text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
Scream Trilogy Links The Batman v Superman Turkish Airlines Connection The link between Turkish Airlines and Batman v Superman was announced in January, but wasn’t news to those of us who were paying attention during filming. There were rumors about Turkish airlines having some connection to the movie toward the end of the filming in Detroit, when people reported scenes being filmed at Detroit Metro Airport. The scoop then was that it probably involved Gal Gadot as Wonder Woman, and now in the latest trailer we have the proof: Wonder Woman herself (as Diana Prince) boarding a Turkish Airlines airplane. However back in July, 2015, almost a year after the Batman v Superman machine left Michigan, Twitter came alive with rumors that the production crew were back in downtown Detroit filming again. Maybe some reshoots? Of course I headed down to see what was going on, to find a relatively small crew in place outside the Penobscot Building, downtown. Although there was some impressive equipment, and vehicles that were clearly from Batman v Superman, the set up seemed too small to be part of the movie itself. Local crew downplayed the movie connection a little at first, saying it was a shoot for a commercial. Also we knew that at the time the entire cast of the movie were at San Diego Comic Con and so unlikely to be involved. Further interrogation revealed that it was a commercial for… you guessed it, Turkish Airlines. Aha. Closer examination of the crew also revealed the presence of none other than Larry Fong, Director of Photography for Batman v Superman. Unfortunately Larry is not my biggest fan. I think he may be the only person ever to block me on Twitter after I posted some pictures in the early days of filming in Detroit. Sorry, Larry! However, in addition to his phenomenal contribution to the big blockbuster movies (Watchmen, Man of Steel and many others), he’s also worked on some amazing commercials. The most notable in this context is the amazing Hardee’s commercial that released with Man of Steel (2013).
2023-11-28T01:26:28.774034
https://example.com/article/1917
Features How to Buy a Duty Holster When you think you need to find a new duty holster, it sounds like a simple task, doesn't it? Well, that's only if you define simple as something that can save your life or end up killing you. That might sound a bit overly dramatic, but when it comes down to it, your duty holster is one of the most important articles of safety equipment you'll ever take into the field — just as important as your firearm, cruiser, flashlight, or handcuffs. And, it's not an easy decision anymore. The easiest decision is plain, basket weave, or Clarino. Your department uniform code usually makes that one for you. But, now come the harder and arguably the most important decisions. Retention Levels Get 10 firearm instructors together and ask them to explain retention levels and you'll get 13 different answers. Retention levels can be really tricky and the only true way of ensuring that any particular holster provides your desired retention level is to put your hands on it and give it an extensive test. Also, don't get caught up in the "retention level" assigned a particular holster by its manufacturer. There is no actual standard adhered to by the entire holster industry. Some manufacturers say Level I requires some sort of locking device like a thumb break. Others argue that gravity, a tension screw, or friction qualifies as Level I. Either way it's the minimally accepted level for a duty holster and should only be deployed in plain-clothes assignments like detectives, officers in an admin assignment, or off-duty carry. Retention Level II generally requires two locking devices and Retention Level III requires three locking devices. If you are in uniform working patrol, Retention Level II and III are the only ones you should consider. If you've ever been through any type of officer safety class you should remember videos of prison gang members practicing gun takeaways right in the prison exercise yard. That's real stuff and even if you have a Retention Level 9 holster you cannot get complacent. The bad guys are practicing to relieve you of your sidearm and use it on you. Security vs. Safety There's a trade-off between security and safety. I know, they sound synonymous, but if you really think about it they aren't. As the retired rangemaster for a large Southern California police department I had more than a few officers fail to qualify on their first attempt with stage one of our qualification—two rounds, center of mass, on a turning target, with a two-second presentation. Their first move would be to press the release mechanism; second, they'd reach up and move the hood or bale forward and out of the way; thirdly, they would re-grip their firearm and start to extract it from the holster. Somewhere between steps two and three they'd see the turning target face away. Their holsters were secure, but they weren't safe—at least for their level of competence. In the world of duty holsters security equates to the ability of the holster to prevent a bad guy from taking your gun no matter how many switches, levers, bales, hoods, buttons, snaps, twists, or rocking motions required. Safety equates to your ability to rapidly draw and deploy your firearm in a crisis situation no matter how many switches, levers, bales, hoods, buttons, snaps, twists, or rocking motions you must defeat. Finding the "sweet spot" between security and safety is entirely up to you and highly dependent on your level of competence with a particular holster. The only way to develop competency is practice—and a lot of it. It takes about 5,000 perfectly practiced draws to achieve a mastered level of competence with a holster—some argue 10,000. Remember, it's a highly perishable skill requiring continued practice—100 draws each day before your shift. You'll be surprised how quickly you can accomplish that task. Fit the Gun Firearm manufacturers can change their gun specifications from time to time. Different manufacturers have totally different specifications for what is essentially the same gun. This is especially true for the 1911 series of pistol with a weapon-mounted accessory rail for a light, laser, or combination unit. Colt, Kimber, Springfield, SIG Sauer, and many others make a 1911 with a rail. They are all great guns, but one single holster designated for a 1911 with accessory rail will not fit all those guns. Some will be too loose; some too tight; and some will be just right—it's kind of like "Goldilocks and the Three Bears." So, make sure your gun fits the holster you want. And the only way to do it is to try your gun in that holster. It should hold the gun securely and not allow it to rattle around. Additionally, it should not bind during the draw stroke or be too hard to re-insert. When the adrenaline is pumping you want both the draw and re-holstering to go smoothly from muscle memory. This area too benefits from repeated perfect practice. High, Mid, or Low Ride Are you male or female? Are you riding a motor, pushing a cruiser around, on bike patrol, walking a downtown beat, or serving in a tactical unit? Each instance can dictate the style of holster you should wear. Believe it or not, the female body is different than that of the male. You should write that down—it could be on the test. With all other points like age, weight, height, and musculature proportionally factored in, a woman's pelvic bones generally are wider spaced than a man's. A mid-ride and especially a high-ride holster can cause major problems for a female officer in her ability to efficiently draw her firearm due to the angle the holster takes to conform to the officer's hips. The butt of the gun will be angled in toward the waist, thus not allowing the weapon to be drawn straight up. You need to leave sufficient room for a smooth, rapid, and easy draw. Additionally, because the gun is angled in it often rubs on the waist, becomes very uncomfortable, and ruins uniform shirts. Female officers should consider a low–ride holster or some manufacturers offer a wedge that attaches the holster to the belt attachment system, which provides the correct angle. The wedge allows the comfortable use of a mid-ride or even a high-ride. Motor officers and bicycle patrol officers are on and off their vehicles many times during a shift. The movements, which differ significantly from entering and exiting a patrol car, can make any holster very uncomfortable. High-ride holsters seem to work best for both motor officers and bicycle patrol. The old swivel-style holsters are still available, but usually only offered as Retention Level I systems. The make, model, and configuration of the car you drive have significant impact on the comfort and usability of your holster. Unless the cruiser is configured to accommodate a holster, a low-ride rig may push your belt up and allow the butt of your firearm to dig into your side. The seat belt strap may cover a high-ride or mid-ride rig and not allow you to draw from a seated and belted-in position. You need to test first. Durability and Comfort Holster manufacturers are in the business to make money. Most take your safety and comfort very seriously. But, even if they make the best duty holster ever conceived, if they can't make money, and therefore can't buy the materials or the machines needed for manufacturing or pay their employees, that holster will go the way of the dinosaurs. You cannot just go on a holster maker's website and read their description of a certain holster—usually concocted by marketing people—and take that as gospel. Also, ask the manufacturer and retailer about their return policy. What about repair? Will they send a replacement to use until yours is repaired? How long will it take and who pays for the shipping? You need to inspect the build quality of the internal mechanism and the security devices. Take a very close look at the belt attachment system and make sure it's substantial. What you don't need is some meth-monster or PCP devotee going for your gun and ripping the holster and gun off of your belt. If you live in a colder climate, will the belt attachment system allow your jacket to slip between the holster and your body? This allows for easy access to your firearm and less chance of your gun hanging up on your clothing during the draw cycle. It also allows for unimpeded re-holstering when you need to secure your duty gun and go "hands-on." Usually, injection-molded plastic or nylon is good on the durability scale, but it may not be as comfortable as leather. However, leather is much more susceptible to weather. Some of we more experienced cops—the ones you call dinosaurs and perhaps rightfully so—have suffered injuries over the years. Injuries are not exclusive to one's membership in the dinosaur club. Police work can be rough no matter your age. Comfort comes into play here. Can you draw from a high-ride Retention Level III holster without wincing in pain? I sure can't. I need a mid-ride or low-ride rig to maintain the speed necessary for an efficient draw cycle. Practice, Darn It Using your holster properly is just as perishable a skill as is pursuit driving or firearm accuracy. You really need to practice no matter which holster you choose. Putting in a little time with a couple different duty holsters is invaluable. You need to be confident and competent with your safety gear. Ask other officers you work with what they prefer and why. If someone has a particular holster you're interested in ask if you can borrow it for testing on his or her days off. Try three or four different types from different manufacturers. Once you have made a decision and made your purchase, start practicing. Whatever you do, don't take your brand new sparkling holster in the field on day one. If the balloon goes up and that incredible surge of adrenaline courses through your system your muscle memory will still be anchored to the old holster system. Start the 5,000- to 10,000-draw regimen first to break the old muscle memory and replace it with what is needed for your new holster. Once that's accomplished you're ready to go. Retired sergeant Dave Douglas is a longtime contributor to POLICE Magazine. He retired after 30 years with the San Diego Police Department as the rangemaster and is currently a Special Deputy for Investigations at the Archuleta Sheriff's Office in Colorado. Comments (1) Join the Discussion POLICE Magazine does not tolerate comments that include profanity, personal attacks or antisocial behavior (such as "spamming" or "trolling"). This and other inappropriate content or material will be removed. We reserve the right to block any user who violates this, including removing all content posted by that user. Yes! Please rush me my FREE TRIAL ISSUE of POLICE magazine and FREE Officer Survival Guide with tips and tactics to help me safely get out of 10 different situations. Just fill in the form to the right and click the button to receive your FREE Trial Issue. If POLICE does not satisfy you, just write "cancel" on the invoice and send it back. You'll pay nothing, and the FREE issue is yours to keep. If you enjoy POLICE, pay only $25 for a full one-year subscription (12 issues in all). Enjoy a savings of nearly 60% off the cover price!
2024-01-28T01:26:28.774034
https://example.com/article/6103
Rapids match against San Jose moved from March 9 to May 7 COMMERCE CITY, Colo. (Monday, December 23, 2013) – The Colorado Rapids match against the San Jose Earthquakes originally scheduled for Sunday, March 9 has been changed to the new date of Wednesday, May 7. The Rapids will now open the 2014 MLS season at the New York Red Bulls on Saturday, March 15 before returning to Dick’s Sporting Goods Park for the Home Opener on Saturday, March 22 against the Portland Timbers. The Rapids-Quakes match on May 7 at Buck Shaw Stadium in Santa Clara, Calif. will kick off at 8:30 p.m. MT (7:30 p.m. PT). The change was made by Major League Soccer to accommodate the Earthquakes’ CONCACAF Champions League quarterfinal series against Mexican club Toluca, which takes place in early March.
2023-10-10T01:26:28.774034
https://example.com/article/1097
VSS -vs- HSRP with 4510R+E SUP8-E Greetings, We recently purchased two identical WS-C4510R+E switches (to replace our single), each with dual WS-X45-SUP8-E Supervisors. This is NOT a tired network design. All PCs, Phones, Servers, Storage, etc. will be plugged directly into these switches, essentially making them Access, Distribution and Core, all in one. I'm planning to configure inter-vlan routing on the switches,and move away from our current router-on-a-stick config on our checkpoint firewall and was initially planning to set up HSRP between the switches, using our eight 10Gb Ethernet cables. But, I just found out our switches will support VSS, which I guess could replace the HSRP config altogether and now I'm left wondering which way to go. If I have two SUPs in each switch, does that mean I would have a Quad-SUP setup? From what I'm reading, it almost seems like there may be limitations setting up VSS on two 4510s this way. Given the details above, can someone please tell me which is better to use in my scenario? Thanks very much, in advance. Equipment: Two 4510R+E's with Redundant SUP 8-E's, connecting to a single (for now) Checkpoint firewall. However, I've got no idea how well it works and whether or not it's actually worth the additional complexity and risk of something breaking. Sometimes it's best to keep things simple and there's nothing wrong with HSRP. If you were only connecting single homed endpoints then you'd achieve very little benefit by enabling VSS. However, if it's possible to dual-home your servers across the two switches and you very much want to load balance the server traffic then VSS might be worthwhile. Honestly, with dual sups, if Honestly, with dual sups, if you lost both or both PS, you likely lost the chassis; so, VSS and or HSRP did you no good. You are more likely to have a board connecting your users if it drives PoE than both SUPs or PS anyway. If you are worried about uptime, lowering your density of users to blades / diversifying users across blades would be more effective that another chassis for your small user population. Just my two cents on saving a poop ton of cents Disclaimer Disclaimer The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk. Liability Disclaimer In no event shall Author be liable for any damages wha2tsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage. Posting As Shilling has already noted, you should only really consider VSS if you intend to dual home. Not sure about VSS on 4500s, but on 6x00s you want to dual home everything. This to avoid using the VSL path except in the case of some failure. As an alternative to VSS or HSRP, do you really need to extend VLANs across the two 4500s? If not, run each as an independent L3 device. (For redundancy, you note you have dual sups, and for hosts, you could dual home to different line cards. The only extra redundancy that VSS offers is for the chassis, which don't fail that often.) Thank you for the responses. Thank you for the responses. I've uploaded a diagram to show how my users will connect. Referencing my diagram, if Host 3 needs to get to the internet, they packets would go to Switch-2, then over the Ether-channel to Switch-1, then to the Checkpoint firewall, and up to the ISP. If the users are connecting directly to both of the switches, and there's only a single connection to the Checkpoint from Switch-1, wouldn't it make sense to have a routing protocol such as HSRP running, with users connecting to a virtual IP? Or...set up VSS? VSS would give you very VSS would give you very little here if the end devices are connecting directly to the 4500s. If you did use VSS then as Joe notes a lot of traffic would have to go via the VSL which is not really what you want. However if the devices really do connect directly to the 4500s then HSRP gives you nothing either because if the switch fails then the devices connected to that switch lose connectivity regardless of the fact you have moved the VIP to the other switch. You can run it if you want so that all traffic goes via one switch but it is not really giving you redundancy. You are really relying purely on your supervisors for any redundancy but that does not protect against a chassis failure or specific modules within the chassis that clients connect to. This is generally why clients connect to access switches so they have alternate paths to the distribution switches. Thanks, Jon. Thanks, Jon. Unfortunately, the diagram is correct. There are no access switches and the users are connecting directly to one 4500, or the other, which will perform inter-vlan routing, with a single connection to the ISP through a Checkpoint firewall. I asked for access switches, and I was told it was unnecessary for our environment, and to work with this. We are currently running a single 4500 for the past 10 years, which has never failed, so management is not that concerned about one of the 4500's going down...especially with dual supervisors in each switch. With approximately 100 users, half the users will connect to Switch-1 and the other half will connect to Switch-2. Wouldn't it make sense to at least run HSRP on the 4500's so regardless of the switch they're connected to, the users will always have the same default gateway configured via DHCP (10.1.1.1, for example), which would be the virtual IP for that subnet, while the actual IP for Switch-1 would be 10.1.1.2 and Switch-2 would be 10.1.1.3? Disclaimer Disclaimer The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk. Liability Disclaimer In no event shall Author be liable for any damages wha2tsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage. Posting Yes, I can understand why you would want dual connected hosts to avoid transiting switch 2, but when you work with L2 technologies, it gets a bit involved. If using VSS, normally dual homed hosts run Etherchannel, and from the host's perspective, Etherchannel won't know what switch the firewall is connected to, so traffic has a 50/50 chance of taking an extra hop. (BTW, this is one reason VSS likes to have everything dual connected.) If using HSRP, you dual connected host would likely create a bridge between the two switches, and if it does, STP will break the loop, usually one of the links to the host, so unless you "tune" STP, your link to switch 1 might be blocked, and if not, any traffic that needs to go to switch 2 now needs to transit switch 1. If you hosts supported routed connections to both switch 1 and 2, then they could be configured to prefer the shortest path to specific destination networks. Of course, an important question, with 10g links between the two 4500s, really how much of an issue is jumping through an "extra" 4500 hop? Understand/appreciate the purpose of these technologies, so you can distinguish between what might be done and what should be done. HSRP is great when working with L2 switch(es) and separate routers. You have L3 switches. VSS is great when working with L2 hosts, that have Etherchannel, and need the best possible redundancy (again, provides chassis redundancy, although also adds a new point of failure, the OS that controls the VSS pair). If you network is mostly like your drawing, running each 4500 as standalone L3 will work fine and if you really need to extend some VLANs across both 4500s, that can be done concurrently via L2 using HSRP/GLBP. Thanks, Joseph. Thanks, Joseph. Yes, it is exactly like my drawing. Each 4500 has two 48-port POE modules, giving us a total of 96 ports per switch. So, the user PCs will be daisy-chained through their phones and plugged into a single POE port on one 4500 switch, or the other. Therefore, we need to divide the connections, roughly in half, between the two switches. So, if they're connected to switch-2 and need to get to the internet, wouldn't the traffic have to run over the 10Gb links to switch-1, since switch-1 is the one connected to the firewall? The same thing would apply to a server that is connected to the other switch. My main concern is that the My main concern is that the firewall is only connected to Sw1. If that switch fails then all users will lose Internet access. I think you should help better protect users connected to Sw2. You could implement a stacked pair of L3 switches to form a small network services block. The firewall would require two uplinks to the stack, one to each member. The two uplinks would form a single LACP bundle at layer-2 and a single routed P2P link at layer-3. Therefore, the firewall still has a single 'inside' L3 interface for ease of configuration and management. You'd then need to form a triangulated routed network between the 3 nodes, i.e. 2 x 4500E and 1 x switch stack. This would also negate the need for Sw2 traffic to traverse across to Sw1 in order to reach the Internet. Just an idea. And there might be better ways of achieving the same goal. I managed to successfully set I managed to successfully set up VSS on the 4510R+E switches last night so I could see it in action and in a quad-sup config, the standby supervisors for each switch are now in rommon, with one active sup on switch-1, and a standby sup on switch-2. I guess I'm wondering what this means to me, if one of the supervisors goes down. I just want to know which way to go before putting all the time into the rest of the switches' configuration, especially if I have to tear down the VSS connection. Enterprise Switching Business Unit is glad to announce Beta release 16.12.2 for all Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms. This release is made available to allow users to test, evaluate and share fee... view more Purpose of the document This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C... view more Do you currently have hands-on networking experience? If you do, we'd love to hear from you! Your feedback will be reviewed and analyzed by our team to directly influence a networking management and monitoring product. Take the 20-min or les... view more
2024-07-21T01:26:28.774034
https://example.com/article/2871
This proposal addressed several fundamental problems in the chemistry and biochemistry of biologically-important furanose and furanose-containing compounds. The experimental approach involves the combination of stable isotopic enrichment, modern multi-pulse 1D and 2D NMR spectroscopy, and computational chemistry (ab initio molecular orbital calculations). New/improved methods (chemical and enzymic) will be developed to introduce stable isotopes (13C,2H) into carbohydrates, with particular focus on furanose sugars. By preparing systematically a variety of furanose structures, we aim to: A) Study the tautomeric composition of these (13C)-enriched furanose rings in aqueous solution as a function of ring structure/configuration. B) Study the conformational/dynamic properties of these (13C)- enriched furanoses as a function of ring structure and configuration. This will be accomplished by interpreting long- range 1H-1H, 13C-1H and 13C-13C coupling constants obtained from high-resolution NMR spectra. Theoretical input to these studies will be supplied by molecular orbital calculations (geometry optimization). C) Study how furanose ring structure/configuration, and other factors, affect the rates of ring-opening and ring-closing reactions in solution (furanose anomerization). For example, the effect of ring alkylation on these rates (Thorpe-Ingold effects) will be examined. D) Study how furanose ring conformation/dynamics are altered when incorporated into oligonucleotides; specific-sequence oligonucleotides containing stable isotopes will be used in this work. The proposed studies are a prerequisite to the pursuit of the longer-term objectives of determining the molecular basis for the binding specificity between nucleic acids and proteins, and on elucidating the effect of sugar tautomerization on metabolic regulation.
2024-02-09T01:26:28.774034
https://example.com/article/6225
Critical points for the control of Tuberculosis on Primary Health Care. To analyze the discourses of professionals that work on the reference service about the critical points that affects the essential attributes of the Primary Health Care (PHC) related to the control of tuberculosis in the city of João Pessoa. The empirical material collected from August to October in 2014, through the interview technique was analyzed through the methodological-theoretical framework of French Discourse Analysis. The discourses demonstrated the critical points on the control of the disease on PHC as being the lack of bond and welcoming from the professionals in relation to patients with tuberculosis. It was realized that the professionals have prejudice about the disease, that they have difficulties on the access to conducting exams, appointments and treatments, as well as there are fails on the reference and counter-referencing system. Managers should be aware about the results that were found, so that facing actions can be planned and executed in order to minimize the existent of critical points.
2024-02-27T01:26:28.774034
https://example.com/article/6570
The Punjab government’s Women on Wheels programme was initiated on January 10 by a rally of 150 women trained by the Special Monitoring Unit on Law & Order and City Traffic Police. The WoW programme took off but not without condemnations on social media littered mainly with charges of “bayhayai”. Just a few representative samples include: That the sight of women on motorbikes is obscene to some in a country where hundreds of children are horrifically abused for years and forgotten spells volumes about the twisted sense of outrage by many in Pakistan. It is also mind boggling how the sight of women with men on motorbikes isn’t “beyhayai” but women alone on motorbikes definitely is. Why? Participants of Women on Wheels (WOW) ride their motor-bikes during a rally in Lahore. ─AFP There is little doubt that this line of thought owes itself to the deep-seated scandalisation of female presence and participation in public spaces in Pakistan. This is a scandal anytime there is a breach of the chaar diwari — a concept set in values of honour, which frankly holds little relevance in the 21st century but nonetheless limits women to the boundaries of the private sphere. This 'scandal' is part of the bigger problem women in Pakistan face in relation to public spaces, which are culturally set as 'alien territories' for them. Public spaces are seen as exclusive male domains — external and separate from the domestic domain to which women 'belong'. Take a look: Why do women walk so briskly in public? Any breach of this mobility by women is then either fraught with risks such as harassment — which is rationalised as part-and-parcel of stepping into the ‘male realm’ of public spaces, in which female presence and visibility may be treated as cultural anomalies. It is this view that often promotes hostile conditions for women when they do step into public spaces — ranging from roads, educational institutions to work places — because "that isn't where they are supposed to be". Public spaces in Pakistan are not a distant realm for women, they are not off-limits to us. And that is precisely why an initiative such as Women on Wheels is necessary in this country because it resists this myopic idea by attempting the normalisation of female engagement in public spaces.
2023-11-04T01:26:28.774034
https://example.com/article/4674
658 N.W.2d 769 (2003) 2003 SD 24 Daniel C. RINDAL and Raymond J. Shape, Plaintiffs and Appellees, v. Gail SOHLER and Janet Sohler, Defendants and Appellants. Nos. 22246, 22258. Supreme Court of South Dakota. Considered on Briefs November 30, 2000. Decided March 5, 2003. *770 Frank B. Morrison, Jr. of Morrison Law Offices Whitefish, Montana, William F. Day, Jr. of Lynn, Jackson, Shultz & LeBrun, Sioux Falls, South Dakota, Attorneys for plaintiffs and appellees. Steven M. Johnson and Ronald A. Parsons, Jr. of Johnson, Heidepriem, Miner, Marlow & Janklow, Sioux Falls, South Dakota, Attorneys for defendants and appellants. GORS, Circuit Judge. [¶ 1.] Daniel C. Rindal (Rindal) and Raymond J. Shape (Shape) sued Gail Sohler and Janet Sohler (Sohlers) for failure to carry out the provisions of an agreement for cancellation of contracts for deed. The trial court entered an order for equitable adjustment. Sohlers appealed. Rindal and Shape filed a notice of review. We reverse. FACTS [¶ 2.] Rindal and Shape bought a 2,700 acre ranch from Sohlers in 1987 for $840,000 on two contracts for deed. Rindal and Shape were feeding up to 20,000 to 30,000 head of cattle for the Louis Dreyfus Company. The Dreyfus deal soured over the disappearance of about 4,000 head of cattle. Rindal and Shape were indicted in Yankton County in November 1991. State v. Shape, 517 N.W.2d 650 (S.D.1994). The charges were eventually dismissed. [¶ 3.] In 1989, Rindal and Shape quit paying on the contracts for deed after they had paid $180,000 principal and $219,450 interest for a total of $339,450. Shape subsequently filed a Chapter 12 bankruptcy. Sohlers obtained relief from the automatic stay on August 27, 1991. On October 16, 1991, an agreement for cancellation of contracts for deed was signed. Rindal and Shape agreed to deed back the ranch and Sohlers agreed to make immediate efforts to resell the ranch. If the ranch was resold, Sohlers would pay Rindal and Shape any excess over Sohlers' expenses.[1] Rindal and Shape quitclaimed the ranch back to Sohlers. Sohlers took various steps to resell the ranch.[2] Shape did not leave. In November 1992, Sohlers obtained a court order to evict Shape who left the property in such deplorable condition that it took years and thousands of dollars to return it to serviceable condition. For example, the pasture land was overgrazed, the property was infested with weeds, dead cattle were left all over the property, holes were cut in buildings and *771 the water was left running which flooded a large area. [¶ 4.] After the deed-back, Sohlers restored the property and land values increased over the years. In May 1997, Rindal and Shape sued the Sohlers to get the ranch back claiming the Sohlers had breached the agreement for cancellation of contracts for deed by not reselling the ranch and giving them the excess money referred to in the agreement. [¶ 5.] The trial court held a trial with an advisory jury. When the jury found that Sohlers had not breached the agreement for cancellation of contracts for deed, the trial court rejected the advisory verdict and found that the Sohlers had breached the agreement. The trial court then concluded that an equitable adjustment under Beitelspacher v. Winther, 447 N.W.2d 347 (S.D.1989), and former SDCL 21-50-2, repealed 1992 SessL ch 157, was the appropriate remedy. Sohlers appealed and Rindal and Shape filed a notice of review. STANDARD OF REVIEW [¶ 6.] The trial court's findings of fact are reviewed under the clearly erroneous standard. Estate of Fountain v. Schroeder, 2001 SD 139, ¶ 6, 637 N.W.2d 27, 28. "The question is not whether this Court would have made the same finding that the trial court did, but whether on the entire evidence we are left with a definite and firm conviction that a mistake has been committed." Id. Questions of law are reviewed de novo. Bergee v. Bd. of Pardons and Paroles, 2000 SD 35, ¶ 4, 608 N.W.2d 636, 638. This Court will only overturn a trial court's conclusions of law when the trial court erred as a matter of law. Estate of Fountain, 2001 SD 139, at ¶ 6, 637 N.W.2d at 28. When there is a mixed question of fact and law, the court will review the issue de novo. Id. DECISION A. Res Judicata and Claim Preclusion. [¶ 7.] In 1992, after signing the cancellation of contracts for deed and quitclaim deeds returning the property to Sohlers, Shape refused to vacate the premises. Sohlers then filed an action for forcible entry and detainer to evict Shape. Sohlers argued that the 1992 judgment evicting Shape precluded the present lawsuit under the doctrine of res judicata. The trial court held that the only issue addressed in 1992 was possession and that the alleged breach of contract was not raised and was not precluded. [¶ 8.] Res judicata precludes relitigation of issues that were litigated between the same parties in a prior action. Faulk v. Faulk, 2002 SD 51, ¶ 16, 644 N.W.2d 632, 635. Shape did not raise a claim for breach of contract in the forcible entry and detainer action even though the Sohlers had already failed to resell the property by the time the action for forcible entry and detainer was commenced (which was obvious since Sohlers were evicting Shape). Claim preclusion forecloses litigation of matters that could have been asserted in a prior action. Lee v. Rapid City Area School Dist., 526 N.W.2d 738, 740 (S.D.1995). [¶ 9.] To determine whether Shape could have asserted the claimed breach of contract in the forcible entry and detainer action, we turn first to SDCL 21-16-4, which provides: An action under the provisions of this chapter cannot be brought in connection with any other except for rents and profits or damages but the plaintiff may bring separate actions for the same if he so desire. *772 Construing this provision, this Court has sometimes allowed additional equitable claims in actions for forcible entry and detainer. LPN Trust v. Farrar Outdoor Advertising, 1996 SD 97, ¶ 10, 552 N.W.2d 796, 798-99. However, this Court has also held that a vendor could not combine strict forfeiture of a contract for deed in an action for forcible entry and detainer. BankWest, N.A. v. Groseclose, 535 N.W.2d 860, 863-64 (S.D.1995). Forcible entry and detainer is a summary remedy for speedy possession of real estate. LPN Trust, 1996 SD 97 at ¶ 10, 552 N.W.2d at 798. However, courts should also hear other relevant matters to avoid a multiplicity of suits. Id. [¶ 10.] It does not matter whether Shape could have raised Sohlers' claimed failure to make adequate efforts to resell the property. Rindal was not a party to the forcible entry and detainer action. Therefore, Rindal is not foreclosed by res judicata or claim preclusion from litigating the claim that Sohlers breached the agreement for cancellation of contracts for deed. The issue of equitable adjustment under Beitelspacher is the same whether the plaintiffs are Rindal and Shape or only Rindal. B. Breach of contract. [¶ 11.] Rindal and Shape and the Sohlers entered into an agreement for cancellation of contracts for deed. The agreement called for cancellation of the contracts for deed and for Rindal and Shape to quitclaim the property back to the Sohlers. Sohlers agreed to make immediate efforts to resell the ranch. If the ranch was resold, Sohlers would pay Rindal and Shape any excess over Sohlers' expenses. Rindal and Shape claimed Sohlers failed to make the immediate efforts to sell the ranch required under the contract. Sohlers claimed they made immediate and extensive efforts to resell the ranch. The facts were in dispute and the evidence was conflicting. Rindal and Shape's suit is based on an alleged breach of the agreement for cancellation of contracts for deed. They asked for specific performance, reconveyance of the property, an order canceling the quitclaim deeds and for money damages. On the day of trial, in an apparent effort to avoid a jury trial, Rindal and Shape disclaimed their request for money damages for breach of contract and indicated they were proceeding only for equitable relief. [¶ 12.] An essential element to equitable relief is the lack of an adequate remedy at law. Knodel v. Kassel Tp., 1998 SD 73, ¶ 8, 581 N.W.2d 504, 507; Bienert v. Yankton School Dist., 63-3, 507 N.W.2d 88, 90 (S.D.1993); Gross v. Conn. Mut. Life Ins. Co., 361 N.W.2d 259, 265 (S.D. 1985); Hein v. Marts, 295 N.W.2d 167, 171 (S.D.1980); Anderson v. Kennedy, 264 N.W.2d 714, 717 (S.D.1978). Rindal and Shape cannot disclaim their remedy at law and elect to sue in equity to avoid a jury trial. Haberer v. Rice, 476 N.W.2d 276, 277 (S.D.1991). [¶ 13.] Rindal and Shape's suit is not a proper suit for equity. Rindal and Shape have a plain, adequate and speedy remedy at law for money damages for breach of contract. Dairy Queen v. Wood, 369 U.S. 469, 473, 82 S.Ct. 894, 897, 8 L.Ed.2d 44, 48 (1962); First W. Bank, Sturgis v. Livestock Yards Co., 466 N.W.2d 853, 856-57 (S.D.1991). Breach of contract presents a pure question of fact, Moe v. John Deere Co., 516 N.W.2d 332, 335 (S.D.1994), for a jury, C & W Enterprises v. City of Sioux Falls, 2001 SD 132, ¶ 19, 635 N.W.2d 752, 758; Harms v. Northland Ford Dealers, 1999 SD 143, ¶ 21, 602 N.W.2d 58, 63; Swiden Appliance v. Nat. Bank of S.D., 357 N.W.2d 271, 277 (S.D.1984). A suit for money damages *773 also preserves the Sohlers' right to a jury trial. [¶ 14.] The court recognized that the present action was really only for money damages during the hearing held before the trial commenced: The only question is monetary damages that they're going to get if there was a breach of the contract and how that's accomplished.... The court's comment was correct. The equitable adjustment ordered by the court will only result in a money judgment for breach of contract. The circuit court turned a breach of contract case into an equitable adjustment case and denied the Sohlers a jury trial to which they were not only entitled but which they also subsequently won. [¶ 15.] Even though the advisory jury found that the Sohlers did not breach the agreement for cancellation of contracts for deed, the court found that the Sohlers did not make the required effort to sell the ranch. Equitable adjustment would not have been a remedy for breach of contract then and should not be a remedy now. The equitable adjustment ordered by the court arose under former SDCL 21-50-2, repealed 1992 SessL ch 157, which provided for equitable adjustment in an action to foreclose a contract for deed. SDCL 21-50-2 provided in part: The court in such actions shall have the power to equitably adjust the rights of all the parties [to the contract for deed].... Equitable adjustment was combined with strict foreclosure to ameliorate the harsh effects of forfeiture and to prevent unjust enrichment. Beitelspacher, 447 N.W.2d at 351. Sohlers never brought an action to foreclose the contracts for deed and this action by Rindal and Shape is for breach of contract. [¶ 16.] Since there was no action for foreclosure of the contracts for deed, there was no foreclosure. Therefore, Rindal and Shape were never entitled to equitable adjustment. Rindal and Shape gave up their right to an equitable adjustment when they entered into the agreement for cancellation of contracts for deed. The cancellation of contracts for deed (a separate document from the agreement for cancellation of contracts for deed) specifically provided: The undersigned [Rindal and Shape] further acknowledge that this instrument shall constitute a total disclaimer of any right, title or interest in the aforementioned real estate .... The quitclaim deeds further waived any rights under the cancelled contracts for deed. SDCL 43-25-8. [¶ 17.] The trial court erred as a matter of law by ordering equitable adjustment when there was a plain, speedy and adequate remedy at law for money damages for breach of contract. Furthermore, equitable adjustment ceased to exist as a remedy on July 1, 1992, when the legislature's repeal of former SDCL 21-50-2 took effect. Therefore, equitable adjustment had no application to this action commenced in 1997. Rindal and Shape had no right to a remedy that no longer existed. NOTICE OF REVIEW [¶ 18.] Rindal and Shape filed a notice of review claiming that Sohler's attorney fees should not be considered when the court made an equitable adjustment. Since an equitable adjustment is not proper, we will not address Rindal and Shape's notice of review. CONCLUSION [¶ 19.] The trial court's order rejecting the jury's advisory verdict and for equitable adjustment is reversed. This *774 Court has authority to reinstate an advisory verdict. Nizielski v. Tvinnereim, 453 N.W.2d 831, 834 (S.D.1990). Both sides fully tried the breach of contract issue to the jury. Since the jury has already found that the Sohlers did not breach the agreement for cancellation of contracts for deed, there is no need to retry this case. On remand, the trial court is directed to reinstate the jury verdict and to enter judgment in favor of Sohlers and against Rindal and Shape. [¶ 20.] GILBERTSON, Chief Justice, and KONENKAMP, Justice, and AMUNDSON, Retired Justice, concur. [¶ 21.] ZINTER, Justice, concurs in part and dissents in part. [¶ 22.] GORS, Circuit Judge, for SABERS, Justice, disqualified. [¶ 23.] MEIERHENRY, Justice, not having been a member of the Court at the time this action was submitted to the Court, did not participate. ZINTER, Justice, (concurring in part and dissenting in part). [¶ 24.] I concur with all of the Court's opinion except for its reinstatement of the advisory jury's verdict. The Court relies upon Nizielski v. Tvinnereim, 453 N.W.2d 831 (S.D.1990) for authority to reinstate an advisory jury's verdict. In my judgment, neither Nizielski nor SDCL 15-6-39 (RCP 39) warrant reinstatement of an advisory jury verdict under the facts of this case. [¶ 25.] Although Nizielski reinstated a jury verdict, it actually supports the conclusion that reinstatement of this advisory verdict is not warranted. In Nizielski, this Court held that fundamental fairness required reinstatement of a binding jury verdict that had been set aside after trial. However, the Court's holding was expressly premised on the facts that (1) those parties had consented to trial by jury, (2) the parties reasonably expected the jury's verdict to be binding, and (3) the trial court did not treat the jury's verdict as advisory until after the jury had returned its verdict. Nizielski noted that the timing of a trial court's notification to treat the jury's verdict as advisory is the critical issue in determining whether to reinstate a jury verdict. Nizielski, 453 N.W.2d at 834. Significant to this appeal, Nizielski stated that notification was required "to ensure fair notice to the litigants of the arena in which they find themselves in; and, further so that they can knowledgeably proceed with a mental determination as to how they can effectively conduct voir dire examination having a basic viewpoint of the role of the jury in the proceeding." Id. That pre-trial notice of the type of jury to be used in the trial, a prerequisite for reinstatement, is absent in this case. Because these parties were given notice that jury verdict would be advisory, we should not, on appellate review, now change the nature of the verdict without the opportunity of the parties to retry their case. [¶ 26.] The federal courts apply this reasoning under Fed.R.Civ.P. 39, the counterpart to our advisory jury statute, SDCL 15-6-39. In Pradier v. Elespuru, 641 F.2d 808 (9th Cir.1981), the Court of Appeals considered a remarkably similar case. In that case, a defendant had demanded a jury trial. However, like the case before us, the trial court impaneled an advisory jury, and the plaintiff acquiesced in that trial to an advisory jury. After trial, the trial court overturned the advisory verdict, and the defendant appealed. The Court of Appeals concluded that even though the trial court erred in denying the defendant a jury trial as a matter of right, the advisory verdict, which favored the successful defendant/appellant, could not be reinstated. The Court of *775 Appeals held that the case had to be remanded for retrial before a non-advisory jury. It did so even though the advisory verdict was the verdict the successful defendant/appellant sought, and even though the plaintiff/appellee had acquiesced to the advisory jury. It reasoned: The advisory jury verdict may not be substituted. The entire trial took place with the understanding that the jury's verdict would be advisory only. There are frequently significant tactical differences in presenting a case to a court, as opposed to a jury. The parties are entitled to know at the outset of the trial whether the decision will be made by the judge or the jury. Pradier, 641 F.2d at 811 (further citations omitted). See also 33 FedProc, LEd § 77:151 (stating, "[w]here a court improperly substitutes an advisory jury for a jury trial and an entire trial takes place with the understanding that the jury's verdict would be advisory only, the entire case must be remanded for a retrial before a regular jury.") [¶ 27.] This rule and its underlying reasoning apply in the case we are considering. At the outset, it is conceded that Sohler's liability for breach of contract is the same issue to be determined in both trials. However, Rindal's and Shape's strategy, including the evidence and theories they will present, will very likely differ in an action for damages for breach of contract than in their ostensible claim for the "equitable relief" that they submitted to the advisory jury. This is evident from their arguments to Judge Rusch on the first morning of the advisory jury trial. At that critical time, Rindal and Shape adamantly indicated that they were not prepared to try a breach of contract case seeking damages. They then proceeded to try their case to the advisory jury as a matter of equity. We should not, therefore, reinstate the advisory jury verdict. We should remand this legal claim for breach of contract damages to a non-advisory jury. NOTES [1] The expenses included the amount needed to pay off the contracts for deed between Rindal and Shape and the Sohlers, to pay off the mortgage Shape had placed on the land, to pay off any other liens, to pay real estate taxes and to pay the Sohlers' legal fees. [2] Sohler contacted neighbors and customers and distributed brochures at his livestock auction business in Yankton. Sohler showed the property to prospective purchasers, adjoining property owners and two local Hutterite colonies. Negotiations with the Weborgs (neighbors) and Lavern Koupal (who later rented the land) fell through when they saw the devastated condition of the property. Shape's mortgage of the land to a Nebraska Bank also made sale of the land difficult. Sohler even tried to sell the ranch to the Nebraska banker and bank that held Shape's mortgage. Finally, Sohlers listed the ranch with Century 21 Real Estate agent Harvey Youngberg, who specialized in commercial and agricultural property.
