text
stringlengths
4
3.53M
meta
dict
In Tansania ab sofort verboten: Gleitgel 23. Juli 2016, 16:33h, Für die Regierung ist das Verkaufs- und Einfuhrverbot für Gleitmittel eine Maßnahme zur Aids-Prävention. Das ostafrikanische Land Tansania hat die Einfuhr und den Verkauf von Gleitmitteln für sexuelle Kontakte verboten. Dies bestätigte Gesundheitsministerin Ummy Mwalimu am vergangenen Dienstag. Mit der Maßnahme solle gleichgeschlechtlichen Sex unter Männern bekämpft werden. Durch den Verkauf und das zum Teil kostenlose Verteilen von Gleitgel würde Homosexualität befördert, kritisierte die Ministerin gegenüber lokalen Medien. Durch das Vertriebsverbot solle die Ausbreitung von HIV gestoppt werden. Schätzungen der Regierung zufolge haben sich 23 Prozent der HIV-positiven Männer in Tansania beim Sex mit anderen Männern infiziert. Das Geld zum Kauf von Gleitgel sollte besser in Betten für Entbindungsstationen investiert werden, forderte Mwalimu. Aktivisten kritisierten das Gleitgel-Verbot als kontraproduktiv. Schwule und bisexuelle Männer würden lediglich auf andere Schmiermittel wie Öl ausweichen, die jedoch Kondome angreifen und damit die HIV-Infektionszahlen erhöhen können. Schwuler Sex ist in Tansania strafbar Homosexuelle Handlungen unter Männern sind in dem ostafrikanischen Staat illegal. Es drohen Haftstrafen von bis zu 30 Jahren. Auf der zu Tansania gehörenden Insel Sansibar steht auch auf lesbischen Sex eine Haftstrafe von fünf Jahren, im Rest des Landes gibt es dagegen kein Gesetz gegen Frauen. Laut dem Flüchtlingskommissariat der Vereinten Nationen werden LGBT in Tansania verfolgt, misshandelt und gedemütigt. Mehrfach wurden schwule und lesbische Aktivisten verhaftet. Erst in diesem Monat startete Presseberichten zufolge der neue Generalkommissar der größten Stadt Daressalam Paul Makonda eine gezielte Kampagne mit Razzien und Festnahmen in Gay-Clubs sowie dem Verbot von Online-Netzwerken. Der Lokalsender Cloud TV musste sich wegen eines Interviews mit einem 28-jährigen Schwulen auf Anordnung der Medienaufsicht fünf Tage in Folge bei den Zuschauern entschuldigen. Tansania gehört zu den ärmsten Ländern der Welt. Jeweils zwischen 30 und 40 Prozent der Bevölkerung sind Christen und Muslime, der Rest verteilt sich überwiegend auf Anhänger von Naturreligionen. (cw)
{ "pile_set_name": "OpenWebText2" }
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Phrack World News PWN PWN PWN PWN Issue XXXVII / Part One of Four PWN PWN PWN PWN Compiled by Dispater & Spirit Walker PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Federal Seizure Of "Hacker" Equipment December 16, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Barbara E. McMullen & John F. McMullen (Newsbytes) "New York's MOD Hackers Get Raided!" NEW YORK CITY -- Newsbytes has learned that a joint Unites States Secret Service / Federal Bureau of Investigation (FBI) team has executed search warrants at the homes of so-called "hackers" at various locations across the country and seized computer equipment. It is Newsbytes information that warrants were executed on Friday, December 6th in various places including New York City, Pennsylvania, and the state of Washington. According to informed sources, the warrants were executed pursuant to investigations of violations of Title 18 of the federal statutes, sections 1029 (Access Device Fraud), 1030 (Computer Fraud and Abuse Act), 1343 (Wire Fraud), and 2511 (Wiretapping). Law enforcement officials contacted by Newsbytes, while acknowledging the warrant execution, refused to comment on what was called "an on-going investigation." One source told Newsbytes that the affidavits underlying the search warrants have been sealed due to the on-going nature of the investigation." He added "There was obviously enough in the affidavits to convince judges that there was probable cause that evidence of a crime would be found if the search warrants were issued." The source also said that he would expect a statement to be issued by the Secret Service/FBI team "somewhere after the first of the year." _______________________________________________________________________________ Two Cornell Students Arrested for Spreading Computer Virus February 27, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Lee A Daniels (New York Times News Service) Special Thanks: Risks Digest Two Cornell University undergraduates were arrested Monday night and charged with developing and spreading a computer virus that disrupted computers as far away as California and Japan, Cornell officials said. M. Stewart Lynn, vice president for information technologies at the university in Ithaca, N.Y., identified the students as David Blumenthal and Mark Pilgrim. Lynn said that both Blumenthal, who is in the engineering program, and Pilgrim, in the college of arts and sciences, were 19-year-old sophomores. They were arrested on the evening of February 24 by Cornell and Ithaca police officers. Lynn said the students were arraigned in Ithaca City Court on charges of second-degree computer tampering, a misdemeanor, and taken to the county jail. Lynn said authorities believed that the two were responsible for a computer virus planted in three Macintosh games on February 14. He identified the games as Obnoxious Tetris, Tetricycle and Ten Tile Puzzle. The virus may have first appeared in a Stanford University public computer archive and spread from there through computer users who loaded the games into their own computers. Lynn said officials at Cornell and elsewhere became aware of the virus last week and quickly developed what he described as "disinfectant" software to eradicate it. He said officials traced the virus to Cornell last week, but he would not specify how that was done or what led officials to the two students. Lynn said he did not yet know how much damage the virus had caused. "At Cornell we absolutely deplore this kind of behavior," he said. Note: References to the Robert Morris, Jr. virus incident at Cornell deleted. Associated Press reported that both defendants are being held in the Tompkins County Jail on $10,000 bail. _______________________________________________________________________________ Man Admits to NASA Hacking November 26, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~ By John C Ensslin (Rocky Mountain News)(Page 6) Also see Phrack 34, File 11 Special Thanks: The Public A self-taught computer hacker with a high school education admitted Monday to breaking into a sensitive NASA computer system -- in less time than it takes the Broncos to play a football game. Richard G. Wittman Jr., 24, told Denver U.S. District Judge Sherman Finesilver that it took him about "1 1/2 to 2 hours" on a personal computer using telephone lines in his apartment to tap into the space agency's restricted files. Wittman pleaded guilty Monday to one felony count of altering information -- a password -- inside a federal computer. In exchange for the plea, federal prosecutors dropped six similar counts in indictments handed up in September. The Northglenn High School graduate told the judge he hadn't had much schooling in computers. Most of what he knew about computers he learned from books. And most of those books, he said, are in a federal warehouse, seized after FBI agents searched his Westminster apartment last year. "Do you think you could teach these two lawyers about computers?" Finesilver asked, referring to Wittman's public defender and the prosecutor. "Probably," Wittman replied. Wittman not only broke into 118 NASA systems, he also reviewed files and electronic mail of other users, said assistant U.S. attorney Gregory C. Graf. It took NASA investigators nearly 300 hours to track Wittman an another 100 hours to rewrite the software, Graf said. Wittman faces up to five years in prison and a $250,000 fine. But Graf said the government will seek a much lighter penalty when Wittman is sentenced in Jan. 13. Both sides have agreed on repayment of $1,100 in collect calls placed to the other computer system. But they differ on whether Wittman should be held responsible for the cost of new software. _______________________________________________________________________________ Hacker Pleads Guilty December 5, 1991 ~~~~~~~~~~~~~~~~~~~~ Special Thanks: Iron Eagle "A 24-year-old Denver hacker who admitted breaking into a sensitive NASA computer system pleaded guilty to a felony count of altering information. In exchange for the plea Monday, federal prosecutors dropped six similar counts against Richard G. Wittman Jr., who faced up to five years in prison and a $250,000 fine. Authorities said the government will seek a much lighter penalty when Wittman is sentenced January 13. Both sides have agreed on repayment of $1,100 in collect calls he placed to the computer system, but they differ on whether Wittman should be held responsible for the cost of new software. Wittman told U.S. District Judge Sherman Finesilver that it took him about two hours on a personal computer in his apartment to tap into the space agency's restricted files. It took NASA investigators nearly 300 hours to track Wittman and an additional 100 hours to rewrite the software to prevent a recurrence, prosecutors said." _______________________________________________________________________________ Recent Novell Software Contains A Hidden Virus December 20, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) The nation's largest supplier of office-network software for personal computers has sent a letter to approximately 3,800 customers warning that it inadvertently allowed a software virus to invade copies of a disk shipped earlier this month. The letter, sent on Wednesday to customers of Novell Inc., a Provo, Utah, software publisher, said the diskette, which was mailed on December 11, had been accidentally infected with a virus known by computer experts as "Stoned 111." A company official said yesterday that Novell had received a number of reports >from customers that the virus had invaded their systems, although there had been no reports of damage. But a California-based computer virus expert said that the potential for damage was significant and that the virus on the Novell diskette frequently disabled computers that it infected. MASSIVE POTENTIAL LIABILITIES "If this was to get into an organization and spread to 1,500 to 2,000 machines, you are looking at millions of dollars of cleanup costs," said John McAfee, president of McAfee & Associates, a Santa Clara, Calif. antivirus consulting firm. "It doesn't matter that only a few are infected," he said. "You can't tell. You have to take the network down and there are massive potential liabilities." Mr. McAfee said he had received several dozen calls from Novell users, some of whom were outraged. The Novell incident is the second such case this month. On December 6, Konami Inc., a software game manufacturer based in Buffalo Grove, 111.wrote customers that disks of its Spacewrecked game had also become infected with an earlier version of the Stoned virus. The company said in the letter that it had identified the virus before a large volume of disks had been shipped to dealers. SOURCE OF VIRUS UNKNOWN Novell officials said that after the company began getting calls earlier this week, they traced the source of the infection to a particular part of their manufacturing process. But the officials said they had not been able to determine how the virus had infected their software initially. Novell's customers include some of nation's largest corporations. The software, called Netware, controls office networks ranging from just two or three machines to a thousand systems. "Viruses are a challenge for the marketplace," said John Edwards, director of marketing for Netware systems at Novell. "But we'll keep up our vigilance. He said the virus had attacked a disk that contained a help encyclopedia that the company had distributed to its customers. SERVERS SAID TO BE UNAFFECTED Computer viruses are small programs that are passed from computer to computer by secretly attaching themselves to data files that are then copied either by diskette or via a computer network. The programs can be written to perform malicious tasks after infecting a new computer, or do no more than copy themselves from machine to machine. In its letter to customers the company said that the Stoned 111 virus would not spread over computer networks to infect the file servers that are the foundation of networks. File servers are special computers with large disks that store and distribute data to a network of desktop computers. The Stoned 111 virus works by attaching itself to a special area on a floppy diskette and then copying itself into the computer's memory to infect other diskettes. But Mr. McAfee said the program also copied itself to the hard disk of a computer where it could occasionally disable a system. In this case it is possible to lose data if the virus writes information over the area where a special directory is stored. Mr. McAfee said that the Stoned 111 virus had first been reported in Europe just three months ago. The new virus is representative of a class of programs known as "stealth" viruses, because they mask their location and are difficult to identify. Mr. McAfee speculated that this was why the program had escaped detection by the company. STEPS TOWARD DETECTION Novell has been moving toward adding new technology to its software to make it more difficult for viruses to invade it, Mr. Edwards said. Recently, the company licensed special digital-signature software that makes it difficult for viruses to spread undetected. Novell plans to add this new technology to the next major release of its software, due out at the end of 1992. In the past, courts have generally not held companies liable for damages in cases where a third party is responsible, said Susan Nycum, a Palo Alto, California, lawyer who is an expert on computer issues. "If they have been prudent it wouldn't be fair to hold them liable," she said. "But ultimately it may be a question for a jury." _______________________________________________________________________________ Working Assets Long Distance! January 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from an advertisement in Mother Jones (Not pictured is a photo of a college student giving "the finger" to someone and a caption that reads 'Twenty years later, we've given people a better way to put this finger to use.') The advertisement reads as follows: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Sit-ins. Protest marches, Flower power. Times have changed but the need for grass roots involvement hasn't. Introducing "Working Assets Long Distance." The ONLY phone company that is as committed to social and political change as you are. Every time you use your finger to make a long distance call, one percent of the bill goes to non-profit action groups at no cost to you. Hard-hitting advocacy groups like AMNESTY INTERNATIONAL, GREENPEACE, PLANNED PARENTHOOD, FEDERATION OF AMERICA, THE AMERICAN CIVIL LIBERTIES UNION, and many others. We're more than a phone company that gives money to good causes. Our intent is to make your individual voice heard. That's why we offer *FREE CALLS* to corporate and political leaders. And well-argued letters at a fraction of the cost of a mail-gram. So you can demand a halt to clear-cutting our ancient forests or let Senators know how you feel about important issues like reproductive rights. It's that simple. Your phone becomes a tool for democracy and you don't give up a thing. You see, Working Assets comes with the exact same service as the major long distance carriers. Convenient dial 1 calling 24-hour operation and fiber optic sound quality. All this at rates lower that AT&T's basic rates. And signing up couldn't be simpler. Just give us a call at 1-800-788-8588 ext 114 or fill out the coupon today. We'll hook you up right away without any intrusion or interruption. So you can help change the world without lifting a finger. Ok, maybe one finger. _______________________________________________________________________________ Computer Virus Used in Gulf War January 12, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from The Boston Globe (Page 12) Special Thanks: Tone Surfer Several weeks before the start of the Gulf War, US intelligence agents inserted a computer virus into a network of Iraqi computers tied to that country's air defense system, a news magazine reports. US News and World Report said the virus was designed by the supersecret National Security Agency at Fort Meade, Maryland, and was intended to disable a mainframe computer. The report, citing two unidentified senior US officials, said the virus appeared to have worked, but it gave no details. It said the operation may have been irrelevant, though, since the allies' overwhelming air superiority would have ensured the same results of rendering the air defense radars and missiles ineffective. The secret operation began when American intelligence agents identified a French made computer printer that was to be smuggled from Amman, Jordan, to a military facility in Baghdad. The agents in Amman replaced a computer chip in the printer with another micro-chip that contained the virus in its electronic circuits. By attacking the Iraqi computer through the printer, the virus was able to avoid detection by normal electronic security procedures, the report said. "Once the virus was in the system, the US officials explained, each time an Iraqi technician opened a "window" on his computer screen to access information, the contents of the screen simply vanished," US News reported. The report is part of a book, based on 12 months of research by US News reporters, called "Triumph without Victory: The Unreported History of the Persian Gulf War," to be published next month. _______________________________________________________________________________ Indictments of "Information Brokers" January 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from The Privacy Journal The unholy alliance between "information brokers" and government bureaucrats who provide personal information has been uncovered in the grand jury indictments of 18 persons in 14 states. United States Attorney Michael Chertoff in Newark, New Jersey, and his counterpart in Tampa, Florida, accused eight "information brokers" (or "information gatekeepers" or "super bureaus") of bribing two Social Security Administration employees to provide confidential earnings and employee information stored in federal computer files. The brokers, who fill in the cracks not occupied by national credit bureaus and who also track the whereabouts of persons, would sell the information to their clients -- retailers, lawyers, detectives, insurance companies, and others. Ned Flemming, president of Super Bureau Inc. of Montery, California, was indicted on 32 counts for coaxing a Social Security supervisor in New Jersey named Joseph Lynch (who was not charged) to provide confidential personal information for a fee. Fleming's daughter, Susan, was charged also, as were Victor Fought, operator of Locate Unlimited in Mesa, Arizona; George T. Theodore, owner of Tracers Worldwide Services in Corpus Christi, Texas; Richard Stone, owner of Interstate Information Services in Port Jefferson, New York; and Michael Hawes, former owner of International Criminal Investigative Agency (ICIA) in Port Angeles, Washington, for participating in the same conspiracy. Another broker, Joseph Norman Dillon Ross, who operates a firm under his name in Pauma Valley, California also accepted the personal data, according to Chertoff, but was not charged. Richard Stone was further indicted for corrupting a Social Security claims clerk in Melrose Park, Illinois. Also charged were Allen Schweitzer and his wife Petra, who operate Security Group Group in Sumner, Washington. The government employees also stole personal information from the FBI's National Crime Information Center (NCIC), which stores data on arrests and missing persons. Fleming told Privacy Journal that he had never met Lynch. Stone refused to comment. Tracers Worldwide, ICIA, and Locate Unlimited are not listed in telephone information, although all three companies are required by the Fair Credit Reporting Act to permit the subjects of their files to have disclosure of such information to them. The 18-month long investigation culminating in the December 18 indictments and arrests is only the first phase, said Assistant U.S. Attorney Jose Sierra. "We don't think it stops there." For the past three years, the Big Three credit bureaus have continued to sell credit information regularly to information brokers, even after complaints that some of them violated the Fair Credit Reporting Act in disclosing credit information for impermissible purposes. Trans Union's president, Albert Flitcraft, told Congress in 1989 that is was not possible for a major credit bureau to protect consumer information sold to brokers. John Baker, Equifax senior vice-president, said at the time that the Big Three would "put together our best thinking" to see if safeguards could be developed. By 1991, Oscar Marquis, vice-president of Trans Union, was asking Congress for solutions, but Baker presented Equifax's new guidelines and checklist for doing business with the brokers. None of the Big Three has been willing to cease doing business with the cloudy merchants of recycled credit reports -- and of purloined Social Security and FBI information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Meanwhile, at the Internal Revenue Service... Two weeks after he blew the cover off the information brokers, U.S. Attorney Michael Chertoff in New Jersey indicted a retired chief of the Internal Revenue Service Criminal Investigation Division for selling personal information to a California private investigative firm in his last week on the job in 1988. For a $300 payment, according to the indictment, the IRS executive, Robert G. Roche, promised to procure non-public marital records from vital records offices. Using false pretenses, he ordered one of his subordinates to get the information, on government time. The aide got the records in one instance only after writing out an IRS summons and in another instance after producing a letter on IRS stationary saying the information was needed for "official investigative matters." Roche, according to the U.S. Attorney, accepted payment from the California investigative firm of Saranow, Wells, & Emirhanian, part of a larger network called Financial Investigative Services Group. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Privacy Journal is an independent monthly on privacy in the computer age. They can be reached at: Privacy Journal P.O Box 28577 Providence, Rhode Island 02908 (401)274-7861 _______________________________________________________________________________ SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41) Indictments recently handed down against insiders who bought and sold confidential information held in Federal Bureau of Investigation and Social Security Administration computers have prompted agency officials to evaluate how well the government secures its databases. "I see this as positive more than negative," said David Nemecek, section chief for the FBI's National Crime Information Center (NCIC), which contains data on thousands of people suspected and convicted of crimes. "Am I happy it happened? No. But it led us to discovering that this was happening and it sends a message that if people try it, they will get caught." But Renny DiPentima, assistant commissioner of SSA's Office of System Design and Development, said he did not view the indictments as a positive development. "It's not a victory," DiPentima said. "Even if we catch them, it's a loss. My victory is when I never have a call that someone has abused their position." The "information broker" bust was the culmination of an 18-month investigation by the Department of Health and Human Services' inspector general's office in Atlanta. Officials said it was the largest case ever prosecuted involving the theft of federal computer data. More indictments could be forthcoming, they said. Special agents from the FBI joined the inquiry and in the end nabbed 18 people >from 10 states, including one former and two current SSA employees. Others indicted were a Chicago police officer, an employee of the Fulton County Sheriff's Office in Georgia, and several private investigators. The indictments alleged that the investigators paid for confidential data, including criminal records and earnings histories, that was lifted from the databases by people who exploited their access to the records. "The FBI cannot manage every person in the United States," Nemecek said. "We have all kinds of protection to prevent this from happening. We keep logs of who uses the systems and for what, security training programs and routine audits of inquiries." "But the people who committed the violations had access to the system, and there's only one way to deal with that: aggressive prosecution of people who do this. And the FBI is actively pursuing these individuals." DiPentima's problem is equally delicate. His agency performs 15 million electronic transactions per day -- 500 per second -- and monitoring the rights and wrongs of those people is a daunting task. Currently, every employee who uses the network is assigned a password and personal identification number, which change frequently. Depending on the nature of the employee's job, the PIN grants him access to certain types of information. If the employee tries to access a menu in the system that he has not been authorized to enter, or makes more than one error in entering his PIN number, he is locked off the system. Once that happens, only a security office from one of SSA's 10 regional offices can reinstate the employee. An SSA section chief and six analysts, working from the agency's data center headquarters outside Baltimore, also search routinely for transactional aberrations such as employees who have made an unusual number of transactions on a certain account. The FBI also has a number of security precautions in place. FBI personnel conduct random audits of searches, and Nemecek said sweeping state and local audits of the system are performed biannually. Furthermore, if the FBI desires, it easily can track an access request back to the terminal and user it came from. DiPentima said that in the wake of the indictments, he is considering new policies to clamp down on abusers. Nemecek said that as the FBI continues upgrading the NCIC database, the center might automate further its auditing of state and local agencies to detect patterns and trends of use the way SSA does. But despite efforts to tighten the screws on network security, both men realize that in cases of federal and municipal employees who exploit authorized access, technology and policies can only go so far in affecting human nature. _______________________________________________________________________________ Free University Suffers Damage. February 24, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By The Dude (of Holland) An investigation by the Amsterdam police, in cooperation with an anti-fraud team of the CRI (sort of like the FBI), and the geographical science department of the Free University has led to the arrests of two hackers. The two had succeeded to break into the department's computer system and caused damage of over 100,000 Dutch Guilders. In a press conference, held by the research teams last Friday, it was stated that the duo, a 25-year old computer-science engineer R.J.N. from Nuenen [aka Fidelio] and a 21-year old student computer-science H.H.H.W. from Roermond [aka Wave], were the first "hackers" to be arrested in the Netherlands. In several other countries this has already happened before. The arrested hackers made a complete confession. Since November 1991, they have entered the University's computer between 30 and 40 times. The system was known as "bronto." From this system the hackers were able to gain access to other systems, thus travelling to systems in the US, Scandinavia, Spain and Italy. According to the leader of the computer-crime team of the Amsterdam police, D. Komen, the two cracked codes of the VU-system to get in. They got their hands on so-called "passwords" of officially registered users, which allowed them to use the system at no cost. They were also able to get the "highest of rights" within the computer system "bronto." A total of four houses were searched, and several PC's, printouts and a large quantity of diskettes was seized. The duo was taken to the DA and imprisoned. Because "hacking" is not a criminal offense in the Netherlands, the suspects are officially accused of falsification of records, destruction of property, and fraud. This year the government expects to enact legislation that will make hacking a criminal offense, according to P.Slort of the CRI. The hacker-duo stated that they undertook their illegal activities because of fanatic "hobbyism." "It's a kick to see how far you can go", says Mr. Slort of the CRI. The two said they did not know that their data journeys had caused enormous damages. The police do not see them as real criminals, either since the pair did not earn money from their activities. _______________________________________________________________________________ Computer Engineer Gets Death Sentence February 9, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Special Thanks: Ninja Master Richard Farley was cool to the end, taking a sip of water and smoothing his jacket before leaving the courtroom where he was sentenced to die for killing seven people in a rage over unrequited love. "I'm not somebody who is demonstrative or prone to shedding tears", Farley said Friday before apologizing for the slayings. "I do feel sorry for the victims....I'm not a perfect human being. I'm good. I'm evil." Farley was convicted in October of the 1988 slayings at ESL Inc., a Sunnyvale defense contractor. Jurrors on November 1st recommended the death penalty for the computer engineer, who prosecutors said planned the rampage to get the attention of a former co-worker who rejected him. Superior Court Judge Joseph Biafore Jr. called Farley a vicious killer who had "complete disregard for human life." "The defendant...killed with the attention to prove to the object of his unrequited love that he wasn't a wimp anymore," Biafore said. During the trial, prosecutors detailed Farley's 3 1/2-year obsessive pursuit of Laura Black. He sent her more than 100 letters, followed her day and night, left gifts on her desk, and rifled through confidential personnel files to glean tidbits about her life. Despite her repeated rejections, Farley persisted and was fired in 1987 for harassing her. A year later, he returned to ESL. Black, 30, was shot in the shoulder during the rampage, but survived to testify against Farley. She said that about a week before the slayings, she had received a court order to keep him away. Farley, 43, admitted the killings but pleaded not guilty, saying he never planned to kill but only wished to get Black's attention or commit suicide in front of her for rejecting him. Farley's attorney, Gregory Paraskou, argued that Farley's judgement was clouded by his obsession with Black and that he was not violent before the slayings and likely would not kill again. But Asst. Dist. Atty. Charles Constantinides said Farley spent years preparing for the murder by taking target practice and buying weapons, including the firearms and 98 pounds of ammunition he used at ESL. The judge rejected the defense's request for a modified sentence of life in prison and a request for a new trial. Under California law, Farley's death sentence will be automatically sent to the state Supreme Court for review. Among those in the courtroom were family members of some of the victims, including four who addressed the judge.
{ "pile_set_name": "Pile-CC" }
Introduction {#Sec1} ============ *Culicoides* biting midges (Diptera: Ceratopognidae) are vectors of viruses of both medical and veterinary importance (Purse and Venter [@CR39]). African horse sickness virus (AHSV), epizootic haemorrhagic disease virus (EHDV) and bluetongue virus (BTV) are listed by the Office International des Epizooties as posing a high risk to animal health where competent vectors are present. The emergence of Schmallenberg disease in Europe has further highlighted the importance of these insects in transmitting new zoonoses endangering animal welfare (Carpenter et al. [@CR16]). Even in the absence of disease, the pain and distress of *Culicoides* blood feeding causes major economic losses (Mordue and Mordue [@CR34]), and can result in life-threatening allergic reactions (Carpenter et al. [@CR14]). *Culicoides impunctatus* is geographically one of the most widespread pest species of biting midge across the West Palaearctic region (Mathieu et al. [@CR33]). The species has a broad host range, including both wildlife and livestock (Blackwell et al. [@CR8]), and causes economic losses to tourism and forestry through voracious blood feeding on people (Hendry and Godwin [@CR25]). Female *C. impunctatus* are autogenous, producing one batch of eggs prior to a blood meal, facilitating population growth up to huge densities even where hosts are not readily available (Blackwell et al. [@CR6]; Boorman and Goddard [@CR10]). In addition to being a serious economic pest, *C. impunctatus* is also susceptible to infection by BTV, as determined under laboratory conditions (Carpenter et al. [@CR13]). Given the high population densities and biting rates that can be attained by *C. impunctatus*, the potential of this species to act as a vector of disease cannot be entirely discounted (Purse et al. [@CR40]). Currently there are few effective tools for the surveillance and control of biting midge populations (Carpenter et al. [@CR14]). Traps baited with carbon dioxide (CO~2~) and 1-octen-3-ol, kairomones emitted by mammalian hosts, have been tested and marketed for controlling populations of biting midge, including *C. impunctatus* (Mands et al. [@CR32]). While successful in capturing biting midges, these traps were originally designed for catching mosquitoes, and may not be fully optimized for use against *C. impunctatus* and other biting midge species. Laboratory and field studies have demonstrated that *C. impunctatus* responds to a wide range of host-produced kairomones, including acetone, butanone, lactic acid and a number of phenolic compounds (Bhasin et al. [@CR4]; Logan et al. [@CR31]). The addition of cow urine and hexane extracts of hair samples from large animals have also been shown to increase the attraction of *C. impunctatus* to traps baited with CO~2~ alone, and CO~2~ and 1-octen-3-ol, respectively (Bhasin et al. [@CR5]; Mands et al. [@CR32]). While the chemical components responsible for this increase in attraction of *C. impunctatus* to animal odor have not been elucidated fully, in analyses by coupled gas chromatography and electroantennographic detection (GC-EAD) in our laboratory volatile components have been identified from cow urine and hair that elicit antennal responses in a related species, *C. nubeculosus* (Isberg et al. [@CR27]). In a laboratory behavioral assay, 1-octen-3-ol, decanal, 2-ethylhexanol, phenol and 4-methylphenol elicited attraction of *C. nubeculosus* when combined with CO~2~, whereas octanal, nonanal, (*E*)-2-nonenal and 3-propylphenol acted as behavioral inhibitors. The behavioral effect of these volatiles was dose dependent. The aim of this study was to determine the release rates of the compounds identified from cow urine and hair that either increase or reduce the attraction of *C. impunctatus* to traps baited with CO~2~-in the field. The experiments were conducted in Southern Sweden, an area where livestock are at risk to midge-borne diseases (Doréa et al. [@CR20]; Hultén et al. [@CR26]), and where biting midge populations feed voraciously on people and animals during the period between April to October (Ander et al. [@CR1]). We discuss our findings in relation to their potential use in future surveillance and control strategies targeting biting midges. Methods and Materials {#Sec2} ===================== Study Site {#FPar1} ---------- Field trapping was performed at Stockhultsgården, 14 km northwest of Markaryd, Sweden (N 56° 32,867′, E 13° 32.542′), from June to mid-July, the peak season for blood-feeding *C. impunctatus* in Southern Sweden. The field site, a meadow (approximately 2.6 ha), surrounded by a mixture of evergreen and deciduous trees, sustains a large population of *C. impunctatus*. As a well-established hunting ground, the area is inhabited by populations of elk, fallow deer, roe deer and wild boar, all potential hosts of biting midges (Blackwell et al. [@CR7]; Pettersson et al. [@CR36]; Viennet et al. [@CR54]). Odour Compounds {#FPar2} --------------- The compounds tested in this study have previously been identified in aerations of cattle hair and urine, and shown to elicit electrophysiological and behavioral responses in *C. nubeculosus* in the laboratory (Isberg et al. [@CR27]). Chemicals used were sourced from Sigma-Aldrich Chemie GmbH, Steinheim, Germany, except for 3-propylphenol which was obtained from Alfa Aesar GmbH Karlsruhe, Germany (Table [1](#Tab1){ref-type="table"}).Table 1Odor compounds and dispensers used in combination with carbon dioxide in field tests of trapping *Culicoides* biting midges and target release ratesCompoundPurity (%)OriginRelease rateapprox 0.1 mg h^−1^approx 1 mg h^−1^approx 10 mg h^−1^No. vialsHole dia (mm)No. vialsHole dia (mm)No.vialsHole dia (mm)Octanal98Cattle hair1426216Nonanal95Cattle hair18210616Decanal98Cattle hair18116916(*E*)-2-nonenal97Cattle hair161169162-Ethylhexanol99Cattle urine162109161-Octen-3-ol98Cattle hair14110516Phenol99Cattle urine161105open^a^4-Methylphenol99Cattle urine162106open^a^3-Propylphenol98Cattle urine1821010open^a^Dispensers were polyethylene vials (height 32.9 mm, diameter 22.8 mm) with a hole drilled in the lid^a^Lid removed from vial Determination of Release Rates {#FPar3} ------------------------------ Test compounds (100 μl) were released via holes drilled in the lids of polyethylene vials (Kartell Labware, Noviglio, Italy; height 32.9 mm, diameter 22.8 mm, wall thickness 1.35 mm) at three different approximate release rates of 0.1 mg h^−1^, 1 mg h^−1^ and 10 mg h^−1^. The size of the holes and number of vials required for each combination of compound and release rate (Table [1](#Tab1){ref-type="table"}) were determined through preliminary experiments. Vials were weighed prior to and following 24 h of outdoor exposure, with weights recorded every hour for the first 6 h. This procedure was repeated twice, using two vials per compound per repetition, to obtain an average release rate for each compound to be used in trapping experiments (Table [2](#Tab2){ref-type="table"}). Maximum and minimum temperatures during the measurement period were 19 °C and 8 °C respectively, similar to those during the period of trapping experiments (16 °C and 9 °C respectively).Table 2Average release rates (± SEM) over 24 h of odor compounds from vials with lids with different sized holes (*N* = 4; 8 °C -- 19 °C)CompoundLid hole diameter (mm)Release rate (mg h^−1^)Octanal40.18 ± 0.0760.48 ± 0.27165.47 ± 0.38Nonanal80.12 ± 0.03100.50 ± 0.14161.62 ± 0.18Decanal80.08 ± 0.12161.12 ± 0.03(*E*)-2-nonenal60.18 ± 0.14161.15 ± 0.112-Ethylhexanol60.20 ± 0.09100.43 ± 0.17161.12 ± 0.171-Octen-3-ol40.18 ± 0.10101.05 ± 0.07162.05 ± 0.48Phenol60.15 ± 0.03100.93 ± 0.28open1.92 ± 0.344-Methylphenol60.10 ± 0.08100.60 ± 0.15open1.58 ± 0.383-Propylphenol80.15 ± 0.10100.48 ± 0.20open0.93 ± 0.20 Trapping Protocol {#FPar4} ----------------- The field site was divided into five sub-sites, each separated by at least 100 m. To avoid cross contamination, only one compound was tested at each sub-site at any one time, and each compound was only tested at one sub-site. Traps used were Centers for Disease Control and Prevention (CDC) standard miniature light traps fitted with a CO~2~ delivery system (Model 1012-CO~2~; The John W. Hock Company, Gainesville, Florida). Carbon dioxide from a cylinder (Strandmöllen AB, Ljungby, Sweden) was released at 500 ml min^−1^ (Bhasin et al. [@CR5]; Harrup et al. [@CR24]) from both control and test traps. The vials containing test compounds were hung on the outside of the trap close to the CO~2~-release point of the test traps (Fig. [1](#Fig1){ref-type="fig"}).Fig. 1Placement of vials releasing odor compounds on the CDC light trap A randomized design was used to study the individual odor compounds at different release rates. One control trap, releasing CO~2~ only, was placed with the three traps baited with the individual odor compounds released at different rates, together forming a test group. One test group was placed at one of the sub-sites in the form of a square, with traps 1.5 m from the ground, 3 m apart. This experimental set up was selected to counteract high temporal and spatial variation of biting midge densities that can increase or decrease dramatically over distances less than 50 m (Kirkeby et al. [@CR29]; personal observations). The positions of the traps were randomly placed within the test group before every test night, using a computerized randomization scheme (Minitab® 15 Statistical Software, Minitab Inc. UK). Each trap was set to operate from 2 h before sunset until 1 h after sunset, for a total of seven nights, with vials replaced after every night. Insects attracted to each trap were drawn into a collection bottle containing a dilute detergent solution. Bottles were emptied daily, and the insects placed in 75% ethanol for storage and transportation. In the laboratory, the numbers of biting midges collected were recorded and identified to species level under a microscope using a morphological identification key (Delecolle [@CR19]). Larger samples, \>1000 biting midges, were subsampled according to the method of Vanark and Meiswinkel ([@CR51]) to obtain an estimate of the total number of biting midges in the sample. Statistical Analysis {#FPar5} -------------------- The goal of the statistical analyses was to identify release rates for each compound, which, when used in combination with CO~2~, attracted significantly higher or lower numbers of biting midges than the CO~2~-only control. A mixed modelling approach was used to control for variation in numbers of biting midges collected between days (Paterson and Lello [@CR35]), using the lme4 (Bates et al. [@CR3]) package in R ([@CR41]). Biting midge numbers were log-transformed prior to analysis to control for over-dispersion in the distribution of trap collections. For each compound, the log-transformed number of biting midges was entered as the dependent variable in the model, with compound release rate entered as a four-level fixed factor (CO~2~-only control set as the reference level of the factor, 0.1 mg h^−1^, 1 mg h^−1^, 10 mg h^−1^). Day (experimental days 1--7) was entered as a random effect. To identify whether there was a significant overall effect of release rate on the number of biting midges collected, likelihood ratio tests were used to compare the residual deviance of models that included and excluded release rate as a factor. Where an overall effect of release rate was found, the significance of differences between number of biting midges caught at 0.1 mg h^−1^, 1 mg h^−1^ and 10 mg h^−1^ compared to the CO~2~-only control was assessed through the model coefficients associated with each release rate. Coefficients with absolute *t*-values greater than 2 were gauged to indicate significantly different (*P* \< 0.05) numbers of biting midges caught compared to the CO~2~ only control (Baayen et al. [@CR2]). Results were presented graphically by extracting the model predictions derived from the fixed effects only (release rate), which were subsequently back-transformed onto the original scale. Bootstrapped-confidence intervals (100 simulations) for the predictions were calculated using the boot package in R (Canty and Ripley [@CR12]; Davison and Hinkley [@CR18]), back transformed onto the original measurement scale. Results {#Sec3} ======= Total Number of *Culicoides* Collected and Species Identification {#FPar6} ----------------------------------------------------------------- In total, 642,933 biting midges were collected in the control and odor-baited traps. Of these, 99.98% were identified as *C. impunctatus*, with *C. obsoletus senso lato* accounting for the remaining 0.024%. Relative Attractiveness of Individual Compounds at Different Release Rates {#FPar7} -------------------------------------------------------------------------- A significant effect of the release rate of nonanal on biting midges collected was detected (*χ* ^*2*^ = 8.40, *df* = 3, *P* \< 0.05; Fig. [2](#Fig2){ref-type="fig"}, middle left). However, none of catches with the different release rates differed significantly from the catch in the trap baited with CO~2~ only. This indicated that a significant difference existed between the number of biting midges collected by traps baited with nonanal released at 0.1 mg h^−1^ and 10 mg h^−1^ (Fig. [2](#Fig2){ref-type="fig"}). The release rate of decanal was found to have an impact on the numbers of biting midges collected (*χ* ^*2*^ = 22.1, *df* = 3, *P* \< 0.001; Fig. [2](#Fig2){ref-type="fig"}, bottom left), and traps baited with decanal released at the two lower rates collected a significantly higher number of biting midges than the CO~2~-only control trap. There was no significant difference in the number of biting midges collected in traps baited with decanal released at 10 mg h^−1^ or those baited with CO~2~ only.Fig. 2Predicted number of biting midges collected (±95 % confidence intervals. Fixed effects only) for nine cattle-derived odors, when released in combination with carbon dioxide (CO~2~). White bars represent CO~2~-only controls (*N* = 7), and grey bars CO~2~ plus test compound at three different release rates (*N* = 7). Asterisks indicate significant differences (*P* \< 0.05) from the CO~2~-only control in the mixed model There was a significant overall effect of the octanal release rate on the numbers of biting midges collected (*χ* ^*2*^ = 15.7, *df* = 3, *P* \< 0.01; Fig. [2](#Fig2){ref-type="fig"}, top left). While there was no significant difference in numbers collected between traps baited with octanal released at 0.1 mg h^−1^ and the CO~2~-only control trap, traps baited with octanal released at 1 mg h^−1^ and 10 mg h^−1^ collected significantly fewer biting midges than the control trap. Similarly, there was an overall effect of the (*E*)-2-nonenal release rate on the numbers of biting midges collected (*χ* ^*2*^ = 8.8, *df* = 3, *P* \< 0.05; Fig. [2](#Fig2){ref-type="fig"}, top center), and traps baited with (*E*)-2-nonenal at the two highest release rates collected significantly fewer biting midges than the CO~2~-only control trap. However, there was no significant difference in numbers collected between traps baited with the lowest release rate of (*E*)-2-nonenal and the CO~2~ control trap. The release rate of 2-ethylhexanol had no effect on the number of biting midges collected (*χ* ^*2*^ = 5.6, *df* = 3, *P* \> 0.05; Fig. [2](#Fig2){ref-type="fig"}, center). In contrast, the release rate of 1-octen-3-ol, had an overall impact on the number of biting midges collected (*χ* ^*2*^ = 16.3, *df* = 3, *P* \< 0.001; Fig. [2](#Fig2){ref-type="fig"}, bottom center). Traps baited with 1-octen-3-ol released at the two lower rates collected a significantly higher number of biting midges than the CO~2~ control trap, whereas there was no significant difference in numbers collected in the trap baited with 1-octen-3-ol released at 10 mg h^−1^ and the CO~2~-only trap. The release rate of phenol was found to have an impact on the number of biting midges collected (*χ* ^*2*^ = 7.9, *df* = 3, *P* \< 0.05, Fig. [2](#Fig2){ref-type="fig"}, top right). Traps baited with phenol released at 0.1 mg h^−1^ and 1 mg h^−1^ collected more biting midges than the CO~2~-only control trap. There was no significant difference in numbers collected between traps releasing phenol at the highest release rate and the control trap. Similarly, the release rate of 4-methylphenol also had an impact on the number of biting midges collected (*χ* ^*2*^ = 16.4, *df* = 3, *P* \< 0.01, Fig. [2](#Fig2){ref-type="fig"}, middle right). Traps baited with 4-methylphenol released at the two lowest rates collected more biting midges than the CO~2~-only control trap. The number of biting midges collected also varied with release rate of 3-propylphenol (*χ* ^*2*^ = 12.2, *df* = 3, *P* \< 0.01; Fig. [2](#Fig2){ref-type="fig"}, bottom right), with traps baited with 3-propylphenol at all release rates tested collecting a significantly higher number of biting midges than the CO~2~-only control trap. Discussion {#Sec4} ========== Semiochemicals have a demonstrated potential for use in control strategies targeting biting midges (Carpenter et al. [@CR14]). Building on laboratory results on *C. nubeculosus*, this study showed that some cattle-associated kairomones can be used to enhance attraction of *C. impunctatus* to CO~2~-baited traps in the field. Moreover, some other kairomones reduced trap captures, indicating their potential use as repellents. Low release rates of decanal, in combination with CO~2~, increased trap captures of *C. impunctatus* when compared to the control CO~2~ trap. This is in agreement with previous studies showing that host-derived aldehydes, either alone or in combination with other host volatiles, play an important role in the attraction of mosquitoes (Syed and Leal [@CR43]; Tchouassi et al. [@CR46]) and tsetse flies (Gikonyo et al. [@CR23]). Tchouassi et al. ([@CR46]) also showed that blends of host-derived aldehydes, in combination with CO~2~, were more effective in attracting mosquitoes compared to individual aldehydes. Similar results have been obtained from studies on herbivorous insects showing that behavioral responses to blends of host volatiles often exceed the responses to individual components (Pickett et al. [@CR37]; Webster et al. [@CR55]). An implication of this is that the volatiles may be perceived as non-host cues if detected by the insect individually, outside the context of the blend, but when combined together in a blend they may be perceived as an attractive host stimulus. This may be the case for octanal, nonanal and (*E*)*-*2-nonenal, which, if presented at a lower release rate or in a blend, could be perceived as a host-cue by biting midges. Alternatively, octanal and (*E*)*-*2-nonenal may act as host-derived repellents at higher doses (Jaleta et al. [@CR28]). The results obtained for 1-octen-3-ol are consistent with those of previous field studies on *C. impunctatus*, *C. nubeculosus* and other biting midge species (Bhasin et al. [@CR5]; Blackwell et al. [@CR9]; Harrup et al. [@CR24]; Kline et al. [@CR30]; Ritchie et al. [@CR42]). 1-Octen-3-ol is a well-characterized mammalian kairomone (Pickett et al. [@CR37]), which is known to attract various hematophagous insects, including tsetse flies (Torr [@CR47]; Vale and Hall [@CR49]) and mosquitoes (Kline et al. [@CR30]; Takken and Kline [@CR44]). As was observed for decanal, *C. impunctatus* were more attracted to traps with a low release rate of racemic 1-octen-3-ol, as previously shown in both laboratory and field studies (Bhasin et al. [@CR4]; Blackwell et al. [@CR9]; Isberg et al. [@CR27]) of *C. impunctatus* and *C. nubeculosus*. While this study analyzed the effect of racemic 1-octen-3-ol on attraction of *C. impunctatus*, other studies on both biting midges and mosquitoes imply that it is the (*R*)*-*enantiomer that is important for attraction (Harrup et al. [@CR24]) and for some species even repellence (Pingxi et al. [@CR38]). Based on the results of Harrup et al. ([@CR24]), future field experiments on *C. impunctatus* should validate the effect of (*R*)*-*1-octen-3-ol seen in *C. nubeculosus* and *C. obsoletus.* Addition of phenol, 4-methylphenol, 3-propylphenol and 2-ethylhexanol, identified in air entrainments of cattle urine (Isberg et al. [@CR27]), to traps baited with CO~2~ increased trap captures of *C. impunctatus*. The results obtained for phenol, as well as 4-methylphenol, agree with those observed for *C. nubeculosus* in the laboratory (Isberg et al. [@CR27]). Phenol, 4-methylphenol and 3-propylphenol, in combination with other host volatiles, have previously been shown to attract *C. impunctatus* (Bhasin et al. [@CR5]) as well as other biting midge species (Cilek et al. [@CR17]; Venter et al. [@CR52]) when compared to an unbaited control traps. Phenolic compounds found in ox urine are also known attractants for tsetse flies (Bursell et al. [@CR11]; Vale et al. [@CR50]) and the zoophilic mosquito *Anopheles quadriannulatus* (Takken and Knols [@CR45]). Unlike tsetse flies that are attracted to blends of phenolic compounds in urine to a level equal to or greater than those with natural urine (Bursell et al. [@CR11]; Torr et al. [@CR48]; Vale et al. [@CR50]), the results from this study suggest that biting midges are attracted to individual phenolic compounds at a similar level to that of natural urine; phenol (0.1 mg h^−1^), 4-methylphenol (0.16--1.41 mg h^−1^) and 3-propylphenol (0.023--0.18 mg h^−1^), and in the case of 3-propylphenol also higher rates than the natural release. In the field experiments presented here, 2-ethylhexanol, when released in combination with CO~2~, did not collect significantly more biting midges than the CO~2~ only control trap, although a larger capture was observed when 2-ethylhexanol was released at 0.1 mg h^−1^. This suggests that lower release rates of 2-ethylhexanol should be tested in future field experiments, an argument also supported by behavioral experiments in the laboratory with *C. nubeculosus* (Isberg et al. [@CR27]). The attraction of *C. impunctatus* to traps baited with cattle-derived kairomones provides a more diversified set of control and surveillance tools than that currently available (Carpenter et al. [@CR14]). While semiochemical-based trapping of biting midges is likely to reflect host-seeking populations more accurately than other trapping protocols, the current lures, predominantly 1-octen-3-ol and CO~2~, are not optimal (Carpenter et al. [@CR14]; Carpenter et al. [@CR15]; Gerry et al. [@CR21]; Harrup et al. [@CR24]; Viennet et al. [@CR53]). Future studies will have to assess whether the compounds originally identified to modulate the behavior of *C. nubeculosus* in the laboratory, and then of *C. impunctatus* in the field, also attract other *Culicoides* species. Further optimization of attractive lure(s) could involve analyzing the effect of blends, including host-derived aldehydes or phenolic compounds, on biting midge behavior. The findings that some host-derived volatiles can inhibit the host seeking behavior of *Culicoides* biting midges (Isberg et al. [@CR27]; this study) merit further investigation. These repellents might be an innovative way to disrupt the host-seeking behavior of biting midges, similar to what has been shown for tsetse flies (Gikonyo et al. [@CR22]) and malaria mosquitoes (Jaleta et al. [@CR28]). This project was financed by the Swedish Research Council (Formas) and supported by the Linnaeus Grant IC-E3 (Formas, Sweden). DPB was supported by an EU intra-European fellowship for career development.
