text
stringlengths 18
981k
| meta
dict |
---|---|
module Dallal
class FileLoader
def self.load_notifiers
if directory_exists?
Dir[Rails.root.join("app/notifiers/**/*.rb")].each do |file|
require_dependency file
end
end
end
def self.directory_exists?
File.directory?(Rails.root.join("app/notifiers"))
end
end
end
| {
"redpajama_set_name": "RedPajamaGithub"
} |
The host interface provides connection between the array controller and SCSI host system. ULTRA Wide synchronous transfer provides 40 MB/sec sustained data transfer rate. High Voltage Differential (HVD) SCSI interface.
The array interface provides connection between the array controller and SCSI optical drives. Five independent parallel SE Wide SCSI channels provide 20 MB/sec sustained data transfer rate for each array channel. Compatible with all SCSI optical drives including DVD-RAM and Magneto-Optical (MO). | {
"redpajama_set_name": "RedPajamaC4"
} |
Congratulations to our 1st Annual TEXTYs Award Winners! Click the button to watch the winning video and read the winning story!
View the Winners Close
UTC: Maintaining Enrollment Through COVID-19
Public university
Customer Since:
The University of Tennessee at Chattanooga (UTC) is a public university that serves more than 11,000 students. UTC offers more than 120 majors and academic programs to students. This includes a variety of undergraduate and graduate programs across several colleges within the university.
When UTC moved online as a result of COVID in Spring 2020, they realized that their communications weren't reaching their current students, who were studying remotely and online. Also, UTC realized that they weren't reaching their prospective students. These prospects would report getting stuck during the application process. To complicate things, because of the pandemic, prospects couldn't just walk in and get the help they needed to apply. To try and assist "stuck" prospects, staff began sending emails that listed the steps required to become a student. These lists made sense to staff members, but unfortunately, prospects often felt confused with so much information given at once.
As a result, UTC adopted texting into their communications strategy to communicate with prospective students. Further, they use texting to clear any roadblocks prospects have during the application process. Also, they use texting to communicate with current students to boost student engagement during COVID.
UTC staff soon realized that prospective students, while they were not responding to email outreach or phone calls, were happy to respond to text messages. In this way, UTC has been able to see multiple effective uses for texting to boost student engagement during COVID.
Since UTC was also remote and online during the summer months, they implemented Signal Vine quickly and in a short amount of time.
During this time, UTC's students were in various classroom arrangements. Primarily, students were – and still are – taking classes in various online formats, with the university offering about 30% of courses in-person.
According to UTC, the benefits of Signal Vine to their student outreach are multifold.
First, texting helped UTC expand its student outreach. For instance, texting allowed them to clear up confusing steps in the admissions process instantly. Moreover, students who might have felt embarrassed to ask specific questions in person were more comfortable asking these questions in a real-time text conversation with someone.
With all of this said, UTC has been able to maintain retention and enrollment numbers through the pandemic. It is also important to note that the state of Tennessee offers free community college, and they were also able to combat that challenge. Students stayed and enrolled at UTC – a direct result of the use of texting to boost student engagement during COVID.
Also, UTC saw successful engagement numbers with their summer orientation and enrollment activities through a combination of both texting and email outreach. They intend to replicate this model of engagement next year as well.
In regard to using texting to initiate pandemic-oriented initiatives, UTC is currently exploring how Signal Vine can be used to help with contact tracing. They're also investigating the use of texting to get flu vaccine information out to their student population to keep their campus community as safe as possible.
There are three specific and unique best practices that UTC staff have noted.
1. Do a pulse check.
UTC has found great success with sending a "pulse check" to their students. UTC staff send out a communication that asks students how "charged" they feel. For instance, a student might select a medium-charged battery to show they are only okay. A more confident student might select a fully charged battery. From there, UTC staff members are able to follow up with the students whose "batteries" needed charging. The next time they do this campaign, they plan to use texting to be able to record responses and have interaction with UTC staff members that will provide them with needed support and resources.
2. "Sign off" on texts.
UTC found that texts that included a staff member's name at the end were far more personable and effective. This shows students that they are texting with real people.
3. Assign only certain staff members to texting projects.
Finally, UTC mentions that they've seen good results when they've designated specific staff members to write texts. For UTC, this meant that they chose staff members who both enjoyed and understood the purpose of text outreach and also had a bit of wit. Students, in turn, engaged more with the texts because of the engaging and heartfelt tone of the messages.
Patrick Noland, Specialist, Strategic Enrollment Technology
The University of Tennessee at Chattanooga
Being able to reach our students via text during COVID has been an absolute game-changer for us. There are so many important pieces of information that we have to relay week in and week out, and just like so many of us, students are inundated with marketing emails and spam calls that end up absolutely burying our attempts to reach them through those mediums. With Signal Vine, we can make sure we get that one-on-one contact and deliver that critical info right where we know the student will see it.
Similar Customers
Southwestern Michigan College: Increases Admissions Yield
Southwestern Michigan College was able to increase their reach and engagement with prospective students by incorporating a texting program. See how the admissions team saw a yield improvement of 6%.
Southwest Tennessee Community College: Texting to Increase Retention and Enrollment
Southwest Tennessee Community College needed a tool to help increase retention and enrollment. Learn how the college implemented Signal Vine's texting platform and increased enrollment numbers and the retention rate of Tennessee Promise and Reconnect students to 80 percent.
Norwalk Community College: Improving Applicant Enrollment
Norwalk Community College uses Signal Vine to improve applicant enrollment for students that apply but do not end up enrolling. Results showed a student engagement rate of 77% and found that applicants who were texted were 31% more likely to complete the registration process.
Communicating effectively with your campus communities is of paramount importance right now
If you'd like to learn how Signal Vine can help, please join us for a demo.
811 North Royal Street
Copyright © 2021 Signal Vine. All Rights Reserved.
Platform College access Admissions Contact Careers Press & News Terms of Service Privacy Policy | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
To allow you to prepare your own gift, we will enclose signature L'Occitane gift bags in your order. The number and size of the gift bags will be determined by your chosen items. NOT AVAILABLE FOR GIFTS ALREADY PRE-BOXED. | {
"redpajama_set_name": "RedPajamaC4"
} |
All serious Christians are concerned about the strength of their faith in God and the level of their commitment to His purposes. The shelves of Christian bookstores sag with the weight of books purporting to guide and encourage the believer in developing a stronger faith.
And no wonder. The Scriptures and the history of our faith are laced with the accounts of men and women of God who serve as examples of deep spirituality and unshakeable commitment. Consider, among others, the perseverance of Abraham, the unrelenting vision of Moses, the tenderness toward the Lord of David, the determination of Nehemiah. Consider the single-mindedness of the Apostle Paul whose "this one thing I do" resulted in the establishment of the gospel of Christ across the Mediterranean world. The Biblical "heroes of the faith" are joined by others: Augustine, who could find no rest till he found it in God; Luther, whose "Here I stand" thunders through history as the battle-cry of ecclesiastical reform; Wesley, who logged hundreds of thousands of miles on horseback to evangelize England.
In the last century we can point to such figures as Pastor Martin Niemoller and the ten Boom family, who endured Nazi concentration camps and suffered death because of their determination to maintain a Christian witness; to Joni Eareckson Tada, who overcame depression to build a ministry of encouragement to thousands despite her paraplegia; or to theologian-philosopher Francis Schaeffer who, emaciated from cancer, stood in the cold to picket a hospital that performed abortions just three weeks before his death.
And then we come to you and me. Where is our faith compared to that of the spiritual giants of yesteryear, or even of today? Admittedly, comparisons may be inappropriate; the Lord has called each of us to serve in his own way. Still, when we consider the great examples of what can be done through faith, many of us stagger along on a guilt trip because we haven't been so spiritually motivated, or haven't accomplished more for the kingdom of God.
The trouble is, if we aren't spiritual it's usually because, at heart, we aren't motivated to be spiritual. A battle rages within ourselves; our inner being becomes what Joyce Meyer calls "the battlefield of the mind." In traditional terms, our flesh is at war with our spirit; we want to become infused with "the mind of Christ," but we want to do it on our own terms or by our own devices, in that self-assertion the Bible calls "the flesh." So when we try to be more spiritual than we really want to be, the effort to change can just make us more resentful and discouraged with our lack of success.
Paradoxically, we are healed by being taught to put no confidence whatsoever in our own flesh, simply to rest in Him...A self-image is something we build, in which we falsely learn to trust. A self-image necessarily sets us into self-centered striving—to live up to it, to make sure others see and reward it. . . . Christian healing comes then not by making a broken thing good enough to work, but by delivering us from the power of that broken thing so that it can no longer rule us, and by teaching us to trust His righteousness to shine in and through that very thing. . . . We do no good thing. He accomplishes all. For the soul, there is in that sense no healing— only death and rebirth. . . . The Lord wants us to accept ourselves as we are, rotten and unchanged, and then let Him express His goodness and righteousness in us through His Holy Spirit.
Not being a spiritually inclined person, I find myself too often feeling like a "phony" when trying to pray, to worship the Lord or to instruct in Christian truths. I am overwhelmed by my inner awareness of what the Sanfords call "the unbelieving heart of the believer." For me, trying harder doesn't do it; I only despise myself for passing myself off as a real believer. Yet, in facing this truth about myself, a strange thing has happened. The less of the phony me there is in my worship and Christian living, the more of the Lord there seems to be. | {
"redpajama_set_name": "RedPajamaC4"
} |
Oriole Park
BALBaltimore Orioles Tickets
More at Oriole Park
Orioles Seating
Are the seats in Section 256 at Oriole Park in the shade?
Answered by Brian at RateYourSeats.com...
The best place to find the shade at Oriole Park is down the third base line because the sun will be at your back during much of the afternoon. This means that Section 256 will likely be in the shade for a lot of the game. Section 256 is also part of the Club Level at Oriole Park so you will also receive access to a climate controlled area in case you get too hot during the game and want to find an area to cool off.
Asked August 25, 2014 for Baltimore Orioles vs. Minnesota Twins on Aug 31, 2014
Visitor-Fan Friendly
Boston Red Sox at Baltimore Orioles
Oriole Park - Baltimore, MD
Toronto Blue Jays at Baltimore Orioles
New York Yankees at Baltimore Orioles
Monday, August 5 at 7:05 PM
Tuesday, August 6 at 7:05 PM
Wednesday, August 7 at 7:05 PM
Houston Astros at Baltimore Orioles
Kansas City Royals at Baltimore Orioles
Tampa Bay Rays at Baltimore Orioles
Thursday, August 22 at 7:05 PM
Texas Rangers at Baltimore Orioles
Thursday, September 5 at 7:05 PM
Friday, September 6 at 7:05 PM
Los Angeles Dodgers at Baltimore Orioles
Seattle Mariners at Baltimore Orioles
All Orioles Games
Red Sox at Orioles
Blue Jays at Orioles
Thu. Aug 1 at 7:05 PM
Sat. Aug 3 at 7:05 PM
Yankees at Orioles
Mon. Aug 5 at 7:05 PM
Tue. Aug 6 at 7:05 PM
Wed. Aug 7 at 7:05 PM
Astros at Orioles
Royals at Orioles
Rays at Orioles
Thu. Aug 22 at 7:05 PM
Rangers at Orioles
Thu. Sep 5 at 7:05 PM
Fri. Sep 6 at 7:05 PM
Sat. Sep 7 at 7:05 PM
Dodgers at Orioles
Mariners at Orioles | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Тугургой (; ) — аул Теучезького району Адигеї Росії. Входить до складу Тлюстенхабльського міського поселення.
Населення — 380 осіб (2015 рік).
Примітки
Населені пункти Теучезького району
Аули Адигеї | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
I don't mean to brag, but man, I have had some incredible record-scoring luck lately. MUSIC NOT NOIZE will surely be the best way for me to obsess over and share my findings of the last weeks, especially in the case of today's post. I walked into Amoeba Records in SF today for the first time in ages and pulled this monster out of the new arrivals bin - straight from the top bracket of my (mental) wantlist, the elusive first LP by Estonian punk pioneers J.M.K.E.! Not the type of thing you expect to pull out of a bin on the other side of the globe from its origin! The music is lively and upbeat, surging with melodies of the East and brimming with stories from a radical mind in a cold and guarded place. This album came out right on the cusp of Estonia's independence from the Soviet rule, but that spirit isn't the only reason to appreciate this LP - the sounds just croon, move, build, and explode all the way through. It's really the sound of an isolated group of punks expressing and releasing all of their thoughts and emotions in a maelstrom of punk brilliance! | {
"redpajama_set_name": "RedPajamaC4"
} |
Background: Cancer stem cells (CSCs) are a group of tumor cells with self-renewal property and differentiation potential. CSCs play a crucial role in malignant progression of several types of tumors. However, what is still controversial is the clinicopathological relationship between Nanog marker and its prognostic value in the patients with breast cancer. The expression of Nanog in the patients with breast cancer and its correlation with clinicopathological prognostic factors was explored in the present study. Methods: A sample of 120 breast cancer tissues was obtained from the patients who referred to Imam Khomeini Hospital in Sari city, Iran during January 2012 and December 2016. The associations between Nanog expression and clinicopathological factors were analyzed based on immunohistochemical analysis. Results: It was found that 67 (55.8%) patients had Nanog expression, and high expression rate was observed in 24 (36%) cases (staining index ≥3). Moreover, there was a statistically significant relationship between Nanog expression and clinicopathological factors, including tumor grade (p = 0.001), lymph node metastasis (p = 0.01), and the stage of the disease (p = 0.003). Conclusion: Findings of the study indicate that Nanog is a biomarker for prognostic prediction in patients with breast cancer. However, further studies of Nanog are suggested to provide novel therapeutic targets for curing breast cancer. | {
"redpajama_set_name": "RedPajamaC4"
} |
This is part of an ongoing effort to publicize and describe changes in Oregon's agricultural sector. All data come from the United States Census of Agriculture, data is available for the nation, states and counties online. Pair this data with other Oregon data on the Rural Community Explorer. | {
"redpajama_set_name": "RedPajamaC4"
} |
Are you searching for the best drones for real estate photography, Well, you have come to the right article.
Real estate drone photography is undoubtedly turning into the next trend in the industry. Here is everything you have to learn about real estate drone business, along with the top 5 drones to make high-quality marketing photos and videos.
As you likely already noticed, Quadcopters are becoming a lot more popular in real estate video and photography. The reason why is straightforward.
Drones for real estate marketing are valuable since they allow you get airborne photo shots and video of property with techniques you could completely not able to complement without a camera drone.
One marketing evolution that is changing the real estate market's face is drone footage. Successful agents of real estate understand they need to consistently stick to their plans for the most recent real estate advertising trends. So that feels just right, it is probably the perfect solution to cheaply get those incredible aerial photography which show off your property beautifully.
It has all you need – autonomous flight mode, great flight and image stabilization, excellent camera, and other functions that will prove useful when you require them the foremost. The DJI Phantom 4 Drone is a good buy if you take into account the accessories you will get.
As we are in it, do you know the majority of the realtors are choosing this particular model? Yes, it is true. However, for the reason of making this guide clean and beautiful, we will not go through each one of these – the product itself is outstanding.
This 5 kilometers flight range and 28 minutes of flight duration beast are becoming popular with every passing day.
So what is left there to mention about this flying machine, except that it is the finest drone for a realtor?
For the expensive price tag, you are buying a high-quality drone and lots of accessories that is about to boost your business portfolio, mainly when you are in the real estate sector. In conclusion, it is one of the top aerial photos platforms regarding performance and price.
It has about control range of 2 kilometers and flight time of 18 minutes, which is a lot more than you want for a few excellent housing shots. The DJI Inspire 1 is probably the most high-priced (and the best) model on this top 5 list. As you could see, it is a good all-around unit by any means.
Another beautiful thing is its arms go upwards when it is airborne, eliminating jitter on the video with a competent and great mechanic. It features a solid 4K camera attached to a three-axis stabilization for ideal picture smoothness and quality.
DJI integrated an interesting ability that enables you to use two controllers linked to a single drone. It lets you get two users handling it; one hovers it around seeking for that optimal position while the next one records videos and takes images.
The Yuneec's flagship hexacopter comes at the third position in this countdown.
It is all about the transmitter itself. For the sake of specification, with standard batteries, it can fly 25 minutes on mid-air, and travel as much as 1.5 kilometers aside from its unique ST16 controller.
However, honestly, it justifies the hefty selling price by offering you with amazing capabilities for both business and home scenarios.
It arrives with a dedicated ST16 transmitter along with a huge built-in screen (7-inches diagonally) powered by Android. It means you do not require the smartphone for getting FPV feed, turning on/off, or controlling.
It has an internal collision avoidance feature in a venture with Intel company as well as their RealSense tech, making the device fly seamlessly over the sky with smooth silk ease.
Do not worry; it sports a best in the business 4K camera installed on a 360-degree anti-vibration gimbal that is, together, can provide you with expert quality videos and images. You are a real estate professional, so one thing you are most curious in is its camera.
Most will say it is the finest drone for real estate photography. In case, you are regularly on the run, and you cannot carry a large drone for sale together with you, in that case, the DJI Mavic Pro is the best possible option.
Combine it with a flight time of over 27 minutes, and you shall start to know why it made its presence onto this top 5 list.
This small brother is foldable making it extra portable and accounts for the incredible level of mobility.
And with obstacle avoidance sensors and flight range of whopping 7 kilometers, you will never need to bother about it falling out of sight. It is super simple to prepare for takeoff and unfold.
Also, it is essential to point out it has GLONASS systems and GPS inbuilt, making it zip through mid-air effortlessly while offering you with smooth video. What is best of all, it sports a 3-axis mechanical gimbal together with a 4K video camera. It will help you have that picture perfect take each time.
If your company is still expanding and you are unable to manage a high-end model still, the UPair One Plus Drone is the go-to choice.
The cheapest option in this guide comes from GTEN Innovation brand. That, of course, did an excellent job with this drone. All features considered, it is the most economical option capable of taking high-quality real estate videos.
You will get an excellent drone built with a 4K camera which can shoot amazing videos and images. Regarding battery, this model sports an original 5400mAh battery that can endure as much as flight time of 18 minutes.
With regards to its capabilities, it includes all the essential ones like auto return if the battery is low, failsafe auto return, one key return, and an excellent GPS system used mainly for picture stabilization.
The First-person view range will go on for around 500 meters as the communication distance exceeds that amount by 300 meters. Another good thing concerning this quad is it features an inbuilt 7-inch LED screen on the dedicated transmitter (which appears incredible), giving this Drone FPV capability you always needed the most.
What Is Real Estate Drone Photography?
For a real estate agent, drones are great partners. The best drones for real estate photography lets you add sweeping, dramatic video of the interior and exterior of a home in your property listings. Although, you should know the legal guidelines of handling a quadcopter for a commercial application. However, the range of drones out there for sale is overwhelming that makes it difficult to decide what drone you ought to pick. And that is where this post proves useful.
Drones could fly around the property and the house, getting video and images from new perspectives and offering an unparalleled range of viewpoints. Nevertheless, because drones have started to rapidly increase their capacity to get footage in the past couple of years, they have turned into good options for marketers.
There are a few clear applications for quadcopters as delivery vehicles plus for hobbyists. However, not many users think about how drones are changing the real estate sector.
See our "what is a drone" post to know what are drones used for today other than real estate marketing.
Keep in mind to not get over excited – drone is there to create your job simple and help the customers selecting their next home, not for to enjoy yourself this time. Use the best drones to take pictures and video you cannot adopt any other method.
Here is an excellent example of using drones for real estate marketing.
Nowadays brokers and real estate agents believe the drones application in the property marketing business is more helpful compared to default camera. Therefore, camera drone is used its advantages are listed below.
Give an Advantage to Company: Your brand impression will improve as customers understand they can count on high-quality video from you. Add drone footage with all of your property listings, and you will quickly become recognized for it.
Cut Costs: Compare an airborne shooting through a drone and a helicopter, the drone filming is way affordable. Arranging some plane and purchasing expensive cameras are not possible. In contrast, the drone is readily available and much less costly option.
Highlight Extra Property Features: Aerial videography and photography will highlight the real estate feature more efficiently. Walk paths, front yards, pools, backyards, and landscaping are an essential aspect of promoting any home to a lot of sellers and buyers. Therefore, are nearby places are recorded with the drones.
More Powerful Pictures: With pre-determined trip features you could also program the drone to zip via a whole property, getting video of every room. It is for creating a seamless film instead of one which cuts from one room to another.
It is better to study from other people who have gone through it before if you are likely to outsource it or do it yourself. Some of the implications which will assist you in capturing your very first drone video clip highlighted below.
Work with a local drone expert.
Always utilize a three-axis gimbal.
Add Steadicam / Glidecam video to make a smooth video.
Always shoot the essential video clip more than a single time.
Always fly together with the breeze.
It is evident that marketing drone services are legal given that the business abides by wise practice rules. During the past, the Federal Aviation Administration has sent mixed messages about the drone equipment's use for commercial applications. For instance, to fly these gadgets commercially, agencies must file FAA's 333 exemption and adhere to the below rules.
Should not hover through a moving automobile.
400 feet (the maximum height).
Should not pilot over the public.
The pilot must maintain a line of sight (visual) on the aircraft all the time.
Should yield to manned UAV.
Must fly at only daylight hours.
100 miles per hour (The maximum velocity).
There are places where the drone is strictly restricted. These include any areas within 5 miles of an airport and sports stadiums.
Registering your drone is simple to perform on the FAA site, which costs just $5 to register as many units as you have. In case, you own a drone bigger than 0.5 pounds of weight, in that case, you have to register the aircraft at the FAA website. Unregistered drone confronted with a fine as high as $25,000 per drone.
On the whole, real estate drone photography has become the greatest trends this industry is facing now. Get one of the above reviewed high-end models to make expert-level real estate footage, boost traffic to the listings, and make sales much quicker.
There are lots of excellent drones in the marketplace. The five listed in this article are the finest of the finest regarding making property video considered.
From these five, the Phantom 4 Pro by DJI is our best pick. It is the top drone for real estate video/photography currently available on the market. In case, you could manage it. If you are bound to a smaller price range, the DJI Mavic Pro and the UPair One Plus Drone are perfect alternatives. You still can pull off a few incredible shots; it will just need some more effort.
Having said that, we hope this list served you make up a decision. We have done our level best to offer you with useful details about every single one of these best drones for real estate photography. | {
"redpajama_set_name": "RedPajamaC4"
} |
10 Marzo 2017 Press release
Tibetan man detained for storing photos of Dalai Lama, Tibetan flag on Wechat
DHARAMSHALA, MAR. 8: A Tibetan man has reportedly been detained by Chinese authorities in Sershul County for storing photos of the exiled Tibetan leader the Dalai Lama and the banned Tibetan national flag in his Wechat account.
Gendun from Sershul County in the Kardze Prefecture, Sichuan Province has been detained by Chinese authorities for storing the photos of the banned Tibetan national flag and the photo of the Tibetan leader reviled by China as a "separatist'.
Gendun was severely beaten and held in a Chinese prison in Sershul County, according to a source cited by Voice of Tibet. The same source also said that the area has since come under intensified surveillance and restriction and that local Tibetans are apprehensive of passing information through Wechat.
WeChat is a text and voice messaging communication service developed by Tencent in 2011 and is widely used by Tibetans inside and outside Tibet. The Chinese authorities have used the micro-messaging app to make arrests in the past. It has become the most used mode of communication through its walkie-talkie style messaging facility. However, activists and experts fear that the app's voice-messaging service enables security officials to monitor user's movements in real time and access other information shared via the app.
The tension and level of restriction leading up to the 'Tibetan Uprising Day' which falls on March 10 is palpable with Chinese authorities bent on avoiding a repeat of the 2008 Tibet uprising that saw protests all over Tibet. The Tibetan Autonomous Region (TAR) is virtually blocked off from the outside world with Tibetans from other regions denied entry into the highly restricted area.
Phayul,March 08/ 2017 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
\section{Acknowledgements}\label{sec:Acknowledgement}
The authors gratefully acknowledge the support of the United States
National Science Foundation for the construction and operation of
the LIGO Laboratory and the Particle Physics and Astronomy Research
Council of the United Kingdom, the Max-Planck-Society and the State
of Niedersachsen/Germany for support of the construction and
operation of the GEO600 detector. The authors also gratefully
acknowledge the support of the research by these agencies and by the
Australian Research Council, the Natural Sciences and Engineering
Research Council of Canada, the Council of Scientific and Industrial
Research of India, the Department of Science and Technology of
India, the Spanish Ministerio de Ciencia y Tecnologia, the John
Simon Guggenheim Foundation, the Leverhulme Trust, the David and
Lucile Packard Foundation, the Research Corporation, and the Alfred
P. Sloan Foundation. We are grateful to Scott Barthelmy and the GCN
network and Kevin Hurley and the IPN network for providing us with
near real time GRB triggers and to the Ulysses, Konus, SAX, and HETE
experiments, who detect and generate the events distributed by GCN
and IPN. This research has made use of data obtained from the HETE
science team via the website http://space.mit.edu/HETE/Bursts/Data.
HETE is an international mission of the NASA Explorer program, run
by the Massachusetts Institute of Technology.
\section{Analysis}\label{sec:Analysis}
The goal of the analysis is either to identify significant events
in the signal region or, in the absence of significant events, to
set a limit on the strength of the associated gravitational wave
signal. Simulations and background data were used to determine the
detection efficiency for various ad-hoc and model-based waveforms
(Section~\ref{sec:Efficiencies}) and the false alarm rate of the
detection algorithm respectively.
The analysis takes advantage of the information provided by the
astrophysical trigger. The trigger time determined when to perform
the analysis. As discussed below, the time window to be analyzed
around the trigger time was chosen to accommodate most current
theoretical predictions and timing uncertainties. The source
direction was needed to calculate the attenuation due to the LIGO
detector's antenna pattern for the astrophysical interpretation.
The two co-located and co-aligned Hanford detectors had very similar
frequency-dependent response functions at the time of the trigger.
Consequently, the detected arrival time and recorded waveforms of a
gravitational wave signal should be essentially the same in both
detectors. It is natural then to consider cross-correlation of the
two data streams as the basis of a search algorithm. This conclusion
can also be reached via a more formal argument based on the maximum
log-Likelihood ratio test~\cite{Anderson01,Mohanty04}.
The schematic of the full analysis pipeline is shown in
Figure~\ref{fig:PIPE}. The underlying analysis algorithm is
described in detail in Ref.~\cite{Mohanty04}.
\begin{figure}[!t]
\includegraphics[angle=0,width=84mm]{PIPE.eps}
\caption{The schematic of the analysis pipeline } \label{fig:PIPE}
\end{figure}
The background data, the signal region data and the simulations are
all processed identically. The background region consists of the
data where we do not expect to have a gravitational wave signal
associated with the GRB. We scan the background to determine the
false alarm distribution and to set a threshold on the event
strength that will yield an acceptable false alarm rate. This
threshold is used when scanning the signal region and simulations.
In order to estimate our sensitivity to gravitational waves,
simulated signals of varying strength are added to the detector data
streams.
The signal region around the GRB trigger is scanned to identify
outstanding signals. If events were detected above threshold, in
this region, their properties would be tested against those
expected from gravitational waves. If no events were found above
threshold, we would use the estimated sensitivity to set an upper
limit on the gravitational wave strain at the detector.
The output from each interferometer is divided into 330~sec long
segments with a 15~second overlap between consecutive segments (both
ends), providing a tiling of the data with 300~second long segments.
In order to avoid edge effects, the 180~sec long signal region lies
in the middle of one such 300~sec long segment. This tiling method
also allows for adaptive data conditioning and places the
conditioning filter (see Sec.~\ref{sec:DataConditioning} below)
transients well outside of the 300 second long segment containing
the signal region.
\subsection{Choice of signal region}\label{sec:Signal_region}
Current models suggest~\cite{Meszaros03} that the gravitational wave
signature should appear close to the GRB trigger time. We
conservatively chose the duration and position of the signal region
to over-cover most predictions and to allow for the expected
uncertainties associated with the GRB trigger timing. A 180 second
long window (see Figure~\ref{fig:HETE}), starting 120 seconds before
the GRB trigger time is sufficient; roughly ten times wider than the
GRB light curve features, and wide enough to include most
astrophysical predictions. Most models favor an ordering where the
arrival of the gravitational wave precedes the GRB
trigger~\cite{Meszaros03}, but in a few other cases the
gravitational wave arrival is predicted to be
contemporaneous~\cite{Araya-Gochez03,Putten04} to the arrival and
duration of the gamma rays (i.e after the GRB trigger). The 60
second region after the GRB trigger time, is sufficient to cover
these predictions and also contains allowance for up to 30 seconds
uncertainty on trigger timing, which is a reasonable choice in the
context of the HETE light curve. Figure~(\ref{fig:HETE}) shows a
signal rise time of order $10~s$, precursor signals separated from
the main peak, and significant structure within the main signal
itself. Effects due to the beaming dynamics of the GRB and the
instrumental definition of the trigger time can also be significant
contributors to the timing uncertainty.
\subsection{Search algorithm}\label{sec:SearchAlgorithm}
\subsubsection{Data Conditioning}\label{sec:DataConditioning}
The data-conditioning step was designed to remove instrumental
artifacts from the data streams. We used an identical data
conditioning procedure when processing the background, the signal
region and the simulations.
The raw data streams have narrowband lines, associated with the
power line harmonics at multiples of 60Hz, the violin modes of the
mirror suspension wires and other narrow band noise sources. The
presence of lines has a detrimental effect on our sensitivity
because lines can produce spurious correlations between detectors.
In addition, the broadband noise shows significant variations over
timescales of hours and smaller variations over timescales of
minutes and seconds due to alignment drift and fluctuations. The
background data must portray a representative sample of the
detector behavior around the time of the trigger. Broadband
non-stationarity can limit the duration of this useful background
data and hence the reliability of our estimated false alarm rate.
Our cross correlation based algorithm performs best on white
spectra without line features. We use notch filters to remove the
well-known lines, such as power line and violin mode harmonics
from both data streams. Strong lines of unknown origin with
stationary mean frequency are also removed at this point. We also
apply a small correction to mitigate the difference between the
phase and amplitude response of the two Hanford detectors.
We bandpass filter and decimate the data to a sampling rate of
4096~Hz to restrict the frequency content to the ${\simeq}80$~Hz to
${\simeq}2048$~Hz region, which was the most sensitive band for both
LIGO Hanford detectors during the S2 run.
In order to properly remove weaker stationary lines and the small
residuals of notched strong lines, correct for small slow changes
in the spectral sensitivity and whiten the spectrum of the data,
we use adaptive line removal and whitening. As all strong lines
are removed before the adaptive whitening, we avoid potential
problems due to non-stationary lines and enhance the efficiency of
the follow up adaptive filtering stage. The conditioned data has a
consistent white spectrum without major lines and sufficient
stationarity, from segment to segment, throughout the background
and signal regions.
The end result of the pre-processing is a data segment with a flat
power spectral density (white noise), between $\simeq$80~Hz and
$\simeq$2048~Hz. The data conditioning was applied consistently
after the signal injections. This ensures that any change in
detection efficiency due to the pre-processing is properly taken
into account.
\subsubsection{Gravitational Wave Search Algorithm}\label{sec:Algorithm}
The test statistics for a pair of data streams are constructed as
follows. We take pairs of short segments, one from each stretch,
and compute their cross-correlation function. The actual form of
the cross-correlation used ($\widetilde{C}^{m,n}_{k,p,j}$) is
identical to the common Euclidean inner product:
\begin{equation}
\widetilde{C}^{m,n}_{k,p,j}= \sum_{i=-j}^{j} H_m[k+i]
H_n[k+p+i]~,~
\end{equation}
where the pre-conditioned time series from detector ``x" is ${\bf
H}_x=\{H_x[0],H_x[1],\ldots\}$ and i,k,p and j are all integers
indexing the data time series, with each datum being (1/4096)~s
long. As we now only consider the two Hanford detectors ``m" and
``n" can only assume values of 1 ($H_1$) or 2 ($H_2$). There are
therefore three free parameters to scan when searching for
coherent segments of data between a pair of interferometers (m,n):
1. the center time of the segment from the first detector (k); 2.
the relative time lag between the segments from the two detectors
(p); and 3. the common duration of segments (2j+1) called the
integration length.
The optimum integration length to use for computing the
cross-correlation depends on the duration of the signal and its
signal-to-noise ratio, neither of which is {\em a priori} known.
Therefore the cross-correlation should be computed from segment
pairs with start times and lengths varying over values, which
should, respectively, cover the expected arrival times (signal
region) and consider durations of the gravitational wave burst
signals~\cite{Muller2004,Fryer2004,Fryer2002,Zwerger1997,Dimmelmeier2002,Burrows1996}
($\sim$O(1-128ms)).
Hence we apply a search algorithm~\cite{Mohanty04} that processes
the data in the following way.
(1) A three dimensional quantity (${\cal C}_{k,j}[p]$) is
constructed:
\begin{equation}\label{CCStat}
{\cal C}_{k,j}[p] =
\left[\left({\widetilde{C}^{1,2}_{k,p,j}}\right)^2 +
\left({\widetilde{C}^{2,1}_{k,-p,j}}\right)^2\right]^{1/2}\;,
\end{equation}
scanning the range of segment center times (k), integration
lengths (2j+1) and relative time shifts ($p =
0,\pm1,\pm2,\ldots$). A coherent and coincident signal is expected
to leave its localized signature within this three dimensional
quantity.
We use a fine rectangular grid in relative time shift (p) and
integration length (2j+1) space. The spacing between grid points is
$\simeq$1~ms for the segment center time (k) and (1/4096)~s for the
relative time shift. The spacing of the integration lengths is
approximately logarithmic. Each consecutive integration length is
${\simeq}$50\% longer than the previous one, covering integration
lengths from ${\simeq}$1~ms to ${\simeq}$128~ms.
Introducing small, non-physical relative time shifts (much larger
than the expected signal duration) between the two data streams
before computing the cross-correlation matrix suppresses the average
contribution from a GW signal. This property can be used to estimate
the local noise properties, thereby mitigating the effects of
non-stationarity in the interferometer outputs. Accordingly, ${\cal
C}_{k,j}[p]$ contains the autocorrelation of the coherent signal for
relative time shifts at and near p~$=$~0 (called ``\emph{core}"),
while far away, in the ``side \emph{lobes}", the contribution from
the signal autocorrelation is absent, sampling only the random
contributions to the cross-correlation arising from the noise. The
optimal choice of the core size depends on the expected signal
duration (integration length), the underlying detector noise and it
cannot be smaller than the relative phase uncertainty of the
datastreams. The core region can reach as far as 5~ms, as it
increases with increasing integration length. The size of each side
lobe is twice the size of the core region and the median time shift
associated with the side lobes can be as large as 325~ms as it is
also increasing with increasing integration length. We use the side
lobes of ${\cal C}_{k,j}[p]$ to estimate the mean
($\widehat{\mu}_{k,j}$) and variance ($\widehat{\sigma}_{k,j}$) of
the local noise distribution, which is also useful in countering the
effects of non-stationarity.
\begin{figure}[!t]
\includegraphics[angle=0,width=87mm]{Corrgram.eps}
\caption{Examples of corrgram images. The horizontal axes are time
(linearly scaled) and the vertical axes are integration length
(logarithmically scaled). The color axis, an indicator of the excess
correlation, is independently auto-scaled for each quadrant for
better visibility, therefore the meaning of colors differ from
quadrant to quadrant. The time ticks also change from quadrant to
quadrant for better visibility. The rainbow type color scale goes
from blue to red, dark red marking the most significant points
within a quadrant. The upper two quadrants show the corrgram image
of injected Sine-Gaussians (250~Hz,~Q~$=$~8.9). The bottom quadrants
are examples of noise. The maximum of the intensity scale is
significantly higher for both quadrants with injections, when
compared to the noise examples. The top left injection is strong
enough to be significantly above the preset detection threshold,
while the top right injection is weak enough to fall significantly
below the detection threshold.} \label{fig:Corrgram}
\end{figure}
(2) The three dimensional quantity is reduced to a two dimensional
image (see Fig.~\ref{fig:Corrgram}), called a {\em corrgram}, as
follows. The values of ${\cal C}_{k,j}[p]$ in the core region are
standardized by subtracting $\widehat{\mu}_{k,j}$ and then dividing
by $\widehat{\sigma}_{k,j}$. {\em Positive} standardized values in
the core region are summed over $p$ to determine the value of the
corrgram pixel. Each pixel is a measure of the excess
cross-correlation in the core region when compared to the expected
distribution characterized by the side lobes for the given (k,j)
combination.
(3) A list of events is found by recursively identifying and
characterizing significant regions (called ``clusters") in the
corrgram image. Each event is described by its arrival time, its
optimal integration length and its strength (ES). The event's
arrival time and its optimal integration length correspond to the
most significant pixel of the cluster. The event strength is
determined by averaging the five most significant pixels of the
cluster, as this is helpful in discriminating against random
fluctuations of the background noise.
The strength of each event is then compared to a preset detection
threshold corresponding to the desired false alarm rate. This
detection threshold is determined via extensive scans of the
background region.
\section{Summary}\label{sec:Discussion}
\subsection{Comparison with previous searches for gravitational waves from GRBs}\label{sec:Comparison}
Our result is comparable to the best published results searching for
association between gravitational waves and GRBs~\cite{Astone2004},
however these studies differ in their most sensitive frequency.
Tricarico et al.~\cite{Tricarico01} used a single resonant mass
detector, AURIGA~\cite{Prodi98} , to look for an excess in
coincidences between the arrival times of GRBs in the BATSE 4B
catalog. They used two different methods. They searched for events
identified above a certain threshold in the gravitational wave data,
and also attempted to establish a statistical association between
GRBs and gravitational waves. No significant excess was found with
the former method. The latter used a variant of the correlation
based Finn-Mohanty-Romano (FMR) method~\cite{FMR99}. However,
instead of using the cross-correlation of two detectors, as proposed
in the FMR method, only the variance of the single detector output
was used. A sample of variances from times when there were no GRBs
was compared with a corresponding sample from data that spanned the
arrival times of the GRBs. An upper limit on the source-averaged
gravitational wave signal root mean square value of
$1.5\times10^{-18}$ was found using 120 GRBs. This limit applies at
the AURIGA resonant frequencies of 913 and 931 Hz, which are very
far from the most sensitive frequency of the LIGO detectors
($\simeq$250~Hz). This work ~\cite{Tricarico01} was later extended
~\cite{Tricarico03}, which led to an improved upper limit.
The data analysis method employed in Modestino \&
Moleti~\cite{Modestino02} is another variant of the FMR method.
Instead of constructing off-source samples from data segments that
are far removed from the GRB trigger, the off-source samples are
constructed by introducing non-zero time shifts between the two
detector data streams and computing their cross-correlation. For
narrowband resonant mass detectors, the directional information of
a GRB cannot be exploited to discriminate against incorrect
relative timing since the signal in the output of the detector is
spread out by the detector response over time scales much larger
than the light travel time between the detectors.
Astone et al.~\cite{Astone99,Astone02} report on a search for a
statistical association between GRBs and gravitational waves using
data from the resonant mass detectors EXPLORER~\cite{Astone93} and
NAUTILUS~\cite{Astone97}. They report a Bayesian upper limit on
gravitational wave signal amplitudes of 1.2$\times$10$^{-18}$, at
95\% probability, when the maximum delay between the GRB and
gravitational wave is kept at 400 sec. The upper limit improves to
6.5$\times$10$^{-19}$ when the maximum delay is reduced to 5 sec.
However, the absence of directional and/or distance information for
most of these GRBs precluded accounting for source variations; the
gravitational wave signal amplitude was assumed to be the same for
all of the GRBs.
Astone et al.~\cite{Astone99B} report on the operation of the
resonant mass detectors EXPLORER during the closest ever gamma ray
burst (GRB980425) with known redshift and direction. At the time of
the burst, EXPLORER was taking data with close to optimal
orientation. GRB980425 was $\simeq$23 times closer to Earth than
GRB030329 giving a $\simeq$520 increase in energy sensitivity. Based
on their sensitivity and the loudest event within $\pm$5~minutes of
the GRB980425 trigger the authors quote a limit of
$\simeq$1600~M$_\odot$ for a simple model assuming isotropic
gravitational wave emission.
Recently, Astone et al.~\cite{Astone2004} executed a search aiming
to detect a statistical association between the GRBs detected by the
satellite experiments BATSE and BeppoSAX, and the EXPLORER and
NAUTILUS gravitational wave detectors. No association was uncovered.
Their upper limit is the lowest published result, which is based on
bar-detector gravitational wave data.
\subsection{Conclusion}\label{sec:Conclusion}
We have executed a cross-correlation-based search for possible
gravitational wave signatures around the GRB030329 trigger, which
occurred during the Second Science Run (S2) of the LIGO detectors.
We analyzed a 180 second signal region around the GRB and 4.5 hours
of background data, surrounding the signal region, corresponding to
a single coincident lock stretch. These data were sufficient to
characterize the background, scan the signal region and estimate our
efficiency. We used the same procedure, based on cross correlation,
for each of these studies. We evaluated the sensitivity of the
search to a large number of broad and narrow band waveforms.
We observed no candidates with gravitational wave signal strength
larger than a pre-determined threshold, therefore we set upper
limits on the associated gravitational wave strength at the
detectors. The present analysis covers the most sensitive frequency
range of the Hanford detectors, approximately from 80~Hz to 2048~Hz.
The frequency dependent sensitivity of our search was h$_{RSS}
{\simeq}$O(6$\times$10$^{-21}$)~Hz$^{-1/2}$.
The prospect for future searches is promising, as the sensitivity of
the instruments improves with further commissioning.
Once operating at target sensitivity, the detectors will be more
sensitive to strain than they were during S2 by factors of 10~-~100,
depending on frequency (see Figure~\ref{fig:LIGOEFF}.). This implies
an improvement of a factor of $\sim$1000 in sensitivity to E$_{GW}$,
since E$_{GW}$ scales like $\sim h_{RSS}^{2}$ (see for example
Eq.~\ref{Int5}).
Detection of GRBs with measured redshifts significantly smaller
than GRB030329's is certainly possible. GRB030329's
electromagnetic brightness was due to a favorable combination of
distance and our position in its beam. One year of observation
will incorporate hundreds of GRBs with LIGO data coverage and some
of these GRBs, even though
fainter~\cite{Woosley2004,Sazonov2004,Soderberg2004} than
GRB030329, could be significantly closer, as was 1998bw. We can
also hope for sources with more optimal direction and coincidence
between three or four observing interferometers.
\section{Introduction}\label{sec:Introduction}
Gamma Ray Bursts (GRBs) are short but very energetic pulses of gamma
rays from astrophysical sources, with duration ranging between 10~ms
and 100~s. GRBs are historically divided into two
classes~\cite{Kouveliotou93,Meszaros03} based on their duration:
``short" ($<$~2~s) and ``long" ($>$~2~s). Both classes are
isotropically distributed and their detection rate can be as large
as one event per day. The present consensus is that long
GRBs~\cite{Meszaros03} are the result of the core collapse of
massive stars resulting in black hole formation. The violent
formation of black holes has long been proposed as a potential
source of gravitational waves. Therefore, we have reason to expect
strong association between GRBs and gravitational
waves~\cite{Fryer01,Davies02,Putten04}. In this paper, we report on
a search for a possible short burst of gravitational waves
associated with GRB030329 using data collected by the Laser
Interferometer Gravitational Wave Observatory (LIGO).
On March 29, 2003, instrumentation aboard the HETE-2
satellite~\cite{HETE04} detected a very bright GRB, designated
GRB030329. The GRB was followed by a bright and well-measured
afterglow from which a redshift~\cite{Price03} of $z=$0.1685
(distance~$\simeq$800~Mpc~\cite{Matheson03}) was determined. After
approximately 10 days, the afterglow faded to reveal an underlying
supernova (SN) spectrum, SN2003dh~\cite{Sokolov03}. This GRB is the
best studied to date, and confirms the link between long GRBs and
supernovae.
At the time of GRB030329, LIGO was engaged in a 2-month long data
run. The LIGO detector array consists of three interferometers, two
at the Hanford, WA site and one at the Livingston, LA site.
Unfortunately, the Livingston interferometer was not operating at
the time of the GRB; therefore, the results presented here are based
on the data from only the two Hanford interferometers. The LIGO
detectors are still undergoing commissioning, but at the time of
GRB030329, their sensitivity over the frequency band 80 to 2048~Hz
exceeded that of any previous gravitational wave search, with the
lowest strain noise of ${\simeq}$6$\times$10$^{-22}$~Hz$^{-1/2}$
around 250~Hz.
A number of long GRBs have been associated with X-ray, radio and/or
optical afterglows, and the cosmological origin of the host galaxies
of their afterglows has been unambiguously established by their
observed redshifts, which are of order unity~\cite{Meszaros03}. The
smallest observed redshift of an optical afterglow associated with a
detected GRB (GRB980425~\cite{Kulkarni98,Iwamoto98,Galama98}) is
$z$=0.0085 ($\simeq$35~Mpc). GRB emissions are very likely strongly
beamed~\cite{Frail01,Putten03}, a factor that affects estimates of
the energy released in gamma rays (a few times 10$^{50}$ erg), and
their local true event rate (about 1 per year within a distance of
100Mpc).
In this search, we have chosen to look for a burst of gravitational
waves in a model independent way. Core collapse~\cite{Davies02},
black hole formation~\cite{Putten04,Bulik04} and black hole
ringdown~\cite{Hughes98,Jolien99} may each produce gravitational
wave emissions, but there are no accurate or comprehensive
predictions describing the gravitational wave signals that might be
associated with GRB type sources. Thus, a traditional matched
filtering approach~\cite{Helstrom68,InspiralS1} is not possible in
this case. To circumvent the uncertainties in the waveforms, our
algorithm does not presume any detailed knowledge of the
gravitational waveform and we only apply general bounds on the
waveform parameters. Based on current theoretical considerations, we
anticipate the signals in our detectors to be weak, comparable to or
less than the detector's noise~\cite{Muller2004,Fryer2004,Ott2004}.
This paper is organized as follows: Section II summarizes the
currently favored theories of GRBs and their consequences for
gravitational wave detection. Section III provides observational
details pertinent to GRB030329. Section IV briefly describes the
LIGO detectors and their data. Section V discusses the method of
analysis of the LIGO data. In Section VI we compare the events in
the signal region with expectations and we use simulated signal
waveforms to determine detection efficiencies. We also present and
interpret the results in this section. Section VII offers a
comparison with previous analyses, a conclusion, and an outlook
for future searches of this type.
\section{OVERVIEW OF THE LIGO DETECTORS}\label{sec:LIGO_Detectors}
The three LIGO detectors are orthogonal arm Michelson laser
interferometers, aiming to detect gravitational waves by
interferometrically monitoring the relative (differential)
separation of mirrors, which play the role of test masses. The LIGO
Hanford Observatory (LHO) operates two identically oriented
interferometric detectors, which share a common vacuum envelope: one
having 4 km long arms (H1), and one having 2 km long arms (H2). The
LIGO Livingston Observatory operates a single 4 km long detector
(L1). The two sites are separated by $\simeq$3000~km, representing a
maximum arrival time difference of ${\simeq}\pm$10~ms.
A complete description of the LIGO interferometers as they were
configured during LIGO's first Science Run (S1) can be found in Ref
~\cite{Stan03}.
\subsection{Detector calibration and configuration}\label{sec:Configurations}
To calibrate the error signal, the response to a known
differential arm strain is measured, and the frequency-dependent
effect of the feedback loop gain is measured and compensated for.
During detector operation, changes in calibration are tracked by
injecting continuous, fixed-amplitude sinusoidal excitations into
the end test mass control systems, and monitoring the amplitude of
these signals at the measurement (error) point. Calibration
uncertainties at the Hanford detectors were estimated to be
$<11\%$.
Significant improvements were made to the LIGO detectors following
the S1 run, held in early fall of 2002:
\begin{enumerate}
\item {The analog suspension controllers on the H2 and L1
interferometers were replaced with digital suspension controllers
of the type installed on H1 during S1, resulting in lower
electronics noise.}
\item {The noise from the optical lever servo that damps the angular
excitations of the interferometer optics was reduced.}
\item {The wavefront sensing system for the H1 interferometer was
used to control 8 of 10 alignment degrees of freedom for the main
interferometer. As a result, it maintained a much more uniform
operating point over the run.}
\item {The high frequency sensitivity was improved by operating the
interferometers with higher effective power, about 1.5 W.}
\end{enumerate}
These changes led to a significant improvement in detector
sensitivity. Figure~\ref{fig:LIGOEFF} shows typical spectra
achieved by the LIGO interferometers during the S2 run.
The differences among the three LIGO spectra reflect differences in
the operating parameters and hardware implementations of the three
instruments which are in various stages of reaching the final design
configuration.
\begin{figure}[!t]
\includegraphics[angle=0,width=94mm]{LIGO_EFF.eps}
\caption{Typical LIGO Hanford sensitivity curves during the S2 Run
[strain~Hz$^{-1/2}$] (black and grey lines). The LIGO design
sensitivity goals (SRD) are also indicated (dotted and dashed
lines).} \label{fig:LIGOEFF}
\end{figure}
\subsection{The second science run}\label{sec:S2Run}
The data analyzed in this paper were taken during LIGO's second
Science Run (S2), which spanned approximately 60 days from
February 14 to April 14, 2003. During this time, operators and
scientific monitors attempted to maintain continuous low noise
operation. The duty cycle for the interferometers, defined as the
fraction of the total run time when the interferometer was locked
and in its low noise configuration, was approximately 74\% for H1
and 58\% for H2. The longest continuous locked stretch for any
interferometer during S2 was 66 hours for H1.
At the time of the GRB030329 both Hanford interferometers were
locked and taking science mode data. For this analysis we relied on
the single, ${\simeq}4.5$ hours long coincident lock stretch, which
started ${\simeq}3.5$ hours before the trigger time. With the
exception of the signal region, we utilized $\simeq$98\% of the data
within this lock stretch as the \emph{background} region (defined in
section V). 60~seconds of data before and after the signal region
were not included in the background region. Data from the beginning
and from the end of the lock stretch were not included in the
background region to avoid using possibly non-stationary data, which
might be associated with these regions.
