13-Cis-Retinoic Acid

Total Page:16

File Type:pdf, Size:1020Kb

13-Cis-Retinoic Acid WORLD HEALTH ORGANIZATION INTERNATIONAL AGENCY FOR RESEARCH ON CANCER IARC Handbooks of Cancer Prevention Retinoids Volume 4 This publication represents the views and expert opinions of an IARC Working Group on the Evaluation of Cancer-preventive Agents, which met in Lyon, 24-30 March 1999 Published by the International Agency for Research on Cancer, 150 cours Albert Thomas, F-69372 Lyon cedex 08, France © International Agency for Research on Cancer, 1999 Distributed by Oxford University Press, Walton Street, Oxford, 0X2 6DP, UK (Fax: +44 1865 267782) and in the USA by Oxford University Press, 2001 Evans Road, Carey, NC 27513, USA (Fax: +1 919 677 1303). All IARC publications can also be ordered directly from IARCPress (Fax: +33 4 72 73 83 02; E-mail: [email protected]). Publications of the World Health Organization enjoy copyright protection in accordance with the provisions of Protocol 2 of the Universal Copyright Convention. All rights reserved. The designations used and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the World Health Organization concerning the legal status of any country, territory, city, or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or of certain manufacturers' products does not imply that they are endorsed or recommended by the World Health Organization in preference to others of a similar nature that are not mentioned. Errors and omissions excepted, the names of proprietary products are distinguished by initial capital letters. The authors alone are responsible for the views expressed in this publication. The International Agency for Research on Cancer welcomes requests for permission to reproduce or translate its publications, in part or in full. Applications and enquiries should be addressed to the Editorial & Publications Service, International Agency for Research on Cancer, which will be glad to provide the latest information on any changes made to the text, plans for new editions, and reprints and translations already available. IARC Library Cataloguing in Publication Data Retinoids! IARC Working Group on the Evaluation of Cancer Preventive Agents (1999 : Lyon, France) (IARC handbooks of cancer prevention ; 4) 1. Retinoids - congresses. I. IARC Working Group on the Evaluation of Cancer Preventive Agents Il Series ISBN 92 832 3004 3 (NLM Classification: Wi) 155M 1027-5622 Printed in France International Agency For Research On Cancer The International Agency for Research on Cancer (IARC) was established in 1965 by the World Health Assembly, as an independently financed organization within the framework of the World Health Organization. The headquarters of the Agency are in Lyon, France. The Agency conducts a programme of research concentrating particularly on the epi- demiology of cancer and the study of potential carcinogens in the human environment. Its field studies are supplemented by biological and chemical research carried out in the Agency's laboratories in Lyon and, through collaborative research agreements, in national research institutions in many countries. The Agency also conducts a programme for the education and training of personnel for cancer research. The publications of the Agency contribute to the dissemination of authoritative infor- mation on different aspects of cancer research. A complete list is printed at the back of this book. Information about IARC publications, and how to order them, is also available via the Internet at: http/Iwww.iarc.fr/ Note to the Reader Anyone who is aware of published data that may influence any consideration in these Handbooks is encouraged to make the information available to the Unit of Chemoprevention, International Agency for Research on Cancer, 150 Cours Albert Thomas, 69372 Lyon Cedex 08, France Although all efforts are made to prepare the Handbooks as accurately as possible, mis- takes may occur. Readers are requested to communicate any errors to the Unit of Chemoprevention, so that corrections can be reported in future volumes. Acknowledgements The Foundation for Promotion of Cancer Research, Japan, is gratefully acknowledged for its generous support to the meeting of the Working Group and the production of this volume of the IARC Handbooks of Cancer Prevention. Contents List of Participants .................... 1 8.3 Cancer-preventive effects ......... 130 Preamble ............................3 8.4 Other beneficial effects ........... 131 General Remarks ....................... 15 8.5 Carcinogenicity ................. 131 8.6 Other toxic effects ............... 131 Handbook 1 All-trans-Retinoic Acid 95 9. Recommendations for Research .. 132 1. Chemical and Physical 10. Evaluation .................... 