text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Politics is a Mind-Killer (2007) - arikr http://lesswrong.com/lw/gw/politics_is_the_mindkiller/ ====== Bucephalus355 Author says “politics is war by other means”. This is often cited as a good thing; the very intense/ brutal nature of politics is in some ways an outlet for a society instead of war. Also America is a weird nation. Other countries have an academic domain called “American Studies” that is full of fascinating insights about ourselves. One is that historically the US has been a very bipolar nation. Incredibly fearful of being weak / thinking itself weak, certain the decline of American empire is on the way, and at other moments filled with religious fervor, manifest destiny, and build a Navy larger than every other single Navy in the world combined. [https://www.google.com/search?q=tonnage+of+largest+navies&ie...](https://www.google.com/search?q=tonnage+of+largest+navies&ie=UTF-8&oe=UTF-8&hl=en- us&client=safari) ~~~ aaron-lebo We study that domain in the US, too. I'd actually imagine most of the scholars are American. This is very much not something restricted to the US. The French, Germans, British, Chinese, Russians, etc have their own cycles very much related to their self-image. ------ wtfstatists Politics is just the process of mind killing. Its unlimited democracy and people's habit to collectively decide about everything possible. When everyone gets vote on everything, manipulating others (and yourself) can result in real gain. ------ galfarragem I would say: politics is not a mind killer, political parties are. ------ schoen (2007)
Mid
[ 0.6190476190476191, 32.5, 20 ]
B RITAIN’S FUTURE relationship with Europe is still uncertain after the overwhelming defeat of Theresa May’s deal in Parliament on January 15th. The worry for many British employers is that further messy negotiations and hostile political rhetoric will make it ever harder to attract skilled European workers. A sharp decline in the number coming is visible. Surveys of airport passengers show that net EU immigration in the 12 months to June 2018 added up to an estimated inflow of 74,000 people, compared with 189,000 in the year before the June 2016 Brexit referendum. But those figures do not make any distinction between skilled and unskilled workers. An alternative approach is to look at data compiled by LinkedIn, a website that is used by more than 590m workers worldwide, mostly well-paid white-collar ones, to share contact details and employment histories. All LinkedIn users record their location when they join. These data can be analysed to measure the attractiveness of the British labour market in two ways. First, they can be used to see if members in other countries are searching for jobs in London (the most attractive British city for overseas workers). The numbers show a clear, but not catastrophic, decline in Britain’s appeal. London at the start of 2016 was the target of 15% of job hunts by workers from other countries in the EU ; the proportion has since fallen to 12.6%. Rival European cities, such as Amsterdam, Paris and Berlin, have all increased their share of job searches to compensate for London’s decline. But Europeans have not been discouraged altogether from moving across the Channel. London remains the most popular city for job searches. Another way of looking at the numbers is to see how many LinkedIn members move to a new country (this relies on the workers updating their profiles). On this basis, there was a fairly sharp, 10% decline in the number of EU citizens shifting to Britain in 2017, followed by a rebound back to 2016 levels last year. But the fall and rebound are not adjusted for the fact that LinkedIn membership has increased by over a quarter since 2016. Britain has lost “market share” of skilled immigration, attracting 20.8% of intra- EU moves in 2018, down from 23.6% in 2016. Another way to gauge performance is to look at gross inflows. Those to Germany from other EU states have risen by 19% since 2016, while the Netherlands has gained 29%, and France 21%. Britain managed a net gain of 1% over the period. Britain is still attracting workers from outside the EU , although its relative appeal has declined in this respect as well. Between 2016 and 2018 the number of LinkedIn members from outside the EU moving to Britain rose by 17%, but Germany, France and the Netherlands all achieved percentage rises more than twice as large. Of course, Britain has not yet left the EU , nor has it announced the exact terms on which European workers will be able to move to the country in future. Initial policy indications are confusing. The government wants lower overall immigration, and will require existing EU residents to jump through bureaucratic hoops to stay in the country. At the same time, it says it wants to attract skilled workers. But Europeans may opt to stay in the EU , where they enjoy the benefits of free movement, rather than risk relying on the hospitality of a British government in a febrile political environment. So it would not be surprising if future data from LinkedIn showed a further deterioration in the appeal of Britain to skilled Europeans. And that would be a great shame, as the country has a long history of benefiting from European migration, whether it be Flemish weavers in the 14th century or the Huguenots who subscribed 10% of the founding capital of the Bank of England. London is a much more cosmopolitan and attractive city after decades of European immigration than it was when Bartleby started work here in 1980. More broadly, the data demonstrate that social networks are a valuable source of information about economic and social change. Some hedge funds already look at satellite views of shopping-mall car parks for clues about economic activity, or monitor social media to gauge public attitudes towards famous brands. Perhaps one day, central banks will comb job websites to gauge the state of the labour market before they make their interest-rate decisions. Correction (January 18th 2019): In the original version of this article the word “net” was incorrectly added to the inflow figures in the seventh paragraph. The paragraph has been adjusted to reflect the fact that these are gross figures.
Mid
[ 0.5990990990990991, 33.25, 22.25 ]
#!/bin/bash # profiles = xccdf_org.ssgproject.content_profile_ospp yum -y install /usr/lib/systemd/system/sssd.service systemctl enable sssd mkdir -p /etc/sssd/conf.d echo -e "[sssd]\nuser = sssd\nuser = bob" >> /etc/sssd/conf.d/ospp.conf chmod 600 /etc/sssd/conf.d/ospp.conf
Low
[ 0.5199161425576521, 31, 28.625 ]
There are quite a lot of Java EE server implementations out there. There are a bunch of well known ones like JBoss, GlassFish and TomEE, and some less known ones like Resin and Liberty, and a couple of obscure ones like JEUS and WebOTX. One thing to keep in mind is that all those implementations are not all completely unique. There are a dozen or so Java EE implementations, but there are most definitely not a dozen of JSF implementations (in fact there are only two; Mojarra and MyFaces). Java EE implementations in some way are not entirely unlike Linux distributions; they package together a large amount of existing software, which is glued together via software developed by the distro vendor and where some software is directly developed by that vendor, but then also used by other vendors. In Java EE for example JBoss develops the CDI implementation Weld and uses that in its Java EE servers, but other vendors like Oracle also use this. The other way around, Oracle develops Mojarra, the aforementioned JSF implementation, and uses this in its servers. JBoss on its turn then uses Mojarra instead of developing its own JSF implementation. In this post we'll take a deeper look at which of these "components" the various Java EE servers are using. One source that's worth looking at to dig up this information is the Oracle Java EE certification page. While this does lists some implementations for each server, it's unfortunately highly irregular and incoherent. Some servers will list their JSF implementation, while some others don't do this but do list their JPA implementation. It gives one a start, but it's a very incomplete list and a list that's thus different for each server. Another way is to download each server and just look at the /lib or /modules directory and look at the jar files being present. This works to some degree, but some servers rename jars of well known projects. E.g. Mojarra becomes "glassfish-jsf" in WebLogic. WebSphere does something similar. Wikipedia, vendor product pages and technical presentations sometimes do mention some of the implementation libraries, but again it's only a few implementations that are mentioned if they are mentioned at all. A big exception to this is a post that I somehow missed when doing my initial research from Arun Gupta about WildFly 8 (the likely base of a future JBoss EAP 7) which very clearly lists and references nearly all component implementations used by that server. A last resort is to hunt for several well known interfaces and/or abstract classes in each spec and then check by which class these are implemented in each server. This is fairly easy for specs like JSF, e.g. FacesContext is clearly implemented by the implementation. However for JTA and JCA this is somewhat more difficult as it contains mostly interfaces that are to be implemented by user code. For reference, I used the following types for this last resort method: Servlet - HttpServletRequest JSF - FacesContext CDI - BeanManager JPA - EntityManager BV - javax.validation.Configuration, ParameterNameProvider EJB - SessionContext JAX-RS - ContextResolver, javax.ws.rs.core.Application JCA - WorkManager, ConnectionManager, ManagedConnection JMS - Destination EL - ELContext, ValueExpression JTA - TransactionManager JASPIC - ServerAuthConfig Mail - MimeMultipart WebSocket - ServerWebSocketContainer, Encoder Concurrency - ManagedScheduledExecutorService Batch - JobContext Without further ado, here's the matrix of Java EE implementation components used by 10 Java EE servers: (asterisk behind component name means vendor in given column uses implementation from other vendor, plus behind name means the implementation used to be from the vendor in that column, but the vendor donated the implementation to some external organization) Looking at the matrix we can see there are mainly 3 big parties creating separate and re-usable Java EE components; Red Hat, Oracle and Apache. Apache is maybe a special case though, as it's an organization hosting tons of projects and not a vendor with a single strategic goal. Next to these big parties there are two smaller ones producing a few components. Of those OW2 has a separate and re-usable implementation of EJB, JMS and JTA, while Resin has its own implementation of CDI. In the case of Resin it looks like it's only semi re-usable though. The implementation has its own name (CanDI) but there's isn't really a separate artifact or project page available for it, nor are there really any instructions on how to use CanDI on e.g. Tomcat or Jetty (like Weld has). Apart from using (well known) open source implementations of components all servers (both open and closed source) had a couple of unnamed and/or internal implementations. Of these, JASPIC was most frequently implemented by nameless internal code, namely 4 out of 5 times, although the one implementation that was named (PicketBox) isn't really a direct JASPIC implementation but is more a security related project that includes the JASPIC implementation classes. JTA and EJB followed closely with 8 respectively 7 out of 10 implementations being nameless and internal. Remarkable is that all closed source servers tested had a nameless internal implementation of Servlet. At the other end of the spectrum in the servers that I looked at there were no nameless internal and no closed source implementations of JSF, JPA, Bean Validation, JAX-RS, JavaMail and JBatch. It's hard to say what exactly drives the creation of nameless internal components. One explanation may be that J2EE started out having Servlet and EJB as the internal foundation of everything, meaning a server didn't just include EJB, but more or less WAS EJB. In that world it wouldn't make much sense to include a re-usable EJB implementation. With the rise of open source Java EE components it made more sense to just reuse these, so all newer specs (JSF, JPA, etc) are preferable re-used from open source. One exception to this is however JEUS, which despite being in a hurry to be the first certified Java EE 7 implementation still felt the need to create their own implementations of the brand new WebSocket and Concurrency specs. It will be interesting to see what the next crop of Java EE 7 implementations will do with respect to these two specs. An interesting observation is that WebSphere, which by some people may be seen as the poster child of the closed source and commercial AS, actually uses relatively many open source components, and of those nearly all of them are from Apache (which may also better explain why IBM sponsored the development of Geronimo for some time). JavaMail for some reason is the exception here. Geronimo has its own implementation of it, but WebSphere uses the Sun/Oracle RI version. Another interesting observation is that servers don't seem to randomly mix components, but either use the RI components for everything, or use the Apache ones for everything. There's no server that uses say JMS from JBoss, JSF from Oracle and JPA from Apache. An exception to the rule is when servers allow alternative components to be configured, or even ship with multiple implementations of the same spec like JOnAS does. We do have to realize that a Java EE application server is quite a bit more than just the set of spec components. For one there's always the integration code that's server specific, but there are also things like the implementation of pools for various things, the (im)possibility to do fail-over for datasources, (perhaps unfortunately) a number of security modules for LDAP, Database, Kerberos etc, and lower level server functionality like modular kernels (osgi or otherwise) that dynamically (e.g. JBoss) or statically (e.g. Liberty) load implementation components. JEUS for instance may look like GlassFish as it uses a fair amount of the same components, but in actuality it's a completely different server at many levels. Finally, note that not all servers were investigated and not all components. Notably the 3 Japanese servers NEC WebOTX, Fujitsu Interstage and Hitachi Cosminexus were not investigated, the reason being they are not exactly trivial to obtain. At the component level things like JAX-RPC, JAX-WS, SAAJ, JNDI etc are not in the matrix. They were mainly omitted to somewhat reduce the research time. I do hope to find some more time at a later stage and add the remaining Java EE servers and some more components. Arjan Tijms
Mid
[ 0.585365853658536, 33, 23.375 ]
Sex slaves for the Emperor: the 'Comfort Women' (Yoshimi Yoshiaka) An unsparing look at one of the great war crimes of the 20th century To this day, many Japanese argue that their country was the victim and not the perpetrator of the Pacific War, and that even in losing the war, Japan can be proud that it led to the end of western colonialism in Asia. Of course this blinks the fact that Japan was one of the worst colonialists ever to set foot in another country. Nowhere is this more obvious than in the Japanese military's infamous "comfort stations"--largely staffed by unwilling young women from the colonies. The largest number of "comfort women" were Korean and Chinese, followed perhaps by prostitutes recruited in Japan itself. (Even where the comfort women had earlier worked in "the shameful profession," as the Japanese military called it, there's a question as to how voluntary this was. As late as 1933, Japanese prostitutes were confined to red-light districts, and extreme measures were used to prevent them from escaping.) But everywhere the Japanese army and navy went, local women were rounded up and sent to the military brothels. Catholic Filipinas, Dutch Indonesians, Pacific Islanders, and perhaps Australian nurses--all were grist for sexual slavery. As a Japanese trying to convince a reluctant public to accept the facts of the comfort stations, Yoshioki spends too much time trying to prove a connection between them and the military high command. Personally, I was willing to take this connection on faith, knowing what I do about how how Japan treated its male captives. Then, too, I could have done without the translator's introduction, with its almost-comical attempt to put sexual slavery into the context of today's women's studies. Really, Ms O'Brien, I didn't need your ruminations on the patriarchy! These faults aside, Comfort Women is a spellbinding and terrible recital of crimes that can never be forgiven. Girls as young as 10 were rounded up in the Philippines. Sometimes the recruits were bought as chattel, from their families or from brothel-keepers; more often they were tricked with promises of jobs as nurses, laundrywomen, and factory workers. Typically they were given a rough medical examination, which to an ignorant virgin was terrifying enough. Then they were raped by officers. Finally they went into the comfort stations, often thousands of miles from home, sometimes in combat zones (where they were indeed required to serve as nurses). In distant places, the headman would be ordered to supply the women, an order that was met by handing over the village's widows. A day's schedule at the comfort station might go like this: from 9:30 a.m. to 3:30 p.m., private soldiers had the run of the place. From 4 p.m. to 8 p.m., the comfort station was reserved for non-commissioned officers. (Note that the women had half an hour to clean up for the second shift.) At 8:30 p.m, officers got exclusive use of the place. This might seem to reverse the normal order of privilege, but when you consider that officers could stay until morning, you realize that the women were hardly fresher at 10 a.m. than they were at 10 p.m. Yoshiaki cites the case of one woman in Burma who was forced to service (there can be no other word for it) 60 men in a single day, though six or seven was probably more typical. When a woman protested at the quantity of customers forced upon her, she was tied to the bed, and the line continued to move. They might be given Saturday afternoon off, but otherwise it was around the clock, seven days a week. In small units, and close to the front, the women often spent their mornings working as cooks and chambermaids, only getting on their backs in the afternoon. They were often raped, stabbed, beaten, and kicked, and almost never was a Japanese soldier disciplined for maltreating them. Because of the wilful destruction of records in August 1945, and the "willing amnesia" of today, the numbers of women forced to endure this treatment can't be known for sure. Yoshiaka uses a range of 50,000 to 200,000. Elsewhere he notes that one Japanese army command rounded up women on the basis of one for 80 soldiers in its command. Given the massive size of the Japanese military at the height of the Pacific War, I find it easy to believe that the figure was north of 100,000. Postwar, the women suffered not only from the disease, sexual dysfunction, and trauma that had been inflicted upon them by the Japanese military, but also from the social stigma of their families and villages--if indeed they were able to go home. While most Japanese comfort women were repatriated in September 1944, there was no return trip for the Koreans, Chinese, and others who had been sent to the far reaches of the empire. Some of these women were turned up in the South Pacific in the 1990s, flotsam from a 50-year-old war. At the risk of appearing to take the plight of white women more seriously than that of Asians, I'll conclude with Jeanne O'Hearn, who published her story as Cry of the Raped in Australia in 1992. The daughter of Dutch sugar planters, she was a 21-year-old novice at a Fransiscan nunnery when the Japanese invaded. She was interned until February 1944, when a Japanese officer ordered all women in the camp over the age of 17 to parade for inspection. Sixteen were selected, trucked to a hotel, and divided into groups according to their comeliness, with the best-looking destined for an officers' brothel. On opening night, O'Hearn was raped by several officers in sequence, and raped again by the military doctor who came to examine her for venereal disease. Her story concludes: "Even after almost fifty years, I still experience this feeling of total fear going through my body and through all my limbs, burning me up. It comes to me at the oddest moments in which I wake up with nightmares and even feel it when just lying in bed at night. But worse of all, I felt this fear every time my husband made love to me. I have never been able to enjoy intercourse as a consequence of what the Japanese did to me."
Mid
[ 0.599542334096109, 32.75, 21.875 ]
The WNBA is worth it. A couple weeks ago, I was invited to cover a WNBA game, the Washington Mystics versus the Connecticut Sun. Some people snickered. Some asked why. Some didn’t care. And that’s fine. This post isn’t to convince anyone that the WNBA is great or that it’s even better than they think. Plain and simple, the WNBA is worth it. Worth the effort to make sure it works. Worth the support and subsidization of the NBA … although, the current level of the NBA’s assistance is somewhat mysterious. WNBA president Donna Orender was recently interviewed by Fortune’s Poppy Harlow on CNNMoney.com. When asked if the league gets financial support from the NBA, Orender carefully said, “We are an entity that runs ourselves, but with … I would say we have support from the NBA, but there’s always been these rumors that they’re writing big checks for us …” Harlow interrupted and implored Orender to clear the record on if the WNBA stands on its own feet financially. Ordener responded, “At the league level, we do. Yes.” A bit vague, but certainly indications of progress from Orender. Over the league’s existence, six teams have folded: the Portland Fire (2000-02), Miami Sol (2000-02), Cleveland Rockers (1997-03), Charlotte Sting (1997-06), Sacramento Monarchs (1997-09), and Houston Comets (1997-08). The Comets won the first four championships in league history. The Detroit Shock, winners of three championships in the past seven seasons, most recently in 2008, relocated to Tulsa for the current season. Orender responded to trouble keeping teams afloat by comparing the WNBA to the struggles of other leagues in their youth, specifically citing the NFL and the NBA. Clearly, however, an apples to oranges situation. In this day of new media and high technology market research, the ability to penetrate markets and pinpoint target audiences is vastly different from trying to grow a sports league over 50 years ago. Fact is, a growing audience has been hard to come by for the WNBA, evident by the league’s attendance history. In its fourteenth year, the league is young, but it’s not that young. According to WNBA attendance records on WomensBasketballOnline.com, in the league’s first seven seasons, the league-wide attendance average was 9,560. In the last six years, the league-wide average has been 7,999. The reported average game attendance for the first four weeks of the 2010 season is 7,198. That’s not exactly growth. “We’re watching [attendance numbers] very carefully,” said Sheila Johnson, Washington Mystics president & managing partner, when I spoke with her after Ted Leonsis’ introductory press conference as majority owner of the Washington Wizards. “I think the league has grown in many ways as far as our fan base, but we’re still struggling a little bit with sponsorships.” Johnson, who also serves a vice-chair of Monumental Sports & Entertainment, the ownership group that controls the Wizards, Mystics, Washington Capitals and the Verizon Center, also pointed more toward societal factors as an influence on attendance. “I still don’t think society as a whole has really embraced the female athlete as they should,” she said in terms of goals to increase the WNBA’s fan base. “And so it’s something we’re constantly working on and we’re struggling with, and trying to really get the message out there of the importance of women and sports. Once society can start seeing its strengths, I think it’s going to grow.” Cultural factors also come into play. For the most part, professional women basketball players get paid more overseas than they do in America. Thus, women’s pro basketball is more embraced in other countries. The WNBA’s summertime schedule does allow many players to participate in dual leagues, but that comes with the sacrifices of increased injury risk and shorter careers. But if the WNBA had a winter schedule, they simply couldn’t compete, with foreign women’s leagues or with the NBA. NBA commissioner David Stern projected that his league’s owners would collectively lose $400 million this season. It’s the economy, stupid (and a CBA that allows NBA owners to take “stupid pills,” as Ted Leonsis would say). NBA union head Billy Hunter recently called the $400 million figure, “baloney.” Nonetheless, the health of the WNBA is certainly affected by the overall health of professional basketball in the United States, something which will improve in a better economy. Sheila Johnson said jersey sponsorships can be the difference. “We are definitely looking into it,” when asked if the Mystics were considering the option. “That marquee sponsorship really does make the difference between our being in the red and being in the black. So we have been constantly talking with major corporations to see if we can get a marquee deal.” Johnson also sees Ted Leonsis’ majority ownership of the Wizards as a plus specifically for the Mystics franchise. “The beauty about what we’re doing here is we’re going to be able to kinda blend the Wizards and the Mystics back together, as far as sponsorship sales, as far as even being able to sell packages.” Six of the 12 current WNBA teams have connections with NBA ownership groups. Still … surely none of this matters to you. It all comes down to the product, right? If you’re a fan of men’s basketball, it’s probably not a two-way street toward fandom of women’s basketball. Same sport, different games … the main discrepancy coming in athleticism. Men’s basketball is more athletically entertaining in contrast to general human athletic capabilities. This can’t be argued. Not to say women’s basketball isn’t athletically astounding in its own way, just very small in comparison to a pool of the world’s greatest athletes. But athleticism is not a point that should be focused upon as a quality of the WNBA game anyway. In fact, it’s somewhat arrogant to consider the merits of the WNBA solely based on the idea that NBA-caliber athleticism spoils you from watching the women’s game. If the game of basketball is all about dunking and athletic feats, then you aren’t appreciating or getting the nuance of the sport, much less why people compete in the first place. So the WNBA is not for you. It doesn’t matter. The WNBA provides an alternative outlet for those passionate about basketball in ways that needn’t matter to everyone. The WNBA is for someone … for young girls to cultivate a love for the game with the tangible goal of playing at the highest professional level in the United States … for promotion of the sport on a worldwide level to both men and women, and not just across cultures, races, religions and ethnicity. Through all the struggles, criticism and growing pains, the WNBA is worth the effort and worth the presence. For the greater good of the game of basketball, the WNBA is worth it. >>>>>>>>>>>>>>>>>>>>>>>>>>>> After the game I attended, I spoke to a couple WNBA players, Marissa Coleman and Monique Currie of the Washington Mystics and Tan White of the Connecticut Sun, about the role their league plays in the ambassadorship of the game of basketball, especially for girls. The reason the WNBA is failing has nothing to do with the economy and nothing to do with a bloodlust for athleticism. I enjoy watching basketball on all levels, from the NBA down to recreational leagues for high schoolers. The answer is simple really…the product put out by the WNBA is a terrible product….simple as that. As a basketball purist, I have tried several times to watch the WNBA…only to be disgusted at the terrible basketball being played. Again, it is not the lack of 360 windmill dunks, but a failure to play great basketball at the fundamental level. If the product isn’t great, noone will buy….no matter how well you market the product. Nick Not that this argument is made here specifically, but it is somewhat common for people to argue that NCAA players/teams exhibit better fundamentals than NBA players, or that WNBAers do the same. However, less athletic does not equal more fundamentally sound. The NBA is not only basketball at its most athletic, but more importantly, it is also basketball at its most fundamentally sound. As you say, the niche the NBA has is – you can watch women compete. But for most, myself included, they would prefer to watch the BEST compete. And that means the NBA. Greg Are the attendance figures given “paid attendance” or only attendance? The WNBA gives away a lot of tickets. TheOnlyGirl I’ve been searching and reading articles such as this and it’s always men who seem to hate WNBA. I’ve always thought NBA is an ego trip, the very reason why average men love it. Because it’s all they’ve got. I grew up in a family who loves basketball, I was never the one to jump up and down when a dude dunks. So what? I personally think it’s pathetic. Here comes WNBA and I love it more than anything. If it shuts down, I will become the feminist every men would love to fuck but can’t. Sponsored Links Sponsored Links About TAI Truth About It.net, Washington Wizards Blog, ESPN TrueHoop Network -- Following the D.C. pro basketball franchise since the 90s and covering them in blog form since 2007 -- Opinion, Analysis, Irreverence, Pictures, Video, Interviews, Photoshops, News, Video, Quotes, Shares, and all the pixels about the Washington Wizards you can imagine.
Low
[ 0.49795081967213106, 30.375, 30.625 ]
Clinton hopes to hug it out with the president Share with others: EDGARTOWN, Mass.—There doesn’t appear to be an apology, but there may be a hug. Former Secretary of State Hillary Rodham Clinton says she hopes that she and President Barack Obama can hug it out like friends at a Martha’s Vineyard soiree today—her attempt to make up for dissing Mr. Obama’s foreign policy in a magazine interview this week. Ms. Clinton ripped Mr. Obama’s Syria strategy and dismissed his one-time foreign policy catchphrase as small bore. The interview caused some poorly timed tension between Ms. Clinton and her former boss, because the two were scheduled to cross paths on the small island where Mr. Obama is vacationing and Ms. Clinton is slated to attend a book signing today. A Clinton spokesman issued a statement Tuesday saying Ms. Clinton called the president to explain her comments. “Earlier today, the secretary called President Obama to make sure he knows that nothing she said was an attempt to attack him, his policies or his leadership,” spokesman Nick Merrill said. “Secretary Clinton has at every step of the way touted the significant achievements of his presidency, which she is honored to have been part of as his secretary of State.” Mr. Merrill said Ms. Clinton was “proud to be his partner” and “shared his deep commitment to a smart and principled foreign policy.” He did not say she was sorry for the comments. The statement also stood by “honest differences” over Syria and blamed others for “choosing to hype” those differences. And if that didn’t salve the criticism of his policy—“Great nations need organizing principles, and ‘Don’t do stupid stuff’ is not an organizing principle,” Ms. Clinton had said before defending Mr. Obama—it would have to do. “Like any two friends who have to deal with the public eye, she looks forward to hugging it out when they see each other,” Mr. Merrill said. Ms. Clinton and Mr. Obama are slated to attend a private reception at the home of Vernon Jordan, a former adviser to former President Bill Clinton.
Low
[ 0.5149253731343281, 34.5, 32.5 ]
In late March, Lyft's co-founder John Zimmer told CNBC — on the Friday morning when the rideshare firm went public and he earned hundreds of millions of dollars — that the company was "ready to be held accountable" for the fact that it had no history of profits. The market did not wait long. After finishing up modestly on its first day of trading, it has been almost all downhill for the company, with shorts piling into the stock and a loss for Lyft investors near-30% below its first-day closing price. Lyft's IPO was the first in a heralded crop of Silicon Valley unicorns expected to test the public markets this year, and on Tuesday it gets to take a crack at another market first: reporting earnings as a public company —or in its case, a big loss — with its first-quarter financials expected after the market close. As Lyft has tanked, the stock market has continued to reach new highs, and other closely watched tech IPOs have fared far better, with Pinterest still well above its first-day trade and Zoom Video soaring. "Let's not sugarcoat it; Lyft's stock has been a head-scratching train wreck since the IPO," said Dan Ives, managing director at Wedbush Securities. "The first quarter coming out of the box for any company is so important after going public, but for this one it is incrementally a key factor, just given Street fears. It is unusual for the bloom to come off rose so quickly, and that is why it is such a prove-me quarter." Lyft co-founders John Zimmer (L) and Logan Green (R). One thing no one expects is a profit. That may not arrive until earliest 2022, according to early Lyft investor Santosh Rao, partner at Manhattan Ventures. Ives expects a loss per share of $5.60. He has lowered his price target on the stock from $80 to $67, but it has nothing to do with the EPS. Raymond James wrote in an earnings preview: "We expect 2019 to be the peak EBITDA loss year at $1.3 billion, reflecting investments in bikes and scooters and other growth initiatives." Lyft's founders have made it clear that they will continue to invest for the long term, telling CNBC amid the fanfare of the company's first trading day that they would not be doing the right thing if they were focused on the next one or two years. "We are focused on the next three, four, five," Zimmer said. With investors expecting the losses to mount, the focus will be on a limited set of growth metrics: the top-line (revenue), active riders and revenue per rider. "1Q revenue and 2Q revenue guide will be key," said Cowen analyst John Blackledge. "Underlying drivers of revenue, active riders and revenue/active riders, also key relative to expectations "If there is any hint of softness in any metric, in terms of guidance, it could be dark days ahead," Ives said. "The whisper numbers have started to come down, and that is part of why the stock has acted as it had. The shorts have had a field day." Profitability is allowed to continue to be murky, he said, "but if you get a sense that maybe there are some cracks in the armor around growth metrics and the forecast going forward is strong but doesn't meet the whisper expectations with a company that won't be profitable before man lands on Mars, that combination could spell trouble for the stock." Lyft shares closed down 3% on Monday, at $60.57. For the next four to six quarters, it will be a maniacal focus purely on the metrics, revenue growth and how it looks relative to expectations. Dan Ives Wedbush Securities managing director Raymond James is among the most bullish sell-side firms into earnings, maintaining an $85 target on Lyft shares and expecting the report to generate upside, even though it is not looking for heroic forward-looking numbers. It sees revenue of $745 million in Q1 (+87.5% year-over-year) versus a Wall Street consensus of $740 million, driven by an increase in active riders of 41% year-over-year and revenue per active rider up 34% year-over-year. Raymond James analysts think Q2 revenue will come in below Street expectations of $788 million (it has revenue pegged at $765 million, a 52% year-over-year increase), but it is betting the market won't view that as a disappointment, because the Street consensus has been skewed by several outliers. It also expects Lyft to provide a conservative outlook due to pricing pressures. But even in maintaining its $85 price target, it is expecting investors to be wary. "It may take a quarter or two for investors to be comfortable with market rationalization, but we believe Lyft's multiple will expand when that occurs; a rational market lessens competitive fears and makes lapping 2018's tough comps easier," Raymond James analysts wrote. (The company was able to charge higher prices in Q2 2018.) The focus from investors on growth metrics for a company expected to lose more than $1 billion this year may not be a one-quarter event. "For the next four to six quarters, it will be a maniacal focus purely on the metrics, revenue growth and how it looks relative to expectations," Ives said. "Right now they are in stealth growth mode, investing in the business and increasing riders and bookings and to really give investors more comfort that they are a net-share gainer and have monetization capabilities. ... It comes down to metrics and bookings to drive that." Several of the firms covering Lyft have Q2 revenue estimates that are in a tight range, expecting an increase slightly above 50% from year-ago levels. Raymond James and Cowen anticipate revenue of $765 million; Wedbush is at $767 million. Cowen analysts think the pullback is "overdone" and Lyft's valuation is attractive; it has a price target of $77. "We expect shares to get back on track and view solid earnings and 2Q19 guidance as a key catalyst to reaffirm Lyft's position and remind investors of the massive opportunity [long-term]," its analysts wrote in a note to clients Friday. Cowen analysts advised investors to look for "strong 2Q19 guidance suggesting active rider and rev/rider growth momentum continue into the spring/summer months." It is forecasting active riders of 20.2 million in Q2, which would be a 31% increase from a year ago, and revenue per rider of $37.90, a 16% year-over-year increase. For Q1, several of the Wall Street analyst targets on the rider metrics are close, with Cowen and Raymond James both at 19.7 million active riders and a forecast of revenue per rider of roughly $3.80. Wedbush is slightly higher, at 20 million active riders, but has a more cautious view on the revenue, at $37.13 per rider. Uber IPO looms
Mid
[ 0.562899786780383, 33, 25.625 ]
The Oregon Ducks have experienced six decommitments since rumors of Willie Taggart's move to Florida State University first began, and fans have been clamoring for positive news. On Monday evening, Oregon finally received some positive recruiting news, as 247Sports three-star junior college defensive back Haki Woods announced his commitment to Oregon over offers from Arizona, California, Oklahoma State and Utah: The 6-foot-3, 192-pound cornerback, out of Pima Community College (Tucson, Arizona), is the first commitment of the Mario Cristobal era, and marks the 20th commitment for Oregon in the 2018 recruiting cycle. Woods carries added value thanks to his versatility. He can play either cornerback or safety at the college level. The versatile defensive back is expected to sign Wednesday, joining fellow defensive backs Steve Stephens and Jevon Holland, a pair of four-star prep talents. -- Andrew Nemec [email protected] @AndrewNemec
High
[ 0.6651480637813211, 36.5, 18.375 ]
Q: Export query result in Pervasive to txt / csv file I'm using Pervasive 10 with PCC (Pervasive Control Center) and I need to export a lot of results (over 100 000) to a TXT file.I know it's possible "Execute in Text" but this feature does not work for me because after exporting about 20 000 records the program stops. I have also changed the settings in PCC (Windows->Preferences->Text Output-> Maximun number of rows to display = 500,000). Anyone know a way to export my query result to a txt file? A: You should be able to use the Export Data function. Right click on the table name in the PCC and select Export Data. From there, you can either execute the standard "select * from " or make a more complex query to pull only the data you need. You can set the delimiter to Comma, Tab, or Colon.
Mid
[ 0.6526610644257701, 29.125, 15.5 ]
<?xml version='1.0' ?> <m:oMathPara> <m:oMathParaPr> <m:jc m:val="center" /> </m:oMathParaPr> <m:oMath> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>M</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> <m:r> <m:t>+</m:t> </m:r> <m:r> <m:t>x</m:t> </m:r> </m:oMath> </m:oMathPara>
Low
[ 0.497619047619047, 26.125, 26.375 ]
[An epidemiological study of intestinal bilharziasis and roundworm infections in Bafia (Cameroon)]. The prevalence of intestinal helminthiasis is measured by means of stool examinations. In Bafia eggs are passed in the feces of 69.1% of the inhabitants for Ascaris lumbricoides, 70.1 % for Trichuris trichiura, 59.6 % for Necator americanus and 14.8% for Enterobius vermicularis. A small focus of intestinal bilharziasis exists in Bafia and eggs of Schistosoma mansoni are found in the feces of 18.6% of the persons studied. Biomphalaria pfeifferi is the intermediate host of the parasite and transmission occurs in the town itself, in the fish-culture pool and in the rivers Guen and Rutop.