{ "pile_set_name": "PubMed Central" }
<?xml version="1.0" encoding="utf-8"?> <merge xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools"> <ImageView android:id="@+id/label_image" android:layout_width="wrap_content" android:layout_height="wrap_content" /> <TextView android:id="@+id/label_title" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textColor="@android:color/white" android:textSize="20sp" fontPath="DINNextLTPro-Light.otf" tools:ignore="MissingPrefix" /> </merge>
{ "pile_set_name": "Github" }
Two surveys came out on the eve of the World Economic Forum in Davos. One of them was about inequality. Even as Davos saw a record 1,500 private jets arrive this year, 50 percent more than last, and Oxfam reported that the richest 26 people in the world now own as much wealth as the bottom half of the world’s population, that half—some 3.8 billion—saw their wealth decline by 11 percent. According to Axios, wealth held by the world’s billionaires has grown from $3.4 trillion in 2009, right after the Wall Street-generated market crash, to $8.9 trillion in 2017. ...As former U.S. Federal Reserve vice chair Alan Blinder once told me, when historians look back on the late 20th century, “they will marvel at the equanimity” with which those in power accepted “the shift from labor to capital, the almost unprecedented shift of money and power up the income pyramid.” In response, the sycophants at Bloomberg rushed to the defense of the wealthy. Their reason to doubt Oxfam? 2018 economic growth numbers "look healthy". So how can things be bad if the GDP is going up? So far in Davos -a room full of billionaires laughed tauntingly at @AOC’s 70% marginal tax prop. -Bill Gates scoffed at notion the system was broken, hinted critics were communists -Tony Blair laughed at idea his cohort was responsible for any global malady Uh, keep it up guys pic.twitter.com/sCAZoZorH1 — Brian Merchant (@bcmerchant) January 23, 2019 The other survey to come out was by a shameless group of corporate brown-nosers. Amid low confidence that politicians will fix the problems, these people are turning to companies, with 75 percent saying they trust “my employer”, compared to 48 percent for government and 47 percent for the media. “CEOs now have to be visible, show personal commitment, absolutely step into the void, because we’ve got a leadership void in the world,” Richard Edelman, head of the communications marketing firm that commissioned the research, told Reuters. A "study" comes out on the eve of Davos saying that people are in love with CEOs and want them to run the world. What are the chances of that? The survey had a separate category for the better-educated, higher-earning “informed public”. You have to contact the firm to get the methodology of the study. It isn't publicly available. When you are surrounded by yes men, eager to tell you whatever you want to hear, it's easy to believe pretty much anything. On the other end of the spectrum are the Yellow Vests in France who have an interesting new strategy. France’s anti-government “yellow vest” protesters are to put forward a list of candidates to run in upcoming European Parliament elections, it said on Wednesday. I'm not sure whether this is a good thing, or a bad thing, but it shows that the movement still has legs. This isn't gonna go away. Interestingly, the tax policies of the anti-globalist/populist Trump and the globalist/neoliberal darling Macron have the exact same outcome, benefiting the exact same 1%. What does that have to do with Davos? Davos is the capital of the McResistance. If you are looking for the central hub or nexus of opposition to Donald Trump's presidency and insight into the minds of his most vocal critics at home and abroad, look no further than the 2019 meeting of the World Economic Forum in Davos, Switzerland. I have written previously that Davos serves as an annual reminder that the smartest people in the world are actually all morons. This was putting it too kindly. That covers the fake #Resistance, but what about the fake populism? Well, Davos has that covered too. So when Schwab publicly throws globalism under the bus, sounding like a leftist university professor while he’s at it, it’s worth paying attention. In the run-up to the 2019 World Economic Forum, Schwab wrote an article in which he declared that “Globalism is an ideology that prioritizes the neoliberal global order over national interests.” Schwab, like the broader Davos set, is trying to adjust to the age of populism. But that’s not to suggest they’re surrendering to it. Quite the opposite: Schwab’s anti-globalist shift is a hijacking attempt. It shows how corporate elites are trying to accommodate nationalist populism while still maximizing their own personal gains—which, of course, come at the expense of the very masses they’re attempting to appeal to. The theme of WEF is “Globalization 4.0”. Do you think these people have any interest at all in compromise? In sharing a tiny share of their wealth? As professor Mark Blyth explained, the Hamptons are not a defensible position.
{ "pile_set_name": "OpenWebText2" }
Ever fathom how the Internet works? What it really means to upload a selfie or submit an online survey? How the entire digital landscape interconnects, putting the world, as they say, at your fingertips? There are many convoluted elements involved in answering this question; like mapping the brain, it can be a headache. And much like the brain, the internet is built upon a series of connections. Consider fiber optic cables. These bundles of glass or plastic threads are the pulse of modern day telecommunications, linking up internet connections around the world as an increasing number of people get online. Think broadband. Currently there is enough fiber optic cable under the oceans to circle the earth 22 times, with the longest cable spanning 24,000 miles. Together the 550,000 miles of cable transmit 99% of international digital data. Undersea cables have been linking up telecommunications for over 150 years, and now a new human-caused global phenomenon is altering their trajectory, for better or worse. < The First Submarine cable In 1854 the first transatlantic submarine telegraph cable was laid between Newfoundland and Ireland. Four years later it sent its first message:“Laws, Whitehouse received five minutes signal. Coil signals too weak to relay. Try drive slow and regular. I have put intermediate pulley. Reply by coils.” Cable Landing stations There are over 983 landing stations across the world. Cutting the cables In 2013, three men attempted to cut the SMW4 cable off the coast of Alexandria. The head of Egypt Telecom said the incident caused a 60 percent drop in Internet speeds. Cableless antarctica Antarctica is the only continent that has not been reached by a submarine telecommunications cable. Satellite communications are the only way to communicate, and are unreliable. The Cable The cable will run over 9,600 miles connecting Japan and the UK. Once the cable is connected it will take the 154 milliseconds for data to reach either side, 24 milliseconds faster than what is currently available. > As climate change warms and acidifies the world’s oceans—causing great shifts in marine habitats and presenting myriad challenges for the wildlife relying on ecosystem stability to survive—the melting effect of climate change on the Arctic is having the opposite effect for fiber optics by instead giving them even more room to grow. In remote parts of the world, such as the Arctic Circle, impenetrable Arctic sea ice has made setting up certain extremely sought-after cable routes inconceivable until recently. But now, with sea Arctic ice cover on a diminishing trajectory, it may soon be possible to connect London and Tokyo directly via fiber optic cable for the first time. Toronto-based Arctic Fibre is the company poised to take on this monumental task, which will involve laying nearly 10,000 miles of undersea cable along the sea floor. The final course of the cable will run through the Northwest Passage, a perilous, ice-ridden waterway linking the Atlantic and Pacific oceans. Surrounded by more than 50,000 icebergs, the route is located some 500 miles north of the Arctic Circle and just over 1,000 miles from the North Pole. Consisting of a complex web of channels that navigate Arctic islands and icebergs, the entire passage is nearly 1,000 miles long. Scientists have predicted that the continued melting of Arctic sea ice could make the entire Northwest Passage ice-free by summers in the middle of this century. This will impact not only cable routes, but shipping routes, allowing vessels to shave nearly one-third of the distance off journeys that would otherwise require a trip through the Panama Canal. NASA has monitored annual Arctic sea ice growth and retreat since 1978. September 2002 marked a watershed year, in which the minimum sea ice extent since 1979 was reached. Since then a number of record of near-record low years have occurred as the rate of decline has quickened in the 21st century. In September 2012, Artic sea ice reached a new all-time low of 3.39 million square kilometers (1.3 million square miles)—only around 56% of the amount present in 2000 and 1990 and less than half of what was recorded in September 1980. < 1985 Ice area 1985 1985 Ice area 1990 1985 Ice area 1995 1985 Ice area 2000 1985 Ice area 2005 1985 Ice area 2010 1985 Ice area 2010 Ice area 2011 1985 Ice area 2010 Ice area 2012 1985 Ice area 2010 Ice area 2013 1985 Ice area 2010 Ice area 2014 > The projected price tag of this next stage in underwater cable proliferation being led by Arctic Fibre is estimated to be $620 million for the just the “backbone”, which could be completed as soon as the end of 2016. Separate branches will connect Seattle, Ireland, and Tomakomai, Japan. What makes such a daunting and expensive project worthwhile? The link between Asia and Europe will provide a shorter route for data delivery, which translates to a number of benefits, including faster stock market transactions that can yield a competitive advantage. There would also be security benefits, especially when compared to other overland cables connecting the two regions—these cables run through the volatile Middle East or the Caucuses, especially disruption-prone regions, according to Buzzfeed. The cable will also eschew many of the other service disrupting human-related risk factors that fiber optic cables are subject to, such as fish trawling and ship anchorages, which according to the International Submarine Cable Protection Committee make up almost 70% of outages. For the Artic Fibre line, ice will be the biggest risk factor. Tens of thousands of Canadians and Alaskans also stand to gain access from the project as well, including those living in remote villages, oil and gas exploration and extraction units, and Arctic research facilities. Without a reliable connection to the grid, up to this point these outposts have relied on slow and unpredictable satellite connections. According to Arctic Fibre, the cable will bring “virtually unlimited bandwidth” to some 26,600 Alaskans as well as a handful of Canadian communities. It will also reduce wholesale bandwidth costs by as much as 85%. The difference in speed between Artic Fibre’s proposed cable and existing connections between London and Tokyo can be measured in milliseconds—24 milliseconds to be exact. The new Arctic Fibre cable will decrease communication time between the U.K. and Japan from 179 milliseconds to 154 milliseconds. This minuscule time difference can feel like eternity when it comes to algorithmic stock market trading, i.e. high-frequency trading, where a difference of a few milliseconds can be the difference of millions of dollars. On top of the additional branches, Arctic Fibre’s new cable will have several landing points, where connections to the greater grid are established: Ajigaura, Japan, Cambridge Bay, Nunavut, Canada, and Highbridge in the United Kingdom. Of the entire 10,000-mile route, only around 17 miles will be laid above ground along an area known as the Boothia Peninsula in the northern Canadian Arctic.
{ "pile_set_name": "OpenWebText2" }
Polypharmacy in hospitalized older adult cancer patients: experience from a prospective, observational study of an oncology-acute care for elders unit. A novel Oncology-Acute Care for Elders (OACE) unit that uses an interdisciplinary team to enhance recognition and management of geriatric syndromes in hospitalized older adult cancer patients has been established at Barnes-Jewish Hospital (St. Louis, Missouri). The OACE team includes a clinical pharmacist whose primary role is to improve the appropriateness of prescribing. Using polypharmacy as the prototypical geriatric syndrome addressed by the OACE team, the objective of this study was to document the processes of communication of an interdisciplinary team and the impact on polypharmacy when the treating physician did not participate in the daily interdisciplinary team rounds. This was a prospective, observational study of older cancer patients admitted to the OACE unit. We tracked processes and outcomes of interdisciplinary communication regarding medications by prospectively recording OACE team recommendations and evaluating the frequency of implementation of these recommendations through a chart review. Treating physicians, who did not attend team rounds, received these recommendations on a communication form placed in the patient's chart. Forty-seven patients were included in the study. The mean (SD) age was 73.5 (7.5) years. Twenty-one percent (10/47) of patients were prescribed > or =1 Beers medication as part of their home-care regimen before admission to the OACE unit. The OACE team made 51 medication recommendations, and 42 of those recommendations (82%) were implemented. Twenty-five patients (53%) had an alteration in their medication regimen; 13 (28%) had a potentially inappropriate medication discontinued. A medication error was corrected in ~1 of every 8 patients (6/47 [13%]). We found that polypharmacy was common in older cancer patients and increased during hospitali-zation. We also found that most OACE team recommendations communicated to physicians were implemented even though the primary physicians were not members of the OACE team. Future randomized trials are needed to assess the impact of the OACE team model of care on adverse events, survival, and cost in hospitalized older adult cancer patients.
{ "pile_set_name": "PubMed Abstracts" }
October 30, 2012 JUDGMENT The Fourteenth Court of Appeals ANGELICA MARTINEZ, Appellant NO. 14-11-00869-CV V. FALLAS PAREDES AND J&M SALES OF TEXAS, L.L.C., Appellees ________________________________ This cause, an appeal from the judgment in favor of appellees, FALLAS PAREDES AND J&M SALES OF TEXAS, L.L.C., signed, July 8, 2011, was heard on the transcript of the record. We have inspected the record and find no error in the judgment. We order the judgment of the court below AFFIRMED. We order appellant, Angelica Martinez to pay all costs incurred in this appeal. We further order this decision certified below for observance.
{ "pile_set_name": "FreeLaw" }
/* * Copyright (C) 2013 salesforce.com, inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.auraframework.impl.root; import com.google.common.collect.Maps; import org.auraframework.Aura; import org.auraframework.def.AttributeDef; import org.auraframework.def.AttributeDefRef; import org.auraframework.def.DefDescriptor; import org.auraframework.def.EventHandlerDef; import org.auraframework.def.RegisterEventDef; import org.auraframework.def.RootDefinition; import org.auraframework.def.TypeDef; import org.auraframework.expression.Expression; import org.auraframework.expression.PropertyReference; import org.auraframework.impl.expression.PropertyReferenceImpl; import org.auraframework.impl.root.event.EventHandlerImpl; import org.auraframework.impl.type.ComponentArrayTypeDef; import org.auraframework.impl.type.ComponentTypeDef; import org.auraframework.impl.util.AuraUtil; import org.auraframework.instance.Attribute; import org.auraframework.instance.AttributeSet; import org.auraframework.instance.BaseComponent; import org.auraframework.instance.EventHandler; import org.auraframework.instance.Instance; import org.auraframework.instance.InstanceStack; import org.auraframework.instance.ValueProvider; import org.auraframework.instance.Wrapper; import org.auraframework.service.DefinitionService; import org.auraframework.system.Location; import org.auraframework.throwable.AuraRuntimeException; import org.auraframework.throwable.AuraUnhandledException; import org.auraframework.throwable.NoAccessException; import org.auraframework.throwable.quickfix.AttributeNotFoundException; import org.auraframework.throwable.quickfix.InvalidDefinitionException; import org.auraframework.throwable.quickfix.InvalidExpressionException; import org.auraframework.throwable.quickfix.MissingRequiredAttributeException; import org.auraframework.throwable.quickfix.QuickFixException; import org.auraframework.util.json.Json; import org.auraframework.util.json.Serialization; import org.auraframework.util.json.Serialization.ReferenceType; import java.io.IOException; import java.util.Collection; import java.util.HashSet; import java.util.Iterator; import java.util.Map; import java.util.Set; /** */ @Serialization(referenceType = ReferenceType.IDENTITY) public class AttributeSetImpl implements AttributeSet { private static final Location SUPER_PASSTHROUGH = AuraUtil.getExternalLocation("super component attribute passthrough"); // Immutable? I think not. private DefDescriptor<? extends RootDefinition> rootDefDescriptor; private boolean trackDirty = false; private final Map<DefDescriptor<AttributeDef>, Attribute> attributes = Maps.newHashMap(); private final Map<DefDescriptor<EventHandlerDef>, EventHandler> events = Maps.newHashMap(); private final BaseComponent<?, ?> valueProvider; private final Instance<?> parent; private final boolean useUnlinkedDefinition; public AttributeSetImpl(DefDescriptor<? extends RootDefinition> componentDefDescriptor, BaseComponent<?, ?> valueProvider, Instance<?> parent) throws QuickFixException { this(componentDefDescriptor, valueProvider, parent, false); } public AttributeSetImpl(DefDescriptor<? extends RootDefinition> componentDefDescriptor, BaseComponent<?, ?> valueProvider, Instance<?> parent, boolean useUnlinkedDefinition) throws QuickFixException { this.rootDefDescriptor = componentDefDescriptor; this.valueProvider = valueProvider; this.parent = parent; this.useUnlinkedDefinition = useUnlinkedDefinition; setDefaults(); } @Override public void setRootDefDescriptor(DefDescriptor<? extends RootDefinition> descriptor) throws QuickFixException { rootDefDescriptor = descriptor; setDefaults(); } @Override public DefDescriptor<? extends RootDefinition> getRootDefDescriptor() throws QuickFixException { return rootDefDescriptor; } private void setDefaults() throws QuickFixException { Map<DefDescriptor<AttributeDef>, AttributeDef> attrs = getRootDefinition().getAttributeDefs(); for (Map.Entry<DefDescriptor<AttributeDef>, AttributeDef> attr : attrs.entrySet()) { AttributeDefRef ref = attr.getValue().getDefaultValue(); if (ref != null && !attributes.containsKey(attr.getKey())) { set(ref); } } } private void set(EventHandler eventHandler) { events.put(eventHandler.getDescriptor(), eventHandler); } private void set(Attribute attribute) { if (trackDirty) { attribute.markDirty(); } attributes.put(attribute.getDescriptor(), attribute); } private void set(AttributeDefRef attributeDefRef) throws QuickFixException { RootDefinition def = getRootDefinition(); Map<DefDescriptor<AttributeDef>, AttributeDef> attributeDefs = def.getAttributeDefs(); AttributeDef attributeDef = attributeDefs.get(attributeDefRef.getDescriptor()); // setAndValidateAttribute should be merged with creating the // AttributeImpl here AttributeImpl attribute; if (attributeDef == null) { Map<String, RegisterEventDef> events = def.getRegisterEventDefs(); if (events.containsKey(attributeDefRef.getDescriptor().getName())) { EventHandlerImpl eh = new EventHandlerImpl(attributeDefRef.getDescriptor().getName()); Object o = attributeDefRef.getValue(); if (!(o instanceof PropertyReference)) { // FIXME: where are we? throw new InvalidDefinitionException(String.format("%s no can haz %s", eh.getName(), o), SUPER_PASSTHROUGH); } eh.setActionExpression((PropertyReference) o); set(eh); return; } else { // FIXME: where are we? throw new AttributeNotFoundException(rootDefDescriptor, attributeDefRef.getName(), SUPER_PASSTHROUGH); } } else { attribute = new AttributeImpl(attributeDef.getDescriptor()); } try { attributeDefRef.parseValue(attributeDef.getTypeDef()); } catch(InvalidExpressionException exception) { // Kris: // This is going to fail a good handfull of things at the moment, I need to // Uncomment and test against the app before trying to check this in. // Mode mode = contextService.getCurrentContext().getMode(); // if(mode.isDevMode() || mode.isTestMode()) { // throw new InvalidValueSetTypeException( // String.format("Error setting the attribute '%s' of type %s to a value of type %s.", attributeDef.getName(), attributeDef.getTypeDef().getName(), attributeDefRef.getValue().getClass().getName()), // exception.getLocation()); // } } Object value = attributeDefRef.getValue(); InstanceStack iStack = Aura.getContextService().getCurrentContext().getInstanceStack(); iStack.markParent(parent); iStack.setAttributeName(attributeDef.getDescriptor().toString()); if (valueProvider != null) { iStack.pushAccess(valueProvider); } value = attributeDef.getTypeDef().initialize(value, valueProvider); if (valueProvider != null) { iStack.popAccess(valueProvider); } iStack.clearAttributeName(attributeDef.getDescriptor().toString()); iStack.clearParent(parent); attribute.setValue(value); set(attribute); } @Override public void set(Collection<AttributeDefRef> attributeDefRefs) throws QuickFixException { for (AttributeDefRef attributeDefRef : attributeDefRefs) { set(attributeDefRef); } } @Override public void set(Collection<AttributeDefRef> facetDefRefs, AttributeSet attributeSet) throws QuickFixException { RootDefinition rootDef = getRootDefinition(); Map<DefDescriptor<AttributeDef>, AttributeDef> attrs = rootDef.getAttributeDefs(); Map<DefDescriptor<?>, Object> lookup = Maps.newHashMap(); for (Attribute attribute : attributeSet) { lookup.put(Aura.getDefinitionService().getDefDescriptor(attribute.getName(), AttributeDef.class), attribute); } for (AttributeDefRef attributeDefRef : facetDefRefs) { lookup.put(attributeDefRef.getDescriptor(), attributeDefRef); } for (DefDescriptor<AttributeDef> desc : attrs.keySet()) { Object val = lookup.get(desc); if (val != null) { if (val instanceof Attribute) { Attribute attribute = (Attribute) val; setExpression(attribute.getDescriptor(), new PropertyReferenceImpl("v." + attribute.getName(), SUPER_PASSTHROUGH)); } else if (val instanceof AttributeDefRef) { set((AttributeDefRef) val); } } } } @Override public void set(Map<String, Object> attributeMap) throws QuickFixException { if (attributeMap != null) { Map<DefDescriptor<AttributeDef>, AttributeDef> attrs = getRootDefinition().getAttributeDefs(); for (Map.Entry<String, Object> entry : attributeMap.entrySet()) { try { DefDescriptor<AttributeDef> desc = Aura.getDefinitionService().getDefDescriptor(entry.getKey(), AttributeDef.class); if (attrs.containsKey(desc)) { setExpression(desc, entry.getValue()); } } catch (AuraRuntimeException arex) { throw new InvalidDefinitionException("Error setting attribute: " + entry.getKey(), new Location(this.parent.getDescriptor().toString(), 0), arex); } } } } @Override public Object getValue(String name) throws QuickFixException { PropertyReference expr = getPropertyReferenceByName(name); return getValue(expr); } /** * Returns raw object instead of evaluated value of attribute * * @param name * @return Raw Object from attributes map * @throws QuickFixException */ @Override public Object getRawValue(String name) throws QuickFixException { PropertyReference expr = getPropertyReferenceByName(name); return getExpression(expr.getRoot()); } @Override public <T> T getValue(String name, Class<T> clazz) throws QuickFixException { Object val = getValue(name); if (val == null) { return null; } try { return clazz.cast(val); } catch (ClassCastException cce) { throw new AuraRuntimeException("attribute <" + name + "> is of the wrong type: expected " + clazz.getName() + " but got " + val.getClass().getName()); } } @Override public Object getExpression(String name) { DefDescriptor<AttributeDef> desc = Aura.getDefinitionService().getDefDescriptor(name, AttributeDef.class); Attribute at = attributes.get(desc); if (at != null) { return at.getValue(); } return null; } private void setExpression(DefDescriptor<AttributeDef> desc, Object value) throws QuickFixException { RootDefinition rd = getRootDefinition(); AttributeDef ad = rd.getAttributeDefs().get(desc); if (ad == null) { // this location isn't even close to right... throw new InvalidDefinitionException(String.format("Attribute %s not defined on %s", desc.getName(), rootDefDescriptor.getName()), rd.getLocation()); } AttributeImpl att = new AttributeImpl(desc); if (value instanceof Expression) { att.setValue(value); } else { InstanceStack iStack = Aura.getContextService().getCurrentContext().getInstanceStack(); iStack.markParent(parent); iStack.setAttributeName(desc.toString()); if (valueProvider != null) { iStack.pushAccess(valueProvider); } att.setValue(getRootDefinition().getAttributeDef(att.getName()).getTypeDef().initialize(value, null)); if (valueProvider != null) { iStack.popAccess(valueProvider); } iStack.clearAttributeName(desc.toString()); iStack.clearParent(parent); } set(att); } /** * Due to dynamic providers, we need to fetch definition each time when setting attributes. * * TODO: Why? * * @return Definition * @throws QuickFixException */ private RootDefinition getRootDefinition() throws QuickFixException { DefinitionService definitionService = Aura.getDefinitionService(); if (this.useUnlinkedDefinition) { // when serializing module instances, we normalize attributes with the component, // but the def should be stored in context cache as it will be serialized to the client return definitionService.getUnlinkedDefinition(rootDefDescriptor); } else { return definitionService.getDefinition(rootDefDescriptor); } } @Override public Object getValue(PropertyReference expr) throws QuickFixException { Object value = getExpression(expr.getRoot()); PropertyReference stem = expr.getStem(); if (value instanceof Expression) { value = ((Expression) value).evaluate(valueProvider); } if (value instanceof ValueProvider && stem != null) { value = ((ValueProvider) value).getValue(stem); } else if (stem != null) { AttributeDef attributeDef = getRootDefinition().getAttributeDef(expr.getRoot()); if (attributeDef == null) { // no such attribute. throw new NoAccessException("No attribute "+expr.getRoot()+" in "+rootDefDescriptor); } value = attributeDef.getTypeDef().wrap(value); if (value instanceof ValueProvider) { value = ((ValueProvider) value).getValue(stem); } } if (value instanceof Wrapper) { value = ((Wrapper) value).unwrap(); } return value; } @Override public void serialize(Json json) throws IOException { try { json.writeMapBegin(); json.writeMapEntry("valueProvider", valueProvider); if (!attributes.isEmpty()) { RootDefinition def = getRootDefinition(); json.writeMapKey("values"); json.writeMapBegin(); for (Attribute attribute : attributes.values()) { String name = attribute.getName(); AttributeDef attributeDef = def.getAttributeDef(name); if (attributeDef == null) { throw new AttributeNotFoundException(rootDefDescriptor, name, def.getLocation()); } if (attributeDef.getSerializeTo() == AttributeDef.SerializeToType.BOTH) { TypeDef typeDef = attributeDef.getTypeDef(); if ((valueProvider == null && !((typeDef instanceof ComponentArrayTypeDef) || (typeDef instanceof ComponentTypeDef))) || attribute.isDirty()) { json.writeMapEntry(name, attribute.getValue()); } } } json.writeMapEnd(); } if (!events.isEmpty()) { json.writeMapEntry("events", events); } json.writeMapEnd(); } catch (QuickFixException e) { throw new AuraUnhandledException("unhandled exception", e); } } @Override public int size() { return attributes.size(); } /** * @return Returns the valueProvider. */ @Override public BaseComponent<?, ?> getValueProvider() { return valueProvider; } @Override public Iterator<Attribute> iterator() { return attributes.values().iterator(); } @Override public boolean isEmpty() { return attributes.isEmpty() && events.isEmpty(); } @Override public void startTrackingDirtyValues() { trackDirty = true; } @Override public void validate() throws QuickFixException { Set<AttributeDef> missingAttributes = this.getMissingAttributes(); if (missingAttributes != null && !missingAttributes.isEmpty()) { throw new MissingRequiredAttributeException(rootDefDescriptor, missingAttributes.iterator().next() .getName()); } } @Override public Set<AttributeDef> getMissingAttributes() throws QuickFixException { Map<DefDescriptor<AttributeDef>, AttributeDef> attrs = getRootDefinition().getAttributeDefs(); Set<AttributeDef> missingAttributes = null; for (Map.Entry<DefDescriptor<AttributeDef>, AttributeDef> attr : attrs.entrySet()) { if (attr.getValue().isRequired() && !attributes.containsKey(attr.getKey())) { if (missingAttributes == null) { missingAttributes = new HashSet<>(attrs.entrySet().size()); } missingAttributes.add(attr.getValue()); } } return missingAttributes; } private PropertyReference getPropertyReferenceByName(String name) throws InvalidDefinitionException { PropertyReference expr = new PropertyReferenceImpl(name, AuraUtil.getExternalLocation("direct attributeset access")); if (expr.size() != 1) { throw new InvalidDefinitionException("No dots allowed", expr.getLocation()); } return expr; } }
{ "pile_set_name": "Github" }
Raheem Sterling, best known for shopping in Poundland, despite earning triple figures a week, today was seen scoring against Crystal Palace instead of passing to a team-mate. If that wasn’t enough, the winger was wearing Nike Mercurial Vapor XI’s, which retail at £190, despite thousands of people who will be sleeping without a roof over their head tonight. The news comes just days after Sterling was seen driving a dirty car on his way to Manchester City’s training ground. If kicking a ball around a field for 90 minutes wasn’t tiring enough for poor old Sterling, can you imagine what a strain it would have been for him to clean his FIFTY-THOUSAND pound Mercedes? Manchester City took on Crystal Palace this afternoon in an Emirates FA Cup clash in which Pep Guardiola’s side went on to win by a three-goal margin. But, we’d be surprised if the FA doesn’t think about calling on a replay after Raheem Sterling’s act of horror, as the Englishman placed the ball into the back of the net wearing £190 boots. It’s like the 22-year-old can pick and choose when he has money, and when he doesn’t. One day, he’s beating the working class to the last packet of Jaffa Cakes in Poundland, the next? He’s wearing football boots that children in Africa could only dream of wearing. It’s sickening. The Metropolitan Police have had to investigate the claims into Sterling’s act of selfishness after thousands of Twitter users publicly ‘tweeted’ their rage at the Manchester City player. It’s still unknown what kind of punishment Sterling will receive after his antics, but many are hoping it’s a harsh one. Previous crimes such as shopping in Poundland, buying a house so he doesn’t have to sleep in the streets and driving around in a dirty car have surely totaled up and it’s unfair that footballers with money escape punishments that the working class or unemployed job seekers receive. Note:This article is totally made-up and is a parody, mainly mocking the Daily Star. So please don’t be going to work telling your best mate that Raheem Sterling has been arrested for not passing a football.
{ "pile_set_name": "Pile-CC" }
In utero radiation-induced changes in growth factor levels in the developing rat brain. To investigate the role of growth factors in the compensatory response to radiation injury during development of the brain. Levels of gene expression in the embryonic rat brain were assessed for IGF-I, IGF-II, BDNF and NT-3. Pregnant Wistar rats were exposed to a single dose of 10, 20 or 40 cGy X-rays on day 15 or 17 of gestation. Animals were sacrificed 4 or 24 h after exposure. IGF-I, BDNF and NT-3 proteins were detected by immunocytochemistry, while IGF-I and IGF-II mRNA by in situ hybridization, and Northern analysis respectively. In utero low dose X-irradiation led to a decrease in IGF-I gene expression and a compensatory increase in the expression of IGF-II, BDNF and NT-3 in the developing rat brain. IGF-I, BDNF and NT-3 immunopositive cells were detected among proliferating, migratory and post-mitotic neurones in the developing neuroepithelium. Low dose prenatal irradiation of the developing brain results in down-regulation of IGF-I, which could lead to cell death by apoptosis. On the other hand, IGF-II, BDNF and NT-3 gene expression is increased following irradiation, possibly as a compensatory mechanism.
{ "pile_set_name": "PubMed Abstracts" }
Q: $L(M) = L$ where $M$ is a $TM$ that moves only to the right side so $L$ is regular Suppose that $L(M) = L$ where $M$ is a $TM$ that moves only to the right side. I need to Show that $L$ is regular. I'd relly like some help, I tried to think of any way to prove it but I didn't reach to any smart conclusion. what is it about the only side right moves and the regularity? A: Hint -- You need to show that your TM has the same power as a finite-state automaton (as the commenter Dave Clarke said), that is, given such a TM, construct a FSA that accepts the same language. But since the TM has no memory but the tape, ask yourself what a right-only TM can do with its tape. It should be relatively straightforward to actually construct the parts of the FSA you are looking for. Just go through them -- the states, the input alphabet and most crucially the move function (usually $\delta$) and define them in terms of the parts of the TM you started with. Then you have to show that the two accept the same language, in terms of the definition of "accept" for each, being sure to mention potential looping behavior in the TM. BTW, this sort of problem is amenable to a pretty convincing "hand-waving" proof that would actually be of a type that is quite acceptable in a research paper. Your course, however, may be expecting a precise proof, using $\delta$ and the other components of the tuples that constitute the TM and FSA. A: The only difference between a finite automaton and a Turing machine is the tape. The tape provides memory ability. If you can go only on one side, then you simply can't read what you have written. To formally prove this you build an automaton from your machine $M$. Suppose $A$ is the automaton in $M$. Then your automaton $A'$ will be the same as $A$ with a one-cell memory, because you can still read the cell you are on in $M$. (Number of states of $A'$ = number of states of $M$ $×$ size of the alphabet of the tape). Note that this is still true if you can only read the cells that are at a bounded distance from the visited cell the most on the right because you have still a bounded memory. Also, the number of tapes and whether you read from a tape or a "standard input" like a DFA does not matter.
{ "pile_set_name": "StackExchange" }
Exurapteryx Exurapteryx is a genus of moths in the family Geometridae. References Category:Geometridae
{ "pile_set_name": "Wikipedia (en)" }
There are many entities which produce information in databases that is then used to produce booklets which are mailed or otherwise distributed to end users. Generically these entities may be referred to as database publishing companies, which companies do not have the incentive to invest in the imaging computer systems and print engines that are necessary to produce booklets, or other documentation, therefore the data must be transmitted to another site for actual imaging. In efficient modern installations, the data from the database publishers is taken by the imaging organization, the data is significantly reformulated, and then imaging is practiced. While some time--depending upon the raw data received--final print streams may be produced within several hours after receipt of the raw data, more often the time frame is on the order of days. However in many situations it is highly desirable to be able to turn an entire print job around within twenty-four hours, which is not universally feasible with present technology. In the present specification and claims, various jargon will be utilized which is specifically identified here for ease of reference: ______________________________________ TERMINOLOGY DETAILED DESCRIPTION ______________________________________ Background An image or graphic over which other graphics and text may be imaged. Booklet A collection of documents to be produced in response to an end user inquiry or need. Document A collection of hard copy pages logically related to each other through their content, typically formed by a number of signatures, and formulated into a booklet. EPS Encapsulated postscript files, which are typically converted especially by proprietary imaging systems for use therein. Fixed Data Graphics and text which are shared among substantially all documents in a print stream. .GEN File All the information relating to a specific production run are captured in a generic job file. This file is initially developed when a job is configured. Job Formatting A table which provides a translation Table mechanism to map variable data fields provided by a database publisher to the actual data stream read by the print system. The data stream is of a format which is specific to a given printer, reflecting engine specific parameters such as resolution and imposition, and serving to "hide" production specific information from the database publisher. Object Association A table which identifies print ready Table documents which are appropriate for getting jobs. Included are descriptions of the documents and certain production information such as the number of signatures, target markets, etc. When utilized by a database publisher, substantially only the file names included in the table may be utilized. Print Image Stream The final variable stream provided to the XLC "Digital ColorQuick"! imaging system. The print image stream is specific to the individual type of printer and the production method (imposition). RIP A raster image processor, comprising electronics which assemble individual bitmaps and images into a document which is printed. Selectable Criteria Combination of text, graphics and images which can be printed on a document with an imaging systems' receipt of a single data code. Selectable criteria codes are defined in a ".GEN file" and passed to an imaging system with a variable data stream. Signature A sheet of paper which is folded into a collection of pages to be included in a document. Signatures may include imaging on both sides. Variable Data Unique text information compared to other documents in the same print stream, which almost always originates from the database publisher and may include name, address, telephone, and like information. VBI Variable bit image codes, a single image being associated with a data code utilizing variable bit image codes. Unlike selectable criteria VBIs refer to only one set of spatial data (such as position, size, etc.). VBIs are passed to the system in the variable data stream. VCC Station A variable color configuration station. Takes care of pre-screening all imaged data in its final "print ready" form; that is images are sized and rotated for the final appearance as required by the print job, and the images are then stored on a file server where they reside until required by an imaging run. XLC Data System Electronics and software available from Moore Business Forms, Inc. of Lake Forest, Illinois which preprocess job information prior to imaging of individual documents. The processing includes the preloading of images, the reading of variable data, web synchronization, and other functions. Its official commercial name is "Digital ColorQuick". .XLF File An XLC proprietary file comprising a prescreened (rasterized) graphic element which is ready to be printed on a resolution specific device. ______________________________________ According to the present invention, a method and system are provided which significantly enhance the present ability to turn around entire print jobs. According to the present invention data is provided to a database publisher in the form of the object association table so that elements necessary to facilitate the production of a final print stream are greatly expanded. The database tables, which comprise a standard programming interface, enhance system flexibility and enhance data handling throughput, allowing an entire print job to be turned around within twenty-four hours of data closeout by the database publisher, something heretofore possible only on an irregular basis for specific small jobs. According to one aspect of the present invention a method of producing documents at a first site from database information produced at a second site remote from the first site is provided, utilizing a specific print engine (which may be of any conventional type, such as a MIDAX printer available from Moore Business Forms, Inc., or a Xeikon printer). The method comprises the following steps: (a) Providing the object association table, which associates document production jobs with specific documents and appropriate object descriptions, so that it is accessible at the second site. (b) Accessing the object association table at the second site, and utilizing substantially only file names in the object association table, producing database information at the second site. (c) Supplying the database information from the second site to a translation site, and translating the database information from the second site so that it may be utilized by the specific print engine at the first site, utilizing a job formatting table to build an engine specific print image stream. And, (d) utilizing the engine specific print image stream to electronically control the specific print engine at the first site to image documents having variable information from the database information supplied in step (c). Step (A) may be practiced in alternative manners. For example it may be practiced on-line through a communications network, or by supplying the object association table in machine readable form to the second site (e.g. via disc, tape, or the like) for incorporation into a computer system at the second site. Typically the object association table is provided at the first site and accessible from the second site, and step (c) is typically practiced so that the database information is supplied to and translated at the first site. The engine specific print stream typically has all variable information for control of the print engine, BI coded and selectable criteria codes. Step (b) may be practiced by document sorting according to a predetermined delivery mechanism, providing document references for all documents to be produced at the first site using the object association table, and adding variable data to the documents. Steps (c) and (d) may be practiced to image on the fly directly from the data source the character data for the print engine, typically only the font data being pre-rasterized, or an XLC system may pre-rasterize only the font and character data; with all variable data being provided from steps (b) and (c) in the engine specific print image stream, so that the print engine can print with substantially no limitations related to the number of different text combinations. A plurality of different specific print engines may be provided at the first site. Step (c) is then practiced to build a different engine specific print stream depending upon which print engine is utilized. The invention also relates to a system for producing documents at a first site from database information produced at a second site remote from the first site. The system may comprise the following components: A first computer remote from the second site containing an object association table which associates document production jobs with specific documents and appropriate object descriptions. A specific print engine at the first site for imaging documents, and electronically controlled by a specific variable print image stream. A second computer at the second site capable of using the object association table to produce database information containing specific file names. A third computer remote from the second site for using the database information supplied by the second computer and a job formatting table contained within the third computer for translating the database information containing specific file names from the second computer to produce a print image stream specifically for controlling the specific print engine. And, a fourth computer at the first site connected to the specific print engine utilizing the print image stream from the third computer, along with other data, to control the specific print engine to print desired documents containing variable information provided from the second computer database information. The first and third computers may be provided within the same computer housing, at the first site, and the fourth computer is typically the electronics part of the XLC data system {Digital ColorQuick! and is distinct from the first and third computers. Telephone lines are typically provided for providing the communication between the first computer and the second computer so that the second computer may access the object association table on-line. A plurality of specific print engines may be provided at the first site each controlled by different specific print image streams, and the third computer, and job formatting table contained therein, may produce different specific print image streams depending upon which specific print engine of the plurality of print engines is to be controlled by the fourth computer to produce desired printed documents. Preferably the fourth computer images on the fly directly from the data source substantially the character data for the print engine, substantially only the font data being pre-rasterized, or substantially only the font and character data is pre-rasterized, with all variable data being provided by the print image stream, so that the print engine can print with substantially no limitations related to the number of different text combinations. According to another aspect of the present invention a method of setting up a system for a data publisher to provide data for a remote imaging system to print and merge the data in signatures which are combined into a document, and where a number of documents are combined to produce a booklet, is provided. The method comprises the following steps: (a) Setting the document standards for construction including the number of documents per booklet. (b) Identifying the variable data fields associated with each document while specifying that the document which will be produced for a given production run have the same number and type of variable fields. (c) Defining the fonts and characters for variable data at the time individual jobs are built. (d) Defining variable data so that is limited to text elements which are very likely to change from document to document or from production run to production run. (e) Identifying the output sorting requirements for the documents. (f) Determining document identifiers and their variable fields in a manner that effects a production cycle. (g) Determining how frequently document changes will be processed. And, (h) converting document data supplied as a result of steps (a) through (g) into imposed, rasterized bitmaps which are built and rotated to reflect the production for a specific combination of production methods. Step (h) may be practiced by the sub-steps of: (h1) Converting data to be supplied to the system into resolution specific bitmaps. (h2) Imposing the data from the resolution specific bitmaps onto a specific signature. And, (h3) positioning and rotating variable text fields as each signature is built. It is the primary object of the present invention to provide for the enhanced flexibility and data handling to produce booklets or documentation for mailings, distributions, or the like. This and other objects of the invention will become clear from the detailed description of the invention and from the appended claims.
{ "pile_set_name": "USPTO Backgrounds" }
Solid phase HLA antibody detection technology--challenges in interpretation. The introduction into routine diagnostic laboratories of solid phase assays for human leukocyte antigen (HLA) antibody detection has resulted in the application of new laboratory matching algorithms in clinical organ transplantation which have improved pre-transplant detection of immunization, in turn resulting in avoidance of rejection in many cases which until their introduction would not have been possible using the historical complement dependent serological techniques. There have been two generations of solid phase assays introduced into routine practice, namely, the enzyme-linked immunosorbent assay (ELISA) technique and the use of fluorescent beads with HLA molecules bound to their surface which can either be used in conventional flow cytometry or in conjunction with Luminex instrumentation, the latter having become the most popular approach. The use of the fluorescent bead techniques has raised interesting questions both with respect to technical performance and the interpretation of the results obtained. The advantages of bead technology for HLA antibody determination and the technical issues requiring resolution are the subject of this review.
{ "pile_set_name": "PubMed Abstracts" }
Monday, October 13, 2014 Israel, Here Comes The End | "This is the END! ~The End My Only Friend The End" | APARTHEID ~ GENOCIDE ET CETERA By Gilad Atzmon>> An Israeli Facebook page launched earlier this month to assist Israelis in escaping their apocalypse through migration has now gone viral reaching more than 700,000 Israelis. It is called Olim Le-Berlin, ‘Ascending to Berlin,’ using the same positive Hebrew expression ‘Aliya’ attributed to the Jewish Diaspora emigrating to Israel. Apparently, the confident Zio-patriotic balloon has been burst by a few Palestinian rockets landing in Tel Aviv. In truth, this implosion is occurring because the Jewish State is an inconvincible concept. As much as the Jews yearned to return to their phantasmic ‘homeland,’ they failed to make Palestine into a true home. On the contrary, Israel has become the definitive showcase of every problematic Jewish ideological and cultural trait: it is racially supremacist, it is exclusive, it is an abusive ghetto suffocated with goy hatred, and its treatment of its own people and especially its poor is despicable.Yesterday, I learned from Israeli TV Arutz 2 that the migration campaign organizers have applied directly to German Kanzlerin Angela Merkel to request 25,000 temporary work visas. They did so in response to more than 9000 calls from desperate Israelis. Some Israeli patriots are clearly devastated by the recent dash to mass migration, they labeled the new campaign as an “insult to all Holocaust survivors.” “See you in the gas chambers,” commented one critic on the Facebook page. If any of these WMD obsessed Israelis really want to witness the way in which my exile Israeli friends interact artistically with me, jazz chambers rather than ‘gas chambers’ is probably the best place to do so. According to Israeli officials, the number of Israeli ‘deserters’ is offset by incoming Jews from Eastern Europe, America and France, who tend to be “more religious and right-wing.”Israeli officials also admit that Western metropolitans are more attractive to Israeli secular and educated youngsters. A growing numbers of educated Israelis understand that Israel’s fate is pretty much sealed.It is crucial to remember that for more than a few years, Israelis of European descent have been queuing at German, Hungarian and Polish consulates for foreign passports. Their Sephardi brothers are also eagerly awaiting for the Spanish parliament to approve a plan to grant nationality to no less than three million Sephardi Jews. The take home message is devastatingly clear. Israel has now officially entered its final terminal phase. The catastrophic situation has entered into Israeli collective awareness. Israelis are now running for their lives and they have good reason to believe that Europe will soon close its gates to avoid the Hebrew tsunami. Predictably, it wasn’t the watery Soros funded ‘non-violent’ BDS movement that brought the Jewish State to its end. It was effectuated by authentic Palestinian resistance; an Islamic motivated willingness to fight and a fierce determination to win. It is the ability to send a ballistic message to Tel Aviv and Haifa that delivers the unmistakable message to Israelis that they are dwelling on stolen land. Again, we see that it doesn’t take much for the Jews to reveal their flimsy ideological and spiritual bond to nationhood. If the IDF and Zionism initially inspired the fearless Jewish combative warrior; a few sirens in Tel Aviv revealed the feeble nature of Israel’s ideological bond and the depth of Israeli hedonistic inclinations. From a psychoanalytical perspective, it may be that the murderous barbarism Israel exhibited in every recent round of violence is the result of a desperate attempt to conceal the weakness and the crumbliness of Jewish nationalism. Recently, the Jewish theologian Marc Ellis concluded that my writing should be grasped within the context of the canonical work of the Hebrew prophets. Although flattered by Ellis’ observation, I don’t agree with his analysis. I am an essentialist thinker. Fifteen years ago I published my first novel, Guide To The Perplexed. The futuristic fiction tells the story of the collapse of Israel in the 2030’s exactly as described above. It tells the story of Hebrew refugees invading the streets of Berlin. Read the 2001 Amazon blurb and judge for yourself: “The year is 2052, and the state of Israel has been defunct for 40 years, the majority of its citizens having become refugees overseas. Gunther (Wünker) loves European, especially German, women and soon leaves Israel to find fame, fortune and fornication in Germany…A darkly funny reflection on the dangers of racial purity and the position of the outsider in Western Europe…” (http://www.amazon.com/A-Guide-Perplexed-Gilad-Atzmon/dp/1852428260) Be aware, Guide To The Perplexed was written by the young libidinal me; it is filthy and horny as well as philosophical and funny. I was described as a ‘cum philosopher’ at the time. If you are prudish or sensitive you may want to skip this title. The Wandering Who? A Study Of Jewish Identity politics and Jewish Power in particular - available on Amazon.com & Amazon.co.uk BRAINWASHED dogs in PAVLOV'S laboratories GREATEST EXPERIMENT FOUND all by the natural FLOODING that washed away the MEMORIES VIA EXPERIMENTS ALL TERROR - DROWNING - THINK KATRINA TOO! Modern Day Evil is not new WHAT is the real true truth!?! WHO are the MONSTERS-CREATURES-CRIMINALLY-INSANE WHENdo we address the real true truth?! WHERE IS A FATHER IN HEAVEN HOW HATH THOU FORSAKEN US! The evolution has begun AND IT is in our MIND/s, revolutionize the THINKING STUFF and let the energy cleanse HOLY vibrations ... DO IT ~YOURSELF~ ~~OURSELVES~~ ~~~OUR ~~~SELF AND TAKE THE BURDEN OFF "GOD"Grand Taoist Master Infinite Father-Mother-Spirit-"God" OMNISCIENT-OMNIPRESENT-OMNIPOTENT THINKING STUFF PERMEATING-PENETRATING-FILLING UNIVERSES KNOWN-UNKNOWN I thank Thee that Thou hearest My Prayer I thank Thee that Thou hearest Me Always I thank Thee that Thou hast already given Me All that My heart can wish for All that My life may need for the time that is And the eternity that is To be AND NOW with supreme joy And unspeakable thanksgiving I come to Thee to receive Thy gifts AND receive from Thy loving hands the divine blessings that Thou hast from ALL ETERNITY TREASURED for Me TIME TO CHANGE THE VIBES FROM DARK AND MID AGES INTO THE ENLIGHTENMENT!