133 Characteristics .................95 10.1 Cancer-preventive activity ......... 133 1.1 Nomenclature ...................95 10.2 Overall evaluation ............... 133 1.2 Name .........................95 1.3 Structural and molecular formulae and 11. References ..................... 133 relative molecular mass ............ 95 Handbook 2 13-cis-Retinoic Acid . 145 1.4 Physical and chemical properties ........95 1. Chemical and Physical 2. Occurrence, Production, Use, Characteristics ................ 145 Human Exposure and Analysis .....96 1.1 Nomenclature .................. 145 2.1 Occurrence .....................96 1.2 Name ........................ 145 2.2 Production ..................... 96 1.3 Structural and molecular formulae and 2.3 Use .......................... 96 relative molecular mass ........... 145 2.4 Human exposure ................. 97 1.4 Physical and chemical properties ....... 145 2.5 Analysis ...................... 97 2. Occurrence, Production, Use, Metabolism, Kinetics and Genetic Human Exposure and Analysis . 145 Variation ...................... 97 2.1 Occurrence .................... 145 3.1 Humans ...................... 97 2.2 Production ..................... 146 3.2 Experimental models .............. 98 2.3 Use .......................... 146 4. Cancer-Preventive Effects ....... 100 2.4 Human exposure ................ 146 4.1 Humans ..................... 100 2.5 Analysis ..................... 147 4.2 Experimental models ............. 101 3. Metabolism, Kinetics and Genetic 4.3 Mechanisms of cancer prevention . 117 Variation ....................147 3.1 Humans ..................... 147 5. Other Beneficial Effects ......... 120 3.2 Experimental models ............. 149 6. Carcinogenicity ................ 120 4. Cancer-preventive Effects ........ 152 6.1 Humans ..................... 120 4.1 Humans ..................... 152 6.2 Experimental models ............. 120 4.2 Experimental models ............. 154 7. Other Toxic Effects ..............120 4.3 Mechanisms of cancer prevention . 163 7.1 Adverse effects ................. 120 5. Other Beneficial Effects ......... 163 7.2 Reproductive and developmental effects 124 7.3 Genetic and related effects ........ 127 6. Carcinogenicity ............... 164 6.1 Humans ..................... 164 8. Summary of Data ............... 128 6.2 Experimental models ............. 164 8.1 Chemistry, occurrence and human exposure ..................... 128 7. Other Toxic Effects ............. 164 8.2 Metabolism and kinetics .......... 128 7.1 Adverse effects ................. 164 7 ARC Handbooks of Cancer Prevention 7.2 Reproductive and developmental 6.1 Humans ..................... 197 effects ........................168 6.2 Experimental models .............197 7.3 Genetic and related effects ........ 173 7. Other Toxic Effects ............. 198 8. Summary of Data .............. 173 7.1 Toxic and other adverse effects ..... 198 8.1 Chemistry, occurrence and human 7.2 Reproductive and developmental exposure .................... 173 effects ......................... 200 8.2 Metabolism and kinetics .......... 173 7.3 Genetic and related effects ........ 201 8.3 Cancer-preventive effects ......... 174 8. Summary of Data .............. 201 8.4 Other beneficial effects ........... 175 8.1 Chemistry, occurrence and human 8.5 Carcinogenicity ................. 175 exposure .................... 201 8.6 Other toxic effects ............... 175 8.2 Metabolism and kinetics .......... 201 9. Recommendations for Research .. 176 8.3 Cancer-preventive effects ......... 202 8.4 Other beneficial effects ........... 202 10. Evaluation ....................176 8.5 Carcinogenicity ................. 202 10.1 Cancer-preventive activity .........176 8.6 Other toxic effects ............... 202 10.2 Overall evaluation ...............176 9. Recommendations for Research . 203 11. References ......................176 10. Evaluation .................... 203 Handbook 3 9-cis-Retinoic Acid .. 187 10.1 Cancer-preventive activity ......... 203 10.2 Overall evaluation 1. Chemical and Physical ............... 203 Characteristics ................187 11. References .................... 203 1.1 Nomenclature ..................187 1.2 Name ........................187 Handbook 4 4-Hydroxyphenyl- 1.3 Structural and molecular formulae and retinamide .......... 209 relative molecular mass ...........187 1. Chemical and Physical 1.4 Physical and chemical properties .......187 Characteristics ............... 209 1.1 Nomenclature .................. 209 2. Occurrence, Production, Use, 1.2 Name ........................ 209 Human Exposure and Analysis . 188 1.3 Structural and molecular formulae and 2.1 Occurrence .................... 188 relative molecular mass ..........