As described below, the false alarm rate estimate, based on
background data, must be applicable to the data within the signal
region. We made a conservative choice and avoided using background
data outside of the lock stretch containing the GRB trigger time.
This is important when considering the present non-stationary
behavior of the interferometric detectors.
\section{GRB030329 RELATED OBSERVATIONAL RESULTS }\label{sec:Observations}
\subsection{Discovery of GRB 030329 and its afterglow}\label{sec:Afterglow}
On March 29, 2003 at 11:37:14.67 UTC, a GRB triggered the FREGATE
instrument on board the HETE-2
satellite~\cite{HETE04,Vanderspek03,Ricker03,Vander2004}. The GRB
had an effective duration of $\simeq$50~s, and a fluence of
1.08$\times$10$^{-4}$~erg/cm$^{2}$ in the 30-400~keV
band~\cite{Vander2004}. The KONUS detector on board the Wind
satellite also detected it~\cite{Golenetskii03}, triggering about
15~seconds after HETE-2. KONUS observed the GRB for about 35
seconds, and measured a fluence of
1.6$\times$10$^{-4}$~erg~/~cm$^{2}$ in the 15-5000~keV band. The
measured gamma ray fluences place this burst among the brightest
GRBs. Figure~\ref{fig:HETE} shows the HETE-2 light curve for
GRB030329~\cite{HETE030329}.
\begin{figure}[!t]
\includegraphics[angle=0,width=84mm]{HETE.eps}
\caption{The GRB030329 light curve as measured by the HETE-2 FREGATE
B instrument. The arrow indicates the HETE trigger time. The signal
region analyzed in this study is indicated by the horizontal bar at
the top. This figure is the courtesy of the HETE collaboration. }
\label{fig:HETE}
\end{figure}
The rapid localization of the GRB by HETE ground analysis gave an
accurate position which was distributed about 73 minutes after the
original trigger. A few hours later, an optical
afterglow~\cite{Lipkin03,Price03} was discovered with magnitude
R=12.4, making it the brightest optical counterpart to any GRB
detected to date. The RXTE~\cite{Bradt93} satellite measured a X-ray
flux of 1.4$\times$10$^{-10}$~erg~s$^{-1}$~cm$^{-2}$ in the 2-10 keV
band about 4h51m after the HETE trigger, making this one of the
brightest X-ray afterglows detected by RXTE~\cite{Marshall03}. The
National Radio Astronomy Observatory (NRAO) observed ~\cite{GCN2014}
the radio afterglow, which was the brightest radio afterglow
detected to date~\cite{Berger03}. Spectroscopic measurements of the
bright optical afterglow~\cite{Greiner03} revealed emission and
absorption lines, and the inferred redshift ($z$~=~0.1685,
luminosity distance $D_L~\cong~$800~Mpc) made this the second
nearest GRB with a measured distance. To date, no host galaxy has
been identified. It is likely that numerous other GRBs have been
closer than GRB030329, but the lack of identified optical
counterparts has left their distances undetermined.
Spectroscopic measurements~\cite{Stanek03,Mazzali03,Matheson03},
about a week after the GRB trigger, revealed evidence of a
supernova spectrum emerging from the light of the bright optical
afterglow, which was designated SN2003dh. The emerging supernova
spectrum was similar to the spectrum of SN1998bw a week before its
brightness maximum~\cite{Hjorth03,Greiner03N}.
SN1998bw was a supernova that has been spatially and temporally
associated with GRB980425~\cite{Kulkarni98,Iwamoto98,Galama98}, and
was located in a spiral arm of the barred spiral galaxy ESO 184-G82
at a redshift of $z~=$~0.0085 ($\simeq$35~Mpc), making it the
nearest GRB with a measured distance. The observed spectra of
SN2003dh and SN1998bw, with their lack of hydrogen and helium
features, place them in the Type Ic supernova class. These
observations, together with the observations linking GRB980425
(which had a duration of ${\simeq}$23~s) to SN1998bw, make the case
that collapsars are progenitors for long GRBs more convincing. In
the case of SN1998bw, Woosley \emph{et al.}~\cite{Woosley99} and
Iwamoto \emph{et al.}~\cite{Iwamoto98} found that its observed
optical properties can be well modeled by the core collapse of a C+O
core of mass 6~M$_{\odot}$ (main sequence mass of 25~M$_{\odot}$)
with a kinetic energy of ${\simeq}$2$\times$10$^{52}$~ergs. This
energy release is about an order of magnitude larger than the
energies associated with typical supernovae.
\subsection{GRB030329 energetics}\label{sec:Energetics}
A widely used albeit naive quantity to describe the energy emitted
by GRBs is the total isotropic equivalent energy in gamma rays:
\begin{equation}\label{IEE}
E_{iso} = 4 \pi (BC) D_{L}^{2} f / (1+z) \approx
2\times10^{52}~erg~.~
\end{equation}
where $f$ is the measured fluence in the HETE-2 waveband and BC is
the approximate bolometric correction for HETE-2 for long GRBs.
Using a ``Band spectrum"~\cite{Band93} with a single power law to
model the gamma ray spectrum, and using a spectral index,
$\beta=-$2.5, gives that the GRB's total energy integrated from 1
keV to 5 GeV is greater than that present in the band 30-400 keV by
a factor 2.2.
However, it is generally believed that GRBs are strongly beamed, and
that the change in slope in the afterglow light curve corresponds to
the time when enough deceleration has occurred so that relativistic
beaming is diminished to the point at which we ``see" the edge of
the jet. This occurs during the time in which the relativistic
ejecta associated with the GRB plows through the interstellar
medium, and the beaming factor $\Gamma^{-1}$, where $\Gamma$ is the
bulk Lorentz factor of the flow, increases from a value smaller than
the beaming angle $\Theta_j$, to a value larger than $\Theta_j$.
Effectively, prior to this time the relativistic ejecta appears to
be part of a spherical expansion, the edges of which cannot be seen
because they are outside of the beam, while after this time the
observer perceives a jet of finite width.
This leads to a faster decline in the light curves. Zeh \emph{et
al.} and Li \emph{et al.}~\cite{Zeh03,Li03} show that the initial
``break" or strong steepness in the light curve occurs at about 10
hours after the initial HETE-2 detection.
Frail \emph{et al.}~\cite{Frail01} give a parametric relation
between beaming angle $\Theta_{j}$, break time t$_{j}$, and
E$_{iso}$ as:
\begin{eqnarray}\label{Theta}
\Theta_{j} \approx 0.057 ~{\left(\frac{t_{j}}{24
hours}\right)}^{3/8} {\left(\frac{1+z}{2}\right)}^{-3/8}\times\nonumber\\
\times~{~} {\left(\frac{E_{iso}}{10^{53}
ergs}\right)}^{-1/8}{\left(\frac{\eta_\gamma}{0.2}\right)}^{1/8}{\left(\frac{n}{0.1cm^{-3}}\right)}^{1/8}~{~{~{~}}}~.~
\end{eqnarray}
where $\Theta_{j}$ is measured in radians. It was argued that the
fireball converts the energy in the ejecta into gamma rays
efficiently~\cite{Beloborodov00} (${\eta_\gamma}\approx${0.2}), and
that the mean circumburst density is {n}$\approx${0.1~cm$^{-3}$}
~\cite{Frail00}. Evaluating equation ~\ref{Theta} for the parameters
of GRB030329 (t$_{j}\approx$~10~hours, $z$=0.1685, and
E$_{iso}$=2$\times$10$^{52}$~erg) gives $\Theta_{j}\approx$0.07~
rad.
Therefore the beaming factor that relates the actual energy released
in gamma rays (E$_\gamma$) to the isotropic equivalent energy is
{${\Theta_{j}^{2}}$/2}$\approx$1/400, so that
E$_\gamma\approx$5$\times$10$^{49}$~erg. Comparing E$_{iso}$ and
E$_\gamma$ with the histograms in Fig. 2 of Frail \emph{et
al.}~\cite{Frail01} , GRB030329 resides at the lower end of the
energy distributions. The calculated isotropic energy from
GRB980425, the GRB associated with SN1998bw, is also low
(${\simeq}$10$^{48}$~erg).
\section{Production of gravitational waves in massive core collapses}\label{sec:Production_of_GW}
The apparent spatial association of GRB afterglows with spiral arms,
and by implication star formation regions in remote galaxies, has
lead to the current ``collapsar'' or ``hypernova'' scenario
~\cite{MacFadyen99,Heger2003} in which the collapse of a rotating,
massive star to a Kerr black hole can lead to relativistic ejecta
emitted along a rotation axis and the associated production of a GRB
jet. The identification of GRB030329 with the supernova SN2003dh
(section 3 below) gives further support to this association. This
observation is consistent with the theory that the GRB itself is
produced by an ultra-relativistic jet associated with a central
black hole. Stellar mass black holes in supernovae must come from
more massive stars. Ref. ~\cite{Heger2003} presents ``maps'' in the
metallicity-progenitor mass plane of the end-states of stellar
evolution and shows that progenitors with 25 $M_{\odot}$ can produce
black holes by fall-back accretion.
The observed pulsar kick velocities of $\simeq$500~km/s hint at a
strong asymmetry around the time of maximum compression, which may
indicate deviations from spherical symmetry in the progenitor. The
resulting back reaction on the core from the neutrino heating
provides yet another potential physical mechanism for generating a
gravitational wave signal. In the model of ~\cite{Burrows1996} it
imparts a kick of 400-600 km/s and an induced gravitational wave
strain roughly an order of magnitude larger than in
~\cite{Muller2004} and an order of magnitude smaller than
~\cite{Dimmelmeier2002}.
Theoretical work on gravitational wave (GW) signals in the process
of core-collapse in massive stars has advanced much in recent years,
but still does not provide detailed waveforms. Current models take
advantage of the increase in computational power and more
sophisticated input physics to include both 2D and 3D calculations,
utilizing realistic pre-collapse core models and a detailed, complex
equation of state of supernovae that produce neutron stars. The most
recent studies by independent groups give predictions for the strain
amplitude within a similar range, despite the fact that the dominant
physical mechanisms for gravitational wave emission in these studies
are different ~\cite{Muller2004, Fryer2004, Fryer2002, Zwerger1997,
Dimmelmeier2002}. The calculations of ~\cite{Muller2004} are
qualitatively different from previous core collapse simulations in
that the dominant contribution to the gravitational wave signal is
neutrino-driven convection, about 20 times larger than the
axisymmetric core bounce gravitational wave signal.
The applicability of the above models to GRBs is not clear, since
the model endpoints are generally neutron stars, rather than black
holes. Another recent model involves accretion disks around Kerr
black holes~\cite{vanPutten2003}, subject to non-axisymmetric
Papaloizou-Pringle instabilities~\cite{Papaloizou1984} in which an
acoustic wave propagates toroidally within the fallback material.
They are very interesting since they predict much higher
amplitudes for the gravitational wave emission.
For our search, the main conclusion to draw is that in spite of the
dramatic improvement in the theoretical models, there are no
gravitational waveforms that could be reliably used as templates for
a matched filter search, and that any search for gravitational waves
should ideally be as waveform independent as practical. Conversely,
detection of gravitational waves associated with a GRB would almost
certainly provide crucial new input for GRB/SN astrophysics. It is
also clear that the predictions of gravitational wave amplitudes are
uncertain by several orders of magnitude, making it difficult to
predict the probability to observe the gravitational wave signature
of distant GRBs.
The timeliness of searching for a gravitational wave signal
associated with GRBs is keen in light of the recent work by
~\cite{Fryer2004} and \cite{Muller2004}. ~\cite{Muller2004} finds
that the signal due to neutrino convection exceeds that due to the
core bounce and therefore a chaotic signal would be expected.
Studies with simplified or no neutrino transport (e.g.,
~\cite{Fryer2004}, \cite{Ott2004}) find the core-bounce to be the
dominant contributor to the GW signal. The large-scale, coherent
mass motions involved in the core bounce leads to a predicted
gravitational wave signal resembling a damped sinusoid.
\section{Results}\label{sec:Results}
\subsection{False alarm rate measurements}\label{sec:FAR}
In order to assess the significance of the cross-correlated power
of an event, we determined the false alarm rate versus event
strength distribution. We used the full background data stretch
for this measurement.
\begin{figure}[!t]
\includegraphics[angle=0,width=92mm]{FAR.eps}
\caption{False alarm rate as a function of the event strength
threshold as determined from background data. The error bars reflect
90\% CL Poisson errors, based on the the number of events within the
given bin. The pointer indicates the event strength threshold used
for the analysis, which corresponds to an interpolated false alarm
rate of less than $5\times10^{-4}$~Hz. Note that the signal region
data is not included in this calculation. The position of symbols
correspond to the center of the bins.} \label{fig:FAR}
\end{figure}
Figure~\ref{fig:FAR} shows the event rate as a function of the
event strength threshold for the background region. The error bars
reflect 90\% CL Poisson errors, based on the the number of events
within the given bin. We used this distribution to fix the event
strength threshold used in the subsequent analysis.
We chose an event strength threshold with an associated false alarm
rate of less than ${\simeq }$5$\times$10$^{-4}$~Hz, equivalent to
less than ${\simeq}$9\% chance for a false alarm within the 180
second long signal region.
\subsection{Efficiency determination}\label{sec:Efficiencies}
The detection sensitivity of the analysis was determined by
simultaneously adding simulated signals of various amplitudes and
waveforms to both data streams in the background region and
evaluating the efficiency of their detection as a function of the
injected amplitude and waveform type.
The waveforms we considered include Sine-Gaussians to emulate
short narrow-band bursts, Gaussians to emulate short broad-band
signals, and Dimmelmeier-Font-M\"{u}ller numerical
waveforms~\cite{Dimmelmeier2002}, as examples of astrophysically
motivated signals.
Calibration of the waveforms from strain to ADC counts was
performed in the frequency domain, and was done separately for
each interferometer. Calibration procedures of the LIGO detectors
are described in Ref.~\cite{Stan03}. The transformed signals, now
in units of counts of raw interferometer noise, were then simply
added to the raw data stream.
The amplitudes and the times of the injections were randomly
varied. In this way we ensured that each amplitude region sampled
the full, representative range of noise variations and that we had
no systematic effects, for example, due to a regular spacing in
time.
To a reasonable approximation the sensitivity of our analysis
pipeline can be expressed in terms of the frequency content, the
duration and the strength of the gravitational wave signal.
Therefore, it is sufficient to estimate the sensitivity of our
search for a representative set of broad and narrow band waveforms,
which span the range of frequencies, bandwidth, and duration we wish
to search.
We characterize the strength of an arbitrary waveform by its
root-sum-square amplitude ($h_{RSS}$), which is defined
as~\cite{Burstpaper}:
\begin{equation}\label{hRSS}
h_{RSS} = \sqrt{\int_{-\infty}^{\infty} |~h(t)~|^2~ \,dt }~.~
\end{equation}
The above definition of $h_{RSS}$ includes all frequencies, while
the gravitational wave detectors and search algorithms are only
sensitive in a restricted frequency band. In principle, one can
analogously define a ``band-limited" $h_{RSS}$, in which only the
sensitive frequency band of the analysis is taken into account.
Within this paper we choose to adopt the Eq.~\ref{hRSS} definition
of h$_{RSS}$ for historical reasons.
The extracted sensitivities (see the examples in
Figures~\ref{fig:EFF_250_8.9} and ~\ref{fig:CAL_250_8.9}) can be
used to generalize our measurements and estimate the pipeline's
sensitivity for other similar band-limited waveforms.
\begin{figure}[!t]
\includegraphics[angle=0,width=84mm]{EFF_250_9.eps}
\caption{Efficiency of the detection algorithm for a sample waveform
as a function of signal strength ($h_{RSS}$); in this case a
Sine-Gaussian of $f_0=250$~Hz and Q~$=$~8.9. To extract this curve
numerous simulated waveforms were embedded in a representative
fraction of the background data at random times with randomly
varying signal strength. The plot shows the fraction of signals
detected as the function of amplitude and a sigmoid function fit.
The reconstructed signal onset times were required to fall within
$\pm$60~ms of the true onsets, which also explains why the low
$h_{RSS}$ end of the curve falls near zero. This is a typical plot
and in general, the agreement between the measured values, and the
fit is better than ${\simeq}5\%$. We relied on the fit to extract
our upper limits for an optimally oriented and polarized source.
Section~\ref{sec:Interpretation} below describes the corrections due
to non-optimal source direction and polarization.}
\label{fig:EFF_250_8.9}
\end{figure}
\begin{figure}[!t]
\includegraphics[angle=0,width=84mm]{CAL_250_9.eps}
\caption{Detected event strength versus $h_{RSS}$ of the injected
Sine-Gaussian waveform with $f_0=250$~Hz and $Q~\approx~8.9$. The
dots indicate the scatter of the distribution of raw measurements.
The gray band shows the quadratic polynomial fit, which allows us to
convert the strength of an observed event into the equivalent
$h_{RSS}$ value and determine the associated $90\%$ CL error bars.
The markers with error bars represent the $90\%$ CL regions for
subsets of the data. For each marker, $90\%$ of the measurements
used were within the horizontal error bars and $90\%$ of the
detected event strengths values fell within the vertical error bars.
The vertical dash-dot line represents the $50\%$ detection
efficiency associated with the waveform type and the chosen
detection threshold (horizontal dotted line). As expected, the
crossing of the threshold and the $50\%$ efficiency lines agree well
with the fit and the center of the corresponding marker. The
vertical dashed line represents the boundary of the region where we
have better than $90\%$ detection efficiency. The ``corner" defined
by the event strength threshold and the $90\%$ detection efficiency
boundary (dashed lines) agrees well with the curve outlined by the
lower end of the vertical error bars of the markers. All events in
the upper right corner of the plot (above and beyond the dashed
lines) are detectable with high confidence. This plot is typical for
different waveforms considered in the analysis.}
\label{fig:CAL_250_8.9}
\end{figure}
\begin{figure}[!t]
\includegraphics[angle=0,width=94mm]{SENS.eps}
\caption{Sensitivity of the detection algorithm for detecting
Sine-Gaussian waveforms versus characteristic frequency. The plot
shows the strength necessary for $90\%$ detection efficiency. The
grey spectra illustrate the sensitivity of the 2K and 4K Hanford
detectors during the time surrounding the GRB030329 trigger. The
error bars reflect a total $15\%$ error.} \label{fig:SENS}
\end{figure}
To assess the sensitivity for relatively narrow band waveforms, we
used Sine-Gaussian injections of the form:
\begin{equation}\label{SineGauss}
h(t) = h_\circ \sin(\omega_\circ\,t)e^{-t^2/2\sigma^2} \;,
\end{equation}
with a central angular frequency of~~$\omega_\circ = 2\pi
f_\circ$, and $Q=\omega_\circ \sigma = 2\pi f_\circ \sigma $. The
relation between $h_\circ$ and $h_{RSS}$ is given as:
\begin{eqnarray}\label{SGhRSS}
h_{RSS}^{SG} = h_\circ~\sqrt{\frac{\sqrt{\pi}~\sigma}{2} \left(
1-e^{-Q^2}\right)}\, ~{\approx}~\nonumber\\
~{\approx}~ h_\circ~\sqrt{\frac{Q}{4\sqrt{\pi}~f_\circ}}~ \times
~\left\{
\begin{array}{cc}
1 & Q\gg1 \\
0.8 & Q\simeq1 \\
\end{array}
\right\}\;.
\end{eqnarray}
\\
The injected signals covered the frequency range between 100 and
1850 Hz with 13 values of $f_{\circ}$. To test the dependence of the
sensitivity on signal duration, we used three values of Q (4.5, 8.9
and 18) for each frequency (see Table~\ref{t:NBET}). Near the most
sensitive frequency region, around $\simeq$250~Hz, our gravitational
wave strain sensitivity for optimally polarized bursts was better
than h$_{RSS}{\simeq}$5$\times$10$^{-21}$~Hz$^{-1/2}$.
Figure~\ref{fig:SENS} shows the sensitivity for these narrow band
waveforms. The symbols mark the simulated event strength ($h_{RSS}$)
necessary to achieve $90\%$ detection efficiency for each waveform.
We quote the gravitational wave signal strength associated with the
$90\%$ detection efficiency, as this can be related to the upper
limits on the gravitational wave strength associated with the
source. Figure~\ref{fig:SENS} also illustrates the insensitivity of
the detection efficiency to the Q of the Sine-Gaussian waveforms
with the same central frequency, as these reach their $90\%$
efficiency levels at similar gravitational wave strengths, even
though their Q differ by a factor of ${\simeq}4$; for a given
h$_{RSS}$, a longer signal (higher Q) would of course, have a
smaller h$_{PEAK}$. This strength is frequency dependent, naturally
following the frequency dependence of the detector sensitivities,
which are also indicated in Figure~\ref{fig:SENS}.
Table~\ref{t:BBET} shows a similar set of efficiencies estimated
using broad-band simulated signals. We used two types of broadband
waveforms, Sine-Gaussians with unity quality factor and Gaussians.
Both are short bursts, however, the Gaussians are even functions
while the Sine-Gaussians are odd, leading to different peak
amplitudes with the same $h_{RSS}$ value. Gaussians were
parametrized as:
\begin{equation}\label{Gaussian}
h(t) = h_\circ e^{-t^2/2\sigma^2} \;.
\end{equation}
The relationship between $h_\circ$ and $h_{RSS}$ for a Gaussian
is:
\begin{equation}\label{GaussianhRSS}
h_{RSS}^{GA} = h_\circ~\sqrt{ \sqrt{\pi}\>\sigma}\;.
\end{equation}
The estimated sensitivities indicate that the 90$\%$ detection
efficiency limits for short bursts are similar to those obtained for
the narrow band waveforms when one takes into account that only part
of the power of the broad-band waveforms is confined to the analysis
frequency band. Longer Gaussian bursts are more difficult to detect,
as their spectrum has a significant low frequency component, outside
the sensitive band of our analysis.
We have also estimated our efficiency for a set of astrophysically
motivated burst waveforms~\cite{Dimmelmeier2002} (see Table
~\ref{t:DFMT}). These simulated waveforms are not expected to be
necessarily associated with GRBs, rather these results are presented
here to further illustrate the waveform independence of the
analysis.
\begin{table} [htb]
\begin{center}
\caption[]{\label{t:NBET} $h_{RSS}$ [$Hz^{-1/2}$] for 90\% detection
efficiency for Sine-Gaussians (SG) waveforms at various frequencies
($f_{\circ}$) and Q (see eq.~\ref{SineGauss}). The quoted values are
the results of simulations and are subject to a total of
${\simeq}~15\%$ statistical and systematic errors, which are taken
into account when quoting the ${UL}^{90\%CL}_{h_{RSS}}$ values. Note
that at the low and at the high frequency end, the low Q waveforms
have significant power outside of the analysis frequency band.}
\small
\begin{tabular}{lccccc}
\hline\hline
Waveform & $\sigma$ [ms] & Q & $f_{\circ} [Hz]$ & $h_{RSS}^{90\%} [Hz^{-1/2}]$ & ${UL}^{90\%CL}_{h_{RSS}} [Hz^{-1/2}]$ \\
\hline
SG & 7.2 & 4.5 & 100 & $17\times 10^{-21}$ & $20\times 10^{-21}$ \\
SG & 2.9 & 4.5 & 250 & $4.8\times 10^{-21}$ & $5.6\times 10^{-21}$ \\
SG & 2 & 4.5 & 361 & $5.8\times 10^{-21}$ & $6.7\times 10^{-21}$ \\
SG & 1.6 & 4.5 & 458 & $ 7.0\times 10^{-21}$ & $ 8.0\times 10^{-21}$ \\
SG & 1.3 & 4.5 & 554 & $7.9\times 10^{-21}$ & $9.1\times 10^{-21}$ \\
SG & 1 & 4.5 & 702 & $10\times 10^{-21}$ & $11\times 10^{-21}$ \\
SG & 0.84 & 4.5 & 850 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
SG & 0.72 & 4.5 & 1000 & $15\times 10^{-21}$ & $17\times 10^{-21}$ \\
SG & 0.53 & 4.5 & 1361 & $27\times 10^{-21}$ & $31\times 10^{-21}$ \\
SG & 0.49 & 4.5 & 1458 & $30\times 10^{-21}$ & $34\times 10^{-21}$ \\
SG & 0.46 & 4.5 & 1554 & $37\times 10^{-21}$ & $43\times 10^{-21}$ \\
SG & 0.42 & 4.5 & 1702 & $43\times 10^{-21}$ & $50\times 10^{-21}$ \\
SG & 0.39 & 4.5 & 1850 & $50\times 10^{-21}$ & $58\times 10^{-21}$ \\
\hline
SG & 14 & 8.9 & 100 & $18\times 10^{-21}$ & $21\times 10^{-21}$ \\
SG & 5.7 & 8.9 & 250 & $4.6\times 10^{-21}$ & $5.3\times 10^{-21}$ \\
SG & 3.9 & 8.9 & 361 & $ 6.0\times 10^{-21}$ & $6.9\times 10^{-21}$ \\
SG & 3.1 & 8.9 & 458 & $7.1\times 10^{-21}$ & $8.1\times 10^{-21}$ \\
SG & 2.6 & 8.9 & 554 & $7.3\times 10^{-21}$ & $8.4\times 10^{-21}$ \\
SG & 2 & 8.9 & 702 & $8.9\times 10^{-21}$ & $10\times 10^{-21}$ \\
SG & 1.7 & 8.9 & 850 & $10\times 10^{-21}$ & $12\times 10^{-21}$ \\
SG & 1.4 & 8.9 & 1000 & $13\times 10^{-21}$ & $15\times 10^{-21}$ \\
SG & 1 & 8.9 & 1361 & $20\times 10^{-21}$ & $23\times 10^{-21}$ \\
SG & 0.97 & 8.9 & 1458 & $23\times 10^{-21}$ & $27\times 10^{-21}$ \\
SG & 0.91 & 8.9 & 1554 & $26\times 10^{-21}$ & $30\times 10^{-21}$ \\
SG & 0.83 & 8.9 & 1702 & $32\times 10^{-21}$ & $37\times 10^{-21}$ \\
SG & 0.77 & 8.9 & 1850 & $38\times 10^{-21}$ & $44\times 10^{-21}$ \\
\hline
SG & 29 & 18 & 100 & $23\times 10^{-21}$ & $26\times 10^{-21}$ \\
SG & 11 & 18 & 250 & $ 5.0\times 10^{-21}$ & $5.7\times 10^{-21}$ \\
SG & 7.9 & 18 & 361 & $6.4\times 10^{-21}$ & $7.4\times 10^{-21}$ \\
SG & 6.3 & 18 & 458 & $7.9\times 10^{-21}$ & $9.1\times 10^{-21}$ \\
SG & 5.2 & 18 & 554 & $7.7\times 10^{-21}$ & $8.9\times 10^{-21}$ \\
SG & 4.1 & 18 & 702 & $9.8\times 10^{-21}$ & $11\times 10^{-21}$ \\
SG & 3.4 & 18 & 850 & $10\times 10^{-21}$ & $12\times 10^{-21}$ \\
SG & 2.9 & 18 & 1000 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
SG & 2.1 & 18 & 1361 & $19\times 10^{-21}$ & $21\times 10^{-21}$ \\
SG & 2 & 18 & 1458 & $21\times 10^{-21}$ & $24\times 10^{-21}$ \\
SG & 1.8 & 18 & 1554 & $22\times 10^{-21}$ & $25\times 10^{-21}$ \\
SG & 1.7 & 18 & 1702 & $29\times 10^{-21}$ & $33\times 10^{-21}$ \\
SG & 1.5 & 18 & 1850 & $34\times 10^{-21}$ & $39\times 10^{-21}$ \\
\hline\hline
\end{tabular}
\end{center}
\end{table}
\begin{table} [htb]
\begin{center}
\caption[]{\label{t:BBET} As in Table~\ref{t:NBET}, $h_{RSS}$
[$Hz^{-1/2}$] for 90\% detection efficiency for Gaussian (GA)
waveforms of various durations ($\sigma$) (see eq.~\ref{Gaussian})
and for Sine-Gaussians (SG) waveforms at various frequencies
($f_{\circ}$) and $Q=1$ (see eq.~\ref{SineGauss}). Note that these
broadband waveforms have significant power outside of the analysis
frequency band.} \small
\begin{tabular}{lccccc}
\hline\hline
Waveform & $\sigma$ [ms] & Q & $f_{\circ} [Hz]$ & $h_{RSS}^{90\%} [Hz^{-1/2}]$ & ${UL}^{90\%CL}_{h_{RSS}} [Hz^{-1/2}]$ \\
\hline
SG & 1.6 & 1 & 100 & $10\times 10^{-21}$ & $12\times 10^{-21}$ \\
SG & 0.64 & 1 & 250 & $6.5\times 10^{-21}$ & $7.4\times 10^{-21}$ \\
SG & 0.44 & 1 & 361 & $8.4\times 10^{-21}$ & $9.7\times 10^{-21}$ \\
SG & 0.35 & 1 & 458 & $10\times 10^{-21}$ & $12\times 10^{-21}$ \\
SG & 0.29 & 1 & 554 & $13\times 10^{-21}$ & $14\times 10^{-21}$ \\
SG & 0.23 & 1 & 702 & $18\times 10^{-21}$ & $20\times 10^{-21}$ \\
SG & 0.19 & 1 & 850 & $23\times 10^{-21}$ & $26\times 10^{-21}$ \\
SG & 0.16 & 1 & 1000 & $26\times 10^{-21}$ & $30\times 10^{-21}$ \\
SG & 0.12 & 1 & 1361 & $39\times 10^{-21}$ & $45\times 10^{-21}$ \\
SG & 0.11 & 1 & 1458 & $44\times 10^{-21}$ & $51\times 10^{-21}$ \\
SG & 0.1 & 1 & 1554 & $46\times 10^{-21}$ & $52\times 10^{-21}$ \\
SG & 0.094 & 1 & 1702 & $55\times 10^{-21}$ & $63\times 10^{-21}$ \\
SG & 0.086 & 1 & 1850 & $61\times 10^{-21}$ & $70\times 10^{-21}$ \\
\hline
GA & 0.5 & & & $8.3\times 10^{-21}$ & $9.6\times 10^{-21}$ \\
GA & 0.75 & & & $9.6\times 10^{-21}$ & $1.1\times 10^{-20}$ \\
GA & 1 & & & $1.3\times 10^{-20}$ & $1.5\times 10^{-20}$ \\
GA & 2 & & & $3.3\times 10^{-20}$ & $3.8\times 10^{-20}$ \\
GA & 3 & & & $8.2\times 10^{-20}$ & $9.5\times 10^{-20}$ \\
GA & 4 & & & $1.9\times 10^{-19}$ & $2.2\times 10^{-19}$ \\
GA & 5.5 & & & $8.5\times 10^{-19}$ & $9.8\times 10^{-19}$ \\
GA & 8 & & & $1.3\times 10^{-17}$ & $1.5\times 10^{-17}$ \\
GA & 10 & & & $1.0\times 10^{-16}$ & $1.2\times 10^{-16}$ \\
\hline\hline
\end{tabular}
\end{center}
\end{table}
\begin{table} [htb]
\begin{center}
\caption[]{\label{t:DFMT} As in Table~\ref{t:NBET}, $h_{RSS}$
[$Hz^{-1/2}$] for 90\% detection efficiency for astrophysically
motivated waveforms. These waveforms are described in detail in
Ref.~\cite{Dimmelmeier2002}. Note that most of these waveforms
have significant power outside of the analysis frequency band.}
\small
\begin{tabular}{lccccc}
\hline\hline
Simulation & Waveform & $h_{RSS}^{90\%} [Hz^{-1/2}]$ & ${UL}^{90\%CL}_{h_{RSS}} [Hz^{-1/2}]$ \\
\hline
DFM & A1B1G1 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
DFM & A1B2G1 & $13\times 10^{-21}$ & $15\times 10^{-21}$ \\
DFM & A1B3G1 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
DFM & A1B3G2 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
DFM & A1B3G3 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
DFM & A1B3G5 & $34\times 10^{-21}$ & $39\times 10^{-21}$ \\
DFM & A2B4G1 & $24\times 10^{-21}$ & $27\times 10^{-21}$ \\
DFM & A3B1G1 & $19\times 10^{-21}$ & $21\times 10^{-21}$ \\
DFM & A3B2G1 & $20\times 10^{-21}$ & $23\times 10^{-21}$ \\
DFM & A3B2G2 & $15\times 10^{-21}$ & $17\times 10^{-21}$ \\
DFM & A3B2G4 & $14\times 10^{-21}$ & $16\times 10^{-21}$ \\
DFM & A3B3G1 & $28\times 10^{-21}$ & $33\times 10^{-21}$ \\
DFM & A3B3G2 & $17\times 10^{-21}$ & $20\times 10^{-21}$ \\
DFM & A3B3G3 & $12\times 10^{-21}$ & $14\times 10^{-21}$ \\
DFM & A3B3G5 & $30\times 10^{-21}$ & $34\times 10^{-21}$ \\
DFM & A3B4G2 & $23\times 10^{-21}$ & $27\times 10^{-21}$ \\
DFM & A3B5G4 & $26\times 10^{-21}$ & $29\times 10^{-21}$ \\
DFM & A4B1G1 & $38\times 10^{-21}$ & $44\times 10^{-21}$ \\
DFM & A4B1G2 & $32\times 10^{-21}$ & $36\times 10^{-21}$ \\
DFM & A4B2G2 & $42\times 10^{-21}$ & $48\times 10^{-21}$ \\
DFM & A4B2G3 & $39\times 10^{-21}$ & $45\times 10^{-21}$ \\
DFM & A4B4G4 & $17\times 10^{-21}$ & $19\times 10^{-21}$ \\
DFM & A4B4G5 & $12\times 10^{-21}$ & $13\times 10^{-21}$ \\
DFM & A4B5G4 & $21\times 10^{-21}$ & $25\times 10^{-21}$ \\
DFM & A4B5G5 & $19\times 10^{-21}$ & $22\times 10^{-21}$ \\
\hline\hline
\end{tabular}
\end{center}
\end{table}
\subsection{Signal region}\label{sec:SignalRegion}
The analysis of the signal region (Fig.~\ref{fig:SRH}) yielded
only events well below the predetermined event strength threshold
($\lesssim$60\% of threshold). Since we had no candidate event, we
placed an upper limit on the detected strength of gravitational
waves associated to GRB030329. Our fixed false alarm rate
permitted the results of simulations to be used directly in
setting upper limits.
\begin{figure}[!t]
\includegraphics[angle=0,width=84mm]{SRH.eps}
\caption{Number of events versus event strength in the signal region
(circle). The diamonds show the expected distribution based on the
background region. The squares mark the expected distribution based
on non-physical time shifts (ranging from 2 to 9 seconds) between
the H1 and H2 datastreams in the background region. The error bars
reflect $90\%$ CL Poisson errors. The position of the symbols
correspond to the center of the bins.} \label{fig:SRH}
\end{figure}
The upper limits on $h_{RSS}$ for narrow band waveforms are given
in Table~\ref{t:NBET}. Tables~\ref{t:BBET}~and~\ref{t:DFMT} show
the upper limits for the broadband simulations and astrophysically
motivated waveforms, respectively.
\subsection{Errors}\label{sec:Errors}
The analysis method, the procedures used to determine the
efficiencies, and the non-stationary nature of the data, all
contribute to the uncertainty associated with the results.
The efficiency (versus $h_{RSS}$) values have an estimated
${\simeq}11\%$ uncertainty due to our limited knowledge of the
calibrated response of our detectors. This estimate also accounts
for the slight difference in calibrated response between the signal
region and background data used for the simulations.
An additional uncertainty arises from the non-stationarity of the
data. The results of the simulations exhibit a slight dependence on
the choice of the actual data segments (``base" data) used for the
injections. This dependence was characterized via simulations using
numerous different sub-segments of the background data. We repeated
the full efficiency estimation process several times for the same
waveform, while injecting into various base data stretches. The
variation in the measured upper limits indicated ${\simeq}10\%$
uncertainty due to the dependency of our upper limits on the base
data. This uncertainty shall also account for the statistical error
due to the finite number of simulations used.
We characterized the detection efficiencies for each waveform
considered via fits of sigmoid functions (see for example
Figure~\ref{fig:EFF_250_8.9}). The fits agree well with the data,
but small differences are occasionally observed in the $\gtrsim90\%$
efficiency region. We estimate that using these fits can
underestimate the 90\% limits by $\lesssim5\%$.
The uncertainties listed above are taken into account by
specifying a total 15\% uncertainty for each measurement in
Figure~\ref{fig:SENS} and in all Tables.
The false alarm rate associated with the results was also measured.
The false alarm rate limit is based on the measurement with zero lag
data plus the 90\% confidence Poisson error bars. We have checked
the assumption of Poisson background statistics by examining the
time intervals between consecutive triggers and the variance in
trigger counts for varying ES thresholds when the background sample
is divided into 50 equal-length intervals. Good agreement with the
Poisson expectation is observed. This choice provides a conservative
estimate of our associated (${\simeq }$5$\times$10$^{-4}$~Hz) false
alarm rate.
\subsection{Astrophysical interpretation}\label{sec:Interpretation}
GRB030329 has a well-determined redshift, therefore we can relate
our observed limits on strain to a measure of the total
gravitational wave energy emission. For a strain $h(t)$ at
distance $D_L$ from a source of gravitational radiation, the
associated power is proportional to $\dot{h}^2$ ($\dot{h}=dh/dt$),
though the proportionality constant will depend on the (unknown)
emission pattern of the source and the antenna pattern of the
detector (for the known source position, but unknown polarization
angle).
In general, it is not possible to relate our upper limit on the
strain from a particular waveform to a limit on the energy radiated
by the source, without assuming a model. Sources that radiate energy
$E_{\mathrm{GW}}$ might produce an arbitrarily small signal $h(t)$
in the detector, e.g., if the dynamics in the source were purely
axi-symmetric with the detector located on the axis. Nevertheless,
we can associate a strain $h(t)$ in the detector with some minimum
amount of gravitational-wave energy radiated by the source by
choosing an ``optimistic'' emission pattern, thereby obtaining a
measure of the minimum amount of energy that would need to be
radiated in order to obtain a detectable signal. We will show that
the progenitor of GRB030329 is not expected to have produced a
detectable signal.
We are interested in a ``plausible case scenario'' of gravitational
wave emission in order to obtain the minimum (plausible) amount of
gravitational-wave energy radiated that could be associated with a
detector signal $h(t)$. We do not expect the gravitational waves to
be strongly beamed, and we expect that we are observing the GRB
progenitor along some preferred axis. We take a model best case
scenario to be that of gravitational wave emission from a triaxial
ellipsoid rotating about the same axis as the GRB (i.e., the
direction to the Earth). If we assume quadrupolar gravitational wave
emission, the plus- and cross-polarization waveforms, emitted at a
polar angle $\theta$ from the axis of rotation to be:
\begin{eqnarray}
h_+ &=& \frac12 (1 + \cos^2\theta)\, h_{+,0} \\
h_\times &=& \cos\theta\, h_{\times,0}
\end{eqnarray}
where $h_{+,0}$ and $h_{\times,0}$ are two orthogonal waveforms
(e.g., a Sine-Gaussian and a Cosine-Gaussian), each containing the
same amount of radiative power. That is, we assume that the same
amount of gravitational-wave energy is carried in the two
polarizations and that they are orthogonal:
\begin{equation}
\int_{-\infty}^\infty \dot{h}_{+,0}^2 \, dt
= \int_{-\infty}^\infty \dot{h}_{\times,0}^2 \, dt
\quad\textrm{and}\quad
\int_{-\infty}^\infty
\dot{h}_{+,0}
\dot{h}_{\times,0} \, dt = 0.
\end{equation}
Thus, we would expect that the gravitational waves travelling
along the rotational axis (toward the Earth) would be circularly
polarized, and that the detector would receive the signal
\begin{equation}
h = F_+ h_{+,0} + F_\times h_{\times,0}
\end{equation}
where $F_+$ and $F_\times$ represent the detector responses to the
polarization components $h_{+,0}$ and $h_{\times,0}$
\cite{Thorne-300}, and depend on the position of the source in the
sky and on a polarization angle. The radiated energy from such a
system is calculated to be
\begin{equation}
E_{\mathrm{GW}} = \frac{c^3}{16\pi G}\int dA \int_{-\infty}^\infty
(\dot{h}^2_+ + \dot{h}^2_\times) dt
= \frac{c^3}{5G}\frac{D_L^2}{\eta^2} \int_{-\infty}^\infty \dot{h}^2 dt
\end{equation}
where $\eta^2=F_+^2+F_\times^2$ (which depends only on the
position of the source on the sky) and where we are integrating
over a spherical shell around the source with radius $D_L$ (the
distance to the Earth). Alternatively, using Parseval's identity,
we have
\begin{equation}
E_{\mathrm{GW}} = \frac{8\pi^2c^3}{5G}\frac{D_L^2}{\eta^2}
\int_0^\infty |f\tilde{h}|^2 df
\end{equation}
where
\begin{equation}
\tilde{h}(f)=\int_{-\infty}^\infty h(t) e^{-2\pi ift}\, dt.
\end{equation}
Whereas optimal orientation gives $\eta=1$ for a source at zenith,
the position of GRB030329 was far from optimal. The angle with
respect to zenith was $68^\circ$ and the azimuth with respect to
the $x$-arm was $45^\circ$, which yields $\eta=0.37$.
We now relate $E_{\mathrm{GW}}$ to the strain upper limits using
the specific waveforms used in the analysis. For a Gaussian
waveform [see Eq.~(\ref{Gaussian})]:
\begin{equation}\label{Int5}
E_{\mathrm{GW}} = \left(\frac{\sqrt{\pi}c^3}{10G}\right)
\left(\frac{D_L^2 h_\circ^2}{\sigma}\right)
\end{equation}
and for a sine-Gaussian waveform [see Eq.~(\ref{SineGauss})]:
\begin{equation}
E_{\mathrm{GW}} = \left(\frac{\sqrt{\pi}c^3}{20G}\right)
\left(\frac{D_L^2 h_\circ^2}{\sigma}\right)
( 1 + 2Q^2 - e^{-Q^2} )
\end{equation}
where $Q=\omega_\circ\sigma=2\pi f_\circ\sigma$. The relation
between $h_\circ$ and $h_{RSS}$ is given in
Eqs.~(\ref{GaussianhRSS}) and~(\ref{SGhRSS}).
We can relate the observed limit on $h_{RSS}$ to an equivalent mass
$M_{\mathrm{EQ}}$ which is converted to gravitational radiation with
$100\%$ efficiency, $E_{\mathrm{GW}}=M_{\mathrm{EQ}}c^2$, at a
luminosity distance $D_L\approx 800\,\textrm{Mpc}$. For
sine-Gaussian waveforms with $f_\circ=250\,\textrm{Hz}$ and $Q=8.9$,
$M_{\mathrm{EQ}}=1.9\times10^4\eta^{-2}M_\odot$. For Gaussian
waveforms with $\sigma=1\,\textrm{ms}$,
$M_{\mathrm{EQ}}=3.1\times10^4\eta^{-2}M_\odot$. However, we would
not expect that the gravitational-wave luminosity of the source
could exceed $\simeq c^5/G=2\times10^5M_\odot c^2$ per
second~\cite{misner73a}, so we would not expect an energy in
gravitational waves much more than $\simeq 2\times10^3~M_\odot c^2$
in the $\simeq10\,\textrm{ms}$ Sine-Gaussian waveform, or an energy
of much more than $\simeq 3\times10^4 M_\odot c^2$ in the maximum
duration ($150\,\textrm{ms}$) of the search; far below the limits on
$M_{\mathrm{EQ}}c^2$ that we find in this analysis. Present
theoretical expectations on the gravitational wave energy emitted
range from 10$^{-6}$ M$_\odot$ c$^2$ - 10$^{-4}$ M$_\odot$ c$^2$ to
10$^{-1}$ M$_\odot$ c$^2$ - M$_\odot$ c$^2$ for some of the most
optimistic models [see e.g.~\cite{Mosquera02, Ruffini01, Putten04,
Araya-Gochez03}]. Nonetheless, these scalings indicate how we can
probe well below these energetic limits with future analyses. For
example, assuming similar detector performance for an optimally
oriented trigger like GRB980425 (D$_L\approx$35~Mpc) the limit on
the equivalent mass would be $M_{\mathrm{EQ}}\approx$60~M$_\odot$
for the Gaussian waveforms mentioned above with
$\sigma=1\,\textrm{ms}$.
| {
"redpajama_set_name": "RedPajamaArXiv"
} |
We're thrilled to be able to share another fabulous bridal designer with you today, the talented Jenny Yoo. You will love the simplicity and natural elegance of her designs. From floaty whimsical gowns, to structured bodices and delicate detailing, each design has a pretty element to suit many different styles.
American based designer, Jenny Yoo has a wealth of knowledge and an impressive education from the prestigious Parsons School of Design in New York City. With many years designing for private label companies and high-end retailers in America under her belt, she decided to follow her dream and design her own bridesmaid collection which lead to a bridal line.
Combining elegant silhouettes and different fabrics including, silk, satin, chiffon, lace and tulle, Jenny Yoo creates beautiful gowns to suit many different bride's styles.
Simple detailing like sheer panelling, ruffled necklines and lace caplets add different personalities to the gowns. While lace embroidery, flower details and belts adding a statement element to the gowns.
Jenny Woo wedding dresses are stocked in Covet - The Borrow's Boudoir in the Powerscourt Centre. You can see all her fabulous dresses online at www.jennyyoo.com.
For more wedding dress designers pop over to our Wedding Dress section. | {
"redpajama_set_name": "RedPajamaC4"
} |
Home > Articles > Programming > Windows Programming
Writing Code with Visual Basic .NET
By Duncan Mackenzie and Kent Sharkey
Variables and Assignment
Some Suggested Naming Standards
Simple Calculations
Writing Your Own Routines
Sample Application: Calculating a Future Value
This article takes a comprehensive look inside the world of Visual Basic.NET, the simple, concise programming language designed for today's Web environment. Begin by looking at such foundational concepts as variable and assignment, simple calculations and various functions; and end by examining a sample application.
Sams Teach Yourself Visual Basic .NET in 21 Days
Now that you've become more familiar with the Visual Basic .NET development environment, it's time to begin writing code. Although Visual Basic .NET makes it easy to write a simple program without using much code, any program simpler than a demo will need to keep track of information, and do simple calculations and similar tasks. To write code that performs these tasks, you'll need a good understanding of variables. By understanding the use and types of variables, you're creating the foundation for your understanding of Visual Basic .NET. Similarly, just as when you began learning simple arithmetic, you will need to learn some of the simple operators that can be used to work with number and string variables in your programs. Today, you will learn
The types of variables you can create with Visual Basic .NET
Some simple operators and functions available in Visual Basic .NET
The fundamentals of writing code in Visual Basic .NET, including how to write procedures
Variables and assignment are at the core of every programming language. Variables enable you to store information for later use, and assignment is the way you get information into variables.
What Is a Variable?
A variable is a bucket. It's a place to hold information until you need it. You will use variables throughout your programs to hold temporary values during calculations, to store user input, and to prepare information that will be later displayed to users.
Available Variable Types
Just as with pants, one size does not fit all variables. Although it is possible to create and use a variable that is capable of holding anything, it's not always the best solution. It's easy to imagine that a variable holding strings must do something different from a variable designed to hold numbers. In addition, even different types of numbers require different variable types. Some numbers, such as 1 or 5280, don't have a decimal place, whereas 3.14159265358979 and 16.50 do. A variable made to hold a number with a decimal must do something specifically to keep track of the values after the decimal. Of course, that means that decimal numbers probably take up more memory. Any time a computer or program does more work, it usually needs more memory. So, it is important to keep in mind not only the type of information you need to store, but also the amount of memory the computer will have to manipulate to keep track of the variable.
There are three broad types of variables you can create with Visual Basic .NET. The first set encompasses variables that hold simple values, such as numbers or strings. There are many of these, each designed to hold values of various sizes. The second category is complex variables, which hold some combination of simple variables, and include arrays and user-defined types. Arrays are variables that hold a series of other variables, and user-defined types enable a user to create new types of variables. The third category of variables is object variables.
User-defined types (also known as structures) and object variables will be covered later, on Day 7, "Working with Objects." Today's discussion of variables will focus on simple variables and arrays.
Simple Variables
As described previously, the simple variable types "hold" values such as numbers and words. So, you might think that there only needs to be two types of variables: numbers and words. However, there are actually a number of different simple variable types—each made to hold different sizes or kinds of numbers or strings.
Try to use the best variable type for the situation. Sometimes, you only need to keep track of a small number—for example, if you're keeping track of the months of the year. Other times, you need to work with big numbers with many decimal places—for example, if you're writing a program that performs engineering or scientific calculations.
The simple variables can be divided into four subgroups. The first, and largest, group is for integers, numbers that have no decimal places. The second group is used for numbers that have decimal places. Strings and characters make up the third group, and the fourth group is best described as "other." Let's look at each of these groups and see when it is appropriate to use each.
Integer Variables
The integer variables hold the familiar whole numbers (that is, numbers without decimal places). Integers are one of the most common variables you will use in programs, and the easiest for computers to deal with. Because of this ease, they should be your first choice as a variable type when you need to work with numbers. Table 3.1 shows a number of different integer variables, each designed to hold numbers of different sizes, and use different amounts of memory. The amount of memory used is measured in bytes. (One byte contains eight bits, which is just a fancy way of saying that each byte has eight 1's or 0's, or a combination of 1's and 0's.) Although there is no harm in using a variable designed to hold larger values than needed, it wastes memory. In addition, it could cause your program to run slower because it would have to keep track of larger sections of memory, even when that memory is never used.
