id
stringlengths
5
40
text
stringlengths
0
7.09M
metadata
stringlengths
33
87.9k
source
stringlengths
0
1.4k
version
stringclasses
1 value
created
stringlengths
0
24
added
stringlengths
0
24
doc
stringlengths
124
1.66k
attributes
stringclasses
3 values
5f26db25-5b53-4713-9a4c-ee487cecfb28
How do prepare for a competency based interview... on the telephone ? I have one one Friday. Any tips to how to prepare for one ? 18:14 Wed 11th Apr 2012 Best Answer No best answer has yet been selected by ClinkatyClank. Once a best answer has been selected, it will be shown here. For more on marking an answer as the "Best Answer", please visit our FAQ. 1 to 11 of 11 No idea - how do they assess your competency over the phone (except for your telephone skills)? Question Author I have a stammer :( I'm not bad in person but as with all stammerers, phone is a problem. Interviewers assess competences the same way as they would face-to-face - by asking questions around examples of work-related events. For example, tell me about a time when you felt under pressure at work. Then a series of follow-up questions around how you dealt with it. Do you know what core competences are regarded as essential for the work? Will they tell you? (they might not). Prepare by writing up in notes examples of common traits required in most jobs - writing notes helps you by fluent when the time comes to draw on your experience to give an answer. One of the (few) good things about a telephone interview is that the other person can't see what crib notes you have in front of you. If the organisation is worth anything, it won't attempt a complex and deep interview over the phone - it doesn't help either party. It is best used to sort the wheat from the chaff - the real interview comes face-to-face. It is more often usefully used to test out the worth of what is on the CV - not to test competences. Thanks BM - that's useful to know, I've not heard of the process before. Can you give us a clue about the type of work CC? We might be able to be a little more specific with advice if we know. Question Author It's a data admin role I applied through an agency. The agency interviewed me and told me that I would have to do a telephone CB interview lasting around 10 mins. I'm bit nervous as I'm very bad in phone due to my speech. Thank god the role doesn't require phone work. Ok - so I would anticipate the questions to be more factual that personality based. Since its a competency interview expect them to ask you about your skills in using the appropriate software, maybe your data entry speeds if appropriate and your similar previous experience. Think what you'd want to know if you were them recruiting a data admin person. Tell them how accurate you are and how you excel at data and admin tasks. Tell them what applciations you can use and to what level. Take it slowly and breath well. if necessary and you stammer badly, tell them you have a stammer and ask if they'd consider a competency interview by email? It might work you can never tell. They might be open minded enough to realise that you could be perfect for the job without being good on the phone. Good luck. Have a look at the firm itself and find out a bit about them. They will want to know if you are interested enough to look them up. I expect they have a web site somewhere which no doubt Google will be able to find for you. If they cannot be bothered to interview you in person you are better off without them. builders mate is spot on - you need to think of scenarios that you vann fit to a few different things depending on the question. They will probably ask things like: Tell me about a time where you completed something sucessfully against the odds where something went wrong and how you dealt with it where you worked well in a team where you worked to tight deadlines etc etc etc as the interview is only 10 minutes (these things often last up to 2 hours!!) there will probably be only 1 0r 2 questions and they wont expect war and peace. They are trying to determine how you work - and even if it goes against the grain, remember tio use "I" a lot and emphasis the role you took and how it was you that helped to make the task a success. They may aks you a negative question or two so prepare one where things didn't go according to plan - make sure it was for a reason outwith your control and remeber to tell them what you learned from it. I would explain at the beginning that you have a speech impediment that is aggravated when you are nervous and on the phone but that doesn't impede you normally and that you just need a little longer to answer the questions. Good Luck :o) No Daisy its quite a common practice especially when agencies have referred people as a degree of filtering has taken place already. 1 to 11 of 11 Latest posts
{"cc_dump":"CC-MAIN-2013-20","dolma2_qc":{"0":0.9856476188,"1":0.0143724149},"exact_duplicates":0,"lang":{"en":0.9785499573},"madlad":{"num_sentences":48,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":850,"sa_remove_ranges":[],"text_hash":"222575650935467880523085018003683131003","warc_content_type":"application\/http; msgtype=response","warc_date":"2013-05-25T19:08:27Z","warc_url":"http:\/\/www.theanswerbank.co.uk\/Jobs-and-Education\/Question1123767.html","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":0.0351548418,"__label__education_and_jobs":0.7773098946,"__label__finance_and_business":0.1480571926,"__label__games":0.0488677844,"__label__health":0.0216253344,"__label__history_and_geography":null,"__label__science_math_and_technology":null,"__label__social_life":0.0373368822,"__label__software":0.0373368822,"__label__electronics_and_hardare":0.0185565669,"__label__home_and_hobbies":null,"__label__industrial":null,"__label__software_development":0.0222961847,"__label__travel_and_tourism":null,"__label__entertainment":null,"__label__politics":null,"__label__religion":null,"__label__sports_and_fitness":null,"__label__fashion_and_beauty":null,"__label__literature":0.0216253344,"__label__transportation":null,"__label__food_and_dining":null,"__label__adult_content":null},"weborganizer_max":"__label__education_and_jobs"}
null
null
null
null
null
null
4fd0203c-ddae-4334-9455-0561b6023757
We all know that taking care of your health is important. To ensure that you live a long healthy life, there are a number of things you can do, such as avoiding eating junk food or getting regular exercise. Physical health, however, is not the only aspect of your health that you should be aware of. An important part of your overall well-being stems from your mental health as well. Mental health issues affect a large portion of the population, with 1 in 5 adults experiencing some form of mental illness in any given year, according to the Centers for Disease Control and Prevention (CDC). With so many adults experiencing mental health issues, it is crucial that we prioritize our mental health and take active steps to maintain it. At Adler Health, we believe it’s important to prioritize your mental well-being just as much as your physical health. Not only do we provide a range of mental health treatment plans, but we also impart mental health advice to those who are seeking it. In this blog, we will cover our top 10 tips to maintain your mental health. But first, why is taking care of your mental health so important? The Importance of Maintaining Your Mental Health You may not know it, but your mental health affects every aspect of your life. It influences how you think, feel, and behave in various situations. When you have good mental health, you are able to cope with daily stresses and challenges effectively, have healthy relationships with others, and perform well in your work or studies. On the other hand, neglecting your mental health can have serious consequences. It can lead to a decline in your overall well-being, causing symptoms such as anxiety, or even physical health issues. Adler Health offers depression treatment in Orange County. The Negative Impacts of Neglecting Your Mental Health Neglecting your mental health can have a ripple effect on every aspect of your life. It may start with feeling stressed and overwhelmed, but it can quickly escalate into more serious problems. Here are some of the negative impacts that neglecting your mental health can have on you: • Increased risk of developing mental health disorders such as depression, or substance abuse. • Difficulty coping with daily stresses and challenges. • Strained relationships with family, friends, and coworkers. • Physical symptoms like headaches, muscle tension, or stomach issues. • Decreased productivity and performance at work or in school. • Poor self-esteem and lack of motivation. Adler Health offers anxiety treatment in Orange County. Top 10 Tips to Maintain Your Mental Health If you think maintaining your mental health is out of reach, think again. Maintaining your mental health includes actions that you can take every single day without significantly changing up your routine. By following our top 10 tips to maintain your mental health, you can take an active role in taking care of your mental well-being and work towards a happier, healthier life. This may be one of the most important tips to maintain your mental health. Getting enough sleep at night is crucial for both your physical and mental well-being. It helps improve your mood, reduce stress levels, and increases your ability to focus and concentrate during the day. When a person fails to get enough sleep, they are more likely to struggle with their emotions and have difficulty dealing with stress. This can lead to a decline in mental health over time. Therefore, you should make sure you aim for 7-9 hours of sleep each night. To ensure that you get enough restful sleep, you should do the following: • Establish a bedtime routine: A bedtime routine can help your brain and body wind down, making it easier for you to fall asleep. This can include: having a cup of tea, reading, taking a bath, or stretching before bed every night. • Avoid screens before bedtime: The blue light from electronic devices can interfere with your sleep cycle and make your brain more active, making it difficult for you to fall asleep. • Create a comfortable sleeping environment: Make sure your bedroom is dark, quiet, and cool – these conditions promote better sleep quality. • Avoid caffeine, heavy meals, and alcohol before bedtime: These substances can all interfere with your sleep quality. By increasing the amount of hours you sleep and the quality of your sleep, you can significantly improve your mental health. Maintaining a healthy diet is essential for more than keeping your body in good shape. Eating a balanced diet also ensures that you get the necessary nutrients to fuel your brain. A deficiency in essential vitamins like vitamin D, B12, or folic acid can lead to a number of consequences. According to a study published in the National Library of Medicine, different nutritional deficiencies (such as B12, B9, and zinc) have been linked to symptoms of depression and dementia that include low mood, fatigue, cognitive decline, and irritability. Therefore, it is important to make sure you include whole grains, fruits and vegetables, lean proteins, and healthy fats in your diet for optimum mental health. Eating healthy is not the only way to maintain a balanced diet. It is also important to avoid foods that have been linked to poor mental health, such as processed foods, sugary snacks, and excessive caffeine. These types of food can lead to mood swings and irritability. Additionally, limiting the amount of alcohol you drink and avoiding smoking can also positively impact your mental health. Exercise is another important tool for maintaining your mental health. Physical activity releases endorphins, which are chemicals in the brain that promote feelings of happiness and positivity. Regular exercise has also been linked to reducing symptoms of anxiety and depression. Getting regular exercise can seem intimidating to some. However, you don’t have to spend hours at the gym or engage in intense workouts. Even light physical activity can be beneficial for your mental health. These exercises can include: • Walking or jogging: Take a walk around your neighborhood, or go for a jog in the park. You’ll be surprised how much this simple exercise can boost your mood. • Yoga: Yoga is not only great for physical health but also for mental health. It combines physical movement and mindfulness meditation, which can help reduce stress and promote relaxation. • Dancing: Dancing is another fun and effective way to get your body moving. Whether it’s a dance class or dancing around your living room, it can improve your mood and reduce stress. • Swimming: Swimming is a low-impact exercise that can be great for both your physical and mental health. The rhythmic motion of swimming can be calming and help clear your mind. • Riding a bike, rollerblading, or playing a sport: Any activity that you enjoy and can get your body moving is beneficial for your mental health. The key is to find activities you enjoy and make them a regular part of your routine. When you enjoy an activity, you are more likely to stick with it and reap the mental health benefits. In today’s fast-paced world, it can be challenging to find time to relax. However, taking a few minutes each day to practice relaxation techniques can significantly improve your mental health. These techniques can include: • Deep breathing exercises • Progressive muscle relaxation • Engaging in a hobby or activity you enjoy Taking the time to relax can help reduce stress and promote feelings of calmness and well-being. Our social health also plays a significant role in our mental health. Having a strong support system can provide comfort, and encouragement, and help us cope with life’s challenges. It is crucial to surround yourself with people who uplift you and support your well-being. They are the people we can turn to during difficult times and who provide us with emotional support, understanding, and validation. A support system can include family, friends, coworkers, or even online communities. Building a support system can involve: • Nurturing existing relationships: Reach out to friends and family regularly, spend quality time together, and be there for each other. • Joining a support group: Support groups can provide a safe space to discuss shared experiences and find understanding and support from others who may be going through similar challenges. • Seeking therapy: Professional therapy is another option for building a support system. A therapist can provide guidance and support in managing mental health issues. When it comes to our relationships, it is important to avoid people that are toxic. Toxic relationships can have a severe impact on our mental health. It’s essential to recognize red flags and set boundaries with unhealthy individuals. At times, the relationships in our lives can contribute to our mental health in negative ways. Learning to set boundaries is essential for maintaining good mental health. Boundaries are guidelines that help define what behaviors, actions, and words are acceptable from others. When we don’t have boundaries, we can feel overwhelmed, taken advantage of, and unvalued. This can negatively impact our mental health. Setting boundaries can be challenging, but it is an important skill to have. It allows us to protect our well-being and prioritize self-care. Some tips for setting boundaries include: • Identify what you are comfortable with: Figure out what behaviors or situations make you feel uncomfortable or stressed. • Communicate your boundaries clearly: Let others know what you are and are not okay with. Clear communication is key to setting effective boundaries. • Be consistent: Once you have established your boundaries, stick to them. This helps reinforce their importance and shows others that you are serious about respecting them. By setting boundaries, we can improve our self-esteem, reduce stress, and maintain healthier relationships, ultimately leading to better mental health. In life, direction can help us feel motivated and give us a sense of purpose. Setting goals, whether big or small, can help improve our mental health by giving us something to strive for. To set effective goals, keep the following tips in mind: • Make them achievable: Set realistic goals that you believe you can accomplish. • Write them down: Writing down your goals makes them more tangible and increases your chances of following through. • Celebrate progress: Even small steps towards achieving your goals are worth celebrating. This can help keep you motivated and boost your self-confidence. By setting goals and working towards them, we can improve our mental health by giving ourselves a sense of purpose and accomplishment. Gratitude is the act of acknowledging and appreciating the good things in our lives. Practicing gratitude can have a significant impact on our mental health by shifting our focus from negative to positive. Practicing gratitude doesn’t mean ignoring our problems, but rather choosing to see and acknowledge the good in our lives. Different ways to practice gratitude include: • Keeping a gratitude journal: Write down three things you are grateful for each day. • Expressing gratitude to others: Let the people in your life know that you appreciate them. • Reflecting on positive aspects of your life: Take time to reflect on what is going well in your life and be thankful for it. Gratitude can improve our overall outlook, increase happiness, and reduce stress levels. Self-care is any activity that we do to take care of our physical, emotional, or mental well-being. It is essential for maintaining good mental health and preventing burnout. Self-care can include: • Getting enough sleep: Aim for 7-9 hours of quality sleep each night. • Eating a balanced diet: A healthy diet can improve mood and energy levels. • Engaging in activities you enjoy: Make time for hobbies, exercise, or anything else that brings you joy. • Unplugging from technology: Taking a break from screens can help reduce stress and improve our overall well-being. Prioritizing self-care helps us to recharge and refocus on ourselves. It is not selfish but necessary for our mental health. Lastly, if you are struggling with maintaining your mental health or are experiencing symptoms of a mental illness, it is essential to seek professional help. There is no shame in reaching out for support and guidance. At Adler Health, a leading mental health treatment center in Orange County, California, we offer personalized care and evidence-based therapies to help individuals improve their mental health. Our team of experienced professionals is dedicated to providing compassionate and effective treatment for a variety of mental health issues. Remember, taking care of your mental health is just as important as taking care of your physical health. By incorporating these top 10 tips to maintain your mental health into your daily life, you can maintain good mental health and improve your overall well-being. Don’t hesitate to reach out for help if needed – your mental health is worth it. Mental Health Treatment at Adler Health At Adler Health, we understand the importance of maintaining good mental health. Our approach to treatment is personalized and evidence-based, ensuring that each individual receives the care they need. We offer a range of services, including psychiatric evaluations, medication management, individual therapy, group therapy, and family therapy. Our team consists of mental health professionals who work together to provide comprehensive and compassionate care. We specialize in treating a variety of mental health issues, such as depression, anxiety, and more. Our goal is to help our clients improve their quality of life and achieve lasting mental wellness. If you or a loved one is struggling with mental health in Southern California, contact us today at Adler Health.
{"cc_dump":"CC-MAIN-2024-10","dolma2_qc":{"0":0.0799764395,"1":0.9200435281},"exact_duplicates":3,"lang":{"en":0.9540951848},"madlad":{"num_sentences":130,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":2242,"sa_remove_ranges":[],"text_hash":"216654560891199468165635506867646693745","warc_content_type":"text\/html","warc_date":"2024-02-25T23:49:04.000Z","warc_url":"https:\/\/adlerhealth.com\/top-10-tips-to-maintain-your-mental-health\/","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":0.0015587612,"__label__entertainment":null,"__label__finance_and_business":0.0004978571,"__label__health":1.0000100136,"__label__history_and_geography":0.00001,"__label__literature":null,"__label__politics":null,"__label__religion":null,"__label__science_math_and_technology":0.00001,"__label__art_and_design":null,"__label__social_life":0.0031826822,"__label__software_development":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null,"__label__electronics_and_hardare":null,"__label__games":null,"__label__industrial":null,"__label__software":null,"__label__sports_and_fitness":0.0017107223,"__label__adult_content":0.00001,"__label__home_and_hobbies":0.002125703,"__label__fashion_and_beauty":0.0003782979,"__label__transportation":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
dcaf72e8-d1c5-4d82-b20e-d83f5142e0be
Barska - Loaded Gear HD-600 Hard Case - Black The O-ring and 2 grasping latches built into this crush- and corrosion-resistant Barska Loaded Gear HD-600 BH11866 case form a seal that repels water and locks out air to help safeguard sensitive equipment from the elementsBarska Loaded Gear HD-600 Hard Case • Detachable shoulder strap Product Features Customizable, preperforated cubed-foam interior Houses a variety of items for on-the-go transportation. Egg-crate foam padding helps protect your devices from bumps and scrapes. Crush-resistant, reinforced metal handle and extendable travel handle Offer versatile carrying options. Detachable shoulder strap adds comfort during transport. Edge-to-edge crush-resistant, corrosion-resistant polypropylene construction Provides rugged durability. Air pressure equalization valve Lets you reliably store pressure-sensitive equipment. O-ring and 2 grasping latches Ensure snug, secure closure and work together to create a watertight and airtight seal, helping to safeguard your belongings from the elements. Heat- and cold-resistant To withstand temperatures from -10° to 210° for long-lasting use. 2 padlock mounting points Allow installation of locking mechanisms with shackle diameters up to 8mm (not included) for added security. Reinforced wheels Along with a compact design for easy portability. Product images, including color, may differ from actual product appearance.
{"cc_dump":"CC-MAIN-2016-22","dolma2_qc":{"0":0.9933365583,"1":0.0066833952},"exact_duplicates":0,"lang":{"en":0.859538734},"madlad":{"num_sentences":20,"rule.2":[7],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":417,"sa_remove_ranges":[[270,1521]],"text_hash":"295703693744758406224527874360094698206","warc_content_type":"application\/http; msgtype=response","warc_date":"2016-05-25T11:50:37Z","warc_url":"http:\/\/www.bestbuy.com\/site\/barska-loaded-gear-hd-600-hard-case-black\/6937237.p?id=1218815250885&skuId=6937237","weborganizer":{"__label__art_and_design":0.0016584827,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__fashion_and_beauty":0.0040801377,"__label__finance_and_business":null,"__label__food_and_dining":0.0005457805,"__label__health":0.0006562032,"__label__industrial":0.5312193632,"__label__science_math_and_technology":0.0027249858,"__label__software":null,"__label__home_and_hobbies":0.0534133315,"__label__politics":null,"__label__software_development":null,"__label__sports_and_fitness":0.1602760255,"__label__transportation":0.1441588551,"__label__electronics_and_hardare":0.3007555902,"__label__history_and_geography":null,"__label__games":null,"__label__travel_and_tourism":null,"__label__entertainment":null,"__label__social_life":null,"__label__adult_content":null,"__label__religion":null,"__label__literature":null},"weborganizer_max":"__label__industrial"}
null
null
null
null
null
null
21824a55-d0c7-4e21-bbaa-7bd328866068
8 Restarts Later Welcome to the digital world of Wlad, a software developer based in Munich, Germany, and the creator of this shiny new webpage. It has taken seven restarts to finally reach this point of release, and it is a moment to celebrate. While this webpage is far from being completed, Wlad sees it as a moving target, which is common in web development. The goal was to release the project while the momentum was present, to prevent an 8th restart from happening. In this #0 blog post, Wlad shares some background information and sets the tone for the upcoming content. This blog will focus on the constant problem-solving aspect of software development, and Wlad aims to archive and preserve interesting findings and discoveries that are often lost in forgotten repositories. The motivation behind this blog is threefold. Firstly, to archive and preserve cool stuff that Wlad stumbles upon during his work and hobby projects. Secondly, to provide the much-needed kick in the bum to do more cool projects, and finally, to practice writing. Wlad sets a goal of uploading two blog posts per month to keep himself motivated and productive, especially during the COVID-19 dictated times. As a reader, you can expect to see interesting and relevant content related to software development, including elegant solutions to complex problems. With a decent selection of topics already in the pipeline, Wlad is excited to get started and share his findings with the world. Overall, this introductory blog post sets a good foundation for the upcoming content, while also providing some insight into the creator’s motivations and goals. The only suggestion for improvement would be to clarify the focus of the blog a bit more, as the topics mentioned are quite broad. Perhaps narrowing down the focus to a specific area of software development would help attract a more targeted audience.
{"cc_dump":"CC-MAIN-2024-18","dolma2_qc":{"0":0.2412571758,"1":0.7587628365},"exact_duplicates":0,"lang":{"en":0.9677305222},"madlad":{"num_sentences":15,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":313,"sa_remove_ranges":[],"text_hash":"38058672264697557653560813607204242816","warc_content_type":"text\/html","warc_date":"2024-04-24T08:08:12.000Z","warc_url":"https:\/\/iamwlad.com\/blog\/hello-world","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":0.0284460355,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0362300538,"__label__industrial":null,"__label__politics":null,"__label__science_math_and_technology":0.0251888447,"__label__software":0.0901029855,"__label__software_development":0.4610267878,"__label__transportation":null,"__label__games":0.012831213,"__label__health":null,"__label__home_and_hobbies":0.0203423519,"__label__literature":null,"__label__social_life":null,"__label__art_and_design":0.0149670839,"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__history_and_geography":null,"__label__sports_and_fitness":0.0164130311,"__label__food_and_dining":null,"__label__travel_and_tourism":null,"__label__entertainment":0.0071314299,"__label__religion":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
70da5d33-7167-4eca-ba9a-84c8486850e0
So how does the matchmaking work? So what is the idea behind it? I could understand if it were same rank players but it can be from bronz 5, bronz 3, some silver vs like 3 preemade friends/team and silver! I mean what is the algorytm or idea of matchmaking. I cant figure it out. It seems somehow super strange and sometimes plain and simple setting you up to fail! Maybe someone can explain in simple terms what is the idea behind it! Report as: Offensive Spam Harassment Incorrect Board
{"cc_dump":"CC-MAIN-2020-10","dolma2_qc":{"0":0.589848876,"1":0.4101711214},"exact_duplicates":0,"lang":{"en":0.9632718563},"madlad":{"num_sentences":8,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":93,"sa_remove_ranges":[],"text_hash":"264541109606837916083515441924464809254","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-02-23T02:06:09Z","warc_url":"https:\/\/boards.euw.leagueoflegends.com\/en\/c\/champions-gameplay-en\/TYqajeN6-so-how-does-the-matchmaking-work","weborganizer":{"__label__adult_content":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":0.000789366,"__label__finance_and_business":0.0038344827,"__label__games":0.8634016514,"__label__politics":null,"__label__science_math_and_technology":0.0021927168,"__label__social_life":0.173298195,"__label__software":0.0518554598,"__label__software_development":0.0164130311,"__label__crime_and_law":null,"__label__health":null,"__label__religion":null,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__art_and_design":0.0251888447,"__label__entertainment":null,"__label__sports_and_fitness":null,"__label__literature":0.0042087957,"__label__history_and_geography":null,"__label__industrial":null,"__label__home_and_hobbies":0.0055649248,"__label__fashion_and_beauty":null,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
b9e57be3-59f4-4219-b2cb-13921e10922e
Cody # Problem 1483. Number of paths on a grid Solution 1953380 Submitted on 30 Sep 2019 by Sean Kavanagh This solution is locked. To view this solution, you need to provide a solution of the same size or smaller. ### Test Suite Test Status Code Input and Output 1   Pass m = 1; n = 1 ; y_correct = 0; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 2   Pass m = 2; n = 2 ; y_correct = 2; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 3   Pass m = 4; n = 3 ; y_correct = 10; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 4   Pass m = 6; n = 5 ; y_correct = 126; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 5   Pass m = 5; n = 5 ; y_correct = 70; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 6   Pass m = 1; n = 100 ; y_correct = 1; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 7   Pass m = 100; n = 1 ; y_correct = 1; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 8   Pass m = 2; n = 100 ; y_correct = 100; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 9   Pass m = 100; n = 2 ; y_correct = 100; assert(isequal(paths2dest_ongrid(m,n),y_correct)) 10   Pass m = 15; n = 20 ; y_correct = 818809200; assert(isequal(paths2dest_ongrid(m,n),y_correct)) ### Community Treasure Hunt Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting!
{"token_count":456,"fetch_time":1.60685782e+18,"warc_filename":"crawl-data\/CC-MAIN-2020-50\/segments\/1606141681524.75\/warc\/CC-MAIN-20201201200611-20201201230611-00289.warc.gz","warc_record_length":17323,"language":"en","snapshot_type":"latest","char_count":1321,"crawl":"CC-MAIN-2020-50","warc_record_offset":178281177,"language_score":0.4799945652,"content_mime_type":"text\/html","int_score":3.0,"score":3.296875,"original_metadata":{"\/images\/math\/codecogs":0,"align":0,"codecogs_latex":0,"equation":0,"found_math":false,"img_math":0,"katex":0,"math-container":0,"math_alttext":0,"math_annotations":0,"mathjax_asciimath":0,"mathjax_display_tex":0,"mathjax_inline_tex":0,"mathjax_tag":0,"mathml":0,"mathtex.cgi":0,"mimetex.cgi":0,"script_math_asciimath":0,"script_math_tex":0,"texerror":0,"wp-katex-eq":0,"wp_latex":0,"x-ck12":0}}
https://au.mathworks.com/matlabcentral/cody/problems/1483-number-of-paths-on-a-grid/solutions/1953380
null
null
null
null
null
69172509-c731-4e46-ab2e-52428e67c237
HuffPost Canada closed in 2021 and this site is maintained as an online archive. If you have questions or concerns, please check our FAQ or contact support@huffpost.com. boc interest rate The timing of future hikes will depend on several factors. The bank didn't make any specific mentions this time about the potential policy path of the U.S. Neither a rate cut nor a rate hike are likely to give the BoC the results it's looking for. OTTAWA -- The Bank of Canada cut its key interest rate Wednesday as it slashed its outlook for the economy and predicted Get ready for Canada’s borrowing frenzy to get even more frenzied, thanks to the Bank of Canada’s interest rate cut — a move Cut could come as soon as July 15 CIBC: 'Indebted households don’t need even lower borrowing costs' Poloz: Soaring household OTTAWA - The Bank of Canada is keeping its trendsetting interest rate locked at 0.75 per cent even as recent weakness in OTTAWA - The Bank of Canada says it expects the oil-price shock likely "stalled" the country's economy to the point it had
{"cc_dump":"CC-MAIN-2021-17","dolma2_qc":{"0":0.5348898768,"1":0.4651301503},"exact_duplicates":0,"lang":{"en":0.9586117864},"madlad":{"num_sentences":6,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":183,"sa_remove_ranges":[],"text_hash":"215316501014483002553930444029222447768","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-04-15T08:26:24Z","warc_url":"https:\/\/www.huffingtonpost.ca\/news\/boc-interest-rate\/","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__finance_and_business":0.9972090721,"__label__home_and_hobbies":0.026769286,"__label__industrial":0.0026416746,"__label__science_math_and_technology":0.0097184796,"__label__software":null,"__label__software_development":null,"__label__travel_and_tourism":null,"__label__literature":null,"__label__politics":0.0069138384,"__label__electronics_and_hardare":0.0078258887,"__label__fashion_and_beauty":null,"__label__transportation":0.0049154055,"__label__adult_content":null,"__label__history_and_geography":0.0030853704,"__label__sports_and_fitness":0.0038344827,"__label__health":null,"__label__religion":null,"__label__games":null,"__label__entertainment":0.0034934247,"__label__food_and_dining":null,"__label__social_life":null},"weborganizer_max":"__label__finance_and_business"}
null
null
null
null
null
null
8c1dee4a-6d24-4a88-b6e9-df98ad503fef
CEO says firm will keep iterating until it has mobile games it can be proud of Bigpoint ‘happy to fail’ in mobile return Online gaming giant Bigpoint says it is “happy to fail as much as it takes” as it prepares to return to the mobile space. The company recently announced it would once again attempt to establish a foothold in the hotly-contested smartphone and tablet market when it acquired Lyon-based Little Worlds Studio. Renamed Bigpoint Lyon, the developer will now be dedicated solely to mobile games. Bigpoint has attempted to conquer the mobile market in years past, but CEO Khaled Helioui told Develop at Gamescom that shifts in the company’s structure should give his teams a better chance than before. “We used to be a very centralised company – big decisions came from the top,” he explained. “Now we’re hiring people who are extremely passionate about what they do, give them a framework in terms of budget and time, but then they make the decisions about what the games are going to be and how they’re going to make it. “This gives us a lot of flexibility. We can start projects and iterate on them very quickly. We can also decide to stop them quickly too. I’m really happy to fail as much as it takes until we’re feeling really comfortable and content with the games that we have. “We’re ready to fail a lot over the next year until we have games that we can be proud of pushing to our users.” The firm is one of many free-to-play specialists moving more resources into the mobile space, but Helioui is keen to stress that Bigpoint will continue to serve the browser and other markets that helped establish the company’s success. In fact, Bigpoint is currently working on its first client-based game. We’re ready to fail a lot over the next year until we have games that we can be proud of pushing to our users. “That’s what differentiates us,” Helioui said. “A lot of CEOs from other companies ask me why we’re not moving to 100 per cent mobile, why are we still doing client games. But we’re not speaking the same language. “My perspective is not platform-driven. I think if you come up with the best games possible, for whatever device or platform, you are bound to be successful. So when we start the development of a new game, when we have the concept or idea, we look at which audience we’re trying to target, which user interface is best suited to that game. “I think the reality is if you provide a great experience to gamers on tablets, the market is so massive right now that you can do extremely well.” Heliouli also says it’s a mistake to address as many platforms as possible: “What eventually happens is that the game is great on none of them. It’s not optimised for any of the platforms, and right now you cannot afford to compromise or settle on quality.” Following the acquisition of the Lyon studio, Bigpoint is currently on a recruitment drive for new designers, developers and artists to join the France-based team. Heliouli says the plan is to scale the studio, but not reach too big a headcount. Meanwhile, Bigpoint’s Hamburg studio has also been working on several prototypes and concepts for mobile games. The firm plans to release three to four titles for smartphones and tablets in 2015. About MCV Staff Check Also Kwalee logo Leamington-based Kwalee opens second studio in Bangalore From the sedate streets of Leamington Spa to the bustle of booming Bangalore – the …
{"cc_dump":"CC-MAIN-2020-24","dolma2_qc":{"0":0.994248271,"1":0.0057717697},"exact_duplicates":0,"lang":{"en":0.9675679207},"madlad":{"num_sentences":25,"rule.2":[],"rule.5":[3],"status":"survived"},"minhash":null,"original_word_count":608,"sa_remove_ranges":[],"text_hash":"186450045070580547512476391759703461281","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-05-26T12:37:45Z","warc_url":"https:\/\/www.mcvuk.com\/business-news\/mobile\/bigpoint-happy-to-fail-in-mobile-return\/","weborganizer":{"__label__art_and_design":0.0019977742,"__label__electronics_and_hardare":0.0014650631,"__label__entertainment":null,"__label__fashion_and_beauty":null,"__label__games":0.7549250126,"__label__home_and_hobbies":null,"__label__literature":null,"__label__social_life":null,"__label__software_development":0.069551751,"__label__sports_and_fitness":0.0013350223,"__label__crime_and_law":null,"__label__finance_and_business":0.1441588551,"__label__religion":null,"__label__software":0.006702851,"__label__travel_and_tourism":null,"__label__science_math_and_technology":0.0073558274,"__label__transportation":null,"__label__adult_content":null,"__label__history_and_geography":null,"__label__education_and_jobs":0.004765199,"__label__politics":0.0007654057,"__label__industrial":null,"__label__health":null,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
fed4456d9115b036ba29ad6185e44e06aab3cad1
using System; using System.Drawing; using System.Drawing.Imaging; using System.IO; using System.Web; using Logger; namespace Utilities { public class Thumbnail { //string ThumbFolderPath = "~/resource/thumb/"; public bool GenerateThumbnail(string fileName,string sourcedes,string filedes,int maxwidth) { double tile=0; int shtWidth=0; int shtHeight=0; try { //Get The Image From File Image OriginalImage = Image.FromFile(HttpContext.Current.Server.MapPath(sourcedes + fileName)); if (OriginalImage.Width >= OriginalImage.Height) { tile = OriginalImage.Width/(double)OriginalImage.Height; if (OriginalImage.Width > maxwidth) { shtWidth = maxwidth; } else { shtWidth = OriginalImage.Width; } shtHeight =Convert.ToInt32(shtWidth/tile); } else { tile = OriginalImage.Height / (double)OriginalImage.Width; if (OriginalImage.Width > maxwidth) shtWidth = maxwidth; else shtWidth = OriginalImage.Width; shtHeight =Convert.ToInt32(shtWidth*tile); } //OriginalImage.Save(HttpContext.Current.Server.MapPath(sourcedes + filedes)); //Create ITs Thumbnail Image ThumbImage = OriginalImage.GetThumbnailImage(shtWidth, shtHeight, null, new IntPtr()); //Store It in Thumbnail Folder ThumbImage.Save(HttpContext.Current.Server.MapPath(sourcedes + filedes)); ThumbImage.Dispose(); //ThumbImage.Save(HttpContext.Current.Server.MapPath(sourcedes + filedes), ImageFormat.Gif); return true; } catch(Exception ex) { Log.info("Exception GenerateThumbnail :" + ex.Message); return false; } } private bool saveImageAs(string fileName, string sourcedes, string filedes) { try { //Get The Image From File Image OriginalImage = Image.FromFile(HttpContext.Current.Server.MapPath(sourcedes + fileName)); OriginalImage.Save(HttpContext.Current.Server.MapPath(sourcedes + filedes)); return true; } catch (Exception ex) { Log.info("Exception saveImageAs :" + ex.Message); return false; } } public bool getGenerateThumbnail(string fileName, string sourcedes, int maxwidth) { double tile = 0; int shtWidth = 0; int shtHeight = 0; try { //Get The Image From File Image OriginalImage = Image.FromFile(HttpContext.Current.Server.MapPath(sourcedes + fileName)); if (OriginalImage.Width >= OriginalImage.Height) { tile = OriginalImage.Width / (double)OriginalImage.Height; if (OriginalImage.Width > maxwidth) { shtWidth = maxwidth; } else { shtWidth = OriginalImage.Width; } shtHeight = Convert.ToInt32(shtWidth / tile); } else { tile = OriginalImage.Height / (double)OriginalImage.Width; if (OriginalImage.Width > maxwidth) shtWidth = maxwidth; else shtWidth = OriginalImage.Width; shtHeight = Convert.ToInt32(shtWidth * tile); } Bitmap bitmap = new Bitmap(shtWidth, shtHeight); Graphics.FromImage(bitmap).DrawImage(OriginalImage, 0, 0, shtWidth, shtHeight); OriginalImage.Dispose(); bitmap.Save(HttpContext.Current.Server.MapPath(sourcedes + fileName)); bitmap.Dispose(); return true; } catch (Exception ex) { Log.info("Exception getGenerateThumbnail :" + ex.Message); return false; } } public bool ResizeImage(string strResourceFile, int intHeight, int intWidth) { Image image = Image.FromFile(strResourceFile); if ((image.Height > intHeight) || (image.Width > intWidth)) { float num = ((float)image.Height) / ((float)intHeight); float num2 = ((float)image.Width) / ((float)intWidth); int height = Math.Min(intHeight, image.Height); int width = (image.Width * height) / image.Height; if (num < num2) { width = Math.Min(intWidth, image.Width); height = (image.Height * width) / image.Width; } Bitmap bitmap = new Bitmap(width, height); Graphics.FromImage(bitmap).DrawImage(image, 0, 0, width, height); image.Dispose(); bitmap.Save(strResourceFile); bitmap.Dispose(); } return true; } } }
{"src_encoding":"UTF-8","length_bytes":5924,"detected_licenses":[],"int_score":3,"license_type":"no_license","score":2.765625,"repo_name":"computerline1z\/sstore-vn","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': 'fed4456d9115b036ba29ad6185e44e06aab3cad1', 'language': 'C#', 'repo_name': 'computerline1z\/sstore-vn', 'path': '\/Source code\/sourcecode 19.5\/Utilities\/Thumbnail.cs', 'src_encoding': 'UTF-8', 'length_bytes': 5924, 'score': 2.765625, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}","path":"\/Source code\/sourcecode 19.5\/Utilities\/Thumbnail.cs","language":"C#"}
null
null
null
36ccc059-30d1-4abd-a46a-339713e01829
Technical Ceramics Market – Trends and Forecasts to 2019 Asia-Pacific is the biggest as well as the fastest growing market for technical cer­amics, having a significant share of about 39,74 % of the total market in 2013. The market patterns of technical ceramics and its various products are continuously showing an upward trend which is mainly due to the increasing IT and electronics industries. China is the leading country and the fastest growing market in the region and also across the globe closely followed by USA in terms of consumption. Among various major product types of technical ceramics, monolithic ceramics dom­in­ates the market with nearly 66,20 % of the total technical ceramics market share in 2013. Ceramic matrix composite is another major product segment and is expected to grow significantly, from 2014 to 2019. Other product types of technical ceramics include ceramic coating which is also expected to grow at a considerable rate in coming years. This study aims to estimate the market of technical ceramics in 2013 in terms of volume and value and project its demand by 2019. This market research study provides a detailed qualitative and quantitative analysis of the technical ceramics market. It provides a comprehensive review of ­major market drivers, restraints, opportunities, winning imperatives, challenges, and key ­issues in the market. The market is further segmented and projected by regions Asia-Pacific, North America, Europe and  rest of the world, which are further segmented by key countries in each region. There have been used different secondary sources such as encyclopedia, directories, and databases to identify and collect information useful for this extensive commercial study of technical ceramics. The primary sources that include experts from related industries and suppliers have been interviewed to verify and collect critical information as well as to assess the future prospects of technical ceramics. It also includes the company profiling and competitive strategies adopted by various market players, including CoorsTek, Inc./US, CeramTec GmbH/DE, Kyocera Corporation/JP, Morgan Advanced Materials/GB, Saint-Gobain Ceramic Materials/US and others. This research report categorizes the market for technical ceramics on the basis of ma­ter­ials, products, end-user industry and region along with forecast of revenue and analyzing trends in each of the submarkets. The technical ceramics market is segmented on the basis of materials such as oxides and non-oxides technical ceramics. Furthermore it is segmented into different product types such as monolithic ceramics, ceramic matrix composites, ceramic coatings, and others. Each product type is further described in detail in the report with value forecasts between 2014 and 2019 period. The technical ceramics market is segmented on the basis of end-user industries that include electronics, automotive, energy and power, industrial, medical, military and defense and other end-user industries. The technical ceramics market is segmented by regions Asia-Pacific, North America, Eur­ope, and rest of the world; and they are further segmented by key countries in each region that include China, Japan, South Korea, India, USA, Germany, Great Britain, France, the Netherlands and Brazil. Phone: +49 7221 502 200 E-mail: info@goeller-verlag.de
{"cc_dump":"CC-MAIN-2024-10","dolma2_qc":{"0":0.9989249706,"1":0.0010950501},"exact_duplicates":0,"lang":{"en":0.9518021941},"madlad":{"num_sentences":20,"rule.2":[12],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":512,"sa_remove_ranges":[],"text_hash":"152538806948646314895734940040225640016","warc_content_type":"text\/html","warc_date":"2024-03-01T16:14:12.000Z","warc_url":"https:\/\/www.ceramic-applications.com\/technical-ceramics-market-trends-and-forecasts-to-2019\/","weborganizer":{"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.3345994651,"__label__food_and_dining":null,"__label__health":null,"__label__history_and_geography":null,"__label__industrial":0.74317801,"__label__politics":null,"__label__science_math_and_technology":0.1294127256,"__label__social_life":null,"__label__art_and_design":0.0159163941,"__label__education_and_jobs":0.0042087957,"__label__electronics_and_hardare":0.0222961847,"__label__home_and_hobbies":0.0028109273,"__label__transportation":0.006702851,"__label__travel_and_tourism":null,"__label__games":null,"__label__software":0.011697256,"__label__sports_and_fitness":null,"__label__literature":null,"__label__crime_and_law":null,"__label__software_development":0.0022618477,"__label__entertainment":null,"__label__religion":null},"weborganizer_max":"__label__industrial"}
null
null
null
null
null
null
58730abf-e995-486a-ac22-bca563696246
AWOL Soldier Returns on Veterans Day November 11, 2010 - 1:11 PM Nashville, Tenn. (AP) - AWOL soldier Jeff Hanks said he walked away from the Army in the middle of a deployment because his problems with anxiety and stress have been ignored. Now on Veterans Day, he's coming back to face the consequences. The 30-year-old Army infantryman said he has post-traumatic stress disorder that he has experienced since his 2008 tour in Iraq. He tried to seek treatment at Fort Campbell last month during his mid-tour leave from Afghanistan. When his commanders failed to help and told him he would have to immediately go back, he instead went home to North Carolina, he said. The specialist could face less-than-honorable discharge or jail when he turns himself in Thursday. "I have no problem going back to Afghanistan, but I need help," he said in a phone interview from his home in White Lake, N.C. Hanks said he chose to return on Veterans Day, usually reserved for honoring military service, because he didn't want to exceed 30 days of being AWOL and face the more serious charge of desertion. His actions and the timing are supported by Iraq Veterans Against the War. Hanks' unit command has discretion over what will happen to him when he turns himself in, but he could face a court-martial and jail time if convicted, Fort Campbell spokesman Rick Rzepka said. "AWOL and desertion is a self-centered act," Rzepka said. "It doesn't only affect the soldier, but in a time of war puts other soldiers at risk." Hanks said he understands that his actions could be considered disrespectful to other veterans, but said the military will continue to see high rates of suicide and substance abuse if it ignores soldiers' mental health problems. "It's funny that those people would say, 'Why do you have to bring this up on Veterans Day?'" Hanks said. "So when is a good time to bring it up?" Rates of desertion among Army soldiers increased 80 percent between 2003 and 2007, a time of repeated and extended deployments because of the wars in Iraq and Afghanistan. Hanks is part of the 101st Airborne Division, which has been deployed multiple times since 2002. On his second day in Iraq, Hanks' vehicle was struck by an improvised explosive device. He was rocked, but survived with no apparent injuries. He said he's more disturbed by seeing the aftermath of a car bomb outside his base in Balad that wounded many civilians, including a young Iraqi girl. "Ever since then, I think about her all the time," he said. "I have had a lot of bad dreams, just reliving it." When he returned from that tour, his wife, Christina, noticed that he was always on edge, looking around for IEDs and troubled by crowds at the local Walmart. During his Afghanistan leave, his family urged him to get help, but he told them he wanted to wait until he finished his deployment. As he was saying his goodbye to his wife in the airport, a loud noise set off a panic attack and he had to be treated at an emergency room. He returned to Fort Campbell to seek behavioral health treatment, but when he was referred for a meeting with a therapist, he said he was told by his commanders that they wanted him medically cleared to return to Afghanistan the next day. He spoke to a therapist for less than two minutes and was instructed to get marriage counseling when he came back. Fort Campbell officials would not discuss the specifics of Hanks' case because of privacy rules. Medical staff base their recommendations for deployment on the soldiers' conditions and their ability to perform duties safely, said Laura Boyd, a spokeswoman for Fort Campbell's Blanchfield Army Community Hospital. But unit commanders ultimately make the decision regarding whether a soldier deploys, she said. The stress has unsettled his marriage and his relationship with his children, Hanks said. "I found her and my daughters to be overwhelming," he said. "I just thought, 'I don't want to deal with this.'" He said he thought about seeking treatment when he returned from Iraq but was concerned about how his fellow soldiers would react. "Once you seek it, you're kind of an outcast," he said. "They will ridicule you." Hanks deployed to Afghanistan in May. He said he showed signs of a concussion and still suffers headaches after a mortar landed near him in August and he can't forget the sound of wounded soldiers screaming in agony as they waited for a medical evacuation. Hanks said he has never before been in trouble during his military career. Dr. Rebecca S. Valla, a civilian psychiatrist who volunteers with the Quaker House in North Carolina, said her assessment of Hanks is that he has post-traumatic stress disorder, a concussion and hearing loss. She said he could deteriorate if he returns to battle. "I know not getting on a plane to Afghanistan would have its consequences, but I felt like I had to do it because they have pushed me into a corner," he said. "My health and my family is more important to me than anything."
{"cc_dump":"CC-MAIN-2013-48","dolma2_qc":{"0":0.9982677102,"1":0.0017523585},"exact_duplicates":0,"lang":{"en":0.9915505052},"madlad":{"num_sentences":41,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":873,"sa_remove_ranges":[],"text_hash":"87900449906206350879034288002631192951","warc_content_type":"application\/http; msgtype=response","warc_date":"2013-12-19T14:23:21Z","warc_url":"http:\/\/cnsnews.com\/news\/article\/awol-soldier-returns-veterans-day","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":0.0023331624,"__label__finance_and_business":null,"__label__health":0.4073434174,"__label__politics":0.2628518641,"__label__science_math_and_technology":0.0069138384,"__label__social_life":0.0302245878,"__label__software":null,"__label__sports_and_fitness":0.0030853704,"__label__transportation":null,"__label__crime_and_law":0.1037586331,"__label__entertainment":0.0103381518,"__label__literature":0.0023331624,"__label__religion":null,"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__industrial":null,"__label__history_and_geography":0.0017646141,"__label__home_and_hobbies":null,"__label__food_and_dining":null,"__label__games":null,"__label__electronics_and_hardare":null,"__label__travel_and_tourism":null,"__label__software_development":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
9d16991a56419f460fbea3e0faf866e76271992f
# bittle A library for working with small and cheap bit sets and masks Masks keep track of usize indexes which are set through [testing][Mask::test]. This allows for masking indexes in certain operations. Like if you want to mask which channels in an audio buffer is in use or not. ## Examples ```rust fn test<M>(mask: M) where M: bittle::Mask { assert!(!mask.test(0)); assert!(mask.test(1)); } let mut set = bittle::BitSet::<u16>::empty(); set.set(1); test(&set); set.clear(1); assert_eq!(std::mem::size_of_val(&set), std::mem::size_of::<u16>()); ``` License: MIT/Apache-2.0
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '9d16991a56419f460fbea3e0faf866e76271992f', 'language': 'Markdown', 'repo_name': 'aethertap\/audio', 'path': '\/bittle\/README.md', 'src_encoding': 'UTF-8', 'length_bytes': 593, 'score': 3.234375, 'int_score': 3, 'detected_licenses': ['Apache-2.0', 'MIT'], 'license_type': 'permissive'}","path":"\/bittle\/README.md","repo_name":"aethertap\/audio","score":3.234375,"length_bytes":593,"license_type":"permissive","src_encoding":"UTF-8","language":"Markdown","detected_licenses":["Apache-2.0","MIT"],"int_score":3}
null
null
null
b4275502-6ff7-4e41-a136-c009186ad53b
OpenGridGym: An Open-Supply AI-Friendly Toolkit For Distribution Market Simulation Once market members are dominated by their feelings, comparable to worry, upset, ecstasy, and frustration, they inevitably cannot assist overreacting or even making unsuitable choices. Worth parity is a key figuring out consider making EVs successful in South Africa, notes Raine. In general, it’s always assumed that the risk of the market (in price) has been included inside the MG equation. 0, we do not get anything interesting from this equation. The economy in 1863 was starting to get higher. The neatest thing that a company could get from that is saving cash in producing brochures because they now use recycled materials. In addition, the incentive payments are often designed based on fashions of consumer habits or different advert-hoc guidelines which might be solely partially correct at best. In Appendix D, we test the performances of algorithms in markets with completely different heterogeneity of players’ preferences and find our CA-TS nonetheless reveals the perfect and probably the most strong performances. It has been demonstrated that the martingale condition can nonetheless be maintained if the potential satisfies some particular circumstances. On the other hand, when the vacuum is degenerate, then the identical symmetry is spontaneously damaged as a result of although the Hamiltonian annihilates the ground state (martingale condition), the momentum does not do it. Below the extraordinary definition of martingale, the connection between circulate of data and spontaneous symmetry breaking, is actual. The vacuum in the BS case came out to be single if there isn’t a move of information via the boundaries of the system. In these instances, it got here out that one of many symmetries involved had been good but the other one was spontaneously damaged on the whole, aside from some specific combination of parameters. These come out to be the identical conditions for which there isn’t a movement of knowledge via the boundaries of the system (Market), or equivalently, the identical conditions correspond to the cases the place the Hamiltonian becomes Hermitian. This case may be worked out instantly from the non-Hermitian Hamiltonian defined in eq. In eq. (41), we will see that all the phrases within the Hamiltonian can now be considered to be potential terms. This habits can be guarantee with an infinite potential barrier boundary situation imposed for the worth of the corresponding price. For the reason that kinetic phrases, expressed as a function of a Quantum Discipline, behave as potential terms; then their existence affects the vacuum location and behavior. In constructing neural-SDE market fashions, the neural networks act as function approximators to the drift and diffusion coefficients of the SDE, so as to give a versatile class of models. Within the proposed method, clusters of market variables are recognized such that the predicted output is a linear perform of the market variables, where the linear operate will depend on the cluster. As such, the econometric apply is that of developing properly-reasoned and economically motivated, important, mostly parametric, probabilistic models which are thoroughly examined validated, and back-tested following the ideas of statistical inference. Many firms nowadays are offering sanitizing services to their shoppers. That is the case as a result of the symmetries underneath time-translation usually are not spontaneously broken. In such a case we’ve got from eq. In any case, this consequence shows that for robust area approximation for each fields, related to the symmetries related to modifications in prices and volatility, it’s not doable to have a single vacuum condition related to both symmetries. Nevertheless, it is feasible to have an ideal vacuum situation after the simultaneous utility of both symmetries, specifically, the symmetries underneath modifications in the value plus the symmetries beneath modifications in volatility. The analysis has been performed for each, the BS equation in addition to for the case where the volatility is stochastic, particularly, for the MG equation. MG equation is defined because the market worth volatility risk because the upper its worth is, the lower is the intention of the traders to threat. This provides rise to systemic risk, which can be described as ‘the risk of the monetary system as a whole’ (Cao 2014, p. We can resolve the martingale condition in eq. This important detail about the Martingale situation deserves extra consideration. With their more efficient A15 processors, the iPhone 13, 13 Professional, and thirteen Professional Max have the longest battery life of Apple’s iPhones. This personal character makes the video’s viewers responsive from what you’ve got to specific inside. In some regimes (especially contained in the weak-discipline approximation), the kinetic terms in eq. Within the weak-field approximation, the kinetic terms are the most relevant. Most akin to our present work are efforts to speed up the answer of OPF by identifying sets of active constraints. The theorem additionally establishes the uniqueness of the answer within the category of fully monotonic inverse marginal (CMIM) features. Under mild assumptions, the consistency and asymptotic normality results of our estimation were established.
