. define COL(n) ((n) % 9) define ROW(n) ((n) / 9) define SUB(n) ((n / 3) % 9) For example, I have int grid[81]; and int array_x[9], array_y[9], array_s[9]; Since the total 9x9 grid can be split into 9 of the following categories, there are nine elements in each array, and I hope to take the elements of each column (the x axis) in groups of threes, perform r = ((a = ~a) & (b = ~b)) | ((b | a) & ~c); // or r = ((~a & ~b)) | ((~b | ~a) & ~c); on them, take the three resultant numbers, and perform it on them, and then store it into the array. If this sounds impossible, sorry, I'd like a different way to do this. Definitely open to suggestions... A: Another try: void applyThingy(int *grid, int xPitch, int yPitch) { int row, column; int *rowPointer = grid; for(row = 0; row < 3; ++row) { int *columnPointer = rowPointer; for(column = 0; column < 3; ++column) { doOperation(columnPointer); columnPointer += xPitch; } rowPointer += yPitch * 9; } } applyThingy(&grid[SUB(n)], 1, 1); // Perform on 3x3 subgrid applyThingy(&grid[ROW(n)], 1, 0); // Perform on row applyThingy(&grid[COL(n)], 0, 1); // Perform on column
"I am the terror that flaps in the night! I am the disambiguation page that wastes your time! I am Negaduck!" 1991 — "Negaduck", the Season 2 episode. 1991 — Negaduck, the evil half of Darkwing created by the tronsplitter. 1991 — Negaduck, the evil Darkwing from the Negaverse.
Health Minister Datuk Seri Dzulkefly Ahmad speaks during a press conference in Kuala Lumpur February 4, 2020. — Picture by Firdaus Latif KUALA LUMPUR, Feb 4 — A Malaysian man has tested positive for the Wuhan virus, the first local to date, said Health Minister Datuk Seri Dzulkefly Ahmad at a press conference today. Dzulkefly said the man travelled to Singapore from January 16 to 23 to attend a meeting which had several foreign delegates, including from China. “He returned to Malaysia on January 23, and on January 29, he received treatment at a private hospital because of fever and cough. “Then, he was referred to the Sungai Buloh Hospital on February 2, and was admitted to the isolation ward. He was confirmed for the 2019-nCoV yesterday,” Dzulkefly said. He said the 41-year-old patient was stable, and the Health Ministry has contacted its Singaporean counterpart, which confirmed that it has begun tracing those who had been in contact with him. The minister also disclosed another confirmed infection, a 63-year-old Chinese national from Wuhan who landed at the Kuala Lumpur International Airport (KLIA) on January 18. Dzulkefly said he initially had light fever and received outpatient treatment at a private hospital in Kuala Lumpur. His case was flagged to the ministry, which then sequestered him at his home for a two-week observation period. “On February 2, his fever continued and he was then admitted to the Kuala Lumpur Hospital (HKL) for further treatment. The lab test result showed him to be positive for 2019-nCov on February 3. “The patient is currently in the isolation ward and is in stable condition,” Dzulkefly added. The two newest cases brings Malaysia’s total 2019-nCoV infections to 10, five of whom had been patients-under-investigation and the rest, those who had been in close contact. Of the latter five, four are in Hospital Sungai Buloh and one is in Johor’s Hospital Permai. Aside from the Malaysian, all the confirmed cases involve Chinese nationals. The minister said 213 PUIs were screened between January 10 and the evening of February 3, involving 122 Malaysians, eight Chinese nationals, and one each from Australia, South Korea, Jordan, Brazil and Thailand. Health authorities have cleared 188 while 20 PUIs are awaiting results of their laboratory tests. Of the 36 individuals located through contact tracing, 27 were negative and four are pending test results.
A-League expansion has become "a strategic priority" for FFA and Goal Australia understands the Apple Isle is ready to pounce Tasmania shapes as the early A-League expansion front-runner, with a consortium representing the island state set to meet with Football Federation Australia (FFA) next week. Goal Australia understands that a group looking to set up an A-League club in Tasmania are in a great position to make their case as they have government support at federal and state level, plus the backing of Football Federation Tasmania. Unlike other groups rumoured to be pushing for an A-League licence, the consortium behind Tasmania's application are understood to have a very detailed plan for how their club would be run with elements such as a home ground and ownership structure already finalised. The consortium, which reportedly includes former Melbourne Victory board members Harry Stamoulis and Robert Belteky, also apparently have the money in the bank to enter the A-League as soon as next season. Former South Melbourne midfielder and football agent David Clarkson - who grew up in Tasmania - is a driving force behind the bid. Goal Australia was unable to make contact with Clarkson for a comment. In an article in Hobart-based newspaper The Mercury last week, an FFA spokesman was quoted confirming the governing body has been contacted by a Tasmanian consortium interested in A-League expansion. "At this stage FFA have not engaged in formal dialogue with this group or any other groups as it would be premature to do so before a detailed road map for expansion has been finalised," the spokesman said. FFA has made it clear that expanding the A-League to a 12-team competition is a top priority once a new broadcast deal is finalised. The A-League's current broadcast deal with Fox Sports and SBS expires at the end of this season. While FFA CEO David Gallop has previously claimed the A-League should "fish where the fish are", indicating that capital cities would be a priority for expansion, more recent comments by him and Head of A-League Greg O'Rourke have given smaller areas and cities some hope. The past few months has seen numerous locations around Australia and New Zealand named as possible sites for A-League expansion. Victory have previously hosted A-League matches at Launceston's Aurora Stadium, while a former group known as Tasmania United were amongst the defeated bids for a licence when Melbourne Heart joined the competition in 2010-11.
Outside the envelope: rare events disrupt the relationshipbetween climate factors and species interactions. The order in which species arrive during community assembly can be an important driver of community composition and function. However, the strength of these priority effects can be variable, in part because of strong site and year effects. To understand how priority effects vary in importance with abiotic conditions, we initiated identical community assembly experiments in which we varied the timing of arrival of native and exotic grass species in each of 4 yr across three grassland sites in northern California. This uniquely replicated experiment tested the power of priority to determine initial community structure in a restoration context across a natural range of conditions. There were large and significant differences in both total seeded cover and the strength of priority across sites and years of initiation, confirming the suspicion that most ecological experiments may lack spatial and temporal generality. On the other hand, much of the variation in strength of priority could be related to climate. Strikingly, however, the model fit across the three sites and the first 3 yr of the study (the first nine experiments) was radically altered when we included the fourth year, which was characterized by an unusual weather pattern with higher temporal variability in rainfall (a rainfall pattern predicted to increase with climate change). This year produced relatively low strength of priority, supporting the suggestion that highly variable climates may be associated with lower strength of priority effects. Experiments that examine community assembly over a range of naturally occurring abiotic conditions enhance our ability to predict when priority effects will be important, allowing us to explore shifting patterns of community assembly in the face of climate change and optimize restoration strategies based on environmental conditions.
Q: Payflow Error 52: Insufficient permissions to perform transaction in test mode I am trying to configure payflow link application in test mode on codeigniter. I am doing this with Angell EYE PHP CodeIgniter Class Library for PayPal. I have set up my developer sandbox account and added a user of Business-Pro type and a user of Personal type. I have set up an account on manager.payflow.com and added a user with role 'API_FULL_TRANSACTIONS'. Now here is my /application/config/paypal.php file: <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); $config['Sandbox'] = TRUE; $config['APIVersion'] = '98.0'; $config['APIUsername'] = $config['Sandbox'] ? '/*here goes Business user username from sandbox*/' : ''; $config['APIPassword'] = $config['Sandbox'] ? '/*here goes Business user password*/' : ''; $config['APISignature'] = $config['Sandbox'] ? '/*here goes Business user API signature*/' : ''; $config['PayFlowUsername'] = $config['Sandbox'] ? '/*here goes username of a user with API_FULL TRANSACTIONS role on manager.paypal.com*/' : ''; $config['PayFlowPassword'] = $config['Sandbox'] ? '/*here goes password of a user with API_FULL TRANSACTIONS role on manager.paypal.com*/' : ''; $config['PayFlowVendor'] = $config['Sandbox'] ? '/*here goes login to manager.paypal.com*/' : ''; $config['PayFlowPartner'] = $config['Sandbox'] ? 'PayPal' : ''; $config['ApplicationID'] = $config['Sandbox'] ? '' : 'PRODUCTION_APP_ID_GOES_HERE'; $config['DeveloperEmailAccount'] = '/*my email at developer.paypal.com*/'; $config['DeviceID'] = ''; Next I'm running the function in the /application/controllers/payflow.php controller: function Process_transaction_demo() { $PayPalRequestData = array( 'tender'=>'P', //also tried this with 'C' 'trxtype'=>'S', 'acct'=>'/*here goes card number for Personal type sandbox acct*/', 'expdate'=>'0419', // as in sandbox Personal acct settings 'amt'=>'10.00', 'dutyamt'=>'', 'freightamt'=>'5.00', 'taxamt'=>'2.50', 'taxexempt'=>'', 'comment1'=>'This is a test!', 'comment2'=>'This is only a test!', 'cvv2'=>'123', 'recurring'=>'', 'swipe'=>'', 'orderid'=>'', 'billtoemail'=>'', // as in sandbox Personal acct settings 'billtophonenum'=>'816-555-5555', 'billtofirstname'=>'Tester', 'billtomiddlename'=>'' 'billtolastname'=>'Testerson', 'billtostreet'=>'123 Test Ave.', 'billtocity'=>'Kansas City', 'billtostate'=>'MO', 'billtozip'=>'64111', 'billtocountry'=>'US', 'shiptofirstname'=>'Tester', 'shiptomiddlename'=>'', 'shiptolastname'=>'Testerson', 'shiptostreet'=>'123 Test Ave.', 'shiptocity'=>'Kansas City', 'shiptostate'=>'MO', 'shiptozip'=>'64111', 'shiptocountry'=>'US', 'origid'=>'', 'custref'=>'', 'custcode'=>'', 'custip'=>'', 'invnum'=>'', 'ponum'=>'', 'starttime'=>'', 'endtime'=>'', 'securetoken'=>'', 'partialauth'=>'', 'authcode'=>'' ); $PayPalResult = $this->paypal_payflow->ProcessTransaction($PayPalRequestData); if(!$this->paypal_payflow->APICallSuccessful($PayPalResult['RESULT'])) { // Error echo '<pre />'; print_r($PayPalResult); } else { // Successful call. Load view or whatever you need to do here. echo '<pre />'; print_r($PayPalResult); } } And the respnse I get is: Array ( [RESULT] => 52 [PNREF] => A7P06B2A9D83 [RESPMSG] => Insufficient permissions to perform transaction [RAWREQUEST] => /*request details*/ [RAWRESPONSE] => RESULT=52&PNREF=A7P06B2A9D83&RESPMSG=Insufficient permissions to perform transaction ) Why does it keep returning this error? The permission for the user on manager.paypal.com is set to 'API_FULL_TRASACTIONS' (also tried with 'ADMIN', 'ADMIN_TRANSACTIONS', 'FULL_TRASACTIONS' - all give same response). What should configuration be to process test payments? A: So, you said PayFlow Link in your first paragraph, but that's something completely different from Express Checkout or Payments Pro, which is what it looks like you're trying here. If you use TENDER=C and you're getting that error it likely means you don't have Payments Pro enabled on your PayPal account. You mentioned that you do, but can you confirm that it's actually activated and setup for test mode? You should see a little table with the status of the account on the overview page when you login to the PayPal Manager site. If you're using P to try and setup an Express Checkout flow then you would need to make sure you remove the credit card number from the request. As a side note, the sample code you pasted here is missing a comma in the $PayPalRequestData array after the billtomiddlename parameter. I had to fix that before it would run at all. With that fixed, I was able to successfully run your sample request with a test credit card number from the PayFlow documentation. Array ( [RESULT] => 0 [PNREF] => A10M6CE2A65B [RESPMSG] => Approved [AUTHCODE] => 000041 [AVSADDR] => Y [AVSZIP] => N [CVV2MATCH] => Y [PROCAVS] => A [PROCCVV2] => M [TRANSTIME] => 2014-04-23 01:43:58 [BILLTOFIRSTNAME] => Tester [BILLTOLASTNAME] => Testerson [AMT] => 10.00 [ACCT] => 1881 [EXPDATE] => 0419 [CARDTYPE] => 0 [IAVS] => N [RAWREQUEST] => BUTTONSOURCE[18]=AngellEYE_PHPClass&VERBOSITY[4]=HIGH&USER[6]=****&VENDOR[9]=****&PARTNER[6]=PayPal&PWD[8]=****&TENDER[1]=C&TRXTYPE[1]=S&ACCT[16]=4012888888881881&EXPDATE[4]=0419&AMT[5]=10.00&FREIGHTAMT[4]=5.00&TAXAMT[4]=2.50&COMMENT1[15]=This is a test!&COMMENT2[20]=This is only a test!&CVV2[3]=123&BILLTOPHONENUM[12]=816-555-5555&BILLTOFIRSTNAME[6]=Tester&BILLTOLASTNAME[9]=Testerson&BILLTOSTREET[13]=123 Test Ave.&BILLTOCITY[11]=Kansas City&BILLTOSTATE[2]=MO&BILLTOZIP[5]=64111&BILLTOCOUNTRY[2]=US&SHIPTOFIRSTNAME[6]=Tester&SHIPTOLASTNAME[9]=Testerson&SHIPTOSTREET[13]=123 Test Ave.&SHIPTOCITY[11]=Kansas City&SHIPTOSTATE[2]=MO&SHIPTOZIP[5]=64111&SHIPTOCOUNTRY[2]=US [RAWRESPONSE] => RESULT=0&PNREF=A10M6CE2A65B&RESPMSG=Approved&AUTHCODE=000041&AVSADDR=Y&AVSZIP=N&CVV2MATCH=Y&PROCAVS=A&PROCCVV2=M&TRANSTIME=2014-04-23 01:43:58&BILLTOFIRSTNAME=Tester&BILLTOLASTNAME=Testerson&AMT=10.00&ACCT=1881&EXPDATE=0419&CARDTYPE=0&IAVS=N ) I ran it with TENDER=P, too, and I got an expected error that the tender type isn't enabled on my account. So I would double check your API credentials, and maybe even try switching it to FULL_TRANSACTIONS and see if that helps.
Joy Fit Motherhood Life By Barbara Christensen - 10:38 AM http://ift.tt/2uOh1nA via IFTTT Heading into six weeks or so of old school weight lifting. This morning was #chest and #delts. ... I am going to feel that tomorrow. ;) now onto recovery with a nice #plantbased shake. I have some goals and I wanted to get into this before we start our next #vegan #shred group next week. #almost50 #bodybuilding #goals #shredlife Just a moment of Joy Fit Motherhood today!
LETTER Nathaniel Hanula-James’ article “‘Collage and Conflict: Manifestos on the Politics of Visual Art’” (Culture, October 21, Page 20) somehow manages to miss the mark on both politics and visuality. Hanula-James opens his article by quoting the ‘purple introductory blurb’ that accompanies Theodore Harris’ collages, which were on display last week at Cafe Artère as part of QPIRG’s Culture Shock event series. Hanula-James cites the blurb and insufficient effort in drawing attention to the collages as the exhibition’s pitfalls. Had Hanula-James bothered to read the introduction in its entirety, he would have realized that the author of the ‘purple prose’ is Amiri Baraka. For those not familiar, Baraka is one of the most important black American intellectuals of the last 50 years: from founding a publishing house that represented Allen Ginsberg and Jack Kerouac, to writing seminal prose, poetry, and non-fiction texts on black identity and politics throughout the civil rights movement, to holding teaching posts at San Francisco State, Rutgers, and Columbia. He is now professor emeritus in African Studies at Stony Brook University. Baraka’s prolific career has not been without controversy. His shifting positions on feminism, queer politics, marxism, nationalism, anti-semitism, and violence have been divisive for as long as he has been writing. In the context of the exhibition, Baraka’s contributions add depth to the art and its presentation: Why did Harris choose this introduction? What relationship does Harris see between his work and Baraka’s? Given that Harris and Baraka are a generation apart, to what extent and how are politics being passed between the artists? Hanula-James would have done well to ask himself about the identity and relevance of the person writing the introduction. Perhaps, had he been less immobilized by intellectual laziness, he would have been rewarded with a greater appreciation for the exhibition as counter-histories, forgotten events, and under-represented debates would have become legible through Baraka’s legacy and framing. To say nothing of the self-righteousness necessary for the McGill rank and file to cast uninformed judgment on Professor Baraka’s work, hopefully, the next time The Daily decides to mock and belittle his writing, they will have the decency to call him by name. —Liam MayesM.A. student in Communication Studies Comments posted on The McGill Daily's website must abide by our comments policy.A change in our comments policy was enacted on January 23, 2017, closing the comments section of non-editorial posts. Find out more about this change here.
By the year 2020, you won't need a keyboard and mouse to control your computer, say Intel Corp. researchers. Instead, users will open documents and surf the Web using nothing more than their brain waves. Scientists at Intel's research lab in Pittsburgh are working to find ways to read and harness human brain waves so they can be used to operate computers, television sets and cell phones. The brain waves would be harnessed with Intel-developed sensors implanted in people's brains. The scientists say the plan is not a scene from a sci-fi movie -- Big Brother won't be planting chips in your brain against your will. Researchers expect that consumers will want the freedom they will gain by using the implant. Follow me on Twitter. Technological Singularity and Futurism is updated often; the easiest way to get your regular dose is by subscribing to our news feed. Stay on top of all our updates by subscribing now via RSS or Email.
Early Super Bowl Betting Line Favors AFC Added on Jan 17, 2013 by Jack Thurman in Although the Super Bowl matchup won’t be set until after Sunday’s NFC and AFC Conference Championship games there are already lines popping up for the big game at sports books worldwide. These betting propositions are giving the AFC the edge in winning Super Bowl XLVII in New Orleans though by most metrics it should be a very close game. The most popular type of ‘early’ Super Bowl line is a bet where you can choose to back the AFC entrant or NFC entrant. Currently the AFC team (eg: Baltimore or New England) is a -2.5 favorite over the NFC team (San Francisco or Atlanta). On the money line, that makes the AFC a -140 favorite with a +120 takeback on the NFC side. There are also early totals posted as well–the Over/Under for the Super Bowl is posted at 50.5. Obviously if you like a particular team (or particular matchup) this is a good way to lock in betting value that wouldn’t be available when the matchups are actually determined. For example if you think that Baltimore will beat New England on Sunday but lose to San Francisco in the Super Bowl you’d be well advised to bet the NFC +2′ now. Given the power ratings of the teams the Niners would almost certainly be a betting favorite against the Ravens and as such having the NFC +2′ would look awfully good. Some sports books are also offering odds on specific matchups though no totals are currently available for these games. San Francisco would be a -3.5 favorite over the Baltimore Ravens which underscores the value implicit in betting the NFC now if you think the Ravens will advance. The Niners would be a +2 underdog to New England which makes the early bet on the NFC look less attractive. Should the Atlanta Falcons advance to the Super Bowl they would be a -1′ point favorite over the Baltimore Ravens and a +6 underdog to the New England Patriots. The specific matchup bets offer one significant advantage over the NFC vs. AFC bet–if the matchup you bet on doesn’t transpire the bet is ‘no action’. That means if you like San Francisco to win the Super Bowl but Atlanta pulls the upset in the NFC Championship you wouldn’t be stuck with a bet on them.