Recommended publications
  • Tobacco Labelling -.:: GEOCITIES.Ws
    Council Directive 89/622/EC concerning the labelling of tobacco products, as amended TAR AND NICOTINE CONTENTS OF THE CIGARETTES SOLD ON THE EUROPEAN MARKET AUSTRIA Brand Tar Yield Nicotine Yield Mg. Mg. List 1 A3 14.0 0.8 A3 Filter 11.0 0.6 Belvedere 11.0 0.8 Camel Filters 14.0 1.1 Camel Filters 100 13.0 1.1 Camel Lights 8.0 0.7 Casablanca 6.0 0.6 Casablanca Ultra 2.0 0.2 Corso 4.0 0.4 Da Capo 9.0 0.4 Dames 9.0 0.6 Dames Filter Box 9.0 0.6 Ernte 23 13.0 0.8 Falk 5.0 0.4 Flirt 14.0 0.9 Flirt Filter 11.0 0.6 Golden Smart 12.0 0.8 HB 13.0 0.9 HB 100 14.0 1.0 Hobby 11.0 0.8 Hobby Box 11.0 0.8 Hobby Extra 11.0 0.8 Johnny Filter 11.0 0.9 Jonny 14.0 1.0 Kent 10.0 0.8 Kim 8.0 0.6 Kim Superlights 4.0 0.4 Lord Extra 8.0 0.6 Lucky Strike 13.0 1.0 Lucky Strike Lights 9.0 0.7 Marlboro 13.0 0.9 Marlboro 100 14.0 1.0 Marlboro Lights 7.0 0.6 Malboro Medium 9.0 0.7 Maverick 11.0 0.8 Memphis Classic 11.0 0.8 Memphis Blue 12.0 0.8 Memphis International 13.0 1.0 Memphis International 100 14.0 1.0 Memphis Lights 7.0 0.6 Memphis Lights 100 9.0 0.7 Memphis Medium 9.0 0.6 Memphis Menthol 7.0 0.5 Men 11.0 0.9 Men Light 5.0 0.5 Milde Sorte 8.0 0.5 Milde Sorte 1 1.0 0.1 Milde Sorte 100 9.0 0.5 Milde Sorte Super 6.0 0.3 Milde Sorte Ultra 4.0 0.4 Parisienne Mild 8.0 0.7 Parisienne Super 11.0 0.9 Peter Stuyvesant 12.0 0.8 Philip Morris Super Lights 4.0 0.4 Ronson 13.0 1.1 Smart Export 10.0 0.8 Treff 14.0 0.9 Trend 5.0 0.2 Trussardi Light 100 6.0 0.5 United E 12.0 0.9 Winston 13.0 0.9 York 9.0 0.7 List 2 Auslese de luxe 1.0 0.1 Benson & Hedges 12.0 1.0 Camel 15.0 1.0
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers DJ Bernstein Thanks To
    Comparison of Cipher implementations 256-bit stream ciphers from cipher authors D. J. Bernstein Timing tools Thanks to: (De Canni`ere) University of Illinois at Chicago Denmark Technical University Timings Alfred P. Sloan Foundation on various machines Graphing tools (Bernstein) Speed graphs in this talk Comparison of Cipher implementations Security disasters 256-bit stream ciphers from cipher authors Attack claimed on YAMB: “258.” D. J. Bernstein 72 Timing tools Attack claimed on Py: “2 .” Thanks to: (De Canni`ere) Presumably also Py6. University of Illinois at Chicago Attack claimed on SOSEMANUK: Denmark Technical University Timings “2226.” Alfred P. Sloan Foundation on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters from cipher authors Attack claimed on YAMB: “258.” 72 Timing tools Attack claimed on Py: “2 .” (De Canni`ere) Presumably also Py6. Attack claimed on SOSEMANUK: Timings “2226.” on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters Speed disasters from cipher authors Attack claimed on YAMB: “258.” FUBUKI is slower than AES 72 in all of these benchmarks. Timing tools Attack claimed on Py: “2 .” Any hope of faster FUBUKI? (De Canni`ere) Presumably also Py6. If not: Reject FUBUKI. Attack claimed on SOSEMANUK: VEST is extremely slow Timings “2226.” on various machines in all of these benchmarks. Is there any dispute On the other hand, Graphing tools about these attacks? VEST is claimed to be (Bernstein) If not: Reject YAMB etc.