{ "pile_set_name": "Pile-CC" }
I re-read The Gods Themselves because it was 1972’s Hugo winner, and all I could remember about it was three gendered aliens, which didn’t really seem fair. The part of the book I remembered is the middle. It does indeed have three gendered aliens feed on energy. Their genders are left, right, and mid, or parental, logical and emotional. Their sex is very weird but it’s described in detail—it’s as if Asimov read that Tenn story about alien amoeba porn and thought “I could write that!” Asimov didn’t often do aliens, but he does them very well here. It’s almost Tiptree-esque, and when I say that I am thinking of “Love is the Plan, the Plan is Death.” They feel alien and they feel like people and they have odd weird lifecycles. I could have lived without the emotional one being “she” but since the parental one is “he” and making up pronouns gets clunky fast I guess it’s reasonable. This really is a good novella about three gendered aquatic aliens. It’s a pity it’s buried in the rest of the book, which turns out to be deeply disappointing. Everybody who complained about the physics in Anathem? I hope you complained just as loudly about the physics in The Gods Themselves, because it’s wrong in exactly the same ways and much less entertainingly. I checked this with two actually scientist type people, because Asimov was a chemist and a hard science fiction writer and I didn’t want to trust the evidence of my own lying eyes, but here we have alternate universes with different physics in contact with each other and with different atoms and energy and messages and actual physical metals being exchanged between them, and this is really scientifically silly. Pu-187? I think not. But you know if I’m complaining about the science that means there’s something else wrong, because if I like a book I’m prepared to overlook the most ridiculous scientific errors. What’s wrong here is that the human parts are boring. The first part is about squabbling scientists and the discovery of the pump shuffling energy between universes. This is frankly dull, and its one redeeming feature is that it’s fairly short. The third part is set on the moon, and it’s somewhat more interesting than the first part but it has a kind of deus ex machina solution to the problem, which makes it all seem pointless. (I also thought it had been visited by the sexism fairy.) I do like a lot of Asimov, but this is far from being his best work. However, it won the Hugo and the Nebula and the Locus Award, so an awful lot of people must have loved it in 1973. I’ve tried to see what’s good in it—but really, it’s just the aliens. Maybe the aliens were enough to carry the whole book for some readers? They’re certainly the memorable part. And they’re still worth reading—that section grabbed me. I kept reading the rest in the hope that we might see them again before the end, and was disappointed. So I shake my head and disagree with the voters of 1973. If you like it, like the whole book as a novel, not just the alien section as a standalone story, I’d be very interested to hear you explain why. Jo Walton is a science fiction and fantasy writer. She’s published two poetry collections and nine novels, most recently Among Others, and if you liked this post you will like it. She reads a lot, and blogs about it here regularly. She comes from Wales but lives in Montreal where the food and books are more varied.
{ "pile_set_name": "OpenWebText2" }
Markušica Markušica (, ) is a village and a municipality in Vukovar-Srijem County, Croatia. Geography The municipality has a total area of 74.29 km2. River Vuka flows through the municipality and territory of the municipality is completely flat very fertile black soil. It is connected by D518 highway with rest of country. History One Scordisci archaeological site in Markušica dating back to late La Tène culture was excavated in the 1970s and 1980s as a part of rescue excavations in eastern Croatia. Archaeological site was a part of the settlement network of Scordisci in the area of Vinkovci. Markušica was one of the feudal villages that existed in the region before the Ottoman rule in Hungary. After the end of Great Turkish War village was settled by Eastern Orthodox Vlachs from surrounding areas and the eastern Bosnia. In 1736 there was 40 inhabited houses in Markušica. In 1866 this number increased at 192 houses and 1003 inhabitants out of which 902 were Eastern Orthodox. Demographics Population There are 2 555 inhabitants, the majority of the population which are Serbs, who make up 90.10% of the population according to the 2001 population census. Languages Due to the local minority population, the Markušica municipality prescribe the use of not only Croatian as the official language, but the Serbian language and Serbian Cyrillic alphabet as well. Religion Most of the population are Serbian Orthodox that are practicing their religion in the church that was built in 1810. and re-built in 1989. Politics Joint Council of Municipalities The Municipality of Markušica is one of seven Serb majority member municipalities within the Joint Council of Municipalities, inter-municipal sui generis organization of ethnic Serb community in eastern Croatia established on the basis of Erdut Agreement. As Serb community constitute majority of the population of the municipality it is represented by 2 delegated Councillors at the Assembly of the Joint Council of Municipalities, double the number of Councilors to the number from Serb minority municipalities in Eastern Croatia. Municipality government The municipality assembly is composed of 13 representatives plus additional seats for municipality minority groups if they don't get proportional number of seats. Assembly members come from electoral lists winning more than 5% of votes. Dominant party in the municipality since the reintegration of eastern Slavonia in 1998 is Independent Democratic Serb Party. 681 or 33,32 % out of 2.044 voters participated in 2017 Croatian local elections with 93,69 % valid votes. With 92,80% and 632 votes Budimir Brača from Independent Democratic Serb Party was elected as municipality major. As of 2017, the member parties/lists are: Summary of the 2017 Croatian local elections |- style="background-color:#E9E9E9" align=center !colspan=2|Party !Votes !% !Seats |- | bgcolor=#C50200| |align=left valign=top|Independent Democratic Serb Party||638||100,00||13 |- |align=left colspan=2|Invalid/blank votes||43||6,31||— |- |align=left colspan=2|Total||681||100||— |- |align=left colspan=2|Registered voters/turnout||2.044||33,32||— |- |align=left colspan=8| |- |align=left colspan=8|Source page 57-58 |} Economy Markušica is underdeveloped municipality which is statistically classified as the First Category Area of Special State Concern by the Government of Croatia. Education Culture Points of Interest Markušica Municipality is famous for a monument dedicated to a soldier killed in World War II. The village has a unique monument to a female Soviet pilot from the Red Army, who fought against the Nazis and whose plane was shot down here. The village also has an Orthodox Church from 1810, which was damaged in Associations and Institutions The village has a volunteer fire department. Settlements The municipality consists of the following settlements: Gaboš Karadžićevo Markušica''' Ostrovo Podrinje See also Vukovar-Srijem County Church of Pentecost, Markušica Joint Council of Municipalities References Category:Municipalities of Croatia Category:Populated places in Vukovar-Srijem County Category:Populated places in Syrmia Category:Joint Council of Municipalities Category:Serb communities in Croatia Category:Archaeological sites in Croatia Category:La Tène culture
{ "pile_set_name": "Wikipedia (en)" }
Longtime Detroit radio host Mike Clark has died at 63 Melody Baetens | The Detroit News Detroit radio legend Mike Clark of "The Drew and Mike Show" fame has died. His longtime co-host and friend Drew Lane confirmed his death to The Detroit News on Tuesday, saying Clark, 63, died in his sleep Monday night. "He had some medical issues the past couple years, but I'm still very surprised because we were texting yesterday and he was in typically good humor," Lane said. Clark and Lane's "Drew and Mike" show on Detroit rock station WRIF (101.1-FM) was the top talk-radio program in the market for many years. When it ended five years ago, the jokes and observations about pop culture, sports and music soon returned in the form of an independent podcast hosted by Lane and sometimes featured Clark. "I can't believe I'm not going to hear his laugh anymore," Lane said. "He had an incredible, incredible laugh. And he was very self-deprecating. The biggest laugh was always when he shared something from his own life like when he drove out of his garage with the garage door down." Lane said just that just one instance has brought him "a decade of laughs" and it's silly things like that that he will miss the most about Clark. Lane said Clark, who loved to fly airplanes, was married to wife Trish for more than 40 years and he added, "I don't think they were apart for more than a couple days. He loved her dearly." The "Drew and Mike" show left WRIF in 2013 after more than 20 years on the air. After the show ended, Lane said Clark still enjoyed being in touch with fans on social media. "I don't think he ever got over the popularity of the show; he just enjoyed it so much." [email protected] Twitter: @melodybaetens
{ "pile_set_name": "OpenWebText2" }
[INTRO] N.C. Your love is magical, that's how I feel N.C. But I have not the words here to explain N.C. Gone is the grace for expressions of passion N.C. But there are worlds and worlds of ways to explain N.C. To tell you how I feel [CHORUS 1] BbGm But I am speechless, speechless EbF That's how you make me feel BbGm Though I'm with you I am far away EbF And nothing is for real GmF When I'm with you I am lost for words EbF I don't know what to say GmF My head's spinning like a carousel EbF So silently I pray [VERSE 1] BbGm Helpless and hopeless EbF That's how I feel inside BbGm Nothing's real, but all is possible EbF If God is on my side GmF When I'm with you I am in the light EbF Where I cannot be found GmF It's as though I am standing in EbF The place called hallowed ground [CHORUS 2] CAm Speechless, speechless FG That's how you make me feel CAm Though I'm with you I am far away FG And nothing is for real AmG I'll go anywhere and do anything FG Just to touch your face AmG There's no mountain high I cannot climb FG I'm humbled in your grace [CHORUS 3] DBm Speechless, speechless GA That's how you make me feel DBm Though I'm with you I am lost for words GA And nothing is for real [CHORUS 4] EC#m Speechless, speechless AB That's how you make me feel EC#m Though I'm with you I am far away AB And nothing is for real EC#m Speechless, speechless AB That's how you make me feel EC#m Though I'm with you I am lost for words AB And nothing is for real E Speechless [OUTRO] N.C. Your love is magical, that's how I feel N.C. But in your presence I am lost for words N.C. Words like, "I love you." Sometimes late at night I lie awake and watch her sleeping She's lost in peaceful dreams So I turn out the lights and lay there in the dark And the thought crosses my mind If I never wake up in the morning Would she ever doubt the way I feel About her in my heart If tomorrow never comes Will she know how much I loved her Did I try in every way to show her every day That she's my only one And if my time on earth were through And she must face the world without me Is the love I gave her in the past Gonna be enough to last If tomorrow never comes 'Cause I've lost loved ones in my life Who never knew how much I loved them Now I live with the regret That my true feelings for them never were revealed So I made a promise to myself To say each day how much she means to me And avoid that circumstance Where there's no second chance to tell her how I feel So tell that someone that you love Just what you're thinking of If tomorrow never comes
{ "pile_set_name": "Pile-CC" }
324 F.Supp. 691 (1971) Martin P. MARSTON v. R. M. OLIVER, Superintendent of the Virginia State Farm. No. 272-69-R. United States District Court, E. D. Virginia, Richmond Division. March 10, 1971. *692 James L. Sanderlin, Richmond, Va., for petitioner. Overton P. Pollard, Asst. Atty. Gen., of Virginia, Richmond, Va., for respondent. MEMORANDUM MERHIGE, District Judge. Martin Marston petitions this Court for a writ of habeas corpus relieving him from the effects of a judgment of the Circuit Court of Chesterfield County. When he filed the petition, Marston was confined in the Virginia State Farm by the respondent. Pertinent facts about his criminal conviction have been stipulated: On February 24, 1969, Martin P. Marston, on a plea of guilty, was found guilty of driving on a suspended operator's license by the County Court of Chesterfield County, Virginia, and sentenced to one year imprisonment and $1,000 fine. From this sentence, Marston appealed and requested assistance of counsel on the appeal to the Circuit Court of Chesterfield County, Virginia. This request was denied. On May 27, 1969, on a plea of not guilty, Marston was found guilty by a jury and sentenced to 12 months in jail and a $100 fine. During the period of his imprisonment Marston filed a petition for habeas corpus challenging the denial of counsel. Thereafter on October 23, 1969, Marston was released from state custody. Subsequently, on January 6, 1970, Marston was barred from operating a vehicle on the highways of the State of Virginia for a period of ten years, having come under the provisions of Virginia Code § 46.1-387.1 et seq., as a result of the conviction in the Circuit Court of Chesterfield County, Virginia, on May 27, 1969. In addition to the factual stipulation, a plenary hearing revealed his indigency at the time of his request to the state court for assistance of counsel. The question presented is whether the petitioner's sentence to imprisonment for twelve months cannot stand by reason of the refusal to afford him appointed counsel. Mootness The case is not moot. Marston is now released from detention, but his conviction has given rise to the very real civil disability of ten years' withdrawal of his driving permit. In the record is the prosecutor's information which initiated the proceedings which resulted in this disability. One of the convictions listed in support of the claim that the petitioner is an "habitual offender" is that of May 27, 1969, attacked herein. Collateral prejudicial consequences, therefore, actually flow from the judgment here contested. Consequently the petitioner's release during the pendency of these proceedings does not moot his case. Sibron v. New York, 392 U.S. 40, 50-58, 88 S.Ct. 1889, 20 L.Ed.2d 917 (1968); Carafas v. LaVallee, 391 U.S. 234, 88 S.Ct. 1556, 20 L.Ed.2d 554 (1968); Wood v. Ross, 434 F.2d 297 (4th Cir. 1970); Hewett v. State of North Carolina, 415 F.2d 1316, 1320-1322 (4th Cir. 1969). Exhaustion of state remedies Marston did not take any direct appeal, nor have any collateral proceedings been initiated in state courts. For two reasons, however, he is not obliged to seek relief in such forums. First, the state habeas corpus procedure is not currently available to him. The Virginia Supreme Court of Appeals recently ruled that a prisoner whose sentences expired before a decision could be reached on his habeas corpus petition no longer presented the court with a litigable case: Our habeas corpus statutes are designed to provide relief in the form of the "discharge" (Code § 8-603) from the "person in whose custody" (Code § 8-598) a petitioner is "detained without lawful authority" (Code § 8-596). * * * * * * *693 The petitioner is no longer detained and there is no custody from which to discharge him. To pass upon the merits of his claims would be to render an advisory opinion — a function our habeas corpus statutes neither provide for nor permit. This court, therefore, is without jurisdiction further to entertain the case, and the appeal will be dismissed. Blair v. Peyton, 210 Va. 416, 171 S.E.2d 690, 691 (1970). There is no indication that the petitioner has deliberately bypassed state procedures by his failure to file a state habeas case while he was confined. Assuming that some prisoner might ever be so resolute in his efforts to avoid state procedures as to file only a federal petition and then await the expiration of his term to press for a ruling, this has not been Marston's strategy. That no intentional forfeiture of known avenues of relief has been made is plain if one considers the second reason for which exhaustion is not now necessary. Whether or not Virginia courts might now afford Marston a forum to litigate his constitutional claims, recent actions of the state's highest court make it manifest that the prevailing constitutional doctrine in the state system is not in accord with his claims. Resort to state courts would be futile. In such circumstances it is not required. Ralph v. Warden, 438 F.2d 786 n. 1 (4th Cir. 1970); Rowe v. Peyton, 383 F.2d 709 (4th Cir. 1967) affirmed, Peyton v. Rowe, 391 U.S. 54, 88 S.Ct. 1549, 20 L.Ed.2d 420 (1968); Patton v. North Carolina, 381 F.2d 636 (4th Cir. 1967), cert. denied, 390 U.S. 905, 88 S.Ct. 818, 19 L.Ed.2d 871 (1968); Evans v. Cunningham, 335 F.2d 491 (4th Cir. 1964). Recently the Virginia Supreme Court of Appeals denied two original petitions for habeas corpus by misdemeanor convicts who went to trial without counsel. In Hackette v. Royster, R 9863, mem. decis. (Va.Sup.Ct.App., June 19, 1969), a habeas petitioner had been tried for two violations of Va.Code § 6.1-115 (1966 Repl.Vol.), the offense of passing bad checks, which carries a maximum sentence of twelve months, Va.Code §§ 18.1-101, 18.1-9 (1960 Repl.Vol.). The state supreme court appointed counsel to brief the issues, which principally involved denial of the right to appeal and refusal to appoint counsel. It is clear, therefore, that the original habeas petition was considered on its merits, as the Supreme Court of Appeals does on occasion. Va.Code § 17-97 (1960 Repl. Vol.); Burgess v. Cunningham, 205 Va. 623, 139 S.E.2d 110 (1964); see Taylor v. Cox, No. 14, 108, mem. decis. (4th Cir., Apr. 22, 1970); McLaughlin v. Royster, Civil Action No. 5667-R, mem. decis. (E.D.Va. Jan. 13, 1971). Hackette's request for counsel's aid allegedly had been denied in the court not of record where he was tried. He pleaded guilty and allegedly sought to appeal. The guilty plea would not, under Virginia law, have precluded his contesting all issues in the de novo trial in a court of record afforded to appellants. Va.Code § 16.1-132 (1960 Repl.Vol.). His attorney specifically argued the applicability of Gideon v. Wainwright, 372 U.S. 335, 83 S.Ct. 792, 9 L.Ed.2d 799 (1963) to Hackette's case. A procedural question arose as to whether the Supreme Court of Appeals should or could remand to a lower court for the determination of unrecorded matters of fact raised in the pleadings. See Va.Code §§ 8-596, 8-598 (1957 Repl.Vol., Supp.1970). The respondent had not denied, however, that the petitioner was not represented by counsel nor was he offered court-appointed counsel. Under Virginia pleading principles, allegations not denied are accepted as true. Morris v. Smyth, 202 Va. 832, 120 S.E.2d 465 (1961). Whether or not conclusive court records were available to settle the factual issues of offer or waiver of counsel's assistance, and whether or not a hearing to determine those questions could be conducted, it would appear that the state of the pleadings in Hackette left no facts material to the issue in dispute, and that the legal question of the duty to provide counsel *694 in cases such as Hackette's alone remained. The dismissal of the petition consequently constituted a ruling on the merits adverse to the petitioner. Rowe v. Peyton, supra, offers a close analogy: [Rowe's] petition was rejected by the Supreme Court of Appeals of Virginia without an opinion, but in light of the factual allegations of the petition, that rejection must have been upon the procedural ground that Rowe was not presently serving the sentence he seeks to attack. Thacker should not be required to travel the same road through the state courts to present a question which the Virginia Supreme Court of Appeals has so recently decided, when there is no indication that it is now prepared to depart from the former course of its decisions. Rowe v. Peyton, supra, 383 F.2d at 711 (footnotes omitted). Carter v. Gathright, R 9840, mem. decis. (Va.Sup.Ct.App., June 17, 1969), is a similar case. Carter alleged that he asked the sheriff for an attorney before his county court trial. His request was denied. Responsive pleadings made no denial but stated ambiguously that "petitioner being tried for misdemeanors was not entitled as a matter of right * * * to counsel of his own choosing." The writ was denied in this case as well. Carter had faced two misdemeanor charges, each of which carried a maximum penalty of a year's confinement. In view of these recent rulings of the state's highest court resolving the very issue which Marston raises here adversely to his contentions, it would be senseless, even if a state forum would consider his claim on the merits, to require him to seek relief there. Right to counsel Marston was, at the time of his trial in the court not of record and at the time of his de novo retrial, financially unable to retain counsel. He had $35.00 available for his use in the first instance and no money at all the second time. The circuit court made no inquiry as to his financial status, despite that he did request counsel's aid. In view of Marston's request for counsel, it is obvious that he did not waive whatever rights he had. Nor did the petitioners who sought relief from the state supreme court in original habeas cases, for it has long been the law that a failure to request a lawyer's aid does not constitute an effective waiver: The purpose of the constitutional guaranty of a right to counsel is to protect an accused from conviction resulting from his own ignorance of his legal and constitutional rights, and the guaranty would be nullified by a determination that an accused's ignorant failure to claim his rights removes the protection of the Constitution. Johnson v. Zerbst, 304 U.S. 458, 465, 58 S. Ct. 1019, 1023, 82 L.Ed. 1461 (1938). The United States Supreme Court has not yet held that a defendant charged with a misdemeanor is entitled to counsel at state expense when he cannot afford his own. Opportunities for such a decision have arisen, but the Court has not found it appropriate, in those instances, to resolve the issue. DeJoseph v. Connecticut, 385 U.S. 982, 87 S.Ct. 526, 17 L.Ed.2d 443 (1966), cert. denied; Winters v. Beck, 385 U.S. 907, 87 S.Ct. 207, 17 L.Ed.2d 137 (1966), cert. denied; but see Patterson v. Warden, Maryland Penitentiary, 372 U.S. 776, 83 S.Ct. 1103, 10 L.Ed.2d 137 (1963). Of course no significance as to the merits of a particular contention can be attributed to a denial of certiorari. Despite the lack of a Supreme Court holding in point, the opinion in Gideon v. Wainwright, supra, which involved a felony conviction, is not qualified by language restricting it to felony prosecutions, or to cases wherein the defendant faces or receives a particular penalty: Not only these precedents but also reason and reflection require us to recognize that in our adversary system of criminal justice, any person haled into court, who is too poor to hire a lawyer, cannot be assured a fair trial unless *695 counsel is provided for him. This seems to us to be an obvious truth. Governments, both state and federal, quite properly spend vast sums of money to establish machinery to try defendants accused of crime. Lawyers to prosecute are everywhere deemed essential to protect the public's interest in an orderly society. Similarly, there are few defendants charged with crime, few indeed, who fail to hire the best lawyers they can get to prepare and present their defenses. That government hires lawyers to prosecute and defendants who have the money hire lawyers to defend are the strongest indications of the widespread belief that lawyers in criminal courts are necessities, not luxuries. The right of one charged with crime to counsel may not be deemed fundamental and essential to fair trials in some countries, but it is in ours. From the very beginning, our state and national constitutions and laws have laid great emphasis on procedural and substantive safeguards designed to assure fair trials before impartial tribunals in which every defendant stands equal before the law. This noble ideal cannot be realized if the poor man charged with crime has to face his accusers without a lawyer to assist him. Gideon v. Wainwright, supra, 372 U.S. 344, 83 S.Ct. 796 (emphasis supplied). Gideon, whether it establishes a constitutional right to counsel in all criminal cases or a right which exists only when an indigent defendant faces something over a certain minimum penalty, requires that defendants in Marston's position be afforded counsel's assistance. In this instance the criminal charge was not complex. From the prosecutor's point of view it might have been a case almost impossible to lose. The facts of the case might, however, have raised issues concerning the suspended status of Marston's license or his knowledge thereof. Counsel would have been necessary to identify and explore these issues. This Court does not rely, however, on any particular finding of prejudice, any "special circumstances" which imposed upon the state court the duty of appointing counsel for this indigent. For one thing, it is all too easy for the bench and the bar to dismiss certain cases as simple ones; we fail to perceive the judicial process as do laymen with less or different education. "That which is simple, orderly, and necessary to the lawyer — to the untrained layman — may appear intricate, complex, and mysterious." Johnson v. Zerbst, supra, 304 U.S. at 463, 58 S.Ct. at 1022. The material facts of a case may be simple, but the means to establish them may be beyond the lay defendant. Untutored in the law of evidence, he may forfeit a valid defense by neglecting to summon the requisite witnesses or present the proper documentary proof. Furthermore, approaching the issue with utmost realism, the Court believes that the greatest service which counsel may render in many cases is that of negotiating with his opposite number for a guilty plea to a reduced charge. "In many, or even most, cases, the only defense available is the determination and nerve of the defense attorney," Brown v. Peyton, 435 F.2d 1352 (4th Cir. 1970). A lay defendant cannot be expected to embark on such dealings unaided. Plea bargaining requires open discussion of the strengths and weaknesses of each side's case and a confident awareness of the consequences of alternative strategies. Without a lawyer, a defendant may be unconscious even of the opportunity to commence such discussions, and he certainly will be constrained in his conduct thereof. "Counsel, or effective waiver thereof, is a sine qua non of permissible plea bargaining." Grades v. Boles, 398 F.2d 409 (4th Cir. 1968). To deny an indigent a legal representative is effectively to deny him the power to bargain at all. Moreover, in nearly every context in which courts have concluded that counsel's services are essential to due process, they have abandoned any requirement that prejudice be specifically *696 shown. This reflects the realistic view that a lawyer's function is to discover legal and factual issues and to use available procedures to further the interests of his client at each stage of the prosecution, and that it is nearly impossible to reconstruct after the fact the likely course of a trial, had counsel played a role. A defendant wrongly denied counsel normally, then, is given the opportunity in a new trial to demonstrate how counsel would have served him, concurrently with a redetermination of his guilt. Prejudice from the prior denial is presumed. Chapman v. California, 386 U.S. 18, 23, 87 S.Ct. 824, 17 L.Ed.2d 705 (1967); Gideon v. Wainwright, supra; Hamilton v. Alabama, 368 U.S. 52, 55, 82 S.Ct. 157, 7 L.Ed.2d 114 (1961); Glasser v. United States, 315 U.S. 60, 75-76, 62 S.Ct. 457, 86 L.Ed. 680 (1942); Hewett v. State of North Carolina, supra, 415 F.2d 1325; compare Coleman v. Alabama, 399 U.S. 1, 90 S.Ct. 1999, 26 L.Ed.2d 387 (1970). Our court of appeals has held that when a defendant has been denied the aid of a lawyer loyal exclusively to his interests, "the possibility of harm is sufficient to render his conviction invalid." Sawyer v. Brough, 358 F.2d 70, 73 (4th Cir. 1966). This Court has concluded that at least when a layman faces possible imprisonment for twelve months, whatever the label of his offense, due process requires that he have the opportunity to defend himself by counsel. The distinction between felonies and misdemeanors is only a matter of designations applied by state law; federal constitutional rights do not hinge on such superficialities. The consequences of a misdemeanor conviction may well be more serious than those flowing from many felony convictions. Imprisonment under conditions similar to those to which felons are subjected may ensue. Any incarceration of over thirty days, more or less, will usually result in loss of employment, with a consequent substantial detriment to the defendant and his family. The essential nature of the right to counsel in other nonfelony cases where such substantial consequences are possible has received recognition. In re Gault, 387 U.S. 1, 87 S.Ct. 1428, 18 L.Ed.2d 527 (1967). No logical justification exists for drawing any distinction between Marston's misdemeanor case and that of an indigent felony defendant. In other circuits indigent misdemeanor defendants have been held entitled to counsel when arraigned or tried. The Fifth Circuit so ruled as early as 1965 in Harvey v. State of Mississippi, 340 F.2d 263 (5th Cir. 1965), a case involving a 90 day day jail term. A district court in the Second Circuit held in 1966 that one faced with a one year term was tried for an offense carrying a "substantial prison sentence" and therefore was due counsel under Gideon, Arbo v. Hegstrom, 261 F.Supp. 397 (D.Conn. 1966). The Eighth Circuit likewise has ruled that at least in some circumstances a misdemeanant must have a lawyer's aid; particularly important to that court in considering whether due process so requires is the possible penalty the defendant faces. Beck v. Winters, 407 F.2d 125 (8th Cir. 1969). See also, Shepherd v. Jordan, 425 F.2d 1174 (5th Cir. 1970); James v. Headley, 410 F.2d 325 (5th Cir. 1969); Goslin v. Thomas, 400 F.2d 594 (5th Cir. 1968); Wilson v. Blabon, 370 F.2d 997 (9th Cir. 1967); McDonald v. Moore, 353 F.2d 106 (5th Cir. 1965); Brinson v. Florida, 273 F. Supp. 840 (S.D.Fla.1967); Rutledge v. Miami, 267 F.Supp. 885 (S.D.Fla.1967). Recently the West Virginia Supreme Court of Appeals ruled that the assistance of counsel was required, under Gideon, for an indigent misdemeanor defendant facing a possible jail term of six months. Moats v. Janco, 8 Cr.L. Rptr. 2285 (Jan. 14, 1971) (opinion subsequently withdrawn on rehearing, 180 S.E.2d 74 (1971)). This Court will not attempt now to fashion a standard determining exceptions, if any, to the duty to appoint counsel in cases involving lesser potential penalties than that which Marston faced. The Supreme Court has been able to fix *697 guidelines, in terms of possible sentence, establishing the applicability of the sixth amendment right to jury trial. Duncan v. Louisiana, 391 U.S. 145, 88 S.Ct. 1444, 20 L.Ed.2d 491 (1968). The right to counsel may, however, be considered essential to due process even in cases where the right to jury trial does not attach. It seems plain, however, that the thrust of Gideon leaves only one possible factor of significance in determining whether a right to the services of counsel exists: whether the offense carries "the possibility of a substantial prison sentence." Gideon v. Wainwright, supra, 372 U.S. at 351, 83 S.Ct. at 801 (Harlan, J., concurring). "The Court has come to recognize, in other words," Mr. Justice Harlan notes elsewhere, "that the mere existence of a serious criminal charge constituted in itself special circumstances requiring the services of counsel at trial. In truth the Betts v. Brady [316 U.S. 455, 62 S.Ct. 1252, 86 L.Ed. 1595 (1942)] rule is no longer a reality." Id. The extent of any minimum potential penalty which might invoke the Gideon rule is matter for later decision. At this time it is necessary only to decide that, under the unqualified language of Gideon as well as Mr. Justice Harlan's interpretation of that holding, due process required that Marston be granted a lawyer's assistance at critical stages of his case. The Court is aware of the existence of a divergent ruling in this district, Hackette v. Royster, Misc. No. 359-60-N, mem. decis. (E.D. Va. May 22, 1970), but notes its respectful dissent, for the reasons stated, from the view that particular prejudice must be shown to have flowed from the lack of counsel. Apropos of the precept expressed in Hackette, supra, it appears to this Court that the lack of counsel at the very least tends to deter one from exercising the right of trial by jury. Laymen undoubtedly are, in most instances, at a disadvantage in their ability to deal with the selection of a jury encompassing their right of challenge for cause, etc. The lack of procedural knowledge may in itself give rise to a chilling effect in the exercise of a basic constitutional right. In addition, as a practical matter, judges trained to separate the inadmissible from the admissible of necessity are less lenient in evidentiary rulings when a jury sits than when the fact finding burden falls upon them. This fact, it seems to the Court, assuming the defendant overcomes the initial chilling effect arising from the need to select a jury without, except in rare instances, any knowledgeable conception of the entire procedure, gives rise to the probability of a defendant being prejudiced by his inability to propound questions and to testify in such a way as to conform to the rules concerning the fact finding inquiry. Because Marston has been released from his jail term, the Court, guided by Hewett v. State of North Carolina, supra, 415 F.2d at 1325, shall issue the writ declaring the conviction invalid. The petitioner should have no difficulty, the Court assumes, in hereafter gaining relief from such collateral consequences as have flowed in part from his invalid conviction. Because his sentence is fully served, Marston may not be further incarcerated for the acts for which he was tried and convicted. Because the state has a substantial interest, however, in imposing disabilities on those who may have committed such offenses as Marston was charged with, it would be inappropriate for the Court to bar a retrial, if conducted within a reasonable time. Compare Wood v. Ross, supra, 434 F.2d at 300. An order shall issue consistent with this opinion.
{ "pile_set_name": "FreeLaw" }
Stradivarius Rolls On In The Yorkshire Cup Not content with securing the inaugural Weatherbys Hamilton Stayers’ Million for connections, Bjorn Nielsen’s Stradivarius (Ire) (Sea the Stars {Ire}) was back with the real threat of doubling up on Friday as he defied a penalty and smart rivals in the G2 Matchbook Yorkshire Cup. Always travelling sweetly in mid-division, the flashy chestnut had the imposing Southern France (Ire) (Galileo {Ire}) to aim at for the final three furlongs as Mildenberger (GB) (Teofilo {Ire}) tried to make a fist of it. As the latter backed out, it took until the last furlong for the 4-5 favourite to truly master the Ballydoyle challenger in a David and Goliath-style tussle. At the line, “Mighty Mouse” was the comfortable 3/4-of-a-length winner as they pulled five lengths clear of Mildenberger to suggest that they will be at the forefront when the Royal meeting’s key staying test comes. “He was a bit rusty and there wasn’t much of a pace, so it was more of a sprint but once we got upsides there was only going to be one winner,” Dettori said. “He’s a tiger–he just put his head down and went. He’s a joy to have around.” Stradivarius was also becoming the first since Ardross (Ire) in 1982 to win this for the second successive year and the parallels with Charles St George’s great stayer are becoming ever more credible with time. Like him, he went unbeaten through an important Cup campaign last term with the G1 Gold Cup at Royal Ascot his crowning moment. There was as much zip in this performance as there was in the 2018 equivalent and with last year’s G1 St Leger third there to make him stretch and the likes of the Feb. 28 G3 Nad Al Sheba Trophy winner Ispolini (GB) (Dubawi {Ire}) well beaten it is solid form. Trainer John Gosden obviously relishes the challenge of managing the career of the ebullient 5-year-old and said, “This was a prep for the Gold Cup and he hadn’t been trained hard for this. He’s a very proud horse and does enough in his work without being generous. The [June 20] Gold Cup is a different ball game and they slowed it right down here which is probably not ideal for him, but I liked the way he showed a bit of grit in the end. He’s not polished yet–we hope to have that at Royal Ascot. He was in the nightclub when I was saddling him, but then he goes out there and races and gets into a different zone.” Pedigree Notes Stradivarius, who descends from the Wildensteins’ brilliant Pawneese (Ire), is the last foal out of the dual listed-placed Private Life (Fr) (Bering {GB}), who was snapped up for just 70,000gns at the 2006 Tattersalls December Mares Sale. She also produced three other black-type performers including the G3 Bavarian Classic and G3 Furstenberg-Rennen-winning German highweight Persian Storm (Ger) (Monsun {Ger}). This is also the family of the G1 Melbourne Cup hero Protectionist (Ger) (Monsun {Ger}) and the G1 Prix de l’Arc de Triomphe and G1 Prix du Jockey Club hero and leading sire Peintre Celebre (Nureyev).
{ "pile_set_name": "Pile-CC" }
George E. Brown memorial lecture. Local modulation of adrenergic neurotransmission. The cardiovascular reflexes, by regulating the traffic in the sympathetic nerves, govern the amount of norepinephrine released from the nerve endings. However, the final adjustments in the amount of neurotransmitter available to activate the beta 1 receptors in the heart and the alpha receptors in the blood vessels take place at the sympathetic neuroeffector junction. Thus, a decrease in pH, hyperosmolarity, moderate increases in the concentration of K+ ion, adenosine and adenine nucleotides depress the release of norepinephrine at any given level of sympathetic nerve activity. These metabolic changes, which occur in active tissues, and in particular in adenosine, have been proposed as mediators of the accompanying local hyperemia. In addition, they apparently facilitate this local dilatation by disconnecting the blood vessels in the active tissues from sympathetic control. Acetylcholine, histamine and 5-hydroxytryptamine are present in and around certain blood vessels and can activate specific receptors on the prejunctional fibers and cause vasodilatation by reducing the output of neutrotransmitter. Some of the norepinephrine released into the synaptic cleft may depress its continued release by activating prejunctional alpha receptors. In contrast, angiotensin II, by a local action on the nerve endings, can augment the release of transmitter. Decreases in local temperature reduce transmitter release but augment the affinity of the postjunctional alpha receptors for norepinephrine. The role of these local events at the neuroeffector junction, their physiologic significance and potential clinical importance are discussed in this review.
{ "pile_set_name": "PubMed Abstracts" }
CARROLL COUNTY, IN (WXIN/CNN) – An Indiana couple was arrested after police found them unresponsive, suffering from heroin overdoses, with three young children in their car. A 911 call from a passerby Friday night alerted police to a vehicle parked in the middle of a road near Delphi, IN. When emergency crews arrived, they determined the two unresponsive adults inside, identified as 31-year-old Adam Smith and his wife 29-year-old Donnis, were suffering from heroin overdoses. The couple’s three children, ages 4, 6 and 11, were sitting in the backseat, police say. The emergency crew administered Narcan to the couple then transported them to the hospital, where they were treated. The two were later turned over to law enforcement to be jailed. The Smiths were both booked into the Carroll County Jail on preliminary charges of felony neglect of a dependent child. They’re being held on $5,000 bond with additional criminal charges pending. The children were turned over to the Department of Child Services. Sheriff Tobe Leazenby says he’s seen this cycle of abuse over and over again in his county. "They will do almost anything to get that fix, whether or not they place another person or children in jeopardy,” Leazenby said. The sheriff says his department makes at least one dozen drug arrests each month, and the spike in drug cases has led to overcrowding at his jail. Leazenby is pushing for more drug treatment centers, but he also has some advice for users who want to get clean. "I'm not in a position where I'm going to tell people how to choose their friends, but rethink that seriously. Who are you hanging out with, and who are you with? Is maybe some of that the root of your issues?” he said. Based on statements made during the arrest of the couple, investigators searched a local home and arrested 43-year-old Sara Huff on drug charges, including dealing meth and cocaine. Investigators say more charges could be filed during the ongoing investigation. (AP Photo/Jennifer Kay). Six crosses are placed at a makeshift memorial on the Florida International University campus in Miami on Saturday, March 17, 2018, near the scene of a pedestrian bridge collapse that killed at least six people on March 15. A matter of seconds between those who would live and those who would die as Florida pedestrian bridge topples down highway bustling with passing vehicles. (Nick Wagner/Austin American-Statesman via AP). FBI agents work the scene of an explosion in Austin, Texas, Sunday, March 18, 2018. At least a few people were injured in another explosion in Texas' capital late Sunday, after three package bombs detonat... Officials reported that an explosion in southwest Austin injured two men in their 20s who were hospitalized with injuries that didn't appear to be life-threatening. (AP Photo/Alessandra Tarantino). Pope Francis sits among youths for a group photo during the opening session of the pre-synod of the youths meeting, at the the Mater Ecclesiae college in Rome, Monday, March 19, 2018. Pope Francis has asked forgiveness for all Christians who buy sex from women, telling a roomful of young people that frequenting prostitutes is a crime against humanity and the sign of a "sick mentality" that... Pope Francis has asked forgiveness for all Christians who buy sex from women, telling a roomful of young people that frequenting prostitutes is a crime against humanity and the sign of a "sick mentality" that thinks that women exist to be exploited. (Joe Ahlquist/The Rochester Post-Bulletin via AP). Emergency personnel respond to the scene of a fatal stabbing Saturday, March 17, 2018, at the Salvation Army Castleview Residence in downtown Rochester, Minn. Police have arrested a man in the multiple... Police have arrested a man in the fatal stabbing of two men at a Salvation Army apartment building in downtown Rochester, Minnesota.
{ "pile_set_name": "Pile-CC" }
{include file="orderforms/standard_cart/common.tpl"} <script> var _localLang = { 'addToCart': '{$LANG.orderForm.addToCart|escape}', 'addedToCartRemove': '{$LANG.orderForm.addedToCartRemove|escape}' } </script> <div id="order-standard_cart"> <div class="row"> <div class="pull-md-right col-md-9"> <div class="header-lined"> <h1>{$LANG.cartdomainsconfig}</h1> </div> </div> <div class="col-md-3 pull-md-left sidebar hidden-xs hidden-sm"> {include file="orderforms/standard_cart/sidebar-categories.tpl"} </div> <div class="col-md-9 pull-md-right"> {include file="orderforms/standard_cart/sidebar-categories-collapsed.tpl"} <form method="post" action="{$smarty.server.PHP_SELF}?a=confdomains" id="frmConfigureDomains"> <input type="hidden" name="update" value="true" /> <p>{$LANG.orderForm.reviewDomainAndAddons}</p> {if $errormessage} <div class="alert alert-danger" role="alert"> <p>{$LANG.orderForm.correctErrors}:</p> <ul> {$errormessage} </ul> </div> {/if} {foreach $domains as $num => $domain} <div class="sub-heading"> <span>{$domain.domain}</span> </div> <div class="row"> <div class="col-sm-6"> <div class="form-group"> <label>{$LANG.orderregperiod}</label> <br /> {$domain.regperiod} {$LANG.orderyears} </div> </div> <div class="col-sm-6"> <div class="form-group"> <label>{$LANG.hosting}</label> <br /> {if $domain.hosting}<span style="color:#009900;">[{$LANG.cartdomainshashosting}]</span>{else}<a href="cart.php" style="color:#cc0000;">[{$LANG.cartdomainsnohosting}]</a>{/if} </div> </div> {if $domain.eppenabled} <div class="col-sm-12"> <div class="form-group prepend-icon"> <input type="text" name="epp[{$num}]" id="inputEppcode{$num}" value="{$domain.eppvalue}" class="field" placeholder="{$LANG.domaineppcode}" /> <label for="inputEppcode{$num}" class="field-icon"> <i class="fa fa-lock"></i> </label> <span class="field-help-text"> {$LANG.domaineppcodedesc} </span> </div> </div> {/if} </div> {if $domain.dnsmanagement || $domain.emailforwarding || $domain.idprotection} <div class="row addon-products"> {if $domain.dnsmanagement} <div class="col-sm-{math equation="12 / numAddons" numAddons=$domain.addonsCount}"> <div class="panel panel-default panel-addon{if $domain.dnsmanagementselected} panel-addon-selected{/if}"> <div class="panel-body"> <label> <input type="checkbox" name="dnsmanagement[{$num}]"{if $domain.dnsmanagementselected} checked{/if} /> {$LANG.domaindnsmanagement} </label><br /> {$LANG.domainaddonsdnsmanagementinfo} </div> <div class="panel-price"> {$domain.dnsmanagementprice} / {$domain.regperiod} {$LANG.orderyears} </div> <div class="panel-add"> <i class="fa fa-plus"></i> {$LANG.orderForm.addToCart} </div> </div> </div> {/if} {if $domain.idprotection} <div class="col-sm-{math equation="12 / numAddons" numAddons=$domain.addonsCount}"> <div class="panel panel-default panel-addon{if $domain.idprotectionselected} panel-addon-selected{/if}"> <div class="panel-body"> <label> <input type="checkbox" name="idprotection[{$num}]"{if $domain.idprotectionselected} checked{/if} /> {$LANG.domainidprotection} </label><br /> {$LANG.domainaddonsidprotectioninfo} </div> <div class="panel-price"> {$domain.idprotectionprice} / {$domain.regperiod} {$LANG.orderyears} </div> <div class="panel-add"> <i class="fa fa-plus"></i> {$LANG.orderForm.addToCart} </div> </div> </div> {/if} {if $domain.emailforwarding} <div class="col-sm-{math equation="12 / numAddons" numAddons=$domain.addonsCount}"> <div class="panel panel-default panel-addon{if $domain.emailforwardingselected} panel-addon-selected{/if}"> <div class="panel-body"> <label> <input type="checkbox" name="emailforwarding[{$num}]"{if $domain.emailforwardingselected} checked{/if} /> {$LANG.domainemailforwarding} </label><br /> {$LANG.domainaddonsemailforwardinginfo} </div> <div class="panel-price"> {$domain.emailforwardingprice} / {$domain.regperiod} {$LANG.orderyears} </div> <div class="panel-add"> <i class="fa fa-plus"></i> {$LANG.orderForm.addToCart} </div> </div> </div> {/if} </div> {/if} {foreach from=$domain.fields key=domainfieldname item=domainfield} <div class="row"> <div class="col-sm-4">{$domainfieldname}:</div> <div class="col-sm-8">{$domainfield}</div> </div> {/foreach} {/foreach} {if $atleastonenohosting} <div class="sub-heading"> <span>{$LANG.domainnameservers}</span> </div> <p>{$LANG.cartnameserversdesc}</p> <div class="row"> <div class="col-sm-4"> <div class="form-group"> <label for="inputNs1">{$LANG.domainnameserver1}</label> <input type="text" class="form-control" id="inputNs1" name="domainns1" value="{$domainns1}" /> </div> </div> <div class="col-sm-4"> <div class="form-group"> <label for="inputNs2">{$LANG.domainnameserver2}</label> <input type="text" class="form-control" id="inputNs2" name="domainns2" value="{$domainns2}" /> </div> </div> <div class="col-sm-4"> <div class="form-group"> <label for="inputNs3">{$LANG.domainnameserver3}</label> <input type="text" class="form-control" id="inputNs3" name="domainns3" value="{$domainns3}" /> </div> </div> <div class="col-sm-4"> <div class="form-group"> <label for="inputNs1">{$LANG.domainnameserver4}</label> <input type="text" class="form-control" id="inputNs4" name="domainns4" value="{$domainns4}" /> </div> </div> <div class="col-sm-4"> <div class="form-group"> <label for="inputNs5">{$LANG.domainnameserver5}</label> <input type="text" class="form-control" id="inputNs5" name="domainns5" value="{$domainns5}" /> </div> </div> </div> {/if} <div class="text-center"> <button type="submit" class="btn btn-primary btn-lg"> {$LANG.continue} &nbsp;<i class="fa fa-arrow-circle-right"></i> </button> </div> </form> </div> </div> </div>
{ "pile_set_name": "Github" }
Anabolic steroids alter the haemodynamic responses of the canine left ventricle. The effect of an anabolic steroid on canine left ventricular function was studied by catheterization exposing control (n = 7) and methandienone-treated (n = 6) dogs to pacing, volume and isoproterenol tests at the beginning of the experiment and 6 weeks later. The physical performance of the animals was evaluated by submaximal exercise test (SMT), in which the steroid-treated dogs had lower heart rate than the sedentary controls (P less than 0.001). Heart weight was greater in the steroid than in the control group (P less than 0.05). Isoproterenol infusion increased the maximum value of the left ventricular pressure curve (dP/dtmax) less in the steroid-treated than in the control animals (P less than 0.05). Also heart rate was lower in the steroid than in the control group after inotropic load, while end-diastolic, end-systolic and stroke volumes decreased significantly more in the control group (P less than 0.05). Systemic vascular resistance decreased in the steroid treated animals, but remained unchanged in the control group (P less than 0.05 between the groups). During volume overload dP/dtmax increased in the control group but decreased slightly in the steroid group (P less than 0.05 between the groups). The pressure-volume diagram showed that the left ventricle of the steroid-treated animals worked on higher ventricular volumes than in the control group. In conclusion, long-term methandienone treatment results in cardiac hypertrophy in dogs, reduces its response to an inotropic loads and leads to working on larger ventricular volumes.
{ "pile_set_name": "PubMed Abstracts" }
Exclusive: A new video from Actual Wolf (member of Retribution Gospel and Low) Keen-eyed A.V. Clubbers may recognize Eric Pollard as the singer who crushed The Beach Boys' "Kokomo" as part of Retribution Gospel Choir way back in season one. He's also a touring member of Low, and a swell guy all around. Pollard fronts his own project, too, called Actual Wolf, which recalls such classics as Dylan and The Band. Check out the smoky video for "Kerosene And Spark," which will appear on Actual Wolf's debut album later this year. (A pair of EPs are already out.) If you love the song, you can download it for free at his site. (Below the video, it's "Kokomo" again.)