Hightstown, New Jersey Hightstown is a borough in Mercer County, New Jersey, United States. As of the 2010 United States Census, the borough's population was 5,494, reflecting an increase of 278 (+5.3%) from the 5,216 counted in the 2000 Census, which had in turn increased by 90 (+1.8%) from the 5,126 counted in the 1990 Census. Hightstown was incorporated as a borough by an act of the New Jersey Legislature on March 5, 1853, within portions of East Windsor Township. The borough became fully independent c. 1894. Additional portions of East Windsor Township were annexed in 1913, 1915 and 1927. The traditional explanation is that the borough was named for John and Mary Hight, who established a tavern in the area in the 1750s. Geography According to the United States Census Bureau, the borough had a total area of 1.242 square miles (3.218 km2), including 1.211 square miles (3.137 km2) of land and 0.031 square miles (0.081 km2) of water (2.52%). The borough is an independent municipality surrounded entirely by East Windsor Township, making it part one of 21 pairs of "doughnut towns" in the state, where one municipality entirely surrounds another. Hightstown is at the central-most point of New Jersey and is roughly equidistant from Philadelphia and New York City. Climate According to the Köppen climate classification system, Hightstown, New Jersey has a hot-summer, wet all year, humid continental climate (Dfa). Dfa climates are characterized by at least one month having an average mean temperature ≤ 32.0 °F (≤ 0.0 °C), at least four months with an average mean temperature ≥ 50.0 °F (≥ 10.0 °C), at least one month with an average mean temperature ≥ 71.6 °F (≥ 22.0 °C), and no significant precipitation difference between seasons. During the summer months, episodes of extreme heat and humidity can occur with heat index values ≥ 100 °F (≥ 38 °C). On average, the wettest month of the year is July which corresponds with the annual peak in thunderstorm activity. During the winter months, episodes of extreme cold and wind can occur with wind chill values < 0 °F (< -18 °C). The plant hardiness zone is 7a with an average annual extreme minimum air temperature of 0.0 °F (-17.8 °C). The average seasonal (November–April) snowfall total is , and the average snowiest month is February which corresponds with the annual peak in nor'easter activity. Ecology According to the A. W. Kuchler U.S. potential natural vegetation types, Hightstown, New Jersey would have an Appalachian Oak (104) vegetation type with an Eastern Hardwood Forest (25) vegetation form. Demographics 2010 Census The Census Bureau's 2006-2010 American Community Survey showed that (in 2010 inflation-adjusted dollars) median household income was $66,250 (with a margin of error of ± $8,281) and the median family income was $72,583 (± $13,355). Males had a median income of $49,861 (± $9,561) versus $42,361 (± $14,837) for females. The per capita income for the borough was $32,976 (± $3,402). About 8.2% of families and 8.7% of the population were below the poverty line, including 17.2% of those under age 18 and 1.1% of those age 65 or over. 2000 Census As of the 2000 United States Census there were 5,216 people, 2,001 households, and 1,300 families residing in the borough. The population density was 4,251.9 people per square mile (1,637.3/km2). There were 2,081 housing units at an average density of 1,696.4 per square mile (653.2/km2). The racial makeup of the borough was 76.53% White, 8.51% African American, 0.36% Native American, 2.28% Asian, 0.08% Pacific Islander, 9.64% from other races, and 2.59% from two or more races. Hispanic or Latino of any race were 20.05% of the population. There were 2,001 households out of which 30.3% had children under the age of 18 living with them, 51.7% were married couples living together, 8.5% had a female householder with no husband present, and 35.0% were non-families. 27.9% of all households were made up of individuals and 9.6% had someone living alone who was 65 years of age or older. The average household size was 2.60 and the average family size was 3.15. In the borough the population was spread out with 22.5% under the age of 18, 8.0% from 18 to 24, 36.8% from 25 to 44, 21.9% from 45 to 64, and 10.8% who were 65 years of age or older. The median age was 36 years. For every 100 females, there were 103.4 males. For every 100 females age 18 and over, there were 101.2 males. The median income for a household in the borough was $64,299, and the median income for a family was $72,092. Males had a median income of $46,375 versus $35,428 for females. The per capita income for the borough was $28,605. About 4.3% of families and 7.3% of the population were below the poverty line, including 9.1% of those under age 18 and 4.4% of those age 65 or over. As of the 2000 Census, 6.31% of Hightstown's residents identified themselves as being of Ecuadorian ancestry, which was the second highest of any municipality in New Jersey and the sixth highest percentage of Ecuadorian people in any place in the United States with 1,000 or more residents identifying their ancestry. Government Local government Hightstown is governed under the Borough form of New Jersey municipal government, which is used in 218 municipalities statewide, making it the most common form of government in New Jersey. The governing body consists of a Mayor and a Borough Council comprising six council members, with all positions elected at-large on a partisan basis as part of the November general election. A Mayor is elected directly by the voters to a four-year term of office. The Borough Council consists of six members elected to serve three-year terms on a staggered basis, with two seats coming up for election each year in a three-year cycle. The Borough form of government used by Hightstown, the most common system used in the state, is a "weak mayor / strong council" government in which council members act as the legislative body with the mayor presiding at meetings and voting only in the event of a tie. The mayor can veto ordinances subject to an override by a two-thirds majority vote of the council. The mayor makes committee and liaison assignments for council members, and most appointments are made by the mayor with the advice and consent of the council. , the Mayor of the Borough of Hightstown is Democrat Lawrence D. Quattrone, whose term of office ends on December 31, 2022. Borough Council members are Council President Steven Misiura (D, 2019), Susan Bluth (D, 2021), Joe Cicalese (D, 2020; elected to serve an unexpired term), Joshua Jackson (2019), Dimitri Musing (D, 2021) and Charles "Lee" Stults (R, 2020). In January 2019, the Borough Council selected Patricia Egan from a list of three candidates nominated by the Republican municipal committee to fill the seat expiring in December 2020 that became vacant the previous month following the resignation of Connor Montferrat. At that same meeting, the council chose Joshua Jackson from a list of three Democrats to fill the seat scheduled to expire in December 2019 that had been held by Denise "Denny" Hansen until she resigned from office in December 2018. In the November 2019 general election, Democrat Joseph Cicalese was elected to serve the balance of Connor Montferrat's term of office through December 2020. In January 2015, the council selected former council president Susan Bluth to fill the vacant council seat expiring in December 2015 of Larry Quattrone, who left office when he was sworn in as mayor. Seth Kurs was appointed in April 2014 from among three prospective candidates to fill the vacant seat expiring in 2015 of Gail Doran, who had resigned earlier in the month, citing personal reasons. The term of the appointment ran through November 14, 2014, after which Seth Kurs was elected in the general election to complete the remaining unexpired term through December 31, 2015. Federal, state and county representation Hightstown is located in the 12th Congressional District and is part of New Jersey's 14th state legislative district. Prior to the 2011 reapportionment following the 2010 Census, Hightstown had been in the 12th state legislative district. Prior to the 2010 Census, Hightstown had been part of the , a change made by the New Jersey Redistricting Commission that took effect in January 2013, based on the results of the November 2012 general elections. Politics As of March 23, 2011, there were a total of 2,891 registered voters in Hightstown, of which 1,105 (38.2%) were registered as Democrats, 542 (18.7%) were registered as Republicans and 1,241 (42.9%) were registered as Unaffiliated. There were 3 voters registered to other parties. In the 2012 presidential election, Democrat Barack Obama received 64.6% of the vote (1,369 cast), ahead of Republican Mitt Romney with 33.4% (707 votes), and other candidates with 2.0% (42 votes), among the 2,308 ballots cast by the borough's 3,062 registered voters (190 ballots were spoiled), for a turnout of 75.4%. In the 2008 presidential election, Democrat Barack Obama received 66.8% of the vote (1,504 cast), ahead of Republican John McCain with 30.4% (685 votes) and other candidates with 1.6% (36 votes), among the 2,253 ballots cast by the borough's 2,962 registered voters, for a turnout of 76.1%. In the 2004 presidential election, Democrat John Kerry received 59.3% of the vote (1,254 ballots cast), outpolling Republican George W. Bush with 36.4% (771 votes) and other candidates with 0.9% (25 votes), among the 2,116 ballots cast by the borough's 2,776 registered voters, for a turnout percentage of 76.2. In the 2013 gubernatorial election, Republican Chris Christie received 57.9% of the vote (765 cast), ahead of Democrat Barbara Buono with 38.8% (512 votes), and other candidates with 3.3% (44 votes), among the 1,341 ballots cast by the borough's 2,961 registered voters (20 ballots were spoiled), for a turnout of 45.3%. In the 2009 gubernatorial election, Republican Chris Christie received 46.2% of the vote (700 ballots cast), ahead of Democrat Jon Corzine with 44.8% (679 votes), Independent Chris Daggett with 7.1% (107 votes) and other candidates with 1.1% (16 votes), among the 1,514 ballots cast by the borough's 2,908 registered voters, yielding a 52.1% turnout. Education Students in public school for kindergarten through twelfth grade attend the East Windsor Regional School District. The comprehensive school district serves students from East Windsor Township and Hightstown, along with students in grades 7 - 12 from Roosevelt (in Monmouth County) who attend as part of a sending/receiving relationship. As of the 2017–18 school year, the district and its six schools had an enrollment of 5,231 students and 427.9 classroom teachers (on an FTE basis), for a student–teacher ratio of 12.2:1. Schools in the district (with 2017-18 enrollment data from the National Center for Education Statistics) are Walter C. Black Elementary School (557; K-2), Ethel McKnight Elementary School (493; K-2), Perry L. Drew Elementary School (659; 3-5), Grace N. Rogers Elementary School (594; PreK-5), Melvin H. Kreps Middle School (1,228; 6-8) and Hightstown High School (1,616, 9-12). Eighth grade students from all of Mercer County are eligible to apply to attend the high school programs offered by the Mercer County Technical Schools, a county-wide vocational school district that offers full-time career and technical education at its Health Sciences Academy, STEM Academy and Academy of Culinary Arts, with no tuition charged to students for attendance. Hightstown is also home to the Peddie School, a coeducational, independent high school founded in 1864. Transportation Roads and highways , the borough had a total of of roadways, of which were maintained by the municipality, by Mercer County and by the New Jersey Department of Transportation. Hightstown is located at the cross-roads of several major roads. The main highway through the borough is Route 33 (which is also concurrent with County Route 539 and County Route 571). A small portion of U.S. Route 130 passes through the northwest corner and is accessible by Route 33, CR 571 and CR 539. Highways located just outside the borough include the New Jersey Turnpike (Interstate 95) and New Jersey Route 133, which both intersect with Route 33 at Exit 8 of the turnpike. Public transportation The Greater Mercer Transportation Management Association offers service on the Route 130 Connection between the Trenton Transit Center and South Brunswick. The Princeton Junction Shuttle connects East Windsor Township and Hightstown with the Princeton Junction Rail Station. There is also direct service to New York, as well as other New Jersey communities on the Suburban Coach route 300 to and from the Port Authority Bus Terminal, Grand Central Terminal and other destinations in Midtown Manhattan and the 600 route to and from Downtown Manhattan / Wall Street. Railroads Hightstown was formerly served by the Camden & Amboy Railroad (C&A), the first chartered railway company in the state and the third-oldest in the United States. Service to Hightstown began in December 1831 using the British-built John Bull locomotive. C&A was acquired by the Pennsylvania Railroad (PRR) in 1871 after consolidating it with the United New Jersey Railroad and Canal Company. Ownership was later transferred to Penn Central (PC) in 1968, following by Conrail in 1976 after PC went bankrupt. In early 1982, Conrail ended freight service to Hightstown on what was known as the Hightstown Industrial Track and filed for abandonment that fall. Trackage was removed in March 1983. Notable people People who were born in, residents of, or otherwise closely associated with Hightstown include: Kay B. Barrett (1902-1995), Hollywood talent scout who acquired the movie rights to the book Gone with the Wind. Estelle Brodman (1914-2007), medical librarian and academic, lived in Hightstown after her retirement. Hilly Kristal (1931-2007), founder and owner of the New York City music club CBGB. Larry Kelley (1915-2000), football player who won the Heisman Trophy in 1936. Desiree Lubovska (1893-1974), founded the American National Ballet School at Hightstown in 1921. Worrall Frederick Mountain (1909-1992), Justice of the New Jersey Supreme Court from 1971 to 1979. Elizabeth Greenleaf Pattee (1893–1991), architect, landscape architect and architecture professor. Randal Pinkett (born 1971), business consultant who in 2005 was the winner of season four of the reality television show, The Apprentice. Jonathan Sprout (born 1952), songwriter, performer and recording artist. Martin Waldron (1925–1981), winner of the 1964 Pulitzer Prize for reporting on unchecked spending on the Florida Turnpike. Charles L. Walters (c. 1862 - 1894), politician who served in the New Jersey General Assembly. Paul Watkins (born 1964), novelist. John Archibald Wheeler (1911–2008), physicist. Nick Williams (born 1990), wide receiver who has played in the NFL for the Washington Redskins. John Woodruff (1915-2007), Gold Medalist at 800 metres at the 1936 Summer Olympics in Berlin. References External links Hightstown Borough website Downtown Hightstown East Windsor Regional School District School Data for the East Windsor Regional School District, National Center for Education Statistics Category:1853 establishments in New Jersey Category:Borough form of New Jersey government Category:Boroughs in Mercer County, New Jersey Category:Populated places established in 1853
SSC Coaching - Chandigarh Everyone dreams of having a secured and lucrative job and yearns for the perks that come along. Having a government job and clearing the SSC exam is highly reputable and needs a lot of preparation and the right guidance to fulfill your dreams. Today, the youth is looking for the best SSC coaching in Chandigarh, to clear the exam in the first attempt, and have a rewarding career ahead. There are lakhs of applications that are filled for the entrance exams and almost, all the applicant's lookout for the SSC coaching classes that have experienced faculty, a record of successful candidates, and affordable fees. On Grotal, you can find more than 50 SSC coaching institutes in Chandigarh and get started with your preparation to grab a job in the desired Ministry of Government Services. For the best SSC coaching in Chandigarh, there are few points to consider before you get enrolled in a particular institute and invest your parent’s hard-earned money. For result-oriented and assured selection, one should opt for SSC coaching in Chandigarh with highly experienced faculty, a high percentage of successful candidates, and affordable fees. The Customer Support Team at Grotal is available to answer all your queries, 24x7. Frequently Asked Questions (FAQs) Q. Why do I need SSC Coaching? Q. Can I find an institute that provides SSC classes near me? Q. How many sections are there in the SSC Exam? Q. What other exams I can crack, by taking SSC coaching? Q. What is the fee of SSC coaching in Chandigarh? By clearing the SSC exam, there are ample prosperous job opportunities in various Departments and Ministries with the Government of India and other sub-ordinate offices. Many SSC Coaching Centers in Chandigarh provides 100% success to their students, in the first attempt. Still, it is highly recommended to skim through various options available and then choose the best SSC coaching institute based on your requirements. Grotal provides an extensive list of the famous SSC coaching institutes in Chandigarh so that you can contact the respective centers and easily make the right decision, through us.Yes, On Grotal, you can scan through various SSC Coaching Institutes, located at different locations in Chandigarh.The preliminary exam has 100 questions, of 2-marks each, divided into four sections:ReasoningGeneral AwarenessQuantitative AptitudeEnglish LanguageThe duration of the exam is 75-minutes, and the cut-off varies from 69 to 88, correct attempts, out of 100.Once you clear your SSC exam, various job prospects are bolstered with the assurance of secured, reputed, and lucrative job prospects. Joining SSC coaching centers, will help you gain relevant industry expertise and learn suitable skills to crack different SSC exams like SSC JE, SSC CGL, SSC CHSL, SSC DEO, SSC MTS, SSC SO, etc.It entirely depends on your choice of the institute for SSC coaching. Generally, the fee structure lies between Rs. 18,000 to Rs. 22,000.
Hypycnopa Hypycnopa is a genus of moths in the family Geometridae. References Category:Geometridae
The best 'magic pill' when it comes to weight loss Let me be completely honest with you: Yes, I once considered taking diet pills to help me lose weight. Now it's your turn: Have you ever considered taking those pills? Maybe right now? If so, this article is something you should read! You have the strong desire to lose weight? But you don't know how to do it? Nothing seems to work and you're trying really hard. Diet pills seem like a magical solution with all those extravagant promises. I totally understand you. I was in the same position, that's why I started to do some research. In fact, the drugs that promise to help you shed your extra pounds in no time hold many hidden dangers to your health. If you ask me, weight loss pills may represent the next big drug catastrophe. Many diet pills contain DNP, which is very dangerous and illegal. But illegal doesn't mean, that it can't be sold. In fact, many pills which contain DNP are sold alongside legal weight loss drugs, which makes it difficult for the FDA to stop the sale of those drugs. First, I want to go more into detail how those diet pills work. Function There are several ways diet pills achieve their effects. Some of them block or decrease the amount of fat your body is capable to absorb from the food you eat. Others will decrease your appetite. And the third type increases your metabolism, meaning the amount of calories your burn. Sounds nice, doesn't it? Actually not, here are the side effects. Side effects Most diet pills have side effects. Fat-blocking drugs keep you from digesting all the fat in your food. Now, as your body rids itself of that fat you ate, you most likely will experience uncontrollable diarrhoea. Doesn't sound like fun at all to me. Not convinced yet? Long term use of diet pills makes you six times more likely to increase the pressure on your arteries in your lungs. This may result in breathing problems. Especially sibutramine and seridia, cause stroke and increased blood pressure. Amphetamine-like drugs can have similar effects. Stimulant-type drugs, such as phentermine, may lead to insomnia, increased blood pressure, increased heart rate, drug dependence and withdrawal symptoms. Weight loss pills that interact with the neurotransmitters in your brain, such as belviq or contrave, may cause headache, nausea, vomiting, constipation, dry mouth and dizziness. Plus, what most people forget: What happens after you stop taking those drug? You'll regain some or even all of the weight you lost. You see, the list is long and it's not even all. Here are some reasons why you have to be careful with the use of weight loss pills: Lack of labelling It's one of the worst things: manufacturers don't have to disclose what their products actually contain. Hence, there are often fillers in there that don't have to be listed. Even if the main ingredient doesn't have any side effects, the filler the company used might have. Plus over 20% of all manufacturers made illegal claims on the label, stating that the product cured or treated diseases. Not regulated Especially when it comes to herbal diet pills. They're often labeled "all natural", but the FDA considers these pills more a food than a drug. Therefore, the regulations are different and seemingly more lax than for prescription diet pills. Furthermore, many other diet pills sold as health supplements are also unregulated by the FDA. They are simply ineffective Many diet pill simply cause water loss, because they are a combination of caffeine and diuretics. Sure, this results in a lower number on the scale, but you didn't lost any body fat and the water weight will return. Additionally, losing too much water can cause dangerous dehydration. You won't change your habits If you're looking for long term success you need a change in your eating and exercise behaviour. That's the only way to adopt healthier habits and a healthier lifestyle. Taking a pill as a quick method doesn't encourage you to understand how nutrition and exercise affect your body. This shortcut will make you less likely to check food labels, track your food intake and get your workout done. You can't take diet pills forever and once you stop taking them, your poor habits will take over and you'll gain all your weight back. Risk of vitamin deficiency Vitamin A, D, E and K are fat soluble. Meaning they are digested with fat and stored in your body fat and liver. Some diet pills can block the absorption of dietary fat, which means these vitamins will be excreted from the body instead of being used as they are supposed to be. You may become addicted Most diet pills contain amphetamines. Amphetamines are anti-anxiety drugs and antidepressants. This is not only dangerous, but highly addictive. What is the best 'magic pill' now? There is no diet drug that's safe and effective long term. Here is the best 'magic pill' for you: Your mind. You have to change the way you think about weight loss in order to actually change. Mind over matter. You have to learn to use your full willpower and you will reach your goals. And remember: you can lose the exact same amount of body fat you can lose with pills by simply being in a caloric deficit. There's not visual difference, but a health one. Just eat less calories and safe the money!
The spy scandal in the United States is moving toward a swift end this morning, with 10 Russian agents set to be deported after all pleading guilty in a Manhattan courtroom. A judge ordered all 10 of the spies to be immediately expelled from the US and said they must never attempt to return, in the biggest spy swap deal since the end of the Cold War. In exchange, Russia will release four prisoners of US interest, including Russian scientist Igor Sutyagin, who has been serving a prison sentence for passing information to the CIA. Sutyagin's lawyer said her client may already have been released from a Russian jail and taken to Vienna, Austria, as part of the deal. The spy swap is believed to have been sewn up in talks between the Russian ambassador and a senior US state department official. In pleading guilty to being foreign agents, the 10 "will have to agree to immediate removal," Judge Kimba Wood said in New York. That meant "immediate expulsion from the United States" and the defendants would have to "agree never to attempt to return to the US". Speaking outside the courtroom, the lawyer for Anna Chapman, one of the Russian agents, said his client was not afraid to be returned to Russia and said he expected the spy swap to be carried out within the next 24 hours. The US Justice Department confirmed the deal with Russia. "The key provision of the United States-Russia agreement is that the Russian Federation has agreed to release four individuals who are incarcerated in Russia for alleged contact with Western intelligence agencies," a Justice Department statement said. The suspects each pleaded guilty to one charge of conspiracy to act as an unregistered agent of a foreign country. A spokeswoman for Russian president Dmitry Medvedev confirmed that the Kremlin was pardoning four Russians, including Sutyagin. Three of the prisoners who will be released in Russia were reportedly convicted of treason and are serving lengthy prison terms. The 10 spy suspects were arrested on June 27 in an FBI swoop in Boston and the New York and Washington areas. They were accused of being members of a "deep-cover" spy ring tasked by the Russian secret service with infiltrating US policy-making circles. An 11th suspect, accused paymaster Christopher Metsos, remains at large after vanishing last week in Cyprus following a court decision to release him on bail. -ABC/wires
Immune-Signaling Molecules and Obesity-Induced Inflammation. Obesity-induced inflammation is closely associated with the development of metabolic complications such as insulin resistance and type 2 diabetes. Several immune-signaling receptors and their counterpart ligands are known to be crucial for crosstalk between the adaptive and innate immune system, and they are implicated in various inflammatory pathologies. In this mini-review, I will discuss the involvement of the immune costimulatory molecule 4-1BB and its ligand in obesity-induced inflammation and metabolic complications.