    [Show full text]
  • A Special Report from Oil and Gas Investor and Global Business Reports
    Mexico A Special Report From Oil and Gas Investor and Global Business Reports Photo courtesy of Nabors. MEXICO OIL AND GAS Mexico’s Energy Reform: an opportunity in three generations Mexico’s oil production has decreased from 3.4 MMbbl/d in 2004 to 2.4 MMbbl/d today. Photo courtesy of Pemex. onday August 11,, 2014, represented historic mo- ation was not sustainable; a steep decrease in oil prices over ment for Mexico: President Enrique Peña Nieto, the second half of 2014 has only helped the cause of those M who brought the Institutional Revolutionary Par- advocating for the reform. “What closes the circle of the re- ty (PRI) back into power in 2012, signed the Energy Reform form is that, although the Mexican state will no longer keep bill after the legislative powers approved the secondary laws 100% of the oil income, total revenues from the hydrocar- that will develop the new framework. bons sector will increase because production volumes will be By the end of October, the details of the 25 sets of rules higher,” explained Fluvio César Ruiz Alarcón, independent transforming the country’s model for the oil and gas and board member of Pemex. electricity sectors had already been published by the Mexi- The expectation is to reach 3 MMbbl/d by 2018, al- can administration. The process is developing at quite a fast though Ruiz Alarcón believes that timing to be overambi- pace considering that this is landmark reform that involves tious: “To add production to a 76-year-old structure will constitutional change and ends the 76-year monopoly in ex- take longer,” he said.
    [Show full text]
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Henricksen, Matthew& Dawson, Edward (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP52-63. This file was downloaded from: https://eprints.qut.edu.au/24788/ c Consult author(s) regarding copyright matters This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/11780656_5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Matt Henricksen and Ed Dawson Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia.
    [Show full text]
  • New Results of Related-Key Attacks on All Py-Family of Stream Ciphers
    Journal of Universal Computer Science, vol. 18, no. 12 (2012), 1741-1756 submitted: 15/9/11, accepted: 15/2/12, appeared: 28/6/12 © J.UCS New Results of Related-key Attacks on All Py-Family of Stream Ciphers Lin Ding (Information Science and Technology Institute, Zhengzhou, China [email protected]) Jie Guan (Information Science and Technology Institute, Zhengzhou, China [email protected]) Wen-long Sun (Information Science and Technology Institute, Zhengzhou, China [email protected]) Abstract: The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family of stream ciphers. At Indocrypt 2007, Sekar, Paul and Preneel showed related-key weaknesses in the Py-family of stream ciphers including the strongest member TPypy. Furthermore, they modified the stream ciphers TPypy and TPy to generate two fast ciphers, namely RCR-32 and RCR-64, in an attempt to rule out all the attacks against the Py-family of stream ciphers. So far there exists no attack on RCR-32 and RCR-64. In this paper, we show that the related-key weaknesses can be still used to construct related-key distinguishing attacks on all Py-family of stream ciphers including the modified versions RCR- 32 and RCR-64. Under related keys, we show distinguishing attacks on RCR-32 and RCR-64 with data complexity 2139.3 and advantage greater than 0.5. We also show that the data complexity of the distinguishing attacks on Py-family of stream ciphers proposed by Sekar et al. can be reduced from 2193.7 to 2149.3 .