{"cc_dump":"CC-MAIN-2024-22","dolma2_qc":{"0":0.99578017,"1":0.0042397957},"exact_duplicates":2,"lang":{"en":0.9411353469},"madlad":{"num_sentences":39,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":837,"sa_remove_ranges":[],"text_hash":"87308809963433126374329088752973098375","warc_content_type":"text\/html","warc_date":"2024-05-29T10:39:29.000Z","warc_url":"https:\/\/yourrothiraguide.com\/opengridgym-an-open-supply-ai-friendly-toolkit-for-distribution-market-simulation-2\/","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__finance_and_business":0.1441588551,"__label__games":null,"__label__history_and_geography":null,"__label__home_and_hobbies":0.004765199,"__label__politics":null,"__label__science_math_and_technology":0.6513648629,"__label__transportation":0.0037172525,"__label__travel_and_tourism":null,"__label__art_and_design":0.0038344827,"__label__electronics_and_hardare":0.0109969424,"__label__health":0.0100235688,"__label__literature":null,"__label__software":0.0044783838,"__label__software_development":0.0078258887,"__label__entertainment":null,"__label__religion":null,"__label__fashion_and_beauty":null,"__label__social_life":null,"__label__industrial":0.0073558274,"__label__food_and_dining":null,"__label__adult_content":null,"__label__sports_and_fitness":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
9d00827fe2a52deb282654a6dc081ae76ec32db5
/** * */ package template.method; import java.io.BufferedReader; import java.io.IOException; /** * @author 정명성 * create date : 2016. 2. 12. * factory.method.BufferedReaderCallback.java */ public interface BufferedReaderCallback { Integer doSomethingWithReader(BufferedReader br) throws IOException; }
{"int_score":2,"license_type":"no_license","score":2.28125,"language":"Java","repo_name":"audtjddld\/pattern","detected_licenses":[],"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '9d00827fe2a52deb282654a6dc081ae76ec32db5', 'language': 'Java', 'repo_name': 'audtjddld\/pattern', 'path': '\/src\/main\/java\/template\/method\/BufferedReaderCallback.java', 'src_encoding': 'UTF-8', 'length_bytes': 319, 'score': 2.28125, 'int_score': 2, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":319,"src_encoding":"UTF-8","path":"\/src\/main\/java\/template\/method\/BufferedReaderCallback.java"}
null
null
null
bc0ddb9f-992b-4c64-a14b-7bb53f578383
11879 members The Man Behind Fischer's Crown “Since Bobby, when I first met him at age 11 stated he would be world chess champion,” he said, by way of explanation, “I believed it was my job as his friend and confidant to do everything legitimately in my power to ensure that the young player’s dream would come true.” Chess, the church and the Cold War: The life of Fr Bill Lombardy Former New York priest played a huge role in Bobby Fischer’s rise to world champion by Dave Hannigan For the most seismic showdown in chess history, the Soviet authorities assembled an extensive support network of 35 grandmasters to travel to Iceland. The brains trust was tasked with analysing every game, parsing each move, and providing wise counsel to Boris Spassky during breaks in play. At the height of the Cold War in July, 1972, with the whole world watching on, the Moscow regime wanted to afford their man every possible advantage. His opponent, America’s Bobby Fischer, arrived in Keflavik accompanied by a single second, a burly Catholic priest from the Bronx named Bill Lombardy. When Fischer wanted to leave in a huff after losing the first of the scheduled 24 games, exasperated outrage traditionally being his default setting, Lombardy ripped the wiring from his car so he had no transport to the airport, then feigned ignorance of why it wouldn’t start. As a man of the cloth, he wasn’t proud of the little white lie but he knew it served a higher purpose. “He passeth the piece that passeth all understanding,” warned the padre before, with others, persuading the irascible challenger to stay and battle for the title. Later, as Fischer gained the upper hand in the contest, Lombardy left the Laugardalsholl Arena in the middle of one particular game to go and say mass at a Reykjavik church. There is no suggestion that this divine intervention helped his man at the table although by then the Soviets had become so paranoid they were convinced the Americans used microwave signals and all sorts of nefarious tactics to put Spassky off. When the champion finally conceded defeat in a phone call, it fell to the priest to break the news of his triumph to Fischer. Chess, the church and the Cold War: The life of Fr Bill Lombardy
{"cc_dump":"CC-MAIN-2017-47","dolma2_qc":{"0":0.980212152,"1":0.0198078901},"exact_duplicates":0,"lang":{"en":0.9635039568},"madlad":{"num_sentences":11,"rule.2":[10],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":390,"sa_remove_ranges":[],"text_hash":"303541097685203110516420585934603816520","warc_content_type":"application\/http; msgtype=response","warc_date":"2017-11-21T23:15:21Z","warc_url":"https:\/\/www.themaven.net\/chessdailynews\/news\/the-man-behind-fischer-s-crown-D-Ft38d6vU6ga_Wh6cQIpQ","weborganizer":{"__label__adult_content":null,"__label__crime_and_law":0.0031826822,"__label__electronics_and_hardare":null,"__label__finance_and_business":null,"__label__games":0.2814156115,"__label__politics":0.0251888447,"__label__science_math_and_technology":null,"__label__software":null,"__label__software_development":null,"__label__sports_and_fitness":0.0071314299,"__label__history_and_geography":0.031153826,"__label__industrial":null,"__label__social_life":null,"__label__entertainment":0.0140736289,"__label__home_and_hobbies":null,"__label__religion":0.0083257789,"__label__art_and_design":0.002125703,"__label__education_and_jobs":null,"__label__fashion_and_beauty":null,"__label__literature":0.010662511,"__label__health":null,"__label__transportation":null,"__label__travel_and_tourism":0.0043415031,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
53e8a05c-e8d2-452c-ae50-1e8d39a2bd70
Since 1995 - Non Profit Healthcare Advice Do crooked teeth cause facial asymmetry? 08/15/2006 I`m 24 years old, i have crowded teeth, and my mouth looks crooked in relation to the rest of my face, but my lips by themselves look symmetrical. My lower jaw is deviated to the left, the midline of my chin is quite off to my left side. I had braces three years ago only on my top teeth to bring one of my canines down cause it was potruted (i have the same condition on my lower teeth) and bothered me when i smiled, they aren`t perfectly aligned, one of my incissors overlaps the other a little bit, but they do look a lot better than they did, but the midline of my top teeth doesn`t align perfectly to the bridge of my nose. The thing is that the midline of my lower teeth and chin is very off, and i`m wondering if this is because of my lower teeth being crooked, no crossbite is apparent, however it seems to me that they don`t fit like they should. I`ve been analizing photos of myself when i was younger, and it seems to have been gradual, i didn`t always have a crooked face, it seems to have started getting crooked when i was 12 or so. My jaw sometimes pops when i yawn and sometimes makes a grinding noise when i eat. Could my asymmetry be caused by my teeth, or does it sound more like it`s my entire jaw? Can it be fixed by getting braces so that my jaw has to sit at its proper alignment point? if so, will my cheeks and lips adapt to the new position or will my top-right lip look droopy? Well, you pose some interesting questions. One thing that caught my attention was that your asymmetry seemed to stem from when you were twelve. This would coincide with what we would call the start of the growth spurt, and it could be that one side of your lower jaw grew more than the other.  If this happened it could account for the lack of symmetry. This can be easily diagnosed by a radiograph, sometimes called a sub-mental vertex view.  It can be taken by an orthodontist by pointing the cone perpendicular to the plane of the lower jaw.  Yes, it can often be corrected by orthodontics (braces) but if very severe might require a combination of orthodontics and surgery.  In any event, you should consult with a trained orthodontic specialist.  If you need the name of one in your area, contact the American Association of Orthodontists at 1-800-424-2841. For more information: Go to the Braces health topic.
{"cc_dump":"CC-MAIN-2024-33","dolma2_qc":{"0":0.9773058295,"1":0.0227141995},"exact_duplicates":0,"lang":{"en":0.9658840299},"madlad":{"num_sentences":20,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":465,"sa_remove_ranges":[],"text_hash":"12809995974907156191164869651201953514","warc_content_type":"text\/html","warc_date":"2024-08-13T07:51:38.000Z","warc_url":"https:\/\/www.netwellness.org\/question.cfm\/41569.htm","weborganizer":{"__label__crime_and_law":null,"__label__entertainment":null,"__label__finance_and_business":0.0027249858,"__label__food_and_dining":null,"__label__health":0.9748311639,"__label__literature":null,"__label__politics":null,"__label__science_math_and_technology":0.0293222275,"__label__social_life":0.0030853704,"__label__software":0.0039554066,"__label__adult_content":null,"__label__education_and_jobs":null,"__label__history_and_geography":null,"__label__industrial":null,"__label__sports_and_fitness":0.0030853704,"__label__religion":0.0028109273,"__label__home_and_hobbies":null,"__label__electronics_and_hardare":0.0025609129,"__label__software_development":null,"__label__transportation":null,"__label__games":null,"__label__fashion_and_beauty":0.012831213,"__label__art_and_design":0.012831213,"__label__travel_and_tourism":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
8cc8c355-de0c-443a-aceb-c34ab8d586f5
Aaron Hursman Aaron Hursman is a user experience architect at Slalom Consulting. In this role, he applies user-centered design principles and techniques for his clients to various enterprise solutions like Microsoft SharePoint, ASP.NET, and dashboard and business intelligence applications. Hursman has over 11 years of consulting experience, has a background in web development and enterprise applications, and enjoys participating in the social web. Prior to joining Slalom, he was a user experience architect at Hitachi Consulting and lead consultant at Navigator Systems. Hursman holds a bachelor’s degree in business administration and management information systems from the University of Texas at Austin. He may be reached at http://aaron.hursman.com.
{"cc_dump":"CC-MAIN-2018-13","dolma2_qc":{"0":1.0000083447,"1":0.0000116993},"exact_duplicates":7,"lang":{"en":0.9312304258},"madlad":{"num_sentences":6,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":110,"sa_remove_ranges":[],"text_hash":"170559213270840301675842846216345553801","warc_content_type":"application\/http; msgtype=response","warc_date":"2018-03-20T06:02:08Z","warc_url":"https:\/\/www.employeebenefitadviser.com\/author\/aaron-hursman-im2000619","weborganizer":{"__label__education_and_jobs":0.0229873676,"__label__electronics_and_hardare":0.0015587612,"__label__entertainment":null,"__label__finance_and_business":0.1159707233,"__label__games":null,"__label__science_math_and_technology":0.000529305,"__label__social_life":0.0009797518,"__label__software":0.0446908623,"__label__software_development":0.8080772161,"__label__sports_and_fitness":null,"__label__fashion_and_beauty":null,"__label__health":null,"__label__home_and_hobbies":null,"__label__politics":null,"__label__transportation":null,"__label__art_and_design":0.0088573545,"__label__industrial":0.0021927168,"__label__travel_and_tourism":null,"__label__crime_and_law":0.0011087309,"__label__literature":null,"__label__food_and_dining":null,"__label__adult_content":null,"__label__history_and_geography":null,"__label__religion":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
20e0fce3-b12d-48ef-bf4e-3fa2ff253c0d
Revolutionizing Entertainment with Toy Redemption Machines in Gaming Bars There's nothing quite like the happiness of winning toys for yourself or your loved ones. No matter how many toys you buy, the ones you win by testing your luck and strategy always hold a special place. And what's the magic device behind this excitement? None other than the timeless classic—the toy redemption machine. It's like mini treasure chests filled with goodies at gaming bars. They're like those claw machines you see at arcades, but instead of just grabbing a toy, you play games to earn tickets, and then use those tickets to get prizes. It's a fun way to turn gaming skills into real-life rewards.  In the dynamic world of entertainment and retail, businesses are perpetually on the lookout for inventive methods to captivate audiences and enrich customer interactions. Among these, the toy redemption game is revolutionizing experiences in a multitude of establishments. This classic arcade attraction offers an engaging and unforgettable journey for participants of all ages. Its enduring appeal lies not just in the thrill of winning prizes, but in the memories forged and shared within the world of arcade entertainment.  Types Of Toy Redemption Machines  • Claw Machines: You've probably seen these before, they're the games where you control a claw to grab prizes like stuffed animals or toys. It's all about timing and precision to snag the prize you want. • Stacker Games: Ever tried stacking blocks at home? Stacker games are like that but with a twist. You stack blocks or objects on top of each other, and if you can stack them just right, you win a prize. • Pusher Games: Pusher games are arcade attractions where players use a moving platform to push coins or tokens off a ledge. The goal is to strategically time the movements to push the coins into designated winning areas. If successful, the player receives tickets or prizes as the coins fall. • Spin-the-Wheel Games: These are like the classic game shows you see on TV. You give a big wheel a spin, and depending on where it lands, you win different prizes or tickets. It's all about luck and hoping for that perfect spin. • Coin Drop Games: You drop coins into a machine and aim to land them in specific spots. If your coin lands just right, you can win cool prizes or tickets. It's simple yet super addictive. • Ball Drop Games: Imagine a grid with a bunch of pegs. You drop balls into the grid, and as they bounce around, you hope they land in the right spots to win prizes. It's all about watching and waiting to see where the balls end up.  Increased Revenue  Integrating a redemption machine into your arcade can significantly bolster your revenue streams. The appeal lies in the opportunity for players to win prizes, a magnet for drawing them back repeatedly and encouraging them to spend more during each visit. By offering a machine adorned with vibrant lights and an enticing array of prizes, you create an immersive experience that captivates patrons and keeps them engaged for longer periods. This sustained engagement translates into increased profits for your arcade, as players eagerly accumulate tickets in pursuit of their desired rewards. Thus, the redemption machine becomes not only a source of entertainment but also a key driver of financial success within your establishment.  Fun For All Ages  The redemption machine is one of those rare gems that brings people of all ages together. It doesn't matter if you're a kid dreaming of winning a cool prize or an adult looking to relive some fond memories – there's something special about trying your luck at the machine. Families bond over the excitement of playing, friends challenge each other to see who can win the most tickets, and even grandparents join in on the fun, sharing stories from their own arcade days. It leaves us with memories to cherish for years to come.  Thrilling Experience  The claw grip or prize wheel mechanics in toy redemption games inject a thrilling sense of challenge into the gaming experience. Skilfully moving the claw to grab a prize or spinning the wheel in hopes of landing on a jackpot creates an exciting rush that keeps players on the edge of their seats. It's the perfect blend of skill and perhaps a touch of luck that adds to the fun. And it's this adrenaline rush that keeps players engaged and hungry for the next challenge and the chance to win big.  Variety In Prize  It can accommodate a diverse range of prizes to suit every taste and preference. From cute plush toys and trendy gadgets to quirky trinkets and beyond, there's an extensive selection that caters to a wide range of interests and ages. Kids or youngsters with a penchant for stuffed animals or candies, tech enthusiasts eager for the latest gadgets, or those who like quirky collectibles, all find something interesting to win. It's this abundance of choices that adds to the fun of this game.  Operational Efficiency  By implementing redemption machines that require minimal staff intervention, arcade operators can efficiently manage their arcade floors. This allows them to allocate resources to other critical aspects of their business, such as customer service, game maintenance, and marketing. With automated redemption systems, staff can focus on enhancing the overall arcade experience, which can lead to increased customer satisfaction and profitability.  Customer Satisfaction  Customers find immense satisfaction in the thrill of winning tickets and exchanging them for prizes when playing toy redemption games. This excitement leaves them feeling fulfilled but also creates a desire to return for more gaming fun. It's the anticipation of what prizes await, and the overall enjoyable experience that keeps customers coming back for more.  Brand Differentiation  In a sea of gaming bars boasting video games and virtual reality experiences, toy redemption games offer a refreshing twist that can set your establishment apart. Emphasizing the unique appeal of redemption machines can give your arcade a distinctive edge in a competitive industry. These games add a nostalgic touch and interactive fun that resonates with a broad audience, from families to adults seeking a blast from the past. By incorporating toy redemption games, you not only diversify your gaming offerings but also create a memorable experience for your patrons. This differentiation attracts new customers and also fosters loyalty among existing ones.  Social Interaction  This type of game encourages players to collaborate, compete, and celebrate together. Unlike solitary video games, these toy redemption games often involve multiple players engaging in friendly competition or working together to achieve a common goal. This creates opportunities for bonding, laughter, and camaraderie among friends, family members, or even strangers. Additionally, the excitement of earning tickets and redeeming prizes sparks conversations and interactions, as players share strategies, congratulate each other on successes, and celebrate victories together.  Pankour Vending is your go-to partner for premium toy redemption game machines! With a wide range of cutting-edge arcade solutions, our company is dedicated to helping businesses thrive in the competitive entertainment industry. Our state-of-the-art machines boast eye-catching designs and robust construction for maximum durability and customer engagement. [time], from [location] The cookie settings on this website are set to 'allow all cookies' to give you the very best experience. Please click Accept Cookies to continue to use the site. You have successfully subscribed! This email has been registered
{"cc_dump":"CC-MAIN-2024-51","dolma2_qc":{"0":0.0189117789,"1":0.9811083078},"exact_duplicates":2,"lang":{"en":0.9302524924},"madlad":{"num_sentences":67,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":1236,"sa_remove_ranges":[],"text_hash":"279276731789073613483242430493460982849","warc_content_type":"text\/html","warc_date":"2024-12-06T18:56:37.000Z","warc_url":"https:\/\/www.pankourvending.com\/blogs\/news\/revolutionizing-entertainment-with-toy-redemption-machines-in-gaming-bars","weborganizer":{"__label__adult_content":0.0021927168,"__label__crime_and_law":null,"__label__entertainment":0.005394937,"__label__games":0.9790457487,"__label__history_and_geography":null,"__label__home_and_hobbies":0.0046195714,"__label__literature":null,"__label__politics":null,"__label__science_math_and_technology":null,"__label__sports_and_fitness":null,"__label__art_and_design":0.0014203583,"__label__health":null,"__label__social_life":0.003603603,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0080719916,"__label__software":0.0019977742,"__label__software_development":0.0019367349,"__label__travel_and_tourism":0.0040801377,"__label__fashion_and_beauty":null,"__label__religion":null,"__label__transportation":null,"__label__industrial":null,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
f3bedd1b-8f3f-423d-b6be-1f3c4bf608db
My Stake Logo My Stake Logo PNG My Stake stands as an avant-garde platform in the realms of digital gambling, pioneering the integration of cryptocurrency in the casino and sports wagering ecosystem. This innovative portal offers a diverse array of gaming experiences, catering to enthusiasts of strategic casino table games, the dynamic thrills of sports betting, and the cutting-edge domain of eSports. Recognized for its pioneering use of blockchain technology, My Stake facilitates secure and speedy transactions, establishing itself as a hub for crypto-savvy gamblers. With its inception in the late 2010s, the brand has steadily ascended as a trusted name, assuring players of a transparent and fair gaming environment through stringent regulatory compliance and robust encryption protocols. Meaning and history Launched in the year marking the end of the 2010s, My Stake emerged as a trailblazer in the realm of cryptocurrency gaming. With authorization from Curacao’s governing bodies, the platform is a brainchild of the Cyprus-registered OnyxioN B.V. It rapidly carved a niche in the digital gaming sphere, boasting a vast trove of 6,500+ diversely-themed games, including virtual sports, immersive live casino experiences, and comprehensive sportsbooks. The portal not only rides the cryptocurrency wave but also champions it, offering a variety of digital currencies to facilitate secure transactions. Ingrained with a deep-rooted ethic of ensuring participant security, My Stake employs cutting-edge SSL encryption coupled with stringent policies to promote responsible gaming. As it strides forward, its reputation for trustworthiness and a player-centric approach continues to attract and retain a dedicated following within the cryptocurrency community. The visual identity of “My Stake” is distinguished by an emblem that blends playfulness with a contemporary flair. The script of “My Stake” unfurls with smooth, voluptuous contours that capture a sense of nimbleness and modern spirit. “My” is portrayed in a gentle hue, softly contrasting with the more pronounced and bold “Stake.” The logo adopts a range of blues.
{"cc_dump":"CC-MAIN-2024-26","dolma2_qc":{"0":0.145028308,"1":0.8549916744},"exact_duplicates":1,"lang":{"en":0.9208987355},"madlad":{"num_sentences":13,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":326,"sa_remove_ranges":[],"text_hash":"102822393763684337529038487026286029675","warc_content_type":"text\/html","warc_date":"2024-06-18T04:28:09.000Z","warc_url":"https:\/\/1000logos.net\/my-stake-logo\/","weborganizer":{"__label__education_and_jobs":null,"__label__finance_and_business":0.0737062693,"__label__games":0.4301573634,"__label__history_and_geography":null,"__label__religion":null,"__label__science_math_and_technology":0.0061075627,"__label__software":0.003603603,"__label__software_development":0.0024826226,"__label__transportation":null,"__label__travel_and_tourism":0.0012165896,"__label__adult_content":null,"__label__electronics_and_hardare":0.0029910326,"__label__entertainment":null,"__label__social_life":null,"__label__crime_and_law":null,"__label__sports_and_fitness":null,"__label__politics":null,"__label__art_and_design":0.0023331624,"__label__home_and_hobbies":null,"__label__literature":0.0011795105,"__label__health":null,"__label__fashion_and_beauty":0.001042231,"__label__industrial":null,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
ab2f1ffc-5b83-4401-b201-15198ae464de
Police fatally shoot would be carjacker FRANCISTOWN: An unknown man who had stolen a mini-bus was fatally shot at Bisoli veterinary gate. On Wednesday night, videos circulated on social media with clips of local law enforcement officers shooting an unknown violent man who was also seen hurling stones. Confirming the incident, Botswana Police Service (BPS) Deputy Public relations Officer Senior Superintendent, Near Bagali said that they are in the process of identifying an unknown man who was fatally shot by the law enforcement officers. He also said that the incident happened on Wednesday evening. Speaking about what transpired, Bagali said there was a report of a stolen minibus at Francistown police station earlier before the fatal incident. Based on the report, the stolen mini-bus was seen travelling along the A1 towards the north. Bagali said an alert was then issued so that the police on duty at the Veterinary gate would be able to identify the stolen minibus when passing by. He stated that the minibus that matched the description of the stolen one arrived at a rapid speed shortly after the police received the report. A police officer pulled over the car and ordered the driver out, but the suspect pulled out a knife and threatened the officer, he explained. "As the police officer continued to move forward, the man began to hit the officer with stones. Additionally, he was brandishing a wooden pick handle and making threats of damage," he stated. The BPS deputy PR officer stated that after realising the subject posed a threat and that they needed to disarm him, the law enforcement personnel began shooting warning bullets. He alleged that the suspect continued to throw stones instead of stopping. In an attempt to stop the situation, the law enforcement officers shot the suspect. Bagali stated that one of the law enforcement personnel was also injured during the shootout. He added that upon arrival at the Nyangabgwe Referral Hospital (NHR), the suspect was declared dead while the injured officer was still admitted in hospital but in a very stable condition. He reported that the deceased man's body is still at the NRH mortuary, where investigators are still attempting to identify the deceased and find out details about his past. Bagali added that while the investigation is ongoing, they were able to locate the owner of the stolen minibu
{"cc_dump":"CC-MAIN-2023-50","dolma2_qc":{"0":0.4964676201,"1":0.5035524368},"exact_duplicates":0,"lang":{"en":0.9790452719},"madlad":{"num_sentences":23,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":482,"sa_remove_ranges":[[2385,2936]],"text_hash":"336814131258962547464313440589233111121","warc_content_type":"text\/html","warc_date":"2023-11-29T14:11:08.000Z","warc_url":"https:\/\/www.mmegi.bw\/news\/police-fatally-shoot-would-be-carjacker\/news","weborganizer":{"__label__crime_and_law":1.0000100136,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__finance_and_business":null,"__label__food_and_dining":null,"__label__history_and_geography":0.0009797518,"__label__home_and_hobbies":0.00001,"__label__science_math_and_technology":0.0004405571,"__label__software":null,"__label__sports_and_fitness":0.00001,"__label__adult_content":0.0005627787,"__label__entertainment":null,"__label__health":null,"__label__literature":null,"__label__politics":0.0008930459,"__label__social_life":0.00001,"__label__art_and_design":null,"__label__industrial":0.00001,"__label__fashion_and_beauty":0.00001,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__religion":null,"__label__software_development":null,"__label__games":null},"weborganizer_max":"__label__crime_and_law"}
null
null
null
null
null
null
c5b737fa-6edc-4179-a7d2-a4c704c146e9
Johnny Dee Love Compilation Format: CD Label: Vinyl Japan Price: $14.95 add to cart. Description: This Japanese group fuses breezy male vocals with jangly and jazzy masterful guitar-pickings reminiscent of Johnny Marr and Max Eider at their heights! Includes nice cover of the Go-Betweens' "Bachelor Kisses." Everything on this disc is pretty much perfect! Recommended! Track listing: 1. "Theme For Johnny Dee" 2. "When My Heart Goes Wild" 3. "Good Bye Flip Flap Guitar" 4. "Why I Like Max Eider (Part. 1)" 5. "Blue Girl From North Town" 6. "A Day In Waterloo" 7. "Hey, Gentle Girl" 8. "Bachelor Kisses" 9. "So What !" 10. "Why I Like Max Eider (Part. 3)" return to quick index visit twee kitten web store.
{"cc_dump":"CC-MAIN-2017-47","dolma2_qc":{"0":0.9922351837,"1":0.0077848625},"exact_duplicates":0,"lang":{"en":0.8325693607},"madlad":{"num_sentences":17,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":122,"sa_remove_ranges":[],"text_hash":"66421541847415545998615874179142081718","warc_content_type":"application\/http; msgtype=response","warc_date":"2017-11-18T12:03:40Z","warc_url":"http:\/\/www.tweekitten.com\/indexes\/other-1655.html","weborganizer":{"__label__crime_and_law":null,"__label__entertainment":1.0000100136,"__label__games":0.004765199,"__label__history_and_geography":null,"__label__home_and_hobbies":0.0203423519,"__label__industrial":null,"__label__literature":0.0020607433,"__label__politics":null,"__label__science_math_and_technology":null,"__label__transportation":null,"__label__art_and_design":0.0006978512,"__label__religion":null,"__label__social_life":0.0007654057,"__label__sports_and_fitness":null,"__label__adult_content":0.004765199,"__label__electronics_and_hardare":null,"__label__software":null,"__label__travel_and_tourism":0.0005627787,"__label__fashion_and_beauty":0.0025609129,"__label__finance_and_business":0.0007421814,"__label__food_and_dining":null,"__label__health":null,"__label__software_development":null,"__label__education_and_jobs":null},"weborganizer_max":"__label__entertainment"}
null
null
null
null
null
null
931d5cbb-e69d-4738-ba6d-5fedde92b9ff
Probing Macro-Scale Gas Motions and Turbulence in Diffuse Cosmic Plasmas 14 Mar 2019  ·  Bulbul Esra, Gaspari Massimo, Alvarez Gabriella, Avestruz Camille, Bautz Mark, Benson Brad, Biffi Veronica, Burke Douglas, Clerc Nicolas, Chadayammuri Urmila, Churazov Eugene, Cucchetti Edoardo, Eckert Dominique, Ettori Stefano, Forman Bill, Gastaldello Fabio, Ghirardini Vittorio, Kraft Ralph, Markevitch Maxim, McDonald Mike, Miller Eric, Mroczkowski Tony, Nagai Daisuke, Nulsen Paul, Pratt Gabriel W., Randall Scott, Reiprich Thomas, Roncarelli Mauro, Simionescu Aurora, Smith Randall, Tremblay Grant, Walker Stephen, Zhuravleva Irina, ZuHone John · Clusters of galaxies, the largest collapsed structures in the Universe, are located at the intersection of extended filaments of baryons and dark matter. Cosmological accretion onto clusters through large scale filaments adds material at cluster outskirts... Kinetic energy in the form of bulk motions and turbulence due to this accretion provides a form of pressure support against gravity, supplemental to thermal pressure. Significant amount of non-thermal pressure support could bias cluster masses derived assuming hydrostatic equilibrium, the primary proxy for cluster cosmology studies. Sensitive measurements of Doppler broadening and shift of astrophysical lines, and the relative fluctuations in thermodynamical quantities (e.g., density, pressure, and entropy) are primary diagnostic tools. Forthcoming planned and proposed X-ray (with large etendue, throughput, and high spectral resolution) and SZ observatories will provide crucial information on the assembly and virialisation processes of clusters, involving turbulent eddies cascading at various spatial scales and larger gas bulk motions in their external regions to the depth or their potential wells. read more PDF Abstract No code implementations yet. Submit your code now Cosmology and Nongalactic Astrophysics
{"cc_dump":"CC-MAIN-2021-31","dolma2_qc":{"0":0.9967592955,"1":0.0032607249},"exact_duplicates":0,"lang":{"en":0.7972138524},"madlad":{"num_sentences":8,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":263,"sa_remove_ranges":[],"text_hash":"112684900272001359790449461716858388119","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-07-30T05:02:53Z","warc_url":"https:\/\/astro.paperswithcode.com\/paper\/probing-macro-scale-gas-motions-and","weborganizer":{"__label__art_and_design":0.0026416746,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__entertainment":null,"__label__finance_and_business":0.0032830648,"__label__history_and_geography":0.0013350223,"__label__home_and_hobbies":null,"__label__industrial":0.010662511,"__label__literature":0.0073558274,"__label__science_math_and_technology":0.9525841475,"__label__crime_and_law":null,"__label__games":null,"__label__health":0.0080719916,"__label__software":null,"__label__food_and_dining":null,"__label__politics":null,"__label__sports_and_fitness":0.0038344827,"__label__travel_and_tourism":null,"__label__transportation":null,"__label__software_development":0.0014203583,"__label__adult_content":null,"__label__social_life":null,"__label__religion":0.0013350223,"__label__fashion_and_beauty":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
2088eb2f-5b37-4d0d-b846-78ff3e730c08
Follow TV Tropes Apocalypse How / Class 1 Go To Apocalypse How 0 | 1 | 2 | 3a, 3b | 4 | 5 | 6 X | X-2 | X-3 | X-4 | X-5 | Z "World governments are in pieces. The parts that are still working are trying to take a census. And it looks like he did — he did exactly what he said he was gonna do. Thanos wiped out fifty percent of all living creatures." Natasha Romanoff, Avengers: Endgame Planetary-scale Civilization Disruption. A lot of people die, but civilization is still surviving in a reduced state.     open/close all folders      Multiple Media  • Generally, the more extreme portrayals of World War III are going to have this as a minimum outcome.     Anime & Manga  • Attack on Titan: The Rumbling is a 1.5 — 80% of the global population outside of Paradis Island is killed off, bringing civilization down to the same level as those in the island (i.e. an 18th-century country compared to the mid-20th century civilization the rest of the world was in). • Danganronpa 3: The End of Hope's Peak High School covers the events that lead to the current state of the world in the games. Thanks to the machinations of Junko Enoshima at Hope's Peak, society collapsed in on itself, creating a Villain World of despair and suffering. The Future Foundation works to stabilize everything, though only by the very end does the Tragedy finally come to its conclusion and humanity can begin to repair itself. • Trunks' Bad Future from Dragon Ball Z, devastated by the Androids. King Piccolo's conquest of Earth 300 years prior to the series also amounts to this. • According to Kouta in Elfen Lied's final chapter, the recent war with the Diclonii was a Class 1, with the bulk of the human race obliterated, but on the road to recovery, although it's likely the human infighting in the wake of the war will drive this into the Class 3 range with mankind truly becoming extinct. The Diclonii themselves suffer their own Class 3 extinction event with possibly three surviving Diclonii at best — all sterile. (Of course, their population was always much smaller than humans' to begin with.) • GaoGaiGar FINAL shows an apocalypse between Class 1 and Class 2 due to the actions of the Sol Masters trying to steal all the Dark Matter in the universe. Hundreds of well-known cities are in ruins, the ice caps melted, and there were apparently a lot of casualties. However, it seems civilization and humanity will definitely bounce back after a few months to years! All because of Courage! • The ten-year Time Skip in Getter Robo Armageddon has humanity ravaged by the Invaders after a hydrogen bomb combined with Shin Dragon's Getter Beam saturates the Earth with Getter Energy, allowing the beasts to roam free. • Heat Guy J: As explained in a Breaking Speech given by Clair, the people of Earth got a hold of the Applied Phlebotinum of the resident Superior Species. That was fine, until they started using said phlebotinum for war, and most of the population of Earth was wiped out, save for a few hundred-thousand people, who now live in seven isolated city-states (and some small towns/villages surrounding them.) • In My Hero Academia, it's strongly implied that something on this scale happened shortly after the appearance of Quirks, due to the rise of powerful supervillains and the comparative lack of superheroes (and lack of regulation governing what few heroes there were) to fight them. A short 'dark age' at this point in time is often cited as the reason why the world of My Hero Academia is not significantly more technologically advanced than the modern day despite being indicated to take place at least a century in the future. • The Second Impact in the backstory of Neon Genesis Evangelion, which killed over half of the Earth's population, rose the sea level enough to submerge entire cities and heavily altered the climate. By the time the series proper begins, civilization has gotten back on its feet in some places, but the almost complete emptiness of Toyko-3, the city the series is set in, is heavily emphasized during the series. The Rebuild movies further drive the point home that life, human or animal, can only be sustained in controlled environments after the impact. • This is revealed to be the case in Now and Then, Here and There. Shu is not Trapped in Another World that is a desert planet, he's actually been transported 10 billion years into the future where the sun is in the red giant phase of going supernova, evaporating almost all of the surface water on the planet, leading society to dissolve into disparate desert towns that are raided by a local tyrant who amassed power by using child soldiers. • Earth at the start of Space Battleship Yamato is this, verging on class 4. Humanity is barely hanging on to underground cities, with the surface uninhabitable. • Earth after the Zentraedi attack in Super Dimension Fortress Macross/Robotech is around a 1.5: while most of humanity is killed off by a brutal orbital bombing, the survivors and the residents of the SDF-1 were able to repopulate though the help of cloning (which at one point accounted for more than 90% of the human population). Humanity also has plenty of advanced technology acquired from alien sources, and civilization is shown to recover both in the later Macross series such as Macross Plus, and in the Masters and New Generation seasons of Robotech (which were dubbed versions of Super Dimension Cavalry Southern Cross and Genesis Climber MOSPEADA respectively). In fact, thanks to the capture of several automated factory satellites from the Zentradi, humanity in Macross advances far faster after the catastrophe than it did before it, though civilization on Earth itself still takes some years to recover from the devastation.     Comic Books  • In Crimson, dragons are unleashed all over the world thanks to the Big Bad's manipulations when their king is released from prison and they provoke untold devastation. Lisseth's plan was to Kill All Humans just so she could escalate to a Class X-4 apocalypse level, but thanks to the heroes' efforts, they are able to stop her and put the disaster on this level, since humanity is shown to recover and rebuild after the incident. • The appearance of Eight Billion Genies granting a wish to every person throws Earth into a Class 1 Apocalypse almost immediately, as people's ill-thought out wishes lead to enormous death and destruction. Nearly two billion people, a quarter of the population, die within eight days of the genies' arrival. A large part of the U.S. has been covered by a tarp labeled "Dougland", South America is a barren wasteland, and the planet has a chunk bitten out of it by the moon. And this is before the World-Wrecking Wave that throws it into a Class 3... • Part of the backstory of the Post-Rapture graphic novel, Therefore, Repent!. • At the start of Transformers: Twilight's Last Gleaming, the United States has suffered a Continental case at the Decepticons' hands since the Cons won the battle for the Allspark in Mission City. NATO troops have to temporarily occupy the continent for security reasons, and whilst an American government is still functioning, millions are living in shelters and reliant on food aid.     Fan Works  • In At the Edge of Lasg'len, 90 percent of humanity is wiped out due to an engineered plague. The only nation to survive intact is Iceland, which escaped it due to a very conveniently-timed volcanic eruption. The only other two settlements to retain functional civilization are Galway and Eryn Lasgalen, both of which had advanced warning. • Becoming a True Invader: Vort is heavily devastated when the Employer's army invades while making its way to Irk, but afterwards Crax is able to take control of the survivors with an intent to rebuild. • Played for Laughs in Calvin & Hobbes: The Series, as a panicking Calvin claims Socrates' secret prank will cause this. • In I Am What I Am, this occurs in Xanders' future. Hundreds of portals opened all over the world, allowing millions of demons to enter the Earth and resulting in The Unmasked World. The new Watchers Council, leading the empowered Slayers gathers its forces and starts to close the portals and then joins forces with the world militaries to force the demons back. It takes months for all the portals to be closed, but by then the demon population had increased massively. While the Protectors of Humanity would keep most demons at bay, nightlife outside of a Settlement, which were newly built cities some of them the size of US statesnote , is very dangerous as its compared to life in Sunnydale, with a sixty percent chance of dying from something other than natural causes. • Kimi No Na Iowa: The abyssals' stated goal, the genocide of Japan and the USA, combines this with Regional Species Extinction. The death of almost half a billion is, from a purely numerical perspective, definitely survivable for humanity, but the cultural, economic and scientific losses will continue to be felt for years if not decades to come, to say nothing of the security implications of America ceasing to exist as world policeman. The addition of the other nations named in the Villain Song in Chapter 31 — Russia, the UK, China, India, and Australia — if they refuse to kowtow to the abyssals and help destroy Japan would elevate the damage to the equivalent of Continental Species Extinction if not low-level Planetary Societal Collapse. While the death of around 3 billion still leaves half of humanity alive, enough survivors to meet minimum viable population and avoid inbreeding and genetic drift, the loss of China alone and its leading industrial capacity would put the rest of the world in a bad place or even outright regress it, never mind the destruction of the other named nations. By this point, what else the abyssals have hit, including much of Western Europe and Southeast Asia, is merely an ugly cherry on top. • In Tokimeki PokéLive! and TwinBee, Aleena reveals in "Prophecy of Failure!?" that outside of northern places in Canada, Siberia and Greenland and presumably southerly places like New Zealand and West Antarctica, civilization has collapsed due to Global Warming and wars for limited resources are the norm. • With This Ring: Earth 16 encounters quite a lot of events that cause wide-scale disruption, but a global Anti-Life infection really takes the prize for bringing the wheels of society to a halt. Large numbers of people across the world just give up and die, local leaders and even the Justice League become dictators to keep some semblance of order, and regular services are essentially on hold because no one is operating them. Mister Atom, it turns out, is primarily concerned about the fact that his newspaper hasn't been delivered.     Film — Animation  • In WALLE, Earth has become an uninhabitable trash dump, but it appears that most of humanity fled on cruise ships. We don't have a lot of information about the disaster preceding the exodus from Earth — including the percentage of Earth's population that escaped into ships. It seems that a decaying form of civilization exists on the Axiom and sister ships, but from the perspective of Earth, it's a Class 4.     Film — Live-Action  • Thanos — the MCU's Greater-Scope Villain — faces off against the Avengers in Avengers: Infinity War in an attempt to destroy half of all life in the universe using the Infinity Stones, with the goal of saving the other half by reducing consumption of finite resources. Basically this level applied to every planet in the universe. Avengers: Endgame shows the aftermath, not only from the consequences of the deaths themselves, but the traumatization of the survivors. One gets the implication that it could have slid into total collapse without the Avengers doing all they can to help the world hold together. Most of the planets in the universe don't have that, with Captain Marvel trying to pick up the slack on her own. • In Children of Men, humanity is slowly going extinct due to a combination of universal infertility and the resulting societal collapse everywhere in the world but the United Kingdom, which is now fascist. Class 3 is not entirely ruled out. • Contagion (2011) involves a worldwide pandemic that spreads about as easily as the flu and kills about a fifth of the people infected. The US government survives, but things get pretty rough for a while. • In The Day After Tomorrow, the Northern Hemisphere has been caught in a sudden Ice Age. Millions of people are instantly frozen to death and survivors flee to Southern countries. • Escape from L.A.: Though it doesn't involve anyone actually dying, Snake activates the Sword of Damocles satellite system at the end of the movie, unleashing a massive electromagnetic pulse that neutralizes every electrical power source on the entire planet, thereby (according to the President's Dragon, at least) setting the progress of human civilization back about 500 years, leading to the deaths of thousands, if not millions, indirectly as a result of entire cities shut down. • Exam takes place after a global pandemic wipes out a large amount of the Earth's population. • In Independence Day, most major cities are destroyed, but it seems humanity will survive... though it's debatable whether an Inferred Holocaust has occurred, which would knock this film into the Class 2 range. Resurgence which takes place 20 years later confirms that the humans used the Alien technology recovered from the City Destroyers to rebuild their civilization. • Independence Day: Resurgence: The moon-sized Harvester ship apparently causes the rebuilt human civilization to suffer yet another one, this time due to the ship uprooting entire cities throughout Asia and the Middle East before causing the debris to rain on Europe as it passes over, and annihilating Europe and the East Coast with its landing. • Interstellar: Earth has suffered a Class 1 which is ongoing and forecasted to lead into a Class 5 minimum, as a micro-organism called the Blight is gradually consuming all the crops and breathable atmosphere gases on Earth. When the film starts, most governmental and military organizations have disbanded just to ensure there's enough farmers in the world to farm what few consumable crops remain on Earth. • No Blade of Grass: A new strain of blight strikes all members of the grass family, causing widespread famine that, in combination with numerous failed attempts to contain the plague, leads to hundreds of millions of deaths worldwide. • Reminiscence: There is mass flooding across the Earth, and while society is still intact, it has to live by night to cope with extreme temperatures in the day. Could slide into Class 2 or Class 3a. • In Star Trek: First Contact, we see Earth just after World War III. Suffice to say, Vulcans were very surprised that humans could develop FTL under such conditions. • While the Yellowstone eruption itself only causes physical destruction on a continental scale in Supervolcano, the volcanic winter causes a global societal disruption due to massive crop failures. It's by no means the end of the world, but humanity is going to have a rough several decades. • In Time of the Wolf, humanity is in dire straits, although it's never fully explained why. The audience only knows that the infrastructure has collapsed, uncontaminated water is scarce, and livestock have to be burned. A nuclear disaster is likely. May be considered a Class 2. • The War of the Worlds (1953): The Martian machines wipe out an untold number of people around the world. • In Blood Music, artificially enhanced lymphocytes gain intelligence and spread quickly across the entire North American continent, converting all biomass into more entities like themselves. (Although they are capable of encoding and converting intelligences into their cellular-level versions, so nobody strictly "dies" during the epidemic.) After the incident resolves itself, North America has been wiped clean and humanity in the rest of the world is trying to adjust to new laws of physics. The intelligences in North America caused the laws of physics to fracture slightly due to the density of observation causing the laws of physics unable to follow their own rules. Surprisingly this is not Applied Phlebotinum, there are real scientific theories behind such an event, as unlikely as it is to ever occur. Think of a well-regarded theory such as Heinsenberg's Uncertainty Principle which implies that, for any given particle, you can know its position or velocity, but never both, as an observation of one will affect, and therefore prevent observation of the other. Now imagine that someone develops the technology to accurately observe and record both. There is some uncertainty (no pun intended) as to what might actually happen to the observed particle at this point. • In Caliphate, a nuclear attack on the United States by Islamic terrorists doesn't cause the USA to collapse, but leads to an autocratic President rising to power, declaring war on the Islamic world in retaliation by nuking all Muslim-majority countries in the world. This causes a chain of events that establish a tyrannical caliphate in Western Europe with an influx of radicalized refugees overthrowing liberal societies and implementing sharia law. In response, most countries follow the USA suit by becoming isolationist fascist regimes and by the time the main narrative takes place, natural resources have been mostly used up and the world stands ever closer to falling into a Class 2 Apocalypse. • In the "An Orison of Sonmi-451" segment of Cloud Atlas a series of limited nuclear exchanges has left much of the planet as "deadland" but East and Central Asia still maintain a high level of technology, even though it's an oppressive corporate dystopia. In the next segment, "Sloosha's Crossin' and Evr'thin' That Came After" this has grown to a Class 2 with only a handful of places on the planet maintaining anything like an organized society. • The technological apocalypse in the Daybreak series wipes out roughly ninety percent of the human race between 2024 and 2026, but the United States is still, barely, hanging on. That said, most of the surviving humans are now Brainwashed and Crazy by Daybreak and are intent on continuing the devastation until the planet becomes a Class 3. The final book in the series shows them partially succeeding as the last U.S. President resigns from office and the country ceases to exist as the final pockets of civilization are overrun. • Do Androids Dream of Electric Sheep? is set in the aftermath of World War Terminus, a devastating global conflict that killed off a huge chunk of Earth's population and devastated the ecosystem. The surviving humans are plagued by radiation-induced sicknesses and genetic disorders, causing many to leave Earth for off-world colonies. • In Doom: Hell on Earth, humanity suffers a die-back at the hands of the "demons"/Freds. All nations have been devastated and mankind is struggling to avoid extinction. • In The Dreamside Road, governments the world over shut down during a global terrorist attack, five years before the story begins. Most never returned. • In The Harem Games, some unidentified pathogen brings humanity to the brink of extinction by wiping out adult males and severely shortening the lifespan of existing male children as well as almost destroying the viability of male children in utero to the point that live birth is a newsworthy event. Furthermore, it borders on Class 2 due to the fact that the world government falls into the hands of a group of women far more concerned with retaliating against and, in their minds, preventing, the return of the abusive patriarchal societies they came from. They enact policies that make mankind dependent on artificial insemination, and force male teens to fight each other in a tournament until one is left, after forcing them into Battle Harems, with the consent of all all parties involved being a mere courtesy, at best. • The apocalypse in The Hunger Games was at least continental, probably global. In the first book, Katniss describes a massive natural disaster: "the droughts, the storms, the fires, the encroaching seas that swallowed up so much of the land." Wars erupted as factions tried to claim the limited remaining resources, and this appears to have led to the collapse of the North American nations that we currently know. Some time after that, about 75 years before the present, a massive rebellion resulted in further destruction; District 13 was seen as a particular threat since they controlled the nuclear power and potentially weapons, so the Capitol bombed them into oblivion. • In Legacy of the Aldenata, humanity has roughly five billion killed by the end of the war with the Posleen. They draw close to entering Class 2 territory, but while humanity gets hammered hard, they keep most of their technological knowledge, both native and Galactic. • The Thirteen Day War in the backstory of Legend of the Galactic Heroes involved a nuclear exchange between the major powers of Earth, which reduced the world's population to 1 billion and some 90 years would pass before order was restored on Earth. • Lucifer's Hammer looks much worse at first, what with a comet's direct impact apparently destroying civilization, China nuking Russia (and getting nuked by both the Soviets and USA in retaliation), a cannibal army roaming through what's left of California, and the lack of any organization outside the local level. But by the end of the novel, we still have electricity (from a nuclear power plant, even), at least regional government, and contact with people that can put a plausible claim toward being the national government. Amusingly, the authors claim (and suitably demonstrate!) that it was the mailman doing his job that kept civilization afloat and the story out of the nastier categories below. It's also speculated, though never established, that countries south of the equator would escape the impact and the worst of the weather changes. If that's true, Australia, South Africa and most of South America could probably maintain social order. • In "The Moral Virologist", the Synthetic Plague is at least a type 1, since it is intentionally designed to kill anyone who has ever had multiple sex partners, and spreads through the air so that settling down in a monogamous relationship after sowing your wild oats can't save you. The revelation that the proteins in breastmilk also activate the virus's kill switch, killing babies regardless of the chastity of their mothers pushes this potentially into type 2 range if a cure or vaccine isn't discovered in time, and possibly even type 3 if everyone who was once breastfed is lethally affected. • In John Barnes' Mother Of All Storms, set 20 Minutes into the Future, a UN sanctioned nuclear strike on an illegal Siberian military base sets off a chain of events that culminates in a series of super-sized hurricanes that ravage coastlines on a global scale and completely wipe out entire nations (Bangladesh, Japan, Micronesia) as well as the state of Hawaii and cause roughly two billion deaths, but thanks to the intervention of the US' last astronaut raised to a godlike state of cyberconciousness, civilization as a whole and the United States in particular are preserved with the coastal areas due to become new frontiers. • The main land in The Obernewtyn Chronicles. They got hit by a nuclear holocaust that left most of the land and water tainted. • Prior to the Old Kingdom series, something like this occurred thanks to Kerrigor. • This is what the time traveller Phanthro is trying to accomplish in the Relativity story "Tempest". • In the Second Apocalypse series, the First Apocalypse exterminated an entire cradle of human civilization, the Ancient North. Now its ruins are haunted by baying Sranc. At least they killed the No-God, though: his very existence caused infants to be stillborn for eleven years. The main point of the series is to prevent the eponymous Second Apocalypse, which would entail the resurrection of a now-unstoppable No-God and an eventual class 4-6, all so that the two surviving Ichoroi can avoid going to Hell. • In Sewer, Gas & Electric, a racist-designed plague turns nearly every person of black African descent on the planet into dust. Only ethnic Africans with green eyes — a minute fraction of the total — are spared. • In John Varley's Slow Apocalypse, a gene-geneered bacteria reduces crude oil to an unusable sludge which, along with secondary effects, shakes civilization on a global scale but it survives. • A Song of Ice and Fire: The nebulous Doom of Valyria basically wiped a large country off the face of the planet, killing 99.999% of its inhabitants and rendering the entire area a no-go zone even centuries later. Normally this would qualify as a Class 0, but as said country was the center of a continent-spanning empire, its sudden immolation resulted in societal disruptions on a global scale. The most notable one was the Century of Blood, a general Essosi societal collapse complemented by civil war, famine, and barbarian invasions, which saw large chunks of the continent depopulated. The chaos even extended to far-off Westeros (albeit to a much lesser extent), as it caused an otherwise obscure surviving clan of dragonlords to divert their attention to the western continent and embark on their own large-scale dragon-assisted conquest. • The Stand: The release of a weaponized strain of influenza has wiped out almost all of the human population. What remains eventually get a couple of small working societies up and running. • The Desolations in The Stormlight Archive, which Dalinar has visions of, had been limited to this by the Knights Radiant. The Everstorm, which is caused by the Parshendi, is the next one. Fortunately, new Radiants are popping up, so there's still a chance of the destruction being limited. • The background scenario for Joe Haldeman's "A !Tangled Web (1981)" and "Seasons" has it that most of the Northern Hemisphere has been destroyed in a nuclear war, but South America, Africa and Australia mostly survive. A faster-than-light drive is subsequently invented by Hartford, an Australian concern, and a Spanish- and Swahili-speaking "Confederación" pushes out to the stars. • The Way Series eventually features a full-scale global nuclear exchange that inflicts Class 1 damage on human civilization. • The Breaking of the World in The Wheel of Time. Also borders on Class 2. • In Without Warning, an Alternate History written in 2009 but beginning in 2003, an energy field of unknown type and origin called "the Wave" wipes out all primates in most of the Lower 48, the more populated eastern half of Canada, about 90% of Mexico and three-quarters of Cuba. This leads to a very different Iraq War in which Hussein goes on the offensive and is joined by Iran until a threatened Israel launches a pre-emptive nuclear strike on its neighbors, the global economy starts sliding down the toilet and the world in general starts edging into Mad Max territory. Also untended fires spread due to the lack of human intervention (although automatic sprinkler systems catch some), wiping out large chunks of entire cities with the resulting ash being spread throughout the northern hemisphere in "pollution storms" that wipe out major harvests. Four years later and three years after the Wave disappears, making the area it devastated enterable again in the sequel After America, the food and oil shortages caused by the pollution storms and Israel nuking the Middle East have most civilized nations still on rationing, although no-one is starving, many people growing private gardens and bicycles and horses outnumbering private cars. • World War Z shows how humanity gradually defeats the Zombie Apocalypse. At the end of the story, much of the world has been reclaimed (despite losing the majority of the human population) zombies are limited to a few huge herds too big to take on, a couple of cold countries where winter tends to send them into suspended animation, and the lakes and oceans of the world, where lost zombies roam on the lake bed or ocean floor.     Live-Action TV  • Doctor Who: • "Smith and Jones": Had the Plasmavore won, her Evil Plan would've caused this in terms of humanity (likely more of a Class 4 in terms of the Earth's biosphere). Her modifications to the MRI would've sent out a World-Wrecking Wave from the moon which would've fried every last brain stem within a range that included the side of the Earth facing the moon at the time (and only that side). • "Turn Left": In the Best of All Possible Worlds-style Alternate Timeline, without the Doctor around to save the world, the crises escalate into this over the course of less than two years. Britain ends up under martial law with the whole of England flooded with radiation after the Titanic obliterates London, the many who are displaced from this are crowded into designated houses, and eventually the "England for the English" Law gets passed. Never mind France closing its borders after getting overwhelmed with refugees or sixty million Americans getting turned into Adipose. • In the backstory of The Flipside of Dominick Hide, at some point, there was a global disaster that killed a massive chunk of humanity and rendered most of the biosphere unusable. Humanity survived thanks to carefully managed habitats, and while technology has advanced again, there are massive waiting lists for anyone wanting to visit the surviving biosphere zones. • Jeremiah shows life after a plague has wiped out nearly every post-pubescent human being. • In Jericho (2006), 25 of America's major cities have been nuked, including Washington, D.C., dividing the country in three. It's arguable whether this belongs in 0 or 1, because for all we know, the rest of the world could be pretty much okay. We do know that, due to the Cheyenne Government's cover-up and Puppy-Kicking, Iran and North Korea no longer exist. Every government seems to be throwing money and goods at the US in hopes that the wounded beast won't start lobbing nukes at random. In the end, America may drag the rest of the world down with them. • In the series finale of Leverage, Inspector Sterling says that Interpol is refusing to prosecute the culprits of the 2008 financial crisis to avoid one of these — a global economic crash — due to lack of faith in international finance. • Ohsama Sentai King-Ohger: Earth has undergone a Class 1 due to the machinations of the season's Greater-Scope Villains the Galactinsects. Their interference in the affairs of Earth caused a Civil War that forced much of humanity to migrate off-world and settle on the Earth-like planet Tikyu. The humans left behind (at least those we see in Japan) have been enslaved by stragglers of the slain Deboth Army the Galactinsects vassalized in exchange for their own survival; leeching all Brave out of humanity and transforming what's left into mindless slaves. The King-Ohgers are sent here by Dagded as punishment for outwitting him; inadvertently allowing both Sentai teams to save what's left behind. • In Revolution, the world suffers a worldwide failure of electricity due to a nanotech plague, essentially sending it back to the 19th century techwise except for a few anomalies like automatic weapons and medical knowledge. • Star Trek: • A Class 1.5 Catastrophe is depicted in the Star Trek: Voyager episode "Friendship One". The planet in question was devastated 100 years ago, and the civilisation has not recovered yet, but Voyager is able to help, and it seems that now, with atmosphere cleaned, they will recover. • Star Trek: Discovery begins Season 3 with the crew of the Discovery ending up in the 32nd century, where a mysterious event known as "the Burn" caused a vast majority of dilithium crystals, the power source needed for warp travel, suddenly exploding. This causes the Federation to practically collapse on itself. • Survivors features the few remaining inhabitants of a virus-ravaged Earth. However, enough human knowledge survives in the form of books to prevent this going to Class 2. • In The Tribe, a government project into anti-aging goes wrong, and the resultant virus wipes out all adults in the world. Although the surviving children resort to small insular tribes and anarchy rules periodically from then on, enough knowledge survives in books that technologies can still be slowly rebuilt by those who are smart enough, making this a solid Class 1. Its sequel series, The New Tomorrow, takes this much closer to a Class 2 as society had regressed further to a pre-industrial, agricultural society (except for the Barbs, who are hunter-gatherers) — presumably then, the attempts made in The Tribe to rebuild our technological society did not take for one reason or another... • The psychedelic "The Day The World Turned Day-Glo" by X-Ray Spex is a borderline case. Possibly the singer Polly Styrene only refers to our modern plastic world? In any case, this blogger used it as a title for his apocalyptic thoughts about a nuclear plant in India.     