-- -*- coding: utf-8 -*- -- licensed under GPL, any version newPackage( "Graphics", Version => "0.2", Date => "February 26, 2010", Authors => { {Name => "Baptiste Calmès", HomePage => "http://www.math.uni-bielefeld.de/~bcalmes/"}, {Name => "Viktor Petrov"} }, Headline => "create graphics", DebuggingMode => false) -- Put here the name of functions that should be visible to users export{ "Point2D", "Point3D", "Segment2D", "Segment3D", "Polygon2D", "Polygon3D", "Circle", "Sphere", "TextTag", "GraphicPrimitive", "FormattedGraphicPrimitives", "Picture", "point", "segment", "polygon", "circle", "sphere", "textTag", "formatGraphicPrimitives", "picture", "pictureZone", "mergeFormattedGraphicPrimitives", "svgObject", "svgPicture", "defaultSVGOpening", "pgfObject", "pgfPicture", "viewPicture" } -- Variables that can be modified by the user exportMutable{ "possibleSVGOptions", "defaultSVGOptions", "defaultSVGValues", "defaultSVGHeading", "defaultSVGClosing", "possiblePGFOptions", "defaultPGFOptions", "defaultPGFValues" } -- Package code --Defining the class of a GraphicPrimitive. It will have child types like Points, etc. GraphicPrimitive = new Type of BasicList --Defining the class of a FormattedGraphicPrimitives. It is a basic list that contains a list of GraphicPrimitives and a hash table of formatting options (like color, thickness, width, etc.) FormattedGraphicPrimitives = new Type of BasicList --Defining the class of a FormattedGraphicPrimitive. It is a basic list that contains a GraphicPrimitive and a hash table of formatting options (like color, thickness, width, etc.) --FormattedGraphicPrimitive = new Type of BasicList --Defining the class of a Picture. It is a basic list containing FormattedGraphicPrimitives. Some functions should be written to optimize it as far as options are concerned. The order of the FGPs should not be changed, for reasons of what should appear above what on screen. Picture = new Type of BasicList --Defining the class of a point (each point is at least two coordinates) Point2D = new Type of GraphicPrimitive --Defining the class of a point (each point is at least two coordinates) Point3D = new Type of GraphicPrimitive --Defining the class of a line segment (two points) Segment2D = new Type of GraphicPrimitive --Defining the class of a line segment (two points) Segment3D = new Type of GraphicPrimitive --Defining the class of a polygon (set of points) Polygon2D = new Type of GraphicPrimitive --Defining the class of a polygon (set of points) Polygon3D = new Type of GraphicPrimitive --Defining the class of a sphere (a center point and a radius) Circle = new Type of GraphicPrimitive --Defining the class of a sphere (a center point and a radius) Sphere = new Type of GraphicPrimitive --Defining the class of a text tag (a string and a position where to put it) TextTag = new Type of GraphicPrimitive --Making a Point (2D or 3D) point = method() point(ZZ,ZZ) := (x,y) -> new Point2D from {x,y} point(RR,RR) := (x,y) -> new Point2D from {round(x),round(y)} point(ZZ,ZZ,ZZ) := (x,y,z) -> new Point3D from {x,y,z} point(RR,RR,RR) := (x,y,z) -> new Point3D from {round(x),round(y),round(z)} --Making a Segment from points segment = method() segment(Point2D,Point2D) := (p,q) -> new Segment2D from {p,q} segment(Point3D,Point3D) := (p,q) -> new Segment3D from {p,q} --Making a polygon from a list points polygon = method() polygon(List) := (L) -> ( cl:=keys set(class\L); if cl === {Point2D} then return new Polygon2D from L; if cl === {Point3D} then return new Polygon3D from L; error "The list should be non empty, all elements in it should have the same type, either Point2D or Point3D." ) --Making a circle from a center point and a radius circle = method() circle(Point2D,ZZ) := (p,r) -> new Circle from {p,r} circle(Point2D,RR) := (p,r) -> new Circle from {p,round(r)} --Making a sphere from a center point and a radius sphere = method() sphere(Point3D,ZZ) := (p,r) -> new Sphere from {p,r} sphere(Point3D,RR) := (p,r) -> new Sphere from {p,round(r)} --Making a text tag from a point and a string textTag = method() textTag(Point2D,String) := (p,s) -> new TextTag from {p,s} textTag(Point3D,String) := (p,s) -> new TextTag from {p,s} --Turning a GraphicPrimitive object into a formated one by specifying options. These options will be passed to the different methods to create pictures in different formats (ex: SVG, etc.) so they are not constrained here because I don't know what graphic formats will be supported in the future. formatGraphicPrimitives = method() formatGraphicPrimitives(BasicList,HashTable) := (gplist, h) -> ( if all(gplist,x->instance(x,GraphicPrimitive)) then new FormattedGraphicPrimitives from {gplist,h} else error "All elements of the list should be of the type GraphicPrimitive." ) --make a picture out of a list of FormattedGraphicPrimitives. No optimization is done on the options. picture = method() picture(BasicList) := (fgplist) -> ( if all(fgplist,x->instance(x,FormattedGraphicPrimitives)) then new Picture from fgplist else error "All elements of the list should be of the type FormattedGraphicPrimitives." ) --merging two FormattedGraphicPrimitives mergeFormattedGraphicPrimitives = method(Options => true) mergeFormattedGraphicPrimitives(FormattedGraphicPrimitives,FormattedGraphicPrimitives) := {"keep"=>"1","priority"=>"1"} >> opts -> (fgp1,fgp2) -> ( new FormattedGraphicPrimitives from {(fgp1#0)|(fgp2#0),mergeOptions(fgp1#1,fgp2#1,"keep"=>opts#"keep","priority"=>opts#"priority")} ) mergeOptions = {"keep"=>"1or2","priority"=>"1"} >> opts -> (h1,h2) -> ( if opts#"keep" === "1" or opts#"keep" === "1and2" then h2 = applyPairs(h2,(k,v)->if (h1)#?k then (k,v)); if opts#"keep" === "2" or opts#"keep" === "1and2" then h1 = applyPairs(h1,(k,v)->if (h2)#?k then (k,v)); if opts#"priority" === "1" then return merge(h1,h2,(x,y)->x); if opts#"priority" === "2" then return merge(h1,h2,(x,y)->y); ) --determine the zone in which a GraphicPrimitive object lives. It is given as a list {xmin,xmax,ymin,ymax} for 2D objects and {xmin,xmax,ymin,ymax} for 3D objects. pictureZone = method() pictureZone(Point2D) := (GP) -> {GP#0,GP#0,GP#1,GP#1} pictureZone(Point3D) := (GP) -> {GP#0,GP#0,GP#1,GP#1,GP#2,GP#2} pictureZone(Segment2D) := (GP) -> {min(GP#0#0,GP#1#0),max(GP#0#0,GP#1#0),min(GP#0#1,GP#1#1),max(GP#0#1,GP#1#1)} pictureZone(Segment3D) := (GP) -> {min(GP#0#0,GP#1#0),max(GP#0#0,GP#1#0),min(GP#0#1,GP#1#1),max(GP#0#1,GP#1#1),min(GP#0#2,GP#1#2),max(GP#0#2,GP#1#2)} pictureZone(Circle) := (GP) -> {GP#0#0-GP#1,GP#0#0+GP#1,GP#0#1-GP#1,GP#0#1+GP#1} pictureZone(Sphere) := (GP) -> {GP#0#0-GP#1,GP#0#0+GP#1,GP#0#1-GP#1,GP#0#1+GP#1,GP#0#2-GP#1,GP#0#2+GP#1} pictureZone(Polygon2D) := (GP) -> ( Lx:=toList apply(GP,x->x#0); Ly:=toList apply(GP,x->x#1); {min Lx,max Lx, min Ly, max Ly} ) pictureZone(Polygon3D) := (GP) -> ( Lx:=toList apply(GP,x->x#0); Ly:=toList apply(GP,x->x#1); Lz:=toList apply(GP,x->x#2); {min Lx,max Lx, min Ly, max Ly,min Lz, max Lz} ) pictureZone(TextTag) := (GP) -> pictureZone(GP#0) --determine the zone in which a list of GraphicPrimitives lie. It is supposed a nonempty list and to be consistent in containing only 2D objects or only 3D objects. pictureZone(FormattedGraphicPrimitives) := (fgps) -> ( mylist:=apply(fgps#0,pictureZone); if #(mylist#0)==4 then {min apply(mylist,x->x#0), max apply(mylist,x->x#1), min apply(mylist,x->x#2), max apply(mylist,x->x#3)} else if #(mylist#0)==6 then {min apply(mylist,x->x#0), max apply(mylist,x->x#1), min apply(mylist,x->x#2), max apply(mylist,x->x#3), min apply(mylist,x->x#4), max apply(mylist,x->x#5)} ) --determine the zone in which a picture lies pictureZone(Picture) := (pict) -> ( mylist:=apply(toList(pict),pictureZone); if #(mylist#0)==4 then {min apply(mylist,x->x#0), max apply(mylist,x->x#1), min apply(mylist,x->x#2), max apply(mylist,x->x#3)} else if #(mylist#0)==6 then {min apply(mylist,x->x#0), max apply(mylist,x->x#1), min apply(mylist,x->x#2), max apply(mylist,x->x#3), min apply(mylist,x->x#4), max apply(mylist,x->x#5)} ) -- SVG section -- --Functions are defined to translate graphic primitives into SVG language. -- --Default SVG values for coordinates, etc. defaultSVGValues= hashTable{ Point2D => hashTable{ "cx"=>"0", "cy"=>"0", "r"=>"2", }, Circle => hashTable{ "cx"=>"0", "cy"=>"0", "r"=>"10", }, Segment2D => hashTable{ "x1"=>"0", "y1"=>"0", "x2"=>"0", "y2"=>"0", }, Polygon2D => hashTable{ "points"=>"0,0", }, TextTag => hashTable{ "x"=>"0", "y"=>"0", } } --possible SVG options possibleSVGOptions = hashTable{ Point2D => set{"stroke","stroke-width","stroke-opacity","fill","fill-opacity"}, Circle => set{"stroke","stroke-width","stroke-opacity","fill","fill-opacity"}, Segment2D => set{"stroke","stroke-width","stroke-opacity"}, Polygon2D => set{"stroke","stroke-width","stroke-opacity","fill","fill-opacity"}, TextTag => set{"stroke","stroke-width","stroke-opacity","fill","fill-opacity","font-family","font-size"} } --Default SVG options for each graphic primitive defaultSVGOptions = hashTable{ Point2D => hashTable{ "stroke"=>"black", "stroke-width"=>"0", "stroke-opacity"=>"1", "fill"=>"black", "fill-opacity"=>"1" }, Circle => hashTable{ "stroke"=>"black", "stroke-width"=>"1", "stroke-opacity"=>"1", "fill"=>"black", "fill-opacity"=>"0" }, Segment2D => hashTable{ "stroke"=>"black", "stroke-width"=>"1", "stroke-opacity"=>"1", }, Polygon2D => hashTable{ "stroke"=>"black", "stroke-width"=>"1", "stroke-opacity"=>"1", "fill"=>"black", "fill-opacity"=>"1" }, TextTag => hashTable{ "stroke"=>"black", "stroke-width"=>"0", "stroke-opacity"=>"0", "fill"=>"black", "fill-opacity"=>"1", "font-family"=>"Verdana", "font-size"=>"12" } } --default SVG document heading defaultSVGHeading = (///<?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> ///) --default SVG opening defaultSVGOpening = method() defaultSVGOpening(ZZ,ZZ) := (wid,hei) -> (///<svg width="///|toString(wid)|///" height="///|toString(hei)|///" version="1.1" xmlns="http://www.w3.org/2000/svg"> ///) --default SVG closing defaultSVGClosing = (///</svg> ///) --Making an SVG object (stored in a string) from a Graphic Primitive and some options svgObject = method() svgObject(Point2D,HashTable) := (mypt,opts) -> ( opts= mergeOptions(mergeOptions(opts,possibleSVGOptions#Point2D,"keep"=>"1and2","priority"=>"1"),defaultSVGOptions#Point2D); "<circle " |///cx="///|toString(mypt#0)|///" cy="///|toString(mypt#1)|/// r="///|defaultSVGValues#Point2D#("r")|///" /// |concatenate(apply(pairs(opts),x->(x#0|///="///|x#1|///" ///))) |"/>" ) svgObject(Circle,HashTable) := (mycirc,opts) -> ( opts= mergeOptions(mergeOptions(opts,possibleSVGOptions#Circle,"keep"=>"1and2","priority"=>"1"),defaultSVGOptions#Circle); "<circle " |///cx="///|toString(mycirc#0#0)|///" cy="///|toString(mycirc#0#1)|///" r="///|toString(mycirc#1)|///" /// |concatenate(apply(pairs(opts),x->(x#0|///="///|x#1|///" ///))) |"/>" ) svgObject(Segment2D,HashTable) := (myseg,opts) -> ( opts= mergeOptions(mergeOptions(opts,possibleSVGOptions#Segment2D,"keep"=>"1and2","priority"=>"1"),defaultSVGOptions#Segment2D); "<line " |///x1="///|toString(myseg#0#0)|///" y1="///|toString(myseg#0#1)|///" x2="///|toString(myseg#1#0)|///" y2="///|toString(myseg#1#1)|///" /// |concatenate(apply(pairs(opts),x->(x#0|///="///|x#1|///" ///))) |"/>" ) svgObject(Polygon2D,HashTable) := (mypoly,opts) -> ( opts= mergeOptions(mergeOptions(opts,possibleSVGOptions#Polygon2D,"keep"=>"1and2","priority"=>"1"),defaultSVGOptions#Polygon2D); "<polygon " |///points="///|concatenate(apply(mypoly,x->toString(x#0)|","|toString(x#1)|" "))|///" /// |concatenate(apply(pairs(opts),x->(x#0|///="///|x#1|///" ///))) |"/>" ) svgObject(TextTag,HashTable) := (mytext,opts) -> ( opts= mergeOptions(mergeOptions(opts,possibleSVGOptions#TextTag,"keep"=>"1and2","priority"=>"1"),defaultSVGOptions#TextTag); ///<text id="TextElement" /// |///x="///|toString(mytext#0#0)|///" y="///|toString(mytext#0#1)|///" /// |concatenate(apply(pairs(opts),x->(x#0|///="///|x#1|///" ///))) |">" |mytext#1 |"</text>" ) svgObject(FormattedGraphicPrimitives) := (fgp) -> concatenate(apply(fgp#0,x->svgObject(x,fgp#1)|newline|newline)) svgObject(Picture) := (pict) -> concatenate(apply(toList pict,svgObject)) --Making an SVG picture (stored in a string) from a Picture with prescribed size. It only accepts Pictures with 2D primitives. svgPicture = method() svgPicture(Picture,ZZ,ZZ) := (pict,w,h) -> ( defaultSVGHeading |defaultSVGOpening(w,h) |svgObject(pict) |defaultSVGClosing ) --Making an SVG picture (stored in a string) from a Picture with size computed to be just the size of the picture. svgPicture(Picture) := (pict) -> ( z:=pictureZone(pict); w:=z#1+100; h:=z#3+100; svgPicture(pict,w,h) ) --Making an SVG picture from a Picture with prescribed size, and storing it in a file svgPicture(Picture,ZZ,ZZ,String) := (pict,w,h,s) -> ( (if match(///\.svg\'///,s) then s else s|".svg") << svgPicture(pict,w,h) << endl << close ) --Making an SVG picture from a Picture with size computed to be just the size of the picture, and storing it in a file svgPicture(Picture,String) := (pict,s) -> ( (if match(///\.svg\'///,s) then s else s|".svg") << svgPicture(pict) << endl << close ) --view a picture document (that is in SVG for the moment) in the default browser. viewPicture = method() viewPicture(String) := (filename) -> ( if match(///\.svg\'///,filename) then show new URL from {filename} ) -- --PGF section --containing functions to turn Pictures into the pgf/tikz language for latex -- --Default PGF options for each graphic primitive possiblePGFOptions = hashTable{ Picture => set {"scale","x","y"}, Point2D => set {"fill","draw","style","line width","fill opacity","draw opacity","opacity"}, Circle => set{"fill","draw","style","line width","fill opacity","draw opacity","opacity","dashed"}, Segment2D => set{"draw","style","line width","draw opacity","opacity","dashed"}, Polygon2D => set{"fill","draw","style","line width","fill opacity","draw opacity","opacity","dashed"}, TextTag => set{} } --Default PGF values for coordinates defaultPGFValues = hashTable{ Point2D => hashTable{ "cx"=>"0", "cy"=>"0", "r"=>"0.1", }, Circle => hashTable{ "cx"=>"0", "cy"=>"0", "r"=>"1", }, Segment2D => hashTable{}, Polygon2D => hashTable{}, TextTag => hashTable{} } --Default PGF options for each graphic primitive defaultPGFOptions = hashTable{ Picture => hashTable{ }, Point2D => hashTable{ "fill"=>"black" }, Circle => hashTable{ }, Segment2D => hashTable{ }, Polygon2D => hashTable{ "fill"=>"black", "fill opacity"=>"1" }, TextTag => hashTable{ } } --making pdf code out of a graphic primitive pgfObject = method() pgfObject(Circle,HashTable) := (mycirc,opts)-> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#Circle,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#Circle); ///\draw[/// |(if #opts==0 then "" else fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b)) |///] (/// |mycirc#0#0|","|mycirc#0#1 |///) circle (/// |mycirc#1 |///);/// ) pgfObject(Point2D,HashTable) := (mypt,opts)-> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#Point2D,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#Point2D); ///\draw[/// |(if #opts==0 then "" else fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b)) |///] /// |///(///|mypt#0|","|mypt#1|///) circle (///|defaultPGFValues#Point2D#"r"|///);/// ) pgfObject(Segment2D,HashTable) := (myseg,opts)-> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#Segment2D,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#Segment2D); ///\draw[/// |(if #opts==0 then "" else fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b)) |///] /// |///(///|myseg#0#0|","|myseg#0#1|///) -- (///|myseg#1#0|","|myseg#1#1|///);/// ) pgfObject(Polygon2D,HashTable) := (mypoly,opts)-> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#Polygon2D,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#Polygon2D); ///\draw[/// |fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b) |///] /// |(if #opts==0 then "" else fold(apply(toList(mypoly),x->///(///|toString(x#0)|","|toString(x#1)|///)///),(a,b)->a|/// -- ///|b)) |/// -- cycle;/// ) pgfObject(TextTag,HashTable) := (mytext,opts)-> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#TextTag,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#TextTag); ///\draw /// |///(///|mytext#0#0|","|mytext#0#1|///) /// |///node[/// |(if #opts==0 then "" else fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b)) |///] /// |///{///|mytext#1|///};/// ) --This is bad. One should use a scope for each FormattedGraphicPrimitive. I will fix this later. pgfObject(FormattedGraphicPrimitives) := (fgp) -> concatenate(apply(fgp#0,x->pgfObject(x,fgp#1)|newline)) --Here one could maybe accept global options for scope. pgfObject(Picture) := (pict) -> concatenate(apply(toList pict,pgfObject)) --making a complete pgf picture out a Picture object and some global options pgfPicture = method() pgfPicture(Picture,HashTable) := (pict,opts) -> ( opts= mergeOptions(mergeOptions(opts,possiblePGFOptions#Picture,"keep"=>"1and2","priority"=>"1"),defaultPGFOptions#Picture); ///\begin{tikzpicture}[/// |(if #opts==0 then "" else fold(apply(pairs(opts),x->(if x#1===null then x#0 else x#0|"="|x#1)),(a,b)->a|","|b)) |///]///|newline |pgfObject(pict) |///\end{tikzpicture}///|newline ) pgfPicture(Picture) := (pict) -> ( ///\begin{tikzpicture}///|newline |pgfObject(pict) |///\end{tikzpicture}///|newline ) pgfPicture(Picture,HashTable,String) := (pict,opts,filename) -> ( (if match(///\.tex\'///,filename) then filename else filename|".tex") << pgfPicture(pict,opts) << endl << close ) pgfPicture(Picture,String) := (pict,filename) -> ( (if match(///\.tex\'///,filename) then filename else filename|".tex") << pgfPicture(pict) << endl << close ) --The rest of the file is documentation. beginDocumentation() doc /// Key Graphics Headline Graphics Description Text This package provides graphic primitives and functions to turn them into pictures in different formats. The formats supported include svg and pgf/tikz. /// doc /// Key GraphicPrimitive Headline the class of all graphic primitives /// doc /// Key FormattedGraphicPrimitives Headline the class of lists of graphic primitives together with formatting options /// doc /// Key Picture Headline the class of pictures containing several FormattedGraphicPrimitives /// doc /// Key Point2D Headline the class of a point in a 2D space /// doc /// Key Point3D Headline the class of a point in a 3D space /// doc /// Key Segment2D Headline the class of a line segment in a 2D space /// doc /// Key Segment3D Headline the class of a line segment in a 3D space /// doc /// Key Polygon2D Headline the class of a polygon in a 2D space /// doc /// Key Polygon3D Headline the class of a polygon in a 3D space /// doc /// Key Circle Headline the class of a circle in a 2D space /// doc /// Key Sphere Headline the class of a sphere in a 3D space /// doc /// Key TextTag Headline the class of a text tag /// doc /// Key point Headline create a point /// doc /// Key (point,ZZ,ZZ) Headline a point from two coordinates Usage point(x,y) Inputs x: ZZ y: ZZ Outputs : Point2D the point with coordinates {\tt x} and {\tt y} Description Example point(20, 30) /// doc /// Key (point,RR,RR) Headline a point from two coordinates Usage point(x,y) Inputs x: RR y: RR Outputs : Point2D the point with coordinates {\tt x} and {\tt y} Description Example point(2.1, 3.) /// doc /// Key (point,ZZ,ZZ,ZZ) Headline a point from three coordinates Usage point(x,y,z) Inputs x: ZZ y: ZZ z: ZZ Outputs : Point3D the point with coordinates {\tt x}, {\tt y} and {\tt z} Description Example point(20,30,40) /// doc /// Key (point,RR,RR,RR) Headline a point from three coordinates Usage point(x,y,z) Inputs x: RR y: RR z: RR Outputs : Point3D the point with coordinates {\tt x}, {\tt y} and {\tt z} Description Example point(2.1, 3.,4.) /// doc /// Key segment Headline create a line segment /// doc /// Key (segment,Point2D,Point2D) Headline a line segment from two points Usage segment(p,q) Inputs p: Point2D q: Point2D Outputs : Segment2D the line segment with endpoints {\tt p} and {\tt q} Description Example p=point(2.1, 3.) q=point(.4, 4.6) segment(p,q) /// doc /// Key (segment,Point3D,Point3D) Headline a line segment from two points Usage segment(p,q) Inputs p: Point3D q: Point3D Outputs : Segment3D the line segment with endpoints {\tt p} and {\tt q} Description Example p=point(2.1, 3.,4.) q=point(.4, 4.6,5.3) segment(p,q) /// doc /// Key polygon Headline create a polygon from a list of points /// doc /// Key (polygon,List) Headline a polygon from a list of points Usage polygon(L) Inputs L: List of @TO Point2D@s or of @TO Point3D@s Outputs : Thing the polygon defined by the points in {\tt L} Description Text All the points must be of the same class, either @TO Point2D@ or @TO Point3D@. Example L={point(2.1, 3.),point(.4, 4.6),point(3.1,5.)} polygon(L) /// doc /// Key circle Headline create a circle from a point and a radius /// doc /// Key (circle,Point2D,ZZ) Headline a circle from a center and a radius Usage circle(p,r) Inputs p: Point2D the center of the circle r: ZZ the radius of the circle Outputs : Circle the circle with center {\tt p} and radius {\tt r} Description Example circle(point(20,30),10) /// doc /// Key (circle,Point2D,RR) Headline a circle from a center and a radius Usage circle(p,r) Inputs p: Point2D the center of the circle r: RR the radius of the circle Outputs : Circle the circle with center {\tt p} and radius {\tt r} Description Example circle(point(20.1, 30.),30.) /// doc /// Key sphere Headline create a sphere from a point and a radius /// doc /// Key (sphere,Point3D,ZZ) Headline a sphere from a center and a radius Usage sphere(p,r) Inputs p: Point3D the center of the sphere r: ZZ the radius of the sphere Outputs : Sphere the sphere with center {\tt p} and radius {\tt r} Description Example sphere(point(20,30,100),10) /// doc /// Key (sphere,Point3D,RR) Headline a sphere from a center and a radius Usage sphere(p,r) Inputs p: Point3D the center of the sphere r: RR the radius of the sphere Outputs : Sphere the sphere with center {\tt p} and radius {\tt r} Description Example sphere(point(20.1, 30.,100.),30.) /// doc /// Key textTag Headline create a text tag at a position /// doc /// Key (textTag,Point2D,String) Headline a text tag at a position Usage textTag(p,s) Inputs p: Point2D the position of the tag s: String the text of the tag Outputs : TextTag the {\tt TextTag} with text {\tt s} at position {\tt p} Description Example textTag(point(2.1, 3.),"My Tag") /// doc /// Key (textTag,Point3D,String) Headline a text tag at a position Usage textTag(p,s) Inputs p: Point3D the position of the tag s: String the text of the tag Outputs : TextTag the {\tt TextTag} with text {\tt s} at position {\tt p} Description Example textTag(point(2.1, 3.,4.),"My Tag") /// doc /// Key formatGraphicPrimitives Headline create a FormattedGraphicPrimitives object /// doc /// Key (formatGraphicPrimitives,BasicList,HashTable) Headline create a formated graphic primitive object Usage textTag(gplist,h) Inputs gplist: BasicList h: HashTable containing graphic options Outputs : FormattedGraphicPrimitives Description Example myPoint1=point(20.,30.) myPoint2=point(30.,40.) myOptions = hashTable {"fill"=>"black"} formatGraphicPrimitives({myPoint1,myPoint2},myOptions) /// TEST /// mylist={point(20.,30.),point(30.,40.)}; myOptions = hashTable {"fill"=>"black"}; assert(formatGraphicPrimitives(mylist,myOptions)===new FormattedGraphicPrimitives from {mylist,myOptions}) /// doc /// Key picture Headline create a Picture object /// doc /// Key (picture,BasicList) Headline create a picture object Usage picture(fgplist,h) Inputs fgplist: BasicList a list of FormattedGraphicPrimitives Outputs : Picture Description Example myfgp1=formatGraphicPrimitives({point(20.,30.),point(30.,40.)},hashTable {"fill"=>"black"}) myfgp2=formatGraphicPrimitives({circle(point(20.,30.),10)},hashTable {"fill"=>"red"}) picture({myfgp1,myfgp2}) /// doc /// Key pictureZone Headline find the zone in which a picture lies /// doc /// Key (pictureZone,Point2D) Headline find the zone that contains the point Usage pictureZone(p) Inputs p: Point2D Outputs : List of the form {xmin,xmax,ymin,ymax} Description Example pictureZone(point(20,30)) /// TEST /// assert(pictureZone(point(20,30))==={20,20,30,30}) /// doc /// Key (pictureZone,Point3D) Headline find the zone that contains the point Usage pictureZone(p) Inputs p: Point3D Outputs : List of the form {xmin,xmax,ymin,ymax,zmin,zmax} Description Example pictureZone(point(20,30,40)) /// TEST /// assert(pictureZone(point(20,30,40))==={20,20,30,30,40,40}) /// doc /// Key (pictureZone,Segment2D) Headline find the zone that contains the line segment Usage pictureZone(l) Inputs l: Segment2D Outputs : List of the form {xmin,xmax,ymin,ymax} Description Example pictureZone(segment(point(20,30),point(30,40))) /// TEST /// assert(pictureZone(segment(point(20,30),point(30,40)))==={20,30,30,40}) /// doc /// Key (pictureZone,Segment3D) Headline find the zone that contains the line segment Usage pictureZone(l) Inputs l: Segment3D Outputs : List of the form {xmin,xmax,ymin,ymax,zmin,zmax} Description Example pictureZone(segment(point(20,30,40),point(30,40,50))) /// TEST /// assert(pictureZone(segment(point(20,30,40),point(30,40,50)))==={20,30,30,40,40,50}) /// doc /// Key (pictureZone,Circle) Headline find the zone that contains the circle Usage pictureZone(c) Inputs c: Circle Outputs : List of the form {xmin,xmax,ymin,ymax} Description Example pictureZone(circle(point(20,30),10)) /// TEST /// assert(pictureZone(circle(point(20,30),10))==={10,30,20,40}) /// doc /// Key (pictureZone,Sphere) Headline find the zone that contains the sphere Usage pictureZone(s) Inputs s: Sphere Outputs : List of the form {xmin,xmax,ymin,ymax,zmin,zmax} Description Example pictureZone(sphere(point(20,30,40),10)) /// TEST /// assert(pictureZone(sphere(point(20,30,40),10))==={10,30,20,40,30,50}) /// doc /// Key (pictureZone,Polygon2D) Headline find the zone that contains the polygon Usage pictureZone(p) Inputs p: Polygon2D Outputs : List of the form {xmin,xmax,ymin,ymax} Description Example pictureZone(polygon({point(20,30),point(25,30),point(20,35)})) /// TEST /// assert(pictureZone(polygon({point(20,30),point(25,30),point(20,35)}))==={20,25,30,35}) /// doc /// Key (pictureZone,Polygon3D) Headline find the zone that contains the polygon Usage pictureZone(p) Inputs p: Polygon3D Outputs : List of the form {xmin,xmax,ymin,ymax,zmin,zmax} Description Example pictureZone(polygon({point(20,30,40),point(25,30,40),point(20,35,45)})) /// TEST /// assert(pictureZone(polygon({point(20,30,40),point(25,30,40),point(20,35,40)}))==={20,25,30,35,40,40}) /// doc /// Key (pictureZone,TextTag) Headline find the zone that contains the tag Usage pictureZone(t) Inputs t: TextTag Outputs : List of the form {xmin,xmax,ymin,ymax} or {xmin,xmax,ymin,ymax,zmin,zmax} Description Example pictureZone(textTag(point(20,30),"my tag")) pictureZone(textTag(point(20,30,40),"my tag")) /// TEST /// assert(pictureZone(textTag(point(20,30),"my tag"))==={20,20,30,30}) assert(pictureZone(textTag(point(20,30,40),"my tag"))==={20,20,30,30,40,40}) /// doc /// Key (pictureZone,FormattedGraphicPrimitives) Headline find the zone that contains the whole list of graphic primitive Usage pictureZone(fgp) Inputs fgp: FormattedGraphicPrimitives Outputs : List of the form {xmin,xmax,ymin,ymax} (or {xmin,xmax,ymin,ymax,zmin,zmax} for 3D objects) describing a zone containing the object fgp Description Example pictureZone(formatGraphicPrimitives({circle(point(20,30),10)},hashTable {"fill"=>"black"})) /// TEST /// assert(pictureZone(formatGraphicPrimitives({circle(point(20,30),10),point(50,40)},hashTable {"fill"=>"black"}))==={10,50,20,40}) /// doc /// Key (pictureZone,Picture) Headline find the zone that contains the whole picture Usage pictureZone(mypict) Inputs mypict: Picture Outputs : List of the form {xmin,xmax,ymin,ymax} (or {xmin,xmax,ymin,ymax,zmin,zmax} for 3D objects) describing a zone containing the object fgp Description Example myfgp1=formatGraphicPrimitives({point(20.,30.),point(30.,40.)},hashTable {"fill"=>"black"}) myfgp2=formatGraphicPrimitives({circle(point(20.,30.),10)},hashTable {"fill"=>"red"}) mypict=picture({myfgp1,myfgp2}) pictureZone(mypict) /// TEST /// myfgp1=formatGraphicPrimitives({point(20.,30.),point(30.,40.)