2023-08-07T01:26:28.774034
https://example.com/article/5775
Phosphoric acid prepared by the digestion of phosphate rock commonly contains cationic impurities such as calcium, magnesium, aluminum and iron. It is known to purify phosphoric acid by solvent extraction techniques. The organic solvent displays a greater preference for phosphoric acid than it does for the metal salt impurities in the crude phosphoric acid. Nevertheless, an undesirable residue of polyvalent cationic impurities amounting to 25 to 250 parts per million usually remains in the solvent phase. U.S. Pat. No. 3,993,733 describes a process for preparing alkaline metal phosphates by neutralizing a solvent acid phase to obtain a precipitate and thereafter neutralizing the resultant aqueous acid phase to form a solution of soluble phosphate salts. U.S. Pat. No. 3,993,736 describes a process for preparing purified phosphoric acid by first neutralizing an acid containing solvent phase to obtain a precipitate, neutralizing the resultant aqueous phase to form a solution of soluble phosphate salts, and thereafter reconverting the phosphate salts to phosphoric acid. U.S. Pat. No. 4,112,118 extracts phosphoric acid containing solvent with an alkaline solution to remove substantially all of the P.sub.2 O.sub.5 value of the solvent. The aqueous extract contains phosphoric acid and phosphate salts in combination. U.S. Pat. No. 4,024,225 describes a sequential neutralization procedure for preparing phosphate salts. U.S. Pat. No. 3,081,151 prepares a purified phosphate salt liquor using a two-step neutralization. Prior art processes are not adapted to the concurrent production of purified phosphoric acid and purified phosphate salt.
2024-03-05T01:26:28.774034
https://example.com/article/4583
From the user's point of view, pen based entry systems that use handwriting recognition technology provide a natural computer interface for form filling applications. Unfortunately, no handwriting recognition system is perfect and it is the common experience that correction of errors is the most time consuming and difficult part of using such systems. Conventional handwriting recognition systems provide facilities for error corrections such as rewriting a character, using an alternate word list or using a soft keypad. Each of these error correction techniques is time consuming and can be frustrating to the user. Another important problem in designing pen based applications is identifying correct interfaces for pen and handwriting recognition based systems. Entry of numerals and ordinary words from a small finite dictionary may be better performed with a virtual keyboard or menu selection process. Handwriting recognition provides an ideal interface in situations where a word must be identified from a set too numerous to list in menu format. Given the difficulties associated with pen based recognition systems, a system which predicts a whole word from a written substring and presents the user with a candidate list menu selection, known as autocompletion, is a desirable interface. In particular, a system that could predict a whole string from an ambiguous substring which may contain misrecognition errors would be particularly useful. This would give the application a look and feel of near 100% accuracy, despite the handwriting recognition technology accuracy being less than 100%. The present invention relates to the field of applications that use handwriting recognition technology as a means of data entry for form filling. It specifically applies to applications which may contain one or more handwriting input fields in which discrete character recognition is used. Each input field typically has a set of well defined choices in a dictionary from which the user may make a selection. It is known to use dictionary matching at various levels in the application or by displaying alternates for the purpose of error correction. Other techniques for improving usability of handwriting recognition based applications include incorporating some form of constraints in the input fields, rule based discrimination and the use of spell checkers to improve the recognition accuracy. Known systems can be divided into two broad categories. The first includes the use of dictionaries to improve recognition accuracy and the use of dictionaries to perform postprocessing after recognition occurs. The second category of known systems is the use of alternates for a given recognized word. The concept of selecting from a list of alternates for error correction fundamentally applies to recognition technology that works at a word level, such as cursive handwriting recognition or discrete speech recognition. Discrete handwriting recognition technology works at the character level, and applying the concept of alternate lists for error correction would imply having to correct each character which is in error, one at a time, in order to complete data entry in a given field in the form filling application. This is not an efficient technique both in terms of speed of use and usability of the application. Another approach using the alternate list returned from the recognizer is to conduct an incremental search in the dictionary associated with a specific field for each recognized character and its alternates. This is not a practical real time solution for two reasons: 1) there is no guarantee that the recognizer returns all possible confusions for a specific character when the alternates are queried; and 2) the search space in the dictionary is of the order of m to the power of n where m is the number of alternates used in the search and n is the position number of the character returned by the recognizer. This search cannot be performed in real time with present technologies. Other systems perform an incremental search by adding the successively recognized character or word to the search process. Still other known systems refer to certain external techniques to improve the appearance of recognition in an application. Thus, it can be seen that it would be desirable to design a method by which the intended word for a specific field appears in a list as short as possible, with high accuracy and real time performance, despite the accuracy of the recognition technology being less than 100%. This gives the user a speedy data entry interface with near 100% accuracy. The foregoing objectives can be met in accordance with the invention through the use of a confusion matrix mediated prediction system. The confusion matrix for a specific character is a list of probabilities of that character being confused with every other character in the character set. A confusion matrix for the entire English character set of 83 characters including alphabets, numerals and punctuations is such a list of probabilities for each character in the character set.
2024-01-09T01:26:28.774034
https://example.com/article/7114
Sprint kicked the wireless industry’s price war up a level Tuesday, saying it would let subscribers pay half of what they are paying to AT&T or Verizon in perpetuity if they switch from those carriers. The Sprint plans would offer unlimited talk and text and however much data the subscribers were buying from AT&T T, -2.26% or Verizon VZ, -2.15% . Customers must provide their current wireless bill when signing up. It if is for $160 a month, they will pay $80 a month at Sprint.
2024-05-26T01:26:28.774034
https://example.com/article/6452
Democratic candidate Bernie Sanders is officially receiving protection from the U.S. Secret Service during his presidential campaign, CBS News has learned. The Department of Homeland Security (DHS) confirmed last week that it had received an official request from Sanders for protection. DHS Secretary Jeh Johnson authorizes protection in consultation with a congressional advisory committee that includes the top leadership in Congress. The criteria to receive protection developed by DHS and the congressional advisory committee require that a person have a publicly announced campaign, have "some degree of prominence" in opinion polls, be actively campaigning in at least 10 state primaries, and have received contributions totaling at least $10 million, among other things. Get Breaking News Delivered to Your Inbox In November, Johnson authorized Secret Service protection for GOP front-runner Donald Trump and former neurosurgeon Ben Carson. And Sanders' Democratic rival, Hillary Clinton, has received Secret Service protection since she was first lady. Sanders code name is not yet known. Trump's code name -- "mogul" -- is a tribute to his business empire. Carson, a Seventh-Day Adventist who has based much of his campaign on his religiosity, goes by "Eli," in reference to the Biblical prophet. Clinton is known as "Evergreen." This story has been updated to reflect that DHS, not the USSS, confirmed Sanders' request for protection last week and to clarify who sets the criteria for protection.
2024-03-30T01:26:28.774034
https://example.com/article/5254
Q: Codeigniter group_by and Order_by conflict I am currently working on a Codeigniter query where I attemt to get a bunch of results. However, when I use both group_by and order_by within the same query, the order_by gets overruled and does not apply for some reason. The query is the following: $this->db->select('q.questionNumber, qa.qaId')->from('questions q'); $this->db->join('questionAnswers qa', 'qa.questionId = q.questionId'); $this->db->where('customerId', $customerId); $this->db->order_by('q.questionNumber', 'desc'); $this->db->group_by('q.subject'); $query = $this->db->get(); $query->result(); A: use updated one $this->db->select('q.questionNumber, qa.qaId')->from('questions q'); $this->db->select_max('q.questionNumber' , 'questionNumber'); // added this $this->db->join('questionAnswers qa', 'qa.questionId = q.questionId'); $this->db->where('customerId', $customerId); $this->db->order_by('q.questionNumber', 'desc'); $this->db->group_by('q.subject'); $query = $this->db->get(); $query->result();
2023-09-15T01:26:28.774034
https://example.com/article/5566
// // NavigationAccessoryController.swift // Example // // Created by Mathias Claassen on 3/15/18. // Copyright © 2018 Xmartlabs. All rights reserved. // import Eureka class NavigationAccessoryController : FormViewController { var navigationOptionsBackup : RowNavigationOptions? override func viewDidLoad() { super.viewDidLoad() navigationOptions = RowNavigationOptions.Enabled.union(.SkipCanNotBecomeFirstResponderRow) navigationOptionsBackup = navigationOptions form = Section(header: "Settings", footer: "These settings change how the navigation accessory view behaves") <<< SwitchRow("set_none") { [weak self] in $0.title = "Navigation accessory view" $0.value = self?.navigationOptions != .Disabled }.onChange { [weak self] in if $0.value ?? false { self?.navigationOptions = self?.navigationOptionsBackup self?.form.rowBy(tag: "set_disabled")?.baseValue = self?.navigationOptions?.contains(.StopDisabledRow) self?.form.rowBy(tag: "set_skip")?.baseValue = self?.navigationOptions?.contains(.SkipCanNotBecomeFirstResponderRow) self?.form.rowBy(tag: "set_disabled")?.updateCell() self?.form.rowBy(tag: "set_skip")?.updateCell() } else { self?.navigationOptionsBackup = self?.navigationOptions self?.navigationOptions = .Disabled } } <<< CheckRow("set_disabled") { [weak self] in $0.title = "Stop at disabled row" $0.value = self?.navigationOptions?.contains(.StopDisabledRow) $0.hidden = "$set_none == false" // .Predicate(NSPredicate(format: "$set_none == false")) }.onChange { [weak self] row in if row.value ?? false { self?.navigationOptions = self?.navigationOptions?.union(.StopDisabledRow) } else{ self?.navigationOptions = self?.navigationOptions?.subtracting(.StopDisabledRow) } } <<< CheckRow("set_skip") { [weak self] in $0.title = "Skip non first responder view" $0.value = self?.navigationOptions?.contains(.SkipCanNotBecomeFirstResponderRow) $0.hidden = "$set_none == false" }.onChange { [weak self] row in if row.value ?? false { self?.navigationOptions = self?.navigationOptions?.union(.SkipCanNotBecomeFirstResponderRow) } else{ self?.navigationOptions = self?.navigationOptions?.subtracting(.SkipCanNotBecomeFirstResponderRow) } } +++ NameRow() { $0.title = "Your name:" } <<< PasswordRow() { $0.title = "Your password:" } +++ Section() <<< SegmentedRow<Emoji>() { $0.title = "Favourite food:" $0.options = [🐗, 🐖, 🐡, 🍐] } <<< PhoneRow() { $0.title = "Your phone number" } <<< URLRow() { $0.title = "Disabled" $0.disabled = true } <<< TextRow() { $0.title = "Your father's name"} <<< TextRow(){ $0.title = "Your mother's name"} } }
2023-08-22T01:26:28.774034
https://example.com/article/3704
.clearfix { *zoom: 1; } .clearfix:before, .clearfix:after { display: table; content: ""; line-height: 0; } .clearfix:after { clear: both; } /*! * FullCalendar v1.6.3 Stylesheet * Docs & License: http://arshaw.com/fullcalendar/ * (c) 2013 Adam Shaw */ .fc { direction: ltr; text-align: left; } .fc table { border-collapse: collapse; border-spacing: 0; } html .fc, .fc table { font-size: 1em; } .fc td, .fc th { padding: 0; vertical-align: top; } /* Header ------------------------------------------------------------------------*/ .fc-header td { white-space: nowrap; } .fc-header-left { width: 25%; text-align: left; } .fc-header-center { text-align: center; } .fc-header-right { width: 25%; text-align: right; } .fc-header-title { display: inline-block; vertical-align: top; } .fc-header-title h2 { margin-top: 0; white-space: nowrap; font-size: 16px; font-weight: 600; line-height: 25px; } .fc .fc-header-space { padding-left: 10px; } .fc-header .fc-button { margin-bottom: 1em; vertical-align: top; } /* buttons edges butting together */ .fc-header .fc-button { margin-right: -1px; } .fc-header .fc-corner-right, .fc-header .ui-corner-right { /* theme */ margin-right: 0; /* back to normal */ } /* button layering (for border precedence) */ .fc-header .fc-state-hover, .fc-header .ui-state-hover { z-index: 2; } .fc-header .fc-state-down { z-index: 3; } .fc-header .fc-state-active, .fc-header .ui-state-active { z-index: 4; } /* Content ------------------------------------------------------------------------*/ .fc-content { clear: both; zoom: 1; /* for IE7, gives accurate coordinates for [un]freezeContentHeight */ } .fc-view { width: 100%; overflow: hidden; } /* Cell Styles ------------------------------------------------------------------------*/ .fc-widget-header, .fc-widget-content { /* <td>, usually */ border: 1px solid #ddd; } .fc-state-highlight { /* <td> today cell */ /* TODO: add .fc-today to <th> */ background: #fcf8e3; } .fc-cell-overlay { /* semi-transparent rectangle while dragging */ background: #bce8f1; opacity: .3; filter: alpha(opacity=30); /* for IE */ } /* Buttons ------------------------------------------------------------------------*/ .fc-button { position: relative; display: inline-block; padding: 0 .6em; overflow: hidden; height: 1.9em; line-height: 1.9em; white-space: nowrap; cursor: pointer; } .fc-state-default { /* non-theme */ border: 1px solid; } .fc-state-default.fc-corner-left { /* non-theme */ } .fc-state-default.fc-corner-right { /* non-theme */ } /* Our default prev/next buttons use HTML entities like &lsaquo; &rsaquo; &laquo; &raquo; and we'll try to make them look good cross-browser. */ .fc-text-arrow { margin: 0 .1em; font-size: 2em; font-family: "Courier New", Courier, monospace; vertical-align: baseline; /* for IE7 */ } .fc-button-prev .fc-text-arrow, .fc-button-next .fc-text-arrow { /* for &lsaquo; &rsaquo; */ font-weight: bold; } /* icon (for jquery ui) */ .fc-button .fc-icon-wrap { position: relative; float: left; top: 50%; } .fc-button .ui-icon { position: relative; float: left; margin-top: -50%; *margin-top: 0; *top: -50%; } /* button states borrowed from twitter bootstrap (http://twitter.github.com/bootstrap/) */ .fc-state-default { background-color: #f3f3f3; font-weight: normal; color: #333333; font-size: 13px; cursor: pointer; border: 1px solid #d9d9d9; border: 1px solid rgba(0, 0, 0, 0.13); position: relative; padding: 0 8px; z-index: 1; -webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; -o-user-select: none; user-select: none; height: 27px; } .fc-state-hover, .fc-state-down, .fc-state-active, .fc-state-disabled { color: #333333; background-color: #f8f8f8; border-color: #d9d9d9; border-color: rgba(0, 0, 0, 0.13); } .fc-state-hover { color: #333333; background-color: #f8f8f8; border-color: #d9d9d9; border-color: rgba(0, 0, 0, 0.13); } .fc-state-down, .fc-state-active { background-color: #e6e6e6; border-color: #d9d9d9; border-color: rgba(0, 0, 0, 0.13); border-top: 1px solid #a6a6a6; } .fc-state-disabled { cursor: default; background-image: none; opacity: 0.65; filter: alpha(opacity=65); box-shadow: none; } /* Global Event Styles ------------------------------------------------------------------------*/ .fc-event-container > * { z-index: 8; } .fc-event-container > .ui-draggable-dragging, .fc-event-container > .ui-resizable-resizing { z-index: 9; } .fc-event { border: 0; padding: 2px; background-color: #3a87ad; /* default BACKGROUND color */ color: #fff; /* default TEXT color */ font-size: .85em; cursor: default; } a.fc-event { text-decoration: none; } a.fc-event:hover { color: #fff; } a.fc-event, .fc-event-draggable { cursor: pointer; } .fc-rtl .fc-event { text-align: right; } .fc-event-inner { width: 100%; height: 100%; overflow: hidden; } .fc-event-time, .fc-event-title { padding: 0 1px; } .fc .ui-resizable-handle { display: block; position: absolute; z-index: 99999; overflow: hidden; /* hacky spaces (IE6/7) */ font-size: 300%; /* */ line-height: 50%; /* */ } /* Horizontal Events ------------------------------------------------------------------------*/ .fc-event-hori { border-width: 1px 0; margin-bottom: 1px; } .fc-ltr .fc-event-hori.fc-event-start, .fc-rtl .fc-event-hori.fc-event-end { border-left-width: 1px; } .fc-ltr .fc-event-hori.fc-event-end, .fc-rtl .fc-event-hori.fc-event-start { border-right-width: 1px; } /* resizable */ .fc-event-hori .ui-resizable-e { top: 0 !important; /* importants override pre jquery ui 1.7 styles */ right: -3px !important; width: 7px !important; height: 100% !important; cursor: e-resize; } .fc-event-hori .ui-resizable-w { top: 0 !important; left: -3px !important; width: 7px !important; height: 100% !important; cursor: w-resize; } .fc-event-hori .ui-resizable-handle { _padding-bottom: 14px; /* IE6 had 0 height */ } /* Reusable Separate-border Table ------------------------------------------------------------*/ table.fc-border-separate { border-collapse: separate; } .fc-border-separate th, .fc-border-separate td { border-width: 1px 0 0 1px; } .fc-border-separate th.fc-last, .fc-border-separate td.fc-last { border-right-width: 1px; } .fc-border-separate tr.fc-last th, .fc-border-separate tr.fc-last td { border-bottom-width: 1px; } .fc-border-separate tbody tr.fc-first td, .fc-border-separate tbody tr.fc-first th { border-top-width: 0; } /* Month View, Basic Week View, Basic Day View ------------------------------------------------------------------------*/ .fc-grid th { text-align: center; } .fc .fc-week-number { width: 22px; text-align: center; } .fc .fc-week-number div { padding: 0 2px; } .fc-grid .fc-day-number { float: right; padding: 0 2px; } .fc-grid .fc-other-month .fc-day-number { opacity: 0.3; filter: alpha(opacity=30); /* for IE */ /* opacity with small font can sometimes look too faded might want to set the 'color' property instead making day-numbers bold also fixes the problem */ } .fc-grid .fc-day-content { clear: both; padding: 2px 2px 1px; /* distance between events and day edges */ } /* event styles */ .fc-grid .fc-event-time { font-weight: bold; } /* right-to-left */ .fc-rtl .fc-grid .fc-day-number { float: left; } .fc-rtl .fc-grid .fc-event-time { float: right; } /* Agenda Week View, Agenda Day View ------------------------------------------------------------------------*/ .fc-agenda table { border-collapse: separate; } .fc-agenda-days th { text-align: center; } .fc-agenda .fc-agenda-axis { width: 50px; padding: 0 4px; vertical-align: middle; text-align: right; white-space: nowrap; font-weight: normal; } .fc-agenda .fc-week-number { font-weight: bold; } .fc-agenda .fc-day-content { padding: 2px 2px 1px; } /* make axis border take precedence */ .fc-agenda-days .fc-agenda-axis { border-right-width: 1px; } .fc-agenda-days .fc-col0 { border-left-width: 0; } /* all-day area */ .fc-agenda-allday th { border-width: 0 1px; } .fc-agenda-allday .fc-day-content { min-height: 34px; /* TODO: doesnt work well in quirksmode */ _height: 34px; } /* divider (between all-day and slots) */ .fc-agenda-divider-inner { height: 2px; overflow: hidden; } .fc-widget-header .fc-agenda-divider-inner { background: #eee; } /* slot rows */ .fc-agenda-slots th { border-width: 1px 1px 0; } .fc-agenda-slots td { border-width: 1px 0 0; background: none; } .fc-agenda-slots td div { height: 20px; } .fc-agenda-slots tr.fc-slot0 th, .fc-agenda-slots tr.fc-slot0 td { border-top-width: 0; } .fc-agenda-slots tr.fc-minor th, .fc-agenda-slots tr.fc-minor td { border-top-style: dotted; } .fc-agenda-slots tr.fc-minor th.ui-widget-header { *border-top-style: solid; /* doesn't work with background in IE6/7 */ } /* Vertical Events ------------------------------------------------------------------------*/ .fc-event-vert { border-width: 0 1px; } .fc-event-vert.fc-event-start { border-top-width: 1px; } .fc-event-vert.fc-event-end { border-bottom-width: 1px; } .fc-event-vert .fc-event-time { white-space: nowrap; font-size: 10px; } .fc-event-vert .fc-event-inner { position: relative; z-index: 2; } .fc-event-vert .fc-event-bg { /* makes the event lighter w/ a semi-transparent overlay */ position: absolute; z-index: 1; top: 0; left: 0; width: 100%; height: 100%; background: #fff; opacity: .25; filter: alpha(opacity=25); } .fc .ui-draggable-dragging .fc-event-bg, .fc-select-helper .fc-event-bg { display: none\9; /* for IE6/7/8. nested opacity filters while dragging don't work */ } /* resizable */ .fc-event-vert .ui-resizable-s { bottom: 0 !important; /* importants override pre jquery ui 1.7 styles */ width: 100% !important; height: 8px !important; overflow: hidden !important; line-height: 8px !important; font-size: 11px !important; font-family: monospace; text-align: center; cursor: s-resize; } .fc-agenda .ui-resizable-resizing { /* TODO: better selector */ _overflow: hidden; }
2024-06-29T01:26:28.774034
https://example.com/article/3535
Q: How do I print from windows xp to printer on airport extreme? I've hooked up the printer to the USB port on my airport extreme basestation. I can successfully print to the printer from my Mac. When I read the AE manual on printing from windows xp, the instructions say, "Follow the on screen instructions to connect your printer." Of course there aren't any on screen instructions. Not sure what I'm suppose to do here. When I look for the printer on the network (from my winxp machine) it doesn't show up. I've followed these instructions with some success. http://tech.ifelix.net/1004.html However, sometimes the whole document will not print. It's pretty unreliable. I know I have the right driver on win xp. I have connected the printer directly to the winxp machine and I've printed that way. So its something with the network, bonjour, AE... Any suggestions on getting this working? A: If you have the printer on a static IP you can add a local printer and add a new TCP/IP port. Enter the IP of the printer and you should be printing. Disregard my previous answer. Have you installed Bonjour for Windows from the AirPort Utility CD on your Windows XP computer? If not you should do that first, then follow the instructions in Bonjour to add your printer. Specifically, page 60 in Designing AirPort Networks Using AirPort Utility
2024-03-13T01:26:28.774034
https://example.com/article/2713
Studies will be conducted to elucidate the developmental interrelationships of putative neurotransmitters in the rat brain. The metabolism of putative neurotransmitters will be altered at specific periods of neurochemical naturation during gestational or neonatal stages. This will be accomplished in three ways: (1) by placement of discrete lesions in the nuclei of origin of neurons containing dopamine, norepinephrine, serotonin, acetylcholine or gamma-amino butyric acid in 4, 10, 21 and 39 day old rats; 2) with the use of drugs (e.g., chlorpromazine, amphetamine, benztropine and apormorphine) that are known to act by altering the activity of neurons containing biogenic amines or their receptors and 3) by neonatal administration of 6-hydroxydopamine. The hypothesis that the manipulation of biochemical and morphological differentiation during gestational or neonatal stages of growth has long-lasting and permanent consequences on normal neurochemistry of brain will be tested.
2024-06-03T01:26:28.774034
https://example.com/article/7151
Hey, I'm pretty new to Java3D and what I want to do is have the ability for a player in my 3D FPS game be able to throw a ball at a given angle and given speed and then for the ball to bounce realistically off of the ground and the walls and eventually come to a stop. I have no idea where to begin with this but I know I'm going to need some physics and collision detection in there. Does anyone have any resources I could refer to for help with carrying out this task? Perhaps you know someone who has done it before with a guide on a website somewhere? I've tried googling but havn't really found much useful. You could try JOODE, it does all that kinda stuff for you. Docs a bit flimsy but it works the same as ODE (which has better documentation), plenty of test cases though in the repository. I could do with a user to force me to write some tutorials Have a look at the game physics forum. Runesketch: an Online CCG built on Google App Engine where players draw their cards and trade. Fight, draw or trade yourself to success. OK I think this might be more complicated than I initially thought, so I've decided to start with a simple ball bouncing up and down in the center of the scene. Putting the physics to one side for a moment, what would be the best way to animate such a bouncing ball? The first method that comes to mind is to simply calculate the ball's position every 5ms (say) based on the principles of physics in such a scenario (in this case mainly gravity), and every 5ms draw the ball in its new position. I don't really know much about animation in Java3D at the moment so would this be an OK method? If not, what better methods are there? The 'animation' of a moving ball is usually (if not always) done by calcuting the ball's new position every frame and drawing it at the appropriate position. I don't know anything about Java3D, but I'm pretty sure you wouldn't need anything special like a PositionInterpolator that you mentioned. Judging from your questions, you seem quite new to game programming in general (please forgive me if I'm wrong). Might I suggest to start with simple 2D games first? Implementing a small packman game would teach you most of the basics you'd also need for 3D and can be done in less than a week's time. Any 3d shooter would certainly cost you months or more likely years to finish, depending on how much you start with. You'd be suprised how incredibly complicated physics-systems can be, something like ODE (or the java port/rewrite JOODE) cost a number of people a few years to write. I'm not trying to discourage you though, but in this case it might be more educational and rewarding to start small. You're right when you say I'm new to game programming! Unfortunately I don't have the time to study 2D game programming as I'm doing this work as part of a project at university (with the deadline approaching quicker than I would like ) I understand the basic principle you have described for creating a simple falling ball but I can't figure out how to animate this in Java3D. Please see Code for Episode 1 at the following link: I had to create my own Behavior class; pretty simple once you know how, doh! Now I can start to think about having the ball fall from the sky and bounce in 1 dimension (Y-axis) to a stop. This of course means thinking about collision detection. I noticed one of the wakeup criteria is WakeupOnCollisionEntry - does anyone know if this can be used in this situation? So that the ball would fall and once it detected a collision with the ground the falling (downward) behavior would halt and the new upward behavior would begin... Use WakeupOnElapsedFrames(0) to run flat out and get a callback every frame. Use System.currentTimeMillis or System.nanoSomething to calculate the elapsed time between frames. Use this time with the physics. Ball position can be calculated as Don't think you can use WakeupOnCollisionEntry since you want to detect collision before collision. You can use the picking package for collision detection. Although any real collision detection would be complicated for a newbie. For a simple bouncing ball you could just check the bally and set velocity sign. Well, I wouldn't say that collision detection is necessarily too complicated for a NOB depending on their mathmatical knowledge (for instance, 3 variable calculus is much more complex then collision detection). Anyways, here is a good site that goes through how collision detection and avoidance works in java 3d Oh gosh, with moving balls you use basic vector maths. You do not check every frame, it's just not the "proper" way to do it ... you basically rotate the line by the movement vector (using the UVN rotation system, then it's all easy from there. Check if the point of collision is within the movement of the circle - this will check to see if the circle moved through the line. Then transform your line into a fat line, the circles into points, and do a simple check to see whether the points are within the fat line; so pm me if I don't provide you with a solution within 36 hours of this post. java-gaming.org is not responsible for the content posted by its members, including references to external websites, and other references that may or may not have a relation with our primarily gaming and game production oriented community. inquiries and complaints can be sent via email to the info‑account of the company managing the website of java‑gaming.org
2023-11-20T01:26:28.774034
https://example.com/article/6236
Goran Dragic reportedly feels better about his situation with Phoenix now than he did during the 2013/14 campaign, but he admits that there’s no guarantee he’ll return to the Suns once he becomes a free agent this summer, as he tells Jonathan Feigen of the Houston Chronicle. “Every team in the NBA is an option to me, because it is a privilege to play for any team in the NBA,” Dragic said. “When the time comes I’m going to sit down with my family and my agent and try to make the best decision for myself.” We’ll round up more from around the NBA below: Hassan Whiteside is opening eyes with the Heat, having posted a triple-double today with 14 points, 13 boards, and 12 blocks. The Knicks had some interest in the big man last year but eventually signed Lamar Odom instead, tweets Ian Begley of ESPNNewYork. Metta World Peace‘s stint in China has come to an end, as the veteran forward passed along on Twitter. The Clippers were rumored to have interest in inking World Peace to a late season deal. Kobe Bryant spoke and said he would be a major part of the Lakers’ recruiting efforts this upcoming summer, observes Michael Lee of the Washington Post. “It’s a pretty simple message. It’s the best organization in the world, best brand in the world,” Bryant said of the Lakers. “We win championships. That’s what we do. It would be much more than … X’s and O’s and style of play, things of that nature. There’s no place like winning in Los Angeles, man.”
2024-07-11T01:26:28.774034
https://example.com/article/4255
Acyltransferases for secreted signalling proteins (Review). Members of the MBOAT family of multispanning transmembrane enzymes catalyze the acylation of important secreted signalling proteins of the Hedgehog, Wg/Wnt and ghrelin families. Acylation of these substrates occurs during transport through the secretory pathway and plays key roles in their biological activity and spread from producing cells, contributing to the formation of appropriate extracellular concentration gradients. Characterization of these enzymes could lead to their identification as therapeutic targets for diverse human diseases such as cancers, obesity and diabetes.
2023-10-23T01:26:28.774034
https://example.com/article/3132
“Pretty Knowledge” (2012), is a dual-channel video work which takes after a segment of a video, popular on the internet, of a certain French seer who relates his predictions for the future. In one, he directly uses the video documentation of this “seer” predicting various major events due to happen after 1980; in the other video, myself plays the role of this seer and re-enacts his predictions with an imitation French, mimicking his French intonation and body language.
2024-06-08T01:26:28.774034
https://example.com/article/8529
Isolation of amino-terminal fragment of lactose repressor necessary for DNA binding. lac repressor can be dissected by trypsin into a homogenous tetrameric core (accounting for residues 60 to 347), carrying inducer binding activity, and the monomeric amino-terminal peptides ("headpieces") accounting for residues 1 to 59 and 1 to 51, respectively. This restriction of the action of trypsin on lac repressor is obtained in 1 M Tris-HCl (pH 7.5)-30% in glycerol at 25 degrees C since only the peptide bonds at lysine-59 and to a lesser extent after at arginine-51 are cleaved under these conditions. The headpieces can be purified by gel filtration. They have ordered secondary structure as revealed by circular dichroism studies. The monomeric headpieces show the relatively weak binding to nonoperator DNA but not the highly specific and strong binding to operator DNA typical for tetrameric lac repressor.
2023-09-18T01:26:28.774034
https://example.com/article/2231
Zuma hurt over Nkandla scrutiny 16 November | 07:45 By Gaye Davis Cape Town - President Jacob Zuma says he has been “convicted, painted black called the first-class corrupt man on facts that are not tested” over the spending of more than R200 million in public funds on his private Nkandla home. “I have never asked government to build a home for me, and it has not done so,” he said in Parliament on Thursday. “My residence in Nkandla has been paid for by the Zuma family. All the buildings and every room we use in that residence, was built by ourselves as family and not by government.” But Zuma’s explanation did not convince DA parliamentary leader Lindiwe Mazibuko, who challenged the president’s insistence that he could answer questions only about his private home and not the government’s spending on security features. “The fact that the government is spending R250m to upgrade, not a presidential house, but the president’s own house, built by himself, his own private residence, not a state residence, this is what is at issue today,” Mazibuko said. She cited reports listing improvements as including 31 new buildings, six of which cost R8m each; R2.3m for lifts “to carry the honourable president to his underground bunker”; air conditioning systems at a cost of R1.5m; as well as a visitors’ centre, gymnasium and guest rooms. “Are these security enhancements?” she asked. “The government does not have the responsibility to upgrade, at a cost of R250m, the president’s private home.” Zuma said that after he became president he had been approached by the government to “allow” enhanced security measures in terms of the National Key Points Act – including houses built beyond the perimeter of the property for security staff, fencing, bulletproof windows and a bunker. He did not know the amount spent on the security upgrade, but doubted it could be as much as what’s been reported. Zuma said he supported the investigations under way, including an audit of all the government’s classified prestige projects, a task team appointed by Public Works Minister Thulas Nxesi and Public Protector Thuli Madonsela. “I want everybody to be clear because you have made this country to believe that the government has built a home for me, it is not true,” Zuma said. He said he was still paying off a bond on extensions to his home begun with his extended family when he became president. When the government told him of the need for additional security, he had referred the Department of Public Works to the contractors who were busy on the property already. Zuma said Mazibuko was basing her question on inaccurate information. “She is giving a huge number of houses I have nothing to do with.” He had paid for five additional houses. Asked by DA MP Anchen Dreyer if he would commit to giving the correct figures spent by the Department of Public Works as well as a breakdown of the items on which it had been spent, Zuma said: “If the honourable member thinks that I must now do the book counting of a department and count figures, I think it’s demanding too much. “I don’t know the figures, that’s not my job.” Mazibuko said afterwards that instead of using “an opportunity to come clean”, Zuma had “decided to play the victim” and tried to make the opposition “feel guilty for holding him accountable”. “He failed to clarify how spending R250m of public money on security is justified. He further pointed the finger at other government departments for the security expenses, claiming that they insisted on them. If the president can be so easily instructed by his own cabinet ministers, then he clearly is unfit to lead the country,” she said. He should provide Parliament “without any delay” all the details and documents about the expenses of the project. “But he won’t, because he knows that he cannot defend spending R250m of South Africans’ money on himself,” she said. – Additional reporting by Craig Dodds
2023-12-21T01:26:28.774034
https://example.com/article/7613
Q: How to replace character "." to "," on keyboard when focus on Entry Field on Xamarin Forms (iOS)? How to replace character "," to "." on keyboard when focus on Entry Field on Xamarin Forms? I find way replace "Next" to "Done" on keyboard. Change return to be next/done key in Xamarin Forms Shared Project Don't know that can replace "," to "." when focus Entry (with display keyboard is "Numeric"): Image If you know it on Android and iOS, you can help me! Please help me! Tks! A: You don't need to go through this stress at all. Since you have the keyboard changed to numeric, simply let the OS determine the layout. Now when you get the Entry.Text, simply replace the occurrences of (,) to (.). To make it real-time, do this in the Entry.TextChanged Event. Entry.Text?.Replace(',', '.'); Hope this helps.
2024-03-13T01:26:28.774034
https://example.com/article/8480
<?xml version="1.0" encoding="utf-8"?> <style xmlns="http://purl.org/net/xbiblio/csl" version="1.0" default-locale="en-US"> <!-- Elsevier, generated from "elsevier" metadata at https://github.com/citation-style-language/journals --> <info> <title>Sport Management Review</title> <id>http://www.zotero.org/styles/sport-management-review</id> <link href="http://www.zotero.org/styles/sport-management-review" rel="self"/> <link href="http://www.zotero.org/styles/apa" rel="independent-parent"/> <category citation-format="author-date"/> <issn>1441-3523</issn> <updated>2018-02-16T12:00:00+00:00</updated> <rights license="http://creativecommons.org/licenses/by-sa/3.0/">This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 License</rights> </info> </style>
2024-02-27T01:26:28.774034
https://example.com/article/8223
Spray 9×13 baking dish with cooking spray, preheat oven to 375. Place 3 tortilla side by side and cover with half of the mixture. Add 3 more tortillas over that and cover with the other half of the mixture. Pour taco sauce over top and sprinkle on the remaining cheese. Bake for 20 minutes or until cheese is melty and everything else is heated through and is bubbly.