Table 3.1 Integer Variable Types
Rather small, and unlike the other integer data types, the Byte does not support negative numbers. This is because the Byte represents the value that the computer actually stores for each byte in memory. In order to store negative numbers, the computer uses part of each byte to hold the "negative" part. This is useful when keeping track of small numbers that are never negative, such as days in a month, or months in a year.
–32,768 to32,767
A handy, small integer variable. You can use a Short whenever you don't need the full range of an Integer, for example, if you were writing a program to count the number of employees of a company that only had a few thousand employees.
–2,147,483,648 to 2,147,483,647
The standard integer variable. For the most part, the Integer is the fastest type of variable to use, as it requires the computer to do the least amount of work. One use for a variable of this type would be to track the number of sheep in New Zealand (approximately 47,394,000 in 1997).
–9,223,372,036, 854,775,808 9,223,372,036, 854,775,807
The perfect variable type for those times when you are working with really, really big numbers (that's –9 quintillion to +9 quintillion, or ±9 x 1018, for those keeping track). A Long would be useful if you were tracking the number of stars in the universe (estimated to be about 1022).
Numbers with Decimal Places
A lot of number crunching is done without decimal places. However, more calculations, especially in engineering, finance, and science, require that you also keep a decimal value. Table 3.2 describes the two main decimal variable types. Deciding which to use depends on the degree of accuracy you need to track, rather than the size of values, because they all can hold rather large numbers. In case you don't remember scientific notation from school, the superscript number above the 10 is the number of times you need to multiply by 10 (if positive) or divide by 10 (if negative). Therefore 106 is 10 six times, or 1,000,000, and 10-6 is 0.000001.
Table 3.2 Decimal Variable Types
–3.402823 x 1038 to –1.401298 x 10–45 for negative numbers; 1.401298 x 10–45 to 3.402823 x 1038 for positive numbers
Don't worry too much about the size of those numbers in the range. The Single can keep track of very large (or very small) numbers. The important measure for a Single is accuracy. The name Single denotes that this variable type is for single-precision floating point numbers. That's computer-speak meaning: "It's really only good at holding seven important digits." Look at each of the numbers in the range. Notice that each of them has a number before the decimal place, and six following it, plus the exponent (the number above the 10). So, although the Single is good at storing both large and small numbers, it's not as accurate as the others, and could cause rounding errors if you do a lot of calculations with really large, or really small, numbers. The Single variable type would be useful in a program where less accuracy is needed.
–1.79769313486231 x 10308 to –4.94065645841247 x 10–324 for negative numbers; 4.94065645841247 x 10–324 to 1.79769313486232 x 10308 for positive numbers
The Double is a "double-precision floating point" variable, so it holds twice as many significant digits as the Single, or 15 decimal places. Use a Double whenever you are doing calculations with large numbers, or when you want to avoid the rounding errors that can happen with the Single, such as when doing calculations in engineering or scientific applications.
Strings and Characters
Numbers are fine if you need to track quantities or time, but you also need to deal with words frequently in programming. Visual Basic .NET gives you variables for storing strings: the Char and the String. The Char is good for storing only a single character (thus the name), whereas the String can hold strings of great length. Table 3.3 describes the two data types in more detail.
Table 3.3 String Variable Types
One character
Good for holding a single character.
10 + 2 per character
Up to 2 billion characters
Use a String to hold that novel you always wanted to write. If you assume five characters on average per word, and 250 words per page, a single String variable can hold 1.7 million pages of text.
Why does each Char and each character in a String take up two bytes? After all, there are only 26 characters used in English, plus numbers and symbols—surely, you don't need two bytes (65,536 possible values). You wouldn't if every language used the same character set.
That scenario is what the formerly popular ASCII (or ANSI) character set defined. In ASCII, one byte equals one character, and every computer that used ASCII always positioned the same characters at the same position in the list. So the ASCII value 65 was always the letter "A," and the symbol "@" was had the value 64. If you wanted to do the same for all the other symbols people use in writing, however, you needed more characters. To accommodate this, a new system was developed, called Unicode.
With Unicode, each character is represented as two bytes. This allows for the storage of all the characters in the ASCII chart, as well as characters for Russian, Greek, Japanese and Thai languages, for mathematics, and so on. In Unicode, 65 still represents the letter "A", but 8800 is the character for . The Japanese Hiragana character "No," is represented as character 12398. Visual Basic .NET uses the Unicode values for all characters, so the Char uses two bytes, and each character in a String adds two bytes of additional storage space.
Other Simple Variable Types
It never fails when you try to categorize things. Something always defies being categorized (just imagine the first zoologist to come upon the platypus). Likewise, there are some variables that don't fit neatly into the previously described categories. In Visual Basic .NET, there are two such "other" variable types, the Boolean, and the Date. They are described in more detail in Table 3.4.
Table 3.4 Other Simple Variable Types
So, if it's just holding a True or False, why is it two bytes? Visual Basic has traditionally used 0 and –1 for False and True. Defining these two values requires two bytes.
January 1, 100 to December 31, 9999
The Date variable is capable of holding most dates you will deal with (unless you're a historian or geologist). It also is aware of all the rules for dates (such as adding a day in leap years), so if you add 1 to the Date variable value of "February 28, 2000," you will get "February 29, 2000," but if you do the same for "February 28, 2001," you will get "March 1, 2001." The only real limitation of the Date variable is its size.
You could use another data type to store dates such as a String, or an Integer representing the number of days after some specific date, but why bother? We all know the problems that can lead to (especially after enjoying all the power outages, nuclear plant explosions and other failures on January 1, 2000).
Declaring Variables
Now that you know the types of variables available, how do you create them in your programs? The simplest way is with the Dim (short for "Dimension") keyword, followed by the name of the variable, the keyword As, and finally the type of the variable. It looks like
Dim iSomeNumber As Integer
This would create the new variable iSomeNumber, which takes up four bytes and can hold a number as large as +/– 2 billion. Here are some more possible variable declarations:
Dim sFirstName As String
Dim dblGrossDomesticProduct As Double
Dim bLearned As Boolean
One new feature in Visual Basic .NET is the capability to give a value to a variable as you are creating it. You simply assign a value to the new variable on the same line as the Dim statement:
Dim dtDateOfMagnaCartaSigning As Date = #June 15, 1215#
Dim lPeopleOnEarth As Long = 6000000000
We'll look at some other ways of declaring variables later, when we discuss scope.
A variable's capability to hold one of anything is handy, even essential, in programming. However, you might need to store a number of related items. For example, if you were writing a program to play chess, the squares on the board would need to be represented as a collection of related items. You use arrays to create variables that will store all the related items together. For the chess program, you would likely store the chessboard as an array of positions, each position holding the type of chess piece (or none) at that position. If you did not use an array variable, you would have to use 64 separate variables. You might also need to track a list of strings, for example, a list of the names of students in a class. Whenever you need to store a list of items, you use an array.
As with declaring simple variables, you declare an array with the Dim keyword. However, there are some differences between simple variable declarations and array declarations because arrays are collections of variables. Listing 3.1 shows three possible ways of declaring arrays.
Listing 3.1 Declaring Arrays
1 'Simple declaration
2 Dim iValues(3) As Integer
3 Dim dtDates() As Date
4 Dim I As Integer
5 For I = 1 To 3
6 iValues(I-1) = I
8 'Changing the size of an existing array
9 ReDim dtDates(4)
10 'fill the list of dates
11 dtDates(0)="6/15/1215" 'Signing of Magna Carta
12 dtDates(1)="8/28/1962" 'Martin Luther King Jr. delivers "I have a dream"
13 dtDates(2)="7/20/1969" 'Apollo 11 lands on Moon
14 dtDates(3)="2/14/1946" 'ENIAC unveiled to public
15 'Declaration with Initialization
16 Dim sMonths() As String = {"Jan","Feb","Mar","Apr","May","Jun", _
17 "Jul","Aug","Sep","Oct","Nov","Dec"}
18 'Using arrays
19 Console.WriteLine("")
20 Console.WriteLine("Second value in iValues = {0}", iValues(1))
21 Console.WriteLine("Third date in dtDates = {0}", dtDates(2))
22 Console.WriteLine("Eleventh month of the year = {0}",
sMonths(10))
In the first example, iValues is declared as a three-member array. Each item in the array is an Integer. That much should make sense. The potentially confusing part is in the way you refer to each member of the array. This is shown in the For...Next loop beginning at lines 5 through 7 (Note that we will be covering the For...Next loop tomorrow). Notice that the three members of the array are actually numbered beginning with 0 and going up to 2. Therefore, the second member of the array is at position 1, not 2.
It's worth noting that computers, unlike people, always prefer to begin counting at zero. The overall reasons are best left in the recesses of their tiny silicon minds, but we should be aware of this, especially around arrays.
The second array created, the months of the year, is declared and initialized. Just as you can initialize simple variables as you declare them, you can do the same with arrays. In the case of arrays, however, you put each of the elements of the array in a comma-delimited list, wrapped in braces (curly brackets), as shown on line 16. This creates a 12-member array, with each element holding a string. Remember, however, that if you wanted to refer to each element, they are numbered from 0 to 11—so sMonths(10) would be "Nov", not "Oct".
The final declaration is of a dynamically sized array. This array can be resized later to the correct size with the ReDim keyword as shown on line 10. Just as with the other array types, the items of the dynamic array are numbered from 0 to I minus 1. After the array is sized, you can then use it as any other array. This form of declaration is useful if the size of the array depends on the value of another variable, so that it wouldn't be known until runtime.
I have repeated the fact that all arrays begin with 0 in Visual Basic .NET because, previously, Visual Basic might not have operated that way. In versions of Visual Basic before Visual Basic .NET, you could use the Option Base 1 declaration at the beginning of a module to ensure that all arrays created in that module begin with 1. Alternatively, when declaring arrays, you could define the starting and ending array members, as shown in the following declaration. Neither of these options is available with Visual Basic .NET arrays.
Therefore, the following line of code is not valid in Visual Basic .NET:
Dim sngValues(15 To 51) As Single
Assignment has been simplified in Visual Basic .NET. Earlier Visual Basic versions (Visual Basic 4.0 to 6.0) had two different ways of assigning a value to a variable—one for simple variables (including structures and arrays) and one for object variables. Fortunately, the developers of Visual Basic .NET decided to remove the assignment method used for object variables, and rely only on the method used for simple variables. You assign values to variables (either simple or object) by putting the variable left of an equal sign, as shown in the following code:
iSomeVar = 1234
oObjectVar = New Something()
In Visual Basic version 4.0 to version 6.0, the assignment lines shown previously would have appeared like this
Set oObjectVar = New Something
However, the rules of when to use Set were confusing, so Microsoft removed the need for the Set keyword.
Constants are another class of values that you can use in your Visual Basic .NET programs. Constants are values that do not change, either for the lifetime of your program, or ever. For example, the months in a year, the value of pi, and the database server from which your program retrieves data are all constant values. You can define a value as being constant when you declare it. Any attempts to change the value of a constant will be marked as an error while you are still in the IDE (Integrated Development Environment), and before you attempt to run the application. Constants are declared using one of the two forms shown in the following code:
Const PI = 3.1415 As Double
Const DSN As String = "Random"
If the type of the constant is not described in a declaration, the compiler must use the value type that best fits. However, it does not always select the best possible type. Generally, when declaring constants, if you do not include the type of the value, Visual Basic .NET will create the following variable types
Long For any undeclared whole numbers.
Double For any undeclared decimal numbers. Note: If the value is actually too large for a Double, it will be truncated.
String For any character values.
Declare the type you want when declaring constants, just as you do when declaring variables.
Introducing Machine Learning
By Dino Esposito, Francesco Esposito
MyLab Programming with Pearson eText -- Access Card -- for Introduction to Programming Using Visual Basic, 11th Edition
By David I. Schneider, David I. Schneider | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Kenny Rogers and Dolly Parton Team up Again for a Duet. This Song Will Bring a Tear to Your Eye.
In 1983, Kenny Rogers and Dolly Parton released their beautiful duet 'Islands in the Stream'. You could immediately feel their incredible chemistry whether you heard the song on the radio, or seen them perform it live. Over the years, they have had an incredible friendship and they remain good friends to this day.
37 years later after their first duet, they collaborated on this heartwarming duet a couple of years ago called 'You Can't Make Old Friends' and you can still feel the amazing bond they have together. Dolly Parton has a heart of gold and so does Kenny Rogers and they are true soul partners. Friendships as close as theirs are rare in the music industry or any entertainment industry for that matter and together they make an incredible team.
They are entertainment giants in the music industry but they remain humble and deserve all of their success. Please share this incredible duet by Kenny Rogers and Dolly Parton with your friends and family.
A Ventriloquist Decides to Walk Off Stage. Then, His Puppet Does THIS on Its Own, OMG!
Her Cheating Husband Gave Her 3 Days to Move out of Their Home. Her Response Will Have You Cheering. | {
"redpajama_set_name": "RedPajamaC4"
} |
'''
* Problem005.py
*
* Project Euler: Problem 5
*
* Problem: Find the smallest positive number that is
* evenly divisible by all of the numbers from 1 to 20.
*
'''
import time
start_time = time.time()
def is_divisible_to(number, max):
for i in xrange(max,1,-1):
if number % i != 0:
return False
return True
def divisible_to(n):
if n < 1:
return False
elif n == 1:
return 1
else:
step = divisible_to(n-1)
current_attempt = 0
complete = False
while not complete:
current_attempt += step
complete = is_divisible_to(current_attempt,n)
return current_attempt
print divisible_to(20)
print("--- %s seconds ---" % (time.time() - start_time))
| {
"redpajama_set_name": "RedPajamaGithub"
} |
Buy Black Onyx for Men and Women by Armaf Niche in India at lowest price, Projekt Perfumery India offers best deals on Perfumes in India. deals on Perfumes in India. Buy Black Onyx for Men and Women by Armaf Niche in India at lowest price, Projekt Perfumery India offers best deals on Perfumes in India. deals on Perfumes in India.
Niche Oud by Armaf reminds me of "Rajnigandha pan masala or silver pearls"
Niche Oud by armaf is an oriental fragrance with a lot of spicy elements. As you can see this has a gorgeous yet simple thick glass bottle with a metal-plastic cap. The juice color is brownish, concentration is EDP and comes in 90ml size. Opening is quite strong and heavy and projection is great. One or two spray is enough because this is a scent that you'll sniff all day I mean literally all day, may be more. That's why I'd like to suggest you use it carefully otherwise this will choke people nearby. It reminds me of Rajnigandha Pan Masala or Silver pearls by the same brand", with a touch of sweetness, a bit like sugar coated fennel mouth fresheners. For me it's a beast mode fragrance and certainly not for summer ( it's a winter scent) and definitely not for daytime or office. This is for mature people above 30-35 years of age.
Another hit from Armaf. No actual oud in this one, just the lovely strong and pleasant dose of leather, amber, vanilla, iris, and bergamot. Semi-formal and can be used daily...couple of sprays will do the job. Moderate projection and I got average about 8hrs. Look into it.
Type: Classification:Oriental fougereRecommended use: Day Year introduced: Niche oud by Armaf :Armaf Niche Oud Cologne by Armaf, Perfect for both women and men, Armaf Niche Oud is an aromatic, warm and spicy oriental cologne that showcases unique animalic, vanilla and amber main accords . This foug _�_ÌÒÌÓ_ re fragrance expertly blends rich, sensual base notes of amber, leather, vanilla and patchouli with powdery fresh middle notes of black pepper, cedar and iris to produce a heady nuance for camphorous top notes of bergamot, caraway, sage and spice. Radiate confidence with this opulent scent.Buy Niche oud by Armaf in India at lowest price, Projekt Perfumery India offers best deals on Perfumes in India. deals on Perfumes in India. | {
"redpajama_set_name": "RedPajamaC4"
} |
PROMOTION ALERT : THE MERIDIAN IS ON SALE @ $2,999 ONLY. THIS $1,000 DISCOUNT PROMO RUNS UNTIL APRIL 30, 2019 ONLY.
People are placing more emphasis on wellness these days. That is because they realize that a higher level of overall well-being is the ticket to a higher quality of life. This desire to live better lives has made the use of massage chairs even more important because it provides many physical and mental benefits. However, finding one that blends sophistication, comfort, and convenience so perfectly can be quite challenging. It is a good thing then that we now have the Meridian massage chair by Infinity.
Infinity is at the forefront of innovation in the massage chair industry. They aim to provide innovative solutions to many different people in a variety of ways that will provide unlimited wellness for all lifestyles.
They understand that every customer is different and that is why they refuse to settle in terms of massage chair innovations. They have engineered a wide array of massage chair models over the years that fit a variety of body types, lifestyles, and wellness goals. The Meridian is one of the models under the Infinity line of massage chairs.
Space-Saving Technology - Some customers experience unavoidable space limitations. That does not mean they cannot have a massage chair though. Infinity made sure that space will be of no concern to their customers by creating space-saving models such as the Meridian. All you need to do is place the chair a few inches from the wall and its space-saving technology will move the chair forward on its track or axis.
L-track Massage - An L-track massage chair not only conforms to your spine's natural shape but also extends to your glute muscles providing maximum massage coverage. The Meridian has the Infinity's signature 49" L-track system that pushes the chair's quad rollers from your head all the way to your thighs.
Sole Reflexology - If you do a lot of walking or running, your feet will thank you for the Meridian's unique reflexology mechanism. Not only does it have a rotating massager for the balls of your feet, but it also has an oscillating massager for the arches and another massager for your Achilles heel. Reflexology involves applying light pressure on certain points and areas on your hands and feet. These points are connected to corresponding organs and glands in your body so stimulating them helps regulate and improve their function.
Auto Programs - While there are times when we want the benefits of a customized massage, there are also days when we only have time for a quick and easy massage. You can then just choose among the chair's 6 auto programs, which include Recover, Soothe, Demo, Relax, Shoulders and Neck, and Waist and Spine.
Body Scanning Technology - Some massage chairs are not as precise in terms of hitting all the unique pressure points of your body. However, the Meridian has a body scanning technology that can tailor the massage rollers to your body by properly adjusting them to hit your pressure points.
Quick-Access Controls - Who needs a massage chair that's a challenge to operate? The Meridian makes it easy for you to turn the chair on and off, set it to zero gravity position, change auto programs and more with its wireless remote control located conveniently on the right armrest.
Memory Functions - Everyone has their own needs and preferences when it comes to massage. You can create a custom massage program for yourself and one more person and save them using the chair's two memory function. This way, you can access them quickly next time.
Air Ionizer - Massage is not the only thing that the Meridian can give you. It also makes sure you are taking in healthy oxygen via the small vents on its headrest. It even senses parts per million of air debris and displays them on the remote.
Lumbar Heat - The chair warms and loosens your muscles to better prepare them for massage through the heating modules located at the back.
Bluetooth Speakers - Enjoy your massage even more by playing some relaxing tunes, ambient soundscapes or even guided meditations. You can pair your Bluetooth enabled Apple or Android device to the chair and it will play the music through its own speakers.
USB Charging Station - Do your mobile devices need charging? No need to get up from the chair because it has its own USB charging station conveniently located on the left side beneath the waist airbag. You can charge the chair's remote there as well. | {
"redpajama_set_name": "RedPajamaC4"
} |
Kathleen Murray '16: Driving Ambition
Kathleen Murray '16: Driving Ambition Navigation
Published: July 1, 2016
• by Patrick Granata, M.F.A., '16
Kathleen Murray '16 places high value on the real world experiences she accrued early in her career, all of which concluded with her recent graduate certificate in emergency management.
Twenty-three years into Kathleen Murray's career in emergency management, the hard-earned miles of experience have marked her path to success.
Having worked as an emergency planning coordinator for National Grid since 2009, and having completed her Graduate Certificate in Emergency Management this year, Murray credits her time at Adelphi with further informing her knowledge of the field.
"By going for my graduate certificate, it just opened up my world and my mind to the other aspects of it," she said. She now looks at those other aspects of her work from the perspective of the counties and agencies she deals with rather than viewing them from her own vantage point.
Murray struggled working full time and coming back to school as a nontraditional adult student her first semester, traveling most weeks from Island Park, Long Island, to Massachusetts for work. With the support of her professors and classmates, however, she was able to make it through both her full-time job and her course work.
"My two professors that semester stood by me," Murray said. "They assured me, 'Take a deep breath, and don't quit yet.' Everything worked out at work, and I was able to manage and catch up."
As an older student transitioning back to the college setting, Murray considers the support of her professors and classmates as important to her success. It is exactly those kinds of relationships that Murray deems instrumental for any new college graduate to pursue when entering the workforce.
Murray places high value on the real-world experiences she accrued early in her career. And those include both the good and the bad, encompassing natural disasters such as Hurricane Sandy, which had a profound impact on her interest in and passion for emergency management after the storm destroyed her Long Beach home.
"Life presents a lot of challenges and, when you live through them and learn from the experience, it helps you with your studies and sensibility," she said.
Finding that balance between her desires and talents was key to her academic and professional success, even if for her it came later in life than for some.
"You have to find a job," she said. "It's up to you to get the job done, but if it's not what you want to do, don't force it, you can always go back later in life. You'll get there, it's just that everyone has their own pace." | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Rockets' shoddy defense has Clippers in command of series
By Kurt HelinMay 9, 2015, 12:30 PM EDT
LOS ANGELES — In a pivotal Game 3 Friday night, 54.2 percent of the Clippers shots were open ones. Uncontested. Clean looks.
Due to a combination of lineups and effort, too often the Rockets couldn't or wouldn't get a defender in the way of the shooter. (For comparison, less than 40 percent of the Rockets' shots were uncontested.)
It's been a problem all series — and it's going to end this series quickly if the Rockets don't fix it.
Through three games against the Clippers, the Houston Rockets have allowed 110.6 points per 100 possessions. That's terrible. It's 10.1 worse than Houston gave up in the regular season, when the team was sixth in the league defensively. That 110.6 is one point worse than the league-worst Minnesota Timberwolves gave up on the season.
It's not just this series; the Rockets didn't defend the Mavericks well either in the first round. Throughout the playoffs, they have allowed 107.8 points per 100 possessions. It's just in the first round they could outscore Dallas.
The Clipper offense is carving up Rockets — particularly in transition. But honestly just about all the time they can get the shots they want — Jason Terry cannot hang with J.J. Redick, and pairing Terry and James Harden has been a defensive disaster. Harden is showing the habits of his old, poor defense self (after a season where he put out a good effort on that end of the court). Terrence Jones has missed assignments. There are more problems — too many for Dwight Howard to clean up (he's played well). This is more than missing Patrick Beverley (the Rockets' defense was statistically better with him on the bench during the regular season). The Rockets' defense is the main reason the Clippers are ahead two games to one and appear in total control of this second round series.
"We've had one good defensive half so far," Rockets coach Kevin McHale said after Friday night's Game 3 loss. "That was the second half of the second game. But other than that we haven't gotten anything."
And the Clippers have gotten pretty much everything they wanted.
That successful half the Rockets had came with Trevor Ariza fronting Blake Griffin in the post with help (usually Dwight Howard) behind to kill the lob. It was a good strategy, but the Clippers didn't show any counters Wednesday night, often keeping the ball on one side of the court.
That changed in Game 3 Friday. Chris Paul is not one to let the ball stick on one side. The Rockets rarely went to the small lineup out of that fear. Then when Clippers players got looks they knocked them down — Austin Rivers and J.J. Redick were a combined 8-of-12 from three.
Houston counts on stops to get themselves out in transition and to get some easy buckets before the defense sets. That did not happen much at all Friday night — the Rockets went against set defenses all night long and did okay, but not great, scoring against them.
On the other side, Houston's poor offensive choices at times have fueled easy Clippers buckets going the other way because the Rockets have been so bad in transition defense. That was especially true in the ugliest defensive stretch of the series for Houston, the Clippers' 23-0 run later in the third quarter when Los Angeles blew the game open.
"We didn't play much defense at that point," McHale said. "They made a few shots on us, we had a couple turnovers during that stretch, and you know they were running, we weren't getting back. We played very poorly during that stretch, needless to say….
"Our turnovers, they ran off it, and you know, we did not. We did not do a good job of handling the pressure., all the things that came out with that little bit of a run. We just let go of the rope, and they piled on us."
That has to be the most concerning thing Kevin McHale — when punched in the mouth, the Rockets folded. They let go of the rope. They showed no heart. Use whatever cliche you want for the Rockets' becoming demoralized and rolling over once the Clippers get going. That's not how McHale played in his Celtics days, but his Rockets' have different leadership in the locker room than those legendary teams.
If the Clippers jump out to an early lead in Game 4, what happens to Houston?
But even the early lead may not matter. If the Rockets don't figure out how to get consistent stops — and that will not be easy against the best regular season offense in the NBA — this series will be over sooner rather than later. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Step into the shoes of Eike, a man with the ability to travel through time. With this power, you must travel through changing time periods and use clues from the past to prevent your own murder. The actions you take affect your story path, resulting in one of multiple endings. Once you unravel the mystery in nine chapters, you can experience additional scenes. With multiple story paths and a variety of puzzles, Shadow of Destiny puts your dire fate into your own hands. | {
"redpajama_set_name": "RedPajamaC4"
} |
Call Of Duty News
Call of Duty Modern Warfare 2 Season 2 will Bring Back Resurgence
Call of Duty: Modern Warfare 2 was initially scheduled to be launched on February 1st. However, rumors started floating around suggesting a delayed release date. The Call of Duty team has now put out a statement to address these rumors. Call of Duty has officially confirmed that the Season 2 of Modern Warfare 2[…]
Call of Duty: Modern Warfare 2 was initially scheduled to be launched on February 1st. However, rumors started floating around about a delayed release date. The Call of Duty team has now put out a statement to address these rumors.
Call of Duty has officially confirmed that the Season 2 of Modern Warfare 2 and Warzone 2 will be launched on February 15th.
Season 02 will be launching on February 15. Stay tuned for additional intel. pic.twitter.com/G80TiutG62
— Call of Duty (@CallofDuty) January 18, 2023
The announcement also revealed that Season 2 will feature Ranked Play, a new small map, and the return of Resurgence, along with several other new additions.
The Ranked Play mode of Modern Warfare 2 will follow the 4v4 format, and all the rules, maps, and modes that are usually seen in Call of Duty games.
There are also rumors hinting at the comeback of other popular gameplay modes such as Plunder and Cranked. Although they are not included in the official statement, Activision might reintroduce them later in Season 2.
Call of Duty: Modern Warfare 2 | Source: Call of Duty
A previous leak claimed Warcom Operator Daniel 'Ronin' Shinoda and the Castle map, both remastered for Call of Duty: Vanguard, will be coming in Season 2.
Despite the initial blunders, Call of Duty: Modern Warfare 2 has had a tremendous climb to success. It quickly surpassed millions of users just within the matter of a week. Just recently, Modern Warfare 2 beat Elden Ring to become the best-selling game of 2022.
Does Call of Duty: Warzone 2 Have a Field of View (FOV) Slider
Get Call of Duty: Modern Warfare 2 on:
Get Call of Duty: Modern Warfare 2 On Microsoft Store
Get Call of Duty: Modern Warfare 2 On Steam
Categories Categories: Call Of Duty, News
Tags Call Of Duty, PS 4, PS 5, Windows, Xbox one
By Gaming Dope Staff
← HBO's The Last of Us is a Must Watch video game adaptation → Easy Guide to Play the Infamous series in Order – What to play first? | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The incredible facial accessories flowed into the our sources newsroom in all shapes and sizes for our Movember Moustache Photo Contest … so click through these bristly pics and live vicariously through the proud owners of the facial fuzz.
Be sure to check back on Monday to vote for which moustache picture should score the $250 prize and some super-wicked-awesome gifts from our sources!
's Movember Moustache Photo Contest — Enter To WIN!
's Annual Shock-toberfest Contest — Enter to Win! | {
"redpajama_set_name": "RedPajamaC4"
} |
This year we are proud to mark the 50th anniversary of our iconic building. To help us celebrate we have created a Memory Chair in which visitors can take a seat and share with us their favourite memories of visiting Nottingham Playhouse. The chair is situated on our upstairs foyer until 31 May 2013 and has its own special 'room' complete with a camera, for visitors to record a short video of their highlights from the Playhouse. There's also a desk, pens and paper for you to write or draw your memories and experiences of the theatre.
We will be sharing the memories we collect on our website and social media channels over the course of this year. You can also share your memories with us via the comments section below. We will be choosing our favourite one at the end of 2013, who will go on to win a personalised Nottingham Playhouse seat plaque, so don't forget to leave us your contact details!
I arrived in Nottingham to study classics in September 1963. My route into the city was along the Derby Road. On Fridays the bus stopped outside the Albert Hotel, which had the best selection of beers in town. On Sundays it was the same route for evening mass at St Barnabas' Cathedral.
The arrival of the Playhouse in close proximity to the Albert and Cathedral went largely unnoticed until John Neville's marvellous Oedipus the King. in the autumn of 1984. Sophocles was a set author that year at university, and this performance breathed life into one of the greatest tragedies ever written. I think every student who witnessed this play regretted that it was not possible to see each one of our set plays in live performance. As a teacher in Newcastle-under-Lyme, I taught the daughter of the late Peter Cheeseman, who made a massive contribution to 'theatre in the round' at the Victoria Theatre. After telling him about the impact of Neville's Oedipus at a parents' evening, he put on Plautus' Comedy of Errors just before the move to the new site in Basford, because he felt the experience would be beneficial to the development of the repertory company. The schools from a wide radius just could not believe their luck.
My own home town had no professional theatre, so the medium of live drama was relatively new to me, but Neville, who came to the city from the London stage, left a deep impression on many. The entire company at the Playhouse was indeed fortunate to work with a relatively unheralded master of his art.
My final positive about my Playhouse experience was the theatre's proximity to the every student's final port of call in the 60s, the Salutation Inn, and the late night bus back to campus.
It was great to relive the past at a performance of Richard III earlier this (November), and the Cathedral was in the same place, but sadly the Albert had disappeared with the development of Derby Road and Wellington Circus. | {
"redpajama_set_name": "RedPajamaC4"
} |
Pandemic Letter 3 – Anzac Day (25/04/2020)
My great Uncle Tom Travers joined the army at the outbreak of the First World War. He did not take to army discipline, and was in trouble at various times. Uncle Tom was born at Eurowrie, on the Silver City Highway, 60 miles north of Broken Hill. He left school at 14, like most children those days. He worked as a carpenter with his father, who built houses for miners in the north-west corner of New South Wales. Uncle Tom had been a champion boxer. Uncle Tom fought at Gallipoli in 1915.
At some stage it was suggested that Uncle Tom attempted to desert – or more specifically, he was found on a train heading away from the front line. Later, in 1917 Uncle Tom was shot at least twice, in the right wrist and the right arm, while fighting in the trenches in northern France. Uncle Tom, despite his contempt for authority, was promoted to Sergeant on the battlefields of France. Uncle Tom's citation for the Military Medal stated that he showed outstanding courage and gallantry under fire.
My father recalls Uncle Tom as a giant of a man, who never spoke of his war experiences, but found it difficult to settle down. Uncle Tom lived most of his life after the First World War in Broken Hill, and Mt Isa, working as a carpenter. Uncle Tom was a likeable and adventurous man, much loved by his family. He was a serious drinker, something which Grandma Travers could not abide – which is, perhaps, why he went to Mt Isa. According to my father, Uncle Tom was a larrikin but did his duty.
John Curtin
John Curtin was Prime Minister of Australia from 1941 until his death in 1945. The attack on Pearl Harbour occurred two months after Curtin became Prime Minister followed by Japanese bombing of Darwin. Curtin placed Australian forces under the command of American General Douglas Macarthur. Forever, Curtin changed Australian defence and foreign policy with his 1942 New Year's message:
Without any inhibitions of any kind, I make it clear that Australia looks to America, free of any pangs as to our traditional links or kinship with the United Kingdom. We know the problems that the United Kingdom faces. We know the dangers of dispersal of strength, but we know too, that Australia can go and Britain can still hold on. We are, therefore, determined that Australia shall not go, and we shall exert all our energies towards the shaping of a plan, with the United States as its keystone, which will give to our country some confidence of being able to hold out until the tide of battle swings against the enemy.
Curtin was, at first glance, an unpromising Prime Minister – a militant anti-conscriptionist in the First World War; a one-time supporter of the Victorian Socialist Party, a Marxist outfit; suffering the physical and psychiatric consequences of long-time alcoholism. Yet he had long years of union and political experience.And Curtin stopped drinking. Apart from leading the war effort, Curtin laid the foundation of Australian independence with the Statute of Westminster Adoption Act 1942, and expanded the availability of social security to Australians and their families. Arguably Curtin is Australia's greatest prime minister.
With the fall of Neville Chamberlain in 1940, Churchill became Prime Minister of Great Britain. Europe had largely fallen to the Nazis. The evacuation at Dunkirk was a sort of victory as the rag tag fishing boats and yachts captained by amateurs returned British servicemen to safety in England. About this time Churchill gave his most memorable speech in the House of Commons:
Let us brace ourselves to our duties, and so bear ourselves that, if the British Empire and its Commonwealth last for a thousand years, men will still say, 'This was their finest hour'.
The Battle of Britain over English skies was a disaster for Londoners, but a triumph of English resilience despite the odds.
There have been various criticisms of Churchill's leadership – he attacked the French fleet in Algeria to prevent it falling into German hands, with loss of lives of 1300 French sailors; he expended, arguably, excessive resources on the Mediterranean campaign; he delayed the D-Day invasion; he could have done more, having regard to available intelligence from Bletchley Park, to prevent German bombing of the cathedral city of Coventry; at Yalta he gave in to Stalin, imposing an Iron Curtain on eastern Europe; he ought not have ordered bombing of the German cities of Dresden and Hamburg; he gave insufficient consideration to resisting Japanese advances in the Pacific, and the defence of Australia. Yet Churchill's dogged resistance to totalitarianism makes him arguably the most important world political figure in the twentieth century.
Where would we have been?
Uncle Tom Travers, John Curtin, and Sir Winston Churchill each had their flaws, but each matured in war. We can admire and honour them for their courage, for their prudence, for their self-sacrifice – and we can acknowledge that we are forever in their debt.
If Sir Winston Churchill had not stood alone against Adolf Hitler in 1940, where we would be today? While it may be argued that the Second World War did not end until 1989 with the collapse of communist tyranny in Eastern Europe, we should especially honour Sir Winston Churchill, the Londoners who withstood the Blitz, and the people of Great Britain, because they stood alone when it seemed that the whole of Europe had succumbed to tyranny, – and when the United States stood back.
If the United States had not come to Australia's rescue in 1942, where would we be today? If the Battle of the Coral Sea (1942), and the Battle of Midway (1942) had not been fought by the United States, where would we be today? Those were the sea battles which turned the war against Japan. If the United States had not eventually resisted Soviet encroachment in eastern Europe where would we be today?
Ultimately, the Iron Curtain came down, but not until 1989, as a result of the efforts of the US President Ronald Reagan, Soviet President Mikhail Gorbachev, and, perhaps, most importantly, Pope St John Paul II. If the United States had not come to Australia's rescue in 1942, where would we be today?
If John Curtin had not resisted Japanese aggression in 1942 and following, where would we be today? If Australian soldiers had not fought and died in the jungle of Kokoda, where would we be today?
We might also say, if Australia had not put aside old hatreds, old grievances after the war with Japan, where would we be today?
ANZAC Day is a tradition which originates with the unsuccessful landings of the British forces at Gallipoli on 25 April 1915, intended to capture the Gallipoli Peninsula, open the way to the Black Sea, and enable the conquest of Constantinople. The Ottoman forces were led by Mustafa Kemal (later known as Attaturk), the founder of modern Turkey, who had this to say:
Those heroes that shed their blood
And lost their lives
You are now lying in the soil of a friendly country.
Therefore rest in peace.
There is no difference between the Johnnies and the Mehmets to us where they lie side by side
Here in this country of ours.
You, the mothers who sent their sons from faraway countries,
Wipe away your tears,
Your sons are now lying in our bosom
And are in peace
After having lost their lives on this land they have
Become our sons as well.
Amongst the traditions of ANZAC Day are the Gunfire Breakfast after the Dawn Services, involving the drinking of coffee loaded with rum, the playing of two-up, and Australian Rules, and Rugby League. Although there will be no March this year, because of the coronavirus pandemic, the ANZAC tradition will not be lost.
Australians at War
Australians have fought in many wars including:
the Sudan War (1885),
the Boer War (1899-1902),
the Boxer Rebellion (1900-1901),
the First World War (1914-18),
the Russian Civil War (1918-19),
the Second World War (1939-45)
the Korean War (1950-53),
the Malayan Emergency (1950-60),
the Indonesia-Malaysia Confrontation (1962-66),
the Vietnam War (1962-73),
the Gulf War (1991),
East Timor (1999-2013),
Afghanistan (2001 and on),
Iraq (2003-11).
Each of these wars can be considered, historically and ethically, from the perspective of time, more or less, long past. While doing so, we honour the combatants on both sides for their courage, and remember also the people of the countries where those wars were fought. No doubt they were persons of their times. But who is not?
The Commandment – thou shalt not kill – is an injunction against anger and hatred. As the Catechism says, anger involves a desire for revenge. "Everyone who is angry with his brother shall be liable to judgment" (Mt 5:22). Hatred deliberately wishes harm to one's neighbour. "But I say to you, love your enemies and pray for those who persecute you, so that you may be sons of your Father who is in heaven" (Mt 5:44-45).
Respect for human life requires peace. Peace is not merely the absence of war, nor a balance of power between adversaries. Peace cannot be attained without respect for persons, and respect for the dignity of persons and peoples. Peace is the work of justice and the effect of charity. Earthly peace is the image and fruit of the peace of Christ. By his suffering and death, Christ reconciled us with God, and made his Church the sacrament of the unity of humanity, and of its union with God. Christ is our peace. Blessed are the peacemakers (Mt 5:9). We are urged to prayer and action so that God may free us from war. All citizens and governments are obliged to work for the avoidance of war, for peace.
As long as there is no international authority with appropriate competence and power, governments cannot be denied the right of lawful self-defence, once all peace efforts have failed. The strict conditions for legitimate defence by military force require at one and the same time:
The damage inflicted by the aggressor must be lasting, grave and certain (lasting, grave and certain damage).
All other means of putting an end to the aggression must be impractical or ineffective (no other means).
There must be serious prospects of success (reasonable prospects).
The use of arms must not produce evils and disorders graver than the evil to be eliminated (proportionality).
The evaluation of these conditions for the legitimacy of war belongs to the prudential judgment of those who have responsibility for the common good.
Those who serve their country in the armed forces are the servants of the security and freedom of nations. If they carry out their duty honourably, they contribute to the common good of the nation and the maintenance of peace. The same may be said of leaders in wartime who are required to exercise leadership in difficult circumstances.
Not Everything Justified
The mere fact that war has regrettably broken out does not mean that everything becomes licit between warring parties. All is not fair in in war. Non-combatants, wounded soldiers, and prisoners must be respected and treated humanely. Actions deliberately contrary to the law of nations and its universal principles are crimes, as are orders that command such action. Blind obedience does not justify actions contrary to the natural law. Thus, the extermination of a people, nation or ethnic minority is a mortal sin. One is morally bound to resist orders that command genocide.
Mass Destruction
Every act directed to the indiscriminate destruction of whole cities or vast areas with their inhabitants is a crime against God and man, which merits firm and unequivocal condemnation. A danger of modern warfare is that it provides the opportunity to those who possess modern scientific weapons – especially atomic, biological or chemical weapons – to commit such crimes.
Arms Race
The arms race does not ensure peace. Far from eliminating the causes of war, it risks aggravating the causes of war. Spending enormous sums to produce ever new types of weapons impedes efforts to aid needy populations. Over-armament multiplies reasons for conflict and increases the danger of escalation. The production and sale of arms affects the common good of nations and of the international community. Public authority has the right and duty to regulate the production and sale of arms. Short-term pursuit of private or collective interests does not legitimate violence and conflict among nations and compromise of international legal order.
Honour, Respect and Admiration
One does not have to form a conclusive judgment on every war in which Australians have fought, on every Australian action, to honour, respect and pray for Australian servicemen, and indeed for the combatants against whom they fought, and for the peoples of the lands in which they fought. We remember with honour, respect and admiration Uncle Tom Travers, Prime Minister John Curtin, and Sir Winston Churchill – and the ANZACS and the Turkish soldiers against whom the ANZACS fought at Gallipoli – and all Australian combatants, as well those against whom they fought – and pray for peace. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
We don't recommend flying with any bike in a soft bag, but frequent flyer, Aidan Prior, who regularly uses soft bags for transporting his bikes, has found an interesting way of flying with his Helios in a surfboard bag.
By removing the front wheel, seat posts and pedals, his Helios fits into the Komunity Project surfboard bag and weighs around 20kg all up (Aidan's Helios is a hub gear geared heavy duty bike, so a bit less for some models). There is also the issue of maximum lengths, but BA, with whom Aidan is flying, and various others have a limit of 190cm which is almost exactly at the limit. | {
"redpajama_set_name": "RedPajamaC4"
} |
Pip is encouraging us to share our faves again - #5 - I love this made from scratch boys tie and am wondering what the chances might be that I could actually get cj to wear one.
#3 - turns out lulu has been going around and picking up scraps of fabric while I'm sewing and squirrels them away in a bag. When I asked why, she said "FOR ART"
So huzzah for bags of fabric!
#2 - thimbles - I have started to hand quilt the mostly french general quilt and my fingers would be a wreck without these little lovelies.
#1 - Kinder Surprise eggs. Can someone please tell me why these are NOT available in the US? They are always filled with the cutest toys. When the spouse heads off to some foreign land, lulu requests these.
Here's what I'm up to today - finishing up the ties on this one. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Birational Variety Given a polynomial map $f:\mathbb{R}^2\to V\subset \mathbb{R}^3 $ defined as follows:
$$
(z_1,z_2)\mapsto (2z_1-z_2, 2z_1^2-z_2^2, 2z_1^3-z_2^3)
$$
This map defines a Variety ($V$) of dimension $2$ in $\mathbb{R}^3$. Is this variety bi-rationally equivalent to $\mathbb{R}^2$?
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
/*
*.intro: A simple dump program for dynamic ELF executables.
*
* This program was thrown together in order to extract some information
* from ELF executables. It should not be take as an example of good
* style.
*/
#include <stdio.h> /* fprintf, sprintf */
#include <stdlib.h> /* EXIT_SUCCESS, EXIT_FAILURE */
#include <sys/types.h> /* waitpid, open */
#include <fcntl.h> /* O_RDONLY */
#include <assert.h> /* assert */
#include <sys/stat.h> /* stat */
#include <unistd.h> /* read, stat */
#include <errno.h> /* errno */
#include <string.h> /* strerror */
#include <elf.h>
static int fd;
static char const *program_name;
static char const *elf_file_name;
static char *file_contents;
static char **symbol_names;
static Elf32_Shdr *symbol_table_header;
static Elf32_Shdr *hash_table_header;
static Elf32_Shdr *string_table_header;
static Elf32_Shdr *dynamic_table_header;
static Elf32_Shdr *plt_header;
static void usage(void)
{
fprintf(stderr, "%s: executable\n", program_name);
}
static int display_type(Elf32_Half type)
{
switch(type) {
case ET_NONE:
printf(" NONE");
break;
case ET_REL:
printf(" relocatable");
break;
case ET_EXEC:
printf("executable");
break;
case ET_DYN:
printf("shared object");
break;
case ET_CORE:
printf("core");
break;
case ET_LOPROC:
printf("processor specific LO type");
break;
case ET_HIPROC:
printf("processor specific HI type");
break;
default:
printf("UNKNOWN");
}
return EXIT_SUCCESS;
}
static char const *locate_section_header_string(Elf32_Word name)
{
const Elf32_Ehdr *h = (Elf32_Ehdr *)file_contents;
const Elf32_Shdr *shs = (Elf32_Shdr *)&file_contents[h->e_shoff];
const Elf32_Shdr *sh = &shs[h->e_shstrndx];
if (h->e_shstrndx == 0) {
return "NONE";
} else {
const char *st = &file_contents[sh->sh_offset];
return &st[name];
}
}
static void locate_table_headers(void)
{
Elf32_Ehdr * h = (Elf32_Ehdr *)file_contents;
size_t max = h->e_shnum;
size_t n;
for (n = 1; n < max; n += 1) {
Elf32_Shdr * sh = (Elf32_Shdr *)&file_contents[h->e_shoff+n*h->e_shentsize];
const char *name = locate_section_header_string(sh->sh_name);
printf("TYPE %d NAME %s o %u\n", sh->sh_type, name, sh->sh_offset);
switch (sh->sh_type) {
case SHT_HASH:
// sh->sh_link is index of symbol table.
assert(sh->sh_link <= h->e_shnum);
printf("HASHTAB %u\n", n);
symbol_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff + sh->sh_link*h->e_shentsize];
printf("SYMTAB %d\n", sh->sh_link);
hash_table_header = sh;
assert(symbol_table_header->sh_link <= h->e_shnum);
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
printf("STRTAB %d\n", symbol_table_header->sh_link);
return;
case SHT_SYMTAB:
// sh->sh_link is index of string table.
if (!symbol_table_header) {
symbol_table_header = sh;
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
}
break;
case SHT_DYNSYM:
// sh->sh_link is index of string table.
symbol_table_header = sh;
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
break;
case SHT_STRTAB:
if (!string_table_header)
string_table_header = sh;
break;
case SHT_PROGBITS:
if (strcmp(name, ".plt") == 0)
plt_header = sh;
break;
case SHT_DYNAMIC:
dynamic_table_header = sh;
break;
}
}
}
static char const * locate_string(Elf32_Word name)
{
char const * string;
static char const * string_table;
assert(string_table_header);
string_table= &file_contents[string_table_header->sh_offset];
assert(name < string_table_header->sh_size);
string= &string_table[name];
assert(string);
return string;
}
static unsigned long elf_hash(const char *name)
{
const unsigned char *n = (const unsigned char *)name;
unsigned long h = 0, g;
while (*n != 0) {
h = (h<<4) + *n++;
if ((g= h&0xf0000000) != 0) {
h ^= g>>24;
h ^= g;
}
}
return h;
}
static int display_symbols(void)
{
for (; *symbol_names; symbol_names+=1) {
printf("XXX %s=%lu\n", *symbol_names,
elf_hash(*symbol_names));
}
return EXIT_SUCCESS;
}
static int display_symbol_table(void)
{
Elf32_Sym * symbol;
size_t n;
size_t i;
size_t func = 1;
if (!symbol_table_header)
return EXIT_SUCCESS;
symbol= (Elf32_Sym *)&file_contents[symbol_table_header->sh_offset];
n= symbol_table_header->sh_size;
assert(n%sizeof(Elf32_Sym) == 0);
printf("SYMSIZE= %d, %x\n", sizeof(Elf32_Sym), sizeof(Elf32_Sym));
for (i= 1; n != 0; n-=sizeof(Elf32_Sym), i+=1, symbol+=1) {
printf("SYM%u (%p) name=%u (%s), addr=%x, size=%u, bind=%u, type=%u, other=%x, shndx=%u\n",
i, symbol, symbol->st_name,
locate_string(symbol->st_name),
symbol->st_value,
symbol->st_size,
(unsigned int)ELF32_ST_BIND(symbol->st_info),
(unsigned int)ELF32_ST_TYPE(symbol->st_info),
(unsigned int)symbol->st_other,
symbol->st_shndx);
if (ELF32_ST_TYPE(symbol->st_info) == STT_FUNC) {
if ((symbol->st_value == 0) && plt_header) {
printf("PLT addr %x\n", plt_header->sh_addr + func*plt_header->sh_addralign);
}
func += 1;
}
}
return EXIT_SUCCESS;
}
static int display_dynamic_table(void)
{
Elf32_Dyn *d;
size_t n;
size_t i;
if (!dynamic_table_header)
return EXIT_SUCCESS;
d = (Elf32_Dyn *)&file_contents[dynamic_table_header->sh_offset];
n = dynamic_table_header->sh_size;
assert(sizeof(*d) == dynamic_table_header->sh_entsize);
assert(n%sizeof(*d) == 0);
for (i = 1; n != 0; n -= sizeof(*d), i += 1, d += 1) {
printf("DYN%u tag %u val %u %x\n", i, d->d_tag, d->d_un.d_val, d->d_un.d_val);
}
return EXIT_SUCCESS;
}
static int display_section_headers(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
if (h->e_shoff == 0) {
} else {
size_t max= h->e_shnum;
size_t n;
for (n= 1; n < max; n += 1) {
Elf32_Shdr * sh= (Elf32_Shdr *)&file_contents[h->e_shoff+n*h->e_shentsize];
printf("S%u sh_name= %u (%s)\n", n, sh->sh_name, locate_section_header_string(sh->sh_name));
printf("S%u sh_type= %u\n", n, sh->sh_type);
printf("S%u sh_flags= %x\n", n, sh->sh_flags);
printf("S%u sh_addr= %x\n", n, sh->sh_addr);
printf("S%u sh_offset= %u\n", n, sh->sh_offset);
printf("S%u sh_size= %u\n", n, sh->sh_size);
printf("S%u sh_link= %u\n", n, sh->sh_link);
printf("S%u sh_info= %u\n", n, sh->sh_info);
printf("S%u sh_addralign= %x\n", n, sh->sh_addralign);
printf("S%u sh_entsize= %u\n", n, sh->sh_entsize);
}
}
return EXIT_SUCCESS;
}
static int display_program_headers(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
if (h->e_phoff == 0) {
} else {
size_t max= h->e_phnum;
size_t n;
for (n= 0; n < max; n += 1) {
Elf32_Phdr * ph= (Elf32_Phdr *)&file_contents[h->e_phoff+n*h->e_phentsize];
printf("P%u type %u ", n, ph->p_type);
printf("offset %u ", ph->p_offset);
printf("vaddr %x ", ph->p_vaddr);
printf("filesz %u ", ph->p_filesz);
printf("memsz %u ", ph->p_memsz);
printf("flags %x ", ph->p_flags);
printf("align %x\n", ph->p_align);
}
}
return EXIT_SUCCESS;
}
static int display_header(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
printf("E type= %d (", h->e_type);
display_type(h->e_type); printf(")\n");
printf("E phentsize= %u\n", h->e_phentsize);
printf("E phnum= %u\n", h->e_phnum);
printf("E shentsize= %u\n", h->e_shentsize);
printf("E shnum= %u\n", h->e_shnum);
printf("E shstrndx= %u\n", h->e_shstrndx);
return EXIT_SUCCESS;
}
static int debug(void)
{
struct stat st;
if ((fd= open(elf_file_name, O_RDONLY)) < 0) {
fprintf(stderr, "%s: could not open %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_open_executable;
}
if (fstat(fd, &st) < 0) {
fprintf(stderr, "%s: could not determine size of %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_stat_file;
}
if ((file_contents= malloc(st.st_size)) == (void *)0) {
fprintf(stderr, "%s: could not malloc due to %s\n", program_name, strerror(errno));
goto could_not_malloc;
}
if (read(fd, file_contents, st.st_size) != st.st_size) {
fprintf(stderr, "%s: could not read %s header due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_read_file;
}
if (display_header () == EXIT_FAILURE)
goto could_not_display_header;
locate_table_headers();
if (display_program_headers() == EXIT_FAILURE)
goto could_not_display_program_headers;
if (display_section_headers() == EXIT_FAILURE)
goto could_not_display_section_headers;
if (display_symbol_table() == EXIT_FAILURE)
goto could_not_display_symbol_table;
if (display_dynamic_table() == EXIT_FAILURE)
goto could_not_display_dynamic_table;
if (display_symbols() == EXIT_FAILURE)
goto could_not_display_symbols;
free(file_contents);
if ((fd= close(fd)) < 0) {
fprintf(stderr, "%s: could not close %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_close_executable;
}
return EXIT_SUCCESS;
could_not_display_symbols:
could_not_display_dynamic_table:
could_not_display_symbol_table:
could_not_display_section_headers:
could_not_display_program_headers:
could_not_display_header:
could_not_read_file:
could_not_malloc:
free(file_contents);
could_not_stat_file:
(void)close(fd);
could_not_open_executable:
could_not_close_executable:
return EXIT_FAILURE;
}
int main(int argc, char **argv)
{
program_name= argv[0];
while (++argv, --argc != 0 && argv[0][0] == '-') {
switch(argv[0][1]) {
default:
usage();
return EXIT_FAILURE;
}
}
if (argc == 0) {
usage();
return EXIT_FAILURE;
}
elf_file_name = argv[0];
symbol_names = argv+1;
return debug();
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
Heated seats are a good addition to your car if you want to stay cozy when the cold weather comes in. They warm you up fast, and they can sometimes be good for your back and shoulders if you have joint pain. If you are just trying to use your seat covers to keep cozy in the wintertime, then you need to pick a seat cover that warms up faster than your heater. After all, if your heated seat cushion starts to get hot once everything around you is already heating up, then there is really no point in having the heated seat cushion at all. If you live somewhere with extremely variable temperatures, then you should consider a heated seat cover that allows you to adjust the temperature.