},hashTable {"fill"=>"black"}); myfgp2=formatGraphicPrimitives({circle(point(20.,30.),10)},hashTable {"fill"=>"red"}); mypict=picture({myfgp1,myfgp2}); assert(pictureZone(mypict)==={10,30,20,40}) /// doc /// Key mergeFormattedGraphicPrimitives Headline merge two lists of graphic primitives with options /// doc /// Key (mergeFormattedGraphicPrimitives,FormattedGraphicPrimitives,FormattedGraphicPrimitives) Headline merge two lists of graphic primitives with options Usage mergeFormattedGraphicPrimitives(fgp1,fgp2) Inputs fgp1: FormattedGraphicPrimitives fgp2: FormattedGraphicPrimitives Outputs : FormattedGraphicPrimitives Description Text The list of graphic primitives are concatenated and the graphic options are merged according to the value of two options {\tt "keep"} (either "1or2", "1" or "2") and {\tt "priority"} (either "1" or "2"). Example myoptions1= new HashTable from {"fill"=>"black"} myoptions2= new HashTable from {"fill"=>"blue","stroke"=>"red"} fgp1=formatGraphicPrimitives({point(20,30),point(40,50)},myoptions1) fgp2=formatGraphicPrimitives({circle(point(30,40),10)},myoptions2) mergeFormattedGraphicPrimitives(fgp1,fgp2) mergeFormattedGraphicPrimitives(fgp1,fgp2,"keep"=>"2","priority"=>"1") /// doc /// Key "defaultSVGOptions" Headline the default SVG options Description Text It's a hash table containing the default SVG options for all graphic primitives that can be used to create an SVG document. /// doc /// Key "defaultSVGValues" Headline the default SVG values of coordinates Description Text It's a hash table containing the default SVG values for some graphic primitives. They can be used while creating an SVG document. /// doc /// Key "possibleSVGOptions" Headline the possible SVG options Description Text It's a hash table containing the possible SVG options for graphic primitives that can be used to create an SVG picture. Options not listed here will usually be discarded when the primitive is turned into an SVG object. /// doc /// Key "defaultSVGHeading" Headline the default SVG heading Description Text It's a string containing the default SVG heading used to create SVG pictures. /// doc /// Key defaultSVGOpening Headline the default SVG opening /// doc /// Key (defaultSVGOpening,ZZ,ZZ) Headline default SVG opening for a picture of a given size Usage defaultSVGOpening(w,h) Inputs w: ZZ h: ZZ Outputs : String Description Text It returns a string containing the default SVG opening of the form <svg etc. used to create an SVG picture. /// doc /// Key "defaultSVGClosing" Headline the default SVG closing Description Text It's a string containing the default SVG closing </svg> used to create SVG pictures. /// doc /// Key svgObject Headline create an SVG object /// doc /// Key (svgObject,FormattedGraphicPrimitives) Headline create a string describing in SVG a list of formatted graphic primitive object Usage svgObject(fgp) Inputs fgp: FormattedGraphicPrimitives Outputs : String containing the description of an object in SVG Description Text The options that are not given in the hash table part of {\tt fgp} are set at the default values contained in {\tt defaultSVGOptions}. Example myoptions = hashTable {"fill"=>"black"} myfgp= formatGraphicPrimitives({point(20,30)},myoptions) svgObject(myfgp) /// doc /// Key (svgObject,Picture) Headline create a string describing the picture in SVG Usage svgObject(mypict) Inputs mypict: Picture Outputs : String containing the description of the picture in SVG Description Example myfgp1=formatGraphicPrimitives({point(20.,30.),point(30.,40.)},hashTable {"fill"=>"black"}) myfgp2=formatGraphicPrimitives({circle(point(20.,30.),10)},hashTable {"fill"=>"red"}) mypict=picture({myfgp1,myfgp2}) svgObject(mypict) SeeAlso svgPicture viewPicture /// doc /// Key (svgObject,Point2D,HashTable) Headline create the string describing a point in SVG Usage svgObject(mypoint,myoptions) Inputs mypoint: Point2D myoptions: HashTable giving values to some options (see @TO "defaultSVGOptions"@). Outputs : String containing the description of the point in SVG Description Text The options that are not given in {\tt myoptions} are set at the default values contained in @TO "defaultSVGOptions"@. Example myoptions = hashTable {"fill"=>"black"} svgObject(point(20,30),myoptions) /// doc /// Key (svgObject,Segment2D,HashTable) Headline create the string describing a line segment in SVG Usage svgObject(mysegment,myoptions) Inputs mysegment: Segment2D myoptions: HashTable giving values to some options (see @TO "defaultSVGOptions"@). Outputs : String containing the description of the segment in SVG Description Text The options that are not given in {\tt myoptions} are set at the default values contained in @TO "defaultSVGOptions"@. Example myoptions = hashTable {"stroke-width"=>"2"} svgObject(segment(point(20,30),point(40,50)),myoptions) /// doc /// Key (svgObject,Circle,HashTable) Headline create the string describing a circle in SVG Usage svgObject(mycircle,myoptions) Inputs mycircle: Circle myoptions: HashTable giving values to some options (see @TO "defaultSVGOptions"@). Outputs : String containing the description of the circle in SVG Description Text The options that are not given in {\tt myoptions} are set at the default values contained in @TO "defaultSVGOptions"@. Example myoptions = hashTable {"fill"=>"black"} svgObject(circle(point(20,30),10),myoptions) /// doc /// Key (svgObject,Polygon2D,HashTable) Headline create the string describing a circle in SVG Usage svgObject(mypolygon,myoptions) Inputs mypolygon: Polygon2D myoptions: HashTable giving values to some options (see @TO "defaultSVGOptions"@). Outputs : String containing the description of the polygon in SVG Description Text The options that are not given in {\tt myoptions} are set at the default values contained in @TO "defaultSVGOptions"@. Example myoptions = hashTable {"fill"=>"black"} svgObject(polygon({point(20,30),point(40,50),point(10,40)}),myoptions) /// doc /// Key (svgObject,TextTag,HashTable) Headline create the string describing a circle in SVG Usage svgObject(mytext,myoptions) Inputs mytext: TextTag myoptions: HashTable giving values to some options (see @TO "defaultSVGOptions"@). Outputs : String containing the description of the text tag in SVG Description Text The options that are not given in {\tt myoptions} are set at the default values contained in @TO "defaultSVGOptions"@. Example myoptions = hashTable {"font-family"=>"verdana"} svgObject(textTag(point(20,30),"Hello world"),myoptions) /// doc /// Key svgPicture Headline create an SVG picture /// doc /// Key (svgPicture,Picture,ZZ,ZZ) Headline create an SVG picture from a Picture object Usage svgPicture(mypict,w,h) Inputs mypict: Picture w: ZZ the width of the picture h: ZZ the height of the picture Outputs : String containing the SVG picture Description Text The heading used is stored in @TO "defaultSVGHeading"@ and the SVG opening bracket (resp. closing) used is stored in @TO "defaultSVGOpening"@ (resp. @TO "defaultSVGClosing"@). Example myfgp1 = formatGraphicPrimitives({point(20,30)},hashTable {"fill"=>"black"}) myfgp2 = formatGraphicPrimitives({circle(point(20,30),10),point(50,60)},hashTable {"fill"=>"red","fill-opacity"=>"0.2"}) mypict = picture {myfgp1,myfgp2} svgPicture(mypict,100,100) SeeAlso (svgPicture,Picture) (svgPicture,Picture,ZZ,ZZ,String) (svgPicture,Picture,String) (pgfPicture,Picture) /// doc /// Key (svgPicture,Picture) Headline create an SVG picture from a Picture object Usage svgPicture(mypict) Inputs mypict: Picture Outputs : String containing the SVG picture Description Text The heading used is stored in @TO "defaultSVGHeading"@ and the SVG opening bracket (resp. closing) used is stored in @TO "defaultSVGOpening"@ (resp. @TO "defaultSVGClosing"@). Example myfgp1 = formatGraphicPrimitives({point(20,30)},hashTable {"fill"=>"black"}) myfgp2 = formatGraphicPrimitives({circle(point(20,30),10),point(50,60)},hashTable {"fill"=>"red","fill-opacity"=>"0.2"}) mypict = picture {myfgp1,myfgp2} svgPicture(mypict) SeeAlso (svgPicture,Picture,ZZ,ZZ) (svgPicture,Picture,ZZ,ZZ,String) (svgPicture,Picture,String) (pgfPicture,Picture) /// doc /// Key (svgPicture,Picture,String) Headline create an SVG picture from a Picture object and store it in a file Usage svgPicture(mypict,filename) Inputs mypict: Picture filename: String the name of the storage file Description Text If the filename is without a .svg suffix, it will be added. Text The heading used is stored in @TO "defaultSVGHeading"@ and the SVG opening bracket (resp. closing) used is stored in @TO "defaultSVGOpening"@ (resp. @TO "defaultSVGClosing"@). SeeAlso (svgPicture,Picture) (pgfPicture,Picture) /// doc /// Key (svgPicture,Picture,ZZ,ZZ,String) Headline create an SVG picture from a Picture object and store it in a file Usage svgPicture(mypict,w,h,filename) Inputs mypict: Picture w: ZZ the width of the SVG picture h: ZZ the height of the SVG picture filename: String the name of the storage file Description Text If the filename is without a .svg suffix, it will be added. Text The heading used is stored in @TO "defaultSVGHeading"@ and the SVG opening bracket (resp. closing) used is stored in @TO "defaultSVGOpening"@ (resp. @TO "defaultSVGClosing"@). SeeAlso (svgPicture,Picture) (pgfPicture,Picture) /// doc /// Key "defaultPGFOptions" Headline the default pgf options Description Text It's a hash table containing the default pgf options for graphic primitives that can be used to create a pgf picture. /// doc /// Key "possiblePGFOptions" Headline the possible pgf options Description Text It's a hash table containing the possible pgf options for graphic primitives that can be used to create a pgf picture. Options not listed here will usually be discarded. /// doc /// Key "defaultPGFValues" Headline the default pgf values Description Text It's a hash table containing the default pgf values for some graphic primitives that are used to create a pgf picture. /// doc /// Key pgfObject Headline create a pgf object /// doc /// Key (pgfObject,Point2D,HashTable) Headline create the string describing a point in pgf Usage pgfObject(mypoint,myoptions) Inputs mypoint: Point2D myoptions: HashTable giving values to some options Outputs : String containing the description of the point in pgf Description Text The options that are not given in {\tt myoptions} are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. The size of the point comes from @TO "defaultPGFValues"@. Example myoptions = hashTable {"fill"=>"red"} pgfObject(point(20,30),myoptions) /// doc /// Key (pgfObject,Segment2D,HashTable) Headline create the string describing a line segment in pgf Usage pgfObject(mysegment,myoptions) Inputs mysegment: Segment2D myoptions: HashTable giving values to some options Outputs : String containing the description of the segment in pgf Description Text The options that are not given in {\tt myoptions} are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myoptions = hashTable {"fill"=>"black"} pgfObject(segment(point(20,30),point(40,50)),myoptions) /// doc /// Key (pgfObject,Circle,HashTable) Headline create the string describing a circle in pgf Usage pgfObject(mycircle,myoptions) Inputs mycircle: Circle myoptions: HashTable giving values to some options Outputs : String containing the description of the circle in pgf Description Text The options that are not given in {\tt myoptions} are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myoptions = hashTable {"fill"=>"black"} pgfObject(circle(point(20,30),10),myoptions) /// doc /// Key (pgfObject,Polygon2D,HashTable) Headline create the string describing a circle in pgf Usage svgObject(mypolygon,myoptions) Inputs mypolygon: Polygon2D myoptions: HashTable giving values to some options Outputs : String containing the description of the polygon in pgf Description Text The options that are not given in {\tt myoptions} are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myoptions = hashTable {"fill"=>"black"} pgfObject(polygon({point(20,30),point(40,50),point(10,40)}),myoptions) /// doc /// Key (pgfObject,TextTag,HashTable) Headline create the string describing a circle in pgf Usage pgfObject(mytext,myoptions) Inputs mytext: TextTag myoptions: HashTable giving values to some options Outputs : String containing the description of the text tag in pgf Description Text The options that are not given in {\tt myoptions} are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myoptions = hashTable {"fill"=>"black"} pgfObject(textTag(point(20,30),"Hello world"),myoptions) /// doc /// Key (pgfObject,FormattedGraphicPrimitives) Headline create the string describing a series of graphic primitives in pgf Usage pgfObject(FGP) Inputs FGP: FormattedGraphicPrimitives Outputs : String containing the description of all the graphic primitives contained in the FormattedGraphicPrimitives in pgf Description Text The options that are not given in the hash table part of FGP are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myoptions = hashTable {"fill"=>"black"} myfgp= formatGraphicPrimitives({point(20,30)},myoptions) pgfObject(myfgp) /// doc /// Key (pgfObject,Picture) Headline create the string describing a series of graphic primitives in pgf Usage pgfObject(pict) Inputs pict: Picture Outputs : String containing the description of all the graphic primitives contained in the Picture in pgf Description Text The options that are not given in the hash table parts of the various FormattedGraphicPrimitives in the picture are set at their default values if they are contained in @TO "defaultPGFOptions"@. Options not listed in @TO "possiblePGFOptions"@ are discarded. Example myfgp1=formatGraphicPrimitives({point(20.,30.),point(30.,40.)},hashTable {"fill"=>"black"}) myfgp2=formatGraphicPrimitives({circle(point(20.,30.),10)},hashTable {"fill"=>"red"}) mypict=picture({myfgp1,myfgp2}) pgfObject(mypict) /// doc /// Key pgfPicture Headline create a pgf picture /// doc /// Key (pgfPicture,Picture) Headline create a pgf picture from a Picture object Usage pgfPicture(mypict) Inputs mypict: Picture Outputs : String containing the pgf picture Description Example myfgp1 = formatGraphicPrimitives({point(20,30)},hashTable {"fill"=>"black"}) myfgp2 = formatGraphicPrimitives({circle(point(20,30),10),point(50,60)},hashTable {"fill"=>"red","fill-opacity"=>"0.2"}) mypict = picture {myfgp1,myfgp2} pgfPicture(mypict) SeeAlso (pgfPicture,Picture,HashTable) (svgPicture,Picture) /// doc /// Key (pgfPicture,Picture,HashTable) Headline create a pgf picture from a Picture object with some options Usage pgfPicture(mypict,myoptions) Inputs mypict: Picture myoptions: HashTable Outputs : String containing the picture in pgf Description Example myfgp1 = formatGraphicPrimitives({point(20,30)},hashTable {"fill"=>"black"}) myfgp2 = formatGraphicPrimitives({circle(point(20,30),10),point(50,60)},hashTable {"fill"=>"red","fill-opacity"=>"0.2"}) mypict = picture {myfgp1,myfgp2} myoptions = hashTable{"scale"=>"0.5","x"=>"0.1cm","y"=>"0.2cm"} pgfPicture(mypict,myoptions) SeeAlso (pgfPicture,Picture) (svgPicture,Picture) /// doc /// Key (pgfPicture,Picture,String) Headline create a pgf picture from a Picture object and store it in a file Usage pgfPicture(mypict,filename) Inputs mypict: Picture filename: String the name of the storage file Description Text If the filename is without a .tex suffix, it will be added. SeeAlso (pgfPicture,Picture,HashTable,String) (pgfPicture,Picture) (pgfPicture,Picture,HashTable) (svgPicture,Picture) /// doc /// Key (pgfPicture,Picture,HashTable,String) Headline create a pgf picture from a Picture object with options and store it in a file Usage pgfPicture(mypict,opts,filename) Inputs mypict: Picture opts: HashTable containing the options filename: String the name of the storage file Description Text If the filename is without a .tex suffix, it will be added. SeeAlso (pgfPicture,Picture,String) (pgfPicture,Picture) (pgfPicture,Picture,HashTable) (svgPicture,Picture) /// doc /// Key viewPicture Headline view a picture in a browser /// doc /// Key (viewPicture,String) Headline view a Picture in a browser Usage viewPicture(filename) Inputs filename: String the name of the file (possibly with path) containing the picture Caveat For the moment, it only works with SVG pictures and browsers supporting them. ///
Wednesday, November 18, 2009 Horse Lizard Beast (HLB) on our right is a sweet girl, but unfortunately at this time in her life she chose to make her face all blotchy with spray tan. "Can't get enough of Horse Lizard Beast." --To be sung to the tune of the Golden Crisp Cereal jingle
Q: What is the format used for "Expires" field in signed url format -aws s3? I am using unity's WWW class to download game assets from amazon server.I was going through signed url format to be used to access the file.I want to know what is the Date-Time format used in the "Expires" field.The format of signed url is in link http://www.bucketexplorer.com/documentation/amazon-s3--how-to-generate-url-for-amazon-s3-files.html .I tried using MMddhhmmyy format.It did not work for me. A: The documentation states that Expires is the date and time in Unix time format (in seconds) and Coordinated Universal Time (UTC) The example URL https://mybucket.s3.amazonaws.com/myobject.ext?AWSAccessKeyId =ALSECKCKDKMKC5GUSNFA&Expires=1301234062&Signature=ssmu34aCsECO8%2F6vHDdf9u0TCcU%3D would therefore indicate a date of Sun, 27 Mar 2011 13:54:22.
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc (1.8.0_252) on Mon Sep 14 15:53:51 PDT 2020 --> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Uses of Class org.apache.orc.impl.ConvertTreeReaderFactory.DoubleFromDecimalTreeReader (ORC Core 1.6.4 API)</title> <meta name="date" content="2020-09-14"> <link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="Style"> <script type="text/javascript" src="../../../../../script.js"></script> </head> <body> <script type="text/javascript"><!-- try { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="Uses of Class org.apache.orc.impl.ConvertTreeReaderFactory.DoubleFromDecimalTreeReader (ORC Core 1.6.4 API)"; } } catch(err) { } //--> </script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a name="navbar.top"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.top.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="../package-summary.html">Package</a></li> <li><a href="../../../../../org/apache/orc/impl/ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" title="class in org.apache.orc.impl">Class</a></li> <li class="navBarCell1Rev">Use</li> <li><a href="../../../../../overview-tree.html">Tree</a></li> <li><a href="../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li>Prev</li> <li>Next</li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?org/apache/orc/impl/class-use/ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" target="_top">Frames</a></li> <li><a href="ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_top"> <li><a href="../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_top"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <a name="skip.navbar.top"> <!-- --> </a></div> <!-- ========= END OF TOP NAVBAR ========= --> <div class="header"> <h2 title="Uses of Class org.apache.orc.impl.ConvertTreeReaderFactory.DoubleFromDecimalTreeReader" class="title">Uses of Class<br>org.apache.orc.impl.ConvertTreeReaderFactory.DoubleFromDecimalTreeReader</h2> </div> <div class="classUseContainer">No usage of org.apache.orc.impl.ConvertTreeReaderFactory.DoubleFromDecimalTreeReader</div> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a name="navbar.bottom"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.bottom.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="../package-summary.html">Package</a></li> <li><a href="../../../../../org/apache/orc/impl/ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" title="class in org.apache.orc.impl">Class</a></li> <li class="navBarCell1Rev">Use</li> <li><a href="../../../../../overview-tree.html">Tree</a></li> <li><a href="../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li>Prev</li> <li>Next</li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?org/apache/orc/impl/class-use/ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" target="_top">Frames</a></li> <li><a href="ConvertTreeReaderFactory.DoubleFromDecimalTreeReader.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_bottom"> <li><a href="../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_bottom"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <a name="skip.navbar.bottom"> <!-- --> </a></div> <!-- ======== END OF BOTTOM NAVBAR ======= --> <p class="legalCopy"><small>Copyright &#169; 2013&#x2013;2020 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</small></p> </body> </html>
For the last few days a debate has rolled along between the Sizers and the Deformers. It has carried on in the JIRA. So, it is essentially invisible except to those following it. I’ve been reading the arguments to see what people think and from those that don’t react but actually think: why. Single Base Deformer Side Max Graf probably represents the Deformers best and does it rationally. You may remember he was instrumental in creating funding for the Deformer project. His vision for the Deformer was for it to allow designers to make one size of mesh clothes and have that size fit all sizes and shapes of avatar. While he understands there will be stretching, he believes it will be at an acceptable level. The effort to deal with numerous sizes for such a small benefit in texture quality seems disproportionate in Max’s thinking. Max considers the standard sizing a promotional effort to sell mesh clothes that don’t fit. I suspect most of us know getting mesh clothes that fit right now is a PITA. Max’s belief is standard sizing should go away and the Deformer will make a one size fit all world, which would be ideal. He believes his experience shows the deformer works perfectly using the Default Shape base size. From reading what Max has written at plurk (Maxwell Graf – see Gianna’s Plurk and EmmaG’s) I think it is clear he believes adding sizes to the Deformer by making them an integral part of the deformer will force all into using them. I don’t see that. The bottom line is this: if a creator wants to use multiple sizes for items, that’s fine. No one should say they couldn’t. However, making that a permanent and integrated part of the deformer feature, so it is forced on everyone, is a mistake. Max makes an interesting point about Avatar 2.0. He points out that in several places conversation is turning toward creating a better avatar. He feels that as pressure mounts to make the avatar work better with the Deformer the Lab will be pressed into providing a better avatar. I know that hope and working with the avatar for the last few days I know some of the problems it has are VERY annoying. Max thinks the Lab is working toward Avatar 2.0. I have to disagree because the Lindens I talk to say that is not so. Oz Linden when specifically asked says not so, no project in motion. Any Avatar 2.0 or improvements will have to come from the community. That doesn’t mean the 4 Lindens I talked to know everything happening in the Lab. But, I suspect if the Avatar were being worked on they would know. So, either Max’s or my idea of being worked on is different or it just isn’t so. Max believes if we move toward a Deformer that will use alternate base shapes there will be no need to create a better avatar and pressure on the Lab will drop off. The pressure could drop off. I just don’t see it being that great now. So, a change from little to none going to near nothing doesn’t seem significant. But, I’m pretty sure we have NO WAY to know how much pressure there is or isn’t to change the avatar. As the debate gets less civil the idea is put forth: designers should design for the problems of texture stretching and mesh distortion and live with the Single Size Deformer. Personally I’m not sure that is possible. I have no doubt a few people can figure it out. But, I think this adds complication while claiming to reduce complication from dealing with multiple sizes. Until one is designing mesh clothes I doubt one has enough information to make this call either way. Then it becomes a matter of what one is personally capable of doing. Sizers or Multi-Base Side On the other side we have Elie Spot (SL) AKA EmmaG (Plurk see 5/21) promoting the idea that standard sizes are a useable work-around now and would be a good thing for a set of alternative base shapes. Elie expects some type of flexibility for the base shapes to be added to the Deformer. Elie believes if the Deformer were to use multiple base shapes and the current standard shapes were used then the clothes being use now would fit well and look good, meaning minimal stretch and distortion. If we get a means to do in-world conversions of existing mesh then this would be a major time and cost saver. In one post in the JIRA Elie explains her view. To fill in a bit, you need to know that Minnu Palen & Thora Charron (of LeLutka), Siddean Munro (of SLink), Elie & Anouk Spot (of Mon Tissu) and Jaden Celoe & Shay Sibrian (of Celoe) worked to find the average shapes in use in Second Life. The result is the set of standard sizes provided for free in the Market Place. (MP Standard Size Package) Elie notes that smaller, larger, and more curvy avatars do not fit the standard shapes. I know that. My butt and breasts are too small for large and too big for medium. Like many others I don’t plan to change my shape to fit a dress, even if it is easier in SL than RL. Elie does not like the texture distortion she sees using the Deformer which uses the current SL Default Shape. Look at Mesh Deformer 0.2 Update to see what you think. I was playing with Deformer 0.2 at the time. Before the Deformer was out in Beta I wrote about the problem concerning texture stretching: #SL Mesh and the Button Problem. You’ll have to decide if the stretching and distortion is a problem for you. A long with texture distortions another concern is actual mesh distortions. In the opening image above and in the image immediately above you can see the mesh breaking down when using Deformer 0.2. I have not tried with Deformer 0.3 yet. I think most of the changes between 0.2 and 0.3 are performance changes. The closer the base shape used by the designer is to your actual shape, the smaller this type of distortion will be. Check out MetaReality’s recent podcast where Karl Stiefvater discusses it. I have a summary and time mark index to the audio in Mesh Deformer Update from MetaReality. Elie wants to see the Deformer support selectable base shapes. She is promoting adding the current 5 Standard Sizes as alternate base shapes for the Deformer. Her belief is that will provide us the best possible result. She believes curvier avatars and large avatars are not going to be happy with the distortion that occurs. She also wants an in-world converter. If you don’t know, mesh clothes that are to use the Deformer must be uploaded with the Deformer Project viewer so the Deform Flag is set. Otherwise the Deformer ignores it. If it didn’t, then Deformer would try to deform things never intended to be deformed. All mesh previously uploaded is missing the flag. All mesh missing the flag is NOT deformed. Elie would like to see in-world conversion possible. That task is likely to run into Permissions problems. The way the asset system works is each items has a UUID (Unique Universal ID). Change the object and the system sees it as a new object and gives it a new UUID, essentially making a copy it and changing the copy. So, changing the flag will necessitate making a new object or basically copying it. So, it may be possible for Copy-Mod-OK items. A Thing About Standard Sizes You may be one of the people that participated in the survey to come up with the Standard Sizes. I suspect most of us did not. No one has said what the sample size was, how many participated? But, even if 100% of Second Life participated, the sizes are still averages. I think that just guarantees that they will fit no one. Misleading Market Hype The standard sizes were made up for a reason and the creators of the system did it as well as they could. As things are now I don’t know a better way, thus the importance of and the excitement about the Deformer. But… not all the people saying they are building for the Standard Sizes are. In a post Innula Zenovka points out what I have observed. Some designers’ clothes said to be a ‘standard size’ fit me pretty well. Other designers making the same claim have clothes that don’t fit. This suggests truth in advertising in Second Life is as questionable as it is in RL. So, we can’t blame all the poorly fitting Standard Sized clothes on the standard. Much of the problem is in how people attempt to implement it. I’m hoping my tutorial mitigates some of those problems. Like this: Like Loading...