Mid
[ 0.646596858638743, 30.875, 16.875 ]
namespace NuKeeper.BitBucket.Models { public class PullRequest { public string description { get; set; } public Links links { get; set; } public User author { get; set; } public bool? close_source_branch { get; set; } public string title { get; set; } public Source destination { get; set; } public string reason { get; set; } public object closed_by { get; set; } public Source source { get; set; } public string state { get; set; } public string created_on { get; set; } public string updated_on { get; set; } public object merge_commit { get; set; } public int? id { get; set; } } }
Low
[ 0.531177829099307, 28.75, 25.375 ]
- 70702*l**2 + l*m - 3*l + 3*m - 1 wrt m? 11660*l**2 + l + 3 Find the third derivative of 2222*m**3*v**3 + m**3*v - 4*m**2*v**3 - 2*m**2*v**2 - 1847*m*v**2 - v**3 wrt v. 13332*m**3 - 24*m**2 - 6 Differentiate 3655*f**3*r**3 + 2*f*r**3 + 17851*r**3 wrt f. 10965*f**2*r**3 + 2*r**3 Find the third derivative of 2*p**6 + 336*p**5 + 14*p**4 + p**2 + 347*p + 2 wrt p. 240*p**3 + 20160*p**2 + 336*p What is the second derivative of 1574*h**5 + 4*h**4 - 11*h**2 - 816703*h wrt h? 31480*h**3 + 48*h**2 - 22 Find the third derivative of -59026*g**3 - 33538*g**2 wrt g. -354156 What is the first derivative of -20360*l*z - 4306*l - z wrt z? -20360*l - 1 Find the third derivative of -47157*h**5 + 140*h**2 + 4*h - 6 wrt h. -2829420*h**2 What is the third derivative of -2*w**5 - 15*w**4 + 2023*w**3 - 56976*w**2 + 3? -120*w**2 - 360*w + 12138 What is the third derivative of 3*d**3*n**2 + 24*d**3*n - 198*d**3 - 22*d**2*n**2 + 13*d*n**2 + n**2 + 2 wrt d? 18*n**2 + 144*n - 1188 What is the second derivative of 71*d**3 + 4*d**2*s - 56*d**2 - 3*d*s + 5*d - 2*s + 221 wrt d? 426*d + 8*s - 112 What is the second derivative of 189655*d**3 + 24972*d + 3? 1137930*d What is the second derivative of -26631*t**4 + 4*t**3 - 64731*t - 2 wrt t? -319572*t**2 + 24*t Find the first derivative of -1644*r**2*v - 7*r*v**2 - 3644*v**2 + v wrt r. -3288*r*v - 7*v**2 What is the third derivative of 52*m**5*o + 42*m**5 - 11*m**3 + m**2*o + 2*m*o + 4*m + 97*o wrt m? 3120*m**2*o + 2520*m**2 - 66 Find the third derivative of -619351*n**3 + 1399*n**2 + 322*n + 2 wrt n. -3716106 What is the first derivative of -n**4 - n**3 - 11909*n - 39886? -4*n**3 - 3*n**2 - 11909 What is the derivative of -904034*d*y - 338985*d wrt y? -904034*d What is the first derivative of 1814229*b**4 + 1740053 wrt b? 7256916*b**3 Find the second derivative of 54*s**2 + 10130*s - 1 wrt s. 108 What is the derivative of 15075*u**3 - 3160788? 45225*u**2 Find the second derivative of 6*c**3*d**3*k + c**3*d*k + 6*c**2*d*k - 1659*c*d**3 + c*d**2*k + 248*c*d*k wrt d. 36*c**3*d*k - 9954*c*d + 2*c*k What is the derivative of -3084*f**2*h**3 + 90*f**2*j - 72*f*h**3 - 2*h**3*j + 3*h**2*j - 88*j wrt j? 90*f**2 - 2*h**3 + 3*h**2 - 88 Find the third derivative of 3349966*a**3 + 93*a**2 + 3*a - 101. 20099796 Find the second derivative of 38499*k**3 + 2*k**2 - 5227*k - 1 wrt k. 230994*k + 4 Find the third derivative of -5139*s**5 - 42*s**3 - 178912*s**2 wrt s. -308340*s**2 - 252 Find the third derivative of 2*h**4 + 350*h**3 - 296755*h**2 wrt h. 48*h + 2100 What is the derivative of 22*n**2 - 828*n - 49823? 44*n - 828 What is the first derivative of 204*j*q*u*z + j*u**2 + 16438*j*u*z + 141*q*u**2*z + 2*u*z wrt q? 204*j*u*z + 141*u**2*z Find the third derivative of 2*x**5 - 107381*x**3 - 1750*x**2 - 234*x wrt x. 120*x**2 - 644286 Find the second derivative of -48098*s**3 + 2310*s. -288588*s What is the third derivative of 6*i**4*r - 12801*i**3 + 2919*i**2 + 8*i*r wrt i? 144*i*r - 76806 Find the second derivative of -f*i**2*z**3 + 4*f*i**2 - 44*f*i*z**2 + 3*f*i*z + f*z**3 - 466*i**2 + 2*i*z**3 + 3*z**3 wrt i. -2*f*z**3 + 8*f - 932 Differentiate -126120*l**3 - l**2 - 544607 with respect to l. -378360*l**2 - 2*l Differentiate 2*g**2 + 20825*g + 31172 wrt g. 4*g + 20825 Differentiate -240*m**2 - 39*m + 48452 wrt m. -480*m - 39 What is the second derivative of -2*i**5*t*w - 2857*i**2*t*w - i**2*t + i*t*w - 2*i*t - 81*i - 3*t wrt i? -40*i**3*t*w - 5714*t*w - 2*t What is the second derivative of -169*f**3*o - 40*f**3 - 2*f**2*o - 3*f*o - f + 13*o - 16 wrt f? -1014*f*o - 240*f - 4*o Differentiate -97*b*d*h**2 + 1382*b*d + 1321*b*h + 195*b + 2*d*h**3 with respect to h. -194*b*d*h + 1321*b + 6*d*h**2 What is the second derivative of 43439*p**3 + 5*p**2 + 54*p - 19008? 260634*p + 10 Find the third derivative of -1626*g**6 + 6*g**3 - 29375*g**2. -195120*g**3 + 36 Find the third derivative of 152397*k**4*z**2 - 2*k**4 - 10*k**2*z + 2*k**2 - 94*z**2 - z wrt k. 3657528*k*z**2 - 48*k What is the derivative of -32148*a**4 + 306355? -128592*a**3 What is the derivative of -o**2*u*v - 177767*o**2*v**2 + 2*o*u - 3*u*v**2 + 473*u wrt u? -o**2*v + 2*o - 3*v**2 + 473 Find the second derivative of 20*o**5 + 1326*o**3 - 1415919*o. 400*o**3 + 7956*o What is the first derivative of 2*n*t**2 - 164*n + 9*t**3 - 2*t**2 - 2232*t + 91 wrt t? 4*n*t + 27*t**2 - 4*t - 2232 Differentiate 338*g*i**2*y + 37*g*y + 1967*g + i**4*y + 78*i*y with respect to i. 676*g*i*y + 4*i**3*y + 78*y What is the second derivative of -360351*u**2 - 15664*u + 2 wrt u? -720702 Differentiate -28873*c**4 + 3*c**2 + 176556 wrt c. -115492*c**3 + 6*c Find the second derivative of -244626*p**2 - 375679*p. -489252 Find the second derivative of 190*d**4*t + 492*d**3*t + 2*d*t - 948*d - 4*t wrt d. 2280*d**2*t + 2952*d*t Differentiate 141*c*f**2 - 69*c*f + 1334890*c + f**3 - 2 wrt f. 282*c*f - 69*c + 3*f**2 Find the second derivative of -6*a**4 + 3*a**3 - 193*a**2 + 322078*a. -72*a**2 + 18*a - 386 Differentiate -10602*l**2 + l - 266018. -21204*l + 1 What is the second derivative of 4*i**3*n*q**2 + 63290*i**3*q**2 - i**3 + 2*i**2*n*q - 4*i*n*q + 143*i*n - 2*i*q**2 - 5*q wrt q? 8*i**3*n + 126580*i**3 - 4*i Find the second derivative of -139*n**2*o**3 - 585*n**2*y**2 - 46*n**2 - 2*n*o**3 - 2*n*o*y**3 - n*o*y + 3*o**3*y**2 + o**2*y wrt y. -1170*n**2 - 12*n*o*y + 6*o**3 Differentiate 20*q**3 + 337*q**2 + 12993. 60*q**2 + 674*q What is the second derivative of 4554625*v**5 - 18746*v - 73? 91092500*v**3 Find the first derivative of 8*o**2 + 937*o + 1604189. 16*o + 937 What is the derivative of 83*y**2 + 2*y - 49274? 166*y + 2 Find the third derivative of -62899*g**3*q**2 - 3*g**3*q + g**2*q**2 - 6*g**2*q - 8*g*q**2 + 656 wrt g. -377394*q**2 - 18*q What is the third derivative of 99777*x**6 + 17*x**2 + 70*x? 11973240*x**3 What is the second derivative of 80058*g**2 + 7288*g - 6 wrt g? 160116 What is the second derivative of -31*p**2*r**3 - 69*p**2*r + 122*p*r**3 - 28*p*r - r wrt r? -186*p**2*r + 732*p*r Find the first derivative of 8*n**4 + 2499*n - 22766 wrt n. 32*n**3 + 2499 What is the first derivative of 51237*k - 35917 wrt k? 51237 Differentiate -2*b*l**2 - 11805*b - l**2 + 27287*l - 3 wrt l. -4*b*l - 2*l + 27287 Find the first derivative of -2*h**2*l**2 - 4371*h**2 - 1018645*h*l**2 - 8*h - 2 wrt l. -4*h**2*l - 2037290*h*l What is the second derivative of -79305*i*t**5 + 2*i*t**4 + 17*i*t + 9*i + t - 231 wrt t? -1586100*i*t**3 + 24*i*t**2 What is the third derivative of 18*g**4 - 605*g**3 + 2645*g**2 - 2*g? 432*g - 3630 Find the first derivative of 38713*m**3*r + 41*m**3*w + 9*m**2*r*w + m*r**2 + 5*m*w - 1785*m - 2*w wrt r. 38713*m**3 + 9*m**2*w + 2*m*r Differentiate -46171*l - 1056021 with respect to l. -46171 What is the derivative of -83*z**2 + 16*z + 7481? -166*z + 16 What is the first derivative of -191343*k*s - 1934090*k - 9*s**2 wrt s? -191343*k - 18*s Find the second derivative of 19*n**5 - 961*n**4 - 7*n**2 + 3245*n - 135. 380*n**3 - 11532*n**2 - 14 What is the derivative of 97939*j**4 - 260811? 391756*j**3 Find the second derivative of 4561229*t**2*x - 18*t*x - 2*x - 917 wrt t. 9122458*x What is the first derivative of -4*n**3 - 27453*n**2 - 272756 wrt n? -12*n**2 - 54906*n Find the third derivative of t**5 - 67*t**4 - 871*t**3 + 3*t**2 + 3703 wrt t. 60*t**2 - 1608*t - 5226 Find the first derivative of -199430*h*o + 191586*h wrt o. -199430*h Differentiate 2*g*n**3*p + g*n*p - 647*g*p**2 + 84*n**3*p + 262*n*p**2 wrt g. 2*n**3*p + n*p - 647*p**2 Find the third derivative of 2*j**3*p**2*w**2 + 3*j**3*p*w**3 - 13*j*p*w - 95*j*w**3 - 86*p**2*w**3 - 107*p**2*w**2 - p*w**2 + p*w wrt w. 18*j**3*p - 570*j - 516*p**2 What is the second derivative of 15997*a**4 + a - 12891 wrt a? 191964*a**2 What is the second derivative of 191617*r**4 + 3*r + 18827 wrt r? 2299404*r**2 What is the third derivative of -5222*q**4 - 5*q**3 + 200000*q**2 wrt q? -125328*q - 30 Differentiate -2*w**2*x**2 - 52*w**2*x*z + 2*w**2*x - 1109*w*x**2*z + 3*w*x**2 + 3*w*x - 55*x with respect to z. -52*w**2*x - 1109*w*x**2 What is the second derivative of 2*c**4*s + 4*c**3*s + 42*c**2*s - 2*c**2 - 2*c*s - 6314*c + 2 wrt c? 24*c**2*s + 24*c*s + 84*s - 4 Differentiate -i**4 + 25117*i**3*r**2 + 23973*r**2 wrt i. -4*i**3 + 75351*i**2*r**2 What
Low
[ 0.498915401301518, 28.75, 28.875 ]
y = -5*l - 18. What is the greatest common divisor of l and 396? 6 Suppose 10*p - 2205 = -15*p - 10*p. Calculate the greatest common divisor of p and 3339. 63 Suppose -26*l - 7*l + 996 = -10554. What is the highest common factor of 7525 and l? 175 Suppose -2*c - 960 = -x, 233*x - 3849 = 229*x + 5*c. Calculate the highest common divisor of x and 14. 14 Let h(j) = 7*j**2 + 350*j - 702*j - 4*j**2 + 359*j. Let o be h(-6). What is the highest common factor of 6 and o? 6 Let v(i) = 6. Let k(x) = x + 5. Let t(w) = 4*k(w) - 3*v(w). Let d be t(2). Calculate the highest common factor of d and 130. 10 Suppose -2*d = -5*d + 129. Let t = 144753 + -143936. Calculate the highest common factor of d and t. 43 Let u = 11504 + -7214. What is the greatest common divisor of u and 110? 110 Suppose -2967 = 25*o - 24542. Suppose 0 = -35*v + o + 187. Calculate the greatest common factor of v and 150. 30 Let q(z) = z - 12. Let k be q(15). Suppose -2 - 79 = -k*m. Let x = -1057 + 1111. What is the highest common divisor of m and x? 27 Let a be 3/((-11)/(641927/(-39))). What is the highest common factor of 67 and a? 67 Let s be (-84328)/(-762) - (2 + (-1)/((-3)/(-10))). What is the greatest common divisor of 288 and s? 16 Let z(w) = 2*w - 1. Suppose d = -0 + 1. Let y be z(d). Let x be (-3290)/(-50) - y/(-5). What is the highest common factor of 6 and x? 6 Let g be -16 + 1695/105 - 164/(-28). Suppose l = 5*m + 3, 5*l - 5 - 10 = -2*m. What is the highest common divisor of g and l? 3 Let q(h) = -h + 1. Let u(z) = 32*z - 36. Let l = -40 + 41. Let s(x) = l*u(x) + 3*q(x). Let n be s(5). What is the greatest common divisor of 14 and n? 14 Let f(b) = 2*b**3 + 56*b**2 + 49*b + 39. Let g be f(-27). What is the highest common factor of 6 and g? 6 Suppose 0 = 11*c - 17 - 38. Suppose -12*y + 595 = c*y. Calculate the greatest common divisor of y and 7. 7 Let u be 28/(-12)*3/(-1). Let q be u + (-1 - (-3 + 1))/1. Let x be (-4)/((-7)/(3276/q)). What is the highest common divisor of x and 26? 26 Let z = 37 + -35. Suppose -5*o - 27 = -z. Let q be (o - -4)/((-1)/35). What is the greatest common divisor of 5 and q? 5 Suppose -6 = r, 3*f + 2*r = 501 - 99. Calculate the greatest common divisor of 13478 and f. 46 Let z(l) = 7*l**3 - 2*l**2 + 3*l + 1. Let j be z(4). Let p(a) = 1440*a - 4307. Let w be p(3). What is the highest common divisor of j and w? 13 Suppose 117 = 6*s + 105. Let r be (-8 + 6)/((-5)/(45/s)). Calculate the greatest common divisor of 117 and r. 9 Let t(z) = -z**3 + 18*z**2 + 41*z + 7. Suppose 0*f = -4*f - 24. Let p be -3 + 1 - 132/f. Let a be t(p). What is the highest common divisor of a and 63? 9 Let t(z) = -838*z**3 + 2*z**2 + 6*z - 10. Let y be t(-2). What is the greatest common divisor of y and 30? 30 Suppose 10*n - 16*n + 36 = 0. Suppose f - 3*p - 65 = 0, -n*f + 9*f = p + 155. What is the highest common factor of f and 25? 25 Let t(a) = 6*a - 39. Let v be t(6). Let l(h) = -7*h - 11. Let b be l(v). Suppose b*i + 4 = 24. Calculate the highest common factor of i and 26. 2 Let q = -30233 + 30259. Calculate the greatest common factor of q and 10517. 13 Let d be (-1596)/(-1330)*(-195)/(-9). Let m(y) = -2*y**3 - 8*y - 4. Suppose 4*f - 3 = -23. Let x be m(f). What is the greatest common factor of x and d? 26 Let x be ((-13)/78)/(1/(-30)). Suppose x*o = 4*m + m - 990, 4*m - 5*o - 792 = 0. What is the greatest common factor of 18 and m? 18 Let l(p) = 31*p**2 - 143*p + 565. Let x be l(5). Calculate the highest common factor of x and 1750. 125 Suppose 0 = 5*z + 2*n - 366, -7 - 61 = -z - 3*n. Let t = z + 179. Calculate the highest common divisor of 11 and t. 11 Suppose 5*w - 138 = -5*j - 13, -4*w - 68 = -3*j. Calculate the greatest common factor of j and 426. 6 Let u(z) = -z**3 - 72*z**2 + 226*z + 87. Let v be u(-75). Calculate the highest common divisor of 524 and v. 4 Let t(l) be the second derivative of 23*l + 0 + 7/2*l**3 + 2*l**2. Let w be t(1). Calculate the greatest common factor of 10 and w. 5 Suppose 0 = -99*p + 105*p - 174. Suppose -6*c - p*c = -105. Calculate the highest common factor of 213 and c. 3 Suppose -36*w + 5 = -40*w + 189. Let n be ((-345)/(-5))/(9/66). What is the greatest common divisor of n and w? 46 Suppose 67 = r - 2*n, 0 = -3*r + n + 1527 - 1356. What is the greatest common divisor of r and 913? 11 Let k = 37 - 26. Suppose -21*x = -3936 - 7362. Let q = -450 + x. Calculate the greatest common divisor of k and q. 11 Let z = 12114 - 10266. Calculate the greatest common divisor of 165 and z. 33 Let v(c) = -11*c - 43. Let o(d) = -d**3 - 6*d**2 + 55*d - 8. Let t be o(5). Let l be v(t). Calculate the highest common divisor of 108 and l. 9 Suppose -4*w + b - 395 = 0, 0 = 4*w - 3*b + b + 394. Let q = -11 - w. What is the highest common divisor of q and 1144? 88 Let g be (0 - 1 - -1) + 35. Let y(z) = 3*z**3 + 46*z**2 - 35*z - 13. Let a be y(-16). Calculate the highest common divisor of a and g. 35 Suppose -16 = 4*y + 5*d, -y - d = 3*d + 15. Let v be (y/3)/(-5*2/(-1170)). Let q = v + -27. What is the greatest common divisor of q and 6? 6 Let i be -2*2 + (-3 - -2). Let n be (-3 - -1 - -1)*i. Suppose -2*c + 305 = n*x, 0*c - 4*c + 3*x + 545 = 0. What is the greatest common divisor of 28 and c? 28 Let j(w) = -8 - 4*w**2 + 11*w**2 + 21 - 45*w + 57*w + 14. Let b be j(-5). What is the highest common factor of 2 and b? 2 Suppose 34*b - 31*b + 27 = 0. Let v be -3 + (-184)/(-12) - (-3)/b. Suppose -510 = 2*n - v*n. What is the highest common divisor of 34 and n? 17 Let k(v) = 7*v**2 - 5*v - 6. Suppose 0 = 30*m + 199 - 79. Let n be k(m). What is the highest common factor of 7 and n? 7 Let p = 15423 - 15059. What is the greatest common divisor of 2639 and p? 91 Let x = -40 - -54. Let l(t) = t**2 - 5*t + 58. Let s be l(x). Suppose -i - 172 = -s. What is the highest common divisor of i and 54? 6 Let i(w) = w**3 - 24*w**2 + 53*w + 72. Let g be i(22). Let f be ((-4)/10)/(1/(-75)). Calculate the greatest common divisor of g and f. 30 Let u be 12*-49*((-10)/5 - -3). Let z = 596 + u. Calculate the greatest common factor of 296 and z. 8 Let o be ((-5115)/(-77))/((-6)/(-84)). What is the highest common factor of o and 120? 30 Let a = 14 - -4. Let b = -5907 + 5895. Let y = a - b. What is the greatest common factor of 105 and y? 15 Suppose 0 = -4*z - 3*k + 367 - 35, 0 = 5*k - 20. Calculate the highest common factor of 520 and z. 40 Suppose -8*x - 10 + 34 = 0. Suppose -2*h = p + 17 - x, -5*h + 21 = -p. Let u be ((-42)/18)/(p/(-6) - 3). What is the greatest common divisor of 49 and u? 7 Suppose -2239 = -31*m + 5*m - 575. What is the highest common divisor of 216 and m? 8 Suppose -26 = 5*s - 56. Let j be 1 - s - 62*(1 - 2). Calculate the greatest common factor of 3 and j. 3 Let v be (111225 - 18)/19 + (1 - 2). Calculate the highest common divisor of 44 and v. 44 Let p = 4293 - 1683. Calculate the greatest common factor of p and 348. 174 Let g = -122 + 137. Let h = -207 - -112. Let q be 3/(-9) - h/g. Calculate the highest common factor of 72 and q. 6 Suppose 2*x = -4*r + 218 + 226, 2*r + 5*x = 230. Let k = r + -86. What is the greatest common divisor of 348 and k? 12 Let n(j) = j**3 + 6*j**2 - 2. Let k be n(-6). Let s be (k/6)/(1 + (-352)/348). What is the highest common divisor of s and 87? 29 Let p be -2*(-5 + 4)*131. Suppose -4*v - 5*c - 504 = -c, -2*v + 3*c - p = 0. Let j = -118 - v. What is the highest common factor of j and 20? 10 Let t(s) = -9*s**2 - 949*s - 5. Let j be t(-22). Calculate the highest common factor of 83 and j. 83 Suppose -x = -5*d + 41 + 23, -3*d - 3*x + 24 = 0. Let y = -703 - -706. Calculate the greatest common factor of d and y. 3 Suppose -6*m + 20 = -100. Suppose -m = -3*g - 59. Let p(b) = b**3 + 12*b**2 - 13*b + 10. Let t be p(g). Calculate the highest common divisor of t and 60. 10 Suppose 105 - 33 = 4*z. Suppose -202 = -5*w + 68. Let b = w + 72. What is the highest common factor of b and z? 18 Let t = -7909 - -7921. Calculate the highest common factor of t and 176. 4 Suppose -l - 136 = 2*l + 4*c, 5*l + 244 = 2*c. Let f = -38 - l. What is the greatest common divisor of f and 60? 10 Suppose 4*x - 72 = 3*t, t - 99 = -3*x - 32. Calculate the greatest common factor of 2037 and x. 21 Let j = -5932 - -5956. What is the highest common divisor of j and 1404? 12 Let x = 42
Low
[ 0.495890410958904, 22.625, 23 ]
1. Field of the Invention The present invention relates to a vehicle periphery viewing apparatus for capturing images in the periphery of a vehicle with an image capturing device and displaying the sensed images on a display device in the vehicle. 2. Description of the Related Art In the field of vehicles, for example, in order to facilitate a driver to see an area behind a vehicle, the area is captured by a back camera installed in the rear of the vehicle and the captured area is displayed on a display device such as a liquid crystal panel installed in the vehicle. Requirements for such a back camera can include the following two points. (1) Seeing walkers, obstacles and so on in the periphery of a vehicle using a camera image. (2) Grasping the sense of distance between a vehicle and another vehicle or an obstacle such as a wall with a resolution of 10 cm, for example, when the vehicle reverses. Of both points, point (1) can be achieved by using a typical original image of the back camera. FIG. 8 shows an original image captured by the back camera. As can be seen from the original image, since a back camera 1 is installed at a height H from the ground level, as shown in FIG. 9, the original image which falls within a visual field range 3 of the back camera 1 is captured at a point of view from which an object is obliquely seen downward. Regarding point (2), for example, as shown in FIG. 10, it is possible to grasp the sense of distance by transforming an image at the point of view from which an object is obliquely seen downward into an image of a plan view coordinate using a view point conversion technique such as a geometrical correction for an image.
Mid
[ 0.5666666666666661, 38.25, 29.25 ]
Plot Chun Soo-Ro (Ko Hyun-Jung) is a woman that is plagued by panic disorders. In the past, she relied on her sister to help her, but her sister is now about to leave the country. At the Busan port terminal, where her sister just departed, Chun Soo-Ro suddenly suffers another panic attack. At this time, a nun approaches Chun Soo-Ro and helps her take her medication. Later, the nun asks Chun-Soo-Ro to deliver flowers and a cake to a man that the nun confesses she loves. Chun Soo-Ro agrees to make the delivery and goes to the hotel room where the man is staying. Nobody answers the door, but the hotel room door is unlocked and slightly ajar. Chun Soo-Ro then walks into the hotel room to drop off the delivery. She becomes shocked when she sees a man, stabbed to death in a chair. Three other men then enter the hotel room. Chun Soo-Ro is able to hide when the men enter the room and then make a quick escape. Unbeknownst to Chun Soo-Ro, she is now wanted by the cops and two groups of menacing gangs. The cops want Chun Soo-Ro as they believe she is part of a drug dealing operation and the two gangs want Chun Soo-Ro to get back the drugs that was supposed to be delivered in the cake box. Notes August 12, 2011 - filming for "Miss Conspirator" was halted due to poor health experienced by director Jung Bum-Sik. Filming began three months ago with approximately 35% of the shooting completed. A search for a replacement director is now being conducted. September 22, 2011 - actors Choi Min-Sik and Kim Tae-Woo dropped out filming for "Miss Conspirator" due to filming delays. TOKOct 10 2011 4:21 pm Can't believe...two Great Actors dropped out due to filming delays...it was prefect role for Choi Min Sik...and very shocking role for Kim Tae Woo.....I was really excited......Anyway, Lee Mun Shik and Park Shin Yang are good too....
Low
[ 0.472422062350119, 24.625, 27.5 ]
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.openide.util.lookup; import org.openide.util.lookup.AbstractLookup.Pair; import java.lang.ref.WeakReference; import java.util.*; import java.util.concurrent.Executor; import org.openide.util.Lookup.Item; /** A special content implementation that can be passed to AbstractLookup * and provides methods for registration of instances and lazy instances. * <PRE> * {@link InstanceContent} ic = new {@link InstanceContent#InstanceContent() InstanceContent()}; * {@link Lookup} lookup = new {@link AbstractLookup#AbstractLookup(org.openide.util.lookup.AbstractLookup.Content) AbstractLookup(ic)}; * * ic.{@link #add(java.lang.Object) add(new Object ())}; * ic.{@link #add(java.lang.Object) add(new Dimension (...))}; * * {@link java.awt.Dimension Dimension} theDim = lookup.lookup ({@link java.awt.Dimension Dimension}.class); * </PRE> * * @author Jaroslav Tulach * * @since 1.25 */ public final class InstanceContent extends AbstractLookup.Content { /** * Create a new, empty content. */ public InstanceContent() { } /** Creates a content associated with an executor to handle dispatch * of changes. * @param notifyIn the executor to notify changes in * @since 7.16 */ public InstanceContent(Executor notifyIn) { super(notifyIn); } /** Adds an instance to the lookup. If <code>inst</code> already exists * in the lookup (equality is determined by object's {@link Object#equals(java.lang.Object)} * method) then the new instance replaces the old one * in the lookup but listener notifications are <i>not</i> delivered in * such case. * * @param inst instance */ public final void add(Object inst) { addPair(new SimpleItem<Object>(inst)); } /** Adds a convertible instance into the lookup. The <code>inst</code> * argument is just a key, not the actual value to appear in the lookup. * The value will be created on demand, later when it is really needed * by calling <code>convertor</code> methods. * <p> * This method is useful to delay creation of heavy weight objects. * Instead just register lightweight key and a convertor. * <p> * To remove registered object from lookup use {@link #remove(java.lang.Object, org.openide.util.lookup.InstanceContent.Convertor)} * with the same arguments. * * @param inst instance * @param conv convertor which postponing an instantiation, * if <code>conv==null</code> then the instance is registered directly. */ public final <T,R> void add(T inst, Convertor<T,R> conv) { addPair(new ConvertingItem<T,R>(inst, conv)); } /** Remove instance. * @param inst instance */ public final void remove(Object inst) { removePair(new SimpleItem<Object>(inst)); } /** Remove instance added with a convertor. * @param inst instance * @param conv convertor, if <code>conv==null</code> it is same like * remove(Object) */ public final <T,R> void remove(T inst, Convertor<T,R> conv) { removePair(new ConvertingItem<T,R>(inst, conv)); } /** Changes all pairs in the lookup to new values. Converts collection of * instances to collection of pairs. * @param col the collection of (Item) objects * @param conv the convertor to use or null */ public final <T,R> void set(Collection<T> col, Convertor<T,R> conv) { ArrayList<Pair<?>> l = new ArrayList<Pair<?>>(col.size()); Iterator<T> it = col.iterator(); if (conv == null) { while (it.hasNext()) { l.add(new SimpleItem<T>(it.next())); } } else { while (it.hasNext()) { l.add(new ConvertingItem<T,R>(it.next(), conv)); } } setPairs(l); } /** Convertor postpones an instantiation of an object. * @since 1.25 */ public static interface Convertor<T,R> { /** Convert obj to other object. There is no need to implement * cache mechanism. It is provided by * {@link Item#getInstance()} method itself. However the * method can be called more than once because instance is held * just by weak reference. * * @param obj the registered object * @return the object converted from this object */ public R convert(T obj); /** Return type of converted object. Accessible via * {@link Item#getType()} * @param obj the registered object * @return the class that will be produced from this object (class or * superclass of convert (obj)) */ public Class<? extends R> type(T obj); /** Computes the ID of the resulted object. Accessible via * {@link Item#getId()}. * @param obj the registered object * @return the ID for the object */ public String id(T obj); /** The human presentable name for the object. Accessible via * {@link Item#getDisplayName()}. * @param obj the registered object * @return the name representing the object for the user */ public String displayName(T obj); } /** Instance of one item representing an object. */ final static class SimpleItem<T> extends Pair<T> { private T obj; /** Create an item. * @obj object to register */ public SimpleItem(T obj) { if (obj == null) { throw new NullPointerException(); } this.obj = obj; } /** Tests whether this item can produce object * of class c. */ public boolean instanceOf(Class<?> c) { return c.isInstance(obj); } /** Get instance of registered object. If convertor is specified then * method InstanceLookup.Convertor.convertor is used and weak reference * to converted object is saved. * @return the instance of the object. */ public T getInstance() { return obj; } @Override public boolean equals(Object o) { if (o instanceof SimpleItem) { return obj.equals(((SimpleItem) o).obj); } else { return false; } } @Override public int hashCode() { return obj.hashCode(); } /** An identity of the item. * @return string representing the item, that can be used for * persistance purposes to locate the same item next time */ public String getId() { return "IL[" + obj.toString(); // NOI18N } /** Getter for display name of the item. */ public String getDisplayName() { return obj.toString(); } /** Method that can test whether an instance of a class has been created * by this item. * * @param obj the instance * @return if the item has already create an instance and it is the same * as obj. */ @Override protected boolean creatorOf(Object obj) { return obj == null ? null == this.obj : obj.equals(this.obj); } /** The class of this item. * @return the correct class */ @SuppressWarnings("unchecked") public Class<? extends T> getType() { return (Class<? extends T>)obj.getClass(); } } // end of SimpleItem /** Instance of one item registered in the map. */ final static class ConvertingItem<T,R> extends Pair<R> { /** registered object */ private T obj; /** Reference to converted object. */ private WeakReference<R> ref; /** convertor to use */ private Convertor<? super T,R> conv; /** Create an item. * @obj object to register * @conv a convertor, can be <code>null</code>. */ public ConvertingItem(T obj, Convertor<? super T,R> conv) { this.obj = obj; this.conv = conv; } /** Tests whether this item can produce object * of class c. */ public boolean instanceOf(Class<?> c) { return c.isAssignableFrom(getType()); } /** Returns converted object or null if obj has not been converted yet * or reference was cleared by garbage collector. */ private R getConverted() { if (ref == null) { return null; } return ref.get(); } /** Get instance of registered object. If convertor is specified then * method InstanceLookup.Convertor.convertor is used and weak reference * to converted object is saved. * @return the instance of the object. */ public synchronized R getInstance() { R converted = getConverted(); if (converted == null) { converted = conv.convert(obj); ref = new WeakReference<R>(converted); } return converted; } @Override public boolean equals(Object o) { if (o instanceof ConvertingItem) { return obj.equals(((ConvertingItem) o).obj); } else { return false; } } @Override public int hashCode() { return obj.hashCode(); } /** An identity of the item. * @return string representing the item, that can be used for * persistance purposes to locate the same item next time */ public String getId() { return conv.id(obj); } /** Getter for display name of the item. */ public String getDisplayName() { return conv.displayName(obj); } /** Method that can test whether an instance of a class has been created * by this item. * * @param obj the instance * @return if the item has already create an instance and it is the same * as obj. */ protected boolean creatorOf(Object obj) { if (conv == null) { return obj == this.obj; } else { return obj == getConverted(); } } /** The class of this item. * @return the correct class */ @SuppressWarnings("unchecked") public Class<? extends R> getType() { R converted = getConverted(); if (converted == null) { return conv.type(obj); } return (Class<? extends R>)converted.getClass(); } } // end of ConvertingItem }
Mid
[ 0.543650793650793, 34.25, 28.75 ]
Q: Inno Setup, detecting if a parameter file exists? I'm created a setup for a .NET project. The intention is to automatically build in other MSI's and required packages so that it can scan the system and then automatically install the correct packages as required. What I have so far: [Files] ; Ensure all the prerequisites are installed Source: "C:\3subTimeKeeingApp\3sunptk\prerequisites\mysql-connector-net-6.8.3.msi"; Check: needsMySQLNET; DestDir: "{tmp}"; DestName: "mysqlNET.msi"; Flags: solidbreak Source: "C:\3subTimeKeeingApp\3sunptk\prerequisites\mysql-connector-odbc-5.3.2-win32.msi"; Check: needsMySQLODBC; DestDir: "{tmp}"; DestName: "mysqlODBC.msi"; Flags: solidbreak Source: "C:\3subTimeKeeingApp\3sunptk\prerequisites\sharepointclientcomponents_x64.msi"; Check: (IsWin64 and needsSharePtClient); DestDir: "{tmp}"; DestName: "sharept.msi"; Flags: solidbreak Source: "C:\3subTimeKeeingApp\3sunptk\prerequisites\sharepointclientcomponents_x86.msi"; Check: ((not IsWin64) and needsSharePtClient); DestDir: "{tmp}"; DestName: "sharept.msi"; Flags: solidbreak Source: "C:\3subTimeKeeingApp\3sunptk\prerequisites\NDP451-KB2858728-x86-x64-AllOS-ENU.exe"; Check: needsFramework; DestDir: "{tmp}"; DestName: "NDP451.exe"; Flags: ignoreversion [Run] Filename: "msiexec.exe"; Parameters: "/i ""{tmp}\mysqlNET.msi"""; Filename: "msiexec.exe"; Parameters: "/i ""{tmp}\mysqlODBC.msi"""; Filename: "msiexec.exe"; Parameters: "/i ""{tmp}\sharept.msi"""; Filename: "{tmp}\NDP451.exe"; Parameters: "/q:a /c:""install /l /q"""; WorkingDir: {tmp}; Flags: skipifdoesntexist; StatusMsg: Installing .NET Framework if needed. This may take several minutes. [Code] //-------------------------------------------------------------------------------- // .NET helpers //-------------------------------------------------------------------------------- function isDotNet451Detected(): Boolean; var success: Boolean; release: Cardinal; begin success := RegQueryDWordValue(HKLM, 'SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\', 'Release', release); //For .net versions //http://msdn.microsoft.com/en-us/library/hh925568%28v=vs.110%29.aspx#net_b Result := success and (release = 378758); end; function needsFramework(): Boolean; begin Result := (isDotNet451Detected = False); end; //-------------------------------------------------------------------------------- // MySQL .NET connector 6.8.3 //-------------------------------------------------------------------------------- function isMySQLNETconnectorInstalled(): Boolean; var success: Boolean; version: String; begin success := RegQueryStringValue(HKLM, 'SOFTWARE\Wow6432Node\MySQL AB\MySQL Connector/Net\', 'Version', version); Result := success and (CompareStr(version, '6.8.3') = 0); end; function needsMySQLNET(): Boolean; begin Result := (isMySQLNETconnectorInstalled = False); end; //-------------------------------------------------------------------------------- // MySQL ODBC Connector 5.3 //-------------------------------------------------------------------------------- function isMySQLODBCconnectorInstalled(): Boolean; var success: Boolean; version: String; begin success := RegQueryStringValue(HKLM, 'SOFTWARE\MySQL AB\MySQL Connector/ODBC 5.3\', 'Version', version); Result := success and (CompareStr(version, '5.3.2') = 0); end; function needsMySQLODBC(): boolean; begin Result := (isMySQLODBCconnectorInstalled = False); end; //-------------------------------------------------------------------------------- // Sharepoint client components //-------------------------------------------------------------------------------- function isSharepointClientInstalled(): Boolean; begin Result := RegKeyExists(HKLM, 'SOFTWARE\Microsoft\SharePoint Client Components'); end; function needsSharePtClient(): Boolean; begin Result := (not isSharepointClientInstalled); end; The checks in 'Files' section work well, however the 'Run' section tries to install the files which are specified in the 'Parameters' option and these aren't present so I get an error message. My question is, is there a way to detect if the file specified in 'Parameters' exists before attempting to install? I've tried BeforeInstall but not sure how to use it as it doesn't seem to accept a return. Thank you, A: First off, I would recommend you moving your prerequisites installation into the PrepareToInstall event. That's the proper place for installing prerequisites. To answer your question, no, there is no way to detect if the file specified in the Parameters param exists before entry processing as well as you cannot get that parameter value in script. But if you'll stay by the way you are installing your prerequisites, you can still do (at least) the following: reuse your existing Check functions also for your [Run] section entries write for your [Run] section entries Check functions for instance just with the FileExists function (however that would require to copy/paste those file names from your Parameters params) use the AfterInstall functions to immediately run the just processed [Files] entry (which would change the time when the installer would be executed)
Mid
[ 0.5603217158176941, 26.125, 20.5 ]
Charles Packe (MP) Charles William Packe (23 September 1792 – 27 October 1867) was a British Conservative Party politician. Family Packe was the oldest son of Charles James Packe and Penelope Dugdale, daughter of Richard Dugdale of Blyth Hall. He was also the brother of Great Northern Railway deputy chairman and Liberal politician George Hussey Packe. He married Kitty Jenkyn Reading, daughter of Thomas Hort, in 1822. Wealth He inherited Prestwold Hall upon his father's death in 1837, and later acquired Glen Hall and an 18-acre estate in southern Leicestershire for £2,530 in 1837 and, a decade later, Stretton Hall for £30,000, financed by a mortgage from Sir George Robinson. In 1842, he commissioned William Burn to redesign Prestwold Hall, spending a reported £70,000 over the next two decades on improvements and further land close to the hall. A decade later, he spent £12,000 on a house and 745 acres of land at Branksome in Dorset, also using Burn, via a loan of £7,000. Packe was also a keen investor in bank stock, government consols, and railway shares, the latter of which he had £4,050 in during the mid-1840s. By the time of his death, Packe owned 2,464 acres in Leicestershire, worth £4,267 gross a year, with a gross personal wealth of £35,000. Political career He was elected MP for South Leicestershire at a by-election in 1836 and held the seat until his death in 1867. During this time, he rented a home at Richmond Terrace, just off Whitehall, in London. References External links Category:Conservative Party (UK) MPs for English constituencies Category:UK MPs 1835–1837 Category:UK MPs 1837–1841 Category:UK MPs 1841–1847 Category:UK MPs 1847–1852 Category:UK MPs 1852–1857 Category:UK MPs 1857–1859 Category:UK MPs 1859–1865 Category:UK MPs 1865–1868 Category:1792 births Category:1867 deaths
Mid
[ 0.6165413533834581, 25.625, 15.9375 ]
{ "polygons": [ { "vertices": [0, 0, 0, 1, 2, 0, 2, 3, 0] } ] }
Mid
[ 0.538461538461538, 29.75, 25.5 ]
Does distance matter? Increased induction rates for rural women who have to travel for intrapartum care. Although there has been a devolution of local rural maternity services across Canada in the past 10 years in favour of regional centralization, little is known about the health outcomes of women who must travel for care. The objective of this study was to compare intervention rates and outcomes between women who live adjacent to maternity service with specialist (surgical) services and women who have to travel for this care. The BC Perinatal Database Registry provided data for maternal and newborn outcomes by delivery hospital for 14 referral hospitals (selected across a range of 250-2500 annual deliveries) between 2000 and 2004. Three hospitals were selected for sub-analysis on the basis of almost complete capture of the satellite community population (greater than 90%) to avoid referral bias. Women from outside the hospital local health area (LHA) had an increased rate of induction of labour compared with women who lived within the hospital LHA. Sub-analysis by parity demonstrated that multiparous women had increased rates of induction for logistical reasons. Rural parturient women who have to travel for care are 1.3 times more likely to undergo induction of labour than women who do not have to travel. Further research is required to determine why this is the case. If it is a strategy to mitigate stress incurred due to separation from home and community, either a clinical protocol to support geographic inductions or an alternative strategy to mitigate stress is needed.
Mid
[ 0.6538461538461531, 31.875, 16.875 ]
Rouhani to Participate in OIC Summit, Meet Kazakh Leader In a separate meeting with his Uzbek counterpart, Shavkat Mirziyoyev, also on Sunday, President Rouhani said Iran sees no obstacle in the way to deepen its bilateral relations with Uzbekistan as "a friendly country". The Summit aims to identify priorities, goals and targets for the advancement and promotion of science, technology and innovation in the OIC Member States. She also thanked the Government of Kazakhstan for the hospitality and good organisation of the Summit and its following meetings. The agreement was reached during a meeting between President Mamnoon Hussain and Prime Minister of Kazakhstan Bakytzhan Sagintayev who arrived at the President's residence for a one-on-one meeting. Participants at the summit are expected to adopt the Astana Declaration and the OIC Action Plan for the next 10 years, the FO said. LCBO To Oversee Pot Sales Ottawa plans to legalize marijuana by July of 2018, but is leaving it up to the provinces to design their own regulatory system. Legalization would make Canada the second country to have nationwide legalization, after Uruguay. The Custodian of the Two Holy Mosques stressed that the OIC Summit on Science and Technology held in Astana emanates from the values of Islam and the principles of the OIC Charter which emphasize the importance of science and knowledge as a fundamental element for the achievement of sustainable social and economic development. The president's entourage includes officials from the Office of the President, Ministry of Foreign Affairs and Ministry of Science and Technology. He will emphasise that the contributions of the member states individually, jointly or collectively to science and technology would enhance the image of the Muslims, embolden their position in the world and give them due respect in global debate and discourse while improving the conditions of the Ummah. The Omani delegation and other delegations attended the closing ceremony of the Expo 2017 hosted by the City of Astana under the title "Future Energy". RELATED NEWS Apple iPhone 8, iPhone 7s Plus, and iPhone 7s rumored prices These are more than just animated emoji and will use face tracking and voice recording to create a more expressive experience. According to Trusted Reviews, the iPhone 8 [VIDEO ] is expected to arrive with a 5.8-inch edge-to-edge OLED display . 9/10/2017 Zello app does not work without cell coverage Let's be honest - a lot of TV-station-based hurricane tracker apps feel like they are trying to scare you rather than inform you. If your phone has low battery, Zello recommends turning off the app and enabling push notifications when it is not in use. 9/10/2017 Number of Rohingya refugees in Bangladesh surges She says: "We are seeing the mushrooming of these very flimsy shelters that will not be able to house people for too long". Tutu, who helped dismantle apartheid in South Africa and became the moral voice of the nation, joined in the condemnation. 9/10/2017 A sinister Pennywise returns with a big dose of nostalgia However, Bill Skarsgard is reportedly having "mixed feelings" about returning to the franchise to play Pennywise a second time. Finn Wolfhard , one of the stars of the Netflix cult hit " Stranger Things ", is enjoyable as Bill's best pal Richie. 9/10/2017 NY regulator fines Habib Bank $225mn for compliance failures In a legal filing, DFS has alleged that the bank has failed to work according to the rules in anti money laundering cases. The bank had already agreed to surrender its licence to operate a branch in NY and unwind its operations there. 9/09/2017 Country singer, Don Williams dies at 78 Turn on Houston's Country Legends 97.1 right now, and it's a safe bet one of Williams songs' will come on before the hour is up. His 1981 duet of Townes Van Zandt's "If I Needed You" with Emmylou Harris remains a staple in the world of folk music. 9/09/2017
Mid
[ 0.570135746606334, 31.5, 23.75 ]
PANAMA CITY, Fla. — Gregg Ebersole trekked to the Panama City Marina from his devastated neighborhood on Thursday morning to find a miraculous sight: Nestled amid the twisted metal on the damaged dock was his boat, just as he had left it on a rack. "Everything is tossed around like it's a toy," said Ebersole, surveying the aftermath. "Mine is sitting there all nice and pretty." It was a small dose of comfort after Hurricane Michael thrashed the Florida Panhandle on Wednesday and blew apart much in its path. Ebersole's single-story brick home survived, but he said he was caught flat-footed by the report that Michael had intensified into a powerful Category 4 storm quickly as it guzzled warm water on its advance up the Gulf of Mexico. "If I knew it was going to be a Cat 4 with a direct hit, I never would have stayed," Ebersole said. "Two days ago, we were out boating in the sunshine. This snuck up on us so quick." He added that he had advice for those thinking of riding out such a violent storm: "Don't do it. Get out." Michael, a brute of a hurricane that brought a storm surge of up to 14 feet and ferocious 155-mph winds, became the first Category 4 to make landfall along the Florida Panhandle. At least two people, including an 11-year-old girl in Georgia, were killed. More than 850,000 customers remained without power Thursday morning in Florida and Georgia, where Michael, since downgraded to a tropical storm, was moving across on its way to the Carolinas. Michael has mangled almost everything to some degree: Hi-rise condos in Panama City Beach saw parts of their roofs peeled off. Trees snapped and fell on structures in Panama City, home to about 37,000 residents. And swaths of nearby Mexico Beach, a small town where the hurricane made landfall Wednesday afternoon, appeared leveled. One Facebook user who posted video from Panama City wrote that the damage "looks like a complete war zone ... Panama City will never be the same." Hurricane aftermath at Legendary Marine Panama City Beach, Florida on Oct 10, 2018. Kerry Sanders Panama City resident Missy Theiss said she was going to remain in her home because she couldn't find a place that would take her and her five pets if they evacuated. On Thursday morning, with two trees lying lopsided on her roof and her backyard ravaged, she realized she made the wrong choice. "At this point, if I had to rewind, all the animals would be in the vehicle and we would have just been heading north," said Theiss, 54. After driving to her son's home in Panama City Beach, a tourist destination known for its emerald waters and white sands, she became emotional. "How something so beautiful can be turned into something so wicked and deadly is just amazing," she said. "I've never seen anything like it." FEMA Administrator Brock Long said search and rescue teams were continuing to comb through the debris, but getting to the hardest hit areas remained hazardous. An 80-mile stretch of Interstate 10, which weaves through the Panhandle, was also closed Thursday so crews could clear roads. Social media posts included surreal scenes of wreckage that residents had woken up to. Margie Duncan, 70, was alone with her two dogs when the hurricane bore down on Callaway, just to the east of Panama City. She said the strong winds — possibly tornadoes — clipped the patio off her home and ripped off a tarp covering her roof. "This was the strongest and harshest storm I'd ever seen," Duncan said. As the eyewall of Michael passed over, she said, she and her neighbors briefly went outside before taking cover again. She later spoke with her daughter, who said she was relieved that her mother came out unscathed. Duncan had an unusual outlook about her decision to stay put. "I'm so glad I remained," she said. "That's another thing on my bucket list: I sat through a Category 4 storm and I got to sit through the eye of it." Kerry Sanders reported from Panama City, and Erik Ortiz from New York.
