text
stringlengths 11
12.9M
| pile_idx
int64 298
134M
|
---|---|
Olefin hydrocarbons are useful for the production of a number of petrochemical products, such as polymers, motor fuel blending additives, and other products. Short chain saturated hydrocarbons having from 2 to 5 carbon atoms per molecule are often subjected to dehydrogenation to form the corresponding olefin. The olefins, in turn, may be used in the alkylation of isoparaffins, in the etherification of alcohols to make motor fuel blending additives, or as monomers used to produce various polymer materials.
One particularly useful olefin is propylene, which is produced by dehydrogenation of propane. Propylene is the world's second largest petrochemical commodity and is used in the production of polypropylene, acrylonitrile, acrylic acid, acrolein, propylene oxide and glycols, plasticizer oxo alcohols, cumene, isopropyl alcohol and acetone. The growth in propylene production is primarily driven by the industry demand for polypropylene, which is used in such everyday products as packaging materials and outdoor clothing.
Propylene is primarily produced from the dehydrogenation of propane. A conventional propane dehydrogenation process involves the following steps: dehydrogenation of propane to propylene in a reactor, compression of the reactor effluent, and recovery and purification of the propylene product. FIG. 1 shows the steps in a conventional dehydrogenation process. In the dehydrogenation step (1), the conversion of propane to propylene is typically carried out over a catalyst. The effluent from the dehydrogenation unit is compressed in a compressor (2) to a sufficiently high pressure, typically 150 psig or greater, to recover unreacted propane and propylene from lighter components in a recovery section.
In the recovery step (3), the compressed reactor effluent is successively chilled with refrigeration to maximize the recovery of propane and propylene for further purification. The offgas from this process mainly consists of hydrogen, methane, ethane and ethylene. The hydrocarbons from the recovery step (3) are then subjected to distillation in the purification step (4). In a first distillation column, a deethanizer, ethane and lighter gases are recovered as overhead offgas, and propane and propylene are recovered in the deethanizer bottoms stream. In a second distillation column, generally referred to as a product splitter, propylene product is recovered as overhead and propane from the bottoms is recycled back to the dehydrogenation step. A purge stream of fresh propane and recycled propane are distilled to remove heavier components from the process. During purification, the product splitter is typically reboiled by using an external heat source (e.g. heat pump) whereby the overhead vapor is compressed and used as the reboiling medium.
One common process for production of propylene by dehydrogenation of propane is known as the CATOFIN process. In the CATOFIN process, propane is converted to propylene by feeding propane to a dehydrogenation reactor containing a fixed bed Chromium-Alumina catalyst. There are typically multiple dehydrogenation reactors operating in parallel to allow catalyst regeneration to occur in some reactors while others are in operation. The dehydrogenation reactors are typically maintained at about 600-650° C.
The effluent from the dehydrogenation reactors is cooled and compressed using a steam driven product compressor. The compressed product is sent to a recovery section where inert gases, hydrogen and light hydrocarbons are removed from the compressed reactor effluent. The propylene rich gas from the recovery unit is then sent to the product purification section where propylene is separated from propane as described above.
The purification step of a conventional propane dehydrogenation process is shown in FIG. 2. The product splitter (110) in the conventional process is fed the heavy end from a deethanizer which contains C3+ compounds through feed line (100). This feed is distilled in the product splitter such that the propylene product is recovered in the overhead stream (102) and the majority of the remaining compounds, including unreacted propane, exit in the bottoms stream (128). This conventional product splitter is operated at pressures of about 80-100 psig and temperatures of 40-60° F.
The overhead propylene vapor stream (102) is combined with the overhead (105) from separator (150) and sent to heat pump (130) through line (106). The heat pump is driven by steam turbine (131) using high pressure steam provided through line (133). The exhaust steam is discharged through line (122) to condenser (160), where it is cooled and discharged from the plant.
The overhead vapor stream (102) is compressed in heat pump (130) and flows through discharge line (108) to provide heat to product splitter reboiler (120). The warmed propylene is split, with a portion flowing back to the product splitter through line (114), and the remainder flowing through line (112) to product separator (150). The overhead (105) from the separator (150) is combined with the overhead propylene stream (102) from the product splitter and fed to the heat pump (130) as described above. The propylene product (118) from the bottoms of the separator is sent to other units for further processing.
The product compression machine is driven by steam turbine (141) which is fed high pressure steam through line (143). The product compressor is fed the product from the dehydrogenation reactor (not shown) through line (127) for compression. The compressed dehydrogenation product is fed through line (126) for separation in a deethanizer. In conventional plants, the exhaust steam from the steam turbine (141) is discharged through line (124) to condenser (170), where it is cooled and discharged from the plant.
The bottoms of the conventional low pressure product splitter comprises mainly propane. The bottoms are discharged through line (128) and split, with a portion of the bottoms recycled through line (104) to reboiler (120), where it is heated and sent back to the product splitter (110). The remainder of the bottoms are discharged through line (116) and sent back to the dehydrogenation reactors.
This conventional dehydrogenation process has some inherent limitations. One primary limitation is the amount of input energy required to produce the propylene product. Currently, the total energy consumption for the conventional dehydrogenation process, for example, is about 100 kcal/kg of propylene product. As such, there exists an ongoing and unmet need in the industry for a less expensive and more efficient method for dehydrogenation of propane. | 53,514,463 |
Reefs suffering from worldwide die-off
A significant
proportion of the world's coral has died this year as a result of
the highest sea temperatures on record.
November 30,
1998
Web posted at: 11:50 AM EST
By Environmental News Network staff
"The coral reefs are the canary in the mine for global warming. They will go first,"
said Dr. Thomas Goreau in testimony at a meeting at the climate change talks
in Buenos Aires.
Goreau, a scientist working with the International Union for the Conservation of Nature, said a significant proportion of the world's coral has died this year as a result of the highest sea temperatures on record. In areas surveyed in the Indian Ocean, between 70 and 90 percent is dead, IUCN scientists said.
Reefs in tourist areas renowned for their diving opportunities, such as the Seychelles, Mauritius and the Maldives, have suffered massive die-offs. Thousands of miles of corals in the western Pacific, from Vietnam to the Philippines and Indonesia, have died or bleached as they have been starved of the symbiotic algae that provide their food and energy. The only large areas of coral to have escaped some devastation are the atolls of the central Pacific.
To highlight the economic importance of coral reefs, Gourequ noted that reefs provide more than 100 countries with fish and other services, such as tourism worth $500 billion a year. They also prevent tidal waves and erosion. And they support 93,000 fish species -- 25 percent of the total -- in 0.3 percent of its sea area.
The IUCN conclusions seem to be backed up by the results of Reef Check '97, the first global survey of human impacts on the world's coral reefs. Organized by the Institute for Environment and Sustainable Development, the survey involved more than 100 marine scientists and 750 recreational divers who surveyed 300 coral reefs in 30 countries and territories between June 15 and Aug. 31, 1997.
The Reef Check methods differ from those used in traditional ecological surveys in that they were focused specifically on detecting the effects of humans on the coral reef ecosystem. Results from about 230 sites revealed a clear pattern of global damage to coral reefs, particularly due to overfishing and destructive fishing.
Reef Check '97 teams found that the mean percentage of living coral cover on reefs was 31 percent globally, with the Caribbean recording the lowest value at 22 percent, possibly reflecting recent losses due to bleaching and diseases. The ratio of live to dead coral was highest in the Red Sea, suggesting that these reef corals are the healthiest in the world. One apparent bit of good news is that only seven sites showed greater than 10 percent cover of fleshy algae, indicating that nutrient enrichment associated with sewage pollution was not a problem at most of these "good" sites. Sewage pollution may be more important at reefs near urban areas which were not extensively studied in this survey.
Reef fish in the Indo-Pacific, seem to be hit hard. The humphead wrasse and barramundi cod were once moderately abundant on reefs, but none were reported at 85 percent of 179 reefs surveyed. Of more than 25 kilometers of Indo-Pacific reef surveyed in detail, only 26 humphead wrasse were seen. At the 125 Asian and Australian reefs surveyed, only five barramundi cod were recorded. These results suggest that cyanide and other forms of fishing have severely damaged populations of these once moderately abundant species.
High-value, edible sea cucumbers used to litter the seabed around many reefs. The three species included in Reef Check were totally absent from 41 percent of Indo-Pacific reefs surveyed, demonstrating the extent of over-harvesting. An average of 17 giant clams was found on the Indo-Pacific reefs. An indication of what natural populations used to be like was provided by the 150 to 250 giant clams recorded at several protected sites in the Red Sea and Australia.
Hong Kong provides an example of coral reefs subjected to almost every form of disturbance: overfishing, poison and dynamite fishing, pollution and sedimentation. Out of 11 collectible or edible indicator species only two (Trochus shells and butterflyfish) were recorded. Several of these once-abundant species are now effectively extinct in Hong Kong. The. Sarawak Reef Check team reported that 99 percent of the reefs have been damaged by blast fishing.
Surveys were also conducted in 1998, and the results are still being tallied. Reef Check works well as a rapid assessment tool, and indicates where additional, more detailed scientific studies are needed. It also shows the promise that can be found in the areas that have been formally protected and are showing signs of regeneration.
A joint statement was issued by IUCN's reef scientists at the Buenos Aries conference. It said: "Unless this conference takes effective action to stop global climate change, coral reefs and the benefits they provide will be condemned to death. Other ecosystems will follow." | 53,514,513 |
Hypothyroidism Impairs Human Stem Cell-Derived Pancreatic Progenitor Cell Maturation in Mice.
Pancreatic progenitors derived from human embryonic stem cells (hESCs) are a potential source of transplantable cells for treating diabetes and are currently being tested in clinical trials. Yet, how the milieu of pancreatic progenitor cells, including exposure to different factors after transplant, may influence their maturation remains unclear. Here, we examined the effect of thyroid dysregulation on the development of hESC-derived progenitor cells in vivo. Hypothyroidism was generated in SCID-beige mice using an iodine-deficient diet containing 0.15% propyl-2-thiouracil, and hyperthyroidism was generated by addition of L-thyroxine (T4) to drinking water. All mice received macroencapsulated hESC-derived progenitor cells, and thyroid dysfunction was maintained for the duration of the study ("chronic") or for 4 weeks posttransplant ("acute"). Acute hyperthyroidism did not affect graft function, but acute hypothyroidism transiently impaired human C-peptide secretion at 16 weeks posttransplant. Chronic hypothyroidism resulted in severely blunted basal human C-peptide secretion, impaired glucose-stimulated insulin secretion, and elevated plasma glucagon levels. Grafts from chronic hypothyroid mice contained fewer β-cells, heterogenous MAFA expression, and increased glucagon(+) and ghrelin(+) cells compared to grafts from euthyroid mice. Taken together, these data suggest that long-term thyroid hormone deficiency may drive the differentiation of human pancreatic progenitor cells toward α- and ε-cell lineages at the expense of β-cell formation. | 53,514,538 |
Scientists at the Salk Institute for Biological Studies have developed an improved technique for generating large numbers of blood cells from a patient's own cells. The new technique will be immediately useful in further stem cell studies, and when perfected, could be used in stem cell therapies for a wide variety of conditions including cancers and immune ailments.
"There are further improvements that we need to make, but this takes us a significant step closer to the ultimate goal, which is to be able to take ordinary cells from a patient, induce them to become stem cells, and then use those stem cells to rebuild lost or diseased tissues, for example the patient's bone marrow," says Inder M. Verma, PhD, Irwin and Joan Jacobs Chair in Exemplary Life Science and American Cancer Society Professor of Molecular Biology at the Salk Institute Laboratory of Genetics. Verma is senior author of the report, which is published in the July edition of the journal Stem Cells.
Stem cell researchers have been racing towards this goal since 2006, when techniques for turning ordinary skin cells into induced pluripotential stem cells (iPSCs) were first reported. In principle, iPSCs mimic the embryonic stem cells (ESCs) from which organisms develop. Researchers now want to find the precise mixes and sequences of chemical compounds needed to coax iPSCs to mature into the tissue-specific stem cells of their choice. The latter are self-renewing, and can be transplanted into the body to produce the 'progenitor' cells that multiply locally and produce mature tissue cells.
However, researchers don't know yet how to induce iPSCs to become tissue-specific stem cells or mature tissue cells with high efficiency. "We've been producing these cells in quantities that are too low to enable them to be studied easily, much less used for therapies," says Aaron Parker, PhD, a former graduate student and now a postdoctoral researcher in Verma's lab. Parker is a co-lead-author of the paper, with Niels-Bjarne Woods, PhD, who was a postdoctoral researcher in the Verma lab at the outset of the project, and is now an assistant professor at Lund University in Sweden.
Like many other stem cell research laboratories, the Verma lab has been trying to find more efficient ways to turn iPSCs into blood-forming 'hematopoietic' stem cells (HSCs). These may be more valuable medically than any other tissue-specific stem cell, because they can supply not only oxygen-carrying red blood cells but also all the white blood cells of the immune system. "There would be an almost unlimited number of usages for true HSCs," says Verma.
For the present study, the research team sought to do a better job of mimicking the changing conditions that naturally direct ESCs to become HSCs in the womb. "We took seven lines of human ESCs and iPSCs, and experimented with different combinations and sequences of growth factors and other chemical compounds that are known to be present as ESCs move to the HSC state in a developing human," says Parker.
advertisement
Applying cocktails of these factors, Parker and Woods and their colleagues induced the iPSCs and ESCs to form colonies of cells that bore the distinctive molecular markers of blood cells. With their best such cocktail they were able to detect blood-specific markers on 84% of their cells after three weeks. "That's a big jump in efficiency from what we saw in the field just a few years ago," says Parker.
The technique still has room for improvement. The researchers detected progenitor cells and mature cells from only one category or lineage: myeloid cells, which include red blood cells and primitive immune cells such as macrophages. "We didn't see any cells from the lymphoid lineage, meaning T-cells and B-cells," Parker says.
Another drawback was that the blood cell population they produced from ESCs and iPSCs contained short-lived progenitors and mature blood cells but no indefinitely renewing, transplantable HSCs. Their cocktail, they believed, either pushed the cells past the HSC state to the progenitor state too quickly, or made the maturing cells skip the HSC state entirely.
From this and other labs' results, the team hypothesized the existence of an intermediate, pre-hematopoietic type of stem cell, produced by ESCs and iPSCs and in turn producing HSCs. "We know that HSCs appear in a particular region of mammals during embryonic development, and our idea is that these pre-hematopoietic stem cells are there and are somehow made to mature into HSCs," says Parker. "So our lab is now going to focus on finding the precise maturation signals provided by that embryonic region to produce these true, transplantable HSCs."
Once that is done, researchers will need to make a number of further refinements to improve the safety of HSCs intended for human patients. "But we're now tantalizingly close to our ultimate goal," says Verma.
The other authors who contributed to the work were Roksana Moraghebi, of Lund University's Stem Cell Center; Margaret K. Lutz, Amy L. Firth, Kristen J. Brennand, W. Travis Berggren and Fred H. Gage of the Salk Institute Laboratory for Genetics; Juan Carlos Izpisúa Belmonte of the Salk Institute Gene Expression Laboratory; and Angel Raya of the Center of Regenerative Medicine in Barcelona, Spain.
Funding for this research was provided by the National Institutes for Health, the California Institute for Regenerative Medicine, the Leducq Foundation, the Merieux Foundation, the Ellison Medical Foundation, Ipsen/Biomeasure, Sanofi Aventis, the Prostate Cancer Foundation, the H.N. and Frances C. Berger Foundation, The Royal Physiographic Society of Sweden, the Lund University Medical Faculty, and the Lars Hierta Memorial Foundation, and the H.A. and Mary K. Chapman Charitable Trust. | 53,514,941 |
The Norwegian explorer Thor Heyerdahl crossed the Pacific ocean in a balsa wood raft in 1947, together with five men, to prove that South Americans already back in pre-Columbian times could have crossed the sea and settle on Polynesian islands. After financing the trips with loans and donations they set off on an epic 101 days long trip across 8000 kilometers, while the world was waiting for the result of the trip. The film tells about the origin of the idea, the preparations and the events on the trip. Kon-Tiki was named after the Inca sun god, Viracocha, and "Kon-Tiki" is an old name for this god. Heyerdahl filmed the expedition, which later became the Acaemy award winning documentary in 1951, and wrote a book about the expedition which was translated into 70 languages and sold more than 50 millions copies around the world. Heyerdahl believed that people from South America could have settled Polynesia in pre-Columbian times, although most anthropologists now believe they did not. Anyway he proved it was possible, by using only the materials and technologies available to those people at the time. The trip took 101 days over 4,300 miles across the Pacific Ocean before Kon-Tiki crashes into the dangerous reefs outside Raroia in the Tuamotu Islands on August 7th 1947. They all succeeded, and Kon-tiki was brought back to Norway and is no featured in the Kon-Tiki museum. | 53,515,054 |
17573
What are the prime factors of 4809867?
3, 31, 51719
List the prime factors of 8094793.
7, 43, 26893
List the prime factors of 1279786.
2, 577, 1109
What are the prime factors of 6905492?
2, 11, 156943
What are the prime factors of 1721504?
2, 23, 2339
What are the prime factors of 3508649?
3508649
List the prime factors of 237763.
237763
List the prime factors of 202586.
2, 101293
List the prime factors of 210065.
5, 42013
What are the prime factors of 11104895?
5, 2220979
List the prime factors of 251653.
251653
List the prime factors of 513727.
513727
List the prime factors of 137706.
2, 3, 59, 389
List the prime factors of 370552.
2, 7, 13, 509
List the prime factors of 3317846.
2, 7, 269, 881
List the prime factors of 3887471.
7, 83, 6691
What are the prime factors of 2285649?
3, 229, 1109
List the prime factors of 1087147.
1087147
What are the prime factors of 36960?
2, 3, 5, 7, 11
List the prime factors of 13801934.
2, 6900967
List the prime factors of 197644.
2, 49411
List the prime factors of 6227885.
5, 97, 12841
List the prime factors of 4220664.
2, 3, 7, 37, 97
What are the prime factors of 4454248?
2, 556781
List the prime factors of 4314635.
5, 13, 41, 1619
What are the prime factors of 575475?
3, 5, 7673
What are the prime factors of 576890?
2, 5, 57689
What are the prime factors of 19155684?
2, 3, 53, 30119
List the prime factors of 245002.
2, 122501
What are the prime factors of 747417?
3, 11, 29, 71
What are the prime factors of 1463820?
2, 3, 5, 31, 787
What are the prime factors of 21884?
2, 5471
What are the prime factors of 642382?
2, 13, 31, 797
What are the prime factors of 24748708?
2, 37, 167221
List the prime factors of 661037.
13, 50849
List the prime factors of 3067688.
2, 13, 2269
What are the prime factors of 5560069?
5560069
What are the prime factors of 7913027?
29, 272863
List the prime factors of 327570.
2, 3, 5, 61, 179
List the prime factors of 151793.
17, 8929
What are the prime factors of 5040136?
2, 630017
List the prime factors of 377178.
2, 3, 37, 1699
List the prime factors of 61323.
3, 20441
What are the prime factors of 61349?
31, 1979
List the prime factors of 719382.
2, 3, 47, 2551
What are the prime factors of 523500?
2, 3, 5, 349
List the prime factors of 6400982.
2, 7, 457213
What are the prime factors of 4227167?
7, 603881
List the prime factors of 30989924.
2, 7, 23, 48121
List the prime factors of 248841.
3, 43, 643
What are the prime factors of 9554343?
3, 1747, 1823
List the prime factors of 2058583.
151, 13633
What are the prime factors of 1135644?
2, 3, 101, 937
List the prime factors of 89495.
5, 7, 2557
What are the prime factors of 8610802?
2, 4305401
What are the prime factors of 50016?
2, 3, 521
List the prime factors of 3348713.
31, 108023
What are the prime factors of 3250057?
127, 157, 163
What are the prime factors of 5697618?
2, 3, 17, 83, 673
List the prime factors of 2957976.
2, 3, 7, 5869
What are the prime factors of 1233542?
2, 61, 10111
List the prime factors of 1859652.
2, 3, 67, 257
What are the prime factors of 9782896?
2, 137, 4463
What are the prime factors of 1204202?
2, 37, 16273
What are the prime factors of 3036048?
2, 3, 19, 3329
What are the prime factors of 121689?
3, 4507
What are the prime factors of 1433762?
2, 11, 65171
List the prime factors of 134591.
134591
List the prime factors of 474143.
474143
List the prime factors of 1940947.
23, 84389
List the prime factors of 17487325.
5, 699493
List the prime factors of 54619.
193, 283
List the prime factors of 107977.
19, 5683
List the prime factors of 4210640.
2, 5, 7, 73, 103
What are the prime factors of 5481231?
3, 7, 261011
List the prime factors of 3191886.
2, 3, 17, 19, 61
List the prime factors of 6601133.
7, 11, 37, 331
What are the prime factors of 27124297?
199, 136303
What are the prime factors of 5188?
2, 1297
List the prime factors of 375735.
3, 5, 37, 677
What are the prime factors of 62481?
3, 59, 353
List the prime factors of 25055214.
2, 3, 4175869
List the prime factors of 17915924.
2, 13, 113, 3049
What are the prime factors of 431294?
2, 89, 2423
What are the prime factors of 2308384?
2, 13, 31, 179
List the prime factors of 21065517.
3, 11, 389, 547
List the prime factors of 5480079.
3, 11, 166063
What are the prime factors of 357887?
61, 5867
What are the prime factors of 5877290?
2, 5, 31, 18959
What are the prime factors of 2398944?
2, 3, 24989
What are the prime factors of 206793?
3, 23, 37
List the prime factors of 1717463.
11, 43, 3631
What are the prime factors of 23199092?
2, 7, 397, 2087
What are the prime factors of 1827762?
2, 3, 19, 16033
List the prime factors of 2458364.
2, 67, 9173
What are the prime factors of 144898?
2, 13, 5573
What are the prime factors of 84062?
2, 11, 3821
List the prime factors of 6095643.
3, 103, 19727
What are the prime factors of 330085?
5, 7, 9431
What are the prime factors of 216313?
199, 1087
What are the prime factors of 2010007?
271, 7417
List the prime factors of 7096386.
2, 3, 11, 19, 5659
What are the prime factors of 241846?
2, 11, 10993
List the prime factors of 618895.
5, 41, 3019
What are the prime factors of 1358581?
7, 194083
What are the prime factors of 759782?
2, 23, 83, 199
What are the prime factors of 7348313?
7, 43, 24413
What are the prime factors of 2467676?
2, 71, 8689
List the prime factors of 14969599.
73, 205063
List the prime factors of 4261489.
107, 39827
What are the prime factors of 2346182?
2, 61, 19231
What are the prime factors of 278679?
3, 92893
What are the prime factors of 3467073?
3, 79, 14629
List the prime factors of 204622.
2, 11, 71, 131
What are the prime factors of 181326?
2, 3, 47, 643
List the prime factors of 2272044.
2, 3, 189337
What are the prime factors of 155678?
2, 77839
What are the prime factors of 2229980?
2, 5, 43, 2593
What are the prime factors of 1260987?
3, 7, 13, 31, 149
What are the prime factors of 1657118?
2, 29, 28571
What are the prime factors of 92670?
2, 3, 5, 3089
What are the prime factors of 3806479?
19, 200341
What are the prime factors of 1907528?
2, 7, 23, 1481
List the prime factors of 5894127.
3, 72767
List the prime factors of 127953.
3, 7, 677
List the prime factors of 7475.
5, 13, 23
List the prime factors of 5599831.
5599831
List the prime factors of 1301776.
2, 7, 59, 197
What are the prime factors of 25906410?
2, 3, 5, 287849
List the prime factors of 179880.
2, 3, 5, 1499
What are the prime factors of 441759?
3, 147253
List the prime factors of 17238556.
2, 107, 40277
List the prime factors of 16485391.
13, 47, 26981
What are the prime factors of 209759?
11, 19069
What are the prime factors of 3020016?
2, 3, 17, 3701
List the prime factors of 1295007.
3, 7, 61667
What are the prime factors of 8500409?
23, 599, 617
List the prime factors of 8315340.
2, 3, 5, 11, 43, 293
List the prime factors of 10564625.
5, 223, 379
What are the prime factors of 3444850?
2, 5, 68897
What are the prime factors of 1129577?
1129577
List the prime factors of 3033702.
2, 3, 7, 24077
List the prime factors of 27266735.
5, 1171, 4657
List the prime factors of 31691738.
2, 13, 1218913
What are the prime factors of 377489?
7, 53927
List the prime factors of 699639.
3, 31, 7523
What are the prime factors of 1852981?
13, 142537
What are the prime factors of 336370?
2, 5, 33637
List the prime factors of 5618078.
2, 109, 25771
What are the prime factors of 6650322?
2, 3, 7, 158341
What are the prime factors of 2044430?
2, 5, 204443
List the prime factors of 147699.
3, 16411
What are the prime factors of 81143?
53, 1531
What are the prime factors of 6958550?
2, 5, 29, 4799
What are the prime factors of 4826290?
2, 5, 7, 68947
What are the prime factors of 46710?
2, 3, 5, 173
What are the prime factors of 242801?
13, 19, 983
What are the prime factors of 3481916?
2, 870479
List the prime factors of 188818.
2, 7, 13487
List the prime factors of 10805283.
3, 101, 11887
What are the prime factors of 23530860?
2, 3, 5, 31, 4217
What are the prime factors of 298580?
2, 5, 14929
List the prime factors of 2884841.
971, 2971
What are the prime factors of 14233172?
2, 43, 83, 997
What are the prime factors of 4431286?
2, 109, 20327
List the prime factors of 13665753.
3, 168713
List the prime fa | 53,515,561 |
Saturday, December 11, 2010
Life on a raft
A friend recently approached me for some mapping help and this led me to rediscover some old tools (DIVA-GIS is one of the best free map tools that I know of) and forced me to look back at some recent thoughts. Generating a false-colour altitude map of the Indian Subcontinent heightened my appreciation of some observations and recent readings.
Elevations of India (click to see detail and legend)
Most people, even birdwatchers, often do not appreciate the peculiarities of species distribution and those that do not have the fortune of having a training in biology miss out entirely on the joy of mental stimulation that one gets when one tries to ask more questions.
On the border between northern Bengal (Jaigaon) and Bhutan (Phuntsholing) one can see an interesting phenomenon. Just walk into Bhutan and you see (apart from fewer humans and orderly traffic) that there is a lot of grass and vegetation and after walking up the first bend of the road you will find the commonest sparrow to be the Tree Sparrow, a species that simply refuses to accept life in India a few 100 metres away ! Along the busy roads of Jaigaon, only the House Sparrow may be seen, although it is also found on the Bhutan side. There is a difference in their habitat preferences and the Tree Sparrow seems to be the more picky species. Tree Sparrow do not have the marked sexual dimorphism that is found in the House Sparrow. When the two species occur in the same place, there is little confusion, but hybrids are known although they perhaps need further study. For instance, the only place where they are said to hybridize in India is not in the main distribution area but in the Eastern Ghats of Andhra Pradesh. The hill forests here are perhaps the least studied of the numerous biogeographical islands within India. The evidence for this supposed hybridization is not even well known - P. C. Rasmussen in her Birds of South Asia (2005) mentions this (presumably based on a specimen that shows hybrid characters) while Clement et al. (1993) (full references can be found on the Wikipedia articles) suggests that the species was introduced by ship to this part of India !
A painting by Bhawani Das (c. 1777)
Looking at the false-colour altitude map one can see a sharply delineated region in the Gangetic plains of Bihar in the altitude range of 50-100 m which corresponds to the region with the most records of the most-likely-extinct Pink-headed Duck. Now we do not really know much about that species, it may have lived in dense swampy wetlands and may even have been crepuscular in habit. Now we do not know about the habitat choice, behavioural or ecological adaptations evolved by this species and sadly perhaps, we will never know.
Considering this, one would imagine that we are better off when it comes to species that are not endangered but this just is not the case. Indeed, few have even really looked at the information available, not so much because they cannot, but because much of the information is scattered and it involves considerable work and trouble to bring together the data in a single location to even begin to examine for patterns. Often the tools required can only be handled by specialists and getting them to work across disciplines can be daunting given the splintered scholarly ecosystem where academics carve niches outside of which they fear to step. Like mixed-species flocks of birds, interdisciplinary associations must be a tricky balance. A pleasant surprise however comes in the recent work on the isolation and speciation of two high altitude birds from Southern India - the Rufous-bellied Shortwing and the White-bellied Shortwing. - these birds, whose exact higher level relationships are still shrouded (the genus placement remains questionable with scientists merely guessing that it should be close to the Himalayan Myiomela), appears to have had ancestors that were widespread when the climate was a lot cooler. With changes in climate, populations were pushed up into the higher reaches of the hills of Peninsular India. Not being strong fliers , these birds were restricted into breeding locally within their own little pools (or beanbags ) and over time, these populations diverged in form, shaped by accident and selective forces into forms that are very different in plumage.
Disjunct distribution of Nephenthes
Now this is not an isolated incident, it is the norm although the isolation mechanisms and forces are harder to identify in other cases. Looking at the islands formed by just plotting altitudes, it is clear that that numerous other studies of this kind could be made within India and naturally "islands" can be created by any kind of barrier. The effects depend on the mobility and the evolutionary history of the species under consideration. Look at this distribution of pitcher plants in the genus Nephenthes for instance. It is well accepted that the Indian Plate rafted away from Gondwana into Asia but lots of debate exist on the timing and presence of bridges. These debates are largely raised by fossil evidence or surprising discoveries like the Purple frog. A recent talk (and paper) at IISc by Prof. Ashok Sahni was particularly interesting - working in an isolated island of scholarship in northern India, his team has looked at insects in Indian amber dating to the Eocene - apparently there are tons of these fossils in lignite mines and they are usually just destroyed. And the wealth of information trapped there is being looked at - by the worlds leading paleo-entomologists including David Grimaldi . Apparently the endemism levels in insect are high for India as most of the insect fauna got onto the raft from Gondwanaland. These fossils come from after the K-T incident (65 million years ago).
Coming back to thoughts of Bhutan - the White-bellied Herons, 36 or so individuals - that live on the edge in the lower valleys of the Himalayan rivers surely have an interesting specialization, found only on the lower elevations on rivers running southwards along the edge of the Himalayas they are seriously threatened by dams that are needed mainly to power the growing populations of India. The world population has been optimistically estimated at 200 and as the bird-folks in Bhutan say - one hopes that the supposed 150 more birds in Burma are safer. And Burma is also the the last hope for the Pink-headed Duck. | 53,515,784 |
Distribution, ontogeny and projections of cholecystokinin-8, vasoactive intestinal polypeptide and gamma-aminobutyrate-containing neuron systems in the rat spinal cord: an immunohistochemical analysis.
The distribution, ontogeny and fiber projections of cholecystokinin-8, vasoactive intestinal polypeptide and gamma-aminobutyrate-containing neuronal systems in the rat spinal cord were investigated by means of immunocytochemistry. Immunoreactive fibers to cholecystokinin-8, vasoactive intestinal polypeptide and glutamate decarboxylase (gamma-aminobutyrate-synthesizing enzyme, used as a marker of gamma-aminobutyrate) were widely distributed in the spinal cord, being particularly concentrated in the superficial dorsal horn, suggesting a close relationship to the pain transmission system. Cholecystokinin-8-containing neurons were mostly distributed in the dorsal laminae and glutamate decarboxylase-containing neurons were distributed in both the dorsal and ventral horns. Vasoactive intestinal polypeptide-containing neurons were detected in the lateral spinal nucleus and the lamina X. Cholecystokinin-8 and vasoactive intestinal polypeptide immunoreactive structures first appeared on gestational day 17-18. Although no substantial change in immunoreactive structures was observed during the fetal period, they increased markedly after birth. On the other hand, glutamate decarboxylase-positive structures appeared at gestational day 16 and those in the grey matter reached a maximum content at birth; both groups were present in adult animals. Transection of the upper cervical cord resulted in accumulations of cholecystokinin-8 and glutamate decarboxylase rostral to the lesion, revealing the presence of supraspinal projections of cholecystokinin-8 and glutamate decarboxylase to the spinal cord. The same experimental procedure demonstrated the existence of vasoactive intestinal polypeptide-mediating neuronal projections to the supraspinal level, as the accumulating fibers occurred in the area caudal to the lesion. | 53,516,026 |
Determinants of the outcome of intrauterine insemination: analysis of outcomes of 9963 consecutive cycles.
Our aim was to determine which factors influence the effectiveness of intrauterine insemination. This article is a retrospective statistical analysis of outcomes of 9963 consecutive intrauterine insemination cycles. Patient age was the main determinant of pregnancy outcome (analysis of variance F ratio = 29, P <.0001), followed by the number of follicles at the time of intrauterine insemination (analysis of variance F ratio = 9, P <.0001) and sperm motility in the inseminate (analysis of variance F ratio = 4, P =.002). A total of 18.9% of all patients <26 years old conceived, compared with 13.9% of those 26-30 years old, 12.4% of those 31-35 years old, 11.1% of those 36-40 years old, 4.7% of those 41-45 years old, and 0.5% of patients >45 years old (P <.001). When analyzed by single years, ongoing pregnancy rates after intrauterine insemination remained high through age 32 years. Across all ages and causes of infertility, 7.6% of patients with 1 follicle at the time of intrauterine insemination conceived, compared with 10. 1% with 2, 14.0% with 4, and 16.9% with 6 follicles (P <.01). When ovulation occurred before intrauterine insemination (ie, no visible follicular structures), 4.6% of patients conceived. The likelihood of pregnancy was maximized when motile sperm numbers were >/=4 million and sperm motility was >/=60%. Differences in pregnancy outcomes between sperm processing options were related to differences in sperm motility after processing; use of methods incorporating motility enhancement with pentoxifylline and motile sperm concentration through silica gradients yielded the highest overall pregnancy rates. When the results of ongoing retrospective analysis of intrauterine insemination outcomes are applied, overall intrauterine insemination pregnancy rates have increased from 5.8% per cycle in 1991 to 13.4% per cycle in 1996, during which time the average age of patients undergoing intrauterine insemination has increased from 36.1 (+/-0.2) to 39.2 (+/-0.1) years. | 53,516,381 |
[Pulmonary delivery of insulin lipid suspension].
To investigate the relative bioavailability of pulmonary-delivered insulin lipid suspension (INS-LIP-SP) in normal Wistar rats. INS-LIP-SP were prepared by two different methods and then delivered to the rat lung using an intratracheal instillation method. Blood glucose levels and INS concentrations in serum were determined by glucose oxidase method and radioimmunoassay method, respectively. The relative pharmacological bioavailability (f%) and relative bioavailability (F%) of INS-LIP-SP were calculated from the area above the curve (AAC) and the area under the curve (AUC) compared with subcutaneous injection of INS solution. The mean particle diameter, span of dispersity and entrapment efficiency of INS-LIP-SP prepared by a membrane-formed with sonication method and a reversed phase evaporation method were 1.91 microns, 0.94 and 16.45% and 2.08 microns, 1.28 and 39.51%, respectively. The values of f% and F% of both INS-LIP-SP were up to 37% and 32%, separately, and there was a statistically significant difference between INS-LIP-SP and INS solution. However, there was no significant difference between the two INS-LIP-SP and the physical mixture of INS solution and blank liposomes. The results showed that INS-LIP-SP could achieve higher bioavailability following pulmonary delivery to rats. | 53,516,689 |
Injectable delivery system of 2-methoxyestradiol for breast cancer therapy using biodegradable thermosensitive poly(organophosphazene) hydrogel.
2-Methoxyestradiol (2-ME) has been reported to have antiangiogenic and antitumor activity. Its biomedical application is limited due to its poor water solubility resulting in its low bioavailability. Poly(organophosphazenes) containing l-isoleucine ethyl ester, ethyl-2-(O-glycyl)lactate, and α-amino-ω-methoxy-poly(ethylene glycol) 550 were synthesized having M(W) of 35-38 kDa and polydispersity index of 2.38-2.73. Using a viscometer, the thermosensitivity useful for locally injectable drug delivery was verified. The aqueous polymer solution showed a sol state at a low temperature and transformed to a gel state at body temperature. The polymer solution (10 wt%) enhanced the solubility of 2-ME by about 10(4) times compared to that of phosphate buffered saline. 2-ME was released from the hydrogel mainly by diffusion, hydrophobic interaction, and surface erosion of the matrix. This release profile could be confirmed through an in vitro release test as a function of polymers and the concentration of 2-ME in hydrogels. By monitoring tumor volume and CD31 immunohistochemical staining in mouse orthotopic breast tumor (MDA-MB-231) model, it was found that the hydrogel containing a relatively low concentration (15 mg/kg) of 2-ME showed the improved antitumor and antiangiogenic activity relative to the original formulation. This research suggests that the developed formulation of poly(organophosphazenes) may have injectable carrier potentials for 2-ME and other lipophilic drugs. | 53,516,729 |
y 13.
12
Let f(s) be the second derivative of 3*s + 0 - 1/6*s**3 + 7/2*s**2. Calculate the remainder when 11 is divided by f(0).
4
Suppose -5*l = -1067 - 788. Let n = l + -242. Calculate the remainder when n is divided by 33.
30
Suppose 4*u + 6 = 162. Let b(c) = c - 19. Calculate the remainder when u is divided by b(34).
9
Suppose 217 = 3*m - 5*x + 4*x, 3*x = -12. What is the remainder when 138 is divided by m?
67
Suppose -25 = -4*m - 3*z, 2 + 23 = m - 3*z. What is the remainder when 94 is divided by m?
4
Suppose -5*d = -5*l + 130, -d - 3*d - 16 = 0. Calculate the remainder when 50 is divided by l.
6
Let f(b) = 34*b - 1. Let y be f(1). Suppose 0 = -4*a + a + y. Let m = 31 + -11. What is the remainder when m is divided by a?
9
Suppose -5*c + c + 17 = 5*i, i - 15 = 5*c. Suppose 4*o + b - 53 = -4*b, -60 = -5*o - i*b. Let m = 2016 + -2014. Calculate the remainder when o is divided by m.
1
Let v = 321 - 302. Calculate the remainder when 88 is divided by v.
12
Let k = -673 - -719. Calculate the remainder when k is divided by 14.
4
Let o be 9*(-5)/(-45)*6. Suppose 0 = -o*v + 4*v + 40. Let m(y) = 3*y**2 + 6*y + 6. Calculate the remainder when m(-6) is divided by v.
18
Suppose 0*q + 3*q = 0. Suppose 2*t - 29 = -g + 5, q = -3*g - 4*t + 92. Calculate the remainder when 71 is divided by g.
23
Suppose 5*z + 0*z - 4*q = 181, -5*z + 5*q = -185. Calculate the remainder when z is divided by 19.
14
Suppose 8*h + 6 = 134. Suppose 2*p = -x - 0 + 48, 5*p + 87 = 2*x. Calculate the remainder when x is divided by h.
14
Suppose 0 = 2*y - 3*p - 24, 0*y + y - 12 = -5*p. Let d = y - 3. What is the remainder when (-97)/(-4) + (-1)/4 is divided by d?
6
Suppose -4*n + 2*h = -82, -n + 13 = 2*h - 10. Suppose 40 = 2*p - p. What is the remainder when p is divided by n?
19
Suppose -6*a + a + 425 = 0. Let o = a + -47. Let b(y) = -19*y + 1. Calculate the remainder when o is divided by b(-1).
18
Let z(r) = 80*r - 293. Calculate the remainder when z(7) is divided by 6.
3
Let z = -1189 - -1209. What is the remainder when 458 is divided by z?
18
Let b(f) = f**3 - 35*f**2 + 41*f - 86. Calculate the remainder when b(34) is divided by 56.
40
Let n(j) = -4*j**2 + 2*j - 1. Let y be n(3). Let d = 45 + y. What is the remainder when 54 is divided by d?
12
What is the remainder when 76 is divided by (-7 + 124/8)*4?
8
Let y(c) be the first derivative of 8*c**3/3 - 4*c - 1. Suppose -2*f - 4 = 0, -5*f + 37 = 5*h - 68. What is the remainder when y(3) is divided by h?
22
Suppose 34 - 133 = -11*a. Calculate the remainder when 132 is divided by a.
6
Suppose -2*b = 2*m - 492, 5*b - 23*m - 1250 = -18*m. What is the remainder when b is divided by 18?
14
Let o(m) = -6*m - 3. Let b be o(-2). Suppose 5*a - b - 1 = 0. Calculate the remainder when (-3)/2*40/(-12) is divided by a.
1
Calculate the remainder when 106 is divided by 5/8*(42 + 46).
51
Let t = -23 - -37. Let i be (-5)/(1 + 9)*-94. Let b = -38 + i. What is the remainder when t is divided by b?
5
Suppose 3*n + 16 = -2. Let a = n + 4. Calculate the remainder when 53 is divided by (-2)/a*(18 + -4).
11
Suppose -13 - 15 = -2*i. Let w = 340 + -319. Calculate the remainder when w is divided by 2*i/2 + -2.
9
Let t be -109 - -3*2/3. Let y = t + 181. Calculate the remainder when y is divided by 19.
17
Suppose d + 2*i + 44 = 63, -5*i = -5*d + 170. What is the remainder when 162 is divided by d?
17
Let k = -4 + 30. Let n be k/6 + (-9)/27. Let v = n + 2. Calculate the remainder when v is divided by 3.
0
Let r(o) = o**2 + 12*o + 24. Let k = 1 + 3. What is the remainder when r(-13) is divided by k?
1
What is the remainder when 24 is divided by (8 - (-8 - -15))*2*5?
4
Let o be 1/((3 - 1) + -3)*-3. Suppose -o*u + 22 = -38. Calculate the remainder when 35 is divided by u.
15
Let d(z) = 21*z**3 - 11*z**2 + 46*z - 2. Calculate the remainder when d(3) is divided by 29.
24
Suppose 5*u = 5*a + 135, -2*u + 11 = 3*a - 58. Suppose -51 - 36 = -p. Calculate the remainder when p is divided by u.
27
Let k = -610 + 630. What is the remainder when 1317 is divided by k?
17
Suppose -17 + 61 = 4*q. Suppose u + q = 69. What is the remainder when u is divided by 15?
13
Let u(q) = q**2 + 3*q - 5. Suppose 4*o + v + 0*v + 25 = 0, 5*v = -o - 30. What is the remainder when 13 is divided by u(o)?
3
Let f(m) = 2*m**2 + 5*m - 4. Suppose 104*l - 255 = 101*l. What is the remainder when l is divided by f(-4)?
5
Let i = 193 - -576. What is the remainder when i is divided by 55?
54
Suppose u + 706 = 3*l, 4*l - 923 = -5*u + 10*u. Calculate the remainder when l is divided by 75.
12
Suppose 3*k = 3*b - 3, -2*b = 5*k + 3 - 12. Suppose x = -4*c + b, x - c + 86 = 6*x. What is the remainder when 47 is divided by x?
11
Let y = 30 + -15. Let p be ((-40)/(-25))/((-2)/(-460)). Suppose -5*j = -0*j + h - p, 5*j + 5*h = 360. Calculate the remainder when j is divided by y.
14
Calculate the remainder when 67 is divided by (-23 - 1)/(30/(-40)).
3
Let s(j) be the second derivative of 3*j**5/20 - j**4/12 + j**3/3 - j**2/2 - 6*j. Let t be s(1). Calculate the remainder when 5 - -21 - (t - 1) is divided by 9.
6
Suppose 0 = m - q - 7, 3*m = -2*m - 2*q + 42. Suppose 52 = 12*i - m*i. What is the remainder when i is divided by 5?
3
Suppose -g = -4*i - 0*g + 2569, -g + 3209 = 5*i. What is the remainder when i is divided by 14?
12
Suppose n = 3*h + 5, -3*n - h = -4*h - 3. Calculate the remainder when (n - 1)*(-242)/4 is divided by 41.
39
Let f be (1 + 10/(-4))/((-48)/64). Suppose -f*v + 44 = -0*v. What is the remainder when 65 is divided by v?
21
Let l = -201 + 362. Calculate the remainder when l is divided by 61.
39
Let c(k) = -61*k**2 + 1. Let a be c(-1). Let h = -29 - a. Suppose 0 = 3*j - 8*j - 4*w + 602, 360 = 3*j + 3*w. What is the remainder when j is divided by h?
29
Let u = 2158 - 2075. What is the remainder when 2819 is divided by u?
80
Suppose -5*p = -2*k - 22, 3*p - p - 4*k - 12 = 0. Suppose p*a - 45 = a. Suppose s = 21 - a. Calculate the remainder when 23 is divided by s.
5
Suppose -109 = -10*d + 141. What is the remainder when 56 is divided by d?
6
Let l(z) = z - 7. Let y be l(7). Suppose -10*k + 6*k + 72 = y. What is the remainder when 70 is divided by k?
16
Let m(y) = 87*y**3 + y**2 + y - 1. Let o = -10 + 11. Let n be m(o). Suppose 8*z - n = 4*z. Calculate the remainder when z is divided by 8.
6
Let p be 28/10 - 2/(-10). Suppose 4*n = p*z - 39, n = -3*z - 6 - 0. Calculate the remainder when 26 is divided by -42*-1*(-3)/n.
12
Let u(a) be the second derivative of a**4/12 + 2*a**3/3 - 4*a**2 + 2*a + 8. Let q be 2/8 + 25/(-4). Calculate the remainder when 9 is divided by u(q).
1
Let y(m) = 2*m + 3. Let a(q) be the first derivative of q**3/3 - 2*q**2 + 4*q + 5. Let b be a(2). Calculate the remainder when 11 is divided by y(b).
2
Let v = 31 - 14. Suppose -5*f + v = -73. What is the remainder when f is divided by 7?
4
Let f be 297/(-15) + (-5)/25. Calculate the remainder when (-854)/(-26) + f/(-130) is divided by 18.
15
Let u = 26 + -24. Suppose -u*s - m + 1 = -4, -11 = -3*s - 5*m. Suppose -s*d + 0*d = v - 102, -2*d = 4*v - 90. What is the remainder when d is divided by 28?
25
Let m be (42/(-8))/((-6)/(-16)). Calculate the remainder when 159 is divided by ((-9)/6)/(m/(-24))*-7.
15
Let d(c) = c - 1. Let p be d(1). Suppose x + 15 = 5*a - 7, -19 = -3*x - 2*a. Suppose -x*n + 294 = -p*n. Calculate the remainder when n is divided by 25.
23
Suppose 3*i = 5*i - 4. Suppose i*h - 8 = -0. Suppose -g + 41 = h. Calculate the remainder when g is divided by 13.
11
Let g = 83 - 89. Let q(i) = -2*i + 17. Let s(j) = 3*j - 17. Let d(a) = 4*q(a) + 3*s(a). Calculate the remainder when 31 is divided by d(g).
9
Let c(x) = x - 6. Let v be c(2). Let p = v - -12. Calculate the remainder when 23 is divided by p.
7
Let w(b) be the third derivative of -b**6/120 - b**4/12 + 4*b**3 - 11*b**2. Calculate the remainder when 94 is divided by w(0).
22
Suppose 5*m = -4*i + 4*m - 2, 3*m = -3*i + 3. Let p(a) = 28*a**2 + 2*a + 3. What is the remainder when 83 is divided by p(i)?
25
What is the remainder when (-52 - -57)*((-184)/(-10) - -1) is divided by 15?
7
Suppose -r - 18*r = -380. What is the remainder when 178 is divided by r?
18
Suppose 2*n - j = -2*n + 131, 0 = 4*n + 5*j - 161. Suppose a - 14 + 8 = 0. Let y = 18 - a. Calculate the remainder when | 53,516,846 |
The invention relates generally to information security systems and methods and more particularly to information security systems and methods that provide isolation between a requestor and a security information source.
Secure computer systems and other systems are known which use cryptographic techniques to encrypt and decrypt data sent from one computer or user to another computer within a network. In typical public key cryptographic systems, digital signature key pairs, such as a signature private key and a verification public key, are used to authenticate a digital signature of a client to ensure that a message sent by client actually came from the client sending the message and has not been altered. Generally, data is digitally signed by a sender using the signature private key and authenticated by a recipient using the verification public key. In addition to digital signature key pairs, encryption key pairs are also generally used to encrypt the data being sent from one client to another client. An encryption key pair includes a decryption private key and an encryption public key. Data is encrypted using the encryption public key and decrypted by a recipient using the decryption private key. Certificates are generated by a manager or trusted certification authority for the public keys of the private/public key pair to certify that the keys are authentic and valid.
Certificates and certificate revocation lists (CRLs) should be freely disseminated in order to facilitate the secure exchange of e-mail as well as other global applications, such as electronic commerce. However, there is increasing concern shared by many enterprise domainsthat uncontrolled dissemination of certificates and CRLs will introduce potential vulnerabilities. When possible, vulnerability may be introduced as a result of outsiders obtaining access to sensitive databases or repositories where the certificates and CRLs are stored, such as X.500 directories, or other public key infrastructure (PKI) repositories, as known in the art, within the corporate network system. This has led to an unwillingness among a number of organizations to share their corporate database information. Generally, there is also an unwillingness to replicate or copy certificates and CRLs to external repositories because of the operational overhead with doing so and the difficulty in insuring that the replicated information does not become obsolete or become trusted when it should not be.
One known technique for isolating an information requester or subscriber within a networked community, is the use of a firewall server or computer. In such well-known systems, the requester is granted access to a target resource within a secure system after passing through the firewall computer. As such, the requester is typically granted direct access to the target resource. Access is typically granted based on access control information sent in an initial access request. However, such firewall-based systems still can expose highly sensitive corporate information to an outsider if the outsider is allowed to pass through the firewall, and have end-to-end access to an internal system.
Also, light weight directory access protocol (LDAP) proxy servers are known, that are used with firewalls as secondary special purpose firewalls. These special purpose firewalls are typically used to filter LDAP requests and allow accepted LDAP requests to be passed to the target LDAP server thereby allowing a client direct access to the server. Again, such firewall-based systems still can expose highly sensitive corporate information to an outsider if the outsider is allowed to pass through the firewall, and have end-to-end access to an internal system.
Other information-security systems, such as those that employ public key cryptography, have certification authorities that post certificates to a repository and a subscriber that obtains the signed certificates directly from the repository. Such systems typically also allow end-to-end access of the subscriber to the repository and typically require the same protocol to be used between a subscriber and the repository.
Accordingly, there exists a need for a system and method to allow the scaleable dissemination of the requisite security-related information, such as certificates, CRLs, and other security information, without introducing such potential security concerns relating to access to valuable corporate resources, or requiring unacceptable operational overhead. | 53,517,127 |
Site Search
The Media Project Coaching and Leadership Fellowship
THE MEDIA PROJECT IS PLEASED TO ANNOUNCE the creation of a new program for current and aspiring leaders in journalism around the world. Starting this month we will begin accepting applications for The Media Project Coaching and Leadership Fellowship.
The Fellowship is designed to assist journalists in the development of coaching and leadership skills and seeks journalists who are willing to make a commitment to help other journalists grow in the profession.
To help participants start with a foundation based on sound leadership principles, The Media Project is working with The Poynter Institute to create a customized training workshop. Based in St. Petersburg, Florida, The Poynter Institute has earned a worldwide reputation for promoting and supporting excellence in journalism.
The core leadership and coaching sessions of the February 13-17, 2012, workshop will be led by Poytner’s Leadership and Management expert Jill Geisler. Ms. Geisler is also author of the soon to be released book Work Happy: What Great Bosses Know, a resource to help individual leaders and management teams “build exceptional, happy workplaces” and develop transformational leadership skills.
Additional workshop sessions on the intersection of journalism and faith will be led by The Media Project’s CEO, Dr. Arne Fjeldstad who said, “we encourage all journalists with a sincere desire to make a difference in the journalism arena in which they work” to apply. Each of the sixteen journalists chosen to participate in the fellowship program will receive a full scholarship to cover costs associated with workshop travel, tuition, and lodging.
The long-term goal of the Fellowship is to develop leaders with a personal commitment to promote excellence and integrity in the practice of journalism in the face of diverse opinions and difficult political climates. The Fellowship seeks journalists dedicated to ethical decision-making and leadership values so that they in turn may practice a journalism that informs and inspires citizens of all nations and faiths to think critically about the complex world in which they live.
The Media Project Coaching and Leadership Fellowship will require chosen applicants to make a yearlong commitment to explore, develop, and replicate various aspects of coaching and leadership skills. The ideal candidate for this fellowship will have at least five years professional experience in print, broadcast or online journalism. Journalists from all craft areas, in all levels of the organization, are encouraged to apply. Candidates must be employed at a media organization or be an independent journalist whose work is regularly published or broadcast. | 53,517,214 |
409 F.2d 188
JACK COLE COMPANY and Dixie Highway Express, Inc., Appellants,v.Mrs. W. H. HUDSON, Appellee.
No. 25106.
United States Court of Appeals Fifth Circuit.
March 14, 1969.
Rehearing Denied April 3, 1969.
1
E. L. Snow, Arlo Temple, Snow, Covington, Temple & Watts, Meridian, Miss., for appellants.
2
P. Gerald Adams, Meridian, Miss., for appellee.
3
Before GOLDBERG and AINSWORTH, Circuit Judges, and SPEARS, District Judge.
SPEARS, District Judge:
4
This is an appeal by both corporate defendants in a diversity suit from the trial court's denial of their motions for directed verdict and for judgment notwithstanding the verdict. The plaintiff had alleged that under the doctrine of respondeat superior the defendants were liable to her for the injuries she suffered when a large truck bearing the name of one of the defendants forced her automobile off the highway. The jury found each of the defendants liable to plaintiff in the amount of $8,630.00. We affirm.
5
The parties will be referred to as they were in the trial court.
6
Defendants' position is that they cannot be held liable under the doctrine of respondeat superior, because there is no evidence that the offending truck was owned by either of them, or that the driver was an employee who was furthering the business of one of them at the time of the accident. The basic question raised by this appeal is whether the testimony of witnesses, together with any presumptions that the evidence has raised, warranted the trial court's submission of those issues to the jury.
THE EVIDENCE
7
On May 3, 1966, plaintiff, a 69 year old woman, was driving her automobile in a southerly direction on U. S. Highway 11 between Meridian and Laurel, Mississippi. At about 1:30 p. m., as she approached an incline and a curve in the road she discovered that a large yellow-colored truck was coming upon her from behind and blowing its horn. It then pulled out and attempted to pass her, despite the fact that in the lane in which they were traveling there was a yellow line painted to indicate a no passing zone. Before the truck had completely passed plaintiff's automobile, it pulled back into the right hand lane, apparently hitting the front part of plaintiff's automobile and forcing her off the road. She lost control of her car, and it eventually crossed the highway, climbed a steep incline, and slid down into the ditch bordering the east edge of the highway. The offending truck did not stop to render aid, and although investigating officers made efforts to locate it and to intercept it farther down Highway 11, it was never found.
8
Plaintiff produced four witnesses, all women, who saw the accident. Three of them were traveling together in an automobile in a northerly direction on Highway 11 (the direction opposite that in which plaintiff and the truck were traveling). All three testified they saw that the truck had pulled out into their lane and was apparently trying to pass the automobile driven by plaintiff. When it appeared that the truck might not be able to complete this maneuver and return to the right hand lane in time, the driver slowed her automobile and stopped it on the highway. Even at that, the testimony was that the truck came close to colliding with their automobile. All three women saw the automobile of plaintiff go out of control immediately upon the truck's pulling back into its right hand lane. The only description they could give of the offending truck was that it was a tractor-trailer van type, with the tractor portion painted yellow and the words "Jack Cole" painted in large letters over the cab on the front of the aluminum-colored trailer. Neither witness could give a more precise description of the truck or its driver, and neither of them was able to testify as to what printing appeared on the tractor, if indeed there was any printing on it at all.
9
The plaintiff testified that as the truck approached her from the rear she could see that it was yellow, but she did not read any lettering on it. The fourth witness had been standing near her house east of the highway when she first saw the rear portion of plaintiff's automobile extending behind the truck, and she then saw the automobile go out of control. She said that the trailer of the truck was an aluminum color, but that she did not see any writing on it.