2023-08-29T01:26:28.774034
https://example.com/article/2575
29 Ideal Diy Corner Bookcase for Your New Living Room Diy corner bookcase 29 Ideal Diy Corner Bookcase for Your New Living Room – Are you looking for inspirations to build living room for your house, especially about diy corner bookcase? If so, Here we collected a lot of pictures about living room including its interior decor, plan, accessories, furnitures, etc. You may spend a lot of time on your living room, so besides it is looking nice, it also working great and feel comfort. Here are inspiring collection of diy corner bookcase for your insights to living room decorating. There are much styles and options you can choose for your living room, classic style, modern style, vintage style with rustic decor, minimalist style for small living room, etc. Many things need to consider for remodeling your living room including for diy corner bookcase. If you need further informations, you can ask opinions from your family member or friends or searching on internet related to diy corner bookcase or you can going to your local home improvement and asking with the expert. Smartest diy corner bookcase with built in corner bookcase. Here we have collection of coolest high quality images about diy corner bookcase that can help you creating your home decorating. If you love the ideas about diy corner bookcase, it is awesome to spread these ideas with your friends, family, or colleagues. Pictures Gallery of 29 Ideal Diy Corner Bookcase for Your New Living Room
2024-02-28T01:26:28.774034
https://example.com/article/6149
Ok ATS.. Fess-Up.. Who is Secretly Crapping Their Pants about 21/12/12??? I thought the same until the two people came up wanting to come to my house that day. I think people might be too embarrassed to admit they think that. It's like believing in UFOs, more people believe that than you realize. I expected ATS to have more threads on it, saying stuff like solar flares, galactic alignments etc are going on. I suppose if there are any I would miss them because Phage comes along debunking all the theories and the threads fizzle out. I was one to look at people "in the know" about this type of thing. I decided to look at the white house public schedule and guess what? As of 12-20-12 it is open yet very full up to that date............ Then I started to think "Where is Hillary"..............? I personally was not worried about the 2012 conspiracy, but when my local news station reported there will be 18 inches of snow starting on 12.20.12 and ending sometime of 12.22.12. it gets you thinking. They said its the biggest blizzard in 80 years, and we havent seen a single flake of snow this whole winter, so this blizzard is pretty random Its like I said the other day, those that believe and have a bad feeling that something is going to happen, they try and stay quiet. If you don't remain quiet then people think you are a nut case. The problem is that people are saying that someone is making money off all of this. I would love to know who figuring that even the Hindu people had the date 12/21/12, The Chinese people had the same date, The Mayans the same date, The Hopi prophecies are the same, and so many other Indian cultures are the same. How can so many cultures all be wrong? Yet none of them thought they would make a profit off all of this when they made the prophecies? So then who exactly will make a prophet? No one will. Then we have web bot, and time wave zero both showing the end of society being for the 21st, and no society past that point. Guess what if they are wrong their reputations are at stake and people would never listen to them again, so even they wont make money off this. If anything and they are wrong then they would lose face, and followers. Then we have to realize how many Indian nations believe in what is going to happen and have even moved into caves already and into the wilderness. Can they all be wrong? I think not. No one said that life will all die, in fact even the Hopi prophecy showed people still going that made the right choices. Some will survive, but if you also looked into the Hopi prophecy and others you would realize that many state that people will die with fear. Even Nuns have seen what is coming and told about how people were not suppose to go outside. I plan on digging in for my 3 days. No way am I going outside. Something is moving many of us to tell us that something is coming, and we need to be ready. For those that want to laugh, laugh away. Just remember many laughed at Noah and they all died. the mayans never claimed there was a doomsday. that is all from people trying to shill books, vids, canned food, bunkers, potions and snake oil. the mayans claimed it was the end of an age of man, and the dawn of a new age(the fifth IIRC?). there would be chaos and confusion as the old orders and ways died or faded away, and the birth pangs of the new take place. The most socially damaging part about this is that so many people are aware of the date and are putting a lot of their energy into an ideology that is unpredictable and yet self fulfilling. We can take whatever we will internally anytime we choose to if we focus so much into something. You're all brainwashing yourselves. It's really amazing. Everything is. I can't say I'm worried about our world ending. But I'll tell you what I am feeling... Anxious. There are over 7 billion people on this planet and I'm quite sure 3/4 of it have heard about 12/21/2012. Now out of those 5 billion people, how many are crazy enough to commit murder suicides, suicide or start riots etc... I'm thankful I live in a small city where it is very unlikely to affect me, but you can bet your a$$ my face face will be glued to the tv ALL day Got a horrible cold and ear/throat infection and today the Dr. wrote me a note to be off of work until the 26th. I don't subscribe to the 12/21/2012 hype but nevertheless now instead of being at work I'll be chilling at my girlfriends place to help keep her and our cats safe in case some wacko's start causing crap here in the city. TV is going to be amusing that day, that's for sure. edit on 19-12-2012 by Armadall because: didn't know a swear would be edited As I've already posted here, I've been pretty calm about all this...or so I thought. But then, on my way home tonight, cell service went out with a very weird automated message I've never heard before, and then almost immediately thereafter, the tornado siren went off not once but twice. Oh, and there were black persistant contrails in the sky in the shapes of crosses. At that point I really started to Why GMT ? The Mayans were in the central standard time zone. How did America get to be the star of the show when the original players were from South America ? That doesnt sound fishy to some? Karen, what planet are you on? GMT is Greenwich Mean Time in London, England. The Central Time Zone is right smack dab in the middle of America. Further, the Mayans were in NORTH America, same as us, not South America, specifically the Yucatan Peninsula. I know it's popular to bash the US, but please do avail yourself of a map. You really blew it big time. The ones wanting to profit might have been the same ones who brought it all to our attention. I thought at one point it was Sony that started up a 2012 website getting it all going, until NASA stepped in to say it isn't so. They were promoting the 2012 movie, well in advance if it's release. Scaring enough people with this mayan calendar so they would go see the movie. I don't think the site made it known it was affiliated with Sony. Other sources popping up could also have been in cahoots with Sony. ETA at that time in 2009 there was no ads for the DVD. On this Sony site edit on 19-12-2012 by violet because: (no reason given) Sony Pictures set up a website for an organisation called the Institute for Human Continuity which predicts a cataclysmic denouement for Earth three years from now. It suggests that “after two decades of rigorous research from the world’s top astronomers, mathematicians, geologists, physicists, engineers, futurists, we know that in 2012 a series of cataclysmic forces will wreak havoc on our planet”. It even details how elections have begun for the leader of the post-2102 world, offers survival kits and asks people to sign up to a lottery to be saved. In fact, the website is a vehicle for promoting 2012 — a disaster movie about the end of the world based on predictions in the Mayan calendar. So those that are worried are keeping it to themselves then... What, are we all still collectively embarrassed about how we reacted to Y2K?? I dunno, I was always and still am more on the 2012 side of the fence than not (lol yea even the Wednesday before), yet I still can't see how whatever it is could go from 0 to 60 in 6 second (or 24 hours). Even if the drama of 2012 takes years to play out I still feel like it should have already noticably and officially started in a way that few would be able to deny. I am secretly worried. I don't think any cosmic doom is on it's way, but I'm worried about TPTB or some crazy group or person using that day as an excuse to inflict mass harm- now that it's become so popular from being heavily promoted by hollywood and the media. I've been worried about 2012 since before 2000. So this date has been on my mind for nearly half my life. It's kind of hard to ignore now that it's finally here. I just hope no one does anything crazy that day. Most people are still disturbed from last friday's events as it is. I have absolutely no concern whatsoever. It will be any other day. There is no celestial body that's going to have an effect...if there was, we would of known and gradually would of seen things get bad...not all of a sudden. War and disease is possible...sure but its just not very likely in 2 days time. We are but such a small fraction of time in the history and life of this planet, solar system and universe so its kind of a long shot for us in 2 days to be involved with any big space event. We may certainly blow ourselves up or ruin the economy in 2 days but even that has somewhat of a "ramp up" effect. I'll be looking forward to hearing all the excuses on the 22nd as to why nothing happened. 1) The palpable anxiety and tension surrounding the date, and the possibility of this triggering of fueling more events like we saw in CT, where already unhinged individuals may go over the edge and commit acts of violence against themselves or others. And 2) The potential disillusionment, depression (already a problem in Winter for many,) stress, and hopelessness many may feel if nothing happened after placing their faith in the myriad ideologies surrounding this date. I never have and never will assert that nothing will happen, because I cannot predict the future. But I am admittedly more concerned by those potential scenarios than anything else. This content community relies on user-generated content from our member contributors. The opinions of our members are not those of site ownership who maintains strict editorial agnosticism and simply provides a collaborative venue for free expression.
2024-05-16T01:26:28.774034
https://example.com/article/5317
Q: Detecting pinch/zoom in IE10 without preventing default behavior In Javascript, I'm trying to detect when the user is pinching, and at the same time allow them to do so. var elm = $("#wrapper")[0]; var myGesture = new MSGesture(); myGesture.target = elm; elm.addEventListener("MSGestureChange", handleGesture); elm.addEventListener("MSPointerDown", function (e) { myGesture.addPointer(e.pointerId); }); I'm getting the MSPointerDown event. But as far as I can tell, I'm required to style the element in question (#wrapper) with -ms-touch-action: none (or pan-y pan-x) to be able to recieve the MSGestureChange event when pinching. I don't want to prevent the default pinch behavior, so what are my options? Is there a way around this, or am I stuck doing one or the other? A: You can detect zoom changes by checking the ratios of a few window/document/screen variables - see http://jsbin.com/abuzaz/8 Detect zoom changes by registering events on the window onscroll and onresize events. If you are worried about a resize or scroll event getting "lost" (it can happen) then an ugly solution could be to also register a slow interval timer to double check. You can detect the current pinch-zoom level by looking at the ratio of the document.documentElement.offsetHeight to the window.innerHeight - but this might be due to bugs/quirks (see below!). You can detect the page zoom (ctrl-+) level by looking at changes to the screen.deviceXDPI in the onresize event. For more fun, have a play with the green box on http://jsbin.com/otocer/12 - touch one finger then the other and you get a MSPointerCancel event when the second finger touches. But touch both at the same time and you get no event. You often get a window scroll event when touch-zooming, but I am unsure you can depend 100% on it. It seems you get a window resize event at the end of touch-zooming (but maybe not always - see http://social.msdn.microsoft.com/Forums/en-US/iewebdevelopment/thread/1065f624-32a8-4c80-8ced-998ba624763e)- try http://jsbin.com/otocer/17 Note that touch-zooming (not page zoom) has some big bugs: body scrollbars are totally wrong if body size changed after pinch-zoom - see http://jsbin.com/abuzaz/1 - or see http://connect.microsoft.com/IE/feedback/details/779009/ie10-pinch-zoom-doesnt-adjust-scrollable-area-size-after-body-size-is-changed position:fixed is wierd - see http://jsbin.com/iciqaf/1 (pink fixed position box can go off viewport if pinch-zoomed then scrolled). using CSS html { -ms-touch-action: pan-x pan-y; } disables pinch-to-zoom, but can make the page text unreadably small (depending on device, configuration, and page size), and I couldn't see that -ms-viewport would fix that.
2024-06-06T01:26:28.774034
https://example.com/article/6525
People v Pierre (2020 NY Slip Op 03986) People v Pierre 2020 NY Slip Op 03986 Decided on July 16, 2020 Appellate Division, First Department Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431. This opinion is uncorrected and subject to revision before publication in the Official Reports. Decided on July 16, 2020 Gische, J.P., Kapnick, Webber, Kern, González, JJ. 11824 1974/16 [*1] The People of the State of New York, Respondent, vMatthew Pierre, Defendant-Appellant. Robert S. Dean, Center for Appellate Litigation, New York (Steven Benathen of counsel), for appellant. Cyrus R. Vance, Jr., District Attorney, New York (Rebecca Hausner of counsel), for respondent. Judgment, Supreme Court, New York County (Robert M. Mandelbaum, J.), rendered July 16, 2018, convicting defendant, after a jury trial, of assault in the second degree, criminal mischief in the third degree and auto stripping in the third degree, and sentencing him, as a second felony offender, to an aggregate term of 9 to 11 years, unanimously affirmed. The court providently exercised its discretion when it modified its Sandoval ruling after defendant's direct testimony, finding that his testimony that he was "not [] a trouble maker" opened the door to limited inquiry regarding two prior assault convictions (see e.g. People v Feliciano, 133 AD3d 469 [1st Dept 2015], lv denied 27 NY3d 1150 [2016]). However, the court erroneously determined, and instructed the jury, that evidence of the two prior convictions could be considered as affirmative evidence of guilt, relevant to the charged mental state and the validity of defendant's justification defense (see People v Bradley, 20 NY3d 128, 133-34 [2012]). In that context, the evidence at issue cannot be differentiated from propensity evidence. Nevertheless, any error in either the Sandoval or Molineux aspects of the court's rulings was harmless (see People v Crimmins, 36 NY2d 230 [1975]). There was overwhelming evidence that defendant brutally attacked an elderly tourist and damaged a bus, and there is no reasonable possibility that the jury would have accepted his incredible testimony (see People v Hall, 18 NY3d 122, 132 [2011] [considering defendant's "ridiculous explanation" in harmless error analysis]). Defendant did not preserve his challenge to a remark by the prosecutor in summation, and we decline to review it in the interest of justice. As an alternative holding, we find that this isolated use of disapproved language (see People v Jones, 125 AD3d 403, 406 [1st Dept 2015]) was not so egregious as to require reversal, and that the error was harmless. Defendant's related ineffective assistance of counsel claim is unavailing, because he has not established that his counsel's lack of objection was unreasonable or prejudicial (see People v Benevento, 91 NY2d 708, 713-714 [1998]; Strickland v Washington, 466 US 668 [1984]). We perceive no basis for reducing the sentence. THIS CONSTITUTES THE DECISION AND ORDER OF THE SUPREME COURT, APPELLATE DIVISION, FIRST DEPARTMENT. ENTERED: JULY 16, 2020 CLERK
2024-04-01T01:26:28.774034
https://example.com/article/2699
…just toasting and ruminating…. To any soldier SNAFU is almost always the order of the day. In war situations things can unravel so fast that no planner can afford to ignore the need for flexibility. So when in Basra in 2005 an SAS undercover operation went wrong and two men were captured and held as hostages by pro Sadrist police and militiamen the regiment immediately prepared to mount a rescue mission. The fear was that unless they acted swiftly the soldiers would be smuggled into Iran and paraded in public as part of a humiliating propaganda coup for the Mullahs. With the troops all ready to hit the ground running word suddenly came down the line from the UK government in London – no rescue must be attempted as it would give the lie to Whitehall’s claims that Basra was under control. The men had to be sacrificed to save the face of the politicians. The reaction was swift and stark – the SAS ignored London and rescued their colleagues with clinical precision. Belatedly London changed tack and approved the mission (when it was already well under way) having realised that many members of the elite regiment were willing to mutiny and then hand in their resignations in disgust after the rescue had been completed. So men’s lives could have been risked for the sake of a feelgood PR puff fed to the BBC.
2024-05-30T01:26:28.774034
https://example.com/article/5041
THE STATE EX REL. COLLINS, APPELLANT, v. LEONARD, WARDEN, APPELLEE. [Cite as State ex rel. Collins v. Leonard (1997), ___ Ohio St.3d ___.] Criminal law — Failure to comply with R.C. 2945.06 may be remedied only in a direct appeal from a criminal conviction — Claimed violation of R.C. 2945.06 is not the proper subject for habeas corpus relief. (No. 97-1351 — Submitted December 3, 1997 — Decided December 31, 1997.) APPEAL from the Court of Appeals for Allen County, No. 1-97-27. In 1977, a three-judge panel of the Auglaize County Court of Common Pleas convicted appellant, Robert Collins, of aggravated murder and sentenced him to prison “for the rest of his natural life * * *.” In 1997, Collins filed a petition in the Court of Appeals for Allen County for a writ of habeas corpus to compel appellee, Allen Correctional Institution Warden Michael A. Leonard, to release him from prison. Collins claimed that the common pleas court lacked jurisdiction to convict him of aggravated murder and sentence him to life in prison because the court failed to comply with R.C. 2945.06’s requirement that the three- judge panel examine the witnesses when an accused charged with an offense punishable with death pleads guilty to aggravated murder. The court of appeals dismissed the petition because Collins had an adequate remedy in the ordinary course of the law to raise his allegations. This cause is now before the court upon an appeal as of right. __________________ Robert E. Collins, pro se. Betty D. Montgomery, Attorney General, and Donald Gary Keyser, Assistant Attorney General, for appellee. __________________ Per Curiam. Collins asserts in his propositions of law that the court of appeals erred in dismissing his habeas corpus petition because his trial court lacked jurisdiction to convict and sentence him after it failed to comply with R.C. 2945.06. R.C. 2945.06 specifies certain requirements “[i]n any case in which a defendant waives his right to trial by jury and elects to be tried by the court under section 2945.05 of the Revised Code.” R.C. 2945.05 and 2945.06 must consequently be construed in pari materia. See, e.g., State ex rel. Larkins v. Baker (1995), 73 Ohio St.3d 658, 659-660, 653 N.E.2d 701, 703. We hold that an alleged violation of R.C. 2945.06 is not a proper subject for habeas corpus relief and may be remedied only in a direct appeal from a criminal conviction. See, e.g., Jackson v. Rose (1997), 79 Ohio St.3d 51, 679 N.E.2d 684; State v. Pless (1996), 74 Ohio St.3d 333, 658 N.E.2d 766, paragraph two of the syllabus; see, also, State v. Post (1987), 32 Ohio St.3d 380, 393, 513 N.E.2d 754, 767, where we addressed a claimed violation of R.C. 2945.06 in a direct appeal from a criminal conviction. In addition, we have never held that the failure to comply with the R.C. 2945.06 witness-examination requirement is a jurisdictional defect. Cf. Pless. Based on the foregoing, the court of appeals properly dismissed the petition. Accordingly, we affirm the judgment of the court of appeals. Judgment affirmed. MOYER, C.J., DOUGLAS, RESNICK, F.E. SWEENEY, PFEIFER, COOK and LUNDBERG STRATTON, JJ., concur. 2
2024-01-17T01:26:28.774034
https://example.com/article/6190
Q: Does Stack Exchange use caching and if so, how? Recently, I read this Stack Overflow blog post about how they have some of their infrastructure laid out. I was curious to know, does Stack Exchange use caching (both at the application layer and/or database layer) and if so, how? A: Oh boy, have I been waiting for somebody to ask something like this. We really aggressively cache... basically everything. Virtually all pages accessed by (and subsequently served to) anonymous users are cached, whole cloth, via Output Caching. This isn't terribly interesting, but it is terribly fast, though we've recently removed Output Caching from a small number of routes. Perhaps more interesting, we use Redis as a caching layer for the entire network. Kyle recently mentioned the specs of the machine in passing. Prior to the NY move our Redis instance was in a virtual machine on a (lightly loaded) web tier machine. In our (admittedly limited) experience, Redis is so fast that the slowest part of a cache lookup is the time spent reading and writing bytes to the network. This is not surprising, really, if you think about it. We compensate for this in two ways: We keep a "L1" cache (basically, HttpRuntime.Cache) of recently set/read values on a server Naturally, the fastest # of bytes to send across a network is 0. We compress values* before sending them to Redis Most of our cached values are strings, so even at low CPU usage we get great compression ratios We also have plenty of CPU time to spare on the web tier, especially in the NY datacenter. We've gotten a little smarter and only compress things that actually get smaller compressed (which requires some calisthenics when reading keys), and .NET 4.5's GZip implementation is a lot better Conceptually, each site has 3 distinct caches: A "local cache," which can only be accessed from 1 server/site pair Contains things like user sessions, and pending view count updates This resides purely in memory, no network or DB access A "site cache," which can be accessed by any instance (on any server) of a single site Most cached values go here, things like hot question id lists and user acceptance rates are good examples This resides in Redis (in a distinct DB, purely for easier debugging) A "global cache," which is shared amongst all sites and servers Inboxes, API usage quotas, and a few other truly global things live here This resides in Redis (in DB 0, likewise for easier debugging) We do our best to avoid cache invalidation, thus most things in the cache merely expire and are never explicitly removed. However, for those rare cases where removal is necessary we use Redis messaging to publish removal notices** (only to those sites that care, for scaling's sake). Some quick stats: At any one point time we have around 1,300,000 keys in our Redis cache Most of these expire on the order of a few minutes This number has been growing as we've become more confident in Redis Around peak time we're getting a few hundred read/writes a second to Redis This is well below the benchmarks out there CPU usage on our (way overkill, it turns out) dedicated Redis machine is essentially 0%, all the time Like, really, all the time After a few months of growth, we're seeing peaks of 0.5% cpu usage After a lot longer, we're seeing about 1% cpu usage Memory usage stays south of 1/2 a GB has grown to just shy of 8 GB is now around 6 GB Not surprising, as we're mostly storing sets of integers and compressed strings. We've also started storing much bigger things in Redis, like inboxes. Newer Redis releases have saved some space, and we've slimmed down some common keys *Still, for some common use cases the largest part of a Redis command is the key name. One of these days I'm going to find some time to experiment with compressing the entire command stream, and see what kind of performance gains can be made. **These removals are necessary to invalidate the "L1 Cache," Redis naturally keeps itself in a coherent state in the face of removals.
2024-06-03T01:26:28.774034
https://example.com/article/1969
Machine recognition and representation of neonatal facial displays of acute pain. It has been reported in medical literature that health care professionals have difficulty distinguishing a newborn's facial expressions of pain from facial reactions to other stimuli. Although a number of pain instruments have been developed to assist health professionals, studies demonstrate that health professionals are not entirely impartial in their assessment of pain and fail to capitalize on all the information exhibited in a newborn's facial displays. This study tackles these problems by applying three different state-of-the-art face classification techniques to the task of distinguishing a newborn's facial expressions of pain. The facial expressions of 26 neonates between the ages of 18 h and 3 days old were photographed experiencing the pain of a heel lance and a variety of stressors, including transport from one crib to another (a disturbance that can provoke crying that is not in response to pain), an air stimulus on the nose, and friction on the external lateral surface of the heel. Three face classification techniques, principal component analysis (PCA), linear discriminant analysis (LDA), and support vector machine (SVM), were used to classify the faces. In our experiments, the best recognition rates of pain versus nonpain (88.00%), pain versus rest (94.62%), pain versus cry (80.00%), pain versus air puff (83.33%), and pain versus friction (93.00%) were obtained from an SVM with a polynomial kernel of degree 3. The SVM outperformed two commonly used methods in face classification: PCA and LDA, each using the L1 distance metric. The results of this study indicate that the application of face classification techniques in pain assessment and management is a promising area of investigation.
2024-05-06T01:26:28.774034
https://example.com/article/8325
Description: The new expansion Hearts of Iron III: Their Finest Hour will improve many areas of the game. Expanded espionage system with new and reworked missions including new covert operations that can be performed on the map and new battle plans mode where you can load historical plans, draw your own and share with allies in real-time during multiplayer.Features: New unique elite units for each major nation’s army – Ghurkhas, Rangers, Imperial guards etc. Deeper naval invasions system with the possibility of developing specialized landing and assault crafts to improve effectiveness. More detailed control over strategic warfare and a generalized lend-lease system for lending your industrial might to allies. Leaders are now able to gain traits and allocating them is more important than ever with a new combat tactics system. A new custom game mode for single and multiplayer where you start with a clean slate and can instantly produce units, research technologies and affect political alignment, speeding up the early years for those who would like to jump straight into the action. Two new detailed battle scenarios, the Finish Winter War and the Spanish Civil War
2023-10-24T01:26:28.774034
https://example.com/article/6717
122 Ga. App. 752 (1970) 178 S.E.2d 748 DODSON v. PHAGAN. 45464. Court of Appeals of Georgia. Argued July 6, 1970. Decided October 7, 1970. Rehearing Denied November 5, 1970. Smith, Crisp & Hargrove, William E. Smith, for appellant. Telford, Wayne & Stewart, J. Douglas Stewart, Smith & Smith, C. E. Smith, Jr., for appellee. BELL, Chief Judge. 1. The motion to dismiss the appeal is denied. 2. In denying a motion to dismiss plaintiff's complaint, matters outside the pleadings were considered and the trial court treated it as a motion for summary judgment. Code Ann. § 81A-112 (c). No certificate of review was issued and the case proceeded to trial and judgment. Defendant now on appeal enumerates as error the denial of his motion for summary judgment. An order denying summary judgment is not subject to review by direct appeal or otherwise in the absence of a certificate for review by the trial judge within 10 days of the order. Code Ann. § 81A-156 (h); John L. Hutcheson &c. Hospital v. Oliver, 120 Ga. App. 547 (2) (171 SE2d 649). 3. In this action for breach of an oral contract, one of the issues raised concerns an application of the parol-evidence rule. Plaintiff conveyed to his daughter and grandson, the defendants, certain real estate, reserving a life estate for himself and wife. The deed recited the consideration as natural love and affection. At trial plaintiff and others were allowed to testify that the consideration for the deed was the defendant daughter's promise to pay the expenses of the last illness and burial of plaintiff and his wife. This testimony was admissible as the consideration having been expressed merely by way of recital in the deed, parol evidence is admissible to show that the real consideration is different from that expressed. Cottle v. Tomlinson, 192 Ga. 704 (4) (16 SE2d 555). The Supreme Court held in Thompson v. Cody, 100 Ga. 771 (3) (28 SE 669) and Farrar Lumber Co. v. Brindle, 170 Ga. 37 (3) (151 SE 923) that where love and affection is expressed as the consideration in a deed, a money or other valuable consideration may be shown by parol evidence. 4. The plaintiff prayed for $7,500 damages and the jury returned a verdict for plaintiff and against the defendant daughter for $7,000. At the close of plaintiff's case, defendants moved for a directed verdict and asked the trial court to direct the jury that any verdict for plaintiff must be limited to $1,185.32 as no other evidence was presented on the question of damages. The *753 motion was overruled. It was shown that plaintiff's wife had died and that his defendant daughter had refused to pay for all the expenses of her mother's last illness and burial. The daughter in her testimony denied making the promise to pay any of the expenses of either her mother or the plaintiff. She did pay a portion of her mother's costs but she testified she did so on a voluntary basis and not as the result of a promise made to her father. The evidence reveals that plaintiff has paid certain medical expenses of his wife and it was shown that a part of her burial charges had not been paid. These costs totaled $1,185.32. Evidence was also received that the deeded property had a value of at least $7,500 at the time of the delivery of the deed and has since appreciated in value. However, this evidence as to the value of the property is irrelevant under the issues of this case and could have no probative value. Under the evidence the jury was authorized to find no more than that all the defendant bargained for was to pay the described expenses of her mother and the plaintiff. In an action for breach of contract, the burden is on the plaintiff to prove both the breach and the damage. James v. Emmco Ins. Co., 71 Ga. App. 196 (30 SE2d 361). Damages cannot be left to speculation, conjecture and guesswork. Studebaker Corp. v. Nail, 82 Ga. App. 779 (62 SE2d 198). The evidence must furnish the jurors with data sufficient to enable them to estimate with reasonable certainty the amount of the damages. National Refrigerator & Co. v. Parmalee, 9 Ga. App. 725 (1) (72 SE 191). The evidence in this case is sufficient to authorize a finding that with respect to the expenses of the last illness and burial of plaintiff's wife the contract was breached and damages were authorized up to the amount of $1,185.32. However, as to the plaintiff, of necessity there can be no breach until after his death, and until his death it would be impossible to determine with any degree of certainty the total amount of plaintiff's medical expenses for his last illness and his cost of burial expenses. Further, as to plaintiff's medical and burial costs only, the action is not maintainable under a theory of anticipatory breach as the contract has been completely performed by plaintiff and defendant has denied its existence and recovery *754 for his expenses is dependent upon future contingencies. See Brown Paper Mill Co. v. Irvin, 146 F2d 232; 17A CJS 659, Contracts, § 472 (2) b. Plaintiff cites the case of Lowe v. Slocum, 25 Ga. App. 464 (103 SE 719) in support of the judgment. As we read the Lowe case, it is distinguishable on its facts. There the action was for breach of contract to provide for support during the plaintiff's lifetime and evidence was adduced by which the jury determined the amount of damages awarded plaintiff for support during his lifetime. Accordingly, the verdict here is unsupported by any evidence in excess of $1,185.32. Consequently, the judgment is affirmed on the condition the plaintiff, within 15 days from the date of issuance of this opinion, write off so much of the judgment as is in excess of $1,185.32 plus costs; otherwise, the judgment is reversed and remanded for a new trial. Judgment affirmed on condition. Quillian and Whitman, JJ., concur.
2023-11-27T01:26:28.774034
https://example.com/article/1688
$NetBSD: patch-aa,v 1.6 2015/03/05 21:05:14 wiz Exp $ Do not install idna.el and punycode.el. --- src/Makefile.in.orig 2006-11-30 11:57:14.000000000 +0000 +++ src/Makefile.in @@ -1344,7 +1344,7 @@ info: info-am info-am: -install-data-am: install-dist_lispDATA +install-data-am: install-dvi: install-dvi-am
2023-12-12T01:26:28.774034
https://example.com/article/3334
Savo Ekmečić Savo Ekmečić (born 9 May 1948) is a retired Bosnian football goalkeeper. References Category:1948 births Category:Living people Category:Bosnia and Herzegovina footballers Category:FK Sarajevo players Category:Grazer AK players Category:Association football goalkeepers Category:Bosnia and Herzegovina expatriate footballers Category:Expatriate footballers in Austria Category:Bosnia and Herzegovina expatriate sportspeople in Austria Category:Bosnia and Herzegovina emigrants to Austria Category:Austrian Football Bundesliga players Category:Austrian football managers Category:Grazer AK managers Category:DSV Leoben managers
2024-07-07T01:26:28.774034
https://example.com/article/9548
10 Korean Celebrities Great with Kids Korean celebrities generally value youthful appearance, and many of them look like teenagers despite being close to middle-aged, so it’s understandable if they don’t look like great paternal or maternal figures, at least visually-speaking. However, there are many celebrities that have proven themselves to be great with kids, here are ten that you should pay attention to: 1. Shinee’s Choi Minho The Idol Persona For those who watch K-drama, Minho’s strongest character would probably be Kang Tae-joon in To the Beautiful You. His loveteam with Sulli certainly garnered him even more fans. His image is always of the boy-next-door type. Minho is also athletic, aside from being multi-talented. Affinity towards children In the reality TV show Hello Baby wherein all Shinee members were tasked to act as fathers to baby Yoogeun, Choi Minho was seen to be the closest to the toddler. At the end of the season, Baby Yoogeun didn’t want to leave Choi Minho’s arms, even if his mom wanted to take him away. Affinity towards children Yunho’s kind face makes him naturally appealing for his younger fans. He also loves children, as proven by the sheer number of charity words he has headed for the welfare of children. During his birthday, for example, his fans were encouraged to donate to marginalized children around the globe through the Green Umbrella Child Fund. 3. Mblaq’s Yang Seungho The Idol Persona Unlike most K-Pop boy groups, Mblaq is not a group of boy-next-door types. They’re the cooler, more mature, and slightly rougher idols. As head of Mblaq, the rapper Yang Seungho is definitely more edge than sweetness. Despite the rougher demeanor, though, he still has an appeal with young children. He is definitely still a charmer. 4. Mblaq’s Mir The Idol Persona Mir is probably the most sensitive among all Mblaq members. While the group maintains its slightly more macho image, Mir is macho with a heart. Affinity towards children Mir in Hello Baby Season 5 is the most affectionate towards the children among all of Mblaq’s members. While the kids were initially closer to the group leader Seung ho, Mir was the closest to all three kids towards the end. He was the one who was always on his toes to tell Leo, in a gentle way, that hitting his playmates was wrong. 5. Big Bang’s Taeyang The Idol Persona Taeyang, at first glance as a rapper, might appear rough at the edges, thanks to his tattoos and his muscular physique. However, if you take a closer look at his tattoos, they are all related to his strong Christian faith. He’s not a frail, boy-next-door type, but not quite the bad boy either. Affinity towards children Who could forget how the little girl Haru of the reality television show Superman Returns professed that she was a fan of Big Bang? At the end of the season, Big Bang members were guests in the show and Taeyang even gave Haru a kiss on the cheek. Haru was, of course, star struck and shocked, but Taeyang’s friendliness soon helped the little girl gain more confidence and kiss her idol on the cheek too. 6. Infinite’s L The Idol Persona L, otherwise known as Myungsoo, is the leader of Infinite F, a sub group of Infinite. He is described, often, as a “cold city boy” but charming, nonetheless. He has a lot of fans, mostly because of his talent in singing and dancing, but also because of his “clean boy” good looks. Affinity towards children In a reality show, the Infinite members visited a day care. The kids automatically knew who L was, but they could not name any more of the band members. In the footage, it was heartwarming to see L taking care of the kids like he was their real oppa. It was obvious that he loved kids as much as they loved him. 7. Vixx’s Leo The Idol Persona The Vixx lead vocalist exudes a tough aura. He is often potrayed as unfeeling, or at least a “poker face” by the group’s fans. In person, though, he’s quite warm, and very accommodating to his fans. Affinity towards children On several occasions, the seemingly tough Vixx lead vocalist displayed a surprising camaraderie with small children. One time was with a young fan named Leonia. He would take the time to actually have small chats with his fans during meet and greets. Despite the cold and distant image in music videos, he’s actually quite nurturing and brotherly. 8. Lee Seung-gi The Idol Persona He is known as a serious actor, having lead male roles in historical dramas like the Gu Family Book. He is also talented as a host and has proven his worth as a singer. Lee Seung-gi is an earnest oppa who is always seen as a knight in shining armor for anyone who is linked to him romantically, either in fiction or in real life. Currently, he is dating Girl Generation’s ImYoona. Affinity towards children Lee Seung-gi showed that he is good with kids during the first season of 1ND2. This is a reality show that highlighted the tourist attractions of Korea. In another show, they filmed a casting call wherein he was directed to make eye contact with an infant for an ad. He did really well, and he actually looked like he really was the dad of the infant in the ad. 9. Won Bin The Idol Persona Won Bin is always portrayed as a young man who is slightly rough at the edges. His most exciting and memorable roles are from action dramas and movies. His entertainment career was interrupted when he needed to do military service. This might explain why he is, in real life, a bit older than his contemporaries in show business. Affinity towards children Won Bin is the UNICEF Goodwill Ambassador of the Korean Committee. He is naturally good with children, and he was easy to work with when UNICEF had to do video campaigns with children. 10. Ok Taecyon The Idol Persona The main rapper of 2PM is portrayed as sexy and cool. He is definitely far from the boy-next-door mold. He has a buff body, and is even often featured in Men’s Health Magazine. Affinity towards children In the 5th episode of the 2PM show, all the members, including Taecyon, were tasked to act like daddies to toddlers. Taecyon’s easiness with children is quite obvious in this episode. He is very good with kids.
2024-04-05T01:26:28.774034
https://example.com/article/8720
Q: Running VMC on Mountain Lion I've followed the simple instructions for installing VMC on Mountain Lion (sudo gem install vmc), but I'm getting the following error: $ vmc /System/Library/Frameworks/Ruby.framework/Versions/1.8/usr/lib/ruby/1.8/rubygems.rb:230:in `activate': can't activate multi_json (~> 1.4.0, runtime) for ["vmc-0.4.7"], already activated multi_json-1.5.0 for ["cfoundry-0.4.19", "vmc-0.4.7"] (Gem::LoadError) from /System/Library/Frameworks/Ruby.framework/Versions/1.8/usr/lib/ruby/1.8/rubygems.rb:246:in `activate' from /System/Library/Frameworks/Ruby.framework/Versions/1.8/usr/lib/ruby/1.8/rubygems.rb:245:in `each' from /System/Library/Frameworks/Ruby.framework/Versions/1.8/usr/lib/ruby/1.8/rubygems.rb:245:in `activate' from /System/Library/Frameworks/Ruby.framework/Versions/1.8/usr/lib/ruby/1.8/rubygems.rb:1056:in `gem' from /usr/bin/vmc:18 Can anyone help me with diagnosing this? Is this an issue with the version of Ruby installed? I don't really want to blindly jump through hoops to upgrade Ruby for this one thing. I tried installing an older version of multi-json with gem install multi_json -v 1.4.0, but this didn't seem to make any difference. A: Seems like vmc is picking multi_json (one of its dependencies) with version 1.5, which is not compatible with 1.4 What you can do is sudo gem uninstall multi_json and when prompted, answer to have version 1.5 removed.
2023-08-10T01:26:28.774034
https://example.com/article/2973
LONDON (Reuters) - British Prime Minister Boris Johnson’s Conservative Party saw its lead over the opposition Labour Party narrow during the last week, an opinion poll by ICM for Reuters showed on Monday, ahead of a Dec. 12 election. Support for the Conservatives fell one point to 41%, while the Labour Party was up two points on 34%. The pro-European Union Liberal Democrats were unchanged on 13% while the Brexit Party was down one point on 4%. ICM surveyed 2,004 people online between Nov. 22 and 25. It said that for five parties that are not contesting all seats, including the Liberal Democrats and the Brexit Party, it had only given respondents the chance to support those which are standing in their constituencies. ICM also asked voters whether they would allow a new referendum on Scottish independence from the United Kingdom within the next five years if they were prime minister - 40% said they would, 42% said they would not and 18% did not know. Johnson has ruled out another Scottish referendum but says that if Labour wins next month’s election without a parliamentary majority, it would agree to a vote on independence next year in return for the support of the Scottish National Party. Labour leader Jeremy Corbyn has said he would not allow such a referendum for at least two years.
2023-10-23T01:26:28.774034
https://example.com/article/2797
The present invention relates to integrated circuits for data communication systems such as network devices and telecommunications circuits. More particularly, the present invention relates to a multiple channel data buffer for use in an integrated circuit having multiple I/O ports. Network devices and telecommunication circuits typically have several communication channels for connecting to multiple devices such as computer work stations, telephone and television systems, video teleconferencing systems and other facilities over common data link support carriers. Personal computers and computer work stations are typically interconnected by local area networks (LANs) such as Ethernet, Token Ring, DECNet and RS-232, whereas remote systems are interconnected by wide area networks (WANs) such as V.34, ISDN Basic Rate Interface (BRI), Frame Relay (T1/E1 or fractional T1/E1), Asynchronous Transfer Mode (ATM) links, ADSL and High Level Data Link Control (HDLC) networks. In these applications, it is common to use a first-in-first-out (FIFO) buffer for buffering transmit and receive data through each channel. Typically, each communication channel has its own transmit FIFO and receive FIFO. Each FIFO uses a dual port random access memory (RAM) for storing the data. One port is used by the I/O port of the communication channel and the other port is used by a data routing circuit which routes the data between the FIFO and a memory or other device. This structure is not very scalable on an integrated circuit since RAMs have specific layout restrictions on the integrated circuit. For example, RAMs are often required to be placed on an edge of the integrated circuit die. This makes it difficult to place a large number of RAMs on a single integrated circuit and thus limits the number of communication channels that can be supported on the integrated circuit. Improved data communication buffer circuits are desired.
2024-02-05T01:26:28.774034
https://example.com/article/7279
T HIS WAS supposed to be the quarter that Kraft Heinz showed America’s huge, struggling food companies a new model for success. A merger in 2015 had joined two of the world’s most iconic food makers. Backed by 3G Capital, a private-equity firm, the new group slashed costs at a pace that made rivals shudder and investors swoon. After a failed bid in 2017 for Unilever, an Anglo-Dutch giant, Kraft Heinz set out to prove it could not just cut fat but boost sales on its own. Bernardo Hees, the company’s boss, pointed cheerfully to new products, including Heinz Mayochup and something called Just Crack an Egg. The company was on the path to “sustainable, profitable growth”, he declared in November. Unfortunately, it wasn’t. On February 21st Kraft Heinz announced a staggering $15bn impairment, a dividend cut of more than 30% and an inquiry into its procurement by the Securities and Exchange Commission ( SEC ). Earnings calls are often sleepy affairs. This one was a nightmare. Some of 3G ’s long-time critics are now clucking with satisfaction. Others fear 3G is tarnishing American treasures such as Kraft Macaroni and Cheese and Warren Buffett, who partnered with 3G to combine Heinz and Kraft and last year lost nearly $3bn on the deal. Yet dramatic as Kraft Heinz’s decline may seem, 3G ’s impact and the food industry’s problems extend far beyond it. While its founders are Brazilian, 3G ’s buyout business is based in Manhattan. (Its most famous founder, Jorge Paulo Lemann, lives in Switzerland.) Unlike many big private-equity firms, 3G ’s main investors are not pension funds but family offices and individuals, including its partners. It does not have a wide portfolio, but backs just two companies: Kraft Heinz and Restaurant Brands International ( RBI ). Blackstone, a private-equity firm based a few blocks away, has nearly 2,500 staff. 3G ’s New York office has fewer than two dozen. Yet 3G ’s leaders have rocked the consumer industry like few investors in history. All buyout firms are thirsty for deals, but 3G is uniquely parched. Before starting 3G , the firm’s founders went on a beer-buying spree that culminated in 2016 with Anheuser-Busch InBev’s purchase of SAB Miller for more than $100bn. AB InBev, in which 3G ’s partners have a large stake, now brews more than one in four of the world’s beers. Kraft Heinz counts Kraft cheese, Heinz Ketchup, Jell-O, Philadelphia Cream Cheese and Oscar Mayer among its holdings. RBI includes Burger King, Popeyes, a fried-chicken restaurant, and Tim Hortons, a popular Canadian chain. The way 3G runs companies is as notable as its appetite for buying them. In a practice called zero-based budgeting, managers must justify their expenses anew each year. The idea is to expand margins continuously. Overseeing this are managers chosen for their talent and work ethic, rather than mere experience. Daniel Schwartz, a 3G partner, became the chief executive of Burger King at 32. Mr Hees, a 3 G partner who spent more than a decade working for a Latin American railroad, became Kraft Heinz’s boss at 45. David Knopf, its chief financial officer, assumed his position in 2017 at 29. To 3G ’s detractors, this all seems a bit mad. The company’s strategy can be caricatured as follows: buy a big business, cut costs, repeat. This is not entirely fair. RBI has invested in marketing Burger King, winning prizes for its ads. AB InBev is working to boost its sales, for instance by pushing higher-priced beers and deploying best practices across its vast geography. But buying big companies and slashing costs remain 3G ’s speciality. The risks of that strategy have become clear. RBI struggled to integrate franchisees at Tim Hortons. AB InBev last year said it would slash its dividend by half. Nowhere has 3G ’s approach played out more tumultuously than at Kraft Heinz. America’s food industry seemed the perfect target, with flabby companies and powerful brands. Rare is the American who has not slurped Kool-Aid or downed an Oscar Mayer hot dog smothered in Heinz Ketchup. 3G reckoned the brands were strong enough to withstand large cuts. As it turns out, they were not. This was not the same for AB InBev, which despite abysmal results in America, has little beer competition from in-store brands, is rarely sold online and faces ample growth abroad. Kraft Heinz’s business, by comparison, is concentrated in America, where the food industry is being turned on its head. It brands may be familiar, but that does not make them popular. Small firms are offering healthier options, taking advantage of cheap digital marketing and nimble contract manufacturers. The smallest 20,000 packaged goods players account for about half the industry’s growth, according to Nielsen, a research firm. Meanwhile, the rise of e-commerce and European discount grocers has put pressure on food retailers, which are in turn squeezing food companies. Stores led by Walmart are using extensive data to launch their own, increasingly sophisticated, low-cost private label goods, all the while pushing companies to lower their prices. Things started well for Kraft Heinz. Its operating profit margin surged from 15% in 2014 to 24% in 2017. The first big setback came that year when Paul Polman, then Unilever’s boss, rebuffed the company’s $143bn courtship. (Unilever, wisely, has devoted growing attention not to food but to beauty and household products.) Without his megadeal, Mr Hees turned to the basic work of lifting sales by pouring more money into advertising, product innovation and Kraft Heinz’s sales force, but that ate into profits. Equally striking is the company’s new $15bn impairment, a recognition that the value of giant brands has shrivelled. Mr Buffett says that he misjudged the worth of Kraft’s stable of products (see article). “The management team entered into this merger with the assumption they could cut the spending needed to maintain brands, let alone help them grow,” says Robert Moskow of Credit Suisse, a bank. “The world changed on them—retailers changed and consumers changed.” Flawed though 3G ’s approach may seem, few food companies offer a successful alternative. Companies have tried to evolve by buying smaller firms, often at lofty prices and with mixed results. For instance Campbell Soup bought Bolthouse Farms, a maker of fruity drinks, in 2012, but is now trying to sell it. Last year it bought Snyder’s-Lance, a pretzel and popcorn company, to boost its snacks business. Its debt level has risen accordingly. Indeed, shopping sprees at Campbell, ConAgra and General Mills have made those companies more levered than Kraft Heinz, according to Sanford C Bernstein, a research firm.