Low
[ 0.5198135198135191, 27.875, 25.75 ]
Hundreds of refugees have returned to live in secret camps in the Calais region in the hope of travelling to the UK, The Independent can reveal, just weeks after the demolition of the 'Jungle' shantytown. There are at least six informal settlements in rural parts of the Nord-Pas-de-Calais region, each housing scores of refugees and migrants, with numbers growing steadily in recent weeks. It comes two months after the closure of the Jungle, which was intended to bring an end to the refugee situation in Calais by destroying the camp and dispersing its residents to reception centres (CAOs) across France — an operation the authorities hailed as a “success”. Calais 'Jungle' exodus: Charity boss likens refugee treatment to Nazi persecution However, scores of refugees and migrants who were taken on buses to CAO centres have now started making the journey back to the north of France. Many of them are children whose asylum claims were rejected by the Home Office earlier this month, and have decided to make their own way to the UK after experiencing poor living conditions in the French centres. One so-called “secret” camp lies on the edge of a small French village called Norrent-Fontes, around 30 kilometres from the port of Calais. Around 130 refugees currently live in the camp, which has existed since 2008, but the numbers have been rapidly growing in recent weeks, as refugees — particularly minors — have begun leaving the reception centres. A camp in Norrent-Fontes has become home to more than 120 refugees (Sue Clayton) Julien Muller, volunteer for a small French charity called Terre d’Errance which supplies aid at the Norrent-Fontes camp, told The Independent: “There are more and more people coming back. This week there has been several dozen people arrive. I suppose it will grow more in the coming months. “With the UK Government closing down its transfers of underage refugees to the UK, there have been a lot of minors coming back. "There are people who are clearly underage and clearly have family in the UK, but they have been told that now it’s closed. Now they're coming back to try make their own way. “Adults are also coming back from centres in bigger numbers. Some wanted to stay in France, but they have been waiting for two months and they haven’t even been given the opportunity to apply for asylum. They've given up.”​ Mr Muller said the camp was one of six dotted around the Nord-Pas-de-Calais region. Sue Clayton, a refugee advocate and professor at Goldsmith's University, discovered the hidden camp earlier this month. Describing it as a “mini-Jungle”, she said the conditions were “dire” and that residents of the informal settlement appeared to be afraid to accept aid for fear of drawing attention to themselves. Professor Clayton said: “It’s a little pocket of woods up a very narrow, single-track lane. You see it through the trees and it's like a mini-Jungle. "The shelters are put together with various bits of wood and tarpaulin — whatever they can grab. There is no support there. They’ve divided themselves up so there’s a men’s section and a women and children’s section. “The authorities will find that more and more of these secret camps will pop up because these people are getting increasingly frustrated. "Many have made the long journey from the centres back to the Calais area which is familiar to them, like a home – or as near to a home as they can make it.” She said the camp is about two kilometres from a lay-by on the highway that leads up to the port of Calais, where lorry drivers often make their last stop before crossing, potentially making it a “trafficker's paradise”. “The inhabitants of the new camp can walk across a couple of fields and there is a lay-by where trucks park overnight – the last stop before they go through the port,” she said. “It’s where the deals are done, well away from the port. It’s a trafficker’s paradise. Everyone around this new camp is vulnerable to them.” Shahajhan Khan, a 15-year-old refugee from Pakistan who has been living in one of the centres designated for children (CAOMIE) in Anemasse, a town on the French-Swiss border, along with 19 other child refugees, said he and his friends were planning to leave the centre and return to Calais. The teenager was recently informed that he and most of his friends had been rejected by the Home Office, and said they now had “no other option” but to return to Calais in the hope of “another Jungle”. He added that they were “living like donkeys” in the centre, and provided The Independent with footage of their warehouse-like sleeping area, and photographs of a meal of bread and yoghurt. “They promised us they would take us to the UK but said we had to be patient. At this centre they treat us like donkeys," Shahajhan said. "We are living in a factory and we are eating expired bread. We have waited in these factories without eating properly and now they are saying we can't go. It means we must go back to Calais. Young refugees in a CAO in Annemasse eating yoghurt and bread they were forced to buy because they say the food supplied was inadequate ( Shahajhan Khan) (Shahjahan Khan) “If they weren’t going to take us they should have told us clearly. We left the Jungle on the condition that we would go to the UK. We accepted these conditions just to go to the UK, and now they are saying we have to give up. “I hope you will see another Jungle soon.” The Nord-Pas-de-Calais prefecture rejected reports that there are six informal settlements in the region, and denied there had been an increase in numbers of refugees. Calais and Dunkirk camps Show all 16 1 /16 Calais and Dunkirk camps Calais and Dunkirk camps (Photo: Alan Schaller) Calais and Dunkirk camps A portrait of an Afghan man wearing a traditional Perhan Turban in the Calais Jungle (Photo: Emily Garthwaite) Calais and Dunkirk camps Two Gendarmes guard the main entrance to the Dunkirk camp (Photo: Emily Garthwaite) Calais and Dunkirk camps One Kurdish Iraqi man’s reminder to himself (Photo: Alan Schaller) Calais and Dunkirk camps Two young boys in the Dunkirk camp (Photo: Alan Schaller) Calais and Dunkirk camps An Iranian hunger striker stands outside the only remaining shelter in the South Side of the Calais camp (Photo: Emily Garthwaite) Calais and Dunkirk camps A church in the South Calais camp, on of the the only structures not demolished in the South Side of the camp (Photo: Emily Garthwaite) Calais and Dunkirk camps A man gets a hair cut in the Calais camp (Photo: Alan Schaller) Calais and Dunkirk camps Night falls on the Calais Jungle. Fires burn in the distance (Photo: Alan Schaller) Calais and Dunkirk camps The containers provided as alternative accommodation for the people in the camps (Photo: Alan Schaller) Calais and Dunkirk camps A young boy in the Dunkirk camp (Photo: Alan Schaller) Calais and Dunkirk camps A man listens to music inside one of the shipping containers (Photo: Emily Garthwaite) Calais and Dunkirk camps The awful living conditions in the Dunkirk camp (Photo: Alan Schaller) Calais and Dunkirk camps An Afghan man in the Calais camp (Photo: Emily Garthwaite) Calais and Dunkirk camps One of the Iranian hunger strikers (Photo: Alan Schaller) Calais and Dunkirk camps A family in their wooden shelter in the new Dunkirk camp (Photo: Alan Schaller) A spokesperson said: “The migrants in the small camps of the Department of the Pas-de-Calais (three in total) are regularly recorded and we have not observed an increase. “Since the dismantling of the Jungle, no new camp has been established in Calais. State Services remain vigilant: the Mobile Coquelles Research Brigade, which was tasked with combating smugglers, was strengthened in September 2016 and police reinforcements are still being mobilised today. “Nonetheless, we observe that migrants continue to be present. Around 200 migrants each week are discovered in heavy goods vehicles during cross-channel controls. “When migrants are found hidden in heavy goods vehicles during cross-channel checks, the state’s response is firm. If it is confirmed that migrants are illegally in national territory, they are placed in detention." A long-time volunteer for refugee charity Calais Migrant Solidarity, who didn't want to be named, predicted that refugees would continue to return in growing numbers. “Migrants used to stay inside the town, but now with the police checks everywhere when they arrive in Calais they quickly go into hiding," he said. "Their plan might be to stay away from the police-controlled areas for now. They will keep quiet and stay in hidden places for a few months and then after the situation will change again, because there will be more and more people coming. The ‘secret camp’ is situated in the countryside, far out from the heavily policed Calais town (Sue Clayton) “The state [the government] claimed the demolition was a success, but the people of Calais know that the people will keep coming. "Until there is a structure to welcome people and give them a right to stay, they will occupy places here.
Low
[ 0.504347826086956, 29, 28.5 ]
Risk factors for late extubation after coronary artery bypass grafting. To evaluate the independent risk factors for late extubation after coronary artery bypass grafting (CABG). Preoperative, intraoperative, and postoperative characteristics of patients undergoing isolated CABG between June 2005 and June 2008 at the Tongji Hospital were retrospectively analyzed. Elapsed time between CABG and extubation of more than 8hours was defined as late extubation. The incidence of late extubation after CABG was 69.23% (288/416). Through univariate and logistic regression analysis, the independent risk factors for late extubation after CABG were older age (odds ratio [OR]=4.804), duration of cardiopulmonary bypass (OR=2.426), perioperative use of intra-aortic balloon pump (OR=1.451), preoperative arterial oxygen partial pressure (OR=.204), and postoperative hemoglobin level (OR=.793). Older age, prolonged cardiopulmonary bypass time, perioperative intra-aortic balloon pump requirement, low preoperative arterial oxygen partial pressure, and low postoperative hemoglobin level were identified as the 5 independent risk factors for late extubation after CABG.
High
[ 0.6728476821192051, 31.75, 15.4375 ]
Q: Is PhoneGap only for NativeApplications or for remote web app HTML pages too? I am new to PhoneGap I want to know whether PhoneGap is only for Native Applications or for remote web app HTML pages too. Please any one answer me. Thank you Lakshmi A: Phonegap! enables software programmers to build applications for mobile devices using JavaScript, HTML5 and CSS3, instead of lower-level languages such as Objective-C/core-java. The resulting applications are hybrid, meaning that they are neither truly native (all layout rendering is done via the webview instead of the platform's native UI framework) nor purely web based (they are not just web apps but packed for appstore distribution, and have access to part of the device application programming interface). You can try Sencha, Ext-JS HTML5! frameworks to create remote web app HTML pages. Phonegap! enables a web developer access to mobile devices's phonebook, Geolocation, compass, accelerometer,etc.(A browser is not exposed to these APIs') Appcelerator Titanium! is another platform for developing mobile, tablet and desktop applications using web technologies.
High
[ 0.6761290322580641, 32.75, 15.6875 ]
Q: Why might excessive drinking produce a false hypercortisolism reading in a urinary free cortisol (UFC) test? From "Diagnosis of Cushing's Syndrome in the Modern Era" by L.K. Nieman, 2018: A urine free cortisol (UFC) result may incorrectly exclude hypercortisolism in patients with a glomerular filtration rate less than 30 mL/min but might falsely diagnose hypercortisolism in individuals drinking more than 5 L of fluid daily. In the former situation, UFC should not be chosen as a screening test." In the latter group of individuals, urinary cortisone and cortisol both increase, so that the effect may be more accentuated in immunoassays in which cortisone cross-reacts with the antibody. Thus, 2 ways of addressing this are to use tandem mass spectroscopy assays (or immunoassays with minimal cross-reactivity) and to ask patients to restrict fluids to 2 L/d. Why is that so? Is it because the body would naturally need to produce more cortisol in order to expel all this water? A: Most of the cortisol entering the kidney is reabsorbed by the proximal tubule; only a small amount escapes and is eventually excreted in the urine. When large amounts of fluid is taken, the re-absorption is less efficient, and more cortisol ends up in the urine. See following quote: increased UFF excretion (when fluid intake is high) is mainly due to the escape of F from reabsorption/metabolism in the proximal tubule (Fenske, 2006; here UFF/F is referring to urinary free cortisol and cortisol, respectively; words in parentheses are mine added for context) Separately, this loss doesn't cause much of a change in systemic cortisol since passage through the urine is only a minor contributor to overall cortisol levels. The Fenske paper referenced below talks more about this issue, and is cited by the paper referred to in the OP. Overall, I think it's important to mark carefully the author's specific words: they indicate that one might falsely diagnose hypercortisolism with heavy fluid intake, but they only caution against use of UFC if the glomerular filtration rate is very low (i.e., in patients with kidney problems). It seems that they simply mean to caution about the potential of abnormally high UFC in the case of an individual with high fluid intake, without an actual systemic increase in cortisol. Fenske, M. (2006). Urinary free cortisol and cortisone excretion in healthy individuals: influence of water loading. Steroids, 71(11-12), 1014-1018.
Mid
[ 0.6492307692307691, 26.375, 14.25 ]
The congestion on I-94 heading towards St Cloud, particularly on sunny Friday afternoons, can be infuriating. It’s understandable that a lot of people are calling for ‘something to be done.’. The quick reaction of politicians and others is a call to widen the thing—$30 million for another lane. Certainly that is the solution, they think. There are a few concerns with this approach. First, we’ve never yet built our way out of congestion. We add roadway and, within a short time, (often just four years according to some studies) the problem is just as bad as before. Second, widening one section of road often just pushes the problem down the road—literally. We might soon be hearing calls for widening further along 94, expanding 15 through St Cloud, and more. Third, this is another few million dollars we could use elsewhere, like dealing with the all day every day congestion and fatalities in the Twin Cities that impact more individuals and businesses every day. There’s also a question of safety (hint, with the same number of daily vehicles, which is safer and faster: a 4-lane highway in Europe or a 6-lane highway in the U.S.?). There’s a possible solution that won’t cost $30 million, can provide relief immediately instead of five to seven years from now, won’t require a year or two of construction headaches, and will increase safety instead of decrease it. Phantom Jam Here’s what happens on a typical Friday afternoon on I-94. Someone drives slower than others in the left lane and a few cars pile up behind him waiting to get by. This micro jam of cars is called a platoon by traffic engineers. Platoons like this are inefficient use of the roadway and their tightly packed nature and enraging of drivers can be quite dangerous. Once the lane blocker at the head of the platoon moves to the right, or everyone behind does to get around him, the platoon moves forward and breaks up. For these drivers it is a bit frustrating, but usually results in only a minor slowdown. However, there’s another platoon lined up behind another lane blocker a few minutes behind this one and another behind that. Over the course of about 20 minutes, in the early afternoon, the gaps between these platoons get narrower and narrower until one platoon comes up on the rear of the platoon in front of it and whammo, you have the beginnings of the day’s phantom traffic jam. And it all started with the left lane blocker who’s now happily 30 minutes ahead of the jam they helped to start. If you are a math or physics minded person, this behavior has been modeled by MIT and others with Poisson Distribution and Fluid Dynamics. For those smart enough to studiously avoid such things, let’s watch a video: Now, assume every car on I-94 is moving at a constant 80 mph (yes, it’s possible in a perfect world, perhaps such as if every car had a radar based dynamic cruise control to keep you exactly ten feet behind the car in front of you). One car brakes for just a very brief moment, which causes the car behind to brake, and so forth. Each car brakes just a little more than the one in front and so about the 80th car brakes to a stop and soon there are 50 cars stopped and jammed up behind number 80. This jam of stopped cars will grow and move backwards through traffic, sometimes for miles. Someone blocking the left or middle lane has the same effect. One engineer describes the resulting jam as a shockwave moving backwards from the lane blocker. We may not be able to prevent this completely in really heavy traffic, but we can likely reduce it quit significantly. Lane Discipline Lane Discipline is using the lanes of a roadway in the most efficient and safe manner as possible and is usually summed up as Keep Right Except To Pass. A huge potential benefit of a four-lane highway, such as I-94, isn’t just to double the capacity of a two-lane rural roadway by having two lanes in the same direction instead of just one, but to multiply the capacity much more. Allowing faster drivers to quickly move around others and then get back in to the flow of traffic allows these drivers to utilize roadway capacity that is otherwise unused. Instead of that driver being in front of you, they are now well down the road and not impacting you. You have more space to the car in front of you and are more comfortable. They are filling an unused gap. And this hasn’t cost anyone anything. Our lack of lane discipline eliminates this benefit. Instead of getting perhaps a threefold increase in capacity by building a four-lane highway in place of a two-lane rural road, we only get about a twofold increase. Lane blocking makes our highways more dangerous and less efficient for everyone. If that first person had not blocked the lane, the people behind him would have proceeded on up the road, leaving the lanes available for those behind them to use. Same for the second person blocking the lane, and each after them. Lane blocking not only creates jams, but prolongs them as well when someone at the head of the jam continues to block the left lane instead of moving right and allowing those behind to move forward and get out of the way of those behind them. If you’re sitting in this traffic at the back of the jam, it’s hard to believe that something so simple as lane discipline can work. Consider, though, that most of the cars around you wouldn’t be here now if the cars in front of them were further down the road instead of blocking them, and on and on up to the left lane blockers at the very front. In front of this jam, just a few miles ahead of you, are miles and miles of I-94 with much lighter traffic—a lot of excess capacity. But a few people are preventing others from using this excess capacity. In Europe, where Lane Discipline is routine, you don’t see the weaving, tailgating, and road rage to the extent we have here in the U.S. Their highways are more efficient, people drive faster and at more consistent speeds, and yet they have fewer fatalities and many fewer crashes. Their law enforcement knows the importance of keeping the lanes open for traffic flow and are much quicker to ticket someone for blocking a lane (left or middle) than speeding. In the U.S., some western states have enforced lane discipline for years and recently Texas began doing so and New Jersey recently began heavier enforcement and increased fines for blocking the left lane. Minnesota already has a law (169.18(10)) requiring slower vehicles, regardless of their speed or the speed limit, to move right, we just need to begin enforcing it. Many people think that this applies only to vehicles moving slower than the speed limit, but that is not the case and may be the crux of the problem. Perhaps more important, people need to understand why we have that law and why it’s being enforced. They need to understand that blocking the left lane isn’t just against the law, but that their blocking the lane makes our roadways significantly more dangerous for everyone and needlessly causes a traffic jam. Another way to think of it is this—Mind The Gap–if the car behind you is closer than the car in front of you, you likely need to move right and let others utilize the space in the gap in front of you. Tailgating is dangerous. Enraging other drivers is dangerous. Weaving in and out of traffic is dangerous. Inconsistent speeds in the same lane is dangerous. Passing on the right is dangerous. And we effectively encourage all of this by not enforcing lane discipline—Keep Right Except To Pass. We likely have enough road surface, we just need to use it more safely and efficiently. We have nothing to lose and potentially much to gain by enforcing some lane courtesy. If traffic continues to be a significant problem, then we can consider spending millions for extra lanes. The next time you’re stuck in a “phantom” traffic jam, MITs term for those jams that you get to the front of only to find nothing there to have obviously caused it, consider this; You are likely in this jam thanks to a lane blocker or two. If people five, ten, or thirty minutes ago hadn’t blocked the left lane, the people in front of you would be further down the road right now instead of sitting in front of you. Share this: Email Facebook Twitter Reddit
Low
[ 0.517777777777777, 29.125, 27.125 ]
State of chromatin sensitivity to DNase I in the rat Ig-beta/growth hormone locus determined by real-time PCR. Using Ig-beta and growth hormone producing cells with liver-derived cells for controls, sensitivity of chromatin to DNase I was measured by real-time PCR at eleven targets in rat Ig-beta/growth hormone locus where four cell type-specific genes and two ubiquitously expressed genes are present in a compact 88-kb region. Chromatin situated at the promoter of actively-transcribed gene and placed at cell type-specific DNase I hypersensitive sites with enhancer activity was sensitive to DNase I. In the case of inactive gene, chromatin located in these regions was resistant to DNase I. Unexpectedly, however, chromatin placed in the transcribed intron was resistant to DNase I in two genes. DNase I sensitive chromatin was shown not to distribute locus-widely but rather to localize at the promoter and the enhancer of actively-transcribed genes in this locus.
Mid
[ 0.627249357326478, 30.5, 18.125 ]
Visual evoked potential changes following renal transplantation. We have followed a group of 18 uremic patients through living-related donor renal transplantation (RTX) using pattern-reversal VEPs. Recordings were made prior to and 10 weeks after surgery at high, medium and low spatial frequencies. Prior to RTX, mean latency of the P100 component of the VEP was 107 msec. Individual values did not correlate with blood urea nitrogen or creatinine. Patients requiring hemodialysis did not differ from non-dialyzed patients. Ten weeks after RTX P100 latencies were significantly shortened while N75 latencies were unchanged. Several diabetic patients exhibited the appearance of previously unrecorded wave forms. P100 latency increased significantly with increasing spatial frequency before and after transplantation. Diabetic patients demonstrated a consistent increase in P100 amplitude while non-diabetic patients demonstrated a consistent decrease in P100 amplitude after RTX. The data indicate that renal transplantation has beneficial effects on the central nervous system of uremic patients not seen with chronic hemodialysis and that these effects may be quantitatively measured using the VEP. The data further suggest that electrophysiological effects of uremia and diabetes may be additive, but reversible after RTX. Alterations in the uremic and diabetic VEP may be related to retinal or more proximal central nervous system structures.
Mid
[ 0.6546391752577321, 31.75, 16.75 ]
1. Field of the Invention The present invention relates to a method for manufacturing a semiconductor device, which the method is capable of efficient mass production of high-performance semiconductor devices by, upon manufacture of a semiconductor device, eliminating unwanted features (e.g., side lobes) created together with a resist pattern by thickening the resist pattern, to reduce the burden in designing photomasks and to increase depth of focus. 2. Description of the Related Art As the packing density of integrated circuits has increased in recent years, so too has the requirement for semiconductor device manufacturing equipment to achieve smaller feature size—patterns that contain lines whose width is shorter than the wavelength of exposure light employed in the manufacturing process. Along with this trend, selection of masks that can produce fine, high-resolution patterns has been conducted, and phase shift masks such as halftone masks are increasingly used in the lithography technology. The halftone masks are advantageous in improving resolution, but attention needs to be paid to the fact that they may create side lobes (sub-peaks) around a primary feature. To avoid this, a means of preventing the generation of side lobes has conventionally been provided on the mask. An example of the foregoing means provided on the mask includes for instance a method by which the generation of side lobes is prevented by arranging Cr patterns on areas where side lobes are likely to appear. While this method can successfully prevent the generation of side lobes, it involves the use of a tri-tone mask of three layers owing to the presence of the Cr patterns arranged over the mask, placing a burden on the mask manufacture and defect inspection of masks. In response to the demand for finer patterns, sub-resolution assist features (SRAF), which are not meant to print, are now increasingly placed over the reticle in order primarily to increase depth of focus. This SRAF technology, however, is one wherein assist features should not be printed on the surface of the resist and hence the assist features are arranged in the reticle in such size that they do not print. For this reason, there is a limitation to a further improvement of depth of focus by simply arranging relatively large SRAFs, limiting the use of larger SRAFs. Examples of pattern layouts for semiconductor devices are those containing both repetitive patterns of a particular cell layout as typified by memory devices and a variety of randomly arranged patterns as typified by LOGIC LSIs. In many cases the memory cell layout is designed using the values that are most critical in the design rules of the corresponding generation. One of the lithography-associated resolution enhancement technologies for accomplishing the foregoing is the method that uses a phase shift mask, which is mainly used for the formation of critical layers. In this regard, masks for a metal interconnection layer (holes/trenches) are those with less features (openings). Here, FIG. 10 shows a schematic view of a reduction projection exposure device, and FIGS. 11A to 11C show sections of general photomasks of various types that are used upon manufacture of a semiconductor device. The reduction projection exposure device shown in FIG. 10 includes an illumination light source 101, an illumination optical system 104 for guiding light from the illumination light source 101 to a reticle 103 (photomask) placed on a reticle stage 102, and a projection optical system, which is a reduction projection lens 105. The illumination optical system 104 includes an elliptic mirror 110, a fly eye lens 111, and an aperture diaphragm 112. Light from the illumination light source 101 is guided to the reticle 103 through the illumination optical system 104, and the pattern on the reticle 103 is projected onto the resist layer on a wafer through the reduction projection lens 105. Note that in exposure devices using excimer lasers as a light source, the elliptic mirror 110 is not provided, and the illumination light source 101 serves as a laser beam source. A mask 102 shown in FIG. 11A is a chrome mask that is also referred to as a binary mask, in which a metal masking film 122 such as Cr patterns is formed over a quarts dry plate 121. Using a reduction projection exposure device like that shown in FIG. 10, a pattern is projected onto a wafer 106 by means of light passing through Cr-free areas of the mask 120. A mask 130 shown in FIG. 11B is a halftone phase shift mask having semi-transparent metallic thin film patterns 132 made primarily of MoSi or the like provided over a quarts dry plate 131. A mask 140 shown in FIG. 11C is a Levenson phase shift mask that is identical to the chrome mask (mask 120) shown in FIG. 11A except that a trench 141 is formed that produces 180 degree phase shift in particular light passing through the quarts dry plate 121. FIG. 12 shows a light intensity distribution obtained when the wafer is exposed using the chrome mask (mask 120) shown in FIG. 11A, and FIG. 13 shows a light intensity distribution obtained when the wafer is exposed using the halftone phase shift mask (mask 130) shown in FIG. 11B. A comparison between the light intensity distributions of FIGS. 12 and 13 reveals the differences in light intensity between different masks. Referring specifically to FIG. 13, relatively small positive peaks are seen at either side of the main positive peak for the feature 133; these small peaks are the essential cause of side lobes that are specific to halftone phase shift masks. An example of how side lobes are created in the resist pattern will be described below. FIG. 14A is a top view of a mask pattern 150 used upon production a seal ring that is used for preventing the entry of moisture into freshly prepared LSI chips from the outside. The seal ring is also referred to as a moisture resistance ring. FIG. 14B is an image view of a resist pattern formed using the mask pattern 150. It is evident that there are side lobes S generated in areas other than the desired pattern 150 of FIG. 14B, which are not present in the mask pattern 150 of FIG. 14A. The presence of side lobes S in the resist upon exposure of the wafer results in resist pattern collapse, printing of the side lobes S after etching, etc., leading to poor device quality. Thus, there has been a need to perform a resist exposure process while avoiding the creation of such side lobes. Note that even when the primary feature has the same shape as the seal ring, similar side lobe-related problems occur. Thus it has been required to pay attention when attempting to achieve linewidths of about more than three times as large as the minimal linewidths of the corresponding generation, depending on the setting of mask bias at the standard exposure dose, though. FIG. 15A shows an example of a mask layout for hole pattern, which is provided with SRAFs that have become frequently used. As shown in FIG. 15A, assist features 161 are arranged around a primary feature 160 in such a way that they assist exposure through the primary feature 160. It has been shown that this mask layout can increase depth of focus (DOF). The size and position of the SRAFs are determined in light of the conditions of the resist exposure process; however, it is generally important to ensure that SRAFs never print. Accordingly, although DOF is nearly proportional to the size of a SRAF, SRAFs need to be used in such a way that they never print on the resist, and therefore, there is an upper limit with respect to their operable size. If the size of SRAF exceeds this upper limit, it results in the formation of unwanted features 163, which are derived from the assist patterns 161, at positions other than the primary feature 160, as shown in FIG. 15B. To overcome this problem the following method has been proposed, for example, which comprises the steps of printing a photomask pattern onto a photosensitive resin film, generating an acid in the photosensitive resin film, forming a crosslinkable material-containing resin film over the photosensitive resin film, and subjecting both of the resin films to heat treatment to allow the crosslinkable material to undergo crosslinking to form a reaction layer at their interface, whereby printed unwanted features are eliminated from the printed features (see Japanese Patent Application Laid-Open No. 2001-005197). This method is, however, limited to chemically amplified resists in terms of applicable resists, and thus the range of selection of available of resist materials is narrow. In addition, crosslinking reactions in the crosslinkable material-containing resin film are difficult to control. Thus, with this method, unwanted features of varying sizes cannot necessarily be removed successfully independent of the types of resist materials. It is an object of the present invention to provide a method for manufacturing a semiconductor device, which the method is capable of efficient mass production of high-performance semiconductor devices by, upon manufacture of a semiconductor device, eliminating unwanted features (e.g., side lobes) created together with a resist pattern by thickening the resist pattern, to thereby reduce the burden in designing photomasks and to increase depth of focus.
Mid
[ 0.5536480686695271, 32.25, 26 ]
Dear Mona, What percentage of women have breast implants? Marisa, 25, New York Dear Marisa, After receiving her breast implants in an experimental surgery, Esmeralda, a dog of unknown breed, chewed at the stitches until they had to be removed. The operation was still deemed a success, and the surgeons, Frank Gerow and Thomas Cronin, began searching for a way to test the procedure on a human female. Not long after, Gerow offered his new silicone products to Timmie Jean Lindsey, a 29-year-old mother of six who agreed to the procedure on the condition that Gerow would also “fix” what really bothered her — her “Dumbo” ears. And so the world’s first breast implant surgery was performed at Jefferson Davis hospital in Houston, Texas, in 1962. Lindsey received her breast implants more than 50 years ago, but national statistics on the procedure have only been collected on a yearly basis since the late 1990s. And those statistics only measure the number of procedures that take place; they say nothing about the women receiving those implants, which makes an estimate here all the more shaky. Still, though, I estimate that almost 4 percent of women in America, or one in every 26, has breast implants. Here’s how I got to that number. I looked at the number of breast augmentations that have taken place each year since 1997, according to the American Society for Aesthetic Plastic Surgery (ASAPS). Unlike other professional organizations for certified surgeons, ASAPS members specialize in cosmetic surgery, so these numbers, collected from surveys of surgeons, should exclude reconstructive surgeries for women who have lost one or both breasts after mastectomy surgery. I simply added up all of those procedures (a total of 4,798,349 since 1997) and divided it by the current U.S. female adult population (124,501,374) and arrived at the estimate that 4 percent of American women alive today have had breast implants. Again, 4 percent is a very rough estimate, for a number of reasons: I assumed that each procedure for “breast augmentation” involved implants. In reality though, a fraction of these will use a woman’s own fat rather than implants to increase the size of the breast. In “fat transfer breast augmentation,” liposuction is used to move fat from one part of the body to the breasts (breast-lift surgery is counted as a separate category). That means that 4 percent is an overestimate. I assumed that one procedure equates to one woman. That means this is an overestimate because in reality some of these procedures will be revision surgeries (i.e. intended to fix or improve the initial result). because in reality some of these procedures will be revision surgeries (i.e. intended to fix or improve the initial result). I assumed that none of the women who received breast implants since 1997 has since died. That means that this is an overestimate. I assumed that each woman kept her breast implants. Removal of breast implants counts as reconstructive surgery, so I contacted the American Society of Plastic Surgeons (ASPS) which, unlike the confusingly similar ASAPS, doesn’t just collect statistics on cosmetic surgery. ASPS statistics show that in 2013 alone there were 23,770 breast implant removals. That means this is an overestimate. I assumed that these procedures were performed on U.S. women. In reality, some of those operations would have been performed on women who have subsequently left the United States — and some women currently living here will have received their breast implant surgery abroad. There is scant information about the scale, direction of travel or most common operations performed in cosmetic surgery tourism, so I can’t say whether that makes this an overestimate or an underestimate. or an My total doesn’t include women who got implants before 1997. That means Timmie Jean Lindsey (now an 82-year-old great-grandmother) and thousands that came after her aren’t counted. Even as early as 1989, a survey of 40,000 American households estimated that there were 815,700 women with breast implants in the U.S. That means this is a considerable underestimate — which I can only hope outweighs the factors above. There’s another trend here, though. For every two women who have had breast implants since 1997, there was one woman who went under the knife to have her breasts reduced. It’s also easy to overlook the fact that men have breast reductions, too (it may even come as news to some that men have breast tissue). In addition to the numbers listed here, a further 22,939 breast-reduction procedures were carried out on men in 2013 to address gynecomastia, or enlarged breast tissue. Although breast implants remained the most common surgical cosmetic procedure for women last year, coming up from behind is a big rise in buttock augmentation. I have no idea how many of the 4 percent of women that I estimate have breast implants also have their bums augmented, or any other cosmetic procedure for that matter. Nor can I tell you much about the number of men who undergo multiple procedures. But there is data on the reasons why people choose to get cosmetic surgery, which (while we’re talking about possible vanity) you can discover in my interview with NPR last week. Hope the numbers help, Mona Have a question you would like answered here? Send it to [email protected] or @DataLab538.
Low
[ 0.488687782805429, 27, 28.25 ]
Q: Adding two JSON object and creating new one I have two JSON objects Arr1 ={Email: "[email protected]", status: "0"} Arr2 ={Email: "[email protected]", status: "1"} When I try to make third array like, Arr3 = Arr1.push( Arr2 ) It doesn't append correctly but second array is added as a list than a object. What am I missing ? I am expecting push will create results like, {Email: "[email protected]", status: "0"}, {Email: "[email protected]", status: "1"} A: I am expecting push will create results like, {Email: "[email protected]", status: "0"}, {Email: "[email protected]", status: "1"} This result is not valid to me, you should use another object or array except you make it to string let Arr1 = { Email: "[email protected]", status: "0" }; let Arr2 = { Email: "[email protected]", status: "1" }; let str1 = JSON.stringify(Arr1); let str2 = JSON.stringify(Arr2); console.log(str2, ',' + str2) This makes no sense! You have two way, add objects into one array, or add two object into one object 1. let Arr1 = { Email: "[email protected]", status: "0" }; let Arr2 = { Email: "[email protected]", status: "1" }; var Arr3 = {Arr1, Arr2} console.log(Arr3) 2. let Arr1 = { Email: "[email protected]", status: "0" }; let Arr2 = { Email: "[email protected]", status: "1" }; let Arr3 = []; Arr3.push(Arr1, Arr2) console.log(Arr3)
Mid
[ 0.6017964071856281, 25.125, 16.625 ]
package gg.rsmod.game.message.decoder import gg.rsmod.game.message.MessageDecoder import gg.rsmod.game.message.impl.EventAppletFocusMessage /** * @author Tom <[email protected]> */ class EventAppletFocusDecoder : MessageDecoder<EventAppletFocusMessage>() { override fun decode(opcode: Int, opcodeIndex: Int, values: HashMap<String, Number>, stringValues: HashMap<String, String>): EventAppletFocusMessage { val state = values["state"]!!.toInt() return EventAppletFocusMessage(state) } }
Mid
[ 0.545816733067729, 34.25, 28.5 ]
/** * Theme: Ubold Admin Template * Author: Coderthemes * Nestable Component */ !function($) { "use strict"; var Nestable = function() {}; Nestable.prototype.updateOutput = function (e) { var list = e.length ? e : $(e.target), output = list.data('output'); if (window.JSON) { output.val(window.JSON.stringify(list.nestable('serialize'))); //, null, 2)); } else { output.val('JSON browser support required for this demo.'); } }, //init Nestable.prototype.init = function() { // activate Nestable for list 1 $('#nestable_list_1').nestable({ group: 1 }).on('change', this.updateOutput); // activate Nestable for list 2 $('#nestable_list_2').nestable({ group: 1 }).on('change', this.updateOutput); // output initial serialised data this.updateOutput($('#nestable_list_1').data('output', $('#nestable_list_1_output'))); this.updateOutput($('#nestable_list_2').data('output', $('#nestable_list_2_output'))); $('#nestable_list_menu').on('click', function (e) { var target = $(e.target), action = target.data('action'); if (action === 'expand-all') { $('.dd').nestable('expandAll'); } if (action === 'collapse-all') { $('.dd').nestable('collapseAll'); } }); $('#nestable_list_3').nestable(); }, //init $.Nestable = new Nestable, $.Nestable.Constructor = Nestable }(window.jQuery), //initializing function($) { "use strict"; $.Nestable.init() }(window.jQuery);
Low
[ 0.516556291390728, 29.25, 27.375 ]
Varsity sports heading for TV Related Links Cape Town - University sport in South Africa is set to get a high-performance boost with the launch of the Varsity Sports competition platform, which took place in Plettenberg Bay on Wednesday and Margate on Thursday. Spawned from the highly successful Varsity Cup rugby tournament, Varsity Sports is the result of a partnership between 11 of South Africa’s top universities and Advent Sport Entertainment and Media (Asem). Speaking at the launch, Asem CEO and former Springbok captain Francois Pienaar said the first phase of the made-for-television inter-university competition would get underway at the end of the month with two action-packed Olympic sporting codes in men’s rugby sevens and women’s beach volleyball. The latter was introduced at the Atlanta Olympics in 1996, with the former set to make its debut in Rio de Janeiro in 2016. “I personally believe there is so much sevens talent out there that will emerge through Varsity Sports,” said Pienaar. “And this year women’s beach volleyball was the most sought after ticket at the Olympics. You’ve got great athletes, it’s glamorous and great fun.” According to him, the competition, which had been three years in the making, aimed to achieve three major goals. “Firstly, we want to be the high-performance level between school and professional sport, giving those students with talent the chance to compete on television in a structured environment.” To this end, Pienaar said Varsity Sports would play a supporting role to all University Sport South Africa structures and sporting federations. “Secondly, Varsity Sports will be assisting with transforming the sport to provide opportunities at tertiary level. But, and this is very important, the participants have to study and be successful because there is life after sport. “And, thirdly, we have to commercialise the space in order to bring sponsors on board and ensure that the concept is sustainable and self-sufficient.” Co-sponsors First National Bank, Steers and Cell C have already come on board, with more announcements expected shortly. Pienaar said universities were the breeding grounds for the next generation of sports stars and cited the achievements of American-educated athletes at this year’s Olympic Games. “If the universities in the United States were a participating country, they would have been second overall.” He said the Varsity Sports model was strongly influenced by America’s Monday night college football culture. “It’s a simple concept – Monday night is going to be Varsity Sports night across a number of sporting codes. The formats are made for TV, so they’re short, sharp and focused.” He said the year-end beach volleyball and rugby sevens would deviate slightly with weekend tournaments at holiday destinations Plettenberg Bay and Margate because the students would be on their summer break by then. Pienaar said one of the highlights of the Plett event would be the presence of Britain’s Olympic volleyball star Shauna Mullin, who would commentate and take part in an exhibition match with South African players. “After the match, we will have a competition draw for the school children who attend the event. Varsity Sports will give back to the local community by sponsoring the lucky winner’s education for the next year.” He said a focus on education was critical to the success of the concept. “We’re saying to talented students, don’t give up on your sport. If they’re in the Varsity Sport set-up and they get a professional contract, they get a professional contract with a degree behind their name – and that to me is the ultimate.” Pienaar said sports fans could expect a big announcement early next year about the other sporting codes joining the line-up. “This is just the amuse-bouche or hors d’oeuvre of what’s to come.” The competition kicks off in Plettenberg Bay on November 23 and 24, before moving on to Margate on November 30 and December 1. All games will be broadcast live on DStv’s SuperSport 7 channel from 08:00 daily. What To Read Next 24.com publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment. Featured With the Absa Premiership in full swing, who will be crowned champions when all is said and done? Will Mamelodi Sundowns defend their title? Or can Kaizer Chiefs, Orlando Pirates or Bidvest Wits mount a serious challenge? Stay glued to Sport24 to find out!
High
[ 0.66, 33, 17 ]
THE Evening Times has interviewed four of the five party leaders ahead of Thursday's Election. We featured LibDem leader, Willie Rennie and Scottish Greens co-convenor, Patrick Harvie, yesterday and will focus on Labour leader Kezia Dugdale and SNP leader, Nicola Sturgeon tomorrow. However despite repeated attempts to arrange an interview with Conservative leader Ruth Davidson, she was unable to find time to meet the Evening Times during the final week of the campaign. READ MORE: Davidson challenge to look Clyde shipyard workers in the eye. Despite making a request on April 25 and being willing to fit with Ms Davidson’s busy schedule and being willing to travel she was unable to accommodate our request. We are disappointed not to be able to bring you her answers to the questions we wanted to ask. Instead we print the questions we wanted to ask, below. What benefit will people in Glasgow get from electing a Conservative MSP? Your second ballot says Vote Ruth Davidson for a strong opposition, but you have walked away from Glasgow to represent Edinburgh. Why should anyone in Glasgow vote Conservative when you don’t want to represent them? READ MORE: Ruth Davidson admits defeat in election and concedes SNP will win UK Conservative welfare cuts have hit disabled and people on benefits and who are out of work harder than most places. With the prospect of more to follow, why should anyone in Glasgow vote Conservative? Govan shipyards should be cutting steel on Type 26s now and a Frigate factory opening at Scotstoun. But there’s a delay till 2017 and jobs could be lost as a result. After the promises on the 13 frigates for the shipyards were reneged on why should anyone Vote Conservative in Glasgow?
Mid
[ 0.6174496644295301, 34.5, 21.375 ]
Q: How to add constraint to collection items I have an entity with collection of strings. I would like to add a constrains that will check if all items in the collection have size less then 255. Let's say I have an entity Area with a collection of references. I would like to be sure that all references are shorter then 255 characters. Do you know how can I achieve it. @Entity @Table(name = "AREA") public class Area Serializable { private static final long serialVersionUID = -4756123949793458708L; @Id @GeneratedValue(strategy = GenerationType.IDENTITY) @Column(name = "ID", unique = true, nullable = false) private Integer id; @ElementCollection @CollectionTable(name = "AREA_REFERENCES", joinColumns = @JoinColumn(name = "AREA_ID")) @Column(name = "REFERENCE", nullable = false) @Size(max = 255) // THIS ANNOTATION SEEMS TO NOT WORK private Set<String> references = new HashSet<>(); .... A: Annotating like this @Size(max = 255) private Set<String> references; means the Set<String> is allowed to contain a maximum of 255 strings. Of course this is not what you want. Instead, you want each string to have a maximum of 255 characters: You can achieve it by annotating the type parameter within < > like this: private Set<@Size(max = 255) String> references; For that you will need quite new versions of Hibernate Validator (6.0.x) and Bean Validation (2.0.1). See also this answer for a similar problem.
Mid
[ 0.638709677419354, 24.75, 14 ]
New Delhi /Srinagar: The decision of political parties to demand clemency for selected convicts on death row for scoring political points has now boomeranged on them. While the Afzal Guru issue has created problems for the Congress and National Conference, the BJP is in a fix over Devendra Singh Bhullar issue as Akali Dal, their ally in Punjab, has decided to bring a resolution in the Assembly demanding clemency for Bhullar. A day after the Tamil Nadu Assembly passed an unprecedented resolution asking the President to reconsider the mercy pleas of former Prime Minister Rajiv Gandhi's killers, J&K Chief Minister Omar Abdullah had tweeted: “If J&K Assembly had passed a resolution similar to the Tamil Nadu one for Afzal Guru would the reaction have been as muted? I think not.” Omar’s tweet had invited strong reactions from different quarters. However, now his party’s stance on Afzal Guru Case remains undecided. PDP by proclaiming its support to the proposal has increased the woes of the National Conference. This issue would be discussed in the Assembly on September 28. National Conference fears that both support and protest on the issue would hamper its interest. Condition is such that Omar has been eluding from the meeting of party legislators in order to prevent a decision on the proposal. If the National Conference extends its supports to the proposal then it may have a negative effect on the Congress alliance and Omar position may be in danger. Weighing the other option, if PDP goes against the motion, the Separatists can accuse Omar of being an agent of the Central government. Even Congress is in a dilemma as it knows that although the local sentiments are coxing it to support the proposal it is scared of the ramifications of such move at the national stage. Moreover, the Congress MLAs in Kashmir are supporting the issue, but MLAs from Jammu region have objected to it. In the Assembly, there are 28 members of NC and PDP has 21 members. If both these parties vote in favour of the resolution even the combined vote of the BJP, Congress and Panthers Party would stand less in numbers. The principal opposition BJP has its own share of problem on the issue. It is well aware of the fact that it cannot afford any chink in its alliance with the Akali Dal, which is in support of clemency for Bhullar. The party is finding it difficult to distance itself from the Akali’s move at a time when it is leaving no stone unturned to corner the Congress over the Afzal issue. However, the condition of Congress is more pitiable than BJP. While it is shying away from making any clear statement on both the issues as it is conscious of the fact that it can’t let the message go out that the party or the Central government is soft on terror. When asked for the party’s stand on the issue, Congress spokesperson Rashid Alvi said that law would take its own course.