10
It was established that the Jack Cole Company (hereinafter referred to as "Cole") owns all the stock of the Dixie Highway Express, Inc. (hereinafter referred to as "Dixie"), but that only Dixie had the proper permits to operate on this portion of Highway 11; that defendants together own more than 200 tractors (almost all of which were painted the same shade of yellow), and approximately 700 trailers (many if not all of which were aluminum-colored and bore signs reading "Jack Cole Company"); and that neither of the defendants knew of any of their equipment that might have been stolen on May 3, 1966, the day the accident occurred.
11
Witnesses for the defendants testified that it is a common practice among truckers to interchange trailers among the various trucking companies in much the same manner that railroad cars are interchanged among railroad companies. When a trucker reaches the limit of the area in which he is authorized to operate, rather than unloading the trailer and loading the freight into another trailer, he merely detaches his trailer and attaches it to the tractor of a company which is authorized to carry the freight on toward its ultimate destination. Thus, the owner of the trailer portion of a truck unit may or may not be the owner of the tractor. Records are kept of trailer interchanges made with other trucking companies, but the records indicate only the company who has the particular trailer and not the route over which the trailer is to travel. Since Cole was the parent corporation of Dixie, there had been devised between these two companies a method of operation that was even easier than the interchanging of trailers. When a Cole truck came to an area where it was not authorized to operate, but where Dixie was authorized, the driver merely placed temporary placards on the side of the tractor covering the Cole identification and identifying the tractor as a Dixie tractor. Moreover, it was shown that several trucking companies authorized to operate in the area had yellow tractors, although there was some indication that the shade of yellow varied among the companies and that the shade used by Cole could be easily distinguished from those used by the others.
12
From the evidence, it appears that this portion of Highway 11 is on the route used by truckers in carrying freight between the major cities of Birmingham and New Orleans. Agents of Dixie testified that their records showed that only four units had made the trip south from Birmingham to New Orleans on May 3, 1966. The time cards, logs, and personal testimony of the drivers of those units indicate that none of them was in the vicinity of the accident at the time it occurred. The accident occurred at about 1:30 p. m., while the four units passed the scene of the accident at about 8:00 a. m., 11:15 a. m., 4:15 p. m., and 4:30 p. m. respectively. A Dixie truck with a Jack Cole sign on its trailer approached the scene of the accident from the south at about 1:45 p. m., only minutes after the accident occurred. The driver of this truck testified that he had been making the trip north from New Orleans to Birmingham and that he had passed no Jack Cole tractor-trailer units proceeding south that day. He said that he had passed several yellow tractors belonging to other trucking companies, but that he had not paid any attention to the type of trailers they were pulling. He did say, as did officers who testified in the case, that there were several side roads abutting onto Highway 11, immediately south of the accident scene, that were constructed and maintained sufficiently well for heavy trucks to travel over them.
13
The investigating officers made an attempt to intercept the offending truck farther south on Highway 11. Information about the accident, and a description of the offending truck, were transmitted by radio at 1:52 p. m. to an officer who was then located on Highway 11, about 24 miles south of the scene of the accident, whereupon that officer requested other officers in the area farther south to watch for a Jack Cole truck coming south on Highway 11; and then he stayed on Highway 11 for two hours watching for the truck, but neither he nor the other officers ever reported locating it. However, the first officer did say that in his attempt to locate the hit and run driver he failed to alert officers to watch the side roads already mentioned above.
14
Dixie had a terminal in Meridian, Mississippi, from which local deliveries were made; and the terminal manager testified that on the day of the accident, there was one local delivery truck with a yellow tractor operating south of Meridian, the area where the accident occurred. However, he said that this local delivery unit differed from the over-the-road units in that the yellow cab was of a different shape and type, and the Jack Cole trailer being used was an open type covered with a green tarpaulin, rather than the van type used on longer hauls.
15
THE MOTION FOR JUDGMENT NOTWITHSTANDING THE VERDICT
16
Plaintiff first argues that defendants may not maintain this appeal because they failed to lay sufficient predicate for their motion for judgment notwithstanding the verdict. Rule 50(b) provides that "a party who has moved for a directed verdict" at the close of all the evidence, may later move to have an adverse judgment set aside and "to have judgment entered in accordance with his motion for a directed verdict". Thus, before a party may move for a judgment notwithstanding the verdict he must have first properly moved for a directed verdict, stating "specific grounds therefor".
17
At the close of plaintiff's evidence, defendants notified the court of their desire to move for a directed verdict, and a formal motion, setting forth the specific ground that there was no evidence that the offending truck was owned by either defendant or that it was being operated on the day of the accident by an employee of either of them, was later presented to the court in chambers and denied.1 Although at the close of all the evidence defendants did not again make such a motion orally for the record, they did apparently make a request in chambers that the jury be instructed to find for them. This was refused, as was a similar request made in open court after the court's charge to the jury had been given.
18
There can be no doubt that the trial judge was well aware of the reasons for the requested jury instruction, and, under the circumstances, we hold that this constitutes a sufficient predicate for the subsequent motion for judgment notwithstanding the verdict. Roberts v. Pierce, 398 F.2d 954, 956 (5th Cir. 1968).
19
In the recent case of O'Neil v. W. R. Grace and Company, 410 F.2d 908 (5th Cir. 1969) we said:
20
The standard to be followed in ruling upon a motion for judgment notwithstanding the verdict is the same as that to be followed regarding a motion for directed verdict; indeed, a judgment notwithstanding the verdict technically is a "judgment entered in accordance with * * * [the] motion for directed verdict". FED.R.CIV.P. 50(b). A judgment notwithstanding the verdict should not be granted unless the evidence, together with all inferences that can reasonably be drawn therefrom, is so one-sided that reasonable men could not disagree on the verdict. See Ricketson v. Seaboard Airline R. R. Co., 403 F.2d 836 (5th Cir. 1968).
21
This means that the action of the trial court overruling the motion for judgment notwithstanding the verdict should not be reversed, unless the evidence is such that a jury could not reasonably conclude from the existence of the sign and other circumstances that the driver of the offending truck was an employee of the defendants.
22
DEFENDANT COLE'S NAME ON TRAILER — PRESUMPTIONS — REBUTTAL
23
Defendants assert and plaintiff agrees that
24
Mississippi seems to follow the rule generally recognized elsewhere, that where a defendant's name appears on a commercial vehicle involved in an accident, there is a rebuttable presumption that the vehicle is owned by the defendant and that the operator of the vehicle is an employee of defendant, and was, at the time of the accident, engaged in the scope of his employment and in the furtherance of the business of the master. Merchants Co. v. Tracy, 175 Miss. 49, 60, 166 So. 340, 343; Jakup v. Lewis Grocer Co., 190 Miss. 444, 200 So. 597; West v. Aetna Ins. Co. of Hartford, Conn., 208 Miss. 776, 45 So.2d 585.
25
See also Cameron v. Hootsell, 229 Miss. 80, 90 So.2d 195 (1956), where, in a fact situation similar in many respects to the instant case, the court held the evidence sufficient to warrant submission to the jury on the issues of ownership, agency, and scope of employment.
26
Defendants refer us to cases from states other than Mississippi, in which the so-called majority rule is applied, among which are Ross v. St. Louis Dairy Co., 339 Mo. 982, 98 S.W.2d 717 (1936), and Constitution Pub. Co. v. Dale, 164 F.2d 210 (5th Cir. 1947), a diversity case tried pursuant to Alabama law. A later Alabama case is Barber Pure Milk Co. v. Holmes, 264 Ala. 45, 84 So.2d 345 (1955).
27
Other cases following the same rule include Louisville Taxicab & Transfer Co. v. Johnson, 311 Ky. 597, 224 S.W.2d 639, 27 A.L.R.2d 158 (1949); Rose v. Ruan Transport Corp., 214 F.2d 583 (7th Cir. 1954); and Falstaff Brewing Corp. v. Thompson, 101 F.2d 301 (8th Cir. 1939).
28
The foregoing cases hold that a prima facie case has been established by the party in whose favor the rebuttable presumptions of ownership, agency, and scope of employment have arisen; however, such presumptions disappear if "strong and clear" (Holmes, supra), or "positive and unequivocal" (Ross, supra), or "uncontradicted or invulnerable" (Rose, supra), or "clear and undisputed" (Constitution, supra), evidence is produced showing that the contrary is true. Falstaff Brewing Corp. v. Thompson, supra, expresses the same rule in a slightly different way by saying that the proof offered in rebuttal must be so clear that reasonable minds can draw but one inference. 101 F.2d at 303-304.
29
In Holmes, supra, presumptions of ownership, agency, and scope of employment were raised from the proof that the vehicle had defendant's name printed on it, and that defendant frequently conducted business in the area where the injury to plaintiff occurred. The defendant attempted to refute the presumptions by producing testimony of drivers and other agents of defendant who were assigned to the area where the accident occurred, to the effect that they were not involved and knew nothing about the accident. The court held that although the proof tended to show that it was improbable that any of the defendant's vehicles or agents were involved, where there was any evidence from which inferences in accord with the presumptions could be drawn, and no "strong and clear" evidence to the contrary was produced, the presumptions were not refuted, and the issues of ownership and agency should go to the jury. 84 So.2d at 353.
30
In Louisville Taxicab & Transfer Co. v. Johnson, supra, plaintiff had been hit by a taxicab which he was able to identify only as a "Yellow Cab", with the telephone number of defendant printed on it. The court stated that upon proof that the vehicle bore the characteristic color and name of the defendant, there arose a presumption that the vehicle was owned by the defendant, and that if the vehicle was being driven on a route designated by the owner's franchise, a presumption arose that the driver was an agent of the defendant, acting within the scope of his employment. In other words, the court held that proof that the vehicle bore defendant's characteristic markings, and was operating where the defendant was authorized to operate, was sufficient to establish a prima facie case under the doctrine of respondeat superior. Id. 224 S.W.2d at 641. The defendant attempted to remove these presumptions by showing that none of its taxicabs was involved in the accident. However, it accounted for only 160 of its more than 200 taxicabs in operation at the time of the accident; therefore, since more than 40 taxicabs were not accounted for, the court held that the evidence was insufficient to refute the prima facie case made by the plaintiff. Id.
31
We have concluded that the so-called majority rule is the proper one to follow in this case. See Revlon, Inc. v. Buchanan, 271 F.2d 795, 800, 81 A.L.R.2d 222 (5th Cir. 1959); and Planters Manufacturing Co. v. Protection Mutual Insurance Co., 380 F.2d 869, 871 (5th Cir. 1967).
32
Here, defendants' proof accounted for only four or five tractor-trailer units out of hundreds of tractors and trailers operated by them. It is undisputed that Dixie had authority to operate in the area where the accident happened. The trailer attached to the hit and run tractor bore the name of the defendant Cole, and the "Jack Cole" sign was a characteristic marking also of the Dixie trucks. There were close corporate ties between Cole and Dixie, and the management was the same for both companies.
33
The record reflects that no truck had been stolen on the day of the accident; that someone in the company keeps contact with all the trailers and has information as to which trucker has any trailer being operated under an interchange arrangement; that the accident took place only ten to twelve miles from defendants' Meridian terminal; that there were several side roads available for the hit and run driver to pull off the main highway and evade the search for him farther south on Highway 11; and that Highway 11 was regularly used by defendants for freight shipments in both northerly and southerly directions, from which it could be theorized that one of defendants' drivers had made an unscheduled or unrecorded southerly trip, or that a northbound truck had backtracked during its journey.
34
In any event, it was within the province of the jury to weigh the evidence and to deliver a verdict consistent with a factual theory acceptable to reasonable men, and in doing so it was not required to believe the testimony of defendants' witnesses, which was far from "invulnerable". If the defendants' tractor was not the offending vehicle, and they really did not know whose tractor was involved, they were certainly in a better position than anyone else in the case to find out, and by the exercise of reasonable diligence they should have been able to obtain that information for presentation in court. Yet, even though they were using the public highways of Mississippi for a strictly commercial enterprise, they failed to bring into the lawsuit, directly or indirectly, those who most likely caused plaintiff's injuries, if they did not; they did not explain the whereabouts of approximately 196 tractors and 696 trailers; and they did not offer into evidence their records relating to interchange transactions. Without attempting to recreate the events of May 3, 1966, as the jury must have done, we are unable to say that the inferences they must have drawn from the evidence are unreasonable; nor can we conclude that reasonable men would have been unable to develop from the evidence a theory whereby defendants would be held responsible for the injuries sustained by the plaintiff. On the contrary, in our opinion, the defendants completely failed to produce the kind of "strong and clear", "clear and undisputed", "uncontradicted or invulnerable", or "positive and unequivocal," evidence required to remove the presumptions that they owned the offending vehicle, that the driver was an agent of either or both, and that he was acting within the scope of his employment at the time of the accident.
35
The judgment of the district court is affirmed.
Notes:
1
The trial judge commented, in part, as follows in overruling the motion for directed verdict at the close of plaintiff's case:
The evidence is much stronger in this case against Dixie than it is against Cole. These two corporations are owned by the same people, they operate under the same management, and it is rather clear to the Court that Cole is not supposed to have been in this area. They don't have a franchise apparently to operate at the scene of this accident. They have some kind of arrangement whereby the truck of Cole could have been used by * * * [Dixie] under * * * [Dixie's] franchise by the simple expedient of changing some little removable signs on the doors of the equipment to satisfy some technical requirement of the Public Service Commission and as to what these signs were on that occasion on this particular truck that was the offender in this case, there is no specific evidence thereof. The witness for the trucking company couldn't read for the Court the name on the driver's side of the door of the truck on plaintiff exhibit 1-A and the Court couldn't read it. That wasn't the offending truck, that was merely a truck to show how these Cole trucks looked. * * *
It seems to me under the testimony of the plaintiff, and even under the testimony of this traffic claim superintendent of Cole, that the plaintiff would be entitled to go to the jury in this case against both defendants on his testimony and particularly on his testimony on cross examination by the plaintiff, the first time he was on the witness stand in this case. I think he made an issue for the jury and that is the basis of my ruling.
| 53,517,298 |
Q:
Why does my print statement produce a "SyntaxError: invalid syntax"?
How do I make the following work (in Python)?
import random
def roll():
input1 = input("Player1, type 'ROLL' to roll.")
if (input1 == "ROLL"):
dice1 = random.randint(1,6)
dice2 = random.randint(1,6)
print("You rolled a " + dice1() + " and a " + dice2() ".")
else:
pass
roll()
I get:
File "main.py", line 9
print("You rolled a " + dice1() + " and a " + dice2() ".")
^
SyntaxError: invalid syntax
I also want it to repeat the "Player1, type 'ROLL' to roll." if the input doesn’t equal ROLL.
A:
You have an invalid syntax near:
print("You rolled a " + dice1() + " and a " + dice2() ".")
Using string format:
Replace this:
print("You rolled a " + dice1() + " and a " + dice2() ".")
With this:
print("You rolled a {} and {}".format(dice1,dice2))
Note: You can use a while loop to keep taking the user-input unless the input matches with ROLL:
Hence:
import random
def roll():
while True:
input1 = input("Player1, type 'ROLL' to roll.")
if input1 == "ROLL":
dice1 = random.randint(1,6)
dice2 = random.randint(1,6)
print("You rolled a {} and {}".format(dice1, dice2))
break
roll()
Output:
Player1, type 'ROLL' to roll.whaaaat?
Player1, type 'ROLL' to roll.okay
Player1, type 'ROLL' to roll.roll
Player1, type 'ROLL' to roll.ROLL
You rolled a 2 and 2
| 53,517,387 |
Hi, I’m Jill! I’m an author, a Lazy Historian, a web/graphic designer, a bookworm and a hobby addict. I live in Charlottetown on Canada’s beautiful east coast. Join me on my creative adventures. Learn more. | 53,517,632 |
Motorcycle Battery
We carry the top of the line motorcycle batteries from the top brands like Yuasa, Motocross, Shorai and more. Shop our selection of conventional wet cell, dry charge, lithium iron phosphate, sealed AGM and gel batteries. To the best available motorcycle battery, please use our Motorcycle Battery Finder. Start by selecting your make, model and year.
Motorcycle Battery Guides
Motorcycle Battery Type:
Your motorcycle’s performance is largely related to the battery it’s running on, so understanding how to properly maintain it is paramount. In order to do this, you first need to know just what types of batteries exist for motorcycles, as well as what the differences are between them.
How to Maintain your Motorcycle Battery:
Unless you live in the desert or by the beach, chances are you've already felt that all-too-familiar chill in the air that accompanies the arrival of winter each year. For motorcyclists, this typically means that it's time to park the bike until Spring comes back around. There's only one problem though- Batteries really do not like inactivity.
Why Buy Your Motorcycle Battery
We are a U.S. based battery business that was founded on trust, safety, service and community. Established in 1998, we pride ourselves on providing high-quality motorcycle batteries from leading manufacturers of Yuasa, Motocross, Shorai and more.
We stand by our product. That's why we offer a no-hassle return policy on our motorcycle batteries, outstanding customer service and same-day shipping.
AtBatt cares about our customers and community, which is why we've established battery donation program to fire departments to keep fire detectors powered across America. Through our smoke detector safety awareness program, we are striving towards fire safety and awareness in cities across the country.
With over 10 years in the battery business, we have built AtBatt to be more than a battery company. Our foundation is community, trust, quality, and safety. For all these reasons and more, our customer's choose AtBatt as their motorcycle battery source. | 53,517,698 |
Niagara Dance Centre introduces Summer Dance Camp
Open to all children between the ages of 5
and 8, it will include ballet, tap and jazz combinations, stretching, creative
movement, musical interpretations, stories, crafts and games. Students can
learn new dance styles, learn more about ones they currently study, or see if
they are interested in taking dance.
Niagara Dance Centre will also offer a
wide variety of dance classes for all ages at various times and dates
throughout the summer. | 53,517,908 |
An improved computer network security system and method wherein access to network resources is based on information that includes the location of the connecting user. In general, the less trusted the location of the user, the more the access rights assigned to the user are restricted. A discrimination...http://www.google.co.uk/patents/US6308273?utm_source=gb-gplus-sharePatent US6308273 - Method and system of security location discrimination
An improved computer network security system and method wherein access to network resources is based on information that includes the location of the connecting user. In general, the less trusted the location of the user, the more the access rights assigned to the user are restricted. A discrimination mechanism and process determines the location of a user with respect to categories of a security policy, such as to distinguish local users, intranet users and dial-up users from one another. Based on information including the location and the user's credentials, an access token is set up that may restrict the user's normal access in accordance with the security policy, such as to not restrict a user's processes beyond the user-based security information in the user's normal access token, while further restricting the same user's access to resources when connecting via a dial-up connection. Restricted tokens are preferably used to implement the location-based discrimination by restricting the security context of users connecting from less trusted locations.
Images(19)
Claims(43)
What is claimed is:
1. In a computer network wherein a user may selectively connect to the network from one of a plurality of virtual locations, a method of providing improved network security, comprising the steps of, determining a location from where the user is connecting, selecting an access level for the user from at least two distinct access levels based on criteria including the virtual location, connecting the user to the network, creating a restricted token that has reduced access relative to a parent token, the restricted token derived from the parent token and information including the access level, and determining access of the user to network resources based on information in the restricted token.
2. The method of claim 1 further comprising assigning an Internet protocol address to the user, the assigned address dependent on the location from where the user is connecting.
3. The method of claim 1 wherein determining a location from where the user is connecting comprises evaluating an Internet protocol address assigned to the user.
4. The method of claim 3 wherein selecting an access level from at least two distinct access levels includes selecting the access level according to the Internet protocol address.
5. The method of claim 1 wherein determining a location from where the user is connecting comprises determining that the user is connecting to the network via a remote access server.
6. The method of claim 5 further comprising determining whether the user is connecting via a dial-up connection.
7. The method of claim 6 wherein the user is determined to be connecting via a dial-up connection, and further comprising determining the telephone number from which the user is connecting, comparing the telephone number to a list of registered users, and wherein selecting an access level includes selecting one level if the telephone number is in the list and another level if the number is not in the list.
8. The method of claim 1 wherein determining a location from where the user is connecting comprises determining whether the user is connecting to the network via a remote access server, and if the user is connecting via a remote access server, selecting an access level includes selecting an access level corresponding to more restricted access rights.
9. The method of claim 1 wherein determining a location from where the user is connecting comprises determining that the user is connecting to the network via an intranet.
10. The method of claim 1 wherein determining a location from where the user is connecting comprises determining that the user is connecting to the network via a virtual private network.
11. The method of claim 1 wherein determining access to network resources based on information in the restricted token includes determining access based on credentials of the user.
12. The method of claim 1 wherein creating the restricted token for the user includes adding at least one restricted security identifier thereto relative to the parent token.
13. The method of claim 1 wherein the restricted token is associated with each process of the user, and wherein determining access to network resources includes comparing information in the restricted token against security information associated with each network resource.
14. The method of claim 1 wherein creating the restricted token includes removing at least one privilege from the restricted token relative to the parent token.
15. The method of claim 1 wherein creating the restricted token includes creating the restricted token from the user's normal token, and changing attribute information of a security identifier in the restricted token to use for deny only access via that security identifier, relative to attribute information of a corresponding security identifier in the normal token.
16. The method of claim 1 wherein connecting the user to the network includes authenticating the user via a challenge—response protocol.
17. The method of claim 1 wherein connecting the user to the network includes receiving a ticket from the user, the ticket issued by a ticket-issuing facility.
18. The method of claim 1 wherein connecting the user to the network includes receiving a certificate from the user, the certificate issued by a certificate authority.
19. The method of claim 1 wherein creating the restricted token includes creating the restricted token from the user's normal token, including removing at least one privilege from the restricted token relative to the parent token and adding at least one restricted security identifier to the restricted token.
20. The method of claim 12 wherein determining access to network resources includes comparing user information in the restricted token including the at least one restricted security identifier therein against security information associated with each network resource.
21. In a computer network wherein a user may selectively connect to the network from one of a plurality of virtual locations, a system for providing improved network security, comprising, a discrimination mechanism configured to determine a virtual location from where the user is connecting and to select an access level from at least two distinct access levels based thereon, a security provider configured to create a restricted token including information from a parent token associated with the user and information including the access level, the restricted token having less access rights relative to the parent token, and an enforcement mechanism configured to determine user access to network resources according to the restricted token.
22. The system of claim 21 wherein the discrimination mechanism assigns an Internet protocol address to the user based on the virtual location determined thereby.
23. The system of claim 21 wherein the discrimination mechanism evaluates an Internet protocol address assigned to the user.
24. The system of claim 23 wherein the discrimination mechanism selects the access level according to the Internet protocol address.
25. The system of claim 21 wherein the discrimination mechanism determines that the user is connecting to the network via a remote access server.
26. The system of claim 25 wherein the discrimination mechanism further determines that the user is connecting via a dial-up connection.
27. The system of claim 26 further comprising a list of registered telephone numbers and a caller-ID mechanism connected to the discrimination mechanism, and wherein the discrimination mechanism accesses the caller ID mechanism to determine a telephone number of the user, and accesses the list to determine if the telephone number is in the list, and if the telephone number is in the list, determines one access level, and if the number is not in the list, determines another access level.
28. The system of claim 21 wherein the discrimination mechanism determines whether the user is connecting to the network via a remote access server, and if the user is connecting via a remote access server, further selects an access level for the user corresponding to more restricted access rights relative to the user access rights selected for a direct connection to the network.
29. The system of claim 21 wherein the discrimination mechanism includes means for determining when the user is connecting to the network via an intranet.
30. The system of claim 21 wherein the discrimination mechanism includes means for determining when the user is connecting to the network via a virtual private network.
31. The system of claim 21 wherein the security provider sets up the access rights of the user based on information including the credentials of the user.
32. The system of claim 21 wherein the security provider creates the restricted access token by deriving information from a normal access token associated with the user.
33. The system of claim 32 wherein the restricted token is associated with each process of the user, and wherein the enforcement mechanism determines access to the network resources by comparing information in the restricted token against security information associated with each network resource.
34. In a computer server having files thereon, a method of selectively restricting access to the files, comprising, receiving a request from an entity to access a file, selecting an access level for the entity from at least two distinct access levels based on criteria including the type of entity and a virtual location of the entity, deriving a restricted token from data in a parent access token associated with the entity and data corresponding to the access level, and determining access of the entity to the file based on information in the restricted token versus an access control list associated with the file.
35. The method of claim 34 wherein the entity is a process of a remote computer system, and wherein selecting an access level for the entity from at least two distinct access levels includes assigning a first access level for processes of the local server and a second access level for processes of remote computers.
36. The method of claim 34 wherein the entity is a script running on the computer server, and wherein selecting an access level for the entity from at least two distinct access levels includes assigning a distinct access level for scripts.
37. The method of claim 34 wherein the entity is an FTP server running on the computer server, and wherein selecting an access level for the entity from at least two distinct access levels includes assigning a distinct access level for FTP servers.
38. The method of claim 34 wherein the entity is a process of a proxy, and wherein selecting an access level for the entity from at least two distinct access levels includes assigning a first access level for processes of the local server and a second access level for processes of proxies.
39. The system of claim 21 wherein the restricted token has at least one privilege removed therefrom relative to the parent token.
40. The system of claim 21 wherein the restricted token has a security identifier modified to have less access rights than a corresponding security identifier in the parent token.
41. The system of claim 21 wherein the restricted token has at least one restricted security identifier added thereto relative to the parent token.
42. A computer-readable medium having computer-executable instructions, which, when executed on a computer, perform a method comprising:
determining a virtual location from where a remote computer is connecting to a computer network, wherein the remote computer may selectively connect to the computer network from one of a plurality of virtual locations;
selecting an access level for the remote computer from at least two distinct access levels based on criteria including the virtual location;
connecting the remote computer to the network;
creating a restricted token that has reduced access relative to a parent token associated with a user of the remote computer, the restricted token derived from the parent token and information including the access level; and
determining access of the remote computer to network resources based on information in the restricted token.
43. A computer-readable medium having computer-executable instructions, which, when executed on a computer, perform a method comprising:
receiving a request from an entity to access a file of a computer server;
selecting an access level for the entity from at least two distinct access levels based on criteria including the type of entity and a virtual location of the entity;
deriving a restricted token from data in a parent access token associated with the entity and data corresponding to the access level; and
determining access of the entity to the file based on information in the restricted token versus an access control list associated with the file.
Description
FIELD OF THE INVENTION
The invention relates generally to computer systems, and more particularly to an improved security model for computer systems.
BACKGROUND OF THE INVENTION
Current computer security systems determine a user's access to network resources based on permissions granted according to the user's credentials. This user-centric model provides a great deal of flexibility for the increasingly mobile/remote user population. For example, remote access servers and Internet connectivity allow a user to transparently access corporate resources from virtually anywhere.
While this flexibility provides advantages to both the user and the owner of the network, (e.g., a corporate enterprise), such increased availability and easy connectivity inherently elevates the risk of unauthorized access. Although encrypted network communication prevents wire eavesdropping, allowing remote access to sensitive corporate resources still has an intrinsic risk. Indeed, regardless of how protected the resources (such as files) are when they are transmitted, there is still likely to be a subset of sensitive corporate resources that the company does not want authorized users to be accessing from just anywhere.
For example, a laptop-computer user may inadvertently display highly confidential corporate strategy to unintended viewers, such as when working on an airplane. New, wider-angle laptop screens make it even more difficult to prevent other passengers from peering at the monitor contents. Similarly, with the escalating population of mobile users, the theft or loss of a notebook computer increasingly threatens the security of sensitive corporate data. A user's account and password also may be stolen, particularly if maintained on a stolen laptop. As long as the user has the proper credentials, existing security mechanisms make it simple to remotely download files and perform other remote actions, thus contributing to these and other security risks.
In short, remote access servers (RAS) and Internet connectivity enable users to access corporate resources from virtually any location. However, certain locations (particularly remote locations) are less secure than others. For example, because of portability and increased access, files downloaded to a laptop computer are easier to steal than files on a desktop machine in a corporate office. Similarly, unauthorized persons may obtain user accounts and passwords, whereby it is most likely that they will attempt to access corporate resources from a remote location.
SUMMARY OF THE INVENTION
Briefly, the present invention provides an improved computer network security system and method wherein access to network resources is based on information that includes the location of the connecting user. Ordinarily, the less trusted the location of the user, the more the access rights assigned to the user are restricted. A discrimination mechanism determines the location of a user with respect to categories of a security policy, such as to distinguish local users, intranet users and dial-up users from one another. A security provider establishes the access rights of the user such as by setting up an access token for the user based on information including the location and the user's credentials. An enforcement mechanism uses the access rights set up for the user to determine whether to grant or deny accesses to resources. The location-based access rights may be restricted with respect to the user's normal access rights in accordance with the security policy. For example, the processes of a local user may not be restricted beyond the user-based security information in the user's normal access token, while the same user connecting via a dial-up connection will have restricted processes. Preferable, restricted tokens are used to implement the location-based discrimination by restricting the access of users connecting from less trusted locations.
Other objects and advantages will become apparent from the following detailed description when taken in conjunction with the drawings, in which:
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram representing a computer system into which the present invention may be incorporated;
FIG. 2 is a block diagram generally representing virtual locations from which a user may connect to a network;
FIG. 3 is a flow diagram representing the general steps taken to determine the user's location and access level of a user based on that location in accordance with one aspect of the present invention;
FIG. 4 is a block diagram generally representing the various components for establishing user access based on location information in accordance with one aspect of the present invention;
FIGS. 5A-5B comprise a flow diagram representing the general steps taken to determine a user's level of trust based on location information in accordance with one aspect of the present invention;
FIG. 6 is a block diagram generally representing a mechanism determining a user's access rights in accordance with an aspect of the present invention;
FIG. 7 is a block diagram generally representing the creation of a restricted token from an existing token in accordance with one aspect of the present invention;
FIG. 8 is a block diagram generally representing the various components for determining whether a process may access a resource;
FIGS. 9A-9B comprise a flow diagram representing the general steps taken to create a restricted token from an existing token in accordance with one aspect of the present invention;
FIG. 10 is a block diagram generally representing a process having a restricted token associated therewith attempting to access a resource in accordance with one aspect of the present invention;
FIG. 11 is a block diagram generally representing the logic for determining access to an object of a process having a restricted token associated therewith in accordance with an aspect of the present invention;
FIG. 12 is a flow diagram representing the general steps taken when determining whether to grant a process access to a resource in accordance with an aspect of the present invention;
FIG. 13 is a diagram representing the communication between a client a server in a challenge—response authentication protocol;
FIG. 14 is a block diagram representing the creation of a restricted token based on authentication credentials and location discrimination in accordance with one aspect of the present invention;
FIG. 15 is a diagram representing the communication for authenticating a client at a server according to the Kerboros authentication protocol;
FIG. 16 is a block diagram representing the creation of a restricted token based on an authentication ticket and location discrimination in accordance with one aspect of the present invention;
FIG. 17 is a diagram representing the communication for authenticating a client at a server according to the SSL protocol; and
FIG. 18 is a block diagram representing the creation of a restricted token based on an authentication certificate and location discrimination in accordance with one aspect of the present invention.
DETAILED DESCRIPTION
Exemplary Operating Environment
FIG. 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
With reference to FIG. 1, an exemplary system for implementing the invention includes a general purpose computing device in the form of a conventional personal computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system 26 (BIOS), containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored in ROM 24. The personal computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD-ROM or other optical media. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read-only memories (ROMs) and the like may also be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35 (preferably Windows NT), one or more application programs 36, other program modules 37 and program data 38. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor 47, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer networks, Intranets and the Internet.
When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
Location Discrimination
In accordance with one aspect of the present invention, there is provided a method and system that determines access to resources based on the location of a user, (in addition to the user's normal access rights based on the user's credentials). For example, valid users determined to be at a at a local, secure location are given their full access rights, while those at a remote location are given restricted access rights. Moreover, the amount of restriction may vary based on the type of remote access.
By way of example, FIG. 2 shows a number of locations from which a user may connect to a corporate network (comprising local machine or machines) 60. Users may connect through computers 621-62n via a local area network (such as LAN 51 and network interface 53 as shown in FIG. 1). Other users may connect through remote office servers 641-64n, e.g., via a T1 connection, while others may be connected through the Internet via a virtual private network (VPN) 66. Still other users may connect through any number of remote access servers (e.g., 681-682), and in numerous other ways from other locations (not shown).
In keeping with the invention, the level of access granted to a user for accessing network resources is dependent on the (virtual) location from where a given user is connected. For example, users connected to the local machine 60 via a LAN 621 may be given their full access rights, users through a remote office 641 somewhat restricted rights, and users through RAS 681, 682 or the VPN 66 substantially restricted access rights.
As can be readily appreciated, as used herein, the term “location” is a logical concept related to the type of location connection rather than a physical concept related to the distance from which the connection is originating. For example, a user can connect to the network 60 via the RAS 682 from virtually any physical location that has any type of telephone service. Similarly, a user may connect from an “Intranet” location that may be relatively far (physically) from the local machine 60. Indeed, a RAS 681, 682 dial-up user may be closer in physical distance than user at a remote office 641 connecting via a T1 line, even though the dial-up user will ordinarily be considered less secure. As such, as used herein, each location from which a user may connect is considered a virtual location rather than a physical place. Notwithstanding, the present invention may also further operate with some regard to physical location if the user's physical location is actually known (e.g., via caller ID, the invention may further restrict access to all RAS users calling from a certain area code).
To accomplish location discrimination, there is provided (e.g., in the network machines 60) a mechanism/process 67 for reliably determining the location of a user. Note that the mechanism/process 67 may comprise various components in one machine or distributed among numerous machines in the network. Moreover, as described herein, there are two different mechanisms for IP address location discrimination. A first is based on an Internet Location Service (ILS) 69, while the other is based on assigning ranges of IP addresses (administrated preferably via the directory services) to clients in various locations, and using trusted routers to prevent the use of a more trusted IP address from a less trusted location. Both approaches work on any network with a routing mechanism and well-defined, trusted access points.
A first (ILS) way to determine if a user is not in a trusted location is for the mechanism 67 to check to see if the user is connecting through a remote access server (RAS), and if so, is therefore remote and less trusted. To this end, when RAS authenticates the remote user logon, as represented by step 300 of FIG. 3, RAS assigns the user an Internet Protocol (IP) address and registers this user and IP address with the ILS (Internet Location Service) 69. As shown in the flow diagram of FIG. 3, if the IP address is listed in the ILS (step 302), the user is logged on to through this RAS cluster and is thus untrusted. Such users will be given restricted access, such as by setting a certain reduced access level (step 304) and then using that level to assign (restricted) access rights (step 310), as described in more detail below.
However, if a user's IP address is not listed in the ILS 69 as a RAS IP address, then that user is not necessarily local and trusted. By way of example, if a user logs on through a RAS server in Europe, and then wants access therethrough to a Charlotte (N.C.) domain, the Charlotte RAS ILS does not have the European RAS connection listed with its Local ILS. Accordingly, for a user not listed with a Local ILS 69, additional information is needed to determine the user's location.
One piece of additional information is the assigned IP address, which is evaluated at step 306. If the IP address is not within the range of local, trusted, IP addresses assigned by the local machine, then the user is not local. Accordingly, the mechanism/process 67 at step 306 will branch to step 304 where the level is set to untrusted as described above. If however the address is within the range of local, trusted, IP addresses, then the user is local but has not connected via RAS, and thus is trusted. Such users will be given normal access, such as by assigning the user a trusted access level (step 308) and then using that level to assign access rights (step 310), as described in more detail below.
Note that the full routing path for a connection is available to a server, and thus when determining the location, access is assigned based upon the least trusted location (i.e., the “weakest link”) through which a user's packets are being routed. Moreover, when an IP address is not in a range of “untrusted” locations, it is not assumed to be within a trusted range, but rather location discrimination is inclusive rather than exclusive in nature, i.e., a list of trusted IP ranges is tested for assigning levels rather than assigning levels by omission from a list of untrusted locations.
It should be noted that, like other electronic security systems, in general, the level of care with which the present invention is used is also responsible for the overall security results. For example, care should be taken when segregating a network with different trust levels, items should be routed appropriately, internal procedures should not allow someone, for example, to install a RAS server on a desktop machine in the corporate office for personal use, and so on.
The above example provides a simplified, two-level local discrimination mechanism 67. However, for finer grained multiple trust level control, IP addresses may be assigned by servers in ranges that correspond to additional location information as to the location from which the user is connecting. RAS servers may be further arranged with a location discrimination mechanism 71 to assign IP addresses in one range for callers from “authorized” phone number, and another range for anonymous or unregistered phone numbers. Note that the mechanism/process 71 may include the same or similar components to the mechanism/process 67 described above, along with additional components, and may be within one machine or distributed among numerous machines in the network. However, in addition to providing finer granularity, maintaining a trusted IP Address range at the domain server takes less time to query than checking with the ILS 69. Moreover, as will become apparent below, to accomplish overall security, there are generally three parts of the mechanism, including a global database of address to location mappings, trusted address assignment and secure routers/gateways.
The following table sets forth trust levels and IP address ranges which may be assigned to a user based on some policy arbitrarily set up for a hypothetical enterprise. Note that users connecting directly (e.g., via a LAN interface card 53) to the local machine are level zero trusted.
Level
Location
IP Address Range
Trust Level 1
Local Intranet users
111.22.0.0-111.22.255.255
111.24.0.0-111.24.127.255
Trust Level 2
RAS Authorized Users
111.24.128.255-
111.24.255.255
Trust Level 3
RAS Anonymous Users
111.25.0.0-111.25.255.255
By way of example, FIG. 4 shows three different types of user connections via which users connect to a RAS server (e.g., 682). A first user connects a remote computer 701 to the RAS server 682 by dialing in from a RAS-registered phone number, a second user from a remote computer 702 via an unregistered or blocked telephone number, and a third user from any phone number. The first two users have user credentials alleging that they are authorized users of the system, while the third user is not claiming to be an authorized user but is instead only attempting to connect as a guest. To determine the access level, the RAS server 682 first determines the telephone number of the calling computer via caller ID 74. If a telephone number is available (e.g., not blocked by the caller), the RAS server 682 queries a database (or table) 72 that maintains a list of registered telephone numbers that are allowed increased access to resources.
In this manner, the user of the remote computer 701 calling from a registered number may be given greater access to resources than the user of the remote computer 702 calling from an unregistered or blocked telephone number. Moreover, both may have more access rights than a guest user 703 regardless of that user's telephone number. For example, the user of the remote computer 703 may be only allowed access to files on a public server 76, while the user computer 702 calling from the unregistered number may have access to the public server 76 and an employee server 78. Lastly, the user computer 701 calling from the registered number may have access to the public server 76, employee server 78 and a confidential server 80, yet still may not have access to a top secret server 82. Such distinctions enable an enterprise to set up any number of access policies. As can be readily appreciated, with the above example, traveling employees would be able to call in from an unregistered location and access some employee-level files, (further restricted by their user-credentials), but not confidential files. Confidential files could only be accessed from a user's home or other known location that has a registered telephone number, while top secret files are not accessible via any RAS connection.
To summarize, FIGS. 5A-5B comprise an exemplary flow diagram showing how access levels may be assigned according to a predetermined policy. If at step 500 of FIG. 5A a user is connecting via the local machine 60, the trust level is set to zero at step 502, which then continues to step 516 where access rights are assigned based (in part) on the trust level. If not connecting via the local machine, however, the process/mechanism 71 continues to FIG. 5B wherein the type of remote connection determines the trust level via an assigned IP address. If at step 520 of FIG. 5B, the user is not connecting via a dial-up connection, then step 520 branches to step 522 wherein the IP address assigned to the user is in the range of addresses reserved for Local Intranet users. Note that in this simplified example, a user either connects directly to the local machine, via an Intranet connection or via a dial-up connection.
If however step 520 detects that the user is connecting via a dial-up connection, step 520 branches to step 524 to determine the telephone number from which the connection is being made. As can be appreciated, this information may be made available via a caller ID mechanism 72 or the like. Step 526 tests to determine if the telephone number is available, since there is a possibility that the user blocked the caller ID function when originating the call, or possibly that the calling telephone is not capable of activating the feature (e.g., the calling phone is out of a caller ID-equipped area). Note that if the mechanism 72 is capable of distinguishing between intentionally blocked calls or simply not detectable calls, if desired, a policy may discriminate between the two types to set a different trust level. However, in the example herein, if the telephone number is not available regardless of the reason, then step 526 branches to step 532 where an IP address is assigned in the RAS unregistered user range.
If instead the number is available at step 526, step 528 is executed, which uses the number to query the database 74 or the like to determine whether the number is registered as that of a predetermined trusted location. Note that the location information may be optionally combined with the user identity at this time, e.g., a user identified as UserX will be given increased access if calling from his or her registered home number, but no other user will receive increased access if calling from that number.
If the number is appropriately registered as determined by step 530, then step 530 branches to step 534 where an IP address is assigned in the RAS registered user range for the calling computer. Otherwise, step 530 branches to step 532 where an IP address is assigned in the RAS unregistered user range. The location discrimination process/mechanism 71 then returns to step 504 of FIG. 5A where the assigned addresses will be evaluated by the machine that determines access rights.
At step 504, if the IP address is in the range of local intranet users, then step 504 branches to step 506 wherein the trust level is set to one for this user. If not in the range of local intranet users, step 508 tests to determine if the range is within the range of RAS registered users. If so, the trust level is set to two at step 510, while if not, the trust level is set to three at step 512. Once the trust level is set to a level from zero to three, the process then continues to step 516 wherein access rights are assigned based on the trust level of the user in combination with the user's credentials, as described in more detail below.
FIG. 6 generally shows the logic for determining access rights in accordance with the present invention. A security provider 88 takes the user credentials 90 and the location information (e.g., the trust level) 92 and determines the access rights 94 for the user based on that information. As described below, in a preferred embodiment, the access rights are placed in an access token that is associated with each of the user's processes, and compared against security information associated with each resource to determine access to that resource.
Location Discrimination Using Restricted Tokens
As will become apparent, the present invention is preferably implemented at the operating system level, and thus covers virtually all possible was to access information. By way of example, consider protecting a given file on a server. This file may be accessed in many ways, including remote SMB files access, via a script running on the server, via an FTP server running on the server, via a proxy (third machine), and so on. The present invention operates at the system level, making it possible to protect virtually all ways of accessing the file.
The preferred security model of the present invention that is described herein leverages and extends the existing Windows NT security model. Notwithstanding, there is no intention to limit the present invention to the Windows NT operating system, but on the contrary, the present invention is intended to operate with and provide benefits with any mechanism that in some way can limit access to resources based on input information.
In general, in the Windows NT operating system, a user performs tasks by accessing the system's resources via processes (and their threads). For purposes of simplicity herein, a process and its threads will be considered conceptually equivalent, and will thus hereinafter simply be referred to as a process. Also, the system's resources, including files, shared memory and physical devices, which in Windows NT are represented by objects, will be ordinarily referred to as either resources or objects herein.
When a user logs on to the Windows NT operating system and is authenticated, a security context is set up for that user, which includes building an access token 100. As shown in the left portion of FIG. 7, a conventional user-based access token 100 includes a User And Groups field 102 including a security identifier (Security ID, or SID) 104 based on the user's credentials and one or more group IDs 106 identifying groups (e.g., within an organization) to which that user belongs. The token 100 also includes a privileges field 108 listing any privileges assigned to the user. For example, one such privilege may give an administrative-level user the ability to set the system clock through a particular application programming interface (API). Note that privileges over-ride access control checks, described below, that are otherwise performed before granting access to an object.
As will be described in more detail below and as generally represented in FIG. 8, a process 110 desiring access to an object 112 specifies the type of access it desires (e.g., obtain read/write access to a file object) and provides its associated token 100 to an object manager 114. The object 112 has a security descriptor 116 associated therewith, and the object manager 114 provides the security descriptor 116 and the token 100 to a security mechanism 118. The contents of the security descriptor 116 are typically determined by the owner (e.g., creator) of the object, and generally comprise a (discretionary) access control list (ACL) 120 of access control entries, and for each entry, one or more access rights (allowed or denied actions) corresponding to that entry. Each entry comprises a type (deny or allow) indicator, flags, a security identifier (SID) and access rights in the form of a bitmask wherein each bit corresponds to a permission (e.g., one bit for read access, one for write and so on). The security mechanism 118 compares the security IDs in the token 100 along with the type of action or actions requested by the process 110 against the entries in the ACL 120. If a match is found with an allowed user or group, and the type of access desired is allowable for the user or group, a handle to the object 112 is returned to the process 110, otherwise access is denied.
By way of example, a user with a token identifying the user as a member of the “Accounting” group may wish to access a particular file object with read and write access. If the file object has the “Accounting” group identifier of type allow in an entry of its ACL 120 and the group has rights enabling read and write access, a handle granting read and write access is returned, otherwise access is denied. Note that for efficiency reasons, the security check is performed only when the process 110 first attempts to access the object 112 (create or open), and thus the handle to the object stores the type of access information so as to limit the actions that can be performed therethrough.
The security descriptor 116 also includes a system ACL, or SACL 121, which comprises entries of type audit corresponding to client actions that are to be audited. Flags in each entry indicate whether the audit is monitoring successful or failed operations, and a bitmask in the entry indicates the type of operations that are to be audited. A security ID in the entry indicates the user or group being audited. For example, consider a situation wherein a particular group is being audited so as to determine whenever a member of that group that does not have write access to a file object attempts to write to that file. The SACL 121 for that file object includes an audit entry having the group security identifier therein along with an appropriately set fail flag and write access bit. Whenever a client belonging to that particular group attempts to write to the file object and fails, the operation is logged. For purposes of simplicity, auditing will not be described in detail hereinafter, however it can be readily appreciated that the concepts described with respect to access control via restricted SIDs are applicable to auditing operations.
Note that the ACL 120 may contain one or more identifiers that are marked for denying users of groups access(as to all rights or selected rights) rather than granting access thereto. For example, one entry listed in the ACL 120 may otherwise allow members of “Group3” access to the object 112, but another entry in the ACL 120 may specifically deny “Group24” all access. If the token 100 includes the “Group24” security ID, access will be denied regardless of the presence of the “Group3” security ID. Of course to function properly, the security check is arranged so as to not allow access via the “Group3” entry before checking the “DENY ALL” status of the Group24 entry, such as by placing all DENY entries at the front of the ACL 120. As can be appreciated, this arrangement provides for improved efficiency, as one or more isolated members of a group may be separately excluded in the ACL 120 rather than having to individually list each of the remaining members of a group to allow their access.
Note that instead of specifying a type of access, a caller may request a MAXIMUM_ALLOWED access, whereby an algorithm determines the maximum type of access allowed, based on the normal UserAndGroups list versus each of the entries in the ACL 120. More particularly, the algorithm walks down the list of identifiers accumulating the rights for a given user (i.e., OR-ing the various bitmasks). Once the rights are accumulated, the user is given the accumulated rights. However, if during the walkthrough a deny entry is found that matches a user or group identifier and the requested rights, access is denied.
A restricted token is created from an existing access token (either restricted or unrestricted), and has less access than (i.e., has a subset of the rights and privileges of) a user's normal token. As used herein, a user's “normal” token is that which grants access solely based one the identity of the user (via users or groups), with no additional restrictions placed thereon. A restricted token may not allow access to a resource via one or more user or group security IDs specially marked as “USE_FOR_DENY_ONLY,” even though the user's normal token allows access via those SIDs, and/or may have privileges removed that are present in the user's normal token. As also described below, if the restricted token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL.
In accordance with one aspect of the invention, an access token is created for a user based on both the identity of the user and the location from which the user is connecting. In general, the less trustworthy the location, the more the token is restricted as to the resources the associated process may access and/or the actions it may perform on those resources. For example, a user that is connected via a LAN may have a normal token associated with that user's processes, while the same user connected via RAS may have his or her processes associated with a restricted token that is stripped of all privileges.
As mentioned above, one way in which to reduce access is to change an attribute of one or more user and/or group security identifiers in a restricted token so as to be unable to allow access, rather than grant access therewith. Security IDs marked USE_FOR_DENY_ONLY are effectively ignored for purposes of granting access, however, an ACL that has a “DENY” entry for that security ID will still cause access to be denied. By way of example, if the Group2 security ID in the restricted token 124 (FIG. 8) is marked USE_FOR_DENY_ONLY, when the user's process attempts to access an object 112 having the ACL 120 that lists Group2 as allowed, that entry is effectively ignored and the process will have to gain access by some other security ID. However, if the ACL 80 includes an entry listing Group2 as DENY with respect to the requested type of action, then once tested, no access will be granted regardless of other security IDs.
As can be appreciated, this provides a server with the ability to restrict a user's or group's access to an object based on the location of the user. As described above, the IP address range may be specified based on the user's location, e.g., trust level zero if connecting to the local machine, trust level one if connecting from the intranet or other trusted site, level two if via RAS from an authorized telephone number, and level three otherwise. This range of addresses is then examined to mark certain groups as USE_FOR_DENY_ONLY.
By way of example, consider a user identified as UserX having a normal access token including a “TopSecret” SID, a “Confidential” SID, and an “Employee” SID, each of which grant access to TopSecret, Confidential and Employee files (based on their ACLs) respectively. If UserX is at trust level zero, UserX's normal token is used and there are no location-based restrictions placed thereon. However if at trust level one, then the TopSecret SID is marked USE_FOR_DENY_ONLY in UserX's access token. Similarly, if at trust level two, then both the TopSecret SID and the Confidential SID are marked USE_FOR_DENY_ONLY, while if at level three then the TopSecret SID, the Confidential SID and the Employee SID are marked USE_FOR_DENY_ONLY. Note that access to objects cannot be safely reduced by simply removing a security ID from a user's token, since that security ID may be marked as “DENY” in the ACL of some objects, whereby removing that identifier would grant rather than deny access to those objects. Moreover, no mechanism is provided to turn off this USE_FOR_DENY_ONLY security check.
Another way to reduce access in a restricted token is to remove one or more privileges relative to the parent token. For example, a user having a normal token with administrative privileges may be restricted via the location-based system of the present invention such that unless the user is directly connected to the local machine 60, the user's processes will run with a restricted token having no or in some way reduced privileges. As can be appreciated, the privileges that remain may also be based on levels of trust, e.g., all privileges if local (level zero), some if level one, none if level two or three.
Yet another way to reduce a token's access based on the user's location is to add restricted security IDs thereto. Restricted security IDs are numbers representing processes, resource operations and the like, made unique such as by adding a prefix to GUIDs or numbers generated via a cryptographic hash or the like, and may include information to distinguish these Security IDs from other Security IDs. As described below, if a token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL. Thus, for example, a Restricted SID may specify “RAS,” whereby unless an object's ACL has a “RAS” entry, the user will be denied access to that object.
As shown in FIG. 8, restricted security IDs are placed in a special field 122 of a restricted token 124, and, in accordance with the present invention, may identify a location from which a process is requesting an action. As described in more detail below, by requiring that both at least one user (or group) security ID and at least one restricted security ID be granted access to an object, an object may selectively grant access based on that location (as well as a user or group). Moreover, each of the locations may be granted different access rights.
The design provides for significant flexibility and granularity within the context of a user to control what a user is allowed to do from a given location. By way of example, consider the above example wherein users connecting from the local machine are level zero trusted, users connecting from the intranet and trusted sites are level one trusted, users connecting from authorized phone numbers (through RAS) and the Internet are level two trusted and users connecting from restricted sites or unauthorized phone numbers are level three trusted. Then, based on the user's location, (e.g., as ascertained from the user's IP address), level zero through level three trusts may been defined according to some predetermined policy to run as follows:
Level
Restrictions in Security Context
0
No additional restrictions are placed on the user's
security context
1
Users operate under restricted context, such as
with privileges removed from highly sensitive
operations, e.g., Backup/Restore.
2
Users operate under restricted context with all
SIDs still enabled, but no privileges.
3
Users operate under restricted context, which has
all SIDs disabled using the USE_FOR_DENY_ONLY bit,
except, e.g., constant ones such as Everyone and
Authenticated Users. All privileges are removed as
in Level 2.
To create a restricted token from an existing token, an application programming interface (API) is provided, named NtFilterToken, as set forth below:
NTSTATUS
NtFilterToken (
IN HANDLE ExistingTokenHandle,
IN ULONG Flags,
IN PTOKEN_GROUPS SidsToDisable OPTIONAL,
IN PTOKEN_PRIVILEGES PrivilegesToDelete OPTIONAL,
IN PTOKEN_GROUPS RestrictingSids OPTIONAL,
OUT PHANDLE NewTokenHandle
);
The NtFilterToken API is wrapped under a Win32 API named CreateRestrictedToken, further set forth below:
WINADVAPI
BOOL
APIENTRY
CreateRestrictedToken (
IN HANDLE ExistingTokenHandle,
IN DWORD Flags,
IN DWORD DisableSidCount,
IN PSID_AND_ATTRIBUTES SidsToDisable OPTIONAL,
IN DWORD DeletePrivilegeCount,
IN PLUID_AND_ATTRIBUTES PrivilegesToDelete OPTIONAL,
IN DWORD RestrictedSidCount,
IN PSID_AND_ATTRIBUTES SidsToRestrict OPTIONAL,
OUT PHANDLE NewTokenHandle
);
As represented in FIGS. 7 and 9A-9B, these APIs 126 work in conjunction to take an existing token 100, either restricted or unrestricted, and create a modified (restricted) token 124 therefrom. The structure of a restricted token, which contains the identification information about an instance of a logged-on user, includes three new fields corresponding to restrictions, ParentTokenId, RestrictedSidCount, and RestrictedSids, shown in boldface below:
Typedef struct_TOKEN {
TOKEN_SOURCE TokenSource;
// Ro: 16-Bytes
LUID TokenId;
// Ro: 8-Bytes
LUID AuthenticationId;
// Ro: 8-Bytes
LUID ParentTokenId;
// Ro: 8-Bytes
LARGE_INTEGER ExpirationTime;
// Ro: 8-Bytes
LUID ModifiedId;
// Wr: 8-Bytes
ULONG UserAndGroupCount;
// Ro: 4-Bytes
ULONG RestrictedSidCount;
// Ro: 4-Bytes
ULONG PrivilegeCount;
// Ro: 4-Bytes
ULONG VariableLength;
// Ro: 4-Bytes
ULONG DynamicCharged;
// Ro: 4-Bytes
ULONG DynamicAvailable;
// Wr: 4-Bytes (Mod)
ULONG DefaultOwnerIndex;
// Wr: 4-Bytes (Mod)
PSID_AND_ATTRIBUTES
// Wr: 4-Bytes (Mod)
UserAndGroups;
PSID_AND_ATTRIBUTES RestrictedSids;
// Ro: 4-Bytes
PSID PrimaryGroup;
// Wr: 4-Bytes (Mod)
PLUID_AND_ATTRIBUTES Privileges;
// Wr: 4-Bytes (Mod)
PULONG DynamicPart;
// Wr: 4-Bytes (Mod)
PACL DefaultDacl;
// Wr: 4-Bytes (Mod)
TOKEN_TYPE TokenType;
// Ro: 1-Byte
SECURITY_IMPERSONATION_LEVEL
ImpersonationLevel;
// Ro: 1-Byte
UCHAR TokenFlags;
// Ro: 4-Bytes
BOOLEAN TokenInUse;
// Wr: 1-Byte
PSECURITY_TOKEN_PROXY_DATA
// Ro: 4-Bytes
ProxyData;
PSECURITY_TOKEN_AUDIT_DATA
// Ro: 4-Bytes
AuditData;
ULONG VariablePart;
// Wr: 4-Bytes (Mod)
} TOKEN, * PTOKEN;
Note that when a normal (non-restricted) token is now created, via a CreateToken API, the RestrictedSids field is empty, as is the ParentTokenId field.
To create a restricted token 124, a process calls the CreateRestrictedToken API with appropriate flag settings and/or information in the input fields, which in turn invokes the NtFilterToken API. As represented beginning at step 900 of FIG. 9A, the NtFilterToken API checks to see if a flag named DISABLE_MAX_SIDS is set, which indicates that all Security IDs for groups in the new, restricted token 124 should be marked as USE_FOR_DENY_ONLY. The flag provides a convenient way to restrict the (possibly many) groups in a token without needing to individually identify each of the groups. If the flag is set, step 900 branches to step 902 which sets a bit indicating USE_FOR_DENY_ONLY on each of the group security IDs in the new token 124.