Tabletop Games  • The Anime Multiverse Setting of Big Eyes, Small Mouth has Enid, a world in which most of humanity was driven into arcologies underground by violent storms, that since ravage the lands. There's also a world-spanning war going on between two factions that try to restore the planet in two different ways. • Blue Planet's Fischer Blight caused a worldwide famine that starved billions, touched off multiple major-power wars in Asia, and left much of the planet's arable farmland desertified. Entire countries are gone, the GEO is politically unkillable because there's not enough ratifying nations left to disband it, and it's not at all clear if Earth will ever recover. • The Cyberpunk setting has a notable one in the form of the DATAKRASH virus, though it's not known if there were many fatalities from it. The netrunner Rache Bartmoss set up a dead man's switch that would activate two weeks after he died in 2023. The virus itself first started small doing things that'd be consider minor glitches, like swapping small piece of code here and there, but by the time it was identified as a virus by others, it had become damaging to the point that the only thing to do was quarantine sections of the internet from usage. In the end, nearly 80% of the internet was rendered unusable before it was officially quarantined completely. Due to the scale of the damage and safety concerns of potential reinfection, the world of Cyberpunk as of 2039 has mostly restored to short-range LAN connections. As of the events of Cyberpunk 2077, long-range connections have become available for the rich, but nothing on the scale of the old internet. • Happens a few times in the Exalted setting: • The Three Spheres Cataclysm at the end of the Primordial War: out of petty revenge, a defeated primordial detonates three of his souls, which annihilates most of Creation (and the people living there) and destroys "nine out of ten important things in the world". • The Usurpation: the whole Solar Exalted ruling class is betrayed by its underlings, which results in decades of extremely violent civil war. Hundreds of thousands are slain (both participants and collateral victims), entire cities are destroyed, and the whole High First Age society collapses. • The fall of the Shogunate: the Dragon-Blooded-led society of the Shogunate is attacked by the undead and the fair folk, who almost manage to destroy the world. They are driven back by the new Empress using the Realm Defense Grid, which is one of the most powerful superweapons in existence and inflicts severe collateral damage on the world in itself. • The Great Contagion: a supernatural plague with no known cure kills 90% of the world population, mortals and Exalted alike. • Before all of that, the Primordial War itself certainly wrecked an insane amount of havoc and totally changed the face of the world forever for men, gods and primordials, but it is difficult to tell exactly how since there is hardly any trace (if any at all) of the civilizations that existed before it. The only people who could maybe tell are the Celestial Incarnae, but even they were changed by the war and probably can't remember or even understand much of what happened before. • In Nuke War, if you win, it's only a Class 1 disaster; if everyone loses, it's somewhere from Class 2 to 4. • The Blight of Red Markets emerged and caused chaos everywhere at once. Large swathes of land are no longer under the jurisdiction of a national government (everything west of the Mississippi River in the US, most of continental Europe, and the Indian subcontinent, for example, are part of this "Loss") and the remnants (areas called "the Recession") are struggling to keep some semblance of order and subsistence among the survivors, and the corporations exploiting them for their own gains, while trying to deal with a virulent zombie plague and a massive grudge held by those abandoned in the Loss. Sweden is among the handful of nations to suffer little disruption. • Rifts varies from place to place. A number of modern cities have been (re)built, including a scant few that survived from before the magically-charged cataclysm, but only the most powerful states expand their influence beyond the borders of their own cities (or have "city" be plural, for that matter). Mankind is slowly rebuilding, but the initial catastrophe of the Coming of the Rifts was just shy of a full-blown Class 2. It's taken the world 300 years of rebuilding to reach the point of a Class 1.5 and is only a couple of good shoves from falling back into Class 2 territory. The presence of alien monsters/invaders/the return of magic has been both a blessing and a curse, as some areas have come back much faster than others, but very differently than how they were before and often with humans at the bottom of the pecking order. • The VITAS plagues cut back the global human population by about 1/4 in the future history of Shadowrun. Some countries weathered the pandemics better than others, with North America coming through relatively intact, while some Third World regions such as Madagascar were left virtually deserted. • Tech Infantry has a large meteor strike the earth and render it temporarily uninhabitable, but by that point, humans have colonized many other planets, so the species survives. • The post-World War III world of Twilight: 2000 is Class 1, bordering on Class 2. It's clear that humanity has a lot to do, but generally implied that civilisation would rise again. The starfaring game 2300 AD was Ret Conned into being a sequel, so this interpretation is more-or-less official. • Little Shop of Horrors: The opening narration to the last song of the show, "Don't Feed the Plants", implies that following Audrey and Seymour's deaths, Audrey II's saplings managed to be distributed all over the world and caused mass death and destruction, with humanity doing its hardest to fight back. This is made more obvious in the Director's Cut ending of the film adaptation, where the world is shown being destroyed by Audrey II's offspring, and the fight against them is shown to be hopeless.     Video Games  • BlazBlue mixes this with Class 4, with the war against the Black Beast resulting in a toxic mist spreading across all of Earth, rendering the planet totally uninhabitable to humans except on the highest mountaintops, where the mist is too thin to have an adverse effect. Civilization now exists in at least thirteen city-states dotted around the world (though a few are destroyed over the course of the games), with transportation between them via gigantic airships. Nearly all of Earth's species have died out because of this mist, but a few animals and plants seem to have been replaced by mutant variants that can thrive in it. • The backstory of Danganronpa: Trigger Happy Havoc involves an incident known as "The Worst, Most Despair-Inducing Event In History" (also known simply as "the Tragedy") that allowed a terrorist organization called "Ultimate Despair" to unleash catastrophic levels of unrest around the world. Later games and spin-offs go into more detail as to exactly what happened, showing that half the human race was rendered Brainwashed and Crazy by Junko's Hate Plague, turning a large portion of the affected into psychopathic murderers. • Dead Rising 2 almost voids the Downer Ending of its predecessor — it's quite clear that the Zombie Apocalypse has come and gone, but thanks to the government being actually competent, civilization itself has endured quite nicely and the outbreak hasn't really knocked people back significantly — there's even a Reality Show based around it. This, combined with a way to actually fight the infection means that the epidemic will probably end with humanity on top (admittedly, it's going to take a while...). • The Dragon Age setting has the Blights, which are regular apocalyptic events where near-demonic creatures known as the darkspawn unite into a single horde and emerge from beneath the ground to overwhelm the surface world. These Blights can last decades at best, with the first one being the longest one in existence, lasting nearly two centuries as entire generations lived and died warring with the darkspawn and the most powerful empire of the world at the time being extremely weakened. Thedas suffered five Blights so far, but its civilizations have succeeded in rebuilding themselves afterwards. • Final Fantasy: • In Final Fantasy VI, most of the world is destroyed, but humanity survives in quite large numbers and most towns are unscathed. However, Kefka is a god after this and keeps blasting the survivors when he gets bored, pushing the crisis up to Class 4/5 a year later, with plant and animal life dying off and humans struggling to rebuild in-between Kefka's rampages. During the confrontation with Kefka before the final battle, he directly states he's gonna go for Class X and beyond. The party kills him before he gets a chance to try, and the world slowly begins to get the chance to recover in the absence of constant attacks. • Final Fantasy Crystal Chronicles: Echoes of Time had a major societal collapse two thousand years ago when the Crystals disappeared, ruining the Magitek-dependent civilization. In the present day, all that's left is one town and one isolated village. And the latter is actually a ghost town. • Gears of War skirts between this and Class 2. Given 99% of the human population were wiped out by the Locust, the remaining were fighting an offensive war against them and later the Lambent, and that they had to destroy their last bastion to cripple the Locust at the end of GOW2, things didn't look too rosy. Confirmed to be Class 1 at the end of Gears of War 3. Now that the Lambent and Locust were wiped out, as well as Immulsion, Humanity can finally recover. • The world of Girls' Frontline is recovering from a Class 1 event. Sometime in the 2030s, a military skirmish resulted in the release of the the physics-defying Collapse Fluid from a Precursor facility near the equator, which circulated into the upper atmosphere, contaminating and rendering uninhabitable most of the world around the equator. In the massive humanitarian crisis and rush to evacuate the affected areas, old political and military borders dissolved, and a new world with new superpowers and a drastically reduced population emerged. The reduced human population demanded a solution if society was to continue, and so advanced robotics were developed, and over time improvements made so that these new "Dolls" could serve not just in labor, but in the military and eventually work civilian "jobs", leading to the game's main premise of Cute Robot Girls. • Halo: By the time Halo 3 rolls around, humanity is in a position like this, with most non-Earth colonies having been utterly annihilated, its military reduced to a handful of fleets, and the war having killed 23 billion humans out of an estimated pre-war population of 39 billion. Nevertheless, the surviving human worlds are still able to maintain their high-tech civilizations, and after the Human-Covenant War ends, humanity as a whole is in just good enough shape to start reclaiming their lost worlds. • In the Improbable Island world, the EMP War was an interesting cross-level. With the exception of people with pacemakers, nobody died, yet technology was pretty much knocked back 50 years since nobody actually knew how to make silicon computers anymore. • The Legend of Zelda: Breath of the Wild is set in a Class 1.5 scenario, due to Calamity Ganon overpowering Link, Zelda, and the Champions in their first battle, and virtually destroying the Kingdom of Hyrule. Though the kingdom itself has largely been erased for 100 years and horrible monsters freely roam the lands, far-flung towns and villages managed to escape the devastation and have mostly recovered. • With Neo Arcadia being the only major civilization in the world during Mega Man Zero, Craft/Kraft causes one by firing the cannon on Ragnarok at Neo Arcadia just to kill Dr. Weil. According to official sources, the death toll was approximately 20,000,000 casualties. • In A Mind Forever Voyaging, the 2071 simulation falls into this class. Your town of Rockvil has become the Oppressive States of America, as the Church of God's Word has put a stranglehold on the town, turning it into a religious, totalitarian police state, and higher-echelon Church members are allowed to own slaves; your Brainwashed and Crazy son Mitchell leads the raid as he arrests your wife Jill for "heresy"; you are suffering all kinds of Elder Abuse; almost all animals have suffered Planetary Multiple-Species Extinction due to starvation, neglect, and torture by religious schoolchildren who treat you like an animal and kill you by throwing stones at you; all the water is becoming polluted and undrinkable; food is quickly becoming scarce (and some restaurants are either becoming expensive or reserved only for Church members); strict rationing is in effect for what poor-quality food is still available, since the ration card should not be used twice under penalty of death; innocent people are being brutalized and even executed for minor crimes, and executions become bloody gladiatorial matches; buildings, churches, parks and a cemetery are becoming either empty or vandalized; and books and all kinds of entertainment are banned or replaced by religious hate films. And it only gets way worse in the 2081 sim... • Most Shin Megami Tensei games start or end up here. Some notable examples include Shin Megami Tensei I, Shin Megami Tensei IV, and Devil Survivor. Shin Megami Tensei II takes place a century after one of these. • Space Quest IV: Roger Wilco and the Time Rippers shows an example of this, going borderline Class 2. Vohaul takes over the supercomputer which controls every technology related aspect of Xenon and more, and turns it against the population. In game, Xenon is shown to be a hellhole, with only a few survivors. Vohaul also creates the Sequel Police, who search through the series (including games that were never released) to find and kill Roger. • In Sword of the Stars, humankind comes under orbital bombardment from a neighbouring, established spacefaring civilisation just after the first colony ship was launched. Civilisation collapses, then comes back in a form, but as an effective fascist dictatorship bent on forcible expansion into habitable worlds. • Uplink features a non-lethal Class 1 that happens when the Revelation virus destroys the Internet. • The destruction of the Torus Aeternal a year prior to X3: Albion Prelude caused millions of tons of debris to rain down on Earth. The Terran military reacted to the attack pretty much how you'd expect. • The Taikese civilization of Star Trip were devastated a thousand years ago when an entire continent of their homeworld was destroyed in an act that permanently altered the planet's climate. Exactly why or how Khut did this is unknown, but billions of people died. • Terinu's backstory has the Earth being subjected to an attack 500 years previously by the Varn Dominion using a titanic tractor-pressor beam to destroy major population centers via earthquakes and tsunamis. This results in a Class 1.5 destruction as somewhere between one and a half to three billion people die in the initial attack and subsequent chaos. Australia was left intact with a functioning economy however, as a sort of human game preserve. In addition, the Vulpine suffered a 50% population loss as they were hit by the "Bloody Plagues" during the subsequent human led rebellion. • In Wychwood, the interdimensional alien invasion devastated the planet and left most of it in ruins. A little over two decades later, the surviving parts of human society were on their way to rebuilding with the aid of some alien technology left behind... only for the rift to reopen, and a fresh invasion to begin. • The near-future post-Zombie Apocalypse setting of The Zombie Hunters finds the planet overrun by The Undead, and the The Virus did in fact serve as a Depopulation Bomb. What few humans remain cling very tenuously to Class 1 status, with the struggle to avoid becoming a full-bore Class 2 as a driving force in the plot. To keep their Island Military Base running, and the populace cozy they depend on teams of dormant Zombie Infectee Disaster Scavengers (the eponymous "Zombie Hunters") to venture out into "the Wastes" and risk getting bitten to retrieve much-needed salvage. They only have two helicopters and a ship to work with. A handful of doctors, scientists, engineers and Military are respectively trying to Find the Cure!, keep the island's technological infrastructure running, and build a viable secondary colony on the mainland. The loss of any of these people or things, even a relatively expendable Zombie Hunter, represents a huge setback for the potential future of the human race.     Web Originals  • 1983: Doomsday, a timeline from the Alternate History Wiki, is set in a world where a nuclear war occurred in the early eighties. Most of the nations in the Northern Hemisphere cease to exist, yet the survivors manage to establish new states in their wake. The Southern Hemisphere, meanwhile, escapes mostly unscathed. • Coruscant in The Gungan Council had at least a quarter of its surface damaged and possibly even wiped out by a Death Star exploding in its orbit. • Night of the Living Alternate History depicts a Zombie Apocalypse that kills millions and devastates almost every country in the world. A lucky few, such as Australia and New Zealand, survived with minimal damage. • Thanks to the lack of canon in SCP Foundation material, any SCP subject could cause this or worse if it breaks containment. SCP-6004, for example, decimated global civilization and restored much of the environmental destruction wrought by human encroachment on nature when it woke up, and now the Foundation works with national governments and other anomalous organizations to limit activity that would reawaken it. • According to a What If? segment that answered the question of what would happen if everyone in the world jumped all at once from the same spot, Rhode Island would be overwhelmed by the volume of people trying to leave, billions would die of starvation, society would have to be rebuilt from scratch and it would not cause an earthquake. • In Winchester, many cities were destroyed and nations like America collapsed after WWII turned nuclear for both sides, but the trains still run and electricity can be found, with some places like Texas coming close to the pre-war standard of living.     Western Animation  • Jackie Chan Adventures: In the Season 1 finale, Shendu's Evil Plan would likely inflict this on the world overall. He intends to summon an army of dragons from Another Dimension and use them to destroy (not rule) the whole of Asia. • Wakfu: The World of Twelve suffered one hundreds of years ago at the Dofus Era-Wakfu Era boundary, when Ogrest caused The Great Flood which reshaped the entire planet's topography from a large continent into scattered islands (given the nature of this apocalypse, it could've well been a mild Class 4 for the planet's land-based ecosystems). And Ogrest is still slowly causing sea levels to rise and threaten the remaining landmasses into the present day, until the heroes confront him in the OVAs.     Real Life  • A "limited" nuclear exchange between the superpowers probably would be a high Class 1, depending on where the nukes landed, at least in the early part of the Cold War. • The Black Death in the fourteenth century halved Europe and China's populations, killing an estimated one hundred million people and setting civilizations back by centuries. It took 200 years for the world population to recover to its previous level. • A strong enough Coronal Mass Ejection could render most electronics (especially ones with computer chips) severely damaged and useless, which would knock humans back to the 1930s in terms of technology. However, it is temporary, so after the turmoil (caused by removing essential technology like radios, the computers in plane cockpits and the machines hooked up to hospital patients), we would be able to replace it eventually. • The night side during the flare would probably have electronics more or less okay, so even if one were to hit Earth (itself a very slim prospect but likely a reality some point in the future), there's a decent chance the bulk of the damage would be over the Pacific or Atlantic oceans. However such an event would damage satellites completely, and in the worst case scenarios, human progress would be stalled out for a few decades while infrastructure and industry recovered. Deaths would probably be limited to medical patients and people in situations requiring electronics at the time though. • More ominously however, most people in today's Western society have no access to clean water or food without electronics, which in a worst case scenario could bump this up to a Class 2. • The effects of climate change can easily do this, even if humans get time to adapt to the changing world. The most immediate effects start with a rise in water levels due to the melting ice caps, which means very little to us now, but in the future this rise could sink coastal cities that are unprepared to handle them. Worse, this shift in the ocean would result in the alteration of ocean currents which would radically change the weather. For example, hurricanes have been happening more frequently in America and increasingly more powerful. Some areas, like the American Southwest, are experiencing a major decrease in rainfall, rendering those areas unlivable for humans due to the lack of easily accessible water, and forest fires more severe and frequent. The climate, on average, will get hotter around the globe, but climate and weather are very different things, meaning winters could be colder (as with the collapse of the Polar Vortex which devastated North America in the winter of 2013) and snowier. A change in climate, even one as small as a few degrees Fahrenheit, could cause widespread crop failure and famine. Food prices would go up, economies would collapse, and waves of refugees would flee from equatorial areas to more habitable regions, putting further strain on the available food supply. The increased natural disasters could also result in a collapse of infrastructure, including hospitals, roads, and emergency services, causing thousands to die. It isn't all bad though; at least the northerners get to have sunnier weather on average (assuming you actually like hot weather). It just comes at the cost of immense human suffering and lives, of course. • About 74,000 years ago, the supervolcano at Lake Toba erupted, creating a volcanic winter that reduced the human population to within hailing distance of extinction — as few as 10,000 breeding pairs. The resulting genetic bottleneck has been demonstrated by genetic studies. A similar eruption happening now would fit quite comfortably into this class (or possibly even Class 2). • There are a number of Supervolcanoes on Earth and we get approximately one big eruption every 100,000 years. One example is the Yellowstone supervolcano, which could cause a Class 1 event for America thanks to the spread of lava and ash, and possibly even cause another Ice Age if the ash stays in the atmosphere long enough. While the Yellowstone supervolcano is overdue for an eruption, it's showing no signs of doing so (we would know months in advance thanks to seismic activity) and may never erupt again — but don't be disappointed, it's only the 21st most dangerous volcano in America.note  Alternative Title(s): Planet Wide Civilization Disruption
{"cc_dump":"CC-MAIN-2024-18","dolma2_qc":{"0":0.9606211782,"1":0.0393988453},"exact_duplicates":0,"lang":{"en":0.9558924437},"madlad":{"num_sentences":339,"rule.2":[75,88,187,196,272],"rule.5":[134],"status":"survived"},"minhash":null,"original_word_count":9476,"sa_remove_ranges":[],"text_hash":"229320602700167472826404298115943710234","warc_content_type":"text\/html","warc_date":"2024-04-19T14:11:45.000Z","warc_url":"https:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/ApocalypseHow\/Class1","weborganizer":{"__label__crime_and_law":0.0022618477,"__label__education_and_jobs":null,"__label__finance_and_business":0.0023331624,"__label__games":0.1602760255,"__label__health":null,"__label__literature":0.0251888447,"__label__politics":0.085109055,"__label__science_math_and_technology":0.2450950146,"__label__software":null,"__label__software_development":null,"__label__adult_content":null,"__label__art_and_design":0.005070332,"__label__entertainment":0.0926977769,"__label__fashion_and_beauty":null,"__label__religion":null,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__history_and_geography":0.119212918,"__label__home_and_hobbies":0.0029910326,"__label__travel_and_tourism":null,"__label__electronics_and_hardare":null,"__label__industrial":null,"__label__transportation":null,"__label__food_and_dining":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
74d9b474dd3668db3fbdf01fd5afa2b4bcd5d1a3
package com.zhidian.wifibox.adapter; import java.util.ArrayList; import java.util.List; import java.util.regex.Matcher; import java.util.regex.Pattern; import android.content.Context; import android.content.Intent; import android.graphics.Bitmap; import android.view.LayoutInflater; import android.view.View; import android.view.View.OnClickListener; import android.view.ViewGroup; import android.widget.BaseAdapter; import android.widget.ImageView; import android.widget.TextView; import com.ta.TAApplication; import com.zhidian.wifibox.R; import com.zhidian.wifibox.activity.HTMLGameActivity; import com.zhidian.wifibox.data.CDataDownloader; import com.zhidian.wifibox.data.CategoriesDataBean; import com.zhidian.wifibox.message.IDiyFrameIds; import com.zhidian.wifibox.message.IDiyMsgIds; import com.zhidian.wifibox.util.DrawUtil; import com.zhidian.wifibox.util.PathConstant; import com.zhidian3g.wifibox.imagemanager.AsyncImageManager; import com.zhidian3g.wifibox.imagemanager.AsyncImageManager.AsyncImageLoadedCallBack; /** * 游戏分类adapter * */ public class CategoriesAdapter extends BaseAdapter { private List<CategoriesDataBean> mList = new ArrayList<CategoriesDataBean>(); private Context mContext; private LayoutInflater mInflater; private OnClickListener mItemClickListener = new OnClickListener() { @Override public void onClick(View v) { // 跳转到分类内容列表 CategoriesDataBean bean = (CategoriesDataBean) v .getTag(R.string.app_name); if (bean.type == 1) { List<Object> list = new ArrayList<Object>(); list.add(bean); // 通知TabManageView跳转下一层级,把TopicDataBean带过去 TAApplication .sendHandler(null, IDiyFrameIds.TABMANAGEVIEW, IDiyMsgIds.ENTER_NEXT_LEVEL, -1, CDataDownloader.getCategoryContentUrl(bean.id, 1), list); } else if (bean.type == 2) { Intent intent = new Intent(mContext, HTMLGameActivity.class); intent.putExtra(HTMLGameActivity.GAMEURLKEY, bean.otherTarget); mContext.startActivity(intent); } } }; public CategoriesAdapter(Context context) { this.mContext = context; mInflater = LayoutInflater.from(context); } @Override public View getView(int position, View convertView, ViewGroup parent) { ViewHolder holder; if (convertView == null) { holder = new ViewHolder(); convertView = mInflater .inflate(R.layout.list_item_categories, null); holder.itemLayout = convertView.findViewById(R.id.item_layout); holder.ivImage = (ImageView) convertView .findViewById(R.id.item_categories_image); holder.tvName = (TextView) convertView .findViewById(R.id.item_categories_name); holder.tvIntro = (TextView) convertView .findViewById(R.id.item_categories_intro); convertView.setTag(holder); } else { holder = (ViewHolder) convertView.getTag(); } CategoriesDataBean cd = mList.get(position); String url = cd.iconUrl; String name = cd.name; String intro = cd.explain; if (position % 4 == 1 || position % 4 == 2) { holder.itemLayout .setBackgroundResource(R.drawable.btn_classify_gren_selector); } else { holder.itemLayout .setBackgroundResource(R.drawable.btn_clasify_white_selector); } final ImageView image = holder.ivImage; image.setTag(url); Bitmap bm = AsyncImageManager.getInstance().loadImage( PathConstant.ICON_ROOT_PATH, url.hashCode() + "", url, true, true, new AsyncImageLoadedCallBack() { @Override public void imageLoaded(Bitmap imageBitmap, String imgUrl) { if (imageBitmap == null) { return; } if (image.getTag().equals(imgUrl)) { image.setImageBitmap(imageBitmap); } } }); if (bm != null) { image.setImageBitmap(bm); } else { // 默认 image.setImageBitmap(DrawUtil.sDefaultIcon); } holder.tvName.setText(name); holder.tvIntro.setText(stringFilter(intro)); holder.itemLayout.setTag(R.string.app_name, mList.get(position)); holder.itemLayout.setOnClickListener(mItemClickListener); return convertView; } /** * 去除特殊字符或将所有中文标号替换为英文标号 * * @param str * @return */ public static String stringFilter(String str) { str = str.replaceAll("【", "[").replaceAll("】", "]") .replaceAll("!", "!").replaceAll(":", ":").replaceAll("、", ",") .replaceAll(",", ",");// 替换中文标号 String regEx = "[『』]"; // 清除掉特殊字符 Pattern p = Pattern.compile(regEx); Matcher m = p.matcher(str); return m.replaceAll("").trim(); } static class ViewHolder { View itemLayout; ImageView ivImage; // 图片 TextView tvName; // 类别名称 TextView tvIntro; // 简介 } @Override public int getCount() { return mList.size(); } @Override public Object getItem(int position) { return null; } @Override public long getItemId(int position) { return 0; } /** * 更新数据,并调用notifyDataSetChanged */ public void update(List<CategoriesDataBean> list) { mList.clear(); if (list == null || list.size() <= 0) { notifyDataSetChanged(); return; } mList.addAll(list); notifyDataSetChanged(); } }
{"score":1.9375,"detected_licenses":[],"path":"\/CloudBox_StoreApp\/src\/com\/zhidian\/wifibox\/adapter\/CategoriesAdapter.java","language":"Java","length_bytes":5363,"int_score":2,"license_type":"no_license","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '74d9b474dd3668db3fbdf01fd5afa2b4bcd5d1a3', 'language': 'Java', 'repo_name': 'Lakkichand\/smartapp-src', 'path': '\/CloudBox_StoreApp\/src\/com\/zhidian\/wifibox\/adapter\/CategoriesAdapter.java', 'src_encoding': 'UTF-8', 'length_bytes': 5363, 'score': 1.9375, 'int_score': 2, 'detected_licenses': [], 'license_type': 'no_license'}","repo_name":"Lakkichand\/smartapp-src","src_encoding":"UTF-8"}
null
null
null
b56648ff-b9bd-48ab-b1ab-4d446457d807
Input List – Definition & Detailed Explanation – Music Production Glossary I. What is an Input List in Music Production? An input list in music production is a detailed document that outlines all the audio sources or inputs that will be used during a recording session. It is essentially a roadmap for the audio engineer, detailing which microphones, instruments, and other audio sources will be connected to the recording equipment. The input list is crucial for ensuring that all necessary equipment is set up correctly and that the recording process runs smoothly. II. How is an Input List Used in a Recording Studio? In a recording studio, an input list serves as a guide for the audio engineer to set up the recording equipment properly. The input list will specify which microphones are needed for each instrument or vocal, as well as any direct inputs for electronic instruments. The engineer will use the input list to route the audio signals to the appropriate channels on the mixing console or audio interface. III. What Information is Typically Included in an Input List? An input list will typically include the following information: – The name of each instrument or audio source – The type of microphone or direct input needed – The channel or input number on the mixing console or audio interface – Any specific settings or processing requirements for each input – Any additional notes or instructions for the audio engineer IV. Why is an Input List Important in Music Production? An input list is important in music production because it helps ensure that the recording process runs smoothly and efficiently. By detailing all the necessary audio sources and equipment, the input list helps the audio engineer set up the recording session quickly and accurately. This can save time and prevent technical issues that could disrupt the recording process. V. How Does an Input List Help Ensure a Smooth Recording Session? An input list helps ensure a smooth recording session by providing a clear roadmap for the audio engineer to follow. With all the necessary information laid out in advance, the engineer can set up the equipment quickly and accurately, reducing the risk of mistakes or technical issues. This allows the recording session to proceed smoothly and efficiently, without unnecessary delays or interruptions. VI. What Are Some Common Mistakes to Avoid When Creating an Input List? When creating an input list, it is important to avoid the following common mistakes: – Failing to include all necessary audio sources or inputs – Not providing enough detail or specific instructions for each input – Forgetting to update the input list if there are changes to the recording setup – Not communicating the input list effectively to the audio engineer or recording team – Relying solely on memory or improvisation instead of creating a detailed input list By avoiding these common mistakes and creating a thorough and accurate input list, music producers can help ensure a smooth and successful recording session.
{"cc_dump":"CC-MAIN-2024-42","dolma2_qc":{"0":0.0003763106,"1":0.9996436834},"exact_duplicates":1,"lang":{"en":0.8980240226},"madlad":{"num_sentences":25,"rule.2":[23],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":485,"sa_remove_ranges":[],"text_hash":"206291838825492998920327219293878572357","warc_content_type":"text\/html","warc_date":"2024-10-13T06:14:17.000Z","warc_url":"https:\/\/bingleymusiclive.com\/music-production-glossary\/input-list\/","weborganizer":{"__label__crime_and_law":0.0046195714,"__label__electronics_and_hardare":0.8439050913,"__label__finance_and_business":0.006702851,"__label__health":null,"__label__home_and_hobbies":null,"__label__science_math_and_technology":0.1037586331,"__label__software":0.4610267878,"__label__software_development":0.0503406264,"__label__sports_and_fitness":null,"__label__transportation":0.0022618477,"__label__fashion_and_beauty":null,"__label__industrial":null,"__label__entertainment":0.0132328207,"__label__social_life":null,"__label__adult_content":null,"__label__history_and_geography":null,"__label__art_and_design":null,"__label__education_and_jobs":0.0534133315,"__label__travel_and_tourism":null,"__label__games":null,"__label__politics":0.0012548432,"__label__food_and_dining":null,"__label__literature":null,"__label__religion":null},"weborganizer_max":"__label__electronics_and_hardare"}
null
null
null
null
null
null
45fb8447-dc03-4680-9f49-3913bf7e66d5
Ir para o conteúdo principal Editando passo 5 — Tipo de Passo: Arraste para reorganizar We slide the remaining band away from the body of the watch and start digging for the battery. Just like the battery bracket in its cellular-capable counterpart, this piece is held in by a less-than-friendly tri-point screw. Thankfully, our 64 Bit Driver Kit is up to the task! With a deft flick of our spudger this watch is rendered powerless. Is it just us, or is this disassembly off to an easy start? Suas contribuições são licenciadas pela licença de código aberto Creative Commons.
{"cc_dump":"CC-MAIN-2021-31","dolma2_qc":{"0":0.9996239543,"1":0.0003960997},"exact_duplicates":0,"lang":{"en":0.7975207567},"madlad":{"num_sentences":6,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":103,"sa_remove_ranges":[],"text_hash":"32291838967431919575950708325149039528","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-08-01T02:28:30Z","warc_url":"https:\/\/pt.ifixit.com\/Guide\/edit\/67385\/136478","weborganizer":{"__label__art_and_design":0.0078258887,"__label__crime_and_law":null,"__label__electronics_and_hardare":0.2337163687,"__label__entertainment":0.0474358723,"__label__finance_and_business":null,"__label__games":null,"__label__science_math_and_technology":0.0351548418,"__label__software":0.0097184796,"__label__software_development":null,"__label__transportation":0.0293222275,"__label__health":null,"__label__home_and_hobbies":null,"__label__industrial":0.0049154055,"__label__sports_and_fitness":0.0100235688,"__label__adult_content":null,"__label__history_and_geography":null,"__label__social_life":null,"__label__fashion_and_beauty":null,"__label__travel_and_tourism":null,"__label__education_and_jobs":0.004765199,"__label__politics":0.0100235688,"__label__food_and_dining":null,"__label__literature":null,"__label__religion":null},"weborganizer_max":"__label__electronics_and_hardare"}
null
null
null
null
null
null
20109f16-14ea-4616-b395-ccc045be8b3c
Month: April 2023 Fakhraee et al. (2023): A biogeochemical model of mineral-based ocean alkalinity enhancement: impacts on the biological pump and ocean carbon uptake Mojtaba Fakhraee, Zijian Li, Noah J Planavsky, Christopher T Reinhard IN: Environ. Res. Lett. 18, 044047, https://doi.org/10.1088/1748-9326/acc9d4 The authors used a series of biogeochemical models to evaluate the gross CDR potential and environmental impacts of ocean alkalinity enhancement using solid mineral feedstocks. The authors find that natural alkalinity sources—basalt and olivine—lead to very low CDR efficiency while strongly perturbing marine food quality and fecal pellet production by marine zooplankton. Neues Start-up entwickelt Algenfarmen zur Züchtung von Makroalgen Roland Koch (AWI) auf idw-online.de, 27.04.23 “In Las Palmas auf den Kanarischen Inseln wurde die Firma MACROCARBON SL ins Leben gerufen. Sie ist eine Ausgründung aus dem Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung (AWI) und Carbonwave. Das Start-up entwickelt Algenfarmen, in denen die Makroalge Sargassum gezüchtet werden soll. Diese Algen binden große Mengen an CO2 und dienen gleichzeitig der Herstellung neuer Grundstoffe für die Chemische Industrie. Marinič & Likozar (2023): Direct air capture multiscale modelling: From capture material optimization to process simulations Dana Marinič, Blaž Likozar IN: Journal of Cleaner Production 408, 137185, https://doi.org/10.1016/j.jclepro.2023.137185 The review provides an extensive evaluation of recent advances in multiscale modelling of DAC research. It introduces the theoretical physical descriptions of DAC, presents atom scale structuring, and brings together the state of the art of this, until now, poorly-researched analysis topic. Reviewed (CO2 mass) transfer works span from the ab initio density functional theory (DFT) calculation relationships to mesoscale Monte Carlo, molecular dynamics simulations and micro-kinetics, adsorption/desorption, and lastly, most commonly-investigated specific macroscale concept. The modelled DAC processes properties reported in the literature have been compared, which allowed us to identify the most effective sorbents. Lim et al. (2023): Unique CO2 adsorption of pine needle biochar-based activated carbons by induction of functionality transition Chaehun Lim, Seo Gyeong Jeong, Seongmin Ha, Naeun Ha, Seongjae Myeong, Young-Seak Lee IN: Journal of Industrial and Engineering Chemistry, https://doi.org/10.1016/j.jiec.2023.04.008 In this work, the authors induced functionality transition of heteroatom-rich pine needle biochar based activated carbon for CO2 adsorption by modulating activation conditions. The surface functionalities and porosity of the activated carbon derived from pine needles were investigated intensively according to the activation conditions. The transition of surface functional groups and development of porosity were observed as activation progressed.  Report: Pathways to Commercial Liftoff: Carbon Management by Ramsey Fahs, Rory Jacobson, Andrew Gilbert, Dan Yawitz, Catherine Clark, Jill Capotosto, Colin Cunliff, Brandon McMurtry, Uisung Lee, David Crane, Kelly Cummins, Melissa Klembara, Vanessa Chan, Lucia Tian, Vanessa Chan, Lucia Tian, U.S. Department of Energy, April 2023 These Commercial Liftoff reports aim to establish a common fact base and ongoing dialogue with the private sector around the path to commercial lift-off for critical clean energy technologies. Their goal is to catalyze more rapid and coordinated action across the full technology value chain. This report outlines the path to meaningful scale in carbon management, which the authors expect to develop between near-term and longer-term opportunities through 2030. Shopify Climate Report 2022 In late 2019, Shopify launched Shopify’s Sustainability Fund, which houses all of their environmental investments and initiatives. This report provides an update on the 2022 Sustainability Fund solutions and how they continue to evolve their initiatives to meet the needs of the climate, their business and their merchants’ businesses. McDonald et al. (2023): Greenhouse Gas Removal in Australian Climate Law: A Positive Role for Negative Emissions Jan McDonald, Kerryn Brent, Phillipa McCormack, Jeffrey McGee IN: UNSW Law Journal 46(1) Australia’s path to net zero emissions must include both emissions reduction and removal of greenhouse gases from the atmosphere. Australia’s large landmass and expansive marine estates provide significant opportunities for implementing these negative emissions technologies (‘NETs’). Significant further legal innovation will be needed to facilitate NETs crediting and adapt existing environmental, health and safety legislation to this large-scale challenge. As a starting point, this article surveys the curreit went state of Australian law and identifies priority areas for developing a legal framework to facilitate responsible research and development of NETs in Australia. Edenhofer et al. (2023): On the Governance of Carbon Dioxide Removal – A Public Economics Perspective Ottmar Edenhofer, Max Franks, Matthias Kalkuhl, Artur Runge-Metzger, CESifo Working Paper No. 10370, April 2023, 43 Pages This paper highlights the importance of carbon dioxide removal (CDR) technologies for climate policy. The authors first describe their role in iconic transformation pathways and discuss removal costs and storage duration of different technologies. Based on economic principles, they characterize optimal removal flows and reservoirs for non-permanent removals. Furthermore, the authors discuss different pricing regimes that achieve an optimal allocation under different information and liability conditions. Breunig et al. (2023): Emerging concepts in intermediate carbon dioxide emplacement to support carbon dioxide removal Hanna Marie Breunig, Fabian Rosner, Tae-Hwan Lim, Peng Peng IN: Energy & Environmental Science, https://doi.org/10.1039/d2ee03623a Substantial upscaling of carbon dioxide capture is possible in the coming decades but existing solutions for storage are projected to be limited in annual capacity by as much as 2–10 GtCO2 per year until mid-century. Temporary storage of CO2 in a solid or liquid state could prove useful for filling this gap in capacity, until more permanent and ideally lucrative CO2 sequestration options come online. There are several concepts for reversible solid-state and chemical CO2 storage, but their advantages and limitations have yet to be reviewed in this context. This article focuses on the physical and chemical aspects of CO2 storage via liquid and solid chemical carriers and sorbents, and gives an overview of the energetics around their use, as well as prospects for their future development.
{"cc_dump":"CC-MAIN-2024-51","dolma2_qc":{"0":0.9965817928,"1":0.0034382441},"exact_duplicates":2,"lang":{"en":0.7723326087},"madlad":{"num_sentences":40,"rule.2":[6,7,18,25,30],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":985,"sa_remove_ranges":[],"text_hash":"209706006080794914098162989753723712191","warc_content_type":"text\/html","warc_date":"2024-12-09T21:45:59.000Z","warc_url":"https:\/\/carbondioxide-removal.eu\/en\/2023\/04\/","weborganizer":{"__label__education_and_jobs":0.0018775659,"__label__electronics_and_hardare":null,"__label__entertainment":null,"__label__finance_and_business":0.0075872424,"__label__industrial":0.0216253344,"__label__politics":0.011697256,"__label__religion":null,"__label__science_math_and_technology":0.855861187,"__label__software_development":0.0009797518,"__label__transportation":null,"__label__fashion_and_beauty":null,"__label__food_and_dining":null,"__label__health":0.0039554066,"__label__home_and_hobbies":0.0008659008,"__label__art_and_design":0.0019367349,"__label__games":null,"__label__history_and_geography":null,"__label__literature":null,"__label__travel_and_tourism":null,"__label__adult_content":null,"__label__crime_and_law":0.0024067315,"__label__social_life":null,"__label__software":null,"__label__sports_and_fitness":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
53211c61af1d42ea65e0cdbc2dd2d8589cd45ce4
#!/bin/bash # The log volume is already mounted by fstab entry on startup if mountpoint -q /log; then # Do only chown chown td-agent:td-agent /log exit 0 fi # Fail if LOG_STORE is not set if [[ -z "$LOG_STORE" ]]; then echo "ERROR: LOG_STORE is not set" exit 1 fi mount_log_volume () { local name=$1 uuid=$2 echo "Using $name as a log volume" if [[ -z $uuid ]]; then # The volume is not formatted echo "Running mkfs on $name" if mkfs -t xfs $name; then uuid=$(blkid $name -s UUID -o value) else echo "mkfs failed" exit 1 fi fi if ! grep -q "^UUID=$uuid" /etc/fstab; then echo "Adding fstab entry" echo "UUID=$uuid /log xfs defaults,nofail 0 2" >> /etc/fstab fi echo "Mounting $name on /log" mkdir -p /log mount /log chown td-agent:td-agent /log } # Loop over the output of lsblk to format volumes IFS=$'\n' for drive in $(lsblk -p -P -d -o NAME,SERIAL,UUID,HCTL | tail -n +2); do # For Each line in lsblk eval the output into the following variable space # UUID=<blank if store is not formatted> # SERIAL=<either vol-id or AWSxxx> If AWS it indicates local volume # NAME=/dev/nvmeXn1 The name is not consistant between reboots eval $drive echo "Remote Volume: $NAME" if [[ -z $HCTL && ${SERIAL#vol} == ${LOG_STORE#vol-} ]]; then # On AWS, LOG_STORE should be set to volume id mount_log_volume $NAME $UUID exit 0 elif [[ -n $HCTL && $HCTL == *:$LOG_STORE ]]; then # On Azure, LOG_STORE should be set to lun (the last part of HCTL) mount_log_volume $NAME $UUID exit 0 fi done # In this case the expected LOG_STORE was not found so we throw an error echo "Cannot find LOG_STORE: $LOG_STORE" exit 1
{"detected_licenses":["Apache-2.0"],"src_encoding":"UTF-8","repo_name":"naveensushanth\/scalar-terraform","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '53211c61af1d42ea65e0cdbc2dd2d8589cd45ce4', 'language': 'Shell', 'repo_name': 'naveensushanth\/scalar-terraform', 'path': '\/provision\/ansible\/playbooks\/roles\/td-agent_aggregation\/files\/drive_mount.sh', 'src_encoding': 'UTF-8', 'length_bytes': 1724, 'score': 4.28125, 'int_score': 4, 'detected_licenses': ['Apache-2.0'], 'license_type': 'permissive'}","int_score":4,"license_type":"permissive","score":4.28125,"path":"\/provision\/ansible\/playbooks\/roles\/td-agent_aggregation\/files\/drive_mount.sh","language":"Shell","length_bytes":1724}
null
null
null
ca281425-3fa0-4032-b27e-d64981f46cd5
| Sign Up | Google+ Shinya Aoki's Post-Fight Behavior After Breaking Hirota's Arm Crosses Line Stay connected for news and updates Shinya AokiWhen you're a professional athlete and you hear a competitor's bone snap, that should be enough to draw you out of whatever testosterone- or adrenaline-fueled action you're engaged in. That disgusting, unmistakable sound serves as a reality check that the sport you're participating in has real-world consequences that extend far beyond the arena or stadium. When that sound doesn't give way to the humanity in you, there's a problem. During the Dynamite 2009 card held in Saitama, Japan, submission ace Shinya Aoki won his bout with Mizuto Hirota when he clearly broke Hirota's arm with a hammerlock. That should have been enough for him. But he was hardly done. Instead, Aoki stood over his fallen opponent, extended his middle finger at him and taunted him. Then, he ran around the ring excitedly and flipped off the fans, jumped up to the second rope to bathe in the fans' reaction -- which incredibly was cheers -- before running back up the ramp and finally, thankfully, disappearing. At no point did he go check on Hirota or exhibit any type of sportsmanship whatsoever. His defenders will say, "Hey, it's the same thing Brock Lesnar did to Frank Mir after beating him at UFC 100." First of all, Lesnar was soundly booed by the fans for his classless action after taunting Mir. Second, Mir hadn't suffered an obvious major injury in the fight. Third, Lesnar apologized in the post-fight press conference. Regardless, both Lesnar's and Aoki's actions were wrong. What Aoki did is similar, but not the same. He knew his opponent had been badly hurt, but chose to take the lowest road possible in literally adding insult to injury. We try to explain to people that what we're watching is a sport, that its participants are well trained, that they respect each other and can separate the personal from the professional. Sometimes, as in the case of Mir checking on Cheick Kongo after his grudge match victory earlier this month at UFC 107, we're proven right. The two had ripped each other in the media for days leading up to the fight, but after the final bell, Mir had the common decency to make sure he was OK. And then they see things like Aoki's actions, and we look like idiots. The arm break, I can live with, because Hirota did not tap or verbally submit. Aoki has every right to work the hold until either one of those actions happens or, as eventually occurred, a limb breaks. That's just the reality of our sport, and Hirota is just as responsible for the broken limb as Aoki, as he could have tapped out and saved himself. (Warning: The video below contains obscene gestures.) But the actions afterward are all on Aoki. Regardless of what trash talk went on before the fight, you should have enough basic human compassion to realize that the unnatural sound that just came from your opponent's arm signifies something horrific has happened. At that point, you've won. You're the Alpha male in the fight. Your opponent is literally lying in submission at your feet. What does the middle finger prove? You can't kill someone twice, you know? People say, "It's fighting, not chess." Once the bell rings, it ceases to be fighting. Then, whether it's orchestrated for effect or an immature reaction, it's just you acting like a jerk. Maybe that's OK with Aoki. At 23-4 and as the DREAM lightweight champion, he has spoken of wanting a higher profile in the MMA world. A 77-second win over the Sengoku champion was impressive enough, but maybe this was his way of getting it for himself. Well, he got it. Everyone's writing and talking about him now. But there's a right way and a wrong way to do it. You want your higher profile? Here it is: talent of a mature champion, behavior of a cranky toddler. You may be a great athlete, but you're no sportsman
{"cc_dump":"CC-MAIN-2013-20","dolma2_qc":{"0":0.9928039312,"1":0.0072160712},"exact_duplicates":0,"lang":{"en":0.9668207169},"madlad":{"num_sentences":47,"rule.2":[44],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":774,"sa_remove_ranges":[[3924,4628]],"text_hash":"168400439294641880030267471136205142262","warc_content_type":"application\/http; msgtype=response","warc_date":"2013-05-21T19:23:46Z","warc_url":"http:\/\/www.mmafighting.com\/2009\/12\/31\/shinya-aokis-post-fight-behavior-after-breaking-hirotas-arm-cr","weborganizer":{"__label__art_and_design":null,"__label__electronics_and_hardare":null,"__label__fashion_and_beauty":null,"__label__food_and_dining":null,"__label__home_and_hobbies":null,"__label__industrial":null,"__label__software_development":0.0037172525,"__label__sports_and_fitness":0.9362950325,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__crime_and_law":0.0100235688,"__label__education_and_jobs":null,"__label__entertainment":0.0875738412,"__label__finance_and_business":0.0057402467,"__label__games":0.0926977769,"__label__politics":0.0293222275,"__label__science_math_and_technology":0.0154345557,"__label__social_life":0.0049154055,"__label__history_and_geography":null,"__label__adult_content":null,"__label__health":null,"__label__software":null,"__label__literature":0.0109969424,"__label__religion":null},"weborganizer_max":"__label__sports_and_fitness"}
null
null
null
null
null
null
4ac98773-74f5-427f-8f81-9bb635b86156
Add your News and Articles for free! » Home » Food / Beverage Wednesday, June 19, 2024 Berries Mix: The Ultimate Healthy Snack for Your Sweet Tooth Posted in: Food / Beverage Sat, May 27, 23, 17:24, 1 Year ago 0 out of 5 with 0 ratings comments: 0 - hits: 182 In addition to weight management, berries mix can also benefit your skin health greatly. Berries are known to be a great source of antioxidants and vitamins. Berries trail mix is a delicious and nutritious snack that is a popular choice for people who are looking for healthy snacking options. A healthy trail mix typically consists of a variety of nuts, seeds, and dried fruits. There are quite a few variants of trail mix and berries mix that offer several benefits for weight management, and skin health. Berries, including blueberries, strawberries, and cranberries, are low in calories and high in nutrients. Having berries even in the form of a trail mix makes them an excellent addition to any diet. They are also rich in antioxidants which are really good for your skin’s health. Berries contain high levels of fibre, which helps to promote healthy digestion and prevent constipation. Fiber also helps to reduce the risk of heart disease and other chronic conditions. One of the key benefits of adding berries trail mix or seed mix benefits you in healthy weight management. Trail mixes that have berries and mixed seeds are low in calories and high in fibre, which means that they can help to keep to curb any untimely craving that you might have. Fibre also aids in helping you to feel full for long periods of time. This will help you to reduce the overall amount of food that you consume throughout the day, which can lead to weight loss over time. Small changes like these go a long way in your weight management and fitness journey. In addition to weight management, berries mix can also benefit your skin health greatly. Berries are known to be a great source of antioxidants and vitamins. They have a high level of vitamin C, which can help in the production of collagen. Collagen helps to keep your skin looking youthful and healthy. Eating foods that are rich in vitamin C, such as berries, can help to promote healthy skin and reduce the signs of ageing. So when you can’t find seasonal and fresh berries, you can opt for healthy trail mixes that have berries and seeds for snacking. Another advantage of adding berries or seeds mix to your diet is that these are easy to eat even when you have a busy schedule. Trail mix is portable, easy to store, and can be eaten on the go. This makes it a great option for people who are looking for a healthy snack to take with them to work, school, or on a road trip. You can healthy trail mix at home as well. Berries trail mix can be made at home using a variety of nuts, seeds, and dried fruits. You can purchase pre-made berries or seed trail mixes at most grocery stores. When selecting berries trail mix, it is important to look for variants that are low in added sugars and high in nutrient density. Some pre-made trail mixes may contain added sugars, such as chocolate chips or candy pieces, which can add unnecessary calories to your diet. Look for trail mixes that contain a variety of nuts, seeds, and dried fruits, as well as a high percentage of berries. You can get a trail mix that has no added sugar, preservatives, or artificial flavouring. You can check the ingredients label to know what is added to the trail mix or berries mix that you are purchasing. If you are finding it difficult to find a trail mix in your locality, you can get a variety of trail mixes or berries mix and other healthy snacks online as well. These will be delivered to your doorstep and you can try different variants frequently as well. Having berries trail mix or seeds mix benefits in weight management and skin health. Berries are low in calories, high in fibre, and rich in antioxidants, making them an excellent addition to any diet. Berries trail mixes are a really convenient and portable snacking option that can be enjoyed on the go. So, you won’t have to stay hungry for way too long.  If you are looking for a healthy and delicious snack to add to your diet, consider trying berries trail mix. Your body will thank you for it and you will love the changes you will see in your skin when you consume berries regularly. About Author Member since Sep 26, 2022 Location: n/a User not following anyone yet. You might also like Using almond granola cereal, healthy trail mix, and other ingredients, here are some innovative ideas to assist you in making mouthwatering treats at home. Eating sweets frequently leaves you feeling incredibly guilty, which might prevent you from enjoying whatever you want to eat. The idea of nutritious sweets like healthy peanut butter holds the key to the answer. There isn't anything wrong with the straight snacking method or have them in trail mix that many individuals choose to use. Regardless of where you actually live on the globe, the likelihood is that you have heard about California almonds if you frequently buy and consume almonds be it to use in baking or to add to your quinoa snacks. Choosing nutritious snacks can be beneficial for individuals who are monitoring their weight and are aware of the drawbacks of munching on unhealthy junk food. Healthy snacks have arrived; they are not only low in calories but also rich in vitamins and minerals. Currently, there has been a much-needed change towards healthy eating as a result of people switching from a plant-based lifestyle to a low-calorie diet. When you're out for a hike or just want to whip up healthy savoury snacks, a trail mix is the perfect snack. But what goes into your trail mix? There are many different kinds of ingredients that can be used to make this concoction more interesting and delicious. Granola cereal is made from rolled oats, nuts, seeds and dried fruit. The base of granola is rolled oats. This means that you'll need to buy some beforehand if you're not already making your own. Quinoa and almond granola is a great snack option if you're looking for something that will keep you full, but not too heavy. If you're looking for an easy way to get some protein into your diet, this snack is perfect. If you're searching for a light snack that will keep you satisfied, try quinoa and healthy granola. This snack is ideal if you're searching for a quick method to increase your protein intake. Additionally, it contains healthy vitamins for your body, including vitamins E, B2, and B6. For those who are keeping an eye on their weight and are conscious of the potential dangers of snacking on unhealthy junk food, picking nutrient-dense snacks like granola cereal can be advantageous. We've all heard about the great benefits of almonds. But there still seems to be a lot of confusion about the topic of how one should use almonds. People moving from a plant-based living to a low-calorie diet have currently brought about a much-needed movement towards healthy eating. Are you looking for a healthy trail mix that is chewy and sweet, packed with good fats to leave you full, and will be ready in around five minutes without any baking required? People are finding it simpler to swap up their hearty breakfasts for sandwiches with healthy peanut butter as it supports a healthier lifestyle. Quinoa snacks and meals have a high concentration of anti-inflammatory phytonutrients, making it potentially good for human health in terms of illness prevention and also treatment. Most of us have more time to unwind, enjoy the weather and wonderful outdoors, and work out over the summer! It is always advisable to have a rather nutrient-dense snack like trail mix seeds to munch on throughout such days when we are being active. If you’re wondering is peanut butter healthy, know that it is progressively growing in popularity in Indian families as well due to its capacity to help individuals lose weight and build muscles. Quinoa, a gluten-free starchy grain alternative, is officially a seed related to chard, beet, and spinach, yet it frequently serves a purpose comparable to that of cereals in dishes. Having nutrient-dense treats like trail mix or seeds mix on hand to nibble on throughout these active days is usually a good idea. Are you seeking a nutritious trail mix that won't require baking, is chewy and sweet, packed with healthy fats to keep you full, and can be made in just five minutes? Trail mix is a convenient snack that can be easily transported and stored. A healthy trail mix is perfect for hiking, camping, or any other outdoor activity where you need a quick and nutritious snack. Granola is often touted as a healthy snack option due to its reputation for being high in fiber, protein, and other nutrients. Let me tell you the benefits of consuming granolas. Maintaining a healthy weight is essential for overall health and well-being. While weight loss can be challenging, making sustainable lifestyle changes will be helpful to maintain a healthy weight in the long run. Seeds mix is a blend of various seeds like chia, flax, pumpkin, sunflower, and sesame. Whereas the dried berry mix consists of different berries like strawberries, blueberries, raspberries, and blackberries. A premium quality healthy peanut butter has about 7 grams of protein for every 2 tbsp serving. Peanut butter has magnesium, zinc, vitamin B-6 all of which are great for your health. In a world where food is often consumed on the go or while watching TV or working, eating your food mindfully is important. In this fast-paced world, it is important to practise mindful eating. Mindful eating plays a crucial role in weight management. Two foods that are known for their nutritional benefits and versatility are granola and quinoa snacks. As a working mother, it can be challenging to find the time and energy to prepare wholesome snacks for your family. That's why these healthy savoury snacks are a great option. studies have shown that consuming healthy peanut butter can lead to a lower risk of heart disease and type 2 diabetes. Mixed seeds are not only a great addition to trail mix, but they can also be used to make a variety of breakfast items such as granola, bars, and other tasty treats. Investing in a healthy lifestyle isn't just good for your body; it's good for your mind too. By making small changes to your diet, you can improve your overall well-being and increase your productivity. To help you start your day right, we've compiled four quick and easy healthy breakfast options that are perfect for busy mornings. The power of a high protein breakfast lies in its ability to support cognitive function. Here are the benefits of buying healthy snacks online, including gluten-free options, and discover why it's an excellent choice for health-conscious individuals looking for delectable treats. While there are numerous ways to support brain health, one natural and delicious approach stands out: incorporating seeds mix into your daily diet. It's time to embark on a delicious journey of customization as we explore how you can create your perfect bowl of chocolate granola mix. Sugarfree chocolate has become a popular choice for health-conscious individuals, offering a delectable treat without the guilt. In recent years, a new health trend has taken the world by storm – roasted seeds mix. From health-conscious individuals to fitness enthusiasts, everyone seems to be raving about this nutrient-packed snack. Pure dark chocolate, derived from roasted cocoa beans, is a chocolate lover's dream come true. It contains a higher percentage of cocoa solids and a reduced amount of added sugars and fats, making it a healthier choice compared to its milk chocolate counterpart. Healthy sweet snacks are the solution to this quest for a healthy balance of enjoyment and well-being. Breakfast is the most essential meal of the day, and it also serves as a chance to establish a positive tone for the rest of the day. Gluten free cereal has grown in popularity as a way to cater to those who are gluten intolerant, but its appeal extends to a larger audience looking for healthier breakfast alternatives. The combination of roasted seeds mix is like a treasure trove of vital nutrients. Flaxseeds, chia seeds, pumpkin seeds, sunflower seeds, and other seeds are usually included in it.