2024-04-10T01:26:28.774034
https://example.com/article/8669
The French Riviera: Beyond the Beaches Villefranche-sur-Mer: Riviera for romantics By Rick Steves and Steve Smith "French Riviera" often conjures up images of its glamorous (and packed) cities — Monaco, Cannes, and Nice. But for some of the Riviera's best scenery and an escape from the touristic crush, follow the coast road between Cannes and Monaco. While it is easy to travel the coast by public transportation, a rental car gets you quicker to inviting hill towns, colorful markets, and tucked-away museums. Halfway between Nice and Cannes, Antibes offers silky sandy beaches, an enjoyable old town, good hiking, and a great Picasso collection. The town's glamorous port glistens below its fortifications, with luxurious yachts and brightly painted fishing boats. In the 1500s, Antibes' Fort Carré, which now dominates the port, was the last French stronghold before the Italian border. Today, its festive Old City is charming in a sandy-sophisticated way, and its daily market, spread beneath a 19th-century canopy, brings out the locals. Antibes sits atop the ruins of the fourth-century B.C. Greek city of Antipolis. The Museum of History and Archaeology, featuring Greek, Roman, and Etruscan odds and ends, is the best place to get a sense of this town's ancient roots — even without English explanations. I liked the 2,000-year-old lead anchors. Sitting serenely where the Old City meets the sea, Antibes' Picasso Museum offers a remarkable collection of the master's work — paintings, sketches, and ceramics. Picasso, who lived and worked here in 1946, said if you wanted to see work from his Antibes period, you'd have to do it in lovely Antibes. Several photos of the artist make this already-intimate museum more so. For a lazy afternoon in the sun, stretch out on Antibes' golden sandy beaches — the best lie between the port and Cap d'Antibes. Antibes is also the launching point for several scenic hikes along the rocky coast. Villefranche-sur-Mer, between Nice and Monaco, is a romantic's top Riviera choice. Come here for upscale, small-town Mediterranean atmosphere. Narrow cobbled streets tumble into a mellow waterfront, a scenic walkway below the castle leads to the hidden port, and fancy yachts bob in the harbor below. Pebbly beaches and a handful of interesting sights keep visitors just busy enough. See the stunning interior of the Chapel of St. Pierre, Villefranche's cultural highlight. Relax on the harbor cruise. At the park, enjoy a lively game of boules (like a grown-up version of marbles). In the evening, your biggest decisions are between a beachfront dinner or an ice cream-licking village stroll. Fit in both. Along with Antibes and Villefranche, here are some of my other favorite French Riviera towns: The hill towns of St. Paul and Vence offer a break from the beaches. An easy 45-minute bus ride inland from Nice, St. Paul is part cozy hill town and part local-artist shopping mall. It's appealingly artsy but gets swamped with tour buses. Meander into St. Paul's quieter streets and wander far to enjoy the panoramic views. Or consider a steep 15-minute walk uphill to the prestigious (and high-priced) Fondation Maeght gallery, with its world-class contemporary-art collection and pleasant gardens. Just a 10-minute bus ride from St. Paul, the enjoyable hill town of Vence bubbles with work-a-day and tourist activity. (No boutique shortage here.) Once a haunt of D. H. Lawrence, Henri Matisse, and Marc Chagall, the town has a buzzing daily market and small cathedral with a fine Chagall mosaic. Matisse fans make the necessary pilgrimage here to see the much-raved-about Chapelle du Rosaire for its stained glass and brooding tile sketches. Eze Village, floating high above the sea, is a spectacular medieval town mixing perfume outlets, fancy boutiques, outrageously priced hotels, steeply cobbled lanes, and jaw-numbing views. A 15-minute bus ride east of Villefranche, Eze Village makes a handy stop between Nice and Monaco. Drop in on the Fragonard or Gallimard perfume outlets to watch the production process and shop the fragrant collections. Nearby hills provide ideal picnic perches. On a clear day you can see Corsica.
2023-11-20T01:26:28.774034
https://example.com/article/9591
OVERVIEW This program targets the discipline and concepts of financial management. Financial management is all-encompassing and embraces both the asset and liability sides of an organization. Although the financial manager, a senior position on par with the CFO and Treasurer, they are not engaged in the accounting functions nor that of auditing for example, but he/she is integrally involved in most aspects of deriving the net income. The financial manager, from asset/liability management, to capital structure, to working capital and identifying financing sources amongst a myriad of options and costs, some transparent others hidden or commingled all fall under this role. Given its natural overlapping, especially with treasury, vis-à-vis banking relationships and funding sources, cooperation amongst key players such as the financial manager, CFO and treasurer becomes critical for ensuring that taking, for example, a derivative position, is agreed upon and documented as a financially sound position to take. Additionally, this program covers financial analysis, developing 3-5 year business plans and discusses strategy and Islamic financing. Review current and traditional sources of financing that all fall directly under financial management WHO SHOULD ATTEND? This course both theoretical and extensively interactive is designed for middle and senior business and finance professionals who need to understand and embrace the disciplines of financial management, including: Certified Financial Management Professional is issued by London School of Business and Finance LSBF EE offers a range of short programmes and postgraduate certificate courses, tailored specifically to the needs of working professionals who want to succeed in today’s globalised business climate. The school was established in 2003 and has campuses in the UK and Singapore; it is also partnered with the award-winning online platform InterActive, delivering education to students around the world who can’t attend classes on campus. The LSBF experience is career-driven, tailored to each individual student, and led by expert tutors who are passionate about their subject and about teaching.
2024-02-08T01:26:28.774034
https://example.com/article/4650
Car Buying and Selling Regulations in Alaska In the state of Alaska, buying and selling a vehicle is an easy thing if you do your homework well. Enjoy the Luxuries, Insist on Safety When purchasing a car in Alaska, many buyers get carried away with the performance and the look of the car. But keep in mind; it’s the reliability and safety measures that count during winter. In fact there are so many reliable and safe vehicles in the market, but also you can’t miss too many unreliable and unsafe ones. Because of the changing nature of weather in Alaska, it is important to look at the safety and reliability of the vehicle before purchase. In this guide, you will learn what to look for when purchasing a vehicle to ensure that you get the best value for the money you invest. Learn what to look for when buying a vehicle so that the money you invest will reward you with excellent, reliable transportation. Buying your vehicle You can purchase your vehicle from a private seller or dealership. Usually, vehicles purchased from a dealer are in good condition, while those sold by private sellers may come with some defects. So it is advised to hire a certified mechanic to check a vehicle purchased from a private seller before you invest your hard-earned money. You will need to look at the sweetest deal, not in terms of luxury ride but overall performance, reliability and safety. Transfer of Ownership You must transfer the vehicle ownership into your name after purchase. To do so, you must complete two transactions with the Department of Motor Vehicle in Alaska. First you must apply for a new title and second, register the vehicle in your name. Title Transfer You must transfer the title or apply for a new one within 30 days from the date of vehicle purchase. Title transfer is an important practice as it transfers the vehicle ownership into your name. You can use a title certificate to show proof of vehicle ownership if need arises. Title transfer is done once, especially during the title of vehicle purchase. But you can add another owner to the title (marriage) or remove the name of the second owner from the title (divorce). If you are financing your car, you may also request the DMV to issue a new title certificate after a loan is paid off and a lien is released. Vehicle Registration Registering a vehicle that you have purchase is an act of making yourself a legal owner of that vehicle. Once you register it in your name, you will be issued with new license plates from DMV through mail. You may request specialized, customized or personalized license plates if you wish. The DMV sometimes may ask you to submit a copy of your I/M Testing Certification when registering your car. It is the responsibility of the seller to update this certificate and provide it to you. Registration Fees Registration fees in Alaska vary depending on the weight and size of the vehicle you are registering. Vehicle registration taxes vary depending on the vehicle purchase price and the place of residence of the buyer. Required Documents The first time you are registering your vehicle with the Department of Motor Vehicle in Alaska, requires you to do so in person. You must take with you the required paperwork such as: Bill of Sale or paperwork showing the purchase price. This paperwork must be signed by both the seller and buyer. Proof of car insurance. An odometer disclosure statement. After You Register After transferring the title and registering the vehicle into your name, you will be issued with license plates from the DMV in Alaska. You will also receive the current tabs for the period that you registered your vehicle. If the registration renewal period is near, the DMV will send you a letter notifying you to renew your registration. Buying or Selling a Vehicle without a Title Alaska law does not require you to sell or purchase a vehicle without a title. If the title to the vehicle you intend to purchase is missing, lost or damaged, ask the seller to apply for a duplicate copy with the DMV and sign it over to you. Without this vital document, you won’t be able to complete a sale. Buying or Selling Without Registration You can purchase a vehicle without a current registration. However, you will need to explain to the Alaska DMV Division of Title and Vehicle Registration. At VinFreeCheck, we take great pride in being simple and informative. We provide the vin check report without any cost. We are also constantly monitoring your experience so that you will have a pleasant time perusing our site.
2024-02-19T01:26:28.774034
https://example.com/article/1183
Q: Assign return value to a table field I need to insert a value to the field table and I have a display method which returns this value Is there a way to assign a return value from display method to a table field or calling this display method in insert()? Thanks A: From my experience, you can use display methods just as you do ordinary methods. So, to add the value of a display method as a value to a table (in the insert or initValue method) just state: this.[FieldName] = this.[MethodName](); If you are on a different object (IE, not a table), it may need to be accessed differently, but the concept is still the same.
2023-08-09T01:26:28.774034
https://example.com/article/5896
South Korea's electoral body said Friday former U.N. Secretary-General Ban Ki-moon is eligible to run for president regardless of his lengthy residence outside the country. The National Election Commission said under the current law, South Koreans who are 40 years and older and who have lived at least five years in the country before the date of an election can become a candidate. There has been an ongoing debate as to whether Ban meets the residence status for the next presidential election. The 72-year-old has been living outside of his native country since he became the U.N. helmsman in 2007, although he did visit South Korea numerous times during his tenure. Ban returned home Thursday after his second five-year term as the U.N. secretary-general ended at the end of last year. The country's previous law stated that candidates must have lived in South Korea continuously for five years or more. But the commission said the amended presidential elections law of 1987 deleted such a requirement. The commission said late former President Kim Dae-jung, who was chief executive of the country from 1998 to 2003, also lived abroad for a year between 1993 and December 1997, when the presidential election was held. "He was not prevented from registering as a candidate," the commission said. (Yonhap)
2023-09-26T01:26:28.774034
https://example.com/article/8927
1. Field The present invention relates generally to digital content protection in computer and consumer electronics systems and, more specifically, to adapting security levels for program modules to a desired performance attribute or to other requirements. 2. Description The personal computer (PC) platform is an open and accessible computer architecture. However, the openness of the PC means that it is a fundamentally insecure computing platform. Both the hardware and software can be accessed for observation and modification. This openness allows malicious users and programs to observe and to modify executing code, perhaps with the aid of software tools such as debuggers and system diagnostic tools. Despite these risks, there are classes of operations that must be performed securely on the fundamentally insecure PC platform. These are applications where the basic integrity of the operation must be assumed, or at least verified, to be reliable. Examples of such operations include financial transactions and other electronic commerce, unattended access authorization, and digital content management. For content providers, countering the threat of digital piracy on the PC requires new software that is resistant to attacks by a malicious user. In this scenario, the malicious user may wish to tamper with or replace particular components of the software in order to gain unauthorized access to digital content or to make unauthorized reproductions. A cryptosystem based on cryptographic methods employed in conjunction with the software may be used to help protect the content owner's rights. Content may be encrypted to provide some measure of protection, but the software accessing the decrypted content during playback is still vulnerable to attack. Digital content is usually accessed by a player application and associated components running on the PC or another electronic device. Players are typically not designed with security in mind. If a level of security is, however, set for a player application, it is usually the same level for all instances of the player application. Additionally, content may be protected by a certain level of security by the content provider, but that level of security is typically the same for all copies of the content. Although known techniques may generally provide an adequate level of security, improvements can still be made to further secure software and content, and stay one step ahead of digital content pirates. What is needed is a method that will allow a player or other application program on the fundamentally insecure, open PC to apply different levels of security to access to content, whereby the security level may be set by a content provider or distributor prior to distribution of the content.
2023-09-16T01:26:28.774034
https://example.com/article/1271
Thursday, August 20, 2009 Fall '09 Class #1: Qualitative Research Methods OK! So I started my fall semester today. My class on Thursdays is Qualitative Research Methods. I went, and it was great, except for one small thing: I need a research project. Well really, I needed a research project like yesterday, because when we went around the class and everyone talked about what they wanted to research, I was the only one without a clear plan. I've been mulling over the concept of looking at womens processes of self representation in fashion blogs. That would tie many of my interests together. The research question would be: what factors contribute to womens decisions to write online about what they wear? I can think of several bloggers that I would be interested in interviewing. But first I need to do a literature review. What have other people written about with regards to this concept of networked female sartorial representation... fashion as motivation for networked female authorship... I mean, this isn't a social justice issue. But it's a social expression and community-building issue. So... I don't know. I'm still thinking it over. One thing the professor said a couple of times is that we need a clearly defined rationale. What is the rationale behind this project? What does it contribute? I do think there's something there behind the fact that some women get self-motivated, personally involved, and driven to express themselves through this medium. How is this form of social expression safe? How is it risky? How is it a positive experience? How is it a negative experience? 4 comments: I'm not going to lie... I kind of wish I had thought to do that for my senior thesis. If you end up doing this, I would LOVE to read what you come up with! I think it sounds fascinating and will be thinking about it this weekend.Happy Friday! Excellent topic Emily. What I've been thinking a lot about lately is if my path would've been different if the Net, blogging, and sites like Polyvore existed when I was in my teens. Living in a small rural town and dressing like Cyndi Lauper only made you a freak and the constant target of ridicule. Women now have the opportunity to share their style with like minded individuals, which in turn builds self confidence and comradery. please let me know if/when you publish your research - I think the topic is thoroughly interesting. I'm always curious, from a women's studies perspective, about the representational aspects of fashion blogs and how the abundance of such blogs influences (positively or negatively) consumer culture and perceptions of femininity.Best of luck in your research and in writing your thesis.
2023-10-19T01:26:28.774034
https://example.com/article/1250
Maroni (river) The Maroni or Marowijne (, , Sranan Tongo: Marwina-Liba) is a river in South America that forms the border between French Guiana and Suriname. Course The Maroni runs through the Guianan moist forests ecoregion. It originates in the Tumuk Humak Mountains and forms the (disputed) border between France (region of French Guiana) and Suriname. In its upper reaches, it is also known as the Lawa River, and close to its source it is known as the Marouini River. There are two nature preserves located in the estuary region on the Surinamese side of the river, near the village of Galibi. They provide protection for the birds and the Leatherback Sea Turtles that hatch there. Territorial dispute In 1860, the question was posed from the French side, which of the two tributary rivers was the headwater, and thus the border. A joint French-Dutch commission was appointed to review the issue. The Dutch side of the commission consisted of J.H. Baron van Heerdt tot Eversberg, J.F.A. Cateau van Rosevelt and August Kappler. Luits Vidal, Ronmy, Boudet and Dr. Rech composed the French side. In 1861 measurements were taken, which produced the following result: the Lawa had a discharge of 35,960 m3/minute at a width of 436 m; the Tapanahony had a discharge of 20,291 m3/minute at a width of 285  m. Thus, the Lawa River was the headwater of the Maroni River. There were no problems with this decision until 1885. However, the discovery of gold in the area between the Lawa and the Tapanahony created a new border conflict. On 29 November 1888, France and the Netherlands reached an agreement that the conflict should be subject to arbitration. Czar Alexander III of Russia, acting as the arbitrator, decided that the Lawa was the headwater of the Maroni, and thus should be considered the border. However, this decision created another issue as to which river is the source of the Lawa. The Netherlands considered the Marowini (the eastern tributary river) to be the source of the Lawa; the French considered the Litani, located further to the west, to be the source of the Lawa. This issue has still not been resolved. The Litani originates in the Tumuk Humak Mountains at approximately 2½° N 55° W; along its path it is fed by Koele Koelebreek, the Lokereek, the Mapaonikreek and the Oelemari. The Marowini also has its source in the Tumuk Humak Mountains, at approximately 2° N, 54° W; it also absorbs the Koelebreek, among others. Numbers The Maroni basin is 68,700 km²; above the island Langatabbetje (110 km away from the mouth of the river) this area is 63,700 km². Between 1952 and 1973, the average discharge near Langatabbetje was about 1,700 m³/second. The minimum was 95 m³/second, the maximum 6,550 m³/second. The estuary is approximately 90 km long; the average tidal range in the estuary is 2 m; in the dry season, the salt reaches about 40 km upstream to the town of Albina. The estimated potential hydro power for Suriname is between 1150 and 1250 megawatts. Exploration The Maroni is the most extensively studied of all the rivers in Suriname. In the 16th century, there were already ships exploring the estuary, by Lawrence Keymis, Thomas Masham, Antonio de Berrio and Adriaen Cabeliau and in the 17th century, by Harcourt, Fisher and De Vries. In the 18th century more extensive excursions took place, by Mentell, Patris, Le Blond and Heneman and in the 19th century by Zegelaar, Jules Crevaux, Coudreau, Ten Kate, Joost and others. Of importance in the 20th century were the Gonini and Tapanahony expeditions, and the Tumuk Humak and Southern Border Expeditions. From these arose the research of the Geologisch Mijnbouwkundige Dienst (GMD) and the Centraal Bureau voor Luchtkartering (CBL). References C.F.A. Bruijning und J. Voorhoeve (Ed.): Encyclopedie van Suriname. Amsterdam & Brussels 1977, B.V. Uitgeversmaatschappij Argus Elsevier, p. 256, 396–397; . Category:Rivers of French Guiana Category:Rivers of Suriname Category:Rivers of France Category:French Guiana–Suriname border Category:International rivers of South America Category:Sipaliwini District
2023-12-12T01:26:28.774034
https://example.com/article/2612
Convertino, M., R. Rigon, A. Maritan, I. Rodriguez-Iturbe, and A. Rinaldo (2007). The probabilistic structure of the distance between tributaries of given size in river network, 2007WR006176, Water Resources Research
2023-08-09T01:26:28.774034
https://example.com/article/3451
/* * This file is part of wl1271 * * Copyright (C) 1998-2009 Texas Instruments. All rights reserved. * Copyright (C) 2008-2010 Nokia Corporation * * Contact: Luciano Coelho <luciano.coelho@nokia.com> * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * version 2 as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA * */ #ifndef __ACX_H__ #define __ACX_H__ #include "wlcore.h" #include "cmd.h" /************************************************************************* Host Interrupt Register (WiLink -> Host) **************************************************************************/ /* HW Initiated interrupt Watchdog timer expiration */ #define WL1271_ACX_INTR_WATCHDOG BIT(0) /* Init sequence is done (masked interrupt, detection through polling only ) */ #define WL1271_ACX_INTR_INIT_COMPLETE BIT(1) /* Event was entered to Event MBOX #A*/ #define WL1271_ACX_INTR_EVENT_A BIT(2) /* Event was entered to Event MBOX #B*/ #define WL1271_ACX_INTR_EVENT_B BIT(3) /* Command processing completion*/ #define WL1271_ACX_INTR_CMD_COMPLETE BIT(4) /* Signaling the host on HW wakeup */ #define WL1271_ACX_INTR_HW_AVAILABLE BIT(5) /* The MISC bit is used for aggregation of RX, TxComplete and TX rate update */ #define WL1271_ACX_INTR_DATA BIT(6) /* Trace message on MBOX #A */ #define WL1271_ACX_INTR_TRACE_A BIT(7) /* Trace message on MBOX #B */ #define WL1271_ACX_INTR_TRACE_B BIT(8) /* SW FW Initiated interrupt Watchdog timer expiration */ #define WL1271_ACX_SW_INTR_WATCHDOG BIT(9) #define WL1271_ACX_INTR_ALL 0xFFFFFFFF /* all possible interrupts - only appropriate ones will be masked in */ #define WLCORE_ALL_INTR_MASK (WL1271_ACX_INTR_WATCHDOG | \ WL1271_ACX_INTR_EVENT_A | \ WL1271_ACX_INTR_EVENT_B | \ WL1271_ACX_INTR_HW_AVAILABLE | \ WL1271_ACX_INTR_DATA | \ WL1271_ACX_SW_INTR_WATCHDOG) /* Target's information element */ struct acx_header { struct wl1271_cmd_header cmd; /* acx (or information element) header */ __le16 id; /* payload length (not including headers */ __le16 len; } __packed; struct acx_error_counter { struct acx_header header; /* The number of PLCP errors since the last time this */ /* information element was interrogated. This field is */ /* automatically cleared when it is interrogated.*/ __le32 PLCP_error; /* The number of FCS errors since the last time this */ /* information element was interrogated. This field is */ /* automatically cleared when it is interrogated.*/ __le32 FCS_error; /* The number of MPDUs without PLCP header errors received*/ /* since the last time this information element was interrogated. */ /* This field is automatically cleared when it is interrogated.*/ __le32 valid_frame; /* the number of missed sequence numbers in the squentially */ /* values of frames seq numbers */ __le32 seq_num_miss; } __packed; enum wl12xx_role { WL1271_ROLE_STA = 0, WL1271_ROLE_IBSS, WL1271_ROLE_AP, WL1271_ROLE_DEVICE, WL1271_ROLE_P2P_CL, WL1271_ROLE_P2P_GO, WL1271_ROLE_MESH_POINT, WL12XX_INVALID_ROLE_TYPE = 0xff }; enum wl1271_psm_mode { /* Active mode */ WL1271_PSM_CAM = 0, /* Power save mode */ WL1271_PSM_PS = 1, /* Extreme low power */ WL1271_PSM_ELP = 2, WL1271_PSM_MAX = WL1271_PSM_ELP, /* illegal out of band value of PSM mode */ WL1271_PSM_ILLEGAL = 0xff }; struct acx_sleep_auth { struct acx_header header; /* The sleep level authorization of the device. */ /* 0 - Always active*/ /* 1 - Power down mode: light / fast sleep*/ /* 2 - ELP mode: Deep / Max sleep*/ u8 sleep_auth; u8 padding[3]; } __packed; enum { HOSTIF_PCI_MASTER_HOST_INDIRECT, HOSTIF_PCI_MASTER_HOST_DIRECT, HOSTIF_SLAVE, HOSTIF_PKT_RING, HOSTIF_DONTCARE = 0xFF }; #define DEFAULT_UCAST_PRIORITY 0 #define DEFAULT_RX_Q_PRIORITY 0 #define DEFAULT_RXQ_PRIORITY 0 /* low 0 .. 15 high */ #define DEFAULT_RXQ_TYPE 0x07 /* All frames, Data/Ctrl/Mgmt */ #define TRACE_BUFFER_MAX_SIZE 256 #define DP_RX_PACKET_RING_CHUNK_SIZE 1600 #define DP_TX_PACKET_RING_CHUNK_SIZE 1600 #define DP_RX_PACKET_RING_CHUNK_NUM 2 #define DP_TX_PACKET_RING_CHUNK_NUM 2 #define DP_TX_COMPLETE_TIME_OUT 20 #define TX_MSDU_LIFETIME_MIN 0 #define TX_MSDU_LIFETIME_MAX 3000 #define TX_MSDU_LIFETIME_DEF 512 #define RX_MSDU_LIFETIME_MIN 0 #define RX_MSDU_LIFETIME_MAX 0xFFFFFFFF #define RX_MSDU_LIFETIME_DEF 512000 struct acx_rx_msdu_lifetime { struct acx_header header; /* * The maximum amount of time, in TU, before the * firmware discards the MSDU. */ __le32 lifetime; } __packed; enum acx_slot_type { SLOT_TIME_LONG = 0, SLOT_TIME_SHORT = 1, DEFAULT_SLOT_TIME = SLOT_TIME_SHORT, MAX_SLOT_TIMES = 0xFF }; #define STATION_WONE_INDEX 0 struct acx_slot { struct acx_header header; u8 role_id; u8 wone_index; /* Reserved */ u8 slot_time; u8 reserved[5]; } __packed; #define ACX_MC_ADDRESS_GROUP_MAX (8) #define ADDRESS_GROUP_MAX_LEN (ETH_ALEN * ACX_MC_ADDRESS_GROUP_MAX) struct acx_dot11_grp_addr_tbl { struct acx_header header; u8 role_id; u8 enabled; u8 num_groups; u8 pad[1]; u8 mac_table[ADDRESS_GROUP_MAX_LEN]; } __packed; struct acx_rx_timeout { struct acx_header header; u8 role_id; u8 reserved; __le16 ps_poll_timeout; __le16 upsd_timeout; u8 padding[2]; } __packed; struct acx_rts_threshold { struct acx_header header; u8 role_id; u8 reserved; __le16 threshold; } __packed; struct acx_beacon_filter_option { struct acx_header header; u8 role_id; u8 enable; /* * The number of beacons without the unicast TIM * bit set that the firmware buffers before * signaling the host about ready frames. * When set to 0 and the filter is enabled, beacons * without the unicast TIM bit set are dropped. */ u8 max_num_beacons; u8 pad[1]; } __packed; /* * ACXBeaconFilterEntry (not 221) * Byte Offset Size (Bytes) Definition * =========== ============ ========== * 0 1 IE identifier * 1 1 Treatment bit mask * * ACXBeaconFilterEntry (221) * Byte Offset Size (Bytes) Definition * =========== ============ ========== * 0 1 IE identifier * 1 1 Treatment bit mask * 2 3 OUI * 5 1 Type * 6 2 Version * * * Treatment bit mask - The information element handling: * bit 0 - The information element is compared and transferred * in case of change. * bit 1 - The information element is transferred to the host * with each appearance or disappearance. * Note that both bits can be set at the same time. */ #define BEACON_FILTER_TABLE_MAX_IE_NUM (32) #define BEACON_FILTER_TABLE_MAX_VENDOR_SPECIFIC_IE_NUM (6) #define BEACON_FILTER_TABLE_IE_ENTRY_SIZE (2) #define BEACON_FILTER_TABLE_EXTRA_VENDOR_SPECIFIC_IE_SIZE (6) #define BEACON_FILTER_TABLE_MAX_SIZE ((BEACON_FILTER_TABLE_MAX_IE_NUM * \ BEACON_FILTER_TABLE_IE_ENTRY_SIZE) + \ (BEACON_FILTER_TABLE_MAX_VENDOR_SPECIFIC_IE_NUM * \ BEACON_FILTER_TABLE_EXTRA_VENDOR_SPECIFIC_IE_SIZE)) struct acx_beacon_filter_ie_table { struct acx_header header; u8 role_id; u8 num_ie; u8 pad[2]; u8 table[BEACON_FILTER_TABLE_MAX_SIZE]; } __packed; struct acx_conn_monit_params { struct acx_header header; u8 role_id; u8 padding[3]; __le32 synch_fail_thold; /* number of beacons missed */ __le32 bss_lose_timeout; /* number of TU's from synch fail */ } __packed; struct acx_bt_wlan_coex { struct acx_header header; u8 enable; u8 pad[3]; } __packed; struct acx_bt_wlan_coex_param { struct acx_header header; __le32 params[WLCORE_CONF_SG_PARAMS_MAX]; u8 param_idx; u8 padding[3]; } __packed; struct acx_dco_itrim_params { struct acx_header header; u8 enable; u8 padding[3]; __le32 timeout; } __packed; struct acx_energy_detection { struct acx_header header; /* The RX Clear Channel Assessment threshold in the PHY */ __le16 rx_cca_threshold; u8 tx_energy_detection; u8 pad; } __packed; struct acx_beacon_broadcast { struct acx_header header; u8 role_id; /* Enables receiving of broadcast packets in PS mode */ u8 rx_broadcast_in_ps; __le16 beacon_rx_timeout; __le16 broadcast_timeout; /* Consecutive PS Poll failures before updating the host */ u8 ps_poll_threshold; u8 pad[1]; } __packed; struct acx_event_mask { struct acx_header header; __le32 event_mask; __le32 high_event_mask; /* Unused */ } __packed; #define SCAN_PASSIVE BIT(0) #define SCAN_5GHZ_BAND BIT(1) #define SCAN_TRIGGERED BIT(2) #define SCAN_PRIORITY_HIGH BIT(3) /* When set, disable HW encryption */ #define DF_ENCRYPTION_DISABLE 0x01 #define DF_SNIFF_MODE_ENABLE 0x80 struct acx_feature_config { struct acx_header header; u8 role_id; u8 padding[3]; __le32 options; __le32 data_flow_options; } __packed; struct acx_current_tx_power { struct acx_header header; u8 role_id; u8 current_tx_power; u8 padding[2]; } __packed; struct acx_wake_up_condition { struct acx_header header; u8 role_id; u8 wake_up_event; /* Only one bit can be set */ u8 listen_interval; u8 pad[1]; } __packed; struct acx_aid { struct acx_header header; /* * To be set when associated with an AP. */ u8 role_id; u8 reserved; __le16 aid; } __packed; enum acx_preamble_type { ACX_PREAMBLE_LONG = 0, ACX_PREAMBLE_SHORT = 1 }; struct acx_preamble { struct acx_header header; /* * When set, the WiLink transmits the frames with a short preamble and * when cleared, the WiLink transmits the frames with a long preamble. */ u8 role_id; u8 preamble; u8 padding[2]; } __packed; enum acx_ctsprotect_type { CTSPROTECT_DISABLE = 0, CTSPROTECT_ENABLE = 1 }; struct acx_ctsprotect { struct acx_header header; u8 role_id; u8 ctsprotect; u8 padding[2]; } __packed; struct acx_rate_class { __le32 enabled_rates; u8 short_retry_limit; u8 long_retry_limit; u8 aflags; u8 reserved; }; struct acx_rate_policy { struct acx_header header; __le32 rate_policy_idx; struct acx_rate_class rate_policy; } __packed; struct acx_ac_cfg { struct acx_header header; u8 role_id; u8 ac; u8 aifsn; u8 cw_min; __le16 cw_max; __le16 tx_op_limit; } __packed; struct acx_tid_config { struct acx_header header; u8 role_id; u8 queue_id; u8 channel_type; u8 tsid; u8 ps_scheme; u8 ack_policy; u8 padding[2]; __le32 apsd_conf[2]; } __packed; struct acx_frag_threshold { struct acx_header header; __le16 frag_threshold; u8 padding[2]; } __packed; struct acx_tx_config_options { struct acx_header header; __le16 tx_compl_timeout; /* msec */ __le16 tx_compl_threshold; /* number of packets */ } __packed; struct wl12xx_acx_config_memory { struct acx_header header; u8 rx_mem_block_num; u8 tx_min_mem_block_num; u8 num_stations; u8 num_ssid_profiles; __le32 total_tx_descriptors; u8 dyn_mem_enable; u8 tx_free_req; u8 rx_free_req; u8 tx_min; u8 fwlog_blocks; u8 padding[3]; } __packed; struct wl1271_acx_mem_map { struct acx_header header; __le32 code_start; __le32 code_end; __le32 wep_defkey_start; __le32 wep_defkey_end; __le32 sta_table_start; __le32 sta_table_end; __le32 packet_template_start; __le32 packet_template_end; /* Address of the TX result interface (control block) */ __le32 tx_result; __le32 tx_result_queue_start; __le32 queue_memory_start; __le32 queue_memory_end; __le32 packet_memory_pool_start; __le32 packet_memory_pool_end; __le32 debug_buffer1_start; __le32 debug_buffer1_end; __le32 debug_buffer2_start; __le32 debug_buffer2_end; /* Number of blocks FW allocated for TX packets */ __le32 num_tx_mem_blocks; /* Number of blocks FW allocated for RX packets */ __le32 num_rx_mem_blocks; /* the following 4 fields are valid in SLAVE mode only */ u8 *tx_cbuf; u8 *rx_cbuf; __le32 rx_ctrl; __le32 tx_ctrl; } __packed; struct wl1271_acx_rx_config_opt { struct acx_header header; __le16 mblk_threshold; __le16 threshold; __le16 timeout; u8 queue_type; u8 reserved; } __packed; struct wl1271_acx_bet_enable { struct acx_header header; u8 role_id; u8 enable; u8 max_consecutive; u8 padding[1]; } __packed; #define ACX_IPV4_VERSION 4 #define ACX_IPV6_VERSION 6 #define ACX_IPV4_ADDR_SIZE 4 /* bitmap of enabled arp_filter features */ #define ACX_ARP_FILTER_ARP_FILTERING BIT(0) #define ACX_ARP_FILTER_AUTO_ARP BIT(1) struct wl1271_acx_arp_filter { struct acx_header header; u8 role_id; u8 version; /* ACX_IPV4_VERSION, ACX_IPV6_VERSION */ u8 enable; /* bitmap of enabled ARP filtering features */ u8 padding[1]; u8 address[16]; /* The configured device IP address - all ARP requests directed to this IP address will pass through. For IPv4, the first four bytes