text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Q: How to get another class based upon type of object? I have a use case where I want to get another class based upon the type of object. For one solution, I have created a dict where I am maintaining this relation and using type to match among classes. For example, consider the below code class classA(object): def __init__(self): print "A called" class classB(object): def __init__(self): print "B called" MAP = { A: classA, B: classB } class C(object): pass class A(C): pass class B(C): pass obj can be object of A or B. new_cls = MAP.get(type(obj), 'None') new_obj = new_cls() Is there a better way to achieve this? A: Looks like you're trying to reinvent type-based polymorphic dispatch... I assume you don't have the hand on classes A and B (=> they belong to the stdlib or a third-part one that you don't want to fork), else the very obvious solution would be to simply implement call (or any other method) on those classes directly. In this context, your solution is actually quite pythonic. The other possible pythonic solution would be using functools.singledispatch, and the last resort evil ugly but-sometimes-a-lifesaver solution to monkeypatch A and B. | Mid | [
0.584810126582278,
28.875,
20.5
] |
Tax flight: King seeks protection of Queen Remember when Canada was regarded as the high-tax, big-government country, and we weren’t? How times have changed. Burger King is considering becoming Canadian through a tax inversion deal with donut chain Tim Horton’s, aware that north of the border “corporate tax rates are as much as 15 percentage points lower than in the United States,” in the words of Daniel Ikenson at Cato, who writes: “If the acquisition comes to fruition and ultimately involves a corporate ‘inversion,’ consider it not a problem, but a symptom of a problem. The real problem is that U.S. policymakers inadequately grasp that we live in a globalized economy, where capital is mobile and products and services can be produced and delivered almost anywhere in the world, and where value is created by efficiently combining inputs and processes from multiple countries. Globalization means that public policies are on trial and that policymakers have to get off their duffs and compete with most every other country in the world to attract investment, which flows to the jurisdictions where it is most productive and, crucially, most welcome to be put to productive use.” And the fact is that the United States, once the domicile of choice for international business, has slipped badly down the ratings of how difficult it is to do business in various countries. Policymakers “should repair the incentives that drive capital away from the United States.” Full post here. More: Stephen Bainbridge. | Mid | [
0.6092715231788081,
34.5,
22.125
] |
Intraocular pressure trends in pregnancy and in the third trimester hypertensive patients. Systemic blood pressure is positively related to intraocular pressure. During the third trimester of pregnancy decreased intraocular pressure while increased blood pressure has been reported. After taking into account all those factors that can affect intraocular pressure, the present study investigated whether or not the high blood pressure found in late pregnancy influences the known ocular hypotensive effect of late pregnancy. Normotensive subjects in all trimesters of pregnancy and non-pregnant control groups along with third trimester hypertensive subjects were studied. Intraocular pressure was measured with the Goldmann applanation tonometer. In the second and third trimester subjects, the mean intraocular pressure was significantly lower than in the non-pregnant control group. The differences between first and second, first and third, and second and third trimesters of pregnancy were (mean +/- s.d.) -0.5 +/- 1.2 (p < 0.05), -1.5 +/- 1.7 (p < 0.001), and -1.0 +/- 2.1 (p < 0.01) mmHg respectively. The mean difference between third trimester hypertensive and third trimester normotensive pregnant women was 0.53 +/- 1.5 mmHg (p < 0.05). With advancing pregnancy, intraocular pressure decreases. The mean intraocular pressures of third trimester hypertensive pregnant women were significantly higher from that of third trimester non-hypertensives. Knowledge of the normal level of intraocular pressure in various stages of pregnancy may help glaucoma screeners. | High | [
0.668316831683168,
33.75,
16.75
] |
Search This Blog Tuesday, 23 April 2013 POLICE SWOOP TO ARREST MORE ACTIVISTS According to a source within the democratic movement, Secretary General of SWAYOCO Maxwell Dlamini and Secretary for International Affairs Sonkhke Dube were arrested this morning. “They have been arrested and are in the custody of the Royal Police. The charges are not clear. Both of them were arrested this morning,” the source says, writes Kenworthy News Media. According to PUDEMO, “about 23 Police officers arrested SWAYOCO Secretary for International, Comrade Sonkhe Dube. He was arrested at Matsanjeni. This Government is in a serious mission to silence and send more threats to the entire glorious movement.” Last time Maxwell Dlamini was arrested he was tortured be Swazi police and put on trial for possession of explosives, a case that has been postponed several times. Africa Contact led a campaign for his release that saw his released on bail. The arrests of the two SWAYOCO leaders follow the police clamp down on a SWAYOCO rally on April 19 to campaign for an election boycott. There have also been several recent arrests of other activists in Swaziland, including Wonder Mkhonza, Mfanawnkosi ‘Boer’ Mntshaliand and Derrick Nkambule, the latter two who were allegedly tortured according to South African trade union federation COSATU. | Low | [
0.506437768240343,
29.5,
28.75
] |
The Tec kinases Itk and Rlk regulate NKT cell maturation, cytokine production, and survival. The Tec kinases Itk and Rlk are required for efficient positive selection of conventional CD4+ and CD8+ T cells in the thymus. In contrast, recent studies have shown that these Tec kinases are dispensable for the development of CD8+ T cells with characteristics of innate T cells. These findings raise questions about the potential role of Itk and Rlk in NKT cell development, because NKT cells represent a subset of innate T cells. To address this issue, we examined invariant NKT cells in Itk-/- and Itk/Rlk-/- mice. We find, as has been reported previously, that Itk-/- mice have reduced numbers of NKT cells with a predominantly immature phenotype. We further show that this defect is greatly exacerbated in the absence of both Itk and Rlk, leading to a 7-fold reduction in invariant NKT cell numbers in the thymus of Itk/Rlk-/- mice and a more severe block in NKT cell maturation. Splenic Itk-/- and Itk/Rlk-/- NKT cells are also functionally defective, because they produce little to no cytokine following in vivo activation. Tec kinase-deficient NKT cells also show enhanced cell death in the spleen. These defects correlate with greatly diminished expression of CD122, the IL-2R/IL-15R beta-chain, and impaired expression of the T-box transcription factor, T-bet. These data indicate that the Tec kinases Itk and Rlk provide important signals for terminal maturation, efficient cytokine production, and peripheral survival of NKT cells. | High | [
0.713643178410794,
29.75,
11.9375
] |
Little hints maybe help you to make decision Hide Property DetailsDescription from the owner 1 bedrooms 1 bathrooms Sleeps 3 Apartment Bedrooms: 1 Bathrooms: 1 Sleeps: 3 Type: Apt. / Condo Little hints maybe help you to make decision Description from the owner Jenny's Cottage "Jenny's Cottage" is a new remodel condo , just finish at Jan.2014 . On Jan.2015 we just upgrade new queen bed. Clean, cute, quiet, romantic one bedroom one bath unit with living room and useful kitchenette, as well as a beautiful lanai with ocean, sunset and swimming pool view. Located in the popular and world famous Waikiki central area, Kuhio Ave! Bring your ocean gear and walk to your blue water dream place just 3 blocks away, or stroll leisurely down beautiful Kalakaua Ave., to luxury shopping and 5-star dining! We really care about what our guest feel, we try to make you belong to Hawaii ! I and my husband do lots of DIY ! In our condo I designed the style and decoration , my husband Rick design the bedroom curtain, paint our living room furniture,like dining table chairs ...... In my mind Rick is a best photographer ,but his full time job is physician! So he contributed some of his beautiful photos to hang on the wall for our guests to enjoy ! Stay with us you will find a lot of interesting book in our book shelf talk about Hawaii , Waikiki . Those book you will hard to find in the book store and Internet now . Because all those book is come from our family remain . This not like marketing commercial book . Those are real Hawaii history and culture! I hope you and your guest will enjoy in my little dream cottage ! LITTLE HINTS maybe help you to make the right decisions. Waikiki has lots of opportunities for vacation rentals. Condo photos alone do not tell the whole story. Several other factors should be considered before you choose a condo for you vacation, so that your experience will be satisfying. We are Waikiki experts, and offer these tips: 1. About the noise. Waikiki is a very noisy city area. Most rooms are exposed to sounds of the city, some more than others. Check the map for the condo location and proximity to streets and points of interest such as outdoor bars, restaurants and music areas. Some buildings and hotels in Waikiki are right on the beach, but also adjacent to bars and entertainment areas that are active from morning until very late at night, with very little quiet time. 2. About air conditioning: What kind AC does the room have? Central AC is much more quite than a window AC . Small studio condos often have a window AC located near the bed . If you don't have any problem about noises then don't worry! 3. Enjoy your vacation in Hawaii! Where you stay can influence how you feel about your visit, so choose carefully. Waikiki has hundreds of buildings, some are better located than others. Choose a condo that is in a pleasant area, and within short walking distance to the areas of your interest. Use Google Map to get an idea of the local environment. Choose a neighborhood that fits your expectations. 4. About room privacy: Vacation condos are usually studios or one bedroom units. Some one bedroom units have a thin room divider rather than an actual door for the bedroom. If you prefer extra privacy you may want to check on this. 5. Refrigerator size. If you plan to stay more than two or three nights and also plan to cook in the condo, refrigerator size may make a difference. A Mini-size refrigerator may not be enough for your cold storage needs. 6. Security: Waikiki is generally a safe area, but understandably, security is important to most visitors. Some buildings are more secure than others depending on the size and available security staff. Our Condo Features: Entertainment: HDTV . Free cable TV , Sony Bluetooth speaker , Hi-speed internet Living room : Sofa with pull out twin bed . 2 dining chairs, 2 stools, dining table adjustable size. Lanai : out door dining set , ocean view Kitchen : cook top, cookware, utensils, flatware and dinnerware, toaster oven, blender, microwave, rice cooker, coffee maker, full size refrigerator, dish soap. Bathroom : Brand quality towels. Hair dryer. Bedroom : Full size bed and designer comforter bed set. Nice comfortable pillows from quality brand Ralph Lauren. Hangers in the closet!! Clothes steamer! Parking in same building . No need to fight for parking in busy Waikiki! Swimming pool . Laundry room at the basement area in building. Perfect size for three adults non smoking, sorry no pets, due to building restrictions. The famous Waikiki Shuttle will take you to Ala Moana Shopping Mall, "The Heart of Oahu"! Aloha & Mahalo ! Additional fees Damage Deposit $200 per stay Cleaning fee $100 per stay lots of DIY ! In our condo I designed the style and decoration , my husband Rick design the bedroom curtain, paint our living room furniture,like dining table chairs ...... In my mind Rick is a best photographer ,but his full time job is physician! So he contributed some of his beautiful photos to hang on the wall for our guests to enjoy ! Stay with us you will find a lot of interesting book in our book shelf talk about Hawaii , Waikiki . Those book you will hard to find in the book store and Internet now . Because all those book is come from our family remain . This not like marketing commercial book . Those are real Hawaii history and culture! I hope you and your guest will enjoy in my little dream cottage ! LITTLE HINTS maybe help you to make the right decisions. Waikiki has lots of opportunities for vacation rentals. Condo photos alone do not tell the whole story. Several other factors should be considered before you choose a condo for you vacation, so that your experience will be satisfying. We are Waikiki experts, and offer these tips: 1. About the noise. Waikiki is a very noisy city area. Most rooms are exposed to sounds of the city, some more than others. Check the map for the condo location and proximity to streets and points of interest such as outdoor bars, restaurants and music areas. Some buildings and hotels in Waikiki are right on the beach, but also adjacent to bars and entertainment areas that are active from morning until very late at night, with very little quiet time. 2. About air conditioning: What kind AC does the room have? Central AC is much more quite than a window AC . Small studio condos often have a window AC located near the bed . If you don't have any problem about noises then don't worry! 3. Enjoy your vacation in Hawaii! Where you stay can influence how you feel about your visit, so choose carefully. Waikiki has hundreds of buildings, some are better located than others. Choose a condo that is in a pleasant area, and within short walking distance to the areas of your interest. Use Google Map to get an idea of the local environment. Choose a neighborhood that fits your expectations. 4. About room privacy: Vacation condos are usually studios or one bedroom units. Some one bedroom units have a thin room divider rather than an actual door for the bedroom. If you prefer extra privacy you may want to check on this. 5. Refrigerator size. If you plan to stay more than two or three nights and also plan to cook in the condo, refrigerator size may make a difference. A Mini-size refrigerator may not be enough for your cold storage needs. 6. Security: Waikiki is generally a safe area, but understandably, security is important to most visitors. Some buildings are more secure than others depending on the size and available security staff. About Us Love for FlipKey As featured in USA TODAY and recommended by Travel + Leisure in its annual Villa Guide: FlipKey Elsewhere New to FlipKey? FlipKey is a vacation rental marketplace with more than 300,000 rentals around the world. Find the perfect place to stay for your trip, and get great value along with the space, privacy and amenities of home. | Low | [
0.517647058823529,
33,
30.75
] |
Modern computing systems can include a variety of communication devices that send and receive data. Examples of communication devices include parallel interface devices and serial interface devices such as the universal serial bus (USB). USB is an industry protocol designed to standardize the interfaces between computer devices for communication and supplying electrical power. The USB protocol has enjoyed widespread adoption in nearly every computing device, and has received tremendous support in terms of technology development with well-established intellectual property (IP) portfolios and standardized software infrastructure. The standard USB2 specification uses 3.3 Volt analog signaling for communications between the two USB2 ports. The 3.3 Volt signal strength tends to introduce integration challenges because some advanced semiconductor processes are moving towards a very low geometry leading to the gate oxide of a CMOS transistor no longer able to tolerate higher voltages, such as 3.3 Volt. In addition, the standard USB2 specification results in relatively high levels of power consumption at both idle and active states. As a result, USB2 may not be suitable for devices that place stringent specifications on I/O power consumption, such as mobile platforms. | Mid | [
0.631355932203389,
37.25,
21.75
] |
Search Pulse 1 Bradford 10 Year Old "Wanted To Be Drug Dealer" A charity worker spoke about young people's aspirations at a council meeting. A 10-year-old boy from Bradford told youth workers he aspired to be a drug dealer, and had a worrying knowledge about Class A drugs – councillors have been told. The shocking story was told by a local charity worker during a presentation to Council leaders into what is being done to tackle the exploitation of young people in Bradford. Bradford Council’s Executive yesterday received an annual update on how vulnerable young people and adults in Bradford were being protected. Discussing how children are often exploited by criminal gangs, one police officer said they have come across young teens who see drug dealing as a “viable career option” – and that there are plenty of gangs willing to exploit this. The Council receives a report on safeguarding each year, and it deals with issues such as child sexual exploitation/grooming and the exploitation of adults with disabilities. In the past year the issue of child criminal exploitation has exploded into the public eye. It involves criminal gangs targeting vulnerable people and encouraging them to commit crimes on their behalf. It is often called County Lines and, although it was rarely discussed a few years ago, is now a major focus of Bradford’s safeguarding teams. Superintendent Alisa Newman from West Yorkshire Police told members: “Some young people see it as a viable opportunity for employment, as a ‘street pharmacist.’ “They might say ‘why not do that and make some money?’” She said a huge amount of work was being done to recognise children and adults that might fall under the influence of criminal gangs. And it also required the Council, police and other agencies to look at young people who have recently become adults – but may still become targets of gangs. Locally charities like Barnardos and the YMCA were delivering projects to protect young people, to help them recognise the signs they were being exploited, and to break any cycles of criminal or harmful behaviour. Leona Dinsdale from the YMCA told members of the intervention work being done in Bradford. She said: “We look at issues like vulnerability, self-esteem and internet safety. “We have some young people who aspire to be drug dealers. We had one young man who had that aspiration. His family were involved in crime and that had normalised it for him. “He was only 10 years old and he could tell me about what cannabis was, what cocaine was, what heroin was. “Over an eight week course we managed to engage with him and by the end of the eight weeks he was able to recognise the importance of hard work and could better negotiate the world around him. “A lot of the young people haven’t spoken about these kinds of things with other people before.” Councillor Adrian Farley, portfolio holder for Children and Families, said: “Not all of this report makes for a pleasant read, but it is important we know what is going on.” Supt. Newman said one project that was being run to deter children from a life of crime saw young people writing to family members in prison. She said: “We change the narrative. We work with a child who might have been pulled into a life of crime. Often the parent will write back from prison and tell them ‘don’t end up like me.’ “We speak to a lot of young people who know what County Lines is, but they don’t know how to say no, they don’t know how to stop. The work to tackle this is fundamental.” | Mid | [
0.5788235294117641,
30.75,
22.375
] |
--- abstract: | Let $V$ be an $n$-dimensional vector space over the finite field ${\mathbb{F}}_q$. The spherical building $X_V$ associated with $GL(V)$ is the order complex of the nontrivial linear subspaces of $V$. Let ${\mathfrak{g}}$ be the local coefficient system on $X_V$, whose value on the simplex $\sigma=[V_0 \subset \cdots \subset V_p] \in X_V$ is given by ${\mathfrak{g}}(\sigma)=V_0$. The homology module ${\mathcal{D}}^1(V)={\tilde{H}}_{n-2}(X_V;{\mathfrak{g}})$ plays a key role in Lusztig’s seminal work on the discrete series representations of $GL(V)$. Here, some further properties of ${\mathfrak{g}}$ and its exterior powers are established. These include a construction of an explicit basis of ${\mathcal{D}}^1(V)$, a computation of the dimension of ${\mathcal{D}}^k(V)={\tilde{H}}_{n-k-1}(X_V;\wedge^k {\mathfrak{g}})$, and the following twisted analogue of a result of Smith and Yoshiara: For any $1 \leq k \leq n-1$, the minimal support size of a non-zero $(n-k-1)$-cycle in the twisted homology ${\tilde{H}}_{n-k-1}(X_V;\wedge^k {\mathfrak{g}})$ is $\frac{(n-k+2)!}{2}$. \ \ **2000 MSC:** 55U10 , 20E42\ **Keywords:** Spherical buildings, Homology of local systems author: - 'Roy Meshulam[^1]' - 'Shira Zerbib[^2]' title: | On Lusztig-Dupont Homology\ of Flag Complexes --- Introduction {#s:intro} ============ Let $q$ be a prime power and let $V$ be an $n$-dimensional vector space over the finite field ${\mathbb{F}}_q$. The spherical building associated with $G=GL(V)$ is the order complex $X_V$ of the nontrivial linear subspaces of $V$: The vertices of $X_V$ are the linear subspaces $0 \neq U \subsetneq V$, and the $k$-simplices are families of subspaces of the form $\{U_0,\ldots,U_k\}$, where $U_0 \subsetneq \cdots \subsetneq U_k$. The homotopy type of $X_V$ was determined by Solomon and Tits [@Solomon] (see also Theorem 4.73 in [@AB08]). \[t:build\] $X_V$ is homotopy equivalent to a wedge of $q^{\binom{n}{2}}$ $(n-2)$-spheres. In particular, the reduced homology of $X_V$ with coefficients in a field ${\mathbb{K}}$ is given by $$\dim {\tilde{H}}_i(X_V;{\mathbb{K}})= \left\{ \begin{array}{ll} 0 & i \neq n-2, \\ q^{\binom{n}{2}} & i=n-2. \end{array} \right.~~$$ \ \ The natural action of $G$ on $X_V$ induces a representation of $G$ on ${\tilde{H}}_{n-2}(X_V;{\mathbb{K}})$. Viewed as a $G$-module, ${\tilde{H}}_{n-2}(X_V;{\mathbb{K}})$ is the [*Steinberg module*]{} of $G$ over ${\mathbb{K}}$ (see e.g. section 6.4 in [@Smith]). We recall some facts concerning $X_V$ and the Steinberg module. For a subset $S\subset V$, let $\langle S \rangle={{\rm span} \,}(S)$ denote the linear span of $S$. Let $[n]=\{1,\ldots,n\}$. Let $B=\{v_1,\ldots,v_n\}$ be a basis of $V$ and let ${\tilde{B}}$ be the set of vertices of $X_V$ given by $${\tilde{B}}=\big\{ \langle v_i:i \in I \rangle~:~ \emptyset \neq I \subsetneq [n]\big\}.$$ The induced subcomplex $X_V[{\tilde{B}}]$ is the [*apartment*]{} determined by $B$. Clearly, $X_V[{\tilde{B}}]$ is isomorphic to the barycentric subdivision of the boundary of a $(n-1)$-simplex, and thus $${\tilde{H}}_{n-2}(X_V[{\tilde{B}}];{\mathbb{K}}) \cong {\mathbb{K}}.$$ We next exhibit a generator $z_B$ of ${\tilde{H}}_{n-2}(X_V[{\tilde{B}}];{\mathbb{K}})$. For a permutation $\pi$ in the symmetric group ${\mathbb{S}}_n$ and for $1 \leq i \leq n$, let $V_{\pi}(i)=\langle v_{\pi(1)},\ldots, v_{\pi(i)} \rangle$ and let $\sigma_{\pi}$ be the ordered $(n-2)$-simplex $$\sigma_\pi =[V_{\pi}(1) \subset \cdots \subset V_{\pi}(n-1)].$$ Then $z_B=\sum_{\pi \in {\mathbb{S}}_n} {\rm sgn}(\pi) \sigma_{\pi}$ is a generator of ${\tilde{H}}_{n-2}(X_V[{\tilde{B}}];{\mathbb{K}})$. The following explicit construction of a basis of ${\tilde{H}}_{n-2}(X_V[{\tilde{B}}];{\mathbb{K}})$ is due to Solomon [@Solomon] (see also Theorem 4.127 in [@AB08]). \[t:basis\] Let $\sigma$ be a fixed $(n-2)$-simplex of $X_V$. Then $$\big\{z_B: B \text{~is~a~basis~of~} V \text{such~that~} \sigma \in X_V[{\tilde{B}}]\big\}$$ is a basis of ${\tilde{H}}_{n-2}(X_V[{\tilde{B}}];{\mathbb{K}})$. The [*support*]{} of a $(n-2)$-chain $c=\sum_{\sigma} a_{\sigma} \sigma \in C_{n-2}(X_V;{\mathbb{K}})$ is $${{\rm supp}}(c)=\{\sigma:a_{\sigma} \neq 0\}.$$ Clearly, $|{{\rm supp}}(z_B)|=n!$ for any basis $B$ of $V$. Smith and Yoshiara [@SY95] proved that the $z_B$’s are in fact the nontrivial $(n-2)$-cycles of minimal support in $X_V$. \[t:wcycle\] $$\min \big\{ |{{\rm supp}}(z)|: 0 \neq z \in {\tilde{H}}_{n-2}(X_V;{\mathbb{K}}) \big\} = n! .$$ In this paper we study analogues of Theorems \[t:build\], \[t:basis\] and \[t:wcycle\] for the homology of $X_V$ with certain local coefficient systems introduced by Lusztig and Dupont. We first recall some definitions. Let $X$ be a simplicial complex on a vertex set $S$. Let $\prec$ be an arbitrary fixed linear order on $S$. For $k \geq -1$ let $X(k)$ denote the set of $k$-dimensional simplices of $X$, and let $X^{(k)}$ denote the $k$-dimensional skeleton of $X$. A simplex $\sigma \in X(k)$ will be written as $\sigma=[s_1,\ldots,s_{k+1}]$ where $s_1 \prec \cdots \prec s_{k+1}$. The $i$-th face of $\sigma$ as above is the $(k-1)$-simplex $\sigma_i=[s_1,\ldots,s_{i-1},s_{i+1},\ldots,s_{k+1}]$. For a $0$-dimensional simplex $\sigma= [s_1]$, let $\sigma_1=\emptyset$ be the empty simplex. A [*local system*]{} ${{\cal F}}$ on $X$ is an assignment of an abelian group ${{\cal F}}(\sigma)$ to each simplex $\sigma \in X$, together with homomorphisms $\rho_{\sigma}^{\tau}:{{\cal F}}(\tau) \rightarrow {{\cal F}}(\sigma)$ for each $\sigma \subset \tau$ satisfying the usual compatibility conditions: $\rho_{\sigma}^{\sigma}={\rm identity}$, and $\rho_{\eta}^{\sigma} \rho_{\sigma}^{\tau}=\rho_{\eta}^{\tau}$ if $\eta \subset \sigma \subset \tau$. A ${{\cal F}}$-twisted $k$-chain of $X$ is a formal linear combination $c=\sum_{\sigma \in X(k)} c(\sigma) \sigma$, where $c(\sigma) \in {{\cal F}}(\sigma)$. Let $C_k(X;{{\cal F}})$ denote the group of ${{\cal F}}$-twisted $k$-chains of $X$. For $k \geq 0$ define the boundary map $$\partial_k:C_k(X;{{\cal F}}) \rightarrow C_{k-1}(X;{{\cal F}})$$ by $$\partial_k \left(\sum_{\sigma \in X(k)} c(\sigma) \sigma\right)=\sum_{\sigma \in X(k)} \sum_{i=1}^{k+1} (-1)^{i+1} \rho_{\sigma_i}^{\sigma}\big(c(\sigma)\big) \sigma_i.$$ For $k=-1$ let $\partial_{-1}$ denote the zero map $C_{-1}(X;{{\cal F}})={{\cal F}}(\emptyset) \rightarrow 0$. The homology of $X$ with coefficients in ${{\cal F}}$, denoted by $H_*(X,{{\cal F}})$, is the homology of the complex $\oplus_{i \geq 0} C_i(X;{{\cal F}})$. The reduced homology ${\tilde{H}}_*(X,{{\cal F}})$ is the homology of $\oplus_{i \geq -1} C_i(X;{{\cal F}})$. Let $X, Y$ be two simplicial complexes and let $f:X \rightarrow Y$ be a simplicial map such that $\dim f(\sigma)=\dim \sigma$ for all $\sigma \in X$. Let ${{\cal G}}$ be a local system on $Y$. The inverse image system ${{\cal F}}=f^{-1}{{\cal G}}$ given by ${{\cal F}}(\sigma)={{\cal G}}(f(\sigma))$ is a local system on $X$. The induced mapping on homology is denoted by $f_*:{\tilde{H}}_k(X;{{\cal F}}) \rightarrow {\tilde{H}}_k(Y;{{\cal G}})$. For further discussion of local coefficient homology, see e.g. chapter 7 in [@Benson91] and chapter 10 in [@Smith]. Lusztig, in his seminal work [@L74] on discrete series representations of $GL(V)$, defined and studied the local system ${\mathfrak{g}}$ on $X_V$ given by ${\mathfrak{g}}(U_1 \subset \cdots \subset U_{\ell})=U_1$ and ${\mathfrak{g}}(\emptyset)=V$, where the connecting homomorphisms $\rho_{\sigma}^{\tau}$’s are the natural inclusion maps. Dupont, in his study of homological approaches to scissors congruences [@Dupont82], extended some of Lusztig’s results to the higher exterior powers $\wedge^k {\mathfrak{g}}$ over flag complexes of Euclidean spaces. For $i \geq 0$ let ${\tilde{H}}_i(X_V;\wedge^k {\mathfrak{g}})$ denote the $i$-th homology ${\mathbb{F}}_q$-module of the chain complex of $X_V$ with $\wedge^k {\mathfrak{g}}$ coefficients. Note that $C_{-1}(X_V;\wedge^k {\mathfrak{g}})=\wedge^k V$. The following result was proved by Lusztig (Theorem 1.12 in [@L74]) for $k=1$, and extended by Dupont (Theorem 3.12 in [@Dupont82]) to all $k \geq 1$. \[t:ld\] Let $1 \leq k \leq n-1$. Then ${\tilde{H}}_i(X_V;\wedge^k {\mathfrak{g}})=0$ for $i \neq n-k-1$. Let ${\mathcal{D}}^k(V)={\tilde{H}}_{n-k-1}(X_V;\wedge^k {\mathfrak{g}})$. Lusztig (Theorem 1.14 in [@L74]) proved that $$\label{e:dimd1} \dim {\mathcal{D}}^1(V)=\prod_{i=1}^{n-1} (q^i-1).$$ The proof of (\[e:dimd1\]) in [@L74] is based on the case $k=1$ of Theorem \[t:ld\], combined with an Euler characteristic computation. In Section \[s:base1\] we describe an explicit basis of ${\mathcal{D}}^1(V)$. This construction may be regarded as a twisted counterpart of Theorem \[t:basis\]. Concerning the dimension of ${\mathcal{D}}^k(V)$ for general $k$, we prove the following extension of Theorem \[e:dimd1\]. \[t:dimdkk\] $$\label{e:dimfor1} \dim {\mathcal{D}}^k(V)=\sum_{1 \leq \alpha_1<\cdots <\alpha_{n-k} \leq n-1} \prod_{j=1}^{n-k}(q^{\alpha_j}-1).$$ Our final result is an analogue of the Smith-Yoshiara Theorem \[t:wcycle\] for the coefficient system $\wedge^k {\mathfrak{g}}$. \[t:mindkv\] $$\min \big\{|{{\rm supp}}(w)|:0 \neq w \in {\mathcal{D}}^k(V)\big\}=\frac{(n-k+2)!}{2}.$$ \ \ The paper is organized as follows. In Section \[s:base1\] we construct an explicit basis for ${\mathcal{D}}^1(V)$. In Section \[s:dimcdk\] we use an exact sequence due to Dupont to prove Theorem \[t:dimdkk\]. In Section \[s:mincyc\] we recall the Nerve lemma for homology with local coefficients, and obtain a vanishing result for a certain local system on the simplex. These results are used to prove Theorem \[t:mindkv\]. We conclude in Section \[s:conc\] with some remarks and open problems. A Basis for ${\mathcal{D}}^1(V)$ {#s:base1} ================================ In this section we construct an explicit basis for ${\mathcal{D}}^1(V)={\tilde{H}}_{n-2}(X_V;{\mathfrak{g}})$. Let $V={\mathbb{F}}_q^n$ and let $e_1,\ldots,e_n$ be the standard basis of $V$. For $a=(a_1,\ldots,a_n), b=(b_1,\ldots,b_n) \in V$ let $a\cdot b$ denote the standard bilinear form $\sum_{i=1}^n a_i b_i$. For a subset $S\subset V$, let $S^{\perp}=\{u \in V: u\cdot s=0, \text{~for~all~} s \in S\}$. Let $\prec$ be any linear order on $X_V(0)$ such that $U \prec U'$ if $\dim U < \dim U'$. Then an $(n-2)$-simplex in $X_V$ is of the form $[U_1,\ldots,U_{n-1}]$, where $0 \neq U_1 \subsetneq \cdots \subsetneq U_{n-1} \subsetneq V$. For simplicial complexes $Y$, $Z$ defined on disjoint vertex sets, let $Y*Z=\{\sigma \cup \tau: \sigma \in Y, \tau \in Z\}$ denote their simplicial join. Let $a_1^0,a_1^1,\ldots,a_{n-1}^0,a_{n-1}^1,b$ be $2n-1$ distinct elements. Let $M$ denote the octahedral $(n-2)$-sphere $$M=\{a_1^0,a_1^1\}* \cdots * \{a_{n-1}^0,a_{n-1}^1\},$$ and let $K=M \cup \left(\{b\}*M^{(n-3)}\right)$. See Figure \[fig:kv\] for a depiction of the $2$-dimensional complex $K$ when $n=4$. Choose a linear order $\prec_1$ on the simplices of $K$ such that $\sigma \prec_1 \tau$ if $\dim \sigma > \dim \tau$. The barycentric subdivision of $K$, denoted by ${{\rm sd}}(K)$, is the complex whose vertex set ${{\rm sd}}(K)(0)$ consists of all nonempty simplices of $K$, and whose $k$-simplices (ordered according to $\prec_1$) are $[\sigma_1,\ldots,\sigma_{k+1}]$ where $\sigma_1 \supsetneq \cdots \supsetneq \sigma_{k+1}$. For a sequence ${{\mathbf x}}=(x_1,\ldots,x_{n-1})$ of distinct vertices of $K$, such that $\{x_1,\ldots,x_{n-1}\} \in K$, let $S({{\mathbf x}})$ denote the $(n-2)$-simplex of ${{\rm sd}}(K)$ given by $$S({{\mathbf x}})=\left[\{x_1,\ldots,x_{n-1}\},\{x_1,\ldots,x_{n-2}\},\ldots,\{x_1\}\right].$$ For a permutation $\pi$ in the symmetric group ${\mathbb{S}}_{n-1}$ let $\pi({{\mathbf x}})=(x_{\pi(1)},\ldots,x_{\pi(n-1)})$. Let $E=\{0,1\}^{n-1}$ and for $1 \leq j \leq n-1$ let $$E_j=\{(\epsilon_1,\ldots,\epsilon_{n-1}) \in E: \epsilon_j=0\}.$$ For ${\pmb{\epsilon}}=(\epsilon_1,\ldots,\epsilon_{n-1}) \in E$ and $1 \leq j \leq n-1$ let ${{\mathbf a}}^{{\pmb{\epsilon}}}=(a_1^{\epsilon_1},\ldots,a_{n-1}^{\epsilon_{n-1}})$ and let $${{\mathbf a}}^{{\pmb{\epsilon}},j}=(a_1^{\epsilon_1},\ldots,a_{j-1}^{\epsilon_{j-1}},b,a_{j+1}^{\epsilon_{j+1}}, \ldots,a_{n-1}^{\epsilon_{n-1}}).$$ Let $T_{q,n}$ denote the set of all sequences ${{\mathbf v}}=(v_1,\ldots,v_{n-1}) \in V^{n-1}$ such that $v_i \in e_i + \langle e_{i+1},\ldots,e_n \rangle$ and $v_i \neq e_i$ for all $1 \leq i \leq n-1$. Clearly $|T_{q,n}|=\prod_{i=1}^{n-1}(q^i-1)$.\ Fix ${{\mathbf v}}=(v_1,\ldots,v_{n-1}) \in T_{q,n}$. For ${\pmb{\epsilon}}=(\epsilon_1,\ldots,\epsilon_{n-1}) \in E$, let ${{\mathbf v}}^{{{\mathbf \epsilon}}}=(u_1,\ldots,u_{n-1})$, where $$u_i= \left\{ \begin{array}{ll} e_i & \epsilon_i=0, \\ v_i & \epsilon_i=1. \end{array} \right.~~$$ For $1 \leq j \leq n-1$ let ${{\mathbf v}}^{{\pmb{\epsilon}},j}=(u_1,\ldots,u_{n-1})$, where $$u_i= \left\{ \begin{array}{ll} e_n & i=j, \\ e_i & i \neq j ~\&~ \epsilon_i=0, \\ v_i & i \neq j ~\&~ \epsilon_i=1. \end{array} \right.~~$$ Define $\theta_{{{\mathbf v}}}: K(0) \rightarrow V$ by $$\theta_{{{\mathbf v}}}(x)= \left\{ \begin{array}{ll} e_i & x=a_i^0, \\ v_i & x=a_i^1, \\ e_n & x=b, \end{array} \right.$$ and let $f_{{{\mathbf v}}}: {{\rm sd}}(K)(0) \rightarrow X_V(0)$ be the map given by $$f_{{{\mathbf v}}}(\sigma)=\langle \theta_{{{\mathbf v}}}(x): x \in \sigma \rangle^{\perp}.$$ Clearly, $f_{{{\mathbf v}}}$ extends to a simplicial map from ${{\rm sd}}(K)$ to $X_V$. The inverse of ${\mathfrak{g}}$ under $f_{{{\mathbf v}}}$ is the local system of ${{\rm sd}}(K)$ given by ${\mathfrak{h}}_{{{\mathbf v}}}=f_{{{\mathbf v}}}^{-1}{\mathfrak{g}}$. We next define an element $$c_{{{\mathbf v}}}=\sum_{F \in {{\rm sd}}(K)(n-2)} c_{{{\mathbf v}}}(F) F \in C_{n-2}({{\rm sd}}(K);{\mathfrak{h}}_{{{\mathbf v}}}).$$ For a sequence ${{\mathbf u}}=(u_1,\ldots,u_{n-1}) \in V^{n-1}$ of linearly independent vectors in $V$ such that $e_n \not\in \langle u_1,\ldots,u_{n-1} \rangle$, let $w({{\mathbf u}})$ be the unique element $w\in \langle u_1,\ldots,u_{n-1} \rangle^{\perp}$ such that $w \cdot e_n=1$. For ${\pmb{\epsilon}}=(\epsilon_1,\ldots,\epsilon_{n-1}) \in \{0,1\}^{n-1}$ and $\pi \in {\mathbb{S}}_{n-1}$ let $\chi({{\mathbf \epsilon}},\pi)=(-1)^{\sum_{j=1}^{n-1}\epsilon_j} {{\rm sgn}}(\pi)$. On an $(n-2)$-simplex $F \in {{\rm sd}}(K)(n-2)$ define $$\label{e:defc} c_{{{\mathbf v}}}(F)= \left\{ \begin{array}{ll} \chi({\pmb{\epsilon}},\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}}) & {\pmb{\epsilon}}\in E, F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}})),\\ \chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big) & {\pmb{\epsilon}}\in E_j, F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j})), \\ 0 & \text{otherwise}. \end{array} \right.~~$$ Note that $c_{{{\mathbf v}}}(F) \in {\mathfrak{h}}_{{{\mathbf v}}}(F)$ for all $F \in {{\rm sd}}(K)(n-2)$. Indeed, if $F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}}))$ then $$\begin{split} c_{{{\mathbf v}}}(F)&=\chi({\pmb{\epsilon}},\pi)w({{\mathbf v}}^{{\pmb{\epsilon}}}) \in \langle v_1^{\epsilon_1},\ldots,v_{n-1}^{\epsilon_{n-1}} \rangle^{\perp} \\ &={\mathfrak{g}}(f_{{{\mathbf v}}}(F))={\mathfrak{h}}_{{{\mathbf v}}}(F). \end{split}$$ If $F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))$ for $1 \leq j \leq n-1$ and ${\pmb{\epsilon}}\in E_j$ then $$\begin{split} c_{{{\mathbf v}}}(F)&=\chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big) \in \langle v_1^{\epsilon_1},\ldots,v_{j-1}^{\epsilon_{j-1}},e_n, v_{j+1}^{\epsilon_{j+1}},\ldots,v_{n-1}^{\epsilon_{n-1}} \rangle^{\perp} \\ &={\mathfrak{g}}(f_{{{\mathbf v}}}(F))={\mathfrak{h}}(F). \end{split}$$ \[p:cv\] $c_{{{\mathbf v}}} \in {\tilde{H}}_{n-2}({{\rm sd}}(K);{\mathfrak{h}}_{{{\mathbf v}}})$. [**Proof.**]{} Let $G \in {{\rm sd}}(K)(n-3)$. We have to show that $\partial_{n-2} c_{{{\mathbf v}}} (G)=0$. Let $\Gamma(G)$ denote the set of $(n-2)$-simplices in ${{\rm sd}}(K)$ that contain $G$. For $2 \leq \ell \leq n-1$ let $\eta_{\ell} \in {\mathbb{S}}_{n-1}$ denote the transposition $(n-\ell,n-\ell+1)$. We consider the following four cases according to the type of $G$. For $n=4$ we depict the various edge types in Figure \[fig:four\]. Edges colored with blue, green, red and magenta correspond to types 1,2,3 and 4 below respectively. 1. $G=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}}))_{\ell}$ for some $2 \leq \ell \leq n-1$, $\pi \in {\mathbb{S}}_{n-1}$ and ${\pmb{\epsilon}}\in E$.\ Then $$\Gamma(G)=\{S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}})),S((\pi \eta_{\ell})({{\mathbf a}}^{{\pmb{\epsilon}}}))\}$$ As $G$ is the $\ell$-th face of both these simplices, it follows that $$\label{e:case1} \begin{split} (-1)^{\ell+1}&\partial_{n-2}c_{{{\mathbf v}}}(G) = c_{{{\mathbf v}}}(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}})))+ c_{{{\mathbf v}}}(S((\pi \eta_{\ell})({{\mathbf a}}^{{\pmb{\epsilon}}}))) \\ &= \chi({\pmb{\epsilon}},\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}})+ \chi({\pmb{\epsilon}},\pi \eta_{\ell}) w({{\mathbf v}}^{{\pmb{\epsilon}}})\\ &=\chi({\pmb{\epsilon}},\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}})- \chi({\pmb{\epsilon}},\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}})=0. \end{split}$$ 2. $G=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))_{\ell}$ for some $2 \leq \ell \leq n-1$, $\pi \in {\mathbb{S}}_{n-1}$, $1 \leq j \leq n-1$ and ${\pmb{\epsilon}}\in E_j$.\ Then $$\Gamma(G)=\{S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j})), S((\pi \eta_{\ell})({{\mathbf a}}^{{\pmb{\epsilon}},j}))\}.$$ As $G$ is the $\ell$-th face of both these simplices, it follows that $$\label{e:case2} \begin{split} (-1)^{\ell+1}&\partial_{n-2}c_{{{\mathbf v}}}(G) = c_{{{\mathbf v}}}(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j})))+ c_{{{\mathbf v}}}(S((\pi \eta_{\ell})({{\mathbf a}}^{{\pmb{\epsilon}},j}))) \\ &=\chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big)+ \chi({\pmb{\epsilon}},\pi \eta_{\ell}) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big) \\ &=\chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big)- \chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big) =0. \end{split}$$ 3. $G=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}}))_1$ for some $\pi \in {\mathbb{S}}_{n-1}$ and ${\pmb{\epsilon}}\in E_j$, where $j=\pi(n-1)$.\ Then $$\Gamma(G)=\{S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}})), S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}+e_j})),S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))\}.$$ As $G$ is the $1$-face of each of these simplices, it follows that $$\label{e:case3} \begin{split} &\partial_{n-2}c_{{{\mathbf v}}}(G) = c_{{{\mathbf v}}}\left(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}}))\right)+c_{{{\mathbf v}}}\left( S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}+e_j}))\right)+c_{{{\mathbf v}}}\left(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))\right) \\ &=\chi({\pmb{\epsilon}},\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}})+\chi({\pmb{\epsilon}}+e_j,\pi) w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})+\chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big) \\ &=\chi({\pmb{\epsilon}},\pi) \left(w({{\mathbf v}}^{{\pmb{\epsilon}}})- w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})\right) +\chi({\pmb{\epsilon}},\pi) \big(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})\big)=0. \end{split}$$ 4. $G=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))_1$ for some $\pi \in {\mathbb{S}}_{n-1}$ and ${\pmb{\epsilon}}\in E_j$, where $j \neq \pi(n-1)$.\ Let $j'=\pi(n-1)$ and let $\tau$ denote the transposition $(j,j')$. Since $S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))_1$ is independent of $\epsilon_{\pi(n-1)}$, we may assume that $\epsilon_{j'}=\epsilon_{\pi(n-1)}=0$. Then: $$\Gamma(G)=\{S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j})),S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}+e_{j'},j})), S((\tau \pi)({{\mathbf a}}^{{\pmb{\epsilon}},j'})),S((\tau \pi)({{\mathbf a}}^{{\pmb{\epsilon}}+e_j,j'}))\}.$$ As $G$ is the $1$-face of each of these simplices, it follows that $$\label{e:case4} \begin{split} \partial_{n-2}c_{{{\mathbf v}}}(G) &= c_{{{\mathbf v}}}(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))) +c_{{{\mathbf v}}}(S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}+e_{j'},j}))) \\ &~~~~~ +c_{{{\mathbf v}}}(S((\tau \pi)({{\mathbf a}}^{{\pmb{\epsilon}},j'}))) +c_{{{\mathbf v}}}(S((\tau \pi)({{\mathbf a}}^{{\pmb{\epsilon}}+e_j,j'}))) \\ &=\chi({\pmb{\epsilon}},\pi)(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}}))+ \chi({\pmb{\epsilon}}+e_{j'},\pi) (w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}})) \\ &~~~~~+\chi({\pmb{\epsilon}},\tau\pi)(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}})-w({{\mathbf v}}^{{\pmb{\epsilon}}}))+ \chi({\pmb{\epsilon}}+e_{j},\tau\pi) (w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j}+e_{j'}})-w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j}})) \\ &=\chi({\pmb{\epsilon}},\pi)[(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}})) -(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}+e_j})-w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}})) \\ &~~~~~-(w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}})-w({{\mathbf v}}^{{\pmb{\epsilon}}}))+ (w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j'}+e_{j}})-w({{\mathbf v}}^{{\pmb{\epsilon}}+e_{j}}))]=0. \end{split}$$ We have thus shown that $c_{{{\mathbf v}}} \in {\tilde{H}}_{n-2}({{\rm sd}}(K);{\mathfrak{h}})$. $\Box$ Proposition \[p:cv\] implies that ${\widetilde{c}_{{{\mathbf v}}}}=(f_{{{\mathbf v}}})_*c_{{{\mathbf v}}} \in {\tilde{H}}_{n-2}(X_V;{\mathfrak{g}})$. \[t:dcyc\] The family $\{{\widetilde{c}_{{{\mathbf v}}}}: {{\mathbf v}} \in T_{q,n}\}$ is a basis of ${\mathcal{D}}^1(V)={\tilde{H}}_{n-2}(X_V;{\mathfrak{g}})$. [**Proof.**]{} Let ${{\mathbf v}} \in T_{q,n}$. Let $R({{\mathbf v}}) \in X_V(n-2)$ be the $(n-2)$-simplex $$R({{\mathbf v}})= [\langle v_1,\ldots,v_{n-1}\rangle^{\perp}, \langle v_1,\ldots,v_{n-2}\rangle^{\perp},\ldots, \langle v_1,v_2\rangle^{\perp}, \langle v_1 \rangle^{\perp}].$$ Let ${{\mathbf 1}}=(1,\ldots,1) \in E$. It is straightforward to check that $F=S({{\mathbf a}}^{{{\mathbf 1}}})$ is the unique $(n-2)$-simplex in ${{\rm sd}}(K)$ such that $f_{{{\mathbf v}}}(F)=R({{\mathbf v}})$. It follows that $${\widetilde{c}_{{{\mathbf v}}}}(R({{\mathbf v}}))=c_{{{\mathbf v}}}(S({{\mathbf a}}^{{{\mathbf 1}}}))=(-1)^{n-1} w({{\mathbf v}}).