{ "pile_set_name": "Pile-CC" }
As Kate Sheppard reported last week, July 26th marked the start of yet another oil spill in the US. A 30-inch pipeline owned by Calgary-based Enbridge Energy Partners burst in southwest Michigan, dumping more than a million gallons of oil into a creek feeding into the Kalamazoo River. Now, the communities of Calhoun and Kalamazoo counties begin the process of cleaning up. Homes surrounding the site remain evacuated per the recommendation of the Calhoun County Health Department due to the airborne presence of benzene—a known carcinogen that is released when oil comes in contact with the air. Signs reading “Recent contamination as a result of the Enbridge Energy oil spill have made this river unsafe to use” line the Kalamazoo River. Sort-of-good news came earlier this week: The oil had stopped flowing by the end of last week. And on Tuesday, Enbridge, having already launched a spill response website, offered to pay full market value for the more than 200 homes that lie within the spill “red zone,” or within 200 feet of the river, that were already for sale. But the picture is far from rosy. Eighty miles of the 160-mile long Kalamazoo River is already deemed an EPA Superfund site for PCB contamination caused by paper mill, and reports now show that the oil has already reached this area of the river. The EPA disapproved a series of containment and recovery plans that Enbridge set forth last week, saying they were insufficient. But no matter how solid the plans, the clean-up is likely to take months. The EPA claims that it will seek full liability against Enbridge for the spill, which, under the Clean Water Act, could amount to $1,100 to $4,300 for each of the 24,000 barrels spilled. The company has pledged to pay all fines in full. But even its own spokesman Alan Roth admits that “there’s still a tremendous amount of work to do.” Jay Wilson, a biologist with the state of Michigan said, “We probably won’t know the full effects for weeks or months or years.”
{ "pile_set_name": "OpenWebText2" }
StartChar: uni1F9A Encoding: 8090 8090 1943 Width: 1005 VWidth: 0 Flags: HM LayerCount: 2 Fore Refer: 1668 -1 N 1 0 0 1 -34 -10 2 Refer: 1666 -1 N 1 0 0 1 88 -3 2 Refer: 871 919 N 1 0 0 1 195 0 2 Validated: 32769 MultipleSubs2: "CCMP_Precomp subtable" Eta uni0345.cap uni0313.grk gravecomb.grkstack EndChar
{ "pile_set_name": "Github" }
Easiest method for multiplying numbers - mquaes http://mathema-tricks.blogspot.com/2011/12/method-for-multiplying-numbers-where.html ====== thomc These kind of tricks are pretty handy, and I don't know why I wasn't taught them back in school, growing up in the calculator generation. My father could do all kinds of math in his head, which was just as well since he was a mathematician, but couldn't explain how he did it, he just "knew" the answer. I taught myself some tricks after the fact, the rest is just practice I think. Some examples: Multiply any two digit number by 11 easily: Using 62 as an example. Separate the two digits (6__2). Notice the gap between them Add 6 and 2 together (6+2=8) Put the resulting 8 in the gap to get the answer: 682, 62x11=682. If the result of the addition > 9, put the least significant digit in the gap and carry the most significant digit. This can be expanded to multiply any number by 11 in your head. Even really easy/obvious tricks are useful, e.g: To quickly multiply any number by 5, divide the number in two and then multiply it by 10. Very quick to do in your head.
{ "pile_set_name": "HackerNews" }
Sinus excision for the treatment of limited chronic pilonidal disease: results after a medium-term follow-up. We have previously introduced a minimally invasive technique for the treatment of limited pilonidal disease. In this paper, the results for patients who had at least one year of follow-up are provided. All patients operated with the sinus excision technique were studied retrospectively and those who had a follow-up period shorter than 12 months were excluded. Demographics, perioperative and postoperative data, and patient satisfaction scores were obtained from a prospectively designed database. Limited pilonidal disease was defined as disease presenting with less than four visible pits. Sixty-two patients (56 males, 90.3 percent; mean age, 25.8 +/- 10.4 years) were included in the study. Patients returned to work in 1.9 +/- 0.7 days, and the mean healing period was 43 +/- 10.4 days. All procedures were performed under local anesthesia, and the mean operation time was 9.7 +/- 3.4 minutes. The number of outpatient procedures was 45 (72.6 percent). One patient suffered from a minor complication (bleeding that was stopped with electrocauterization; n = 1, 1.6 percent) and recurrence was observed in another case (n = 1, 1.6 percent). Patients received a satisfaction questionnaire, which revealed that 34 patients (54.8 percent) were "completely satisfied with the procedure" and 49 (79 percent) would "absolutely recommend the technique to other patients." Sinus excision is an advisable technique for the treatment of limited pilonidal disease, because it can be performed under local anesthesia mostly as an outpatient procedure and the operation time is extremely short. Although the healing period is long, the off-work period is short, and patients are generally satisfied with the procedure. After a medium-term follow-up, the complication and recurrence rates are acceptable. We believe that sinus excision technique is a simple and effective method for the treatment of limited pilonidal disease.
{ "pile_set_name": "PubMed Abstracts" }
Q: File cannot be accessed because it is being used by another program I am trying to remove the space at the end of line and then that line will be written in another file. But when the program reaches to FileWriter then it gives me the following error Process can't be accessed because it is being used by another process. The Code is as below. private void FrmCounter_Load(object sender, EventArgs e) { string[] filePaths = Directory.GetFiles(@"D:\abc", "*.txt", SearchOption.AllDirectories); string activeDir = @"D:\dest"; System.IO.StreamWriter fw; string result; foreach (string file in filePaths) { result = Path.GetFileName(file); System.IO.StreamReader f = new StreamReader(file); string newFileName = result; // Combine the new file name with the path string newPath = System.IO.Path.Combine(activeDir, newFileName); File.Create(newPath); fw = new StreamWriter(newPath); int counter = 0; int spaceAtEnd = 0; string line; // Read the file and display it line by line. while ((line = f.ReadLine()) != null) { if (line.EndsWith(" ")) { spaceAtEnd++; line = line.Substring(0, line.Length - 1); } fw.WriteLine(line); fw.Flush(); counter++; } MessageBox.Show("File Name : " + result); MessageBox.Show("Total Space at end : " + spaceAtEnd.ToString()); f.Close(); fw.Close(); } } A: File.Create itself returns a stream. Use that stream to write file. Reason you are receiving this error is because Stream returned by File.Create is open and you are trying to open that file again for write. Either close the stream returned by File.Create or better use that stream for file write or use Stream newFile = File.Create(newPath); fw = new StreamWriter(newFile);
{ "pile_set_name": "StackExchange" }
Q: Gradle couldn't execute npm command I'm trying to run a npm command inside of gradle task but I'm getting a strange error: Caused by: net.rubygrapefruit.platform.NativeException: Could not start 'npm' at net.rubygrapefruit.platform.internal.DefaultProcessLauncher.start(DefaultProcessLauncher.java:27) at net.rubygrapefruit.platform.internal.WrapperProcessLauncher.start(WrapperProcessLauncher.java:36) at org.gradle.process.internal.ExecHandleRunner.run(ExecHandleRunner.java:65) ... 2 more Caused by: java.io.IOException: Cannot run program "npm" (in directory "/Users/psilva/Documents/projects/registrolivre"): error=2, No such file or directory at net.rubygrapefruit.platform.internal.DefaultProcessLauncher.start(DefaultProcessLauncher.java:25) ... 4 more Caused by: java.io.IOException: error=2, No such file or directory And this is my task: task npmInstall(type: Exec) { commandLine "npm", "install" } Could someone help? A: This answer worked for me with a different npm-related task. The recommendation there is to use an executable and args rather than commandLine. executable 'npm' args ['install'] Depending on your directory structure, you may also need to add the workingDir property and set it to the directory where your package.json lives. As an alternative, the Gradle Node Plugin is also really handy for managing the most common Node tasks in a Gradle build. I use this plugin as the basis for my Node tasks and then create other custom tasks as needed. A: If you are on Windows try this: task npmInstall(type: Exec) { commandLine "npm.cmd", "install" } instead of this: task npmInstall(type: Exec) { commandLine "npm", "install" } A: If you are using Windows OS, you have to use 'npm.cmd' instead of 'npm'. Better to detect whether OS is windows or not and build your npm command. Please see the code snippet below, import org.apache.tools.ant.taskdefs.condition.Os task npmInstall(type: Exec) { String npm = 'npm'; if (Os.isFamily(Os.FAMILY_WINDOWS)) { npm = 'npm.cmd' } workingDir 'src/main/webapp' commandLine npm, 'install' }
{ "pile_set_name": "StackExchange" }
The law would represent “a disproportionate interference in the freedom of expression and media freedom,” Harlem Désir, the representative on freedom of the media for the Organization for Security and Cooperation in Europe, said in a statement last month. “It may have a considerable chilling effect on journalists, as well as on bloggers, experts, or other individuals publishing information, particularly online.” The lawmakers said they were responding to foreign agent laws in other countries, pointing to the case of Maria Butina, the Russian gun-rights activist deported from the United States in October after being convicted of conspiring to act as an agent of a foreign government. Like many of Russia’s laws restricting freedom of expression, the new amendments appear likely to be applied selectively in order to serve as a deterrent. A lawmaker who helped draft the law, Vasily Piskarev, said he expected the amendments to apply to “a small circle of individuals.” But in theory, any Russian who is paid by foreign news organizations, or simply posts on social media while receiving money from abroad, could be forced to register under the new law. Compliance would require stating publicly that one is a foreign agent and filing financial reports with the government. Foreign organizations like the MacArthur Foundation have shuttered their offices in Russia in recent years in response to the foreign agent law. Some Russian organizations that get foreign funding, like the human rights group Memorial, have faced hefty fines for noncompliance — for instance, for failing to spell out their foreign agent status in an Instagram account.
{ "pile_set_name": "OpenWebText2" }
package Paws::ElasticBeanstalk::ListTagsForResource; use Moose; has ResourceArn => (is => 'ro', isa => 'Str', required => 1); use MooseX::ClassAttribute; class_has _api_call => (isa => 'Str', is => 'ro', default => 'ListTagsForResource'); class_has _returns => (isa => 'Str', is => 'ro', default => 'Paws::ElasticBeanstalk::ResourceTagsDescriptionMessage'); class_has _result_key => (isa => 'Str', is => 'ro', default => 'ListTagsForResourceResult'); 1; ### main pod documentation begin ### =head1 NAME Paws::ElasticBeanstalk::ListTagsForResource - Arguments for method ListTagsForResource on L<Paws::ElasticBeanstalk> =head1 DESCRIPTION This class represents the parameters used for calling the method ListTagsForResource on the L<AWS Elastic Beanstalk|Paws::ElasticBeanstalk> service. Use the attributes of this class as arguments to method ListTagsForResource. You shouldn't make instances of this class. Each attribute should be used as a named argument in the call to ListTagsForResource. =head1 SYNOPSIS my $elasticbeanstalk = Paws->service('ElasticBeanstalk'); my $ResourceTagsDescriptionMessage = $elasticbeanstalk->ListTagsForResource( ResourceArn => 'MyResourceArn', ); # Results: my $ResourceArn = $ResourceTagsDescriptionMessage->ResourceArn; my $ResourceTags = $ResourceTagsDescriptionMessage->ResourceTags; # Returns a L<Paws::ElasticBeanstalk::ResourceTagsDescriptionMessage> object. Values for attributes that are native types (Int, String, Float, etc) can passed as-is (scalar values). Values for complex Types (objects) can be passed as a HashRef. The keys and values of the hashref will be used to instance the underlying object. For the AWS API documentation, see L<https://docs.aws.amazon.com/goto/WebAPI/elasticbeanstalk/ListTagsForResource> =head1 ATTRIBUTES =head2 B<REQUIRED> ResourceArn => Str The Amazon Resource Name (ARN) of the resouce for which a tag list is requested. Must be the ARN of an Elastic Beanstalk environment. =head1 SEE ALSO This class forms part of L<Paws>, documenting arguments for method ListTagsForResource in L<Paws::ElasticBeanstalk> =head1 BUGS and CONTRIBUTIONS The source code is located here: L<https://github.com/pplu/aws-sdk-perl> Please report bugs to: L<https://github.com/pplu/aws-sdk-perl/issues> =cut
{ "pile_set_name": "Github" }
All artists using Photography and/or Printmaking as critical components in their works can enter. Artists whose work pushes the boundaries of traditional photographic and printmaking practices are encouraged to enter. Awards + Prizes Two solo exhibitions at The Print Center to be held April-July 2015, Online exhibition, Philadelphia Museum of Art Purchase Award, Two-year contract from The Print Center Gallery Store, and up to $3,000 in other purchase, cash and material prizes. About the Competition The Print Center’s Annual International Competition is one of the most prestigious and oldest competitions in the United States. The Print Center is particularly interested in highlighting local, national and international artists who utilize photography and printmaking in intriguing ways, both in content and process. Artists who use printmaking and/or photography as critical components of their work, or whose work pushes the boundaries of traditional photographic and printmaking practices, are encouraged to enter. Your entry fee to the competition also includes a one-year Artist Level Membership to The Print Center. Eligibility All artists using photography and/or printmaking as critical components in their works can enter. Work submitted must have been completed in the last three years. Submitted works cannot have been exhibited within 50 miles of Philadelphia or in any prior exhibition at The Print Center. Up to five images may be submitted and only one submission per person is allowed. Online ExhibitionAn online exhibition will be mounted on The Print Center’s website with the images submitted by semifinalists, as well as biographical information and links to the artists’ own websites. Ten finalists will have more extensive information on the site, including additional images (Artists will be contacted by The Print Center for additional information and images). Solo ExhibitionsTwo artists will be selected from the ten finalists to receive solo exhibitions at The Print Center. Those artists will receive a $200 honorarium (Pending funding, especially for international artists, this amount could increase). Artists are responsible for delivering or shipping their work to and from The Print Center and all related costs, including framing when appropriate. The Print Center will install and de-install work. Dan Byers and Tina Kukielski (with Daniel Bauman) were co-curators of the 2013 Carnegie International, a museum-wide exhibition that brought together 35 artists from 19 countries alongside special projects investigating the history of experimental playgrounds, the museum’s collection, and an event series called Apartment Talks, ath the Carnegie Museum of Art, Pittsburgh, PA. Byers is The Richard Armstrong Curator of Modern and Contemporary Art at the Carnegie, where he oversees exhibitions, public programs, and collections initiatives. Exhibitions he has developed for the museum include solo shows of Cathy Wilkes, Ragnar Kjartansson and James Lee Byars, as well as the group exhibitions Reanimation, featuring William E. Jones, Joachim Koester, and Nashashibi/Skaer; and Ordinary Madness, a large-scale, wide-ranging show drawn from the Carnegie’s collection of contemporary art. Kukielski holds the newly appointed position of curator of the Hillman Photography Initiative, overseeing the initiative’s website, its programs and commissioned projects, and two artist publications to be released in 2015. She formerly held a curatorial position at the Whitney Museum of American Art, New York. She has organized solo museum exhibitions with artists Cory Arcangel, Sadie Benning, Omer Fast, Taryn Simon and Sara VanDerBeek among others. Sales The Print Center will facilitate sales for the solo and online exhibitions of the Competition. The Print Center will receive a 50% commission on works sold. A pricelist will be made available in the gallery. The Print Center will pay the artist’s commission within 90 days of the close of the sale. Payment will be made by check and will include a statement listing work sold and the purchaser (if available). Liability The Print Center is not responsible for damage to work during shipping or delivery, although care in handling onsite can be assured. Works will be insured against fire and theft while on The Print Center’s premises. Copyright & UsageThe Artist reserves all rights to the reproduction of his/her works of art on loan, unless he/she has specified to the contrary. Notwithstanding the above, The Print Center may use images of the works of art for the sole purpose of publicizing and promoting the Artist's work in newspaper and periodical advertisements and articles, brochures, The Print Center’s website, and other such means. In every instance of such use, the Artist shall be acknowledged as the creator of that work. For all reproductions a credit line should be included: "Courtesy of the Artist.” Mission The Print Center’s mission is to support printmaking and photography as vital contemporary arts and to encourage the appreciation of the printed image in all its forms. The Print Center presents a variety of programs for the public including exhibitions; an extensive series of education programs and special events; the longest running Annual International Competition for prints and photographs in the country; and The Print Center Gallery Store, which offers the largest and most diverse selection of contemporary prints and photographs in Philadelphia.
{ "pile_set_name": "Pile-CC" }
Saturday, August 14, 2010 The Final Push for World Government Historical Account of the Fast Track to the New World Order- an excellent resource "[NAFTA] would be the most constructive measure the United States would have undertaken in our hemisphere in this century... It will represent the most creative step toward a new world order taken by any group of countries since the end of the Cold War, and the first step toward an even larger vision of a free-trade zone for the entire Western Hemisphere." [NAFTA] is not a conventional trade agreement, but the architecture of a new international system." --Henry Kissinger, May 1993 A newly leaked U.S. diplomatic cable originally written over six years ago confirms that the agenda to merge the United States, Canada and Mexico into an integrated North American Union has been ongoing for years, debunking claims made consistently by the corporate media and establishment talking heads that the NAU is a baseless “conspiracy theory.” “The cable, released through the WikiLeaks website and apparently written Jan. 28, 2005, discusses some of the obstacles surrounding the merger of the economies of Canada, the United States and Mexico in a fashion similar to the European Union,” reports the National Post. “An incremental and pragmatic package of tasks for a new North American Initiative (NAI) will likely gain the most support among Canadian policymakers,” the document said. “The economic payoff of the prospective North American initiative … is available, but its size and timing are unpredictable, so it should not be oversold.” While serving to confirm the agenda to integrate the United States, Mexico and Canada into an EU-style political and monetary union, the Wikileaks cable will come as no surprise to those who watched Alex Jones’ 2006 documentary Endgame, in which precisely the same information was outlined, with particular focus on the Security and Prosperity Partnership, or SPP meetings. Despite the manifestly provable factual basis of the matter, during the 2008 presidential election the establishment media attempted to smear Ron Paul by attributing the notion of a move towards a North American Union to him and then claiming it was a non-existent “conspiracy theory,” when the veracity of the issue was readily documented from the very start. A Newsweek hit piece subsequently claimed that Ron Paul’s concerns over a NAFTA superhighway, a North American Union or a regional currency were completely baseless, and yet the newly leaked cable states U.S. diplomats were busy discussing a “move forward with continental integration, including a possible common currency, labour markets, international trade and the borders of the three countries,” as well as “easier access across the U.S. border,” more than six years ago. Watch a clip from the 2006 documentary Endgame in which the agenda behind the North American Union was exposed, even as the corporate media still claimed it was a mythical conspiracy theory. More Information on the Powerful Elite Group of Men, the Banking Cabel, That Runs the Federal Reserve and America: “I don’t care who the government is. Let me control the money and I will control the country.” Mayer Amschel Rothschild (attributed to the German godfather of the Rothschild bank cartel and grandfather to heir Lord Baron Nathaniel Mayer de Rothschild: owner of the Bank of England and a key promoter of the U.S. Federal Reserve Act. 1744-1812) “The end of democracy and the defeat of the American Revolution will occur when government falls into the hands of lending institutions and moneyed incorporations.” “I want to own nothing and control everything.”“The ability to deal with people is as purchasable a commodity as sugar or coffee and I will pay more for that ability than for any other under the sun.” John D. Rockefeller (promoter of the U.S. Federal Reserve Act in alliance with the Rothschild bloc. 1839-1937) “We will have world government whether or not we like it. The only question is whether world government will be achieved by conquest or consent.”James Paul Warburg (monopoly banker in testimony before the U.S. Senate Committee on Foreign Relations. Warburg was an agent of the Rockefeller-JP Morgan-Rothschild banking bloc and son of Paul Warburg, chief architect of the Federal Reserve Corporation, an unconstitutional private bank monopoly set up for cartel hegemony. 2/17/1950) "Who controls the food supply controls the people; who controls the energy can control whole continents; who controls money can control the world." Henry Kissinger (ex U.S. Secretary of State and ongoing agent for the ruling class. Living. Quote 1970) “The real truth of the matter is, as you and I know, that a financial element in the larger centers has owned the government of the U.S. ever since the days of Andrew Jackson. History depicts Andrew Jackson as the last truly honorable and incorruptible American president.” President FDR (on Fascist rule in a letter to corporate con man “Colonel” Edward M. House, a founder of the Council on Foreign Relations and political fixer for the ruling class. House also handled President Wilson for the foisting of the privately rigged Federal Reserve bank monopoly. 11/21/1933) 2 comments: I am confused about the microchipping of humans and the Venus Project- as the Venus project claims to be against microchipping; therefore will micro chipping happen before the V. project or after humanity accepts this project as a solution to the global problems.....?? Its like this: They know that they wont ever gain the full support needed for microchipping, so they will present the venus project first and use the venus project to eventually microchip everyone in the world. They are liars, and will say anything to gain your support and fulfill their plan. The Venus plan has hidden horrors of its own though, especially since they plan on introducing nanobots into the medical field. Nanobots, although can be helpful, can also be used to literally control your mind.
{ "pile_set_name": "Pile-CC" }
An estimation for an appropriate end time for an intraoperative intravenous lidocaine infusion in bowel surgery: a comparative meta-analysis. There exists no commonly accepted regimen for an intravenous lidocaine infusion (IVLI). This study aims to determine an appropriate end time for an IVLI during bowel surgery. A systematic search for randomized controlled trials assessing IVLI for bowel surgery was conducted using Ovid MEDLINE, EMBASE, CINAHL, Cochrane CENTRAL, Google Scholar, hand-searching references, and grey literature. Data were pooled for studies that stopped IVLI ≤60 minutes (intraoperative IVLI) after skin closure and where IVLI continued >60 minutes after surgery (postoperative continued IVLI). Quantitative analysis was done using the random-effects model. Seven studies (n = 362) were identified after the systematic search. Three studies (n = 160) and 4 studies (n = 202) used an intraoperative and postoperative continued IVLI, respectively. An intraoperative IVLI significantly reduced pain scores at rest for 48 hours (standardized mean difference on a 0-10 scale, -1.24; 95% confidence interval, -1.93 to -0.56) and 72 hours (standardized mean difference, -1.12; 95% confidence interval, -1.79 to -0.44) compared with postoperative IVLI (test for interaction: P < .001 and P = .003, respectively). Although intraoperative IVLI reduced 24-hour pain scores on movement, this was not statistically different than pain scores in the postoperative IVLI group (test of interaction: P = 0.68). There were no differences between intraoperative IVLI and postoperative IVLI for postoperative in-hospital nausea, vomiting, time to bowel movement, and length of hospital stay. Continuing an IVLI beyond 60 minutes after surgery has no added analgesic or gastrointestinal benefit. Further research is needed to clarify an optimal IVLI regimen and end time.
{ "pile_set_name": "PubMed Abstracts" }
Arctostaphylos gabrielensis Arctostaphylos gabrielensis, known by the common name San Gabriel manzanita, is a species of manzanita. It is endemic to one small area in the San Gabriel Mountains of Los Angeles County, California. It is a member of the California montane chaparral and woodlands plant community. Description This is a shrub growing to heights between one and two meters. It has an erect form with a large, spherical burl. Leaves are bright green, shiny, and mostly hairless. They are 2 to 4 centimeters long with smooth edges. The shrub blooms in dense inflorescences of urn-shaped manzanita flowers. The fruit is a rounded red drupe up to 14 millimeters wide. See also California chaparral and woodlands External links Jepson Manual Treatment — Arctostaphylos gabrielensis USDA Plants Profile: Arctostaphylos gabrielensis Arctostaphylos gabrielensis — U.C. Photo gallery gabrielensis Category:Endemic flora of California ~ Category:Natural history of the California chaparral and woodlands Category:Natural history of the Transverse Ranges Category:Natural history of Los Angeles County, California Category:Plants described in 1992 Category:Critically endangered flora of California
{ "pile_set_name": "Wikipedia (en)" }
Former pros pack Jesuit's coaching ranks Search Twitter More Video Facebook TAMPA — Five minutes into Jesuit’s first formal preseason practice of 2012, lightning sent the Tigers scurrying for cover. As he assessed the flickering gray sky beneath a breezeway, third-year coach James Harrell insisted his staff’s offensive play-calling system won’t be as turbulent as the recent afternoon weather pattern. For those wondering (and many are): new pass-game coordinator Vinny Testaverde will observe from the box, while run-game coach George Edington will call the plays in from the sideline. Another NFL alumnus, ex-Gator tailback James Jones, will consult and assist with personnel groupings in the run game, but won’t call plays. Harrell, as always, will have the final say. “It’ll be a cohesive effort,” said Harrell, who conducted Monday afternoon’s workout in the Tigers’ gymnasium. “I’m very confident the guys understand that everything has to be agreed upon, and that we work as a cohesive unit and no one takes anything personal, and they’re just willing to design a game plan week in and week out that’s consistent.” For the third consecutive season, the Tigers enter August with not only a new offensive coordinator (or in this case, coordinators), but a new quarterback. Burly rising senior Leland Saile (6 feet, 210 pounds) was the first Tiger on the field Monday. “Hopefully you can do some things in the run game with him to allow him to carry the football,” Harrell added. “He’s pretty athletic. He’s physical and we have some special packages that will be designed to take advantage of his size.”
{ "pile_set_name": "Pile-CC" }
DLF Ltd. plunged 26 percent after regulators barred India’s largest developer and its chairman from raising funds for failing to disclose information during its initial public offering. Japan Airlines Co. led losses among Asia’s carriers amid growing anxiety over the spread of the Ebola virus. Agile Property Holdings Ltd. rebounded 5.1 percent as the Chinese developer said it was in talks with creditors to delay loan repayments after scrapping a rights offer. The MSCI Asia Pacific Index fell 0.7 percent to 135.43 as of 4:04 p.m. in Hong Kong, heading for the lowest close since March 25. The gauge dropped 8.8 percent from its year high in July through Monday as the Federal Reserve contemplates when to raise interest rates and a faltering recovery in Europe sparked concern global economic growth will slow. “Pessimism is coming back into the market amid the slump in U.S. equities,” said Nader Naeimi, who helps manage about $125 billion as head of dynamic asset allocation at Sydney-based AMP Capital Investors Ltd. “It’s been a while since we had a gut-shaking correction in the U.S. It will take a while before the market can build a firmer base. There are a lot of worries about global growth.” Hong Kong Protests Hong Kong’s Hang Seng Index dropped 0.4 percent after rising as much as 1.2 percent earlier. Shares rose as police used chain saws and sledgehammers to clear barricades in the city’s business district erected by pro-democracy demonstrators, hours after Chief Executive Leung Chun-ying signaled he’s losing patience with protests that are in their third week. The S&P 500 fell 1.7 percent Monday in New York, bringing losses the past three days to 4.8 percent, the biggest such decline since November 2011. A rout in global equities wiped $1.54 trillion from shares last week, with the S&P 500 tumbling 3.1 percent for its worst drop in two years, amid growing concern of an international economic slowdown. Fed officials said over the weekend that the threat from overseas may lead to rate increases being delayed. The International Monetary Fund cut its forecast for global growth last week and said the euro area faces the risk of a recession.
{ "pile_set_name": "Pile-CC" }
After nearly five years of debate the European parliament has finally approved a new law that will allow EU nations to restrict or ban the cultivation of GM crops within their borders. While supporters of the new opt out law applauded it as the best possible compromise solution on GM for Europe, the staunchest proponents and opponents of GM cultivation are both sharply critical of the legislation. ‘This is a bad move for Europe,’ the agrochemical and agricultural biotechnology giant Monsanto said in a statement. ‘It undermines science, it undermines European farmers and it raises prices for European consumers.’ Bert Staes, the Greens’ parliamentary food safety spokesman, said: ‘Despite a majority of EU member states and citizens being consistently opposed to GMOs, the real purpose of this new scheme is to make it easier to wave through EU authorisations of GM crops.’ In the past, Staes has called the opt out law a ‘Trojan horse’ that will be used to open the door for GM cultivation in Europe. The new law, first proposed in 2010, still needs formal final approval from the EU council. But council approval is considered a mere formality and is expected to be granted in spring. Policy workaround Under the law, EU nations will be allowed to ban GMOs on the grounds of environmental policy, town and country planning, socio-economic impact, avoiding the unintended presence of GMOs in other products and on farm policy objectives. The law does not allow bans based on risks to health or the environment from GMOs that have been approved by the European Food Safety Authority (EFSA). Currently, the insect resistant maize MON810 is the only GM crop cultivated in the EU, grown mainly in Spain and Portugal. Since MON810 was approved for EU cultivation in 1998, no additional GM grains have won approval, with MON810 cultivation banned in Germany, France, Italy and other nations, undermining the concept of a single European market. GMO opponents who want an EU wide cultivation ban, fear that opposition to new authorisations will weaken with a law that gives nations firm legal footing to opt out of EU approved GM crops. Some GMO opponents speculate that new GM crops could be approved and in the ground as early as 2016. ‘All of that is utter rubbish,’ Monsanto spokesman Brandon Mitchener tells Chemistry World. ‘We will almost certainly not see any new biotech crops grown in Europe for the next 10 years. It costs around $100 million (£66 million) in field trials and lab tests and years of waiting to get a crop approved for commercial sale in Europe, and very few companies can or are willing to invest this amount of money.’ Beat Späth, director for agricultural biotechnology at the Brussels-based industry association EuropaBio, agrees with this assessment, saying that the law ‘merely makes it easier for member states to ban EU approved products. These EU level authorisations almost never take place, despite the fact that the products are routinely confirmed to be as safe as conventional crops.’ Späth adds that most applications to market GM crops for cultivation in the EU have been withdrawn by firms frustrated with delays. ‘There are only a handful of GM crops for cultivation still pending in the system—seven to be precise,’ he says. Mitchener and Späth say that GM seed companies in recent years have abandoned most research in Europe and do not expect the new law to bring research back to Europe. Richard Breum, a spokesman for Bayer CropScience, says: ‘Our research and development work is mainly conducted in the places where the resulting products are actually used, and in the case of GM that is not in Europe. That will not change with the new law.’ This article is reproduced with permission from Chemistry World. The article was first published on January 15, 2015.
{ "pile_set_name": "OpenWebText2" }
Y PPA Manager 0.0.8.1 has been Released! Added Ubuntu 11.10 Support by M. Zinoune Please share000000 Y PPA Manager 0.0.8.1 has been released, this new release added support to Ubuntu 11.10 Oneiric Ocelot and comes with some bug fix. About Y PPA Manager “PPA Manager tool is “Project for managing and finding Launchpad PPAs in Ubuntu. Y PPA Manager is a tool for easily managing Launchpad PPAs that uses YAD for a graphical user interface (a Zenity fork which comes with a lot of improvements) and comes as a .deb and with a Launchpad PPA for easy updates. Please note that this is a pre-alpha release as I’m the only one who’s ever used Y PPA Manager so far.”
{ "pile_set_name": "Pile-CC" }
Q: Singleton Overuse I was considering using a Singleton pattern in a winforms application that I am working on, but a lot of people seem to think that singletons are evil. I was planning on making a "Main Menu" form which is a singleton. I can't think of any reason that I would want multiple instances of my Main Menu, and it is always going to be the first form that comes up, so I am not concerned with wasting resources if it gets instantiated unnecessarily. Also, I could see issues arising if there are multiple instances of the Main Menu. For example, if another form has a "Main Menu" button and there are multiple instances of the Main Menu, then the decision of which instance to show seems ambiguous. Also, if I have another winform which has to look at the state of the program to determine whether there is already an instance of the main menu, then I feel like I am breaking modularity, though I might be wrong. Should I be avoiding the use of a singleton in this case or would it be better to make the Main Menu static? I just started using c# a couple days ago, and I haven't really done much with OOP in the last few years, so I apologize if this is a stupid question. Thanks A: Is MainMenu shown all the time? If not, it would make sense to release the old instance when it's closed and create a new one every time you need to open it. This way other modules won't need to know of its instances, they'll just create one when they need to open it.
{ "pile_set_name": "StackExchange" }
Blizzard In Hartford David Echevaria of Hartford, at right, helps two friends attempt to get a pickup truck out of a snow bank near the intersection of Farmington Ave. and Sigourney Street in Hartford. David Echevaria of Hartford, at right, helps two friends attempt to get a pickup truck out of a snow bank near the intersection of Farmington Ave. and Sigourney Street in Hartford. (Nick Caito / Hartford Courant) David Echevaria of Hartford, at right, helps two friends attempt to get a pickup truck out of a snow bank near the intersection of Farmington Ave. and Sigourney Street in Hartford.
{ "pile_set_name": "Pile-CC" }
Agreement between measurement of 25-hydroxyvitamin D3 in dried blood spot samples and serum in a Chinese population in the Netherlands. Blood for determining 25-hydroxyvitamin D3 [25(OH)D3] is usually obtained through venipuncture although, as an alternative for serum, dried blood spot (DBS) can be considered. The aim of this proof-of-concept study was to investigate levels of agreement between measurements of 25(OH)D3 obtained with DBS compared with serum. 301 Chinese participants were included who completed 25(OH)D3 measurement from DBS and from simultaneously collected blood samples obtained by venipuncture. Measurements of both DBS and serum 25(OH)D3 were performed using liquid chromatography followed by tandem mass spectrometry. Agreement between the two methods was assessed with Passing and Bablok regression analysis and Bland-Altman plot. Measurements showed a good correlation (Pearson's correlation coefficient r = 0.929, P < 0.001) between the two methods. After recalculating for a 13% difference, a regression equation of DBS 25(OH)D3 = -1.91 + 1.00 serum 25(OH)D3 was found in Passing and Bablok regression analysis. Bland-Altman analysis showed a fixed bias of 1.7 nmol/L; upper and lower limit of agreement was 24.1 nmol/L and -20.7 nmol/L, respectively. Sensitivity of recalculated DBS for 25(OH)D3 concentrations <30 and <50 nmol/L was 87.8% and 91.1%, respectively, and specificity was 89.2% and 83.1%, respectively. In conclusion, a good agreement was found between the measurement of 25(OH)D3 obtained with DBS compared with serum. DBS may possibly be used in a future screening program, but it is less suitable for individualized vitamin D status assessment.
{ "pile_set_name": "PubMed Abstracts" }
'''Conciliar Press Ministries''' is an Orthodox publishing company based in Ben Lomond, California. The press continues to release works on a range of subjects for both children and adults, including among its authors writers such as Frederica Mathewes-Green, Fr. Patrick Henry Reardon, Fr. [[Thomas Hopko]], Fr. Jack N. Sparks and many others. Conciliar Press also publishes the ''[[Orthodox Study Bible]]'' and the quarterly magazines ''AGAIN'' and ''The Handmaiden''. + '''Conciliar Press''' is an Orthodox Christian publishing company based in Ben Lomond, California. The press continues to release introductory works on a range of subjects for both children and adults. Authors include [[Frederica Mathewes-Green]], Fr. [[Patrick Henry Reardon]], Fr. [[Thomas Hopko]], and many others. Conciliar Press is also the official distributor for the ''[[Orthodox Study Bible]]'' and publishes two quarterly magazines ''AGAIN'' and ''The Handmaiden''. == External links == == External links == Line 5: Line 5: {{stub}} {{stub}} + + [[Category:Publications]] Revision as of 19:16, November 16, 2011 Conciliar Press is an Orthodox Christian publishing company based in Ben Lomond, California. The press continues to release introductory works on a range of subjects for both children and adults. Authors include Frederica Mathewes-Green, Fr. Patrick Henry Reardon, Fr. Thomas Hopko, and many others. Conciliar Press is also the official distributor for the Orthodox Study Bible and publishes two quarterly magazines AGAIN and The Handmaiden.
{ "pile_set_name": "Pile-CC" }
South Africa has the second highest murder rate in the world. It is a favourite hangout for organised crime syndicates from every corner of the world..CORRUPTION...Who Cares ? . No fear No Favour - The Truth sets you FREE........... Wednesday, January 21, 2015 Concern over rate of police firearm theft The DA says it will continue to ask questions about the loss or theft of hundreds of police firearms. 31 thousand knives and more than 3000 guns are being destroyed by police in Vereeniging on 5 February 2013. Picture: Govan Whittles/EWN. FILE: Concerns are being raised this afternoon about the number of firearms being stolen from police stations. Picture: Govan Whittles/EWN. Alex Eliseev | about an hour ago JOHANNESBURG - Concerns are being raised this afternoon about the number of firearms being stolen from police stations following the arrest of a senior Gauteng officer. Eyewitness News this morning revealed that Colonel Chris Prinsloo, who has served 35 years in the South African Police Service, was arrested in connection with the discovery of 750 rounds of ammunition at his house. The arrest is part of a wider investigation that has been running for over a year and is being conducted by a Western Cape task team. National police commissioner Riah Phiyega said the high-level arrest of Prinsloo shows the effectiveness of Crime Intelligence. She said Prinsloo’s arrest is a great disappointment. “That type of skill takes many years to build and surely to reach that level, the person should also have had passion.” The Democratic Alliance (DA) says it will continue to ask questions in Parliament about the loss or theft of hundreds of police firearms. The party also wants more clarity on the role police officers play in the flow of weapons to the criminal underworld. Prinsloo is due to appear in court in March. He appeared in court earlier this week, was released on R5,000 bail and now faces suspension while his trial runs its course. The police’s Solomon Makgale says the arrest relates strictly to the ammunition found at the colonel’s house. Prinsloo was renowned for his knowledge of firearm laws. Last week, over 9,000 confiscated weapons were destroyed in Vereeniging with Phiyega and senior police leadership overseeing the process.
{ "pile_set_name": "Pile-CC" }
A suitable offer/quote/proposal is solicited for undertaking a comprehensive ownership and responsibility for facilitating career transition for a very senior industry professional, which may be undertaken by modifying the Resume, customising covering letter for each respective job, and making several applications to all eligible and possible institutions including but not limited to Head Hunters,... My husband has a 26 year Military Career....spent time doing medi-vac in Vietnam as well as time with the Pentagon...he has recently been diagnosed with Parkinson and Dementia and I would like to keep him occupied and thought going back and remembering some stories would make great reading. I remember one of his stories about picking up a vet in Vietnam that had an eye injury and they couldn'... I need someone to write an article of their life stories on how they started their career after graduation. If you are a company, please do not bid on this, it will not be awarded. I need 'real people' please. Graduate/Early Career Managers – Market Research I am looking for a short market research report on the top of Graduate/Early Career Managers in business/work • What are the main challenges, frustrations and priorities for Graduate/ Early Career Managers? • What are the main conferences and events for Graduate/Early Career Managers? • What current trends ... Why don’t you join the movement for music industry! RECORD Foundation is an organization that runs for healthy music industry. Unlike other ICO projects, we already have a fully functioning music platform, recordfarm.com. We have been selected as a startup partner by Facebook in 2016 and awarded as ASIA Top 3 music app by [url fjernet, log ind for visning] we are facing the phase two: to... We are an IT company that is now planning to venture into code training for beginners. We need content for our website which will be used in other materials too like the brochures and other marketing materials. Business model: Our target audience for the code training is absolute beginners - mostly college and university students or fresh graduates who want to get into IT or are curious about ... We are from LODESTAR a Career Guidance company. We are looking for people to work with us in handling Career Guidance Sessions for School Students. Any Graduate with any experience can be a part of this. Its only the Passion to meet and counsel students along with their parents is needed. If you feel you have the right skill set and you have great confidence/communication you would be able... About Evolve Media Solutions ([url fjernet, log ind for visning]): Evolve Media Solutions is an integrated service provider to the digital media industry providing services to all major telecom operators, internet players, and digital media companies. Evolve has specialised in digital marketing and promotions to focus on new ways to reach out to people through technology and cost-effective method... I am a Gestalt therapist. I teach Gestalt (and Family Constellations) internationally, especially in China. I have a career spanning 35 years. I also have a private practice, most of it by internet. I have some specific projects I never get time for. One in particular - I filmed my entire teaching curriculum - 70 hours, 36 modules. I want to make it available for PD points for professionals, and... I need you to write some content for a website. Design a non-traditional pre-hire assessment for online use to determine candidates traits and match them to careers. It should combine personality, cognitive and aptitude measures. It will be used to help candidates learn more about themselves and their interests as well as a pre-screen for companies seeking to hire. I need you to write some content for a website. Design a non-traditional pre-hire assessment for online use to determine candidates traits and match them to careers. It should combine personality, cognitive and aptitude measures. It will be used to help candidates learn more about themselves and their interests as well as a pre-screen for companies seeking to hire. I need a career portal Career Portal that provides an interactive job vacancy for candidates. This web application is to be conceived in its current form as a dynamic site-requiring constant updates both from the seekers as well as the companies. On the whole the objective of the project is to enable jobseekers to place their resumes and companies to publish their vacancies. It enables jobseekers ...
