text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Related literature {#sec1} ================== For background to *N*-heterocyclic sulfanilamide derivatives, see: Kuz'mina *et al.* (1962[@bb6]); Jensen & Thorsteinsson (1941[@bb5]); Hunter & Kolloff (1943[@bb4]); Hultquist *et al.* (1951[@bb3]). For a related synthesis, see: Razvodovskaya *et al.* (1990[@bb7]). Experimental {#sec2} ============ {#sec2.1} ### Crystal data {#sec2.1.1} C~17~H~18~N~2~O~4~S~3~*M* *~r~* = 410.51Monoclinic,*a* = 9.3825 (2) Å*b* = 14.4047 (2) Å*c* = 14.2279 (3) Åβ = 102.666 (1)°*V* = 1876.14 (6) Å^3^*Z* = 4Mo *K*α radiationμ = 0.42 mm^−1^*T* = 296 K0.40 × 0.40 × 0.40 mm ### Data collection {#sec2.1.2} Bruker APEXII CCD diffractometerAbsorption correction: multi-scan (*SADABS*; Bruker, 2001[@bb1]) *T* ~min~ = 0.845, *T* ~max~ = 0.84517749 measured reflections4652 independent reflections3756 reflections with *I* \> 2σ(*I*)*R* ~int~ = 0.025 ### Refinement {#sec2.1.3} *R*\[*F* ^2^ \> 2σ(*F* ^2^)\] = 0.037*wR*(*F* ^2^) = 0.107*S* = 1.044652 reflections236 parametersH-atom parameters constrainedΔρ~max~ = 0.29 e Å^−3^Δρ~min~ = −0.29 e Å^−3^ {#d5e499} Data collection: *APEX2* (Bruker, 2010[@bb2]); cell refinement: *SAINT* (Bruker, 2010[@bb2]); data reduction: *SAINT*; program(s) used to solve structure: *SHELXS97* (Sheldrick, 2008[@bb8]); program(s) used to refine structure: *SHELXL97* (Sheldrick, 2008[@bb8]); molecular graphics: *SHELXTL* (Sheldrick, 2008[@bb8]); software used to prepare material for publication: *SHELXL97*. Supplementary Material ====================== Crystal structure: contains datablock(s) I, global. DOI: [10.1107/S1600536811028807/fj2445sup1.cif](http://dx.doi.org/10.1107/S1600536811028807/fj2445sup1.cif) Structure factors: contains datablock(s) I. DOI: [10.1107/S1600536811028807/fj2445Isup2.hkl](http://dx.doi.org/10.1107/S1600536811028807/fj2445Isup2.hkl) Supplementary material file. DOI: [10.1107/S1600536811028807/fj2445Isup3.cml](http://dx.doi.org/10.1107/S1600536811028807/fj2445Isup3.cml) Additional supplementary materials: [crystallographic information](http://scripts.iucr.org/cgi-bin/sendsupfiles?fj2445&file=fj2445sup0.html&mime=text/html); [3D view](http://scripts.iucr.org/cgi-bin/sendcif?fj2445sup1&Qmime=cif); [checkCIF report](http://scripts.iucr.org/cgi-bin/paper?fj2445&checkcif=yes) Supplementary data and figures for this paper are available from the IUCr electronic archives (Reference: [FJ2445](http://scripts.iucr.org/cgi-bin/sendsup?fj2445)). We are grateful to the National Science Council of the Republic of China and the Nanya Institute of Technology for support. Comment ======= In a series of N-heterocyclic sulfanilamide derivatives which prepared and are investigating biologically one of the compounds, 2-sulfanilyl-aminothiazoline, proved to be of particular interest, both chemically and therapeutically. (Kuz\'mina *et al.*, 1962; Jensen *et al.*, 1941; Hunter *et al.*, 1943; Hultquist *et al.*, 1951). The synthesis and character the 3-substituted 2-(thiophosphorylimino)thiazolidine compounds are also reported (Razvodovskaya *et al.*, 1990). Within this project the crystal structure of the title compound was determined. The crystal structure features inversion-related dimers linked by the weak intermolecular C---H···pi interactions in the solid state, while *Cg1* and *Cg2* are the centers of C4---C9 and C11---C16 and these carbon atoms of mean devition from plane are 0.0008 and 0.0043 Å. Weak C---H···O hydrogen bonds among the molecules are also observed in the solid state. The thiazolidine and the phenyl rings are not coplanar but twisted with each other by an interplanar angles of 79.1 (1) and 85.0 (1)°, respectively, while the dihedral angle between two phenyl groups is 76.0 (1)°. Experimental {#experimental} ============ The title compound was prepared according to a published procedure (Razvodovskaya *et al.*, 1990). Block like crystals suitable for X-ray crystallography were obtained by slow evaporization of the solvent from a solution of the title compound in methanol. Refinement {#refinement} ========== All the hydrogen atoms were discernible in the difference Fourier maps. However, they were situated into the idealized positions and constrained by the riding atom approximation: *C*---Hmethyl = 0.96 Å and *C*---Hmethylene = 0.97 Å while the methyls and methylenes were allowed to rotate about their respective axes; *C*---Haryl = 0.93 Å; *U*~iso~(Hmethyl) = 1.5*U*~eq~(Cmethyl); *U*~iso~(Haryl or methylene) = 1.2*U*~eq~(Caryl or methylene). Figures ======= {#Fap1} Crystal data {#tablewrapcrystaldatalong} ============ ------------------------- --------------------------------------- C~17~H~18~N~2~O~4~S~3~ *F*(000) = 856 *M~r~* = 410.51 *D*~x~ = 1.453 Mg m^−3^ Monoclinic, *P*2~1~/*n* Mo *K*α radiation, λ = 0.71073 Å Hall symbol: -P 2yn Cell parameters from 8638 reflections *a* = 9.3825 (2) Å θ = 2.4--28.2° *b* = 14.4047 (2) Å µ = 0.42 mm^−1^ *c* = 14.2279 (3) Å *T* = 296 K β = 102.666 (1)° Block, colourless *V* = 1876.14 (6) Å^3^ 0.40 × 0.40 × 0.40 mm *Z* = 4 ------------------------- --------------------------------------- Data collection {#tablewrapdatacollectionlong} =============== ------------------------------------------------------------ -------------------------------------- Bruker APEXII CCD diffractometer 4652 independent reflections Radiation source: fine-focus sealed tube 3756 reflections with *I* \> 2σ(*I*) graphite *R*~int~ = 0.025 phi and ω scans θ~max~ = 28.3°, θ~min~ = 2.0° Absorption correction: multi-scan (*SADABS*; Bruker, 2001) *h* = −12→12 *T*~min~ = 0.845, *T*~max~ = 0.845 *k* = −15→19 17749 measured reflections *l* = −17→18 ------------------------------------------------------------ -------------------------------------- Refinement {#tablewraprefinementdatalong} ========== ---------------------------------------------------------------- ------------------------------------------------------------------------------------------------- Refinement on *F*^2^ Secondary atom site location: difference Fourier map Least-squares matrix: full Hydrogen site location: inferred from neighbouring sites *R*\[*F*^2^ \> 2σ(*F*^2^)\] = 0.037 H-atom parameters constrained *wR*(*F*^2^) = 0.107 *w* = 1/\[σ^2^(*F*~o~^2^) + (0.0497*P*)^2^ + 0.6237*P*\] where *P* = (*F*~o~^2^ + 2*F*~c~^2^)/3 *S* = 1.04 (Δ/σ)~max~ \< 0.001 4652 reflections Δρ~max~ = 0.29 e Å^−3^ 236 parameters Δρ~min~ = −0.29 e Å^−3^ 0 restraints Extinction correction: *SHELXL*, Fc^\*^=kFc\[1+0.001xFc^2^λ^3^/sin(2θ)\]^-1/4^ Primary atom site location: structure-invariant direct methods Extinction coefficient: 0.0091 (9) ---------------------------------------------------------------- ------------------------------------------------------------------------------------------------- Special details {#specialdetails} =============== ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Geometry. All e.s.d.\'s (except the e.s.d. in the dihedral angle between two l.s. planes) are estimated using the full covariance matrix. The cell e.s.d.\'s are taken into account individually in the estimation of e.s.d.\'s in distances, angles and torsion angles; correlations between e.s.d.\'s in cell parameters are only used when they are defined by crystal symmetry. An approximate (isotropic) treatment of cell e.s.d.\'s is used for estimating e.s.d.\'s involving l.s. planes. Refinement. Refinement of *F*^2^ against ALL reflections. The weighted *R*-factor *wR* and goodness of fit *S* are based on *F*^2^, conventional *R*-factors *R* are based on *F*, with *F* set to zero for negative *F*^2^. The threshold expression of *F*^2^ \> σ(*F*^2^) is used only for calculating *R*-factors(gt) *etc*. and is not relevant to the choice of reflections for refinement. *R*-factors based on *F*^2^ are statistically about twice as large as those based on *F*, and *R*- factors based on ALL data will be even larger. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Fractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å^2^) {#tablewrapcoords} ================================================================================================== ------ --------------- -------------- --------------- -------------------- -- *x* *y* *z* *U*~iso~\*/*U*~eq~ N1 0.16502 (15) 0.17067 (10) 0.38640 (10) 0.0446 (3) N2 0.08736 (15) 0.26664 (10) 0.25505 (10) 0.0448 (3) S1 0.34585 (5) 0.17353 (4) 0.27357 (4) 0.06158 (16) S2 0.10549 (5) 0.31474 (3) 0.15432 (3) 0.04983 (13) S3 0.01808 (5) 0.19186 (3) 0.43270 (3) 0.04805 (13) O1 −0.00727 (19) 0.38361 (9) 0.13422 (10) 0.0693 (4) O2 0.25206 (18) 0.34381 (12) 0.15775 (11) 0.0739 (4) O3 0.04496 (18) 0.13807 (11) 0.51854 (10) 0.0702 (4) O4 0.00217 (15) 0.28956 (9) 0.43817 (10) 0.0580 (3) C1 0.2585 (2) 0.08847 (14) 0.41762 (15) 0.0590 (5) H1A 0.2091 0.0321 0.3909 0.071\* H1B 0.2818 0.0836 0.4873 0.071\* C2 0.3947 (2) 0.10280 (16) 0.38077 (16) 0.0664 (6) H2A 0.4335 0.0436 0.3656 0.080\* H2B 0.4684 0.1338 0.4290 0.080\* C3 0.18420 (17) 0.21042 (11) 0.30207 (11) 0.0407 (3) C4 0.06041 (19) 0.22754 (11) 0.06650 (12) 0.0431 (4) C5 −0.08309 (19) 0.19554 (12) 0.04084 (13) 0.0481 (4) H5A −0.1533 0.2177 0.0723 0.058\* C6 −0.1198 (2) 0.13072 (13) −0.03153 (14) 0.0534 (4) H6A −0.2156 0.1094 −0.0486 0.064\* C7 −0.0173 (2) 0.09647 (13) −0.07954 (13) 0.0542 (4) C8 0.1244 (2) 0.12907 (15) −0.05287 (14) 0.0607 (5) H8A 0.1943 0.1068 −0.0844 0.073\* C9 0.1647 (2) 0.19422 (14) 0.01986 (14) 0.0538 (4) H9A 0.2606 0.2152 0.0370 0.065\* C10 −0.0606 (3) 0.02670 (16) −0.15964 (16) 0.0787 (7) H10A −0.1623 0.0119 −0.1675 0.118\* H10B −0.0034 −0.0287 −0.1439 0.118\* H10C −0.0438 0.0524 −0.2185 0.118\* C11 −0.12963 (18) 0.14496 (12) 0.34887 (12) 0.0460 (4) C12 −0.1544 (2) 0.04982 (13) 0.35063 (15) 0.0578 (5) H12A −0.0965 0.0124 0.3971 0.069\* C13 −0.2660 (2) 0.01228 (15) 0.28240 (17) 0.0652 (5) H13A −0.2837 −0.0512 0.2836 0.078\* C14 −0.3526 (2) 0.06605 (15) 0.21206 (15) 0.0579 (5) C15 −0.3267 (2) 0.16119 (15) 0.21243 (15) 0.0557 (5) H15A −0.3850 0.1986 0.1661 0.067\* C16 −0.21635 (19) 0.20075 (13) 0.28026 (14) 0.0507 (4) H16A −0.2002 0.2644 0.2800 0.061\* C17 −0.4719 (3) 0.0231 (2) 0.13607 (19) 0.0864 (8) H17A −0.4738 −0.0427 0.1461 0.130\* H17B −0.4536 0.0354 0.0735 0.130\* H17C −0.5644 0.0494 0.1403 0.130\* ------ --------------- -------------- --------------- -------------------- -- Atomic displacement parameters (Å^2^) {#tablewrapadps} ===================================== ----- ------------- ------------- ------------- --------------- -------------- --------------- *U*^11^ *U*^22^ *U*^33^ *U*^12^ *U*^13^ *U*^23^ N1 0.0461 (7) 0.0435 (7) 0.0418 (7) 0.0049 (6) 0.0045 (6) −0.0002 (6) N2 0.0453 (7) 0.0459 (8) 0.0429 (7) 0.0017 (6) 0.0095 (6) 0.0013 (6) S1 0.0508 (3) 0.0734 (3) 0.0623 (3) 0.0140 (2) 0.0163 (2) −0.0073 (2) S2 0.0627 (3) 0.0401 (2) 0.0470 (2) −0.00536 (18) 0.0128 (2) 0.00129 (17) S3 0.0555 (3) 0.0491 (3) 0.0406 (2) −0.00057 (18) 0.01281 (18) −0.00071 (17) O1 0.1039 (12) 0.0425 (7) 0.0589 (8) 0.0189 (7) 0.0122 (8) 0.0043 (6) O2 0.0802 (10) 0.0758 (10) 0.0684 (9) −0.0367 (8) 0.0217 (8) −0.0044 (8) O3 0.0878 (11) 0.0805 (10) 0.0427 (7) 0.0010 (8) 0.0149 (7) 0.0108 (7) O4 0.0645 (8) 0.0504 (7) 0.0619 (8) 0.0006 (6) 0.0197 (7) −0.0130 (6) C1 0.0684 (12) 0.0496 (10) 0.0521 (10) 0.0146 (9) −0.0017 (9) 0.0011 (8) C2 0.0637 (12) 0.0655 (13) 0.0631 (12) 0.0251 (10) −0.0009 (10) −0.0143 (10) C3 0.0399 (8) 0.0402 (8) 0.0402 (8) −0.0027 (6) 0.0052 (6) −0.0082 (6) C4 0.0484 (9) 0.0396 (8) 0.0416 (8) 0.0018 (7) 0.0110 (7) 0.0055 (7) C5 0.0472 (9) 0.0468 (9) 0.0520 (10) 0.0050 (7) 0.0144 (7) 0.0031 (8) C6 0.0529 (10) 0.0479 (10) 0.0546 (10) −0.0025 (8) 0.0014 (8) 0.0027 (8) C7 0.0726 (12) 0.0458 (10) 0.0403 (9) 0.0106 (9) 0.0041 (8) 0.0038 (7) C8 0.0659 (12) 0.0680 (13) 0.0519 (11) 0.0153 (10) 0.0210 (9) −0.0008 (9) C9 0.0484 (9) 0.0636 (11) 0.0512 (10) 0.0007 (8) 0.0153 (8) 0.0020 (8) C10 0.1124 (19) 0.0631 (13) 0.0513 (12) 0.0143 (13) −0.0025 (12) −0.0083 (10) C11 0.0473 (9) 0.0452 (9) 0.0478 (9) −0.0052 (7) 0.0155 (7) 0.0038 (7) C12 0.0651 (12) 0.0470 (10) 0.0626 (12) −0.0066 (9) 0.0171 (9) 0.0100 (9) C13 0.0710 (13) 0.0470 (11) 0.0826 (15) −0.0152 (9) 0.0279 (11) −0.0052 (10) C14 0.0491 (10) 0.0687 (12) 0.0607 (11) −0.0102 (9) 0.0226 (9) −0.0147 (10) C15 0.0441 (9) 0.0665 (12) 0.0578 (11) −0.0001 (8) 0.0139 (8) 0.0053 (9) C16 0.0467 (9) 0.0451 (9) 0.0622 (11) −0.0022 (7) 0.0157 (8) 0.0064 (8) C17 0.0689 (14) 0.0996 (19) 0.0894 (18) −0.0144 (13) 0.0148 (13) −0.0413 (15) ----- ------------- ------------- ------------- --------------- -------------- --------------- Geometric parameters (Å, °) {#tablewrapgeomlong} =========================== ---------------- ------------- ------------------- ------------- N1---C3 1.376 (2) C6---H6A 0.9300 N1---C1 1.483 (2) C7---C8 1.382 (3) N1---S3 1.6811 (15) C7---C10 1.507 (3) N2---C3 1.289 (2) C8---C9 1.387 (3) N2---S2 1.6340 (15) C8---H8A 0.9300 S1---C3 1.7368 (16) C9---H9A 0.9300 S1---C2 1.808 (2) C10---H10A 0.9600 S2---O2 1.4282 (15) C10---H10B 0.9600 S2---O1 1.4327 (15) C10---H10C 0.9600 S2---C4 1.7566 (17) C11---C16 1.383 (3) S3---O4 1.4192 (14) C11---C12 1.391 (3) S3---O3 1.4215 (14) C12---C13 1.373 (3) S3---C11 1.7536 (18) C12---H12A 0.9300 C1---C2 1.498 (3) C13---C14 1.380 (3) C1---H1A 0.9700 C13---H13A 0.9300 C1---H1B 0.9700 C14---C15 1.392 (3) C2---H2A 0.9700 C14---C17 1.508 (3) C2---H2B 0.9700 C15---C16 1.375 (3) C4---C9 1.383 (2) C15---H15A 0.9300 C4---C5 1.394 (2) C16---H16A 0.9300 C5---C6 1.377 (3) C17---H17A 0.9600 C5---H5A 0.9300 C17---H17B 0.9600 C6---C7 1.386 (3) C17---H17C 0.9600 C3---N1---C1 114.30 (15) C7---C6---H6A 119.2 C3---N1---S3 122.77 (11) C8---C7---C6 118.23 (17) C1---N1---S3 120.66 (13) C8---C7---C10 121.2 (2) C3---N2---S2 121.62 (12) C6---C7---C10 120.6 (2) C3---S1---C2 92.76 (9) C7---C8---C9 121.55 (18) O2---S2---O1 117.85 (10) C7---C8---H8A 119.2 O2---S2---N2 112.27 (9) C9---C8---H8A 119.2 O1---S2---N2 104.73 (8) C4---C9---C8 119.15 (18) O2---S2---C4 108.29 (9) C4---C9---H9A 120.4 O1---S2---C4 107.52 (9) C8---C9---H9A 120.4 N2---S2---C4 105.40 (8) C7---C10---H10A 109.5 O4---S3---O3 119.63 (9) C7---C10---H10B 109.5 O4---S3---N1 107.86 (8) H10A---C10---H10B 109.5 O3---S3---N1 103.39 (8) C7---C10---H10C 109.5 O4---S3---C11 110.02 (9) H10A---C10---H10C 109.5 O3---S3---C11 109.83 (9) H10B---C10---H10C 109.5 N1---S3---C11 104.90 (8) C16---C11---C12 120.69 (18) N1---C1---C2 106.21 (17) C16---C11---S3 120.74 (14) N1---C1---H1A 110.5 C12---C11---S3 118.52 (15) C2---C1---H1A 110.5 C13---C12---C11 118.67 (19) N1---C1---H1B 110.5 C13---C12---H12A 120.7 C2---C1---H1B 110.5 C11---C12---H12A 120.7 H1A---C1---H1B 108.7 C12---C13---C14 121.87 (19) C1---C2---S1 107.17 (13) C12---C13---H13A 119.1 C1---C2---H2A 110.3 C14---C13---H13A 119.1 S1---C2---H2A 110.3 C13---C14---C15 118.41 (19) C1---C2---H2B 110.3 C13---C14---C17 121.1 (2) S1---C2---H2B 110.3 C15---C14---C17 120.5 (2) H2A---C2---H2B 108.5 C16---C15---C14 120.96 (19) N2---C3---N1 120.10 (15) C16---C15---H15A 119.5 N2---C3---S1 128.55 (13) C14---C15---H15A 119.5 N1---C3---S1 111.35 (12) C15---C16---C11 119.39 (17) C9---C4---C5 120.25 (17) C15---C16---H16A 120.3 C9---C4---S2 120.28 (14) C11---C16---H16A 120.3 C5---C4---S2 119.40 (13) C14---C17---H17A 109.5 C6---C5---C4 119.28 (17) C14---C17---H17B 109.5 C6---C5---H5A 120.4 H17A---C17---H17B 109.5 C4---C5---H5A 120.4 C14---C17---H17C 109.5 C5---C6---C7 121.53 (18) H17A---C17---H17C 109.5 C5---C6---H6A 119.2 H17B---C17---H17C 109.5 ---------------- ------------- ------------------- ------------- Hydrogen-bond geometry (Å, °) {#tablewraphbondslong} ============================= --------------------------------------------------------------------------------------- Cg1 and Cg2 are the centroids of the C4--C9 and C11--C16 benzene rings, respectively. --------------------------------------------------------------------------------------- ---------------------- --------- --------- ----------- --------------- *D*---H···*A* *D*---H H···*A* *D*···*A* *D*---H···*A* C10---H10B···Cg1^i^ 0.97 2.91 3.567 (1) 127 C2---H2B···Cg2^ii^ 0.97 3.09 3.821 (1) 134 C1---H1B···O1^ii^ 0.97 2.59 3.394 (3) 141 C12---H12A···O3^iii^ 0.93 2.47 3.318 (2) 151 ---------------------- --------- --------- ----------- --------------- Symmetry codes: (i) −*x*, −*y*, −*z*; (ii) *x*+1/2, −*y*+1/2, *z*+1/2; (iii) −*x*, −*y*, −*z*+1. ###### Hydrogen-bond geometry (Å, °) *Cg*1 and *Cg*2 are the centroids of the C4--C9 and C11--C16 benzene rings, respectively. *D*---H⋯*A* *D*---H H⋯*A* *D*⋯*A* *D*---H⋯*A* ----------------------- --------- ------- ----------- ------------- C10---H10*B*⋯*Cg*1^i^ 0.97 2.91 3.567 (1) 127 C2---H2*B*⋯*Cg*2^ii^ 0.97 3.09 3.821 (1) 134 C1---H1*B*⋯O1^ii^ 0.97 2.59 3.394 (3) 141 C12---H12*A*⋯O3^iii^ 0.93 2.47 3.318 (2) 151 Symmetry codes: (i) ; (ii) ; (iii) . | Mid | [
0.6356589147286821,
30.75,
17.625
] |
Micro-non-review: Steam on Linux The package manager gleefully tells me that I need libc6 version 2.15 or newer, and I have woefully old version, 2.13. (A digression for non-Linux-geeks: libc is a very central component of the Linux system that almost every program uses - it makes them walk, it makes them talk, and makes these programs able to use modern-time conveniences like, oh, files and stuff.) The thing is, 2.13 is the newest version on 32-bit x86 Debian Unstable. Sure, Debian’s “experimental” branch has newer versions, but unfortunately, I usually interpret Debian’s “unstable” as “shit that usually seems to work” and “experimental” as “might install but there’s absolutely no guarantees it actually works, unless we’re talking about Firefox/Iceweasel, because people actually give damn about it”. Well, I guess they’re targeting Ubuntu instead of Debian as such, but I still think that someone’s got funny requirements there. I’m just not brave enough to potentially break my system. So I guess I’ll just go back to waiting. Oh well, it’s not like the Steam Linux catalogue is that huge as of yet. I have Quake, Doom and most of the other fine id Software games in Steam, but I can’t quite Steam them yet. Sticking to retail copies for now. (Side note: The most awesome Doom 3 mod ever, The Dark Mod, has apparently been brought to version 1.08 - and they’ve fixed compatibility with older processors so the Linux version runs without SSE2 support in processors. Fannnnnnnntastic.) | Mid | [
0.568773234200743,
38.25,
29
] |
export default /* GraphQL */ ` """ Product review """ type CmsRefReviewProductLocalized { value: Product locale: ID! } type CmsRefReviewProduct { value(locale: String): Product values: [CmsRefReviewProductLocalized]! } type Review { id: ID createdOn: DateTime updatedOn: DateTime savedOn: DateTime meta: ReviewMeta text: CmsText product: CmsRefReviewProduct rating: CmsNumber } type ReviewMeta { model: String environment: ID parent: ID version: Int latestVersion: Boolean locked: Boolean published: Boolean publishedOn: DateTime status: String revisions: [Review] title: CmsText } input ReviewInput { text: CmsTextInput product: CmsRefInput rating: CmsNumberInput } input ReviewGetWhereInput { id: ID } input ReviewListWhereInput { id: ID id_not: ID id_in: [ID] id_not_in: [ID] } input ReviewUpdateWhereInput { id: ID } input ReviewDeleteWhereInput { id: ID } type ReviewResponse { data: Review error: CmsError } type ReviewListResponse { data: [Review] meta: CmsListMeta error: CmsError } enum ReviewListSorter { id_ASC id_DESC } extend type Query { getReview(where: ReviewGetWhereInput!): ReviewResponse listReviews( where: ReviewListWhereInput sort: [ReviewListSorter] limit: Int after: String before: String ): ReviewListResponse } extend type Mutation { createReview(data: ReviewInput!): ReviewResponse createReviewFrom(revision: ID!, data: ReviewInput): ReviewResponse updateReview(where: ReviewUpdateWhereInput!, data: ReviewInput!): ReviewResponse deleteReview(where: ReviewDeleteWhereInput!): CmsDeleteResponse publishReview(revision: ID!): ReviewResponse unpublishReview(revision: ID!): ReviewResponse } `; | Mid | [
0.630385487528344,
34.75,
20.375
] |
Highly Functionalized Cyclohexenes Derived from Benzene: Sequential Tandem Addition Reactions Promoted by Tungsten. The dihapto-coordination of benzene to the π-basic fragment {TpW(NO)(PMe3)} (Tp = hydridotris(pyrazolyl)-borate) enhances the basicity of the arene ligand to the point that it can be protonated with a mild Brønsted acid (diphenylammonium triflate; p Ka ∼ 1). The resulting η2-benzenium complex reacts with a wide range of nucleophiles including protected enolates, cyanide, amines, methoxide, and aromatic nucleophiles to form 5-substituted 3,4-η2-1,3-cyclohexadiene complexes in good yield (42-70%). These coordinated dienes were successfully taken through a second protonation and nucleophilic addition with a similar scope of nucleophiles (54-80%). The resulting cis-3,4- and cis-3,6-disubstituted η2-cyclohexene complexes were prepared with high regio- and stereocontrol, as governed by the asymmetric nature of π-allyl intermediates. In some cases, a diene linkage isomerization from 3,4-η2 to 1,2-η2 could be effected with a redox catalyst, and reactions of the latter species led to cis-3,5-disubstituted cyclohexene products exclusively. Oxidative decomplexation afforded the free cyclohexene products in moderate yield (37-68%). Additionally, when a single enantiomer of the chiral dearomatization agent was used, the elaborated cyclohexenes were able to be synthesized in enantioenriched forms (86-90% enantiomeric excess). Full characterization of 40 new compounds is provided that includes two-dimensional NMR, IR, electrochemical and in some cases crystallographic data. | High | [
0.717678100263852,
34,
13.375
] |
It probably has some library dependency that is not mentioned in the ebuild, and which is not satisfied in your case. So, it is unable to run. You can try to run this to figure out if any library dependency is unsatisfied: Code: ldd /opt/google/desktop/bin/gdl_box | grep 'not found' If it still doesn't work, then I am out of ideas. _________________emerge --quiet redefined | E17 vids: I, II | Now using e from git | e18, e19, and kde4 sucks :-/ I tried to modify the ebuild because google-desktop is for amd64 available to not only for x86. But I wasn't able to emerge it using my own amd64-ebuild. It says that the checksum of the downloaded rpm would be wrong ..._________________Please notice the back of this message. I tried to modify the ebuild because google-desktop is for amd64 available to not only for x86. But I wasn't able to emerge it using my own amd64-ebuild. It says that the checksum of the downloaded rpm would be wrong ... As for the checksum, you need to digest your new ebuild. ebuild <ebuild name> digest. If you have an x86 box in addition to the amd64 box and my ebuild works, please let me know. I will then submit this ebuild to bugs.gentoo._________________emerge --quiet redefined | E17 vids: I, II | Now using e from git | e18, e19, and kde4 sucks :-/ | Mid | [
0.570754716981132,
30.25,
22.75
] |
// // Generated by class-dump 3.5 (64 bit). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <Foundation/NSObject.h> __attribute__((visibility("hidden"))) @interface CHBUnsupportedSeries : NSObject { } + (id)chdSeriesWithState:(id)arg1; @end | Low | [
0.41818181818181804,
23,
32
] |
Q: CSS - Fonts Render Differently in Firefox and Chrome I'm using Google Fonts and CSS's @import method to include fonts onto my website. Chrome displays the fonts beautifully; they have even weights and are crisp to view. Firefox does not replicate this rendering. See below: On the left you can see Firefox. The font weight of the title is not consistent. You can see that the smaller descriptive text has some additional weight than the Chrome counterpart. Chrome is on the right, and as you can see, the fonts are respectfully weighted. I am using the following CSS in an attempt to fix this issue: @import url('https://fonts.googleapis.com/css?family=Muli|Source+Code+Pro'); * { text-rendering: optimizeLegibility; -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; } How can I resolve this issue and have Firefox displaying my fonts with proper weights? Firefox Version: 57.0.1 (64 bit) [Most recent] Chrome Version: 62.0.3202.94 (64 bit) [Most recent] Many thanks. A: I have been testing a few things out, and I've found some way to make sure that Firefox doesn't show an inconsistent font weight. I can use some jQuery to detect the browser, and from there I can add browser-specific styles. In this case, I've added a font-weight to the title block so that it has a lighter font-weight, which creates a cleaner look: On the left is Firefox with font-weight: 400, and on the right, Chrome with font-weight: 600. See below for my browser-detecting jQuery. if (navigator.userAgent.search("Firefox") >= 0) { $('body').addClass('firefox'); } My CSS is as follows: body.firefox h1 { font-weight: 400; } It's not necessarily a fix, however it removes the choppy-ness of the font weighting. Please feel free to comment about any better ways of doing this, or with a more practical solution to the question. Many thanks. | Mid | [
0.6370370370370371,
32.25,
18.375
] |
Walking around New York City for 10 hours, Shoshana B. Roberts encountered more than 100 instances of verbal street harassment. Hollaback, an organization committed to ending such hounding, recorded her experience and posted a video of it on YouTube last week, drawing more than 30 million views. For having the temerity to participate in this video, Roberts has reportedly received rape and death threats. Many commenters, most of them men, have been eager to prove Hollaback’s point by reacting to implicit criticism with hysterical, over-the-top defensiveness. Thanks to these troglodytes and their threats, you don’t have to be a women’s studies major to see that the world is a hostile place for women. Most women have reacted to the video with anger and weary recognition, as have some men. Some activists have proposed laws that would criminalize street harassment. Some women of color have shared their stories of harassment; others have called the video out for its “fucked up” racial politics. (Roberts is white; most of the harassers depicted in the video are not.) And yet what does the video actually show us? The most disturbing part is a five-minute segment in which a man silently shadows Roberts, leering at her intently. But the majority of the behavior we see is not threatening so much as tedious and potentially irritating. “How you doing today?” asks one guy. “What’s up, beautiful? Have a good day,” says another. The most common remarks include “Hey, beautiful,” “How are you this morning?” and “Have a nice evening.” When it comes to sexual harassment, it doesn’t pay to eliminate distinctions of degree. Following a woman or threatening her is not the same as smiling and calling her beautiful, even if the latter is intended as a come-on. And by eliding the difference, we are placing the comparatively minor sin of catcalling on a par with the more insidious forms of harassment women still face behind closed doors. Rob Bliss, the video’s director, has been criticized for what some see as its racist undertones. He claims to have edited out a number of white male harassers because noise pollution rendered footage of them unusable. Hollaback has issued a statement saying, in part, “We regret the unintended racial bias in the editing of the video that overrepresents men of color.” Perhaps men of color were overrepresented in the video. Or perhaps catcalling is more common in some communities than it is in others. Most videos are edited, and none of Roberts’ harassment was staged. In my experience, when I’m on a college campus or walking around an affluent residential neighborhood, it is rare for a strange man to whistle, catcall or comment on my body. This doesn’t mean that educated, affluent men do not harass women. It just means that it’s less public and more damaging when they do. Think of the allegations against Jian Ghomeshi, Bob Filner, Bill Clinton, Clarence Thomas and Bob Packwood, to name just a few. On Nov. 2, The New York Times ran a front-page story about a sexual harassment case at the Yale School of Medicine. The case, which has been egregiously mishandled by administrators, involves the former head of cardiology, Michael Simons, and a much younger Italian female researcher. The older, married doctor shamelessly pursued his female colleague, whose boyfriend was under his supervision, by, among other things, handing her a love letter written in what the Times called “effortful” Italian. | Low | [
0.533333333333333,
32,
28
] |
Electrical Conductivity : Conductivity /TDS/Resistivity Electrodes Does your application require Conductivity/TDS/Resistivity testing to determine the exact conductivity/TDS/Resistivity unit? or are you looking for replacement Conductivity Electrodes? At R.M.S Ltd we can supply Industrial and Laboratory Conductivity Sensors that are compatible with all modern Conductivity Instrumentation. All of our electrochemical sensors can be supplied with or with out temperature compensation (Pt100 / pt1000 as standard - or please specify) All we need is the make and model of your Conductivity meter so that we can determine the correct cable length, connector etc - please email, phone or fax us with your requirements and one of our team will contact you. We supply our sensors to a wide spectrum of customers ranging from plant process, Water authorities (Conductivity measurements of drinking pure water, groundwater, waste water, aquifer water, sea water, rain water etc) Food processing, fermentation, hydroponics and general laboratories.All of our sensors are manufactured toISO 9002 protocols from the British Standards Institute for the manufacture of electrochemical sensors. There follows specifications for our range of Laboratory and Industrial Conductivity Cells : We accept all major credit/debit cards - please contact us for our best possible prices!; any questions? Why not try our Technical Area where you will find an in-depth explanation of many relevant aspects within the field of electrochemistry!more.. | High | [
0.681481481481481,
34.5,
16.125
] |
In Which Holy Mother Church Scares the Post Patrick Sexton is the official Don't Hurt Us correspondent for The Washington Post, a once-great newspaper now d/b/a an adjunct of the educational-testing scam. This weekend, he pondered deeply the question of why Catholics want to hurt the Post and how the Post can avoid having the ruler dropped on its knuckles. Now, any thinking journalist would look at the "evidence" amassed by the newspaper's critics in this regard and determine that the whole lot of them would be better off with one-way tickets to the cracker factory. (Catholics are upset about an ad? Tough. Buy one of your own. You've got the money. And keep the damn incense to yourselves. It takes forever to get the smell out of the drapes.) However, it is Patrick's thankless job to take loopheads and their arguments seriously, so Patrick has to tie himself and his paper to the whipping post and produce dreck like this.... Advertisement - Continue Reading Below Still, many Catholic readers, particularly conservative ones, and the Catholic hierarchy at the Archdiocese of Washington and at the U.S. Catholic Conference of Bishops, whom I spoke with at length last week, say that The Post just doesn't get Catholics. Let us be clear. Any story that references "the Catholic hierarchy" and doesn't include the phrases "international conspiracy to obstruct justice" and/or "accessories after the fact" is already being overly fair to the organization in question. Undaunted, Patrick continues with the work of pulling out his own fingernails and eating them. Catholic Charities is the largest non-government social service agency in the area, for example, and it rarely gets covered, they say. Catholic schools have conducted a massive education program, nationally and locally, to train students, teachers and aides to recognize the signs of child abuse, in the wake of the priest sex scandals, but it is hard to get coverage of that effort. Liberal Catholic groups are quoted, but conservative or official voices not as much, they say. Alas, this is all the pope's nose. We have been inundated with stories about Catholic Charities, most of them written in bitter tears because state anti-discrimination statutes have made it inconvenient for Catholic Charities to discriminate in the area of adoption. I hope it's not necessary to go into detail as to why Catholic schools embarked on that "massive education program" regarding child abuse. (Hint: it kept them from having to mortgage St. Peter's Basilica to pay out even more money in settlements.) And that last sentence is just arrant nonsense. We didn't hear enough from the hierarchy when they began jacking the president around on contraception? The problem they have is that dissenting voices are out there being heard at all. That wasn't the way it worked when Spellman was blackjacking the New York tabloids back in the day, I'll tell you that. | Low | [
0.47899159663865504,
28.5,
31
] |
Primary Navigation Menu Unlocking the secret of Lorenzo’s Oil Unlocking the secret of Lorenzo’s Oil A team of researchers at Yonsei University revealed a novel mechanism in the pathogenesis of X-ALD Professor Dong-Wook KimYonsei University College of Medicine The plot of a 1992 film starring Susan Sarandon and Nick Nolte, Lorenzo’s Oil, is based on the true story of a couple who searched for a treatment for their son afflicted with an incurable disease, X-linked adrenoleukodystropy (X-ALD). A team of researchers at Yonsei University revealed a novel mechanism in the pathogenesis of X-ALD. A joint research team of Drs. Dong-Wook Kim and Je-Wook Yu at Yonsei University College of Medicine analyzed induced pluripotent stem cells (iPSCs) from ALD patients and discovered key molecules that shed light on the pathological mechanism of disease. Their results were published in Nature Communications. Associate Professor Je-Wook Yu Yonsei University College of Medicine X-ALD is a rare genetic disease caused by a loss of function mutation in the peroxisomal transporter ABCD1. This disease is strikingly associated with the accumulation of very long-chain fatty acids (VLCFA), which were considered to cause nerve damage from cerebral inflammation. It typically afflicts boys under the age of 10, and after about six months after the first symptoms appear the affected patient loses eyesight and hearing. Within two years, the patient falls into a vegetative state and succumbs to his illness. By observing iPS cells made from the somatic cells of ALD patients, the researchers found that the VLCFA themselves are not the direct cause of cerebral inflammation in X-ALD patients, but in fact revealed that X-ALD-derived iPSC shows the overproduction of 25-hydroxycholesterol (25-HC) in response to VLCFA. The researchers also found that 25-HC causes cerebral inflammation through activation of the NLRP3 inflammasome. When mice were injected with excessive amounts of 25-HC, the researchers observed signs of ALD. Alternatively, cerebral inflammation decreased when the same substance was blocked. Professor Kim explained the significance of the findings: “The results of the study confirm that cerebral inflammation, the critical symptom of ALD, is caused by 25-HC. What remains now is to find a substance that can block it, and we will have an effective treatment for ALD.” | Mid | [
0.613583138173302,
32.75,
20.625
] |
package com.mapswithme.maps.analytics; public interface AdvertisingObserver { void onAdvertisingInfoObtained(); } | Low | [
0.5098039215686271,
26,
25
] |
Friday, 15 April 2011 Za True White Plus Two-Way Foundation and Instant Brightener Za recently launched a new True White Plus Two-Way Foundation SPF20 PA++ and Instant Brightener SPF30 PA+++. The previous True White Foundation was the no. 1 whitening 2-way foundation in Singapore for the past 7 years, with one sold every 2 minutes. The newly reformulated True White Plus foundation (S$20.50 for 9g refill; S$9.90 for case) contains a "Spotless Brightening Powder" and "Whitening C ingredient" to help create the look of radiant, luminous skin while helping to lighten dark spots and acne scars. The Spotless Brightening Powder is a blend of a lightweight flat powder that evens out the skin surface, and an inner lighting powder to help create a natural radiance. The Whitening C ingredient is Vitamin C Derivative APM, comprising Vitamin C and magnesium phospate (which helps to stabilise the Vitamin C). The foundation is available in 4 shades. I picked the lightest shade #20, which turned out to be a pretty good match for my skintone. The True White Plus Instant Brightener (S$15.90, 30ml) helps to correct dull skin, conceal imperfections such as spots, pores and lines for a beautiful pearly finish that lasts up to 8 hours. This can be used as a primer for the powder foundation. The Instant Brightener has a very lightweight, watery texture that is a breeze to apply. With cyclomethicone as the first ingredient listed, it's not surprising that the Instant Brightener has that slightly slippery, silicone-y feel to it. Below is the ingredients list for the Instant Brightener. After using the foundation and the Instant Brightener daily over the past week, I quite like the foundation but the Instant Brightener feels too silicone-y for me. I prefer primers that feel slightly more hydrating. The Instant Brightener does help the foundation to apply more smoothly but it didn't seem to help enhance the oil control. I do like the fact that it has SPF30 PA+++, so I'll probably save it for days when I'm spending some time in the sun. The oil control was average with blotting required about every couple of hours. The foundation applies quite sheer at first but can be layered for greater coverage. It helps to conceal the redness in my skin, minimise the appearance of my pores and makes my skin appear more even-toned. The finish looks natural and healthy. Oil control was average. I haven't used it long enough to say if it actually does help to lighten dark spots and acne scars but in general, using products with adequate sun protection will help to prevent skin pigmentation from getting darker and more prominent. At midday, I usually blot and then touch up with Ettusais Quick Fix Powder. For this look, I also used Topshop Solar Cell and Meteoric Duo Eye Shadows, Tundra Eyeshadow Mousse and Desert Sun Cheek Duo, Esprique Precious True Black Mascara WP (Volume Separate), Benefit It Stick, Majolica Majorca Perfect Automatic Liner VI 606, and Za Plumper Lips #2 Rosy Flush topped with Plumper Lip Gloss #9 Playful Pink. Below is the ingredients list for the True White Plus Two-Way Foundation. Both the foundation and the Instant Brightener are made in Taiwan by Shiseido. The ZA Cosmetics Singapore Facebook page can be viewed here. hi Mandy,I'll try to do a post. I do have a ton of foundations but I haven't tried all of them out fully enough to give some of them a proper review. hi,For me, the best part about this foundation is that it can cover up the redness in my skin. When my skin gets oily after a few hours, my pores become more visible and that's when I need to blot and touch up. hi Pepper,For liquid eyeliner, I recommend Heroine Make Smooth Liquid Eyeliner (with the tapered brush tip) as it is very easy to use. Just work in small strokes from the inner corner to the outer corner of your eyelid. At the outer corner, draw it angled upwards to give your eyes a slight lift. You'll probably need to layer it a couple of times to get a nice defined line with smooth edges. For the lower lashlines, I usually just use eyeshadow smudged with a fine eyeshadow brush or a pencil eyeliner. Urban Decay makes very good eyeliner pencils that are easy to use. http://rougedeluxe.blogspot.com/2010/05/heroine-make-mascara-eyeliners.html | Mid | [
0.5750528541226211,
34,
25.125
] |
Project Abstract This competitive continuation application requests a five-year renewal for our institutional national research service award (T32) entitled, ?Research Training in Child Mental Health.? Support is requested for six postdoctoral fellows. The overarching aim of this program is to train the next generation of researchers to design and carry out innovative research projects that will help advance knowledge in the field of child mental health. Strengths of the program include a breadth of faculty research interests and expertise, a number of faculty members conducting T2-T3 translational research, and research projects with diverse, underserved and disadvantaged populations. The program embraces an apprenticeship model in which fellows work with a primary research mentor, and in many cases, a secondary research mentor. In the apprenticeship model, the mentor works closely with the trainee on existing projects, secondary data analyses, grant writing, and scientific presentations. The didactic program includes both a core and individualized curriculum including seminars on grant writing, responsible conduct of research, professional development, and innovative multidisciplinary approaches to research. This latter seminar helps stimulate discussion of translational research ideas within the context of the NIMH strategic plan. The breadth of research interests, from basic to applied, helps broaden research perspectives and educate fellows with respect to the process of collaboration and conducting research across disciplines. During this past cycle we have trained 17 T32 postdoctoral fellows (10 graduates, 7 still enrolled); 7 additional postdoctoral fellows funded by F32s, a diversity supplement, and other sources also took part in the T32 training. Of the 10 graduates of the T32 in this 5th cycle, all have faculty positions, 7 in medical schools and 3 in psychology departments; all have submitted NIH grants as PIs during their fellowship, and 4 K awards, a 40% hit rate, were funded. Fifteen of 17 former T32 fellows from our prior (4th) cycle have faculty positions and they have been awarded a total of 11 NIH PI grants including 3 R01s (and a 4th awaiting funding with a 5th percentile), an R03, R34, R21, R21/R33, and 3 K awards. Three Brain and Behavior Research Foundation Young Investigator awards have also been secured. The 10 graduates from the 5th cycle have published 195 peer-reviewed papers (M = 19.5), 80 first author (M = 8), and 65 (M = 6.5) directly related to their fellowship research. The 17 graduates in the 4th cycle have published 453 peer-reviewed manuscripts (M = 26.6), 171 first author (M = 10.1), and 125 (m = 7.4) directly related to their fellowships. In this competing continuation, we integrate new, accomplished independent investigators into the mentoring pool, introduce mentor training opportunities, expand our scientific reach to wet-lab research, and expand opportunities for exposure to team science. | High | [
0.7262411347517731,
32,
12.0625
] |
You are here Kosmos: Red Space event Q&A Following a rare screening of Out of the Present, Andrei Ujica's remarkable feature documenting life on the Mir space station, cosmonaut Sergei Krikalev joins Helen Sharman (the first Briton in space) to discuss the film. As well as describing his experiences of space travel - while Krikalev was in orbit, the events of 1991 transformed Russia’s political landscape forever - he and Sharman field questions from the public. Would they be willing to be the first people on Mars if it meant they could never come back? Their answers may surprise you. This Q&A took place as part of Red Space, the centrepiece event of our Kosmos: A Soviet Space Odyssey season. | High | [
0.676767676767676,
33.5,
16
] |
Q: Odd behavior with inheritance and c++ So I am getting some weird behavior with some class hierarchy I am trying to make.I am implementing graphs and I am doing it by making a Graph class that is will be implemented by AdjacencyMatrixGraph and AdjacencyListGraph so they could be used as a Graph by anything that wanted to use them. I have one pure virtual function in Graph that get's overwritten by the function in AdjacencyMatrixGraph, however I have a non virtual function of the same name, but different signature in Graph. I cannot call the non virtual method of the Graph class when accessing an AdjacencyMatrix class, but when I rename the non virtual method it works fine. Like this: When the classes look like this class Graph { public: virtual void addVertex(Vertex vert, bool bidirectional)=0; void addVertex(unsigned int from, unsigned int to, double weight, bool bidirectional) } class AdjacencyMatrixGraph : public Graph { ... } AdjacencyMatrixGraph test; Vertex vert; test.addVertex(vert,false); //this statement compiles and works fine test.addVertex(0,0,10.f,false) //this statement fails to compile and says cadidates are addVertex(Vertex, bool) However if I rename the non virtual method like so class Graph { public: virtual void addVertex(Vertex vert, bool bidirectional)=0; void addVert(unsigned int from, unsigned int to, double weight, bool bidirectional) } AdjacencyMatrixGraph test; Vertex vert; test.addVertex(vert,false); //this statement compiles and works fine test.addVert(0,0,10.f,false) //this statement compiles and works fine This makes no sense to me because I thought the compiler sees addVertex(Vertex, bool) and addVertex(unsigned int,unsigned int, double, bool) as two completely different symbols. So one shouldn't be overridden with inheritance, even if it would it shouldn't be possible because the symbols take different arguments. A: The definition in a derived class hides the base class overload declarations. To bring those into the scope of the derived class, use a using declaration, like using Graph::addVertex; in the derived class. By the way, this is a FAQ. It's often a good idea to check the FAQ before asking. Or even just in general. :-) | Mid | [
0.575520833333333,
27.625,
20.375
] |
Q: R density plot: Why are maximums points different in log scale versus linear scale? I have data with around 25,000 rows myData with column attr having values from 0 -> 45,600. I am not sure how to make a simplified or reproducible data... Anyway, I am plotting the density of attr like below, and I also find the attr value where density is maximum: library(ggplot) max <- which.max(density(myData$attr)$y) density(myData$attr)$x[max] # This is the x-intercept of max point ggplot(myData, aes(x=attr))+ geom_density(color="darkblue", fill="lightblue")+ geom_vline(xintercept = density(myData$attr)$x[max])+ xlab("attr") Here is the plot I have got with the x-intercept at maximum point: Since the data is skewed, I then attempted to draw x-axis in log scale by adding scale_x_log10() to the ggplot, here is the new graph: My questions now are: 1. Why does it have 2 maximum points now? Why is my x-intercept no longer at the maximum point(s)? 2. How do I find the intercepts for the 2 new maximum points? A: Be very careful about just transforming the x-axis; that doesn't represent the density on the log scale of the variable because it omits the Jacobian of the transformation. Just transforming the x-axis works for the cdf, but not for the corresponding pdf (which you can see by differentiating the cdf). When you transform a distribution with a nonlinear transformation, you change the relative local density (ratios of probabilities of being within small intervals $[x,x+dx)$ are changed); modes are not equivariant to monotonic transformation. Note, for example, that the mode of a normal is at the median (which is also the mean), but the mode of a lognormal is below the median, which in turn is below the mean. KDEs add some wrinkles to this a. transformation changes relative distance between points b. smoothing (via kernel density estimates) a transformed density means combining kernels from nearby points; consequently, the contributions of points is altered because with conventional KDEs the bandwith is constant on the new scale, not transformed from the old scale (i.e. if "s" is the operation of computing a KDE by some given typical algorithm, then $s(t(X)) \neq t(s(x))$). (Note also that transforming the x-axis on the kernel density estimate can introduce odd artifacts relative to just transforming the axis on the distribution that the density is from. Beware that sometimes you can be looking at an attribute of a transformed kernel rather than a transformed density. How strong this effect is depends on various factors. Note, for example, that if you took a density on the positive half-line with considerable density near 0, and computed a KDE and transformed the axis, you'll have positive density at and below 0 and the effect of taking say a log of that may not be what you'd hope for.) Long story short, for several reasons at once, you should expect peaks to shift, for the number of peaks to potentially change, and for transforming just the x-axis to not do quite what you might expect it to do. | Mid | [
0.591611479028697,
33.5,
23.125
] |
The idea of a link between nationality and intelligence has a long pedigree – certainly as ancient as slavery and colonialism. And in its faux-scientific form, well, Darwin dabbled, Churchill embraced and Hitler implemented. The latest burst comes from Randy Thornhill of the University of New Mexico, who once proposed the idea that men evolved with a genetic predisposition to rape (raising the question of why these genes are so much more prevalent in, say, Serbia or South Africa, than Tanzania or Sweden). He and his team are back with their latest idea: a direct link between levels of infectious disease and average national IQ. Their underlying case is perfectly valid – when children devote energy to fighting infection, brain development is sometimes sacrificed. But their evidence at a national level is more dubious, based on comparing World Health Organisation data with average IQ scores. The obvious point is that correlation is not the same thing as causation. In other words, there might be a range of other reasons why people in disease-ridden countries don't excel in IQ tests. And it is also worth pointing out that it has been warmer countries (some in malaria zones – a key disease highlighted by Thornhill) that have been the catalyst for civilisation: Mesopotamia, China, Egypt, Greece. But a more profound objection relates to Thornhill's obdurate belief that IQ is a true measure of "crystallised general intelligence" rather than just a measure of ability to perform in IQ tests. The killer blow was delivered more than 20 years ago by the New Zealand academic Jim Flynn, who proved that average IQ test scores increased progressively in most countries (now known as the "Flynn effect"). If American children of a century ago took IQ tests of today their average score would be well below 70. In Britain, the average IQ has risen by 27 points since the war. The reason has nothing to do with evolution. In fact, there is an emerging scientific consensus that human intelligence is unlikely to have evolved over the last 45,000 years, and perhaps more (for example, an engraved ochre plaque found near Cape Town, containing intricate symbolic designs, was carbon-dated at more than 70,000 years). According to Flynn, generational rises are prompted by increased exposure to abstract logic. Other reasons might include nutrition levels, time spent in school, environmental stimuli and familiarity with aptitude testing. It makes no sense to compare average IQ scores of different populations because they are unlikely to have identical exposure to all of these factors. So while it might be true that, on average, Ashkenazi Jews or Chinese people have higher average IQs than Ethiopians or Caucasian Britons, this does not mean that one group is innately more intelligent than another. Yet this is precisely what Richard Lynn (quoted in the article) and other evolutionary psychologists such as Steven Pinker have argued – a perspective based on combining a discredited view of IQ with a faulty grasp of evolutionary theory. Thornhill's disease-based hypothesis is less objectionable, but he is indulging in just-so story logic when he extends this to speculating that whole nations have adapted their immune systems at the expense of their brains: a modern version of a horribly ancient conclusion. | Mid | [