{"cc_dump":"CC-MAIN-2024-26","dolma2_qc":{"0":0.9490146637,"1":0.0510053337},"exact_duplicates":0,"lang":{"en":0.957716167},"madlad":{"num_sentences":109,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":2145,"sa_remove_ranges":[],"text_hash":"62282377688323130807776894051265110086","warc_content_type":"text\/html","warc_date":"2024-06-19T09:18:03.000Z","warc_url":"https:\/\/www.articleted.com\/article\/630743\/167287\/Berries-Mix--The-Ultimate-Healthy-Snack-for-Your-Sweet-Tooth","weborganizer":{"__label__adult_content":0.00001,"__label__crime_and_law":null,"__label__fashion_and_beauty":0.000789366,"__label__finance_and_business":0.0003669706,"__label__games":null,"__label__health":0.6001983881,"__label__industrial":0.0005803158,"__label__religion":null,"__label__science_math_and_technology":null,"__label__software":null,"__label__history_and_geography":0.00001,"__label__literature":null,"__label__social_life":0.00001,"__label__sports_and_fitness":0.0013770254,"__label__education_and_jobs":null,"__label__home_and_hobbies":0.0154345557,"__label__politics":null,"__label__software_development":null,"__label__food_and_dining":0.3702353835,"__label__art_and_design":null,"__label__entertainment":null,"__label__electronics_and_hardare":null,"__label__transportation":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
eedecce5bc758ad9a4856162cf3d798d73fa2e59
#!/usr/bin/python # -*- coding: utf-8 -*- # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # Task description: # Find the greatest product of four numbers in grid 20x20 on any direction import random from functools import reduce # generate random grid length = 20 grid = [[ int(100 * random.random()) for i in range(length)] for i in range(length)] elements = 4 #straightforward algorithms. Just traverse grid and calculate products def largest_product_in_grid(grid): largest_product = [0] largest_items = [None] def calculate_product(): def product(items): return reduce(lambda x, y: x * y, items , 1) def check_largest(items, largest_product=largest_product, largest_items=largest_items): candidate = product(items) if candidate > largest_product[0]: largest_product[0] = candidate largest_items[0] = items[:] has_columns = column + elements <= length if has_columns: horizontal = [ grid[row][column + index] for index in range(elements)] check_largest(horizontal) has_rows = row + elements <= length if has_rows: vertical = [grid[row + index][column] for index in range(elements)] check_largest(vertical) if has_rows and column >= elements: diagonal_backward = [ grid[row + index][column - index] for index in range(elements)] check_largest(diagonal_backward) if has_rows and has_columns: diagonal_forward = [ grid[row + index][column + index] for index in range(elements)] check_largest(diagonal_forward) for row, line in enumerate(grid): for column, cell in enumerate(line): calculate_product() return largest_items[0], largest_product[0] print(('the greatest product of four adjacent numbers' '%s in the same direction is:%s') % largest_product_in_grid(grid))
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': 'eedecce5bc758ad9a4856162cf3d798d73fa2e59', 'language': 'Python', 'repo_name': 'connormclaud\/euler', 'path': '\/python\/Problem 011\/solution.py', 'src_encoding': 'UTF-8', 'length_bytes': 2666, 'score': 3.671875, 'int_score': 4, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":2666,"score":3.671875,"src_encoding":"UTF-8","repo_name":"connormclaud\/euler","detected_licenses":[],"int_score":4,"path":"\/python\/Problem 011\/solution.py","language":"Python","license_type":"no_license"}
null
null
null
42aeb81290ce54c88c7c490e322976bf6e281589
# Built-in imports from unittest import TestCase # 3rd-party imports import numpy as np # Local imports from pyRT_DISORT.observation.observation import Angles class TestAngles(TestCase): def setUp(self): self.angles = Angles self.random_int = np.random.randint(100, 200 + 1) class TestAnglesInit(TestAngles): def test_angles_has_7_known_attributes(self): example_angles = np.linspace(10, 50) test_angles = self.angles(example_angles, example_angles, example_angles) self.assertTrue(hasattr(test_angles, 'solar_zenith_angles')) self.assertTrue(hasattr(test_angles, 'emission_angles')) self.assertTrue(hasattr(test_angles, 'phase_angles')) self.assertTrue(hasattr(test_angles, 'mu')) self.assertTrue(hasattr(test_angles, 'mu0')) self.assertTrue(hasattr(test_angles, 'phi')) self.assertTrue(hasattr(test_angles, 'phi0')) self.assertEqual(7, len(test_angles.__dict__.keys())) def test_input_angles_cannot_be_ints(self): test_angles = np.array([1]) self.assertRaises(TypeError, lambda: self.angles(1, test_angles, test_angles)) self.assertRaises(TypeError, lambda: self.angles(test_angles, 1, test_angles)) self.assertRaises(TypeError, lambda: self.angles(test_angles, test_angles, 1)) def test_input_angles_cannot_be_floats(self): test_angles = np.array([1.5]) self.assertRaises(TypeError, lambda: self.angles(1.5, test_angles, test_angles)) self.assertRaises(TypeError, lambda: self.angles(test_angles, 1.5, test_angles)) self.assertRaises(TypeError, lambda: self.angles(test_angles, test_angles, 1.5)) def test_input_angles_must_have_same_shapes(self): more_angles = np.linspace(10, 20, num=50) fewer_angles = np.linspace(10, 20, num=25) self.assertRaises(ValueError, lambda: self.angles(more_angles, fewer_angles, fewer_angles)) self.assertRaises(ValueError, lambda: self.angles(fewer_angles, more_angles, fewer_angles)) self.assertRaises(ValueError, lambda: self.angles(fewer_angles, fewer_angles, more_angles)) self.angles(more_angles, more_angles, more_angles) def test_input_angles_must_be_1d(self): multi_dim_angles = np.ones((10, 10)) single_dim_angles = np.ones(10) self.assertRaises(IndexError, lambda: self.angles(multi_dim_angles, single_dim_angles, single_dim_angles)) self.assertRaises(IndexError, lambda: self.angles(single_dim_angles, multi_dim_angles, single_dim_angles)) self.assertRaises(IndexError, lambda: self.angles(single_dim_angles, single_dim_angles, multi_dim_angles)) self.angles(single_dim_angles, single_dim_angles, single_dim_angles) def test_solar_zenith_angles_must_be_between_0_and_180(self): test_angle = np.array([50]) # I'm not testing at 0 and 180 since I find np.sin(0) = 0 but np.sin(np.radians(180)) = 10**-16 # so instead I'm testing numbers just inside that range self.angles(np.array([10**-10]), test_angle, test_angle) self.angles(np.array([180-10**-10]), test_angle, test_angle) self.assertRaises(ValueError, lambda: self.angles(np.nextafter(np.array([0]), -1), test_angle, test_angle)) self.assertRaises(ValueError, lambda: self.angles(np.nextafter(np.array([180]), 181), test_angle, test_angle)) def test_emission_angles_must_be_between_0_and_90(self): test_angle = np.array([50]) self.angles(test_angle, np.array([10**-10]), test_angle) self.angles(test_angle, np.array([90-10**-10]), test_angle) self.assertRaises(ValueError, lambda: self.angles(test_angle, np.nextafter(np.array([0]), -1), test_angle)) self.assertRaises(ValueError, lambda: self.angles(test_angle, np.nextafter(np.array([90]), 91), test_angle)) def test_phase_angles_must_be_between_0_and_180(self): test_angle = np.array([50]) self.angles(test_angle, test_angle, np.array([0])) self.angles(test_angle, test_angle, np.array([180])) self.assertRaises(ValueError, lambda: self.angles(test_angle, test_angle, np.nextafter(np.array([0]), -1))) self.assertRaises(ValueError, lambda: self.angles(test_angle, test_angle, np.nextafter(np.array([180]), 181))) def test_mu_is_same_shape_as_emission_angles(self): test_emission_angles = np.linspace(10, 80, num=self.random_int) test_other_angles = np.linspace(20, 70, num=self.random_int) angles = self.angles(test_other_angles, test_emission_angles, test_other_angles) self.assertEqual(test_emission_angles.shape, angles.mu.shape) def test_mu_is_cosine_of_emission_angles(self): test_angles = np.array([50]) self.assertRaises(FloatingPointError, lambda: self.angles(test_angles, np.array([0]), test_angles)) self.assertEqual(np.sqrt(2) / 2, self.angles(test_angles, np.array([45]), test_angles).mu[0]) self.assertAlmostEqual(0, self.angles(test_angles, np.array([90]), test_angles).mu[0]) def test_mu0_is_same_shape_as_solar_zenith_angles(self): test_solar_zenith_angles = np.linspace(10, 80, num=self.random_int) test_other_angles = np.linspace(20, 70, num=self.random_int) angles = self.angles(test_solar_zenith_angles, test_other_angles, test_other_angles) self.assertEqual(test_solar_zenith_angles.shape, angles.mu0.shape) def test_mu0_is_cosine_of_solar_zenith_angles(self): test_angles = np.array([50]) self.assertEqual(np.sqrt(2) / 2, self.angles(np.array([45]), test_angles, test_angles).mu0[0]) self.assertAlmostEqual(0, self.angles(np.array([90]), test_angles, test_angles).mu0[0]) self.assertAlmostEqual(-np.sqrt(2) / 2, self.angles(np.array([135]), test_angles, test_angles).mu0[0]) def test_phi_is_same_shape_as_phase_angles(self): test_phase_angles = np.linspace(10, 80, num=self.random_int) test_other_angles = np.linspace(20, 70, num=self.random_int) angles = self.angles(test_other_angles, test_other_angles, test_phase_angles) self.assertEqual(test_phase_angles.shape, angles.phi.shape) def test_phi_meets_test_cases(self): self.assertEqual(151.57138881902853, self.angles(np.array([10]), np.array([10]), np.array([10])).phi[0]) self.assertEqual(237.2957795130823, self.angles(np.array([10]), np.array([20]), np.array([30])).phi[0]) def test_phi0_is_same_shape_as_phase_angles(self): test_phase_angles = np.linspace(10, 80, num=self.random_int) test_other_angles = np.linspace(20, 70, num=self.random_int) angles = self.angles(test_other_angles, test_other_angles, test_phase_angles) self.assertEqual(test_phase_angles.shape, angles.phi0.shape) def test_phi0_is_always_0(self): test_phase_angles = np.linspace(10, 80, num=self.random_int) test_other_angles = np.linspace(20, 70, num=self.random_int) angles = self.angles(test_other_angles, test_other_angles, test_phase_angles) self.assertTrue(np.all(angles.phi0 == 0))
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '42aeb81290ce54c88c7c490e322976bf6e281589', 'language': 'Python', 'repo_name': 'GEOGUXM\/pyRT_DISORT', 'path': '\/pyRT_DISORT\/observation\/tests\/test_angles.py', 'src_encoding': 'UTF-8', 'length_bytes': 7114, 'score': 3.015625, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":7114,"score":3.015625,"src_encoding":"UTF-8","repo_name":"GEOGUXM\/pyRT_DISORT","detected_licenses":[],"int_score":3,"path":"\/pyRT_DISORT\/observation\/tests\/test_angles.py","language":"Python","license_type":"no_license"}
null
null
null
3bcb0f10-b8de-4d2e-9fcb-e910b833662d
Drag 3D Warehouse link into SketchUp Can we get back the support for dragging the download link from 3D Warehouse in an external browser directly into SketchUp to load components? Until some year ago this was possible and there was no need to use the internal browser or Component inspector. Then from one day to the next this topped working. I suspect due to a change in the warehouse, but it could also be a silent browser update (God, I hate silent updates). The components dragged into SketchUp this way got odd names like “attachment; filename=Untitled; filename_=utf-8’'Untitled#1” that Dynamic Components couldn’t handle, which may be why the useful behavior was sadly removed (I’d rather have the bugged DCs removed). External browser are superior in every ways over the internal one as they support tabs, bookmarks, copying/pasting full addresses, minimize to taskbar, not closing once you place a component and so much more. If you’re using SketchUp 2016 or earlier on Microsoft Windows, this message is for you Yes, I noticed it too, a bug was filed a while back, and I’ll update in another thread in this forum when we push the fix. Is this a reply to my comment or some other comment? In direct response to this. For Warehouse, it’s issue 10877. The model information page in 3D Warehouse seems to have been updated recently but this still doesn’t work. In fact it is even further from working as the downloads “links” are no longer actual links and can’t be dragged at all. In my previous video the links could be dragged but SketchUp no longer recognized them when dropped. Do the people who work on the EW front end know this is a logged issue? I would be very happy if this was fixed. The only practical way to use the EW that I know of is to open 20 or so search results in new tabs, based on how well their thumbnails look, and then go through the tabs and eliminate all that are too badly drawn or to large, based on the preview image and model statistics. This workflow requires a proper standalone browser with tabs. Placing models from the external browser was so much more connivent than having to temporarily save them somewhere, browse to that location, and drag them into SketchUp from there. Btw, having “fake” links (not actual a elements) prevents middle mouse button clicks, right click > Copy link address and more from working. It’s a bit annoying with elements that appears to be of one type but doesn’t function that way. I think that this may be an intended change. I seem to remember questions here in the forum, which I thought were innocent at the time, about “scraping” the 3DW download menu for model download links. The quester indicated it was for an extension for downloading their specific models. So I helped answer their questions. It now occurs to me that this activity could be not so innocent. Ie, abused to set up a mirror warehouse that draws model files from Trimble’s 3DW. So now it appears that the information used to download files from 3DW has been purposefully obfuscated. Because of this I’m not comfortable further discussing the specifics of how. It’s possibly behind an internal API. Another innocent reason could be that the new 3DWH has been developed more like a web app. “JavaScript links” have been common for long time in web development to catch the click event and handle it e.g. within the page (single page app). But some websites still keep URLs in the href (instead of href="#") to keep the semantics and compatibility when JS is disabled. So it could be added back… I wonder, if the HTML5 drag&drop API allow to pass arbitrary text content with a dragged element to another app, one could pass a skp URL that can be dragged into SketchUp. Never thought of that but is a very reasonable explanation. I’ve suspected the change was because of a bug in Dynamic Components. When dragging and dropping links into SketchUp, components were cryptically named. I think the name was a part of the URl or a JSON string or some other odd thing. Anyhow, the name seamed to trigger a javascript error in Dynamic Components. Rather than just accepting the DC plugin can’t handle components loaded this way and live with it because DC is totally broken anyway, I’m suspecting this way to download models were removed as a workaround. This is however just speculations. I’d love to hear what actually happened. Maybe the download link could when dragged instead resemble the link to the information page itself, and SketchUp could internally parse that link and fetch the right model version? This would however require a change in the SketchUp core, and would only affect new mayor versions. Since the behavior changed from one day to the next, with no SketchUp update, I’d hope it could be resolved the same way. We would hope that holding and dragging would fire a separate event that could have it’s own behavior form a normal click. The internal SketchUp browser frames see a different user agent string than a standalone browser instance with the 3DW loaded, so the behavior could change because the server could server different pages. I just was reading up on the registry settings for the MS WebBrowser control and there is a setting that will enable multiple tabs. I switched it on by adding the correct attribute in SU2016, then restarted SketchUp and tried it out in an internal 3DW window. It did enable the right click context “Open in new tab” item, but it opened the link in an external instance of full MSIE. And to make things worse, the pages did not work well, (missing images, etc.) and the Download button did not work at all. So that line of interest is a bust (besides v2016 going to beyond EOL this coming November.)
{"cc_dump":"CC-MAIN-2018-47","dolma2_qc":{"0":0.9998381138,"1":0.0001819128},"exact_duplicates":0,"lang":{"en":0.9458148479},"madlad":{"num_sentences":52,"rule.2":[],"rule.5":[0,11,21,22,26,39,42,50],"status":"survived"},"minhash":null,"original_word_count":1012,"sa_remove_ranges":[],"text_hash":"51621796847486691814232853009069537321","warc_content_type":"application\/http; msgtype=response","warc_date":"2018-11-19T20:07:22Z","warc_url":"https:\/\/forums.sketchup.com\/t\/drag-3d-warehouse-link-into-sketchup\/71191","weborganizer":{"__label__adult_content":null,"__label__education_and_jobs":0.008587487,"__label__entertainment":null,"__label__finance_and_business":null,"__label__games":0.0088573545,"__label__home_and_hobbies":0.0073558274,"__label__social_life":null,"__label__software":0.6150978804,"__label__software_development":0.5621865392,"__label__travel_and_tourism":null,"__label__crime_and_law":0.0088573545,"__label__health":null,"__label__industrial":null,"__label__politics":0.0132328207,"__label__science_math_and_technology":0.0474358723,"__label__transportation":null,"__label__art_and_design":0.0179962143,"__label__electronics_and_hardare":0.0080719916,"__label__food_and_dining":null,"__label__history_and_geography":null,"__label__literature":null,"__label__religion":null,"__label__fashion_and_beauty":null,"__label__sports_and_fitness":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
fee300f1-a667-4f3e-b19c-2ee94ae54666
"Not so fast, pee-wee! This trail is rated NK-13 and no kid under 13 can ride without a parent." —The Ski Captain to Johnny The Behemoth is a large ski trail seen in the episode Downhill Johnny. in the episode, Johnny wants to ski down it, but the Ski Captain prevents him from doing so, due to Johnny being under the age of 13 and not having a parent to accompany him. The Behemoth is extremely steep; realistically, it would be almost impossible to ski down it correctly (or safely) due to it being almost completely vertical. Hugh is extremely afraid of skiing down the Behemoth; he agrees to accompany Johnny to the trail, but ends up not actually skiing on it when they go there, foiling Johnny's attempt at getting to ski down the trail.
{"cc_dump":"CC-MAIN-2018-13","dolma2_qc":{"0":0.8876078129,"1":0.1124121919},"exact_duplicates":0,"lang":{"en":0.9670683146},"madlad":{"num_sentences":5,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":139,"sa_remove_ranges":[],"text_hash":"322648219860009980985172030221106908287","warc_content_type":"application\/http; msgtype=response","warc_date":"2018-03-24T11:47:34Z","warc_url":"http:\/\/johnnytest.wikia.com\/wiki\/The_Behemoth","weborganizer":{"__label__education_and_jobs":null,"__label__entertainment":0.5000100136,"__label__finance_and_business":null,"__label__games":0.0953594595,"__label__home_and_hobbies":0.0005984087,"__label__politics":null,"__label__science_math_and_technology":null,"__label__social_life":0.0009499437,"__label__software_development":null,"__label__sports_and_fitness":0.9740526676,"__label__fashion_and_beauty":null,"__label__health":null,"__label__art_and_design":null,"__label__literature":0.0024826226,"__label__crime_and_law":0.0012165896,"__label__adult_content":0.0011087309,"__label__electronics_and_hardare":null,"__label__transportation":null,"__label__history_and_geography":0.0012943083,"__label__industrial":null,"__label__software":null,"__label__religion":null,"__label__travel_and_tourism":0.0021927168,"__label__food_and_dining":null},"weborganizer_max":"__label__sports_and_fitness"}
null
null
null
null
null
null
6d32c988-ab79-4edf-9b0c-c67cef8bc325
Enables the utmost tuning accuracy. The CM-300 clip-type contact mic for tuners directly captures the sound of your instrument The CM-300 is a clip-type contact microphone that attaches directly to your instrument. It uses a piezo element that sends the vibrations of your instrument directly to your tuner. Even when you’re in an environment with high ambient sound, such as a large ensemble, this mic allows high-precision tuning. The shape of the cable’s strain relief where it joins the unit has been modified for increased durability in comparison to the previous model, and sound transmission performance has been further improved. Redesigned cable that’s even more durable and resistant to stress The cable provides highly efficient sound transmission, and the sheath has been improved for softness, so that it can now curve flexibly. At the junction where the cable joins the clip, the strain-relief slits have been redesigned to reduce stress on the wire, making it more durable and long-lasting. Clip section that allows stable attachment to a variety of instruments The clip opens to a maximum width of 30 mm. The rubber inside the clip is shaped in a way that allows attachment to any type of instrument. It can be attached lightly but firmly to a variety of instruments, including to the bell of a brass instrument, the bridge of a violin, or the head of a guitar or ukulele. Available in three attractive color variants The lineup consists of three models: black, white/black, and black/red. Choose the color that matches the tuner unit you’re using! Find a dealer near you! Product subject to availability
{"cc_dump":"CC-MAIN-2022-49","dolma2_qc":{"0":0.9915768504,"1":0.0084431702},"exact_duplicates":3,"lang":{"en":0.9227924347},"madlad":{"num_sentences":14,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":276,"sa_remove_ranges":[],"text_hash":"229252302779896614559109561171353927844","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-11-29T07:52:33Z","warc_url":"https:\/\/www.korgmiddleeast.com\/cm-300\/","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":0.0009499437,"__label__electronics_and_hardare":0.4921981394,"__label__finance_and_business":null,"__label__games":null,"__label__health":0.0038344827,"__label__home_and_hobbies":0.0351548418,"__label__science_math_and_technology":0.0396488421,"__label__software":0.0037172525,"__label__software_development":null,"__label__industrial":0.0244330931,"__label__sports_and_fitness":null,"__label__transportation":0.0251888447,"__label__travel_and_tourism":null,"__label__adult_content":null,"__label__history_and_geography":null,"__label__art_and_design":0.0351548418,"__label__entertainment":0.173298195,"__label__fashion_and_beauty":null,"__label__food_and_dining":null,"__label__politics":null,"__label__social_life":null,"__label__literature":null,"__label__religion":null},"weborganizer_max":"__label__electronics_and_hardare"}
null
null
null
null
null
null
c747b770-f067-437a-9c58-d1eb6a2195cd
Tech & Science Gene Therapy Might Be the Best, and Perhaps Only, Chance at Curing Brain Diseases 05/06/16 In the Magazine Gene therapy fixes an illness caused by a faulty gene by replacing or supplementing a healthy new copy of it. Lawrence Lawry/Science Source Dominic Gessler lifts two squirming mice from their cages. Sherri Epstein flinches, but Gessler coaxes her to hold out her hands. He places the small animals in her palms, and they skitter in tiny circles, tickling her skin. “Now,” says Gessler. “Which one used to have Canavan disease?” A few miles away, at Epstein’s home in Worcester, Massachusetts, a young woman lies in bed, her thin limbs bent and still, her curly red hair splayed across a pillow. This is Rachel, Epstein’s 17-year-old daughter, born with Canavan disease—a debilitating, fatal brain disorder. As a newborn, Rachel opened her mouth as if to scream but made no sound. As an infant, she never moved in her sleep. When Rachel failed to lift her head by six months of age, an early intervention therapist suspected she had cerebral palsy. Epstein wishes it had been so. Instead, Rachel had inherited a mutated version of a gene called ASPA from each of her parents. Without a healthy copy of that gene, her cells could not produce a protein needed to break down acid in the brain. So the acid built up, then slowly ate away at the insulation protecting Rachel’s neurons, turning her white matter into a sponge pocketed with fluid-filled sacs. As a result, Rachel does not talk; she cannot see or control her limbs or other bodily functions; she has seizures and will likely not live to adulthood. There is no treatment and no cure for Canavan disease. Yet standing in a room at the University of Massachusetts Medical School, Epstein holds a mouse that once had the same symptoms as Rachel—but now runs effortlessly over her outstretched fingers. Weeks before, the mouse was treated with a single intravenous injection of a gene therapy drug developed in the lab of Gessler’s doctoral adviser, microbiologist Guangping Gao. The drug is the fruit of Gao’s 23-year career in gene therapy. Gao did not always believe the drug would ever make it out of the laboratory, because the field of gene therapy has been plagued with seemingly insurmountable obstacles, including the deaths of test subjects. Over the past five years, however, there has been a resurgence of gene therapy in neuroscience. Scientists now argue it is our best, and perhaps only, chance at curing many diseases of the brain. And attuned to the multibillion-dollar potential of this new class of drugs, large pharmaceutical companies including Novartis, Shire, AstraZeneca and GSK are joining the fray. More than 20 biotech companies are currently developing viral gene therapies while others are working to directly edit genes. “Gene therapies are coming along fast and furious. They’re going to earn their place,” says Kevin Starr, co-founder of Third Rock Ventures, a venture capital firm invested in three gene therapy companies. “We are probably in the greatest innovative period of understanding human disease and how to make cures ever.” 05_06_Brain_GeneTherapy_02 Gene therapy is being touted as a possible cure for those suffering from Canavan disease like this boy, center, in Sterup, Germany. Robert Seeberg/Agencja Fotograficzna Caro/Alamy A FedEx Truck to the Brain The concept of gene therapy is straightforward, beautiful even: Fix an illness caused by a faulty gene by replacing or supplementing a healthy new copy of the gene. In other words, use genes as medicine. For example, one of the earliest human tests of gene therapy was in 1990, when two young girls with severe combined immunodeficiency (SCID) received repeated infusions of their own white blood cells modified to fix a defective gene. It worked—with continued treatments, both children showed signs of a restored immune system and went on to lead normal lives. Gao first met a Canavan patient in 1993, at a party celebrating his discovery of the gene and mutations that caused the disorder. A family wheeled over their 6-year-old with Canavan disease to the young scientist, who realized that the boy had donated tissue to his research project. “I’d held his DNA in my hands. I had found what was wrong with his DNA,” recalls Gao, then a Ph.D. student. Yet he had no way to fix it. At that moment, “I knew what I would do for the rest of my life—find a cure for the disease,” says Gao. “And other than gene therapy, there was no other way.” Gene therapy is well-suited for treating inherited brain diseases. First, most drugs can’t get through the brain’s formidable blood-brain barrier, but something small, like a virus with a healthy gene tucked inside, can do it. Additionally, the brain is a closed compartment, so the risks of gene therapy are minimized—other parts of the body, the liver or the lungs, say, are undisturbed. In the early ’90s, Gao was a student without a lab of his own. So he sought out James Wilson at the University of Pennsylvania, a rising star in the field of gene therapy. For the next 13 years, Gao would work for Wilson, engineering new and better viruses for the therapies, called “viral vectors.” These molecular FedEx trucks can be loaded with healthy versions of genes and deliver them to the correct location in the body. Gao was in the right place at the right time. By 1999, more than 115 gene therapy clinical trials were approved in the U.S, ranging in illnesses from cancer to blood disorders to graft-versus-host disease. Wilson eagerly moved from the lab into human trials, starting with five studies utilizing a modified version of an adenovirus, a common virus known to cause respiratory infections in people. One of those trials enrolled a teenager named Jesse Gelsinger. Gelsinger suffered from a genetic liver condition kept under control with pills and diet, but he volunteered for the study to help find a cure for infants with a fatal form of his disorder. When Gelsinger received the gene therapy in September 1999, the adenoviral vector triggered a violent immune response that damaged his liver and shut down his lungs. Four days after the injection, he was dead. His death shuttered gene therapy funding and research in the United States. Europeans continued on, buoyed by an announcement in 2000 that gene therapy had cured a group of 20 children with SCID. But within a few years, five of them had developed leukemia from the treatment. One died, and scientists fled the field. Gao, who was not directly involved in the clinical trial that led to Gelsinger’s death, doesn’t like to talk about it now, saying only that he doesn’t blame Wilson. Gao kept his head down and quietly continued to work on other types of safer viral vectors. The most promising candidate was adeno-associated virus (AAV)—a virus that grows in the presence of adenovirus but is a completely different type. AAVs are not quite as efficient as adenoviruses at getting genes into human cells, but they are much safer: The human immune system barely notices the virus’s outer coat or “dress,” as Gao calls it. And AAVs do not integrate into the genome of human cells, which is what caused leukemia in some of the SCID patients. In 2008, Gao struck out on his own, taking a job as director of a brand-new gene therapy center at UMass. The paint on his office walls was still wet when Sherri Epstein walked in. A part-time administrative assistant in the building next door, Epstein had seen Gao’s appointment in a local newspaper. Epstein introduced herself and told Gao about Rachel and her previous attempt at gene therapy. Five years earlier, doctors running the first-ever Canavan gene therapy trial drilled six tiny holes into Rachel’s skull, inserted thin catheters and delivered their drug to parts of her brain. It was safe, but it didn’t work. 05_06_Brain_GeneTherapy_03 Guangping Gao checks the results in the final stages of a gene vector for cystic fibrosis in the Molecular Biology Lab at the Hospital at the University of Pennsylvania, in 2014. He and scientist Dominic Gessler (not pictured) have developed a gene therapy treatment that has cured Canavan disease in two different strains of mice. The last barrier is the $10-12 million needed to launch the first human clinical trials. Bonnie Weller/KRT/Newscom Not long after that initial meeting, Epstein brought Rachel to visit the lab. Once again, Gao was standing in front of a desperate parent and dying child. At the time, only one gene therapy had been commercially approved in the world: a cancer drug in China. Regulators in the U.S. and Europe were highly skeptical of the safety and efficacy of such treatments. Gao knew he had to be careful and was determined to not repeat the errors of his predecessors by rushing into human trials. Instead, he spent the next eight years methodically producing a novel gene therapy for Canavan disease. He has spent over $2 million in federal and university research funds developing and testing it in hundreds of mice with the disease. Gao's graduate student Seemin Ahmed initiated the lab work in 2010, and accomplished a proof-of-concept with a first-generation gene therapy that could partially rescue the disease, based on AAV9, an ideal AAV vector to get into the brain. The AAV9 therapy is so good at slipping into the brain that one can deliver the drug intravenously into the blood, and it passes through the blood-brain barrier to penetrate all areas of the brain. No drilling into the skull required. Gessler, a young German scientist studying to be a neurosurgeon, joined the project in 2012 and has since built on Ahmed's work, optimization the therapy with an improved gene construct that produces 10 times as many copies of the needed protein as earlier versions. Gessler will never forget the first time he tested the optimized therapy in a live animal. He injected it into a young, sick mouse, hunched over with no control over its muscles. When Gessler returned to assess the results, he couldn’t find the mouse. He worried he had mislabeled a cage. He hadn’t. The mouse was there, acting just as healthy as the control mice. Today, the treatment has cured Canavan disease in two different strains of mice engineered to have the disease. A dozen freezers line the long hallway in Gao’s laboratory, each filled to the brim with preserved tissues and viruses. “We have the therapy. We are ready,” says Gao, grinning like a schoolchild. The last barrier is financial but not impossible to overcome. Gao estimates it will require $10 million to $12 million to launch the first human clinical trials—but the potential profits are already attracting biotech attention. Two companies, which Gao declined to name, have approached him about getting involved in the effort. Making the Billion-Dollar Bet The office of Voyager Therapeutics in Cambridge, Massachusetts, epitomizes a trendy startup: glass doors, whiteboard walls, minimalist orange-accented décor and a communal area with free drinks and snacks. It smells like caffeine and money. But unlike tech startups, this office is flanked on either side by laboratories full of microscopes and viruses. The company is developing gene therapies for a handful of central nervous system disorders, including Parkinson’s, Huntington’s and Lou Gehrig’s disease. Voyager CEO Steven Paul has worked in the pharmaceutical industry developing drugs for brain disorders for over 35 years and witnessed the tribulations of gene therapy. He’s ardent that now is finally the right time. Investors agree. Venture firms have invested more in gene therapy since 2010 than they did during the whole previous decade, and therapies for the brain far and away lead the pack, according to Dow Jones VentureSource. Last February, when Voyager was just a year old, it inked a deal with Genzyme for $100 million up front and up to $745 million in future milestone payments, including for the company’s severe brain disease programs. Voyager followed that with $60 million in investor financing in April and an $81 million initial public offering in November. Philadelphia-based Spark Therapeutics, developing gene therapies for rare eye diseases, accumulated $268 million in funding after going public in just two years and scoring a sizable licensing deal with Pfizer. Cambridge-based Bluebird Bio ended last year with a whopping $866 million in cash and cash equivalents. It used to be that Big Pharma wasn’t interested in rare diseases: “Companies thought these markets were too small,” says Paul. But with the right price tag, even a therapy sold to only a few hundred patients can make billions. Glybera, the first European-approved gene therapy, sparked pricing debates when it debuted at $1.4 million per shot. While insurance companies and health care providers struggle to figure out what they are willing and able to recommend and pay for, there’s no doubt a market exists. Gene therapy investments have become so abundant that some academics are turning from government support toward venture capital. R. Jude Samulski, who developed the first AAVs for gene therapy back in the 1980s, recently founded a biotech company in North Carolina, Bamboo Therapeutics, to tap into that revenue stream. It is developing therapies for rare genetic diseases that result in progressive nerve death, including Duchenne muscular dystrophy, Canavan disease, Friedreich’s ataxia and giant axonal neuropathy. The company expects to begin human trials as soon as next year. Europe is beginning to see a trickle of gene therapy approvals, including a green light in April for a treatment of type of SCID. The U.S. field waits on an influx of positive clinical data. “Gene therapy will have a product in the U.S. approved by the FDA within two years,” says Gao. “For sure.” That will mostly likely be a treatment for the eyes; this past October, Spark had a Phase III win when a gene therapy to correct an inherited form of blindness successfully restored vision to the “maximum possible benefit” in 21 patients, according to the company. It plans to seek FDA approval for the treatment this year. Bluebird is also in late-stage development of a gene therapy for the Lorenzo’s Oil disease, adrenoleukodystrophy, which, like Canavan’s, targets white matter in the brain. The therapy, Lenti-D, is performed on cells outside of the body: The company removes blood stem cells from bone marrow of a patient, treats them with a gene therapy in a dish, then washes out the virus, tests the gene-modified cells and re-infuses them into the patient’s body. For all the recent improvements, gene therapy will not be a cure-all. For instance, the approach is less likely to improve diseases where more than one gene is implicated or the cause is not known. In conditions like Parkinson’s disease and Alzheimer’s disease, for example, the approach may lead to symptomatic relief, but not a cure. And the risks have not entirely dissipated. “You always have to think of benefit versus risk with any therapy,” says Paul. “We pick diseases where the risk of not treating is very bad.” Most children with Canavan disease die before age 10, though some survive into their 20s and 30s. While Gao and Gessler believe their therapy will be most effective in newborn infants who test positive for the mutation, they also can’t forget Rachel and other older Canavan patients. With them in mind, Gessler recently decided to test whether the therapy might also work for older mice. How long could he wait after a mouse had developed the disease to treat and still rescue it? Gessler administered the therapy in sick teenage mice (6 weeks old in human time), adult mice (12 weeks) and mature mice (24 weeks). Then he waited, nervously. On a cold, bright day in February, I catch up with Gessler in Gao’s sixth-floor corner office. He is smiling. “We just got the one-year data for the six-week-treated mice,” Gessler says. “They are completely normal.” After meeting with Gessler, I travel an hour north to a pediatric nursing home where Rachel now lives—a utilitarian brick building tucked behind Main Street in a quaint Massachusetts town. Rachel is lying in bed beneath a purple blanket, a unicorn pillow at her feet. An episode of Friends plays in the background. Epstein is painting Rachel’s nails when I arrive. She adjusts the TV monitor closer to Rachel’s face. “She’s legally blind, but I think she understands everything,” says Epstein. She eventually asks about Gessler’s experiments treating older mice, a hint of hope in her voice. Epstein is not desperate—she has accepted Rachel’s lot in life—but like any parent, she will always desire the best for her child. I tell her about the recent mouse results, and she smiles. The sun outside is setting, and Epstein returns to painting her daughter’s nails, a bright bubble gum pink.
{"cc_dump":"CC-MAIN-2017-13","dolma2_qc":{"0":0.9945538044,"1":0.0054662228},"exact_duplicates":3,"lang":{"en":0.9649018049},"madlad":{"num_sentences":148,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":2854,"sa_remove_ranges":[],"text_hash":"204487362929269702112948506025797111129","warc_content_type":"application\/http; msgtype=response","warc_date":"2017-03-23T08:26:12Z","warc_url":"http:\/\/www.newsweek.com\/2016\/05\/06\/gene-therapy-brain-disease-453217.html?utm_source=internal&utm_campaign=belowcontent&utm_medium=related1","weborganizer":{"__label__adult_content":null,"__label__education_and_jobs":0.0017646141,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.012831213,"__label__health":0.7490972281,"__label__history_and_geography":null,"__label__politics":0.0009499437,"__label__science_math_and_technology":0.1294127256,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__entertainment":0.0019367349,"__label__games":null,"__label__home_and_hobbies":0.0009210511,"__label__literature":0.0024067315,"__label__religion":null,"__label__art_and_design":0.0004020418,"__label__crime_and_law":0.0006562032,"__label__software":null,"__label__software_development":null,"__label__electronics_and_hardare":null,"__label__industrial":null,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__food_and_dining":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
abb6bf5f-7a98-432b-b8ba-d67d72e34e87
WhatsApp: +86 19166273143 | emma.tan@tkbkl.com custom mould MAIN SERVICES Being a mold making supplier with over 15 years experiences in the mold industry allows TKB to provide one stop service including prototyping, mold design, material selection, mold manufacturing, injection molding, logo printing, related parts sourcing, assembly and packing. About custom mould Forming is a manufacturing process that involves the use of a fixed frame to shape a liquid or malleable raw material; known as a mold or matrix. A mold is usually a cavity container, usually made of metal, into which a liquid plastic, metal, ceramic or glass material is poured. A mold is a hollow block used to set the shape of the product being manufactured. It can be made of different materials, the most common being aluminum, steel, alloys and copper. It also has different components. These components include pins, bases, lifters, ejectors, guides, bushings and alignment devices. Molds can be made of rigid materials such as plaster or plastic resin, or more commonly flexible materials such as rubber. The choice of material to use should take into account the material of the model, the material used to make the casting, and whether there is any undercutme Appliance Molding Parts By Emma 2023-4-23 Introduction: Home appliances are an integral part of our daily lives, and they require regular maintenance to keep them in top condition. One of the critical components of home appliances is the mold... Injection Mold Components: Essential Parts for Plastic Manufacturing By Emma 2023-6-1 Injection molding is a widely used method for producing plastic products in large quantities. The process involves injecting molten plastic material into a mold cavity, which is then cooled and solidi... Gate Injection Molding: Revolutionizing the Manufacturing Industry By Emma 2023-7-4 Introduction: Gate injection molding is a groundbreaking manufacturing technique that has revolutionized the way products are made across various industries. This advanced method allows for efficient ... Exploring the Benefits and Applications of Insert Mold Technology By Emma 2023-6-10 Insert molding, also known as overmolding, is a process where a preformed component or insert is placed into a mold cavity, and molten material is injected to create a finished product with the insert... Unveiling the Technology Behind Large Plastic Molds: Crafting Precision and Innovation By Emma 2023-11-28 In the realm of plastic manufacturing, where precision meets innovation, large plastic molds stand as the unsung heroes, shaping the very foundation of the industry. In this segment, we embark on a jo... Designing a Contemporary Plastic Chair Mold for Modern Living Spaces By Emma 2023-7-24 In today's fast-paced world, contemporary living spaces are becoming more popular than ever. With changing lifestyles and preferences, the need for innovative and stylish furniture has increased. One ... Creating Complex Plastic Molds for Large Scale Production By Emma 2023-8-18 Introduction In today's manufacturing industry, the demand for high-quality plastic products is ever-increasing. To meet this demand, manufacturers rely on the production of complex plastic molds that... Designing the Perfect Plastic Chair Mould: A Masterpiece of Innovation in English By Emma 2023-6-30 Plastic chairs have become an integral part of our daily lives. Whether it's at home, in the office, or even in public spaces, plastic chairs offer comfort and convenience. Behind the scenes, however,... Injection Molding for Automotive Parts: Manufacturing with Precision and Efficiency By Emma 2023-6-7 Injection molding is a manufacturing process that is widely used in the automotive industry to shape parts with high precision and efficiency. It involves injecting a molten material, typically thermo... Automotive Molding Parts: Enhancing Efficiency and Precision in Manufacturing By Emma 2023-7-6 Introduction: The automotive industry has witnessed significant advancements in manufacturing processes over the years. One such innovation that has revolutionized the production of automotive parts i...
{"cc_dump":"CC-MAIN-2024-46","dolma2_qc":{"0":0.0237532072,"1":0.976266861},"exact_duplicates":0,"lang":{"en":0.9120702147},"madlad":{"num_sentences":37,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":800,"sa_remove_ranges":[[1242,2160]],"text_hash":"59043932134851963723634814051727790313","warc_content_type":"text\/html","warc_date":"2024-11-14T13:04:48.000Z","warc_url":"https:\/\/www.tkbmold.com\/custom-mould.html","weborganizer":{"__label__electronics_and_hardare":0.0024067315,"__label__fashion_and_beauty":0.0012548432,"__label__finance_and_business":null,"__label__food_and_dining":null,"__label__games":null,"__label__health":0.0088573545,"__label__history_and_geography":null,"__label__industrial":0.9740526676,"__label__politics":null,"__label__science_math_and_technology":0.061885979,"__label__crime_and_law":null,"__label__education_and_jobs":0.0023331624,"__label__home_and_hobbies":0.0566624328,"__label__software":null,"__label__transportation":0.0009797518,"__label__software_development":null,"__label__art_and_design":0.008587487,"__label__sports_and_fitness":0.0015111822,"__label__adult_content":null,"__label__travel_and_tourism":null,"__label__entertainment":null,"__label__religion":null,"__label__social_life":null,"__label__literature":null},"weborganizer_max":"__label__industrial"}
null
null
null
null
null
null
857e790a9d06bdaf83c3100cf101ac67b897a4f2
def rev(s): if len(s)==0: return s else: return rev(s[1:]) + s[0] print(rev(input("enter a string:")))
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '857e790a9d06bdaf83c3100cf101ac67b897a4f2', 'language': 'Python', 'repo_name': 'Prashant-Bharaj\/A-December-of-Algorithms', 'path': '\/December-24\/python_AkshayaRC.py', 'src_encoding': 'UTF-8', 'length_bytes': 136, 'score': 3.75, 'int_score': 4, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":136,"score":3.75,"src_encoding":"UTF-8","repo_name":"Prashant-Bharaj\/A-December-of-Algorithms","detected_licenses":[],"int_score":4,"path":"\/December-24\/python_AkshayaRC.py","language":"Python","license_type":"no_license"}
null
null
null
5ed57593-9c26-4bed-b5ff-d60435fcfe3d
Kids Kindness… Here we are into another month of sheltering in place. As you stroll through your neighborhood, look around to see if April showers really did bring May flowers. The warmer days will allow us to spend more time outdoors whether it’s gardening, playing, or visiting via social distancing. There have been many stories in the news and in conversations with friends & family about the different ways people…and kids…are reaching out to share a little joy and kindness with each other. This post will highlight a few things you could do with your family and neighbors. Kindness kisses from Arizona! Chalk art, messages, and games- whether on fences, driveways or sidewalks- are all ways to leave positive messages to anyone passing by. Why not use this opportunity to encourage others to join in random fun? There are even fun ways to learn! Some people have created sensory or exercise activities with sidewalk chalk. There are a ton of ideas in the links below: No chalk? No problem! You can make your own sidewalk chalk with a few ingredients you probably have at home. Here are 2 recipes to try: For a different twist, try setting up a “silly walk” zone…then sit back and laugh as people participate from inspiremore.com: You have no doubt seen many websites and links to help with keeping children engaged and learning while at home, but here is one more for you. This parenting site has quite a few links to for virtual visits and activities to investigate: I have a few more ideas to share, so check back for Kids Kindness, Part 2. Remember to visit us online for our own activities and updates while you stay safe! Hope to see you soon…..