If the DISABLE_MAX_SIDS flag is not set, then step 900 branches to step 904 to test if any security IDs are individually listed in a SidsToDisable Field of the NtFilterToken API. As shown at step 904 of FIG. 9A, when the optional SidsToDisable input field is present, at step 906, any Security IDs listed therein that are also present in the UserAndGroups field 102 of the parent token 100 are individually marked as USE_FOR_DENY_ONLY in the UserAndGroups field 128 of the new restricted token 124. As described above, such Security IDs can only be used to deny access and cannot be used to grant access, and moreover, cannot later be removed or enabled. Thus, in the example shown in FIG. 7, the Group2 security ID is marked as USE_FOR_DENY_ONLY in the restricted token 124 by having specified the Group2 security ID in the SidsToDisable input field of the NtFilterToken API 126.
The filter process then continues to step 910 of FIG. 9A, wherein a flag named DISABLE_MAX_PRIVILEGES is tested. This flag may be similarly set as a convenient shortcut to indicate that all privileges in the new, restricted token 124 should be removed. If set, step 910 branches to step 912 which deletes all privileges from the new token 124.
If the flag is not set, step 910 branches to step 914 wherein the optional PrivilegesToDelete field is examined. If present when the NtFilterToken API 126 is called, then at step 916, any privileges listed in this input field that are also present in the privileges field 108 of the existing token 100 are individually removed from the privileges field 130 of the new token 124. In the example shown in FIG. 7, the privileges shown as “Privilege2” to “Privilegem” have been removed from the privileges field 130 of the new token 124 by having specified those privileges in the PrivilegesToDelete input field of the NtFilterToken API 126. In keeping with one aspect of the present invention, as described above, this provides the ability to reduce the privileges available in a token based on the location of a user. The process continues to step 920 of FIG. 9B.
When creating a restricted token 124, if SIDs are present in the RestrictingSids input field at step 920, then a determination is made as to whether the parent token is a normal token or is itself a restricted token having restricted SIDs. An API, IsTokenRestricted is called at step 922, and resolves this question by querying (via the NtQueryInformationToken API) the RestrictingSids field of the parent token to see if it is not NULL, whereby if not NULL, the parent token is a restricted token and the API returns a TRUE. If the test is not satisfied, the parent token is a normal token and the API returns a FALSE. Note that for purposes of the subsequent steps 926 or 928, a parent token that is restricted but does not have restricted SIDs (i.e., by having privileges removed and/or USE_FOR_DENY_ONLY SIDs) may be treated as being not restricted.
At step 924, if the parent token has restricted SIDs, step 924 branches to step 926 wherein any security IDs that are in both the parent token's restricted Security ID field and the API's restricted Security ID input list are put into the restricted Security ID field 132 of the new token 124. Requiring restricted security IDs to be common to both lists prevents a restricted execution context from adding more security IDs to the restricted Security ID field 132, an event which would effectively increase rather than decrease access. Similarly, if none are common at step 426, any token created still has to be restricted without increasing the access thereof, such as by leaving at least one restricted SID from the original token in the new token. Otherwise, an empty restricted SIDs field in the new token might indicate that the token is not restricted, an event which would effectively increase rather than decrease access.
Alternatively, if at step 924 the parent token is determined to be a normal token, then at step 928 the RestrictingSids field 132 of the new token 124 is set to those listed in the input field. Note that although this adds security IDs, access is actually decreased since a token having restricted SIDs is subject to a secondary access test, as described in more detail below.
Lastly, step 930 is also executed, whereby the ParentTokenId 93 in the new token 124 is set to the TokenId of the existing (parent) token. This provides the operating system with the option of later allowing a process to use a restricted version of its token in places that would not normally be allowed except to the parent token.
Turning an explanation of the access evaluation with particular reference to FIGS. 10-12, as represented in FIG. 10, a restricted process 134 has been created and is attempting to open a file object 110 with read/write access. In the security descriptor of the object 112, the ACL 120 has a number of security IDs listed therein along with the type of access allowed for each ID, wherein “RO” indicates that read only access is allowed, “WR” indicates read/write access and “SYNC” indicates that synchronization access is allowed. Note that “XJones” is specifically denied access to the object 72, even if “XJones” would otherwise be allowed access through membership in an allowed group. Moreover, the process 94 having this token 84 associated therewith will not be allowed to access any object via the “Basketball” security ID in the token 84, because this entry is marked “DENY” (i.e., USE_FOR_DENY_ONLY).
As represented in FIG. 10, restricted security contexts are primarily implemented in the Windows NT kernel. To attempt to access the object 112, the process 134 provides the object manager 114 with information identifying the object to which access is desired along with the type of access desired, (FIG. 12, step 1200). In response, as represented at step 1202, the object manager 114 works in conjunction with the security mechanism 118 to compare the user and group security IDs listed in the token 124 (associated with the process 134) against the entries in the ACL 120, to determine if the desired access should be granted or denied.
As generally represented at step 1204, if access is not allowed for the listed user or groups, the security check denies access at step 1214. However, if the result of the user and group portion of the access check indicates allowable access at step 1204, the security process branches to step 1206 to determine if the restricted token 124 has any restricted security IDs. If not, there are no additional restrictions, whereby the access check is complete and access is granted at step 1212 (a handle to the object is returned) based solely on user and group access. In this manner, a normal token is essentially checked as before. However, if the token includes restricted security IDs as determined by step 1206, then a secondary access check is performed at step 1208 by comparing the restricted security IDs against the entries in the ACL 120. If this secondary access test allows access at step 1210, access to the object is granted at step 1212. If not, access is denied at step 1214.
As logically represented in FIG. 11, a two-part test is thus performed whenever restricted Security IDs are present in the token 124. Considering the security IDs in the token 124 and the desired access bits 136 against the security descriptor of the object 112, both the normal access test and (bitwise AND) the restricted security IDs access test must grant access in order for the user's process to be granted access to the object. As described above, the normal access test proceeds first, and if access is denied, no further testing is necessary. Note that access may be denied either because no security ID in the token matched an identifier in the ACL, or because an ACL entry specifically denied access to the token based on a security identifier therein. Alternatively, a token may be arranged to have multiple sets of restricted SIDS, with a more complex Boolean expression covering the evaluation of those SIDS, e.g., grant access if set A OR (set B AND set C) allow access.
Thus, in the example shown in FIG. 10, no access to the object 112 will be granted to the process 134 because the only Restricted SID in the token 124 (field 132) identifies “RAS” while there is no counterpart restricted SID in the object's ACL 120. Although the user had the right to access the object via a process running with a normal token, the process 134 was restricted so as to only be able to access objects having a “RAS” SID (non-DENY) in their ACLs.
Note that instead of specifying a type of access, the caller may have specified MAXIMUM_ALLOWED access, whereby as described above, an algorithm walks through the ACL 80 determining the maximum access. With restricted tokens, if any type of user or group access at all is granted, the type or types of access rights allowable following the user and groups run is specified as the desired access for the second run, which checks the RestrictedSids list. In this way, a restricted token is certain to be granted less than or equal to access than the normal token.
Lastly, it should be noted that access tokens may be further restricted according to criteria other than just location-based criteria. Indeed, restricted tokens allow the setting up of restricted security contexts based on other criteria including the identity of the process (e.g., Microsoft Excel) that is attempting to access a resource. Moreover, the various criteria may be combined to determine access rights. Thus, for example, RAS access to a network file may be allowed if a user is opening the file via Microsoft Excel, but not via Microsoft Word. As can be appreciated, a virtually limitless number of location-based combinations with other criteria for security discrimination are feasible.
Authentication
In accordance with one aspect of the present invention, when a client connects to a server, the server authenticates the client and builds a token for that user based on the client's identity and location information. For example, as shown in FIGS. 13 and 14, in one well-known type of authentication (i.e., NTLM), the client user 200 provides credentials 202 including a user ID to a server 204, which then communicates with a domain server 206 to create a challenge for that user based on the user's stored encrypted password. As represented in FIG. 13, the server 204 returns the challenge to the client 202, and if the client properly responds, the user is authenticated.
In keeping with the present invention, however, rather than simply building a normal token for the user, the user information is combined with the location information 208 by a security subsystem/provider 210 to create a restricted token 212 as described in detail above. The restricted token 212 is associated with each process 214 run at the server 204 on behalf of any client process 216.
As shown in FIGS. 15 and 16, other authentication protocols including the Kerboros protocol may also be used in conjunction with the present invention. According to the Kerberos protocol, authentication of the connection to the server 220 is accomplished via a ticket 222. The ticket 222 is initially received by the client 224 from a ticket-issuing facility on the network known as a Key Distribution Center (KDC) 226. The ticket 222 is re-useable for a period of time, whereby even if the session is terminated, the client 130 does not have to repeat the authentication process while the ticket 222 is still valid.
In keeping with the invention, the information in the ticket 222 (which may include restrictions placed therein by the client 224) is combined by the server's security subsystem/provider 228 with user location information 230 to create a restricted token 232, as described in detail above. The restricted token 232 is associated with each process 234 run at the server 220 on behalf of any client process 236.
Similarly, FIGS. 17 and 18, show another authentication protocol known as SSL. In SSL, the client user 240 first obtains a certificate ID 242 from a certificate authority 246 using public key-based authentication. Assuming a server 248 trusts the certificate authority 246, the client user 240 may use the certificate ID 242 to gain access to the server 248. As represented in FIG. 17, back-and-forth communications take place between the server 248 and client 240 via which the server is able to prove that the certificate ID 242 belongs to the proper user.
The certificate ID 242 includes user information identifying that user as one having an account with the network to which the server 248 is connected. The information is used to access a database 250 having user information (e.g., security ID, group IDs privileges and so on) maintained for the user therein. Then, in accordance with the present invention, the user information from the database 250 is combined with location information 252 by the server's security subsystem/provider 254 to create a restricted token 256 as described in detail above. The restricted token 256 is associated with each process 258 run at the server 248 on behalf of any client process 260.
As can be appreciated, the user information obtained via these and other authentication protocols may be combined with location information to restrict a user's access to resources. Moreover, the type of authentication itself may be made dependent on the location of the user. For example, to increase security, a remote connection may require Kerboros or SSL authentication, while a challenge—response authentication may be sufficient to authenticate a user connecting via a local connection. Since the server has access to the location information, the server may decide the type of authentication required for a particular location. Similarly, the type of authentication may be used to discriminate access rights. For example, the access rights of SSL users may be restricted in one way, Kerboros users in another way and NTLM users in still another way. In the manner described above, restricted tokens provide a convenient mechanism to implement restricted security contexts based on a user's virtual location and/or type of authentication, although other enforcement mechanisms are feasible.
While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention. | 53,518,342 |
River City: Tokyo Rumble Review
Within the past couple of years, Kunio keeps finding new ways to charm western audiences. Whether he's an athlete or brawler, you know that there's some solid old-school fun to be had so let's take a trip to Tokyo and see what he's up to.
Kunio and Shinji fittingly have some arcade-style fun in an arcade
As a fan of all things Kunio-kun, I was very excited when I heard that Tokyo Rumble was on its way here. I must say, the wait sure was worth it! This addition to the much beloved series is basically a new take on the classic River City Ransom. It may seem like just a port at first, but the gameplay is actually better than ever. For example, whereas the original lacked notable boss fights, you'll find plenty here. Also, platforming is no longer a pain and the controls are incredibly tight. For the unfamiliar, River City games usually consist of street brawls where you fight through screens filled with thugs. You punch, kick, and jump your way to victory while picking up items (and enemies) and either throw them or use them as weapons. It's great beat 'em up fun in its simplest form.
River City: Tokyo Rumble looks awesome with the classic character sprites intact and well implemented 3D environments. However, the two best parts of its presentation are the music and the ridiculous sense of humour. Watching Kunio and his carefree attitude in class where he insists on calling his teacher "babe" and leaves school early to beat up some gang members will make anyone laugh out loud. There are tons of references such as characters saying "Barf!" which should be familiar to anyone who played River City Ransom. I haven't played a game that made me laugh this much in a long time. The soundtrack consists of tunes from previous games in the series (including the original Renegade theme). It's nostalgic, catchy, and makes the gameplay so much more enjoyable.
Kunio isn't afraid of anyone, no matter how fat their mitts are!
River City Ransom was famous for mixing RPG elements into the beat 'em up formula yet Tokyo Rumble goes above and beyond in this regard. Not only can you buy and equip accessories that provide boosts and learn new abilities by reading scrolls, you can also level up as you gain experience points from taking out enemies. You'll also acquire a wealth of gold and gang badges that you can either collect or sell at stores. Learning an arsenal of special moves has never been so satisfying as you slowly watch Kunio's move list expand thus allowing him to duke it out with the best. All of these elements make the campaign incredibly addictive. On top of that, you'll also come across the odd mini-game such as basketball that act as enjoyable little distractions. There's so much to see and do. Thankfully, you can take the train to various districts whenever you wish so you can explore and complete side-quests more efficiently.
Although I find this entry in the series to be a huge improvement, it does have its issues. My biggest complaint is that you can't play Story mode cooperatively with a friend. That was a big part of what made River City Ransom special. That being said, there are two bonus modes that you can play with a pal via either Download or Local play. Rumble mode is basically a battle royal brawl while Dodgeball mode is the same thing except with balls. You can catch balls when your opponents launch them at you but it's nothing like Kunio's previous Super Dodge Ball game. Finally, after you complete the campaign and dink around in these two modes a bit, there really isn't anything else to do. However, the amount of fun you'll have playing through the story still makes it a worthy experience.
It's dodgeball but without any of the pesky rules
River City: Tokyo Rumble is not only a fantastic game for existing Kunio-kun fans, it'll also appeal to any gamer looking for satisfying old-school beat 'em up gameplay set in a humorous world full of loveable characters. It's so fun that it'll make you "Barf!"
+ Beat 'em up gameplay is better than ever
+ Awesome music and a cast of characters who are absolutely hilarious to watch | 53,518,682 |
---
abstract: 'For each integer $Q\geq 1$ there exists a path connected metric compactum $X$ such that the homotopy group $\pi _{Q}(X,p)$ is compactly generated but not a topological group (with the quotient topology).'
address: |
Dept. of Mathematics and Statistics\
Mississippi State University\
Drawer MA, Mississippi State, MS 39762
author:
- Paul Fabel
date: May 30 2011
title: Compactly generated quasitopological homotopy groups with discontinuous multiplication
---
Introduction
============
Given a space $X$ and a positive integer $Q\geq 1,$ the familiar homotopy group $\pi _{Q}(X,p)$ becomes a topological space endowed with the quotient topology induced by the natural surjective map $\Pi
_{Q}:M_{Q}(X,p)\rightarrow \pi _{Q}(X,p).$ ($M_{Q}(X,p)$ denotes the space of based maps, with the compact open topology, from the $Q-$sphere $S^{Q}$ into $X$).
It is an open problem to understand when $\pi _{Q}(X,p)$ is or is not a topological group with the standard operations. For example, is $\pi
_{Q}(X,p)$ always a topological group if $Q\geq 2$ (Problem 5.1 [@Brazas], abstract [@Ghane2])? If $Q\geq 1$ must $\pi _{Q}(X,p)$ be a topological group if $X$ is a path-connected continuum and $\pi _{Q}(X,p)$ is compactly generated? We answer both questions in the negative via counterexamples.
In general the topology of $\pi _{Q}(X,p)$ is an invariant of the homotopy type of the underlying space $X,$ $\pi _{Q}(X,p)$ is a quasitopological group (i.e. multiplication is continuous separately in each coordinate and group inversion is continuous), and each map $f:X\rightarrow Y$ induces a continuous homomorphism $f_{\ast }:\pi _{Q}(X,p)\rightarrow \pi _{Q}(Y,f(p))$ [@GH].
If $X$ has strong local properties (for example if $X$ is locally $n$-connected for all $0\leq n\leq Q$) then $\pi _{Q}(X,p)$ is discrete [@Fab1],[@Calcut],[@GH], and hence a topological group.
If $Q\geq 2$, the group $\pi _{Q}(X,p)$ is abelian, and this fact has the capacity to nullify structural pathology present when $Q=1.$ For example Ghane, Hamed, Mashayekhy, and Mirebrahimi [@Ghane2] show if $Q\geq 2$ then $\pi _{Q}(X,p)$ is a topological group if $X$ is the $Q-$dimensional version of the 1-dimensional Hawaiian earring.
However in general the standard group multiplication in $\pi _{Q}(X,p)$ can fail to be continuous if $\Pi _{Q}\times \Pi _{Q}:M_{Q}(X,p)\times
M_{Q}(X,p)\rightarrow \pi _{Q}(X,p)\times \pi _{Q}(X,p)$ fails to be a quotient map. Recent counterexamples respectively of Brazas (Example 4.22 [@Brazas]) and Fabel [@Fab3] show $\pi _{1}(X,p)$ fails to be a topological group if $X$ is the union of large circles parameterized by the rationals and joined at a common point, or if $X$ is the 1-dimensional Hawaiian earring.
For the main result, given $Q\geq 1$ we obtain a space $X$ as the union of convergent line segments $L_{n}\rightarrow L$, joined at the common point $p,
$ with a small $Q-$sphere $S_{n}$ attached to the end of each segment $L_{n}$, and this yields the following.
For each $Q\in \{1,2,3,...\}$ there exists a compact path connected metric space $X$ such that, with the quotient topology, $\pi _{Q}(X,p)$ is compactly generated and multiplication is discontinuous in $\pi _{Q}(X,p)$.
Definitions
-----------
If $Y$ is a space and if $A\subset Y$ then the set $A$ is **closed under convergent sequences** if $A$ enjoys the following property: If the sequence $\{a_{1},a_{2},..\}\subset A$ and if $a_{n}\rightarrow a$ then $a\in A.$
The space $Y$ is a **sequential space** if $Y$ enjoys the following property: If $A\subset Y$ and if $A$ is closed under convergent sequences then $A$ is a closed subspace of $Y.$
If $Y$ and $Z$ are spaces the surjective map $q:Y\rightarrow Z$ is **quotient map** if for every subset $A\subset Z,$ the set $A$ is closed in $Z$ if and only if the preimage $q^{-1}(A)$ is closed in $Y.$
Given a space $X$ and $p\in X,$ and an integer $Q\geq 1$ let $\pi _{Q}(X,p)$ denote the familiar $Qth$ homotopy group of $X$ based at $p.$
To topologize $\pi _{Q}(X,p)$, let $M_{Q}(X,p)$ denote the space of based maps $f:(S^{Q},1)\rightarrow (X,p)$ from the $Q$-sphere $S^{Q}$ into $X,$ and impart $M_{Q}(X,p)$ with the compact open topology.
Let $\Pi _{Q}:M_{Q}(X,p)\rightarrow \pi _{Q}(X,p)$ be the canonical quotient map such that $\Pi _{Q}(f)=\Pi _{Q}(g)$ iff $f$ and $g$ belong to the same path component of $M_{Q}(X,p),$ and declare $U\subset G$ to be open iff $\Pi
_{Q}^{-1}(U)$ is open in $M_{Q}(X,p).$
A **Peano continuum** is a compact locally path connected metric space.
If $Q$ is a positive integer a **closed Q-cell** is any a space homeomorphic to $[0,1]^{Q},$ and the $\mathbf{Q-}$**sphere** $S^{Q}$ is the quotient of $[0,1]^{Q}$ by identifying to a point the $Q-1$ dimensional boundary $[0,1]^{Q}\backslash (0,1)^{Q}.$
Basic properties of $\protect\pi _{Q}(X,p)$
-------------------------------------------
\[seq\]If $X$ is a metrizable space then $M_{Q}(X,p)$ is a metrizable space, and $\pi _{Q}(X,p)$ is a sequential space.
Since $X$ is metrizable and since $S^{Q}$ is a compact, the uniform metric shows $M_{Q}(X,p)$ is metrizable. Moreover since $S^{Q}$ is compact, the compact open topology coincides with the metric topology of uniform convergence in $M_{Q}(X,p).$
Suppose $A\subset \pi _{Q}(X,p)$ and suppose $A$ is closed under convergent sequences. Let $B=\Pi _{Q}^{-1}(A)$. Suppose $b_{n}\rightarrow b$ and $b_{n}\in B.$ Then $\Pi _{Q}(b_{n})\rightarrow \Pi _{Q}(b)$ and hence $\Pi
_{Q}(b)\in A.$ Thus $b\in B.$ Thus $B$ is closed under convergent sequences. Hence $B$ is closed in $M_{Q}(X,p)$ since $M_{Q}(X,p)$ is metrizable. Thus, since $\Pi _{Q}$ is a quotient map, $A$ is closed in $\pi _{Q}(X,p).$ Hence $\pi _{Q}(X,p)$ is a sequential space.
\[reps\]Suppose $X$ is metrizable and suppose $z_{n}\rightarrow z$ in $\pi _{Q}(X,p).$ Then there exists $n_{1}<n_{2}..$ and a convergent sequence $\alpha _{n_{k}}\in M_{Q}(X,p)$ such that $\Pi _{Q}(\alpha
_{n_{k}})=z_{n_{k}}.$
If there exists $N$ such that $z_{n}=z$ for all $n\geq N,$then there exists $\alpha \in M_{Q}(X,p)$ such that $\Pi _{Q}(\alpha )=z$ (since $\Pi _{Q}$ is surjective) and let $\alpha _{n}=\alpha $ for all $n\geq N,$ and thus the constant sequence $\{\alpha _{n}\}$ converges.
If no such $N$ exists then obtain a subsequence $\{x_{n}\}\subset \{z_{n}\}$ such that $x_{n}\neq z$ for all$\,$ $n.$ To see that $\{x_{1},x_{2},..\}$ is not closed in $Z$, note $z\notin \{x_{1},x_{2},..\}$ and, since $x_{n}\rightarrow z,$ it follows that $z$ is a limit point of the set $\{x_{1},x_{2},..\}.$ Thus, since $\Pi _{Q}$ is a quotient map, $\Pi
_{Q}^{-1}\{x_{1},x_{2},..\}$ is not closed in $Y.$ Obtain a limit point $\beta \in \overline{\Pi _{Q}^{-1}\{x_{1},x_{2},..\}}\backslash \Pi
_{Q}^{-1}\{x_{1},x_{2},..\}.$ Since $M_{Q}(X,p)$ is metrizable (Lemma \[seq\]), there exists a sequence $\beta _{k}\rightarrow \beta $ such that $\{\beta _{k}\}\subset $ $\Pi _{Q}^{-1}\{x_{1},x_{2},..\}.$ Moreover (refining $\{\beta _{k}\}$ if necessary) there exists a subsequence $\{m_{1},m_{2},...\}\subset \{1,2,...\}$ such that $\Pi _{Q}(\beta
_{k})=x_{m_{k}}$, and if $k<j$ then $m_{k}<m_{j}.$ Let $x_{m_{k}}=z_{n_{k}}$ and let $\alpha _{n_{k}}=\beta _{k}.$
Main result
===========
Fixing a positive integer $Q,$ the goal is to construct a path connected compact metric space $X,$ such that if $\pi _{Q}(X,p)$ has the quotient topology, then $\pi _{Q}(X,p)$ is compactly generated but the standard group multiplication is not continuous in $\pi _{Q}(X,p).$
The idea to construct $X$ is to begin with the cone over a convergent sequence $\{w,w_{1},w_{2},..\}$ (i.e. we have a sequence of convergent line segments $L_{n}\rightarrow L$, joined at a common endpoint $p\in L_{n}),$ and then we attach a $Q-$ sphere $S_{n}$ of radius $\frac{1}{10^{n}}$ to the opposite end of each segment $L_{n}$ at $w_{n}$.
Specifically, for $Q\geq 1$ let $R^{Q+1}$ denote Euclidean space of dimensions $Q+1$ with Euclidean metric $d.$ Let $p=(0,0,..,0)$ and let $w_{n}=(\frac{1}{n},1,0,...0)$ and let $w=(0,1,0,...,0).$ Consider the line segment $L_{n}=[p,w_{n}]$ and observe for each $n,$ if $i\neq n$ then $d(w_{n},w_{i})\geq \frac{1}{n}-\frac{1}{n+1}=\frac{1}{n^{2}+n}.$
Let $L=[p,w]$ and let $\gamma _{n}:L\rightarrow L_{n}$ be the linear bijection fixing $p$ and observe $\gamma _{n}\rightarrow id|L$ uniformly.
Let $c_{n}=(\frac{1}{n},1+\frac{1}{10^{n}},0,..,0).$ Let $S_{n}$ denote the Euclidean $Q$-sphere such that $x\in S_{n}$ iff $d(x,c_{n})=\frac{1}{10^{n}}.$ Let $q_{n}=(\frac{1}{n},1+\frac{2}{10^{n}},0,..,0)$ and notice $S_{n}\cap L_{n}=\{w_{n}\}.$
Let $X_{n}=\cup _{k=1}^{n}(L_{n}\cup S_{n})$
Let $X=L\cup X_{1}\cup X_{2}....$
Define retracts $R_{n}:X\rightarrow X_{n}$ such that $R_{n}(x_{1},x_{2},...x_{n+1})=(x_{1}^{\ast },x_{2},..,x_{n+1})$ with $x_{1}^{\ast }$ minimal such that $im(R_{n})\subset X_{n}$.
Notice $R_{n}\rightarrow id_{X}$ uniformly and for all $n$ we have $R_{n}R_{n+1}=R_{n}.$
Hence we obtain the natural homomorphism $\phi :\pi _{Q}(X,p)\rightarrow
\lim_{\leftarrow }\pi _{Q}(X_{n},p)$ defined via $\phi ([\alpha
])=([R_{1}(\alpha )],[R_{2}(\alpha )],...).$
For $Q\geq 1$ let $G=\pi _{Q}(X,p)$. Thus if $Q=1$ then $G$ is the free group on generators $\{x_{1},x_{2},...\}$ and if $Q\geq 2,$ then $G$ is the free abelian group on generators $\{x_{1},x_{2},...\}$, and let $\ast
:G\times G\rightarrow G$ denote the familiar multiplication.
Elements of $G$ admit a canonical form as maximally reduced words in the letters $\{x_{1},x_{2},..\}$ in the format $x_{n_{1}}^{k_{1}}\ast
x_{n_{2}}^{k_{2}}\ast ...\ast x_{n_{m}}^{k_{m}}$ with $n_{i}\neq n_{i+1}.$ If $Q\geq 2$ then $G$ is abelian and we can further require $n_{i}<n_{j}$ whenever $i<j.$
Define $l:G\rightarrow \{0,1,2,3,..\}$ such that $l(x_{n_{1}}^{k_{1}}\ast
x_{n_{2}}^{k_{2}}...\ast x_{n_{m}}^{k_{m}})=m.$
Let $G_{N}$ denote the subgroup of $G$ such that if $x_{n_{1}}^{k_{1}}\ast
x_{n_{2}}^{k_{2}}...\ast x_{n_{m}}^{k_{m}}\in G_{N}$ then $n_{i}\leq N$ for all $i.$
Let $\phi _{N}:G\rightarrow G_{N}$ denote the natural epimorphism such that $\phi _{N}(g)$ is the reduced word obtained from $g$ after deleting all letters $x_{i}$ of index $i>N$.
\[gt2\]The homomorphism $\phi :\pi _{Q}(X,p)\rightarrow \lim_{\leftarrow
}\pi _{Q}(X_{n},p)$ is continuous and one to one, and the space $\pi
_{Q}(X,p)$ is $T_{2}$.
Recall $G=\pi _{Q}(X,p)$ and note $\pi _{Q}(X_{n},p)$ is canonically isomorphic to $G_{n}.$ To see that $\phi $ is continuous, first recall in general a map $\alpha :Y\rightarrow Z$ [@GH] induces a continuous homomorphism $\alpha _{\ast }:\pi _{Q}(Y,y)\rightarrow \pi _{Q}(Z,\alpha (z))
$) and in particular the retractions $R_{n}:X\rightarrow X_{n}$ induce continuous epimorphisms $R_{n\ast }:G\rightarrow G_{n}.$ By definition $\phi
=(R_{1\ast },R_{2\ast }...)$ and hence $\phi $ is continuous since $\lim_{\leftarrow }G_{n}$ enjoys the product topology.
To see that $\phi $ is one to one, suppose $[f]\in \ker \phi .$ Since $f:S^{Q}\rightarrow X$ is a map and since $S^{Q}$ is a Peano continuum, then $im(f)$ is a Peano continuum, and hence $im(f)$ is locally path connected, and in particular $im(f)\cap \{q_{1},q_{2},...\}$ is finite.
Obtain $N$ such that $im(f)\cap \{q_{1},q_{2},...\}\subset
\{q_{1},...,q_{N}\}.$ Notice $X_{N}$ is a strong deformation retract of $X\backslash \{q_{N+1},q_{N+2},..\}$,$\ $(since for $i\geq N+1$, $S_{i}\backslash \{q_{i}\}$ is contractible to $p,$ and we can contract to $p$ simultaneously for $k\in \{1,2,3,...\}$ the subspaces $L\cup L_{N+k}\cup
(S_{N+k}\backslash \{q_{N+k}\}$). In particular, under the strong deformation retraction collapsing $X\backslash \{q_{N+1},q_{N+2},..\}$ to $X_{N}$, $f$ deforms in $X$ to $R_{N}(f),$ and by assumption $R_{N}(f)$ deforms in $X_{N}$ to the constant map (determined by $p$). Hence $f$ is inessential in $X$ and this proves $\phi $ is one to one.
Since $X_{n}$ is locally contractible, $\pi _{Q}(X_{n},p)$ is discrete [@GH]. Hence $\lim_{\leftarrow }\pi _{Q}(X_{n},p)$ is metrizable and in particular $T_{2}.$ Thus $G$ is $T_{2}$ since $G$ injects continuously into the $T_{2}$ space $\lim_{\leftarrow }G_{n}$.
\[sc\]Suppose $\{g,g_{1},g_{2},...\}\subset G.$ Suppose $g_{n}\rightarrow g.$ Then $\{l(g_{n})\}$ is bounded and $\phi
_{N}(g_{n})\rightarrow \phi _{N}(g).$
Suppose $g_{n}\rightarrow g.$ Then $\phi (g_{n})\rightarrow \phi (g)$ in $\lim_{\leftarrow }G_{n},$ since $\phi $ is continuous. This means precisely that for each $N\geq 1,$ the sequence $\phi _{N}(g_{n})\rightarrow \phi
_{N}(g).$
To prove $\{l(g_{n})\}$ is bounded, suppose to obtain a contradiction $l\{g_{n}\}$ is not bounded. Select a subsequence $\{y_{n}\}\subset \{g_{n}\}$ such that $l(y_{n})\rightarrow \infty .$ By Lemma \[reps\] there exists a subsequence $\{z_{n}\}\subset \{y_{n}\}$ and a convergent sequence of maps $\{\alpha _{n}\}\subset M_{Q}(X,p)$ such that $\Pi (\alpha _{n})=z_{n}$. Let $z_{n}=x_{s_{1}}^{k_{1}}\ast x_{s_{2}}^{k_{2}}...\ast
x_{s_{m_{n}}}^{k_{m_{n}}}$ and let $Z_{n}\subset
\{q_{s_{1}},q_{s_{1}},..q_{s_{m_{n}}}\}.$ Thus $Z_{n}$ consists of the tops of the corresponding spheres in $X,$ and hence $Z_{n}\subset im(\alpha
_{n}). $ Since $l(z_{n})\rightarrow \infty $, the maps $\{\alpha _{n}\}$ are not equicontinuous, contradicting the fact that the convergent sequence $\{\alpha _{n}\}$ is equicontinuous.
$\pi _{Q}(X,p)$ is compactly generated. (Select a convergent sequence of generators $v_{1},v_{2},...\subset M_{Q}(X,p),$such that $[v_{n}]$ generates the cyclic group $\pi _{Q}(L_{n}\cup S_{n},p))$ and $[v_{n}]\rightarrow e$ and $e$ denotes the identity in $\pi _{Q}(X,p))$
Multiplication $\ast :\pi _{Q}(X,p)\times \pi _{Q}(X,p)\rightarrow \pi
_{Q}(X,p)$ is not continuous.
Recall $G=\pi _{Q}(X,p)$ and consider the following doubly indexed subset $A\subset G.$ Let $A$ consist of the union of all reduced words of the form $x_{n}^{k}\ast x_{k+1}\ast x_{k+2}\ast ...\ast x_{k+n}$, taken over all pairs of positive integers $n$ and $k$.
To prove that $\ast :G\times G\rightarrow G$ is not continuous, it suffices to prove that $A$ is closed in $G,$ and that $\ast ^{-1}(A)$ is not closed in $G\times G.$
To prove $A$ is closed in $G,$ since $G$ is a $T_{2}$ sequential space (Lemmas \[seq\] and \[gt2\]), it suffices to prove every convergent sequence in $A$ has its limit in $A.$ Suppose $g_{m}\rightarrow g$ and $g_{m}\in A$ for all $m.$ Let $g_{m}=x_{n_{m}}^{k_{m}}\ast x_{k_{m}+1}\ast
x_{k_{m}+2}\ast ...\ast x_{k_{m}+n_{m}}$. Notice $l(g_{m})\geq n_{m}.$ Thus by Lemma \[sc\] the sequence$\{n_{m}\}$ is bounded. For each $n_{i},$by Lemma \[sc\], the sequence $\phi _{n_{i}}(g_{m})$ is eventually constant and thus the sequence $\{k_{m}\}$ is bounded (since every subsequence of $x_{n_{i}}^{1},x_{n_{i}}^{2},x_{n_{i}}^{3},...$ diverges in $G_{n_{i}}$). Thus $\{g_{1},g_{2},...\}$ is a finite set and hence (since $G$ is $T_{1}$) $\{g_{1},g_{2},...\}$ is closed in $G$. Thus $g\in $ $\{g_{1},g_{2},...\}$ and hence $A$ is closed in $G.$
Let $e\in G$ denote the identity of $G.$ To prove $\ast ^{-1}(A)$ is not closed in $G\times G$, we will show $(e,e)\notin \ast ^{-1}(A)$ and $(e,e)$ is a limit point of $\ast ^{-1}(A).$ Note $e\ast e=e$ and $e\notin A$ since $l(e)=0$ and $l(x)\geq 1$ for all $x\in A.$ Thus $(e,e)\notin \ast ^{-1}(A).$
To see that $(e,e)$ is a limit point of $\ast ^{-1}(A)$ suppose $U\subset G$ is open and suppose $e\in U.$ Let $V=\Pi ^{-1}(U)\subset M_{Q}(X,p).$ First we show there exists $N$ such that $x_{n}^{k}\in U$ for all $n\geq N$ and all $k,$ argued as follows.
Obtain a closed $Q-$cell $B\subset S^{Q}$ and recall $w=(0,1,0,...,0).$ Obtain an inessential map $\alpha \in $ $M_{Q}(X,p)$ such that $im(\alpha
)\subset L$ and such that $\alpha ^{-1}(w)=B.$ Let $k_{1},k_{2},...$ be any sequence of integers and consider the sequence $x_{1}^{k_{1}},x_{2}^{k_{2}},...\subset G.$ For each $n\geq 1$ obtain $\alpha
_{n}\in $ $M_{Q}(X,p)$ such that $\Pi (\alpha _{n})=x_{n}^{k_{n}}$, such that $\alpha _{n}|(S^{Q}\backslash B)=\gamma _{n}(\alpha |(S^{Q}\backslash
B)),$ and such that $\alpha _{n}(B)\subset S_{n}.$ Hence $\alpha
_{n}\rightarrow \alpha $ and thus $\Pi (\alpha _{n})\rightarrow \Pi (\alpha
).$ Hence $x_{n}^{k_{n}}\rightarrow e.$ Since $\{k_{i}\}$ was arbitrary, it follows there exists $N$ such that $x_{n}^{k}\in U$ for all $n\geq N$ and all $k.$
Obtain $N$ as above and for each $k\geq 1$ define $v_{k}=x_{k+1}\ast ...\ast
x_{k+N}.$ To see that the sequence $v_{k}\rightarrow e$ select $N$ disjoint closed $Q$-cells $B_{1},B_{2},...,B_{N}\subset S^{Q}$ (and if $Q=1$ we also require the closed intervals satisfy $B_{j}<B_{j+1}$ for $1\leq j\leq N-1$). Construct $\beta :S^{Q}\rightarrow L$ such that $\beta
_{i}^{-1}(w)=B_{1}\cup B_{2}...\cup B_{N}.$ Note $\beta $ is inessential since $L$ is contractible. For each $i\in \{1,..,N\}$ and for each $k$ let $f_{i,k}:S^{Q}\rightarrow X$ satisfy $\Pi (f_{i,k})=x_{k+i},$ and $f_{i,k}|(S^{Q}\backslash B_{i})=\gamma _{k}(\beta |(S^{Q}\backslash B_{i})).$ Now let $\beta _{k}=\beta |(S^{1}\backslash (B_{1}\cup ..\cup B_{N}))\cup
f_{1,k}|B_{1}\cup f_{2,k}|B_{2}...\cup f_{N,k}|B_{N}.$ Notice $\beta
_{k}\rightarrow \beta $ uniformly and $\Pi (\beta _{k})=v_{k}$ and $\Pi
(\beta )=e,$ and thus $v_{k}\rightarrow e.$ In particular there exists $K>N$ such that $v_{K}\in U.$ Thus $(x_{N}^{K},v_{K})\in (U,U)$ and $x_{N}^{K}\ast
v_{K}\in A.$ This proves $(e,e)$ is a limit point of $\ast ^{-1}(A),$ and thus $\ast ^{-1}(A)$ is not closed in $G\times G.$
[9]{} Jeremy Brazas, *The topological fundamental group and free topological groups,* Topology Appl. 148 (2011), no. 6, 779–802.
Jack S. Calcut; John D. McCarthy, *Discreteness and homogeneity of the topological fundamental group,* Topology Proc. Vol 34 (2009) 339-349.
Paul Fabel, *Metric spaces with discrete topological fundamental group,* Topology Appl. 154 (2007), no. 3, 635–638.
Paul Fabel, *Multiplication is discontinuous in the Hawaiian earring group (with the quotient topology),* Bulletin Pol. Acad. Sci. (to appear).
H. Ghane; Z. Hamed; B. Mashayekhy; H. Mirebrahimi, *Topological homotopy groups,* Bull. Belg. Math. Soc. Simon Stevin 15 (2008), no. 3, 455–464.
H. Ghane; Z. Hamed; B. Mashayekhy; H. Mirebrahimi, *On topological homotopy groups of n-Hawaiian like spaces,* Topology Proc. 36 (2010), 255-266.
| 53,518,908 |
Inflammatory responses to mast cell granules.
Mast cell degranulation leads to classic allergic reactions appearing within minutes and abating in 30-60 min. It is now appreciated that this is but the first stage of a multisequenced reaction that includes late phase allergic reactions that are apparent within 4-8 h and persisting up to 24 h. These late phase reactions (LPR) are clinically experienced as burning, ill-defined erythema, and edema and are thought to participate in airway and nasal hyperreactivity. A rodent model has been developed that permits analyses of the pathogenesis of LPR: LPR may be elicited by isolated inflammatory factors released from mast cell granules, are complement independent, require an influx of neutrophils for full expression, and may be inhibited by combinations of H-1 and H-2 antihistamines as well as corticosteroids. The appreciation of the late phase of allergic reactions broadens our understanding of the pathologic features of immunologically induced inflammation as well as provides new approaches to the treatment of allergy and asthma. | 53,518,974 |
This is a discussion on Where do i buy a service manual? within the Maintenance, service, and repair forums, part of the Tutorials & DIY category; hey ive got a 2004 wrx and ive been searching everywhere online for either, the actual copy of the service ...
Where do i buy a service manual?
hey ive got a 2004 wrx and ive been searching everywhere online for either, the actual copy of the service manual or the cd version for the computer. ive also read somewhere that there was a free hidden link to it, but the link didnt work when i tried it. any help?
hey ive got a 2004 wrx and ive been searching everywhere online for either, the actual copy of the service manual or the cd version for the computer. ive also read somewhere that there was a free hidden link to it, but the link didnt work when i tried it. any help?
vBulletin Message
Errors
The following errors occurred with your submission
Quick Reply
Register Now
Please enter the name by which you would like to log-in and be known on this site.If you do not want to register, fill this field only and the name will be used as user name for your post.
Password:
Confirm Password:
Please enter a password for your user account. Note that passwords are case-sensitive.
Email Address:
Please enter a valid email address for yourself. We strongly suggest that you stay away from using aol, yahoo, msn, and hotmail accounts. Sometimes the mail server blocks the emails from our server. As a result you will not receive any notifications including the confirmation email.
Log-in
User Name:
Password:
Human Verification
In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic. | 53,518,992 |
Statistics Tutors in Sterling, VA
Find Private & Affordable Statistics Tutoring in the Sterling Area!
I've taught college statistics for twenty years, and for seven years I have tutored various levels of math . I'm able to work with students of all ages and skill levels . I love teaching and being able to share my knowledge with students so that they can go on to be strong,...
I love working with students of all types, and I can appreciate the cultural diversity brought on by many different students, including those learning English as a Second Language.I offer tutoring in Algebra 1, Geometry, Elementary and Middle School Math, Statistics,...
I am now studying at the University of North Texas . I'm an undergraduate majoring in Economics . My minor is Statistics . Economics and writing are my primary interests but I also read economics-related books, work out, and write poetry in my spare time . I live in...
My favorite subjects are Algebra and Trigonometry . I've always been passionate about Math . My first encounter with Physics in college is what sparked my interest to apply math expertise to my surroundings . My interests don't end with Physics and Math . I want to someday...
I have been tutoring during my education, and have found it to be very rewarding to assist students in overcoming difficulties with a class . I can tutor students in general mathematics, statistics, economics, microeconomics, macroeconomics, philosophy, business, and social...
And that gives students both the skills and confidence to solve more complex problems. In order for me to help a student reach this type of critical analysis, I rely on what I have learned and how I have learned it to help me with my explanation for the student . From a...
As far back as I can remember, I have always been interested in mathematics because it provides a clear, systematic answer . Through mathematics, one can solve a problem through a reliable process with a minimal margin of error.I tutor a number of subjects, including...
I strive to inspire my students to look at the concepts of Physics as a language . Learning its rules and nuances is no different from learning English as a child, and it's just as easy . One of my specialties is Numerical Analysis, and I find this subject a joy to teach . ...
Of these three subjects, Math is the one that I feel is a special strength . It is also the one that I find most satisfying to tutor . Next, I like to work with students who need help with one of the sciences, and I am particularly fond of Chemistry . Specifically, I can...
With undergraduate degrees in both international relations and psychology, and a master's degree in statistics, I have spent many years in school . I have learned that feedback is important to both the student and the tutor . When a student provides me with feedback I can...
Currently, I am employed as an instructor at DeVry University as well as at Northern Virginia Community College . I have several years of experience as both a teacher and a tutor, focusing on subjects such as Chemistry, Statistics, Physics, and other Sciences . I have worked... | 53,519,206 |
Effects of Chronic Ochratoxin A Exposure on p53 Heterozygous and p53 Homozygous Mice.
Exposure to the mycotoxin ochratoxin A (OTA) causes nephropathy in domestic animals and rodents and renal tumors in rodents and poultry. Humans are exposed to OTA by consuming foods made with contaminated cereal grains and other commodities. Management of human health risks due to OTA exposure depends, in part, on establishing a mode of action (MOA) for OTA carcinogenesis. To further investigate OTA's MOA, p53 heterozygous (p53+/-) and p53 homozygous (p53+/+) mice were exposed to OTA in diet for 26 weeks. The former are susceptible to tumorigenesis upon chronic exposure to genotoxic carcinogens. OTA-induced renal damage but no tumors were observed in either strain, indicating that p53 heterozygosity conferred little additional sensitivity to OTA. Renal changes included dose-dependent increases in cellular proliferation, apoptosis, karyomegaly, and tubular degeneration in proximal tubules, which were consistent with ochratoxicosis. The lowest observed effect level for renal changes in p53+/- and p53+/+ mice was 200 μg OTA/kg bw/day. Based on the lack of tumors and the severity of renal and body weight changes at a maximum tolerated dose, the results were interpreted as suggestive of a primarily nongenotoxic (epigenetic) MOA for OTA carcinogenesis in this mouse model. | 53,519,425 |
Q:
What is the source for writing names of Haman's sons in a separate column?
What is the source for writing names of Haman's sons in a separate column? We see that most megillos are written this way, but where can I find halacha? Shulchan Aruch doesn't seem to be discussing it?
A:
The Talmud Yerushalmi (Megillah 3:7) says about the list that the word איש should be at the "head" of the column and ואת should be at the "end" of it. Some versions (see Masekhet Sofrim 13:6) also mention that עשרת should be at the "end" of the column. The remarks about איש and עשרת are important because we may have thought the song structure didn't include those words and, for example, the last line could read ויזתא עשרת בני המן בן without any gaps.
Now it's clear from the fact that every ואת [and עשרת] can't all be at the bottom of the column that either "דפא -- column" here means row, or that "head" and "end" mean the right and left sides respectively. Many Rishonim note this explicitly (Haghot Maymoniot Megillah 2:12 quoting Ri and Maharam, Haghot Ashiri Megillah 1:9, Or Zarua 373, Semag Asin Derabanan 4, Raavyah 253 in the name of the Bahag, Beit Yosef 691, and more). This is the practice in ancient Esther manuscripts.
The practice of writing the names in their own column is a "stringency" so that איש can literally be at the top of the column and עשרת can be at the literal bottom. This practice presents a number of Halakhic problems in terms of spacing and font sizes (eg. Beiur HaGra OC 691), but it remains quite popular (see the valiant defense of the Nishmat Adam 155). The Vilna Gaon, 3rd Lubavitcher Rebbe, Chatam Sofer, Aruch leNer and others did not write the sons of Haman in a separate column.
The earliest source I'm aware of that mentions matching the top or bottom of the column is the Orchot Chayim (Megillah 17) who mentions "some" who put עשרת at the bottom of the column because of קבלה (tradition?). (It seems from his wording that he views this as an alternative to what he viewed as the "mainstream" tradition of placing איש at the top of the column, not that he advocated doing both and stretching the letters (cf. his comments in 18 about stretching the letter ו in ויזתא).)
The source that most gets quoted through in the Acharonim is the Keneset HaGedolah (OC 691) who develops a theory that while the above proof shows that ואת needs only to be at the end of the row, the extra claim of עשרת at the end of the column found in Masekhet Soferim is to be taken as the bottom of the column not the end of the row. He thus ruled that we should be stringent not to read from a Megillah where עשרת is not at the bottom of the column, even though the Tur doesn't even mention that extra claim regarding עשרת, since many Rishonim (including many of those listed above as explaining "end" as "left side") did mention the extra claim of עשרת at the end. He argues that the Tur must not have seen Masekhet Sofrim's expanded version and he definitely would have ruled like it if had. Many didn't find this convincing (Beit Ephraim OC 70, Chatam Sofer OC 190, Ginat Veradim 4:12). Even the Keneset HaGedolah agreed that if you already read from a scroll that didn't have עשרת at the bottom of the column that you don't need to read it again.
The only Rishon I'm aware of who explicitly indicates that איש must be at the top of the column and עשרת at the bottom is the Piskei Tosfot (Megillah #30).
| 53,519,491 |
HITC Sport understands Nottingham Forest set to sign winger.
Mustapha Carayol celebrates scoring for Middlesbrough
Nottingham Forest are on the verge of signing Middlesbrough winger Mustapha Carayol, HITC Sport understands from sources close to the club.
Caryol is out of favour at Middlesbrough and has not figured this season since their return to the Premier League.
Leeds United loanee Mustapha Carayol in action with Brentford’s Alan Judge
The 27-year-old had spells out on loan at Huddersfield Town and Leeds United last season after finding himself frozen out of the first-team picture at Middlesbrough by Aitor Karanka.
Leeds United loanee Mustapha Carayol
Karanka is willing to let Carayol move on as he does not figure in his plans going forward and the player is set to cancel his contract by mutual consent.
Carayol joined Middlesbrough from Bristol Rovers in 2012 and quickly became a big favourite at the Riverside before suffering a cruciate knee ligament injury in March 2014 sidelined him for the best part of a year.
A number of clubs are understood to have been monitoring Carayol’s situation at Middlesbrough, but Forest have moved quickly to agree a deal for the skilful attacker.
Carayol is understood to have passed a medical and agreed terms to make the move to Forest and his arrival will help fill the void left by Oliver Burke’s surprise departure to Bundesliga side RB Leipzig.
Rotherham United’s Grant Ward in action with Leeds United’s Mustapha Carayol
In other news, 'Not one bit': Sky pundit shares what he noticed about Bielsa during Leeds defeat | 53,519,493 |
C-Glycosidation of Unprotected Di- and Trisaccharide Aldopyranoses with Ketones Using Pyrrolidine-Boric Acid Catalysis.
C-Glycoside derivatives are found in pharmaceuticals, glycoconjugates, probes, and other functional molecules. Thus, C-glycosidation of unprotected carbohydrates is of interest. Here the development of C-glycosidation reactions of unprotected di- and trisaccharide aldopyranoses with various ketones is reported. The reactions were performed using catalyst systems composed of pyrrolidine and boric acid under mild conditions. Carbohydrates used for the C-glycosidation included lactose, maltose, cellobiose, 3'-sialyllactose, 6'-sialyllactose, and maltotriose. Using ketones with functional groups, C-glycosides ketones bearing the functional groups were obtained. The pyrolidine-boric acid catalysis conditions did not alter the stereochemistry of non-C-C bond formation positions of the carbohydrates and led to the formation of the C-glycosidation products with high diastereoselectivity. For the C-glycosidation of the carbohydrates under the pyrrolidine-boric acid-catalysis, the hydroxy group at the 6-position of the reacting aldopyranose was necessary to afford the product. Our analyses suggest that the carbohydrates form iminium ions with pyrrolidine and that boric acid forms B-O covalent bonds with the carbohydrates during the catalysis to forward the C-C bond formation. | 53,519,520 |
Search form
Lenz v. Universal
LEGAL CASE
Lenz v. Universal
After more than 10 years of litigation, Stephanie Lenz and Universal Music Publishing Group have resolved their dispute, often referred to as the “Dancing Baby” case.
Stephanie Lenz, represented by EFF, filed the lawsuit in 2007 after YouTube removed a video in response to Universal’s false copyright complaint. The video is a 29-second recording of her son dancing to the Prince song “Let’s Go Crazy.” The case raised the question of whether a copyright holder can use the Digital Millennium Copyright Act (DMCA) to take down an obvious fair use without consequence. Keker, Van Nest and Peters LLP were co-counsel on the case.
Section 512 of the DMCA created the so-called “notice and takedown” system, which gives service providers immunity from copyright liability for content posted by users if the providers take it down when they are notified that it is infringing. However, Section 512 notice often target lawful material as well. To discourage such abuse, Congress made sure that the DMCA included a series of checks and balances, including Section 512(f), which gives users the ability to hold copyright owners accountable if they send a DMCA notice in bad faith.
Lenz claimed that Universal’s takedown notice was a misrepresentation in violation of Section 512(f). In response, Universal argued that copyright owners should not have to consider fair use before sending DMCA takedown notices. The Ninth Circuit rejected this argument, holding that the DMCA requires copyright owners to consider whether works are lawful fair uses before sending takedown notices targeting them. The appeals court made clear that fair use is not an “infringement to be excused” but instead is not copyright infringement at all.
The Ninth Circuit also ruled that, when considering claims under Section 512(f), copyright holders should be held to a subjective standard. In other words, senders of false infringement notices could be excused so long as they subjectively believed that the material they targeted was infringing. EFF was disappointed with this aspect of the ruling as it entails that a subjective belief in infringement can excuse a wrongful takedown notice no matter how unreasonable that belief.
After the Ninth Circuit’s ruling, both Lenz and Universal petitioned the Supreme Court for review. The Supreme Court denied both parties’ petitions and the parties later agreed to a settlement.
Related Content
%3Cobject%20width%3D%22425%22%20height%3D%22344%22%20allow%3D%22autoplay%22%3E%3Cparam%20name%3D%22movie%22%20value%3D%22https%3A%2F%2Fwww.youtube.com%2Fv%2FlnsZLhI4zb4%26amp%3Bhl%3Den%26amp%3Bfs%3D1%3Fautoplay%3D1%26mute%3D1%22%20%2F%3E%3Cparam%20name%3D%22allowFullScreen%22%20value%3D%22true%22%20%2F%3E%3Cparam%20name%3D%22allowscriptaccess%22%20value%3D%22always%22%20%2F%3E%3Cembed%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fv%2FlnsZLhI4zb4%26amp%3Bhl%3Den%26amp%3Bfs%3D1%3Fautoplay%3D1%26mute%3D1%22%20type%3D%22application%2Fx-shockwave-flash%22%20allowscriptaccess%3D%22always%22%20allowfullscreen%3D%22true%22%20width%3D%22425%22%20height%3D%22344%22%20allow%3D%22autoplay%22%3E%3C%2Fembed%3E%3C%2Fobject%3E Privacy info. This embed will serve content from youtube.com This is what it's come to. Teenagers singing "Winter Wonderland" being censored off YouTube.
Fair use has always been at risk on YouTube, thanks to abusive DMCA takedown notices sent by copyright owners (sometimes...
In a victory for small-time music copiers over the entertainment industry, a federal judge ruled Wednesday that copyright holders can't order one of their songs removed from the Web without first checking to see if the excerpt was so small and innocuous that it was legal...
A 1998 federal law...
In the nation's first such ruling, a federal judge on Wednesday said copyright owners must consider "fair use" of their works before sending takedown notices to online video-sharing sites...
Corynne McSherry, an EFF attorney, said the digital rights group intends on convincing the judge that Universal acted in bad faith...
Yesterday, we wrote about the McCain-Palin campaign's letter to YouTube, highlighting how DMCA takedown notices can make online speech disappear from the Internet, even when the claims of infringement plainly lack any merit.
Today, we bring you YouTube's response. YouTube's response points out, much like we did yesterday, that...
Yesterday, the McCain-Palin campaign sent a letter to YouTube describing the troubles it has been having with bogus DMCA takedowns targeting its videos:
[O]verreaching copyright claims have resulted in the removal of non-infringing campaign videos from YouTube, thus silencing political speech. Numerous times during...