0.617169373549884,
33.25,
20.625
] |
Go check out the ski area, get your rentals ready to go at Christy Sports, and then stop by the Truffle Pig for a happy hour cocktail. Grab a shuttle to downtown Steamboat Springs and head over to Carl’s Tavern for a nice, but casual dinner. Stretch your legs a bit after a day of travel by walking over to Ciao Gelato before heading home to bed! Day 2 (Friday) Wake up and grab a quick, hearty breakfast at Paramount. Spend the day downhill skiing at Steamboat Spring’s famous Mt. Werner. Enjoy long runs, fast chair lifts, and that Colorado champagne powder. Lunch stop? The Four Points Lodge has amazing food and a great view of the valley below. After a day of skiing, what’s better than soaking your muscles in hot water? Take a shuttle up to Strawberry Hot Springs. Enjoy multiples levels of pools with different temperatures, beautiful grounds, and all beneath the open Colorado Sky. If you want to enjoy the views, head up there before dark and then treat yourself to dinner afterwards at Café Diva. Make sure to make your reservations far in advance as they book up early! Day 3 (Saturday) Take your time checking out and stop by Creekside Café (a local’s and Vista Verde staff favorite) for the best breakfast in town. After breakfast, take time to check out the town! Visit the shops and take a stroll down the Yampa River Core Trail. You might even see some ski jumpers flying off the jumps over at Howelsen Hill from the trail! After exploring town, it’s time to head to Vista Verde Ranch. Check in is at 4 o’clock, but if you get in earlier, you are more than welcome to explore the ranch or relax in our Great Room until your private cabin is available. After settling into your cabin, unpacking, and getting the lay of the land, come on down to the Lodge for our Happy Half Hour (we’re too busy having fun outside to make it an hour!). Grab a glass of wine or craft beer and meet the other individuals staying on the ranch. After Happy Half Hour, stroll into the dining room to enjoy an outstanding, elegant formal dinner (don’t worry – this doesn’t mean it requires formal attire – you can be as comfortable and casual as you’d like!) filled with fabulous appetizers, entrees, and a dessert that have been personally crafted by our chefs. After dinner, wander back to your cabin under the light of the stars and enjoy your private hot tub or snuggle up by the wood burning stove to relax before your adventures the next day! Day 4 (Sunday) Wake up to the horses nickering and the snow plows working, and head down to the Lodge where the coffee is brewing and the bacon sizzling. After breakfast, start your ranch vacation adventures off with and introduction to classic skiing. You will meet with our guides, go over all there is you need to know about skiing, and then head out onto any of our 20 km of private ski tracks to practice technique, or into the backcountry with a guide! After an active morning and a delicious lunch joined by the Vista Verde staff, spend the afternoon riding a horse on a snow covered trail. Enjoy this beautiful loop around the ranch property and take in the exciting experience of riding a horse in the snow. And a bonus – the horse you ride will be yours for the duration of your stay! After the trail ride, hop onto the feed sleigh and help the wranglers feed our Vista Verde herd. The sleigh is pulled by our team, two Belgian brothers named Kenai and Sitka. Enjoy the lap around our Winter Pasture and watch the horses as they interact while eating. Following a full day of adventures, head back to your cozy cabin and hot tub as the sun sets or relax before another wonderful dinner paired with the perfect glass of wine. Day 5 (Monday) After a delicious breakfast, try out the horsemanship clinic with your horse you rode the day before. Learn the details and intricacies of working with a horse, both on the ground and in the saddle. Lead by one of our talented horse trainers, the horsemanship clinic is a great way to learn all that it takes to find a connection with the horse you are riding Come back after riding for a hearty lunch cooked to order and prepare for your afternoon! A quick post-lunch nap refreshed you to jump on the back of the snowmobile to head up to the tubing hill. An hour of exhilarating rides up and down the hill is capped off with a private sleigh ride—the perfect way to wrap up an active day. Finish the day off with a casual BBQ dinner where you enjoy the company of the staff and any children staying for the week. After a lively dinner, head up to our barn for the barn dance! Learn to square dance, line dance, and partner dance with other guests and our staff. It is a great way to get your country western moves on! Day 6 (Tuesday) Your last morning at the ranch has arrived, and you know that all of the Vista Verde crew are sad to see you go! But you have just had the most incredible winter vacation, experiencing much of what Steamboat Springs and a winter guest ranch vacation has to offer! You will be missed at Vista Verde, and we will be counting down the days until we get to see you here again! Because there is so much you didn’t get a chance to fit in during this stay! Dogsledding, cooking classes, snowmobiling, ranch yoga, perfecting your technique on back country skis, tasting wines with the ranch chefs, and more! Come back and enjoy this Western town and lifestyle soon! | High | [
0.674448767833981,
32.5,
15.6875
] |
Sporting beat Inter Milan 1-0 Marco Caneira scored with a powerful second-half volley to lead Sporting Lisbon to a 1-0 win over 10-man Inter Milan in Group B of the Champions League. Reported by Indo-Asian News Service Read Time: 2 mins Lisbon: Marco Caneira scored with a powerful second-half volley on Tuesday to lead Sporting Lisbon to a 1-0 win over 10-man Inter Milan in Group B of the Champions League. The left back controlled a long downfield pass with his chest and fired a thundering right-foot shot from the left flank that went in off the underside of the crossbar after 64 minutes. Inter midfielder Patrick Vieira was sent off in the 68th minute for a crushing challenge on Sporting striker Alecsandro. The Italian team lacked its usual flair and rarely threatened the home team's goal. Sporting set the pace and created the most chances but was short on sophistication in attack. After an early effort from Zlatan Ibrahimovic tested Sporting goalkeeper Ricardo Pereira, the Portuguese team came closer to scoring in the first half. Yannick Djalo went on a solo run into the Inter area in the 15th minute before being ambushed by Walter Samuel. In the 30th, Leandro Romagnoli anchored a neat move with Nani, who got near to goal but failed to get past goalkeeper Francisco Toldo. Inter, meanwhile, was lackluster and only Adriano's low left-foot drive from outside the area in the 40th minute worried the Sporting defence. Sporting continued to press forward after the break, and Liedson and Djalo hooked up for a slick move that ended in Djalo shooting high. After Caneira's goal, Inter coach Roberto Mancini brought on Hernan Crespo for Adriano and replaced Luis Figo with Mariano Gonzalez, but still it was the home team that dictated the run of play as Inter produced a lackluster performance. (AP) | Mid | [
0.580912863070539,
35,
25.25
] |
Normal hair is sometimes naturally so fine and limp and so lacking in body that it does not hold a hair set well. Frequently, the hair becomes even less bodied and is sometimes weakened as a result of being subjected to multiple chemically active cosmetic treatments, such as permanent waves and tints. Additionally, hair may be further weakened and weathered by other contributing factors, such as bleaching by exposure to sun and chlorinated swimming pool water. Normal hair is also usually hydrophobic. However, many of the previously mentioned chemical treatments remove the natural hydrophobic components from the hair. Consequently, the relative porosity of the hair increases as its hydrophobicity decreases. As the porosity of the hair increases, it tends to pick up water and swell more readily. When the hair is weakened and porous, it is more vulnerable to stretching and breaking while it is water-swollen. Routine grooming inevitably requires that wet hair be mechanically stretched and manipulated during shampooing, combing and setting on curlers. Additionally, currently popular hairstyles are achieved by "blow-drying" the freshly washed hair. In the "blow-dry" procedure, the hair is not set on curlers; rather the wet hair is brushed continuously until it is dry while a stream of heated air from a hand-held electric hair dryer is directed over the portion of the hair being brushed. Thus water-swollen hair that is in a weakened physical condition may snap and break or be mechanically damaged during blow drying. This invention relates to a method of treating hair to strengthen it and improve its physical properties by treating the hair with compositions containing a water-dispersible non-toxic polyvalent metal salt of a mineral acid. The hair is strengthened by restoring its hydrophobicity and decreasing its porosity. The physical properties of the hair are improved by long-lasting conditioning benefits that resist removal by water or subsequent shampoo washings. The polyvalent metal salts have a cation selected from the group consisting of aluminum (III), cerium (III) and (IV), iron (III) and zirconium (IV) and an anion of a strong mineral acid. Polyvalent metal salts are generally appreciated in the art primarily for their astringent effects on skin for antiperspirant activity. Hewitt et al. in U.S. Pat. No. 3,842,847, taught the use of astringent water-soluble salts of aluminum, hafnium, zirconium and zinc and the like in a shampoo and hair treatment to diminish scalp perspiration. By diminishing the perspiration on the scalp, less sebum transferred to the hair, so the hair stayed cleaner longer. Hewitt et al. reported antistatic, as well as anti-soiling, effects with aqueous rinses of aluminum chlorohydrate present in concentrations of at least 0.004 weight percent, preferably from 2 to 6 weight percent. The researchers believed the aluminum salt reacted with the hair keratin making it less anionic in nature and thus less "fly-away." However, for the purposes intended by Hewitt et al., the pH of the treatment and shampoo compositions were limited to the operable astringency range of the metal salts from 3 to 6.5. Also the hair had to be water rinsed after treatment until the pH of the rinse water was at least over 6. The effectiveness of the method of this invention, as explained below, is not dependent on the astringent action, if any, of the polyvalent metal salt of aluminum or zirconium selected for use in hair-treating compositions used herein. For example, zinc salt, one of the astringent materials taught by Hewitt et al. is ineffective to achieve the results of this invention. Further the hair treating compositions of this invention, including those containing aluminum and zirconium salts similar to those taught by Hewitt et al., need not be rinsed from the hair. Indeed, the compositions are preferably allowed to remain in contact with the hair as explained below, and are effective for the purpose intended at salt concentrations well below known levels recognized for astringent antiperspirant effects. Cassidy in U.S. Pat. No. 3,208,910, taught the use of a water-soluble zirconium carboxylate salt in a hair styling fluid for imparting body, moisture resistance and sheen to human hair. Zirconium acetate present in a concentration of 0.1 to 2 percent at a pH from about 3 to 6 was used for setting the hair. However, the hair tended to behave as if it were full of snarls and was extremely difficult to comb if the concentration exceeded 2 percent. Consequently, body and moisture-resistant effects could only be increased by including auxiliary dispersing agents, waxes and polymers or by washing the hair with a soap shampoo and forming an insoluble zirconium soap on the hair. The compositions of this invention are not so restricted, and the zirconium salts practiced as taught herein are those which were rejected by Cassidy as being less effective than carboxylate salts. Commercially available products usually rely on resins or polymeric materials to produce bodying effects on the hair. However, these products usually provide no hydrophobic improvement against the known adverse effects of humidity in maintaining a hair style. In some cases, these materials make the hair hard to comb or may, themselves, absorb moisture. Attempts have been made to make hair hydrophobic by means of products that are applied to the hair in the form of oily hair dressings and creams where the product is left on the hair to act as a physical barrier against moisture. However such products provide a temporary effect that is removed when the user washes her or his hair. Frequently these products weigh the hair down with a dull coating, thereby sacrificing the bodying benefits desired by persons having fine, limp, porous hair. Thus, consumers face a dilemma in choosing which physical characteristics they wish to improve and which desirable characteristics they are willing to sacrifice to get the desired improvement. A desirable hair treatment product, therefore, would strengthen the hair, especially porous hair, and provide a cosmetically pleasing, lasting improvement in the physical properties of hair. | Mid | [
0.6187050359712231,
32.25,
19.875
] |
Q: Windows 7 Gadget not releasing ActiveX object I'm working on a Windows 7 gadget that needs to pull data from an excel document. The problem is, is that the Excel process won't unload after I've retrieved the data I need. Here's the code I use in my initialization function: var Excel = new ActiveXObject("Excel.Application"); Excel.Visible = false; Excel.DisplayAlerts = false; var workbooks = Excel.Workbooks; var workbook = workbooks.Open("\\\\SERVER\\Documents\\Sample.xlsx", 0, true); var activesheet = workbook.ActiveSheet; var cell = sheet.Cells(1, 1); var value = cell.Value; document.getElementById("content").innerHTML = value; delete value; value = null; delete cell; cell = null; delete activesheet; activesheet = null; delete workbook; workbook = null; delete workbooks; workbooks = null; Excel.Quit(); delete Excel; Excel = null; This is all wrapped in a try-catch block and I can verify that it's all succeeding. All the deletes and null assignments are my attempt to release any references to the COM objects, but I seem to be missing something. Is there some way I can force the Excel process to unload? A: This is just how Internet Explorer/JScript works — references are held for a period of time until the garbage collector runs. The reference should be garbage collected after a while if you set the variable to null. You can also force it to be collected by using the (relatively undocumented) CollectGarbage() method available to JScript and IE: var Excel = new ActiveXObject("Excel.Application"); //... blah ... Excel.Quit(); Excel = null; window.setTimeout(CollectGarbage, 10); Note that you need to leave a small amount of time (10ms here) before calling CollectGarbage(), otherwise when you call the function the variable may not have been marked for collection yet. Related support article: http://support.microsoft.com/kb/266088 | High | [
0.6781411359724611,
24.625,
11.6875
] |
WASHINGTON (Reuters) - The National Academy of Sciences on Thursday issued a spirited defense of evolution as the bedrock principle of modern biology, arguing that it, not creationism, must be taught in public school science classes. Giant tortoises are seen on the Galapagos islands, April 29, 2007, where British naturalist Charles Darwin conceived his theory of evolution. The National Academy of Sciences on Thursday issued a spirited defense of evolution as the bedrock principle of modern biology, arguing that it, not creationism, must be taught in public school science classes. REUTERS/Guillermo Granja The academy, which operates under a mandate from Congress to advise the government on science and technology matters, issued the report at a time when the theory of evolution, first offered in the 19th century, faces renewed attack by some religious conservatives. Creationism, based on the explanation offered in the Bible, and the related idea of “intelligent design” are not science and, as such, should not be taught in public school science classrooms, according to the report. “We seem to have continuing challenges to the teaching of evolution in schools. That’s something that doesn’t seem to go away,” Barbara Schaal, an evolutionary biologist at Washington University in St. Louis and vice president of National Academy of Sciences, said in a telephone interview. “We need a citizenry that’s trained in real science.” Evolution is a theory explaining change in living organisms over the eons due to genetic mutations. For example, it holds that humans evolved from earlier forms of apes. The report stated that the idea of evolution can be fully compatible with religious faith. “Science and religion are different ways of understanding the world. Needlessly placing them in opposition reduces the potential of each to contribute to a better future,” said the report. But teaching creationist ideas in science classes confuses students about what constitutes science and what does not, according to the report’s authors. The report was released by the academy and the Institute of Medicine, which advises policymakers on medical issues. It updates academy publications issued in 1984 and 1999. It was written by a committee headed by University of California-Irvine biology professor Francisco Ayala. “Biological evolution is one of the most important ideas of modern science. Evolution is supported by abundant evidence from many different fields of scientific investigation. It underlies the modern biological sciences, including the biomedical sciences, and has applications in many other scientific and engineering disciplines,” the report stated. The authors highlighted developments in evolutionary biology, citing its importance in understanding emerging infectious diseases. They noted the discovery, published in 2006, of the remains of a Tiktaalik, a creature described as an evolutionary link between fish and the first vertebrate animals that walked out of water onto land 375 million years ago. President George W. Bush said in 2005 American students should be instructed about “intelligent design” alongside evolution as competing theories. “Part of education is to expose people to different schools of thought,” Bush said. Advocates of “intelligent design” contend that some biological structures are so complex they could not have appeared merely through natural processes. A judge in Dover, Pennsylvania ruled in 2005 that the teaching of intelligent design violated the U.S. Constitution, which requires a separation of church and state, because it is based on religious conviction, not science. A 2006 Gallup poll showed that almost half of Americans believe that humans did not evolve but were created by God in their present form within the last 10,000 years. | High | [
0.690807799442896,
31,
13.875
] |
Q: is there a way to select a child element of an element using css example below should comprehend my question. <div id="bmw" class="car"> <div class="seats">4</div> <div class="fuel">petrol</div> </div> <div id="merc" class="car"> <div class="seats">2</div> <div class="fuel">petrol</div> </div> using css can i select seats element of bmw element. i don wanna add extra class tag to child elements of bmw and how to select seats of all car class elements <div id="bmw" class="car"> <div class="seats">4</div> <div class="fuel">petrol</div> </div> <div id="merc" class="car"> <div class="seats">2</div> <div class="fuel">petrol</div> </div> <div id="mazda" class="truck"> <div class="seats">2</div> <div class="fuel">diesel</div> </div> and how to select element with both car and seat classes <div id="godrej" class="car seat"> <div class="hands">0</div> </div> A: This is pretty basic CSS #bmw .seats { /* your rules go here */ } See, #bmw is an ID selector. .seats is a class selector. If you combined them the way posted it will get all .seats inside #bmw I think you need to learn more about CSS, this is CSS 101 Update To select all .seats inside .car simply use .car .seats { /* your rules go here */ } A: #bmw .seat{} .car .seat{} In the first the rules will apply to all the elements with class seat inside the element with id bmw. In the second the elements that has both the class car and seat. .car.seats{} This will apply for the element with both in Class="" property .car .seats{} //with space in between This will apply for the elements that have parent class as car and child class as seats. | Mid | [
0.6040462427745661,
26.125,
17.125
] |
Michael Flynn, President Donald Trump’s former national security adviser who subsequently pleaded guilty to lying to the FBI and is now cooperating with special counsel Robert Mueller, had a slew of previously unreported conflicts of interest, Bloomberg reported Monday. Flynn’s previously reported conflicts were already damning: He lied to investigators about his contacts with Russia’s ambassador before Trump took office. He and his firm failed to register as foreign agents doing work that, Flynn’s attorney later admitted, “could be construed to have principally benefited the republic of Turkey.” Part of that work included an effort to smear — and possibly kidnap, though Flynn’s lawyer has denied that — Fethullah Gulen, a Muslim cleric living in Pennsylvania who Turkish President Recep Tayyip Erdogan has accused of orchestrating the failed 2016 coup against him. Flynn reportedly put on hold a plan to arm Kurdish forces in the fight against the Islamic State — a move beneficial to the Turkish government — 10 days before before Trump took office, when no one knew Flynn was working as an agent of the Turkish government. He also reportedly promoted a plan to build nuclear power plants across the Middle East in a June 2015 trip he failed to disclose. Bloomberg on Monday reported on conflicts related to Iranian-born businessman Bijan Kian, who was a close business partner of Flynn’s until recently. Flynn’s relationship with Kian goes back to 2008, according to Bloomberg’s report. TPM has previously reported on the pair’s connection via the Nowruz Commission, which promotes and celebrates the Persian New Year. The commission also listed former CIA director Jim Woolsey as an ambassador. In 2013, when Flynn was leading the Defense Intelligence Agency, Kian got Woolsey to set up a meeting between him and Flynn to promote his computer chip company, per the report. Afterward, Flynn tasked the DIA’s chief scientist to “help the chip maker pass military certification standards,” Bloomberg reported, citing unnamed sources Kian briefed. After President Barack Obama fired Flynn in 2014, according to Bloomberg, Kian brought Flynn onto the board of his company, GreenZone Systems Inc. In 2015, GreenZone won a $1.1 million contract from the Defense Department’s Combating Terrorism Technical Support Office, which works with the DIA (but does not report to it, as Bloomberg noted). Later that year, on a previously-reported trip to Saudi Arabia where Flynn promoted nuclear reactors, he also attempted to sell Kian’s computer chip, according to Bloomberg. Flynn then lied about the trip on federal disclosure forms, according to the report. A year after that trip, according to Bloomberg, Kian met with staffers from the House Homeland Security Committee in late 2016 to once again promote GreenZone products. He then changed topics suddenly, according to the report, and “abruptly ushered in another group with an entirely separate and unexpected agenda” — the demonization of Gulen, the Muslim cleric. Finally, Bloomberg reported, citing unnamed sources who worked on the 2016 presidential transition, that Kian and Flynn worked on a proposal to create an intelligence force of private contractors that would report directly to the national security adviser, circumventing the CIA. According to the report, Flynn was fired in February 2017 before he could “shepherd those plans into action.” Rep. Elijah Cummings (D-MD), the ranking member of the House Oversight Committee and perhaps the legislator most attentive to Flynn’s various business dealings and ethics violations, told Bloomberg News that the newly reported conflicts indicate “that General Flynn’s use of public positions for profit was far more wide-ranging than previously known.” “We have been raising red flags and requesting documents about these issues for the past year,” Cummings told Bloomberg. “But the White House continues to stonewall us, and Republicans in Congress continue to wall off the White House from serious oversight.” | Mid | [
0.6427503736920771,
26.875,
14.9375
] |
Whats the best way to deal with wax on the black trim. I have scrubbed it off with a brush later, (or sooner) masked it, covered it up, or just be real careful, which is tough with a buffer. Whats the best way | Mid | [
0.5887640449438201,
32.75,
22.875
] |
s picked without replacement from {s: 1, i: 3, o: 9, n: 4, j: 2}? 1/323 Calculate prob of sequence aa when two letters picked without replacement from {a: 17, n: 1}. 8/9 Two letters picked without replacement from {w: 5, i: 1, z: 1, x: 2}. What is prob of sequence xw? 5/36 What is prob of sequence eehh when four letters picked without replacement from eeheeehee? 1/36 What is prob of sequence wnwk when four letters picked without replacement from {n: 4, y: 1, w: 6, l: 1, k: 1}? 1/143 Three letters picked without replacement from {r: 4, x: 15}. Give prob of sequence rxx. 140/969 What is prob of sequence cmi when three letters picked without replacement from {i: 5, o: 6, m: 1, c: 6}? 5/816 Calculate prob of sequence ceqe when four letters picked without replacement from znjcqzqzznzee. 1/4290 Four letters picked without replacement from buakuamme. Give prob of sequence ebmm. 1/1512 Three letters picked without replacement from {f: 4, a: 9, w: 3}. What is prob of sequence awa? 9/140 What is prob of sequence ccs when three letters picked without replacement from ssscckcsskckscccc? 7/85 What is prob of sequence xu when two letters picked without replacement from guuuxxxsuuuxg? 2/13 What is prob of sequence ufm when three letters picked without replacement from {m: 2, u: 1, f: 1}? 1/12 Two letters picked without replacement from vyyytttytv. What is prob of sequence ty? 8/45 Three letters picked without replacement from {m: 3, w: 1}. Give prob of sequence wmm. 1/4 Calculate prob of sequence zjcz when four letters picked without replacement from {z: 2, j: 2, c: 3, g: 4}. 1/660 Two letters picked without replacement from gebjwjyy. What is prob of sequence ey? 1/28 Three letters picked without replacement from rsbrrbrsbbb. What is prob of sequence srb? 4/99 What is prob of sequence eeyv when four letters picked without replacement from {e: 2, y: 1, v: 2}? 1/30 Calculate prob of sequence oott when four letters picked without replacement from ttottttoooot. 7/99 Two letters picked without replacement from ucwjnnnjnknncn. What is prob of sequence nk? 1/26 What is prob of sequence ucc when three letters picked without replacement from urrptrrrtctuttrtrc? 1/1224 Calculate prob of sequence dm when two letters picked without replacement from {o: 1, t: 1, d: 1, m: 1, a: 1}. 1/20 Calculate prob of sequence zz when two letters picked without replacement from zzozzvkzozpv. 5/22 What is prob of sequence ve when two letters picked without replacement from zzvzkevjevkvkkkezvve? 6/95 Four letters picked without replacement from lxlxxllxxxlll. What is prob of sequence lxxl? 21/286 Three letters picked without replacement from {y: 11, e: 2}. Give prob of sequence yye. 5/39 Three letters picked without replacement from {c: 2, d: 2}. Give prob of sequence dcd. 1/6 Calculate prob of sequence rd when two letters picked without replacement from {r: 1, x: 1, u: 2, d: 9}. 3/52 Calculate prob of sequence zm when two letters picked without replacement from {m: 1, y: 1, o: 1, r: 2, w: 8, z: 3}. 1/80 Three letters picked without replacement from {p: 3, i: 9}. Give prob of sequence iii. 21/55 Three letters picked without replacement from orpdpopdososlsd. What is prob of sequence sds? 3/455 Three letters picked without replacement from {u: 1, y: 3, b: 1, p: 2, a: 3, f: 1}. What is prob of sequence pba? 1/165 What is prob of sequence cch when three letters picked without replacement from {h: 3, c: 7}? 7/40 What is prob of sequence bb when two letters picked without replacement from ygbphpi? 0 What is prob of sequence zx when two letters picked without replacement from {x: 6, n: 3, z: 1, a: 4}? 3/91 Four letters picked without replacement from {n: 3, c: 8, r: 7}. What is prob of sequence rnrc? 7/510 What is prob of sequence dvv when three letters picked without replacement from vddvv? 1/5 Calculate prob of sequence aaah when four letters picked without replacement from {a: 3, h: 1, q: 16}. 1/19380 Calculate prob of sequence ehh when three letters picked without replacement from eheeheehheehhhhh. 3/20 What is prob of sequence qqq when three letters picked without replacement from {q: 5}? 1 Three letters picked without replacement from {d: 1, c: 1, s: 4, v: 3, q: 2, t: 1}. What is prob of sequence dss? 1/110 What is prob of sequence vbe when three letters picked without replacement from uhphvbbhhehbp? 1/572 What is prob of sequence zr when two letters picked without replacement from {z: 2, h: 2, c: 10, r: 4, i: 1}? 4/171 What is prob of sequence ydd when three letters picked without replacement from ydyyydycydycyccdy? 9/340 Two letters picked without replacement from pbppyxbeebbbbbxeepb. What is prob of sequence pb? 16/171 What is prob of sequence yddu when four letters picked without replacement from udduduy? 3/140 Three letters picked without replacement from {u: 1, i: 1, r: 2, e: 1, t: 2}. What is prob of sequence ute? 1/105 Four letters picked without replacement from {x: 1, q: 1, m: 1, o: 1, z: 6, l: 3}. Give prob of sequence oqxl. 1/5720 Two letters picked without replacement from umm. Give prob of sequence um. 1/3 Four letters picked without replacement from {m: 5, y: 2}. Give prob of sequence mymm. 1/7 Calculate prob of sequence cwoc when four letters picked without replacement from wcswwnwewwwcwwcocwc. 25/11628 What is prob of sequence xrn when three letters picked without replacement from {r: 1, d: 1, s: 1, x: 1, n: 1}? 1/60 Calculate prob of sequence hhee when four letters picked without replacement from ehhhheh. 1/21 What is prob of sequence aahh when four letters picked without replacement from vavvvavvvvvvhhv? 1/8190 Calculate prob of sequence ba when two letters picked without replacement from {i: 6, b: 7, a: 1, e: 3}. 7/272 Two letters picked without replacement from ojeooeejoffffoejo. Give prob of sequence ef. 1/17 Calculate prob of sequence ya when two letters picked without replacement from ayavfwvl. 1/28 Two letters picked without replacement from cgabw. Give prob of sequence gw. 1/20 Two letters picked without replacement from ljiyiy. Give prob of sequence iy. 2/15 Four letters picked without replacement from {c: 2, s: 1, b: 2, l: 1, j: 3, v: 3}. What is prob of sequence jsjl? 1/1980 Two letters picked without replacement from ibcdiggm. Give prob of sequence mi. 1/28 Calculate prob of sequence ge when two letters picked without replacement from oeuoueogeeuouuuuuoe. 5/342 Three letters picked without replacement from {d: 2, t: 1, a: 1, c: 1, r: 1, o: 2}. Give prob of sequence rtd. 1/168 Calculate prob of sequence ff when two letters picked without replacement from {f: 5, g: 2, x: 6}. 5/39 Three letters picked without replacement from {u: 2, m: 5, g: 4}. Give prob of sequence umu. 1/99 Calculate prob of sequence rm when two letters picked without replacement from myyyyyyllrxhyhhlhhll. 1/380 Three letters picked without replacement from {b: 6, z: 1, l: 5, t: 6}. Give prob of sequence lbl. 5/204 What is prob of sequence tttt when four letters picked without replacement from {t: 5}? 1 Two letters picked without replacement from {y: 1, f: 8, s: 5, e: 2}. What is prob of sequence sf? 1/6 Two letters picked without replacement from xuxqyee. What is prob of sequence uq? 1/42 Two letters picked without replacement from {d: 2, q: 6, x: 2, j: 1, o: 7}. What is prob of sequence jd? 1/153 Four letters picked without replacement from {v: 4, t: 5, l: 8}. Give prob of sequence tvll. 1/51 Calculate prob of sequence wk when two letters picked without replacement from wcwcwckcccwcww. 3/91 What is prob of sequence yg when two letters picked without replacement from bbjbbxybbbxxbgbbxj? 1/306 What is prob of sequence tt when two letters picked without replacement from {t: 9}? 1 Three letters picked without replacement from {c: 1, i: 5, d: 11}. Give prob of sequence iii. 1/68 What is prob of sequence jk when two letters picked without replacement from kxjkjjkjjkkjkj? 3/13 Two letters picked without replacement from {w: 4, k: 2, o: 1, f: 6, c: 3, r: 3}. Give prob of sequence fw. 4/57 What is prob of sequence lk when two letters picked without replacement from ppllslskllpps? 5/156 Three letters picked without replacement from butwtwbwbtwwbwwtbie. What is prob of sequence wbi? 35/5814 Four | Mid | [
0.5620915032679731,
32.25,
25.125
] |
Brassinosteroids, microtubules and cell elongation in Arabidopsis thaliana. I. Molecular, cellular and physiological characterization of the Arabidopsis bull mutant, defective in the delta 7-sterol-C5-desaturation step leading to brassinosteroid biosynthesis. Although cell elongation is a basic function of plant morphogenesis, many of the molecular events involved in this process are still unknown. In this work an extremely dwarf mutant, originally named bul, was used to study one of the main processes of plant development, cell elongation. Genetic analyses revealed that the BUL locus was linked to the nga172 marker on chromosome 3. Recently, after mapping the new dwf7 mutation of Arabidopsis, which is allelic to ste1, it was reported that dwf7 is also linked to the same marker. Sterol analyses of the bull-1 mutant indicated that bul1-1 is defective in the delta 7-sterol-C5-desaturation step leading to brassinosteroid biosynthesis. Considering these findings, we designated our bul mutant as bul1-1/dwf7-3/ste1-4. The bul1-1 mutant was characterized by a very dwarf phenotype, with delayed development and reduced fertility. The mutant leaves had a dark-green colour, which was probably due to continuous stomatal closure. The bul1-1 mutant showed a partially de-etiolated phenotype in the dark. Cellular characterization and rescue experiments with brassinosteroids demonstrated the involvement of the BUL1-1 protein in brassinosteroid-dependent plant growth processes. | High | [
0.6778242677824261,
30.375,
14.4375
] |
Georg Brunnhuber Georg Brunnhuber (born 18 February 1948 in Oberkochen) is a German politician of the Christian Democratic Union (CDU). He served as a member of the German parliament, the Bundestag, from 1990 until 2009, having been elected in the 1990, 1994, 1998, 2002 and 2005 federal elections. He represented the constituency of Ostwürttemberg (eastern Württemberg), that consists of the districts of Heidenheim and Ostalbkreis in eastern Baden-Württemberg, and was the leader of the parliamentary group of the CDU representatives from Baden-Württemberg. As a member of parliament, he served on the committee for transport and the committee for construction and housing, and was deputy spokesman for transport of the CDU/CSU parliamentary group. From 2005, he was spokesman of the leaders of the CDU state groups of representatives, and a member of the executive committee of the CDU/CSU parliamentary group. In 2008, he made public that he would not stand for reelection in 2009. He was succeeded in 2009 by Roderich Kiesewetter. Brunnhuber serves on the supervisory board of Deutsche Bahn. Georg Brunnhuber is an engineer by profession. He is catholic, married and has two daughters. References External links Category:1948 births Category:Living people Category:People from Ostalbkreis Category:Christian Democratic Union of Germany politicians Category:Members of the Bundestag for Baden-Württemberg Category:21st-century German politicians | High | [
0.671717171717171,
33.25,
16.25
] |
1 866 396 4231 Story Transcript Recently, Bill Maher accused liberals, American liberals, as being soft on Islam while they’re being hypercritical of the American right. Here’s what he had to say. … Our guest on Reality Asserts Itself thinks all of that is Islamophobic. And now joining us in the studio to talk about all of this is Deepa Kumar. Deepa is an associate professor of media studies at Rutgers University and also serves as an officer in the teachers union. She’s authored two books, including Outside the Box: Corporate Media, Globalization, and the UPS Strike, and her latest is Islamophobia and the Politics of Empire. She’s currently working on her next book, titled Constructing the Terrorist Threat: The Cultural Politics of the National Security State. Thanks for joining us. DEEPA KUMAR, ASSOC. PROF. MEDIA STUDIES AND MIDEAST STUDIES, RUTGERS UNIV.: Thank you for having me. It’s an honor to be here. JAY: Now, usually we start with your personal back story, but because I’ve already teased the Bill Maher thing, we’re going to have to do the Bill Maher thing and then in the next segment do the back story,– KUMAR: That sounds good. JAY: –because I think everyone’s going to want to hear how you trash Bill Maher and why. KUMAR: Yes. JAY: So what’s wrong with what Bill Maher said? Bill Maher is saying that there’s a great denial of rights in much of the Muslim world, not just Islamic State, but Saudi Arabia and so on, and there isn’t a lot of loud critique about it. And certainly the American left spends a lot more time critiquing the domestic right. So doesn’t he have a point? KUMAR: Well, what Bill Maher said is a perfect example of what I call liberal Islamophobia, which is to take up liberal themes, such as human rights, women’s rights, the rights of gays and lesbians, the right to free speech, and so on and makes a case of the so-called Muslim world, like it is one big monolith in which these rights are uniformly denied to people, and then proceeds to equate, in essence, the politics of ISIS with the politics of the 1.5 billion people who practice Islam, when in fact you actually look at Muslim majority countries, which is the term that I prefer, they vary widely in terms of, for instance, the status of women. In Bangladesh, for instance, we’ve had two women heads of state voted into power, Khaleda Zia and Sheikh Hasina. But in Saudi Arabia, women aren’t allowed to drive. And so of course there are these kinds of examples from Muslim majority countries like Saudi Arabia, like Iran, where women’s rights are restricted. But by focusing just on those and somehow equating this to a problem of Islam as opposed to a problem of politics, he winds up perpetuating this notion that all Muslims are backward, which is the very essence of Islamophobia. JAY: He does something else, too. He ascribes, essentially, fundamentalism about the Quran, and then all believers in Islam are somehow also fundamentalists. KUMAR: Right. JAY: But he doesn’t do that for Christianity, because there’s just as much craziness in the Bible as there is in the Quran, I think. I don’t know. Maybe it could be there’s a little more. I don’t know. KUMAR: No, you know, any religious text, whether it’s the Quran or the Bible and so on, can be interpreted in multiple ways. There are progressive interpretations of it and then there are reactionary interpretations of it. And therefore–you know, I mean, think of this example. Imagine if for every act of terror committed by a Christian fundamentalist, a far-right militia person like Wade Michael Page, who went to Oak Creek, Wisconsin, and shot a gun at a Sikh temple and killed people and so on, now imagine if we were to generalize from Wade Michael Page to all of Christiandom, to all of the United States, and say, now everybody else should denounce this man and distance themselves from him; otherwise, you’re all culpable. Now, that’s completely ridiculous, and of course that would be ridiculous if we talk about Christians in the West, but apparently it’s completely acceptable when it comes to talking about Muslims. And so even President Obama said moderate Muslims should separate themselves from ISIS and from other groups and so on. Why? In what way, shape, or form are regular Muslims responsible for fundamentalism any more than regular Christians are responsible for Christian fundamentalism or regular Jews for Jewish fundamentalists? You get the idea. We see those people as being the extreme wing of a particular religious interpretation. JAY: But is there a little reluctance in the American left, especially when it comes to the Islamic State, of being really harsh about what they are? I mean, you may not want to use the word fascistic, just because fascism has sort of more modern implications in terms of Europe, but it has a lot of things in common in terms of they seem quite capable of genocide, they seem quite capable of killing people just because of their beliefs. KUMAR: Oh, of course. JAY: I mean, it’s a pretty barbaric thing. KUMAR: No doubt. JAY: Now, I just want to add one thing in saying that, just to the audience–they’ve heard me say this before. There is nothing the Islamic State has done that compares to the barbaric activity that the United States has done in Iraq and on and on, going right back to the atomic bombing of Japan. So if we’re talking scale here, the Islamic State is a whisper of what the United States has done. That being said, one does not need to hold back on describing IS as a barbaric, brutal force that the people of the region on the whole, you would think, will despise, just as much as most Afghans despise the Taliban. KUMAR: Absolutely. I completely agree with that. I think that–you know, in my book, actually, I have a pretty strong critique of the parties of political Islam, and I don’t think we should be soft on that. There was a tendency back in the 1970s, you know, when Foucault goes to Iran and so on, to see–particularly in France there was a tendency to somehow see the Islamists as being progressive and painting with progressive colors the Iranian Revolution and so forth. But I don’t think that tendency exists anymore. I think, if anything, one of the first few pieces that I wrote on this topic is about the left and their attitudes towards political Islam, is how ignorant the left was in terms of, actually, Islamophobia and in terms of sort of equating the Islamists with all of Islam and all of Muslims and so forth. So I think that there is, in the United States especially, a sort of blind spot around Islamophobia and a lack of a nuanced analysis of who these groups are, why they come to power, and what the historic conditions are for their rise. JAY: It seems to me where he is–one is this part of where he extends this to anyone who believes in Islam and tries to make Islam itself and come up with some quotes from the Quran that are particularly backward is one thing. But the second thing, which is this idea that he talks about our society having liberal values and free speech and this and that, you can argue what that’s becoming and with this national surveillance state and so on, but it’s still true. I mean, compared to a lot of societies,– KUMAR: Yes, but I’ll take–. JAY: –we can have this–well, let me just finish my point. I mean, we can have this conversation, and we’re not going to walk out and get arrested. KUMAR: Right. JAY: That being said, it’s at home you have those things. The United States has 50, 60 years of supporting the worst kind of dictatorships everywhere, and particularly in the Middle East, whether it’s supporting the Saudis and so on and so on. There’s no support for these kind of values when it conflicts with American interests abroad. KUMAR: Right. The part where I interrupted you, what I was going to say is that the narrative that gets constructed in the West and that Bill Maher and people like that are echoing is the clash of civilizations rhetoric, right, which was coined by Bernard Lewis and then popularized by Samuel Huntington, which is the idea that in the post-Cold War period, conflict would no longer be political, it will be cultural, and that there were seven or eight civilizations, each with their own unique cultures–the West and the Islamic world and so on–and that they are bound to conflict with each other. The problem–I mean, there are any number of problems. It’s ahistorical, it’s just wrong, and so on. But the problem I have with it, one problem, at least, is that it negates the fact that the rights that people do have in this country, whether you’re talking about workers’ rights, the rights of African Americans to vote, the right of women to vote, this didn’t happen automatically because some benevolent president decided. It’s people’s movements, it’s women fighting for 100 years and their male allies that caused suffrage, right? And, therefore, somehow to assume the liberal mantle as being the natural inheritance of what it means to be the West, starting from Greece to the present, and seeing the East, particularly Muslim majority countries, as being mired in barbarism, this is the classic language of colonialism, which whether Bill Maher knows it or not, that is what he’s echoing. And, in fact, even in the East you’ve had–you know, in Iran, in Egypt, you’ve had Feminist movements, you’ve had women’s rights movements, which we barely ever hear of. JAY: Well, the roots of this go right back to the early days of the Catholic Church and the fighting against–the Crusades, and then the Ottoman Empire. I mean, it wasn’t about liberal values then. It was about the true god, and they got the bad god, and we’re going to fight it out. But it’s kind of–the roots of it go very deep. KUMAR: Absolutely, which is why my book is called Islamophobia and the Politics of Empire and it starts with the Crusades, because every empire needs an enemy. And at least one of the motivations for the Crusades was to create this ideal Muslim enemy, which could then motivate people to go out and fight wars. But it was always–there was always a very contradictory notion of how to look at the East, because even while the Crusades are going on, you have the most horrific stereotypes of Muslims and all the rest of it. In al-Andalus, which is the name given to Muslim rule in the Iberian Peninsula–Spain and Portugal–you see the most advanced civilization. Remember, Europe is in the dark ages at this time, right, and here in al-Andalus you have street lighting, you have developments in science, medicine, and so on. In that region, Europeans had a very positive idea of Muslims and what they developed because they had actual contact with them. So, typically this idea of a Muslim enemy works when people have never met anybody from the Middle East or North Africa or have never traveled. And then the stereotypes can work, just as it’s working in the case of ISIS and scaring people to death. JAY: But I think one of the things that always gets missed in this conversation in the mainstream media is that these are class societies we’re talking about, the Muslim societies, Arab societies. And in many of them, the classes that are in power are barbaric and they are backward and they do call up the worst of whatever you can call up in Islam, the same way you can find in Christian fanatical regimes in Latin America and other times. KUMAR: Absolutely. JAY: But you do get–I go back to Maher’s point, even though I think–I mean, I agree with you; the way he formulates it is Islamophobic, but there is a kind of reluctance. Like, even on Iran for example–and this is not so much an Islamic issue, although it’s a bit of it–much of the left in the United States is very reluctant to say something critical of the Iranian regime. The Iranian regime suppresses–I’m not talking liberal now. Democratic liberals, of course they trash Iran. I’m talking about the left, who only want to talk about U.S. sanctions against Iran and the U.S. aggression against Iran and so on and so on, and they just won’t say a word about the way Iranian state suppresses its own people. And you get a bit of that. I think that’s part of what Maher is trying to put his finger on, even though I think he’s doing it in a brutal and–you know. KUMAR: I mean, I think there are two ways of doing this, right? On the one hand, there’s the sort of Bill Maher of way of doing it, which is then to present the U.S. government as somehow a force for good in the region, right? This is the old white man’s burden. JAY: But when he’ll talk about the Iraq War, he’ll trash American policy on Iraq. It’s on this issue where he doesn’t like what he thinks is a kind of hypocrisy. I mean, I think he’s completely naive on how he formulates it. KUMAR: I would formulate it differently, which is that I certainly have critiques of the dictatorships and of the censorship and of the violation of workers’ rights, for instance, in Iran and so on. But the fact of the matter is that you’ve had very important people from Iran, like Shirin Ebadi, the Nobel Peace Prize winner, who has exposed the extent of civil rights violations, human rights violations, and so on. And the key, I think, is to have solidarity, international solidarity, and to speak about the problems, whether it’s workers’ rights, women’s rights, what have you, in terms of how we can get together from a grassroots level to fight back. That’s a very different kind of framing, as opposed to Bill Maher saying, well, all of these Muslim societies are no different from ISIS. JAY: I think part of it is–and I think you mentioned this in the beginning–it’s completely ahistorical, what he says. Like, if you’re in any of the Muslim countries and you see what American policy in the Middle East has been, you are going to–unless you’re in the elite and you somehow benefit from it, but even amongst the elites I think there’s going to be resentment, and you’re going to have–. The thing is is: what else is there to have some sympathy for than the Islamist opposition? Why? Because the American policy and the Israeli policy destroyed the secular opposition. KUMAR: That’s right. That’s right. And this has been happening through the course of the Cold War, when it was clear that the secular nationalists, whether you’re talking about Gamal Abdel Nasser in Egypt or you’re talking about Mohammad Mosaddegh in Iran, when it was discovered that they couldn’t be co-opted to serve the U.S.’s interests in the region, the key policy from 1958 on with the Eisenhower doctrine was to create an Islamic bulwark to act as a counter to secular nationalism. And you read some of the accounts of what the CIA is doing, and they’re putting poison into Nasser’s cigarettes, they’re trying to put poison into his chocolates, some of these sorts of awful things that you think happen only in the movies. But at a very systemic level what they’re doing is funding and sponsoring all sorts of radical Islamist groups, all the way from Iran and across the region. JAY: Well, and most importantly it starts with Roosevelt, the deal with the Sauds. I mean, the Saudis are the heart of all of this. And this was the deal, that the Saudis would use the defense of Mecca to be the force to spread Wahhabism throughout the region, and all this extremism is part of American policy. KUMAR: Absolutely. In fact, the language that they used in the State Department is that they wanted the Saudi monarch to be an Islamic Pope and to use the legitimacy of being the guardians of Mecca and Medina to actually push people away from secularism. So absolutely. And Saudi Arabia had a very systematic program of Islamization, whether it was distributing Qurans for free, whether it was giving tons of petrodollars for setting up madrasas all over. Not just in the Middle East, but even in Pakistan they set up schools and colleges and send their preachers there and so forth. And the end result is the mujahideen, is al-Qaeda. And, I mean, I think that’s really important to bring up, because there’s a tendency to somehow think of the parties of political Islam as being the sort of logical outcome of this region–you know, this is all that Muslims can produce. But if you don’t talk about how left secular alternatives were systematically crushed by the U.S., by Saudi Arabia, by Israel, and so on, then you don’t get a sense that these are people just like anybody else who have a range of politics. JAY: And not only left-secular; they destroyed in Afghanistan a more normal capitalist development. They had a king that was a modernizer. They wanted to have a more modern capitalism. And they threw it all out the window to suck Russia into a war and then arming all the jihadists and, I mean, village elders who, I mean, didn’t know anything, give them rocket launchers, and they become the new powerbrokers. And then you wonder where the Taliban comes from. KUMAR: Right. In fact, every single reformist and pro-democratic movement that has come into being in the Middle East and North Africa, the U.S. has always been on the wrong side of it, even in Saudi Arabia. There was a modest movement called the Free Princes Movement, where they wanted a constitutional monarchy. Would the U.S. have any of it? Absolutely not. They immediately dispatched forces to make sure these forces are marginalized. There was a workers movement in the Shia eastern region trying to form unions, but Aramco, at that time American-owned, would have none of it. And so they got rid of that. So every step towards creating rights for a whole group of people, from workers to women and so on and so forth, the U.S. is always been on the wrong side, including after the Arab Spring of 2011, right? So you look at the role that the U.S. is played: support the dictators till the very last second, and then back to counterrevolutionaries, whether it’s Egypt and the military or it’s giving the green light to Saudi Arabia to crush the resistance in Bahrain, what have you. The U.S. has always–. JAY: Or, first of all, make a deal with Qatar to have Muslim Brotherhood. KUMAR: Exactly. JAY: And then let–they know if that were to perpetuate as a regime, they weren’t headed towards any grand democracy. KUMAR: Right. Right. And so I think that framework is important, because then you start to see that the people of the Middle East and North Africa are just like everybody else. They want economic rights. They want political rights and so on. And if the U.S. just stopped interfering, we would see a flowering of a different kind of society. JAY: Okay. So here’s a challenge to Bill Maher. So if somebody out there knows Bill Maher, get him to watch this, ’cause, you know, he’s not bad a lot of things. You know, he seems to be kind of evolving in his thinking. But he seems rather stuck on this issue. So anybody who knows Bill Maher–and we know we’ve got lots of viewers in L.A., in Hollywood. So shove this thing in front of his eyeballs and see if he has the courage to have Deepa or Deepa and me on the show and let’s talk about this, because so far he’s kind of buying into some ignorance. So we’re going to continue this conversation. Please join us for the next part of Reality Asserts Itself on The Real News Network. End DISCLAIMER: Please note that transcripts for The Real News Network are typed from a recording of the program. TRNN cannot guarantee their complete accuracy. Related Bios Deepa Kumar is an Associate Professor of Media Studies and Middle Eastern Studies at Rutgers University. Her work is driven by an active engagement with the key issues that characterize our era–neoliberalism and imperialism. Her first book, Outside the Box: Corporate Media, Globalization and the UPS Strike (University of Illinois Press, 2007), is about the… TheRealNewsNetwork.com, RealNewsNetwork.com, The Real News Network, Real News Network, The Real News, Real News, Real News For Real People, IWT are trademarks and service marks of Independent World Television inc. "The Real News" is the flagship show of IWT and The Real News Network. All original content on this site is copyright of The Real News Network. Click here for moreProblems with this site? Please let us know | Low | [