With the right heated seat covers in your car, you will not need an expensive luxury car in order to stay warm and comfortable during the winter. Alternatively, you might not care about the cold weather, but you still want to consider picking out a heated seat cover anyway because some cushions have the added benefit of giving you massages or keeping your metabolism balanced. Whatever the reason you want a heated seat cover, when purchasing a cushion, you also want to keep in mind how well it will fit on your seat. Therefore, you may want to ensure that the seat cover has straps to prevent it from falling off or you may decide that you need a cushion that comes in a very specific color that you think would look good in your car. In order to pick the right seat cover for you, you need to figure out what your needs are. You just have to make sure you choose to buy the right quality seat cover that will work best for you.
The Five S is a massage cushion. It is designed to support and comfort many different zones on your body. It provides both heat and vibration massages when you are in the car. However, if you enjoy it, then you can definitely take it inside and use it whenever you want.
This heated seat cushion covers the entire seat in your car in order to soothe as many regions of your body as possible. These regions include the joints and muscles in your back, shoulders, neck, and thighs.
You can adjust the massager.
You may have different preferences for the speed, intensity, and location of your vibration massage. This seat cover has many different options for massages with four massage programs and three-speed settings.
It costs slightly on the pricey side. However, it is relatively cheap for a massage seat that is designed for your home. Additionally, the quality of the seat is very good, and it will probably last you a long time before it breaks. If it does break, it has a three-year warranty.
The Zone Tech seat cover is primarily designed for cold weather, but the heat can still soothe any of the sore muscles in your thighs. It will get your blood flowing because it works fast.
You can pick a heat setting.
There are multiple heat settings on this heated car seat cover. Therefore, the Zone Tech will work if you live in an area that might experience varying temperatures during the winter time.
The straps prevent it from falling over.
The cushion has multiple straps to keep it firmly in place. You can shift around in your seat all you want, but the cushion will always stay attached to the seat.
It costs actually relatively cheap, but you do not have to worry that you are buying a poor quality product. It will consistently work faster than your heater, and it is designed to last for a long time.
This heated car seat cushion reaches a very high maximum temperature to keep you warm if the weather is cold. It also provides lumbar back support, which makes it feel extremely comfortable in any temperature.
It has a maximum temperature of 114 degrees F.
114 degrees F (45.6 degrees C) is pretty hot, so this cushion will definitely keep you nice and toasty. If that is too warm for you, then you can choose the lower temperature setting, which heats up more slowly and will only reach 114 degrees if you leave it on for several hours.
It is designed to fit in any car.
The universal fit construction of the Wagan IN9438 means that it will probably fit in any car, regardless of the size and shape of your seats. It also comes in more than one size, so you can ensure that this seat will definitely fit.
Wagan is considered pretty high quality and reputable brand for car gear. However, this cushion still only costs somewhere around $20-$23, depending on the size that you choose.
This seat gets extremely hot, which is why it is primarily designed for keeping you warm in the coldest of winters. Its material and design will also make sure your muscles do not cramp or get sore during longer drives.
The AUDEW heated seat cover might have a maximum temperature of 140 degrees F (60 degrees C). However, you never have to worry about getting burned. The cushion has a cooling system in place that prevents overheating, so it will never get too hot.
The heat delivery is even and consistent.
The seat is designed so that heat is never overly targeted at one region of your body. Inside the seat, there is carbon fiber wiring that is arranged in a way to deliver fast, consistent, and even heat.
This heated car seat cover costs a reasonable price for a winter seat heater with a high-quality design that can also work to soothe joint pain during long drives.
As the name of the product might suggest, this heated seat cushion is another seat cover designed to primarily ease any joint and muscle pain that you might be experiencing while you drive.
It offers a lot of support.
The Relaxzen has a thick and padded neck rest. It also has more support around your lower back. The padding in the support is made from memory foam so that it will take the perfect shape for your body.
There are a lot of massage settings.
With ten different vibrators spread throughout the seat, you can probably find a massage setting that suits you best. After all, there are five different massage programs that differ in location, speed, and intensity.
This seat cushion is cheaper than the older model of this same chair, but it is still relatively expensive. However, the quality of the product is very good with its well-placed motors and heaters.
In order to relieve some of your joint and muscle tension and pain, this massage seat cushion is for providing your back, shoulder, and thighs with heat and massage therapy while you sit.
It has a lot of variety.
With this heated massage chair, you can get a gentle heated massage, a deep penetrating massage, or anything in between in order to relieve your stress. It has eight different patterns, so it will be easy to find an option that matches your preference.
It covers six zones in your body.
The Gideon Massager can give you pain relief at many points in your back and legs. The zones that it covers include multiple regions of your back, neck, shoulders, and thighs.
Because of all the variety, this seat cover is relatively expensive. However, it is an effective way to get rid of stress and tension in your muscle, and the heat works well to warm up your lower back.
The design of this chair will make sure that your muscles and tissues stay nice and warm as the rolling balls inside the chair provide your muscles with therapy that will ease any pains in and around your back.
The massage motion resembles the hand motions used in a real massage.
The rotation of the rolling balls in the chair mimic the rotation of a true massage in order to give your muscles a deep massage on three different zones of your back.
The massage nodes are flexible.
You can move the nodes around so that they fit comfortably around your body. There is also a spot massage option if you want everything to be focused in one area.
Since this seat is essentially a shiatsu massage chair, this chair is definitely on the expensive side. However, it is still reasonable to consider it provides extreme comfort and high-quality heating units.
This thin heated seat cushion has a wide range of temperature settings to keep you warm when the weather gets cold. It also comes with multiple timer settings to make sure that it eventually turns off.
There are three temperature settings.
There are two warm temperature settings at 86 degrees F (30 degrees C) and at 140 degrees F (60 degrees C). There is also a cooler option at 37 degrees F (3 degrees C).
It has an "intelligence" temperature controller.
You can set the temperature at one of the three temperature settings. Once it gets too hot, it will shut off. However, it will start up again when it senses that your car is getting too cold again.
The cost of this heated seat cushion is definitely somewhat more expensive than some other heating options because of all the different temperature settings that the Kingletting provides.
Made with a comfortable polyester design, the Sojoy SJ154A seat cover is a car heated seat cover that will heat up your car quickly and will keep you warm in the winter time.
It has a high maximum temperature.
There are two temperature settings on this seat cover. With the high setting, the maximum temperature of this car seat is about 115 degrees F (46 degrees F), so it will definitely keep you cozy.
It comes with a timer.
With the timer, the seat cover will only stay hot for about thirty minutes of driving. After the thirty minutes pass, it will shut off in order to prevent overheating.
This heated seat cover is definitely on the cheaper side. After all, it does not have any added comfort or pain relief features. However, it still works well to ensure that you do not get cold.
The Zento Deals heated seat cover comes as a two-piece set. It works well to heat up quickly in order to keep you nice and warm during the winter time.
It fits in any car.
The design of this heated seat cover specifically allows the cushion to fit nicely on any type of seat. Therefore, it will work in cars, RVs, trucks, and even boats.
You can control the temperature.
There are two temperature settings on this heated seat cover. Therefore, depending on the weather outside and on your personal preferences, you can easily control whether you want to be mildly warm or incredibly toasty.
This product is definitely relatively reasonably priced. You are also likely to get a lot of use out of it because it tends to last a long time.
The bottom line is that there are a lot of heated seat covers across the market that work in both your home and your car. They function to increase the blood circulation throughout your body, which will soothe your joints and keep you warm when the weather starts to get cold. Different covers will have different designs, features, benefits, costs, and levels of quality. By figuring out what your specific heat and chair preferences are, you should be able to find a heated seat cover that will work well for both you and your car or home. You need to make sure that it is safe, that it heats you up nicely, that it fits well on whatever seat you choose to use it on, and that it keeps you comfortable while you are sitting down. While there might be a range of options for you to choose from, it is definitely possible to find the right model for you as long as you know what you are looking for.
Sometimes, there are so many different features in your seat covers that you have to think about that it might be difficult to truly figure out what model might be the right fit for you. In order to evaluate different products, certain criteria must be used. When it comes to purchasing heated seat covers, here are some of the criteria taken into consideration in order to properly rank which ones should be considered the best and which ones are best ignored.
Heated cushions would definitely be somewhat pointless if they did not help you get warm quickly enough. You might not have time to sit around for your cover to set hot. Since most seat cushions can be powered by your car, you also want to make sure that you do not reach your destination before your back starts to get comfortable. The speed is especially important if you are living in a cold area and own a car that has a slow heating unit. You should not be freezing in your car for too long, so car heated seat cushions can help you as long as they heat up fast. The best cushions only take about two minutes to reach their maximum temperature. This speed is definitely incredibly fast, especially considering that some of these cushions have an extremely high maximum temperature, which means you will probably end up turning off the heat function before it reaches this temperature. By turning it off or turning it down relatively quickly, you can save the battery and allow your seat cover to last longer. The lower ranked models might take anywhere between three and twenty minutes to reach the maximum temperature. Twenty minutes might seem like a long time, but you will probably start feeling warm long before the seat cover reaches its maximum temperatures. You will never have to wait longer than five minutes before you start to feel reasonably comfortable.
Everyone has different preferences when it comes to heat. Additionally, the weather might vary where you live, which may affect your temperature preferences. You do not want the heated seat covers to be either too hot or too cold, so it is definitely important for you to be able to have some level of control over how warm you are. Therefore, most of the best products have settings that allow you to adjust the temperature. Most of them only have two temperature settings plus an off switch. However, some of them have more temperature settings than that. Some of them also have certain safety features that will prevent overheating so that your skin does not get burned.
If you want a heated seat cover to stay comfortable in the winter time, it sort of ruins the point if the cushion is uncomfortable. Wires and motors might stick out, which may make it difficult to sit for a long time. Additionally, if you want the heat in order to ease up any joint pain, then uncomfortable covers are definitely a problem. Therefore, the best seat cushions are all designed to keep you comfortable. They should nicely support your back and shoulders, they should not have any hard parts that stick out, and they should be made from a soft material.
Some of the additional features offered in these heated seat covers are important, especially if you are choosing to get a heated seat cover in order to give you pain relief. While heat definitely works for pain relief, massages do too, which is why you want to consider seat covers that offer vibration or shiatsu massages. The massage feature is ideal if it covers multiple regions of your back, neck, shoulders, and thighs. It is also helpful if there are many different types of massage settings so that you can control the speed, location, and intensity.
When the heat is not evenly distributed, it might be more difficult to stay warm. While the best massage covers might only focus on distributing heat to your lower back, they will deliver heat all the way across your lower back. The best-heated seat covers that are not designed specifically for massages will have an even more consistent heat distribution, often delivering heat to both your back and your thighs. Without this even heat distribution, the heating feature might not work as quickly as you would probably like it too.
Whenever you purchase an item, you always want to make sure that you are getting a sufficient amount of use of that item. Otherwise, the purchase may seem as though it was not worth your money. Therefore, you should not choose seat cushions that will not get you through the entire winter. Ideally, heated seat covers should last for several years. Of course, this expectation might not be realistic for some of the cheaper models, but all of the models are constructed so that they can last for a reasonable amount of time-based on its cost. When considering the durability of the seat covers, you may think that the design and quality of the heating and massage units are the most important aspect of the seat cover to consider. However, there are other things you must consider as well. For example, you should pay close attention to the material. The best seat covers are made from materials that are built to withstand the heat that they are effectively conducting.
Evaluating cost is obviously very similar to evaluating durability. However, durability is not the only thing that affects the cost of an item. The number of features in the heated seat covers will also impact how expensive it is. There is definitely a variety when it comes to the price of heated seat covers, but all the best models are within a reasonable price range. The more expensive ones will last a long time, have better massage features, and increased control of temperature and intensity. The cheaper models might have fewer extra features, or they might not last for such a long time.
If your seat cover does not fit well in your seat, then it might not be particularly useful to you. Therefore, adequate extension cords and proper dimensions are both important. Most of the best seat cushions are designed to fit in any car. They also have straps to keep it from moving around. The straps will also be easy to understand because you should not have to stare at complicated diagrams and instruction manuals in order to figure out how to properly set up your heated seat cover.
The aesthetic value may not be the top priority for evaluating heated seat covers, but the appearance was still sometimes taken into consideration. After all, while the way a heated seat cover looks definitely does not affect how well it is going to work, you do not have to be forced to choose a heated seat cover that makes you cringe every time you look at it. It should not look too awkward and too bulky. Therefore, most of the best seat covers simply look like an extension of the chair.
Q: Are car heated seat covers only for the person sitting in the driver's seat?
A: Technically, any car heated seat cover can be used on any seat in the car as long as you have an extension cord or multiple 12V outlets in your car. However, some cushions are definitely specifically designed for the driver's seat. If you are interested in putting car heated seat covers in the passenger's seat or in the back row, then you need to make sure the cord is long enough. Additionally, if the cord comes out of a specific side of the seat, it might be difficult to use on any seat beside the driver's seat. Therefore, you definitely need to do some research on the cord before you use heated seat cushions for other passengers in the car.
Q: Can a seat heater be dangerous?
A: Heated seat covers are obviously a heating product, so there is always a little bit of a chance that they can burn you. Too much exposure to seat covers can result in rashes on your skin, so you definitely cannot overuse it. It might take a while to notice some of the rashes that can occur because they usually appear on the back of different body parts, which is not an area that is necessarily easy for you to see in a mirror. Additionally, any electrical product can sometimes pose as a fire hazard. Therefore, you want to make sure that all visible wiring does not look worn out and you should not leave anything plugged for too long, especially if you are not using it.
Q: Do the massage covers have an option to run the heating feature without the massage feature?
A: Most of the massage seat covers allow you to choose when to turn on the heat, meaning that you do not need to get a massage in order to have the heat turned on. Additionally, you do not need the heat to be on in order to have the massage feature turned on. Both features should run independently.
Q: Can you put seat covers underneath another seat cover?
A: As long as you are making sure that nothing in your car or home that is burning, you can definitely stack seat covers on top of each other. It might not necessarily be an easy task, especially if you chose a rather bulky heated cushion, but it is definitely possible. Putting your heated seat cover underneath another cover might even be a good idea if some of the wires or motors in your heated seat cover are sticking out and making you uncomfortable. It also might be a good idea if you are unhappy with the way it looks on your seat. Of course, the features will not work as well if they are underneath another seat cover. It might not get as warm, and any massage cover will be less powerful.
Q: Does the actual seat material matter?
A: The material of the seat on which you are putting your seat cover can make a tiny bit of a difference. The material of the seat can be especially impactful when it comes to whether or not the seat cover is likely to move around. However, most seat covers are designed to move around as little as possible. The best ones usually come with straps and are made from materials that are likely to generate enough friction to prevent it from shifting around too much. Therefore, while the material of the chair might make a difference, the difference it can make is pretty much negligible, so it probably will not matter, and you should not worry about it.
Q: Will it use up car battery if you accidentally leave it plugged in?
A: The best car heated seat covers probably will not use up car battery if you forget to unplug it when you leave the car. However, some of them might. Additionally, it is always better to unplug the seat covers and turn it off when you are not using it. Even if the battery does not drain, it can still pose as a fire hazard if you keep things plugged in, especially if there are no built-in safety features to prevent fires.
Q: Do you need the massage feature in order to relieve pain?
A: Heat alone can help with any pain that you might be experiencing. You might want to consider finding a heated seat cover that also provides you with massages. Even if you do not have joint pain, you should know that sitting for a long time can cause cramps, so car heated seat covers that provide vibration massages are pretty helpful for long journeys. | {
"redpajama_set_name": "RedPajamaC4"
} |
Berželė es una pequeña localidad en Lituania, la parte centro-norteña de municipio de Kėdainiai, 3 km al sur de villa Surviliškis. Es ubicada no muy lejos desde río Nevėžis, en las orillas de su afluente arroyo Kruostas. Hay el bosque de Kalnaberžė 2 km a oeste de Berželė. Localidad es accesible por una ruta «Kėdainiai-Krekenava-Panevėžys», también hay una ruta local a Dotnuva.
El topónimo «Berželė» construida de palabra «beržas» que en lituano significa abedul. Parece, que este nombre dado porque en las cercanías hay muchos abedules. Una vez, aquí se crecido un gran bosque de abedules por esto muchas localidades fueron nominadas con el nombre asociado con abedules, por ejemplo Kalnaberžė, Šlapeberžė, Beržai, Paberžė así mismo y Berželė.
Referencias
Localidades de Lituania | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Most people think of every detail of our wedding from childhood. The hairstyle we will have, the dress we will wear and how our bouquet will look are just some things we think about. However, actually making these dreams into a reality can be difficult without the right advice.
Practice your walk down the aisle many times on the days leading up to the wedding. Do this at your actual wedding site to make sure you're familiar with the floor there. Your overall flow will be far smoother for your big day.
For more cost-effective weddings, try choosing a date that is atypical to wedding season. Traditionally, weddings take place between May and September. You can expect to pay more if you schedule your wedding during this time. If you need to book during this time, make sure you book far in advance to get the best deal.
When planning your wedding, think about what type of alcohol serving you want, and what type will be the most cost efficient. Open bars are expensive, especially if they're open for a long time. Wedding venues will have different options, such as a limited open bar or a offering fewer options to help keep alcohol costs down.
Purchasing your wedding gown on the internet can be a budget saver, cutting down your costs by hundreds of dollars. Make sure to order early so you have time for alterations if any need to be made. A certain person claims to have spent only $100 or her gown, but had to spend another $200 to get it altered. Keep in mind any additional costs, and include it in your budget.
Don't starve yourself to fit in your wedding dress! Just like an athlete who is training, starving yourself could cause dehydration. You definitely don't want to end up fainting on your big day. Try buying a corset-backed dress that can be taken on or out on your wedding day.
See if your family wants to come for the honeymoon. It can even make it cheaper for everyone if you book more days at some hotels. This allows them to celebrate your wedding with you and have a great vacation afterwards!
Find out if the lights at your reception venue are the type that can be dimmed. While this might seem like a little detail, a lower light for the first dance is always preferable, while you will want things a little brighter during the speeches part of the ceremony. Inquire about details, such as lighting, before you decide on a reception venue.
You don't have to be overwhelmed when planning your wedding, if you take the advice above; you can plan without a lot of anxiety and stress. After all, the planning should be as enjoyable as the event! | {
"redpajama_set_name": "RedPajamaC4"
} |
Cahuenga est la transcription en espagnol de Kawengna, nom d'un village du peuple amérindien des Tongvas, Kawengna signifiant « endroit de la montagne ». Il donne son nom à la vallée qu'il domine et où sera créé en 1886 un domaine baptisé « Hollywood » par ses nouveaux propriétaires. Ce dernier devient une municipalité en 1903 avant de devenir un quartier de Los Angeles en 1910 puis la capitale mondiale du cinéma.
Présentation
Géographie
La vallée de Cahuenga ou le canyon de Cahuenga se situe entre le nord-est du bassin de Los Angeles et le sud-est de la vallée de San Fernando, reliés entre eux par le col de Cahuenga. Plus précisément, il est à la sortie nord d'Hollywood. L'emplacement exact de l'ancien village indien est inconnu.
Historique
En 1886, Harvey Henderson Wilcox et sa femme Daeida Wilcox Beveridge, un couple originaire de l'État du Kansas ayant fait fortune dans l'immobilier, achètent une propriété de dans la vallée de Cahuenga, au nord-est de la ville de Los Angeles, afin d'y mener une nouvelle opération immobilière.
C'est Madame Wilcox qui choisit le nom « Hollywood » pour la propriété, du nom d'une colonie d'immigrants allemands dans l'Ohio.
On parlait de tout et de rien, de la pluie et du beau temps, dans ce train qui roulait à toute vapeur vers Kansas City.- Et comment s'appelle votre ferme ?, s'enquit Mrs Wilcox ?- Hollywood, répondit une certaine Mrs Hendrick. « Bois de houx », murmura Mrs Wilcox d'un air songeur. Quel joli nom... Je vous l'emprunterais volontiers pour ma propriété de Cahuenga Valley.Le couple Wilcox fait immédiatement dresser une carte prospective à l'attention des agents immobiliers et divise ainsi sa propriété en parcelles à lotir, organisées autour d'un axe central appelé Prospect Avenue, le futur Hollywood Boulevard. La première taverne du nouveau village est baptisée Cahuenga House''. Elle est ouverte par un normand du nom de René Blondeau. C'est donc à une simple spéculation foncière que Hollywood doit sa fondation, avant d'acquérir le statut de municipalité en 1903, puis de devenir un quartier de Los Angeles en 1910.
Perpétuation du nom
L'appellation toponymique de Cahuenga n'est plus usitée de nos jours. On garde trace du nom dans le traité de Cahuenga et dans divers lieux de Los Angeles et surtout ceux d' Hollywood tels que Cahuenga Boulevard et col de Cahuenga.
Notes et références
Voir aussi
Histoire de Los Angeles
Vasquez Rocks
Histoire de Los Angeles
Géographie de Los Angeles
Hollywood
Tongvas | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Feyruz Rajab oghlu Mustafayev (, October 18, 1933 — July 7, 2018) was Acting Prime Minister of the Republic of Azerbaijan (April 4, 1992 - May 16, 1992); First Deputy Prime Minister of the Republic of Azerbaijan (May 22, 1991 — May 18, 1992); President of the State Company "Azergushsanaye" of the Republic of Azerbaijan (February 8, 1993); President of the State Grain Products Company of the Republic of Azerbaijan (November 25, 1993 - October 16, 1994); Personal pensioner of the President of the Republic of Azerbaijan (October 2, 2002).
Biography
Feyruz Mustafayev was born on October 18, 1933 in Merzili village of Agdam District. After graduating from a seven-year school in the village of Merzili, he continued his education at the Novruzlu village secondary school. After completing his military service in 1955, he began his career as an ordinary worker on the Samukh collective farm. Then he was elected an accountant, chairman of the collective farm trade union and chairman of the collective farm. During this period, he studied by correspondence at the Moscow Institute of Economics.
Feyruz Mustafayev, who achieved high results in the collective farm, was appointed chairman of the Khanlar District Executive Committee. One year later, he was elected the first secretary of the Khanlar District Party Committee. Feyruz Mustafayev was then appointed to the Shamakhi District.
In 1981, Heydar Aliyev, First Secretary of the Central Committee of the Communist Party of Azerbaijan, and Leonid Brezhnev, First Secretary of the Central Committee of the Communist Party of the Soviet Union, awarded him the Order of Lenin and Hero of Socialist Labour for his construction work in the Shamakhi District, such as 600 km of water lines and all similar construction works and reforms.
In 1975, when he was the first secretary of the Khanlar District Committee of the Communist Party of Azerbaijan, he was elected a deputy of the IX convocation of the Supreme Soviet of the Azerbaijan SSR from Gizilja constituency No. 343. He was a member of the Culture Commission.
In 1987, he became Deputy Chairman of the Agrarian Industry Committee, then Chairman of the Refugee Committee, President of the State Grain Company, Deputy Prime Minister and then Acting Prime Minister.
Feyruz Mustafayev died on July 7, 2018 in Baku.
References
1933 births
2018 deaths
Prime Ministers of Azerbaijan
Politicians from Baku | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
To be an efficient proprietor an officer should have knowledge of law and societal obligations. Police officers should investigate within their personal department regarding requirements to be considered a detective. The officer should be understanding and firm at the exact same period and need to have the capacity to work in some times embarrassing problems. By having an excellent instruction behind youpersonally, you're much more than ready to be a forensic officer. Juvenile court officers are a critical section of the juvenile justice program in Iowa. All branches in California typically take a detective to obtain anywhere out of three to four years experience for a police officer, even until they may transfer to or apply to receive yourself a bond . Most police departments try to promote officers to detective , instead of trying detectives from other powers. First, they take a mental examination along with a published examination. The officer satisfies the offenders to estimate their specifications and locates tools to help them within their rehab. Setting up officers assist out with the introduction of projects like housing and building complexes and different infrastructure. Thus the officer needs to be at a posture to keep in touch with all different caliber of an individual. Exercise with pals or probation officer as often as possible. In making sure the right re integration of all ex-convicts, probation officers track the activities of probationers to make sure they stick to the terms of their release. Ahead of applying for a certain project, applicants must possess a state-issued civil services examination to obtain among the. In the event the company is skimming resumes, then she should be able to manually locate the necessary details without having to attentively examine the resume. At the event that you were incarcerated, you have to prove to this employer reason why they should believe that you're nolonger precisely the same man that was simply detained. It's mandatory that you produce a resume which highlights how the distinct skills companies are looking for. Employees who get poor tests, or who don't finish the crucial education, will be obtained out from civil aid. Ensure that you make the advice you're searching for. The info can be utilised to recognize reasons for your own negotiation failure and create other programs to eliminate this problem. If you require any extra information, you can be in touch with me in the phone number listed above or from email address. You can likewise uncover program-specific information that may possibly help you understand selected topics inside of firm, education, technological innovation, as well as other issues. Felony Justice work what's needed of the particular job will probably be contingent on the locale of knowledge. Before you start searching for work, speak with your probation officer to make sure you definitely understand that the guidelines. Lying to your possible employer wont assist you to get work. Most occupations need a meeting as a portion of their choosing process at which applicants may highlight their expertise and abilities. Detecting a project soon after prison can be challenging. Your class work will probably supply you with comprehension of relevant healthcare trends, along with the powerful history of industry classes that make up the Concordia MBA. Even though locating a job might be hard, it is the the initial step toward becoming your life online. | {
"redpajama_set_name": "RedPajamaC4"
} |
6N2P-EV Soviet Military grade twin triode. Similar to a 12AX7, ECC83, 5751, though the heater wiring is different. 9AJ pinout.
Will ship in white boxes.
Low noise, MIL spec MAXIMATCHER tested.
NOS Mil Spec, Nickel plate.
MAXIMATCHER PRE tested prior to shipment. | {
"redpajama_set_name": "RedPajamaC4"
} |
Asia Pacific Rugby League In Asia Pacific Rugby League
Thailand – Latin Heat clash ends in a draw
A penalty kick which hit the posts, an unsuccessful field goal and two disallowed tries in the final 15 minutes were the talking points, as Latin America and Thailand drew…
Asia Pacific Rugby League In New Zealand, Samoa
Whangarei's Toll Stadium in Four Nations spotlight
New Zealand Rugby League chief executive Phil Holden will visit Whangarei's Toll Stadium next Monday to check out preparations for the NZ Kiwis first visit to the Far North later…
Asia Pacific Rugby League In Fiji, Samoa
Samoa beat Fiji to advance to Four Nations
To be fair, this was always going to be a fun, carnival-like night at the foot of the mountains. But when Fijian lock Korbin Sims came up with the biggest…
Asia Pacific Rugby League In Australia, New Zealand
Kangaroos overrun brave Kiwis
The Australian Kangaroos have won a tit-for-tat battle with the Kiwis in the Trans-Tasman Test, prevailing 30-18 in a much closer than expected match in front of 25,429 fans at…
Asia Pacific Rugby League In Australia, Samoa
Kangaroos to play historic test in Wollongong
The NRL will pay tribute to Kangaroos heroes from the Illawarra as part of the pre-game celebrations for a historic first-ever Test match in Wollongong featuring the World Champion Holden…
Asia Pacific Rugby League In Australia, New Zealand, Samoa
Brisbane double header to kick off Four Nations
Brisbane's Suncorp Stadium will host a double-header to open the end-of-season 2014 Four Nations tournament ahead of a first ever final for the event in New Zealand. NRL Head of… | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Light brown to olive with some fading red areas on the reverse. Cartwheel lustre and excellent surfaces throughout. Identifiable by a minor tick on Liberty's cheek and a minute edge nick on the reverse above the 'A' of STATES. Tied with perhaps a half dozen for the 4th finest of this variety. Early die state with no rim crumbling, and the recutting on the 'N' in CENT clear.
Gloriously warm rose-red surfaces offer flashing brilliance in the nearly pristine fields, light rose on the bust of Liberty and tantalizing blue on the leaves of the reverse wreath. PCGS has certified 17 Proofs of this important date, only 10 in this coin's remarkable grade. PCGS PR64RB. | {
"redpajama_set_name": "RedPajamaC4"
} |
Leo Kuper (20 November 1908 – 23 May 1994) was a South African sociologist specialising in the study of genocide.
Early life and legal career
Kuper was born to a Lithuanian Jewish family. His siblings included his sister Mary (d. 1948), who in later life directed the Johannesburg Legal Aid Bureau.
Kuper trained in law at the University of the Witwatersrand, receiving there his BA and LLB degrees. As a lawyer, he represented African clients in human-rights cases, and also represented one of the country's early non-segregated trade unions. He supported the establishment of South Africa's first legal aid charity.
Wartime service
Kuper served with the Eighth Army in Kenya, Egypt, and Italy, as an intelligence officer, from 1940 to 1946. After the war he organised the National War Memorial Health Foundation, which provided social and medical services for disadvantaged people from all backgrounds.
Scholarly and political activities
In 1947 Kuper went to the University of North Carolina, where he earned an M.A. in sociology. He was subsequently appointed Lecturer in Sociology at the University of Birmingham in England.
At Birmingham, Kuper directed a research project intended to help the city of Coventry recover from the bombing it received during World War II. This project culminated in the publication of Living in Towns (1953). Kuper completed a doctorate in sociology at the University of Birmingham in 1952, and moved to Durban, South Africa, as Professor of Sociology at the University of Natal.
Kuper was an active opponent of apartheid. Under his headship, the Sociology Department at the University of Natal was the only integrated academic department in South Africa. Kuper and his colleague Fatima Meer were subjected to surveillance by the apartheid government, and classes taught in the department were infiltrated by government spies, resulting in a chilling effect.
During his time in Durban, Kuper co-founded the Liberal Party of South Africa, and became chairman of its Natal branch. On 6 December 1956, Kuper and Alan Paton spoke on behalf of the Liberal Party at a fundraising event in Durban in aid of the Treason Trial defendants. They and four other speakers were arrested and charged under a segregationist statute, the Natal Provincial Notice No. 78 of 1933, accused of "holding, or attending, or participating in ... a meeting of natives". Of the ensuing trial, Paton recalled:
On 1 August 1957, all six defendants were acquitted on appeal.
During the 1960s, Kuper moved to Los Angeles, California, United States, where he took up teaching and researching at UCLA and was appointed professor of sociology. His publications include The Pity of it All, Passive Resistance in South Africa, and The Prevention of Genocide. His book Genocide: Its Political Use in the Twentieth Century (1981) was particularly widely cited.
Kuper was a founding member of the International Council of the Institute on the Holocaust and Genocide in Jerusalem. In the mid-1980s, he founded International Alert, with the support of Michael Young, Martin Ennals and others.
Personal life
In 1936, Kuper married anthropologist Hilda Beemer, with whom he had two daughters: the international human rights lawyer Dr Jenny Kuper and the painter and sculptor Mary Kuper.
Works
Passive Resistance in South Africa by Leo Kuper (New Haven, Yale University Press, 1957, 256 p., 4 p. of plates : ill. ; 21 cm).
Pp. xviii+ 452. 21s. paperback.
Cases and Materials on Genocide by Leo Kuper Foundation Staff, Publisher: Routledge (/1859419291).
Genocide Reader (Criminology) by Leo Kuper Foundation, Routledge Cavendish, 1 January 2007, 600 pages.
"Blueprint for Living Together" in Leo Kuper, ed., Living in Towns, London, 1953.
"Techniques. of Social Control in South Africa" by Leo Kuper, Listener 55, 31 May 1956, pp. 708.
"Rights and riots in Natal" by Leo Kuper In Africa South, Vol.4, No.2, Jan–Mar 1960, pp. 20–26.
"The Heightening of Racial Tension" by Leo Kuper, In The Heightening of Racial Tension, Vol.2, 1960, pp. 24–32.
"Ethnic and Racial Pluralism: Some Aspects of Polarization and Depluralization." In Leo Kuper and MG. Smith, M.G. (Eds) Pluralism in Africa. Berkeley and Los
"Racialism and Integration in South African Society" by Leo Kuper, In Racialism and Integration in South African Society, Vol.4, 1963, pp. 26–31.
"The problem of violence in South Africa" by Leo Kuper, in Inquiry (Taylor & Francis), Vol.7 (1–4), 1964, pages 295–303.
"Book Review: Caneville: The Social Structure of a South African Town. Pierre L. Van Den Berghe, Edna Miller" by Leo Kuper, In American Journal of Sociology, Vol.71 (1), 1965, pp. 115.
"Neighbour on the Hearth." by Leo Kuper – Environmental Psychology: Man and His Physical Setting, edited by H. M. Proshansky, W. H. Ittelson and L. G. Rivlin, (New York: Holt, Rinehart & Winston, 1970).
"Continuities and Discontinuities in Race Relations: Evolutionary or Revolutionary Change" by Leo Kuper in Cahiers d'études africaines ( published by EHESS ), Vol. 10, Cahier 39, 1970, pp. 361–383.
"African Nationalism in South Africa, 1910–1964" by Leo Kuper in The Oxford History of South Africa, Vol. II, M. Wilson and L. Thompson (eds.), Oxford: Clarendon Press, 1971, pp. 424–476.
"Book Review: Ethnicity and Resource Competition in Plural Societies. Leo A. Despres" by Leo Kuper, In American Journal of Sociology, Vol.82 (5), 1977, pp. 1146.
"Types of Genocide and Mass Murder" by Leo Kuper, In Israel W. Charny (ed.) Toward the understanding and prevention of genocide: Proceedings of the International Conference on the Holocaust and Genocide. Boulder and London: Westview Press, 1984, pages 32–47.
"The Nazi Doctors: Medical Killing and the Psychology of Genocide.", by Robert Jay Lifton and by Leo Kuper, Political Science Quarterly, Vol.102 (1), March 1987, pp. 175.
"In the Belly of the Beast: The Modern State as Mass Murderer" by Robin M. Williams, Leo Kuper, in Contemporary Sociology, Vol.16 (4), 1987, pp. 502.
"Genocide and the Modern Age: Etiology and Case Studies of Mass Death" by Leo Kuper, Isidor Walliman, Michael N. Dobkowski, In Contemporary Sociology, Vol.17 (1), 1988, pp. 24.
"Theological warrants for genocide: Judaism, Islam and Christianity" by Leo Kuper – Terrorism and Political Violence, Volume 2, Issue 3, 1990, pages 351–379.
"On Jewish Disconnection from Other Genocides." by Leo Kuper – Internet on the Holocaust and Genocide, Issues 49–50, Special Section, 1990, p. 7.
Revolution and Genocide: On the Origins of the Armenian Genocide and the Holocaust, 2nd edition by Robert Melson, Leo Kuper (Introduction), Leo Kuper (Foreword by)
"The Genocidal State: An Overview", by Leo Kuper in Pierre L. van den Berghe, ed., State Violence and Ethnicity (Niwot, CO: University Press of Colorado), 1990, pp. 44.
"The Roots of Evil: The Origins of Genocide and Other Group Violence." by Leo Kuper, Ervin Staub, In Contemporary Sociology, Vol.19 (5), 1990, pp. 683.
"The Genocidal Mentality: Nazi Holocaust and Nuclear Threat" by Leo Kuper, Robert Jay Lifton, Erik Markusen, In Contemporary Sociology, Vol.20 (2), 1991, pp. 217.
"Lethal Politics: Soviet Genocide and Mass Murder since 1917" by Leo Kuper, R. J. Rummel, In Contemporary Sociology, Vol.20 (3), 1991, pp. 433.
"Reflections on the Prevention of Genocide," by Leo Kuper in Helen Fein (Ed.) Genocide Watch. New Haven, CT: Yale University Press, 1992, pp. 135–161.
"Theoretical Issues relating to Genocide: Uses and Abuses" by Leo Kuper in G.J. Andreopoulos (ed.), Genocide: Conceptual and Historical Dimensions, University of Pennsylvania Press, Philadelphia, 1994, p. 31-46.
Notes and references
External links
Leo Kuper Foundation website ?
Research biography and collection details
Collections archived by University of California
1908 births
1994 deaths
20th-century South African lawyers
Alumni of the University of Birmingham
Jewish South African anti-apartheid activists
Genocide education
Liberal Party of South Africa politicians
People from Johannesburg
South African emigrants to the United States
South African Jews
South African people of Lithuanian-Jewish descent
South African writers
University of California, Los Angeles faculty
White South African anti-apartheid activists | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Home » Skin & Body Care » We Asked Experts: How Much Does It REALLY Hurt to Get a Tattoo?
We Asked Experts: How Much Does It REALLY Hurt to Get a Tattoo?
If you type in "tattoo" and then the letter "P" on Google, one of the first suggestions to pop up is "tattoo pain chart." Apparently, that's one of the biggest things people are wondering about when they're thinking about getting a tattoo. This may seem like a stretch (or perhaps an obvious suggestion), but think of the other "p" terms that could pop up: "tattoo pricing" and "tattoo placement" seem much more pertinent to most body modification seekers, right? But instead, it is the pain factor that seems to matter most.
It's understandable. Before you get your very first piece of permanent art etched into your skin, you want to know exactly what it's going to feel like. That can seem even more important than what it's going to cost, or even what it's going to look like after everything is said and done. But the truth is, pain is rather subjective, as we all have varying levels of tolerance and our nerves can be mapped differently.
Still, it's natural to want to know as much as you can about the process before diving in head first — or whichever part of the body you want to get tattooed first, that is. That's why we asked the experts. Here, Anka Lavriv, a tattoo artist and co-owner of Black Iris Tattoo in Brooklyn, and Joshua Zeichner, the director of cosmetic and clinical research in dermatology at Mount Sinai Hospital in New York City, share their insights on the intricacies of tattoo pain.
A freshly cleansed canvas won't necessarily help dull pain, but it will ensure minimal soreness following the treatment, says Zeichner. "Before the tattoo, the skin should be fully cleansed to remove dirt, oil, and bacteria," he says. "The tattoo artist will likely use a surgical-grade cleanser or rubbing alcohol."
Arms and shoulders are typically less sensitive to pain and easier to access for the artist, as well as any area of the body with more fat, says Zeichner. I've actually been tattooed by Lavriv before, and a piece larger than the size of my palm took about 70 minutes. She tattooed a California poppy on the outside of my upper arm, and it didn't hurt as badly as tattoos I've gotten on my wrist, behind my ear, on my back, and on my inner arm.
Any part of the body that has a little more muscle and a little more flesh will make for a less painful tattoo, like your thighs, upper arms or forearms, and shoulders. Places where the skin is a little more taut, like the "outside," or top of the leg rather than the calf, will make for a more pleasant tattoo, according to the artists at Richmond Tattoo Shop. If it's your first time getting tattooed and you're not sure how you'll handle the pain, stick to one of those areas.
Areas of the body that have less fat tend to hurt more. Those areas include "the ribs, feet, elbow ditch, and armpit area," explains Lavriv. Apparently, ribs are especially difficult for artists and clients. "It's a very sensitive area, which is also constantly in motion because of the breathing, so we have to really sync up our movements," says Lavriv. That being said, if you really want your ribs tattooed, you should go for it — just be prepared for an arduous session with your artist.
It's also important to keep in mind that areas of the body where the skin is close to the bone experience another sensation of pain on top of the getting-a-tattoo discomfort — a sort of "tapping on the bone" feeling, which many people don't like. This includes the ankles, ribs, wrists, and the tops of the feet. Other super sensitive areas, such as your fingertips and forehead will also likely hurt to tattoo because those places are where your most pain-sensitive neurons are, according to this study published in the Annals of Neurology medical journal.
With that said, Zeichner notes, "For every rule, there is an exception to the rule, and detailed tattoos may be uncomfortable even on fatty areas like the back or the belly."
After getting tattooed, how long does the pain last?
Initial pain, post-ink, typically lasts a few hours, and there may be slight bruising for a few days, says Zeichner. "If pain persists over several days, especially if the area continues to look red and feels warm, you should get it checked out immediately by your doctor to make sure there's no infection or allergic reaction," he says. | {
"redpajama_set_name": "RedPajamaC4"
} |
Download "Visual Presentation Fall 2011"
HOME THE ROAD TO SUCCESS STARTS HERE GENERATION LEAD VERIFICATION TRANSFERS LIVE FEATURED SITE. Exclusive Auto Leads CONTACT US WHY US?
Google VinVelocity VinVelocity is paid search done better.
Preferred Dealer Network. Better Leads. Better Results. A smarter spend for your marketing dollars.
Five Ways to Grow Your Agency with Inbound Marketing 1 2 3 4 5 The inbound marketing opportunity for agencies The way B2B prospects research and buy products has changed dramatically over recent years.
www.callboxinc.com Manage leads. Monitor campaigns. Nurture relationships. Get your marketing running on all gears. | {
"redpajama_set_name": "RedPajamaC4"
} |
package com.github.dozermapper.core.vo.inheritance;
public class S2ClassPrime extends BaseSubClassPrime {
private String sub2Attribute2;
public String getSub2Attribute2() {
return sub2Attribute2;
}
public void setSub2Attribute2(String attribute) {
sub2Attribute2 = attribute;
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
Play board games while drinking beer with your date at Maria's Packaged Goods & Community (960 W. 31st St.). You'll find hundreds of beers that rotate and a list of seasonal cocktails, so you know there will be something new to try. Feeling hungry? At neighboring Kimski, order Korean-Polish street food like scallion potato pancakes or the Maria's Standard, a polish sausage with soju mustard, kraut-chi and a side of fries. | {
"redpajama_set_name": "RedPajamaC4"
} |
Tag: ISPR
Jan172023 by NewsdeskNo Comments
General Syed Asim Munir, Chief of Army Staff visited Khuzdar and Basima areas of Balochistan
English, Inter Services Public Relations, Official News
Rawalpindi, January 17, 2023 (PPI-OT):General Syed Asim Munir, Chief of Army Staff (COAS) visited Khuzdar and Basima areas of Balochistan. COAS was briefed on prevailing security situation and Formation's operational preparedness along with measures being taken to ensure a peaceful and secure environment. While interacting with troops COAS emphasized on maintaining optimum operational readiness to thwart the attempts by foreign sponsored and supported hostile elements to destabilize Balochistan. We are aware of the nefarious designs of external enemies of Pakistan to disturb the hard earned peaceful environment in Balochistan, COAS remarked. COAS said that Army's deployment and operations are being focused in Balochistan to provide enabling environment for benevolent people centric socioec...
Nov92022 by NewsdeskNo Comments
General Qamar Javed Bajwa, Chief of Army Staff visited Peshawar
Rawalpindi, November 09, 2022 (PPI-OT):General Qamar Javed Bajwa, Chief of Army Staff (COAS) visited Peshawar today. On arrival at Corps Headquarters, COAS laid floral wreath at Shahuada monument. Later, COAS addressed officers and men of Peshawar corps. COAS appreciated the formation for monumental efforts in achieving peace and stability. We owe it to the sacrifices of our Shuhada for providing secure and enabling environment for socio-economic development in Newly Merged Districts in particular and KP in General, COAS said. Always stay focused on your professional duties in the service of nation, COAS concluded. Earlier, on arrival at Corps Headquarters, COAS was received by Lieutenant General Hassan Azhar Hayat, Commander Peshawar Corps. For more information, contact: Inter Services Pu...
On 07 Nov 22, Security Forces conducted a Joint Intelligence Based Operation in general area Shakas, Khyber District
Rawalpindi, November 09, 2022 (PPI-OT):On 07 Nov 22, Security Forces conducted a Joint Intelligence Based Operation in general area Shakas, Khyber District. During the conduct of the operation, intense fire exchange took place between own troops and terrorists. Own troops effectively engaged the terrorists' location. Resultantly, Terrorist Liaquat Ali alias Shaheen, an important Terrorist commander, was killed. The killed Terrorist was also propagated as a 'Missing Person'. During operation, a large number of weapon and ammunition was also recovered from the killed terrorist. The killed terrorist remained actively involved in terrorist activities against security forces, target killing and extortion. However, during intense exchange of fire, Sepoy Saleem Khan (age 28 years, resident of Top...
The baseless and irresponsible allegations by Chairman PTI against the institution and particularly a senior army officer are absolutely unacceptable and uncalled for
Rawalpindi, November 04, 2022 (PPI-OT): The baseless and irresponsible allegations by Chairman PTI against the institution and particularly a senior army officer are absolutely unacceptable and uncalled for. Pakistan army prides itself for being an extremely professional and well-disciplined organisation with a robust and highly effective internal accountability system applicable across the board for unlawful acts, if any, committed by uniformed personnel. However, if the honour, safety and prestige of its rank and file is being tarnished by vested interests through frivolous allegations, the institution will jealousy safeguard its officers and soldiers no matter what. The baseless allegations hurled at the institution/officials today are highly regrettable and strongly condemned. &...
Oct32022 by NewsdeskNo Comments
General Qamar Javed Bajwa, Chief of Army Staff called on General Birame Diop (Senegal), United Nation's Military Advisor to Secretary General during an official visit to United States
Rawalpindi, October 03, 2022 (PPI-OT):General Qamar Javed Bajwa, Chief of Army Staff (COAS) called on General Birame Diop (Senegal), United Nation's (UN) Military Advisor to Secretary General during an official visit to United States (US). During the meeting, matters of mutual interest, overall regional security situation including natural disaster caused by flood across the country came under discussion. COAS appreciated the role of the office of UN Military Advisor in promoting UN core values and their response during crises. The UN Military Advisor expressed his grief over the devastation caused by ongoing floods in Pakistan due to climate changes and offered sincere condolence to the families of the victims. He assured full support to the flood victims. UN dignitary acknowledged Pakist...
Sep262022 by NewsdeskNo Comments
Her Excellency Ms Wendy Gilmour Canadian High Commissioner to Pakistan paid a farewell call to General Qamar Javed Bajwa
Rawalpindi, September 26, 2022 (PPI-OT):Her Excellency Ms Wendy Gilmour Canadian High Commissioner to Pakistan paid a farewell call to General Qamar Javed Bajwa. Chief of Army Staff (COAS) at GHQ, today. During the meeting, matters of mutual interests, regional security situation and bilateral cooperation in various fields came under discussion. COAS thanked visiting dignitary for her services and appreciated her contributions for fostering strong ties between the two countries. The visiting dignitary expressed her grief over the devastation caused by floods in Pakistan and offered sincere condolence to the families of the victims. She offered full support of her country to the people of Pakistan. She also appreciated Pakistan's Army efforts for rescue and relief efforts in flood affected ... | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Greece, particularly the islands, are some of my favorite escapes. Did you know there are 6000 Greek islands in total with only 227 inhabited? There are so many landscapes and cultures to discover. The Greeks are extremely friendly, their history rich, and their cuisine is the healthiest in the world. For a treat, I booked a 6-night stay to visit Santorini in the Cyclades Islands. There are plenty of things to do in Santorini to keep your busy for awhile. This is the first time I'm visiting this Greek island, so if you are wondering what to see in Santorini, keep on reading. Otherwise read The Best Greek Islands to visit for more suggestions.