{ "pile_set_name": "Pile-CC" }
Anarchy Goggles: Win a Pair! Today we take a look at the latest goggles from Anarchy eyewear. There are two new goggles available: the Heist Goggle and the Deflext Goggle. Each one comes featuring Optical quality lens that are scratch resistant and with a lot of extra features for the winter sports athlete in all of us. Take a look at the photos and the details below. Do you want one of these goggles? Then enter the form below for your chance to win:
{ "pile_set_name": "Pile-CC" }
One of the vital hallmarks of cancer which distinguishes it from benign tumours is its capability for tissue invasion and distant metastasis ([@bib26]). Focal adhesion kinase (FAK) is a non-receptor protein tyrosine kinase identified as a critical signalling molecule mediating host--tumour interactions that affect cell adhesion, invasion, angiogenesis and metastasis via its cross-linked processes with Src-, integrin- and growth factor receptor signalling pathways ([@bib27]; [@bib33]). FAK is overexpressed in various malignancies, including lung cancer, wherein associated FAK gene amplification portends a worse prognosis ([@bib2]; [@bib7]). Indeed, FAK activation has been implicated in conferring a more invasive phenotype to malignancies through its effects on the epithelial-to-mesenchymal transition process by promoting E-cadherin delocalisation and upregulation of caveolin-1 ([@bib3]; [@bib11]). Y15 is a small molecule identified through *in silico* screening that selectively targets the Y397 autophosphorylation site of FAK ([@bib14]). This is the same interaction site between activated FAK and Src, as well as the binding site for other signalling proteins ([@bib31]; [@bib9]). Y15 has shown activity, either alone or in combination with chemotherapy, both *in vitro* and *in vivo*, against breast, pancreatic, neuroblastoma and colon cancer tumour growth ([@bib14]; [@bib20]; [@bib5]; [@bib19], [@bib18]). The FAK-Src signalling network appears to be deregulated in high-grade lung cancers. Phosphoproteomic analysis comparing KRAS-mutant/LKB1 wild-type lung tumours with KRAS-mutant/LKB1-deficient lung tumours revealed hyperphosphorylation of FAK and Src which promoted cell migration in the latter ([@bib8]). This may provide mechanistic explanation for the observation that inactivation of the tumour suppressor LKB1 results in greater propensity for metastasis compared with loss of other tumour suppressors in a KRAS-driven murine lung cancer model ([@bib10]). We thus sought to characterise the effects of FAK inhibition using Y15 and other FAK inhibitors in various lung cancer cell lines with or without RAS mutations. Materials and methods ===================== Cell lines ---------- KRAS-mutant (H157, H358, H727, A549), NRAS-mutant (H1299) and EGFR-mutant (H1650, H1975) cell lines were obtained from the American Type Culture Collection. Cell lines were cultured in RPMI-1640 (Life Technologies, Grand Island, NY, USA) supplemented with 10% FBS (Sigma-Aldrich, St Louis, MO, USA) and penicillin--streptomycin and incubated at 37 °C in a fully humidified atmosphere containing 5% CO~2~. All cell lines were used at low passage in our laboratory, and were authenticated using viability, morphology and growth curve analysis on a regular basis, and tested negative for Mycoplasma. Compounds --------- Y15 and the ATP-competitive FAK inhibitor PF-573228 were purchased from Sigma-Aldrich. Other ATP-competitive FAK inhibitors PF-562271 and NVP-TAE226 (TAE-226), as well as Bcl-2 inhibitors ABT263, GX15-070 and ABT-737 were obtained from Selleckchem (Houston, TX, USA). FAK inhibitor C4 ([@bib25]) was obtained from the laboratory of Dr Elena Kurenova and was used as control in the MTS assays to screen for the effect of Y15 on lung cancer cell viability. Antibodies ---------- The antibodies of p-FAK (Y397), FAK, p-Akt (S473), Akt, p-Erk1/2 (T202/Y204), Erk, p-Src (Y416), Src, cleaved caspase-3, cleaved poly (ADP-ribose) polymerase (PARP), p-STAT3 (Y705), p-P70S6K (T389), p-mTOR (S2448), Bcl-2, Bcl-xL and Mcl-1 were obtained from Cell Signaling Technology (Danvers, MA, USA). p-JNK (T183) and JNK1 antibodies were from Santa Cruz Biotechnology (Dallas, TX, USA). *β*-Actin antibody was purchased from Sigma-Aldrich. Clonogenicity assays -------------------- In all, 5 × 10^5^ cells were seeded into 6-well plates and treated with escalating dosages of Y15 (or DMSO) and incubated at 37 °C for 14--20 days. Media were changed every 3--4 days. Colonies were then visualised and counted after staining with crystal violet. Cell-viability assays --------------------- Initial screening of Y15 effect on lung cancer cell line viability was performed using trypan blue exclusion assay as previously described ([@bib41]) using C4 as comparator agent. MTS assay was used for all subsequent experiments. Briefly, cells of 1 × 10^4^ were seeded in 96-well plates and treated with concurrent administration of Y15 with each of the drugs for 48 or 96 h. Then 20 *μ*l per well of CellTiter 96 AQueous One Solution Reagent (Promega, Madison, WI, USA) was added. After 1 h at 37 °C in a humidified, 5% CO2 atmosphere, the absorbance at 490 nm was recorded using a microplate reader. Western blot analysis --------------------- For immunoblot analysis, the cells were treated with the indicated agents and then collected in cell lysis buffer (Cell Signaling Technology). Total protein was quantified using Coomassie protein assay reagent (Bio-Rad, Hercules, CA, USA). An equal amount of protein (60 *μ*g) was separated by SDS-PAGE and electrotransferred onto nitrocellulose membrane. The primary antibodies were then tested. *β*-Actin was used as endogenous control for equal loading. Immunocomplexes were visualised with enhanced chemiluminescence detection kits (Pierce, Rockford, IL, USA). RNA interference studies ------------------------ RNA interference was based on pGreenPuro system (System Bioscience, Mountain View, CA, USA) expressing small-hairpin RNA (shRNA). pGreen-Akt1, pGreen-Bcl-2, pGreen-Bcl-xL and pGreenPuro-vec constructs, encoding shRNA for Akt1 (shAkt1), Bcl-2 (shBcl-2), Bcl-xL (shBcl-xL) or a negative control (vector), respectively, were prepared by inserting the target sequence for human Akt1 (5′-ATGACTTCCTTCTTGAGGATC-3′) or Bcl-2 (5′-CCCTGATTGTGTATATTCA-3′) or Bcl-xL (5′-CCCTTGCAGCTAGTTTTCT-3′) into pGreenPuro. 293TN cell was stably transfected with the constructs and three packaging plasmids using Lipofectamine 2000 reagent (Invitrogen, Carlsbad, CA, USA) to package lentivirus; and then lung cancer cells were infected with lentivirus with multiplicity of infection of 5. Clones with stable downregulated Akt1, Bcl-2 or Bcl-xL expression were selected with puromycin (1 *μ*g ml^−1^). Small-interfering RNA (siRNA) targeting JNK (MAPK8 Silencer Select siRNA S11154) were purchased from Life Technologies. Transient transfection of siRNAs was carried out using Lipofectamine 2000 (Life Technologies) according to the manufacturer\'s instructions. Briefly, cells were seeded in 24-well plate. On the second day, cells were transfected with 20 pMol siRNA per well with lipofectamine 2000 (Invitrogen), and media were changed 4 h after transfection. Twenty-four hours later, cells were then treated with Y15 for cell-viability analysis. *In vivo* xenograft experiments ------------------------------- All *in vivo* experimental protocols were approved by the Institutional Animal Care and Use Committee of Roswell Park Cancer Institute (RPCI; Buffalo, NY, USA). Female SCID mice, 6--8-week old, were used for the experiments. Lung cancer cells (5 × 10^6^) were injected s.c. into the flank of SCID mice (RPCI). Tumours were monitored until they reached a mean tumour volume of 100 or 250 mm^3^ before starting Y15 dosing. Mice were assigned randomly to different groups (five mice per treatment group).Y15 was administered by oral gavage once daily at respective doses shown in the accompanying figures (see the 'Results\' section). Tumour volume was measured in two dimensions (length and width) twice-weekly using Ultra Cal-IV calipers (Fred V. Fowler Company, Inc., Newton, MA, USA) and was analysed using studylog software (Studylog Systems, San Francisco, CA, USA). Tumour volume (mm^3^)=(length × width^2^)/2. Mouse body weights were also recorded twice-weekly and the mice were observed daily. Mice with tumour volumes ⩾2000 mm^3^ or with losses in body weight ⩾20% from their initial body weight were promptly killed per Institutional Animal Care and Use Committee guidelines. Immunohistochemistry -------------------- Immunohistochemistry was performed in Pathology department of RPCI as previously described ([@bib32]). Briefly, tumour tissue was fixed overnight in 10% neutral-buffered formalin at room temperature, transferred to 70% ethanol and processed for paraffin embedding using a Thermo Electron Excelsior tissue processor (Thermo Fisher Scientific, Pittsburgh, PA, USA). Paraffin blocks were sectioned to 4-mm thickness and placed on positively charged glass slides. Tissues were stained using a Discovery automated slide machine (Ventana Medical Systems, Tucson, AZ, USA). Sections were counter-stained with hematoxylin to enhance visualisation of tissue morphology. After treatment in terminating buffer (300 m[M]{.smallcaps} sodium chloride and 30 m[M]{.smallcaps} sodium citrate), the sections were incubated in streptavidin--peroxidase complex for 30 min and then developed with diaminobenzidine-tetra-hydrochloride for 1--5 min as a substrate. Statistical analysis -------------------- The reported values represent the means±s.d. for at least three independent experiments performed in triplicate. To determine the significance between the tested groups, Student\'s test was used, with *P*\<0.05 considered as significant. Median dose--effect analysis was performed using CalcuSyn software version 2 (Biosoft, Great Shelford, Cambridge, UK) to determine additive, synergistic or antagonistic interactions of drug combinations. Results ======= Y15 decreases lung cancer cell viability and clonogenicity *in vitro* in a dose-dependent manner ------------------------------------------------------------------------------------------------ To characterise the effect of FAK inhibition using Y15 in various lung cancer cell lines, the basal expression levels of Y397-pFAK and total FAK in several lung cancer cell lines were analysed ([Figure 1A](#fig1){ref-type="fig"}). Levels of Y397-pFAK and FAK were variable across cell lines. We then screened for the efficacy of Y15 against five cell lines with 3-day exposure to escalating doses of Y15. Results showed decreased cell viability by MTS assay, whereas the control agent C4, a FAK scaffold inhibitor which disrupts FAK-VEGFR3 signalling and is not anticipated to be cytotoxic in lung cancer cell lines, had virtually no effect ([Figure 1B](#fig1){ref-type="fig"}). MTS assay was also performed for the ATP-competitive small molecule FAK inhibitors PF-562271, PF-573228 and TAE-226. [Table 1](#tbl1){ref-type="table"} demonstrates comparative IC50 values as determined by MTS assay, showing that Y15 is more potent compared with the most selective FAK inhibitor PF-573228, with comparable to slightly more potent activity compared with PF-573228 and TAE-226 ([Table 1](#tbl1){ref-type="table"}). We also treated lung cancer cell lines for 72 h and determined IC50 values for Y15 by clonogenic assay ([Figure 1C](#fig1){ref-type="fig"}). Y15 decreased clonogenicity in a dose-dependent manner in multiple cell lines regardless of RAS mutation status ([Figure 1C](#fig1){ref-type="fig"}). Y15 effectively inhibits the growth of lung cancer xenografts *in vivo* ----------------------------------------------------------------------- To test the efficacy of Y15 on RAS-mutant lung cancer growth *in vivo*, we implanted A549 cells subcutaneously into mice. As shown in [Figure 2A](#fig2){ref-type="fig"}, Y15 significantly decreased tumour growth. The same effect was observed with H1299 xenograft ([Figure 2B](#fig2){ref-type="fig"}). Immunohistochemical staining demonstrated that Y15 decreased Y397 FAK phosphorylation and triggered activation of caspase-3 in the harvested A549 tumour xenografts compared with the PBS-treated group ([Figure 2C](#fig2){ref-type="fig"}). We observed similar growth inhibition in EGFR-mutant H1650 and H1975 xenografts ([Figure 2D and E](#fig2){ref-type="fig"}). There was no significant difference in body weights (data not shown) and side effects between the vehicle and Y15-treated animals even when the dosages evaluated. Thus, Y15 can inhibit the growth of lung cancers with oncogenically driven MAPK pathway activation through either RAS or EGFR mutation. Y15 inhibits Y397 FAK autophosphorylation and downregulates Bcl-2, Bcl-xL and Mcl-1 in a time-dependent manner in non-small cell lung cancer cell lines ------------------------------------------------------------------------------------------------------------------------------------------------------- To determine the time-dependent effect of Y15 on FAK autophosphorylation, we performed Western blotting on cell lysates at different time points from 0.5 through 72 h exposure to Y15 at 5 *μ*M concentration in the H1299 cells (IC50∼4 *μ*M). [Figure 3A](#fig3){ref-type="fig"} shows time-dependent reduction in Y397-pFAK level. We also detected immediate and sustained reduction of phosphorylation of downstream substrate of FAK: p-Src (Y416). There was decreased phosphorylation of Akt, STAT3, P70S6K, GSK3*β* and mTOR at 72 h as well. There was also evidence of pro-apoptotic effects with decrease in Bcl-2, Bcl-xL and Mcl-1 levels. Intriguingly, phosphorylation of JNK was significantly increased until the 24-h time point, wherein cleavage of PARP and caspase-3 began to increase. However, Erk1/2 (T202/Y204) phosphorylation was not affected. Indeed, reduction of ERK phosphorylation with Y15 treatment was cell line-dependent (data not shown). Similar results were observed in additional cell lines ([Figure 3B](#fig3){ref-type="fig"}). Activation of JNK was induced upon treatment of Y15 until 8-h time point, whereas Bcl-2, Bcl-xL and Mcl-1 were decreased with increasing drug exposure time course. In summary, Y15 caused time-dependent decrease of Y397-pFAK, Bcl-2, Bcl-xL and Mcl-1 across multiple cell lines. Y15-induced downregulation of Bcl-2 family members is independent of caspase activation --------------------------------------------------------------------------------------- Given that caspase activation induced protein degradation during cell apoptosis, we evaluated whether caspase was involved in the downregulation of Bcl-2 family members. H1299 cells treated with 5 *μ*[M]{.smallcaps} Y15 were cultured in the presence or absence of 20 *μ*[M]{.smallcaps} pan-caspase inhibitor, z-VAD-fmk, for 8--48 h. As shown in [Figure 3C](#fig3){ref-type="fig"}, reduction in both Bcl-2 and Bcl-xL was evident from 8 h onwards under Y15 treatment alone as expected. However, no significant difference in this effect was found with the addition of caspase inhibitor z-VAD. Similar result was found in Mcl-1 from 24--48 h treatment. Taken together, the above results showed that downregulation of Bcl-2 family members accompanying Y15-induced apoptosis was independent of caspase activation. Activation of JNK contributes to Y15-induced downregulation of Bcl-2 family members ----------------------------------------------------------------------------------- It was reported that JNK is involved in downregulation of Bcl-2 family members ([@bib38]; [@bib21]; [@bib4]). To elucidate the effects of JNK activation on induction of apoptosis, knockdown of JNK by siRNA (si-JNK) was used in selected Y15-sensitive cells (H1299, H1650 and H358). As shown in [Figure 4A](#fig4){ref-type="fig"}, in the presence of 5 *μ*[M]{.smallcaps} Y15 treatment alone, p-JNK (T183) was significantly activated, whereas both p-FAK (Y397) and p-Akt (S473) were inhibited in the tested cell lines. In contrast with the siRNA-negative control, the expression of JNK was totally abrogated by siRNA in H1299, H1650 and H358 si-JNK cell lines. Furthermore, the previously observed degradation of Mcl-1, Bcl-xL and Bcl-2 upon treatment with Y15 alone was substantially attenuated upon knockdown of JNK ([Figure 4A](#fig4){ref-type="fig"}). Notably, the decrease of Mcl-1 and Bcl-2 in Y15-treated si-JNK cells was minimal to absent, suggesting that JNK activation is the process upstream of Mcl-1 and Bcl-2 regulation, and exhibits a functional role in the attenuation of apoptosis in si-JNK cells. JNK downregulation by siRNA protected cells from Y15-induced cell death in H1299, H358 and H1650 cells ([Figure 4B](#fig4){ref-type="fig"}; *P*\<0.001, 0.00368, \<0.001, respectively. Raw data is provided in the [Supplementary Materials](#sup1){ref-type="supplementary-material"}), supporting the hypothesis that activation of JNK contributes to Y15-induced apoptosis. Together, these results demonstrate that JNK activation has an important role in Y15-induced downregulation of Bcl-2 family members. Abrogation of anti-apoptotic Bcl-2 family proteins synergizes with inhibition of FAK in lung cancer --------------------------------------------------------------------------------------------------- As there was decreased Akt phosphorylation and downregulation of both Bcl-2 and Bcl-xL upon treatment with Y15 over time, we hypothesised that targeting these proteins may modulate the efficacy of Y15. To determine the role of these proteins, we knocked down Bcl-2, Bcl-xL or Akt1 by shRNA in H1299 cells. Stable clones propagated after puromycin selection (1 *μ*g ml^−1^) were then treated with Y15 and the results were compared with parental H1299 cell lines using trypan blue exclusion method. [Figure 5A](#fig5){ref-type="fig"} shows that knockdown of either Bcl-2 or Bcl-xL significantly decreased cell viability upon exposure to Y15, whereas no additional effect was observed with knockdown of Akt1. [Figure 5B](#fig5){ref-type="fig"} shows the expression of Akt1, Bcl-2, Bcl-xL in infected clones *vs* control cells that express the vector alone. In contrast to treatment control cells, there was minimal or modest decrease of Mcl-1 observed in shAkt1 clones upon treatment with Y15. In comparison, Mcl-1 levels were markedly reduced in shBcl-xL and shBcl-2 clones treated with Y15. To investigate the signalling effects with pharmacologic inhibition, the effects of the combination of Y15 and the Bcl-2/Bcl-xL inhibitor ABT263 are illustrated in [Figure 5C--E](#fig5){ref-type="fig"}. The combination of Y15 and ABT263 decreased Mcl-1 levels to a greater degree than either Y15 or ABT263 alone. This combination also abrogated Akt (S473) and STAT3 (Y705) phosphorylation to a greater degree than that can be achieved by Y15 alone ([Figure 5C](#fig5){ref-type="fig"}). Consistent with the signalling effects, cell-viability tests showed that either Y15 or ABT263 alone was minimally toxic to H1299 cells. However, exposure of cells to the combination markedly increased cell death (i.e., \>72% [Figure 5D](#fig5){ref-type="fig"}). Median dose--effect analysis yielded combination index values considerably\<1.0, corresponding to a highly synergistic interaction ([Figure 5E](#fig5){ref-type="fig"}). MTS assay was thus subsequently performed to evaluate the effect of Y15 or other FAK inhibitors in combination with various Bcl-2 inhibitors across different lung cancer cell lines. [Supplementary Table S1](#sup1){ref-type="supplementary-material"} summarises the results. Synergism is demonstrated with the combination of FAK inhibitors with various Bcl-2 inhibitors across multiple lung cancer cell lines. Discussion ========== Metastatic non-small cell lung cancer remains a difficult-to-treat disease, and efforts to improve patient survival have yielded moderate success so far even with genotypically selected targeted therapies. Emerging evidence has implicated FAK to have a key signalling role that induces cancer cell proliferation, motility, survival, invasion and metastasis ([@bib13]). In this study, we demonstrated that treatment with Y15 significantly decreased viability and clonogenicity of several lung cancer cell lines. Y15 is a non-receptor tyrosine kinase FAK inhibitor, which effectively decreased Y397 FAK phosphorylation in a time- and dose-dependent manner, and also decreased phosphorylation of downstream FAK signalling players, such as Src, Akt and STAT3. Downregulation of Bcl-2 family members (Bcl-2, Bcl-xL and Mcl-1) was associated with Y15-induced apoptosis. This in turn requires activation of JNK, with subsequent Mcl-1 and Bcl-2 downregulation. Y15-induced downregulation of the anti-apoptotic Bcl-2 is an important characteristic in key contradistinction to other FAK inhibitors where there is no significant effect on Bcl-2 or Bcl-xL levels ([@bib39]). Although Mcl-1 downregulation was described with another FAK inhibitor ([@bib39]), the effect was transient, whereas this is sustained with exposure to Y15. This is the first report to demonstrate the efficacy of FAK inhibition in H1975, an EGFR-mutant lung cancer cell line harbouring the T790M mutation resistant to first- and second-generation EGFR tyrosine kinase inhibitors (TKIs). This is an important finding as Y15 may demonstrate activity regardless of the EGFR mutation type, particularly as different EGFR mutations have varying sensitivity to currently used EGFR TKIs and drug resistance continues to be a significant clinical problem despite the development of third-generation TKIs. Moreover, we also demonstrated the efficacy of FAK inhibition in RAS-driven lung cancer, supporting observations reported previously that FAK inhibitors exert potent antitumour effects in mutant KRAS non-small cell lung cancer in association with INK4A/ARF deficiency ([@bib24]). Recent reports demonstrated that the anti-apoptotic PI3K/Akt cascade promotes resistance to various anti-cancer therapies, including EGFR TKIs ([@bib36]; [@bib23]; [@bib22]).The Bcl-2 family also represents a critical group of molecules involved directly in the regulation of cell apoptosis ([@bib30]; [@bib1]; [@bib29]; [@bib16]). Indeed, the lack of efficacy of combined PI3K/Akt and MEK pathway inhibition in KRAS-mutant lung cancers can be attributed to the inability to induce apoptosis, as inhibition of Bcl-xL restores cytotoxicity and the apoptotic response ([@bib17]). We have demonstrated that Y15 induces apoptosis. Our results showed that Bcl-2, Bcl-xL and Mcl-1 downregulation contributed significantly to Y15-induced apoptosis. In addition, combination therapy with Bcl-2/Bcl-xL inhibitor, such as ABT263, potentiates Y15-mediated apoptosis ([Figure 5D and E](#fig5){ref-type="fig"}). Similar to what has been recently demonstrated in ovarian clear cell carcinoma cell lines ([@bib39]), we also demonstrated that pharmacological inhibition of Bcl-2/Bcl-xL in combination with various FAK inhibitors including Y15 has synergistic activity in lung cancer cell lines. One potential mechanism for the synergistic effect between Bcl-2 pathway inhibition with kinase inhibitors had been demonstrated previously by multiple groups of investigators ([@bib12]; [@bib15]; [@bib28]; [@bib35]; [@bib34]; [@bib40]). These studies demonstrate that upregulation of BIM, a pro-apoptotic member of the Bcl-2 family, improves that apoptotic effect induced by various kinase inhibitors across different malignancies, including MAPK pathway-activated cancers, such as RAS-mutant or EGFR-mutant in lung cancer. Conversely, polymorphic variants that lead to BIM isoforms lacking the pro-apoptotic BH3 domain may underlie innate primary resistance to therapy. Drugs such as ABT263 sequester Bcl-2 and Bcl-xL to release BIM, thereby enhancing the efficacy of kinase inhibitors. Moreover, paxillin, an adaptor protein that is phosphorylated by FAK and Src, is shown to confer resistance to EGFR TKIs in EGFR-mutant lung cancers by reducing BIM and increasing Mcl-1 expression ([@bib37]). Finally, inactivation of STAT3 by Y15 contributes to reduction in Bcl-xL expression, thereby enhancing the apoptotic potential of the combination regimen ([@bib42]; [@bib40]). We conducted experiments to describe another mechanism of the synergism observed between FAK inhibition and Bcl-2 pathway inhibition. JNK is a member of the MAPK family and is activated by a variety of environmental stresses, inflammatory cytokines, growth factors and GPCR agonists ([@bib6]). Recent studies demonstrated that JNK is involved in downregulation of Bcl-2 family members ([@bib38]; [@bib21]; [@bib4]). In our study, JNK activation has a role in Y15-induced downregulation of Mcl-1 and Bcl-2. Knockdown of JNK by shRNA abrogated the downregulation of Mcl-1 and Bcl-2 by Y15 and attenuated Y15-induced cell lethality, indicating that JNK activation is the upstream process of Mcl-1 and Bcl-2 regulation. Altering JNK function or activity may thus affect the efficacy of Y15, or potentially, as well as on the combination of FAK and Bcl-2/Bcl-xL inhibitors. In summary, this report for the first time demonstrates the effect of FAK inhibition alone or in combination with depletion of Bcl-2 pathway in oncogenically driven, MAPK-activated lung cancers through either RAS or EGFR mutation. FAK signalling is a novel therapeutic target worth exploring in the treatment of lung cancer, and the data shown here provide the rationale for further clinical development. Major funding for this project was received from RPCI Alliance Foundation. This work was also made possible in part by National Institute of Health Grant, CA65910 and P30 Grant CA016056 from NCI to Roswell Park Cancer Institute. We also thank the Support in part by the Fundamental Research Funds for the Central Universities, Shaanxi Normal University (GK201603062). We thank Mike Yemma and Baotran Ho for their assistance with the harvest of A549 xenograft experiments for histopathological analysis. [Supplementary Information](#sup1){ref-type="supplementary-material"} accompanies this paper on British Journal of Cancer website (http://www.nature.com/bjc) This work is published under the standard license to publish agreement. After 12 months the work will become freely available and the license terms will switch to a Creative Commons Attribution-NonCommercial-Share Alike 4.0 Unported License. The authors declare no conflict of interest. Supplementary Material {#sup1} ====================== ###### Click here for additional data file. ###### Click here for additional data file. ![**Y15 decreased viability and clonogenicity of lung cancer cell lines in a dose-dependent manner.**(**A**) Expression of Y397-pFAK and FAK in lung cancer cell lines. Western blotting with Y397-pFAK and FAK was performed on different lung cancer cell lines. *β*-Actin was used as a loading control. Y397-pFAK and FAK levels are variable across different cell lines. (**B**) MTS assay. RAS-mutant (H1299, H727, H358, A549) or EGFR-mutant (H1650) cell lines were treated with Y15 or control FAK inhibitor C4 (not targeting Y397-pFAK) for 72 h. Y15 increased cell death in all cell lines, whereas control C4 did not. (**C**) Different lung cancer cells were treated with increasing doses of Y15 for 2 weeks and clonogenicity assay was performed. Y15 significantly decreased clonogenicity in a dose-dependent manner.](bjc2016190f1){#fig1} ![**Y15 decreased Ras-mutant and EGFR-mutant lung cancer tumour growth *in vivo.***(**A**) KRAS-mutant cell A549 were injected subcutaneously into the flank of mice (*n*=5), and Y15 was administrated at 100 mg kg^−1^ orally by gavage 5 days a week. 1 × PBS was administered orally by gavage to untreated group. Tumour volume was measured as described in the 'Materials and Methods\' section. \**P*\<0.05, Student\'s *t*-test. (**B**) The same experiment was performed with NRAS-mutant cell H1299 xenograft tumour growth. Y15 was administrated at 180 mg kg^−1^ by gavage (based on dose--response across multiple cell lines showing that 180 mg kg^−1^ can consistently show difference in tumour growth inhibition compared with 100 mg kg^−1^ dose). (**C**) Y15 decreased Y397-pFAK in tumour xenograft tissues. Tumours from A549 xenograft were collected and used for immunohistochemical staining with Y397-pFAK, FAK and caspase-3. Y15-treated tumours expressed less Y397-pFAK than untreated tumours. Activation of caspase-3 was observed in Y15-treated tumours. (**D**, **E**) Same treatments performed with EGFR-mutant H1650 (**D**) with intrinsic resistance to EGFR TKI and H1975 cell line (**E**) with known EGFR T790M resistance mutation.](bjc2016190f2){#fig2} ![**Y15 inhibits Y397 FAK autophosphorylation and downregulates Bcl-2 family members.**(**A**) Y15 decreased Y397-pFAK and downstream p-Src, p-Akt targets in a time-dependent manner. H1299 lung cancer cell line was treated with 5 *μ*[M]{.smallcaps} of Y15 for 0--72 h and western blotting was performed with Y397-pFAK, FAK, p-Src, Src, p-Akt, Akt and other targets. Y15 increased cleaved PARP and caspase-3 starting from 24 h. (**B**) Y15 performed similar effects in H727 and H1650 in a time-dependent manner. (**C**) Downregulation of Bcl-2 family members was independent of caspase activation. Twenty *μ*[M]{.smallcaps} of broad-spectrum caspase inhibitor, z-VAD-fmk, was treated with or without 5 *μ*[M]{.smallcaps} Y15 at different time points after 8--48 h in the H1299 cells. Western blotting was performed to evaluate the effect on Bcl-2 family members.](bjc2016190f3){#fig3} ![**Knockdown of JNK by siRNA significantly attenuates Y15-induced cytotoxicity, and subsequently abrogates Mcl-1 and Bcl-2 downregulation induced by Y15.**H1299, H1650 or H358 cells were transfected with siRNA targeting JNK and were treated with Y15 for 48 h, after which whole-cell lysates were prepared and subjected to western blot analysis (**A**). The extent of apoptosis was determined as described in the 'Materials and Methods\' section (**B**). Twenty-four hours after siRNA transfection, cells were treated with Y15 (2.5 *μ*[M]{.smallcaps} for H1299, and 5 *μ*[M]{.smallcaps} for H358 and H1650) for 24 h. Then cells were collected and live cells were quantified with trypan blue exclusion methods. Results of Y15-treated cells were presented as % relative to values of vehicle-treated cells (defined as 100%). Data represents means±s.d. of three independent experiments (\**P*\<0.05, compared with scrambled siRNA control).](bjc2016190f4){#fig4} ![**Abrogation of anti-apoptotic Bcl-2 family members synergizes the antitumour efficacy of Y15 against lung cancer cells *in vitro*.**(**A**) H1299 cells with empty vector and their respective shBcl-2, shBcl-xL or shAkt1 clones were treated with Y15 for 72 h, trypan blue assay was performed to evaluate cell viability. (**B**) Western blots showing differences in the expression of Bcl-2, Bcl-xL and Akt1 in control H1299 and respective shRNA clone cells, with or without Y15. (**C**) Western blot showing the effect on downstream signalling proteins with the combination of Y15 at 5 *μ*[M]{.smallcaps} and the Bcl-2/Bcl-xL inhibitor ABT263 at 2.5 *μ*[M]{.smallcaps} in H1299 cells after 24 h treatment. The combination of Y15 and ABT263 decreased Y397-pFAK, p-Src and p-Akt more than each agent alone. (**D**) ABT263 potentiates Y15-mediated apoptosis. The cell growth inhibition was determined as described in the 'Materials and Methods\' section. Data represent means±s.d. of three independent experiments. (**E**) Median dose--effect analysis was performed to calculate CI using CalcuSyn software (Biosoft) to determine interactions of Y15 combined with ABT263.](bjc2016190f5){#fig5} ###### The effect of Y15 and other FAK inhibitors on lung cancer cell line viability (MTS assay) **Cell line** **H157** **H358** **H727** **H1299** **A549** **H1650** **H1975** ------------------------------- ---------- ---------- ---------- ----------- ---------- ----------- ----------- **IC50 (*μ*[M]{.smallcaps})** TAE226 7.46 3.18 0.30 2.98 2.59 2.30 2.88 PF-562271 5.76 6.38 2.26 3.94 5.41 5.31 5.47 PF-573228 11.39 27.49 2.80 9.18 9.08 20.70 13.20 Y15 2.10 2.72 1.30 3.88 3.49 1.90 1.56 [^1]: These authors contributed equally to this work.
{ "pile_set_name": "PubMed Central" }
Louisiana Gov. Bobby Jindal isn’t expected to announce his candidacy for president until June 24, but he’s already firing shots at future competitors. In response to Sen. Rand Paul’s comments in late May on the origins of ISIS, Jindal called him "outlandish," "illogical," and "unsuited to be Commander-in-Chief." Paul advisor Doug Stafford shot back at Jindal, saying, "It’s ironic Gov. Jindal would level such a charge when he flip-flops on crucial issues like Common Core and national security, and he has cratered his own state’s economy and budget." This is not the first time critics have accused of Jindal for doing a 180 on Common Core — the state-based educational standards aimed at improving student readiness for college and the workplace. (Read our past fact-checks of claims and flips relating to Common Core.) In light of his upcoming candidacy, we wondered: How does Jindal’s position on Common Core register on our Flip-O-Meter? It’s important to note that we are not making a value judgment about flip-flopping; we're just noting whether a change of position has occurred. Jindal support Common Core was launched in June 2009 as a collaboration between 49 states and territories. Louisiana adopted the standards in 2010 with Jindal’s blessing. In 2012, he handpicked John White, a strong supporter of Common Core, as state superintendent of education. At an event for business leaders in January of that year, Jindal lauded the Common Core standards as a step forward for education in his state that "will raise expectations for every child." Jindal echoed the sentiment early into his second term. Jindal stood by Common Core at a groundbreaking ceremony in 2013, amid an ongoing fight over the standards in his state and even after the Republican National Committee renounced the program. Though he never mentioned the initiative by name, Jindal said that "too many" governors, teachers, students and parents "have fought too hard for too many years to put Louisiana on that map (toward more rigorous education standards). And we're not going backwards." Then, he disowned the initiative. Jindal opposition Jindal himself acknowledges his change of heart, which he says is due to the federal government’s stepping in. His spokesperson Mike Reed told us, "Gov. Jindal supported (Common Core) when he believed it to be a state-led effort. Later, when he discovered it was a centralized federal effort, he opposed it and began working to remove Common Core from Louisiana." We’ve fact-checked several statements that suggest Common Core is a federal program or mandate. It’s not. States can improve their chances of winning federal money if they adopt educational standards; the Obama administration included that as criteria for its "Race to the Top" program. But Common Core itself remains a state-based, voluntary program. Nevertheless, by April 2014, Jindal was clearly in the opposition camp. "I'm from the school that believes education is a matter best left for local control," Jindal wrote in an op-ed for USA Today. "The notion of Washington determining curricula is something most states are simply not interested in. It's a non-starter." A month later, Jindal grew more emphatic in his distaste for Common Core, comparing it to centralized planning in Russia. He also tweeted: We will not be bullied by fed govt. Common Core advocates claim it not a fed takeover, but Sec. Duncan's comments & actions prove otherwise. — Gov. Bobby Jindal (@BobbyJindal) June 17, 2014 Beyond rhetoric, Jindal has actively tried to rock the schoolhouse standards. He sued the Obama administration over the national implementation of Common Core in 2014 (and he’s been sued for his repudiation). He asked Common Core to withdraw from the state. He broke with his own education head, an "exceptional" and "unusual" move, according to Ashley Jochim, who studies Common Core at the Center for Reinventing Public Education. He proposed an opt-out option for students in early 2015. He issued an executive order to repeal Common Core in Louisiana in 2014 and came up with a legislative plan as well. In late May, Jindal signed off on a compromise between Louisiana legislators that allows state review and revision of the federal standards with public oversight. But, according to his spokesperson, that doesn’t mean Jindal’s done with his efforts to permanently give Common Core the boot in the Bayou. "We support the compromise because it ensures we have local control going forward. The next step will be to elect leaders who are committed to getting rid of Common Core," Reed told us, noting that Jindal’s lawsuit against the Obama administration is moving forward. Experts say there’s no question Jindal reversed his position on Common Core. "Gov. Jindal has clearly flip-flopped on the issue. He went from singing the praises of Common Core to leading the charge for removing the standards in Louisiana. Because of Jindal, the state has made almost a complete U-turn on the standards," said James Shuls, a professor of education and policy at the University of Missouri in St. Louis. Jindal’s change of position has also been noted by CNN, the Huffington Post, the Washington Times, the Washington Post’s editorial board and the Times-Picayune. Our rating Jindal was once an ardent supporter of Common Core (and one of the first adopters of the initiative) but has since become one of its staunchest critics, mounting lawsuits and legislation against the initiative. Despite his endorsement of a compromise in his state, Jindal remains an opponent to the core. We rate Jindal’s position on Common Core a Full Flop.
{ "pile_set_name": "OpenWebText2" }
Q: How to load a partial view in a new window? I have an MVC partial view. I try to load it using window.open by calling the controller name and the action name. I got from the action the related partial view back but there are no links to stylesheets and scripts because this is a new window. How can I fix this issue please? This is the javascript code I´m using: function OpenNewWindowForDetail(model) { $.ajax({ url: '@Url.Action("ActionName", "ControllerName")', dataType: 'html', data: { userid: model.UserId }, type: 'POST', success: function (data) { var win = window.open('about:blank'); with (win.document) { open(); write(data); close(); } } }); } All links to stylesheet files and javascript files are in the layout.cshtml by the way. Thank you in advance A: You should modify your action to regular view with layout, instead of partial view. There is no reason to use partial view in this situation. There is also no reason to use AJAX. Simple anchor with target='_blank' would be enough. userId can be passed by GET parameter.
{ "pile_set_name": "StackExchange" }
The present invention relates to a helically-shaped intake port of an internal-combustion engine. A helically-shaped intake port normally comprises a helical portion formed around the intake valve of an engine and a substantially straight inlet passage portion tangentially connected to the helical portion. However, if such a helically-shaped intake port is so formed that a strong swirling motion is created in the combustion chamber of an engine when the engine is operating at a low speed under a light load, that is, when the amount of air fed into the cylinder of the engine is small, since air flowing within the helically-shaped intake port is subjected to a great flow resistance, a problem occurs in that the volumetric efficiency is reduced when the engine is operating at a high speed under a heavy load, that is, when the amount of air fed into the cylinder of the engine is large. In order to eliminate such a problem, the present inventor previously proposed a helically-shaped intake port in which a bypass passage, branched off from the inlet passage portion and connected to the helix-terminating portion of the helical portion, is formed in the cylinder head of an engine. A flow control valve is arranged in the bypass passage and is open when the engine is operating under a heavy load at a high speed. In this helically-shaped intake port, when the engine is operating under a heavy load at a high speed, a part of the air introduced into the inlet passage portion is fed into the helical portion of the helically-shaped intake port via the bypass passage. Consquently, since the flow area of the intake port is increased when the engine is operating under a heavy load at a high speed, it is possible to increase the volumetric efficiency. However, in this helically-shaped intake port, since the bypass passage is formed by a tubular passage which is completely separated from the inlet passage portion, the bypass passage has a relatively great flow resistance. In addition, since it is necessary to form the bypass passage adjacent to the inlet passage portion, the cross-sectional area of the bypass passage is restricted by the presence of the inlet passage portion. Consequently, it is difficult to obtain a satisfactory high volumetric efficiency. In addition, the helically-shaped intake port has a complicated construction itself, and, thus, if a bypass passage completely separated from the inlet passage portion is additionally provided, the entire construction of the intake port becomes extremely complicated. Therefore, it is considerably difficult to form a helically-shaped intake port equipped with such a bypass passage in the cylinder head.
{ "pile_set_name": "USPTO Backgrounds" }
a multiple of 54? False Is 42 a factor of 16632? True Is 40 a factor of 13440? True Is 7410 a multiple of 26? True Is 94 a multiple of 5? False Is 33 a factor of 7821? True Is 19 a factor of 9785? True Is 23 a factor of 8671? True Is 13464 a multiple of 136? True Is 7 a factor of 147? True Is 4 a factor of 156? True Is 12160 a multiple of 60? False Is 44 a factor of 14530? False Is 14 a factor of 1572? False Is 13678 a multiple of 18? False Is 7 a factor of 3255? True Does 69 divide 2539? False Is 16 a factor of 592? True Is 4 a multiple of 4? True Is 58 a factor of 13572? True Does 10 divide 92? False Does 5 divide 2392? False Does 145 divide 14675? False Is 21 a factor of 1677? False Is 32 a factor of 416? True Is 4 a factor of 12252? True Is 3724 a multiple of 2? True Is 5 a factor of 265? True Does 7 divide 9226? True Does 31 divide 3224? True Is 59 a factor of 26727? True Does 200 divide 10299? False Is 270 a multiple of 10? True Is 7 a factor of 215? False Is 1547 a multiple of 7? True Is 45 a factor of 561? False Is 46 a factor of 1150? True Does 52 divide 33404? False Does 366 divide 11223? False Is 84 a factor of 3444? True Does 16 divide 21888? True Does 91 divide 14378? True Does 3 divide 138? True Does 30 divide 5640? True Is 14 a factor of 4885? False Does 24 divide 8208? True Is 26 a factor of 2695? False Is 7462 a multiple of 182? True Does 34 divide 5576? True Is 2223 a multiple of 39? True Does 3 divide 342? True Is 10 a factor of 3959? False Is 14 a factor of 61852? True Does 12 divide 3077? False Is 13394 a multiple of 74? True Is 326 a multiple of 19? False Is 130 a multiple of 26? True Is 45668 a multiple of 73? False Does 97 divide 322? False Is 11996 a multiple of 87? False Does 19 divide 11248? True Is 10207 a multiple of 14? False Is 30225 a multiple of 39? True Is 2063 a multiple of 26? False Is 35 a factor of 93026? False Does 17 divide 1223? False Is 11118 a multiple of 51? True Does 145 divide 25955? True Is 1300 a multiple of 50? True Does 9 divide 26505? True Is 23 a factor of 22344? False Is 25 a factor of 345? False Is 824 a multiple of 31? False Does 301 divide 24080? True Is 237 a factor of 8532? True Does 25 divide 750? True Does 71 divide 568? True Is 13944 a multiple of 21? True Is 2 a factor of 1075? False Is 38 a factor of 3100? False Does 79 divide 711? True Is 93 a factor of 789? False Is 20 a factor of 580? True Is 15 a factor of 42644? False Does 3 divide 147? True Does 10 divide 3040? True Is 8100 a multiple of 100? True Is 551 a multiple of 29? True Is 6 a factor of 1187? False Does 19 divide 2907? True Is 185 a multiple of 13? False Is 59 a multiple of 8? False Does 14 divide 37490? False Does 30 divide 23179? False Is 41 a factor of 15835? False Does 19 divide 9671? True Is 2 a factor of 2001? False Is 10 a factor of 1655? False Is 2084 a multiple of 20? False Is 11582 a multiple of 3? False Does 26 divide 739? False Is 85 a factor of 14456? False Is 1541 a multiple of 23? True Is 2281 a multiple of 78? False Is 167 a factor of 792? False Is 8691 a multiple of 159? False Does 4 divide 192? True Is 68 a factor of 2584? True Does 16 divide 48? True Does 35 divide 735? True Does 11 divide 308? True Is 3 a factor of 5814? True Does 51 divide 1836? True Is 3169 a multiple of 2? False Does 257 divide 22378? False Does 38 divide 141? False Is 1120 a multiple of 28? True Is 3 a factor of 74? False Does 12 divide 18866? False Does 48 divide 1536? True Is 79 a multiple of 4? False Is 407 a multiple of 4? False Does 19 divide 2282? False Is 320 a multiple of 70? False Is 6 a factor of 7736? False Does 3 divide 8307? True Does 38 divide 25279? False Is 7471 a multiple of 15? False Is 25 a factor of 11127? False Is 16 a factor of 2330? False Is 829 a multiple of 20? False Is 11959 a multiple of 112? False Is 20 a factor of 2049? False Does 13 divide 326? False Does 6 divide 18609? False Is 27825 a multiple of 53? True Is 8 a factor of 192? True Does 32 divide 1635? False Is 2090 a multiple of 16? False Does 8 divide 13724? False Is 846 a multiple of 4? False Is 64 a factor of 18270? False Does 54 divide 2486? False Is 2858 a multiple of 24? False Does 15 divide 9648? False Is 7 a factor of 7931? True Is 23 a factor of 469? False Is 225 even? False Is 10 a factor of 45087? False Is 9 a factor of 837? True Is 158 a factor of 37604? True Does 18 divide 1782? True Does 18 divide 5910? False Does 11 divide 14088? False Is 14 a factor of 244? False Does 13 divide 8099? True Is 1656 a multiple of 24? True Is 41328 a multiple of 126? True Does 308 divide 23708? False Does 24 divide 28288? False Is 1202 a multiple of 9? False Is 3 a factor of 13? False Does 6 divide 9468? True Is 92 a factor of 9568? True Does 51 divide 2142? True Is 199 a factor of 22089? True Is 16 a factor of 473? False Is 1190 a multiple of 34? True Is 8424 a multiple of 81? True Is 9520 a multiple of 5? True Is 67 a multiple of 27? False Is 158 a factor of 18170? True Is 7 a factor of 1442? True Is 64169 a multiple of 15? False Does 26 divide 4778? False Is 369 a multiple of 10? False Does 8 divide 10392? True Does 12 divide 468? True Does 12 divide 3652? False Does 20 divide 10655? False Does 174 divide 39672? True Is 46 a factor of 138? True Is 32 a factor of 6240? True Is 28384 a multiple of 7? False Does 8 divide 5536? True Is 338 a factor of 38488? False Does 71 divide 1134? False Does 16 divide 16? True Does 15 divide 405? True Is 5 a factor of 50? True Is 6660 a multiple of 18? True Is 2 a factor of 206? True Is 255 a factor of 24154? False Is 78180 a multiple of 15? True Is 49 a factor of 1063? False Is 22274 a multiple of 14? True Does 7 divide 3021? False Is 13 a factor of 1040? True Does 282 divide 89112? True Is 152 a factor of 22804? False Does 3 divide 104? False Does 122 divide 3695? False Is 32 a factor of 512? True Does 2 divide 59? False Is 1663 a multiple of 15? False Is 2310 a multiple of 110? True Is 10 a factor of 30? True Is 57 a factor of 1704? False Does 13 divide 7479? False Is 8418 a multiple of 50? False Is 54 a factor of 717? False Does 18 divide 738? True Does 28 divide 62271? False Is 16712 a multiple of 77? False Does 50 divide 1733? False Does 7 divide 5890? False Is 913 a multiple of 81? False Is 12313 a multiple of 64? False Does 27 divide 5845? False Is 28 a factor of 53788? True Does 12 divide 501? False Is 118 a factor of 36580? True Is 21 a factor of 35438? False Is 9702 a multiple of 18? True Is 744 a multiple of 6? True Does 104 divide 14456? True Is 45 a factor of 1523? False Is 21 a factor of 4029? False Does 6 divide 455? False Does 22 divide 17292? True Does 6 divide 12078? True Does 33 divide 522? False Is 48294 a multiple of 337? False Is 35 a factor of 1231? False Is 19 a factor of 5529? True Is 15412 a multiple of 51? False Is 7 a factor of 21665? True Does 2 divide 126? True Does 2 divide 2228? True Does 14 divide 1022? True Is 369 a multiple of 9? True Is 13 a factor of 115772? False Does 6 divide 5490? True Does 3 divide 578? False Is 88 a factor of 1949? False Is 80 a factor of 5920? True Is 124 a factor of 21400? False Is 42 a factor of 1974? True Is 388 a multiple of 5? False Is 3 a factor of 183? True Does 4 divide 381? False Is 66 a factor of 1650? True Is 132 a factor of 3132? False Is 877 a multiple of 84? False Is 22760 a multiple of 20? True Is 1975 a multiple of 43? False Is 4100 a multiple of 20? True Is 12 a factor of 4440? True Is 10 a factor of 750? True Is 26 a factor of 3177? False Is 12 a factor of 146? False Is 131938 a multiple of 82? True Does 10 divide 6550? True Is 13392 a multiple of 54? True Is 15406 a multiple of 73? False Does 142 divide 8865? False Does 40 divide 28775? False Does 67 divide 3496? False Is 40 a factor of 1040? True Is 4 a factor of 32? True Is 706 a multiple of 18? False Is 81810 a multiple of 15? True Does 12 divide 4823? False Is 20 a factor of 820? True Does 25 divide 2107? False Is 9208 a multiple of 21? False Is 55900 a multiple of 5? True Is 138 a factor of 70242? True Does 11 divide 212? False Does 12 divide 1116? True Is 57387 a multiple of 11? True Does 37 divide 1554? True Is 7313 a multiple of 28? False Is 40870 a multiple of 25? False D
{ "pile_set_name": "DM Mathematics" }
Q: Setar atributos em um único bloco JS Existe alguma maneira de fazer isso? Eu to repetindo muito código com o setAttribute em um único elemento, então estou pesquisando se existe alguma forma de fazer isso de um jeito mais organizado e otimizado, mas não achei ainda. Abaixo vai um EXEMPLO do que to fazendo e um EXEMPLO do que queria fazer se possível: Link qualquer que irei utilizar no exemplo: <a class="teste"></a> Código JS que estou fazendo pra setar os atributos: document.querySelector('.teste').setAttribute('href', 'https://www.teste.com') document.querySelector('.teste').setAttribute('title', 'Site de Teste') document.querySelector('.teste').setAttribute('id', 'idteste') Como eu queria se possível ou algo similar: document.querySelector('.teste').setAttribute(['href', 'title', 'id'], ['https://www.teste.com', 'Site de Teste', 'idteste']) Teria algo similar a isso ja nativo do JavaScript? A: Poderia fazer usando uma função, passando como parâmetros o elemento, e os atributos e os valores como arrays, e fazer um for em qualquer uma das arrays setando os atributos: function setAttr(el, atts, vals){ for(var x=0; x<atts.length; x++){ el.setAttribute(atts[x], vals[x]); } console.log(el); } setAttr(document.querySelector('.teste'), ['href', 'title', 'id'], ['https://www.teste.com', 'Site de Teste', 'idteste']); <a class="teste">link</a> Outra forma (ainda melhor) é passando dois parâmetros: o elemento e um objeto com pares atributo:valor para a função e fazer um for...in: function setAttr(el, atts){ for(var x in atts){ el.setAttribute(x, atts[x]); } console.log(el); } setAttr(document.querySelector('.teste'), {'href': 'https://www.teste.com', 'title': 'Site de Teste', 'id': 'idteste'}); <a class="teste">link</a> Pra ser bastante sincero, eu preferiria repetir mesmo como você está fazendo. Usar uma função para aplicar atributos, na minha opinião, é trocar 6 por meia-dúzia. Não vejo muita vantagem e acho que fica até pior de ler. Neste caso, eu apenas atribuiria o elemento a uma variável para não repeti-lo várias vezes: var el = document.querySelector('.teste') el.setAttribute('href', 'https://www.teste.com') el.setAttribute('title', 'Site de Teste') el.setAttribute('id', 'idteste')
{ "pile_set_name": "StackExchange" }
Isaac W. Harrison House The Isaac W. Harrison House is a historic building located in the Cork Hill neighborhood of Davenport, Iowa, United States. It is a somewhat simplified version of the Italianate style found in the city of Davenport. The house is a two-story, three–bay, frame structure with an entrance that is to the left of center. Like many early Italianate homes in Davenport it retained some features of the Greek Revival style. These are found in the glass framed doorway and the simple window pediments. It is also features bracketed eaves and is capped with a hipped roof. The house has been listed on the National Register of Historic Places since 2015. References Category:Italianate architecture in Iowa Category:Houses in Davenport, Iowa Category:Houses on the National Register of Historic Places in Iowa Category:National Register of Historic Places in Davenport, Iowa
{ "pile_set_name": "Wikipedia (en)" }
Q: Navigate to contact's profile I want to open the default windows phone contact's profile out of my own app. I use the following code to receive all contacts: Contacts contacts = new Contacts(); contacts.SearchCompleted += HandleContactsSearchCompleted; contacts.SearchAsync(string.Empty, FilterKind.None, null); The HandleContactsSearchCompleted method iterates over all contacts, performs some filtering and displays them. On click on a contact (instance of Contact from the list of contacts received through the SeachCompleted event) I want to open the standard profile which I also see when I click on a contact in my people hub. Is there a special Uri to use with the NavigationService.Navigate method or a particular task for that? Thanks in advance! A: The current version of the Windows Phone SDK does not provide a method for showing the contact card of an existing contact in your address book.