0.48559670781893005,
29.5,
31.25
] |
Q: Compact command line argument parser So, I decided to write my own little command line argument parser for various other projects I work on. I am aware that there are many good command line parser libraries, but I did wrote my own anyway (practice & implementation specific reasons). The parser works fine, but I have a feeling that it can be improved a lot, mainly the following things come to mind Mainly the actual parser, CommandLineParser.cs. It seems very badly structured and I find it hard to read myself. Abstraction. I wonder if I can abstract it a bit more without making it a pain to use? Maybe by introducing some interfaces? Naming. I went with Option for the command line switch and with Value for the possible parameters. Are my methods/classes self-descriptive? Optimizations. I am sure there are segments that can be done more efficiently, mainly in CommandLineParser.ParseArguments(string[] args) A couple of things to note: I'd like to keep the structure for the CommandLineValue.cs and CommandLineOption.cs mostly the same as they are part of a plugin architecture to communicate command line arguments between the plugins and the main application. No usage of Attributes to store the command line options. I did write a couple of unit tests to verify the parsers functionality. Despite them being not the main class to review, I am appreciate feedback there too :) Parser: public class CommandLineParser { /// <summary> /// Defines all possible command line options the plugin can can process /// </summary> public List<CommandLineOption> SupportedOptions { get; } /// <summary> /// Initialize the commandline parser with a list of commandline options the plugin exposes /// </summary> /// <param name="supportedOptions"></param> public CommandLineParser(List<CommandLineOption> supportedOptions) { SupportedOptions = supportedOptions; } /// <summary> /// Parse the command line arguments and returns a list of commandline values that can be passed to the /// plugin for further processing. The function also handles invalid amount and/or format of options, values /// as well as missing required arguments etc /// </summary> /// <param name="args">The arguments to parse</param> /// <returns>A list of parsed commandline values + options</returns> /// <exception cref="InvalidCommandLineOptionException"></exception> /// <exception cref="InsufficientCommandLineValuesException"></exception> /// <exception cref="InvalidCommandLineValueException"></exception> /// <exception cref="MissingRequiredCommandLineOptionException"></exception> public IEnumerable<CommandLineValue> ParseArguments(string[] args) { var result = new List<CommandLineValue>(); if (args.Length == 0) return Enumerable.Empty<CommandLineValue>(); // Process all command line arguments for (int i = 0; i < args.Length; i++) { CommandLineOption option = null; if (!IsSupportedOption(args[i], out option)) throw new InvalidCommandLineOptionException($"{args[i]} is not a valid command line option"); // Verify if the option expects additional values if (HasAdditionalValues(option)) { // Check if enough additional values are given int additionalValues = option.ParameterTypes.Count; if (i + additionalValues + 1 > args.Length) throw new InsufficientCommandLineValuesException( $"{args[i]} expects {additionalValues} values."); // Check if the additional values are in the right format // ToDo: Find more elegant solution var values = args.ToList().GetRange(i + 1, i + additionalValues).ToList(); var types = option.ParameterTypes.ToList(); var castedValues = values.Zip(types, (value, type) => { try { return Convert.ChangeType(value, type); } catch { throw new InvalidCommandLineValueException( $"Cannot cast between value {value} to type {type}"); } }); result.Add(new CommandLineValue(option, castedValues.ToList())); // Increase i to skip to the next option i += additionalValues; } else { result.Add(new CommandLineValue(option, null)); } } // Collect required arguments List<string> requiredOptions = new List<string>(); foreach (var option in SupportedOptions) { if (option.Required) foreach (var tag in option.Tags) { requiredOptions.Add(tag); } } // Check that no required arguments are missing (or occur twice) var missing = GetMissingRequiredArgs<string>(requiredOptions, args.ToList()); if (missing == null) return result; throw new MissingRequiredCommandLineOptionException( $"The required arument(s) {string.Join(",", missing)} occured multiple times"); } /// <summary> /// Check that all required options are used and that they (the required options) dont occur multiple times are no duplicates /// </summary> /// <param name="required">A list of required options</param> /// <param name="arguments"><The args to check</param> /// <typeparam name="T">Any primitive type</typeparam> /// <exception cref="MissingRequiredCommandLineOptionException">Thrown if any distinct required arguments exist more then once</exception> /// <returns>A list of missing required args, if any. Null if none are missing.</returns> static List<T> GetMissingRequiredArgs<T>(List<T> required, List<T> arguments) { // convert to Dictionary where we store the required item as a key against count for an item var requiredDict = required.ToDictionary(k => k, v => 0); foreach (var item in arguments) { if (!requiredDict.ContainsKey(item)) continue; requiredDict[item]++; // if we have required, adding to count if (requiredDict[item] <= 1) continue; throw new DuplicateRequiredCommandLineOptionException( $"Required option {item} appeared more than once!"); } var result = new List<T>(); // now we are checking for missing items foreach (var key in requiredDict.Keys) { if (requiredDict[key] == 0) { result.Add(key); } } return result.Any() ? result : null; } /// <summary> /// Verify if given option is part of the supported options /// </summary> /// <returns>true if the option is supported otherwise false</returns> private bool IsSupportedOption(string optionIdentifier, out CommandLineOption option) { for (var index = 0; index < SupportedOptions.Count; index++) { var supportedOption = SupportedOptions[index]; if (supportedOption.Tags.Any(tag => tag == optionIdentifier)) { option = SupportedOptions[index]; return true; } } option = null; return false; } /// <summary> /// Indicates if a command line option has multiple values or if its just a flag /// </summary> /// <param name="option">Commandlineoption to check</param> /// <returns>true if the option has multiple values, otherwise false</returns> private bool HasAdditionalValues(CommandLineOption option) { var noParameters = option.ParameterTypes == null || option.ParameterTypes.Count == 0; return !noParameters; } } Classes to store commandline information: public class CommandLineOption { /// <summary> /// The identifier of the commandline option, e.g. -h or --help /// </summary> public ICollection<string> Tags { get; } /// <summary> /// Description of the commandline option /// </summary> public string Description { get; } /// <summary> /// Indicates if the argument is optional or required /// </summary> public bool Required { get; } /// <summary> /// Types of the additional provided values such as directory paths, values etc .. /// </summary> public IList<Type> ParameterTypes { get; } /// <summary> /// Create a new true/false commandline option /// </summary> /// <param name="tags">Identifier of the command line option</param> /// <param name="description">Description of the command line option</param> /// <param name="required">Indicates if the command line option is optional or not</param> public CommandLineOption(IEnumerable<string> tags, string description, bool required = false) { Tags = tags.ToList(); Description = description; Required = required; } /// <summary> /// Create a new true/false commandline option /// </summary> /// <param name="tags">Identifier of the command line option</param> /// <param name="description">Description of the command line option</param> /// <param name="required">Indicates if the command line option is optional or not</param> public CommandLineOption(IEnumerable<string> tags, string description, bool required = false, params Type[] parameterTypes): this(tags, description, required) { ParameterTypes = new List<Type>(parameterTypes); } } public class CommandLineValue : IEqualityComparer<CommandLineValue> { /// <summary> /// Holds all the values specified after a command line option /// </summary> public IList<object> Values { get; } /// <summary> /// The command line option the value(s) belong to /// </summary> public CommandLineOption Option { get; set; } /// <summary> /// Stores the values that correspond to a commandline option /// </summary> /// <param name="option">The commandline option the values refer to</param> /// <param name="values">The values that are stored</param> public CommandLineValue(CommandLineOption option, IList<object> values) { Option = option; Values = values; } public bool Equals(CommandLineValue x, CommandLineValue y) { if (x.Option.Description == y.Option.Description && x.Option.Required == y.Option.Required && x.Option.Tags.SequenceEqual(y.Option.Tags) && x.Option.ParameterTypes.SequenceEqual(y.Option.ParameterTypes) && x.Values.SequenceEqual(x.Values)) return true; return false; } public int GetHashCode(CommandLineValue obj) { return base.GetHashCode(); } } Custom Exception Classes: public class DuplicateRequiredCommandLineOptionException : Exception { public DuplicateRequiredCommandLineOptionException(string message) : base(message) { } } public class InsufficientCommandLineValuesException : Exception { public InsufficientCommandLineValuesException(string message) : base(message) { } } public class InvalidCommandLineOptionException : Exception { public InvalidCommandLineOptionException(string message) : base(message) { } } public class InvalidCommandLineValueException : Exception { public InvalidCommandLineValueException(string message) : base(message) { } } public class MissingRequiredCommandLineOptionException : Exception { public MissingRequiredCommandLineOptionException(string message) : base(message) { } } Unit Tests: public class CommandLineParserTests { [Fact] public void ParseDuplicateRequiredArguments() { var args = new[] {"--randomize", "-o", "/home/user/Documents", "--randomize", "-d"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption( new[] {"-r", "--randomize"}, "Random flag", true), new CommandLineOption( new[] {"-o", "--output-directory"}, "Specifies the output directory", true, typeof(string)), new CommandLineOption( new[] {"-d", "--dummy"}, "Just another unused flag"), }; var parser = new CommandLineParser(supportedOptions); Assert.Throws<DuplicateRequiredCommandLineOptionException>(() => parser.ParseArguments(args) ); } [Fact] public void ParseMissingRequiredArguments() { var args = new[] {"--randomize", "--output-directory", "/home/user/Documents"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption( new[] {"-r", "--randomize"}, "Random flag"), new CommandLineOption( new[] {"-o", "--output-directory"}, "Specifies the output directory", true, typeof(string)), new CommandLineOption( new[] {"-d", "--dummy"}, "Just another unused flag"), }; var parser = new CommandLineParser(supportedOptions); Assert.Throws<MissingRequiredCommandLineOptionException>(() => parser.ParseArguments(args) ); } [Fact] public void ParseMatchingTypeCommandLineValues() { var args = new[] {"--log", "info", "1337", "3.1415"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption( new[] {"-l", "--log"}, "Logs info from exactly three data sources", false, typeof(string), typeof(int), typeof(float)) }; var parser = new CommandLineParser(supportedOptions); var expectedValue = new CommandLineValue(new CommandLineOption( new[] {"-l", "--log"}, "Logs info from exactly three data sources", false, typeof(string), typeof(int), typeof(float)), new object[] {"info", 1337, (float) 3.1415}); var actualValue = parser.ParseArguments(args).ToList()[0]; Assert.True(expectedValue.Equals(actualValue, expectedValue)); } [Fact] public void ParseMismatchingTypeCommandLineValues() { var args = new[] {"--log", "info", "1337", "3.1415"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption( new[] {"-l", "--log"}, "Logs info from exactly three data sources", false, typeof(string), typeof(int), typeof(long)), }; var parser = new CommandLineParser(supportedOptions); Assert.Throws<InvalidCommandLineValueException>(() => parser.ParseArguments(args) ); } [Fact] public void ParseInsufficientCommandLineValues() { var args = new[] {"-l", "info", "info2"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption( new[] {"-l", "--log"}, "Logs info from exactly three data sources", false, typeof(string), typeof(string), typeof(string)), }; var parser = new CommandLineParser(supportedOptions); Assert.Throws<InsufficientCommandLineValuesException>(() => parser.ParseArguments(args) ); } [Fact] public void ParseInvalidCommandLineOption() { var args = new[] {"--force"}; var supportedOptions = new List<CommandLineOption> { new CommandLineOption(new[] {"-h", "--help"}, "Show the help menu"), }; var parser = new CommandLineParser(supportedOptions); Assert.Throws<InvalidCommandLineOptionException>(() => parser.ParseArguments(args) ); } [Fact] public void ParseNoCommandLineOptions() { var args = new string[] { }; var parser = new CommandLineParser(null); var result = parser.ParseArguments(args); Assert.Equal(Enumerable.Empty<CommandLineValue>(), result); } } I appreciate all suggestions. Feel free to be very nitpicky. :) A: Design Issues There are a couple of issues concerning your design. Lack of specification It is unclear which features should be supported by your API. This makes reviewing a bit fuzzy. Dependencies The parser depends on arguments already pre-parsed correctly by a shell. This limits the control you have over command line parsing. var args = new[] {"--log", "info", "1337", "3.1415"}; Consider breaking free from the shell and take on pre-parsing yourself. var args = "--log info 1337 3.1415"; // <- unparsed command line string Pollution The API mixes language structs with user-defined options. new CommandLineOption(new[] {"-l", "--log"} You do not want - and -- to be part of the Tags. These are delimiters in the lexing phase of your parser. By seperating lexing from parsing, you could extend the API more fluently by allowing other command line languages. For instance /log. Review Exception Classes Define a base class for all your exceptions CommandLineException. This way, you allow calling code to determine the granularity of exception handling. Since you make several custom exceptions, take advantage of storing some data on them. DuplicateRequiredCommandLineOptionException could store the duplicate option, and so on. Also provide constructors that take an inner exception. public class DuplicateRequiredCommandLineOptionException : CommandLineException { public CommandLineOption Option { get; } // include more constructors .. public DuplicateRequiredCommandLineOptionException( string messageCommandLineOption option) : base(message) { Option = option; } } CommandLineOption & CommandLineValue You have addressed you don't want to see too many changes for legacy reasons. I do propose to override the default Equals and GetHashCode on both classes and substitute IEqualityComparer with IEquatable. This way, you could improve your code. public bool Equals(CommandLineValue other) { return Option.Equals(other.Option) && Values.SequenceEqual(other.Values); } CommandLineParser You have indicated yourself you have problems parsing a flattened list to a hierarchical structure. There are common techniques for handling such situations. Have a look at Abstract Syntax Tree. You should create a syntax tree from the provided string[] args. This can be done with a Stack and Iterator. There are tons of examples online how to create an AST. // Check if the additional values are in the right format // ToDo: Find more elegant solution var values = args.ToList().GetRange(i + 1, i + additionalValues).ToList(); var types = option.ParameterTypes.ToList(); The second issue is - what I called pollution before - the lack of seperation of concerns. Your API is basically a simple compiler. The link shows you it's good practice to provide the following phases when building a compiler: pre-processing lexing parsing optimizing pretty printing Your API should definitely include lexing and parsing as seperate phases. lexing: create command line tokens and strip all the keywords and language-specific delimiters parsing: create an AST from the lexed tokens, then create CommandLineValue instances from the AST. Conclusion In the end, the quality of the API depends on a good specification covered by many unit tests. I feel you haven't established this yet. | Mid | [
0.5885558583106261,
27,
18.875
] |
Q: How to report how a filter was designed (scientific papers) + how to calculate filter attenuation? I am looking for a way to completely describe which kind of digital filters I used to process my data, although it seems only few publications in general report all the details. I think I should describe at least Which type of filter was applied (low-pass, high-pass, etc). Cutoff frequencies IIR / FIR Phase response? How the filter was designed? Transition bands Also, I would like to know the attenuation is reported? Sometimes it is written that attenuation was x dB per octave, how does one calculate that? I'm using MATLAB's fdatool for filter design + command filtfilt (zero-phase) to do the filtering. Basicly I would like to cover all the selections I made. A: Five of those (low/high-pass, cutoff freq, and IIR/FIR, how the filter was designed, attenuation) can be easily described using words or numbers. The others (phase response, transition bands) are often better described with a picture. I would recommend describing those five "describable" characteristics and, if appropriate, put pictures of the phase and magnitude response along with the actual filter taps in an appendix or something. | High | [
0.6666666666666661,
35,
17.5
] |
Associated Press photo by JUSTIN HAYWORTH -- Gov. Bobby Jindal speaks during the Iowa Faith and Freedom Coalition fall fundraiser in Des Moines, Iowa, in September | Low | [
0.45454545454545403,
29.375,
35.25
] |
From the Magazine Exclusive: How Elizabeth Holmes’s House of Cards Came Tumbling Down In a searing investigation into the once lauded biotech start-up Theranos, Nick Bilton discovers that its precocious founder defied medical experts—even her own chief scientist—about the veracity of its now discredited blood-testing technology. She built a corporation based on secrecy in the hope that she could still pull it off. Then, it all fell apart. The War Room It was late morning on Friday, October 16, when Elizabeth Holmes realized that she had no other choice. She finally had to address her employees at Theranos, the blood-testing start-up that she had founded as a 19-year-old Stanford dropout, which was now valued at some $9 billion. Two days earlier, a damning report published in The Wall Street Journal had alleged that the company was, in effect, a sham—that its vaunted core technology was actually faulty and that Theranos administered almost all of its blood tests using competitors’ equipment. The article created tremors throughout Silicon Valley, where Holmes, the world’s youngest self-made female billionaire, had become a near universally praised figure. Curiosity about the veracity of the Journal story was also bubbling throughout the company’s mustard-and-green Palo Alto headquarters, which was nearing the end of a $6.7 million renovation. Everyone at Theranos, from its scientists to its marketers, wondered what to make of it all. For two days, according to insiders, Holmes, who is now 32, had refused to address these concerns. Instead, she remained largely holed up in a conference room, surrounded by her inner circle. Half-empty food containers and cups of stale coffee and green juice were strewn on the table as she strategized with a phalanx of trusted advisers, including Ramesh “Sunny” Balwani, then Theranos’s president and C.O.O.; Heather King, the company’s general counsel; lawyers from Boies, Schiller & Flexner, the intrepid law firm; and crisis-management consultants. Most of the people in the war room had been there for two days and nights straight, according to an insider, leaving mainly to shower or make a feeble attempt at a couple of hours of shut-eye. There was also an uncomfortable chill in the room. At Theranos, Holmes preferred that the temperature be maintained in the mid-60s, which facilitated her preferred daily uniform of a black turtleneck with a puffy black vest—a homogeneity that she had borrowed from her idol, the late Steve Jobs. Holmes had learned a lot from Jobs. Like Apple, Theranos was secretive, even internally. Just as Jobs had famously insisted at 1 Infinite Loop, 10 minutes away, that departments were generally siloed, Holmes largely forbade her employees from communicating with one another about what they were working on—a culture that resulted in a rare form of executive omniscience. At Theranos, Holmes was founder, C.E.O., and chairwoman. There wasn’t a decision—from the number of American flags framed in the company’s hallway (they are ubiquitous) to the compensation of each new hire—that didn’t cross her desk. And like Jobs, crucially, Holmes also paid indefatigable attention to her company’s story, its “narrative.” Theranos was not simply endeavoring to make a product that sold off the shelves and lined investors’ pockets; rather, it was attempting something far more poignant. In interviews, Holmes reiterated that Theranos’s proprietary technology could take a pinprick’s worth of blood, extracted from the tip of a finger, instead of intravenously, and test for hundreds of diseases—a remarkable innovation that was going to save millions of lives and, in a phrase she often repeated, “change the world.” In a technology sector populated by innumerable food-delivery apps, her quixotic ambition was applauded. Holmes adorned the covers of Fortune, Forbes, and Inc., among other publications. She was profiled in The New Yorker and featured on a segment of Charlie Rose. In the process, she amassed a net worth of around $4 billion. Theranos blood-testing machines. By Jim Wilson/The New York Times/Redux. One of the only journalists who seemed unimpressed by this narrative was John Carreyrou, a recalcitrant health-care reporter from The Wall Street Journal. Carreyrou came away from The New Yorker story surprised by Theranos’s secrecy—such behavior was to be expected at a tech company but not a medical operation. Moreover, he was also struck by Holmes’s limited ability to explain how it all worked. When The New Yorker reporter asked about Theranos’s technology, she responded, somewhat cryptically, “a chemistry is performed so that a chemical reaction occurs and generates a signal from the chemical interaction with the sample, which is translated into a result, which is then reviewed by certified laboratory personnel.” Shortly after reading the article, Carreyrou started investigating Theranos’s medical practices. As it turned out, there was an underside to Theranos’s story that had not been told—one that involved questionable lab procedures and results, among other things. Soon after Carreyrou began his reporting, David Boies, the superstar lawyer—and Theranos board member—who had taken on Bill Gates in the 1990s and represented Al Gore during the 2000 Florida recount case, visited the Journal newsroom for a five-hour meeting. Boies subsequently returned to the Journal to meet with the paper’s editor in chief, Gerard Baker. Eventually, on October 16, 2015, the Journal published the article: HOT STARTUP THERANOS HAS STRUGGLED WITH ITS BLOOD-TEST TECHNOLOGY. During the two days in the war room, according to numerous insiders, Holmes heard various response strategies. The most cogent suggestion advocated enlisting members of the scientific community to publicly defend Theranos—its name an amalgam of “therapy” and “diagnosis.” But no scientist could credibly vouch for Theranos. Under Holmes’s direction, the secretive company had barred other scientists from writing peer-review papers on its technology. Absent a plan, Holmes embarked on a familiar course—she doubled down on her narrative. She left the war room for her car—she is often surrounded by her security detail, which sometimes numbers as many as four men, who (for safety reasons) refer to the young C.E.O. as “Eagle 1”—and headed to the airport. (She has been known to fly alone on a $6.5 million Gulfstream G150.) Holmes subsequently took off for Boston to attend a luncheon for a previously scheduled appearance at the Harvard Medical School Board of Fellows, where she would be honored as an inductee. During the trip, Holmes fielded calls from her advisers in the war room. She and her team decided on an interview with Jim Cramer, the host of CNBC’s Mad Money, with whom she had a friendship that dated from a previous interview. It was quickly arranged. Cramer generously began the interview by asking Holmes what had happened. Holmes, who talks slowly and deliberately, and blinks with alarming irregularity, replied with a variation of a line from Jobs. “This is what happens when you work to change things,” she said, her long blond hair tousled, her smile amplified by red lipstick. “First they think you’re crazy, then they fight you, and then, all of a sudden, you change the world.” When Cramer asked Holmes for a terse true-or-false answer about an accusation in the article, she replied with a meandering 198-word retort. By the time she returned to Palo Alto, the consensus was that it was time, at last, for Holmes to address her hundreds of employees. A company-wide e-mail instructed technicians in lab coats, programmers in T-shirts and jeans, and a slew of support staff to meet in the cafeteria. There, Holmes, with Balwani at her side, began an eloquent speech in her typical baritone, explaining to her loyal colleagues that they were changing the world. As she continued, Holmes grew more impassioned. The Journal, she said, had gotten the story wrong. Carreyrou, she insisted, with a tinge of fury, was simply picking a fight. She handed the stage to Balwani, who echoed her sentiments. After he wrapped up, the leaders of Theranos stood before their employees and surveyed the room. Then a chant erupted. “Fuck you . . .,” employees began yelling in unison, “Carreyrou.” It began to grow louder still. “Fuck you, Carreyrou!” Soon men and women in lab coats, and programmers in T-shirts and jeans, joined in. They were chanting with fervor: “Fuck you, Carreyrou!,” they cried out. “Fuck you, Carreyrou! Fuck. You. Carrey-rou!” The Game In Silicon Valley, every company has an origin story—a fable, often slightly embellished, that humanizes its mission for the purpose of winning over investors, the press, and, if it ever gets to that point, customers, too. These origin stories can provide a unique, and uniquely powerful, lubricant in the Valley. After all, while Silicon Valley is responsible for some truly astounding companies, its business dealings can also replicate one big confidence game in which entrepreneurs, venture capitalists, and the tech media pretend to vet one another while, in reality, functioning as cogs in a machine that is designed to not question anything—and buoy one another all along the way. It generally works like this: the venture capitalists (who are mostly white men) don’t really know what they’re doing with any certainty—it’s impossible, after all, to truly predict the next big thing—so they bet a little bit on every company that they can with the hope that one of them hits it big. The entrepreneurs (also mostly white men) often work on a lot of meaningless stuff, like using code to deliver frozen yogurt more expeditiously or apps that let you say “Yo!” (and only “Yo!”) to your friends. The entrepreneurs generally glorify their efforts by saying that their innovation could change the world, which tends to appease the venture capitalists, because they can also pretend they’re not there only to make money. And this also helps seduce the tech press (also largely comprised of white men), which is often ready to play a game of access in exchange for a few more page views of their story about the company that is trying to change the world by getting frozen yogurt to customers more expeditiously. The financial rewards speak for themselves. Silicon Valley, which is 50 square miles, has created more wealth than any place in human history. In the end, it isn’t in anyone’s interest to call bullshit. When Elizabeth Holmes emerged on the tech scene, around 2003, she had a preternaturally good story. She was a woman. She was building a company that really aimed to change the world. And, as a then dark-haired 19-year-old first-year at Stanford University’s School of Chemical Engineering, she already comported herself in a distinctly Jobsian fashion. She adopted black turtlenecks, would boast of never taking a vacation, and would come to practice veganism. She quoted Jane Austen by heart and referred to a letter that she had written to her father when she was nine years old insisting, “What I really want out of life is to discover something new, something that mankind didn’t know was possible to do.” And it was this instinct, she said, coupled with a childhood fear of needles, that led her to come up with her revolutionary company. Holmes had indeed mastered the Silicon Valley game. Revered venture capitalists, such as Tim Draper and Steve Jurvetson, invested in her; Marc Andreessen called her the next Steve Jobs. She was plastered on the covers of magazines, featured on TV shows, and offered keynote-speaker slots at tech conferences. (Holmes spoke at *Vanity Fair’*s 2015 New Establishment Summit less than two weeks before Carreyrou’s first story appeared in the Journal.) In some ways, the near-universal adoration of Holmes reflected her extraordinary comportment. In others, however, it reflected the Valley’s own narcissism. Finally, it seemed, there was a female innovator who was indeed able to personify the Valley’s vision of itself—someone who was endeavoring to make the world a better place. The original Theranos laboratory, in Palo Alto, 2014. By Drew Kelly. Holmes’s real story, however, was a little more complicated. When she first came up with the precursor to the idea of Theranos, which eventually aimed to reap vast amounts of data from a few droplets of blood derived from the tip of a finger, she approached several of her professors at Stanford, according to someone who knew Holmes back then. But most explained to the chemical-engineering major that it was virtually impossible to do so with any real efficacy. “I told her, I don’t think your idea is going to work,” Phyllis Gardner, a professor of medicine at Stanford, said to me, about Holmes’s seminal pitch for Theranos. As Gardner explained, it is impossible to get a precise result from the tip of a finger for most of the tests that Theranos would claim to conduct accurately. When a finger is pricked, the probe breaks up cells, allowing debris, among other things, to escape into the interstitial fluid. While it is feasible to test for pathogens this way, a pinprick is too unreliable for obtaining more nuanced readings. Furthermore, there isn’t that much reliable data that you can reap from such a small amount of blood. But Holmes was nothing if not determined. Rather than drop her idea, she tried to persuade Channing Robertson, her adviser at Stanford, to back her in her quest. He did. (“It would not be unusual for finger-stick testing to be met with skepticism,” says a spokesman for Theranos. “Patents from that period explain Elizabeth’s ideas and were foundational for the company’s current technologies.”) Holmes subsequently raised $6 million in funding, the first of almost $700 million that would follow. Money often comes with strings attached in Silicon Valley, but even by its byzantine terms, Holmes’s were unusual. She took the money on the condition that she would not divulge to investors how her technology actually worked, and that she had final say and control over every aspect of her company. This surreptitiousness scared off some investors. When Google Ventures, which focuses more than 40 percent of its investments on medical technology, tried to perform due diligence on Theranos to weigh an investment, Theranos never responded. Eventually, Google Ventures sent a venture capitalist to a Theranos Walgreens Wellness Center to take the revolutionary pinprick blood test. As the V.C. sat in a chair and had several large vials of blood drawn from his arm, far more than a pinprick, it became apparent that something was amiss with Theranos’s promise. Google Ventures wasn’t the only group with knowledge of blood testing which felt that way. One of Holmes’s first major hires, thanks to an introduction by Channing Robertson, was Ian Gibbons, an accomplished British scientist who had a slew of degrees from Cambridge University and had spent 30 years working on diagnostic and therapeutic products. Gibbons was tall and handsome, with straight reddish-brown hair and blue eyes. He had never owned a pair of jeans and spoke with a British accent that was a combination of colloquial and posh. In 2005, Holmes named him chief scientist. Gibbons, who was diagnosed with cancer shortly after joining the company, encountered a host of issues with the science at Theranos, but the most glaring was simple: the results were off. This conclusion soon led Gibbons to realize that Holmes’s invention was more of an idea than a reality. Still, bound by the scientific method, Gibbons wanted to try every possible direction and exhaust every option. So, for years, while Holmes put her fund-raising talents to use—hiring hundreds of marketers, salespeople, communications specialists, and even the Oscar-winning filmmaker Errol Morris, who was commissioned to make short industrial documentaries—Gibbons would wake early, walk his dogs along a trail near his home, and then set off for the office before seven A.M. In his downtime, he would read I, Claudius, a novel about a man who plays dumb to unwittingly become the most powerful person on earth. While Gibbons grew ever more desperate to come up with a solution to the inaccuracies of the blood-testing technology, Holmes presented her company to more investors, and even potential partners, as if it had a working, fully realized product. Holmes adorned her headquarters and Web site with slogans claiming, “One tiny drop changes everything,” and “All the same tests. One tiny sample,” and went into media overdrive. She also proved an effective crisis manager. In 2012, for instance, Holmes began talking to the Department of Defense about using Theranos’s technology on the battlefield in Afghanistan. But specialists at the D.O.D. soon uncovered that the technology wasn’t entirely accurate, and that it had not been vetted by the Food and Drug Administration. When the department notified the F.D.A. that something was amiss, according to The Washington Post, Holmes contacted Marine general James Mattis, who had initiated the pilot program. He immediately e-mailed his colleagues about moving the project forward. Mattis was later added to the company board when he retired from the service. (Mattis says he never tried to interfere with the F.D.A. but rather was “interested in rapidly having the company’s technologies tested legally and ethically.”) At around the same time, Theranos also decided to sue Richard Fuisz, an old friend and neighbor of Holmes’s family, alleging that he had stolen secrets that belonged to Theranos. As the suit progressed—it was eventually settled—Fuisz’s lawyers issued subpoenas to Theranos executives involved with the “proprietary” aspects of the technology. This included Ian Gibbons. But Gibbons didn’t want to testify. If he told the court that the technology did not work, he would harm the people he worked with; if he wasn’t honest about the technology’s problems, however, consumers could potentially harm their health, maybe even fatally. The late scientist Ian Gibbons. Holmes, meanwhile, did not seem willing to tolerate his resistance, according to his wife, Rochelle Gibbons. Even though Gibbons had warned that the technology wasn’t ready for the public, Holmes was preparing to open “Theranos Wellness Centers” in dozens of Walgreens across Arizona. “Ian felt like he would lose his job if he told the truth,” Rochelle told me as she wept one summer morning in Palo Alto. “Ian was a real obstacle for Elizabeth. He started to be very vocal. They kept him around to keep him quiet.” Channing Robertson, who had brought Gibbons to Theranos, recalls a different conversation, noting, “He suggested to me on numerous occasions that what we had accomplished at that time was sufficient to commercialize.” A few months later, on May 16, 2013, Gibbons was sitting in the family room with Rochelle, the afternoon light draping the couple, when the telephone rang. He answered. It was one of Holmes’s assistants. When Gibbons hung up, he was beside himself. “Elizabeth wants to meet with me tomorrow in her office,” he told his wife in a quivering voice. “Do you think she’s going to fire me?” Rochelle Gibbons, who had spent a lot of time with Holmes, knew that she wanted control. “Yes,” she said to her husband, reluctantly. She told him she thought he was going to be fired. Later that evening, gripped and overwhelmed with worry, Ian Gibbons tried to commit suicide. He was rushed to the hospital. A week later, with his wife by his side, Ian Gibbons died. When Rochelle called Holmes’s office to explain what had happened, the secretary was devastated and offered her sincere condolences. She told Rochelle Gibbons that she would let Holmes know immediately. But a few hours later, rather than a condolence message from Holmes, Rochelle instead received a phone call from someone at Theranos demanding that she immediately return any and all confidential Theranos property. The Enforcer In hundreds of interviews with the media and on panels, Holmes honed her story to near perfection. She talked about how she didn’t play with Barbies as a child, and how her father, Christian Holmes IV, who worked in environmental technology for Enron before going on to work in a number of senior government jobs in Washington, was one of her idols. But her reverence for Steve Jobs was perhaps most glaring. Besides the turtlenecks, Holmes’s proprietary blood-analysis device, which she named “Edison” after Thomas Edison, resembled Jobs’s NeXT computer. She designed her Theranos office with Le Corbusier black leather chairs, a Jobs favorite. She also adhered to a strange diet of only green juices (cucumber, parsley, kale, spinach, romaine lettuce, and celery), to be drunk only at specific times of the day. Like Jobs, too, her company was her life. She rarely ever left the office, only going home to sleep. To celebrate her birthday, Holmes held a party at Theranos headquarters with her employees. (Her brother, Christian, also works at Theranos.) But the most staggering characteristic that she borrowed from the late C.E.O. was his obsession with secrecy. And while Jobs had a fearsome security force who ensured that confidential information rarely, if ever, left Apple’s headquarters, Holmes had a single enforcer: Sunny Balwani, the company’s president and chief operating officer, until he stepped down in May. Balwani, who had previously worked at Lotus and Microsoft, had no experience in medicine. He was hired in 2009 to focus on e-commerce. Nevertheless, he was soon put in charge of the company’s most secret medical technology. According to a number of people with knowledge of the situation, the two had met years before he began at the company, when Holmes took a trip to China after she graduated from high school. The two eventually started dating, numerous people told me, and remained very loyal even after their relationship ended. Among Holmes’s security detail, Balwani was known as “Eagle 2.” When employees questioned the accuracy of the company’s blood-testing technology, it was Balwani who would chastise them in e-mails (or in person), sternly telling staffers, “This must stop,” as The Wall Street Journal reported. He ensured that scientists and engineers at Theranos did not talk to one another about their work. Applicants who came for job interviews were told that they wouldn’t know what the actual job was unless they were hired. Employees who spoke publicly about the company were met with legal threats. On LinkedIn, one former employee noted next to his job description, “I worked here, but every time I say what I did I get a letter from a lawyer. I probably will get a letter from a lawyer for writing this.” If people visited any of Theranos’s offices and refused to sign the company’s lengthy non-disclosure agreement, they were not allowed inside. Balwani’s lack of medical experience might have seemed unusual at such a company. But few at Theranos were in a position to point fingers. As Holmes started to assemble her board of directors, she chose a dozen older white men, almost none of whom had a background in anything related to health care. This included former secretary of state Henry Kissinger, former secretary of state George Shultz, former Georgia senator and chairman of the Armed Services Committee Sam Nunn, and William J. Perry, the former defense secretary. (Bill Frist, the former Senate majority leader, and former cardiovascular doctor, was an exception.) “This was a board that was better suited to decide if America should invade Iraq than vet a blood-testing company,” one person said to me. Gibbons told his wife that Holmes commanded their attention masterfully. Theranos’s board may not have been equipped to ask what exactly the company was building, or how, but others were. While Holmes was bounding around the world on a private plane, speaking on panels with Bill Clinton, and giving passionate TED talks, two government organizations started quietly inspecting the company. On August 25, 2015, months before the Journal story broke, three investigators from the F.D.A. arrived, unannounced, at Theranos’s headquarters, on Page Mill Road, with two more investigators sent to the company’s blood-testing lab in Newark, California, demanding to inspect the facilities. According to someone close to the company, Holmes was sent into a panic, calling advisers to try to resolve the issue. At around the same time, regulators from the Centers for Medicare and Medicaid Services, which regulates laboratories, visited the labs and found major inaccuracies in the testing being done on patients. (The Newark lab was run by an employee who was criticized for insufficient laboratory experience.) C.M.S. also soon discovered that some of the tests Theranos was performing were so inaccurate that they could leave patients at risk of internal bleeding, or of stroke among those prone to blood clots. The agency found that Theranos appeared to ignore erratic results from its own quality-control checks during a six-month period last year and supplied 81 patients with questionable test results. While the government was scouring through Theranos’s inaccurate files and data, Carreyrou was approaching the story not as a fawning tech blogger, but rather as a diligent investigative reporter. Carreyrou, who had worked at the Journal since 1999, had covered topics ranging from terrorism to European politics and financial misdeeds before returning to the New York newsroom and taking over the health-and-sciences bureau. As a reporter of obscure and often faceless subjects, he was not enticed by access, nor was he afraid of lawyers. In fact, he had won two Pulitzer Prizes for taking on nemeses as significant as Vivendi and the U.S. government. After a team of seasoned lawyers arrived at the Journal newsroom, Carreyrou was simply emboldened. “It’s O.K. if you’ve got a smartphone app or a social network, and you go live with it before it’s ready; people aren’t going to die,” he told me. “But with medicine, it’s different.” Meanwhile, Theranos had its lawyers send a letter to Rochelle Gibbons’s attorney, threatening legal action for talking to a reporter. “It has been the Company’s desire not to pursue legal action against Mrs. Gibbons,” a lawyer for Boies, Schiller & Flexner wrote. “Unless she immediately ceases these actions, she will leave the Company no other option but to pursue litigation to definitively put an end [to] these actions once and for all.” Others who spoke to the Journal were met with similar threats. By Carlos Chavarría/The New York Times/Redux. The End Back in March 2009, Holmes returned to the Stanford campus, where her story had begun, to talk to a group of students at the Stanford Technology Ventures Program. Her hair wasn’t yet bleached blond, but she had started to wear her uniform of a black turtleneck, and she was just beginning to morph into the idol she would soon become in Silicon Valley. For 57 minutes, Holmes paced in front of a chalkboard and answered questions about her vision. “It became clear to me,” she said with conviction, “that if I needed to, I’d re-start this company as much as possible to make this thing happen.” This is exactly what Holmes seems to be doing now. Executives from Theranos, including Holmes and Balwani, declined to sit for interviews. But on a recent July afternoon, I traveled to the company’s headquarters anyway. From the outside, Theranos seems to be in a sad state. The parking lot was devoid of cars, with more than half the spaces empty (or half full, depending on your outlook). The giant American flag that hangs in front of the building was flaccid at half-staff. On the edge of the parking lot, a couple of employees were smoking cigarettes as a single security guard stood nearby, taking a selfie. On the Friday morning that they gathered in the war room, Holmes and her team of advisers had believed that there would be one negative story from the Journal, and that Holmes would be able to squash the controversy. Then it would be back to business as usual, telling her flawlessly curated story to investors, to the media, and now to patients who used her technology. Holmes and her advisers couldn’t have been more wrong. Carreyrou subsequently wrote more than two dozen articles about the problems at Theranos. Walgreens severed its relationship with Holmes, shuttering all of its Wellness Centers. The F.D.A. banned the company from using its Edison device. In July, the Centers for Medicare and Medicaid Services banned Holmes from owning or running a medical laboratory for two years. (This decision is currently under appeal.) Then came the civil and criminal investigations by the U.S. Securities and Exchange Commission and the U.S. Attorney’s Office for the Northern District of California and two class-action fraud lawsuits. Theranos’s board has subsequently been cleaved in two, with Kissinger, Shultz, and Frist now merely “Counselors.” Holmes, meanwhile, isn’t going anywhere. As the C.E.O. and chairwoman of Theranos, only she can elect to replace herself. Forbes, clearly embarrassed by its cover story, removed Holmes from its list of “America’s Richest Self-Made Women.” A year earlier, it had estimated her wealth at $4.5 billion. “Today, Forbes is lowering our estimate of her net worth to nothing,” the editors wrote. Fortune had its mea culpa, with the author stating boldly that “Theranos misled me.” Director Adam McKay, fresh off his Oscar for The Big Short, has even signed on to make a movie based on Holmes, tentatively titled Bad Blood. (On the bright side for Holmes, Jennifer Lawrence is attached as the lead.) Silicon Valley, once so taken by Holmes, has turned its back, too. Countless investors have been quick to point out that they did not invest in the company—that much of its money came from the relatively somnolent worlds of mutual funds, which often accrue the savings of pensioners and retirees; private equity; and smaller venture-capital operations on the East Coast. In the end, one of the only Valley V.C. shops that actually invested in Theranos was Draper Fisher Jurvetson. Many may have liked what Holmes represented about their industry, but they didn’t seem to trust her with their money. Meanwhile, Holmes has somehow compartmentalized it all. In August, she flew to Philadelphia to speak at the American Association for Clinical Chemistry’s annual conference. Before she stepped out onstage, the conference organizers played the song “Sympathy for the Devil” for the ballroom, packed with more than 2,500 doctors and scientists. Holmes was wearing a blue button-up shirt and black blazer (she has recently abandoned the black turtleneck), and she spoke for an hour while rapidly flicking through her presentation. The audience was hoping that Holmes would answer questions about her Edison technology and explain whether or not she knew it was a sham. But instead Holmes showed off a new blood-testing technology that a lot of people in the room insisted was not new or groundbreaking. Later that day she was featured on Sanjay Gupta’s CNN show and a few weeks later appeared in San Francisco at a splashy dinner celebrating women in technology. “Elizabeth Holmes won’t stop,” Phyllis Gardner, the Stanford professor, told me. “She’s holding on to her story like a barnacle on the side of a ship.” Holmes may not be prepared to compartmentalize what comes next. When I arrived in Palo Alto in July, I wasn’t the only person setting out to interview anyone associated with Theranos and Holmes. The Federal Bureau of Investigation was, too. When I knocked on a door, I was only a day or two behind F.B.I. agents who were trying to put together a time line of what Holmes knew and when she knew it—adding the most unpredictable twist to a story she could no longer control. | Mid | [