are used. */ } __packed; struct wl1271_acx_pm_config { struct acx_header header; __le32 host_clk_settling_time; u8 host_fast_wakeup_support; u8 padding[3]; } __packed; struct wl1271_acx_keep_alive_mode { struct acx_header header; u8 role_id; u8 enabled; u8 padding[2]; } __packed; enum { ACX_KEEP_ALIVE_NO_TX = 0, ACX_KEEP_ALIVE_PERIOD_ONLY }; enum { ACX_KEEP_ALIVE_TPL_INVALID = 0, ACX_KEEP_ALIVE_TPL_VALID }; struct wl1271_acx_keep_alive_config { struct acx_header header; u8 role_id; u8 index; u8 tpl_validation; u8 trigger; __le32 period; } __packed; /* TODO: maybe this needs to be moved somewhere else? */ #define HOST_IF_CFG_RX_FIFO_ENABLE BIT(0) #define HOST_IF_CFG_TX_EXTRA_BLKS_SWAP BIT(1) #define HOST_IF_CFG_TX_PAD_TO_SDIO_BLK BIT(3) #define HOST_IF_CFG_RX_PAD_TO_SDIO_BLK BIT(4) #define HOST_IF_CFG_ADD_RX_ALIGNMENT BIT(6) enum { WL1271_ACX_TRIG_TYPE_LEVEL = 0, WL1271_ACX_TRIG_TYPE_EDGE, }; enum { WL1271_ACX_TRIG_DIR_LOW = 0, WL1271_ACX_TRIG_DIR_HIGH, WL1271_ACX_TRIG_DIR_BIDIR, }; enum { WL1271_ACX_TRIG_ENABLE = 1, WL1271_ACX_TRIG_DISABLE, }; enum { WL1271_ACX_TRIG_METRIC_RSSI_BEACON = 0, WL1271_ACX_TRIG_METRIC_RSSI_DATA, WL1271_ACX_TRIG_METRIC_SNR_BEACON, WL1271_ACX_TRIG_METRIC_SNR_DATA, }; enum { WL1271_ACX_TRIG_IDX_RSSI = 0, WL1271_ACX_TRIG_COUNT = 8, }; struct wl1271_acx_rssi_snr_trigger { struct acx_header header; u8 role_id; u8 metric; u8 type; u8 dir; __le16 threshold; __le16 pacing; /* 0 - 60000 ms */ u8 hysteresis; u8 index; u8 enable; u8 padding[1]; }; struct wl1271_acx_rssi_snr_avg_weights { struct acx_header header; u8 role_id; u8 padding[3]; u8 rssi_beacon; u8 rssi_data; u8 snr_beacon; u8 snr_data; }; /* special capability bit (not employed by the 802.11n spec) */ #define WL12XX_HT_CAP_HT_OPERATION BIT(16) /* * ACX_PEER_HT_CAP * Configure HT capabilities - declare the capabilities of the peer * we are connected to. */ struct wl1271_acx_ht_capabilities { struct acx_header header; /* bitmask of capability bits supported by the peer */ __le32 ht_capabilites; /* Indicates to which link these capabilities apply. */ u8 hlid; /* * This the maximum A-MPDU length supported by the AP. The FW may not * exceed this length when sending A-MPDUs */ u8 ampdu_max_length; /* This is the minimal spacing required when sending A-MPDUs to the AP*/ u8 ampdu_min_spacing; u8 padding; } __packed; /* * ACX_HT_BSS_OPERATION * Configure HT capabilities - AP rules for behavior in the BSS. */ struct wl1271_acx_ht_information { struct acx_header header; u8 role_id; /* Values: 0 - RIFS not allowed, 1 - RIFS allowed */ u8 rifs_mode; /* Values: 0 - 3 like in spec */ u8 ht_protection; /* Values: 0 - GF protection not required, 1 - GF protection required */ u8 gf_protection; /*Values: 0 - TX Burst limit not required, 1 - TX Burst Limit required*/ u8 ht_tx_burst_limit; /* * Values: 0 - Dual CTS protection not required, * 1 - Dual CTS Protection required * Note: When this value is set to 1 FW will protect all TXOP with RTS * frame and will not use CTS-to-self regardless of the value of the * ACX_CTS_PROTECTION information element */ u8 dual_cts_protection; u8 padding[2]; } __packed; struct wl1271_acx_ba_initiator_policy { struct acx_header header; /* Specifies role Id, Range 0-7, 0xFF means ANY role. */ u8 role_id; /* * Per TID setting for allowing TX BA. Set a bit to 1 to allow * TX BA sessions for the corresponding TID. */ u8 tid_bitmap; /* Windows size in number of packets */ u8 win_size; u8 padding1[1]; /* As initiator inactivity timeout in time units(TU) of 1024us */ u16 inactivity_timeout; u8 padding[2]; } __packed; struct wl1271_acx_ba_receiver_setup { struct acx_header header; /* Specifies link id, range 0-31 */ u8 hlid; u8 tid; u8 enable; /* Windows size in number of packets */ u8 win_size; /* BA session starting sequence number. RANGE 0-FFF */ u16 ssn; u8 padding[2]; } __packed; struct wl12xx_acx_fw_tsf_information { struct acx_header header; u8 role_id; u8 padding1[3]; __le32 current_tsf_high; __le32 current_tsf_low; __le32 last_bttt_high; __le32 last_tbtt_low; u8 last_dtim_count; u8 padding2[3]; } __packed; struct wl1271_acx_ps_rx_streaming { struct acx_header header; u8 role_id; u8 tid; u8 enable; /* interval between triggers (10-100 msec) */ u8 period; /* timeout before first trigger (0-200 msec) */ u8 timeout; u8 padding[3]; } __packed; struct wl1271_acx_ap_max_tx_retry { struct acx_header header; u8 role_id; u8 padding_1; /* * the number of frames transmission failures before * issuing the aging event. */ __le16 max_tx_retry; } __packed; struct wl1271_acx_config_ps { struct acx_header header; u8 exit_retries; u8 enter_retries; u8 padding[2]; __le32 null_data_rate; } __packed; struct wl1271_acx_inconnection_sta { struct acx_header header; u8 addr[ETH_ALEN]; u8 role_id; u8 padding; } __packed; /* * ACX_FM_COEX_CFG * set the FM co-existence parameters. */ struct wl1271_acx_fm_coex { struct acx_header header; /* enable(1) / disable(0) the FM Coex feature */ u8 enable; /* * Swallow period used in COEX PLL swallowing mechanism. * 0xFF = use FW default */ u8 swallow_period; /* * The N divider used in COEX PLL swallowing mechanism for Fref of * 38.4/19.2 Mhz. 0xFF = use FW default */ u8 n_divider_fref_set_1; /* * The N divider used in COEX PLL swallowing mechanism for Fref of * 26/52 Mhz. 0xFF = use FW default */ u8 n_divider_fref_set_2; /* * The M divider used in COEX PLL swallowing mechanism for Fref of * 38.4/19.2 Mhz. 0xFFFF = use FW default */ __le16 m_divider_fref_set_1; /* * The M divider used in COEX PLL swallowing mechanism for Fref of * 26/52 Mhz. 0xFFFF = use FW default */ __le16 m_divider_fref_set_2; /* * The time duration in uSec required for COEX PLL to stabilize. * 0xFFFFFFFF = use FW default */ __le32 coex_pll_stabilization_time; /* * The time duration in uSec required for LDO to stabilize. * 0xFFFFFFFF = use FW default */ __le16 ldo_stabilization_time; /* * The disturbed frequency band margin around the disturbed frequency * center (single sided). * For example, if 2 is configured, the following channels will be * considered disturbed channel: * 80 +- 0.1 MHz, 91 +- 0.1 MHz, 98 +- 0.1 MHz, 102 +- 0.1 MH * 0xFF = use FW default */ u8 fm_disturbed_band_margin; /* * The swallow clock difference of the swallowing mechanism. * 0xFF = use FW default */ u8 swallow_clk_diff; } __packed; #define ACX_RATE_MGMT_ALL_PARAMS 0xff struct wl12xx_acx_set_rate_mgmt_params { struct acx_header header; u8 index; /* 0xff to configure all params */ u8 padding1; __le16 rate_retry_score; __le16 per_add; __le16 per_th1; __le16 per_th2; __le16 max_per; u8 inverse_curiosity_factor; u8 tx_fail_low_th; u8 tx_fail_high_th; u8 per_alpha_shift; u8 per_add_shift; u8 per_beta1_shift; u8 per_beta2_shift; u8 rate_check_up; u8 rate_check_down; u8 rate_retry_policy[ACX_RATE_MGMT_NUM_OF_RATES]; u8 padding2[2]; } __packed; struct wl12xx_acx_config_hangover { struct acx_header header; __le32 recover_time; u8 hangover_period; u8 dynamic_mode; u8 early_termination_mode; u8 max_period; u8 min_period; u8 increase_delta; u8 decrease_delta; u8 quiet_time; u8 increase_time; u8 window_size; u8 padding[2]; } __packed; struct acx_default_rx_filter { struct acx_header header; u8 enable; /* action of type FILTER_XXX */ u8 default_action; u8 pad[2]; } __packed; struct acx_rx_filter_cfg { struct acx_header header; u8 enable; /* 0 - WL1271_MAX_RX_FILTERS-1 */ u8 index; u8 action; u8 num_fields; u8 fields[0]; } __packed; struct acx_roaming_stats { struct acx_header header; u8 role_id; u8 pad[3]; u32 missed_beacons; u8 snr_data; u8 snr_bacon; s8 rssi_data; s8 rssi_beacon; } __packed; enum { ACX_WAKE_UP_CONDITIONS = 0x0000, ACX_MEM_CFG = 0x0001, ACX_SLOT = 0x0002, ACX_AC_CFG = 0x0003, ACX_MEM_MAP = 0x0004, ACX_AID = 0x0005, ACX_MEDIUM_USAGE = 0x0006, ACX_STATISTICS = 0x0007, ACX_PWR_CONSUMPTION_STATISTICS = 0x0008, ACX_TID_CFG = 0x0009, ACX_PS_RX_STREAMING = 0x000A, ACX_BEACON_FILTER_OPT = 0x000B, ACX_NOISE_HIST = 0x000C, ACX_HDK_VERSION = 0x000D, ACX_PD_THRESHOLD = 0x000E, ACX_TX_CONFIG_OPT = 0x000F, ACX_CCA_THRESHOLD = 0x0010, ACX_EVENT_MBOX_MASK = 0x0011, ACX_CONN_MONIT_PARAMS = 0x0012, ACX_DISABLE_BROADCASTS = 0x0013, ACX_BCN_DTIM_OPTIONS = 0x0014, ACX_SG_ENABLE = 0x0015, ACX_SG_CFG = 0x0016, ACX_FM_COEX_CFG = 0x0017, ACX_BEACON_FILTER_TABLE = 0x0018, ACX_ARP_IP_FILTER = 0x0019, ACX_ROAMING_STATISTICS_TBL = 0x001A, ACX_RATE_POLICY = 0x001B, ACX_CTS_PROTECTION = 0x001C, ACX_SLEEP_AUTH = 0x001D, ACX_PREAMBLE_TYPE = 0x001E, ACX_ERROR_CNT = 0x001F, ACX_IBSS_FILTER = 0x0020, ACX_SERVICE_PERIOD_TIMEOUT = 0x0021, ACX_TSF_INFO = 0x0022, ACX_CONFIG_PS_WMM = 0x0023, ACX_ENABLE_RX_DATA_FILTER = 0x0024, ACX_SET_RX_DATA_FILTER = 0x0025, ACX_GET_DATA_FILTER_STATISTICS = 0x0026, ACX_RX_CONFIG_OPT = 0x0027, ACX_FRAG_CFG = 0x0028, ACX_BET_ENABLE = 0x0029, ACX_RSSI_SNR_TRIGGER = 0x002A, ACX_RSSI_SNR_WEIGHTS = 0x002B, ACX_KEEP_ALIVE_MODE = 0x002C, ACX_SET_KEEP_ALIVE_CONFIG = 0x002D, ACX_BA_SESSION_INIT_POLICY = 0x002E, ACX_BA_SESSION_RX_SETUP = 0x002F, ACX_PEER_HT_CAP = 0x0030, ACX_HT_BSS_OPERATION = 0x0031, ACX_COEX_ACTIVITY = 0x0032, ACX_BURST_MODE = 0x0033, ACX_SET_RATE_MGMT_PARAMS = 0x0034, ACX_GET_RATE_MGMT_PARAMS = 0x0035, ACX_SET_RATE_ADAPT_PARAMS = 0x0036, ACX_SET_DCO_ITRIM_PARAMS = 0x0037, ACX_GEN_FW_CMD = 0x0038, ACX_HOST_IF_CFG_BITMAP = 0x0039, ACX_MAX_TX_FAILURE = 0x003A, ACX_UPDATE_INCONNECTION_STA_LIST = 0x003B, DOT11_RX_MSDU_LIFE_TIME = 0x003C, DOT11_CUR_TX_PWR = 0x003D, DOT11_RTS_THRESHOLD = 0x003E, DOT11_GROUP_ADDRESS_TBL = 0x003F, ACX_PM_CONFIG = 0x0040, ACX_CONFIG_PS = 0x0041, ACX_CONFIG_HANGOVER = 0x0042, ACX_FEATURE_CFG = 0x0043, ACX_PROTECTION_CFG = 0x0044, }; int wl1271_acx_wake_up_conditions(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 wake_up_event, u8 listen_interval); int wl1271_acx_sleep_auth(struct wl1271 *wl, u8 sleep_auth); int wl1271_acx_tx_power(struct wl1271 *wl, struct wl12xx_vif *wlvif, int power); int wl1271_acx_feature_cfg(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_mem_map(struct wl1271 *wl, struct acx_header *mem_map, size_t len); int wl1271_acx_rx_msdu_life_time(struct wl1271 *wl); int wl1271_acx_slot(struct wl1271 *wl, struct wl12xx_vif *wlvif, enum acx_slot_type slot_time); int wl1271_acx_group_address_tbl(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable, void *mc_list, u32 mc_list_len); int wl1271_acx_service_period_timeout(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_rts_threshold(struct wl1271 *wl, struct wl12xx_vif *wlvif, u32 rts_threshold); int wl1271_acx_dco_itrim_params(struct wl1271 *wl); int wl1271_acx_beacon_filter_opt(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable_filter); int wl1271_acx_beacon_filter_table(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_conn_monit_params(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable); int wl1271_acx_sg_enable(struct wl1271 *wl, bool enable); int wl12xx_acx_sg_cfg(struct wl1271 *wl); int wl1271_acx_cca_threshold(struct wl1271 *wl); int wl1271_acx_bcn_dtim_options(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_aid(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 aid); int wl1271_acx_event_mbox_mask(struct wl1271 *wl, u32 event_mask); int wl1271_acx_set_preamble(struct wl1271 *wl, struct wl12xx_vif *wlvif, enum acx_preamble_type preamble); int wl1271_acx_cts_protect(struct wl1271 *wl, struct wl12xx_vif *wlvif, enum acx_ctsprotect_type ctsprotect); int wl1271_acx_statistics(struct wl1271 *wl, void *stats); int wl1271_acx_sta_rate_policies(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_ap_rate_policy(struct wl1271 *wl, struct conf_tx_rate_class *c, u8 idx); int wl1271_acx_ac_cfg(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 ac, u8 cw_min, u16 cw_max, u8 aifsn, u16 txop); int wl1271_acx_tid_cfg(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 queue_id, u8 channel_type, u8 tsid, u8 ps_scheme, u8 ack_policy, u32 apsd_conf0, u32 apsd_conf1); int wl1271_acx_frag_threshold(struct wl1271 *wl, u32 frag_threshold); int wl1271_acx_tx_config_options(struct wl1271 *wl); int wl12xx_acx_mem_cfg(struct wl1271 *wl); int wl1271_acx_init_mem_config(struct wl1271 *wl); int wl1271_acx_init_rx_interrupt(struct wl1271 *wl); int wl1271_acx_smart_reflex(struct wl1271 *wl); int wl1271_acx_bet_enable(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable); int wl1271_acx_arp_ip_filter(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 enable, __be32 address); int wl1271_acx_pm_config(struct wl1271 *wl); int wl1271_acx_keep_alive_mode(struct wl1271 *wl, struct wl12xx_vif *vif, bool enable); int wl1271_acx_keep_alive_config(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 index, u8 tpl_valid); int wl1271_acx_rssi_snr_trigger(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable, s16 thold, u8 hyst); int wl1271_acx_rssi_snr_avg_weights(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_set_ht_capabilities(struct wl1271 *wl, struct ieee80211_sta_ht_cap *ht_cap, bool allow_ht_operation, u8 hlid); int wl1271_acx_set_ht_information(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 ht_operation_mode); int wl12xx_acx_set_ba_initiator_policy(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl12xx_acx_set_ba_receiver_session(struct wl1271 *wl, u8 tid_index, u16 ssn, bool enable, u8 peer_hlid, u8 win_size); int wl12xx_acx_tsf_info(struct wl1271 *wl, struct wl12xx_vif *wlvif, u64 *mactime); int wl1271_acx_ps_rx_streaming(struct wl1271 *wl, struct wl12xx_vif *wlvif, bool enable); int wl1271_acx_ap_max_tx_retry(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl12xx_acx_config_ps(struct wl1271 *wl, struct wl12xx_vif *wlvif); int wl1271_acx_set_inconnection_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *addr); int wl1271_acx_fm_coex(struct wl1271 *wl); int wl12xx_acx_set_rate_mgmt_params(struct wl1271 *wl); int wl12xx_acx_config_hangover(struct wl1271 *wl); int wlcore_acx_average_rssi(struct wl1271 *wl, struct wl12xx_vif *wlvif, s8 *avg_rssi); int wl1271_acx_default_rx_filter_enable(struct wl1271 *wl, bool enable, enum rx_filter_action action); int wl1271_acx_set_rx_filter(struct wl1271 *wl, u8 index, bool enable, struct wl12xx_rx_filter *filter); #endif /* __WL1271_ACX_H__ */
2023-08-17T01:26:28.774034
https://example.com/article/1448
Welcome to the PokéCommunity! Hi there! Thanks for visiting PokéCommunity. We’re a group of Pokémon fans dedicated to providing the best place on the Internet for discussing ideas and sharing fan-made content. Welcome! We’re glad you’re here. In order to join our community we need you to create an account with us. Doing so will allow you to make posts, submit and view fan art and fan fiction, download fan-made games, and much more. It’s quick and easy; just click here and follow the instructions. PGM is all set for February. This month, we're playing through a game known as Eevee's Tile Trial. If you wish to earn rewards, please head over to our event thread by clicking on the provided link and give yourself a shot at the game! Hey Unregistered! How fast can you game? The Marathon II is up and running in Video Game's - compete against your friends to see how quickly you can complete sixty intense in-game challenges. See you there! You may know this game as Pokémon Olivine Version. I changed the name and the whole storyline. I am, however, still using RMXP and Poccil's Pokémon Essentials Starter Kit. |Maximus|, creator of Pokémon Sparkling Yellow, started this Project off, and I took over it. So, thanks to him! -Storyline- You wake up, after sleeping. Yesterday, was a memorable night. You earned the eighth badge from the Johto Region, you hiked through Victory Road, and you defeated the Elite Four. Once you got home, you healed your Pokemon and set them on the table. Then, you went to sleep. You wake up hours later, and notice that your Pokemon have gone missing. You run out the door and see two goons heading on a ship with two bags filled with Pokeballs. Still worried, you go back to sleep and prepare to deal with this problem in the morning. After a rough night, you wake up and tell your Mom what happened. She immediately sends you over to Professor Elm's Laboratory. He asks what happened, and you and your Mom inform him with every detail. He immediately knows who it was. He says that it was Team Rocket. After a moment of thinking, Professor Elm has an idea. He knows that Team Rocket's Secret Hideout is in the Sintec Region, since they moved it after their plan to take over the Radio Tower was unsuccessful. He decides to send you to the Sintec Region. After the boat leaves Newbark Town, you are sleepy, so you fall asleep in your room... Later on, you hear banging on the door. You wake up and realize that you overslept, and you are already at the Sintec Region. You get off of the boat, and you see the same two goons that you saw the night before, running off with three bags now. You step foot on land, and you get pushed. You turn around to see your rival standing behind you with a mischeivous grin on his/her face. He runs off after he sees the two rockets, and leaves you standing there. After that, you head off into the Sintec Region. Will you stop Team Rocket from stealing everyone's Pokemon? STORYLINE IS BEING WORKED ON MAJORLY -Screenshots-*These Screenshots are old. I will not have the larger resolution* (Old Screenshots) Spoiler: New Screenshots -Features- Pokemon Colorer Jeff, the Pokemon Colorer will make your Pokemon Shiny for $16,000 (Price may change) However, he will need some materials. You can gather items according to your Pokemon's type, and it's level. If your Pokemon's 1st Type is Fire, then you will need to get a Magma Stone (New item ;D...I think...) and how many Magma Stones you get, will depend on it's level. Battle Simulator This feature will allow you to test your Pokemon's strength by choosing a Pokemon from a list of seen Pokemon, and battling them. You will not gain EXP from these battles ;D 5th Gen Pokemon This game will have 5th Gen Pokemon, including some of the other 493 Pokemon. Maybe a couple of fakes Play as Lyra/Ethan from HG/SS Self-explanatory... Maxlevel is 200 Your Pokemon will be over 100 and they will be allowed to go to level 200. I also included a little area that will allow you to capture Pokemon over level 100, but to get into that area, you must have all eight badges, and must have beaten the elite four -Team- Creator - MeTiler - IncognitoSpriter - Icegod64Mapper - Incognito I still need more team members, so just because these three positions are filled, doesn't mean that I don't need any more team members ;D Might as well start at the beginning, eh? The grammar used there is completely off and makes no sense. For me, at least, it was annoying to read when the rest was pretty well typed. Quote: You earned the eighth badge from the Johto Region, you hiked through Victory Road, and you defeated the Elite Four. Once you got home, you healed your Pokemon and set them on the table. Then, you went to sleep. I get what you are trying to do; summarizing an entire journey in a single paragraph isn't easy. Still, it was severely anti-climactic. Quote: You wake up hours later, and notice that your Pokemon have gone missing. You run out the door and see two goons heading on a ship with two bags filled with Pokeballs. Still worried, you go back to sleep and prepare to deal with this problem in the morning. You lost my interest here. Two goons just nabbed my Pokemon and I'm going back to sleep to deal with it in the morning? No offense, but if someone stole my Pokemon, I'd be chasing them down. Now, mind you, that may not have been what you meant. Did you mean to say, "You ran after them, but they boarded a ship and set sail; you continued to chase them down the shore line, but they were nothing more than a speck on the horizon by time the implications of what just happened really hit you."? That's a bit wordy, and I wouldn't recommend using that (I'm just shooting for clarification here), because that would make more sense. Quote: After a rough night, you wake up and tell your Mom what happened. She immediately sends you over to Professor Elm's Laboratory. He asks what happened, and you and your Mom inform him with every detail. He immediately knows who it was. He says that it was Team Rocket. After a moment of thinking, Professor Elm has an idea. He knows that Team Rocket's Secret Hideout is in the Sintec Region, since they moved it after their plan to take over the Radio Tower was unsuccessful. He decides to send you to the Sintec Region. After the boat leaves Newbark Town, you are sleepy, so you fall asleep in your room... That character seems pretty narcoleptic at this point... Joking aside, this isn't very interesting either. I suppose I can't judge on this portion without seeing the dialogue, but you honestly make it sound really boring. Quote: Later on, you hear banging on the door. You wake up and realize that you overslept, and you are already at the Sintec Region. You get off of the boat, and you see the same two goons that you saw the night before, running off with three bags now. You step foot on land, and you get pushed. You turn around to see your rival standing behind you with a mischeivous grin on his/her face. He runs off after he sees the two rockets, and leaves you standing there. After that, you head off into the Sintec Region. Will you stop Team Rocket from stealing everyone's Pokemon? Again, you overslept? Not only that, but you see the exact same two goons running off with more bags of Pokemon? Do these goons serve a purpose here? Because honestly, unless they are plot specific or serve a purpose at this point, I can't see a use for them showing up randomly when you get off the boat. And your rival? It's extremely odd for him to just show up now on the boat as you are getting off. The lack of back story, or introduction to him, makes him seem misplaced and forced into the storyline. Take with a grain of salt, if you will, but you'll definitely need a more interesting story line if you want your game to stick out around here. __________________ "All that has been lost shall be regained. You must simply find the path, then find the way." - Elder Gywain. Might as well start at the beginning, eh? The grammar used there is completely off and makes no sense. For me, at least, it was annoying to read when the rest was pretty well typed. I get what you are trying to do; summarizing an entire journey in a single paragraph isn't easy. Still, it was severely anti-climactic. You lost my interest here. Two goons just nabbed my Pokemon and I'm going back to sleep to deal with it in the morning? No offense, but if someone stole my Pokemon, I'd be chasing them down. Now, mind you, that may not have been what you meant. Did you mean to say, "You ran after them, but they boarded a ship and set sail; you continued to chase them down the shore line, but they were nothing more than a speck on the horizon by time the implications of what just happened really hit you."? That's a bit wordy, and I wouldn't recommend using that (I'm just shooting for clarification here), because that would make more sense. That character seems pretty narcoleptic at this point... Joking aside, this isn't very interesting either. I suppose I can't judge on this portion without seeing the dialogue, but you honestly make it sound really boring. Again, you overslept? Not only that, but you see the exact same two goons running off with more bags of Pokemon? Do these goons serve a purpose here? Because honestly, unless they are plot specific or serve a purpose at this point, I can't see a use for them showing up randomly when you get off the boat. And your rival? It's extremely odd for him to just show up now on the boat as you are getting off. The lack of back story, or introduction to him, makes him seem misplaced and forced into the storyline. Take with a grain of salt, if you will, but you'll definitely need a more interesting story line if you want your game to stick out around here. You know I would have posted here earlier if you'd updated your sig faster. It's always important to keep things updated. Anyway, nice screen, I like the idea of being able to play as Lyra. Will all of the cute things her Pokemon do in HG/SS happen still? The other features sound ok, but you should really give more information. If you want to keep it tidy then just do it like in my sig. This is looking very cool, dispite the long first post by that one guy, I like the story line but, Why is your rival in that region and why would he run after them? (I didnt read it very well) But anyway, this is looking awesome, When the Demo Is realeased I am defenitally going to Test It. You know I would have posted here earlier if you'd updated your sig faster. It's always important to keep things updated. Anyway, nice screen, I like the idea of being able to play as Lyra. Will all of the cute things her Pokemon do in HG/SS happen still? The other features sound ok, but you should really give more information. If you want to keep it tidy then just do it like in my sig. I'm not sure if her Pokemon will do the same thing I will update info about the features right after this post. Quote originally posted by Tranitar: This is looking very cool, dispite the long first post by that one guy, I like the story line but, Why is your rival in that region and why would he run after them? (I didnt read it very well) But anyway, this is looking awesome, When the Demo Is realeased I am defenitally going to Test It. And the storyline is also being worked on (Major Thanks to Yuoaman for helping me) I have been working on the Battle System graphics. Which seems to be a bad time since PokemonOI just showcased his take on the 5th Gen Battle system. Ah, enough chit-chat. Here is the Battle System screenshot. Credit to Spaceemotion for the 5th Gen Graphics I also want to welcome a new member to the team: Ice-God He is the Co-Spriter for Turquoise (We both sprite) He created the first gym leader for the Sintec Region. Her name is Oraline (Or-uh-line) She has all bug-type Pokemon. The sprite is also still being worked on lol. I already addressed that in my first post; he said that the story is still being worked on, so I assume it's subject to change. As for the new content: - I like the battle screen picture. It shows off a simple, clean, and elegant style (to me), and it's a lot less obtrusive than the originals. Will you be modifying the selection screen as well, or leaving it as it is in the picture? - The gym leader is nice as well. The only thing I could comment on is that she looks similar to Bugsy; it's probably the hair. Still, nice job so far. __________________ "All that has been lost shall be regained. You must simply find the path, then find the way." - Elder Gywain. I already addressed that in my first post; he said that the story is still being worked on, so I assume it's subject to change. As for the new content: - I like the battle screen picture. It shows off a simple, clean, and elegant style (to me), and it's a lot less obtrusive than the originals. Will you be modifying the selection screen as well, or leaving it as it is in the picture? - The gym leader is nice as well. The only thing I could comment on is that she looks similar to Bugsy; it's probably the hair. Still, nice job so far. Personally, I think she looks excellent now. As a modest spriter myself, the only thing I can point out is that her badge on her chest is hardly distinguishable. You might want to try a different color? __________________ "All that has been lost shall be regained. You must simply find the path, then find the way." - Elder Gywain. I'm siding with Raikt here in terms of the plot: it's not very well thought out ("we're working on it" is NOT an excuse; plot is the basis of a fangame, and games without it have no direction) and also uncannily like August Emerald's plot (which I tried to talk Dew out of). There's just... only so far I can suspend my disbelief, here. The fact that a seasoned trainer could have all of his/her Pokemon stolen while sleeping, especially from a secure place and after earning eight badges, is pretty silly. It's obviously just an excuse to restart the adventure and not have to create a new hero. Stop cutting corners here; you'd have fewer plot holes if you didn't have the hero be a seasoned trainer, or if you really want to, at least give it some thought. "Stop Team Rocket from stealing everyone's Pokemon" is an awful excuse for a plot. First off, despite what the anime might tell you, TR does more than just steal peoples' pwecious pogeymans. They're the Pokemon world's mafia and do all sorts of ominous things. Play FRLG. Second, um, EVERYONE'S Pokemon? There's gotta be some huge security issues here if a group that's threatening to STEAL ALL THE POKEYMANS is being taken seriously at all. ...You know what, I... I want to help you with this. Because you've got some sort of skill here, but this is just so bad and so fixable that I can't just leave you like this. :/ PM me, yeah? (Also. All of your features are just pandering to the audience (woooo, fifth gen Pokemon, woo shiny graphics wooooooo) but no evidence of a real game here. Just saying.) Personally, I think she looks excellent now. As a modest spriter myself, the only thing I can point out is that her badge on her chest is hardly distinguishable. You might want to try a different color? Thanks a lot. I will try and edit the badge on her chest, honestly I didn't even notice that there. Quote originally posted by Zephyr+: I'm siding with Raikt here in terms of the plot: it's not very well thought out ("we're working on it" is NOT an excuse; plot is the basis of a fangame, and games without it have no direction) and also uncannily like August Emerald's plot (which I tried to talk Dew out of). There's just... only so far I can suspend my disbelief, here. The fact that a seasoned trainer could have all of his/her Pokemon stolen while sleeping, especially from a secure place and after earning eight badges, is pretty silly. It's obviously just an excuse to restart the adventure and not have to create a new hero. Stop cutting corners here; you'd have fewer plot holes if you didn't have the hero be a seasoned trainer, or if you really want to, at least give it some thought. "Stop Team Rocket from stealing everyone's Pokemon" is an awful excuse for a plot. First off, despite what the anime might tell you, TR does more than just steal peoples' pwecious pogeymans. They're the Pokemon world's mafia and do all sorts of ominous things. Play FRLG. Second, um, EVERYONE'S Pokemon? There's gotta be some huge security issues here if a group that's threatening to STEAL ALL THE POKEYMANS is being taken seriously at all. ...You know what, I... I want to help you with this. Because you've got some sort of skill here, but this is just so bad and so fixable that I can't just leave you like this. :/ PM me, yeah? (Also. All of your features are just pandering to the audience (woooo, fifth gen Pokemon, woo shiny graphics wooooooo) but no evidence of a real game here. Just saying.) ...Thanks for the criticism...I guess. I don't know how many times I will say this.I came up with the story in about 10 minutes. I didn't really think it through. It is being worked on entirely.I have a lot planned for this game. I actually have a real interesting plot, but I am working on it some more (Credit to Novus, and Yuoaman for helping me with it) I don't really want your help if apparently "this isn't a real game." And my game is so bad that you NEED to help me. And, for the record, I have played FRLG. And have beat it several times. And there was NO excuse to play as Lyra. I really like the character so I made her in the game. How do I say what I want to say with out the jealousy monster eating me? Cilbera I love it! I love how you make your own tiles and how you have Mijumaru (my fav 5th gen)! I would love to help you but I dont want to ruin your project with my very sloppy English and my French once again the monster has devoured me because of this awesome game!!!! The PokéCommunity Meta Pokémon characters and images belong to The Pokémon Company International and Nintendo. This website is in no way affiliated with or endorsed by Nintendo, Creatures, GAMEFREAK, or The Pokémon Company International. We just love Pokémon.
2024-01-10T01:26:28.774034
https://example.com/article/7773
Q: Can a data structure implementation know if it is/isn't on the heap? Consider a main file, and another file that implements a data structure (say: linked list). The caller of the linked list can either put objects on the linked list on the stack or on the heap, and I assume that is the responsibility of the caller. So when implementing the linked list, how does it know whether or not it's on the heap? Consider a typical "method" that removes an node from the list. How does the linked list know whether or not it ought to free that memory? From my understanding, freeing something on the stack causes undefined behavior. Because this is part of a class project, I'm unable to pass something (isOnHeap) to indicate whether or not the caller has put the memory on the heap (clarification: unable as in our implementation does not allow this), so I'm assuming there may be a common solution to this problem, especially considering how common a case it'd be. Note that the linked list implementation must handle freeing of its own memory (assumed this is given since its implementation is hidden from the caller). A: Here is simple is_on_stack(addr) function : int *stack_start = nullptr; bool is_on_stack(void* ptr) { int stack_probe; if( stack_start < &stack_probe ) return stack_start < ptr && ptr < &stack_probe; // stack grows upwards; else return &stack_probe < ptr && ptr < stack_start; // stack grows downwards; } int main() { int stack_probe = 0; stack_start = &stack_probe; int dummy; bool r1 = is_on_stack(&dummy); // shall be true int* heap_thing = (int*)malloc(sizeof(int)); bool r2 = is_on_stack(heap_thing); // shall be false } Key point here is these lines at the beginning of main() function: int stack_probe = 0; stack_start = &stack_probe;
2023-08-31T01:26:28.774034
https://example.com/article/1545
Creating Leverage to Counter Threats to Neurosurgical Practice. This article describes guiding principles utilized in practice. It is descriptive of the evolution of one of the largest neurosurgical practices in the United States. The objective is to identify and effectively create leverage in neurosurgical practice and to describe principles instrumental in the growth of this practice.Methods included data collection, responsiveness, recruitment, and innovation. Results demonstrate important strategies for creating and maintaining leverage, as well as principles that have enabled the practice to remain independent and continue to provide high-quality care.In conclusion, it is important to stay focused on potential sources of leverage, to gain advantage for the future, and maintain stability as healthcare changes occur. Quality data and outcomes will allow practice to continue to grow strategically.