You might be interested in this Greek Islands Travel Guide.
Ok. It was a bit of a splurge. My on-again, off-again relationship was off again, and I needed a change. Some women buy chocolate, some hit the department stores, but not me. I buy travel. Nothing gets my mind off of reality like sunrises, sea views and a flirt from a hot Mediterranean man. I just wanted some fun things to do in Santorini to enjoy myself.
5 Enjoy Magical Oia and see the sunset!
Unless you are flying into Santorini on a direct flight from one of Europe's many local airlines, chances are you will have to first fly to Athens. There are numerous flights on Olympic and Aegean Airlines in and out of Athens to Santorini. And what a fantastic city Athens is. I always recommend a few days in Athens to absorb the amazing history, culture and culinary treats this beautiful city has to offer. Then chill out on the islands.
I was going in high season, and I knew Santorini would be crowded in summer. I needed to be methodical about what to visit in Santorini. Since the island is not very large, I could easily visit most of Santorini within the six days I would be there. I decided to I split the island into 3 parts: Pyrgos in the southwest, Oia in the north, and Perivolos/Red Beach in the southeast.
Pyrgos is a quaint village of a bit over 900 people. It's a quick ride from the airport and the least spoiled of the villages on Santorini. It's quite charming and relaxed with only a few restaurants and shops. Stroll the steep steps up to the cathedral to the top of the village to enjoy a magnificent panoramic view. Brusco's Cafe, by the roundabout is buzzing, and for good reason – it's the afternoon and they have coffee, wine and WiFi! You sit under shady trees while watching the world go by. This is a great place to chill on Santorini. It's also where the local bus stops to other parts of the island.
I love staying in boutique hotels and I'm in luck. The Art Hotel Santorini, is a super boutique hotel just at the edge of town. It's a 10-suite, sea-view hotel and the rooms come with a private terrace and plunge pool. I booked the Nest Suite at the Art Hotel and it was a very spacious suite. Wow! The blood-red tiles reflect something sinister may have happened. At night, it glows! It's nice and warm and makes a bold statement. Against the blue sky, the private plunge pool has a massive, 'Wow' factor.
Private plunge pool in Santorini.
As the name implies, the Art Hotel Santorini is a canvas for national and international artists, feeding the tastes and trends of the sophisticated, contemporary Greek art scene. There is a new installation each season, along with concerts and talks to coincide. You can even admire art while you are swimming in the main pool. It's a very creative concept, and what a wonderful way to support the arts community.
It is so 'chill' to simply linger in my own private pool, and I admit, I relish the quietude. The only break in silence is the occasional moan coming from the couple next door. Lucky them. No screaming at the pool, no children crying. It's zen. Since there are only 10 suites, the service is excellent. Staff are extremely attentive.
Breakfast is included and menus are set out the night before. It's made to order at the time you request. Breakfast is then set up on your terrace in the morning. You can choose from omelettes, Greek yogurt with honey, Greek salads, plus more, including champagne! Its a very chic experience first thing in the morning. There is no restaurant so you may order a private dinner as well to be set up on your terrace. Very romantic. Looking forward, room rates for October 2018 are around $132 per night. This is a great price for a boutique hotel on Santorini.
Enjoy Magical Oia and see the sunset!
I now hop on the bus to the opposite end of the island to the town of Oia. When you see photos of Santorini, it's predominantly Oia. The bus company, KTEL, manages the bus network and it's clean and efficient. The main bus routes in Santorini run quiet frequent, usually a couple times an hour, and offer inexpensive transfer from point A to B. Ticket prices range from $2-3, and night buses are slightly more. There is absolutely no need to rent a car on Santorini.
Like many, I was keen to get 'that shot.' You know, the one with the Blue Domed Church. Well, here it is. The bright lime-water whitewash sears your retinas as you squint to take it all in. Everything is so bright against the contrast of blue.
Oia's permanent population is 1,550 and increases substantially in the summer. It's a chic, expensive village, and a visit for cruise ship passengers. It gets really busy and feels like a duty-free stop. Don't get me wrong, it's beautiful. Book in the off season so you can enjoy it more to yourself.
In Oia, I'm staying at another boutique hotel at the Aisling Micro Hotel, and micro it is! There are two spacious, well equipped, contemporary suites. I have two floors with a large living area, a spacious writing desk with an Ipad and cell phone, and a sea view Jacuzzi! There is a terrace on the main floor, and upstairs is the bedroom and an even larger terrace! I'm in the center of the action and room rates for October 2018 are about $315 per night. This is a great little boutique hotel on Santorini well worth the splurge if you want to be in the heart of Oia.
People come to Oia for the sunsets. If you want, you can take a sunset cruise on Santorini. Otherwise, people converge each evening at the far end of the island to experience this. Luckily, I didn't go anywhere. I just sat on my terrace, glass of wine in hand, and listened to Richard Edward's Smooth Jazz program on the internet. How sublime… A perfect complement to a wonderful view.
Oia is definitely a more vivacious town on Santorini with the buzz of restaurants, clubs and nooks to keep your photographic interest.
The best time to explore Oia is at sunrise. It's empty – a far cry from night time. I was able to snap some amazing photos without dodging bodies! It was me, a few dogs and cats, and the occasional baker delivering croissants.
Another fun thing to do on Santorini is book a tour with Santorini Wine Adventures. I visited Domaine Sigales, Estate Argyros and the Koutsoyannopoulos Wine Museum where we learned about wine making and tasted 12 different types of local Assyrtiko and Vinsanto wines which come from Assyrtiko, Athiri and Aidani grapes. This day tour was about $100 and a great course on wine production on Santorini.
The next time I need to try their Wine and Food Lovers Tour which includes a cooking class! I love dabbling in local cuisine.
Due to the heat, the vines grow in a circle on the ground. That way, the humidity from the soil and shade from the leaves help the grapes grow. The vineyards are flat and appears quite unimpressive, but when you get up close you see the winding vines. You have to be careful near the vines because you might find a snake seeking refuge from the heat!
When you are on Santorini, you must visit the covered ruins of the ancient Minoan Bronze Age settlement of Akrotiri. Akrotiri was covered by a volcanic eruption in 1627 BC and the excavation has been going on since 1967. There are wall paintings and ceramics to see lying about and it's an amazing place to discover. It's quite an interesting bit of Santorini history, and at €12, it's a small price to pay to visit these amazing ruins.
My time in Oia had come to an end, so I took a local bus down to the Southeast part of the island to Perivolos beach. I planned to stay 2 nights at a beach front resort. Unfortunately, the resort was beach front, but extremely tired and lifeless. I was spoiled by my previous 4 nights in a boutique hotel, and expectations were high. The black, volcanic beach was in desperate need of a raking and cleaning, and it didn't even seem like the same island. I won't mention the name of the hotel as I wouldn't recommend it.
I took one more independent bus trip over to the most famous beach, The Red Beach on Santorini, so called due to the red and black volcanic rock that's been sliding off the face of the cliff. The colors were quite spectacular and surreal, and it's a great place to visit for an afternoon of you want to swim on Santorini.
I woke early again to shoot some sunrise shots from the beach. Quite lovely!
This trip to Santorini was just the ticket. I left feeling energized and glad I booked on a whim. There are so many things to see on Santorini and six days didn't feel too short nor too long. It is easy and reasonably to reach Santorini from the UK with many low-cost carriers and tour package operators. Otherwise you need to connect through Athens, which is also well worth a visit. I love Athens, and here's a great itinerary for 3 things you must see in Athens.
Many European cities offer direct flights as well throughout the high season, and within Europe. I prefer to take the cheapest flight possible since the flight is so short – then splurge on a swanky boutique hotel and interesting cuisine.
For more information on Santorini and the wine tour, click the links above. I highly recommend both hotels for location and service, so visit the Visit Greece website is a good place to start for information about what to see and what to do on Santorini.
Santorini is still on my bucket list. Great post and great photos!
Thanks, Lisa. Santorini is very navigable. Quite easy to get around by bus and you'll see totally different parts of the island. Hope you get there one day.
Santorini will always be my most favourite destination. Your post and pictures made me so nostalgic ????
Thank you, Chandrima – I, too, love Santorini, and the Greek Islands in general. They are so photogenic and each island is so unique. I hope to explore and talk about more of them. Stay tuned!
Santorini is high up on my list and honestly this post drove my urge up high!! I love the pictures, the hotel recommendations and the drone video of the sunrise is just so mesmerizing!
Thanks Shibani. It is such a beautiful place that it's easy to photograph. That drone is amazing, right? That is one thing I want to start doing – droning. Let's see. Keep in touch! | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: How to dynamically add points to a polygon I am creating a game in which the barriers I'm creating that are polygons deteriorate based on where they were hit. I am wondering how I can dynamically add points to the polygon as it normally takes an array and I don't want to have to set every point in the array but rather change them when hit. Can you use lists to draw polygons is basically what I'm getting at?
e.Graphics.DrawPolygon(Pens.White, BarrierArray1);
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Two Worthy Stocks comparison for Investors: My Size, Inc. (NASDAQ:MYSZ), Brandywine Realty Trust (NYSE:BDN)
My Size, Inc. (NASDAQ:MYSZ)
My Size, Inc. (NASDAQ:MYSZ), ended its previous trading session at $1.31 showing a gain of 0 or 0 percent with respect to the price of $1.31 when stock market opened. The company traded 316501 shares over the course of the trading day. Giving the average volume of 410.65 Million over the course of 3 consecutive months. Which signifies a pretty good change over the time with its shares outstanding of 7.23 Million.
My Size, Inc. (NASDAQ:MYSZ) is currently trading Higher than its price target which is set to $0 by the analyst. The stock is -70.23% Below its 1-Year High which is $4.40. MYSZ has a difference of 92.65% from its 1 year low which stands at $0.68. The company is currently rated by analyst who are keeping a close eye on the stock as 3. Where 1 means Buy, 2.5 meaning Hold and 5 as Sell.
My Size, Inc. (NASDAQ:MYSZ) Performance Snapshot
The stock performed exceptionally good in the previous week which depicts an increase of -22.49 percent in the shares price. The company added about 11.97% in its share price over 1-Month. While taking about the performance of the stock over 1-year interval is -65.53 Percent. MYSZ currently shows -7.09% as its year to date performance.
My Size, Inc. (NASDAQ:MYSZ) Price Insight
The stock needs to grow about $-1.31 to reach its price target. In order to seek the stock's directional movements, 20-Days, 50 Days and 200-Days moving averages are 0.96%, 12.31% and 5.06 percent respectively. The stock trades about 5.81 percent of its Float giving its total shares Outstanding are 7.23 Million. MYSZ lost about -6.43 percent in 6 months showing its Average True Range of 0.14. The company currently has a RSI and Beta of 51.21 and 0.
While talking about My Size, Inc. (NASDAQ:MYSZ) valuation ratios, the stock trades with a P/S and P/B of 55.41 and 2.72 which is significantly better and attractive as compared to its peers.
Brandywine Realty Trust (NYSE:BDN)
Brandywine Realty Trust (NYSE:BDN), closed the last trading session at $11.38 with increase of $0.0700000000000003 or 0.62 percent against the opening price of $11.31. The trading day volume of the company stands at 1.51 Million shares while the average trading volume of Brandywine Realty Trust (NYSE:BDN) is 1.89 Million over the course of 3 consecutive months. Which signifies a pretty good change over the time with its shares outstanding of 170.57 Million.
The price target of Brandywine Realty Trust (NYSE:BDN) is currently set at 11.94 by the analysts. The stock is $-29.97 Below its 1-Year High which is $16.25. BDN hit its 1-Year low price of $7.48. The company is currently rated by analyst who are keeping a close eye on the stock as 3. Where 1 means Buy, 2.5 meaning Hold and 5 as Sell.
Performance Indicators of Brandywine Realty Trust (NYSE:BDN)
The value of the stock increased by 0.98% during the previous week performance. Looking at the 1 month performance of Brandywine Realty Trust (NYSE:BDN), the stock dipped -2.15%. While the 1 year performance shows a negative percentage of -27.28 and year to date performance stands at -4.45%.
Brandywine Realty Trust (NYSE:BDN) Analytical Review
The stock needs to grow about $0.559999999999999 to reach its price target. In order to seek the stock's directional movements, 20-Days, 50 Days and 200-Days moving averages are -2.85%, 2.99% and 6.97 percent respectively. The stock trades about 3.79 percent of its Float giving its total shares Outstanding are 170.57 Million. BDN gained about 5.86 percent in 6 months showing its Average True Range of 0.31. The company currently has a RSI and Beta of 47.56 and 1.18.
While talking about Brandywine Realty Trust (NYSE:BDN) valuation ratios, the stock trades with a P/S and P/B of 3.49 and 1.08 which is significantly better and attractive as compared to its peers.
Will you bet on these? SendGrid, Inc. (NYSE:SEND), Pluralsight, Inc. (NASDAQ:PS)
Two Worthy Stocks for investors: Loxo Oncology, Inc. (NASDAQ:LOXO), MannKind Corporation (NASDAQ:MNKD) | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Q: I got a problem with the mobile media query UI, on the navbar list there are spaces, but I haven't added any padding or margins Website
vs Code
i have remove the padding from media query, but not effect
A: Option 1: That's maybe because you have set margin or padding on element while you was coding for normal screen width, and after that when you're coding media queries for smaller screens sometimes you need to add !important after change on css.
Example:
li{
padding: 0 !important;
margin: 0 !important;
}
Option 2: That's maybe bacause you're using display: flex; and justify-content: space-between, space-evenly or space-around (Display flex are adding spaces that cannot be removed with margin or padding 0). Try to use justify-content: center; or justify-content: start; on the ul tag.
Example:
ul{
justify-content: start !imporant;
}
If this doesn't work try to find another solution...
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
NSFW - 18+ only
Free Live Cams
Creative ways to tell a girl you're having a crush on her
Nick Dante March 22, 2019
Having a crush can be a lot of fun — as we've pointed out recently — but there comes time when you need to make some moves and finally reveal you're interested ...
Sex & relationships0 Comments
Compliments for girls that actually work
Knowing how to compliment a girl isn't as easy as most guys think. Sure, it's simple to think about something you want to say to her, but that's different from ...
How to make a relationship last so you can finally stop dating around
We know that it's not easy to make a relationship last. Heck, if it were, we'd all be in the happiest situations ever, finding "the one" after just a couple of ...
Signs your hookup is interested in something more with you
Hooking up is awesome, especially when you get in on the regular from someone. Thing is, while having casual sex is every single person's birthright, it can tur...
Are you just being used by a girl? Here are things to look for
Being used by someone is a miserable feeling, but, if it's happening to you, it's best to get out of whatever relationship you're in and move on. That may actua...
Lifestyle0 Comments
How loving yourself first can make you become more sexual
Nick Dante March 6, 2019
Loving yourself plays a huge part in your success in life. Yes, believe it or not, if you're putting vibes out there that you're not as great as you actually ar...
Millennials are burnt out on online dating apps
Nick Dante February 22, 2019
Online dating apps have long-been popular, with people using them to find love, land dates and, maybe more so, get themselves laid. While swiping, matching and ...
Questions to ask yourself before you decide to date your hookup buddy
Having a hookup buddy is awesome, and it's totally OK to admit that. Not only does it mean regular sex with someone who you're both physically and (probably) em...
When you're having a crush but are too shy to talk to her, here are some tips to overcome that fear
Having a crush on a girl is one of the best feelings in the world, as it gives you hope that, just maybe, your chase will end with victory, snagging the girl th...
Is your partner selfish in bed? These signs will help you decide
Sex is supposed to be a connection between two people who enjoy pleasing one another. But, as we know, that's not always what happens. Unfortunately, whether yo...
Cheating signs to help you catch a lying partner
Cheating is, arguably, the most selfish, most heartbreaking thing that someone can do while in a relationship. Sure, there are awful situations like verbal or, ...
How to deal with a low sexual drive because of depression
Having a low sexual drive can be caused by a number of different factors, but one that is becoming more and more common is depression. As we all well know, ment...
Revenge porn is terrible, and here's why you need to avoid ever doing it
Revenge porn is one of those things that some people think will help them "win" a breakup. If you're one of those people, shame on you. It's understandable that...
How long People last in bed vs how long people want to last in bed
Nick Dante February 8, 2019
Understanding how to last longer in bed can be tricky, because there are tons of different tips that guys hear or read about that may or may not actually work f...
Turns out a lot of Americans have actually paid for sex before
Paying for sex is one of those things that, oftentimes, nobody ever wants to admit. It's understandable, as many think that it's doing something bad, illegal or...
Sugarcookie.com 2014-2017
By using this site you agree to our privacy settings
We use Sugarcookies (!) to give you the best experience possible and show you relevant advertising
See our privacy settings and policy
These companies help us to provide the most appropriate content and constantly improve the site.
Google Analytics - Privacy policy
Sugarcookie Kft - Privacy policy
Stackpath - Privacy policy
Disqus - Privacy policy
Ads keep our articles FREE for everyone. We put technical restrictions on advertising to prevent your data being collected and used elsewhere without your permission. These are the ways we may use your data for advertising purposes:
Information storage and access
Ad selection, delivery and reporting
Content selection, delivery and reporting | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Audubon's Haiti
Tags: John James Audubon, born in Haiti, Smooth-billed Ani, Charles Lucien Bonaparte
I had a fantastic time last weekend at the magnificent Audubon Museum in Henderson, Kentucky, as the invited speaker for the celebration of John James Audubon's 233rd birthday. It never felt more relevant to remind people that Audubon was born in Haiti (then Saint-Domingue), and that Haiti shaped his art and his thinking in ways that still remain to be discovered. Looking through Audubon's books art the museum, I found a marginal note in his copy of ornithologist Charles Lucien Bonaparte's works, where Audubon refers to himself proudly as "J.A. born in Santo Domingue." And he underlines it, too. A very moving moment.
The beginning of the note--"The very bout de Petun's Note"--refers to the Creole name for the Smooth-billed Ani, still common in Haiti, whose song Audubon here compares to Bonaparte's description of the "Great Crow Blackbird," likely the Great-tailed Grackle. An earlier marginal note confirms that he had derived this information from his reading of Buffon but the later comments directly relate this knowledge to his early years in Haiti, whether he actually remembers the bird or merely feels he can claim special authority for himself as actually coming from the same place as that bird. Amusingly, Audubon also rejects the illustration Bonaparte provides, denying that it's by him, as Bonaparte had claimed: "My Drawing has been So Shamefuly cannibalized by an unknown Individual that to See My Name at the corner of the Plate might make me wish to abandon the great Labours I have been at to represent Nature as it is." Well, he didn't abandon those labors. What still remains to be discovered is the extent to which Audubon's Caribbean origins (about which he consistently lied, with the exception of the comment I found) had helped him to persist in his quest. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
A project of the U.S. Department of Health and Human Services Office on Women's Health
Página inicial en español
Empowering women to live healthier lives!
A-Z Health Topics
| Email
| Print|
Skip left navigation
Office on Women's Health press releases
Women's health highlights
Healthy Women Today Newsletter
Spotlight on Women's Health
What's new on womenshealth.gov?
News in Spanish (en español)
Subscribe to news email updates.
Home > News > Health headlines > Humanitarian Work May Raise Risk of Anxiety, Depression
Humanitarian Work May Raise Risk of Anxiety, Depression
Researchers offer recommendations to improve mental health of aid workers.
FRIDAY, Oct. 5 (HealthDay News) -- Humanitarian aid workers are at increased risk for mental health problems such as anxiety and depression, both while in the field and after they return home, researchers say.
The workers' employers, however, can take steps to reduce this risk, according to a new report.
For the study, the investigators surveyed more than 200 international humanitarian aid workers at 19 non-governmental organizations (NGOs) and found that nearly 4 percent had symptoms of anxiety and more than 10 percent had symptoms of depression before they were deployed. Those rates are about the same as in the general population.
After deployment, nearly 12 percent of the aid workers had anxiety and about 19 percent had depression. Three to six months after arriving home, the rate of anxiety fell to less than 8 percent but the rate of depression increased to over 20 percent.
Readjusting to life at home can be difficult for aid workers, the study authors pointed out.
"It is quite common for people returning from deployment to be overwhelmed by the comforts and choices available, but unable to discuss their feelings with friends and family," study co-author Alastair Ager, a professor of clinical population and family health at Columbia University's Mailman School of Public Health, in New York City, said in a university news release.
The researchers found that it wasn't the experience of being in dangerous or threatening situations that increased the risk for depression, but instead it was the continual exposure to a challenging work environment. In addition, having weak levels of social support and a history of mental illness also boosted the risks.
Aid workers who were highly motivated and self-governing, however, reported less burnout and higher levels of life satisfaction, respectively.
The researchers recommend that NGOs should: screen candidates for history of mental illness; fully inform them of the risks related to humanitarian work; offer mental health support during and after deployment; provide a supportive work environment, manageable workload and recognition; and encourage and assist with social support and peer networks.
The study was published online recently in the journal PLoS One.
The U.S. National Institute of Mental Health has more about depression.
(SOURCE: Columbia University Mailman School of Public Health, news release, Oct. 1, 2012)
Copyright © 2012 HealthDay. All rights reserved.
HealthDay news articles are derived from various sources and do not reflect federal policy. Womenshealth.gov does not endorse opinions, products, or services that may appear in news stories.
Disclaimers |
A federal government website managed by the Office on Women's Health in the Office of the Assistant Secretary for Health at the U.S. Department of Health and Human Services.
200 Independence Avenue, S.W. • Washington, DC 20201
202-690-7650 • Monday through Friday, 9 a.m. to 5 p.m. EST (closed on federal holidays).
womenshealth.gov | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Safety and training — Import 2022-11-29 21:06
Survitec exchange liferafts shown to meet 30 month condition standard
December 17, 2020 . 8:54 AM
UK-based Survitec has carried out a combination of more than 50,000 liferaft exchanges and inspections since 2012 with technicians recording that the liferafts inspected are in perfect condition even after 30 months of service.
Revised guidelines (MSC.1/Circ.1328) introduced in June 2009 permit extended service schedules of up to 30 months if they incorporate protective arrangements that give the liferaft, its fittings and equipment adequate protection to withstand the environmental influences imposed by the extended interval. Inspections and service records in Survitec's database show that liferafts were found to be well within the requisite parameters set out in MSC guidelines for extended service liferafts.
Survitec was one of the first maritime safety companies to offer the extended service solution concept. Malcolm Barratt, Technical Sales Manager – Liferafts, Survitec, said, "That liferafts are in near perfect condition after 30 months is specifically due to the water- and air-tight environment in which the extended service liferaft is contained. The hermetically sealed bag inside the container prevents water ingress and salt erosion."
A large number of Flag Authorities now accept use of extended service liferafts for 'serviceable life,' "When we have presented liferafts after 30 months of service to Flag State inspectors, they have thought we were showing them a newly manufactured liferaft; they're in perfect condition!" said Barratt.
Tommy Scott, Head of Engineering – Survitec Liferafts, added, "State-of-the-art sensors within the liferaft allow operators to take as many readings as they need to with a unique handheld device to ensure the liferaft is in good working order." The handheld device takes readings from a low powered CO2 sensor – making it suitable for use aboard oil and gas carriers and platforms governed by ATEX (Atmospheres Explosible) requirements. Once all parameters have been recorded using the ATEX-compliant handheld reader, data is recorded on the provided inspection log form and uploaded to the database.
Unlike alternative solutions, which recommend limiting the number of readings to preserve battery life, Survitec's handheld reader takes a standard 9V alkaline battery that can be easily replaced, allowing crews to take accurate readings more frequently.
"If any readings reveal the liferaft is outside the requisite parameters – by displaying a red light for either incompliant CO2 or humidity levels – remedial action is required. For a CO2 anomaly, this means immediate replacement. For increased humidity, replacement would be required within three months."
Barratt said the tanker segment, in particular, has been quick to take up the extended service liferaft solution with charterers and oil majors often mandating the concept as part of the Tanker Management and Self-Assessment (TMSA) programme. TMSA is an administrative process that provides tanker operators with a means to improve and measure their own safety management systems. "Another reason for the wide take up is the cost-savings associated with crews trained to take the readings. At no extra cost to the company, we certify crews to inspect the liferafts themselves, negating the need for external technicians onboard," he said.
MOL in MoU to bring robots to shipping industry
Seafarers International Relief Fund calls for donations to meet $1m target
Mission to Seafarers' Crew welfare campaign raises over £465,000
K Line in AI car carrier cargo handling trial | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Subscribe to the Pleasanton Express
Living/Faith
Submit Classified
Local couple in fatal car accident near Devine
By Pleasanton Express Staff | on September 11, 2013
ADRIAN DELGADO
This is what remains of the Zettner's 2006 Pontiac after they were hit from behind by a commercial truck on their way to lunch on Wednesday. Gayle Frances Zettner was killed, Stanley was flown to University Hospital.
The Zettners were driving northwest on 173 toward Devine in their 2006 Mercury Grand Marquis on September 9th around noon when a company truck hit them from behind. The car lost control and crashed into a telephone pole.
Gayle Frances Zettner, 71, was not wearing her seat belt. When EMS arrived, she was pronounced dead on the scene. The couple was going to lunch in Devine according to Eric Smith, sports editor at the Devine News. He met them a few times, and said "They were just the friendliest couple."
Stanley Zettner suffered serious injuries. Airlife flew him to University Hospital in San Antonio. His condition was not known as of press time.
Hurley Funeral Home is holding visitation on Tuesday, September 10th from 2 p.m. to 8 p.m., and will lay Zettner to rest on September 11th at 10:00 am at the Pleasanton City Cemetery.
More From News Go To The News Section
PHS Alumni kick-off Larry Brown Memorial Scholarship Fund raffle
Pleasanton Young Farmers announce entertainment
CHARLOTTE SPLASH PAD RIBBON CUTTING | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Over the years the Production Team at iFilmGroup has received thousands of people wishing to be a part of productions. This along with being asked what is the proper way to apply for a role, casting call or to an audition call. What do you send and how? The simple answer is much like how you apply to a job, but with some added steps, info, and material.
Saying "I'd like to be a part of your film" is not enough. Many beginning actors and even some more veteran actors may not know the best way to go about submitting themselves for roles in films, commercials, plays, etc. As an actor, one might assume that everyone with a passion for acting would stay up to date on proper etiquette in submitting headshots and resumes for casting calls, but it seems that's a wrong assumption.
As for when you submit for a job interview you want to stand out. You do this through submitting two important things: an Acting resume with your past experience and a headshot. Which is a picture, generally a head to shoulder or mid-chest picture. Sometimes it's a head to waist picture of yourself. Most times these pictures should be taken by a professional or someone good with photography so that you look your best. Some organizations are fine with selfies or self-taken pictures but for many this will not pass. (we don't want you to over spend and rush out and get expensive professional headshots.) iFilmGroup.org does hold "Headshot" Workshops offering headshots under $50.
The headshot is key to help the team selecting the cast for a production to see what you look like and how you might fit into the production.
The important thing is to figure out how you might stand out from the crowd regardless of your level of experience. Casting directors, film directors, and producers who cast for a film, filter through hundreds, if not thousands of head-shots and resumes every day. So how do you effectively stand out from the crowd, and not have your submission thrown in the trash.
So, here is a list of helpful hints on what to do for submitting to roles. Below is a top 10 list of things to consider and do before submitting for a casting call or role.
#1 RESEARCH THE ROLE – Do your online research on what the production company is looking for and what roles that fit for you. Read carefully ALL the information in regards to the casting and audition process. Do not submit to something you do not fit the description of. Casting directors must filter through thousands of head-shots and resumes and by submitting your information to something that does not apply to you just makes their job more difficult. Thus, probably less likely to hire you in the future.
#2 – UP-TO-DATE PHOTO - Send an updated acting resume and ensure when you submit a photo, it shouldn't be more than 5 years old. The more recent the photo, the better. Especially if you drastically change your looks by cutting or coloring your hair. If the only headshot you have is of your blonde hair and you've recently dyed it black then make sure you draw that to the attention of the casting team and it likely is time to get a new headshot. The casting department won't be too happy if you come into an audition looking different than in your headshot. The same goes for when you show up to an audition and you're 10 years older than your picture. Keep it all up-to-date. Pictures should be in JPEG or PDF format.
#3 – HAVE OR CREATE ACTING RESUME - Your professional resume should stand alone from your acting resume. They are considered as two different things in the entertainment industry, so take the time to write a resume on your acting experiences. If you are not sure how to create an acting resume research it online. Most productions companies do not want to see or have you include your background, stand-in or photo double work in your acting resume. Those areas of work do not illustrate your acting talent. But certain production companies and production houses are open to this if that is the only experience you have and are looking to break into the industry. iFilmGroup is included in this category. We want to see all your acting experience. RESUMES SHOULD BE IN PDF format.
#4 TAKE YOUR TIME TO PERSONALIZE AND SEND NICE PACKAGE OR PRESENTATION - Avoid sending a blank email with just a head-shot and a resume. Take your time and make each email seem that it took time and effort before you press send on your computer screen. Personalize your e-mail or the cover letter you send. Give reasons why you feel you would be the right person for the cast or how being a part of this production would enhance your acting. Avoid sending obvious generic emails. For example, "To whom it may concern" is an obvious and dead giveaway that this email is simply a draft that is recycled over and over to numerous casting directors. Take your time and do your research on the director or casting director is. Something as simple as addressing them by their name can go a long way.
#5 – ASK QUESTIONS- If you have any questions or concerns address them in your email. It is often considered rude, to quit a project later because you failed to ask the casting director earlier for more information. There is "usually" no such thing as a dumb question.
#6 DO NOT PROCRASTINATE– Typically the earlier you submit the higher your chances of possibly being cast. So do not wait until the last minute to submit to any opportunity. Most of the time the people who waited ultimately missed their chance of acting in a major feature film.
#8 PROVIDE LINK TO DEMO REEL OR VIDEO SAMPLES OF YOUR WORK - Having a Demo Reel is ideal, but sending them any decent quality video with your acting in it helps a lot. It's best to upload your video somewhere (YouTube, Vimeo, etc) and share that link in your submission. Avoid attaching your videos to the email because chances are, the file size will be too large to send via email. Also, avoid using zip files because many will delete them without opening out of fear of computer viruses. Don't share videos via Facebook, Twitter, or Instagram because not everyone can view them, and that's really for your personal life, not professional.
#9 INCLUDE CONTACT INFO IN RESUME - Make sure all of your contact information is included.
#10 NO AGENT REQUIRED - iFilmGroup will cast you even if you don't have an agent. But if you have an agent then your agent's contact information should be included and up-to-date on your resume.
#11- IF YOU HAVE A ACTING WEBSITE, INCLUDE IT! – If you have a website for acting or an IMDb account or listing. Include it as additional information that the casting team can look at.
Many of these same steps and information can apply to those wishing to apply for the crew.
* If you are selected the iFilmGroup team will contact you for an interview or audition and supply you with further details. | {
"redpajama_set_name": "RedPajamaC4"
} |
Check out all of the names of the Manti High School alumni that attended high school in Manti that are listed above. Registering will allow you to join the directory. If you are a former student of Manti HS in Manti, Utah, register now to add your name. | {
"redpajama_set_name": "RedPajamaC4"
} |
Apply Description South College Asheville Learning Site, located in Asheville, NC, is conducting a search for a Physical Therapist Assistant Adjunct Instructor with specialty interest in neurology or pediatrics. Requirements • Minimum of a baccalaureate degree awarded by an institution that is regionally accredited • A licensed or otherwise regulated Physical Therapist or Physical Therapist Assistant • Minimum of 2 years of professional experience. Previous teaching experience is preferred. | {
"redpajama_set_name": "RedPajamaC4"
} |
Indoor Meeting
Disciplines INIT INDOOR MEETING Karlsruhe 2023
Disciplines Women
60 metresmore >>
as part of the World Athletics Indoor Tour
The magical seven seconds
From 1985 to 2006, the 60 metres was a fixed part of the programme at INDOOR MEETING Karlsruhe. During this time, almost everyone gave their long legs the credit for their fast race times, be it Merlene Ottey or Irina Privalova, who both became the first women in the world to run the race in under seven seconds in Madrid on the 14 February 1992. Both were also winners at the INDOOR MEETING. Ottey won in 1995 and Privalova, who had meanwhile improved the still valid world record to 6.92 seconds, claimed victory in 1996. The 7.04 seconds she ran back then are still the Meeting record. From 2010 on, a German athlete, Verena Sailer, also joined the mix. The 100-metre European champion in Barcelona in 2010 has always been at the front of the race and was only defeated by Bulgarian Ivet Lalova through a photo finish at the Meeting in 2013. Both finished the race within the same time of 7.19 seconds. In 2014, she was then able to win at the INDOOR MEETING for the first time. Verena Sailer is no longer competing, having retired in 2015. It took as many as three INDOOR MEETINGs for a German female athlete to triumph again in 2018. Following Great Britain's Dina Asher Smith (7.12 seconds in 2015), the Netherlands' Dafne Schippers (7.08 seconds in 2016), and Jamaica's Gayan Evans (7.14 seconds in 2017), this year's winner was Tatjana Pinto, with 7.10 seconds, the starting shot for a great year. In addition to her victory at the INDOOR MEETING, she also secured the title of German Indoor Champion in the 60 and 200-metre races and the bronze medal in the 4 x 100-metre relay race at the European Championships in Berlin. In 2019, Ewa Swoboda won the women's race with the same time (7.10 seconds). In the most recent edition of women's 60 metres at last year's event, Maria Isabel Pérez from Spain managed to clinch victory. With a time of 7.21 seconds, she edged out Patrizia van der Weken from the Netherlands (7.26 seconds).
800 metresmore >>
Sound barrier two minutes
Maria Lurdes Mutola won the 800 metres four times at the INDOOR MEETING. The Olympic champion at the Sydney 2000 Games and many-time world champion outdoors and indoors also holds the meeting record, which has stood at 1:57.48 minutes since February 15th, 2004. In all her four victories in 2002, 2004, 2005 and 2008, the woman from Mozambique ran faster than two minutes and thus left her mark on this track like no other. However, already ten years before Mutola's meeting record, the two-minute mark was broken for the first time. The Romanian Ella Kovacs, also a three-time meeting winner, ran the four stadium laps in 1:59.66 minutes in 1994, her third meeting victory. A time that was only beaten by a hundredth of a second six years later by Natalya Tsyganova of Russia. German runners also excelled in the 800 metres at the INDOOR MEETING. Gabi Lesch, who won at the first meeting in 1985, was successful three times in total. Gabi Bußmann, Sigrun Grau and Christine Wachtel, as well as the last German winner, Heike Meißner, who won in 2001, were also celebrated in the 800 metres. The last time the women's 800 metres were on the agenda was at last year. The day's victory went to Uganda. Halimah Naakayi won with a time of 2:02.81 minutes.
3000 metresmore >>
3000 metres
Almost new, but already Cult
It is the longest distance at the INDOOR MEETING Karlsruhe: the women's 3,000-metre race. This competition has only been on the agenda at the Meeting since 2010 but has been met with great enthusiasm by the athletics-mad spectators in Karlsruhe who have been particularly attached to the long distance since its premier. That surely has a lot to do with Haile Gebrselassie's unforgettable runs for the men, but what the women have offered spectators since their first appearance in 2010 is not at all lacking. Since then, the 3,000-metres race at the INDOOR MEETING Karlsruhe has been among the most exciting events on the agenda. The last time the women ran the 3,000-metres was in 2021. The finish line was crossed at 8:41.98. This time was run by the reigning World record holder for the 3,000-metre steeplechase, Beatrice Chepkoech.
Triple Jumpmore >>
"Hop, Step, Jump"
In terms of technique, the triple jump probably belongs to the most difficult disciplines in athletics, because mastering the "hop", "step", and "jump" is anything but easy. But if they succeed, the best female athletes fly through the air for more than 15 meters. At the start of the millennium (2000 to 2006), the women's triple jump formed an integral part of the INDOOR MEETING's repertoire. Tatyana Lebedeva from Russia was the discipline's first winner, and she has managed to hold onto the indoor world record (15.36 meters) she set in Budapest since 2004. At 2019, Ana Peleteiro from Spain won the gold with 14.51 meters and at the last edition, in 2021, Liadagmis Povea from Cuba managed to clinch victory.
Shot Putmore >>
Strong women take centre stage
The women's shot put fixture in 2023 indicates that the discipline, which had previously only featured twice – namely in 2017 and 2021 – in the Meeting programme, is becoming increasingly established. The women's shot put is one of the most successful disciplines in Germany and around the world. In recent years, it has been names like Astrid Kumbernuss, who won Olympic gold in Atlanta in 1996 and was World Champion three times, that have dominated. Or Nadine Kleinert, who has chalked up a total of four silver and two bronze medals at the Olympic Games and World Championships. More recently, Christina Schwanitz caused quite a stir when she picked up the World Championship title in 2015 with a shot of 20.37 metres and was subsequently voted German Athlete of the Year. In recent years, Valerie Adams dominated global shot put until injury prevented her from competing. The New Zealander is the only female athlete ever to have achieved a throw of over 21 metres, following the era of questionable records from the 1980s. However, neither Adams nor Schwanitz triumphed at the Olympic Games in Rio. The gold medal went to US athlete Michelle Carter, with Valerie Adams winning silver after her break from the sport due to injury. Christina Schwanitz, who was also forced to withdraw from almost the entire season due to injury, only achieved sixth place in Rio. She recently caused a stir in her native Germany at the European Championships in 2018, where she won a silver medal with a throw of 19.19 metres. 2021, the most recent edition of the women´s shot put so far, Auriol Dongmo from Portugal won with 19,65 metres.
Out of tour
Long Jumpmore >>
Is it all about Heike?
For several years now, Karlsruhe has been the home of Heike Drechsler, whose successes could probably not be listed on just one sheet of paper. Only this much: Five Olympic medals, among them two gold medals for two Olympic victories in the long jump (1992 Barcelona and 2000 Sydney), two World Championship titles outdoors, also in the long jump (1983 and 1993), four outdoor titles in a row at European Championships (1986, 1990, 1994 and 1998) in the long jump and once European Championship gold in the 200 metres (1986), in addition to two World Championship titles indoors (long jump and 200 metres) plus four European Championship titles indoors in the long jump. In addition, she won countless German championship titles and, last but not least, won the long jump four times at the INDOOR MEETING (1993, 1994, 1995 and 2001). The fact that she has also held the meeting record with 7.06 metres since 1994 almost needs no further mention. Her best indoor performance is 7.37 metres which is a world record under the indoor roof. She is the most successful long jumper ever and still closely associated with the INDOOR MEETING. But also, in the recent past, the Karlsruhe athletics audience experienced great female athletes live in the hall. Above all, Olympic and world champion Malaika Mihambo, who was also named Germany's Sportswoman of the Year in 2019,20202 and 2021, is a welcome guest in Karlsruhe. In 2020, at the last edition of the women's long jump so far, her jump of 6.83 metres brought her second place behind Ukraine's Maryna Bekh-Romanchuk, who with 6.92 metres secured the day's victory and, in the end, also the overall victory of the World Indoor Tour.
60 metres records
Irina Privalova - 00:06,92 - RUS
11.02.1993, Madrid
EUROPEAN RECORD
Dina Asher-Smith - 00:07,04 - GBR
27.01.2023, Karlsruhe
800 metres records
Jolanda Ceplak - 01:55,82 - SWN
03.02.2002, Wien
Maria Lurdes Mutola - 01:57,48 - MOZ 10.02.2008, Karlsruhe
3.000 metres records
Genzebe Dibaba - 08:16,60 - ETH
06.02.2014, Stockholm
Laura Muir - 08:26,41 - GBR
Triple Jump Records
Yulimar Rojas - 15,74 - RUS
20.03.2022, Belgrad
Tatjana Lebedjewa - 15,36 - RUS
06.03.2004, Budapest
Yamile Aldama - 14,88 - SDN
Shot Put Records
Helena Fibingerova - 22,50 - CSSR
19.02.1977, Jablonec
Auriol Dongmo - 19.65 - POR
Long Jump Record
Heike Drechsler - 7,37 - GER
Disciplines Men
60 metres Hurdlesmore >>
60 metres Hurdles
The first winner was a decathlete
In 1986, the second year of the INDOOR MEETING, the men's 60-metre hurdles were on the programme for the first time. The first winner in this discipline was not a specialist, but a decathlete from Germany. Guido Kretschmar won with a time of 7.91 seconds. However, the victory of the man from Großheubach was not altogether surprising, as the hurdles were one of the speciality disciplines of the silver medallist in the decathlon at the 1976 Olympics in Montreal. Kretschmar was even the German champion several times in his youth - also over the hurdles. The boycott of the 1980 Olympics in Moscow most likely deprived him of an Olympic victory, as he had set a world record in the decathlon that year. However, over the short hurdle course, the specialists dominated in the following years. Above all, Colin Jackson. The Welshman, who won two world outdoor championships, one indoor title, and a silver medal at the 1988 Olympic Games in Seoul, became the European Outdoor Champion four times in a row. At the 1994 European Indoor Championships in Paris, he accomplished a historic double, winning both the 60-metres flat and over the hurdles. In addition, he still holds the world record of 7.30 seconds at this distance. Jackson, who won the meeting three times, set the tone for the hurdle sprint in the Europahalle, as did the Olympic champions, Liu Xiang (China), Dyron Robles (Cuba), Mark McKoy (Canada), and Allen Johnson (USA), who all left their mark in Karlsruhe. Johnson's meeting record of 7.38 seconds from 1995 has thus far withstood every challenge. Not even the French, Pascal Martinot-Lagarde, could come close to this time. He won at the last event of men's hurdles in 2022 with a time of 7.54 seconds.
Full sprint over two laps of the stadium
The 400 metre race is the longest sprint discipline that is held both in- and outdoors. It is also held as both the fifth discipline in the mens decathlon and as a relay competition. When the men run at full speed all the way, they complete the distance in an incredible time of 43 seconds outdoors and 45 seconds indoors. The current indoor world record is 44.57 seconds and was run in 2005 by the American Kerron Clement. From 2012 to 2019, INDOOR MEETING fans had to forego the men's 400 metres race. The same athlete won in both 2012 and 2019 – namely Pavel Maslak from the Czech Republic. In 2019, he won the race of two stadium laps in 46.78 seconds. 2021, in the latest edition of the 400 metre, Marvin Schlegel won in a time of 46,61 seconds.
1.500 metresmore >>
Baala´s French Homecoming
For almost a decade, Mehdi Baala was something of a permanent guest at the INDOOR MEETING. In addition, the man from nearby Strasbourg trained regularly in the Europahalle which made his performances almost like a home game – be it in the 800 metres, the 1000 metres or the 1500 metres, which he won three times. While he came second at his first start in 2000, he won each of the following two years. His greatest success came exactly nine years after his debut. In his third meeting victory over 1500 metres in 2009, he stormed to the finish in 3:34.71 minutes. At that time, this was not only the best performance of the year in Europe but also a new French indoor record. Twice (2002 in Munich and 2006 in Gothenburg) he became a European outdoor champion, in 2003 in Paris at the home World Championships he won the silver medal and at the Olympic Games in Beijing he was awarded the bronze medal, retrospectively because the original winner Rashid Ramzi was convicted of doping. Since 2010, the 1,500-metre middle distance has belonged entirely to Kenyan athletes, with Gideon Gathimba, Bethwel Birgen (three times), Nixon Chepseba and Silas Kiplagat and Vincent Kibet winning seven of the nine races since then. The current meeting record is also held by a Kenyan for that matter. In 2005, Daniel Kipchirchir Komen crossed the finish line in 3:33.08 minutes, a time that is still unmatched today.
Haile´s world
"More than 5,500 people are stomping and screaming their lungs out, the drums dully pound out a rhythm that draws in the crowd, a fresh breeze blows in from the open roof, and it isn't summer and we're not at the carnival in Rio. It is January, it is cold outside, and it takes quite a bit of imagination to explain to someone who happens to be visiting the city why the hall's roof should be open. You shouldn't even bother trying to explain why the 5,500 people inside are creating such infernal noise, but perhaps try using a name. It might be a bit of a tongue twister, but at least well known to those with ties to athletics and even more to those who know that the absolute greatest is a little man from Ethiopia who goes by the name Haile Gebrselassie." These are the opening lines of a text that appeared in the publication SONNTAG on January 17, 1999, referring to the highlight event at the 15th INDOOR MEETING KARLSRUHE. The 3,000 meters with the Ethiopian running legend Haile Gebrselassie, who won this race a total of five times at the Europahalle (1997,1998, 1999, 2003, and 2004), once with a new world record. Of course, the two-time 10,000 meter Olympic champion's time of 7:26.15 minutes in 1998 continues to represent a Meeting record. And the 3,000 meters is a cult stretch, because Dieter Baumann, two-time winner of this race, also set a European Meeting record in 1995 with a time of 7:37.51 minutes. A time which has held up as the German indoor record. At every edition of the 3,000 meters, the atmosphere in Karlsruhe is consistently high. It wasn't any different in the new stadium, where athletes competed in the medium-distance event in 2015, 2016, 2018,2020 and 2022. In 2022, Berihu Aregawi from Ethiopia won in a time of 7:26.20 minutes.
Pole Vaultmore >>
In Lobinger´s living room
When someone has won seven times at the same event, he can certainly call this venue his "living room". Tim Lobinger has accomplished the feat of winning the pole vault competition in the Europahalle seven times in a period of eleven years. On February 14th, 1997 he stood at the top of the podium for the first time. His last meeting victory dates back to February 10th, 2008, with successes in 1999, 2001, 2002, 2004 and 2005 in between. One thing, however, was denied to him: the meeting record remained unattainable for the man who in 1997 was the first German pole vaulter to clear the magic six-metre mark outdoors. For many years it was held by Sergei Bubka with 5.80 metres, which he cleared in his victory in 1991. A record that was set by Michael Stolle in 1998, but which was only beaten in 2013 by the French Olympic champion at the London Games, Renaud Lavillenie, with 5.83 metres. However, in 2015 (5.86 metres) and 2016 with a leap of 5.91 metres, Lavillenie equalled the meeting record he had set himself in 2013. He also managed to do so in 2021 (5.95 metres). This record stood only for one year. At the last edition of the men´s pole vault Armand Duplantis from Sweden equalled the meeting record from Lavillenie with a jump over 6.03 metres.
60 metres Hurdles Records
Grant Holloway - 00:07,29 - USA
Lamont Marcell Jacobs - 00:06,41 - ITA
Allen Johnson - 00:07,38 - USA
Kerron Clement - 44:57 - USA
13.03.2005, Fayetteville
Thomas Schönlebe - 45,05 - DDR
05.02.1988, Sindelfingen
Jakob Ingebrigsen - 03:30,60 - NOR
17.02.2022, Liévin
Daniel Komen - 03:33,08 - KEN 13.02.2005, Karlsruhe
Daniel Komen - 07:24,90 - KEN
Adel Mechaal - 07:30,82 - ESP
06.02.2022, New York
Haile Gebreselassie - 07:26,15 - ETH
Pole Vault Records
Armand Duplantis - 6.20 - SWE
Results 2022 until 2018
Here you can find all results of the INDOOR MEETING Karlsruhe from 2022 until 2018.
...to the results
Um die Smart Mobility Map nutzen zu können müssen die entsprechenden Cookies im Cookie-Hinweis aktiviert werden.
Smart Mobility Map - powered by raumobil
webdesign + web development | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The process to sync PC desktops across multiple PCs is quick and easy to do.
A Windows desktop is like a view into a user's computing soul. There are users who like to keep their desktop clean and ready as a primary workspace, with little, if any, clutter or color. Then there are users who use their desktop as a repository of everything they do, see, or need from their computer.
Today's How-To is directed at the users who feel lost when moving from one PC to another because their links and digital life has to move and adjust each time they do. Now, with just a little planning and fore-thought, a desktop packrat can sync their digital life through the cloud and feel at home on any configured PC.
In order to make this work, you will need a Windows PC with either Windows 8.1 or any version of XP, Vista, or Windows 7 along with a cloud-syncing service like SkyDrive, Google Drive, or others.
For the purposes of the primary example, we will use Microsoft's SkyDrive as it is available on most Microsoft operating systems and is easily available to anyone who has a PC.
First, locate your SkyDrive folder and create a new folder inside. You can name the folder anything that is easily identified as your new synced desktop.
Now, access File Explorer. In Windows 8.1, open the This PC and find your desktop folder or on other Windows OS versions follow the file tree of Computer > Users > [your PC username] > Desktop.
Open up the Properties menu for the Desktop folder by right-clicking.
From the locations tab, select Move..., which will open a new menu.
In the new menu, select the folder that was recently created in your SkyDrive folder.
Click Apply and allow Windows to move everything to the new folder.
Once this is complete, your desktop files should now be located within the new folder on your SkyDrive and available to other PCs through the cloud.
Now that you have located your primary desktop on your SkyDrive or cloud account, you have the ability to connect to these files from any cloud-enabled PC. The process is simple to add new PC by simply repeating the steps used to create the primary cloud desktop and making sure to point each new PC to the same cloud-drive desktop folder.
In order to make sure all of your links and programs are compatible with this new change, you will have to make sure that programs and files are located or installed in the same locations on each PC. In most cases, this will not be an issue, but be aware that cloud-saved shortcuts will use the same file pathway across all PCs and will not work if programs or files are not where they should be. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Telethon cannot forward message even "sensitive_enabled" is disabled I'm using Telethon to forward messages from A group to B channel. But some of the documents were not able to be forwarded with the following log:
restriction_reason=[
RestrictionReason(platform='ios',
reason='porn', text="This message couldn't be displayed on your device because it contains pornographic materials.")
]
So I use functions.account.GetContentSettingsRequest() to check my setting and here is the result:
ContentSettings(sensitive_enabled=False, sensitive_can_change=True)
I looks like the sensitive content lock has been disabled, but how can I still get this restriction message?
Does someone encounter the same problem?
A: Other than the settings for sensitive content, Telegram abides by local laws as well. So if your number belongs to a country or area that forbids porn content, Telegram will block such content for your account. Also any channels or groups created by that number and publishing illegal content will be closed.