0.543529411764705,
28.875,
24.25
] |
[Proteinase-inhibitors and enzyme-active proteins from fish eggs. Fibrinagarelectrophoretic and immunoelectrophoretic studies (author's transl)]. Saline extracts from eggs and homogenized spermaplasma from 2 fresh water fishes and 2 sea-fishes were investigated using fibrin-agar-electrophoresis and the immunoelectrophoretic analysis. Many polyvalent proteinase-inhibitors with different inhibition spectra, lipoproteins and esterase active proteins which split beta-naphthylacetate as substrate were detected and designated according to a proposed nomenclature. Fresh water fishes contained more inhibitors than sea-fishes. The proteinase-inhibitor PI-Sg3 antigen-antibody complex was esterase active; the active complex designated PI-Sg4 could not yet be exactly coordinated in respect to another proteinase-inhibitor from Salmo gairdneri. The separation of pseudo- and euglobuline fractions permitted a significant concentration of proteinase-inhibitors and the elimination of large parts of strong antigenic proteins. A good antiserum could be prepared which showed 3-5 precipitation lines against proteinase-inhibitors from trout eggs. By means of cross reactions it could be demonstrated the nonspecificity of several proteins in respect to species, genus and sex. This concernes also some aspects of immunesera absorptions with heterologous protein mixtures. Cross reactions with proteinase-inhibitors couldn't be detected, suggesting that they are genus-specific. This is also confirmed by their variable number and inhibition-spectra in extracts of different origin. | Mid | [
0.6497461928934011,
32,
17.25
] |
Legal concerns continue over ‘Innocence of Muslims’ The trailer for the movie “Innocence of Muslims” continues to generate controversy. Many Moslems claim the content – which was posted on YouTube – is blasphemy. In 2012, they protested at U.S. diplomatic missions. The trailer was initially blamed by the Obama administration as the reason why Islamist militants attacked the U.S. diplomatic compound in Benghazi, Libya, killing four Americans. Yet, many dispute the movie had any role in the deadly attack. Meanwhile, protests against the movie were connected to hundreds of injuries and over 50 deaths. In the United States, the 9th Circuit of Court of Appeals ruled in February that Google, which owns YouTube, should remove “Innocence of Muslims,” if versions featured Cindy Lee Garcia. In response, Google has tried to fight the order. What makes the legal battle particularly interesting in terms of copyright law is the role of Garcia in the case. She wants to see the movie taken down from YouTube. Also, she and other cast members were told they were making an adventure movie, and the final movie dubbed over her lines. “Her version of the 2011 script never mentioned the Prophet Muhammad, and the final video over-dubbed her lines with anti-Islamic sentiments spoken by someone else,” The New York Daily News reported after interviewing her. “This isn’t about the First Amendment. I’m a patriot, and I support the right of freedom of speech. If I had said those things, it would be different. It wasn’t me,” she told the newspaper. In a two-to-one decision, the Court of Appeals said Garcia can copyright her performance, and said the maker of the film lied to her. "The film differs so radically from anything Garcia could have imagined when she was cast that it can’t possibly be authorized by any implied license she granted,” Ninth Circuit Chief Judge Alex Kozinski said in the now controversial opinion. On the other hand, Judge N.R. Smith dissented, and called the ruling “unprecedented” and said it created “new law.” “We have never held that an actress’ performance could be copyrightable,” Smith wrote in his opinion. Similarly, Robert Kasunic, associate register of Copyrights and director of Registration Policy and Practices at the U.S. Copyright Office, would not register Garcia’s claim for her performance in the movie. “[I]f her contribution was neither a work made for hire nor the requisite authorship to warrant a claim in a joint work, Ms. Garcia has no separable claim to copyrightable authorship in her performance,” he said in a document. Google cited the document in the case and its petition is pending. Google has defended itself, and says it is more difficult than Garcia’s side thinks to comply with the takedown order. Google contends the order requires disabling access to the video not deleting it. “Garcia’s fundamental complaint appears to be that ‘Innocence of Muslims’ is still on the Internet,” the Google attorneys contend. “But Google and YouTube do not operate the Internet.” However, Garcia’s attorneys say that “[f]or Google, it is a pedestrian, technical exercise to take down those URLs, to hire an intern to just search for ‘Innocence of Muslims.’” Her side is seeking sanctions of $150,000 per violation. Her attorneys also want Google to be in contempt “for not deleting the posted videos, claiming that ‘merely disable[ing]’ access to them is insufficient, and that the ‘snide message’ displayed was a sign that Google was ‘ridiculing’ the court’s authority and ‘thumbing its nose at the Court and making a mockery of our judicial system,’” according to a blog post from Deborah Goldman, a law school student at Washington College of Law, on Intellectual Property Brief. Many organizations want to see a review of the appeals court decision by 11 judges, which is called an “en banc review.” Netflix, for instance, has raised concerns about the appeals court decision. "Can a bit-part actor in ‘Gone With the Wind’ now seek an injunction... because he does not approve of the use of his performance in a piece of 'Yankee propaganda'?" Netflix said in a brief. "What about his heirs? And even if he signed some agreement in 1939 defining the scope of the license, what are the chances that the studio (to say nothing of Netflix) can lay its hands on it?" “By creating a new species of copyright, and empowering essentially any performer in a motion picture or television program to both sue downstream distributors and enjoin any use of her performance of which she does not approve, the panel majority risks wreaking havoc with established copyright and business rules on which all third party distributors, including Netflix, depend," Netflix added in its brief. In addition, The Washington Post and National Public Radio have also been concerned with the ruling, especially with the risk that public officials could claim "veto power" over news reports. "If an actress reading a script authored by someone else is 'sufficiently creative to be protectable,' public officials could argue that they 'own' the copyright to their prepared remarks, or their extemporaneous responses to a videotaped interview," the news organizations said, in a statement quoted by The Hollywood Reporter. Other organizations which worry about the ruling are: Facebook, eBay, Gawker, Twitter, Yahoo, IAC/InterActiveCorp, Tumblr and Kickstarter. Similar concerns were voice by the Electronic Frontier Foundation, American Civil Liberties Union, and the Center for Democracy and Technology (CDT). Consider, too, how the CDT said the video’s removal was “on dubious copyright grounds” and warned it “will set a dangerous precedent for online free expression if it is allowed to stand.” “The opinion failed to adequately consider the public interest and harm to free expression in ordering the takedown,” CDT said in a statement. “The video has been a unique flashpoint for debates about free expression and the Internet – debates the opinion barely mentions.” CDT also predicts the copyright argument “that actors in a movie could have independent copyright interests in their performances” may end up wreaking “havoc when considered in light of the Digital Millennium Copyright Act’s (DMCA) notice-and-takedown system. The DMCA allows anyone with a good-faith belief that his copyright has been infringed to send takedown notices to content hosts…. If Garcia stands, open the floodgates. Any creative contributor to a project, aggrieved for whatever reason, could use the DMCA to attempt to veto its rightful distribution.” | Mid | [
0.5420353982300881,
30.625,
25.875
] |
Q: Changing default playback device on Windows 8 Previously, on Vista and Windows 7, changing the Default Playback device would occur instantly. For example, audio is coming out of my speakers, I right click the Volume Control, click Playback Devices then I select another device and click Set Default. Audio would be transferred immediately. Unfortunately, now, with Windows 8, I need to kill whatever process that's outputting sound and restart it for the change to take effect. Is there something that can be done about it so that changes are taken into account immediately? A: I just figured this out myself. If you don't want to restart the program, simply "configure" and "test" the playback device. That is, after setting the default device, click "Configure" toward the bottom left. Click "Test" in the "Speaker Setup" window that appears. Then simply click "Next" twice and "Finish" and you're done. Whatever you're trying to do will now play audio on the desired device. | Mid | [
0.614173228346456,
29.25,
18.375
] |
Saturday, November 27, 2010 The Solar Plexus is the point where life is born – where the uncreated becomes create; the unorganized becomes organized; the unconscious becomes conscious; the invisible appears; that which is dimensionless becomes measurable. The Solar Plexus is the Seat of the Subconscious. Until we overstand and take control of ourselves, every thought that passes through the Mind affects the action of the Solar Plexus, and the Solar Plexus is the seat of the Subconscious Mind called the Abdominal Brain.Non- Resistant thought expands the Solar Plexus;Resistant thought contracts it.Solar Plexus just as we learn to control the action of the fingers in learning to play the piano; by thought and careful exercise. Make up your Mind to keep your light shinning, your Solar Center expanded, no matter what happens or how you may feel. The Solar Plexus, or Sun Center or your Central Sun, is to the Human Body precisely what the visible Sun is to the Solar System. It is the Source of ALL life and Light. It is the Manufacturer of Life and Light. The Solar Plexus will, and breaths out magnetism. Remember breathing and thinking are one. To think deep, Breath deep! We must learn to control the action of the breaths in intelligent Your Intuition is the voice of the Subconscious Mind, which is linked to your SOLAR PLEXUS that gut feeling (vibration) in the pit of your Stomach, which is linked to ALL residing on the Plane of Force and operating your Psychic faculties. Thursday, November 25, 2010 Did you know that your Intuition is your true "Inner G.O.D." or "Inner Guide?" Did you know that your Intuition is what is known as "Extended Consciousness" and is the Voice of your Subconscious Mind? Your Intuition knows all things! Learn now how to develop this Inner Latent ability that is Dormant in all of us. It is your Intuition that will lead you to ultimate happiness, prosperity, wealth, health and success in your ever day life! This Powerful NUN Tablet is packed with Scientific facts and Practical Experiments for you to strengthen your intuition to be used on a every day basis. Learn the Secrets of all Secrets now and begin to "TAKE BACK YOUR POWER, and Learn to Master and Control your Destiny!" | Mid | [
0.6057692307692301,
31.5,
20.5
] |
A New Kind of Evil 3 - Acceptance Jonathan | September 11, 2002 There was a silence among the girls. They weren't sure what to make of Elrond's words. The council stared at them, not sure if they were listening or believing what Elrond and Galadriel said. Suddenly Julia spoke. "Whoa, rewind and freeze! Are you trying to tell me that the fate of your world rests in our hands?" she asked frantically. "You did not know that before?" Elrond asked simply. "No! And what makes you think we can do this? We are not warriors, we aren't even from here!" "Julia is right we can't do this. Are you people insane or something?" Rachel shouted. Rachel and Julia were making a scene and really couldn't understand what just happened. Lizzie on the other hand, well, "This is awesome! Let's go save Middle-eth!" she cheered and that made the council look curiously at her. "Yeah, Lizzie has the right idea. Let's kick this evil's butt!" Lori cheered along with Lizzie. Julia glared at Lizzie and Lori. She wasn't happy with any of this. She couldn't understand why they were chosen for this and why all these people at the council looked at her like she was the answer to their prayers. Suddenly she felt so angry with everyone that she wanted to run from these strange people. She felt hatred spread over her. She hated everyone at the council even though she didn't know them. She hated her grandmother because the only reason she took them in was because of this destiny. Then she began to hate destiny because that is what took away her parents and made her a savoir of an imaginary land. She couldn't hold it in anymore. "I never asked for this! Why did you bring me here? I don't know you, I don't even like you and you're expecting me to save you precious land? Why should I?" An older man dressed in gray looked over at her. His eyes were kind but the look on his face was far from that. He seemed angry but then it faded into despair. "You should because you are the only ones who can. If you do not help us, no one will. No one else asked for this, but sometimes you just have to accept some what is given to you." "And how would you know? You don't seem that you've been given something you don't want." "Nothing was ever pushed upon me but I was on a quest that no one else wanted. Are you aware of the Quest of the Ring? That horrible quest ten years ago?" Julia stared at the old man. She knew now who he was. "I'm sorry, Gandalf. I had no idea." "Can we please get on with the matter at hand?" Elrond asked rudely. "What do you mean? You want a decision right now?" Rachel asked. "Yes, because if you choose to accept this then we must train you. Immediately." "We'll do it!" Lori and Lizzie said together. "I guess so," Rachel said reluctantly. "Fine," Julia said quietly. When they accepted the council cheered. Everyone look so happy that they had a chance to be saved. The girls looked at the council in surprise. They have never been cheered like this before. It made Julia feel confident about her mission to come. The next day the girls were woken up early and gathered in a courtyard. They looked tired as they yawned and stretched. Soon Elrond and another man joined them. "Good morning," Elrond greeted. His arms were full of something but they couldn't tell what because it was covered with clothes. He laid them down in front of them and uncovered the bundle. The girls saw four weapons in front of them. There was a spear, sword, daggers and a bow. "Pick one," Elrond said. Without really thinking the girls took up a weapon and held it like they have done it for years. Rachel had the spear, Lori had the daggers, Lizzie had the bow and Julia chose the sword. "Now that we have that our of the way, let the training begin. This is Aragorn and he will be showing you how to use your weapons properly." Elrond then left leaving them to get to work. Latest Forum Posts COPYRIGHT 1999-2012 - The One Ring ... The One Ring is administered by everyday fans of J.R.R. Tolkien and Lord of the Rings. The One Ring is not affiliated with the Tolkien Estate or Tolkien Enterprises. Certain materials such as books, films, articles and other promotional materials are held by their respective owners and is allowed under the fair use clause of the Copyright Law.Certain design elements of this webpage are copyright Ted Nasmith | Mid | [
0.5756929637526651,
33.75,
24.875
] |
Copper is a conductive material and is used in various fields, for example, a semiconductor integrated circuit, an opto-electronic communication field, and a micro-electro mechanical system (MEMS). Copper may be used as a seed layer for forming a metal layer or a metal interconnection along with aluminum, chromium, or titanium in a semiconductor device. Thus, semiconductor processes for forming a semiconductor device may need a process of selectively etching a metal layer including copper. | High | [
0.688981868898186,
30.875,
13.9375
] |
Q: Shiny: Is there a way to enable mouse wheel zoom only after click on map in shiny? Is there a way to enable mouse wheel zoom only after first click on map. I have the following code in which I want to zoom the map only after click on the map. Is there a way to do that in shiny? library(shiny) library(leaflet) library(maps) ui <- fluidPage( leafletOutput("CountryMap", width = 1000, height = 500) ) server <- function(input, output){ Country = map("world", fill = TRUE, plot = FALSE, regions="USA", exact=TRUE) output$CountryMap <- renderLeaflet({ leaflet(Country) %>% addTiles() %>% fitBounds(Country$range[1], Country$range[3], Country$range[2], Country$range[4])%>% addPolygons(fillOpacity = 0.6, smoothFactor = 0.5, stroke = TRUE, weight = 1) }) } shinyApp(ui =ui, server = server) A: I very much like the idea of warmoverflow, since it is purely on R side and very easy to understand. I only just saw that he has already answered your question. But since I already worked on another solution, I migth as well post it here. Doesn't hurt to have multiple options. I produced a JavaScript solution that finds the leaflet map element and alters the scrollWheelZoom property. This would have been very straight forward, since you can just disable scroll zoom on start up and enable it as soon as the map has been clicked the first time. But the leaflet guys made things more difficult with this fix to another issue. There, they (besides other things) added a listener, which enables scroll zoom, whenever the mouse moves (pretty annoying). So in my fix, we add a script to the document that also adds a listener to the mouse move event to disable (and thereby cancel the enable of) the scrollWheelZoom property. When the map is clicked on for the first time, this event listener will be removed, and thus you have normal (default) zoom options. Code with Script below: library(shiny) library(leaflet) library(maps) ui <- fluidPage( leafletOutput("CountryMap", width = 1000, height = 500), tags$script(" $(document).ready(function() { setTimeout(function() { var map = $('#CountryMap').data('leaflet-map'); function disableZoom(e) {map.scrollWheelZoom.disable();} $(document).on('mousemove', '*', disableZoom); map.on('click', function() { $(document).off('mousemove', '*', disableZoom); map.scrollWheelZoom.enable(); }); }, 100); }) ") ) server <- function(input, output, session){ Country = map("world", fill = TRUE, plot = FALSE, regions="USA", exact=TRUE) output$CountryMap <- renderLeaflet({ leaflet(Country) %>% addTiles() %>% fitBounds(Country$range[1], Country$range[3], Country$range[2], Country$range[4])%>% addPolygons(fillOpacity = 0.6, smoothFactor = 0.5, stroke = TRUE, weight = 1) }) } shinyApp(ui =ui, server = server) A: R Leaflet package does not have the option to disable zoomControl or mouseWheelControl yet according to this https://github.com/rstudio/leaflet/issues/179, but inspired by Yihui's suggestion from the link, here is a workaround that dynamically changes the maxZoom level depending on mouse click event. library(shiny) library(leaflet) library(maps) ui <- fluidPage( leafletOutput("CountryMap", width = 1000, height = 500) ) server <- function(input, output){ Country = map("world", fill = TRUE, plot = FALSE, regions="USA", exact=TRUE) # Add a default minZoom and maxZoom of the same value so that the map does not zoom output$CountryMap <- renderLeaflet({ leaflet(Country) %>% addTiles(options=tileOptions(minZoom=4, maxZoom=4)) %>% fitBounds(Country$range[1], Country$range[3], Country$range[2], Country$range[4]) %>% addPolygons(fillOpacity = 0.6, smoothFactor = 0.5, stroke = TRUE, weight = 1) }) # Change a reactive value depending on mouse click zoom <- reactiveValues(level=4) # This records mouse clicks outside polygons observeEvent(input$CountryMap_click, { zoom$level = 20 }) # This records mouse clicks inside polygons observeEvent(input$CountryMap_shape_click, { zoom$level = 20 }) # Change zoom level of the map observe({ if (zoom$level == 20) { leafletProxy("CountryMap") %>% clearTiles() %>% addTiles(options=tileOptions(minZoom=4, maxZoom=20)) } }) } shinyApp(ui =ui, server = server) | Low | [
0.5266821345707651,
28.375,
25.5
] |
We’ll Always Have Chicken Little Most of us probably read, or were read, the story of Chicken Little as children. Some of us have remained invincibly ignorant, however, of the story’s basic message. My skepticism of the various chicken littles over ‘global warming’ is that these were the same people who were warning of an impending ice age in the 70s and mass starvation from overpopulation. Soylent Green may be looking a little long in the tooth, but the basics are still with us: environmental catastrophe, evil corporations, conspiracy, and heroes intent on exposing the truth to all. The despicable act of poisoning Viktor Yushchenko has pulled the veil off one of the pieces of the falling sky however. Michael Fumento discusses: The “deadly dioxin” legend began with, of all things, guinea pigs. When fed to them in studies, they did fall over like furry tenpins. Yet hamsters could absorb 1,000 times as much dioxin before emitting their last squeals and other animals seemed impervious to the stuff. Further, the animal deaths were from acute poisoning. Yet as a matter of convenience for activists, it not only became accepted that guinea pigs are the best animal model for humans but also that dioxin is a powerful carcinogen. The original promoters of the humans-are-like-guinea-pigs legend were Vietnam activists. Agent Orange, which contained a trace of dioxin, effectively stripped away the jungle canopy that hid communist forces. So the enemy and its U.S. sympathizers claimed it was poisoning not just trees but humans. Pressured by these “humanitarians” the military quit spraying in 1971, giving back the enemy his sanctuary from which to kill our troops. Yep, always comes back to the herroic activists. If the sky weren’t falling, they’d have nothing to do. | Low | [
0.528183716075156,
31.625,
28.25
] |
Q: Custom case distinctions in proofs Does Isabelle support custom case distinctions when proving statements? Let's say I want to prove a statement for all natural numbers n, but the proof is entirely different depending on whether n is even or odd. Is it possible to do that case distinction in a proof, like proof(cases n) assume "n mod 2 = 0" <proof> next assume "n mod 2 = 1" <proof> qed So far, I'd split the lemma/theorem in two seperate parts (assuming n even/odd) and then use these parts to proof the statement for all natural numbers, but that does not appear to be the optimal solution. A: In Isabelle2017, you can prove ad-hoc case distinction rules easily, like so: lemma "P (n::nat)" proof - consider (odd) "odd n" | (even) "even n" by auto then show ?thesis proof cases case odd then show ?thesis sorry next case even then show ?thesis sorry qed qed | High | [
0.6806282722513091,
32.5,
15.25
] |
Q: How can I secure Firebase with an all client-side implementation? I have a very simple Firebase app that is being read and written to via JavaScript all on the client-side. There are no user accounts or server-side applications on my end. Right now, anyone looking at my JavaScript can copy my Firebase URL and have full read/write access permissions. Is there any easy way for me to secure this somehow considering I'm doing everything on the client side? I'm having trouble understanding their documentation and how I can solve this use case. A: Data access is managed through Firebase's security rules language, that you can find in the Security & Rules tab of your Firebase dashboard. When you create a new Firebase backend for an app, it defaults to allowing full read/write to everyone. { "rules": { ".read": true, ".write": true } } The simplest possible change is to allow everyone to read, but no-one to write: { "rules": { ".read": true, ".write": false } } This way you can only make changes to the data when you're an administrator, i.e. when you're using the Firebase dashboard. The Firebase documentation has an entire section dedicated to securing your data. | High | [
0.7072135785007071,
31.25,
12.9375
] |
One Response to “New Rules From Bill Maher” Did you read Bill Maher's comment on the Huffington Post yesterday? He was decrying the dumbing down of America. While I admire Bill Maher a great deal, I am forced to take issue here. This pitiful America of which he speaks is very real. Of that there can be little doubt to anyone who has bothered to pay attention. But like a lot of people on the Left (I am sorry to say) he totally ignores – whether by accident or design – the undeniable advantages of living in the America of the first decade of the twenty-first century. For example: I never finished High School. In fact I dropped out at the very beginning of my Junior year. In spite of this unfortunate fact, the I.Q. of my country has dropped to such a horrifying degree in the last thirty years, whenever I arrive at a gathering of, say, two or three-hundred people, I am reasonably confident that I am the smartest person in the room. | Low | [
0.5055432372505541,
28.5,
27.875
] |
--- title: ガス(燃料) actions: ['答え合わせ', 'ヒント'] requireLogin: true material: editor: language: sol startingCode: "zombiefactory.sol": | pragma solidity ^0.4.19; import "./ownable.sol"; contract ZombieFactory is Ownable { event NewZombie(uint zombieId, string name, uint dna); uint dnaDigits = 16; uint dnaModulus = 10 ** dnaDigits; struct Zombie { string name; uint dna; // ここに新しいデータを追加せよ } Zombie[] public zombies; mapping (uint => address) public zombieToOwner; mapping (address => uint) ownerZombieCount; function _createZombie(string _name, uint _dna) internal { uint id = zombies.push(Zombie(_name, _dna)) - 1; zombieToOwner[id] = msg.sender; ownerZombieCount[msg.sender]++; NewZombie(id, _name, _dna); } function _generateRandomDna(string _str) private view returns (uint) { uint rand = uint(keccak256(_str)); return rand % dnaModulus; } function createRandomZombie(string _name) public { require(ownerZombieCount[msg.sender] == 0); uint randDna = _generateRandomDna(_name); randDna = randDna - randDna % 100; _createZombie(_name, randDna); } } "zombiefeeding.sol": | pragma solidity ^0.4.19; import "./zombiefactory.sol"; contract KittyInterface { function getKitty(uint256 _id) external view returns ( bool isGestating, bool isReady, uint256 cooldownIndex, uint256 nextActionAt, uint256 siringWithId, uint256 birthTime, uint256 matronId, uint256 sireId, uint256 generation, uint256 genes ); } contract ZombieFeeding is ZombieFactory { KittyInterface kittyContract; function setKittyContractAddress(address _address) external onlyOwner { kittyContract = KittyInterface(_address); } function feedAndMultiply(uint _zombieId, uint _targetDna, string _species) public { require(msg.sender == zombieToOwner[_zombieId]); Zombie storage myZombie = zombies[_zombieId]; _targetDna = _targetDna % dnaModulus; uint newDna = (myZombie.dna + _targetDna) / 2; if (keccak256(_species) == keccak256("kitty")) { newDna = newDna - newDna % 100 + 99; } _createZombie("NoName", newDna); } function feedOnKitty(uint _zombieId, uint _kittyId) public { uint kittyDna; (,,,,,,,,,kittyDna) = kittyContract.getKitty(_kittyId); feedAndMultiply(_zombieId, kittyDna, "kitty"); } } "ownable.sol": | /** * @title Ownable * @dev The Ownable contract has an owner address, and provides basic authorization control * functions, this simplifies the implementation of "user permissions". */ contract Ownable { address public owner; event OwnershipTransferred(address indexed previousOwner, address indexed newOwner); /** * @dev The Ownable constructor sets the original `owner` of the contract to the sender * account. */ function Ownable() public { owner = msg.sender; } /** * @dev Throws if called by any account other than the owner. */ modifier onlyOwner() { require(msg.sender == owner); _; } /** * @dev Allows the current owner to transfer control of the contract to a newOwner. * @param newOwner The address to transfer ownership to. */ function transferOwnership(address newOwner) public onlyOwner { require(newOwner != address(0)); OwnershipTransferred(owner, newOwner); owner = newOwner; } } answer: > pragma solidity ^0.4.19; import "./ownable.sol"; contract ZombieFactory is Ownable { event NewZombie(uint zombieId, string name, uint dna); uint dnaDigits = 16; uint dnaModulus = 10 ** dnaDigits; struct Zombie { string name; uint dna; uint32 level; uint32 readyTime; } Zombie[] public zombies; mapping (uint => address) public zombieToOwner; mapping (address => uint) ownerZombieCount; function _createZombie(string _name, uint _dna) internal { uint id = zombies.push(Zombie(_name, _dna)) - 1; zombieToOwner[id] = msg.sender; ownerZombieCount[msg.sender]++; NewZombie(id, _name, _dna); } function _generateRandomDna(string _str) private view returns (uint) { uint rand = uint(keccak256(_str)); return rand % dnaModulus; } function createRandomZombie(string _name) public { require(ownerZombieCount[msg.sender] == 0); uint randDna = _generateRandomDna(_name); randDna = randDna - randDna % 100; _createZombie(_name, randDna); } } --- 見事だ!これでDAppの重要な部分の更新を可能にしつつ、他の誰かが我々のコントラクトをめちゃくちゃにするのを防ぐ方法が理解できただろう。 Solidityが他のプログラミング言語と比べて、かなり違う部分についてさらに教えてやろう: ## ガス — イーサリアムDAppの燃料 Solidityでは、ユーザーが関数を使用するたびに、**_ガス_**と呼ばれる通貨を支払うことになっている。ユーザーはEther(イーサと呼ぶ。イーサリアムの通貨だ)でガスを買い、アプリの関数を実行するのだ。 関数を実行するために必要なガスの量は、関数のロジックの複雑さによるのだ。個々の操作には、その操作を実行するためにどれくらいの計算資源が必要になるのかを計算したものに基づいて、**_ガスのコスト_**が決まっている(例えば、storageへの書き込みは整数の足し算に比べてずっと高いぞ) 各操作に必要なガスの価格の合計が、関数の **_ガスのコスト_**になる。 ユーザーは実際にお金を使って関数を動かすことになるから、イーサリアムは他のプログラミング言語よりもずっとコードの最適化が重要になるのだ。お主のコードがお粗末だと、ユーザーは余分にお金を支払わなければならなくなる。結果的には数千人のユーザーの数百万ドルを無駄にすることになるのだ。 ## なぜガスが必要なのか? イーサリアムは、大きくて、遅いけれども、極めて安全なコンピューターのようなものだ。関数を実行する時には、ネットワーク上で必要になるすべてのノードで同じ関数が実行されて、出力が正しいことを検証するのだ。何千ものノードが関数の実行を検証する仕組みこそが、イーサリアムを分散型にして、データを不変で検閲耐性の強いものにしているのだ。 イーサリアムの作成者は、誰かが無限ループを起こしてネットワークを詰まらせたり、非常に重い処理でネットワークの計算資源を食いつぶしたりしないようにしたいと願っていたのだ。だからこそ、トランザクションを無料にすることを避け、ユーザーに計算時間とストレージについて支払うようにしたのだ。 > 注:CryptoZombiesの作者がLoom Networkで構築しているようなサイドチェーンの場合は話は別です。 World of Warcraftのようなゲームをイーサリアムのメインのネットワーク上で直接動かすことは、ガスのコストが高額になることから、ありえない話です。しかし、別のコンセンサスアルゴリズムで動作するサイドチェーン上で実行することは十分考えられることです。後のレッスンで、どのようなタイプのDAppをイーサリアムのメインネットワークではなくサイドチェーン上に構築すべきかについて解説します。 ## ガスを節約するためのstruct構造 レッスン 1では、`uint`には様々なタイプがあることを教えたな。 `uint8`、 `uint16`、 `uint32`とかだ。 普通はこのサブタイプを使うメリットはない。なぜならSolidityは`uint`のサイズに関わらず256ビットのストレージを確保するからだ。例えば`uint` (`uint256`) の代わりに`uint8` を使ってもガスの節約にはならない。 しかしこれには例外がある。それは`struct`の中だ。 structの中に複数の `uint`がある場合、できる限り小さい単位の `uint`を使うことで、Solidityが複数の変数をまとめて、ストレージを小さくすることが可能だ。例をあげるぞ: ``` struct NormalStruct { uint a; uint b; uint c; } struct MiniMe { uint32 a; uint32 b; uint c; } // 複数の変数がまとめられるため、`mini` は`normal`に比べてガスコストが低くなる。 NormalStruct normal = NormalStruct(10, 20, 30); MiniMe mini = MiniMe(10, 20, 30); ``` このため、structの中ではできる限り小さな整数のサブタイプを使うようにすることだ。 また、同じデータ型の変数を一箇所にまとめることで(つまり、structの中で隣り合わせることで)、Solidityのstorageスペースを最小限に抑えることも可能だ。例えば、`uint c; uint32 a; uint32 b;`は、`uint32 a; uint c; uint32 b;`よりもコストが低くなる。なぜなら2つの`uint32`変数をまとめることできるからだ。 ## それではテストだ ここではゾンビに新たに2つの特徴を加えたい。`level` と`readyTime`だ。`readyTime`はゾンビに餌を与える間隔を設定するクールダウンタイマーに使用する。 では、`zombiefactory.sol`に戻るぞ。 1. `Zombie` structに2つのプロパティを追加せよ。プロパティは `level` (`uint32`)と、`readyTime` (`uint32`)である。このデータ型をまとめることができるようにstructの最後に設定せよ。 ゾンビのレベルとタイムスタンプの格納は32 bitsで十分だ。そこで、通常の`uint` (256ビット)ではなく、よりタイトにデータを格納することでガスコストを節約するのだ。 | Low | [
0.509761388286334,
29.375,
28.25
] |
Q: Generic argument with a number property I want to create a function like this: insert<T>(target: T, property: keyof T, value: number) { target[property] = value; } This code does not works. Because target[property] if of type T[keyof T] and typescript won't allow a number in this type. I tried something like this : insert<T extends {[p in P]: number}, P keyof T>(target: T, property: P, value: number) But it does not work. How can i make this function works ? A: Fix is to use value type directly from the mapped type: function insert<T, K extends keyof T> (target: T, property: K, value: T[K]) { target[property] = value; } The main change is: second generic K third argument type as T[K] As your type has one value type, we can even have another solution without second generic: function insert<T extends Record<string, number>> (target: T, property: keyof T, value: T[keyof T]) { target[property] = value; } In this context when all keys represent the same value, T[keyof T] is also correct. | Mid | [
0.605113636363636,
26.625,
17.375
] |
389 Pa. 304 (1957) Commonwealth v. Moon, Appellant. Supreme Court of Pennsylvania. Argued April 23, 1957. May 27, 1957. *305 Before JONES, C.J., BELL, CHIDSEY, MUSMANNO, ARNOLD and JONES, JJ. Edward Dumbauld, with him Thomas A. Waggoner, Jr., and E.H. Beshlin, for appellant. Frank P. Lawley, Jr., Deputy Attorney General, with him Harrington Adams, Deputy Attorney General, for appellee. OPINION BY MR. JUSTICE ARNOLD, May 27, 1957: The defendant, Norman W. Moon, murdered the Honorable Allison D. Wade, President Judge of Warren County. At his trial before a jury he was convicted of murder in the first degree and the jury imposed the death penalty, and defendant appeals. *306 Moon was directed to appear before Judge Wade on a charge of failure to comply with an order of support. (See Commonwealth v. Moon, 174 Pa. Superior Ct. 334, 101 A. 2d 147). The day before the date fixed for his appearance he cashed a check for $1,500 and purchased a forty-five calibre pistol, a box of shells and two clips, both of which were loaded when he entered the court room. Moon never paid anything on the support order entered against him. Having been ordered to appear before the Court of Quarter Sessions of Warren County for sentence (he was then in default $1,600 on the support order), he appeared before said court on January 13, 1954. When asked if he intended to comply with the order of support, Moon replied, "Absolutely not." When he stood before the court he drew the pistol in question, which had been loaded with one clip, and emptied the gun in various directions and at Judge Wade. Judge Wade stumbled from the dais and was prone on the floor of the court room when Moon fired two more shots. Judge Wade cried out, "Don't shoot, please don't shoot, I won't sentence you," to which Moon replied, "You God-damned . . . you will never get a chance to." Judge Wade's death was almost instantaneous. Moon then reloaded his gun and while making his escape from the court room threatened to kill attorney Bonavita who attempted to stop him. Moon got into his automobile and soon after officers stopped progress of the automobile by shooting the tires. He then got out of the car and shot himself in the neck, and was taken to the Warren Hospital, where he recovered. Repeatedly during his trial the defendant stated that he was extremely mad or furious. Subsequent to the verdict Moon presented a petition to appoint a commission to determine his mental condition. The court found him to be sane, but on appeal *307 this finding was reversed and this Court ordered a reexamination of the commission's findings and recommendation, and reconsideration of the evidence in the light of the statutory definition of mental illness. See Commonwealth v. Moon, 383 Pa. 18, 117 A. 2d 96. Thereafter the lower court executed the mandate of this Court, and entered an order refusing to commit him to a mental hospital and finding that it was not satisfied that he was mentally ill. On appeal this order was affirmed. See Commonwealth v. Moon, 386 Pa. 205, 125 A. 2d 594. Thereafter the court below heard the defendant's motion for new trial, denied the same, and this appeal followed. The defendant, who took the stand on his own behalf, admitted all of the circumstances of the killing, but claimed the following trial errors: (1) When examining on the voir dire the first juror drawn, counsel for appellant sought to ask the following hypothetical question: "Mrs. Knapp, again under the law of Pennsylvania, a person who at the time of the commission of any act which would otherwise be criminal, is unable to tell the difference between right and wrong and to appreciate the consequences of his acts, such a person is entitled to be found not guilty by reason of insanity. If you found from a fair preponderance of the evidence, that the accused at the time of the commission of this act, was unable to distinguish right from wrong and unable to appreciate the consequences of his act, would you then find him not guilty by reason of insanity?" The Commonwealth's objection was sustained and properly so. This Court declared in Commonwealth v. Bentley, 287 Pa. 539, at page 546, 135 A. 310: "In conducting the preliminary examination, considerable latitude must be permitted to elicit the necessary information, but it is to be strictly confined to inquiries disclosing qualifications, *308 or lack of them, and not extended so as to include hypothetical questions, when their evident purpose is to have the jurors indicate in advance what their decisions will be under a certain state of the evidence or upon a certain state of facts, and thus possibly commit them to definite ideas or views when the case shall be finally submitted to them for their decision." (2) The appellant claims the court below committed error in not sustaining the challenge for cause as to several jurors following examination on voir dire. These challenges for cause were made at a time when the defendant's peremptory challenges were not exhausted, and hence the refusal of the challenge cannot be prejudicial error. Sayres v. Commonwealth, 88 Pa. 291, 306, 307; Commonwealth v. Bibalo, 375 Pa. 257, 264, 100 A. 2d 45. The defendant is not entitled to the services of any particular juror but only as to twelve unprejudiced jurors. (3) The defendant was not prejudiced by the action of the court in belatedly permitting the Commonwealth to challenge peremptorily one Honhart after he had been passed as a juror by the Commonwealth. The court, after excusing said juror, immediately, of its own motion, granted an additional peremptory challenge to the defendant. In Commonwealth v. Schroeder, 302 Pa. 1, 152 A. 835, the defendant was convicted of murder in the first degree and sentenced to death. The court there charged that certain evidence on credibility of one of the defendant's witnesses was substantive evidence of defendant's guilt. This Court commented, at page 11: "Apparently the court did inadvertently treat the evidence as substantive proof. We are convinced that this instruction did defendant no harm and did not bring about her conviction." (Italics supplied). Thus this Court there determined that even though the instruction was erroneous, if the court was convinced *309 that the defendant was not harmed thereby, the judgment and sentence would be affirmed. "`The defendant in a homicide case has no standing in an appellate court to complain of an erroneous instruction unless the error contributed to the result reached by the jury': Com. v. Winter, 289 Pa. 284 [137 A. 261]; Com. v. Divomte, 262 Pa. 504 [105 A. 821].": Commonwealth v. Schroeder, supra. (Italics supplied). (4) The Commonwealth introduced the photograph of Judge Wade taken very shortly after the assault by the defendant. It was offered to show the location of the body in the court room and to show the direction of the bullet wounds in vital parts. Having examined the photograph carefully, we find that it was not inflammatory or prejudicial. It simply showed a body prone on the floor of the court room with stains, evidently blood, on its left side. Introduction of such exhibits is a purely discretionary matter for the trial judge, and we find no abuse of discretion: Commonwealth v. Ballem, 386 Pa. 20, 27, 123 A. 2d 728. (5) The defendant next complains that he was not allowed to show the bias of the witness, Bernice R. Seavy. We have examined this assignment and find no merit in it. Evidently the appellant misunderstood the answer of the witness. (6) Next the defendant objects to the memorandum made by Commonwealth's witness during an interview with the defendant while he was in the hospital. This memorandum was not signed or written by the defendant, nor is such necessary. The defendant was unable to speak due to his self-inflicted wounds and was instructed to nod his head yes or no, and to hold up fingers to indicate "how many." The memorandum was clearly admissible just as an unsigned or oral statement of the defendant would have been. Its weight was for the jury, and the defendant was not harmed *310 by the admission in evidence of the memorandum. The answers of the defendant to the questions asked were fully testified to by officers Naddeo and Mehallic. (7) The defendant complains about the lower court's instructions on the question of the alleged insanity of the defendant. There was no prejudicial error in the court's charge on the question of insanity, although much is attempted to be made of the self-inflicted wounds of the defendant. See Commonwealth v. Lewis, 222 Pa. 302, 303, 71 A. 18; Commonwealth v. Wireback, 190 Pa. 138, 42 A. 542; Commonwealth v. Barner, 199 Pa. 335, 49 A. 60. This was examined by the jury, which rejected the plea of sympathy based thereon. See also Commonwealth v. Moon, 383 Pa. 18, 117 A. 2d 96, and Commonwealth v. Moon, 386 Pa. 205, 125 A. 2d 594. Here the defendant was actuated by hatred of his wife and quite evidently had made up his mind that he would not comply with the court order against him for her support. The day before the killing he had obtained sufficient money to pay the back support, but refused to pay it, and instead murdered the judge who was about to order him to do so. The defendant had a night's sleep after he had purchased the gun and shells and obtained the $1,500. As long as we are to have the death penalty in Pennsylvania certainly this is a clear case for its imposition. In accordance with the Act of February 15, 1870, P.L. 15, Section 2, 19 PS § 1187, we have reviewed both the law and the evidence in this record, and have determined that all the ingredients necessary to constitute murder in the first degree have been proved to exist. The judgment is affirmed, and the record is remitted to the court below for the purpose of execution. *311 DISSENTING OPINION BY MR. JUSTICE MUSMANNO: The Majority Opinion in this case says: "As long as we are to have the death penalty in Pennsylvania certainly this is a clear case for its imposition." It is indeed difficult to imagine a more flagrant violation of law and order than the assassination of a judge sitting in Court provided, of course, the killer is sane. If the heinousness of the act is to dictate the punishment, regardless of sanity or insanity, then Norman W. Moon should be executed. But, as long as we have in Pennsylvania the rule that an insane person should not be executed, certainly this is the case to apply it. I would think that the very act of shooting a judge suggests insanity at the outset. The Majority thinks otherwise. In addition, however, to the outer aspects of the case, we have the findings of a Sanity Commission, duly appointed by the Court, which unanimously found: "a. Norman W. Moon is in fact mentally ill. b. Norman W. Moon's mental illness is that of dementia praecox of the paranoid type. c. This illness is chronic and continuing. d. Norman W. Moon is a proper subject for commitment to a mental hospital." The lower Court which appointed the commission, after lauding the abilities and integrity of its members, declined to follow its recommendations. This Court, on appeal, affirmed the declination. (386 Pa. 205). I dissented from this Court's decision and I still believe that, in accordance with the Commission's recommendations, the defendant should be committed to a mental hospital until such time as he will have regained sanity, when the matter of the verdict against him in the trial for murder may be disposed of in accordance with law and justice. In my Dissenting Opinion (386 Pa. 219-231), I pointed out, as further evidence of Moon's insanity, the fact that he had set out to kill two other judges against whom he could not have had a sane animosity, namely, *312 Judge GUNTHER of the Superior Court, who had not written any Opinion against Moon, and the writer of this Opinion who had never theretofore participated in any way in any decision involving Moon. Moon had also tried to kill the district attorney of Warren County as well as the court stenographer, with neither of whom had he had any quarrel. And then he tried to kill himself, (a deed which could not possibly have brought him any advantage) by shooting himself in the neck. Moon was a man who had gone berserk. There was no rhyme, reason, purpose, or objective to his actions, so obviously maniacal. In my previous Dissenting Opinion I showed how the lower Court ignored the findings of a highly trained and qualified commission made up of two experienced doctors and a lawyer, and founded its conclusion mostly on the testimony of lay prison guards who were considerably limited in their appraisement of the subject of whom they spoke. I still believe the Court's action to have been serious error. This is a case where the Courts should have been extremely cautious in reaching their conclusions so that it could not be said, no matter how incorrectly, that they were influenced in their decision by the fact that a judge had been killed. Defendant's counsel in this appeal complains also of various trial errors. Without expressing my views on all the reasons advanced for a new trial, I wish to indicate my agreement with counsel's complaint that the prosecuting attorney improperly introduced in evidence a photograph of the body of Judge Wade, as it lay on the courtroom floor after the shooting. I believe that defense counsel is justified in complaining, as he does in his brief: "The prosecuting attorney advanced two reasons in support of the offer: (1) to show the location of the *313 body in the courtroom; and (2) to show the location of the bullet wounds in vital parts causing death. "Obviously the exhibit had no probative value and was not admissible under the first ground advanced. The testimony shows that the photograph does not depict the position or location of the body at the time of his death. The body had been moved, and the clothing had also been arranged so as to display prominently the gruesome spectacle of blood stains. . . "With respect to the second reason advanced in support of the offer, it is obvious that Exhibit 4 was merely cumulative. It was not necessary to offer the photograph in order to prove the corpus delicti or cause of death. "Before the photograph was offered, the Coroner had testified with respect to this point: `Q. What was the cause of death? A. Two wounds on the left side between, about at the elbow (Witness indicating on his own body) made by bullets.' "This testimony was subsequently elaborated and the witness illustrated his testimony adequately by indicating the location of the bullet marks on his own body. . . "Thus the real purpose of offering the photograph was manifestly to shock and horrify the jury. For this purpose, as the trial Court concedes and as the decisions of this Court have often emphasized, the exhibit should not have been admitted. It should have been excluded as inflammatory and undoubtedly prejudicial to defendant." | Mid | [