{ "pile_set_name": "StackExchange" }
A well-designed Domain Specific Language (DSL) can help you be more productive as a developer, thus making you, your team and your clients happier. In this post, I’ll guide you through the design and creation of a simple DSL to create EPUB files. We’ll start with a regular API and refactoring until we get to a DSL solution. A short into to DSLs At it’s very core, DSL is a fancy term for a very simple language designed to solve something in particular. It’s domain-specific because it works in a very particular use-case, the most common ones being configuration files and APIs. If you are a Ruby developer then you have most likely used a DSL already. RSpec is one of the most popular: describe "Something" do subject { SomeClass.new } it { is_expected.not_to be_nil } it "passes" do subject.greet eq "Hello!" end end 1 2 3 4 5 6 7 8 9 10 describe "Something" do subject { SomeClass . new } it { is_expected . not_to be_nil } it "passes" do subject . greet eq "Hello!" end end That code is in a language designed to helps us write tests in a more natural way following the BDD testing methodology. The result is code that is more understandable to you as a human — programmer or otherwise. Even if you’ve never used Ruby before, or don’t know about RSpec, you get an idea of what it is, it describes the functionality of Something. The biggest drawback of DSLs is that you need to learn a new language every time — it’s easier to always use the same interface for all libraries. The advantage, though, is that the API is much more friendly and easier to use in the long-run. It’s an investment, the easiest the library, the lesser bugs consumers have, and everyone loves having less bugs. 🙂 So let’s get starting building a DSL. I’ll guide you through the design and creation of a simple DSL to create EPUB files. Starting with a regular API, we’ll refactor until we get to a DSL solution. The design EPUB is a format for digital books used by iOS and macOS. It’s basically a bunch of HTML files zipped together, following certain naming rules and ceremony. Without getting too deep into the file format specification, let’s just assume for now that all EPUBs must have a title, a description and at least one chapter. Initially, one could think of an API design as follows: generator = EPUBGenerator.new(title: "My Awesome Book", description: "An awesome book, really.") generator.chapter = Chapter.new(title: "Chapter 1", contents: "Once upon a time...") book_path = generator.generate puts "The book was created, it now lives in #{book_path}" 1 2 3 4 5 generator = EPUBGenerator . new ( title : "My Awesome Book" , description : "An awesome book, really." ) generator . chapter = Chapter . new ( title : "Chapter 1" , contents : "Once upon a time..." ) book_path = generator . generate puts "The book was created, it now lives in #{book_path}" That looks good, right? If the problem is that simple, then we are done. But what if the generator needs more than just a title and a description. Let’s say we now also need an author and a URL. We could just add more arguments: generator = EPUBGenerator.new(title: "My Awesome Book", description: "An awesome book, really.", author: "Federico Ramirez", url: "http://blog.beezwax.net") 1 2 generator = EPUBGenerator . new ( title : "My Awesome Book" , description : "An awesome book, really." , author : "Federico Ramirez" , url : "http://blog.beezwax.net" ) You might say “Meh it’s not that bad”. And you would be right! But we are taking an unnecessary risk, four arguments for a method is a red flag — it can get out of hand quite easily. There are many ways to solve that issue, the most common of which is to “extract it into an object”. Let’s create a Book model. We just add the arguments as attributes, make sure the data is always consistent and just inject that object into our generator. Now our code is not only more solid and easier to maintain, but we have the added benefit of testability. Now we are done… well, not really. Consider now that our EPUB generation library is a Ruby gem. We’ll force all our users to know all the class names: EPUBGenerator , Chapter and Book . If the library is this small, it’s not really a big deal. If we know we’ll need to expose the user to more classes, then we might want to consider a better solution. This is where a DSL comes handy. A DSL gives us yet another layer of abstraction. In this example, with a single class name, the user can easily use the library to create a new EPUB: generator = EPUBGenerator do |g| g.title "My Awesome Book" g.description "An awesome book, really." g.author "Federico Ramirez" g.url "http://blog.beezwax.net" end 1 2 3 4 5 6 7 generator = EPUBGenerator do | g | g . title "My Awesome Book" g . description "An awesome book, really." g . author "Federico Ramirez" g . url "http://blog.beezwax.net" end The way that looks is arbitraty, that’s just a common format for DSLs. With domain-specific languages it’s easier to start with “how it looks” and then move into the implementation, as the other way around might be harder if you have never made a DSLs before. Now that’s a good enough solution. The code is simple and easy to read. We are still missing a few things though. What would a chapter definition look like? Easy! generator = EPUBGenerator do |g| g.title "My Awesome Book" # ... g.chapter do |c| c.title "Chapter 1" c.contents "Lorem ipsum dolor sit amet..." end end 1 2 3 4 5 6 7 8 9 10 generator = EPUBGenerator do | g | g . title "My Awesome Book" # ... g . chapter do | c | c . title "Chapter 1" c . contents "Lorem ipsum dolor sit amet..." end end You start to notice a pattern here, if chapters needed some dependency, we just pass a new block: generator = EPUBGenerator do |g| g.title "My Awesome Book" # ... g.chapter do |c| c.title "Chapter 1" #... c.footnote do |f| f.contents "Hello! I'm a footnote." end end end 1 2 3 4 5 6 7 8 9 10 11 12 13 14 generator = EPUBGenerator do | g | g . title "My Awesome Book" # ... g . chapter do | c | c . title "Chapter 1" #... c . footnote do | f | f . contents "Hello! I'm a footnote." end end end Good! We now have our general design, let’s make it happen! The implementation Ruby’s yield is what makes it so easy to write DSLs. You can think of it as a function which gets called with whatever arguments we give it. class EPUBGenerator def self.generate book = Book.new yield book generator = Generator.new(book) generator.generate end end 1 2 3 4 5 6 7 8 9 class EPUBGenerator def self . generate book = Book . new yield book generator = Generator . new ( book ) generator . generate end end In the code above, pass book , an instance of Book to a block of code. We don’t know what the code-block will do with it, that responsibility is up to the caller. The generate method call looks like this: generator = EPUBGenerator.generate do |book| puts "I have a book! #{book}" end 1 2 3 4 generator = EPUBGenerator . generate do | book | puts "I have a book! #{book}" end We’ve abstracted away the Book class name dependency! We’ve also reduced the ceremony for creating books, it’s much simpler now. Let’s repeat this process of yieding code blocks for the Book model: class Book attr_reader :chapters def initialize @chapters = [] end # getter/setter def title(text = nil) return @title if text.nil? @title = text end def chapter chapter = Chapter.new yield chapter chapter.id(chapters.count + 1) chapters << chapter end end 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 class Book attr_reader : chapters def initialize @ chapters = [ ] end # getter/setter def title ( text = nil ) return @ title if text . nil ? @ title = text end def chapter chapter = Chapter . new yield chapter chapter . id ( chapters . count + 1 ) chapters < < chapter end end Nice! Our generator now looks like this: generator = EPUBGenerator.generate do |b| b.title "My Awesome Book" b.chapter do |c| # ... do something with chapter object end end 1 2 3 4 5 6 7 8 generator = EPUBGenerator . generate do | b | b . title "My Awesome Book" b . chapter do | c | # ... do something with chapter object end end We are still lacking functionality, but the important thing is to realize that every time we write b.<something> in the generator, we are actually calling a method on a book instance. That’s it! The hard part is done! From now on, it’s quite straightforward to implement the missing functionality. For the sake of completeness, let’s make another model, the Chapter : class Chapter attr_reader :title def initalize @title = "Not defined" end def title(text = nil) return @title if text.nil? @title = text end end 1 2 3 4 5 6 7 8 9 10 11 12 class Chapter attr_reader : title def initalize @ title = "Not defined" end def title ( text = nil ) return @ title if text . nil ? @ title = text end end The generator can now add titles to chapters: generator = EPUBGenerator.generate do |b| b.title "My Awesome Book" b.chapter do |c| c.title "Chapter 1" end end 1 2 3 4 5 6 7 8 generator = EPUBGenerator . generate do | b | b . title "My Awesome Book" b . chapter do | c | c . title "Chapter 1" end end Wrapping up We’ve built our own DSL. And it wasn’t even hard! If you are curious and want the full source code, you can see a fully working gem on GitHub. The complete DSL looks like this: path = Epubber.generate do |b| b.title 'My First EPUB book' b.author 'Ramirez, Federico' b.description 'This is an example EPUB' b.url 'http://my-url.com' b.cover do |c| c.file File.new('my-image.jpg') end b.introduction do |i| i.content '<p>This is an introduction.</p>' end b.chapter do |c| c.title 'Chapter 1' c.content '<p>This is some content!</p>' end b.chapter do |c| c.title 'Chapter 2' c.content '<p>Some more content this is.</p>' end end 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 path = Epubber . generate do | b | b . title 'My First EPUB book' b . author 'Ramirez, Federico' b . description 'This is an example EPUB' b . url 'http://my-url.com' b . cover do | c | c . file File . new ( 'my-image.jpg' ) end b . introduction do | i | i . content '<p>This is an introduction.</p>' end b . chapter do | c | c . title 'Chapter 1' c . content '<p>This is some content!</p>' end b . chapter do | c | c . title 'Chapter 2' c . content '<p>Some more content this is.</p>' end end BONUS TIP Yielding blocks is used everywhere in Ruby. It is particularly useful for making sure resources are beeing handled properly, the most common example is file manipulation. In order to write to a file we have to open it for writing, write stuff, and then close it. file = open_file('my_file.txt', 'w') file.write("Something") file.close 1 2 3 4 file = open_file ( 'my_file.txt' , 'w' ) file . write ( "Something" ) file . close If we forget to close the file, we won’t get any errors, but it might lead to unexpected behavior. That’s not good, we want all our users to always close the file after they write to it. We can easily solve this with yield :
{ "pile_set_name": "OpenWebText2" }
3 When do we use it? 1.To show OWNERSHIP 2.To show MISSING THINGS (like letters) 4 When do we use it? 1.To show POSSESSION The classroom owned by Mr Sharpe – Mr Sharpes classroom The hat worn by the man – the old mans hat The non-stop talking by Lewis - Lewiss non-stop talking The pen, owned by Carly, with the flashing light – Carlys pen with the flashing light 6 When do we use it? 2.To show MISSING THINGS Mr Sharpe was not going to ask again – Mr Sharpe wasnt going to ask again –He is getting angry now – Hes getting angry now He had better calm down - Hed better calm down Why are you still talking? – Whyre you still talking? 7 Your turn 1.Do not do that any more –Dont do that any more 2.Today is the coldest morning ever! 3.You could have killed me 4.There is no point in speaking to him 5.It is the end of the world as we know it 8 Last thing Its = Always means it is Its the end of the world as we know it Its a shame that had to happen The sun has got its hat on The dog had hurt its paw 9 Last thing – your turn Its = Always means it is The horse lost ____ way I love English - _____ really great I won the lottery and ___ the best thing that ever happened to me ___ the last thing I remember
{ "pile_set_name": "Pile-CC" }
Download free open source code for your projects! Main menu Encode messages from ldpc parity check matrix in matlab The following Matlab project contains the source code and Matlab examples used for encode messages from ldpc parity check matrix. This file could be useful to depict how to encode a message without having the generator matrix by hand. The source code and files included in this project are listed in the project files section, please make sure whether the listed source code meet your needs there.
{ "pile_set_name": "Pile-CC" }
Crianlarich Hills The Crianlarich Hills are a large group of mountains in Scotland, running east of Crianlarich and Loch Lomond, south of Strath Fillan and north of Loch Doine. The range is within the Breadalbane section of Loch Lomond and the Trossachs National Park and contains the highest mountains in the park. The mountains also are located in an area where the landscape becomes ever more remote and mountainous as landscapes go further into a wilderness starting from Tarbet on Loch Lomond. The highest mountain in the range is Ben More, which is also the highest in the national park and is one of the highest in Scotland. The mountains of the range include: Ben More, 1174m, 3852ft Stob Binnein, 1165m, 3822 ft See also List of Munros#Section one: Firth of Clyde to Strath Tay References Category:Mountains and hills of Stirling (council area) Category:Mountain ranges of Scotland
{ "pile_set_name": "Wikipedia (en)" }
Ian MacIntyre Ian MacIntyre (1869–1945) was Unionist Party (Scotland) MP for Edinburgh West. He first contested the seat in 1923, but was beaten by the Liberal incumbent Vivian Phillips by 2,232 votes. He gained the seat in 1924, pushing Phillipps into third place, and finishing just over one thousand votes ahead of the second-placed Labour candidate. He did not stand again in 1929, when Labour gained the seat. References External links Category:1869 births Category:1946 deaths Category:Members of the Parliament of the United Kingdom for Edinburgh constituencies Category:Unionist Party (Scotland) MPs Category:UK MPs 1924–1929
{ "pile_set_name": "Wikipedia (en)" }
The image size limit has been raised to 1mb! Anything larger than that should be linked to. This is a HARD limit, please do not abuse it. Our new Indie Games subforum is now open for business in G&T. Go and check it out, you might land a code for a free game. If you're developing an indie game and want to post about it, follow these directions. If you don't, he'll break your legs! Hahaha! Seriously though. Our rules have been updated and given their own forum. Go and look at them! They are nice, and there may be new ones that you didn't know about! Hooray for rules! Hooray for The System! Hooray for Conforming! Posts Support Check Phase-1 support in each of your provinces containing a Rival Emperor, active barbarians and/or an enemy army in the capital. If Emperor, -1 support to Italia if a Pretender or Rival Emperor is on the map. -1 support in Italia due to enemy army in the capital. Expand Pretender Empire PhaseProvinces you govern with a support level of 3+ adjacent to your Pretender Empire join it. N/A Gain Legacy PhaseGain Legacy for governed provinces, improvements and being Emperor or Pretender. Take Actions PhasePlay cards from your hand and spend influence points to perform any combination of actions in any order you wish. You may choose the same action multiple times, if you can afford to pay the necessary influence points. Support Check Phase-1 support in each of your provinces containing a Rival Emperor, active barbarians and/or an enemy army in the capital. If Emperor, -1 support to Italia if a Pretender or Rival Emperor is on the map. N/A Expand Pretender Empire PhaseProvinces you govern with a support level of 3+ adjacent to your Pretender Empire join it. N/A Gain Legacy PhaseGain Legacy for governed provinces, improvements and being Emperor or Pretender. Take Actions PhasePlay cards from your hand and spend influence points to perform any combination of actions in any order you wish. You may choose the same action multiple times, if you can afford to pay the necessary influence points. OK, first play 6 red influence (3+3). Use 4 points to put 4th legion in Italian Army. Use 2 points to move Britannia Army in Gallia, waste events. Than play 3 Yellow. Put Mob in Pannonia, use the 3 yellow points to put a Basilica in Gallia. Play 3 Blue card, recruit a Frank from homeland in my Gallia Army. Use the 3 points to recruit 4th governor. Finally play 2 blue. Use bribe to flip Barbarians in Asia to inactive. Use influence to try to place governor in Italy. Geth, roll 3d6h3 for Taking the Throne! I Rightfully claim my title (with 4 troops in the capital I needed 4 less success to take it), than with my 13 political influenece I take a 3 pt card for each color (3+4+5, waste last point). @stever777 Support Check Phase-1 support in each of your provinces containing a Rival Emperor, active barbarians and/or an enemy army in the capital. If Emperor, -1 support to Italia if a Pretender or Rival Emperor is on the map. N/A Expand Pretender Empire PhaseProvinces you govern with a support level of 3+ adjacent to your Pretender Empire join it. N/A Gain Legacy PhaseGain Legacy for governed provinces, improvements and being Emperor or Pretender. Take Actions PhasePlay cards from your hand and spend influence points to perform any combination of actions in any order you wish. You may choose the same action multiple times, if you can afford to pay the necessary influence points. Oops! We have a problem here. You can't add a legion to an army in a province you don't govern. Please redo that 4-red points part of your turn. The place governor in Italy still succeeds, as 3 votes were needed and attained.@Preda Actually, we'll just assume you added the 4th legion after you became Emperor. The results are the same. Support Check Phase-1 support in each of your provinces containing a Rival Emperor, active barbarians and/or an enemy army in the capital. If Emperor, -1 support to Italia if a Pretender or Rival Emperor is on the map. N/A Expand Pretender Empire PhaseProvinces you govern with a support level of 3+ adjacent to your Pretender Empire join it. N/A Gain Legacy PhaseGain Legacy for governed provinces, improvements and being Emperor or Pretender. Take Actions PhasePlay cards from your hand and spend influence points to perform any combination of actions in any order you wish. You may choose the same action multiple times, if you can afford to pay the necessary influence points.
{ "pile_set_name": "Pile-CC" }
Save Diet, lifestyle outweigh genetic impact on gut microbiome Genetics play a surprisingly minor role in shaping the gut microbiome, while environmental factors like diet and lifestyle appear to have the greatest impact, according to new research published in Nature. These findings provide strong new evidence supporting the concept of modifying the gut microbiota to improve human health, investigators from the Weizmann Institute of Science in Israel concluded. “We cannot change our genes, but we now know that we can affect — and even reshape — the composition of the different kinds of bacteria we host in our bodies,” study investigator Eran Segal, PhD, of the departments of computer science and applied mathematics, and molecular cell biology at Weizmann, said in a press release. “So, the findings of our research are quite hopeful; they suggest that our microbiome could be a powerful means for improving our health.” To test the hypothesis that differences in gut microbiota composition between individuals is largely determined by their genes, Segal and colleagues analyzed genotype and microbiome data from 1,046 healthy Israelis who participated in a longitudinal nutrition study. As the Israeli population is highly diverse, the study included participants with varied genetic ancestry, making this setting ideal for the genetic aspect of the study, investigators noted. They found that the gut microbiome did not significantly correlate with genetic ancestry, and that an individual’s genes play only a minor role in determining their gut microbiota composition, accounting for just about 2% of the variation observed between populations. Genetics play a surprisingly minor role in shaping the gut microbiome Photo Source: Shutterstock.com Further, they found genetically unrelated people who lived in the same household showed significant similarities in gut microbiota composition, while relatives with no history of living together shared no significant similarities in their microbiomes. In contrast, they found that environmental factors like diet, drugs and anthropometric measurements accounted for more than 20% of the gut microbiota variation observed between individuals. They also showed that gut microbiome composition was as good or superior to genetics for predicting clinical measures like BMI, fasting glucose levels, glycemic status, high-density lipoprotein levels, cholesterol, waist and hip circumference, waist-hip ratio and lactose consumption. “Our results demonstrate that the gut microbiome is predominantly shaped by environmental factors, and is strongly correlated with many human phenotypes after accounting for host genetics,” Segal and colleagues concluded. This suggests that modulating the microbiome to improve clinical outcomes should work across diverse genetic backgrounds, they added. – by Adam Leitenberger Disclosures: The authors reported no relevant financial disclosures.
{ "pile_set_name": "OpenWebText2" }
Body found believed to be that of missing Chesterfield man John Lowe A body has been found in woodland, which is believed to be that of missing Derbyshire man John Lowe. Mr Lowe, 68, was last seen at his house in Sycamore Avenue, Chesterfield, on Tuesday, October 4. READ MORE: Concern grows for missing diabetic man John Lowe A police spokesman said: "The body of a man found in Hasland is thought to be that of missing man John Lowe. "A body was discovered in a wooded area off Ingleton Road yesterday afternoon (Sunday, October 9). Formal identification is yet to take place. The death is not being treated as suspicious." IN OTHER NEWS: Killer... read more Related news Police are increasingly concerned for a missing Northampton man who has not been seen since he left home in the early hours of yesterday morning. Callum Denham, 21, of Landcross Drive, Abington Vale, was last seen at home at 1am on Tuesday (December... A body, believed to be that of missing teenager Emmerson Thompson, has been found in Northampton this afternoon, police have said. The 15-year-old was has been missing since Friday and extensive searches of Northampton have been carried out today.... Police believe a body found in a Nottinghamshire churchyard at the weekend is that of a missing Leicester man. Officers believe the body is that of 45-year-old John Douglas, who was reported missing from home in Leicester on Saturday. The death is not... Concerned Derbyshire police officers are appealing for help in tracing a missing insulin-dependent man, who is not thought to have his medication with him. Officers said today that John Lowe, 68, who is diabetic, was last seen at his home in Sycamore... The body was found on land between Burrows Court and Rossington Road, Sneinton, yesterday after concerns were raised for the safety of a Nottingham man who had not been seen for several weeks. Police said the death was being treated as... A 64-year-old man has been arrested on suspicion of manslaughter following the discovery of a 38-year-old woman’s body in the back of a car. Police were called to Abbey Road in Roade at about 12.40pm yesterday (Saturday). East Midlands Ambulance...
{ "pile_set_name": "Pile-CC" }
On january 10, Buzzfeed posted a story under the byline of Ken Bensinger, Mark Schoofs and Miriam elder titled “these reports Allege Trump Has Deep Ties To Russia” and posted a link to a document alleging, among other things, that russia has been cultivating trump for 5+ years, that trump has been in constant contact with the kremlin for information on his opponents, and perhaps most inflammatory, that there are many recorded instances of blackmail of trump in sexual misconduct. A prominent claim is that trump rented the presidential suite of the Ritz Carlton Hotel in moscow, where he knew that the Obamas had slept in; he them hired a number of prostitutes to perform a 'golden shower' (pissplay) on the bed and in the room. https://www.buzzfeed.com/kenbensinger/these-reports-allege-trump-has-deep-ties-to-russia?utm_term=.jdyKR56pj#.skw2lK8Nd https://assets.documentcloud.org/documents/3259984/Trump-Intelligence-Allegations.pdf Noted #nevertrump voice Rick Wilson later commented on twitter, stating that the report “gave a new meaning to Wikileaks” (https://twitter.com/TheRickWilson/status/818982395202379777) and that the report was the reason everybody was fighting so hard against the election of Trump. (https://twitter.com/TheRickWilson/status/818983514335047680) The remarkable thing? It's all fake. And not only fake; it's a prank perpetuated by 4chan, on Rick Wilson himself. A post on 4chan on october 26 stated “mfw managed to convince CTR and certain (((journalists))) on Twitter there'll be an October surprise on Trump this Friday” along with a picture of a smug face with a hash name. http://archive.4plebs.org/pol/thread/94704894/#94705224 on november 1, a person without a picture but is assumed to be the same person posted “So they took what I told Rick Wilson and added a Russian spy angle to it. They still believe it. Guys, they're truly fucking desperate - there's no remaining Trump scandal that's credible.” https://archive.4plebs.org/pol/thread/95568919/#95571329 on january 10, moments after the story broke and began to gain traction on social media, a person with the same smug grin face, and the same hash title for the picture, stated “I didn't think they'd take it so far.” http://boards.4chan.org/pol/thread/106514445#p106520376
{ "pile_set_name": "OpenWebText2" }
Q: Creating form with fieldset legend is generating errors I am experiencing some issues when trying to generate a form using 'inputs' <?php echo $this->Form->create('Post'); echo $this->Form->inputs(array( 'legend' => 'Personal information', 'name', 'nickname', 'age', 'email')); echo $this->Form->inputs(array( 'legend' => 'Employment information', 'company', 'started_work', 'description')); ?> Output: Warning (2): array_keys() expects parameter 1 to be array, null given [CORE\Cake\View\Helper\FormHelper.php, line 848] When i remove $this->Form->create('Post'); it generates succesfully, but it does not have the output... A: Have you double-triple-checked that: a) your Post.php model exists and is named correctly b) your posts table exists in your database c) your app is connecting to the database OK? The error is coming when the FormHelper calls the '_introspectModel' method, and returns null. The _introspectModel method is supposed to return info about the fields in the model and so on. But, if it can't retrieve the information it needs from the model, then it'll return null rather than an array. So that's what's causing the error you're getting. Double check everything related to your Post model, and if you still can't fix the error, update your question and paste the code from your Post model.
{ "pile_set_name": "StackExchange" }
 Microsoft Visual Studio Solution File, Format Version 10.00 # Visual Studio 2008 Project("{F184B08F-C81C-45F6-A57F-5ABD9991F28F}") = "ServiceManager", "ServiceManager.vbproj", "{FC9A8347-24B8-496F-A7FB-E71106F5E3AA}" EndProject Global GlobalSection(SolutionConfigurationPlatforms) = preSolution Debug|Any CPU = Debug|Any CPU Release|Any CPU = Release|Any CPU EndGlobalSection GlobalSection(ProjectConfigurationPlatforms) = postSolution {FC9A8347-24B8-496F-A7FB-E71106F5E3AA}.Debug|Any CPU.ActiveCfg = Debug|Any CPU {FC9A8347-24B8-496F-A7FB-E71106F5E3AA}.Debug|Any CPU.Build.0 = Debug|Any CPU {FC9A8347-24B8-496F-A7FB-E71106F5E3AA}.Release|Any CPU.ActiveCfg = Release|Any CPU {FC9A8347-24B8-496F-A7FB-E71106F5E3AA}.Release|Any CPU.Build.0 = Release|Any CPU EndGlobalSection GlobalSection(SolutionProperties) = preSolution HideSolutionNode = FALSE EndGlobalSection EndGlobal
{ "pile_set_name": "Github" }
Premier League Week 27 Preview February 25, 2016 • Saturday 27th February 15.00 Leicester v Norwich Welcome back to the Circus. After a weeks break, it’s time for the last lap of the season. It is crunch time for both these teams but for very different reasons. Leicester, in their second season back in the EPL, have a chance to do the near-impossible and win the league outright. Norwich, may well go right back down from whence they came. It is a Janus faced situation with the Foxes grinning wildly whilst the Canaries’ countenance is fixed with a fear of heading back down the mine. With no FA Cup action to distract them last weekend, Claudio Ranieri decided to give his table-topping charges the week off to recharge their batteries in whatever way they saw fit before the final charge to the line. The manager is exuding an air of calm and positivity which is surely born of his long experience in the game; experience that tells him just how unlikely the situation his team faces is and crucially that they should enjoy the ride without questioning it. This is not the time for a sober evaluation of their achievements thus far. Which likely stands in stark contrast to the mental anguish Norwich manager Alex Neil must be dealing with as he struggles to find a formula to arrest their slide toward doom. They have just ten points from their last ten games and sit even on points with 17th placed Newcastle. When you’re sharing a ledge with this Newcastle team, you know things aren’t going well. The only thing that stands in Norwich’s favour is that they might, just might, have a slim chance of catching Leicester cold. Whilst the Foxes where off sunning themselves in warmer climes, it’s highly likely that Alex Neil was running an extended boot camp, the sole focus of which being this match against the league leaders. If Norwich can get out of the blocks quickly and post an early score, they might just unnerve Leicester enough to grab something from this match. Now, with the proviso that Leicester are rightly adjudged by the bookies and anyone with a modicum of common sense to be the favourites to win this match, this column will step once more unto the breach of idiocy and swim against orthodoxy by plumping for a draw. Why? Because we’re stupid like that. BetFred has 7/2 for the draw. Sunday 28th February Manchester United v Arsenal Good god, will someone from Utd just say something?! This constant will he/won’t he regarding manager Louis van Gaal’s fixity of tenure is doing this column’s nut in. If Ed Woodward would just issue a statement regarding the Dutch man – something as simple as confirming he’s there until the end of the season – it might manage to suffocate to some degree the emulsified horse offal that is passing for journalism in so many of the papers recently. Having said that, this sideshow is mildly more entertaining than anything the footballers have managed recently. The bar has shot very low for this tottering giant. Utd’s last encounter in the league saw them beaten by Sunderland of all teams. Following that they were beaten away from home in the Europa League by some Danish people called Midtjylland. A restorative victory over a tame Shrewsbury in the FA Cup might have lifted some of the pressure surrounding the manager and his dreary men but a defeat here would surely see all previous angst quickly restored with the attendant calls for van Gaal’s head to be swapped for Mourinho’s, a truly terrible spectre. A slight steadying of the ship for Arsenal has seen the Gunners climb to within two points of the summit. One wonders whether their confidence took a rattling after their entirely unavoidable loss to Barcelona midweek but it can be said for certainty that they have lost Oxelade-Chamberlain to injury after his shin bent in a manner that you’d rather not see, Luckily for Arsenal, with Wellbeck back from injury and Joel Campbell having proven his worth of late, they are well stocked in that area. The question, as always with Arsenal, is do they have the mental fortitude to take this gilt-edged opportunity to put one over on Utd and announce themselves as genuine title contenders for the season’s run in? Rarely has a team spoken so often about the mental strength within the dressing room only to be cruelly exposed time and again afterwards. If it were down to skill and tactical ability alone, then Arsenal would be a shoe-in for this match but they always come with the same baggage of imponderables. And it is on the basis of their superiority over Utd in nearly every aspect that this column will back the Gunners for a win here. Utd just don’t seem to working at all as a team recently and it’s difficult to see from which hat they might pull a trick. It is Arsenal and so there is always a bonus trick somewhere that they can avail of but it just feels highly unlikely that they will. The best price for an Arsenal win can be found with MarathonBet at 13/8. 14.05 Tottenham Hotspur v Swansea Speaking of teams looking to make a big statement, you very much get the felling that after a season of stalking the front runners, now is the time for Spurs to kick on. Level on points with Arsenal in 2nd and only two points off the pace, over the last ten games Spurs are clear leaders in the form table having only dropped five points. This is the form of champions. Whilst they were beaten by Palace in the FA Cup ficture, it is unlikely to bother them too much as their schedule is heavy enough as is. In fact, the greatest threat that they face is likely their demanding run of games in both the EPL and the Europa League. Decreasing energy levels coupled with a choice injury or two might spell trouble for the London club. Pochettino, however, has been very judicious in his squad rotation and his clever management of personnel might be enough for them to successfully compete on both fronts. Given how turbulent the final months of Garry Monk’s reign at Swansea were, it is remarkable how well they have picked up in form after the appointment of new manager, Francesco Guidolin. Whether this swing in fortunes is down to the Italian’s rapid input, the players reacting positively to the new boss or both, they have picked up a respectable eight points from their last five games and are showing definite signs of recovery. There can of course be no complacency as they are still just three points above the relegation zone but running concurrently with their good form is the largely awful form of those below them. One of Swansea’s biggest problems coming into this match is their lack of firepower up front. In their last five games, they have only once scored more than a single goal with most of them coming from their Icelandic whizz, Sigurdson. Unfortunately for them, they are coming up against the meanest defense in the league and will have to make the most of every opportunity they get, should they get any at all. It’s unlikely that Spurs will approach this game in any other way than how they usually do – press high, hunt in packs, win back possession and attack. They will not make life easy for Leon Britton and the Swansea midfield and will look to harry them at every opportunity. It will be interesting to note, however, if tiredness does become a factor for them after the 70 minute mark but even so, they should have enough in the tank to account for the visitors. The best price for a Spurs win is 12/25 from SportingBet.
{ "pile_set_name": "Pile-CC" }
You Win Or You Die (Season 1, Episode 7, Game of Thrones) Facts, truths and opinions as well as honor, rights and opportunism are the motivating factors in You Win Or You Die. Just as the attempted assassination of Bran Stark has had a myriad of consequences, so will the attempted assassination of Daenerys Targaryen. Much plotting, much positioning and a hunting mishap all serve to heighten the action in this episode. “A lion doesn’t concern himself with the opinion of the sheep.” Thus far, we have only heard of Tywin Lannister. Now, in the seventh episode, in the opening scene, we are introduced to him, every bit the force to be reckoned with, as others have described. In a casting decision every bit as brilliant as Sean Bean playing Ned Stark, Charles Dance portrays the patriarch of House Lannister – confident, powerful, and demanding. Jaime reads the summons sent by Ned Stark, as Lord Tywin Lannister dresses a stag (which is rich with symbolism as the sigil of the Baratheons is a stag). Lord Tywin gives Jaime a dressing down – it’s time to become the man he was meant to be. Clearly, Lord Tywin doesn’t place much stock in the honor of serving among the Gold Cloaks. Tywin gives Jaime 30,000 men and orders to attack Riverun (Catelyn Stark’s childhood home) in retribution for taking Tyrion. (The dialogue is linked here, you’ll need to scroll down just a bit – read the dialogue first, and then watch the video snippet below. It really demonstrates how talented these actors are and how deftly they depict the relationship between Jamie and his father in a few short lines.) “I know the truth Jon Arryn died for…” Back in King’s Landing, Ned meets with Cersei to let her know that when Robert returns from his hunting trip, Ned will reveal the truth Jon Arryn died for. The always-honorable Ned tells her to take her children and flee. He is clearly unaware of who has the upper hand. Cersei reveals to the audience that during the rebellion, Ned could have taken the Iron Throne. She tells Ned he made a mistake in not taking the throne when he could have. She also confesses that in the beginning she worshipped Robert but couldn’t compete with the memory of Lyanna Stark. “I should have spent more time with you. Shown you how to be a man.” These are the words King Robert utters to Joffrey on his deathbed, Robert having been gored by a boar in the hunt. I wonder how much time Robert has spent with Joffrey. We’ve seen Robert torment Jaime and Lancel. His treatment of Cersei is awful (even Ned is put off by it). As early as the visit to Winterfell, he insisted on seeing Lyanna’s tomb immediately and later at the banquet, he flirted with serving girls in front of Cersei (publicly humiliating her) and in the last episode struck her. Joffrey has certainly witnessed at least some of this behavior. But it’s fascinating that with all the strong men in his life and bloodline (he’s the grandson of Tywin), he’s not adopted any of their better characteristics. Robert sends Joffrey away after throwing in “I wasn’t meant to be a father” and meets with Ned alone to share his dying wishes. Robert asks Ned to grab the pen and paper and dictates his final wish that Ned serve as Lord Regent, Protector of the Realm, until Joffrey reaches legal age. However, Ned writes “rightful heir” rather than “my son Joffrey” as Robert specifically said. Who says: “My brother was a fool, I know, but he was the rightful heir to the seven kingdoms.” Renly Baratheon Daenerys Targaryen Jon Snow Tyrion Lannister None of the above The answer is Daenerys. Even though Robert has given Ned permission to call off the assassination of Daenerys, Lord Varys tells Ned that it is too late. Ser Jorah receives word from Lord Varys that, in exchange for the information about Daenerys he has shared with the Small Council, he has received a royal pardon and may return home. Having a change of heart due to his growing feelings for Danerys, Ser Jorah thwarts the attempt to kill her. Equally as dramatic is that, a heretofore indifferent, Khal Drogo, upon hearing of the attempt on her life, pledges to cross the Narrow Sea with his khalasar and take the Iron Throne. “That didn’t matter when you rebelled against the Mad King” Both Renly and, later, Littlefinger approach Ned with the idea of taking control with the end game being for Renly to become king. Littlefinger has what appears to be solid plan of moving forward with the idea of making Joffrey king when he comes of age, but having Ned rule the realm. And, if Joffrey becomes a problem later, reveal the truth that Jon Arryn and Ned discovered, and install Renly as king. Ned, stubbornly insists that Stannis is the rightful heir, but asks for Littlefinger’s help in getting the Gold Cloaks to side with Ned, should Cersei and Joffrey fail to leave peacefully. Ultimately, Littlefinger turns on Ned, and the Gold Cloaks protect Cersei rather than Ned. But, the question lingers, would Littlefinger have delivered to the Gold Cloaks to Ned (had Ned agreed to his strategy), or was Littlefinger setting him up by suggesting the strategy, and in rejecting it, Ned made it easier for Littlefinger to get him out of the way? Sigil Notes: Lion (Lannister) Given what Tywin has to say about family and the Lannister name, it occurs to me that it’s odd that neither Jaime nor Tyrion is married. The Lannisters are the most interesting house in the Seven Kingdom’s. Cersei seems to be the most gifted Lannister – good looks, intelligent, politically astute and only limited by the fact that she’s a woman in a world that severely limits women. No Tyrion in this episode! Last we saw him, he and Bron were leaving the Eyrie on foot and with no gold. Dire Wolf (Starks) Ned is the only Stark we see in this episode. Ned’s household guards get smaller and smaller. It was sad to lose Jory in The Wolf and the Lion. Jory is Ser Rodrik Cassel’s son. So the Cassel’s have been a part of the Stark house for at least two generations. Dragon (Targaryen) While it’s nice to see the Khal and Khaleesi in love and awaiting the joyous arrival, I’m jolted periodically by remembering what it would mean for the poor people of Westeros if the Dothraki do cross the Narrow Sea. The Drogo/Danearys scenes have been slowly developing into a richer story, but I find myself preferring the King’s Landing story line. In the interaction between Osha (the only wildling to survive the attack on Bran) and Theon, we learn how the death penalty is meted out in the Iron Islands. Theon is reminded once again by Maester Luwin of his place in Winterfell. And, even Osha takes a jab at him. The Black (Night’s Watch) Hurray! Dire Wolf appearance! After Jon Snow and Sam take their vows, Ghost finds a dismembered hand (symbolic of Ned?) and brings it to Jon. Like father, like son when it comes to Jon Snow and Ned Stark. Not seeing the forest for the trees, Jon is upset at being assigned to steward duty. But as Sam points out, it’s steward duty for the Lord Commander, and obviously Jon is being groomed for the bigger and better things.
{ "pile_set_name": "Pile-CC" }
Messages Safe in the Storm It was late in the season when Paul was put on a ship to stand trial before the Emperor. He knew it could get bad. Sometimes, we can see storms looming, and can't do anything to stop it. Yet even when all hope seems lost, God promises us that we will be safe. DOWNLOADS SHARE SERIES Storm Stories Blue skies, sunny, 80 degrees. There’s a good chance that the morning forecast in heaven is perfect. Here on earth, though, we get freezing rain and all sorts of calamities. Storms in life are inevitable. The first response may be to cry out in fear. But if we have ears, we may discover a surprising peace, a deeper wisdom, and a more binding love. At first, Jesus doesn’t stop the storm. The disciples are out of their minds, thinking they might die, and want Jesus to rescue them. Instead, Jesus asks about their faith. Some things can only be learned in a storm. Discipleship is mostly on-the-job training. What storms are blowing in your life? One of Jesus' most famous stories concerns the optimist who opts for beachfront property and the pessimist who picks the rock-filled lot. It's been said that things don't always work out the way you plan them. The truth is that they never do. In life, there's a 100% chance of rain. How are you planning for the storms to come? The story of Elijah tells us how kings and kingdoms chase after temporary security and pleasure. Living in such a world can be discouraging. But God is more powerful, and wants more for us than just our comfort and wellbeing. After revealing His presence in the storm, God recommissions Elijah to minister to the world in which he lived. Sometimes life can feel stormy. The account of Jonah is one of the Bible’s most interesting storm stories, when the rebellious prophet is thrown overboard during a storm and swallowed by a great fish in whose belly he lives for three days. When storms break around us there’s a lot to learn.
{ "pile_set_name": "Pile-CC" }
World Oceans Day took place last Thursday. Today, there are about 5,000 more metric tons of plastic waste in the ocean than there were yesterday. That’s about the equivalent of every San Franciscan heading down to Ocean Beach and chucking a 13-pound trash bag full of plastic into the surf every day. Worse, this is only the amount of plastic coming from the world’s ocean-bound rivers, not total output. (Add other outflow sources, like aquaculture, shipping, and direct dumping, and those trash bags get much heavier.) This is all according to a new peer-reviewed paper published in the journal Nature Communications by Ocean Cleanup, the Dutch foundation that has been on a mission to eliminate half of the so-called Great Pacific Garbage Patch by 2020. The Cleanup’s study quantifies, for the first time, global plastic input from rivers into oceans. Lead researcher Laurent Lebreton, along with the Cleanup’s founder Boyan Slat and four other co-authors, looked at 182 countries and 40,760 ocean-bound rivers, crunching data on population density, mismanaged plastic waste, and natural and built drainage patterns around those rivers. They also looked at seasonal patterns, determining the different frequencies of input throughout the year. According to their findings, just 20 of those rivers contribute two-thirds of total plastic input. The worst polluters are the Yangtze, in China, followed by the Ganges, in India. “[The paper] is an important aspect of our trying to get the best possible picture of the problem that we are trying to solve,” Lebreton told me in an email, “and that so far has only been sparsely studied and described.” While the paper’s statistics are staggering, they’re not surprising, given ever-intensifying coverage of the oceans’ plastic crisis. (You’ve heard the one about more plastic than fish by 2050, right?) What was not anticipated is that the Cleanup broached the subject of plastic emissions from rivers at all. [The study]looked at 182 countries and 40,760 ocean-bound rivers, crunching data on population density, mismanaged plastic waste, and natural and built drainage patterns around those rivers. Since 2013, the Cleanup has grown to a staff of 65, which has been focused on Slat’s original vision: a 62-mile-wide boom moored in the Pacific, which would collect plastic flotsam and store it for retrieval and, eventually, recycling. Just last month, the Cleanup completed its most successful ever crowdfunding campaign for the project, raising $21.7 million from high-profile donors like Silicon Valley titans Marc and Lynne Benioff and Peter Thiel. The lucrative 2017 campaign, coupled with the Cleanup’s announcement days later that it would start extracting plastic from the Pacific within the next 12 months—and have half of the Garbage Patch cleaned up in just five years time—reignited criticism [[CRITICISM REP BELOW]] from the scientific community, which has long accused the foundation of approaching the ocean plastics crisis completely wrong. “My criticism has been [the Cleanup’s] lack of pragmatism and willingness to listen to the science and focus on upstream mitigations to solve the problem,” Marcus Eriksen, cofounder of the 5 Gyres Institute and outspoken critic of the Cleanup, wrote in an email to me last week. He was writing in-between events at the Ocean Conference, which was held at the United Nations, in New York. The Cleanup, Eriksen continued, has been “hell-bent on putting that giant net in the middle of the Pacific when most scientists and environmentalists agree it’s not a good idea.” Like most other critics, Eriksen points to microplastics—the broken-down particles of larger plastics that can choke the digestive tracts of birds and fish—which are difficult to capture and largely elude surface boom systems like the Cleanup’s. Eriksen also worries that the Cleanup’s new paper could work against the effort to change the governmental policies on land that are exacerbating the plastic pollution crisis. “There exists the potential that [the plastics industry] will look at this paper and use it to justify blaming the consumer for littering, and cities for not managing their plastic trash, and continue to deflect and reject any conversations about eliminating high polluting throwaway products or regulating smarter design standards.” But, Eriksen concedes, the fact that the Cleanup has acknowledged the problem of plastic pollution sources is a step in the right direction. In response to the question of whether this paper is a direct response to critics like Eriksen, with whom Lebreton has worked in the past, Lebreton said, “We did not need any specific advice to do this. The initial motivation was to work on designing better sources for our oceanic model.” He went on, “For our work to be successful, we need to understand how plastic pollution flows around the world, [and] better mapping its sources is a logical part of that work.” I was reminded of something Slat had told me last June, when I joined him on the North Sea for the launch of the Ocean Cleanup’s first prototype of Slat’s boom. I had asked him about the blowback from Eriksen and others. “It’s not either or,” he had said agitatedly. “We should do both.” So, was anything in the works? Always careful to keep the Cleanup’s plans close to his chest, Slat suggested there wasn’t, which I remember thinking was unfortunate. But, he added, “I think eventually we’ll be able to develop spin-off systems of what we’re doing in the ocean, which can go closer to land, or maybe in rivers.” In fact, at that moment, the paper was well in the works.