$$ On the other hand, if ${{\mathbf v}} \neq {{\mathbf v'}} \in T_{q,n}$, then $R({{\mathbf v'}}) \not\in f_{{{\mathbf v}}}({{\rm sd}}(K))$ and so ${\widetilde{c}_{{{\mathbf v}}}}(R({{\mathbf v'}}))=0$. It follows that the $(n-2)$-cycles $\{{\widetilde{c}_{{{\mathbf v}}}}: {{\mathbf v}} \in T_{q,n}\}$ are linearly independent in ${\mathcal{D}}^1(V)$. As $|T_{q,n}|=\prod_{i=1}^{n-1}(q^i-1)=\dim{\mathcal{D}}^1(V)$, this completes the proof of Theorem \[t:dcyc\]. $\Box$ [**Example:**]{} Let $n=3$ and let $${{\mathbf v}}=(v_1,v_2)=\left( (1,r,s),(0,1,t) \right) \in T_{q,3}.$$ Figure \[fig:snz\] depicts the cycle $c_{{{\mathbf v}}} \in H_1({{\rm sd}}(K);{\mathfrak{h}})$. Black vertices correspond to vertices of $K$ and red vertices correspond to edges of $K$. The values of $c_{{{\mathbf v}}}$ are indicated on the edges of the diagram. For example, let ${\pmb{\epsilon}}=(1,1)$ and $\pi=(1,2)$. Then $F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}}}))=[\{a_2^1,a_1^1\},\{a_2^1\}]$, and $$c_{{{\mathbf v}}}(F) = \chi({\pmb{\epsilon}},\pi) w\big((v_1,v_2)\big)=-w\big((v_1,v_2)\big)=(s-rt,t,-1).$$ Similarly, if $j=1$, ${\pmb{\epsilon}}=(0,1) \in E_1$ and $\pi=(1,2)$, then $F=S(\pi({{\mathbf a}}^{{\pmb{\epsilon}},j}))=[\{a_2^1,b\},\{a_2^1\}]$ and $$\begin{split} c_{{{\mathbf v}}}(F) &= \chi({\pmb{\epsilon}},\pi) \left( w\big((v_1,v_2)\big)-w\big((e_1,v_2)\big) \right) \\ &=(rt-s,-t,1)-(0,-t,1)=(rt-s,0,0). \end{split}$$ Figures \[fig:genb\] and \[fig:degb\] depict the $1$-cycle ${\widetilde{c}_{{{\mathbf v}}}}\in H_1(X_V;{\mathfrak{g}})$. Here, the black vertices correspond to $2$-dimensional subspaces of $V$. The red vertices and their labels correspond to $1$-dimensional subspaces and their generating vectors. Figure \[fig:genb\] depicts the generic case when $rst(rt-s) \neq 0$. The labels of the left most $6$ red points together with the $\pm$ signs, indicate the values of ${\widetilde{c}_{{{\mathbf v}}}}$ on the incident edges. The remaining three values of ${\widetilde{c}_{{{\mathbf v}}}}$ are indicated on the edges incident with the vertex corresponding to the line spanned by $(1,0,0)$. Figure \[fig:degb\] similarly depicts the case $s=0$. Note that in both cases, the simplicial map $f_{{{\mathbf v}}}:{{\rm sd}}(K) \rightarrow X_V$ is not injective. The Dimension of ${\mathcal{D}}^k(V)$ {#s:dimcdk} ===================================== [**Proof of Theorem \[t:dimdkk\]:**]{} For an ${\mathbb{F}}_q$-space $W$ let $\text{St}(W)={\tilde{H}}_{\dim W -2}(X_W;{\mathbb{F}}_q)$ denote the Steinberg module of $W$ over ${\mathbb{F}}_q$. Recall that $\dim \text{St}(W)=q^{\binom{\dim W}{2}}$ by Theorem \[t:build\]. Let $G_j(V)$ denote the family of all $j$-dimensional linear subspaces of $V$. The following result is due to Dupont (Proposition 5.38 in [@Dupont82]). \[dups1\] There is an exact sequence $$\label{dup1} \begin{split} 0 \rightarrow {\mathcal{D}}^k(V) &\rightarrow \bigoplus_{U_k \in G_k(V)} \wedge^{\, k} U_k \otimes {\rm St}(V/U_k) \rightarrow \bigoplus_{U_{k+1} \in G_{k+1}(V)} \wedge^k U_{k+1} \otimes {\rm St}(V/U_k) \rightarrow \\ \ldots &\rightarrow \bigoplus_{U_{n-2} \in G_{n-2}(V)} \wedge^k U_{n-2}\otimes {\rm St}(V/U_{n-2}) \rightarrow \bigoplus_{U_{n-1} \in G_{n-1}(V)} \wedge^k U_{n-1} \rightarrow \wedge^k V \rightarrow 0. \end{split}$$ Writing ${\genfrac{[}{]}{0pt}{}{n}{j}}_q$ for the $q$-binomial coefficient, Theorem \[dups1\] implies that $$\label{dimdk} \dim {\mathcal{D}}^k(V)=\sum_{j=k}^n (-1)^{j-k} \binom{j}{k} q^{\binom{n-j}{2}} {\genfrac{[}{]}{0pt}{}{n}{j}}_q.$$ By the $q$-binomial theorem (see e.g. (1.87) in [@Stanley]) $$\label{qbinid} \prod_{j=0}^{n-1} (1+q^j \lambda)=\sum_{j=0}^n q^{\binom{j}{2}} {\genfrac{[}{]}{0pt}{}{n}{j}}_q \lambda^j.$$ Substituting $\lambda=-t^{-1}$ in (\[qbinid\]) and multiplying by $t^n$ it follows that $$\label{st1} \prod_{j=0}^{n-1} (t-q^j)=\sum_{j=0}^n (-1)^j q^{\binom{j}{2}} {\genfrac{[}{]}{0pt}{}{n}{j}}_q t^{n-j}.$$ Differentiating (\[st1\]) $k$ times and multiplying by $\frac{(-1)^{n-k}}{k!}$ we obtain $$\label{difk} \begin{split} & \prod_{j=0}^{n-1} (q^j-t)\sum_{0 \leq \alpha_0<\cdots < \alpha_{k-1} \leq n-1} \prod_{\ell=0}^{k-1} \frac{1}{q^{\alpha_{\ell}}-t} \\ &= \sum_{j=0}^n (-1)^{n-k+j} \binom{n-j}{k} q^{\binom{j}{2}} {\genfrac{[}{]}{0pt}{}{n}{j}}_q t^{n-j-k} \\ &= \sum_{j=0}^n (-1)^{j-k} \binom{j}{k} q^{\binom{n-j}{2}} {\genfrac{[}{]}{0pt}{}{n}{j}}_q t^{j-k}. \end{split}$$ Substituting $t=1$ in (\[difk\]) and using (\[dimdk\]) we obtain (\[e:dimfor1\]). $\Box$ A Basis for ${\mathcal{D}}^{n-1}(V)$ {#subs:cdno} ------------------------------------ In this subsection we describe an explicit basis for ${\mathcal{D}}^{n-1}(V)={\tilde{H}}_{0}(X_V;\wedge^{n-1} {\mathfrak{g}})$. We first recall some facts concerning the exterior algebra $\wedge V$. Let $V={\mathbb{F}}_q^n$. Using the notation of Section \[s:base1\], recall that $e_1,\ldots,e_n$ are the unit vectors in $V$, and $a \cdot b$ denotes the standard symmetric bilinear form on $V$. Let ${{\mathbf e}}=e_1 \wedge \cdots \wedge e_n \in \wedge^n V$. The induced bilinear form on $\wedge^p V$ is given by $$(u_1 \wedge \cdots \wedge u_p) \cdot (v_1\wedge \cdots \wedge v_p)= \det \big(u_i \cdot v_j\big)_{i,j=1}^p.$$ The [*star operator*]{} $*:\wedge^{n-k} V \rightarrow \wedge^{k}V$ is the unique linear map that satisfies $$(*\alpha) \cdot \beta= {{\mathbf e}} \cdot (\alpha \wedge \beta)$$ for any $\alpha \in \wedge^{n-k} V, \beta \in \wedge^{k}V$. \[c:dualb\] Let $v_1,\ldots,v_{n-k}$ be linearly independent vectors in $V$ and let $M= \langle v_1,\ldots,v_{n-k} \rangle^{\perp}$. Then $$0 \neq *(v_1 \wedge \cdots \wedge v_{n-k})\in \wedge^k M.$$ [**Proof.**]{} Extend $\{v_i\}_{i=1}^{n-k}$ to a basis $\{v_i\}_{i=1}^n$ of $V$, and let $\{w_j\}_{j=1}^n$ be the dual basis, i.e. $v_i \cdot w_j=\delta_{i,j}$. Then $M=\langle w_{n-k+1},\ldots,w_n \rangle$. For a subset $L=\{i_1,\ldots,i_{\ell}\} \in \binom{[n]}{\ell}$ such that $1 \leq i_1 < \cdots < i_{\ell} \leq n$ let $v_L=v_{i_1} \wedge \cdots \wedge v_{i_{\ell}}$ and $w_L=w_{i_1} \wedge \cdots \wedge w_{i_{\ell}}$. If $L,L' \in \binom{[n]}{\ell}$ then $v_L\cdot w_{L'}=\delta_{L,L'}$.\ Let $I_0=\{1,\ldots,n-k\}$, $J_0=\{n-k+1,\ldots,n\}$, and let $*v_{I_0}=\sum_{|J|=k} \lambda_J w_J$. Then for any $J' \in \binom{[n]}{k}$ $$\label{e:dotp1} *v_{I_0}\cdot v_{J'}=\sum_{|J|=k} \lambda_J w_J \cdot v_{J'}=\lambda_{J'}.$$ On the other hand $$\label{e:dotp2} \begin{split} *v_{I_0} \cdot v_{J'}&={{\mathbf e}} \cdot (v_{I_0} \wedge v_{J'}) \\ &= \left\{ \begin{array}{ll} \det (v_1,\ldots,v_n) & J'=J_0, \\ 0 & J' \neq J_0. \end{array} \right.~~ \end{split}$$ Combining (\[e:dotp1\]) and (\[e:dotp2\]), it follows that $0 \neq *v_{I_0}= \det (v_1,\ldots,v_n) w_{J_0} \in \wedge^k M$. $\Box$ We proceed to construct a basis of ${\mathcal{D}}^{n-1}(V)={\tilde{H}}_{0}(X_V;\wedge^{n-1} {\mathfrak{g}})$. Note that if $u \in V$, then by Claim \[c:dualb\], $(*u)u^{\perp} \in C_0(X_V;\wedge^{n-1}{\mathfrak{g}})$. For any $1 \leq i \leq n$ let $$z_{u,i}=(*e_i)e_i^{\perp}+(*u)u^{\perp}-(*(u+e_i))(u+e_i)^{\perp} \in C_0(X_V;\wedge^{n-1}{\mathfrak{g}}).$$ Then $$\partial_0(z_{u,i})=*e_i+*u-*(u+e_i)=*(e_i+u-(u+e_i))=0$$ and therefore $z_{u,i} \in {\mathcal{D}}^{n-1}(V)$. For $2 \leq i \leq n$ let $R_i= \left({\mathbb{F}}_q^{i-1}\setminus \{0\}\right) \times \{0\}^{n-i+1}$. \[c:bdnmo\] $$\label{e:bdnmo} {{\cal B}}=\big\{z_{u,i}: 2 \leq i \leq n~,~u \in R_i\big\}$$ is a basis of ${\mathcal{D}}^{n-1}(V)$. [**Proof.**]{} By Theorem \[t:dimdkk\] $$\dim {\mathcal{D}}^{n-1}(V)=\sum_{i=2}^n (q^{i-1}-1)=\sum_{i=2}^n |R_i|=|{{\cal B}}|.$$ It therefore suffices to show that the elements of ${{\cal B}}$ are linearly independent. This in turn follows from the fact that for any $2 \leq j \leq n$ and $v \in R_j$, it holds that $(v+e_j)^{\perp} \in {{\rm supp}}(z_{v,j})$, but $(v+e_j)^{\perp} \not\in {{\rm supp}}(z_{u,i})$ for any $(u,i) \neq (v,j)$ such that $2 \leq i \leq j$ and $u \in R_i$. $\Box$ Minimal Cycles in ${\mathcal{D}}^k(V)$ {#s:mincyc} ====================================== In this section we prove Theorem \[t:mindkv\]. The upper bound follows from a construction of certain explicit $(n-k-1)$-cycles of ${\mathcal{D}}^k(V)$ given in Subsection \[sub:upperb\]. The lower bound is established in Subsection \[sub:lowerb\]. The Upper Bound {#sub:upperb} --------------- Let $1 \leq k \leq n-1$ and let $m=n-k+2$. Let ${{\mathbf u}}=(u_1,\ldots,u_m) \in V^m$ be an ordered $m$-tuple of vectors in $V$ whose only linear dependence is $\sum_{i=1}^m u_i=0$. Let ${\mathbb{I}}_{m-2,m}$ denote the family of injective functions $\pi:[n-k]=[m-2] \rightarrow [m]$. For $\pi \in {\mathbb{I}}_{m-2,m}$ let $T({{\mathbf u}},\pi)$ be the $(n-k-1)$-simplex given by $$T({{\mathbf u}},\pi)=[\langle u_{\pi(1)},\ldots,u_{\pi(n-k)}\rangle^{\perp} \subset \cdots \subset \langle u_{\pi(1)}\rangle^{\perp}].$$ Let $\gamma_{{{\mathbf u}}} \in C_{n-k-1}(X_V;\wedge^k{\mathfrak{g}})$ be the chain whose value on an $(n-k-1)$-simplex $F$ is given by $$\label{e:defgam} \gamma_{{{\mathbf u}}}(F)= \left\{ \begin{array}{ll} *\left(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k)}\right) & F=T({{\mathbf u}},\pi), \\ 0 & \text{otherwise}. \end{array} \right.~~$$ \[p:cycwk\] $\gamma_{{{\mathbf u}}} \in {\mathcal{D}}^k(V)$. [**Proof.**]{} Let $G$ be an $(n-k-2)$-simplex in $X_V$. Let $\Gamma_{{{\mathbf u}}}(G)$ denote the set of $(n-k-1)$-simplices in ${{\rm supp}}(\gamma_{{{\mathbf u}}})$ that contain $G$. For $2 \leq \ell \leq n-k$ let $\eta_{\ell} \in {\mathbb{S}}_{n-k-2}$ denote the transposition $(n-k-\ell+1,n-k-\ell+2)$. We consider the following two cases: 1. $G=T({{\mathbf u}},\pi)_{\ell}$ for some $2 \leq \ell \leq n-k$ and $\pi \in {\mathbb{I}}_{m-2,m}$.\ Then $$\Gamma_{{{\mathbf u}}}(G)=\left\{ T({{\mathbf u}},\pi),T({{\mathbf u}},\pi\eta_{\ell})\right\}.$$ As $G$ is the $\ell$-th face of both these simplices, it follows that $$\label{e:case1} \begin{split} (-1)^{\ell+1}&\partial_{n-k-1} \gamma_{{{\mathbf u}}}(G) = \gamma_{{{\mathbf u}}}(T({{\mathbf u}},\pi))+\gamma_{{{\mathbf u}}}(T({{\mathbf u}},\pi\eta_{\ell})) \\ &=*\left(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k-\ell+1)} \wedge u_{\pi(n-k-\ell+2)} \wedge \cdots \wedge u_{\pi(n-k)}\right) \\ &~~+*\left(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k-\ell+2)} \wedge u_{\pi(n-k-\ell+1)} \wedge \cdots \wedge u_{\pi(n-k)}\right)=0. \end{split}$$ 2. $G=T({{\mathbf u}},\pi)_{1}$ for some $\pi \in {\mathbb{I}}_{m-2,m}$.\ Let $[m] \setminus \pi([m-3])= \{\alpha_1,\alpha_2,\alpha_3\}$. For $i=1,2,3$ define $\pi_i \in {\mathbb{I}}_{m-2,m}$ by $$\pi_i(j)=\left\{ \begin{array}{ll} \pi(j) & 1 \leq j \leq n-k-1, \\ \alpha_i & j=n-k. \end{array} \right.~~$$ Then $$\Gamma_{{{\mathbf u}}}(G)=\left\{ T({{\mathbf u}},\pi_1),T({{\mathbf u}},\pi_2),T({{\mathbf u}},\pi_3)\right\}.$$ As $G$ is the $1$-th face of these three simplices, it follows that $$\label{e:case1} \begin{split} &\partial_{n-k-1} \gamma_{{{\mathbf u}}}(G) = \sum_{i=1}^3 \gamma_{{{\mathbf u}}}(T({{\mathbf u}},\pi_i)) \\ &= \sum_{i=1}^3 *\big(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k-1)} \wedge u_{\alpha_i}\big) \\ &= *\big(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k-1)} \wedge (\sum_{i=1}^3 u_{\alpha_i})\big) \\ &=*\big(u_{\pi(1)} \wedge \cdots \wedge u_{\pi(n-k-1)} \wedge (\sum_{j=1}^m u_{j})\big)=0. \end{split}$$ We have thus shown that $\gamma_{{{\mathbf u}}} \in {\mathcal{D}}^k(V)$. $\Box$ \[c:lbnd\] $$\label{e:lbnd} \begin{split} \min &\big\{|{{\rm supp}}(w)|:0 \neq w \in {\mathcal{D}}^k(V)\big\} \leq |{{\rm supp}}(\gamma_{{{\mathbf u}}})| \\ &=|{\mathbb{I}}_{m-2,m}|=\frac{(n-k+2)!}{2}. \end{split}$$ [**Example:**]{} Let $n=3, k=1$. A minimal twisted $1$-cycle in ${\mathcal{D}}^1(X_V)$ is depicted in Figure \[fig:degb\]. The Lower Bound {#sub:lowerb} --------------- In preparation for the proof of the lower bound in Theorem \[t:mindkv\], we first recall a twisted version of the nerve lemma. Let ${{\cal F}}$ be a local system on a finite simplicial complex $Y$, and let ${\mathcal{Y}}=\{Y_i\}_{i=1}^m$ be a family of subcomplexes of $Y$ such that $Y=\bigcup_{i=1}^m Y_i$. The [*nerve*]{} of the cover ${\mathcal{Y}}$ is the simplicial complex $N=N({\mathcal{Y}})$ on the vertex $[m]=\{1,\ldots,m\}$, whose simplices are the subsets $\tau \subset [m]$ such that $Y_{\tau}:=\bigcap_{i \in \tau} Y_i \neq \emptyset$. For $j \geq 1$ let $N_j({{\cal F}})$ be the local system on $N$ given by $N_j({{\cal F}})(\tau)=H_j(Y_{\tau};{{\cal F}})$. The following result is twisted version of the Mayer-Vietoris spectral sequence (see e.g. [@L74]). \[mv\] There exists a spectral sequence $\{E_{p,q}^r\}$ converging to $H_{*}(Y;{{\cal F}})$ such that $E_{p,q}^1=\bigoplus_{\sigma \in N(p)} H_q(Y_{\sigma};{{\cal F}})$ and $E_{p,q}^2=H_p(N;N_q({{\cal F}}))$. The Nerve Lemma is the following \[nerve1\] Suppose that $H_q(Y_{\sigma};{{\cal F}})=0$ for all $q \geq 1$ and $\sigma \in N(p)$ such that $p+q \leq t$. Then $H_p(Y;{{\cal F}})\cong H_p(N;N_0({{\cal F}}))$ for all $0 \leq p \leq t$. We will also need a simple observation concerning a certain twisted homology of the simplex. Let $r \geq 2$ and let $W_1,\ldots,W_r$ be arbitrary linear subspaces of a finite dimensional vector space $W$ over a field ${\mathbb{K}}$. Let $\Delta_{r-1}$ denote the simplex on the vertex set $[r]$, and let ${{\cal G}}$ be the local system on $\Delta_{r-1}$ given by $${{\cal G}}(\sigma)= \left\{ \begin{array}{ll} \bigcap_{i \in \sigma} W_i & \emptyset \neq \sigma \in \Delta_{r-1}, \\ W & \sigma=\emptyset, \end{array} \right.~~$$ with the natural inclusion maps. \[p:gfact\] ${\tilde{H}}_{k}(\Delta_{r-1};{{\cal G}})=0$ for $k \geq r-2$. [**Proof:**]{} Using the natural order on $\{1,\ldots,r\}$, the top dimensional simplex in $\Delta_{r-1}$ is $\tau=[1,2,\cdots,r]$, and its $i$-th face is $\tau_i=[1,\ldots,i-1,i+1,\ldots,r]$. For $1 \leq i < j \leq r$ let $$\tau_{i,j}=[1,\ldots,i-1,i+1,\ldots,j-1,j+1,\ldots,r].$$ Then $$C_{r-1}(\Delta_{r-1},{{\cal G}})=\left\{w \tau: w \in \bigcap_{i=1}^r W_i\right\}$$ and $$C_{r-2}(\Delta_{r-1},{{\cal G}})= \left\{\sum_{i=1}^r w_i \tau_i: w_i \in \bigcap_{\ell \in \tau_i} W_{\ell}\right\}.$$ The boundary map $\partial_{r-1}:C_{r-1}(\Delta_{r-1};{{\cal G}}) \rightarrow C_{r-2}(\Delta_{r-1};{{\cal G}})$ is given by $$\label{e:br1} \partial_{r-1}(w\tau)=\sum_{i=1}^r (-1)^{i+1} w\tau_i.$$ Note that for $1 \leq i \leq r$ and $1 \leq j \leq r-1$, the $j$-th face of $\tau_i$ is $$(\tau_i)_j= \left\{ \begin{array}{ll} \tau_{j,i} & 1 \leq j <i \leq r, \\ \tau_{i,j+1} & 1 \leq i \leq j \leq r-1. \end{array} \right.$$ It follows that the boundary map $\partial_{r-2}:C_{r-2}(\Delta_{r-1};{{\cal G}}) \rightarrow C_{r-3}(\Delta_{r-1};{{\cal G}})$ is given by $$\label{e:br2} \begin{split} \partial_{r-2} \big(\sum_{i=1}^r w_i \tau_i\big)&=\sum_{i=1}^r \sum_{j=1}^{r-1} (-1)^{j+1} w_i (\tau_i)_j \\ &=\sum_{i=1}^r \sum_{j=1}^{i-1} (-1)^{j+1} w_i \tau_{j,i} + \sum_{i=1}^r \sum_{j=i}^{r-1} (-1)^{j+1} w_i \tau_{i,j+1} \\ &=\sum_{j=1}^r \sum_{i=1}^{j-1} (-1)^{i+1} w_j \tau_{i,j} + \sum_{i=1}^r \sum_{j=i+1}^{r} (-1)^{j} w_i \tau_{i,j} \\ &=\sum_{1 \leq i <j \leq r} \left( (-1)^{i+1} w_j+(-1)^j w_i\right) \tau_{i,j}. \end{split}$$ Eq. (\[e:br1\]) implies that ${\tilde{H}}_{r-1}(\Delta_{r-1};{{\cal G}})=0$. Next let $c=\sum_{i=1}^r w_i \tau_i \in \ker \partial_{r-2}$ be a ${{\cal G}}$-twisted $(r-2)$-cycle of $\Delta_{r-1}$. It follows by (\[e:br2\]) that $w_j=(-1)^{j+1}w_1$ for all $1 \leq j \leq r$. Therefore $w_1 \in \bigcap_{i=1}^r W_i$ and hence $w_1 \tau \in C_{r-1}(X;{{\cal G}})$. Eq. (\[e:br1\]) then implies that $\partial_{r-1}(w_1 \tau)=c$. Thus ${\tilde{H}}_{r-2}(\Delta_{r-1};{{\cal G}})=0$. $\Box$ [**Proof of the lower bound in Theorem \[t:mindkv\]**]{}. We argue by induction on $n-k$. For the induction basis $k=n-1$, we have to show that if $0 \neq z \in {\mathcal{D}}^{n-1}(V)={\tilde{H}}_0(X_V;\wedge^{n-1} {\mathfrak{g}})$, then $|{{\rm supp}}(z)| \geq \frac{(n-k+2)!}{2}=3$. Suppose for contradiction that $|{{\rm supp}}(z)| < 3$. Then $z=(*u) u^{\perp}+(*v) v^{\perp}$ for some $u,v \in V$. As $$0=\partial_0 z=(*u)+(*v)=*(u+v),$$ it follows that $u+v=0$ and hence $z=0$, a contradiction. For the induction step, assume that $n-k \geq 2$ and let $$0 \neq z =\sum_{z \in X_V(n-k-1)} z(\tau) \tau \in H_{n-k-1}(X_V;\wedge^k {\mathfrak{g}})=Z_{n-k-1}(X_V;\wedge^k {\mathfrak{g}}).$$ Let ${{\rm supp}}(z)=\{\tau_1,\ldots,\tau_s\} \in X_V(n-k-1)$ and write $$\tau_i=[V_k(i),\ldots,V_{n-1}(i)],$$ where $\dim V_j(i)=j$ for all $1 \leq i \leq s$ and $k \leq j \leq n-1$. Let $$\{V_{n-1}(i):1 \leq i \leq s\}=\{U_1,\ldots,U_{r}\},$$ where the $U_i$’s are distinct $(n-1)$-dimensional subspaces. Let ${{\cal U}}_i=\{U:0 \neq U \subset U_i\}$ and let $Y_i=X_V[{{\cal U}}_i]$. Let $Y=\cup_{i=1}^{r} Y_i$ then clearly $z \in Z_{n-k-1}(Y;\wedge^k {\mathfrak{g}})$. Let $N$ be the nerve of the cover $\{Y_i\}_{i=1}^{r}$ of $Y$. For $\sigma \subset [r]$ let $U_{\sigma}=\cap_{i \in \sigma} U_i$ and $Y_{\sigma}=\cap_{i \in \sigma} Y_i$. If $\sigma \in N$ then $Y_{\sigma}$ is the order complex of the poset $P_{\sigma}=\{W:0 \neq W \subset U_{\sigma}\}$. As $P_{\sigma}$ has a unique maximal element $U_{\sigma}$ it follows (see e.g. Lemma 1.4 in [@L74]) that $$\label{nqq} N_q(\wedge^k {\mathfrak{g}})(\sigma)= H_q(Y_{\sigma};\wedge^k {\mathfrak{g}})= \left\{ \begin{array}{ll} \wedge^k U_{\sigma} & q=0, \\ 0 & q>0. \end{array} \right.~~$$ Write $${{\cal F}}(\sigma)=N_0(\wedge^k {\mathfrak{g}})(\sigma)=\wedge^k U_{\sigma}.$$ Eq. (\[nqq\]) and Corollary \[nerve1\] imply that for all $p \geq 0$ $$\label{e:ncons} H_p(Y;\wedge^k {\mathfrak{g}}) \cong H_p(N;{{\cal F}}).$$ \[boundl\] $r \geq n-k+2$. [**Proof:**]{} Suppose to the contrary that $r \leq n-k+1$. Then $\Delta_{r-1}^{(r-2)} \subset N \subset \Delta_{r-1}$. For $1 \leq i \leq r$ let $W_i= \wedge^k U_i \subset \wedge^k V$. Let ${{\cal G}}$ be the local system on $\Delta_{r-1}$ given by ${{\cal G}}(\sigma)=\cap_{i \in \sigma} W_i=\wedge^k U_{\sigma}$. Then ${{\cal G}}(\sigma)={{\cal F}}(\sigma)$ if $\sigma \in N$ and ${{\cal G}}(\sigma)=0$ otherwise. Hence $H_*(\Delta_{r-1};{{\cal G}})=H_*(N;{{\cal F}})$. As $n-k-1 \geq r-2$, it follows by combining (\[e:ncons\]) and Proposition \[p:gfact\] that $$H_{n-k-1}(Y;\wedge^k {\mathfrak{g}}) \cong H_{n-k-1}(N;{{\cal F}})=H_{n-k-1}(\Delta_{r-1};{{\cal G}})=0,$$ in contradiction with the assumption that $z$ is a nonzero element of $H_{n-k-1}(Y;\wedge^k {\mathfrak{g}})$. $\Box$ We now conclude the proof of Theorem \[t:mindkv\]. For $1 \leq j \leq r$ define $z_j \in C_{n-k-2}(X_{U_j};\wedge^k {\mathfrak{g}})$ as follows. For an $(n-k-2)$-simplex $F=[V_k,\ldots,V_{n-2}] \in X_{U_j}(n-k-2)$ let $z_j(F) =z([V_k,\ldots,V_{n-2},U_j])$. Then $\partial_{n-k-2}z_j=0$. Indeed, suppose that $$[V_k,\ldots,V_{i-1},V_{i+1},\ldots,V_{n-2}] \in X_{U_j}(n-k-3),$$ where $\dim V_{\ell}=\ell$ for $i \neq \ell \in \{k,\ldots,n-2\}$. Then: $$\begin{split} &\partial_{n-k-2} z_j\left([V_k,\ldots,V_{i-1},V_{i+1},\ldots,V_{n-2}]\right) \\ &= (-1)^{i+k} \sum_{V_{i-1} \subset V_i \subset V_{i+1}} z_j\left([V_k,\ldots,V_{i-1},V_i,V_{i+1},\ldots,V_{n-2}]\right) \\ &=(-1)^{i+k} \sum_{V_{i-1} \subset V_i \subset V_{i+1}} z\left([V_k,\ldots,V_{i-1},V_i,V_{i+1},\ldots,V_{n-2},U_{j}]\right) \\ &= \partial_{n-k-1} z\left([V_k,\ldots,V_{i-1},V_{i+1},\ldots,V_{n-2},U_j]\right)=0. \end{split}$$ As $0 \neq z_j \in H_{n-k-2}(X_{U_j};\wedge^k {\mathfrak{g}})$, it follows by induction that $|{{\rm supp}}(z_j)| \geq \frac{(n-k+1)!}{2}$. Therefore by Proposition \[boundl\] $$|{{\rm supp}}(z)|=\sum_{j=1}^{r} |{{\rm supp}}(z_j)| \geq (n-k+2)\frac{(n-k+1)!}{2}=\frac{(n-k+2)!}{2}.$$ $\Box$ Concluding Remarks {#s:conc} ================== In this paper we studied some aspects of the twisted homology modules ${\mathcal{D}}^k(V)={\tilde{H}}_{n-k-1}(X_V;\wedge^k {\mathfrak{g}})$. Our results suggest several problems and directions for further research: - In Sections \[s:base1\] and \[subs:cdno\] we described explicit bases for ${\mathcal{D}}^1(V)={\tilde{H}}_{n-2}(X_V;{\mathfrak{g}})$ and for ${\mathcal{D}}^{n-1}(V)={\tilde{H}}_{0}(X_V;\wedge^{n-1} {\mathfrak{g}})$. It would be interesting to obtain analogous constructions for other ${\mathcal{D}}^k(V)$’s. - The Nerve Lemma argument used in the proof of Theorem \[t:mindkv\] can be adapted to give a simple alternative proof of the Smith-Yoshiara Theorem \[t:wcycle\]. We hope that this approach can also be useful for the study of minimal cycles of local systems over other highly symmetric complexes. - The Smith-Yoshiara Theorem \[t:wcycle\] and its counterpart for the local system $\wedge^k {\mathfrak{g}}$, Theorem \[t:mindkv\], show that the linear codes that arise from (twisted) homology of $X_V$ have small distance relative to their length, and are therefore far from good codes. On the other hand, it is known (see [@ALLM13]) that for fixed integers $n \geq 2$ and $K>0$ there is a constant $\lambda=\lambda(n,K)>0$, such that for sufficiently large $N$ there exists a complex $X_N \subset \Delta_{N-1}^{(n)}$ whose number of $n$-faces satisfies $f_n(X_N)= K \binom{N}{n}$, and such that $|{{\rm supp}}(z)| \geq \lambda \binom{N}{n}$ for all $0 \neq z \in C=H_n(X_N;{\mathbb{F}}_2)$. In particular, the rate $r(C)$ and relative distance $\delta(C)$ of $C$ satisfy $$r(C)=\frac{\dim C}{f_n(X_N)} \geq \frac{K-1}{K}$$ and $$\delta(C)= \frac{\min\{|{{\rm supp}}(c)|:0 \neq c \in C\}}{f_n(X_N)}\geq \frac{\lambda}{K}.$$ It would be interesting to give explicit constructions of simplicial complexes that give rise to homological codes with similar parameters. [99]{} P. Abramenko and K.S. Brown, Buildings - Theory and applications, Graduate Texts in Mathematics, 248. Springer, New York, 2008. L. Aronshtam, N. Linial, T. [Ł]{}uczak and R. Meshulam, Collapsibility and vanishing of top homology in random simplicial complexes, [*Discrete Comput. Geom.*]{}, [**49**]{}(2013) 317–-334. D. J. Benson, Representations and cohomology. II. Cohomology of groups and modules. Cambridge Studies in Advanced Mathematics, 31. Cambridge University Press, Cambridge, 1991. J. L. Dupont, Algebra of polytopes and homology of flag complexes, [*Osaka J. Math.*]{} [**19**]{}(1982) 599–-641. G. Lusztig, The discrete series of $GL(n)$ over a finite field, Annals of Mathematics Studies, 81. Princeton University Press, 1974. S. D. Smith, Subgroup complexes, Mathematical Surveys and Monographs, 179. American Mathematical Society, Providence, RI, 2011. S. D. Smith and S. Yoshiara, Group geometries and error-correcting codes, [*J. Algebra*]{} [**175**]{}(1995) 199–-211. R. P. Stanley, Enumerative combinatorics. Volume 1. Second edition. Cambridge Studies in Advanced Mathematics, 49. Cambridge University Press, Cambridge, 2012. L. Solomon, The Steinberg character of a finite group with a BN-pair, Theory of Finite Groups, R. Brauer and C.H. Sah, Eds., Benjamin, New York, 1969, pp. 213-221. [^1]: Department of Mathematics, Technion, Haifa 32000, Israel. e-mail: [email protected] . Supported by ISF and GIF grants. [^2]: Department of Mathematics, University of Michigan, Ann Arbor. e-mail: [email protected] . | Mid | [
0.639566395663956,
29.5,
16.625
] |
//****************************************************************************** // // Copyright (c) 2017 Microsoft Corporation. All rights reserved. // // This code is licensed under the MIT License (MIT). // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN // THE SOFTWARE. // //****************************************************************************** using Microsoft.VisualStudio.TestTools.UnitTesting; using OpenQA.Selenium.Appium.Windows; using OpenQA.Selenium; namespace UWPControls { [TestClass] public class TextBlock : UWPControlsBase { private static WindowsElement textBlockElement1 = null; private static WindowsElement textBlockElement2 = null; [ClassInitialize] public static void ClassInitialize(TestContext context) { Setup(context); NavigateTo("Text controls", "TextBlock"); textBlockElement1 = session.FindElementByName("I am a TextBlock."); Assert.IsNotNull(textBlockElement1); textBlockElement2 = session.FindElementByName("I am a styled TextBlock."); Assert.IsNotNull(textBlockElement2); } [ClassCleanup] public static void ClassCleanup() { TearDown(); } [TestMethod] public void Displayed() { Assert.IsTrue(textBlockElement1.Displayed); Assert.IsTrue(textBlockElement2.Displayed); } [TestMethod] public void Enabled() { Assert.IsTrue(textBlockElement1.Enabled); Assert.IsTrue(textBlockElement1.Enabled); } [TestMethod] public void Location() { Assert.IsTrue(textBlockElement2.Location.X >= textBlockElement1.Location.X); Assert.IsTrue(textBlockElement2.Location.Y >= textBlockElement1.Location.Y); } [TestMethod] public void LocationInView() { Assert.IsTrue(textBlockElement2.LocationOnScreenOnceScrolledIntoView.X >= textBlockElement1.LocationOnScreenOnceScrolledIntoView.X); Assert.IsTrue(textBlockElement2.LocationOnScreenOnceScrolledIntoView.Y >= textBlockElement1.LocationOnScreenOnceScrolledIntoView.Y); } [TestMethod] public void Name() { Assert.AreEqual("ControlType.Text", textBlockElement1.TagName); Assert.AreEqual("ControlType.Text", textBlockElement2.TagName); } [TestMethod] public void Size() { Assert.IsTrue(textBlockElement1.Size.Width > 0); Assert.IsTrue(textBlockElement1.Size.Height > 0); Assert.IsTrue(textBlockElement2.Size.Width >= textBlockElement1.Size.Width); Assert.IsTrue(textBlockElement2.Size.Height >= textBlockElement1.Size.Height); } [TestMethod] public void Text() { Assert.AreEqual("I am a TextBlock.", textBlockElement1.Text); Assert.AreEqual("I am a styled TextBlock.", textBlockElement2.Text); } } } | Mid | [
0.5586206896551721,
30.375,
24
] |
Reactivity of a heterocyclic As-Se compound with metal salts: syntheses and structures of the first copper complexes and of new alkali metal salts containing As-Se anions. The structures of the new compounds [Cu8(Ph2As2Se2)2(PhAsSe2)2(dppm)4] (1) (dppm = bis-diphenylphosphinomethane), [Cu4(Ph2As2Se2)2(PPh3)4] (2), [{K(18-crown-6)}2(PhAsSe3)] (3), [Na12(PhAsSe3)6(15-crown-5)6] (4) and 1/x[Na2(PhAsSe3)(thf)(H2O)3]x (5) are reported. 2-5 were prepared by reactions of metal thiolates with [(PhAs)2(mu-Se)(mu-Se2)]. | High | [
0.682464454976303,
36,
16.75
] |
static EC_Factory "-ECObserver basic -ECProxyPushConsumerCollection mt:copy_on_write:list -ECProxyPushSupplierCollection mt:copy_on_write:list -ECDispatching reactive -ECScheduling null -ECFiltering prefix -ECSupplierFiltering per-supplier" static Client_Strategy_Factory "-ORBClientConnectionHandler MT" static Server_Strategy_Factory "-ORBConcurrency reactive" static Advanced_Resource_Factory "-ORBReactorType tp -ORBInputCDRAllocator thread -ORBConnectionCacheLock thread" | Mid | [
0.54337899543379,
29.75,
25
] |
Hi guys, I'm a fellow rescuer and I am adopting one of my dogs out to a wonderful family out in London Ontario. I need to get him transported up there, or at least to TO from Montreal, QC. Can anyone help me out? If you can help or know anyone who can, please reply to me ASAP by e-mail at [email protected]. The dog in question is a wonderful 17 month old boxer/great pyrenees mix, partly deaf and very sweet. He is 28.5 " tall and weighs 78 lbs. You can see him on http://sophie.rimasec.net. His name is Lil'Ricky. Thanks all and a great week! | Low | [
0.41767068273092306,
26,
36.25
] |
*w + 7*w + 4*u. Let h be (0 - -6 - 13) + 189/(-9). Let k = w + h. Calculate the least common multiple of k and 3. 33 Let f = 17989/4697 - 5/427. Let m = 48/11 - f. Find the common denominator of -47/56 and m. 616 Suppose -3*s + f + 3201 = 0, 1335 = -4*s - 2*f + 5613. Calculate the lowest common multiple of 24 and s. 2136 Let o = 38 - 33. Suppose s - 5 = -o*n, -2*s - 3*n = -n + 14. Calculate the smallest common multiple of (-4)/s*(13 - 3) and 4. 4 Let y(g) = g**3 + 20*g**2 + 16*g - 143. What is the lowest common multiple of 837 and y(-18)? 5859 Let p = 150 + -148. Suppose -2*b = -8 + p. What is the smallest common multiple of (-15)/30 + 35/2 and b? 51 What is the common denominator of (-1185)/20*(-1)/18*1 and (3/((-36)/(-71)))/((-16)/32)? 24 Let i = -187/249 + -60422/22659. Let z = i + -69/26. Calculate the common denominator of -38/21 and z. 42 Let k = 19 + 41. Suppose 2*j + k = 8*j. Let m = -5 - -7. What is the lowest common multiple of m and j? 10 Let u = -14042900797/10737 + 1307898. Calculate the common denominator of u and 89/6. 21474 Let u = 5 - 11. Calculate the common denominator of ((-5430)/(-216))/5 + u and -65/44. 396 Let m = -46110/13 - -1890531/533. What is the common denominator of 19/6929 and m? 6929 Suppose -660 = 12*t + 10*t. Calculate the common denominator of ((-23)/t)/((-18)/(-27)) and -17/12. 60 Let x = 71391/271880 + 234/971. Calculate the common denominator of x and -155/84. 840 Let q = -293/5698 - 1/74. What is the common denominator of q and -107/126? 1386 Let l be (-8)/(-60)*-6*-670. Let d = 704 - l. Calculate the lowest common multiple of 21 and d. 168 Let p = -8/1955 - 702/783955. What is the common denominator of -41/11 and p? 4411 Suppose -14*p + 3957 + 5045 = 0. Let q = 1259/2 - p. Calculate the common denominator of (-279)/(-12) + 0 + -1 and q. 4 Let u = -120 - -131. Calculate the common denominator of (308/(-152))/(u/11) and 25/2. 38 Let m(w) = -7*w + 10. Let z(v) = 15*v - 22. Let a(k) = 5*m(k) + 2*z(k). Calculate the lowest common multiple of 14 and a(1). 14 Let l = -13633/4422 - 29/201. Let c = -44219 + 29443. Let r = c + 413671/28. What is the common denominator of l and r? 308 Suppose 36*l - 843180 = -11*l. Let t = -753611/42 + l. Calculate the common denominator of 69/35 and t. 210 Suppose 0 = -3*s - 12703 + 3667. Let r = s + 18011/6. Find the common denominator of -149/12 and r. 12 Suppose 0 = -5*b - 5*k + 205, -8 = b - 3*k - 69. Let c = b + -48. Calculate the common denominator of 415/(-20) - c/(-4)*-4 and -9/14. 28 Suppose -146 = -5*k + 129. What is the smallest common multiple of k and (-40725)/(-900) - 3/36*3? 495 Calculate the common denominator of (-8390)/(-4500) + 10/(-6) and 43/495. 4950 Suppose 4*d + 5 = 9. Let k be (4/8)/d*30. Suppose 5*p - 105 = 5*c, 3*c - k = -p + 2*c. Calculate the least common multiple of 22 and p. 198 Suppose 0 = -4*t + 6 + 6, 32 = -y + 4*t. Find the common denominator of ((3/(-96))/((-2)/(-12)))/((-54)/(-760)) and (107/(-2))/(y/2). 180 Let a = 3/5140 + 3713/23130. Calculate the common denominator of a and 618/(-350) - 4/(-14). 900 What is the lowest common multiple of 8 and 1315*((-19)/(-45) + ((-38)/9 - -4))? 2104 Let u = 480 + -1225. Let o = u - -770. What is the least common multiple of o and 40? 200 Let u(t) = t**3 + 7*t**2 + 4*t - 10. Let z be u(-6). Find the common denominator of 5/206 and 270/140 + z + 4. 1442 Find the common denominator of 88/585 and 30405/31200*8 + -8. 2340 Find the common denominator of ((-376)/20)/((-10120)/(-275)) and 47/320. 7360 Let m be ((-3)/1266)/(-4 - -5). Let x = m + -8009/3798. Find the common denominator of 49/75 and x. 225 Let s = 6092 + -5770. What is the least common multiple of 378 and s? 8694 Let g(b) = 2*b**3 - 8*b**2 - 4*b - 2. Let z be g(-2). What is the lowest common multiple of 22 and 48/56 + (-4752)/z? 1254 Let o = 67 - 106. What is the common denominator of ((-9)/(-60))/(o/(-52)) and -2/5? 5 Let y be 4 + -3 + (-6 - 0). Let w = -12 - -7. Calculate the least common multiple of y/(w/(-2))*(0 - 1) and 10. 10 Let i = -3983981/66 - -60365. Calculate the common denominator of 177/2*4/(-252) and i. 462 Let c(h) = -h**2 - 7*h + 10. Let b be c(-8). Let s = 1042 + -1029. Suppose -b*r - 2 = 10*g - s*g, 2*g = 4*r - 4. What is the lowest common multiple of 22 and r? 22 Let q = 10 - 11. What is the common denominator of 4407/(-468) + (-16)/(-2) and q - -26*1/33? 132 Let n = 13091/10980 - -2/915. Find the common denominator of 49/132 and n. 396 Suppose 2*q + 5*i - 51 = -16, -i = 3*q - 33. Suppose q = 5*w - 5. Calculate the common denominator of (-16)/(-10) + -2 + w and 1/10. 10 Let r = 268/391 + 11391/25024. Calculate the common denominator of -73/728 and r. 5824 Let k be (-6 + 0)/((-4)/(3 - 15)). Find the common denominator of (-24)/k - (-34)/(-63) and -13/27. 189 Suppose -5*m + 15 = -15. Let t(d) = -d**3 - 95*d**2 + 145*d + 4711. What is the least common multiple of m - 2 - 2 - -16 and t(-96)? 126 Let g = -1242 - -1462. Calculate the lowest common multiple of 154 and g. 1540 Let s = -53 + 55. Suppose 2*b - s = -2*m, -5*b - 5*m + m = -8. Calculate the lowest common multiple of (-2)/(-9) - (-700)/90 and b. 8 Calculate the common denominator of (66/(-90))/(2/21) and ((-75)/2250)/((-2)/(-145)). 60 Suppose 0 = -4*x - 4*r - 4 + 12, 0 = 2*x + 3*r - 5. Calculate the least common multiple of 102/(10/5) - x and 45. 450 Suppose 73 = -5*m + 113. Let j = 3422 - 3088. What is the lowest common multiple of j and m? 1336 Let i = 1645/72 + -153/8. What is the common denominator of 19/72 and i? 72 Find the common denominator of -61/30 and 538/420 + (-14)/1029*-21. 30 Suppose 3*d - 73 = -4*l + 1576, 0 = -d + 5*l + 575. What is the lowest common multiple of d and 24? 4440 Let o = -48675/8 - -6087. Calculate the common denominator of o and -131/3234. 12936 Suppose 69*d + 12 = 73*d. Suppose -3*u + 46 = 27*c - 25*c, -d*u + 4*c + 52 = 0. Calculate the smallest common multiple of u and 4. 16 Calculate the common denominator of 79516/5211*(-3)/2440 and -29/610. 5490 Let c = 3922609 + -1082642755/276. Let v = c - -29/23. Calculate the common denominator of (-2)/(51/34*36/(-26)) and v. 108 Let g = 45/231079 - 17418735785/3928343. Let s = -4431 - g. Find the common denominator of -81/10 and s. 170 Let x = -25774 + 26990. What is the least common multiple of x and 24? 3648 Let h be (-20)/6*(-39)/26. Suppose 128 = h*s - 37. Calculate the least common multiple of s and 27. 297 Let b = 4 - 1. Calculate the common denominator of (7/(-56)*100)/((-9)/6) and b. 3 Suppose 0 = 4*o - 11*o + 91. Let a = 1 - 3. Let l = a + o. Calculate the least common multiple of 9 and l. 99 Let x be -4*(3 + 54/(-12)). Let b(u) = -12*u + 75. Calculate the lowest common multiple of 15 and b(x). 15 Let d = 1269 + -58403/46. Find the common denominator of d and (-14)/(-12) - 2/6. 138 Let k(x) be the first derivative of x**3/3 + 4*x**2 - 163*x + 113. What is the lowest common multiple of 22 and k(11)? 506 Let j = -1579 + 1629. What is the smallest common multiple of j and 138? 3450 Suppose 0*f - 2*f + 26 = 0. Let m = -17 + f. What is the least common multiple of m - (-1 - 2) - -5 and 8? 8 Let n(u) = -u**2 + 9*u + 86. Let i be n(-6). Let d(z) = -z**3 - 6*z**2 - 5*z + 16. What is the smallest common multiple of d(i) and 320? 320 Let i = -834 + 850. Suppose -7*p - 5*p = -192. What is the smallest common multiple of p and i? 16 Let u be (-6938)/(-13860) - (11/(-2))/(-11). Let i = -105121/27720 + u. Calculate the common denominator of 46/21 and i. 168 Suppose 0 = -4*y - 0*y + 140. Let g(n) = -21*n - 349. Calculate the lowest common multiple of y and g(-19). 350 Let g be (7 - 6)*(-9)/(-1). Let o(q) = q**2 - 7*q + 30. Calculate the lowest common multiple of 18 and o(g). 144 Let h(w) = w**3 - 6*w**2 + w - 16. Let x(z) = -43 + 2*z**2 + 5*z**3 - 3*z**3 + 50. Let l be x(0). Calculate the lowest common multiple of h(l) and 36. 360 Calculate the common denominator of -17/264 and (-46075)/(-47880)*6/20. 3696 Let m = 383099/1740 - 2201/10. Find the common denominator of m and 111/580. 1740 Let z(c) = -c**2 + 7*c - 175. Let w be z(0). What is the common denominator of (w/(-56) - -4) + 5 and -35/184? 184 Let y(j) = -2*j**2 + 43*j + 44. Let l be y(-1). Let t = -5948/8721 + -7/323. What is the common denominator | Low | [
0.49714285714285705,
21.75,
22
] |
If you took a time machine back to John Dobson Street in central Newcastle in 2013, you’d be struck by its transformation in the years since. An inhospitable dual carriageway has been replaced by a single carriageway with wider pavements and a 400m bike lane. The result: a fourfold increase in people cycling along the route. Initial findings from a government report reveal how just 14 disconnected cycle schemes in eight English cities, part of the government’s Cycle City Ambition Fund programme (CCAF), have cut 440,000 car trips per year, replaced 2m kilometres of driving with cycling trips and made cycling attractive for a broader demographic. This week the government announced £5bn over five years for cycling and buses, including 250 miles of cycle routes, which they say will be built to tough new design standards. Although Boris Johnson said on Tuesday in the Commons that just £350m of that would be for cycling, this appeared to be a mistake. The DfT says there will not be any clarification on how much money will go where until the spending review The transport announcement was met with derision from the opposition for its piecemeal nature, though Johnson said more money was coming in this month’s budget. However, the new CCAF report highlights how important it is for the government to build quality cycle routes that are more than just white paint. A quick history: it is a peculiar quirk that cycling has one of the best returns on investment of all transport, £5.50 per £1 spent, and yet it suffers the most myopic planning. So it was that in 2013, just eight English cities and regions received money to spend, sharpish, on cycling infrastructure and “softer measures” such as training and promotion. The lucky few sprang into action. They were: Birmingham, Cambridge, Greater Manchester, Newcastle, Norwich, Oxford, Bristol, Bath and north-east Somerset and south Gloucestershire, and West Yorkshire Combined Authority (Leeds, Bradford and neighbouring areas). They came up with a mixed bag of cycle superhighways, shorter segregated routes, “mixed routes” of quiet roads, green space and segregated paths, city centre schemes, canal towpaths and junction treatments. Some were very good; others were not. The initial findings were city-wide increases in cycling in all eight areas and, in some places, a decrease in car journeys. But their success varied. These are interim figures, with work on the final report just starting. Their lessons are: • Build it and they will cycle more – and drive less. The report’s authors note a very clear cycling uptick in cities that invested in cycling infrastructure, many with a similar magnitude of reduction in car use. At least 440,000 car trips per year have switched to cycle trips because of the new routes, or roughly 2m kilometres of driving. Some of the increase was a continuation of an upward trend in cycling before investment, which means many cities were “pushing at an open door”. • All cycle lanes are not created equal. Consistent, kerb-protected routes are a better investment than the less ambitious white-paint-on-the-road routes, if you want more people using them. The most successful routes were away from motor traffic entirely, including improved towpaths in Birmingham, where cycling increased by 157%. In Manchester, a decent-quality protected cycle route on Wilmslow Road has prompted increases of between 85% and 176% since completion – and numbers are still climbing. On Manchester’s Broughton cycleway, a lower-quality route “protected” by plastic wands and “armadillos” (little rubber blocks bolted to the road), there was, however, little change. • Better cycle routes mean greater diversity. The new infrastructure seems to attract people who are more representative of the general population. Surveys found 18% of new riders were from ethnic minority groups compared with 8% of existing cyclists and 14% of the general population. About 43% of new cyclists were women, compared with 33% of existing riders. The findings also suggest more new cyclists were from households with lower than average earnings than existing riders. • A bike lane here and there isn’t enough to improve safety, or perceptions of safety. For that, you need a network. Surveys from the eight areas showed little improvement in how safe people felt cycling there – particularly where children were concerned. This is hardly surprising, as most changes were only to a road or two in each location. • Cycling investment brings health benefits. Half of people who already cycled and four-fifths of new cyclists say they noticed improvements in their wellbeing because of the new cycle routes. The government has admitted that it is just 40% of the way to its target of doubling cycling by 2025, and that “substantial further investment” is needed. The charity Cycling UK says that to meet the target, the government must invest a further £6-8bn by 2025 on top of the £2.4bn the government believes will be spent by 2021, as well as decent new design standards for cycle infrastructure. If our time machine could travel seven years into the future, we should expect to see similar people-friendly transformations in town and city centres up and down the country. Boris Johnson told the Commons yesterday that he wanted a new generation of cyclists to “pedal safely and happily to school and work in tree-dappled sunlight on their own network of segregated paths”. The excuses for not building that network are getting harder to make. | Mid | [
0.5811764705882351,
30.875,
22.25
] |