2024-07-21T01:26:28.774034
https://example.com/article/3454
###### Significance of this study What is already known about this subject? ========================================= - Chronic obstructive pulmonary disease (COPD) causes such extrapulmonary complications as sarcopenia and impairments in cognitive, neuromuscular, and balancing functions. These complications predispose the patients to fall and transport-related injury, both of which are epidemiologically leading causes of traumatic brain injury (TBI). What are the new findings? ========================== - We showed that patients with COPD of both sex had an increased risk of TBI. The risk was highest in those who had an age of less than 65 years and at least 1 episode of severe acute exacerbation of COPD during the follow-up. How might these results change the focus of research or clinical practice? ========================================================================== - Patients and caregivers of COPD need to be aware of such an increased risk of TBI, for TBI would certainly complicate the management and rehabilitation of patients with COPD. Our findings would call for further research to clarify the causal mechanism underlying the association between COPD and TBI, and to develop effective measures to decrease the risk of TBI in this population. Introduction {#s1} ============ Chronic obstructive pulmonary disease (COPD) continues to be a great threat in public health globally.[@R1] The debilitating effect of COPD is not confined to the respiratory tract, but can involve multiple organ systems. Cognitive dysfunction, musculoskeletal deconditioning, and impairments in balance and instrumental activities (referring to those activities required to sustain daily living and self-care) of the patients have been well described.[@R1] These extrapulmonary complications might predispose patients to fall accidents,[@R12] particularly those who need supplemental oxygen.[@R14] Previous studies also demonstrated that COPD might have potentially detrimental effects on the driving performance of the patients, including those without hypoxemia.[@R15] Moreover, many patients also suffer from acute exacerbations, which accelerate disease progression and further compromise patients' functional capacity.[@R1] Meanwhile, traumatic brain injury (TBI) remains another great hazard to health. Epidemiological surveys around the world consistently reported falls and transport-associated injuries as major etiologies of TBI.[@R26] Based on this background, we hypothesized that patients with COPD might be susceptible to TBI, which would cause enhanced disability in the patients and complicate subsequent care. In this study, we tested our hypothesis using a nationwide population-based database. Materials and methods {#s2} ===================== Study objective, design, and population {#s2-1} --------------------------------------- In this study, we tested our hypothesis that patients with COPD have an increased risk of TBI. This is a retrospective cohort study using a subset of the National Health Insurance (NHI) Research Database containing comprehensive inpatient and outpatient claims of 1 million beneficiaries randomly selected from Taiwan's 23 million population between 1996 and 2013. All beneficiaries were screened for patients with COPD who were diagnosed between 2000 and 2008. A patient with COPD was defined as one who was 40 years or older, had received the diagnosis of COPD (defined as having such International Classification of Diseases, Ninth Revision, Clinically Modified (ICD-9-CM) codes as 491, 492, and 496) in at least 2 outpatient records (within 1 year apart) or 1 inpatient record, and had received COPD-specific medicinal prescriptions within 2 years that the diagnosis was made. The date when a patient met all these inclusion criteria was defined as the index date for the patient. The codes of all the available prescription medicines used to treat COPD in Taiwan during this same period of time were obtained from the official website of Taiwan's NHI Administration, Ministry of Health and Welfare.[@R38] [Online supplementary table S1](#SP1){ref-type="supplementary-material"} lists the COPD-specific medicinal prescriptions that were determined according to the contemporary Global Initiative for Chronic Obstructive Lung Disease (GOLD) guidelines parallel in time to our study period.[@R39] The diagnosis of TBI was specified by such ICD-9-CM codes as 800, 801, 803, 804, and 850--854, of which 852 and 853 specify hemorrhagic TBI while the others represent non-hemorrhagic TBI. A subject was identified as having an event of TBI when the subject had 1 record of emergency room visit, 1 inpatient record, or 2 outpatient records bearing TBI as a major diagnosis. We excluded patients who had already received the diagnosis of COPD or TBI before the year 2000, those who received the diagnosis of TBI earlier than the diagnosis of COPD, those who were chronically dependent on mechanical ventilation, and those without COPD-specific medicinal prescriptions. We also excluded patients who, within 1 year before and after the diagnosis of COPD, also received the diagnosis of asthma (ICD-9-CM 493) in at least 2 outpatient records or 1 inpatient record. Among all the included patients with COPD, we identified those patients who had at least 1 episode of severe acute exacerbation (defined as an emergency room visit or hospitalization with COPD as the primary diagnosis)[@R1] after the index date but before the occurrence of TBI or the end of follow-up to constitute the 'COPD~AE+~' group. Those remaining patients with COPD who had no severe acute exacerbation after the index date during follow-up constituted the 'COPD~AE−~' group. Subjects without COPD were randomly selected from the remaining beneficiaries to constitute the 'non-COPD' group. These 3 groups (namely 'COPD~AE+~', 'COPD~AE−~', 'non-COPD') were frequency matched in age, sex, and index date with a ratio of 1:3:3, respectively. For all included subjects, pertinent demographical data were obtained, including age, sex, living area, urbanization level, monthly income, enrollee category (containing 4 categories that served as an approximation of occupational and socioeconomic status: (1) full-time or regularly paid teachers and government employees; (2) employees of privately owned enterprises; (3) other employees or independent professionals; (4) low-income earners, unemployed pensioners, or veterans). Because COPD and TBI were both associated with multiple comorbidities, for each included subject we paid particular attention to identify the presence of coexisting morbidities. [Online supplementary table S2](#SP1){ref-type="supplementary-material"} lists the ICD-9-CM codes of all the disease entities included in this study. For all included subjects, data for 5 years following the index date were analyzed to determine the subsequent risk of developing TBI. Death was identified for competing risk analysis. For those who had been hospitalized due to TBI, days of hospital stay were calculated. Subjects missing any of the above-mentioned data, and subjects with insufficient follow-ups, were excluded. 10.1136/jim-2019-001207.supp1 Statistical analysis {#s2-2} -------------------- Data were presented as means with SD if normally distributed, and medians with IQR if otherwise. To account for the differences in baseline characteristics and comorbidities among the 3 groups ('COPD~AE+~', 'COPD~AE−~', and 'non-COPD'), we first compared the baseline characteristics among the 3 groups using Pearson's χ^2^ test for categorical variables and one-way analysis of variance for continuous variables. We then applied the method of inverse probability of treatment weighting (IPTW) based on the propensity score.[@R42] Briefly, for each patient the propensity score was calculated by constructing multivariable logistic regression models involving all the demographical characteristics and comorbidities as covariables. The IPTW for each patient was subsequently derived by the inverse of the propensity score, and then transformed to a patient-specific stabilized weight. Stabilized weights were then applied to balance the differences in baseline characteristics and in the prevalence of comorbidities among the 3 study groups, giving rise to an unbiased pseudocohort ('the IPTW cohort'). IPTW was performed separately to balance the differences among the 3 major whole groups and also those among the subgroups. We used the IPTW-balanced data for all subsequent analyses.[@R43] Kaplan-Meier analysis was conducted to determine the 5-year TBI-free survival probabilities. Cox proportional hazards regression was carried out to derive crude HRs for TBI during follow-up, while stratified Cox regression was performed to derive adjusted HRs, adjusting for such covariates as age, living area, urbanization level, monthly income, enrollee category, and comorbidities. We also controlled for the competing risk of death by constructing competing risk regression models to derive subdistribution HRs.[@R46] Sensitivity analysis was done, using R package 'obsSens', by setting an additional hypothetical covariable to evaluate the effect from the potentially unmeasured confounder. All statistical analyses were performed with the statistical packages SAS (V.9.4, SAS Institute) and R (V.3.2.5). Validation of major diagnoses {#s2-3} ----------------------------- The working definitions we applied in this study to define major diagnoses (COPD and TBI) were validated using the actual medical records at National Cheng Kung University Hospital (a 1200-bed tertiary medical center in southern Taiwan) between January 2008 and December 2011. For COPD, we randomly screened out 200 candidate patients by applying the same working definitions to those we used in this present study (ICD-9-CM codes, age, and the prescription of COPD-specific medication). The diagnoses of these candidate patients were then validated by confirming (through an extensive review of the medical records) the documentation of compatible symptoms, that the diagnosis was made by board-certified pulmonologist, the documentation of GOLD-defined obstructive ventilatory deficit on spirometry, and preferably a positive history of smoking. For TBI, we randomly screened out 200 candidate patients by applying the same working definitions (ICD-9-CM disease codes) as we used in this present study. The diagnoses of these candidate patients were then validated by confirming a documented history of head trauma, the prescription of pertinent managements, and preferably data from brain imaging studies. Positive predictive values (PPV) of the working definitions were 94% (95% CI 89% to 97%) for COPD and 94% (95% CI 90% to 97%) for TBI. Results {#s3} ======= [Figure 1](#F1){ref-type="fig"} illustrates the flow chart of inclusion and exclusion for this study. From 1 million randomly selected beneficiaries, we identified 3734 patients who had COPD and severe acute exacerbation during follow-up ('COPD~AE+~'), and frequency matched them with 11,202 patients with COPD without acute exacerbation ('COPD~AE−~') and 11,202 non-COPD subjects ('non-COPD'). [Table 1](#T1){ref-type="table"} displays the baseline characteristics of these 3 groups. Of the included subjects, 65% were male and more than 70% aged ≥65 years. Compared with non-COPD subjects, patients with COPD had a higher prevalence of all the selected comorbidities (many of which were also associated with TBI). However, the application of IPTW based on the propensity score effectively balanced those baseline intergroup differences in the prevalence of comorbidities ([table 1](#T1){ref-type="table"}). ###### Baseline demographic characteristics and comorbidities among the 3 patient groups (before and after balancing by the inverse probability of treatment weighting (IPTW) based on the propensity scores) Full cohort IPTW cohort -------------------------------- ------------- ------------- ----------- -------- ----------- ----------- ----------- ------- Whole group mean age±SD (y) 71.0±11.8 68.7±11.5 66.2±12.4 \<0.01 67.9±12.3 68.0±11.8 68.0±11.8 0.738 Male 65.3 65.3 65.3 1.000 65.6 65.2 65.7 0.802 Living area   \<0.01   0.819  Northern Taiwan 35.9 42.0 46.0 42.1 42.8 42.7  Central Taiwan 28.6 26.4 22.3 24.6 25.0 25.2  Southern Taiwan 30.9 28.5 28.0 29.9 28.6 28.5  East and offshore 4.1 3.1 3.7 3.3 3.6 3.6 Urbanization level   \<0.01   0.923  1 (most urbanized) 23.5 27.4 31.7 28.6 28.5 28.6  2 21.6 24.2 25.4 24.0 24.6 24.2  3 (rural) 54.9 48.4 42.9 47.4 46.9 47.2 Enrollee category   \<0.01   0.956  1 9.1 11.9 13.1 11.8 12.2 12.2  2 22.7 24.0 32.0 27.0 27.0 26.8  3 50.6 49.0 42.5 47.4 46.5 46.7  4 17.6 15.1 12.5 13.8 14.4 14.3 Monthly income   \<0.01   0.989  NT\$≤15,840 42.0 37.7 38.6 38.2 38.6 38.3  NT\$15,840--NT\$25,000 50.5 48.8 43.9 47.3 47.0 47.2  NT\$≥25,001 7.5 13.5 17.5 14.5 14.4 14.5 Comorbidities      Epilepsy 3.8 2.2 0.6 \<0.01 1.8 1.8 2.0 0.687  Sleep apnea 1.3 1.0 0.3 \<0.01 0.7 0.7 0.9 0.708  Ischemic stroke/TIA 21.5 15.5 8.2 \<0.01 13.7 13.4 14.3 0.330  Dementia 12.6 7.7 2.8 \<0.01 6.5 6.3 7.0 0.444  Alzheimer's disease 4.0 2.3 0.9 \<0.01 2.0 2.0 2.5 0.404  Parkinson's disease 6.0 3.7 1.7 \<0.01 3.4 3.2 3.7 0.407  Alcoholic mental disorder 0.3 0.2 0.1 0.04 0.2 0.2 0.2 0.852  Drug-related mental disorders 0.3 0.1 0.1 0.01 0.2 0.1 0.3 0.778  ASVD 40.7 34.8 18.3 \<0.01 28.3 28.8 29.5 0.388  DM 30.7 29.3 19.6 \<0.01 25.6 25.6 26.2 0.698  Chronic hepatitis 10.5 14.4 9.0 \<0.01 11.3 11.7 11.8 0.735  CKD 8.7 6.3 3.3 \<0.01 5.7 5.4 5.9 0.506  Obesity 0.6 0.6 0.3 \<0.01 0.5 0.5 0.5 0.980  Hyperlipidemia 19.3 27.2 19.4 \<0.01 23.0 23.1 23.9 0.471 Data are presented as percentages, except for 'whole group mean age' presented as mean±SD. \*Patients having COPD and [\>]{.ul}1 severe acute exacerbation during follow-up. †Patients with COPD but without severe acute exacerbation during follow-up. ‡Patients without COPD. ASVD, atherosclerotic vascular disease; CKD, chronic kidney disease; COPD, chronic obstructive pulmonary disease; DM, diabetes mellitus; NT\$, new Taiwanese dollars; TIA, transient ischemic attack. ![Flow chart of inclusion and exclusion for this study. COPD, chronic obstructive pulmonary disease; ICD-9, International Classification of Diseases, Ninth Revision; NHI, National Health Insurance.](jim-2019-001207f01){#F1} During the 5-year period after the index date, 312 (8.4%), 742 (6.6%), and 588 (5.3%) patients in 'COPD~AE+~', 'COPD~AE−~', and 'non-COPD' developed TBI, respectively. Patients with COPD, regardless of having severe acute exacerbation or not, consistently exhibited elevated crude and adjusted HRs for TBI relative to non-COPD subjects: the adjusted HRs for patients with COPD as a whole, and for patients in 'COPD~AE+~' and 'COPD~AE−~' subgroups, were 1.28 (95% CI 1.16 to 1.41), 1.50 (95% CI 1.31 to 1.73), and 1.21 (95% CI 1.09 to 1.34), respectively. After controlling for the risk of death, multivariable competing risk regression models yielded concordant findings: for patients with COPD as a whole, and for patients in 'COPD~AE+~' and 'COPD~AE−~' subgroups, the subdistribution HRs for TBI were 1.13 (95% CI 1.02 to 1.23), 1.27 (95% CI 1.11 to 1.46) and 1.08 (95% CI 0.97 to 1.20), respectively. When a comparison was made specifically between the 2 subgroups of patients with COPD, we found that patients in 'COPD~AE+~' also had a slightly but significantly higher risk of TBI than those in 'COPD~AE−~' (the adjusted HR was 1.25; 95% CI 1.09 to 1.43), even after controlling for the risk of death ([table 2](#T2){ref-type="table"}). Kaplan-Meier analyses revealed the worst TBI-free survival in the group 'COPD~AE+~', which was followed by 'COPD~AE−~'; non-COPD subjects exhibited the highest probability of TBI-free survival ([figure 2](#F2){ref-type="fig"}). ###### HRs for traumatic brain injury at 5 years of follow-up for all the included patients and for the subgroups of age Patient groups Groups of patients with COPD versus patients without COPD COPD~AE+~ versus COPD~AE−~ ------------------------------------------------------ ----------------------------------------------------------- ---------------------------- ---------------------- ------------- ---------------------- ------------- **All** **patients** **(** **n** **)** 14,936 3734 11,202 11,202 3734 11,202 Death, n (%)\* 4099 (27.4) 1476 (39.5) 2623 (23.4) 1361 (12.2) 1476 (39.5) 2623 (23.4) TBI, n (%) 1054 (7.06) 312 (8.4) 742 (6.6) 588 (5.3) 312 (8.4) 742 (6.6) cHR (95% CI) 1.23 (1.11 to 1.35) 1.45 (1.26 to 1.66) 1.16 (1.04 to 1.29) 1 1.25 (1.09 to 1.43) 1 aHR (95% CI) 1.28 (1.16 to 1.41)† 1.50 (1.31 to 1.73)† 1.21 (1.09 to 1.34)† 1 1.25 (1.09 to 1.43)† 1 CRR (95% CI) 1.13 (1.02 to 1.23)† 1.27 (1.11 to 1.46)† 1.08 (0.97 to 1.20)† 1 1.18 (1.03 to 1.36)† 1 **40** **≤** **Age** **\<** **65** **(** **n** **)** 4064 1016 3048 3048 1016 3048 IPTW-balanced mean age±SD (y) 51.9±7.2 52.0±7.1‡ 51.9±7.2‡ 52.2±7.5‡ 52.0±7.1‡ 51.9±7.2‡ Death, n (%)\* 399 (9.8) 194 (19.1) 205 (6.7) 91 (3.0) 194 (19.1) 205 (6.7) TBI, n (%) 241 (5.93) 72 (7.1) 169 (5.5) 98 (3.2) 72 (7.1) 169 (5.5) cHR (95% CI) 1.72 (1.36 to 2.16) 1.90 (1.38 to 2.62) 1.66 (1.30 to 2.12) 1 1.15 (0.85 to 1.55) 1 aHR (95% CI) 1.73 (1.37 to 2.18)† 1.92 (1.39 to 2.64)† 1.67 (1.31 to 2.13)† 1 1.15 (0.85 to 1.55)† 1 CRR (95% CI) 1.68 (1.33 to 2.12)† 1.80 (1.30 to 2.48)† 1.64 (1.28 to 2.10)† 1 1.09 (0.81 to 1.47)† 1 **65** **≤** **Age (** **n** **)** 10,872 2718 8154 8154 2718 8154 IPTW-balanced mean age±SD (y) 74.0+6.6 74.1±6.6§ 74.0±6.6§ 74.0±6.9§ 74.1±6.6§ 74.0±6.6§ Death, n (%)\* 3700 (34.0) 1282 (47.2) 2418 (29.7) 1270 (15.6) 1282 (47.2) 2418 (29.7) TBI, n (%) 813 (7.48) 240 (8.8) 573 (7.0) 490 (6.0) 240 (8.8) 573 (7.0) cHR (95% CI) 1.20 (1.08 to 1.34) 1.49 (1.27 to 1.73) 1.12 (0.99 to 1.27) 1 1.33 (1.14 to 1.55) 1 aHR (95% CI) 1.23 (1.10 to 1.37)† 1.52 (1.30 to 1.77)† 1.14 (1.01 to 1.28)† 1 1.33 (1.14 to 1.55)† 1 CRR (95% CI) 1.07 (0.96 to 1.19)† 1.27 (1.08 to 1.48)† 1.00 (0.89 to 1.13)† 1 1.26 (1.08 to 1.48)† 1 \*Number of deaths during follow-up before the development of TBI (not a major outcome, but for competing risk adjustment). †Values were derived from stratified Cox regression. ‡The p value is 0.331 for intergroup comparison. §The p value is 0.536 for intergroup comparison. aHR, adjusted HR; cHR, crude HR;COPD, chronic obstructive pulmonary disease; COPD~AE+~, patients having COPD and ≥1 severe acute exacerbation during follow-up; COPD~AE−~, patients with COPD but without severe acute exacerbation during follow-up; CRR, competing risk regression (values are subdistribution HR, controlling for the competing risk of death); IPTW, inverse probability of treatment weighting (based on the propensity scores);non-COPD, patients without COPD; TBI, traumatic brain injury. ![Kaplan-Meier curves of traumatic brain injury (TBI)-free survival rates for the 3 groups of patients (log-rank test p\<0.001; numbers at risk of the inverse probability of treatment weighting (IPTW) cohort are listed below the plot). COPD, chronic obstructive pulmonary disease; COPD~AE+~, patients having COPD and ≥1 severe acute exacerbation during follow-up; COPD~AE−~, patients having COPD and no severe acute exacerbation during follow-up; non-COPD, patients without COPD.](jim-2019-001207f02){#F2} Further stratifying analysis based on age revealed that patients with COPD (particularly those having severe acute exacerbation), either with advanced (≥65) or with younger (≥40 and \<65) ages, consistently exhibited increased crude, adjusted, and subdistribution HRs for TBI as compared with non-COPD subjects of the same ranges of age. Moreover, although the study cohort was predominated by patients aged ≥65 years, it was those patients with COPD aged \<65 years (regardless of having acute exacerbation or not) that exhibited the highest risk of TBI: the adjusted HRs for TBI for patients with COPD as a whole and for patients in 'COPD~AE+~' and 'COPD~AE−~' subgroups were 1.73 (95% CI 1.37 to 2.18), 1.92 (95% CI 1.39 to 2.64), and 1.67 (95% CI 1.31 to 2.13) for patients aged \<65 years, and 1.23 (95% CI 1.10 to 1.37), 1.52 (95% CI 1.30 to 1.77), and 1.14 (95% CI 1.01 to 1.28) for patients aged ≥65 years, respectively ([table 2](#T2){ref-type="table"}). When the comparison was made between the 2 subgroups of patients with COPD ('COPD~AE+~' vs 'COPD~AE−~'), those patients in 'COPD~AE+~', regardless of age, exhibited an increased risk of TBI as compared with those in 'COPD~AE−~' ([table 2](#T2){ref-type="table"}). Despite that our cohort had a male predominance, stratifying analysis revealed that both male and female patients with COPD exhibited elevated crude, adjusted, and subdistribution HRs for TBI as compared with non-COPD subjects, particularly those having severe acute exacerbation. When comparing between 'COPD~AE+~' and 'COPD~AE−~', patients of both sexes in 'COPD~AE+~' had a higher risk of TBI than those in 'COPD~AE−~' ([table 3](#T3){ref-type="table"}). ###### HRs for traumatic brain injury at 5 years of follow-up for the included patients after being subgrouped by sex Patient groups Groups of patients with COPD versus patients without COPD COPD~AE+~ versus COPD~AE−~ ---------------------------------------- ----------------------------------------------------------- ---------------------------- ----------------------- ----------- ----------------------- ----------- **All** **patients** **(** **n** **)** 14,936 3734 11,202 11,202 3734 11,202 **Male (** **n** **)** 9748 2437 7311 7311 2437 7311 TBI, n (%) 690 (7.08) 213 (8.7) 477 (6.5) 372 (5.1) 213 (8.7) 477 (6.5) cHR (95% CI) 1.25 (1.11 to 1.41) 1.51 (1.27 to 1.79) 1.17 (1.02 to 1.33) 1 1.29 (1.09 to 1.53) 1 aHR (95% CI) 1.31 (1.16 to 1.48)\* 1.57 (1.32 to 1.87)\* 1.23 (1.08 to 1.40)\* 1 1.28 (1.08 to 1.52)\* 1 CRR (95% CI) 1.14 (1.01 to 1.29)\* 1.32 (1.11 to 1.57)\* 1.08 (0.95 to 1.24)\* 1 1.22 (1.03 to 1.45)\* 1 **Female (n)** 5188 1297 3891 3891 1297 3891 TBI, n (%) 364 ((7.03) 99 (7.6) 265 (6.8) 216 (5.6) 99 (7.6) 265 (6.8) cHR (95% CI) 1.20 (1.02 to 1.42) 1.36 (1.08 to 1.73) 1.15 (0.97 to 1.37) 1 1.19 (0.94 to 1.50) 1 aHR (95% CI) 1.23 (1.04 to 1.44)\* 1.39 (1.10 to 1.77)\* 1.17 (0.98 to 1.40)\* 1 1.19 (0.94 to 1.50)\* 1 CRR (95% CI) 1.10 (0.93 to 1.30)\* 1.20 (0.94 to 1.52)\* 1.07 (0.90 to 1.28)\* 1 1.12 (0.89 to 1.42)\* 1 \*Values were derived from stratified Cox regression. aHR, adjusted HR; cHR, crude HR;COPD, chronic obstructive pulmonary disease; COPD~AE−~, patients with COPD but without severe acute exacerbation during follow-up; COPD~AE+~, patients having COPD and ≥1 severe acute exacerbation during follow-up; CRR, competing risk regression (values are subdistribution HR, controlling the competing risk of death);non-COPD, patients without COPD; TBI, traumatic brain injury. We further classified TBI into non-hemorrhagic and hemorrhagic subtypes. Patients with COPD, whether having acute exacerbation or not, had significantly increased risk of non-hemorrhagic TBI as compared with non-COPD subjects, with the adjusted HRs being 1.30 (95% CI 1.17 to 1.45), 1.61 (95% CI 1.39 to 1.88), and 1.20 (95% CI 1.07 to 1.35) for all patients with COPD, patients in 'COPD~AE+~', and patients in 'COPD~AE−~', respectively. For hemorrhagic TBI, although all the CIs of HRs did not reach statistical significance, the point estimates show several interesting trends. Patients in 'COPD~AE−~' exhibited a trend of increased risk as compared with non-COPD subjects: the adjusted HR was 1.22 (95% CI 0.96 to 1.56) for 'COPD~AE−~'. Patients in 'COPD~AE+~', on the other hand, seemed to exhibit a trend of lower risk of hemorrhagic TBI. When comparing the 2 groups of patients with COPD, we found that patients in 'COPD~AE+~' still exhibited a significantly increased risk of non-hemorrhagic TBI, but a trend of decreased risk of hemorrhagic TBI, as compared with 'COPD~AE−~'. Multivariable competing risk regression models (controlling for the risk of death) also yielded concordant findings ([table 4](#T4){ref-type="table"}). ###### HRs for traumatic brain injury (TBI) at 5 years of follow-up for the included patients after being stratified by the subtypes of TBI (hemorrhagic or non-hemorrhagic) Patient groups Groups of patients with COPD versus patients without COPD COPD~AE+~ versus COPD~AE−~ ---------------------------------------- ----------------------------------------------------------- ---------------------------- ----------------------- ----------- ----------------------- ----------- **All** **patients** **(** **n** **)** 14,936 3734 11,202 11,202 3734 11,202 hTBI, n (%) 174 (1.24) 41 (1.2) 133 (1.3) 94 (0.9) 41 (1.2) 133 (1.3) cHR (95% CI) 1.07 (0.85 to 1.35) 0.90 (0.61 to 1.33) 1.12 (0.88 to 1.43) 1 0.81 (0.55 to 1.18) 1 aHR (95% CI) 1.17 (0.93 to 1.47)\* 0.98 (0.67 to 1.44)\* 1.22 (0.96 to 1.56)\* 1 0.80 (0.55 to 1.18)\* 1 CRR (95% CI) 1.00 (0.80 to 1.26)\* 0.81 (0.55 to 1.19)\* 1.07 (0.84 to 1.36)\* 1 0.76 (0.52 to 1.12)\* 1 nhTBI, n (%) 880 (5.96) 271 (7.3) 609 (5.5) 494 (4.5) 271 (7.3) 609 (5.5) cHR (95% CI) 1.26 (1.13 to 1.40) 1.57 (1.35 to 1.82) 1.16 (1.04 to 1.31) 1 1.34 (1.16 to 1.56) 1 aHR (95% CI) 1.30 (1.17 to 1.45)\* 1.61 (1.39 to 1.88)\* 1.20 (1.07 to 1.35)\* 1 1.34 (1.16 to 1.56)\* 1 CRR (95% CI) 1.18 (1.06 to 1.33)\* 1.37 (1.18 to 1.59)\* 1.08 (0.96 to 1.21)\* 1 1.27 (1.10 to 1.47)\* 1 \*Values were derived from stratified Cox regression. aHR, adjusted HR; cHR, crude HR;COPD, chronic obstructive pulmonary disease; COPD~AE−~, patients with COPD but without severe acute exacerbation during follow-up; COPD~AE+~, patients having COPD and ≥1 severe acute exacerbation during follow-up; CRR, competing risk regression (values are subdistribution HR, controlling the competing risk of death); hTBI, hemorrhagic traumatic brain injury; nhTBI, non-hemorrhagic traumatic brain injury; non-COPD, patients without COPD. For those patients who developed TBI during follow-up, 111 (35.6%), 250 (33.7%), and 189 (34.4%) patients in 'COPD~AE+~', 'COPD~AE−~', and 'non-COPD' were hospitalized due to TBI, respectively. We found no significant difference in the length of hospital stay among the 3 groups ([online supplementary table S3 and figure S1](#SP1){ref-type="supplementary-material"}). Sensitivity analysis showed that even when a hypothetical unmeasured confounder was present, COPD (either with or without severe acute exacerbation) was mostly a significant risk factor for TBI at 5 years of follow-up, which further supported the robustness of our findings ([online supplementary figure S2a, b](#SP1){ref-type="supplementary-material"}). Discussion {#s4} ========== COPD is associated with extrapulmonary complications. In this present study, after controlling for the competing risk of death and the differences in baseline characteristics and comorbidities, we show that patients with COPD have an increased risk of TBI, regardless of the differences in sex, age, and the history of acute exacerbation of COPD. Worldwide epidemiological studies have repeatedly reported fall and transport-related injury as 2 major etiologies of TBI.[@R26] Specifically, in elderly patients fall accounts for most TBI, whereas in younger adults traffic accidents are the leading cause.[@R30] Cognitive dysfunction and weakness of the extremities (particularly lower extremities) have been repeatedly reported as risk factors for fall in elderly patients.[@R47] The prevalence of COPD increases with advancing age (this was also observed in our study cohort where \> 70% of patients aged ≥65). Besides, cognitive dysfunction and cachexia (causing sarcopenia and weakness) are well-recognized complications of COPD. Moreover, previous studies have well demonstrated an impairment in balance among patients with COPD, which predisposed these patients to fall.[@R12] Therefore, it is likely that an association exists between COPD and fall, and also between COPD and fall-induced TBI. The findings of our present study support for such an association. Details about the etiology of individual TBI were unavailable from the NHI Research Database. However, it was possible that in addition to fall, a great proportion of the TBIs of our patients might be transport related. This rationale is based on the international and local epidemiological data. Chiu *et al* [@R35] and Lin *et al* [@R37] surveyed the epidemiological characteristics of TBI in Taiwan between 1988 and 2002 and reported that traffic accidents (particularly those relating to riding scooters) accounted for more than 60% of TBI over this long period of time. As described in the Materials and Methods section, we have validated the working definitions for the major diagnoses for this study using the clinical data of randomly selected 200 patients with COPD and 200 patients with TBI from our hospital. Analysis of the data of these 200 patients for validating the TBI diagnostic definition also identified transport-related injury, in addition to fall, as a major cause of TBI particularly in those aged 40--64 ([online supplementary table S4](#SP1){ref-type="supplementary-material"}). Previous studies have shown that patients with COPD, even those with mild disease and without hypoxemia, exhibited impairment in their driving performance.[@R15] Orth *et al* reported that patients with COPD (with GOLD-defined moderate or severe airflow obstruction but without hypoxemia or hypercapnea) caused more accidents in simulated driving situations than controls.[@R18] Interestingly, we observed an even higher risk of TBI in those patients with COPD aged \<65 years than those aged ≥65 years. Epidemiologically, transport-related injury is more likely than fall to be the cause of TBI among patients of younger age groups.[@R26] It is possible that both fall and transport-related injury are important causes of TBI in patients with COPD. Nevertheless, further study is warranted to clarify whether there is a direct link between COPD and TBI due to transport-related injury. Regardless of sex and age strata, patients in 'COPD~AE+~' consistently exhibited a slightly higher risk of TBI than those in 'COPD~AE−~'. This finding is possibly a reflection of the deleterious impacts of severe acute exacerbations of COPD on the physical and functional performances of the patients.[@R21] However, due to the lack of patient-specific data from the NHI Research Database on changes in ambulatory capacities and functional status following an acute exacerbation of COPD, it is still not possible at this moment, apart from identifying an association, to draw a definite conclusion on the causal relationship between acute exacerbation and the TBI risk. Another interesting finding from our study is that, when compared with patients in 'COPD~AE−~', those in 'COPD~AE+~' had an increased risk of non-hemorrhagic TBI, but showed a trend toward a reduced risk of hemorrhagic TBI. A possible explanation for this finding is that patients in 'COPD~AE+~' might suffer from compromised activity levels (either temporary or prolonged) after the exacerbation event, and might be somehow 'protected' from those physically demanding activities that would potentially cause severe hemorrhagic TBI. Nevertheless, further research is necessary to ascertain whether this explanation is valid. In our opinion, this present study has several strengths. First, this study investigates a novel topic relating to the complication of COPD and the care and safety of patients with COPD. Second, findings from this study have important clinical implications. Considering its often long-lasting and devastating consequences,[@R31] TBI would certainly complicate the management and rehabilitation of patients with COPD. Patients and caregivers must therefore be aware of such an increased risk of TBI. Moreover, the NHI of Taiwan is a mandatory program, covering \>96% population in 2000 and consistently \>99% since 2002.[@R51] The use of the NHI Research Database in this study provided with a random study population of the nationwide scale, which minimized potential selection and referral biases. Nevertheless, there are limitations to this present study. First, such patient-specific data as spirometric measurements, symptomatic and disease severity, radiographic images, and differential counts of blood cells were unavailable from the NHI Research Database and could not be incorporated to ascertain the diagnosis of COPD. It is possible that those patients with mild COPD who had been managed with only symptomatic treatments (such as antitussive and mucolytic agents) or observation might have been excluded from this study. Besides, despite that we strove to improve the accuracy of the COPD diagnosis by strictly defining our inclusion and exclusion criteria, the overdiagnosis of COPD and the misdiagnosis or miscoding of asthma as COPD in real-world clinical settings still remained possible. However, the accuracy of identifying patients with COPD from the NHI Research Database using working definitions that were similar to those we applied in this study has been validated previously.[@R52] Moreover, by performing an independent validation work as was mentioned previously, we demonstrated very high PPVs of our working definitions for COPD as well as for TBI. Therefore, the diagnosis of COPD, and also of TBI, in this present study should be reliable. One issue that must be particularly mentioned is that by strictly excluding those subjects who also received the diagnosis of asthma during the follow-ups, we could enhance the accuracy of the COPD diagnosis, but we might have also excluded patients with asthma-COPD overlap (ACO) who seem to have an increased risk of severe acute exacerbations.[@R54] Further research would help clarify whether patients with ACO and patients in 'COPD~AE+~' share a similar risk profile for TBI. Second, the definition we use to identify acute exacerbation of COPD, despite its frequent application in previous studies,[@R24] has potential drawbacks. It might have classified those patients with mild or moderate exacerbation (managed by adjusting the medication without emergency visit or hospitalization) into 'COPD~AE−~'. Besides, those patients whose acute exacerbation was secondary to a specific etiology (like pneumonia, ICD-9-CM codes 480--486), or whose exacerbation led to respiratory failure (ICD-9-CM code 518.81), and therefore received a different primary diagnosis than COPD for that hospitalization or emergency room visit, would also be excluded from the study.[@R24] Although our strict definition decreased the number of candidates for 'COPD~AE+~', we believe it is a necessary step to avoid misclassifying acute events unrelated to COPD into this group. Third, both COPD and TBI are associated with comorbidities. Although in this study we undertook multiple statistical methods to minimize the potentially confounding effects from comorbidities as possible (namely using IPTW based on propensity score to balance intergroup differences in comorbidities, adjusting for all the identified comorbidities in multivariate regression analyses, and controlling for the competing risk of death), it remains possible that certain unidentified comorbidities or confounders might have played potential roles accounting for our major findings. However, based on the results of sensitivity analyses ([online supplementary figure S2a, b](#SP1){ref-type="supplementary-material"}), COPD (either with or without acute exacerbation) remained mostly as a risk factor for TBI even in the presence of a hypothetical unidentified confounder. Therefore, in our opinion, the confounding effect from an unidentified comorbidity (if any) should be small. Fourth, due to the lack of data on the detailed etiologies of TBI and on the serial changes in physical, cognitive, functional, and even behavioral performances of the included patients from the NHI Research Database, it is not possible to establish a definite mechanistic and causal relationship between COPD and TBI. Further investigation is necessary to elucidate the mechanism underlying the association that we found between COPD and the elevated risk of TBI, and also to clarify whether patients with COPD tend to have certain risk-prone behaviors that contribute to the observed increase in the risk of TBI. Fifth, the findings of this study were derived from the clinical data of Taiwan's population, and additional research in other regions studying different ethnic groups would be necessary to confirm whether the increased risk of TBI in patients with COPD is universally observed. Conclusions {#s5} =========== In this study, we show that patients with COPD of both sexes have an increased risk of TBI. The risk is higher in those patients with COPD aged \<65 years than those aged ≥65 years, and also in those patients with COPD who had severe acute exacerbation during follow-up than in those who did not. The findings of our present study add TBI to the list of COPD-associated comorbidities, and raise the need for further research to investigate the underlying mechanism and to determine preventive measures. We are grateful to Wan-Ni Chen (MS), statistician from the Biostatistics Consulting Center of National Cheng Kung University Hospital, College of Medicine, National Cheng Kung University, for providing statistical consultation and assistance. **Contributors:** Conceptualization: THH, CZC, SHL. Methodology: THH, SHL. Software: SHL. Validation: THH, CZC, SHL. Data sorting and analysis: THH, SHL, CZC, HIK, HPE. Writing---original draft preparation: THH. Writing---review and editing: CZC, SHL. Supervision: SHL. Project administration: THH, SHL. Funding acquisition: THH, SHL. **Funding:** This study was supported by the National Cheng Kung University Hospital, College of Medicine, National Cheng Kung University, under grant NCKUH-10603010. **Disclaimer:** The funding source did not involve in the study design, the collection, the analysis, and the interpretation of data, as well as the writing of the report, and the decision to submit the article. **Competing interests:** None declared. **Patient consent for publication:** Not required. **Ethics approval:** This study was approved by the Institutional Review Board of National Cheng Kung University Hospital (B-ER-105-326; November 11, 2016). **Provenance and peer review:** Not commissioned; externally peer reviewed. **Data availability statement:** Data may be obtained from a third party and are not publicly available. The data which were interpreted in the present study were applied restrictively from the National Health Insurance Research Database (NHIRD), so that this database was used under license limited to the study. In addition, the data are not publicly available. The NHIRD is published by National Health Insurance Administration of Taiwan, in compliance with Taiwan's "Personal Information Protection Act". Requests for data can be submitted as a formal application to the NHIRD ([http://nhird.nhri.org.tw](http://nhird.nhri.org.tw/)). **Author note:** Parts of the data contained in this paper were presented in a thematic poster in American Thoracic Society 2018 International Conference.
2023-09-05T01:26:28.774034
https://example.com/article/8006
By Craig Andresen- The National Patriot and Right Side Patriots on cprworldwidemedia.com Ok liberals and socialists…you can’t say we didn’t try to tell you because…we DID tell you. We told you and told you and told you some more but, did you listen? Nope. Not only did you not listen…you said we were some sort of special kind of terrorists for even bringing it up. You called us every name in the book and even after all of that…we told you again. Now we have the proof that we were right then and right now…the only way you could support Obamacare was if you were either a socialist or just plain stupid…we’ll leave the option up to you but…you’re one of the two. For the proof of this we can now turn directly to one of the Obamacare architects…one Jonathan Gruber who, at a conference almost a month ago made the marketing plan of Obamacare clear to everyone. What he said came as no surprise at all to Conservatives who had this all figured out way ahead of the game but should come as a slap upside the head to those who, to this day, continue to applaud Obamacare as the greatest thing ever. YOU…are STUPID and the architects OF Obamacare, those who WROTE the damn thing…were COUNTING on it. Conservatives are obstructionists. WE are the racists…the jobs killers and the reason the economy sucks out loud. Liberals love to claim that Conservatives comprise the “do nothing congress” and Obama stands there last week in Kansas City chiding US to “come on…come on now, let’s get things done.” Meanwhile, on the back shelves of Harry Reid’s liberal/socialist controlled senate… Some 356 bills…PASSED by the House…are collecting dust because Reid himself refuses to bring them to a vote. OF those 356 bills… 98% were passed with bipartisan support…200 of them were passed unanimously by the ENTIRE house without a single objection from the liberals ensconced there…and more than 100 others were passed with 75% of house DEMOCRATS supporting them. 40 of those bills would directly help lower unemployment and many of them offer assistance to the “more than 3.4 million workers between the ages of 20 and 59″ missing from our labor force.” There they sit…356 bills, including a border bill passed just last Friday…on Harry Reid’s desk because Reid himself refuses to have them brought up for a vote. HOW COULD YOU HELP BUT HEAR HIM??? He was literally SHOUTING when he opened his pie hole and told anyone within a 3 mile radius that, when it comes to Obamacare… “THERE’S NO HICCUP OR DELAY!!!” Then, he told reporters why the hiccups and delays that DON’T exist…EXIST!!! “We have hundreds of thousands of people who tried to sign up, and they didn’t get through.” After THAT…Crusty ELABORATED. “There are some people who are not like my grandchildren, who can handle everything so easy on the Internet and these people need a little extra time.” As an example…Crusty cited, “a 63-year-old woman came in and said ‘I almost got it, [but] every time I was just about got there, it would cut me off.’” THAT, to anyone with a working brain cell is because THE OBAMACARE WEBSITE SUCKS OUT LOUD and it has since the day it went UP but…Crusty, who happens to be sans a working brain cell explained it THIS way… The Dictator and his regime just keep rolling merrily along, telling their subjects that all is well and Obamacare is the greatest thing since the invention of the banana republic. They had to bribe members of their own party to pass it…They couldn’t allow anyone, of either party, to READ it before they passed it…The Vice Dictator called it a “BIG F***ING DEAL” and on and on and on. The Dictator and his minions have often decried the attempts to repeal it. 42 times, they say, those opposed to socialism have tried to repeal the disaster and, every time they try, the Dictator scolds them and his useful idiots parrot the castigations. It’s “THE LAW OF THE LAND” they keep telling US, the lowly ingrates who just can’t get it through our patriotically thick heads that the GOVERNMENT is far, FAR better suited to mandate TO us that which is better FOR us than WE might decide for ourselves. It’s time to take a more serious look at something that, were it not so serious, would be seriously funny. Honestly, I don’t know a better way to put it. Let’s start with this. Over the weekend, yet another delay was announced in that the provision of Obamacare preventing companies from showing favoritism, by supplying their top officers better insurance packages than they do to those in the mail room, has been delayed for another year. The reason claimed to be behind it, is that the IRS…The Gestapo behind enforcing the mandate…Hasn’t written that particular regulation…yet. Oh really? How long have they had to put crayon to wall paint over there at the IRS? 4 years? And have you SEEN the tower of the abuse of power otherwise known as, the Obamacare regulations??? There are more than 80 THOUSAND of them and the tower is more than 7 feet tall. They haven’t WRITTEN that mandate yet even though they KNEW that the deadline FOR it was March of 2014 so now, it’s been delayed… A REALITY FOR MORE AND MORE Americans these days is the fact that they must live from paycheck to paycheck. As more and more Americans see their jobs disappear or cut to part-time hours because of Obamacare, they struggle to make ends meet and do something very foreign to the government that rules over them. They budget. TIGHTLY. Americans don’t have the luxury of simply raising their debt limit every time the wind blows. What they bring in is all they have and, they must…THEY MUST…make it to the next paycheck on that amount. Now, we have word that Obamacare, after screwing Americans, upon the lies told by Obama, out of the insurance they had, liked and COULD afford, for HIGHER insurance premiums and HIGHER deductibles, has started screwing them once again. For the past 2 ½ months, we have all been regaled by glowing anecdotes from this lying administration regarding how the STATE exchanges ARE working and working so much better than the federal Obamacare website. Ask the Bruner’s in the state of Washington how well their Washington Healthplanfinder is working for THEM. In October, the Bruner’s, in the midst of starting their own business, logged on to Washington Healthplanfinder, selected a plan and, as the website allowed, chose their payment date. America was promised that the Obamacare website would be fixed, up and running by November 30th, 2013. Kathleen Sebelius TOLD congress that it WOULD be fixed. She TOLD them it would be DONE…By November 30th, 2013. THAT, of course, was before Kathleen Sebelius told America that the Obamacare website would be running at 80% by November 30th, 2013. 80%…According to Sebelius and the Obama administration was their definition of…SUCCESS. So…80% by November 30th but…THAT was before Sebelius told America that users OF the website would have a much better experience on December 1st on that Obamacare website than they had when it rolled out on October 1st, 2013. So… We went from the greatest thing since sliced cheese before the October roll out to…”We’ll have it fixed” by November 30th, 2013 soon AFTER the October 1st roll out to…”We’ll have it running at 80% by November 30th and THAT will be a SUCCESS to…”WELL…You’ll have a better experience with the Obamacare website on December 1st than you did on October 1st.” Here we are…Today is December 2nd, 2013 and how’s that Obamacare website doing? In FACT…It’s working at 0% right now and this obtuse administration is claiming some element of success for that. Liberals and socialists in congress are lining up against their Dictator because they know they don’t stand a snowball’s chance in hell in the 2014 midterms if they don’t. They are desperate to be seen as standing AGAINST Obamacare…Now…But they and ONLY they voted FOR Obamacare. That is a matter of RECORD that cannot be run away from. Bill Clinton came out and called for changing the law to allow people to keep their previously existing insurance because HE’S trying to provide distance for Hillary’s run in 2016 but… HE is on record of being Obama’s Obamacare MOUTHPIECE in the 2012 campaign and SHE is on record too. Here’s Bill as late as September 4th…3 weeks before the roll out of Obamacare: “We need all hands on deck here. The health of our people, the security and stability of our families and the strength of our economy are all riding on getting health care reform right and doing it well. That means we have to do it together.” And about 4 weeks AFTER the roll out? “The computer deal will get fixed up. Don’t worry about that, But our side, we’re not so ideological,” said Clinton. “So, instead of bashing them and screaming about how incompetent they were, most of our people just tried to help people understand the law and make it work and then wait for it to get fixed.” “There’s a big difference in being an ideologue and being practical, putting people first as opposed to some abstract philosophy first.” On September 13th, just 2 weeks before the Obamacare roll out, HILLARY Clinton stated: Search Subscribe A longtime spokesman for the state court system accidentally butt-dialed a Post reporter — yukking it up about how “I barely show up to work” while pocketing a $166,000-plus salary and boosting his taxpayer-funded pension. President Trump on Thursday again cited a story about the late U.S. Army Gen. John J. Pershing dipping bullets in pigs’ blood to deter Islamic attacks that has been dismissed by historians as apocryphal. Secretary of State Rex Tillerson and Defense Secretary Jim Mattis on Thursday rebuffed White House strategist Steve Bannon’s claim to a liberal magazine that “there’s no military solution” for North Korea’s nuclear threats. Nancy Pelosi and other Democratic lawmakers are ramping up calls to remove Confederate statues on display in the halls of Congress, bringing the raging debate over Civil War symbols across the South to Capitol Hill.
2024-05-09T01:26:28.774034
https://example.com/article/8860
Before making the show, the creators hosted an "alter-ego party" as their casting audition. Actors came to the party and had to create and stay in character while improvising for the duration of the evening. Both Marshall Rimmer and Michael Champion were cast at the party.
2024-03-08T01:26:28.774034
https://example.com/article/3601
Image caption University senior pay will be put under tougher scrutiny by new regulations Universities Minister Jo Johnson says that excessive pay for university bosses will be brought "under control" by new regulations, which he told the BBC would appear in the new year. Mr Johnson said he was "absolutely convinced" a new regulator, the Office for Students, will tackle pay concerns. The minister promised "greater restraint... in setting top salaries". It comes after protests over the former head of Bath Spa University receiving more than £800,000 in her final year. 'Has there been a problem? Most definitely' Mr Johnson's comments follow a series of protests over vice-chancellors' pay in recent weeks - including at the University of Bath, the University of Southampton and this week at Bath Spa. "Has there been a problem? Most definitely," said Mr Johnson. But he said universities now recognised the need to answer public concerns about value for money. "I think they really are starting to get it," said the universities minister, who said that a "new regulatory framework" would be published by the government in the new year. Image copyright Getty Images Image caption Jo Johnson says universities have to address value for money for students Mr Johnson said the Office for Students would require universities to ensure their "governance is fit for purpose". Universities are autonomous institutions, but the minister said there needed to be an understanding of the "perception of value for money" from the public. In the new year, this would mean rules requiring much clearer evidence of the independence of committees deciding vice-chancellors' pay. 'Major review' Universities will also have to explain the pay gap between top earners and the rest of their staff. "When students are paying for their own tuition fees, there is a greater expectation of greater accountability to students, but also to the taxpayer, who is underwriting the student loan book," said Mr Johnson. "Value for money is at the heart of why we set up the Office for Students," he said. But he said he was "concerned that the proportion of students in England who feel they are not getting value for money is greater than those who feel they are getting good value for money". The universities minister said that details of the "major review" of tuition fees and university funding - promised by Prime Minister Theresa May - would also appear in the "coming weeks". But Mr Johnson has defended the structure of the current system as ensuring that more disadvantaged students can go into higher education and that universities are better funded. Sally Hunt, leader of the UCU lecturers' union, welcomed Mr Johnson's assurances on pay, but warned that he could become "the latest in a long line of ministers to have seen previous calls for pay restraint ignored". "Put simply, the status quo cannot continue." In the dispute over pay at Bath Spa University, there have been calls by the UCU lecturers' union for an "urgent overhaul" of senior university pay. Accounts for Bath Spa University show Prof Christina Slade was paid £429,000 "for loss of office" on top of her £250,000 salary and other benefits. A spokeswoman for Bath Spa said the sum represented "value for money".
2024-05-02T01:26:28.774034
https://example.com/article/5787
Q: Button not visible in android activity The button in the following xml code is not visible at all. Could someone please guide me where I am going wrong? <?xml version="1.0" encoding="utf-8"?> <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" android:orientation="vertical" android:layout_width="fill_parent" android:layout_height="fill_parent" > <Button android:id="@+id/addBtn" android:text="Add New Item" android:layout_width="fill_parent" android:layout_height="wrap_content" android:onClick="addItems" /> <ListView android:id="@android:id/list" android:layout_width="fill_parent" android:layout_height="fill_parent" android:drawSelectorOnTop="false" /> </LinearLayout> The oncreate() is as follows: ArrayList<String> listItems=new ArrayList<String>(); ArrayAdapter<String> adapter; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); adapter=new ArrayAdapter<String>(MainActivity.this,R.layout.abc, listItems); setListAdapter(adapter); } A: After super and before "adapter..." , call this in onCreate() setContentView(R.layout.your_layout); Calling the setContentView()... // We'll define a custom screen layout here (the one shown above), but // typically, you could just use the standard ListActivity layout. setContentView(R.layout.custom_list_activity_view); from: http://developer.android.com/reference/android/app/ListActivity.html Also, think your list items which is being passed to the adapter is null (have u checked that?)