Q: Outlook API - Get meeting room calendar How can I get an Office365 meeting room calendar using Outlook Calendar REST API? I can't find anything useful on the api documentation or stackoverflow.. A: You can use the Outlook CalendarView API. The endpiont is https://outlook.office.com/api/v2.0/users/{user mail address}/calendarview?startDateTime={start_datetime}&endDateTime={end_datetime} Replace the {user mail address} with the meeting room address. Find more information from https://msdn.microsoft.com/en-us/office/office365/api/calendar-rest-operations
from PyInstaller.utils.hooks import collect_submodules hiddenimports = collect_submodules('ethereum')
Follow Vault Nutrition via Email Paleo Pancakes Paleo I made two different pancake recipes this morning to try and determine which was best. The first ones were quick, yummy, but a tad dry – but I may have overcooked them. The second recipe was more like a traditional pancake but I was so hungry by the time the second batch cooked that I forgot to take a photo! Try them both and see which ones you prefer – just make sure you have some ripe bananas and a can of coconut cream in the fridge the night before. The more over-ripe the bananas, the better for these recipes – for both the pancakes and the whipped coconut cream. Mix eggs, almond butter and bananas in a mix master until well combined Grease pan with coconut oil. Pour batter to create pancakes Cook for approximately 3 minutes, flip and cook an additional 2-3 minutes To make the topping whip coconut cream, banana and vanilla bean together. Dollop onto pancakes and serve with fresh fruit Pancakes # 2 4 eggs 1 cup coconut milk 1 vanilla bean, cut in half and scraped 1 tablespoon raw honey 1/2 cup coconut flour 1 teaspoon baking soda 1/4 teaspoon cinnamon Coconut oil to cook Method Beat eggs until frothy. Mix in coconut milk, vanilla bean and honey In a small bowl mix together coconut flour, baking soda and cinnamon Combine dry mixture with and beat on medium speed (hand mixer) for about 30 seconds. Scrape down sides of bowl then mix on medium to medium-high for another minute or two or until the coconut flour is completely mixed into the batter Grease pan with coconut oil. Pour batter to create pancakes. If the batter seems too thin you may need to add a small amout of coconut flour to achieve the desired consistency Cook for approximately 3 minutes, flip and cook an additional 2-3 minutes
The use of nicotine patches, gum, lozenges, inhalers or nasal sprays – together called “nicotine replacement therapy,” or NRT – came into play in 1984 as prescription medicine, which when combined with counseling, helped smokers quit. But in 1996, at the urging of pharmaceutical companies, the U.S. Food and Drug Administration (FDA) allowed those products to be sold over-the-counter. Now, a new study conducted by scientists at UC San Francisco reports that tobacco companies have known for decades that, without counseling, NRT hardly ever works, and that consumers often use it to complement smoking. This insight from the formerly secret industry documents known as the “Tobacco Papers” reveals why companies that once viewed nicotine patches and gum as a threat to their cigarette sales now embrace them as a business opportunity, the researchers said. “It was surprising to discover the industry came to view NRT as just another product,” said UCSF’s Dorie Apollonio, PhD, associate professor in clinical pharmacy and lead author of the study. “The tobacco companies want people to get nicotine – and they’re open-minded about how they get it.” The new analysis comes on the heels of the FDA’s July 28, 2017, decision to lower nicotine levels in conventional cigarettes while delaying regulation on e-cigarettes as part of a “comprehensive nicotine strategy.” “The industry has long taken a broad view of all nicotine products as a way to support smoking,” said senior author Stanton Glantz, PhD, a UCSF professor of medicine and director of the UCSF Center for Tobacco Control Research and Education. “Our study shows that by not regulating nicotine in all tobacco products, including NRT, the FDA could be walking into a trap.” Clues From Paper Trail Smoking is responsible for more than 480,000 deaths every year in the U.S., according to the Centers for Disease Control and Prevention, and another 16 million Americans live with a smoking-related disease. The costs of such illnesses total more than $300 billion each year, when including both costs of direct medical care and lost productivity due to secondhand smoke exposure. In the new study, published Aug. 17, 2017, in the American Journal of Public Health, the authors dug into internal corporate documents of the seven major tobacco companies dated between 1960 and 2010. They found that cigarette makers had started investing in alternative forms of nicotine delivery as early as the 1950s, but stopped short because people largely regarded nicotine as harmful, and such products might have attracted the attention of FDA regulators. But in 1987, three years after the federal agency first approved nicotine gum as a quitting aid, the new research shows that the tide had turned on public perception toward nicotine. What’s more, by 1992, the industry had determined that patches and gum by themselves do not help smokers quit. For more than a decade, the companies didn’t act on this knowledge out of fear of FDA regulation. But once the agency started regulating cigarettes in 2009, tobacco corporations went all out in their bid to develop and sell NRT. The Tobacco Papers reveal that companies conjectured that their new nicotine products could successfully compete with pharmaceutical NRT and they set the goal of gaining market control of all products containing nicotine. “It would be interesting to see in the next 10 years if the companies come up with nicotine water, inhalers, gum, edible products — these are all on their agenda,” said Apollonio. RJ Reynolds and Philip Morris currently market nicotine gum and lozenges as vehicles for smokeless nicotine. Switch NRT Back To Prescription Clinical trials show that NRT can help people quit smoking, but only if used in conjunction with counseling and in tapering doses. Over-the-counter availability of NRT made it easy for smokers to get a nicotine fix in non-smoking environments like offices and flights, for example, with the net result that they were less likely to quit. Given that NRT products are widely available, one of the questions is whether they encourage nicotine abuse. A few studies have reported that abuse rates are low – data that the FDA has used to keep NRT available over-the-counter – but given the new findings, the agency should consider regulating the ways in which NRT is being marketed and its over-the-counter availability, the authors urged. Such changes in FDA are not uncommon. Formulations of the decongestant Sudafed containing the drug pseudoephedrine, for example, used to be sold over-the-counter in large bottles, but because pseudoephedrine is used to manufacture methamphetamine, that formulation is now available only by prescription. Similarly, Tylenol 3 went from being a prescription drug to over-the-counter and back to prescription-only, Apollonio said. “Tobacco companies put out these products as a way to sidestep policies, by giving people a way to ‘smoke without smoking,’” Apollonio said. “This can basically facilitate and normalize lifelong nicotine addiction.” Funding for the research came from the National Cancer Institute and from the UCSF Resource Allocation Program. UC San Francisco (UCSF) is a leading university dedicated to promoting health worldwide through advanced biomedical research, graduate-level education in the life sciences and health professions, and excellence in patient care. It includes top-ranked graduate schools of dentistry, medicine, nursing and pharmacy; a graduate division with nationally renowned programs in basic, biomedical, translational and population sciences; and a preeminent biomedical research enterprise. It also includes UCSF Health, which comprises three top-ranked hospitals, UCSF Medical Center and UCSF Benioff Children’s Hospitals in San Francisco and Oakland, and other partner and affiliated hospitals and healthcare providers throughout the Bay Area.
Aus Piratenwiki Definition Der Vogonismus bezeichnet eine Verhaltensweise, mit der Informationen allgemein zugänglich in den Parteimedien verborgen werden. Für den Fall, dass Parteimitglieder sich über mangelnde Information beschweren, verweisen die Vogonisten in der Regel auf die allgemeine Zugänglichkeit der Information. Charakteristisch für den Vogonismus ist der Aufbau eines unüberschaubaren Netzes an Kommunikationskanälen und -formen, als auch die inkonsistente Nutzung der Kanäle, so dass Informationen nicht dort vorliegen, wo sie erwartet werden, selbst wenn vergleichbare Informationen bereits auf diesem Wege verbreitet wurden. Ein vogonistisches Informationssystem zeichnet sich dadurch aus, dass nur ein kleiner Kreis der Rezipienten mit der effektiven Nutzung der Informationskanäle vertraut ist, bzw. gemacht wird. [1] Wer sich an »Per Anhalter durch die Galaxis« erinnert, kennt den Ursprung. [2] Credits to Ethiel und Tessarakt Arvid Doerwald Beispiele von Vogonismus in der Piratenpartei Superministerium Anlässlich der Ankündigung einer 2009-09-16 - Neues Ministerium in der das für den Fall einer Regierungsbeteiligung der Piratenpartei geplante Zukunftsministerium vorgestellt werden sollte, wurde ein Fall klassischen Vogonismusses sichtbar: Von den damals etwa 8.000 Mitgliedern der Piratenpartei hatten laut Aussage des Autors etwa 50 Kenntnis des Entwurfes. Es gab eine heftige Diskussion in den Parteimedien, insbesondere in den diversen Mailinglisten der Partei, als auch im Forum. Die Diskussion wurde auch Gegenstand einer Sitzung des Bundesvorstandes und dort wurde unter Top 4 kundgetan: TOP 4: Zukunftsministerium (Aaron) Kritik: Die Idee wurde im Vorfeld nicht genug kommuniziert, Mitglieder fühlen sich übergangen. Es ist nicht im Wahlprogramm drin. Erwiderung der Projektverantwortlichen: Das ganze wurde offen im Wiki geplant, man hätte sich informieren können. Wer das Wiki kennt, wird wissen, dass es die Anforderungen des klassischen Vogonimus bestens erfüllt, nämlich Informationen öffentlich zugänglich zu verstecken. Syncom Diverse Mailinglisten sind auch als Newsgroup verfügbar, aber es gibt keine vollständie Liste darüber, welche das sind und welche ML welcher NG entspricht, lediglich eine Übersicht. Wie kann die Piratenpartei Vogonismus verhindern? Antworten auf der Diskussionsseite >>
Get Involved Optional email code Take Our 60 Second Survey Torbay Lib Dems are here to give a voice to the local community. By taking our 60 second survey, you can quickly and easily let us know what is important to you and raise any issues of concern. Read more What to make a difference for your community? Stand as a local candidate with the Lib Dems in 2019 In May 2019, Torbay will elect 36 people to the new Council. The current elected Mayor model was rejected in a referendum so the new Council will consist of 36 members who will elect a Counci... Liberal Democrats are set to demand the officers of Torbay Council call time on the contract with TOR2, who manage a significant number of Council functions such as cleaning Torbay’s streets and toilets, recycling and parks maintenance. The Ellacombe Liberal Democrat councillor Cindy Stocks, who... Liberal Democrats on Torbay Council are set to put a motion at Torbay’s Full Council meeting on 19 October, demanding that taxi drivers have adequate training to ensure that assistance dogs can use this service. A Torquay Liberal Democrat councillor, Mandy Darling, who is a guide dog user hersel... Torbay Liberal Democrats are set to propose a motion of no confidence in Devon and Cornwall’s Police and Crime Commissioner Alison Hernandez at the next meeting of Torbay Council on October 19th. The motion requests that Torbay Council’s Chief Executive, Steve Parrock, should contact the Home Sec... Liberal Democrats on Torbay Council are set to call on the Council to protect the BMX track and the playing field off Easterfield Lane Watcombe Torquay, by registering them with the national memorial scheme Fields In Trust at the Torbay Full council to be held on 19 October 2017. Steve Darling, ... Two Paignton Liberal Democrat Councillors are supporting the juniors of Paignton Rugby Club by raising their dispute over where they can play with the elected Mayor and Executive member with responsibility of sport.Clifton with Maidenway Councillors Ian Doggett and Adrian Sanders have questions t... The survey seeks to find out, amongst other things, what types of crime people and businesses have experienced, any hotspots where crime or anti-social behaviour may be taking place, and what the priorities for local police should be. Commenting on the survey, the leader of the Liberal Democrats... The Liberal Democrats and their elected representatives may use the information you’ve given to contact you. By providing your data to us, you are consenting to us making contact with you in the future by mail, email, telephone, text, website and apps, even though you may be registered with the Telephone Preference Service. Your data may be stored or otherwise processed in the US, governed by European Commission model contract clauses. You can always opt out of communications at any time by contacting us or visiting www.libdems.org.uk/optout. For more information go to www.libdems.org.uk/privacy.
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd"> <modelVersion>4.0.0</modelVersion> <parent> <groupId>org.sonatype.oss</groupId> <artifactId>oss-parent</artifactId> <version>7</version> </parent> <groupId>{{ api.maven.group_id }}</groupId> <artifactId>{{ api.maven.artifact_id }}</artifactId> <version>{{ api.maven.version }}</version> <name>{{ api.title }} {{ api.maven.version }}</name> <packaging>jar</packaging> <inceptionYear>2011</inceptionYear> <organization> <name>{{ api.ownerName }}</name>{% if api.ownerDomain == "google.com" %} <url>http://www.google.com/</url>{% endif %} </organization> <licenses> <license> <name>The Apache Software License, Version 2.0</name> <url>http://www.apache.org/licenses/LICENSE-2.0.txt</url> <distribution>repo</distribution> </license> </licenses> <build> <plugins> <plugin> <artifactId>maven-compiler-plugin</artifactId> <version>2.3.2</version> <configuration> <source>1.5</source> <target>1.5</target> </configuration> </plugin> <plugin> <artifactId>maven-jar-plugin</artifactId> <version>2.3.1</version> <configuration> <archive> <manifestEntries> <Built-By>Google</Built-By> <Build-Jdk>1.6.x</Build-Jdk> </manifestEntries> </archive> </configuration> </plugin> <plugin> <artifactId>maven-javadoc-plugin</artifactId> <version>2.7</version> <configuration> <doctitle>{{ api.title }} ${project.version}</doctitle> <windowtitle>{{ api.title }} ${project.version}</windowtitle> <links>{% for link in features.javadoc_links %} <link>{{ link }}</link> {% endfor %}</links> </configuration> </plugin> </plugins> <sourceDirectory>{% if layout.unzip_source %}{{ layout.source_location }}{% else %}.{% endif %}</sourceDirectory> </build> <dependencies> <dependency> <groupId>com.google.api-client</groupId> <artifactId>google-api-client</artifactId> <version>{{ features.baseClientLibrary }}</version> </dependency> </dependencies> <properties> <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> </properties> </project>
Tread Carpet by Martín Azúa, a Rug with a Small Footprint and a lot of Spanish Tradition For Camper's shoe stores, Martín Azúa designed a rug made from the soles of espadrilles. These sandals are made from esparto, a grass with a long tradition in Spain. For this carpet, Azúa worked with women artisans in the region of Murcia to keep the production local (unlike Camper for their shoes unfortunately). Esparto is a very eco-friendly material as it is fully renewable, grows in abundance in Spain and is also biodegradable. It seems Azúa has gotten the gang of it, after launching the Get Up Esparto seat last year, and now the Tread Carpet. This is definitely a rug with a small footprint (pun intended). Let's hope these products inspire more designers to give esparto new functions while at the same time create jobs for artisans in Spain.
1. Technical Field The present invention relates to a projector system composed of a plurality of projectors and a control device such as a personal computer (PC) for controlling the projectors configured to be able to communicate with each other, the control device constituting the projector system, the projector constituting the projector system, and a storage medium on which the program to be executed by the control device in the projector system is recorded. 2. Related Art In the case of connecting projectors and a PC configured to be able to communicate with each other via wireless communication means such as a wireless LAN to each other, there is known a method of establishing the connection by launching connection software in the PC to probe connectable projectors, and then selecting a desired projector in the projectors detected by the probe. For example, according to the method described in JP-A-2006-196946 (Document 1), the electrical field intensity of a probe request signal from a probing PC is raised gradually to increase the range of the probe, while listing the projectors sending the response. However, in the probing system of the Document 1, since it is difficult to fine-tune the electrical field intensity of the wireless signal, in the case in which no projector is detected with certain electrical field intensity, when a further probe is then performed with increased electrical field intensity, a plurality of projectors may sometimes be detected. Therefore, in such a case, it is hard to find out which one of the listed projector is the projector (e.g., a close-by projector) desired to be connected, and the user is required to select the projector desired to be connected using other information (e.g., a model number) as a clue.
1.000 PS-Motor ab 2017? Die neuen Ideen der Motoren-Hersteller Am 6. Februar wollen FIA-Rennleiter Charlie Whiting und die Motoren-Chefs Bernie Ecclestone und Jean Todt ihre Pläne für eine neue Formel 1 präsentieren. Wahrscheinlich kommt der angekündigte 1.000 PS-Motor erst 2017. Es kursieren wilde Gerüchte, wo die Reise hingehen könnte. Die Motorenchefs von Mercedes, Ferrari, Renault und Honda haben sich schon zwei Mal getroffen. Am 6. und am 21. Januar. Thema des Brainstormings war jedes Mal das gleiche: Wie sehen die Formel 1-Motoren der Zukunft aus? Bernie Ecclestone gab bereits grobe Vorgaben: Lauter, stärker, simpler. Parallel dazu entwickelt FIA-Rennleiter Charlie Whiting Vorschläge für einfachere Regeln, spektakulärere Autos und geringere Kosten. Am 6. Februar wird alles präsentiert. Der Plan, schon 2016 mit dem Neustart zu beginnen, kann wahrscheinlich nicht eingehalten werden. Die Beteiligten sprechen jetzt bereits von 2017. "Der nächste Schuss muss sitzen. Wir können uns keine halben Sachen mehr leisten", warnt Niki Lauda. Die Formel 1 hat mit ihrer Flickschusterei am Reglement schon zu viel Fans vergrault. Einen weiteren Flop würde man ihr nicht verzeihen. Ferrari schlägt V8-Biturbo-Motor vor Das Problem liegt wie immer darin, dass zu viele mitreden. Das zeigt sich bei der Motorendiskussion. Mittlerweile sickern einige der Vorschläge durch, die gerade debattiert werden. Mercedes würde am liebsten auf dem aktuellen Motorkonzept aufbauen. Logisch. Da haben die Weltmeister einen technischen Vorsprung. Ihr Argument: Ein komplett neues Konzept würde nur zu viel Geld kosten. Außerdem liege Hybrid im Trend der Zeit. Mercedes wäre aber immerhin bereit, die reglementierte Durchflussmenge aufzugeben und das Spritlimit nach oben zu setzen. Nur so kommt man über die 1.000 PS, die von Ecclestone gefordert sind. Und so würde auch der Sound besser. "Bis 2017 sind die aktuellen Motoren Tagesgeschäft. Man müsste sie nur verstärken, damit sie mehr Leistung aushalten", meint Lauda. Honda ist offenbar dazu bereit, über neue Motoren zu reden, schlägt aber noch extremere zukunftsweisende Entwicklungen vor. Zum Beispiel vier elektrisch betriebene Radnaben-Motoren zur Unterstützung der Antriebsquelle. Ferrari will zurück zur Basis: 2,2 Liter V8-Biturbo bis 17.000/min, ohne MGU-H, dafür mit Standard-KERS und Einheits-Turbolader. In die Richtung tendiert auch Red Bull. Doch da spielt Mercedes nicht mit. Den Turbolader soll jeder selbst bauen dürfen. Klar, weil Brixworth auf dem Gebiet einen Technologievorsprung hat. Der Preis für die Motoren soll nach den Vorgaben 10 Millionen Euro nicht übersteigen. Bei dem Punkt stöhnen alle Hersteller. Sie wollen mit den Triebwerken Geld verdienen. Doch diesmal haben sie wenig Spielraum. Ecclestone droht den Herstellern ein Motorkonzept aufs Auge zu drücken, wenn sie sich nicht auf einen vernünftigen Vorschlag einigen können." Neue Autos mit mehr Grip und noch mehr Power Auch die Autos sollen ein neues Gesicht bekommen. "Spektakulär" ist jedoch ein großes Wort. Da versteht jeder etwas anderes darunter. Lauda meint: "So ein Auto darf sich nicht an alte Zeiten anlehnen. Die Form muss in die Zukunft weisen. Jung und alt müssen sagen: Geil, so was haben wir noch nie gesehen." Die Formel klingt auf dem Papier einfach, ist aber schwer zu realisieren. Breitere Reifen, mehr Grip, aber noch mehr Power. "Die Autos müssen wieder schwer zu fahren sein. Der Grip muss hoch, aber wenn er abreißt, dann abrupt. Die Fahrer sollen wieder die Luft anhalten", fordert Lauda. Einer der größten Streitpunkte wird das Thema Kosten werden. Weil die großen und kleinen Teams da unterschiedliche Vorstellungen haben. Die FIA stellt sich diesmal auf die Seite der Kleinen. Charlie Whiting muss seinen Neun-Punkte-Plan bis zum 6. Februar noch einmal entschärfen. Einige Vorschläge waren den großen Teams zu extrem. Zum Beispiel mehr Gleichteile, externe Windkanäle, die nur in 10-Stunden-Paketen gemietet werden können, eine gemeinsame IT, maximal vier Upgrades im Jahr oder weniger Fracht zu den Rennen.