Everybody agrees. Stephanie Lenz’ video of her young son with Prince’s “Let’s Go Crazy” playing in the background was a fair use of a copyrighted work. But Universal submitted a DMCA takedown notice on the video and YouTube took it down for a month until Lenz was able to get... | 53,519,536 |
package com.ricky.nfc;
import android.content.Intent;
import android.nfc.NfcAdapter;
import android.os.Bundle;
import android.view.View;
import android.widget.AdapterView;
import android.widget.ArrayAdapter;
import android.widget.ListView;
import android.widget.TextView;
import com.ricky.nfc.activity.ReadMUActivity;
import com.ricky.nfc.activity.ReadTextActivity;
import com.ricky.nfc.activity.ReadUriActivity;
import com.ricky.nfc.activity.RunAppActivity;
import com.ricky.nfc.activity.RunUrlActivity;
import com.ricky.nfc.activity.WriteMUActivity;
import com.ricky.nfc.activity.WriteTextActivity;
import com.ricky.nfc.activity.WriteUriActivity;
import com.ricky.nfc.base.BaseNfcActivity;
public class MainActivity extends BaseNfcActivity {
private TextView ifo_NFC;
private static final String[] strs = new String[]{
"自动打开短信界面",
"自动打开百度页面",
"读NFC标签中的文本数据",
"写NFC标签中的文本数据",
"读NFC标签中的Uri数据",
"写NFC标签中的Uri数据",
"读NFC标签非NDEF格式的数据",
"写NFC标签非NDEF格式的数据"
};
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);
ifo_NFC = (TextView) findViewById(R.id.ifo_NFC);
// NFC适配器,所有的关于NFC的操作从该适配器进行
mNfcAdapter = NfcAdapter.getDefaultAdapter(this);
if (!ifNFCUse()) {
return;
}
ListView listView = (ListView) findViewById(R.id.listview);
listView.setAdapter(new ArrayAdapter<String>(this, android.R.layout.simple_list_item_1, strs));
listView.setOnItemClickListener(new AdapterView.OnItemClickListener() {
@Override
public void onItemClick(AdapterView<?> parent, View view, int position, long id) {
switchActivity(position);
}
});
}
private void switchActivity(int position) {
switch (position) {
case 0: //自动打开短信界面
startActivity(new Intent(this, RunAppActivity.class));
break;
case 1: //自动打开百度页面
startActivity(new Intent(this, RunUrlActivity.class));
break;
case 2: //读NFC标签中的文本数据
startActivity(new Intent(this, ReadTextActivity.class));
break;
case 3: //写NFC标签中的文本数据
startActivity(new Intent(this, WriteTextActivity.class));
break;
case 4: //读NFC标签中的Uri数据
startActivity(new Intent(this, ReadUriActivity.class));
break;
case 5: //写NFC标签中的Uri数据
startActivity(new Intent(this, WriteUriActivity.class));
break;
case 6: //读NFC标签非NDEF格式的数据
startActivity(new Intent(this, ReadMUActivity.class));
break;
case 7: //写NFC标签非NDEF格式的数据
startActivity(new Intent(this, WriteMUActivity.class));
break;
default:
break;
}
}
/**
* 检测工作,判断设备的NFC支持情况
*
* @return
*/
protected Boolean ifNFCUse() {
if (mNfcAdapter == null) {
ifo_NFC.setText("设备不支持NFC!");
return false;
}
if (mNfcAdapter != null && !mNfcAdapter.isEnabled()) {
ifo_NFC.setText("请在系统设置中先启用NFC功能!");
return false;
}
return true;
}
}
| 53,519,571 |
Q:
Jstree: override function for paste
I use copy and paste in my Jstree instance but the default paste clears the copied nodes while I want to keep these in the buffer.
If I modify te source code no problem but I'd rather not do that.
paste : function (obj, pos) {
obj = this.get_node(obj);
if(!obj || !ccp_mode || !ccp_mode.match(/^(copy_node|move_node)$/) || !ccp_node) { return false; }
if(this[ccp_mode](ccp_node, obj, pos, false, false, false, ccp_inst)) {
/**
* triggered when paste is invoked
* @event
* @name paste.jstree
* @param {String} parent the ID of the receiving node
* @param {Array} node the nodes in the buffer
* @param {String} mode the performed operation - "copy_node" or "move_node"
*/
this.trigger('paste', { "parent" : obj.id, "node" : ccp_node, "mode" : ccp_mode });
}
// what I changed by commenting out, need the buffer later
// ccp_node = false;
// ccp_mode = false;
// ccp_inst = false;
},
How can I override this function without modifying the source code ?
Here is a jsfiddle to demonstrate what I tried.
A:
Found it myself. Updated the fiddle.
I'll leave the question unanswered for the moment in case someone has a better solution.
Here is the code
$.jstree.core.prototype.paste = function (obj, pos) {
// need buffer otherwise ccp vars not known
var buffer = this.get_buffer();
ccp_mode = buffer.mode;
ccp_node = buffer.node;
ccp_inst = $('#jstree').jstree(true)
obj = this.get_node(obj);
if(!obj || !ccp_mode || !ccp_mode.match(/^(copy_node|move_node)$/) || !ccp_node) { return false; }
if(this[ccp_mode](ccp_node, obj, pos, false, false, false, ccp_inst)) {
this.trigger('paste', { "parent" : obj.id, "node" : ccp_node, "mode" : ccp_mode });
}
}
| 53,519,650 |
Update 2019-03-13
This is now part of a series of blog posts about scc Sloc Cloc and Code which has now been optimised to be the fastest code counter for almost every workload. Read more about it at the following links.
Two things prompted me to start looking at my code counter scc again. The first being the release of Go 1.11. New releases of compilers, libraries and tool-chains have a wonderful habit of making things go faster without you having to do anything other than recompile. In addition they often provide new methods which assist with this and are worth exploring.
The other was that the author of tokei released a new update v8.0.0 and included a comparison to scc on the project page https://github.com/Aaronepower/tokei/blob/master/COMPARISON.md
I had been tracking the improvements in tokei , loc and polyglot over the last few weeks. However what really surprised me was the accuracy issues pointed out, particularly the fact that scc version 1.7.0 was misreporting the number of lines.
Denial: Step one of software debugging.
I tried testing it out on the example provided by tokei in the comparison page https://github.com/Aaronepower/tokei/blob/master/COMPARISON.md
------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks Complexity ------------------------------------------------------------------------------- Rust 1 33 28 1 4 5 ------------------------------------------------------------------------------- Total 1 33 28 1 4 5 -------------------------------------------------------------------------------
Wow. It really does misreport the number of lines. There should be 39 there.
This disturbed me quite a lot. In fact I had even written tests in scc to ensure I got the number of lines correct. For example this one,
content := "" for i := 0 ; i < 5000 ; i ++ { content += "a
" fileJob . Lines = 0 fileJob . Content = []byte( content ) CountStats ( & fileJob ) if fileJob . Lines != int64( i + 1 ) { t . Errorf ( "Expected %d got %d" , i + 1 , fileJob . Lines ) } }
That should never happen.
Bargaining/Self-Blame: Stage two of software debugging.
Time to go code spelunking. Since I wrote scc and its a fairly small code-base I had a feeling it was an issue to do with the skip ahead logic. When scc finds a matching condition it keeps the offset around so it can jump ahead. The idea being we skip bytes we have looked at where possible if we know they matched a condition which changed the state. However if there was an error in this logic its possible it would jump over any newlines
which are used to determine to total count.
The offending code in mind was this one.
// If we checked ahead on bytes we are able to jump ahead and save some time reprocessing // the same values again index += offsetJump
Just commenting out this and I got scc to report the correct number of lines. Ouch. Turns out I made a boo-boo. That was rather stupid of me.
I Still issues with the rest of the stats but was happy with progress. I then turned my attention to the tokei test suite and the simpler examples it had to verify correct output. The author of tokei suggested just using the test suite from tokei https://www.reddit.com/r/rust/comments/99e4tq/reading_files_quickly_in_rust/ so it seemed like a good idea. Also how could I be so stupid as to introduce this bug from day one and not notice it?
Anger: Stage three of software debugging.
I turned my attention to this example from the tokei code-base written in Java.
/* 23 lines 16 code 4 comments 3 blanks */ /* * Simple test class */ public class Test { int j = 0 ; // Not counted public static void main ( String [] args ) { Foo f = new Foo (); f . bar (); } } class Foo { public void bar () { System . out . println ( "FooBar" ); //Not counted } }
Getting the stats from our now correct scc (for lines counts anyway).
------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks Complexity ------------------------------------------------------------------------------- Java 1 23 18 2 3 0 ------------------------------------------------------------------------------- Total 1 23 18 2 3 0 -------------------------------------------------------------------------------
Well thats not brilliant. The only thing scc got right was the number of files and the number of lines. Maybe if I tweak it a little bit I can resolve this issue and everything else will go away? In any case how in the heck could I never have noticed this. I knew that the edge cases are a bitch to deal with, but still…
Depression: Stage four of software debugging.
Looking into it the issues still appeared to be related to the end of line comments. When I first implemented scc I set a special state at the end of closing multi-line comments. This would allow it to fall back into the code state when it hit a newline. However the result of this is that I introduced a bug. When there was a multi-line comment the last line of the multi-line would be counted as code. I never caught it because when I checked all my projects I don’t use multi-line comments most of the time.
In reality what should I should have done (which seems obvious in hindsight) is never process whitespace characters, unless they are a
newline which resets the state and counts whatever state the application is is. When I realized this I was rather depressed that it took me so long to work this out.
Acceptance: Stage five of software debugging.
A quick change to resolve the above, never process whitespace characters and all of a sudden everything was working as it should.
------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks Complexity ------------------------------------------------------------------------------- Java 1 23 16 4 3 0 ------------------------------------------------------------------------------- Total 1 23 16 4 3 0 -------------------------------------------------------------------------------
In fact running over the tokei samples everything worked (with on exception covered later). So I had a look again at the torture test posted.
$ scc ------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks Complexity ------------------------------------------------------------------------------- Rust 1 38 29 5 4 5 ------------------------------------------------------------------------------- Total 1 38 29 5 4 5 -------------------------------------------------------------------------------
A much better result. However it still is not accurate, nor matching tokei which produces, (BTW I am not a fan of the new full width result tokei now produces and made it hard to get the below close to the above in terms of matching width).
$ tokei -------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks -------------------------------------------------------------------------------- Rust 1 38 32 2 4 -------------------------------------------------------------------------------- Total 1 38 32 2 4 --------------------------------------------------------------------------------
What’s the difference? One thing when looking at the source that caught my eye was the following,
let this_does_not = /* a /* nested */ comment " */
Nested comments? In fact I remember looking into this when I first wrote scc . I was wondering about nested multi-line comments which turned out to be a compile error in Java, hence while I toyed with getting it working figured that was not a brilliant idea and explicitly made it work without them.
So the reason for the difference is that tokei has some sort of stack for dealing with nested comments so it know when to finish with them. I didn’t even know was a thing.
Playing around with Rust and it turns out that it DOES support nested comments. My first thought was that this implementation is a bad idea. For example if you write the following /*/**/ that is going to break tokei as everything will be a comment. Trying it out happens to be a compiler error… so it is not a case worth worrying about. If however you did happen to half implement a nested comment you get the following (I added it to the first line),
------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks ------------------------------------------------------------------------------- Rust 1 38 0 34 4 ------------------------------------------------------------------------------- Total 1 38 0 34 4 -------------------------------------------------------------------------------
Clearly the above is wrong, but then again so is the code as it will not compile. I have no idea if other languages will allow the above state. Also if you are reading this and know why you would even want nested comments please let me know. I cannot think of a good reason to implement them other than its a neat trick to put into your language.
Side note, this is why it is a good idea to at least toy around with other languages. If gives you greater perspective. Before I started my Rust journey I would have insisted that no mainstream language supports nested multi-line comments. Always be learning.
Acceptance: Stage five of software debugging.
Well knowing what is wrong is the second step to fixing it, with the first being knowing something is wrong. Clearly I underestimated how devious language designers can be.
To fix this isn’t a huge issue. Just need to keep a stack of the multi-line comment opens, and check when in comments for another one. Sadly during this process I noticed that scc was missing quite a few edge cases. Thankfully the tokei stress test is pretty brutal and allowed me to identify them all and resolve them.
After much tweaking and fiddling with the logic.
$ tokei -------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks -------------------------------------------------------------------------------- Rust 1 38 32 2 4 -------------------------------------------------------------------------------- Total 1 38 32 2 4 -------------------------------------------------------------------------------- $ scc ------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks Complexity ------------------------------------------------------------------------------- Rust 1 38 32 2 4 5 ------------------------------------------------------------------------------- Total 1 38 32 2 4 5 -------------------------------------------------------------------------------
Excellent.
However what price has tokei paid for this logic. For example is it intelligent enough to know that Java does not support nested multi-line comments? Turns out it is. Also turns out that nested multi-line comments are more common across languages than I expected, Lisp, Rust, Lean, Jai, Idris, Scheme, Swift, Julia and Kotlin all support them. As such I added in the same checks to ensure that scc is as accurate as tokei , unless of course there are differences in the languages.json file that both use.
I tried then running across the full suite of tokei tests,
$ scc -c -co -s name tests ------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks ------------------------------------------------------------------------------- C++ 1 15 7 4 4 C++ Header 1 21 11 5 5 CMake 1 25 16 3 6 Cogent 1 7 2 2 3 Crystal 1 20 14 2 4 D 1 8 2 5 1 Dockerfile 1 16 6 3 7 Emacs Dev Env 1 16 6 7 3 Emacs Lisp 1 21 11 6 4 F# 1 13 4 5 4 F* 1 10 3 4 3 HTML 1 27 15 8 4 Java 1 23 16 4 3 MSBuild 1 12 10 1 1 Makefile 1 24 11 5 8 Meson 1 12 6 2 4 Module-Definition 1 17 9 6 2 Org 1 13 7 2 4 QML 1 20 11 5 4 Rakefile 1 10 4 2 4 Ruby 1 20 9 8 3 Rust 1 39 32 2 5 SRecode Template 1 37 23 2 12 Scheme 1 26 14 4 8 Scons 1 10 3 3 4 Ur/Web 2 17 9 5 3 Ur/Web Project 1 3 1 1 1 VHDL 1 30 20 4 6 Visual Basic 1 7 4 2 1 Xtend 1 23 13 4 6 ------------------------------------------------------------------------------- Total 31 542 299 116 127 -------------------------------------------------------------------------------
$ tokei tests -------------------------------------------------------------------------------- Language Files Lines Code Comments Blanks -------------------------------------------------------------------------------- CMake 1 25 16 3 6 Cogent 1 7 2 2 3 C++ 1 15 7 4 4 C++ Header 1 21 11 5 5 Crystal 1 20 14 2 4 D 1 8 5 1 2 Dockerfile 1 16 6 3 7 Emacs Lisp 1 21 11 6 4 Emacs Dev Env 1 16 6 7 3 F# 1 13 5 4 4 F* 1 10 3 4 3 HTML 1 27 15 8 4 Java 1 23 16 4 3 Makefile 1 24 11 5 8 Meson 1 12 6 2 4 Module-Definition 1 17 9 6 2 MSBuild 1 12 10 1 1 Org 1 13 7 2 4 QML 1 20 11 5 4 Rakefile 1 10 4 2 4 Ruby 1 20 9 8 3 Rust 1 39 32 2 5 SRecode Template 1 37 23 2 12 Scheme 1 26 14 4 8 Scons 1 10 3 3 4 Ur/Web 2 17 9 5 3 Ur/Web Project 1 3 1 1 1 VHDL 1 30 20 4 6 Visual Basic 1 7 4 2 1 Xtend 1 23 13 4 6 -------------------------------------------------------------------------------- Total 31 542 303 111 128 --------------------------------------------------------------------------------
The differences in the stats are down to how the language D works. I have a bug tracked for this https://github.com/boyter/scc/issues/27 to be resolved at some point in the future. Annoying but not worrying enough at this point to spend too much time on it.
With what appears to be most of the bugs ironed out time to look at performance again. With the changes that were made there are bound to be some wins, and with the new tools in Go I can hopefully spot some other issues. However that is a subject for another blog post. | 53,519,862 |
Sap hana training in noida
Multisoft Systems provide you SAP hana Training in noida let you learn about the SAP HANA features, Studio, Modeling, administration aspects, security essentials in order to get a complete mastery of this analytical data and transactional data processing tool. | 53,519,901 |
Q:
codesign wants me to sign my data files as well?
I have an OSX application, and in the bundle's MacOS directory, I have an executable and a bunch of dylibs. The executable is, of course, pointed to by the Info.plist's CFBundleExecutable entry. When I try to sign it, codesign complains (as of 10.9) that my dylibs aren't signed, which makes sense. So I sign all of the dylibs, which I would think would let me sign the main executable now.
The problem is that I actually have a couple of data files in my MacOS dir, as well. The application is a cross-platform Qt application and the data files are localizations files that are found with respect to the main executable. codesign complains that it doesn't want to sign my main executable until the data files are signed.
Is this just a fundamentally wrong thing to be doing - putting anything that isn't mach-o into MacOS? Is signing those data files even a reasonable thing to do - ie like a .cat file on Windows? Clearly I wouldn't want codesign haphazardly slapping a digest hash on to the end of my data files.
A:
Yes those data files should go into the Resources folder.
From the Bundle Programming Guide
MacOS (Required)
Contains the application’s standalone executable code. Typically, this directory contains only one binary file with
your application’s main entry point and statically linked code.
However, you may put other standalone executables (such as
command-line tools) in this directory as well.
Resources
Contains all of the application’s resource files. This contents of this directory are further organized to distinguish
between localized and nonlocalized resources. For more information
about the structure of this directory, see “The Resources Directory”
Codesigning the data files won't change them; they are simply recorded in the _CodeSignature/CodeResources file.
| 53,519,961 |
Advertising for William Wrigley Jr. Company: 'Shark'
Learn more about this example of Advertising
Industry of the client: Energy & Oil
Service provided: Advertising
Tags: Print, Commercials Archive, Chewing-Gum, Juicy Fruit Adverts
DDB Sydney, based at Leichhardt Municipality, Australia has been asked by William Wrigley Jr. Company to develop Shark for their brand Juicy FruitProduct: Juicy Fruit in 2010. This customer case is known in the marketing & communication market for Print, Commercials Archive, Chewing-Gum, Juicy Fruit Adverts. | 53,520,033 |
#!/usr/bin/env node
/**
* Copyright (c) 2015-present, Facebook, Inc.
*
* This source code is licensed under the MIT license found in the
* LICENSE file in the root directory of this source tree.
*/
'use strict';
const fs = require('fs');
const path = require('path');
const cp = require('child_process');
const cleanup = () => {
console.log('Cleaning up.');
// Reset changes made to package.json files.
cp.execSync(`git checkout -- packages/*/package.json`);
// Uncomment when snapshot testing is enabled by default:
// rm ./template/src/__snapshots__/App.test.js.snap
};
const handleExit = () => {
cleanup();
console.log('Exiting without error.');
process.exit();
};
const handleError = e => {
console.error('ERROR! An error was encountered while executing');
console.error(e);
cleanup();
console.log('Exiting with error.');
process.exit(1);
};
process.on('SIGINT', handleExit);
process.on('uncaughtException', handleError);
console.log();
console.log('-------------------------------------------------------');
console.log('Assuming you have already run `yarn` to update the deps.');
console.log('If not, remember to do this before testing!');
console.log('-------------------------------------------------------');
console.log();
// Temporarily overwrite package.json of all packages in monorepo
// to point to each other using absolute file:/ URLs.
const gitStatus = cp.execSync(`git status --porcelain`).toString();
if (gitStatus.trim() !== '') {
console.log('Please commit your changes before running this script!');
console.log('Exiting because `git status` is not empty:');
console.log();
console.log(gitStatus);
console.log();
process.exit(1);
}
const rootDir = path.join(__dirname, '..');
const packagesDir = path.join(rootDir, 'packages');
const packagePathsByName = {};
fs.readdirSync(packagesDir).forEach(name => {
const packageDir = path.join(packagesDir, name);
const packageJson = path.join(packageDir, 'package.json');
if (fs.existsSync(packageJson)) {
const json = JSON.parse(fs.readFileSync(packageJson, 'utf8'));
packagePathsByName[json.name] = packageDir;
}
});
Object.keys(packagePathsByName).forEach(name => {
const packageJson = path.join(packagePathsByName[name], 'package.json');
const json = JSON.parse(fs.readFileSync(packageJson, 'utf8'));
Object.keys(packagePathsByName).forEach(otherName => {
if (json.dependencies && json.dependencies[otherName]) {
json.dependencies[otherName] = 'file:' + packagePathsByName[otherName];
}
if (json.devDependencies && json.devDependencies[otherName]) {
json.devDependencies[otherName] = 'file:' + packagePathsByName[otherName];
}
if (json.peerDependencies && json.peerDependencies[otherName]) {
json.peerDependencies[otherName] =
'file:' + packagePathsByName[otherName];
}
if (json.optionalDependencies && json.optionalDependencies[otherName]) {
json.optionalDependencies[otherName] =
'file:' + packagePathsByName[otherName];
}
});
fs.writeFileSync(packageJson, JSON.stringify(json, null, 2), 'utf8');
console.log(
'Replaced local dependencies in packages/' + name + '/package.json'
);
});
console.log('Replaced all local dependencies for testing.');
console.log('Do not edit any package.json while this task is running.');
// Finally, pack react-scripts.
// Don't redirect stdio as we want to capture the output that will be returned
// from execSync(). In this case it will be the .tgz filename.
const scriptsFileName = cp
.execSync(`npm pack`, { cwd: path.join(packagesDir, 'react-scripts') })
.toString()
.trim();
const scriptsPath = path.join(packagesDir, 'react-scripts', scriptsFileName);
// Now that we have packed them, call the global CLI.
cp.execSync('yarn cache clean');
const args = process.argv.slice(2);
// Now run the CRA command
const craScriptPath = path.join(packagesDir, 'create-react-app', 'index.js');
cp.execSync(
`node ${craScriptPath} ${args.join(' ')} --scripts-version="${scriptsPath}"`,
{
cwd: rootDir,
stdio: 'inherit',
}
);
// Cleanup
handleExit();
| 53,520,107 |
[Internal carotid artery injury during endoscopic endonasal surgery: 3 cases report].
Three cases of internal carotid artery (ICA) injury during endoscopic endonasal surgery were analyzed, including 1 case of recurrent malignancy of sphenoid sinus, 1 case of intraorbital meningioma and 1 case of optic neuropathy. Salvage sphenoid sinus packing with gauze strip was managed in all the three cases. One patient operated a permanent closure of the carotid system intraoperatively and died after surgery. Among 2 survival cases, one patient accepted the endovascular embolization subsequently; the other patient was cured by intravaseular stent graft implantation without craniocerebral or ocular complicatitms. | 53,520,193 |
Latin America Unveils Defenses in 'Currency War'
Latin American policymakers are manning their defenses ahead of what could be a new battle in the "currency wars" as flows of hot money put unwelcome upward pressure on their currencies.
Economists and investors predict that an easing in the euro zone's debt crisis, new economic stimulus measures in Japan and a return of risk appetite will fuel bumper investment flows into Latin America and other emerging markets in 2013.
Colombia cut interest rates on Monday and said it would ramp up dollar purchases. Peru plans to pre-pay up to $1.5 billion in foreign debt this year and is intervening aggressively to curb currency gains. And tiny Costa Rica unveiled a steep hike in taxes on foreign investments this month.
Even Mexico, which has a hands-off approach to currency market intervention, is considering an interest rate cut that some economists believe reflects as much a desire for a weaker peso as it does concerns about growth.
"Much of the region is once again dealing with the impacts of currency wars and QE in the developed world," said Standard Chartered senior strategist Bret Rosen, referring to the extraordinary monetary easing measures undertaken by central banks known as quantitative easing.
Low interest rates in developed economies encourage investors to look for yield elsewhere, pushing up the currencies of countries at the receiving end of their attentions. Stronger currencies make exports less competitive, hurting economic growth.
It is a problem that has battered Brazilian manufacturers for several years. The government pushed back by slashing interest rates and intervening in the currency market to weaken the real, introducing capital controls and offering tax breaks for several industries.
But Brazil has less room for maneuver than other leading Latin American economies this year as policymakers are concerned about inflation, which rose above an annualized rate of 6 percent this month.
Latin American finance ministers complained last month about the impact of stimulus policies in developed economies, and Group of 20 economic policymakers are set to address the impact of monetary policy on currency valuations next month at a meeting in Russia.
Tools to combat appreciating currencies include buying dollars, as Colombia and Peru are doing; capital controls as in Costa Rica; and macroprudential measures, such as Peru's move to raise deposit requirements on dollar bank accounts.
Mark Mobius, who helps oversee $51 billion in emerging market assets at fund manager Franklin Templeton, expects a huge influx of funds into emerging markets this year as investors tire of low-yielding government bonds.
"I think it's going to be enormous, terrific, hundreds of billions. Investors have been penalized with so low rates that they are not making anywhere near what they need," he said.
Global stock markets are up 4 percent already this year, and fund tracker EPFR said it noted a clear preference for emerging market equities over bonds, which attracted most money in 2012. The VIX index, a gauge of investor stress, fell this month to its lowest levels since 2007.
The Institute of International Finance banking group predicts capital flows to Latin America will jump 5.6 percent this year from 2012 to a record $321 billion.
Inflows to the region in 2012, including foreign direct investment as well as stock and bond investment, were already estimated to be about 30 percent higher than the "hot money" period immediately before the global financial crisis in 2008.
WHAT'S HOT?
Brazil and Mexico, as the region's two biggest economies, are likely to attract the bulk of inflows in 2013, although Brazil has managed to deter a lot of speculative investors with capital controls introduced during 2010-2011, when a rush of capital pushed the real up 12 percent against the dollar.
Foreign portfolio inflows into Brazilian stocks and bonds totaled $16.5 billion last year, down from $67.8 billion in 2010.
In its January fund managers' survey, Bank of America Merrill Lynch said Brazil had the biggest share of "underweight" ratings in the history of the survey.
Mobius likes small to mid-cap companies in the region and firms exposed to the consumer sector, such as banks. Citigroup, which raised its stock ratings for Latin America to "overweight" as it cut back other emerging markets, likes industrials.
Mexico, for its part, is benefiting from optimism about tax and energy reforms being promised by its new government. That has helped propel stocks and bonds to record high levels.
Pacific Investment Management Co, the California-based firm known as Pimco that operates the world's largest bond fund, sees opportunities to make money if Mexico's central bank cuts interest rates later this year, pushing up the price of bonds.
Mexico's central bank has made a U-turn from warning of rate hikes to warning of rate cuts, prompting many to suspect it is worried about the peso. The peso hit a 10-month high the day central bankers met to discuss rates, and it only came off those highs when policymakers warned the following morning that they could cut rates. Lower rates would make the peso less attractive to foreign investors.
"It's no surprise that with the peso being weaker in the second half of (last) year that they were a little bit more hawkish, and now we have had a very nice run in the peso year-to-date perhaps they would be more dovish," said Michael Gomez, co-head of emerging markets at Pimco.
London-based Capital Economics sees Mexico's peso as the currency with the most upside this year, due mainly to the lower risk of intervention by laissez-faire policymakers, in contrast to the record $13.9 billion bought by Peru's central bank in 2012 as the sol hit a 16-year high.
Chile is likely to join Peru and Colombia in intervening to check gains in the peso while shunning capital controls, said Capital's Neal Shearing, while Brazil is in the unusual position of trying to strengthen its currency to fend off rising inflation. A stronger currency cuts the cost of imported goods.
"Inflation concerns are starting to creep back in Brazil, which now marks it out from Colombia, Chile and Peru who seem to be more worried about the strength of the currency and its impact on competitiveness," he said.
The central bank had intervened in the market in recent months to keep the real weaker than 2 per dollar, but this week rolled over currency swaps that mimic the sale of dollars in the futures market - a move with the opposite effect.
The real strengthened past the 2-per-dollar mark on Tuesday for the first time since July, and analysts said they believed policymakers would allow it to firm further if needed. | 53,520,207 |
RELAIS GIULIA – BOUTIQUE HOTEL in ROME
People who live in Rome say that Via Giulia is the way that most of all is the charm, history and atmosphere of the capital: Relais Giulia is waiting to give you a unique stay. Right in the center of Rome, behind Campo de Fiori and Piazza Navona, a few steps from St. Peter’s, in an ancient Roman building.
Here the classic lines of Roman Renaissance meet the modern design of materials and furnishings. A true luxury Boutique Hotel, where you can enjoy the best of relaxation and beauty of the heart Rome. Three floors decorated with bas-reliefs and stucco, and an internal courtyard with a gash on the sky, rooms and unique features.
A few minutes walk and you can reach the Senate with the Senate, the Palace of Justice and the Court of Cassation (noted as “Palazzaccio”), Castel Sant’Angelo and the Vatican City.
To top it all, the Relais Giulia are all the comforts and advantages of modernity, with professional and attentive staff that will make your stay unforgettable.
Events
ROME – Pope Giovanni Paolo II and Pope Giovanni XXIII proclaimed saints will be on April 27th . The news comes from the Vatican , where Pope Francis has announced the canonization of the two predecessors during a consistory of cardinals in progress Monday, September 30 . The handwriting – But Monday morning Bergoglio has also published a document entitled ‘ unsecured ‘ officially establishing the “council of cardinals ”…
Promotion
Arrange a short last minute holiday in Rome, choose Relais Giulia and save! Sleep tonight, Sunday June 7th, and tomorrow night, Monday June 8th, you will be entitled to a special discount for last minute booking with us: 1 night – Sunday: 20% discount on the price online 2 nights – Sunday and Monday: 25% discount on the price online Avoid the chaos of the weekend, visit the beauties of… | 53,520,396 |
LONDON (Reuters) - World biodiversity has declined by almost one third in the past 35 years due mainly to habitat loss and the wildlife trade, the World Wide Fund for Nature (WWF) said on Friday
It warned that climate change would add increasingly to the wildlife woes over the next three decades.
“Biodiversity underpins the health of the planet and has a direct impact on all our lives so it is alarming that despite of an increased awareness of environmental issues we continue to see a downtrend trend,” said WWF campaign head Colin Butfield.
“However, there are small signs for hope and if government grasps what is left of this rapidly closing window of opportunity, we can begin to reverse this trend.”
WWF’s Living Planet Index tracks some 4,000 species of birds, fish, mammals, reptiles and amphibians globally. It shows that between 1970 and 2007 land-based species fell by 25 percent, marine by 28 percent and freshwater by 29 percent.
Marine bird species have fallen 30 percent since the mid-1990s.
The report comes ahead of a meeting in Bonn next week of member states of the U.N. Convention on Biological Diversity to try to find out how to save the world’s flora and fauna under threat from human activities.
Some scientists see the loss of plants, animals and insects as the start of the sixth great species wipe out in the Earth’s history, the last being in the age of the dinosaurs which disappeared 130 million years ago.
Scientists point out that most of the world’s food and medicines come initially from nature, and note that dwindling species put human survival at risk.
“Reduced biodiversity means millions of people face a future where food supplies are more vulnerable to pests and disease and where water is in irregular or short supply,” said WWF director general James Leape.
“No one can escape the impact of biodiversity loss because reduced global diversity translates quite clearly into fewer new medicines, greater vulnerability to natural disasters and greater effects from global warming.
The head of Britain’s world-renowned Kew Gardens in an interview last month likened biodiversity -- the broad array of plants and animals spread across the planet -- to a planetary health monitor.
“First-aiders always check the ABC -- Airway, Breathing and Circulation -- of a patient to see if anything needs immediate attention,” Stephen Hopper said.
“Biodiversity is the ABC of life on the planet -- and it is showing it is in deep trouble,” he added.
Kew is doing its part through the Millennium Seed Bank project, which is well on the way to collecting and storing safely 10 percent of the world’s wild plants.
The next goal -- as yet a wish without any financial backing -- is to raise that total to 25 percent by 2020. | 53,520,484 |
Regulation of CD4 T cell activation and effector function by inducible costimulator (ICOS).
Inducible costimulator (ICOS), a member of the CD28 family of costimulatory molecules, is upregulated on the surface of T cells following T cell activation and upon binding to its ligand (ICOSL), initiates a cascade of events that can shape key aspects of the immune response. Although initial studies focused on determining the role of ICOS in Th1 versus T helper 2 (Th2) responses, new insights into its biology have revealed the contribution of ICOS to germinal center formation and isotype switching, as well as its relevance to the fate and function of effector and regulatory CD4(+) T cells in the response against self (i.e., tumors) and non-self (i.e., bacterial, worm, and viral infections). This multiplicity of roles positions ICOS at the center of attention for immunotherapy where manipulation of this pathway could lead to novel approaches in the treatment of human diseases. | 53,521,004 |
package unreal;
@:glueCppIncludes("UObject/ConstructorHelpers.h")
@:uextern extern class ConstructorHelpersInternal {
@:noTemplate
@:uname("FindOrLoadObject<UObject>")
public static function FindLoadObject<T : UObject>(PathName:PRef<FString>):T;
@:noTemplate
@:uname("FindOrLoadObject<UPackage>")
public static function FindLoadObjectPackage(PathName:PRef<FString>):UPackage;
public static function FindOrLoadClass(PathName:PRef<FString>, BaseClass:UClass):UClass;
}
| 53,521,063 |
Q:
Show that if the projection of a set is negligible, then the set is negligible as well
I'd like a hint in the right direction, im drawing a complete blank.
let $E \subset \mathbb R^2$. We'll define the projection of $E$ unto the $x$ axis as:
$P_x(E)=\{x| \exists y \in \mathbb R s.t (x,y) \in E\}$
Show that if $P_x(E)$ is a negligible set in $\mathbb R$, then $E$ is a negligible set in $\mathbb R^2$. Is the opposite direction true as well?
By negligible I mean that the jordan measure is zero. meaning for any $\epsilon >0$ I can cover the set with $\aleph_0$ many open intervals and the sum of the lengths of the intervals is less than $\epsilon$
Could anyone point me in the right direction?
A:
If $E$ is negligible, it is not necessarily the case that $P_x(E)$ is negligible. Consider the line $y = 1$, which is negligible in $\mathbb{R}^2$ but its projection to the $x$ axis is the entire real line.
On the other hand, if $P_x(E)$ is negligible, you can prove $E$ is negligible. I'll prove the following statement: If $E_0 \subset \mathbb{R}$ is negligible, then the 'extension' $E_0 \times \mathbb{R} \subset \mathbb{R}^2$ is also negligible. Since for any $E \subset \mathbb{R}^2$ we have $E \subset P_x(E) \times \mathbb{R}$, this will imply the original statement.
So: assume $E_0 \subset \mathbb{R}$ is negligible. Pick $\varepsilon > 0$. The trick goes like this: We can cover $\mathbb{R}$ using countably many open intervals $I_1, I_2, ...$ each having length $1$. For example, we can take $I_{2n + 1} = (-\frac{n}{2},-\frac{n}{2} + 1)$ and $I_{2n} = (\frac{n}{2},\frac{n}{2} + 1)$, but it doesn't really matter. Now, for each integer $n$, we can cover $E_0$ with intervals $J_{n,1}, J_{n,2}, ...$ whose total length is less than $\varepsilon 2^{-n}$. Now my claim is that the boxes $J_{n,k} \times I_n$ cover all of $E_0 \times \mathbb{R}$, and their total area is less than $\varepsilon$. The fact that they cover $E_0 \times \mathbb{R}$ is easy: If $(x,y) \in E_0 \times \mathbb{R}$ there is some $I_n$ containing $y$, and for that $n$ there is some $k$ such that $J_{n,k}$ contains $x$, so $(x,y) \in J_{n,k} \times I_n$. As for the total area:
$$\sum_{n = 1}^{\infty}\sum_{k = 1}^{\infty} A(J_{n,k} \times I_n) = \sum_{n = 1}^{\infty}\sum_{k = 1}^{\infty}L(J_{n,k}) < \sum_{n = 1}^{\infty}\varepsilon 2^{-n} = \varepsilon$$
| 53,521,088 |
Q:
Java client server secure communication
Possible Duplicate:
network communication encryption in java
I am designing a client server application. I want the whole session to be encrypted. I was thinking the following precudure to do that(using RSA for public-key encryption and AES-128 for symmetric encryption):
Client connects to server and send a 'hello' message.
Server responds with it's public key.
Client generates an 128-bit AES key, and sends it encrypted with the server's public key.
The rest of the application protocol is encrypted using the AES key.
Is this logic ok? Are there any flaws? Will it be okay or it's better to use SSL? Basically what i am concerned are replay attacks and mitm.
A:
What you are doing is describing the underlying idea of SSL, and as there are many tiny mistakes you can make implementing the scheme, you would be much better off using SSL.
Your scheme would be flawed as you describe it because you don't have any method of verifying the public key of the server. Anyone could have send it. Furthermore, how do you know that the encrypted AES key is actually generated by the client? Anybody may intercept the public key. This is why SSL (or now TLS) uses a truststore and Diffie-Hellman as well, among other tricks.
You can use a self signed certificate which you can trust in some out-of-band procedure (such as distributing with the client app) if you don't want to buy one.
| 53,521,122 |
Sea eagles reintroduced to England for first time since 1780 Published duration 22 August 2019
image copyright Robin Crossley image caption The birds were checked over by the team and fitted with small satellite trackers prior to being released
White-tailed eagles have been reintroduced on the Isle of Wight, 240 years after they were last recorded in England.
Also known as sea eagles, they are the UK's largest bird of prey, with a wingspan of up to 8ft (2.5m).
Three pairs of the birds were released in a secret location on the island on Wednesday and Thursday.
The five-year-project will see at least six birds released annually but they are not expected to breed until 2024.
White-tailed eagles were once widespread across the UK, but were wiped out about a century ago.
A similar scheme in Scotland has proved a success and there are now more than 130 breeding pairs.
image copyright Forestry England image caption The young birds were collected from Scotland and brought to the Isle of Wight
The last known breeding pair in England were recorded at Culver Cliff on the Isle of Wight in 1780.
The six released birds were collected from the wild in Scotland and brought to the Isle of Wight, where they have been kept in a pen to familiarise themselves to their new surroundings.
Natural England granted a licence in April to the Roy Dennis Wildlife Foundation for the reintroduction programme.
While they become established, the birds will be closely monitored using satellite tracking devices and viewing areas may be set up to allow visitors to observe the birds.
image copyright Mike Crutch image caption White-tailed eagles feed mainly on fish and water birds
The Isle of Wight was chosen for its variety of potential nesting sites in woods and cliffs, from where it is hoped the birds will disperse along the south coast.
Conservationist Roy Dennis said: "Establishing a population in the south of England will link and support emerging populations in the Netherlands, France and Ireland, with the aim of restoring the species to the southern half of Europe."
Natural England said there was "no evidence" of eagles preying on lambs where they live alongside lowland sheep farms in Europe. | 53,521,275 |
Background {#Sec1}
==========
Following the creation of the National Assembly for Wales in 1998, the devolved Welsh Government (WG) has instituted a string of innovation initiatives in an attempt to invigorate the Welsh knowledge-based economy \[[@CR1]\]. Nevertheless, despite receiving €3.9 billion from European Structural Funds since 2000, the Welsh economy has not improved its relative regional disparities in income, wealth and opportunities when compared to the United Kingdom as a whole and the European Union \[[@CR2]\].
Many strategies exist for carrying out knowledge exchange within the life science (LS) sector, yet there is a lack of real-world application and evaluation of these interventions in the context of academic engagement and commercialisation \[[@CR3]\]. Interventions aiming to improve innovation "*have met with varying levels of success, and, interestingly, the most prominent approaches have been, on the whole, less successful in Wales*" \[[@CR4]\]. Successes in knowledge exchange activities include developing a shared perspective, a plan for collaboration, and a range of competencies \[[@CR5]\].
In March 2012, the WG launched 'Science for Wales' \[[@CR6]\], which set out a vision for where Wales should be heading towards in the future. Three 'Grand Challenge' priority areas where Wales has a track record for excellence were identified -- 'Life Sciences and Health' being one of these. It has been demonstrated that the LS sector can drive economic growth through 'multiplier effects' while also generating outputs which benefit society and human health \[[@CR7]\]. One of the key features of the LS sector is that the collaboration between actors within academia, industry, government and the National Health Service (NHS) is particularly vital in the transfer of research benefits to the public \[[@CR8]\], which highlights the importance of having a coherent framework, strategy and policy which enables a thriving and sustainable LS sector.
In September 2012, Swansea University Medical School, in partnership with Cardiff University School of Medicine and MediWales (a membership organisation representing the LS industries of Wales), was tasked by the WG to lead a knowledge exchange project (KEP) for the Welsh Life Sciences and Health Grand Challenge priority area called The Life Science Exchange® (or LSX). The aim of the KEP was to increase interaction, develop more effective knowledge exchange mechanisms, and stimulate the formation and maintenance of long-term collaborative relationships between industry and academia.
The LSX was created as a process, not an organisation. The vision was to create a mechanism which could continuously network all the stakeholders in Wales' complex LS ecosystem, in a way that allowed all to be involved. The objective was to allow participants to interact with other stakeholder communities (clinical, academic, business, governmental), exchanging perspectives, and then to support them by thinking about how Wales could improve its performance. To provide focus, the work was streamed into groups representing six of Wales' specialist areas (Diagnostics, eHealth, Medical Technology, Neuroscience, Pharmaceuticals, and Regenerative Medicine), which were selected to encompass the 12 LS areas prioritised in 'Science for Wales' policy.
The LSX project was designed with a goal of having real world impact by supporting knowledge exchange, policy development and collaborative projects. The aims of this article are to articulate the methodologies used by the LSX project, provide case studies of collaborative projects identified and facilitated, and suggest how these methodologies could be applied to other sectoral or regional innovation systems.
Methods {#Sec2}
=======
Project overview {#Sec3}
----------------
In line with best practice for knowledge management projects \[[@CR9]\], the LSX was overseen by a 17-member executive level steering group, comprising senior representatives of all stakeholder groups within the LS sector, including academia, business, NHS Wales, WG and third sector. The steering group convened quarterly over the 18-month project to review progress made at the focus groups and sandpit events. This group set the strategy for the project, agreeing the areas in which detailed research should be undertaken and the approach to be taken by the project team. The work of the focus groups and overall project management of the LSX was undertaken by a small project team led by Professor David Ford (see Fig. [1](#Fig1){ref-type="fig"} for governance structure).Fig. 1Overview of the Life Science Exchange Funding, Governance and Operations
The LSX team comprised four staff members who provided overall project administration. Beyond planning, organising and documenting the focus groups and sandpit events, the team provided bespoke support to LSX members, including answering general inquiries regarding the Welsh LS sector, making introductions, identifying potential funding streams for collaborative projects, assisting with grant applications and mapping of the sector.
Given the aims, participant profiles and number of participants as well as the relatively informal manner in which discussions were held in these sessions, they were not 'focus groups' as understood in qualitative research. However, using the term 'focus groups' during and after the project allowed both participants and non-participants to quickly understand the activities that were being undertaken. After the end of the LSX project, some of these groups continued to meet and were more properly referred to as 'special interest groups'.
Focus group recruitment {#Sec4}
-----------------------
For each of the six specialist areas, a focus group was established which aimed to include participants from academia, industry, the WG, industrial networks and NHS Wales. The project was funded with £181,553, of which a majority (£139,424) was used to support the staff organising the network communications and events over the 18-month project. Once the staff were recruited, they organised the branding, communications and organisation of the first focus groups to be held. The project team adopted an open and inclusive recruitment process for the groups. The LSX was widely publicised across the sector through established networks (e.g. the National Institute of Social and Health Research (NISCHR WG, now Health and Care Research Wales), MediWales, NHS Health Boards), as well as by using phone calls, e-mails, face-to-face meetings, social media (e.g. LinkedIn and Twitter), leaflets and other networking events. Additionally, the project team engaged in sector research early into the project to target individuals and organisations. The aim of this was to give all the major sector stakeholders a fair chance to feed into the process and to create groups that covered the interests of their specialist area as broadly as possible.
Focus group meetings {#Sec5}
--------------------
Each partner institution chaired two focus groups on a quarterly basis. The purpose of the focus groups was to act as the primary information gathering mechanism for the project -- primarily for developing policy recommendations, performing a knowledge mapping exercise and to promote collaborative working across the sector. Members of the group were invited to regular, facilitated discussions which captured stakeholder perspectives on the strengths, weaknesses and opportunities for growth across the LS sector. As well as taking this broad approach, specific focus groups also identified areas that were unique to their field of interest.
Focus group attendance ranged from 10 to 40 stakeholders, depending on the subsector, time of year, availability of the individuals, and geographic location of the meeting. The focus groups were audio-recorded and transcribed, which provided a meticulous and robust capturing method whilst allowing the project team to focus on the discussions \[[@CR10]\]. Similar to other policymaking dialogue initiatives \[[@CR11]\], Chatham House Rules \[[@CR12]\] were adopted in order to create an environment where participants could speak freely. To ensure that the LSX was as inclusive as possible, the project team also engaged with some organisations and individuals on a one-to-one basis. This option was offered to those who wanted to participate in the process but did not necessarily have the time or were geographically too far away to engage through the focus group programme. In most cases, the project team met these stakeholders in person and discussed their perceptions of the LS sector. In other cases, these discussions were held over the phone or via email communication. The results of these individual consultations were included into the data which informed the final report writing and knowledge mapping.
As the groups developed, the members were encouraged to consider which interventions might be put in place to counteract sector weaknesses and capitalise on existing strengths. An outcome of each focus group session was a detailed record of the main conclusions that had been agreed upon. These were used to inform the final summary and subsector reports which were produced and circulated to WG's Departments of Economy, Science and Transport and of Health and Social Services to consider for action.
For example, towards the end of the project, the Regenerative Medicine focus group had the objective to critically consider a strength, weakness, opportunity and threat (SWOT) analysis of the regenerative medicine landscape within Wales in order to produce a final recommendation for future development of this sector across the academic, clinical and commercial Welsh research landscape. A one-day focus group was organized in Cardiff, bringing together representatives from across the academic, clinical and commercial regenerative medicine settings. To position thinking in a wider United Kingdom context, initial presentations from Innovate UK (formerly the Technology Strategy Board) and Cell Therapy Catapult were received. This was followed by a comprehensive update of the findings from previous LSX Regenerative Medicine focus groups to that point in the form of a SWOT analysis. Break out groups then considered, in detail, shortfalls, problems and solutions to stimulate the regenerative medicine sector in Wales. Feedback was collected and outputs produced for feedback to the LW KEP management board.
Knowledge mapping {#Sec6}
-----------------
The project team and stakeholders instigated a knowledge mapping exercise of their respective specialty areas similar to the process described by Ebener et al. \[[@CR13]\]. The project team engaged with higher education institutions, NHS contacts, industry contacts and the WG to identify existing network maps and information sources across the sector. These were then cross referenced and validated to ensure they were current additions to the knowledge mapping and not either obsolete or a previous incarnation of another current body. This served to inform businesses, academics and other stakeholders of the institutional, community and policy level networks.
Knowledge mapping was performed to provide a comprehensive visual map and database of expertise and facilities across academia, NHS and industry relevant to each sub-sector within Wales. The mapping was undertaken using a five-step process:Scoping: The knowledge mapping exercise began by identifying potential data sources. The project partners provided the LSX project team access to a range of existing networks and also knowledge bases of the sector. These included academic centres and NHS research and development centres, as well as Welsh government and industrial contacts. The project team then cross referenced these sources.Data collection: Information was gathered from the data sources identified during scoping.Validation: Verification checks were made by team members to ensure the information supplied was accurate.Collation: The mapping was collated by both the LSX project team and MediWales and presented in both visual and database formats suitable for searching by keyword.Gap analysis and review: The mapping was reviewed by all the focus groups and also peer examined by other academic, NHS, industrial networks and WG Expertise Wales. Any gaps identified were addressed to ensure the final mapping was reflective of the sector.
The databases contained the names, affiliated institution, contact information, web-link and a short description of the individual/group expertise which could be probed by keyword. Academic researcher and medical team data was gathered from institute websites and email contact with departmental leaders. Industry data was compiled from MediWales' Picture of Health \[[@CR14]\], online research and provided by focus group members. General LS mapping provided data on WG and NISCHR initiatives and teams within the sector, societies operating within Wales and identified awards of excellence held by Welsh researchers.
Sandpit events {#Sec7}
--------------
The LSX engaged in a series of half-day sandpit events which came about in response to opportunities raised through the focus groups. Sandpits were originally designed by the United Kingdom Research Councils as a residential interactive workshop over 5 days involving 20--30 participants with a multidisciplinary mix of participants to drive lateral thinking and radical approaches to address research challenges \[[@CR15]\]. The project team assessed the range of opportunities that had been discussed at different stages of the project. Opportunities which were most likely to interest a broad range of stakeholders were considered as the focus for these half-day sandpit events, which brought together a wider audience from within the LS sector to feedback on the findings of the focus groups and to input additional information and ideas. The main objective of these events was to explore the possibilities for collaboration within the event-specific opportunity area, as well as provide the opportunity to have a more in-depth discussion about key topics identified through the focus groups.
One example of the sandpit approach was focused on the objective of 'developing approaches to address unmet needs in the area of managing chronic illness in ageing' within the Medical Technology group. This event was a collaborative opportunity for leading academics, medical practitioners, service managers and industry representatives in Wales to consider which chronic diseases were not met within the NHS, where expertise may exist in Wales and whether participants in the sandpit were collaboratively equipped to enable a technology to manage a met condition better or address an unmet disease. The purpose of the first part of the sandpit was to familiarise the group with the participants on the day, their interests and background, and to define a list of 10--12 illnesses that cannot be cured but can be managed. The sandpit participants, in multidisciplinary groups, then examined this list to consider the expertise, experience and interests of the group to explore the opportunities to create collaborative proposal(s) for future work. The final part of the sandpit was looking at scoping initial collaborative ideas to address the objective of the event and presenting them. The 40 participants were drawn from across academia, industry and the NHS in Wales and worked together in small multi-disciplinary teams to maximise shared experience and knowledge with the aim of generating creative solutions to known issues through partnership working. By the end of the day the participants explored their interests in collaborating with a number of different groups/individuals with the outcome of championing a single idea in a multi-disciplinary group for onward funding proposal preparation and work. This sandpit led to the preparation of funding proposals as an output.
Bespoke support results {#Sec8}
-----------------------
The LSX project was able to support the Welsh LS sector by a range of mechanisms. These activities resulted in a variety of outcomes for the sector, including detailed policy recommendation reports delivered to the WG, a codified mapping exercise of the LS sector in Wales, and a range of collaborative projects.
Policy recommendations {#Sec9}
----------------------
A global overview of the opportunities identified in the focus groups have been categorised into seven major themes -- each opportunity represented by a mark in Table [1](#Tab1){ref-type="table"}.Table 1Summary of opportunities provided by each focus group. Each opportunity identified in each focus group is represented by a single dot. For example, the Neuroscience focus group provided four separate recommendations relating to enhanced research capacityOpportunitiesDiagnosticseHealthMedical technologyNeurosciencePharmaceuticalsRegenerative medicineEstablishment of new special interest groups••••Mapping, sector knowledge and communication••••NHS procurement and technology adoption••••NHS engagement and clinical access••••••Growing a skilled and trained workforce••••Enhanced research capacity•••••••International conferences and marketing•••
There was a recognised need for the discussions instigated by the LSX to continue into the future. A number of organisations expressed the desire to maintain the momentum of their respective focus groups as special interest groups.
The need for an accessible, cost-effective, up-to-date source of sector-specific information relating to funding, regulation, international trade and market intelligence has been consistently expressed by the stakeholder focus groups. This represents a significant and ongoing opportunity to provide Welsh LS organisations with a valuable resource offered in addition to what is (and is not) available.
The vital role that the Welsh NHS plays in providing access to clinical expertise, facilities and, ultimately, as a customer was widely expressed. While the relationship between the NHS, academia and industry in Wales is considered to be a significant national strength, there was an expressed need to improve the evaluation and adoption of new Welsh innovations when they can demonstrate the opportunity for improved patient outcomes and cost savings. Furthermore, academics and industry expressed a strong desire for NHS Wales to increase its level of engagement and receive clinical access for research and development.
A key driver for future success is the ability to attract and retain highly skilled individuals. Whilst the higher education sector can focus on the development of training and, where feasible, accredited education in key skills, retention requires growing industrial small and medium enterprise clusters to provide sustainable employment opportunities across Wales. An all-Wales LS skills group consisting of key academics has organised discussions on delivering apprenticeships, continuous professional development and degree-level training in close collaboration with WG, NHS Wales and LS industry.
Stakeholders felt that significant strengths in Wales' LS research activity have been demonstrated across the entire Welsh LS sector. They recommended that, in order to build upon these strengths, further support through provision of facilities and resources was required to close specific gaps in research capacity.
The focus groups also made a strong case for ongoing support for international trade and promotion. Most LS sector products occupy global markets and numerous Welsh companies sell the majority of their products outside of Wales. To support this activity, focus groups requested continued or additional support to attend trade shows and conferences.
Knowledge mapping {#Sec10}
-----------------
A second outcome was a stakeholder-driven knowledge mapping exercise for each area of focus. Many examples of duplication of activity as well as underutilisation of resources were identified. In some instances, businesses were paying to utilise resources outside of Wales due to a lack of awareness of resources existing locally.
The outputs of the knowledge mapping exercises for each focus group were represented in various formats, including a database of key figures, lists of key organisations, process diagrams, organisational charts and maps. For example, the eHealth focus group produced a database outlining key individuals in WG, learned societies, industry, academic departments, and research facilities. This database included institution and/or department names, named individuals, websites and contact details which were publicly available. The eHealth group also created a set of PowerPoint slides containing organisational charts of academic, WG, NHS Wales and third sector organisations. Similarly, the Regenerative Medicine focus group produced a database containing academic, commercial and NHS Wales networks and facilities. As the group was research-focused, they also created an organisational chart of regenerative medicine research by technology type (stem cells, disease process and biomarkers, cell signalling, etc*.*).
Funding secured {#Sec11}
---------------
Although funded with only £181,553, the LSX project was able to secure over £1.66 million pounds of project funding for its participants through the sandpit events and bespoke support:£800,000: Innovate UK, Small Business Research Initiative (SBRI), Abertawe Bro Morgannwg University Health Board (ABMUHB)£772,208: WG, Health Technology and Telehealth Fund AliveCore, ABMUHB£50,000: Welsh Government Academic Expertise For Business Digital Health Conference£40,000: Betsi Cadwallder SBRI SymlConnect
Case studies {#Sec12}
------------
Beyond quantitative financial outputs, a range of case studies have been provided below in order to describe the types of outcomes the LSX was able to accomplish beyond the focus groups and knowledge mapping. Such outcomes included the piloting of new procurement mechanisms, securing grant funding for a commercial clinical trial, establishment of new special interest groups, and the formation of an all-Wales LS Skills Group, among others.
### New procurement mechanisms {#Sec13}
One of the projects the eHealth group identified was the 3-year SBRI, funded by Innovate UK, which aims to boost the research and development industry, increase commercialisation of new technologies and create jobs and wealth. A project to improve ABMUHB, in partnership with Swansea University, has received £800,000 funding towards their £950,000 project to support health services in Swansea, Bridgend and Neath Port Talbot through the better use of patient records and data.
The SBRI project came about following discussions in an eHealth focus group, which was led by a member who had prior experience of undertaking SBRIs outside of Wales. Also at that meeting was the manager from the eHealth Industries Centre in Swansea University, who subsequently identified the SBRI opportunity and engaged with ABMUHB. ABMUHB identified a challenge and were extremely receptive and supportive of the SBRI process. The eHealth group then discussed the opportunity and many attended the two events hosted by LSX with eHealth Industries Innovation Centre (ehi^2^) and WG.
Two local companies were tasked with using patient data to shape the future of patient care in the region. They were the strongest candidates to emerge from the feasibility phase of a 3-year SBRI launched in partnership with ABMUHB and Swansea University's Health Informatics group. Together, these companies have worked to help ABMUHB better understand the health needs of patients, and predict how these could change. This could support much more efficient use of resources, and ultimately help improve public health services; as well as the health and well-being of local communities.
### New commercial clinical trial {#Sec14}
One funding source identified in the eHealth focus group was the WG's £9.5 million Health Technology and Telehealth Fund. A United States-based company, AliveCor, manufacture heart monitors that can be used with most mobile technology. In January 2014, the WG introduced AliveCor to the LSX project team, who provided bespoke support to form a collaborative project between the company and eHealth focus group attendees. Staff at Swansea University's Joint Clinical Research Facility are now working with Morriston Hospital, the WG and AliveCor to trial the AliveCor system, which converts iPhone and Android compatible mobile devices into hand-held ECG machines that can be used to monitor a person's heart. This research is funded by WG's Health Technology and Telehealth Fund. It is proposed that the AliveCor system will be trialled in the clinic to identify patients with atrial fibrillation in the community to facilitate earlier diagnosis and treatment and reduce the incidence of major adverse cardiovascular events, notably stroke.
The LSX team continued to contribute to the project by assisting with the governance, project management, value creation and economic value sections of the bid, as well as obtaining formal confirmation of support from the ABMUHB Research and Development department. In April 2014, the £652,208 bid to the Health Technology and Telehealth Fund was approved, with AliveCor making an additional £120,000 inward investment into Wales.