How the size of a room can affect the spread of coronavirus Considering the shop or office you're walking into is also important. You might be 6 feet away when you're speaking to someone, but if it's a small room, the accumulation droplets have only so many places to go. Walking into the confined space of, say, your boss's office is a much different proposition than your boss walking out to speak to you in the open floor plan of your office or even outside your building. How airflow can affect the spread of coronavirus The amount of airflow and how it flows through an area can have a significant impact as well. The air-conditioned, windowless restaurant offers a stark example of the dangers of sitting in close proximity to one another, as well as how contaminated air particles can stay aloft on currents within a room. Within five days, three people sitting at the infected patron's table were infected along with another at table C – located below the air conditioner's outlet and return. The linkage to the air conditioner and COVID-19 particles in air is more sharply drawn 12 days later. Of the 91 people in the restaurant during that hour, only those at tables A, B and C contracted the illness. There were more tables in the restaurant than shown here. It's possible some of the patrons were infected in subsequent days by family members sitting at their table, the report notes. Still, the close quarters and the air conditioning combined to heighten the risk that any of the patrons in that row would contract the virus. The report says, "We recommend strengthening temperature-monitoring surveillance, increasing the distance between tables, and improving ventilation." How time can affect the spread of coronavirus Researchers say time is another factor in whether someone contracts SARS-CoV-2. Spending a few minutes in a location rather than a few hours significantly lowers your risk of infection. Consider the difference for those working several hours in a grocery store versus someone shopping for several minutes. Erin Bromage, an associate professor at the University of Massachusetts, points out that when the number of shoppers is restricted and the air volume in the store is large, shoppers' risk of infection is relatively low. "But for the store worker, the extended time they spend in the store provides a greater opportunity to receive the infectious dose, and therefore, the job becomes more risky," Bromage wrote in his COVID-19 blog. Nearly 100 people contracted COVID-19 on one floor of the building that housed the call center. The building's infection rate was 8.5%, but the call center's infection rate was as high as 43.5%, according to the report. Even more unusual: All but five of the reported cases were on one side of the floor. The close proximity of the workers' desks contributed to some of the spread, the CDC report says, but the fact that the spread was limited to one part of the call center suggests more was at work: "Despite considerable interaction between workers on different floors of building X in the elevators and lobby, spread of COVID-19 was limited almost exclusively to the 11th floor, which indicates that the duration of interaction (or contact) was likely the main facilitator for further spreading of SARS-CoV-2." Closer to home, a choir practice March 10 in Washington state appears to have been the focal point of dozens of infections (including two deaths). After more than two hours singing in a room about the size of volleyball court, "deep-breathing while singing facilitated those respiratory droplets getting deep into the lungs," Bromage wrote. | High | [
0.6721088435374151,
30.875,
15.0625
] |
Prognostic factors of infective endocarditis in patients on hemodialysis: A case series from a National Multicenter Registry. Infective endocarditis (IE) is a severe complication associated with high mortality. To examine the clinical characteristics of IE in hemodialysis (HD) patients and to determine prognostic factors related to HD. From January 2008 to April 2015, 2488 consecutive patients with definite IE were included. Clinical characteristics of IE patients on HD were compared with those of IE patients who were not on HD. A total of 126 patients (63% male, median age: 66years; IQR: 54-74years) with IE (5.1%) were on HD. Fifty-two patients died during hospitalization (41%) and 17 additional patients (14%) died during the first year. The rate of patients who underwent surgery during hospitalization was lower in HD patients (38 patients, 30%) than in non-HD patients (1177 patients, 50%; p<0.001). Age >70years (OR: 4.1, 95% CI: 1.7-10), heart failure (OR: 3.3, 95% CI: 1.4-7-6), central nervous system (CNS) vascular events (OR: 6.7, 95% CI: 2.1-22) and septic shock (OR: 4.1, 95% CI: 1.4-12.1) were independently associated with fatal outcome in HD patients. Of the 38 patients who underwent surgery, 15 (39.5%) died during hospitalization. HD patients with IE present a high mortality. Advanced age and complications, such as heart failure, CNS stroke or septic shock, are associated with mortality. | High | [
0.7115666178623711,
30.375,
12.3125
] |
Hi, I'm Gardener Scott. Like most gardeners who grow zucchini, I'm always looking for ways to use the abundant harvest and one way is to make zucchini pickles. And that's what I'm doing today. So join me as I ferment zucchini. I grew this beautiful golden zucchini this year and had a great harvest. So much that we've had it steamed and grilled and roasted, and eaten in just about every way you can imagine. I've even made zucchini bread, but what I haven't done yet, and it's a delicious option, is to make zucchini pickles. Using a fermentation process I'll take these beautiful zucchinis and over the course a couple days turn them into a delicious snack. The fermentation process is very easy. We'll take our zucchini, we'll put it into a clean quart jar, we'll cover it with a brine and then we'll let bacteria do the rest. The brine is simply salt and water and the bacteria that lives in that type of environment will form lactic acid and that lactic acid is what ferments and preserves the zucchini. Now, we could just stop there with the zucchini in the jar covered by brine. It'll taste good, be good for us. But I like more depth of flavor in my zucchini pickles. So today I'll be adding onion, some wonderful garlic that I harvested recently, and to kick it up a notch, some cayenne peppers that I grew and dried last year. I have all of my ingredients laid out, ready to go and I've already made my brine. As I mentioned, the brine is simply water and salt, so in my measuring cup I measured four cups of filtered water, and to this I'm adding two tablespoons of salt. The four cups of water and the two tablespoons of salt is enough for making two quarts of the fermented zucchini, which is what I'm planning today. The basic recipe is 2 cups of water and 1 tablespoon of salt for each quart, so you can modify the amount of the brine based on how many quarts you choose to make. I have two different sizes of zucchini today, some small tender and some medium size golden zucchini. I think these small ones will work best to cut into disks and I think these big ones will work best to cut into spears. So I'll begin by cutting the tops off of the zucchini. Those will go in my compost pile. And then I'll cut each of these individual ones into slices and each of these is a little more than 1/4 inch thick, and I'll just continue this process, making these disks that will go into the jar. For the spears, I'll want the length to match with the height of the jar. So I'll actually use the jar to determine how long I cut these individual spears. Because I have the other ingredients inside, I'll want to measure just below where the shoulder of the jar is and just above where the bottom of the jar is. And so I'll make my cut right there. So each of the spears will now be tall enough to fit in the jar, and then I'll just cut it in half. Let's cut it in half again, and then cut in half again. So each of these zucchini will give me four spears to put into the jar. So now everything is ready to go into the jars. One thing I'll add first, which is a little unique, is a grape leaf. And I'll put the grape leaf into the jar first. Why a grape leaf? Well the fermentation process can make the zucchini a little soft, a little soggy. You may have had soggy pickles before. The tannins in the grape leaves will help firm up these pickles so they won't be quite as soft, quite as soggy. If you don't have grape leaves, you could use bay leaves, you could use oak leaves, or you could use nothing at all. This is just one of those little tricks that can make them a little bit crunchier. After I've got the grape leaf in, now I'll add my slice of onion, which goes all the way down to the bottom. And then I can begin putting in the individual pieces of zucchini. I'll start by just dropping it in. I'll shake it a little bit to try to make sure it fits all the way down and relieve some of the air pockets that might develop. Along the way I'll also put in some of these garlic cloves for flavor and I want to put enough zucchini in here so that when it's full it comes up just below the ring on the jar. With this in place, I'll now add a couple of these cayenne peppers and just push them down the side of the jar. And, again, this is one of those things you don't have to do but I like the spiciness that is offers. Then I'll take another grape leaf and stick it on top and then it's ready for the brine. I'll just pour the brine in until it comes up just below that ring on the jar. You can use a spatula, a knife, anything just to try to knock out some of the air bubbles at this point, as well, because there's a lot of air in here and the liquid will drop a little bit. Once I release some of those air bubbles, I'll put a little more of the brine in and now we want to weight this down. For the bacteria that create the lactic acid to ferment this best, it all needs to be submerged because that bacteria can't live in the presence of air. You can use anything you want to weigh it down. In fact right now that grape leaf may be enough to hold all of the zucchini underneath the brine, but I'll add a glass weight on top just to be sure and then I'll take one of these really cool fermentation tops and put it on top, secure it with a band, and this is ready to go. So let's run through that again using the other jar and some close-ups so you can see exactly what I'm doing, I'll take a grape leaf and put it at the bottom of the jar. Then I take my onion slice, put it on top of the grape leaf, use the spatula just to press it all down, and now I'll add the zucchini. With these spears I'll put them in so that they form all the way around the side and fit pretty snugly. I'll add the garlic, for all that extra flavor, and then I'll take these cayenne peppers and drop them in, to add that little bit of zing. I'll finish with the grape leaf on top. Remember this helps hold it all under the brine in addition to adding some crunch. Pour the brine in, right up to this ring on the jar. Shake it, try to relieve any air bubbles that might be in there, add a little bit more brine if we need to, put the glass weight to hold it all down, put a fermentation lid on it, screw it on with a band, and that's all there is to it. It doesn't take long at all for this zucchini to ferment. In fact, it's only a three to five day fermentation process and at that 3-day point, I'll actually taste it and if I like it I can stop the fermentation by sticking it in the refrigerator and start to enjoy it. If I want it to ferment a little more, I can give it a few more days. So for now, I'm sticking these jars in a nice cool spot and I'll be back in three days. It's the end of the third day and now I'm ready to try these zucchini pickles. After three days, you'll probably notice that the water will start to get a little cloudy and you may even see some of the bubbles of carbon dioxide gas that will slowly work their way up to the top of the jar. I've removed the top, taken out the weight, and now I can start checking these zucchini pickles. You'll notice right away if something has gone wrong. If it smells bad then it probably is bad. It should have a really nice flavorful fragrance. So let's move aside this grape leaf and try one. It's crunchy, slightly sour. It's got a little bit of heat from that pepper. The garlic is infused throughout. This is really good This is really good. I say this is a keeper. I can put it in the refrigerator right now at this 3-day point. I could let it ferment another day or two and that will change the flavor slightly. It'll affect how the brine soaks in and the fermentation continues and how sour the pickle becomes, but I think it's just slightly sour right now. It's got some really good flavor. So I'm gonna stop the fermentation right now and I'll have these pickles ready to eat. They probably won't last more than a few days but this fermentation process is done. And this project is complete. So there you have it. That's how I ferment zucchini. If you have any comments or questions, please let me know below. If you haven't subscribed to the Gardener Scott channel you can do so now. If you liked the video, you can give me a thumbs up and share it. I'm Gardener Scott. Enjoy fermenting. | High | [
0.669260700389105,
32.25,
15.9375
] |
Q: What is the resolution of Git's commit-date or author-date timestamps? From what I can see, Git commit dates and author dates are only accurate to one second. I'm wondering if this is as precise as they get or can I get the timestamp in milliseconds or even microseconds. This command returns the UNIX Timestamp using the commit hash of the first commit: git show -s --format="%ct" 2d9afdfb9e2fa9b349312734b462bb7d57a684ee Result: 1421437899 What is GIT's commit-date or author-date timestamp precision? A: The resolution of Git commit/author dates is 1 second, which, as pointed out by Alexey Ten and Edward Thomson, is also the resolution of Unix timestamps. An interesting experiment that you can conduct is to create a commit, and amend it very quickly, without changing anything (not even the commit message). As you may know, amending a commit actually creates a new commit. Normally, the new commit would have a different timestamp, and, therefore, a different commit ID from that of the first commit. However, you can write a script that creates the commit and amends it within the same system-clock second (with a bit of luck!), thereby producing a commit whose hash is the same as the first commit's. First, set things up: $ mkdir testGit $ cd testGit $ git init Then write this to a script file (called commitAmend.sh below) #!/bin/sh # create content and commit printf "Hello World.\n" > README.md git add README.md git commit -m "add README" git log # amend the commit git commit --amend --no-edit git log and run it: $ sh commitAmend.sh [master (root-commit) 11e59c4] add README 1 file changed, 1 insertion(+) create mode 100644 README.md commit 11e59c47ba2f9754eaf3eb7693a33c22651d57c7 Author: jub0bs <xxxxxxxxxxx> Date: Fri Jan 30 14:25:58 2015 +0000 add README [master 11e59c4] add README Date: Fri Jan 30 14:25:58 2015 +0000 1 file changed, 1 insertion(+) create mode 100644 README.md commit 11e59c47ba2f9754eaf3eb7693a33c22651d57c7 Author: jub0bs <xxxxxxxxxxx> Date: Fri Jan 30 14:25:58 2015 +0000 add README Same timestamp, same hash! A: It is one second; while git-show is prettifying the output a bit, you can see the raw commit information using the git-cat-file command. For example: % git cat-file commit HEAD tree 340c0a26a5efed1f029fe1d719dd2f3beebdb910 parent 1ac5acdc695b837a921897a9d42acc75649cfd4f author Edward Thomson <[email protected]> 1422564055 -0600 committer Edward Thomson <[email protected]> 1422564055 -0600 My witty comment goes here. You can see indeed that this is a Unix timestamp with a resolution of 1 second. | High | [
0.6649616368286441,
32.5,
16.375
] |
Can Photographers Legally Refuse to Photograph an LGBT Wedding If It Violates Their Religion? Can Photographers Legally Refuse to Photograph an LGBT Wedding If It Violates Their Religion? Each of the 20 states which have these religious freedom (RFRA) laws write them differently. The first of its kind is a federal law called the Religious Freedom Restoration Act. The act “gave religious objectors a statutory presumptive entitlement to exemption from generally applicable laws (subject to strict scrutiny). Government may substantially burden a person’s exercise of religion only if it demonstrates that application of the burden to the person . . . is the least restrictive means of furthering [a] compelling governmental interest.’ LGBT Community Forums About Our LGBT Community Our LGBT Community has been created as an informational resource focused around the Lesbian, Gay, Bisexual, and Transgender community. Our wishes are to create a safe and factual venue for everyone to gather and share their resources to make a better life. Become part of our conversation and join in on our discussions in the community forum and follow our LGBT Blog for recent community updates! | Mid | [
0.625531914893617,
36.75,
22
] |
Cadmium and lead in cocoa powder and chocolate products in the US Market. Cocoa powder and chocolate products are known to sometimes contain cadmium (Cd) and lead (Pb) from environmental origins. A convenience sample of cocoa powder, dark chocolate, milk chocolate, and cocoa nib products was purchased at retail in the US and analysed using inductively coupled plasma mass spectrometry to assess Cd and Pb concentrations. Cd and Pb were evaluated in relation to the percent cocoa solids and to the reported origin of the cocoa powder and chocolate products. Cd ranged from 0.004 to 3.15 mg/kg and Pb ranged from <LOD to 0.38 mg/kg. Cd and Pb were significantly correlated with percent cocoa, with correlations varying by product type and geographic origin. Geographic variation was observed for Cd, with higher Cd concentrations found in products reported as originating from Latin America than from Africa. The influence of percent cocoa solids and cocoa origin on Cd levels are relevant to international standards for Cd in chocolate products. | Mid | [
0.624434389140271,
34.5,
20.75
] |
Q: Jetty - capping sessions for crawlers/anonymous I'm looking for a way of capping number of sessions created for crawlers and/or anonymous users on my webapp (running on Jetty). I want to decrease number of sessions on the app. There are multiple sessions created for crawlers as many of them do not respect cookies. That would also help when app gets under DDoS. There is already a solution for tomcat ( 'crawler session valve') but I need solution for Jetty. What would be your recommendation on capping unwanted sessions? Thanks, JB A: Use the Jetty DoS Filter: "The Denial of Service (DoS) filter limits exposure to request flooding, whether malicious, or as a result of a misconfigured client. The DoS filter keeps track of the number of requests from a connection per second. If the requests exceed the limit, Jetty rejects, delays, or throttles the request, and sends a warning message. The filter works on the assumption that the attacker might be written in simple blocking style, so by suspending requests you are hopefully consuming the attacker's resources. The DoS filter is related to the QoS filter, using Continuations to prioritize requests and avoid thread starvation." http://wiki.eclipse.org/Jetty/Reference/DoSFilter Other configs that are worth looking at can be found in the Jetty Optimization Article: http://67-23-9-112.static.slicehost.net/doc/optimization.html | High | [
0.7215909090909091,
31.75,
12.25
] |
Q: Direct and Mutual Recursion in JavaScript I am aware of basic concept of recursion, i.e. A function which calls itself is recursion. Now I was going through NodeJS documentation, I found something called Direct Recursion and Mutual Recursion. I found a wikipedia documentation regarding Mutual recursion. But not sure how it works with JavaScript. I have following questions about recursion. How does Function declaration and variable hoisting work with mutual recursion? Does direct recursion refer to term recursion? Is this an example of direct recursion?: function abc(num,sum){ if(num<=0) return sum; return abc(--num,sum); } A: Each call makes a new scope. Variable hoisting works the same on all functions regardless if it's recursion or not. Each call has their own set of the argument and local variables since they are in different stack frames. However if you pass objects and mutate them then the effect will be for all bindings that point to that object. Yes. Direct recursion is more like the mathematical concept. Mutual recursion is vague suggestion that somewhere a call from this function will eventually end up with a call to an instance of this function again, but there might be a long and complex path such that it might not be possible to determine it by looking at the code. Your abs is direct recursion. Here are examples that checks if a positive numeric argument is odd. Direct recursion: function isOddDirect(n) { if (n < 1) return false; if (n === 1) return true; return isOddDirect(n-2); } Mutual recursion: function isOdd(num) { if (num === 1) return true; return !isEven(num-1); } function isEven(num) { if (num === 0) return true; return !isOdd(num-1); } A function might use both direct and indirect recursion in the same function definition and then it would do both. Direct is always that it calls itself explicitly while indirect is where it doesn't look like recursion but eventually flow can lead back to the original function. It's possible to make this so obscure that the compiler wouldn't know it is recursion while a explicit self call usually are easy to determine. If the (mutual) recusive function is in tail position has nothing to do if it is direct or mutual. | Mid | [
0.6297297297297291,
29.125,
17.125
] |
Tonkawa (YTB-786) Tonkawa (YTB-786) was a United States Navy named for Tonkawa, Oklahoma. Construction The contract for Tonkawa was awarded 31 January 1964. She was laid down on 22 December 1965 at Marinette, Wisconsin, by Marinette Marine and launched 15 March 1966. Operational history Placed in service in June 1966, Tonkawa was assigned to duty at Atlantic Area Advanced Bases, including Naval Station Rota Spain, and provided tug and tow services for the Atlantic Fleet. Stricken from the Navy List in 1992, she was sold 6 October 2000 through the General Services Administration (GSA) to McAllister Towing and renamed Margaret McAllister. References NavSource Online: Service Ship Photo Archive Tonkawa (YTB-786) External links Category:Natick-class large harbor tugs Category:Ships built in Wisconsin Category:1966 ships | Low | [
0.533622559652928,
30.75,
26.875
] |
Search form The Abercrombie & Fitch Co.’s “exclusionary” policies are perpetuating a culture that over-emphasizes the importance of thinness and acceptance, according to a group of approximately 20 protesters who took their message to Chicago’s Water Tower Place Monday afternoon. “Abercrombie & Fitch represents what’s wrong with our society because they are emphasizing ‘you have to look this way or you can’t wear this; you have to have washboard abs’ and many people end up feeling inferior and bad about themselves,” said Dr. Maria Rago, a clinical psychologist and vice president of the Naperville-based National Association of Anorexia Nervosa (ANAD). “Discriminatory” comments made in 2006 by Abercrombie & Fitch’s CEO Mike Jeffries resurfaced in a recent Business Insider article and, thanks to a social media campaign led by Rago, incited outrage and provoked Monday’s protest in Chicago. “In every school there are the cool and popular kids, and then there are the not-so-cool kids,” Jeffries said in an interview with Salon. “Candidly, we go after the cool kids. We go after the attractive all-American kid with a great attitude and a lot of friends. A lot of people don’t belong [in our clothes], and they can’t belong. Are we exclusionary? Absolutely.” Majority of the protesters were young women who held signs with messages such as “size doesn’t matter” and “all kids are cool.” Many of the participants passed out flyers encouraging Michigan Ave. shoppers to boycott the store. “(Teenagers) can internalize those messages that they’re fat, or that they’re not accepted or that they’re not cool, and we don’t want to see that,” Rago said. Abercrombie & Fitch does not offer women’s clothing in sizes bigger than large. The largest women’s pant size is 10. Men’s sizes range from small to double extra large. “When I hear Mike Jeffries say ‘are we exclusionary? Absolutely’ what I hear is, ‘are we ignorant? Absolutely,” said Cali Linstrom, 17, a student from Glenbard West High School in Glen Ellyn, who participated in the protest. Linstrom, who battled anorexia last year and at one point was hospitalized for weighing 82 pounds, said there’s “no such thing as a wrong body.” She blamed retailers like Abercrombie for creating an environment that subjects women to challenging standards. “If you look at the culture we live in, there’s so much pressure to be thin,” she said. “Looks can only get you so far in life, but good choices and good character can get you anywhere.” Selling casual apparel for men, women, and kids, the stores’ target demographic is seven to 22 year-olds, according to Bloomberg. “Who is Mike Jeffries to discriminate and decide who’s cool and who’s not cool? Abercrombie and Fitch is telling girls who are average that they’re too fat,” said Tiffany Skrezyna, 25, a barista at Starbucks and participant in Monday’s protest. Skrezyna suffered from an eating disorder for seven years. She said that, although she fits in the clothing, she is boycotting the store for imposing “unreachable standards” on teenagers. “I don’t think that Jeffries himself is going to care, but if enough people see this and think twice before they shop at the company, then that’s getting the message across in another way, because he will certainly care about that,” she said. A Change.org petition calls on Jeffries to "make clothes for teens of all sizes." Demanding an apology from Jeffries, the petition has received nearly 8,500 signatures. Linstrom, who noted she could also fit in Abercrombie’s clothing, said she would also boycott the company. “So many people feel dissatisfied with their bodies, it’s such a common problem for women,” Linstrom said. “This is just playing into that, telling so many women, so many men, that they’re not good enough because they can’t fit into the clothes.” | Mid | [
0.5924050632911391,
29.25,
20.125
] |
The pH of the intracellular compartment is tightly controlled in all eukaryotic cells. This control is crucial for various biological processes, including intracellular membrane trafficking, endocytosis, protein degradation, bone resorption, and small-molecule uptake. The vacuolar H+ ATPase (V-ATPase) is one of the central players in regulating acidity in eukaryotic cells and the loss of V-ATPase function is in general lethal at early stages of development. V-ATPases are large multi-subunit protein complexes that function as a rotary molecular motor, and are organized into two domains, V0 and V1. The V1 domain is located on the cytoplasmic side of the membrane and carries out ATP hydrolysis, whereas the V0 domain is a membrane embedded complex that is responsible for proton translocation across the membrane.1-3 The V1 domain is composed of eight different subunits (A, B, C, D, E, F, G, H) and the V0 domain contains five different subunits (a, b, c, d, and e) in mammals, some of which are present in multiple copies. The core of the V1 domain contains a hexamer of A and B subunits, which participates in ATP binding and hydrolysis with the most of the residues responsible for ATP binding contributed by the catalytic subunit A. Dysregulation of V-ATPase has been implicated in a number of diseases, including renal disease (renal tubular acidosis)4, bone disease (osteoporosis)5, and tumor metastasis.6 For example, the V-ATPase activity has been found to be significantly higher in the highly invasive MB231 breast cancer cells than the largely non-metastatic MCF7 cells.6,7 The treatment of MB231 cells with bafilomycin, a known V-ATPase inhibitor, significantly inhibited the invasiveness of cancer cells, suggesting that V-ATPase is a potential drug target for blocking cancer metastasis.2,8 In addition to cancer, V-ATPase is also implicated in renal and bone di seases.2,9 A number of inhibitors of V-ATPase have been identified and tested for their therapeutic potentials. For example, macrolide antibiotics with 18-membered lactone rings, bafilomycin and concanamycin, were found to be selective inhibitors of V-ATPases soon after their isolation from Streptomyces in the 1980s.10 A series of studies revealed that these plecomacrolides primary bound to the V0 subunit c and perturbed rotation of the b/c-ring. In addition to inhibiting V-ATPase, bafilomycin impairs mitochondrial function by acting as a carrier type potassium ionophore.11 Additional inhibitors of V-ATPase were subsequently discovered,10 such as archazolid, which is a natural product produced by the myxobacteria Archangium gephyra and Cystobacter violaceus. Archazolid, which also binds to c subunit, appears to be a highly potent V-ATPase inhibitor and blocks the growth of mammalian cells at subnanomolar concentrations. Another class of V-ATPase inhibitors, benzolactone enamides (e.g., salicylihamide, apicularens and cruentaren) that was isolated from various natural sources, demonstrated potent inhibition against mammalian V-ATPase, but surprisingly no effects on fungal V-ATPase. However, these natural products tend to be highly toxic to mammalian cells. Previous studies revealed that the binding sites of benzolactone enamides should still reside within V0 domain but differ from plecomacrolides. A number of novel indole derivatives were synthesized based on bafilomycin structure. Among these indole-containing bafilomycin analogs, INDOL0 interacts with the V0 subunit c and cause potent inhibition against V-ATPase. A number of V-ATPase inhibitors such as synthetic benzolactone enamide RTA203 (a derivative of salicylihalamide), indole derivatives NiK12192 and SB24278, tributyltin chloride (TBTCl), 3-bromopyruvate (3-Br-PA) have been reported recently. However, the binding site of these synthetic V-ATPase inhibitors is often not known. Novel small molecules with defined mechanism of inhibition against V-ATPase are needed to evaluate the therapeutic potential of V-ATPase inhibitors in human diseases. | High | [
0.6748166259168701,
34.5,
16.625
] |
Latino Physicians in the United States, 1980-2010: A Thirty-Year Overview From the Censuses. To update and extend a 2000 study on the California Latino physician workforce, the authors examined the Latino physician workforce in the 30-year time frame spanning 1980 to 2010, comparing changes in the rates of physicians per 100,000 population for the Latino and non-Hispanic white (NHW) populations in the United States as a whole and in the five states with (in 2010) the largest Latino populations. The authors used detailed data from the U.S. Census (Public Use Microdata Samples for 1980-2010) to identify total population, total number of physicians, and Spanish-language ability for both the Latino and NHW populations. They examined nativity for only Latinos. At the national level, the NHW physician rate per 100,000 of the NHW population increased from 211 in 1980 to 315 in 2010 while the Latino physician rate per 100,000 of the Latino population dropped over the same period from 135 to 105. With small variations, the same trend occurred in all five of the states examined. At the national and state levels, Latino physicians were far more likely to speak Spanish than NHW physicians. Over the 30-year period, the Latino physician population has evolved from being primarily foreign born to being about evenly split between foreign born and U.S. born. The Latino physician shortage has worsened over the past 30 years. The authors recommend immediate action on the national and local level to increase the supply of Latino physicians. | High | [
0.680203045685279,
33.5,
15.75
] |
Learn about targeted therapies for NSCLC Targeted therapies used to treat NSCLC Currently, three targeted therapies are approved to treat NSCLC. Tarceva (erlotinib) and Xalkori (crizotinib) are in pill form, while Avastin (bevacizumab) is administered through an IV. Targeted therapies have side effects, however they are often less severe than those from chemotherapy. Targeted therapies may be given alone or particularly in the case of Avastin, with chemotherapy. Targeted therapies are sometimes used as maintenace therapy. | High | [
0.6937590711175611,
29.875,
13.1875
] |
Occult Renal Granulomatous Inflammatory Lesions in Granulomatosis with Polyangiitis Detected by 18F-FDG PET/CT. A 33-year-old woman with a 7-month history of granulomatosis with polyangiitis F-FDG PET/CT scan due to low-grade intermittent fever and elevation of serum inflammatory markers, which revealed multiple hypermetabolic lesions in bilateral kidneys. Biopsy of a lesion showed granulomatosis with polyangiitis, consistent with renal involvement of granulomatosis with polyangiitis. | Mid | [
0.557377049180327,
25.5,
20.25
] |
Power and Renewables Brazil: Sweet dreams Jun 28, 2013 Brighter forecasts and new measures from Brazil’s government should help sugar and bioenergy producers, which have been pinched in recent years By Ben Miller Lower prices have taken a toll in recent years on sugar producers in Brazil, which accounts for 40% of the world’s production. But things may be looking up as companies diversify and the government considers fresh support measures. It’s an industry where scale matters. But while it’s been largely a game for the biggest players, smaller companies have also managed to stay their ground. An industry that not many years ago was still largely family-owned has seen the arrival of international names like Shell, Louis Dreyfus, Cargill, and Noble to both the sugar and biofuel sides of the business. Indigenous Cosan has built itself up to dominate the market. Big producers crush 50 million tons a year, though for many single-mill operators, that sum is less than 10 million. In the past two years, however, a group of medium-sized producers has also found its... | Low | [
0.45824847250509104,
28.125,
33.25
] |
Jennifer Smith For Dailymail.com and Francesca Chambers, Senior White House Correspondent For Dailydailymail.com Jennifer Smith For Dailymail.com and Francesca Chambers, Senior White House Correspondent For Dailydailymail.com 11-10-2019 Jennifer Smith For Dailymail.com and Francesca Chambers, Senior White House Correspondent For Dailydailymail.com Official: Turkish artillery fire comes close to US forces CNN See more videos SHARE SHARE TWEET SHARE EMAIL What to watch next Troye: I've seen Covid-19 task force members struggle every day Remembering a classic adult hotel playland NC elections chief: New changes have given 'clarity' to the voters US still in first wave of pandemic See the tapes that could unravel a controversial mine project How China's Ant Group built a $17 trillion payments machine United to offer coronavirus tests to some passengers See 'man cave' discovered under Grand Central Terminal Shocking twist for Hotel Rwanda hero Breonna Taylor's aunt reads powerful words from Taylor's mother 'Public Trust' shows battle over public lands Dad dances to cheer up son getting cancer treatment Protester hit by pick-up truck in LA Voter: Trump isn't the man to deal with racial issues What it's like inside Portland protests Video shows police officer rolling bike over protester's head Click to expand Replay Video Troye: I've seen Covid-19 task force members struggle every day CNN's Wolf Blitzer speaks to Olivia Troye, former aide to the Vice President, about reports that President Donald Trump has lost patience with top public health experts on his coronavirus team because their sober messaging on the future of the pandemic clashes with his more positive assessments. CNN Troye: I've seen Covid-19 task force members struggle every day CNN's Wolf Blitzer speaks to Olivia Troye, former aide to the Vice President, about reports that President Donald Trump has lost patience with top public health experts on his coronavirus team because their sober messaging on the future of the pandemic clashes with his more positive assessments. CNN Remembering a classic adult hotel playland CNN's Holly Firfer travels back in time to the Holiday Inn Holidome CNN Remembering a classic adult hotel playland CNN's Holly Firfer travels back in time to the Holiday Inn Holidome CNN NC elections chief: New changes have given 'clarity' to the voters Karen Brinson Bell joins The Lead. CNN UP NEXT Turkish troops shelled a US Special Forces unit in northern Syria on Friday, apparently 'by mistake', as they moved in on Kurdish fighters days after President Trump said he would remove American soldiers from the region. No one was injured and the artillery fell several hundred meters from where the US troops were stationed, according to CNN. The Pentagon has not yet commented. The shelling occurred on Mashtenour hill in Kobani, a border city under Kurdish control. Turkish forces are moving in on the region to reclaim it from the YPG, a group of Kurdish fighters. Turkish forces allege that YPG fighters are planning to launch attacks over the border from the area. The president, when asked about the shelling on the White House lawn on Friday afternoon, said: 'We'll take a look at it.' © Provided by Associated Newspapers Limited Members of the Turkish-backed Syrian Free Army enter Syria's Rasulayn clear the town on Friday It wants to move in and create a 'safe zone', wiping out the Kurds and any ISIS prisoners being kept there. Earlier this week, Trump agreed to remove US Special Operation Units which have been in the region for years, bolstering the Kurds in their fight against ISIS, and the Syrian Army. Newsweek cited anonymous Department of Defense officials who said it was unlikely that the Turkish army would mistake US troops for Kurds in that case and that they would be aware of US positions 'down to the grid.' Both a senior Pentagon official and a Iraqi Kurdish intelligence official confirmed the shelling. CNN reported that there was no indication the shelling was deliberate. 'Turkish artillery hit close to a US special operations unit near Kobani on Friday, US official confirms. 'The artillery shells hit several hundred meters from where the US special ops forces were located. There are no US injuries,' one of its reporters tweeted. The Pentagon has not yet responded to DailyMail.com's inquiries. © Provided by Associated Newspapers Limited A map of the region shows how it is divided between Turkey, the Kurds, and the Syrian regime It comes after President Trump agreed to remove US troops from the region, where they have been bolstering the Kurds since the start of the Syrian civil war. Turkey is fighting them, claiming they are a terrorist organization. Trump has been criticized for the decision, with some fearing it could enable ISIS fighters in the region by removing one of the key groups fighting them, and expose the Kurds to harm. He has insisted he will impose sanctions on Turkey if it acts irresponsibly. U.S. Treasury Secretary Steve Mnuchin also fired a warning shot at Turkey on Friday, saying Trump is prepared to impose 'very significant' sanctions on Ankara if President Recep Tayyip Erdogan steps out of line. Mnuchin said that Trump had signed an executive order giving Treasury the authority, in consultation with the State Department, to impose sanctions a moment's notice. He declined to elaborate on potential targets but said financial institutions had been put on notice. Turkey has also been told 'not allow even a single ISIS fighter to escape' from captivity, he announced from the White House podium at a short-notice briefing. Despite the warning, he said Erdogan's invitation to visit the White House on November 13 remained intact. The White House announcement was intended to mollify Republican lawmakers threatening to revolt over the president's decision to remove U.S. troops from Syria, in what they decried as an abandonment of Kurdish allies who helped defeat ISIS, and turn over control of imprisoned terrorists to Erdogan's army. Sens. Lindsey Graham and Chris Van Hollen have vowed to sanction Turkey over the incursion. Mnuchin told DailyMail.com the president has it handled, and Congress should stand down. 'Secretary Pompeo has been speaking to them daily. I’ve been speaking to the Secretary multiple times a day. I think the message to Congress is -- I know that people were contemplating sanctions. We’re on top of sanctions. The President will use them when necessary.' | Low | [
0.512643678160919,
27.875,
26.5
] |
{ "created_at": "2015-02-27T22:28:18.525869", "description": "Hacky homebrew slides generation using google's html5slides.", "fork": false, "full_name": "redline6561/slideware", "language": "Common Lisp", "updated_at": "2015-02-27T23:42:26.422857" } | Low | [
0.520481927710843,
27,
24.875
] |
Reforming way medical students and physicians are taught about quality and safety. The purpose of this article is to briefly review the history of how quality and safety have been addressed in the United States by those who have been teaching medical students and residents, and then discuss why and how this training must change in the future to more effectively address the problems of improving healthcare quality and safety. Although it has become clear that the curriculum in medical schools should encompass quality and safety training, medical schools have been very slow to implement the reforms that are necessary to accomplish such a goal. These changes, although desirable from a rational perspective, involve basic changes in the culture of medical schools and teaching hospitals. Moreover, the cost of implementing these changes would be very large, and, if imposed by outside agencies, would likely constitute an unfunded mandate. It should also be noted that at the present time there are very few people who are well trained to develop and teach these classes. In order to accomplish the goal of improving patient safety, it is essential that we provide much more training and knowledge regarding patient safety to medical students, including knowledge of interventions known to be effective in preventing errors; education in technical performance; information about organizational and team issues; and training in disclosing errors to patients. This training should occur early in the training of professionals, preferably while they are still in school, if such training is to change the culture of medicine. Some suggestions and plans for implementation are discussed, using some innovative programs as examples. | High | [
0.669856459330143,
35,
17.25
] |
Q: How to use dblclick event in highcharts? I am working with Highcharts. I need to make drilldown when series is double clicked. I found an example with Highmaps at this url: http://jsfiddle.net/p29wnkp5/3/ but in my solution dbclick, the event doesn't fire. My example code is at this link: https://stackblitz.com/edit/angular-ztmprq In this example, I only want to handle with double click and click. I want to fire different functions. I don't know how to achieve this. A: The double click event isnt part of highchart, in the fiddle you will notice that its an extrnal module <script src="http://blacklabel.github.io/custom_events/js/customEvents.js"></script> The custom events module is available on bower or npm so should be easy to add to your project bower install highcharts-custom-events or npm i highcharts-custom-events --save from here you can import it to angular as follow. import * as Highcharts from 'highcharts'; import customEvents from 'highcharts-custom-events'; customEvents(Highcharts); updated working fiddle https://stackblitz.com/edit/angular-qzkby6 | Mid | [