{"cc_dump":"CC-MAIN-2020-34","dolma2_qc":{"0":0.9995885491,"1":0.0004314239},"exact_duplicates":1,"lang":{"en":0.9602017999},"madlad":{"num_sentences":17,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":293,"sa_remove_ranges":[],"text_hash":"161612046006323968505832797292076695772","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-08-08T20:53:43Z","warc_url":"https:\/\/www.newlenoxlibrary.org\/youth-services-blog\/2020\/05\/kids-kindness\/","weborganizer":{"__label__food_and_dining":null,"__label__health":0.00592107,"__label__history_and_geography":null,"__label__home_and_hobbies":0.2942249775,"__label__politics":null,"__label__religion":0.0185565669,"__label__social_life":0.939923346,"__label__sports_and_fitness":0.004765199,"__label__transportation":null,"__label__travel_and_tourism":0.0149670839,"__label__adult_content":null,"__label__art_and_design":0.0028109273,"__label__crime_and_law":null,"__label__entertainment":null,"__label__finance_and_business":null,"__label__games":null,"__label__literature":null,"__label__education_and_jobs":0.0780881643,"__label__science_math_and_technology":0.0055649248,"__label__fashion_and_beauty":null,"__label__software":0.0064982711,"__label__software_development":null,"__label__industrial":null,"__label__electronics_and_hardare":null},"weborganizer_max":"__label__social_life"}
null
null
null
null
null
null
037ce2a1-3f07-44a4-a64e-229dcfd527f5
The Great Salt Debate - Lakeside Natural Medicine Natural Health and Wellness for the Whole Family The Great Salt Debate BySarah Axtell, ND March 19, 2017 Despite its bad press, salt is critical to maintain optimal health. Sodium is essential for many biological processes, including blood pressure control, transportation of nutrients in and out of cells, and the maintenance of proper nerve transmission. Here is what you should know about this mineral: Salt Sensitivity and Blood Pressure When it comes to salt, many people naturally think about its effect on blood pressure. Certainly a low sodium diet can help in salt-sensitive individuals. Salt sensitivity is a measure of how your blood pressure responds to salt intake. It is estimated that 15% of white individuals are salt-sensitive, and 27% of black individuals are salt sensitive. So if you have high blood pressure, or hypertension, and you’ve been told to restrict salt, it may help a small subset of the population (the salt-sensitive individuals). But for others, a sodium restricted diet will not necessarily impact blood pressure. So many other factors play a role in the underlying etiology of hypertension, such as activity level, sugar consumption, genetics and stress. Heart Disease and Salt- Too Much AND Too Little Can Be Contributing Factors The body has built in mechanisms to prevent sodium from dropping too low. When you get too little salt, your body releases hormones to conserve the sodium you have. But these hormones have been found to promote inflammation in your arteries and other organs. This can explain findings of a new study that found that sodium intake below 3,000 mg per day (or 1 1/3 teaspoons of salt) was associated with an increased risk of stroke, heart attack and cardiovascular disease- regardless of whether a person had high or normal blood pressure. A 2014 review published in the American Journal of Hypertension found that daily sodium intake below 2,645 mg or above 4,954 mg was associated with an increased risk of mortality. Salt and Stress People with adrenal fatigue often crave salt. I encourage these individuals to honor this craving as salt can be nourishing to the adrenal glands. Salt cravings in people with adrenal fatigue can primarily be explained by low aldosterone. With chronic stress and a resultant state of exhaustion, the adrenal glands fail to produce adequate amounts of cortisol, adrenaline and aldostertone. Lack of aldosterone can disrupt the electrolyte (sodium) balance at a cellular level. This results in salt cravings, low blood pressure, light-headedness, an irregular heartbeat, fatigue, muscle weakness, and dehydration. Increasing your salt intake is one way to help restore these imbalances. Salt and Stomach Acid Stomach acid is hydrochloric acid (HCl)and salt is sodium chloride. Consuming the right amount of salt helps you produce adequate amounts of HCl. You need HCl to absorb nutrients like magnesium, calcium and B12, to sterilize the gut and kill bacteria and to help denature proteins so they can be broken down by the digestive enzyme pepsin. See here for more information on the importance of stomach acid. Recommended Amount of Sodium There is a balance when it comes to sodium intake. Consuming 5,000 mg daily is too much and can in fact increase your risk of chronic disease. But as evidenced in the studies cited above, too little may also be damaging. A general recommendation for good health is to aim for 3,000-4,000 mg per day. If you have high blood pressure, congestive heart failure, kidney disease, diabetes, or are African American, it is recommended you monitor your sodium intake talk and talk to your doctor about the adequate amount for you. If in fact you are sodium-sensitive, for example, the 3,000-4,000 mg recommended amount may be too much for you to control your blood pressure. Not all Salt is Created Equally- Choose Wisely. Eighty percent of salt is consumed from processed foods. The type of salt in processed foods is highly refined. I recommend unrefined salt, such as himalayan sea salt. Himalayan sea salt contains over 84 minerals and trace elements. In addition to sodium, himalayan salt contains magnesium copper, iron and potassium. Table salt, however, just contains sodium (and iodine if it has been fortified). Refined table salt also contains preservatives and aluminum derivatives, and it undergoes a harmful bleaching process. Himalayan salt however is unadulterated. So don’t be afraid to shake up your salt at the table by replacing your nutrient-devoid table salt with this pink salt rockstar. Editor’s Note: The information in this article is intended for your educational use only. Always seek the advice of your physician or other qualified health practitioners with any questions you may have regarding a medical condition and before undertaking any diet, supplement, fitness, or other health program. Sign up for our newsletter:
{"cc_dump":"CC-MAIN-2023-14","dolma2_qc":{"0":0.99816221,"1":0.001857742},"exact_duplicates":5,"lang":{"en":0.9217448235},"madlad":{"num_sentences":44,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":804,"sa_remove_ranges":[],"text_hash":"231905767785791231382942544163009287675","warc_content_type":"text\/html","warc_date":"2023-03-27T09:22:25.000Z","warc_url":"https:\/\/lakesidenaturalmedicine.com\/blog\/the-great-salt-debate\/","weborganizer":{"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__health":0.9983615279,"__label__history_and_geography":null,"__label__home_and_hobbies":0.0016584827,"__label__industrial":0.0007196704,"__label__politics":0.0011795105,"__label__science_math_and_technology":0.0179962143,"__label__social_life":null,"__label__sports_and_fitness":0.0020607433,"__label__crime_and_law":0.000529305,"__label__education_and_jobs":null,"__label__software_development":null,"__label__entertainment":null,"__label__food_and_dining":0.0015111822,"__label__religion":0.0010749628,"__label__software":null,"__label__finance_and_business":0.0015111822,"__label__literature":null,"__label__games":null,"__label__travel_and_tourism":null,"__label__art_and_design":null,"__label__transportation":null,"__label__electronics_and_hardare":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
c3faab61-04fb-4e06-895b-8d9a9b2093db
```// Efficient Method (Based on KADANE's ALGORITHM) : Time Complexity : O(n) import java.util.*; import java.io.*; class GFG { static int normalMaxSum(int arr[], int n) { int res = arr[0]; int maxEnding = arr[0]; for(int i = 1; i < n; i++) { maxEnding = Math.max(maxEnding + arr[i], arr[i]); res = Math.max(maxEnding, res); } return res; } static int overallMaxSum(int arr[], int n) { // Normal Sum int max_normal = normalMaxSum(arr, n); if(max_normal < 0) return max_normal; int arr_sum = 0; // Circular Sum for(int i = 0; i < n; i++) { arr_sum += arr[i]; arr[i] = -arr[i]; } int max_circular = arr_sum + normalMaxSum(arr, n); return Math.max(max_circular, max_normal); } public static void main(String args[]) { int arr[] = {8, -4, 3, -5, 4}, n = 5; System.out.println(overallMaxSum(arr, n)); } } // Naive Method : Time Complexity : O(n^2) static int maxCircularSum(int arr[], int n) { int res = arr[0]; for(int i = 0; i < n; i++) { int curr_max = arr[i]; int curr_sum = arr[i]; for(int j = 1; j < n; j++) { int index = (i + j) % n; curr_sum += arr[index]; curr_max = Math.max(curr_max, curr_sum); } res = Math.max(res, curr_max); } return res; }``` ```// Efficient Method : Time Complexity : O(n) import java.util.*; import java.io.*; class GFG { static int maxEvenOdd(int arr[], int n) { int res = 1; int curr = 1; for(int i = 1; i < n; i++) { if((arr[i] % 2 == 0 && arr[i - 1] % 2 != 0) ||(arr[i] % 2 != 0 && arr[i - 1] % 2 == 0)) { curr++; res = Math.max(res, curr); } else curr = 1; } return res; } public static void main(String args[]) { int arr[] = {5, 10, 20, 6, 3, 8}, n = 6; System.out.println(maxEvenOdd(arr, n)); } } // Naive : Time Complexity : O(n^2) static int maxEvenOdd(int arr[], int n) { int res = 1; for(int i = 0; i < n; i++) { int curr = 1; for(int j = i + 1; j < n; j++) { if((arr[j] % 2 == 0 && arr[j - 1] % 2 != 0) ||(arr[j] % 2 != 0 && arr[j - 1] % 2 == 0)) curr++; else break; } res = Math.max(res, curr); } return res; }``` ```// Efficient Method (KADANE's ALGORITHM) : Time Complexity : O(n) import java.util.*; import java.io.*; class GFG { static int maxSum(int arr[], int n) { int res = arr[0]; int maxEnding = arr[0]; for(int i = 1; i < n; i++) { maxEnding = Math.max(maxEnding + arr[i], arr[i]); res = Math.max(maxEnding, res); } return res; } public static void main(String args[]) { int arr[] = {1, -2, 3, -1, 2}, n = 5; System.out.println(maxSum(arr, n)); } } // Naive : Time Complexity : O(n^2) static int maxSum(int arr[], int n) { int res = arr[0]; for(int i = 0; i < n; i++) { int curr = 0; for(int j = i; j < n; j++) { curr = curr + arr[j]; res = Math.max(res, curr); } } return res; }``` star Mon Feb 07 2022 13:18:10 GMT+0000 (UTC) https://practice.geeksforgeeks.org/problems/max-circular-subarray-sum-1587115620/1/?track=DSASP-Arrays&batchId=190 #java #gfg #geeksforgeeks #lecture #arrays #subarray #kadane #circularsubarray #subarraysum #maximumsum star Mon Feb 07 2022 13:03:29 GMT+0000 (UTC) https://practice.geeksforgeeks.org/problems/longest-subarray-of-evens-and-odds/1/?track=DSASP-Arrays&batchId=190 #java #gfg #geeksforgeeks #lecture #arrays #subarray #kadane #longestevenoddsubarray #maximumlength star Mon Feb 07 2022 12:51:57 GMT+0000 (UTC) https://practice.geeksforgeeks.org/problems/kadanes-algorithm-1587115620/1/?track=DSASP-Arrays&batchId=190# #java #gfg #geeksforgeeks #lecture #arrays #maximumsubarraysum #subarray #kadane
{"char_count":3444,"int_score":3.0,"crawl":"CC-MAIN-2022-49","token_count":1176,"score":2.890625,"content_mime_type":"text\/html","warc_record_length":5165,"warc_record_offset":1099285340,"warc_filename":"crawl-data\/CC-MAIN-2022-49\/segments\/1669446710488.2\/warc\/CC-MAIN-20221128070816-20221128100816-00506.warc.gz","language_score":0.1610947549,"snapshot_type":"latest","fetch_time":1.669620812e+18,"language":"en","original_metadata":{"\/images\/math\/codecogs":0,"align":0,"codecogs_latex":0,"equation":0,"found_math":false,"img_math":0,"katex":0,"math-container":0,"math_alttext":0,"math_annotations":0,"mathjax_asciimath":0,"mathjax_display_tex":0,"mathjax_inline_tex":0,"mathjax_tag":0,"mathml":0,"mathtex.cgi":0,"mimetex.cgi":0,"script_math_asciimath":0,"script_math_tex":0,"texerror":0,"wp-katex-eq":0,"wp_latex":0,"x-ck12":0}}
https://www.thiscodeworks.com/tag/subarray
null
null
null
null
null
80b27e50-a559-46bf-9cc7-f4ead5ff7c79
Prince Harry Apache Attack: Incredible Leaked Footage (VIDEO) 21/12/2012 12:30Prince Harry: From 0 To 28 In 71 Pictures Suggest a correction
{"cc_dump":"CC-MAIN-2017-34","dolma2_qc":{"0":0.0001273191,"1":0.9998927116},"exact_duplicates":10,"lang":{"en":0.9130352139},"madlad":{"num_sentences":10,"rule.2":[9],"rule.5":[],"status":"survived"},"minhash":{"cc_id":7197425664155.0,"cc_idx":1.0,"cc_size":2.0},"original_word_count":210,"sa_remove_ranges":[[80,1119]],"text_hash":"334248261811444747836160696346018450453","warc_content_type":"application\/http; msgtype=response","warc_date":"2017-08-22T02:03:53Z","warc_url":"http:\/\/www.huffingtonpost.co.uk\/2012\/12\/21\/prince-harry-apache-spoof-video-mashed_n_2344232.html","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":null,"__label__entertainment":0.7248802781,"__label__fashion_and_beauty":0.00001,"__label__finance_and_business":null,"__label__literature":null,"__label__religion":null,"__label__social_life":0.00001,"__label__software":null,"__label__travel_and_tourism":null,"__label__adult_content":0.00001,"__label__food_and_dining":null,"__label__games":null,"__label__history_and_geography":0.011697256,"__label__home_and_hobbies":0.00001,"__label__politics":0.00001,"__label__sports_and_fitness":0.0061075627,"__label__health":null,"__label__science_math_and_technology":0.0019367349,"__label__crime_and_law":0.000529305,"__label__transportation":null,"__label__electronics_and_hardare":null,"__label__software_development":null,"__label__industrial":null},"weborganizer_max":"__label__entertainment"}
null
null
null
null
null
null
0fe43c0b-15ca-4284-9a95-773c6b9be0c0
Interview with Log Analysis Software Coralogix’s CEO Ariel Assaraf Thought leader in the anomaly detection software space, Ariel dives into Coralogix’s roadmap for the year and related tech bytes 1. Tell us about your role as co-founder and CEO of Coralogix and your journey into the tech domain? We started Coralogix after years of having to deal with unmanageable log data. It seemed like other solutions in the space were too focused on helping you slice and dice log data, and no one was focused on providing insights out of the box. Prior to launching Coralogix and after completing my military service commitment, I started working for a multinational corporation with huge software projects in more than 120 countries. The pain of identifying bugs / problems, fixing them, and delivering new versions was a huge challenge. Since there were very few well-established tools for this market, me and my business partner (and friend) decided to leave that company and start Coralogix. My roommate at the time, who had just graduated with an MSc in Neuroscience and Machine Learning, joined us as a data scientist and Yoni Farin, presently our CTO, joined us to form our core team. 2. How has the log management / analytics market changed in the last decade? When we originally launched Coralogix back in 2015, the market was not mature and companies were mainly concerned with aggregating their logs under a single solution. Our pitch about Machine Learning and anomaly detection sounded like a pipe dream and not something that companies were concerned with at that time. Fast forward to five years later and we are seeing unprecedented demand for anomaly detection, CI/CD (continuous integration / continuous delivery) into existing systems, and synergy with metrics.  3. What are the current challenges in this space? As companies scaled and built their logging and monitoring stacks, they found themselves aggregating huge amounts of data, which is extremely expensive. Today, we’re seeing more customers having to tradeoff coverage for pricing or trying to rely solely on metrics, which can never be enough. 4. How has AI and ML changed log management / analytics? ML is not broadly implemented in log analytics tools yet. It has the potential of identifying issues in log data long before they reflect in lagging indicators such as metrics and traces. ML can also play a valuable role in reducing the amount of log data that needs to be kept in order for a company to achieve coverage.  5. Do you think the rise of cloud-native technologies and microservices has made logging more difficult? It has actually made it more essential. Microservices, not to mention serverless computing, have made software more flexible and scalable, but also more complex and “chatty”. This calls for a new approach in logging to emerge. We definitely see it affecting the market and pushing it to innovate.  6. CI / CD is a huge trend right now. Can you tell us Coralogix’s role in this? Three years ago, we decided CI/CD will not only give automatic insights, but it will also provide them in a contextual way. In the CI/CD era, any insight had to be tied to a specific version or deployment. That’s why, Coralogix can be integrated with any CI/CD platform to understand new version upgrades and create an automatic benchmark on each deployment.  7. We recently saw Coralogix partnering with Instana. How did that come about and what does it mean for the industry? The monitoring market is going through some major consolidation. There are products offering full platforms that are far from being the best in their field, but rather offer a complete set. We decided to partner with Instana, which in our opinion is the best of breed in its space. We are offering it together with Coralogix, so that people can choose the best of breed products and still have them working together. There is much more to come on this front, by the way.  8. What do you think will be the next big breakthrough in technology? With 5G coming, we will be seeing more technology companies getting into telecom now that it’s all about software. There are many opportunities there for SaaS and cloud providers, especially for monitoring and security companies.  9. What advice would have for a company or an individual starting out in your space? It’s a very mature space with professionals who know exactly what they want. It’s not enough to build an MVP anymore. Companies are expecting a wide coverage of use cases, so make sure you build a solid platform to begin with.  For DevOps professionals in general, my recommendation is to learn about the organization you want to work for thoroughly, identify, and understand its pain points, and then determine how technology can address them. Always keep in mind that DevOps is the link between business operations and engineering. When it is performed well, DevOps plays a mission-critical and impactful role within a company. Ariel Assaraf A veteran of the Israeli Intelligence Corps Unit 8200, Ariel Assaraf founded log analysis software solution company Coralogix in 2014 following his stint at Verint. In his own words, he wanted “to change how people analyze their operations, applications, infrastructure, and security data – one log at a time.” Related posts Interview with Andrei Papancea, Co-founder and CEO at NLX.ai AI TechPark Interview with Michael Jaszczyk, CEO at GK Software USA AI TechPark Interview with CTO Elie Melois of LumApps Employee Communication System AI TechPark
{"cc_dump":"CC-MAIN-2021-43","dolma2_qc":{"0":0.9988396764,"1":0.0011803207},"exact_duplicates":0,"lang":{"en":0.9650839567},"madlad":{"num_sentences":56,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":919,"sa_remove_ranges":[],"text_hash":"89366483036042527234424989795825334452","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-10-17T12:41:01Z","warc_url":"https:\/\/ai-techpark.com\/interview-with-log-analysis-software-coralogixs-ceo-ariel-assaraf\/","weborganizer":{"__label__adult_content":null,"__label__art_and_design":null,"__label__education_and_jobs":0.0164130311,"__label__electronics_and_hardare":0.0132328207,"__label__history_and_geography":null,"__label__industrial":0.0083257789,"__label__science_math_and_technology":0.2751397192,"__label__social_life":null,"__label__software":0.2120788097,"__label__software_development":0.4688006341,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.2227101624,"__label__games":0.0014203583,"__label__home_and_hobbies":null,"__label__literature":null,"__label__sports_and_fitness":null,"__label__crime_and_law":0.0016584827,"__label__politics":null,"__label__health":null,"__label__transportation":0.0015111822,"__label__entertainment":null,"__label__religion":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
55c7fe7a17d5a7978d346470d75995877c34b8d3
We describe geometric representatives for the generators of the cohomology ring of a model of the classifying space for the functor $K^{-1}$. The class corresponding to the degree one generator is closely related to the spectral flow of a one-parameter family of self-adjoint, Fredholm operators. We use intersection theory to derive localization formulae that express the cohomological index of a higher dimensional family of such operators as the Poincare dual of an explicit 0-cycle in the parameter space. We derive, under certain conditions, an equality that relates the cohomological index to the variation of the family of kernels. 1. Introduction The motivation behind this article was three-fold. On one hand we had in mind to generalize to infinite dimensions the results of [18] in which the author builds certain geometrical representatives for the “fundamental” cohomology classes of the finite unitary group. On the other hand, we wanted to explain the new results in the context of “classical” index theory. The emphasis is on families of self-adjoint, Fredholm operators, hence complex, odd $K$-theory. We learned from [7] that this problem was posed by I. Singer [27] in the mid-1980s. Lastly, we sought to derive certain index theoretic consequences coming from the explicit description of the geometrical objects used to define the cohomology classes. These consequences have as their guiding example the related interpretations of the spectral flow as an isomorphism between the set of integers and $K^{-1}(S^1)$ on one hand, and as a count with sign of the 0-eigenvalues of a generic $S^1$-family of self-adjoint, Fredholm operators, on the other. The case of even $K$-theory has been treated in various forms in several works [16, 24], while the odd case, which requires, if not a different paradigm, at least different objects and approach has not appeared in the literature, in our knowledge. The technique of analytic currents of Hardt, used by Nicolaescu in [18] to build homology classes is not available in the infinite-dimensional context. Instead, inspired by [14], we were led to use sheaf cohomology which provides an ideal framework for dealing with stratified objects. The constraints imposed by working in infinite dimensions had the beneficial effect of forcing us to develop a better understanding of certain processes that pertain to symplectic topology (see Section 4). There are many models for the classifying space of $K^{-1}$, the most well known being certain subgroups of the unitary group of operators acting on a complex, separable Hilbert space $H$, subgroups introduced by Palais [23]. It turns out that a more convenient class of classifying spaces is one that has a symplectic flavor. Concretely, we fix a Hilbert space $H$ and we investigate the grassmannian $\text{Lag}$ of hermitian lagrangian subspaces of $\hat{H} := H \oplus H$. These are closed subspaces $L \subset \hat{H}$ that satisfy $JL = L^\perp$, where $J$ is the obvious extra complex structure on $\hat{H}$. The space $\text{Lag}$ is a real, Banach manifold and we extend to infinite dimensions a result of Arnold (see Th. 3.1) which gives a canonical diffeomorphism between the full unitary group and the full Lagrangian Grassmannian. The Lagrangian Grassmannian $\text{Lag}$ contains a distinguished open set $\text{Lag}^-$, consisting of Lagrangian subspaces which are Fredholm pairs with the vertical space $H^- := 0 \oplus H$. We use symplectic techniques to prove that it has the homotopy type of $U(\infty)$ (see Th. 4.2). In fact, the same proof can be used to show that the Lagrangian Grassmannian $\text{Lag}_{\text{Fred}}^-$ whose projection on the vertical axis is compact (or trace class, etc.), is classifying for $K^{-1}$. This Lagrangian Grassmannian corresponds via Arnold’s isomorphisms to the Palais group of unitary operators of type $1 + \text{compact}$ (or $1 + \text{trace class}$, etc.) and hence we get a new proof for the results of Palais [23]. Working with Lagrangians has the added bonus that it provides an elegant way for dealing with closed, self-adjoint, unbounded operators simply because the graph of such an operator is Lagrangian. This observation leads to a natural connection with a different classifying space, a certain connected component, $\text{BFred}_*$, of the space of bounded, self-adjoint, Fredholm operators, introduced by Atiyah and Singer in [3]. This opens the gates for dealing with the second problem: the connection with index theory. In fact, one can use Nicolaescu’s results to prove that the graph inclusion $\text{BFred}_* \hookrightarrow \text{Lag}^-$, which takes an operator to its graph, is a weak homotopy equivalence. The advantage that $\text{Lag}^-$ has over the Atiyah–Singer classifying space is that it allows one to work freely with unbounded operators. Moreover, it enlarges --- $^1$Unbounded means, as usual, possibly unbounded. the class of families of operators one can take into account, because the continuity of the graphs is a weaker requirement than the notion of continuity in the Atiyah–Singer classifying space, namely the one requiring that the family of zeroth order operators naturally associated to the initial family be continuous — the so-called Riesz continuity (see Section 10). The differential topology of $\mathcal{Lag}^-$ is very rich and can be understood in great detail. By fixing a complete, decreasing flag on the vertical Lagrangian, $$H^- \supset W_1 \supset W_2 \supset \cdots$$ we get a decreasing filtration of $\mathcal{Lag}^-$ with open subsets $\mathcal{Lag}^{W_i}$ consisting of clean Lagrangians. $$\mathcal{Lag}^{W_i} := \{ L \in \mathcal{Lag}^- \mid L \cap W_i = \{0\} \text{ and } L + W_i \text{ closed} \}.$$ We prove that each of these open sets is the total space of an infinite-dimensional vector bundle over a finite dimensional Lagrangian Grassmanian, hence by Arnold’s theorem, over a finite dimensional unitary group. The natural projection of this bundle has a symplectic description: it is given by a symplectic reduction process. In fact, this result holds more generally for the finite codimensional submanifolds of $\mathcal{Lag}^-$ $$\mathcal{Lag}^{W_i}_k := \{ L \in \mathcal{Lag}^- \mid \dim L \cap W_i = k, \text{ and } L + W_i \text{ closed} \}$$ with the only difference that the base space of the fibration is a product of finite unitary group with an infinite complex Grassmannian (see Proposition 4.3, Th. 4.1 and Cor. 4.1). Things get even better. The complement $\overline{Z}_{i+1}$ of each $\mathcal{Lag}^{W_i}$ have a simple description in terms of incidence relations which brings to mind the Schubert varieties of the complex Grassmannian, $$\overline{Z}_{i+1} := \{ L \mid \dim L \cap W_i \geq 1 \}.$$ In fact, $\overline{Z}_{i+1} \subset \mathcal{Lag}^-$ admits a stratification $\overline{Z}_{i+1} = F_0 \supset F_2$ such that the top stratum $Z_{i+1} = F_0 \setminus F_2$ is a finite codimensional, naturally cooriented submanifold of $\mathcal{Lag}^-$, and $\overline{Z}_{i+1}$ does not have singularities in codimension one, i.e., $F_1 = F_2$. It turns out that these conditions are enough to induce a cohomology class $[\overline{Z}_{i+1}] \in H^{2i+1}(\mathcal{Lag}^-, \mathbb{Z})$. On the other hand, every cohomology class in $\mathcal{Lag}^-$ is uniquely determined by its restrictions to the finite unitary groups $U(n)$ which come with natural inclusions (induced by the flag and Arnold’s theorem) to $\mathcal{Lag}^-$. It turns out that the classes $[\overline{Z}_i]$ pull-back to some canonical generators \( x_i \in H^{2i-1}(U(n), \mathbb{Z}) \) of the cohomology ring of \( U(n) \), generators apriori defined as transgression classes. Concretely, \[ x_i := \int_{S^1} c_i(E_n), \] where \( E_n \to S^1 \times U(n) \) is a certain canonical rank \( n \) complex vector bundle (see Th. 6.1). We exploited this fact to relate \( Z_i \) to the cohomological index of a family of self-adjoint, Fredholm operators. We arrived at the following result. \textbf{Theorem 1.1.} The \( 2k-1 \)-th component of the cohomological index of a continuous family of unbounded, self-adjoint, Fredholm operators \( F : M \to S\text{Fred} \) is a rational multiple of the geometric class \(( \tilde{\Gamma} \circ F)^*[Z_k] \) where \( \tilde{\Gamma} : S\text{Fred} \to \text{Lag}^- \) is the (switched) graph map. In fact, the following relation holds: \[ \text{ch}_{2k-1}[F] = \frac{(-1)^{k-1}}{(k-1)!} (\tilde{\Gamma} \circ F)^*[Z_k]. \] As an application to the previous result, we consider generic families of self-adjoint, Fredholm operators parametrized by a closed, odd-dimensional manifold and we give an explicit expression for the Poincaré dual of the top cohomology class obtained by pulling back the relevant geometric class via the classifying map. These are the localization formulae for which the spectral flow corresponds to the degree one cohomology class. The typical result is the following \textbf{Theorem 1.2.} Let \( M \) be a closed, oriented manifold of dimension \( 2k-1 \), let \( F : M \to S\text{Fred} \) be a smooth family of self-adjoint, Fredholm operators and let \( W \subset H \) be a codimension \( k-1 \) subspace such that \( F \) is in general position with respect to \( W \). Denote by \( M_W \) the set \( M_W := \{ p \in M \mid \dim \ker (F(p)) \cap W = 1 \} \). Then \[ \text{PD ch}_{2k-1}([F]) = \frac{(-1)^{k-1}}{(k-1)!} \sum_{p \in M_W} \epsilon_p p, \] where \( \text{PD} \) means Poincaré dual and \( \epsilon_p \) is the sign of a certain \((2p-1) \times (2p-1)\) determinant. In order to find \( \epsilon_p \) we needed a concrete description of the normal bundle of the Schubert cell \( Z_k \), description from which the coorientability of \( Z_k \) can be easily deduced. A different type of localization formula is possible. If the parameter manifold has dimension three, then in generic conditions, the top cohomology class is related to the chern class of the line bundle of kernels, which lives over a closed, oriented two-dimensional submanifold. Proposition 1.1. Let $M$ be a closed, oriented manifold of dimension 3 and let $T : M \to S\text{Fred}$ be a generic family. Then $M^1 := \{ m \in M \mid \dim \text{Ker} \, T_m = 1 \}$ is a closed, cooriented surface. Let $\gamma \subset M^1 \times H$ be the tautological line bundle over $M^1$ with fiber $\gamma_m = \text{Ker} \, T_m$. Then $$\int_M T^* [\mathbb{Z}_2] = \int_{M^1} c_1 (\gamma^*).$$ For what generic means check Definition 10.5 and Lemma 10.2. The results presented here are based on the author’s dissertation [8] to which we refer several times in this paper, especially when dealing with certain results whose proofs would have clouded our main line of presentation. Several people encouraged me to write this paper. First and foremost, my gratitude goes to Liviu Nicolaescu, my thesis advisor, who has been not only a guide and a source of inspiration but also a friend. My heartfelt thanks go to those people who manifested interest for this work among them being Nigel Higson, Stephan Stolz, Steve Rosenberg, Stuart Ambler and Florin Dumitrescu. This paper is dedicated to my parents for all their love and support. 2. The Lagrangian Grassmannian We start by introducing the main object of study, the space of lagrangian subspaces of a fixed complex Hilbert space endowed with an additional complex structure. In this section, we summarize basic definitions and properties of this space, most of them fairly standard. A fair body of work has been carried out dealing with spaces that carry the name of Lagrangian Grassmannian, ever since Arnold introduced the notion in 1967 in [1]. However, in the infinite-dimensional, complex context, there are not so many places where one can find a detailed study of these spaces. We mention here the work of Booss–Bavnbek and Zhu [6] and of Kirk and Lesch [15]. While there is a certain overlap with each of these papers, we preferred, for the convenience of both the reader and the writer to present the results that we needed later on with their proofs included. A standard reference for the basic definitions concerning self-adjoint operators on a Hilbert space is [25]. Definition 2.1. Let $H$ be a separable, complex Hilbert space and let $\hat{H} = H \oplus H$. We denote by $H^+$ (resp. $H^-$) the space $H \oplus 0$ (resp. $0 \oplus H$) and call it the horizontal subspace (resp. the vertical subspace). Notation: We will use the letters $B$, $U$, resp. Sym for bounded, resp. unitary, resp. bounded, self-adjoint operators. We will refer in brackets to the Hilbert space on which these operators act. Let $J: \hat{H} \to \hat{H}$ be the unitary operator which has the block decomposition relative $\hat{H} = H \oplus H$ $$J = \begin{pmatrix} 0 & 1 \\ -1 & 0 \end{pmatrix}.$$ Notice that $J$ satisfies $J = -J^* = -J^{-1}$. Definition 2.2. A complex subspace $L \subset \hat{H}$ is called Lagrangian if $JL = L^\perp$. The (hermitian) Lagrangian Grassmannian, $\mathcal{Lag}(\hat{H}, J)$ or simply $\mathcal{Lag}$ is the set of all lagrangian subspaces of $\hat{H}$. Remark 2.1. Notice that $JL = L^\perp$ implies that $L$ is closed since $L^\perp$ is always closed and $J$ is unitary. Remark 2.2. The alternative use of the adjective “Hermitian” is related to the fact that the notion of a Lagrangian Grassmannian of a complex vector space already appears in the literature, e.g. in [10]. The underlying structure in [10] is a non-degenerate, skew symmetric, bilinear form $\omega$. The symplectic structure in our case, $\omega := \langle J(\cdot), \cdot \rangle$ is sesquilinear and hence skew symmetric in the hermitian sense, i.e., $\langle J(x), y \rangle = -\overline{\langle J(y), x \rangle}$. As a consequence, our $\mathcal{Lag}$ is only a real manifold. Example 2.1. (i) Each one of the two subspaces $H^\pm$ is a lagrangian subspace and $JH^\pm = H^\mp$. (ii) Let $T : D(T) \subset H \to H$ be a closed self-adjoint operator, bounded or unbounded $T : D(T) \subset H \to H$. We will carefully distinguish between the graph of $T$ $$\Gamma_T := \{(v, Tv) \mid v \in D(T)\}$$ and the switched graph of $T$: $$\tilde{\Gamma}_T := \{(Tw, w) \mid w \in D(T)\}.$$ They are both Lagrangian subspaces in $\hat{H}$. The odd Chern character and index localization formulae The Lagrangian Grassmannian is naturally endowed with a topology as follows. To each Lagrangian $L$ one associates the orthogonal projection $P_L \in \mathcal{B}(\hat{H})$ such that $\text{Ran} \, P_L = L$. The condition that $L$ is a Lagrangian translates into the obvious relation $$JP_L = P_{JL}J = P_L^\perp J = (1 - P_L)J.$$ If $R_L := 2P_L - 1$ denotes the reflection in $L$ then $L$ is Lagrangian if and only if $$JR_L = -R_LJ.$$ Conversely, if $R$ is an orthogonal reflection that anticommutes with $J$ then $\text{Ker} \, (I - R)$ is a lagrangian subspace. We therefore get a bijection $$\text{Lag} \leftrightarrow \{R \in \mathcal{B}(\hat{H}) \mid R^2 = 1, \, R = R^*, \, RJ = -JR\}$$ and so $\text{Lag}$ inherits a topology as a subset of $\mathcal{B}(\hat{H})$. The following result is straightforward and therefore we omit the proof. **Lemma 2.1.** (a) If $L$ is a Lagrangian and $S \in \text{Sym}(L)$ is a self-adjoint operator then the graph of $JS : L \to L^\perp$ is a Lagrangian as well. (b) For a fixed Lagrangian $L$, if $L_1$ is both Lagrangian and the graph of an operator $T : L \to L^\perp$ then $T$ has to be of the type $JS$ with $S \in \text{Sym}(L)$ self-adjoint. It is a well-known fact that, in the finite dimensional case the sets $\text{Sym}(L)$ are mapped to open subsets of $\text{Lag}$ around $L$, turning the Lagrangian Grassmannian into a manifold. The situation in the infinite-dimensional case is identical. The following will make our life easier. **Proposition 2.1.** Let $L$ be an Lagrangian space, $L \in \text{Lag}$. The following are equivalent: (a) $L$ is the graph of an operator $JA : L_0 \to L_0^\perp$ where $A \in \text{Sym}(L_0)$. (b) $L \cap L_0^\perp = \{0\}$ and $L + L_0^\perp$ is closed. (b') $\hat{H} = L \oplus L_0^\perp$. (b'') $\hat{H} = L + L_0^\perp$. (c) $R_L + R_{L_0}$ is invertible. Proof. (a) ⇒ (b) Clearly if $L$ is the graph of an operator $L_0 \to L_0^\perp$ then $L$ is a linear complement of $L_0^\perp$. (b) ⇒ (b') ⇒ (b'') ⇒ (b). We have the following equality: $$(L + L_0^\perp)^\perp = L^\perp \cap L_0 = J(L \cap L_0^\perp) = \{0\}.$$ and this proves that (b) ⇒ (b'). Clearly (b') implies (b'') and (b'') implies (b) because if $z \in L \cap L_0^\perp$ then $Jz \perp L$ and $Jz \perp L_0$ and so $z = 0$. (b) ⇒ (c) It is easy to check that $$\text{Ker}(P_L - P_{L_0^\perp}) = L \cap L_0^\perp \oplus L^\perp \cap L_0 = \{0\}.$$ The injectivity now follows from $R_L + R_{L_0} = R_L - R_{L_0^\perp} = 2(P_L - P_{L_0^\perp})$. Part (b') gives also $\tilde{H} = L^\perp \oplus L_0$. This implies that $$\text{Range}(R_L - R_{L_0^\perp}) = \text{Range}(P_L - P_{L_0^\perp}) = L + L_0^\perp = \tilde{H},$$ which proves surjectivity. (c) ⇒ (a) We show that the restriction to $L$ of the projection onto $L_0$, $P_{L_0}|_L$ is an isomorphism. First $\text{Ker}(P_{L_0}|_L) = L \cap L_0^\perp$ and since $\text{Ker}(R_L + R_{L_0}) = L \cap L_0^\perp \oplus L^\perp \cap L_0$ one concludes that $L \cap L_0^\perp = \{0\}$. Surjectivity boils down to showing that the adjoint $(P_{L_0}|_L)^*$ is bounded below [5]. But $(P_{L_0}|_L)^*$ is nothing else but $P_L|_{L_0}$. For $x \in L_0$ one has the following string of equalities $$\|P_L|_{L_0}(x)\| = \|P_LP_{L_0}(x)\| = 1/4\|(R_L + 1)(R_{L_0} + 1)(x)\|$$ $$= 1/4\|(R_L + R_{L_0} - R_{L_0} + 1)(R_{L_0} + 1)(x)\|$$ $$= 1/4\|(R_L + R_{L_0} + 1)(R_{L_0} + 1)(x)\|$$ $$= 1/2\|(R_L + R_{L_0})P_{L_0}(x)\| = 1/2\|(R_L + R_{L_0})(x)\|.$$ The lower bound follows from the invertibility of $R_L + R_{L_0}$. It is clear that $L$ is the graph of an operator $T : L_0 \to L_0^\perp$, $T = P_{L_0^\perp}|_L \circ (P_{L_0}|_L)^{-1}$. This operator has to be of the type $JA$ with $A \in \text{Sym}(L_0)$ by part b) in the previous lemma. $\square$ **Corollary 2.1.** The set \( \{ L \in \mathcal{L}ag \mid L \text{ is the graph of an operator } L_0 \to L_0^\perp \} \) is an open neighborhood around $L_0$. *Proof.* The invertibility of $R_L + R_{L_0}$ is an open condition. $\square$ Definition 2.3. For a fixed lagrangian $L$, the map $\mathcal{A}_L : \text{Sym}(L) \to \text{Lag}$ which associates to an operator $S$ the graph of $JS$ is called the Arnold chart around $L$. We will sometimes use the same notation, $\mathcal{A}_L$ to denote the image of this map in $\text{Lag}$. The following is now obvious. Proposition 2.2. The Arnold charts $\mathcal{A}_L$ turn the Lagrangian Grassmannian $\text{Lag}$ into a Banach manifold modeled on the space of bounded, self-adjoint operators $\text{Sym}(\mathcal{H})$. Let us a give an application of what we did so far. We will need this computation later. Lemma 2.2. Let $P : \text{Lag} \to \text{Sym}(\mathcal{H})$ be the map that associates to the lagrangian $L$ the orthogonal projection onto $L$, $P_L$. The differential $dLP : \text{Sym}(L) \to \text{Sym}(\mathcal{H})$ is given by the following expression relative $\mathcal{H} = L \oplus L^\perp$ \[ d_{\mathcal{L}}P(S) = \begin{pmatrix} 0 & \hat{S}J^{-1}_L \\ J_L\hat{S} & 0 \end{pmatrix} = \begin{pmatrix} 0 & -\hat{S}J \\ \hat{S}J & 0 \end{pmatrix}, \] where $J_L : L \to L^\perp$ is the restriction of $J$ to $L$. Proof. We need an expression for the projection $P_{\Gamma JS}$ onto the graph $JS : L \to L^\perp$. That comes down to finding $v$ in the equations \[ \begin{cases} a = v - SJ^{-1}w, \\ b = JSv + w, \end{cases} \] where $a, v \in L$ and $b, w \in L^\perp$. We get \[v = (1 + S^2)^{-1}(a + SJ^{-1}b),\] so that the projection has the block decomposition relative $L \oplus L^\perp$ \[(2.1) \quad P_{\Gamma JS} = \begin{pmatrix} (1 + S^2)^{-1} & (1 + S^2)^{-1}SJ^{-1} \\ J(1 + S^2)^{-1}S & J(1 + S^2)^{-1}S^2J^{-1} \end{pmatrix}. \] Differentiating this at $S = 0$ we notice that the diagonal blocks vanish since we deal with even functions of $S$ and so the product rule delivers the result. \qed The space $\mathcal{Lag}$ is not very interesting from a homotopy point of view and in the next section we will see that it is contractible. To get something non-trivial we restrict our attention to the subspace of vertical, Fredholm lagrangians which we now define. **Definition 2.4.** A pair of Lagrangians $(L_1, L_2)$ is called a *Fredholm pair* if the following two conditions hold $$\dim(L_1 \cap L_2) < \infty \quad \text{and} \quad L_1 + L_2 \text{ is closed}.$$ The Grassmannian of *vertical, Fredholm Lagrangians* is $$\mathcal{Lag}^- := \{ L \in \mathcal{Lag} \mid (L, H^-) \text{ is a Fredholm pair} \}.$$ **Remark 2.3.** If $T : D(T) \to H$ is a a closed, self-adjoint, Fredholm operator then only its switched graph is a vertical, Fredholm lagrangian. Our objects are primarily lagrangian subspaces. There is a related notion of a Fredholm pair when talking about orthogonal projections. We summarize here the main relations between the two notions. One can find the detailed proofs in the work of Avron *et al.*[4]. **Definition 2.5.** (a) A pair of orthogonal projections $P$ and $Q$ in a separable Hilbert space $H$ is said to be a *Fredholm pair* if the linear operator $$QP : \Ran P \to \Ran Q$$ is Fredholm. (b) A pair of closed subspaces $U$ and $V$ of $H$ is said to be a Fredholm pair if $$\dim U \cap V < \infty, \quad \dim U^\perp \cap V^\perp < \infty \quad \text{and} \quad U + V \text{ closed}.$$ (c) Two subspaces $U$ and $V$ are said to form a *commensurate* Fredholm pair if $P_U - P_V$ is a compact operator. When $U$ and $V$ are Lagrangian subspaces the middle condition in the definition of a Fredholm pair is superfluous. \textbf{Proposition 2.3.} Let \((P, Q)\) be a pair of projections. Then the following statements are equivalent: (a) The pair \((P, Q)\) is a Fredholm pair. (b) The pair \((Q, P)\) is a Fredholm pair. (c) The operators \(P - Q \pm 1\) are Fredholm. (d) The pairs of subspaces \((\operatorname{Ran} P, \operatorname{Ker} Q) = (\operatorname{Ran} P, \operatorname{Ran} Q^\perp)\) and \((\operatorname{Ran} Q, \operatorname{Ker} P) = (\operatorname{Ran} Q, \operatorname{Ran} P^\perp)\) are Fredholm pairs. \textit{Proof.} See Proposition 3.1 and Theory 3.4 (a) in [4]. \(\square\) \textbf{Proposition 2.4.} Suppose \((U, V)\) is a Fredholm pair of closed subspaces and that \(W\) is another subspace commensurate with \(V\). Then the pairs \((V^\perp, W)\) and \((U, W)\) are Fredholm pairs. \textit{Proof.} This follows from the previous proposition and Theorem 3.4 (c) in [4]. \(\square\) Let \(P_{\pm}|_L\) be the orthogonal projections on \(H^\pm\) restricted to the Lagrangian \(L\) and \(P_L|_{H^\pm}\) be the projection on \(L\) restricted to \(H^\pm\). The following is just a corollary of the previous propositions. \textbf{Corollary 2.2.} The set of vertical, Fredholm Lagrangians, \(\mathcal{L}ag^-\), coincides with the set \[\{ L \in \mathcal{L}ag \mid P^+|_L \text{ is Fredholm of index } 0 \}.\] \section{Arnold’s theorem} In this section, we generalize a result by Arnold ([2], see also [18]) to infinite dimensions. In his article, Arnold showed that the finite Lagrangian Grassmannian \(\mathcal{L}ag(N) \subset \text{Gr}(N, 2N)\) is diffeomorphic to the unitary group \(U(N)\). A similar result appears in [15]. We introduce now the main suspects. Consider the \(\mp i\) eigenspaces of \(J\), \(\text{Ker } (J \pm i)\) and let \[\text{Iso}_{\mp} := \text{Iso } (\text{Ker } (J + i), \text{Ker } (J - i)).\] To each Lagrangian \(L\) we associate the restriction to \(\text{Ker } (J + i)\) of the reflection \(R_L\). Since \(R_L\) anticommutes with \(J\) we get a well-defined \textit{reflection map} \[R_{\mp} : \mathcal{L}ag \rightarrow \text{Iso}_{\mp}, \quad R_{\mp}(L) = R_L|_{\text{Ker } (J+i)}.\] On the other hand, to each isomorphism $\alpha \in \text{Iso}_+\text{--}+$ we can associate its graph $\Gamma_\alpha$ which is a subspace of $\hat{H}$. It is, in fact, a Lagrangian. Indeed $$w \in J\Gamma_\alpha \iff w = J(\alpha v + v) = -i\alpha v + iv = z - \alpha^*z \in \tilde{\Gamma}_{-\alpha^*}$$ for some $v \in \text{Ker}(J + i)$, with $z = -iuv \in \text{Ker}(J - i)$. It is standard that the switched graph $\tilde{\Gamma}_{-\alpha^*}$ is the orthogonal complement of $\Gamma_\alpha$. Therefore, we get a second well-defined graph map $$\Gamma : \text{Iso}_+\text{--}+ \rightarrow \text{Lag}, \quad \Gamma(\alpha) = \Gamma_\alpha.$$ **Lemma 3.1.** Let $L \subset \hat{H}$ be a Lagrangian. Then the following maps are canonical isomorphisms of Hilbert spaces: $$\phi_\pm(L) : L \rightarrow \text{Ker}(J \pm i), \quad \phi_\pm(L)(v) = 1/\sqrt{2}(v \pm iJv)$$ **Proof.** The injectivity is straightforward. For surjectivity, let $w \in \text{Ker}(J + i)$ be written as $$w = v + v^\perp, \quad v \in L \text{ and } v^\perp \in L^\perp.$$ Then $Jw = -iw$ implies that $Jv = -iv^\perp$ and so $v^\perp = iJv$. \qed$ **Notation:** When there is no possibility for confusion we will use $\phi_\pm := \phi_\pm(L)$. The previous lemma identifies in a canonical way $\text{Iso}_--+$ with the set of unitary operators $\mathcal{U}(L)$ via $$\alpha \rightarrow \phi_-^{-1}\alpha\phi_+ =: U_\alpha.$$ The graph, $\Gamma_\alpha$, is expressed in terms of the unitary operator $U_\alpha$ as the set $$\Gamma_\alpha = \{(1 + U_T)v + iJ(1 - U_T)v \mid v \in L\}.