### New commercial special interest groups {#Sec15}
MediWales was introduced to a range of pharmaceutical stakeholders at a LSX pharmaceutical focus group event in February 2014. Directly following these interactions, MediWales facilitated a LSX pharmaceutical sandpit event in June 2014. The event, hosted at the Norgine factory in Hengoed, was attended by 23 delegates from 13 companies, universities and healthcare providers, all of whom are involved in pharmaceutical research, drug development, formulation, manufacture, packaging, trials or distribution. As a result of the meeting the group identified an opportunity to work together to deliver and promote a full range of services to the pharmaceutical sector. Under the brand name Clinical Trials Services Wales, with ongoing support from MediWales, the new special interest group will continue to meet regularly. They are now developing a brand identity, mapping clinical trials services in Wales against the pharmaceutical route to market and developing marketing, promotional material and a programme of activity for the coming year.
The concept was driven by the idea that MediWales members involved in the delivery of clinical trials can meet international customer needs from 'molecule to market' and together represent a significant global force. Through collaboration, the interest group member organisations have identified the opportunity to (1) provide a faster more streamlined service to their customers, (2) to create new business opportunities, and (3) to deliver a complete clinical trials service and to support their customers' needs through a strong referral network. Following this launch, the Members will work together to deliver on a commitment to provide a more integrated streamlined service, saving customers time and money, and delivering the highest quality of service. The Group will work together to extend each organizations visibility on the world stage through promotion at international events, press coverage and online. Each individual organisation will act as a referral point to all of the members of the Group.
This 'sub-sector' approach is now being rolled out to create a medical technology and diagnostics special interest group led by MediWales.
### New all-Wales life sciences skills group {#Sec16}
Within a diagnostics focus group, skills for the sector were identified as an area where development was required. The LSX project team subsequently met with representatives from Cogent, the Sector Skills Council for Life Science, as well as WG's Department for Education and Skills and Department of Economy, Science and Transport. There was a level of involvement from the Sector Skills Council for Science, Engineering and Manufacturing Technologies, University of South Wales and the Regional Learning Partnership.
An all-Wales LS skills group organised discussions on delivering apprenticeships, continuing professional development and degree-level training in close collaboration with WG, NHS Wales and the LS industrial sector. The group, now chaired by a representative from Swansea University Medical School, has been recognised by the WG for its proposed work on the LS skills agenda and aims to represent the needs of the growing sector in this arena.
Discussion {#Sec17}
==========
The LSX project delivered extensive engagement with the Welsh LS sector in order to provide authentic insight into the strengths, challenges and opportunities for Wales. The significant contribution made by representatives from the Welsh LS academic, industrial and clinical organisations has culminated in the final reports of the LSX project.
Policy recommendations {#Sec18}
----------------------
Detailed conclusions have been made by each of the sector focus groups, with a number of common and unique themes across all of them. Based on the varying outputs of recommendations by each focus group, it is clear that each of the specialties has different needs. The stakeholders in the Neuroscience Group appeared to be more active in earlier stage research and development and recognised opportunities in enhancing Wales' neuroscience research capacity. Those that have more of an industrial base (e.g. eHealth, Diagnostics, Medical Devices and Pharmaceuticals) focused their attention on NHS engagement, procurement and technology adoption. All of the summarised opportunities found in Table [1](#Tab1){ref-type="table"} were discussed in each focus group; however, some were not identified as a recommendation to address for their respective specialty.
The detailed reports have been supplied to the WG's LS Sector Team to inform policy and strategy; however, it is unclear just how effective these recommendations will be until future policy is implemented. They were also made available to key stakeholders by the WG upon request. These recommendations provide the best opportunity for the sub-sector groups to progress their work as they provide the unified view of the current state of the Welsh LS sector and how it should be improved in their areas of speciality. In current discussions with stakeholders, these recommendations are being used to inform research and funding applications, especially in the establishment of new special interest groups, growing a skilled and trained workforce, and enhanced research capacity (i.e. equipment and facilities).
Knowledge mapping {#Sec19}
-----------------
The value of the exercise is difficult to quantify, though recipients of the mapping have utilised it to inform new academic- and industry-based knowledge sources of their own. It could be stated that the exercise provided a clearer sector picture of a diverse range of mapping and knowledge already in existence and therefore gave organisations who received it an up to date and accurate 'snapshot' of the LS sector in Wales for others to build on. In a fast moving sector this was as much as could be expected as the accuracy and completeness of any mapping exercise lessens as time passes.
The knowledge mapping exercises were supplied to the WG's LS Sector Team to inform policy and strategy. The maps were developed to cover four constituent areas, those being academia, industry, NHS and Government (including allied services such as MediWales). These maps were then focused further on the theme (e.g. medical technology, regenerative medicine or eHealth) to provide a snapshot of subsectors of LS in Wales. They were made available to NISCHR, LSX participants, LS Hub Wales and key stakeholders by the WG upon request. MediWales has since utilised the mapping to inform their 'Picture of Health' \[[@CR14]\] interactive map of the Welsh LS sector. NISCHR have utilised the mapping to inform their 2015 service structure review and it has also been utilised by the LS Hub. Academic use included Swansea and Cardiff Universities.
Limitations {#Sec20}
-----------
However successful, a major drawback of the LSX was the short 18-month time frame and limited budget to carry out its operations. The timeline and budget was solely based on the project obtaining funds from the end of the European Regional Development Fund structural funds programme running from 2007 to 2014. Following the end of the project, further actions were required to ensure its legacy was exploited. The subsector focus groups were able to codify their detailed reports and mapping exercises by the end of the project. However, without the project staff to organise the network after the report submissions, there was very little that could be done by the LSX support staff to ensure the policy recommendations were addressed by the WG. Furthermore, it was difficult to resource collaborative projects identified towards the end of the project, as there was a risk of leaving them without support. If LSE had been funded for a longer period of time or refunded after the initial period, the project could have had more impact on the LS sectoral policy in Wales. As a recommendation, sustainability and/or continuity planning should be performed at the beginning of projects such as the LSX in order to ensure that value in the personnel, networks and project(s) are not lost between funding rounds.
Adaptation of LSX {#Sec21}
-----------------
The LSX was focused on supporting the LS sector in Wales in a subsector approach. Notwithstanding this, the framework could be applied to a very wide range of other (sub)sectors and/or regions. Simply setting up a knowledge exchange mechanism similar to the LSX would not necessarily result in successful or similar outcomes -- each sector and region has its own particularities that would need to be considered. For example, although two other KEPs were funded by the WG concurrently to the LSX, they did not follow the same governance and methods. Instead of holding focus groups, the Materials and Advanced Engineering Knowledge Exchange Strategy KEP determine the sector's barriers and opportunities compared to 30 companies outside Wales. Through these methods, this KEP was able to secure two Knowledge Transfer Partnerships valued at £129,000, placed about £500,000 in collaborative grant applications and created a range of Masters-level studentships with industry. The Low Carbon Energy and Environment Network for Wales KEP used a mixture of workshops, surveys and research to report on the major barriers and opportunities for the low carbon energy and environment sector in Wales; yet it is unclear how successful their model was in producing collaborative projects.
The implementation of a successful knowledge exchange programme requires a number of factors to be in place. First and foremost, a relatively active sectoral innovation system is needed to ensure enough stakeholders can contribute to the process. Secondly, project leaders need to have relatively established networks in place to ensure effective and timely recruitment. Thirdly, dedicated staff and an event budget are needed to ensure the network is able to communicate, meet regularly and synthesise their knowledge. Finally, in order for meaningful and innovative collaborative projects to be supported beyond the conception stage, robust funding mechanisms are required (e.g. Innovate UK or the United Kingdom Research Councils).
Conclusions {#Sec22}
===========
The output of the LSX is a valuable body of intelligence that represents the collective expertise of a wide range of expert contributors. This work should serve to inform future policy and planning across the sector and will help to align support activities with the needs of companies, universities and healthcare providers. Specific, actionable recommendations have been provided in the detailed reports provided by the LSX to the WG. Ultimately, this work should be used to improve innovation, health and wealth in Wales, as well as influence the design and implementation of knowledge exchange mechanisms in other geographies and sectors.
There was a recognised need for the discussions instigated by the LSX to continue into the future. In some cases, specific challenges and opportunities need to be crystallised into detailed proposals with specific objectives, deliverables, budgets and time-scales. A number of organisations have expressed the desire to maintain the momentum of their respective focus groups as special interest groups operating under the LSX brand or unique branding (e.g. Clinical Trials Services Wales).
The LSX process succeeded in bringing together hundreds of stakeholders in a sub-sectoral approach to the Welsh National Innovation System. This has resulted in a multitude of collaborations, projects, inward investment opportunities, and special interest group formations, in addition to leveraging over ten times its funding for Wales. Processes such as the LSX can be considered exemplars of best practice for knowledge exchange for other sectoral systems of innovation. The LSX model is a simple and straightforward mechanism for any regional government to adapt and implement with the hopes of improving innovation, skills, networks and knowledge exchange.
ABMUHB
: Abertawe Bro Morgannwg University Health Board
KEP
: Knowledge exchange programme
LS
: Life science(s)
LSX
: Life Science Exchange
NHS
: National Health Service
NISCHR
: National Institute of Social and Health Research
SBRI
: Small business research initiative
WG
: Welsh Government
**Competing interests**
Gwyn Tudor receive fees from MediWales Limited for a CEO role, including involvement in the Life Science Exchange project.
**Authors' contributions**
BLP: Delivery of Pharmaceutical and eHealth Focus Groups, contribution to all final reports, involved in drafting manuscript, revising manuscript critically, overall project management, read and approved final manuscript, addressed reviewers comments. RG: Delivery of Pharmaceutical and eHealth Focus Groups, focus group data acquisition and analysis, organisation of mapping exercises, involved in drafting manuscript, revising manuscript critically, read and approved final manuscript, addressed reviewers comments. JW: Organisation of Neuroscience and Regenerative Medicine Focus Groups, focus group data acquisition and analysis, mapping of neuroscience and regenerative medicine, revising manuscript critically, read and approved final manuscript. JS: Initial setup and delivery of Life Science Exchange, delivery of Pharmaceutical and eHealth Focus Groups, involved in drafting manuscript, overall project management, read and approved final manuscript, addressed reviewers comments. JEK: Conception and design of the project, securing funding, revising manuscript critically, read and approved final manuscript. PS: Delivery of Regenerative Medicine Focus Group, contribution to mapping, revising manuscript critically, read and approved final manuscript, addressed reviewers comments. GT: Conception and design of the project, delivery of medical devices and diagnostics focus groups, contribution to mapping, contribution to all final reports, revising manuscript critically, read and approved final manuscript, addressed reviewers comments. JB: Conception and design of the project, delivery of Neuroscience Focus Group, oversight of Cardiff University input, contribution to mapping, revising manuscript critically, read and approved final manuscript, addressed reviewers comments. DVF: Conception and design of the project, securing funding, overall project oversight, revising manuscript critically, read and approved final manuscript.
The Life Science Exchange was funded through the Academic Expertise for Business (A4B) programme. A4B is a programme of support funded by the WG and European Structural Funds aimed at providing a simplified, integrated package of support for knowledge transfer from academia to business. The aim of the overall programme is to promote a high value-added economy and to maximise the economic impact of academia and business through knowledge transfer and the creation of a stronger science, engineering and technology base with clear commercial potential.
We would like to thank our fellow colleagues and partners of the Life Science Exchange for their continued support throughout the project, as well as the many stakeholders who took the time to attend our events and contribute to this process. We would also like to thank those involved in the project team at Cardiff University (Jodie Wren) and MediWales (Debbie Laubach, Julie Alcock, Lucinda Dargavel Scott-Morgan and Tess Coughlen-Allen).
| 53,521,301 |
10 minutes of footage of the upcoming Secret of Mana remake has surfaced from PAX West 2017.
Described as “a faithful remake of one of the greatest RPGs of all time,” Secret of Mana features 3D graphics, voice overs, and updated gameplay.
Secret of Mana is due out as a digital-only release for PlayStation 4, PS Vita, and PC worldwide on February 15, 2018. In Japan, the PlayStation 4 and PS Vita versions will also be released physically. | 53,521,311 |
Q:
getImage()/drawImage() makes Java-Applet stop working
I'm making a 2D Java Game using JApplet. For the Graphics I obviously use Graphics respectively Graphics2D. My Problem: I want to display an image in my paintComponent(Graphics g) method. The picture is located in the same directory as the HTML5-File (in which the Applet is implemented) and the class files. Without the following code snippet, the applet works fine (except there's no image, obviously). But as soon as I add it to the class, the Applet doesn't start (in the Browser!). It won't display anything, and I don't get an exception.
Code:
Graphics2D gg = (Graphics2D) g;
Image img = getImage(getDocumentBase(), "img.PNG");
gg.drawImage(img, 70, 50, this);
gg.finalize();
Please note that I have Java Version 8 Update 51 installed and that I have the URL of the HTML5-File on my whitelist in the Java Control Panel (So I won't get a security-error). I tried the applet in Firefox and IE.
A:
Never read in an image from within a painting method such as paint or paintComponent. Even if this were successful (it's not in your case), it will needlessly result in re-reading the image in multiple times and slowing down your program's perceived responsiveness -- the last thing that you want to do.
Instead read the image in once and store it in a variable.
Your problem has to be that you're not looking for the image in the right place -- with the right path. I recommend that you obtaine your Image as a resource from a URL or InputStream and use ImageIO.read(...) to read it in. You will need to find the correct path to the image, something hard for us to guess given your current question, but you will want to use a path relative to your class file locations.
This, gg.finalize();, is dangerous code and should not be there; get rid of this line.
| 53,521,365 |
Scroll down to see more content
From Aspen‘s Main Street to the Continental Divide at Independence Pass and from Phoenix out into the cacti-laden Sonoran Desert, we’ve thus far taken the 2018 Audi RS 5 Coupe on two adventures of startling beauty. There’s a reason we returned to the wheel—and return would again; the high performance vehicle is an object of impeccable design. And this design telegraphs the Audi coupe’s real value: it’s fast and it’s fun.
Inspired by the Audi quattro IMSA GTO race car, the RS 5 Coupe looks fast without commanding too much attention. Though understated, it certainly taps into the purity of sportscar design—with an athleticism to the body that swoops into muscles atop the signature single-frame grille. Other details—from the lip spoiler to the large air intake on the lower bumper (both of which generate substantial downforce)—only emphasize the car’s penchant for speed.
The 2018 is also an improvement on the previous generation, visible in the increased torque—drawn from a 2.9-liter biturbo V6 engine. Its 0-60 in 3.7 seconds sets a record in the class. Weight distribution also matters, here. Not only is the 2018 lighter, it’s far more balanced. This makes the driving experience tighter, smoother and more responsive.
The goal of the RS 5 is different than many other releases these days. It’s not about semi-autonomous driving or the introduction of a new powertrain. It’s an acknowledgment of the joy behind driving. Of course, you can customize the suspension, transmission and damping while on the road—but you can also enjoy driving easily, simply and slowly.
This slideshow requires JavaScript.
Not long after the RS 5 released, Audi announced the four-door 2019 Sportsback version, which is arguably more practical but not compromised in performance. And of course, there’s the RS 7—one of our favorite cars out there. But it’s very easy to love this coupe. As expected, the 12-inch virtual cockpit, infotainment system and advanced driver assistance tools add value. Design details—from the honeycomb quilting on the Nappa leather RS Sport bucket seats to the refined stitching on the perforated leather steering wheel and the carbon fiber accents everywhere—underscore Audi’s perfectionism.
The 2018 Audi RS 5 is available now, starting at $69,000.
Images by Josh Rubin | 53,521,625 |
Q:
Sum (sigma) notation disparity
this might be a stupid question but I've googled it and I can't find an answer that I "trust". I am dealing with PCA (I guess that's not relevant, but just in case it is) and I am seeing a lot of Sigma notation that I'm not used to. My whole life I've always seen the following:
$\sum_{i=1}^{10}$
But now I am seeing this:
$\sum_{i}$
Does it mean exactly the same, supposing it is known that n=10 ??
A:
When the range of the summation index is obvious/known from context,
$$\sum_i$$ has meaning. When the summation index itself is unambiguous, even
$$\sum$$ can do.
| 53,521,939 |
Feb. 18 (Bloomberg) -- Bolivia has nationalized a unit of
Spain’s Abertis Infraestructura SA that operates the country’s
three biggest airports, according to the government’s official
news agency.
The nationalization was carried out because Servicios de
Aeropuertos Bolivianos SA, or Sabsa, failed to invest in
improving the airports of Cochabamba, Santa Cruz and El Alto,
which serves the capital La Paz, the Bolivian Information Agency
ABI reported on its website today. Sabsa is also partly owned by
Madrid-based Aena Aeropuertos SA.
The 1997 privatization of Sabsa amounted to “robbery” and
“looting,” President Evo Morales said during a press
conference in Cochabamba, ABI reported. During that time Sabsa’s
profits have been “exorbitant” and its investments
“ridiculous”, Morales said.
Morales, an ally of Venezuelan President Hugo Chavez and a
former union leader, has moved to put the telecommunications,
energy and water industries under state control since taking
office in 2006. Bolivia will hold presidential elections in
December next year.
Shares in Barcelona-based Abertis today closed down 1.4
percent at 12.7 euros, after dropping as much as 2.6 percent
during trading today. The company said in an e-mailed statement
that it respects Bolivia’s decision and trusts it will receive
adequate compensation. The Bolivian government froze the airport
fees Sabsa collects over 10 years ago, the company said.
Miguel Angel Garcia, a spokesman for Aena, declined by
telephone to comment.
Third Seizure
The decree signed by Morales today marks the third
nationalization in less than a year of assets belonging to
Spanish companies operating in the Andean country. In 2006
Morales also seized oil and gas fields and refineries belonging
to Brazil’s state-run Petroleo Brasileiro SA.
“The Spanish government deeply regrets the Bolivian
government’s decision to nationalize Sabsa, and particularly the
police occupation of its headquarters,” Spain’s Foreign
Ministry said in an e-mailed statement. “Spain does not
consider this a friendly act.”
Morales in December ordered the seizure of four units
controlled by Spain’s biggest utility, Iberdrola, following the
takeover seven months earlier of Spain’s Red Electrica.
The ruling Movement Toward Socialism party, or MAS, wants
Morales to run for a third presidential term in elections next
year.
Bolivia’s economy is estimated to have grown by at least 5
percent in 2012 for the third straight year, according to the
International Monetary Fund. Gross domestic product will expand
by 5.5 percent this year, Finance Minister Luis Arce told local
press on Nov. 9. | 53,522,259 |
AT&T said earlier this week that it will add a new administrative fee to each of its wireless subscribers’ monthly bills. The fee is only $0.61, which doesn’t sound like much, and an AT&T spokesperson was quick to point out to several news sites that this new fee is lower than similar fees charged by rival carriers. Subscribers were still outraged. Now that the shouting has died down a bit, however, people are looking for a batter explanation for the new charge they’ll see each month. According to one industry watcher, that explanation couldn’t be simpler: “Because they can.”
“Why would AT&T do this? Because they can, and it is all in the pricing strategy,” Joe Hoffman, principal analyst at ABI Research wrote in a post on the company’s blog. “Now that AT&T is comfortable with their shiny new pricing tools and flexibility that comes with them, looks like someone in the Executive MBA program has discovered Price Elasticity of Demand.”
Hoffman explained that AT&T has almost nothing to lose by adding this new fee — $0.61 per month is unlikely to scare many people away — and everything to gain. As a matter of fact, in one fell swoop, AT&T just added between $500 million and $600 million in revenue to its bottom line.
“Why 61¢, why not $1 or $5 or $10? Because AT&T understands price elasticity of demand,” Hoffman wrote. “When AT&T raises the price by 61¢, they know hardly anyone is going to bail on them, and so can impose this with impunity. $1 or $5 or $10 is just too much to swallow all at once, but give them time. For now, $500 – $600 Million will flow right to the bottom line. Brilliant! No fancy software tools, no focus groups, no high priced engineers and programmers, and no iPhone subsidies. Just a raw, brute force price increase.”
The analyst noted that AT&T subscribers may see this fee increase by a small amount in six to nine months, again adding millions to AT&T’s revenue without scaring many customers away. | 53,522,288 |
Reunion 2010 Alumni College Courses
Please check back for updated course information.
Session B Courses
The Making and Meaning of WineBill Waller, Professor of Economics
The Finger Lakes is the home of the 2nd largest wine producing region in the US. It is also home to the largest winder producer in the world. The purpose of this course is to introduce you to the wine of the Finger Lakes. It will involve an introduction to winemaking and tasting. The focus will be on the particular strengths of the wine industry in this area to allow and encourage you to take full advantage of your visits to the Finger Lakes.
Two Cities: New York and TorontoJim Spates, Professor of Sociology and Pat McGuire, Professor of Economics
Using very different approaches to study two very different cities, New York and Toronto, in two very different countries, two very different cultures, we examine each city intensively. While we won't be able to visit each of these cities, as we and our students do during the semester, if you join us at our session we believe that we will be able to communicate why we and our students find these places so enticing, interesting and instructive.
All of us are at least a little unsure about what's coming next. We actually plan for it. (All of you insurance brokers out there know what I mean.) We weigh alternative actions based on our perception of risk: Has Toyota fixed the gas pedal? Is it OK to drive into Boston to see the Celtics in spite of the snow? Will the rain arrive or will I have to water the lawn again? We make decisions of that sort all the time. But, what about the citizens of Port au Prince in Haiti? or the residents of New Orleans? or people in central China or Indonesia? How do they live with the risk of earthquake, tsunami, or major storm, events outside the experience of most of us? Join me as we think about the hazards posed by the natural environment and how we deal with the uncertainties built into that environment.
Dance, Standing TallMichelle Ikle, Assistant Professor of Dance
This low-intensity movement workshop will provide participants with practical tools for looking and feeling your best everyday through postural awareness and re-education. Participants will learn simple lessons in lying, sitting, and standing that can help you look and feel more energetic and confident. Chronic back pain sufferers are welcome! Wear loose, comfortable clothing. This workshop will take place in the Winn-Seeley dance studio.
Siberia is big. Siberia is cold. Siberia is full of prisoners. Whether as a remote and forbidding place of exile, or a storehouse of untold natural resources, Siberia has long played a special role in our image of Russia. Join us to discuss these myths and modern-day Siberian realities from the perspective of the Russian Area Studies program's 2009 Modern Siberia seminar, in which 17 HWS students and three faculty members spent a month studying the culture and ecology of the Lake Baikal region.
In 2007, Paul Collier wrote The Bottom Billion: Why the Poorest Countries are Failing and What Can be Done About It. In his study, he identifies four poverty problem areas for less developed counties: 1) the conflict trap; 2) the natural resource trap; 3) the landlocked country with bad neighbors trap and 4) the bad governance in a small country trap. He explains each of these and how they have kept approximately one sixth of the world's population marginalized and left behind in the global economy. However, all is not lost as there are ways out of the traps. This class will explain the traps, and then examine Colliers' and other scholars' agendas to break the cycle of poverty for so many people in so many countries. | 53,522,485 |
A father and son construction team were killed instantly when a lightning bolt hit a metal pipe on a building site. A young couple on a date was also hit, with an 18 year-old man dying on the spot, while his girlfriend has been hospitalized in serious condition.
The rain lasted less than half an hour, but flooded more than a dozen streets.
Moscow had suffered a whole week of tropically hot weather with none of the evening storms typical for the season. Then, on Friday 13th the heavens opened at once, with lightning striking several times in quick succession.
The rain caused chaos on the most prestigious streets of the city. Car owners scampered to save their cars from the torrents that flowed down from the higher city hills. Several eyewitness videos show cars being carried helplessly by the torrent. Waiters from luxury cafes quickly cleared the tables on the terraces of luxury roadside cafes, and passers-by cowered underneath building marquees.
Meteorologists warn that further storms were possible throughout the weekend. | 53,522,721 |
Promote
Thursday, April 6, 2017
5 Tips for Buying Mid-Century Furniture Styles
The mid-century modern is a design style that's increasingly becoming popular. The style, which emphasizes on functionality and clean lines, gained popularity in the 50s and trended through to the early 70s. The style has had a rebirth in recent days and is catching on like a wildfire with lots of décor enthusiasts now looking for genuine furnishings from the mid-century. Shoppers interested in mid-century-styled furniture can use the following tips to understand the style's design, what to ask when talking to furniture sellers, and what to for in mid-century style furniture pieces to ensure that they purchase authentic mid-century modern design pieces.1. Find Out More About The Design When it comes to mid-century furniture, being knowledgeable can be of great help as you'll know what to look for when searching for mid-century modern furniture. Start by learning more about the origin of the design. The Mid-century modern style was basically a reaction to the more conventional interior styling of the early 20th century. The furniture designers back then intentionally avoided using plush textures and ornate shapes for more minimalistic designs and clean lines. Mid-century modern furniture/furnishings have a distinct look that's defined by low seating, flowing curves, crisp lines, and thin legs. Mid-century modern designers used new materials to create their furniture particularly plastics and wood composites developed for the military during the Second World War. One thing you will notice with mid-century furniture is that most of them are made using chrome, hard plastic, fiberglass, and plywood. Because of this, it is quite easy to copy and mass-produce mid-century furniture; something that presents a challenge for people looking for authentic, mid-century furniture pieces.2. Know the Names Of Top Mid-Century Modern Furniture DesignersThere are a couple of American designers who defined the mid-century modern design, including Charles and Ray Eames, Eero Saarinen, George Nelson, and brands like Knoll and Herman Miller. Both Knoll and Herman Miller are still in operation and are still creating mid-century-styled furniture. While true to the attention to detail and classic design aesthetics, the furniture they sell is not vintage or original. There are a couple of Danish designers like Hans Wegner and Arne Jacobsen who also contributed to the development of the style. These are the names that are generally related to most of the authentic vintage mid-century furniture available on the market today. While in the market, you may come across furniture pieces that have the designer listed with the brand, like the "Knoll Table by Saarinen." This is quite common as most designers worked for large organizations. However, furniture pieces listed with more than one designer like "Eames Nelson Wire Chair" are inaccurate and probably are not authentic. 3. Know Some of the Most Common Mid-Century Modern Design Furniture Styles The Mid-Century Modern design was so unique and innovative, that individual designs became well-known names. Some of these iconic furniture pieces are today's most sought-after and well-known styles. For instance, swan chairs and tulip are more common compared to Eames lounge chairs. Others include end tables, small dining tables, and sideboards; although these furniture pieces weren't originally named. 4. Research Specific Pieces Product descriptions for most authentic mid-century-styled furniture typically include the designer's name and the furniture type like the "Knoll tulip table." As a buyer, you should use this information to research specific pieces you want to know what to look for when in the market. If you look at the collection of mid-century furniture at Rove Concepts you will see each furniture piece has very specific design elements; nonetheless, there's one common thing with all mid-century modern furniture. Because of their emphasis on craftsmanship and clean lines, original, mid-century modern piece does not have any visible connective hardware like bolts and screws they are all well-hidden. 5. Ask the Right QuestionsSellers listing authentic, original mid-century furniture pieces should be both able and willing to answer any and all questions concerning the authenticity of a product. If the photos provided don't clearly show indicative design features, then ask for more. Also, ask the seller when and where he or she procured the item(s), what they are made of, and if there are any definitive marks (stickers or logos) on them. | 53,522,767 |
[Management of multiple traumas: possibilities and limitations in a general hospital].
The chances and the limits in the treatment of patients with multiple trauma are discussed on the example of the Marienkrankenhaus Trier-Ehrang. Definite conditions concerning to the rooms, the staff and the organisation must be realized. Most important is the cooperation between the anaesthesiologist and the surgeon. Short distances, short times and a well trained team are advantageous. If computed tomography and angiography are not available the diagnostical facilities are limited. Severe cranial trauma and spine fractures must be transferred to a special medical centre. | 53,523,001 |
Direct observation of surface-mediated thioacetyl deprotection: covalent tethering of a thiol-terminated porphyrin to the Ag(100) surface.
Covalent tethering of macromolecules such as porphyrins to metal surfaces underpins bottom-up fabrication of systems intended for a variety of applications. Thiol linkages are especially useful but often need protection during macromolecule synthesis. By means of scanning tunneling microscopy, we directly observe the spontaneous deprotection of an acetyl-protected thioporphyrin upon contact with a silver surface, without the intervention of any solution-mediated chemistry. | 53,523,029 |
Have you had any notification issues with SBFP videos?
Wähle eine oder mehrere Antworten:
No. They always appear on my Sub Box on youtube.
Always watch them on the website anyways
Some videos i was not aware they had come out
I always check the channel regardless of notifications
I rely on youtube notifications to check the videos, but i have missed a few. | 53,523,709 |
Enrollment begins Aug. 11
District enrollment day for the Basehor Unified School district begins at noon on Aug. 11.
The enrollment will be available until 8 p.m. that day at the Basehor-Linwood High School. On Aug. 12, enrollment will be available from noon - 8 p.m. at the student’s school.
Online enrollment is currently available for any returning student. All fees are due at the time of enrollment. Fees can be paid by cash, check or debit and credit cards. The collected fees are used to purchase textbooks and other educational materials. A fee schedule is available at the district’s website.
For more information on enrollment visit the district’s website at www.usd458.org. | 53,523,724 |
Why Do I Hurt? Workbook
Help your patients learn about their chronic pain with this interactive workbook designed to help them treat their condition.
This neuroscience pain workbook created by Adriaan Louw, PT, PhD, allows patients to not only better understand their pain and how it works in the body, but also track and record it through active participation.
Patients write in the workbook to monitor their pain experiences and learn how to treat their condition. The interactive exercises help them understand how pain works in the body, why they hurt and how they can lessen their pain.
The content is based on clinical scientific research and features memorable, easy-to-understand neuroscience concepts and illustrations adopted from Louw’s renowned patient handbook, Why Do I Hurt?
Patients love it!
I have used this booklet on a couple of my patients, and thus far, they are loving it. One patient remarked that the tasks at the end of each section really made her think about her pain experience. Another reported the drawings really hit home for her and actually brought her to tears, because finally, "someone gets it."
This booklet serves as a great guide in walking patients with persistent pain through a series of informative pearls that help them understand their pain and empower them to move beyond it. I have been asking patients to complete two sections on their own, and then bring it back each visit (1x/week) for us to discuss together, which is working well. It is helping me as a clinician to pace the education process, delving deeply into topics as needed for each individual patient.
I highly recommend this booklet to patients and therapists alike! It's a powerful tool that really helps patients take an active role in their own healing process, owning their pain and moving beyond (or in spite of) it. In addition, it is extremely reasonably priced!
I have used this booklet on a couple of my patients, and thus far, they are loving it. One patient remarked that the tasks at the end of each section really made her think about her pain experience. Another reported the drawings really hit home for her and actually brought her to tears, because finally, "someone gets it."
This booklet serves as a great guide in walking patients with persistent pain through a series of informative pearls that help them understand their pain and empower them to move beyond it. I have been asking patients to complete two sections on their own, and then bring it back each visit (1x/week) for us to discuss together, which is working well. It is helping me as a clinician to pace the education process, delving deeply into topics as needed for each individual patient.
I highly recommend this booklet to patients and therapists alike! It's a powerful tool that really helps patients take an active role in their own healing process, owning their pain and moving beyond (or in spite of) it. In addition, it is extremely reasonably priced!
December 14, 2016 / Jarrod, Physical Therapist - Rochester, MN
Designed to be Patient-Centered
As a physical therapist, treating individuals who are living with persistent pain can be challenging on many levels. One of the greatest challenges to overcome is the fact that every person has their own unique pain experience. It is here, at the individual pain experience level, where successful treatment of persistent pain can begin.
This new, patient-centered, workbook takes on the individual pain experience right away in section 1. The workbook continues on through a total of 8 sections. Each section presents easy to understand information while connecting together a progressive and methodical approach for patients to follow. Section titles include:
Your personal pain journey
Your body's alarm system
Knowing your alarm system has become extra sensitive
Why did this happen
Your brain meeting
Your lion
How to turn down your extra sensitive alarm system
Your recovery
One of my favorite parts of the workbook is that at the end of each section is a task box for the patient to consider. These 8 tasks really put the information to action, and put practical handles on how a patient can begin to treat their pain and improve their function.
While a patient could successfully work through this workbook on their own, it is probably best shared as part of a interactive experience with a therapist.
Any therapist that wants to improve their own understanding of presenting a comprehensive PNE program to help patients in pain should try this workbook. Without a doubt the information in this workbook will give a practicing therapist a leg up in presenting PNE concepts to any patient while starting to put the patient in charge of understanding and treating their own pain.
As a physical therapist, treating individuals who are living with persistent pain can be challenging on many levels. One of the greatest challenges to overcome is the fact that every person has their own unique pain experience. It is here, at the individual pain experience level, where successful treatment of persistent pain can begin.
This new, patient-centered, workbook takes on the individual pain experience right away in section 1. The workbook continues on through a total of 8 sections. Each section presents easy to understand information while connecting together a progressive and methodical approach for patients to follow. Section titles include:
Your personal pain journey
Your body's alarm system
Knowing your alarm system has become extra sensitive
Why did this happen
Your brain meeting
Your lion
How to turn down your extra sensitive alarm system
Your recovery
One of my favorite parts of the workbook is that at the end of each section is a task box for the patient to consider. These 8 tasks really put the information to action, and put practical handles on how a patient can begin to treat their pain and improve their function.
While a patient could successfully work through this workbook on their own, it is probably best shared as part of a interactive experience with a therapist.
Any therapist that wants to improve their own understanding of presenting a comprehensive PNE program to help patients in pain should try this workbook. Without a doubt the information in this workbook will give a practicing therapist a leg up in presenting PNE concepts to any patient while starting to put the patient in charge of understanding and treating their own pain. | 53,523,940 |
In spite of their “thoughts and prayers,” Republicans in Congress issue a “quiet, unintentional endorsement” of mass shootings by failing to take proper action to stop shooters from acquiring deadly weapons, a Connecticut senator noted in the wake of the Florida high school shooting on Wednesday.
“I don’t feel helpless,” Sen. Chris Murphy (D-CT) told MSNBC host Chris Hayes. “The responsibility for this lies in our hands. It is Congress that has applied a kind of quiet unintentional endorsement to the murders.”
ADVERTISEMENT
Murphy, who once ended a 15-hour filibuster with with an anecdote about a teacher killed in Newtown, Connecticut’s Sandy Hook Elementary massacre, went on to describe the patterns of the mass shootings.
“These are copycat killings,” the congressman said. “It used to be there was a greater diversity of weapon used. Not anymore — it’s an AR-15 every single time. There’s a deadliness to the weapon that’s unique.”
“By doing nothing about it, by refusing to have a debate about criminalizing the purchase of these weapons, we’re sending this just very strange perverse signal to these unhinged young men who are contemplating these crimes of violence,” Murphy continued, “that if it comes with no condemnation from the highest levels of government, then maybe they’re green lighted.”
He went on to say the he knows “that’s not what my colleagues mean to do, but people listen to what we say and do.”
“When we do nothing,” he concluded, “it has impact.”
ADVERTISEMENT
Watch below, via MSNBC: | 53,524,385 |
The best receiver for the Cleveland Browns in 2018 was a guy who was on the practice squad last year, but what does that mean?
Baker Mayfield has been nothing short of a revelation for the Cleveland Browns, so the question is about his weapons. Entering the season, the Browns went from having Josh Gordon, Jarvis Landry and Corey Coleman as their starting three wideouts with David Njoku entering his sophomore year at tight end. Four months later, Gordon is out of the league again after a dozen games with the New England Patriots, Coleman is a giant and Landry is the top receiver in Cleveland with Njoku improving but inconsistent.
There are three questions that need to be answered for the Browns headed into the offseason. How good are what the Browns currently have? How good specifically is Jarvis Landry? And then, how badly do the Browns need receiver help?
In order to answer that, it gets into the details and advanced stats to see who has been playing well and specifically who fits Baker Mayfield. He seems capable of producing with anyone around him, but that’s not good enough for a team that intends to be a contender.
Catches vs. Targets
Darren Fells – 90.9% (10 of 11)
Dontrell Hilliard – 90% (9 of 10)
Duke Johnson – 79.3% (46 of 58)
Rashard Higgins – 74.4% (35 of 47)
Seth DeValve – 71.4% (5 of 7)
Nick Chubb – 69.2% (18 of 26)
David Njoku – 65.4% (53 of 81)
Damian Ratley – 65% (13 of 20)
Breshad Perriman – 61.9% (13 of 21)
Derrick Willies – 60% (3 of 5)
Jarvis Landry – 54.2% (76 of 140)
Antonio Callaway – 54.1% (39 of 72)
This stat can be a little misleading. First, running backs have an inherent advantage in that so many of their receptions tend to be wide open behind the line of scrimmage that are more an extension of the running game. And throwaways are included as someone has to be targeted, so that can be skewed a bit too.
Nevertheless, it paints a picture about who is most likely to catch the ball when targeted. Darren Fells, the playmaker, is pretty automatic. He’s never the first option and tends to only get the ball when he’s open, but he’s vastly outperformed expectations in the passing game this year.
After eliminating the tiny sample size guys, Rashard Higgins is the best of the bunch. When the ball goes his way, he’s the best chance to catch it. David Njoku is solid, but could get better if he eliminates drops.
Meanwhile, Antonio Callaway and Jarvis Landry are pretty bad. Callaway is a rookie, but he’s struggled with drops, needs to learn how to run routes among other issues. Jarvis Landry, on the other hand, that’s just bad. The question with those low percentage catch rate is whether or not the juice is worth the squeeze.
Yards per Reception
Breshad Perriman – 22.7 (13 receptions)
Derrick Willies – 20.3 (3 receptions)
Seth Devalve – 14.8 (5 receptions)
Rashard Higgins – 13.9 (35 receptions)
Antonio Callaway – 13 (39 receptions)
Dontrell Hilliard – 11.7 (9 receptions)
Jarvis Landry – 11.5 (76 receptions)
Darren Fells – 11.4 (10 receptions)
Damian Ratley – 11.1 (13 receptions)
David Njoku – 10.9 (53 receptions)
Duke Johnson – 9.3 (46 receptions)
Nick Chubb – 8.5 (18 receptions)
This stat isn’t terribly informative and largely makes players look better than they are. Nevertheless, it’s included, because if it wasn’t, people would wonder why it isn’t, perhaps suggesting it was done so deliberately to hide something.
None of this is terribly surprising. When Breshad Perriman catches the ball, he’s typically down the field, so his average is quite high. Running backs tend to have lower averages as is the nature of the position, though Dontrell Hilliard’s number stands out.
Of the players with a reasonable number of targets, Rashard Higgins is the best followed by Antonio Callaway and Jarvis Landry with David Njoku bringing up the rear. This number can provide some context when constrated against more indicative advanced stats like yards per target.
Yards per Target
Breshad Perriman – 14.04 (21 targets)
Derrick Willies – 12.2 (5 targets)
Seth DeValve – 10.57 (7 targets)
Dontrell Hilliard – 10.5 (10 targets)
Darren Fells – 10.36 (11 targets)
Rashard Higgins – 10.34 (47 targets)
Duke Johnson – 7.34 (58 targets)
Damian Ratley – 7.2 (20 targets
David Njoku – 7.12 (81 targets)
Antonio Callaway – 7.04 (72 targets)
Jarvis Landry – 6.24 (140 targets)
Nick Chubb – 5.88 (26 targets)
Yards per target is as brass tacks as it gets for player production. There were this many attempts to get a player the ball and they did this much per attempt. It’s more indicative than yards per reception because it accounts for the amount of energy used to get the production.
There’s a few things to take away from here. Clearly, there’s some tiny sample sizes that don’t really mean a whole lot like Derrick Willies. That was all in one game. Dontrell Hilliard is interesting as a player, should get his chance to make the team next year and then Seth DeValve continues to be a mystery.
On to the more important things like Breshad Perriman, which obviously pops here. In addition to negotiating a contract to bring him back, the Browns need to use this offseason to really figure out how good he is. During the season, installing gameplans and stragetizing for the opponent makes it difficult to really train and evaluate.
He’s making the most of an opportunity right now and has made some plays, but now it becomes time to figure out if this was a nice run or who he really is. This season is reminiscent of Andre Davis had years ago when he made a bunch of plays in games and then fell off the face of the earth. Hopefully Perriman has more staying power.
In terms of players who have gotten a substantial number of targets, it’s difficult to ignore Rashard Higgins. Higgins and Baker Mayfield have an incredible chemistry and nothing about Higgins from a physical standpoint is all that great. He just understands what he’s supposed to do and finding a way to get in position where Mayfield can get him the ball.
David Njoku and Antonio Callaway need to improve their efficiency. There’s no question that drops are a factor here. Both have moments of brilliance but need to improve consistency. That alone would produce a difference. They are young and developing, but that’s the next step for both.
Even if you love Jarvis Landry, this number is a problem. There is no way to justify 140 targets when this is the result. There are undoubtedly throwaways labeled as targets, but taking all of those out of the equation doesn’t fix the problem.
Duke Johnson still doesn’t get the ball enough. Especially when considering how many of his receptions are out of the backfield, 7.34 yards per target is ridiculously good. His last couple weeks have been an uptick here, but it’s another year where he doesn’t get the ball as much as he should.
First Down Percentage
Breshad Perriman – 84.6% (11 of 13)
Rashard Higgins – 68.5% (24 of 35)
Derrick Willies – 66.6% (2 of 3)
Darren Fells – 60% (6 of 10)
Seth DeValve – 60% (3 of 5)
Antonio Callaway – 58.9% (23 of 39)
Duke Johnson – 54.4% (25 of 46)
Jarvis Landry – 51.3% (39 of 76)
David Njoku – 47.1% (25 of 53)
Dontrell Hilliard – 44.4% (4 of 9)
Damian Ratley -38.4% – (5 of 13)
Nick Chubb – 27.7% (5 of 18)
Breshad Perriman has made almost nothing but big plays, so it’s not a surprise that he rates so highly here. Nevertheless, this is another example of why he needs to be figured out in a full offseason with Mayfield to determine just how much of the passing game should flow through him.
Rashard Higgins is the one that’s going to keep popping up. He just has a knack for making plays and Mayfield seems to trust him as much as any receiver on this team.
Considering the degree of difficulty, Duke’s numbers are pretty impressive. There are a number of examples where he’s getting the ball and having to figure a way to get to the first down marker and he does it. He’s got incredible elusiveness and basically makes one defender miss every time he gets the ball.
Meanwhile, David Njoku and Jarvis Landry need to be better here. Drops are a factor here, but good players just do much better in this category.
Explosive Play Percentage
Seth DeValve – 40% (2 out of 5)
Derrick Willies – 33% (1 out of 3)
Rashard Higgins – 25.7% (9 out of 35)
Breshad Perriman – 23% (3 out of 13)
Damian Ratley – 23% (3 out of 13)
Dontrell Hilliard – 22.2% (2 out of 9)
Jarvis Landry – 15.8% (12 out of 76)
Antonio Callaway – 15.3% (6 out of 39)
David Njoku – 15% (8 out of 53)
Nick Chubb – 11.1% (2 out of 18)
Darren Fells – 10% (1 out of 10)
Duke Johnson – 8.6% (4 out of 46)
Small sample sizes again are at the top and Seth DeValve continues to be an enigma. If there is a statistic to celebrate when it comes to Landry, it’s this one. Only in 2016 did Landry have more or a higher percentage of explosive plays.
Breshad Perriman isn’t a huge surprise here. David Njoku and Antonio Callaway are okay, but could be much better. This is an area where Duke Johnson is at a natural disadvantage coming out of the backfield, but it’s a pleasant surprise with what Nick Chubb has done in the screen game.
Once again, Rashard Higgins shines here. For a guy who was no guarantee to make the final roster coming out of camp, he has made the most of his opportunity and continues to look like Mayfield’s best target in terms of efficiency.
Average Yards after Catch
Derrick Willies – 10.66 – (32 yards on 3 receptions)
Nick Chubb – 8.88 (160 yards on 18 receptions)
Dontrell Hilliard – 8.66 (78 yards on 9 receptions)
Duke Johnson – 7.47 (344 yards on 46 receptions)
Antonio Callaway – 5.79 (226 yards on 39 receptions)
David Njoku – 4.56 (242 yards on 53 receptions)
Darren Fells – 4.5 (45 yards on 10 receptions)
Breshad Perriman – 4 (52 yards on 13 receptions)
Damian Ratley – 3.9 (51 yards on 13 receptions)
Seth DeValve – 3.4 (17 yards on 5 receptions)
Jarvis Landry – 3.2 (250 yards on 76 receptions)
Rashard Higgins – 2.14 (75 yards on 35 receptions)
Understanding what guys are capable after the catch is useful, but with Mayfield as a quarterback, it has increased importance. He’s such an accurate quarterback with great timing that he naturally sets up teammates to make plays after the catch, so finding guys who excel in that area is critical.
This is another area where running backs have an obvious advantage, but this also illustrates how difficult the Browns backfield is to take down. Nick Chubb can win with power as well as elusiveness and Duke is tremendously gifted in making opponents miss. Hilliard is a pleasant surprise too.
This is an area where Antonio Callaway shows a ton of potential and the slant from Mayfield to Callaway is becoming a nice staple in the offense. Njoku has the athleticism to thrive here. Breshad Perriman is largely a deep threat, but he was tremendous after the catch in college, so if he can add that with his size and strength, it’s one more problem for defenses.
Clearly, this is a weakness for Rashard Higgins. So long as he can catch the ball at a high rate and move the chains at the clip he is, it’s not a big deal. Jarvis Landry does neither of those things and isn’t good here, which points to a poor fit in this offense.
Conclusions
First – The Browns largely have more prospects than they have players. Rashard Higgins has had a breakout year for him, but it’s one good year. Breshad Perriman has been a terrific splash, but it’s 13 receptions.
Second – The numbers aren’t as great for David Njoku as they should be. He’s 22, he’s improving as a receiver and as a blocker over the course of the year and hopefully his third season is where he really hits his stride. Nevertheless, he needs to be more consistent and start putting it together to where he’s more of a threat.
Third – The Browns have a possession receiver. It’s Higgins. When it comes to catching the ball and moving the chains, he’s the best at both on this team. This is another reason they need him to be able to repeat this season next year.
Fourth – The Browns have an impressive set of running backs that continue to shine in terms of their value. Alas, it’s another year where Duke Johnson didn’t get the ball enough and the reasoning is inexplicable. Give him the ball, he makes the plays.
Finally – The larger point here is that the Browns don’t have enough at receiver. Their best receiver this year has been Rashard Higgins. No one would’ve bet on that one coming into the year, which is a credit to him, but it shows how much Baker Mayfield is really carrying this offense. No one stands out as a true threat that could go somewhere else and be a great player.
That doesn’t mean the Browns need to spend a first round pick or throw a mint at someone in free agency, but it does show the front office needs to keep adding talent and seeing who can compete and win out for the betterment of the team. It’s great when a guy like Derrick Willies can come in and have a big couple quarters, but they need more that can be consistently relied upon.
That also doesn’t necessarily mean it needs to come in the form of a wide receiver. If it’s tight ends that carry the offense consistently, so be it. They just need more weapons that can grow and improve with Mayfield, so when the Browns are in the playoffs on third-and-7 in the fourth quarter, someone else besides Mayfield can step up and make a play in the passing game. | 53,524,767 |
2013 NFL Season — 5 Things We Learned From Week 3
Seven NFL teams remain unbeaten pending the Monday night game between Denver and Oakland, while six teams have yet to win in 2013. Here are the most important takeaways from Week 3.
The AFC Is Better Than Advertised
Getty Images
Many NFL pundits believed the NFC was superior to the AFC coming into the 2013 season. It's harder to make that argument after three weeks. With Miami (3-0), Cincinnati (2-1) and Indianapolis (2-1) all scoring inter-conference wins over Atlanta (1-2), Green Bay (1-2) and San Francisco (1-2) respectively, the AFC teams may have illustrated that the pre-season bluster was all-hype.
The Jets Have a Better Record Than the Packers or 49ers
Getty Images
Somehow, the New York Jets (2-1) are not terrible. After beating Buffalo (1-2) by virtue of a 69-yard touchdown pass from Geno Smith to Santonio Holmes, Rex Ryan's team has a better record than the Packers, 49ers, Redskins, Steelers and the Giants. Yes, the wins have been all but gift-wrapped by the Buccaneers and Bills, but plenty of fans could have been expected an 0-3 start for the Jets. New York could easily push its record to 3-1 at Tennessee next Sunday. Maybe injured QB Mark Sanchez is the team's LVP (Least Valuable Player)? They seem to play better with him out of the lineup.
The Colts Didn't Need Trent Richardson To Beat The 49ers
Getty Images
When Indianapolis (2-1) traded a 2014 first-round draft pick to the Browns for running back Trent Richardson earlier this week, many experts assumed it was to give Andrew Luck and the Colts' offense another dimension. Indy didn't need the added threat to beat the reeling 49ers (1-2) by a 27-7 score in San Francisco on Sunday. Luck threw for 164 yards and joined Ahmad Bradshaw and Richardson in scoring rushing touchdowns. Bradshaw piled up 95 yards on 19 carries, leaving some fans wondering if the team needed its new acquisition.
Brian Hoyer Kept Browns' Fans From Rioting
Getty Images
Quarterback Brian Hoyer made his second career start for Cleveland (1-2), and he threw for 321 yards, three touchdowns and three interceptions in the Browns' 31-27 win over Minnesota (0-3). Sure, Hoyer did throw three interceptions — and the Vikings are terrible — but his performance kept Browns' fans from completely abandoning all hope on the 2013 season after the team inexplicably traded running back Trent Richardson earlier in the week. Cleveland fans will have to wait another week to get back on the ledge.
The Giants' Offense Is Bad
Getty Images
The New York Giants (0-3) had just three yards of offense in the first quarter during Sunday's embarrassing 38-0 loss to Carolina (1-2). New York quarterback Eli Manning was sacked six times in the first half and seven times for the game. So, other than the inaccuracy of the quarterback, the inability of the line to block for him and the tendency of the running back to fumble, the Giants have looked great so far in 2013, which is to say that they are not good at all right now. | 53,524,786 |
Saturday, November 22, 2008
So tonight Keith and I decided to completely clean off my laptop and reinstall everything hoping to get it to perform to its peak ability...and in doing so I found this word document. Before we got married Kyle Wade asked us to send him notes about why we choose each other. This was mine - it's only been two and a half years of marriage - but it is still fun to sit back and re-read what I was thinking in those days before we married. Hope you all enjoy learning a little about us!
I really can’t say that I had much to do with choosing Keith. Keith had been in four of my business classes and I really hadn’t noticed him until one of my good friends told me she had a crush on him; but she didn’t know that much about him. Being the friend that I am (ha!), I told her I would scope thinks out for her. Funny how when I look back at things, I that God must have been laughing at my naivety…which I’m pretty sure is a constant source of humor even today. So, the very next day Keith and I were put in a group together in one of our classes. This was my first real chance to get some dirt for my friend. At the first group meeting I showed up having read the case and outlined the problem. Keith showed up. He didn’t prepare for the meeting at all! I reported back to my friend that while he may be cute, I wasn’t impressed because he was lazy and was mooching off of my hard work…I was such a nerd. I’m pretty sure God laughed at that one.
After that my relationship with Keith started to grow into a friendship. I knew he was a man of his word and good natured when he lost a flag football bet and wore my bright orange “Some Girls have all the fun” intramural shirt for three days. I really don’t think orange was his color b/c on the last day he claimed he had a migraine and didn’t show his face on campus!
From there, my friend lost interest in Keith, the semester ended and we all went home for Christmas break. The next semester Keith and I had two classes together. The fact that Keith came and set by me in one class didn’t register anything with me. And when our professor came by and said something to us about a budding romance, I quickly set him straight saying we were just friends. The professor just smiled, winked at Keith and told him he had a lot of work to do. I was a little surprised by the professor’s bluntness, but again nothing registered with me. God probably was starting to wander how many opportunities he was going to have to give the two of us before something finally happened. Turns out it was a lot. We went through the whole semester talking off and on. It never occurred to me that he may have been interested because to me he was off limits as my friend had liked him, plus my first impression was still playing in the back of my mind, he was a city boy that drove a Chevy (I come from a very strong willed country Ford family) and loved Garth Brooks…really, I didn’t think he was my type.
However, God certainly was smarter that I was, and apparently knew me better than I knew myself…The semester was coming to a close, we had only 6 weeks left till graduation. I stayed after class one day to talk about a project with my friend Amber. When we finally left we could see Keith slowly walking to his truck. That’s when the fog of naivety cleared and it clicked. Here Keith had been walking with me after class every Tuesday and Thursday and I had honestly never thought that it was more than just two ppl going to their trucks in the same parking lot. Uh huh…Keith had started parking his truck in the same lot as me a long time ago. So as Amber and I watched, Keith got to his truck, glanced back at the building and left. Yep…things were about to get interesting…but I had avoided the awkward situation for the time being and I wouldn’t see Keith until after the wkd. But alas, God had another plan. That night I sit down at my computer to check my email before going to bed and I had an email from Keith. Sure enough, he was interested. I was taken aback, flattered and not real sure what to do. I did know that it took a lot of guts to write that email, so I couldn’t leave him hanging. So I responded with my friends blessing and the heaven’s let out a huge sigh of relief.
Keith and I went out that Friday night, March 26, 2004 and saw each other every night there after. So, as you can see I really can’t say I choose Keith…perhaps circumstance threw us together…but I’m pretty confident that God picked him out just for me and then had to work nine months to get me to see the perfect man that I would eventually spend the rest of my life with.
I’m not really good at saying mushy things…or any of that kind of stuff. So instead, I will just write what is in my heart; if it comes out mushy…it is purely coincidental. J Keith is my best friend. He is the one I can tell anything to, I cry on his shoulder, I get mad at him for no reason, and he doesn’t care, he loves me anyway. Keith is my first thought in the morning and the last person I pray for every night. Keith is the one I want to share every exciting moment with and the one I want at my side when I have butterflies in my stomach and have to stand in front of a bunch of people. Keith is my everything. I cannot imagine going through life without him. We’ve been through so much together in the last two years, it sure seems like it has been longer.
My Grandma has always told me that you could tell a lot about a man by the way he treats his mother. Keith’s relationship with his mom is amazing. There is an amazing amount of love, respect and genuineness between them. And I look at his parents, and I see the love that they have between them, and I am so thankful. I know in my heart and without a doubt that Keith will always love me. We have been so blessed to have such wonderful examples of love in both our parents, and in our grandparents. God has truly blessed us.
Keith’s faith in God is inspiring because he is so humble. Keith is not very vocal about a lot of things, but I love to sit next to him in Sunday school class and watch him contemplate the discussion and every once in a while throw in a comment. He is very well versed in what the Bible says, but more so he is always trying to live it. Our prayer time together is always something I look forward to. It is a time when I am so blessed to hear what is really on his heart, and with God Keith never withholds what is on his heart.
I suppose I could go on and on about what Keith is to me. But it is all summed up in a few words. Keith is God’s Chosen One for Me. I have never been more confident in anything more than I am that I love Keith Hays, and I am excited and very ready to commit to him for the rest of my life and his. Keith is my best friend, my confident, my soul mate, my partner and as of May 20, 2006 is stuck with me forever! J
Monday, November 17, 2008
Sunday night we went over to Eli and Amy's house to watch the Cowboy game. Carli got almost as much attention as the Cowboys did! Tori is our friend who teaches first grade here in Whitehouse - and she put her teaching skills to good use last night. She taught Carli how to stick out her tongue! It is so cute! I tried and tried to get a picture of it - and I did finally - but first watch the video. So cute!
Check out my tongue!
Working with Tori on my new trick!
Exhausting work! Amy put me right to sleep!
Eli is in denial - he does have baby fever!
>I did get my hair cut - I'll post those pics later in the week. Unfortunately - the hair cut didn't do anything about how tired I look! ha! :)
Friday, November 14, 2008
Well, I didn't do well keeping up the blog this week - so now I am resorting to telling you about the week in pictures...
First - Carli helped me cook dinner one night. She doesn't like to be cradled in the "Moby Wrap" or held close to me - but she prefers rather to face out and see what is going on. I have a feeling when she starts moving on her on, she will be into everything. This picture is at 5.5 weeks and she pretty much holds her head up without any help from me. And if I do try to help her out - it makes her mad!