0.619496855345911,
24.625,
15.125
] |
Q: How to add an account, if doesn't exist, from a trigger on Lead? Following this answer: https://salesforce.stackexchange.com/a/85662/20466, I was able to "Automatically map Account Look up field on Lead". But that only maps company/accouunt if it already exists. Is it possible to add account automatically, within this trigger, if it doesn't exist? I am using this code to map account lookup field on lead. Any help is much much appreciated. trigger AccName on Lead (before insert, before update) { //List to hold references to all leads invoking trigger... List<Lead> leadsToAddAccountId = new List<Lead>(); //List to hold all company names from leads inserted/update //will be used in SOQL query to find accounts with same name List<String> leadCompanyNames = new List<String>(); //create a lookup map to use for populating Lead.Account_Leads__c fields with matching AccountId //Maps function simliar to Vlookups in Excel, where the 1st column is your key and the 2nd column is your value you want returned. //It this case: //the 1st column will be the Account Name //the 2nd column will be the Account Id Map<String, Id> matchingAcctNames = new Map<String,Id>(); //iterate over leads which invoked this trigger (basically any update/insert)... and add to list for (Lead newLead : trigger.new){ //add lead to list to update with account Id before saving leadsToAddAccountId.add(newLead); //add lead company name to companyName list for SOQL Query to find matching accounts leadCompanyNames.add(newLead.CompanyName); } //Next, query accounts that have matching names and load to lookup Map for(Account acct : [Select Id, Name from Account where Name =: leadCompanyNames]){ matchingAcctNames.put(acct.Name, acct.Id); } //finally, iterate over your leads and update Account_Leads__c field if name matches for(Lead myLead : leadsToAddAccountId ){ myLead.Account_Leads__c = matchingAcctNames.get(myLead.CompanyName); } } A: Of course you can. You just need to see if the map doesn't contain the record, then insert it. That might look like this: trigger AccName on Lead (before insert, before update) { //List to hold references to all leads invoking trigger... List<Lead> leadsToAddAccountId = new List<Lead>(); //List to hold all company names from leads inserted/update //will be used in SOQL query to find accounts with same name Set<String> leadCompanyNames = new Set<String>(); //create a lookup map to use for populating Lead.Account_Leads__c fields with matching AccountId //Maps function simliar to Vlookups in Excel, where the 1st column is your key and the 2nd column is your value you want returned. //It this case: //the 1st column will be the Account Name //the 2nd column will be the Account Id Map<String, Id> matchingAcctNames = new Map<String,Id>(); //iterate over leads which invoked this trigger (basically any update/insert)... and add to list for (Lead newLead : trigger.new){ //add lead to list to update with account Id before saving leadsToAddAccountId.add(newLead); //add lead company name to companyName list for SOQL Query to find matching accounts leadCompanyNames.add(newLead.CompanyName); } // A list to hold new accounts Account[] newAccounts = new Account[0]; // For each name... for(String name: leadCompanyNames) { // If no account was found... if(matchingAcctNames.get(name) == null) { // Create a new one newAccounts.add(new Account(Name=name)); } } // Save new accounts insert newAccounts; // For each new account, map the name to the ID. for(Account acct: newAccounts) { matchingAcctNames.put(acct.Name, acct.Id); } //finally, iterate over your leads and update Account_Leads__c field if name matches for(Lead myLead : leadsToAddAccountId ){ myLead.Account_Leads__c = matchingAcctNames.get(myLead.CompanyName); } } | Mid | [
0.640151515151515,
21.125,
11.875
] |
Renal vascular responsiveness to angiotensin II at an early stage of diabetes: interaction between intrarenal noradrenergic and renin-angiotensin systems. The renin-angiotensin system (RAS) has been implicated in haemodynamic maladaptations of diabetic kidney. Its effects may be modulated by endogenous substances like noradrenaline. Our aim was to study renal vascular response to angiotensin II and the interaction between intrarenal RAS and noradrenergic system at an early diabetic stage. Seven days after alloxan induction of diabetes, concentration-response curves to noradrenaline and angiotensin were generated in isolated, perfused rat kidneys. Percent changes in renal vascular resistance were considered as contractile responses. Diabetic kidneys showed enhanced noradrenaline sensitivity compared to controls. Enalapril and losartan elicited increments in ED(50) of noradrenaline in diabetics (diabetic, 3.4+/-0.2 nmol; diabetic + enalapril, 5.1+/-0.5 nmol, p<0.01 vs. diabetic; diabetic + losartan, 5.5+/-0.7 nmol, p<0.05 vs. diabetic). Maximum response (MR) and sensitivity to angiotensin were augmented in diabetics compared to controls. Prazosin decreased MR and sensitivity in diabetics (MR: control, 156.4%+/-5.1%; diabetic, 262.2%+/-21.1%, p<0.001 vs. control; diabetic + prazosin, 178.8%+/-11.2%, p<0.01 vs. diabetic). Enalapril, losartan and prazosin did not change control responses. At this diabetic stage, renal vasculature presented increased response to angiotensin, and an interaction between renal RAS and noradrenergic system was evidenced. Vascular response to noradrenaline requires the integrity of intrarenal RAS and the participation of AT(1) receptors; alpha(1)-adrenoceptors contribute to vascular response to angiotensin. | High | [
0.664886515353805,
31.125,
15.6875
] |
Q: OOTB Granite Render Condition in AEM I have created a button called annotation and I have added hasannotation OOTB granite render condition. On selection of an image having annotation, the button doesn't get rendered. Image Of the custom button with granite:rendercondition Properties of the button Properties of granite:rendercondition node A: First you need to add granite:rel property to your button. As said in the documentation: This is used to indicate the semantic relationship of the component similar to HTML rel attribute. You can add the AEM existing granite:rel in your custom button as "aem-assets-admin-actions-annotate-activator" as shown /libs/dam/gui/content/assets/jcr:content/actions/selection/annotate Or you can also add your custom value lets say "my-annotation-rel". In this case you need to tell AEM to consider your custom value. In order to do this, you need to overlay /libs/dam/gui/coral/components/admin/contentrenderer/base/assetBase.jsp and add this line : actionRels.add("my-annotation-rel"); Update: render condition is not working because the path is not correctly passed to redercondition component. {requestPathInfo.suffix} does not give the actual path of the asset rather it gives the folder path and hence it fails to check when you are in card/column/list view. In order to implement this, follow these steps: Overlay /libs/dam/gui/coral/components/admin/contentrenderer/base/base.jsp Add this below code inside getActionRels(Node node, boolean hasReplicate,boolean hasRemoveNode, boolean hasModifyAccessControl, boolean isExpiredAsset, boolean isExpiredSubAsset, boolean isDAMAdmin, boolean isContentFragment) method boolean hasAnnotation = false; NodeIterator nodeItr= node.getNodes(); Node commentsNode; while(nodeItr.hasNext()) { Node childNode = nodeItr.nextNode(); NodeIterator childItr = childNode.getNodes(); while(childItr.hasNext()) { Node secondLevelChild = childItr.nextNode(); if(secondLevelChild.getName().equals("comments")) { NodeIterator thirdLevelNode = secondLevelChild.getNodes(); while(thirdLevelNode.hasNext()){ if(thirdLevelNode.nextNode().hasProperty("annotationData")){ hasAnnotation = true; } } } } } if(hasAnnotation){ actionRels.add("my-annotation-rel"); } Add granite:rel (String) "my-annotation-rel" property to your custom button It should work. Another way without changing the OOTB jsp file behaviour, if you are customising metadataeditor then granite render condition should work . In this case you have to first overlay this and your custom button: /libs/dam/gui/content/assets/metadataeditor/jcr:content/actions and add granite:rendercondition node under your custom button and give path property as ${empty requestPathInfo.suffix ? param.item : requestPathInfo.suffix} | High | [
0.673076923076923,
35,
17
] |
<!DOCTYPE html> <html> <head> <title>Real-time HTML Editor</title> <% "http://htmledit.squarefree.com/" %> <script type="text/javascript"> var editboxHTML = '<html class="expand close">' + '<head>' + '<style type="text/css">' + '.expand { width: 100%; height: 100%; }' + '.close { border: none; margin: 0px; padding: 0px; }' + 'html,body { overflow: hidden; }' + '<\/style>' + '<\/head>' + '<body class="expand close" onload="document.f.ta.focus(); document.f.ta.select();">' + '<form class="expand close" name="f">' + '<textarea class="expand close" style="background: #def;" name="ta" wrap="hard" spellcheck="false">' + '<\/textarea>' + '<\/form>' + '<\/body>' + '<\/html>'; var defaultStuff = '<h3>Welcome to the real-time HTML editor!<\/h3>\n' + '<p>Type HTML in the textarea above, and it will magically appear in the frame below.<\/p>'; // I don't want this stuff to appear in the box at the top because I feel it's likely to be distracting. var extraStuff = '<div style="position:absolute; margin:.3em; bottom:0em; right:0em;"><small>\n Created by <a href="http://www.squarefree.com/" target="_top">Jesse Ruderman<\/a>.\n<\/small><\/div>'; var old = ''; function init() { window.editbox.document.write(editboxHTML); window.editbox.document.close(); window.editbox.document.f.ta.value = "cdcd"; update(); } function update() { var textarea = window.editbox.document.f.ta; var d = dynamicframe.document; if (old != textarea.value) { old = textarea.value; parent.SetContentTo("#campaign_html_content", old) d.open(); d.write(old); if (old.replace(/[\r\n]/g,'') == defaultStuff.replace(/[\r\n]/g,'')) d.write(extraStuff); d.close(); } window.setTimeout(update, 150); } </script> </head> <frameset resizable="yes" cols="25%,*" onload="init();"> <!-- about:blank confuses opera, so use javascript: URLs instead --> <frame name="editbox" src="javascript:'';"> <frame name="dynamicframe" src="javascript:'';" contenteditable=true> </frameset> </html> | Low | [
0.45742574257425705,
28.875,
34.25
] |
Thank you for your input, your flag is being reviewed. Inappropriate content Underage Video does not play Download issues Spam or misleading Other Fatality! You just couldn’t match Mileena’s quick use of her Sai blades. She still has use for you though, so get that cock ready. You belong to the half-Tarkatan assassin tonight. – Secretary Karissa Animation by Kaeg ( https://www.patreon.com/kaeg ) and sounds by Laarel ( https://www.patreon.com/laarel ) | Low | [
0.398950131233595,
19,
28.625
] |
Nuclear magnetic resonance structure of the P395S mutant of the N-SH2 domain of the p85 subunit of PI3 kinase: an SH2 domain with altered specificity. Understanding the specificity of Src homology 2 (SH2) domains is important because of their critical role in cell signaling. Previous genetic analysis has characterized mutants of the N-terminal src homology 2 (SH2) domain of the p85 subunit of phosphoinositide 3-kinase (PI3K). The P395S mutant exhibits a specificity for phosphopeptide binding different from that of the wild-type SH2. The P395S mutant has an increased affinity for the platelet-derived growth factor receptor (PDGFr) compared to polyomavirus middle T antigen (MT). Solution structures of the P395S mutant of the p85 N-SH2 alone and complexed to a PDGFr phosphopeptide were determined to explain the change in specificity. Chemical shift perturbations caused by different peptides were compared for mutant and wild-type structures. The results show that the single P395S mutation has broad effects on the structure. Furthermore, they provide a rationale for the observed changes in binding preference. | High | [
0.6666666666666661,
31.875,
15.9375
] |
ADVERTISEMENT Venezuela is in the throws of political and economic turmoil that has plunged the country into hyperinflation and an ongoing humanitarian crisis. Another round of power cuts began on Monday, blanketing Venezuela in a new nationwide black-out that’s affecting hospitals, water plants, public transport and other services, and leaving people without food or medicine. Brian Armstrong, the CEO of cryptocurrency exchange Coinbase, mapped out the recent challenges of trying to send aid to Venezuela through his initiative GiveCrypto.org. “A long ways to go still, but starting to gather some data. Thank you to everyone who donated to make it possible. Getting a store set up that accepts crypto in close proximity to recipients seems to help. Also, we had to build a new version of @ CoinbaseWallet that runs on Android 4.x since 75%+ of recipients in Venezuela are still running this version of Android from 2012. The intermittent power outages we did not anticipate. Crypto still needs internet and electricity to function, although there are some potential relay type solutions in low connectivity environments that we could try in the future. ADVERTISEMENT We need to find a scalable way to get evidence of impact, and try to measure fraud. @joewaltman and team have gotten some good advice from the awesome folks at @GiveWell. Would like to be very data driven and not assume anything about impact until we see evidence. Still very much an experiment.” The experiment highlights a current drawback of cryptocurrencies: their dependence on electricity. Teachers conducting classes in the dark at Caracas University after the blackout started. #venezuela pic.twitter.com/DaeuiZV9sM — Annika H Rothstein (@truthandfiction) March 25, 2019 Francisco Fajardo highway in Caracas in complete darkness, yesterday March 27, 8:00 PM local time #Blackout #Venezuela pic.twitter.com/suNpmIVBf3 — Sputnik Insight (@Sputnik_Insight) March 28, 2019 As the US eyes secondary sanctions against Venezuela, Russia is reportedly training Venezuelan pilots on how to fly Russian-made Mi-family helicopters. While opposition leader and president of the Venezuelan National Assembly, Juan Guaidó, claimed victory on Friday to end the reign of embattled Venezuelan president Nicolás Maduro, the power struggle continues. Civilians wait for Juan Guaido at San Antonio, the last meeting point of Guaido's tour during today's protests across #venezuela Another major protest has been scheduled for #6abr #30mar #breaking #ahora pic.twitter.com/9ifVgBuhW4 — Amir Richani (@amir_richani) March 30, 2019 With Guaidó attempting to assume power, the International Federation of Red Cross and Red Crescent Societies (IFRC) expects clear access to roads and says it will start helping roughly 650,000 within the next two weeks. Debemos organizar los Comités de Ayuda y Libertad en cada comunidad para conformar cada espacio de protesta. Los Comités también serán claves para la identificación de casos prioritarios que requieran #AyudaHumanitaria inmediata y estar preparados para el #CanalHumanitario. pic.twitter.com/3U62Mvc7Ug — Juan Guaidó (@jguaido) March 30, 2019 For many, waiting until mid-April for aid isn’t feasible. According to a Bloomberg report, Venezuelans are traveling on foot to escape the political turmoil. ADVERTISEMENT “They’re called “los caminantes”—the walkers—the Venezuelans so poor and so desperate to flee their country’s humanitarian crisis that they set off on foot to surrounding nations in search of work. Their journey may only take them to Cucuta, the Colombian town just across the border, or as far south as Buenos Aires, some 5,000 miles from Caracas. And while most of them manage to hitch rides for parts of the trek, they will have no choice but to hoof it for hours and, at times, days on end, through what can be brutal conditions—the bitter cold of the Andes and the searing heat of the tropical savanna. One dreaded spot alone, the Paramo de Berlin, a frigid, wind-swept highland in northern Colombia that soars some 12,000 feet into the sky, is reported to have claimed several lives.” Meanwhile, Maduro has reportedly allowed 65 tons of medical aid from China to enter the country. | Mid | [
0.541450777202072,
26.125,
22.125
] |
Share this post Endless secret war is a constitutional time bomb Contributor: Jack L. Goldsmith Jack L. Goldsmith is the Henry L. Shattuck Professor at Harvard Law School. He served as assistant attorney general, Office of Legal Counsel, from October 2003 through July 2004, and special counsel to the general counsel to the Department of Defense from September 2002 through June 2003 He is the author of “The Terror Presidency: Law and Judgment Inside The Bush Administration” (W.W. Norton 2007) and the co-founder of Lawfare blog. This tribute is part of a series of reflections from HLS faculty, staff and alumni on the 15th anniversary of 9/11. View all tributes. Today marks the fifteenth anniversary of the beginning of the longest armed conflict in American history. Two very different Commanders-in-Chief have presided over the conflict, which has involved massive changes in the identity of the enemy, in geographical scope, and in the strategy and tactics employed by the United States. There is no prospect of this conflict ending soon. If Pentagon officials are to be believed, we will certainly be noting the conflict’s twentieth anniversary, almost certainly its thirtieth, and probably its fiftieth. The "Forever War" has posed enormous challenges to our constitutional system, which assumes that war will be exceptional, not perpetual. The “Forever War” has posed enormous challenges to our constitutional system, which assumes that war will be exceptional, not perpetual. In many respects, checks and balances worked well in response to early, very controversial presidential actions related to wartime detention, interrogation, and surveillance. In these contexts, courts, Congress, the press, and civil society sparked robust public debate that highlighted the disapproval of the other institutions of government and the people, and then through various means altered these practices to render them lawful and democratically sanctioned. But as the conflict has moved to a light-footprint stage characterized by very few American casualties and by stealth fighting via drone, cyberattacks, and Special Operations Forces, public debate has receded, congressional attention has become intermittent at best, and courts have played no role. Endless secret war with low domestic scrutiny is a constitutional time bomb, especially in the hands of a president less scrupulous than President Obama. | High | [
0.6666666666666661,
33.75,
16.875
] |
// NAnt - A .NET build tool // Copyright (C) 2001-2002 Gerry Shaw // // This program is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation; either version 2 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; if not, write to the Free Software // Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA // // Clayton Harbour ([email protected])
using NUnit.Framework;
namespace Tests.NAnt.VSNet.Tasks { /// <summary> /// Test that cpp projects are built successfully. /// </summary> [TestFixture] public class VbSolutionTests : SolutionTestBase { #region Private Static Fields // add fields here #endregion Private Static Fields #region Protected Static Fields /// <summary> /// LanguageType that is being tested. /// </summary> protected override LanguageType CurrentLanguage { get {return LanguageType.vb;} } #endregion #region Override implementation of SolutionTestBase /// <summary> /// Initialize example directory. /// </summary> public VbSolutionTests () { } /// <summary> /// Run the checkout command so we have something to update. /// </summary> [SetUp] protected override void SetUp () { base.SetUp (); } /// <summary> /// Remove the directory created by the checkout/ update. /// </summary> [TearDown] protected override void TearDown () { base.TearDown(); } #endregion Override implementation of SolutionTestBase #region Public Instance Methods /// <summary> /// Tests that the winforms solution builds using the nant solution task. Ensures that /// the outputs are generated correctly. /// </summary> [Test] public void TestWinForm () { this.GetCurrentSolutionFile("WinForms"); this.RunTestPlain(); } #endregion Public Instance Methods } } | Mid | [
0.554655870445344,
34.25,
27.5
] |
Simple Mehndi Designs that are Awesome & Super Easy Simple Mehndi Designs – Mehndi looks so beautiful. Does not? It has a subtle color and a beautiful texture. Most importantly, very simple Indian mehndi designs are easy to create. They do not take much time and unlike other types of tattooing and skin coloring, these simple mehandi designs are not permanent in nature. Simple Mehndi Designs 1. Cheery and Beautiful This design is like a piece of jewelry used to adorn hands. Everything starting from the three floral patterns on the sides to the pearl strings and the checkered pattern has been done with finesse to ensure that the piece looks nothing less than mesmerizing. 2. Ganesha Design Special events and occasions in India involve worship of Lord Ganesha, the harbinger of happiness, wealth and prosperity. And having simple mehandi designs of Lord Ganesha, is a great way to represent your belief in Indian culture. This simple mehndi design requires you to construct a few lines for trunk and forehead. Simple curved lines are used for eyes and eyebrows. 3. Shaded Floral Traced in the shape of a flower, this backhand simple mehndi design has been shaded for add depth to it. The big floral structure is used as a base here, which is neatly decorated with simple vine patterns and leafy motifs. Perfect for social gatherings. 4. Half Lace Glove This simple mehndi design looks like a hand accessory or an ornament of some kind. The intricate part of the design is the bracelet, which has been created using leaf motifs and circular pattern. And from this bracelet stretches three dotted strings on each side, which connect to a central floral motif drawn at the center of the backside of the palm. This simple mehandi designs are generally useful for those who have long fingers. 6. Fingertip Design This is one of the finest examples of simple and easy mehndi designs. If you do not like gaudy or elaborate designs, use this style. All you need to do is draw a few dots and circles with small lines using the tip of the cone. 7. Simply Leafy For all those in search of a simple and easy mehndi design that’s chic and suits for all types of occasion, try out this one. A simple formation consisting of intertwined leafy strands, this simple backhand mehndi design will certainly make you appear chic and stylish. 8. A Floral Tattoo Instead of creating designs that are too small or delicate, try this simple mehndi design. This one is as simple as drawing flowers on a notebook. The large flowers make it easier to maneuver your mehndi cone and detail at the end of the hand provides elegance to the design. Plus its really simple mehndi design for hands. | Mid | [
0.5627530364372471,
34.75,
27
] |
Macedo Why?Because organic foods are mad-ballerish. Here at AskMen.com we are full advocates of "ballin' out of control." However, not unlike "pimpin'," "ballin'" is not easy. True, it is ballin' to have a dinner party where fine wine and eatables are served. But to truly "ball out of control," one must make sure that it is all organic. Step up your game at Macedo, son. | Low | [
0.45161290322580605,
22.75,
27.625
] |
Q: Hybrid (React and ReactNative) We're planning a project that targets both iOS and Browser, and are curious to how we can share as much as possible between the two, using React. Can we build the project in (normal) React and somehow switch to React-native when building for iOS (and later Android)? A: React and React Native aren't 'write once, run anywhere' frameworks, as Tom Occhino said...it's more of a 'learn once, write anywhere' technology. That being said, your developers will be familiar with the syntax/best practices after writing your first implementation, and then should be able to smoothly transition and apply those same techniques to the browser or mobile app. Much of your implementation and how they all function together will largely depend on the API you are getting your data from. If your API/data source is solid...then the rest will be a piece of cake! So to answer your question...sure you can build the project in React and then switch to React Native when building your mobile apps. In fact, that's what the folks who are working tirelessly on the React/React Native teams are hoping you will do. Will you be able to use the exact same code? No. | Mid | [
0.573951434878587,
32.5,
24.125
] |
What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? Created: 09/18/13 Replies: 6 Posted Sep. 18, 2013 | | | admin Join Date: 10/11/10 Posts: 369 Expert What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? Posted Sep. 23, 2013 | | | irisf Join Date: 01/16/12 Posts: 78 Expert RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? Theodora and Sarah were both stuck in their situations. Theodora was the victim of Cornelius's infidelity and abuse. Times were so different back then, I don't think divorce was an option. She had no choice other than to accept things as they were so she became meeker as time went by. She couldn't even support Clarissa in regards to her choice in marriage. Sarah had one goal in her entire life and her resolve to achieve her dream made her stronger as time went by. Up until the confession, I had more compassion for Sarah's strength than Theodora's weakness although there was little Theodora could've done for herself Posted Sep. 23, 2013 | | | rebajane Join Date: 04/21/11 Posts: 184 Expert RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? I think from a modern day point of view its difficult to understand Theodora's complacency, but I agree with irisf that she probably thought that she didn't have any options that didn't involve her own disgrace. I was more disturbed at her lack of support for Clarissa. I pulled for Sarah throughout the entire story but I was also a little disturbed by how she resolved her problems. But I am not able to put myself in her shoes so I won't judge too harshly. I hope that I am more like Sarah than Theodora! Posted Sep. 23, 2013 | | | sandra54 Join Date: 05/01/13 Posts: 43 RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? I admired both characters and the risks they took to make reading a part of their lives. Often I take for granted the easy access I have to books and ideas. Posted Sep. 24, 2013 | | | hazeyr Join Date: 03/24/12 Posts: 19 RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? Theodora was able to be kind to the people she had every right to dislike and treat poorly. She tried to make the best of a hurtful situation. Sarah set a goal for herself, and never lost sight of it. She persevered even though life was so difficult. Sarah's setting her husband up for capture as a runaway slave was mean spirited, but understandable, shockingly revealed and made for quite an ending. As evil as Cornelious was, and as astonishing the ending climax was, I can't condone Sarah murdering Cornelious. perhaps the author could have written a different but equally astonishing ending where Sarah threatens him and his family with grave physical harm so that the end could justify the means. Posted Sep. 27, 2013 | | | sharons Join Date: 08/11/13 Posts: 5 RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? Theodora had such class but never once used it to her advantage !! For this era in the South many wealthy plantation owners (the wives or children didn't have a lot of interaction with their slaves) I was born and raised in the south and have researched the lives of plantation owners and the history of slavery and to my surprise many owners were kind. There were many slaves whom were very loyal to their plantation owners, but we have to realize many slaves received the most cruel and inhumane treatment from the men who sold the slaves and separated children from their families !!! Sarah had the spunk and determination to suvive any situation and loved her own family and Miss Theodora and her best friend Clarissa ! Posted Sep. 29, 2013 | | | dianem Join Date: 10/25/12 Posts: 65 Expert RE: What did you admire about Theodora and Sarah? What did you dislike? Did you relate to one character more than the other? I admired both of them because they were both strong women in the face of all that they went thru. I admired Theodora when she was allowing Sarah to sit in on lessons and learn even though she would have gotten in trouble. Even though I wish she would have stood up for her daughter before she died, i understand that times were different and women were expected to be subservient to their husbands.Sarah was a strong woman and I admire her for everything she did. | Mid | [
0.5584112149532711,
29.875,
23.625
] |
Square Enix has announced Chaos Rings III, the third entry in its popular Media Vision-developed mobile RPG series, for smartphones and PS Vita. The sequel is due out on October 16 in Japan for 2,800 yen on smartphones and 4,300 yen on PS Vita. Additionally, PS Vita is getting a Square Enix e-Store-exclusive “Chaos Rings III Prequel Trilogy Special Edition.” For 10,584 yen, it includes a Yusuke Naora and Reo Obata-drawn card book, Noriyasu Agematsu-composed background music collection, a Yukinori Kitajima-penned short story and art book, and a serial code for a Reo Obata-drawn Kakusansei Million Arthur card. The official website for Chaos Rings III will open on August 7. View the first screenshots at the gallery, via Amazon Japan. Thanks, Games Talk. | Mid | [
0.5975609756097561,
36.75,
24.75
] |
Q: passing a text string and a variable into into href selector I need to pass a string AND a variable as a selector into a href attribute, but I can't seem to get the syntax correct. Can anybody help? I currently have a variable 'gallery' which I need to pass in the something like: $('#work_gallery li a[href="http://www.ddbremedy.co.uk/siteupdate/" + gallery + ]'); A: Switch the selector to use double quotes so you can use single quotes within the attribute selector. $("#work_gallery li a[href='http://www.ddbremedy.co.uk/siteupdate/" + gallery + "']"); Unless you have multiple links to the same page the first part of the selector, #work_gallery li may be unnecessary. If this link only appears once on the page use: $("a[href='http://www.ddbremedy.co.uk/siteupdate/" + gallery + "']"); Working Example: http://jsfiddle.net/jFYGM/ | High | [
0.657933042212518,
28.25,
14.6875
] |
1/4HP Century AC DC Electric Motors Century Electric, formerly AO Smith Electrical Products Company, is a top seller of 1/4 hp electric motors for industrial and commercial jobs. Their quality products have a track record of reliability and precision,which has lead to their worldwide popularity. Century has a wide range of products, especially with HVAC, refrigeration, and blowers, to match most applications. When you buy Century products, you receive: Fast delivery from one of their many US warehouses Thorough online product support with connection and motor diagrams Hassle-free returns Outstanding motor warranty Century motor designs have kept up with market demands with the growing use of variable speed drive (VFDs). Their speed engineered inverter duty motors are built to withstand the damaging effects that VFDs can cause to motor windings with voltage spikes. Century motors are able to withstand voltage peaks 3.5 times what is stated on the nameplate. Motors are tested before leaving the factory to maintain consistent quality. Whether you are looking for a pump motor or a fan motor, Century probably has what you need at a fraction of the competitions' cost. Shop sqone.com online for great low prices! | Mid | [
0.6009732360097321,
30.875,
20.5
] |
Mycophenolic mofetil optimized pharmacokinetic modelling, and exposure-effect associations in adult heart transplant recipients. Mycophenolic acid (MPA) area under the curve (AUC) has been associated with graft outcome. (1) to develop pharmacokinetic tools to optimize MPA inter-dose AUC estimation in heart transplant patients; and (2) to investigate the relationships between acute allograft rejection and MPA AUC, trough level (C0) or mycophenolate mofetil (MMF) dose. Two independent modeling approaches (parametric and non parametric) were used to fit 56 rich MPA pharmacokinetic (PK) profiles collected from 40 adult heart transplant recipients enrolled in the PIGREC study, receiving MMF and a calcineurin inhibitor (CNI), in the first year post-transplantation. In addition, associations between drug exposure (MPA C0, AUC and MMF dose) and acute rejection or MMF adverse events were investigated using time-dependent Cox models with stratification on the type of calcineurin inhibitor. Exposure threshold values were investigated using ROC curve analysis. The 2 models developed fit adequately the data and the use of their combination yielded 100% consistency with the measured AUC in terms of strategy of dose adjustment (maintain, increase or decrease). MPA measured AUC adjusted on CNI exposure was significantly associated with rejection (per unit increase: HR [95% CI]=0.97 [0.95-0.99], p=0.0122), while no effect was shown for adverse events attributable to MMF. An AUC threshold of 50 mg×h/L was proposed (sensitivity=77%, specificity=25%) beyond which the risk of rejection was significantly increased (low vs. high: HR=3.48 [1.21-10.0], p=0.0204). The tools developed have already been made available to the heart transplant community on our ISBA website (https://pharmaco.chu-limoges.fr). | High | [
0.710306406685236,
31.875,
13
] |
Inducibility of cytochromes P-450 by dioxin in liver and extrahepatic tissues of the marmoset monkey (Callithrix jacchus). Cytochrome P-450 induction was investigated in the marmoset monkey, a non-human primate, using dioxins as inducing agents. Animals received a single subcutaneous dose of 1.6 nmol tetrachlorodibenzo-p-dioxin or tetrabromodibenzo-p-dioxin/kg body weight. Microsomal fractions were prepared from liver, lung and kidney, and homogenates were prepared from gut and adrenal glands. Anti-peptide antibodies which bind to CYP1A1, CYP1A2, CYP2B6 and CYP3A4 in human were used to identify related forms in the marmoset. The results indicate that CYP1A2 is constitutively expressed in liver, but not in lung, kidney, gut or adrenal gland and that CYP1A1 is not expressed in any of these tissues in untreated animals. Treatment with dioxin induced both CYP1A1 and CYP1A2 in liver, but only CYP1A1 in lung. No induction of CYP1A1 or CYP1A2 was found in kidney, small intestine or adrenal glands. Methoxy-, ethoxy-, pentoxy- and benzoyloxyresorufin O-dealkylases and high affinity phenacetin O-deethylase activities were induced in the liver, whereas ethoxycoumarin O-deethylase and aryl hydrocarbon hydroxylase activities were not affected by dioxin treatment. High-affinity phenacetin O-deethylase and CYP1A2 apoprotein were detected only in liver, consistent with this activity being specifically catalysed by CYP1A2. Furafylline was found to be a competitive inhibitor of methoxyresorufin O-demethylase activity with a Ki of 10 microM. In the lung the induction of CYP1A1 was accompanied by 15- and 23-fold increases in ethoxyresorufin O-deethylase and methoxyresorufin O-demethylase activities, respectively, suggesting that both activities are catalysed by CYP1A1. In contrast, there was no induction of aryl hydrocarbon hydroxylase activity in lung or liver showing that, unlike in many other species, marmoset CYP1A1 does not catalyse this reaction efficiently. The expression, distribution, induction and substrate specificities of marmoset monkey P-450 enzymes differ from the situation found in rodents and other species, demonstrating that caution has to be exercised when making cross-species extrapolations. | Mid | [
0.63563829787234,
29.875,
17.125
] |
1. Field of the Invention The present invention relates to a buckle and more particularly, to a side release buckle. 2. Description of the Related Art Belts and straps are intensively used to collars, harnesses, baby cradles, backpacks, safety helmets, slippers, life vests, cargoes, vehicle seats, etc. For joining belts or the ends of a belt, a buckle may be used. Various buckles have been disclosed and commercialized. FIGS. 1 and 2 show a typical belt buckle. This design of belt buckle is called “side release buckle” because it is to be unlocked from the two opposite lateral sides. As illustrated, the side release buckle 50 is comprised of a male buckle member 51 and a female buckle member 52. The male buckle member 51 comprises two axially extended locking bars 53a,53b and a center bar 54 spaced between the locking bars 53a,53b. The female buckle member 52 comprises a receiving open chamber 55 for receiving the locking bars 53a,53b and the center bar 54, and two side notches 56a,56b respectively formed in the two opposite lateral sidewalls thereof for retaining the locking bars 53a,53b. When inserted the male buckle member 51 into the receiving open chamber 55 of the female buckle member 52, the locking bars 53a,53b are forced by their resilient material property into engagement with the side notches 56a,56b to lock the male buckle member 51 to the female buckle member 52. When the user squeezed the locking bars 53b,53b inwards with the fingers to disengage the locking bars 53a,53b from the side notches 56a,56b, the male buckle member 51 is unlocked from the female buckle member 52. The male buckle member 51 and female buckle member 52 of the aforesaid side release buckle 50 are injection-molded from plastics. Because the side release buckle 50 is made of plastics, the tensile strength of the side release buckle 50 is not very high. In order to have the locking bars 53a,53b be easily disengaged from the side notches 56a,56b, the cross-sectional area of the locking bars 53a,53b must be limited. Due to a small cross-sectional area, the locking bars 53a,53b are the weakest part of the male buckle member 51. When the side release buckle 50 receives a pulling force surpassed the tensile strength of the locking bars 53a,53b, the locking bars 53a,53b will break. As stated above, belts and straps may be used with a side release buckle in any of a variety of products. Some designs may have to receive a high pulling force, and some others may not. The side locking design of the aforesaid side release buckle is sufficient for most occasions of use. However, when the aforesaid side release buckle is used in a harness or collar for dog, the engagement between the locking bars of the male buckle member and the side notches of the female buckle member may be insufficient to support a sudden stretching force when the dog is frightened to run in a rash. In this case, the locking bars will break, and the frightened dog may be injured or may injure some other people. Increasing the cross sectional area of each locking bar without changing material tensile strength will relatively improve the tensile strength of the side release buckle. However, increasing the cross sectional area of each locking bar simultaneously makes each locking bar relatively tougher, and the user shall have to employ much more effort to unlock the side release buckle. A side release buckle having tough locking bars is not suitable for children. Using material of high tensile strength can relatively increase the tensile strength of the side release buckle. However, the material change is not the concern of the present invention. | Low | [
0.482978723404255,
28.375,
30.375
] |