$$ **Definition 3.1.** Let $L$ be a Lagrangian. The associated Cayley graph map is the following application: $$C_L : \mathcal{U}(L) \rightarrow \text{Lag}$$ $$C_L(U) := \Gamma(\phi_- \circ U \circ \phi_+^{-1}) = \text{Ran}\{L \ni v \mapsto (1 + U)v + iJ(1 - U)v \in \hat{H}\}.$$ We have the following generalization of a result of Arnold [2]. Theorem 3.1. (a) The reflection map, $R_{-+} : \text{Lag} \rightarrow \text{Iso}_{-+}$ and the graph map $\Gamma : \text{Iso}_{-+} \rightarrow \text{Lag}$ are inverse to each other. (b) For every Lagrangian $L$, the Cayley graph map, $C_L : \mathcal{U}(L) \rightarrow \text{Lag}$ is a diffeomorphism of real Banach manifolds. (c) The restriction of the Cayley graph map induces a diffeomorphism of the following open subsets of $\mathcal{U}(L)$, resp. $\text{Lag}$. $$\mathcal{U}_{-1}(L) := \{ U \in \mathcal{U}(L) \mid 1 + U \text{ is Fredholm} \}$$ and $$\text{Lag}^-(L) := \{ L_1 \in \text{Lag} \mid (L_1, L) \text{ is a Fredholm pair} \}.$$ Proof. (a) Notice that the operator from $\hat{\mathcal{H}}$ which relative to the decomposition $\hat{\mathcal{H}} = \text{Ker} (J + i) \oplus \text{Ker} (J - i)$, has the expression $$\begin{pmatrix} 0 & \alpha^* \\ \alpha & 0 \end{pmatrix}$$ is an orthogonal reflection whose eigenvalue 1-eigenspace is $\Gamma_\alpha$. Hence $R_{-+} \Gamma(\alpha) = \alpha$. In order to prove that $\Gamma \circ R_{-+} = \text{id}$ it suffices to show only that $\Gamma \circ R_{-+}(L) \subset L$. Take $v \in \text{Ker} (J + i)$. Then $$\Gamma(R_{-+}(L)) \ni v + R_L(v) = 2P_L(v) \in L.$$ (b) By part (a) the map is a bijection. We prove differentiability. Fix a Lagrangian $L$ and let $\text{Sym}(L) \ni S \rightarrow \Gamma_{JS} \in \text{Lag}$ be the Arnold chart centered at $L$. Then using (2.1) we get the following expression for the reflection $R_{\Gamma_{JS}}$ relative to $\hat{H} = L \oplus L^\perp$ $$R_{\Gamma_{JS}} = 2P_{\Gamma_{JS}} - 1 = \begin{pmatrix} (1 - S^2)(1 + S^2)^{-1} & 2S(1 + S^2)^{-1}J^{-1} \\ 2JS(1 + S^2)^{-1} & -J(1 - S^2)(1 + S^2)^{-1}J^{-1} \end{pmatrix},$$ which is differentiable function of $S$. Since $R_{-+} = P^i \circ R|_{\text{Ker} (J+i)}$, where $P^i$ is the projection on the $i$-eigenspace of $J$, we conclude that $R_{-+}$ is smooth and therefore its inverse $\Gamma$ is smooth and so is $\mathcal{C}_L$. (c) Fix the Lagrangian $L := H^+$. Let $\mathcal{C}_+ = \mathcal{C}_{H^+}$ Since the Fredholm property is an open condition it follows that $\mathcal{U}_{-1}$ is open in $\mathcal{U}(H)$. By standard spectral theory, the Fredholm property of $1 + U$ implies that $\text{Ker} (1 + U) = \mathcal{C}(U) \cap H^-$ is finite dimensional and also that $-1 \notin \sigma(U|_{\text{Ker}(1+U)^-})$. We can now factor out \( \text{Ker}(1 + U) \). To that end, let \( \hat{H} = \text{Ker}(1 + U)^\perp \), and \( \hat{H}^\pm \) be the horizontal/vertical copy of \( \hat{H} \) in \( \hat{H} \oplus \hat{H} \) and \( \hat{U} = U|_H \). Since \( 1 + \hat{U} \) is invertible, the Cayley graph of \( \hat{U} \) is in the Arnold chart of \( \hat{H}^+ \) and so \( \mathcal{C}(\hat{U}) + \hat{H}^- \) is closed by Proposition 2.1. On the other hand \[ \mathcal{C}(U) + H^- = \mathcal{C}(\hat{U}) + \hat{H}^- + \text{Ker}(1 + U), \] where \( \text{Ker}(1 + U) \subset H^- \) is finite dimensional and this proves that \( \mathcal{C}(U) + H^- \) is closed. Conversely, let \( L \cap H^- \) be finite dimensional and \( L + H^- \) be closed. If we let \( \tilde{L} \) and \( \tilde{H}^- \) be the orthogonal complements of \( L \cap H^- \) in \( L \) and \( H^- \), respectively, these two spaces are Lagrangians in \( J\tilde{H}^- \oplus \tilde{H}^- \) whose intersection is empty, and whose sum is closed. Their sum is closed because of the relation \[ \tilde{L} + \tilde{H} = (L \cap H^-)^\perp, \] where the orthogonal complement is taken in \( L + H^- \). By Lemma 2.1, \( \tilde{L} \) is in the Arnold chart of \( J\tilde{H}^- \), hence \( \tilde{L} = \Gamma_S \) with \( S : J\tilde{H}^- \to J\tilde{H}^- \) self-adjoint. We get \( L = \mathcal{C}(U) \) where \( U \) is the extension by \(-1\) on \( J(L \cap H^-) \) of the Cayley transform of \( S \). It is clear that \( 1 + U \) is Fredholm. \( \square \) **Notation:** Whenever we have a map or object depending on a Lagrangian, a sub/superscript \( \pm \) indicates that the lagrangian is \( H^\pm \). Our main interest is in \( \text{Lag}^- \) so we will state the theorem in this case separately. **Corollary 3.1.** The Cayley graph map \( \mathcal{C}_+ : \mathcal{U}(H) \to \text{Lag} \) \[ \mathcal{C}_+(U) := \text{Ran}\{H \ni v \to ((1 + U)v, -i(1 - U)v) \in H \oplus H\} \] induces a diffeomorphism between \( \mathcal{U}_{-1} \) and \( \text{Lag}^- \). **Proof.** This is just the case \( L = H^+ \) in Theory 3.1. The reason for \(-i\) in the second component is that under the canonical identifications \( H = H^+ \) and \( H = H^- \), \( J|_{H^+} \) acts as minus the identity. \( \square \) **Remark 3.1.** We chose the name Cayley graph map because the composition \[ \mathcal{C}_+^{-1} \circ \tilde{\Gamma} : \text{Sym}(H) \to \mathcal{U}(H), \quad A \to (A - i)(A + i)^{-1} \] is the well-known Cayley transform. Notice that \( A = 0 \) corresponds to \(-Id\). **Remark 3.2.** Our choice of the reflection map, $R_{-+}$ to go from $\text{Ker } (J + i)$ to $\text{Ker } (J - i)$ rather than the other way was dictated by orientation considerations. In the case $H = \mathbb{C}$ we wanted the composition $$e_+^{-1} \circ \tilde{\Gamma} : \text{Sym}(\mathbb{C}) \to S^1 \setminus \{1\}, \quad A \to (A - i)(A + i)^{-1}$$ to be an orientation preserving diffeomorphism, where $S^1$ is given the counterclockwise orientation. For each Lagrangian $L$, we introduce the change of basis isomorphism $$(*) \quad \Phi_L : L \oplus L^\perp \to \text{Ker } (J + i) \oplus \text{Ker } (J - i), \quad \Phi_L = \begin{pmatrix} \phi_+ & 0 \\ 0 & \phi_- \circ J^{-1} \end{pmatrix}.$$ where $J^{-1} : L^\perp \to L$ is the inverse of the restriction $J : L \to L^\perp$. Notice that $\Phi_L$ diagonalizes $J$ relative to the decomposition $\tilde{H} = L \oplus L^\perp$, i.e., $$\Phi_L^{-1} J \Phi_L = \begin{pmatrix} -i & 0 \\ 0 & i \end{pmatrix}.$$ **Lemma 3.2.** Let $U \in \mathcal{U}(L)$ be a unitary map. Then the reflection in the Lagrangian $L_U := \mathcal{E}_L(U)$ has the following expression relative $\tilde{H} = L \oplus L^\perp$ $$R_{L_U} = \Phi_L \begin{pmatrix} 0 & U^* J^{-1} \\ J U & 0 \end{pmatrix} \Phi_L^{-1}. $$ **Proof.** Let $\alpha_U : \text{Ker } (J + i) \to \text{Ker } (J - i)$ be the isomorphism that corresponds to $\mathcal{E}_L(U)$, in other words $\alpha_U = \phi_- U \phi_+^{-1}$. Then $$R_{L_U} = \begin{pmatrix} 0 & \alpha_U^* \\ \alpha_U & 0 \end{pmatrix} = \begin{pmatrix} \phi_+ & 0 \\ 0 & \phi_- \end{pmatrix} \begin{pmatrix} 0 & U^* \\ U & 0 \end{pmatrix} \begin{pmatrix} \phi_+^{-1} & 0 \\ 0 & \phi_-^{-1} \end{pmatrix}.$$ The claim follows from the expression for $\Phi_L$. \hfill \square Using the previous lemma we get a different characterization of $\text{Lag}^-$. **Corollary 3.2.** The space of vertical, Fredholm Lagrangians has the following characterization $\text{Lag}^- = \{ L \in \text{Lag} \mid R_L + R_\tilde{H}^+ \text{ is Fredholm} \}$. Proof. If $U$ is the operator $L$ is coming from via the Cayley graph map then $$R_L + R_+ = \Phi_+ \left( \begin{array}{cc} 0 & (1 + U)^* J^{-1} \\ J(1 + U) & 0 \end{array} \right) \Phi_+^{-1}.$$ Clearly, $R_L + R_+$ is Fredholm if and only if $1 + U$ is Fredholm. □ **Corollary 3.3.** The Cayley graph map, $C$ takes the Arnold chart around $U_0$ bijectively onto the Arnold chart around $L_0 := C(U_0)$. **Proof.** Let $T := U + U_0$, $L_U := C(U)$. Then $$R_{L_U} + R_{L_0} = \Phi_+ \left( \begin{array}{cc} 0 & -T^* \\ -T & 0 \end{array} \right) \Phi_+^{-1}.$$ is invertible if and only if $T$ is invertible and hence by Proposition 2.1 we get $C_+(U) \in A_{L_0}$ if and only if $T$ is invertible. □ **Corollary 3.4.** Let $M$ be a differentiable manifold and $F : M \to \text{Lag}$ be a map. Then $F$ is differentiable if and only if $R \circ F$ is differentiable where $R : \text{Lag} \to \mathcal{B}(\hat{H})$ associates to every Lagrangian $L$ its reflection. **Proof.** Clearly $F$ is differentiable if and only if $F_1 := C_+^{-1} \circ F : M \to \mathcal{U}(H^+)$ is differentiable. Now $R \circ C_+ : \mathcal{U}(H) \to \mathcal{B}(\hat{H})$ has the following expression $$R \circ C_+(U) = \Phi_+ \left( \begin{array}{cc} 0 & -U^* \\ -U & 0 \end{array} \right) \Phi_+^{-1}.$$ So $F_1$ is differentiable if and only if $R \circ C_+ \circ F_1$ is differentiable. □ A closer look at the Cayley graph map suggests a useful reformulation of Theorem 3.1. Notice that the group of unitary operators $$\mathcal{U}_J(\hat{H}) := \{ U \in \mathcal{U}(\hat{H}) \mid UJ = JU \}$$ acts on $\text{Lag}$. Theorem 3.1 says that given two Lagrangians $L_1$ and $L_2$ there exists a canonical $U^\sharp \in \mathcal{U}_J(\hat{H})$ such that $U^\sharp L_1 = L_2$. Indeed, let $U := C_{L_1}^{-1}(L_2)$. Then the operator $$\tilde{U} : L_1 \to L_2, \quad \tilde{U}(v) = 1/2((1 + U)v + iJ(1 - U)v))$$ is a Hilbert space isomorphism. Define $U^\sharp \in \mathcal{U}(\hat{H})$, by $U^\sharp := \tilde{U} \oplus J\tilde{U}J^{-1}$. Relative to the decomposition $\hat{H} = L \oplus L^\perp$ this automorphism has the expression: \[ U^\# = \frac{1}{2} \begin{pmatrix} 1 + U & -i(1 - U)J^{-1} \\ iJ(1 - U) & J(1 + U)J^{-1} \end{pmatrix} = \Phi_L \begin{pmatrix} 1 & 0 \\ 0 & JUJ^{-1} \end{pmatrix} \Phi_L^{-1}. \] **Theorem 3.2.** (a) For a fixed Lagrangian \(L\), the following map is a diffeomorphism of real Banach manifolds \[ \mathcal{C}_L : \mathcal{U}(L) \mapsto \mathcal{L}ag, \quad \mathcal{C}_L(U) = \mathcal{O}_L(U)L, \] where \[ \mathcal{O}_L : \mathcal{U}(L) \mapsto \mathcal{U}(\hat{H}), \quad U \mapsto \Phi_L \begin{pmatrix} 1 & 0 \\ 0 & JUJ^{-1} \end{pmatrix} \Phi_L^{-1}. \] The block decomposition is relative to \(\hat{H} = L \oplus L^\perp\). (b) The map \(\mathcal{O}_L\) has the expression: \[ \mathcal{O}_L(U) = \begin{pmatrix} 1 & 0 \\ 0 & \phi_+U\phi_-^{-1} \end{pmatrix} \] relative to the decomposition \(\hat{H} = \text{Ker}(J + i) \oplus \text{Ker}(J - i)\). Hence the image of \(\mathcal{O}_L\) depends only on \(J\). (c) The bundle \(\mathcal{U}_\tau \subset \mathcal{L}ag \times \mathcal{B}(\hat{H})\) over \(\mathcal{L}ag\) whose fiber over a Lagrangian \(L\) consists of unitary operators \(U \in \mathcal{U}(L)\) is canonically trivializable and the map: \[ \mathcal{O} : \mathcal{U}_\tau \rightarrow \mathcal{U}(\hat{H}), \quad \mathcal{O}(L, U) := \mathcal{O}_L(U) \] is differentiable. **Proof.** (a) The job is done by Theorem 3.1. (b) Straightforward. (c) Let us notice that the tautological bundle \(\tau \subset \mathcal{L}ag \times \hat{H}, \quad \tau := \{(L, v) \mid v \in L\}\) over \(\mathcal{L}ag\) is naturally trivializable. A natural trivialization is given as follows. For every Lagrangian \(L\), let \(U_L := \mathcal{C}_+^{-1}(L)\) be the unitary operator on \(H^+\) corresponding to \(L\) via the Cayley graph map. Then the following map is a trivialization of the tautological bundle: \[ \alpha : \tau \rightarrow \mathcal{L}ag \times H^+, \quad \alpha(L, v) = (L, (\mathcal{O}_+(U_L))^{-1}(v)) \] since both \(\mathcal{C}_+^{-1}\) and \(\mathcal{O}_+\) are differentiable. It is straightforward that \(\mathcal{U}_\tau\) is naturally trivializable. In order to show that $\mathcal{O}$ is differentiable it is enough to prove that the map $$\Phi : \mathcal{L}ag \rightarrow \mathcal{U}(\hat{H}), \quad L \rightarrow \Phi_L$$ is differentiable. Since $\mathcal{O}_+$ and $\mathcal{C}_+$ are differentiable, the following identity proves this claim: $$\Phi(\mathcal{C}_+(U)) = \mathcal{O}_+(U)\Phi_+ = \frac{1}{\sqrt{2}} \left( \begin{array}{cc} 1 & -U \\ -i & -iU \end{array} \right), \quad \forall U \in \mathcal{U}(H^+),$$ where the decomposition is relative $\hat{H} = H \oplus H$. **Remark 3.3.** Part (b) of the Theorem is saying that the image of $\mathcal{O}$ is only “half” of $\mathcal{U}_J(\hat{H})$ which consists of unitary operators with diagonal block decomposition relative $\hat{H} = \text{Ker} (J + i) \oplus \text{Ker} (J - i)$. One consequence is that $\mathcal{U}_J(\hat{H})$ acts transitively on $\mathcal{L}ag$. Let us notice that $U_J(\hat{H})$ is a subgroup of the symplectic group, i.e., the invertible operators $X \in \text{GL}(\hat{H})$ satisfying $X^*JX = J$. This bigger group also acts transitively and differentiably on $\mathcal{L}ag$ (see Prop 4.5 in [8]). **Remark 3.4.** It is not hard to see that the canonical unitary operators $\tilde{U}(L_1, L_2)$ defined at (3.1) satisfy the relation $$U(L_2, L_3) \circ U(L_1, L_2) = U(L_1, L_3).$$ In fact, if $\tau \subset \mathcal{L}ag \times \hat{H}$ is the tautological bundle over $\mathcal{L}ag$, which, as we saw before, is trivializable, then the collection of unitary operators $\tilde{U}$ represents the parallel transport for the pull-back to $\tau$ of the trivial connection on the trivial bundle $\mathcal{L}ag \times \hat{H}$. The main object of study is $\mathcal{L}ag^\perp$. However, all the results stated here hold for other infinite Lagrangian Grassmannians. Let $J \subset K \subset B$ be a non-trivial, two-sided ideal of bounded (compact) operators, ideal endowed with a topology at least as strong as the norm topology [26] (examples are trace class operators with the trace norm or Hilbert–Schmidt operators, etc.). The Palais unitary group, $\mathcal{U}_J$, introduced in [23], is $\mathcal{U}_J := \mathcal{U} \cap (1 + J)$. Notice that $\mathcal{U}_J \subset \mathcal{U}_{-1}$ since the only essential spectral value of $U \in \mathcal{U}_J$ is 1. If we let $$\mathcal{L}ag_J := \mathcal{C}_+(\mathcal{U}_J)$$ be the corresponding space of Lagrangians, it is not hard to see that (compare with Corollary 2.2) \[ \mathcal{Lag}_J = \{ L \in \mathcal{Lag}(H) \mid P^+|_L \text{ is Fredholm of index 0 and } P^-|_L \in J \} \] where \( P^-|_L \in J \) means that \( P^-|_L \) is a compact operator and its singular values satisfy the same boundedness condition as the one that describes \( J \). **Lemma 3.3.** Let \( T : D(T) \subset H \to H \) be a self-adjoint, Fredholm operator. Then the switched graph \( \tilde{\Gamma}_T \) belongs to \( \mathcal{Lag}_J \) if and only if the resolvent \( R_T(\lambda) \) belongs to \( J \) for some \( \lambda \notin \sigma(T) \). **Proof.** Let \( U := \mathcal{C}_+^{-1}(\tilde{\Gamma}_T) \) be the unitary operator that corresponds to \( T \) in Theorem 3.1 Then \( X := 1 - U \) is bounded and induces a bijection \( X : H \to D(T) \). If we endow \( D(T) \) with the norm \[ \langle v, w \rangle_{D(T)} := \langle X^{-1}v, X^{-1}w \rangle_H, \quad \forall v, w \in D(T) \] (which is nothing else but the graph norm) then \( T : D(T) \to H \) is a bounded operator and \[ T = iX^{-1}(2 - X). \] Hence \( 1 - U = X = 2i(T + i)^{-1} = 2iR_T(-i) \), which proves the claim. \( \square \) The space \( \mathcal{Lag}_J \) is also a real Banach manifold modeled on the space of bounded, self-adjoint operators \( S \in J \). ### 4. Symplectic reduction In this section, we describe the symplectic reduction process that we will need further on. While other people have written about and used (linear) symplectic reduction (see for example [15, 19, 21]) we will need in section 8 a generalized version (see definition 4.6) of this process that we develop here. As a byproduct, we get in 4.1 a description of symplectic reduction as the projection map of a natural vector bundle. We conclude this section with an application of symplectic reduction. We show in Theorem 4.2 that \( \mathcal{Lag}^- \) is classifying for \( K^{-1} \)-theory. This result, with a different proof, first appears in [15]. **Definition 4.1.** An isotropic subspace of the pair \( (\hat{H}, J) \) is a closed subspace \( W \subset \hat{H} \) such that \( W \subset \Lambda \) for some Lagrangian \( \Lambda \). The space $W^{\omega} := (JW)^\perp$ is called the *annihilator* of $W$. Notice that $$W \subset \Lambda = (J\Lambda)^\perp \subset W^{\omega}.$$ The orthogonal complement of $W$ in $W^{\omega}$, denoted $H_W$ is called the (symplectically) *reduced* space of $\hat{H}$. **Remark 4.1.** The Hilbert space $H_W$ is the orthogonal complement of $W \oplus JW$ in $\hat{H}$ and hence it is $J$-invariant. Notice also that $$\dim \text{Ker} \left( i \pm J|_{H_W} \right) = \frac{1}{2} \dim H_W = \dim W_A^\perp,$$ where $W_A^\perp$ is the orthogonal complement of $W$ in $\Lambda$. The dimension could be infinite. **Definition 4.2.** The isotropic space $W$ is called *cofinite* if $H_W$ is finite dimensional. The codimension of $W$ is half of the dimension of $H_W$. **Definition 4.3.** Let $W$ be a fixed, cofinite, isotropic space and $k$ a non-negative integer. A lagrangian $L$ is called $k$-*clean* with respect to $W$ (or just clean if $k = 0$) if it belongs to the set: $$\mathcal{Lag}^W_k := \{ L \in \mathcal{Lag} \mid \dim L \cap W = k \text{ and } L + W \text{ is closed} \}.$$ Let $\mathcal{Lag}^W := \bigcup_k \mathcal{Lag}^W_k$ be the space of Lagrangians which are Fredholm pairs with $W$. If $W = L_0$ is a Lagrangian itself, then $\mathcal{Lag}^W = A_{L_0}$. **Proposition 4.1.** Let $W$ be a cofinite, isotropic space. (a) Let $L \in \mathcal{Lag}^W_k$ for some integer $k \geq 0$. Then $P_{H_W}(L \cap W^\omega)$ is a Lagrangian subspace of $H_W$ where $P_{H_W}$ is the orthogonal projection onto $H_W$. (b) Let $L \in \mathcal{Lag}^W_0$. Then there exists a Lagrangian $L_0 \supset W$ such that $L + L_0 = \hat{H}$. Hence $L \in A_{L_0} \subset \mathcal{Lag}_0^W$ and therefore $\mathcal{Lag}_0^W$ is open in $\mathcal{Lag}$. **Proof.** (a) Note first that $\dim L \cap W^\omega < \infty$ since $\text{Ker} \left( P_{H_W} \right|_{L \cap W^\omega} = L \cap W$. Let $W^\perp$ be the orthogonal complement of $W$ in $\hat{H}$. We have $L^\perp \cap W^\perp = \mathcal{Lag}^W_k$. $J(L \cap W^\omega)$ so that $L^\perp \cap W^\perp$ is finite dimensional as well. This implies that $L^\perp \cap W^\perp + H^\perp_W$ is closed. Let $\ell := P_{H_W}(L \cap W^\omega)$ and let $\ell'$ be the orthogonal complement of $\ell$ in $H_W$. Notice that $$\ell = (L + W) \cap H_W$$ and so $$\ell' = H_W \cap (L^\perp \cap W^\perp + H^\perp_W) = H_W \cap J(L \cap W^\omega + H^\perp_W) = JP_{H_W}(L \cap W^\omega) = J\ell$$ which proves that $\ell$ is a lagrangian in $H_W$. (b) Let $L_0 := J\ell + W$ where, as before, $\ell := P_{H_W}(L \cap W^\omega)$. Then $L_0$ is a Lagrangian since $$L_0^\perp = (J\ell + W)^\perp = JL_0^\perp \cap W^\perp = (\ell + W + JW) \cap W^\perp = (\ell + JW) \cap W^\perp = \ell + JW = JL_0.$$ On the other hand, $L + L_0$ is closed and $L \cap L_0 = \{0\}$. We will prove this last claim. Take $z = x + y \in (J\ell + W) \cap L$, with $x \in J\ell \subset H_W$ and $y \in W$. Then $z \in L \cap W^\omega = L \cap (H_W \oplus W)$ which also means that $x = P_{H_W}(z) \in \ell$ and since $x \in J\ell$ we conclude that $x = 0$ and therefore $z = y \in L \cap W = \{0\}$. In order to show that $A_{L_0^\perp} \subset \mathcal{Lag}_0^W$ notice that if $\tilde{L} \in A_{L_0^\perp}$ then $L \cap W \subset \tilde{L} \cap L_0 = \{0\}$. On the other hand $(\tilde{L}, L_0)$ is a Fredholm pair and $L_0$ and $W$ are commensurate; hence by Proposition 2.4 $\tilde{L} + W$ is closed. **Definition 4.4.** Let $W$ be a cofinite, isotropic space. The map $$R_W : \mathcal{Lag}^W \to \mathcal{Lag}(H_W), \quad L \mapsto P_{H_W}(L \cap W^\omega)$$ is called the symplectic reduction with $W$. The symplectic reduction map so defined is not continuous. However, its restriction to each $\mathcal{Lag}_k^W$ is. In order not to overload the notations we will use the same symbol $R_W$ also for the restriction maps. We have **Proposition 4.2.** The symplectic reduction is a differentiable map $R_W : \mathcal{Lag}_0^W \to \mathcal{Lag}(H_W)$. In fact, if $L_0 \supset W$ is a Lagrangian and $W^\perp$ is the orthogonal complement of $W$ in $L_0$, then $R(A_{L_0^\perp}) = A_{JW^\perp}$ and in these Arnold coordinates, symplectic reduction is the linear map $R(T) = P_{W^\perp} TP_{JW^\perp}$, i.e., projection onto the $JW^\perp \times W^\perp$ block, for every $T : L_0^\perp \to L_0$. Proof. Let $T : L^\perp_0 \to L_0$ be an operator such that as a map $JW \oplus JW^\perp \to W \oplus W^\perp$ has the block decomposition: $$T = \begin{pmatrix} T_1 & T_2 \\ T_3 & T_4 \end{pmatrix}.$$ It is an easy exercise to show that $R_W(\Gamma_T) = \Gamma_{T_4} \subset JW^\perp \oplus W^\perp$. □ We want to show that $R$ is a differentiable map when restricted to $\mathcal{Lag}_k^W$ as well. But first we need to prove that $\mathcal{Lag}_k^W$ is a differentiable manifold. From now on we will consider that $W \subset H^-$ is a subspace of the vertical lagrangian of codimension $c$, therefore cofinite, isotropic. Notice that $\mathcal{Lag}_k^W \subset \mathcal{Lag}^-$ for all non-negative integers $k$ and, in fact, Proposition 2.4 implies that $$\mathcal{Lag}^- = \bigcup_{k \geq 0} \mathcal{Lag}_k^W = \mathcal{Lag}^W.$$ Lemma 4.1. For every Lagrangian $L \in \mathcal{Lag}_k^W$ the intersection $L \cap W^\omega$ has dimension equal to $k + c = \dim L \cap W + 1/2 \dim H_W$. Moreover $L \cap W^\omega$ decomposes orthogonally as $$L \cap W^\omega = L \cap W \oplus (L \cap (V^\perp \oplus H_W)),$$ where $V^\perp$ is the orthogonal complement of $V := L \cap W$ in $W$. Proof. The image of the projection $P_{H_W} : L \cap W^\omega \to H_W$ has dimension equal to $1/2 \dim H_W$ and the kernel is just $L \cap W$. The two spaces that appear in the sum are orthogonal and subsets of $L \cap W^\omega$. It is enough to prove that $L \cap (V^\perp \oplus H_W)$ has dimension $p$. It is not hard to see that $$L \cap (V^\perp \oplus H_W) = L \cap (J(L \cap W) \oplus V^\perp \oplus H_W) =: L \cap W^\omega_L,$$ where $W_L := J(L \cap W) \oplus V^\perp$ is an isotropic space, clean with $L$ and such that $H_{W_L} = H_W$. Hence $P_{H_W} : L \cap W^\omega_L \to H_W$ is injective and the image is a lagrangian in $H_W$, which has dimension $c$. □ Definition 4.5. For every Lagrangian $L \in \mathcal{Lag}_k^W$, let $V := L \cap W$, $V^\perp$ be the orthogonal complement of $V$ in $W$ and let $\ell$ be the symplectic reduction of $L$ with $W$. The space $L_W := \ell \oplus V \oplus JV^\perp$ is called the associated Lagrangian or simply the associate. The odd Chern character and index localization formulae Proposition 4.3. (a) For any $L \in \text{Lag}_k^W$, the associated Lagrangian, $L_W$, is in $\text{Lag}_k^W$. Moreover, every $L \in \text{Lag}_k^W$ is in the Arnold chart of its associate and it is given by the graph of $JS$ where $S \in \text{Sym}(L_W)$ has the block decomposition: $$ \begin{pmatrix} 0 & 0 & S_2^* \\ 0 & 0 & 0 \\ S_2 & 0 & S_4 \end{pmatrix}. $$ (b) Let $W = V \oplus V^\perp$ be an orthogonal decomposition of $W$ such that $V$ is $k$-dimensional and let $\ell \subset H_W$ be a Lagrangian. Then $\ell \oplus V \oplus JV^\perp \in \text{Lag}_k^W$ and the set $\text{Lag}_k^W \cap \mathcal{A}_{\ell \oplus V \oplus JV^\perp}$ is described in this Arnold chart by linear equations. More precisely, given $S \in \text{Sym}(\ell \oplus V \oplus JV^\perp)$ then $\Gamma_{JS} \in \text{Lag}_k^W$ if and only if its $V \times V$ and $V \times \ell$ blocks of $S$ are zero. (c) The space $\text{Lag}_k^W$ is a submanifold of $\text{Lag}^-$ of real codimension $k^2 + 2ck$ and the symplectic reduction map: $$ \mathcal{R} : \text{Lag}_k^W \to \text{Lag}(H_W), \quad L \to \text{Range } P_{H_W}|_{L \cap W^\omega} $$ is differentiable. Proof. (a) The fact that the associated Lagrangian is indeed a Lagrangian is straightforward. Now $L_W \cap W = V$, hence clearly $L_W$ is in $\text{Lag}_k^W$. For the second claim, notice that $(L, V^\perp)$ is a Fredholm pair and $V^\perp$ and $L^\perp_W$ are commensurable, so $(L, L^\perp_W)$ is a Fredholm pair. Moreover, the intersection $L \cap L^\perp_W$ is trivial. Indeed let $$ x = a + b + c \\ L \quad J\ell \quad JV \quad V^\perp. $$ Then $b \in L^\perp$ and so $b = 0$. From $x = a + c$ it follows that $x \in L \cap W^\omega$ and $a = P_{H_W}(x) \in \ell$ so $a = 0$. This implies $x = c \in L \cap V^\perp = \{0\}$. For the last part notice that if $L$ is the graph of an operator $JS : L_W \to L^\perp_W$ then $JS|_{L \cap L^\omega_W} = 0$. Indeed $$ JSv = P_{L^\perp_W} \circ (P_{L_W}|_L)^{-1}v = P_{L^\perp_W}v = 0, \quad \forall v \in L \cap L_W. $$ On the other hand, $V \subset L \cap L_W$. This and the self-adjointness imply that the middle row and column of $S$ are zero. The vanishing of the top, left block follows from the following considerations. The symplectic reduction of any lagrangian $\tilde{L}$ with $W_L := JV \oplus V^\perp$ in the Arnold chart of $L_W$ is just the graph of the $\ell \times \ell$ block of the self-adjoint operator on $L_W$ that gives $\tilde{L}$. But the operator $\ell \rightarrow \ell$ whose graph $\ell$ is of course the zero operator. We implicitly used the fact that $\ell = \mathcal{R}_W(L) = \mathcal{R}_W(L)$ which can be easily checked. (b) Clearly $\ell \oplus V \oplus JV^\perp \in \mathcal{Lag}_k^W$. Now, every lagrangian in the Arnold chart $\mathcal{A}_{\ell \oplus V \oplus JV^\perp}$ is just the graph of an operator $JS$ where $S \in \text{Sym} (\ell \oplus V \oplus JV^\perp)$. So $S$ has a block decomposition $$S = \begin{pmatrix} S_{\ell,\ell} & S_{V,\ell} & S_{JV^\perp,\ell} \\ S_{\ell,V} & S_{V,V} & S_{JV^\perp,V} \\ S_{\ell,JV^\perp} & S_{V,JV^\perp} & S_{JV^\perp,JV^\perp} \end{pmatrix}.$$ The condition $v + JSv \in W$ where $v = (v_1, v_2, v_3) \in \ell \oplus V \oplus JV^\perp$ implies that the sum $$v_1 + v_2 + v_3 + (JS_{\ell,\ell}v_1 + JS_{V,\ell}v_2 + JS_{JV^\perp,\ell}v_3)$$ is in $V \oplus V^\perp$. Since $\ell \oplus J\ell \oplus JV \oplus JV^\perp \perp V \oplus V^\perp$ we get $$v_1 = v_3 = (JS_{\ell,\ell}v_1 + JS_{V,\ell}v_2 + JS_{JV^\perp,\ell}v_3) = (JS_{\ell,V}v_1 + JS_{V,V}v_2 + JS_{JV^\perp,V}v_3) = 0$$ and $$v_2 + (JS_{\ell,JV^\perp}v_1 + JS_{V,JV^\perp}v_2 + JS_{JV^\perp,JV^\perp}v_3) \in V \oplus V^\perp.$$ We conclude that in order for $v + JSv$ to be in $W$ one must have $v_2 \in \text{Ker} T$ where $T := (S_{V,\ell}, S_{V,V}) : V \rightarrow \ell \oplus V$. Also $\Gamma_{JS} \cap W$ is the graph of the restriction $(JS_{V,JV^\perp}|_{\text{Ker} T})$. The only way the graph of $JS_{V,JV^\perp}|_{\text{Ker} T}$ can have dimension equal to the dimension of $V$ is if $\text{Ker} T = V$, i.e., $$(S_{V,\ell}, S_{V,V}) = 0.$$ Hence the intersection $\mathcal{A}_{\ell \oplus V \oplus JV^\perp} \cap \mathcal{Lag}_k^W$ consists of graphs of operators whose $V \times V$, $V \times \ell$ and $\ell \times V$ blocks are zero. (c) Every Lagrangian $L \in \mathcal{Lag}_k^W$ is in the Arnold chart of its associate which is of the type required by part (b). In these charts $\mathcal{Lag}_k^W$ is described by linear equations and one can very fast see that the codimension is the one indicated. In the Arnold chart of $\ell \oplus V \oplus JV^\perp$ the symplectic reduction with $W$ of any lagrangian $\tilde{L} \in \text{Lag}_k^W$ is the graph of the projection onto the $\ell \times \ell$ block of the operator that gives $\tilde{L}$ and the differentiability follows. □ We will use the symplectic reduction process to shed some light on the diffeomorphism type of $\text{Lag}_k^W$. **Definition 4.6.** Let $\text{Gr}(k,W)$ denote the Grassmannian of $k$-dimensional subspaces of $W$. The *generalized reduction* is the map: $$G : \text{Lag}_k^W \rightarrow \text{Lag}(H_W) \times \text{Gr}(k,W),$$ $$L \rightarrow (\mathcal{R}_W(L), L \cap W).$$ Notice that for $k = 0$ the generalized reduction coincides with the symplectic reduction. We will see that the generalized reduction is a vector bundle projection. First let us notice that $G$ comes with a natural section called the *associate section* namely $$S : \text{Lag}(H_W) \times \text{Gr}(k,W) \rightarrow \text{Lag}_k^W, \quad (\ell, V) \rightarrow \ell \oplus V \oplus JV^\perp.$$ Every associate Lagrangian lies on this section. **Theorem 4.1.** (a) The restriction to the associate section of the tangent space of $\text{Lag}_k^W$, $T \text{Lag}_k^W|_S$, can be naturally identified with the vector subbundle of $T \text{Lag}_k^W|_S$ whose fiber at $\ell \oplus V \oplus JV^\perp$ consists of self-adjoint operators $S \in \text{Sym}(\ell \oplus V \oplus JV^\perp)$ with block decomposition: $$S = \begin{pmatrix} S_1 & 0 & S_2^* \\ 0 & 0 & S_3^* \\ S_2 & S_3 & S_4 \end{pmatrix}.$$ (b) The generalized reduction map is differentiable. Moreover $(\text{Ker } dG)|_S$ can be identified with the vector subbundle of $T \text{Lag}_k^W|_S$ whose fiber at $\ell \oplus V \oplus JV^\perp$ consists of self-adjoint operators $S \in \text{Sym}(\ell \oplus V \oplus JV^\perp)$ with block decomposition. (4.1) $$S = \begin{pmatrix} 0 & 0 & S_2^* \\ 0 & 0 & 0 \\ S_2 & 0 & S_4 \end{pmatrix}.$$ (c) The natural map \[ N : (\text{Ker } d\mathcal{G})|_S \to \text{Lag}^W_k, \quad N(\ell \oplus V \oplus JV^\perp, S) = \Gamma_{JS} \] is a diffeomorphism that makes the diagram commutative \[ \begin{array}{ccc} (\text{Ker } d\mathcal{G})|_S & \xrightarrow{N} & \text{Lag}^W_k \\ \downarrow & & \downarrow \\ \text{Lag}(H_W) \times \text{Gr}(k,W) & \xrightarrow{g} & \text{Lag}^W_k \end{array} \] (d) The space \( \text{Lag}^W_k \) is diffeomorphic to \( \text{Lag}(H_W) \times (\tau^\perp)^p \oplus \text{Sym}(\tau^\perp) \) where \( \tau^\perp \) is the tautological quotient bundle over \( \text{Gr}(k,W) \). Proof. (a) This is obvious since, as in the proof of Proposition 4.3, in the charts centered at \( L = \ell \oplus V \oplus JV^\perp \), the manifold \( \text{Lag}^W_k \) can be described exactly as the set of those self-adjoint operators with the claimed block decomposition. (b) In what concerns differentiability, we only have to prove that the second component, \( \mathcal{G}^2 \), is differentiable. For that we look again at the proof of Lemma 4.3 where we saw that in the Arnold chart \( A_\ell \oplus V \oplus J\tau^\perp \) the intersection \( \Gamma_{JS} \cap W \) is just \( \Gamma_{JS_{V,J\tau^\perp}} \) for every \( S \in \text{Lag}^W_k \). The second claim is obvious when one works in the Arnold charts centered at \( L = \ell \oplus V \oplus J\tau^\perp \) since then \( dL\mathcal{G} \) is just the projection on the \( \ell \times \ell \) and \( V \times J\tau^\perp \) blocks. (c) We construct an inverse for \( N \). To every \( L \in \text{Lag}^W_k \) we associate the Lagrangian \( L_W := \ell \oplus V \oplus J\tau^\perp \) where \( V = L \cap W \) and \( \ell \) is the symplectic reduction with \( W \). By part (a) of the previous proposition, in the Arnold chart centered at \( L_W \), the lagrangian \( L \) is the graph \( \Gamma_{JS} \) of an operator \( S \) of type: \[ S = \begin{pmatrix} 0 & 0 & S_{2}^* \\ 0 & 0 & 0 \\ S_{2} & 0 & S_4 \end{pmatrix}. \] The inverse of \( N \) takes \( L \in \text{Lag}^W_k \) to the Lagrangian \( L_W \) and the operator \( S \) that gives \( L \) in the Arnold chart of \( L_W \). By part (b) this is well-defined. (d) At (b) and (c) we have identified the fiber of \( \text{Lag}^W_k \) over \( \text{Lag}(H_W) \times \text{Gr}(k,W) \) at \( (\ell, V) \) with the vector space \( \text{Hom}(\ell, J\tau^\perp) \oplus \text{Sym}(J\tau^\perp) \). We know that the tautological bundle over \( \text{Lag}^W_k \) is naturally trivializable so the bundle with fiber $\text{Hom}(\ell, JV^{\perp})$ over $\text{Lag}_{H_W} \times \text{Gr}(k, W)$ is naturally isomorphic with the bundle $\text{Hom}(W^{\perp}, JV^{\perp})$ over $L_{\text{ag}}$. A choice of a basis on $W^{\perp}$ identifies $\text{Hom}(W^{\perp}, JV^{\perp})$ with $(\tau^{\perp})^p$. □ It is worth having the case $k = 0$ of the previous results stated explicitly **Corollary 4.1.** The symplectic reduction map $R : \text{Lag}^{W}_0 \to \text{Lag}(H_W)$ together with the associated 0-section $$S : \text{Lag}(H_W) \to \text{Lag}^{W}_0, \quad \ell \mapsto \ell \oplus JW$$ is diffeomorphic with the vector bundle $\text{Ker} dR|_S \to \text{Lag}(H_W)$. As an application to symplectic reduction we give a geometric proof of the following important result which first appears in [15]. **Theorem 4.2 Kirk–Lesch.** The spaces $\text{Lag}^{-}$ and $\text{Lag}_J^{-}$ are weak homotopy equivalent to $U(\infty)$. **Proof.** The proof is no different for $\text{Lag}^{-}$ than for $\text{Lag}^{-}_J$ and is based on the fact that the symplectic reduction map is a vector bundle. In the case of $\text{Lag}^{-}_J$ the operators 4.1 are from the ideal $J$. We start by fixing a complete decreasing flag of finite codimensional subspaces of $H^{-}$. $$H^{-} = W_0 \supset W_1 \supset W_2 \supset \ldots.$$ Notice that $\text{Lag}^{W_i} \subset \text{Lag}^{W_{i+1}}$ is an inclusion of open subsets of $\text{Lag}$ for all $i$ and that $$\bigcup_{i \geq 0} \text{Lag}^{W_i} = \text{Lag}^{-}.$$ Indeed the “$\subset$” inclusion follows by noticing that $\dim L \cap H^{-} \leq \text{codim} W_i = i$ and $L + H^{-} = L + W_i + W_i^{\perp}$ is closed since the orthogonal complement $W_i^{\perp}$ is finite dimensional. The “$\supset$” inclusion is a consequence of the observation that the intersection of the decreasing sequence $L \cap W_i$ is zero and of Proposition 2.4 applied to the commensurate pair $(H^{-}, W_i)$ and the Fredholm pair $(L, H^{-})$. If we can prove that for a fixed $k$ there exists an $n$ big enough such that the pair $(\text{Lag}^{-}, \text{Lag}^{W_n})$ is $k$-connected than we are done because $\text{Lag}^{W_n}$ is homotopy equivalent with $\text{Lag}(H_{W_n})$ which is diffeomorphic by Theorem 3.1 with $U(n)$. This will imply that the induced map $$U(\infty) \to \text{Lag}(\infty) := \lim_n \text{Lag}(H_{W_n}) \hookrightarrow \lim_n \text{Lag}^W = \text{Lag}^-$$ is a weak homotopy equivalence where the first map is induced by the Cayley graph map $C: U(n) \to \text{Lag}(H_{W_n})$. We have of course that $\text{Lag}^W = \text{Lag}^- \setminus \{L \mid \dim L \cap W_n \geq 1\}$ and the set $Z_{n+1} := \{L \mid \dim L \cap W_n \geq 1\}$ is a finite codimensional stratified subset of $\text{Lag}^-$ whose top stratum, $\text{Lag}_1^W$, has codimension $2n + 1$. We therefore fix $n > 1/2(k - 1)$ and show the induced map on homotopy groups $$\pi_i(\text{Lag}^W_n) \mapsto \pi_i(\text{Lag}^-), \quad \forall i \leq k$$ is an isomorphism. Every continuous map $\sigma: S^k \to \text{Lag}^-$ is contained in an open set $\text{Lag}^W_N$ for some $N > n$ big enough so one can deform it to a map $S^k \to \text{Lag}(H_{W_N}) \hookrightarrow \text{Lag}^-$ simply by composing with the symplectic reduction which is a deformation retract. The new map $\sigma_1: S^k \to \text{Lag}(H_{W_N})$ can be deformed into a smooth map and can also be put into transversal position with $Z_{n+1} \cap \text{Lag}(H_{W_N})$ which is a Whitney stratified set (see Remark 5.5) of codimension $2n + 1$ in the finite-dimensional manifold $\text{Lag}(H_{W_N})$. But for $k < 2n + 1$ this means that there is no intersection and hence the resulting map $\sigma_2$ has its image in $\text{Lag}^W_n$. This proves the surjectivity of the map on homotopy groups. The injectivity follows by noting that every map $I \times S^k \to \text{Lag}^-$ can be deformed to a map $I \times S^k \to \text{Lag}^W_n$ by the same type of argument as before for $2n > k$. The same proof works for $\text{Lag}_j^-$. \hfill \Box **Remark 4.2.** In the case of the unitary group, symplectic reduction has a nice explicit description as an algebraic map (see [8], Section 2.5). ### 5. Schubert cells and varieties The topological structure of the vertical Lagrangian Grassmanian, $\text{Lag}^-$ is intimately connected with the structure of the finite Lagrangian Grassmanians which are nothing else but the classical unitary groups. A detailed topological study of these spaces has been undertaken by Nicolaescu in [18]. In that paper, the author shows that the Poincaré duals of the generators of the cohomology group of $U(n)$ can be represented by integral currents supported by semialgebraic varieties. That approach is not available in this infinite-dimensional context. However, we have on our side symplectic reduction which translates most of the problems into their finite-dimensional counterpart. In the proof of Th. 4.2 we introduced a complete, decreasing flag of finite-codimensional subspaces $$\mathcal{W} : \quad H^- =: W_0 \supset W_1 \supset W_2 \supset \ldots.$$ We now fix an orthonormal basis $\{f_1, f_2, \ldots\}$ of $H^-$ such that $W_n^\perp = \langle f_1, f_2, \ldots, f_n \rangle$ and we set $e_i := Jf_i$. To every $k$-tuple of positive integers $I = \{i_1 < i_2 < \ldots < i_k\}$ we associate the following vector subspaces of $\hat{H}$. $$F_I = \langle f_i \mid i \in I \rangle, \quad F_I^c = \langle f_i \mid i \in I^c \rangle \quad \text{and} \quad H^+_I = F_I \oplus JF_{I^c}.$$ **Definition 5.1.** Let $I = \{i_1 < i_2 < \ldots < i_k\}$ be a $k$-tuple of positive integers. Set $i_0 := 0$ and $i_{k+1} := \infty$. The weight of the $k$-tuple is the integer: $$N_I := \sum_{i \in I} (2i - 1).$$ The *Schubert cell* of type $I$ denoted $Z_I$ is a subset of $\mathcal{L}ag^-$ defined by the following incidence relations with respect to the fixed flag $$Z_I = \{L \in \mathcal{L}ag^- \mid \dim L \cap W_j = k - p, \forall 0 \leq p \leq k, \forall j \text{ such that } i_p \leq j < i_{p+1}\}.$$ **Remark 5.1.** One way to look at the incidence relations is by thinking that the $k$-tuple $(i_1, i_2, \ldots, i_k)$ records the “nodes” in the flag where the dimension of the intersection with the lagrangian $L$ drops by one. \hfill $\Box$ **Remark 5.2.** Notice that the orthogonal complement $W_n^\perp$ of $W_n$ in $H^-$ is naturally a lagrangian in $H_W := W_n^\perp \oplus JW_n^\perp$ and $W_n^\perp \subset H_W$ will play the role of the vertical subspace. The flag $W_0 = H^- \supset W_1 \supset W_2$ induces a complete, decreasing flag of $W_n^\perp$: $$ \tilde{W}_0 := W_n^\perp \supset \tilde{W}_1 := W_1/W_n \supset \ldots \supset \tilde{W}_n := W_n/W_n = \{0\} $$ We let $Z_I(n)$ be the Schubert cell in $Lag(H_{W_n^-})$ described by the same incidence relations as the sets $Z_I$ above with $\tilde{W}_i$ replacing $W_i$ and $H_I^+(n)$ be the space corresponding to $H_I^+$. The following description of Schubert cells proves that they are actually Banach spaces when regarded in the right charts. **Proposition 5.1.** The Schubert cell $Z_I$ is a vector subspace of codimension $N_I$ in the Arnold chart $A_{H_I^+}$. More precisely, $\Gamma_{JA} \in A_{H_I^+} \cap Z_I$ if and only if the bounded self-adjoint operator satisfies the linear equations $$ \langle Af_i, f_j \rangle = 0, \quad \forall \ j \leq i, \ i, j \in I, $$ $$ \langle Af_i, e_j \rangle = 0, \quad \forall \ j \leq i, \ i \in I, \ j \in I^c. $$ **Proof.** We will show first that $Z_I \subset A_{H_I^+}$. Let $L \in Z_I$. Notice that $(L, H_I^-)$ is a Fredholm pair by Proposition 2.4 since $H_I^-$ is commensurate with $H^-$. We will show that $L \cap H_I^- = \{0\}$ thus proving that $L = \Gamma_{JA} \in A_{H_I^+}$ with $A \in \text{Sym} H_I^+$. Let us remark that $L \cap F_{I^c} = \{0\}$ because otherwise the dimension of $L \cap W_j$ would drop at “nodes” other than $i_1, i_2, \ldots, i_k$, (take $v = \sum_{j \in I^c} a_j f_j \in L \cap F_{I^c}$ with $p = \min \{j \in I^c \mid a_j \neq 0\}$ then $v \in L \cap W_{p-1} \setminus L \cap W_p$). This is saying that $L \cap H^-$ is the graph of an operator $T : F_I \to F_{I^c}$. To see that $L \cap H_I^- = \{0\}$, let $x = v_1 + v_2 \in L \cap JF_I \oplus F_{I^c}$. Then $Jx \in L^\perp$ and so $\langle Jx, w + Tw \rangle = 0$, for all $w \in F_I$. This implies $$ \langle Jv_1, w \rangle = 0, \quad \forall \ w \in F_I. $$ We get $v_1 = 0$ and so $x = v_2 \in L \cap F_{I^c} = 0$, thus finishing the proof that $L = \Gamma_{JA} \in A_{H_I^+}$. Let now $A \in \text{Sym} (H_I^+)$ such that $\Gamma_{JA} \in Z_I$ and let $$ A = \begin{pmatrix} A_1 & A_2 \\ A_3 & A_4 \end{pmatrix} $$ be the block decomposition of $A$ relative to $H_I^+ = F_I \oplus JF_{I^c}$. One checks immediately that the intersection $\Gamma_{JA} \cap H^-$ is just the graph of the restriction $JA_3 \mid \text{Ker} A_1$, which has the same dimension as $\text{Ker} A_1 \subset F_I$. Since $F_I$ has dimension $k$, one concludes that $$\dim \Gamma_{JA} \cap H^- = k \iff A_1 = 0 \iff \langle Af_i, f_j \rangle = 0, \ \forall \ j \leq i, \ i, j \in I.$$ To prove the rest of the relations, i.e., $\langle Af_i, e_j \rangle = 0, \ \forall i \in I, \ j \in I^c, \ j \leq i$ we observe first that $$\Gamma_{JA} \cap H^- = \Gamma_{JA_3} \text{ and } \langle Af_i, e_j \rangle = -\langle JA_3 f_i, f_j \rangle.$$ The graph of $JA_3 = T : F_I \to F_{I^c}$ satisfies the incidence relations if and only if the required coefficients vanish, otherwise we would have dimension drops at the wrong places again. □ **Remark 5.3.** For every two-sided symmetrically normed ideal $J$ we can define $Z_I(J) = Z_I \cap \text{Lag}^-_{\bar{J}}$. Since the next results are true for $Z_I$, as well as for $Z_I(J)$ making only the minimal changes, we choose to work with $Z_I$ to keep the indices to a minimum. Notice that $Z_I \subset \text{Lag}^-_{W_n}$ for all $n \geq \max \{i \mid i \in I\}$ so we could look at the symplectic reduction of $Z_I$. We record the obvious: **Lemma 5.1.** For $n \geq \max \{i \mid i \in I\}$ the symplectic reduction $\mathcal{R} : \text{Lag}^-_{W_n} \to \text{Lag}(H_W)$ takes $Z_I \subset \text{Lag}^-_{W_n}$ to $Z_I(n)$. The stronger $\mathcal{R}^{-1}(Z_I(n)) = Z_I$ is also true. **Proof.** For $n \geq \max \{i \mid i \in I\}$ we have that $F_I \subset W_n^\perp$ and so $A_{H_I^+} \subset \text{Lag}^-_{W_n}$. The reduction with $W_n$ of the Arnold chart centered at $H^+_I$ is the Arnold chart centered at $H^+_I(n)$. The reduction in the Arnold chart being just the projection, the lemma easily follows. □ **Definition 5.2.** For every $k$-tuple $I = \{i_1, i_2, \ldots, i_k\}$ the Schubert variety is the closure of $Z_I$ in $\text{Lag}^-$, denoted $\overline{Z}_I$. **Lemma 5.2.** The Schubert variety $\overline{Z}_I$ can be described by the following incidence relations: $$\overline{Z}_I = \{L \in \text{Lag}^- \mid \dim L \cap W_j \geq k - p, \ \forall \ 0 \leq p \leq k, \ \forall \ j \text{ such that } i_p \leq j < i_{p+1} \text{ where } i_0 = 0, i_{k+1} = \infty \text{ and } i_p \in I, \ \forall \ 1 \leq p \leq k\}.$$ \textit{Proof.} The fact that the closure is included in the right-hand side is a consequence of the upper semi-continuity of the functions: \[ L \to \dim L \cap W_j, \quad \forall j \geq 0. \] Conversely, let us notice that for \( n \) big enough we have the following obvious equalities \( \text{Lag}^W_n \cap \overline{Z}_I = \text{cl}_n(Z_I) = \mathcal{R}^{-1}(\overline{Z}_I(n)) \) where \( \text{cl}_n(Z_I) \) is the closure of \( Z_I \) in \( \text{Lag}^W_n \). Now, a lagrangian that satisfies the incidence relations in the lemma is in some \( \text{Lag}^W_n \) and its reduced space will satisfy the same incidence relations with respect to the flag \( \overline{W} \supset \overline{W}_1 \supset \ldots \supset \overline{W}_n \). But this means it is in \( \overline{Z}_I(n) \), since the finite version of the lemma is true by results from [18], namely Prop. 4.3, 4.4 and 4.6. \( \square \) \textbf{Remark 5.4.} The Schubert variety \( Z_I \) is not included in any of the clean sets \( \text{Lag}^W_n \). However, the intersection has a very simple description: \( \overline{Z}_I \cap \text{Lag}^W_n = \mathcal{R}^{-1}(\overline{Z}_I(n)) \). We can now describe the strata in the Schubert variety \( \overline{Z}_I \). Notice first that if \( Z_J \subset \overline{Z}_I \) then \( |J| \geq |I| \) since \( |J| = \dim L \cap H^- \) for every \( L \in Z_J \). Say \( J = \{ j_1 < j_2 < \cdots < j_l \} \) and \( I = \{ i_1 < i_2 < \cdots < i_k \} \) with \( l \geq k \). We deduce that \( i_1 \leq j_{l-k+1} \), since \( j_{l-k+1} \) records the node where the dimension of the intersection of \( L \in Z_J \) with the flag drops to \( k - 1 \) and similarly \( i_s \leq j_{l-k+s} \) for all \( 1 \leq s \leq k \). We record this: \textbf{Lemma 5.3.} (a) If \( Z_J \subset \overline{Z}_I \) then \( |J| = l \geq k = |I| \) and \( i_s \leq j_{l-k+s} \) for all \( 1 \leq s \leq k \). (b) If \( Z_J \subset \overline{Z}_I \) has codimension \( N_I + 1 \) in \( \text{Lag}^- \) where \( N_I = \sum_{i \in I} (2i - 1) \) is the codimension of \( Z_I \) in \( \text{Lag}^- \) then \( |J| = k + 1 \), \( j_1 = 1 \) and \( j_{s+1} = i_s \) for all \( 1 \leq s \leq k \). \textbf{Corollary 5.1.} The fundamental Schubert variety \( \overline{Z}_n \) can be described by the simple incidence relation: \[ \overline{Z}_n = \{ L \mid \dim (L \cap W_{n-1}) \geq 1 \}. \] \textit{Proof.} Let \( J = \{ j_1, \ldots, j_l \} \), \( L \in Z_J \) and \( Z_J \subset \overline{Z}_n \). The previous lemma tells us that \( j_l \geq n \) and so the node where the dimension of the intersection of \( L \) with the flag drops to 0 is bigger than \( n - 1 \). This proves the “\( \subset \)” inclusion. The other inclusion is obvious. \( \square \) The odd Chern character and index localization formulae The previous corollary is key to dealing with the singularities in codimension 1 of $\overline{Z_n}$. It says that the following inclusions hold: $$Z_n \subset \mathcal{L}_{ag_1}^{W_{n-1}} \subset \overline{Z_n} = \overline{\mathcal{L}_{ag_1}^{W_{n-1}}}.