Then last Saturday Aunt Betty and Dionna came to visit! They timed it just right b/c Carli had just woken up from her nap and was ready to eat. She was having trouble nursing that day b/c of drainage in her throat, so I was pumping and feeding her with the bottle. Aunt Betty got to feed and burp her.
Then Cousin Dionna got some good one on one time with Carli. Carli was showing Dionna how big she was and could hold her head up!
What happens when a baby doesn't nap ALL DAY LONG? It means she sleeps for 8 hrs at night and no amount of moving, massaging or tickling will wake her up!
Bath Time! Shea has taken on the job of protecting "her baby" from all intruders, including those phantom ones that only she can see. Whitey Tighty still thinks the pack-n-play belongs to him and occasionally jumps in it to nap or look out the window or check on Carli (who is in her car seat usually). So Chuy decided he must have a job too - and it is bath time. Every time we give Carli a bath, Chuy joins us and lays on the bathroom floor the whole time. When we are done, he leaves...after all his job is over!
Speaking of bath time - Carli LOVES to have her head washed. You talk about a relaxed baby!
Today was the first time she saw herself in the mirror of her floor gym - may have been because I got her close enough to it with her wedge. She talked up a storm to herself all afternoon! It was super cute. She also figured out if she could control that arm of hers, she could hit the thing and make it move!
We got the bumbo chair out this week - she can't really sit in it by herself b/c after about a minute she is tired of holding her head up - but today at lunch she had to show Daddy what a big girl she was. See Shea? She isn't too sure the bumbo chair is okay for Carli to sit in. It got a full sniff over when we took Carli out.
Carli and her daddy getting in some bonding time during his lunch break. See her "little old man" hair? :) She isn't completely bald - actually she has blonde hairs on all the bald looking spots. The darker hair is the hair she had when she was born and everything I read said that will eventually fall out too. Oh - and this outfit was meant for the ruffles to be on her butt...funny b/c they are about an inch about her butt! But the outfit isn't too small - it swallows her! She is just long bodied and short legged! Kind of like her Uncle Andy! :)
Finally decided she could take a nap today - but it took an hour to accomplish. Plus, this is another cute "ruffled butt" picture. :)
Such is our week in pictures. Tomorrow and Sunday we will spend letting me catch up on my work while Carli and Daddy bond! :) Plus, I am going to get my hair cut, maybe. I have an appt tomorrow at 10:30. We'll see how it turns out. But don't worry, my hair has never been shorter than shoulder length and I don't plan on breaking that trend now!
Friday, November 7, 2008
Carli spent her one month old celebration meeting one of her Daddy's best buds - Michael. Michael and Keith have known each other since the 4th grade - crazy! Michael was the one that encouraged Keith to ask me out - he took our first "couple" picture for us and even followed us to Arlington! :) They are about as close as two buds can get - and I think that is pretty awesome. I had the great privilege of keeping Michael's son, Ryan, for about 5 months when he was a baby. He was about 9 months old when Keith and I moved to Whitehouse - crazy how much the kid has grown, he will be 3 in March! He was barely crawling when we left and now he runs all over the place! ha! Michael and Ryan drove down last Saturday to meet Carli for the first time...
Ryan with Carli (she dressed up for him!)
Michael holding Carli
(He was so busy admiring her, he forgot to smile for the camera!)
Thinking about holding Carli's handMe and my buddy Ryan
Carli's birthday weekend wasn't over once her company left - nope, she had a big day on Sunday too! She went to church for the first time. She did really well - she only let out a scream once when she thought it was time to eat! She even cooperated and went out to eat with the whole gang after church, came home to take a nap and then went to small group. She was a huge hit at small group - we even had a volunteer to change her diaper! It was great!
Ready for Church
Church made her happy...kind of
After her big weekend, it wore a girl out! I laid her here, while I was fixing a bottle for Keith to feed her (we are getting in a routine, where I will fix Keith a bottle to feed her when he gets home and I will go to the gym, then they get some good father/daughter time in!). She was so fussy and just couldn't believe I laid her down - and within two minutes she was sound asleep! It was super cute!
Other big milestones this week included going to Alto with me for the first time by ourselves, refusing to take a nap ALL DAY LONG two days this week - and then sleeping 7 hrs straight that night! Coming to terms with our car seat and actually falling asleep instead of screaming at it. And finally - mastering the art of a two way blow out diaper - yes, both up the front and back - now that is talent!
Monday, November 3, 2008
Here is a video we took Saturday morning when we were trying to get Carli to wake up...this is only appx 3 minutes of the 45 it took to finally get her to open her eyes! When she sleeps, she takes the job seriously!
Saturday, November 1, 2008
Happy 1 Month birthday to Carli!! We have a big day planned...our good buddy Ryan and his Dad (Michael) are coming to visit us today. I kept Ryan when we lived in Arlington - hard to believe his 2.5 years old now!
For Halloween, our neighborhood becomes a mini-Canton. No kidding, people from all over Whitehouse show up and trick or treat in our neighborhood. Being the social butterflies that we are - we loaded up the whole family, dogs included and drove to Jacksonville to meet Grammy and Pa for some dinner at Chili's! ha! We had to take the dogs, or they would go absolutely bonkers listening to all the people in the neighborhood! It seriously took us 5 minutes just to drive out of the neighborhood, it was crazy.
Anyway, below are pictures of Carli in her Halloween outfit. Many thanks to our Amber for the awesome Halloween gear. She sent Carli some socks, bibs and the cutest cat hat! So, we tried to get Carli to cooperate and take some cute pictures for us...let us know how we did! :) | 53,525,087 |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Set Printer Feature programatically
Hi, I'm working on a C# desktop application where I need to change some printer settings and print some pictures. In my program I already can set the Paper Size, Printer Name, etc... If I go into the Advanced Options of the printer preferences, there is a section called "Printer Features". I cannot figure out how to access the parameters in the printer settings. For example there is "Print Quality", "Print Density", "Continuous Mode", etc..
* The Perfect Platform for Game Developers: Android
Developing rich, high performance Android games from the ground up is a daunting task. Intel has provided Android developers with a number of tools that can be leveraged by Android game developers.
* The Best Reasons to Target Windows 8
Learn some of the best reasons why you should seriously consider bringing your Android mobile development expertise to bear on the Windows 8 platform. | 53,525,224 |
One of Tura Satana’s early supporters was the silent film star Harold Lloyd. He photographed her and gave her the confidence to go into show business. In an interview with Russ Meyer’s biographer, Jimmy McDonough, Tura said, “I saw myself as an ugly child. Mr. Lloyd said, ‘You have such a symmetrical face. The camera loves your face. … You should be seen.’”
We will look more deeply into the work relationship with Lloyd and early days of Tura’s film career next week! Stay tuned! | 53,525,371 |
We use cookies on this website, including web analysis cookies. By using this site, you agree that we may store and access cookies on your device. You have the right to opt out of web analysis at any time. Find out more about our cookie policy and how to opt out of web analysis.
Often in applied social science we provide answers, which policymakers do not ask, and
we fail to adequately research some of their more pressing questions. There is obviously
a divide between the demand for knowledge and its supply, which needs bridging. In my
view in the case of Labor Economics, IZA World of Labor is the answer to this
discrepancy and I am happy to have a chance to contribute
Google search activity data are an
unconventional survey full of unbiased, revealed answers in need of the
right question
Using Google search activity data can help
detect, in real time and at high frequency, a wide spectrum of breaking
socio-economic trends around the world. This wealth of data is the result of
an ongoing and ever more pervasive digitization of information. Search
activity data stand in contrast to more traditional economic measurement
approaches, which are still tailored to an earlier era of scarce computing
power. Search activity data can be used for more timely, informed, and
effective policy making for the benefit of society, particularly in times of
crisis. Indeed, having such data shifts the relation between theory and the
data to support it. | 53,525,418 |
Age-Dependent Impact of Medication Underuse and Strategies for Improvement.
Medication underuse is common in aging populations and, because of the growing risk for competing deaths, the benefit of preventive medicines gradually vanishes with advancing age, thus limiting their success. To estimate the optimum time of initiation of the secondary prevention of cardiovascular events, we examined the impact of appropriate pharmacotherapy for different starting ages at which it is implemented. In the competing risk framework, we obtained the population's life course from life tables, combined it with effect estimates quantifying the real-world effectiveness of secondary prevention, and compared the outcome of patients not receiving appropriate treatment (underuse) with those receiving preventive medicines that have demonstrated a reduction in the transition to serious cardiovascular events (START criteria). Starting at the age of 55 years, the population proportions of the distinct states of the framework were calculated for each year of chronological age in subgroups of appropriate treatment and underuse. These proportions were used over a follow-up period to estimate measures of treatment effectiveness and risks of underuse. Despite increasing relative effectiveness with advancing age, benefits measured by patient-relevant endpoints, such as life years gained (LYG) or gained quality-adjusted life years (QALYs), markedly dropped after the starting age of 75 years, but even at an initiation age of 85 years, QALYs gained exceeded 1 year. Interventions targeting medication underuse may achieve considerable benefits at any stage of later life, while the benefit is probably largest if appropriate treatment is started before 75 years. | 53,525,423 |
Railroad Square
Railroad Square Art District is an arts, culture and entertainment district of Tallahassee, Florida, located off Railroad Avenue (just south of the Amtrak station and FAMU), filled with a variety of metal art sculptures and stores selling artwork and collectibles. Railroad Square is mainly known for its small locally owned shops and working artist studios, and its alternative art scene.
Railroad Square Art District is the site of the former McDonnell Lumber Company. Most of the warehouses there were originally constructed in the 1940s. The property later became the Downtown Industrial Park. In the 1950s it was acquired by The Boynton Family, who, three generations later, still own much of the property today. It was the second generation of Boynton owners, Nan Boynton, who was the one responsible for bringing the artists into the park and renaming it "Railroad Square" in the 1980s. The site has hosted a microbrewery, rock climbing gym, local coffee shops, art galleries, art studios, vintage shops, and more. There are currently over 70 tenants of the Railroad Square community. The other businesses listed below are newer but are located in these historic railroad warehouses as well. Railroad Square hosts First Friday (the first Friday of each month)— an art crawl event with live music and food trucks.
Gallery
Shopping
621 Art Gallery Shop
The Other Side
Wonsaponatime Vintage
Athena's Garden
Curio Vintage and Uncommon Goods
Anhaica Bag Works
Tally Yakkers Kayaks and Paddle boards
Tobacco Leaf Smokeshop and Glass Gallery
Cosmic Cat Comics
Loud Voice Books
Crystal Portal
Recycled Robin
Airen's Oddities
Camp Folks
Crystal Portal
Earth, Thread, and Fire
Psockology: Novelty Socks
Treehouse Furnishings, LLC
Gamescape
Zen Den
Dining and Entertainment
The Crum Box Gastgarden
Black Dog Cafe
MAYhem Sweets & Treats
Leon County Judo Club
Tallahassee Rock Gym
Flippin' Great Pinball
Railroad Square Jiu Jitsu
Gamescape
Mickee Faust Club Community Theater
Art Galleries
621 Gallery
Artisans Gallery
Jan's Gallery
B Major Prints
Dickson Studios LLC
Kylene & Ryan Studios
Objex Gallery
Transportation
Railroad Square is served by StarMetro.
Parks
Cascades Park (Tallahassee)
References
External links
Railroad Square Website
Category:Neighborhoods in Tallahassee, Florida
Category:Culture of Tallahassee, Florida
Category:Tourist attractions in Tallahassee, Florida | 53,525,424 |
Slate recently asked readers who are child-free and happy to let us know all about it—and did you ever! We’re posting some of our favorite responses on the blog this week.
Name: Margaret Ganong
Age: 55
Location: Seattle, Wash.
I’m assuming that the currently child-free who feel most passionately about this issue are still in a position to change their minds and join the ranks of “real adults” (i.e. people with children), which is not my case. I’m about to turn 56 and have recently joined the ranks of the postmenopausal, without suffering a single hot flash. I don’t have children either.
The thing is, after a brief preadolescent period during which I played with baby dolls and Barbie dolls like every other little girl, I pretty much knew that I would probably not be having children. Notice I did not say that I did not want to have them. I just did not think it was something that I would do if given the choice.
One memory from that time is so deeply embedded in my brain it could almost have been implanted. I have tried to keep it pristine and real, with no embroidering or layering over time. I was about 15. My mother was driving me and my best friend somewhere. My mother must have been feeling philosophical, or perhaps she was just answering a question, because she said words to this effect: Nothing in my life has lived up to my expectations. Everything has basically been a letdown … except (pregnant pause here) … having children. High school was a letdown; going to college was a letdown; getting married was a letdown. But having kids—and she had six all told—now that was no letdown.
I don’t know if I decided then and there—in that car, on that day—to be childless. Did I consciously decide to rebel against my mother’s idea that life was a big letdown for the most part? Did I view her words as propaganda, an advertisement for conformity, a dire warning, a stern command? Remember that Peggy Lee song? “If that’s all there is, my friends, then let’s keep dancing, let’s break out the booze …” My mother’s words made me think of that melancholy song.
About a year after the incident in the car, I casually told my mother that I did not plan to have children. I was standing in our kitchen as I said it, surrounded by my mom’s world of chaotic domesticity. Did I say this to hurt her? Not that I am aware of, but this is not impossible. After all, she had declared motherhood to be the only event worth living for, implying that the only life worth living involved having children. What I said could be understood as a repudiation of both her choice and her belief about what makes a life meaningful.
In 1974, I went off to college, fiddled around with boys, and thanked my lucky stars that Planned Parenthood and Roe v. Wade were a hard-fought reality. Without them, I and countless others would not have had the opportunity to discover our bodies and ourselves without paying the high price of young parenthood, diminished expectations, and diapers. The first time I got married, while in graduate school, it was to a man nearly 20 years my senior. I was wife No. 3; he seemed delighted when I said I didn’t want to have children. Neither did he! When I got pregnant (I was using a diaphragm, long story, don’t ask), we were both taken by surprise and briefly considered allowing ourselves to become parents. He was much keener than I, and said he would help raise the child so I could finish graduate school. But when I tried to project myself into that future and that life, I found it just did not work. When you are wife No. 3 of a serial philanderer with a steady fresh supply of young flesh (he was a university professor), you probably realize that you haven’t entered into a marriage built to last. And ultimately it did not.
Before we went our separate ways, and without the burden of parenthood weighing on us, we decided to spend a year teaching abroad. We settled on China, or rather said yes when an offer came to us out of the blue. At one of many going-away parties, the wife of one of my colleagues in the philosophy department, after asking if I had children or planned to, blurted out a version of what my mother had said years before, telling me that having children was essential because it opened one up to a world of opportunities one would otherwise not have. What stands out in my mind from this conversation was this woman’s anger. At the time, I couldn’t figure out why my decision not to have kids made her so angry, why she insisted so stridently that I was wrong not to want them. I wasn’t angry with her for wanting and having them, after all. What I learned, from this and other conversations on the subject with women who are parents, is that it is usually quite difficult to explain your decision not to have children to those who have chosen to do so without offending them in some unspoken but very deep and palpable way. I believe this is partly because many of them are secretly envious of the child-free and also—perhaps more importantly—see the child-free person as a repudiation of their own life choice and, worse, as a sign of “non-envy.” Imitation is the highest form of flattery and the surest sign of envy. My child-free state was like a mirror that did not reflect their image. I gradually learned to provide nonanswers to questions pertaining to children and parenthood. (It is interesting to note, from my own experience, that men rarely if ever asked me about children and my lack of them.)
If you ask me, the debate about whether life is better with or without children is a stale one. Or rather, it really isn’t about children, but rather about who has the better life. Who is happier? There is no satisfying way to answer this question. We all know happy people with kids, happy people without them, unhappy people with kids and unhappy people without them.
One of my ex-mothers-in-law, the French one, used to say this: On ne peut pas être et avoir été. That translates roughly as You can’t both be and have been, and it is about the impossibility of escaping time. Just ask Proust! It can be extrapolated to the bogus case for or against having kids. The fact is, it’s impossible to both have them and not have them. You choose one (if you are lucky enough to be able to choose) and the life you go on to make will be shaped by that choice—simply because your life is shaped by every decision you make, often in unintended ways.
Last week I went to a baby shower. It was held for a dear friend who is 40 and on the verge of publishing her first book, a memoir about the consequences, given her religious affiliation and upbringing, of expressing the desire not to have children, ever. She hasn’t changed her mind, though she has a few more years to do so. She’s still child-free. But her girlfriends, some of whom are currently raising children and some of whom, like me, are not and never will, decided to celebrate the birth of her book, a labor of love that required an incredible degree of focus, energy, selflessness, postponement of gratification, and sleepless nights. Sound familiar?
Previously in this series:
No Kids for Me, Thanks: I Tied My Tubes at 26
No Kids for Me, Thanks: I Value My Professional Mobility
No Kids for Me, Thanks: I’d Rather Die Alone
No Kids for Me, Thanks: I Don’t Enjoy Alien-Parasites | 53,525,588 |
The head of Islamic State in Afghanistan, Abdul Hasib, has been killed, the government has said.
Hasib was killed in an operation led by Afghan special forces in the eastern province of Nangarhar, President Ashraf Ghani announced.
He was appointed last year after his predecessor Hafiz Saeed Khan died in a US drone strike and is understood to have ordered a series of high profile attacks.
One was on the main military hospital in Kabul in March by a group of militants dressed as doctors.
The US and Afghan forces, backed by drone strikes and other air support, have mounted a number of operations against IS this year in which dozens of fighters, mainly in Nangarhar on the Pakistan border.
Defeating IS in Afghanistan remains a top priority for the US which in April dropped its largest non-nuclear bomb on a network of caves and tunnels killing 94 fighters, including four commanders. | 53,525,632 |
U.S. Constitution For Dummies
Your complete guide to understanding the U.S. Constitution.Want to make sense of the U.S. Constitution? This new edition walks you through this revered document, explaining how the articles and amendments came to be and how they have guided legislators, judges, and presidents—and sparked ongoing debates along the way. You’ll get the lowdown on all the big issues—from separation of church and state to impeachment to civil rights—that continue to affect Americans' daily lives. Plus, you’ll find out about U.S. Constitution concepts and their origins, the different approaches to interpretation, and how the document has changed over the past 200+ years. Inside, you’ll find fresh examples of Supreme Court Rulings such as same sex marriage and Healthcare Acts such as Obamacare. Explore hot topics like what it takes to be elected Commander in Chief, the functions of the House and Senate, how Supreme Court justices are appointed, and so much more. Trace the evolution of the Constitution Recognize the power of the U.S. Supreme Court Get details on recent Supreme Court decisions Find new examples of the Bill of Rights Constitutional issues are dominating the news—and now you can join the discussion with the help of U.S. Constitution For Dummies. | 53,525,791 |
President Trump Donald John TrumpOmar fires back at Trump over rally remarks: 'This is my country' Pelosi: Trump hurrying to fill SCOTUS seat so he can repeal ObamaCare Trump mocks Biden appearance, mask use ahead of first debate MORE's support in Texas is at a statistical tie with several potential 2020 challengers, including one who has already announced a bid, according to a poll released Thursday.
In the Quinnipiac University survey of Texas voters, Trump gets the support of 47 percent respondents in hypothetical match-ups with former Vice President Joe Biden Joe BidenOmar fires back at Trump over rally remarks: 'This is my country' Trump mocks Biden appearance, mask use ahead of first debate Trump attacks Omar for criticizing US: 'How did you do where you came from?' MORE, Sen. Bernie Sanders Bernie SandersButtigieg stands in as Pence for Harris's debate practice Bernie Sanders warns of 'nightmare scenario' if Trump refuses election results Harris joins women's voter mobilization event also featuring Pelosi, Gloria Steinem, Jane Fonda MORE (I-Vt.), and former Rep. Beto O'Rourke Beto O'RourkeJimmy Carter says his son smoked pot with Willie Nelson on White House roof O'Rourke endorses Kennedy for Senate: 'A champion for the values we're most proud of' 2020 Democrats do convention Zoom call MORE (D-Texas), who received 46 percent, 45 percent, and 46 percent support, respectively, from voters in the poll.
ADVERTISEMENT
Each of those hypothetical contests fall within the poll's margin of error, 3.4 percentage points. In addition, Trump sits within single digits of other announced 2020 Democratic challengers in the poll, including former Housing and Urban Development Secretary Julián Castro and Sens. Kamala Harris Kamala HarrisButtigieg stands in as Pence for Harris's debate practice First presidential debate to cover coronavirus, Supreme Court Harris joins women's voter mobilization event also featuring Pelosi, Gloria Steinem, Jane Fonda MORE (Calif.) and Elizabeth Warren Elizabeth WarrenHarris joins women's voter mobilization event also featuring Pelosi, Gloria Steinem, Jane Fonda Judd Gregg: The Kamala threat — the Californiaization of America GOP set to release controversial Biden report MORE (Mass.)
Harris, Castro and Warren each won the support of 41 percent of poll respondents in potential match-ups against the president in the poll, though against Castro, a San Antonio native and former mayor, Trump won only 46 percent of the hypothetical vote, compared to 48 percent against the two senators.
Biden and O'Rourke are the only Democrats with favorability ratings above water in the poll, with Texas voters who were surveyed approving of Biden by a margin of 48 percent to 38 percent and O'Rourke by a margin of 44 percent to 40 percent.
The rest either had largely negative favorability ratings among a majority of Texas voters, or had little name recognition.
"Former Vice President Joe Biden has the highest favorability of any of the contenders and has a better net favorability than President Trump," said Peter Brown, the Quinnipiac poll's assistant director. "Former U.S. Rep. Beto O'Rourke also does relatively well on favorability and in a matchup with Trump, but that may well be due to O'Rourke being a home-state favorite.
"But former Housing Secretary Julian Castro, who is also a former San Antonio mayor, does not do as well as O'Rourke," Brown added.
Quinnipiac's poll surveyed 1,222 Texas voters between Feb. 20-25. | 53,526,168 |
Leather Baracuta Holster
Carry your Baracuta and up to 5 replacement blades in this rugged black leather knife holster. Features two pockets inside, one for your knife and one for your blades. Wide belt loop at the back will keep your Baracuta close at hand and secure. Knife and blades sold separately. | 53,526,395 |
MasterKey Fee Schedule
Available for
Subscribing to MasterKey
The MasterKey service is provided on a subscription basis with a License Fee and an annual Maintenance Fee based on the size of your practice.
Please note to access MasterKey you must have a current practice subscription to Masterspec and each user must have a personal Masterspec user profile and password. If you do not have a Masterspec subscription you can go to the sign-up links at the bottom of this page.
*Masterspec Basic or above - will not work with Masterspec Minor or on Masterspec Link
Payment is accepted by cheque or direct debit. If you wish to pay by internet banking, please email [email protected] for banking details. If paying monthly complete the direct debit authority, sign at the bottom before posting it to us.
Once payment is confirmed we will either email you the download link for the MasterKey Revit installer, or notify you when your subscription is activated on ArchiCAD. | 53,526,731 |
Flora dec christmas
December 9, 2017 How can this be a reaction to the truth if the truth is exactly what I do not know at that time? ? ? By Luciana Flora, December 6, 2017 Thank you for visiting FloraDec Sales online. For more than 50 years, FloraDec Sales has been Hawaii's largest source for art, craft, floral, wedding, scrapbooking& needlework supplies at discount prices. Thank you for visiting FloraDec Sales online. For more than 50 years, FloraDec Sales has been Hawaii's largest source for art, craft, floral, wedding, scrapbooking& needlework supplies at discount prices.
Alaskan. I was tapped to be A SANTA FOR A Xmas IN July this Flora dec christmas and needed a beard and wig. I searched a lot placea but it was July. Finaly i went to Floradec amd they checked the computer, climbed a tall ladder and. . wait for it. . Came to Flora-dec to look for Christmas decorations, they have TONS available, but very expensive. I also came to look for vases, and let me tell you they have every style, color, shape that you need!
Why It Doesn’t Really Feel Like Christmas to Me By Flora on December 26, 2012 in England, Personal When I was younger, we used to spend Christmas at my grandma’s house in the country. Dec 18, 2016 · On December 17th we will be doing a very special triple bottle release, just in time for Christmas! We will be giving out wristbands starting December 14th, in the brewery, at 5: 00pm. flora insider. December 2014. newsletter devoted to the people, purpose, & products of Flora.
30pm each day, come along for some Christmas shopping! This Flora& Flutter Paper Pumpkin alternative is designed for the younger crowd. The" leaf" mat was from the kit. The Pandas were stamped and hand cut from the really popular Party Panda stamp set, placed on a Tranquil Tide cardstock background, and used one of several sentiments included in the kit.
Book now at Villa de Flora at Gaylord Palms Resort in Kissimmee, FL. Villa De Flora Copy, December 15, 2016.
Villa De Flora, December 15. Father's Day, Mother's Day, Christmas ( love the decoration )and brought special friends just to eat some awesome food and to enjoy the ambiance. Our favorite waiter is Phillip and we request him every. Complete import/export history of Flora-dec. Their September 22, 2007 import from Chane Hua Electrical Co.ltd in Hong Kong was 1430KG of Christmas Light Sets Ul Christmas Light Sets Shipp.
The latest Tweets from Flora (@Flora). Get a daily dose of goodness, scrummy recipes and the ups and downs of family life from Flora UK on Twitter Christmas plants are various flowers or vegetation from garden plants associated with the. | 53,526,741 |
Golda Meir student wins finance essay contest
MILWAUKEE (CBS 58) – A Milwaukee middle school student is taking home top honors for his knowledge of economics.
Alex Eisenberg is a 7th grader at Golda Meir School.
He came in first place in an essay contest that puts students’ knowledge of capital markets, stocks, and bonds to the test.
Alex wrote his essay about how he would invest $100,000 in the World Wildlife Fund.
He says it was a lot of hard work to come up with his final draft.
“He’s a hard worker. He’s patient with his parents who demanded that he re-write that essay about four times,” said Alex’s dad, Mark Eisenberg.
“I always have to make two copies for whatever essay I do, small or big and I think the challenge sometimes is being able to keep that positive attitude going into every new draft,” said Alex Eisenberg.
Alex was given a $100 gift card for winning the contest. His whole class celebrated with a pizza party. | 53,526,979 |
Tag Archives: Sagarika Chakraborty
I started reading this book in haste for two reasons-One it’s author is my best friend and two because I had to do this review today itself, this being a part of the BlogAdda book review program. But then when your brain is in a mission oriented form usually it’s quick glance and fast reading which ends up in not very apt review about anything. I didn’t want that to happen to my review, especially this book. So, I told myself to relax, not have that sword of time line hang on my head and read patiently, but you know how it is when your brain has already decided on something, sigh! To prove my point against the will of my brain, I brewed a nice large mug of coffee for self and picked up this book, sat in peace and started turning the pages….and then this is what I have to say at the end….
About the book
Author
Sagarika Chakraborty
Picture of the Author
ISBN
978-93-81523-06-3
Price [INR]
295/-
Pages
189
Main Plot
Short Stories and Poems on ‘Womanhood’
No. of Characters
1 lead-a woman across the book
Tone of writing
Poetic and Refined.
My take on the book
Do I recommend
Yes
Reasons being
> I think I felt quiet speechless when I was done reading the entire stuff, these 189 pages. Every story leaves you jaw dropped, smiling, thinking, relating to and crying your hidden tears-the ones that ache to flow down your cheeks but somehow can’t make way!>The stories are all very practical, already heard of and not very new to read but the whole point here is the way these have been told and expressed- reaches the right corner of your heart. It makes your heart beat faster as it should after hearing such things from your friends, relatives and news media.>After reading the book your brain tells you to work upon instead of just sighing and clicking your tongue.
>The book is about womanhood, agreed but it is in no way written from a feminist point of view. Often we confuse womanhood with feminism; this book clears that cloud of confusion.
>If I were to pick my favourite story / poem of the lot I would never be able to. Taking that risk of sounding biased and clichéd I want to say that there is not a single story or a poem to pin point and say it’s the best…the entire lot is to be called the best cause all put together maketh this wonderful piece of writing! Thoughfewof my favorite patches are listed below, these touched me deep and brought tears to my eyes, literally!
>It covers all the roles of a woman from every stage of her life. The woman reader would be able to relate to all these roles because either she has gone through some of them or she dreams and imagines the others.
>There is not a single wave of confusion in stating what the author wants to express.
>The book tells the reader how much efforts and research has been put forth to bring out this excellent work out in public.
On the other hand
>The book is a bit on the gloomy side, for it clearly states the truths of a woman’s life, but then I’m self-countering my point here-the author herself has stated it as a collection of poignant stories and poems woven around the theme of womanhood, which pretty much justifies it’s contents!>Some percentage of male fraternity might find this a typical women thing.
Few of my favorite excerpts :
Tell me if you don’t find this heart wrenching fromCan you hear me,Ma?
“But the darkness of death is better than an unequal life that lied ahead-you should know that too! So sleep my little one…sleep for a while in my womb, for tomorrow the same is going to be rechristened as your tomb!”
Or you don’t feel helpless from Naked
” ‘But who committed this crime?’ asked a voice that was quiet for so long. Everyone looked at him. They said that it was besides the point. Young male blodd would naturally have boiled upon seeing such an easy prey. It wasn’t their fault; she led them on. Hence she was completely responsible for what had befallen her. The dictum passed, she lay there, more naked now! “
Or you don’t completely agree when you read Behind those whispers
” That even today the blood is dirty and the entire process weird,that despite so many feminist talks there are still fears with which the minds are still tainted and smeared”
Or you don’t want to support this from Finding an ideal mother for my unborn child
“I want to usher in a period where two generations shall live in harmony, where both shall dare to dream and help each other to achieve those dreams. I have chosen to become a mother today only after learning that I shall not follow your footsteps.So my preceptor, I invite you to my house a few years hence,when you shall definitely observe how my little bundle of joy will appreciate the fact that just like him/her I too am a human being who has a life to live! Together we shall create an equal world of our conjoined dreams!”
Or you don’t feel utterly disgusted at the current state of our times from The gift called life
“What is this life worth, Oh Gods! I ask, where everything is glorious so long as it is a tea-table discussion, when in reality a blame game is ready to surface for each little deviance?……..but then I guess it is all my fault for asking such a tough and controversial question in the first place.” | 53,527,015 |
## Write plugin - run your code easily with FFdynamic
---------
### Dehaze Plugin
Suppose we have developed a dehaze algorightm with openCV dependency, and we would like to use it in a transcoding pipeline, namely, do deahze after video decode, then encode the dehazed stream and publish it.
In FFmpeg, we would make dehaze as a filter, do according coding and makefile changing, then re-compile the FFmpeg.
In FFdynamic, we could write dehaze as a plugin and then link FFdynamic library without modify existing code.
#### FFdynamic implementation register and coding
There are two things needed:
1. coding dehaze implementation (inherits from FFdynamic's DavImpl class and implement according interface)
2. register this implementation
For **coding** part, it is just a make dehaze fit the data flow requirement of FFdynamic, please refer to the [source](ffdynaDehazor.cpp)
For **register**, we have two ways, register it to an existing component category as an implementation, or create an new component category and register it as implementation to the newly created category.
* method 1: register to existing one
``` c++
DavImplRegister g_dehazeReg(DavWaveClassVideoFilter(), vector<string>({"pluginDehazor"}),
[](const DavWaveOption & options) -> unique_ptr<DavImpl> {
unique_ptr<PluginDehazor> p(new PluginDehazor(options));
return p;
});
```
Here, we register 'PluginDehazor' as an implementation of already existing component 'VideoFilter';
* method 2: create new category and do register
``` c++
/* create a new dehaze component category */
struct DavWaveClassDehaze : public DavWaveClassCategory {
DavWaveClassDehaze () :
DavWaveClassCategory(type_index(typeid(*this)), type_index(typeid(std::string)), "Dehaze") {}
};
/* Then register PluginDehazor as default dehazor (by provides 'auto') */
DavImplRegister g_dehazeReg(DavWaveClassVideoDehaze(), vector<string>({"auto", "dehaze"}),
[](const DavWaveOption & options) -> unique_ptr<DavImpl> {
unique_ptr<PluginDehazor> p(new PluginDehazor(options));
return p;
});
```
#### Define an static option (used when create the component)
For options passing, there are also two ways.
* method 1: define derived clsss from DavOption (normally for component level options, namely common to all implementations)
``` c++
struct DavOptionDehazeFogFactor : public DavOption {
DavOptionDehazeFogFactor() :
DavOption(type_index(typeid(*this)), type_index(typeid(double)), "DehazeFogFactor") {}
};
// Then set/get it like this:
DavWaveOption videoDehazeOption((DavWaveClassDehaze()));
videoDehazeOption.setDouble(DavOptionDehazeFogFactor(), 0.94);
double fogFactor = 0.94;
videoDehazeOption.getDouble(DavOptionDehazeFogFactor(), fogFactor);
```
* method 2: use 'AVDictionary' (just the FFmpeg's way, flexiable but not type checked, usually for implementation level options)
``` c++
videoDehazeOption.setDouble("FogFactor", 0.94);
// then in dehaze component, we could:
double fogFactor;
int ret = options.getDouble("FogFactor", fogFactor);
if (ret < 0)
.......
```
So, the rule of thumb:
* defines derived DavOption class for component level options; such as: DavOptionInputUrl for all demuxer
* use AVDictionary for implementation level options.
#### Register an dynamic event
We could register dynamic event to change the parameters settings during running.
This is an example that we register an run time event, change 'FogFactor', send according request would change Dehaze's FogFacotr during process.
``` c++
std::function<int (const FogFactorChangeEvent &)> f =
[this] (const FogFactorChangeEvent & e) {return processFogFactorUpdate(e);};
m_implEvent.registerEvent(f);
```
#### Test dehaze with visualization
Here is the test for our newly ceated 'dehaze' plugin, we make the test with the following pattern: mix dehazed and original video frame in one screen, then encode it as one file. This allows use see the original and dehazed video at the same time.
```
Demux |-> Audio Decode -> |-> Audio Encode ------------------------------------------> |
| | -> Muxer
| |-> Dehaze Filter -> | |
|-> Video Decode -> | | Mix original and dehazed ->| Encode ->|
| -----------------> |
```
The result is this (the dehaze effect is not good, but it is not the point).
![dehazed mix image](../asset/dehaze.gif)
You can refer to the source file [here](ffdynaDehazor.cpp). (NOTE: the dehazed algorightm itself (dehazor.cpp) is from github, but miss the link).
#### Run the dehazed example
```
Under pluginExample folder: (need opencv libraries installed)
mkdir build && cmake ../ && make
./testDehazor theInputFile
```
| 53,527,075 |
"Feser... has the rare and enviable gift of making philosophical argument compulsively readable" Sir Anthony Kenny, Times Literary Supplement
Selected for the First Things list of the 50 Best Blogs of 2010 (November 19, 2010)
Friday, January 2, 2015
Postscript on plastic
What better
way is there to start off the new year than with another blog post about
plastic? You’ll recall that in a
post from last year, I raised the question of why old plastic -- unlike old
wood, glass, or metal -- seems invariably ugly.
I argued that none of the seemingly obvious answers holds up upon closer
inspection. In particular, I argued that
the “artificiality” of plastic is not the reason, both because there are lots
of old artificial things we don’t find ugly and because there is a sense in
which plastic is not artificial.
On that
latter point, it was fun recently to read the Bruce Jones and Adolpho Buylla story “Plastic” in Alien
Worlds #5 (from which the
illustration above is taken). Set in a
war-torn and plastic-filled future, it features a character who complains that the
everyday plastic objects that surround them “ain’t even real plastic” but are made from the hides of the alien creatures
that are central to the story. A world
with fake plastic. Wrap your mind around that!
On the
question of why old plastic is ugly, a novel possible answer is suggested by a
passage in Donald Fagen’s book Eminent
Hipsters. Fagen writes:
A lot of the malls and the condos are
much nicer now than when I was a kid in postwar New Jersey, at the beginning of
all that. But, like many of my
generation, I’m afraid I’m still severely allergic to all that “plastic,” both
the literal and the metaphorical. In
third world countries, lefties associate it with the corporate world and call
its agents “the Plastics.” Norman Mailer
went so far (he always went so far) as to believe that the widespread
displacement of natural materials by plastic was responsible for the increase
in violence in America. Wood, metal,
glass, wool and cotton, he said, have a sensual quality when touched. Because plastic is so unsatisfying to the
senses, people are beginning to go to extremes to feel something, to connect
with their bodies. We are all, Mailer
thought, prisoners held in sensual isolation to the point of homicidal madness. (p. 130)
As with
pretty much everything Mailer said, the only sane reaction is:
“Seriously?” The idea that plastic has
anything to do with an increase in the murder rate is obviously too stupid for
words. However, the suggestion that
plastic lacks the sensual appeal that wood, glass, etc. have might seem
plausible.
But it
isn’t, really. Think of small children,
who are the most sensation-oriented of human beings and whose taste for plastic
is pretty obvious. Some of my most vivid
memories from childhood have to do with the strange appeal certain plastic toys
had. There was, for example, that Fisher
Price Milk Bottle set that so many kids in the late 60s and early 70s cut
their teeth on. I’ll be damned if that
orange bottle in particular doesn’t still look pretty good. Even adults chew on plastic all the time -- pen
caps, straws, the frames of their glasses, etc.
So, once
again it’s Mailer 0, Reality 1. My own
suspicion is that the correct explanation of the ugliness of at least the most
extreme cases of ugly old plastic -- such as the detritus that
washes up on beaches -- might lie in a consideration raised in another
post from last year, on technology. Recall
that from the point of view of Aristotelian metaphysics, the distinction
between what is “natural” and what is “artificial” is more perspicuously
captured by the distinction between what has a substantial form and what has a
merely accidental form. For some man-made
things (e.g. new breeds of dog, plastic) are “natural” in the sense of having a
substantial form, even though the usual examples of man-made things (e.g.
tables, chairs, machines) have only accidental forms. And some “natural” things (e.g. a random pile
of stones) have merely accidental forms, even though the usual examples of
natural objects (e.g. plants, animals, water, gold) have substantial
forms. (Full story, as usual, in Scholastic
Metaphysics.)
Now, things
having substantial forms are metaphysically more fundamental, since accidental
forms presuppose substantial forms. But
as I noted in the post on technology just linked to, in a high tech society,
the metaphysical priority of the “natural” world (in the sense of the world of
things having substantial forms or true Aristotelian “natures” or essences) is
less manifest, since in everyday life in such a society, we are surrounded by
objects whose raw materials are so highly processed that it is their accidental
forms rather than the underlying substantial forms that “hit us in the
face.” Furthermore, many of these
objects consist of materials -- such as plastic -- which have substantial forms
and are thus in an Aristotelian sense “natural,” but nevertheless don’t have
the “feel” of being natural in the
way wood or stone do, since unlike those substances, they don’t occur “in the
wild.” So, in a high tech society, the
forms of things we encounter in everyday life -- the order they exhibit -- can
easily seem to be all of the “accidental” kind (in the technical Aristotelian
sense), and in particular of the man-made kind.
Now,
consider what happens when something having an accidental form but nevertheless
made out of manifestly natural (in the
sense of substantial-form-having) materials decays -- an old
castle or wooden
shack, say, or a
tank rotting in Truk lagoon. The
accidental forms disappear, but the underlying substantial forms only become
more evident. This may be the reason
they don’t seem ugly, and can even seem beautiful. For as Aquinas says, “beauty
properly belongs to the nature of a formal cause.” As the relatively superficial accidental
forms give way, but the very well-known to us and metaphysically deeper substantial
forms of things like stone, wood, and metal become more manifest, the objects seem
no less beautiful.
Contrast
that with objects made out of plastic.
Here the raw materials also have a substantial form, as all raw
materials underlying accidental forms do.
However, it is a kind of
material -- and thus a kind of substantial form -- which does not occur “in the
wild” but takes much human effort to bring into being. Hence it doesn’t have the feel to us of a natural kind of
stuff. It is also a very protean stuff. There is no one shape, texture, or color that
plastic tends to have. So, it can seem that the only form -- the only
order -- a plastic object has is the kind we have imposed on it for our particular
purposes. When it loses that -- as when
a plastic toy becomes seriously damaged or a plastic bottle melted or a plastic
plate brittle and missing pieces -- it can intuitively seem like something having no “formal cause” or principle or order at all.
And thus it seems ugly.
If this explanation
is right then it would seem to follow that if plastic occurred “in the wild” in
the way that stone, metal, and wood do, we might tend to find decaying plastic
objects no more ugly than we do decaying wood, metal, or stone objects. It would be hard to test that implication,
since we just know too much about plastic ever to get it to seem like a wild
kind of stuff on all fours with rocks, wood, etc. But maybe Fagen would disagree. He laments that, unlike people at the time
Mailer was commenting, “the Babies seem awfully comfortable with simulation,
virtuality, and Plasticulture in general” -- where by “Babies” he means the “TV
Babies” born after about 1960, for whom television has been “the principal
architect of their souls.” So, perhaps
the Babies, or the babies of the Babies, or maybe the babies of the babies of
the Babies, will eventually come to see broken old plastic the way people have always
seen old stone and wood. Maybe yellowing
cracked plastic lawn furniture will become a regular sight in high end antique
shops, and old broken pocket calculators and telephones will become highly
sought-after conversation pieces for the coffee table.
89 comments:
Another Catholic author on plastic (he is writing of a character based on himself):
His strongest tastes were negative. He abhorred plastics, Picasso, sunbathing, and jazz — everything in fact that had happened in his own lifetime. The tiny kindling of charity which came to him through his religion sufficed only to temper his disgust and change it to boredom... ― Evelyn Waugh, The Ordeal Of Gilbert Pinfold (1957).But his lifetime coincided with the rise of modernism and triumph of Entzauberung.
I'm just beginning to get into Thomism. So far I've usually found Feser very convincing when he attacks another position and rather unconvincing when he advances his own. E.g. when I read Philosophy of Mind, I agreed with him the whole way through when he was tearing down materialism, but when he finally got to hylemorphism, I said, "I don't see how that solves any of the problems you've brought up with the other theories."The distinction between accidental and substantive forms is part of what I'm as yet unconvinced by. Why would a new dog breed of all things have a substantial form? You see all kinds of stuff like this at the borders- for example, people claiming that the white German Shepherd isn't a true GSD, or X breed can't have floppy ears and then a floppy eared dog is born. And of course, I can breed two runt Great Danes today and people would say, "That's just a small Great Dane," but if I do that for several generations, eventually, I can call that a new breed. When does that become a substantial form? Or what about the breeds that a crosses between pre-existing breeds, like the Dobermann or the bull terrier. Do they have substantial forms? If so, does your typical mutt have the substantial form of being a dachshund/terrier/poodle mix?I am not at all trying to be dismissive-I genuinely hope that someone will have a good explanation for the distinction between substantial and accidental forms, because so far, I either don't understand it or I don't agree with it (unless there's the possibility that, as Feser suggested in the comments, the only substantial forms are the fundamental particulars and the form of living vs. non-living and rational vs. irrational. That seems more plausible.)
A substantial form is the form of a substance. Every living thing is a substance and thus has a substantial form, whether or not it passes along exactly the same substantial form to its biological descendants.
(I also wouldn't be inclined to regard a dog breed as having its own substantial form anyway; I'd be more inclined to say that every dog has the substantial form of a dog. But that would just push your "borders" question up a level.)
Thanks Scott. I think that goes back to my comment that Feser's comment that some had suggested that there is a formal distinction between the living, the non living and the rational, but there weren't other substantial forms seems more convincing. If you want to say there's a real distinction between living and non-living and living but irrational and the rational, that seems sensible.But otherwise I don't see where this line between "accidental pile of rock" and "the substance of a sedimentary rock" gets made. (A sedimentary rock would start out, presumably as an "accidental" pile of sediment, and then it becomes a "substance" once it becomes what one would call "a rock," but that seems very, very gray to me and makes me inclined to nominalism.)And as you acknowledged, even the question of boundaries among living things gets very hairy. (Any biologist will tell you that the question of what is a species gets very difficult at the borders. For example, a strong majority of biologists now acknowledge the wolf and the dog as the same species.)I don't expect commenters to guide me the whole way through. Is there a good article-length introduction to scholastic metaphysics that deal with these border issues? I'd buy Scholastic Metaphysics, but I've read a good amount of Feser and again, either I don't understand his explanations or I don't agree with them. (Not to knock him; it could be me or it could be just that he dumbed it down too much in TLS and Philosophy of Mind in which case I should probably buy SM.) The boundary issue is probably my biggest impediment-when does this pile of sediment cease to have an accidental form and become its own substance? When does this group of animals become distinctive enough to have their own substance? The gray areas in between incline mean to conclude that there isn't a substantial distinction-we could draw the lines anywhere and we draw them where they're most helpful to us. But I'm still very open to convincing and I know nominalism leads to equally hard philosophical difficulties.
Also, if people will bring out the biological definition of species to say, "No, there's no boundary problem on substantial form for living things," there are lots of blurry lines on the borders and anyway, it doesn't work for asexual species.
I suppose I'm a bit unclear about what you take the distinction to be. For instance, why do you think that the fundamental-particulars-and-living-beings view is "more plausible"? What's the ground of plausibility here? Continuity is out, because the claim is an explicit denial of continuity, requiring a big jump between fundamental substances and living substances; analogy seems out, because on pretty much any analogy you could build, living substances and fundamental substances are not obviously going to be immediate analogues, without any intermediary analogues. Likewise, the view seems to run directly afoul of the same problem of borders that you give -- particularly at the border between things-that-are-fundamental-substances-in-accidental-unity and living-things-in-substantial-unity -- so it doesn't obviously resolve any problems that might exist on another view. There are principles on which it would be more plausible, of course; my point is that making this sort of plausibility judgment seems to require that a rather robust and non-minimalist view of the distinction is already on the table, and it would be necessary to know what it is in order to say anything significant.
Sorry, Scott, I got hung up on your parenthetical and didn't respond to your main post. By saying each living thing is a substance and thus has a form, you almost seem to be suggesting that each living thing is its own form. Am I understanding you correctly? I guess that might make sense although I'd have to discuss the implications further, but what about (another boundary problem) for example, those cancer cells that can grow indefinitely in a petri dish. It seems strange to either conclude that "They have the substance of Bob," when they are in the petri dish, or that they are a distinct substance even inside of the person, but those would seem to be the only possible conclusions.
Brandon, I guess by saying "more plausible," I mean that I can see why living things and non-living might be distinct, and I can see why there is a jump between the rational and irrational, but I don't really see why we would regard any other subdistinctions as in some sense real rather than nominal. But I guess it's more of a gut thing. Like I said, I think I need a more general introduction
"The boundary issue is probably my biggest impediment-when does this pile of sediment cease to have an accidental form and become its own substance?"
I'm speaking only for myself here, but I'd say it doesn't. A sedimentary rock seems to me to be a mere aggregate, not a substance.
A chemical compound is another matter. I would say that water has its own substantial form, different from those of hydrogen and oxygen; likewise, table salt has one that differs from those of sodium and chlorine.
But as Ed has argued elsewhere, even if that's wrong, there would still be substantial forms at the "bottommost" level of physical matter.
"[Y]ou almost seem to be suggesting that each living thing is its own form."
Well, I'm saying that every living thing has its own substantial form. One dog doesn't literally have the same substantial form as another dog; they're formally identical, but not numerically.
"[W]hat about (another boundary problem) for example, those cancer cells that can grow indefinitely in a petri dish. It seems strange to either conclude that 'They have the substance of Bob,"'when they are in the petri dish[.]"
Sure, and no Aristotelian or Thomist would say that. Even Bob's hand is a "hand in name only" when it's severed from Bob's body. What has Bob's substantial form is Bob.
Scott, I used the example of cells in a petri dish because they go on living (as opposed to the hand which dies). Do they "gain" a new substance when separated? (They were a part of Bob; now they have their own substance) Or do they become some accidental group of cells, each with their own substance? Or what?I guess my question really comes down to what is the principle by which we distinguish substances to say, "This difference makes these two things different substances, whereas this other characteristic is only an accidental difference, and they are substantially the same."? The examples Feser has used don't seem to clarify that principle.
For living things, the usual principle is that a substance exhibits "immanent causation" and not just "transeunt causation." (See for example here.)
That's a pretty standard A-T understanding of "life," and the reason I invoke it here is that we can use it in a rough and ready way to find the "boundaries" of a living organism: the organism is at the level at which such causation makes sense. To take a silly example, "the top half of a dog" isn't an organism (living substance) because some of its causal processes terminate in the bottom half of the dog and vice versa. We don't get full-blown immanent causation unless we take the entire dog into account.
As for the cells in the Petri dish, sure they go on living, and so at least each cell now has a substantial form. As with the hand, though, that's only because they're no longer part of Bob. When they were part of Bob, they existed only "virtually" as cells (though of course they really did exist as parts of Bob!).
The reason I asked is that we are all in danger of flailing in the dark as to what might be useful to you without some clearer idea of what the difficulty is. It isn't clear where the locus of the confusion lies.
For instance, your original statement was in terms of the distinction between accidental and substantial forms; but your arguments don't seem to be about the distinction itself at all: boundary questions are not about a distinction, but about how we know how to apply it in some (but not all) individual cases. Likewise, when we talk about substantial forms, every individual substance has its own distinct substantial form; so what you must mean is something like 'typical substantial form, considered abstractly', but what is typical is relative to population (like breeds or species), and thus will not be purely a matter of substantial forms themselves.
"This difference makes these two things different substances, whereas this other characteristic is only an accidental difference, and they are substantially the same."
Sensible differences are all accidental differences; identifying substantial differences requires causal reasoning about what accidental differences imply. But it doesn't sound like the locus of your problem is at such an abstract level.
Brandon, actually, I see that my examples are not helpful. I guess I need help figuring out what my questions are. I use the examples to say that he boundary issues makes "substance" seem unreal or arbitrary, which itself would lead to nominalism. (Whether you draw the line here or here, or whether you classify everything according to color or weight or what have you, it's just a mental classification system and doesn't reflect any deeper reality. Maybe it's the reductionist mindset's unstated assumptions.)The example given of the substance of a dog breed was part of what set this discussion off. Perhaps Feser shouldn't have used an example that apparently doesn't have universal agreement among Thomists. But I think that discussion does get to part of my problem-what is the rule that Thomists are applying that some say that a dog breed is its own substantial form and Scott says "the dog" is its own substantial form, and apparently some other Thomists say that each living thing is its own substantial form?Your reply about a substantial differences and causal powers does seem useful, so I'd like to know more about that if you can go further. I think it is the abstract question I want to know.
A problem you might bump up against is that the essence of a thing is isn't at all easy to know completely, since in a sense that is almost an empirical matter.
So I'm guessing you are viewing forms in a rather Platonic fashion and don't realize it comes down to the 'essence' of a thing. So the 'boundaries' at some point will move from creature A and then become creature B. Within the variations of a population you might find very few have the greatest instantiation of an essence. Maybe 'Evolution' (mutation) might be required for some member of a species to get there.
This is another area where I fell I have moved slightly away from the mainstream Thomist view. After all united substances do seem to exist and a greater explanation of what it means for something to be virtually participating in a substantial form is a question worth coming back to again in metaphysical speculation.
I think you're seeing disagreements where there are none because of some carelessness with terminology. No Thomist in the world would ever say that a dog breed, a dog, or a living thing is a substantial form. Every Thomist in the world would say that each living thing has its own substantial form. There might be minor disagreement here and there about whether two dogs of different breeds have substantial forms that are exactly alike or just very very similar, but that's about it.
(Also, and less importantly, making substances unreal or arbitrary needn't lead to nominalism. Substantial forms are far from the only candidate for real universals.)
Thanks Irish Thomist.Brandon, Scott, and Irish Thomist: Scott says that "For living things, the usual principle is that a substance exhibits "immanent causation" and not just "transeunt causation." "Is it safe to conclude that in the Thomistic view, there are different principles in which to discern what is a substance for things qua things, living beings, and rational beings?If so, why are they all called "substantial forms"? What's the unifying principle?
Also, Ed didn't say that a dog of a new breed necessarily has a substantial form different from that of other dogs; he just said it has a substantial form, period, even though there's a sense in which the new breed is man-made.
Scott, that really does clear up a lot. So would this mean that the individual dogs within a new breed would each have substantial forms as living things and Feser's point is simply that human manipulation does not take away that substantial form?Similarly, the polymer that constitutes the plastic would have a substantial form in a way that a physical mixture (rather than a chemical compound) would not?
"So would this mean that the individual dogs within a new breed would each have substantial forms as living things and Feser's point is simply that human manipulation does not take away that substantial form?"
Pretty much. At any rate, if a dog of a new breed really does have a substantial form that differs from that of previous dogs, that's not relevant to Ed's point. But as far as your questions are concerned, the key point is that, yes, each individual dog of any breed has its own substantial form, just as any living thing (or non-living substance) does.
"Similarly, the polymer that constitutes the plastic would have a substantial form in a way that a physical mixture (rather than a chemical compound) would not?"
(Realizing that Scott won't answer for some time, but he can answer later or others can answer now):Most of Scott's reply is very helpful, but the part where he says, "The substantial form of any "thing" is that by which the thing is what it is. It's basically the same as the thing's "formal cause."
How then, practically, do we distinguish differences that distinguish two different substances as different substances, and merely accidental differences that seem important to the thinker?
And by what principle do we say that plastic has the substantial form of plastic and a bacterium as a living thing has a substantial form, but a solar clock has no substantial form (per Feser in this post), it is just an accumulation of metal and plastic and what-have-you?
Yes I think I must echo John's questions here. It's one thing to be on the ontological level (substantial forms exist). No argument there from me. It's another to be on the epistemological level and say we know exactly what they are. I'm going to stick to non-living things for the moment. The "classical" A-Tist position as I see it seems to be putting substantial form at the level of the molecule. (E.g. a pile of rocks is an aggregate, not a substantial form in itself, similarly for artifacts like automobiles, computers, etc. But a (plastic) polymer is a substantial form, not an aggregate of the monomer. Wait, actually the monomer would be the substantial form here.) Anyway, what is the justification for this, or is all this purely ad hoc?
Ed introduces in Scholastic Metaphysics page 164 the difference between a natural object and artifacts produced by accidental arrangement.
"The basic idea is that a natural object is one whose characteristic behavior - the way in which it manifests either stability or changes of various sorts - derives from something intrinsic to it."
And on page 165:
"Now the difference between that which has such an intrinsic principle of operation and that which does not is essentially the difference between something having a substantial form and something having a merely accidental form."
How then, practically, do we distinguish differences that distinguish two different substances as different substances, and merely accidental differences that seem important to the thinker?
The epistemic issue of how we know that this oak tree in my yard is a different substantial thing than that oak tree in your yard, and how we know both have different KINDS of substantial forms than that dog Fido is partly explained, I think, by recalling to mind the progression of coming to know. Certainly the first stage is that we have sense experience of them. Any single sense experience (be it sight, sound, touch, whatever) will not, normally, be enough in the beginning to sort out what things are distinct and how. But you mix in multiple sense experiences of the same object, the sight of the tree with the smell of the leaves with the sound of the breeze playing in the branches and the creak of limbs, and put them together over time with many more such experiences. And you have a similar complex of experience of Fido. The mind of its own capacity reaches out to grasp the essential likeness of the two oak trees, the intellect apprehends the commonality of the trees as like in basic kind. The mind is not merely assigning to a collection of similar sense experiences a comfortable "basket" of likenesses that it enjoys classifying as "oak", it is _discovering_ the likeness and apprehending that the likeness is more deeply rooted than merely some sense experiences. As Socrates and Plato insisted, the person apprehending isn't the cause of the unity of form, there is an independent cause that is there whether the human mind apprehends it or not.
It is in order to explain that fulsome intellectual experience of coming to apprehend the like natures of 2 oaks, and their difference with Fido, and their passing away into ash in a fire, that we draft "substantial form" as the underlying commonality of the essences. Every child grasps the "what it is" of many things without reflecting on "how do I come to know this", the knowledge is real before he understands why.