So if you're forwarding a message that is known as a porn content to a destination account with a number belonging to an area with laws against porn, that message won't be shown for that destination.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
/*
*.intro: A simple dump program for dynamic ELF executables.
*
* This program was thrown together in order to extract some information
* from ELF executables. It should not be take as an example of good
* style.
*/
#include <stdio.h> /* fprintf, sprintf */
#include <stdlib.h> /* EXIT_SUCCESS, EXIT_FAILURE */
#include <sys/types.h> /* waitpid, open */
#include <fcntl.h> /* O_RDONLY */
#include <assert.h> /* assert */
#include <sys/stat.h> /* stat */
#include <unistd.h> /* read, stat */
#include <errno.h> /* errno */
#include <string.h> /* strerror */
#include <elf.h>
static int fd;
static char const *program_name;
static char const *elf_file_name;
static char *file_contents;
static char **symbol_names;
static Elf32_Shdr *symbol_table_header;
static Elf32_Shdr *hash_table_header;
static Elf32_Shdr *string_table_header;
static Elf32_Shdr *dynamic_table_header;
static Elf32_Shdr *plt_header;
static void usage(void)
{
fprintf(stderr, "%s: executable\n", program_name);
}
static int display_type(Elf32_Half type)
{
switch(type) {
case ET_NONE:
printf(" NONE");
break;
case ET_REL:
printf(" relocatable");
break;
case ET_EXEC:
printf("executable");
break;
case ET_DYN:
printf("shared object");
break;
case ET_CORE:
printf("core");
break;
case ET_LOPROC:
printf("processor specific LO type");
break;
case ET_HIPROC:
printf("processor specific HI type");
break;
default:
printf("UNKNOWN");
}
return EXIT_SUCCESS;
}
static char const *locate_section_header_string(Elf32_Word name)
{
const Elf32_Ehdr *h = (Elf32_Ehdr *)file_contents;
const Elf32_Shdr *shs = (Elf32_Shdr *)&file_contents[h->e_shoff];
const Elf32_Shdr *sh = &shs[h->e_shstrndx];
if (h->e_shstrndx == 0) {
return "NONE";
} else {
const char *st = &file_contents[sh->sh_offset];
return &st[name];
}
}
static void locate_table_headers(void)
{
Elf32_Ehdr * h = (Elf32_Ehdr *)file_contents;
size_t max = h->e_shnum;
size_t n;
for (n = 1; n < max; n += 1) {
Elf32_Shdr * sh = (Elf32_Shdr *)&file_contents[h->e_shoff+n*h->e_shentsize];
const char *name = locate_section_header_string(sh->sh_name);
printf("TYPE %d NAME %s o %u\n", sh->sh_type, name, sh->sh_offset);
switch (sh->sh_type) {
case SHT_HASH:
// sh->sh_link is index of symbol table.
assert(sh->sh_link <= h->e_shnum);
printf("HASHTAB %u\n", n);
symbol_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff + sh->sh_link*h->e_shentsize];
printf("SYMTAB %d\n", sh->sh_link);
hash_table_header = sh;
assert(symbol_table_header->sh_link <= h->e_shnum);
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
printf("STRTAB %d\n", symbol_table_header->sh_link);
return;
case SHT_SYMTAB:
// sh->sh_link is index of string table.
if (!symbol_table_header) {
symbol_table_header = sh;
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
}
break;
case SHT_DYNSYM:
// sh->sh_link is index of string table.
symbol_table_header = sh;
string_table_header = (Elf32_Shdr *)&file_contents[h->e_shoff+symbol_table_header->sh_link*h->e_shentsize];
break;
case SHT_STRTAB:
if (!string_table_header)
string_table_header = sh;
break;
case SHT_PROGBITS:
if (strcmp(name, ".plt") == 0)
plt_header = sh;
break;
case SHT_DYNAMIC:
dynamic_table_header = sh;
break;
}
}
}
static char const * locate_string(Elf32_Word name)
{
char const * string;
static char const * string_table;
assert(string_table_header);
string_table= &file_contents[string_table_header->sh_offset];
assert(name < string_table_header->sh_size);
string= &string_table[name];
assert(string);
return string;
}
static unsigned long elf_hash(const char *name)
{
const unsigned char *n = (const unsigned char *)name;
unsigned long h = 0, g;
while (*n != 0) {
h = (h<<4) + *n++;
if ((g= h&0xf0000000) != 0) {
h ^= g>>24;
h ^= g;
}
}
return h;
}
static int display_symbols(void)
{
for (; *symbol_names; symbol_names+=1) {
printf("XXX %s=%lu\n", *symbol_names,
elf_hash(*symbol_names));
}
return EXIT_SUCCESS;
}
static int display_symbol_table(void)
{
Elf32_Sym * symbol;
size_t n;
size_t i;
size_t func = 1;
if (!symbol_table_header)
return EXIT_SUCCESS;
symbol= (Elf32_Sym *)&file_contents[symbol_table_header->sh_offset];
n= symbol_table_header->sh_size;
assert(n%sizeof(Elf32_Sym) == 0);
printf("SYMSIZE= %d, %x\n", sizeof(Elf32_Sym), sizeof(Elf32_Sym));
for (i= 1; n != 0; n-=sizeof(Elf32_Sym), i+=1, symbol+=1) {
printf("SYM%u (%p) name=%u (%s), addr=%x, size=%u, bind=%u, type=%u, other=%x, shndx=%u\n",
i, symbol, symbol->st_name,
locate_string(symbol->st_name),
symbol->st_value,
symbol->st_size,
(unsigned int)ELF32_ST_BIND(symbol->st_info),
(unsigned int)ELF32_ST_TYPE(symbol->st_info),
(unsigned int)symbol->st_other,
symbol->st_shndx);
if (ELF32_ST_TYPE(symbol->st_info) == STT_FUNC) {
if ((symbol->st_value == 0) && plt_header) {
printf("PLT addr %x\n", plt_header->sh_addr + func*plt_header->sh_addralign);
}
func += 1;
}
}
return EXIT_SUCCESS;
}
static int display_dynamic_table(void)
{
Elf32_Dyn *d;
size_t n;
size_t i;
if (!dynamic_table_header)
return EXIT_SUCCESS;
d = (Elf32_Dyn *)&file_contents[dynamic_table_header->sh_offset];
n = dynamic_table_header->sh_size;
assert(sizeof(*d) == dynamic_table_header->sh_entsize);
assert(n%sizeof(*d) == 0);
for (i = 1; n != 0; n -= sizeof(*d), i += 1, d += 1) {
printf("DYN%u tag %u val %u %x\n", i, d->d_tag, d->d_un.d_val, d->d_un.d_val);
}
return EXIT_SUCCESS;
}
static int display_section_headers(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
if (h->e_shoff == 0) {
} else {
size_t max= h->e_shnum;
size_t n;
for (n= 1; n < max; n += 1) {
Elf32_Shdr * sh= (Elf32_Shdr *)&file_contents[h->e_shoff+n*h->e_shentsize];
printf("S%u sh_name= %u (%s)\n", n, sh->sh_name, locate_section_header_string(sh->sh_name));
printf("S%u sh_type= %u\n", n, sh->sh_type);
printf("S%u sh_flags= %x\n", n, sh->sh_flags);
printf("S%u sh_addr= %x\n", n, sh->sh_addr);
printf("S%u sh_offset= %u\n", n, sh->sh_offset);
printf("S%u sh_size= %u\n", n, sh->sh_size);
printf("S%u sh_link= %u\n", n, sh->sh_link);
printf("S%u sh_info= %u\n", n, sh->sh_info);
printf("S%u sh_addralign= %x\n", n, sh->sh_addralign);
printf("S%u sh_entsize= %u\n", n, sh->sh_entsize);
}
}
return EXIT_SUCCESS;
}
static int display_program_headers(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
if (h->e_phoff == 0) {
} else {
size_t max= h->e_phnum;
size_t n;
for (n= 0; n < max; n += 1) {
Elf32_Phdr * ph= (Elf32_Phdr *)&file_contents[h->e_phoff+n*h->e_phentsize];
printf("P%u type %u ", n, ph->p_type);
printf("offset %u ", ph->p_offset);
printf("vaddr %x ", ph->p_vaddr);
printf("filesz %u ", ph->p_filesz);
printf("memsz %u ", ph->p_memsz);
printf("flags %x ", ph->p_flags);
printf("align %x\n", ph->p_align);
}
}
return EXIT_SUCCESS;
}
static int display_header(void)
{
Elf32_Ehdr * h= (Elf32_Ehdr *)file_contents;
printf("E type= %d (", h->e_type);
display_type(h->e_type); printf(")\n");
printf("E phentsize= %u\n", h->e_phentsize);
printf("E phnum= %u\n", h->e_phnum);
printf("E shentsize= %u\n", h->e_shentsize);
printf("E shnum= %u\n", h->e_shnum);
printf("E shstrndx= %u\n", h->e_shstrndx);
return EXIT_SUCCESS;
}
static int debug(void)
{
struct stat st;
if ((fd= open(elf_file_name, O_RDONLY)) < 0) {
fprintf(stderr, "%s: could not open %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_open_executable;
}
if (fstat(fd, &st) < 0) {
fprintf(stderr, "%s: could not determine size of %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_stat_file;
}
if ((file_contents= malloc(st.st_size)) == (void *)0) {
fprintf(stderr, "%s: could not malloc due to %s\n", program_name, strerror(errno));
goto could_not_malloc;
}
if (read(fd, file_contents, st.st_size) != st.st_size) {
fprintf(stderr, "%s: could not read %s header due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_read_file;
}
if (display_header () == EXIT_FAILURE)
goto could_not_display_header;
locate_table_headers();
if (display_program_headers() == EXIT_FAILURE)
goto could_not_display_program_headers;
if (display_section_headers() == EXIT_FAILURE)
goto could_not_display_section_headers;
if (display_symbol_table() == EXIT_FAILURE)
goto could_not_display_symbol_table;
if (display_dynamic_table() == EXIT_FAILURE)
goto could_not_display_dynamic_table;
if (display_symbols() == EXIT_FAILURE)
goto could_not_display_symbols;
free(file_contents);
if ((fd= close(fd)) < 0) {
fprintf(stderr, "%s: could not close %s due to %s\n", program_name, elf_file_name, strerror(errno));
goto could_not_close_executable;
}
return EXIT_SUCCESS;
could_not_display_symbols:
could_not_display_dynamic_table:
could_not_display_symbol_table:
could_not_display_section_headers:
could_not_display_program_headers:
could_not_display_header:
could_not_read_file:
could_not_malloc:
free(file_contents);
could_not_stat_file:
(void)close(fd);
could_not_open_executable:
could_not_close_executable:
return EXIT_FAILURE;
}
int main(int argc, char **argv)
{
program_name= argv[0];
while (++argv, --argc != 0 && argv[0][0] == '-') {
switch(argv[0][1]) {
default:
usage();
return EXIT_FAILURE;
}
}
if (argc == 0) {
usage();
return EXIT_FAILURE;
}
elf_file_name = argv[0];
symbol_names = argv+1;
return debug();
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
The entire community of the underground rap world was shocked when Gustav Åhr, known as Lil Peep released part 2 of "Come Over When You're Sober", his debut studio album on Nov 9. Tragically, Lil Peep's life was cut short after taking Xanax that was cut with fentanyl on Nov 15, 2017. With his devoted fans grieving his sudden death, Lil Peep's management decided to release previously unreleased music. His first song released included Spotlight, which features Marshmello, an American music producer. Lil Peep's management later released the first snippet of his song Falling Down, also featuring the late rapper XXXtentacion. The album was announced to be released Nov 9 and has been a huge success across social media and musical charts.
It made me feel so happy to hear that they were releasing the second part of Come Over When You're Sober Pt 2. The album cover revealed one of the most recent pictures of him and included his various drawings, which gave the album some of Lil Peep's personality.
Being a diehard fan of Lil Peep, I kept listening to the singles leading up to the second part of the album. I found myself playing his songs five times in a row, and constantly panned over the music videos each time. Each video possessed something much more than art; it possessed identity. Even if this was a first-time listener hearing Lil Peep, they could get a feel for the type of person he was just by watching those three minutes: a loving individual who didn't feel confident about themselves, a series of heart breaks, abuse, and mental illness.
My favorite part of Come Over When You're Sober Pt 2 had to be Lil Peep's ability to experiment with a new sound and style. Lil Peep always had a relative popular following, but it really kicked off after the release of part 1 of Come Over When You're Sober. Having that relatively small following granted him the ability to produce a new style of music which I loved, whether it's using more guitar strings in his instrumentals or demonstrating his vocal range, there's always something new to find each time the album plays. The lyrics were very personal, and I found myself starting to tear up at some songs. Some of my favorite songs from the album include but are not limited to Cry Alone, 16 Lines, White Girl, IDGAF, Fingers, and Runaway.
I also appreciated the release of the album on many different formats such as CD, vinyl, cassette, and various bundles involving these two. Lil Peep's management also released merchandise that Lil Peep designed, since he loved to draw and make merchandise whenever he could. The LP version includes various art he produced throughout the inside of the LP cover, paying an homage to his creative personality.
The only thing I didn't like about the album is that it'll probably be the last album we see of Lil Peep. As a listener, we can't be sure how much unreleased music he has, but the fact Come Over When You're Sober Pt 2 has the chance of being the last album made me come to the sad reality that he's been gone for almost a year. I would rate the album 10/10.
A piece of artwork created by DJ Diabetes in memorial of his death. Lil Peep, his real name Gustav Ahr, died Nov 15, 2017. His death shocked many fans. | {
"redpajama_set_name": "RedPajamaC4"
} |
Last week, Chris Grayling, the minister of justice in the Conservative/Liberal Democrat government, announced plans to privatise 70 percent of the Probation Service in the UK, to be completed by spring 2015.
The reality is a massive boon to big business. Large multinational private companies such as Serco, G4S, and Sodexo, which have the infrastructure to bid for the proposed contracts based on larger geographical areas such as Greater Manchester or London and payment by results, will outbid any voluntary organisations and charities, despite the latter being offered £500,000 to bid.
With a budget of £4 billion for prisons and Offender Management, this means rich pickings for these companies.
The responsibility for public protection and high-risk offenders, who demand more resources, and suitably skilled, experienced, and qualified staff, will be supervised by a much-reduced Probation Service. Parole and court reports, risk assessments, and handling the breaching of court orders will also be retained by the Probation Service.
The areas open to privatisation are Community Payback (unpaid work in the community introduced by the previous Labour government), Approved Premises (probation hostels), Electronic Monitoring (curfew with tagging), Support Services, Attendance Centres, victim work, accredited rehabilitation programmes, Specified Activity Requirements, and the supervision and management of low risk of harm offenders, including supervision on release from prison.
Grayling also announced that offenders serving less than 12 months' custody (who have the highest recidivism rates, as they are currently not supervised by anybody) will now be supervised via the new contracts, adding 60,000 to the 240,000 a year already supervised by the Probation Service.
All future prisons will be private.
A new 2,000-place super prison, along with four new mini-prisons, will be built to replace seven older establishments that will close in the next three months. Bullwood Hall in Essex, Canterbury, Gloucester, Kingston in Portsmouth, Shepton Mallet in Somerset and Shrewsbury will all close by March, along with Camp Hill prison on the Isle of Wight. Cells in Chelmsford and Hull will also be decommissioned, with the total loss of 2,800 prison places.
The closures come after the G4S-run Oakwood Prison in Featherstone near Wolverhampton opened last year. The Oakwood facility has places for up to 1,605 prisoners at an annual cost of £13,200 per place, compared with up to £50,000 in some of the older prisons, according to the Daily Telegraph.
Workers will be forced to accept worse conditions as private companies win contracts by putting in the lowest bid. They will be made redundant by the Prison and Probation Services, or they will be TUPE'd (Transfer of Undertakings [Protection of Employment] Regulations 2006) over to these companies.
With the agreement of the main unions, Napo (National Association of Probation Officers), UNISON and the POA (Prison Officer's Association), workers will be entitled to two years with the same conditions as previously but will then be reduced to those of the new employer.
However, what is more likely is that workers will be forced to sign new, less favourable contracts. This is true in other privatised sectors, such as that being prepared via a consortium set up in the South West of England of 19 National Health Service Trusts, for the 60,000 NHS staff in that area.
On January 16, Napo called on its more than 9,000 members to attend a "series of [Ministry of Justice] sponsored consultative events on the Transforming Rehabilitation proposals" over the next weeks to "ensure a strong Napo presence".
The cuts in probation are rather being carried out as part of a programme of mass austerity, supported by the Conservatives, Liberal and Labour, aimed at clawing back every gain won by the working class over decades of struggle. Workers in the public sector can only combat these attacks by linking up their struggles and forming action committees, independently of the unions, and by rejecting bankrupt appeals to parliament, the government or the Labour Party. | {
"redpajama_set_name": "RedPajamaC4"
} |
Definition - What does OB/GYN (Obstetrician Gynecologist) mean?
OB/GYN is the abbreviation for obstetrics and gynecology, the name of the profession of doctors who focus on the care of the female reproductive system and the management of pregnancy.
OB/GYNs can generally provide information on fertility and conception, but are likely to refer to a fertility specialist (such as a reproductive endocrinologist) if a patient has a diagnosed condition know to cause infertility, have tried to conceive unsuccessfully for 12 months, or are 35 years or older. A fertility specialist is an OB/GYN with additional training in fertility issues. | {
"redpajama_set_name": "RedPajamaC4"
} |
package fr.bouyguestelecom.sample;
import android.content.ComponentName;
import android.content.Context;
import android.content.Intent;
import android.content.ServiceConnection;
import android.content.pm.PackageManager;
import android.content.pm.ResolveInfo;
import android.graphics.Color;
import android.graphics.Rect;
import android.os.Bundle;
import android.os.Handler;
import android.os.IBinder;
import android.os.Message;
import android.os.RemoteException;
import android.support.v7.app.ActionBarActivity;
import android.text.Editable;
import android.util.DisplayMetrics;
import android.util.Log;
import android.view.Display;
import android.view.KeyEvent;
import android.view.View;
import android.widget.Button;
import android.widget.EditText;
import android.widget.LinearLayout;
import android.widget.TextView;
import java.lang.ref.WeakReference;
import java.util.ArrayList;
import java.util.List;
import fr.bouyguestelecom.tv.ISecuredPlayer;
import fr.bouyguestelecom.tv.cas.ICAS;
import fr.bouyguestelecom.tv.datatypes.AudioLanguage;
import fr.bouyguestelecom.tv.datatypes.Subtitle;
import fr.bouyguestelecom.tv.enumerators.CASError;
import fr.bouyguestelecom.tv.enumerators.CASUniverse;
import fr.bouyguestelecom.tv.enumerators.PlayerErrorCode;
import fr.bouyguestelecom.tv.enumerators.PlayerState;
import fr.bouyguestelecom.tv.enumerators.StreamError;
import fr.bouyguestelecom.tv.middleware.IBytelMiddlewareService;
import fr.bouyguestelecom.tv.middleware.ViperSettings;
import fr.bouyguestelecom.tv.middleware.ViperSettingsType;
import fr.bouyguestelecom.tv.playermanager.IPlayer;
import fr.bouyguestelecom.tv.playermanager.IPlayerCallback;
import fr.bouyguestelecom.tv.playermanager.IPlayerManager;
public class OpenApiTestAppActivity extends ActionBarActivity {
public class Channel {
private String name;
private String url;
public Channel (String n, String u) {
name = n;
url = u;
}
public String getName() {return name;}
public String getUrl() {return url;}
};
private static final String TAG = "OpenApiTestAppActivity";
private static final int SEEK_JUMP_SEC = 30;
private boolean mBound = false;
private IPlayerManager mPlayerManager;
private ICAS mCAS;
private IPlayer mPlayer;
private IBytelMiddlewareService _bytelMiddlewareService;
private int screenHeight;
private int screenWidth;
public static class MyHandler extends Handler {
private final WeakReference<OpenApiTestAppActivity> mActivity;
public MyHandler(OpenApiTestAppActivity activity) {
mActivity = new WeakReference<>(activity);
}
@Override
public void handleMessage(Message msg) {
OpenApiTestAppActivity activity = mActivity.get();
PlayerErrorCode errorCode = (PlayerErrorCode)msg.obj;
if (activity != null) {
if (errorCode != null) {
String resultString = "OK";
if (errorCode != PlayerErrorCode.PLAYER_NO_ERROR) {
resultString = printErrorCode(errorCode);
}
activity.getTxtInfo().setText("Subtitles: "+resultString);
}
}
}
}
private final MyHandler mHandler = new MyHandler(this);
private Button btnGetProfileRtp;
private Button btnPlayExplicitIp;
private Button btnPlayCanalPlusSD;
private Button btnPlayCanalPlusHD;
private Button btnPlayCanalCinemaSD;
private Button btnPlayCanalCinemaHD;
private Button btnPlayTF1HD;
private Button btnPlayM6HD;
private Button btnPlayDorcelHD;
private Button btnPlayXXLHD;
private Button btnPlayRtp;
private Button btnPlayRtpAdult;
private Button btnPlayRtpNoRights;
private Button btnPlayHls;
private Button btnPlayVod;
private Button btnPlayMedia;
private Button btnStop;
private Button btnSeek;
private Button btnMoveResize;
private Button btnResize;
private Button btnMove;
private Button btnGetState;
private Button btnUnlockMorality;
private Button btnGetAvailableLanguages;
private Button btnGetCurrentLanguage;
private Button btnSetCurrentLanguage;
private Button btnGetAvailableSubtitles;
private Button btnGetCurrentSubtitle;
private Button btnSetCurrentSubtitle;
private Button btnShowSubtitles;
private Button btnGetSpeed;
private Button btnGetCurrentPosition;
private Button btnGetDuration;
private Button btnGetUniverse;
private Button btnSetUniverse;
private Button btnGetPlaneSize;
private EditText mEditText;
private SubtitleLayout mSubtitle;
public TextView getTxtInfo() {
return txtInfo;
}
private TextView txtInfo;
private TextView txtCallbackState;
private LinearLayout mainLinearLayout;
private Subtitle[] availableSubtitlesArray = null;
private int currentSubtitleIndex = 0;
int callbackTest1Counter;
private boolean resized = false;
private boolean moved = false;
private int hlsStreamsCounter = 0;
private List<Channel> hlsStreams;
private int rtpStreamsCounter = 0;
private List<Channel> rtpStreams;
private int vodStreamsCounter = 0;
private List<String> vodStreams;
private int fileStreamsCounter = 0;
private List<String> fileStreams;
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_open_api_test_app);
// bind onCreate, unbind onDestroy
bindService();
mainLinearLayout = (LinearLayout) findViewById(R.id.mainLinearLayout);
btnGetProfileRtp = (Button) findViewById(R.id.btnGetProfileRtp);
btnPlayExplicitIp = (Button) findViewById(R.id.btnPlayIp);
btnPlayCanalPlusSD = (Button) findViewById(R.id.btnPlayCanalPlusSD);
btnPlayCanalPlusHD = (Button) findViewById(R.id.btnPlayCanalPlusHD);
btnPlayCanalCinemaSD = (Button) findViewById(R.id.btnPlayCanalCinemaSD);
btnPlayCanalCinemaHD = (Button) findViewById(R.id.btnPlayCanalCinemaHD);
btnPlayTF1HD = (Button) findViewById(R.id.btnPlayTF1HD);
btnPlayM6HD = (Button) findViewById(R.id.btnPlayM6HD);
btnPlayDorcelHD = (Button) findViewById(R.id.btnPlayDorcelHD);
btnPlayXXLHD = (Button) findViewById(R.id.btnPlayXXLHD);
btnPlayRtp = (Button) findViewById(R.id.btnPlayRtp);
btnPlayRtpAdult = (Button) findViewById(R.id.btnPlayRtpAdult);
btnPlayRtpNoRights = (Button) findViewById(R.id.btnPlayRtpNoRights);
btnPlayHls = (Button) findViewById(R.id.btnPlayHls);
btnPlayVod = (Button) findViewById(R.id.btnPlayVod);
btnPlayMedia = (Button) findViewById(R.id.btnPlayMedia);
btnStop = (Button) findViewById(R.id.btnStop);
btnSeek = (Button) findViewById(R.id.btnSeek);
btnMoveResize = (Button) findViewById(R.id.btnMoveResize);
btnResize = (Button) findViewById(R.id.btnResize);
btnMove = (Button) findViewById(R.id.btnMove);
btnGetState = (Button) findViewById(R.id.btnGetState);
btnGetAvailableLanguages = (Button) findViewById(R.id.btnGetAvailableLanguages);
btnGetCurrentLanguage = (Button) findViewById(R.id.btnGetCurrentLanguage);
btnSetCurrentLanguage = (Button) findViewById(R.id.btnSetCurrentLanguage);
btnUnlockMorality = (Button) findViewById(R.id.btnUnlockMorality);
btnGetAvailableSubtitles = (Button) findViewById(R.id.btnGetAvailableSubtitles);
btnGetCurrentSubtitle = (Button) findViewById(R.id.btnGetCurrentSubtitle);
btnSetCurrentSubtitle = (Button) findViewById(R.id.btnSetCurrentSubtitle);
btnShowSubtitles = (Button) findViewById(R.id.btnShowSubtitles);
btnGetSpeed = (Button) findViewById(R.id.btnGetSpeed);
btnGetCurrentPosition = (Button) findViewById(R.id.btnGetCurrentPosition);
btnGetDuration = (Button) findViewById(R.id.btnGetDuration);
btnGetUniverse = (Button) findViewById(R.id.btnGetUniverse);
btnSetUniverse = (Button) findViewById(R.id.btnSetUniverse);
btnGetPlaneSize = (Button) findViewById(R.id.btnGetPlaneSize);
mEditText = (EditText) findViewById(R.id.editPlayIp);
mSubtitle = (SubtitleLayout) findViewById(R.id.subtitle_Layout);
txtInfo = (TextView) findViewById(R.id.txtInfo);
txtCallbackState = (TextView) findViewById(R.id.txtCallbackState);
resized = false;
moved = false;
btnPlayRtp.setFocusable(true);
btnPlayRtp.setFocusableInTouchMode(true);
btnPlayRtp.requestFocus();
callbackTest1Counter = 0;
DisplayMetrics metrics = new DisplayMetrics();
Display display = getWindowManager().getDefaultDisplay();
display.getMetrics(metrics);
screenWidth = metrics.widthPixels;
screenHeight = metrics.heightPixels;
try {
if (mBound) {
mPlayer.resize(screenWidth, screenHeight);
} else {
Log.d(TAG, "Not bound to OpenApi in resize");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on resize");
e.printStackTrace();
}
String separator = getResources().getString(R.string.separator);
String[] properties;
vodStreams = new ArrayList<>();
String[] vod_list = getResources().getStringArray(R.array.vod_list);
for(String item : vod_list){
vodStreams.add(item);
}
fileStreams = new ArrayList<>();
String[] file_list = getResources().getStringArray(R.array.file_list);
for(String item : file_list){
fileStreams.add(item);
}
hlsStreams = new ArrayList<>();
String[] hls_list = getResources().getStringArray(R.array.hls_list);
for(String item : hls_list){
properties = item.split(separator);
hlsStreams.add(new Channel(properties[0], properties[1]));
}
rtpStreams = new ArrayList<>();
String[] rtp_list = getResources().getStringArray(R.array.rtp_list);
for(String item : rtp_list){
properties = item.split(separator);
rtpStreams.add(new Channel(properties[0], properties[1]));
}
btnGetProfileRtp.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
if (_bytelMiddlewareService != null) {
ViperSettings mViperSettings = null;
Log.d(TAG, "Get Profile");
try {
mViperSettings = _bytelMiddlewareService.getViperSettings(ViperSettingsType.VIPER_SETTINGS_STREAM);
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on get Viper settings");
e.printStackTrace();
}
txtInfo.setText("Profile : " + mViperSettings.getStream().getTvProfile() + " Bandwidth : " + mViperSettings.getStream().getDownstreamCurrent());
} else {
Log.d(TAG, "Not connected to Bytel Middleware");
}
}
});
btnPlayCanalPlusSD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play CANAL+ SD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.CanalPlusSD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play CANAL+ SD");
e.printStackTrace();
}
}
});
btnPlayCanalPlusHD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play CANAL+ HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.CanalPlusHD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play CANAL+ HD");
e.printStackTrace();
}
}
});
btnPlayCanalCinemaSD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play CANAL+ CINEMA SD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.CanalCinemaSD), 0);
txtInfo.setText("Play: "+printErrorCode(result));
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play CANAL+ CINEMA SD");
e.printStackTrace();
}
}
});
btnPlayCanalCinemaHD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play CANAL+ CINEMA HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.CanalCinemaHD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play CANAL+ CINEMA HD");
e.printStackTrace();
}
}
});
btnPlayTF1HD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play TF1 HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.TF1HD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play TF1 HD");
e.printStackTrace();
}
}
});
btnPlayM6HD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play ARTE HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.M6HD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play ARTE HD");
e.printStackTrace();
}
}
});
btnPlayDorcelHD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play DORCEL HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.DorcelHD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play DORCEL HD");
e.printStackTrace();
}
}
});
btnPlayXXLHD.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play XXL HD");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.XXLHD), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play XXL HD");
e.printStackTrace();
}
}
});
btnPlayRtpAdult.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play rtp Adulte");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.RtpAdult), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play Adulte live stream: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play rtp adulte");
e.printStackTrace();
}
}
});
btnPlayRtpNoRights.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play rtp no rights");
PlayerErrorCode result = mPlayer.play(getResources().getString(R.string.RtpNoRights), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play no subscribe stream: "+printErrorCode(result));
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play rtp no subscribe");
e.printStackTrace();
}
}
});
btnPlayExplicitIp.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Editable edit = mEditText.getText();
String url = edit.toString();
Log.d(TAG, "play ip (" + url + ")");
PlayerErrorCode result = mPlayer.play(url, 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play : " + printErrorCode(result));
btnShowSubtitles.setEnabled(false);
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play ip", e);
} catch (Exception ex) {
Log.d(TAG, "Exception on play ip", ex);
}
}
});
btnPlayRtp.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play rtp");
Channel channel = rtpStreams.get(rtpStreamsCounter);
Log.d(TAG, "play rtp (" + channel.getName() + " : " + channel.getUrl() + ")");
PlayerErrorCode result = mPlayer.play(channel.getUrl(), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play : "+ printErrorCode(result));
rtpStreamsCounter = (++rtpStreamsCounter) % rtpStreams.size();
btnShowSubtitles.setEnabled(false);
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play rtp", e);
} catch (Exception ex) {
Log.d(TAG, "Exception on play rtp", ex);
}
}
});
btnPlayHls.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Channel channel = hlsStreams.get(hlsStreamsCounter);
Log.d(TAG, "play hls (" + channel.getName() + " : " + channel.getUrl() + ")");
PlayerErrorCode result = mPlayer.play(channel.getUrl(), 0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play : "+ printErrorCode(result));
hlsStreamsCounter = (++hlsStreamsCounter) % hlsStreams.size();
btnShowSubtitles.setEnabled(false);
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play method");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play hls", e);
} catch (Exception ex) {
Log.d(TAG, "Exception on play hls", ex);
}
}
});
btnPlayVod.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play vod (Url : " + vodStreams.get(vodStreamsCounter) + ")");
PlayerErrorCode result = mPlayer.play(vodStreams.get(vodStreamsCounter),0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+printErrorCode(result));
vodStreamsCounter = (++vodStreamsCounter) % vodStreams.size();
btnShowSubtitles.setEnabled(false);
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in vod");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play vod", e);
}
}
});
btnPlayMedia.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "play media (Url : " + fileStreams.get(fileStreamsCounter) + ")");
PlayerErrorCode result = mPlayer.play(fileStreams.get(fileStreamsCounter),0);
if (PlayerErrorCode.PLAYER_NO_ERROR == result) {
setPlayEnabled(false);
mSubtitle.setVisibility(View.GONE);
}
txtInfo.setText("Play: "+ printErrorCode(result));
fileStreamsCounter = (++fileStreamsCounter) % fileStreams.size();
btnShowSubtitles.setEnabled(false);
currentSubtitleIndex = 0;
} else {
Log.d(TAG, "Not bound to OpenApi in play media");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on play media", e);
}
}
});
btnSeek.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
int seekPos = mPlayer.getCurrentPosition() + SEEK_JUMP_SEC;
Log.d(TAG, "[seek][duration=" + mPlayer.getDuration() + "][current_position=" + mPlayer.getCurrentPosition() + "][seek_position=" + seekPos + "]");
PlayerErrorCode result = mPlayer.seek(seekPos);
txtInfo.setText("Seek: "+printErrorCode(result));
} else {
Log.d(TAG, "Not bound to OpenApi in seek");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on seek", e);
}
}
});
btnStop.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "stop");
PlayerErrorCode result = mPlayer.stop();
txtInfo.setText("Stop: "+printErrorCode(result));
} else {
Log.d(TAG, "Not bound to OpenApi in stop");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on stop", e);
}
}
});
btnMoveResize.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
if (!resized) {
Log.d(TAG, "Move to 100 100");
PlayerErrorCode result = mPlayer.move(100, 100);
Log.d(TAG, "Resize to 800 600");
PlayerErrorCode res = mPlayer.resize(800, 600);
txtInfo.setText("Move and Resize: "+printErrorCode(result)+printErrorCode(res));
Log.d(TAG, "Move and Resize: "+printErrorCode(result)+printErrorCode(res));
resized = true;
} else {
Log.d(TAG, "Move to 0 0");
PlayerErrorCode result = mPlayer.move(0, 0);
Log.d(TAG, "Resize to 1920 1080");
PlayerErrorCode res = mPlayer.resize(screenWidth, screenHeight);
txtInfo.setText("Move and Resize: "+printErrorCode(result)+printErrorCode(res));
Log.d(TAG, "Move and Resize: " + printErrorCode(result) + printErrorCode(res));
resized = false;
}
} else {
Log.d(TAG, "Not bound to OpenApi in resize");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on resize");
e.printStackTrace();
}
}
});
btnResize.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "resize");
if (!resized) {
PlayerErrorCode result = mPlayer.resize(800,600);
txtInfo.setText("Resize: "+printErrorCode(result));
resized = true;
} else {
PlayerErrorCode result = mPlayer.resize(1920,1080);
txtInfo.setText("Resize: "+printErrorCode(result));
resized = false;
}
} else {
Log.d(TAG, "Not bound to OpenApi in resize");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on resize", e);
}
}
});
btnMove.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "move");
if (!moved) {
PlayerErrorCode result = mPlayer.move(100,100);
txtInfo.setText("Move: "+printErrorCode(result));
moved = true;
} else {
PlayerErrorCode result = mPlayer.move(0,0);
txtInfo.setText("Move: "+printErrorCode(result));
moved = false;
}
} else {
Log.d(TAG, "Not bound to OpenApi in move");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on move", e);
}
}
});
btnGetState.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getState");
PlayerState state = mPlayer.getState();
if (state != null) {
txtInfo.setText("State: " + getStateString(state));
} else {
txtInfo.setText("State: Error, state is null.");
}
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getState", e);
}
}
});
btnGetAvailableLanguages.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getAvailableLanguages");
AudioLanguage[] availableLanguages = mPlayer.getAvailableLanguages();
String availableLanguagesString = "Available: ";
if (availableLanguages != null) {
for (int i = 0; i < availableLanguages.length; i++) {
if (i < availableLanguages.length - 1) {
availableLanguagesString += String.valueOf(availableLanguages[i].getIndex() + 1) + "/" + availableLanguages[i].getCode() + "/" + availableLanguages[i].getDescription() + "; ";
} else {
availableLanguagesString += String.valueOf(availableLanguages[i].getIndex() + 1) + "/" + availableLanguages[i].getCode() + "/" + availableLanguages[i].getDescription();
}
}
} else {
availableLanguagesString += "None";
}
txtInfo.setText(availableLanguagesString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getAvailableLanguages", e);
}
}
});
btnGetCurrentLanguage.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getCurrentLanguage");
AudioLanguage currentLanguage = mPlayer.getCurrentLanguage();
String currentLanguageString = "Current language: ";
if (currentLanguageString != null) {
currentLanguageString += String.valueOf(currentLanguage.getIndex() + 1) + "/" + currentLanguage.getCode() + "/" + currentLanguage.getDescription();
} else {
currentLanguageString += "None";
}
txtInfo.setText(currentLanguageString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getCurrentLanguage", e);
}
}
});
btnSetCurrentLanguage.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "setCurrentLanguage");
AudioLanguage[] availableLanguagesArray = mPlayer.getAvailableLanguages();
AudioLanguage currentLanguage = mPlayer.getCurrentLanguage();
String currentLanguageString = "Current language set at: ";
if (availableLanguagesArray != null && currentLanguage != null) {
AudioLanguage nextLanguage = new AudioLanguage();
for (int i = 0; i <= availableLanguagesArray.length - 1; i++) {
if (currentLanguage.getIndex() == availableLanguagesArray[i].getIndex()) {
if (i < availableLanguagesArray.length - 1) {
nextLanguage = availableLanguagesArray[i + 1];
} else {
nextLanguage = availableLanguagesArray[0];
}
}
}
PlayerErrorCode result = mPlayer.setCurrentLanguage(nextLanguage);
if (result == PlayerErrorCode.PLAYER_NO_ERROR) {
currentLanguageString += String.valueOf(nextLanguage.getIndex() + 1) + "/" + nextLanguage.getCode() + "/" + nextLanguage.getDescription();
} else {
currentLanguageString += printErrorCode(result);
}
} else {
currentLanguageString += "None";
}
txtInfo.setText(currentLanguageString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on setCurrentLanguage", e);
}
}
});
btnUnlockMorality.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "unlockMoralityLevel");
PlayerErrorCode result = mPlayer.unlockMoralityLevel();
txtInfo.setText("Unlock morality: "+printErrorCode(result));
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on unlockMoralityLevel", e);
}
}
});
btnGetAvailableSubtitles.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getAvailableSubtitles");
Subtitle[] availableSubtitles = mPlayer.getAvailableSubtitles();
String availableSubtitlesString = "Available: ";
if (availableSubtitles != null) {
for (int i = 0; i < availableSubtitles.length; i++) {
if (i < availableSubtitles.length - 1) {
availableSubtitlesString += String.valueOf(availableSubtitles[i].getIndex() + 1) + "/" + availableSubtitles[i].getCode() + "/" + availableSubtitles[i].getDescription() + "; ";
} else {
availableSubtitlesString += String.valueOf(availableSubtitles[i].getIndex() + 1) + "/" + availableSubtitles[i].getCode() + "/" + availableSubtitles[i].getDescription();
}
}
} else {
availableSubtitlesString += "None";
}
txtInfo.setText(availableSubtitlesString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getAvailableSubtitles", e);
}
}
});
btnGetCurrentSubtitle.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getCurrentSubtitle");
Subtitle currentSubtitle = mPlayer.getCurrentSubtitle();
String currentSubtitleString = "Current language: ";
if (currentSubtitle != null) {
currentSubtitleString += String.valueOf(currentSubtitle.getIndex() + 1) + "/" + currentSubtitle.getDescription();
} else {
currentSubtitleString += "None";
}
txtInfo.setText(currentSubtitleString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getCurrentSubtitle", e);
}
}
});
btnSetCurrentSubtitle.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "setCurrentSubtitle");
//create dialog (and surface)
availableSubtitlesArray = mPlayer.getAvailableSubtitles();
String setCurrentLanguageString = "Current language set at: ";
if (availableSubtitlesArray != null) {
PlayerErrorCode result = mPlayer.setCurrentSubtitle(availableSubtitlesArray[currentSubtitleIndex]);
if (result == PlayerErrorCode.PLAYER_NO_ERROR) {
setCurrentLanguageString += String.valueOf(availableSubtitlesArray[currentSubtitleIndex].getIndex() + 1) + "/" + availableSubtitlesArray[currentSubtitleIndex].getDescription();
if (currentSubtitleIndex >= 0 && currentSubtitleIndex < availableSubtitlesArray.length - 1) {
currentSubtitleIndex++;
} else {
currentSubtitleIndex = 0;
}
btnShowSubtitles.setEnabled(true);
} else {
setCurrentLanguageString += printErrorCode(result);
}
} else {
setCurrentLanguageString += "None";
}
txtInfo.setText(setCurrentLanguageString);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on setCurrentLanguage", e);
}
}
});
btnShowSubtitles.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
if (mBound) {
Log.d(TAG, "ShowSubtitles");
mSubtitle.setVisibility(View.VISIBLE);
mainLinearLayout.setVisibility(View.GONE);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
}
});
btnGetSpeed.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getSpeed");
int result = mPlayer.getSpeed();
String resultTxt;
if (result == -1) {
resultTxt = "Error, could not be retrieved.";
} else {
resultTxt = String.valueOf(result);
}
txtInfo.setText("Get speed: "+resultTxt);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getSpeed", e);
}
}
});
btnGetCurrentPosition.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getCurrentPosition");
int result = mPlayer.getCurrentPosition();
String resultTxt;
if (result == -1) {
resultTxt = "Error, could not be retrieved.";
} else {
resultTxt = String.valueOf(result);
}
txtInfo.setText("Current position: "+resultTxt);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getCurrentPosition", e);
}
}
});
btnGetDuration.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getDuration");
int result = mPlayer.getDuration();
String resultTxt;
if (result == -1) {
resultTxt = "Error, could not be retrieved.";
} else {
resultTxt = String.valueOf(result);
}
txtInfo.setText("Duration: "+resultTxt);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getDuration", e);
}
}
});
btnGetUniverse.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "getUniverse");
CASUniverse result = mCAS.getUniverse();
String resultTxt;
if (result != null) {
switch (result) {
case BOUYGUES:
resultTxt = "BOUYGUES";
break;
case CANALPLUS:
resultTxt = "CANALPLUS";
break;
case UNKNOWN:
resultTxt = "UNKNOWN";
break;
default:
resultTxt = "Error, could not be retrieved.";
break;
}
} else {
resultTxt = "Error, could not be retrieved.";
}
txtInfo.setText("CASUniverse: "+resultTxt);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getUniverse", e);
}
}
});
btnSetUniverse.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Log.d(TAG, "setUniverse");
CASUniverse result = mCAS.getUniverse();
String resultTxt;
if (result != null) {
switch (result) {
case BOUYGUES:
mCAS.setUniverse(CASUniverse.CANALPLUS);
resultTxt = "CANALPLUS";
break;
case CANALPLUS:
mCAS.setUniverse(CASUniverse.BOUYGUES);
resultTxt = "BOUYGUES";
break;
case UNKNOWN:
mCAS.setUniverse(CASUniverse.CANALPLUS);
resultTxt = "CANALPLUS";
break;
default:
resultTxt = "Error, could not be set.";
break;
}
} else {
resultTxt = "Error, could not be set.";
}
txtInfo.setText("CASUniverse: "+resultTxt);
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on setUniverse", e);
}
}
});
btnGetPlaneSize.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
try {
if (mBound) {
Rect sizePos = mPlayer.getSizePosition();
if(sizePos != null){
txtInfo.setText("Video plane rect: size=" + sizePos.width() + "x" + sizePos.height() + " @ (" + sizePos.left + "," + sizePos.top + ")");
}
else{
txtInfo.setText("Error: Could not retrieve video plane dimensions");
}
} else {
Log.d(TAG, "Not bound to OpenApi");
}
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on getDuration", e);
}
}
});
}
public void setVisibility(int visibility) {
mainLinearLayout.setVisibility(visibility);
if (visibility == View.VISIBLE) {
mainLinearLayout.requestFocus();
btnPlayRtp.requestFocus();
}
}
@Override
protected void onResume() {
btnPlayRtp.requestFocus();
super.onResume();
}
@Override
protected void onPause() {
super.onPause();
if (mBound) {
try {
mPlayer.stop();
mSubtitle.setVisibility(View.GONE);
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on onStop", e);
}
}
}
@Override
protected void onDestroy() {
super.onDestroy();
if (mBound) {
try {
mPlayer.release();
mSubtitle.setPlayer(null);
boolean result = mPlayerManager.releasePlayer(mPlayer.getID());
if (result) {
Log.d(TAG, "releasePlayer successful for mPlayer "+mPlayer.getID());
} else {
Log.d(TAG, "ERROR: releasePlayer failed for mPlayer "+mPlayer.getID());
}
//mPlayerManager.releasePlayer(mPlayer1.getID());
mCallback = null;
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on onStop", e);
}
unbindService(mConnection);
}
}
@Override
public boolean onKeyDown(int keyCode, KeyEvent event) {
try {
if (KeyEvent.KEYCODE_MEDIA_PLAY_PAUSE == event.getKeyCode()) {
Log.d(TAG, "mPlayer.getSpeed() = " + mPlayer.getSpeed());
mPlayer.setSpeed((0 == mPlayer.getSpeed()) ? 1 : 0);
return true;
} else if (KeyEvent.KEYCODE_BACK == event.getKeyCode()){
if (View.VISIBLE == mSubtitle.getVisibility()) {
mSubtitle.setVisibility(View.GONE);
mainLinearLayout.setVisibility(View.VISIBLE);
btnStop.requestFocus();
return true;
}
}
} catch (RemoteException ex) {
Log.d(TAG, "RemoteException on onKeyDown", ex);
}
return false;
}
/***
* Android L (lollipop, API 21) introduced a new problem when trying to
* invoke implicit intent,
* "java.lang.IllegalArgumentException: Service Intent must be explicit"
*/
private static Intent createExplicitFromImplicitIntent(Context context, Intent implicitIntent) {
// Retrieve all services that can match the given intent
PackageManager pm = context.getPackageManager();
List<ResolveInfo> resolveInfo = pm.queryIntentServices(implicitIntent, 0);
// Make sure only one match was found
if (resolveInfo == null || resolveInfo.size() != 1) {
return null;
}
// Get component info and create ComponentName
ResolveInfo serviceInfo = resolveInfo.get(0);
String packageName = serviceInfo.serviceInfo.packageName;
String className = serviceInfo.serviceInfo.name;
ComponentName component = new ComponentName(packageName, className);
// Create a new intent. Use the old one for extras and such reuse
Intent explicitIntent = new Intent(implicitIntent);
// Set the component to be explicit
explicitIntent.setComponent(component);
return explicitIntent;
}
private void bindService()
{
// Bind to BBox api
Intent implicitRemoteServiceIntent = new Intent();
implicitRemoteServiceIntent.setAction("fr.bouyguestelecom.bboxapi.BBOX_SECURED_PLAYER");
implicitRemoteServiceIntent.putExtra("PACKAGE_NAME", getPackageName());
Intent explicitRemoteServiceIntent = createExplicitFromImplicitIntent(this, implicitRemoteServiceIntent);
Log.d(TAG, "Binding to service -> " + explicitRemoteServiceIntent);
bindService(explicitRemoteServiceIntent, mConnection, Context.BIND_AUTO_CREATE);
// Bind to bytel middleware
Intent implicitBytelMWServiceIntent = new Intent();
implicitBytelMWServiceIntent.setAction("fr.bouyguestelecom.tv.middleware.BytelMiddlewareService");
implicitBytelMWServiceIntent.putExtra("PACKAGE_NAME",getPackageName());
Intent explicitBytelMWServiceIntent = createExplicitFromImplicitIntent(this, implicitBytelMWServiceIntent);
Log.d(TAG, "Binding to service -> " + explicitBytelMWServiceIntent);
bindService(explicitBytelMWServiceIntent, mConnectionBytelMW, Context.BIND_AUTO_CREATE);
}
private ServiceConnection mConnection = new ServiceConnection() {
@Override
public void onServiceConnected(ComponentName className,
IBinder service) {
Log.d(TAG, "onServiceConnected");
// We've bound to LocalService, cast the IBinder and get LocalService instance
ISecuredPlayer binder = ISecuredPlayer.Stub.asInterface(service);
try {
mPlayerManager = binder.getPlayerManager();
mPlayer = mPlayerManager.createPlayer(mCallback);
if (mPlayer == null) {
Log.d(TAG, "ERROR: mPlayer is null createPlayer failed!");
}
mSubtitle.setPlayer(mPlayer);
mCAS = binder.getCAS();
mBound = true;
} catch (RemoteException e) {
Log.d(TAG, "RemoteException on onServiceConnected");
mBound = false;
e.printStackTrace();
}
}
@Override
public void onServiceDisconnected(ComponentName arg0) {
Log.d(TAG, "onServiceDisconnected");
mBound = false;
}
};
private ServiceConnection mConnectionBytelMW = new ServiceConnection() {
@Override
public void onServiceConnected(ComponentName className,
IBinder service) {
Log.d(TAG, "onServiceConnected");
// We've bound to LocalService, cast the IBinder and get LocalService instance
_bytelMiddlewareService = IBytelMiddlewareService.Stub.asInterface(service);
}
@Override
public void onServiceDisconnected(ComponentName arg0) {
Log.d(TAG, "onServiceDisconnected");
_bytelMiddlewareService = null;
}
};
private IPlayerCallback.Stub mCallback = new IPlayerCallback.Stub() {
@Override
public void onStreamProgress(int time) throws RemoteException {
Log.d(TAG,"onStreamProgress - time = "+time);
}
@Override
public void onStreamStarted() throws RemoteException {
Log.d(TAG, "onStreamStarted");
setPlayEnabled(true);
setCallbackTextAndColor("onStreamStarted", Color.GREEN, txtCallbackState);
}
@Override
public void onStreamEnded() throws RemoteException {
Log.d(TAG, "onStreamEnded");
setPlayEnabled(true);
mPlayer.stop();
setCallbackTextAndColor("onStreamEnded",Color.RED,txtCallbackState);
}
@Override
public void onStreamFailed(StreamError code) throws RemoteException {
Log.d(TAG, "onStreamFailed");
setPlayEnabled(true);
setCallbackTextAndColor("onStreamFailed",Color.RED,txtCallbackState);
}
@Override
public void onConditionalAccessError(CASError code)
throws RemoteException {
String error = "Unkown";
switch (code) {
case CAS_BLACKOUT:
error = "CAS_BLACKOUT";
break;
case CAS_DESCRAMBLING_KO:
error = "CAS_DESCRAMBLING_KO";
break;
case CAS_NO_RIGHT:
error = "CAS_NO_RIGHT";
break;
case CAS_NO_CREDIT:
error = "CAS_NO_CREDIT";
break;
case CAS_INITIALIZE_ERROR:
error = "CAS_INITIALIZE_ERROR";
break;
case CAS_ERROR_UNDEFINED:
error = "CAS_ERROR_UNDEFINED";
break;
case CAS_MORALITY_KO:
error = "CAS_MORALITY_KO";
break;
default:
break;
}
Log.d(TAG, "onConditionalAccessError : " + error);
setCallbackTextAndColor("onConditionalAccessError: "+error,Color.RED,txtCallbackState);
}
};
public String getStateString(PlayerState state) {
if (state != null) {
String stateString;
switch (state) {
case STREAM_PLAYING:
stateString = "STREAM_PLAYING";
break;
case STREAM_STOPPED:
stateString = "STREAM_STOPPED";
break;
case STREAM_FAILED:
stateString = "STREAM_FAILED";
break;
default:
stateString = "Unknown";
break;
}
return stateString;
} else {
return "Error";
}
}
public void clearInfoTextView() {
runOnUiThread(new Runnable() {
@Override
public void run() {
txtInfo.setText("");
}
});
}
public void setCallbackTextAndColor(String callbackName,int color,TextView txtView) {
final TextView mTxtView = txtView;
final String mCallbackName = callbackName;
final int mColor = color;
clearInfoTextView();
if (callbackName != null) {
runOnUiThread(new Runnable() {
@Override
public void run() {
mTxtView.setText(mCallbackName);
mTxtView.setTextColor(mColor);
}
});
} else {
runOnUiThread(new Runnable() {
@Override
public void run() {
mTxtView.setTextColor(Color.RED);
mTxtView.setText("Error");
}
});
}
}
public static String printErrorCode(PlayerErrorCode errorCode) {
String errorCodeString = "";
switch (errorCode) {
case PLAYER_NO_ERROR:
errorCodeString = "OK";
break;
case PLAYER_ERROR_METHOD_FAILED:
errorCodeString = "PLAYER_ERROR_METHOD_FAILED";
break;
case PLAYER_ERROR_BAD_ARGUMENT:
errorCodeString = "PLAYER_ERROR_BAD_ARGUMENT";
break;
case PLAYER_ERROR_IO:
errorCodeString = "PLAYER_ERROR_IO";
break;
case PLAYER_ERROR_NOT_INITIALIZED:
errorCodeString = "PLAYER_ERROR_NOT_INITIALIZED";
break;
case PLAYER_ERROR_SECURITY:
errorCodeString = "PLAYER_ERROR_SECURITY";
break;
case RESOURCES_NOT_AVAILABLE:
errorCodeString = "RESOURCES_NOT_AVAILABLE";
break;
case BANDWIDTH_NOT_AVAILABLE:
errorCodeString = "BANDWIDTH_NOT_AVAILABLE";
break;
case PLAYER_ERROR_UNDEFINED:
errorCodeString = "PLAYER_ERROR_UNDEFINED";
break;
default:
errorCodeString = "Unhandled PlayerErrorCode case.";
break;
}
return errorCodeString;
}
private void setPlayEnabled (boolean value) {
final boolean enabled = value;
runOnUiThread(new Runnable() {
@Override
public void run() {
btnPlayExplicitIp.setEnabled(enabled);
btnPlayCanalPlusSD.setEnabled(enabled);
btnPlayCanalPlusHD.setEnabled(enabled);
btnPlayCanalCinemaSD.setEnabled(enabled);
btnPlayCanalCinemaHD.setEnabled(enabled);
btnPlayTF1HD.setEnabled(enabled);
btnPlayM6HD.setEnabled(enabled);
btnPlayDorcelHD.setEnabled(enabled);
btnPlayXXLHD.setEnabled(enabled);
btnPlayRtp.setEnabled(enabled);
btnPlayRtpAdult.setEnabled(enabled);
btnPlayRtpNoRights.setEnabled(enabled);
btnPlayHls.setEnabled(enabled);
btnPlayVod.setEnabled(enabled);
btnPlayMedia.setEnabled(enabled);
}
});
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
https://apnews.com/4bd72647060fd8a27d48e6534c71715b
Kaiden Rice
Rudy Fitzgibbons
Eddie Davis III
Men's college basketball
Samford closes on 10-0 run to get past The Citadel 69-68
BIRMINGHAM, Ala. (AP) — Josh Sharkey matched his career high with 27 points as Samford narrowly beat The Citadel 69-68 on Wednesday.