$$ In other words, we can find a new stratification of $\overline{Z_n}$ in which the top stratum is $\mathcal{L}_{ag_1}^{W_{n-1}}$ and there aren’t any singularities in codimension 1. We will do this in more detail in Section 8. One can play the same game with the Schubert varieties $\overline{Z_I}$. Indeed, let $I := \{i_1 < i_2 < \cdots < i_k\}$ and let $J^I := I - i_1 + 1$ be two $k$-tuples of positive integers. For every set $J$ with $|J| = k$ (not necessarily of the previous type) and every complete, decreasing flag $W := V_0 \supset V_1 \supset \cdots$ of a finite codimensional, isotropic space $W$ define $$\text{Sch}_J^W := \{V \in \text{Gr}(k, W) \mid \dim L \cap V_s = k - p, \forall 0 \leq p \leq k, \text{ such that } j_p \leq s < j_{p+1}\}$$ to be the “standard” Schubert cell in $\text{Gr}(k, W)$ of complex codimension $\sum_p j_p - p$. Let $$\mathcal{L}_{ag_I}^W := (G_2)^{-1}(\text{Sch}_J^W)$$ be a subset of $\mathcal{L}_{ag}^-$, where $G_2$ is the second component of the symplectic reduction. Clearly $\mathcal{L}_{ag_I}^W$ is a manifold. Moreover, the following inclusions hold: $$Z_I \subset \mathcal{L}_{ag_I}^{W_{i_1-1}} \subset \overline{Z_I},$$ where the flag in $W_{i_1-1}$ is, obviously, $W_{i_1} \supset W_{i_1+1} \supset \ldots$. The manifolds $\mathcal{L}_{ag_I}^W$ are the top strata in a stratification of $Z_I$ without singularities in codimension 1. **Remark 5.5.** In the proof of Theorem 4.2 we claimed that $\overline{Z_{n+1}(N)}$ is a Whitney stratified subset of $\mathcal{L}_{ag}(H_{W_N})$ of codimension $2n + 1$, where $N > n$. The codimension assertion follows from noting that $\overline{Z_{n+1}(N)}$ is the closure of $\mathcal{L}_{ag_1}^{W_n}$ which has codimension $2n + 1$. The fact that the stratification is Whitney is because $\overline{Z_{n+1}(N)}$ is a semi-algebraic orbit of a certain subgroup of the symplectic group (see Section 3 in [18]). 6. The cohomology ring and geometrical representatives Our plan is to define geometrical representatives for certain cohomology classes of $\mathcal{L}_{ag}^-$. For the infinite-dimensional framework, we are dealing with the sheaf theoretic methods are very general and efficient. In the case of $\mathcal{L}_{ag}^-$ one could, in principle, use some ad-hoc method to define these cohomology classes without appeal to sheaf theory. However, we prefer to summarize in an appendix the general principles which can be of use in other situations. Notice that by fixing a decreasing flag: \[ H^{-} \supset W_1 \supset W_2 \cdots, \] we have canonical inclusions \[ \text{Lag}(H_{W_n}) \to \text{Lag}(H_{W_{n+1}}) \to \text{Lag}^{-}. \] **Proposition 6.1.** (a) The inclusion map \[ i : \text{Lag}(H_{W_n}) \to \text{Lag}^{-}, \quad L \to L + JW_n \] induces an isomorphism of cohomology groups \[ H^q(\text{Lag}^{-}, \mathbb{Z}) \simeq H^q(\text{Lag}(H_{W_n}), \mathbb{Z}) \] for \( q \leq 2n - 1 \). (b) Let \( I \) be an indexing set. Suppose \( z_i \in H^*(\text{Lag}^{-}, \mathbb{Z}) \) with \( i \in I \) are cohomology classes such that for each \( n \) the set of pull-backs \( z_i(n) \in H^*(\text{Lag}(H_{W_n}), \mathbb{Z}) \) generate the cohomology ring of \( \text{Lag}(H_{W_n}) \). Then \( (z_i)_{i \in I} \) generate the cohomology ring of \( \text{Lag}^{-} \). **Proof.** (a) By Corollary 4.1 we have that the inclusion induces a homotopy equivalence of \( \text{Lag}(H_{W_n}) \) with \( \text{Lag}^{W_n} = \text{Lag}^{-} \setminus \mathbb{Z}_{n+1} \). On the other hand, \( \mathbb{Z}_{n+1} \) is a stratified subset whose top stratum has codimension \( 2n + 1 \) hence by the extension property, see Propositions A.2 and A.4, the natural map \[ H^q(\text{Lag}^{-}) \to H^q(\text{Lag}^{-} \setminus \mathbb{Z}_{n+1}) \] is an isomorphism. (b) It follows from (a). \( \Box \) **Remark 6.1.** From now on we will identify \( \text{Lag}(H_{W_n}) \) with the unitary group \( U(n) \) via the Cayley graph map. Technically speaking, we only have a *canonical* isomorphism between \( \text{Lag}(H_{W_n}) \) and \( U(JW_n^\perp) \) (where \( JW_n^\perp \) is the horizontal subspace of \( H_{W_n} \)) given by the Arnold theorem and an identification of \( U(JW_n^\perp) \) with \( U(n) \) via a *non-canonical* unitary map \( JW_n^\perp \simeq \mathbb{C}^n \). From a cohomological point of view it does not matter what this noncanonical unitary map is since any other choice will induce the same isomorphism \[ H^*(U(JW_n^\perp)) \simeq H^*(U(n)), \] simply because every unitary map on a vector space is homotopic to the identity. □ Following [18], the groups \( U(n) \) have canonically defined cohomology classes \( x_i \in H^{2i-1}(U(n), \mathbb{Z}) \). On the product \( S^1 \times U(n) \) there is a rank \( n \) (universal) complex vector bundle \( E_n \). The bundle is obtained by modding out a \( \mathbb{Z} \)-action on the \( \mathbb{Z} \)-equivariant bundle \[ \mathbb{R} \times U(n) \times \mathbb{C}^n \rightarrow \mathbb{R} \times U(n). \] The action on the total space is given by \[ k(t, U, v) := (t + k, U, U^k v), \quad \forall (t, U, v) \in \mathbb{R} \times U(n) \times \mathbb{C}^n, \quad k \in \mathbb{Z}, \] whereas on the base space, \( \mathbb{Z} \) acts in the obvious way on the \( \mathbb{R} \) component. The classes \( x_i \) are transgressions of the Chern classes of \( E_n \), i.e., \[ x_i(n) := \int_{S^1} c_i(E_n) \] The classes \( x_i(n) \in H^{2i-1}(U(n)) \), \( 1 \leq i \leq n \), generate the cohomology ring of \( U(n) \), i.e., \[ H^*(U(n), \mathbb{Z}) \simeq \Lambda(x_1, \ldots, x_n). \] Notice that via the canonical inclusion \[ S^1 \times U(n) \hookrightarrow S^1 \times U(n + 1) \] the bundle \( E_{n+1} \) pulls-back to give a bundle isomorphic to \( E_n \oplus \mathbb{C} \). Therefore, the class \( x_i(n + 1) \) pulls back to \( x_i(n) \). This compatibility with the natural inclusions of the classes \( x_i(n) \) prompts the following definition. **Definition 6.1.** The fundamental transgression classes on \( \text{Lag}^- \) are the unique cohomology classes \( z_i \in H^{2i-1}(\text{Lag}^-) \) that pull-back to the classes \(x_i(n) \in H^{2i-1}(U(n))\) via the induced map \[ U(n) \xrightarrow{i} \text{Lag}^-, \quad x_i(n) = i^*(z_i), \] where \(i\) is the composition of the natural inclusion \(\text{Lag}(n) \hookrightarrow \text{Lag}^-\) with the Cayley graph diffeomorphism. For every set of positive integers \(I = \{i_1, \ldots, i_k\}\), define the product class \(z_I \in H^{|I|}(\text{Lag}^-)\) to be the cup product of fundamental transgression classes: \[ z_I = z_{i_1} \wedge z_{i_2} \wedge \ldots \wedge z_{i_k}. \] We now turn to the Schubert varieties \(\overline{Z}_I\). In Appendix A, we describe how one can define a cohomology class when dealing with a cooriented, stratified space without singularities in codimension 1. We summarize the main definitions and procedures. **Definition 6.2.** Let \(X\) be a Banach manifold. A **quasi-submanifold** of \(X\) of codimension \(c\) is a closed subset \(F \subset X\) together with a decreasing filtration by closed subsets \[ F : \quad F = F^0 \supset F^1 \supset F^2 \supset F^3 \subset \cdots \] such that the following hold. (i) \(F^1 = F^2\). (ii) The strata \(S^k = F^k \setminus F^{k+1}\), are submanifolds of \(X\) of codimension \(k + c\). The quasi-submanifold is called **coorientable** if \(S^0\) is coorientable. A coorientation of a quasi-submanifold is then a coorientation of its top stratum. The main ingredients to define a cohomology class out of a coorientable quasi-submanifold are: - A Thom isomorphism of the top dimensional stratum \(S^0\), which is a submanifold and closed subset of \(X \setminus F^2\). \[ H^0(S^0) \simeq H^c(X \setminus F^2, X \setminus F^0). \] This depends on the choice of a coorientation. • An extension isomorphism in cohomology, over the singular stratum $F^2$, which exists because $F^2$ has codimension at least two bigger than $S^0$. $$H^c(X) \rightarrow H^c(X \setminus F^2).$$ The cohomology class determined by the triple $(F, F, \omega)$ is the image of $1 \in H^0(S^0)$ via the composition: $$H^0(S^0) \simeq H^c(X \setminus F^2, X \setminus F^0) \rightarrow H^c(X \setminus F^2) \simeq H^c(X)$$ and is denoted $[F, \omega]$. Although this class depends on the stratification $F$ (see Remark A.4) we will not make this fact explicit in the notation. **Notation:** $$Z_I : Z_I \cup Z_{I \cup 1}, \quad \partial Z_I : = \overline{Z_I} \setminus Z_I.$$ **Definition 6.3.** The standard filtration on $\overline{Z}_I$ is the following filtration. $$F^0 := \overline{Z}_I; \quad F^1 = F^2 := \partial Z_I; \quad F^k := \bigcup_{Z_J \subset \overline{Z}_I, N_J \geq N_I + k} Z_J.$$ **Theorem 6.1.** The standard stratification on the Schubert variety $\overline{Z}_I$ turns it into a coorientable quasi-submanifold of $\text{Lag}^{-}_W$ of codimension $N_I$. There exists a canonical choice of a coorientation $\omega_I$ on the top stratum such that the following equality of cohomology classes holds $$[\overline{Z}_I, \omega_I] = z_I.$$ Before we go into the proof, a short digression on the results of [18] is necessary. In that article, Nicolaescu uses the theory of analytic currents to build out of the finite-dimensional Schubert variety, $\overline{Z}_I(n) \subset \text{Lag}(n)$, endowed with an orientation, a homology class. He shows that this class is Poincare dual to the class $x_I(n) \in H^{N_I}((\text{Lag}(n))$. We summarize the main results: **Proposition 6.2.** The sets $Z_I(n)^\circ$ are orientable, smooth, subanalytic manifolds of codimension $N_I$ in $\text{Lag}(n)$. **Proof.** See [18], Lemma 5.7. Alternatively, $Z_I(n)^\circ$ is open in the manifold $\text{Lag}_{W_{k-1}}(n)$ (see the end of the previous section). In the next section we prove, via a different method, the fact that $\text{Lag}_{W_k} \supset Z_k^\circ$ is naturally cooriented. \qed Proposition 6.3. The closed set $\overline{Z}_I(n)$ with the canonical orientation $\omega_I$ is an analytical cycle and so it defines a homology class in $H_{n^2-N_I(U(n))}$ which is Poincare dual to $x_I(n)$. Proof. See [18], Theorem 6.1. Proof of Theorem 6.1: We consider $n \geq 1/2(N_I + 1)$ and we look at the symplectic reduction $\mathcal{R}_n : \mathcal{L}ag_{W_n} \to \mathcal{L}ag(H_{W_n})$. We have $n \geq \max \{i \in I\}$ and so $Z_I^\circ \subset \mathcal{L}ag^{W_n}$. By Lemma 5.1 we have that $\mathcal{R}_n^{-1}(Z_I^\circ(n)) = Z_I^\circ$. Since $\mathcal{R}_n$ is a vector bundle, the normal bundle to $Z_I^\circ$ is canonically isomorphic with the pull-back via $\mathcal{R}_n$ of the normal bundle of $Z_I(n)^\circ$. Hence it induces an orientation. With this coorientation on $\overline{Z}_I$ we get a cohomology class $[\overline{Z}_I, \omega_I] \in H^{N_I}(\mathcal{L}ag^{-})$. By Proposition 6.1 this class is uniquely determined by its restriction to $\mathcal{L}ag(H_{W_n})$. Now, the inclusion map $i : \mathcal{L}ag(H_{W_n}) \hookrightarrow \mathcal{L}ag^{-}$ is transversal to $\overline{Z}_I$ and the following set equality holds: $$i^{-1}(\overline{Z}_I) = Z_I(n).$$ To see why it is transversal notice that the image of $i$ is the zero section, i.e., $S(\mathcal{L}ag(H_{W_n}))$, of the symplectic reduction. It is therefore enough to prove the transversality of $S(\mathcal{L}ag(H_{W_n}))$ with $\overline{Z}_I \cap \mathcal{L}ag^{W_n}$ (which is a stratified set with a finite number of strata). This is true because of Lemma 5.1. By Proposition A.5 we have $$i^*([\overline{Z}_I, \omega_I]) = [\overline{Z}_I(n), \omega_I(n)] \in H^{N_I}(\mathcal{L}ag(H_{W_n})).$$ By Nicolaescu’s results the class on the right equals $x_I(N)$. Since in $\mathcal{L}ag^{-}$ there is another class that restricts to $x_I(N)$, namely $z_I$ we get the desired equality. □ Remark 6.2. In the proof of the previous theorem we used Nicolaescu’s results in a form slightly different than stated in Proposition 6.3. We used the cohomology class represented by a stratified set together with an induced coorientation. It is clear that an coorientation on $Z_I(n)^\circ$ induces a orientation on the same space by the normal-bundle-first convention. An oriented quasi-submanifold $C$ determines a homology class which is Poincaré dual to the cohomology class induced by the same quasi-submanifold. Moreover, as shown by Hardt [11, 12], there exists an isomorphism of the Borel–Moore homology groups of $X$ with the analytic currents homology that takes the geometric class determined by the quasi-submanifold $C$ to the current $C$ induces. Definition 6.4. The triple composed of the Schubert variety $Z_I$ with the standard filtration and the coorientation $\omega_I$ is called the Schubert cocycle or the geometric representative of $z_I$. The cohomology class it represents is denoted $[Z_I, \omega_I]$. We consider now families of vertical, Fredholm Lagrangians. Definition 6.5. A map $F : M \to \mathcal{Lag}^-$ is said to be (standard) transversal to $Z_I$ if it is transversal to every stratum in the standard stratification. Lemma 6.1. Any smooth family $F : M \to \mathcal{Lag}^-$ can be deformed by a smooth homotopy to a family transversal to $Z_k$. Proof. Since $M$ is compact, transversality with $Z_I$ means actually transversality of the reduced family with $\overline{Z}_I$ for $n$ big enough. Transversality with Whitney stratified spaces is an open, dense condition in the space of all smooth maps $G : M \to \mathcal{Lag}(n)$. $\square$ Proposition 6.4. Let $M$ be a closed oriented manifold and let $F : M \to \mathcal{Lag}^-$ be a family transversal to $Z_I$. Then $F^{-1}(Z_I)$ is quasi-submanifold of $M$ with a naturally induced coorientation $F^*\omega_I$ and $$[F^{-1}(Z_I), F^*\omega_I] = F^*[Z_I, \omega_I].$$ Proof. This is just Proposition A.5. The pull-back of the normal bundle to $Z_I$ is naturally isomorphic with the normal bundle to $F^{-1}(Z_I)$ and the coorientation $F^*\omega_I$ is the one induced via this isomorphism. $\square$ In the infinite-dimensional context, Poincaré Duality does not make sense. Instead we aim for an expression of Poincaré Duality for families of lagrangians parametrized by a closed, oriented manifold $M$. In Appendix A, we show that when the manifold $M$ is compact then any oriented quasi-submanifold $F \subset M$ of dimension $d$ determines a homology class $[F] \in H_d(M)$ which is Poincaré dual to the cohomology class $[F] \in H^{n-d}(M)$ induced by the obvious coorientation. Combining this with the previous proposition we get. Theorem 6.2. Let $F : M \to \mathcal{Lag}^-$ be a smooth map from an oriented, closed manifold $M$ of dimension $n$ to $\mathcal{Lag}^-$. Suppose $F$ is transversal to $Z_I$. Then the preimage $F^{-1}(Z_I)$ has a naturally induced orientation and so it defines a homology class $[F^{-1}(Z_I)] \in H_{n-N_I}(M)$ which is Poincaré dual to the class $F^*[Z_I]$. 7. The odd Chern character Let $M$ be a finite, CW-complex, hence compact. The Chern character is a ring homomorphism: $$\text{ch} : K^0(M) \to H^{\text{even}}(M, \mathbb{Q}).$$ The suspension isomorphism, which is actually taken to be the definition of $K^{-1}$, helps us extend the Chern character to the odd component: $$ \begin{array}{ccc} \tilde{K}^{-1}(M) & \xrightarrow{\Sigma} & K^0(\Sigma M) \\ \text{ch} \downarrow & & \downarrow \text{ch} \\ \tilde{H}^{\text{odd}}(M, \mathbb{Q}) & \xrightarrow{\Sigma} & \tilde{H}^{\text{even}}(\Sigma M, \mathbb{Q}) \end{array} $$ It is well known that $U(\infty)$ is a classifying space for $K^{-1}$. Hence, every element in $\tilde{K}^{-1}(M)$ can be represented by the homotopy class of a (pointed) map $f : M \to U(\infty)$. Let $[f] \in K^{-1}(M)$ be the element this map represents. Then $\Sigma f : \Sigma M \to \Sigma U(\infty)$ represents an element in $\tilde{K}^0(\Sigma M)$ which corresponds to $f$ via the suspension isomorphism. The previous commutative diagram can be written as $$ (7.1) \quad \Sigma \circ \text{ch} \ [f] = \text{ch} ([\Sigma f]). $$ A short digression is necessary at this point. The space $\Sigma U(\infty)$ comes with a principal $U(\infty)$-bundle $\tilde{U}$, namely the one obtained via the clutching map given by the identity. More precisely, one starts with the trivial $U(\infty)$ bundle over $[0, 1] \times U(\infty)$ and identifies $(0, U, g)$ with $(1, U, Ug)$ for all $(U, g) \in U(\infty) \times U(\infty)$. This is an old acquaintance of ours. Indeed the pull-back of this bundle to $\Sigma U(n)$ is nothing else but the frame bundle associated to the vector bundle $E_n$, which we considered in Section 6. Another way of looking at these bundles is via the periodicity map (see [22], pp. 224–225) $$ \Sigma U(n) \to \text{Gr}(n, 2n) \hookrightarrow \text{Gr}(n, \infty) \simeq BU(n), $$ where the first map is given explicitly as follows: $$ [0, \pi] \times U(n) \to \text{Gr}(n, 2n), \quad (t, U) \to \cos t \begin{pmatrix} 1 & 0 \\ 0 & -1 \end{pmatrix} - \sin t \begin{pmatrix} 0 & U^{-1} \\ U & 0 \end{pmatrix}. $$ The odd Chern character and index localization formulæ The right-hand side is an involution of $\mathbb{C}^n \oplus \mathbb{C}^n$. The bundle $E_n$ is the pull-back of the universal $U(n)$-vector bundle $EU(n)$. In the same way $\widetilde{U}$ comes from the universal $U(\infty)$-bundle over $BU(\infty)$. Now every continuous map $f : M \to U(\infty)$ defined on a compact set $M$ is homotopy equivalent with a map (which we denote by the same paper) $f : M \to U(n)$. The class $[f] \in K^{-1}(M)$ or the class $[\Sigma f] \in \tilde{K}^0(\Sigma M)$ can be represented by the bundle $(\Sigma f)^*E_n$ (which determines a stable isomorphism class). Using equation (7.1) we get that $$\text{(7.2)} \quad \text{ch}[f] = \Sigma^{-1} \text{ch}((\Sigma f)^*E_n)) = \Sigma^{-1}((\Sigma f)^* \text{ch} E_n).$$ The inverse of the suspension isomorphism $\Sigma$ is easy to describe. It is the composition $$\tilde{H}^{\text{even}}(\Sigma M, \mathbb{Z}) \xrightarrow{\pi^*} \tilde{H}^{\text{even}}(S^1 \times M, \mathbb{Z}) \xrightarrow{/dt} H^{\text{even} - 1}(M, \mathbb{Z}),$$ where $\pi : S^1 \times M \to \Sigma M$ stands for the projection and $/dt$ stands for the slant product with the fundamental class of $S^1$. So $$\text{(7.3)} \quad \Sigma^{-1}((\Sigma f)^* \text{ch} E_n) = (\pi^*(\Sigma f)^* \text{ch} E_n)/dt = (\Sigma f \circ \pi)^* \text{ch} E_n)/dt = ((id_{S^1} \times f)^* \text{ch} E_n)/dt = f^*(\text{ch} E_n/dt).$$ The class $\text{ch} E_n/dt \in H^{\text{odd}}(U(n), \mathbb{Q})$ is called the transgression class of the Chern character. Of course, one can do slant product componentwise and get, for each positive integer $k$ a class: $$\text{ch}_{2k-1}^\tau := \text{ch}_{2k} (E_n)/dt \in H^{2k-1}(U(n), \mathbb{Q}).$$ There is nothing special about the Chern character. The same transgression process can be applied to any characteristic class of $E_n$, in particular to the Chern classes and we have already done this in Section 6 where we denoted those classes by $x_i$. We use a different notation now which is more appropriate to this context, $$c_{2k-1}^\tau := c_k(E_n)/dt \in H^{2k-1}(U(n), \mathbb{Z}).$$ There is a very simple relation between $\text{ch}_{2k-1}^\tau$ and $c_{2k-1}^\tau$: **Lemma 7.1.** $$\text{ch}_{2k-1}^\tau = \frac{(-1)^{k-1}}{(k-1)!} c_{2k-1}^\tau.$$ Proof. First of all, $\text{ch}_2k(E_n) \in \check{H}^{2k}(S^1 \times U(n), \mathbb{Q})$ is a polynomial in the variables $c_1(E_n), \ldots, c_k(E_n)$ and the coefficient of $c_k(E_n)$ is $(-1)^{k-1}/(k-1)!$. On the other hand, every element in $H^{2k}(S^1 \times U(n), \mathbb{Z})$ is a sum: $$z = x + Dt \wedge y,$$ where $x \in H^{2k}(U(n), \mathbb{Z})$, $y \in H^{2k}(U(n), \mathbb{Z})$ and $Dt \in H^1(S^1, \mathbb{Z})$ satisfies $Dt(dt) = 1$. We claim that for every characteristic class of $E_n$ its $H^{2k}(U(n), \mathbb{Z})$ component vanishes. Indeed the class $x$ is the pull-back of $z$ via the inclusion $\{1\} \times U(n) \to S^1 \times U(n)$ and the claim follows by noticing that the pull-back of the bundle $E$ is trivial over $U(n)$. We conclude that the cup product of any two characteristic classes of $E_n$ is zero and so we have $$\text{ch}_2k(E_n) = \frac{(-1)^{k-1}}{(k-1)!} c_k(E_n),$$ which after taking the slant product gives the identity we were after. □ Suppose now that $M$ is a closed, oriented manifold and $f : M \to \text{Lag}^-$. Theorem 6.1 is saying that the pull-back $f^*x_k = f^*[Z_k, \omega_k]$. On the other hand, by the previous lemma, relations (7.2), (7.3) and Proposition 6.4 we have the following result: **Proposition 7.1.** Let $M$ be a closed manifold and let $f : M \to \text{Lag}^-$ be a smooth map transversal to $Z_k$. The following holds: $$\text{ch}_{2k-1}([f]) = \frac{(-1)^{k-1}}{(k-1)!} f^*[Z_k, \omega_k] = \frac{(-1)^{k-1}}{(k-1)!} [f^{-1}(Z_k), f^*\omega_k].$$ □ We will give now a first application to what we said so far. Let us take $M := S^{2N-1}$ in the previous proposition. Notice that we have a map $$\Pi_N : \pi_{2N-1}(\text{Lag}^-) \to \mathbb{Z}, \quad \Pi_N([f : S^{2N-1} \to \text{Lag}^-]) = \int_{S^{2N-1}} f^*[Z_N, \omega_N].$$ Using Bott divisibility (see Th. IV.1.4 in [17]) and Bott periodicity arguments (such as Th. 24.5.3 in [13]) one can show that the following result holds **Theorem 7.1.** The map $\Pi_N$ is injective and the image is the subgroup $(n-1)!\mathbb{Z}$. Corollary 7.1. The homotopy type of a map \( f : S^{2N-1} \to \mathcal{L}ag^- \) is determined by the integer \[ \int_{S^{2N-1}} f^* [\mathbb{Z}_N, \omega_N], \] which is always divisible by \((N - 1)!\). If \( f \) is transversal to \( \mathbb{Z}_N \) then this integer is the total intersection number of \( f \) and \( \mathbb{Z}_N \). Remark 7.1. Any map \( f : S^{2N-1} \to \mathcal{L}ag^- \) can be deformed to a map \( S^{2N-1} \to \mathcal{L}ag(N) \). After identifying \( \mathcal{L}ag(N) \) with \( U(N) \) one gets a map \( \mathcal{L}ag(N) \to S^{2N-1} \) coming from the fibration \( p : U(N) \to S^{2N-1} \). The degree of the composition \( p \circ f : S^{2N-1} \to S^{2N-1} \) is exactly the integer from the corollary. 8. The normal bundle The main goal of this paper is to give concrete local intersection formulae for Theorem 6.2 in the particular case of the fundamental Schubert classes \([Z_k, \omega_k]\). To that end we need a good description of the normal bundle of the top stratum of \( \mathbb{Z}_k \), i.e., \( Z^0_k \), in \( \mathcal{L}ag^- \). It turns out that it is more convenient to work with the submanifold \( \mathcal{L}ag W_{k-1} \supset Z^0_k \). Hence, we will use a different stratification in which the top stratum is \( \mathcal{L}ag W_{k-1} \). A legitimate question is then what role does the filtration play in the definition of the cohomology class determined by a quasi-submanifold? In the appendix A of [8] we showed that if a quasi-submanifold \( W \) comes with two different filtrations \((W, F)\) and \((W, G)\), which have common refinement \((W, H)\), where by refinement we understand that \( H^2 \subset F^2 \cup G^2 \) and the coorientation on \( W \setminus H^2 \) restricts to the coorientations of \( W \setminus F^2 \) and \( W \setminus G^2 \) then they define the same cohomology class. It is possible that any two filtrations of a quasi-submanifold have a common refinement. However, we could not prove that. Definition 8.1. The non-standard stratification on \( \mathbb{Z}_k \): \[ \overline{Z}_k := F_0 \supset F_2 \supset F_3 \supset \ldots \] has as its top stratum the manifold \( F_0 \setminus F_2 := \mathcal{L}ag W_{k-1} \), while the other strata, \( F_i \setminus F_{i+1} \) are unions of \( Z_J \subset \overline{Z}_k \setminus \mathcal{L}ag W_{k-1} \) each of which has codimension \((2k - 1) + i\) in \( \mathcal{L}ag^- \). A function \( F : M \to \mathcal{L}ag^- \) is (non-standard) transversal to \( \overline{Z}_k \) if it is transversal to every stratum in the non-standard stratification. In this section, we aim to give a concrete description for a splitting of the differential of the inclusion $L_{ag W}$ where $W \subset H$ is finite codimensional. We have a canonical choice of this splitting in the charts along the zero section as Theorem 4.1 shows. We prove that a similar result holds everywhere. **Definition 8.2.** Let $j : E \to F$ be an injective morphism of vector bundles over a smooth Banach manifold $X$. An *algebraic complement* $G$ of $E$ is a vector bundle over $X$ that splits $j$. This means that there exists an injective morphism $k : G \to F$ such that $$F = E \oplus G.$$ **Notation:** Let $F : X_1 \to X_2$ be a smooth immersion of Banach manifolds. An algebraic complement of the tangent bundle $T X_1$ is denoted by $N X_1$. **Lemma 8.1.** Let $F : X_1 \to X_2$ be a smooth immersion of Banach manifolds. Then every algebraic complement of $T X_1$ is naturally isomorphic with the normal bundle $\nu X_1$. **Proof.** The natural projection $N X_1 \to \nu X_1$ is an isomorphism. □ The following two results help us generalize the results of Theorem 4.1. **Lemma 8.2.** Let $L_0$ and $L \in L_{ag^-}$ be two lagrangians such that $L \in A_{L_0}$ (2.3). Then the differential at $L$ of the transition map between the Arnold chart centered at $L_0$ and the Arnold chart centered at $L$ is the map: $$d_L : \text{Sym} (L_0) \to \text{Sym} (L) \quad d_L (\hat{S}) = P_{L_0} \circ \hat{S} \circ P_{L_0} |_L.$$ **Proof.** Let $L_1 \in A_{L_0} \cap A_L$. This means that $L_1$ can be described both as $\Gamma_{JX}$ where $X \in \text{Sym} (L_0)$ and $\Gamma_{JS}$ where $S \in \text{Sym} (L)$. It is not hard to see what $S$ should be. $$JS = P_{L_1} \circ (I, JX) \circ [P_L \circ (I, JX)]^{-1}.$$ The image of the map $(I, JX) : L_0 \to \hat{H}$ gives the Lagrangian $L_1$ and the inverse of $P_L \circ (I, JX)$ is a well-defined operator $L \to L_1$ since $L_1$ is in $A_L$. We consider the function: $$F : \text{Sym} (L_0) \to \text{Sym} (L), \quad F(X) = -JP_{L_0} \circ (P_L |_L)^{-1}.$$ Notice that for $X_0 = -JP_{L_0} \circ (P_L |_L)^{-1}$ we have $F(X_0) = 0$ since $X_0 \in \text{Sym} (L_0)$ is the self-adjoint operator such that $L = \Gamma_{JX_0}$. The differential of The odd Chern character and index localization formulae \[ F \text{ at } X_0 \text{ is} \] \[ d_{X_0} F(\dot{S}) = -JP_{L^+} \circ (0, J\dot{S}) \circ [P_L \circ (I, JX_0)]^{-1} - JP_{L^+} \circ (I, JX_0) \circ [\ldots] \] \[ = -JP_{L^+} \circ (0, J\dot{S}) \circ [P_L \circ (I, JX_0)]^{-1} \] The reason for the cancelation of the second term is that the image of \((I, JX_0)\) is in \(L\). It is easy to see that \([P_L \circ (I, JX_0)]^{-1} = P_{L_0}|_L\), the restriction to \(L\) of the projection onto \(L_0\). Also since \(P_{LL}(Jv) = JP_L(v)\) for any lagrangian \(L\) and for any \(v \in \tilde{H}\), we get that \(-JP_{L^+} \circ (0, J\dot{S}) = P_L \circ \dot{S}\). So \[ d_{X_0} F(\dot{S}) = P_L|_{L_0} \circ \dot{S} \circ P_{L_0}|_L \] and this is our \(d_L\). It is convenient to have another description of the differential of the transition map. To this end, let us recall that Theorem 3.1 provides a canonical unitary isomorphism: \[ \tilde{U} : L_0 \to L, \quad \tilde{U}(v) := 1/2[ (1+U)v + iJ(1-U)v ], \quad \forall \, v \in L_0, \] where \(U \in \mathfrak{u}(L_0)\) is the Cayley transform of the self-adjoint operator \(X_0 \in \text{Sym}(L_0)\) that gives \(L\) as a graph of \(JX_0 : L_0 \to L_0^\perp\). Notice first that the projection \(P_L|_{L_0}\) has a description in terms of the same self-adjoint operator \(X_0\). The orthogonal \(L_0^\perp\) is the switched graph of \(- (JX_0)^* = X_0 J\). So in order to find the projection \(P_L|_{L_0}\) in terms of \(X_0\) one needs to solve the system \[ \begin{align*} a &= v + X_0 Jw, \\ 0 &= JX_0 v + w, \end{align*} \] where \(a, v \in L_0\) and \(w \in L_0^\perp\). This is easy and one gets \[ v = (1 + X_0^2)^{-1}(a), \] which yields the expression for the projection: \[ P_L|_{L_0}(a) = (1 + X_0^2)^{-1}(a) + JX_0(1 + X_0^2)^{-1}(a). \] We now plug in \[ X_0 = i(1+U)^{-1}(1-U) \] to conclude that \[ P_L|_{L_0}(a) = 1/2 \tilde{U}((1+U^*)(a)). \] Since \(P_{L_0}|_L = (P_L|_{L_0})^*\) we have just proved the following result: Lemma 8.3. Let $L_0$ and $L$ be two Lagrangians such that $L \in \mathcal{A}_{L_0}$, let $U = \mathcal{C}_{L_0}^{-1}(L)$ and let $\tilde{U}$ be the canonical unitary isomorphism $\tilde{U} : L_0 \to L$ as in Theorem 3.2. Then the differential $d_L$ in Lemma 8.2 can be written as: $$d_L(\dot{S}) = \frac{1}{4} \tilde{U}(1 + U^*) \dot{S}(1 + U) \tilde{U}^*.$$ Proposition 8.1. (a) Every Lagrangian $L \in \mathcal{L}^W_{\text{ag}}$ has an orthogonal decomposition $L = \ell \oplus L \cap W \oplus \Lambda$ where $\ell$ is the orthogonal complement of $L \cap W$ in $L \cap W^\omega$ and $\Lambda$ is the orthogonal complement of $L \cap W^\omega$ in $L$. Then the space of operators $S \in \text{Sym}(L)$ with block decomposition $$S = \begin{pmatrix} 0 & S_1^* & 0 \\ S_1 & S_2 & 0 \\ 0 & 0 & 0 \end{pmatrix}$$ is an algebraic complement of $T_L \mathcal{L}^W_{\text{ag}}$. (b) The algebraic complement of $T \mathcal{L}^W_{\text{ag}} \mid \mathcal{L}^W_{\text{ag}}$ described above is a finite dimensional, orientable bundle. If $k = 1$, it has a natural orientation. Proof. (a) The claim is clearly true for any associate Lagrangian $L_W$ by Lemma 4.3. We want to use the transition maps between two different Arnold charts at $L$, namely the one given by $L_W$ and the one centered at $L$ to show that the claim is true in general. Let $\ell_0 := \mathcal{R}_W L$ be the symplectic reduction of $L$ with $W$. So $L_W = \ell_0 \oplus L \cap W \oplus JV^\perp$ where $V^\perp$ is the orthogonal complement of $V := L \cap W$ in $W$. By definition $\ell_0 = P_{H_w}(\ell)$. We are looking for a relation between $\ell$ and $\ell_0$ in terms of the unitary isomorphism $U$ where $U \in \mathcal{U}(L_W)$ is the Cayley transform of the self-adjoint operator $X \in \text{Sym}(L_W)$ whose graph is $L$, i.e., $$L = \Gamma_{JX}, \quad X = i \frac{1 - U}{1 + U} \quad \text{and} \quad U = \frac{i - X}{i + X}.$$ Let $\tilde{\ell} := \tilde{U}^{-1}(\ell) \subset L_W$. We claim that $$(i + X)\ell_0 = \tilde{\ell}.$$ Indeed, we use first Lemma 4.3 to conclude that $\ell$ is the graph of the restriction $JX \mid_{\ell_0}$. Now $\tilde{U} : L_W \to L$ has the following expression: $$\tilde{U}v = \frac{1}{2}[(1 + U)v + iJ(1 - U)v].$$ which implies that \[ 2\tilde{U}(1 + U)^{-1}w = w + JXw, \quad \forall w \in L_W. \] We deduce that \[ 2\tilde{U}(1 + U)^{-1}\ell_0 = \ell, \] which can be rewritten as \[ (8.2) \quad 2(1 + U)^{-1}\ell_0 = \ell \quad \text{or} \quad -i(i + X)\ell_0 = \ell \] and that proves the claim. Let \( \tilde{\Lambda} := \tilde{U}^*\Lambda. \) Since \( \tilde{U} \mid_{L \cap W} = \text{id} \) we deduce that \( \tilde{U}^* \) takes the decomposition \( L = \ell \oplus L \cap W \oplus \Lambda \) to an orthogonal decomposition \( L_W = \tilde{\ell} \oplus L \cap W \oplus \tilde{\Lambda} \), where \( \tilde{\Lambda} := \tilde{U}^*\Lambda. \) The operators \( S \in \text{Sym}(L) \) with block decomposition (8.1) go via conjugation by \( \tilde{U} \) to operators \( \tilde{S} \in \text{Sym}(L_W) \) with the same type of block decomposition relative \( L_W = \tilde{\ell} \oplus L \cap W \oplus \tilde{\Lambda}. \) In order to finish the proof we notice that Lemma 8.3 implies, due to dimension constraints, that the only thing one needs to prove is that the equation in \( B \in \text{Sym}(L_W) \) and \( S \in \text{Sym}(L_W) \) \[ (8.3) \quad 1/4(1 + U^*)B(1 + U) = S \] has only the trivial solution \( B = 0, S = 0, \) where \[ B = \begin{pmatrix} B_1 & 0 & B_2^* \\ 0 & 0 & B_3^* \\ B_2 & B_3 & B_4 \end{pmatrix} \quad \text{and} \quad S = \begin{pmatrix} 0 & S_1^* & 0 \\ S_1 & S_2 & 0 \\ 0 & 0 & 0 \end{pmatrix}. \] Notice that the block decomposition of \( B \) is relative to \( L_W = \ell_0 \oplus L \cap W \oplus JV \) and the decomposition of \( S \) is relative to \( L_W = \tilde{\ell} \oplus L \cap W \oplus \tilde{\Lambda}. \) Notice that (8.3) can be written as \[ B = -(i - X)S(i + X). \] This is the same thing as \[ \langle Bv, w \rangle = -\langle (i - X)S(i + X)v, w \rangle = \langle S(i + X)v, (i + X)w \rangle, \quad \forall v, w \in L_W. \] We take first \( v \in \ell_0 \) and \( w \in L \cap W. \) Relation (8.2) and \( X = 0 \) on \( L \cap W \) imply \[ 0 = -i\langle S(i + X)v, w \rangle = -i\langle S_1(i + X)v, w \rangle. \] We conclude that $S_1 \equiv 0$. Similarly taking $v, w \in L \cap W$, we get $S_2 \equiv 0$, which finishes the proof. (b) Let us notice that we have two tautological bundles over $\text{Lag}_k^W$ namely $\vartheta$, resp. $\vartheta^\omega$ whose fiber at $L$ consists of $L \cap W$, resp. $L \cap W^\omega$. $$ \vartheta \hookrightarrow \text{Lag}^W_k \times W \downarrow \vartheta^\omega \hookrightarrow \text{Lag}^W_k \times W^\omega $$ We have of course that $\vartheta$ is a subbundle of $\vartheta^\omega$ and if we let $\theta$ be the orthogonal complement of $\vartheta$ in $\vartheta^\omega$, then the bundle described in the statement is $\text{Sym}(\vartheta) \oplus \text{Hom}(\theta, \vartheta)$. Hence it is the direct sum of a complex bundle, always naturally oriented and the bundle of self-adjoint endomorphisms associated to a complex bundle. But this last one is up to isomorphism the bundle associated to the principal bundle of unitary frames via the adjoint action of the unitary group on its Lie algebra. This is clearly orientable. In the case $k = 1$, $\vartheta$ is a line bundle and $\text{Sym}(\vartheta)$ is oriented by the identity operator. \hfill \Box 9. Local intersection numbers We are now ready for doing intersection theory on $\text{Lag}^-$. In this section, $M$ will be a closed, oriented manifold of fixed dimension $2k - 1$. This is the codimension of the Schubert variety $Z_k$. We consider on $Z_k$ the non-standard stratification. Let $F : M \to \text{Lag}^-$ be a smooth map. We will call such a map a (smooth, compact) family of lagrangians. By Proposition 8.1, the inclusion of tangent bundles $T \text{Lag}^W_k \hookrightarrow T \text{Lag}^-$ has an algebraic complement $N \text{Lag}^W_k$ which is naturally oriented as follows. Let $L \in \text{Lag}^W_k$, $V := L \cap W_{k-1}$ and $\ell$ be the orthogonal complement of $L \cap W_{k-1}$ in $L \cap W^\omega_{k-1}$. The algebraic complement to $T_L \text{Lag}^W_k$ is the vector subspace of $\text{Sym}(L)$ of operators coming from $$ \text{Sym}(V) \oplus \text{Hom}(\ell, V). $$ The space $V$ is one-dimensional and so $\text{Sym}(V)$ is a one-dimensional real vector space, naturally oriented by the identity map. Concretely a non-zero operator $A \in \text{Sym}(V)$ is positively oriented if the following number is positive: $$ \langle Av, v \rangle \text{ for some } v \in L \cap W_{k-1}. $$ The canonical orientation on $\text{Hom}(\ell, V)$ is given by the following data. Let $v$ be a unit vector in $V$ and $\{\lambda_1, \lambda_2, \ldots, \lambda_{k-1}\}$ be a complex orthonormal basis for $\ell$. We say that a basis $T_1, \ldots, T_{2k-2}$ is positively oriented for $\text{Hom}(\ell, V)$ if the following determinant is positive: $$ \begin{vmatrix} \text{Re}(T_1 \lambda_1, v) & \text{Im}(T_1 \lambda_1, v) & \cdots & \text{Re}(T_1 \lambda_{k-1}, v) & \text{Im}(T_1 \lambda_{k-1}, v) \\ \text{Re}(T_2 \lambda_1, v) & \text{Im}(T_2 \lambda_1, v) & \cdots & \text{Re}(T_2 \lambda_{k-1}, v) & \text{Im}(T_2 \lambda_{k-1}, v) \\ \cdots & \cdots & \cdots & \cdots & \cdots \\ \text{Re}(T_{2k-2} \lambda_1, v) & \text{Im}(T_{2k-2} \lambda_1, v) & \cdots & \text{Re}(T_{2k-2} \lambda_{k-1}, v) & \text{Im}(T_{2k-2} \lambda_{k-1}, v) \end{vmatrix} $$ One can check that the orientation does not depend on the choice of $v$ or of the basis $\{\lambda_1, \lambda_2, \ldots, \lambda_{k-1}\}$. The following is straightforward: **Lemma 9.1.** Let $T \in \text{Sym}(L)$ be a self-adjoint operator. Let $v \in V$ be a unit complex number. Then the $\text{Sym}(V) \oplus \text{Hom}(\ell, V)$ block of $S$ is the operator $x \mapsto \langle Tx, v \rangle$, \quad \forall x \in \ell \oplus V. This lemma and the previous observations prompt the following definition: **Definition 9.1.** Let $F : M \to \mathcal{L} \mathcal{a}g^-$ be an oriented family of lagrangians of dimension $2k-1$ transversal to $Z_k$ with the non-standard stratification and let $p \in F^{-1}(Z_k) = F^{-1}(\mathcal{L} \mathcal{a}g^{W_{k-1}}(1))$ be a point in $M$. Let $\{\epsilon_1, \ldots, \epsilon_{2k-1}\}$ be an oriented basis for $M$ at $p$, $v$ be a unit vector in $F(p) \cap W_{k-1}$ and $\{\lambda_1, \lambda_2, \ldots, \lambda_{k-1}\}$ be a unitary basis of $\ell(p)$, the orthogonal complement of $F(p) \cap W_{k-1}$ in $F(p) \cap W_{k-1}$. The **intersection number** at $p$ of $F$ and $Z_k$, denoted $\sharp(M \cap Z_k)_p$ is the sign of the determinant $$ \begin{vmatrix} \langle d_p F(\epsilon_1)v, v \rangle & \text{Re}\langle d_p F(\epsilon_1)\lambda_1, v \rangle & \cdots & \text{Im}\langle d_p F(\epsilon_1)\lambda_{k-1}, v \rangle \\ \langle d_p F(\epsilon_2)v, v \rangle & \text{Re}\langle d_p F(\epsilon_2)\lambda_1, v \rangle & \cdots & \text{Im}\langle d_p F(\epsilon_2)\lambda_{k-1}, v \rangle \\ \cdots & \cdots & \cdots & \cdots \\ \langle d_p F(\epsilon_{2k-1})v, v \rangle & \text{Re}\langle d_p F(\epsilon_{2k-1})\lambda_1, v \rangle & \cdots & \text{Im}\langle d_p F(\epsilon_{2k-1})\lambda_{k-1}, v \rangle \end{vmatrix} $$ It is remarkable that a similar formula holds when one replaces the differential of $F$ by the differential of the associated projections. **Lemma 9.2.** Let $F : M \to \mathcal{L} \mathcal{a}g^-$ be a smooth family of Lagrangians transversal to $Z_k$ and let $P : \mathcal{L} \mathcal{a}g^- \to \mathcal{B}(\hat{H})$ be the smooth map that takes a Lagrangian to its orthogonal projection. Denote by $P_F : M \to \mathcal{B}(\hat{H})$ the composition $-JP \circ F$. The intersection number $\sharp(M \cap \mathcal{Z}_k)_p$ is equal to the sign of the determinant 9.1 where one replaces the differential of $F$ with the differential of $P_F$ everywhere. **Proof.** By Lemma 2.2 we have $$d_P(\dot{S}) = \begin{pmatrix} 0 & \dot{S}J_L^{-1} \\ J_L \dot{S} & 0 \end{pmatrix}$$ and so $(-Jd_L P)|_{\text{sym}(L)} = \text{id}_{\text{sym}(L)}$. Since all the vectors $v, \lambda_1, \ldots, \lambda_{k-1}$ belong to $L := F(p)$ the proposition follows. □ The intersection numbers for $k = 1$ have received a particular attention, especially in the real case. **Definition 9.2.** For every family $F : S^1 \to \mathcal{L}ag^-$, transversal to $\mathcal{Z}_1$ the intersection number $$\sum_{p \in \mathcal{Z}^{-1}(\mathcal{Z}_1)} \sharp(M \cap \mathcal{Z}_1)_p$$ is called the *Maslov index*. **Proposition 9.1.** The Maslov index is a homotopy invariant that provides an isomorphism: $$\pi_1(\mathcal{L}ag^-) \simeq \mathbb{Z}$$ **Proof.** This is obvious in light of the fact that the Maslov index is the evaluation over $S^1$ of the pull-back of the cohomology class $[\mathcal{Z}_1, \omega_1]$. □ The top stratum of $\mathcal{Z}_1$ in the non-standard stratification, $\mathcal{L}ag_1^{H^-}$ has a particular nice structure that allows one to derive a different type of formula. Notice first that we have the following set equalities: $$Z_{\geq k} := \bigcup_{i \geq k} Z_i = \mathcal{G}^{-1}(\mathbb{P}(W_{k-1})) = \mathcal{L}ag_1^{H^-} \cap \mathcal{L}ag_1^{W_{k-1}},$$ where $\mathcal{G}$ is the generalized reduction $\mathcal{G} : \mathcal{L}ag_1^{H^-} \to \mathbb{P}(H^-).$ This implies in particular that $Z_{\geq k}$ is a smooth manifold of codimension $2k - 2$ in $\mathcal{L}ag_1^{H^-}$. Definition 9.3. A smooth $2k - 1$ dimensional family $F : M \to \mathcal{L}ag^-$ is strongly transversal to $\mathcal{Z}_k$ if the following conditions hold: - $F$ is transversal to $\mathcal{Z}_k$. - $F$ is transversal to $\mathcal{Z}_1$. - $F^{-1}(\mathcal{Z}_1) = F^{-1}(\mathcal{L}ag_1^{H^-})$, i.e., $\dim F(m) \cap H^- \leq 1$ for all $m \in M$. Remark 9.1. The first and the third conditions of strong transversality imply that $F^{-1}(\mathcal{Z}_k) = F^{-1}(\mathcal{Z}_{\geq k})$. Indeed, the first condition implies that $F^{-1}(\mathcal{Z}_k) = F^{-1}(\mathcal{L}ag_{W^k}^{-1})$, whereas the third implies that $F^{-1}(\mathcal{Z}_k) \subset F^{-1}(\mathcal{L}ag_1^{H^-})$. Remark 9.2. Every smooth family can be deformed to a family that satisfies the first two transversality conditions. However, the third condition of strong transversality is not amenable to perturbations, since there are topological obstructions to achieving that. An example is a family for which the cohomology class $F^*[\mathcal{Z}_{\{1,2\}}, \omega_{\{1,2\}}]$ is non-trivial. Things are good when $k = 2$. Lemma 9.3. Let $\dim M = 3$. Any family $F : M^3 \to \mathcal{L}ag^-$ can be deformed to a strongly transversal family to $\mathcal{Z}_2$. Proof. First deform the family to a map transversal to $\mathcal{Z}_2$ and then move it off $\bigcup_{k \geq 2} Z_{1,k}$ which has codimension 4 and has the property that $\bigcup_{k \geq 2} Z_{1,k} = \mathcal{L}ag_1^{W^k} \setminus \mathcal{L}ag_1^{H^-}$. □ Proposition 9.2. Let $M$ be an oriented, closed manifold of dimension $2k - 1$ and let $F : M \to \mathcal{L}ag^-$ be a family, strongly transversal to $\mathcal{Z}_k$. Then $M^1 := \{m \in M \mid \dim F(m) \cap H^- = 1\}$ is a closed, cooriented submanifold of $M$ of dimension $2k - 2$. Let $\gamma \subset M^1 \times \mathbb{P}(H^-)$ be the tautological bundle over $M^1$ with fiber $\gamma_m := L \cap H^-$. Then $$\int_M F^*[\mathcal{Z}_k, \omega_k] = \int_{M^1} c_1(\gamma^*)^{k-1}.$$ Proof. Notice that $M^1 = F^{-1}(\mathcal{L}ag_1^{H^-})$. The fact that $M^1$ is a cooriented submanifold of $M$ of codimension 1 follows from the second condition of strong transversality and the fact that $\mathcal{L}ag_1^{H^-}$ is a cooriented submanifold of $\mathcal{L}ag^-$ of codimension 1. It therefore inherits the coorientation of $\mathcal{L}ag_1^{H^-}$. in $\mathcal{L}_{\text{ag}}^-$. It is closed because it is the preimage of $\overline{Z}_1$ by the third condition of strong transversality. We have the following commutative diagram $$ \begin{array}{c} \xymatrix{ F^{-1}(\overline{Z}_k) \ar[r]^F \ar[d] & Z_{\geq k} \ar[r]^G \ar[d] & \mathbb{P}(W_{k-1}) \ar[d] \\ M^1 \ar[r]^{F|_{M^1}} & \mathcal{L}_{\text{ag}}^{H^-} \ar[r]^G & \mathbb{P}(H^-) \\ M \ar[r]^F & \mathcal{L}_{\text{ag}}^-. }\end{array} $$ The local intersection number of $M$ and $Z_{\geq k}$ in $\mathcal{L}_{\text{ag}}^-$ at a point $m \in M$ is the local intersection number of $M^1$ and $\mathcal{L}_{\text{ag}}^{H^-}$ at $m \in M$, which is the local intersection number of $G \circ F|_{M^1}$ with $\mathbb{P}(W_{k-1})$ at $m \in M$. Let $\tau^*$ be the dual to the tautological bundle of $\mathbb{P}(H^-)$. Then the Poincaré dual of $\mathbb{P}(W_{k-1})$ in $\mathbb{P}(H^-)$ is $c_1(\tau^*)^{k-1}$ where $c_1$ is the first Chern class of $\tau^*$. The total intersection number of $M^1$ and $\mathbb{P}(W_{k-1})$ is the evaluation of the pull-back of the Poincaré dual to $\mathbb{P}(W_{k-1})$ on $M^1$. The next equality finishes the proof $$ \gamma = (G \circ F|_{M^1})^*(\tau). $$ \section{10. Intersection formulae for families of operators} The motivating example for this paper was Nicolaescu’s Theorem 3.14 from [21] which is saying, roughly, that the spectral flow of a generic path of Dirac operators equals the Maslov index of an appropriate path of lagrangians. The spectral flow can be defined more generally for a family $F$ of self-adjoint, Fredholm operators parametrized by a compact manifold $M$ to be the first component of the odd Chern character applied to the $K^{-1}(M)$ class determined by $F$. For every path $\alpha : S^1 \to M$ in $M$ this class can be integrated over the path to give an integer which is what is regularly called the spectral flow of a path of operators. When the path is generic this integer is a count with sign of the 0-eigenvalues (assumed simple) of the operators on the path. Now, it is not true that every family of self-adjoint, Fredholm operators gives rise to a $K^{-1}$ class. In fact, Atiyah and Singer [3] showed that a classifying space for $K^{-1}$ is the space of bounded, self-adjoint, Fredholm operators having both positive and negative essential spectra. The important The odd Chern character and index localization formulae Word here is \textit{bounded}. The typical way of passing from unbounded operators to bounded operators is via functional calculus as we now describe: \textbf{Definition 10.1.} Let \(S\text{Fred}\) denote the set of all closed, densely defined, self-adjoint, Fredholm operators on \(H\), let \(BFred\) be the space of bounded, self-adjoint, Fredholm operators on \(H\) and let \(BFred_+ \subset BFred\) be the Atiyah–Singer classifying space. The map \[ Ri : S\text{Fred} \to BFred, \quad Ri(T) := T\left(\sqrt{1 + T^2}\right)^{-1} \] called the Riesz map is an injection. The topology induced by \(Ri\) on \(S\text{Fred}\) is called the Riesz topology. On the other hand, there is another injective map, the switched graph \[ \tilde{\Gamma} : S\text{Fred} \to \mathcal{L}ag^-, \] through which \(S\text{Fred}\) is endowed with another topology called the gap topology. Nicolaescu proved the following in [20, Lemma 1.2, Prop. 3.1 and Th. 3.3]. \textbf{Proposition 10.1.} Every Riesz continuous family of operators \(F : M \to S\text{Fred}\) is also gap continuous. \textbf{Theorem 10.1.} The graph map \(\tilde{\Gamma} : BFred_+ \to \mathcal{L}ag^-\) is a weak homotopy equivalence and for every Riesz continuous family \(F : M \to S\text{Fred}\) the families of Lagrangians \(\tilde{\Gamma} \circ F\) and \(\tilde{\Gamma} \circ Ri \circ F\) are homotopic. These results are saying that the “old” analytic index a la Atiyah–Singer is the same as the “new” index, defined using \(\mathcal{L}ag^-\). Therefore we make the following definition. \textbf{Definition 10.2.} Let \(F : M \to S\text{Fred}\) be a family of self-adjoint, Fredholm operators. Then \(F\) is continuous if \(\tilde{\Gamma} \circ F\) is gap continuous. The \textit{analytic index} of a continuous family of self-adjoint, Fredholm operators is the homotopy class of the map \(\tilde{\Gamma} \circ F : M \to \mathcal{L}ag^-\) and is denoted by \([F]\). The \textit{cohomological index} of \(F\) is the class \(\text{ch}[F] \in H^{\text{odd}}(M, \mathbb{Q})\). \textbf{Theorem 10.2.