"The basic idea is that a natural object is one whose characteristic behavior - the way in which it manifests either stability or changes of various sorts - derives from something intrinsic to it...
Now the difference between that which has such an intrinsic principle of operation and that which does not is essentially the difference between something having a substantial form and something having a merely accidental form."
Fine, but the same epistemic problem presents. One can claim that water is a substantial form insofar as its characteristic behavior or principle of operation is intrinsic. Or, one can claim it is only extrinsic, deriving from the "intrinsic" properties of hydrogen and oxygen.
Ed adds this quotes Eleonore Stump as a further possible criteria for determining a substantial form on page 168: "Stump's rationale is that it seems to be essential to a thing's having a substantial form that it has properties and causal powers that are irreducible to those of its parts. (Cf. Stump 2006 and 2013) Hence water has properties and causal powers that hydrogen and oxygen do not have, whereas the properties and causal powers of an axe seem to amount to nothing over and above the sum of the properties and powers of the axe's wood and metal parts. When water is synthesized out of hydrogen and oxygen, then, what happens is that the matter underlying the hydrogen and oxygen loses the substantial forms of hydrogen and oxygen and takes on a new substantial form, namely that of water. By contrast, when an axe is made out of wood and metal, the matter underlying the wood and the matter underlying the metal do not lose their substantial forms. Rather, while maintaining their substantial forms, they take on a new accidental form, that of being an axe."
"Fine, but the same epistemic problem presents. One can claim that water is a substantial form insofar as its characteristic behavior or principle of operation is intrinsic. Or, one can claim it is only extrinsic, deriving from the 'intrinsic' properties of hydrogen and oxygen."
As I've said in a recent thread, I basically agree, but this doesn't seem to me to mean anything more than that we can be empirically mistaken about what inanimate "substances" do and don't have substantial forms. I think water and salt do, but if that turns out not to be the case, so what? What's riding on this question?
As I've said in a recent thread, I basically agree, but this doesn't seem to me to mean anything more than that we can be empirically mistaken about what inanimate "substances" do and don't have substantial forms. I think water and salt do, but if that turns out not to be the case, so what? What's riding on this question?
Exactly. I think we've got things distinguished enough to have clarified that the question relates to epistemology and that is what most people have arrived at although they are stating it differently.
I'm tempted to start a bit of a debate about what it means for something to reside virtuallyin a substance over at my blog some time because of this line of thinking. I want to see what people think of my less than orthodox position because this is an important question I see people raise.
Ed's point in this thread is to highlight, I think, that ugliness versus beauty of a thing often depends on whether the first thing we sense about that thing is its accidental form rather than its substantial form. Beauty seems to reside in the metaphysically prior substantial form.
I think the reason he hints at is that the human mind seeks order, and when plastic loses its imposed accidental form that mimics a real substantial form, we are left with a sense of the artificiality or fakeness of the form that remains even though plastic in itself has its own substantial form that in other contexts can appear desirable or even beautiful.
If I look at the question of whether water is a substantial form over hydrogen or oxygen in the light of the beautify versus the ugly, I am immediately inclined to believe that water is a substance on a purely emotional level even if from the level of chemistry or physics, water may not be a substantial form. So in this sense, our feelings may be deceptive. But perhaps we are attracted to certain things like water, not because they have a substantial form, but because they are so much a necessary part of our own human substantial form. We have an inherent tendency to need food and water for our own survival. Therefore we are attracted to it. Beauty exists, then, in the water, because it serves the ends of our own substantial form. The water becomes a part of us when we absorb it. In the same way, most normal human beings feel a repulsion or ugliness in the urine of feces because it no longer has any value to our substantial form once it is expelled from our bodies.
Psychological and biological factors play a huge role in our determining what is beautiful. But on a rational level it also really drives our search for the truth in general. We desire to know the truth of things for reasons of self preservation. On the other hand, some people avoid unpleasant truths also for reasons of self preservation.
I suppose my whole post comes back to the issue of how rational human beings are? Was Freud right? Are we primarily driven by irrational desires and motives with only a thin and very weak veneer of rationality. It seems that even in the realm of science, we are motivated by selfish desires for financial gain, or more altruistic desires for the betterment of the human race. As a theist, I believe that this driving desire that underlies our strivings for truth end in God.
First, after having determined substantial forms exist, it would be nice to know exactly what they are, or how to determine what they are, just because, you know, we like to know things.
Second, while I have gained much from the ID threads, the crux of the A-Tist argument against it is that even things like cells or bacteria have substantial forms and are therefore not artifacts. But it could always be claimed that they actually are artifacts, the level of substantial form being at a lower level. In fact, if the level of substantial form is all the way down at the level of quarks, then A-Tism does not really differ all that much from the mechanistic/reductionist philosophy Dr. Feser spends so much time arguing against.
Third, the idea of "intrinsic" vs. "extrinsic" teleology is intriguing to me, but at the same time a little bit obscure. It is said that my computer is an artifact because it has a teleology imposed "extrinsically" (e.g. by the designer and manufacturer). But I don't understand why it is that a cell's teleology is "intrinsic" if it is imposed on it by God. Again, in other threads Dr. Feser has shown why all sorts of confusion arises when efficient causality is talked about without reference to final causality, which according to him is a teleology "intrinsic" to something.
BTW I am very interested in the ID topic. It seems to me that, while we live in a milieu where nature is being over-emphasized all the way to denying God, the IDers want to make the opposite error and over-emphasize God all the way to denying nature.
Aristotle (and St. Thomas after him) wrote well before what we've learned from modern biology. In A-Tism there are four "orders" of being in the physical universe: namely inanimate matter, plants (with nutritive/vegetative souls), animals (with sensitive souls), and humans (with rational souls). Where does a single-celled organism fit in this which reproduces via mitosis or binary fission? Where does a skin cell fit in this?
Surely there's no mystery about that; skin cells are parts, not independent organisms, and the 'souls' are identified functionally, by standard activities (like respiration, reproduction, directed locomotion), not by what we usually mean in English by 'plant' or 'animal', nor by what biologists usually mean by the words -- that's why animals have 'vegetative' activities and (in Aristotelian accounts allowing plurality of forms) vegetative souls. All single-celled organisms have 'vegetative' activities; some of them are motile in ways directed by interaction with their environment, so have minimal 'animal' functions. These metaphysical orders have very little to do with substantial forms as such; they are all on a level as far as that goes, and we know that there have to be at least some non-living substantial forms as well, so it's not even a point on which living things would ever be distinctive.
As Brandon says, I'm not seeing the mystery here. And again, as far as strictly inanimate nature is concerned, I still don't see that A-T has anything riding on the precise level at which substantial forms exist. Generally speaking, what we look for in a proposed (inanimate) "substance" is that has properties differing significantly from those of its constituents (like water vs. hydrogen and oxygen, or table salt vs. sodium and chlorine). But even if we're sometimes mistaken, there are still substantial forms in inanimate nature at some level; if it somehow turned out to be only the bottommost, well, c'est la vie.
OK, sticking to inanimate matter for the moment, if the substantial forms are actually at the level of quarks, then a reductionist philosophy is correct insofar as inanimate matter goes. Moreover, I'd press the point and say that it is even correct with animate matter at the level of one-celled organisms and plants. For I would claim, from biology, that their activity is, in principle, explainable via chemical reactions.
"OK, sticking to inanimate matter for the moment, if the substantial forms are actually at the level of quarks, then a reductionist philosophy is correct insofar as inanimate matter goes."
Yes, if. But that's yet to be shown.
"Moreover, I'd press the point and say that it is even correct with animate matter at the level of one-celled organisms and plants. For I would claim, from biology, that their activity is, in principle, explainable via chemical reactions."
Only if the reactants don't have higher-level substantial forms than quarks, which, again, is yet to be shown. Nor is that alone sufficient, as it's also yet to be shown that (say) an oak tree is nothing but chemical reactions rather than an organism over and above those reactions.
Well, Scott, your two ifs answer your above question regarding what's riding on the question of how do we determine what truly constitutes a substance versus merely an accidental mixture of substances.
"Well, Scott, your two ifs answer your above question regarding what's riding on the question of how do we determine what truly constitutes a substance versus merely an accidental mixture of substances."
I wouldn't say so. Again, the first part of this is all about strictly inanimate nature, and I don't see that anything significant in A-T depends on the precise level at which substantial forms exist in such nature. (It would be another matter if the argument were that they didn't exist there at all.)
As for animate nature, so far there are no arguments on the table that threaten the existence of substantial forms there—but even if there were, they wouldn't constitute a reply to my earlier question about inanimate nature; they'd just be something newly introduced to the discussion.
I think we should be a little more cautious about the first 'if', at least as Vince S states it. A certain kind of reduction would imply that quarks alone are substances, but I don't think the reverse, which is what Vince S actually suggests, follows. In the same way, the fact that a corporate organization is not a substance, but is made up of substances (persons) united accidentally rather than substantially, does not actually imply reductionism about corporate organizations -- it only implies that if they are not reducible it is for some other reason than being substances. I think standard Thomist views of societies have precisely this implication; societies are cooperative (involving mutual action and interaction) and hierarchical (participative), and at least as Thomists usually understand these, I don't think reductionism is consistent with either. To put it all in other words, there are a lot of different ways things can have accidental unity, and not all of them are equally reductionism-friendly.
The requirements of reductionism seem to me to be quite strict (it has to be genuinely asymmetrical and comprehensive, for instance), and lots of things don't meet them.
(None of this, of course, contradicts Scott's basic point about substances. I just want to put into question the idea that putting the level for inanimate things at atoms, or quarks, or what have you, doesn't actually get anyone all the way to reductionism even about inanimate things.)
Sorry that should read, without the extra negative: "I just want to put into question the idea that putting the level for inanimate things at atoms, or quarks, or what have you, actually gets anyone all the way to reductionism even about inanimate things."
A good example of an accidental unity that is not immediately reductionism-friendly, incidentally, since I'm typing this anyway, is the unity of an artifact. Artifacts don't reduce to their component parts, because they depend on external artifice. The only way to have a reductive account of artifacts is to have a reductive account capable of including both the artifact and whatever gives it artifical unity.
OK, with regard to inanimate nature, it would seem that if the only substances are fundamental particles, then at the very least, this whole blog post is not true.Also, as a beginner, it doesn't seem helpful that when I ask, "How do we know what's a substance versus what's an accidental accumulation of substances?" the reply I think I got (and I realize I have misunderstood a lot of this on the way) is "Well, maybe quarks are substances, maybe molecules are substances, maybe polymers are substances. It doesn't matter. None of Thomism rests on this."Well, that is unfair; the response I got included that a substance has causal powers that its component parts do not. And it seems that the consensus is something like at the molecular level, molecules have causal powers that their component parts don't; but artifacts only have the causal powers that their component parts have.Living things may have causal powers that their component parts don't, and Thomists think they do have causal powers that its component parts do not.(I'm not sure I get why that is. What inherent powers does a bacterial cell have that can't be explained by what's going on in the chemicals that make up the cell? How the cell's inherent powers different than say, a robot programmed to mine for metal and oil that it uses to build copies of itself?)
There's something more riding on whether and how we can determine where the substantial forms are. Because every substantial form has a teleology - a proper formal cause. As Dr. Feser has shown in another thread, occasionalism - denying secondary causality - has disastrous consequences. But there is also a semi-occasionalism - admitting secondary causality but admitting their efficacy only because they are so willed by God. This does away with the concept of miracle. God could will that I live on cyanide, and only cyanide. Without a certain concept of "proper" secondary causality, you couldn't say this was a miracle.
If you are a Catholic, you are going to have to - based on the very principles you maintain - say that the Church is not just an "aggregate" or an "artifact", but a substantial form all on its own. It has causal powers its component parts (individual people) do not.
Why do you think precisely locating the level of substantial forms in inanimate nature has any bearing on the question of whether there is secondary causation? If there are are substantial forms at all, then there's secondary causation pretty much by definition.
At any rate, if you think there's any doubt about whether human beings have substantial forms, this is the first time I've seen you raise it. First it was inanimate nature, then it was plants—now you think God could make you live on cyanide alone because, what, you don't have a substantial form?
"If you are a Catholic, you are going to have to - based on the very principles you maintain - say that the Church is not just an 'aggregate' or an 'artifact', but a substantial form all on its own. It has causal powers its component parts (individual people) do not."
I find this statement puzzling in several respects. First of all, and probably least importantly, it makes no sense to say that a thing is its substantial form; it has one. Obviously the Church is not a "substantial form." Nor, from the fact (if it is one) that the Church has causal powers that individual people do not, does it simply follow that the Church has a substantial form. Some such things do, and some such things don't.
"OK, with regard to inanimate nature, it would seem that if the only substances are fundamental particles, then at the very least, this whole blog post is not true."
Why?
"Also, as a beginner, it doesn't seem helpful that when I ask, 'How do we know what's a substance versus what's an accidental accumulation of substances?' the reply I think I got (and I realize I have misunderstood a lot of this on the way) is 'Well, maybe quarks are substances, maybe molecules are substances, maybe polymers are substances. It doesn't matter. None of Thomism rests on this.'"
Sorry you don't find it helpful, but it happens to be true that Thomism doesn't stand or fall with any particular opinion about precisely which inanimate objects can be empirically determined to have or not to have substantial forms.
"Well, that is unfair; the response I got included that a substance has causal powers that its component parts do not. And it seems that the consensus is something like at the molecular level, molecules have causal powers that their component parts don't; but artifacts only have the causal powers that their component parts have."
Which is why the more common view among Thomists is that chemical compounds do have their own substantial forms. What strikes you as "unfair" about that?
"Living things may have causal powers that their component parts don't, and Thomists think they do have causal powers that its component parts do not."
Right.
"(I'm not sure I get why that is. What inherent powers does a bacterial cell have that can't be explained by what's going on in the chemicals that make up the cell? How the cell's inherent powers different than say, a robot programmed to mine for metal and oil that it uses to build copies of itself?)"
Basically, they differ in the fact that the bits that make up the robot don't have any natural tendency to stick together and make up a robot; they're doing so only because a rational agent other than God intentionally assembled them and set them going.
Sorry, when I said, "Well that's unfair," I meant my earlier statement was unfair to you guys.Why does the whole blog post fall apart if only fundamental particles are substances? Then plastics wouldn't have substantial forms any nore than cathedrals or clocks.The rest of your response does clarify things.
"Basically, they differ in the fact that the bits that make up the robot don't have any natural tendency to stick together and make up a robot; they're doing so only because a rational agent other than God intentionally assembled them and set them going.
"Wouldn't the robot have causal powers that its component parts did not have ?
Do the components of the cell have a 'natural tendency to stick together' any more so than the components of the robot ? The components of a cell somehow came together, maybe after long periods of 'trial and error' where maybe you could say that the cell was being assembled, and they now work together in a complex whole. Is this substantially different from the components of the robot ? If the robot could reproduce itself, wouldn't it then seem that it's component parts had just as much natural tendency to stick together ?
If you are a Catholic, you are going to have to - based on the very principles you maintain - say that the Church is not just an "aggregate" or an "artifact", but a substantial form all on its own. It has causal powers its component parts (individual people) do not.
The Church obviously isn't just an aggregate or artifact, since it is a society, but even that aside, this doesn't follow; for one thing (as Scott notes) the Church obviously isn't a substantial form. But even if we change it to 'substance', all the causal powers of the Church that aren't had by its members are in reality proper causal powers of Christ.
But it wouldn't follow in any case; 'having causal powers its component parts do not' is a necessary condition of substances, not a sufficient one, because it matters what the causal powers imply. Two people pushing a rock they can only push together have a causal power that neither person alone has, and despite what some reductionists might want to say, it is at least controversial whether all such cases of cooperation are in any meaningful sense reducible to individual operations of individual people. But this is not a causal power that indicates that the two substances have become one substance. In setting up the situation, that was actually guaranteed, as we didn't do anything to integrate the substances themselves, but simply had them work together in a certain way.
But I don't see at all how your comment responds to mine, so I'm a bit puzzled as to what you are trying to say. My comment was about how there are obviously even accidental unities (like societies and artifacts) that make reductionism difficult (they at least significantly expand how much has to be done to have any kind of reduction at all), so merely stating that all inanimate objects we know are quark-substances united accidentally rather than substantially does not, on its own, get us to any kind of reductionism.
They don't manage to stick together any better than the components of a robot. They were assembled over time in a fashion that they now work together to make a cell. But, add cyanide to the cell and they will slowely dissasemble and not go back together on their own.
The robot is assembled, and its parts work together now as well. If it could reproduce itself then it would also seem that the these component parts also had just as natural a tendency to stick together as the cell's components.
I am implying that the chemicals of the cell do not have any more a natural tendency o stick together than the components of a machine. When you add cyanide, they stop sticking together (not necessarily even dissasembling).
How is their working together any different from components of a machine that work together? If the machine components were not naturally able to work together, then they would not work together.
The only difference is their history of coming to work together.
(Is it just me, or does it take everyone at least 8 tries to get the Captcha?)
I am implying that the chemicals of the cell do not have any more a natural tendency o stick together than the components of a machine. When you add cyanide, they stop sticking together (not necessarily even dissasembling).
That's what you said, but again, this is just my point: as it stands, this is obviously a non sequitur. All your premise establishes is that cells stop sticking together under a certain nonstandard condition; your conclusion, however, would have to cover what cells do in non-cyanide as well as cyanide conditions, and is, moreover, comparative.
A natural tendency to stick together was provided as making difference between the cells inherent powers over the cumulative properties of its constituent parts. In the following statement:"Basically, they differ in the fact that the bits that make up the robot don't have any natural tendency to stick together and make up a robot; they're doing so only because a rational agent other than God intentionally assembled them and set them going."
And I am questioning this difference of a 'natural tendency to stick together', by saying that this difference does not exist.
The only difference between a molecular robot and a cell is their respective histories of how the components came together. There is no difference in the cells components being more naturally sticking together than the molecular robots components sticking together.
If a molecular robot could last a few years and reproduce itself, it would seem that its component parts also had a natural tendency to stick together.
(The Captcha is driving me crazy and I am on the East Coast and it is late.)
And I am questioning this difference of a 'natural tendency to stick together', by saying that this difference does not exist.
Yes, I am aware of this. My point is that your cyanide argument didn't establish this; it just established that there is one condition, not natural to the cell itself, under which the cell doesn't stick together. It didn't establish anything about the cell in its natural conditions, nor did it establish anything about how the sticking-together of cells is compared to the sticking-together of robots.
(Perhaps the issue with the CAPTCHA is a temporary issue with the Name/URL option? CAPTCHA using Google Account is still fine.)
Brandon, could you recommend a brief source for a beginner with a list of the necessary and sufficient properties of a substance? Because I was wondering about the issues you describe. For example, I know that in Thomism weight is an accidental property, but it seems to me at least that 2 lbs of a metals can do things that 1 lb of metal cannot (e.g. a wall of metal twice as big as a smaller wall could block things that the smaller wall cannot, similar to your example of two men pushing a weight that one man cannot). And my non-technical definition of "causal power" that I've made up in my mind would be "ability to do something," and I realize that's probably wrong.But of course, I know that two pounds of X is not a different substance than one pound of X.[Captcha working fine for me. Well besides the perennial annoyance of figuring out a Captcha.]
I don't think there is any list of necessary and sufficient conditions of a substance; particularly with regard to sufficient conditions, since there are enough different substances that they are legion. But Aquinas's De ente et essentia is actually pretty readable, and although it has been a while since I've read it, I believe Stump's Aquinas (which I think may be what Daniel was quoting above) has some discussion of these matters.
'Ability to do something' is a pretty good first approximation of 'causal power' here; no one really works with anything else except where very technical distinctions are absolutely required. But in the cases we're considering, we are quite clearly talking about kinds of joint ability to do something, and the jointness of the ability requires that there be two distinct things to be joined.
One of the things we can say about substance is that it has to be an active unity greater than mere relation alone (since relation alone, even one resistant to reduction, is not a substance). In the cooperation case, or in the two blocks case, we have deliberately set up situations in which we only set up a relation between two things. Likewise with societies, which can be in many ways highly unified, working in some way as one -- but the way in which they work as one already presupposes that they are in causal terms many distinct people working together.
This is related to why Scott insists on the point that organisms are more easily established as substances than inorganic things -- living things give us much more information indicating unity: they survive a wide range of changes of environment, they self-repair, they are functionally as well as structurally integrated, we can clearly identify their borders, and they act in such a way that we can, and do, often say, "this is one distinct organism capable of operating within many different environments" or "this living thing is working as a whole to survive/reproduce/whatever". We don't get the same range of information if we are considering whether water in a glass or molecules of H2O are substances, although all our evidence about them is still evidence about how they act, so the two kinds of cases are not in the same boat. This is not to say that there is no answer on the subject, or that all answers are equally plausible (most Thomists, e.g., think there's good reason to think that most natural objects we come into contact with are substances, because all the sensible properties we experience present themselves to us as unified together into this object or that, and that the more you go in a fundamental particle direction the less plausible it is that we are dealing with distinguishable substances rather than just incomplete parts or properties of substances). But there's always a lot of empirical evidence going into these things on particular cases, and whether a particular case has the right kind of evidence is not the same kind of question as whether the general principles are sound. And Thomists have always claimed that getting rigorous certainty about the particular cases is often going to take a lot of reasoning.
A common mistake related to this is assuming that because we can divide a substance into parts, we have shown that it is not actually a substance; this merely shows that it is composite, whereas the question of substance is about how the composite works as one thing. Any particular action of a substance can be redescribed entirely as an action of its parts, and there are plenty of situations in which that is more convenient. But the question is what all the actions have to do with each other, and that is something that requires thinking through a lot more.
Lets step back a moment. (before I begin I have a slightly unorthodox view which I won't be trying to explain ore defend here).
I think the real mix up here is what the essence of a thing is not what makes it a substantial form or the formal cause of something. A substance has a unity and potencies and a set of 'teleological powers' or things to which it's nature directs it towards.
Following on from that we have no direct access to any essence qua essence and we only know of what one definitively is i.e. a human is a rational animal. Also determining a substance is an empirical matter which ultimately I think is what Scott was trying to get at i think. I don't really think it's difficult in every case to know what is a substance but again it all goes back to in what sense is it a unity, a form.
The example of the cell versus the robot is good in so far as the cell is self contained and has powers naturally via it's own nature (sorry but the sentence does make sense and is not superfluous to use nature in two senses). The cell moves from within to without so to speak, it just has the ability to reproduce and so forth of it's coming in to being naturally whereas a robot has it's powers coming from being assembled from without by a secondary intelligence i.e. bits of metal don't all decide one day to combine to make a robot and have inherent powers that a secondary intelligence didn't place there.
Correct me if I am wrong on any details or have been less than careful in my use of language.
If a robot were to reproduce itself and maintain itself of its own accord, I would not hesitate to call it a substance, but if it's just running a program its actions seem to be directly caused by the programmer.
I had thought of that but I disagree unless the robot were to have causal powers that were 'natural' so to speak.
I suppose there are limits to language here but bear with me as I try to explain.
The robot still would be an artifact even if it was built by another artifact and programmed by it. The causal chain is temporal and traces its way back to a secondary intelligence and not from powers that were a manifestation of the coming together of natural potencies through natural events.
There is a lot I could say but I'm hoping others might add their opinions after this.
Of course I am not saying that a robot of some kind could not be a substance but just not as we understand 'robot' with our current technology. I mean if we build (as a thought experiment) 'dna' robots then it would be hard to argue that they have not acquired a power and a potential that is not altogether 'natural' and in this unity that gives to them their powers and formal nature we find a true substance (possibly).
Who knows I'm just having fun with the idea. Might be an interesting thing to work out.
I see what you are getting at. What I mean by "robot" is something that intrinsically does not depend on its prpgramming to replicate itself. An "analog" construction, in a sense. You're right that it probably would not fit the bill of "robot" by modern standards.
As I've said in a recent thread, I basically agree, but this doesn't seem to me to mean anything more than that we can be empirically mistaken about what inanimate "substances" do and don't have substantial forms. I think water and salt do, but if that turns out not to be the case, so what? What's riding on this question?
Actually, while I agree that we can be empirically mistaken about lower substances, I think it very important to distinguish that our PRIMARY conclusions in this area are driven by things for which we have a great deal more reasoned confidence. We really do know that alligators are a different kind of thing than lions or flies. We are in no doubt that an alligator answers to what we intend by "an individual thing", and that its organs (much less molecules or atoms) do not constitute a more rooted "thingness" than the alligator itself. The knowledge of the whatness of "alligator" being a difference sort of whatness from "lion" precedes our understanding of these in the terms of substance, nature, etc.
A second mistake is pointing to "water" as a substance, as if all water is a single substance. There is nothing wrong with saying all things water share in the like kind, "wateriness", without saying they are all the same individual substance.
And things that are instances of lesser kinds of beings will have lesser BEING to them, so that their distinctness will be less and less intelligible. It should not be surprising if at the lowest levels it is virtually impossible to clearly specify where we have "an individual substance".
Interesting philosophical discussion, but there are simpler reasons why plastics goes bad. One reason is that some plastics tend to lose their plasticity over time creating microfractures that change the way the substance intersects with light. Colors also degrade due to UV exposure,
Wood, by the way, may be considered a semi-plastic biopolymeric conglomerate of long chains of cellulose molecules (called celliobose), three different types of lignin, and hemicelluloses. There is nothing inherent in polymerization, either natural or man-made, that has to lend itself to ugliness. Steel is not natural, for example, but few accuse it of bring uglier than iron. Brass is not natural. Neither is bronze. That they are composed of naturally occurring substances is irrelevant. Soap is a type of polymer made of naturally occurring material and it can age well.
I am not a fan of plastics of the consumer variety because they are often cheaply made and shoddy, but if you want to start a fight among musical acousticians, suggest that plastic oboes and clarinets are not as good as their wood counter parts. Sometimes, the fault lies not in the substances, but ourselves (we could make good plastic instruments).
"I think it very important to distinguish that our PRIMARY conclusions in this area are driven by things for which we have a great deal more reasoned confidence."
Good point, and I agree. As Brandon has noted, this is exactly why I've kept pointing out that the real empirical uncertainties involve inanimate nature, not animate substances like alligators and flies.
"A second mistake is pointing to 'water' as a substance, as if all water is a single substance. There is nothing wrong with saying all things water share in the like kind, 'wateriness', without saying they are all the same individual substance."
That's a very helpful observation.
"And things that are instances of lesser kinds of beings will have lesser BEING to them, so that their distinctness will be less and less intelligible. It should not be surprising if at the lowest levels it is virtually impossible to clearly specify where we have 'an individual substance'."
So, what do philosophers dream about when asleep.....? Pretty wild stuff. It is like the old math professor ( a Jesuite of course ) who reduced house numbers to prime numbers on his daily walks - perhaps in his dreams too.
"The causal chain is temporal and traces its way back to a secondary intelligence and not from powers that were a manifestation of the coming together of natural potencies through natural events."
Suppose some far away civilization millions of years ago on a planet where life is based on Silicon designed a cell based on Carbon knowing there were places in the universe that could support carbon-based life, put them on 50 rockets and randomly shot them into outer space. One of them hitting planet Earth, releasing the cells of which all life then evolved from.
I think that since DNA encodes itself, in the sense that the proteins that interpret DNA are encoded by the DNA itself, then life as we know it is a substance regardless of its origins, whether natural or artificial. The difference between this example and a programmable robot is that the robot needs to be programmed to reproduce, while a cell cannot avoid reproducing--it's in its very nature.
This is also true of all living things. They are led by desires arising from their neurobiological wiring, in the case of higher organisms, to engage in behaviors that result in reproduction. Even for more simpler organisms, if they are not programmed, then how do they continue to reproduce ?
But the early cell was also programmed to reproduce. As evidence for this: it did not always exist, it has no mind of its own, it reproduces.
The method of programming is different between cell and robot, but is this there a real distinction in this difference ?
" life as we know it is a substance regardless of its origins, whether natural or artificial"
Mook V. summed up what I was getting at there I think.
The method of programming is different between cell and robot, but is this there a real distinction in this difference ?
The natural potencies built in to the order of the universe - that the type of natural substance we call life would come to be. Robots as I say, as we know them today, would never be assembled from a 'natural' potency. A secondary intelligence puts it there. It isn't an essence or form in and of itself which Gos is holding in being but just a collection of pieces in an artifact.
About Me
I am a writer and philosopher living in Los Angeles. I teach philosophy at Pasadena City College. My primary academic research interests are in the philosophy of mind, moral and political philosophy, and philosophy of religion. I also write on politics, from a conservative point of view; and on religion, from a traditional Roman Catholic perspective. | 53,527,208 |
"This story began a few years ago." "I didn't witness the event and would never imagine its impact on my life." "Three days without food, like you asked." "I can't see any." "They might be crouching somewhere." "Hey, kitty kitty." "Quack quack..." "To the fucking lion?" "Open the trunk." "Stefan?" "I heard your voice." "What's going on?" " Let me invite you to dinner." " But I'm not hungry." "You're not the one eating." "You're the one to be eaten." "Here they are." "Is this a joke or what?" "Stefan, why?" "After all these years on stage..." "All ends one day, my friend." "Come on, Stefan." "Remember Adria, Metropol, Ritmo?" "Your fantastic solo on the comb." "Shut it." "You're making me sick." "I hated that comb just as I hate you..." "Mariano Italiano." "How could I play along with that shit?" "Stefan, come on." "For Christ sake!" "A FEW YEARS LATER..." "Kamikaze, please." "And one for the lady." " It's a year's worth of my work." " You're an accountant?" "It's a comic book entitled, MYSTERY OF THE FACELESS MAN." "You know what the publisher said?" "He asked why the protagonist had no face." ""A protagonist has to have a face so I can remember and recognise him."" "I tried to explain this was the point." "The crucial principle." "A man with no face intrigues, scares makes readers search for clues." " You get it?" " No face is still better than no money." " The moron made me draw faces." " Give him a fucking TV celebrity." " Nice chick." "Looks like Britney Spears." " Who?" "Don't know Britney?" "You're an alien?" "STARRING:" "I've been busy drawing, I might be out of touch." "That's some downer, dude." "SPECIAL APPEARANCE:" "Please, get back on stage, now." "I can't work in these conditions." "It isn't my fault that the power is down again." "Is it mine, then?" "What about poor audio, rats in the wardrobe and the support singer with tonsillitis?" " Where are you going?" " Home." "Where?" "To the living room." " You mean bastard!" " Honey, why so quick?" " I can slow down." " Quiet." " Anything wrong?" " No, why would you think so?" "Can you stop when I'm talking to my boyfriend?" "You..." "Diamond, how could you do this to me?" "With this tone-deaf support." "I'm not a support, I'm a singer." "Now I know where you got your tonsillitis." " All she did was pick up the mic." " I'm through with you!" "Wait up, let's talk." "You can't just move out like that." "Of course I won't." "This is my flat!" "DIRECTED BY:" "Who's going to make your videos now?" "COYOTE'S MORNING" "A young male coyote, caught in the noose during his nocturnal hunt takes along time to take in the facts." "He only fully grasps his tragic situation at dawn." "Then, in a last act of desperation the young coyote bits off his paw preferring this to being caught by a moustached Mexican." "No more drinking with you." "You were just getting started after a year spent over your desk." "Go on, draw up a list of new life's resolutions and pin it over your bed." " What resolutions?" " The usual ones." "I won't use four-letter words, I'll collect Pepsi caps and win the holiday trip of my life." "I'd send you and Creamy there to enjoy some peace of mind." "Kuba, don't be mad, I need someone to fill in for me at work." "I have a date with this babe from the video rental." " Me?" " Yes, it's a banquet on the outskirts." "Generous tips, and you said you were strapped for cash." "I'm not cut out to be a waiter." "Are you crazy?" "It's no big deal." "You come in with a full tray, them rednecks grab the glasses you get back to the kitchen for a re-fill." " First, I need to get some sleep." " OK, just don't forget." "Check this out, Creamy." "Imagine they do the same tricks in bed." " Who's there?" " It's me." "I need to talk to Savage." "Get in." "Boss, excuse my interrupting, but have you read the Super Day today?" " Of course." " In that case, sorry." "Hold on, Tiny." " Ever seen me read?" " Not really." "It doesn't mean I can't read, right Krzyé?" "Many years ago, I read two books that influenced my life... and my romance with literature came to an end." "PAMELA ANDERSON'S BREASTS ARE SMALLER!" "This should be interesting." " Fine piece of ass." "Anyone I know?" " It's not about her." "Diamond and this singer of his, they broke off their engagement." "Ouch, ouch... and who's Diamond?" "The filmmaker, gambler." "He owes you a million, while the babe, she comes from a very rich family." "Diamond claims he's engaged to her, and will pay you back after the wedding." "Apparently, this is not an option now." "She's a daughter of Mariano Italiano." "He was hit in the zoo a few years back." "Correct, but the money comes from her mother's aristocratic family." "The business is now run by the stepfather." "Quite a tricky player." "He was in Mariano's band, the comb guy." "When the other died he got hitched with the widow, and now controls the finances." " Well, take care of our Diamond." " You mean, take him out?" "He won't pay then, will he?" "Give the boy a second chance." "They might still reunite." "Noemi, come back to me." "Dominika, listen, I wish to be alone after all that happened to me." "I'm in no mood for banquet singing, and I don't care what Stefan promised." "Don't reject this love!" "I love you." "It's on TV." "Wait a moment." "Hello, we're with the "I'm sorry" show." "Any idea who sent you those flowers?" " What if they don't reunite?" " It says here she's got a sister." "He can marry the sis." "Boss, can I take my brother for this work?" "He's just come over from Olsztynek." "He does some bouncing in Vanessa, but he's born to do ambitious work." "Be my guest." "Mao." "Game over." "Oh, my, my..." "Some wait a long time for a job from Mr. Savage." "I can't hear you." "Did you just thank me?" "Is this the word you're mumbling?" "I must be in Vanessa within the hour." "I don't want to be late." "A bouncer in Vanessa - is this the peak of your ambition?" "I promised mommy that you would make it in the world." "I'll keep my promise." "But I like my work." "Baldy promised to get me an original security badge." "An original badge?" "Way to go, man!" "You must know very influential people..." "Ask him to fetch you a flat tyre, too." "Or a rancid coconut car-freshener!" " Why are you blinking, poor eyesight?" " Talking about yourself?" "Who are you visiting?" " How can I help you, boys?" " By bitchslapping yourself." "Oh, that's a good line." " Man, you broke my nose." " Savage sent us." "I hear you've been dumped." "She caught me red-handed." "But she'll forgive me." " Is everything OK?" " Mr. Handsome got spoilt." "Bring me some cotton." "Tell Savage I'm collecting cash for him." "Savage is no Albanian, you don't collect money for him." "You'll bring it, pronto, and apologise you made him wait." " You've got one month." " Month?" "Savage is offering you a second chance." "You'll marry her sister." "Dominika?" "Are you insane?" "I'm not marrying a troll like that." "You've got no choice." "High Life places me on the Top 5 Most Eligible Bachelors in Warsaw." "Do you know what that means?" " You shave your legs?" " Very funny." "If my buddies see me or someone takes a photo..." "What if they see your corpse in Cops?" "Earth to Diamond!" "This isn't a beauty contest, your ass is on the line." "One more thing." "Your fiancée can't catch you in the act, again." "You're given a strict ban on pussy until further notice." "A ban?" "I'm currently dating four fiancées." "No pussy, capisce?" "It's for your own good." " Jaws, let's go." " Goodbye." " Who the fuck are you?" " I'm a director of action movies." "Will Tampax do?" "That hurts!" "Damn right!" "Four fiancées..." " So, I am number 3 or 4?" " The other four mean nothing to me." "Life's taught me there's nothing worse than a bunch of individualists." "So, let me explain some rules you have to obey in this house." "First, primo, you're all here to work, so no cigarettes, chit-chats and funny faces." "Second, primo, these cardboard boxes contain fireworks worth 30,000 American dollars." "And I'm the only one who can light them!" "Third, primo-ultimo, no one opens these doors, ever." " Why?" " Because Rambo is locked behind them." " And who is Rambo?" " None of you interest, Dumbo!" "Are we fucking clear, soldie..." "I mean..." "Is that clear?" "Well then, sexy bitches, take care of some drinks." "You, cool cats, will be contacted via the radio." "ARE WE CLEAR?" "Good evening." "I'm filling in for Witek." "Ladies and gentlemen, if you had been asked two years ago whether a small, little-known company like Pol-Invest could win a government tender" "you'd have smirked in disbelief and said it was impossible." "Well, if anything is impossible, get a guy who doesn't realise it." "He'll just come and do it." "I'd never have succeeded without the benevolence of senator Stanislaw Polack... who's offered his disinterested support along the way." "This banquet is to honour him, as well." "Senator, Stanislaw, Staszek, please..." "When I say "Poland", I see grains of wheat springing from fertile soil." "I see familiar storks nestled on a friendly cottage in Masuria." "I see amber charlock, dancing among buryan waves." "What the fuck is "charlock"?" "And methinks the bureaucrats from Brussels munching their EU burgers forgot what this nation, this people, however poor, but proud and valorous has done for Europe and the entire world!" "Thank you." "I don't remember inviting you." "Your stepfather did." "We play squash." "Nice to see you." "I promised that you would perform." "I'll sing because Dominika asked me to." "How could you stand her?" "The nouveau riche, everything has to be grand... the house, the limo, even the roasted pig." "Greenhorn, stay in the kitchen." "We're off to change golden handles." " But I don't know what to do." " Chief Monkeyman will contact you." "Why would a nice girl be standing alone?" " Which one?" " I meant you." "I always stand here during parties." " What are you doing tomorrow?" " Seeing my shrink." " And the day after?" " The same." " Any days you're not visiting the shrink?" " Wednesday." "Cool, why don't me go to the movies or to a restaurant, then?" "Excuse me." "Of course." "Stop fucking about!" "Prepare the pig, pronto!" "Just a second." "Where's the pig?" "!" "What the fuck is wrong with the pig?" "I can't hear you." "Some moron is screaming through the loudspeakers." "Hold on." "Why does this pig have tusks?" "It's a warthog." "A pig from Africa." "Needless, needless your worries photo will dust your memories." "Cast you sorrowful glances 'cause I'm through with romances." "Boy, are you smooth and quite gritty." "You are something like pretty, but please believe me all the same." "The joy of parting, I'm feeling great." "So farewell, farewell honey, Girls who look for Hrst-prize money, hardly ever look your way." "They can think you're sunny spell, when it's over go to hell, and that will be your ordinary day." "You're not here to enjoy a concert." "Get back to kitchen!" "Bye-bye honey, sweetie, Easter sugar bunny to be eaten in one day." "Splitting didn't make me hazy, makes me positively crazy, there can be no other bigger joy, no way!" "Bigger joy?" "No, no, no way!" "Farewell sweetie..." "Farewell honey..." "Farewell pretty..." "Farewell bunny..." "Farewell sugar..." "Bye bye bye." "Let me invite you all to savour this delicious roasted pig with traditional Polish stuffing." "Staszek, this one's especially for you." "Enjoy and let the feasting begin!" "And?" "What?" " Why does this pig have tusks?" " 'Cause it's a warthog, an African pig." "Warthog yourself, stupid fuck!" " It's him, boss." " Anything wrong?" "Rambo, take him!" "Code red!" "Rambo is at Polack's throat!" " Anything wrong?" " I got bored with trivial chit-chat." "I don't like the banquets, either." "I feel you." "Still, they pay, you sing, right?" "You're too good for banquet singing." "You've got talent." "Make your own music!" "I'm being chased by men who work for this balding grey-haired guy, the owner." "Any idea how to get out?" "Wait for me at the parking lot." "There you are, mate." " Hide, they're coming." " I got stuck." "I lost one of my lenses." "That's OK, I can handle it." " Thanks, I'm Kuba." " Noemi." " Nice wheels." "Yours?" " It belongs to the band." "We take it to our banquet shows." "They pay well?" "No need to fix handles?" "Just thinking aloud." "I'm a start-up waiter." "You're a waiter?" "I'm no Prince Charming or Sheikh." "I'm not even a TV reporter." "You helped an ordinary kitchen aide." "Disappointed?" "You got me wrong there." "I did it, because you seemed nice." "Whether you're a waiter or chimney-sweep makes no difference to me." "What do you mean you can't?" "My dictionary doesn't include words like:" ""I don't know", "I can't"." " What do I pay you for?" " We'll catch him, boss." " You, what's that in your ear?" " An earpiece." " Pretending to be in touch with HQ." " Try to stay in touch with your brain." "Get the fuck out!" "Out!" "Don't lose control." "Remember that each failure is breeding grounds for success." "Don't get overwhelmed by details." "Fucking hell!" "What a bright night." "She's amazing... pretty, interesting to talk to." "And she wears delicious lace panties." "Whoa, whoa..." "You only said she gave you a lift." "He's a totally different story." "He wants to date me, not a famous singer." "How do you know?" "He thinks I'm a banquet singer." "A banquet singer?" "Easy lay!" " Maybe he is just pretending." " No, I'd have known." " What does he do?" " He's a waiter." "You what?" "Waiters are the worst kind!" "Unfaithful, disloyal, focused on quickies." "At home they drink beer, and watch Eurosport 2417!" "And they give you no tips in love." "Mark my words, he'll invite you to Vanessa with the free tickets he got at work." "Tickets to Vanessa, for you. 30 zlotys." "It's the ideal place to get to her." "Think about it." "He must be poor, with no future." "He won't fit into your world." "With him, you'll be feeling as if you wore a hat that was too small." "I'm fed up with high society assholes." "I used to date one waiter." "Even now, when I think of him, you know..." "I crave for emotional bonding." "It's good to be with someone... with whom you enjoy conversations... whom you can hug, cook dinner for." "Man, you've got me, I'm always there to swallow a hot fucking meal." "I guess I could fall in love with her." "You must be wondering why I chose a small backstreet cinema outside Warsaw instead of a dolby stereo multiplex." "For me, places like this have a magical, unique feeling about them." " Diamond, whassup?" " Oh, hey Max." "What are you doing here?" "You know, this is the only cinema my fiancée doesn't know of." "So I bring my other chicks over here." "Here, buy yourself some popcorn." " Who's that?" " You know, I'm with a charity now." "We help retards get on with their lives." "Cinema outings, field trips." " This fashion came from the West." " It's so sweet." " How can I get a vegetable like that?" " You know, there's a downside to it." "Our patients have fits, they drool." "Cheer up, we're with you." "Listen, why don't we hit a club after the movie, just the four of us?" "Er..." "I just remembered..." "I've already seen this movie." "Honey, let's go straight home." "Bye." "Let's go." "When I date him, I'm scared stiff." "I gulp down three beers, a vodka shot." "Nothing helps." "I've got a lump in my throat, get all speechless and dizzy." "I've never had a boyfriend, you see." "They've always been after my sis." " What am I supposed to do?" " Wh, wh, what?" " What do you think?" " Good question." " Do you dream of fires?" " No." "Nothing to worry about, then." " You're young, attractive..." " You think so?" "Lecherous men ogle you, when you walk in those ultra-short, provocative skirts." "They kiss your neck, ask you out to dance whisper obscenities into your ear... until you walk away with one of them." "Beata, you bitch." " I am Dominika." " And I have scotch in the fridge." "I can't finish all our sessions wasted." "This one's borrowed from a friend." "I drive a Volvo, but left it for overhaul." "I've got a strange feeling that everyone keeps staring at us." "Do I have anything pinned to my back?" "VIBE THAT MOVES CROWDS." "NEW ALBUM BY NOEMI OUT SOON!" "You barely look in my direction." "I'm not attractive to you?" "I've got more important things to do." " No entry in these shoes." " Why?" "We don't allow in sneakers." "No admission for chavs." " Man, can you see a chav around here?" " I can see well enough." "Got it?" " There must be some misunderstanding." " An awful one, sir." "Just don't hurt me... and enjoy your time in the club." "Step back before you get hurt." " Don't you see..." " Shut up, I see everything." " Get lost, dude." " Let's go." " Play a little nicer, dickhead." " Talkin' to me?" "Baldy, get the bat." " I'm sorry it turned out like that." " Why?" "It's such an exciting date." "Easy." "Let me handle that." "Good evening, may I ask for your autograph?" " For whom?" " My daughter." "Angelika." " For me too, please." "Name's Piotr." " From you as well, sir." "Just in case." "She played you for a fool." "Nothing worse than an affair with a star." "No room for love in the world of showbiz." "I'll try anyway." "Where did you get all these?" "I worked in a yoghurt factory." "When they fired me, they let me take as much as I pleased." "You were too good for this job." "Not the case." "I jacked off into the main mixing tank." "What?" "Mine is fine..." "I guess." "If you'd known straight off, you would've acted differently." "I wouldn't have passed for a complete idiot." "I didn't want you to judge me for what I do, but for who I really am." "Many guys dated me just to get into the social columns of magazines." " I understand." " Where were you all this time, anyway?" "You really didn't see any of my videos?" "Been busy, lately." "Being a waiter is so absorbing?" "I'm not a waiter." "I was a replacement." " So what do you do?" " I write comic books." "Really?" "What about?" "Well, I'm undergoing a creative crisis." "Just like me." "Zdzisio will secure the funds." "We prepare the programme and off we go..." " You know, I've been thinking about us." " Me too." "I like you, because you're no fake." "I feel good when we're together." "It's very surprising to me..." "But I'm not sure I want to engage emotionally." "I've just ended a catastrophic relation." "That's why I would like us to be friends." "Many people don't believe in friendship between a man and a woman." "In fact, I don't believe in it either, so if you want to kiss me, don't hold back..." "Thanks a lot." "Bye." " Let me invite you to dinner." "Sit down." " I've already eaten." " Surprised to see me eat here?" " Suit yourself." "I don't hold a grudge against you for the pig." "I'll forgive you even though my friend, senator Polack, is still in hospital." " It wasn't my intention." "Sorry." " You know, in the past before I became a wealthy businessman, I used to eat in diners like this one." "Try the chefs pork chop." "I want to give you a piece of advice." "It's about Noemi." "She's amazing and attractive to the eye." "But, she's very mean, she's dating you to play with me." "It's like a whim." "You're her newest toy." "She's out of your league." "You're not used to succeeding." "You live on a fantasy island called, "One day, I'll be..."" "Wrong." "You'll never be." "You have no balls." "You won't be meeting her, got it?" " Nice speech about succeeding." " I read a lot, memorise." "A golden thought, from a manual for door-to-door salesmen." "You think you're smart, that you'll fit in high class?" "No way." "I've tamed bigger sharks." "And you're just a little mongrel." "Nlongrels belong in kennels." "If you stick your nose elsewhere, you'll be put down or have you paw broken." "High society taught you that talk?" "Remember that each winner requires a loser in the equation." "And I always win." "Good bye." "Whassu p?" " Why would you be on the floor?" " Never mind..." "Creamy, did you add some extra flavour to the sauce?" " You know what I mean." " Nope." "Shame." "But sometimes we take a leak into the chip oil." "Your character is a tough gangster, who wants to take revenge on some really mean bastards who fucked him." "Why do you mean by "fucked him"?" "They tricked him." "So, he gets one of them, points a gun..." " Will I get a gun?" " No." "Give us a line that fits the scene." "Like what?" "You know, gangsta style." "They way you feel it." " I don't like him?" " Who?" " The other gangster." " No." "Yes." "I mean, no." "OK." "Now?" "The gun." "Listen, buddy." "Don't make me not show you how I can boost a cup..." "I mean, bust a cap in your ass." " How's that?" " OK." "We'll call you." " But I don't have a phone." " OK." " Anyone else?" " No, that was the last one." "To think you can't find a proper gangster in such a lawless country." "Why are you doing this to me?" "You dress like that to tease me." "I don't know what you're talking about." "Let's go to your place, I bought French champagne." "I'm begging you." "Overstoring semen can lead to testicle malfunctions and scrotum ulcers." " You know what..." " What?" "Buy yourself a sex doll." "Let's have a picnic." " What's your name?" " Dolores." "My name's The King of Teens." "And the money?" "You need to pay." "50 in the mouth, sex for..." "Don't bother with the details, babe." "French, the best." " 100." " OK." "Just don't forget the panties." "Sorry, Dolores." "I'm too bold and beautiful to pay for sex." " Why are you so tense?" " I'm fine." "I've heard her friend is a nice girl." "And she's got no partner." "A dance partner." "I need to go to the toilet." "I'll go to the... you know..." " What's wrong with them?" " No idea." "Shall we dance?" " Yesterday, you disappeared so suddenly." " Ad hoc meeting with your father." "Stepfather." " He didn't take to me, it seems." " A compliment of sorts." " I was hoping never to see you again." " It's my fault, then?" "Did I hop into some douche bag's car and drive away?" "What was I to do, drink beer and watch speedway with you?" "Let bygones be bygones." "Now, my best pal is sitting there, staring in your friend's eyes like a gecko at a fly." "So, let's get back there and pretend we're having fun." "His thugs did that to you." "Bastards." "I hit the kitchen hood." "This isn't a disco." "Listen..." "Don't count on anything." "Meeting you is the best thing that ever happened to me." " I adore you." " Let's go somewhere together." "I have a cottage at the lakeside." "I'll pick you up after the recordings." "Can you help me with these?" "I can't reach." "Witek, listen." "There's been a huge misunderstanding." "My thoughts exactly when you started to undress me." "You filthy swine." " Now, the other one." " What the fuck?" "You'll blind me." " I want to help." "Look up." " I can't when you push that shit in." "This shit cost me 350." "There you go." " Yo." " What?" "You're one ugly sod." "Hey, limp-wristed." "Jump in." "We'll give you a ride." "What do you mean you can't?" "I'm used to chicks who spread their legs without asking." "And this one must be frigid." "I can't figure her out." "She told you "no"?" "She's said three sentences in total." "And when we met, she puked all over me." " Weird." " She's a weirdo, anyway." "She visits a shrink 6 times a week." "I can't get to her, so why don't you take me to the woods, and bury my corpse." "Nobody goes to the woods any more." "Too much petrol." "Plus, you need a spade, you have to dig a grave." "Waste of fucking energy." " We do it differently these days." " How?" "Take a look around." " Lions, tigers, polar bears." " You're not..." "An right." "I can play all my best cards, but I need your help." "You're so mysterious." "What do you really feel for me?" "Me?" " Do you love me?" " You?" "You're playing with my feelings." "You could have any boy you liked instead of wasting time with a guy like me." "It's not true!" "Roses for the girl, young man?" "I'll have them all." " How much, granny?" " 500." "A hundred short, young man." "Get back to your trade, woman." " They're lovely, thanks." " I wish this moment could last forever." "Can you hear that song?" "From this moment on even on the other side of the world," "I'll think of you when I hear this song." " This will be our song." " How did you know I like Enrique?" "I didn't." "It's a good sign." " How much longer shall I play this?" " Longer." "I want to give you something else." "Marry me." "I love you." "This feeling is like an epiphany, an act of God." "You were so close, yet I didn't see you." "I was dating the wrong sister." "If you don't love me, just tell me so." "I don't want illusions," "I'll turn on the gas, they won't rescue me, alas." "Don't do it." "I love you, too." " But I can't marry you." " Why?" "Before you get married, you need to date for at least three months." "I read it in Bravo Girl." "Got the wedding date, yet?" "If you need a best man..." "In a month's time." "Diamond, you're not lying to us, right?" "No." "The deal is done." " Why am I carrying a stinking palm tree?" " It's not a palm." "It's a dracaena." "Whatever." "We'll get rid of this crap and go to your place." "First, we'll go to my place." "And then, you'll get rid of this crap." " You're sure you saw them together?" " They went to the lakes in the morning." " They have no respect for you, boss." " Take care of him." "I don't want to see him again." "Oh, my God." "Mariano Italiano was your dad?" "Yes." "He got me to sing." " How did your parents meet?" " A classic mismatch." "Just like us." "My mother comes from a very rich family." "One day she went to Ritmo with her friends..." "And now, our guests from the Italian Peninsula that have just arrived in their Alfa Romeo straight from Portofino." "From that night on they were inseparable." "Unfortunately, an evil shadow was lurking around dad." "The comb guy, Stefan." " How come you mum married him?" " I guess she doesn't know that herself." "My dad's body was found four years ago, in a moat separating the lion's den." " I'm sorry, I didn't know." " My mum was devastated, looking for support." "Stefan used the opportunity to weasel in." "If only you could see him then, the epitome of compassion, so caring." " But he got tired of it, eh?" " Never mind." "It's cold, let's get inside." "What about protection?" "You're not on the pill?" "Egoist." "I'll be careful." " It's too risky." " But I'm in, already." " Get out, then." " I don't want to." " Stop arguing with me." " You'll give me neurosis." "800 metres from here, there is a petrol station." "Take a bike." "Be quick." "Jesus Christ!" "Hello." "Sir, are you all right?" "Oh, Haus Kommando is calling." " Hello." " Diamond?" "Honey..." "I was just sleeping." "I was driving a car and something terrible happened." "Really, what is it?" " I think I knocked over a man." " Fuck." "Are you at the police station?" "No, it's just some field." "No one's around and he's just lying there." "Where are you, exactly?" "You've been drinking?" "No, just half a bottle of scotch at the shrink." "Fuck!" "I overheard that Stefan wanted to get rid of Noemi's boyfriend." " You're in deep shit." "This guy's dead." " Oh God." "What now?" "I don't want to go to prison." "I'll get rid of the body." "You go home." "Don't cause any more accidents." " What's going on?" " Oh, it's you." " Yes, me." "And you are...?" " Me?" "Hold this for me." "You know what, I'm feeling a bit funny." "It was dying in the city." "In the wild, it will be revived." "Impossible, you're dead!" "I'm dead because you killed me." "But my spirit will haunt you until you pay for your heinous crime!" " Stop scratching your eye." " It's uncomfortable." "Try to get used to it." "Don't you feel that lenses made your life easier?" "Easier?" "So many things happen around me, I can't think straight." "Let me do the thinking." "Here's the deal, when you learn to sing like Stevie Wonder, you can throw away the lenses and earn your living on stage." "Now, as long as you work for me, wear the fucking lenses, got it?" " What's up?" " Diamond'll marry the sister and pay." " You shook him a bit?" " We took him to the zoo." "Fucking what?" "Take him to the cinema, too, and buy popcorn." "Let me finish, boss." "We visited the bears, Jaws grabbed Diamond by the collar and threatened to throw him in." "Diamond was scared shitless." "I like this shit." "Soon, I'll be visited by Krzysiek Jarzyna from Szczecin." "We were supposed to go bowling or have sushi, but instead we could throw Diamond to the lions." " It's a smooth move." " But Diamond is about to get married." "We need to find someone, anyway." "I can't eat fucking sushi all my life." " Su...what?" " Sushi." "SEE WHAT I JUST DUG UP." "PAY 250,000 USD ON THURSDAY." "OTHERWISE YOU AND YOUR JOHN WILL END UP BEHIND BARS." "Oh my God." "What's going on?" "Nothing much." "We got you a transplant for a German Shepherd's sexual organs." " What?" " Just kidding." "It's just the way of our doctor." "You were brought here two days ago." " What's my condition?" " Just a few bruises." "You slept a lot." " How long will I stay here?" " Until we have free space in the morgue." "Doctor, stop." "You'll be held for observation." "Two or three days." " Why the fuck did I help you?" " What are we going to do?" " Let's call the police." " Are you nuts?" "The police can't know about it." "Either pay, or go to prison." " Where do we get so much money?" " "We"?" "There is no "we"." "He wants YOU to pay." "You know what, why don't you withdraw the money from the account your mother set up for you?" "I can't live knowing that I killed a man, my sister's boyfriend." "It's terrible." "And now the blackmailer." "They want to take all my money." "I don't know what to do." " Do you think I should pay 250,000 USD?" " What?" "How much?" "Yes, yes!" "I mean, no!" "Excuse me, what's the exchange rate?" "It's horrible that all your money which we could use to buy a flat, furnish it, prepare a baby room is going to a low-down blackmailer." "Don't worry, I'm doing this for us." "Let me do something for you as well." "I'll deliver the money myself." "I don't want you to risk your life." "What's he up to?" "It's Witek." "Kasia and I are headed to Sopot for a week." "See you." "What's going on?" "Kuba, are you all right?" "I hope you're not mad at me for sending you to the station." "Please, call me back." "I'm in location." "Nobody around, for now." "Wait, I think someone's coming." "Two men." "Oh shit." "Something's wrong." "One of them has a knife." "Fuck, man." "Are you insane?" "Take the money, but don't do it!" "Oh God!" "Bravo!" "Brilliant performance." "I've always admired your resourcefulness, but this really impressed me." "How did you know?" "Dominika has a Tic Tac where she's supposed to have a brain." " One look was enough to see her through." " I'll give her the money back." "No, you'll give it to me." "Anything else?" "What are you going to do with me?" "You're a filmmaker, so I hope you get to appreciate my creativity." "The boys have set the scene." " You wouldn't dare." " You'd be surprised, fucker." " Where is he?" " How the hell should I know?" " I'm not a seer." " That much I know." "There he is." " Did I tell you about my wife's affair?" " No." "A year ago, some metro cocksucker started to make his advances." "A start-up writer, or something." "Total loser." "Hardly competition for you, boss." "Not exactly, my wife has always had a romantic streak." "She went absolutely crazy over him." "She took him on holiday to Africa." "I don't remember the country." "Besides, new countries keep popping up over there." "Imagine that, on the very first day, they had an unpleasant adventure." "Someone broke into their hotel room and stole all their belongings, aside from the camera and their toothbrushes." "They didn't take the camera?" "Somehow they didn't." "The lovers saw nothing unusual about it." "My wife bought them new clothes with her credit cards." "They enjoyed their time, went on a safari, took photos at sunset." "They stared lovingly in each ether's eyes." "They wanted to start a new life together after their return." "My wife was going to file for divorce, so they could get married." "They got back suntanned, and even deeper in love." "After some time my wife realised, though, that she hadn't developed the film." "Apparently, there were a few photos taken by three locals who broke into the room." "In those photos, you can see the negroes shove the toothbrushes up their asses." "For the entire month the lovers brushed their teeth with them." "Their love didn't survive the trial." "My wife, though she still loved that man, couldn't bring herself to kiss him again," "for all she saw were the three negroes with his toothbrush up their asses." "What a coincidence." "Who said it was a coincidence?" " Morning." " Morning." " Nice outfit." " Thanks." " What brings you here?" " I saw a familiar car, so" "I thought I'd have a chat with Diamond." "We go fishing together." "Oh, but Diamond is gone." "You might say he swallowed the bait." " Anything else?" " I can wait." "I'd like a cold beer, too." "Wait on your own plot." "Forgive me." "Now all my sons-in-law are here." " Shall we dig Diamond out?" " Give him 20 more minutes." "I'll take a leak." "Any more funny stories?" "Let's have a bit of a laugh." " I don't recall any." " Out with your money." "Chop-chop." "And the car keys." "Marek, I owed you 400." "I'll give it back to you now, OK?" "Don't be such a smart-ass." "Off with you." "Boss, we're in the woods." "Come over." "Krzysiek Jarzyna is here." "I want to show him the zoo trick." "But Diamond isn't here." "He's no ranger, why would he be in the woods?" "Try the office." " Krzyé, have you wired the money?" " Of course." "JOKER, I'll be damned." " Good afternoon, sir." " What do you want?" "Have you recently used the service of one of our girls?" " Can you be more specific?" " One girl claims you forgot to pay." "Is this about the money?" "How much?" "50,100?" "I'm in a bit of a hurry." "No, the service is on the house." "I just thought you were dissatisfied and refused to pay the bill." "If it makes you and the girl feel better, let's say I was very satisfied." "And when she was blowing me, I was in heaven." "OK?" "Good, now you'll blow my partner." "Hello." "Dominika?" "My Dears," "When you read this, I'll be far away." "Two innocent people died because of me." "First, I knocked over Noemi's boyfriend." "Then, blackmailers killed Diamond." "I didn't tell him that" "I'd given him paper cut-outs instead of bank notes." "It was my shrink's advice, I wish I hadn't listened." "Suicide is the only way out." "I've thought this through." "Goodbye, llove you all." "Yours, Dominika." "Go fetch him, Jaws." "I'll join him, just in case." "Stay." "Diamond is no Capone to be escorted in twos, right Krzyé?" "Second door to the left." "You see?" "Our Jaws is a pro." " Did you have a good look?" "It's him?" " Of course it's him." "You'll wreck his self-esteem." " Got a sore throat, boss?" " None of your goddamn business." " I have painkillers, if you need them." " This pain can't be killed, so shut it." " What have you done to Kuba?" " Keep your voice down." "He's gone and he's not answering calls." "What have you done?" "Pacify her." " Shut your trap, miss." " Piss off, monkey man." "Where is he?" "Easy, bitch, or else you'll end up like your father." "Sorry, boss." "Slip of the tongue." "What an idiot!" "I never liked you." "You disrespected me." "All I saw in your eyes was contempt." "It hurt like a splinter in my dick." "You can't just give me the cold shoulder." "I'm sensitive to that." "Your daddy forgot about that, too." "Big mistake!" "I always remember and never forgive." "Any final, nice words you can offer me?" "Throw her in." "What's that?" " What's our car doing here?" " As I was saying, boss... this is Diamond's neighbour." "Gentlemen, we have a case that doesn't involve you, so let's not get into each ether's way." "No problemo." "You were the first, throw in what you've got." "You, fetch me Diamond." " Boss, one more in here." " Unpack." "The bear will have some fun, too." "I'll enjoy seeing this pair torn apart by lions." "Excuse me, are you the one who sings the hit... llove you... bla bla, my beloved one?" "That's me." "In that case I'm sorry, but you can't throw her in." "You won't order me about." "Why don't we trade?" "You'll get the boy." "But it's my boyfriend." "Do you love him?" "Yes." "Now I'm really confused." "Excuse me, perhaps instead of us, young and in love, you'd consider throwing him?" "All he does is shout, thinks he's the smartest ass... and he mocked me earlier." "You need some fine tuning, 'cause you're all fucking messed up." "You are jumpy, indeed." "And you're no good with people." "Sonny," "I've read 1,500 books on how to treat people." "When you picked your nose and ate goo, I jumped like a frog over the heads of losers like you straight to the very top." "I'm born to succeed, while you, punk..." " I've read two books in my life." " Which ones?" "Read to me, Mommy?" "One of them was The Godfather." "If you'd read that, you would know that money isn't everything, that you don't betray your friends, and you don't fuck their wives." "Instead, you stuffed your brain with crap about frogs and now force others to buy your theories." "Right, Krzyé?" "Enough." "Take care of him." "Not so fast, Mr. Froggy." " You two, are you new in the business?" " I used to work for Blacky." "Oh, yeah?" "Meet Mr. Krzysztof Jarzyna from Szczecin." "Thank you." "You're free." "Hold on just a sec." "What's wrong?" "Am I your boss or what?" "Mr. Jarzyna is the boss of all bosses." "No hard feelings." "Go home." "Take Mr. Froggy's car." "He won't be needing it, right Krzyé?" "No, thanks." "Unpack Diamond." "Damn, I should've taken her autograph." "What the hell?" " Excuse me, who are you?" " Me?" "I'm a director of action movies." "Well, you're in for some real action." "Diamond?" "How's my sister?" "Unfortunately, the baboon's heart was rejected by her system." " Doctor, please." "Your sister's fine." " How did she manage to survive?" "The bullet hit the stone, the shrapnels only bruised her arm." " But she swallowed some poison, too?" " Right..." "But she choked on water and threw it up." "Resuscitation was pure formality." "With that, this gloomy story ends;" "A lot of sensation for a short summer." "Noemi and her mother left the city to relax for a while." "They wanted me to join, but I thought they should spend some time alone, and get to terms with the recent storm." "Post-traumatic coma." "We're not sure he'll pull through." "His zoo mate, the gorilla, was very lonely." "It must've been a deep... shock for your husband." "Dominika suffered from shock, too." "Yet, in her case the effects were surprising." "She gained in self-confidence, started marketing studies a year later and took over Pol-Invest." "A movie entitled," ""The Promise of Sudden Death in Snake Valley"" "became a box-office hit." "Critics praised the director for realism and a few fresh faces." "Kuba, good to see you." "Someone is waiting for you." "Why are you here, really?" "You know..." "I bought one the other day." "I figured we could, you know..." | 53,527,426 |
Q:
Validación de Schemas para el manejo de longitud de strings
Tengo el siguiente modelo en mongoose
import mongos from 'mongoose'
import validator from 'mongoose-unique-validator'
const schema = new mongos.Schema({
name: {
type : String,
required : [ true, 'El nombre del rol es necesario' ],
unique : [ true, 'Ya existe un rol con ese nombre' ],
max : [ 50, 'El nombre no puede exceder los 50 caracteres' ],
min : [ 3, 'El rol debe contener 3 o más caracteres' ]
},
status : { type: String, default: 'active' },
addedBy : { type: mongos.Types.ObjectId, ref: 'User' },
addedDate : { type: Date, default: Date.now },
modification : {
user : { type: mongos.Types.ObjectId, ref: 'User' },
date : { type: Date, default: Date.now },
current : { type: String },
updated : { type: String }
}
}, { collection: 'roles' } )
schema.plugin( validator, { message: 'Ya existe {VALUE} en la base de datos' } )
const RoleModel = mongos.model( 'Role', schema )
export default RoleModel
Cuando inicio las validaciones:
Pasó el required
Pasó el unique
No pasó el max (Hace la inserción)
No pasó el min (Hace la inserción)
No entiendo que estoy haciendo mal, me podrían apoyar
A:
El problema está en que usas la validación inadecuada para el tipo de campo que deseas validar.