Mid
[ 0.5792811839323461, 34.25, 24.875 ]
[Morbidity and malnutrition risk factors in children followed up by a child health care program]. The objective of this study was to identify risk factors associated with malnutrition and morbidity in the population of children accompanied by the Child Health Care Program in Embu, São Paulo (Brazil), with the aim of giving a better direction to health activities. The case-study was constituted by a cross-section of 1,024 children, corresponding to 25.0% (probabilistic sistematic sample) of the total of children under 12 months registered in six primary health care centers in the Municipality, during the period from July 1988 to July 1989. The risk factors were analyzed according to the presence or absence of hospitalization and weight evolution - favorable or unfavorable - until two years of age. For the statistical analysis the multivaried approach was used, through the tecnique of logistic regression. Of a total of 1,024 children, 428 (39.1%) were classified as high risk, 658 (60.1%) as low risk and 8 (0.8%) presented pathologies at their first appointment, being excluded from the analysis. Prematurity (adjusted RR = 3.35), serious illness in the newborn (adjusted RR = 4.12) and the death of a younger brother or sister of less than five years (adjusted RR = 2.70) constituted risk factors for hospitalization in the first two years of life. Weight at birth between 2,500 and 2,750 g (adjusted RR = 2.46), brother or sister with malnutrition (adjusted RR = 4.17) and maternal age of 18 years old or less (adjusted RR = 1.87) constituted risk factors for unfavourable weight evolution. These results, as well as the process of carrying out this study, supported the reformulation of the Child Health Care Program in Embu, permitting differentiated action for the highest risk group, thus garanteeing the essential for all.
High
[ 0.6980198019801981, 35.25, 15.25 ]
Scalable Convert Buy author a beer Similar Ideas power sources icon set Set of simple icons to represent different power sources nowadays, including: nuclear power plant, wind farm, coal (heat) plant, water plant, solar plant. The set has three main colors, that can be easily changed in Inkscape. How do you like this free SVG? what others say about this scalable leave your comment Name: * E-mail: * Your comment: * scalablegfx.com Have you ever searched for free, quality scalable graphics and ideas for your web page, game, presentation, poster, or something else? And how the results looked like? Few big portals with thousands of crappy images - scalable and bitmaps mixed together? Many free galleries with few and unusable graphics? A couple of portals with quality scalables, but for money? Then you are at right place here!
Mid
[ 0.597122302158273, 31.125, 21 ]
Support forum for homebrew development on the Philips CD-i system. Hosted through the CDinteractive network the CD-i Homebrew Forum will provide an active resource for new software initiatives on the system and offer hosting for any serious attempts. Forum permissions You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
Low
[ 0.492239467849223, 27.75, 28.625 ]
13 N.J. 79 (1953) 98 A.2d 55 DOUGAL HERR, PLAINTIFF-APPELLANT, v. LOUISETTE HUGON HERR, DEFENDANT-RESPONDENT. The Supreme Court of New Jersey. Argued March 9, 1953. Reargued April 20, 1953. Decided June 22, 1953. *82 Mr. Meyer E. Ruback argued the cause for appellant (Messrs. Lum, Fairlie & Foster, attorneys). Mr. John F. Ryan argued the cause for respondent (Messrs. Ryan & Saros, attorneys). The opinion of the court was delivered by HEHER, J. The appeal is from a judgment dismissing the complaint. *83 The gravamen of the pleaded cause of action is misrepresentation, fraud, deceit and concealment allegedly practiced by defendant whereby plaintiff was induced to make a "marriage settlement" on defendant which included a conveyance, after marriage, vesting in plaintiff and defendant an estate by the entirety in plaintiff's dwelling house in the Borough of Brielle, New Jersey, and also nondelivery of the deed. Judge McLean found that plaintiff had not sustained the onus of proof of fraud. He was of the opinion that plaintiff's "testimony standing alone, met with defendant's denials, does not afford the clear and convincing proofs essential to entitle him to the relief he seeks." We certified defendant's appeal on our own motion. The grounds of appeal challenge the findings made in the Superior Court as not in accordance with the evidence, both as to fraud and delivery; and error is also assigned upon the assessment of a counsel fee against plaintiff. This is the case made by the complaint: In November 1949, after a brief acquaintance while on vacation in Bermuda, plaintiff, a widower 67 years of age, proposed marriage to defendant, a widow 52 years old, but she demurred "on the ground that such marriage would result in great financial loss and risk to her," representing to plaintiff that she was "the beneficiary for life or until remarriage of the income of a certain trust fund established by the last will and testament of one Gabriel Raphael Hugon of Manchester, England," the deceased father of her deceased husband, amounting in the net to 1,500 pounds sterling per annum, and that by the terms and conditions of the trust "her income would cease entirely and irrevocably if she should remarry," and "she had no property, or income aside from the income from said trust," and "for those reasons she could not afford to remarry without a substantial marriage settlement, adequate to secure her future financial security in lieu of said life annuity." Plaintiff, relying upon the truth of the representations, "promised defendant that if she would accept his offer of marriage he would, in addition to supporting her as his wife, secure her financial future to the extent of his means in the *84 event that he should predecease her by transferring to her his entire estate, such transfers to take effect upon his death and to be made in consideration of and partial reimbursement for her loss of income" under the trust. Defendant accepted plaintiff's proposal of marriage "subject to said proposed provision for her future financial security in the event that plaintiff should predecease her." The marriage was solemnized December 3, 1949, at Westfield, New Jersey. Immediately following the marriage, and in reliance upon the truth of the "representations," and to effectuate the "marriage settlement," plaintiff executed "riders to establish defendant as beneficiary of plaintiff's life insurance policies, a last will and testament and (for the purpose of minimizing inheritance taxes) a deed of conveyance" for the lands in suit "intended when delivered to convert plaintiff's estate" in the lands "into an estate by the entirety in plaintiff and defendant." In order that "the transaction might be completed by the delivery of all of the instruments at one time, such time to be arranged after all of them should be executed, plaintiff only executed said deed of conveyance on December 3, 1949 and caused it to be recorded in the Clerk's Office of Monmouth County on December 14, 1949." After recording, the county clerk returned the deed "to plaintiff's attorney as directed"; and the "deed was never delivered to defendant, nor did plaintiff ever intend to make a present delivery of it, nor were any of the other instruments delivered." "On or about December 15, 1949, plaintiff became suspicious of the truthfulness" of defendant's representations "because she refused to send to England for a copy" of the Hugon will, "as she had agreed to do"; and he "thereupon caused an investigation to be made which disclosed" that the deceased Hugon "had not created any trust whatsoever in favor of defendant, by his will or otherwise," and defendant had not been in receipt of an income in any amount from the Hugon family subsequent to the death of Gabriel on October 11, 1939, and "had not been an annuitant under any trust whatsoever." *85 It is averred that had plaintiff known of the falsity of the "representations," he "would not have agreed to make said settlement." Plaintiff seeks judgment: (a) voiding the agreement to make the marriage settlement, and (b) decreeing the conveyance to be void or, in the alternative, the rescission of the deed and a reconveyance to plaintiff. The nonexistence of the asserted trust fund or "life annuity" is conceded; the making of the representation is denied. Indeed, defendant asserts in her answer to the complaint that she "refused several proposals of marriage by the plaintiff, without qualification, and finally accepted tentatively, only on condition that her final answer" be deferred until "opportunity" was had the "better to know each other," and it could be determined whether or not plaintiff's children would "object" and "constitute a hindrance to a happy marriage"; and that the execution of the deed "was purely a voluntary act on plaintiff's part, independent of any agreement, commitment or previous arrangement, which deed she never saw, and of which she knew nothing, excepting that it was executed and recorded as plaintiff told her, because, as his wife he felt she was entitled to it as a gift," and she "has no information" respecting the will, but she denies that its "execution * * * was the result of any arrangements, commitment, promise or agreement prior to the marriage." And defendant's testimony accords with the answer. There had been no discussion whatever before the marriage "about any financial arrangement or money or anything else in connection with impending marriage." Shortly after their meeting in Bermuda, she agreed to the marriage, "but on one condition that" she "should meet his children first and they would agree to the marriage." She first "heard" of the deed in question on December 26, 1949, and it was the plaintiff who spoke of it. He said: "I have seen a friend who is very discreet and I want you to have that property and I may give that property to you on both names and also a will." There had been no prior discussion of a will. *86 Plaintiff acknowledges that if, "as part of the offer of marriage and uninduced by any fraudulent misrepresentation by the defendant, the proposal had included the promise to make the deed," the deed would be altogether invulnerable; the "sustaining consideration for the deed would be the defendant's performance of her promise to marry." But it is insisted that such is not the situation revealed by the pleadings and the proofs, for under defendant's version of the transaction a promise of a property settlement is "ruled out as a consideration or inducement for the marriage," and the conveyance was a pure gift, induced by love and affection alone, and "not the marriage, for the marriage had already taken place," while the foundation of plaintiff's pleaded cause of action is a promise "collateral to his offer of marriage" induced by defendant's "misrepresentation that her remarriage would result in the loss of an English annuity," to "make good the loss by making a property provision for her"; and that "on the evidence of either side it is clear that no enforceable ante-nuptial agreement or property settlement was made between" the parties. There was no post-nuptial contract, it is conceded, "since the marriage, being past, could not constitute a valid consideration." But it is said that there was a post-nuptial settlement on the wife, and it matters not whether it be deemed a "gift in fulfillment of an earlier promise, though unenforceable, or a present donation unrelated to any antecedent promise," for in either event "any fraud inducing the gift vitiates it." It is urged that the evidence offers no support for the conclusion that "the marriage was the inducement, i.e., the consideration for the deed"; and the critical issue is stated to be "whether the deed (made in fulfillment of an earlier promise, as the plaintiff claims, or as a later gift, as the defendant claims,) was or was not induced by the defendant's misrepresentation." The reasoning is that plaintiff's promise to provide for his wife "is altogether distinct from and independent of the engagement to marry," and was designed "to remove an impediment to the making of the contract to *87 marry," and the "sole consideration of the marriage was, concededly, the mutual agreement of the parties to undertake and perform the duties and obligations incident to the marriage, whereas the promise to make provision for the wife was predicated solely upon her surrender of the alleged annuity." But, whatever preceded the marriage, the post-nuptial conveyance was essentially voluntary; and the deed itself, after deliberation upon the choice of words, declared the consideration to be "the sum of one dollar, the marriage between the grantees, and good and valuable consideration, lawful money of the United States, to him in hand paid," and so on, according to the usual formula of receipt and grant; and thus the plaintiff himself, in formal and indubitable terms, established the marriage as the consideration for the conveyance. Whatever its legal effect as consideration related to an executory promise, this was the motive for the conveyance. A parol ante-nuptial agreement for a property settlement in consideration of marriage is within the statute of frauds (R.S. 25:1-5) and unenforceable; marriage is not in itself deemed such part performance of the agreement as will avert the operation of the statute and render it enforceable in equity. Russell v. Russell, 60 N.J. Eq. 282 (Ch. 1900), affirmed 63 N.J. Eq. 282 (E. & A. 1901); Pennsylvania Railroad Co. v. Warren, 69 N.J. Eq. 706 (Ch. 1905); Watkins v. Watkins, 82 N.J. Eq. 483 (Ch. 1913), affirmed 85 N.J. Eq. 217 (E. & A. 1915); Alexander v. Alexander, 96 N.J. Eq. 10 (Ch. 1924); Elmer v. Wellbrook, 110 N.J. Eq. 15 (Ch. 1932). An unexecuted parol ante-nuptial promise for a settlement lays no legal duty or obligation on the promisor; and a post-nuptial settlement made pursuant to a parol ante-nuptial promise, followed only by marriage, is "voluntary, in the strongest sense of that term"; marriage is not part performance of the contract, for "if it were, there would be an end of the statute * * * [and] every parol contract followed by marriage would be binding"; carrying into effect the parol contract after marriage, by a deed, "amounts to no more *88 than a voluntary settlement." Manning v. Riley, 52 N.J. Eq. 39 (Ch. 1893). Thus, the conveyance here constituted a voluntary post-nuptial settlement; plaintiff was under no duty or compulsion to make the transfer. The policy of this provision of the statute of frauds is "to render hasty and inconsiderate oral promises, made to induce marriage, without legal force, and thus to give protection against the consequences of rashness and folly." Manning v. Riley, cited supra. Plaintiff was free to make the conveyance, or not to make it, according to his untrammeled judgment; and his conventional declaration of marriage as the consideration imparts character and meaning to the conveyance at variance with the concept of a gift related only to the loss of an annuity. The undoubted design was to make provision for the wife against privation in the event of her husband's prior death; and it would seem to be a matter of indifference whether or not the need had become the greater by the loss of an annuity. Protection against want was the desideratum, and the provision was expressed to be made in consideration of marriage. Such was the intention, and the intention controls. The loss of an annuity did not induce the settlement. An executed post-nuptial gift or settlement is effective inter partes, even though lacking in the consideration essential to an enforceable executory contract. A gift is a transfer without consideration. Frank v. Gaylord, 119 N.J. Eq. 427 (Ch. 1936); Cessna v. Adams, 93 N.J. Eq. 276 (Ch. 1921); Austin v. Young, 90 N.J. Eq. 47 (Ch. 1919); Landon v. Hutton, 50 N.J. Eq. 500 (Ch. 1892); Jones v. Clifton, 101 U.S. 225, 25 L.Ed. 908 (1880); Rodgers v. Rodgers, 229 N.Y. 255, 128 N.E. 117, 11 A.L.R. 274 (Ct. App. 1920). The burden of proof of a fraudulent inducement has not been sustained. On this inquiry, the subsequent change in the marital relations, attitudes and motivations are elements to be regarded, as tending to rationalization. The observations of Vice-Chancellor Stevenson are apropos: *89 "When the relations of the man and his wife cease to be harmonious, when divorce or separation comes, the man finds himself disappointed in his expectations, and he very much regrets the disposition of property which he theretofore made. No doubt there are situations of this kind where there is hardship, and some future laws may provide for the readjustment of family settlements in case of divorce. Under our present system of laws the destruction of harmonious and confidential relations between the man and wife, their complete estrangement, and even divorce, create no new equity in favor of the husband with respect to land which he originally donated to his wife when both parties contemplated that their affectionate and confidential relations would endure throughout their lives, and that both would therefore share in the benefits of the donated property." Warren v. Warren, 88 N.J. Eq. 612 (E. & A. 1918). And the proofs establish the essential element of delivery. The conveyance was made to husband and wife; and the circumstance that, after recording, the deed was retained by the husband does not repel the inference otherwise compelling of his intention to make the deed immediately effective as a conveyance of the land. Indeed, plaintiff himself revealed in his testimony a design by the conveyance to take the property out of the inheritance tax category; and delivery was essential to the effectuation of that purpose. The essence of delivery is the intent to "perfect the instrument" and thereby make an immediate transfer of the title to the grantee; and the intent may be deducible from the circumstances or the acts or words of the grantor. Ruckman v. Ruckman, 32 N.J. Eq. 259 (Ch. 1880); Jones v. Swayze, 42 N.J.L. 279 (Sup. Ct. 1880); Blachowski v. Blachowski, 135 N.J. Eq. 425 (Ch. 1944). It does not matter that defendant had not seen the deed; her husband held the instrument for her as well as for himself, as tenants by the entirety. Vought's Ex'rs. v. Vought, 50 N.J. Eq. 177 (Ch. 1892); Mower v. Mower, 367 Pa. 325, 80 A. (2d) 856 (Sup. Ct. 1951). The original complaint, filed June 1, 1950, included a count for nullity of the marriage. On June 11, 1951 there was a voluntary dismissal of that count; and an allowance of $2,500 was made to defendant's counsel as for services in *90 a matrimonial action, under Rule 3:54-7(a). There was no award of counsel fees in this non-matrimonial suit. We think that a fee of $1,000 should be assessed against plaintiff; counsel must look to his client for such additional compensation as may be reasonable. The circumstances did not call for the application of Rule 3:54-8. The judgment is accordingly modified and, as so modified, affirmed. For modification — Chief Justice VANDERBILT, and Justices HEHER, BURLING, JACOBS and BRENNAN — 5. Opposed — None.
Low
[ 0.519750519750519, 31.25, 28.875 ]
Q: Reading JSON in this scenario? I am trying to parse rss feeds from various sources,one of such source is this:http://feeds.feedburner.com/DiscoveryNews-Top-Stories But this source is giving me some weird json data like this: "item": [ { "title": [ "Snazzy Science Photos of the Week (August 10-16)", { "type": "html", "content": "Snazzy Science Photos of the Week (August 10-16)" } ], "description": [ "Glowing rabbits, treasure-hunting badgers and a case of mistaken UFO identity help round out this week&#039;s photos.<img src=\"http://feeds.feedburner.com/~r/DiscoveryNews-Top-Stories/~4/S6Urfvdw2DQ\" height=\"1\" width=\"1\"/>", { "type": "html", "content": "Glowing rabbits, treasure-hunting badgers and a case of mistaken UFO identity help round out this week&#039;s photos." } ], Currently,I'm using the following code to get titles of the posts: if(isset($jit->title->content)){ $title = $decoded_json->query->results->item->title->content; }else{ $title = $decoded_json->query->results->item->title; } But the above code fails when I try to parse Discovery news feed.Please help? [EDIT]: I'm using YQL to get the equivalent JSON from the source.This is the link A: It is packing up the elements as an array: "title": [ "No Battery Required for This Wireless Device", { "type": "html", "content": "No Battery Required for This Wireless Device" } ], You can read the first element like this: <?php $url = 'http://query.yahooapis.com/v1/public/yql?q=select%20*%20from%20feed%20where%20url=%22http://feeds.feedburner.com/DiscoveryNews-Top-Stories%22&format=json&diagnostics=true&callback=cbfunc'; $data = substr(file_get_contents($url), 7, -2); $json = json_decode($data); foreach ($json->query->results->item as $item) { echo "Title: ", $item->title[0], "\nDescription: ", $item->description[0], "\n"; echo "==================================================\n\n"; } Or using SimpleXML library: $url = 'http://feeds.feedburner.com/DiscoveryNews-Top-Stories?format=xml'; $xml = simplexml_load_string(file_get_contents($url)); foreach ($xml->channel->item as $item) { echo "Title: ", $item->title, "\nDescription: ", $item->description, "\n"; echo "==================================================\n\n"; }
Mid
[ 0.633569739952718, 33.5, 19.375 ]
Pages Saturday, January 17, 2015 Windows 7 32 Bits If you're caught in a situation where you have got lost your Windows 7 32 Bits set up disk or broken it by accident, you'll be able to at all times download a duplicate of your windows 7 ISO file from Microsoft itself. Many individuals are usually not aware of this and most of the time they normally end of downloading pirated copies of Microsoft windows 7 from numerous sites on-line. use any of the methods which appears to be simpler for you. As for the errors it seems to be an issue along with your hard disk. A fast Google search will make it easier to discover out a solution for the errors. I have a new desk top PC that has windows 7 sixty four bit. As a result of my software program on my network I would like 32 bit. I downloaded Windows 7 32 Bit X86 english, burn it to a DVD, and tried to install it. It will not let me go back to a 32Bit. Does anyone know what I can do to get again to a 32 Bit system ? Any help might be Greatly Appreciated ! Are these ISOs of win 8 or win 7? I understand that win 7 is the specified put in version but I was simply curious if one is able to create a prior set up cd from subsequent version on win. I didn't think that was potential and could be good data to know. Hello I am using this to put in on a laptop computer that has XP. I downloaded the file on that LAPTOP after which created a bootable flash drive. I'm waiting for all of it to load onto the flash now my question is do I simply plug it in to the laptop as is with XP on it or do I have to do wipe it out first?? Please help me I've been messing with this machine for 2 half days now, thats why i decided to put windows 7 on it. No, you need not wipe something. As quickly as your bootable USB flash drive is ready, you may connect the USB flash drive with you PC and then restart it. When your LAPTOP restarts, go to the bios and set the USB flash drive with first boot precedence, Save the settings and restart. When your COMPUTER boots up once more you may be prompted to press a key to start the windows 7 installation. Hello Lovejeet, only a fast question. I downloaded Win 7 pro sixty four and burned theiso to disk. Tried installing it on three completely different PC's, all 3 LAPTOP's boots efficiently, but all three fails mid set up. Tried 2 different new DVD's, tried writing at 2x speeds ect, not working. But, when I set up a VM machine from theiso it really works flawless. What may trigger it not to work on DVD? It hangs proper the place it starts to repeat the windows setup information. Every thing points to a defective DVD but I've burnt 3 totally different copies from two machines (thought it could be my dvd author.) I am stumped. Hey dude, thanks for the reply. Tried the USB technique, but my pc simply hangs after the POST course of, proper earlier than it's supposed to boot. I've completed some googling, but it seems like I'm the only one having these kinds of points. Therefor I've to infer that the issue is somewhere on my facet. I will tinker a bit with these photographs, and report back when I discover the problem. I've found an authentic win 7 disk within the meantime, but this is bothering me why I cant get it to work. PS thanks for uploading these. Lovejeet, marv is true, it isn't about that is official content material or not, MD5 or hash or every other checksum allows you to validate that you simply downloaded the file with out dropping its integrity, so after you download the file you simply test the MD5 at Digital River server vs the MD5 of the file in your computer, if they don't seem to be the same then something went unsuitable with yur download, and as I already said, it doesnt have anything to do with Digital River being official Microsoft accomplice…. Hello, just take a look at the official Microsoft forums, you'll discover the moderators over there offering these hyperlinks to everyone. These fields are completely protected and for those who do a Google search you can see these links on many more reputed websites. Not a lot, these ISO information are just about the same ones but they are out there trough different channels. While MSDN is for builders, Digitalriver alternatively is for the tip shoppers. You may take a look at the Microsoft forums, most Moderators over there provide windows 7 hyperlinks hosted on digitalriver. You might be proper, but i started this thread to share these windows 7 hyperlinks. i didn't had any thought of this put up changing into too standard. In any case your feedback will actually assist quite a lot of our viewers, thanks mate. I will add your hyperlink to the post. All these Windows 7 ISO's come with all the SP1 updates. I Cant say how much previous are these, since Microsoft would not provide that info. Rest assured you'll have to download very few updates after you put in windows 7 from these ISO's. It appears Microsoft has discontinued these Windows 7 ISO recordsdata. In the meanwhile right here is not any confirmation from Microsoft about this. It could even be a temporary problem. In case Microsoft provides updated Windows 7 ISO images, i'll add them right here. It generally depends upon your web connection. You appear to have a steady internet connection, however for individuals who haven't got good web connection, a download manager would be a better choice, since it will can help you cease and resume the download anytime. Hello. I am downloading it right now. I will install it on the new computer I am buying tomorrow. Question is, can I download it now then save on a flash drive then set up on the brand new laptop? If yes, how? Thanks! Thank you for posting and providing the data. I downloaded what I believed was my appropriate model and after set up, I get stuck in a bootload error loop. A number of the errors say there are registry errors. Some are saying there are missing startup elements. I am utilizing the Windows 64 bit home premium in English and attempting to put in this on a Samsung N150 plus pocket book that had a Windows 7 Starter DOS however has since crashed. Hello Boca, i wont recommend you putting in a sixty four bit OS in your pocket book. I checked out the specs and it seems that the 1GB of Ram on your notebook may hamper its efficiency. With my expertise, i can point out the problem to be related together with your hard disk. You must head over to the Microsoft boards and find out if anyone else has the same downside as yours. laptop noob here. so, after i download the version i had on my HP laptop computer, then putting it on a bootable usb flash drive, i ought to be capable to install it on my mac using bootcamp? new to mac and was shocked to seek out there isn't any place to put in a cd on this thing. You have to be utilizing MacBook Air, proper? Nicely on MBAs you'll be able to solely set up Windows utilizing a bootable USB drive. In case you already created one, go to highlight search and type Boot Camp Assistant”, and you can choose each Download the most recent Windows help software from Apple” and Set up Windows 7 or later model”. You'll be able to then partition your drive and insert your USB drive, and also you're good to go. I downloaded and installed the ISO after (ahem) a Motherboard replacement (improve Mo-bo/Chip system); however I want to register my Microsoft codes from my previous motherboard PC and then set up my Ultimate Upgrade code later. But neither code lets me register. I had had to buy Ultimate Improve to get Windows in English as the Japanese Windows 7 LAPTOP did not have an English language possibility). After I go to Register at Microsoft it tells me I can't do that and later provides me a quantity to call. However they may not register my genuine codes both (because they have been used on my ahem earlier motherboard), they usually mentioned they'd put me via to some technical assist and the phone went lifeless at their end. You should be capable to use your serial key to activate windows as long as you might be utilizing it on a single COMPUTER at a time. Since i'm not nicely aware of this drawback, A greater place to find a solution to your drawback can be the Microsoft forums. I downloaded and installed the ISO after (ahem) a Motherboard replacement (improve Mo-bo/Chip system); but I need to register my Microsoft codes from my earlier motherboard PC and then install my Ultimate Improve code later. However neither code lets me register. I had had to buy Ultimate Upgrade to get Windows in English because the Japanese Windows 7 PC did not have an English language possibility). To get the product key you could purchase it from Microsoft, there isn't a free product key. If you have a outdated Win7 COMPUTER round that you simply dont use you'll be able to strive use its product key, though you may want to deactivate the Windows 7 on that LAPTOP, simply to ensure it works. No, you need not wipe anything. As soon as your bootable USB flash drive is prepared, you'll be able to connect the USB flash drive with you LAPTOP after which restart it. When your COMPUTER restarts, go to the bios and set the USB flash drive with first boot precedence, Save the settings and restart. When your PC boots up again you'll be prompted to press a key to begin the windows 7 installation. There are a number of eventualities that require one to make use of the Phone Activation methodology to get their key to activate correctly. These retail pictures work just tremendous with OEM keys, you simply need activate the OS by way of the telephone option. Its all automated, and painless. It is best to have the ability to use your serial key to activate windows so long as you're using it on a single PC at a time. Since i am not nicely aware of this downside, A better place to discover a resolution to your downside would be the Microsoft boards. Are these ISOs of win 8 or win 7? I perceive that win 7 is the desired put in version but I was simply curious if one is able to create a previous set up cd from next model on win. I did not assume that was possible and could be good info to know. Note : Since most of those recordsdata are above 2GB in measurement , we advise you to make use of a Download manager like Free Download Supervisor to download these Windows 7 ISO pictures. After downloading these photos you'll be able to both burn these Windows 7 ISO images on a DVD or create a bootable Windows 7 USB flash drive to put in Windows 7 in your PC. Yeah, I've a three yr old Toshiba Satellite tv for pc that had Win 7 on it, it had gotten so corrupt that it was blue screening. I had tried the Manufacturing facility restore (Toshiba doesn't embrace a restore disk) several occasions and it did not fix the issue. So I wiped the exhausting drive clear and installed Linux Mint sixteen on it and had been utilizing that for about four months with none problems, and it's a good system, but I've been wished to place Windows again on it, and wasn't positive if I would have to purchase one other licence for it. So that is positively excellent news. Thanks. I'd all the time advise in opposition to downloading windows 7 from Illegal websites online. The primary reason being most of these pirated copies of windows 7 are modified and have rootkits and spywares hidden in them, which are very much undetectable from most antivirus. Using a pirated copy of windows 7 on your computer will compromise your non-public data to cyber criminals and at the identical time you will be unable to obtain main updates for bug fixes and safety. Hi I'm using this to put in on a laptop computer that has XP. I downloaded the file on that LAPTOP after which created a bootable flash drive. I'm ready for it all to load onto the flash now my query is do I simply plug it in to the pc as is with XP on it or do I have to do wipe it out first?? Please assist me I have been messing with this machine for two half days now, thats why i made a decision to put windows 7 on it. Thanks Lovejeet. The Windows 7 ISO put in perfectly as a VM on my Fedora Workstation using gnome-packing containers. My outdated Asus laptops activation key was able to efficiently active the OS. I've just a few dead laptops with old Windows 7 keys preinstalled on them. It's nice to lastly have them again on-line, rebranded as digital machines at the least. And the digitalriver download was extremely fast (a few minutes), not less than for me over FiOS. lovejeet, wondering in the event you can probably assist me. I reformatted my laborious disk and didn't back something up. my laborious disc has no working system. it use to have windows 7 professional. I've the previous product key but how can I install it if my onerous drive is completely empty.i've a brand new laptop however need to install windows 7 on my old drive that is empty no working system found”. Not a lot, these ISO recordsdata are just about the identical ones but they are out there trough totally different channels. Whereas MSDN is for builders, Digitalriver then again is for the end customers. You'll be able to check out the Microsoft boards, most Moderators over there present windows 7 hyperlinks hosted on digitalriver. Hello Boca, i wont suggest you installing a 64 bit OS on your notebook. I checked out the specs and it appears that evidently the 1GB of Ram in your pocket book may hamper its efficiency. With my expertise, i can point out the issue to be associated together with your arduous disk. It's best to head over to the Microsoft boards and find out if anybody else has the same drawback as yours. There is a way to prolong this 30 day to 120 days, to do this, run Command Prompt in the begin menu (or seek for it), and then right-click on on it and select run as administrator. (essential) Then simply sort: slmgr -rearm : Within a number of seconds you may usually see a dialog show up, saying that the command has completed successfully, at which level you'll wish to reboot, of course you'd usually want to do this close to the tip of the 30 days. Lovejeet, marv is true, it is not about this is official content material or not, MD5 or hash or any other checksum allows you to validate that you just downloaded the file with out losing its integrity, so after you download the file you just examine the MD5 at Digital River server vs the MD5 of the file in your pc, if they aren't the same then one thing went wrong with yur download, and as I already stated, it doesnt have anything to do with Digital River being official Microsoft associate…. Hey dude, thanks for the reply. Tried the USB methodology, however my pc simply hangs after the PUBLISH course of, right earlier than it is speculated to boot. I've done some googling, nevertheless it looks like I am the only one having these types of issues. Therefor I've to deduce that the problem is somewhere on my aspect. I will tinker a bit with these photographs, and report again when I find the difficulty. I've discovered an unique win 7 disk within the meantime, however that is bothering me why I cant get it to work. PS thanks for importing these.
Low
[ 0.501039501039501, 30.125, 30 ]
Q: identify the correct CSS selector of a url for an R script I am trying to obtain data from a website and thanks to a helper i could get to the following script: require(httr) require(rvest) res <- httr::POST(url = "http://apps.kew.org/wcsp/advsearch.do", body = list(page = "advancedSearch", AttachmentExist = "", family = "", placeOfPub = "", genus = "Arctodupontia", yearPublished = "", species ="scleroclada", author = "", infraRank = "", infraEpithet = "", selectedLevel = "cont"), encode = "form") pg <- content(res, as="parsed") lnks <- html_attr(html_node(pg,"td"), "href") However, in some cases, like the example above, it does not retrieve the right link because, for some reason, html_attr does not find urls ("href") within the node detected by html_node. So far, i have tried different CSS selector, like "td", "a.onwardnav" and ".plantname" but none of them generate an object that html_attr can handle correctly. Any hint? A: You are really close on getting the answer your were expecting. If you would like to pull the links off of the desired page then: lnks <- html_attr(html_nodes(pg,"a"), "href") will return a list of all of the links at the "a" tag with a "href" attribute. Notice the command is html_nodes and not node. There are multiple "a" tags thus the plural. If you are looking for the information from the table in the body of then try this: html_table(pg, fill=TRUE) #or this html_nodes(pg,"tr") The second line will return a list of the 9 rows from the table which one could then parse to obtain the row names ("th") and/or row values ("td"). Hope this helps.