Q: Exception on jsp page when validation is done through spring validator class i m facing problem in validation of spring i m using the validator class for validation ,validation is happening properly but for int and date type when i provide different type like string in form field then whole exception is paste on my jsp page i want to provide proper message format on that.One more thing i want to do i want to use regex in this validator class please provide a piece of code snippet of regex with any example so that i can implement in this validator class this is my controller package com.nousinfo.tutorial.controllers; import java.text.SimpleDateFormat; import java.util.Date; import java.util.Map; import javax.servlet.http.HttpServletRequest; import org.springframework.beans.propertyeditors.CustomDateEditor; import org.springframework.stereotype.Controller; import org.springframework.ui.Model; import org.springframework.validation.BindingResult; import org.springframework.web.bind.ServletRequestDataBinder; import org.springframework.web.bind.annotation.ModelAttribute; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RequestMethod; import org.springframework.web.bind.annotation.RequestParam; import org.springframework.web.servlet.ModelAndView; import com.nousinfo.tutorial.model.EmployeeForm; import com.nousinfo.tutorial.service.impl.EmployeeServiceImpl; import com.nousinfo.tutorial.service.impl.ProjectServiceImpl; import com.nousinfo.tutorial.service.model.EmployeeBO; import com.nousinfo.tutorial.validator.EmployeeValidator; /** * * @author ankurj * */ @Controller @RequestMapping("employee") public class EmployeeController { private EmployeeServiceImpl employeeServiceImpl; private ProjectServiceImpl projectServiceImpl; private EmployeeValidator employeeValidator; public void setEmployeeServiceImpl(EmployeeServiceImpl employeeServiceImpl) { this.employeeServiceImpl = employeeServiceImpl; } /** * Set the view to Employee Form * * @param model * is the entity mapped to form object * @return view * @throws Exception */ @RequestMapping(value = "/searchspring", method = RequestMethod.GET) public String view(Model model) throws Exception { EmployeeBO employeeBO = new EmployeeBO(); model.addAttribute("employeeBO", employeeBO); return "EmployeeForm"; } public void setEmployeeValidator(EmployeeValidator employeeValidator) { this.employeeValidator = employeeValidator; } /** * set the view to "AboutUS" * * @return VIEW */ @RequestMapping(value = "/aboutUs", method = RequestMethod.GET) public String aboutUsView() { return "AboutNous"; } /** * This method is used to insert the detail of employee or simply create new * employee with detail * * @param employeeForm * is the model entity mapped to form object * @param bindingResult * @param model * @return * @throws Exception */ @RequestMapping(value = "/createEmployee", method = RequestMethod.POST) public ModelAndView createEmployee( @ModelAttribute("employeeBO") EmployeeBO employeeBO, BindingResult bindingResult) throws Exception { ModelAndView model = new ModelAndView(); employeeValidator.validate(employeeBO, bindingResult); System.out.println(bindingResult); System.out.println(employeeBO.getEmployeeNumber()); if (bindingResult.hasErrors()) { model.setViewName("EmployeeForm"); return model; } model.addObject("employeeBO", employeeBO); if (employeeBO.getUpdateStatus() == 'A') { boolean flag = employeeServiceImpl.actionDecider(employeeBO); if (flag == false) { model.setViewName("DBError"); } else model.setViewName("Success"); } return model; } } this is my validator class package com.nousinfo.tutorial.validator; import java.util.regex.Matcher; import java.util.regex.Pattern; import org.springframework.validation.Errors; import org.springframework.validation.ValidationUtils; import org.springframework.validation.Validator; import com.nousinfo.tutorial.service.model.EmployeeBO; public class EmployeeValidator implements Validator { public boolean supports(Class<?> arg0) { return EmployeeBO.class.isAssignableFrom(arg0); } public void validate(Object object, Errors errors) { boolean found = false; Pattern pattern = Pattern.compile("[0-9]"); ValidationUtils.rejectIfEmpty(errors, "firstName", "employeeBO.firstName"); ValidationUtils.rejectIfEmptyOrWhitespace(errors, "title", "employeeBO.title"); ValidationUtils.rejectIfEmptyOrWhitespace(errors, "city", "employeeBO.city"); ValidationUtils.rejectIfEmptyOrWhitespace(errors, "state", "employeeBO.state"); EmployeeBO employeeBO = (EmployeeBO) object; if (pattern.matcher(employeeBO.getFirstName()).find()) { found = true; } if (found) { errors.rejectValue("firstName", "employeeregex.string"); } if (pattern.matcher(employeeBO.getLastName()).find()) { found = true; } if (found) { errors.rejectValue("lastName", "employeeregex.string"); } if (pattern.matcher(employeeBO.getCity()).find()) { found = true; } if (found) { errors.rejectValue("city", "employeeregex.string"); } if (pattern.matcher(employeeBO.getState()).find()) { found = true; } if (found) { errors.rejectValue("state", "employeeregex.string"); } if (employeeBO.getEmployeeNumber() == null) { errors.rejectValue("employeeNumber", "employeeBO.employeeNumber"); } if (employeeBO.getPincode() == null) { errors.rejectValue("pincode", "employeeBO.pincode"); } if (employeeBO.getTelephoneNumber() == null) { errors.rejectValue("telephoneNumber", "employeeBO.telephoneNumber"); } if (employeeBO.getMobileNumber() == null) errors.rejectValue("mobileNumber", "employeeBO.mobileNumber"); } } this is my jsp by which i m providing input <%@ page language="java" contentType="text/html; charset=ISO-8859-1" pageEncoding="ISO-8859-1"%> <%@ taglib uri="http://jakarta.apache.org/taglibs/input-1.0" prefix="input"%> <%@ taglib uri="http://java.sun.com/jsp/jstl/core" prefix="c"%> <%@ taglib uri="http://www.springframework.org/tags" prefix="s"%> <%@ taglib uri="http://www.springframework.org/tags/form" prefix="form"%> <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> <title>Create Employee</title> <script> function home() { window.location.href = "/EmployeeWebSpring/search/searchspring"; } </script> </head> <body background="../images/flower.jpg"> <table width="1254" height="74" border="0" align="center"> <tr> <td width="20" height="68" align="center" bgcolor="#FFFFFF"><img src="../images/Header.png" width="1300" height="92" /></td> </tr> </table> <p> <br /> </p> <hr size="1" width="1254"> <h1 align="center"> <font color="FFA54F">Employee Form</font> </h1> <form:form id="form" method="post" action="/EmployeeWebSpring/employee/createEmployee" commandName="employeeBO"> <table align="center" class="table"> <tr> <form:hidden path="updateStatus" value="A" /> </tr> <tr> <td>EmployeeNumber:</td> <td><form:input path="employeeNumber" /><font color="red"><form:errors path="employeeNumber" /></font></td> </tr> <tr> <td>First_Name:</td> <td><form:input path="firstName" /><font color="red"><form:errors path="firstName" /></font></td> </tr> <tr> <td>Last_Name:</td> <td><form:input path="lastName" /><font color="red"><form:errors path="lastName" /></font></td> </tr> <tr> <td>Title:</td> <td><form:input path="title" /><font color="red"><form:errors path="title" /></font></td> </tr> <tr> <td>Department_Id:</td> <td><form:input path="departmentId" /></td> </tr> <tr> <td>Address1:</td> <td><form:input path="address1" /></td> </tr> <tr> <td>Address2:</td> <td><form:input path="address2" /></td> </tr> <tr> <td>City:</td> <td><form:input path="city" /><font color="red"><form:errors path="city" /></font></td> </tr> <tr> <td>State:</td> <td><form:input path="state" /><font color="red"><form:errors path="state" /></font></td> </tr> <tr> <td>Pincode:</td> <td><form:input path="pincode" /><font color="red"><form:errors path="pincode" /></font></td> </tr> <tr> <td>Telephone_Number:</td> <td><form:input path="telephoneNumber" /><font color="red"><form:errors path="telephoneNumber" /></font></td> </tr> <tr> <td>Mobile_Number:</td> <td><form:input path="mobileNumber" /><font color="red"><form:errors path="mobileNumber" /></font></td> </tr> <tr> <td>Date_Of_Birth:</td> <td><form:input path="dateOfBirth" /><font color="red"><form:errors path="dateOfBirth" /></font></td> </tr> <tr> <td>Date_Of_Anniversary:</td> <td><form:input path="dateOfAnniversary" /><font color="red"><form:errors path="dateOfAnniversary" /></font></td> </tr> <tr> <td>Date_Of_Joining:</td> <td><form:input path="dateOfJoining" /><font color="red"><form:errors path="dateOfJoining" /></font></td> </tr> <tr> <td>Date_Of_Leaving:</td> <td><form:input path="dateOfLeaving" /><font color="red"><form:errors path="dateOfLeaving" /></font></td> </tr> <tr> <td>Reason_For_Leaving:</td> <td><form:input path="reasonForLeaving" /></td> </tr> </table> <br> <br /> <p>&nbsp;</p> <br> <table align="center"> <tr> <td><input type="submit" name="method" value="Save" /></td> <td><input type="button" value="Cancel" onclick="home()" /></td> </tr> </table> <hr size="1" width="786"> <p>&nbsp;</p> </form:form> </body> </html> A: I think the problem comes from the fact you didn't initialize the converters in your controller. the first thing you need to add is the InitBinder in your controller: @InitBinder public void initBinder(WebDataBinder binder) { SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ssZ"); //Select the format you want dateFormat.setLenient(false); binder.registerCustomEditor(Date.class, new CustomDateEditor(dateFormat, false)); } You will need different CustomEditor depending on what you want to do: binder.registerCustomEditor(String.class, new StringTrimmerEditor(true)); //Trim strings binder.registerCustomEditor(byte[].class, new ByteArrayMultipartFileEditor()); //to handle file upload You can also add in your EmployeeBO the following annotations depending on the types you want to use: @Temporal(TemporalType.TIMESTAMP) @DateTimeFormat(style = "S-") //format: 'S' for short style, 'M' for medium, 'L' for long, and 'F' for full. A date or time may be ommitted by specifying a style character '-'. private Date dateOfBirth; @NumberFormat(style=Style.NUMBER) private Long employeeNumberamount;
Der erste Mensch, der mit dem Prophet Mohammed gebetet haben und dem Islam beigetreten sein soll, war seine Ehefrau. Chadidscha war eine erfolgreiche Geschäftsfrau, verwitwet, somit keine Jungfrau, zudem älter als Mohammed und sie machte ihm einen Antrag. Man könnte behaupten, der Islam habe so etwas wie versteckte feministische Wurzeln. Gerade deswegen fragt sich Seyran Ateş, wie er sich trotzdem in eine so frauenfeindliche Richtung entwickeln konnte. „Es gibt keine einzige Stelle im Koran, die erklärt, dass Frauen und Männer nicht gemeinsam beten dürfen“, erklärt sie ze.tt. Die Realität sieht anders aus: Frauen und Männer beten in Moscheen immer getrennt. Auch in berühmten Moscheen, wie der Sultan-Ahmet-Moschee in Istanbul dürfen Frauen nicht einmal den zentralen Gebetsbereich betreten. Absperrung und Schilder weisen sie darauf hin. „An keinem anderen Ort fühle ich mich aufgrund meines Geschlechts derart diskriminiert, werde derart herablassend behandelt wie ausgerechnet in der blauen Moschee“, schreibt Ateş in ihrem neuen Buch Selam, Frau Imamin. Ateş trägt ein weißes Kleid aus Leinen, ihre grauen Haare kurz. Sie spricht bestimmt und sanft zu gleich. Sie ist aber auch müde und genervt von den zahlreichen Interviews. Einen ganzen Tag widmet sie jede Woche nur der Presse. Ein Kamerateam des ZDF folgt ihr auf Schritt und Tritt. „Gestern haben sie beschlossen, mich in meinen Pausen, also beim Nichtstun, filmen zu wollen“, erklärt sie und lacht. Sie atmet tief ein und wechselt zu einem positiven Thema. Die 54-Jährige weiß, wie wichtig die Medien für sie und ihre Agenda sind. Und trotzdem ist sie müde, niemand würde ihre Bücher vor den Interviews lesen, sie müsse alles hundertmal erklären, beschwert sie sich. Im Juni eröffnete sie die Ibn-Rushd-Goethe-Moschee in Berlin-Moabit in den Räumlichkeiten einer evangelischen Kirchengemeinde. Ihr Ziel: eine liberale, progressive Moschee, offen für alle Strömungen des Islam – also Schiiten, Sunniten und Aleviten. Gleichermaßen für Frauen und Männer und explizit auch für Homosexuelle. Ateş begreift sich selbst als Feministin. Sie ist die Tochter einer türkischen Mutter und eines kurdischen Vaters, mit 17 ist sie aus der „familiären Enge“ ausgebrochen und zog in eine deutsche WG, wurde Teil der linken Szene und Atomkraftgegnerin, besetzte sogar Häuser in Ost-Berlin. Toleranz nur bis zur Burka Von der ehemals Linken ist heute nicht mehr viel übrig. Ateş‘ Toleranz endet mittlerweile bei den Burka- oder Niqab-Trägerinnen. Diese seien in ihrer Moschee nicht willkommen, gab sie in vergangenen Interviews an. „Weder im Koran noch in den Hadith kann diese Verschleierung religiös begründet werden. Das ist nicht islamisch“, sagt Ateş auch gegenüber ze.tt. Rudert dann aber doch etwas zurück. Denn die Alevit*innen, die ja ebenfalls Teil der Ibn-Rushd-Goethe-Moschee sind, denken darüber liberaler. Ihr genereller Glaubenssatz: Wenn jemand an die Tür klopft, lass ihn nicht warten sondern herein. „Ich habe mit meinen alevitischen Freunden einen Kompromiss gefunden. Sollte eine Frau in der Burka kommen, darf sie herein, muss sich aber abtasten lassen und zumindest mir ihr Gesicht zeigen“, sagt Ateş und blickt ernst drein, es gehe schließlich auch um ein Sicherheitsrisiko. „Und sie muss mit allem einverstanden sein, was wir hier so machen“, fügt sie noch hinzu und daran würde es scheitern. [Außerdem bei ze.tt: Welche Rolle der Islam für junge Moslems in Deutschland spielt] Ateş selbst beschreibt sich mittlerweile als wertkonservativ. Immer wieder hat sie in der Vergangenheit Stellung zu politischen Debatten genommen, sei es rund um das Kopftuch, die Doppelstaatsbürgerschaft oder wie aktuell zu den islamischen Kindergärten. Bei diesem Thema sympathisiert die ehemalige Linke sogar mit der konservativen und teilweise rechten Liste Kurz in Österreich. Passt es thematisch rein, ist sie auch mal einer Meinung mit rechten Parteien. „Na und? Dann ist es das eben. Konservativ muss ja nicht illiberal sein (…) Die Linken und Liberalen und Feministinnen sind immer nur ratlos und veranstalten Tagungen und suchen den Konsens – das ist zu wenig“, sagt sie in einem Interview mit der taz. Es klingt wie ein Widerspruch in sich, aber ihr ist die Trennung von Politik und Glaube wichtig. Sie ist überzeugt, dass der Hass und die Drohungen gegen ihre Person vor allem auf den Druck der Türkei und des Präsidenten Erdoğan zurückzuführen sind, der sie als Fethullah-Gülen-Anhängerin denunzierte. „Viele Menschen in der Nachbarschaft möchten bei uns beten, haben aber Angst, ebenfalls als Terroristen abgestempelt zu werden“, sagt die Imamin. Kritik von den Radikalen und Liberalen Für ihre Moschee wird die Frauenrechtlerin gelobt, aber auch kritisiert. Radikale wie Liberale greifen sie an. Konservative und Radikale sehen die Imamin als Islamhasserin und ihre Religion bedroht. Liberale kritisieren Ates hingegen dafür, zu dogmatisch geworden zu sein. Nushin Atmaca, erste Vorsitzende des Liberal-Islamischen Bundes (LIB), erklärt gegenüber der ZEIT ihre Kritik so: „Eine progressive Auslegung des Islam darf keinen Absolutheitsanspruch formulieren. Sie muss auch konservative Sichtweisen respektieren.“ Auch der Autor des Buches Ist der Islam noch zu retten?: Eine Streitschrift in 95 Thesen und Islamkritiker Hamed Abdel-Samad findet Ates Bestreben zwar bewundernswert, denkt aber, dass es nicht mehrheitsfähig ist. Die Imamin würde Träumen und Wunschvorstellungen nachjagen. Ein liberaler Islam könne nicht funktionieren: „Was verbindet denn am Ende die Muslime? Ich denke der politische Islam.“ Es ist eine Spirale. Am Ende dreht sich jede Diskussion rund um Seyran Ateş um eigentlich viel komplexere Fragen wie: Wie frauenfeindlich und gewalttätig ist der Islam wirklich? Können Politik und Islam getrennt werden? Gibt es einen liberalen Islam? Der Koran kann diese Fragen auf jeden Fall nicht beantworten, denn er liefert teils sehr widersprüchliche Aussagen. Je nach Interpretation und Auslegung stellt er Männer und Frauen vor Gott gleich, legitimiert aber gleichzeitig Gewalt gegen die Ehefrau und rät von Frauen, welche die Gesellschaft lenken, ab. Gerade deswegen liege die Verantwortung einer zeitgerechten Interpretation bei den Muslim*innen und Imam*innen, wie Ateş betont. Ateş zieht sich ihre Schuhe aus und betritt einen cremefarbenen, lichtdurchfluteten Raum. Zuvor war hier ein Theaterraum mit hässlichem Teppichboden, erklärt sie. Von den Fenstern aus kann man den Friedhof der evangelischen Kirche sehen. Die Imamin nimmt einen Teppich in die Hand. Es wurden extra Teppiche ohne religiöse Ornamente für die Moschee gekauft, um keine Strömung zu bevorzugen. Mit einer App bestimmt sie, wo Mekka liegt, also in welche Richtung gebetet wird und zeigt grob wie. „Manche muslimische Männer argumentieren, dass sie nicht gemeinsam mit Frauen beten können, da sie von ihren Körpern abgelenkt werden“, erzählt sie und gestikuliert wild mit den Händen. „Jeder, der das behauptet, hat keine Ahnung vom Beten. Du schaust dabei nur auf deinen eigenen Teppich und deine eigenen Füße nie auf die Person vor dir. Du kannst also gar nicht sehen, wer das ist – ganz egal ob Mann oder Frau.“ Durch diese Aussage würden zudem alle muslimischen Männer zu sexgetriebenen, gehirnlosen Tieren denunziert werden. Dann rollt Ateş den ebenfalls cremefarbenen Teppich wieder zusammen und nickt bestimmt. Dadurch werden alle muslimischen Männer zu sexgetriebenen, gehirnlosen Tieren denunziert.“ Ateş selbst betet beim großen Freitagsgebet derzeit noch nicht vor, hält aber Predigten. Ein Mann und eine Frau würden sich mit dem Vorbeten abwechseln. Auf Dauer würde Ateş gerne genug Geld haben, um einen Imam und eine Imamin fest anzustellen zu können. Auf die Frage, was man für die Ausbildung als Imam*in brauche, lacht sie. „In Deutschland braucht man für alles ein Diplom, einen Titel.“ Imam*in könne grundsätzlich jede*r werden, der*die von der Gemeinde akzeptiert wird. „Natürlich soll diese Person mehr über den Glauben wissen als der Rest und verbindend, mediativ handeln.“ In der Türkei gibt es zusätzlich die klassischen Imam-Hatip-Schulen, hier eben das Studium der Islamwissenschaften. Genaue Zahlen über Imam*innen in Europa und Deutschland gibt es nicht, da diese nicht registriert werden, meint sie. „Man kann aber sagen, dass immer mehr Frauen Interesse haben und in diese Richtung gehen.“ Ja, das könne man durchaus einen Trend nennen, meint Ateş. Rund 300.000 Muslim*innen gibt es laut Senat in Berlin – eine Schätzung, da es ebenfalls keine Erhebungen gibt. In etwa 80 Moscheegemeinden versammeln sich Berliner*innen zum Gebet. Die Radikalisierung beginnt in der Moschee „Wenn wir eines von den Anschlägen gelernt haben, dann dass sich diese jungen Menschen meist in den Moscheen radikalisiert haben.“ Wie eben auch Anis Amri, der bei seinem Anschlag auf den Berliner Weihnachtsmarkt elf Menschen tötete. Amri habe sich unter anderem in der Fussilet-Moschee gar nicht weit entfernt radikalisiert. Oft spricht Ateş auch vor Schulklassen, ihr fallen dabei zwei Extreme auf: Die Muslim*innen selbst würden bereits in jungen Jahren Glaubenskriege in den Klassen führen. Darüber, was nun haram und halal sei und was nicht. Woraus eine ganze Generation der Verbotskultur, die Generation haram, entstand. Die Nicht-Muslime würden hingegen wenig bis gar nichts über den Glauben wissen und diesen nur mit Terror verbinden. Geht es nach Ateş, muss aus dem Thema Islam endlich die Politik herausgenommen werden und sich Muslim*innen wieder mehr auf die Spiritualität und ihren Glauben konzentrieren. „Ich habe einen Raum geschaffen, nun warte ich auf die Mehrheit der liberalen Muslime, dass sie kommen und uns unterstützen“, meint sie zum Abschied. Vor ihren Türen steht Polizeischutz. Über hundert Morddrohungen hat sie erhalten. Mittlerweile wird sie rund um die Uhr bewacht. Was halten ihre ständigen Begleiter – die Männer mit Bauchtaschen – von ihr? „Ich finde es bewundernswert, dass sie so vehement kämpft, aber warum muss man sich im Jahr 2017 auf den Glauben versteifen?“ Die anderen pflichten ihm bei. „Die Moslems mit ihrem Allah und die Christen mit ihrem Gott, welche Religion auch immer, alle verrückt.“
Q: Spring ApplicationContext.getBean(Class c) not working for proxy classes I need to look up beans via their class type. When the beans have been wrapped by a Proxy (some methods are @Transactional) - the ApplicatoinContext fails to find them. I find that if I look them up via an interface, it works but in this case I'm working with a concrete class type. I know the bean is of the type I'm looking for but the getBean() method fails. I can debug (and fix) the problem in Spring's AbstractBeanFactory code. The issue is that it checks the type of the beanInstance against type I'm requesting but the beanInstance.getClass() is a Proxy. AbstractBeanFactory should compensate for this and compare the type to the proxy's target class. I have a fix for this but I don't particularly want to use a patched version of Spring and I suspect there must be something I can configure to get this working, or is this really a bug? A: There are two major ways Spring implements AOP (e.g. @Transactional support): either by using proxy interfaces or CGLIB. With interfaces (default) if your class implements any interfaces, Spring will create a proxy implementing all that interfaces. From now on you can only work with your bean through that interfaces. Your class is deeply burried inside them. If you enable proxying target classes instead via cglib: <aop:config proxy-target-class="true"> Spring will create a subclass (obvoiusly still implementing all your interfaces) instead. This will fix your problem. However remember that the returned object is not really your class but dynamically generated subclass that wraps and delegates to your original object. This shouldn't be a problem in most of the cases. And no, of course this is not a bug but well known behaviour and no, there is no need to patch Spring. See also Location of the proxy class generated by Spring AOP Getting Spring Error "Bean named 'x' must be of type [y], but was actually of type [$Proxy]" in Jenkins How to mix CGLIB and JDK proxies in Spring configuration files? Mocking a property of a CGLIB proxied service not working
Q: Are risks of non-combat death exciting or just frustrating and discouraging? I'm a brand-new DM (haven't had my first session yet but it is approaching) so I'm reading up about all DMing-related topics. I'm about to play Pathfinder. My question is about PCs having a risk of death in non-combat scenarios; for example, jumping between two very large buildings or across a crevice. If they fail the jump, they cling on to the ledge, and roll to climb up. Failing again has them fall to their death. Does this risk add a little excitement to these situations or does it just lead to frustrating and unavoidable deaths that discourage players? A: One of the most important things for a DM to remember is to make failure interesting. Your players (and you) are there to have fun. Dying because you had a couple bad rolls isn't fun, it's just frustrating. And as you suggest, it's likely to discourage players. That said, that doesn't mean that there should never be a risk of failure in your game. If there's no chance of failure, that's boring! Getting failure right is all about how the failure affects the entire party. So perhaps instead of the PC falling to their death, they fall into a deep pit, where they take some significant but non-crippling amount of damage upon landing - and are then confronted by something hungry in the darkness. That's interesting, because now the entire group has to make some choices: should the fallen PC try to climb back up before she's eaten, perhaps with assistance from the others? Should the others purposefully jump down to help her? Can they provide assistance against the grue from above, without getting themselves trapped? Or perhaps there's no grue, but the time it takes to extract the fallen PC from the pit means they don't reach the Dread Altar before the Necromancer finishes her Dire Ritual of Destruction. Etc. You can even use it as a chance to reward the players if they do something interesting after the failure: perhaps they find the body of another adventurer who also fell into the pit, who still has some useful gear; or they find a back door into the dungeon. Whatever keeps things exciting! Basically, try to never kill a player just because they had two unlucky dice rolls. (Obviously there's some situations where that might still be appropriate, such as sudden-death dungeons like the Tomb of Horrors, or failing death saving throws in D&D 4e, but in most such situations the other PCs also have a chance to intervene before the unlucky rolls kill the character.) Instead, look for ways to make failure interesting by throwing additional challenges at the players, and reward them if they figure out a way to turn the failure into an advantage. A: Really it depends upon the style of game you are running and what sort of consequences you are looking for. In a game with high character mortality then it might be acceptable to kill characters because they fell into a trap. In other games though even a complete Total Party Kill against the big bad would have the GM find a way to keep them alive (taken prisoner perhaps). Personally I play somewhere in the middle, where risks are real but clear. Something like a trap I would have weaken the players. It would cost them some resources, lose a few hp or some healing spells, but would be unlikely to kill them outright. The key thing here is player agency. Risks are good, in fact I think they are essential for an exciting game, but they need to be ones the players choose to take: Example 1: DM: You see your goal in the cave beyond, there's a 20' chasm descending into the depths below crossing the room. Rogue: I jump the chasm! DM: It's a long jump and deep, you realize that if you fail you will most likely die. Do you still go for it? By giving that clear warning that if you want to do this you are staking the future of your character on the roll of the dice that leaves it over to the player to decide whether to take that risk or not. Example 2: DM: You're walking along the mountain ledge when suddenly it starts to give way. Make a DC20 acrobatics roll or fall to your death. The first one is fair, the second one is arbitrary and unfair.
Raspberry Pi sales are rocketing in the middle of the coronavirus outbreak - kediz https://www.techrepublic.com/article/raspberry-pi-why-sales-have-rocketed-in-the-middle-of-the-coronavirus-outbreak/ ====== boznz Made in the UK (Yes It can be done outside china) Open Source, cheap-as, solid documentation and friendly community. Whats not to like
Distribution and innervation of short, interdigitated muscle fibers in parallel-fibered muscles of the cat hindlimb. The cat hindlimb contains several long, biarticular strap muscles composed of parallel muscle fascicles that attach to short tendons. Three of these muscles--sartorius, tenuissimus, and semitendinosus--were studied by dissecting individual gold-stained fibers and determining the surface distribution of acetylcholinesterase-stained end-plate zones. In each muscle, fascicles were composed of muscle fibers that ran only part of the fascicle length and tapered to end as fine strands that interdigitated with other tapering fibers within the muscle mass. Most muscle fibers measured 2-3 cm in length. Fascicles of muscle fibers were crossed by short transverse bands of endplates (1 mm wide by 1-5 mm long) that were spaced at fairly regular intervals from the origin to the insertion of the muscle. The endplate pattern suggested that the fiber fascicles were organized into multiple longitudinal strips. In the sartorius, the temporospatial distribution of electromyographic (EMG) activity evoked by stimulating fine, longitudinal branches of the parent nerve confirmed that each strip was selectively innervated by a small subset of the motor axons. These axons appeared to distribute their endings throughout the entire length of the fascicles, providing for synchronous activation of their in-series fibers.