{ "pile_set_name": "OpenWebText2" }
{ "images" : [ { "idiom" : "universal", "scale" : "1x", "filename" : "Tools_00065.png" }, { "idiom" : "universal", "scale" : "2x", "filename" : "[email protected]" }, { "idiom" : "universal", "scale" : "3x", "filename" : "[email protected]" } ], "info" : { "version" : 1, "author" : "xcode" } }
{ "pile_set_name": "Github" }
Background ========== Myocarditis can present with a wide range of symptoms, ranging from mild dyspnea to chest pain, cardiogenic shock, and fatal arrhythmia. The main cause of myocarditis is current or recent viral infection \[[@B1]\]. Enteroviruses, specifically Coxsackievirus (CV) group B serotypes, have traditionally been perceived as the predominant viral cause \[[@B2]\], although adenoviruses, parvovirus B19, and human herpesvirus 6 can also cause myocarditis \[[@B3]-[@B5]\]. The pathophysiological progression of viral myocarditis includes three distinct phases \[[@B3]\]. The first phase is characterized by a nonspecific innate immune response, causing virus-mediated cell lysis and the indirect destruction of cardiomyocytes \[[@B3],[@B6]\]. During the second phase, a virus-specific immune response, including CD8^+^ lymphocytes, acts to eliminate the causative viruses, leading to heart failure with the destruction of the infected cardiomyocytes \[[@B3]\]. In the third phase, commonly a few weeks after infection, the destroyed cardiomyocytes are replaced by diffuse fibrosis and progressive biventricular dilatation, resulting in cardiac failure \[[@B1],[@B3]\]. Approximately 50% of patients with viral myocarditis develop chronic myocarditis, and 21% develop dilated cardiomyopathy (DCM) \[[@B7]\]. A longitudinal study reported that the immune clearance of viruses during or after the acute phase of myocarditis correlates with improvements in the left ventricular ejection fraction (LVEF) \[[@B8]\]. In chronic myocarditis or DCM, a persistent viral presence on endomyocardial biopsy (EMB) specimens is associated with an increased mortality rate \[[@B9]\]. However, viral genomic RNA and capsid protein are detectable in EMB specimens in no more than 35% and 10% of cases, respectively \[[@B6]\]. Therefore, the relationship between persistent viral infection and progression from acute myocarditis to chronic irreversible cardiomyopathy is unclear. We present here a rare case of CVA4 infection causing acute myocarditis with concomitant pancreatitis and liver dysfunction. The patient's antibody titers against CVA4 were significantly elevated during the recovery period, and a pathological examination of an EMB specimen showed interstitial infiltration with CD3-positive lymphocytes, despite a normal LVEF on left ventriculography, confirming acute myocarditis. His plasma brain natriuretic peptide (BNP) and serum troponin I (TnI) levels remained elevated. Five weeks after admission, the patient underwent radical low anterior resection for advanced rectal cancer, found by chance. Interestingly, his plasma BNP and serum TnI levels returned to normal after surgery. The patient's clinical course suggests that the immune modulation associated with his rectal cancer and surgery favorably affected his acute myocarditis, preventing its progression to chronic myocarditis or DCM. Case report =========== A 63-year-old man was admitted to our hospital with a three-day history of dyspnea and fatigue, which had gradually increased until he experienced dyspnea and fatigue at rest. He had taken amlodipine (5 mg/day) for hypertension for the preceding five years, but had no other remarkable past history or family history. He was a nonsmoker and did not consume alcohol. Two weeks previously, he had presented with flu-like symptoms, including fever, sore throat, cough, and diarrhea, which had completely resolved within a week. On admission, his height was 168.3 cm, weight 65.0 kg, and temperature 35.8°C. He was hypotensive, with a blood pressure of 72/52 mmHg, but his heart rate was not elevated (61 beats/min). A physical examination revealed cyanosis of the lips, distended external jugular veins, pretibial edema in both legs, coarse crackles over the lower bilateral lung fields, and mild enlargement of the liver. He was obviously short of breath in room air, with blood O~2~ saturation of 93%, partial O~2~ pressure of 61.7 mmHg, and partial CO~2~ pressure of 16.7 mmHg. A chest X-ray showed mild pulmonary congestion and right pleural effusion. Electrocardiography showed atrial fibrillation and an accelerated idioventricular rhythm, suggesting complete atrioventricular block (Figure [1](#F1){ref-type="fig"}). Transthoracic echocardiography showed moderately impaired left ventricular function with diffuse hypokinesis, but no pericardial effusion or enlargement of the right heart. The end-diastolic left ventricular dimension was 56 mm, the end-systolic left ventricular dimension was 44 mm, and LVEF calculated with the Teichholz formula was 42.9%. The interventricular septal thickness was 11 mm and the posterior left ventricular wall thickness was 12 mm. The diameter of the inferior vena cava was increased to 22 mm, with no respiratory variation. Color Doppler echocardiography showed mild tricuspid regurgitation and the estimated pressure gradient between the right atrium and right ventricle was 25.1 mmHg. Laboratory tests showed neutrophil-dominant leukocytosis, liver dysfunction, and renal insufficiency (Table [1](#T1){ref-type="table"}). His serum creatine phosphokinase (CPK) MB isoenzyme, serum TnI, and plasma BNP levels were markedly elevated. Abdominal ultrasonography showed no abnormalities, other than moderately dilated hepatic veins. Coronary angiography was not performed because of the patient's reduced renal function. The patient developed hemodynamically significant bradycardia (28 beats/min) soon after admission, and a temporary transvenous pacing wire was placed in the right ventricle. ![**Electrocardiography on admission.** Electrocardiography showed atrial fibrillation and an accelerated idioventricular rhythm (62 beats/min), suggesting complete atrioventricular block.](1743-422X-11-3-1){#F1} ###### Laboratory findings on admission ***Hematology***   **Normal range** ------------------------------------------- -------------------- --------------------------------- White blood cells\* 13700/mm^3^ 3300 -- 9000/mm^3^ Red blood cells 467 × 10^4^/mm^3^ 430 -- 570 × 10^4^/mm^3^ (Male) Hemoglobin 13.6 g/dl 13.5 -- 17.5 g/dl (Male) Hematocrit 41.3% 39.7 -- 52.4% (Male) Platelets 29.3 × 10^4^/mm^3^ 14.0 -- 34.0 × 10^4^/mm^3^ ***Differential white blood cell count***     Segmented neutrophils\* 70.0% 34.0 -- 70.0% Band cells, stab cells\* 15.0% 1.0 -- 7.0% Eosinophils 1.0% 0 - 8.0% Monocytes 5.0% 2.0 -- 10.0% Lymphocytes\* 9.0% 18.0 -- 49.0% ***Biochemistry***     Total protein\* 6.2 g/dl 6.7 -- 8.3 g/dl Albumin\* 3.4 g/dl 3.8 -- 5.2 g/dl AST\* 2660 IU/l 10 -- 40 IU/l ALT\* 2037 IU/l 5 -- 45 IU/l LDH\* 3307 IU/l 120 -- 240 IU/l ALP\* 793 IU/l 100 -- 325 IU/l γ-GTP\* 197 IU/l 10 -- 50 IU/l Total bilirubin\* 1.7 mg/dl 0.2 -- 1.2 mg/dl Direct bilirubin\* 1.0 mg/dl 0 -- 0.4 mg/dl CPK\* 978 IU/l 60 -- 270 IU/l CPK-MB\* 231 ng/ml \< 5.2 ng/ml Blood urea nitrogen\* 63.4 mg/dl 8.0 -- 20.0 mg/dl Creatinine\* 3.01 mg/dl 0.61 - 1.04 mg/dl Sodium 141 mEq/l 135 -- 145 mEq/l Potassium 3.8 mEq/l 3.5 -- 5.0 mEq/l Chloride 106 mEq/l 98 -- 108 mEq/l Calcium 8.4 mg/dl 8.4 -- 10.4 mg/dl Phosphorus 3.1 mg/dl 2.5 -- 4.5 mg/dl Glucose 99 mg/dl 70 -- 109 mg/dl C-reactive protein\* 5.50 mg/dl \< 0.30 mg/dl BNP\* 4806 pg/ml \< 18.4 pg/ml Troponin-I\* 28.4 ng/ml \< 0.04 ng/ml ***Blood coagulation test***     PT-INR\* 2.19 0.85-1.15 ***Serology***     HBsAg Negative Negative HCV-RNA Negative Negative IgM anti-HAV Ab Negative Negative Anti-HIV Ab Negative Negative \*These values are outside the normal ranges. *Abbreviations:AST* aspartate aminotransferase, *ALT* alanine aminotransferase, *LDH* lactate dehydrogenase, *ALP* alkaline phosphatase, *γ-GTP* gamma-glutamyltranspeptidase, *CPK* creatine phosphokinase, *BNP* brain natriuretic peptide, *PT-INR* international normalized ratio of prothrombin time, *APTT* activated partial thromboplastin time. The intravenous administration of dopamine (10 μg/kg/min), unfractionated heparin (15,000 units/day), and furosemide (20 mg/day) was begun on the day of admission. The patient's systolic blood pressure increased to about 120 mmHg and stabilized. The low-dose intravenous administration of human atrial natriuretic peptide (0.025 μg/kg/min) was begun on day 2. Nonsustained monomorphic ventricular tachycardia lasting for about 1 min was observed several times on day 2, but had no significant hemodynamic impact, and was effectively treated with an intravenous bolus injection of amiodarone (150 mg). On day 3, the patient's atrioventricular conduction returned to normal and his daily urine output increased to 3500 mL/day. On day 4, echocardiography showed an improvement in LVEF to 55.2% and the temporary pacing wire was removed. His serum CPK levels peaked on day 4 at 3229 IU/L. On day 7, a chest X-ray showed resolution of the right pleural effusion and his serum creatinine level returned to normal (0.98 mg/dL). The intravenous administration of human atrial natriuretic peptide was stopped, and the patient commenced a regimen of oral losartan (25 mg/day), spironolactone (12.5 mg/day), azosemide (30 mg/day), and warfarin (3.0 mg/day). Supplemental oxygen was no longer needed. The patient's liver dysfunction improved after admission. His aspartate aminotransferase (AST) level peaked on day 2 (7752 IU/L) and his alanine aminotransferase (ALT) level peaked on day 3 (5899 IU/L) (Figure [2](#F2){ref-type="fig"}). His biliary enzyme levels and total bilirubin also increased, but not as much as his AST and ALT levels. His prolonged prothrombin time returned to normal on day 7. However, he complained of epigastric pain on day 5, and laboratory tests showed increased serum and urine amylase levels. Abdominal computed tomography showed swelling of the pancreatic body and tail, with increased retroperitoneal adipose-tissue density, suggesting pancreatitis (Figure [3](#F3){ref-type="fig"}). No cholelithiasis or tumor occluding the common bile duct or pancreatic duct was observed, and his plasma immunoglobulin G4 level was normal. We administered intravenous gabexate mesilate (600 mg/day) and ceftriaxone (2 g/day) from day 5 to day 12. The patient's abdominal symptoms resolved after a few days, and he recovered without complications. A small amount of melena was observed on day 8, and a total colonoscopy was scheduled. Both his liver dysfunction and pancreatitis had resolved by day 14. ![**Clinical course of the patient after admission.** Levels of serum aspartate aminotransferase (AST; diamonds), alanine aminotransferase (ALT; squares), and creatinine phosphokinase (CPK; triangles) were high. The AST level peaked on day 2, ALT on day 3, and CPK on day 4. The levels of brain natriuretic peptide (BNP) and troponin I (TnI) were highest at admission and subsequently decreased, but did not return to normal. The gamma-glutamyl transpeptidase (*γ*-GTP) level was moderately elevated during hospitalization. The serum creatinine level returned to normal by day 7.](1743-422X-11-3-2){#F2} ![**Abdominal computed tomography (CT) on day 5.** Abdominal CT to investigate the cause of epigastric pain showed localized swelling of the pancreatic body and tail, with no cholelithiasis or tumor obstructing the common bile duct or pancreatic duct, suggesting idiopathic pancreatitis.](1743-422X-11-3-3){#F3} Cardiac catheterization on day 16 showed normal pressure data and a normal cardiac index (3.2 L/min/m^2^). Coronary angiography and left ventriculography showed no abnormalities and normal LVEF (64.2%). A pathological examination of an EMB specimen of the left ventricle showed necrotic cardiomyocytes adjacent to areas with interstitial infiltration of CD3-positive lymphocytes (Figure [4](#F4){ref-type="fig"}A--D), confirming acute myocarditis. The antibody titer against CVA4 increased from 1:4 on day 1 to 1:256 on day 15. On day 19, his plasma BNP level was 238 pg/mL and his serum TnI level was 0.08 ng/mL, and both these values continued to be slightly elevated thereafter. ![**Histopathological examination of a biopsy specimen from the left ventricle.** Low-power view (× 100) **(A)** and high-power view (× 400) **(B)** of the biopsy specimen obtained from the left ventricle, stained with hematoxylin and eosin, showing lymphocytic infiltration into the interstitium and mild necrosis of the myocardium. Immunohistochemical staining with anti-CD3 **(C)** and anti-CD20 antibodies **(D)**. CD3-positive lymphocytes were predominant.](1743-422X-11-3-4){#F4} A colonoscopy on day 18 showed a protruding rectal lesion above the level of the peritoneal reflection. The plasma carcinoembryonic antigen level was 4.7 ng/mL (normal: 0--4.9 ng/mL) and the cancer antigen 19--9 level was 434.6 U/mL (normal: 0--36.9 U/mL). A pathological examination of a biopsy specimen of the rectal lesion showed a moderately differentiated tubular adenocarcinoma invading the muscularis propria. Transesophageal echocardiography on day 27 showed no signs of left atrial thrombus, and the administration of warfarin was stopped in preparation for surgery. The patient was transferred to the Department of Surgery on day 28, and underwent a low anterior resection on day 35. The postoperative diagnosis was stage II rectal cancer (T3N0M0, Union for International Cancer Control Classification). His postoperative recovery was uneventful, with no complications such as heart failure or arrhythmia. He was discharged on day 45. A histological examination of the surgical specimen showed lymphovascular invasion, and adjuvant chemotherapy with folinic acid, fluorouracil, and oxaliplatin was commenced a month after discharge. Interestingly, his plasma BNP level decreased to less than half the preoperative value (78 pg/mL) and his serum TnI level returned to normal (\< 0.04 ng/mL) three weeks after surgery. His plasma BNP level returned to normal (18 pg/mL) four months after surgery. Oral medications for heart failure were stopped five months after discharge. The patient underwent a partial hepatectomy six months after discharge for a solitary metastasis in the liver, but his myocarditis did not recur. Adjuvant chemotherapy was continued until 12 months after surgery. The patient has now been followed-up for two years, with stable LVEF and no recurrence of myocarditis or rectal cancer. Discussion ========== Coxsackieviruses belong to the genus *Enterovirus*, in the family *Picornaviridae*, and are important viral pathogens, causing myocarditis and pancreatitis. CVs are subdivided according to their pathogenicity in suckling mice aged less than 48 h into CVA, which causes flaccid paralysis, and CVB, which causes spastic paralysis \[[@B10]-[@B12]\]. There are 23 CVA serotypes and six CVB serotypes \[[@B12]\]. Although CVs are known to cause myocarditis, most cases are attributed to CVB serotypes \[[@B6]\]. CVA infection can cause viral myocarditis, but it has a more benign course than CVB myocarditis \[[@B12]\]. Serotypes A4 and A16 have been most frequently implicated in the rare cases of CVA-associated myocarditis reported \[[@B13]\]. Combined myocarditis and pancreatitis arising from CV infection is very rare, with only three previously reported cases, which were all attributed to CVB infection \[[@B14],[@B15]\]. Ischemic pancreatitis was unlikely in our patient because of the late disease onset (day 5) and hemodynamic stability after admission. Moreover, although we did not stop any medications, including diuretics, the patient's pancreatitis improved spontaneously. Therefore, it is more likely that his pancreatitis developed from his CV infection. To our knowledge, this is the first reported case of an adult patient with myocarditis and pancreatitis attributable to CVA infection. It is unclear why combined myocarditis and pancreatitis is uncommon in CV-infected humans. In a mouse model, the viral titer was higher in the pancreas than in the heart, liver, or spleen during the early stage of CVB infection \[[@B16]\]. In humans, CVB3 capsid protein VP1 was detected in both the cardiomyocytes and islets of endocrine cells in patients who died of acute CVB myocarditis \[[@B17]\]. These results suggest that the rate of latent or asymptomatic pancreatitis may be higher than previously thought in patients with myocarditis attributable to CV infection. The course of our patient's myocarditis is interesting. Although his LVEF on echocardiography improved soon after admission and normalized on left ventriculography by day 16, an EMB specimen on the same day still showed prominent T-lymphocyte infiltration with a slightly elevated serum TnI level. His serum TnI level had returned to normal three weeks after surgery, and his plasma BNP level had also decreased at this time. This suggests that resection of the rectal cancer may have resulted in the improvement of his myocarditis and inhibited any progression to chronic myocarditis or DCM. The patient's normal LVEF during the two-year follow-up supports this conjecture. The relationship between persistent viral infection and the establishment of chronic myocarditis is controversial. A recent study reported that regulatory T cells (Tregs), which are positive for CD4, CD25, and Foxp3, reduced viral titers and suppress cardiac damage in CVB-infected mice \[[@B18]\]. Furthermore, the myocardial Treg frequency was reduced during the course of CVB3 myocarditis in BALB/c mice and the adoptive transfer of Tregs resulted in the significant amelioration of cardiac fibrosis \[[@B19]\]. Tregs maintain immunohomeostasis and limit autoimmunity, but there may be high levels of Tregs in the blood and tumor tissues of cancer patients, leading to the suppression of antitumor immunity \[[@B20]\]. The proportion of Tregs is significantly higher in colon cancer patients than in healthy controls, and decreases significantly after the radical resection of the tumors \[[@B21]\]. Increased Treg activity also suppresses CD8^+^ T-cell responses to specific antigens of various viruses \[[@B22]\]. The limitations of our report include our inability to determine the myocardial frequency or activity of Tregs before and after surgery, but our findings suggest that the modulation of the immune response associated with rectal cancer and surgery, including a change in Treg activity, may have contributed to the amelioration of myocarditis in our patient. More specifically, the increased Treg activity associated with rectal cancer may have had an inhibitory effect on his cardiac fibrosis and CD8^+^ T-cell-associated myocardial damage during the acute or subacute period of myocarditis, leading to the benign clinical course of this patient, although the onset of myocarditis per se could not be prevented. However, a point of uncertainty persists because reduced Treg activity after surgery might have exacerbated his myocarditis. Despite this, the patient's myocarditis improved. This suggests that components other than Tregs were involved in the improvement in his myocarditis, such as mesenchymal stromal cells (MSCs), which have been identified in the bone marrow and have unique immunoregulatory and regeneration properties \[[@B23]\]. MSCs reduced myocardial inflammation by reducing the expression of proinflammatory cytokines and inducing an increase in Tregs and CD4^+^- and CD8^+^-T-cell apoptosis in CVB3-infected mice \[[@B24]\]. However, it should be noted that no Treg or MSC activity has yet been reported in patients with chronic myocarditis or DCM. Although our patient's clinical course after surgery included the resolution of his myocarditis, further research is required to clarify the mechanisms involved. Conclusion ========== We have presented a rare case of myocarditis, liver dysfunction, and pancreatitis arising from CVA4 infection in a patient with undiagnosed advanced rectal cancer. His clinical course was good and his elevated serum TnI and plasma BNP levels returned to normal over four months after the radical resection of his rectal cancer. These features suggest that changes in the immune response to myocarditis that were associated with the patient's rectal cancer may have had a favorable effect on his myocarditis, thereby preventing the progression of acute myocarditis to chronic cardiomyopathy. Consent ======= Written informed consent was obtained from the patient for publication of this case report and any accompanying images. A copy of this written consent is available for review by the Editor-in-Chief of this journal. Abbreviations ============= CV: Coxsackievirus; EMB: Endomyocardial biopsy; LVEF: Left ventricular ejection fraction; BNP: Brain natriuretic peptide; TnI: Troponin I; CPK: Creatine phosphokinase; AST: Aspartate aminotransferase; ALT: Alanine aminotransferase; DCM: Dilated cardiomyopathy; MSC: Mesenchymal stromal cell; Treg: Regulatory T cell. Competing interests =================== The authors declare that they have no competing interests. Authors' contributions ====================== NA drafted the manuscript. NH and TH collected the patient data and monitored the patient throughout the whole follow-up period. KH, YK, and SS edited the manuscript. MK participated in the study design and coordination and helped to draft the manuscript. All authors have read and approved the final manuscript. Acknowledgements ================ The authors would like to thank Mr. Yousuke Kitadume for his assistance in preparing the pathological tissue specimen and Miss Hisae Kuribara for her secretarial assistance under the financial support provided by Social Insurance Gunma Chuo General Hospital.
{ "pile_set_name": "PubMed Central" }
DENVER—“In five years, everyone will know the Earth is flat,” Scott Simons tells me as we wait in line for the second annual Flat Earth Conference. Scott, holding the Utah license plate “ITSFLAT,” is explaining how the Flat Earth revolution will bring “societal collapse” because the bulk of our knowledge comes from Round Earth institutions. “It’s globalism,” his wife Julie interjects. The term, a favorite of President Donald Trump, has become an anti-Semitic euphemism, attached to a far-right conspiracy about Jews controlling the world. I make what must be a funny face, because Julie tries to clarify. “Globalism,” she repeats, and draws a circle with her hands to illustrate. Ah. Globe. Yes. Thousands of years after ancient Greeks began referencing Earth as a sphere in mathematical proofs, people who believe in a flat Earth have become a movement. They’ve found their voice in the disinformation age, fueled by YouTube videos. For true believers, it’s more than just a conspiracy theory. It’s whole world view, a level plane onto which hucksters, trolls, and Christian fundamentalists can insert their own ideologies. In an age of rising conspiracy theories—voter fraud, QAnon, anti-vaxxers, chemtrails—Flat Earth might be the most foundational conspiracy theory of them all. Under the Dome The conference that drew hundreds took place Thursday and Friday at the Crowne Plaza, a Denver airport hotel and convention center. It’s located on an unfriendly bit of highway, so few of us leave, opting instead to mill about in this enclosed world of hotel and restaurant and conference center. At the hotel bar, a Flat Earther tells me about the supposed nonexistence of certain intercontinental flights, two of which I have personally taken within the past four years. It seems incredibly easy, even natural, to go insane here. Both clocks in my hotel room are an hour ahead, even though Daylight Saving Time ended 11 days ago. Someone keeps walking around whistling the theme music to Westworld, the TV show about a fake world inside a dome. Not even the whole song, just the opening bit over and over, around and around the place. Eventually I Google “time in Denver” to confirm my phone is in the correct time zone. It is. Of course it is. There’s a persistent needling at reality. Conference organizers have been teasing a surprise guest, a real A-lister. He appears on stage the second morning. It’s Logan Paul, the mega-popular YouTuber and prankster who last year gained notoriety for making a video of a dead man in Japan’s “Suicide Forest.” “I consider myself a man of truth, someone who hates being ignorant,” Paul tells the crowd, spouting off some stats about the moon landing. “I guess I’m not ashamed to say my name is Logan Paul and I think I’m coming out of the Flat Earth closet.” He ends his address with a mic drop. Conference organizer Robbie Davidson returns to stage, excited. He wants to impress on the audience “the magnitude of what Logan Paul represents. He has 18 million subscribers on YouTube.” The crowd goes “ohhhh!” “He has over four billion views on his videos.” The crowd breaks into cheers and applause. “This is the first step: someone with a very big following putting their name on the line and saying ‘you know what, I’m almost there. There’s a lot of compelling evidence,’” Davidson says. He says he gave Paul a 30-minute interview for a forthcoming YouTube video on the conference. “I have a very good feeling he’s genuine,” Davidson says. I can say this with confidence: Logan Paul does not believe the Earth is flat. I spoke with him outside the convention center the previous morning, where he tried giving the same Flat Earth stump speech through giggles. “To me it’s just so obvious that obviously the Earth is flat obviously,” Paul tells me. It’s his second attempt at the speech. The first time through, he had to stop for a laugh break. “Facts,” a team member tells him. “That was really solid. That was more compelling than the first time, I think.” They’re filming for their YouTube video. Paul probably doesn’t know it, but he’s part of his own conspiracy theory. In 2016, he starred in a YouTube-produced movie called “The Thinning,” about a dystopian world in which the United Nations kills children as part of a population-reduction project. Truther communities ate it up, and people still post the trailer in Facebook groups for various conspiracy theories. A YouTube Revolution On the first day of the conference, I ask Flat Earthers when they converted. When did they chuck out the globe, renounce outer space as fake, and decide we live on a flat plane covered by a dome? The answer, for most, is three years ago. That’s when some of the movement’s biggest names launched YouTube channels with hours-long videos explaining not so much why the Earth is flat (it isn’t) but why elements of the “globe model” are suspicious, particularly when they clash with a literal reading of the Bible. “August 2015,” Ginny, a California woman tells me. That’s when a friend forwarded her a video series on Flat Earth. “I spent like three nights wide awake and then I was hooked.” This is the real currency in the Flat Earth community. Between speeches, everyone is showing each other YouTube videos on their phones. People reference each other by their YouTube names, and twice when I leave my seat I return to find advertisements for YouTube channels on the chair. A panel on Women in Flat Earth is more of a how-to on running a Flat Earth YouTube channel while female. YouTube wants you watching videos, as many as possible, for as long as possible. It’s the rare conspiracy on which conference-goers and I are in complete agreement. In order to maximize views, the Google-owned video giant recommends videos based on those you already watched. Videos with attention-grabbing titles and hot-button keywords often turn up high in the recommendation algorithm. Start watching videos for less extreme conspiracy theories like 9/11 trutherism or moon landing hoaxes, and YouTube will eventually recommend you a Flat Earth video. Conference speaker Joshua Swift tells me a popular Flat Earth video “woke him up” to the movement. “It came on autoplay,” he says. “So I didn’t actively search for Flat Earth. Even months before, I was listening to Alex Jones.” Unlike most families here, brothers Michael and Daniel Flores are divided on the Flat Earth debate. Mike says it’s flat. Daniel, just tagging along to the conference, says Mike watches too many YouTube videos. “Your YouTube feed is just confirmation bias,” Daniel tells him. “You’re not getting any astrophysicist videos.” “It’s what you look up,” Mike says. “It’s getting reinforced,” Daniel says. Despite the centrality of YouTube algorithms and Facebook discussion groups, a good number of conference-goers believe tech companies are censoring them. Nathan Thompson is the moderator of Facebook’s largest Flat Earth group, with more than 127,000 members. “I’ve never experienced censorship like what I experienced since starting the Flat Earth group… [Facebook] ban me all the time,” he says. “YouTube, they’re removing [subscribers] from channels, stopping your view count to make it look like your video’s not popular.” That his video might be authentically unpopular is out of the question. Someone out there is acting against him, he says. It’s just not clear exactly whom. World War Flat Earth Mike “Mad Mike” Hughes is one of the biggest stars on the Flat Earth scene. His conference exhibit—a limousine he used for a world-record stunt jump, and a homemade rocket he rode this year—occupy the coveted space in the center of the Flat Earth Conference vendor room. A self-taught rocket stuntman who doesn’t believe in science, he’s a hard man to mimic. So why is someone trying to steal his identity? “He’s got a fake website of mine: madmikehughes dot live,” Hughes tells me of a website an impostor set up in his name. “I’m Mad Mike Hughes. He’s selling merchandise on it.” The person has also set up GoFundMe accounts in Hughes’ name. The impostor website solicits donations, advertises Infowars, and claims to be run by a “Tim Ozman.” “ Flat Earth is weird, but this is weird-weird. This is shitposting into oblivion. This is the information equivalent of clear-cutting a forest. ” The trouble is that a cluster of characters in the Flat Earth community all claim to be the same Tim Ozman (or Osman, depending on their preferred spelling). Hughes, who ties the name to a 9/11 conspiracy theory, says the real Tim Ozman is his business partner, Jack. Somewhere in this mess of Tims is a bomb threat and a fake FBI raid. Two months ago, one of the alleged Ozmans uploaded a video accusing Jack of threatening to bomb the Flat Earth conference. In late October, a different YouTube channel claiming to be Ozman uploaded a video purportedly showing an FBI raid on his home in relation to the bomb threat. He claimed the bomb threat was a hoax to silence him. But the footage is originally from a California CBS affiliate and it’s from May. The video is a hoax about the FBI responding to a hoax between warring Flat Earth factions. Hughes says both channels—the one that reported the bomb threat and the one that reported the raid—are fake. I show Hughes a picture of a man I suspect to be Jack/Tim, and Hughes confirms his identity. But that picture comes from footage of a New Mexico town hall meeting, where the man introduced himself as Mark Sargent, a well-known Flat Earth YouTuber who is several decades older. All these men are impersonating each other. Hughes’ table in the exhibition hall is stocked with amateur newspapers authored by Jack/Tim. Most of the broadsheet is a screed against his alleged impersonator, whom he claims has stolen his and Hughes’ identities. Hughes suggests the impersonator is an actor, whom truthers link to conspiracies about the Stoneman Douglas High School shooting. “He hasn’t been beat up yet or taken to court,” Hughes says of the impersonator. But the paper suggests another possible explanation for this intricate web of fraud. Hughes and his Ozman are members of a Flat Earth group that describes itself as “anti-media” “autohoaxers.” “We are the ONLY opposition to the controlled opposition,” the paper says of the group. “Controlled opposition” is a truther term for efforts to undermine conspiracy groups. “Autohoaxers” are a movement that reflexively declares every significant event a hoax, sometimes just for argument’s sake. The group’s manifesto, then, is an appeal to seed confusion and dismantle established facts, in order to let conspiracy run rampant. Days before the conference, I try entering the group’s chat channel on Discord, a messaging app. Before I’m banned (almost immediately, by users who announce “spy!” when I join) I notice most people have adopted near-identical usernames bashing one of the Flat Earth community’s Tim Ozmans. They’ve taken up Fepe, a Flat Earth-specific variant on the alt-right meme Pepe. Flat Earth is weird, but this is weird-weird. This is shitposting into oblivion. This is the information equivalent of clear-cutting a forest. Off the Deep End So why do it? Who benefits from the void of facts? I ask a number of Flat Earthers about their politics. Many are politically disengaged (“your vote doesn’t count,” three people tell me), but loosely conservative. Most are Christian. Some, if you inquire long enough, say they’ll have to completely rebuild society after everyone realizes the world is flat. This crowd isn’t necessarily far right. But the openness to extremes and a tendency toward conservative Christianity means far-right language leaks into conversation throughout the conference. The Globebusters, a Flat Earth YouTube crew, give a presentation linking NASA to the Nazis. The initials of a NASA space-training program spell out the name of a son of Zeus, the Greek god who threw lightning bolts, which clearly are similar to the lightning bolt insignias worn on SS uniforms. A hundred feet from the mainstage where Globebusters are imagining Nazi symbols, a man named Mike Dees is selling Flat Earth books and apparel. He’s wearing a pewter necklace with a crooked-spoked wheel: a Sonnenrad. The ancient symbol was appropriated by the Nazis and features heavily in neo-Nazi culture today. “It’s an ancient symbol of the stars. The 24 positions of the Big Dipper,” he says of the symbol. He knows about its other meaning as “the more popularized, misinterpreted trigger symbol” but still wears it because he sees it as “an ancient, cosmic symbol of peace.” Two tables over, vendors are selling a weighty book on Flat Earth. “Zionist Jews control the educational system,” begins Chapter 33 (“Mind Control”). The second paragraph is a block-quote from the wildly anti-Semitic and fabricated conspiracy text Protocols of the Elders of Zion, which the Flat Earth author concludes is proof that Jews are trying to hide the Flat Earth, in order to undermine God and control the world. At the table between Dees’ Sonnenrad and the book on Jewish mind control, Andrea Berglund is selling Flat Earth maps. “The CIA, the FBI,” she tells me when I ask who’s behind a series of alleged cover-ups. “The Jews are involved too.” Presenter Robert Sungenis, whom the Southern Poverty Law Center has accused of anti-Semitism, prefaces a Hebrew word with “as Jews say” and makes a exaggerated, phlegmy-sounding gutternal noise. Religious conspiracy (some people I speak to at the conference accuse the Freemasons, not the Jews of covering up Flat Earth) and political uncertainty go hand in hand. Embittered by Germany’s loss in World War I, fascists falsely accused the country’s Jews of “stabbing Germany in the back” during the war. The conspiracy theory contributed to the Holocaust under Nazi rule. The ongoing genocide of the Rohingya, a Muslim minority in Myanmar, during a period of political strife has been fueled by a dramatic increase in anti-Rohingya hate speech and conspiracy on Facebook. In a period of political unrest in America, anti-Semitic conspiracy theories and subsequent murders of Jews are on the rise. When the entire world feels uncertain, it’s no wonder people look for an easy culprit. Flat Earthers say the planet is a stationary disk that does not rotate or orbit the sun. But I speak to enough to suspect they still feel off-balance in the world. Friends at the End of the World In the vendor hall, Deb Hamm is selling engraved knives. She gets one out of the display box for me. “Flat Earther Gutting The Hoax One Proof At A Time,” its blade reads. It costs $68. “I’ve changed a number of people’s lives,” Hamm says of Flat Earth belief. Converting people is “hard, but I know enough from studying full-bore for three years that it doesn’t take long.” “I can’t talk to my daughter,” she said, “but I have three or four friends I’ve made come over and have a beer and let’s watch this video.” Disavowal by friends or family is a common topic of discussion, especially during question-and-answer panels. Ginny, the California woman who converted after three straight days of Flat Earth videos, asks how she might “come out” as a Flat Earther on Facebook. The conference is particularly important to her, she says, as she’s just lost her home in the ongoing California wildfires. After the panel, I catch up with Ginny and her friend Suzanne, who tells me she’s probably also lost her house. It’s located in an evacuation zone, so she can’t be certain. Her mother, who lives in the zone, is missing. If she’s dead, Suzanne hopes she went quickly. She’s heartbroken, she says. At first she felt “a little guilty” coming to the Flat Earth conference amid all that ruin, but there’s nothing she can do until the evacuation order lifts, anyway. Being here among like-minded people is helping, Suzanne says. Conference-goers are exceedingly kind. A family invites me to breakfast, where they tell me that druids are real and the Sandy Hook massacre was fake. This is just what she’d tell me if I were her kid, the mother explains. Most presentations I watch follow a similar pattern. The speakers makes some reference to the ridicule Flat Earthers face. On the first morning, conference master of ceremonies Rick Hummer asks what insults the audience has heard. “Crazy,” someone shouts. Others: “Retard!” “Flattard!” (Hummer repeats the routine on the conference’s second day.) The speakers go on to discuss the joy of being around like-minded (“open-minded”) people. As for the substance of the presentations, many are excerpted from YouTube videos the audience has already seen. Sure there are schisms. Multiple YouTubers make snipes at other YouTubers during their presentations. Trolls like one or more of the Tim Ozmans make bomb threats. All the major speakers are at odds with the Flat Earth Society, whom many describe as “controlled opposition.” The first night concludes with a formal debate between a Christian literalist who believes Earth is flat and a Christian literalist who believes Earth is round but that the solar system orbits Earth, not the sun. But overall, the conference is a barrage of reinforcement. Earth is flat and you’re here with your Flat Earth family. Earth is flat and you’re here with your Flat Earth family . I take a break from a presentation to type in the lobby. Two strangers, a man and a woman, sit down across from me, and over the course of a long conversation, scooch closer and closer to each other until I relocate to another couch. For all the presenters’ talk of open-mindedness and debate, people are really looking for others like them. “My question is, we know the Earth is flat,” a conference-goer named Melody asks speakers during a question-and-answer panel. “What do we do now?”
{ "pile_set_name": "OpenWebText2" }
Watch above as Ru, after being chased down by Willam and finding his good side, talks about all his RuPaul’s Drag Race girls, and proves that he still follows their every move even after the show is over.
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "https://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.17"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <title>MNNKit: MNNFaceDetection/android/src/main/java/com/alibaba Directory Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td id="projectlogo"><img alt="Logo" src="mnn.jpg"/></td> <td id="projectalign" style="padding-left: 0.5em;"> <div id="projectname">MNNKit &#160;<span id="projectnumber">1.0</span> </div> <div id="projectbrief">MNNKit is a collection of AI solutions on mobile phone, powered by MNN engine.</div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.17 --> <script type="text/javascript" src="menudata.js"></script> <script type="text/javascript" src="menu.js"></script> <script type="text/javascript"> /* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */ $(function() { initMenu('',false,false,'search.php','Search'); }); /* @license-end */</script> <div id="main-nav"></div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_ff51bd0b7841751e6292791fdaa2b577.html">MNNFaceDetection</a></li><li class="navelem"><a class="el" href="dir_63791b95483cf3c993780521edc19890.html">android</a></li><li class="navelem"><a class="el" href="dir_7f92bc3fdbda6107b6f10f88212fd556.html">src</a></li><li class="navelem"><a class="el" href="dir_d56f97a77027a31056fee7685895f0c4.html">main</a></li><li class="navelem"><a class="el" href="dir_47d122ed7c37c9322d5530106463b8f2.html">java</a></li><li class="navelem"><a class="el" href="dir_98cb6771020ddafee339445588c01181.html">com</a></li><li class="navelem"><a class="el" href="dir_09d68240d7e1d43e5755b29e8c25f971.html">alibaba</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="headertitle"> <div class="title">alibaba Directory Reference</div> </div> </div><!--header--> <div class="contents"> <table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="subdirs"></a> Directories</h2></td></tr> <tr class="memitem:dir_4b583c7e5532556e734d11ce03a6cbac"><td class="memItemLeft" align="right" valign="top">directory &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="dir_4b583c7e5532556e734d11ce03a6cbac.html">android</a></td></tr> <tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr> </table> </div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated by &#160;<a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.17 </small></address> </body> </html>
{ "pile_set_name": "Github" }
619 F.2d 82 Wardv.Kraftco Corp. No. 78-3482 United States Court of Appeals, Fifth Circuit 5/30/80 1 N.D.Ga. 2 AFFIRMED*** *** Opinion contains citation(s) or special notations
{ "pile_set_name": "FreeLaw" }
The welfare of cats has been put firmly on the political agenda with Scotlands first feline manifesto being delivered to politicians. Cats Protection, the UK’s leading cat charity, unveiled its 10-point document at a reception at the Scottish Parliament on Thursday. It was hosted by Christine Grahame MSP and supported by Petplan. Cats Protection is calling for existing and prospective MSPs to get behind the Manifesto for Cats: Scotland in order to ensure that one of the nation’s best loved pets is fully protected by policies and the law. Its 10-point manifesto calls for: Updating the law to control the breeding and sale of cats to reduce the number of unwanted kittens and ensure good welfare; The Licensing of Animal Dealers (Young Cats and Dogs) (Scotland) Regulations 2009 sets out some licensing requirements for those who sell young cats under 84 days old, but this is not adequately enforced; Reviewing and updating the laws on pet sales to protect cats and kittens sold online; Making it compulsory to microchip owned cats in Scotland; enforcing and monitoring new air gun licensing laws to prevent injury or death to cats shot by such weapons (Stricter legislation of air guns under the Air Weapons and Licensing (Scotland) Act 2015 is set to come into force in 2016); Reviewing the effectiveness of Dog Control Notices as a way of preventing dog attacks on cats; Animal welfare education: include animal welfare in the Curriculum for Excellence, so that children learn about responsible pet care; Ensuring the Scottish Government recognises the needs of people with cats and other pets in rented housing and care homes, to allow people to keep their pets; Ensuring Scottish Government recognises the benefits cats and other companion animals bring to health and personal wellbeing; Labelling toxic products: clearly label flowers, plants and household products that are toxic to cats so cat owners know which to avoid; Banning snares: bringing in an outright ban on snares on the basis they are inhumane and cruel and inflict suffering, injury or death upon animals caught in them, including cats; And creating a national database to ensure that a central record is kept of all cats entering the UK legally so those entering illegally without a rabies vaccine can be identified without delay. Jacqui Cuff, Cat Protection’s advocacy manager, said: “Over the past few years, we have been contacted about a worrying number of issues that our supporters and the general public want us to raise with the Scottish Government. “Nearly one in four Scottish households owns a cat, so the issue of feline welfare is very relevant to Scottish voters. “Delivery of the manifesto for cats would improve the lives of thousands of cats in Scotland and prevent them from harm. We’re hoping that politicians will back our call to improve the welfare and wellbeing of thousands of cats. There’s much more that Scottish government and local authorities can do to ensure a better world for cats.” Christine Grahame MSP added: “As a cat owner myself, my cat Mr Smokey, has been microchipped and I would encourage other owners to do the same.
{ "pile_set_name": "OpenWebText2" }
Tumor necrosis factor receptors support murine hematopoietic progenitor function in the early stages of engraftment. Tumor necrosis factor (TNF) family receptors/ligands are important participants in hematopoietic homeostasis, in particular as essential negative expansion regulators of differentiated clones. As a prominent injury cytokine, TNF-alpha has been traditionally considered to suppress donor hematopoietic stem and progenitor cell function after transplantation. We monitored the involvement of TNF receptors (TNF-R) 1 and 2 in murine hematopoietic cell engraftment and their inter-relationship with Fas. Transplantation of lineage-negative (lin(-)) bone marrow cells (BMC) from TNF receptor-deficient mice into wild-type recipients showed defective early engraftment and loss of durable hematopoietic contribution upon recovery of host hematopoiesis. Consistently, cells deficient in TNF receptors had reduced competitive capacity as compared to wild-type progenitors. The TNF receptors were acutely upregulated in bone marrow (BM)-homed donor cells (wild-type) early after transplantation, being expressed in 60%-75% of the donor cells after 6 days. Both TNF receptors were detected in fast cycling, early differentiating progenitors, and were ubiquitously expressed in the most primitive progenitors with long-term reconstituting potential (lin(-)c-kit(+) stem cell antigen (SCA)-1(+)). BM-homed donor cells were insensitive to apoptosis induced by TNF-alpha and Fas-ligand and their combination, despite reciprocal inductive cross talk between the TNF and Fas receptors. The engraftment supporting effect of TNF-alpha is attributed to stimulation of progenitors through TNF-R1, which involves activation of the caspase cascade. This stimulatory effect was not observed for TNF-R2, and this receptor did not assume redundant stimulatory function in TNFR1-deficient cells. It is concluded that TNF-alpha plays a tropic role early after transplantation, which is essential to successful progenitor engraftment.
{ "pile_set_name": "PubMed Abstracts" }
Fast Convolutional Nets with Fbfft: A GPU Performance Evaluation - fitzwatermellow https://research.facebook.com/publications/695244360582147/fast-convolutional-nets-with-fbfft-a-gpu-performance-evaluation/ ====== varelse Reports like this are great for embarrassing NVIDIA. But the problem is that this paper is already out of date, for embarrassing NVIDIA is the best way to get them to address deficiencies like this. This is mostly already fixed: [https://github.com/soumith/convnet- benchmarks](https://github.com/soumith/convnet-benchmarks) Check out the huge speedup between cuDNN(R2) and cuDNN(R3). Also, while there is some fantastic ML and DNN expertise at Facebook, there are only a few GPU experts there. In contrast, NVIDIA is swarming with them. I would place my bets going forward on cuDNN. NVIDIA has bet the farm on deep learning at the expense of other problem domains. This is great for ML experts who want to add GPU support to their algorithms, and not so great for general HPC* (but then HPC just isn't as sexy as deep learning, now is it?). *For example, cuBLAS perf has serious issues and cliffs on Maxwell GPUs. Sigh... ~~~ smhx I run convnet-benchmarks, and also work at Facebook. Unlike what the public perception is, NVIDIA, Facebook and other companies collaborate very very closely. NVIDIA's latest R3 release has FFT-based convolutions inspired by Facebook's work, and Facebook integrated some of the optimization suggestions for fbfft that NVIDIA gave. Further optimizations on the FFT approach (like tiled-FFTs) have been suggested and prototyped at FB and carried over by NVIDIA. The relationship is more of a deep collaborative effort. At the end of the day, we want cuDNN to win, as it is a baseline system for all software. However, if you want to do research, you want to have open-source code, because you often want to do funky changes to the base algorithm. NVIDIA falls short on this, and we at Facebook pledged to always keep our code open source (bitten by the fact that we had to start with closed-source blackboxes for our initial FFT work). ~~~ varelse Sure, but most of the DNN people are just running glorified AlexNets and GoogleNets and not really looking deeply under the hood (I speak from 1st hand experience). For Caffe _is_ open source. And cuDNN makes it fast. And if it doesn't, just jump and down like the above report did, and it will be fast in the next release. IMO if you're doing stuff for which cuDNN isn't good enough, you're probably capable of writing your own kernels, and that's awesome. Welcome to the Deep Learning equivalent of the 1%. Meanwhile, incorporate cuDNN into your production workflow to maximize comparative advantage. Or don't, whatever... ------ dharma1 where are large kernel sizes used/useful?
{ "pile_set_name": "HackerNews" }
Q: Sieve Of Erastothenes using Java have started learning Java recently and was looking into some easy algorithms. I found the Sieve Of Erastothenes algorithm here I am trying to get better at writing good code for my solutions. Please give me your suggestions. import java.util.Scanner; public class SieveofErastothenes { public static void main(String[] args) { Scanner keyboard = new Scanner(System.in); System.out.println("Enter the prime number ceiling"); int ceiling = keyboard.nextInt(); keyboard.close(); prime(ceiling); } private static void prime(int n) { // create an array with 0 and 1 where 1= Prime and 0= Non Prime int[] isPrime = new int[n + 1]; // set all values to 1 for (int i = 2; i <= n; i++) { isPrime[i] = 1; } int upperbound = (int) Math.sqrt(n); for (int i = 2; i <= upperbound; i++) { if (isPrime[i] == 1) { for (int j = 2; j * i <= n; j++) { isPrime[j * i] = 0; } } } printprime(isPrime, n); } private static void printprime(int[] isPrime, int n) { for (int i = 0; i <= n; i++) { if (isPrime[i] == 1) { System.out.println(i); } } } } A few online tutorials use a boolean array to set all the values as true or false whereas I am using an integer array and setting the values to 0 and 1 initially.Does this make any difference in the performance? A: It does indeed make a difference whether you use bool[] or int[] - an int uses four times as much memory and hence the array requires four times as many cache line transfers as bool does, and it will exceed the CPU's level-1 cache capacity - usually around 32 KiByte - for smaller values of n than a boolean array. And, as Dave said, testing the truthiness of a bool cell looks nicer in languages where integers aren't truthy and thus need to be compared to 0, and it reflects the program logic better. If you invert the logic of your sieve from 'is prime' to 'is composite' then you can skip the initialisation of the array to all true (or 1) because the array will already have been initialised to the bit pattern 0, and semantically it would be more accurate anyway. Besides, I don't think that the old Greek ever said anything about marking all numbers as 'prime' before the start of the sieving - that must have been invented by tutors in the modern age. Also, the Sieve of Eratosthenes has no need for multiplying indices - it strides additively, by adding the current prime to the current position during each step: for (int i = 2, sqrt_n = (int)Math.sqrt(n); i <= sqrt_n; ++i) if (!is_composite[i]) for (int j = i * i; j <= n; j += i) is_composite[j] = true; I've also adjusted the starting point for the crossing-off to the square of the current prime, since all smaller multiples will already have been crossed off during the cycles for smaller primes. The outer loop still contains a small inefficiency: there is only one even prime, yet the loop tests all even numbers up to sqrt(n) for compositeness. Quite a few performance reserves can be unlocked by removing the number 2 from the picture entirely and sieving only the odd numbers. The biggest gain comes from removing half of all 'hops' (crossings-off) in the inner loop and from the halved memory pressure. Last but not least, the performance will drop significantly when the sieve array gets appreciably bigger than the L1 cache size of the CPU (typically 32 KiByte), and it will drop even further when the L2 cache size is exceeded. If you need decent performance in ranges beyond the L1 cache size then you might want to consider segmented sieving, i.e. working the sieve range in cache-sized blocks. This is quite simple to implement, and definitely simpler than windowed sieving; you can find an example in my answer to Find prime positioned prime number. There you can also see that odds-only sieving is just as simple as plain sieving; it just requires a bit of care when dealing with indexes (i.e. clarity whether a given value is supposed to be a number or a bit index). Many coding challenges that deal with primes require the sieving of millions of numbers instead of small handfuls, and so an investment in studying suitable 'prime technology' can pay off handsomely. Moreover, this study can tell you lot about the efficiency of basic mechanisms in your language - be it bool[] vs BitSet (bool[] wins hands-down in Java, C# and C++, if you have an eye on cache sizes), or the performance cost of syntactic sugar. A: The short answer to your question, is yes. It does make a difference to performance. However, we're only talking about increased RAM usage (integer datatype is bigger than boolean) - and we're talking about a lot less than 1kb. So on a modern computer (even a Raspberry Pi), you won't have a problem. Now, general advice & tips... Variable names should be appropriate to their use. When I see isPrime I assume that it's a boolean value (because it's either a prime or it isn't). Regardless of performance impact, boolean makes more sense because you only ever set 0 or 1. Loops - is there a specific requirement why you appear to be writing 1.3 compliant code? For loops could be done with the for( TYPE var : collection) form. Makes it more readable IMO - I don't need to worry about the control variable being tampered with during loop execution. Method names - should be descriptive, and use camel case. prime() and printprime are examples of how not to do it. Math.sqrt() takes a double and returns a double - why are you casting directly to int? If you really want an int datatype, you should be rounding as appropriate (up vs down). Get out of the habit of just casting primitives before you move on to their wrappers - eg, you cannot cast Double directly to int. Comments - opinions vary. Use sparingly and only when deliberately against accepted convention, or to explain why you have to do something a certain way even though you know it should be done differently. JavaDoc comments again, should be used sparingly. Get the class & method names right, and JavaDoc shouldn't be needed. There could be constraints that would push you to use JavaDoc, and if so, that's fine. Unit test. Unit test. Unit test. You don't appear to have any. Write the Unit Tests before you write your main code. Write as little main code as possible to make your unit tests pass (make sure your Unit Tests are appropriate for requirements first). A: A few online tutorials use a boolean array to set all the values as true or false whereas I am using an integer array and setting the values to 0 and 1 initially.Does this make any difference in the performance? You would need to profile it (it will probably depend on the virtual machine used). But regarding readability, boolean makes a lot more sense. A number is either prime, or it is not (there is no "maybe prime" here). true has a real meaning here (is prime? true), while 1 does not; it is only understandable via comments or convention. Using boolean also makes your ifs nicer. if (isPrime[j]) is quite nice to read and easy to understand, while isPrime[i] == 1 is not. Misc you can use Arrays.fill to initialize your array. your function should not print the primes itself, but return them instead (just an array of prime numbers, not the whole isPrime array). That way, it's easily testable and reusable. then, your function could be called getPrimes, which makes it more obvious what the function does.
{ "pile_set_name": "StackExchange" }
Analysis of HCV co-infection with occult hepatitis B virus in patients undergoing IFN therapy. Occult hepatitis B virus (HBV) infection is characterized by the presence of HBV DNA in the absence of hepatitis B surface antigen (HBsAg) in the patient serum. Although such infections have been identified in patients with chronic hepatitis C, the clinical significance of those co-infections is still not understood. Our aim was, therefore, to assess the prevalence and clinical consequences of occult HBV infection in chronic hepatitis C patients undergoing antiviral therapy. The study population consisted of 53 HBsAg-negative patients with chronic hepatitis C treated with IFN/ribavirin or IFN/ribavirin/amantadine. Nine patients experienced a viral breakthrough (BT), 30 were non-responders (NR) and 14 were responders (R). HBV-DNA detection by PCR was performed using primers specific for the S region of the HBV genome and HCV-RNA detection by PCR with primers localised in both the 5'NC and core region of HCV genome, before, during and after treatment. Viral genome sequences were also studied. Occult HBV genomes were found in the serum of four of 53 (7.5%) patients, unrelated to anti-HBc status. No significant differences in biochemical, virological, or histological markers, age, duration of infection, were observed in patients with or without HBV DNA. There was an inverse correlation in the evolution of HBV DNA and HCV RNA levels. Direct sequencing showed that S gene of occult HBV presented mutations in the "a" determinant while no specific mutation in the core region of HCV was observed. None of the four patients co-infected with HBV and HCV were responders to anti-HCV therapy. In our clinical setting, the prevalence of occult HBV co-infection among patients with chronic hepatitis C was low and independent of the presence of markers of previous HBV infection. Further studies in larger cohort of patients are warranted to determine if occult HBV co-infection may be involved in HCV resistance to combination therapy.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The present invention relates to brackets for mounting supports, interconnecting structural components, or supporting articles freestanding. 2. Prior Art Christmas tree supports are shown in various United States patents. The support of U.S. Pat. No. 3,733,040 contains many component parts making the support difficult to assemble and expensive to manufacture. The legs of the support of U.S. Pat. No. 1,319,009 are of a particularly complex shape making it another expensive support. U.S. Pat. No. 3,295,802 shows two pairs of legs held in engagement with opposite sides of the base of a tree by a band. However, the trunks of large trees are engaged only by the edges of leg angles, the band is held on the legs only by tension, and the floor or other supporting surface is engaged only by small feet. In addition, all three of these suppots preclude placing the base of a supported tree in a container of water without placing at least part of the support itself in such container. Hence, either these supports will be subject to corrosion or rot from exposure to water or the supported trees will be denied water, have shortened useful lives, and be more likely to become fire hazards. The support in U.S. Pat. No. 2,327,403 relies on short pins extending into the base of a tree to support the weight of the tree. Such support could support stably only a very small tree. U.S. Pat. No. 2,853,261 shows a "Stabilizer for Containers" using a complicated resilient band holding legs in engagement with a cylinder which is to receive the container to be supported. This device shares with all the above noted christmas tree supports the problem of being designed for a single use.