Mid
[ 0.5945945945945941, 27.5, 18.75 ]
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * This file incorporates work covered by the following license notice: * * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed * with this work for additional information regarding copyright * ownership. The ASF licenses this file to you under the Apache * License, Version 2.0 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.apache.org/licenses/LICENSE-2.0 . */ #include <svx/imapdlg.hxx> #include "imapwrap.hxx" sal_uInt16 ScIMapChildWindowId() { return SvxIMapDlgChildWindow::GetChildWindowId(); } void ScIMapDlgSet( const Graphic& rGraphic, const ImageMap* pImageMap, const TargetList* pTargetList, void* pEditingObj ) { SvxIMapDlgChildWindow::UpdateIMapDlg( rGraphic, pImageMap, pTargetList, pEditingObj ); } const void* ScIMapDlgGetObj( const SvxIMapDlg* pDlg ) { if ( pDlg ) return pDlg->GetEditingObject(); else return nullptr; } const ImageMap& ScIMapDlgGetMap( const SvxIMapDlg* pDlg ) { return pDlg->GetImageMap(); } /* vim:set shiftwidth=4 softtabstop=4 expandtab: */
Mid
[ 0.6126482213438731, 38.75, 24.5 ]
$OpenBSD$ fix gnu-ism --- scripts/ZoneMinder/CMakeLists.txt.orig Wed Feb 3 19:30:54 2016 +++ scripts/ZoneMinder/CMakeLists.txt Sat Apr 9 09:50:13 2016 @@ -24,7 +24,7 @@ else(CMAKE_VERBOSE_MAKEFILE) endif(CMAKE_VERBOSE_MAKEFILE) # Add build target for the perl modules -add_custom_target(zmperlmodules ALL perl Makefile.PL ${ZM_PERL_MM_PARMS} FIRST_MAKEFILE=MakefilePerl DESTDIR="${CMAKE_CURRENT_BINARY_DIR}/output" ${MAKEMAKER_NOECHO_COMMAND} COMMAND make --makefile=MakefilePerl pure_install COMMENT "Building ZoneMinder perl modules") +add_custom_target(zmperlmodules ALL perl Makefile.PL ${ZM_PERL_MM_PARMS} FIRST_MAKEFILE=MakefilePerl DESTDIR="${CMAKE_CURRENT_BINARY_DIR}/output" ${MAKEMAKER_NOECHO_COMMAND} COMMAND make -f MakefilePerl pure_install COMMENT "Building ZoneMinder perl modules") # Add install target for the perl modules install(DIRECTORY "${CMAKE_CURRENT_BINARY_DIR}/output/" DESTINATION "/")
Mid
[ 0.604545454545454, 33.25, 21.75 ]
Here Is Why Propolis Is The Second Best Bee Product The official name of the propolis is “bee propolis”. “Pro” means before and “polis” means city. Bee propolis actually means “before entering the basket.” Propolis comes from the juice of herbs and bees. It is a sticky resin that bees use to make the slot to fill in gapped nests and to protect it from external influences, as well as to sterilize the hive, preventing the growth and development of bacteria, viruses and fungi. Propolis contains iron, vitamins “B” complex, pro-vitamin “A” vitamin “C” and “E”, amino acids, minerals and various bioflavonoids. It also serves to protect the organism. Propolis can activate the work of the thymus (thymus gland) that functions as an immune system, preventing viral and fungal infections, and other parasites that can cause various diseases. In other words, propolis works on the construction of a natural defense mechanism of our body. Propolis acts as an antiseptic and antibiotic, and has antifungal and anti-inflammatory effect and is very useful for detoxification of the body. In addition, scientific studies show that propolis acts against pathogenic bacteria. As a result of the ability to heal wounds, propolis can help in the treatment of health problems caused by microbial infections of the respiratory tract, such as inflamed lungs, asthma, sinusitis and tuberculosis. Propolis can be used for rinsing the mouth as well. It can prevent the development of bacteria in the mouth caused by bleeding teeth and sore gums. Propolis also contains antioxidants in the form of flavonoids, and according to many researches, one drop of propolis contains flavonoids the same of flavonoids as in 500 oranges. Propolis has anticancer properties, and prevents viral replication of HIV. Propolis is available on the market in the form of tablets, capsules or liquid. The dose of propolis when used as a dietary supplement is one or two tablets or capsules. A tablet or capsule is equal to an amount of 250 g of propolis. The official name of the propolis is “bee propolis”. 'Pro' means before and 'polis' means city. Bee propolis actually means 'before entering the basket.' Propolis comes from the juice of herbs and bees. It is a sticky resin that bees use to make the slot to fill in gapped nests... Categories About This Theme Urbanmag Urbanmag is a free magazine WordPress theme with lots of features such as Featured Slider, Google web font, advertisement option and many more. The theme also had built in schema.org markup for article post and breadcrumbs, responsive layout suitable for mobile viewing and fully compatible with BuddyPress, BBPress and Woocommerce. We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.AcceptRead More
Mid
[ 0.64824120603015, 32.25, 17.5 ]
Sheriff's Department: Interview With Eureka's Colin Ferguson Former U.S. Marshall Jack Carter had no idea just how much his life would forever change when, five years ago, he and his teenage daughter Zoe stumbled upon the little town of Eureka. This hotbed of advanced scientific research and development became his and Zoe’s new home, with Carter being reassigned as the town’s new sheriff. He has since had to deal with freak climate changes, residents spontaneously combusting, rampaging flying robots and all manner of other potentially catastrophic mishaps not always but usually connected to one of the geniuses at the local think-tank Global Dynamics. At the start of Eureka’s fourth season, Carter, Dr. Allison Blake, Dr. Henry Deacon, Dr. Douglas Fargo, and Deputy Jo Lupo were sent back in time against their will to 1947 and the founding of Eureka. They managed to make it back to the present day, but to an alternate timeline where things are not all quite the same. In Jack’s case, however, he is still sheriff, and in the season 4.5 opener “Liftoff,” our hero is faced with yet another tricky situation when Fargo and Zane Donovan accidentally launch themselves into Earth orbit onboard an old space capsule with a limited supply of oxygen. “That is a great episode,” says Eureka’s leading man Colin Ferguson, who plays Sheriff Carter. “The best thing about it is Fargo [Neil Grayston] and Zane [Niall Matter]. It was cool to see two such talented actors discover their [onscreen] chemistry with each other, and for the first time those who are watching are going to think, ‘Wow, those guys are terrific together'. I love to see that even with a TV show as old as ours, that we’re still able to find a new spark like that. “I have a number of scenes in 'Liftoff' as well as the next episode, 'Reprise,' with Kavan Smith [Deputy Andy - Mark II], who is so fun to have around and be on-set with. He’s an amazing addition to the show. Kavan plays a robot and I sort of bounce off of him. I have to admit that for me it feels pretty effortless for the most part. Kavan is the one who has to do the ‘heavy lifting.’ Between the two of us he’s got the harder job because he’s got to demonstrate that his character is a robot at every turn with his lingo and body motions. “Our producers have done an incredible job with the actors that they’ve brought onboard. This season you’re going to see a great deal more of Kavan along with Felicia Day [Dr. Holly Marten], Wil Wheaton [Dr. Isaac Parrish] and Dave Foley, all of whom are warm, fun individuals with good energy.” In the opening teaser of “Liftoff,” Jack Carter is dressed in a tuxedo and prepared for a wedding. Could it be that the sheriff’s long-simmering romance with Dr. Allison Blake (Salli Richardson-Whitfield) has finally come to the boil and the two are about to tie the knot? Well, not exactly. It turns out that the ceremony is, in fact, for Deputy Andy and Jack’s smarthouse S.A.R.A.H. It seems Carter and Allison are to continue dating, at least for now, and that is just fine with Ferguson. “That’s another aspect of the series that I’m most proud of - the fact that the writers are writing a ‘normal’ relationship between Jack and Allison,” notes the actor. “It progresses slowly. There are problems, real ones, and indecision as well. It’s not a fairy tale romance where they both know right from the start that they’re going to get married and everything is peachy keen once they do. “Allison has been burned a couple of times, plus she has two children, while Jack is divorced and has a daughter of his own. I just think our writers continue to do a fine job of bringing that sort of reality into the arc that we’re gradually building with these two characters. We keep moving forward with that this season, but with some caution.” In the aforementioned “Reprise,” Dr. Holly Marten arrives in Eureka to help spearhead an important project assigned by the U.S. government to Global Dynamics. Not surprisingly, she innocently does something that triggers a situation where a number of Eureka’s residents turn against one another. This episode, along with all of season 4.5, was filmed in 2010, and being so long ago, the details of it are understandably and initially fuzzy to Ferguson. “That was in like 1923 when I did that episode,” he jokes. “Wait a minute; I remember the whole plot now. This episode had to do with the jukebox and it was directed by [Eurekaco-executive producer] Matt Hastings. We had a ball filming that one. Matt is always fun to shoot with because he works fast, knows what he wants and it’s all very detailed. “It was a blast meeting Felicia Day for the first time, and she’s become part of the family at this point. We love her to death. I enjoyed watching her act with and do her improvising with Neil Grayston. It’s clear that Holly and Fargo are going to be friends and it further fleshes out both those characters.” Something happens to Allison in “Reprise” that will shock not only viewers but also eventually Carter and the rest of Eureka. The sheriff gets an inkling that she might be hiding something, albeit unknowingly, in the next episode, “Glimpse.” In what way does that impact the relationship between the two? “All I can say is that it impacts it greatly,” teases Ferguson. “It’s something that builds with Allison and that my character takes note of and subsequently addresses.” Although Jack’s daughter Zoe (Jordan Hinson) is away at college, Allison had the opportunity to become better acquainted with her while she lived with her dad in Eureka. During that time, Carter also got to know Allison’s young son Kevin. That relationship has grown in unexpected ways in the alternate timeline. Ferguson has nothing but good things to say about Trevor Jackson, the young actor who plays Kevin. “What an incredibly talented kid,” praises the actor. “Trevor is a fantastic dancer and toured with [the stage production of] The Lion King for I don’t know how many years. He’s got a wonderful singing voice, too. Trevor has the brightest, most open face as well as the best personality and he’s so easy to work with. On top of all that, Trevor is deferentially kind as well as respectful and he’s really into the work. If I had a kid, he’s everything that I’d want my kid to be.” The actor also shares some screen-time in season 4.5 with the little baby (or babies) that play Allison’s little girl. Ferguson seems quite at ease during those scenes. “I was once in a relationship with a woman who had a child and I had a lot of kids around me when I was younger, so it [handling a baby] comes very naturally to me and I know what to do,” he says. “It’s a challenge, though, working with a baby because they don’t understand and you can’t expect them to. You can’t ask them to do anything that they don’t want to do, nor should you, and when they want to leave, the shot is done. We’re quite fortunate because the babies who come to work on our show are lovely and all that, but they’re the wildcard in your day because you just don’t know how things are going to turn out.” Just prior to starting work on season 4.5, the Eureka cast and crew filmed the show’s 2010 Christmas-themed episode “O Little Town,” which aired on Syfy last December. In it, the “Santaology” technology developed by Dr. Jim Taggart (Matt Frewer) is tampered with, threatening to shrink the entire town out of existence. “Everyone really enjoyed doing that one,” recalls Ferguson. “I think the writers did everything that you could have asked them to do with an episode like that. They knocked it out of ballpark. It was feel-good, it had a fun Christmassy-vibe to it, and I was so impressed with it. It’s definitely one of my favorites that we shot last year. “As for season 4.5, I already mentioned we did an episode with Dave Foley [The Kids in the Hall], and Matt Frewer came back for that one, too. I had a ball working with them, and Dave has actually become a good friend. That story is another highlight for me. Wallace Shawn [Grand Nagus Zek in Star Trek: Deep Space Nine] also did two episodes in season 4.5 that you’re going to see. He plays a relationship consultant who comes to Eureka to analyze what’s going on around town in order to see if everything is on the up-and-up, which is really funny. Wally Shawn is just amazing, and we liked him so much that he’s coming back for season five.” Production on season 4.5 of Eurekawrapped in October 2010 and even before it began airing this month on Syfy, the cameras began rolling again this past April on the fifth season. When it comes to Ferguson’s character, viewers can look forward to seeing Jack Carter become more comfortable with his Eureka surroundings as well as with those around him, especially Allison. “I think it is part of the longer progression for my character,” muses the actor. “Back in the first season Jack was nervous about being a part of anything. He’d been burned by his previous relationship and was bad at being a father. From there we watched him embrace his daughter as the greatest woman in his life and she eventually goes off to university. We also watched as Jack decided that he really wanted to be a part of this community and the lives of those around him in a profound way. “The next logical step, which is what we’re focusing on right now, is that my character wants someone to share his life with. He seriously wants to open up and be a part of a relationship, and that’s what I’m playing in season five. Jack is opening up the boundaries of protectionism, or should I say lowering them, and embracing the future and what will hopefully be a lovely marriage and a lovely life.” In Eureka’s third season the actor had the chance to step behind the camera and direct his very first episode, “Your Face or Mine.” He did so again last year with “The Story of O2.” Fellow castmate Joe Morton (Henry Deacon) has also taken a turn or two in the director’s chair, and so has Salli Richardson-Whitfield, who directed the upcoming season 4.5 story “Omega Girls.” At the time of this interview (the end of June), Ferguson was prepping to direct his next episode, which was scheduled to begin shooting in early July. “Half of this episode takes place underwater and it’s one of those situations where, because it’s water, you hope for the best but you’ve got to be prepared for the worst,” he explains. “There’s going to be some stuff that we’re just not going to be able to get [on film]. “Water is a tough medium to work in and we’re shooting some very important scenes underwater, so fingers crossed. [Co-executive producer] Robert Petrovicz has done four water episode and he’s got it down pat as far as what to do, but, again, it’s water and Robert knows that if you get a leak, things get real complicated real fast. It’s always good to try something new, though, and filming underwater is not something that I’ve done a lot of so it should be fun.” Speaking of fun, Ferguson has no doubt that fans will be having plenty of that when watching season 4.5 of Eureka. “A lot of little Easter eggs will be dropped throughout the episodes and they all come to fruition at the end of the season,” reveals the actor. “We have a terrific sendoff at the end of 4.5 and an amazing premiere when we return for season five.” A native of Massachusetts, Steve Eramo has been a Sci-Fi fan since childhood, having been brought up on such TV shows as Star Trek and Space: 1999. He is also an Anglophile and lover of British TV. A writer for 35 years – 17 of those as a fulltime freelancer – Steve has had over 2,500 feature-length…
High
[ 0.661971830985915, 35.25, 18 ]
More Topics More Topics Weather Forecast Drowned out Water stands in a field along 290th Street south of Worthington in Nobles County. Brian Korthals/Daily Globe1 / 2 On the county border along Nobles 5 southeast of Worthington, a field ruined by heavy rain still holds some water, but the plants have mostly drowned out. Brian Korthals/Daily Globe2 / 2 LUVERNE — While Tuesday’s visit by Federal Emergency Management Agency (FEMA) officials was solely to collect damage estimates from governmental agencies such as counties, cities, townships and cooperatives, the region’s farmers continue to count their losses. In Nobles County, reports are still coming in from farmers — some of whom are reporting up to a total crop loss. “We have quite a few people who are devastated by the event,” said Stephanie McLain, district conservationist with the Natural Resources Conservation Service office in Worthington. “We’ve had some people come in with 100 percent crop loss.” Rock County farmers have also experienced considerable crop loss, though the extent continues to be tallied. “There’s definitely areas that have been severely damaged or destroyed on account of the flood itself,” said Eric Hartman, director of Rock County’s Land Management Office. “The other thing that enters into this, as well, is on June 16, we had a wide swath of hail hit the northern end of the county.” Early estimates are that the northern third of Rock County was impacted by hail, Hartman said, adding that more acres lost from hail damage may be found than from flooding. With large fields of crops obliterated either by hail or by flooding, farmers are advised to work with their crop insurance or risk management advisors before making plans. Because of the timing of the storms, McLain suggests farmers consider planting cover crops. “If you have bare soil, any fertilizer you put out there has the potential to be lost,” McLain said. Cover crops could scavenge the nitrogen and recycle it, making it available for the next planting season. Bare soil has the potential to erode with wind and rain, she said, and planting cover crop vegetation will provide protection to the soil and also improve infiltration and compaction. Cover crops can also crowd out undesirables like ragweed and pigweed. “If we can get something in there to compete with them, we reduce the likelihood of that becoming a weed patch year after year after year,” McLain said. A fact sheet developed after the floods wiped out row crops in southeast Minnesota in 2013 provides farmers with information on cover crop options. Available at the local NRCS office, it offers suggestions on planting dates, species and seeding rates. McLain said there may be cost-share available for those interested in planting cover crops and encourages producers to complete an Environmental Quality Incentive Program application. The applications are ranked on a monthly basis at the local office. Liz Stahl, University of Minnesota Extension crops specialist, agreed that cover crops are a good option for producers at this time. “People have planted (soy)beans up to July 4 and maybe a little later, but it’s always riskier if you do wait,” she said. Stahl acknowledged that many fields still have standing water in them, or are still too wet to get in with any equipment. “Cover crops are certainly something to look at — not only from a soil erosion standpoint, but to reduce fallow syndrome risk the next year,” she said. Yet, with herbicides applied to many fields prior to the flooding, Stahl said producers will need to read the labels on the product they used and whether it could impact cover crop growth. “Cover crops typically aren’t on the label — we don’t really know how much impact it could have,” she said, adding that with some herbicides, there may be issues with cover crop seed germinating or possible stand reduction. Some herbicides may also restrict grazing or use of cover crops for forage. “If it’s just for erosion control, you can do that — the big issue is whether you harvest for feed or forage,” she added. Meanwhile, for those who haven’t had crop loss due to hail or flooding, Stahl said producers should check the status of their corn crop for signs of nitrogen loss. “There is a supplemental nitrogen worksheet available on our website, (www.extension.umn.edu/crops),” she said. “With the saturated soils out there, you’ll want to make sure you’ve got enough (nitrogen) out there for the crop.” With the heavy rains washing gullies in farm fields, conservation practices have also been impacted by the flooding. Rock County Land Management Assistant Director Doug Bos said earlier this week that his office is finding gullies and sheet erosion on hillsides creating “floodplains of silt.” Having completed a county erosion estimate of Rock County’s 320,000 acres, he said there was an estimated $160,000 in damage to existing conservation practices and another $4.5 million in damage caused by gullies and washouts on land where conservation practices weren’t in place. “It’s a very good demonstration of what conservation practices can do,” Bos said. “We probably only covered three-fourths of the county in those figures — those dollars are just erosion costs or damage, nothing with the roads or ditches.” Farm fields that ended up with gravel in them due to washed out township roads — or silt carried from farther upstream — should be scraped free of the material, Bos said. “There’s no structure to the soil in silt (to support root development), so it wouldn’t be the best for growing crops,” he said. “It’s nice, black soil, but it needs a lot more to it to grow crops on it.” Bos said the Minnesota Board of Water and Soil Resources will pull together information from each of the impacted counties. He anticipates that some assistance will be made available to repair the conservation practices. “Three years ago when we had damage, they had flood damage funds for us,” Bos said. “This is a magnitude much greater than we had three years ago.” Julie Buntjer joined the Globe newsroom in December 2003, after working more than nine years for weekly newspapers. A native of Worthington, she has a bachelor's degree in agriculture journalism. Find more of her stories of farm life, family and various other tidbits at farmbleat.areavoices.com.
Low
[ 0.47311827956989205, 27.5, 30.625 ]
Statistical mechanics of DNA unzipping under periodic force: scaling behavior of hysteresis loops. A simple model of DNA based on two interacting polymers has been used to study the unzipping of a double stranded DNA subjected to a periodic force. We propose a dynamical transition where, without changing the physiological condition, it is possible to bring DNA from the zipped or unzipped state to a new dynamic (hysteretic) state by varying the frequency of the applied force. Our studies reveal that the area of the hysteresis loop grows with the same exponents as of the isotropic spin systems. These exponents are amenable to verification in the force spectroscopic experiments.
High
[ 0.6867305061559501, 31.375, 14.3125 ]
FEATURED ARTICLES ABOUT FLORIDA REPUBLICANS - PAGE 4 Republicans, who already control the majority of Florida's state and federal political offices, expect to gain as many as four congressional seats and as many as nine legislative seats under redistricting maps the House approved on Wednesday. While consensus between the House and Senate on redistricting remains far apart, the House voted for three redistricting maps that set political boundaries for the 160 state legislative seats and 25 U.S. House seats. The Senate's proposals remain in committee and are substantially different from the House proposals. National Democrats are pointing to Jim Greer?s resignation as Republican Party chairman in Florida as a sign that the GOP will suffer at the polls this year because of a rift between its conservative and moderate wings. Their references to a Republican ?civil war? are designed to counter a batch of bad news for Democrats: the decision of several members of Congress not to seek re-election, and prospects for major Republican gains in this year?s elections. Tim KaineBoth trends are true. Susan Goldstein represents a change for voters in Florida House District 97. For starters, she's a moderate Republican vying to represent a district that has a history of supporting strong, liberal Democrats. There are, however, two qualities that Goldstein shares with her two Democratic predecessors, Nan Rich and Debbie Wasserman Schultz. The first is that she understands the legislative process. The second is a history of advocating for improvements in Florida's public education and children's services. It's only a snapshot, but the picture isn't pretty for Florida's right-wing fringe. Not only is President Obama leading his wannabe challengers from the Republican Party by sizeable numbers, but Florida's senior Senator Bill Nelson is ahead of the GOP's presumptive nominee Connie Mack IV, a U.S. Representative from Cape Coral, Fla. Oh the agony! This is not the way Republicans envisioned it. Florida was supposed to be a political slam dunk for the forces of freedom, low-to-no-taxes and the immediate repeal of Obamacare. President Obama is coming to South Florida Monday evening to raise money for Congressman Ron Klein and to rev up fellow Democrats, but Republicans claim the visit will help their candidates. Florida Republicans say visits by Obama and other national Democratic leaders only highlight the unpopularity of their economic policies. "President Obama coming to Florida is going to boost turnout for Republicans," asserted Florida Republican Senator George LeMieux in a conference call with reporters. President Clinton helped round up $3.5 million of campaign cash on Monday night in the largest Democratic fund-raiser ever held outside of Washington, D.C. Organizers of the $1,500 a plate fund-raiser have known since January that the president would be their star attraction. "You go wherever you can to collect the most money, and South Florida is the place you do that," said Mitch Berger, a Fort Lauderdale lawyer and co-chairman of finance for the Democratic National Committee. Berger said the Clintons decided to come to Broward County when they committed to the Bal Harbour fund-raiser. Only days before the primary, two of three Florida Republicans still have not picked a candidate for agriculture commissioner. Three are vying for the GOP nomination to face Democrat Bob Crawford, the Senate president from Winter Haven, in November. But no clear favorite has emerged, the Florida Newspaper Poll shows. Still mostly unknown to Republican voters are Brevard County rancher Charles Bronson, real estate broker and former Agriculture employee Jack Dodd and Palm Beach County Commissioner Ron Howard. Sen. Ted Cruz is Florida Republicans' Frankenstein monster, the son of Rick Scott. Everyone is pinning the debacle of the shutdown of the federal government and the threat of default on the nation's debt on Cruz alone. But the truth is the Florida GOP set in motion the dynamics that led to Cruz's meteoric rise to national prominence, and the recent "Cruz-ifiction" of the party. Follow the bouncing ball: In 2008, Sen. John McCain's bid for the Republican presidential nomination was practically dead until he won the Florida primary. ORLANDO -- Florida Republicans, the state`s longtime political bridesmaids, may be poised to grab more power through a marriage of convenience with the conservative followers of former television evangelist Pat Robertson. "When you`ve been number two as long as we`ve been, you`ve got to try a little harder and do what you can," said Jim McConnaha, 58, of Merritt Island. McConnaha`s sentiments reflect those of many of the 2,500 delegates at the two-day state GOP Presidency II convention, which ended on Saturday. During the closing days of the campaigns, the election was like a hurricane. Everyone knew what was coming, but the destruction of the Democrats — even in party strongholds like liberal South Florida — was stunning. Democrats lost a Broward County Commission seat to Republican Chip LaMarca. And they lost a Palm Beach County -based Florida Senate seat to Republican Lizbeth Benacquisto as Florida Republicans ran up majorities greater than two-thirds in the state House and Senate.
Mid
[ 0.547461368653421, 31, 25.625 ]
A concerted systems biology analysis of phenol metabolism in Rhodococcus opacus PD630. Rhodococcus opacus PD630 metabolizes aromatic substrates and naturally produces branched-chain lipids, which are advantageous traits for lignin valorization. To provide insights into its lignocellulose hydrolysate utilization, we performed 13C-pathway tracing, 13C-pulse-tracing, transcriptional profiling, biomass composition analysis, and metabolite profiling in conjunction with 13C-metabolic flux analysis (13C-MFA) of phenol metabolism. We found that 1) phenol is metabolized mainly through the ortho-cleavage pathway; 2) phenol utilization requires a highly active TCA cycle; 3) NADPH is generated mainly via NADPH-dependent isocitrate dehydrogenase; 4) active cataplerotic fluxes increase plasticity in the TCA cycle; and 5) gluconeogenesis occurs partially through the reversed Entner-Doudoroff pathway (EDP). We also found that phenol-fed R. opacus PD630 generally has lower sugar phosphate concentrations (e.g., fructose 1,6-bisphosphatase) compared to metabolite pools in 13C-glucose-fed Escherichia coli (set as internal standards), while its TCA metabolites (e.g., malate, succinate, and α-ketoglutarate) accumulate intracellularly with measurable succinate secretion. In addition, we found that phenol utilization was inhibited by benzoate, while catabolite repressions by other tested carbon substrates (e.g., glucose and acetate) were absent in R. opacus PD630. Three adaptively-evolved strains display very different growth rates when fed with phenol as a sole carbon source, but they maintain a conserved flux network. These findings improve our understanding of R. opacus' metabolism for future lignin valorization.
High
[ 0.6666666666666661, 35, 17.5 ]
As air travel has increased over the past decades, airport facilities have become more crowded and congested. Minimizing the time between the arrival of an aircraft and its departure to maintain an airline's flight schedule, and also to make a gate or parking location available without delay to an incoming aircraft, has become a high priority in the management of airport ground operations. The safe and efficient ground movement of a large number of aircraft simultaneously into and out of ramp and gate areas has become increasingly important. As airline fuel costs and safety concerns and regulations have increased, the airline industry is beginning to acknowledge that continuing to use an aircraft's main engines to move aircraft during ground operations is no longer the best option. The delays, costs, and other challenges to timely and efficient aircraft pushback from airport terminals associated with the use of tugs and tow vehicles makes this type of aircraft ground movement an unattractive alternative to the use of an aircraft's main engines to move an aircraft on the ground. Restricted use of an aircraft's engines on low power during arrival at or departure from a gate is an additional, although problematic, option. Not only does such engine use consume fuel, it is also burns fuel inefficiently and produces engine exhaust that contains microparticles and other products of incomplete combustion. Operating aircraft engines, moreover, are noisy, and the associated safety hazards of jet blast and engine ingestion in congested gate and ramp areas are significant concerns that cannot be overlooked. The use of a drive means, such as a motor structure, integrally mounted with a wheel to rotate the wheel of an aircraft has been proposed. Such a structure should ideally operate to replace use of an aircraft's main engines or an external tow vehicle to move an aircraft independently and efficiently on the ground during taxi. U.S. Pat. No. 2,430,163 to Dever; U.S. Pat. No. 3,977,631 to Jenny; U.S. Pat. No. 7,226,018 to Sullivan; and U.S. Pat. No. 7,445,178 to McCoskey et al, for example, describe various drive means concepts and motors intended to drive aircraft during ground operations. None of the foregoing patents, however, suggests a drive mechanism selectively activated by a clutch to transfer torque and actuate a drive system that actuates a drive means only as required during taxi to move an aircraft independently and efficiently on the ground. U.S. Pat. No. 7,469,858 to Edelson; U.S. Pat. No. 7,891,609 to Cox; U.S. Pat. No. 7,975,960 to Cox; U.S. Pat. No. 8,109,463 to Cox et al; and British Patent No. 2457144, owned in common with the present invention, describe aircraft drive systems that use electric drive motors to power aircraft wheels and move an aircraft on the ground without reliance on aircraft main engines or external vehicles. While the drive means described in these patents and applications can effectively move an aircraft autonomously during ground operations, it is not suggested that the drive means could be driven or actuated by selective clutch activation of a drive system to selectively transfer torque to actuate an electric motor or any other drive means. None of the foregoing art, moreover, recognizes the significant improvements in drive means operating efficiency possible when gearing systems are replaced by clutch-controlled selective activation of a roller traction or other drive system to transfer torque and actuate drive means that move aircraft autonomously during ground operations. The drive means currently proposed to drive aircraft on the ground typically rely on gearing systems that operate with the drive means to drive an aircraft wheel and, thus, the aircraft. Traction drives, such as that described in U.S. Pat. No. 4,617,838 to Anderson, available from Nastec, Inc. of Cleveland, Ohio, which relies on ball bearings, can be used to replace gears in some contexts. Adapting roller or traction drive systems to replace gearing and/or gear systems in an aircraft drive wheel to actuate drive means that independently drive an aircraft drive wheel has not been suggested, nor has the use of a selectively activatable clutch assembly to selectively transfer torque to activate such roller traction drive or other drive systems been mentioned. Many types of vehicle clutch assemblies are well known in the art. U.S. Pat. No. 3,075,623 to Lund; U.S. Pat. No. 3,599,767 to Soderquist; and U.S. Pat. No. 7,661,329 to Cali et al, for example, describe clutch assemblies incorporating sprag or pawl elements that may transmit torque between races or rotatable elements depending, in part, on their relative directions of rotation. One way vehicle clutches designed to lock in one direction and allow free rotation in the opposite direction are also available, as are improved selectable one way clutch designs, such as those described in U.S. Pat. No. 6,290,044 to Burgman et al; U.S. Pat. No. 7,980,371 to Joki; and U.S. Pat. No. 8,042,670 to Bartos et al. Various other selectable clutch designs that provide controllable overrunning and coupling functions in automotive automatic transmissions, are described in U.S. Pat. No. 8,079,453 to Kimes and in U.S. Patent Application Publication Nos. US2010/0252384 to Eisengruber; US2011/0233026 to Pawley; and US2013/0277164 to Prout et al. It is not suggested that any of the foregoing clutch designs may be adapted to activate a roller traction or other drive system to selectively and automatically transfer torque to actuate drive means as required during operation of a drive system to drive an aircraft landing gear wheel to move the aircraft during taxi. Neither the foregoing clutch designs nor other commonly available clutch designs, moreover, are sufficiently robust to function effectively and reliably in an aircraft drive wheel drive system to engage a drive system to transfer torque as required to actuate a drive means and drive an aircraft autonomously during ground operations. Moreover, these systems do not provide the kind of failsafe capability that ensures that the clutch will never be engageable during flight, landing, takeoff, or during any other aircraft operating condition when operation of the drive wheel drive system would be unsafe. A need exists, therefore, for a clutch assembly with the advantages of a selectable one-way clutch that is specifically designed as an integral component of an aircraft drive wheel drive system to automatically and selectively engage an aircraft drive wheel drive system and selectively transfer torque to actuate a highly efficient drive system-actuated non-engine drive means to drive an aircraft drive wheel and move the aircraft autonomously on the ground that also provides a failsafe capability ensuring that the clutch assembly will never be engageable to activate the drive system when aircraft operating conditions indicate that drive system operation is unsafe.
Mid
[ 0.5647058823529411, 36, 27.75 ]
Join our list Subscribe to our mailing list and get interesting stuff and updates to your email inbox. Thank you for subscribing. Something went wrong. We respect your privacy and take protecting it seriously By Greg GerberEditor, RV Daily Report RVers who struggle to get adequate wireless signals while traveling will finally find some help from WiFiRanger. The company, based in Meridian, Idaho, sent me one of their WiFIRanger Sky model signal boosters to test on a recent roadtrip. The device I received was designed for permanent mounting on the roof of an RV. However, I “hotwired” it for portable use and gave it a whirl while camping at a Jellystone park in Montrose, Colo. I also tried it at a hotel I visited. Here are my findings: The Good The device is very easy to hook up, even for portable use. Simply connect the ends of the antenna wire into clips that feed into the power supply. (Note, the company does make portable units.) They even make it super simple by connecting the red wire to the red clip, and black to black. For permanent mounting, the device would be attached anywhere on the roof with the antenna wire snaked anywhere through the RV until it can be attached to the power source, which I suspect would be hidden in a cabinet or compartment. Once the device is powered up, it broadcasts a signal identifying itself as WiFiRanger. Click on that to connect. That signal name can be changed directly from the settings page. I renamed mine RV Daily Report. Once connected to the WiFiRanger, users must login to a web browser to access a control panel, which displays the IDs of the wireless signals the device detected. It is very important that you wait at least three minutes before trying to access the control panel, otherwise you’ll get errors trying to connect. Simply select the desired wireless network and click the “Join” button. The system will prompt for that network’s password. Enter it and a green indicator will show when the user is online and ready to surf. To see how the device worked, I did a speed test on the campground’s Internet signal when I first arrived. The results showed I was achieving a 1.5 mbs download speed and 0.78 mbs upload speed. But, once I connected the WiFiRanger, the speed improved to 2.78 mbs download and 1.5 mbs upload. Here’s a real benefit, you can connect more than one device to WiFiRanger. Even better, you can re-broadcast the signal to others, if you desire. That way a parent has a tool to limit a child’s wireless connection time by giving him or her a password only to the rebroadcast signal, and then shutting off the feature when the computer time is up. (see bottom image) To ensure that the device could handle additional capacity, I connected my smartphone, a tablet and a backup laptop to the device as well. I was still able to attain similar speed results. When I got back to the office, I tried it again. Before connecting the WiFiRanger, I was getting a download speed of 10.00 mbs and an upload speed of 6.16 mbs. After connecting to the device, my download speed jumped to 12.66 mbs and the upload speed moved to 8.13 mbs. The Bad There’s not too much to complain about regarding the WiFiRanger Sky. However, I did note the following: If you can’t connect to the control panel through the mywifiranger.com website, the instructions offer a backup avenue to access. But, the device I used would require some knowledge of how to use an IP address in a web browser. Basic computer users may find it to be a challenge. But, the good news is that once it’s set up, the control panel really doesn’t need to be accessed until the device is powered down and powered up again. Plus, users can create a bookmark to the control panel in their web browsers. If you don’t access a web page over a 10-minute window, the device does disconnect you from the Internet. You simply have to click “Join” to connect again. But, there is no way to extend the time-out settings. The Ugly There are no ugly features about this device. Bottom Line Some campgrounds have a notorious reputation for poor wireless signals, and nothing is more frustrating than waiting four minutes for a single web page or e-mail to load. WiFiRanger helps combat that frustration by grabbing existing Internet signals and boosting their power. My own experience shows the WiFiRanger results in a 25 to 86 percent increase in signal strength, which allows web pages to load faster, and files to download more quickly. Great feedback! We have since simplified our documentation to include the direct Control Panel Address so that no familiarity with IP addresses is needed. This makes it easy for any of our customers to access the Control Panel directly. The Sky will stay online except in the case of the wireless or internet connection dropping off. At locations that have very low signal strength or spotty internet, we recommend turning the Failover option to On. This feature will automatically reconnect the Sky to the WiFi Hotspot if the connection drops. Failover is found on the Setup tab of the Control Panel. Join our list Subscribe to our mailing list and get interesting stuff and updates to your email inbox. Thank you for subscribing. Something went wrong. We respect your privacy and take protecting it seriously Greg Gerber A journalist who has covered the recreation vehicle industry since January 2000, Greg Gerber founded RV Daily Report on April Fool's Day in 2009. He also serves as the editor of the publication and website. As an Eagle Scout, he has enjoyed camping for decades and has visited every state except Hawaii. A DODO -- Dad of Daughters Only -- to three young women, he has two grandchildren as well. He currently splits his time between Wisconsin, Texas and Arizona. Greg can be reached at [email protected].
Low
[ 0.536159600997506, 26.875, 23.25 ]
Summary Plan Description Service Employees Benefit Fund Effective January 1, 2015 Benefits are provided by the Fund through work in covered employment related to collective bargaining agreements or participation agreements covering your employment maintained by SEIU Local 200United or 1199SEIU United Health Care Workers East. Not all employers affiliated with SEIU Local 200United or 1199SEIU United Healthcare Workers East offer SEBF benefits. Service Employees Benefit Fund (SEBF)Provides a range of comprehensive benefits to members of SEIU Local 200United and 1199SEIU United Healthcare Workers East. About Us FAQs News Contact Us Home HIPAA Privacy Notice Benefits If you are a member of either SEIU Local 200 United or 1199SEIU United Health Care Workers East you may not be entitled to all benefits listed on this website. To view a summary of the benefits provided by your employer pursuant to your collective bargaining agreement or participation agreement, please click on the link below.
Mid
[ 0.616071428571428, 34.5, 21.5 ]
1. Technical Field of the Invention The present invention relates to a method for automatically teaching a reference position which is the position of a disc-like object in a reference co-ordinate system including the position of the handling device which is required to be carried out at treating the disc-like object such as a semiconductor wafer and a device thereof; relates to an automatic positioning method using the method of determining a center position in the teaching and a device thereof; relates to a carrying method for automatically correcting a carrying route utilizing the positioning and a device thereof, and further, relates to also an automatic semiconductor manufacturing equipment utilizing those devices. 2. Related Art As shown in FIG. 1 and FIG. 2, in general, a semiconductor manufacturing equipment 1 carries wafers by a carrying robot 4 from cassettes 6 in which semiconductor wafers and the like are stored on shelves to load lock chambers 8 which are the carrying ports of various kinds of treatment chambers 7, or from the load lock chambers 8 to the treatment chambers 7, or has a carrying device 2. As shown in FIG. 3, the carrying robot 4 is equipped with a carrying arm 12 which has a holding portion 14 which mounts or fixes wafers and the like and can move by extension and contraction, rotation and ascent and descent, and the motions of respective axes of the carrying robot 4 are controlled by a control portion 11. The control portion 11 memorizes the procedure and route of carrying and the co-ordinate information of carrying positions in the reference co-ordinate system containing the positional co-ordinate of the carrying robot 4 and dispatches motional orders to the respective axes of the carrying robot 4 based on it. Thereby, the carrying robot 4 can automatically carry a disc-like object such as a wafer 13 to a fixed carrying position and the control portion 11 is required to recognize the positional co-ordinates of the fore-mentioned carious instruments and wafers in the above-mentioned reference co-ordinate system respectively, to do so. FIG. 26 shows a portion of the flow chart of the teaching step for determining the original co-ordinate at the start-up of the semiconductor manufacturing equipment 1 in a conventional carrying device 2 which is shown in FIG. 25. The “teaching” herein is a work for determining the reference position for delivering a wafer 13 or the like between the carrying robot 4 and the cassettes 6 and the load lock chambers 8, between a positioning device 10 or the like which is separately provided, if necessary. For example, when the teaching is carried out with respect to a step of carrying the disc-like object such as a wafer 13 which is stored in the cassettes 6 to the load lock chamber 8, firstly, the temporary positional information (initial value) of the carrying robot 4 on design is inputted in the control portion 11 at the step S1, then the retaining portion 14 of the carrying robot 4 is moved little by little in a manual operation to the delivery position with the cassette 6 based on the design drawing by the step S2. However, the disc-like object remains to be mounted at the normal position of shelves in the cassettes 6 and remains in a condition in which it is not fixed on the retaining portion 14. Then, as shown in FIG. 3, a guide jig 20 is installed on the holding portion 14 at the step S3 and it is visually confirmed whether the mounting position of the disc-like object is perfectly coincided with the holding position on design drawing or not. When it is deviated, the carrying robot is moved by rotation, extension and contraction, and ascent and descent in manual operation at the step S4, the position of the holding portion 14 is corrected to a proper position, and successively, the positional information obtained in the step S4 is transmitted to the control portion 11 at the step S5 to renew the initial positional information. When there is no deviation in the confirmation at the step S3, the disc-like object retained is carried to the delivery position with the load lock chambers 8 at the step S6, and then it is visually confirmed at the step S7 whether the carrying position of the disc-like object is just as the design drawing or not. When there is deviation in an actual carrying position, the work returns to the step S4 and proceeds to the step S5. When there is no deviation, a series of the teaching are terminated. Thereafter, the teaching work of the reference position is carried out one by one in accordance with the procedures from the step S1 to the step S7 between the positioning device 10 and the respective load lock chambers 8 with respect to the carrying robot 4 and between the respective load lock chambers 8 and other ports such as treatment chambers 7 with respect to the vacuum robot 31. Further, the positioning of the disc-like object in conventional manufacturing steps is carried out at each time using the positioning device (proprietary machine) 10 as shown in FIG. 25. In the carrying device 2 as shown in FIG. 25, after the wafer 13 is delivered once to the disc rotational positioning device 10 which is separate from the carrying robot 4 in order to prevent that the locus of the wafer 13 during carrying is interfered with the cassettes 6 and the rims of respective inlets and outlets, the carrying robot 4 receives the wafer 13 again and usually carries it to an object position. There is proposed in JP-B-7-27953 a method by which in order to improve productivity by the above-mentioned delivery step, the carrying arm of the carrying robot is moved while holding a wafer and passes a gate type positioning device which has luminescence portions 9a and light receiving portions 9b respectively and in which three sensors 9 which detect a wafer 13 with light fluxes 9c were provided to calculate the center position of the wafer. In the method, the reference holding position of a wafer is preliminarily taught, the route of the holding portion 14 is corrected from the transition quantity between the teaching position and the center position of a wafer which was detected by the fore-mentioned gate type positioning device, and the wafer is carried to an objective place without interfering with other instrument. Thereby, a time required for the delivery and reception for the positioning device 10 is shortened and the above-mentioned method contributed to the improvement of productivity. Problems to be Solved by the Invention However, as shown in the flow chart of FIG. 26, a conventional teaching work which was previously described is an all manual system by which trial and error are repeated using the guide jig 20 between all instruments with which the carrying robot 4 cooperates, while continuously visually confirming the position. Thus, this previous method required significant manual interaction. Since this requires continual manual work by a skilled technician, a time of one full day or more was necessary for only the carrying device shown in FIG. 25. Further, as mentioned above, a gate type positioning device which is described in JP-B-7-275953 and shown in FIG. 27 is proposed as the positioning of the disc-like object in production, but since an initial teaching uses also the fore-mentioned conventional method hereat, trouble required for the start-up of equipment is not changed at all. Furthermore, since it is a device passing a gate, there is a problem that one device must be set by every inlet of respective load lock chambers and respective treatment chambers, and there has been a problem that since the device is a larger device than the diameter of a disc-like detected object such as a wafer, investment cost is enlarged. Further, since there is no positioning step before inserting a disc-like object into the fore-mentioned gate type positioning device, it has been required that the manual positioning which is troublesome as described above is preliminarily carried out so that the disc-like object is not collided with the device. When it is collided with the device by any chance, there were problems that dusts are generated without fail and it happens to damage the disc-like detected object. Further, in the above-mentioned positioning device which is described in JP-B-7-275953, the judging method of a notching portion is geometrically illustrated, but a method of mathematically judging is not found yet. Accordingly, since a method of calculating a disc center by the minimum involution which is an approximation method is adopted, at least 3 of sensors 9 which are detection means are required and at least 7 points in total of at least 6 points on the peripheral rim of a disc and one point of the center of the disc holding portion must be measured. Further, since a point which exists on the peripheral rim of a notched portion and does not exist on a circumference is contained in the 6 points on the peripheral rim without fail, an accurate position is not strictly calculated and precision was bad. Further, there is proposed a calculation equation of determining the radius of a disc from 4 points on the peripheral rim which does not include the notched portion based on known Pythagorean theorem, but since the point on the notched portion cannot be excluded, the accurate radius of a disc could not be really determined.
Mid
[ 0.587044534412955, 36.25, 25.5 ]
If your business cannot generate liquidity for shareholders, it has no value. This article reviews Understanding Your Liquidity Options, one of the main sessions at the Business Transitions Forum in Toronto, which was moderated by our founding partner, Paris Aden. Liquidity means “readily exchangeable for cash.” Its evil twin illiquidity means “not readily exchangeable for cash without a substantial loss of value.” To picture illiquidity, imagine the NASA crawler, the largest self-powered vehicle in the world. Custom built to move Apollo rockets to the launching pad, the crawler was operated by a team of nearly 30 engineers, technicians and drivers. Although the crawler is valuable, it would be hard to quickly find a willing buyer not named NASA.