2023-10-05T01:26:28.774034
https://example.com/article/6311
Q: data-target data-toggle is not working with vscode I had create a php code for doing CRUD application,To-do-list. Then I run it on my browser and it is not pop-up and do nothing, when I click the "Add Task" button. <button type="button" data-target="#myModal" data-toggle="modal" class="btn btn-success">Add Task</button> check my full code on codeply. <!DOCTYPE html> <html> <head> <script> src = "https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js" </script> <script> src = "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity = "sha384-Rc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA712mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin = "anonymous" </script> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" intergrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg320mUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous"> <title>CRUD App</title> </head> What should I do, Thanks for your help. A: You should add <div id="myModal" class="modal" tabindex="-1" role="dialog"> like below <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js"></script> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" intergrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg320mUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous"> <title>CRUD App</title> <button type="button" data-target="#myModal" data-toggle="modal" class="btn btn-success">Add Task</button> <div id="myModal" class="modal" tabindex="-1" role="dialog"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <h5 class="modal-title">Modal title</h5> <button type="button" class="close" data-dismiss="modal" aria-label="Close"> <span aria-hidden="true">&times;</span> </button> </div> <div class="modal-body"> <p>Modal body text goes here.</p> </div> <div class="modal-footer"> <button type="button" class="btn btn-primary">Save changes</button> <button type="button" class="btn btn-secondary" data-dismiss="modal">Close</button> </div> </div> </div> </div>
2024-02-15T01:26:28.774034
https://example.com/article/2462
Q: SyntaxError: Use of const in strict mode inside github and codeship I've found following error when I run grunt test inside my source code Github/Codeship. In setup command inside codeship, following code are configured like that. nvm install 0.12.6 nvm use 0.12.6 npm install grunt-cli bower -g npm install bower install -p npm run update-webdriver and test commands inside codeship; grunt test But that error not found inside my source code, and actually found inside github/codeship by viewing following error message given by codeship. Because those folder structure is not defined as we configure in our server. Please help me how to solve it. Thanks. Using 2 x hasMany to represent N:M relations has been deprecated. Please use belongsToMany instead >> Mocha exploded! >> /home/rof/src/github.com/MyProjects/node_modules/sparkpost/node_modules/request/node_modules/hawk/node_modules/boom/lib/index.js:5 >> const Hoek = require('hoek'); >> ^^^^^ >> SyntaxError: Use of const in strict mode. >> at exports.runInThisContext (vm.js:73:16) >> at Module._compile (module.js:443:25) >> at Object.Module._extensions..js (module.js:478:10) >> at Module.load (module.js:355:32) >> at Function.Module._load (module.js:310:12) >> at Module.require (module.js:365:17) >> at require (module.js:384:17) >> at Object.<anonymous> (/home/rof/src/github.com/MyProjects/node_modules/sparkpost/node_modules/request/node_modules/hawk/lib/index.js:5:33) >> at Module._compile (module.js:460:26) >> at Object.Module._extensions..js (module.js:478:10) >> at Module.load (module.js:355:32) >> at Function.Module._load (module.js:310:12) >> at Module.require (module.js:365:17) >> at require (module.js:384:17) >> at Object.<anonymous> (/home/rof/src/github.com/MyProjects/node_modules/sparkpost/node_modules/request/request.js:9:12) >> at Module._compile (module.js:460:26) Warning: Task "mochaTest:src" failed. Use --force to continue. A: Because those folder structure is not defined as we configure in our server. This issue has nothing to do with folder structures. Your project is currently using Node version 0.12.6 which is extremely out of date. The current LTS version of Node is 6.11.3 and the current version is 8.6.0. The specific issue is SyntaxError: Use of const in strict mode. which means the libraries you are using are currently utilizing ES2015 syntax or higher. The root cause of the issue is in the Boom module, which uses const at line 5 (and most likely other current syntax as well). The solution for your issue here is to update the node version being utilized inside Codeship. nvm install 6.11.3 nvm use 6.11.3
2024-05-01T01:26:28.774034
https://example.com/article/4584
1. Field of the Invention This invention relates to a resin forming nozzle device in which a surface lubricant (e.g., silicone oil) having mold release properties is continuously supplied to the resin forming nozzle face, and to a resin forming method using the same device. 2. Description of the Prior Art When a synthetic fiber, as an example of formed resin products, is spun, oligomer of the resin or products resulting from the gradual degradation of a surface lubricant applied to the spinneret face may accumulate on the spinneret face from which resin filaments emerge, especially around the spinning orifices thereof. This may cause the spun filaments to be bent or broken. When the spun filaments are bent or broken, the spinning of the synthetic fiber must be discontinued to correct (or clean) the spinneret face. This requires much labor and also causes a significant reduction in production efficiency. In order to solve the above-described problem, attempts have been made to modify the material of the spinneret and/or the longitudinal sectional shape of the spinning orifices or to introduce a surface lubricant continuously to the spinneret face. For example, Japanese Patent Publication No. 11823/'68 discloses a spinning method in which the spinneret face is inclined and a surface lubricant is continuously introduced to the spinneret face. In this method, however, the lengths of the spinning orifices vary along the circumference, which tend to induce a kneeling phenomenon in which the spun filaments bend at the outlets of the spinning orifices. If the structure of the spinneret is modified so as to cause the surface lubricant to flow down toward the center of the spinneret, various problems may arise, for example, in that the discharge pipe provided for the purpose of withdrawing the surface lubricant may come into contact with the spun filaments. Accordingly, it is difficult to use this spinneret for practical purposes. Japanese Patent Publication No. 2492/'69 discloses a spinning method in which the spinneret face is provided with a porous part made of a porous metal or the like and a surface lubricant is introduced into the spinning orifices by infiltrating the surface lubricant into the porous part. However, this method tends to cause an uneven distribution of the amount of surface lubricant infiltrated. Especially in the neighborhood of the site at which the surface lubricant is introduced, the surface lubricant drips down and thereby exerts an adverse influence on the spinning. Moreover, although the porous part is made so as to form part of the spinning orifices and give a divergent shape to the outlets thereof, the amount of the surface lubricant may vary along the circumference of the spinning orifices to induce a kneeling phenomenon. Furthermore, this method has the disadvantage that the presence of irregularities in the spinneret face makes its cleaning difficult and the porous metal may be clogged with the spinning solution, gas or cleaning agent. Thus, this method fails to bring about the desired result and cannot readily be put to practical use. Japanese Patent Laid-Open No. 143719/'78 discloses a spinning method in which a surface lubricant is introduced through an annular distributor disposed on the peripheral region of the-spinneret. This method enables the surface lubricant to be more or less effectively introduced to the aforesaid peripheral region. However, it is difficult to introduce the surface lubricant to the central region of the spinneret. Thus, this method still fails to introduce the surface lubricant uniformly to the whole spinneret. Japanese Patent Laid-Open No. 158311/'80 discloses a spinning method in which a surface lubricant is introduced by means of a distributing plate having grooves which is disposed on the peripheral region of the spinneret or on the whole spinneret face except the spinning orifices. In this method, flow channels are formed by pressing the groove-bearing side of the distributing plate against the spinneret face. However, this method requires a spinneret device having a very complicated structure. Moreover, when the distributing plate having grooves is disposed on the whole spinneret face except the spinning orifices, it becomes difficult to correct (or clean) the spinneret face. In order to supply the surface lubricant to the spinneret, a feeding method utilizing the head of a surface lubricant tank and a feeding method using a metering pump are commonly employed. However, when the former is employed to supply the surface lubricant, the feed rate may vary because of difficulty in keeping the head constant. On the other hand, when the latter is employed, the feed rate can be stabilized. However, this method has the disadvantage of requiring a considerable equipment cost.
2024-03-09T01:26:28.774034
https://example.com/article/8985
Importance of diet in maternal phenylketonuria. Diet has long been recognized as the primary treatment modality for individuals with phenylketonuria (PKU) during infancy and childhood. Recent findings from the Maternal PKU Collaborative Study clearly indicate that dietary restriction of phenylalanine is also necessary to prevent the adverse effects of an elevated plasma phenylalanine concentration during pregnancy, which include microcephaly, physical anomalies, and mental retardation.
2024-07-05T01:26:28.774034
https://example.com/article/1448
Microsoft has sold 10 million Xbox 360 game consoles in Europe, Middle East and Africa (EMEA) in just four years, making it the only console showing positive year-on-year growth in 2009 according to the latest figures from market research firm Gfk. "Xbox 360 continues to pull ahead of the competition when it comes to delivering on a complete home entertainment experience and we think that Xbox Live currently is about 12 to 18 months ahead of its main rival Playstation Network when it comes to offering service and content beyond traditional games," said Martin Olausson, director of Digital Media Research at Strategy Analytics. "By introducing innovative new services and content such as Natal, instant streaming of full 1080P HD video, and integrating social media features such as Twitter and Facebook, Xbox will likely attract a wider audience than its rivals and is in a great position to maximize sales in the next few years," Olausson added. Company Articles "Unfortunately we haven't been in a position yet to confirm launch dates where we don't have Live (like the Middle East)," Robert Dekker, E&D marketing manager for Microsoft EMEA, told itp.net. "Launching Live now in any country is more complex than it was four years ago and obviously we are seeking to provide that high level, rather than to say we could potentially launch something easy and quick. That's not the direction we want to do and I don't think customers will appreciate it if we do that." This is all well and good but nearly all the countries where xbox Live was rolled out had a communicated roadmap of when it was likely to happen. It would be most welcome for the Middle East, or even just the UAE to have some kind of timeline. As an expat working here its incredible how many gamers there are in the region (local and expat) and how fantastic its been to build relationships through gaming - regardless of cultural background. Microsoft are missing a trick here.
2023-09-02T01:26:28.774034
https://example.com/article/9797
2017-02-03.The program pays me, complaints about this program were not sent to me. But on forums report that it is not paid them. Be careful. Description We would like to offer you the best terms of trust management. The modern company Advanced Invest Limited belongs to the list of the safest British companies due to reliable terms and profitable proposal for investors, wide use of diversity policy and stable trading operations and of course the significant volume of current assets which are constantly in trust. Since summer 2012, we are spending a lot of time to develop own strategy to make money on Forex market and involved in private currency exchange, these directions make our investment services not only better but also accessible for all comers, this opens up new possibilities for our clients around the globe. Thousands of people have already joined and are satisfied with constant profit. Advanced Invest company has attracted real experts from a set of professional spheres. To make a real fruitful results we have combined experience of market traders and knowledge of financial analysts, we hired successful internet moneymakers, programmers to develop special software for automated trading and, finally, financial managers. We certainly believe in Advanced Invest Limited, this is rather mature company that ready for long-term cooperation. Currently, we have an established corporate and professional culture as well as high professional standards. Financial experts of Advanced Invest are in constant search of fresh investment ideas and are working to offer our private and corporate clients the most interesting products and solutions. We will be happy to provide you with the best investment service! DISCLAIMER: We do not promote any programs. The information is based on personal experience and statistics, we do not guarantee its accuracy. All HYIPs investments presuppose high risks. Past Performance of any of programs is no guarantee for the same or similar future performance. Do not spend what you cannot afford to lose.
2023-09-28T01:26:28.774034
https://example.com/article/2997
Tuesday, February 14, 2012 Don't Miss the Boat: A New York Love Story One sultry summer day in 1997 I met my future husband on a boat to Ellis Island. It was as romantic as it sounds. I was 39 years old and unmarried, 38 of those years by choice. My Korean mother, who to her great regret started a family before she graduated from college, programmed me well: I was to have an education and an independent career before I got married, and at the same time, no man was good enough for me. To my mother’s dismay, it worked too well. Not only did I have one career, as a college professor, I started as second one, in law, and now she was worried I’d never meet a life companion. I started to worry, too. I had earlier convinced myself that I was fine being alone, thank you very much, but now I had just moved to New York City, from Chicago by way of Ohio, had no clue about how to meet anyone, and dearly wanted someone to share my life. It couldn’t be anyone – it had be someone interested in books, history, music, especially classical piano, films and art but most of all, someone with an ironic sense of humor – another gift from my sharp-witted mother. I was so lonely that I filled out a notebook form at a coffee shop that facilitated dates. When I listed my education: B.A./M.A./Ph.D from The University of Chicago and soon to be J.D. from Columbia Law with a specialty in First Amendment law, I thought: “No way anyone’s going to call me.” And no one did. My fellow law students were in their early 20s –way too young. One of them, a brilliant, extremely stylish and extremely short 24-year old Vietnamese woman name Thi, dragged me one day while we were working as summer law firm clerks to an event at Ellis Island hosted by The Lawyers Committee on Human Rights. I didn’t want to go but she was adamant. When we boarded the boat at the southern most end of Manhattan, a man in shirtsleeves with blondish hair and, yes I’ll say it – dreamy blue eyes - sat behind us, mopping sweat from his brow from the heat. “You lawyers?” He inquired. I said yes, budding lawyers. He was a journalist on the editorial board of a New York newspaper, invited to the event by friends he knew on the Committee. He had interviewed them on series of articles about Cuban prisoners back when he was at the Atlanta Journal-Constitution. (I found out later that the series made him a finalist for the Pulitzer Prize). A writer! My heart quickened. The conversation came easily and we ended up chatting further at Ellis Island, surrounded by its riveting, haunting history and the glorious harbor. I looked very young, so I made a sure he knew I was older than the other law students and found out he was ten years my senior. No problem. The boat ride back on jet-black, gentle waves gave us a tremendous view of the skyscrapers of lower Manhattan, now glittering with lights and bathed in the romantic glow of the smitten. I confided to Thi that I’d like to see this man again, but didn’t know what to do. He was about to disembark and walk out of my life forever. She suggested running after him to ask him for his business card. (I told you she was brilliant!) I did just that and he said: “Would you like to go to dinner sometime?” When I got back to the law firm, I promptly did a Lexis search (no one Googled back then). If he wasn’t a good writer, I would be very disappointed indeed. I was pleased to see many, many awards and columns of great insight, including one that talked about a trip into Brooklyn while musing on the current Edward Hopper exhibit –I love Hopper and had just seen that exhibit! Later, on our many daily phone conversations, I found out he’s so well-read it puts me to shame, is extremely and sharply funny, and – something important to me – is of a shared cultural heritage that made it unnecessary to explain, for example, what Watergate means or who Floyd the Barber is. In fact, he’s a big fan of Floyd’s. To top it off, he mentioned in passing that he owns a baby grand piano and likes classical music. That's the equivalent of a red Ferrari to other women. I was hooked. Who knew that I’d meet just the right man for me late in life in New York City on that fateful boat. He’s a southern gentleman from East Texas and Oklahoma, a slow talker with each well-chosen word a gem, a writer of extraordinary original ideas grounded in facts and observation, and quite simply the kindest, most humane person I ever met. Since that first dinner, we have not gone a day without chatting and laughing, and we’ve now been together almost 15 years, married for twelve. That’s my New York love story. I guess the motto is, don’t give up. You never know. Don’t miss the boat. About Me 1st Amendment lawyer, an enthusiast of news, art and science, married to my favorite writer, have a black lab dog named Darwin, Ph.D. pre-modern Chinese Literature, born in U.S., mother from Korea, father from India, both gone now.
2024-03-31T01:26:28.774034
https://example.com/article/2763
Q: Chef deploy_resource private repo, ssh deploy keys and ssh_wrapper I'm having loads of trouble getting my Chef recipe to clone a private repo. Well, I had it working yesterday but after 'cheffin' my Vagrant box half a dozen times, I've broken it. I'm a Chef newbie as you may guess. Following the deploy_resource guide here, I've created my deploy.rb recipe (shortened): deploy_branch "/var/www/html/ps" do repo git@github.com:simonmorley/private-v2.git ssh_wrapper "/tmp/.ssh/chef_ssh_deploy_wrapper.sh" branch "rails4" migrate false environment "RAILS_ENV" => node[:ps][:rails_env] purge_before_symlink %w{conf data log tmp public/system public/assets} create_dirs_before_symlink [] symlinks( # the arrow is sort of reversed: "conf" => "conf", # current/conf -> shared/conf "data" => "data", # current/data -> shared/data "log" => "log", # current/log -> shared/log "tmp" => "tmp", # current/tmp -> shared/tmp "system" => "public/system", # current/public/system -> shared/system "assets" => "public/assets" # current/public/assets -> shared/assets ) scm_provider Chef::Provider::Git # is the default, for svn: Chef::Provider::Subversion notifies :restart, "service[ps]" notifies :restart, "service[nginx]" end In defaults, I have the following to create the dirs etc. directory "/tmp/.ssh" do action :create owner node[:base][:username] group node[:base][:username] recursive true end template "/tmp/.ssh/chef_ssh_deploy_wrapper.sh" do source "chef_ssh_deploy_wrapper.sh.erb" owner node[:base][:username] mode 0770 end # Put SSH private key to be used with SSH wrapper template "/tmp/.ssh/id_deploy" do source "id_rsa.pub.erb" owner node[:base][:username] mode 0600 end And in the wrapper: #!/bin/sh exec ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i "/tmp/.ssh/id_deploy" "$@" And I have created a public key and uploaded this to github. When I deploy the recipe, it gives me an error: deploy_branch[/var/www/html/ps] action deployEnter passphrase for key '/tmp/.ssh/id_deploy': Obvs I don't have a password set... The private key must therefore be missing.. Just by chance, I removed the id_deploy key from the recipe, deleted the folders and ran it again. Low and behold, it started working... The reason being that the id_rsa.pub && id_rsa files were in /root/.ssh from when I manually generated them to test. I don't understand what I'm doing wrong here. My questions are therefore: Do I need a private and public key on each node I deploy to? The docs don't mention this. Should this not be deploying as non-root user? I have set a user in my roles file.. Why is the ssh_wrapper not doing what it's supposed to A: It took a good couple of days to figure this out properly. Just to clarify, this is what I did to fix it. I do not know if it's correct, but it works for me. Generate a set of public and private keys following this tutorial. Add the public key to the Github repo that you want to clone. Create a template in my default recipe which includes both the public and private keys. See below. Created the relevant templates for the pub and private keys. Created the chef_ssh_deploy_wrapper.sh.erb file (see below) Created a deploy.rb recipe (see below) Uploaded and added the recipes to my role. Ran chef-client. Hey presto! Sit back with a beer and watch your repo. smartly cloned into your dir. The templates are as follows: Create the directories and templates: template "/tmp/.ssh/chef_ssh_deploy_wrapper.sh" do source "chef_ssh_deploy_wrapper.sh.erb" owner node[:base][:username] mode 0770 end template "/home/#{node[:base][:username]}/.ssh/id_rsa.pub" do source "id_rsa.pub.erb" owner node[:base][:username] mode 0600 end template "/home/#{node[:base][:username]}/.ssh/id_rsa" do source "id_rsa.erb" owner node[:base][:username] mode 0600 end Create an ssh wrapper chef_ssh_deploy_wrapper.erb #!/bin/sh exec ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i "/home/#{node[:base][:username]}/.ssh/id_rsa" "$@" (Make sure you use the private key here or it will fail) Finally the deploy.rb recipe: deploy_branch node[:my_app][:deploy_to] do repo node[:base][:repository] ssh_wrapper "/tmp/.ssh/chef_ssh_deploy_wrapper.sh" branch "rails4" user node[:base][:username] group node[:base][:username] rollback_on_error true migrate false environment "RAILS_ENV" => node[:my_app][:environment] purge_before_symlink %w{conf data log tmp public/system public/assets} create_dirs_before_symlink [] symlinks( "config" => "config", "data" => "data", "log" => "log", "tmp" => "tmp", "system" => "public/system", "assets" => "public/assets" ) scm_provider Chef::Provider::Git # is the default, for svn: Chef::Provider::Subversion before_restart do system("su #{node[:base][:username]} -c 'cd #{node[:my_app][:deploy_to]}/current && /usr/bin/bundle install'") or raise "bundle install failed" system("su #{node[:base][:username]} -c 'RAILS_ENV=production /usr/local/bin/rake assets:precompile'") end notifies :restart, "service[my_app]" notifies :restart, "service[nginx]" end The before restart has since been replaced as we were initially compiling ruby from source but decided to use rvm in the end. Much easier for multi-user installations. NB: I'm deploying as an sudo user, if you're doing so as root (avoid this), use the /root/.ssh path instead. I took much inspiration from this article. Good luck, I hope this helps someone.
2024-07-17T01:26:28.774034
https://example.com/article/6911
Harvard grads lead IPO class of 2014 The Ivy League school is the alma mater for seven chief executives who led their companies’ IPOs last year. That’s more than twice the amount of the next highest schools in the rankings, according to figures from Equilar, an executive compensation data firm. Harvard’s performance wasn’t a fluke. The Cambridge, Massachusetts, school has led the rankings for at least the last three years, according to Equilar. Tied for second place last year were Columbia University, Stanford University, Texas Tech University and University of North Carolina. Each school produced three CEOs who took their companies public. The seven newly publicly traded companies led by Harvard alumni range from online bank Ally Financial to pharmaceutical company Kite Pharma. The group notched an average gain of 74 per cent from the date of their market debut to the end of the year. By comparison, the FTSE Renaissance US IPO index, which tracks the performance of US initial public offerings, gained 9.6 per cent last year. The average gain of the companies led by Harvard-schooled CEOs was also better than that of other schools. The IPOs led by former University of North Carolina students rose an average of 39 per cent. Stanford graduates posted an average gain of 37 per cent. Texas Tech University graduates saw an average increase of nearly 7 per cent, while IPOs led by Columbia alumni had an average loss of almost 3 per cent. The Harvard executives are following one of the school’s most famous students. Mark Zuckerberg, founder and CEO of Facebook, studied computer science at the school from September 2002 to May 2004 before leaving to focus on the social networking company. Facebook raised about $16 billion in its market debut in 2012. Among the Harvard graduates who oversaw IPOs in 2014, two earned undergraduate degrees, one completed a residency at Harvard Medical School, while four earned graduate degrees, including two who studied at Harvard Business School. Thomas Eisenmann, a professor at the business school, says that the program has been placing an emphasis on entrepreneurship for at least a decade. “It’s a very strong focus for us,” he said, noting that almost half of the school’s alumni have started at least one company.
2023-08-31T01:26:28.774034
https://example.com/article/6475
const theme = { plain: { color: '#9EFEFF', backgroundColor: '#2D2A55', whiteSpace: 'pre-wrap' }, styles: [ { types: ['changed'], style: { color: 'rgb(255, 238, 128)' } }, { types: ['deleted'], style: { color: 'rgba(239, 83, 80, 0.56)' } }, { types: ['inserted'], style: { color: 'rgb(173, 219, 103)' } }, { types: ['comment'], style: { color: 'rgb(179, 98, 255)', fontStyle: 'italic' } }, { types: ['punctuation'], style: { color: 'rgb(255, 255, 255)' } }, { types: ['constant'], style: { color: 'rgb(255, 98, 140)' } }, { types: ['string', 'url'], style: { color: 'rgb(165, 255, 144)' } }, { types: ['variable'], style: { color: 'rgb(255, 238, 128)' } }, { types: ['number', 'boolean'], style: { color: 'rgb(255, 98, 140)' } }, { types: ['attr-name'], style: { color: 'rgb(241, 250, 140)' } }, { types: [ 'keyword', 'operator', 'property', 'namespace', 'tag', 'selector', 'doctype' ], style: { color: 'rgb(255, 157, 0)' } }, { types: ['builtin', 'char', 'constant', 'function', 'class-name'], style: { color: 'rgb(250, 208, 0)' } } ] } export default { title: 'React awesome styled grid', description: 'A grid system layout for React using styled-components', port: 4000, src: './src/docs', menu: [ 'Getting Started', 'Usage', 'Table of props', 'Utilities', 'Playground', 'Custom configuration' ], themeConfig: { prismTheme: theme } }
2024-04-20T01:26:28.774034
https://example.com/article/2575
889 F.2d 272 Marrenv.Thornburgh* NO. 89-1574 United States Court of Appeals,Fifth Circuit. OCT 25, 1989 1 Appeal From: W.D.Tex. 2 AFFIRMED. * Fed.R.App.P. 34(a); 5th Cir.R. 34.2
2024-06-06T01:26:28.774034
https://example.com/article/6362
Fox News senior judicial analyst Judge Andrew Napolitano says Supreme Court nominee Brett Kavanaugh "should say nothing" about a sexual assault claim against him unless his accuser testifies before the Senate. The commentary comes after Christine Blasey Ford, a psychology professor who says Kavanaugh assaulted her at a party when they were both in high school in the 1980s, said through her attorney Tuesday night that she will not testify before the Senate Judiciary Committee until a full FBI investigation is completed, though such a probe is not currently open. ADVERTISEMENT "If Professor Ford is not physically there at the hearing and doesn't take an oath and give her version of these events, then Judge Kavanaugh should say nothing," Napolitano told Fox Business Network host Neil Cavuto. "His denial should come out of the mouth of the press office in the White House." Judiciary Committee Chairman Chuck Grassley Charles (Chuck) Ernest GrassleyThe Hill's 12:30 Report: Ginsburg lies in repose Top GOP senators say Hunter Biden's work 'cast a shadow' over Obama Ukraine policy Read: Senate GOP's controversial Biden report MORE (R-Iowa) said Wednesday that he's willing to send staff to speak with Ford where she lives in California to hear her story. Grassley also told reporters he is offering four potential venues for Ford to speak, including a public or private hearing with committee members or a public or private discussion with committee staff. "I don't think sending staff members to California and interviewing her in her home will fit the bill," Napolitano said. The former judge also said he believes President Trump Donald John TrumpBiden on Trump's refusal to commit to peaceful transfer of power: 'What country are we in?' Romney: 'Unthinkable and unacceptable' to not commit to peaceful transition of power Two Louisville police officers shot amid Breonna Taylor grand jury protests MORE should request the FBI reopen or continue a background check to serve as Ford is asking for in an effort to avoid Kavanaugh having "taint on his skin" for not exploring all options. "I would rather see a Justice Kavanaugh start in November but without taint on his skin, than a Justice Kavanaugh starting in October but with doubt about whether or not these events happened," Napolitano said. Kavanaugh has staunchly denied the claim against him while already agreeing to appear before the committee for a second time following his bitterly partisan confirmation hearing. “I have never done anything like what the accuser describes — to her or to anyone,” Kavanaugh said in a statement earlier this week. “Because this never happened, I had no idea who was making this accusation until she identified herself yesterday.” Ford says that Kavanaugh had pinned her down on a bed and attempted to take her clothes off, but Kavanaugh has responded that he wasn’t even at the party in question.
2024-07-06T01:26:28.774034
https://example.com/article/9558
Over the past few years I’ve been working in the mHealth and smart energy sectors. Both have a common belief, which is that consumers will do things that are in their own interest – namely spend time and effort in order to save themselves money and keep themselves fit. That mantra has seen a raft of new companies appear in each sector, directly targeting the public with products that attempt to change consumer behaviour or lock them into a brand. In the mHealth sector most have realised that medical or clinical approaches are too difficult, so have euphemistically renamed exercise and dieting as health and fitness. Meanwhile, energy utilities are attempting to improve their image by rolling out customer engagement programs, whether that’s in the form of green button apps in the US, or in home energy displays in the UK. Both hope that this will result in customer loyalty for their brand, attracting new customers and retaining existing ones. In recent months both sectors have latched onto gamification, often as a result of hiring strategic marketing people from web and mobile phone companies. They’ve taken to gamification like enthusiastic bricks to water, hoping it will change the way consumers value their products and buy from them. I think they’re sadly mistaken. As proof, I’d cite the success of Viggle, which illustrates exactly what the average consumer wants from gamification. Viggle let’s you win points by watching TV. It’s nothing to do with better health or savings on your energy bill – it’s the couch potato dream of free pizza for mindless inactivity. The genesis of much of what’s going on can be traced back to loyalty schemes in the retail sector. Retail loyalty schemes aren’t new. In our grandparents’ day there were co-operative stores which offered a divvy (dividend) for regular customers, either through savings books or trading stamps. Later on, companies like Green Shield expanded that principle to multiple participating stores, allowing shoppers to earn points on purchases by collecting stamps which they could exchange for gifts. That in turn has evolved into credit card cashbacks and cross store loyalty cards like Nectar. They are all basically loyalty schemes that reward you for going back to the same store. Traditionally these loyalty schemes weren’t data driven; they simply made a record of how much money you’d spent and rewarded you accordingly. The best known example outside retail chains is Air Miles, which was launched in the UK in 1988 and has been emulated by virtually every airline. Most of these schemes are aimed at regular flyers, trying to make sure you suppress your preferences about when or possibly where you fly in order to accumulate miles that give you free flights, gifts or upgrades. They’ve been remarkably successful, not least in keeping their customers away from experiencing what may be higher service levels on a rival airline. It fascinates me that even the most reviled of budget airlines now run loyalty schemes, which still appear to attract customers. None of these schemes make much use of the data they collect, other than totting up points to award prizes. Hence their value to the companies using them is predominantly one of retaining essentially faceless customers. The shift to extracting value from the data happened when a small start-up called Dunnhumby approached Tesco in 1994 with a proposal to change the way they used their customer information. The story has been told many times, but consisted of Dunnhumby applying data analysis techniques to understand just what Tesco’s customers were buying. Their success in doing this led to Tesco’s ClubCard loyalty scheme, still seen as the benchmark for any such retail loyalty offering, and the famous quote by Tesco’s chairman, Lord MacLaurin that “What scares me about this is that you know more about my customers after three months than I know after 30 years”. Ironically, Tesco has been one of the major supporters of Green Shield stamps ten years before, but had dropped them because of the cost. Dunnhumby has grown and now supports many other clients and its alumni have founded competing companies to engage more segments of the retail sector. Their proposition is more than just loyalty. It uses data to understand what we buy and when we buy it, and entices us to do more of the same through segmentation and personal offers. It’s a trick that most other retailers have attempted to emulate, with varying degrees of success. Whilst they may have been successful in the old fashioned loyalty stakes, it’s far from clear whether any of them have achieved the data analysis and business transformation gains that Tesco has made. However, a lot of that comes down to an understanding of using data for generating new insight, rather than merely for reporting and asset tracking. That’s a common failing of many who are embracing the new buzzword of Big Data, who do not have the insight themselves to realise that it offers something fundamentally new, not just bigger Excel spreadsheets. (The few that do understand this already consider Big to be a passé adjective, having embraced the infinitely more interesting subject of Broad Data.) Whilst most company’s aspirations stop at loyalty – many would be delirious to achieve even that, the new kid on the block is gamification. Gamification is an attempt to meld together the old world of loyalty with the new world of Apps. Apps pose a problem to many traditional companies, as does the whole concept of social media. They see their customers consuming apps and want to be a part of that, preferably putting their brand onto this new, more intimate, fourth screen. Many lost a lot of money in commissioning largely trivial apps that had little effect. But as Apps evolved, it became apparent that consumers were using them in a somewhat unexpected way. Games were being taken up by new demographics, not least by women, who now account for over half of the revenue for some mobile games. And a new industry of health and fitness devices, whose very existence depends on making self-sacrifice compelling were digging into the behavioural research of people like Robert Cialdini to keep their target users counting the calories and walking the walk. All of a sudden the potential was there to try and expand this concept into other everyday tasks to help reinforce brand loyalty. So we see industries from hotel chains to utilities, health clubs to publishers trying to jump on the bandwagon. The greatest, yet most fanciful conviction about its potential contribution appears to come from energy companies and healthcare start-ups, who respectively believe that we care about saving money and getting fit. In thinking this, they delude themselves about the reasons behind gamification’s success, which also turn out to be its Achilles Heel. Which is that it’s only fun if it’s fun. To be explicit, for most people, games are about winning something. And an important motivator is having the chance of winning something that you didn’t expect to win and winning it now. That’s why it’s so difficult to use gamification to reinforce a brand or build up loyalty for the general public. I don’t dispute its success in health and fitness for a small section of the population, but I’d maintain that it is and will probably only ever be a small section. I have friends who use fitness apps to compete against each other, whether that’s in cycling, jogging or losing weight. But without exception, these are people who always competed or who have addictive personalities, and frequently both. The most passionate ones are those who are giving up one addiction, such as smoking, for another, which may be their pedometer. But they’re a limited set of people. It’s why I’d claim that gamification will never work for things like changing energy use behaviour or losing weight for the vast majority of the population. Neither give the instant reward that’s so important to the gamer. Switching off a light won’t have an effect on what you pay for at least a month or more. Nor is the final saving compelling enough. It might give better odds than buying a lottery ticket, but part of the compulsion of games is not just the ratio of the reward to the effort, but its immediacy. Unlike most games playing, switching off the lights is not fun at the time – it’s doing something mundane for the promise of a longer term good. Which is why Viggle hits so many buttons. It rewards you with points for watching TV. You know what you’re going to win. You can see your score racking up relatively quickly as there are achievable targets. And the reward isn’t worthy and boring – it’s a pizza. Gamification doesn’t get much better than that. Moreover it fulfils the second important imperative for any successful gamification app, which is that it generates data for the provider which can be processed and sold, funding the service for its provider. That’s very important, as someone needs to pay for the on-going service with the IT infrastructure costs behind it, which is something that appears to be missing in all of the more worthy gamification plays. The conclusion is that any energy company pursuing gamification is probably pouring money down the drain. For it to work, they need to find a persuasive marriage of action and short term reward, like watching TV and getting free pizza. And whilst a lot of people might be able to propose something they’d like to happen when they turn the lights out, I suspect we’re a long way from any utility daring to offer that as an incentive to save energy. Share this: 0 comments ↓ There are no comments yet...Kick things off by filling out the form below. Leave a Comment Name Mail Website About Creative Connectivity Creative Connectivity is Nick Hunn's blog on aspects and applications of wireless connectivity. Having worked with wireless for over twenty years I've seen the best and worst of it and despair at how little of its potential is exploited. I hope that's about to change, as the demands of healthcare, energy and transport apply pressure to use wireless more intelligently for consumer health devices, smart metering and telematics. These are my views on the subject - please let me know yours. Essentials of Short Range Wireless A helping hand for wireless designers Adding wireless connectivity to a product is a major challenge for any designer. There are so many new concepts, and a plethora of suppliers claiming they’ve solved them for you. I’ve tried to distil 20 years of experience into this book to help you get over the pitfalls, ask the right questions and make sure you understand the answers.
2023-09-07T01:26:28.774034
https://example.com/article/3650
Q: How to store a JsonArray in a Map? I have used the following Code JSONArray jsonArray = new JSONArray(incomingData); Map<String,String> map=new HashMap<String,String>(); for(int i=0;i<jsonArray.length();i++){ JSONObject j = jsonArray.getJSONObject(i); Iterator<?> it = j.keys(); while (it.hasNext()) { String n = it.next().toString(); map.put(n, j.getString(n)); } } But when I execute this code it's throwing an Exception. org.json.JSONException: JSONObject["low_stock_date"] not a string. JsonArray Used [ { "item_id": "1", "product_id": "1", "stock_id": "1", "qty": "99.0000", "low_stock_date": null }, { "item_id": "2", "product_id": "2", "stock_id": "1", "qty": "100.0000", "low_stock_date": null } ] Please help me to over come this issue. A: The value of low_stock_date is null. thats why it is throwing this error. Just add one check for null before adding it into Map. if(!j.isNull(n)){ map.put(n, j.getString(n)); } else{ map.put(n, null); }
2023-08-27T01:26:28.774034
https://example.com/article/8550
SCENE 5. Mr. Price’s classroom. Several days later. The Kates are not near each other. MR. PRICE: That was one of the worst things about the war. Families were torn apart. Brothers fought against each other on opposite sides. Well, let’s get to our worksheet questions. Number One: What color uniforms did the soldiers wear? (Several hands shoot up.)Andre? ANDRE: Mr. Price, I think is was blue and gray. But I forget which side wore which color. MR. PRICE: Can anyone help him? Tami? TAMI: The North wore blue uniforms and the South wore gray uniforms. MR. PRICE: Very good. Number Two. How did the War end? Shane? SHANE: Well, they met at some place called Apple Mantis or something like that and decided to stop fighting. MR. PRICE: That is true. Katelyn Grant and Katherine Lee. Kate G. and Kate L., stand up. Isn’t that amazing? Your great-great-great-great-great-grandfathers could have been the generals of opposing armies. What do you think of that? (The KATES stand, looking shell-shocked. Everyone OOOHHHHs. The sound of a bell.) SCENE 6. Playground. Later that day. A game of Red Rover. On one side, CANDACE, BECCA, BETHANY, KATE G., JUSTIN, and ANDRE. On the other side, in a huddle, ROCHELLE, TAMI, MAYA, KATE. L, PARKER, and SHANE. Throughout the scene, there are appropriate ad lib comments and responses. PARKER: Come on, team, they think they’re so good. They act like they’re so great at sports but they still can’t break our line. Who should we call over?
2024-01-02T01:26:28.774034
https://example.com/article/2605
Q: Return value of get_background_color I want to return the value of get_background_color but that value isn't showing up. <?php echo get_background_color(); ?> I have colors enabled in my customizer, and there is the option 'background color', so I'm kinda confused about this option. And also, how can I add a colorpicker option in the customizer so I can remove the colors section? I have tried: $wp_customize->add_setting('bgcolor'); $wp_customize->add_control('bgcolor', array( 'label' => 'Background color', 'section' => 'themeoptions', 'type' => 'color-picker', )); and $wp_customize->add_setting('bgcolor'); $wp_customize->add_control('bgcolor', array( 'label' => 'Background color', 'section' => 'themeoptions', 'type' => 'color', )); but with the above example the customizer goes blank. Thanks in advance. A: To add custom background support in your theme you need to register the default custom background support. Example:- add_action('after_setup_theme', function(){ add_theme_support( 'custom-background', array( 'default-color' => 'black' //Default color )); }); Now you will see a new section Background Image in customizer and in Color you will see a new option Background color Once you will save the settings you can use echo get_background_color();
2023-08-17T01:26:28.774034
https://example.com/article/2969
I called the company to have my truck engine rebuilt. the sales lady said they could do it for 2,800.00 and maybe 200.00 more for belts hoses oil etc.. in three days I got a call saying that I needed parts 150.00 extra.. I said OK. the next day they called and said in order to warranty the engine they woul have to test the radiator and clean the fuel injectors I told the to do only what was needed to keep the warranty valid. with all this less than a week they called to say it was finished. I get up there and the price is 3,800.00 reluctantly I paid assured I had a new engine the owner said he had it bored. 030 over. within a week I was having trouble the next two months I got the run around. frustrated I took it to a company that checked the compression and concluded the engine had never been rebuilt. my wife had open heart surgery at 42 yrs old and the stress this co. caused us was terrible. one year I still can't travel for work. the truck has only 80 lbs of pressure in two clyinders when it should be 140lbs this co lied and did not give me what I paid for.