0.538116591928251,
30,
25.75
] |
/* * ============================================================================= * * Copyright (c) 2011-2018, The THYMELEAF team (http://www.thymeleaf.org) * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * ============================================================================= */ package org.thymeleaf.templateparser.markup; import org.attoparser.AbstractChainedMarkupHandler; import org.attoparser.IMarkupHandler; import org.attoparser.ParseException; import org.thymeleaf.IEngineConfiguration; import org.thymeleaf.exceptions.TemplateProcessingException; import org.thymeleaf.standard.inline.IInlinePreProcessorHandler; import org.thymeleaf.standard.inline.OutputExpressionInlinePreProcessorHandler; import org.thymeleaf.templatemode.TemplateMode; /* * This class converts inlined output expressions into their equivalent element events, which makes it possible * to cache parsed inlined expressions. * * Some examples: * * [[${someVar}]] -> [# th:text="${someVar}"/] (decomposed into the corresponding events) * [(${someVar})] -> [# th:utext="${someVar}"/] (decomposed into the corresponding events) * * NOTE: The inlining mechanism is a part of the Standard Dialects, so the conversion performed by this handler * on inlined output expressions should only be applied if one of the Standard Dialects has been configured. * * --------------------------------------------------------------------------------------------------------------------- * NOTE: Any changes here should probably go too to org.thymeleaf.templateparser.text.InlinedOutputExpressionTextHandler * --------------------------------------------------------------------------------------------------------------------- * * @author Daniel Fernandez * @since 3.0.0 */ final class InlinedOutputExpressionMarkupHandler extends AbstractChainedMarkupHandler { private final OutputExpressionInlinePreProcessorHandler inlineHandler; InlinedOutputExpressionMarkupHandler( final IEngineConfiguration configuration, final TemplateMode templateMode, final String standardDialectPrefix, final IMarkupHandler handler) { super(handler); this.inlineHandler = new OutputExpressionInlinePreProcessorHandler( configuration, templateMode, standardDialectPrefix, new InlineMarkupAdapterPreProcessorHandler(handler)); } @Override public void handleText( final char[] buffer, final int offset, final int len, final int line, final int col) throws ParseException { this.inlineHandler.handleText(buffer, offset, len, line, col); } @Override public void handleStandaloneElementStart( final char[] buffer, final int nameOffset, final int nameLen, final boolean minimized, final int line, final int col) throws ParseException { this.inlineHandler.handleStandaloneElementStart(buffer, nameOffset, nameLen, minimized, line, col); } @Override public void handleStandaloneElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final boolean minimized, final int line, final int col) throws ParseException { this.inlineHandler.handleStandaloneElementEnd(buffer, nameOffset, nameLen, minimized, line, col); } @Override public void handleOpenElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleOpenElementStart(buffer, nameOffset, nameLen, line, col); } @Override public void handleOpenElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleOpenElementEnd(buffer, nameOffset, nameLen, line, col); } @Override public void handleAutoOpenElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleAutoOpenElementStart(buffer, nameOffset, nameLen, line, col); } @Override public void handleAutoOpenElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleAutoOpenElementEnd(buffer, nameOffset, nameLen, line, col); } @Override public void handleCloseElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleCloseElementStart(buffer, nameOffset, nameLen, line, col); } @Override public void handleCloseElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleCloseElementEnd(buffer, nameOffset, nameLen, line, col); } @Override public void handleAutoCloseElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleAutoCloseElementStart(buffer, nameOffset, nameLen, line, col); } @Override public void handleAutoCloseElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) throws ParseException { this.inlineHandler.handleAutoCloseElementEnd(buffer, nameOffset, nameLen, line, col); } /* * No need to care about 'unmatched close' events - they don't influence the execution level nor inlining operations */ @Override public void handleAttribute( final char[] buffer, final int nameOffset, final int nameLen, final int nameLine, final int nameCol, final int operatorOffset, final int operatorLen, final int operatorLine, final int operatorCol, final int valueContentOffset, final int valueContentLen, final int valueOuterOffset, final int valueOuterLen, final int valueLine, final int valueCol) throws ParseException { this.inlineHandler.handleAttribute( buffer, nameOffset, nameLen, nameLine, nameCol, operatorOffset, operatorLen, operatorLine, operatorCol, valueContentOffset, valueContentLen, valueOuterOffset, valueOuterLen, valueLine, valueCol); } private static final class InlineMarkupAdapterPreProcessorHandler implements IInlinePreProcessorHandler { private IMarkupHandler handler; InlineMarkupAdapterPreProcessorHandler(final IMarkupHandler handler) { super(); this.handler = handler; } public void handleText( final char[] buffer, final int offset, final int len, final int line, final int col) { try { this.handler.handleText(buffer, offset, len, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleStandaloneElementStart( final char[] buffer, final int nameOffset, final int nameLen, final boolean minimized, final int line, final int col) { try { this.handler.handleStandaloneElementStart(buffer, nameOffset, nameLen, minimized, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleStandaloneElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final boolean minimized, final int line, final int col) { try { this.handler.handleStandaloneElementEnd(buffer, nameOffset, nameLen, minimized, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleOpenElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleOpenElementStart(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleOpenElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleOpenElementEnd(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleAutoOpenElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleAutoOpenElementStart(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleAutoOpenElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleAutoOpenElementEnd(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleCloseElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleCloseElementStart(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleCloseElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleCloseElementEnd(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleAutoCloseElementStart( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleAutoCloseElementStart(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleAutoCloseElementEnd( final char[] buffer, final int nameOffset, final int nameLen, final int line, final int col) { try { this.handler.handleAutoCloseElementEnd(buffer, nameOffset, nameLen, line, col); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } public void handleAttribute( final char[] buffer, final int nameOffset, final int nameLen, final int nameLine, final int nameCol, final int operatorOffset, final int operatorLen, final int operatorLine, final int operatorCol, final int valueContentOffset, final int valueContentLen, final int valueOuterOffset, final int valueOuterLen, final int valueLine, final int valueCol) { try { this.handler.handleAttribute( buffer, nameOffset, nameLen, nameLine, nameCol, operatorOffset, operatorLen, operatorLine, operatorCol, valueContentOffset, valueContentLen, valueOuterOffset, valueOuterLen, valueLine, valueCol); } catch (final ParseException e) { throw new TemplateProcessingException("Parse exception during processing of inlining", e); } } } } | Low | [
0.5338208409506391,
36.5,
31.875
] |
/*Package iambuilder exposes a fluent IAM privilege builder */ package iambuilder | Mid | [
0.6538461538461531,
31.875,
16.875
] |
Authors Assistant Professor, Johnson Shoyama Graduate School of Public Policy, University of Saskatchewan Disclosure statement Françoise Baylis has received research funding from CIHR and the Canada Research Chairs program Alana Cattapan has received funding from the Social Sciences and Humanities Research Council, the Canadian Institutes of Health Research, and the Saskatchewan Health Research Foundation. She is on the Board of the Canadian Research Institute for the Advancement of Women. In Canada, it’s illegal to pay for the services of a surrogate mother or to purchase human gametes — sperm and eggs. These prohibitions are entrenched in the Assisted Human Reproduction Act. Some Liberal members of Parliament want to change this. Anthony Housefather, MP for Mount Royal and chair of the House of Commons Standing Committee on Justice and Human Rights, recently held a news conference to announce that he plans to introduce a private member’s bill to remove the legal prohibitions on payments. Flanked by fertility doctors, lawyers, intended parents, surrogates and fertility agents, Housefather argued that Canadians should be able to pay — and be paid — for surrogacy, as well as human sperm and eggs. Among these reasons are the need to avoid both the commodification of the human body and the twin risks of exploitation and coercion. That’s why the federal government introduced criminal prohibitions on payment for surrogacy as well as human sperm and eggs in 2004. Why criminal prohibitions? Because according to our Constitution, the only mechanism available to the federal government to enforce a ban on payment is criminal law. The division of powers between the federal and provincial governments is such that health is a provincial responsibility and criminal law is a federal responsibility. Anthony Housefather, MP for Mont Royal, says he plans to introduce a private member’s bill to remove the legal prohibitions on payments to surrogate mothers or for sperm or eggs.Liberal.ca The Assisted Human Reproduction Act was carefully drafted to ensure that access to reproductive technologies would not be a gateway to commerce in the body. This was a challenging piece of legislation to craft, involving considerable study, consultation and compromise. The process began in the mid-1980s with the call for a Royal Commission on New Reproductive Technologies and continued through the 1990s and into the 2000s. It included numerous consultations with stakeholders and the public, several failed attempts at legislation and very careful consideration of how this issue should move forward. Act outdated? When the act finally passed 14 years ago, there was all-party agreement that payment for surrogacy and sperm and eggs was not the way forward. Housefather suggests that the act is outdated; that it did not anticipate the creation of non-traditional families. But this is inaccurate. Réal Ménard, for example, one of the first openly gay MPs, worked with members of the LGBTQ community to ensure that sexual orientation would not be a barrier to access. It’s important not to ignore or misrepresent the intense challenges of a legislative process that was nearly 30 years in the making. Housefather also suggests that Canadian values have changed since the act came into force. However, recent public commitment to keeping payment out of the blood supply system indicates that Canadian values about payment for bodily tissues may not have changed all that much. The Assisted Human Reproduction Act permits reimbursement of receipted expenditures for surrogates and gamete donors in accordance with regulations. The problem with this feature of the act, however, is that there are no published regulations. This is finally about to change. These long-anticipated regulations will provide much-needed clarity and transparency. Housefather’s proposed bill will undermine the development of the regulations by attempting to eliminate the framework for reimbursement completely. The federal government has an obligation to address the health and safety of surrogates, sperm donors and egg donors. It also has an obligation to provide clear regulations on reimbursement of expenditures so that Canadians who want to use surrogates and donor sperm and eggs can do so without running afoul of the law. The governance of assisted human reproduction is too important to the future of Canadian families to be undermined by a private member’s bill calling for an open market in human reproduction. | Mid | [
0.607792207792207,
29.25,
18.875
] |
Q: Execute button's command after the animation In my application i have added a frame-by-frame animation to my button's selector. So, when I press the button the application is started and another activity is launched. The problem is that if I press the button very quickly the application reaches only to the second frame. I would like to launch the next activity after the animation is ended. Is that possible? Thanks a lot Gratzi A: The button should launch a new Thread instead new Activity directly, and then this new Thread will launch the activity after a few secconds using "Thread.sleep(xxxx);" btn.setOnClickListener(new OnClickListener() { @Override public void onClick(View v) { new Thread() { public void run() { Thread.sleep(1000); //LAUNCH NEW ACTIVITY HERE } }.start(); } } I hope it will help you. | Mid | [
0.6071428571428571,
27.625,
17.875
] |
Q: IE 8 and javascript debugger I upgrade my IE last week, and now i can't disabled the javascript debugger for visual studio 2008. The checkbox in the IE options are uncheck but the debugger in visual studio still enable. Any idea ? ps : I got Ie 8.0.6001.18783 A: This is a 'feature' of VS2008 - there's no way to turn it off. You can, however, open the Processes window (Alt-Z by default) and detach VS2008 from iexplore.exe after it's launched. | Mid | [
0.585492227979274,
28.25,
20
] |
Updated Phobos-Grunt Prediction Calls for Ocean Reentry Location Based on the latest Phobos-Grunt telemetry data, the probe is now predicted to reenter Earth’s atmosphere on January 14 at 11:02 UTC over the southern Atlantic Ocean. Predicted reentry locations and times have varied considerably within the 51.4 N and S longitudal lines over the past weeks based on updating orbital elements. The January 14 prediction is based on an STK model. USSTRATCOM is not yet providing a prediction according to celestrak.com. Phobos-Grunt was launched on November 9 and was declared unrecoverable by Roscosmos on December 10. Roscosmos’ latest reentry prediction published January 11 calls for reentry between January 14 and January 16 with the most likely location in the Indian Ocean. Roscosmos anticipated 20-30 fragments to reach the surface with the hydrazine fuel tank expected to burn up on reentry. About the author Having wandered into professional writing and editing after a decade in engineering, science, and management, Merryl now enjoys reintegrating the dichotomy by bringing space technology and policy within reach of an interested public. After three years as Space Safety Magazine’s Managing Editor, Merryl semi-retired to Visiting Contributor and manager of the campaign to bring the International Space Station collaboration to the attention of the Nobel Peace Prize committee. She keeps her pencil sharp as Proposal Manager for U.S. government contractor CSRA. | Mid | [
0.597402597402597,
34.5,
23.25
] |
Better sleep quality in chronic haemodialyzed patients is associated with morning-shift dialysis: a cross-sectional observational study. The aim of the study was to investigate the association between dialysis shift and subjective sleep quality in chronic haemodialyzed patients. A cross-sectional observational study. A total of 206 haemodialyzed patients aged from 22 to 71 participated in this study. Participants were grouped into the morning-shift and other-shifts groups. Subjective sleep quality was measured using the Pittsburgh Sleep Quality Index (PSQI). All participants also completed the Beck Depression Inventory (BDI) and Beck Anxiety Inventory (BAI). Dialysis shift significantly predicted the PSQI score with patients receiving morning-shift haemodialysis having better sleep quality (β=0.15, p=0.01). Other independent predictors of the PSQI score included depression (β=0.42, p<0.001), anxiety (β=0.38, p<0.001), and tea drinking (β=0.20, p0.001). Together these factors explained 48.2% of the variance in the PSQI score. Morning dialysis shift was significantly associated with better subjective sleep quality in chronic haemodialyzed patients after adjusting for other confounders. | Mid | [
0.645,
32.25,
17.75
] |
EPA chiefs for four past Republican presidents addressed climate change in front of Congress on Wednesday and said something needs to be done about global warming, a position many GOP lawmakers are reluctant to take. According to The Associated Press, in a congressional hearing organized to undermine Republican opposition to President Barack Obama's environmental proposals, Senate Democrats asked the heads of the Environmental Protection Agency for Richard Nixon, George H.W. Bush, George W. Bush, and Ronald Reagan to discuss the risks from climate change and what should be done about it. Some Republicans dispute the science of climate change and have worked to unravel Obama's steps to address it. Action on Capitol Hill — where even a bland, bipartisan energy efficiency bill couldn't get passed in May — has been in a deep freeze. "We have a scientific consensus around this issue. We also need a political consensus," said Christine Todd Whitman, the former New Jersey Governor and first EPA administrator under President George W. Bush, who resigned her post after disagreeing with the White House's direction on pollution rules. Whitman was joined by William Ruckelshaus, the nation's first EPA administrator under President Richard Nixon, William Reilly, who led the EPA under President George H.W. Bush, and Lee Thomas, who was administrator under Reagan. The strategy by Democrats was reminiscent of other high-profile hearings on climate change that created fanfare but resulted in little action. In March, Democrats staged an all-nighter on the Senate floor to talk climate change. In 2009, former Vice President Al Gore and former House Speaker Newt Gingrich sparred before a House committee over climate change. Climate scientist James Hansen in 1988 told the Senate the planet is warming and pollution is to blame. The EPA chiefs' testimony apparently did little to bridge the divide. Coal miners packed the hearing to protest a new EPA plan to cut carbon dioxide pollution from power plants. Before any testimony, top Republicans on the Senate environmental panel said the rule would kill jobs for no environmental benefit. That view contrasted sharply with the opinions of the four EPA administrators, who said the Obama administration had worked hard to make the proposal flexible and workable, using authority provided by Congress. The former EPA administrators told lawmakers that global warming was similar to other serious environmental issues they confronted, such as industrial pollution, dangerous pesticides or water contamination. But tackling those issues enjoyed broad public support. "Inherent in all of these problems was uncertain science and powerful economic interests resisting controls. The same is true of climate change," said Ruckelshaus, who also led the agency under Reagan. "In all of the cases cited, the solutions to the problems did not result in the predicted economic and social calamity." The four EPA chiefs also said that they are not alone in the Republican party. "There are Republicans that believe the climate is changing and humans have a role to play. They just need some political cover," said Whitman, in an interview before the hearing. Reilly was even more direct. "There is a lot happening on climate," he said, citing efforts by states and corporations to tackle the problem. "It's just not happening in Washington." EPA chiefs for four past Republican presidents addressed climate change in front of Congress on Wednesday and said something needs to be done about global warming, a position many GOP lawmakers are reluctant to take. | Mid | [
0.6515837104072391,
36,
19.25
] |
Elastofibroma dorsi. A case report and review of the literature. Elastofibroma dorsi is a benign soft-tissue tumor characterized by the presence of elastic fibers among a stroma of collagenous and fatty connective tissue. This lesion characteristically is located in the subscapular region; however, it has been infrequently described in other anatomic locations. In the subscapular region, it can be a cause of periscapular pain, discomfort, and loss of range of motion. This paper presents a typical case and a brief review of the literature, concentrating on the clinical aspects of elastofibroma dorsi in addition to recent advances regarding the pathogenesis of this unusual lesion. | High | [
0.6600496277915631,
33.25,
17.125
] |
Theory of optimal beam splitting by phase gratings. I. One-dimensional gratings. We give an analytical basis for the theory of optimal beam splitting by one-dimensional gratings. In particular, we use methods from the calculus of variations to derive analytical expressions for the optimal phase function. | High | [
0.701195219123506,
33,
14.0625
] |
gloria vanderbilt Deeply embedded in Western culture, denim just keeps on giving. A textile initially worn by farmers, miners and fishermen, denim is now the foundation of every (wo)man's closet. Alina Kulesh pays homage ... Lately, grey-haired octogenarians have been replacing fresh-faced teenagers in street style shots and advertising campaigns. With the public smitten by the more mature looks and the industry following ... About Us The Genteel unearths the forces shaping global fashion and design through the lens of business, culture, society and best kept secrets. Our Contributors A worldwide collective of contributors currently form The Genteel. On a daily basis our team dispatches thought-provoking and insightful articles from the streets of Oslo, Toronto, Beirut, Moscow, United Arab Emirates, Seoul and beyond. | Mid | [
0.5648535564853551,
33.75,
26
] |
(e) -2 a Which is the biggest value? (a) 3/2 (b) 4 (c) -108 (d) -1/3 (e) 2 (f) -0.1 b What is the third biggest value in -4/11, 0.4, 0.03, 3/7, 0.16? 0.16 What is the smallest value in -350, 0.2, 1/36? -350 Which is the smallest value? (a) 1 (b) 7 (c) -8/15 (d) -15 (e) 4 d Which is the third biggest value? (a) -0.3 (b) -0.1 (c) 1/27 (d) -3 a Which is the third smallest value? (a) 86 (b) -0.1 (c) 1780 (d) 0.3 a What is the second biggest value in 24, 1/8, 1189? 24 Which is the smallest value? (a) 34 (b) 1/5 (c) 10/23 (d) -4/7 (e) -0.3 d Which is the fifth biggest value? (a) 9 (b) 3 (c) 0.5 (d) -7.8 (e) -12 e Which is the second smallest value? (a) -20 (b) 74 (c) 3 (d) -0.05 d Which is the fourth smallest value? (a) -5 (b) -2/109 (c) 12/13 (d) 15 d Which is the second smallest value? (a) -41704 (b) 3 (c) 2/15 (d) 5/2 (e) 1/6 (f) -1/4 f Which is the second biggest value? (a) 1.6 (b) 13 (c) 41 b Which is the second smallest value? (a) -7 (b) 320 (c) 7 c Which is the biggest value? (a) -524 (b) 0.06 (c) -1/3 (d) -0.5 (e) -0.024 b What is the second biggest value in 1/4, 1, 26.3? 1 What is the third biggest value in 0, -0.12773, 6? -0.12773 What is the biggest value in 5, 1862, 0.3, -1/5? 1862 Which is the second smallest value? (a) 0.3 (b) -317 (c) 3 (d) 2 (e) 0.2 e What is the smallest value in 1.1, 1, 172/9, 5, -2/9? -2/9 Which is the third smallest value? (a) 2 (b) 0 (c) 11749 (d) -4 (e) 3 a Which is the second biggest value? (a) 0.5 (b) -234 (c) -9 c Which is the third biggest value? (a) -0.5 (b) -3 (c) 0.0541 (d) 0.3 (e) 0.4 c Which is the sixth biggest value? (a) -5.1 (b) -8 (c) 3 (d) 0.1 (e) -1/3 (f) 5 b What is the biggest value in -5, -0.4, -2/7, 52/3, 0.3? 52/3 What is the fifth biggest value in -513, 4/7, 2, -3, -104? -513 Which is the third smallest value? (a) -0.2 (b) -545 (c) -0.5 (d) 5 a What is the second smallest value in 4, -2, -4, 96/11? -2 What is the smallest value in 6, 1/11, -4, 5/2, 3/4, -30/67? -4 What is the third smallest value in 1, -0.0623, 7? 7 What is the second smallest value in -8, 3690, 1/2, -0.2, -3/4? -3/4 What is the biggest value in 1/5, -3, -1015, 2/7? 2/7 Which is the second biggest value? (a) 0.7 (b) 1017 (c) 7/6 c What is the biggest value in 1/2, 4, 40, -0.29, -8? 40 Which is the second smallest value? (a) 4/3 (b) -28 (c) -1/8 (d) 1/4 (e) -2/23 c What is the fourth smallest value in 5, -187, 20, -3? 20 Which is the second smallest value? (a) -0.2 (b) -4/7 (c) 1 (d) 0.372 (e) -0.5 (f) 2/7 e Which is the fifth smallest value? (a) 4 (b) -3 (c) -2/53 (d) 3 (e) 1.5 a Which is the second smallest value? (a) 20 (b) 2/3 (c) 25.82 a What is the fourth smallest value in 11, -3.15, -5/2, 5, 3, -0.5? 3 Which is the third smallest value? (a) 0.378 (b) 1.27 (c) 2/7 b What is the third biggest value in -0.36, 2/83, 19? -0.36 What is the third smallest value in 0.6, 1/4, 6, 36, 4? 4 Which is the fourth smallest value? (a) -0.4 (b) -3/13 (c) -2.42 (d) 0.2 (e) -3 b Which is the second biggest value? (a) 1 (b) -0.16 (c) -1 (d) -52 b What is the biggest value in 3, -0.1, -294? 3 Which is the second biggest value? (a) 0 (b) -2 (c) -1/5 (d) 12/19 (e) -9 (f) -0.5 a What is the second biggest value in 0.1, 2/5, -2, 30, -21, -1/2? 2/5 Which is the biggest value? (a) 0.4 (b) 5 (c) 0.06 (d) -964 (e) 4 (f) -2 b Which is the third smallest value? (a) 29 (b) 11165 (c) 2 b Which is the smallest value? (a) -1 (b) -8/17 (c) 5 (d) 20/7 a What is the biggest value in 332, 0.03, 43? 332 Which is the third biggest value? (a) 152 (b) -2/3 (c) 0.7 b Which is the third biggest value? (a) 1/5 (b) -2 (c) 0.03 (d) 5 (e) 0.3 (f) 1719 e What is the smallest value in -50, -17, -1/73? -50 What is the fourth smallest value in 2, -4, 0.09, -10446? 2 What is the second biggest value in -99, 7, -13, 1? 1 Which is the second smallest value? (a) -0.07 (b) -51 (c) -22 (d) -0.4 c What is the smallest value in -1/2, -2/7, -1.86, 9.1? -1.86 What is the third biggest value in 0.4, 3, 10, 2, -4/3, -0.9? 2 What is the third biggest value in -2/15, 0.3, -1636? -1636 What is the sixth smallest value in -9, 5, 4, 3, -3/8, 1.1081? 5 Which is the third smallest value? (a) 1/2 (b) -4/3 (c) 1370 c What is the fifth smallest value in 2.4612, -4, -1, -1/7, 2/9, -3? 2/9 Which is the biggest value? (a) -5 (b) -2/23 (c) -4 (d) 17 (e) 5 d What is the biggest value in 3, -645, 0.1, 2/297? 3 What is the second smallest value in 0.2, 0.1, 1, -1/211? 0.1 Which is the fifth biggest value? (a) 47/2 (b) -2/3 (c) -2 (d) 0.02 (e) 1 c Which is the third smallest value? (a) 2/5 (b) 9 (c) -4 (d) -1/3 (e) 1/11 (f) 130 e What is the fifth biggest value in -4, 11/2, 5, -49, -1, 4? -4 Which is the fifth biggest value? (a) 1 (b) -2/5 (c) -112 (d) -1 (e) -2 c What is the second biggest value in -18/11, -1/3, 0.06, 4/5, -2/5, -53? 0.06 Which is the third biggest value? (a) 226 (b) 2/5 (c) -4 (d) 0.71 b What is the fourth biggest value in -0.8, 172, 18, 3/7, 0? 0 Which is the second biggest value? (a) 0.1 (b) 1 (c) -2 (d) 735 (e) 1/2 b Which is the fifth biggest value? (a) 1/8 (b) 6 (c) 20 (d) 35 (e) -2 e Which is the biggest value? (a) 1/8 (b) 0 (c) -1 (d) 987/37 d What is the smallest value in 2.487, 13, -1/5? -1/5 Which is the fourth smallest value? (a) -1011 (b) 0.3 (c) 0.2 (d) -5 (e) -1/7 c Which is the third biggest value? (a) -134636 (b) -3 (c) 4/3 a Which is the fifth smallest value? (a) -2/19 (b) -2/31 (c) -5 (d) 0.9 (e) 0.2 (f) -0.1 e What is the sixth smallest value in 1.1, 2, -58, -2, 0.5, -4? 2 Which is the smallest value? (a) 39/8 (b) -5/14 (c) 0 b Which is the fourth biggest value? (a) -4 (b) 5 (c) 80/7 (d) -1/2 a What is the third biggest value in 1/18, 3, 39, 4/15? 4/15 What is the fourth smallest value in -0.3, 3, -8, -2, -1, -17/5? -1 Which is the third biggest value? (a) 2 (b) -2/9 (c) -10 (d) 3 (e) -0.175 e What is the second smallest value in 2/7, -0.4, -3674? -0.4 What is the third smallest value in 0.479, 0.2, -0.07, 264? 0.479 Which is the fifth biggest value? (a) -0.21 (b) 0.3 (c) -3/5 (d) -56 (e) 0.2 (f) 2/3 c What is the second smallest value in 0.04, -0.3, 13, -94, -4/7? -4/7 What is the second smallest value in -1, 3/2, -4, -3/145? -1 Which is the fourth smallest value? (a) 0.4 (b) 1/2 (c) -2 (d) 42/13 (e) -3/2 (f) 3/7 f Which is the third biggest value? (a) 0.2 (b) -1/5 (c) -16/1137 b What is the third smallest value in -4, 224.1, 4, 76, 6, -0.3? 4 What is the smallest value in 50, 7, 2843/6? 7 Which is the fifth smallest value? (a) -0.1 (b) 1/4 (c) 2/7 (d) 0 (e) 2/111 c What is the fourth biggest value in 1554, -0.2, -3/2, 3.8? -3/2 Which is the third smallest value? (a) -2 (b) -5/11 (c) 1 (d) 0.5 (e) -6.8 (f) -4 a Which is the third smallest value? (a) -11 (b) -2/231 (c) 0.5 (d) 0.02 d What is the second smallest value in 0.15, -1/3, 2/7, -20, 6? -1/3 What is the fourth biggest value in 4, 1, -1/4, -4, 2/7, 308? 2/7 What is the biggest value in 94, -22, -1? 94 Which is the smallest value? (a) -3/5 (b) 12 (c) 74 (d) 3 a Which is the third biggest value? (a) -2 (b) -21 (c) -8/5 (d) -0.2 a Which is the second biggest value? (a) -0.193 (b) 3 (c) -54 (d) -3/2 a Which is the third biggest value? (a) 8 (b) 0.1 (c) -0.5 (d) 3 (e) -1608 b Which is the fourth biggest value? (a) 5/3 (b) -5520 (c) 2/15 (d) -7 b Which is the third smallest value? (a) -0.04 (b) -1/3 (c) -1713 a Which is the second biggest value? (a) 0.01849 (b) 2 (c) 5 b Which is the fourth biggest value? (a) -22 (b) 0.01 (c) 0.4 (d) -43 (e) 0.2 a What is the second smallest value in 1.2, 2/11, 0.16, -5? 0.16 What is the biggest value in -0.4, -1.59, -5, 1.04? 1.04 Which is the smallest value? (a) 1/9 (b) 1/4 (c) 0.9 (d) 3054 (e) -2/7 (f) 0 e What is the second smallest value in -94, -113/4, 3/5, 3? -113/4 Which is the fourth biggest value? (a) -1 (b) 3/7 (c) -74942 (d) 0.8 c What is the third biggest value in -2, 2, 316907, -0.1? -0.1 What is the second biggest value in 33, -11, -39, 6? 6 What is the fifth smallest value | Low | [
0.49176470588235205,
26.125,
27
] |
Organizing for Action says Koch brothers group used booze to bribe young people out of buying health insurance The group attacked David and Charles Koch, the billionaire brothers who support the tea party movement. "This should humiliate anyone who's ever been associated with the Koch brothers," the March 26 email continued. "One of their anti-Obamacare groups is going to college campuses, giving away free booze to try to bribe young folks out of getting health insurance." We wondered if such an education campaign, complete with free alcohol, really existed. The email referred to Generation Opportunity, a national political activist group made up of young conservatives. They’re behind the "Creepy Uncle Sam" ads you may have seen last year. Back in November 2013, the Tampa Bay Timesreported on one of their 20 "opt-out" campaign stops at college campuses to educate students about alternatives to buying health insurance on the Affordable Care Act exchanges. At a University of Miami-Virginia Tech football game tailgate, Generation Opportunity set up a DJ, beer pong tables, models and free pizza to draw students in. They handed out free gear with their logo on it -- T-shirts, beer koozies, bottle openers. The one thing they didn’t provide is the beer itself. Spokesman David Pasch said 21+college students brought their own beer to the Miami event and others. However, just off campus near several colleges, Generation Opportunity hosted happy hours where they did give out individual tickets for free drinks to 21+ attendees at places like The Crust, a Williamsburg, Va., pizza place. These events weren’t focused specifically on an anti-Affordable Care Act agenda, but there was free "opt-out swag" on hand, Pasch said. So we know Generation Opportunity did offer free booze to college-aged students at some of their events, but let’s take a closer look at the opt-out campaign. Organizing for Action claimed Generation Opportunity used the campaign to "bribe young folks out of getting health insurance." But Generation Opportunity’s events were open to everyone, Pasch said. Attendees at the tailgates and happy hours didn’t need to swear off the health care reform before snagging a free T-shirt or drink. Also, the campaign’s goal is not to encourage young Americans to go without health care. It’s to get them to look into alternative coverage options to the online marketplaces, such as private plans that still fit the Affordable Care Act’s 10 essential benefit requirements. Those plans still fulfill the law’s individual mandate, which requires everyone to have health insurance. "We never have (and never will) advocate young people forgo health insurance," Pasch said. Our ruling Organizing for Action said Generation Opportunity is "going to college campuses, giving away free booze to try to bribe young folks out of getting health insurance." The Koch brothers-backed group holds Opt-Out events to encourage young people to consider buying health insurance off the Affordable Care Act marketplaces. At some of their education campaign events near college campuses, they did offer free alcohol to entice attendees. At campus events, students brought the booze themselves. Generation Opportunity didn’t bribe students, but they did offer alcohol to young people who wanted to hear about alternatives to the health care reform’s marketplaces. We rate Organizing for Action’s statement Half True. | Low | [
0.477272727272727,
23.625,
25.875
] |
Attention: There’s no excuse not to vote in the 253 - over and out Channeling the great Greek scholar, John Belushi: The election’s not over until it’s over ... or something like that. AP photo/NBCAP Channeling the great Greek scholar, John Belushi: The election’s not over until it’s over ... or something like that. AP photo/NBCAP Precious minutes are slipping away in the homestretch of the 2016 election. To really feel the impending deadline of a historic event that finally — mercifully — will be over, go to the Pierce County website and behold the auditor’s countdown clock. For fatalists on the political fringes, it might as well be counting down to doomsday. A great many folks believe this day of reckoning can’t be over soon enough. More than a few are twitchy about voting for any of the damaged candidates at the top of the ticket, but they’ve held their noses and gotten it over with. The most unfortunate reaction of all? Some of your friends and neighbors might sit it out, thinking the election is essentially already over. Sign Up and Save Millions of early-bird voters from more than two-thirds of the states have been casting ballots for days. National campaigns have ignored all but the battleground states for weeks. Pollster-oracles have prognosticated Election Day outcomes for months. All these things can lead to an overall feeling of “why bother?” “Over? Did you say over? Nothing is over until we decide it is! Was it over when the Germans bombed Pearl Harbor?” OK, so Bluto’s overt ignorance of world affairs rivals that of the Libertarian presidential candidate, Gary “What is Aleppo?” Johnson. But you get the point. Washington voters have been called to action on several fronts, not just to elect a commander in chief. We’ve been recruited to shape far-reaching public policy issues such as gun safety, tax reform and a fair minimum wage. The legislators and statewide leaders we elect will decide whether Washington school children of every zip code will be treated with equity, and whether the mentally ill and homeless will be treated with dignity. In the 253 area code, we will decide whether to invest a princely sum in our grandchildren’s mass-transit future, and whether to make it easier for citizens to put do-it-yourself laws on the ballot. We will choose people to lead Pierce County out of King County’s shadow and into the dawn of 2020. No vote should be taken for granted, no ballot left unmarked on the kitchen counter. Pierce County Auditor Julie Anderson has set the bar lower, at 78 to 80 percent, which would fall short of the heights reached during the first Obama election. As of Friday, only seven of Washington’s 39 counties had a lower return rate. “Pierce County regularly underperforms when you look at the statewide average,” Anderson said. “It’s not something we’re happy about, but it’s also not something we can do anything about.” Political candidates and their cleverly disguised financiers could do something about it. Instead, they breed voter cynicism by pandering to the lowest common denominator. The ugly tenor of the 2016 campaign has turned off many voters, and not just the presidential contest. State legislative races in South Sound swing districts have featured ads produced in astonishingly poor taste. Case in point: an independent mailer, funded by a committee run by Senate Republicans, that accuses the Democrat running for Senate in the 28th District of disrespecting jury duty. What it shamelessly leaves out is that she was hit by a car and seriously injured while on her way to jury duty. Perhaps we shouldn’t be surprised if one-fifth of local voters want no part in this mess. But let’s not make excuses. All registered Washington voters 18 and older have a duty to activate mind and conscience, sort through the noise and fill out their ballots. As a vote-by-mail state, we don’t have to worry about photo ID laws, limited polling place hours, vigilante partisan poll watchers or other obstacles. Voting doesn’t get much easier than depositing a ballot in a dropbox by Tuesday at 8 p.m., or making sure the envelope is postmarked by Nov. 8. Each of us also has the ability to stand up to the cynicism and chicanery, speak truth to politicians and demand “no more.” Over? Did somebody say the era of the hopeful, engaged electorate is over? That the democracy envisioned by presidents Kennedy and Reagan as a shining “city on a hill” is over? | Mid | [
0.619385342789598,
32.75,
20.125
] |
By Alex Moss 24 JUNE 2017 • 11:25PM Given the year Peter Wright has had on the PDC circuit this year, racking up eight ranking titles, including his maiden TV crown at the UK Open, many would have expected the world number three to get the better of world number 91 Kim Viljanen in Vienna tonight. But darts is not that simple. Wright arrived in the Austrian capital hoping to add a fourth European Tour title to his collection for 2017, yet his bid for more glory on the continent ended at the very first hurdle. Three 180s and 75 per cent on the doubles for Viljanen was enough to pull off a surprise 6-5 win against Wright, who finished with an average 12 points higher than his opponent (97.66 to 85.14), but finished the match on the losing side. The month of June 2017 will not live long in the memory of Wright’s most prolific darting months. It started with him returning to play in the Betway World Cup of Darts with Gary Anderson, and the top seeds suffered a shock defeat to Singapore in the first round. A duo of earlier than expected exits in European Tour events, sandwiched between last 16 and last 32 exits on last weekend’s Players Championship double-header in Wigan, means Wright has now gone five events without reaching a quarter-final or better. The last time that happened for the world number three? Between September and October 2016, some eight months ago. Two last 32 exits in the Players Championship double-header in Dublin was followed by a disappointing first round defeat to Brendan Dolan in the World Grand Prix, before early departures in the German Darts Championship and Players Championship 19 made it five events without a quarter-final. We all know what followed for Wright after that quintet of barren performances, though. In the next 33 tournaments which followed, Wright progressed to the last eight or better of 25 of those 33 events, a run which catapulted the Scot up to a career-high number three in the world and, more recently, saw him end his long wait for a first televised title. While some may point to ‘burnout’ for a reason behind Wright’s dip in results over the last four weeks, he rarely skips a tournament, unlike his top rivals Michael van Gerwen, Gary Anderson and co, it is also a valid point to suggest he will simply just play himself back into form again. The PDC calendar is loaded with tournaments and a free weekend for the players is almost non-existent now, which means an opportunity to bounce back for Wright is never too far away. Take for example last month, Wright had just been handed the most devastating defeat of his career when he missed six match darts to beat van Gerwen in the final of the Betway Premier League, and two days later he was celebrating a tournament success in Players Championship 11, albeit not as lucrative or high profile, but nevertheless, he had rediscovered the winning formula at the first available opportunity. So, should Wright be worried about his latest batch of early tournament exits? Well, while yes, after a defeat a player should reflect on their performance and what they can do to improve, the chances are Wright will not allow himself too long to lick his wounds. No doubt he will back on the practice board in his Suffolk home early next week in preparation to start going deep into tournaments once again. Wright will be among the top seeds again when the European Tour heads to Leverkusen next weekend, and you would not want to back against him bouncing back again with a run to the final session and another quarter-final. Picture: PDC Europe Follow @lovethedartsmag | Mid | [
0.5780590717299571,
34.25,
25
] |
View Bitcoin’s daily chart is reporting a “golden crossover” – a bull cross of the 50- and 200-day moving averages – for the first time since October 2015. The crossover represents a long-term bearish-to-bullish trend change. A convincing close today above $5,466 (April 10 high) would establish another bullish higher high and boost the prospects of a rally to $6,000. That rally, however, may be preceded by consolidation or price pullback, as the golden crossover is accompanied by the overbought readings on the relative strength index and a neutral long/short ratio. The case for a pullback to $5,000 would strengthen if the price fails to close (UTC) today above $5,466 (April 10 high). With bitcoin’s (BTC) move to five-month highs Tuesday, a notable bull cross of key moving averages has formed for the first time in nearly four years. The crypto market leader jumped to $5,627 on Bitstamp earlier today – the highest level since Nov. 18 – having revived the short-term bullish case with a repeated defense of key support at $5,170 last week. Meanwhile, the 50-day moving average (MA) has crossed the 200-day MA from below, confirming a long-term bullish pattern known as a “golden crossover” in technical parlance. This is the first golden crossover since October 28, 2015. Many analysts consider the indicator an advanced warning of stronger price gains in the long term. The crossover, however, is based on moving averages, which are backward-looking in nature. For instance, the 50-day MA is based on 1.5-month old data, while the 200-day MA responds to more than six-month-old price action. Hence, the indicator is more a confirmation of the recent bull run, rather than a signal of further price gains. That said, the investor community may take heart from the fact that bitcoin’s previous bull market began just two days after the golden crossover in 2015. Daily charts 2015/2019: Golden crossover confirmed As can be seen (above left), the 50-day MA last crossed the 200-day MA from below on Oct. 28, 2015, and prices confirmed a long-term bearish-to-bullish trend change with a close above $319 (July 12, 2015 high) two days later. The follow-through to that positive trend change was strong and BTC went on to reach an all-time high of $20,000 by December 2017. This time round, the confirmation of the golden crossover has been preceded by the violation of the bearish lower highs and lower lows pattern on April 2. While there is a reason to be optimistic, the golden crossover lags price, as discussed earlier. Further, it tends to work as a contrary indicator in the short-term if the market is looking overbought, which looks to be the case currently. RSI and Long/short ratio The cryptocurrency’s move to five-month highs has pushed the 14-day relative strength index (RSI) above 70 – a sign of overbought conditions. Hence, a price pullback cannot be ruled out in the short term. Supporting that argument is bitcoin’s long/short ratio, which has shed the bullish bias. The ratio of BTC/USD long to short positions on Bitfinex (right) is currently hovering just below 1.00 – the lowest level since early January – having printed a high of 1.53 on April 8. The sharp decline indicates the sentiment has turned from bullish to neutral over the last 15 days. Note that a reading well below 1.00 indicates a bearish bias, while an above-1.00 print represents a bullish market. Daily chart: UTC close is key A close above the April 10 high of $5,466 would establish another bullish higher high and strengthen the case for a rally toward $6,000. However, with the golden crossover accompanied by the overbought readings on the RSI, as well as a bullish-to-neutral shift in the long/short ratio, prices may fail to close above $5,466 or the bullish close could be short-lived. The odds of a fallback to $5,000 would rise if today’s candle ends in the red well below $5,466, validating the lower high (bearish divergence) of the RSI. Disclosure: The author holds no cryptocurrency assets at the time of writing. Bitcoin image via Shutterstock; charts by Trading View | Low | [
0.510250569476082,
28,
26.875
] |
The warrior in the machine: neuroscience goes to war. Ever since Stone Age men discovered that knapping flint produced sharp stone edges that could be used in combat as well as for cooking and hunting, technological advances of all kinds have been adapted and adopted by the military.The opportunities provided by modern neuroscience are proving no exception, but their application in a military context is accompanied by complex practical and ethical considerations. | Mid | [
0.548707753479125,
34.5,
28.375
] |
Q: slider changing? I am downloading image with its url with the Picasso library like below: Picasso.with(context).load(myUrl).into(imageView); and then I want to set this downloaded image into the daimagia slider like this slide2.image(R.drawable.test); but it just getting R.drawable.... ! How can set my downloaded image instead of R.drawable.test in order to load that image that was downloaded before ! please help slide2.image(R.drawable.test); A: put string url iamge for example : slider.image("http//----ur url---") | Low | [
0.48062015503875904,
31,
33.5
] |