Q: Rails 4, Devise - Cannot update username from rails console I am using Ruby on Rails 4 with devise for user authentication. I have problem with creating user from console nor from edited devise registration view. I can set password and email, but i can't set username, I have to create user witouth name and then change it from dbconsole using SQL command ("UPDATE users SET..."). Then I can login with username. My users table: create_table "users", force: true do |t| t.string "name", default: "", null: false t.string "email", default: "", null: false t.string "encrypted_password", default: "", null: false t.datetime "remember_created_at" t.integer "sign_in_count", default: 0, null: false t.datetime "current_sign_in_at" t.datetime "last_sign_in_at" t.string "current_sign_in_ip" t.string "last_sign_in_ip" end My users model: class User < ActiveRecord::Base devise :database_authenticatable, :registerable, :rememberable, :trackable, :validatable validates_presence_of :name, :email, :password attr_accessor :name end When I try u = User.new u.name = "test" from rails console name stays blank. A: Try to remove this line: attr_accessor :name
British Rail brand names British Rail was the brand image of the nationalised railway owner and operator in Great Britain, the British Railways Board, used from 1965 until its breakup and sell-off from 1993 onwards. From an initial standardised corporate image, several sub-brands emerged for marketing purposes, and later in preparation for privatisation. These brands covered rail networks, customers services, and several classes of new trains. With the size of British Rail's fleet, due to the time required to repaint rolling stock, in terms of the physical trains brand switchovers could be lengthy affairs lasting years. This worsened into privatisation, with the same services often using 3 or 4 different liveries. Following privatisation, several of the brands disappeared, although some brand names such as ScotRail, Merseyrail, Eurostar and Freightliner still exist today. The double-arrow symbol introduced with the creation of the British Rail brand in the 1960s, still remains after privatisation, as a unifying branding device used by the privatised National Rail network, and shown on most tickets, stations, timetables and publicity, but not trains. Timeline of brands Under the Transport Act 1962, responsibility for the state railway operation, British Railways, was transferred from being a trade name and subsidiary of the British Transport Commission, to a separate public corporation, under the British Railways Board. As the last steam locomotives were being withdrawn (completed in 1968) under the 1955 Modernisation Plan, the corporation's public name was re-branded in 1965 as British Rail, which introduced the double-arrow symbol, a standard typeface (named Rail Alphabet) and the BR blue livery, applied to nearly all locomotives and rolling stock. The first major BR sub-brand to appear was InterCity brand. This was augmented with the InterCity 125 brand in 1976, in conjunction with the introduction of the InterCity 125 High Speed Train. In the 1980s under sectorisation blue livery was phased out as the organisation converted from a regional structure to being sector-based. The Intercity brand was relaunched, and passenger brands Network SouthEast and Regional Railways introduced, seeing these divisions introduce many sub-brands. Freight operations were split into the Trainload Freight, Railfreight Distribution and Rail Express Systems sectors. In the late 1980s and early 1990s, new multiple-unit train designs being introduced to replace rolling stock also brought new brand names, often linked to other branding exercises, such as the Networkers specially built for Network SouthEast. In the 1990s, BR created the European Passenger Services division, to run passenger services through the Channel Tunnel, under the Eurostar brand. After construction delays, this was operated from 1994, until it passed to the London and Continental Railways consortium in 1996 as Eurostar. In preparation for privatisation, the freight sectors were further split into smaller business functions, as regional splits of Trainload Freight, or further splits along customer market, such as inter-modal traffic, each with their own branding. With almost all freight businesses going straight to EWS, most of these brands were short lived. List of brands Networks Island Line - passenger services on the Isle of Wight (Ryde - Shanklin) from 1989. Part of Network SouthEast. Merseyrail - a passenger service brand for Merseyside. Network NorthWest - passenger service brand paralleling Network SouthEast for Greater Manchester and Lancashire introduced in 1989 as part of Regional Railways. After a few years it was replaced by the Regional Railways branding. Network SouthEast (originally London & South Eastern) - commuter and medium-distance trains operating in an area bounded roughly by King's Lynn, Peterborough, Worcester, Bedwyn, Exeter and Weymouth and included the Waterloo & City line, which is now part of the London Underground. Regional Railways (originally Provincial) - other passenger services in England and Wales, often suffixed by a regional description, e.g. Regional Railways North West Ryde Rail - passenger services on the Isle of Wight (Ryde - Shanklin) 1985-1989. Part of Network SouthEast from 1987. ScotRail - passenger services within Scotland (officially part of Regional Railways, but with a distinct identity) Strathclyde Transport - brand operated by ScotRail on behalf of Strathclyde Regional Council. Strathclyde transport operating commuter services within Greater Glasgow and the wider Strathclyde area, and had its own distinct livery (orange/black from 1983, carmine/cream from 2000 onward). The brand survived privatisation and was later shortened to SPT, but disappeared completely when responsibility for co-ordinating rail services was taken away from SPT following the Transport (Scotland) Act 2005 when Strathclyde Passenger Transport Executive (and Authority), along with the WESTRANS voluntary regional transport partnership, were replaced by the Strathclyde Partnership for Transport.. Tynerail and Tynerider - passenger service brand for Tyneside (pre Tyne & Wear Metro). Express passenger services Alphaline - sub-brand of Regional Railways, for regional express services on secondary routes, operated using 90 mph Class 158 trains, complementing the InterCity network. Eurostar - an international high speed passenger train service connecting London with Paris and Brussels through the Channel Tunnel using Network SouthEast mainline tracks in Britain. InterCity - high-speed express trains connecting major towns and cities. Other services Motorail - long-distance passenger services that also carried cars (operated as part of InterCity) Pullman - first Class carriages in InterCity trains offering a full at-seat catering service (mainly marketed to business travellers) Railair - through ticketing service for coach links to airports. Sealink - ferry services. Freight Services Rail Express Systems - Royal Mail Post Office and parcels services Red Star Parcels - express parcel delivery Trainload Freight - whole-train services, divided into sub-sectors covering Coal, Construction, Metals and Petroleum Freightliner - container services Speedlink - wagonload services Rolling stock classes † The Clubman was never operated by British Rail. Network SouthEast planned it was their new service to Birmingham (via the Chiltern Main Line) and nicknamed it the Clubman but privatisation intervened. New private operators, Chiltern Railways (former Chiltern Line managers) ordered 5 168/0s, which were only cosmetically different from the units planned by NSE, in 1996. * The InterCity 225 is not a multiple unit - sets are made up of a single Class 91 electric locomotive, 9 Mark 4 coaches and a Mark 4 Driving Van Trailer. References Brand names Category:Lists of brands by company
<?xml version="1.0" encoding="UTF-8"?> <selector xmlns:android="http://schemas.android.com/apk/res/android"> <item android:drawable="@drawable/i_goto_pressed" android:state_pressed="true"/> <item android:drawable="@drawable/i_goto_pressed" android:state_focused="true"/> <item android:drawable="@drawable/i_goto_default"/> </selector>
Additional Information PRODUCT USE: All license plates marketed by Autogeardepot.com, Inc. and LICENSEPLATES.TV, are sold as novelty and not for official use items. Henceforth, none of our replica license plates may be used in lieu of county issued, state issued, country issued or officially (government) issued license plates. The license plate replicas manufactured and marketed by Autogeardepot.com, Inc and LICENSEPLATES.TV are similar but may not be identical to originals (officially issued) due to different materials, colors/hues and character type styles used. You are wholly responsible to ensure that the license plates purchased from this site will not be used in a way so as to violate county, state or country statutes. Autogeardepot.com, Inc, LICENSEPLATES.TV, our suppliers and licensors are not responsible for legal violations that may arise from the use of products marketed on this site. TestimonialsToggle Andrew C Trushaw New plate you guys made is great... Stephen W - Atkinson, NH Hello, I recieved the plate and it is on my Unimog andit looks great. Thanks! Chris - Palmerston, New Zealand Hi Platemeister,Recently I ordered some SS 1966 black & yellow California plates and wondering where the order status was at.GOOD NEWS....The plates have arrived today. An extremely fast delivery from Florida to my home in Palmerston North New Zealand.Thank you for the very prompt delivery! Most excellent - and so are the plates! Allan - Vernon Hills, Illinois I received theplates today: "FRICKIN' AWESOME" Thank you sovery much, great work Elmer!Perl' Bill F - Tulsa, OK I just received shipment today and I am very pleased with the quality and appearance of the plate. Thank you. I will be sharing your web address with other corvette owners. Lanny - Fairview, Oregon Packagearrived 1-18-11. I'm very pleased with it, I'll probably be ordering anotherone with a different name also.-Lanny Charles - BURNHAM, Pennsylvania Hello,Just wanted to say that I received my new custom plate and am delighted! I also like the way you package your product.Keep up the great work!- Regards,Chuck Daniel Carlson - Orem, Utah I Love the front Euro plate I ordered for my Volvo. Every one says it looks so much better. Got the plate a week after it shipped out. Have recommended to every one that has asked where to get one Larry W - Oklahoma City, Oklahoma Elmer, I received the three Oklahoma Motorcycle Tags in the mail today (Monday). 2 1959 and 1 1968. They really look nice. Thank You Paul - Ashland, Kentucky Received the new plate today and it is perfect!!! Thanks a million for making it right. Will buy again in the future!!Thanks Again,Paul
Q: What is wrong with writing web applications in a way that merges repository layer with view and with controller in the same file? is there anything wrong with writing code in a way that merges view, repository, controller in the same file? i.e. global $db; // or $db = DBSingleton::get_db_instance(); // or global $container; $db = $container->get(Db::class); $id = filter_var($_POST['id'], FILTER_VALIDATE_INT); $record = $db->parameterized_query("SELECT data from table where id = ?", [$id])->getResult(); foreach($record as $row) echo $row['data'] . PHP_EOL; etc. basically everything is in the same file and there is very little, if any use of dependency injection, and any view code, any database access code, and any "reading variables from HTTP Request object", are in the same file. Why are modern frameworks advocating against this style? What are the things that can go wrong if I choose to use this way of coding in my work? A: There's nothing wrong with it. You just lose Separation of Concerns, that's all. You can write single-page applications in precisely this way using Vue. Code folding in Visual Studio Code insures that the thing stays readable. But the practical limit of such pages is about 20,000 lines of code (including the HTML). That is a lot of code in a single file, and it limits you to pretty small applications before you run out of architectural air. Then you wind up splitting your code into separate files anyway. For anything but the smallest of applications, stick to an architecture that allows your application to expand naturally as your needs grow. A: Merging all code into one file, and not utilizing functions (as your code example suggests) also removes the advantages you gain with abstractions. Even a function is an abstraction that when properly named encapsulates not only logic, but an idea that can be understood by a programmer by simply reading the name instead of spending the time to understand the logic. Programs written this way are very linear, and code reuse is virtually impossible. Introducing functions helps with code reuse and allows you to leverage abstractions, when compared to applications that do not utilize functions. At that point you've entered the realm of procedural programming. But there are limits to this as well. A mishmash of global functions in a single file becomes difficult to manage and keep track of in your head, unless you organize functions into groups. At this point you start to see clear delineations of functionality appear, and you'll likely pull these function groups out into their own file. Then you see a need to bundle data along with these functions, so you start declaring global variables in these other library files. You've now reached the threshold where object oriented code becomes much more useful. You can say this is a natural progression of low complexity to high complexity, however before writing a single line of code you need to determine how big this thing might get. Most applications grow beyond "a single file" very quickly, causing you to restructure the application multiple times, which slows down development unnecessarily. Our challenge as engineers is to build an architecture that is appropriately complex for the problems we know need to be solved, and given our experience with how applications evolve. A majority of applications won't fit into a single file without making you go cross-eyed, which lends development to a minimum level of complexity (at least separate your concerns). You need an architecture where you can easily add features and modify existing features, at the same time not building features and abstractions you don't yet need. That's the challenge.
Archive | Dental Industry The new EPA Regulation has many Dental Professionals puzzled, and looking for more answers on their compliance. M.A.R.S has released many blogs in the past regarding the EPA Regulation, who will be regulating Dental Practices, and how to maintain amalgam separators. What M.A.R.S has not done yet, was a blog to explain what an amalgam […] M.A.R.S had a great week with the team at Dental Fix, during their annual meeting. The first two days of the Dental Fix Annual Meeting was highlighted in our previous blogs, promoting some of the great experiences M.A.R.S had with the wonderful Franchisees of Dental Fix across the United States and Canada. Today is reviewing […] The blog on Friday was speaking about how M.A.R.S Bio-Med is proud to be an official vendor for Dental Fix Rx. The beginning of our relationship started with being invited to their annual Franchisee Conference. As highlighted in our last blog, the conference gave us time to build a strong relationship with their amazing Franchisees. […] Last week was the Dental Fix Franchisee Annual Meeting, our time to be officially introduced to the Franchisees as a Dental Fix Vendor. M.A.R.S Bio-Med is proud to announce our official relationship with Dental Fix Rx. After over four years, happily working with Dental Fix Canada, the American Dental Fix has decided to join the M.A.R.S […] M.A.R.S Bio-Med is known in the Dental and Pretreatment Industries as experts in amalgam separation, EPA Regulation, EPA compliance, and infection control with the use of evacuation line cleaners. If you are a Dental Society, Study Group, Dental Convention, Dental Supply or Service Company, Water Treatment Plant or regulating body in Canada or the United […] For those of you who follow our blogs, you are aware of our close relationship with our Trusted Distributors. All of Tuesday, October 16, 2018, M.A.R.S spent the entire day providing short workshops with small groups on Patterson Dental Montreal Technicians. Similar to the program we provided to Patterson’s Western Branches, the Patterson Dental Montreal […] For those of you who follow our blogs, you are aware of our close relationship with our Trusted Distributors. This morning began the annual training session of Patterson Dental Canada’s London Branch. Today’s meeting was not quite like the same format M.A.R.S experienced during our training with Patterson’s Western Branches. As it is for every […] M.A.R.S is proud to announce we have reformulated our CleanLINZ Evacuation Line Cleaner to quadruple the number of bacterial colonies per CFU to 1 billion! After weeks of testing, we have determined that our new solution has outperformed our old formula by a large margin. For those of you who are familiar with the M.A.R.S […] Today, we will be reviewing the installation of a LibertyBOSS using the Wet Upgrade Kit from M.A.R.S Bio-Med. The M.A.R.S Upgrade Kit supplies everything needed for a Dental Practice to upgrade their office to a LibertyBOSS. The M.A.R.S Upgrade Kits were created to provide everyone access to the NO maintenance, NO Inspection, NO filter, […] The blog series on the user manuals of the top six amalgam separators in North America, as being the longest in M.A.R.S history. We have completed a total of eighteen blogs, including this one, providing simple explanations and highlighting important information in the user manuals of amalgam separators. Our end note is the maintenance and […] Today we begin the user manual breakdown of the last amalgam separator on our list, the R&D Amalgam Collector. R&D is an amalgam separator manufacturer out of Seattle, created by Dr. Ross Fraker and Deanna Borden in the mid-90s. Currently, R&D has three models of amalgam separators to accommodate different sized Dental Practices. Thank you […] We have nearly reached the end of the segment on the Air Techniques Acadia amalgam separator. So far we have reviewed the Pre-Installation, Assembly, Installation, Inspection, Troubleshooting and the Maintenance of this unit. The proper handling and disposal procedures of the Air Techniques is the last to be reviewed. For those of you following this […] We have nearly reached the end of the segment on the Air Techniques Acadia amalgam separator. So far we have reviewed the Pre-Installation, Assembly, Installation, Inspection, and Troubleshooting of this unit. What is left to review on the Acadia are the maintenance and recycling procedures of the filter and the entire unit. For those of […] Moving along our Blog Series on how to read the User manuals of the Top Six Amalgam Separators sold in North America. We are down to our second last amalgam separator, the Air Techniques Acadia. So far we have reviewed the Pre-Installation, Assembly, Installation, and Inspection of this unit. What is left to review on […] Two days into the 2018 Ohio Dental Association Meeting LB1, M.A.R.S and our Trusted Distributors are having a great conference so far. Our blog will be reviewing some of the highlights of the ODA’s annual meeting, as well as providing some insight on the last day’s events, along with any specials or deals from our Trusted […] M.A.R.S Bio-Med and our Trusted Distributors are excited for the 2018 Ohio Dental Association Meeting. Between the anticipated arrival of LB1, the CE Courses being taught by M.A.R.S and the hundreds of dollars’ worth of prizes, no one can contain their excitement!!! Trusted M.A.R.S Distributors Our followers know, M.A.R.S is very selective about who we […] Both the IAOMT meeting in Stowe and the CDA meeting in San Francisco have been a great success for M.A.R.S Bio-Med, our Trusted Distributors, the LibertyBOSS and LB1! IAOMT Meeting Kim and LB1 were a huge hit at the IAOMT meeting this year. As always the Holistic Members love the LibertyBOSS, not for how economic […] Today we will be reviewing the Air Techniques Acadia, an amalgam separator that was created by one of the largest manufacturers of mechanical room equipment. Though this system is due to be replaced by its predecessor “Acadia Plus,” constant delays in its released still leaves their current model as the Acadia. Thank you for following us […] Today we will be continuing part two of the Metasys brand of amalgam separators. Part 1 of this blog highlighted the recommendations for the installation of the Eco II system. Thank you for following us on this journey to learning how to read the User Manuals of the top six amalgam separators sold in North […] Today we will be reviewing a European amalgam separator out of Austria, the Metasys Eco II, and Eco II Tandem. Thank you for following us on this journey to learning how to read the User Manuals of the top six amalgam separators sold in North America. Our last segment started with the amalgam separator that […]
A case of death from prothiophos poisoning. A 62-year-old male, a farmer, who had ingested prothiophos (Tokuthion), died after 21 h of intensive care. Prothiophos in the tissues of the victim was extracted and purified by Extrelut column extraction. A gas chromatograph equipped with a flame photometric detector, and a gas chromatograph-mass spectrometer were used to detect prothiophos. The concentration of prothiophos was 10.9 micrograms/g in the brain, 8.6 micrograms/g in the kidney, 418 micrograms/g in the liver, 2.96 mg/g in the gastric contents and 4.69 mg/g in the intestinal contents. The case history and the distribution of prothiophos indicated that the cause of death was acute prothiophos poisoning.
I made up a Wikipedia article in high school comp sci it now returns 5220 search results, has been edited 35 times and has been published in two books 42,928 shares
Q: Can I use methods from my own files in an external framework that I added? I'm using the QuickDialog framework https://github.com/escoz/QuickDialog , which adds around 80 files to my project. In one of the files, I'd like to use one of the functions I wrote in my project. So, I have a method that I call like so: [ActivityImage getActivityImage:2]; When I head to the top of the file and add #import "ActivityImage+Functions.h" it tells me the file cannot be found. ActivityImage+Functions.h is a Category file. Is there some special way to import my own files into an external frameworks files? Thanks UPDATE To be more clear: In one of QuickDialogs files, specifically QLabelElement.m I want to add in one of the method calls I wrote in my project. The QuickDialog framework was added as a submodule to my project, I dragged in the QuickDialog .xcodeproj file, and then added as a Target Dependency for my project. I can #import files from the QuickDialog framework to my project files, but I can't go the other way. A: Sounds like you want to use Objective-C Categories. Add a header file in your own project called ActivityImage+MyStuff.h (note the +MyStuff can be something more appropriate): #import "ActivityImage.h" @interface ActivityImage (MyStuff) + (void)getActivityImage:(NSUInteger)someInteger; @end And the implementation file ActivityImage+MyStuff.m: #import "ActivityImage+MyStuff.h" @implementation ActivityImage + (void)getActivityImage:(NSUInteger)someInteger { // Whatever it does } @end and finally in the code you want to use the category in: #import "ActivityImage+MyStuff.h" [ActivityImage getActivityImage:2];
It has long been recognized that in socket connectors it is preferable that the contact element have multiple wiping surfaces to resiliently press against the opposite sides of a pin and provide multiple electrical contacts to the pin. Socket connectors of this type are illustrated in U.S. Pat. Nos. 3,917,375; 3,966,295; 3,955,869; 4,040,705; 4,073,560; 4,094,566; 4,230,387; and 4,232,927 and Japanese Patent Publication No. JA 52-3188 published Jan. 11, 1977. When resistance to removal of the socket connector has been desired, for example where vibration is a problem, a latching mechanism between the socket connector and the part containing the pins has been provided such as that disclosed in U.S. Pat. No. 4,230,387.
13 So.3d 1060 (2009) STATE v. DESIRE. No. 1D08-2791. District Court of Appeal of Florida, First District. August 6, 2009. Decision without published opinion. Affirmed.
Press Release: Exercise Rapid Trident 20 to be held in September By | Sept. 14, 2020 Exercise Rapid Trident 20 is an annual U.S. Army Europe multinational training exercise taking place Media Advisory: Telephonic Press Briefing on Noble Partner By | Sept. 14, 2020 Join the Brussels Media Hub, September 15, for a briefing with Maj. Gen. Joe Jarrard, U.S. Army Europe Deputy Commanding General for Army National Guard, Maj. Gen. David Tabor, Special Operations Command Europe Commander and Brig. Gen. Irakli Tchitchinadze, Deputy Chief of the Georgian Defence Forces on Noble Partner. Press Release: Edelweiss Lodge and Resort staff test positive for COVID-19 By | Sept. 12, 2020 Several staff members of the Edelweiss Lodge and Resort here have tested positive for COVID-19. As a Press Release:V Corps Headquarters (Forward) in Poland to be located in Poznan By | Sept. 9, 2020 The city of Poznan will be the location of the U.S. Army V Corps Headquarters (Forward) in Press Release: Exercise Tobruq Legacy 2020 to begin in September, media invited By | Sept. 8, 2020 Tobruq Legacy 2020 is a multinational air defense exercise that will take place Sept. 12-27, in Press Release: Armored regiment to conduct training in Lithuania By | Aug. 28, 2020 The U.S. Army’s 2nd Battalion, 69th Armor Regiment of the 2nd Armored Brigade Combat Team from the Press Release: Decision Document signed for Katterbach Army Airfield PFAS remediation By | Aug. 27, 2020 The Decision Document for the remediation of PFAS contamination at Katterbach Army Airfield was Press Release: Exercise Noble Partner 2020 begins By | Aug. 26, 2020 Approximately 2,800 military members from the nations of France, Georgia, Poland, the United Kingdom Press Release: Combined Resolve XIV to be held in September By | Aug. 26, 2020 Nearly 3,500 participants from eight ally and partner nations will participate in Combined Resolve Media Advisory: Media invited to Resolute Castle 2020 closing ceremony By | Aug. 24, 2020 U.S. Army 15th Engineer Battalion invites members of the press to participate in a media event at 10 Press Release: Exercise Resolute Castle 2020 Begins By | Aug. 11, 2020 Approximately 390 U.S. Soldiers from the 15th Engineer Battalion, 18th Military Police Brigade, will Press Release: V Corps Headquarters (Forward) Location Announced By | Aug. 4, 2020 Today the U.S. Army Chief of Staff announced the V Corps Headquarters (Forward) would be located in Updated: Press Release - Saber Junction 20 to be held in August By | July 30, 2020 More than 4,000 participants from the U.S. and ally and partner nations will participate in Saber News Release: Task Force Illini Takes Command of Joint Multinational Training Group-Ukraine By | July 30, 2020 Task Force Illini, 33rd Infantry Brigade Combat Team, Illinois Army National Guard assumed command Updated: Media Advisory - Media invited to DEFENDER-Europe 20 Phase II events By | July 27, 2020 Members of the media are invited to participate in two upcoming events in Poland as part of the last Community notification for increased flights near Mihail Kogălniceanu By | July 23, 2020 From July 24-25, approximately 10 U.S. Army helicopters are scheduled to depart from Alexandroupoli, Community notification for increased flights near Burgas By | July 23, 2020 From July 24-25, approximately 10 U.S. Army helicopters are scheduled to depart from Alexandroupoli, Community notification for increased flights near Alexandroupoli By | July 23, 2020 From July 24-25, approximately 10 U.S. Army helicopters are scheduled to depart from Alexandroupoli, Press Release: Troop movements for Saber Junction preparations By | July 16, 2020 The 173d Airborne Brigade will assemble forces at Grafenwoehr Training Area, Germany, July 14 - Aug. Press Release - 101st CAB takes overs Atlantic Resolve aviation rotation mission By | July 15, 2020 The 3rd Combat Aviation Brigade, 3rd Infantry Division, will transfer authority of the Atlantic Community notification for increased flights near Lielvarde By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Siauliai By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Modlin By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Powidz By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Dresden By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Illesheim By | July 10, 2020 From July 13 - July 24, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Metz-Nancy By | July 10, 2020 From July 13 - July 20, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Chateauroux By | July 10, 2020 From July 13 - July 20, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near Cognac By | July 10, 2020 From July 13 - July 20, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Community notification for increased flights near La Rochelle By | July 10, 2020 From July 13 - July 20, approximately 60 U.S. Army helicopters will depart from La Rochelle, France, Press Release: Airborne training incident with injuries By | July 2, 2020 Six U.S. Army Soldiers assigned to the 173rd Airborne Brigade and one German emergency responder Community Notice: increased flights near Eindoven By | July 2, 2020 Approximately 70 U.S. Army helicopters will depart from Illesheiem, Germany, from July 1-3 and July Community Notice: increased flights near Rotterdam By | July 2, 2020 Approximately 70 U.S. Army helicopters will depart from Illesheiem, Germany, from July 1-3 and July Community Notice: increased flights near Illesheim By | July 2, 2020 Approximately 70 U.S. Army helicopters will depart from Illesheiem, Germany, from July 1-3 and July Press Release: Black Jack Brigade Relinquishes Authority of Atlantic Resolve Mission By | June 29, 2020 The 2nd Armored Brigade Combat Team, 1st Cavalry Division, from Fort Hood, Texas, will relinquish Press Release: Sixth Atlantic Resolve armored and aviation rotations set to begin mission By | June 16, 2020 The sixth armored and aviation rotations in support of Atlantic Resolve are set to begin their Press Release: Black Jack is set to return home from nine-month deployment By | June 12, 2020 The 2nd Armored Brigade Combat Team, 1st Cavalry Division stationed at Fort Hood, Texas will begin MEDIA ADVISORY | June 5 Telephonic Press Briefing By | June 3, 2020 MEDIA ADVISORY | June 5 Briefing with U.S. Army Europe Brigadier General Christopher R. Norrie, Commander of 7th Mission Support Command suspended By | June 3, 2020 KAISERSLAUTERN, Germany -- The commanding general of 7th Mission Support Command, Brig. Gen. Michael Press Release: Atlantic Resolve mission command transfers to new unit By | June 2, 2020 The 1st Cavalry Division Forward assumed