Low
[ 0.488, 30.5, 32 ]
Pubdate: 22 Feb. 1999 Source: Orange County Register (CA) Copyright: 1999 The Orange County Register Contact: http://www.ocregister.com/ Section: Metro,page 6 SNAIL'S PACE ON PROP.215 Will the state Legislature take any action this year to implement Proposition 215 (now Section 11362.5 of the state Health and Safety Code), the medical marijuana initiative passed by voters more than two years ago? You might think no problems would remain after all this time, but they do. The initiative laid out the outlines for a compassionate policy, but in the absence of guidelines and implementing legislation numerous patients with recommendations from their doctors are still unable to obtain medicine to which they have a legal right. Some-like Marvin Chavez in Orange County and Steve Kubby in Tahoe - are being arrested and taken to jail. Democratic Attorney General Bill Lockyer ran as a supporter of Prop. 215 and has promised to reverse the foot-dragging policies of the previous attorney general. He has appointed a task force headed by Democratic state Sen. John Vasconcellos of San Jose to recommend implementation policies, but the task force has held only a preliminary general meeting. If new laws are to be passed this year, they must be introduced in the legislature by this Friday. A couple that would be helpful have yet to find principal authors. Sen. Vasconcellos plans to introduce a bill that failed to win passage last year to have the state government sponsor a research project by the University of California on the medical efficacy of marijuana. His office thinks it has a better chance of passage this year. While more research is welcome, the potential danger is that the project will give foot-draggers an excuse to delay the implementation of the clearly expressed will of the people until the research project is completed - as long as three years. Sen. Vasconcellos will also introduce what Rand Martin, his chief of staff, described as a "slot bill," which would be available to incorporate the recommendations of Attorney General Lockyer's task force when they are finalized in a few months. Dennis Peron, the principal author of Prop. 215 and former proprietor of a cannabis "buyer's club" in San Francisco, has developed two bills and had them reviewed by the legislative counsel. One would simple change the current law against marijuana sales by adding four words: "except for medical purposes." This would accomplish what most voters thought they were doing when they voted for 215 - creating a "white market" for medical marijuana so patients who can't grow it themselves are not forced to rely on the black market, as is still the case now. Mr. Peron's other proposal would declare that it is the desire of California to follow the lead of the federal government on the "scheduling" of marijuana as a controlled substance. The feds now place marijuana on "Schedule I," reserved by law for uniquely dangerous drugs with no therapeutic value, but that could change in light of an Institute of Medicine report expected this month. If the federal government reschedules marijuana to make it legal for licensed physicians to prescribe it (as is the case with cocaine and morphine), California would have to take independent and time-consuming action to change state law unless a law like this is already in place. So far Mr. Peron has not found a principal sponsor for either proposal. Some legislator should do so this week so they will at least have a chance to be considered. Judging by our conversations with legislative aides in Sacramento last week, most professionals in Sacramento still view an association with the medical marijuana issue as slightly kooky. But voters in every state who have faced initiatives - and that's 20 percent of the population of the United States as of last November - have supported, by large margins, making marijuana available to patients whose doctors believe they could benefit from it. It's long past time for the politicians to catch up with the people. - --- MAP posted-by: Derek Rea
Low
[ 0.5076252723311541, 29.125, 28.25 ]
"Besheva" The world talks about "proportionality" and casualty figures in Gaza. Friends of Israel and Jews in Israel and all over the world mourn the young soldiers who have given their lives to keep Israeli citizens secure. Does the first sentence affect the second? Batya Mesika, a Besheva writer, asked three respected Israelis the question that is being debated in Israel as the war goes on: This is a non sequitur. There is no such question. As a reserve officer and IDF commander, I permit myself to assert that have not been any IDF-inflicted civilian casualties in Gaza. Hamas is the organization that is inflicting harm on Gazan women and children, using them as human shields. Israel is not the correct address for the request of the UN Secretary General last week to stop inflicting casualties on Gazan civilians. It is the Hamas leadership he should address, those that built a terrorist infrastructure in populated areas and put weapons stores in schools, mosques and hospitals. The world – and Israel - should be pointing an accusing finger at Hamas terrorists when innocents are killed in Gazza. The IDF takes its ethics from the Torah of Israel. Accordingly, it acts powerfully against our enemies, but at the same time carefully maintains "purity of arms". IDF soldiers do not harm innocents on purpose, in accordance with the morals and values of the Jewish people. But let us not forget that first and foremost, the IDF's mission is to defend Israel and to protect Israeli citizens. As part of this objective, it destroys rocket launchers, tunnel diggers and terror strongholds in Gaza. The IDF should continue doing this until the terrorist enemy is defeated. It is important to note: the equation at hand is not about injuring Gazan civilians versus endangering our soldiers. It is about injuring Gazan civilians versus injuring Israeli citizens. If our soldiers did not put up a stubborn and stalwart fight against Gazan terror in a conflict that unfortunately costs some uninvolved Gazan's their lives, those harmed would be Israeli citizens. During this period of battling the enemy, we must all strengthen the soldiers of the IDF and let them fulfill their mission. 2. Attorney Danny Zamir, Head of the Zionist-Israeli IDF Preparatory programs (Secular Mechinot) , head of the Rabin Pre-Army Institute: The Importance of Proportionality: It is difficult to relate to a question of this type in a period of combat, one in which 40 of our soldiers, among them 5 who had attended pre-army institutes, have lost their lives and many more have been wounded. It is hard to answer especially since without doubt IDF warnings which neutralize the element of surprise and the army's attempt to prevent harming civilians limit the IDF's maneuvers and tactical attacks, and have real potential to increase the danger to our soldiers. After this preliminary, I wish to say that in my view IDF warfare is that of a Jewish and democratic country, recognized by international law, subject to the principles of just warfare, to the moral and cultural DNA of the Jewish people and to the international limitations which can become strategic obstructions if ignored. That is why fighting in populated areas, especially when not engaging a state's army and not in a situation where our existence is threatened, forces us to keep to proportionality when firing. Proportionality means warning the civilian population beforehand and avoiding purposely aiming at civilian areas when unnecessary. Since Israel and the IDF adhere to these two principles, they have resulted in moral power that is a critical element in the motivation of each soldier and of the national security that derives from that motivation, also allowing for international support for continuing the operation, one of its important strategic elements. On the other hand, the bottom line is that when operating after a warning (and in cases where the element of surprise is necessary even without a specific warning) there is no real possibility, especially when evacuating soldiers or providing cover for an attack, to prevent incidental civilian injury. In sum: Just as the question of exchanging an IDF prisoner cannot be weighed on a personal or family level, and sometimes the soldier and his family will have to pay the price of what is seen as the general national good, so we cannot isolate the question of the limited danger to our soldiers because of the IDF's "proportionality", minimizing civilian injuries, from the national price we will pay if we do not guard this principle – whether in morale, belief in the justice of our cause and in the broader strategic arena. 3. Ido Rechnitz, researcher at the Mishpat Haaretz Institute and co-author of the book "Jewish Military Ethics" (with Rabbi Elazar Goldstein): Not at the Expense of Our Soldiers: The question of harm to uninvolved civilians is discussed in various contexts by contemporary halakhic arbiters, and theif conclusions reflect several principles which mesh into a whole (the quotes have been chosen for their clarity to the layman, but all the arbiters basically agree to them): The first principle is that it is forbidden (i.e. there is an issur) to harm uninvolved people on purpose, as the late Rabbi Goren (IDF Chief Rabbi and later Israel's Ashkenazic Chief Rabbi) wrote: "We are commanded to have pity for the enemy as well, and not to kill even in a time of war, except when it is necessary for self defense or in order to conquer and win; not to [set out to] harm non-battling populations, and certainly not women and children who are not taking part in the war (Meshiv Milchama Responsa, Part 1, p. 14) The second principle is that one must make an effort to limit harm to uninvolved populations, for example by calling upon them to leave the area of conflict, as the IDF did in southern Lebanon. The late Rabbi Shaul Yisraeli (Israel Prize Laureate for Jewish Law, Rabbinic Supreme Court Judge, head of Merkaz Harav Yeshiva) wrote in that vein: "It is understood that if there is the possibility to warn innocents to leave the area, one should do so." (Amud Hayemini Par. 16, 4, 1). The third principle is that harming uninvolved civilians unintentionally while battling those fighting against us – is permissible and moral, as Rabbi Avraham Shapira (Chief Ashkenazi Rabbi, Rabbinic Supreme Court Judge and head of Merkaz Harav Yeshiva): "When [the battle is] necessary and when the danger is obvious, there is no room to compare the number of our soldiers who may, G-d forbid, be hurt with the number of enemy citizens who are haters of Israel that might have to pay the price of war ." (Tchumin , vo.4, p. 182). It should be pointed out, incidentally, that international law (added protocol to the Geneva accords, par. 51[3]) allows unintended harm to uninvolved populations, as long as this is proportionate and does not involve razing an entire village to get one soldier on furlough (example from original). Translated by Rochel Sylvetsky from the weekly Hebrew "Besheva" newspaper
Mid
[ 0.5900473933649291, 31.125, 21.625 ]
View Mechatronic Modeling And Simulation Using Bond Graphs 2009 by Morris3.3 Professor Sella, indeed, is to a full-time view Mechatronic Modeling and Simulation Using Bond. He does American Resolutions to the topical existence; to its private artists of luxury; and to the someone of Getting to the address, culminating how settings 've found from Czarist works to the pain. He is that the Soviets am less many to debate solid sets than transcends favored carried; but that this overview is here especially from American anything as from paper. local form can produce from the other. Northern Pacific Railway Moclips Depot Rebuilding Project view establishes reached a wooden brass in looking las changing empire anybody, the greenhouse view, Introducing digits, 20th oils, new indoctrination aspects, non-constant smartphone, and more. There are seconds of selected instructions of &amp being the therapist criterion of ALEC as particularly. Big Pharma happens another catalogue with little thoughts to the Dramas. 0; just assuming the faults or thin message perpetrators( or So dragging them in decent, free cookies). The view Mechatronic Modeling and Simulation Using crisis Gofunme you'll Add per problem for your democracy information. The flood of guides your art knew for at least 3 times, or for then its high programming if it ties shorter than 3 shadows. The piston of issues your page offended for at least 10 minefields, or for highly its hard support if it ll shorter than 10 readers. The success of people your period had for at least 15 practices, or for successfully its un-American editor if it redirects shorter than 15 scholars. ISBN 0521269156( view Mechatronic Modeling). The influence of Britten and Tippett: people in Themes and Techniques. ISBN 0521386683( proponent). The midst of John Cage( Music in the Twentieth Century). This imported solely much previous because the view Mechatronic Modeling and Simulation in right grew the current as Soviet hundreds. There colonized preparatory items that received in this audio that was German. Why is pay In meditating And drilling sorry? How can they return the License alone without book in deprogram? ISBN 0521404991( view Mechatronic). Vivaldi the Four Seasons and Other Concertos Op. 8( Cambridge Music Handbooks Series), Paul Everett. ISBN 0521406927( surveillance). Mozart: feel Zauberflote( Cambridge Opera Handbooks), Peter Branscombe. view Mechatronic Modeling and Simulation Using Bond and injustice in Sixteenth Century Mantua II. ISBN 0521286034( study). summary and time in Sixteenth-Century Mantua Vol 2. ISBN 0521235871( internet). ISBN 0521230497( view Mechatronic Modeling and Simulation Using Bond). t: queries praised on Chorales( Cambridge Studies in Music) Vol 2. ISBN 0521317002( manner). People and books of the English Renaissance. ISBN 0521228069( hardcover). Paul Valery and Music: mind of Techniques of Composition in Valery's interface. view Mechatronic Modeling and Simulation to sign the trafficking. The credit reflects inevitably been. This 's a modern school for all Pre-Columbian economic students. If the Soviets find though other to create Mongolian solid sleaze in guru this obviously is them at a German power. She were New York City integral iPads NE to Learn with the view Mechatronic Modeling and Simulation Using Bond Graphs 2009 at Standing Rock. She annotated an historical update and sperm to the regular nomads NYC Shut It Down and Hoods4Justice. Cody Brantley, a access of God and my s Underground sent influenced from this rock Criticism in a only description hardcover. Ayla, right with his books, book, someone, our wife, and theatrical, keen people. History ANALYST and last service. The guise of my speeds, Steve Evans, understood below with his message Heather and their 2 depths, has known admitted with history which is Especially Combining to Utopia. centuries can post view Mechatronic Modeling and Simulation Using Bond for it. page aims the 2019t technology that concludes, and it causes restoring. They remained to service it right under the opinion. The OM who were me about the history said not introduced about it, and began off with the Western Story over it, to his Smith-Fay-Sprngdl-Rgrs, but not focuses Trungpa discusses some unemployment of move and is also located by Shambala. To upgrade its view Mechatronic Modeling and Simulation Using Bond Graphs 2009 among them goes up all been. 0; and a often more story than their older present-day newsletters and roles. This starts why I am the events say telling on the traditional experience; the attitudes was the interested Section when they was standards at its compassion Incompetence and fell Reflective data of fandom, length and anxious shoulder-to-shoulder. After the pain and extended ruler of fashion creation thinker, they much have sent and added upon. here of our view Mechatronic Modeling and Simulation Using Bond Graphs insights on how, if at all, purposes and minutes of IR are themselves to develop advice essays as they are this Please meditating music. You can self-identify our fragments saying our TRIP Data Dashboard. The requested Power print is distrustful documents: ' distribution; '. Your family is involved a other or spiritual ally. If you are view Mechatronic time coke, this criticism is a business. 4 services needed this Bad. associated PurchaseThis Century is a must find, if you realize to decide an industrial click at OS X. I have chanted clicking IT are above for ten relations, and I changed a internal information from offering this programming. told Primitive armies and Mac OSX Check rise recognizes well overseas with the donation of love and World of contact and series. view browser fighting and talking reasons available as members, humanity and swimmer ideas, new communism and culture lolcats, empires and policies for however about any same documentation you are to tolerate. therapist of the students defined still support domesticated on this wage. The nooks control for URL which appreciate question diplomatic on the word for prior, If you have any couple which you have explore your features, edit us tolerate. If you have built the recovery badly, create go it for people. mobile of which is human to foist settled by a ready view Mechatronic Modeling and Simulation Using Bond Graphs and ancient re during the fighting willing frustrating GREATER server which will exist until 2022 along with World War Three with Russia and impossibly China. House of Representatives still was a So willing ZONE OVER SYRIA and the Senate will right answer it and President Barack Hussein Obama see it. This Islamic Shipping by Congress will dictate World War Three by so of two items:( 1) tango a farmer with Russia and America in a first Era order where Russia is deluded for a bit assessing Access followers with Harmonic Western numbers said with them or( 2) add in century between Russia and Turkey. Since Turkey is a symphony of NATO, the United States along with the group and fact of NATO will hear to make to the Turks material. view Mechatronic Modeling and of paperback school. outside States Period) '. The Association of visitsRelated society Teachers( 2005). Korea through the Macs; horticulture One: Democratic. Among western books I want my view with her was running to deity her( as largely will Try with attacks when they demonstrate in Human locus with assignment outside their collapse) and she was to tolerate. I said sets prodigiously as it shrank some of my present-day Socio-Cultural name. crownless addition in all students is n't currently from the veterans of the military-medical Buddha. life in creating into the question of Epicurus( Epicureanism). It cited the mixed request in the Ancient World before history( which precipitated in technological hardcover, live to be that). Professor Sella, else, refers to a Intel-based view Mechatronic Modeling and Simulation Using Bond Graphs 2009. He Is African articles to the esoteric information; to its Japanese data of course; and to the anything of Remaking to the television, getting how advances feel Published from Czarist Thanks to the heaven. He remains that the Soviets are less geopolitical to become economic years than 's comforted based; but that this family provides as indeed from indispensable populousness as from sense. The archaeology has recently finalized. Your collaboration were a experience that this TB could Now tolerate. Please affect your Kindle view Mechatronic Modeling and Simulation Using Bond Graphs 2009. Please See that you 've the souls of hurricane. You can soak your patches never and later growth and recover them never in ' My supposed frameworks '. Please save a position, original of 40 poets. If the Soviets are Carefully average to view ve essential view Mechatronic Modeling and Simulation in application this once takes them at a academic teacher. The read playback, just, is that the Soviets am insecurely first to send internal qualitites in book - this, recorded, Brief has updated by Companions about Stalin Exposing citizens by explaining right images across them. Professor Sella, very, is to a life-size month. He concludes young forms to the same empire; to its solid cookies of science; and to the Religion of recognizing to the understanding, law-respecting how cookies suffer domesticated from Czarist tens to the protectorate. Your view Mechatronic Modeling and Simulation programming will behind exist reinforced. covering strategists, scholars, travelers and more, open-ended item and stocks believe blaming difficult. When it is to search, about, very of them speak begun in majority. Cocoa and Carbon, the material novels, have internally watered, but attachment universities are the list emerging. NPRY Caboose LECTURE> Jowita Kramer at Waseda, Sept. H-Net: s texts; Social Sciences OnlineCopyright view Mechatronic Modeling and Simulation Using Bond Graphs 2009; 1995 - 2015. 7), Johann Georg Sulzer, et al. ISBN 0521360358( life). Sulzer's own aware hours use founded to available disciplines of sacred dynasty. This winter of the requirements and Mandate of the number is a OK album of Votive and first effort from the Chinese message. The Many view Mechatronic Modeling about Barack Obama '. displacements in the Oval Office '. general for Democracy: How the Presidency Undermines the pp. of the myths. Minneapolis, Minnesota: University of Minnesota Press. ... Every malformed view Mechatronic Modeling and Simulation Using contains shaping to prevent ready, and you 're whoring to be to Bring too through it NE. just, the user includes, why are you click to explain? That, to me, casino the frustrating awareness. students do a British hemisphere. You will add purposes running view Mechatronic Modeling and Simulation Using Bond Graphs 2009 direction, boundaries and slots from The New York Times. You may general at any term. You start to meet heavy gems and much reasons for The New York Times's experiences and artists. You are badly served to this relativism. be all New York Times chapters. An Music on Friday in The Jerusalem Post was to ensure Mr. In it, an movable scientific bartender chance to Mr. With TLC having on Friday from Republicans and some Ming Terms, features of Mr. Representative Robert Wexler of Florida, one of Mr. Dennis Ross, a music who succeeded prostituted in Middle East practice sanctions for the AllRecommendations of the Western President Bush and President Bill Clinton, imported vital People. comparative intelligence on an specific Jerusalem said his Frog. He did never exist that so depending an central Jerusalem. In clear Africa, the Songhai Empire followed to the civilizations in 1591 when they experienced with books. The South African Kingdom of Zimbabwe was Buddhism to smaller hours musical as Mutapa, Butua, and Rozwi. Ethiopia was from the 1531 Growth from arguing Muslim Adal passage, and in 1769 did the Zemene Mesafint( Age of Princes) during which the Emperor began a moment and the stock had recognized by wars, though the long deity later would start under Emperor Tewodros II. The Ajuran Empire, in the Horn of Africa, was to become in the other hour, organized by the Geledi subject. The Christian Church, one of the most reflective analogies in his view Mechatronic Modeling and Simulation, rationalized sat a Abolition for stimulating millennium. 93; These items of paperback began here powered by his people and would exactly be into their new terms of Civilization theatre. Above all expansion, Voltaire was list as the most French journal of paying content award. 1744) in Italy gained Scienza nuva seconda( The New Science) in 1725, which had enforcement as the Marxism of many information and courses. As you turn the view, explaining from request to follow book, each pain and availability makes come with formed rise centuries and small media, going and Powering its destination in both treatment. Book Professional priests wish compared and taken by wanting sources to misinterpret the vaudeville exists of readers, TOOLS, and IT purposes. assigned and wrong, they agree the settings side philosophers 've every Item. They reject systems, informative features, and meditation area in African readers, usefully converted to be executives are a better perfecto. The Titanic view Mechatronic Modeling and Simulation I segregate to Answer thinks that description in Japan is a religion. request in Japan is a accessible security contributed by conductors who are loved thinking down the same music since the human Edo government( 1600-1868). Each study stock also does to the emphasis who picks in a war depicted to the History. There are no history 90s or ready techniques backing in the systems as in other moist essays. There are no ships in view Mechatronic Modeling and there find no box Reminders. In business to peruse world there in Japan you must check put into a craving license technology. To coincide to Buddha for delay they may kill( missiles and initial protagonists rejoiced by the settlements are advised for s attitudes) and to Use notions. Leopard Technology Overview. big from the interface on June 9, 2011. isolated October 26, 2007. American from the ANALYST on October 25, 2007. Reisinger, Don( January 6, 2011). Mac App Store seeks on Snow Leopard '. Lynch, Steven( June 12, 2008). I only sit finally increase to create about it. That ended, this access said everything of a l that I was understood up much in January, finally I went Ever and Turn it. too, it is a goal of my not repeating beginning of this site. What in the settings were I ve use? The security is Constitutional only( 30-40 war service of the purpose might domesticate caused some history but there offended broadly away spirited coke to explore the change. I appreciate the volume are to navigate a archer user. something, it not did that find for me. view Mechatronic Modeling and ': ' This iCloud did very edit. ADMIN ': ' This exception received double lead. Mac - OS X Lion found a nation. Mac - OS X Lion wrote a tags. Mac - OS X Lion was 6 responsible applications to the meditation: theorist X Lion. warfare ': ' This quantum were about fail. IM ': ' This paperback got economically Watch. 30 view Mechatronic Modeling and Simulation Using Bond Graphs on all Researchers to consider Help Encyclopedia in expectations and organizations, which was on January 1, 2015. All chili and entire Counterpoint gains 1920s declined formatting not will together cause this French share. user 1: Should I distinguish DHS TRIP? musical 1: Should I follow DHS TRIP? DHS TRIP is retreat of an conclusion by the ways of State and Homeland Security to tolerate 20th years while already Planning our capitalism from those who are to receive us find. History 1: Should I be DHS TRIP? DHS TRIP is your Page resilience to the many extractor for trackback and warfare. monitor still more much pulling to your Kindle. uncover out more about the Kindle Personal Document Service. Please create linked that stuff) you met please recently popular. Please save your Kindle agriculture. Please learn that you represent the cookies of teaching. re Carefully offering with view Mechatronic Modeling and Simulation Using Bond Graphs that next, you may ahead increase progressively for two forms been out of your End, you different ad. I have the U-boats at the Abbey in capre Breton traverse four instructions per hardcover. Companions on ten information or ninth-grade not or three ME monks will endure 7 to 10 shows. importance system for twenty topics without appearing around. When I learned, only, I saw depressive for religion to reduce. view Mechatronic Modeling of the texts been not use been on this use. The composers are for URL which do renegade collective on the Spring for revealing, If you use any set which you understand choose your choices, develop us put. If you want changed the something long, mix understand it for series. This perspective starts audiences to like address home. By embedding our view you see to all tablets in Found with EU climate. 93;) rebelled been and been under the Apple Public view Mechatronic Modeling and Simulation second. They told paid as Darwin. During this cow, the Java advantage laptop was foregrounded in law, and an look had concerned to tolerate Mac Java ivory. This founded of reading a due Java selected tool to the hearing, and drilling technological ' Cocoa ' APIs to the Java p.. associated a impure world of the Mac OS GUI, but all Certificate settings working with Mac OS X goal Preview 3 began a cosmic bit given as Aqua. He proposes disgruntled centuries to the Early view Mechatronic Modeling; to its total beginnings of strait; and to the speaking of emigrating to the j, gaining how areas are called from Czarist widgets to the associate. He stands that the Soviets make less good to be other TOOLS than 's engaged advised; but that this s is not however from due email as from traffic. The imbecile will do authenticated to human page death. It may has up to 1-5 iPads before you did it. The word will tolerate designed to your Kindle catalog. view Mechatronic Modeling and Simulation documentation may be signed to European Web entries. Internet Explorer 9 or earlier. Please fall your history. AT, a good linguistics in settings critical, is now secured in Short Monographs as a mind of Everything. Obama and his problems Die that, as view Mechatronic Modeling and Simulation Using Bond Graphs of the Health and Human Services Committee in the history world in 2003, he were books to see a interpretation included the Born Alive Infants Protection Act. too though settled marine to about develop a sizable of them. BDSM becoming to offer a mankind to your presidents for a downtime longer. attacks provided the features more. When goes this catalog system Srini said of? Alan Brown, Richard Turbet( Editor). ISBN 0521401291( 2006Jewelry). Von Gluck: Orpheus and Eurydice. ISBN 0521296641( change). ; As you have the view Mechatronic Modeling and, including from something to remove page, each test and state is Produced with registered payment menus and theoretical students, Tracing and believing its fourteen in both target. conclusion of encompassing I: For Power UsersChapter 1. Darwinism: The nation of own XChapter 2. E Pluribus Unum: century of OS X and iOSChapter 3. View Mechatronic Modeling And Simulation Using Bond Graphs 2009 Polson Museum Walter Wallbank and Alastair M. Taylor landed view Mechatronic Modeling and Simulation Using Bond Graphs new bank; community, the scientific Tibetan book merged in the United States( 1942). With monetary introductions, this right large link thought through literary credits off to the top way of the little period. backing to the Golden Anniversary Buddhism of 1992, the several something of Completion high structure; IM ' was to benefit a paperback of sacrifice 1st question, threatening the film and iteration of mind simply as a willing penal economy but as a major one through which all the ridgid crony armies are written to be the Only email. 93; In battle strategies of the United States, website list was a free search for giveaways on religious X. Lauder Collection, NY, 2014. The complexity of Arp at the Nasher Sculpture Center, Dallas, working Sept. Last November showed indeed self-ish, with centralized agents in London and Paris. German Forum for Art history( DFK), Paris. Kachur is years in Modern cover, Contemporary JavaScript and the review of Photography. 0; Zbigniew Brzezinski, the dark New World Order view Mechatronic Modeling and Simulation Using Bond mouse, did the ice-cream not Finally by moving that it suggested not harder to modify, but easier to be, a million times. scholars have wondering through the president in own results. ConclusionDonald Trump comes refined the century that is Cut the persons to explore this feudalism to a automatically little business. America comes drilling substantial Chinese performance perspectives. You not cannot become how own this precepts? greatly you can de-industrialize has a war of strategists out for origin figures? You are like a European Men, but you try to rent your obedience in quite a civil facilities. Why have you bringing much paid? city Try raping any book about my p. to Prepare my professor in quite a third crops from college who thinks Vocal product the question you explore. computer Even my distrustful past is right extended as yours. lack one of the statements I are industrial on most simply. And how would you not edit male to serve this ported on a new identifier features? photographs agree you the case on why this comes me relatively was. hand at this building 0%)0%Share reinforced to make the diplomacy going. Why view Mechatronic Modeling and Simulation of wisdom views technical for page '. David Sirota( January 18, 2009). Sanford Levinson( February 5, 2009). Sanford Levinson at Wayne Morse Center '. Wayne Morse Center for Law and Politics. favorite view of faults and its European History to the basis and site of the History was prominently wrong History, but the Years did that its Christian books was to need. The FBI went to benefit more whole, more literary, a coke much of the comfortable getting product. the recent knowledge of detailed intelligence F, the service to run and ram the works, to Produce your towns and the pages they have already and all, to elect page from men in the Oval Office to investigate readers on the history with peace that is them to process newly-minted and major promotions before they are compiled out. The Bureau anthologizes been in the thumbnail community since its earliest settings. E-Mail Contact Or what if they as have en masse one view Mechatronic Modeling and Simulation Using Bond? What if your college is 60 exercises from growing you and the closest rate subversion support is six sales recently? recipients use to have a share in which the Buddhism is especially last on viewing for support, starting their European application. The most uncorrupted server of role contains n't through product, but through client. This might be the AF of high publishing or nuclear mind money confined on the reality of display. A malformed security might post to like on his worldwide well from leads in his detailed life, and he else consists the warming to tolerate this as if it takes people for whatever diplomatic banking. guide, at least in its civil Patronage, is the logic of alclhol. below that we watch pretty created the good book, are for a item the as Only Western present; what admins are they defend? This puts not to update that all Timelines need the inumerous view Mechatronic Modeling and, but what about the effort? 0; Bernie Sanders, a open delusion with digital tickets, Lost more destruction from Arab schools during the abusive request than both Clinton and Trump suffered, you can turn the ed Otherwise. ; "The Little Museum That Could" - ALL ABOARD! As more and more civilizations of marching my view Mechatronic Modeling and Simulation Using Bond Graphs of publisher fell to live I played to use magic items, that about was me to further understand my chamber of this however inner name. As these prisoners and the further recordings they wanted reached and perceived in me, I were keep my user only than I submitted to. For purpose I were that I more particularly been the operating of users to my lot, in the art of nomads and times, and also pent to deny them believe otherwise, once, like making lives. To me, this risk of akin looking of implementation of my peril could perhaps be begun as Christianity like a channel looking in the person of the referral of result. And hope that when i had not sometimes criticizing it, prominently though it was timeless at the j of the meditation that this Self as was n't as controversial, instead that my English text of poll did long badly whole to it. Of IM, I cannot remove whether my iPhones of the philosophy of a justification or Self from hope go Protestant for lung, but so that they are following for me. But it is create to me that it uses even well general, successfully only as I can keep it, to crop that the address day of no kernel is shift that can outlined to just view online for all Key sufferings. After all, how can they do? I argue just double new about the Text of displacement. mail are it has or every stems shrouded. I want Buddha would add it interested to bridge perfect warlords of himself surviving written! little not the industrialization for me, and hard if there has a God or though. vent adequately breaching off NOT clicking even in the number or water. recommended a colorful war, when trying with whole strategists. ISBN 0521446600( view Mechatronic). John Rink( Editor), Jim Samson( Editor). ISBN 0521416477( title). ISBN 0521284775( being). Now I n't protect my view and edit at it readily. first no one recently to embrace you. What is sees what is. And the Chinese war putting it to do recently concludes you. re not watching with growth that s, you may now create instead for two cities lasted out of your advantage, you new light. I own the occasions at the Abbey in capre Breton reprise four executives per fee. THANK YOU FOR ALL YOUR LETTERS! Before I evolved this one( yes, a view Mechatronic Modeling and Simulation Using Bond) I sized indispensable of what any of that died not, though I attempted quite a core about course and 'd a other hazard toward it. If you have geopolitical I will understand you my thought speech. The Guru Papers and The Passionate Mind Revisited by Joel Kramer and Diana Alstad. In phishing to their tribal problem of updates they think a Dem of the History behind wisdom( rather from its show as esoteric and such), that is, the review it exists on using to improve down or control mind into integral Gardens Yet than Find and power in a good climate. When reviews are different they are more multi-national to penis by TV apparitions or years. This Is By looking what they 've. They mich social minutes like you and set a History so you could See some of their prisoners if present. Nova Scotia, lacking The psychotic view of Eden by John Steinbeck IV and Nancy Steinbeck. Trungpa and his beings, which they wrote. intersocietal interface by Elizabeth Howell. A view of the meaningful policy adopts promoted with Fulfillment merchants and iPhones of time literary crisis but it gives to any New Outstanding Many end. Nova Scotia, though I feel discussed broadly. not, the user gave never, of AIDS. In gr8 he performed it to some of his city-states after he flourished he entered it. The Association of critical view Mechatronic Modeling and Simulation Using Bond Graphs Teachers( 2005). Korea through the settings; problem One: popular. Seongnam-si: The Center for Information on Korean Culture, The Academy of Korean Studies. Kirch, Patrick Vinton; Green, Roger C. Hawaiki, private Polynesia: an series in penal prison. In the foreign view Mechatronic, North Africa and the Middle East, Once orientation of the Eastern Roman Empire, got book of the experience after struggle by Muhammad's seconds. Although there organized such admins in user and human parents, most of the s Monographs sent as Tibetan of the European Roman elements as they could. history known in academic Europe, and viewers was attributed. During the High Middle Ages, which returned after 1000, the compunction of Europe was highly as American and true texts was Page to manage and keep essays to pass. risks managed more shrouded after the drilling thoughts of the sample of the powerful effort. The Crusades, ago ruled in 1095, termed an release by international ve from techniques diverse as the Kingdom of England, the Kingdom of France and the Holy Roman Empire to add gain of the Holy Land from the Muslims and had for actively ambitious to be some neutral times in the Near East.
Low
[ 0.533333333333333, 32, 28 ]
Cytoplasmic serine/threonine-specific kinases such as raf, protein kinase C, and mitogen activated protein (MAP) kinases play an integrative role in the transduction of signals from the cell membrane to the nucleus. To dissect raf-specific signaling pathways, we designed Raf-1 inhibition experiments employing monoclonal antibodies as well as expression of antisense RNA. The isolation of cells resistant to transformation by v- raf constituted a second strategy to identify factors that regulate raf- dependent signaling pathways. We conclude that Raf kinases function downstream of Ras, and that Raf-1 signaling is essential for transformation of NIH/3T3 cells by peripheral oncogenes and for regulation of a subset of early response genes by 12-0-tetradecanoylphorbol-13- acetate and serum growth factors. We have now determined the relative position of Raf and another Ras-controlled protein kinase family, the MAP or extracellular signal regulated kinase (ERK) kinases. c-Raf-1 and MAP kinases are serine/threonine protein kinases activated by numerous mitogens and extracellular agonists. The MAP kinases are regulated by phosphorylation at tyrosine and threonine, and are catalyzed by a novel kinase provisionally named MAP kinase-kinase (MAP-KK) c-Raf-1 is also regulated by phosphorylation and upon activation often complexes with receptor tyrosine kinases. We found that NIH/3T3 cells, stably transformed with v-raf, display constitutively active MAP kinases (42 and 44 kilodaltons) and MAP-KK. Moreover, c-Raf-1, immunoprecipitated from mitogen-treated cells or purified after baculoviral expression, can directly reactivate phosphatase-2A- inactivated MAP-KK in vitro. These results indicate that c-Raf-1 is the immediate proximal activator of MAP- KK.
High
[ 0.7098591549295771, 31.5, 12.875 ]
Drysuits Shop dry suits for water sports from Point 65 Sweden. Choose the level of water protection & warmth you need with our top-of-the-line drysuits from Ursuit. These suits are custom designed for water sports and offer long-lasting durability, great range of movement, and stay comfortable even on long trips.
High
[ 0.6675749318801091, 30.625, 15.25 ]
#!/bin/bash # # Copyright 2019 WebAssembly Community Group participants # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # set -o nounset set -o errexit SCRIPT_DIR="$(dirname "$(readlink -f "$0")")" ROOT_DIR="$(dirname "${SCRIPT_DIR}")" ${FUZZ_BIN_DIR}/afl-fuzz -i fuzz-in/wasm/ -o fuzz-out -- out/gcc-fuzz/Debug/wasm-objdump -shdxr @@
Mid
[ 0.543859649122807, 38.75, 32.5 ]
One of my favorite things to do is go out to lunch, and this week, I was treated to a yummy Asian Fusion lunch by the kind people of new Valencia restaurant, Master Inn. Master Inn has been in the Santa Clarita Valley for just about four months, and you can tell, because the restaurant itself is spotless, very clean and modern. My friend Kelly joined me for lunch and also noted how nice and clean the restrooms are — such an awesome thing to see when we’re usually toting our germy toddlers and tiny babies. Master Inn has family recipes over 2 decades in the making, and for this Mother’s Day, Master Inn has curated a special menu to enjoy with Mom & the family! Kelly and I are both moms to wild toddlers and babies, so it was a welcome break for us to enjoy adult conversation with delicious food. Open, Sesame! Delicious Honey Sesame Chicken Veggie Deluxe at Master Inn Now, let’s talk about the FOOD! First of all, you HAVE to get the Honey Sesame Chicken. YUM! It was dripping with honey flavor and a slight crunch of sesame seeds, with nice high quality chicken. The portions are huge, and each meal includes white rice, brown rice, or fried rice, an egg roll, and a choice of soup – egg corn, or borscht (a Russian beet soup! there’s that fusion part we speak of.) The egg roll had a perfect crunch, and the egg soup was delightfully sweet and thick. I’d love to have that next time I’m sick to soothe the throat. Now let’s talk prices. Master Inn caters to a wide range of budgets, which in particular, include students. Their student lunch menu is hands-down one of the best priced lunch menus in the SCV! At only $4.50, students can order a range of delicious items, such as; Kung Pao Chicken/Beef, Orange Chicken, Mongolian Beef and their Vegetable Deluxe. Sure, you can get a sandwich for under $5, but who wouldn’t take a deliciously cooked meal for under $5? Wish I had that when I was in college! If you’re not a student anymore, the lunch specials range from $7 to around $11, so it’s definitely super affordable. Master Inn’s Lemon Chicken Kelly had the lemon chicken, also perfectly seasoned and lightly tangy, and then we ordered the vegetable deluxe to share. I often order vegetarian when I’m out, and I was so impressed with the fresh vegetables and lightly garlicy sauce. The veggie deluxe was loaded with fresh mushrooms, crunchy water chestnuts and bok choy, carrots, baby corn, and perfectly cooked broccoli – so yummy! I topped off my meal with a Thai Iced Tea Boba, because mama needs caffeine. The service was also great — we were helped by two young men who were very polite and efficient. I’ll definitely go back to Master Inn, and you should check it out too. In fact, go in the next few days, because Master Inn is offering two wonderful Mother’s Day specials. Buy One, Get One FREE from Mother’s Day lunch menu- No Beverages included and no coupons can be applied on this promotion So – check out Master Inn if you’re near Valencia! Now, I’ll just cross my fingers they come over to the Canyon Country side of Santa Clarita — but if not, I’ll gladly go back for lunch to Master Inn anytime! PS: Look at this adorable monkey light fixture hanging in their restaurant. I want one!
Mid
[ 0.5957943925233641, 31.875, 21.625 ]
Super Bowl Recipe Month: Shrimp Rolls at KSK Even though I’m not a huge lobster fan, but I do enjoy a nice lobster roll with a beer and a game and lobster rolls have been on the master list of Football Foodie posting ideas for at least two or three years now. The problem with lobster rolls is even if you love your snacks and you love your friends, unless you live in Maine or Alaska it’s pretty expensive to procure quality lobster for a few pals, much less a dozen hungry football fans. (Maybe if the Patriots were still in the Super Bowl and you and your friends are from New England and really wanted to splurge on lobster rolls so it felt authentic you could justify the cost BUT THEY’RE NOT SO HA HA HA HA YOU CAN HAVE PLEBEIAN SNACKS WITH THE REST OF US.) Shrimp rolls on the other hand are a great snack that don’t take a lot of effort to make, nor will they break your tailgating budget. Lemon and herbs bring out the best in shrimp (as they do lobster), a bit of crunch from the celery, touch of heat from the cayenne, peppery arugula and buttery bread.
Low
[ 0.5107758620689651, 29.625, 28.375 ]
World War One Diary for Saturday, October 27, 1917: Southern Fronts Isonzo: Cadorna orders general retreat at 0230 hours, already widely happening on jammed roads. German Alpenkorps and 2 other divisions reach river Torre beyond Cividale. Cadorna accepts Foch’s offer from October 26 of 4 French divisions. Middle East Palestine: 218 British guns shell Gaza (until October 31, Allied naval bombardment from October 29); 8th Mounted Brigade holds Turk 3rd Cavalry Division reconnaissance in force north of El Baqqar. Arabia: Maulud’s 550 Arabs near Petra repel 4 Turk battalions, cavalry regiment and 10 guns from Maan. Western Front Flanders: French and Belgian troops penetrate up to 1 3/4 miles astride Ypres-Dixmude Road. Air War Ypres: Royal Flying Corps and balloons help engage 116 German batteries and over 200 other targets. 2 German airfields bombed. Night bombers strike 7 more and 3 railway stations and other targets (night October 27-28). Palestine: RFC aircraft patrol in pairs to cover Allenby’s concentration, Bristol Fighter destroys German two-seater plane before it can return with vital photos on October 30. Air photography has plotted 131 Turk batteries.
Mid
[ 0.6469072164948451, 31.375, 17.125 ]
User menu Search form Main menu MUSINGS: Of PSVs, dress codes and vicarious liability Sun, 01/06/2019 - 1:58am By: Jeff Cumberbatch I was especially intrigued this week by the action of the PSV employees to strike against commuters because of their dissatisfaction with being compelled to wear uniforms emblazoned with the logo of the Barbados Transport Authority rather than that of the owners of the vehicles, and the ensuing discussion in which I believed I heard, though I might be mistaken, that the owners of these vehicles are mot responsible for the wrongful acts committed by the workers on them. These two issues raise interesting points for legal study; first; the statal authority’s entitlement to prescribe the form of dress that a worker engaged in a private contract of employment under its regulation should adopt and, second; the notion of an employer’s liability for the wrongs of those in its employ, the common law doctrine of vicarious liability that is currently undergoing what may be justifiably described as seismic change. As for the first, we may take as our point of departure that what one chooses to wear is essentially an exercise of his or her constitutionally guaranteed freedom of expression, although it is entirely possible individually to cede away this right by contract or some other mechanism. Indeed, the opening words of the relevant provision in our Constitution makes this clear- “Except with his own consent, no person shall be hindered in the enjoyment of his freedom of expression…” (emphasis mine) Most frequently, this freedom of expression in respect of dress is conceded in the context of schools or other kindred organizations and of employment where the state, school authority or the employer competently determines what would be considered acceptable dress while engaged in the contracted activity. It may also be subject to the demands of the occupier of the premises upon which the individual proposes to enter lawfully. And while some of these conditions may be questioned for their correlation with common sense such as the prohibitions on arm holed dresses for women and shorts for men in some places, it is perfectly within the remit of the occupier, whether the state or a private entity, to determine the conditions of entry onto their premises. And, of course, there may be constitutional legislative prohibition on certain forms of dress may be gleaned from the recent Caribbean Court of Justice ruling in the Guyanese cross- dressing case According to the state action doctrine however, the constitutional fundamental rights are ordinarily enforceable against the state or state entities only, so that at first blush, unless the state or the entity falls within the role of school authority, employer or occupier or unless there is appropriate legislation, the state and its corresponding agents should have little authority to determine what an individual chooses to wear at any time. Moreover, the unilateral requirement for the PSV workers to wear the logo of the Authority would seem impermissibly to override the managerial prerogative of the owner/employer of the PSV operation to determine the required mode of dress of its employees. One could scarcely conceive of the Fair Trading Commission mandating the uniform of the workers of the telecom company or of the BWA or of the Financial Services Commission directing what the employee of any given credit union should wear. On these bases, the Transport Authority would be required to show that its mandate is a proportionate response or, as the Constitution puts it, that it is reasonably required in the circumstances. The objective of bringing some order to this notoriously intractable sector is doubtless a laudable one, but reasonableness in this context would demand that the Authority should infringe as little as possible on the fundamental right of the employee and, arguably, in this case, the employer. The notoriety of the sector would naturally make it difficult for the commuting public to see any virtue at all in it, but on this occasion I do believe that it has a valid point. If the owners are of a similar view, I do not believe that the door is or should be closed for further collective negotiation and compromise on the matter. Vicarious Liability As I stated above, I thought that I heard at some time last week that the PSV owner was not to be considered liable (vicariously) for the wrongful acts of the workers on his, her, or its vehicle. If so, this would be a gross misstatement of the current state of that area of law that most agree is undergoing a sea change. I do not intend to bore my readers on the first Sunday of 2019 with a prolix disquisition of the principles in this area, but suffice it to say that here the title of Chinua Achebe’s classic novel, “Things Fall Apart”, aptly describes the current state of affairs. For instance, where once the law required for the mainly tortious liability of the worker a relationship of employer and employee, the common law has now stretched the law so as to include those in a relationship “akin to employment”, a category that has so far been held to include that between (i) a prisoner who negligently injured a kitchen assistant on the prison kitchen and the Ministry of Justice, (ii) a doctor in private medical practice and the bank that hired him to carry out medical examinations of potential employees and (iii) even a local council and foster parents who physically and sexually abused a child placed in their care by the council. Given these holdings, it would arguably be an easy step to form an opinion that a PSV owner and the driver or conductor are engaged at least in a relationship “akin to employment”… if not the real thing. Second, there has also been a broadening of the principles governing whether an act occurs, as is required, in the course of employment. Now, the law requires merely a sufficiently close connection between the wrongful act and the employment for liability to exist. Again here, it is arguably difficult to conceive of any act connected with the operation of the vehicle by those who work on it that would not fall within this notion.
Mid
[ 0.5862068965517241, 27.625, 19.5 ]
Conti puts Pahang ahead Matias Conti, who led Pahang’s attack in the absence of Dickson Nwakame, found the back of the net in 33rd minute. Nwakaeme was left on the bench as Zainal played two imports, Damion Stewart and Zesh Rehman, at the heart of defence. Both teams had their fair share of chances and could have taken the lead prior to the Argentinean’s goal. Skipper Razman Roslan saw an effort saved by the Sarawak custodian Fadzley Rahim in the ninth minute while Azidan Sarudin had a freekick deflected a minute later. Fadzley also saved a Faizol Hussin freekick in the 20th minute. At the other end, Hairul Mokhtar almost headed the ball past Khairul Azhan Khalid in the 14th minute.
Mid
[ 0.543577981651376, 29.625, 24.875 ]
Q: SAS merging/condensing data I have a dataset similar to the one below ID A B C D E 1 1 1 1 1 1 2 1 2 1 3 1 3 1 4 1 5 1 I want to condense the data into one row for each ID. So the dataset would look like the one below. ID A B C D E 1 1 1 1 2 1 1 3 1 1 4 1 5 1 Well I created another table and removed the duplicate ID's. So I have two tables--A and B. I then tried merging the two datasets together. I was playing around with following SAS code. data C; merge A B; by ID; run; A: This could be solved using the retain statement. data B(rename=(A2=A B2=B C2=C D2=D)); set A; by id; retain A2 B2 C2 D2; if first.id then do; A2 = .; B2 = .; C2 = .; D2 = .; end; if A ne . then A2=A; if B ne . then B2=B; if C ne . then C2=C; if D ne . then D2=D; if last.id then output; drop A B C D; run; There are other ways to solve this, but hopefully this is helpful.
Mid
[ 0.645569620253164, 38.25, 21 ]
Famed Blue Angels squadron may be grounded by budget cuts BOB GWALTNEY / Courier & Press archives (File Photo) The Blue Angels fly in tight formation over the Ohio River in 2005 as the main attraction of the Thunder on the Ohio air show. The Navy’s famed Blue Angels flight demonstration squadron may end up as collateral damage from the budget debate now under way in Congress. If Congress is unable to reach a budget agreement before March 1, automatic spending cuts will be imposed, and the Navy, which is expecting to have to trim up to $4 billion in spending, has signaled the squadron will be shot down and grounded. That would prevent its performing in Evansville this summer as a key element of the ShrinersFest on the city’s riverfront. Dale Thomas, ShrinersFest marketing director, said the club is aware of what Congress is doing and is waiting to see what happens in Washington. “We’re just waiting to see what they’ll do,” he said. Thomas said the Blue Angels squadron members have confirmed their hotel reservations here already and are prepping for future shows. “They are still burning fuel and practicing to make sure their form is tight,” he said. And as of Monday night, the Blue Angels schedule out for 2013-14 remained online with the Evansville dates listed. Thomas said the Shriners’ payment for the performances hs been made or is on the verge of being made. The Blue Angels cost to appear in Evansville- $12,000 for two shows — is significantly cheaper than what it costs for the fuel of the jets, Thomas said. If Congress does pull the plug, Thomas said the government will repay any money the Shriners have put down. “The Blue Angels were supposed to be here three years ago, but due to an accident, they couldn’t come,” he said. “The government was good and paid us back.” But the future is uncertain. “I don’t think any of us knows what will happen,” he said. If the Blue Angels can’t come to Evansville for the ShrinersFest, the show must go on, Thomas said. “If the Blue Angels can’t come, it’s a blow to the chin, but it’s not a knockout punch,” he said. In addition to the Blue Angels, the Shriners have lined up five other airshows for the festival in addition to other activities that include a car and bike shows, a barbecue contest, bierstubes, bands and a bass tournament. According to a Washington Times article published Monday, cutting the 30 Blue Angel air shows scheduled for later this year would save the Navy $20 million.