Hello and welcome to the 171st instalment of the SWD . Military events/news are listed below by the governorates: Raqqa: Today SDF focused its efforts on two main points, the first one by advancing towards the governmental centre in al Barid neighbourhood where 5 ISIS members have been killed, including one suicide bomber. The SDF captured the al-Idxar lodging, located in the north-western part of Raqqa city. The second push towards ISIS held districts was from the southeast and Nazla Shahadah district. Is in this district where the Islamic State claimed a suicide bombing on the Syrian Democratic Forces. Although, the US-backed forces have managed to capture Munah Mosque and al-Bustan Garden from ISIS control in Hisham Ibn Abdulmalik district. After today advances, the SDF control 90% of the southern districts of Raqqa. Meanwhile, International Coalition aircraft have killed an unknown number of civilians when hitting the al-Busariya district in ISIS-held Raqqa. The Syrian Arab Army captured Huwayjat Shinan, ar-Rahbi, Sabkhah, Shuraydah, al-Jabali and Zawr Shammar after the Ministry of Defense confirmed the advances earlier today. These advances imply that governmental forces now control many oil wells and a region of 30kms along the Euphrates river. Moreover, the Syrian MoD added that Tiger Forces have destroyed at least 330 ISIS vehicles, killed a large number of ISIS fighters and wounded hundreds of them. Aleppo: The National Defence Forces and Hezbollah media reportedly say they foiled an infiltration attempt at its points in Mallah area and killed and injured an unknown number of Hay’at Tahrir al-Sham (HTS) fighters. Meanwhile, HTS claimed a special operation carried out by the group Malhama Tactical last night where its forces successfully infiltrated in Mallah area and killed more than 20 government forces and injured 10 other. Moreover, the infiltration successfully disabled a BMP. HTS reported that the operation is a response to Syrian Government shellings. Today Turkis army and Turkish-backed forces bombed for the fourth consecutive day different villages of Meng and Gilbara. Like the other days, SDF and YPG responded to the Turkish shelling by targeting Kaljibrin with artillery. Any car carrying Syrian State Plame was blocked to enter the YPG-held Afrin in the highway between the Syrian Government-held zones and Kurdish forces-held Afrin. Reportedly, any car willing to cross must pay trade fees to the YPG, if refusing the fees are as high as 200.000 Syrian pounds and will have to leave all the goods being carried by the vehicle. Idlib: For the second day in a row, a US drone has been spotted, this time the spotted drone is an Armed US MQ-9 Reaper. Hama: The pro-government group paramilitary forces Liwa al Suqour al-Sahra, also known as Desert Hawks Brigade, has been disbanded after more than three years of service in Syria. The group’s founder and leader, Mohammad Jaber, has disbanded the group and reported to go back to Russia. This decision was taken after a series of extreme events linked to the group. The members willing to stay in Syria will join the SAA 5th Assault Corps, the Qalamoun Shield Forces or other government forces. The Islamic State has been reported to have begun a fresh counter-offensive on two fronts against the SAA at the Salamiya-Ithraya road and south-east of Raqqa Homs: The Syrian Arab army has captured the Al Tantur Mountain west of Sukhnah. Regarding Sukhnah city, the SAA and allies have stormed ISIS sites around Sukhnah and have been reported to have captured the southern outskirts of the city backed by Russian helicopters and air support. Government forces have, additionally, been reported to have entered the urban phase of the battle by reaching the first buildings in Sukhnah. In fact, early unconfirmed reports have reported that ISIS has already started to retreat from the city. Early reports suggest that SAA forces control 20% of Sukhnah city,. Damascus: HTS in eastern Ghouta has released a statement saying the group will dissolve and merge in a uniting initiative due to fear of harm to Ghouta pocket. Government strikes on Ayn Tarma continue, two civilian and many injured after 6 air strikes and more than 20 IRAM rockets hit the village in east Ghouta. The Russian Embassy in Damascus was targeted by mortar fire. Rumors about tensions between Moscow and Damascus due to the early refusing to provide air support for an Idlib offensive by government forces. The Free Syrian Army announced to completely secured the Mahrouta area from Syrian government forces and captured a T62 tank and light weapons. Reports of at least 10 government soldiers killed. The FSA forces are reported to have assaulted Umm Rumm with unknown results. CJTF-OIR : On the 1st of August 2017, CJTF-OIR has conducted nine strikes in Syria. CJTF-OIR ‘s main focus in Syria is Raqqa region where they did seven strikes supporting SDF‘s operations against IS destroying four fighting positions, two ISIS headquarters, an IED, and Ammunition cache and a fuel supply point. Other areas where two strikes occurred are Abu Kamal and Deir al-Zour, destroying three ISIS well-heads and an ISIS oil refinery. The full report on CJTF-OIR strikes conducted in both Syria & Iraq can be found here. Other: The Ahmad al-Abdu forces of the FSA declared in a statement that it is not affiliated with the International Coalition and that it is not supported by it. The first exchange between Hezbollah and Al-Qaeda forces in Arsal countryside (Lebanon) includes nearly 8.000 Al Nusra militants and refugees, which include 116 militants, 6.101 displaced are from inside Arsal; 1000 militants and 560 displaced Syrians are from outside Arsal. The exchange will liberate the pocket inside Lebanon and will move the militants and displaced people to Idlib province. The exchange also includes Al Nusra group handing some Hezbollah fighters held as war prisoners. In a US statement, Washington warned Nusra that, if taking the whole Idlib, it may not be able to convince all the international parties involved in Syria not to take a military action against them. Intellectual credited properly used may vary from an edition to edition. Feel free to voice your opinion in the comments section below, constructive criticism is welcomed. For those of you interested, you can follow me on my personal, controversial twitter @alextorrell where I constantly tweet about different issues and conflicts. | Low | [
0.537084398976982,
26.25,
22.625
] |
RESEARCH TRAINING PROGRAM IN DIABETES AND OBESITY Diabetes mellitus is reaching epidemic proportions in the US and there is an urgent need to increase research in this area. The goal of the program is to provide training to young researchers, at both the pre-doctoral and post-doctoral stages of their careers, in research that is relevant to diabetes, metabolism, and obesity. The Indiana University School of Medicine is an outstanding forum for such an initiative. It houses the Indiana University Diabetes Research and Training Center, which is in its 25th year of existence. The School recently created a Center for Diabetes Research whose goal is to foster research in basic science Departments. Sixteen faculty from four Departments will participate as mentors in the program. This group of faculty has a strong training record and has approximately $4,000,000 of external funding. The program will grow to support three pre-doctoral students and two post-doctoral fellows at steady state. Pre-doctoral students will take a new Minor in Diabetes and Obesity which includes a 3 credit Diabetes and Obesity course that has been recently developed. Post-doctoral fellows will also take the course. Both students and post-doctoral fellows will attend Center for Diabetes Research seminars, will present their results in the same series, and will be encouraged to present their work at national meetings such as the American Diabetes Association scientific sessions. Additionally, they will take the Research Ethics course (G504). By training in an environment and culture that gives strong multi-disciplinary support for diabetes research, there is a significant probability that the trainees will sustain an interest in diabetes, even as their specific research interests evolve over their careers. | High | [
0.682464454976303,
36,
16.75
] |
/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include <aws/s3/S3_EXPORTS.h> #include <aws/core/utils/memory/stl/AWSString.h> namespace Aws { namespace S3 { namespace Model { enum class ReplicationTimeStatus { NOT_SET, Enabled, Disabled }; namespace ReplicationTimeStatusMapper { AWS_S3_API ReplicationTimeStatus GetReplicationTimeStatusForName(const Aws::String& name); AWS_S3_API Aws::String GetNameForReplicationTimeStatus(ReplicationTimeStatus value); } // namespace ReplicationTimeStatusMapper } // namespace Model } // namespace S3 } // namespace Aws | Mid | [
0.5897435897435891,
34.5,
24
] |
Bhopal is the nearest airport, while Vidisha is the nearest rail head. Bhopal to Sanchi is 46 km by road. Sanchi is situated around 46 km from Bhopal and is easily accessible by the available means of transport. how to reach nearby places Directions sanchi stupa Loading... aboutsanchi stupa India’s oldest stone structure, commissioned into existence by Emperor Ashoka and built over the remains of Buddha in a glorious endeavor to honour them, Sanchi Stupa is a magnificent exemplar of not just Buddhist and Mauryan art and architecture, but also of faith and reverence. While its foundation was overlain by Emperor Ashoka in 3rd century BCE, it was actually his wife, Queen Devi, a native of Sanchi, who eventually oversaw its establishment. The initial structure was half the size of the present edifice, enclosed with railings made of wood and crowned with a stone umbrella-like structure, known as chatra that symbolises high rank. Gradually, over the centuries that followed and as different dynasties crossed its path, the Stupa and the region surrounding it grew and developed into the grand, illustrious heritage site that it is now. A World Heritage site, Sanchi Stupa essentially refers to Stupa 1, known more fittingly as the Great Stupa. Surrounding it is Stupa 3, the Ashokan pillar, Temple 18 from the Mauryan era and Temple 17 belonging to the Gupta era. There are a number of other temples and monuments strewn across the village of Sanchi, dating from the times of the dynasties that reigned over the region, beginning from 3rd century BCE to 12th century CE. Chiseled with a number of Brahmi inscriptions that date back to the 3rd century BCE, leading up to 800 CE, Sanchi Stupa is not surprisingly a site of immense religious and historical significance for the Buddhist faith followers. As you explore in awe and excitement the monument scattered landscape of Sanchi, and walk up to the Great Stupa, be sure to peer closely at the four gateways that surround it and open out to it. Built in the first century BC by Andhra-Satavahanas, these four gateways represent love, courage, trust and peace and are carved intricately with events and scenes from Buddha’s life. sanchi stupa photos Sanchi Stupa traveller reviews You can visit Sanchi Stupa as a day trip from Bhopal. The journey only takes one hour one way. An important Buddhist site, this has been in the bucket list since a while. On reaching, we saw that the lovely gates were in a dilapidated condition, thou ...... read more Sanchi stupa is a good place to visit and is near to bhopal. Sanchi stupa is located in a small hill top and you get a good view from the top. Well maintained and truly, a world heritage site. All age group should visit it Please write a review and help more travellers Please rate and help other travellers It's always good to know before visiting sanchi stupa whether it is open or closed on a particular day, and what the opening timings of sanchi stupa are and whether it is open in the morning, afternoon, evening or night. The most important thing to know is that sanchi stupa is closed on . On the other hand, sanchi stupa remains open for visits on the following open days of the week - Mon, Tue, Wed, Thu, Fri, Sat, Sun and the entrance timings and opening hours on these days are from 07:00 AM - 07:00 PM and then from . Apart from the closing days mentioned above, most places are closed on national holidays and important local holidays, so it is best to check with locals or at the point of interest to confirm whether it is open on such days. Also the timings in winter and timings in summer for sanchi stupa may differ, so it is best to keep visiting this page again to find out the most latest and accurate sanchi stupa visit opening hours. It is a part of mostly all bhopal tour packages and is a great place to visit in bhopal to witness the evolution of sanchi stupa over the decades. | Mid | [
0.5995203836930451,
31.25,
20.875
] |
Mac TA hosts Hap Jerusalem with league lead at stake The two giants of Israeli basketball will clash for the third time this season. Dear Reader, As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analysis from the frontlines of Israel, the Middle East and the Jewish World. The two giants of Israeli basketball will clash for the third time this season when Maccabi Tel Aviv hosts Hapoel Jerusalem on Thursday night at Nokia Arena in Tel Aviv with more than just their rivalry at stake. The teams enter the game with identical 16-3 BSL records, meaning that the victor will take sole possession of first place. Moreover, in a schedule quirk, the winning team will host a rematch on Sunday night. Thursday's game is a makeup of a Matchday 19 meeting that was postponed last month to allow both teams more time to prepare for crucial games during their respective European runs. Jerusalem was eventually eliminated from the ULEB Cup by Dynamo Moscow, while Maccabi has clinched a spot in the Euroleague Final Four next weekend in Prague. Sunday's game will highlight the BSL Matchday 23 schedule, which before the season started stated that the team that leads the league at the end of two full rounds of play (20 games) will host the second-place team. Maccabi has a five-game winning streak against Hapoel, but their two meetings so far this season have displayed some of the best domestic action seen here in years. In December, Jerusalem led most of the way, but Maccabi played better down the stretch to eke out a 100-98 win in Malha behind 29 points and nine rebounds from center Nikola Vujcic. Their second meeting took place in early March with the season's first trophy, the State Cup, on the line. Maccabi led comfortably most of the way, before a last Jerusalem charge made for an exciting finish, but it was Tel Aviv that rejoiced in the end, 96-91. Former Jerusalem favorite Will Solomon led Maccabi with 24 points and eight rebounds. Thursday's game will be a little different for both sides. Despite back-to-back BSL losses in recent weeks to Bnei Hasharon and Hapoel Galil Elyon-Golan, Maccabi's real concern is preparing for its Final Four semifinal against Spain's Tau Vitoria and it will view this and Sunday's games as tuneups. Jerusalem arrives pressurefree, knowing that it has nothing to lose at this point. In recent games, coach Erez Edelstein has widened his rotation, with reserves Tamar Slay, Izik Ohanon and Guy Kantor seeing more action. He will need a strong showing from Ohanon, since center Erez Marckovich is still out with an injury. Maccabi will also be shorthanded up front. Coach Pini Gershon will need to choose between Maceo Baston and Jamie Arnold at power forward, since league rules limit the team to only four foreign players per game, and Solomon, Vujcic and Anthony Parker are all certain to start. Jerusalem last beat Maccabi in February 2004 and hasn't won a league game in Tel Aviv since the 1990/91 season. Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>> The Jerusalem Post Customer Service Center can be contacted with any questions or requests: Telephone: *2421 * Extension 4 Jerusalem Post or 03-7619056 Fax: 03-5613699E-mail: [email protected] The center is staffed and provides answers on Sundays through Thursdays between 07:00 and 14:00 and Fridays only handles distribution requests between 7:00 and 13:00 For international customers: The center is staffed and provides answers on Sundays through Thursdays between 7AM and 6PM Toll Free number in Israel only 1-800-574-574 Telephone +972-3-761-9056 Fax: 972-3-561-3699 E-mail: [email protected] | Mid | [
0.5528634361233481,
31.375,
25.375
] |
Q: Are these PPs or non-finite clauses – or something else entirely? I'm wondering about the construction for [NP] to [VP], as illustrated in the following examples: (1) I waited for you to come here (2) He arranged for me to go there (3) For him to do that took courage (4) For you to apologise is not enough My questions are: what is this construction from a formal point of view? I can't see how for can be anything other than a preposition, which would suggest that it is a PP – but prepositions can't take infinitive clauses as complements, can they? if it's not a PP, but rather a non-finite clause, then what function does for have in the clause, and what is for from a formal point of view? are we dealing with the same formal construction in all four examples? what are the functions of the relevant construction in (1) and (2)? A: CGEL would say that all four of your boldfaced phrases are to-infinitivals with an overt subject. For CGEL, the for is not a preposition there, but a 'subordinator'. On p. 1177 of CGEL, we find the following: [16] i I wanted to arrange for Kim to do it. In [i] we have a chain of three verbs, with for Kim to do it complement of arrange and to arrange for Kim to do it complement of want. We apply the term 'catenative' both to the non-finite complement and to the verb in the matrix clause that licenses it, so that want and arrange here belong to the class of catenative verbs. The last verb in the chain, do, is not a catenative verb as it does not have a non-finite complement. A bit later on, CGEL explains that for Kim to do it is a to-infinitival with an overt subject. According to CGEL (p. 1178), To-infinitivals containing a subject are always introduced by the subordinator for: [20] i [For them to withdraw now] would be a mistake. [subject] ii It's not necessary [for them to wait any longer]. [extraposed subject] iii The best plan would be [for them to go alone]. [predicative comp] iv I can think of no solution except [for them to sack him]. [comp of preposition] | High | [
0.6600496277915631,
33.25,
17.125
] |
The world’s biggest and gaudiest blockchain conference takes place every year in New York City, congregating thousands of delegates from across the cryptosphere to mingle under one ritzy hotel roof. Consensus underscores all that’s inspiring, frustrating, depressing, and ridiculous about the rapidly shifting blockchain industry. If you couldn’t make it, here are a few insights. Now, enjoy the $2,000 you saved on your ticket! The good Elder statespeople. Consensus attracted many of blockchain’s elder statespeople, those entrepreneurs who toiled and evangelized before fame and lamborghinis were involved. It’s easy to forget them and their projects amidst the din of boisterous newcomers (“we’ll do 100 billion transactions a second with no fees, just you wait!”), but the old guard is still innovating aggressively and without much fanfare. For example, blockchain pioneer Sasha Ivanov of Waves made his first ever trip to the U.S. for Consensus. Criminally, his presentation was shoved into a quiet side room and lasted all of 10 minutes, but he won new fans. After Ivanov touted Waves’ position as the world’s fastest blockchain and second biggest ICO platform, which now supports smart contracts, my neighbor turned to me and gasped, “How did I miss this project?” Everyone gets a job. If you’re looking for a job in blockchain, blockchain companies are looking for you. Exhibitors ferociously hawked their open positions with fliers, balloons, and onsite recruiters. The event’s organizer, CoinDesk, launched a Career Center, and my friends at ChronoBank announced that its blockchain-based hiring portal, LaborX, will launch this week. I asked Lisk CEO and elder statesman Max Kordek what advice he’d give to someone trying to break into the space. He laughed. “First, email [email protected], because we can’t hire fast enough,” he said, “Second, don’t worry about blockchain-specific experience; you can learn that on the job. Third, get involved with your favorite projects. Unlike traditional tech companies, blockchain companies are very welcoming if you want to host meetups or become an ambassador.” Creative marketing. Blockchain marketing tends toward copy-and-paste. That’s why it was refreshing to see companies push the creative envelope. For example, identity platform Civic set up a beer vending machine that verified age via blockchain. (Sadly, better quality alcohol was free at Consensus, but it’s the thought that counts!) Ledger showcased a diamond-encrusted version of its hardware wallet. And secure messaging platform Mainframe, perhaps my favorite blockchain startup of the show, literally airdropped its token by filling balloons with coins and floating them over attendees’ heads. Colorful (and inspiring) characters. Crypto events are the most diverse in tech. Varied accents intermingle in every hallway, and anarchists hold court with capitalists. You’ll never meet so many interesting characters in your life. Take Waqar Zaka. Zaka is one of the biggest TV stars in Pakistan, hosting the country’s equivalent of Fear Factor and America’s Got Talent. He’s also a war hero, traveling to troubled parts of the world like Syria and Myanmar to educate refugees on cryptocurrency. For all the hype of the blockchain “banking the unbanked,” it was inspiring to meet people on the ground who are actually doing that. The bad Traffic congestion. “Even Bitcoin is faster than this!” quipped one attendee. The line to get into Consensus was a concert mosh pit. If you arrived early, you waited one hour. Stragglers waited two. Wouldn’t it be great if a blockchain conference used, you know, blockchain to fix its ticketing? Consensus wouldn’t have to look far, either; it hosted the launch of Blockparty, an excellent ticketing startup. Made in the U.S., headquartered in Malta. In the early days, the blockchain industry was driven by dreamers and technologists. Now it’s driven by regulators. That’s due to the SEC, whose vague pronouncements and aggressive subpoenas are driving the best crypto companies to headquarter in foreign lands and forego investment dollars from U.S. citizens. I spoke to elder statesman Erik Voorhees of ShapeShift and Prism about that trend. As an American founder, he doesn’t mince words. “Every time a startup receives a subpoena, even if they did nothing wrong, that’s a quarter million dollars in legal fees,” he said. “Startups have to spend a third of their resources, measured by time, money, and attention, just to manage regulations.” No coincidence, ShapeShift, like most of the crypto startups at Consensus, is headquartered abroad. Moral murkiness. Imagine meeting an exciting exhibitor at Consensus. You’re pumped and trust them because their booth is substantial and their advertising is ubiquitous. Later, the grapevine tells you that that company is “probably a scam.” Probably? Why don’t we know for certain? Investigating crypto companies is a Herculean task, and there aren’t many people equipped or incentivized to do it. No one wants to risk calling out a company over “probably” either, so they persist. The ugly Decadent after-parties. Kudos to Ripple for winning the after-party game this year by hiring Snoop Dogg to perform. It was a grand and memorable spectacle, but let’s remember that 2018 has been bad for our industry. Regulations have tightened, scams have hit us hard, public skepticism has rocketed, and market caps have dropped precipitously. “We’re down 80%, let’s make it rain!” isn’t a good look to burnt investors. The roadshow. Blockchain conferences like Consensus are exhausting, so say a prayer to those founders who go to one every week. Many, like Mainframe’s Mick Hagen, lamented the “roadshow mentality” that’s developed over the last year, where entrepreneurs are expected to conference their way to success with endless presentations, exhibitions, and networking events. Said another founder, “Vitalik Buterin didn’t build Ethereum by going to 100 events a year, so why are we?” One more thing ChainLink sighting. A few months ago, I wrote about hype vs. anti-hype companies in the crypto world. That article mentioned ChainLink as a project that’s utterly indifferent to self-promotion. I bumped into one of their employees at Consensus and, wouldn’t you know it, the word “ChainLink” was entirely absent from his badge. Mythic! Adam Ghahramani is cofounder of bison.gg, an esports blockchain startup, and adviser to thevinx.network, tokenizing wine futures. He is a frequent contributor to VentureBeat. Find him at adamagb.com. | Mid | [
0.584951456310679,
30.125,
21.375
] |
Appreciating Chris Coste He is not a Hall of Famer. He is not an All Star. He isn’t the most popular player. Still, it was impossible to root against Chris Coste. Coste fought his way through the minor leagues, spending 12 years without having a cup of coffee. In 2005, the Phillies signed Coste to a minor league deal. Coste spent the entire season at Triple-A Scranton Wilks-Barre. In 2006, Coste was invited to spring training as a non-roster invitee for the second straight year. He was impressive, hitting .463 with 3 home runs. It appeared that Coste won a spot on the Phillies roster, but it wasn’t meant to be. He started the year in Triple-A. At 33 years, 111 days, Coste made his Major League debut on May 26, 2006. Coste went 0-for-his-first-13. Well, it was a good story. At least he finally made it to the Majors. But all anybody wanted to see was for him to get one hit before being sent down. On June 16, 2006, Coste singled up the middle against Devil Ray’s pitcher James Shields for his first Major League hit. On July 19, he slugged his first Major League home run. It was a long one, reaching the porches at Petco Park. In 2006, he batted .328 with 7 HR and 32 RBI. In 2007, Coste found himself in the minor leagues again after the Phillies signed Rod Barajas. However, Coste was back in the Majors after several Phillies suffered injuries. He was a contributor to the Phillies 2007 National League East title, batting .279 with 5 HR. Brett Myers will always have the sign to Chris Coste to clinch the division. In 2008, Coste survived the whole year without being sent down to the minor leagues. He even started Game 1 of the World Series as the designated hitter. Coste had only one hit during the entire postseason, but five years ago nobody imaged Coste being on a postseason roster. Coste wasn’t the best defensive catcher, but it was always exciting to watch him throw runners out from his knees. He didn’t have the prettiest swing, but he managed to bat .288 with 21 home runs in the big leagues. “I know people appreciated my story,” Coste said. “You could write a book about it. But I hope that when my career is over, they’ll say he was a good story, but he was a pretty good player, as well. If you look at the back of my baseball card, I’m not a Hall of Famer, I’m not an All-Star, but I had some decent production. I just want to maintain that and stay in the big leagues as long as possible because I was in the minor leagues for 12 or 13 years. I definitely don’t want to go back. I want to make this dream last as long as possible.” A personal favorite Coste moment came in August of 2008 when the Phillies were trailing the New York Mets 7-0. Chris Coste did not start, however, he went 4-for-4 coming off the bench. In the 13th inning, he hit a walk-off single in the Phillies 8-7 come from behind win. Whether moving him was appropriate or not is another story. He fit in Philadelphia during the time he was here. Whether you read his books or not, it was impossible to root against Chris Coste. The Coste Guards will miss him, and best of luck to him with the Houston Astros. | Mid | [
0.641558441558441,
30.875,
17.25
] |
This file describes API changes in the starredcourses block code. === 3.8 === * New admin setting block_starredcourses/displaycategories which enables the starred courses block to display the course category. === 3.7 === * The 'block/starredcourses:addinstance' capability has been removed. It has never been used in code. | Low | [
0.45979899497487403,
22.875,
26.875
] |
Finding a place to live in Vancouver is getting harder all the time. Finding a place to stay may never have been easier: the number of rooms, suites and apartments available short-term and online has skyrocketed over the past 18 months. Are Online Vacation Renters Displacing Vancouverites? read more Announcements, Events & more from Tyee and select partners This Moment Calls for More Independent Journalism. We Need Your Help to Deliver It We can’t let journalism fade away. Contribute to The Tyee so we can add to our team. Home-sharing sites like Airbnb, VRBO and Homeaway have made it easier than ever for people to list their homes for short-term rentals. Some have even started doing so professionally, outfitting entire homes for tourists. The boom in home and apartment "sharing" has many residents concerned to the point that last month Vancouver city council voted unanimously to have staff look into the issue and suggest whether action is needed. "The biggest negative impact is the likelihood that a significant part of our rental stock is being used for short term rental," Councillor Geoff Meggs said. "The city is committed to creating long term rental, and if it's just going to be good for tourism then we really are concerned about that." Whether short-term rentals really remove potentially permanent accommodation from the marketplace is hard to say. Karen Sawatzky has been examining the effect that one leading site, Airbnb, has on Vancouver's housing market, for her MA in urban studies at Simon Fraser University. The number of listings is on the rise, she found: 2,978 in January 2015, and 3,473 five months later. By December, listing-tracking site InsideAirbnb found 4,728 places available in the city. They ranged from a spare couch to an entire house. But 67 per cent were for complete homes or apartments. The comparable rate for New York City was 52 per cent, and San Francisco, 57 per cent. Still, Sawatzky said it's hard to quantify what effect short-term rentals have on other accommodation, since so many other factors also affect Vancouver's housing market. What's clear is that many of those taking advantage of home-sharing sites to earn extra income are also breaking city bylaws. The law says only registered hotels and bed and breakfasts may rent accommodation for periods of less than a month at a time. But thousands of online listings make the bylaw hard to enforce. "The existence of a listing online, or the statement of a neighbour, is not sufficient to issue a bylaw violation notice," Meggs said. "Investigations are quite complex and require a lot of evidence." Love and hate for home-sharing It's an issue causing civic leaders to lose sleep around the world, where reactions have run from a warm embrace, to slamming the door. Berlin has perhaps gone furthest. It made short-term rentals illegal in 2014, except for those with permission from the city government. After a two-year transition period, the law took effect on May 1. You can still find listings for entire units in Berlin, but their owners risk fines of up to €100,000. (The city has yet to issue its first.) California's Santa Monica didn't ban short-term, whole-unit rentals outright. Instead, it made them expensive and unpopular. The city, with a population of about 90,000, still allows renting out a spare bedroom or shared room. But one rule pretty much ended the rental of entire homes or apartments: the host has to be living there while renters occupy the place. City officials estimated that the rule -- plus an associated 14 per cent tax and requirement for a business licence -- would eliminate 1,400 of the 1,700 listings in Santa Monica at the time of the ordinance. Other cities have taken a less punitive approach: laying down rules, and bringing in new revenues. Paris is Airbnb's most popular destination, with 40,000 listings. The City of Light imposed a rental tax of 83 euro cents a night, collected automatically by Airbnb. During the last three months of last year, the tax paid the city an estimated €1.2 million. Paris also limits residents to listing their primary residence, and started aggressively cracking down on violators, fining violators up to €25,000. Leverage is elusive Other cities are trying to get home-sharing sites themselves to help enforce the law. Los Angeles will debate an ordinance this June that would require residents to get a registration number from the city before they rent out their primary residence. The city wants Airbnb to require hosts to provide the number before they sign up, and on any advertisement. The proposed ordinance would also levy a 'transient occupancy' tax, and set a 90-day-per-year limit on how often residents may rent their home. "These provisions would require platforms to turn over a log of bookings to the local government on a monthly basis," Sawatzky said. "Otherwise there's no way of verifying that info, and therefore [it would be] pointless to include booking limits." Most booking sites have resisted turning over client data. New York City got four years worth of rental data from Airbnb only after the New York attorney general issued the San Francisco-based company a subpoena. City supervisors in San Francisco hope to force cooperation by making sites financially liable for illegal listings. The city has had short-term rental legislation since 2014, but Supervisor David Campos claims that as of last month, 75 per cent of Airbnb San Francisco listings violate the law. Campos has introduced city legislation to fine sites up to $1,000 per day for every illegal listing they host. Airbnb has publicly questioned the legality of the requirement, and it has yet to come to a vote. But while most cities are fighting to stem, or at least control and perhaps profit from, the rising tide of short-term rentals, others have embraced the home-sharing economy's pitch. For decades, the Greater London Council Act of 1973 banned short-term rentals without planning permission. Last year, the city changed the law to allow them. The Department for Communities and Local Government even released a document promoting short-term rentals, saying that they "expanded the pool of competitively priced accommodation," and helped support the city's tourism industry. No clear-cut answer City staff are examining those and other approaches but, Councillor Meggs said, "We'd never go for a ban in Vancouver. We've always allowed for short term rentals under a bed and breakfast license, and we liberalized that during the Olympics." Those rules, however, require that landlords demonstrate that they have in place "business licensing, a fire plan, supervision, accountability and consumer protection," Meggs said, adding that "none of that is taken care of" by sharing sites. "So we have to look to the past and achieve those objectives in the new environment," the councillor said, conceding that "I don't know of any city that has a clear cut solution at this stage." Meanwhile, it's a great time to visit Vancouver, less so to live here. | Mid | [
0.540117416829745,
34.5,
29.375
] |
Q: Adding table 1 data to table 2 dropdown Background I'm writing an app where I need to pull all the employees (table 1) and add them to a dropdown. This then saves the employee_id in the supervisors table (Table 2). What I have I have the two tables: ,------------,-----------,------------,--------------, | Table_1_id | Name | Surname | Table_2_id | '------------'-----------'------------'--------------' ,------------,------------, | Table_2_id | Table_1_id | '------------'------------' What have I tried I've tried the following: $hrEmployees = $this->HrEmployee->find('list', array( 'fields' => array("id","fullname"), 'order' => array('HrEmployee.name ASC','HrEmployee.surname ASC') ) ); $this->set(compact('hrEmployees')); This is in my Table 1 Controller under the edit/add function. Problem I have no idea how to do this. I thought that using a virtual field and just passing that to the view will then fill the dropdown with the names, but clearly I'm wrong. If I have to redesign the DB structure I will, but I just need this to work! Can someone help? A: You don't need to have table2_Id in your employee table. You can fetch employee array from employee array and pass it to template. When ever user selects an employee from the dropdown, you need to run another query to insert the selected employee Id into supervisor table. | Mid | [
0.567441860465116,
30.5,
23.25
] |
The SteamVR Beta channel currently includes performance improvements for Valve Index, as well as fixing support for the Oculus Rift’s Asynchronous Spacewarp 2.0. The most recent build, 1.7.6, released on Saturday. Among the changes, it says “Motion Smoothing no longer throttles applications that are primarily cpu bound (e.g. No Man’s Sky).” Motion Smoothing is Valve’s motion extrapolation technology, similar to Facebook’s Asynchronous Spacewarp. When an app isn’t maintaining framerate, SteamVR can force the app to drop to half framerate while synthetically generating every other frame. Motion Smoothing is available on the Valve Index and HTC Vive. Valve didn’t provide details in the changelog about what specifically they changed, but this should result in better performance when your CPU is the bottleneck of your performance rather than the GPU. Valve’s wording suggests this applies to No Man’s Sky. For AMD hardware specifically, the update fixes “a gpu scheduling issue with motion smoothing” which was “causing motion smoothing to disable itself after a while due to poor performance”. In an earlier build, 1.7.2, which is also not yet on the main channel, it says “Fixed passing depth through to the Oculus runtime from apps which provide it.“. Passing depth through to the Oculus runtime is how apps can support Asynchronous Spacewarp 2.0. ASW 2.0 builds on ASW by incorporating depth, allowing for extrapolation of head motion rather than just scene motion and head rotation. It doesn’t appear that No Man’s Sky currently sends its depth buffer to SteamVR in the first place. Additionally, the build brings a new refreshed look to the SteamVR UI, more in line with Valve’s recent styling. As with all beta software, you should opt in at your own risk, as it may introduce bugs and glitches when playing VR. Based on Valve’s past release timing we expect these changes will roll out to the stable build with a few weeks. | Mid | [
0.623430962343096,
37.25,
22.5
] |
Rusal application to block Nornickel deal to be heard by UK court on Feb 27 Reuters Staff 1 Min Read MOSCOW (Reuters) - Russian aluminium giant Rusal’s (0486.HK) application to a UK court to block a deal between companies owned by Russian businessmen Roman Abramovich and Vladimir Potanin will be heard on Tuesday, the court said on its website (www.justice.gov.uk). Potanin this month offered to buy a stake in Russian mining giant Norilsk Nickel GNKN.MM from Abramovich. Rusal, which also owns a stake in Nornickel, is seeking an injunction to block the deal. The court previously allowed parties involved in the case to delay the injunction hearing until the week beginning March 5. | Low | [
0.488207547169811,
25.875,
27.125
] |
Q: Where does Ubuntu 18.04 stores network settings? I have two virtual Ubuntu systems, set network settings via graphical interface on one system and decided to enter them manualy in the second one, but known to me config files seem empty. Where can I find the right place? A: To be more precise, connections you created via graphical interface are stored in /etc/NetworkManager/system-connections, for example on my working PC I have file Wired connection 1.nmconnection in this directory with such content for static IP connection: [connection] id=Wired connection 1 uuid=a3e912b0-f428-333f-a097-3a82d768a3cd type=ethernet autoconnect-priority=-100 permissions= [ethernet] duplex=half mac-address=78:24:AF:3D:CD:21 mac-address-blacklist= speed=100 [ipv4] address1=192.168.1.8/21 dns-search= method=manual [ipv6] addr-gen-mode=stable-privacy dns-search= method=auto and Wired connection 2.nmconnection for DHCP connection, which differs in [ipv4] section: [ipv4] dns-search= method=auto Note, in this file there is device uuid instead of network card name. To match uuid's and card name you can use nmcli connection show: NAME UUID TYPE DEVICE Wired connection 1 a3e912b0-f428-333f-a097-3a82d768a3cd ethernet eno1 | High | [
0.6970091027308191,
33.5,
14.5625
] |
* Only VMware clusters using vSphere are supported, not standalone ESX or ESXi servers ([#1945](http://projects.theforeman.org/issues/1945)). #### Image provisioning Image based provisioning can be used by provisioning a new VM from a template and then running a finish script over SSH, in the same manner as the EC2 provider. The type of provisioning method can be selected under the "Operating system" tab when creating a new host. To configure image/template-based provisioning: * Images refer to templates stored in vSphere which will be used as the basis for a new VM. * Add the image by navigating to the compute resource and clicking *New Image*, enter the relative path and name of the template on the vSphere server, e.g. `My templates/RHEL 6` or `RHEL 6` if it isn't in a folder. Do not include the datacenter name. * The template needs to have a username and password set up for Foreman to SSH in after provisioning and run the finish script. * This requires some form of DHCP orchestration for SSH access to the newly created host to work. * A finish template to perform any post-build actions (e.g. setting up Puppet) must also be associated to the host, usually by changing the OS default finish template. #### Image provisioning without SSH The same process can also be done using a user_data template. To configure image/template-based provisioning without SSH, make the following adjustments for the former procedure: * Enable user_data checking the proper checkbox in the compute resource definition * Associate a user_data template to the host, using cloud-init syntax * Note that the images don't need cloudinit installed, as the cloudinit is converted under the hood to a CustomisationSpec object that VMware can process #### Console access Consoles are provided using VNC connections from Foreman to the ESX server, which requires a firewall change to open the respective ports (TCP 5901 to 5964) {% highlight bash %} ssh root@esx-srv vi /etc/vmware/firewall/vnc.xml {% endhighlight %} Add the following file content: {% highlight xml %} <ConfigRoot> <service id='0032'> <id>VNC</id> <rule id = '0000'> <direction>inbound</direction> <protocol>tcp</protocol> <porttype>dst</porttype> <port> <begin>5901</begin> <end>5964</end> </port> </rule> <enabled>true</enabled> </service> </ConfigRoot> {% endhighlight %} Apply and check the firewall rule: {% highlight bash %} esxcli network firewall refresh esxcli network firewall ruleset list | grep VNC {% endhighlight %} Lastly, make the rule persistent. With ESX: {% highlight bash %} cp /etc/vmware/firewall/vnc.xml /vmfs/volumes/datastore1/vnc.xml vi /etc/rc.local # At end of file : cp /vmfs/volumes/datastore1/vnc.xml /etc/vmware/firewall/ esxcli network firewall refresh {% endhighlight %} With ESXi: {% highlight bash %} cp /etc/vmware/firewall/vnc.xml /vmfs/volumes/datastore1/vnc.xml vi /etc/rc.local.d/local.sh # At end of file, just before exit 0 : cp /vmfs/volumes/datastore1/vnc.xml /etc/vmware/firewall/ esxcli network firewall refresh {% endhighlight %} If permanent shared storage is available (direct-attach SAN, etc): rather than doing a file copy on each server, use a symlink instead. Once it's changed on the shared storage, run a loop to refresh the firewall services. The local.sh file still needs to be created. Example: {% highlight bash %} ln -s /vmfs/volumes/{uuid of shared storage}/firewall.rules/vnc.xml /etc/vmware/firewall/vnc.xml {% endhighlight %} #### Required Permissions The minimum permissions to properly provision new virtual machines are: * All Privileges -> Datastore -> Allocate Space * All Privileges -> Network -> Assign Network * All Privileges -> Resource -> Assign virtual machine to resource pool * All Privileges -> Virtual Machine -> Configuration (All) * All Privileges -> Virtual Machine -> Interaction * All Privileges -> Virtual Machine -> Inventory * All Privileges -> Virtual Machine -> Provisioning #### Notes * Log in to the VMware vSphere Server that represents the Compute Resource. Create a role with the above permissions. Add the appropriate account to the role. To create user accounts, roles or for complete details on administration of VMware vSphere, please consult your VMware vSphere Server documentation. * The account that foreman uses to communicate with VCenter is assumed to have the ability to traverse the entire inventory in order to locate a given datacenter. A patch is required to instruct foreman to navigate directly to the appropriate datacenter to avoid permission issues ([#5006](http://projects.theforeman.org/issues/5006)). * Reference in the [VMWare KB 2043564](http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=2043564&sliceId=1&docTypeID=DT_KB_1_1&dialogID=458724081&stateId=1%200%20458722496). * For debugging purpose, read the [troubleshooting guide about NoVNC](/manuals/{{page.version}}/index.html#7.1NoVNC). | Mid | [