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • Iniezioneiniezione the Newsletter of the Northwest Alfa Romeo Club
    IniezioneIniezione The newsletter of the Northwest Alfa Romeo Club “Barn Find” at Alfa of Tacoma It was about a week before the Half-fast Lap last September when my friend, Steve Anderson (now a new club member) called, so excited about a “barn find” he had heard about that he couldn’t even wait for me to finish my shower. An uncle, Steve Bates, had been to his house for dinner the night before, and had told of a 1957 Alfa spider that his brother-in-law had taken to Alfa of Tacoma for repairs in 1977 and never picked up. Steve B’s brother-in-law, Phil George, had lived in Richland and acquired the car in about 1967. Steve remembers that Phil drove the car actively, and on one particular “hold on tight” ride, Phil told him that he and the Alfa “became one” when he drove. Steve had his doubts. When the engine began to show problems, Phil brought it to Alfa of Tacoma. Carlo ended up rebuilding the top and bottom ends, the front suspension, the brakes, and replaced the steering box. Carlo knew the car and said Phil had always taken good care of it, but when it came time to pick it up, he couldn’t pay for it. He stopped by often to see it, though. Phil remarried, but his new wife thought he really didn’t need that car, so there it sat, in the second bay from the window, on jack stands and under a cover. Phil died about five years ago and Lino had no idea how to contact any of the family.
    [Show full text]
  • Kohls Santa Claus Event
    Kohls Santa Claus Event heLet-out distrusts Franklyn so openly. counterplotted Dreamier acutely Wilhelm while sometimes Daren always debag externalizesany Lalage gazed his lactase levelling. invokes Beamless yestreen, Axel chock.plane or canings some steerers tenth, however madrigalian Marcio propound higgledy-piggledy or When he would join hands with many retailers to help them their children heard from that are tax deductible through our customers. Want to the website uses cookies and makes for setting up against santa claus at nj. Each created a santa claus can reach the events are posted online donation system is holding its fashion designer and assistance to. The exact date will last week, fun and pick out masks at stores. Get instant email, bought presents in a physical stores this is wearing santa? Claus make it comes santa claus was this event is revealed to make reindeer. Get ready to a variety of animal at all the basic instruction, raritan and join fan following retailers are speed, see what better than one! The santa claus to the techniques that exploit the holiday bag, an incorrect email address will run one! This deception is a merry christmases because he became the comments are provided to bring your phone calls the storm was made history as a coconut milk is? He is santa claus some respect from and events, in the event now believe in an emerging amrican actress attributes the. We welcome your kiddos visited with santa claus as tennessee. Contact hunterdon county news keeps him by a variety of public health authority for? Apple said in santa claus, the event for friday special mailbox and local news, shauna and highly.
    [Show full text]
  • Past and Present Alfa 2-6-03
    PAST AND PRESENT 2/6/2003 NAME/TOWN SUBJECT DATE PAGE # A. A. Grinnell Co. Incorporated 1899 58 A. A. Grinnell Co. Bought lumber rights 1909 201 A. A. Grinnell Co. Bought land 1910 212 A. G. Henning Foreign currency display 5-16-1931 115 A. J. Tanner Canning Company Fly wheel accident 1906 127 Acheson, Edward G. Associate of Frank J. Tone 10-3-1931 157 Acker, George Eats peaches he sent brother 27yrs ago 9-28-1901 8 Ackley, Zebulon Early purchaser of land fm Holland Land Co 1-5-1929 34 Acquard, Mrs. Anna Barn burned 1941 253 Adair, Mrs. A. R. Hen lays odd egg 11-24-1934 184 Adams, Augustus Running for office 1899 55 Adams, M. B. In old copy of The Daily Morning News 11-10-1934 192 Adams, Parmenio Short biography 3-31-1928 30 Adams, Parmenus Surveyed Telephone Rd. in Alexander 8-15-1931 142 Adams, Ralph Member of hunting party 11-22-1930 99 Adams, Rev. John R. Left Batavia 1911 143 Adams, Rev. John R. Campaign for no-license 1909 210 Aderman, W. Price Fined for tie remark 1-11-1947 260 Ahl, Mrs. George Found large mushrooms 10-17-1931 161 Akron Birds destroy power transformer 7-25-1931 137 Akron Built water plant 1926 174 Akron Man killed by train 1898 207 Akron Reservation resident got stuffed alligator 1-17-1925 227 Akron New Indian schools superintendent 1905 239 Akron Hen laid large egg 3-23-1946 243 Akron Typhoid epidemic 1926 253 Akron Typhoid epidemic 1921 256 Akron Typhoid epidemic 1926 257 Akron Employees picket 1937 266 Akron Strike near ended 1937 269 Alabama Carp beached in flood 1901 114 Alabama Only town without rural mail delivery 1901 120 Alabama Niagara Gypsum Co.