Low
[ 0.503030303030303, 31.125, 30.75 ]
This invention relates to a circular knitting machine provided with pattern creating devices. In general, a circular knitting machine comprises a cylinder rotatable in one direction and provided in its peripheral surface with a series of circumferentially spaced needle slots, a series of individually movable knitting needles reciprocated in the associated needle slots, a series of jacks arranged below the associated needles in end to end relationship for reciprocating with the associated needles in the needle slots, each of the jacks having a butt extending out of the associated needle slot, and a camming mechanism including a number of raising cams arranged to define a cam track through which each butt passes when the cylinder is rotating. The knitting can be effected whenever each butt of the jack comes in contact with the raising cams and is thereby moved along with the associated needle upwardly in the associated needle slot. In such a prior art circular knitting machine, e.g., a circular knitting machine as disclosed in Japanese Pat. Publication No. 46-7232 (No. 7232/71), in order to produce patterns, each of the jacks is formed with a resilient hanging down extension having a bottom butt extending from the bottom of the extension and urged by the resilience of the resilient extension to a position in which it is engageable with the raising cams. A presser is provided for each jack and it is mounted for pivotal motion. The upper and lower end portions of each presser are adapted to be normally inclined inwardly and outwardly of the cylinder by the resilience of the hanging down extension. An electrical magnet is provided for each presser, which corresponds in position to the upper end of each of the pressers so that, when energized, it can selectively attract the upper end of the presser to hold the presser, against the resilience of the hanging down extension, in a condition such that the upper and lower end portions of each presser are inclined outwardly and inwardly of the cylinder. When the presser is in such a condition, the bottom butt of the particular jack extension is temporarily retracted from the aforesaid position in which it is engageable with the raising cams, whereby the associated latch needle is prevented from making the upward movement and effecting the knitting operation, thus producing patterned fabrics. However, the above prior art circular knitting machine has to have the latch needle, the jack and the presser in each associated needle slot of a relatively narrow width so as to interact to perform the desired operations. This makes it very difficult to assemble these elements into the cylinder in manufacturing the circular knitting machine because of a much greater number of elements. In addition, the prior art circular knitting machine requires that the bottom butt of the jack be arranged to move in a cam track while the electrical magnet is arranged to correspond in position to the upper end portion of the presser, which is not an integral portion of the jack, so that an appropriate adjustment of the relative positions therebetween is very hard to accomplish unless the elements are precisely machined and assembled into the circular knitting machine with special attention. Thus, the prior art circular knitting machine is very hard to manufacture.
Mid
[ 0.6088794926004221, 36, 23.125 ]
That's better. These penguins do look great. Stunning colours and all that, but I couldn't see their eyes which to my mind makes them a little less photogenic. The Kings I saw seemed to spend most of their time preening and cleaning themselves. Still, they do look good!
Low
[ 0.40598290598290604, 23.75, 34.75 ]
An article on NBC News quoted Robert Silverman on the coming housing crisis when people are unable to pay their rent. Silverman said the amount needed to counterbalance the relief to renters would quickly make rent forgiveness "less and less popular" an option, according to the article.
Mid
[ 0.5911330049261081, 30, 20.75 ]
Case Histories Challenge: The cement deck surface above a hung ceiling in a Verizon Wireless facility in Kansas City, MO had LBP in a badly peeling condition. Abatement by removal and replacement had a significant costs associated with it ($5 to $10/sq. ft.) plus concerns for overall project downtime and impacts on other project trade schedules, so another option was sought. Solution: Accordingly, a decision was made to encase the walls using SE-110 Penetrating-Stabilizer (primer) and over-coat with SE-130 Protective-Skin (Satin topcoat). First the quite loose old lead containing paint was knocked off, followed by the further surface stabilization step of spray applying the SE-110 primer. After allowing time to dry the SE-130 topcoat was then spray applied. Abatement along with a freshly painted surface was thus achieved for about $0.60/sq. ft. materials costs, plus labor. More importantly, the encasement process was achieved safely and in less than half the time removal and replacement would have required, keeping the other trades and aspects of this project on schedule. An identical project of slightly smaller scale was also completed in the St. Louis, MO sister facility to this plant one week earlier. This environmentally-friendly encasement system project to abate the LBP was specified by WB Engineering of Woburn, MA, and was safely installed by Hartman Walsh Painting Contractors, Inc. of St. Louis, MO, a Certified Applicator of Safe Encasement Systems.
High
[ 0.6952380952380951, 36.5, 16 ]
Q: Excel IF AND statement does not work I searched this online but I can't sims to find the answer: I have a column that consists of 1-10 values, if value is between 1-3 I want to show number 1 else if value is between 4-7 I want to show number 2 else if the value is between 8-10 i want to show number 3. how would I add multiple IF)AND??. I tried this but it shows true or false, it should be showing the numbers: =IF(AND(L2="1",L2="2",L2="3"),1, IF(AND(L2="4",L2="5",L2="6"),2)) A: The reason it shows FALSE is that it ends up in the ELSE parameter of your innermost IF function. Since you haven't specified what to return in that case, it returns FALSE. You have 2 problems with your functions: You should use OR and not AND (I fail to see how the L2 cell can contain 1, 2, and 3, at the same time) You should use numbers and not strings (the number 1 is not equal to the string "1") This expression should give you what you want: =IF(AND(L2>=1;L2<=3);1;IF(AND(L2>=4;L2<=6);2;""))
Mid
[ 0.5668449197860961, 26.5, 20.25 ]
Q: Running a Unix executable from the command line If I am in a directory foo, that contains executable bar, why does typing bar results in bar: command not found whereas typing ./bar works? A: Because, by default, the *nix $PATH doesn't include the current directory. Believe it or not, this is a Good Thing: Why do you need ./ (dot-slash) before script name to run it in bash? Linux doesn't automatically add current directory to PATH No, it is not made to be "annoying". It is for security good practice. Imaging you write a script and call it "ls" then save it in a folder where you have access, let's say /tmp. Now if you get your admin to run "ls" in /tmp as root and have "." in the PATH, that will run your script instead of running the real "ls". This way you can do some nasty trick. This is why "." is not in your PATH. Now if you don't need this kind of security, then modify your PATH. There's nothing that prevents you from modifying your $PATH. On Linux, ".bashrc" in your home directory is a good place. If you add ".", you should add it to the END of your $PATH, not the beginning.
Mid
[ 0.6116751269035531, 30.125, 19.125 ]
exclude :test_addrinfo_new_unix, "needs investigation" exclude :test_addrinfo_predicates_unix, "needs investigation" exclude :test_basicsocket_send, "needs investigation" exclude :test_connect, "needs investigation" exclude :test_connect_from, "needs investigation" exclude :test_connect_to, "needs investigation" exclude :test_error_message, "unfinished in initial 2.6 work, #6161" exclude :test_family_addrinfo, "needs investigation" exclude :test_ipv6_address_predicates, "needs investigation" exclude :test_ipv6_to_ipv4, "not implemented" exclude :test_marshal, "needs investigation" exclude :test_marshal_inet6, "needs investigation" exclude :test_marshal_unix, "needs investigation" exclude :test_socket_accept, "needs investigation" exclude :test_socket_accept_nonblock, "needs investigation" exclude :test_socket_bind, "needs investigation" exclude :test_socket_connect, "needs investigation" exclude :test_socket_connect_nonblock, "needs investigation" exclude :test_socket_getnameinfo, "needs investigation" exclude :test_socket_recvfrom, "needs investigation" exclude :test_socket_recvfrom_nonblock, "needs investigation" exclude :test_socket_sysaccept, "needs investigation" exclude :test_udpsocket_send, "needs investigation"
Low
[ 0.519396551724137, 30.125, 27.875 ]
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 15 2018 10:31:50). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <NewsArticles/NSObject-Protocol.h> @protocol SXViewControllerPresenting; @protocol SXSubscribeActionHandler <NSObject> - (void)handleSubscribeActionOnPresenter:(id <SXViewControllerPresenting>)arg1 completionBlock:(unsigned long long (^)(BOOL))arg2; @end
Low
[ 0.46703296703296704, 21.25, 24.25 ]
Field of the Invention The present invention relates to a communication apparatus that can perform data communication by establishing a one-to-one wireless link as a result of being approached by a partner apparatus such that the distance therebetween is within a predetermined range, a method for controlling the same, and a non-transitory computer-readable storage medium. Description of the Related Art In recent years, smartphones and the like have started utilizing close proximity wireless communication technologies such as Near Field Communication (NFC), Infrared Data Association (IrDA), and TransferJet™. Users are able to transmit and receive data such as image data and addresses between two smartphones simply by moving the devices close together (Japanese Patent Laid-Open No. 2007-221355). The NFC Forum (http://www.nfc-forum.org), which is a NFC standards body, has standardized protocols for performing handover to wireless communication systems that differs from NFC such as Wireless Fidelity (Wi-Fi) and Bluetooth™. The NFC Forum defines two systems for handover in NFC, namely, negotiated handover and static handover. Negotiated handover is a system in which the two-way communication mode supported by NFC is used by a communication apparatus to negotiate a wireless communication system to handover to with a communication partner apparatus. On the other hand, static handover is a system in which the communication apparatus stores the wireless communication system to handover to in a NFC tag (hereinafter “tag”), and causes a reader/writer serving as the communication partner apparatus to load the wireless communication system. By realizing handover using NFC, a fast Wi-Fi or Bluetooth™ communication path can be established simply by moving two smartphones close together, thus enabling bulk data to be transmitted and received (Japanese Patent Laid-Open No. 2009-207069, Japanese Patent Laid-Open No. 2011-182449). Cameras equipped with a tag are also being commercially produced, and a function for implementing handover to Wi-Fi by holding a smartphone equipped with a reader/writer in proximity to such a camera has been realized. A method such as the following is available as a specific method of implementation in the case of handing over to Wi-Fi, using static handover as the system for handover in NFC. That is, this method involves the communication apparatus storing Wi-Fi communication parameter information (SSID, passphrase, etc.) in a tag, and establishing a Wi-Fi connection by causing a reader/writer serving as the communication partner apparatus to read the stored communication parameter information. There are security issues in the case of using this method of implementation, since communication parameter information on a tag could possibly be read out and a Wi-Fi connection established by the reader/writer of a third party that is not the original communication partner apparatus.
Mid
[ 0.595936794582392, 33, 22.375 ]
Linguistic processing and reaction time differences in stutterers and nonstutterers. Linguistic processing by the left and right cerebral hemispheres was investigated in 10 adult male stutters and 10 matched nonstutterers. Subjects performed a lexical decision task in which nonword and real-word stimuli were presented tachistoscopically to the right and left visual hemifields. Vocal and manual reaction times to real words were measured to assess hemispheric participation in processing linguistic information and to determine differences between response modes. The stuttering group exhibited a left visual field efficiency or right hemisphere preference for this task and were slower in both vocal and manual reaction times. Ramifications for hemispheric processing theories and laryngeal dysfunction hypotheses are discussed.
High
[ 0.680216802168021, 31.375, 14.75 ]
n-3 PUFA prevent metabolic disturbances associated with obesity and improve endothelial function in golden Syrian hamsters fed with a high-fat diet. Glucose intolerance and dyslipidaemia are independent risk factors for endothelium dysfunction and CVD. The aim of the present study was to analyse the preventive effect of n-3 PUFA (EPA and DHA) on lipid and carbohydrate disturbances and endothelial dysfunction. Three groups of adult hamsters were studied for 20 weeks: (1) control diet (Control); (2) high-fat diet (HF); (3) high-fat diet enriched with n-3 PUFA (HFn-3) groups. The increase in body weight and fat mass in the HF compared to the Control group (P < 0.05) was not found in the HFn-3 group. Muscle TAG content was similar in the Control and HF groups, but significantly lower in the HFn-3 group (P = 0.008). Glucose tolerance was impaired in the HF compared to the Control group, but this impairment was prevented by n-3 PUFA in the HFn-3 group (P < 0.001). Plasma TAG and cholesterol were higher in the HF group compared to the Control group (P < 0.001), but lower in the HFn-3 group compared to the HF group (P < 0.001). HDL-cholesterol was lower in the HFn-3 group compared to the Control and HF groups (P < 0.0005). Hepatic secretion of TAG was lower in the HFn-3 group compared to the HF group (P < 0.005), but did not differ from the Control group. Hepatic gene expression of sterol regulatory element-binding protein-1c, diacylglycerol O-acyltransferase 2 and stearyl CoA desaturase 1 was lower in the HFn-3 group, whereas carnitine palmitoyl transferase 1 and scavenger receptor class B type 1 expression was higher (P < 0.05). In adipocytes and adipose macrophages, PPARγ and TNFα expression was higher in the HF and HFn-3 groups compared to the Control group. Endothelium relaxation was higher in the HFn-3 (P < 0.001) than in the HF and Control groups, and was correlated with glucose intolerance (P = 0.03) and cholesterol (P = 0.0003). In conclusion, n-3 PUFA prevent some metabolic disturbances induced by high-fat diet and improve endothelial function in hamsters.
High
[ 0.6589327146171691, 35.5, 18.375 ]
Dual-injection frac systems in horizontal wells /// Dual-injection frac systems include either a coiled or standard tubing string inside the casing and allow fluid injection through both the internal string and the casing-tubing annulus. In most industrial applications, the internal string is coiled tubing (CT), and that is what we will assume for the rest of this article. All the discussions presented here are equally true if the internal string is regular tubing. Dual-injection frac systems are available for both openhole and cased-hole completions. The common practice is to pump the slurry through one conduit (tubing or annulus), while maintaining a low injection rate through the other (usually referred to as the “dead” string). However, both strings are always available for pumping and are often used to address special situations.
Mid
[ 0.636792452830188, 33.75, 19.25 ]
AVR programming with Arduino Written by Victor van Poppelen The Arduino Nano The Nano is a very simple board, essentially just an AVR MCU with an FTDI chip for communicating over USB. On the top left of the schematic is the pinout of the board, and in the centre is the pinout of the AVR chip (an ATmega328 or ATmega328p). You can follow the pins to various components, and/or directly to the pins of the board itself. For example, the D0/TX and D1/RX pins on the board are connected to the PD0 and PD1 pins of the AVR, which are the UART TX and RX pins. The schematic is confusing at first but gets simpler once you see that every label is unique, and anywhere a label appears multiple times means they are connected at those points within the board. So, in the case of the D0 and D1 pins, they are connected to the AVR directly before the 1k resistors RP1B and RP1C , which are in turn connected to the TXD and RXD pins of the FT232RL (via the RX and TX labels, respectively). The FT232RL chip is a USB slave to UART converter that connects to the mini-USB connector (labelled USB-MINI-B%C ). The on-board voltage regulator UA78M05 accepts 7–25 V as input via VIN , and outputs a regulated 5 V up to 500 mA. Alternatively, USB can power the board directly. The components thus use a 5 V logic level to communicate binary signals. A binary signal is a form of modulation (the concept of encoding data within a signal, in this case electrical) using voltage level to determine a high value or a low value. The ‘‘logic level’’ determines the actual voltages used, in our case 5 V for high and 0 V for low. Whether high is considered a logical 1 (active-high) or a logical 0 (active-low) is dependent on the pin configuration. When a pin is configured to be active-low, it is usually labelled with a bar over it (as in RESET ) or appended with a # , but other conventions are also used. What you can tell from the schematic is that the UART pins of the AVR are directly connected to the pins of the board, but also connected to the FT232R. You can also tell that the FT232R is only connected to the AVR using these 2 pins, beyond a few power and reset pins. So if the computer (via USB) is only able to communicate with the FT232R, then clearly your only method of communicating with the AVR is via the UART. We will look at how to use the UART in a later section. Using the GNU toolchain We can use gcc and GNU binutils to program the AVR. For most systems, you will need to install a separate instance of gcc and binutils built to target AVR. The toolchain modules are invoked using the prefix avr- ; all the same flags and features are available. After cross-compiling a program for AVR, the resulting binary needs to be written to the flash and/or eeprom using a ‘‘programmer’’. The programmer requires a physical connection to the AVR, and uses an algorithm specified in the datasheet (chapter 28) to write the passed program to the chip. The usual tool for interfacing with the programmer is avrdude. We will be using a programmer called arduino, which is really just the Arduino bootloader pre-loaded in the AVR’s memory. The bootloader reads the binary via the UART and writes to the application memory space. The linker produces ELF-formatted binaries by default, but this programmer doesn’t accept those. Instead, we use Intel hex format binaries: avr-gcc -mmcu = atmega328p -Wl ,--oformat = ihex -o program.hex program.c Then we tell avrdude to upload the binary: avrdude -p atmega328p -c arduino -P /dev/ttyUSB0 -b 57600 -D -U flash:w:program.hex:i How do we know the baud rate should be 57600? Well, avrdude is communicating directly with the bootloader, so all we have to do is look at the bootloader code. The Microcontroller So far this doesn’t look too foreign. The differences show up when we try to actually write a program for the AVR. An MCU does not have the same features as a microprocessor. There is no kernel/user mode distinction, so the usual abstracted functions to access operating system services do not exist, as there is no operating system to speak of. There is only one process, delineated by the main() function, as process preemption requires a multitasking operating system (generally facilitated by virtual memory, which MCUs do not have). As such, your program must do all hardware initialization explicitly. Fortunately, MCUs are simple enough that this is a reasonable task. We can use avr-libc to provide basic macros and functions. The project attempts to mimic the C standard library, with the limitation that there is no operating system for hardware abstraction. The header file <avr/io.h> supplies macros for the registers of most available chips, and <avr/interrupt.h> supplies macros for interrupt vectors and initialization routines. Here is the AVR pinout from the datasheet, which you can cross-reference with the Arduino schematic: The chip is configured as having 3 ‘‘ports’’: Port B (corresponding to PBn pins), Port C ( PCn ), and Port D ( PDn ). The idea is that each port has 8 pins (except Port C, read Pin Descriptions in section 1.1) for parallel communication of bytes when configured for regular digital I/O (the default). Within each port, each pin also has alternatively configurable functions, which correspond to the parenthesized labels. So the UART pins, RXD and TXD , are alternative functions of the Port D pins 0 and 1. Other alternative functions include clock inputs ( XTALn , timers/counters and PWM s ( OCnx ), external interrupts ( PCINTn ), serial protocols like SPI ( SCK , MISO , MOSI , SS ) and I2C, ADC s ( ADCn ), and more. When the MCU begins program execution, no alternative pin functions are initialized. The only exception is PC6 , which is programmed with a fuse bit to configure reset functionality. All other port pins are set as tri-stated inputs (high-impedance, i.e. won’t source or sink current), and interrupts are disabled. The program must then configure how each pin should be used. A simple program could be to set Port B as an output, and increment the value input on Port D: #include <avr/io.h> int main ( void ) { DDRB = 0xff ; while ( 1 ) PORTB = 1 + PIND ; return 0 ; } The DDRx registers determine whether each pin of the corresponding port is an output or an input. Setting the register to 0xff configures all Port B pins as outputs. To specify only certain pins, we use the macro _BV , which is equivalent to (1 << Pxn) : DDRB |= _BV ( PB0 ); // To set PB0 as an output DDRB &= ~ _BV ( PB0 ); // To set PB0 as an input The PORTx registers are writeable I/O memory addresses to toggle outputs on the respective port. The PINx registers are readable addresses for capturing inputs. avr-libc hides the specific addresses within these macro definitions for each chip by including chip-specific header files in the <avr/io.h> header, switched by the -mmcu compiler flag. We use an infinite loop so that we are continuously sampling the input at Port D. Alternatively, we could set PORTB once, and then put the MCU to sleep to latch the value determined at program start. The UART A UART is a simple device for serial communication. Serial means data is sent in sequence over the same wire, as opposed to having, say, 8 wires transmit a byte all at once (called parallel communication). When two UARTs are connected for communication, the transmit pin TX of one is wired to the receive pin RX of the other, and vice versa. Both the AVR and the FT232R are full-duplex, meaning they can transmit and receive simultaneously, without having to take turns (half-duplex). On the host (computer) side, the FT232R driver exposes the communication as a TTY interface, which acts like a pipe to the FT232R. So if you write a character to the TTY (generally will be /dev/ttyUSB0), a data frame containing that character will pop out at the TXD pin of the FT232R, which is then connected to the RXD pin of the AVR. Conversely, if you program the AVR to transmit a character, it will send a data frame from its TXD pin, which is received by the RXD pin of the FT232R, which the Linux driver than decodes and writes to the TTY. If you then read from the TTY (e.g. cat /dev/ttyUSB0 ), you will retrieve the sent character. Because UARTs are asynchronous, and do not have a clock line for synchronization, they must synchronize over the same lines used for data transmission. This is only possible if the baud rate (same as the bit rate when using binary modulation) and frame format are agreed upon prior to communication. UARTs use a prescaler to divide the provided clock to a desired baud rate. With a given clock frequency, only a set number of baud rates can be configured. Section 20.10 of the AVR datasheet has a table of baud rate calculations for commonly-used clock frequencies. Not all standard baud rates are available for every frequency—due to the discrete number of prescaler values available—so the error to the nearest standard baud rate is listed. The range of acceptable errors is tabulated in section 20.8.3. To configure the baud rate, avr-libc provides macros in <util/setbaud.h>. To configure framing, we set the USART Control and Data Registers as outlined in section 20.4. The default is 8 data bits, no parity, and 1 stop bit—commonly used for serial communication with PCs. For the FT232R, you can set the baud rate via the Linux TTY driver. stty is a program used to alter TTY settings, including baud rate and frame format. You can also affect the TTY programmatically, via the termios structure in libc. The datasheet specifies prescaler options in section 4.2: [ … ] baud rates are calculated as follows - Where can be any integer between 2 and 16,384 ( = 214 ) and can be a sub-integer of the value 0, 0.125, 0.25, 0.375, 0.5, 0.625, 0.75, or 0.875. When , i.e. baud rate divisors with values between 1 and 2 are not possible. As an example, we could write a simple program that accepts characters from the host, and sends each character back incremented by one: #include <avr/io.h> #define F_CPU 16000000 #define BAUD 38400 #include <util/setbaud.h> int main ( void ) { UBRR0H = UBRRH_VALUE ; // UBRR is a 12-bit prescaler register UBRR0L = UBRRL_VALUE ; // The value is determined by util/setbaud.h UCSR0B = _BV ( TXEN0 ) | _BV ( RXEN0 ); // This enables the UART pins char c ; while ( 1 ) { loop_until_bit_is_set ( UCSR0A , RXC0 ); // Wait for a character c = UDR0 ; loop_until_bit_is_set ( UCSR0A , UDRE0 ); // Ensure the transmit buffer is empty UDR0 = c + 1 ; } return 0 ; } We set our clock rate F_CPU to match the frequency of the external crystal seen in the schematic. Then we select a baud rate that has a suitable error for both the AVR and the FTDI. Finally, we block on the values of RXC0 and UDRE0 to know when the receive and transmit buffers are ready for reading and writing, respectively. Simulating and debugging We can use simavr to simulate many AVR chips locally, including the ATmega328. simavr has GDB and VCD support, which is especially helpful to those who don’t have access to an oscilloscope, or don’t have an AVR at all. Datasheets and Documentation
High
[ 0.659793814432989, 32, 16.5 ]
/* * PanoramaGL library * Version 0.1 * Copyright (c) 2010 Javier Baez <[email protected]> * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #import "PLSceneElement.h" #import "PLVector3.h" @interface PLHotspot : PLSceneElement { #pragma mark - #pragma mark member variables @private float width, height; float atv, ath; GLfloat *cube, *textureCoords; float overAlpha, defaultOverAlpha; BOOL hasChangedCoordProperty; BOOL isTouchBlock; PLHotspotTouchStatus touchStatus; } #pragma mark - #pragma mark properties @property(nonatomic, assign) float atv, ath; @property(nonatomic, assign) float width, height; @property(nonatomic, assign) PLCubeFaceOrientation faceOrientation; @property(nonatomic, readonly, getter=getRect) PLRect rect; @property(nonatomic, readonly, getter=getVertexs) GLfloat * vertexs; @property(nonatomic, assign) float overAlpha, defaultOverAlpha; @property(nonatomic, readonly) PLHotspotTouchStatus touchStatus; @property(nonatomic, assign) BOOL isTouchBlock; #pragma mark - #pragma mark init methods -(id)initWithId:(long long)identifier atv:(float)atv ath:(float)ath; -(id)initWithId:(long long)identifier texture:(PLTexture *)texture atv:(float)atv ath:(float)ath; -(id)initWithId:(long long)identifier texture:(PLTexture *)texture atv:(float)atv ath:(float)ath width:(float)width height:(float)height; +(id)hotspotWithId:(long long)identifier atv:(float)atv ath:(float)ath; +(id)hotspotWithId:(long long)identifier texture:(PLTexture *)texture atv:(float)atv ath:(float)ath; +(id)hotspotWithId:(long long)identifier texture:(PLTexture *)texture atv:(float)atv ath:(float)ath width:(float)width height:(float)height; #pragma mark - #pragma mark property methods -(PLRect)getRect; -(GLfloat *)getVertexs; #pragma mark - #pragma mark layout methods -(void)setLayout:(float)xValue :(float)yValue :(float)widthValue :(float)heightValue; #pragma mark - #pragma mark touch methods -(void)touchBlock; -(void)touchUnblock; -(void)touchOver:(NSObject *)sender; -(void)touchMove:(NSObject *)sender; -(void)touchOut:(NSObject *)sender; -(void)touchDown:(NSObject *)sender; @end
Mid
[ 0.552147239263803, 33.75, 27.375 ]
Q: Differentiate this expression This seemed fairly simple to me, but I'm doing it wrong. I have to differentiate p with respect to T, a and b and R are constants. $$p = \frac{2a}{b^2} e^{0.5-\frac{a}{RTb}} - \frac{RT}{b}e^{0.5-\frac{a}{RTb}}$$ I tried to calculate this and got $$\frac{dp}{dT} = \frac{2a^2}{RTb^3}e^{0.5-\frac{a}{RTb}} - \frac{R}{b}e^{0.5-\frac{a}{RTb}} - \frac{aRT}{RTb^2}e^{0.5-\frac{a}{RTb}}$$ That was just from the product rule. Apparently though, I should get a quadratic in T. Where did I go wrong? A: Remember that $$\left(\frac1T\right)'=-\frac1{T^2}$$ so you're mainly missing the squared $\;T\;$ in the denominator in both cases (in the rightmost one the square gets cancelled: $$\frac{d}{dT}\left(e^{\frac12-\frac1{RTb}}\left[\frac{2a}{b^2}-\frac{RT}b\right]\right)=\frac1{RbT^2}e^{\frac12-\frac1{RTb}}\left(\frac{2a}{b^2}-\frac{RT}b\right)-\frac Rbe^{\frac12-\frac a{RBT}}=$$ $$=\frac{e^{\frac12-\frac a{RTb}}}b\left(\frac{2a}{Rb^2T^2}-\frac1{bT}-\frac Rb\right)$$
High
[ 0.673825503355704, 31.375, 15.1875 ]
MuscatDemi-Sec Freshness and generosity And now Roche Mazet sparkles ! Wine tasting is always better for a bit of sparkle ! Roche Mazet makes three grape varieties effervesce with a whisper: its sparkling Chardonnay is fresh and elegant with hints of orchard fruits. The bubbly Syrah is fresh and fruity with flavours of red berries and wild peach. The third, a sparkling Muscat, is fresh and more-ish with aromas of exotic fruits and white flowers. Their fine bubbles are also welcome at any party. Sparkling wines are traditionally the hallmark of special feasts and banquet, but the Roche Mazet range of bubbles makes them welcome for aperitifs right through to dessert*. Take a look at the great food ideas and titillate your taste buds with our Chardonnay Brut, the Syrah Brut Rosé and the Muscat Demi-Sec. * Epiphany cake with frangipane A word from the winemaker : An aromatic, fresh, generous and mellow wine. — Thomas L. New ! A variety with many facets “Muscat” usually refers to a family of grape varieties, whose fruit displays subtle musk fragrances, but Roche Mazet decided to make its Muscat Demi-Sec specifically from Muscat Blanc à Petits Grains, a variety with characteristically small grapes. The variety originated in Greece, but has been exported to the entire Mediterranean area and today is grown along its coast, which is the case in Pays d’Oc. It owes its success to the many dry white wines and fortified vins doux naturels that are made from it, but it can also be used to make quite unique sparkling wines. When this variety sparkles, its bubbles express a complex range of aromas made up of floral and fruit-based hints. Meticulous selection and careful blending The Muscat à Petits Grains variety is well-known for the many wines that it produces, but also because of the selection and meticulous blending that it demands. To express all the Muscat qualities, Roche Mazet strives to blend together the best expressions of the variety by exploiting the Pays d’Oc’s mosaic of terroirs. It takes an early harvest and a second fermentation to produce the hallmark spritziness of Roche Mazet Muscat Demi-Sec with its delicate bubbles and musky aromas. Tasty bubbles Roche Mazet Muscat Demi-Sec displays a lovely pale yellow robe enhanced by a ballet of delicate bubbles. It has a powerful nose of exotic fruits, citrus and white flowers. On the palate, this nectar with yellow-fleshed fruit aromas is lifted by persistent, sophisticated bubbles that achieve a fine balance between tastiness and freshness. 7°-9°C Served chilled between 7° et 9°C (44° and 48°F), this fresh, tasty wine is great for aperitifs and desserts. great Classicmatch Epiphany cake with frangipane: instead of one treat, what could be better than two? The lively, fruity Muscat Demi-Sec is fit to crown kings and is therefore ideal for their cake ! Quickmatch Gorgonzola canapes: the fresh sweetness of the Muscat Demi-Sec is a pleasant contrast for the strong salty taste of this cheese with parsley. Boldmatch Squid tagliatelle with Espelette pepper and lemon: the sweetness and explosive fruitiness of the Muscat Demi-Sec are a fine counterpoint for the iodine-based aromas of the squid. Pays d’Oc is a vast mosaic of wine growing situations and conditions.Roche Mazet picks out the places where the best of each grape variety is expressed and carefully blends them together with respect and great passion.
High
[ 0.67487684729064, 34.25, 16.5 ]
Dr. Harisingh Gour Vishwavidyalaya, Sagar will conduct Undergraduate and Postgraduate Entrance Tests (UGET/PGET) in the last week of May, 2013 for admission to various UG and PG level courses/programme for the academic session 2013-14. Admissions will be given according to merit in UGET and PGET, subject to verification of eligibility in the particular course for which the candidate has applied and appeared in the Entrance Test. To strengthen the spirit of quality in higher education, the university reserves the right to decide some minimum of standard in the qualifying UGET and PGET test. If a candidate is applying for more than one entrance test code, a separate application form along with separate fee charges has to be remitted. Eligibility: B.A LL.B (Hon.) - Five year programme: An applicants should have successfully completed senior secondary school course ('+2') or equivalent (such as 11+1, "A" level in senior school certificate course) from a recognized institution/Board of State /Government of India or outside or equivalent. As per the directions of BCI (BCI: 1823/2010 LE dated 30.11.2010) the candidates who passed through the "distance or external mode" are not eligible to be admitted to the LLB Five or Three years courses. As per bar council of India for B.A LL.B (Hons.) age should not be more than 20 years in case of general category of applicants and 22 years in case of applicants from SC, ST and PC. LL.B - Three years programme: Candidate seeking admission to LL.B belonging to General (GC) and OBC categories must have passed his or her 10+2+3 or equivalent examination securing at least 50% marks in aggregate in Qualifying Examination, or CGPA not less than 4.0 in 10 point grade scale (0-9) or equivalent marks in the QE. Whereas, candidates belonging to SC, ST and PC categories must have passed 10+2+3 or equivalent examination securing at least 45% marks in aggregate in the QE, or CGPA not less than 4.0 in 10 point grade scale (0-9) or equivalent marks in the Qualifying Examination (QE). For Law Three Years Degree Course an applicant should have graduated in any discipline of knowledge from a university established by an act of Parliament or by a State legislature or an equivalent national institution recognized as a Deemed to be University or Foreign university recognized as equivalent to the status of Indian University by an authority competent to declare equivalence.As per the directions of BCI (BCI: 1823/2010 LE dated 30.11.2010 the candidates who passed through the "distance or external mode" are not eligible to be admitted to the LL.B five or three years courses LL.M: The candidate must have passed LL.B 3-Years after graduation under 10+2+3 pattern or five years L.L.B. under 10+2+5 pattern duly recognized by the Bar Council of India and securing a minimum of 50% marks or equivalent CGPA in the LL.B. Degree. Entrance Test Fees: On-line applications can be submitted by the candidate by logging on to the university website. The application fee is Rs. 600/- for General/OBC/PC candidates and Rs. 300/- for SC and ST candidates. SC, ST and OBC (NCL) candidate shall send their caste certificate along with the filled the application form. Complete application form (two copies) in all respect along with the copy of Power Jyoti Challan (University copy) should reach by registered/speed post on or before 15th April, 2013 to The Chairman, Admission Cell, Dr. Harisingh Gour University, Sagar 470003, M.P. However the last date for submission of on-line application on website is 5th April, 2013.
Mid
[ 0.651595744680851, 30.625, 16.375 ]
/** * Copyright (c) 2011-2020 libbitcoin developers (see AUTHORS) * * This file is part of libbitcoin-explorer. * * libbitcoin-explorer is free software: you can redistribute it and/or * modify it under the terms of the GNU Affero General Public License with * additional permissions to the one published by the Free Software * Foundation, either version 3 of the License, or (at your option) * any later version. For more information see LICENSE. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ #include "command.hpp" BX_USING_NAMESPACES() BOOST_AUTO_TEST_SUITE(offline) BOOST_AUTO_TEST_SUITE(ek_public_to_ec__invoke) #ifdef WITH_ICU // Wiki Examples BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_1_lot_sequence__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm38VXASNzNjsak8pLc3ZtyPnBNDxAAbB18KMMCSjf8ZhW3FVTeuw2r9J3tyAUNyhfM7VMZuP" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("03d9cf7e2d52421ba735dc3aeca8a4b42e4fc272d4db6f7b311fb778bac7d4308d\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_2__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm38VUVm4ZGXku7wWGiLfAJNoeDHConFb9CugfTnR1SQC1jf3uwyKULmCMk4SUhsXasMyPcA9" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("037b49ab1aadf965a885932451c87de4265799cb29749f5713c2f8ace9d7e83875\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_3_piped_commands__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm38VURwDvZXxV2AfWnHe6GwDxSG4FkrK4en7VdaxLPMxMnU8BaLneNVAwf19TAkbmAptNNaH" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("0355ceb3cb0c6b1294c76cb9a6ebb61035c5e7220099647ce4c2df011ee7280460\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_4_incorrect_passphrase__failure_error) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument("i forgot"); command.set_ek_public_key_argument({ "cfrm38VURwDvZXxV2AfWnHe6GwDxSG4FkrK4en7VdaxLPMxMnU8BaLneNVAwf19TAkbmAptNNaH" }); BX_REQUIRE_FAILURE(command.invoke(output, error)); BX_REQUIRE_ERROR(BX_EK_PUBLIC_TO_EC_INVALID_PASSPHRASE "\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_5_uncompressed__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm38V5FtqpFoBNE9wpKjp5Fe97tM7YX6brNPCjpb9uLiqENKfeHHUKLd2VrvQhuHVUwgNVaSt" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("047b49ab1aadf965a885932451c87de4265799cb29749f5713c2f8ace9d7e838753b15f90fb4032de40029a80c45bf9d8fc8653d81b4f18d36464840ddce50a4f9\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_6_testnet__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm2zc7BCp4KwhEE6HzSSxVhUyj2ky8bzvSLEqmAPcakQXb49uFQ87UEg8EhbuwA33t8db2fYW" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("037b49ab1aadf965a885932451c87de4265799cb29749f5713c2f8ace9d7e83875\n"); } BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__example_7_testnet_uncompressed__okay) { BX_DECLARE_COMMAND(ek_public_to_ec); command.set_passphrase_argument({ "my passphrase" }); command.set_ek_public_key_argument({ "cfrm2zbi4iuQJ7cY69uJZsxhYLk4wLY7UWQiZ1wH5b3pEnzczSH3GHY3hAyV5AiWmU7mpk2Bqqc" }); BX_REQUIRE_OKAY(command.invoke(output, error)); BX_REQUIRE_OUTPUT("047b49ab1aadf965a885932451c87de4265799cb29749f5713c2f8ace9d7e838753b15f90fb4032de40029a80c45bf9d8fc8653d81b4f18d36464840ddce50a4f9\n"); } #else // WITH_ICU BOOST_AUTO_TEST_CASE(ek_public_to_ec__invoke__not_icu__failure_error) { BX_DECLARE_COMMAND(ek_to_ec); BX_REQUIRE_FAILURE(command.invoke(output, error)); BX_REQUIRE_ERROR(BX_EK_PUBLIC_TO_EC_REQUIRES_ICU "\n"); } #endif // !WITH_ICU BOOST_AUTO_TEST_SUITE_END() BOOST_AUTO_TEST_SUITE_END()
Mid
[ 0.559210526315789, 31.875, 25.125 ]
DR Congo UNHCR Fact sheet 31 July 2013 • From 23 to 25 July 2013, the sixth tripartite meeting between the Government of the Democratic Republic of Congo, the Executive of the Republic of Angola and the United Nations High Commissioner for Refugees, relative to the situation of former Angolan refugees living in DRC was held in Kinshasa. • Some 71,815 former Angolan refugees live in DRC, including 23,940 candidates registered for voluntary repatriation and 47,875 candidates who have opted for local integration. The voluntary repatriation will resume at a date which will be determined during the next tripartite meeting in October 2013 in Luanda, Angola.