0.5775,
28.875,
21.125
] |
Q: Scala - Cannot resolve symbol - Looping through map I am doing programming in scala for looping through map. Below is my code which works fine. val names = Map("fname" -> "Robert", "lname" -> "Goren") for((k,v) <- names ) println(s"Key: $k, Value : $v") When looping through the map, if I give (K,V) instead of (k,v), the program is not compiling. It gives cannot resolve symbol error. Below is my for loop - for((K,V) <- names ) println(s"Key: $K, Value : $V") I am executing this program in IntelliJ IDEA 15 scala worksheet. Can anyone please explain the reason for this error. A: It doesn't compile for the same reason this code doesn't compile: val (A,B) = (1,2) // error: not found: value A // error: not found: value B but this does compile: val (a,b) = (1,2) // a: Int = 1 // b: Int = 2 Constant names should be in upper camel case. That is, if the member is final, immutable and it belongs to a package object or an object, it may be considered a constant Method, Value and variable names should be in lower camel case Source: http://docs.scala-lang.org/style/naming-conventions.html | Mid | [
0.591093117408906,
36.5,
25.25
] |
[Uterine artery embolization with resorbable material prior to myomectomy]. Fibroids are a frequent cause of gynecology referral. Myomectomy is a conservative treatment alternative. The main risk from this procedure is hemorrhage. The main objective of this study was to demonstrate the efficacy of preoperative uterine artery embolization with resorbable agents to reduce blood losses and facilitate myomectomy. Secondary objectives were to evaluate morbidity and subsequent fertility. Retrospective study of 21 patients with preoperative uterine artery embolization prior to myomectomy at the University Medical Center of Dijon over a 3 year period. Myomectomy after uterine artery embolization with resorbable agents was associated with only minimal blood loss. Mean preoperative and postoperative hemoglobin levels were comparable (p<0.0001). Uterine suturing was technically simpler. The number of resected fibroids (p=0.2824) and the presence of preoperative anemia (p=0.474) had no statistically significant impact on the duration of hospital stay. Uterine synechiae occurred in three patients after the procedure, and were easily treated. Two patients had normal subsequent pregnancies. Preoperative uterine artery embolization with resorbable agents was effective in reducing surgical blood losses. This technique reduces the number of hysterectomies and hemorrhagic complications (hematoma, infection, weaker scar tissue). It should be considered in patients wishing uterine preservation when the hemorrhagic risk is high. Its use in patients seeking subsequent pregnancy should be further assessed with larger series. | High | [
0.6831812255541061,
32.75,
15.1875
] |
The Latest: Danish chef behind Noma thanks Bocuse The Danish chef behind one of Europe's most famous restaurants, Noma, the Michelin-starred eatery that was named as the world's No. 1 restaurant four times, thanked Paul Bocuse for "a lifetime of work and inspiration." PARIS — The Latest on the death of French chef Paul Bocuse at 91 (all times local): 4:50 p.m. The Danish chef behind one of Europe's most famous restaurants, Noma, has thanked Paul Bocuse for "a lifetime of work and inspiration." On Twitter, Rene Redzepi wrote Saturday "RIP Paul Bocuse - sleep well chef" about the Frenchman, who embodied French cuisine all over the world. Redzepi closed Noma last year and plans to reopen an eatery with its own vegetable farm on the edge of Copenhagen's Christiania neighborhood. The 40-seat Noma — a contraction of the Danish words for Nordic food — opened in 2003. The eatery that sat on Copenhagen's waterfront had two Michelin stars and was voted the world's No. 1 restaurant by Britain's Restaurant Magazine in 2010, 2011, 2012 and 2014. ___ 4:30 p.m. The head chef at the Elysee presidential palace says the best way to honor Paul Bocuse is to keep sharing his passion for French gastronomy. Guillaume Gomez told BFM television that Bocuse created a soup in 1975 at the Elysee, made from truffles, foie gras, chicken, carrots, onions, celeriac and mushrooms, for then-president Valerie Giscard d'Estaing. Gomez said the soup is still served at the presidential palace under the name of "Elysee soup." Gomez, who met "Mister Paul" several times, said Bocuse was the first to widely appear in the media so that chefs' work was better recognized. ___ 3:55 p.m. The wife and children of master French chef Paul Bocuse want to honor their "captain," who has died at 91. In a joint statement Saturday, they said that "more than a father and husband, he is a man of heart, a spiritual father, an emblematic figure of world gastronomy and a French flagship who is gone." The statement is signed by Bocuse's wife Raymonde, their daughter Francoise, and his son Jerome who he had with another companion. They stress that Bocuse loved life, loved transmitting his knowledge of the kitchen to other chefs and loved the team of chefs that he worked with in his hometown of Collonges-au-Mont-d'Or. The family says "these values will forever continue to inspire us." ___ 2:55 p.m. French President Emmanuel Macron has paid tribute to chef Paul Bocuse, the man who embodied French cuisine all over the world. Macron praised Bocuse's "fidelity" to his village of Collonges-au-Mont-d'Or, near the eastern French city of Lyon, where he was born, created his world-famous restaurant and died Saturday at age 91. In a statement, Macron underlined Bocuse's "generosity, his respect for traditions as well as his inventiveness." Macron said Bocuse had helped train French and foreign chefs up to his last few days. The French president says "French gastronomy loses a mythical figure ... The chefs cry in their kitchens, at the Elysee and everywhere in France." ___ 1:45 p.m. Paul Bocuse, the master chef who defined French cuisine for nearly half a century and put it on tables around the world, a man who raised the profile of top chefs from invisible kitchen artists to international celebrities, has died at 91. Often referred to as the "pope of French cuisine," Bocuse was a tireless pioneer, the first chef to blend the art of cooking with savvy business tactics — branding his cuisine and his image to create an empire of restaurants around the globe. His imposing physical stature and his larger-than-life personality matched his bold dreams and his far-flung accomplishments. | Mid | [
0.609164420485175,
28.25,
18.125
] |
// ANCHOR: here pub fn add_two(a: i32) -> i32 { a + 3 } // ANCHOR_END: here #[cfg(test)] mod tests { use super::*; #[test] fn it_adds_two() { assert_eq!(4, add_two(2)); } } fn main() {} | Low | [
0.48940677966101603,
28.875,
30.125
] |
Some Call For More Sharing In Ridesharing Lyft driver Danielle Kerley showcases the company's iconic mustache, which is displayed on cars used in the service. Aarti Shahani / NPR Listen Listening... / Originally published on August 28, 2014 10:43 am Taxicabs are fighting tooth and nail against Uber, the company that enables car owners to drive part time or full time for pay, like cabbies. But behind this battle, there's another one brewing inside the world of ridesharing. Uber and its competitors in San Francisco are sparring over cash, over drivers, and over some basic values, too. But a researcher says branding the startups Uber and Lyft as ridesharing services isn't quite accurate. Now, an emerging set of services promises to be more about sharing. Chauffeur Vs. Your Friend With A Car Uber has raised $1.5 billion from private investors, and it has used some of its money to try to lure drivers away from the No. 2 ridesharing startup, Lyft. Lyft has raised $333 million (hardly chump change) and has paid to lure drivers back. I wanted to know, from the workers' perspective, if there are important differences between the two startups, so I took a bunch of Lyft rides and asked a few dozen of my drivers for their take. Here are some typical responses: "The clientele from Uber, they expect way too much for what I'm not getting. They want water and phone chargers and gum and snacks," Erik Manning says. Theresa Guerrero says Lyft is more social: "Lyft passengers expect to sit in the front seat and have a conversation and share. Share!" Alonzo Hidalgo says Lyft is less pressure: "When you work for Lyft, it's basically your friend with a car. It's a different approach. I'm not your chauffeur. ... I'm your friend with a car." While Uber is the luxury brand, Lyft is the hipster chic alternative: Passengers sit in the front seat and dive into conversations that feel like speed dating or bar counter confessional. Some say that's a key distinction in a city that is so fragmented between the tech haves and have-nots, people forget to fist bump. Taxis By Another Name? But others aren't so convinced. "When you think about the difference between a taxi, a sedan and Uber and Lyft — they're all kind of doing the same thing," says Benjamin Edelman, a professor at the Harvard Business School who studies Internet companies. "The most striking change is that Uber and Lyft will do it for a lower price." Edelman says he's not one to criticize a lower price, but he accuses Uber and Lyft of being "duplicitous" in how they brand their services as "sharing." For all their qualms with the legacy taxi industry, he says, the startups are in essence taxicabs that know how to use a smartphone for dispatch. Ridesharing was supposed to be different. As described in an article in the journal Transport Reviews, the movement started as a way to conserve resources in the U.S. during World War II. It evolved over the decades into a green movement to get cars off the streets. This new generation of startups could have used the awesome power of smartphones to help people going in the same direction find each other in real time. Instead, when you hop in an Uber or Lyft, Edelman says, "The driver is still a driver, driving in an unnecessary direction to get paid." And that makes sense, when you think about the pressures on the companies. Silicon Valley investors want a return. And it can be easier to make an existing market more efficient than to experiment with sharing cars the way we might share a bus. "I don't fault them for choosing the road that's more obvious and more straightforward. It's the natural play," Edelman says, "although it won't live up to the full technology's potential." A New Product In Sharing There is one experiment that could be a game changer. The startup Sidecar started testing a new service in May, called Shared Rides, for people who need a ride in the same direction. During the nearly three-month test period, the company says it got 13,000 requests for shared rides. While that's just a small fraction of all rides, CEO Sunil Paul says it's a strong indicator of future interest. He estimates that the U.S. taxi market is a $10-billion-a-year industry, and ridesharing could be 10 times that because it responds to the blue-collar commuter. "What we want to prove is that everyday people can use their smartphone to get back and forth from work, and we can deliver that at a very low cost," Paul says. "That is the big opportunity our investors are looking for, that we're looking for." The two giants in ridesharing recently announced they're trying out shared rides, too. Uber says UberPool is in test mode, and while it seems popular, it's too soon to tell if it'll be a core service. Lyft did not respond to NPR's request for details about Lyft Line. Paul says, "We intend to do it better than the others." Copyright 2014 NPR. To see more, visit http://www.npr.org/. Transcript ROBERT SIEGEL, HOST: In the ridesharing industry Uber is not the only game in town. Companies such as Lyft and others are also out there and they're also battling over identity - who they are and what they stand for. NPR's Aarti Shahani has that story from San Francisco. AARTI SHAHANI, BYLINE: Huber has raised 1.5 billion dollars from private investors and it has used some of its money to try to lure drivers away from the number two ride sharing start-up, which is called Lyft with a "y". Lyft has raised $333 million - hardly chump change - and has paid to lure drivers back. I wanted to know from the worker perspective if there are important differences between the two. So I took a bunch of Lyft rides and asked a few dozen of my drivers for their take. ERIC MANNING: The clientele from Uber, they want water and phone chargers and gum and snacks, and... THERESA GUERRERO: Lyft passengers expect to sit in the front seat and have a conversation and share. Share. ALONZO HIDALGO: Instead when you work for Lyft, it's basically your friend with a car. It's a different approach. I'm not your chauffeur. SHAHANI: You're not my chauffeur? HIDALGO: No, I'm not. I'm your friend with a car. SHAHANI: That's Eric Manning, Theresa Guerrero and Alonzo Hidalgo. While Uber is the luxury brand, Lyft is the hipster chic alternative. Passengers sit in the front seat and dive into conversations that feel like speed dating or bar-counter confessional. Some say that's a key distinction in a city that is so fragmented between the tech-haves and have-nots that people forget to fist bump. But others aren't so convinced. BENJAMIN EDELMAN: When you think about the difference between a taxi, a sedan, and Uber and Lyft, they're all kind of doing the same thing. SHAHANI: Benjamin Edelman is a professor at the Harvard Business School. EDELMAN: The most striking change is that Uber and Lyft will do it for a lower price. I'm not one to criticize a lower price. I love a great deal but... SHAHANI: He says for all their qualms with the legacy taxi industry, Uber and Lyft are, in essence, taxicabs that know how to use a smart phone for dispatch. Ridesharing is supposed to be different. It started in the U.S. during World War II as a way to conserve resources. It evolved over the decades into a green movement to get cars off the streets. This new generation of start-ups could have used the awesome power of smart phones to help people going in the same direction find each other in real time. Instead when you hop in an Uber or Lyft, Edelman says... EDELMAN: The driver is still a driver, driving in an unnecessary direction to get paid. SHAHANI: And that makes sense when you think about the pressures on the companies. Silicon Valley investors want a return. And it's easier to make an existing market more efficient than it is to experiment with sharing cars the way we might share a bus. EDELMAN: I don't fault them for choosing the road that's more obvious and more straightforward. It's the natural play. Although it won't live up to the full technology's potential. SHAHANI: There is one experiment that could be a game changer. The start-up, Sidecar, put out a new service in May for people who need a ride in the same direction. Sidecar CEO, Sunil Paul, says his company is making this paid carpooling a core business. And so far Sidecar has gotten 13,000 requests for shared rides. SUNIL PAUL: That 13,000 came just during the test period. SHAHANI: Paul estimates the U.S. taxi market is a $10 billion a year industry and sharing rides could be 10 times that because it responds to the every day, blue-collar commuter. PAUL: With Sidecar shared rides, we were able to drop the price and make it into daily service. And it dramatically increases the size of the market. SHAHANI: Uber and Lyft recently announced they're trying out shared rides too. Uber says it's in test mode so too soon to tell if it'll be a core service. And Lyft did not respond to NPR's request for details. Aarti Shahani, NPR News, San Francisco. Transcript provided by NPR, Copyright NPR. | Low | [
0.49324324324324303,
27.375,
28.125
] |
The Whitehead hemorrhoidectomy. An unjustly maligned procedure. The Whitehead technique of hemorrhoidectomy has developed a reputation as an undesirable procedure since its description in 1882. The chief criticisms have been considerable blood loss, disturbance of continence, formation of an ectropion, and poor healing of the mucocutaneous junction followed by stricture formation. Five hundred fifty-six patients underwent a modified Whitehead hemorrhoidectomy, performed by one author (C.E.C.), between 1963 and 1983. Seventy-two of these patients had unclaimed follow-up letters, leaving 484 patients available for review. Four hundred forty of these patients were followed for over three years. Postoperative complications included fistula or abscess in 1.1 percent, flap loss in 6.9 percent, and a nonhealing wound in one patient. There were no recurrences and there was no ectropion formation, or "Whitehead deformity." Mortality was zero and total morbidity, including 7.2 percent flap detachment, was 12.2%. A modified Whitehead technique has become the authors' procedure of choice for circumferential prolapsing and bleeding hemorrhoids and mucosa. | Mid | [
0.6311881188118811,
31.875,
18.625
] |
Posted By Chris Potter on Wed, Sep 4, 2013 at 3:21 PM The Quiet Storm, which has served vegetarian fare for over a decade and helped launch the resurgence of Penn Avenue, is set to close this fall. In an email to City Paper and a post on a local message board, owner Jill MacDowell has confirmed that her building's pending sale is prompting her to close the Friendship restaurant this October: Yep, QS is leaving 5430 Penn in October 2013, our 12th anniversary month. Our future is unknown. The building is under sales agreement to another food establishment. Eviction has been looming a long time. It's made a hard life harder, and a good thing bittersweet. I'm proud of what we've accomplished. I hope to continue somehow, somewhere. Under MacDowell -- a former alt-weekly editor turned caterer -- the Quiet Storm became a vegetarian café that was popular with City Paper readers, as well as an indie gathering place with a popular brunch. For several years, it also served as a music venue. Its closure will come a half year after the shuttering of another touchstone in the East End scene, East Liberty's Shadow Lounge. Throughout the early 2000s, the two businesses heralded the resurgence of struggling East End business districts; now it seems neither will be part of the area's growing success. Rick Swartz, the executive director of the Bloomfield Garfield Corporation, laments the Storm's pending departure. "It's a business that drew another generation to Penn Avenue, a generation that wouldn't have found its way here otherwise," says Swartz, whose community-development group has long been active along Penn. "The arts venues have done that too, but much of that was in the wake of the Quiet Storm coming here." Swartz says the Storm attracted younger residents who "weren't looking for a pristine commercial district like [Shadyside's] Walnut Street": The challenge for his group now, he says, is to maintain and build upon Penn's own ability to serve a mix of residents. The Quiet Storm's building is owned by Friendship Development Associates, a once-active but now defunct community redevelopment group. The building is being purchased by a local restaurateur whom Swartz would not identify, except to say "he has a successful restaurant in the city already, and his family is helping him finance this." The new site will "bring a restaurant that will probably cater to a broader spectrum of people, which some people think is great, while others won't." In either case, while the restaurant will not be a chain, Swartz says, "It will look like a restaurant you might find in a lot of other places." Swartz says his organization tried to find a new home for the Quiet Storm along Penn, to no avail. "We came up dry. We approached a number of property owners with vacant storefronts. Some were interested, but [the buildings] needed a plethora of things done for them. Other times, the storeroom could have accommodated her, but they weren't interested in leasing -- not just to her, but to anybody. "It was disappointing, because there were some locations that could have done well for the Quiet Storm," Swartz continues. "It's a challenge we've confronted on Penn Avenue for the last 30 years: talking to people who think they've got something you want badly, and they are holding out for some ransom." And it's only gotten worse as the East End has become increasingly prosperous -- thanks in part to the Quiet Storm. "Suddenly, the wind is scented with money," Swartz says, and building owners feel like time is on their side. "It's the downside of neighborhoods returning to some level of normalcy, and a commentary about where the real-estate market is today." | Low | [
0.509677419354838,
29.625,
28.5
] |
Dental complications of herpes zoster: Two case reports and review of literature. Herpes zoster (HZ) (shingles) results due to reactivation of varicella-zoster virus. Unusual dental complications like osteonecrosis, exfoliation of teeth, periodontitis, and calcified and devitalized pulps, periapical lesions, and resorption of roots as well as developmental anomalies such as irregular short roots and missing teeth may arise secondary to involvement of 2nd or 3rd division of trigeminal nerve by HZ. Such cases pose both a diagnostic as well as a therapeutic challenge. We report two such rare dental complications of HZ-spontaneous tooth exfoliation and osteonecrosis of the maxilla in a 70-year-old female patient; and multiple periapical pathoses affecting right half of the mandibular teeth in a 45-year-old female patient. Both the patients did not have any associated systemic illness. The aim of this paper was to compare the present cases with all the 46 cases of osteonecrosis and 6 cases of multiple periapical pathoses secondary to trigeminal zoster reported in literature till date The article also throws light that the occurrence of such dental complications of HZ is not entirely dependent on the immune status of the host. | High | [
0.686813186813186,
31.25,
14.25
] |
Google has been hit by the 'worst ever' internet hijack in the company's history, security experts say. Information from users' Google searches, cloud-hosting services and the company's bundle of collaboration tools for businesses - known as G Suite - were all affected. Data belonging to users across the globe was intercepted by servers in Nigeria, China and Russia - including those run by major state-owned telecoms providers. Security experts suggested the hack was a 'wargame experiment' - meaning it may prelude similar, more wide-scale attacks from the nations involved in future. Google downplayed Monday's incident, however, saying it did not believe it was malicious, but failed to allay fears that the personal data of millions of users had been compromised. The company is under increasing pressure to protect users after a string of high-profile data leaks, including last month's breach of its Google+ social network, which exposed the private information of an estimated 500,000 people. The type of traffic misdirection employed in the latest incident, known as border gateway protocol (BGP) hijacking, can knock essential services offline and facilitate espionage and financial theft. It can result either from misconfiguration - human error, essentially - or from malicious action. In two recent cases, traffic rerouting has hit financial sites, potentially exposing people's private data to malicious hackers. In April 2017, a state-owned Russian Telecoms firm hijacked the traffic of MasterCard and Visa, allowing them enumerate who was initiating connections. This past April, another hijacking enabled hackers to steal $152,000-worth (£118,000) of the cryptocurrency Ether from users of the website EtherWallet.com. Scroll down for video Google network traffic normally travels through vetted service providers. A US-based Chinese 'Point of Presence' (PoP) - a legal internet access point that allows Chinese citizens to access US sites - intercepted this data and sent it to China Telecoms This image shows an outage map of Google service in the US. Interruptions lasted for nearly one and a half hours and ended about 10:30pm GMT (5:30pm EST), network service companies said Traffic was was intercepted by servers in Nigeria, China and Russia - including those run by major state-owned telecoms providers This graphic shows traffic from network intelligence company ThousandEyes in San Francisco being re-routed through China Google service interruptions lasted for nearly one and a half hours and ended about 10:30pm GMT (5:30pm EST) on Monday, network service companies said. Network intelligence company ThousandEyes uncovered the hijack. Alex Henthorn-Iwane, an executive at ThousandEyes, called Monday's incident the worst affecting Google that his San Francisco company has seen. He said he suspected nation-state involvement because the traffic was effectively landing at state-run China Telecom. A recent study by U.S. Naval War College and Tel Aviv University scholars found that China systematically hijacks and diverts U.S. internet traffic. ThousandEyes named the companies involved in Monday's incident, in addition to China Telecom, as the Russian internet provider Transtelecom and the Nigerian ISP MainOne. According to Professor Alan Woodward, a computer scientist at the University of Surrey, the hijack could have been part of an elaborate surveillance scheme. He told MailOnline: 'Access to people's data is a "strategic asset" for surveillance, and Russia and China have carried out hijack attacks to collect that data before. People took to Twitter to vent their frustrations, with one user writing 'I have no idea what to do with my life' Some users asked if the 'whole internet' went down during the outage, which was caused by what security experts fear was the 'worst ever' internet hijack in the company's history 'Most data like your online messages are encrypted, meaning anyone with access to that data could not easily read them. 'But while they could not read the messages themselves, they could track who talked to whom, when, and for how long. 'This would be useful information to help build up intelligence data on high-profile individuals of interest to foreign governments.' Both ThousandEyes and the U.S. network monitoring company BGPmon said the internet traffic detour originated with the Nigerian company MainOne. WHAT DO WE KNOW ABOUT THE COMPANIES INVOLVED IN THE GOOGLE HIJACK? China Telecom China Telecom is a state-owned telecommunication company and the third lrgest mobile telecoms provider in China. The company is embedded in North American networks, with 10 points-of-presence (PoP) access points spanning major internet exchange locations. China Telecom has two PoPs in Canada, and eight in the United States. Researchers reported in October that Chinese telecom firms had been hijacking internet traffic on a regular basis. Chris Demchak of the United States Naval War College and Yuval Shavitt of the Tel Aviv University in Israel traced global border gateway protocol (BGP) announcements. They discovered several attacks by state-run China Telecom over the past few years, according to reports in Secure Reading. They found that China redirected traffic between Canada and Korean government networks to its point of presence (PoP) in Toronto for six months in 2016. A recent study by U.S. Naval War College and Tel Aviv University scholars says China systematically hijacks and diverts U.S. internet traffic. Trans Telecom Trans Telecom is a state-owned Russian telecommunications company that owns one of the largest networks in the world of fibre optical cables. The company is a full subsidiary of Russian national railway operator, Russian Railways. TTK has been actively connecting broadband users in the retail market since early 2011. In 2017, internet analysts began noticing routing databases picking up TransTeleCom-provided connections for North Korea. North Korea has been blamed by Western governments for several major cyber attacks in recent years, including against banks and Sony Pictures. TransTeleCom would not confirm any routing deal with the country. But, analysts said the connection via Russia was handling around 60 per cent of the country's internet traffic. ISP MainOne MainOne is West Africa's connectivity and data centre. The company provides network, internet solutions and cloud services to providers in Nigeria, Ghana and all of West Africa. Since its launch in 2010, MainOne has developed a reputation for reliable service, becoming the major provider of wholesale internet services to major telecom operators and government agencies. The leak started when the cable company based in Lagos, Nigeria suddenly updated tables in the Internet’s global routing system to improperly declare that its autonomous system was the proper path to reach prefixes belonging to Google. Within minutes, Chine Telecom accepted the route, followed by Russian-based Transtelecom. MainOne has a peering relationship with Google via IXPN in Lagos and has direct routes to Google, which may have led to the leak. Advertisement Google users reported that video site YouTube, which is owned by Google, would not load videos. Additionally, services linked to Nest, a smart home technology company also run by Google, were down on Monday On Twitter, BGPmon wrote: 'Appears that Nigerian 'MainOne Cable Company' leaked many prefixes to China telecom, who then advertised it to AS20485 TRANSTELECOM (russia). From there on others appear to have picked this up.' Neither was ready to more definitively pinpoint the cause. On Twitter, MainOne claimed the reroute was caused by an error during a planned network upgrade. The company wrote: 'We have investigated the advertisement of Google prefixes through one of our upstream partners. 'This was an error during a planned network upgrade due to a misconfiguration on our BGP filters. 'The error was corrected within 74mins & processes put in place to avoid reoccurrence.' Yuval Shavitt, a network security researcher at Tel Aviv University, said it was still very possible that Monday’s issue was not an accident, despite the firm's statement. 'You can always claim that this is some kind of configuration error,' said Professor Shavitt, who last month co-authored a paper alleging that the Chinese government had conducted a series of internet hijacks. Some users suggested the downtime was caused by a mishap with the company's border gateway protocol (BGP) management. BGPs help direct internet traffic between two points Users were unable to use Google's search engine during the outage, triggering a wave of outrage on Twitter Professor Woodward told MailOnline that because the hijack caused people's web services to shut down, the incident was likely the result of human error. Similar attacks have previously allowed people to continue using the hijacked service so as not to raise suspicion, though Professor Woodward added that experts 'could not definitively rule out a malicious attack'. Regardless of the source, the leak put the traffic of users into foreign hands, researchers said. The diversion 'at a minimum caused a massive denial of service to G Suite and Google Search' and 'put valuable Google traffic in the hands of ISPs in countries with a long history of Internet surveillance,' ThousandEyes said in a blog post. A Google spokesperson told MailOnline: 'We're aware that a portion of internet traffic was affected by incorrect routing of IP addresses, and access to some Google services was impacted. 'The root cause of the issue was external to Google and there was no compromise of Google services.' HOW CHINA ROUTINELY HIJACKS GLOBAL INTERNET TRAFFIC Researchers reported in October that a Chinese telecoms firms had been hijacking internet traffic on a regular basis. Chris Demchak of the United States Naval War College and Yuval Shavitt of the Tel Aviv University in Israel traced global border gateway protocol (BGP) announcements. They discovered several attacks by state-run China Telecom over the past few years, according to reports in Secure Reading. They found that China redirected traffic between Canada and Korean government networks to its point of presence (PoP) in Toronto for six months in 2016. Internet traffic normally takes a short route which is through Canada, the U.S and then to Korea. Traffic between Scandinavia and Japan was also hijacked between April and May 2017. PoPs manage traffic between all the smaller networks called autonomous systems (AS). China has ten PoPs in North America, but it doesn't allow any foreign country PoPs in their country. The traffic between two autonomous systems are managed with the help of Border Gateway Protocol (BGP). BGP hijacks can also occur by mistake if this system is set up incorrectly. Most of BGP hijacking attacks nowadays are the work of government agencies or criminal organisations with access or control of strategically placed ISPs, experts warn. 'Building a successful BGP hijack attack is complex, but much easier with the support of a complicit and preferably large scale ISP that is more likely to be included as a central transit point among a sea of ASs,' the report said. 'China Telecom has ten strategically placed, Chinese controlled internet 'points of presence'4 (PoPs) across the internet backbone of North America.' 'Vast rewards can be reaped from the hijacking, diverting, and then copying of information-rich traffic going into or crossing the United States and Canada – often unnoticed and then delivered with only small delays.' The full findings of the study were published in the Journal of the Military Cyber Professionals Association. Advertisement The company has offered little additional information. Much of the internet's underpinnings are built on trust, a relic of the good intentions its designers assumed of users. One consequence: Little can be done if a nation-state or someone with access to a major internet provider - or exchange - decides to reroute traffic. Mr Henthorn-Iwane said Monday's hijacking may have been 'a war-game experiment.' The theory was backed by Professor Woodward, who said a global hijack attack could have been carried out by Russia and/or China 'simply to see if they could'. He told MailOnline: 'We all rely on the internet nowadays - why hit a country with bombs and bullets if you can disrupt their web access? It would cause chaos.' Google has been hit by an attack that the re-routed the firm's global internet traffic through servers located in Russia, China and Nigeria (stock image) Researchers also reported in October that a Chinese telecoms firm had been hijacking internet traffic on a regular basis. Chris Demchak of the United States Naval War College and Yuval Shavitt of the Tel Aviv University in Israel traced global border gateway protocol (BGP) announcements. They discovered several attacks by state-run China Telecom over the past few years, according to reports in Secure Reading. They found that China redirected traffic between Canada and Korean government networks to its point of presence (PoP) in Toronto for six months in 2016. | Low | [
0.503067484662576,
30.75,
30.375
] |
Join us Sunday Guest Speaker Michael Cotten Guest speaker Michael Cotten looks into the scripture 2 Peter 1:3-9 and the truth of God’s fullness. God has given us all things we need pertaining to life and godliness, not just some things or all things but one. Are we taking full advantage of the promises of God? | High | [
0.663529411764705,
35.25,
17.875
] |
New virtualization solutions can cut desktop costs Plans also work to boost security By John Moore Jul 01, 2009 Maintaining employees' computers is one of the information technology department’s most thankless responsibilities. The desktop and laptop PCs that are fixtures of today’s workplace eat up IT staff time and a good slice of the department’s capital budget. But usually, the IT department hears from users only when the devices are broken or tied to a security breach. Cost savings and security top benefits A survey of government information technology managers who are implementing desktop virtualization systems were asked to select the top three benefits of the technology. The results were: 35% Reduced operating costs 32% Improved network security 31% Reduced capital costs Source: CDW Government online survey of 377 federal IT managers in April 2009 More on Virtualization Desktop virtualization technologies probably won't make users any more appreciative, but by centralizing desktop administration tasks in the data center they can lighten the load on the IT department while enhancing security. Estimates on the potential cost savings vary widely because the upfront costs for buying virtualization systems or upgrading existing infrastructure such as networks to support it shift depending on the would-be implementer’s situation. But analysts do agree that overall costs will come down in the long run, sometimes significantly. Part of that challenge is that agency leaders have to sort through several virtualization options, and choosing the best one — or a combination — for each unique situation can be difficult. Desktop virtualization aims to simplify desktop computing in much the same way as its better-known sibling, server virtualization, lets agencies cut fat in the data center by running multiple virtual machines on a single physical one. Fewer servers means less hardware and lower support costs. Desktop virtualization doesn’t eliminate computers from users’ desks, but it does allow workers to get by with less expensive, stripped-down models or even older, re-purposed units. The technology transfers a lot of PCs' brains and data storage to central servers in the data center, where IT staff members can manage them more efficiently, including keeping them up-to-date with security patches. Government has been broadly adopting server virtualization, which is now a fairly settled and mature technology. The desktop variety, in contrast, presents a more varied landscape. Indeed, buyers face multiple technical approaches to desktop virtualization. Those flavors, in turn, feature different levels of customer adoption and offer different potential benefits. The task for customers is to determine which desktop virtualization approach — or combination of methods — best suits their needs. “A lot of people are wrestling with that these days,” said Joe Brown, president of Accelera Solutions, an IT solutions provider that specializes in virtualization and works in the government market. Here’s a rundown on the main forms of desktop virtualization. Option A: Presentation virtualization/application virtualization How it works Presentation virtualization lets users share an application hosted on a central terminal server. Instead of having expensive, full-functioning PCs on their desks, users have thin clients, which are stripped-down computers with no hard drives. The servers handle the data storage and the bulk of the application processing action, save for the user interface, which runs locally on the user’s desktop machine. Microsoft’s Windows Terminal Services and Citrix Systems' Presentation Server — now rebranded as XenApp — are examples of the approach. Such presentation solutions are simple to deploy as long as adequate network bandwidth is available, said Jim Smid, data center practice manager at Apptis Technology Solutions, an integrator with many government customers. Brown said Citrix’s technology, in particular, has proven an effective solution for delivering a standard application to a large group of users who have regular network access. He said this approach can cover the desktop application needs of 30 to 40 percent of a typical organization’s users. In the past, presentation virtualization wasn't an option for users who don’t have regular network access. But vendors have added a new capability called application streaming or application virtualization that address this mobile population. Citrix’s XenApp, for example, can deliver a mobile version of applications to workers’ desktops while they are connected. They can then run that application later even when there is no network connection. Presentation virtualization and application virtualization play different roles in an organization. Presentation virtualization sees the greatest use among task workers who use a limited number of standard applications, such as in call centers, said Tom Simmons, area vice president at Citrix's Government Systems division. Another niche is presenting existing applications that are difficult to manage on the client side. It is also a good choice for users who need standard applications that access large, centrally stored datasets, said Rhys Ziemer, a technology expert at Microsoft. Meanwhile, application virtualization and streaming provide centrally controlled and distributed apps to users, whether they are in-office workers with constant network access or mobile workers with only occasional network access. Government status Industry executives identify presentation virtualization and application virtualization as the most common forms of the technology. They said the ability to centrally manage applications and meet security standards, such as the Federal Desktop Core Configuration, rank among the attractions in government. FDCC, a mandate of the Office of Management and Budget, calls for agencies to introduce standard configurations of Windows XP and Vista PCs in an effort to boost security. Option B: Virtual desktop infrastructure (VDI) How it works VDI represents a newer development in desktop virtualization, and it is just now emerging among government agencies. The technology also falls under the hosted virtual desktop label. VDI Products include Citrix's XenDesktop, Parallels’ VDI and VMware’s View. Microsoft, meanwhile, provides a basic, manageable VDI infrastructure with its upcoming Windows Server 2008 R2, Rhys said. General availability is slated for later this year. The hosted virtual desktop approach is an effort to centralize user computing. Although a traditional PC houses the operating system, applications and data on a local hard drive, a virtual desktop places those elements in the data center. Each user’s desktop is maintained as a virtual machine running on a central server. A server could potentially host thousands of such virtual desktops for an agency's user population. A connection broker, which supports one or more remote viewing protocols, links the user to his or her virtual desktop. Virtualization software vendors offer connection brokers, and third-party brokers are available from companies such as Leostream and Quest Software. An organization might choose to use a conventional PC — a thick client — to display the virtual desktop or opt for a smaller device, such as a thin client or even an older model PC. Each virtual desktop residing in the back-end server infrastructure exists independently of all others. This isolation gives all users “their own personalized desktop,” said Raj Mallempati, group product manager for desktop solutions at VMware. Accordingly, Brown said he recommends hosted virtual desktops for users who need personalization capabilities that a shared platform wouldn’t provide. He added that virtual desktops also avoid some application compatibility issues found in shared-computer environments. VDI might also prove to be a fit for organizations that seek to maintain traditional desktop capabilities such as bi-directional audio/video and streaming video that are difficult or impossible in a shared presentation form of virtualization. “As much as possible, we completely replicate the physical environment by doing things like bi-directional audio and video,” said Paul Garver, vice president of Quest Software's public sector division. Government status For the most part, VDI has surfaced as proof-of-concept deployments in government. But larger deployments have begun to emerge. At the U.S. Patent and Trademark Office, 2,110 production employees — including trademark attorneys and Board of Patent Appeals judges — use a virtual machine for desktop computing, an agency spokeswoman said. USPTO’s desktop virtualization is built on VMware’s server and desktop products. Students access virtual desktops from an array of computer devices, including many older desktop models. “We can bring them back to life — kind of like Frankenstein,” said Marrita Horne, Pike County Schools' technology director. District officials hope to add 2,000 more computers to the virtual service, including older machines that otherwise would have been scrapped. Horne also noted improved security as another advantage for the virtual desktop environment. Option C: Virtual desktop/client-side hypervisor How it works In this wrinkle, the virtualization software operates only on a user's PC. This technology lets users operate virtual machines on their own devices as opposed to relying on a server to do the virtualization chores. VMware set the market in motion in 1999, with the debut of VMware Workstation — the company’s first product. Workstation allows a PC to run multiple operating systems. Products in the Workstation mold are called Type 2 hypervisors because they run within an operating system. Type 1 hypervisors, typical of server virtualization, run directly on hardware. However, some vendors are pushing Type 1 hypervisors to the desktop. Citrix’s Project Independence, in which it collaborates with Intel, marks one effort to develop a client-side hypervisor. Where it fits In recent years, products that let Apple Mac users run Windows or Linux have been a popular use of desktop virtualization. Parallels’ Desktop for Mac and VMware’s Fusion fall into that category. Government status The government has provided a steady source of users who want the ability to run Mac and Windows applications side by side. Bill Portin, vice president of sales and operations at Parallels, listed NASA, the National Institutes of Health and the Energy Department's national laboratories among the company's customers. Aileen Black, vice president of VMware’s public-sector division, said Fusion is taking off in the Army, which recently purchased 7,500 Macs. The Defense Department and intelligence agencies have also requested it, she said. What is your e-mail address? Do you have a password? Trending In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Our databases track awards back to 2013. Read More | Mid | [