{ "pile_set_name": "USPTO Backgrounds" }
Metal-on-metal hip resurfacing compared with 28-mm diameter metal-on-metal total hip replacement: a randomised study with six to nine years' follow-up. A total of 219 hips in 192 patients aged between 18 and 65 years were randomised to 28-mm metal-on-metal uncemented total hip replacements (THRs, 107 hips) or hybrid hip resurfacing (HR, 112 hips). At a mean follow-up of eight years (6.6 to 9.3) there was no significant difference between the THR and HR groups regarding rate of revision (4.0% (4 of 99) vs 5.8% (6 of 104), p = 0.569) or re-operation rates without revision (5.1% (5 of 99) vs 2.9% (3 of 104), p = 0.428). In the THR group one recurrent dislocation, two late deep infections and one peri-prosthetic fracture required revision, whereas in the HR group five patients underwent revision for femoral head loosening and one for adverse reaction to metal debris. The mean University of California, Los Angeles activity scores were significantly higher in HR (7.5 (sd 1.7) vs 6.9 (sd 1.7), p = 0.035), but similar mean Western Ontario and McMaster Universities Osteoarthritis Index scores were obtained (5.8 (sd 9.5) in HR vs 5.1 (sd 8.9) in THR, p = 0.615) at the last follow-up. Osteolysis was found in 30 of 81 THR patients (37.4%), mostly in the proximal femur, compared with two of 83 HR patients (2.4%) (p < 0.001). At five years the mean metal ion levels were < 2.5 μg/l for cobalt and chromium in both groups; only titanium was significantly higher in the HR group (p = 0.001). Although revision rates and functional scores were similar in both groups at mid-term, long-term survival analysis is necessary to determine whether one procedure is more advantageous than the other.
{ "pile_set_name": "PubMed Abstracts" }
/*---------------------------------------------------------------------------*\ ========= | \\ / F ield | OpenFOAM: The Open Source CFD Toolbox \\ / O peration | Website: https://openfoam.org \\ / A nd | Copyright (C) 2013-2020 OpenFOAM Foundation \\/ M anipulation | ------------------------------------------------------------------------------- License This file is part of OpenFOAM. OpenFOAM is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. OpenFOAM is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with OpenFOAM. If not, see <http://www.gnu.org/licenses/>. Class Foam::AveragingMethod Description Base class for lagrangian averaging methods. SourceFiles AveragingMethod.C AveragingMethodI.H \*---------------------------------------------------------------------------*/ #ifndef AveragingMethod_H #define AveragingMethod_H #include "barycentric.H" #include "tetIndices.H" #include "FieldField.H" #include "fvMesh.H" #include "runTimeSelectionTables.H" // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // namespace Foam { /*---------------------------------------------------------------------------*\ Class AveragingMethod Declaration \*---------------------------------------------------------------------------*/ template<class Type> class AveragingMethod : public regIOobject, public FieldField<Field, Type> { protected: //- Protected typedefs //- Gradient type typedef typename outerProduct<vector, Type>::type TypeGrad; //- Protected data //- Dictionary const dictionary& dict_; //- The mesh on which the averaging is to be done const fvMesh& mesh_; //- Protected member functions //- Update the gradient calculation virtual void updateGrad(); public: //- Runtime type information TypeName("averagingMethod"); //- Declare runtime constructor selection table declareRunTimeSelectionTable ( autoPtr, AveragingMethod, dictionary, ( const IOobject& io, const dictionary& dict, const fvMesh& mesh ), (io, dict, mesh) ); //- Constructors //- Construct from components AveragingMethod ( const IOobject& io, const dictionary& dict, const fvMesh& mesh, const labelList& size ); //- Construct a copy AveragingMethod(const AveragingMethod<Type>& am); //- Construct and return a clone virtual autoPtr<AveragingMethod<Type>> clone() const = 0; //- Selector static autoPtr<AveragingMethod<Type>> New ( const IOobject& io, const dictionary& dict, const fvMesh& mesh ); //- Destructor virtual ~AveragingMethod(); //- Member Functions //- Add point value to interpolation virtual void add ( const barycentric& coordinates, const tetIndices& tetIs, const Type& value ) = 0; //- Interpolate virtual Type interpolate ( const barycentric& coordinates, const tetIndices& tetIs ) const = 0; //- Interpolate gradient virtual TypeGrad interpolateGrad ( const barycentric& coordinates, const tetIndices& tetIs ) const = 0; //- Calculate the average virtual void average(); virtual void average(const AveragingMethod<scalar>& weight); //- Dummy write virtual bool writeData(Ostream&) const; //- Write using setting from DB virtual bool write(const bool write = true) const; //- Return an internal field of the average virtual tmp<Field<Type>> primitiveField() const = 0; //- Assign to another average inline void operator=(const AveragingMethod<Type>& x); //- Assign to value inline void operator=(const Type& x); //- Assign to tmp inline void operator=(tmp<FieldField<Field, Type>> x); //- Add-equal tmp inline void operator+=(tmp<FieldField<Field, Type>> x); //- Multiply-equal tmp inline void operator*=(tmp<FieldField<Field, Type>> x); //- Divide-equal tmp inline void operator/=(tmp<FieldField<Field, scalar>> x); }; // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // } // End namespace Foam // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // #include "AveragingMethodI.H" // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // #ifdef NoRepository #include "AveragingMethod.C" #endif // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // #endif // ************************************************************************* //
{ "pile_set_name": "Github" }
Sebastian Biot looks at KDE Usability in the first of a series of studies. "While some participants noted that KDE looked different from Windows, none seemed bothered by the differences and the look-and-feel of KDE. Users identified all the elements of the interface without any trouble including KDE's Konqueror and KMail icons. Most users seemed to understand the K menu's presence and function intuitively and they used it much more than I had anticipated. This test conducted in early July 2002 with four participants outlines of some of KDE 3.0's shortcomings including inconsistencies in KFileDialog and the difficulties of working with Konqueror's embedded viewers." It's good to see people stepping up to do this kind of work -- the good news is that discussion of the study has already been started (kde-usability, kde-cafe). Comments I have to second the findings of the usability test. When I first used KDE 3.x, the single-clicking thing also threw me. It should be double-clicking by default. Second thing that threw me was that when the mouse passed over a desktop icon, the icon changed to an "active" state. I generally have about 5-10 icons on the desktop. The effect is that everytime I move the mouse the entire screen is jumping with various changes. This behaviour should also be turned off by default not because it wastes cycles, which it does, but because it makes the desktop non-estetic. And my last pet pieve (it didn't show up in the study, because users were not asked to perform it) is clipboard. Ctrl-V/Ctrl-C works - that's great. But it is worthless if everytime you select something, the clipboard gets overwritten. I still haven't found a way to turn off this ridiculous behaviour (am I missing something?). Sometimes I want to highlight a url somewhere and paste it into Konq, so I highlight the URL, then I try to highlight the URL in the address bar, so that I can overwrite it with the url I selected, but the clipboard just got whacked. Anyway, there should be an option to turn off the X clipboard behaviour, because it is simply non-intuitive. And my last pet pieve (it didn't show up in the study, because users were not asked to perform it) is clipboard. Ctrl-V/Ctrl-C works - that's great. But it is worthless if everytime you select something, the clipboard gets overwritten. I still haven't found a way to turn off this ridiculous behaviour (am I missing something?). Yes, you are. Did you notice the clipboard (Klipper) in the system tray? When you click on it, it presents you with a clipboard history. Not to mention that this has been fixed in KDE 3. Selecting something and then pressing Ctrl-V does produce the desired effect. The only way you could have problems now is if you tried to mix the two clipboards: if you press Ctrl-C and then middle-click, or if you select something and try to paste it with Ctrl-V. > I have to second the findings of the usability test. When I first used KDE 3.x, the single-clicking thing also threw me. It should be double-clicking by default. WRONG!!! I can't stress enough how much this is a terrible idea!!! Just because thousands of lemmings run off a cliff doesn't mean it is a good idea. Where did double clicking come from? Apple advanced the GUI they got from Xerox with a single button mouse. This pretty much indicated double clicking since a second button was not optional. I too found single clicking strange when I first started using KDE. However within a few weeks I found double clicking way more obtuse. Consider that it is not at all uncommon for people to suffer from repetative stress disorders, in particular carpal tunnel syndrome induced by double clicking on a mouse. This is a very real thing. Your chances of having real and painful medical problems after decades of double clicking are very good. They put warnings on cigarette packs about heart and lung disease. There ought to be one on your mouse about double clicking. A quick search on carpal tunnel syndrome and double clicking reveals plenty of activity including expensive ergonomic mouses that have a double click button so that people can use windoze without having to double click. I for one would feel ill if I thought KDE users were buying them because they did not know that a free software solution for the insanity of double clicking was there already. KDE should be saluted for doing the right thing... even though some people find it inconvenient to be open minded and realize the it is more productive, logical and less injurious to click once when the only need to click twice is the one button mouse and the morons in Redmond who never had a fresh idea or any sense. It seems to me if you are coming to KDE from windoze you will find yourself rebooting less and clicking less... both of which will make you more productive. God help us if we allow "usability" to pander to the worst inclinations and stupidist conventions. Sometimes it's worth taking the heat for being right! I agree 100%.. Single clicking is the way to go. When you browse internet, do you double click on links? When I first started using KDE, even I didn't like single clicking.. but then it felt so natural after a while. The only time I don't like single clicking is when I am in file browsing. Another observation I would like to put forth is that of my father. He used Windoze till now but moved to Linux/KDE (KDX!) recently. He is not a techie person.. a complete newbie. After a while, he loved single clicking. When I asked him if I should change snigle click to double click like in windoze, he said no.. he likes it this way.. he said he got irritated at times with the windoze doubleclick.. mainly because he had to click within that short time else it wouldn't click! I agree completely. If KDE adopts this notion, maybe we can also get them to drop the metric system:) The Windows 95 interface was so badly done that it spawned several well known usabilty "Hall of Shame" sites. Everytime I see Windows-type mistakes repeated in KDE it makes me boil. Add this to your usability test: Special=Inconsistent=Bad. I single click a registered mime type on the KDE desktop to open it with my preferred application, but have to middle click the same file in Konqueror. One or the other should be the default behavior, but not both. A mouse is a pointing device, by default that's the way it should behave. I work in industrial automation. It's typical now to use industrial touchscreens to provide graphical operator interfaces. Many times these are simply an X86 PC in a special form factor, with the touchscreen connected and configured as a serial mouse. I've never seen an instance where anyone "intuitively" attempted to double click a graphical control panel touch object. The same applies to kiosks or automatic teller machines - Mac and Windows users seem to grasp how to operate those machines at a glance. The faster we make PC's work like everything else in the real world, the better off we'll be. Most of us don't double click to start a car, turn on the living room lights, and etc. ad infinitum. I don't want to click a desktop icon two or three times (to give it focus and to launch the associated application). Should KDE make that the default behavior based on some vague claim of "improved usability" without first asking for a rational explanation of how it improves the functional utility of everyone's desktop? I'm all for single clicking, except that it is kinda frustrating to figure out how to simply select something for a change. The automatic select cannot read my mind, if it is not fast enough, then it is not fast enough. Then other times it is too fast, or it can be a bit "sticky" in which everywhere I move my mouse, it follows, and messes up a bunch of selects. What I'd like is...if there was a way to simply select something. And I would like it if it could be done on a click. So far, the mapping is: left opens, middle open in new window, and right opens the menu. Can I win something here? How about this: in single click, if the menu is open, and I click on the same icon I opened the menu on, it should leave it selected, period! I not care if the mouse moved ever so little off the menu, select the thing, not open it! I know that is 2 clicks, but I can live with that. It would be nicer if a double click would select for a change. If you are in single click mode, isn't it intuitive to assume that there was a role reversal in which select is now double click? I don't know exactly how the GUI thing handles events, but if it is possible to reverse the role, then that would be nice. Have a checkbox under the configuration for single clicking saying "Double click selects". No, you just point to it. Right mouse button gives you the option. If you want to move it, just press left mouse button and don't release it until you draged whatever you are dragging above the target. Drop. The simple click is a good evolution because: ->easier to learn (beginners move the mouse when "double clicking" =>so windows move the icon while they want to open an application, ...) ->better consistancy (why a simple clic open a menu and I need double clic to open a folder in windows) ->less effort Actually, the whole thing is a non-issue anyway because a new KDE-user should see the wizard where you can choose a look-and-feel right in the beginning, and all users who think that think Windows is the best can choose Windows right there, with double-clicking and all. KDE is a great desktop, while I certainly acknowledge that there is room for improvement (there always is), please don't do something just because "it's in Windows". Note that he didn't ask the User how they felt about it. I'm pretty sure if he explained what was happening and why the user would soon feel at home. My dad for one lives quite well with the single-clicking. And we come to the central matter: making users _know_. I.e., given the absolute truth that users don't read documentation unless their lives depend on it (it always does, but we, users, are crazy risk freaks :-/ ), we should find another way to make people know. One thing would be a mandatory tutorial at the first use of the computer. This won't trap users that start to use an already configured/existing account. Another thing would be to have "intelligent assistants" (hello, Microsoft) that would detect "erroneous" double-click usage etc. Bad huh? But don't despair. There is a probable solution, and it's even as old as unix/X, probably. Fire up the "xfig" program (you don't have it installed? Shame on you!). And look in the top right corner. Move your mouse cursor over different elements of the display. Choose tools from the palette. You'll see there, in the top right corner, a small mouse buttons depiction, with explanations. Now, imagine we would add a general mechanism that would allow, at user's demand, the display of a panel on the desktop (or in the kicker) that would list the actions associated with the mouse (and perhaps with the keyboard buttons too), depending on the element of the desktop over which the mouse cursor is, and/or the element which has the focus. This technique would also solve another usability problem mentioned: opening documents _for viewing only_ in the konq-embedded viewers. Well, the above technique would show that middle-clicking on a file opens it in a full-blown editor. I Agree! I like single clicking I'm used to it! I like X clipboard / clipboard history combination, it's good and I'm used to it. Btw. in konqueror there is the cross button to clear the URL text box. And in all text boxes right click and "Clear" deletes the text. That's as efficient as selecting it and pressing "Del" IMHO. IMHO the preference wizard should make clear to users who are used to Windows that they use the Window profile. Maybe it would be right to preselect the profile, many people dont read any text. But it is also important to make the KDE settings default for people without Windows (or MacOS) exposure, because double clicks are very complicated for newbies. Just because windows does it this way doesn't necessaryly mean that it's better. But in this case I think you are right. The users have already made their choise. Even Microsoft tried to introduce single click as part of their active desktop, but failed miserably. Almost all users turned it off. My guess is that users feel that they want the double click to make sure that they don't do anything by mistake, as you use clicks to select and double click to perfom an action. Another good reason is that there are so many windows and mac boxes out there all configured with double click and chances are that KDE users will use one of those as well as KDE. In this case a different click behaviour would be confusing. There is however one place in KDE that not should have double click, and this is the tree in the "Control Center" where you select controls. You should not need to double click here. This is a selection where you only can select one control at the time. It should work like the tree view of the filemanager. I personally like single clicks, because double clicking requires too much effort when you actually use mouse to do things. The only reasonable reason for double clicks I can think of is that double clicking was invented before multiple buttons on the mouse. We should not hang on to this medieval habit. The problem with the KDE default single-click mode is that the novice user that's accustomed to double-clicking everything ends up with 2 launches - which is exacerbated when launching is slow and they double-click again. Can't KDE (or QT, or whatever is handling mouse clicks) just be set to ignore a second click if it comes within the double-click time interval? That way, single-clicking would still work, and double-clicking wouldn't hurt anything. * Make some of the window decorations have good size (or configurable size) grab bars. Glow, for example is very poor in this issue. * Better color support for reverse color schemes. Some apps assume that the background is always some sort of white and the fonts some sort of black. konqueror should have independent link color settings. * The possibility to embed the 'desktop preview' pager into the panel. I'd really like to see the icons of the apps running in each desktop. I had kpager in KDE1 working very well with auto-hiding panel and tasklist. * Seed up the hide/unhide of the external task list. I have been using KDE since one of the betas of the 1.x series, so i'm not really representative for any usability study. :) i understand how appealing the concept of user levels are when you don't really bother to think much about it, but trust me: the idea is braindamage of the first degree, which is why it is condemned by most usability experts and not implemented very often at all. why, you ask? first off, users are not uniformly "expert" or "novice" or whatever. they may know how to use the spell checker very, very well but know next to nothing about using tab stops. so are they an expert or a novice? or somewhere in between? reality is that they are an expert spell checker and a novice tab stop user. which means you really need these settings for each different major aspect of a program, which is obviously unworkable (you can end up with more user level settings than settings themselves!) ...user-levels only "work" when they are fine grained, which sort of defeats the purpose. second, users are horrible at determining their own user level. few get it right, especially when you ask them how well they know something when they may not understand what you are asking them about. third, interfaces that change are the devil. they render past learned lessons less reliable and useful. so if someone uses the user-level system, this only extends the learning process and makes the system seem perpetually uncomfortable or else they never progress to being anything but a novice. in which case, why have any features that aren't novice features? fortunately user levels aren't really needed anyways. good defaults, well designed UIs and a measure of restraint on the feature count and feature duplication works quite well. The GNOME people already tried this "user mode" thing before, both in Nautilus and in Sawfish control center. But they both failed, everybody (users & developers) thought it was a bad idea, and eventually they removed it. > * The possibility to embed the 'desktop preview' pager into the panel. > I'd really like to see the icons of the apps running in each desktop. > I had kpager in KDE1 working very well with auto-hiding panel and tasklist. Have you tried Kazbar? It's a panel applet (or extension or whatever they're called this week) that does pretty much what you describe here. Kasbar is like a iconbox, it lists the icons of the apps currently running. What I am refering to is a kpager-like app that could be embeded in the kicker window, with icon and pixmap preview and window drag and drop between dekstops. First off, I'd like to point out that I respect the developers who developed some nice archive readers like ark. However, if I was to statistically observe my own web browsing behavior, I'd say that pretty much 99+% of the time that I click on a tar.bz2, tar.gz, or even tgz files, I'm looking for a download, NOT for opening up the file to read it! That is precisely why ark has became an pet peeve for me. And it is a pretty annoying one because almost every time I click on a tar.bz2 file, I'd say to myself "oh no, now I need to press backspace and then use right click to save as!" The quick solution to this problem, in my mind, is to make saving those types of archive files the default, and perhaps have ark (Archiver) as one of the top program in the "open with" for those users who love to look at their tar files (honestly, it beats me). I think kdownload is going in the right direction here. The ideal solution in my view is pretty much what Microsoft, like it or not, does. I'm not a big Microsoft fan, but they seem to allow you to make different actions the default, like view, open, etc. What we could do is, we could have "save" as default, and then open with ark as another good option. If someone wants to change that, all they have to do is go through the file association properties and change it there. Of course, those opinions are not representative of a new user, but I think a new user would prefer if those tar.bz2 files were saved, not viewed -- or even better, just give them a dialog box that gives them the option of doing any of those actions. I agree completely! I *always* download compressed files, or rpms, or what-have-you, then go to a command line and extract/install/whatever. For a complete GUI solution I suppose you could use Ark, though I find "tar zxvf file.tar.gz" or "tar jxvf file.tar.bz2" to be infinitely faster and simpler. And for rpm's, I've never encountered an intuitive rpm GUI (especially now that I'm using Mandrake, and can just type "urpmi file.rpm"..... heh heh heh. But, I would say that a default of download makes *much* more sense, as its (like it or not) the default behaviour of Windoze. Besides, what good is viewing the contents of an archive on a remote computer? (well, in a temp file, but that's how it appears to the user). Also, in file-browsing mode, the whole archive-as-a-pseudo-directory is useless: 9 times out of 10 (or even 9 :) whatever is in the archive will not work in a pseudo-directory type thing. The best thing, probably, would be to have the default left-click option in filebrowsing mode to open Ark (or even be the "Extract Here" option from the context menu) That's why you should use the side bar in Konqueror. You drag the tarbol/rpm to a directory. Konqueror then pops up a thingy asking if you want to copy, link etc the file. This is what I use all the time. If I need to take a look at the contents of the tarbol, I can click on it. Konqueror makes my life so easy... And no double clicking! OK, to take a concrete example, if this is such an easy thing to deal with, would someone please tell me how, using konqueror, to get dvr-2.7.9.tar.gz off of sourceforge? When I tried any of the methods that have been suggested in this discussion, I got a 10k file that was not a valid archive. The actual size of the archive is more like 2.7 meg. And when I finally removed x-tgz from the file associations, that is in fact what downloaded. You click on the link, a page is displayed with a number of mirror sites - you've been downloading that page. The key here is *not* to right click and "Save Target As...", as the link to the file on Sourceforge is no longer a link to the file, but instead a link to the page of mirrors. Wait a few seconds, and you will automatically, without clicking anything, be presented with a dialogue box asking you to save or view. If you don't want that, hit stop as soon as the mirror page appears, and there will be a link at the top of the page, saying "If your download doesn not start automatically in a couple of seconds, you can manually download the file from...", and a URL. You can right click on *this* URL, and choose Save Link As.... If you are not on a page with a bunch of corporate banners and country flags all over the place, don't right click. I agree - the mirror system is a PITA, and I've downloaded that 10k file (which is the html page of mirrors, btw) several times myself, as you expect that link with the file name to be the link to the file - but it isn't. If it's any consolation, you're not the only one, and Konqueror users aren't the only ones having issues with the new SF file system. That doesn't seem to be a correct way to me. In fact, I like the bahaviour of konqueror when dealing with file I have on my local disk. Regarding archives that I want from the net, the behaviour should be always to download. Anyone knows how to set this kind of behaviour ? After one hundred years of using typewriters, people were used to pressing enter at the end of the line, when they first encountered word processors. In general they learn(ed) pretty quickly not to do that and I doubt that anyone in the right mind would ask that we all change to the previous behaviour. I have a mother who had a fairly limited exposure to Windows before I put Linux with KDE on her machine. From the start she didn't have any problems using single click and is in general quite happy with how the things are working. Or in her own words:"This is much easier to use than Windows!" Sure, there are things that need to be fixed and article exposes a lot of them, but I'm not in favor of forcing next generations to learn old behavior just because it would save a bit of learning to the current generation of computer users. Obviously I BELIEVE that single clicking like word processor example is clearly superior and worth the trouble of learning it for those who got bad habits in other environments. If anything, I'd make the change to double-clicking easy for users, but default should be sensible, not entrenched. the only thing I know : new KDE and Linux users always have difficulties with the single-click at the beginning. But, then, they change their Windows preferences to single-click... I see that beheviour numerous time. So, I think it's not a real favour to make double-click by default. Yes. Double clicking is a bad idea used in Windows. single click in Windows selects, something less used than double click. so single click by default is the way it should go. KDE people add brilliance to the common functionalities. The drag and drop pop-up menu, for example. And the split window facilty that makes drag and drop cool to do, the multisession tabs in Konsole.. thanks to the developers
{ "pile_set_name": "Pile-CC" }
<sect2> <title>Installation of Less</title> <para>Install Less by running the following commands:</para> <para><screen><userinput>./configure --prefix=/usr --bindir=/bin &amp;&amp; make &amp;&amp; make install</userinput></screen></para> </sect2>
{ "pile_set_name": "Github" }
Forever Reign (One Sonic Society album) Forever Reign is first studio album by One Sonic Society. Essential Worship Records released the album on 17 January 2012. One Sonic Society worked with Matt Bronleewe, in the production of this album. Background These songs are all from the three extended plays, One in 2010, Sonic in 2010, and Society in 2011, that preceded this studio album's release. The single, "Forever Reign", charted on two Billboard magazine charts. Critical reception Awarding the album three stars from CCM Magazine, Grace S. Aspinwall states, "the philosophy behind this entire album, it's a truly beautiful thing." Robert Ham, giving the album two and a half stars at AllMusic, writes, "it should come as little surprise that this trio has concocted a collection of songs that seems sometimes a little too radio- and worship-service ready." Rating the album three stars for Jesus Freak Hideout, Tincan Caldwell says, "In the end, Forever Reign, though it is pleasant and at times soaring, suffers from the fate common to 'super group' albums. The collaborative skill of all those involved is usually good enough to deliver a few great songs, but after that, the ones that remain often feel tossed off." Jeremy Armstrong, awarding the album five stars by Worship Leader, describes, "Forever Reign is the collection of the best of the EPs all in one place." Giving the album an eight out of ten from Cross Rhythms, Paul S. Ganney states, "The choruses are very singable, very uplifting, very easy to pick up." Michael Dalton, rating the album a four out of five at The Phantom Tollbooth, writes, "They wisely recognize that it is better to worship a transcendent God than to foster the illusion of being a super-group." Giving the album four stars for Indie Vision Music, Jonathan Andre says, "Well done for a good debut album!" Dave Wood, awarding the album four stars from Louder Than the Music, describes, "With an extremely strong arsenal of songs already penned and powerful song writing and musical talents in their armory, One Sonic Society may be one of the quietest, most unassuming, yet amply gifted bands in worship music." Rating the album a 4.25 out of five at Christian Music Zine, Joshua Andre states, "With such a well received quiver of anthems under their belt that have been widely accepted in the church, One Sonic Society may just be the quiet achievers of 2012." Track listing References Category:2012 debut albums Category:One Sonic Society albums Category:Essential Records (Christian) albums
{ "pile_set_name": "Wikipedia (en)" }
Effect of retinoic acid (RA) on the Epstein-Barr virus (EBV)-inducing effect of sodium butyrate. Sodium butyrate is a powerful inducer of the Epstein-Barr virus (EBV) cycle in the P3HR-1 cell line. Retinoic acid (RA) was found to reduce the butyrate induction of early antigen (EA) and viral capsid antigen (VCA) by 26-41%. This is similar to the previously reported effect of RA on IUDR and TPA induction, with certain quantitative differences between the systems.
{ "pile_set_name": "PubMed Abstracts" }
Revenue is expected to be $1.35 billion, plus or minus two percent. GAAP and non-GAAP gross margins are expected to be 57.7 percent and 58.0 percent, respectively, plus or minus 50 basis points. GAAP operating expenses are expected to be approximately $500 million. Non-GAAP operating expenses are expected to be approximately $445 million. GAAP and non-GAAP tax rates for the second quarter of fiscal 2017 are both expected to be 20 percent, plus or minus one percent. Capital expenditures are expected to be approximately $30 million to $40 million. Launched GeForce GTX 1080 and GTX 1070, based on the new NVIDIA Pascal architecture, bringing the biggest performance gains over the previous generation of processors in a decade. Expanded the NVIDIA VRWorks software development kit with Simultaneous Multi-Projection, which heightens realism with new display capabilities, and VRWorks Audio, which delivers physically modeled positional audio. Introduced NVIDIA Ansel, an in-game photography tool that lets gamers compose shots from any angle and share them as single images or 360-degree panoramas for viewing in VR. Expanded the NVIDIA SHIELD platform's gaming content available for streaming from GeForce NOW with new titles from Sega, Square Enix and Warner Bros. Interactive Entertainment. Extended NVIDIA Quadro leadership in pro visualization markets, with the high-end 24GB Quadro M6000, the mid-range Quadro M2000 and new NVIDIA Iray physically based rendering solutions. Unveiled Iray VR, which creates interactive, photorealistic virtual 3D worlds with unparalleled fidelity, enabling the immersive viewing of buildings and products not yet built. Expanded NVIDIA's VR Ready program into the professional market. Hosted the seventh annual GPU Technology Conference with 5,500 attendees, 600 technical sessions and 200 exhibitors, focused on artificial intelligence, VR and self-driving cars. Unveiled the NVIDIA Tesla P100 GPU, the most advanced accelerator ever built, based on the Pascal architecture. Revealed the NVIDIA DGX-1, the world's first deep-learning supercomputing in a box, with the computing throughput of more than 250 servers. Joined Massachusetts General Hospital as the founding technology partner of the MGH Clinical Data Science Center to advance healthcare by applying AI to improve the detection, diagnosis, treatment and management of diseases. Received VMware's Global Technical Partner of the Year and European Regional Technical Partner of the Year awards for partnership with NVIDIA GRID and VMware ESX. Made history as NVIDIA-powered WEpods became the first self-driving shuttles to take to public roads. Introduced HD Mapping, an end-to-end mapping platform for self-driving cars. Announced that NVIDIA DRIVE PX 2 will power all vehicles in ROBORACE, a new autonomous car-racing circuit to debut later this year. NVIDIA today reported revenue for the first quarter ended May 1, 2016, of $1.30 billion, up 13 percent from $1.15 billion a year earlier, and down 7 percent from $1.40 billion in the previous quarter. GAAP earnings per diluted share for the quarter were $0.33, up 38 percent from $0.24 a year ago and down 6 percent from $0.35 in the previous quarter. Non-GAAP earnings per diluted share were $0.46, up 39 percent from $0.33 a year earlier and down 12 percent from $0.52 in the previous quarter."We are enjoying growth in all of our platforms -- gaming, professional visualization, datacenter and auto," said Jen-Hsun Huang, co-founder and chief executive officer, NVIDIA. "Accelerating our growth is deep learning, a new computing model that uses the GPU's massive computing power to learn artificial intelligence algorithms. Its adoption is sweeping one industry after another, driving demand for our GPUs."Our new Pascal GPU architecture will give a giant boost to deep learning, gaming and VR. We are excited to bring a new wave of innovations to the markets we serve. Pascal processors are in full production and will be available later this month," he said.During the first quarter, NVIDIA entered into a $500 million accelerated share repurchase agreement and paid $62 million in quarterly cash dividends. For fiscal 2017, NVIDIA intends to return approximately $1 billion to shareholders through ongoing quarterly cash dividends and share repurchases. NVIDIA will pay its next quarterly cash dividend of $0.115 per share on June 20, 2016, to all shareholders of record on May 26, 2016.NVIDIA's outlook for the second quarter of fiscal 2017 is as follows:During the first quarter, NVIDIA achieved progress in each of its four major platforms.Gaming:Professional Visualization:Datacenter:Automotive:
{ "pile_set_name": "OpenWebText2" }
Q: Problems with sprockets when deploying Rails 3.1.rc4 I'm sure that I am just overlooking something simple here but this has been driving me crazy all night! When trying to deploy a Rails 3.1.rc4 application to the Cedar stack on Heroku (I did this successfully a month ago with a similar Gemfile) I am receiving this error: Could not find sprockets-2.0.0.beta.10 in any of the sources My Gemfile looks like this: source 'http://rubygems.org' # Core gem 'rails', '3.1.0.rc4' # Asset template engines gem 'sass-rails', "~> 3.1.0.rc" gem 'coffee-script' gem 'uglifier' # Misc gem 'devise' gem 'jquery-rails' gem 'omniauth' gem 'fb_graph' gem 'compass', git: 'https://github.com/chriseppstein/compass.git', branch: 'rails31' gem 'haml' gem 'cancan' gem 'kaminari' gem 'friendly_id', '~> 3.3.0', git: 'https://github.com/norman/friendly_id.git' gem 'recaptcha', :require => 'recaptcha/rails' gem 'aws-ses', '~> 0.4.3', :require => 'aws/ses' # Local Environment group :test do # Pretty printed test output gem 'turn', :require => false gem 'sqlite3' end # Heroku Environment group :production do gem 'pg' gem 'execjs' gem 'therubyracer' end After searching around and finding this article on Google Groups, I determined that this must be fixable by adding this line gem 'sprockets', '2.0.0.beta10' to my Gemfile and then running bundle update sprockets This failed with Could not find gem 'sprockets (= 2.0.0.beta10, runtime)' in any of the gem sources listed in your Gemfile. and at this point I don't know what to do or how to handle this. Is it possible that I need to upgrade to Rails 3.1.rc5 and if so how may I do that without starting over from scratch? Thank you for any help that you can provide! -Robert A: Just bump your rails version up to rc5 gem 'rails', '3.1.0rc5' then: bundle update
{ "pile_set_name": "StackExchange" }
Mékinac Mékinac may refer to: Mékinac Regional County Municipality, Quebec Saint-Roch-de-Mékinac, Quebec, a parish municipality Saint-Joseph-de-Mékinac, Quebec, a former municipality in the administrative region of Mauricie, Quebec, whose territory was merged with the municipality of Trois-Rives Mékinac River, a tributary of the Saint-Maurice River in Quebec Little Mékinac North River, a tributary of Rivière des Envies, in Mauricie, Quebec Mékinac Lake, in the administrative region of Mauricie, Quebec Mékinac Dam, Québec Mékinac (township) See also Mackinac (disambiguation) Michilimackinac, a historic term for the entire region around the Straits of Mackinac Fort Michilimackinac, a fort on the south side of the straits
{ "pile_set_name": "Wikipedia (en)" }
DESCRIPTION (not provided by the applicant): [unreadable] [unreadable] [unreadable] [unreadable]
{ "pile_set_name": "NIH ExPorter" }
Q: Why can't SBT's thread context classloader load JDK classfiles as resources? lihaoyi test$ tree . └── Foo.scala 0 directories, 1 file lihaoyi test$ cat Foo.scala object Main{ def main(args: Array[String]): Unit = { println(getClass.getClassLoader.getResourceAsStream("java/lang/String.class")) println(getClass.getClassLoader.getClass) println(Thread.currentThread().getContextClassLoader.getResourceAsStream("java/lang/String.class")) println(Thread.currentThread().getContextClassLoader.getClass) } } lihaoyi test$ sbt run [info] Loading global plugins from /Users/lihaoyi/.sbt/0.13/plugins [info] Set current project to test (in build file:/Users/lihaoyi/Dropbox/Workspace/test/) [info] Updating {file:/Users/lihaoyi/Dropbox/Workspace/test/}test... [info] Resolving org.fusesource.jansi#jansi;1.4 ... [info] Done updating. [info] Compiling 1 Scala source to /Users/lihaoyi/Dropbox/Workspace/test/target/scala-2.10/classes... [info] Running Main sun.net.www.protocol.jar.JarURLConnection$JarURLInputStream@18e38ff2 class sbt.classpath.ClasspathUtilities$$anon$1 null class sbt.classpath.ClasspathFilter [success] Total time: 2 s, completed 29 May, 2017 4:14:11 PM lihaoyi test$ Here, we can see that the getClass.getClassLoader and the Thread.currentThread.getContextClassLoader are returning different values. What's more, the Thread.currentThread.getContextClassLoader seems to be refusing to load java/lang/String.class, while the other can. Notably, when I run the jar file using an external tool like scalac/scala, or java, both classloaders are able to load the classfile as a resource lihaoyi test$ scalac Foo.scala lihaoyi test$ scala Main sun.net.www.protocol.jar.JarURLConnection$JarURLInputStream@1b28cdfa class scala.reflect.internal.util.ScalaClassLoader$URLClassLoader sun.net.www.protocol.jar.JarURLConnection$JarURLInputStream@7229724f class scala.reflect.internal.util.ScalaClassLoader$URLClassLoader I would expect SBT to behave similarly: to have the Main.getClass.getClassLoader and the Thread.currentThread().getContextClassLoader both be able to load java/lang/String.class as a resource. What gives? A: Some hints provided by Jason Zaugg (retronym)'s sbt launcher notes. sbt/launcher is a small Scala application that bootstraps an arbitrary Scala program (typically, SBT) described a config file and sourced via Ivy dependency resolution. This creates a child classloader containing Scala 2.10.6. A child of this contains SBT itself and xsbti/interface-0.13.11.jar. SBT needs to use non-standard classloader delegation to selectively hide classes when creating child classloaders for plugin code, for the Scala compiler, or for user code. Some more hints in the sbt 0.13 sources: https://github.com/sbt/sbt-zero-thirteen/blob/v0.13.15/run/src/main/scala/sbt/Run.scala#L57-L62 https://github.com/sbt/sbt-zero-thirteen/blob/v0.13.15/util/classpath/src/main/scala/sbt/classpath/ClasspathUtilities.scala#L71-L72 def makeLoader(classpath: Seq[File], instance: ScalaInstance, nativeTemp: File): ClassLoader = filterByClasspath(classpath, makeLoader(classpath, instance.loader, instance, nativeTemp)) def makeLoader(classpath: Seq[File], parent: ClassLoader, instance: ScalaInstance, nativeTemp: File): ClassLoader = toLoader(classpath, parent, createClasspathResources(classpath, instance), nativeTemp) Basically sbt is a kitchen sink of a Java application that has an arbitrary Scala versions and your code, and your test libraries along with the Oracle/OpenJDK's Java library. To construct a classpath that makes sense without loading them over and over again, it's creating a hierarchy of classloaders each filtered by some criteria. (I think)
{ "pile_set_name": "StackExchange" }
Geographic analysis of diabetes prevalence in an urban area. The objective of this research is to identify the sociodemographic, environmental, and lifestyle factors associated with the geographic variability of Diabetes Mellitus (DM) prevalence in the City of Winnipeg, Manitoba in Canada. An ecological regression study design was employed for this purpose. The study population included all prevalent cases of DM in 1998 for Winnipeg. Predictor and outcome data were aggregated for analysis using two methods. First, the spatial scan statistic was used to aggregate study data into highly probable diabetes prevalence clusters. Secondly, predictor and outcome data were aggregated to existing administrative health areas. Analysis of variance and spatial and non-spatial linear regression techniques were used to explore the relationship between predictor and outcome variables. The results of the two methods of data aggregation on regression results were compared. Mapping and statistical analysis revealed substantial clustering and small-area variations in the prevalence of DM in the City of Winnipeg. The observed variations were associated with variations in socioeconomic, environmental and lifestyle characteristics of the population. The two methods of data aggregation used in the study generated very similar results in terms of identifying the geographic location of DM clusters and of the population characteristics ecologically correlated to those clusters. High rates of DM prevalence are strongly correlated with indicators of low socioeconomic status, poor environmental quality and poor lifestyles. This analysis further illustrates what a useful tool the spatial scan statistic can be when used in conjunction with ecological regression to explore the etiology of chronic disease.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The present invention is related to a multi-specification read/write signal transmission module for silicon disks, and especially to a signal transmission module for silicon disks (flash memory cards/small memory cards) of various specifications in the markets, it is provided with a structure with a common space for reading and writing on silicon disks of various specifications to thereby satisfy the requirement of customers. 2. Description of the Prior Art The silicon disks developed in the recent years are light, thin and small, they have the superior features of high storage capacity, vibration durability, repeated memorizing for many times etc., and are widely applied in the field of IA (Information Appliance) and many portable digital products. For example, merely all the popular products including personal digital assistants (PDA), digital cameras (DSC), digital walkmans (MP3 Players) etc. in the markets use the silicon disks as storage media. By virtue that IA is a newly rising field, its products are novel and multivariable; thereby, the criteria of the silicon disks form a large market that makes struggles for development as well as competitions among international big manufacturers. There is no uniform standard or specification presently in the art of silicon disks in the whole world. Products that are mutually related include at least PC ATA cards, CF cards (CompactFlash cards), SM cards (Smart Media cards), MMC cards (MultiMedia cards), MS cards (Memory Stick cards) and SD cards (Secure Digital cards) etc.; and not only are multifactorial, but also have their respective predominance in the markets. The multiple specifications of the silicon disks induce market strategies as to manufacturers. For example, if customers find that their neighboring people do not use MS cards or are uneasy to purchase MS cards, he may think about whether he will purchase and use a digital camera for MS cards. On the contrary, a customer who have purchased a digital camera for MS cards may not purchase a PDA of some other brand, rather, he may still want to purchase a PDA still of the kind using MS cards, unless he wants to use another kind of specification of silicon disk. For the large group of customers, however, lacking of uniform standards and specifications for silicon disks is not a good thing. This is because that silicon disks are unable to achieve effective applicability on various portable digital products, computer systems and peripheral equipments of computers, and this makes inconvenience of use of consumers. The computers are quite restrained in selection of using digital products. Therefore, it is an extremely important direction of consideration to make efforts to provide a module compatible with all known specifications for silicon disks and capable of integrating all the electronic transmission modes of these silicon disks, in order that the module can be built in or externally connected to computers and other digital products to thereby increase the convenience for consumers in using silicon disks of different specifications. The Prior Art During study and development of the present invention, the inventor had designed a primary structure for reading and writing on silicon disks for the purpose of achieving the above stated objects. The structure of the module in practicing is shown in FIG. 1: Wherein, a xe2x80x9cUxe2x80x9d shaped base 1 is provided on the upper and the lower sides thereof respectively with an electric circuit board 2, the xe2x80x9cUxe2x80x9d shaped base 1 is formed in the center thereof a receiving space 3. A plurality of guide recesses 4 are provided on the lateral arms at the two lateral sides of the receiving space 3. Each of the guide recesses 4 has the sizes of length and width thereof in coincidence with a kind of silicon disk 5; thereby, several kinds of silicon disks 5 can be inserted in the receiving space 3. And the upper and the lower electric circuit boards 2 are provided on the surfaces thereof confronting the receiving space 3 with a plurality of protruding contact pin sets 6, each pin set 6 is positioned in corresponding to that of the signal pin set 7 of a silicon disk 5. When the silicon disk 5 is inserted into the receiving space 3, the pin sets 6 of the upper and the lower electric circuit boards 2 can be connected with the signal pin set 7 of a silicon disk 5 for reading the data in the silicon disk 5. The primary structure designed by the inventor of the present invention can surely achieve the object of reading on several kinds of silicon disks; however, it cannot suit all kinds of silicon disks. This is mainly because that the contact pin sets 6 provided on the upper and the lower electric circuit boards 2 and protruding into the receiving space 3 is vertically contact with the silicon disk 5; but the signal pin sets of some silicon disks 5 are provided on the front end face of the silicon disks 5 (such as PC ATA cards or CF cards as shown in FIG. 5 depicting a silicon disk Axe2x80x2), thereby, the contact pin sets 6 provided on the upper and the lower electric circuit boards 2 can not contact or connect with such a silicon disk 5, they do not suit all kinds of silicon disks. To solve the above stated problems and to render a read/write signal transmission module for silicon disks to suit all kinds of silicon disks, the inventor of the present invention reconsider the above stated primary structure concentrating on designing of the different specifications, and developed the multi-specification read/write signal transmission module for silicon disks of the present invention after nonstop study and tests, with the module, all known silicon disks with different specifications can be inserted and read/written. In particular, the present invention is provided on the center of a xe2x80x9cUxe2x80x9d shaped base with a partitioning plate, an upper and a lower lid, so that the base is formed therein a first and a second receiving chamber. The base is provided respectively on the lateral arms at the lateral sides of the first and the second receiving chambers with a plurality of guide recesses, thereby, different kinds of silicon disks with different specifications can be inserted therein. The first receiving chamber is provided therein at least with a vertically contacting pin set, and the second receiving chamber is provided therein at least with a horizontally contacting pin set, in order that when silicon disks with different specifications are individually inserted into the first or the second receiving chamber, they can contact respectively with the vertically contacting pin set or the horizontally contacting pin set. In this way, the module of the present invention can suit all the silicon disks with different specifications in the markets. The primary object of the present invention is that, by the fact that the above stated vertically and the horizontally contacting pin sets are allocated at different orientations, when a silicon disk is inserted into the module, it can be connected with one of the vertically and the horizontally contacting pin sets to proceed to transmit signals for and read/write on the silicon disk. Thereby, the module of the present invention can meet module of the present invention can of multiple silicon disks. Another object of the present invention is that, after the base is divided into the upper first and the lower second receiving chambers by means of the partitioning plate, the first and the second receiving chambers can respectively receive a silicon disk of its own specification. This makes customers convenient in use. The present invention will be apparent in its structural characteristics after reading the detailed description of the preferred embodiment thereof in reference to the accompanying drawings.
{ "pile_set_name": "USPTO Backgrounds" }
[Roles of Inflammatory Reaction and Cytokines in Chronic Postsurgical Pain]. Chronic postsurgical pain (CPSP) is characterized by high incidence,prolonged duration,multiple risk factors,and complicated pathogenesis. It seriously impairs patients' quality of life,especially after thoracotomy. Perioperative nerve injury is a major cause of CPSP. Meanwhile,the excessive neuroinflammation and inflammatory cytokines caused by surgery also accelerate the formation of CPSP. This review aims to provide an overview of the recent advances in the roles of inflammatory reaction and cytokines in the development of CPSP.
{ "pile_set_name": "PubMed Abstracts" }
module Authority # Should be included into all models in a Rails app. Provides the model # with both class and instance methods like `updatable_by?(user)` # Exactly which methods get defined is determined from `config.abilities`; # the module is evaluated after any user-supplied config block is run # in order to make that possible. # All delegate to the methods of the same name on the model's authorizer. module Abilities extend ActiveSupport::Concern included do |base| class_attribute :authorizer_name # Set the default authorizer for this model. # - Look for an authorizer named like the model inside the model's namespace. # - If there is none, use 'ApplicationAuthorizer' self.authorizer_name = begin "#{base.name}Authorizer".constantize.name rescue NameError "ApplicationAuthorizer" end end def authorizer self.class.authorizer.new(self) # instantiate on every check, in case model has changed end module Definitions # Send all calls like `editable_by?` to an authorizer instance # Not using Forwardable because it makes it harder for users to track an ArgumentError # back to their authorizer Authority.adjectives.each do |adjective| define_method("#{adjective}_by?") { |*args| authorizer.send("#{adjective}_by?", *args) } end end include Definitions module ClassMethods include Definitions def authorizer=(authorizer_class) @authorizer = authorizer_class self.authorizer_name = @authorizer.name end # @return [Class] of the designated authorizer def authorizer @authorizer ||= authorizer_name.constantize # Get an actual reference to the authorizer class rescue NameError raise Authority::NoAuthorizerError.new( "#{authorizer_name} is set as the authorizer for #{self}, but the constant is missing" ) end end end NoAuthorizerError = Class.new(RuntimeError) end
{ "pile_set_name": "Github" }