Las validaciones incorporadas de Mongoose min y max son validaciones usadas para datos tipos Number, y tu deseas validar datos tipo String.
Las validaciones que debes usar para un tipo String son minlength y maxlength.
Tu esquema de Mongoose debería ser así:
import mongos from 'mongoose'
import validator from 'mongoose-unique-validator'
const schema = new mongos.Schema({
name: {
type : String,
required : [ true, 'El nombre del rol es necesario' ],
unique : [ true, 'Ya existe un rol con ese nombre' ],
maxlength : [ 50, 'El nombre no puede exceder los 50 caracteres' ],
minlength : [ 3, 'El rol debe contener 3 o más caracteres' ]
},
status : { type: String, default: 'active' },
addedBy : { type: mongos.Types.ObjectId, ref: 'User' },
addedDate : { type: Date, default: Date.now },
modification : {
user : { type: mongos.Types.ObjectId, ref: 'User' },
date : { type: Date, default: Date.now },
current : { type: String },
updated : { type: String }
}
}, { collection: 'roles' } )
schema.plugin( validator, { message: 'Ya existe {VALUE} en la base de datos' } )
const RoleModel = mongos.model( 'Role', schema )
export default RoleModel
Espero que esto aclare tu duda.
| 53,527,480 |
Lack of association between serum immunoreactivity and Chlamydia pneumoniae detection in the human aortic wall.
Only a few studies have focused the attention on the relation between elevated anti-Chlamydia pneumoniae (CP) antibodies and the detection of CP in the arterial wall. The aim of our study is thus to investigate the relationship between immune response to CP and detection of CP in the aortic walls of patients with abdominal aortic aneurysm. A specimen of aortic wall was obtained from 102 consecutive patients who underwent abdominal aneurysm repair. The possible presence of CP was studied by polymerase chain reaction and confirmed by nonradioactive DNA hybridization. Antibody response to CP was studied (IgG, IgA titers). We found 33 patients (32.4%) with CP DNA+. No correlation between CP DNA detection and antibody titers was found (IgG P=0.52, IgA P=0.66). High correlation between IgG and IgA titer was observed (P<0.01). Endovascular presence of CP and antibody titers was not related to the age of the patient. CP antibody titers are not associated with the presence of CP in the aortic wall of patients with abdominal aortic aneurysm. | 53,527,524 |
WHAT CRUSHING HYPOCRISY!!!
It's to do with the volcano which erupted recently in Iceland. Because of an area of high pressure just south of the island, winds blow the huge cloud of dust and ashes over Europe, paralysing all airline flights right across the UK.So hundreds of thousands of Britons had their vacations ruined. Most if not all, purchased travel insurance for the very purpose of hitting a cropper that would prevent the plane from taking off.Although airliners are refunding in full, travel insurers are holding back any compensation because the volcanic eruption was an Act of God.Act of God!!!And this is a nation that laughs at the idea that there is a God. Here, evolution reigns supreme. They are the educated middle-class who are the very backbone of Britain. They are the ones who are most fervent in pushing their idea that we are Primates, the same biological class as monkeys and apes. In other words we humans are little, if not nothing more than hairless apes. God's creation?Don't be silly! Science has disproved such religious stupidity!Ah! When money talks, it talks very loud indeed. Suddenly the God that never existed suddenly rears his head and blows out a puff of smoke. Shocked, our educated elite who are raking it all in from the traveling public have with equal suddenness turned religious and declared that the disaster was an act of God, which is a very good reason for forbearing any compensation payouts. Like the City bankers, our politicians, top executives and other middle class spivs, those in insurance are consumed by greed. To them, God does not exist - unless it suits them.
Act of God is an antique legal phrase in Western law that persists today, though in practice it really means an Act of Nature, that was not the fault of any human person, agency or entity, and for which no legal liability can be assigned. Ya gonna sue a volcano, or the entire country of Iceland?
NotThatOld saidIt's to do with the volcano which erupted recently in Iceland. Because of an area of high pressure just south of the island, winds blow the huge cloud of dust and ashes over Europe, paralysing all airline flights right across the UK.So hundreds of thousands of Britons had their vacations ruined. Most if not all, purchased travel insurance for the very purpose of hitting a cropper that would prevent the plane from taking off.Although airliners are refunding in full, travel insurers are holding back any compensation because the volcanic eruption was an Act of God.Act of God!!!And this is a nation that laughs at the idea that there is a God. Here, evolution reigns supreme. They are the educated middle-class who are the very backbone of Britain. They are the ones who are most fervent in pushing their idea that we are Primates, the same biological class as monkeys and apes. In other words we humans are little, if not nothing more than hairless apes. God's creation?Don't be silly! Science has disproved such religious stupidity!Ah! When money talks, it talks very loud indeed. Suddenly the God that never existed suddenly rears his head and blows out a puff of smoke. Shocked, our educated elite who are raking it all in from the traveling public have with equal suddenness turned religious and declared that the disaster was an act of God, which is a very good reason for forbearing any compensation payouts. Like the City bankers, our politicians, top executives and other middle class spivs, those in insurance are consumed by greed. To them, God does not exist - unless it suits them.
"Act of God" just means an act of Nature (i.e., not the fault of the company or anyone else). They don't literally believe that God caused the volcano to erupt. You really are a Crazy nut job when it comes to religions matters!!!!!!
First of all, I would like to say that I don't think you are a "crazy nut job"... BUT, I think you are taking the term "An Act Of God" a little to literally. Most of the replies, up to this point, seem to hit the nail on the head. It IS a misunderstood and antiquated term. Act of Nature is more precise.Although, I do NOT side with the insurance companies on MOST of their practices, I do believe that they should NOT be held liable for "accidents" of this nature. If a bolt of lightening came out of the sky and blew a plane completely out of the sky, would the insurance companies be liable?In the words of Queen Victoria: "We think not!".
"I do believe that they should NOT be held liable for "accidents" of this nature."
Curious--while doubtless the terms of the travel insurance policy do exclude "acts of god", I tentatively disagree. The reason insurance companies exclude "acts of god" from normal policies is because of two factors: variable and extreme losses (especially summed over all policies) and low frequency of occurrence. Estimating the probability of loss is difficult when there are so few data points available, which places the insurer in a high risk situation. On the other hand, travel insurance carries a fixed low loss--the plane ticket. It's not like you're rebuilding a flooded city or recovering from a tornado, where the scale of the damages unpredictably high.
And lets face it--most plane cancellations are weather related. This is just very unusual weather. ;)
FriendsRGood saidIf a bolt of lightening came out of the sky and blew a plane completely out of the sky, would the insurance companies be liable?
And it begs the troubling question, would that also be considered an "Act of God?" And if so, why would a benevolent loving God arbitrarily kill a planeload of men, women, and children for no apparent reason?
But it was just a work of nature. God's hand wasn't involved in that. I do believe in god, and all. I also think its funny when people who do not, use the term "act of god". Because it implies that god had a part in it in some shape or form.
When god manipulates nature and science to do his thing (as they are his to do so). Its a big thing, very big thing. We've not yet seen anything like that yet, this was just the workings of the world, which can be pretty random and violent at times.
Though the bible does say, one of the signs is the environment. Storms and disasters in the end days are supposed to be more violent than the last, and more frequent... Its pretty interesting.
kew1 saidI wonder what Richard Dawkins would say if it happened to him.Have a big argument with the insurance company.
That man is a reptile lol. I was watching a documentary with Ben Stein, it was called "Expelled no intelligence allowed" very very interesting. Anyway of course that arrogant wanker was going on about the misguided rubbish he believes. And he was either too full of himself, or not as smart as he thinks he is, but I was cracking the fuck up when he agreed with what Ben Stein said about intelligent design, and not knowing who or what it is.
I think that man had a bad child hood, and is just starved for attention, this other intellectual kinda dogged him out too.. He reminds me of some sort of wicked witch lmao. He even got all prissyfied when Bill O'Reilly tore him up lmfao. "would you stop yelling at me" what a wanker.
kew1 saidI wonder what Richard Dawkins would say if it happened to him.Have a big argument with the insurance company.
That man is a reptile lol. I was watching a documentary with Ben Stein, it was called "Expelled no intelligence allowed" very very interesting. Anyway of course that arrogant wanker was going on about the misguided rubbish he believes. And he was either too full of himself, or not as smart as he thinks he is, but I was cracking the fuck up when he agreed with what Ben Stein said about intelligent design, and not knowing who or what it is.
I think that man had a bad child hood, and is just starved for attention, this other intellectual kinda dogged him out too.. He reminds me of some sort of wicked witch lmao. He even got all prissyfied when Bill O'Reilly tore him up lmfao. "would you stop yelling at me" what a wanker.
He was at a benefit gig & spotted some T-shirts with "Richard Dawkins is God" printed on them.
Cloud of ash, planes falling from the sky.....Holy crap batman it's the rapture
SAVE ME JEBAS....SAVE ME I ALWAYS BELIEVED IN YOU AND YOUR MAGICAL POWER....I WANED INTO THE CHURCH OFF HARRY POTTER BUT NOW I SEE YOU ARE THE ONE TRUE SON OF GAWD
It's just an expression...like.....for example if I were to say...... dumber than a bag of pig shit...doesn't mean you are literally "dumber than a sack of pig crap" just that on a human scale you are exceptionally stupid | 53,528,076 |
Changing patient population in Dhaka Hospital and Matlab Hospital of icddr,b.
The Diarrhoeal Disease Surveillance System of icddr,b noted increasing number of patients ≥60 years at urban Dhaka and rural Matlab from 2001 to 2012. Shigella and Vibrio cholerae were more frequently isolated from elderly people than children under 5 years and adults aged 5-59 in both areas. The resistance observed to various drugs of Shigella in Dhaka and Matlab was trimethoprim-sulphamethoxazole (72-63%), ampicillin (43-55%), nalidixic acid (58-61%), mecillinam (12-9%), azithromycin (13-0%), ciprofloxacin (11-13%) and ceftriaxone (11-0%). Vibrio cholerae isolated in Dhaka and Matlab was resistant to trimethoprim-sulphamethoxazole (98-94%), furazolidone (100%), erythromycin (71-53%), tetracycline (46-44%), ciprofloxacin (3-10%) and azithromycin (3-0%). | 53,528,108 |
Thursday, June 22, 2017
Nature's Masterpiece
Day 5 of MFT Camp Create was Glitzy Glitter. I love sparkle on my projects so I was thrilled! This card is so simple, but it's probably now one of my favorites that I've created. It's just calm and relaxing. And I love when I start out on a card with no real ideas or designs in mind, and it just suddenly all comes together perfectly. Have a great day!
Search This Blog
Hello!
Hi! I'm Katie! I'm a wife, mother of two great little kids and two furry cats, and I love to create! Card making and stamping are my favorite hobbies. I love my Cuttlebug, my Copic markers, and Stickles! My motto is when in doubt, just add sparkle! ;) I got the name for my blog after my girl cat, who my husband nicknamed "Sweetie Bear." My dream is to one day open an actual studio to devote to all things crafty and artsy.
Check These Out
Copyright
All content of this site is (C) Katie Korsak and is for personal inspiration only. This includes all of my original artwork, designs, photographs, and text. My work may not be copied or used for publication or contest submission without my permission. | 53,528,177 |
U.K. Black Lives Matter said in a statement it was holding a "shutdown" of roads in London and other cities to "mourn those who have died in custody and to protest the ongoing racist violence of the police, border enforcement, structural inequalities and the everyday indignity of street racism."
London's Metropolitan Police said officers arrested 10 people blocking a road leading from a main highway to Heathrow on Friday morning, including six who were "locked" to one another.
Photos showed police moving a group of people attached together lying across the road beside a banner saying "this is a crisis."
Police said one lane of the road was open but traffic was backed up getting into one of the world's busiest airports. Heathrow said it was not aware of passengers missing flights because of the protest.
In other protests, a small group of demonstrators in the central England city of Nottingham disrupted public transport by lying down on tram tracks, and police removed protesters from a road near Birmingham Airport, 100 miles (160 kilometers) north of London.
The protesters said they were marking the fifth anniversary of the death of Mark Duggan, a 29-year-old black man shot by London police under disputed circumstances on Aug. 4, 2011. The killing sparked Britain's worst civil disorder in decades, several nights of rioting that spread from London to cities around the country.
Activists say black men in Britain are unfairly targeted by law enforcement and disproportionately represented among prison inmates. According to official figures, 26 percent of inmates in England and Wales are non-white, compared to 12 percent of the overall population there. | 53,528,189 |
Womens Travis Frederick Jersey
It shouldn’t have been that shocking that the Dallas Cowboys beat the Philadelphia Eagles on Sunday night. When this team plays well Womens Cole Beasley Jersey , they can be a force. Holding the Eagles to just 20 points shouldn’t be too surprising. After all, the Cowboys defense is the stingiest defense in the NFC when it comes to points allowed and let’s face it - the Eagles offense isn’t exactly lighting it up like they were last season.What was totally surprising, though, is how much of a non-factor Fletcher Cox and Haloti Ngata were on the Eagles interior defensive line. Not only were the Cowboys without their All-Pro center Travis Frederick, but rookie Connor Williams was out with a knee injury, forcing the team to have Xavier Su’a-Filo and Adam Redmond compete for the starting gig last week. And because of a knee injury that caused All-Pro guard Zack Martin to miss some snaps, both of these reserve linemen were thrown into action Sunday night. It had all the makings of a giant mess for this Cowboys offensive line that could have resembled the Atlanta debacle last year where they couldn’t protect Dak Prescott to save their life.But none of those bad things happened. Instead, it was quite the contrary. Martin returned to man the right guard spot which brought a giant sigh of relief over Cowboys Nation. But it was the play of an unlikely big man that have people buzzing now. Xavier Su’a-Filo (pronounced ZAY-vee-er sue-ah-FEE-low) did a fantastic job at left guard.You may remember back in 2014 when the Cowboys made the first splash on Day 2 of the draft to trade up to select DeMarcus Lawrence with the 34th overall pick. Well, the Texans had a shot to take Lawrence as they had the first pick of the day, but they had already selected Jadeveon Clowney with the first-overall pick in the draft. So they opted to select Su’a-Filo, who was the second guard taken in the draft after Zack Martin. Su’a-Filo played his entire rookie contract with the Texans, but he never lived up to his draft cost and for that reason - he’s viewed by many as a disappointment. This sounds like a similar song we heard last year when the Cowboys signed former first-round pick Jonathan Cooper. As it turned out, Cooper was solid at left guard and started 13 games for the Cowboys last season.Over the past two seasons, injuries have plagued the left guard position, but in each instance the reserve has come in and not only played serviceable Womens Tyron Smith Jersey , but they have stolen the job from the starter. Ron Leary did it to La’el Collins in 2016 and then Cooper last season. Could Su’a-Filo make it three years in a row?Getting Connor Williams at pick 60 was a great deal for the Cowboys, but the rookie has had his share of struggles this season. Maybe those growing pains could’ve been hidden in between two All-Pro players like Frederick and Tyron Smith, but Frederick hasn’t been around and Smith hasn’t been his typical All-Pro self. As a result, Williams’ struggles in the trenches have hurt the offense at specific times.Ideally, you want the young player to get his reps so he can develop, but the team must assemble the group that is going to produce the best results on the field. It’s just one game, but it’s very possible that this former 33rd overall pick could be the better choice right now.Ezekiel Elliott had his largest yards-per-attempt average of the season as he had plenty of holes to run through Sunday night. Su’a-Filo did a good job securing his blocks, opening up running lanes for Zeke. Elliott had two-straight runs for nice gains in the third quarter when he was able to find creases behind Su’a-Filo.Photo courtesy of NFL Game PassAnd this continued throughout the night. Look at Su’a-Filo get into the second level and block the linebacker, freeing Zeke up for a big gain.Photo courtesy of NFL Game PassWhen Elliott can get some traction going, he’s tough to stop. He had a league-high four runs of 15 yards or greater on Sunday night and now leads all running backs this season with 18 rushing attempts of 15+ yards.And sometimes the little things can be the difference between a tackle for a loss or a nice gain near the goal line.Check out Brian Baldinger’s breakdown where he mentions the play of Su’a-Filo a couple times.It wouldn’t surprise me if Williams recovery ended up taking a little longer than it normally would if the team desperately needed his services. They might as well let him heal up completely and give the veteran more opportunities to see what he can do. Williams has plenty of time to develop his craft, but his on the job training shouldn’t come at the expense of losing football games. Right now, they need a good left guard and it’s very possible that person is Su’a-Filo. If Su’a-Filo can continue to play at the level he did against Philadelphia, that could mean we see more of him down the stretch.What would you do - stay with Su’a-Filo or go back to the rookie when he’s healthy? It was tough to get a good night’s rest after watching the Cowboys ghastly Monday night performance against the Tennessee Titans. I kept visualizing that Cole Beasley trick play as if I was playing Madden, only I was accidentally hitting the wrong buttons. And then I would have flashbacks about how great I felt in the first part of the game when I started feeling that same sense of dominance when they surprised everyone with a blowout victory over the Jacksonville Jaguars. Leading up to Monday night’s game, all I kept thinking about was “which Cowboys team were we going to see tonight?” And it was such a good feeling when we saw the offense start blazing down the field and the defense playing with such an incredible level of energy.But that feeling didn’t last long as the legs got swept out from under them and they relapsed back to an inept offense combined with a defense that had its worst showing of the season. Did you know that coming into this game Youth Anthony Brown Jersey , the Cowboys defense was ranked #1 in the league, allowing the fewest points per game? Thanks to some defensive struggles by the Baltimore Ravens over the last three games, the Cowboys managed to jump them for the number one spot. Unfortunately, they were only able to hold down that spot for one day due to giving up 28 points to an offense that is near the bottom in scoring this season. Oh, and guess who holds that top spot for fewest points allowed now? The Tennessee Titans.Of the Cowboys first eight games, five of them have been against top 10 scoring defenses. And they’ll get another one on Sunday with the Philadelphia Eagles. Of course, our good pal rabblerousr reminded us of a very important common denominator from all those opponents.The offense’s continuous struggles are difficult to stomach. It’s hard to fathom how a team that has Ezekiel Elliott isn’t able to have more success moving the ball. But the Cowboys manage to pull it off. Somebody is always doing something wrong and that throws everything out of whack. A missed block here, a penalty there, or a throw that is nowhere close to where it’s supposed to be - all contribute to Dak Prescott and company slowly waltzing off the field in disappointment. Did you know that in each of the Cowboys first three possessions against the Titans, Dalton Schultz missed a block that allowed the defender to tackle Elliott for a loss?Man, I didn’t realize how important Geoff Swaim was.Three red zone opportunities, each with a negative play, contributed to just seven points produced in those first three possessions. And the touchdown the Cowboys did get was on the heels of the defense swatting the ball out of Marcus Mariota’s hand and kicking it around until they were deep into Titans territory.The offense is just bad, really bad.Are brighter days around the corner? There is no reason to believe that they are. Dallas could very well surprise people and play more of that great football they occasionally play, but it would definitely be a surprise because none of us are expecting that now. Regardless of how things play out Womens Ezekiel Elliott Jersey , there are going to be some things to be hopeful about and some things that will concern us.The GoodI’ll be the first to raise my hand when it comes to not liking the trade to acquire Amari Cooper from the Oakland Raiders. First-round talent on a cheap four-year contract is an asset that’s just too hard to give away. But it’s done. Time to put on our forward faces.When it comes to Amari Cooper himself, it’s hard not to like the player. He’s a great route runner and the separation he creates from the defender was on full display Monday night. The Cowboys know what they’re getting with Cooper and he showed us all a glimpse of what that is.Cooper is a good player and this team definitely has a big need for what he can bring. The only question is - can the Cowboys utilize his ability properly? If they can, he’ll make that first-round pick investment mean something.Speaking of first-round investments, Leighton Vander Esch looks very good. Normally, this would be the time of the year where we would sulk from learning Sean Lee is going to miss some games due to his latest injury, but when it comes to Cowboys’ problems - that’s near the bottom of the list. And a big reason for that is the play of LVE. I don’t even care about that cheeseball personal foul penalty, most of what he showed on tape was really good. He’s a keeper.The BadIf the Cowboys score over 17 points this season, they win. If they don’t, they lose. That would be fabulous news to hear as eclipsing 17 points doesn’t seem too difficult, but that’s just not the case for the 2018 version of the Cowboys. In fact, they failed to go over 17 points five times this season. That’s just really bad offense.People that are complaining about the play-calling are right. It’s been dreadful at times. I really don’t know what they’re thinking sometimes. People that are complaining about Dak Prescott are also right. Some of his throws look as if he’s a rookie quarterback getting close to being benched. And then there’s the offensive line. They’re terrible at times and they look even worse when Prescott holds the ball for way too long.The Cowboys just can’t figure out how to make this offense work. Jason Garrett, Scott Linehan - you guys are supposed to be two great offensive minds who each have two of the top scoring seasons in franchise history as offensive coordinators, yet this group can’t score points. Fix it!And a fix better come soon because this Cowboys defense isn’t as good as we might have thought they were at one point. Yes, they’re still third in points allowed and this group has played well for the most part, but they have holes and opposing teams are exploiting them. The defense can become overaggressive at times and offenses are capitalizing. Read options Womens Travis Frederick Jersey , shovel passes, screen plays - they all punish a team that goes all-in and guesses wrong.Watching the defense play great for two downs only to give up a head-shaking third-down conversion over and over again was excruciating to sit through. Before, the defense had been reliable and bailed out the offense, giving them new life, but none of that was present on Monday night. Maybe they’ve used up all their chances.The UglyThe glass-half-full side of me would be tempted to remind you that the Cowboys are still in this thing. Heck, they play Philadelphia next week and if they win that game, they’ll catch the Eagles and hold the tie-breaker advantage. And after Washington’s slew of injuries on Sunday, nobody is really expecting them to hang on the NFC East. That would be a great message to convey if it wasn’t for the fact that this Cowboys team is doing nothing to make us think they can win football games. They’re a 3-5 team and 3-5 teams aren’t good. We are at the halfway point and the Cowboys haven’t been able to win two-straight games so why are we to believe they could go on a run? Yeah, I’m not going to try to sell you on that.And not only are the Cowboys not very good, but the opponents coming up - are. That’s right, they just got through the easy part of their schedule and now’s the time when things start to get hairy (schedule courtesy of NFL.com) Custom Dallas Cowboys Jerseys | 53,528,406 |
Electrochemical and XPS studies of titanium for biomaterial applications with respect to the effect of hydrogen peroxide.
Electrochemical measurements, x-ray photoelectron spectroscopy, and scanning tunneling microscopy have been used to study the effect of hydrogen peroxide on the passivity of titanium in a phosphate-buffered saline (PBS) solution. The results indicate that the passive film formed in the PBS solution--with and without addition of H2O2--may be described with a two-layer structure model. The inner layer has a structure close to TiO2 whereas the outer layer consists of hydroxylated compounds. The introduction of H2O2 in the PBS solution broadens the hydroxylate-rich region, probably due to the formation of a Ti(IV)-H2O2 complex. Furthermore, the presence of H2O2 results in enhanced dissolution of titanium and a rougher surface on a microscopic scale. Finally, a dark pigmentation (blue color) is observed when titanium has been exposed--for several weeks--to PBS with additions of H2O2. | 53,528,550 |
Q:
Ionic2 - Alternate way to route without using injected component?
I am building a mobile app and I'd like the user to have the ability to set their starting page via a settings-page. The idea is that the user can select a page from a list of options, the setting gets stored to local-storage and later, when the user logs back in, the user is automatically taken to that page first.
I have a page-service which contains a mapping of Id's to page-components. This is what I use to find the page I want to use when I read in my user's saved start-page data.
My issue is that I have developed a cyclic-dependency that I don't think I can break without finding a way to route in Ionic2 that doesn't involve using the injected component. As far as I can tell, the only way routing is achieved in Ionic2 is with the NavController.push(component) or Nav.setRoot(component).
PageService.ts
import {Injectable} from "@angular/core";
import {HomePage} from "../pages/home/home";
import {SettingsPage} from "../pages/settings/settings";
import {CartPage} from "../pages/cart/cart";
@Injectable()
export class PageService {
public pages = [
{
id: "HOME",
component: HomePage
}, {
id: "SETTINGS",
component: SettingsPage
}, {
id: "CART",
component: CartPage
}
];
constructor() {
}
getPageById(id: string) {
return this.pages.find(page => (page.id === id));
}
}
settings.ts:
My SettingsPage component has the PageService injected so that it can get access to get the list of pages. This is where my cyclical dependency occurs. The SettingsPage is injecting PageService which has a reference to SettingsPage in it.
import {Component} from "@angular/core";
import {PageService} from "../../providers/page-service";
import {UserService} from "../../providers/user-service";
@Component({
selector: "page-settings",
templateUrl: "settings.html",
})
export class SettingsPage {
startPages = [];
constructor(private pageService: PageService, private userService: UserService) {
this.startPages = this.pageService.getStartPages();
}
}
settings.html:
Just a simple list with a card to output the selection.
<ion-content padding>
<ion-list>
<ion-card padding>
<ion-card-title>Starting Page</ion-card-title>
<ion-item>
<ion-select [(ngModel)]="userService.activeUser.startPage">
<ion-option *ngFor="let page of startPages" value="{{page.id}}">
{{page.id}}
</ion-option>
</ion-select>
</ion-item>
</ion-card>
</ion-list>
</ion-content>
...and finally, when the app starts up and I want to automatically go to my start page I execute the following:
const startPage = this.pageService.getPageById(this.userService.activeUser.startPage);
this.nav.setRoot(startPage.component);
A:
Updated answer
Use forward ref in the SettingsPage constructor..
constructor(@Inject(forwardRef(() => PageService)) private pageService: PageService) {
this.startPages = this.pageService.getStartPages();
}
Old Answer - not appropriate because angular should be handling the instantiation of services through injection. "new"ing is a bad idea (but it did work).
I changed how the PageService was loaded in the SettingsPage and the cyclical dependency was resolved. I moved the PageService code out of the constructor and put it into the ngAfterViewInit() function. Now the PageService is only instantiated when the view is loaded.
ngAfterViewInit(){
this.pageService = new PageService();
this.startPages = this.pageService.getStartPages();
}
| 53,529,369 |
Early administration of aspirin in patients treated with alteplase for acute ischaemic stroke: a randomised controlled trial.
Thrombolysis with intravenous alteplase is the only approved treatment for acute ischaemic stroke. After alteplase-induced recanalisation, reocclusion occurs in 14-34% of patients, probably because of platelet activation. Early administration of antiplatelet therapy after alteplase could reduce the risk of reocclusion and improve outcome. We compared the effects of early addition of intravenous aspirin to alteplase with standard alteplase without aspirin. In this multicentre, randomised, open-label trial with blind-endpoint assessment, patients with acute ischaemic stroke treated with alteplase were randomly assigned to 300 mg intravenous aspirin within 90 min after start of alteplase treatment or to no additional treatment. In both groups, oral antiplatelet therapy was started 24 h after alteplase treatment. The primary endpoint was favourable outcome, defined as a score of 0-2 on the modified Rankin scale at 3 months. This trial is registered with the Netherlands Trial Register (NTR822). Between July 29, 2008, and April 20, 2011, 642 patients (322 patients aspirin, 320 patients standard treatment) of the targeted 800 patients were enrolled. At that time, the trial was terminated prematurely because of an excess of symptomatic intracranial haemorrhage (SICH) and no evidence of benefit in the aspirin group. At 3 months, 174 (54·0%) patients in the aspirin group versus 183 (57·2%) patients in the standard treatment group had a favourable outcome (absolute difference -3·2%, 95% CI -10·8 to 4·2; crude relative risk 0·94, 0·82 to 1·09, p=0·42). Adjusted odds ratio was 0·91 (95% CI 0·66-1·26, p=0·58). SICH occurred more often in the aspirin group (14 [4·3%] patients) than in the standard treatment group (five [1·6%]; absolute difference 2·8%, 95% CI 0·2-5·4; p=0·04). SICH was more often the cause of poor outcome in the aspirin group compared with the standard treatment group (11 vs 1, p=0·006). Early administration of intravenous aspirin in patients with acute ischaemic stroke treated with alteplase does not improve outcome at 3 months and increases the risk of SICH. The results of this trial do not support a change of the current guidelines, which advise to start antiplatelet therapy 24 h after alteplase. The Dutch Heart Foundation. | 53,529,409 |
March 19, 2009
The Guardian reports that "A perfect storm could hit the planet by 2030." The article states that "Food, water and energy shortages will unleash public unrest and international conflict according to Professor John Beddington. Shortages could lead to cross-border conflicts and mass migration and this will potentially come to a head in 2030. Follow the link to find out more.
January 08, 2009
Just about a month ago I wrote about an H5N1 outbreak in poultry in Hong Kong. Further news in the last few days has sadly reported that a nineteen year old woman who contracted H5N1 probably from handling and preparing live/freshly slaughtered ducks has recently died in Beijing. Follow the link to read the full article.
January 01, 2009
Oxford Economics have produced a fascinating, and concerning, report on the estimated global gross domestic product (GDP) for 2009/2010. It gives a timeline for the current credit crunch and the events to date.
The researchers estimate the final losses of the banking sector are around US$1.9 trillion, equivalent to about 6.5% of US and European GDP. The response over recent months has been to implement a series of bank rescue packages which total almost US$3 trillion. The report catalogues these:
"In the US the US$700bn Paulson Plan started with US$250 billion recapitalisation of the nine largest banks. In Europe over €1 trillion has been made available in the Eurozone to guarantee interbank lending with another €200bn for recapitalisation of banks. The UK bailout involves nationalising or part-nationalising leading banks at a cost of £50bn, with additional funding of as much as £325bn available in the form of loans and guarantees."
A further monetary measure has been to reduce interest rates which is good for borrowers but not for investors. In the US interest rates are 0 - 0.25%; Japan 0.1%, UK 2% and the ECB has cut rates to 2.5%. It is possible that if inflation increases rates will be further cut where possible. However this does not mean that businesses or individuals can obtain finance at those rates. The researchers conclude that lower interest rates usually take some 12-18 months to have an impact so other measures will also need to be taken.
World GDP is estimated to contract by 0.4% in 2009. Many countries have announced, or are considering, measures to increase their GDP - China by 14%; US by 7%; Japan 4.5% and Europe around 1.5%.
The report lists the following as key factors that will impact on monetary policy:
Weaker consumer spending - the report forecasts a reduction in personal spedning in 2009 of 1.2% in the Eurozone, 1.3% in the US and 2.3% in the UK.
Tougher economic environment for businesses - caused by reducing consumer demand and the impact of interest rates and borrowing costs.
Government finances - budget deficits and increased public debt will be a key issue as governments seek to spend their way out of recession and meet the financial needs of growing unemployment and the loss of tax income.
Lower inflation and interest rates - driven by a global slow down and lower commodity prices. Deflation is possible in some economies.
Exchange rates - will only help UK exporters when other economies seek to buy our products - if consumer spending is reduced in those countries our exports will also be reduced.
Weaker world trade - forecast to contract by around 1% in 2009 - reinforcing point 5 -
Emerging markets slowdown - many emerging economies have been hit by the issues already described and by external capital withdrawal. The IMF are seeking to fund some countries that have seen a severe impact from capital withdrawal including Hungary, Ukraine, Pakistan.
The report concludes that the economies of the US, the Eurozone, Japan and the UK are forecast to contract by around 2% in 2009. China is forecast to grow by about 7% in 2009, its lowest since 1990, India about 5% and Russia will slow dramatically from around 6% this year to little over 1%. Latin America is expected to grow by only about 1% in 2009 . The economies are forecast to improve in 2010 and move into positive growth for all regions.
December 28, 2008
I haven't written too much about my thoughts on the economic downturn but there have been some alarming articles in the last week or so that have caught my eye that are worthy of note.
The Independent reported that the State of California may run out of money by February. The article states that "John Chiang, the state controller, admitted ... that a spiralling budget crisis, which has left California spending billions of dollars more each month than it can raise in taxes, will see his coffers run dry some time in mid-February". The adminstration faces a stark choice either to cut spending or to raise taxes. If it can borrow money in the short term this choice still has to be made.
Woolworths stores are starting to close with 27,000 people losing their jobs .. not to mention Zavii, MFI and probably more to follow - a significant human imprint. the first of the stores opened on 5th November 1909 and the store has been part of my life. It will be sad to see Woolworths go. The Telegraph reports that at one point a Woolworths store was opening in the UK every SEVENTEEN DAYS!
My father worked for FW Woolworths as it was in the 1960s - starting at the bottom (in the storeroom in his late teens) and working his way up to store manager. He saw the writing on the wall though twenty-five years ago. In 1982 the UK retail operation came under British ownership for the first time and this provided the incentive for him to start his own business and leave the organisation. It is sad to see the 807 stores closing and I feel will have more of an impact in rural areas where there is little alternative to the diverse Woolworths stores.
The Independent carried a worrying article that suggested that the UK economy in 2009 may "contract at its fastest pace since the 1940s." The report states that "The Centre for Economics and Business Research (CEBR) expects the UK’s gross domestic product to decline by 2.9 per cent in real terms over the next year, the biggest annual fall since 1946, when the country faced mass de-mobilisation after the Second World War. Business investment – forecast to collapse by more than 15 per cent in 2009 – is pegged to pose the biggest risk to the economy while household expenditure is expected to fall by 1.8 per cent in the New Year.
The government’s statisticians publish a consistent series of gross domestic product estimates back only to 1948. The worst year on these records was 1980, where output was 2.1 per cent lower than the preceding year.”
The Independent also reports that after the £65 billion given to banks in the UK this year will need to be followed by a further £60 billion in 2009.
This all makes quite sobering reading, on topics that I will continue to follow in 2009.
November 26, 2008
The Guardian reports this startling fact. The article continues that "Nearly all hospitals are failing to meet hygiene and cleanliness standards set by the government to prevent superbug outbreaks, inspectors say today. Most of the breaches are not serious, but the Healthcare Commission warns that only consistent and comprehensive controls in all NHS trusts will ensure that infection rates for MRSA, Clostridium difficile and other hospital-acquired infections continue to fall".
Although many of the hygiene issues are not deemed serious this is a cause for concern however "At three out of the 51 trusts (around a third of the total) where unannounced spot checks took place, inspectors found serious breaches of the government's hygiene code". Only five trusts were found to comply.
November 11, 2008
One of the articles that I read over the weekend that filled me with concern was the article in the Guardian about the level of care at Birmingham Children's Hospital. Do check it out. When I have taken my children to hospital whilst being their advocate I have had to trust the judgments of the medical staff and that is a huge level of trust because your children are truly precious.
I can't rewrite the whole article but as a parent to read the concerns expressed in the report collated by other doctors is alarming. J.F Kennedy is reputed to have said that "Children are the world's most valuable resource and its best hope for the future." How a society values its children marks that society.
October 25, 2008
The Guardian reports that there has been a sharp drop in the number of cases of Clostridium Difficile in England. The article states that "There
were 8,683 cases recorded in patients aged over 65 between April and
June - a decrease of 18% compared with the previous quarter between
January and March, according to the agency that monitors infectious
diseases. The Health Protection Agency (HPA) added that, compared
with the same period last year, the number of cases had declined by
38%, from 13,924 cases."
October 02, 2008
The Guardian reports that the British economy has failed to grow in the second quarter of the year with a balance of payments deficit of nearly £11bn. The article states that "Most economists, though, think the economy has contracted in the current three months and will do so again in the final quarter of the year, meeting the technical definition of a recession" and concludes that GDP is expected to contract by 0.2% in 2009, after growing by just 1.1% in 2008.
According to the Guardian the UK Manufacturing sector has shrunk in output at the fastest rate for 17 years when records began.
September 21, 2008
ISO 9001:2000 is due to be updated later this year. The British
Standards Institute (BSI) suggests that there will probably be little
impact. Organisations that are certified to ISO 9001:2000 will be given
twelve months to make any changes.
However the BSI reports that
ISO 9004 may undergo a number of changes. The provisional title is
"Managing for sustainable success – a quality management approach."
They state that:
Due to the
significant changes this standard will no longer be updated at the same
time as ISO 9001 and its planned publication is the end of 2009. In the
meantime, until the publication of this version, the current ISO
9004:2000 will remain alongside ISO 9001:2000 and the subsequent ISO
9001:2008 version until the 2009 version is published, when the 2000
version will be withdrawn. | 53,529,459 |
Monday, March 2, 2009
our sweet, crazy, smart {at least to me =) } doggie is now is doggie heaven. ...with Avery's fish Bryce said. Paul and I got Dinah in the late summer of 1998. We saw a flyer at a gas station near Paul's school about some dogs that needed homes... so we drove to the house/farm to see. Paul saw a cute little puppy named Lulabelle and we had to take her home. The name was not a fit...so we named her Dinah {somehow came from Diner}. She was so hyper and nuts running around, jumping so high. She was a ball! No one was quite sure what she was, but she has some whippet and beagle in her. So glad we had her in her puppy stage in the college house we lived in that's for sure! I'll never forget when she ate a box of moon pies or nibbling on the batteries. Oh how she loved to watch other dogs on TV. She was our first baby... and then when Bryce was born, Dinah never bothered him or messed with his baby toys. But she never quite took a liking to him either. Dinah just wanted to be loved on by adults rather than the kiddos. She wasn't good to take on walks~ oh how I tried when we lived in our apartment when I first started teaching. But she was there to greet you when you got home her tail waggin'. She loved to curl up next to you or rub your legs wanting to be pet. I think she thought she was part cat. =) She was really a sweet dog...I miss her tons.love you Dinah! | 53,529,483 |
It is premature to discuss releasing the results of an investigation into Sgt. Bowe Bergdahl's disappearance and capture by the Taliban in 2009, a Pentagon spokesman said Friday.
ADVERTISEMENT
"We recognize the importance of the media and the public understanding of our investigative process, and look forward to future discussions on this issue. However, the Army's priority is ensuring that our process is thorough, factually accurate, impartial, and legally correct," Army spokesman Wayne Hall said in a statement.
The Army is looking into whether Bergdahl deserted his post or was absent without leave, both of which would punishable under military law and force him to forfeit hundreds of thousands of dollars in wages accrued during captivity.
Army Maj. Gen. Kenneth Dahl completed a review of this case this week, but Hall declined to set a timeline for a final decision.
“At this time, it would be inappropriate to speculate on the potential results or the amount of time the review process will take to complete," Hall said.
The question of whether Bergdahl deserted his post became a flashpoint earlier this year after President Obama went around Congress to secure his release by swapping five Taliban detainees from the Guantánamo Bay facility.
Several soldiers who served with Bergdahl have testified to Congress and told media outlets that they believe the 28-year-old sergeant had planned his departure in advance, and risked the lives of those who went to find him.
Bergdahl is currently on active duty and serving at Joint Base San Antonio-Fort Sam Houston.
The trade for Bergdahl sparked anger on Capitol Hill from both Democrats and Republicans.
The Obama administration kept the prisoner swap secret until after it was completed, ignoring a law requiring it to give 30 days advance notice to members of Congress before any detainee release from Guantanamo.
A government watchdog agency found in August that the administration broke the law by not notifying Congress, as well as another law prohibiting it to spend money on any detainee transfer from Guantánamo.
The move also angered lawmakers and critics who said the swap violated a policy not to negotiate with terrorists. The administration said it brokered the deal through Qatari officials, who agreed to take custody of the former Guantánamo detainees for a year.
— This story was corrected on Oct. 14 at 5:13 to reflect that the Army has not set a timeline for completing or releasing the Bowe Bergdahl review. An earlier version contained incorrect information. | 53,529,490 |
Wednesday, February 2, 2011
FILIPINO TATTOOS
Filipino tattoos are a part of the tribal tattooing in many parts of Philippines but is vanishing gradually. These tattoo designs were once upon a time the most well known forms of body art throughout the world. The Philippine islands being one of the earliest tribal regions to start the art of tattoos, the people belonging to this region used to have their entire bodies inked with multiple religious symbols and designs. Both men and women were obligated to have these tattoos made as they indicated spirituality as well as identification marks of belonging to a particular clan.
Old leaders of these tribes carried stories of their past and historical events on their bodies by the art of tattoos and often told them to the children and the youth. Thus the culture of Philippines have always had these tattoos as a part of their traditions. Given below are some such traditional Filipino tattoos for your information, so take a look!
Filipino Tattoo Designs
As these Filipino tattoos are a part of tribal tattoos and the designs are very cultural, these have symbolic significance throughout their history. Along with the people of Philippines, these traditional tattoos were often practiced by the Chinese, Egyptians and also Indians. But they all have their individual traditional symbols that they believe in. The idea behind this Filipino tattoo meaning is the symbolism to beauty, maturity, knowledge, ranks and bravery. These qualities and beliefs were often promoted by the tribal heads of the Filipinos and thus the youth got them tattooed through symbols. Most of the Filipino youth get these tattoos inked even today keeping their roots and teachings in mind. More on tribes in the Philippines.
Tribal Filipino TattoosMany of these tribal tattoos from the Filipino origin have abstract meanings to their designs and are also very complicated to understand. They have a slight resemblance to Celtic tattoos when they are drawn with symbols and signs. Dragon tattoos drawn in the tribal styles with black ink look very attractive when made either on the back or side of the abdomen. The Philippines also considered many water animals as important living beings. Thus many of their tribal tattoos have sea horses, whales, dolphins, shells, star fish and other sea animals as the designs. Another design which is commonly used as Filipino tattoos is the symbols that define certain personality traits and these are also made in the tribal designs.
Common Filipino TattoosSome more designs which can be used as Filipino tattoos for girls as well as guys are, the designs inspired from the Philippine flag. These designs have certain tribal designs which are drawn with the flag so that the flag alone doesn’t look simple. Filipino tattoos are very commonly got on either the sleeve, abdomen or the back as they are known to be enormous designs and take up a lot of space. Phrases written in the native language are also made by many Filipinos which have certain meanings like, “Noli Me Tangere” means touch me not. More on sleeve tattoos.
Since Christianity is very dominant in the Philippine islands, these Filipinos also prefer to get designs like portraits of Mother Mary, Jesus, tribal cross tattoos and other Christian symbols. Crosses are very commonly added in a number of their tattoo designs. Angels are also used as Filipino tattoos, but they are made in either the tribal or the modern manner. There is a wide range of designs of these Filipino tattoos with flower tattoos which are made of the flowers that are commonly found on the island and also their national flower, the Sampaguita. This flower is a beautiful white flower which looks rich and elegant when it blooms. Iguanas are also a common sight on the Philippine islands and they too are a part of the tattoo world for the Filipinos.
These Filipino tattoos are surely a variety for people who are beginners to the art of tattooing. Since you have so many designs to choose from, you can go ahead and get one of these for yourselves as they all look very attractive and stylish. | 53,529,574 |
Q:
Jira upgrade to 7.1 not running on Windows Server
When jira is successfully upgraded to 7.1 it suddenly stopped working. Also, running jira service not solved this issue.
A:
You should manually update dbconfig.xml for now. They are currently working to fix this.
Follow these steps to run jira again:
1- Go C:\Program Files\Atlassian\Application Data\JIRA and open dbconfig.xml
2- Find </jdbc-datasource>
3- Add <validation-query>select 1</validation-query> to before </jdbc-datasource>
4- Stop Jira server from Task manager and Run Jira service again.
Should look like this:
| 53,529,663 |
Why was the celebration of Christmas outlawed in the 1600's in England and in parts of the English colonies in America?
Protestant Reformist viewed it as a pagan ritual and believed it dishonored God, and made a mockery of their religion. William Bradford, governor of Plymouth Colony ordered all Christmas celebrations ended. And appointed "mince sniffers" to patrol the town seeking out people who baked traditional mincemeat pies.Puritans had understandable reasons for their passionate dislike of Christmas. In the 16th and 17 centuries Puritans watched the Twelve Days of Christmas degenerate. It had become the custom of town rabblerousers to elect a King of Misrule at Christmas, who, according to a Puritan observer, led his followers into the "Devil's own recreation to mock Holy things." Masquerading in fancy green and yellow costumes, bells tied to their ankles, they would dance through the quiet church yard and on into the the church itself. Ignoring the Mass being read, they pranced on wooden hobby horses up the center Isle. To the accompanying din of skirling pipes and rattleing drums, the poor protesting priest was pulled from his place while the shameless King of Misrule took his place and desecrated the altar by drinking and dicing before it. Meanwhile, riotous companions drowned out the measured music of the Mass with the coarse shouts of Yule, Yule, Yule, Three puddings and a pule. Crack nouts and cry Yule.
When outraged clergy or shocked parishioners tried to halt the rabble they would be publically ridiculed or ridden out on a rail. Those refusing to give money to the King of Misrule were dunked head first into the nearest duck pond. When in 1633 one distinguished Puritan barrister protested in print against such sacrilegious abuse of Christmas, he was fined three thousand pounds, had his ears clipped, and was sentenced to life imprisonment.
Demanding reform, the Puritans began a relentless campaign against this 'Over celebration.' and was one of their motives in migrating to America. -Mysterious New England. Yankee Magazine 1971 | 53,529,978 |
MANHATTAN, New York (WABC) -- Women, every day, all over the world, wake up and style their hair.
Whether it's taking the time to curl it, straighten it, gel it, or just throwing it up in a bun... it's a statement of our identity.
What if, one day, it were all gone? For so many women, that is the harsh reality of breast cancer.
In honor of Breast Cancer Awareness Month, Glam Lab sits down with two extremely brave women battling breast cancer, and one selfless hair stylist. Mimi Stein, has underdone her breast surgery and is about to start chemo therapy. Wendy Zeichner, has gone through chemo and is now about to start her radiation.
After sitting down with these two women, it became clear they both felt the same way: the hardest part of breast cancer is losing your hair.
They both feel, it's easier to deal with the pain, than look in the mirror and see someone they didn't recognize. | 53,530,005 |
With the development of wireless communication technologies, there has been an increase in consumer use of various multimedia signals, and an interest in fourth generation (4G) or higher generation (e.g. 5G) communication systems is rapidly increasing according to the need for rapid transmission of the various multimedia signals in mobile environments.
4G or 5G communication systems provide a higher transmission rate, a wider bandwidth, and a higher Peak to Average Power Ratio (PAPR) than other communication systems, for example, 3G or 2G, such as GSM communication systems, which may result in high power dissipation when a power amplifier is supplied with a fixed supply voltage.
Efficiency of a power amplifier drops rapidly as its output power is reduced and the power amplifier operates in a more linear region. Amplitude-modulated signals with a high PAPR, such as in a 4G LTE-A system, have a probability distribution weighted when it is far away from maximum output power, resulting in inefficient operation of the power amplifier at the time-averaging power level. | 53,530,377 |