Samford went on a 17-3 run over the final eight minutes, including the final 10 points, capped by Logan Padgett's free throw with three seconds left. Citadel led by as many as 16 and was in front for 28:30 of the game.
Robert Allen had 16 points and 12 rebounds for Samford (7-8, 1-0 Southern Conference). Brandon Austin, Samford's second leading scorer heading into the contest at 15 points per game, had only seven points on 3-of-11 shooting.
Kaiden Rice had 17 points for The Citadel (6-7, 0-2). Rudy Fitzgibbons III added 12 points, and Eddie Davis III had 11 points, nine rebounds and three blocks.
Samford plays VMI on the road on Saturday. The Citadel faces Western Carolina at home on Saturday.
For more AP college basketball coverage: https://apnews.com/Collegebasketball and http://twitter.com/AP_Top25
Elements of this story were generated by Automated Insights, http://www.automatedinsights.com/ap, using data from STATS LLC, https://www.stats.com | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Researchers aim to map China's new smog
Håkan Pleijel&Malin Arnesson
The air quality in China's urban regions is a major health problem. Here, a new type of smog has emerged that has never been seen before. Now, researchers from Gothenburg and their Chinese colleagues will be studying air pollution in Beijing and Hong Kong.
Young and old Chinese people make their way through the city crowds wearing masks to protect them against exhaust fumes and emissions. The images are familiar from our TV screens.
"It's an accurate picture," says Professor Mattias Hallquist from the Department of Cell and Molecular Biology. "According to our researchers, people in the cities keep their children indoors to keep them away from the polluted air."
It has long been known that air pollution is a health hazard, leading to respiratory and vascular diseases and shortening life expectancy. Many of the better quality hotels in China's cities have air filtration technology, and the authorities have now started to realise that something needs to be done. The air quality is even affecting business start-ups in China. The poor quality acts as a deterrent, making it harder to find qualified workers who are prepared to live in the big cities.
"But the conditions in Beijing differ to those in Hong Kong," continues Professor Hallquist. "The cities are governed differently, and the climate is not the same. Beijing has various natural particles in the air that blow in from the desert areas. The climate is colder, and – just like in Gothenburg – they've also experienced problems with inversion, whereby the air pollutants stay at ground level. Hong Kong gets clean air from the sea, but at the smog also blows in from inland areas. Here, emissions from shipping are another significant source of pollution. The climate is subtropical, with heat and high levels of light emissions."
Professor Hallquist has received a framework grant of just over SEK 24 million from the Swedish Research Council for a five-year project to study ways of combating smog in China's urban regions. The project is an initiative from the Gothenburg Atmospheric Science Centre, which Professor Hallquist leads.
"We're experts in photochemical conversion, the formation of particles and ozone in the atmosphere, and within the project we're working with world-leading Chinese researchers."
Around fifty researchers and doctoral students are taking part in the studies in China. Three types of pollutants will be studied: organic particles, soot and ozone. These pollutants interact in a complex manner, and they have an impact on the greenhouse effect and cloud formation, which in turn affect the climate.
The new project involves initiating brand new research into smog. Two types of smog were already known about. Los Angeles suffered from smog in the 1970s due to a combination of increased car traffic and strong sunlight that caused the haze containing organic substances, nitric oxides and ozone. The London smog was a consequence of coal being burnt in the city in the 1950s and 1960s, and the hazy smoke consisted of sulphur dioxide and soot.
"In China, however, we have everything mixed together, making it more complex to understand the effects. Here we have a new kind of smog that we haven't seen before, and this is certainly part of the reason why the Swedish Research Council wants to support this research."
The main aim of the project is to investigate this new type of harmful smog that affects the health of the Chinese people as well as the global climate. The ambition is also to identify measures that the Chinese authorities can take. The project in China is being run by the University of Gothenburg together with Chalmers University of Technology and IVL Swedish Environmental Research Institute.
Gothenburg Atmospheric Science Centre
Find out more about the Gothenburg Atmospheric Science Centre, GAC: chalmers.se/gmv/gac-en/
air pollution, atmospheric science, Global goal 11, smog
A time machine for botanists
It's nothing short of a gold mine for botanists. The Herbarium at the University of Gothenburg offers researchers the opportunity to travel in time, examining…
Solar panels – nothing new under the Sun
Nowadays it is not uncommon to install solar panels on the roofs of buildings. Many see it as a smart […] | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Tag Archives: David T. Donahue
Top Diplomatic Security and Consular Affairs Officials to Step Down: Bill Miller, Kurt Rice, David Donahue, John Brennan
July 24, 2017 By domani spero in Diplomatic Security, Foreign Service, Functional Bureaus, Realities of the FS, Retirement, State Department, Top Ranks, Trends Tags: Bill Miller, Bureau of Consular Affairs, Bureau of Diplomatic Security, Christian J. Schurman, David T. Donahue, Gregory Starr, John Brennan, Kurt Rice, State/CA, State/DS, State/DS/TIA, State/DSS
Updated: 2:33 pm PT
Updated: July 25, 3:03 pm PT
Sources informed us that Acting Assistant Secretary for Diplomatic Security Bill A. Miller announced his intention to step down from his post late last week. A/S Miller will reportedly retire next month. Until his appointment as Acting A/S for Diplomatic Security in January 20, he was the bureau's Principal Deputy Assistant Secretary for Diplomatic Security and Director of the Diplomatic Security Service (DSS) from April 14, 2014. Previous to that, he was the Deputy Assistant Secretary of State for High Threat Posts.
A member of the State Department's Diplomatic Security Service since 1987, Bill Miller is a career member of the Senior Foreign Service. His last overseas assignment was a three-year posting as Regional Security Officer at the U.S. Mission in Cairo, Egypt. Preceding his assignment to Cairo, Mr. Miller was the Chief of the Security and Law Enforcement Training Division at the Diplomatic Security Training Center in Dunn Loring, Virginia.
Prior to entering duty in 1987 with the Department of State as a Diplomatic Security Service Special Agent, Mr. Miller served as a U.S. Marine Infantry Officer. Mr. Miller was honored as the 2004 Diplomatic Security Service Employee of the Year in recognition for his service in Iraq. In addition, Mr. Miller is a recipient of the Department of State's Award for Valor, several Superior Honor Awards, the Department of Defense Joint Civilian Service Commendation Award and the Marine Security Guard Battalion's award as RSO of the Year.
To-date, President Trump has not put forward a nominee to succeed Gregory Starr as Assistant Secretary of State for Diplomatic Security. Mr. Starr retired a week before inauguration day, and Mr. Miller has been in an acting capacity since January 20. Without a newly appointed successor, we were informed that the next senior official, Christian J. Schurman, will be the Acting Assistant Secretary for Diplomatic Security. Mr. Schurman is currently the Acting Principal Deputy Assistant Secretary for Diplomatic Security/Director of Diplomatic Security Service (DSS) and responsible for the Bureau of Diplomatic Security's international and domestic operations and training programs. Beyond his name and title, State/DS does not have an extensive biography for Mr. Schurman. We don't know yet who among the seven top bureau officials would be acting PDAS during this time.
Kurt R. Rice, the Deputy Assistant Secretary and Assistant Director for Threat Investigations and Analysis (DS/TIA) will not be one of those officials. Mr. Rice is also retiring. Mr. Rice who was appointed to his position in May 2016 was in charge of all threat management programs within Diplomatic Security that analyze, assess, investigate, and disseminate information on threats directed against U.S. facilities and personnel overseas and domestically.
He was also responsible for the Overseas Security Advisory Council (OSAC), a public-private partnership that promotes the sharing of security information between the U.S. Department of State and American private sector organizations with operations and personnel abroad. We rely on OSAC for security guidance when there are breaking news overseas. His office also provides oversight for the Reward for Justice program, the U.S. Government's premier public anti-terrorism rewards program.
Mr. Rice joined Diplomatic Security in May 1987 and is a career member of the Senior Foreign Service. As DAS/TIA, he was the senior Diplomatic Security Service (DSS) advisor regarding intelligence and counterterrorism matters. He is also the DSS organizational representative to the U.S. Intelligence and Counterterrorism communities. He previously served as Regional Security Officer for the Russian Federation, and Special Agent in Charge (SAC) of all DS activities in the embassy and three subordinate consulates. He is a recipient of several State Department Meritorious and Superior Honor Awards, as well as interagency Intelligence Community awards.
There are five office directors under TIA, so anyone of those directors could potentially be appointed as Acting DAS for Threat Investigations and Analysis (DS/TIA) until a nominee is officially announced. Given that there is no nominee for the assistant secretary position, it is possible that the principal deputy assistant secretary (PDAS) position and deputy assistant secretaries (DASes) could get filled before the top bureau appointment is officially identified, nominated and confirmed by the U.S. Senate.
At the Consular Affairs Bureau, the Acting Assistant Secretary of Consular Affairs David Donahue is also set to step down the end of this week. We understand that AA/S Donahue's retirement has been long planned but he will still be missed. The Acting Principal Deputy Assistant Secretary of State for Consular Affairs is Ed Ramotowski, who was previously the DAS for Visa Services. Our assumption is that Mr. Ramotowski will now step up as Acting Assistant Secretary for Consular Affairs pending the confirmation of Mr. Risch to the Consular Bureau. The CA bureau has three four DASes: Overseas Citizens Services DAS Karen L. Christensen, Passport Services DAS Brenda Sprague, Acting DAS for Visa Services Karin King, and DAS for Resources, John Brennan. We understand that the Deputy Assistant Secretary for Resources (DAS/R) position was created in 2015 to coordinate CA/EX, the Comptroller, the IT systems people, and the 1CA management initiative. Mr. Brennan is also retiring. One of them will most probably step us as PDAS, so one more office in CA will have a new acting name on its door. So one of the three remaining DASes (Brennan excepted) will probably become the PDAS, and two more offices in CA will have a new acting name on its door.
We've endeavored to look for Mr. Donahue's official biography but state.gov does not appear to carry any biographies for senior officials for the Bureau of Consular Affairs. The public facing CA website travel.state.gov also does not include biographies of its senior officials. We were able to get hold of Mr. Donahue's official biography since we originally put up this blogpost (thank you J!).
David T. Donahue has been Acting Assistant Secretary in the Bureau of Consular Affairs since January 2017. He served as Principal Deputy Assistant Secretary from September 2015 after serving as Senior Advisor to the Bureau from April 2014.
Prior to this assignment he was Division Director for the Bureau of Human Resources Office of Career Development and Assignment, Senior Level Division. From 2012 to 2013 he served as Coordinator for Interagency Provincial Affairs (IPA) at the U.S. Embassy in Kabul, Afghanistan with oversight of all U.S. Civilian Provincial Reconstruction Teams throughout Afghanistan.
Mr. Donahue was Deputy Assistant Secretary of State for Visa Services in the Bureau of Consular Affairs from 2008 to 2012, where he managed visa operations for our 225 visa-issuing posts overseas and directed visa policy for the State Department. He has also served as the Director of Policy Coordination and Public Affairs for the Bureau of Consular Affairs, 2007 – 2008, and Minister Counselor for Consular Affairs in Mexico City, Mexico from 2005 – 2007.
Mr. Donahue also served tours in the Philippines, Pakistan, Singapore, and Trinidad and Tobago. Other domestic assignments include serving as Watch Officer in the State Department Operations Center, Bangladesh Desk Officer, and Consular Training instructor at the Foreign Service Institute. Mr. Donahue joined the Foreign Service in 1983 and is the recipient of numerous awards including the Presidential Meritorious Service Award. While assigned in Islamabad, Mr. Donahue went to Afghanistan in 2001 to secure the release of two Americans held by the Taliban. Read more of that here.
Consular Affairs Specifically Responds to 'Move CA to DHS' News, Spectacularly Omits It in Message to Troops
June 29, 2017 By domani spero in Consular Work, Foreign Service, Realities of the FS, Reorganization, Spectacular, State Department, Visas Tags: Bureau of Consular Affairs, David T. Donahue
Posted: 1:50 pm ET
So we blogged about Carl Risch who was recently nominated to be the next Assistant Secretary for the Bureau of Consular Affairs (State/CA). See Ex-FSO Who Once Advocated Moving Visas to DHS May be the Next Asst Secretary For Consular Affairs. Yesterday, CNN reported that the Trump White House is reportedly considering a proposal to move both CA and PRM to the Department of Homeland Security. See Trump White House Reportedly Considering Folding CA and PRM to Homeland Security.
Today, Acting Assistant Secretary for Consular Affairs David T. Donahue sent a message of "reassurance" to CA employees, without ever mentioning that CNN report. AAS Donahue must think CA folks all live under huge rocks with no cable teevee, or the Internets. Here is the short form:
Below is the long, not funny form where the AAS says he is "committed to keeping you informed as information is available" in the same message that specifically respond to and spectacularly omits the news report that there is a proposal to move CA to DHS:
You may have seen news reports about a draft proposal to the Office of Management and Budget (OMB) regarding Consular Affairs. Executive Order 13781<https://www.whitehouse.gov/the-press-office/2017/03/13/presidential-executive-order-comprehensive-plan-reorganizing-executive> tasked OMB with a broad collection of proposals from the public and from agencies on how to improve the efficiency, effectiveness, and accountability of the government. This is one of many proposals that resulted from those conversations and brainstorming sessions.
I know we are all proud of the work we do to protect the lives and serve the interests of U.S. citizens abroad and to strengthen the U.S. border with every visa and passport decision we make. We share the President's desire to do that work as efficiently and effectively as possible. Input from the field has resulted in a number of innovations in recent years, and I encourage all of you to continue to share your thoughts and ideas as to how we can improve our processes.
I am committed to keeping you informed as information is available. Please feel free to forward this message to your consular colleagues. Thank you for the work you do every day to execute our mission with excellence, professionalism, and the highest commitment to public service. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The Irish Government will probably take the full control of the country's major six financial institutions following the publication of the results of strength tests incurred by the banks of this heavily indebted country. The test results are due to be announced tomorrow and amongst the banks that could fall under the control of the governor are Bank of Ireland, and Irish Life & Permanent.
It is worth stating that the governor already owns 36% of the Bank of Ireland's shares while other major banks have received aids amounting to 46billion. According to Bloomberg analysts after the results the banks will require a further 27 billion in order to sustain their positions. | {
"redpajama_set_name": "RedPajamaC4"
} |
Transcript: BBC NEWS CHANNEL, 19 November 2021, 7.06pm - The Kyle Rittenhouse Verdict
Shaun Ley: Nomia Iqbal has been following the trial in Kenosha and she joins us from outside the courthouse. A highly charged situation the night of these killings and it's been a highly controversial trial. Tell us what happened today.
Nomia Iqbal: It has been. After more than 26 hours of deliberations, the juror made up of seven women and five men finally released their verdict today and have cleared the 18-year-old Kyle Rittenhouse on every single charge. I just want to read you a statement that has just been released from the family of the second man that he shot dead last year. Anthony Huber. They have said that 'it sends the unacceptable message that armed civilians can show up in any town, incite violence and then use the danger they have created to justify shooting people in the streets.' And that is the core argument that many liberal groups are making about the fact that Mr Rittenhouse has been cleared because this isn't just about what happened here in Kenosha. This verdict has been seen as almost a referendum on the very polarising issue of gun ownership in America. For conservative, who largely backed Mr Rittenhouse, he is the Second Amendment personified, and for them, pro-gun rights groups, this a victory. They say it's a victory for the Second Amendment, that he is a patriot that was standing up to lawlessness. But liberal groups back this argument that's been made by the family, that what sort of message does this send out that people can turn up to protests with guns and not face any consequences. and not face any consequences. Kyle Rittenhouse was very emotional when that verdict was read out, but I suppose for a lot of people here - there are a lot of protestors outside the courthouse - it just leaves a very worrying conclusion. I spoke to the family, the uncle of Jacob Blake. Now he was...he is a black man that was shot by a white police officer last year, which sparked the protests in the first place which then ended up with Kyle Rittenhouse entering the city on the third night. He said to me that if Kyle Rittenhouse had been black he believes that the police would have shot him. And so there's so many issues that this trial embodies, but as I say, for the many liberal groups this is sending out a worrying message. And because of the rule double jeopardy as well in this case, Kyle Rittenhouse can never be tried for this case again. There can be no appeal and he's walked out of court a free man today.
Shaun Ley: Nomia Iqbal, thank you very much.
Labels: BBC News Channel, Nomia Iqbal | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
A new study by Universal McCann called When did we start trusting strangers? found that rather than being passive, consumers have taken not only active, but also creative roles in consumerism. In fact, consumers have become true "consum'actors." The study was base on 17,000 Internet users from 29 countries.
← Previous Previous post: Arrr! Friendfeed switched their beta version live! | {
"redpajama_set_name": "RedPajamaC4"
} |
Created in 1947 by Jean Vilar, the Avignon Festival is nationally and internationally recognized as one of the most important cultural rendezvous of France.
Founded in 1947 by Jean Vilar, the Avignon Festival is today one of the most important international events in the contemporary performing arts.
Every year in July, Avignon becomes a city-theatre, transforming its architectural heritage into various performance places, majestic or surprising, welcoming tens of thousands of theatre lovers of all generations (over 130 000 entries). Often on vacation and coming from afar, many spectators spend several days in Avignon and see some of the shows among the multitude of theatre plays, dance, and also visual arts and music. The Festival succeeded the original combination of a popular audience with international creation. Avignon is also a spirit: the city is an open forum, where festival-goers speak and share their experiences to spectators. For a month, everyone can have access to a contemporary living culture.
organizes meetings around performances with Festival artists, readings of unpublished texts, film screenings, exhibits that allow the viewer to better meet the work of the artists presented by browsing the different angles.
turns twenty places, usually heritage and outdoor, in scenic places, varied in their architecture and their number of seats, from 50 to 2000.
delivers between 120,000 and 140,000 tickets for paid performances and hosts between 20,000 and 40,000 spectators in its free events. The spectators come for about 33% from the Avignon region, 25% from the Ile-de-France, 32% from other French regions and 10% abroad.
brings together more than 500 French and foreign journalists who write more than 2,000 articles on the Festival. TV shows or live radio are held there. All the major print media send correspondents there. Fifty photographers also cover the event.
brings together nearly 3,500 arts professionals from around the world, to organize meetings on arts and cultural policies. A true professional forum, the Festival organizes daily debates attending the confrontation of ideas and perspectives that constitute this unique moment in European cultural life. Published in 20,000 copies, a guide performing arts professional lists day after day these appointments. Initiated in 2007, the European Meetings offers, moreover, a space for reflection to consider allowing the European project through the prism of art and culture.
publishes each year 50,000 preliminary programs and 90,000 programs. In July, 50,000 spectator guides (agenda Festival free events) are distributed locally. The website, in French and English, is growing in attendance (822,000 visits in 2012) and the Festival's Facebook page, created in June 2010, has over 26,000 fans.
Alongside the IN festival, a spontaneous theatrical space has developed, "invented" in 1966 by André Benedetto.
The "OFF" festival, which comes from the spirit of 1968, has grown by investing nearly a hundred places transformed into theater spaces.
The OFF, alternative festival, has become a must in the national cultural landscape. This is one of the biggest festivals of independent companies in the world. It hosts a large and passionate public. | {
"redpajama_set_name": "RedPajamaC4"
} |
Current turnaround time is 7-10 business days.
Pillow dimensions are 20x12 in.
Font size does not exceed 3.5 inches.
Personalize your indoor or outdoor space with Sunbrella monogrammed pillows. This pillow is constructed with high performance indoor-outdoor upholstery fabric as well as Sunbrella embroidery thread. This has the potential to make a perfect one-of-a-kind gift whether it's for a wedding, graduation, or any other special occasion. Ask us about quantity discounts.
Customize your pillow to exactly what you want with a choice of four different fonts (which do not exceed 3.5 inches) and up to 13 characters. This monogrammed pillow is the perfect touch of personality to your couch, back patio, or bedroom with a turnaround time of just 7-10 business days.
Don't see what you need? Get a quote! Please call us at 1.866.516.0934 and we will be happy to help you! | {
"redpajama_set_name": "RedPajamaC4"
} |
Pediatrics. 2017 Jan;139(1). pii: e20162063. doi: 10.1542/peds.2016-2063. Epub 2016 Dec 12.
Twenty-year Follow-up of Kangaroo Mother Care Versus Traditional Care.
Fundación Canguro, Bogotá, Colombia; [email protected].
Hospital Universitario San Ignacio, Bogotá, Colombia.
Hôpital St Justine, Montréal, Québec, Canada.
Hospital Universitario Infantil San José, Bogotá, Colombia; and.
From 2012 to 2014, a total of 494 (69%) of the 716 participants of the original RCT known to be alive were identified; 441 (62% of the participants in the original RCT) were re-enrolled, and results for the 264 participants weighing ≤1800 g at birth were analyzed. The KMC and control groups were compared for health status and neurologic, cognitive, and social functioning with the use of neuroimaging, neurophysiological, and behavioral tests.
The effects of KMC at 1 year on IQ and home environment were still present 20 years later in the most fragile individuals, and KMC parents were more protective and nurturing, reflected by reduced school absenteeism and reduced hyperactivity, aggressiveness, externalization, and socio-deviant conduct of young adults. Neuroimaging showed larger volume of the left caudate nucleus in the KMC group.
This study indicates that KMC had significant, long-lasting social and behavioral protective effects 20 years after the intervention. Coverage with this efficient and scientifically based health care intervention should be extended to the 18 million infants born each year who are candidates for the method. | {
"redpajama_set_name": "RedPajamaC4"
} |
Hull & East Yorkshire News
Food parcel handouts benefit thousands of Hull families during lockdown
Food poverty is an issue across the city
Angus Young
Food banks have been a vital lifeline for some households in Hull (Image: Peter Harbour)
Just over 28,000 food parcels have been distributed to homes in Hull during the coronovirus crisis.
The huge effort has involved a number of voluntary organisations collecting, sorting and then delivering parcels to households across the city.
Recipients have ranged from elderly and clinically vulnerable people who were shielding at home to low-income families who normally qualify for items from food banks.
Overall, an estimated 13,357 individuals have received food parcels in Hull since March.
A significant number also received food vouchers to replace free school meals when the schools were closed.
In the last month alone, Fareshare Hull and Humber delivered 138 tonnes of surplus food donated mainly by supermarkets and producers to 178 different charities and community groups in the region.
Marcus Rashford sets up child food poverty taskforce with supermarkets
Universal Credit claimants 'forced into debt' to cover household costs during lockdown
The scale of the food parcel operation in Hull has emerged after Manchester United star Marcus Rashford clashed with Conservative MP Kevin Holinrake at the weekend over the issue of food vouchers for eligible pupils.
Mr Holinrake, who represents Thirsk and Malton, originally tweeted about the success of the government's Eat Out to Help Out scheme.
In a reply to a question asking why it took Rashford's campaign to force a government u-turn over continuing to pay for the £15-a-week vouchers during the summer, the MP said: "Where they can, it's a parent's job to feed their children."
That prompted the England international to reply: "To this day I haven't met one parent who hasn't wanted or felt the responsibility to feed their children."
The footballer has recently joined forces with some of the biggest food brands to create a new taskforce to try to cut child food poverty.
The issue is due to be discussed at tomorrow's Hull Health and Well-Being Board as part of a wider examination of the community response to the pandemic over the last few months.
After the national lockdown in late March, three area-based emergency hubs were created to oversee the distribution of food parcels and other support services.
Mum explains how she bags £30 food shops for just £3 with timing tip
Mystery as police search for missing east Hull boy aged '10 or 11'
At the meeting, board chairman councillor Hester Bridges is expected call for more work to done to tackle long-term food poverty issues in the city.
She said it was important that some people did not end up becoming totally dependent on food banks.
She said: "There is a need to establish a robust, ethical supply chain that will address the real problem of food insecurity behind the immediate issues presented by the pandemic." | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Apple previews iOS 11.3 with new Animoji, health record integration, Battery status, and more
- Jan. 24th 2018 5:38 am PT
Apple today previewed iOS 11.3 with a whole host of new features, including a new set of Animoji, an ARKit update, and the ability to view personal health records directly in the Health app. iOS 11.3 will be available to customers in the spring. A developer beta of iOS 11.3 will be released today.
iOS 11.3 will also include the aforementioned battery health statistics features. Users will be able to disable the throttling in Settings → Battery, but may see more unexpected shutdowns in exchange for full performance.
For augmented reality apps, iOS 11.3 includes 'ARKit 1.5'. This will provide developers with more capabilities to create immersive AR experiences. ARKit 1.5 will be able to recognize vertical surfaces like walls, as well as more accurately map non-rectangular surfaces like round tables. It will also be able to detect signs and posters in the real world and seamlessly mesh with 3D augmented reality experiences on the iPhone screen.
iOS 11.3 will introduce four new Animoji for iPhone X: a bear, a dragon, skull and lion. This joins the existing set to bring a total of 16 animated characters. You can see photos of what the new Animoji look like below.
The forthcoming update will also include Business Chat. Business Chat was first announced at WWDC as a preview and will be launching in beta in iOS 11.3. Business Chat enables users to field customer support sessions with businesses from within the Messages app. Apple says it will be testing partnerships with Discover, Hilton, Lowe's and Wells Fargo.
Apple is also making a major upgrade to the Health app by integrating health records from hospitals and clinics into the interface. Customers can see available medical data from various providers in one screen. You will be able to get notifications of lab results, medications and more. Apple says all heath record data is encrypted with a passcode.
iOS 11.3 also brings enhancements to Apple Music, Apple News, and HomeKit.
The Music app will now more heavily feature music videos, with top charts for the best new music videos as well as the classics. Users will be able to watch their favorite artists continuously in new music video playlists. These features will require an Apple Music subscription.
For Apple News, Apple is improving Top Stories and featuring video content in a new Video section in 'For You'.
iOS 11.3 also includes support for HomeKit software authentication, making it easier for accessory makers to upgrade their accessories to support HomeKit without additional hardware. The update also includes AML, Advanced Mobile Location, to automatically send a user's location to emergency services when making an emergency call.
Regarding the ongoing battery throttling saga, Apple will let customers see whether their device is being subjected to advanced power management and let users choose to turn it off. These changes will be found in Settings → Battery but will not be in the initial iOS 11.3 beta release.
iOS 11.3 will be available to all customers later in the spring. We're excited that a developer beta will be released later today with a public beta to follow. Stay tuned to 9to5Mac for coverage of everything new.
iOS is Apple's mobile operating system that runs on iPhone, iPad, and iPod touch. Historically, Apple releases a new iOS version once a year, the current version is iOS 12. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Adj – To go a bit mad, crazy or wacky.
During my Egyptian Canal Zone RAF service 1953-55. I think it was used mainly by Midlanders and Northerners.
A mild insult but exactly what it meant then I cannot now say.
1980s British Midlands slang for lower-class undereducated teenagers and twenty-something 'men' sporting mullets, wispy moustaches, cardigans, Fred Perry shirts, stay-pressed trousers, white socks and slip-on shoes, plus sovereign rings and a pack of John Player Special cigarettes held nonchalantly in the tattooed hand. An embryonic chav.
Mouthy, lower class, mouthy, unwashed, mouthy, overweight, mouthy, female. Usually, but not always, a pikey. | {
"redpajama_set_name": "RedPajamaC4"
} |
Superdry women's Camari rookie jacket. This jacket features a main zip and popper fastening, six front pockets and popper fastened cuffs. This jacket also features zip detailing on the collar and shoulder epaulettes. Finished with a Superdry logo badge on one shoulder and on one chest pocket. | {
"redpajama_set_name": "RedPajamaC4"
} |
Year of match: 2003
unfiltered 51 49 2 25 5 0 0 0 24 27 0 47.05 Profile
filtered 6 6 0 5 1 0 0 0 3 3 0 50.00
N8 0 0 0 0 0 won v France Buenos Aires 14 Jun 2003 Details
N8 0 0 0 0 0 lost v South Africa Port Elizabeth 28 Jun 2003 Details
N8 0 0 0 0 0 won v Fiji Cordoba 18 Aug 2003 Details
N8 5 1 0 0 0 won v Canada Buenos Aires 30 Aug 2003 Details
N8 0 0 0 0 0 lost v Australia Sydney 10 Oct 2003 Details
N8 0 0 0 0 0 lost v Ireland Adelaide 26 Oct 2003 Details | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Man Leaves Evidence In Unflushed Toilet After Burglary (Photo)
Alex Scarr
A California man was arrested after his DNA was found in fecal matter left behind in the toilet of a home he allegedly burglarized.
Andrew David Jensen, 42, was arrested after forensic analysts determined the fecal matter found in an unflushed toilet belonged to him, according to KTLA. The burglary happened in 2016 but the evidence linking Jensen did not lead to an arrest until July 2017.
Local police responded to the scene of the burglary in Thousand Oaks, gathering evidence and any potential items that may contain the suspect's DNA. They then noticed fecal matter in an unflushed toilet in one of the bathrooms of the home and used that to gather a potential DNA sample.
Authorities at the scene took that sample of the fecal matter and submitted it to the Forensic Services Bureau of Ventura County for processing, according to the Ventura County Star. Once the DNA was extracted from the sample it was submitted to the Combined DNA Information System to look for a potential match.
The California Department of Justice informed local police that the fecal matter found in the toilet was a DNA match to Jensen, who was quickly arrested.
Ventura County Detective Tim Lohman told The Associated Press that this was the first burglary case in his memory in which fecal matter was the determining evidence.
"When people think of DNA evidence, they usually think of hair samples or saliva," Lohman said.
Jensen was arrested on suspicion of first-degree residential burglary, a felony in the state of California. Bail was set at $70,000.
Ventura County police used fecal matter found at the scene of a crime as one of the key determinants in capturing Marco Casillas, who was wanted for the 1997 murder of a teenage boy in his home after a botched burglary attempt, reports the Ventura County Star.
Casillas entered the home of Gail Shirley and used her 16-year-old son, Jake Bush, as cover to help him escape. When Shirley called police to report the burglary, she heard Bush's screams for help as he was stabbed by Casillas. Bush died from multiple stab wounds later that day.
The case remained cold for several years after Bush's death, as DNA testing technology was still under development. DNA evidence was found in fecal matter in a laundry basket, eventually leading to Casillas' capture and conviction in February 2017, after testing became available.
Casillas was sentenced to life in prison without the possibility of parole.
Sources: KTLA, AP via The Washington Post, Ventura County Star (2) / Featured Image: Ken Dyck/Flickr / Embedded Images: Ventura County Sheriff's Department via KTLA, Matthew Paul Argal/Wikimedia Commons
DNA evidence in fecal matterAndrew David JensenVentura County arrest | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The Naming Group is a leading global brand naming agency based in Los Angeles that works primarily with large corporations to develop brand-wide naming strategies and the names that drive them. Want to know more? Check out our agency stats.
PRESIDENT & FOUNDER NINA BECKHARDT TALKS WITH JOHN MCELROY ABOUT CAR NAMING, AND SOME OF THE BEST (AND WORST) ALL-TIME EXAMPLES.
SHOULD YOU NAME YOUR STARTUP AFTER A MEME?
ARE ALL THE GOOD TECH-COMPANY NAMES TAKEN?
[email protected]© The Naming Group 2018. All right reserved. | {
"redpajama_set_name": "RedPajamaC4"
} |
This was probably the most requested post while on my travels to Banff National Park in Alberta, Canada.
Today, I'm sharing my itinerary and places I would recommend to visit if you've never been to Banff before. Since Banff National Park is so huge, we were not able to cover everything. However, there were certain lakes that I had mapped out prior to the trip that I wanted to see. Below, I highlighted the lakes I went to and even shared some recommendations of places to visit that I wanted to see but couldn't, due to time. If you're planning to travel to Banff, I would recommend spending more than just a couple of days in order to really get the full experience!
- Banff is Canada's oldest national park.
- Lake Louise (one of the lakes I went to) is known as the "Hiking Capital of Canada."
- You can see the Northern Lights in the National Park. The best times are apparently August and September.
P.S. PIN this image to save for future reference!
On our way to the Lakes, I was stunned at the view...even from my own car window.
Calgary, you really blew me away. Talk about morning drive goals.
Our first stop at Moraine Lake: canoeing.
Since it was peak season, we researched and found out that parking filled up fast near the lake. We arrived there just in time to get one of the last spots available in the parking lot right beside Moraine Lake Lodge, which is actually the only accommodation at the lake. There's also overflow lots throughout the park with shuttle buses that run from 8:30 AM to 6:30 PM, in case you cannot park in the lake parking lot.
Canoeing was probably one of my favorite activities that day.
We rented ours at the Moraine Lake canoe rentals down by the dock. The dock opens at 10 AM to 6 PM and costs $95 an hour per canoe. The canoes can accommodate two or three people, and the rentals are strictly first come, first serve. We just so happened to rent the canoes right before lunchtime, so there was no line and hardly any people canoeing on the lake.
After Moraine Lake, we headed to Lake Louise.
Lake Louise was more crowded because the lake is located right in front of the Fairmont Chateau Lake Louise. AKA tourist central. However, the view... was spectacular. I mean, the photos honestly don't do it justice.
On the 4th of July, we drove to Banff Sunshine Village Ski Resort for a day of hiking.
We had originally planned to ride the gondolas to get an aerial view from the mountains, but found out that they were closed on weekdays and opened on weekends, due to maintenance. So instead, we bought round trip tickets to take the standish chairlift to the top of the mountains and hike the Sunshine Meadows trails.
Ever wanted to be in two places at once?
Fun fact: the view from Sunshine Meadows Deck overlooks the three high-alpine lakes (Laryx, Grizzly, and Rock Isle Junction) that are actually in British Columbia. The trails run between the continental divide between Alberta and British Columbia.
This was one of my favorite lakes on our hike because of the beautiful scenery surrounding the lake. Not to mention, the color. That morning, we had bought our lunches ahead of time because we knew we'd be hiking with limited food stops. We decided to have a lunch break at this spot with this incredible view.
Next, we continued our hiking to Grizzly Lake.
and then looped all the way back to Sunshine Meadow Deck. The hike in total took us about 4 hours and 8 miles. It was exhausting, but so worth it.
- BRING SUNSCREEN. Even though it wasn't as hot or humid as NC temps, I felt like the Canadian sun was much hotter.
- Wear shorts (and a jacket). After hiking for too long, your legs are bound to get hot.
- Pack snacks, water and a lunch. Your stomach will thank you.
- Use the bathroom before you hike. There's only two "rest areas" on the hiking trails, and they're actually outhouses.
With copious "views for days," and unreal photos of the scenery, I have to say that this was one of my favorite hiking experiences. The best part was how "private" it felt. Sure, we ran into some families and tourists hiking here and there, but for the most part on the trails, we were by ourselves enjoying the nature and acting silly, just the way we wanted to. It wasn't crowded and gave us freedom to do as we pleased, which was something I was looking forward to on this trip.
Those were the places we went to in Banff.
However, we did have some more places on our itinerary that we weren't able to get to because of time. But I would recommend visiting Parker Ridge Trail. You hike the Icefields Parkway with an unreal view of the glaciers and lakes. It's apparently "one of the best hikes on the Canadian Rockies."
The only reason we couldn't go to this one was because it was too far of a drive.
Another interesting fact is that Banff also has a Red Chair Experience Program, where the park officials have placed red, plastic chairs sporadically throughout Banff National Park. It's one of the highlights of Banff because of its idea to draw people to certain scenic locations throughout the Park and connect them with nature. There are chairs in 11 locations so far, including two to three chair sets along the Icefields Parkway. Most people try to hunt down these red chairs to Instagram them, while still getting the full experience of the beautiful scenery that is Banff National Park.
I hope you all enjoyed this travel guide. Stay tuned for a Toronto travel guide post coming soon! | {
"redpajama_set_name": "RedPajamaC4"
} |
Michael Decker Madsen (født d. 21. november 1980) er en dansk ishockeymålmand der fra sæsonen 2007-08 spiller for Rødovre Mighty Bulls i Superisligaen.
Han startede karrieren i Vojens Ishockey Klub og har i Danmark desuden spillet for Hvidovre, Rungsted og Herlev. Han har derudover spillet i Heilbronner Falken i Tyskland samt i den næstbedste finske række hos Vaasan Sport.
Michael Madsen har spillet for Danmark ved 6 VM-slutrunder, heraf samtlige de 5 gange Danmark har deltaget ved A-VM. Han har som oftest været 2. målmand bag Peter Hirsch, men har de seneste sæsoner i stigende grad gjort Hirsch rangen stridig som Danmarks bedste målmand.
Ekstern henvisning
Statistik fra www.eurohockey.net
Ishockeyspillere fra Danmark
Superisliga-spillere fra SønderjyskE Ishockey
Superisliga-spillere fra Nordsjælland Cobras
Superisliga-spillere fra TOTEMPO HViK
Superisliga-spillere fra Herlev Hornets
Tidligere superisliga-spillere fra Rødovre Mighty Bulls | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Hastings is a town and borough in the county of East Sussex on the south coast of England. The town is located 24 mi east of the county town of Lewes and 53 mi south east of London, and has an estimated population of 86,900. In historical terms, Hastings can claim fame through its connection with the Norman conquest of England; and also because it became one of the medieval Cinque Ports. | {
"redpajama_set_name": "RedPajamaC4"
} |
My name is Frank Lebiez. I'm the proprietor, partner and Chief executive of Metropolitan Restaurant, Hong Kong. I was born on August 15, 1973 in Normandie, north-west of France, which is famous for its apple orchards, farms and Camembert cheese. My childhood was the one of a happy boy in a traditional French family. I grow up with the memories of the big tables of friends and family meeting together to enjoy the numerous delicacies that our region and country offer. Already, as child I used to love cooking with my mum and learning from her the family's recipes. They have inspired mine nowadays. | {
"redpajama_set_name": "RedPajamaC4"
} |
Anemic star cluster breaks metal-poor record
Maunakea, Hawaii - In a surprising discovery, astronomers using two Maunakea Observatories - W. M. Keck Observatory and Canada-France-Hawaii Telescope (CFHT) - have found a globular star cluster in the Andromeda Galaxy that contains a record-breaking low amount of metals.
The stars in the cluster, called RBC EXT8, have on average 800 times less iron than our Sun and are three times more iron-poor than the previous globular cluster record-holder. RBC EXT8 is also extremely deficient in magnesium.
The study, led by Søren Larsen of Radboud University in the Netherlands, is published in today's issue of the journal Science.
"I'm amazed that this remarkable star cluster was just sitting under our noses. It is one of the brightest clusters in the Andromeda galaxy and known for decades, yet no one had checked it out in detail," said Aaron Romanowsky, a University of California Observatories (UCO) astronomer and professor at San José State University's Physics and Astronomy Department who co-authored the study. "It shows how the universe still has many surprises for us to discover. It also reminds us to check our assumptions - in this case, it was assumed enough clusters had been investigated to know how anemic they can be."
A globular cluster is a large, dense collection of thousands to millions of ancient stars that move together as a tight-knit group through a galaxy. Until now, astronomers thought large globular clusters had to contain a considerable amount of heavy elements.
Hydrogen and helium are the two main elements created after the Big Bang. Heavier elements such as iron and magnesium formed later. Finding a massive globular cluster like RBC EXT8 that is extremely impoverished in metals defies current formation models, calling into question some of our ideas about the birth of stars and galaxies in the young universe.
"Our finding shows that massive globular clusters could form in the early universe out of gas with only a small 'sprinkling' of elements other than hydrogen and helium. This is surprising because such pristine gas was thought to be in building blocks too small to form such massive star clusters," said Larsen.
"This discovery is exciting because the idea of a 'metallicity floor' for globular clusters, that must contain some minimum amount of heavy metals, underpinned so much of our thinking about how these very old star clusters formed in the early universe," said co-author Jean Brodie, Director, Centre for Astrophysics and Supercomputing at Swinburne University and Professor Emerita of Astronomy and Astrophysics at UCO. "Our finding contradicts the standard picture and that is always fun!"
The researchers observed RBC EXT8 using Keck Observatory's High-Resolution Echelle Spectrometer (HIRES) in October of 2019. The globular cluster was not originally on the program, but Larsen's team had a couple of hours of observing time left and decided to aim the Keck I telescope at the cluster, whose stellar content had not yet been studied in detail. The team made spectroscopic observations to determine RBC EXT8's metal content and used three archive images from CFHT to determine its size and estimate its mass. Their remarkable result came as quite a surprise.
"It is observationally challenging to obtain a detailed analysis of the chemical composition of globular clusters in the Andromeda Galaxy, which is in the Northern Hemisphere of the sky," said Brodie. "The HIRES capability at Keck is uniquely well-suited to meet this challenge."
In the future, the researchers hope to find more "metal-lite" globular clusters and solve the mystery about their origin.
W. M. Keck Observatory
Related Astronomers Articles from Brightsurf:
Astronomers are bulging with data
For the first time, over 250 million stars in our galaxy's bulge have been surveyed in near-ultraviolet, optical, and near-infrared light, opening the door for astronomers to reexamine key questions about the Milky Way's formation and history.
Astronomers capture a pulsar 'powering up'
A Monash-University-led collaboration has, for the first time, observed the full, 12-day process of material spiralling into a distant neutron star, triggering an X-ray outburst thousands of times brighter than our Sun.
Astronomers discover new class of cosmic explosions
Analysis of two cosmic explosions indicates to astronomers that the pair, along with a puzzling blast from 2018, constitute a new type of event, with similarities to some supernovae and gamma-ray bursts, but also with significant differences.
Astronomers discover planet that never was
What was thought to be an exoplanet in a nearby star system likely never existed in the first place, according to University of Arizona astronomers.
Canadian astronomers determine Earth's fingerprint
Two McGill University astronomers have assembled a 'fingerprint' for Earth, which could be used to identify a planet beyond our Solar System capable of supporting life.
Astronomers help wage war on cancer
Techniques developed by astronomers could help in the fight against breast and skin cancer.
Astronomers make history in a split second
In a world first, an Australian-led international team of astronomers has determined the precise location of a powerful one-off burst of cosmic radio waves.
Astronomers witness galaxy megamerger
Using the Atacama Large Millimeter/submillimeter Array (ALMA), an international team of scientists has uncovered a startlingly dense concentration of 14 galaxies that are poised to merge, forming the core of what will eventually become a colossal galaxy cluster.
Astronomers discover a star that would not die
An international team of astronomers has made a bizarre discovery; a star that refuses to stop shining.
Astronomers spun up by galaxy-shape finding
For the first time astronomers have measured how a galaxy's spin affects its shape -- something scientists have tried to do for 90 years -- using a sample of 845 galaxies.
Read More: Astronomers News and Astronomers Current Events | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
///////////////////////////////////////////////////////////////////////////////
// AUTHOR: Henry Pinkard, [email protected]
//
// COPYRIGHT: University of California, San Francisco, 2015
//
// LICENSE: This file is distributed under the BSD license.
// License text is included with the source distribution.