0.626506024096385,
32.5,
19.375
] |
_State of the Art Sea Fishing Tackle for a Passionate Angler _State of the Art Sea Fishing Tackle for a Passionate Angler fishing tackleNothing at all compares to going out at the crack of daylight into the middle of the sea and casting your line onto the water. One of the most superior pieces of fishing tackle that can be utilized to make the adventure picture perfect is an Abu Ambassadeur 5500 CS Rocket Multiplier Fishing Reel. The manufacturers of this premium grade fishing tackle started out in the year 1921 as a taximeter and watch plant. By the 1930s, the demand for taximeters declined requiring the company to switch gears so to speak and the company started making rod and fishing reels. The business’s first fishing reel was made in 1941-the Abu Record; the second one was the Ambassadeur series during the 1950s. Owing to the excellent quality precision construction of their fishing reels, this company was made “Purveyor to the Royal Swedish Court.” This distinction is granted only to a few manufacturers that consistently exceeded the standards of the courts for craftsmanship and quality. This Abu Garcia Ambassadeur is highly appreciated for the reason that it has a strong build quality and smooth operation. The free spool bait casting design makes the action more accurate and at a longer range. The fishing tackle has a stainless steel roller bearing system that can provide instantaneous anti-reverse hooking power. This reel also has an ultra-smooth Carbon Matrix drag system with a 5.3:1 gear ratio which provides the angler 25.5 inches per turn with a standard retrieval speed nickel coated level winding system. To hold the line, there is a six-pin centrifugal braking system for the mono spool capacity of 14 lbs per 245 yards while the braided spool capacity for this fishing tackle is at thirty pounds per 330 yards. It is a right hand retrieval system allowing for a maximum drag of 15 lbs at an overall weight of only 11.3 ounces. A primary element is its Carbon Matrix drag star wheel set up; this extends both resistance and muscle and, in addition keeps a grip on larger fish enough to stop them from running away with your fishing tackle line. This is carried out by means of the synchronized winding power; there is excellent spool management that comes from automatic and centrifugal sources. On a regular day, this 5500 CS can accommodate 185 yds of 15 lb monofilament line, or 205 yds of 12 lb line. The free spinning rocket bearings of the tackle works alongside the multi-disc drag mechanism where both mechanical and centrifugal spool controls work to control the fish on the line. The reel’s anti-reverse plus precision gears along with the decay resistant bearings help the reel to be enduring and also responsive while you are fishing. The reel has a power handle and paddle grip handle allowing for easier grip and handling especially in the battles with fish and sea air. As you can see, the numerous aspects of this fishing tackle make it the farthest casting level wind reels and most dependable shafts in any kind of fishing environment. This makes this rod and reel not only the best in the Ambassadeur product category but in the fishing tackle industry at this time. | Mid | [
0.637119113573407,
28.75,
16.375
] |
Q: mysql statement works on my desktop but fails on my web host I use XAMPP on my desktop (Apache/2.2.17 (Win32) mod_ssl/2.2.17 OpenSSL/0.9.8o PHP/5.3.4 mod_perl/2.0.4 Perl/v5.10.1 MySQL client version: mysqlnd 5.0.7-dev - 091210 - $Revision: 304625 $) I have a MYSQL SELECT statement that works fine in my desktop application, even ran it in phpMyadmin and works correctly. When I move my application up to my web host the statement fails. My web host runs Apache with MySQL client version: 5.0.92 When I used phpMyadmin on my web host it gives me the error: FUNCTION nwilin5_eib_jtest.FIELD does not exist Here is the statement: SELECT a.*, p.name as parent, p.id as parentid, c.name as cat , c.id as catid,u.username as user, f.itemid as featured , f.payment_date as FeaturedPayDate, f.limit_date as FeaturedExpDate FROM jos_classifiedsredux_ads as a LEFT JOIN jos_users as u ON a.userid = u.id LEFT JOIN jos_classifiedsredux_pay4featuredad as f ON a.id = f.itemid INNER JOIN jos_classifiedsredux_categories as c ON a.category = c.id LEFT JOIN jos_classifiedsredux_categories as p ON c.parent = p.id WHERE a.published = 1 ORDER BY FIELD (a.id, 137, 226, 134, 135, 220, 240, 233, 219, 146, 138, 136, 133) A: You need to remove the space between FIELD and ( in your ORDER BY... Change: ORDER BY FIELD (a.id, 137, 226, 134, 135, 220... To: ORDER BY FIELD(a.id, 137, 226, 134, 135, 220... Why does this matter? Your test server and your production server likely have a different setting for the IGNORE_SPACE mode... which permits a space between the function call (FIELD), and the parameter list when enabled. Permit spaces between a function name and the “(” character. This causes built-in function names to be treated as reserved words. As a result, identifiers that are the same as function names must be quoted as described in Section 8.2, “Schema Object Names”. For example, because there is a COUNT() function, the use of count as a table name in the following statement causes an error: mysql> CREATE TABLE count (i INT); ERROR 1064 (42000): You have an error in your SQL syntax The table name should be quoted: mysql> CREATE TABLE `count` (i INT); Query OK, 0 rows affected (0.00 sec) The IGNORE_SPACE SQL mode applies to built-in functions, not to user-defined functions or stored functions. It is always permissible to have spaces after a UDF or stored function name, regardless of whether IGNORE_SPACE is enabled. | High | [
0.681638044914134,
32.25,
15.0625
] |
Bioterrorism and electron microscopic differentiation of poxviruses from herpesviruses: dos and don'ts. With increased threat of terrorism, much attention is being directed toward readiness for biodefense. Smallpox virus, a deadly and much feared organism, is among possible bioterrorism agents. Herpesviruses, such as the one that causes chickenpox and shingles, produce skin lesions that may resemble those seen early in smallpox infection. Electron microscopy (EM) is a rapid and reliable method for differentiating poxviruses from herpesviruses. However, before becoming involved in the monitoring of potential smallpox cases, a laboratory must consider several issues, including expertise in virus identification, capacity for handling biohazards, and health and immune status of laboratory staff. | High | [
0.6616915422885571,
33.25,
17
] |
Steve Rogers might be the sentinel of liberty in name, but his actions have been anything but patriotic. In ComicBook.com's exclusive preview of Captain America Steve Rogers #11, Rogers is faced with the ramifications of those actions, namely his hand in the death of Jack Flag. His words take on even more meaning after last week's The Oath, where fans learned that he does remember his previous life. Fans also learned in that issue that the vision of Roger's death wasn't necessarily averted. Rogers mentions that he witnessed the entire vision, which showed the government being overthrown by a newly reenergized Hydra. While Cap and Skull's methods are different, their end goal seems to be the same, and Cap will use any means to make sure it comes to pass. Captain America Steve Rogers is written by Nick Spencer with art by Jesus Saiz. Inking is Scott Hanna with coloring from Rachelle Rosenberg and lettering from VC's Caramagna. The regular cover was drawn by Paul Renaud with a special variant cover by Joe Jusko. You can view the official description of the issue below, and catch an exclusive preview of the book below --- | Mid | [
0.5489361702127661,
32.25,
26.5
] |
Suppose 0 = 4*s - 5*n - 329, -l*s + d*n + 167 = -3*n. What are the prime factors of s? 3 Let w(x) = 13*x**3 + 7*x**2 + 6*x + 3. Let p be w(6). Suppose -6*o + p = -3243. What are the prime factors of o? 7, 151 List the prime factors of 3/(((-4)/(-60)*3)/(57692/60)). 14423 Let h(u) = 22*u - 12. Suppose 0 = 2*s - 5*s + 6. Suppose 0*l + 3*z + 16 = 5*l, 0 = 2*l - s*z - 4. What are the prime factors of h(l)? 2, 7 Let n = 27 + -24. Suppose -p = n*u - 2*p - 12, 4*u - p = 16. Suppose 2*x = u*y - 84, y - x - 23 = -0*x. What are the prime factors of y? 19 Suppose -2905*c + 8394 = -2903*c. What are the prime factors of c? 3, 1399 Suppose -8*w + 7*w + 15 = 0. Suppose -6*y = -y - w, -y - 8 = -n. Let z = 170 - n. List the prime factors of z. 3, 53 Let k = 5931 - 3011. What are the prime factors of k? 2, 5, 73 Let f(k) = 3*k**2 + 3*k - 30. Let g be f(9). Let u = -102 + g. Let v = -96 + u. What are the prime factors of v? 2, 3, 7 Let p(k) be the third derivative of 119*k**5/60 - 84*k**2. List the prime factors of p(1). 7, 17 Let p be 194 + 6 - (-1 - -1). Suppose 5*j - 7*j - 4 = -f, -5*f + j + 2 = 0. Suppose f = -3*o + 4*b + p, -2*o + 344 = 3*o + 4*b. What are the prime factors of o? 2, 17 Let r(u) be the second derivative of u**5/20 - u**4/12 + u**2 - 24*u. Let m be r(-1). Let p = m + 95. List the prime factors of p. 5, 19 Suppose -3792 = -5*j - i, -25*j = -23*j - 2*i - 1512. What are the prime factors of j? 2, 379 Let r(o) = 2*o + 3*o**3 - 7 - 2*o**3 + 6*o**2 - 5*o + o. Let f be r(-6). Suppose -i = -4*q + 299, -4*q + 298 = 3*i - f*i. List the prime factors of q. 3, 5 Let z(y) = 230*y + 2621. What are the prime factors of z(33)? 10211 Let u = 13 - 10. Suppose 5*b - 10 = 4*p, u*b - 2 = 2*b + 4*p. Suppose b*t = -t - 2*i + 260, 4*t + 3*i - 346 = 0. What are the prime factors of t? 2, 11 What are the prime factors of 6537/(7 + 25/(-4))? 2, 2179 Let c = 26805 + 27484. List the prime factors of c. 233 Let v = -9 + 4. Let m(k) = 7*k**2 + 5*k - 5 - 13*k**3 + 14*k**3 + 4 - 5 + 4. What are the prime factors of m(v)? 23 Suppose -47*a = -16*a - 124. Suppose -p + 1214 = p - a*k, p + k - 610 = 0. What are the prime factors of p? 3, 7, 29 Let d = -75 + 69. Let c be d + 17/(-5) + (-12)/(-30). Let l(p) = 2*p**3 + 20*p**2 + p - 5. List the prime factors of l(c). 2, 37 Let s = -58232 + 111326. What are the prime factors of s? 2, 3, 8849 Let m(w) = 2*w**3 - 27*w**2 + 17*w + 10. Let r(j) = j**3 - 5*j**2 + 9*j - 6. Let k be r(4). List the prime factors of m(k). 2, 3, 37 Let p(d) = d**3 + 14*d**2 + 2*d + 28. Let i be p(-14). Suppose -2*w = -3*t - i*t + 1299, -4*t = w - 1743. List the prime factors of t. 3, 5, 29 Let l = -41 - -107. Suppose l = -5*h + 106. Suppose 882 = h*u - 1534. List the prime factors of u. 2, 151 What are the prime factors of 3195 - 41/(615/90)? 3, 1063 Let h = 7875 - -8857. What are the prime factors of h? 2, 47, 89 Suppose -436*y + 431*y = -4*m + 17757, 0 = 2*m - 3*y - 8879. What are the prime factors of m? 2, 7, 317 Suppose 0 = 5*q - 5*u - 27825, 28 = 50*u - 54*u. What are the prime factors of q? 2, 7, 397 List the prime factors of 3511/(356/(-24) - -15). 2, 3, 3511 Let h(x) = 585*x + 465. List the prime factors of h(28). 3, 5, 1123 Let x be (-4)/(-14) + 152/56. Let y be (-66)/(-12) + x/6. What are the prime factors of (45/y)/(9/84)? 2, 5, 7 Let l be 0/((-3 - -2)/(1 + -2)). Let d(s) = -s**2 - 4*s + 5. Let j be d(l). Suppose 0 = -j*q + 789 + 6. What are the prime factors of q? 3, 53 Let r(w) = 10*w**3 + 2*w**2 - 1. Let t be r(-1). Let i(n) = -11*n - 5. Let m be i(t). Let d = 109 - m. What are the prime factors of d? 3, 5 Suppose 2*n = -3*p - 1240, 4*n - 385 = p - n. Let l = -175 - p. What are the prime factors of l? 5, 47 What are the prime factors of 96/4*((-3)/(-2))/(30/1355)? 2, 3, 271 Let h be 2/(-7) - 27666/42. List the prime factors of (h/(-2))/(5 - 63/14). 659 What are the prime factors of (0 - -1) + 9/(-10) + 97513156/8840? 3, 3677 Let w(g) = 7*g**3 - 3*g**2 - 22*g + 98. Let q be w(6). Let y = q + -671. List the prime factors of y. 3, 233 Suppose -6*z - 24 = 0, -68*y + 65*y + 35830 = 5*z. List the prime factors of y. 2, 5, 239 Suppose t + 2*x - 1216 = -2*t, 4*x = -5*t + 2028. Let u = -168 + t. What are the prime factors of u? 2, 59 Let l be 235*(-4)/(-28) - 12/(-28). Let o be 31 - (-4 - -2) - (l - 37). Let u = o + 68. What are the prime factors of u? 2, 13 Suppose -4*h - u = -6*u + 55, 90 = -5*h + 2*u. Let j be 3 + 12/h + (-4)/10. Suppose q + j*k = 21, 3*k + 10 = -2*k. List the prime factors of q. 5 Suppose -8*u + 1329 = -159. Suppose -p + 216 = -5*y, -p - 7*y + u = -2*y. List the prime factors of p. 3, 67 Let m = 5382 + 811. List the prime factors of m. 11, 563 Let o(g) be the first derivative of 2*g**3/3 + 4*g**2 - 12*g + 1. Let n(r) = 91*r - 2541. Let v be n(28). List the prime factors of o(v). 2, 71 Let m(g) = 9*g**2 + g + 2. Let c be m(-2). Let t = -107 - -76. Let r = t + c. What are the prime factors of r? 5 Let b = -334 + 255. Let x = 135 + b. List the prime factors of x. 2, 7 Let y(m) = -1898*m + 52. List the prime factors of y(-11). 2, 5, 7, 13, 23 List the prime factors of 24631 + 125/(-5) + 8*1. 2, 31, 397 Suppose 37 = 4*c - d, -2*c + 35 = 2*d + 3*d. Suppose -t = -2*w + 5*w - 11, 2*w = 3*t. List the prime factors of 1/w*1380/c. 2, 23 Suppose 395*l - 2437309 - 726111 = -741675. List the prime factors of l. 6131 Suppose -2*u + 6*u + 5*v - 20 = 0, 20 = 5*v. Suppose u = -2*i - 10*i + 20220. What are the prime factors of i? 5, 337 Let s(d) = 1114*d - 50. Let t be s(-1). List the prime factors of -12*1/(-3)*t/(-16). 3, 97 Let f = 159 + -93. Let y be -4 - (-24276)/f - 2/(-11). Suppose -4*q + 6*u + y = u, u - 182 = -2*q. What are the prime factors of q? 7, 13 Let r(c) = -1. Let o(u) = u - 5. Let y(n) = -o(n) + 3*r(n). Let t be y(-4). Suppose -t*b = -59 - 121. List the prime factors of b. 2, 3, 5 Let p(k) = 12*k**2 - 20*k + 4. Let w be p(8). Suppose 7*n = 1474 + w. What are the prime factors of n? 2, 149 Let p(s) = -112*s + 110. List the prime factors of p(-22). 2, 3, 11, 13 List the prime factors of (-88656)/(-60)*(-680)/(-17). 2, 1847 Suppose 4*q - 16*y + 15*y = -68449, 3*q = -4*y - 51332. What are the prime factors of (1/1)/((-69)/q)? 2, 31 Suppose -2*k + 3*o = -4057, 19*o - 10151 = -5*k + 18*o. Suppose 105*w = 91*w + k. What are the prime factors of w? 5, 29 Let o = 51 + -51. Suppose -2*u - 5*d = -11, -4*d + 40 = 4*u - o*u. Suppose 0 = u*r - r - 204. What are the prime factors of r? 17 Let x(h) be the first derivative of 14*h**3/3 + h**2 + 4*h - 98. Let y be (-2)/(-1)*(6 + -7). What are the prime factors of x(y)? 2, 7 Let r be (8/(-3))/(7/(-126)). Let b(v) = r*v + 34 - 2 - 42*v. What are the prime factors of b(10)? 2, 23 Let i = 19 - 15. Suppose 0 = -4*p + 3*h + 404 + 688, 3*p + i*h - 819 = 0. Let z = -80 + p. List the prime factors of z. 193 Suppose 5*b = 5*q - 44880, -2*q = 32*b - 27*b - 17952. List the prime factors of q. 2, 3, 11, 17 Suppose 4*n = 7599 - 2803. List the prime factors of n. 11, 109 Let v = -12724 - -20677. What are the prime factors of v? 3, 11, 241 List the prime factors of ((-6)/(-30)*-25)/((-3)/2946). 2, 5, 491 Suppose 11*d - 16*d + 5*m + 30 = 0, -5*d + 28 = -3*m. Let i be 1/(10/4 + -2). Suppose i*j + d*j = 476. What are the prime factors of j? 2, 17 Let z(h) = -17*h + 85. Let u be z(5). Suppose u = -138*x + 150*x - 5028. List the prime factors of x. 419 Let y = 33897 - 24153. List the prime factors of y. 2, 3, 7, 29 Suppose -4*p - 4 + 16 = 4*t, -5*t + 7 = p. What are the prime factors of t/((12/135)/(4/3))? 3, 5 Suppose -m - 632 = -2*m. Let q = -2804 - -2808. Suppose m = -0*w + q*w. List the prime factors of w. 2, 79 Suppose -2*q = 2*k - 54164, -3*k - 10 - 5 = 0. What are the prime factors of q? 3, 9029 Suppose -750 = -4*r + 9*r. Let c = r - -37. Let i = -21 - c. List the prime factors of i. 2, 23 Let d be 4*(-1 + 87/(-6)) - 2. Let u = -72 - d. What are the prime factors of -162*9/(108/u)? 2, 3 Suppose 30*i = 32*i + 18. List the prime factors of (i/(-4))/(4*(-7)/(-1344)). 2, 3 Let g = 532 - 505. Suppose 222 - g = 15*i. List the prime factors of i. 13 Suppose -3*w + 2*w = 3*k - 48695, 4*w - 16206 = -k. List the prime factors of k. 2, 8117 Suppose -4759*y + 4764*y = 15175. What are the prime factors of y? 5, 607 Let s = - | Low | [
0.49612403100775104,
24,
24.375
] |
Enabling Graded and Large-Scale Multiplex of Desired Genes Using a Dual-Mode dCas9 Activator in Saccharomyces cerevisiae. Standard approaches for dCas9-based modification of gene expression are limited in the ability to multiplex targets, establish streamlined cassettes, and utilize commonly studied Pol II promoters. In this work, we repurpose the dCas9-VPR activator to act as a dual-mode activator/repressor that can be programmed solely on the basis of target position at gene loci. Furthermore, we implement this approach using a streamlined Pol II-ribozyme system that allows expression of many sgRNAs from a single transcript. By "stepping" dCas9-VPR within the promoter region and ORF we create graded activation and repression (respectively) of target genes, allowing precise control over multiplexed gene modulation. Expression from the Pol II system increased the net amount of sgRNA production in cells by 3.88-fold relative to the Pol III SNR52 promoter, leading to a significant improvement in dCas9-VPR repression strength. Finally, we utilize our Pol II system to create galactose-inducible switching of gene expression states and multiplex constructs capable of modulating up to 4 native genes from a single vector. Our approach represents a significant step toward minimizing DNA required to assemble CRISPR systems in eukaryotes while enhancing the efficacy (greater repression strength), scale (more sgRNAs), and scope (inducibility) of dCas9-mediated gene regulation. | High | [
0.665,
33.25,
16.75
] |
Hard times in Sri Lanka’s war-ravaged north By Charles Haviland/BBC News, KilinochchiThe dirt road leading south-west from Kilinochchi town is pale red, the colour of the soil of the Vanni, the northerly extreme of the Sri Lankan mainland. It is a land that lost all its people. They retreated with the Tamil Tigers as the civil war swept through Kilinochchi more than two years ago. There are burnt-out husks of houses. But new huts are now scattered among the trees. There is a bonfire by the roadside and small shops that returnees have opened. A few soldiers pass on bicycles. People walk by the roadside like strangers rediscovering the land of their roots. Hundreds of thousands have left army-run camps to come home. Entry to this region has been heavily restricted for years. But the BBC was given unconfined, though temporary, access to Kilinochchi district. Tempered by tragedy Chandrasegaran Thayakaran, his wife Vinodha and their four-year-old son Dhanushan are working together to put up a modest wooden-framed house in Unionkulam village. The boy scoops up sand and carries it to the building site, patting it down carefully. Chandrasegaran, now 22, married at 17 to escape being recruited by the Tigers. The family lived through months under bombardment in the war zone and a year in a camp. They got a UN grant equivalent to $230 (£143) when they came out. Since then they have had some cash help from the Save the Children charity and pawned their possessions to get by. Chandrasegaran gets some casual labour work. Any gladness at returning to his village is heavily tempered by tragedy. Chandrasegaran lost many members of his family in the war “I lost my mother, my little brother and my elder sister and brother in the war,” he tells me. “We’ve come here without our family. So we’re not really living happily.” At least people in this newly resettled community are supporting each other. Chandrasegaran’s two friends were both wounded in the war. Now they are helping the family build. The three laugh and joke as they go off by motorbike. Everyone has had a difficult homecoming, haunted by trauma and loss. Nagamma Chandran, a widow of about 50, lives with her mother and teenage son in a shack of tin and tarpaulin built with help from the Dutch refugee organisation ZOA and the UNHCR. She lost her brother in the war. She and her mother are sick and she cannot find work; nor can they afford transport to a hospital. “We’ve been here almost three months. Since then we have got nothing, no help. We get 100 rupees ($1) per month each in aid money,” she says. “The government is not helping us. I have sent a lot of letters, but there’s no reply.” In Kilinochchi town – once the Tamil Tiger headquarters, now a government garrison town – I meet the chief local government officer, R Jegathiswaran. She says the government is doing all it can to help the displaced people returning home. They extend livelihood assistance – support for home gardening, livestock development or small businesses. But she admits that some people “could not get” it – perhaps an acknowledgement that some, like the landless villagers we met, fall through the safety net. ‘Bombastic monument’ “I can say the government has provided enough assistance to the people. Although they’ve received all the things provided by the government and some of their livelihood assistance we have provided through NGOs, they want to get more and more. “Whatever they get, they have to be satisfied with that.” Many come to admire the victory monument The town centre of Kilinochchi is very different from the hinterland around it. Half a dozen soldiers, supervised by an officer, lovingly tend a huge – some say bombastic – monument to the government’s war victory. One soldier snips the grass with scissors to keep it neat. They are on duty here around the clock. Its centrepiece is a massive concrete cube representing the Tamil Tigers’ violent insurrection. It is pierced and cracked by a big bullet, said to symbolise the “sturdiness of the invincible Sri Lankan army”, and topped with a flower of peace. The adjacent tablet says President Mahinda Rajapaksa was “born for the grace of the nation”. Not many local Tamil people seem to visit. One man tells us he finds the monument insulting. But others flock to admire it, including a busload of Sri Lankan tourists, among them a Buddhist monk from the central highlands. As in the countryside, everyone in town is newly returned. Almost all have lived through terrible war experiences. Yet Kilinochchi is now achieving a kind of normality, though under the ever watchful eyes of soldiers on every corner. At the main bus stand, people buy transport and lottery tickets. Children eat ice-cream. There is even a souvenir shop selling T-shirts saying “Reawakening Kilinochchi”, situated by a huge water tower dynamited and toppled by the Tigers. Back in her village, Nagamma makes tea. She, like other destitute returning refugees, struggles to afford the basics of life. I ask her if she wants punishment for those responsible for her brother’s death. “We don’t need another war or fight,” she says. “We’ve lost a lot because of the war and it mustn’t happen again. Our time is finished now, but at least the remaining children must be happy. “Every day I pray to God for a peaceful country, where every person of every race can live in peace.” | Low | [
0.5,
29.5,
29.5
] |
Biomedical model The biomedical model of medicine has been around since the mid-19th century as the predominant model used by physicians in diagnosing diseases. It has three core elements. According to the biomedical model, health constitutes the freedom from disease, pain, or defect, making the normal human condition "healthy." The model's focus on the physical processes (for example, pathology, biochemistry and physiology of a disease) does not take into account the role of social factors or individual subjectivity. Unlike the biopsychosocial model, the biomedical model does not consider the diagnosis, which affects the treatment of the patient, to be the result of a negotiation between doctor and patient. The biomedical model of health focuses on purely biological factors and excludes psychological, environmental, and social influences. It is considered to be the leading modern way for health care professionals to diagnose and treat a condition in most Western countries. See also Biopsychosocial model Medical model Medical model of disability Trauma model of mental disorders References Category:Medical models Category:Psychiatric models | High | [
0.6685082872928171,
30.25,
15
] |
Macau, the Chinese territory known for casino gambling, outperformed the rest of the world’s major cities economically last year, including all of those in the United States. Cities in the developing world, especially China, dominated the top of the annual economic rankings of 300 cities worldwide by the Brookings Institution and JP Morgan Chase. The study ranks cities by growth in employment and in economic output per person. US and British cities showed improvement, although in general they lagged behind China. Only hree US cities – Austin and Houston, Texas, and Raleigh, North Carolina – cracked the top 50. In the UK, London came in No 26, Manchester No 60. Cities in wealthy countries tended to perform poorly. Though most of the cities surveyed around the world have recovered from the Great Recession, 65% of European and 57% of North American cities have not, according to the study. The United States and Britain have only just begun to pick up economic momentum 5½ years after the recession ended. “In developed economies like North America and Western Europe, cities like London and Houston are flying high, while others like Rotterdam and Montreal are struggling,” Parilla said. Macau has enjoyed a tourism boom, with gamblers coming to bet at more than 30 casinos, including the Venetian Macau, the world’s largest. Twenty-seven of the 50 top-performing cities were Chinese. Increasingly, strong growth occurred in the traditionally underdeveloped cities of China’s interior, rather than its booming coastal cities. Land-locked Changsha, for instance, enjoyed economic growth per person of 8.6% last year and wound up No 15 in the overall rankings. The coastal manufacturing powerhouse of Dongguan, next door to Hong Kong, registered per-capita economic growth of just 5.2% (unimpressive by Chinese standards) and finished No 70. Companies have begun to move inland as the cost of labor and land rises on the Chinese coast. And the Chinese government has invested heavily on infrastructure in the interior. Bangkok, Thailand, came in last, its economy wrecked by political strife. Cities in wealthy, developed countries tended to lag behind. Big differences Joseph Parilla, a Brookings research analyst who co-wrote the report, said he was surprised by the “incredible differentiation within what are considered monolithic economic blocs”. Latin American cities, for instance, mostly sputtered. But Medellin, Colombia, and Lima, Peru, both broke into the top 50. Commodities boom The 18 cities worldwide that specialized in producing commodities such as oil registered the highest rates of growth in economic output per person (2.6%) and employment (1.9%). “The recent rise in oil and gas production in North America partly explains the success of metropolitan areas like Calgary, Denver, Houston, and Tulsa, which are epicenters of the region’s shale revolution,” the report said. Next year’s rankings may be different. Oil prices have plunged to less than $48 a barrel from $107 a barrel last June, jeopardizing the prospects of cities that had been riding the energy boom. Turkish delight Four Turkish cities made the top 10: Izmir, Istanbul, Bursa and Ankara. Turkish cities boomed last year despite political unrest. “If you look at world headlines, Turkey is not in the news for its economic success, but it probably should be,” Brookings’ Parilla says. “It has pretty solid macroeconomic policies.” Turkey benefits from its location at the boundary between Europe and Asia and from heavy investment in roads and other infrastructure projects, which creates jobs over the short term and is likely to make the economy more efficient over the long term. A list of the top notable cities on the list follows. They are listed by rank in the study; country; city; percent real GDP growth per capita; and employment growth in 2014. 1 Macau, Macau 8%; 4.2% 2 Turkey, Izmir 2% 6.6% 3 Turkey, Istanbul 2%, 6.5% 4 Turkey, Bursa 1.8% 6.4% 5 UAE, Dubai 4.5% 4.7% 6 China, Kunming 8.1% 2.9% 7 China, Hangzhou 7% 3.3% 8 China, Xiamen 8.6% 2.6% 9 Turkey,Ankara 1.1% 5.7% 12 Hungary Budapest 2.4% 4.7% 18 India Delhi 4.4% 3.3% 19 Malaysia Kuala Lumpur 4.1% 3.4% 25 Saudi Arabia Riyadh 1.9% 3.9% 26 United Kingdom London 2.5% 3.6% 38 USA Austin 1.9% 3.6% 39 USA Houston 1.6% 3.7% 41 USA Raleigh 0.8% 4% 48 Peru Lima 2.9% 2% 49 USA Fresno -0.9% 4.5% 60 United Kingdom Manchester 2.6% 2.0% 63 USA Dallas 0.8% 3.4% 65 USA Baton Rouge 1.5% 3% 66 USA Oklahoma City 1.8% 2.9% 67 China Beijing 4.7% 1.6% 68 USA Las Vegas 1.3% 3% 69 USA Grand Rapids 0.60% 3.30% 71 United Kingdom Edinburgh 1.5% 2.9% 72 USA San Jose 0.20% 3.40% 73 USA Orlando 0.10% 3.50% 74 Canada Vancouver 3.7% 1.9% 75 Australia Perth 3.4% 2.1% 78 Egypt Alexandria 0.9% 3.% 79 United Kingdom Bristol 2.1% 2.5% 80 Canada Quebec City 2.1% 2.4% 81 United Kingdom Liverpool 2.4% 2.3% 82 Egypt Cairo 0.7% 3% 41 83 USA Jacksonville 0.6% 3% 194 84 United Kingdom Nottingham-Derby 2.60% 2.2% 86 USA Nashville 0.7% 2.9% 91 United Kingdom Portsmouth-Southampton 2.1% 2.2% 92 China Shanghai 5.2% 0.9% 95 USA Denver 0.8% 2.7% 96 United Kingdom Birmingham 2.2% 2.1% 97 Kuwait Kuwait 0.6% 2.7% 99 USA Knoxville 1.3% 2.4% 100 USA Atlanta 1.5% 2.3% | Mid | [
0.537914691943127,
28.375,
24.375
] |
/* * Copyright (c) 2005, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package com.sun.xml.internal.stream.events ; import javax.xml.stream.events.Comment; import javax.xml.stream.events.XMLEvent; /** * This class contains information about Comment event. * * @author Neeraj Bajaj, Sun Microsystems. */ public class CommentEvent extends DummyEvent implements Comment { /* String data for this event */ private String fText ; public CommentEvent() { init(); } public CommentEvent(String text) { init(); fText = text; } protected void init() { setEventType(XMLEvent.COMMENT); } /** * @return String String representation of this event */ public String toString() { return "<!--" + getText() + "-->"; } /** Return the string data of the comment, returns empty string if it * does not exist * @return String */ public String getText() { return fText ; } protected void writeAsEncodedUnicodeEx(java.io.Writer writer) throws java.io.IOException { writer.write("<!--" + getText() + "-->"); } } | Mid | [
0.5703125,
36.5,
27.5
] |
The present disclosure relates generally to integrated circuits, and more specifically, to protecting electronic components and data stored in integrated circuits. Protecting integrated circuit technology and data is a substantial concern in the commercial and industrial sectors. Integrated circuits and related devices are routinely acquired by motivated commercial and/or governmental competitors that seek to reverse engineer or to otherwise learn the functionality of the technology. The acquired information can be used by the competitors to provide a technological leap in their own devices, and/or to exploit a perceived weakness in the examined equipment. Thus, sophisticated governmental and commercial entities possess ample strategic and/or economic motivations to reverse engineer integrated circuit components. Reverse engineering of an integrated circuit may be performed while the integrated circuit is in a powered-on state in order to observe its functionality. Designers of the integrated circuit may thus implement safeguard measures within the integrated circuit to take advantage of the powered-on state, such as a self-destruct or obstructing mechanism that is triggered by the detection of tampering. However, such safeguard measures may not distinguish between sensitive components and non-sensitive components of the integrated circuit, such that a detected tampering event may disable or otherwise affect operation of the non-sensitive components. | Mid | [
0.60880195599022,
31.125,
20
] |
Whether they’re speedy swimmers, agile gymnasts, or nimble fencers, Olympic athletes dedicate their lives to a single purpose: training to be the best. But even their remarkable achievements pale in comparison with the natural athletes of the animal kingdom—especially birds. With the Summer Olympics in full swing, we thought it'd be fun to see who would take gold if there were an Avian Olympics. Event – Aquatic Diving: Thick-billed Murre The Thick-billed Murre, pictured above, doesn't look particularly graceful as it crash-lands into the waves, but underwater it is a master diver. This penguin look-alike can plummet to depths of nearly 700 feet at a speed of 6.5 feet per second—and stay underwater without breathing for four minutes. What's more, it performs this feat without a diving board, propelling itself from rest at the water’s surface with its wings alone. And it has endurance to boot: The Thick-billed Murre can dive up to 20 times in a row with only brief rests in between. Event – Aerial Diving: Peregrine Falcon It’s no contest: The Peregrine Falcon dominates diving through the air. These raptors are fierce fliers, expert hunters, and, above all, the best high-speed divers. When chasing prey, the Peregrine Falcon plunges at speeds up to 200 miles per hour to snatch up its dinner. These death dives are called “stoops” and are undeniably gold-medal-worthy. Event – Aquatic Sprint: Gentoo Penguin The Gentoo Penguin makes Michael Phelps look like an underdressed party guest. This tuxedo-wearing bird may waddle about awkwardly on land, but when it hits the water it is unstoppable. These smooth aquatic masterminds can dart through the water at speeds up to 30 miles per hour—way too fast for even Phelps to keep up. At top speed, the winner of 22 Olympic gold medals (as of publication) only swims about 6 miles per hour. Event — Land Sprint: Common Ostrich Usain Bolt, the famed fastest man in the world and six-time gold medalist (so far), can run 100 meters in under 10 seconds, reaching a top speed of 27.8 miles per hour. But he’s got nothing on the Common Ostrich, which can sprint up to 43 miles per hour, using its large fan-like wings to propel and steer itself across African savannas. Common Ostriches might not be able to fly like some of their speedy avian cousins, but their powerful legs allow them to cover 10 to 16 feet in just one stride. Event – Aerial Sprint: Grey-headed Albatross One Grey-headed Albatross in particular holds the avian world-record for the fastest flyer. This black-winged seabird clocked in at 79 miles per hour, a speed it maintained for more than eight hours straight. Talk about endurance! However, because its record-breaking sprint occurred during a storm, this albatross got a lift from tailwinds, says Kenn Kaufman, Audubon’s field editor—the equivalent of avian steroids. Due to its use of performance-enhancing winds, the Grey-headed Albatross's lock on gold is debatable. Other Aerial Sprint contenders include the White-throated Needletail and the Common Swift, which have reached speeds of 105 and 70 miles per hour, respectively. The White-throated Needletail’s record-breaking speed is disputed, but Kaufman is a believer. “I’ve seen them go rocketing past hilltops in China, and it’s easy to believe they’re going 100 miles per hour,” he says. Event – Hunting: Crowned Eagle Who needs a rifle when you have deadly talons that can crush bone? When it comes to hunting, few birds (or humans) compare to the Crowned Eagle, also known as “the leopard of the air.” While not the largest eagles in Africa, these formidable creatures are extremely powerful and can kill animals four-times their size, such as monkeys, mongooses, and even small antelopes. Their thick legs and a long back toe come in handy when breaking their victims’ spines. Event – Stream Slalom: American Dipper True to its name, the American Dipper dips and dives through swiftly flowing rapids. While skirting across coastal or desert streams, this six-inch songbird plunges its tiny head into the water in pursuit of aquatic insects, worms, or small fish. But its real talent reveals itself when the bird vanishes beneath the rushing water for up to 15 seconds at a time, navigating the turbulent waters better than any kayak or canoe, before reappearing downstream in a feat of Olympic determination. Such activities can get a bit cold in the winter, so these songbirds have a thick coat of feathers and an extra-slow metabolism to stay warm. Event – Long-Distance Flying: Arctic Tern Racers from Kenya and Ethiopia have dominated long-distance running at the Summer Olympics since the late 1980s. However, one little seabird that splits its time between the United Kingdom, South Africa, the Indian Ocean, and Antarctica is the ultimate flying marathoner. Over the past year, an Arctic Tern covered almost 60,000 miles during its round-trip migration, breaking the previous record by several thousand miles. The 26.2-mile Olympic marathon doesn’t seem so impressive now, does it? But let’s not forget about the Bar-tailed Godwit, which takes the silver medal in this event. “It doesn’t fly as far as the Arctic Tern,” Kaufman says. “But in fall it can make a nonstop eight-day flight from Alaska to New Zealand, which isn’t bad.” Event – Synchronized Flying: European Starling A leg-kick here, a flick of the wrist there, and jazz fingers throughout: Synchronized swimming is all about dazzle and coordination. Taking this flashy sport to the sky, European Starlings are fierce competitors when it comes to veering, rolling, and gliding as one. These stocky passerine birds team up by the thousands, flying just inches apart and covering the sky in an undulating black mass. While they certainly put on an Olympic-worthy show, there are practical reasons for this behavior: Starlings stick so closely together to increase their chances of finding food and detecting predators. Event – High Jump: Emu Javier Sotomayor may hold the current world record in the high jump at eight feet, but the Emu is not far behind. The second tallest bird in the world, the Emu is a natural-born runner and can reach speeds up to 30 miles per hour. Where the Emu really shines is jumping: It can spring seven feet into the air to grab leaves from low-hanging trees. Its secret is its powerful legs; Emus are the only birds with calf muscles. Event – Beak Fencing: Rufous Hummingbird Even though our final contenders appear delicate and cute, Rufous Hummingbirds can be quite aggressive when nectar is involved. They use their slender bills like Olympic fencers, jabbing and stabbing each other in quick movements. Compared to most hummingbirds, they are especially hostile and will eagerly attack heavyweight hummingbirds that dare approach their flowers and feeders. Though they don't always win, their grit is admirabe. Another contender in this category is the Galapagos Albatross, which performs an elaborate courtship ritual that looks like a bizarre sword-fighting competition. The love-struck duo will bob their heads, bow their bills, and rapidly whack and clack their beaks together. Unfortunately for the albatross, fencing requires more than just parrying, so it must compete elsewhere if it wants to take home any hardware. | Mid | [