The Legal Department CUNYd Pie CUNYPie returned today after a too-long hiatus with its first trip to Staten Island, where we visited Denino’s. This was a two campus affair, as me and myhomeboys from Baruch joined our sisters from City Tech for pies and pitchers, which I’ll get to in a moment. The occasion of our trip to Shaolin was the 8th Annual CUNY Coordinated Undergraduate Education Conference, at which we all presented. There’s lots going on with undergraduate education at CUNY these days, only some of which made it onto the docket at the conference. The controversy around Pathways was a subtext in each of the panels I attended, but was curiously absent in the day’s opening remarks. The general feeling I got from folks was one of resignation that Pathways was probably going to happen, we’ll just wait and see, and then we’ll make the most of it. The keynote was delivered by Mark Taylor, who presents himself as an expert on “Generation NeXt,” and visits schools and other organizations to help them think about improving student engagement. The pedagogy he espouses consists of familiar stuff: flipped classrooms, active/engaged learning, future orientation, embracing technology (though as an information more than a connective tool), etc. The rationale he offers for this pedagogy is grounded in an analysis of generational difference, supported, as far as I can tell, by his synthesis of a range of secondary sources. Not sure if he does original research, as the papers presented on his site refer entirely to the research of others. We heard a good 30-40 minutes of talk about differences between the Baby Boomers and the generation just behind me, drawn significantly from Jean Twenge, whose work I’m not a fan of. Taylor doesn’t come down as hard as Twenge or Mark Bauerlein on “kids these days,” but rather sees in the generation’s broad characteristics learning styles that need to be adjusted to. Taylor’s rationale was pretty Domino’s, which is to say, weak sauce. There was a lot of charm and playfulness and “I’m a southern yokel and you’re all New Yorkers” before he got to what he was trying to say. But you don’t have to be a professional historian to know that identifying the broad differences between generations is only the very beginning step towards understanding how higher education needs to evolve in the coming years. And you don’t have to be a CUNY lifer to know that our university serves a particular set of populations, only small segments of which look like the learners Taylor theorizes about. At one point Taylor argued that colleges and universities better adapt or they’ll face disruption from some unidentified, external force. I don’t necessarily disagree with this notion or find it problematic (except for when he likened students to customers). But many of us know this already, and are determined to be that disruption ourselves rather than simply to head it off. In that spirit, Mikhail and Tom and I left Taylor’s talk fifteen minutes early to go get set for our panel. In short, the keynote was a significant step down from Pedro Noguera’s rousing talk at this same event last year. Noguera knew well who we were and who we serve, and used that knowledge to speak directly to our challenges. But all of this was prelude, prelude to pizza. Denino’s makes a damn good pie, thin but not saggy, with a cornicione that was a bit blistered, chewy, and crispy. We had four pies: a sausage (my fave), a margherita (good, not great), a half olive/half mushrooms (heavy on the olives, and quite strong), and an anchovy (to which I can only say this). The restaurant is a sizable, friendly family joint, and we were very lucky to get a table for ten just before the Friday dinner rush. If I lived on Staten Island, I would definitely be a regular. And it only cost us $13 each! Big ups to Jody Rosen, who grew up on Staten Island, for picking the spot and then bullying me into writing this post. Only you, Jody. Thanks for organizing the outing and giving me that specific kind of CUNY Pie full and happy feeling again. | Low | [
0.49528301886792403,
26.25,
26.75
] |
Various articles are assembled from more than one material, forming multiple portions of the article. In general, such articles are formed by securing a first material to a second material using a securing technique such as welding, adhering, fusing, soldering, brazing or a combination thereof. Such techniques suffer from various drawbacks. For example, such techniques can suffer from limited applicability to alloys, can be subject to fatigue, can delaminate, or combinations thereof. Articles formed from combined alloys are often used in power generation systems, engines, bridges, buildings, wind turbines, and other large structures. Such structures are continuously subjected to increasing forces to provide improved efficiency and/or due to new environmental conditions. Such articles require increased resistance to fatigue, increased mechanical properties, increased capability of being fabricating, increased design life and reduced life cycle cost. Known components having two or more materials do not sufficiently meet all of the desired parameters. As an alloy ingot cools, there are many factors which affect the final structure of the article formed. For example, when a molten alloy is poured into a mold, a temperature difference between the mold and the alloy causes thermal convection currents at the mold wall. The convection current contributes to segregation and the breaking off of metal dendrites forming on the wall. Those dendrites act as nuclei for the formation of equiaxed grains. Changing local compositions contributes to segregation, which further complicates grain formation. Additionally, the composition of the alloy and the rate at which the cast cools affect the final grain structure. Known casting methods do not sufficiently address such concerns regarding grain formation. A casting method, a cast article, and a casting system that do not suffer from one or more of the above drawbacks would be desirable in the art. | Mid | [
0.63231850117096,
33.75,
19.625
] |
Oral-facial-digital syndrome type 1 is another dominant polycystic kidney disease: clinical, radiological and histopathological features of a new kindred. Oral-facial-digital syndrome type 1 (OFD1) is a rare disorder comprising malformations of the face, oral cavity, hands, and feet. Polycystic kidney disease (PKD) is a more recently recognized feature of the syndrome. We now report on the clinical, radiological and histopathological features of an OFD1 and PKD kindred with five affected members in three subsequent generations. All patients were female and had accompanying PKD as assessed by ultrasound scans. The plasma creatinine was normal in three, but PKD caused end-stage renal failure in two of these individuals in the second and fifth decades. A histochemical analysis of renal tissue from one affected member of this kindred demonstrated a predominantly glomerulocystic kidney disease with a minor population of cysts derived from distal tubules as assessed by staining with Arachis hypogaea lectin. Cyst epithelia had a high level of mitosis as assessed by staining with antisera to proliferating cell nuclear antigen, and distal cysts overexpressed PAX2 protein, a potentially oncogenic transcription factor. We detected multiple pancreatic cysts in one member affected by OFD1 although there were no symptoms of pancreatic disease; this constitutes a novel radiological feature of the syndrome. This kindred illustrates the inheritance pattern of OFD1 and its accompanying PKD. Although the renal disease superficially resembles ADPKD with macroscopic cysts and a dominant inheritance pattern, histology shows a predominance of glomerular cysts and the syndrome is X-linked, with affected males dying before birth. The recognition of the accompanying dysmorphic features is the key to a diagnosis of OFD1 in a female child or adult who presents with PKD. | High | [
0.7540983606557371,
31.625,
10.3125
] |
COPIAPO, Chile — Chilean officials are taking measures to alleviate depression among the 33 miners trapped in a collapsed mine after telling them it might be months before rescuers will reach them, according to a report. Health Minister Jaime Manalich said the officials told the group that "they would not be rescued before the Fiestas Patrias, and that we hoped to get them out before Christmas," the AFP news agency reported. Fiestas Patrias is Chile's Independence Day celebration, held on Sept.18. Manalich told AFP that the miners, who are trapped 2,300 feet underground, reacted calmly to the news. The group has been trapped since Aug. 5. The news service said the government was taking steps — from getting doses of anti-depressants for the men to sending down fresh clothes and games — to help keep them physically and mentally fit for the grueling wait ahead. "We expect that after the initial euphoria of being found, we will likely see a period of depression and anguish," Manalich said. "We are preparing medication for them. It would be naive to think they can keep their spirits up like this." The government has asked NASA and Chile's submarine fleet for tips on survival in extreme, confined conditions, and are looking to send them space mission-like rations. "We hope to define a secure area where they can establish various places — one for resting and sleeping, one for diversion, one for food, another for work," Manalich said. Establishing a daily and nightly routine is important, the minister said, adding that having fun also will be critical. The rescue team is creating an entertainment program "that includes singing, games of movement, playing cards. We want them to record songs, to make videos, to create works of theater for the family." Second bore hole finished Some mining experts believe it will take far less than four months to dig the tunnel. Larry Grayson, a professor of mining engineering at Penn State University, said it could take just 25 to 30 days to reach the miners. Gustavo Lagos, a professor at the Catholic University of Chile's Center for Mining, estimated the job could be done in two months if all goes well and four months if it all bogs down. Still, officials are also planning exercise and other activities to keep the miners healthy and trim, using some of the passages that remain accessible to the miners, Manalich said. Even though the miners have lost around 22 pounds each, Chilean officials are trying to ensure they don't bulk up before their rescue. They said the miners would have to be no more than 35 inches around the waist to make it out of the tunnel. They remain days away from being able to eat solid food because they went hungry for so long. Rescuers have sent down a high-energy glucose gel, and on Wednesday they gave the miners cans of a milk-like drink enriched with calories and protein. The escape tunnel will be about 26 inches wide — the diameter of a typical bike tire — and stretch for more than 2,200 feet through solid rock. That's more than 80 inches in circumference, but rescuers also have to account for the space of the basket that will be used to pull the miners to safety. 'My soul ached'The miners and their relatives are exchanging letters via the shaft, a crucial part of maintaining their mental health. "You have no idea how much my soul ached to have been underground and unable to tell you I was alive," trapped miner Edison Pena said in a letter to his family. "The hardest thing is not being able to see you." Fellow miner Esteban Rojas promised his wife he would finally buy her a wedding dress as soon as he gets out, and hold a church marriage ceremony, 25 years after they wed in a registry office. Officials have been vetting letters sent by relatives, to avoid any shocks. Some disagree with the method. "It's very important for the miners' mental health that they communicate openly with their families, and without filters, either by letter or by phone," said Claudio Barrales, a psychologist at the Universidad Central in Santiago. Outside, Chilean flags are everywhere — including the torn one that became a symbol of Chile's resistance when a young man was photographed holding it just after a massive earthquake rocked the South American nation last year. That flag was raised above 33 others that sit on a hill over the mine, each representing one of the trapped men. Trapped miners' relatives, who have been living in plastic tents at the mine head in a makeshift settlement dubbed Camp Hope, have been gradually returning to their normal lives, but some were drawing up rosters to take turns being at the mine. Push for mining reformThe accident in the small gold and copper mine has turned a spotlight on mine safety in Chile, the world's No. 1 copper producer, although accidents are rare at major mines. The incident is not seen having a significant impact on output. President Sebastian Pinera has fired officials of Chile's mining regulator and vowed to overhaul the agency. Analysts say the feel-good factor of finding the miners alive, coupled with the government's hands-on approach, could help Pinera as he tries to push through changes to mining royalties that the center-left opposition had shot down. Some family members filed suit Wednesday against the mine's owner, Compania Minera San Esteban. Attorney Remberto Valdes, representing the miner Raul Bustos, accused the company of fraud and serious injury based on the lack of safety measures like the escape tunnel that the state-owned Codelco copper company is now preparing to dig. Four municipal governments in the area were preparing a similar claim. On Aug. 31, the men will have been trapped underground longer than any other miners in history. Last year, three miners survived 25 days trapped in a flooded mine in southern China. Few other rescues have taken more than two weeks. Video: Trapped miners need to watch their waistlines Transcript of: Trapped miners need to watch their waistlines BRIAN WILLIAMS, anchor (New Orleans):We have an update tonight on those miners, 33 of them in that 2,000-foot-deep copper mine in Chile . They were all discovered alive and mostly well after 17 days. Now, while it's true they may not be rescued until Christmas because boring a big enough hole is a gingerly business, and while it's now all about keeping them healthy and sane until then, we learned today they cannot get out if they are any bigger around than a 35-inch waistline. Sadly, it shouldn't be a problem as many of them have already lost a lot of pounds. Hearing this, we were reminded today, the average American waistline is almost 40 inches for men, 37 inches for American women. Carlos Galleguillos and Tabita Galleguillos, relatives of trapped miner Jorge Galleguillos, wait for news outside the San Jose Mine near Copiapo, Chile, on Monday, Oct. 11. The engineer leading Chilean rescue efforts, Andres Sougarett, said Monday his team successfully tested a rescue capsule nearly all the way down to where 33 miners are trapped. (Natacha Pisarenko / AP) ShareBack to slideshow navigation Drill operators Jeff Hart, left, and James Staffel, both U.S. citizens, wave as the drill that made the hole reaching the miners is transported away from the mine on Monday. (Jorge Saenz / AP) ShareBack to slideshow navigation Rescuers test a capsule similiar to the one that will be used to recover the trapped miners at the San Jose mine near Copiapo, Chile, on Sunday, Oct. 10. (Hugo Infante / AFP - Getty Images) ShareBack to slideshow navigation A relative of one of the miners is hugged by a policeman after the drilling machine completed an escape hole at the mine on Oct. 9. (Ivan Alvarado / Reuters) ShareBack to slideshow navigation Workers of the T-130 drill celebrate in the arid Atacama desert on Oct. 9. The crew drilling with the T-130 drill, part of an effort dubbed "Plan B" - one of three shafts attempting to reach 33 miners trapped deep underground - finally made contact with the miners' shelter. (Francesco Degasperi / AFP - Getty Images) ShareBack to slideshow navigation A clown named Rolly shows a flag that was sent by the 33 trapped miners as a gift at the camp where relatives wait for news outside the San Jose mine in Copiapo, Chile, on Wednesday, Oct. 6. The words on the flag read in Spanish, "A souvenir for clown Rolly, from the San Jose mine, thanks for making our children laugh." Thirty-three miners have been trapped deep underground in the copper and gold mine since it collapsed on Aug. 5. (Natacha Pisarenko / AP) ShareBack to slideshow navigation A worker checks part of a drill pulled from Rigg 421 on Sept. 24 at the San Jose mine near Copiapo, Chile, where 33 miners remain trapped. (Ivan Alvarado / AFP - Getty Images) ShareBack to slideshow navigation Children play Oct. 2 as a worker hangs a sign identifying a module to be used as school room for relatives of the trapped Chilean miners trapped. Many of the families of the miners are living in what is called "Camp Esperanza" or "Camp Hope." (Ariel Marinkovic / AFP - Getty Images) ShareBack to slideshow navigation A crane lifts a capsule that will be used as part of rescue operation for the miners at the San Jose copper and gold mine on Saturday, Sept. 25. (Ivan Alvarado / Reuters) ShareBack to slideshow navigation Nelly Bugueno, mother of trapped miner Victor Zamora, checks her cell phone as she walks past the tents where families of the 33 trapped miners are living as they await rescue on Friday. (Stringer/chile / Reuters) ShareBack to slideshow navigation Jesica Cortez, wife of Victor Zamora, one of the 33 miners trapped down in the shaft, rejoices as she reads a letter from her husband, at San Jose mine, near Copiapo, 800 km north of Santiago, on Wednesday, Sept. 18. (Martin Bernetti / AFP - Getty Images) ShareBack to slideshow navigation Members of a folkloric ballet perform at the camp where relatives of trapped miners wait for news outside the San Jose mine in Copiapo, Chile, Wednesday Sept. 1. Thirty-three miners have been trapped alive deep underground in the copper and gold mine since it collapsed on Aug. 5. (Roberto Candia / AP) ShareBack to slideshow navigation A composite image captured from a video on Tuesday, Sept. 1 shows four of 33 trapped miners waving at mine San Jose, near of Copiapo, Chile. (Codelco / Handout / EPA) ShareBack to slideshow navigation A sample of what it will be the first hot meal the miners still trapped in the San Jose Mine will have since the accident, Tuesday, Sept. 1 near Copiapo, Chile. (Ariel Marinkovic / AFP - Getty Images) ShareBack to slideshow navigation Evangelic Minister Javier Soto dedicates one of the 33 mini-bibles that will be given to the miners trapped in the San Jose mine, Monday. (Ariel Marinkovic / AFP - Getty Images) ShareBack to slideshow navigation View of 33 Chilean national flags placed outside the San Jose mine by the relatives of the 33 trapped miners in Copiapo, 800 km north of Santiago on Monday. (Ariel Marinkovic / AFP - Getty Images) ShareBack to slideshow navigation A worker checks the drill machine digging an escape hole for the 33 miners trapped underground in a copper and gold mine at Copiapo, north of Santiago, Chile, on Monday, Aug. 30. (Ivan Alvarado / Reuters) ShareBack to slideshow navigation Work to rescue the trapped miners continues on Aug. 30 at the mine, which is located 450 miles north of Santiago. (Ivan Alvarado / Reuters) ShareBack to slideshow navigation Relatives of those trapped underground in a copper and gold mine gather around a screen showing the miners inside the mine at Copiapo, north of Santiago, Chile, on Thursday, Aug. 26. (Ivan Alvarado / Reuters) ShareBack to slideshow navigation Marion Gallardo, the granddaughter of trapped miner Mario Gomez, writes a letter to her grandfather on Wednesday, Aug. 25. The 33 miners trapped in the San Esteban gold and copper mine in Copiapo, north of Santiago, since Aug. 5 say they are "enduring hell" underground, putting urgency into the rescue operation. (Ariel Marinkovic / AFP - Getty Images) ShareBack to slideshow navigation Elias Sepulveda and her cousin Katherine embrace in front of a tribute to their relatives, Esteban Rojas and Pablo Rojas, two of the miners trapped in the collapsed mine. (Roberto Candia / AP) ShareBack to slideshow navigation An officer stands in front of the machine that will be used to rescue the miners. The miners were trapped when the shaft they were working in collapsed. (Claudio Reyes / EPA) ShareBack to slideshow navigation Relatives of the trapped miners wave to rescue workers outside the collapsed mine. Rescue teams bored a small hole down more than 2,000 feet and used a video camera to confirm the miners were alive on Aug. 22. (Roberto Candia / AP) ShareBack to slideshow navigation Florencio Avalos, one of the trapped miners, is seen Aug. 23 in an image from video. The camera was lowered more than 2,000 feet into the copper and gold mine. (Reuters) ShareBack to slideshow navigation | Mid | [
0.60125260960334,
36,
23.875
] |
The trailer of Shubh Mangal Saavdhan carries forward the discussion initiated by Alankrita Shrivastava's Lipstick Under My Burkha that released on 21 July. While the latter revolved around women's sexual fantasies, the former focuses on erectile dysfunction and provides a public platform to what has hitherto been confined to the bedroom. Ayushmann Khurrana and Bhumi Pednekar in a still from Shubh Mangal Saavdhan. Eros Now After their second collaboration, post Dum Laga Ke Haisha, Manmarziyan did not materialise, Ayushmann Khurrana and Bhumi Pednekar will be seen in another Aanand L Rai production - RS Prasanna's romantic comedy Shubh Mangal Saavdhan, the remake of Prasanna's 2013 Tamil film Kalyana Samayal Sadham. Talking to Deccan Chronicle, Prasanna had said, "I wouldn't say it is a complete remake of Kalyana Samayal Sadham. It is an entirely new film with the same basic theme and soul. 'Spiritual remake' is the correct word for it." Shubh Mangal Savdhan will feature Ayushmann and Bhumi as a married couple who have to come to terms with the former's erectile dysfunction. Shubh Mangal Saavdhan is Bhumi’s third film post her debut. She would also appear in Shree Narayan Singh's Akshay Kumar-starrer Toilet Ek Prem Katha, which will release on 11 August; while Aayushmann will next star in Ashwini Iyer Tiwari's romantic comedy Bareilly Ki Barfi which will release on 18 August. The lead pair, who amazed the viewers with their chemistry in Sharat Kataria's 2015 romantic comedy Dum Laga Ke Haisha, seem to bring that vibe in their next as well. The teaser and poster of the film certainly suggest so. | High | [
0.684729064039408,
34.75,
16
] |
/* * Copyright (C) 2007-2015 Lonelycoder AB * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * * This program is also available under a commercial proprietary license. * For more information, contact [email protected] */ #ifndef PROP_I_H__ #define PROP_I_H__ #include "prop.h" #include "misc/pool.h" #include "misc/redblack.h" #include "misc/lockmgr.h" extern hts_mutex_t prop_mutex; extern hts_mutex_t prop_tag_mutex; extern pool_t *prop_pool; extern pool_t *notify_pool; extern pool_t *sub_pool; TAILQ_HEAD(prop_queue, prop); LIST_HEAD(prop_list, prop); RB_HEAD_NFL(prop_tree, prop); LIST_HEAD(prop_sub_list, prop_sub); TAILQ_HEAD(prop_sub_dispatch_queue, prop_sub_dispatch); /** * */ struct prop_courier { struct prop_notify_queue pc_queue_nor; struct prop_notify_queue pc_queue_exp; struct prop_notify_queue pc_dispatch_queue; struct prop_notify_queue pc_free_queue; void *pc_entry_lock; lockmgr_fn_t *pc_lockmgr; hts_cond_t pc_cond; int pc_has_cond; hts_thread_t pc_thread; int pc_run; int pc_detached; int pc_flags; void (*pc_notify)(void *opaque); void *pc_opaque; void (*pc_prologue)(void); void (*pc_epilogue)(void); int pc_refcount; char *pc_name; }; /** * */ typedef struct prop_notify { TAILQ_ENTRY(prop_notify) hpn_link; prop_sub_t *hpn_sub; prop_event_t hpn_event; union { prop_t *p; prop_vec_t *pv; struct { float f; int how; } f; int i; struct { rstr_t *rstr; prop_str_type_t type; } rstr; struct event *e; struct { rstr_t *title; rstr_t *uri; } uri; const char *str; } u; #define hpn_prop u.p #define hpn_propv u.pv #define hpn_float u.f.f #define hpn_int u.i #define hpn_rstring u.rstr.rstr #define hpn_rstrtype u.rstr.type #define hpn_cstring u.str #define hpn_ext_event u.e #define hpn_uri_title u.uri.title #define hpn_uri u.uri.uri prop_t *hpn_prop_extra; int hpn_flags; } prop_notify_t; prop_notify_t *prop_get_notify(prop_sub_t *s); /** * Property types */ typedef enum { PROP_VOID, PROP_DIR, PROP_RSTRING, PROP_CSTRING, PROP_FLOAT, PROP_INT, PROP_URI, PROP_PROP, /* A simple reference to a prop */ PROP_ZOMBIE, /* Destroyed can never be changed again */ PROP_PROXY, /* Proxy property, real property is remote */ } prop_type_t; /** * */ struct prop { #ifdef PROP_DEBUG uint32_t hp_magic; #endif /** * Refcount. Not protected by mutex. Modification needs to be issued * using atomic ops. This refcount only protects the memory allocated * for this property, or in other words you can assume that a pointer * to a prop_t is valid as long as you own a reference to it. * * Note: hp_xref which is another refcount protecting contents of the * entire property */ atomic_t hp_refcount; /** * Property name. Protected by mutex */ const char *hp_name; union { struct { /** * Parent linkage. Protected by mutex */ struct prop *hp_parent; TAILQ_ENTRY(prop) hp_parent_link; /** * Subscriptions. Protected by mutex */ struct prop_sub_list hp_value_subscriptions; struct prop_sub_list hp_canonical_subscriptions; }; // When hp_type == PROP_PROXY struct { struct prop_list hp_owned; union { // if PROP_PROXY_OWNED_BY_PROP is NOT set struct { RB_ENTRY(prop) hp_owner_sub_link; struct prop_sub *hp_owner_sub; }; // if PROP_PROXY_OWNED_BY_PROP is set struct { LIST_ENTRY(prop) hp_owned_prop_link; }; }; }; }; /** * Originating property. Used when reflecting properties * in the tree (aka symlinks). Protected by mutex */ struct prop *hp_originator; LIST_ENTRY(prop) hp_originator_link; /** * Properties receiving our values. Protected by mutex */ struct prop_list hp_targets; /** * Payload type * Protected by mutex */ #ifdef PROP_DEBUG prop_type_t hp_type; #else uint8_t hp_type; #endif /** * Extended refcount. Used to keep contents of the property alive * We limit this to 255, should never be a problem. And it's checked * in the code as well * Protected by mutex */ uint8_t hp_xref; /** * Various flags * Protected by mutex */ uint16_t hp_flags; /** * The float/int prop should be clipped according to min/max */ #define PROP_CLIPPED_VALUE 0x1 /** * hp_name is not malloc()ed but rather points to a compile const string * that should not be free()d upon prop finalization */ #define PROP_NAME_NOT_ALLOCATED 0x2 /** * We hold an xref to prop pointed to by hp_originator. * So do a prop_destroy0() when we unlink/destroy this prop */ #define PROP_XREFED_ORIGINATOR 0x4 /** * This property is monitored by one or more of its subscribers */ #define PROP_MONITORED 0x8 /** * This property have a PROB_SUB_MULTI subscription attached to it */ #define PROP_MULTI_SUB 0x10 /** * This property have a PROB_MULTI_SUB property above it in the hierarchy */ #define PROP_MULTI_NOTIFY 0x20 #define PROP_REF_TRACED 0x40 /** * For mark and sweep */ #define PROP_MARKED 0x80 /** * For unlink mark and sweep */ #define PROP_INT_MARKED 0x100 /** * Special debug */ #define PROP_DEBUG_THIS 0x200 /** * Indicates that this is a proxy property that should follow symbolic * links when referenced on remote end. */ #define PROP_PROXY_FOLLOW_SYMLINK 0x400 /** * Set if a prop proxy is owned by a property. This basically means * that when the owning proprty is destroyed, this property should be * destroyed as well */ #define PROP_PROXY_OWNED_BY_PROP 0x800 /** * These two are used to carry the have_more_childs information * to subscriptions that arrive after the call to * have_more_childs() call have been made. */ #define PROP_HAVE_MORE 0x1000 #define PROP_HAVE_MORE_YES 0x2000 /** * Tags. Protected by prop_tag_mutex */ struct prop_tag *hp_tags; /** * Actual payload * Protected by mutex */ union { struct { float val, min, max; } f; struct { int val, min, max; } i; struct { rstr_t *rstr; prop_str_type_t type; } rstr; const char *cstr; struct { struct prop_queue childs; struct prop *selected; } c; struct pixmap *pixmap; struct { rstr_t *title; rstr_t *uri; } uri; struct { struct prop_proxy_connection *ppc; char **pfx; uint32_t id; } proxy; struct prop *prop; } u; #define hp_cstring u.cstr #define hp_rstring u.rstr.rstr #define hp_rstrtype u.rstr.type #define hp_float u.f.val #define hp_int u.i.val #define hp_childs u.c.childs #define hp_selected u.c.selected #define hp_pixmap u.pixmap #define hp_uri_title u.uri.title #define hp_uri u.uri.uri #define hp_prop u.prop #define hp_proxy_ppc u.proxy.ppc #define hp_proxy_id u.proxy.id #define hp_proxy_pfx u.proxy.pfx #ifdef PROP_DEBUG SIMPLEQ_HEAD(, prop_ref_trace) hp_ref_trace; const char *hp_file; int hp_line; #endif }; /** * This struct is used in the global dispatch (ie, where we don't * have a appointed courier) to maintain partial ordering of * notifications. * * Basically we need to make sure that we don't deliver notifications * out of order to subscriptions which could happen if we just * spawn a bunch of thread that dequeues notifications without * any control. * * With this struct we make sure that a single subscription can only * get served from a thread at a time. */ typedef struct prop_sub_dispatch { struct prop_notify_queue psd_notifications; TAILQ_ENTRY(prop_sub_dispatch) psd_link; struct prop_sub_dispatch_queue psd_wait_queue; // The refcount is only in use for subscriptions in // PROP_SUB_DISPATCH_MODE_GROUP int psd_refcount; } prop_sub_dispatch_t; /** * */ typedef struct prop_originator_tracking { prop_t *pot_p; struct prop_originator_tracking *pot_next; } prop_originator_tracking_t; /** * */ struct prop_sub { #ifdef PROP_SUB_STATS LIST_ENTRY(prop_sub) hps_all_sub_link; #endif /** * Callback. May never be changed. Not protected by mutex */ void *hps_callback; /** * Opaque value for callback */ void *hps_opaque; /** * Trampoline. A tranform function that invokes the actual user * supplied callback. * May never be changed. Not protected by mutex. */ prop_trampoline_t *hps_trampoline; /** * Pointer to dispatch structure * * If hps_global_dispatch is set this points to prop_sub_dispatch when * there are active notifications on this subscription. If notifications * are pendning it will be NULL * * If hps_global_dispatch is not set this points to a prop_courier * */ void *hps_dispatch; /** * Lock to be held when invoking callback. It must also be held * when destroying the subscription. */ void *hps_lock; /** * Function to call to obtain / release the lock. */ lockmgr_fn_t *hps_lockmgr; /** * Linkage to property or proxy connection. Protected by global mutex */ LIST_ENTRY(prop_sub) hps_value_prop_link; /** * Property backing this subscription. * * For non-proxied properties this points to the property with the value * and hps_value_prop_link is linked to that propertys list. * * For proxied properties this is only set if we are subscribing to the * value prop (PROP_SUB_SEND_VALUE_PROP) and if set we own the property * and must destroy it via prop_destroy0() when subscription dies. */ prop_t *hps_value_prop; union { struct { // If hps_proxy is not set, these are the "active" members prop_t *hps_canonical_prop; LIST_ENTRY(prop_sub) hps_canonical_prop_link; union { prop_originator_tracking_t *hps_pots; prop_t *hps_origin; }; }; // If hps_proxy is set, these are the "active" members struct { struct prop_proxy_connection *hps_ppc; struct prop_tree hps_prop_tree; int hps_proxy_subid; }; }; /** * Refcount. Not protected by mutex. Modification needs to be issued * using atomic ops. */ atomic_t hps_refcount; /** * Set when a subscription is destroyed. Protected by hps_lock. * In other words. It's impossible to destroy a subscription * if no lock is specified. */ uint8_t hps_zombie; /** * Used to avoid sending two notification when relinking * to another tree. Protected by global mutex */ uint8_t hps_pending_unlink : 1; uint8_t hps_multiple_origins : 1; uint8_t hps_dispatch_mode : 2; #define PROP_SUB_DISPATCH_MODE_COURIER 0 #define PROP_SUB_DISPATCH_MODE_GLOBAL 1 #define PROP_SUB_DISPATCH_MODE_GROUP 2 uint8_t hps_proxy : 1; /** * Flags as passed to prop_subscribe(). May never be changed */ uint16_t hps_flags; /** * Extra value for use by caller */ int hps_user_int; #ifdef PROP_SUB_RECORD_SOURCE const char *hps_file; int hps_line; #endif }; #ifdef PROP_DEBUG #define prop_ref_dec_locked(p) prop_ref_dec_traced_locked(p, __FILE__, __LINE__) void prop_ref_dec_traced_locked(prop_t *p, const char *file, int line); #else void prop_ref_dec_locked(prop_t *p); #endif prop_t *prop_create0(prop_t *parent, const char *name, prop_sub_t *skipme, int flags); prop_t *prop_make(const char *name, int noalloc, prop_t *parent); void prop_make_dir(prop_t *p, prop_sub_t *skipme, const char *origin); void prop_move0(prop_t *p, prop_t *before, prop_sub_t *skipme); void prop_req_move0(prop_t *p, prop_t *before, prop_sub_t *skipme); void prop_link0(prop_t *src, prop_t *dst, prop_sub_t *skipme, int hard, int debug); int prop_set_parent0(prop_t *p, prop_t *parent, prop_t *before, prop_sub_t *skipme); void prop_unparent0(prop_t *p, prop_sub_t *skipme); int prop_destroy0(prop_t *p); void prop_suggest_focus0(prop_t *p); void prop_unsubscribe0(prop_sub_t *s); rstr_t *prop_get_name0(prop_t *p); void prop_notify_child2(prop_t *child, prop_t *parent, prop_t *sibling, prop_event_t event, prop_sub_t *skipme, int flags); void prop_notify_childv(prop_vec_t *childv, prop_t *parent, prop_event_t event, prop_sub_t *skipme, prop_t *p2); void prop_print_tree0(prop_t *p, int indent, int followlinks); void prop_have_more_childs0(prop_t *p, int yes); void prop_want_more_childs0(prop_sub_t *s); void prop_set_string_exl(prop_t *p, prop_sub_t *skipme, const char *str, prop_str_type_t type); void prop_sub_ref_dec_locked(prop_sub_t *s); int prop_dispatch_one(prop_notify_t *n, int lockmode); void prop_courier_enqueue(prop_sub_t *s, prop_notify_t *n); const char *prop_get_DN(prop_t *p, int compact); #endif // PROP_I_H__ | Low | [
0.51875,
31.125,
28.875
] |
[Chemical constituents from petroleum ether fraction of ethanol extract of Acorus tatarinowii]. The petroleum ether fraction of ethanol extract of Acorus tatarinowii were separated by column chromatography and recrystallization to afford seven compounds. On the spectroscopic analysis, they were identified as 1-hydroxy-7(11),9-guaiadien-8-one (1), calamenone(2), cis-asarone(3), chrysophanol (4), physcion (5), emodin (6), (+)-galbacin (7). Compound 1 is a new compound. Compounds 4-7 were isolated from this plant for the first time. | High | [
0.667578659370725,
30.5,
15.1875
] |
#!/usr/bin/env python # vim:fileencoding=UTF-8:ts=4:sw=4:sta:et:sts=4:ai __license__ = 'GPL v3' __copyright__ = '2012, Kovid Goyal <[email protected]>' __docformat__ = 'restructuredtext en' import re, codecs, os, numbers from collections import namedtuple from calibre import strftime from calibre.customize import CatalogPlugin from calibre.library.catalogs import FIELDS, TEMPLATE_ALLOWED_FIELDS from calibre.customize.conversion import DummyReporter from calibre.ebooks.metadata import format_isbn from polyglot.builtins import filter, string_or_bytes, unicode_type class BIBTEX(CatalogPlugin): 'BIBTEX catalog generator' Option = namedtuple('Option', 'option, default, dest, action, help') name = 'Catalog_BIBTEX' description = 'BIBTEX catalog generator' supported_platforms = ['windows', 'osx', 'linux'] author = 'Sengian' version = (1, 0, 0) file_types = {'bib'} cli_options = [ Option('--fields', default='all', dest='fields', action=None, help=_('The fields to output when cataloging books in the ' 'database. Should be a comma-separated list of fields.\n' 'Available fields: %(fields)s.\n' 'plus user-created custom fields.\n' 'Example: %(opt)s=title,authors,tags\n' "Default: '%%default'\n" "Applies to: BIBTEX output format")%dict( fields=', '.join(FIELDS), opt='--fields')), Option('--sort-by', default='id', dest='sort_by', action=None, help=_('Output field to sort on.\n' 'Available fields: author_sort, id, rating, size, timestamp, title.\n' "Default: '%default'\n" "Applies to: BIBTEX output format")), Option('--create-citation', default='True', dest='impcit', action=None, help=_('Create a citation for BibTeX entries.\n' 'Boolean value: True, False\n' "Default: '%default'\n" "Applies to: BIBTEX output format")), Option('--add-files-path', default='True', dest='addfiles', action=None, help=_('Create a file entry if formats is selected for BibTeX entries.\n' 'Boolean value: True, False\n' "Default: '%default'\n" "Applies to: BIBTEX output format")), Option('--citation-template', default='{authors}{id}', dest='bib_cit', action=None, help=_('The template for citation creation from database fields.\n' 'Should be a template with {} enclosed fields.\n' 'Available fields: %s.\n' "Default: '%%default'\n" "Applies to: BIBTEX output format")%', '.join(TEMPLATE_ALLOWED_FIELDS)), Option('--choose-encoding', default='utf8', dest='bibfile_enc', action=None, help=_('BibTeX file encoding output.\n' 'Available types: utf8, cp1252, ascii.\n' "Default: '%default'\n" "Applies to: BIBTEX output format")), Option('--choose-encoding-configuration', default='strict', dest='bibfile_enctag', action=None, help=_('BibTeX file encoding flag.\n' 'Available types: strict, replace, ignore, backslashreplace.\n' "Default: '%default'\n" "Applies to: BIBTEX output format")), Option('--entry-type', default='book', dest='bib_entry', action=None, help=_('Entry type for BibTeX catalog.\n' 'Available types: book, misc, mixed.\n' "Default: '%default'\n" "Applies to: BIBTEX output format"))] def run(self, path_to_output, opts, db, notification=DummyReporter()): from calibre.utils.date import isoformat from calibre.utils.html2text import html2text from calibre.utils.bibtex import BibTeX from calibre.library.save_to_disk import preprocess_template from calibre.utils.logging import default_log as log from calibre.utils.filenames import ascii_text library_name = os.path.basename(db.library_path) def create_bibtex_entry(entry, fields, mode, template_citation, bibtexdict, db, citation_bibtex=True, calibre_files=True): # Bibtex doesn't like UTF-8 but keep unicode until writing # Define starting chain or if book valid strict and not book return a Fail string bibtex_entry = [] if mode != "misc" and check_entry_book_valid(entry) : bibtex_entry.append('@book{') elif mode != "book" : bibtex_entry.append('@misc{') else : # case strict book return '' if citation_bibtex : # Citation tag bibtex_entry.append(make_bibtex_citation(entry, template_citation, bibtexdict)) bibtex_entry = [' '.join(bibtex_entry)] for field in fields: if field.startswith('#'): item = db.get_field(entry['id'],field,index_is_id=True) if isinstance(item, (bool, numbers.Number)): item = repr(item) elif field == 'title_sort': item = entry['sort'] elif field == 'library_name': item = library_name else: item = entry[field] # check if the field should be included (none or empty) if item is None: continue try: if len(item) == 0 : continue except TypeError: pass if field == 'authors' : bibtex_entry.append('author = "%s"' % bibtexdict.bibtex_author_format(item)) elif field == 'id' : bibtex_entry.append('calibreid = "%s"' % int(item)) elif field == 'rating' : bibtex_entry.append('rating = "%s"' % int(item)) elif field == 'size' : bibtex_entry.append('%s = "%s octets"' % (field, int(item))) elif field == 'tags' : # A list to flatten bibtex_entry.append('tags = "%s"' % bibtexdict.utf8ToBibtex(', '.join(item))) elif field == 'comments' : # \n removal item = item.replace('\r\n', ' ') item = item.replace('\n', ' ') # unmatched brace removal (users should use \leftbrace or \rightbrace for single braces) item = bibtexdict.stripUnmatchedSyntax(item, '{', '}') # html to text try: item = html2text(item) except: log.warn("Failed to convert comments to text") bibtex_entry.append('note = "%s"' % bibtexdict.utf8ToBibtex(item)) elif field == 'isbn' : # Could be 9, 10 or 13 digits bibtex_entry.append('isbn = "%s"' % format_isbn(item)) elif field == 'formats' : # Add file path if format is selected formats = [format.rpartition('.')[2].lower() for format in item] bibtex_entry.append('formats = "%s"' % ', '.join(formats)) if calibre_files: files = [':%s:%s' % (format, format.rpartition('.')[2].upper()) for format in item] bibtex_entry.append('file = "%s"' % ', '.join(files)) elif field == 'series_index' : bibtex_entry.append('volume = "%s"' % int(item)) elif field == 'timestamp' : bibtex_entry.append('timestamp = "%s"' % isoformat(item).partition('T')[0]) elif field == 'pubdate' : bibtex_entry.append('year = "%s"' % item.year) bibtex_entry.append('month = "%s"' % bibtexdict.utf8ToBibtex(strftime("%b", item))) elif field.startswith('#') and isinstance(item, string_or_bytes): bibtex_entry.append('custom_%s = "%s"' % (field[1:], bibtexdict.utf8ToBibtex(item))) elif isinstance(item, string_or_bytes): # elif field in ['title', 'publisher', 'cover', 'uuid', 'ondevice', # 'author_sort', 'series', 'title_sort'] : bibtex_entry.append('%s = "%s"' % (field, bibtexdict.utf8ToBibtex(item))) bibtex_entry = ',\n '.join(bibtex_entry) bibtex_entry += ' }\n\n' return bibtex_entry def check_entry_book_valid(entry): # Check that the required fields are ok for a book entry for field in ['title', 'authors', 'publisher'] : if entry[field] is None or len(entry[field]) == 0 : return False if entry['pubdate'] is None : return False else : return True def make_bibtex_citation(entry, template_citation, bibtexclass): # define a function to replace the template entry by its value def tpl_replace(objtplname) : tpl_field = re.sub(r'[\{\}]', '', objtplname.group()) if tpl_field in TEMPLATE_ALLOWED_FIELDS : if tpl_field in ['pubdate', 'timestamp'] : tpl_field = isoformat(entry[tpl_field]).partition('T')[0] elif tpl_field in ['tags', 'authors'] : tpl_field =entry[tpl_field][0] elif tpl_field in ['id', 'series_index'] : tpl_field = unicode_type(entry[tpl_field]) else : tpl_field = entry[tpl_field] return ascii_text(tpl_field) else: return '' if len(template_citation) >0 : tpl_citation = bibtexclass.utf8ToBibtex( bibtexclass.ValidateCitationKey(re.sub(r'\{[^{}]*\}', tpl_replace, template_citation))) if len(tpl_citation) >0 : return tpl_citation if len(entry["isbn"]) > 0 : template_citation = '%s' % re.sub(r'[\D]','', entry["isbn"]) else : template_citation = '%s' % unicode_type(entry["id"]) return bibtexclass.ValidateCitationKey(template_citation) self.fmt = path_to_output.rpartition('.')[2] self.notification = notification # Combobox options bibfile_enc = ['utf8', 'cp1252', 'ascii'] bibfile_enctag = ['strict', 'replace', 'ignore', 'backslashreplace'] bib_entry = ['mixed', 'misc', 'book'] # Needed beacause CLI return str vs int by widget try: bibfile_enc = bibfile_enc[opts.bibfile_enc] bibfile_enctag = bibfile_enctag[opts.bibfile_enctag] bib_entry = bib_entry[opts.bib_entry] except: if opts.bibfile_enc in bibfile_enc : bibfile_enc = opts.bibfile_enc else : log.warn("Incorrect --choose-encoding flag, revert to default") bibfile_enc = bibfile_enc[0] if opts.bibfile_enctag in bibfile_enctag : bibfile_enctag = opts.bibfile_enctag else : log.warn("Incorrect --choose-encoding-configuration flag, revert to default") bibfile_enctag = bibfile_enctag[0] if opts.bib_entry in bib_entry : bib_entry = opts.bib_entry else : log.warn("Incorrect --entry-type flag, revert to default") bib_entry = bib_entry[0] if opts.verbose: opts_dict = vars(opts) log("%s(): Generating %s" % (self.name,self.fmt)) if opts.connected_device['is_device_connected']: log(" connected_device: %s" % opts.connected_device['name']) if opts_dict['search_text']: log(" --search='%s'" % opts_dict['search_text']) if opts_dict['ids']: log(" Book count: %d" % len(opts_dict['ids'])) if opts_dict['search_text']: log(" (--search ignored when a subset of the database is specified)") if opts_dict['fields']: if opts_dict['fields'] == 'all': log(" Fields: %s" % ', '.join(FIELDS[1:])) else: log(" Fields: %s" % opts_dict['fields']) log(" Output file will be encoded in %s with %s flag" % (bibfile_enc, bibfile_enctag)) log(" BibTeX entry type is %s with a citation like '%s' flag" % (bib_entry, opts_dict['bib_cit'])) # If a list of ids are provided, don't use search_text if opts.ids: opts.search_text = None data = self.search_sort_db(db, opts) if not len(data): log.error("\nNo matching database entries for search criteria '%s'" % opts.search_text) # Get the requested output fields as a list fields = self.get_output_fields(db, opts) if not len(data): log.error("\nNo matching database entries for search criteria '%s'" % opts.search_text) # Initialize BibTeX class bibtexc = BibTeX() # Entries writing after Bibtex formating (or not) if bibfile_enc != 'ascii' : bibtexc.ascii_bibtex = False else : bibtexc.ascii_bibtex = True # Check citation choice and go to default in case of bad CLI if isinstance(opts.impcit, string_or_bytes) : if opts.impcit == 'False' : citation_bibtex= False elif opts.impcit == 'True' : citation_bibtex= True else : log.warn("Incorrect --create-citation, revert to default") citation_bibtex= True else : citation_bibtex= opts.impcit # Check add file entry and go to default in case of bad CLI if isinstance(opts.addfiles, string_or_bytes) : if opts.addfiles == 'False' : addfiles_bibtex = False elif opts.addfiles == 'True' : addfiles_bibtex = True else : log.warn("Incorrect --add-files-path, revert to default") addfiles_bibtex= True else : addfiles_bibtex = opts.addfiles # Preprocess for error and light correction template_citation = preprocess_template(opts.bib_cit) # Open output and write entries with codecs.open(path_to_output, 'w', bibfile_enc, bibfile_enctag)\ as outfile: # File header nb_entries = len(data) # check in book strict if all is ok else throw a warning into log if bib_entry == 'book' : nb_books = len(list(filter(check_entry_book_valid, data))) if nb_books < nb_entries : log.warn("Only %d entries in %d are book compatible" % (nb_books, nb_entries)) nb_entries = nb_books # If connected device, add 'On Device' values to data if opts.connected_device['is_device_connected'] and 'ondevice' in fields: for entry in data: entry['ondevice'] = db.catalog_plugin_on_device_temp_mapping[entry['id']]['ondevice'] # outfile.write('%%%Calibre catalog\n%%%{0} entries in catalog\n\n'.format(nb_entries)) outfile.write('@preamble{"This catalog of %d entries was generated by calibre on %s"}\n\n' % (nb_entries, strftime("%A, %d. %B %Y %H:%M"))) for entry in data: outfile.write(create_bibtex_entry(entry, fields, bib_entry, template_citation, bibtexc, db, citation_bibtex, addfiles_bibtex)) | Low | [
0.528864059590316,
35.5,
31.625