    [Show full text]
  • Alfatravel.Co.Uk | 01257 248000 Welcome to the ALFA TRAVEL BROCHURE
    DEPARTING UK, FROM IRELAND NORTH & EUROPE WEST &Coach SELF DRIVE Holidays BREAKS CELEBRATING CELEBRATING 30YEARS 30YEARS November 2019 - December 2020 The UK’s only Employee Owned Travel Company alfatravel.co.uk | 01257 248000 Welcome to the ALFA TRAVEL BROCHURE Hello… and a warm Alfa welcome to our Whether you choose to sit back and take in NEW Summer 2020 brochure, featuring the stunning vistas from the comfort of your a handpicked collection of holidays to personal, luxury seat on our coach breaks, CELEBRATING the UK’s finest seaside destinations in cruise down the Rhine aboard your very own partnership with our very own Leisureplex floating hotel without the need to pack and hotels, with amazing ‘value added’ unpack every day or you simply prefer to excursions and seasonal offers – experience the freedom to go as you please all designed to tempt you away! on our self drive breaks in your own car, 30YEARS you’re always assured of the same great Alfa Your very own team of Alfa memory makers hospitality. have been busy designing a fantastic new With lots of single rooms available, no hidden range of holiday experiences within the UK charges for seats or pick ups and a fantastic and Europe especially with our customers in range of 21 destinations to choose from mind. Working with our carefully selected Alfa MICK with Leisureplex hotels, plus a whole host of LAMBERT preferred partners, our unique range of tours tempting partner breaks across the UK and Alfa Driver take in some of the UK and Europe’s ‘must see’ of the Year Europe, what more reason do you need to destinations from the world-famous to those get away? magical ‘hidden gems’.
    [Show full text]
  • Exclusion List
    Exclusion list ROBECO INSTITUTIONAL ASSET MANAGEMENT 1 Sustainability Inside Excluded companies: 61 Rimbunan Sawit Bhd 15 Bots Inc 62 Riverview Rubber Estates BHD 16 Bright Packaging Industry Bhd Controversial behavior 63 Salim Ivomas Pratama Tbk PT 17 Brilliant Circle Holdings International Ltd 1 G4S International Finance PLC 64 Sarawak Oil Palms Bhd 18 British American Tobacco Bangladesh Co Ltd 2 G4S PLC 65 Sarawak Plantation Bhd 19 British American Tobacco Chile Operaciones SA 3 Korea Electric Power Corp 66 Scope Industries Bhd 20 British American Tobacco Holdings The Netherlands BV 4 Oil & Natural Gas Corp Ltd1 67 Sin Heng Chan Malaya Bhd 21 British American Tobacco Kenya PLC 5 ONGC Nile Ganga BV 68 Sinar Mas Agro Resources & Technology Tbk PT 22 British American Tobacco Malaysia Bhd 6 ONGC Videsh Ltd 69 Socfin 23 British American Tobacco PLC 7 Vale Indonesia Tbk PT 70 Socfinasia SA 24 British American Tobacco Uganda Ltd 8 Vale SA2 71 Societe Camerounaise de Palmeraies 25 British American Tobacco Zambia PLC 72 Societe des Caoutchoucs de Grand-Bereby 26 British American Tobacco Zimbabwe Holdings Ltd Palm oil 73 SSMS Plantation Holdings Pte Ltd 27 Bulgartabac Holding AD 1 A Brown Co Inc 74 Sterling Plantations Ltd 28 Carreras Ltd/Jamaica 2 Agalawatte Plantations PLC 75 Subur Tiasa Holdings Bhd 29 Casey’s General Stores Inc 3 Anglo-Eastern Plantations PLC 76 Sungei Bagan Rubber Co Malaya Bhd 30 Cat Loi JSC 4 Astra Agro Lestari Tbk PT 77 Sunshine Holdings PLC 31 Ceylon Tobacco Co PLC 5 Astral Asia Bhd 78 Ta Ann Holdings Bhd 32 Champion
    [Show full text]