0.610478359908883,
33.5,
21.375
] |
Discovery of a Cyclic Boronic Acid β-Lactamase Inhibitor (RPX7009) with Utility vs Class A Serine Carbapenemases. The increasing dissemination of carbapenemases in Gram-negative bacteria has threatened the clinical usefulness of the β-lactam class of antimicrobials. A program was initiated to discover a new series of serine β-lactamase inhibitors containing a boronic acid pharmacophore, with the goal of finding a potent inhibitor of serine carbapenemase enzymes that are currently compromising the utility of the carbapenem class of antibacterials. Potential lead structures were screened in silico by modeling into the active sites of key serine β-lactamases. Promising candidate molecules were synthesized and evaluated in biochemical and whole-cell assays. Inhibitors were identified with potent inhibition of serine carbapenemases, particularly the Klebsiella pneumoniae carbapenemase (KPC), with no inhibition of mammalian serine proteases. Studies in vitro and in vivo show that RPX7009 (9f) is a broad-spectrum inhibitor, notably restoring the activity of carbapenems against KPC-producing strains. Combined with a carbapenem, 9f is a promising product for the treatment of multidrug resistant Gram-negative bacteria. | High | [
0.7112970711297071,
31.875,
12.9375
] |
Venezuela sits atop the world's largest proved reserves of petroleum, even bigger than Saudi Arabia's. In 2007, Venezuela's Bolivarian socialist government under President Hugo Chavez seized without compensation the assets of several private American oil production and service companies then operating in that country. In those heady days, global oil prices were ascending and would eventually peak in July 2008 above $132 per barrel. This oil price boom boosted Venezuela's GDP per capita to nearly $15,000 annually, thus bolstering Chavez's political popularity. But peak oil fears abated as they always do when demand draws forth more supply, causing prices to fall. In the succeeding years, socialist efficiency has had its totally predictable effects on the Bolivarian Republic's oil industry—it's cratered. When Hugo Chavez came to power in 1999, Venezuela was producing more than 3 million barrels per day of crude. With the help of billions in loans from China, Chavez was able to sustain production at around 2.5 million barrels per day. In the past year, production has fallen below 1 million barrels per day, the lowest rate of production in 75 years. As a result, per capita GDP has fallen by nearly half in the past six years. Now, the Chinese government is apparently becoming reluctant to throw good money after bad. As a consequence, Chavez's hapless successor, President Nicolas Maduro, is now reportedly proposing to sell a majority stake in, and give control of the country's state-owned oil company, Petroleos de Venezuela SA, to private international oil companies. This offer may be less than tempting to Big Oil since the Bolivarian Republic still owes billions to the oil companies whose property it seized 10 years ago. | Mid | [
0.602739726027397,
33,
21.75
] |
Gospel of the Hebrews The Gospel of the Hebrews (), or Gospel according to the Hebrews, was a syncretic Jewish–Christian gospel. The text of the gospel is lost with only fragments of it surviving as brief quotations by the early Church Fathers and in apocryphal writings. The fragments contain traditions of Jesus' pre-existence, incarnation, baptism, and probable temptation, along with some of his sayings. Distinctive features include a Christology characterized by the belief that the Holy Spirit is Jesus' Divine Mother and a first resurrection appearance to James, the brother of Jesus, showing a high regard for James as the leader of the Jewish Christian church in Jerusalem. It was probably composed in Greek in the first decades of the 2nd century, and is believed to have been used by Greek-speaking Jewish Christians in Egypt during that century. It is the only Jewish–Christian gospel which the Church Fathers referred to by name, believing there was only one Hebrew Gospel, perhaps in different versions. Passages from the gospel were quoted or summarized by three Alexandrian Fathers – Clement, Origen and Didymus the Blind; it was also quoted by Jerome, either directly or through the commentaries of Origen. The gospel was used as a supplement to the canonical gospels to provide source material for their commentaries based on scripture. Eusebius included it in his list of disputed writings known as the Antilegomena, noting that it was used by "Hebrews" within the Church; it fell out of use when the New Testament canon was codified at the end of the 4th century. The original Aramaic/Hebrew gospel used by the Jewish sect of Ebionites did not contain the genealogical records now appended to the Greek gospels, which omission is explained by Epiphanius as being because "they insist that Jesus was really man." Modern scholars classify the Gospel of the Hebrews as one of the three Jewish–Christian gospels, along with the Gospel of the Nazarenes and the Gospel of the Ebionites. Others suggest that these three titles may have been referring to one and the same book. All are known today only from fragments preserved in quotations by the early Church Fathers. The relationship between the Jewish–Christian gospels and a hypothetical original Hebrew Gospel remains a speculation. Origin and characteristics The Gospel of the Hebrews is the only Jewish–Christian gospel which the Church Fathers refer to by name. The language of composition is thought to be Greek. The provenance has been associated with Egypt; it probably began circulating in Alexandria, Egypt in the first decades of the 2nd century and was used by Greek-speaking Jewish–Christian communities there. The communities to which they belonged were traditional, conservative Christians who followed the teaching of the primitive Christian church in Jerusalem, integrating their understanding of Jesus with strict observance of Jewish customs and law, which they regarded as essential to salvation. Despite this, the gospel displays no connection with other Jewish–Christian literature, nor does it appear to be based on the Greek rendition of the Gospel of Matthew or the other canonical gospels of what is now orthodox Christianity. Instead, it seems to be taken from alternative oral forms of the same underlying traditions. Some of the fragments suggest a syncretic gnostic influence, while others support close ties to traditional Jewish Wisdom literature. Content The Gospel of the Hebrews is preserved in fragments quoted or summarized by various early Church Fathers. The full extent of the original gospel is unknown; according to a list of canonical and apocryphal works drawn up in the 9th century known as the Stichometry of Nicephorus, the gospel was 2200 lines, just 300 lines shorter than Matthew. Based on the surviving fragments, the overall structure of the gospel appears to have been similar to the canonical ones. It consisted of a narrative of the life of Jesus which included his baptism, temptation, transfiguration, last supper, crucifixion, and resurrection. The gospel also contained sayings of Jesus. The events in the life of Jesus have been interpreted in a way that reflects Jewish ideas present in a Hellenistic cultural environment. There is wide agreement about seven quotations cited by Philipp Vielhauer in the critical 3rd German edition of Wilhelm Schneemelcher's New Testament Apocrypha, translated by George Ogg. The translations below follow Vielhauer's order: 1. When Christ wished to come upon the earth to men, the good Father summoned a mighty power in heaven, which was called Michael, and entrusted Christ to the care thereof. And the power came into the world and was called Mary, and Christ was in her womb seven months. (Cyril of Jerusalem, Discourse on Mary Theotokos 12) Fragment 1 identifies Jesus as the son of the Holy Spirit; this idea is found also in the Egyptian Coptic Epistle of James, another indication of the Egyptian origin of the gospel. 2. And it came to pass when the Lord was come up out of the water, the whole fount of the Holy Spirit descended upon him and rested on him and said to him: My Son, in all the prophets was I waiting for thee that thou shouldest come and I might rest in thee. For thou art my rest; thou art my first-begotten Son that reignest for ever. (Jerome, Commentary on Isaiah 4) Fragment 2 uses the language of Jewish Wisdom literature, but applies it to the Holy Spirit: the Spirit has waited in vain through all the prophets for the Son. The "rest" that the Holy Spirit finds in the Son belongs to the Christian gnostic idea of the pre-existent Redeemer who finally becomes incarnate in Jesus. 3. Even so did my mother, the Holy Spirit, take me by one of my hairs and carry me away on to the great mountain Tabor. (Origen, Commentary on John 2.12.87) Fragments 2 and 3, giving accounts of Jesus' baptism and temptation or transfiguration, spring from the widespread Greco-Roman myth of the descent of divine Wisdom; this underlies the parallel passages in the gospels of Matthew (11.25–30), Luke (7.18–35 and 11.49–51) and John (1.1–18), as well as the Gospel of Thomas. The differences between fragment 3 and the orthodox canonical gospels are considerable: their third-person narrative has become an account by Jesus himself, Satan is replaced by the Holy Spirit, and the Holy Spirit is identified as Jesus' mother. 4a. He that marvels shall reign, and he that has reigned shall rest. (Clement, Stromateis 2.9.45.5) 4b. He that seeks will not rest till he finds; and he that has found shall marvel; and he that has marveled shall reign; and he that has reigned shall rest. (Clement, Stromateis 5.14.96.3) Fragment 4 is a "chain-saying", seek–find–marvel–reign–rest, describing the steps towards salvation, where "rest" equals the state of salvation. The saying is similar to themes found in Jewish Wisdom literature, and the similarity to a saying in the Gospel of Thomas suggests that the text may have been influenced by gnostic Wisdom teaching. 5. And never be ye joyful, save when ye behold your brother with love. (Jerome, Commentary on Ephesians 3) 6. In the Gospel according to the Hebrews ...there is counted among the most grievous offenses: He that has grieved the spirit of his brother. (Jerome, Commentary on Ezekiel 6) Fragments 5 (on Ephesians 5.4) and 6 (on Ezekiel 18.7) are ethical sayings of Jesus, suggesting that such teachings formed a significant part of the gospel. 7. The Gospel according to the Hebrews ...records after the resurrection of the Savior: And when the Lord had given the linen cloth to the servant of the priest, he went to James and appeared to him. For James had sworn that he would not eat bread from that hour in which he had drunk the cup of the Lord until he should see him risen from among them that sleep. And shortly thereafter the Lord said: Bring a table and bread! And immediately it is added: He took the bread, blessed it and brake it and gave it to James the Just and said to him: My brother, eat thy bread, for the Son of man is risen from among them that sleep. (Jerome, De viris illustribus 2) Fragment 7 emphasizes the importance of James, the brother of Jesus and head of the Jewish–Christian movement in Jerusalem after Jesus' death, thereby testifying to the Jewish character of the community of the gospel. In addition to direct quotations, other gospel stories were summarized or cited by the Church Fathers. The translations below are from Vielhauer & Strecker (1991), except "b2" which is from Klauck (2003): a. (Scripture) seems to call Matthew "Levi" in the Gospel of Luke. Yet it is not a question of one and the same person. Rather Matthias, who was installed (as apostle) in place of Judas, and Levi are the same person with a double name. This is clear from the Gospel of the Hebrews. (Didymus the Blind, Commentary on the Psalms 184.9–10) The summary of a gospel passage identifies Mattias, rather than Matthew, as the name of the tax-collector who was called to follow Jesus. b1. And he (Papias) has adduced another story of a woman who was accused of many sins before the Lord, which is contained in the Gospel according to the Hebrews. (Eusebius, Historia ecclesiastica 3.39.17) The citation by Eusebius of a story he found in the writings of Papias is believed to refer to an alternate version of the account in John's gospel of Jesus and the woman taken in adultery. b2. It is related in some gospels that a woman was condemned by the Jews because of a sin and was taken to the customary place of stoning, in order that she might be stoned. We are told that when the Savior caught sight of her and saw that they were ready to stone her, he said to those who wanted to throw stones at her: Let the one who has not sinned, lift a stone and throw it. If someone is certain that he has not sinned, let him take a stone and hit her. And no one dared to do so. When they examined themselves and they recognized that they too bore responsibility for certain actions, they did not dare to stone her. (Didymus the Blind, Commentary on Ecclesiastes 4.223.6–13) Although Didymus does not name his source, he found this independent tradition of the story of the sinful woman in a non-canonical gospel in Alexandria which may have been the Gospel of the Hebrews. Christology The theology of the gospel is strongly influenced by Jewish–Christian wisdom teaching. The Holy Spirit is represented as a manifestation of Divine Wisdom who is called "Mother". The feminine aspect of the Spirit is an indication of Semitic influence on the language of the gospel. The Spirit takes Jesus to Mount Tabor by a single hair, echoing Old Testament themes in the stories of Ezekiel (Ezk. 8.3) and Habbakuk (Dan. 14.36 LXX). The gospel emphasizes the fulfillment of the prophecy of Isaiah 11.2 in Jesus' baptism, but also adopts elements of Jewish Wisdom theology. The Spirit has been gathered in one place at the moment of Jesus' baptism, so that he has become the only Son of the Spirit in which he has found eternal "rest" and reigns forever. The "seek–find" and "rule–rest" language also comes from Jewish Wisdom tradition as stages on the way to salvation during which the believer is encouraged to emulate divine Wisdom. The "rest" that the Holy Spirit waits for and finally finds in the Son is also found in gnostic speculations. The wisdom chain-saying which describes the progression of seeking, marveling, and finding salvation, is similar to the Hermetic conception of salvation found in the Alexandrian Corpus Hermetica. "Rest" is not only to be understood as the ultimate goal of the seeker after truth, which leads to salvation; it is also descriptive of a unity with the wisdom which lies at the heart of the Godhead. The "resting" of the Holy Spirit at the moment of Jesus' Baptism may also be understood in this timeless sense, as the union and rest of the pre-existent Son with his Father, in keeping with the gnostic conception of "rest" as the highest gift of salvation. Reception Eusebius listed the Gospel of the Hebrews in his Antilegomena as one of the disputed writings of the early Church. Despite this, the Church Fathers occasionally used it, with reservations, as a source to support their exegetical arguments. Eusebius reports that the 2nd century Church Father Hegesippus used the gospel as a source for writing his Hypomneumata ("Memoranda") in Rome (c. 175–180). The Alexandrian Fathers – Clement, Origen, and Didymus the Blind – relied directly on the gospel to provide prooftexts as a supplement to the canonical gospels. Clement quoted from the gospel as part of a discourse on divine Wisdom. Origen used it to compare differing views of the relationship between the Word and the Holy Spirit. Jerome claimed to have used the gospel as a prooftext, although he may have relied in part on excerpts from the commentaries of Origen. He quoted from it as a proof from prophecy based on Isaiah 11.2 to explain how Jesus was the fulfillment of messianic expectations. The Gospel of the Hebrews was excluded from the canon by the Catholic Church with the closing of the New Testament canon at the end of the 4th century, and was no longer cited as a source in Church literature. Subsequent to the closing of the canon, the gospel is mentioned in a homily "On the Virgin Mary" attributed to Cyril of Jerusalem in a collection of apocryphal stories believed to have been written in Coptic in the first half of the 6th century. The author (known to scholars as Pseudo-Cyril) refers to the Gospel of the Hebrews in a polemical dialogue between a monk and Cyril over the nature of Mary, whom the monk contends was a divine Power sent from heaven. Cyril condemns the monk's teaching as a heresy, which the author attributes to Carpocrates, Satornilus, and Ebionites. Not all later mentions of the gospel were polemical; Bede (c. 673–735), after listing some apocryphal gospels rejected by the Church, includes the Gospel of the Hebrews among the "ecclesiastical histories" and refers to its usage by Jerome. Relationship to other texts The early Church Fathers believed there was only one Jewish–Christian gospel, perhaps in different versions; however, scholars have long recognized the possibility there were at least two or three. Jerome's references to a Gospel of the Hebrews, or variants of that name, are particularly problematic because it is unclear which gospel he is referring to as the source of his quotations. Hegesippus, Eusebius, and Jerome all used an Aramaic gospel, which Jerome referred to as the gospel used by a Jewish Christian sect known as the Nazarenes. Gospel of the Nazarenes is the name adopted by scholars to describe the fragments of quotations believed to originate from an Aramaic gospel that was based on traditions similar to the Gospel of Matthew. A third gospel was known only to Epiphanius of Salamis, which he attributed to a second Jewish Christian group known as the Ebionites. Scholars have conventionally referred to seven fragments of a Greek gospel harmony preserved in quotations by Epiphanius as the Gospel of the Ebionites. The existence of three independent Jewish–Christian gospels with distinct characteristics has been regarded as an established consensus. However, that conclusion has recently been challenged with respect to the composition of the gospel known to the Nazarenes and its relationship to the Gospel of the Hebrews. The relationship between the Gospel of the Hebrews and the other Jewish–Christian gospels, as well as a hypothetical original Hebrew Gospel, is uncertain and has been an ongoing subject of scholarly investigation. See also Gospel of the Nazarenes Gospel of the Ebionites List of Gospels Jewish–Christian gospels Notes Citations Bibliography () (6th German edition, translated by George Ogg) (3rd German edition, translated by George Ogg) (6th German edition, translated by George Ogg) Further reading External links Early Christian Writings – Gospel of the Hebrews Hebrews Category:Lost apocrypha Category:2nd-century Christian texts | Mid | [
0.627551020408163,
30.75,
18.25
] |
Contents People At 206.1 persons per km2., Burundi has the second-largest population density in Sub-Saharan Africa. Most people live on farms near areas of fertile volcanic soil. The population is made up of three major ethnic groups—Hutu, Tutsi, and Twa. Kirundi is the most widely spoken language; French and Kiswahili also are widely spoken. Intermarriage takes place frequently between the Hutus and Tutsis. Although Hutus encompass the majority of the population, historically Tutsis have been politically and economically dominant. Government and Political Conditions In November 1995, the presidents of Burundi, Rwanda, Uganda, and Zaire (now Democratic Republic of the Congo) announced a regional initiative for a negotiated peace in Burundi facilitated by former Tanzanian President Julius Nyerere. In July 1996, former Burundian President Buyoya returned to power in a bloodless coup. He declared himself president of a transitional republic, even as he suspended the National Assembly, banned opposition groups, and imposed a nationwide curfew. Widespread condemnation of the coup ensued, and regional countries imposed economic sanctions pending a return to a constitutional government. Buyoya agreed in 1996 to liberalize political parties. Nonetheless, fighting between the army and Hutu militias continued. In June 1998, Buyoya promulgated a transitional constitution and announced a partnership between the government and the opposition-led National Assembly. After Facilitator Julius Nyerere's death in October 1999, the regional leaders appointed Nelson Mandela as Facilitator of the Arusha peace process. Under Mandela the faltering peace process was revived, leading to the signing of the Arusha Accords in August 2000 by representatives of the principal Hutu (G-7) and Tutsi (G-10) political parties, the government, and the National Assembly. However, the FDD and FNL armed factions of the CNDD and Palipehutu G-7 parties refused to accept the Arusha Accords, and the armed rebellion continued. In November 2001, a 3-year transitional government was established under the leadership of Pierre Buyoya (representing the G-10) as transitional president and Domitien Ndayizeye (representing the G-7) as transitional vice president for an initial period of 18 months. In May 2003, Mr. Ndayizeye assumed the presidency for 18 months with Alphonse Marie Kadege as vice president. In October and November 2003 the Burundian Government and the former rebel group the CNDD-FDD signed cease-fire and power-sharing agreements, and in March 2004 members of the CNDD-FDD took offices in the government and parliament. The World Bank and other bilateral donors have provided financing for Burundi’s disarmament, demobilization, and reintegration program for former rebel combatants. National and regional mediation efforts failed to reach a compromise on post-transition power-sharing arrangements between the predominantly Hutu and Tutsi political parties, and in September 2004 over two-thirds of the parliament—despite a boycott by the Tutsi parties—approved a post-transition constitution. The Arusha Peace Agreement called for local and national elections to be held before the conclusion of the transitional period on October 31, 2004. On October 20, 2004, however, a joint session of the National Assembly and Senate adopted a previously approved draft constitution as an interim constitution that provides for an extension of transitional institutions until elections are held. On February 28, 2005, Burundians overwhelmingly approved a post-transitional constitution in a popular referendum, setting the stage for local and national elections. In April 2005, Burundi's transitional government was again extended and an electoral calendar was established at a regional summit held in Uganda. In accordance with the new electoral calendar, the Burundian people voted in Commune Council direct elections on June 3, 2005 and National Assembly direct elections on July 4, 2005. An electoral college of commune and provincial councils indirectly elected Senate members on July 29, 2005. A joint session of the parliament elected Pierre Nkurunziza as President of Burundi on August 19, 2005 in a vote of 151 to 9 with one abstention, establishing the post-transition government. Finally, the Burundian people established Colline (hill) councils through direct elections on September 23, 2005. Principal Government Officials President—Pierre Nkurunziza First Vice President—Martin Nduwimana Second Vice President—Gabriel Ntiserzerana Speaker of the National Assembly—Pie Ntavyohanyuma President of the Senate—Isidore Rufyikiri Minister of Defense—Germain Niyoyankana Minister of External Relations and Cooperation—Antoinette Batumubwira Minister of Interior and Public Security—Evariste Ndayishimiye Foreign Relations Burundi's relations with its neighbors have often been affected by security concerns. Hundreds of thousands of Burundian refugees have at various times crossed into Rwanda, Tanzania, and the Democratic Republic of the Congo. Hundreds of thousands of Burundians fled to neighboring countries during the civil war. Most of them, more than 750,000 since 1993, are in Tanzania. Burundi maintains close relations with all neighbors in the Great Lakes region, including Rwanda, Uganda, and the Democratic Republic of the Congo. Burundi is a member of various international and regional organizations, including the United Nations, the World Trade Organization, the African Union, the African Development Bank, COMESA, the free-tariff zone of eastern and southern Africa, and the East Africa Community (EAC). Economy The mainstay of the Burundian economy is agriculture, accounting for 44.9% of GDP in 2006. Agriculture supports more than 90% of the labor force, the majority of whom are subsistence farmers. Although Burundi is potentially self-sufficient in food production, the civil war, overpopulation, and soil erosion have contributed to the contraction of the subsistence economy by 30% in recent years. Large numbers of internally displaced persons have been unable to produce their own food and are dependent on international humanitarian assistance. Burundi is a net food importer, with food accounting for 13% of imports in 2003. The main cash crop is coffee, which accounted for some 50% of exports in 2003. This dependence on coffee has increased Burundi's vulnerability to fluctuations in seasonal yields and international coffee prices. Coffee processing is the largest state-owned enterprise in terms of income. Although the government has tried to attract private investment to this sector, plans for the privatization of this sector have stalled. Efforts to privatize other publicly held enterprises have likewise stalled. Other principal exports include tea, sugar, and raw cotton. Coffee production, after a severe drop in 2003, returned to normal levels in 2004. Revenues from coffee production and exports are likewise estimated to return to pre-2003 levels. Little industry exists except the processing of agricultural exports. Although potential wealth in petroleum, nickel, copper, and other natural resources is being explored, the uncertain security situation has prevented meaningful investor interest. Industrial development also is hampered by Burundi's distance from the sea and high transport costs. Lake Tanganyika remains an important trading point. Burundi is heavily dependent on bilateral and multilateral aid, with external debt totaling $1.4 billion in 2004. IMF structural adjustment programs in Burundi were suspended following the outbreak of violence in 1993; the IMF re-engaged Burundi in 2002 and 2003 with post-conflict credits, and in 2004 approved a $104 million Poverty Reduction and Growth Facility loan. The World Bank is preparing a Transition Support Strategy, and has identified key areas for potential growth, including the productivity of traditional crops and the introduction of new exports, light manufactures, industrial mining, and services. Both the IMF and the World Bank are assisting the Burundians to prepare a Poverty Reduction Strategy Paper. Serious economic problems include the state's role in the economy, the question of governmental transparency, and debt reduction. Based on Burundi's successful transition from war to peace and the establishment of a democratically elected government in Burundi in September 2005, the United States Government lifted all sanctions on assistance to Burundi on October 18, 2005. Burundi also became eligible for trade benefits under the African Growth and Opportunity Act in December 2005. History In the 16th century, Burundi was a kingdom characterized by a hierarchical political authority and tributary economic exchange. A king (mwani) headed a princely aristocracy (ganwa) that owned most of the land and required a tribute, or tax, from local farmers and herders. In the mid-18th century, this Tutsi royalty consolidated authority over land, production, and distribution with the development of the ubugabire—a patron-client relationship in which the populace received royal protection in exchange for tribute and land tenure. Although European explorers and missionaries made brief visits to the area as early as 1856, it was not until 1899 that Burundi came under German East African administration. In 1916 Belgian troops occupied the area. In 1923, the League of Nations mandated to Belgium the territory of Ruanda-Urundi, encompassing modern-day Rwanda and Burundi. The Belgians administered the territory through indirect rule, building on the Tutsi-dominated aristocratic hierarchy. Following World War II, Ruanda-Urundi became a United Nations Trust Territory under Belgian administrative authority. After 1948, Belgium permitted the emergence of competing political parties. Two political parties emerged: the Union for National Progress (UPRONA), a multi-ethnic party led by Tutsi Prince Louis Rwagasore and the Christian Democratic Party (PDC) supported by Belgium. In 1961, Prince Rwagasore was assassinated following an UPRONA victory in legislative elections. Full independence was achieved on July 1, 1962. In the context of weak democratic institutions at independence, Tutsi King Mwambutsa IV established a constitutional monarchy comprising equal numbers of Hutus and Tutsis. The 1965 assassination of the Hutu prime minister set in motion a series of destabilizing Hutu revolts and subsequent governmental repression. In 1966, King Mwambutsa was deposed by his son, Prince Ntare IV, who himself was deposed the same year by a military coup lead by Capt. Michel Micombero. Micombero abolished the monarchy and declared a republic, although a de facto military regime emerged. In 1972, an aborted Hutu rebellion triggered the flight of hundreds of thousands of Burundians. Civil unrest continued throughout the late 1960s and early 1970s. In 1976, Col. Jean-Baptiste Bagaza took power in a bloodless coup. Although Bagaza led a Tutsi-dominated military regime, he encouraged land reform, electoral reform, and national reconciliation. In 1981, a new constitution was promulgated. In 1984, Bagaza was elected head of state, as the sole candidate. After his election, Bagaza's human rights record deteriorated as he suppressed religious activities and detained political opposition members. In 1987, Maj. Pierre Buyoya overthrew Colonel Bagaza. He dissolved opposition parties, suspended the 1981 constitution, and instituted his ruling Military Committee for National Salvation (CSMN). During 1988, increasing tensions between the ruling Tutsis and the majority Hutus resulted in violent confrontations between the army, the Hutu opposition, and Tutsi hardliners. During this period, an estimated 150,000 people were killed, with tens of thousands of refugees flowing to neighboring countries. Buyoya formed a commission to investigate the causes of the 1988 unrest and to develop a charter for democratic reform. In 1991, Buyoya approved a constitution that provided for a president, multi-ethnic government, and a parliament. Burundi's first Hutu president, Melchior Ndadaye, of the Hutu-dominated FRODEBU Party, was elected in 1993. He was assassinated by factions of the Tutsi-dominated armed forces in October 1993. The country was then plunged into civil war, which killed tens of thousands of people and displaced hundreds of thousands by the time the FRODEBU government regained control and elected Cyprien Ntaryamira president in January 1994. Nonetheless, the security situation continued to deteriorate. In April 1994, President Ntayamira and Rwandan President Juvenal Habyarimana died in a plane crash. This act marked the beginning of the Rwandan genocide, while in Burundi, the death of Ntaryamira exacerbated the violence and unrest. Sylvestre Ntibantunganya was installed as president for a 4-year term on April 8, but the security situation further deteriorated. The influx of hundreds of thousands of Rwandan refugees and the activities of armed Hutu and Tutsi groups further destabilized the regime. Copyright Details License: This work is in the Public Domain in the United States because it is a work of the United States Federal Government under the terms of Title 17, Chapter 1, Section 105 of the U.S. Code | Mid | [
0.5515789473684211,
32.75,
26.625
] |
Clean Guitars Product Overview Clean guitars is a collection of 31 clean guitar loops of varying moods and tempos. Use them as-is as the starter to your next pop track, or bury them in ambient effects and create an atmosphere. No effects have been added to maximize the flexibility of the loops, just straight through the amp and cab to recording. | Low | [
0.43366336633663305,
27.375,
35.75
] |
Nearby Activities We're sorry, this tour or activity is not available for selected date. Highlights Airport transfer All entrance fees included All necessary equipment included Round-trip airfares All-inclusive tour Overview The Nepalese call Mt.Everest "Sagarmatha" which implies -Higher than the sky'. Mount Everest towers over the Khumbu at more than 29,000' and is the most famous image of test and enterprise on Earth. Everest base camp trek is one of the most renowned trekking destinations anyplace in the World. This precisely made Everest Base Camp, guarantees legitimate acclimatization, permitting you to completely appreciate one of the world's most shocking enterprises and find why this has turn into one of our most compensating adventures. This epic excursion starts and finishes in Kathmandu where opportunities proliferate to investigate UNESCO World Heritage locales and find beautiful Buddhist and Hindu conventions. This mix of outside experience and social investigation is an awesome approach to experience the Himalayan Mountains - the world's most noteworthy mountains. This outing is one of the highlights of any devoted trekker's profession and achievable for most fit walkers. With a large portion of the world's most astounding mountains to appreciate and all the shifted and fascinating individuals to see and meet, there is dependably bounty to see and acclimatize along the way. The trek route takes us Namche Bazaar through wonderful valleys, thick woods and crosswise over icy waterways before achieves the eminent perspective of Kalapatar moving toward to Everest Base Camp. The trek further offers the chances to make a go at touring around Sagarmatha National Park, a world legacy site that is home to an assortment of Himalayan greenness and faunas, to get a more+ critical take a gander at the most astounding Buddhist religious communities on the planet, and obviously, the most satisfying of all of them. Outline Itinerary Day 01: Welcome to Nepal, Tribhuwan International Airport Day 02: Sightseeing tour at Kathmandu City Day 03: Flight to Lukla (2810m) and trekking to Phakding (2640m) 3-4 hours Day 04: Phakding trek to Namche Bazaar (3450m) 5-6 hours Day 05: Rest day in Namche Bazaar (3450m) Day 06: Namche Bazaar trek to Tengboche (3864m) 5 hours Day 07: Tengboche trek to Dingboche (4360m) 4-5 hours Day 08: Rest day in Dingboche (4350m) Day 09: Dingboche trek to Lobuche (4930m) 5 hours Day 10: Lobuche to Gorakshep - Everest Base Camp (5357) and back to Gorakshep 6-7 hours Day 11: Gorakshep trek to Kalapathar (5550m) and back to Phiriche (34240m) 5-6 hours Day 12: Phiriche trek to Namche (3450m) 5-6 hours Day 13: Namche Bazaar trek to Lukla (2900m) 6-7 hours Day 14: Fly back to Kathmandu in the morning Day 15: Leisure Day at Kathmandu. Day 16: Final Departure.Note: The above Itinerary includes Lukla flight ticket, guide and porter, all necessary trekking permits, all service charge, taxes and legal services, all transportation, all meals during the trip. Information Includes: 15 nights accommodation Entrance fees Local taxes National Park fees Meals as per itinerary Professional guide Hotel pickup and drop-off (selected hotels only) Private tour Round-trip flights Transport by private vehicle Excludes: Excess luggage charges (where applicable) Food and drinks, unless specified Gratuities (recommended) Additional Info: Confirmation will be received at time of booking Minimum age is 18 years Vegetarian option is available, please advise at time of booking if required Subject to favorable weather conditions. If canceled due to poor weather, you will be given the option of an alternative date | High | [
0.6585034013605441,
30.25,
15.6875
] |
CABS-NMR--De novo tool for rapid global fold determination from chemical shifts, residual dipolar couplings and sparse methyl-methyl NOEs. Recent development of nuclear magnetic resonance (NMR) techniques provided new types of structural restraints that can be successfully used in fast and low-cost global protein fold determination. Here, we present CABS-NMR, an efficient protein modeling tool, which takes advantage of such structural restraints. The restraints are converted from original NMR data to fit the coarse grained protein representation of the C-Alpha-Beta-Side-group (CABS) algorithm. CABS is a Monte Carlo search algorithm that uses a knowledge-based force field. Its versatile structure enables a variety of protein-modeling protocols, including purely de novo folding, folding guided by restraints derived from template structures or, structure assembly based on experimental data. In particular, CABS-NMR uses the distance and angular restraints set derived from various NMR experiments. This new modeling technique was successfully tested in structure determination of 10 globular proteins of size up to 216 residues, for which sparse NMR data were available. Additional detailed analysis was performed for a S100A1 protein. Namely, we successfully predicted Nuclear Overhauser Effect signals on the basis of low-energy structures obtained from chemical shifts by CABS-NMR. It has been observed that utility of chemical shifts and other types of experimental data (i.e. residual dipolar couplings and methyl-methyl Nuclear Overhauser Effect signals) in the presented modeling pipeline depends mainly on size of a protein and complexity of its topology. In this work, we have provided tools for either post-experiment processing of various kinds of NMR data or fast and low-cost structural analysis in the still challenging field of new fold predictions. | High | [
0.6886446886446881,
35.25,
15.9375
] |
/******************************************************************************* * (c) Copyright 2016 Hewlett-Packard Development Company, L.P. * All rights reserved. This program and the accompanying materials * are made available under the terms of the Apache License v2.0 which accompany this distribution. * * The Apache License is available at * http://www.apache.org/licenses/LICENSE-2.0 * *******************************************************************************/ package io.cloudslang.lang.compiler.modeller; import io.cloudslang.lang.compiler.modeller.result.MetadataModellingResult; import io.cloudslang.lang.compiler.parser.model.ParsedDescriptionData; public interface MetadataModeller { MetadataModellingResult createModel(ParsedDescriptionData parsedDescriptionData); } | Low | [
0.523076923076923,
34,
31
] |
Probiotic yogurts manufactured with increased glucose oxidase levels: postacidification, proteolytic patterns, survival of probiotic microorganisms, production of organic acid and aroma compounds. We investigated the effect of increased glucose oxidase concentration as a technological option to decrease oxidative stress during the processing of probiotic yogurts. Probiotic yogurts were produced with increased concentrations of glucose oxidase (0, 250, 500, 750, or 1,000 mg/kg) and submitted to physicochemical and microbiological analysis at 1, 15, and 30 d of refrigerated storage. Higher concentrations of glucose oxidase (750 and 1,000 mg/kg) and a longer storage time were found to have an influence on the characteristics of the probiotic yogurt, contributing to more extensive postacidification, an increase in the dissolved oxygen level, and higher proteolysis. In addition, increased production of aroma compounds (diacetyl and acetaldehyde) and organic acids (mainly lactic acid) and a decrease in the probiotic bacteria count were reported. The use of glucose oxidase was a feasible option to minimize oxidative stress in probiotic yogurts. However, supplementation with excessive amounts of the enzyme may be ineffective, because insufficient substrate (glucose) is present for its action. Consumer tests should be performed to evaluate changes in the sensory attributes of the probiotic yogurts with increased supplementation of glucose oxidase. In addition, packaging systems with different permeability to oxygen should be evaluated. | Mid | [
0.627802690582959,
35,
20.75
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.