] |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. The report faults McCabe for leaking information of an August 2016 call to Wall Street Journal reporter Devlin Barrett for an Oct. 30, 2016, story titled “FBI in Internal Feud Over Hillary Clinton Probe.” The story -- written just days before the presidential election – focused on the FBI announcing the reopening of the Clinton investigation after finding thousands of her emails on a laptop belonging to former Democratic Rep. Anthony Weiner, who was married to Clinton aide Huma Abedin. The Journal's account of the call says a senior Justice Department official expressed displeasure to McCabe that FBI agents were still looking into the Clinton Foundation, and that McCabe had defended agent's authority to pursue the issue. "Among the purposes of the disclosure was to rebut a narrative that had been developing following a story in The WSJ on Oct. 23, 2016, that questioned McCabe’s impartiality in overseeing FBI investigations involving [Clinton], and claimed that McCabe had ordered the termination of the [FBI's Clinton Foundation investigation] due to Department of Justice pressure," the report says. That leak confirmed the existence of the probe, which then-FBI Director James Comey had up to that point refused to do. The report says that McCabe "lacked candor" in a conversation with Comey when he said that he had not authorized the disclosure and didn't know who had done so. The IG also found that he also lacked candor when questioned by FBI agents on multiple occasions since that conversation, where he told agents that he did authorize the disclosure and did not know who was responsible. [...] Senate Judiciary Committee Chairman Bob Goodlatte, R-Va., said that the report showed that the decision to fire McCabe "was the correct one." "According to the inspector general report, Mr. McCabe repeatedly lied under oath about the disclosure of information to a reporter. In doing so, he not only violated FBI policy, but he may have committed a federal crime," he said in a statement. I am starting to think that McCabe, Comey, etc. would make great republican or democrat politicians... they seem to know how to lie, mudsling, and leak sh*t to the press like the best of them. Of course, working for the FBI is the wrong place to do it. "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! I am starting to think that McCabe, Comey, etc. would make great republican or democrat politicians... they seem to know how to lie, mudsling, and leak sh*t to the press like the best of them. Of course, working for the FBI is the wrong place to do it. Oh come on, Frank... you need to tell us how Drumpf is behind all of this. Connect the dots for us. "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! I am starting to think that McCabe, Comey, etc. would make great republican or democrat politicians... they seem to know how to lie, mudsling, and leak sh*t to the press like the best of them. Of course, working for the FBI is the wrong place to do it. Libertarian politicians never do this! Because they never get elected. "There is no creature more arrogant than a self-righteous libertarian on the web, am I right? Those folks are just intolerable." "It's no secret that the great American pastime is no longer baseball. Now it's sanctimony." -- Guy Periwinkle, The Nix. "Juilliardk N I ibuprofen Hyu I U unhurt u" - creekster "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! Trump's anti-interventionist base, in this case, Alex Jones, reacts badly to Syria intervention: "Is no one pure in this world?.... F**k Trump!" "I think it was King Benjamin who said 'you sorry ass shitbags who have no skills that the market values also have an obligation to have the attitude that if one day you do in fact win the PowerBall Lottery that you will then impart of your substance to those without.'" - Goatnapper'96 It's OK though, because you can't kill terrorists without breaking a few eggs... amirite? So while the former is unacceptable and requires an IMMEDIATE response unilaterally by the POTUS (acting as judge, jury, and executioner), our own bombing campaigns which have over the last decade+ killed or maimed thousands of women and children with no end in sight barely registers on the American public's give-a-shit-o-meter. But, goddammit, we will not tolerate a dozen or so kids killed by someone else in some remote country halfway around the world from us. Nope. Because THAT crosses a line. You will forgive me for being so glib earlier in my responses to your posts, but I was busy talking with my financial planner for most of the day. This isn't my first rodeo. I was in the same position over a decade ago arguing against an Iraq invasion (as was Pat Buchanan and Bob Novak (RIP) and many other "isolationists"). I know that it is pointless for me to try and win over the opinion of jingoists like yourself, YOhio, and others. We will be in Damascus in two years time toppling a statue of Assad; en route we will kill (and probably torture) the Syrian populace. It's just part of the process. But, this time around I'm going to put my money where Frank Ryan's mouth is and invest a good chunk of my kids' trust funds in Raytheon, General Dynamics, Northrup Grumman, Lockheed Martin, etc. You see as much as I'd like my kids to live in the quiet cul-de-sac suburbia that I enjoy... living next to psychologists, college professors, optometrists, and other fake doctors; I'd rather have my kids living on waterfront property next to the *real* doctors, you know.. the kind that put orthopedic limbs on the vets returning home from the Middle East. So if I can make a little extra cash on this misadventure in the stock market, hey... so much the better. Because like the parents of the children that the US bombing campaigns kill; I've got dreams for my children too. Lockheed Martin (LMT) As I wrote yesterday, Lockheed' s older F-16 jet is considered a front runner in the Indian Air Force's potential $15 billion order for 110 fighter aircraft. Lockheed also produces the more modern (and stealth capable) F-22, and F-35 fighters. Both of these fighters are professionally thought to be effective against Russia's S-400 long range air defense missile system. That system is currently deployed in western Syria. Last week, Lockheed also won a $247 million contract from NASA to design and build an experimental aircraft that could operate without creating a traditional sonic boom. My price target: $375. Raytheon (RTN) First off, should the president decide to strike Syria without the use of American pilots, guess who produces the Tomahawk missile? That's right. These guys. On top of that, you might have noticed that two weeks ago, Poland agreed to spend $4.75 billion on RTN's Patriot missile defense system. By the way, this is the largest weapons deal in the history of Poland. Russia's annexation of the Crimean peninsula has not been lost on this former Warsaw Pact nation. In addition to increasing the dividend, Action Alerts PLUS holding Raytheon announced in late March that under the Department of Defense's DARPA program, it was developing technology that could control swarms of both air-based, and ground-based drone vehicles that might be launched using a "drag and drop" visual interface. My price target: $245. General Dynamics (GD) This is one firm where we have already seen cash flows and margins improving. GD is also another defense name that increased their dividend in March. Think the Navy gets some love in the 2018 federal budget that earmarked $654 billion for the Pentagon? Me too. Know who runs the Virginia class submarine program? General Dynamics. In fact, the Navy just awarded a $696 million modification to that program for 2019. One worry here is exposure to China. China is expected to be the hottest market for business jets over the next couple of decades, and General Dynamic's Gulfstream is the most popular business jet in that nation. Canada's Bombardier BDRBF is number two in that market, and eager. This will be a risk through the March 15 tariff hearing in Washington. My price target: $245 Kratos Defense & Security Solutions (KTOS) The stock has performed spectacularly since being impacted by the negative press regarding the Spruce Point analysis in mid-March. This calendar year, Kratos has landed at least $187.7 million in a series of awarded contracts, the details of which are at times murky due to the nature of the business. Though Spruce Point was correct in its assertion that the firm has gone through "multiple reinventions now hyping drones," it is just that, the elite level unmanned drone business, that is poised only to grow at this point, in my opinion. You're actually pretty funny when you aren't being a complete a-hole....so basically like 5% of the time. --Art Vandelay I would rather take a political risk in pursuit of peace, than to risk peace in pursuit of politics. --President Donald J. Trump Anyone can make war, but only the most courageous can make peace. --President Donald J. Trump You furnish the pictures, and Iíll furnish the war. --William Randolph Hearst Michael's Cohen's 3 clients are Trump, some corrupt RNC d-bag who needed help paying off mistresses and Sean Hannity: Michael Cohen Represented Sean Hannity, Lawyers Reveal Michael Cohen represented Fox News host Sean Hannity, Cohen's lawyers were forced to reveal in federal court on Monday. “We have been friends a long time. I have sought legal advice from Michael,” Hannity told the Wall Street Journal. Cohen was present at a hearing where his attorneys are challenging the FBI’s seizure of documents he claims are protected by attorney-client privilege. Cohen’s other two clients in recent years are President Donald Trump and Elliot Broidy, a Republican fundraiser. Cohen negotiated non-disclosure agreements with Trump and Broidy's alleged mistresses. On his radio show following the news, Hannity didn’t say why he worked with Cohen. “I think it’s pretty funny. It's very strange to have my own television network have my name up on the lower third.” WTF, man. And there is the wife of Rod Rosenstein who clients are also d-bags: I wonder if she and Cohen knew each other in law school. "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! Apparently Sean Hannity doesn't know what attorney/client confidentiality is. He admits to never retaining Michael Cohen, was never represented by Cohen, never revived or paid an invoice from Cohen. Yet he expects any conversations he had with Cohen to be protected by attorney/client privilege. Ain't it like most people, I'm no different. We love to talk on things we don't know about. "The only one of us who is so significant that Jeff owes us something simply because he decided to grace us with his presence is falafel." -- All-American "There is no creature more arrogant than a self-righteous libertarian on the web, am I right? Those folks are just intolerable." "It's no secret that the great American pastime is no longer baseball. Now it's sanctimony." -- Guy Periwinkle, The Nix. "Juilliardk N I ibuprofen Hyu I U unhurt u" - creekster "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! "If there is one thing I am, it's always right." -Ted Nugent. "I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU."Yet I still see wisdom in that which Uncle Ted posts." -creek.GIVE 'EM HELL, BRIGHAM! Just wanted to mention how much I'm enjoying listening to Hannity tap dancing around the Michael Cohen issue. Hannity's trying to distance himself from Cohen while maintaining he's entitled to the attorney-client privilege while also dismissing his journalistic obligation to disclose his Cohen relationship while reporting on him--an impressive juggling act. I'm also amused that Cohen has only three clients, two of whom have apparently never paid him anything. And finally, I wonder if Hannity had to explain to his wife that unlike Cohen's two other clients, Cohen's services were for a purpose other than paying off porn stars and Playmates. It's great how Trump, even indirectly, has elevated the level of public discourse. | Low | [
0.47311827956989205,
27.5,
30.625
] |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. need to replace spindle encoder I get spindle alarm 47 (Detects incorrect position coder signal count operation) I need to replace encoder but this model is discontinued. I'm looking to replace by another model but how can i be sure that it is compatible? thank a lot, i propably order to you in few day, is it realy a sumtak lhe-428 1024 or a compatible one? I'm not very familiar with that stuff, for connector, i just have to put same color of wire at the same position than the old one and it will work? Is this a shaft encoder or through-hole? You will find a replacement either at Renco or Hengstler, Koyo are also a low cost resource. 5vdc 1024 line differential should work OK. BTW, Sumtak were taken over by Renco, now heidenhain own Renco. Al. CNC, Mechatronics Integration and Custom Machine Design “Logic will get you from A to B. Imagination will take you everywhere.” Albert E. Here is a Renco they are dumping these new/old models, ebay # 200369969848 $90.00 It is 1024 with a 1/2" shaft size, the cables are tricky to make up so if you go for it, get them to supply a cable. Al. CNC, Mechatronics Integration and Custom Machine Design “Logic will get you from A to B. Imagination will take you everywhere.” Albert E. You will most likely have a shield as the 9th wire. The Sumtak info I have for the LHE series is: White +5v Black 0v Red A Pink /A Olive B Blue /B Yellow Z Orange /Z shield They are almost identical to the Renco style on ebay right now. Al. CNC, Mechatronics Integration and Custom Machine Design “Logic will get you from A to B. Imagination will take you everywhere.” Albert E. connect the A B strobe wire and VCC and GND if any feed Back connection is there connect that also Cable for connecting between the main When a built–in When a separate pulse coder or linear scale is used CPU board to the servo amplifier pulse coder is used Feedback cable connected to the motor Cable connected to the separate pulse coder 1st axis AMP1 ENC1 ENC1 SCALE1 2nd axis AMP2 ENC2 ENC2 SCALE2 3rd axis AMP3 ENC3 ENC3 SCALE3 4th axis AMP4 ENC4 ENC4 SCALE4 | Mid | [
0.5686746987951801,
29.5,
22.375
] |
Newcastle Jets wish to inform its members, fans and media that the club has withdrawn a breach of the code of conduct previously assigned to player David Carney. In light of the club’s decision, there will be no arbitration hearing between the club and Carney, as was scheduled to be held tomorrow (Friday 20 February) at Football Federation Australia’s head office. Over the past week there have been substantial operational and management changes at Newcastle Jets – changes the club believes will result in a new and positive direction for the Hunter’s Hyundai A-League franchise. Newcastle Jets Chief Executive Officer Mitchell Murphy said: “It is the club’s desire to work proactively behind the scenes with David (Carney) and the PFA (Professional Footballers Australia) and to resolve the situation in a timely manner.” “We achieved such an outcome earlier this week with Kew Jaliens, and the club is also committed to continuing the process with Joel Griffiths, Billy Celeski and Adrian Madaschi," he said. | Low | [
0.41860465116279005,
27,
37.5
] |
Rafer Alston Leaves Miami Heat While it has been a few days since Rafer Alston was first suspended for now showing up to Saturday’s game versus Atlanta, it’s a mystery to me what in the heck could he be doing? Alston, the point guard recently acquired from the New Jersey Nets, a popular player known for his boisterous personality and on-court razzle-dazzle display of skills, has not been in contact with the team since Friday, numerous news reports state. Only a text message sent, prior to him missing Friday’s practice, in fact. So what the heck is he doing with himself? Certainly this one time member of the time he was so looking forward to re-unite with isn’t having second thoughts about playing in Miami, is he? Sure, he was benched against the Lakers. We all saw that. But, by leaving the team amidst a playoff race, he has shown Miami that there is either something going on behind the scenes or he was frustrated to the point of walking away from a team that needs him. Whatever it is, it’s an opening for another player. While it remains to be seen if the Heat will seek another player to help fill in at point guard, the Heat do have superstar Dwayne Wade, along with Dorrell Wright, Carlos Arroyo, and second year player Mario Chalmers. In the meantime, we’ll play “Where’s Rafer?” around town and let you know if he surfaces. | Low | [
0.48832271762208,
28.75,
30.125
] |
// ---------------------------------------------------------------- // Gunrock -- Fast and Efficient GPU Graph Library // ---------------------------------------------------------------- // This source code is distributed under the terms of LICENSE.TXT // in the root directory of this source distribution. // ---------------------------------------------------------------- /** * @file * error_utils.cu * * @brief Error handling utility routines */ #include <stdio.h> #include <gunrock/util/error_utils.cuh> namespace gunrock { namespace util { void PrintMsg(const char *msg, bool to_print, bool new_line) { if (!to_print) return; printf("%s%s", msg, new_line ? "\n" : ""); if (new_line) fflush(stdout); } void PrintMsg(std::string msg, bool to_print, bool new_line) { if (!to_print) return; PrintMsg(msg.c_str(), to_print, new_line); } void PrintMsg(const char *msg, int gpu_num, long long iteration, int peer, bool to_print, bool new_line) { if (!to_print) return; PrintMsg(std::to_string(gpu_num) + "\t " + std::to_string(iteration) + "\t " + std::to_string(peer) + "\t " + std::string(msg), true, new_line); } void PrintMsg(std::string msg, int gpu_num, long long iteration, int peer, bool to_print, bool new_line) { if (!to_print) return; PrintMsg(std::to_string(gpu_num) + "\t " + std::to_string(iteration) + "\t " + std::to_string(peer) + "\t " + msg, true, new_line); } /** * Displays error message in accordance with debug mode */ cudaError_t GRError(cudaError_t error, const char *message, const char *filename, int line, bool print) { if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[%s, %d @ gpu %d] %s (CUDA error %d: %s)\n", filename, line, gpu, message, error, cudaGetErrorString(error)); fflush(stderr); } return error; } cudaError_t GRError(cudaError_t error, std::string message, const char *filename, int line, bool print) { if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[%s, %d @ gpu %d] %s (CUDA error %d: %s)\n", filename, line, gpu, message.c_str(), error, cudaGetErrorString(error)); fflush(stderr); } return error; } /** * Checks and resets last CUDA error. If set, displays last error message in * accordance with debug mode. */ cudaError_t GRError(const char *message, const char *filename, int line, bool print) { cudaError_t error = cudaGetLastError(); if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[%s, %d @ gpu %d] %s (CUDA error %d: %s)\n", filename, line, gpu, message, error, cudaGetErrorString(error)); fflush(stderr); } return error; } cudaError_t GRError(std::string message, const char *filename, int line, bool print) { cudaError_t error = cudaGetLastError(); if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[%s, %d @ gpu %d] %s (CUDA error %d: %s)\n", filename, line, gpu, message.c_str(), error, cudaGetErrorString(error)); fflush(stderr); } return error; } /** * Displays error message in accordance with debug mode */ cudaError_t GRError(cudaError_t error, bool print) { if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[@ gpu %d] (CUDA error %d: %s)\n", gpu, error, cudaGetErrorString(error)); fflush(stderr); } return error; } /** * Checks and resets last CUDA error. If set, displays last error message in * accordance with debug mode. */ cudaError_t GRError(bool print) { cudaError_t error = cudaGetLastError(); if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[@ gpu %d] (CUDA error %d: %s)\n", gpu, error, cudaGetErrorString(error)); fflush(stderr); } return error; } std::string GetErrorString(gunrock::util::gunrockError_t error) { switch (error) { case gunrock::util::GR_UNSUPPORTED_INPUT_DATA: return "unsupported input data"; default: return "unknown error"; } } gunrockError_t GRError(gunrock::util::gunrockError_t error, std::string message, const char *filename, int line, bool print) { if (error && print) { int gpu; cudaGetDevice(&gpu); fprintf(stderr, "[%s, %d @ gpu %d] %s Gunrock error: %s.\n", filename, line, gpu, message.c_str(), GetErrorString(error).c_str()); fflush(stderr); } return error; } } // namespace util } // namespace gunrock // Leave this at the end of the file // Local Variables: // mode:c++ // c-file-style: "NVIDIA" // End: | Low | [
0.525896414342629,
33,
29.75
] |
Tenkar's Tavern is supported by various affiliate programs, including Amazon, RPGNow and Humble Bundle. Your patronage is appreciated and helps keep the lights on and the taps flowing - Your Humble Bartender, Tenkar RPGNow Tuesday, February 9, 2016 How Long Before Hasbro Buys Out OneBookShelf? How long before Hasbro buys out OneBookShelf? Sure, it's a question that can't be answered yet, but it is an interesting thought. All of WotC's digital products are being sold through OBS (except it's VTT products, which are on Fantasy Grounds - that's a whole 'nother post) At this point, WotC / Hasbro is the dominant publisher on OBS and the Dungeon Master's Guild is going to lead to a HUGE amount of licensed D&D 5e products. That glut has the potential to seriously tilt the online market towards 5e if it hasn't already. Assuming a limited pool of money to be spent by consumers on RPG products, the Dungeon Master's Guild can seriously drain that pool. When does it become more profitable for Hasbro to own it's online distributor for it's PDF releases? What does this mean for the smaller publishers? When the Dungeon Master's Guild was announced, most of the fear I heard was "it's going to be the D20 era again, with a few gems hidden in piles of dung." Now, I think the fear should be for the market shift and the potential harm to publishers that aren't in the DM's Guild Market (which has huge restrictions and lack of ownership - again, another future post) The last event that had this much influence on online distributing of RPG products came with the RPGNow / DriveThruRPG merge. Was that merge good for consumers and small publishers? I truthfully don't know, but less competition rarely benefits those spending the cash. Now, has the current trend benefiting WotC / Hasbro and has it boosted D&D 5e? Is it adding dollars to the coffers of OBS? Of course to all. The question is: What is the long term cost to the hobby? 13 comments: Alright, so I'm behind the times, but isn't DM's Guild primarily for publishing adventures? The part of the d20 glut that wrinkled my nose the most was the dearth of source material and how much of it tripped over the rest. (I recall at least three different companies publishing rules for naval/maritime stuff, for instance) As for OBS, I don't really care who owns it as long as the non-D&D stuff remains available and the small guys don't get screwed out of profit. I have 6 products on the DMsGuild and NONE Of them are adventures. Looking at the top products, very few are in the Top 100. Why is it important who owns it? Hasbro won't give a shit about anything but the revenue stream. For those that are familiar with Magic Online, its a terrible, unreliable and old interface, but there is no reason for Hasbro to fix it because the money just pours in 24/7. Is Facebook bad for social networking? The problem is that numbers attract numbers and OBS passed that threshold long ago. The only competition on are the places oriented to more to general publishing like Lulu and Amazon/Createspace. As for the DM's Guild, I will say I think that it is just over right side of the line of being a fair deal. In exchange for using all of Wizard's IP for 5e and the Forgotten Realms, you fork over 50% of revenues, and you have to share your IP with everybody else in the DM's Guild for use ONLY in the DM's Guild. And you agree not to release the same product outside of the guild (if it was a generic 5e supplement). Now you still have full copyright to your original material. Wizards (or anybody else) has to come to you in order to use it outside of the DM's Guild. If you want to use your IP outside of the Guild you can outside of the restriction of having the same product available inside the guild and outside of the guild. My personal recommendation is this. If you have an idea that only make sense if it uses Forgotten Realm IP, then use the DM's Guild. In the rare instance if an idea relies on closed content by Wizards (for example Mind Flayer) again use the guild. Otherwise use the Open Game License and the 5e System Reference Document. I think the effort it would take the WotC team to explain to Hasbro execs what the DMsGuild/DNDClassics thing even is, let alone how its tied to OBS, would take more effort than it's worth when Hasbro then weighs the remaining profit not received (piddling compared to actual official D&D pdf sales I bet) against the cost and hassle of maintaining the site. If it were that valuable to them they could just set up their own shop and run it as the official D&D brand PDF store. Given they can't even divest resources to fan forums on their own home page this seems unlikely. # Nicholas Bergquist, Your mention of the fumbled fan forums might work against your point.). Buying one book could provide the manpower and expertise needed for WoTC to rebuild and maintain a proper web presence in addition to any benefits from controlling the distribution. Well...actually yeah after I wrote that I was thinking that a wholesale purchase of OBS, in which staff was retained, could put them in a good position....so I concede that could be an advantage to such a purchase. Assuming OBS ownership wanted to sell, that is. DMG stuff is pretty invisible if you stick to the regular OBS sites. I think the real problem is creators spending too much time on FR shovelware rather than writing interesting new stuff out of concern that if it's not on the DMG it won't get noticed. I hope not. The stock art products I am trying to push on OBS are designed with OSR buyers in mind. I am not sure how things would go for a lot of indies and non Hasbro big game companies if they took over. On the surface, it looks like a good idea, but when you look closer, it's a lot more complex. WotC has already demonstrated that it sucks at digital projects. Managing a software team is not at all like managing a publishing team. For them, it makes more sense to keep outsourcing to OBS because they are able to expand their revenue stream without the overhead of technology investment and employee headcount. Getting OBS employees to move from Georgia to Washington state could be a serious challenges and starting up a new team from scratch to maintain the existing software without having existing employees to do knowledge transfer would be a major challenge. Basically, with OBS, they have only a small amount of risk (similar to their "Morningstar" partnership). If the project fails, they look for a different partner. By bringing it in house, the bring on a huge amount of risk and headcount for a relatively small amount of revenue. Search This Blog Got Something Newsworthy? Your Bartender is Listening ;) Translate Contributors Why "Swords & Wizardry?" Believe me when I say I have them all in dead tree format. I have OSRIC in full size, trade paperback and the Player's Guide. I have LL and the AEC (and somewhere OEC, but I can't find it at the moment). Obviously I have Basic Fantasy RPG. Actually, I have the whole available line in print. Way too much Castles & Crusades. We all know my love for the DCC RPG. I even have Dark Dungeons in print, the Delving Deeper boxed set, Astonishing Swordsmen & Sorcerers of Hyperborea (thank you Kickstarter) (edit) BOTH editions of LotFP's Weird Fantasy and will soon have some dead tree copies of the Greyhawk Grognards Adventures Dark & Deep shipping shortly in my grubby hands awaiting a review.. I am so deep in the OSR when I come up for breath it's for the OSR's cousin, Tunnels & Trolls (and still waiting on dT&T to ship). So, out of all that, why Swords & Wizardry? Why, when I have been running a AD&D 1e / OSRIC campaign in Rappan Athuk am I using Swords & Wizardry and it's variant, Crypts & Things, for the second campaign? (Actually, now running a S&W Complete campaign, soon to be with multiple groups) Because the shit works. It's easy for lapsed gamers to pick up and feel like they haven't lost a step. I can house rule it and it doesn't break. It plays so close to the AD&D of my youth and college years (S&W Complete especially) that it continually surprises me. Just much less rules hopping than I remember. (my God but I can run it nearly without the book) I grab and pick and steal from just about all OSR and Original resources. They seem to fit into S&W with little fuss. It may be the same with LL and the rest, but for me the ease of use fit's my expectations with S&W. Even the single saving throw. That took me longer to adjust to, but even that seems like a natural to me now. Don't ask me why, it just does. Maybe it's the simplicity of it. At 45 48, simplicity and flexibility while remaining true to the feel of the original is an OSR hat trick for me ;) We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites | Low | [
0.49889624724061804,
28.25,
28.375
] |
Q: search for string in text file in vb and print lines Hi I am new to VB and just though if someone could help me in my current scenario I have a text file named shar.txt It has 6 lines in it. I am a new student I am learning VB Please help me friends Friends always matter in our life Thank You for your support Always grateful to you I want a script which reads this text file and look for the string such as "Friends", "support" and print the lines containing those strings in another text file at the same location say "sha.txt" I tried till this point but lost my way i mid. Please someone help me. thanks Sub ReadToTextFile() Dim strPattern1 As String Dim strPattern2 As String H1 As String H2 As String strPattern1 = "friends" strPattern2 = "support" Set objFileToRead = CreateObject("Scripting.FileSystemObject").OpenTextFile("C:\Users\sonu\Desktop\auto\shar.txt", 1, True) Do Until objFileToRead.AtEndOfStream strLine = objFileToRead.ReadLine ElseIf InStr(strLine, strPattern1) > 0 Then Wscript.Echo strLine H1 = strLine ElseIf InStr(strLine, strPattern2) > 0 Then Wscript.Echo strLine H2 = strLine End If End If Loop Wscript.Echo H2 Set objFileToRead = Nothing End Sub A: A very bad formed question for this site. It's good for you to spend some time to read the rules. Anyway, this is from me. Const ForReading = 1, ForWriting = 2 Dim FSO, FileIn, FileOut, strTmp Set FSO = CreateObject("Scripting.FileSystemObject") Set FileIn = FSO.OpenTextFile("shar.txt", ForReading) Set FileOut = FSO.OpenTextFile("sha.txt", ForWriting, True) Do Until FileIn.AtEndOfStream strTmp = FileIn.ReadLine If Len(strTmp) > 0 Then If InStr(1, strTmp, "Friends", vbTextCompare) > 0 _ Or InStr(1, strTmp, "support", vbTextCompare) > 0 Then FileOut.WriteLine strTmp End If End If Loop FileIn.Close FileOut.Close EDIT: About your question for using arrays... ' an example array arWords = Array("friends", "support", "xyz") ' modified Do..Loop Do Until FileIn.AtEndOfStream strTmp = FileIn.ReadLine If Len(strTmp) > 0 Then For i = 0 To UBound(arWords) If InStr(1, strTmp, arWords(i), vbTextCompare) > 0 Then FileOut.WriteLine strTmp Exit For End If Next End If Loop Cheers! | Mid | [
0.622641509433962,
33,
20
] |
// note: this is the LBSP 16 bit double-cross indiv RGB pattern as used in // the original article by G.-A. Bilodeau et al. // // O O O 4 .. 3 .. 6 // O O O .. 15 8 13 .. // O O X O O => 0 9 X 11 1 // O O O .. 12 10 14 .. // O O O 7 .. 2 .. 5 // 3x 3x // // must be defined externally: // _t (size_t, absolute threshold used for comparisons) // _ref (uchar[3], 'central' values used for comparisons) // _data (uchar*, triple-channel data to be covered by the pattern) // _y (int, pattern rows location in the image data) // _x (int, pattern cols location in the image data) // _step_row (size_t, step size between rows, including padding) // _res (ushort[3], 16 bit result vectors vector) // L1dist (function, returns the absolute difference between two uchars) #ifdef _val #error "definitions clash detected" #else #define _val(x,y,n) _data[_step_row*(_y+y)+3*(_x+x)+n] #endif for(int n=0; n<3; ++n) { _res[n] = ((L1dist(_val(-1, 1, n),_ref[n]) > _t) << 15) + ((L1dist(_val( 1,-1, n),_ref[n]) > _t) << 14) + ((L1dist(_val( 1, 1, n),_ref[n]) > _t) << 13) + ((L1dist(_val(-1,-1, n),_ref[n]) > _t) << 12) + ((L1dist(_val( 1, 0, n),_ref[n]) > _t) << 11) + ((L1dist(_val( 0,-1, n),_ref[n]) > _t) << 10) + ((L1dist(_val(-1, 0, n),_ref[n]) > _t) << 9) + ((L1dist(_val( 0, 1, n),_ref[n]) > _t) << 8) + ((L1dist(_val(-2,-2, n),_ref[n]) > _t) << 7) + ((L1dist(_val( 2, 2, n),_ref[n]) > _t) << 6) + ((L1dist(_val( 2,-2, n),_ref[n]) > _t) << 5) + ((L1dist(_val(-2, 2, n),_ref[n]) > _t) << 4) + ((L1dist(_val( 0, 2, n),_ref[n]) > _t) << 3) + ((L1dist(_val( 0,-2, n),_ref[n]) > _t) << 2) + ((L1dist(_val( 2, 0, n),_ref[n]) > _t) << 1) + ((L1dist(_val(-2, 0, n),_ref[n]) > _t)); } #undef _val | Mid | [
0.5415019762845851,
34.25,
29
] |
Audio Processors - Closed Caption Decoders Whether the audio source is digital or analog, a good audio processor can enhance the original signal and integrate it into your sound system. Quality audio equipment provides exceptional sound clarity and ensures a great final product. Another critical component for any audio system is an audio transformer. An audio transformer blocks potential interference from radio signals and electrical components. It also combines or splits audio components and matches the impedance among between high impedance and low impedance audio equipment. Enjoy exceptional sound quality with professional a/v components! Closed caption decoders make it possible for those who are hard of hearing to read the spoken words during a program. Allow everyone in attendance to engage in the presentation by incorporating a CC decoder in your system. Projector SuperStore is your source for processors, transformers, decoders, and much more! Contact one of our knowledgeable sales team members today for more information and to find the perfect equipment for your system! | Mid | [
0.6138211382113821,
37.75,
23.75
] |
Q: Android arrayAdapter and BaseAdapter getContext ? why getContext works on array adapter but not on base adapter? Why does the getContext() method works on ArrayAdapter inside getView method. convertView = LayoutInflater.from(getContext()).inflate(R.layout.row,parent,false); why the same code does work on BaseAdapter ? Code Class extending ArrayAdapter ? package com.example.manis.mylist3; import android.content.Context; import android.util.Log; import android.view.LayoutInflater; import android.view.View; import android.view.ViewGroup; import android.widget.ArrayAdapter; import android.widget.ImageView; import android.widget.TextView; import java.util.ArrayList; /** * Created by Manis on 8/6/2016. */ public class NoteAdapter extends ArrayAdapter{ public NoteAdapter(Context context, ArrayList<Note> notes) { super(context, 0 ,notes); } @Override public View getView(int position, View convertView, ViewGroup parent) { // Log.v("adapter","called"+position); Note note = (Note) getItem(position); if(convertView==null){ // Log.v("noteAdapter","ConvertView was null"); convertView = LayoutInflater.from(getContext()).inflate(R.layout.row,parent,false); } TextView noteTitle= (TextView) convertView.findViewById(R.id.rowTitle); TextView noteSubText= (TextView) convertView.findViewById(R.id.rowSubText); ImageView img = (ImageView) convertView.findViewById(R.id.rowImg); noteTitle.setText(note.getTitle()); noteSubText.setText(note.getSubtext()); img.setImageResource(note.getAssociatedDrawable()); return convertView; } } Code for NoteBaseAdapter Class Extending BaseAdapter package com.example.manis.mylist3; import android.content.Context; import android.view.LayoutInflater; import android.view.View; import android.view.ViewGroup; import android.widget.BaseAdapter; import java.util.ArrayList; public class NoteBaseAdapter extends BaseAdapter { ArrayList<Note> notes; Context context; public NoteBaseAdapter(Context c, ArrayList<Note> notes) { this.context=c; this.notes=notes; } @Override public int getCount() { return notes.size(); } @Override public Object getItem(int position) { return notes.get(position); } @Override public long getItemId(int position) { return position; } @Override public View getView(int position, View convertView, ViewGroup parent) { //error convertView = LayoutInflater.from(getContext()).inflate(R.layout.row,parent,false); } } A: Well, the ArrayAdapter extends BaseAdapter and has a context variable in its constructor which is saved and can be accessed using getContext(). Whereas, BaseAdapter has an empty constructor. You don't provide one to it, so you can't get it from the base class. If you need one, make your own constructor like the ArrayAdapter class did and save your context there. | Low | [
0.530612244897959,
32.5,
28.75
] |
Sarah Tew/CNET Google is planning to bring artificial intelligence and machine learning tools to the diminutive Raspberry Pi this year. "Google is going to arrive in style in 2017. The tech titan has exciting plans for the maker community," said The Raspberry Pi Foundation. The advertising-to-cloud-computing giant intends to make a range of smart tools available this year, according to the Foundation. "Google's range of AI and machine learning technology could enable makers to build even more powerful projects," it said. Google has developed a huge range of tools for machine learning, IoT, wearables, robotics, and home automation, and it wants Raspberry Pi fans to fill out a survey that will help it to understand what tools to provide. The survey mentions face- and emotion-recognition and speech-to-text translation, as well as natural language processing and sentiment analysis. "The tech giant also provides powerful technology for navigation, bots, and predictive analytics. The survey will help them get a feel for the Raspberry Pi community, but it'll also help us get the kinds of services we need," said the Foundation. The tiny, low-cost Raspberry Pi boards have been an unexpected runaway success, selling over ten million even though the developers only ever expected to sell 1,000. The original aim was to inspire more students to take up computer science, but the Pi has had a far wider impact than that. Read more about the Raspberry Pi | Mid | [
0.6451612903225801,
37.5,
20.625
] |
Broadcast 2591 Feedback: What did you think of this show?: Guest: Dr. David Crisp. Topics: NASA Orbiting Carbon Observatory (OCO-2), Earth's CO2 environment and more. Please direct all comments and questions regarding Space Show programs/guest(s) to the Space Show blog, http://thespaceshow.wordpress.com. Comments and questions should be relevant to the specific Space Show program. Written Transcripts of Space Show programs are a violation of our copyright and are not permitted without prior written consent, even if for your own use. We do not permit the commercial use of Space Show programs or any part thereof, nor do we permit editing, YouTube clips, or clips placed on other private channels & websites. Space Show programs can be quoted, but the quote must be cited or referenced using the proper citation format. Contact The Space Show for further information. In addition, please remember that your Amazon purchases can help support The Space Show/OGLF. See www.onegiantleapfoundation.org/amazon.htm. For those listening to archives using live365.com and rating the programs, please email me as to why you assign a specific rating to the show. This will help me bring better programming to the audience. We welcomed Dr. David Crisp to the show to discuss the NASA Orbiting Carbon Observatory-2(OCO-2) satellite. During the first segment of our 94 minute program, Dr. Crisp started out by presenting a short overview of the OCO satellites, the first two of which did not make it to orbit due to fairing failure after their Vandenberg launch. For the third attempt, NASA switched rockets to the Delta 2 and the satellite made it to orbit without a problem. Dr. Crisp then explained how OCO-2 works, how it detects and measures CO2 in the atmosphere from the ground up. He explained the color intensity and why the information is so accurate. I asked him to compare OCO-2 data with climate models. Here, Dr. Crisp stressed the fact that he was not a climate scientist or policy maker. That said, he did compare and contrast OCO-2 data with climate models to the degree reasonable comparisons can be made. We talked about natural sources of CO2 on earth, both land and water (ocean, rivers, and lakes), as compared to manmade sources of CO2. Dr. Crisp explained the emitting and absorption capabilities from the natural CO2 sources, photosynthesis with plants, and the fact that manmade CO2 is only emitted, not absorbed. This CO2 can stay in the atmosphere for a thousand years or so. He talked about the total parts per million of CO2 in the atmosphere, how it has gone down and now is going up over the years and the amount of human created CO2 in the atmosphere and how that has increased over the years. Listeners asked about methane but OCO-2 was not designed to detect methane. He was also asked about water vapor. Dr. Crisp explained that water vapor in the atmosphere was detected and measured by other satellites, particularly weather satellites so it was not part of this genre of satellites. Jack emailed in a question to point out that a pause was going on for the past 19 years or so and the planet was not cooling despite human CO2 increases. Dr. Crisp offered an explanation for the pause so don't miss it. Jane from Seattle brought up the fact that warming and cooling on Earth has been going on since the beginning of time, without human produced C02. She asked how this could be given the conclusions many make regarding the increase in human produced CO2 levels for today causing global warming. Don't miss how Dr. Crisp responded to Jane. Dr. Crisp also talked about solar warming and cooling cycles and said we are currently in a solar cooling cycle. Randy emailed in a question about the draught in California and its relationship to CO2 increases. In the second segment, Becky in Las Vegas sent in a note asking about the climate and atmosphere on Venus and Mars given our guest has studied both planets. She was looking for a common link with Earth or maybe a common trend. Dr. Crisp had much to say about both Venus and Mars. Later in the discussion, I asked if humans were on Venus with advanced technology, could they have intervened in the global warming process and mitigated the impact of it. He said he doubted it, explained why and then the same question was asked about Mars though the situation on Mars was and is different than on Venus. For the most part, Venus was too close to the sun to do anything about it and Mars was too far to do anything about the Martian problems. This is why Earth is in the Goldilocks zone and why we search for exoplanets in this zone. Later, Dr. Crisp talked about today having the highest CO2 levels ever and the growing Earth population which is around 7.2 billion people having nearly doubled over the last 45-50 years. This led us to a discussion about energy, including coal, natural gas & nuclear power. He had some surprising comments about China and coal, don't miss them. We also talked about India and its use of coal, then Dr. Crisp talk about the need to be able to store power, use solar and wind power, and to enlarge the grid to take wind or solar from areas where it was strong to be able to ship to areas that needed it. He also talked about the need to improve energy storage. Near the end of the program, I asked about any surprises discovered from the OCO-2 data. We then talked about how long OCO-2 would last and here, we talked about the design as a demo satellite without redundant or backup systems. A listener asked if cubesats could do such an OCO-2 type mission. Don't miss his answer but the simple one was no because the technology for doing this requires hardware that is considerably larger than could be used by a cubesat. Before the show ended, we talked about the NASA Earth Science Budget, the cost per taxpayer, and our ability to freely download OCO-2 data off their website. He then identified the largest user and downloader of the data. I bet you will be surprised by what he said. NASA was the second largest downloader of the data. Please post your comments/questions on TSS blog. You can reach Dr. Crisp through me or through a JPL search for his name and information. Popular Threads Recent Comments Broadcast Schedule Sunday: 12:00 - 1:30 PM (PT) Monday: 2:00 - 3:30 PM (PT) Tuesday: 7:00 - 8:30 PM (PT) Friday: 9:30 - 11:00 AM (PT) Other weekday times can be morning , afternoon, or evening as you will see from the program schedule below. When you see Wednesday or Thursday program options, it is because of my travel schedule and I am adding in special shows at the time chosen by the guest. The John Batchelor Hotel Mars segment is always Wednesday, 6:30-6:45 PM Pacific Time. All Hotel Mars shows are archived as Space Show programs. Dr. Livingston Business Consulting & Speaking Opportunities Dr. David Livingston is available for business consulting and speaking engagements. Please contact him for specifics. You can reach Dr. Livingston by email at [email protected] or (415) 455-9076. About TSS The Space Show® wants to provide you with timely and relevant information on space issues and policy influencing the development of outer-space commerce, space tourism, exploration, planetary science, as well as other related space subjects of interest to us all. | Mid | [
0.633027522935779,
34.5,
20
] |
I was disappointed to hear that a friend of mine got a bicycle ticket the other day in Saint Louis Park. The $62 ticket was given by an officer for not stopping at a stop sign at a very problematic intersection, where the Cedar Lake bike trail and Beltway Boulevard intersect right near Steel Toe Brewing and Bass Lake. Here’s his story: So it was this past Saturday. I was riding from Minneapolis out to Wayzata, and at the first Greenway crossing where Minneapolis turns into SLP, I’m not exactly sure, the first big crossing right after you cross the railroad tracks coming from Uptown. It’s the Belt Line, and it’s a crossing in know pretty well. I know that a lot of the time, if its not clear, you end up waiting there for over five minutes because the traffic is so aggressive. People drive really fast, and the sight lines are really poor for people driving to see people crossing the trail. Since it was clear and I was going 10 miles per hour, I slowed a little bit, but was certainly not crawling along. Since it was clear in both directions, I just stood up and pedaled through the intersection. Moments later a police car that was idling next to the trail turns the siren on and follows me onto the trail. He gave the ol’ horn and pulled me over, and gave me a spiel about why he was pulling me over. How they frequently do stings there. Apparently they get a lot of complaints about people blowing that stop sign, and it’s led to them doing trail stings there to find people that don’t stop at that stop sign. He said they also fine drivers who don’t stop for bikers or pedestrians, there but I didn’t stick around to see if that was true.* I got a 65 dollar given and a five minute lecture and I was on my way. It was a little bit of a bummer, but I am privileged enough to not be someone for whom a $65 fine is gonna stress me out a ton. It was an inconvenience, but did not not really put a damper on the the day. It did feel silly, but I think technically I was breaking the law, so I can’t really fault the guy. It just seems like a waste of resources or whatever. It seems like an innocuous story, but there’s a lot more going on here. A Dangerous Intersection Made Worse by City Policy This is an important intersection and probably the #1 spot used by people riding bicycles in all of Saint Louis Park. Yet despite heavy use by people on foot and bicycle, Saint Louis Park has not made this a safe crossing for these vulnerable road users. And judging from this story, the city is only making it worse with a lost-cause enforcement approach that will not solving any problems. This intersection, where a busy recreational trail crosses an arterial road, has already been the subject of many previous posts. For example, you can read about this in an article I wrote for Minnpost back in 2015: The end result is a confusing mishmash, and there have been a slow but steady stream of nonfatal accidents. The latest mishap occurred last week, when a diagonally traveling bicyclist broke an ankle. “Without question, it’s less than desirable,” Tom Harmening, the St. Louis Park city manager, told me. “Some time ago there was a crosswalk there, but we removed that. Our City Council and staff, along with the Three Rivers [Park District] have discussed this crossing a number of times. We’ve brought in consultants to look at the design options, and most recently made some changes 2-3 years ago that resulted in current configuration, adding a refuge and a curve.“ For someone walking or riding on the trail, questions about right of way are irrelevant. The only thing that matters is whether the oncoming car is going to stop for you. That’s one reason that, for bicycle advocates, the answer to the St. Louis Park problem is to either clarify the state law or change the street design. Or again in an article here on streets.mn by Sean Hayford Oleary: For anyone who’s ridden these trails, it’s clear that the methods aren’t just callous to the needs of pedestrians and cyclists — they’re completely ineffective. In my experiences, well over 90% of bicycles roll through the trail stop signs. Riding the N Cedar Lake Trail a few weekends ago, I did not see a single cyclist or pedestrian come to a complete stop at any of its many stop signs. So it’s clear that St. Louis Park’s methods to improve safety are questionable, and probably ineffective. But are they legally based? For cyclists, this is a sticky question I won’t get into at this point. But for pedestrians, the answer seems to be a resounding “No.” One key takeaway here is that, by launching a legally dubious and dangerous campaign to claim that this crossing is not a crosswalk, Saint Louis Park is making a bad situation worse. And by adding bicycle tickets to the mix, the unenforceable and counter-intuitive “solution” that Saint Louis Park seems to be adopting is only going to discourage and depress bicycling in the city. Given the public health and environmental health needs we face, that is a shame. As Bike Alliance of Minnesota deputy director, Nick Mason, wrote in a comment (quote in Sean’s piece above): If our answer to safety is that people with limited mobility have no right to cross a less-than-safe roadway, we need to pause and consider that it’s inherently problematic. By removing those crossings [St. Louis Park] didn’t increase safety; they decreased their liability. The vast majority of people riding bicycles on this trail are going to do what’s best for their own safety, which means venturing forth into the street and navigating the intersection as best they can despite Saint Louis Park’ dubious stop sign. The end result is that the status quo pushed by the City of Saint Louis Park does nothing to help these people or make anyone safer. A real solution might be installing a HAWK signal, some kind of a crosswalk and officially granting bicyclists and pedestrians the right-of-way. This is the only way to make it clear to motorists how to slowly proceed, and to ensure the safety of everyone who uses these public streets and trails. Instead, the city is pushing an ineffective and counter-intuitive enforcement campaign that will not change behavior, does not make anyone safer, and will only undermine the physical and financial security of people trying to get around on bicycles. You don’t have to feel bad for my buddy who got the ticket (or others just like him), but you should be angry that the city of Saint Louis Park is ensuring that safety is not a priority on their bike and pedestrian trails. * On top of that, it seems like the officer in question is not aware of the law that the city is (backwardly) trying to enforce, as the city has tried to make it clear that people using the trail do NOT have the right-of-way. (For example, check out this video.) Keep in mind that the actual legal claim there is questionable. Click on the above articles for more info about the relevant statutes. Share this: Email Facebook Twitter Reddit | Mid | [
0.574610244988864,
32.25,
23.875
] |
Why concierge medicine will get bigger Practices could shield patients from health-care turmoil If you’ve joined a concierge medical practice, recent trends in the worlds of health care and insurance may have you feeling good about your decision. If you haven’t signed up with one of these practices—also called “boutique,” “personalized” or “private-physician” practices—some of those same trends may lead you to consider it down the road. Certainly, plenty of baby boomers have done the math and deemed the investment worthy. In the typical concierge experience, a primary-care doctor accepts insurance for routine services but also charges a non-reimbursable fee that pays for amenities like 24/7 access to the doctor, same-day appointments, longer appointment times and a greater degree of personalized attention. The annual fee for such practices currently averages about $1,800. Now that the business model has been around for a while, more patients are saying that it involves less stress than a traditional medical practice. What’s more, two recent studies that tried to measure the health impact of one popular concierge model found its patients had lower hospitalization rates and other benefits. The approach has its critics, with some arguing that concierge medicine exacerbates the disparities in care between the haves and have-nots. But for people with the resources to afford it, the boutique-practice model clearly has a growing appeal. TAXES Big tax bills can devastate your retirement savings. MarketWatch's Robert Powell and Andrea Coombes talk about strategies to employ before and during retirement to lower your taxes. While the number of concierge doctors remains small, it’s growing at a rapid clip. In the U.S., there were about 4,400 private physicians in 2012, a 25% increase from 2011, according to the American Academy of Private Physicians. That’s out of some 600,000 practicing doctors nationwide. At an average of roughly 350 patients per concierge doctor, that means more than 1.5 million Americans are under the care of a physician who provides an additional level of service in exchange for a fee. Concierge medicine’s perceived advantages will only grow in the coming years, experts say, as the traditional health-care system becomes even more strained. The full implementation of the Affordable Care Act next year is expected to bring more than 20 million formerly uninsured patients into the health-care system through 2022, exacerbating an existing physician shortage. What’s more, proposed changes to Medicare could cut doctors’ reimbursements, further squeezing their revenue. Concierge doctors make the case that their fee cushions them, and by extension their patients, from these changes looming on the health-care horizon. A buffer from Medicare cuts That’s an argument that could be particularly persuasive to those approaching retirement—and Medicare eligibility. As one of the biggest recipients of federal tax dollars—the government spent $486 billion on Medicare in 2011, according to the Center on Budget and Policy Priorities—Medicare is vulnerable to cuts as part of any congressional effort to trim the budget deficit. Proposed changes to the program include raising the eligibility age and implementing more income-based pricing. The government could also decide to reimburse doctors even less for their services. As it stands, Medicare these days usually pays doctors only enough to meet their overhead—that is, to pay the rent, support staff and other expenses—with little left over for the doctors’ salary, said Jeffrey Milburn, a consultant in the Health Care Consulting Group of the Medical Group Management Association, a trade group for medical practice managers. Many concierge doctors accept Medicare, but they say they don’t rely on it to meet their costs. That’s a good position to be in, said Dr. Gary W. Dorshimer, who recently switched his practice at the University of Pennsylvania Health System over to a concierge system. The annual $2,500 fee he charges his patients will help offset any cuts in Medicare reimbursement, he noted. Penny DelGaudio, 69, a Medicare recipient and longtime patient of Dr. Dorshimer’s, decided to make the transition with him. “I don’t consider myself wealthy,” said DelGaudio, a real estate agent in Medford, N.J. But she and her husband decided the $5,000 annual cost for the two of them was worth it, for the increased access to the doctor, shorter wait times, and insulation from future health-care changes. Recently, some in the industry say, personalized-medicine patients have also been insulated from health-care inflation, at least when it comes to their annual retainer. Fees have been “incredibly stable,” according to the American Academy of Private Physicians, and the industry’s largest network, MDVIP, a unit of Procter & Gamble, has kept its fees essentially flat since 2007. (Patients’ insurance premiums, of course, have generally risen over the same period.) Spending more to buy face time Concierge practices rely on a simple equation: more money for the doctor equals more time for the patient. Many private doctors have rosters of as few as 300, compared with 2,000-plus in a traditional practice. While most boutique-medicine doctors say they’re open to more patients, experts say they’ll typically cap their practice at 500 or 600. Intraday Data provided by SIX Financial Information and subject to terms of use. Historical and current end-of-day data provided by SIX Financial Information. Intraday data delayed per exchange requirements. S&P/Dow Jones Indices (SM) from Dow Jones & Company, Inc. All quotes are in local exchange time. Real time last sale data provided by NASDAQ. More information on NASDAQ traded symbols and their current financial status. Intraday data delayed 15 minutes for Nasdaq, and 20 minutes for other exchanges. S&P/Dow Jones Indices (SM) from Dow Jones & Company, Inc. SEHK intraday data is provided by SIX Financial Information and is at least 60-minutes delayed. All quotes are in local exchange time. | High | [