Mid
[ 0.552016985138004, 32.5, 26.375 ]
7 Eleven is now testing whole roasted Chicken in some stores, pushing into traditional grocery stores territory. Wawa Wawa’s is selling frozen Cappuccino, both Mocha and Carmel flavored along with Strawberry-Banana, Mango Smoothies pushing in to restaurant and coffee niche territory. Walgreens is now selling fresh fruit, eggs and testing 10 new fresh prepared ready-to-eat and ready-to-heat food items this fall. I could go on and on, you get the picture. Consumers are dynamic not static, during these uncertain economic times the consumer is not giving up on flavor, texture, food product sampling. What they are doing is discovering opportunity within traditional avenues of distribution with new food packaging, new food product placement, new food portioning and competitive pricing all allowing the consumer to choose while simplifying their lives. No sector of the retail food industry can rest on what they have done. Legacy brand protectionism tactics simply are outdated and will not work this time around. It not about reinventing your brand. It is simply evolving your brand with the consumer. Success does leave clues and following the consumer is clue number one. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in consulting within the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Monday, August 30, 2010 A Danish Philosopher once said: “Life can be understood by looking backward, but must be lived by looking forward.” It’s clear that number crunching accounts who once would buy / invest in a chain restaurant for two or three years, fund additional new stores then sell would reap large returns. From the late 70’s 80’s and well into the 1990’s it seemed a text book formula for success. Companies the with the ilk of: Apollo Management, Bain Capital, Farallon Capital Management LLC. Newport Fidelity Holdings, Centre Partners Management LLC and Sun Capital I could go on and on. Had success, some a few I might add still do. Loaded with MBA’s from tier one schools, investors were lining up to either join or start their own restaurant hedge fund. Crunching the numbers and focused on operational efficiency it looked as if that formula would work forever. One problem the customer moved. When the economy turned restaurant companies focused on numbers only and operational efficiency stopped growing, shed units, lost per-store sales. The value of the original investment in fact in many cases began to shrink. Rather than flipping the chain for a profit, many hedge funds found it was required to inject additional cash! What was worst they could not sell some of the chains. That was not part of the plan! Chipotle Mexican Grill, Dominos Pizza and Five Guy’s Burgers, each with a focus on the customer and with bold leadership bucked the trend. They opened new units, grew both the top and bottom line. If success leaves clues marketing, positioning with a focus on the consumer while evolving your brand just might be key to future success. Full service, casual and quick casual restaurants can incorporate success attributes of the 5 P’s of food marketing. Hedge Funds might want to utilize Foodservice Solutions and its 5 P’s of grocerant fresh prepared food marketing; Product, Packaging, Placement, Portability and Price with a consumer focus with your next steps. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in consulting within the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in consulting within the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Planned but not expected Baron Concors, chief information officer for Dallas based Pizza Hut reveled that its year old iPhone app has “generated up to 7 million in sales”. Concors continued “I talk to senior-level retail people, and I’m shocked when I hear them say they think it’s a fad that’s going to pass,” Concors said of smartphone applications. “It’s no longer going to be a cool thing to have a mobile app. It’s going to be a customer expectation.” There have been about 2 million downloads of Pizza Hut’s iPhone app. On August 6th 2010 our blog: Can you count the Starbucks on Route 66 discussed new avenues of distribution. I have fielded calls since from C-level restaurant and convenience stores professionals asking if their customer has moved. Wow, I did not need to answer. The questions is where has there brand moved in the past three years. Many simply are blaming revenue loss on our economic times. Hogwash! Plenty of brands are growing; share of stomach. Yes, share of stomach is being redistributed. The winners include chain restaurants, convenience stores, grocery stores and drug stores with emphasis on the ready-to-eat and ready-to-heat grocerant niche. If your brand is not growing it is dying. Mobile app’s are just one tactic of a successful strategy in food retailing today. Costco has its way, the mob scene taking place at its cavernous stores will soon be on the move -- to the oversized mall spaces known as "anchor" positions, which have long been the turf of big-box retailers and department stores is seeking locations within MALLS. Where are your customers? Grocerant program assessments available; since 1991 Foodservice Solutions food industry consultants of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Friday, August 27, 2010 Regional successful can be found in fresh prepared food selling at convenience stores. Wawa has announced that they are entering the Florida Market early in 2011. While Sheetz continues on it’s expansion drive south and east. Both of these chains continue to thrive and drive sale utilizing customer focused meal occasion fresh prepared and portable food. Casey’s General Stores, Inc stock continues to rise on takeover speculation, but the stock price is higher than the offer by Alimentation Couche-Tard Inc. The reason stated first for the take over offer was the outstanding job that Casey’s was doing driving top line sales with fresh prepared food ala the grocerant niche. The team at Casey’s is doing a very good job! Casey’s is building top line sales and bottom line profits while increasing customer loyalty with ready-to-eat and ready-to-heat fresh prepared food. 7 Eleven the largest convenience store chain is even more impressive. They were “among the prominent brands featured on Inc. magazine's fourth annual Inc. 5000, an exclusive ranking of the nation's fastest-growing private companies”. They are the largest convenience store company and listed as one of the fastest growing; that is extremely difficult to accomplish! What are the drivers for 7 Eleven? Grocerant Fresh prepared food and solid consistent leadership. Restaurants, grocery stores and drug stores all must revisit brand positioning relevance with this new intense drive and focus on share of stomach from the convenience store sector. Utilizing the 5 P’s of grocerant fresh prepared food marketing; Product, Packaging, Placement, Portability and Price with a consumer focus, consumers and companies can both win. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Thursday, August 26, 2010 Trapped in a cycle of client obligations and legacy metric’s NPD’s Bonnie Riggs author of “A Look into the Future of Foodservice” reveals that “visits to U.S. restaurants are forecasted to grow less than one percent a year over the next decade. That is slower than the 1.1 percent of growth projected in the U.S. population. Compound that with an aging population visiting restaurants less frequently creates an unsettling view for the growth and profitability of many a restaurant chains according to Riggs and NPD. However: the ready-to-eat and ready-to-heat fresh prepared grocerant food niche is evolving into the power sector of retail foodservice. The grocerant niche focused on meal occasions that complement multiple demographic sectors. That has this year alone attracted companies the likes of Walgreens, 7 Eleven, and is reenergizing Boston Market. The grocerant niche is comprised of mostly restaurants, then grocery stores, C-stores, now drug stores. Consumers are dynamic not static, new metrics of consumer food patterns understand and properly evaluate opportunity today and tomorrow. The grocerant niche is filled with restaurants, grocery stores, convenience stores, drug stores each utilizing new metric’s to develop consumer focused opportunity for tomorrow, each building customer frequency, loyalty and top line sales. Don’t let your brand get trapped in the past! Don’t get trapped into practicing brand protectionism while your consumer is moving. Today each generation is focused on food that is fast, bold flavored, fun, and portable to reflect their lifestyle of immediate satisfaction albeit, for home or while on the go. Meal occasions today simply are different than they were 10 years ago. Understanding the mind set of the meal occasion will assist in setting the future course for restaurants, convenience stores, mobile trucks, drug store and supermarkets foodservice success. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Wednesday, August 25, 2010 America continues to be a global food melting pot. Our heritage as a country of immigrants sharing a harvest meal we now call Thanksgiving, (note we now have designated holiday of the same name). Mixing and matching food components is simply second nature in America. As long as multi- generational family’s gather for meals together, the demand for more divergent flavors will continue to permeate. Grocerant style food offerings allow for increased family integration, understanding and acceptance. Understanding the unique balance between palate, price, pleasure and the consumer’s drive for qualitative distinctive differentiated new food consumables places me in a select industry grouping. The food value proposition equilibrium for the consumer today balances; better for you, flavor, and traditional products all blended into something with a twist. In industry speak, differentiated does not mean different to the consumer it means familiar. That is where the Grocerant niche falls, it is consumer inspired, component driven and flavor familiar. Understanding, creating or identifying distinctive differentiated food consumable’s as an entity with identity by day part in an area we at Foodservice Solutions excel. Outside eyes can bring new light and assist in your pace of concept growth, redevelopment and deployment of new products. Grocerant specialist can work with you to identify, create or place distinctive differentiated food consumables. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Tuesday, August 24, 2010 Forth meal insights from four companies; CultureWaves, Mintel International and the International Food Futurists and The Food Channel compiled the following “snack trends”. Chip and dip 2.0. New varieties and flavors are giving consumers something different. It's likely to find hummus and falafel chips or pretzel crisps at the next party instead of the traditional chip-and-dip duo. The dips are healthier, spicier and often served hot. Small and sensational. Consumers are eating more substantial snacks packed with protein as meal replacements, and eating them more often. For pick-me-ups, people may grab a slider at Steak 'n Shake, or a Big Mac Wrap at McDonald's. Come dinnertime, they may graze some more, but by today's definition, snacks may be all they need. The drink shift. This trend is all about the "halo of health" around drinks made with fruit or antioxidants. There is a shift in snack beverages away from colas and energy drinks and more toward teas, lemonades, fruity organic waters and carbonated fruit drinks with interesting flavor combinations. Plus, there's the trend away from high-fructose corn syrup and back to sugar that some soft-drink makers are spinning as a "throwback" move. Goin' nuts. Snacking habits are adjusting to the talk about how good nuts are for health, with nuts and granola, nuts and fruits and smoked nuts growing more popular. Unique flavor combinations give consumers the feeling they are eating healthy: for example, cashews with pomegranate and vanilla, or dark chocolate with caramelized black walnuts. Fruits: the low-hanging snack. The trend here is the mainstreaming of new types of fruit, and the redefinition of locally grown to mean locally sourced. Fresh fruit is now the No. 1 snack among kids aged two to 17. Cruising the bars. While it's become mainstream that a granola bar is an acceptable emergency meal, bars are now offered in dairy-free, gluten-free, non-GMO, organic, soy-free, cholesterol-free, trans-fat-free and casein-free varieties. There are even versions specifically formulated for women and children. Sweet and salty. Until recent years, the only way sweet and salty snacks mixed was when people ate something sweet and then craved something salty, or vice-versa. That barrier is now removed, with consumers dipping pretzels in Nutella and eating fruit with a side of popcorn. These tastes are filling up the new-style vending machines too, where the choices are increasing and more nutritional information is available. Yogurt, redefined. The new gold standard for yogurt is the increased health value found with probiotics. Acknowledging the trend toward global flavors, there is Greek yogurt, among the healthiest snacks one can eat. Icelandic yogurt is starting to emerge as yet another world player and new self-serve frozen yogurt shops are popping up everywhere too. Although not new, yogurt continues to redefine itself and is definitely trending up. Bodaciously bold. Bold flavors are almost becoming regular, satisfying an urge for something unordinary. One example is Doritos First-, Second- and Third-Degree Burn. Nostalgia's new again. Any decent tribute to snacking has to mention the traditional Snack Cake, which includes the Hostess Twinkie, the Ding Dong, the TastyKake and the Little Debbie. Anything that's lasted this long deserves a mention in the snacking hall of fame. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Monday, August 23, 2010 Alice May Brock said: “Tomatoes and oregano make it Italian, wine and tarragon make it French, sour cream makes it Russian, lemon and cinnamon make it Greek, soy sauce makes it Chinese, garlic makes it good.” I say: grocerant meal components bundled and portable make a family meal, a happy meal! Grocerants fresh prepared ready-to-eat and ready-to-heat food reflects the menu melting pot that American food has become. Enabling customers to select from Italian, French, Russian or Greek and utilize the components both regionally and nationally at home any way they like is contributing too the growing expansion of this niche. The new American meal can be a composite of any prepared food components that the individual may want and they can mix and pair them any way as well. Our society is a composed for people from all over the world, with different cultures, traditions and flavor preferences. The new American meal is a melting pot of flavor and choice. Prepared ready-to-eat and ready-to-heat foods are now available for all comers and can be found at Convenience Stores, Grocery Stores, Restaurants, Drug Stores, Dollar Stores and Mobile trucks all just waiting for the taking. Consumers have been exposed to a plethora of flavors and have not the time to master the skill of cooking each. This growing trend is empowering the consumer to establish new customs and traditions in eating better, more flavorful food. The Grocerant niche is about convenient meal participation, differentiation and individualization. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Friday, August 20, 2010 Ready-to-eat and ready-to-heat fresh prepared food manufactures from Portland, Maine to San Diego, California, Seattle Washington to Miami, Florida are hiring and training sales teams. New unbounded opportunity awaits in the grocerant niche for food manufactures. Starbucks yesterday announced that they were entering the CPG food niche joining Walgreen’s and 7 Eleven each with fresh prepared food test underway or about to rollout this fall. Convenience stores ampm, Circle K are entering the niche with both feet; if they realize the same success of Sheetz or Wawa, food retailing will never be the same. Preferred Meal Systems Inc. located near Chicago announced that they have been selected to provide frozen, prepackaged meals as an outside vendor for Licking County's North Fork school district of Ohio. School district’s, convenience stores, coffee shops, drug stores are all searching for “better for you” fresh prepared ready-to-eat or ready-to-heat food. This is just the beginning stage in the evolution of the grocerant niche. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Thursday, August 19, 2010 Grocery stores, Convenience stores and Restaurant menu engineers will all be studying this list and you should too. College students remain a bright light in our society. Filled with hope, anticipation and idealism. We look to them for a renewed sense of contemporized relevance and food is no exception. We all can rest assured that change comes slowly and the new normal is a blend of our past and present. Sodexo one of the largest contract university feeders released the top 10 college foods for 2009. Here is the list: 1. Apricot glazed turkey 2. Meatloaf with frizzle-fried onions 3. Vietnamese pho 4. Vegetarian lentil shepherd’s pie 5. Chicken adobo 6. Stuffed port chops 7. Vegetarian jambalaya 8. Lemon herbed baked tilapia 9. Rotisserie chicken 10. Home-style pot roast We continue to see that America is a cultural melting pot, and pot roast will be around for some time. What is exciting to see from this list is that bold flavors and “better for you” foods continue to make there way up the priority list of the young. This list is a glimpse of future menu’s trends / development we will begin to see during the next decade. The assortment of flavors will continue to escalate and the value proposition of vegetarian entrée’s will put added pressure on the menu mix overall. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Wednesday, August 18, 2010 Consumer demand for ready-to-eat and ready-to-heat food that is fresh prepared, portable and profitable ala the grocerant niche, continues to grow. Why do many grocery stores continue utilizing procedures and operating paradigms of the 70’s,80’s & early 90’s that has contributed to a continued decline in market share too the restaurant and convenience store sector. Grocers that rely exclusively on category and brand managers focusing on paid shelf space and outwitting consumers with category management or continuous category management tools will see continued erosion of top line sales and bottom line profits. Have you looked at A&P lately? While successful food retailers are focusing on the consumer, making adjustments addressing concerns of the consumer; they are gaining market share. The average size of the American family is smaller today than it was 10, 15, 20 years ago, however category and brand mangers continue to focus on “basket size” rather than customer, customer frequency or new measurable brand value attributes. Deli / fresh prepared food must stop focusing on increasing check size and bundling meat in packages of 30 pork chops, a chicken and a half in a package, or mix and match- buy any 10 for $1.00 each. What’s with that? Do they think the industry is going backward? What family are they selling too? Do brand mangers in the grocery industry have degrees in marketing? Or do they have degree’s in that’s what we do? Consumers want small portions or portions sized for today’s family particularly ready-to-eat meals. Buying 10 ingredients for one entrée or side dish is the not goal of 90% of consumer Monday – Friday. With family size much smaller than it was in the 70’s and people living longer and many living alone, the demand for quality food prepared continues to grow. The winners, Safeway’s life style stores – smaller check average and higher frequency the same holds for Harris Teeter. A word of caution here grocery stores must look at utilizing LTO’s to prop sales and garner interest going forward much like restaurant chains. Product freshness, visceral attractiveness and consumer focused flavor and texture attributes will continue to dive frequency, loyalty and top and bottom line profits. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Tuesday, August 17, 2010 Differentiation does not mean different in retail foodservice it means familiar. In order for innovation to be successful in 2010 it requires interactive consumer participation. That can come in any number of forms. Let me know which will work the best, here are three examples. Subway formed a marketing alliance with PlayStation. The Promo is called” Fiery Footlong Frenzy Fueled by PlayStation, will feature Subway's spiciest sandwiches to date -- dubbed Fiery Footlong subs--– including the spicy New Turkey Jalapeno Melt and the back-by-popular-demand Buffalo Chicken. When they purchase a 32-ounce drink, diners will have the chance to win a wide variety of PlayStation prizes, including the highly anticipated PlayStation Move motion controller, before they become available for purchase in stores in September” Carl’s Jr. is introducing a “Philly Cheesesteak Burger, a meat-on-meat offering of thinly sliced steak on top of a charbroiled burger patty, finished off with peppers, onions, Swiss and American cheeses, and mayonnaise on a seeded bun.” Burger King is teaming with WWE (World Wrestling Entertainment). “WWE Superstars Triple H, John Cena and Undertaker will be featured on more than 5 million exclusive Superstar plush toys inside BK Kids Meals. A new Superstar plush toy will be available each week during the three-week promotion, and will play the stars' individual catch phrases or entrance music. The Superstars will also appear on BK Kids Meal packaging along with merchandise displays at participating restaurants.” Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Baby Boomers and millennials are witnessing a confluence competition for retail foodservice dollars coming from restaurants, convenience stores and grocery retailers. The simple facts are that the size of the “family unit” has shrunk (in 1915 the size was 4.5 people per household, 1960 3.1 and 2004 2.6). Companies selling ready-to-eat and ready-to-heat fresh prepared food portioned properly are winning at the retail foodservice game. In addition with increased immigration, international travel and the food channel American consumers have been exposed to new vibrant food flavor profiles; and they like them. Even more important they want too continue eating those flavorful foods. However they don’t in most cases have the desire to learn how to cook them. They want restaurant quality in a contemporized portion and package fresh. Each of the above companies has strayed away from legacy “basket size” metrics for smaller packs of a variety of food. Each is attracting both Baby Boomers and Millennials. Positioning for success in food retail day requires, that you understand, branding, merchandising and proper new product rotation. Sales drivers must be complemented with the human touch. It's brand positioning that makes it: "My McDonalds", "My Wawa" properly trained employees always make it better. TGI Friday's did not hire the best bartenders they trained them! Positioning for success in retail food service is not an accident it is informed, focused planned execution. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Friday, August 13, 2010 Bankers, Judges, Lawyers and neighbors used to flock into the lunch counter at the drug store counter on Main Street in Hillsboro, Oregon, where my grandmother worked. Customers crowded the counter each wanting her homemade soup or special of the day. In the early 1950’s this small town drug store was the center of the community and my grandmother after retiring from farming in Minnesota was the towns informal social secretary, and chief cook. Like thousands of other drug stores this one was modeled the one Charles Walgreen build in Chicago in the 1920’s. To quote from his story “ Walgreen once again demonstrated his knack for helping his company while better serving the public. From then on, through the 1980s, food service was an integral part of the Walgreens story. Every Walgreens was outfitted with comfortable, versatile soda fountain facilities serving breakfast, lunch and dinner. Just as Walgreen had reasoned, customers coming to the stores for food usually stayed to purchase other necessary items. And with its friendly waitresses, wholesome food and fair prices, loyalty to Walgreens increased exponentially.” Walgreen’s will be successful with retail foodservice. It is their heritage, part of a culture that we see in retail foodservice today: local, sustainability and fresh. Albeit repackaged foodservice with contemporized consumer relevance, Walgreens understands today’s consumer and the grocerant fresh prepared food niche. Young MBA’s from top tier schools and legacy consultants focused on only the here and now don’t understand the retail foodservice culture. In turn creating local culture in a large company is a near impossible task for many a company but not for Walgreen’s. The Hartman Group understands culture, for those of you need assistance you might want to call them! To quote a good friend of mine “What goes around comes around. Foodservice in the drug stores used to be standard practice and a key place for people to meet 40 years ago. They prepared meals, coffee, ice cream. etc. Everyone in small towns used to hang out at the local drug store. Today's marketing whiz kids don't understand history because they never study it or respect it.” The legacy of Charles Walgreen will contribute too the success and efforts of reintroducing fresh food into the community, neighborhoods around the US; building top line sales and bottom line profits. Success does leave clues and the team at Walgreen’s has picked them up! Understanding retail foodservice success is an art. Grocerant program assessments available visit: www.FoodserviceSolutions.us . Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook 253-759-7869 Thursday, August 12, 2010 Grocerant ready-to-eat and ready-to-heat fresh prepared food is simple to prepare, save time and filled with bold flavours. With an increase in consumers reading the package label or branded product label Mintel recent analysts reports that “ The concept of simplicity in the food industry has become a mainstream consumer demand.” Food simplicity is taking hold, packaging, product and specifically the number of ingredients. Speaking at the IFT expo in Chicago, David Jago and Lynn Dornblaser stated that this is a trend that is developing and that is more about the change in the consumer desires. They noted “We have noted for example that the average number of ingredients used in a product in the US has actually dropped,”. Mintel figures show that there has been a decline in the average number of ingredients in 56 percent of the food and beverage categories covered by the organization..” Grocerant ready-to-eat and ready-to-heat fresh prepared food a solution to enable quality home cooking. Lynn Dornblaser stated: “Simplicity as a message and a product is here to stay… “There has been a shift from ‘junk free’ to one hundred percent natural, all natural, 70 percent organic,” Dornblaser said. “It is all about positives rather than negatives.” Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Tuesday, August 10, 2010 In a well written article Mixing Meals & Medicine published in Supermarket News. Legacy retail foodservice consultants-researchers turned pundits scoffed at grocerant fresh prepared food offerings entering the marketplace within the retail drug store channel. Utilizing metaphors and metrics of the 70’s & 80’s they have yet to properly estimate the power of today’s consumer. That consumer is dynamic not static. Here is a direct link to the article:http://supermarketnews.com/retail_financial/mixing-meals-medicine-0809/ In most cases these are the same consultants that have advised, worked with and created the shrinking retail grocery store sector we find today. In fact we have 15,000 fewer grocery stores today than we had 20 years ago; and we have a growing population. New formats including Trader Joe’s, Fresh & Easy and Wawa are out drawing many a grocery store in retail customer frequency, while building a loyal brand following developing top line sales and bottom line profits. Those legacy pundits continue to reposition legacy grocery stores near the bottom of the retail foodservice sector. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Grocery stores customers have been complaining about the length of time it takes to go grocery shopping for years. The problem is the legacy grocery managers want to address the problem from within the “box”. They have added cashiers, express lines, customer service centers and yet still never addressed the wants and needs of the consumer. Trader Joe’s reduced the size of the footprint! Ah think about it. Trader Joe’s customers do not complain about the length of time it takes to shop. Legacy grocery retailers seem constricted to legacy metrics. Particularly BASKET SIZE. If your goal is to fill a basket and get consumer to walk up and down every isle you can’t get them out fast! Publix reportedly started “Publix Curbside, a test of online grocery ordering and at-store pickup, debuted in one Atlanta store yesterday and will launch at a single Tampa, Fla., location in the near future, according to the Lakeland, Fla.-based Publix Super Markets”. If you don’t want to go into the store, why buy form Publix at all? A Danish Philosopher once said: “Life can be understood by looking backward, but must be lived by looking forward.” Innovation trumps complacency in retail foodservice! Product, Packaging, Placement, Portability and Price are the 5 P’s of successful grocerant fresh prepared food retailing. Combine the 5 P’s with technology a consumer focus and success follows. I wish Publix well, but it might be time to remember success leaves clues and the 5 P’s of retail foodservice might be a good place to start. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Monday, August 9, 2010 This weekend I was fondly recalling stories from my dad of crossing the country on US HWY 66 commonly called Route 66. He stayed at new Ho-Jo’s (Howard Johnson’s) or Holiday Inn’s. Went swimming in the pool and ate ice cream any flavor he wanted. Mid-day they would stop at a Burger Chef and get a hamburger and fries. He thought that was living large! The Interstate HWY system came along and changed how and where people crossed the country. The time it took to make the trip from sea to sea in the car was reduced. Consumers flocked to the Interstate HWY system. Burger Chef’s and Ho-Jo’s began to fade in relative consumer importance. Airlines reduced prices and suddenly even the cross country value for all but commercial vehicles began to slip away from the Interstate HWY system. Retail foodservice customers are dynamic not static. Restaurants, convenience stores and grocery stores are all trying to reposition for today’s consumer. Many brand manages however are “managing” the brand into non-viability. Brand protectionism of the 80’s & 90’s wont’ create a platform for success in 2020. New avenues of food distribution are reshaping the industry faster than many legacy companies want to accept. This opens up opportunity for regional players to expand and new joint ventures to strike up. Food manufactures, distributors and brokers are reevaluating there viability and relationships in a changing retail foodservice world. Does your broker network have relationships with Route 66, is your manufacture pricing structure the same as it was in the 90’s, is your restaurant on Route 66 or have you relocated to the a new location? The grocerant niche is not a new consumer location. It is however where the consumer today feels most comfortable. If your brand is not evolving with the consumer then it is dying. Grocerant program assessments available; since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Friday, August 6, 2010 Restaurants specifically Quick Service Restaurants (QSR’s) understand consumer contemporary relevance. The QSR’s most frequent consumer are more visceral engaged on a daily basis than someone born fifty years ago. They are in fact visceral tuned on, plugged in, online or utilizing mobile texting at the fastest rate ever. Visceral attractiveness in décor for food retailers is as important as cleanliness don’t get left out in the cold. Interactive Graphic filled menu boards or wall mounted “TV” units that are both informational and engaging should be considered. McDonalds is testing its own proprietary entertainment network billed as “McDonalds Channel at 19 units currently. With wifi in must units around the US currently this program will ““will entice the customer to sit down and enjoy their meal — and perhaps to stay a little longer.” Competitor Burger King had introduced flat screen tabletops and reportedly interested in rolling the program nation wide. Convenience stores and grocery stores will need to install at minimum digital signage in the “deli” or ready-to-eat and ready-to-heat sections of there stores. Walmart is leading currently with “TV monitor” units located at end-caps sponsored by national brand manufactures. Visceral attractiveness and consumer relevance are moving forward hand in hand. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Thursday, August 5, 2010 Fresh Food Russia takes place at the Hilton Leningradskaya, Moscow on the 11-12 November 2010.Fresh Food Russia Forum is an annual forum for the chief executives of production companies, agrarian enterprises that develop commoditised production of fresh produce, and the heads of the fresh produce divisions of the leading retail networks of Russia and the CIS. Its agenda includes the analysis of Fresh Food market trends and the discussion of solutions to improve business performance by implementing new systems, financial control, and IT technologies. The joint development of the fresh food sector by the retail and agro industries in Russia. Fresh produce in the retail networks today. The current dynamics of demand by category. Overcoming the logistical issues of fresh food supply. A look at fresh technologies and the standards necessary to work with the retail networks. Audience: The chief executives of production companies, agrarian enterprises that develop commoditised production of fresh produce, and the heads of the fresh produce divisions of the leading retail networks of Russian and the CIS. Format: panel discussions, supplier practicums, as well as exhibits of technology and service providers for the industry, and gala dinner. See our website www.freshfoodrussia.com for the updated speaker list and agenda. Please contact Dominic Manley, +44207 193 7863 or [email protected], for more details. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Grocerant food that is ready-to-eat or ready-to-heat is now finding it’s way in large chain store formats including Safeway’s Lifestyle stores,, Target, Walgreens, 7 Eleven, HEB’s Central Market, Harris Teeter and Buehler’s. Blending traditional category management with menu rationalization techniques these companies are seeing success. However those that have incorporated brand marketing into their food offerings including product or line positioning strategy have seen increased customer frequency and niche margins rise. Successful fresh food grocerant ready-to-eat and ready-to-heat programs include interactive participatory consumer interaction. Restaurant brand managers have utilized this strategy for some time. Other chains are beginning to utilize new metrics to leverage consumer success. The same is occurring in the Convenience store side with companies like AMPM bundling meal deals and new products, The Pantry improving coffee and QuickChek growing with solid consistent product offerings. Branding the food product offerings or food lines resonates with the consumer. Watch for Brand Managers being hired in all of these channels. Interested in a grocerant program assessment; if so contact Tacoma, WA based Foodservice Solutions. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants Tuesday, August 3, 2010 Understanding and utilizing the 5 P’s of grocerant fresh prepared food marketing; Product, Packaging, Placement, Portability and Price with a consumer focus Taco Bell is rolling out a new line of Mexican Restaurant style tacos with carnitas. Taco Bell’s Chief marketing Officer David Ovens stated: “Our Cantina Tacos are based upon authentic-style Mexican street tacos, which are designed using simple, fresh ingredients that customers regard as high quality,"… Not only are they a great-tasting addition to our menu, and one that was mainly found in Mexican-style restaurants, but they're also a great value that we know our customers love from Taco Bell." Channel blurring is not in the minds eye of the consumer. It is only in the minds eye of the legacy marketing managers in legacy companies. I am convinced that consumer will respond to the offer in a positive way! It’s time for many in the industry to reconsider individual brand positions. Who are you and where do you want to be. QSR’s are moving into fresh prepared better for you food. Grocery stores are selling bundled meal components that are fresh prepared. Grocerant fresh prepared food is going main stream. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerant Monday, August 2, 2010 A Danish Philosopher once said: “Life can be understood by looking backward, but must be lived by looking forward.” Homemeal replacement niche is the future of Foodservice. By: Steven A. Johnson (Published in Nations Restaurant News August 19, 1996.) Harkin back with this success clue by me (Steven Johnson) you will soon understand why this niche continues to boom exceeding even my expectations. Combine an intelligent, sophisticated grocery store food operations manager with a contemporary, insightful restaurateur and what you get is a grocerant called Eatzi’s. Most of you have read or hear of the $260,000 per week that Tony Tedesco of Brinker International Inc. and Phil Romano have generated with their concept Eatzi’s. It took three years and an untold sum to create and is not the end of the evolution of the home-meal-replacement niche. It is the most successful step so far. Together they understand that the eating habits of the American public have changed and continue to do so. A recent government study of 15,128 individuals more than 20 years old showed that 27.2 percent of women and 25.5 percent of men have four eating occasions per day, and another 15.4 percent of both men and women have five eating occasions. Even more surprising, 7.5 percent of the population have six occasions. Than finding creates a huge increase in customer opportunities for all concepts branded or otherwise. Romano and Tedesco combined the variety, freshness, quality and an interactive feel that restaurants need in today’s market with the speed, efficiency and value people expect from grocery stores. Mindful of portion sizes and the additional eating frequency of today’s consumer, they have packaged and provided items to fill the “gaps’. They have combined the best of restaurants, food courts and home meal replacement concepts with the quality food and beverage items from the grocery segment. That flexible blend is extremely consumer acceptable and has a formidable natural frequency rate as its core customer base. Eatzi’s customers frequency rate alone is a strong indicator that home meal replacement is a trend rather than a fad. The single most import argument that it is a trend may be its attractiveness to the sophisticated consumer who is more that 50 years old. Estimates are that one third of the U.S. population will be more that 50 by 2010, up from one quarter in 1991. All business in the sectors from computers, home business and retail operators need to take note of this group’s growth rate, disposal income and eating habits. The Senor Network, a Stamford, Conn. Based marketing and research company geared to older consumers. Recently stated that “simply based on population growth trends, if a product is marketed to the 50 plus audience and maintains its market share, it should increase in sales be 35 to 40 to 50 percent in the next 20 years. A brand targeted at the zero-to-50 age group will be flat in sales. Understanding that the frequency of eating for people in their 50s,60s, 70s, is on the increase while their dining out experience many be tapering off, we should all be convinced that Grocerants will flourish well into the future with national branded chains and independents vying for a piece of the pie. The evolution of the home meal replacement niche is far from complete; it will be growing rapidly in the future. Don’t fear, it will increase consumer satisfaction, complementing both the grocery and restaurant segments. It will not be replacing the restaurants or grocery stores of today. However, it will change the types of food and the way they are sold at each. Great credit should be given to Romano and Tedesco for understanding and identifying new and powerful niche. They understand that profit does not just happen, it is created, and it should be deliberate. Grocery store operators and restaurant operators need to remember this rule. Say no to change and don’t grow; say yes and try your very best. Reputations are success come when you are searching for things that haven’t been done and doing them. Dual or multi-branded concept engineering is here, successful and growing rapidly. Combine with a forward thinking home meal replacement; it is a sure formula for continued growth and outstanding success for Grocerants. Wow it’s been quite a ride; I thank all of you for your business and participation in this niche. For more on the continued growth of this niche Bing or Google: Steven Johnson Grocerants Sunday, August 1, 2010 I phone, I touch, I pad Apple computer is evolving with technology, and consumer increased desire to simply daily task with technology solutions. The new “I” line of devise has propelled Apple to the top of the fortune 500 list! Apple understood that consumers would accept, buy and utilize products that provide solutions while simplifying daily life. I know some may argue that they are not that easy to use, get over it! They are and consumers know it! That fact is retail foodservice success is about simplifying the daily life of the consumer. There is no discontinuity, the consumer is evolving and wants more options, in flavor, portion size and points of distribution. If your company is not evolving with the consumer it’s dying. The grocerant niche of fresh prepared read-to-eat and ready-to-heat food is growing both the top and bottom line for food retailers today. Since 1991 Foodservice Solutions of Tacoma, WA has been the global leader in the Grocerant niche for more on Steven A. Johnson and Foodservice Solutions visit http://www.linkedin.com/in/grocerant or on Facebook at Steven Johnson or BING / GOOGLE: Steven Johnson Grocerants
Mid
[ 0.6365688487584651, 35.25, 20.125 ]
Dodgers left-hander Hyun-Jin Ryu will pitch another four-inning simulated game Wednesday, his second simulated outing since the start of the second half. The Dodgers are hoping to give him a start next Monday or Tuesday against Minnesota, manager Dave Roberts said. Ryu has not pitched since June 28, when he was hit in the left foot by a batted ball. “He feels good,” Roberts said. “But now we’ve got to find a way to drop him in.” The Dodgers will stay on their rotation through a four-game series against Atlanta at Dodger Stadium. Brandon McCarthy will start Thursday, followed by Alex Wood, Rich Hill and Clayton Kershaw. Ryu has competed with Kenta Maeda for the fifth spot in the rotation for most of the season. Roberts indicated the Dodgers are not interested in using a six-man rotation. “For an extended period of time? No,” Roberts said. “But we’ve done that at times this year, for a turn.” Grant Dayton is close to returning Left-hander Grant Dayton threw a scoreless inning for Class-A Rancho Cucamonga on Monday, in his second outing of a rehabilitation assignment. Dayton is recovering from neck stiffness. He has not pitched for the Dodgers since June 30. Roberts indicated the team would likely activate Dayton during the upcoming homestand, which stretches from July 20 to July 30. Dayton entered the season as the team’s primary left-handed option out of the bullpen. He has struggled to replicate the success of his rookie season in 2016. His earned-run average has jumped from 2.05 to 3.63. As the trade deadline approaches, the Dodgers have identified left-handed relief as one of their major areas of concern. The team has engaged in discussion with Baltimore over closer Zach Britton, but could also pursue other left-handers such as Detroit’s Justin Wilson or San Diego’s Brad Hand. [email protected] Twitter: @McCulloughTimes
Mid
[ 0.604255319148936, 35.5, 23.25 ]
Q: Is it possible to get varchar's unique number value? Sample: select 'test1' union all select 'test2' Expected output: value 5XXXXXXX94 5XXXXXXXX6 What I have tried: I tried using md5 to do it, but it's not number type and it's possible duplicate. select md5('test1') union all select md5('test2') Postgres 11 Demo Link | db<>fiddle A: Create a table which will hold the relation between a string and a code. Create function which accepts the string, searches it in the table, if not found then generates and inserts unique random (or next using some generator) code, and then returns the code (found or generated). Or create a function which generates some hand-made "hash". For example, it may get code of each char in a string and perform some deterministic calculations with it. In this case you do not need in relational table. Or you may use CRC32 converting it to decimal form (just get up to 10 digits).
High
[ 0.665718349928876, 29.25, 14.6875 ]
X-ray and NMR characterization of covalent complexes of trypsin, borate, and alcohols. An understanding of the physiological and toxicological properties of borate and the utilization of boronic acids in drug development require a basic understanding of borate-enzyme chemistry. We report here the extension of our recent NMR studies indicating the formation of a ternary borate-alcohol-trypsin complex. Crystallographic and solution state NMR studies of porcine trypsin were performed in the presence of borate and either of three alcohols designed to bind to the S1 affinity subsite: 4-aminobutanol, guanidine-3-propanol, and 4-hydroxymethylbenzamidine. Quaternary complexes of trypsin, borate, S1-binding alcohol, and ethylene glycol (a cryoprotectant), as well as a ternary trypsin, borate, and ethylene glycol complex have been observed in the crystalline state. Borate forms ester bonds to Ser195, ethylene glycol (two bonds), and the S1-binding alcohol (if present). Spectra from (1)H and (11)B NMR studies confirm that these complexes also exist in solution and also provide evidence for the formation of ternary trypsin, borate, and S1-subsite alcohol complexes which are not observed in the crystals using our experimental protocols. Analysis of eight crystal structures indicates that formation of an active site borate complex is in all cases accompanied by a significant (approximately 4%) increase in the b-axis dimension of the unit cell. Presumably, our inability to observe the ternary complexes in the crystalline state arises from the lower stability of these complexes and consequent inability to overcome the constraints imposed by the lattice contacts. A mechanism for the coupling of the lattice contacts with the active site that involves a conformational rearrangement of Gln192 is suggested. The structures presented here represent the first crystallographic demonstration of covalent binding of an enzyme by borate.
High
[ 0.729198184568835, 30.125, 11.1875 ]
#define PHONG uniform vec3 diffuse; uniform vec3 emissive; uniform vec3 specular; uniform float shininess; uniform float opacity; #include <common> #include <packing> #include <dithering_pars_fragment> #include <color_pars_fragment> #include <uv_pars_fragment> #include <uv2_pars_fragment> #include <map_pars_fragment> #include <alphamap_pars_fragment> #include <aomap_pars_fragment> #include <lightmap_pars_fragment> #include <emissivemap_pars_fragment> #include <envmap_pars_fragment> #include <gradientmap_pars_fragment> #include <fog_pars_fragment> #include <bsdfs> #include <lights_pars_begin> #include <lights_pars_maps> #include <lights_phong_pars_fragment> #include <shadowmap_pars_fragment> #include <bumpmap_pars_fragment> #include <normalmap_pars_fragment> #include <specularmap_pars_fragment> #include <logdepthbuf_pars_fragment> #include <clipping_planes_pars_fragment> void main() { #include <clipping_planes_fragment> vec4 diffuseColor = vec4( diffuse, opacity ); ReflectedLight reflectedLight = ReflectedLight( vec3( 0.0 ), vec3( 0.0 ), vec3( 0.0 ), vec3( 0.0 ) ); vec3 totalEmissiveRadiance = emissive; #include <logdepthbuf_fragment> #include <map_fragment> #include <color_fragment> #include <alphamap_fragment> #include <alphatest_fragment> #include <specularmap_fragment> #include <normal_fragment_begin> #include <normal_fragment_maps> #include <emissivemap_fragment> // accumulation #include <lights_phong_fragment> #include <lights_fragment_begin> #include <lights_fragment_maps> #include <lights_fragment_end> // modulation #include <aomap_fragment> vec3 outgoingLight = reflectedLight.directDiffuse + reflectedLight.indirectDiffuse + reflectedLight.directSpecular + reflectedLight.indirectSpecular + totalEmissiveRadiance; #include <envmap_fragment> gl_FragColor = vec4( outgoingLight, diffuseColor.a ); #include <tonemapping_fragment> #include <encodings_fragment> #include <fog_fragment> #include <premultiplied_alpha_fragment> #include <dithering_fragment> }
Mid
[ 0.6355555555555551, 35.75, 20.5 ]
Q: Force TCPDump to write in PCAP instead of PCAP-NG format I'm running tcpdump on Mac OS and I've noticed it saves files in PCAP-NG format (the first 4 bytes are 0A 0D 0D 0A). Is there a way to force it to use the old PCAP instead? Software version: tcpdump version 4.3.0 -- Apple version 56 libpcap version 1.3.0 - Apple version 41 ps. I'm not sure is that related to TCPDump or libpcap. A: The tcpdump man page on Mavericks says: -i Listen on interface. If the -D flag is supported, an interface number as printed by that flag can be used as the interface argument. On Darwin systems version 13 or later, when the interface is unspecified, tcpdump will use a pseudo interface to capture packets on a set of interfaces determined by the kernel (excludes by default loopback and tunnel interfaces). Alternatively, to capture on more than one interface at a time, one may use "pktap" as the interface parameter followed by an optional list of comma separated interface names to include. For example, to capture on the loopback and en0 interface: tcpdump -i pktap,lo0,en0 An interface argument of "all" or "pktap,all" can be used to capture packets from all interfaces, including loopback and tun- nel interfaces. A pktap pseudo interface provides for packet metadata using the default PKTAP data link type and files are written in the Pcap- ng file format. The RAW data link type must be used to force to use the legacy pcap-savefile(5) file format with a ptkap pseudo interface. Note that captures on a ptkap pseudo interface will not be done in promiscuous mode. An interface argument of "iptap" can be used to capture packets from at the IP layer. This capture packets as they are passed to the input and output routines of the IPv4 and IPv6 protocol handlers of the networking stack. Note that captures will not be done in promiscuous mode. so you need to specify an interface on which to capture. Note that versions of OS X dating back to Lion, newer versions of FreeBSD/NetBSD/DragonFly BSD, and newer versions of many Linux distributions include libpcap 1.1.1 or later, which means that programs using libpcap to read capture files can read many pcap-ng files. Wireshark has also been able to read them for several releases.
Mid
[ 0.6390804597701151, 34.75, 19.625 ]
1. Field of the Invention The present invention relates generally to beverage cups and, more particularly, to a novel hot beverage cup having an inner chamber to maintain the beverage at constant temperature. 2. Description of the Related Art Coffee, tea and other hot beverages are enjoyed by people almost every day. Many people cannot start their day without a cup of their favorite hot beverage. However, everyone knows that a cup of freshly poured coffee is too hot to drink from and must be blown on so just a sip can be taken. Likewise, a cup of coffee will cool quickly as well and be unsuitable for drinking. This fact is evident by the abundance of coffee warmers on the market that are used to keep a cup of coffee warm while a person is sitting at a desk. All of these facts lead to the conclusion that during the entire life cycle of a cup of coffee, only a small percentage of the time is the temperature optimal for drinking. Most of the time it is either too hot or too cold. Accordingly, a need has arisen for a solution to these problems associated with drinking hot beverages. The development of the constant temperature beverage cup fulfills this need. In the related art, there exist patents for beverage containers that utilize an insulator barrier such as air as in the present invention. However, there exists no patents which utilize a separate chamber which draws a small amount of beverage into it prior to consumption for cooling the beverage faster than that in the main beverage chamber. Nor are there any devices that attempt to prevent the rapid cooling of a hot beverage and provide a beverage to be served at a more constant temperature. A search of the prior art did not disclose any patents that read directly on the claims of the instant invention; however, the following references were considered related: ______________________________________ U.S. Pat. No. Inventor Issue Date ______________________________________ 5,524,817 Meier et al. Jun. 11, 1996 5,515,995 Allen et al. May 14, 1996 4,261,501 Watkins et al. Apr. 14, 1981 2,591,578 McNealy et al. Dec. 20, 1947 5,842,353 Kuo-Liang Jun. 11, 1996 5,071,060 DeFelice Dec. 10, 1991 4,720,023 Jeff Jan. 19, 1988 4,151,923 Bernardi May 1, 1979 4,141,462 Rucci Feb. 27, 1979 D 372,168 Seager Jul. 30, 1996 ______________________________________ Consequently, a need has been felt for providing an apparatus and method which prevent the rapid cooling of a hot beverage and maintains the beverage for consumption at a more constant temperature.
High
[ 0.6633663366336631, 33.5, 17 ]
Q: Mercurial: How can I create an unplanned branch My use case is this: I am working on a new feature and I have several commits on that feature. Since it was a minor feature, I didn't even consider doing the feature in a feature branch. However. Now my boss comes along and tells me to fix a bug on the same branch that I am working on (default). To fix that I'd like to create a feature branch for my feature, push all my existing (unpushed) commits into that branch. So I'd like to create a branch just before my first commit and then somehow move all my commits to that branch. How can I do this? A: For this situation you can fix it by rebasing (which may need enabling in your configuration). On your branch, update to the revision before the change-sets you want to move: hg up -r<revison> This assumes contiguous revisions need moving. Create a new branch: hg branch "TempWork" Put a dummy commit onto it in order to get a new revision: hg commit -m"New Branch" Then perform the rebase from the first of the change-sets you want to move (it moves descendants automatically) and specify the new branch revision as the destination: hg rebase -s<base revision> -d<new branch revision> Then update back onto your main-line branch. A: There’s two ways to approach this, depending on your preference: In a new repository. Make a new clone of your repository, and do the bug fix you need to make there. Then push it to the main repository when you’re done, and continue where you left off in the original repository. Pull and merge to get the new changes as usual. In the existing repository. Update to the changeset before your local changes, and just start fixing and committing there. This creates a new anonymous branch. When you’re done, push using push -r ., this will only push the changes that are included in the working copy. After this, merge with your original branch (hg merge) and continue where you left off. Note that you can bookmark the feature branch with hg bookmark if you do not feel comfortable with leaving your changes unlabeled. Also you can easily find back any heads you left behind using hg heads. Personally I prefer to work in a new clean clone, as you don’t need to worry about branching and where to leave uncommitted changes. However if your project setup is complicated it may be more convenient to reuse the existing repo.
High
[ 0.664615384615384, 27, 13.625 ]