//
// This file is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty
// of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
//
// IN NO EVENT SHALL THE COPYRIGHT OWNER OR
// CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
//
package org.micromanager.plugins.magellan.imagedisplay;
import org.micromanager.plugins.magellan.acq.Acquisition;
import org.micromanager.plugins.magellan.acq.ExploreAcquisition;
import org.micromanager.plugins.magellan.acq.FixedAreaAcquisition;
import com.google.common.eventbus.EventBus;
import com.google.common.eventbus.Subscribe;
import ij.gui.StackWindow;
import java.awt.BorderLayout;
import java.awt.Dimension;
import java.awt.FlowLayout;
import java.awt.GraphicsEnvironment;
import java.awt.Panel;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;
import java.awt.event.AdjustmentEvent;
import java.awt.event.AdjustmentListener;
import java.awt.event.ComponentAdapter;
import java.awt.event.ComponentEvent;
import java.awt.event.MouseEvent;
import java.awt.event.MouseListener;
import java.awt.event.MouseMotionListener;
import java.text.DecimalFormat;
import java.text.ParseException;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.swing.JLabel;
import javax.swing.JPanel;
import javax.swing.JScrollBar;
import javax.swing.JTextField;
import javax.swing.SwingUtilities;
import org.micromanager.plugins.magellan.main.Magellan;
import org.micromanager.plugins.magellan.misc.JavaUtils;
import org.micromanager.plugins.magellan.misc.Log;
import mmcorej.CMMCore;
import net.miginfocom.swing.MigLayout;
import org.micromanager.plugins.magellan.misc.NumberUtils;
/**
*
* @author Henry
*/
public class SubImageControls extends Panel {
private final static int DEFAULT_FPS = 7;
private static final DecimalFormat TWO_DECIMAL_FORMAT = new DecimalFormat("0.00");
private EventBus bus_;
private DisplayPlus display_;
private ScrollerPanel scrollerPanel_;
private JPanel sliderPanel_;
private JScrollBar zTopScrollbar_, zBottomScrollbar_;
private JTextField zTopTextField_, zBottomTextField_;
private Acquisition acq_;
private double zStep_, zOrigin_;
private int displayHeight_ = -1;
//thread safe fields for currently displaye dimage
private volatile int sliceIndex_ = 0, frameIndex_ = 0, channelIndex_ = 0;
public SubImageControls(DisplayPlus disp, EventBus bus, Acquisition acq) {
super(new FlowLayout(FlowLayout.LEADING));
bus_ = bus;
display_ = disp;
bus_.register(this);
acq_ = acq;
zStep_ = acq != null ? acq_.getZStep() : 0;
try {
initComponents();
} catch (Exception e) {
Log.log("Problem initializing subimage controls");
Log.log(e);
}
}
/**
* used for forcing scrollbars to show when opening dataset on disk
*/
public void makeScrollersAppear(int numChannels, int numSlices, int numFrames) {
for (AxisScroller s : scrollerPanel_.scrollers_) {
if (numChannels > 1 && s.getAxis().equals("channel")) {
s.setVisible(true);
s.setMaximum(numChannels);
scrollerPanel_.add(s, "wrap 0px, align center, growx");
} else if (numFrames > 1 && s.getAxis().equals("time")) {
s.setVisible(true);
s.setMaximum(numFrames);
scrollerPanel_.add(s, "wrap 0px, align center, growx");
} else if (numSlices > 1 && s.getAxis().equals("z")) {
s.setVisible(true);
s.setMaximum(numSlices);
scrollerPanel_.add(s, "wrap 0px, align center, growx");
}
}
bus_.post(new ScrollerPanel.LayoutChangedEvent());
}
public void unlockAllScrollers() {
scrollerPanel_.unlockAllScrollers();
}
public void superLockAllScroller() {
scrollerPanel_.superlockAllScrollers();
}
public void setAnimateFPS(double fps) {
scrollerPanel_.setFramesPerSecond(fps);
}
private void updateZTopAndBottom() {
//Update the text fields next to the sliders in response to adjustment
double zBottom = zStep_ * zBottomScrollbar_.getValue() + zOrigin_;
zBottomTextField_.setText(TWO_DECIMAL_FORMAT.format(zBottom));
double zTop = zStep_ * zTopScrollbar_.getValue() + zOrigin_;
zTopTextField_.setText(TWO_DECIMAL_FORMAT.format(zTop));
//Update the acquisition
((ExploreAcquisition) acq_).setZLimits(zTop, zBottom);
//update colored areas on z scrollbar
//convert to 0 based index based on which slices have been explored
}
public void setZLimitSliderValues(int sliceIndex) {
//first expand scrollbars as needed
if(zTopScrollbar_.getMaximum() < sliceIndex + 1) {
zTopScrollbar_.setMaximum(sliceIndex + 2);
}
if(zBottomScrollbar_.getMaximum() < sliceIndex + 1) {
zBottomScrollbar_.setMaximum(sliceIndex + 2);
}
if(zTopScrollbar_.getMinimum() > sliceIndex - 1) {
zTopScrollbar_.setMinimum(sliceIndex - 1);
}
if(zBottomScrollbar_.getMinimum() > sliceIndex - 1) {
zBottomScrollbar_.setMinimum(sliceIndex - 1);
}
// now set sliders to current position
zBottomScrollbar_.setValue(sliceIndex);
zTopScrollbar_.setValue(sliceIndex);
this.repaint();
}
private void expandZLimitsIfNeeded(int topScrollbarIndex, int bottomScrollbarIndex) {
//extent of 1 needs to be accounted for on top
if (topScrollbarIndex >= zTopScrollbar_.getMaximum() - 1 || bottomScrollbarIndex >= zBottomScrollbar_.getMaximum() - 1) {
zTopScrollbar_.setMaximum(Math.max(topScrollbarIndex, bottomScrollbarIndex) + 2);
zBottomScrollbar_.setMaximum(Math.max(topScrollbarIndex, bottomScrollbarIndex) + 2);
}
if (bottomScrollbarIndex <= zBottomScrollbar_.getMinimum() || topScrollbarIndex <= zTopScrollbar_.getMinimum()) {
zTopScrollbar_.setMinimum(Math.min(bottomScrollbarIndex, topScrollbarIndex) - 1);
zBottomScrollbar_.setMinimum(Math.min(bottomScrollbarIndex, topScrollbarIndex) - 1);
}
this.repaint();
}
private void zTopTextFieldAction() {
//check if new position is outside bounds of current z range
//and if so expand sliders as needed
double val = NumberUtils.parseDouble(zTopTextField_.getText());
int newSliderindex = (int) Math.round((val - zOrigin_) / zStep_);
expandZLimitsIfNeeded(newSliderindex, zBottomScrollbar_.getValue());
//now that scollbar expanded, set value
zTopScrollbar_.setValue(newSliderindex);
updateZTopAndBottom();
}
private void zBottomTextFieldAction() {
//check if new position is outside bounds of current z range
//and if so expand sliders as needed
double val = NumberUtils.parseDouble(zBottomTextField_.getText());
int newSliderindex = (int) Math.round((val - zOrigin_) / zStep_);
expandZLimitsIfNeeded(zTopScrollbar_.getValue(), newSliderindex);
zBottomScrollbar_.setValue(newSliderindex);
updateZTopAndBottom();
}
private void zTopSliderAdjustment() {
//Top must be <= to bottom
if (zTopScrollbar_.getValue() > zBottomScrollbar_.getValue()) {
zBottomScrollbar_.setValue(zTopScrollbar_.getValue());
}
expandZLimitsIfNeeded(zTopScrollbar_.getValue(), zBottomScrollbar_.getValue());
updateZTopAndBottom();
}
private void zBottomSliderAdjustment() {
//Top must be <= to bottom
if (zTopScrollbar_.getValue() > zBottomScrollbar_.getValue()) {
zTopScrollbar_.setValue(zBottomScrollbar_.getValue());
}
expandZLimitsIfNeeded(zTopScrollbar_.getValue(), zBottomScrollbar_.getValue());
updateZTopAndBottom();
}
private void initComponents() {
final JPanel controlsPanel = new JPanel(new MigLayout("insets 0, fillx, align center", "", "[]0[]0[]"));
makeScrollerPanel();
controlsPanel.add(scrollerPanel_, "span, growx, wrap");
if (acq_ instanceof ExploreAcquisition) {
sliderPanel_ = new JPanel(new MigLayout("insets 0", "[][][grow]", ""));
CMMCore core = Magellan.getCore();
String z = core.getFocusDevice();
try {
zOrigin_ = core.getPosition(z);
} catch (Exception ex) {
Log.log("couldn't get z postition from core", true);
}
//Initialize z to current position with space to move one above or below
//value, extent, min, max
//max value of scrollbar is max - extent
try {
zTopScrollbar_ = new JScrollBar(JScrollBar.HORIZONTAL, 0, 1, -1, 2);
zBottomScrollbar_ = new JScrollBar(JScrollBar.HORIZONTAL, 0, 1, -1, 2);
zTopScrollbar_.setUI(new ColorableScrollbarUI());
zBottomScrollbar_.setUI(new ColorableScrollbarUI());
} catch (Exception e) {
Log.log("problem creating z limit scrollbars",true);
Log.log(e);
}
zTopTextField_ = new JTextField(zOrigin_ + "");
zTopTextField_.addActionListener(new ActionListener() {
@Override
public void actionPerformed(ActionEvent ae) {
zTopTextFieldAction();
}
});
zBottomTextField_ = new JTextField(zOrigin_ + "");
zBottomTextField_.addActionListener(new ActionListener() {
@Override
public void actionPerformed(ActionEvent ae) {
zBottomTextFieldAction();
}
});
zTopScrollbar_.addAdjustmentListener(new AdjustmentListener() {
@Override
public void adjustmentValueChanged(AdjustmentEvent ae) {
zTopSliderAdjustment();
}
});
zBottomScrollbar_.addAdjustmentListener(new AdjustmentListener() {
@Override
public void adjustmentValueChanged(AdjustmentEvent ae) {
zBottomSliderAdjustment();
}
});
//initialize properly
zTopTextField_.setText(((ExploreAcquisition) acq_).getZTop() + "");
zBottomTextField_.setText(((ExploreAcquisition) acq_).getZBottom() + "");
zTopTextField_.getActionListeners()[0].actionPerformed(null);
zBottomTextField_.getActionListeners()[0].actionPerformed(null);
sliderPanel_.add(new JLabel("Z limits"), "span 1 2");
if (JavaUtils.isMac()) {
sliderPanel_.add(zTopTextField_, "w 80!");
sliderPanel_.add(zTopScrollbar_, "growx, wrap");
sliderPanel_.add(zBottomTextField_, "w 80!");
sliderPanel_.add(zBottomScrollbar_, "growx");
} else {
sliderPanel_.add(zTopTextField_, "w 50!");
sliderPanel_.add(zTopScrollbar_, "growx, wrap");
sliderPanel_.add(zBottomTextField_, "w 50!");
sliderPanel_.add(zBottomScrollbar_, "growx");
}
controlsPanel.add(sliderPanel_, "span, growx, align center, wrap");
}
this.setLayout(new BorderLayout());
this.add(controlsPanel, BorderLayout.CENTER);
// Propagate resizing through to our JPanel
this.addComponentListener(new ComponentAdapter() {
public void componentResized(ComponentEvent e) {
Dimension curSize = getSize(); //size of subimage controls
//expand window when new scrollbars shown for fixed acq
if (display_.getAcquisition() instanceof FixedAreaAcquisition) {
if (displayHeight_ == -1) {
displayHeight_ = curSize.height;
} else if (curSize.height != displayHeight_) {
//don't expand window bigger that max viewable area on scren
int maxHeight = GraphicsEnvironment.getLocalGraphicsEnvironment().getMaximumWindowBounds().height;
display_.getHyperImage().getWindow().setSize(new Dimension(display_.getHyperImage().getWindow().getWidth(),
Math.min(maxHeight, display_.getHyperImage().getWindow().getHeight() + (curSize.height - displayHeight_))));
displayHeight_ = curSize.height;
}
}
SubImageControls.this.getParent().invalidate();
SubImageControls.this.getParent().validate();
}
});
}
private void makeScrollerPanel() {
scrollerPanel_ = new ScrollerPanel(bus_, new String[]{"channel", "time", "z"}, new Integer[]{1, 1, 1}, DEFAULT_FPS) {
//Override new image event to intercept these events and correct for negative slice indices
@Override
public void onNewImageEvent(NewImageEvent event) {
// show/expand z scroll bar if needed
if (acq_.getNumSlices() > scrollerPanel_.getMaxPosition("z")) {
for (AxisScroller scroller : scrollers_) {
if (scroller.getAxis().equals("z") && scroller.getMaximum() == 1) {
scroller.setVisible(true);
add(scroller, "wrap 0px, align center, growx");
//resize controls to reflect newly shown scroller
bus_.post(new ScrollerPanel.LayoutChangedEvent());
}
}
this.setMaxPosition("z", acq_.getNumSlices());
//tell the imageplus about new number of slices so everything works properly
((IMMImagePlus) display_.getHyperImage()).setNSlicesUnverified(scrollerPanel_.getMaxPosition("z"));
}
super.onNewImageEvent(event);
}
};
}
/**
* Our ScrollerPanel is informing us that we need to display a different
* image.
*/
@Subscribe
public void onSetImage(ScrollerPanel.SetImageEvent event) {
int channel = event.getPositionForAxis("channel") + 1;
int frame = event.getPositionForAxis("time") + 1;
int slice = event.getPositionForAxis("z") + 1;
//Make sure hyperimage max dimensions are set properly so image actually shows when requested
IMMImagePlus immi = (IMMImagePlus) display_.getHyperImage();
// Ensure proper dimensions are set on the image.
if (immi.getNFramesUnverified() < frame) {
immi.setNFramesUnverified(frame);
}
if (immi.getNSlicesUnverified() < slice) {
immi.setNSlicesUnverified(slice);
}
if (immi.getNChannelsUnverified() < channel) {
immi.setNChannelsUnverified(channel);
}
//for compisite images, make sure the window knows current number of slices so images display properly
if (display_.getHyperImage() instanceof MMCompositeImage) {
StackWindow win = (StackWindow) display_.getHyperImage().getWindow();
try {
JavaUtils.setRestrictedFieldValue(win, StackWindow.class, "nSlices", ((MMCompositeImage) display_.getHyperImage()).getNSlicesUnverified());
} catch (NoSuchFieldException ex) {
Log.log("Couldn't set number of slices in ImageJ stack window");
}
}
//set the imageJ scrollbar positions here. We don't rely on exactly the same
//hacky mechanism as MM, I think because dynamic changes required by the explore
//window. Instead we use the differnet hacky mechanism seen here
StackWindow win = (StackWindow) display_.getHyperImage().getWindow();
try {
JavaUtils.setRestrictedFieldValue(win, StackWindow.class, "t", frame);
JavaUtils.setRestrictedFieldValue(win, StackWindow.class, "z", slice);
JavaUtils.setRestrictedFieldValue(win, StackWindow.class, "c", channel);
} catch (NoSuchFieldException e) {
Log.log("Unexpected exception when trying to set image position");
}
synchronized (this) {
channelIndex_ = channel - 1;
frameIndex_ = frame - 1;
sliceIndex_ = slice - 1;
display_.getHyperImage().setPosition(channel, slice, frame);
}
display_.drawOverlay();
if (acq_ instanceof ExploreAcquisition) {
//convert slice index to explore scrollbar index
((ColorableScrollbarUI) zTopScrollbar_.getUI()).setHighlightedIndices(sliceIndex_ + ((ExploreAcquisition) acq_).getMinSliceIndex(),
((ExploreAcquisition) acq_).getMinSliceIndex(), ((ExploreAcquisition) acq_).getMaxSliceIndex());
((ColorableScrollbarUI) zBottomScrollbar_.getUI()).setHighlightedIndices(sliceIndex_ + ((ExploreAcquisition) acq_).getMinSliceIndex(),
((ExploreAcquisition) acq_).getMinSliceIndex(), ((ExploreAcquisition) acq_).getMaxSliceIndex());
this.repaint();
}
}
public int getDisplayedSlice() {
return sliceIndex_;
}
public int getDisplayedChannel() {
return channelIndex_;
}
public int getDisplayedFrame() {
return frameIndex_;
}
@Subscribe
public void onLayoutChange(ScrollerPanel.LayoutChangedEvent event) {
this.setPreferredSize(new Dimension(this.getPreferredSize().width,
scrollerPanel_.getPreferredSize().height + (sliderPanel_ != null ? sliderPanel_.getPreferredSize().height : 0)));
this.invalidate();
this.validate();
this.getParent().doLayout();
SwingUtilities.invokeLater(new Runnable() {
@Override
public void run() {
((DisplayWindow) display_.getHyperImage().getWindow()).fitExploreCanvasToWindow();
}
});
}
public void prepareForClose() {
scrollerPanel_.prepareForClose();
bus_.unregister(this);
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
The viscoelastic inserts reduce shock loads, particularly in the forefoot and heel areas.
Special soft pads in the metatarsal head (MTH) and heel areas reduce load peaks and alleviate, or eliminate, painful irritation.
ViscoPed reduces impact loads on the ankle, knee, hip and spine.
ViscoPed is a sole-length viscoelastic insert.
ViscoPed incorporates a metatarsal pad and a slightly contoured arch support.
ViscoPed inserts are non-slip and can be worn in walking, sports and work shoes. | {
"redpajama_set_name": "RedPajamaC4"
} |
BSA Academic Team
The 2021 BSA Awards winners, from students to our Exceptional Online Delivery Award recipient
In our third year of offering recognition awards at the University of Calgary Biology Students' Association, we reflected on whether there were areas students did remarkable work in we were not celebrating. This led to the creation of an additional award open to all Biological Sciences undergraduate students, the BSA Advocacy Award. We also realized we were in times of uncertainty and much adjustments and wanted to recognize professors' dedication to rewarding lectures despite online schooling. We hence created the Exceptional Online Delivery Award which worked differently than our usual BSA Awards, receiving student nominations to select a winner instead of applications. We highlight below the individuals who won our awards this year, including the two mentioned above we introduced this time around! Read on for the achievements of our fellow Biological Sciences students and the profile of an amazing professor that earned them our recognition!
Advocacy Award: Kandace Peroramas
Kandace is a fifth-year Biological Sciences student with an embedded certificate in Mental Wellbeing and Resilience. As a dedicated mental health advocate, she shared her personal experience with major depressive disorder and is involved in initiatives that seek to spread awareness and engage underrepresented communities. Kandace is a Canadian Mental Health Association peer mentor who has provided over 50 Calgarians with a safe space to talk and work toward recovery. As VP Outreach for the Student Mental Health Pros, she facilitated initiatives including a Black mental health panel. She founded the photo journal "Hold Space YYC", spending over 50 hours engaging the Asian community and communicating their mental health stories. This initiative has allowed her to gain insight into Asian perspectives of mental health and tackle mental health stigma. Kandace was also involved in planning Outrun the Stigma 2020, which raised $14,000 for local mental health resources. To Kandace, advocacy means being educated on what you are passionate about, being a listener and ally to those you support, and using both your actions and your voice. Her favourite part about what she does is seeing her peers go on their recovery journeys, which she finds very admirable and inspiring. She has received messages from around the world saying that she has inspired and encouraged others to talk about mental health and their own recoveries.
Community Involvement Award: Brooklynn Fernandes
Brooklynn is going into her fourth year in the Biological Sciences program. As she has a close relationship with her grandparents, Brooklynn has a keen interest in the elderly community. Her working grandfather needed help with the move to an online platform and this inspired her to co-found the non-profit organization What the Tech Calgary LTD in 2018. Their mission is to increase the digital literacy of the senior community by hosting free seminars that teach technology tips and tricks. In their three years of establishment, they have already impacted hundreds of Calgarians. She continues to impact the community by volunteering in the Hospital Elder Life Program (HELP) where she helps seniors battling delirium and comforts dementia patients. Her community involvement extends beyond volunteerism as she brings awareness to the senior healthcare system through academia. Brooklynn authored a scientific paper on dementia within primary care and is currently co-president of the University of Calgary Journal Club. Through her efforts, she is bringing to light new research and getting others involved. She later became a student representative for the Alberta Association of Gerontology (AAG) where she was able to network with other individuals passionate about improving the lives of the elderly population. In addition to this, she works in the dementia unit of the Comfort Care Aid where she helps residents access meals and runs activities. Brooklynn hopes to pursue a career in medicine where she can continue her passion in gerontology.
Innovation Award: Naureen Othi
Naureen is a fourth-year student completing a combined degree in honours Cellular, Molecular and Microbial Biology and History. She is the winner of our innovation award for her work as part of the UCalgary club ENOVA. A huge problem in the oil and gas industry is the release of many greenhouse gases from methane leaks through various processes. Naureen worked to play a role in Canada's mission to reduce those emissions as leader of ENOVA's Methanolite project. Methanolite innovatively took the system of methanotrophy some microorganisms have, where they use methane as their source of carbon and energy, and applied it to this inquiry. That is the Methanolite team worked to simulate the methane monooxygenase enzyme that allows methanotrophs to metabolize methane; they created a copper zeolite catalyst that would fulfill its same function. The really neat thing is that in breaking down methane through this enzyme, or Methanolite's simulation of it, methanol is produced, a product that can then be used in the production of many of our daily items. The Methanolite innovation was a finalist in the 2020 Biomimicry Global Design Challenge which earned it a $500 Biomimicry Institute Grant for prototyping. We applaud the creative approach to this pressing issue and the various hats Naureen put on for the success of her team.
Leadership Award: Bethany Chan
Bethany was a fourth year Cellular, Molecular and Microbial Biology student with a minor in Visual Arts. She has demonstrated extensive leadership through her involvement in several STEM-related initiatives on campus. As the VP of Events for the Women in Science and Engineering (WISE) club, she represented WISE during outreach meetings and got corporations such as ENMAX and Accenture involved with events. She was responsible for quickly organizing WISE events to adapt to the online setting. Bethany also created original events for WISE, coming up with Career Spotlight Nights as a way of introducing STEM students to different career paths and opportunities. She also spearheaded the founding of Diversity and Inclusion Night to promote these values in academia and industry. Bethany is a co-founder of SciFUN U of C, allowing for students to perform science demonstrations to elementary school students. This year she successfully paired 44 volunteers with 23 classrooms in the Calgary area. Bethany believes that the best types of leaders are those who are willing to put in the work to help others succeed and set a good example for the team, while still being approachable and treating others as equal. She feels her work is rewarding because of the stories she leaves with and the connections she makes within the community that make her more understanding and aware of the community's needs.
Resiliency Award: Karen Cobos Rodriguez
Karen has faced incredible hardship with grace and perseverance throughout her undergraduate career. She is a Zoology major entering her fourth and final undergraduate year this fall. Karen immigrated from Mexico, where she had to teach herself English and is a single mother of two young daughters (11 and 8 years old). Karen's life tells the story of a woman who is bravely defying the expectations people set out for her. People doubted her ability to attend university, let alone succeed; saying that her dreams were unachievable. She showed unbelievable resilience as her GPA struggled in her first year because she was juggling a full university course load and a tough court battle for custody of her children. Karen was her own lawyer during those troubling times and had to spend time learning all the court procedures. Despite the disheartening academic outcomes of her first year, she gathered strength and changed her perspective where the focus was now on believing in herself. Karen saw how her life, goals, and happiness improved with this new mindset and it was positively impacting her academics as well. In the Fall 2020 semester, she achieved an impressive 3.74 GPA, something she used to think was unattainable. Karen dreams of going to medical school or pursuing a masters in neuroscience after she graduates. Alongside her two supportive "cheerleader" daughters, Karen is well on her way to fulfilling her dreams despite her difficult start.
Undergraduate Research Award: Brooklyn McDougall
Brooklyn was completing her Biological Sciences degree this past year. It is for her five-year span of research on stroke and pre-dementia that she is the winner of our undergraduate research award. The first two summers of her undergraduate degree, she dedicated herself to acute ischemic stroke research, working on determining better ways to characterize brain blood clots to facilitate optimized treatments for them. This led to Brooklyn being published for the first time in an academic paper, the American Journal of Neuroradiology, in 2019. In her pre-dementia research, she contributed to an investigation into the neurological biomarkers of transient ischemic attack patients along the five years after their attack. The goal of this inquiry was to better predict cognitive decline. Advancements from this research could allow for the development of treatments that slow or even reverse the impacts of Alzheimer's and dementia. Brooklyn specifically was looking into whether iron acts as a biomarker for brain cell death. She played a hugely significant role in the project: processing patient MRI scans, extracting regional iron values from the scans, obtaining relevant statistics from each of the 350 patients and comparing the iron data of the TIA and control groups. This work resulted in Brooklyn then working on writing a paper as first author and presenting at an international neurology conference.
Exceptional Online Delivery Award: Dr. Chris Neufeld
Photo by Goya Ngan
In the nominations we received for Dr. Neufeld, a recurring note was the high level of enthusiasm his lectures were delivered with. Students also highlighted that he often provided connections to their content in real-life, making lectures captivating and illuminating to them the worth of the various subjects they covered. Dr. Neufeld maximized his use of the online platforms, using their various features to enhance his students' learning, this included finding ways to draw out concepts so they are better understood. In this period of continuous adjustment, Dr. Neufeld's understanding and how he showcased it with flexibility, extending deadlines that were weighing on students, was invaluable to them. More than ever, we were also immensely grateful for our instructors being there for us, doing all they can to support us. It was clear that Dr. Neufeld was; opening up extra office hours, promptly answering emails and making time for and ensuring to answer all of students' questions. We relayed to Dr. Neufeld a huge thank you from Winter 2021 BIOL 243 students for the amazing experience that were his lectures in the class. He is now an Adjunct Professor at the University of British Columbia and the lead of the Kelp RESCUE (Resilient Coastal Underwater Ecosystems) Project at the Bamfield Marine Sciences Centre aimed at making advances to inform innovative approaches to kelp forest restoration. We rejoice in knowing that academic communities will continue to be positively impacted by Dr. Neufeld.
We were glad to celebrate highly dedicated students yet another year and to have got to recognize the outstanding efforts of a professor as well this year. May their stories also inspire and empower us to our best selves! | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Click here to download OCC/OPC Application form.
As a member of the Philippine Army, one can get competitive pay and allowances, opportunities for post-graduate studies both local and abroad, insurance and healthcare benefits, billeting and house privileges, job security, leadership and other skills trainings, an opportunity to lead the Army and opportunities for career advancement.
Interested aspirants may inquire at the nearest Regional Community Defense Groups (RCDGs), and any Army Units listed below.
This entry was posted in News and tagged Hukbong Katihan ng Pilipinas, Join the Philippine Army, Philippine Army, Philippine Army Recruitment.
Lieutenant General Eduardo M Año was named Chief of Staff of the Armed Forces of the Philippines during ceremonies held on December 7, 2016, in Camp General Emilio Aguinaldo, Quezon City. Lieutenant General Año succeeded General Ricardo R Visaya, who is set to relinquish his post as he reaches the mandatory age of retirement.
Lieutenant General Año was commissioned on March 11, 1983, after having graduated from the Philippine Military Academy that year.
Año, one of the youngest in his batch, is the 3rd among the classmates to become AFP chief. The first was General Hernando Iriberri.
As part of his continued education, he took the Israel Counter Terrorism Center (2002) and the International Officer Intelligence Course at the U.S. Army Intelligence Center in Fort Huachuca, Arizona with a perfect rating of 100% (1993). He is also a graduate of the Scout Ranger Course.
Año was credited for scoring some of the biggest arrests of communist leaders including the once elusive Communist Party of the Philippines chairman Benito Tiamzon; The neutralization of President Duterte's known friend, the Davao-based New People's Army (NPA) commander Leonardo Pitao alias Kumander Parago, who was killed in a military encounter in June 2015. He also led the hunt for retired Major General Jovito Palparan, who is accused of kidnapping and serious illegal detention.
Prior to his appointment as Commanding General of the Philippine Army in July 2015, he commanded the Army's 10th Infantry Division, and, before that, was Brigade Commander of the 201st Brigade, 2nd Infantry Division.
The Lieutenant General also served as Chief of the Intelligence Service of the Armed Forces of the Philippines, and, before that Assistant Deputy Chief of Staff for Intelligence.
This entry was posted in News and tagged Armed Forces of the Philippines, Camp General Emilio Aguinaldo, Chief of Staff, General Ricardo R Visaya, Intelligence Service, Lieutenant General Eduardo M Año, Philippine Army, Quezon City.
Message of Brig. Gen. Arnel dela Vega; Commander, Joint Task Force Sulu during the 39th Founding Anniversary of 45th Infantry (Gallant) Battalion, 16 Oct 2016, Talipao, Sulu.
"It is with deep pleasure, honor and privilege to greet and congratulate the officers and men of the 45th Infantry (Gallant) Battalion as you celebrate the founding Anniversary of your unit.
Forty one years ago 45IB was initially formed in Samar in the early part of 1975 by the directive of no less than President Ferdinand Marcos to General Fortunato Abat.
On O5 July 1977, the 45IB as a provisional battalion was activated and exactly 39 years ago, by 24 October of 1977, 45IB became a Regular Battalion of the 3rd Infanry Division.
Your battalion saw action in different places in the Philippines and involved in numerous operations from Samar in the Visayas, to Basilan and Zamboanga Peninsula in Mindanao then to Bicol Region, Ilocos Region, Cordillera and Cagayan Valley in Luzon then back to Mindanao in 2010 particularly in Maguindanao; and today you are here in Sulu.
Your battalion has seen the steady hands of numerous commanders from the very first one in the name of LTC WILFREDO DUBLIN; to then MAJOR VOLTAIRE GAZMIN who became Commanding General of the Philipine Army and later Secretary of National Defense; to the longest serving commander of 45IB COL AMADO ISIDRO whose two years and seven months of leadership earned 45IB the much coveted awards of Best Battalion in Operations in 1982 and Best in Administration in 1983 both at the Philippine Army level.
The young generation of commanders of 45IB contributed immensely in the success of your unit as seen in 2010 with the recovery of 42 High Powered Firearms in Maguindanao and your being Champion of the 6th Infantry Division's Company Challenge and Squad Challenge under the leadership of then LTC MARVIN LICUDINE.
The 45IB became the 6ID Best OpCon Battalion in TRIAD operations in 2013 under LTC DONALD HONGITAN while in 2015 during the Mamasapano incident, your unit then under LTC ROMEO BAUTISTA, is one of the battalions who reinforced our beleaguered troops from the PNP SAF and you were instrumental in the rescue of 30 survivors and recovery of 44 Killed In Action and 10 Wounded In Action.
The officers and men of 45IB altogether steered your battalion to achieve and reach the status it has now as one of the primary fighting unit of the AFP now in Sulu to achieve another milestone in the colorful history of your unit.
I enjoin every member of 45IB now under the able leadership of LTC RHENANTE SALVADOR to continue the same aggressiveness, passion and zeal in doing your assigned tasks as you did before in the past.
Let the officers and men of 45IB personify your unit seal in serving our people particularly here in Sulu. May the horse head symbolizing strength and speedy action be your mantra in our quest to destroy lawless elements and rescue people held captives.
May your gallantry in action be protected by the shield which also symbolizes our commitment as protectors and defenders of our citizens and humanity.
May the laurel leaves pave the way for the much needed cooperation and collaboration between our troops and all stakeholders here in Sulu as we stand for the values and attitudes of noble men in uniform in pursuit of peace and goodwill for all.
As we celebrate the 39th year of the founding of your unit; and as a tribute to those members who recently paid the ultimate sacrifice in serving the country by laying down their precious lives, may I request everyone to rise as we acknowledge their names.
Pfc Jeffrey Carino, July 2016, encounter in Patikul Sulu.
Let us offer one minute of prayer for them.
May the heroism and sacrifice of those before us inspire everyone to serve with more passion and conviction to achieve our mission here in Sulu.
This entry was posted in News and tagged 39th Founding Anniversary, 45th Infantry Battalion, 45th Infantry Gallant Battalion, BGen Arnel Dela Vega, Philippine Army. | {
"redpajama_set_name": "RedPajamaC4"
} |
#include "gep/container/hashmap.h"
#include "gep/container/DynamicArray.h"
#include "gep/math3d/vec3.h"
#include "gep/interfaces/renderer.h"
#include "gep/interfaces/updateFramework.h"
namespace gep
{
class HavokDisplayManager : public hkDebugDisplayHandler
{
struct DisplayGeometryInfo
{
ResourcePtr< IModel > pModel;
mat4 transform;
};
public:
HavokDisplayManager();
~HavokDisplayManager();
void initialize();
void destroy();
virtual hkResult addGeometry(const hkArrayBase<hkDisplayGeometry*>& geometries, const hkTransform& transform, hkUlong id, int tag, hkUlong shapeIdHint, hkGeometry::GeometryType createDyanamicGeometry = hkGeometry::GEOMETRY_STATIC) override;
virtual hkResult addGeometryInstance(hkUlong origianalGeomId, const hkTransform& transform, hkUlong id, int tag, hkUlong shapeIdHint) override;
virtual hkResult setGeometryPickable(hkBool isPickable, hkUlong id, int tag) override;
virtual hkResult setGeometryVisibility(int geometryIndex, bool isEnabled, hkUlong id, int tag) override;
virtual hkResult setGeometryColor(hkColor::Argb color, hkUlong id, int tag) override;
virtual hkResult setGeometryTransparency(float alpha, hkUlong id, int tag) override;
virtual hkResult updateGeometry(const hkTransform& transform, hkUlong id, int tag) override;
virtual hkResult updateGeometry(const hkMatrix4& transform, hkUlong id, int tag) override;
virtual hkResult skinGeometry(hkUlong* ids, int numIds, const hkMatrix4* poseModel, int numPoseModel, const hkMatrix4& worldFromModel, int tag) override;
virtual hkResult removeGeometry(hkUlong id, int tag, hkUlong shapeIdHint) override;
virtual hkResult updateCamera(const hkVector4& from, const hkVector4& to, const hkVector4& up, hkReal nearPlane, hkReal farPlane, hkReal fov, const char* name) override;
virtual hkResult displayPoint(const hkVector4& position, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayLine(const hkVector4& start, const hkVector4& end, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayTriangle(const hkVector4& a, const hkVector4& b, const hkVector4& c, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayText(const char* text, hkColor::Argb color, int id, int tag) override;
virtual hkResult display3dText(const char* text, const hkVector4& pos, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayPoint2d(const hkVector4& position, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayLine2d(const hkVector4& start, const hkVector4& end, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayTriangle2d(const hkVector4& a, const hkVector4& b, const hkVector4& c, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayText2d(const char* text, const hkVector4& pos, hkReal sizeScale, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayGeometry(const hkArrayBase<hkDisplayGeometry*>& geometries, const hkTransform& transform, hkColor::Argb color, int id, int tag) override;
virtual hkResult displayGeometry(const hkArrayBase<hkDisplayGeometry*>& geometries, hkColor::Argb color, int id, int tag) override;
virtual hkResult sendMemStatsDump(const char* data, int length) override;
virtual hkResult holdImmediate() override;
void extract(IRendererExtractor& extractor);
void setEnabled(bool value);
bool isEnabled() const;
private:
CallbackId m_extractionCallbackId;
Hashmap<hkUlong, DynamicArray<DisplayGeometryInfo>> m_geometries;
Hashmap<hkUlong, mat4> m_transformations;
};
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
You are about to download the S5282XXAMEA_S5282OJVAME1_MID.zip file. It comes as a zip package and the file size is 498 MB only. It was uploaded on 29/05/2017 from Indonesia. It was uploaded by the registered moderator Nyein Chan Aung, for firmwarefile.com. | {
"redpajama_set_name": "RedPajamaC4"
} |
Digitalis kan syfta på:
Digitalis – ett positivt inotropt läkemedel. Se Digoxin
Digitalis – ett släkte i familjen grobladsväxter. Se digitalissläktet
Digitalis (djur) – ett släkte insekter i familjen dvärgstritar | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Food is an essential part of senior living communities. Delighting residents with delicious recipes is your number one priority, yet as a foodservice operator your role goes beyond that. Introducing Inspiring Delight™, a resource dedicated to providing senior living operators with on-trend recipes, health and wellness info, and community building ideas for your residents. Browse the content below to find more ways to deliver delight today!
Our culinary team of experts has created and organized recipes from savory, center of plate crowd-pleasers to nostalgia-inducing sweet treats. Browse the recipe book below to get inspired today.
With the help of the Bell Institute of Health & Nutrition, we've developed content to inform operators on some of the more complicated dietary issues facing senior residents. We also host regular webinars that dive deeper into some of these topics and offer related recipes and resources. Explore the links below to learn more. | {
"redpajama_set_name": "RedPajamaC4"
} |
Bringing a high-street brand online to offer an unrivalled customer experience. Integration of Magento ecommerce, WordPress, social media and back-office logistics for greater efficiency.
Fish Soho offer salon performance at an accessible price for consumers, these products are available online but Fish wanted to improve their customer experience.
The products are sold on the high street and have an existing logistics set-up which required full integration with the website.
The brand had a strong existing place in the market and this needed to be maintained whilst bringing an improved buying experience under the control of the brand outright, rather than via other online retailers.
In order to offer this unrivalled online buying experience, we built a customer-focused e-commerce site, using Magento for the strong ecommerce engine, and integrating it with WordPress for the ease of updating the dynamic content. All this tied into the brand's strong social theme.
We also integrated the existing, laborious logistics process into the system, automating much of the process from shopping-cart to shipping. Bringing order-processing and reporting into the new Magento platform. | {
"redpajama_set_name": "RedPajamaC4"
} |
Home Latest News La Liga Hertha Berlin join Luka Jovic pursuit
Transfer News & Rumours
Hertha Berlin join Luka Jovic pursuit
Real Madrid forward Luka Jovic is reportedly attracting interest from a number of European clubs with Hertha Berlin the latest to join the race for the player.
Jovic made the move to the Spanish capital after enjoying what many will term as a splendid season with Eintracht Frankfurt, with Madrid paying €60 million for his signature.
The 22-year-old has failed to establish his anticipated form which persuaded Zinedine Zidane to bring him to Madrid, scoring just two goals in 16 appearances in the 2019/20 La Liga season.
Off the field issues as well as injury concerns have seen the forward headlining many Spanish papers on many occasions, with Madrid said to be fed up with his behaviour.
However, the club are likely to allow to leave on a temporary basis after dropping down the pecking at the Santiago Bernabeu.
Per Marca's reports, Hertha Berlin have shown interest in the bringing the Serbia International back to the German Bundesliga in the summer.
Jovic is also being targeted by Premier League sides Arsenal and Leicester City while AC Milan have been credited with an interest.
In the 2018/19 season, the then Frankfurt attacker scored 17 Bundesliga goals and went on to strike 10 times in other competitions, leading them to an Europa League semi-finals, before being knocked out by Chelsea.
Latest Luka Jovic News | Transfer News | Injury News and Update
Previous articleSergio Ramos: Good enough? Fit enough to retire at Real Madrid
Next articleReal Madrid Femenino announce squad for 2020/21 pre-season
Report: Luka Jovic set for Eintracht Frankfurt loan | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The Dnieper-Bug Canal
Lyakhovichi
Natural objects
The Dnieper-Bug Canal is an artificial water artery that connects the tributary of the Pripyat – the Pina River (the Dnieper's basin), and the tributary of the Bug – the Mukhavets River (the Visla's basin). The Canal is navigable; its length is 244 kilometers, the large enterprise RUOCE "The Dnieper-Bug waterway" is engaged in its service.
The idea of building a canal connecting the deep rivers Pripyat and Bug was nurtured for a very long time. First it was announced at the Seim in the distant 1655; however, the implementation of the plan was begun only a hundred years later. In 1775 after the approval of the project by the last king of the Polish-Lithuanian Commonwealth Stanislaw August Poniatowski builders dug the first part of the canal – a cut, the length of which was eight kilometers. The works were carried out under the direction of the specialist SHults who had been invited in Brest region fr om Sweden.
In 1784 the initiative Polish gentleman Mateusz Butrimovich allowed to sail on the waters of the Dnieper-Bug Canal vessels, laden with food. The ships left Pinsk, went to Warsaw and then to Gdansk.
Originally the Dnieper-Bug Canal was named the Royal Canal. It happened because its official opening took place with the direct participation of the King. August Stanislaw Poniatowski with his retinue, consisting of forty people, sailed through the Canal on the amazing ship that had been hollowed out of the whole log of a century-old oak. The King stayed four days in Gorodets, located near Kobrin, and since then the Canal had been called the Royal one and nothing else.
However, then the Polish-Lithuanian Commonwealth was in crisis. Soon its territories were divided between Russia and Poland, and the grandiose construction of the Canal was frozen for a long term. Only many years later, in 1837 the Russian authorities, who got power over Pinsk's lands, resumed the works. As the significance of the Canal was difficult to overestimate, because it was the only navigable way that could connect the Black Sea and the Baltic Sea, therefore its building was finished, sparing no time and effort. By 1848 the width of the bottom was fourteen meters. It is also noteworthy for the fact that in 1886 and 1890 five huge destroyers, having had a displacement of from 89 to 164 tons each, were moved through it. The war ships were transported from Elbing, wh ere they had been built, to Sevastopol, and towage was carried out by paddle-steamers as well as by barge haulers.
In 1919 the territory of Pinsk appeared again under the rule of the Polish government, which began reconstruction works, because they realized the key place of the Dnieper-Bug Canal in water transportation. Thanks to them, from 1929 till 1939 here appeared two first locks – Duboy and Pererub.
In 1941 the Canal was used only by the invaders who had occupied Brest region. It had being continued until partisans destroyed the locks. It became impossible to carry out cargo transportation.
In the post war period the Canal was rebuilt very quickly, in 1945 ships sailed on its waters.
If you are an amateur of activity holidays, fishing, nature walk, you should visit this place without fail! The wonderful nature of Brest region, the Canal's water rich in fish and fresh air guarantee a perfect pastime.
, Lyakhovichi , Belarus
Distance to airport: 186 km | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
For this project I started out with McCormick taco seasoning and was tasked with re-packaging it. After researching customer complaints and other reviews I introduced a new McCormick product line. The new McCormick spice kit includes nine different jars filled with pre-blended spices.
The concept of this kit is that instead of having to mix all the spices for a recipe yourself they come pre-blended and ready for you. Also included are nine recipe cards that each have a recipe from a different region of the world. The purpose of this kit was to be the bridge between McCormick's spices and the recipes McCormick has on their site.
The design consists of a new logo and a flexible branding system for the bottles. The new logo was based off of the 1920's prohibition. Taking the top shelf alcohol idea and swapping in the shape of the already existing McCormick bottles. On the bottles themselves each blend is labeled with their region and their flags colors on the top banner.
The recipe cards are compact and meant to fit underneath the bottles in the box. The cards are accordion folded displaying the ingredients and directions on the front and the completed dish photographed on the back. Each McCormick spice kit makes the perfect holiday gift.
McCormick has a wide variety of spices, and an equally large variety of recipes on their website. This product combines both of those and allows the user to shave off prep time during the assembly of the dish and experience different cultures at the same time. | {
"redpajama_set_name": "RedPajamaC4"
} |
Too Far - Where to Watch For Free?
Find out where to watch Too Far online right now! We can help you find where to watch Too Far for free.
Are you looking for a great place to watch Too Far For Free? Often, It can be extremely difficult to find great places to find this movie on the internet. That's why we have taken the time to compile several sites that offer Too Far and many more titles completely for free!
Below, you'll find several links to download this great film for free! These sites are the highest quality free movie streaming sites available! Start watching Too Far and many more films for free today!. | {
"redpajama_set_name": "RedPajamaC4"
} |
After Andrea Rossi's Heat Generator (E-cat) presentation with demonstrations of excess heat up to 600 % [1, 2] we have repeated such experiments with similar cell in Russia. As a result by us it has been received the considerable exit of neutrons (~500000) in serial and x-ray radiation [3, 4, 5, 6]. We presented them at the Russian annual Conferences on Cold Nuclear Transmutation [3, 4] and at the International Conference in Korea . However we didn't find excess heat on these installations. Therefore we decided to return to a previous study of plasma electrolysis on the Fakel-1 installations and the Fakel-2 [8,9], where we already had indications on existence of nuclear radiation and excess heat in this cell mode. On the modernized installation Fakel-3 with plasma electrolysis the convincing evidence of nuclear processes was obtained. It was provided by Erzion catalysis with the large excess heat. The received results have provided the positive decision on our International patent . Here we present the investigation results of plasma electrolysis with anode gas discharge in usual water. In our experiments there have been used different nuclear & calorimeter diagnostic methods. Numerous demonstrations of their nuclear nature have been obtained in full accordance with Cold Nuclear Transmutation Erzion Catalysis model predictions [12-17]. In much series there were regularly demonstrated large excess heat generations (< 700%). This can provide creating of ourself Russian E-Cat (Erzion Catalyzer) Heat Generator & new perspective nuclear energetics.
No. It will be a technological demo.
The demo you will make in October will be the presentation of the product?
Thank you for your very kind and appreciated proposal, I surely am honoured by it. I cannot move from the USA in this period, due to the overwhelming engagements on two fronts: the development of the QuarkX and the litigation. The two combined draw at least 14 hours per day of my time and the litigation demands my personal availability for the Attorneys every day. For example, in the last 2 days I had to go through 7 000 ( seven thousand) pages of documents, the whole during a 4 hours hearing in Court in Miami the day before yesterday and an 8 hours hearing in Raleigh, NC, between the counterparts yesterday, while this morning I am in Miami to work with the QuarkX: can you imagine the fun?
In a short term we can organize it by Skype, while to make possible for me to leave the "battlefield" is necessary to wait for the end of the litigation, that we expect to be within September: the justice in the USA is very efficient, albeit it demands a tremendous effort economical, intellectual and physical.
Sono un professore di chimica, da anni seguo lo sviluppo dell' E-Cat e sono fortemente convinto dell'efficacia, dei fondamenti scientifici e delle enormi prospettive di sviluppo e utilizzo di questo dispositivo. Avrei piacere a poterLa invitare per tenere una conferenza/lectio magistralis nel mio istituto internazionale in Italia, più precisamente in Lombardia. Se fosse interessato La pregherei di segnalarmelo, anche tramite email. La ringrazio. Cordiali saluti.
English: I am a Professor of Chemistry and I follow your work since several years. I am convinced that the E-Cat technology and its scientific ground are valid and have an important future. For this reason I am inviting you to make a Lectio Magistralis in my international institute in Lombardia (Italy). Please let me know your availability.
Attention: I talked of the industrial 1 MW plant.
Absolutely wrong. The E-Cat, after the successful test of one year in the factory of the Customer has been of paramount importance and it remains the sole real product we have now for sale.
Queste sono le tue parole del 09 Maggio 2016 . Ora essendo io uno tra i primi in lista per l'acquisizione di almeno 6 E-Cat da molti anni , Ti prego di spedirmi oppure vengo io a prenderlo al : " 1331 LINCOLN ROAD S,te 601 MIAMI BEACH FLORIDA 33139 USA " Il nominativo dell' acquirente , nel caso debba essere un americano è mia prima cugina , vera americana sposata con un americano e vivono a CHICAGO . Ed il Tuo E-CAT sarà portato a CHICAGO USA .
I thank you infinitely for your kind invitation, but, as you imagine, I cannot leave the battlefield for the time being. We are at the same time working very hard on the development of our R&D and production issues and on the well known other issues.
I as Chairman of Organizing Committee of the Conference is pleased to invite you to attend the Conference (RCCNT&BL-23).
The 23d Russian Conference on Cold Nuclear Transmutation and Ball-Lightning (RCCNT&BL-23) is to be held during June 19–25, 2016. The place of the Conference is Olympic (Dagomys) Hotel in the city of Sochi that is the best recreation and holiday place on the Black See shore of Russia.
• Applied to these problems technologies and devices.
Thank you for the interesting information and congratulations to Adrian Marin!.
Dear Andrea Rossi, I hope the same destiny for you!
Washington Summit on nuclear safety organized by the White House, a Paduan engineer, Adrian Marin, 52, presents its revolutionary patent, a machine that is capable of purifying radioactive waste in 'water. His company, the Wow Technology of Padua has won a major tender to run in South Carolina an innovative process of decontamination of liquid radioactive waste from nuclear power plants. The Wow has indeed won the tender "2016 International Projects" launched by the US Department of Energy.
Thank you for your concern. The truth will prevail. We will win.
I feel bad that your dealings with IH are ending up in court. There are many interests that will work to prevent you from bringing your technology to the world. I didn't think IH was one of those. Greed, corruption, and control will get to some of the best. I pray you have protected yourself enough to overcome your battles ahead. My hope for today is that you have chosen your attorney with the greatest care. Best wishes for all you do.
I never signed that patent with T. Barker as the coinventor.
It has been made without my knowledge ans without my authorization.
When IH had you sign for patent(s) they were filing in your name, were you aware at that time that there were inventors other than yourself also listed on the patent(s)?
Then they replicated, didn't they?
I note an error in the IH patent application. On page 10 at 0030 they correctly calculate Ea using the difference between the final reading and initial reading on the genset. But on page 11 at 0031, in calculating the COP, they use the final reading only.
This would make the COP closer to 12.
Will do when we will present the product. F8.
Anch'io sono come Julian !!!
Forza Andrea indici una conferenza stampa con accanto a Tè un E-CAT in funzione !!!
Come a Pordenone io ci sarò in prima fila !!!
Right now I am answering to you…while I am working with my QuarkX.
What are you doing today, Saturday ?
You are right: when the product will be out, the issue will be definitely over.
I believe now would be the right moment to show the world what you have. Make a press conference and show the Ecat-X. Once the cat is out of the bag the doubters and snakes will see that they are the ones lying! I rarely post on your blog, but I am following you now for more than 5 years nearly daily. Very sure you will get a lot of attention by doing so!
What is the input energy source for the E-cat?
Thank you for your suggestion, but do not worry: the cockoo is a good guy, but when he is forced to be bad, becomes very bad, although it happens rarely and only if necessary to defend his nest: in this case the nest is the meaning of an entire life.
this is the time of the wrestle in the cuckoo's nest.
In my opinion you should start to play the card of the brand: associating strictly your name to the E-cat in the main stream media, and make the Rossi effect well known to everybody.
If not will be so, the high availability of capitals of your competitors, step by step, will put your firm apart, and forgotten.
Until I will be alive, the E-Cat will be made. Do not worry.
I am so sorry to hear about you legal action, but I have good confidence that you will overcome this hurdle.
Will this situation slow down the manufacture process of your E-CATS?
Leonardo Corporation can manufacture its products where wants. Obviously cannot sell or distribute such products in the Territories that have been licensed in exclusive to other Companies.
Does Leonardo Corporation hold any American manufacturing &/or marketing rights for any of your technology………independent from Industrial Heat LLC?
If not, then why is Leonardo planning to build a robotic manufacturing plant in the U.S.?
This time the story goes that "Meucci" has the patent, the industry, the product and whomever will try to compete against us will discover what is there under the tip of the iceberg.
here we are, Meucci-Bell once again?
You are totally right, and I want to add: feedback from happy Customers will be the SOLE real promotion for out technology.
When do you think the industrial E-cat plant will be on sale on a larger scale?
Feedback from the happy customers will be the best promotion for your technology.
Thank you for your kind words from our great Team.
I am too focused on my work to listen these stupidities.
Also today she worked very well.
How is going the Ecat Quarkx today?
Now you are really dangerous.
Congratulations for the positive report: you are the one in the world that brought LENR into the market.
My wife was in Italy, I was dead tired and very worried both for the work and for my health, because I was afraid of something bad that luckily was not real.
But thank you for your sympathy.
Wednesday February 17, (when the 353 days test has ended) in the evening, Andrea and Mme Rossi have organized a splendid celebration party for Rossi's Team plus wives at the exquisite VERO ITALIANO Restaurant in Miami. This is not espionage but it can tell much more than a spy-drone. So happy faces on the photos, and, mamma mia, what fine sorts of wines!
* Can you vouch for this?
The publication of the Report needs the agreement of all the parties involved.
The release of the ERV report will it be a commun decision between you and Industrial Heat ?
Thank you, very kind to my great Team.
Congratulations for the positive ERV report. Very well deserved by you and your team. This is so exciting it gives me goosebumps. Thank you for all your hard work and perseverance.
It is an achievement of our Team, indeed.
Congratulations! for the positive ERV report an another great acheivement! | {
"redpajama_set_name": "RedPajamaC4"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.