2023-12-04T01:26:28.774034
https://example.com/article/1125
Q: Itemscope and itemprop at same level I have a link that looks like this: <a href="//href" itemscope itemtype="http://schema.org/Product"> <img src="src" itemprop="image"> </a> I'd like to put itemprop="url" in the <a> tag, but it contains the itemscope for that product. Can I put that at the same level as itemtype=? Or, do I either need to wrap the whole thing in a div to make it work, or use a <meta> tag for the itemprop="url" microdata? Thanks! A: You can have itemprop and itemscope on the same element, but it will mean something different. In this example, a Product item has the url property: <div itemscope itemtype="http://schema.org/Product"> <a href="//href" itemprop="url">…</a> </div> In this example, some other item has the url property, and its value is a Product item: <a href="//href" itemprop="url" itemscope itemtype="http://schema.org/Product">…</a> (Note for the the latter case: the url value is the Product item, not the URL in the href attribute! So this probably doesn’t make sense for the url property.)
2024-03-05T01:26:28.774034
https://example.com/article/2580
/* @flow */ import traverse from 'traverse'; jest.mock('../../utils', () => ({ requireModule: v => require(v) })); jest.mock('../webpack/buildEntries.js', () => () => ({})); jest.mock('../webpack/buildServerEntries.js', () => jest.fn()); jest.mock('../webpack/prepareEntries.js', () => jest.fn()); jest.mock('../webpack/getAliasesForApps.js', () => () => ({})); jest.mock( 'src/webpack.hooks.js', () => ({ webpackClientConfig: config => Object.assign(config, { mutated: true }), webpackServerConfig: config => Object.assign(config, { mutated: true }), }), { virtual: true }, ); jest.mock('src/config/application.js', () => ({}), { virtual: true }); const compileWebpackConfig = require('../compileWebpackConfig'); const gluestickConfig = require('../defaults/glueStickConfig'); // may want to move this to a central place const mockLogger = () => ({ warn: jest.fn(), info: jest.fn(), success: jest.fn(), debug: jest.fn(), error: jest.fn(), pretty: false, clear: jest.fn(), log: jest.fn(), print: jest.fn(), printCommandInfo: jest.fn(), fatal: jest.fn(), resetLine: jest.fn(), }); const replacePaths = obj => { traverse(obj).forEach(function search(value) { if (typeof value === 'string') { this.update(value.replace(process.cwd(), '/project')); } }); return obj; }; describe('config/compileWebpackConfig', () => { let logger; let originalNodeEnv; beforeEach(() => { originalNodeEnv = process.env.NODE_ENV; logger = mockLogger(); }); afterEach(() => { process.env.NODE_ENV = originalNodeEnv; }); describe('in dev environment', () => { beforeEach(() => { process.env.NODE_ENV = 'development'; }); it('returns the correct client config', () => { expect( replacePaths(compileWebpackConfig(logger, [], gluestickConfig).client), ).toMatchSnapshot(); }); it('returns the correct server config', () => { expect( replacePaths(compileWebpackConfig(logger, [], gluestickConfig).server), ).toMatchSnapshot(); }); }); describe('in production environment', () => { beforeEach(() => { process.env.NODE_ENV = 'production'; }); it('returns the correct client config', () => { expect( replacePaths(compileWebpackConfig(logger, [], gluestickConfig).client), ).toMatchSnapshot(); }); it('returns the correct server config', () => { expect( replacePaths(compileWebpackConfig(logger, [], gluestickConfig).server), ).toMatchSnapshot(); }); }); });
2024-02-08T01:26:28.774034
https://example.com/article/2328
HILLSVILLE –– A loss is a loss, but Carroll County did its image – and perhaps more importantly, its self-image – some good last week. Taking Basset down to the wire before falling 17-14 on a last-second field goal last week, the Cavaliers probably opened some eyes around the Southwest District, and probably boosted their self-confidence in the process. “We were really getting after it defensively,” Carroll County coach Tom Hale said. “I thought our kids played really well. But we made a few mistakes that came back to get us.” One of those areas for improvement would be open-field tackling. Not the type of thing you’d want to be unsure of when facing a guy like Jacob Reynolds. Friday, Reynolds will lead Patrick County to Tommy Thompson Field as Carroll County looks to get in the win column against its second Piedmont District foe in as many weeks. “They’ve got the Reynolds kid back at quarterback, and that pretty much sums it all up,” said Hale. “I think last year he put up 300 yards on us, and we eked out a win on them. But he is one heck of an athlete and we’ve got to contain him.” ‘Eking out a win’ is putting it mildly. Had it been a college or NFL game, last year’s finish would have forever had a title, such as ‘The Stunner in Stuart,’ or ‘The Fairystone Freak,’ or, for Cougars fans, ‘The Claudville Calamity.’ The Cavaliers trailed 27-14 before scoring with a little more than three minutes to play. Still down 27-21 with 71 yards to cover and less than a minute to do so, Carroll County tied the game with a 51-yard Blake Bowman-to-Tyler Reavis touchdown pass. With zeroes on the clock, Mason King booted the PAT for the win. The miracle finish was necessary largely due to Reynolds, who ran for 123 yards and three touchdowns. “We can’t let it be third and long and let him get loose on us, which happened quite often last year,” Hale said. “From what we’ve seen on film, in all of their scrimmages and in their benefit game and in their first game last week, he’s the guy who keeps them in it.” Reynolds ran for two touchdowns and threw for another as the Cougars rallied from a 20-0 second-quarter deficit and into a 21-20 fourth-quarter lead Friday, only to fall to North Stokes, N.C. 26-21. As will be the case most of the year, the Cavaliers will be outsized up front again this week. Facing an even larger size disadvantage last week, Carroll’s line earned nothing but praise from Hale. “I thought those guys up front went after it really, really hard,” he said. “There are lots of things we can improve on, but man, the effort was really there. They didn’t let the fact that we have 170-pound guards and centers deter our kids at all.” The size advantage carries over to Jalen Reynolds, a runningback whom Hale estimates to be in the 250-pound range. But with Patrick fielding newcomers at eight positions, the key will be containing Jacob Reynolds. “You can’t design a defense where you’re not going to have at times kids that have to make plays one-on-one,” Hale said. “I wish we could figure that out, but numerous times last year, and in our game Friday, we had kids in a one-on-one situation, and they’ve got to make those plays. We’ve got to do a better job this week.”
2023-12-13T01:26:28.774034
https://example.com/article/4846
Sag-Mediated Modulated Tension in Terebellid Tentacles Exposed to Flow. The long, compliant feeding tentacles of the terebellid polychaete Eupolymnia heterobranchia not only stretch out over a sandflat substratum but also extend into flow. Tentacles suspended perpendicular to flow responded to increasing velocity by increasing their sag. An analysis of tension in these tentacles, mathematically analogous to that applicable to suspension bridges, shows that sagging permits the tentacles to avoid increases in tension that would otherwise occur as flow increases. Force modulation was achieved by active muscular control rather than by passive material properties. Although these tentacles would certainly break in the experimental flows if they did not sag, the low tension achieved suggests that some other reason, such as limitations on the adherence of cilia and mucus, accounts for the level of tension observed. Because drag is maximum on tentacles oriented perpendicular to flow, reorientation of tentacles, either by sagging or by dangling parallel to flow, additionally reduces tension by reducing drag. Theoretical estimates of drag on tentacles oriented parallel to flow show that they are never in danger of being broken. Drag is sufficient, however, to assist in passive extension of tentacles. While reorientation is a common mode of drag reduction among marine organisms, sagging represents a novel mechanism of mediating structural forces resulting from flow.
2024-06-03T01:26:28.774034
https://example.com/article/6186
If Apple obeys the FBI’s order, it would set a dangerous precedent for the future, briefs claim. 32 of the world’s largest internet, social media, and technology companies have united behind Apple, as the Cupertino-based tech giant fights the FBI’s demands to unlock the phone of Syed Farook, one of the San Bernardino shooters. The companies filed two separate amicus briefs yesterday (March 3) in the United States Distrct Court for the Central District of California, where Apple is challenging a court order to comply with the FBI’s demands. Parties not directly involved in a court case, known as “amicus curiae,” or “friend of the court,” file these briefs to offer unsolicited additional information to a court, in the hope of influencing a case’s outcome. The two new filings join a long list of law professors, civil liberties activists, and consumer groups supporting Apple in the case. Both of the briefs denounce the government’s use of the All Writ’s Act to demand that Apple develop a special “master key” software version of its operating system that can bypass existing security measures, and ultimately grant authorities access to Farook’s phone. The 227-year-old law empowers courts to issue orders to third parties when no other specific statute applies. It has been used in the past to compel telecommunications companies to install wiretaps or record phone conversations. If Apple obeys the FBI’s order, it would set a dangerous precedent for the future, both briefs claim. Law enforcement agencies of all types could demand tech companies provide access to private user data. More worryingly, governments abroad could demand Apple do the same. Make no mistake: If the government prevails in this case, it will seek many such decisions. The government’s motion reassures this Court and the public that the request here is a one-time-only hack. But there arealready strong indications that law enforcement will ask for broad authority under the All Writs Act on facts far different from the terrorism investigation at hand. For example, FBI Director James Comey just days ago told the House Judiciary Committee that this Court’s decision will be “potentially precedential” in other cases involving similar technology. Manhattan District Attorney Cyrus Vance, Jr., likewise told journalists that he“[a]bsolutely” would seek access to all locked phones linked to criminalproceedings if the government’s theory were to prevail here. That is exactly why this Court should reject any case-specific arguments the government makes here. Investigative tools meant for extraordinary cases may become standard in ordinary ones. As one court has already observed, “[n]othing in the government’s arguments suggests any principled limit on how far a court may go. A 31-page brief, submitted by Amazon, Box, Cisco, Dropbox, Evernote, Facebook, Google, Microsoft, Mozilla, Nest, Pinterest, Slack, Snapchat, WhatsApp, and Yahoo, also denounces the invocation of the All Writs Act. The companies argue that Congress, not the judiciary, should decide when the act is implemented. The brief reads: In light of rapidly evolving technology and its tremendous social benefits, Congress is better suited to confront the issues here. And indeed, Congress has already grappled with these issues on many occasions—leading to a comprehensive legislative scheme for regulating investigative methods. Intel and AT&T are among the companies that have independently submitted similar briefs to the court. On Thursday (Mar. 3), Apple formally filed an appeal against the court order. As the case goes forward, the US government will be fighting not just Apple, but the entire US tech industry.
2024-05-26T01:26:28.774034
https://example.com/article/1514
Q: Nested For Loop, Replace If statement I have been practicing my nested for loops recently. I tried building a 5x5 block of coordinates going from (0,0) to (5,5). Each row will go up to y = 5 and then start a new row. Here is the code I have built, it does what I want it to do, the only problem is that I had to use an if statement. Is there another for loop I could use to make it so that I don't have to use the if statement? public class NestedLoops3 { public static void main(String[] args) { for(int counter =0;counter<6;counter++) { for(int counter2 = 0;counter2<6;counter2++) { System.out.print("("+counter+","+counter2+")"); if(counter2==5) { System.out.println(); } } } } } As it is right now it does what I intended but I just want to see if I can replace the if statement with another for loop. A: Yes. Move the println after the nested loop. Like, for (int counter = 0; counter < 6; counter++) { for (int counter2 = 0; counter2 < 6; counter2++) { System.out.print("(" + counter + "," + counter2 + ")"); } System.out.println(); }
2024-03-18T01:26:28.774034
https://example.com/article/6064
[Field of the Invention] The invention relates to a device substrate and a fabricating method thereof, and more particularly relates to a device substrate having exposure openings and a fabricating method thereof. [Description of Related Art] As information technology, wireless mobile communication, and information appliances rapidly develop in the recent years, the input devices for a great many information products have been changed from the conventional keyboards or mice to touch display panels for the purposes of convenience, miniaturization, and being user-friendly. Especially, the touch display panel has become the most popular product among all. The conventional touch display panel is mainly composed of an active device array substrate, an opposite substrate (e.g. color filter substrate), and a display medium disposed between these substrates. Moreover, multiple main spacers and multiple secondary spacers are located between the active device array substrate and the opposite substrate and may be disposed on the opposite substrate or the active device array substrate, for example. In the fabricating method of the device substrate (e.g. opposite substrate, color filter substrate, or active device array substrate, etc.) for the conventional touch display panel, a phase shift mask, half tone mask, or gray tone mask is required for fabricating the main spacers and the secondary spacers that have different heights. The spacers are generally formed of a transparent material and have high UV transmittance. Therefore, the exposure amount needs to be very low in order to achieve a high level difference (i.e. large height difference). However, the control capability of the level difference is limited to the stability of the phase shift mask, half tone mask, or gray tone mask at low penetration. Besides, because the transmittance of the phase shift mask, half tone mask, or gray tone mask is a fixed value after the mask is completed at the factory, the adjustable range of the exposure amount is also limited. In addition, the phase shift mask, half tone mask, or gray tone mask further faces problems such as high production costs and longer stock preparation time, etc. Hence, how to use a general mask (that is, without using the phase shift mask, half tone mask, or gray tone mask) to fabricate main spacers and secondary spacers with different heights while maintaining favorable level difference (i.e. height difference) control capability is an issue that needs to be overcome in the production technology of display panels.
2024-07-27T01:26:28.774034
https://example.com/article/8460
Q: Watching controller variables, which are set to this instead of $scope, possible? Bad Idea I am struggling with the concept of this in angular. I've been reading the differences as explained very well in 'this' vs $scope in AngularJS controllers but I have still issues whether this is useful in many cases at all. I created a controller and a this.the_value var angular.module("TheApp", []) .controller("TheCtrl", ["$scope", function($scope){ this.the_value = "Init value"; }]); Now I like the concept here as I can write ng-controller="TheCtrl as myCtrl" and reference the value in the view by myCtrl.the_value. I separate contexts when dealing with nested controllers, that's fine. Then I realized I need to watch this variable via $scope.$watch. Now I either have to rewrite all my view code and move the_value to $scope instead of this so I can use $scope.$watch("the_value", function(newValue, old ){ console.log("The old value: '"+old+"', the new value: '"+newValue+"'"); }); or do some nasty things like $scope.$watch("myCtrl.the_value", function(newValue, old ){ console.log("This: The old value: '"+old+"', the new value: '"+newValue+"'"); }); which is evil as I am creating a dependency on my view alias of the controller name. If I refactor the view alias, this will break. (Even unit testing will get dirty with this dependency) Does this has a very very limited use, or am I getting something wrong? Everywhere where I initially started using this turned into $scope when I was adding new behaviour to the code. A: If you are using this, you can watch first level variables passing a function as first parameter to $scope.$watch $scope.watch( function() { return this.the_value; //this is the real variable to be watched }.bind(this), //binding allows to use 'this' inside function function(newVal, oldVal) { console.log(newVal, oldVal); //this is the callback } );
2023-11-16T01:26:28.774034
https://example.com/article/8310
Q: Jquery keyup event not firing I'm trying to create handle the keyup event in a search field in my page using JQuery. The event is not being fired however, I don't see anything in the console. relevant javascript $('input[type=search]').keyup(function () { var query = $(this).val().toLowerCase(); console.log(query); $('li.file').each(function (index, element) { var name = $(element).text().toLowerCase(); if (name.indexOf(query) >= 0) { $(this).removeClass('hidden'); } else { $(this).addClass('hidden'); } }); }); search field <li> <div class="input-group"> <span class="input-group-addon" id="basic-addon1">&#128269;</span> <input type="search" class="form-control" placeholder="Search" aria-describedby="basic-addon1"> </div> </li> A: i check your sample on my side all run find. try replacing your code by something like the following : $(function(){ $('input[type=search]').keyup(function () { var query = $(this).val().toLowerCase(); console.log(query); $('li.file').each(function (index, element) { var name = $(element).text().toLowerCase(); if (name.indexOf(query) >= 0) { $(this).removeClass('hidden'); } else { $(this).addClass('hidden'); } }); }); }); To be sure to call your function when the DOM is ready
2024-02-08T01:26:28.774034
https://example.com/article/3414
High-content fluorescence-based screening for epigenetic modulators. Epigenetic processes have gained a great amount of attention in recent years, particularly due to the influence they exert on gene transcription. Several human diseases, including cancer, have been linked to aberrant epigenetic pathways. Consequently, the cellular enzymes that mediate epigenetic events, including histone deacetylases and DNA methyltransferases, have become prime molecular targets for therapeutic intervention. The effective and specific chemical inhibition of these activities is a top priority in cancer research and appears to have therapeutic potential. This chapter describes the development of mammalian cell-based fluorescent assays to screen for epigenetic modulators using an innovative combination of approaches. Detailed protocols for the use of the assays in drug screens, as well as for the initial characterization of hits, are provided. Furthermore, options for evaluating the mechanism of action of these compounds are presented and principles to govern the choice of hit compounds for the development of leads are discussed.
2024-07-22T01:26:28.774034
https://example.com/article/1105
Six and Eya expression during human somitogenesis and MyoD gene family activation. This report describes the characterisation of the expression profile of several myogenic determination genes during human embryogenesis. The data were obtained from axial structures and limb buds of human embryos aged between 3 and 8 weeks of development. Using in situ hybridisation to detect Pax3 and MyoD gene family mRNAs, and immunochemistry to follow Six and Eya protein accumulation, we have been able to establish the chronology of accumulation of these gene products. As in mouse, the first transcripts detected in myotomes of 3 week-old embryos are Pax3 and Myf5, followed by the expression of myogenin. MyoD appears to be activated well after Myf5, myogenin and MRF4 in the early myotome, whereas, in limb bud muscles, the presence of all four of these mRNAs is concomitant from 6 weeks. Six1, Six4 and Six5 homeoproteins are detected later than Myf5 activation. These Six homeoproteins are first observed in the cytoplasm of myogenin expressing cells. At later stages of development, Six1 and Six5, but not Six4, are translocated into the nuclei of myogenic cells, concomitantly with MyHCemb expression. Eya1 and Eya2 proteins, potential Six cofactors, were also detected in myogenin positive cells, but their accumulation was delayed and was mainly cytoplasmic. These results preclude that early activation of Myf5, myogenin and MRF4 is under the control of Six and Eya proteins, while Six and Eya proteins would be involved in later steps of myogenic differentiation.
2024-02-11T01:26:28.774034
https://example.com/article/3965
[Perioperative blood coagulation therapy and diagnosis]. The risks and adverse reactions of fresh frozen plasma (FFP) and coagulation components have changed considerably in the last few years because of the spread of HIV on the one hand, and the advances in preparation and sterilisation of the coagulation components on the other hand. Therefore, the indication for FFP and the various coagulation components deserves permanent consideration. FFP is still the therapeutical means of choice for the treatment of acquired (complex) plasmatic coagulation disorders, even though the (still) small risk of virus transmission in Middle Europe has to be taken into account. Coagulation components are primarily indicated in congenital (isolated) plasmatic coagulation disorders. Only in gross or very acute acquired coagulation disorders are coagulation components needed in addition to FFP. The same regimen is recommended for the use of antithrombin III (AT III) concentrates. In cases of acquired antithrombin deficiency, antithrombin III substitution is indicated only when the anticoagulation by heparin alone or in combination with FFP is insufficient or when the heparin dose required might cause an unacceptable bleeding risk, e.g. in simultaneous thrombocytopenia. Then AT III becomes an important therapeutic agent, especially in DIC. In addition, information regarding a rational and economic substitution of FFP and coagulation components is given, and other substitutes are mentioned which could possibly be used with less risk. Finally, the necessity of accurate diagnosing is emphasized. Close cooperation between the physicians in the clinics and in the department of transfusion medicine/hemostaseology reduces unnecessary and inadequate application of coagulation components. This also means an improvement in the patient's therapy.
2024-05-11T01:26:28.774034
https://example.com/article/7064
A journey of survival against all odds There have been several times I’ve almost written another post. Sometimes it’s because a phrase catches my ear and I think “that could have been one of Stephanie’s blog titles.” Other times, I look at my last post and feel it’s been far too long, and feel that I have an obligation to write so that people will get the email saying there’s a new post and be reminded of Stephanie and the faith, hope and love that she shared. But as you can tell from the sparsity of my posts, the thoughts don’t often make it to paper (well, in this case, to the interwebs). I also want to make sure that my posts have meaning and purpose behind them like Stephanie’s did, and aren’t just my babbling thoughts. Anyway, today I was going through my office, tidying up papers and books and other junk and sorting through what I need to hold on to and what I can part with. It’s much easier at this point to do that with my stuff than it is with Stephanie’s, so I figured this was a start. As I was going through bags and folders of papers, I found a plastic bag with a bunch of footnotes in them. Not like a documentation foot note, but a piece of paper cut into the shape of a foot. There were probably about a hundred, and I immediately remembered what they were from. When Stephanie and I were newly weds, she would pack my lunch for me before I left for work, and she often wrote a note in my lunch for me. It was one of her ways of showing me that she loved me. Some were funny and some were serious, but all of them were encouraging and full of love. I enjoyed reading over every single one of them today and thinking about what was happening in the days she gave me those notes. I once again went down a rabbit hole thinking about how much life has changed from being a newlywed, to having a daughter, to Stephanie’s diagnosis and death, and then learning to continue to live after that. To say the last couple years have been a struggle would be an understatement. My life right now, personally, professionally, and spiritually, is completely different than how I would have predicted it just over two years ago. And while my feet are more under me than 18 months ago, a lot of it is still chaotic and confusing and complicated. But one of her notes that she wrote me after a tough week really hit home today: Remember to keep pushing forward no matter what and the end will be glorious. “For I consider that the sufferings of this present time are not worthy to be compared with the glory that is to be revealed to us.” I couldn’t tell you now what I was struggling with that week, or even what week exactly it was. But applying that to my life today, to this minute, it’s probably more relevant now than it was then. I certainly have many challenges facing me in my life today. But I also have many blessings. And regardless of whether I’m personally having a good day or a rough day, what’s important is to keep going. Keep striving to turn the best out of every situation, no matter how complicated or unfair or difficult. Life isn’t easy, and living in and regretting the past isn’t going to help us get anywhere. That’s not to say we can’t grieve and be sad or feel sorry for ourselves for the circumstances we find ourselves in. But if we are stuck in that state of mind and stop trying to push forward, that’s where we get in trouble. It doesn’t mean we have to finish the marathon today, or tomorrow, or even in 69 years. But moving a step, a foot, an inch: the effort to continue forward is what we can’t be without. This week is Holy Week. If you haven’t meditated on the stations of the cross this Lent, I would encourage you to do so this week, particularly by Good Friday. If your church isn’t holding one, you can simply search them online or watch this short video, although I would encourage you to pause at each station to consider what Jesus was going through and what it must have been like for Him, his mother, the apostles, Simon, and anyone who witnessed it. As Jesus carried His cross to the place He was crucified, I can only imagine the pain and agony He was in. How each step must have radiated the pain through every gash in His skin. Yet he continued forward, a step at a time. If Jesus could do that then, even knowing what reaching the end of the path meant for Him, surely we can continue, no matter how difficult the struggle, to keep pushing forward as well. His case is obviously an extreme one, but it also reminds us whatever struggles or difficulties we’re going through, it could always be worse. And because He went through that for us and because of God’s grace, we have the chance to have God’s glory revealed to us when our time on earth comes, as I have not doubt Stephanie is experiencing now. It’s crazy to me how a little note Stephanie wrote to put in my lunch over six years ago can have so much relevance to my life today. I miss you, Beautiful, and I love you. 10 thoughts on ““Just remember to keep pushing forward no matter what and the end will be glorious.”” Michael, thank you so much for sharing your thoughts and life experiences. Today I needed your great reminder about life “keeping going doing my best”. Stephanie’s note is so inspirational and your love for her as well. Wishing you a your beautiful daughter a blessed Easter! Great to read your post, Michael. Thank you for the reminder to always keep moving through life’s trials. As you know, some are more challenging than others. This Holiest Week of our Christian year is a good time to reflect on that . You, Stephanie and Sarah remain in my prayers and I wish you and Sarah a beautiful Easter. Much Love to you both. 💙❤ Thank you so much for sharing this! My husband has been gone 9 years in May and sometimes I still need this reminder. “Keep pushing forward and no matter what the end will be glorious” awesome perspective and what a treasure you found in those little notes. Prayers to you and your daughter. When scrolling through my email, when I see one from you I know God has something he wants me to hear. Thank you so much for sharing your thoughts and feelings with us. Praying for your entire family always! Today is a special day! Thank you, Michael, for sharing these amazing words! They truly touched me, and mean so much to me at this time in my life! As we celebrate Holy Thursday, we will be singing “Faith, Hope and Love” at mass tonight. One of my fondest memories will always be Stephanie singing the verses with me! ((((HUGS)))) Thank you for sharing; we continue to pray for you, Sarah and Stephanie. Our pastor at St. Mary of the Assumption emphasized in his homily today the virtue of Hope; of never losing hope. You and Stephanie were meant for each other and Sarah is lucky to have you as her father. None of the three; faith, hope and love ever end. True, they are tested, but they sustain us in our life here on earth. Michael, this post just popped into my email account where messages that get sent to multiple people show up. I have no idea how that happened, but today I am anxiously waiting to hear from a doctor about a serious surgery she proposed. This message is exactly what I needed to remind me the God is already ahead of this, and the pain I am in daily serves a cause, and is not just for nothing. So even though you posted this several months ago, God is using you and Stephanie to get God’s message through to someone who needed it TODAY. Our God is a great God, and the love you and Stephanie shared, and continue to share, brings God’s love closer to us all. Blessings to you and your sweet Sarah as you continue your journey. Search Search for: Text Widget This is a text widget, which allows you to add text or HTML to your sidebar. You can use them to display text, links, images, HTML, or a combination of these. Edit them in the Widget section of the Customizer.
2024-02-13T01:26:28.774034
https://example.com/article/3426
"We need to incentivise and encourage private sector participation in affordable housing for urban poor, as the housing sector cannot grow without infrastructure development and access to low-cost funds," HUDCO chairman V.P. Baligar said at a day-long 'South India Real Estate Conference', organised by the Federation of Indian Chambers of Commerce and Industry (FICCI) here. In view of high cost of capital and credit risk and rising inventories (unsold flats), Baligar said financing options should be made available for affordable housing providers, individuals and community borrowers. "The private sector should be allowed external commercial borrowings for affordable housing projects due to financing challenges faced by stakeholders due to non-availability of cheaper and long-tenor finance," Baligar said. Noting that southern states (Andhra Pradesh, Karnataka, Kerala, Puducherry and Tamil Nadu) have grown phenomenally on the real estate map, FICCI director-general Arbind Prasad said demand for affordable housing across the country would zoom to a whopping 38 million in the next 17 years, creating employment opportunities to around 17 million over the next decade. "Though urbanisation level in south India at 41 percent was greater than rest of the country, lop-sided development of real estate is widening the demand-supply gap with 95 percent shortage for economically weaker sections and low-income group segments," he lamented. Karnataka Chief Secretary S.V. Ranganath said the real challenge was in offering housing opportunities for low and economically weaker section groups considering roadblocks faced by developers and builders - from capital to permissions - the cost of which is passed on to them. "Small changes in procedure and processes might bring down the cost. As urban land is expensive and scarce, how will a private developer and builder incentivise. Since policies keep changing, we need urgent steps to reduce regulatory risks, micro-economic risks and benchmarking according to international standards," Ranganath said, releasing a white paper on 'Building New Dimensions for Real Estate Growth' brought out by Ficci and global consultant Ernst & Young. -- Get stories like this on the Yahoo app and discover more every day.Download it now.
2024-07-11T01:26:28.774034
https://example.com/article/9944
This article is more than 2 years old. February 23, 2017 This article is more than 2 years old. The top two aides to US president Donald Trump have been trying to show the world that, despite reports about their “war for the White House,” they’re actually really, really good buddies. Chief of staff Reince Priebus and senior advisor Steve Bannon made the latest stop on their friendship tour today at the Conservative Political Action Conference. Priebus called Bannon “my dear friend.” They talked about how they “share an office suite together,” only to have moderator Matt Schlapp reveal that this just means their offices “are very close to each other.” Trump surrogate Newt Gingrich stepped in on Twitter in case anyone had missed the subtlety of the message. The charade, however, could stretch only so far. When Bannon attempted to a fraternal pat on Priebus’ knee, the dapper and normally composed chief of staff seemed to react with palpable revulsion:
2023-11-18T01:26:28.774034
https://example.com/article/5905
Combating child homicide: preventive policing for the new millennium. High-profile media coverage of crimes against children has heightened public awareness of critical child safety needs and issues. However, numerous research studies in the area of child homicide have illustrated the importance of the power of science to correct false perceptions and misinformation, improving how to best serve and protect our children. Age-based analyses of childhood crime patterns have vastly improved how law enforcement and social service practitioners identify, investigate, and resolve child victimization cases. Future protective efforts must involve multiagency and multidisciplinary collaboration. Law enforcement, social service clinicians, educators, and academicians should jointly develop and implement pragmatic and effective prevention, detection, and resolution programs and policies.
2024-04-20T01:26:28.774034
https://example.com/article/2955
Frank Howard (columnist) Frank Howard (3 January 1931 – 26 February 2008) was a Canadian journalist and columnist who wrote for the Ottawa Citizen, The Globe and Mail, the Montreal Gazette, the Montreal Star, and the Quebec Chronicle-Telegraph. He was born on January 3, 1931 in Montreal, Quebec, Canada to anglophone parents, but grew up in a francophone community attending l'Academie Roussin in Pointe-aux-Trembles. As a young man, he also attended Queen's University in Kingston, Ontario, returning to Quebec (the francophone province) in the 1950s and 60s to cover the Quiet Revolution for the anglophone press. As a bilingual anglophone writing during the 1960s, he was an influential figure in the Canadian political scene at a time when there was little communication between anglophone and francophone communities. According to John Gray of The Globe and Mail, Frank Howard sought to introduce English and French Canada to one another. During the Quiet Revolution, nationalist sentiment ran high and the two ethnicities were seen as something like "Two Solitudes". As an anglophone and a political moderate, Frank Howard was sympathetic to Quebec grievances without supporting separatist goals. At the Gazette, and later at The Globe and Mail, Howard broke many important stories in English Canada including the infamous "Vive le Québec libre" speech by Charles de Gaulle as well as covering other seminal moments in Quebec history, such as the founding of the Parti Québécois and the nationalization of Hydro-Québec. He worked with both René Lévesque (who became the first separatist Premier of Quebec) and Pierre Trudeau (who was the Prime Minister of Canada). In 1969, Frank Howard was recruited by the Canadian federal government under Trudeau for work in the Department of Communications (he became Director of Information under Eric Kierans). There, among other things, he wrote speeches for Kierans during the October crisis. He left the civil service in the 1970s and began a daily column on the federal bureaucracy. The column, called The Bureaucrats, ran in the Ottawa Citizen for 20 years. He died on February 26, 2008 in Mexico of complications related to lung cancer. References External links http://www.theglobeandmail.com/servlet/story/LAC.20080301.OBHOWARD01//TPStory/Obituaries http://www.canada.com/ottawacitizen/news/city/story.html?id=490d4f9d-436f-40c4-a7c2-bcce176a5dbd http://www.qctonline.com/node/447 http://books.google.ca/books?id=E5AIU2qChy0C&pg=PA87&dq=%22Frank+Howard%22+Eric+Kierans&sig=fAFTAJFegv7hGT2JdWprhbxqPmo#PPA1,M1 Category:1931 births Category:2008 deaths Category:Canadian columnists Category:Journalists from Quebec Category:People from Montreal
2023-09-13T01:26:28.774034
https://example.com/article/1674
REFUGIO — Council member Karen Watts proposed that the mayor and five council members give up their salaries so the money can be dispersed among the 22 city employees. “I was really thinking about how we could get money together to pay the employees extra,” Watts said. The mayor makes approximately $12,000 per year and each council member makes $2,400 per year. Combined, that amounts to approximately $24,000 that would be split between 22 employees. Under her proposal, department heads would not receive a share of the money. She also suggested that the salaries of department heads be frozen for two years. “We need to set an example at the top to help the employees make more money,” she said. The council may vote to relinquish their salaries but the action will not take place until May, after the local election, according to Donald Kubicek, city attorney. “We have three councilmen coming up for election,” said Ron Nelson, councilman. Nelson pointed out that, should the council do away with the salaries, the newly elected aldermen will have to work for two years without any form of stipend. Under the law, salary changes do not go into effect until after the election. Those elected in May will not be allowed to reinstate the salaries until after the 2013 election. Several details must be worked out, according to Callie Shreckengost, city secretary, who suggested that a workshop may be necessary. Shreckengost said a bookkeeping problem would have to be resolved regarding moving money from the general fund into water and sewer funds. A workshop will be held at 6 p.m. before the Feb. 28 meeting. Municipal Court Judge Gary Bourland announced that the court had collected $26,788 in fines for the months of October, November and December and another $17,143 in court costs. Much of the fines were collected during a warrant round up conducted by the Refugio Police Department. The judge pointed out that the fines not only come from traffic tickets and citations but also from fines levied for ordinance violations. “We had 37 city ordinance violations – 15 were fined during the month of December,” Bourland said. The council also agreed to a $12,000 offer from Columbia Tech Tanks, a company that installed an above ground storage tank on Vance Street. The lining of the tank caused the water to turn blue and flaked off. The council also approved a request from the Refugio County Historical Commission for 85 percent of $6,400 or $5,440 for the Texas Independence Wine Classic set for Saturday and Sunday, March 10 and 11. The commission also received $350 for the relocation of the Civil War Monument to Heritage Park. Currently the monument is erected in front of the courthouse. “It is stained and you can’t read the words,” said Rosemary Kelley, president of the commission. The refurbishment and moving will cost $1,100. In police department matters, Erin Landrum was hired as tshe new police officer.
2024-02-14T01:26:28.774034
https://example.com/article/5365
Post navigation Release schedule for Corosync Needle (2.0) Over the last 18 months, the Corosync development community has been hard at work making Corosync Needle (version 2.0.0) a reality. This release offers an evolutionary step in Corosync by adding several community requested features, removing the troubling threads and plugins, and tidying up the quorum code base. I would like to point out the dilligent work of Jan Friesse (Honza) for tackling the 15 or so feature backlog items on our feature list. Angus Salkeld has taken the architectural step of moving the infrastructure (ipc, logging, and other infrastructure components) of Corosync into a separate project (http://www.libqb.org). Finally I’d like to point out the excellent work of Fabio Di Nitto and his cabal for tackling the quorum code base to make it truly usable for bare metal clusters. The release schedule is as follows: Alpha January 17, 2012 version 1.99.0 Beta January 31, 2012 version 1.99.1 RC1 February 7, 2012 version 1.99.2 RC2 February 14, 2012 version 1.99.3 RC3 February 20, 2012 version 1.99.4 RC4 February 27, 2012 version 1.99.5 RC5 March 6, 2012 version 1.99.6 Release 2.0.0 March 13, 2012 version 2.0.0
2024-06-11T01:26:28.774034
https://example.com/article/1255
# [377. Combination Sum IV](https://leetcode.com/problems/combination-sum-iv/) ## 题目 Given an integer array with all positive numbers and no duplicates, find the number of possible combinations that add up to a positive integer target. Example: ```text nums = [1, 2, 3] target = 4 The possible combination ways are: (1, 1, 1, 1) (1, 1, 2) (1, 2, 1) (1, 3) (2, 1, 1) (2, 2) (3, 1) Note that different sequences are counted as different combinations. Therefore the output is 7. ``` Follow up: - What if negative numbers are allowed in the given array? - How does it change the problem? - What limitation we need to add to the question to allow negative numbers? Credits:Special thanks to @pbrother for adding this problem and creating all test cases. ## 解题思路 见程序注释
2024-06-05T01:26:28.774034
https://example.com/article/6118
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. MacBook Pro battery life Hi, I use my MacBook pro for about 6-7 hours each day. I have had it for about a year now. Sometimes I have it plugged into the mains all day. Sometimes I work off the battery and let it run down. Sometimes I work until it runs out of battery and then I plug it into the mains again and start working again. So as you can see there is no consistency to the way I charge, re-charge and run down the battery. Is this detrimental to the long-term life of the battery? The conclusion that I draw from these two websites, is that it's not a good idea to leave your MacBook plugged in all day, as that's just not how the battery's are designed to work, but instead to do cycles. "Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program." - Linus TorvaldsAnime Views ForumsBernie While I know nothing about how batteries technically work, that seems like a horrible design on the part of Apple. Bernie's reply is correct. I've been told the same thing. You're supposed to let the battery run down then recharge it. Or, more generally, you should USE the battery to preserve it, rather than overcharging it. Why there isn't some feature of the $2000+ computer that fixes this.... I don't know. But that's apparently the case. It's inconvenient when you want to use the computer in real life-- good to charge it in case you'll be moving it around, rather than just letting the battery go down while you're sitting with the power adapter right next to you. And for the record, the battery life is, I think, somewhere around 300 cycles. At least I think they said "cycles". I don't think it's literally 300 charges because obviously that would run out pretty quickly. But there's some measure they have I suppose. And for the record, the battery life is, I think, somewhere around 300 cycles. At least I think they said "cycles". I don't think it's literally 300 charges because obviously that would run out pretty quickly. But there's some measure they have I suppose. It's 1000 full cycles actually. "Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program." - Linus TorvaldsAnime Views ForumsBernie Maybe for the new batteries that it's. I know they said 300 a couple years ago with my older mac. And a "cycle" is just a full use of the battery? That doesn't seem like much at 300x2hrs (old mac), although 1000x5hrs isn't too bad this time around, although realistically it's probably 1000x2.5hrs as the battery life gets lower over time. So, including time it's plugged in, you get something like 5,000 hours out of a battery? Does that seem low? Unfortunately, that statistic is incredibly misleading. Fresh out of the box the computer will do around 80-90% of what it claims to do. Note that it's probably actually realistic-- it would do close to 100% if I was using the computer very lightly-- maybe typing a plain text document and nothing else, with the screen dim. So, ok, fair enough. And that lasts for a while. Then after a while of use, I'd say around 6 months, the battery life goes way down. Now it's been well over a year for me and it's a fraction of what it used to be. But at least that fraction is still around 2 hours. With my old one by this time it was about 30 minutes. So, from the two computers, here are the stats: Original: 2.5hrs; after a year or two: 20-30 minutes Original: ~5hrs; after 1.5 years: ~1-3hrs It's still pretty usable at 1-3 hours. At least a big change from my last one. But it would be nice to actually have the advertised 5 hours back! For the newest ones that claim that much battery life, I'm sure it's the same. They'd get down to 3-4 hours within a year or two. That's not too bad, though. I wouldn't say it's misleading at all, mainly because in an ideal situation it does do exactly what it says on the box. With anything like this, you're going to have to be prepared for slightly less than it says. A good example here is an iPad. After a year of use, I can still get the full advertised 10 hours out of it. "Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program." - Linus TorvaldsAnime Views ForumsBernie
2024-07-28T01:26:28.774034
https://example.com/article/9407
Q: Class#newInstance in GWT I know that GWT doesn't emulate this method, but I need smth that provide its functionality. I have tried next approach: private static <T extends Widget> T createWidget(Class<T> widgetClass) { return GWT.create(widgetClass); } But when I try to compile it I get an error: Only class literals may be used as arguments to GWT.create() So, how can I write a foresaid method that will emulate Class#newInstance? A: GWT.create() always needs the class literal as argument, which means that you has to pass this: GWT.create(MyClass.class) and no other thing. This is so because the gwt compiler has to decide which class to pick up in compile time, note that in your code the class is passed in runtime. If you are planing to use GWT.create for a reduced and well known set of classes you can do something like that: private static <T extends Widget> T createWidget(Class<T> widgetClass) { if (ClassA.class.equals(widgetClass)) { return GWT.create(ClassA.class); } else if (ClassA.class.equals(widgetClass)) { return GWT.create(ClassB.class); } return null; }
2024-04-16T01:26:28.774034
https://example.com/article/4331