command of the U.S. Army’s Atlantic Resolve mission June Press Release: Air defense artillery brigade headquarters to deploy to Europe By | May 27, 2020 The South Carolina Army National Guard’s 678th Air Defense Artillery Brigade headquarters will Press Release: 10th AAMDC headed to Latvia for exercise Tobruq Arrows 2020 By | May 22, 2020 10th AAMDC headed to Latvia for exercise Tobruq Arrows 2020RHEINLAND-PFALZ, Germany – U.S. Army Press Release: DEFENDER-Europe 20 Plus By | May 13, 2020 After careful assessment and planning between U.S. Army Europe and the Polish Ministry of Defense, Press Release: DoDEA Europe School Status By | May 1, 2020 In direct and close coordination with our senior military partners, the decision was made to keep Press Release: Army announces upcoming 1st Cavalry Division Headquarters, unit rotation By | April 24, 2020 The Department of the Army announced today the 1st Cavalry Division Headquarters stationed at Fort Press Release: Army announces upcoming 2nd ABCT, 3rd Infantry Division, unit rotation By | April 24, 2020 The Department of the Army announced today the upcoming 2020 rotation to Europe of the 2nd Armored Press Release: Army announces upcoming 101st Airborne Division Combat Aviation Brigade, unit rotation By | April 24, 2020 The Department of the Army announced today the upcoming 2020 rotation to Europe of the 101st Press Release: U.S. Army Civil Affairs Teams delivers medical supplies to Lithuania By | April 21, 2020 U.S. Army Europe, working in conjunction with the U.S. Embassy Office of Defense Cooperation and the Press Release: Humanitarian Assistance Program support to Italy By | March 25, 2020 As part of the Defense Security Cooperation Agency's Humanitarian Assistance Program, U.S. Army Exercise Defender-Europe 20 UPDATE By | March 16, 2020 In response to the current outbreak of the COVID-19 virus and recent guidance by the Secretary of U.S. Army Europe Command Sergeant Major visits Commissary to dispel shortage rumors By | March 16, 2020 U.S. Army Europe Command Sgt. Maj. Robert Abernethy met with Defense Commissary Agency store U.S. Army Garrison Italy: Host nation worker being treated for COVID 19 By | March 16, 2020 A civilian host nation employee who works for the U.S. Army Garrison Italy has tested positive for Press Release: U.S. Army Europe Soldier tests positive for COVID-19 By | March 14, 2020 A Soldier assigned to U.S. Army Europe Headquarters in Wiesbaden, Germany, tested positive for the U.S. European Command: Exercise Defender-Europe 20 Update By | March 12, 2020 After careful review of the ongoing Defender-Europe 20 exercise activities and in light of the Press Release: USAG Bavaria identifies first case of coronavirus By | March 11, 2020 A civilian employee of the U.S. Army Garrison Bavaria has tested positive for the novel coronavirus, Statement from Hon. Ryan D. McCarthy, Secretary of the Army By | March 10, 2020 The commander of U.S. Army Europe, along with several staff members, may have been exposed to U.S. Armored unit equipment arrives at the Port of Vlissingen for DEFENDER-Europe 20 By | March 9, 2020 U.S. Army Europe invites members of the press to participate in a media event at 12:30 p.m., March Press Release: DEFENDER-Europe 20 - first US troops reach Poland By | March 2, 2020 On Friday, February the 28th, first two wheeled columns of soldiers and equipment from the US will Media Advisory: Media invited to see coordination centers for DEFENDER-Europe 20 By | Feb. 25, 2020 Germany - U.S. Army Europe invites members of the press to participate in a media event at 9:00 Press Release: Free concerts by U.S. Army Europe By | Feb. 25, 2020 The U.S. Army Europe Rock Band and the NATO SHAPE Rock Band are conducting concerts in Germany, Press Release: Military post offices to stop accepting handwritten customs forms By | Feb. 19, 2020 A significant change to how military postal customers overseas may mail packages internationally is News Release: Precautionary measures taken after improper blood draw procedure By | Feb. 18, 2020 An improper blood draw technique at our Soldier Medical Readiness Center (SMRC) may have exposed Press Release: Commander Suspended By | Feb. 13, 2020 The Commanding General, Regional Health Command-Europe Commander, Brig. Gen. Ronald Stephens, was Media Advisory: First DEFENDER-Europe 20 equipment arrives at the port of Bremerhaven By | Feb. 13, 2020 U.S. Army Europe invites members of the press to participate in a media event at noon, Feb. 21 at Army announces activation of additional corps headquarters By | Feb. 11, 2020 Army announces activation of additional corps headquartersThe Department of the Army announced today Media Advisory: DEFENDER-Europe 20 Media Events By | Feb. 7, 2020 U.S. Army Europe invites members of the press to participate in upcoming DEFENDER-Europe 20 media Media Advisory: DEFENDER-Europe 20 Army Prepositioned Stock By | Feb. 5, 2020 U.S. Army Europe invites members of the press to participate in a media event 2 p.m., Feb. 10, at Press Release: Re-positioning of aircraft By | Jan. 8, 2020 As previously reported, aircraft are being re-positioned in the U.S. European Command area of Media Advisory: Media invited to discuss upcoming movements through Germany By | Jan. 6, 2020 Members of the media are invited to attend a press conference to discuss upcoming military movements Press Release: Citizenship services for overseas military families changing in 2020 By | Dec. 23, 2019 Citizenship services for overseas military members and qualified family members will change in early Media Advisory: U.S. Participates in Battle of the Bulge 75 Commemorations By | Dec. 11, 2019 At the request of the host nations of Belgium and Luxembourg, U.S. troops and equipment in Europe Press Release: Dates set for next Strong Europe Tank Challenge By | Dec. 3, 2019 U.S. Army Europe, the German Bundeswehr, and the Danish Army will co-host the fourth Strong Europe Press Release: Atlantic Resolve ceremony in Poland By | Oct. 25, 2019 1st Armored Brigade Combat Team, 1st Infantry Division, will transfer authority with 2nd Armored Media Advisory: Media invited to Atlantic Resolve ceremony in Germany By | Oct. 25, 2019 1st Combat Aviation Brigade, will transfer authority to 3rd Combat Aviation Brigade, 3rd Infantry Next Atlantic Resolve aviation rotation arriving in Belgium By | Oct. 11, 2019 U.S. Army Black Hawk, Apache and Chinook helicopters from Fort Stewart, Georgia, are scheduled to Upcoming movements of U.S. Army equipment for Atlantic Resolve By | Oct. 11, 2019 The fifth iterations of the Atlantic Resolve armored and aviation rotations will begin arriving in DEFENDER-Europe 20 builds USEUCOM strategic readiness in support of the National Defense Strategy By | Oct. 7, 2019 U.S. European Command and the Department of the Army announced today the largest deployment of Next Atlantic Resolve armored rotation to arrive at the port of Vlissingen By | Oct. 4, 2019 Tanks, trucks and other equipment are scheduled to arrive at the port of Vlissingen, Netherlands, 12th Combat Aviation Brigade unexpected landing near Linden By | Sept. 25, 2019 At approximately 2030 on September 24, an AH-64D Apache Helicopter from the 12th Combat Aviation Saber Junction 19 Media Day By | Sept. 13, 2019 The exercise Saber Junction 19 will take place from 3 to 30 September 2019 at Grafenwoehr Training 1st Battalion, 6th Field Artillery Battalion set to reactivate By | Sept. 12, 2019 The 1st Battalion, 6th Field Artillery Battalion, 41st Field Artillery Brigade will activate in a 41st Field Artillery Brigade to receive Multiple Launch Rocket Systems By | Sept. 11, 2019 The 41st Field Artillery Brigade (41st FAB) will be receiving 16 Multiple Launch Rocket Systems Rapid Trident to exercise readiness, interoperability in Ukraine By | Aug. 26, 2019 Exercise Rapid Trident 2019 will take place Sept. 13-28, at the International Peacekeeping Security Press Release: Next Atlantic Resolve armored, aviation rotations announced By | Aug. 16, 2019 Soldiers with the 2nd Armored Brigade Combat Team, 1st Cavalry Division, and 3rd Combat Aviation THAAD soldiers, system returns to U.S. following European deployment By | Aug. 9, 2019 Soldiers assigned to the 69th Air Defense Artillery Brigade, 32nd Army Air and Missile Defense 10th AAMDC changing command, transitioning to one-star By | July 31, 2019 The 10th Army Air and Missile Defense Command will conduct a change of command ceremony and Media invited to Change of Command By | July 26, 2019 21st Theater Sustainment Command will bid farewell to Maj. Gen. Steven A. Shapiro and welcome Maj. Media Advisory: Exercise Agile Spirit 2019 to take place in July and August By | July 22, 2019 Agile Spirit 2019 is a Georgian Defense Forces and U.S. Army Europe cooperatively-led joint The European Best Sniper Team Competition 2019 By | July 17, 2019 On behalf of U.S. Army Europe, 7th Army Training Command will host the European Best Sniper Team Dental patients sought for follow up due to incomplete sterilization process By | July 11, 2019 The Hohenfels Dental Clinic recently discovered that the sterilization process for a small number of Media Advisory: Atlantic Resolve Soldiers participate in Powidz Days festival By | July 8, 2019 Soldiers from the 286th Combat Sustainment Support Battalion will participate in the Powidz Days Exercise Swift Response 2019 to take place in June By | May 22, 2019 Exercise Swift Response 19 is an annual U.S. Army Europe-led multinational airborne exercise in Media Advisory: Exercise Saber Guardian 2019 to take place in June By | May 14, 2019 Romania Land Forces Command and U.S. Army Europe will co-lead exercise Saber Guardian 2019 from June Media invitation to several upcoming summer exercises By | May 13, 2019 In addition to three major U.S. Army Europe-led exercises in the Black Sea and Balkan Regions this Media invited to attend several events By | May 9, 2019 WIESBADEN, Germany - Immediate Response 2019 is a multinational exercise, co-led by Croatian Armed Increase in military convoy movements for summer exercises By | May 2, 2019 U.S. military forces stationed in Europe routinely conduct exercises with allied and partner nations Media Advisory: Joint Multinational Training Group-Ukraine transfer of authority ceremony By | April 6, 2019 There will be a Joint Multinational Training Group-Ukraine transfer of authority ceremony May 2, at Media invited to observe Atlantic Resolve training in Latvia By | April 4, 2019 Elements of the 1st Combat Aviation Brigade will join eFP Battle Group Latvia to conduct exercise Allied Spirit X Integrates Battlefield-Critical Communication Capabilities By | March 25, 2019 Approximately 5,600 participants from 15 nations will take part in exercise Allied Spirit X at the D-Day 75 Media Advisory By | March 19, 2019 U.S. troops from units in Europe and based in the U.S. will participate in more than 50 ceremonial Armored unit deploys to Europe, draws prepositioned stocks as part of Dynamic Force Employment By | March 19, 2019 At the direction of the Secretary of Defense, the 2nd Armored Brigade Combat Team, 1st Armored Upcoming Mission Command Element convoy activities By | March 8, 2019 Convoys of U.S. Army military vehicles in Poznan, Poland, will begin movement to Drawsko Pomoroski USEUCOM deploys Terminal High Altitude Area Defense (THAAD) system to Israel By | March 4, 2019 At the direction of the Secretary of Defense, U.S. European Command deployed a Terminal High Dynamic Front 19 to Integrate Multinational Fires Capabilities By | March 1, 2019 Approximately 3,200 participants from 27 nations will take part in operations during the live-fire 1-16 Infantry to begin training in Romania and Bulgaria By | Feb. 20, 2019 The 1st Battalion, 16th Infantry Regiment of the 1st Brigade, 1st Infantry Division will partner Media Advisory: Media invited to Atlantic Resolve ceremony in Poland By | Feb. 5, 2019 ZAGAN, Poland – The 1st Armored Brigade Combat Team, 1st Cavalry Division, will transfer authority Upcoming movements of U.S. Army equipment for Atlantic Resolve By | Jan. 23, 2019 The fourth iterations of the Atlantic Resolve armored and aviation rotations will begin arriving in Europe over the next two weeks. Ironhorse Soldier dies in Grafenwoehr Training Area By | Jan. 15, 2019 POZNAN, Poland – A 1st Cavalry Division Soldier deployed in support of Atlantic Resolve was killed in an accident in the Grafenwoehr Training Area, Germany, Jan. 13. Armored brigade convoys to Germany in support of Combine Resolve XI By | Oct. 29, 2018 Elements of the 1st Armored Brigade Combat Team “Ironhorse,” 1st Cavalry Division have begun Next Atlantic Resolve armored, aviation rotations announced By | Oct. 18, 2018 Soldiers with the 1st Infantry Division’s 1st Armored Brigade Combat Team and 1st Combat Aviation Grafenwoehr and Hohenfels convoy advisory for Oct. 15 and 18, 2018 By | Oct. 12, 2018 This is an informational advisory for the communities between the Grafenwoehr and Hohenfels training Three Soldiers injured during training in Slovakia By | Sept. 19, 2018 Three U.S. Soldiers were injured today when an M1A2 Abrams tank struck an embankment during a US Army Europe to activate, relocate units in Germany By | Sept. 7, 2018 U.S. Army Europe will activate new units within Germany as a display of our continued commitment to Media invitation to Atlantic Resolve helicopter demonstration By | Aug. 15, 2018 Elements of the 4th Combat Aviation Brigade “Ivy Eagles,” 4th Infantry Division, will demonstrate some of their capabilities during a training exercise scheduled for Aug. 29 in Grafenwoehr, Germany. Media Advisory: Media invited to cover exercise Noble Partner By | July 23, 2018 WIESBADEN, Germany — Noble Partner 2018 is a Georgian Armed Forces and U.S. Army Europe cooperatively-led exercise hosted at Vaziani and Camp Norio training areas in Georgia from Aug. 1-15. The exercise will enhance Georgian, regional partner and U.S. forces readiness and interoperability in a realistic, multinational training environment. Dagger Brigade to pass Atlantic Resolve mission to Ironhorse Brigade By | May 25, 2018 The 2nd Armored Brigade Combat Team “Dagger Brigade,” 1st Infantry Division, will conduct a relief in place ceremony with the 1st Armored Brigade Combat Team “Ironhorse Brigade,” 1st Cavalry Division, at 10 a.m. June 4, at the Zagan Cultural Palace in downtown Zagan. "Atlantic Resolve" – Movement of U.S. Army Equipment through the State of Baden-Württemberg By | May 22, 2018 The 1st Armored Brigade of the 1st Cavalry Division from Fort Hood, Texas replaces the 2nd Armored Brigade of the 1st Infantry Division from Fort Riley, Kansas, for the third rotation of Atlantic Resolve. "Atlantic Resolve" – Movement of U.S. Army Equipment through the State of Saxony-Anhalt By | May 22, 2018 Various movements of U.S. Army Europe units through the German State of Saxony-Anhalt will take place until the end of May. Exercise Saber Strike 18 to take place in June By | May 17, 2018 Exercise Saber Strike 18 will be held June 3-15 at training areas in Estonia, Latvia, Lithuania and "Atlantic Resolve" - Bremerhaven once again transshipment point for U.S. Army in Europe By | May 17, 2018 The "Kaiserhafen" port in Bremerhaven will once again be used from now through June of 2018, by U.S. Death of Retired Gen. Crosbie “Butch” Saint By | May 10, 2018 The U.S. Army Europe family would like to express our deep condolences to the family of retired Gen. US, IDF test Patriot batteries in live-fire demonstration during Juniper Cobra 2018 By | March 20, 2018 The Israel Defense Forces and approximately 75 Soldiers from U.S. Army Europe's 10th Army Air and Media Invited to Observe Testing of New 30 mm Stryker By | Feb. 13, 2018 The 2nd Cavalry Regiment recently received seven Stryker Infantry Carrier Vehicles with 30 mm Media Invited to CSM Relinquishment of Responsibility By | Feb. 5, 2018 U.S. Army Europe will bid farewell to Command Sgt. Maj. Sheryl D. Lyon during a Relinquishment of 'Big Red One' to deploy as Atlantic Resolve division-level headquarters By | Jan. 17, 2018 The 1st Infantry Division will replace the 4th Infantry Division in March as U.S. Army Europe's U.S. Army Europe Soldier death in Kosovo By | Jan. 9, 2018 A U.S. Army Soldier serving as part of NATO's Kosovo Forces died at Camp Bondsteel, Kosovo,
22-436p - AEM Short Ram Intake System S.R.S.LANCER RALLIART 04-05 Item #: 22-436p Price: $292.18 OUR PRICE: $197.99 You Save: $94.19 Qty. DescriptionOrderingReviewsRelated AEM Short Ram Intake System The AEM Short Ram Intake System is constructed of mandrel-bent 6061 aluminum for smooth airflow and gives you all the similar features as the cold air intakes such as maximum durability and horse power gains. Due to the shorter intake pipes, this intake system easily fits nicely inside the engine bay. Key Features: Delivers increased horse power and torque gains. Easily installs inside the engine bay Intake includes the innovative, oil-free, high-flow AEM Dryflow™ air filter Air intake pipe constructed of mandrel-bent 6061 aluminum Comes complete with all necessary mounting hardware and installation instructions Backed by the AEM Limited Lifetime Warranty! Feel free to place an order online and use our secure checkout 24 hours a day, 7 days a week, 365 days a year! Call Us M-F 9am-6pm PST @ (858) 527-2917.
33 фрілансерів(-и) у середньому готові виконати цю роботу за £21 I can deliver your work in less than 24 hours with professionalism. I have an Experience of many years in Graphic Designing And i am also an illustrator expert Sir kindly Give me a chance. My work is very professБільше Hi, I just checked the description you have provided regarding the project and would be a pleasure to assist you on your project. I will work with full dedication to give you the best output within the desired timefБільше Hello, Kindly don't ignore our Bid before going through our portfolio. We would love to work with you on your project as we have gone through your project description and understand the job [login to view URL] are the Більше With decades of experience I am able to apply not only theoretical knowledge, but also technical ability and creative influence to all areas of my work. Portfolio on the following link https://www.freelancer.com/uБільше Hi, This is Nida here. We are a team of professional Graphic designer, we are experts in logo design, Business Card, banner design, T-Shirt design, brochure design,Letterhead Design, envelope design, flyer design andБільше Hi ! I can do this job very well. I have more than 8 years of experience in Graphics Designing work with skill of Photoshop, CorelDraw, Illustrator, InDesign, FreeHand, MS Office etc. I have great experience in tБільше Multi-talented graphic designer is at your disposal. I have 5 years experience in graphic design. I am expert in graphic designing and I will professionally design quality youtube channel profile picture for you of 800Більше just now inbox me chat. Send me all detail for your design. Let's start we are ready for done just provide us all detail in box now we do our best and we do what in your mined and in your thoughts. we provide you mockБільше Sir Please Give me a chance. My work is very professional please award me this project. Sir I can complete your project in less than 24 hrs with professionalism. please sir I will not disappoint you WaitingБільше Namaste, == Greetings from a TEAM ranked in TOP 1000 out of 20 million users with an overall rating of 4.9/5 == I would like to take complete responsibility to DESIGN SUPER-AWESOME YOUTUBE PROFILE PICTURE for youБільше Hi, This is supratim from India, I am a Graphics/Logo/web designer over 4 years experience, I will provide quality work until you satisfied with my work.I am ready to do it now, I will complete your project firstlyБільше Hello! My name is Alexander. I am a highly talented Graphic Designer. I am very interested in your project. I want to help you with it. Please, just take a look at my portfolio (link - https://www.freelancer.com/u/amliБільше Hi, i have gone through the project description and understands your need and requirement. I am a professional skillful a graphic designer who can design creative and catchy graphic designs for you. please see my poБільше Good Day! I have gone through your description and I understand your requirements. I can start working on your project immediately. Let’s discuss further more about this project in the chat box. Regards! MajidБільше Hello, nice to meet you. My name is Alexander. I've really liked your project and I'd love to work on it and provide you the best quality in the shortest term. I'm asking you to pay your attention to my portfolio (you'Більше Dear client,I will do the work as per your requirement and will work untill yours 100% [login to view URL] consider my proposal If you need quality work and quick [login to view URL] can check for more details about me hereБільше
Update: While it wasn’t appearing at first, it seems that the Nexus Player is now being listed as a compatible device with the program. Additionally, the General Mobile 4G (Android One) device is now compatible as well. Google has now — as promised — just launched the Android Beta Program. With this program (much like similar programs from Apple), you can enroll your device to receive the latest beta builds of Android and receive them over-the-air without the need to do any manual flashing. Head over to the Android Beta Program website to sign up… Deal: Get Pixelbook at 25% off: $750! When you first head to the website, you’ll be asked to sign in with your Google account. From there, you’ll find a list of Nexus devices that have been signed into with your account, and you’re just a click away from enrolling. It goes without saying that you probably shouldn’t enroll your daily driver in the program, as there are hoards of documented nasty bugs that will probably ruin the experience anyway. Here’s the full disclaimer that Google offers before you enroll your device: The Android Beta Program gives developers an opportunity to try out pre-release versions of Android. The program is currently targeted towards developers and is not suitable for use on your primary device (see known issues). Devices that you opt into the program will receive an over-the-air (OTA) update to the latest beta version of Android N. The updates that you’ll receive as a part of this program are unstable pre-release versions, and may contain errors and defects that affect your device. You may remain in the Android Beta Program beyond the N release to preview future Android N maintenance releases (MRs). If you choose to do so, you will automatically get an OTA update to pre-release versions of the MRs as they become available. At the end of the program, you will begin to receive regular public updates. You may opt-out of the program at any time to return to the stable, public version of Android. Note: If you opt-out when your device is running a beta version of Android, all user data on the device will be wiped. Once you’ve enrolled your device in the program, you should receive an OTA update very soon (in our experience, instantly), which will keep all of your data intact while updating your device to the most recent build of Android N. Later, your device will stay updated as future versions of the N preview are released. Google says that at the end of the program you will receive update to standard non-beta builds. If you would rather go the way of completely restoring your device to factory settings and flashing it yourself, you can do so by following our handy guide. Factory images will almost surely hit the web before they roll out OTA to devices enrolled in the Android Beta Program, so keep that in mind if — like us — you need timely access to new features.
Please turn on JavaScript. Media requires JavaScript to play. Two Labour MPs have posed questions in the House of Commons ahead of the high-profile launch of videogame Call of Duty: Modern Warfare 2. Labour MP Keith Vaz, who has strongly criticised the new game, questioned Minister for Creative Industries Siôn Simon on protecting children from its "violent" content. Another Labour MP, Tom Watson, has defended the game and spearheaded a Facebook group to help defend games from critics.
Nettelbeck Nettelbeck is a surname. Notable people with this surname include: Craig Nettelbeck, Australian footballer F. A. Nettelbeck, American poet Paul Nettelbeck, German long-distance runner Sandra Nettelbeck, German film director Ted Nettelbeck, Australian psychologist Uwe Nettelbeck, German record producer and journalist
This is the best way to cut a watermelon Because of its behemoth size and weight, slicing a watermelon can be a daunting task. While there are many methods to cutting a watermelon, they each have their own pitfalls. Biting into a large triangular slice for instance can be messy, causing juice to run down arms and faces. The cubing method is another option, but necessitates the use (and eventual clean-up) of cutlery. But there is one stupidly simple method that creates the perfect bite, every time. Follow this foolproof trick for spears that are easy to hold, easy to eat, and easy to store.
Hydroxypropyl methylcellulose based cephalexin extended release tablets: influence of tablet formulation, hardness and storage on in vitro release kinetics. The object of this study was to develop hydroxypropyl methylcellulose (HPMC) based cephalexin extended release tablet, which can release the drug for six hours in predetermined rate. Twenty-one batches of cephalexin tablets were prepared by changing various physical and chemical parameters, in order to get required theoretical release profile. The influences of HPMC, microcrystalline cellulose powder (MCCP), granulation technique, wetting agent and tablet hardness on cephalexin release from HPMC based extended release tablets were studied. The formulated tablets were also characterized by physical and chemical parameters. The dissolution results showed that a higher amount of HPMC in tablet composition resulted in reduced drug release. Addition of MCCP resulted in faster drug release. Tablets prepared by dry granulation was released the drug slowly than the same prepared with a wet granulation technique. Addition of wetting agent in the tablets prepared with dry granulation technique showed slower release. An increase in tablet hardness resulted in faster drug release. Tablets prepared with a wet granulation technique and having a composition of 9.3% w/w HPMC with a hardness of 10-12 kg/cm(2) gave predicted release for 6 h. The in vitro release data was well fit in to Higuchi and Korsmeyer-Peppas model. Physical and chemical parameters of all formulated tablets were within acceptable limits. One batch among formulated twenty-one batches was successful and showed required theoretical release. The effect of storage on in vitro release and physicochemical parameters of successful batch was studied and was found to be in acceptable limits.
Q: How to find object by id in array of objects? I have this json file: var data = [{ "id": 0, "parentId": null, "name": "Comapny", "children": [ { "id": 1235, "parentId": 0, "name": "Experiences", "children": [ { "id": 3333, "parentId": 154, "name": "Lifestyle", "children": [] }, { "id": 319291392, "parentId": 318767104, "name": "Other Experiences", "children": [] } ] } ] }]; I need to find object by id. For example if need to find an object with id:319291392, I have to get: {"id": 319291392,"parentId": 318767104,"name": "Other Experiences","children": []} How can I do that? I tried to use this function: function findId(obj, id) { if (obj.id == id) { return obj; } if (obj.children) { for (var i = 0; i < obj.children.length; i++) { var found = findId(obj.children[i], id); if (found) { return found; } } } return false; } But it doesn't work as it's an array of objects. A: If your starting point is an array, you want to invert your logic a bit, starting with the array rather than with the object: function findId(array, id) { var i, found, obj; for (i = 0; i < array.length; ++i) { obj = array[i]; if (obj.id == id) { return obj; } if (obj.children) { found = findId(obj.children, id); if (found) { return found; } } } return false; // <= You might consider null or undefined here } Then var result = findId(data, 319291392); ...finds the object with id 319291392. Live Example
Like I said in my last post Sunday mornings I get up read through the paper and then go online. I saw that people were getting a great deal on Maalox and Chex Mix at Walgreens so we headed out to get my papers and get in on the Chex Mix deal since it’s good today only. So here’s how it worked out to be profitable: First off I got my newspapers at the gas station. I found a free coffee coupon for this gas station when I was cleaning out my wallet and decided I’d go redeem it today since it’s very chilly out. While I was there I picked up 3 newspapers and a doughnut (did I mention I prefer shopping without Shawn) and I 24 oz coffee for $5.25 then we headed to Walgreen’s: 6 bags of Chex Mix –I personally don’t care for this but Shawn and Dave like it and it worked out to be really cheap so I picked them up for lunchbox stuffers. From what I’ve read this is a one day great deal, it’s on sale this week 3 bags for $3.99 and there’s a .99/3 Wag’s coupon. When you buy 5 or 6 bags you get a $3.50 RR and I have .75/2 coupons from hosting a Chex Mix Get Together a few months ago (they sent me over 50 coupons and I still have some left after giving bunchs away). So these bags worked out to be .42 each after RR I will be getting some more later today since I have some more coupons and this will get used. 2 Pantene this was on sale 2/$7 with a $2 RR and there was a coupon for $3/2 in the recent P&G. I usually don’t pay a $1 per bottle for shampoo but Dave has been having a few issues lately with his shampoo so I picked these up since he really likes this type and we are all out of Pantene 6 Maalox yup this one is excessive since we don’t use it very often. This size bottle is on sale at my store for $5.09 and there is a monthly deal (I think) when you spend $30 you get $10 RR back. I found 5 $5mq in my stash which made this a $4 money maker. I’ll be calling family and seeing if anyone uses this after that I’ll check the expiration dates and donate any that expire within the next year if there is any left they will get priced and added to the yardsale totes. 2 Noodle things $1 I wanted to make sure my coupon to item ratio was good (I hate buying crappy candy at the register) Dave can take these to work for lunch when it’s chilly out for a hot meal. They may not be the healthiest but they don’t require refrigeration and are quick/easy to make. In total today I spent $4.78 at Walgreen’s and used a $10 RR from last week. I got back a $10 RR for the maalox, $3.50 RR for the Chex, and a $2 RR for the Pantene. For me this was a successful trip I came out about .75 ahead and have some shampoo for Dave, snacks that will last me at least a month, and some donations or additions to my yardsale stock. So where are you shopping this week? I’d love to hear how you are doing. This afternoon I’ll be heading to Michaels to use there 25% off your purchase coupon, while I’m up there I’ll stop at the dollar store, BJ’s (free coupons to use), I’ll get gas since it’s cheapest out that way and if Aldi’s is open I’ll stop there too.