0.6769230769230771,
33,
15.75
] |
[The results of the treatment of the cataract in children and youth treated in Ophthalmology Clinic in Poznań]. Cataract is a leading course of a treatable blindness and serious visual impairment in children. Treatment, especially in one-sided cataract is a challenge and it is connected with the risk of complications. The decision to perform a surgery in older children with already coexisting amblyopia is not easy to make. The aim of our study was to present the effects of the cataract treatment in children between 3 and 18 years old, in the Ophthalmology Clinic in Poznań. Between 2006 and 2008, the surgery was done in 36 children (42 eyes). The data of those patients, e.g. the type and location of the cataract, accompanying disorders and visual acuity reached, were analyzed. In this group of patient 60% of children reached visual acuity equal to 0.5, and 24% of them full visual acuity. The way to prepare the patient to the surgery, the way to calculate the power of the intraocular lens to be implanted and the surgery technique will be discussed. | High | [
0.6666666666666661,
34,
17
] |
Pepsi introduces the drink from the future – NEW Pepsi Black promises a bolder taste with no calorie Pepsi introduces the drink from the future – NEW Pepsi Black promises a bolder taste with no calorie • Consumers can now experience their favourite calorie free cola, guilt-free • The new drink promises to give the bold taste that Pepsi fans love Pepsi Black 320ml Pepsi, the world-renowned cola-flavoured beverage made to quench your thirst, announces a NEW cola. The new Pepsi promises to bring the future to Malaysians today by providing a zero-calorie product without compromising on the bold cola taste. This means that consumers can continue to enjoy their favourite cola brand Pepsi without having the guilt as they will be consuming a no calorie drink. This innovative product and exciting beverage of the future, which is now available at all retailers and outlets across the nation, is built on consumers’ changing sentiments towards the consumption of flavoured carbonated soft drinks. More consumers are becoming health conscious seeking for healthier beverage option but still look forward to the satisfaction derived from the bold taste of Pepsi. The new Pepsi checks all the boxes in that it will not compromise on taste at all and will maintain the exact flavour. Indeed, Pepsi wants all Malaysians to Drink the Future Now, the new campaign tagline coined to represent how Pepsi really is the taste from the future. “Advances in research and technology has allowed for the creation of an unparalleled recipe and formula that keeps Pepsi delicious, providing a future where consumers can experience great cola taste with no calorie,” said Santharuban T. Sundaram, Vice President of Marketing at Etika Sdn Bhd. Pepsi Black 400ml The new Pepsi has also received the Healthier Choice approval that is granted by the Malaysian Ministry of Health. The Healthier Choice Logo (HCL) allows for consumers to make informed choices and in particular the right food decisions. This is especially important as consumers need to be educated and facilitated in selecting healthier options of food and drinks. As part of the exciting new launch, Etika has erected a huge outdoor display that will alert Pepsi fans of the new Pepsi availability. Located on Wisma Damansara along Jalan Semantan, the outdoor display, attached with a countdown timer, will feature a descending chiller that will be lowered a few meters each day till 30 March 2018. The countdown timer and chiller will be visible and begin seven days before launch from 23 March onwards. In the chiller are bottles of Pepsi, made to signify how the highly anticipated, futuristic product variant will soon reach consumers in Malaysia. Once the countdown reaches zero, an exciting lineup of activities will take place at Wisma Damansara where consumers and Pepsi fans will be delighted with various fun and interactive games. There will also be ample opportunity to try out the new Pepsi and experience the true bold taste of cola as the drink from the future will be lowered alongside the chiller on the billboard. Consumers are encouraged to have the first of the product and join in the fun on 30 March. Consumers can find the new Pepsi in a variety of forms that include the can 320ml, the four-can pack (320ml), the PET bottle 400ml and PET bottle 1.5L. The product is available nationwide across major retailers, hypermarkets, supermarkets, convenience stores and provision shops. For more information and further updates on future Pepsi campaigns please visit: http://www.etikaholdings.com/our-brands Popular News Many of us heard about Makan Makan by Jibby before and it’s about their great food. But when you arrived at their restaurants, you will never know what they served until you are being seated with thei... | Mid | [
0.61504424778761,
34.75,
21.75
] |
Guidelines from the consumer: improving consumer involvement in research and training for persons with mental retardation. Consumer involvement of individuals with mental retardation in research and training was assessed. Twenty-two subjects with experience in research and/or training were interviewed to determine how professionals can encourage meaningful participation of persons with mental retardation in research and training activities. Results suggest that persons with mental retardation have participated in various roles in research and training but that there are many barriers to meaningful consumer involvement that have not been adequately addressed. Guidelines for professionals to foster meaningful consumer involvement in research and training activities were provided. | Mid | [
0.65137614678899,
35.5,
19
] |
igit of 2095? 5 What is the hundreds digit of 3891? 8 What is the ten thousands digit of 17150? 1 What is the hundreds digit of 9010? 0 What is the tens digit of 1098? 9 What is the thousands digit of 3705? 3 What is the hundreds digit of 306? 3 What is the hundreds digit of 69949? 9 What is the ten thousands digit of 11883? 1 What is the units digit of 68990? 0 What is the tens digit of 988? 8 What is the thousands digit of 3649? 3 What is the ten thousands digit of 64866? 6 What is the thousands digit of 5585? 5 What is the units digit of 189? 9 What is the hundreds digit of 9322? 3 What is the hundreds digit of 30327? 3 What is the hundreds digit of 2159? 1 What is the tens digit of 504? 0 What is the thousands digit of 4602? 4 What is the hundreds digit of 739? 7 What is the hundreds digit of 428? 4 What is the thousands digit of 1089? 1 What is the hundreds digit of 57721? 7 What is the tens digit of 17335? 3 What is the tens digit of 755? 5 What is the hundreds digit of 2790? 7 What is the ten thousands digit of 68499? 6 What is the thousands digit of 9570? 9 What is the ten thousands digit of 16933? 1 What is the units digit of 316? 6 What is the units digit of 4766? 6 What is the tens digit of 1408? 0 What is the hundreds digit of 1352? 3 What is the tens digit of 6405? 0 What is the units digit of 1583? 3 What is the ten thousands digit of 12756? 1 What is the ten thousands digit of 56246? 5 What is the units digit of 2152? 2 What is the hundreds digit of 3623? 6 What is the thousands digit of 6082? 6 What is the hundreds digit of 978? 9 What is the thousands digit of 4101? 4 What is the thousands digit of 18614? 8 What is the units digit of 2619? 9 What is the units digit of 37381? 1 What is the hundreds digit of 3385? 3 What is the hundred thousands digit of 135208? 1 What is the ten thousands digit of 32544? 3 What is the units digit of 21497? 7 What is the tens digit of 63? 6 What is the tens digit of 8765? 6 What is the tens digit of 350? 5 What is the tens digit of 2224? 2 What is the hundreds digit of 61085? 0 What is the hundreds digit of 4507? 5 What is the hundreds digit of 1934? 9 What is the thousands digit of 4900? 4 What is the units digit of 1916? 6 What is the tens digit of 3806? 0 What is the ten thousands digit of 13139? 1 What is the tens digit of 83405? 0 What is the tens digit of 59391? 9 What is the thousands digit of 3130? 3 What is the tens digit of 11571? 7 What is the thousands digit of 8598? 8 What is the tens digit of 261? 6 What is the thousands digit of 9456? 9 What is the tens digit of 1143? 4 What is the hundreds digit of 273? 2 What is the tens digit of 804? 0 What is the thousands digit of 14209? 4 What is the units digit of 468? 8 What is the tens digit of 2042? 4 What is the thousands digit of 1041? 1 What is the ten thousands digit of 24819? 2 What is the hundreds digit of 1203? 2 What is the units digit of 6053? 3 What is the hundreds digit of 296? 2 What is the units digit of 202? 2 What is the tens digit of 3153? 5 What is the tens digit of 3636? 3 What is the units digit of 8165? 5 What is the units digit of 97878? 8 What is the ten thousands digit of 16371? 1 What is the units digit of 409? 9 What is the tens digit of 21669? 6 What is the thousands digit of 3481? 3 What is the hundreds digit of 1254? 2 What is the ten thousands digit of 126294? 2 What is the ten thousands digit of 35096? 3 What is the tens digit of 129982? 8 What is the units digit of 55596? 6 What is the tens digit of 1077? 7 What is the thousands digit of 7932? 7 What is the tens digit of 8511? 1 What is the thousands digit of 5019? 5 What is the ten thousands digit of 12610? 1 What is the units digit of 36700? 0 What is the hundreds digit of 24678? 6 What is the hundreds digit of 28719? 7 What is the tens digit of 113874? 7 What is the thousands digit of 10704? 0 What is the thousands digit of 55562? 5 What is the tens digit of 342? 4 What is the units digit of 1223? 3 What is the thousands digit of 5302? 5 What is the tens digit of 135979? 7 What is the ten thousands digit of 18281? 1 What is the hundreds digit of 58839? 8 What is the thousands digit of 71677? 1 What is the thousands digit of 10775? 0 What is the tens digit of 6885? 8 What is the thousands digit of 1174? 1 What is the units digit of 1514? 4 What is the units digit of 9904? 4 What is the hundreds digit of 2410? 4 What is the tens digit of 6147? 4 What is the ten thousands digit of 49031? 4 What is the tens digit of 37089? 8 What is the units digit of 850? 0 What is the units digit of 50079? 9 What is the hundreds digit of 2930? 9 What is the thousands digit of 38918? 8 What is the tens digit of 642? 4 What is the thousands digit of 7753? 7 What is the units digit of 855? 5 What is the units digit of 134462? 2 What is the tens digit of 24481? 8 What is the hundreds digit of 15838? 8 What is the hundreds digit of 1959? 9 What is the tens digit of 3095? 9 What is the thousands digit of 1442? 1 What is the thousands digit of 1961? 1 What is the ten thousands digit of 138226? 3 What is the hundreds digit of 945? 9 What is the hundreds digit of 3988? 9 What is the hundreds digit of 35365? 3 What is the units digit of 1967? 7 What is the units digit of 1807? 7 What is the tens digit of 756? 5 What is the thousands digit of 57185? 7 What is the thousands digit of 2768? 2 What is the thousands digit of 14119? 4 What is the hundreds digit of 515? 5 What is the tens digit of 11855? 5 What is the tens digit of 3599? 9 What is the units digit of 1639? 9 What is the hundreds digit of 1224? 2 What is the thousands digit of 4049? 4 What is the ten thousands digit of 132552? 3 What is the hundreds digit of 22555? 5 What is the tens digit of 10? 1 What is the thousands digit of 68496? 8 What is the hundreds digit of 134659? 6 What is the tens digit of 137? 3 What is the hundreds digit of 5575? 5 What is the units digit of 1184? 4 What is the tens digit of 8139? 3 What is the units digit of 47513? 3 What is the units digit of 6612? 2 What is the tens digit of 1705? 0 What is the hundreds digit of 565? 5 What is the units digit of 69? 9 What is the thousands digit of 38203? 8 What is the tens digit of 501? 0 What is the units digit of 16103? 3 What is the hundreds digit of 38427? 4 What is the units digit of 4262? 2 What is the hundreds digit of 5376? 3 What is the thousands digit of 3040? 3 What is the tens digit of 65221? 2 What is the tens digit of 102895? 9 What is the tens digit of 134150? 5 What is the tens digit of 186? 8 What is the tens digit of 140731? 3 What is the hundreds digit of 26850? 8 What is the units digit of 4520? 0 What is the units digit of 22308? 8 What is the units digit of 976? 6 What is the hundreds digit of 686? 6 What is the tens digit of 7206? 0 What is the tens digit of 6733? 3 What is the hundreds digit of 3023? 0 What is the thousands digit of 23857? 3 What is the thousands digit of 3696? 3 What is the units digit of 1126? 6 What is the hundreds digit of 476? 4 What is the units digit of 24662? 2 What is the hundreds digit of 6074? 0 What is the tens digit of 53080? 8 What is the thousands digit of 7679? 7 What is the tens digit of 858? 5 What is the hundreds digit of 17782? 7 What is the tens digit of 102810? 1 What is the tens digit of 2061? 6 What is the tens digit of 14852? 5 What is the tens digit of 15674? 7 What is the tens digit of 11534? 3 What is the units digit of 7113? 3 What is the thousands digit of 1072? 1 What is the thousands digit of 1132? 1 What is the units digit of 1359? 9 What is the tens digit of 11912? 1 What is the hundreds digit of 9346? 3 What is the units digit of 244? 4 What is the tens digit of 23? 2 What is the tens digit of 937? 3 What is the hundreds digit of 63450? 4 What is the thousands digit of 16670? 6 What is the hundreds digit of 46930? 9 What is the units digit of 1228? 8 What is the hundreds digit of 68749? 7 What is the thousands digit of 8814? 8 What is the thousands digit of 1832? 1 What is the tens digit of 864? 6 What is the ten thousands digit of 72913? 7 What is the hundreds digit of 11315? 3 What is the units digit of 1716? 6 What is the units digit of 83461? 1 What is the tens digit of 399 | Mid | [
0.542190305206463,
37.75,
31.875
] |
Testicular torsion in a 68-year-old man. Testicular torsion is a rare, yet often underrecognized, cause of scrotal pain in adult men. Few reports have commented on testicular torsion in the geriatric population. We report a case of a 68-year-old man initially diagnosed with epididymo-orchitis, who, on surgical exploration, was found to have intravaginal testicular torsion. The diagnosis in this patient population is often delayed, leading to poor salvage rates. The use of color Doppler ultrasonography should be strongly considered if the history and physical examination is suggestive of testicular torsion, regardless of patient age. | High | [
0.6914285714285711,
30.25,
13.5
] |
62516 - -107061. What is the thousands digit of u? 4 Suppose q - 38*q + 340844 = 0. What is the thousands digit of q? 9 Let f = 219 - 207. What is the tens digit of f/(-36) + (-23)/3*-65? 9 Suppose -29*r + 30*r = 2. Suppose 5*a - 4*a = -p + 418, -r*a = 5*p - 2084. What is the hundreds digit of p? 4 Let o(m) = -m**3 + 62*m**2 - 59*m - 603. What is the hundreds digit of o(49)? 7 What is the units digit of 6/2 + 256/3968 + (-3669652)/(-62)? 1 Let c(l) = 101*l**2 - l + 1. Let n be c(1). Suppose -v + 13 = -0*v. Suppose -f + n = v. What is the units digit of f? 8 Suppose -4*q = -12, 5*q + 358 = 4*b - 315. What is the hundreds digit of b + 2 - (-10 - -12)? 1 Suppose -101*c + 66*c - 1322080 = -67*c. What is the tens digit of c? 1 Let s = -745 + 89. Let i = -250 - s. What is the tens digit of i? 0 Suppose 0 = k - 5*n - 4066, -2922 = 2*k - 2*n - 11078. What is the thousands digit of k? 4 Let l = -15709 + 24625. What is the thousands digit of l? 8 Let v(k) = 23*k**3 + k + 2. Let o be v(-2). Let j = 264 + -293. Let x = j - o. What is the hundreds digit of x? 1 Suppose -11*b - 19*b - 240 = 0. Let w be (-7)/((-14)/(-4)) - -11. What is the units digit of ((-4)/w)/(b/(-120))*-6? 0 Let h(b) = -7*b**2 + 42*b**3 - 6 + 0*b**2 + 9*b**2 - 4*b**2 + b. Let n be h(2). Let u = -178 + n. What is the hundreds digit of u? 1 Let l(t) = -19*t - 50. Let m be l(-4). Suppose 0 = -s + 2, -4*y + 2*y - 5*s = -m. What is the units digit of 27/(28/y - 3)? 4 Let a(b) be the second derivative of 47*b**3/6 - 3*b**2 + 13*b. Let t be a(7). What is the tens digit of t/4 + (11 - 5)/24? 8 Suppose 0 = -196*s + 192*s + 3980. Let i = s + -774. What is the units digit of i? 1 Let a(l) = 20*l**2 + l + 4. Let d be a(6). Suppose -5*t + 2*t - d = -s, -240 = t - s. What is the hundreds digit of 14/28 - t/2? 1 Let y(k) = 3*k + 11965. What is the tens digit of y(0)? 6 Suppose 4*g - 267 = g. Let m = g - 164. What is the tens digit of (m*60/54)/((-2)/6)? 5 Suppose 69 = -13*c - 9. Let f(w) = -15*w**2 - 20*w - 15. Let i(j) = 8*j**2 + 10*j + 8. Let b(k) = -4*f(k) - 7*i(k). What is the tens digit of b(c)? 8 Let k(h) = -168*h - 1214. What is the thousands digit of k(-44)? 6 Suppose 2*h = 3*x - 3*h + 89, 3*x - h + 85 = 0. Let a = x - -35. What is the units digit of ((-14)/(-8))/(a/28)? 7 Suppose -5*l + 48 = 5*c - 7, 0 = c. Suppose l + 5 = 4*w, 4*r = 4*w + 4492. What is the tens digit of r? 2 Let m = -8040 - -21763. What is the thousands digit of m? 3 Let p = 46 - 44. Suppose -y = 3*a - 4, 2*y + p*y = -4*a. Suppose -a*o + 7 = 5. What is the units digit of o? 1 Suppose 19*o = 10*o + 6390. Let k = o - 399. What is the tens digit of k? 1 Let x(q) = 7*q**2 - 7*q + 34. Suppose -y - w = -6, 4*y - 18 = 4*w - 2. What is the tens digit of x(y)? 7 What is the units digit of 3/(9/(-48)) + 910? 4 Suppose 22*k - 21*k + 10 = 0. Let t be (-9)/(-12) + k/(-8). What is the units digit of (17/(306/24))/(t/51)? 4 Suppose 24*a - 57795 = 54334 + 228095. What is the units digit of a? 6 Suppose d - 5*d - 522 = -5*k, 2 = d. Let o = k + 63. What is the hundreds digit of o? 1 Let z(k) = 3*k**3 + k**2 - 5*k + 8. Suppose -2*s + 27 = -3*b, 3*s + 5*b = 3*b + 8. What is the units digit of z(s)? 2 Let d = 15615 + 34093. What is the hundreds digit of d? 7 Suppose 4*i + 9443 + 26929 = 4*a, -36388 = -4*a - 4*i. Suppose a + 43221 = 44*d. What is the hundreds digit of d? 1 Suppose 6580*h - 35260 = 6560*h. What is the units digit of h? 3 Suppose -5*c + 90252 = 3*m, 5*c + 35283 = -2*m + 125536. What is the tens digit of c? 5 Let n = -23526 - -33223. What is the thousands digit of n? 9 Suppose -5*y = 1 - 16. Suppose y*j - 197 = 4*i, 5*j - j - 226 = -2*i. Let b = -30 + j. What is the units digit of b? 9 What is the thousands digit of ((14 - -9) + -22)/(1/42756)? 2 Suppose w - 6777 = -5*d, 5*w - 2*d - 9246 = 24774. What is the thousands digit of w? 6 Suppose 0 = p + 4*k - 55, 2*p + 0*k = -k + 75. Let v be 7*10/p + 238/2. Suppose -7*x + 96 = -v. What is the tens digit of x? 3 Let z be 660/(-80)*(-32)/(-3). Let u be (3/(-3))/((-1)/(-5)). What is the tens digit of (u/(-10))/((-2)/z)? 2 Let t be 3 + (-92)/28 - 268/(-7). Let p = 42 - t. Suppose -4*x = x + 3*s - 1071, -s = p*x - 854. What is the units digit of x? 3 Let m be 12*((-2)/3)/((-16)/(-54)). Let o = m + 62. What is the units digit of o? 5 Let n be 12*-9*((-69)/(-18) + -4). What is the units digit of 12/n*3*(-1822)/(-4)? 1 Suppose 11073 - 25765 = -4*k. What is the thousands digit of k? 3 Suppose 4*b - 12 = 0, 0 = 5*s + 25*b - 24*b - 6803. Suppose -16*m - m + s = 0. What is the tens digit of m? 8 Let d = 153 - 148. Suppose 2663 - 572 = d*p - 4*n, -5*n = -4*p + 1671. What is the units digit of p? 9 Suppose 3*r = -0 + 6. Let o be -9*13/(819/(-14)). Suppose -r*b = 4*w - 6 - 140, o*w - 235 = -3*b. What is the tens digit of b? 8 Let s(p) = -6*p**3 - 586*p**2 + 115*p + 126. What is the units digit of s(-98)? 4 Let d = 1280 + 414. What is the units digit of (990/275)/(1 + d/(-1700))? 0 Let p(z) = z**3 - 11*z**2 - 12*z + 12. Let t(i) = -i**3 - 23*i**2 - i - 14. Let v be t(-23). Let w be p(v). Let s = -125 - w. What is the units digit of s? 3 Let i = -1413 + 693. Let k = i - -1048. Suppose 0 = 2*g + 4*t - 216, -k = -3*g + 2*t + 12. What is the units digit of g? 2 Suppose -228*s + 57805263 - 5712303 = 428*s. What is the ten thousands digit of s? 7 Suppose w - 42456 = -14*w + 417144. What is the thousands digit of w? 0 Let z = -106 - -134. What is the tens digit of (105/z)/15 - (-1086)/8? 3 Let n(j) = 6*j**2 + 9*j**2 - 36*j - 30*j + 60*j - 2. What is the units digit of n(-5)? 3 Let n(y) = -3*y**3 - 5*y**2 + 7*y + 13. Let s be n(-4). Suppose 93*z = s*z - 3792. What is the units digit of z? 8 What is the units digit of (-10)/40 - (-43834)/8? 9 Let d(v) = -v**3 - 3*v**2 + 3*v + 685. Suppose 0 = -6*w + 22*w. What is the units digit of d(w)? 5 What is the hundreds digit of 8/(-24)*(-3 + (-448590)/10)? 9 Let d(s) = -s**3 + 86*s**2 - 97*s + 237. What is the units digit of d(82)? 9 Let k(b) be the first derivative of -2*b**3/3 + 67*b**2/2 - 103*b + 151. What is the hundreds digit of k(30)? 1 Let o(r) = -8*r**2 - r + 39. What is the units digit of o(0)? 9 Suppose j - 35 = -t - 2, -3*j = -9. Suppose 480 = t*u - 24*u. What is the units digit of u? 0 Let l = -112 + 114. What is the hundreds digit of 752/l - (-27 - -25)? 3 Let g = -28984 - -57581. What is the hundreds digit of g? 5 What is the hundreds digit of ((-1003086)/(-16))/7 + -1 - 12/96? 9 Suppose -a - 3*b = 1, a + 0*b - 5*b + 1 = 0. What is the units digit of 344/(-16)*(2/a - 12)? 1 Let w be 13/(65/(-10))*(-1 + -1). Suppose -w*f = -f + 501. Let t = -93 - f. What is the tens digit of t? 7 Let l be 3/(-2) - (-77)/22. Let r(m) = -123*m + 4. Let d be r(l). Let b = 378 + d. What is the units digit of b? 6 Let h = -22571 + 64073. What is the ten thousands digit of h? 4 Let p = -5330 - -17298. What is the thousands digit of p? 1 Let u be (0 + -1)/(-2 - -6 - 5). Suppose 5*n + 10 = a + u, 3*n + 4 = 2*a. What is the tens digit of (1 - a) + (48 - 1 - 6)? 4 Let k(w) = w**3 + 7*w**2 + 6*w + 6. Let y be k(-6). Let u be 2 + y*(-4)/6. What is the units digit of (11 + -10)*29/(-2)*u? 9 Suppose -4*j = 4*d - 32536, 70*j - 65*j - 24394 = -3*d. What is the thousands digit of d? 8 Let d(m) be the first derivative of -m**4/4 + 5*m**3/3 - 3*m**2/2 + 6*m + 1768. Let f be (-3)/((-1)/(4/3)). What is the units digit of d(f)? 0 Suppose -4*f - u + 7 = -3*f, u = -3*f + 13. Suppose f = 10*q - 17. Suppose 3*i + 0*s - 22 = -2*s, -17 = -q*i + s. What is the units digit of i? 8 Let g = 257 - 254. Suppose -2*v - 3*c - 732 = -2365, -g*c - 2427 = -3*v. What is the units digit of v? 2 Let g(j) = -102*j**3 - 12*j**2 + 11*j + 6. What is the units digit of g(-4)? 8 Let a be 11/(77/(-126))*-39. What is the hundreds digit of -3 - a/(-3) - (-8)/(-4)? 2 Let u(l) = -l**3 - l**2 + l + 3702. Let w be u(0). Let c = 6549 - w. Suppose 0 = -8*i - 5*i + c. What is the hundreds digit of i? 2 Suppose 4*h = -5*p - 3493, 18*p - 22*p - 876 = h. Let n = 131 - h. What is the tens digit of n? 0 Let s = -36 + 45. Let n = 16 + s. What is the tens digit of 14/8*(n + -9)? 2 Suppose 528*b = 584*b - 500360. What is the units digit of b? 5 Let q(k) = 3*k**3 - 22*k**2 + 7*k - 2. Let x be q(7). What is the hundreds digit of 209 - | Low | [
0.5085227272727271,
22.375,
21.625
] |
Vamos imaginar que os olhos de José Mourinho nunca tinham tocado no futebol simples-que-não-é-assim-tão-simples do Barcelona. E, já agora, que a TV e a Internet faziam gazeta. O treinador não conhecia, por isso, aquela cultura do toque, a arte da geometria no ataque aos espaços, os terrenos baldios e os planos de contingência. Continuando pela mesma estrada, vamos acreditar que o treinador português já tinha esquecido aquele episódio, no primeiro jogo pelo Benfica, em que alguém lhe entregou o relatório do Boavista com apenas 10 jogadores titulares. Faltava só o Platini da Bolívia. Ou Erwin Sánchez. Estamos em 2006, a meio da segunda época do português nos blues, com uma Premier League no bolso. O Chelsea acabou o Grupo G da Liga dos Campeões no segundo lugar, atrás do Liverpool de Rafa Benítez, e teve de se conformar com a inevitabilidade de jogar contra um robusto tubarão. Tocou-lhe o Barcelona de Frank Rijkaard e Mourinho pediu ao jovem André Villas-Boas um documento no qual destaparia todos os segredos da maquinaria blaugrana. Esse documento foi despejado na internet na segunda-feira. João Nuno Fonseca, treinador de 29 anos, com passagens na Académica, Aspire e Nantes, teve acesso a esse relatório muito antes disso, quando estava na faculdade. “Na altura falava-se de como poderia ser o trabalho de bastidores, mas era bastante difícil perceber o que o AVB efetivamente produzia para ajudar no sucesso de Mourinho”, começa a contar à Tribuna Expresso. “Não tenho dúvidas que inspirou muitos jovens, como foi o meu caso, em ver na análise de jogo uma maneira de entender as dinâmicas do jogo e, mais importante de tudo, como interpretá-lo e aplicá-lo em treino. Começou a ser um relatório-referência." 1 / 4 2 / 4 3 / 4 4 / 4 Vamos lá ao osso. O desenho revelava um 4-3-3. Nesta temporada (2005/06), o Barça estaria mais agressivo na saída rápida para o ataque depois de conquistar a bola, deixando cair aquela fé cega na posse de bola paciente. Nessa fase da vertigem, procuram o passe vertical para dois rapazes que não jogavam nada mal. “Dependem muito da criatividade Messi e Ronaldinho”, alertava então AVB, que aparentava estar muito preocupado com os movimentos interiores do brasileiro, que abriam um túnel imenso de oportunidades para as subidas de Gio van Bronckhorst. “Este momento pode ser parado com faltas”. “Erram muito na primeira fase de construção”, continua AVB. Ou seja, a tal geometria artística e a qualidade de receção-passe deixavam a desejar, segundo o observador de Mou, na hora de esboçar uma jogada desde trás. A isso juntar-se-ia o impecável relvado de Stamford Bridge (sim, isto é irónico), que também mereceu uma nota naquele documento. Deco é chave na saída limpinha com passes curtos. A subida dos laterais, que depois revelam problemas a fechar (deixam muito espaço para o corredor central), expõe a linha defensiva, isolando os centrais. O erro espreita a cada esquina. “Oleguer e Edmilson podem ser os alvos ideais para uma pressão alta”, informa Villas-Boas, como quem sente o sangue a quilómetros de distância. Darren Walsh/Getty Images Sem bola, AVB tira o chapéu ao instinto e leitura de Samuel Eto’o e de Deco, que sabiam quando e como pressionar, detectando a hesitação alheia. “Quando Deco e van Bommel pressionam forte no meio-campo é difícil evitar”, aponta ainda, sugerindo uma posse de bola rápida. Ou seja, mais vertical e menos mastigada, apostando até em situações 2x1 contra Edmilson, o brasileiro que não impressionava nadinha André Villas-Boas. É aqui, quando a teia estica, que é o “momento ideal para matá-los”. Enfim, é um senhor manual de instruções, que ainda especifica como é que os culés se comportam nas bolas paradas defensivas e ofensivas. Outra vez Este não é o primeiro relatório de AVB para Mourinho que salta para as páginas dos jornais e redes sociais. Há muitos anos já tinha sido partilhado um outro, igualmente detalhado, sobre o Newcastle United. O que querem os treinadores nestes relatórios? “Depende muito do caráter de cada um”, continua João Nuno Fonseca. “Tu podes observar um adversário para perceber o que queres evitar que ele te faça ou então podes observar para saberes de que forma é que te queres impor. E é neste ponto que o caráter do treinador se revela e que o leva a desenvolver uma determinada identidade como equipa. Não tenho dúvidas que, ao longo dos últimos 10, 15 anos, a maneira de se produzir relatórios de observação e análise foi sendo alterada, noutros países e contextos, muito pelo sucesso que o José Mourinho teve e pela evolução de carreira do AVB, de analista para treinador. Vais a Inglaterra e já não analisam um adversário com base em dados estatísticos como acontecia há uns anos. Depende sempre de quem lidera o processo. As estatísticas são como os professores sem conhecimento: ensinam tudo menos o mais importante. Mostram mas não demonstram.” Nuno Botelho Para quem ainda não juntou as peças do puzzle, esta é a tal jogatana entre Chelsea e Barcelona que aqueceu e até meteu cultura pelo meio. “Vocês sabem perfeitamente o que é teatro e do bom. É de qualidade”, diria Mourinho na conferência de imprensa. Lionel Messi, um garoto de 18 anos, com o mundo suspenso na ponta da bota esquerda, ameaçava ser o que acabou por ser: um génio. E os génios, já sabemos, às vezes têm problemas com os defesas. Asier del Horno deu-lhe as boas-vindas ao futebol de elite e beijou o joelho do argentino com os dentes da bota. O defesa espanhol até se livrou do vermelho, mas estavam destinados a olharem-se nos olhos: Messi voltou a enganar Asier e também Robben, perto da bandeirola de canto, e o lateral perdeu a paciência. Apesar de a entrada ter sido imprudente, ficou a anos-luz da tal primeira patada: vermelho direto. AVB não deixou de assinalar no relatório que esta era uma equipa que procurava faltas e que já sacara aos rivais 11 penáltis e quatro vermelhos. Mas, afinal, o que dizia o relatório de AVB sobre Messi? “É muito diferente de Giuly”, escrevia relacionando com a eliminatória da época passada, dos “oitavos”, em que os blues bateram o Barça. “O ano passado, o Giuly dava mais largura e profundidade. Messi é o oposto. Tem liberdade total e até acaba no lado oposto a criar situações 2x1 com o Ronaldinho. Ele quer receber a bola quanto antes, ligando fases de jogo através da condução (principalmente a ir para dentro com o pé esquerdo). Traz criatividade e risco para o jogo.” Mike Hewitt/Getty Images Na secção da avaliação individual, AVB resume: “Qualidade + velocidade mas demasiado esquerdino. Exatamente os mesmos comportamentos do Ronaldinho. Entre linhas ou diagonais. Encoraja a equipa a avançar com a condução. Incrível 1x1”. A repetição Quantos jogos são necessários para um observador ficar confortável com o rival? “Normalmente, entre três e cinco jogos, para poderes dizer que é provável que o adversário se vai comportar desta maneira. Há que ter também consciência de aceitar a complexidade que está inerente ao jogo. Ou seja, ser consciente de que, como treinador, não vais ter uma solução para todas as situações.” E é este o tipo de informações standard? Fonseca diz que depende do treinador. “Tens treinadores que querem tudo explicado em relatório com imagens, ilustrações e texto. Outros consideram suficiente ter apenas vídeo ilustrado e pontos-chave. Acima de tudo, hoje em dia, utiliza-se cada vez mais imagens reais do adversário, seja vídeo ou fotografia, do que esquemas como os que vês no relatório do AVB.” ADRIAN DENNIS/GETTY IMAGES O Chelsea até começou a ganhar. Depois de uma bola longa milimétrica de Frank Lampard, Duff ganhou as costas da defesa catalã e cruzou para área, onde Thiago Motta encostou para a própria baliza. John Terry, com mais um golo na própria, deixou tudo igual aos 72'. Quando faltavam 10 minutos para o apito final, o Barça inventou uma transição rápida implacável: Larsson tocou para Ronaldinho, que acelerou, deixou Makélélé para trás e devolveu a Larsson, que aproveitava o espaço aberto pela diagonal de Eto’o; o sueco tocou para trás, em Rafael Márquez, que sacou um grande cruzamento com a canhota para a cabeça de Eto’o: 2-1. Demorou apenas 17 segundos. Os londrinos acabariam eliminados. Podemos voltar só mais uma vez ao relatório de AVB? Só uma linha: “Em transição [ofensiva], eles agora querem matar o adversário rapidamente.” Et voilà. Mas, lá está, o futebol é tudo menos ciência exata e repetição da imaginação. “O importante é que se perceba efectivamente o que se quer demonstrar [num relatório], porque no final tudo é dinâmico e praticamente imprevisível”, conclui Fonseca. | Mid | [
0.6404199475065611,
30.5,
17.125
] |
import { remote, app } from "electron"; import * as path from "path"; const _app = app || remote.app; export const CONSTANTS = { IMAGE_PATH: path.join(__dirname, "../../images/windows95.img"), IMAGE_DEFAULT_SIZE: 1073741824, // 1GB DEFAULT_STATE_PATH: path.join(__dirname, "../../images/default-state.bin"), STATE_PATH: path.join(_app.getPath("userData"), "state-v2.bin"), }; export const IPC_COMMANDS = { TOGGLE_INFO: "TOGGLE_INFO", SHOW_DISK_IMAGE: "SHOW_DISK_IMAGE", ZOOM_IN: "ZOOM_IN", ZOOM_OUT: "ZOOM_OUT", ZOOM_RESET: "ZOOM_RESET", // Machine instructions MACHINE_START: "MACHINE_START", MACHINE_RESTART: "MACHINE_RESTART", MACHINE_STOP: "MACHINE_STOP", MACHINE_RESET: "MACHINE_RESET", MACHINE_ALT_F4: "MACHINE_ALT_F4", MACHINE_ESC: "MACHINE_ESC", MACHINE_ALT_ENTER: "MACHINE_ALT_ENTER", MACHINE_CTRL_ALT_DEL: "MACHINE_CTRL_ALT_DEL", // Machine events MACHINE_STARTED: "MACHINE_STARTED", MACHINE_STOPPED: "MACHINE_STOPPED", }; | Mid | [
0.6343434343434341,
39.25,
22.625
] |
Essence of All Religions God's plan for us was not just endowing us with a comfortable material life. Then we would only be well fed, well clothed, well housed, academically-degreed animals capable only of functioning upon the animal level. What is it that distinguishes human beings? The ability to be compassionate, the ability to feel for the joys and sufferings of others, the ability to wish to ameliorate the sorrows and troubles of others. Animals, instinct bound, are able to live for themselves. Human beings are the unique creatures, the unique animal in God's creation, who can think of others, who can try to live for others. Living for oneself every bird and beast can do. If, while you live for yourself, you also start living for others, wanting to make others happy, then you become human, because this is the essence of humanness. Understanding that what is unpleasant and painful to you is unpleasant and painful to others also, live in such a way that you do not give such experience to others. Knowing also that those things which give you joy and happiness, must similarly give joy and happiness to others, engage yourself in doing such things that bring about these similar experiences to others. What is religion but fulfilling the will of God in our daily lives as it has been expressed in the wisdom teachings of all the great scriptures of the world, as it has been expressed in the lives of all the saints, sages, seers, messiahs, prophets and messengers which He has been sending from time to time to remind us of His will. Fulfilling the will of God in our daily lives is the soul of religion. Otherwise, if religion is a thing to be confined to some time of the week in some place in our city and no more than that, then our world has no hope of any improvement. It is only when true religion fills us from the top of our heads to the tip of our toe nails and becomes part and parcel of the living of our lives, then alone this world can be a place where to live would be a joy, to live would be to love. | Mid | [
0.605633802816901,
32.25,
21
] |
Electromuscular incapacitation results from stimulation of spinal reflexes. Electronic stun devices (ESD) often used in law enforcement, military action or self defense can induce total body uncoordinated muscular activity, also known as electromuscular incapacitation (EMI). During EMI the subject is unable to perform purposeful or coordinated movements. The mechanism of EMI induction has not been reported, but has been generally thought to be direct muscle and nerve excitation from the fields generated by ESDs. To determine the neuromuscular mechanisms linking ESD to induction of EMI, we investigated EMI responses using an anesthetized pig model. We found that EMI responses to ESD application can best be simulated by simultaneous stimulation of motor and sensory peripheral nerves. We also found that application of local anesthetics limited the response of ESD to local muscle stimulation and abolished the total body EMI response. Stimulation of the pure sensory peripheral nerves or nerves that are primarily motor nerves induced muscle responses that are consistent with well defined spinal reflexes. These findings suggest that the mechanism of ESD-induced EMI is mediated by excitation of multiple simultaneous spinal reflexes. Although direct motor-neuron stimulation in the region of ESD contact may significantly add to motor reactions from ESD stimulation, multiple spinal reflexes appear to be a major, and probably the dominant mechanism in observed motor response. | Mid | [
0.649484536082474,
31.5,
17
] |
Q: Oracle Group By Issue I am strugling with what seems an easy problem to tackle (at least for me in MySQL / SqlServer!) I'll simplify the problem. Let's say I have the following table: Table VOTE ID ID_IDEA DATE_VOTE with ID_IDEA FK(IDEA.ID) 1 3 10/10/10 2 0 09/09/10 3 3 08/08/10 4 3 11/11/10 5 0 06/06/10 6 1 05/05/10 I'm trying to find the latest votes given for each individual idea, meaning I want to return only rows with ID 4, 2 and 6. It seems with Oracle that you can't use GROUP BY without using a function like SUM(), AVG, etc. I'm a bit confused about how it's supposed to work. Please advise, Thanks. A: SELECT id, id_idea, date_vote FROM (SELECT id, id_idea, date_vote, Row_number() over (PARTITION BY id_idea ORDER BY date_vote DESC NULLS LAST) AS rn FROM VOTE) AS t WHERE rn = 1 | High | [
0.681404421326397,
32.75,
15.3125
] |
/* * EFI GPT partition parsing code * * Copyright (C) 2009 Karel Zak <[email protected]> * * This file may be redistributed under the terms of the * GNU Lesser General Public License. * * This code is not copy & past from any other implementation. * * For more information about GPT start your study at: * http://en.wikipedia.org/wiki/GUID_Partition_Table * http://technet.microsoft.com/en-us/library/cc739412(WS.10).aspx */ #include <stdio.h> #include <string.h> #include <stdlib.h> #include <stdint.h> #include <stddef.h> #include <limits.h> #include "partitions.h" #include "crc32.h" #define GPT_PRIMARY_LBA 1 /* Signature - “EFI PART” */ #define GPT_HEADER_SIGNATURE 0x5452415020494645ULL #define GPT_HEADER_SIGNATURE_STR "EFI PART" /* basic types */ typedef uint16_t efi_char16_t; /* UUID */ typedef struct { uint32_t time_low; uint16_t time_mid; uint16_t time_hi_and_version; uint8_t clock_seq_hi; uint8_t clock_seq_low; uint8_t node[6]; } efi_guid_t; #define GPT_UNUSED_ENTRY_GUID \ ((efi_guid_t) { 0x00000000, 0x0000, 0x0000, 0x00, 0x00, \ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }}) struct gpt_header { uint64_t signature; /* "EFI PART" */ uint32_t revision; uint32_t header_size; /* usually 92 bytes */ uint32_t header_crc32; /* checksum of header with this * field zeroed during calculation */ uint32_t reserved1; uint64_t my_lba; /* location of this header copy */ uint64_t alternate_lba; /* location of the other header copy */ uint64_t first_usable_lba; /* lirst usable LBA for partitions */ uint64_t last_usable_lba; /* last usable LBA for partitions */ efi_guid_t disk_guid; /* disk UUID */ uint64_t partition_entries_lba; /* always 2 in primary header copy */ uint32_t num_partition_entries; uint32_t sizeof_partition_entry; uint32_t partition_entry_array_crc32; /* * The rest of the block is reserved by UEFI and must be zero. EFI * standard handles this by: * * uint8_t reserved2[ BLKSSZGET - 92 ]; * * This definition is useless in practice. It is necessary to read * whole block from the device rather than sizeof(struct gpt_header) * only. */ } __attribute__ ((packed)); /*** not used struct gpt_entry_attributes { uint64_t required_to_function:1; uint64_t reserved:47; uint64_t type_guid_specific:16; } __attribute__ ((packed)); ***/ struct gpt_entry { efi_guid_t partition_type_guid; /* type UUID */ efi_guid_t unique_partition_guid; /* partition UUID */ uint64_t starting_lba; uint64_t ending_lba; /*struct gpt_entry_attributes attributes;*/ uint64_t attributes; efi_char16_t partition_name[72 / sizeof(efi_char16_t)]; /* UTF-16LE string*/ } __attribute__ ((packed)); /* * EFI uses crc32 with ~0 seed and xor's with ~0 at the end. */ static inline uint32_t count_crc32(const unsigned char *buf, size_t len) { return (crc32(~0L, buf, len) ^ ~0L); } static inline unsigned char *get_lba_buffer(blkid_probe pr, uint64_t lba, size_t bytes) { return blkid_probe_get_buffer(pr, blkid_probe_get_sectorsize(pr) * lba, bytes); } static inline int guidcmp(efi_guid_t left, efi_guid_t right) { return memcmp(&left, &right, sizeof (efi_guid_t)); } /* * UUID is traditionally 16 byte big-endian array, except Intel EFI * specification where the UUID is a structure of little-endian fields. */ static void swap_efi_guid(efi_guid_t *uid) { uid->time_low = swab32(uid->time_low); uid->time_mid = swab16(uid->time_mid); uid->time_hi_and_version = swab16(uid->time_hi_and_version); } static int last_lba(blkid_probe pr, uint64_t *lba) { blkid_loff_t sz = blkid_probe_get_size(pr); unsigned int ssz = blkid_probe_get_sectorsize(pr); if (sz < ssz) return -1; *lba = (sz / ssz) - 1ULL; return 0; } /* * Protective (legacy) MBR. * * This MBR contains standard DOS partition table with a single partition, type * of 0xEE. The partition usually encompassing the entire GPT drive - or 2TiB * for large disks. * * Note that Apple uses GPT/MBR hybrid disks, where the DOS partition table is * synchronized with GPT. This synchronization has many restriction of course * (due DOS PT limitations). * * Note that the PMBR detection is optional (enabled by default) and could be * disabled by BLKID_PARTS_FOPCE_GPT flag (see also blkid_paertitions_set_flags()). */ static int is_pmbr_valid(blkid_probe pr, int *has) { int flags = blkid_partitions_get_flags(pr); unsigned char *data; struct dos_partition *p; int i; if (has) *has = 0; if (flags & BLKID_PARTS_FORCE_GPT) goto ok; /* skip PMBR check */ data = blkid_probe_get_sector(pr, 0); if (!data) { if (errno) return -errno; goto failed; } if (!mbr_is_valid_magic(data)) goto failed; for (i = 0, p = mbr_get_partition(data, 0); i < 4; i++, p++) { if (p->sys_ind == MBR_GPT_PARTITION) goto ok; } failed: return 0; ok: if (has) *has = 1; return 1; } /* * Reads GPT header to @hdr and returns a pointer to @hdr or NULL in case of * error. The function also returns GPT entries in @ents. * * Note, this function does not allocate any memory. The GPT header has fixed * size so we use stack, and @ents returns memory from libblkid buffer (so the * next blkid_probe_get_buffer() will overwrite this buffer). * * This function checks validity of header and entries array. A corrupted * header is not returned. */ static struct gpt_header *get_gpt_header( blkid_probe pr, struct gpt_header *hdr, struct gpt_entry **ents, uint64_t lba, uint64_t lastlba) { struct gpt_header *h; uint32_t crc, orgcrc; uint64_t lu, fu; size_t esz; uint32_t hsz, ssz; ssz = blkid_probe_get_sectorsize(pr); /* whole sector is allocated for GPT header */ h = (struct gpt_header *) get_lba_buffer(pr, lba, ssz); if (!h) return NULL; if (le64_to_cpu(h->signature) != GPT_HEADER_SIGNATURE) return NULL; hsz = le32_to_cpu(h->header_size); /* EFI: The HeaderSize must be greater than 92 and must be less * than or equal to the logical block size. */ if (hsz > ssz || hsz < sizeof(*h)) return NULL; /* Header has to be verified when header_crc32 is zero */ orgcrc = h->header_crc32; h->header_crc32 = 0; crc = count_crc32((unsigned char *) h, hsz); h->header_crc32 = orgcrc; if (crc != le32_to_cpu(orgcrc)) { DBG(LOWPROBE, ul_debug("GPT header corrupted")); return NULL; } /* Valid header has to be at MyLBA */ if (le64_to_cpu(h->my_lba) != lba) { DBG(LOWPROBE, ul_debug( "GPT->MyLBA mismatch with real position")); return NULL; } fu = le64_to_cpu(h->first_usable_lba); lu = le64_to_cpu(h->last_usable_lba); /* Check if First and Last usable LBA makes sense */ if (lu < fu || fu > lastlba || lu > lastlba) { DBG(LOWPROBE, ul_debug( "GPT->{First,Last}UsableLBA out of range")); return NULL; } /* The header has to be outside usable range */ if (fu < lba && lba < lu) { DBG(LOWPROBE, ul_debug("GPT header is inside usable area")); return NULL; } if (le32_to_cpu(h->num_partition_entries) == 0 || le32_to_cpu(h->sizeof_partition_entry) == 0 || ULONG_MAX / le32_to_cpu(h->num_partition_entries) < le32_to_cpu(h->sizeof_partition_entry)) { DBG(LOWPROBE, ul_debug("GPT entries undefined")); return NULL; } /* Size of blocks with GPT entries */ esz = le32_to_cpu(h->num_partition_entries) * le32_to_cpu(h->sizeof_partition_entry); /* The header seems valid, save it * (we don't care about zeros in hdr->reserved2 area) */ memcpy(hdr, h, sizeof(*h)); h = hdr; /* Read GPT entries */ *ents = (struct gpt_entry *) get_lba_buffer(pr, le64_to_cpu(h->partition_entries_lba), esz); if (!*ents) { DBG(LOWPROBE, ul_debug("GPT entries unreadable")); return NULL; } /* Validate entries */ crc = count_crc32((unsigned char *) *ents, esz); if (crc != le32_to_cpu(h->partition_entry_array_crc32)) { DBG(LOWPROBE, ul_debug("GPT entries corrupted")); return NULL; } return h; } static int probe_gpt_pt(blkid_probe pr, const struct blkid_idmag *mag __attribute__((__unused__))) { uint64_t lastlba = 0, lba; struct gpt_header hdr, *h; struct gpt_entry *e; blkid_parttable tab = NULL; blkid_partlist ls; uint64_t fu, lu; uint32_t ssf, i; efi_guid_t guid; int ret; if (last_lba(pr, &lastlba)) goto nothing; ret = is_pmbr_valid(pr, NULL); if (ret < 0) return ret; else if (ret == 0) goto nothing; errno = 0; h = get_gpt_header(pr, &hdr, &e, (lba = GPT_PRIMARY_LBA), lastlba); if (!h && !errno) h = get_gpt_header(pr, &hdr, &e, (lba = lastlba), lastlba); if (!h) { if (errno) return -errno; goto nothing; } blkid_probe_use_wiper(pr, lba * blkid_probe_get_size(pr), 8); if (blkid_probe_set_magic(pr, blkid_probe_get_sectorsize(pr) * lba, sizeof(GPT_HEADER_SIGNATURE_STR) - 1, (unsigned char *) GPT_HEADER_SIGNATURE_STR)) goto err; guid = h->disk_guid; swap_efi_guid(&guid); if (blkid_partitions_need_typeonly(pr)) { /* Non-binary interface -- caller does not ask for details * about partitions, just set generic varibles only. */ blkid_partitions_set_ptuuid(pr, (unsigned char *) &guid); return BLKID_PROBE_OK; } ls = blkid_probe_get_partlist(pr); if (!ls) goto nothing; tab = blkid_partlist_new_parttable(ls, "gpt", blkid_probe_get_sectorsize(pr) * lba); if (!tab) goto err; blkid_parttable_set_uuid(tab, (const unsigned char *) &guid); ssf = blkid_probe_get_sectorsize(pr) / 512; fu = le64_to_cpu(h->first_usable_lba); lu = le64_to_cpu(h->last_usable_lba); for (i = 0; i < le32_to_cpu(h->num_partition_entries); i++, e++) { blkid_partition par; uint64_t start = le64_to_cpu(e->starting_lba); uint64_t size = le64_to_cpu(e->ending_lba) - le64_to_cpu(e->starting_lba) + 1ULL; /* 00000000-0000-0000-0000-000000000000 entry */ if (!guidcmp(e->partition_type_guid, GPT_UNUSED_ENTRY_GUID)) { blkid_partlist_increment_partno(ls); continue; } /* the partition has to inside usable range */ if (start < fu || start + size - 1 > lu) { DBG(LOWPROBE, ul_debug( "GPT entry[%d] overflows usable area - ignore", i)); blkid_partlist_increment_partno(ls); continue; } par = blkid_partlist_add_partition(ls, tab, start * ssf, size * ssf); if (!par) goto err; blkid_partition_set_utf8name(par, (unsigned char *) e->partition_name, sizeof(e->partition_name), BLKID_ENC_UTF16LE); guid = e->unique_partition_guid; swap_efi_guid(&guid); blkid_partition_set_uuid(par, (const unsigned char *) &guid); guid = e->partition_type_guid; swap_efi_guid(&guid); blkid_partition_set_type_uuid(par, (const unsigned char *) &guid); blkid_partition_set_flags(par, le64_to_cpu(e->attributes)); } return BLKID_PROBE_OK; nothing: return BLKID_PROBE_NONE; err: return -ENOMEM; } const struct blkid_idinfo gpt_pt_idinfo = { .name = "gpt", .probefunc = probe_gpt_pt, .minsz = 1024 * 1440 + 1, /* ignore floppies */ /* * It would be possible to check for DOS signature (0xAA55), but * unfortunately almost all EFI GPT implemenations allow to optionaly * skip the legacy MBR. We follows this behavior and MBR is optional. * See is_valid_pmbr(). * * It means we have to always call probe_gpt_pt(). */ .magics = BLKID_NONE_MAGIC }; /* probe for *alone* protective MBR */ static int probe_pmbr_pt(blkid_probe pr, const struct blkid_idmag *mag __attribute__((__unused__))) { int has = 0; struct gpt_entry *e; uint64_t lastlba = 0; struct gpt_header hdr; if (last_lba(pr, &lastlba)) goto nothing; is_pmbr_valid(pr, &has); if (!has) goto nothing; if (!get_gpt_header(pr, &hdr, &e, GPT_PRIMARY_LBA, lastlba) && !get_gpt_header(pr, &hdr, &e, lastlba, lastlba)) return 0; nothing: return 1; } const struct blkid_idinfo pmbr_pt_idinfo = { .name = "PMBR", .probefunc = probe_pmbr_pt, .magics = { { .magic = "\x55\xAA", .len = 2, .sboff = 510 }, { NULL } } }; | Low | [
0.514395393474088,
33.5,
31.625
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.