} The \(2k - 1\) component of the cohomological index of a continuous family of operators \(F : M \to S\text{Fred}\) is a rational multiple of the geometric class \((\tilde{\Gamma} \circ F)^*[Z_k, \omega_k]\). In fact, the following relation holds: \[ \text{ch}_{2k-1}[F] = \frac{(-1)^{k-1}}{(k-1)!}(\tilde{\Gamma} \circ F)^*[Z_k, \omega_k]. \] Proof. This is a rephrasing of Proposition 7.1. \(\square\) Before we proceed let us mention the following useful criterion for deciding gap continuity and, more generally, gap differentiability. The proof can be found in [8, Theorem 4.6]. **Theorem 10.3.** Let \((T_x)_{x \in \mathbb{R}^n} : D(T_x) \subset H \to H\) be a family of densely-defined, closed, self-adjoint, Fredholm operators. Let \(H_0 := D(T_0)\) and suppose \(H_0\) comes equipped with an inner product such that: 1. the inclusion \(H_0 \to H\) is bounded and 2. the operator \(T_0 : H_0 \to H\) is bounded. Suppose there exists a differentiable family of bounded, invertible operators \(U : \mathbb{R}^n \to GL(H)\) such that (a) \(U^*_x(H_0) = D(T_x)\); (b) the new family of operators \(\tilde{T}_x := U_x T_x U^*_x\) is a differentiable family of bounded operators in \(\mathcal{B}(H_0, H)\). Then the family of switched graphs associated to \((T_x)_{x \in \mathbb{R}^n}\) is differentiable at \(T_0\) in \(\text{Lag}^\sim\). The localization part in the title was motivated by the interpretation of the spectral flow as \(\text{ch}_1[F] \in H^1(M, \mathbb{Z})\). Classically, the spectral flow associates to a generic loop (or more generally to a path) of self-adjoint operators an integer, which is a count with sign of the 0-eigenvalues of the family of operators. To be more precise, if \(\lambda_1, \ldots, \lambda_k : S^1 \to \mathbb{R}\) are the eigencurves that take the value 0 eventually\(^2\), then the spectral flow is the sum \[ \sum_{t_0 \mid \lambda_i(t_0) = 0} \text{sgn} \dot{\lambda}_i(t_0). \] \(^2\)We are also assuming that these eigencurves exist and 0 is a simple eigenvalue for the uninvertible operators, conditions that justify the word generic. If the family $F$ of operators is bounded and differentiable then one can check that $$\dot{\lambda}(t_0) = \langle \dot{F}_{t_0} v_0, v_0 \rangle,$$ where $v_0$ is a unit eigenvector for the 0-eigenvalue of $F_{t_0}$. It is easy to see that the spectral flow is the degree of the 0-cycle whose Poincaré dual is $\text{ch}_1[F]$. Indeed this degree is, in transversal conditions the total intersection number of $\hat{\Gamma} \circ F$ with $Z_1$. We can ask what is a similar interpretation in terms of eigenvalues and eigenspaces for $\text{ch}_{2k-1}[F]$ where $k$ is a positive integer. Based on Proposition 7.1 we will rephrase this problem as follows: “Give localization formulae for the Poincaré dual of $F^*Z_{k-1}$, $\omega_{k-1} \in H^{2k-1}(M, \mathbb{Z})$, where $F : M \rightarrow \text{8Fred}$ is a gap differentiable family of operators parametrized by an oriented manifold of dimension $2k - 1$.” We are aiming, of course, for intersection formulae in generic conditions, which in our case means transversality. Let $W$ be a codimension $k - 1$ subspace of $H^-$. We consider the associated $2k - 1$ codimensional cocycle whose underlying space is the following Schubert variety: $$Z_W = \{L \in \text{Lag}^- \mid \dim L \cap W \geq 1\}.$$ **Definition 10.3.** A smooth family $F : M \rightarrow \text{8Fred}$ is said to be in general position with respect to $W$ if $\hat{\Gamma} \circ F$ is transversal to the Schubert variety $Z_W$ with the non-standard stratification. If $M$ has complementary dimension to $Z_W$, i.e., $\dim M = 2k - 1$, the condition to be in general position with respect to $W$ implies that there are only a finite number of points $p \in M$ such that $$\dim \hat{\Gamma}_{F(p)} \cap W = 1.$$ (10.1) This means that $$\dim \text{Ker} (F(p)) \cap W = 1.$$ **Notation:** Let $F : M \rightarrow \text{8Fred}$ be a smooth family in general position with respect to $W$. For every $p \in M$ such that $\dim \text{Ker} (F(p)) \cap W = 1$ denote by $\epsilon_p \in \{\pm 1\}$ the intersection number at $p$ of $\hat{\Gamma} \circ F$ with $\hat{Z}_W := \text{Lag}_1^W = \{L \mid \dim L \cap W = 1\} \subset Z_W$. Theorem 10.4. Let $M$ be a closed oriented manifold of dimension $2k - 1$, let $F : M \to \mathcal{S}\text{Fred}$ be a smooth family of self-adjoint, Fredholm operators and let $W \subset H$ be a codimension $k - 1$ subspace such that $F$ is in general position with respect to $W$. Denote by $M_W$ the set $M_W := \{p \in M \mid \dim \ker (F(p)) \cap W = 1\}$. Then $$\text{PD ch}_{2k-1}([F]) = (-1)^{k-1} \sum_{p \in M_W} \epsilon_p p,$$ where PD means Poincaré dual. Proof. This is a restatement of Theorem 6.2 using Proposition 7.1. □ Our main goal in this section is to give a formula for the intersection numbers $\epsilon_p$. This is a local problem. We restrict our attention to bounded operators although similar formulae hold for nice families of unbounded operators, such as the families that we called affine in [8] (see Section 4.1). The reason for which these formulas are available is that we can make sense of what the differential of a family of operators means. Let $B$ be the unit ball in $\mathbb{R}^{2k-1}$ and let $T : B \to \text{Sym}(H)$ be a family of bounded, self-adjoint, Fredholm operators, differentiable at zero. Let us notice that if $T_0 \in \text{Sym}(H)$ is a bounded self-adjoint, Fredholm operator, the projection $P_0^- : \tilde{\Gamma}_T \to H^-$ is a Banach space isomorphism. The next result relates the operator differential to the graph differential. Lemma 10.1. The family of switched graphs $(\tilde{\Gamma}_{T_x})_{x \in B}$ is differentiable at zero. Moreover, for every unit vector $v \in \mathbb{R}^n$, the following equality holds between the graph and the operator partial derivatives of the family at 0 $$P_0^- \circ \frac{\partial \tilde{\Gamma}}{\partial v} \bigg|_0 \circ (P_0^-)^{-1} = (1 + T_0^2)^{-1} \circ \frac{\partial T}{\partial v} \bigg|_0 \in \text{Sym}(H).$$ Here $P_0^-$ is the projection of the switched graph of $T_0$ onto $H^-$. Proof. For differentiability one can suppose without loss of generality that the operators are invertible. Then the family of inverses is differentiable, which implies that the family of switched graphs is differentiable. For $\|x\|$ small the switched graph of $T_x$ is in the Arnold chart of $\tilde{\Gamma}_{T_0}$. Therefore, it is the graph of an operator $JS_x : \tilde{\Gamma}_{T_0} \to J\tilde{\Gamma}_{T_0}$, where $S_x \in \text{Sym}(\tilde{\Gamma}_{T_0})$. We fix such an $x$. We are looking for an expression for $P_0^- S_x (P_0^-)^{-1}$ as an operator on $H$. For every vector \( v \in H \), we have a decomposition: \[ (T_x v, v) = (T_0 z, z) + J(T_0 y, y) = (T_0 z + y, z - T_0 y). \] It is not hard to see that \[ y = (1 + T_0^2)^{-1}(T_x - T_0)v, \] \[ v = (1 + T_0 T_x)^{-1}(1 + T_0^2)z. \] The last relation makes sense, since \( 1 + T_0 T_x \) approaches the invertible operator \( 1 + T_0^2 \). The operator \( P_0^- S_x(P_0^-)^{-1} : H \to H \) is nothing else but the correspondence \( z \to y \) hence the expression: \[ P_0^- S_x(P_0^-)^{-1} = (1 + T_0^2)^{-1}(T_x - T_0)(1 + T_0 T_x)^{-1}(1 + T_0^2). \] Differentiating this expression with respect to \( x \) finishes the proof. \( \square \) In order not always to repeat ourselves, we make the following: **Definition 10.4.** A smooth family of bounded, self-adjoint, Fredholm operators \( F : B \to \text{Sym}(H) \) is called localized at 0 with respect to \( W \) if the following two conditions hold: - \( F \) is in general position with respect to \( W \); - \((\tilde{\Gamma} \circ F)^{-1}(\tilde{Z}_W) = \{0\}\). The fact that the switched graph of \( F(0) \) is in \( Z_W \) implies that \( 1 \leq \dim \ker F(0) \leq k \) by Corollary 4.1. We treat first a particular, non-generic case, because the formula looks quite simple in this case. **Proposition 10.2.** Let \( F : B \to \text{BFred} \) be a family of bounded, self-adjoint, Fredholm operators localized at 0 with respect to \( W \). Suppose that \( \dim \ker F(0) = k \). Let \( \phi \in \ker F(0) \cap W \) be a unit vector, let \( \phi^\perp \) be the orthogonal complement of \( \langle \phi \rangle \) in \( \ker F(0) \) and let \( \{\psi_1, \ldots, \psi_{k-1}\} \) be an orthonormal basis of \( \phi^\perp \). The intersection number, $\epsilon_0$, is given by the sign of the determinant: \[ \begin{vmatrix} \langle \partial_1 F\phi, \phi \rangle & \text{Re}\langle \partial_1 F\psi_1, \phi \rangle & \ldots & \text{Im}\langle \partial_1 F\psi_{k-1}, \phi \rangle \\ \langle \partial_2 F\phi, \phi \rangle & \text{Re}\langle \partial_2 F\psi_1, \phi \rangle & \ldots & \text{Im}\langle \partial_2 F\psi_{k-1}, \phi \rangle \\ \ldots & \ldots & \ldots & \ldots \\ \langle \partial_{2k-1} F\phi, \phi \rangle & \text{Re}\langle \partial_{2k-1} F\psi_1, \phi \rangle & \ldots & \text{Im}\langle \partial_{2k-1} F\psi_{k-1}, \phi \rangle \end{vmatrix}, \] where $\partial_i F$ is the partial derivative of $F$ at zero in the $i$th coordinate direction of $\mathbb{R}^{2k-1}$. **Proof.** Since $\dim \text{Ker} F(0) = k$ we get that \[ \tilde{\Gamma}_{JF(0)} \cap W^\omega = \tilde{\Gamma}_{JF(0)} \cap H^- = \text{Ker} F(0) \] and so the vectors $\lambda_1 = \psi_1, \ldots, \lambda_{k-1} = \psi_{k-1}$ in the definition of the intersection number 9.1 can all be taken to be from $\text{Ker} F(0)$. Let $\tilde{F} := \tilde{\Gamma} \circ F$. The claim that proves the lemma is \[ \langle d_0 \tilde{F}(x) \psi, \phi \rangle = \langle d_0 F(x)(0) \psi, \phi \rangle, \] for every unit vector $x$ and every $\psi \in \langle \{\phi, \psi_1, \ldots, \psi_{k-1}\} \rangle$. In order to prove the claim let $P_0^-$ be the projection of $\tilde{\Gamma}_{F(0)}$ onto $H^-$ and let $w := (1 + F_0^2)^{-1} \circ d_0 F(x)g$. Then \[ (P_0^-)^{-1} \circ (1 + F_0^2)^{-1} \circ d_0 F(x) \circ P_0^-(0, g) = (F_0 w, w). \] Therefore, by using Lemma 10.1 we get \[ \langle d_0 \tilde{F}(x)g, \phi \rangle = \langle (F_0 w, w), (0, \phi) \rangle = \langle w, \phi \rangle. \] Then \[ \langle w, \phi \rangle = \langle d_0 F(x)g, (1 + F_0^2)^{-1} \phi \rangle = \langle d_0 F(x)g, \phi \rangle. \] The last equality holds because $\phi \in \text{Ker} F_0$. $\square$ In the case $k = 2$, the intersection numbers still have a quite simple description. Suppose for now that $B$ is the three dimensional ball. **Proposition 10.3.** Let $T : B \to \text{BFred}$ be a family of bounded, self-adjoint, Fredholm operators. Let $e \in H$ be a vector and suppose that $T$ is localized at 0 with respect to $\langle e \rangle^\perp$. Let $0 \neq \phi$ be a generator of $\text{Ker} T_0 \cap \langle e \rangle^\perp$. Then only one of the two situations is possible. I \ dim \ Ker \ T_0 = 1, \ in \ which \ case \ we \ let \ \psi \ be \ a \ non-zero \ vector \ satisfying \ the \ following \ two \ relations: \begin{align*} \langle \phi, \psi \rangle &= 0, \\ T_0 \psi &= e. \end{align*} II \ dim \ Ker \ T_0 = 2, \ in \ which \ case \ we \ let \ \psi \in Ker T_0 \ be \ a \ non-zero \ vector \ such \ that \ \psi \perp \phi. The intersection number of \( T \) with \( Z_{e^\perp} \) is given by the sign of the determinant \[ \begin{vmatrix} \langle \partial_1 T \phi, \phi \rangle & \Re \langle \partial_1 T \psi, \phi \rangle & \Im \langle \partial_1 T \psi, \phi \rangle \\ \langle \partial_2 T \phi, \phi \rangle & \Re \langle \partial_2 T \psi, \phi \rangle & \Im \langle \partial_2 T \psi, \phi \rangle \\ \langle \partial_3 T \phi, \phi \rangle & \Re \langle \partial_3 T \psi, \phi \rangle & \Im \langle \partial_3 T \psi, \phi \rangle \end{vmatrix}_{t=0}, \] where \( \partial_i T \) is the directional derivative of \( T \) in the \( i \)th coordinate direction of \( \mathbb{R}^3 \). Proof. Let \( W = \langle e \rangle^\perp \). The intersection of the switched graph of \( T_0 \) with \( W^\omega \) is two-dimensional. Hence the kernel of \( T \) is either one or two-dimensional. One vector in the intersection \( \tilde{\Gamma}_T \cap W^\omega \) is \( (0, \phi) \). If the kernel of \( T_0 \) is two-dimensional, then \( \tilde{\Gamma}_T \cap W^\omega = \text{Ker} \ T_0 \) and so the second vector in the intersection formulae is a generator of the orthogonal complement in \( \text{Ker} \ T_0 \) of \( \langle \phi \rangle \). If \( \dim \text{Ker} \ T_0 = 1 \), the condition \( (T_0 \alpha, \alpha) \in W^\omega \) imposes that \( T_0 \alpha = ae \) for some constant \( a \). We are looking for a solution when \( a \neq 0 \), otherwise \( \alpha \) is a multiple of \( \phi \). The projection of \( \frac{1}{a} \alpha \) onto \( \text{Ker} \ T_0^\perp \) is an element of \( W^\perp \subset W^\omega \) and a generator of the orthogonal complement of \( \text{Ker} \ T_0 \) in \( \tilde{\Gamma}_T \cap W^\omega \). It satisfies the two conditions required from \( \psi \). The fact that one can replace the partial derivatives of the switched graphs in the \( g_1 = (T \psi, \psi) \) direction by the partial derivatives of \( T \) in the \( \psi \) direction is a computation exactly as in Proposition 10.2. \qed We state now the general case. **Proposition 10.4.** Let \( W \subset H \) be a \( k-1 \) codimensional subspace and let \( T : B \to \text{BFred} \) be a family of bounded, self-adjoint, Fredholm operators localized at 0 with respect to \( W \). Suppose that \( \dim \text{Ker} \ T_0 = p \leq k \). Let \( \phi \) be a generator of \( \text{Ker} \ T_0 \cap W \) and let \( \phi_1, \ldots, \phi_{p-1} \) be a basis of the orthogonal complement of \( \phi \) in \( \text{Ker} \ T_0 \). The space \( W_T := W \cap \text{Ran} \ T_0 \) has dimension \( k-p \). Let \( \psi_1, \ldots, \psi_{k-p} \) be an orthonormal basis of \( P \big|_{(\text{Ker} \ T)^\perp} \ T_0^{-1}(W_T) \). Then the intersection number of \( T \) with \( \overline{Z}_W \) is the sign of the determinant \[ \begin{vmatrix} \langle \partial_1 T\phi, \phi \rangle & \langle \partial_2 T\phi, \phi \rangle & \cdots & \langle \partial_{2k-1} T\phi, \phi \rangle \\ \Re \langle \partial_1 T\phi_1, \phi \rangle & \Re \langle \partial_2 T\phi_1, \phi \rangle & \cdots & \Re \langle \partial_{2k-1} T\phi_1, \phi \rangle \\ \cdots & \cdots & \cdots & \cdots \\ \Im \langle \partial_1 T\phi_{p-1}, \phi \rangle & \Im \langle \partial_2 T\phi_{p-1}, \phi \rangle & \cdots & \Im \langle \partial_{2k-1} T\phi_{p-1}, \phi \rangle \\ \Re \langle \partial_1 T\psi_1, \phi \rangle & \Re \langle \partial_2 T\psi_1, \phi \rangle & \cdots & \Re \langle \partial_{2k-1} T\psi_1, \phi \rangle \\ \cdots & \cdots & \cdots & \cdots \\ \Im \langle \partial_1 T\psi_{k-p}, \phi \rangle & \Im \langle \partial_2 T\psi_{k-p}, \phi \rangle & \cdots & \Im \langle \partial_{2k-1} T\psi_{k-p}, \phi \rangle \\ \end{vmatrix}_{t=0} \] Proof. One only needs to make sense of what the orthogonal complement of \( \text{Ker} T_0 \cap W \) in \( \tilde{\Gamma}_T \cap W^\omega \) is. We close this section with a reformulation of Proposition 9.2 in terms of operators. We make the following definition based on Definition 9.3: **Definition 10.5.** A smooth family \( T : M \to \text{SFred} \) of bounded self-adjoint, Fredholm operators is called strongly transversal to \( Z_k \), if \( \tilde{\Gamma} \circ T \) is strongly transversal to \( \overline{Z}_k \). **Lemma 10.2.** Let \( \dim M = 3 \). Any smooth family \( T : M \to \text{BFred} \) can be deformed to a strongly transversal family to \( \overline{Z}_2 \). Proof. This is just proof of Lemma 9.3 with the addition that one has to make sure that in the course of the deformation one stays inside BFred. This is true because the map \( \tilde{\Gamma} : \text{BFred} \to \mathcal{L}ag^- \) is open. **Proposition 10.5.** Let \( M \) be a closed, oriented manifold of dimension \( 2k - 1 \) and let \( T : M \to \text{SFred} \) be a strongly transversal family to \( \overline{Z}_k \). Then \( M^1 := \{ m \in M \mid \dim \text{Ker} T_m = 1 \} \) is a closed, cooriented manifold. Let \( \gamma \subset M^1 \times H \) be the tautological line bundle over \( M^1 \) with fiber \( \gamma_m = \text{Ker} T_m \). Then \[ \int_M T^*[\overline{Z}_k, \omega_k] = \int_{M^1} c_1(\gamma^*)^k. \] Proof. This is just Proposition 9.2 formulated in terms of operators. We describe the coorientation of \( M^1 \) in concrete terms. Let \( m \in M^1 \) and \( v \in T_m M \setminus T_m M^1 \) be a vector. The vector \( v \) is said to be positively oriented if given a curve \( \alpha : (-\epsilon, \epsilon) \to M \) such that \( \alpha \cap M^1 = m = \alpha(0) \) and \( \alpha'(0) = v \), the curve of operators \( T \circ \alpha \) has local spectral flow equal to \(+1\), i.e., \( \text{sgn} \langle \frac{d}{dt} (T \circ \alpha) \rangle_{t=0} v, v \rangle = +\). Appendix A Representatives of cohomology classes in Banach manifolds We describe in this appendix how certain stratified spaces in a Banach manifold define cohomology classes. We will work with sheaf cohomology groups and our presentation is inspired from the work of Iversen [14]. Let \( X \) be a metric Banach manifold. Because of paracompactness the sheaf cohomology groups are isomorphic with the Čech cohomology groups. Also, because \( X \) is locally contractible, one has an isomorphism between the sheaf cohomology groups with coefficients in the constant sheaf \( \mathbb{Z} \) and singular cohomology with \( \mathbb{Z} \) coefficients. \[ (A.1) \quad H^\ast(X, \mathbb{Z}) \simeq H^\ast_{\text{sing}}(X, \mathbb{Z}). \] Let us recall now the definition of the local cohomology groups. **Definition A.1.** Let \( C \subset X \) be a closed subset and let \( \mathcal{F} \) be a sheaf on \( X \). Then to \( \mathcal{F} \) one associates a new sheaf \( \mathcal{F}_C \) on \( X \) with supports in \( C \) defined as follows: \[ \mathcal{F}_C(U) := \{ s \in \mathcal{F}(U) \mid \text{supp } s \subset U \cap C \}, \quad \forall \ U \subset X \text{ open}. \] The \( p \)th local cohomology group of \( C \) in \( X \) with values in the sheaf \( \mathcal{F} \) is the \( p \)th right derived functor \[ H^p_C(X, \mathcal{F}) := R^p(\Gamma(\mathcal{F}_C)), \] where \( \Gamma \) is the global section functor. **Remark A.1.** Notice that the local cohomology groups \( H^p_C(X, \mathcal{F}) \) fit into a long exact sequence: \[ (A.2) \quad \cdots \to H^p_C(X, \mathcal{F}) \to H^p(X, \mathcal{F}) \to H^p(X \setminus C, j^\ast \mathcal{F}) \to H^{p+1}_C(X, \mathcal{F}) \to \cdots, \] where \( j : X \setminus C \to X \) is the natural inclusion. In the case of the constant sheaf, \( \mathcal{F} = \mathbb{Z} \) and when the spaces involved, \( X \) and \( X \setminus C \) are locally contractible then \[ H^\ast_C(X, \mathbb{Z}) \cong H^\ast_{\text{sing}}(X, X \setminus C, \mathbb{Z}), \] because of the naturality of the isomorphism A.1. From now on we will work only with the constant sheaf \( \mathbb{Z} \), which we will not include in the notation. One important property of local cohomology is the excision exact sequence [14, Prop. II.9.5]: **Proposition A.1.** Let \( C_1 \supset C_2 \) be two closed subsets of the topological space \( X \). Then one has the following long exact sequence: \[ (A.3) \quad \rightarrow H^k_{C_2}(X) \rightarrow H^k_{C_1}(X) \rightarrow H^k_{C_1 \setminus C_2}(X \setminus C_2) \rightarrow H^{k+1}_{C_2}(X) \rightarrow \] **Remark A.2.** When \( C_1 \) and \( C_2 \) are locally contractible then the previous sequence corresponds to the long exact sequence in singular cohomology associated to the triple \( (X, X \setminus C_1, X \setminus C_2) \). For any closed subset \( C \), we denote by \( \mathcal{H}^k_C \), the sheaf on \( X \) associated to the presheaf \( \mathcal{H}^k_C \) such that for any open set \( U \subset X \) we have \[ \Gamma(U \cap C, \mathcal{H}^k_C) = \mathcal{H}^k_C \cap U(U). \] **Remark A.3.** An equivalent way to define the sheaf \( \mathcal{H}^k_C \) is as the \( k \)th right-derived functor of the left exact functor \[ -C : \text{sheaves on } X \rightarrow \text{sheaves on } X, \quad \mathcal{F} \rightarrow \mathcal{F}_C \] evaluated on the constant sheaf \( \mathbb{Z} \), i.e., \( \mathcal{H}^k_C = R^k(-C)|_{\mathcal{F}=\mathbb{Z}} \). Notice that the sheaf \( \mathcal{H}^k_C \) has support on \( C \) and because of that we have: \[ H^*(X, \mathcal{H}^k_C) \simeq H^*(C, i^{-1}\mathcal{H}^k_C), \] where \( i : C \hookrightarrow X \) is the natural inclusion. **Definition A.2.** The closed space \( C \) is said to have homological codimension in \( X \) at least \( c \) if and only if \( \mathcal{H}^k_C = 0 \), \( \forall k < c \). We write this as \[ \text{codim}^k_X C \geq c. \] The Grothendieck spectral sequence for local cohomology (see [9, Remark 2.3.16]) whose \( E_2 \) term is \[ E_2^{p,k} = H^p(X, \mathcal{H}^k_C) = R^p(\Gamma) \circ R^k(-C)|_{\mathcal{F}=\mathbb{Z}} \] converges to \( H^{p+k}_C(X) = R^{p+k}(\Gamma \circ -C) \). An immediate consequence is Proposition A.2 (extension property). If \( \text{codim}_X^h(S) \geq c \), then for any \( q < c - 1 \) the restriction map \[ H^q(X) \to H^q(X \setminus S) \] is an isomorphism. More generally, if \( C \supset S \) is a closed subset of \( X \) then \[ H^q_C(X) \to H^q_{C \setminus S}(X \setminus S) \] is an isomorphism. We refer to any of this isomorphisms as extension across \( S \). Proof. The \( E_2 \) term in the Grothendieck spectral sequence vanishes on the first \( c - 1 \) rows, which implies the vanishing of \( H^q_S(X) \) for \( q \leq c - 1 \). The long exact sequences A.2 and A.1 complete the proof. \( \square \) Definition A.3. A (topological) submanifold of codimension \( c \) of \( X \) is a subset \( Y \) such that for every point \( y \in Y \) there exist an open neighborhood \( N \subset X \) with the property that the pair \( (N, N \cap Y) \) is homeomorphic with a pair \( (\mathbb{R}^c \times B, 0 \times B) \) where \( B \) is a Banach vector space. We clearly have that a submanifold \( C \) of codimension \( c \), which is also closed as a subset has homological codimension at least \( c \), since in this case the sheaf local cohomology is isomorphic with singular local cohomology. Moreover, the sheaf \( \mathcal{H}_C \) is locally isomorphic to the constant sheaf \( \mathbb{Z} \). We say that \( \mathcal{H}_C \) is the coorientation sheaf of \( C \hookrightarrow X \) and we will denote it by \( \Omega_C \). The submanifold is called coorientable if the sheaf \( \Omega_C \) is isomorphic to the constant sheaf \( \mathbb{Z} \). A coorientation is a choice of an isomorphism \( \mathbb{Z} \to \Omega_C \) and is uniquely determined by an element \( \omega_C \in H^0(C, \Omega_C) \) which, viewed as a section of \( \Omega_C \), has the property that \( \omega_C(w) \) generates the stalk \( \Omega_C(w) \) for any \( w \in C \). Proposition A.3 (Thom isomorphism). Let \( C \hookrightarrow X \) be a cooriented submanifold of codimension \( c \). There exists an isomorphism \[ \tau_C : H^*(C, \Omega_C) \to H^*_C(X)[c] := H^{*+c}_C(X). \] Proof. This is an immediate consequence of the Grothendieck spectral sequence since for a submanifold \( C \) \[ E_2^{p,k} = H^p(X, \mathcal{H}_C^k) = \begin{cases} 0, & k \neq c \\ H^p(C, \Omega_C), & k = c. \end{cases} \] converges to \( H^{p+k}_C(X) \) and therefore \( H^p(C, \Omega_C) \simeq H^{p+k}_C(X) \). \( \square \) **Definition A.4.** A stratified subspace of codimension $c$ of a Banach manifold $X$ is a pair $(C,F)$, where $C$ is a closed subset endowed with a filtration $F: C = F_0 \supset F_1 \supset F_2 \supset \cdots$ with closed sets $F_i \subset X$ such that the stratum $F_i \setminus F_{i+1}$ is a submanifold of codimension $c + i$ or is the empty set. The set $C$ is called coorientable (cooriented) if the top stratum $F_0 \setminus F_1$ is coorientable (cooriented). **Proposition A.4.** Every stratified set $(C,F)$ of codimension $c$ has homological codimension $\text{codim}_X^b(C) \geq c$. **Proof.** It is enough to show that given $w \in F_0$ $$H^k_{F_0}(U) = 0, \quad \forall \ k \leq c,$$ for all small open neighborhoods $U$ of $w$. But for $U$ open small enough, $U \cap F^0$ is a stratified space with a finite stratification because there exists an $n$ such that $w \in F_n \setminus F_{n+1}$ and $U \cap F_{n+1} = \emptyset$. So without restriction of the generality we can suppose that the stratification is finite, i.e., $F^{n+1} = \emptyset$. Therefore, $F_N$ is normally non-singular and so it has homological codimension at least $c + N$. We use induction on the number of strata to prove $\text{codim}_X^b C = 0$. Suppose we have proved that $\text{codim}_X^b F^1 \geq c + 1$. Then in the excision exact sequence: $$H^k_{F^1}(U) \to H^k_{F_0}(U) \to H^k_{F_0 \setminus F^1}(U \setminus F_1) \to H^{k+1}_{F^1}(U)$$ the first and the last group are zero for all $k < c$. On the other hand, $F_0 \setminus F_1$ is a submanifold of codimension $c$ in $U \setminus F_1$ and so $H^k_{F_0 \setminus F^1}(U \setminus F_1) = H^k_{F_0}(U) = 0$, for all $k < c$ and this finishes the proof. □ **Definition A.5.** A stratified set $(C,F)$ is called quasi-submanifold if $F_1 = F_2$. **Proposition A.5.** A cooriented quasi-submanifold of codimension $c$, $(C,F,\omega_C)$ naturally determines a cohomology class $$[C,F,\omega_C] \in H^c(X).$$ If $Y$ is another Banach manifold and $g: Y \to X$ is a differentiable map transversal to $C$, meaning that $g$ is transversal to every stratum $F_i \setminus F_{i+1}$ then \((g^{-1}(C), g^{-1}(F), g^*\omega_C)\) is a cooriented quasi-submanifold of codimension \(c\) and \[ [g^{-1}(C), g^{-1}(F), g^*\omega_C] = g^*[(C, F, \omega_C)]. \] **Proof.** Let us denote by \(S\) the top stratum \(S := F_0 \setminus F_2\). It is a closed submanifold of \(X \setminus F_2\). The class \([C, F, \omega_C] \in H^c(X, \mathbb{Z})\) is the image of the coorientation class \(\omega_S \in H^0(S, \Omega_S)\) via the following sequence of maps: \[ H^0(S, \Omega_S) \cong H^c_S(X \setminus F_2) \to H^c(X \setminus F_2) \approx H^c(X), \] where the first map is the Thom isomorphism and the last is the extension across \(F_2\). The second part of the proposition follows from the naturality of the Grothendieck spectral sequence. \(\square\) **Remark A.4.** It is important to keep in mind that, the class \([C, F, \omega]\) depends on the stratification \(F\). If \(C\) has three quasi-submanifold stratifications \(F, G, H\) such that \(F\) is a “refinement” of the two, i.e., \(G_2, H_2 \subset F_2\), then the classes determined by the three stratifications coincide. However, it is not clear that any two stratifications have a common refinement. When the ambient manifold is finite dimensional then one can speak about duality and the “correct” dual space for local cohomology is Borel–Moore homology. For the general definition of Borel–Moore homology see Chapter IX in [14]. **Remark A.5.** The Borel–Moore homology group of a compact space \(M\) is isomorphic with its singular homology. When the locally compact space \(M\) has a “nice” compactification \(\overline{M}\), e.g., when \((\overline{M}, M \setminus M)\) is a CW-pair then \[ H^i_{BM}(M) := H_i(\overline{M}, \overline{M} \setminus M). \] Let \(M\) be an oriented manifold of dimension \(n\). Then any oriented quasi-submanifold \(F\) of dimension \(d\) defines a Borel–Moore homology \([F] \in H^d_{BM}(M)\) class as follows. The top stratum \(S := F \setminus F^2\) determines a fundamental class \([S] \in H^d_{BM}(S)\). Then the long exact sequence (see IX.2 in [14]) \[ \to H_d^{BM}(F_2) \to H_d^{BM}(F) \to H_d^{BM}(S) \to H_{d-1}^{BM}(F_2) \to \forall p, \] where the first and the last groups are zero (because a similar exact sequence and a quick induction proves that the Borel–Moore homology of a stratified space vanishes in degree bigger than the dimension, since that is true for a manifold), implies that the middle map \[ j : H_{d}^{BM}(F) \to H_{d}^{BM}(S) \] is an isomorphism. Now \( j^{-1}[S] \in H_{d}^{BM}(S) \) can be pushed forward via \[ H_{d}^{BM}(F) \to H_{d}^{BM}(M) \] to a class \([F] \in H_{d}^{BM}(M)\). One of the most important features of Borel–Moore homology is that it appears in the Poincaré–Verdier Duality theorem (see Th. 4.7, Ch. IX.4 in [14]). \[ H^{p}(M) \simeq H_{n-p}^{BM}(M), \quad \forall \ 0 \leq p \leq n. \] The isomorphism is given by capping with the fundamental class \([M]\). Moreover via this isomorphism the cohomology class \([F] \in H^{n-d}(M)\) determined by a cooriented quasi-submanifold \(F\) goes to the homology class \([F] \in H_{d}^{BM}(M)\) determined by the same quasi-submanifold with the induced orientation (see Ch. X.4 in [14]). References The odd Chern character and index localization formulae Instituto de Matemática e Estatística Universidade Federal Fluminense Niterói, RJ Brasil E-mail address: daniel@mat.uff.br Received November 9, 2009
{"Source-Url":"http:\/\/www.intlpress.com\/site\/pub\/files\/_fulltext\/journals\/cag\/2011\/0019\/0002\/CAG-2011-0019-0002-a001.pdf","pdf-total-pages":68,"total-fallback-pages":0,"total-input-tokens":281021,"total-output-tokens":57996,"olmocr-version":"0.1.53","weborganizer":{"__label__adult_content":0.0001271963,"__label__art_and_design":0.0043563843,"__label__crime_and_law":0.0001395941,"__label__education_and_jobs":0.0034294128,"__label__entertainment":0.001373291,"__label__fashion_and_beauty":0.0001375675,"__label__finance_and_business":0.000600338,"__label__food_and_dining":0.0002309084,"__label__games":0.0018749237,"__label__electronics_and_hardware":0.0005788803,"__label__health":0.0005402565,"__label__history_and_geography":0.0021915436,"__label__home_and_hobbies":0.0017614365,"__label__industrial":0.0007472038,"__label__literature":0.0051727295,"__label__politics":0.0005187988,"__label__religion":0.0009188652,"__label__science_math_and_technology":0.970703125,"__label__social_life":0.0001860857,"__label__software":0.0008134842,"__label__software_development":0.0029220581,"__label__sports_and_fitness":0.0002799034,"__label__transportation":0.0004725456,"__label__travel_and_tourism":0.0001245737},"weborganizer_max":"__label__science_math_and_technology","avg_fraction_numbers_in_line_v1__avg_fraction_numbers_in_line_v1__avg_fraction_numbers_in_line_ratio":[[0.0,150680.0,0.02136]],"fineweb_edu_fasttext_gt2__fineweb_edu_fasttext_gt2__score":[[0.0,150680.0,0.41068]],"ft_lang_id_en_doc_v2__ft_lang_id_en_doc_v2__en":[[0.0,150680.0,0.74929]],"google_gemma-3-12b-it_contains_pii":false,"google_gemma-3-12b-it_is_public_document":true,"google_gemma-3-4b-it_v2tag__is_academic_paper":true,"google_gemma-3-4b-it_v2tag__is_class_syllabus":false,"google_gemma-3-4b-it_v2tag__is_completion_certificate":false,"google_gemma-3-4b-it_v2tag__is_court_notice":false,"google_gemma-3-4b-it_v2tag__is_homework_assignment":false,"google_gemma-3-4b-it_v2tag__is_news_article":false,"google_gemma-3-4b-it_v2tag__is_public_order":false,"google_gemma-3-4b-it_v2tag__is_resume_cv":false,"google_gemma-3-4b-it_v2tag__is_test_or_quiz":false,"google_gemma-3-4b-it_v2tag__is_textbook":false,"pdf_page_numbers":[[0,2072,1],[2072,4929,2],[4929,7570,3],[7570,9810,4],[9810,12235,5],[12235,14303,6],[14303,16229,7],[16229,18385,8],[18385,20234,9],[20234,21908,10],[21908,24043,11],[24043,25970,12],[25970,28363,13],[28363,30908,14],[30908,32944,15],[32944,35068,16],[35068,37166,17],[37166,39540,18],[39540,41763,19],[41763,43781,20],[43781,46111,21],[46111,48292,22],[48292,50710,23],[50710,52938,24],[52938,54902,25],[54902,57439,26],[57439,59605,27],[59605,61981,28],[61981,64017,29],[64017,66414,30],[66414,68594,31],[68594,71340,32],[71340,73886,33],[73886,75952,34],[75952,77779,35],[77779,79468,36],[79468,81575,37],[81575,84236,38],[84236,86571,39],[86571,88695,40],[88695,91011,41],[91011,93081,42],[93081,95661,43],[95661,97895,44],[97895,99911,45],[99911,102156,46],[102156,104215,47],[104215,106625,48],[106625,109616,49],[109616,111475,50],[111475,113837,51],[113837,116200,52],[116200,118460,53],[118460,120414,54],[120414,122575,55],[122575,125060,56],[125060,126762,57],[126762,129206,58],[129206,132262,59],[132262,135250,60],[135250,137318,61],[137318,139453,62],[139453,141881,63],[141881,144011,64],[144011,146333,65],[146333,148038,66],[148038,150027,67],[150027,150680,68]],"pipe_delimited_lines_v1__pipe_delimited_lines_v1__pipe_delimited_lines_ratio":[[0.0,150680.0,0.0]]}
olmocr_science_pdfs
null
2024-12-08 00:00:00
2024-12-08 00:00:00
null
null
9c345fe1-4a44-433d-82cb-f4e45a4b95e9
How do I maximize my CPU Windows 10? How do I max out my CPU performance? How to Use Maximum CPU Power in Windows 10 1. Right click the Start menu and select Control Panel. 2. Click Hardware and Sound. 3. Select Power Options. 4. Find Processor power management and open the menu for Minimum processor state. 5. Change the setting for on battery to 100%. 6. Change the setting for plugged in to 100%. How do I optimize my CPU Windows 10? Why is it dangerous to have high CPU usage? 1. Guide to fix high CPU usage on Windows 10. 2. Method 1: Disable the Superfetch feature. 3. Method 2: Change your power plan to Balanced. 4. Method 3: Adjust Windows 10 for the best performance. 5. Method 4: Disable startup applications. 6. Method 5: Optimize your hard drives by using defragment. How do I make my CPU run better? How to Make Your PC Run Faster 1. Update your computer. Updating your computer will usually help it run faster. … 2. Shut down and/or restart your computer regularly. … 3. Upgrade your RAM. … 4. Uninstall unnecessary programs. … 5. Delete temporary files. … 6. Delete big files you don’t need. … 7. Close out your tabs. … 8. Disable auto-launching programs. How do I maximize CPU cores? 1. Introduction. 2. 1Open the Run dialog box. 3. 2Type msconfig and press Enter. 4. 3Click the Boot tab and choose the Advanced Options button. 5. 4Place a check mark by Number of Processors and choose the highest number from the menu button. 6. 5Click OK. 7. 6Click OK in the System Configuration window. 8. 7Click Restart Now. Is 100% CPU usage bad? If the CPU usage is around 100%, this means that your computer is trying to do more work than it has the capacity for. This is usually OK, but it means that programs may slow down a little. … If the processor is running at 100% for a long time, this could make your computer annoyingly slow. What is a good CPU speed? A clock speed of 3.5 GHz to 4.0 GHz is generally considered a good clock speed for gaming but it’s more important to have good single-thread performance. This means that your CPU does a good job of understanding and completing single tasks. Why is my laptop CPU usage at 100%? If a process is still using too much CPU, try updating your drivers. Drivers are programs that control particular devices connected to your motherboard. Updating your drivers may eliminate compatibility issues or bugs that cause increased CPU usage. Open the Start menu, then Settings. Why is CPU temp so high? When computers overheat it is typically due to the central processing unit (CPU) being too hot. This can happen for a number of reasons such as lack of ventilation, dust or malfunctioning parts. Why is my CPU load so high? A virus or an antivirus The causes of high CPU usage are wide-ranging—and in some cases, surprising. Slower processing speeds could easily be the result of either the antivirus program you are running, or a virus that the software was designed to stop. Why is my PC so slow? One of the most common reasons for a slow computer is programs running in the background. Remove or disable any TSRs and startup programs that automatically start each time the computer boots. … How to remove TSRs and startup programs. What makes a computer run faster? The more cache a computer has will help make the computer run more efficiently. The next part of what makes a computer run faster is RAM or Random Access Memory. RAM is the computer’s short-term data storage. … Bus speed is another important part of what makes a computer faster. How do I clean up and speed up my computer? 10 Tips to Make Your Computer Run Faster 1. Prevent programs from automatically running when you start up your computer. … 2. Delete/uninstall programs you don’t use. … 3. Clean up hard disk space. … 4. Save old pictures or videos to the cloud or external drive. … 5. Run a disk cleanup or repair. Leave a Comment
{"cc_dump":"CC-MAIN-2022-40","dolma2_qc":{"0":0.989121139,"1":0.0108988108},"exact_duplicates":0,"lang":{"en":0.8850141168},"madlad":{"num_sentences":102,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":694,"sa_remove_ranges":[],"text_hash":"318152555542736384214457779700750756559","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-10-05T11:40:15Z","warc_url":"https:\/\/androidtrucos.com\/how-do-i-maximize-my-cpu-windows-10\/","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":0.0011087309,"__label__electronics_and_hardare":0.4921981394,"__label__finance_and_business":0.0039554066,"__label__health":null,"__label__home_and_hobbies":null,"__label__industrial":0.00001,"__label__science_math_and_technology":0.0284460355,"__label__software":0.7663036585,"__label__software_development":0.0030853704,"__label__art_and_design":null,"__label__religion":null,"__label__adult_content":0.00001,"__label__fashion_and_beauty":null,"__label__history_and_geography":0.00001,"__label__social_life":0.00001,"__label__sports_and_fitness":null,"__label__entertainment":null,"__label__games":null,"__label__travel_and_tourism":null,"__label__politics":null,"__label__literature":null,"__label__transportation":null,"__label__food_and_dining":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
01895cbf-6bc7-47aa-a23f-d5538f046cf7
Source string Read only (itstool) path: formalpara/title 21/210 Context English State While access to quality source code can reduce the cost of initial development, in the long-term the costs of managing change begin to dominate. As computing environments change over the years and new security vulnerabilities are discovered, your product too needs to change and adapt. Using open-source code is best viewed not as a one-off activity, but as an <emphasis>ongoing process</emphasis>. The best projects to collaborate with are the ones that are <emphasis>live</emphasis>; i.e., with an active community, clear goals and a transparent working style. FreeBSD has an active developer community around it. At the time of writing there are many thousands of contributors from every populated continent in the world and over 300 individuals with write access to the project's source repositories. The goals of the FreeBSD project are <citation>Hub1994</citation>: To develop a high-quality operating system for popular computer hardware, and, To make our work available to all under a liberal license. FreeBSD enjoys an open and transparent working culture. Nearly all discussion in the project happens by email, on <link xlink:href="http://lists.FreeBSD.org/mailman/listinfo">public mailing lists</link> that are also archived for posterity. The project's policies are <link xlink:href="@@URL_RELPREFIX@@/internal/policies.html">documented</link> and maintained under revision control. Participation in the project is open to all. Understanding FreeBSD culture To be able to work effectively with the FreeBSD project, you need to understand the project's culture. Volunteer driven projects operate under different rules than for-profit corporates. A common mistake that companies make when venturing into the open-source world is that of underplaying these differences. Most contributions to FreeBSD are done voluntarily without monetary rewards entering the picture. The factors that motivate individuals are complex, ranging from altruism, to an interest in solving the kinds of problems that FreeBSD attempts to solve. In this environment, <quote>elegance is never optional</quote> <citation>Nor1993</citation>. The Long Term View FreeBSD's <link xlink:href="https://svnweb.freebsd.org/">source repository</link> contains a history of the project since its inception, and there are <link xlink:href="http://www.mckusick.com/csrg/">CDROMs available</link> that contain earlier code from the CSRG. FreeBSD traces its roots back nearly twenty years to the work of the Computer Science Research Group at the University of California Berkeley.<_:footnote-1/> A number of the original CSRG developers remain associated with the project. The project values long-term perspectives <citation>Nor2001</citation>. A frequent acronym encountered in the project is <acronym>DTRT</acronym>, which stands for <quote>Do The Right Thing</quote>. Development Processes Computer programs are tools for communication: at one level programmers communicate their intentions using a precise notation to a tool (a compiler) that translates their instructions to executable code. At another level, the same notation is used for communication of intent between two programmers. Formal specifications and design documents are seldom used in the project. Clear and well-written code and well-written change logs (<xref linkend="fig-change-log"/>) are used in their place. FreeBSD development happens by <quote>rough consensus and running code</quote> <citation>Carp1996</citation>. A sample change log entry r151864 | bde | 2005-10-29 09:34:50 -0700 (Sat, 29 Oct 2005) | 13 lines Changed paths: M /head/lib/msun/src/e_rem_pio2f.c Use double precision to simplify and optimize arg reduction for small and medium size args too: instead of conditionally subtracting a float 17+24, 17+17+24 or 17+17+17+24 bit approximation to pi/2, always subtract a double 33+53 bit one. The float version is now closer to the double version than to old versions of itself -- it uses the same 33+53 bit approximation as the simplest cases in the double version, and where the float version had to switch to the slow general case at |x| == 2^7*pi/2, it now switches at |x| == 2^19*pi/2 the same as the double version. This speeds up arg reduction by a factor of 2 for |x| between 3*pi/4 and 2^7*pi/4, and by a factor of 7 for |x| between 2^7*pi/4 and 2^19*pi/4. Communication between programmers is enhanced by the use of a common coding standard <citerefentry><refentrytitle>style</refentrytitle><manvolnum>9</manvolnum></citerefentry>. Communication Channels FreeBSD's contributors are spread across the world. Email (and to a lesser extent, IRC) is the preferred means of communication in the project. Best Practices for collaborating with the FreeBSD project We now look at a few best practices for making the best use of FreeBSD in product development. Plan for the long term Setup processes that help in tracking the development of FreeBSD. For example: Track FreeBSD source code The project makes it easy to mirror its SVN repository using <link xlink:href="@@URL_RELPREFIX@@/doc/en_US.ISO8859-1/articles/committers-guide/article.html#svn-advanced-use-setting-up-svnsync"><application>svnsync</application></link>. Having the complete history of the source is useful when debugging complex problems and offers valuable insight into the intentions of the original developers. Use a capable source control system that allows you to easily merge changes between the upstream FreeBSD code base and your own in-house code. <xref linkend="fig-svn-blame"/> shows a portion of an annotated listing of the file referenced by the change log in <xref linkend="fig-change-log"/>. The ancestry of each line of the source is clearly visible. Annotated listings showing the history of every file that is part of FreeBSD are <link xlink:href="https://svnweb.freebsd.org/">available on the web</link>. An annotated source listing generated using <command>svn blame</command> No matching activity found. Browse all component changes English English No related strings found in the glossary. Source information Source string comment (itstool) path: formalpara/title read-only Source string location article.translate.xml:540 String age a year ago Source string age a year ago Translation file articles/building-products.pot, string 106
{"cc_dump":"CC-MAIN-2021-04","dolma2_qc":{"0":1.0000046492,"1":0.0000153913},"exact_duplicates":0,"lang":{"en":0.8457000256},"madlad":{"num_sentences":43,"rule.2":[],"rule.5":[21],"status":"survived"},"minhash":null,"original_word_count":1005,"sa_remove_ranges":[],"text_hash":"82537103435299526423843987410050925538","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-01-22T12:18:28Z","warc_url":"https:\/\/translate-dev.freebsd.org\/translate\/freebsd-doc\/articles_building-products\/en\/?checksum=b406a9a8bb3de1f1","weborganizer":{"__label__adult_content":null,"__label__crime_and_law":null,"__label__education_and_jobs":0.0185565669,"__label__electronics_and_hardare":0.0043415031,"__label__finance_and_business":0.0159163941,"__label__games":null,"__label__industrial":0.0071314299,"__label__science_math_and_technology":0.1403462589,"__label__software":0.0566624328,"__label__software_development":0.8991314173,"__label__health":null,"__label__home_and_hobbies":0.004765199,"__label__literature":null,"__label__politics":null,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__entertainment":null,"__label__food_and_dining":null,"__label__transportation":null,"__label__history_and_geography":0.0033866118,"__label__art_and_design":0.006702851,"__label__fashion_and_beauty":null,"__label__religion":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
8d4d9fd85b6bf43fead1809cbd4d6672cf695579
from flask_restful import Api, Resource from flask import request, jsonify, Flask from pymongo import MongoClient import bcrypt import spacy #Initializing Flask App app = Flask(__name__) api = Api(app) #Setting Up Mongo db client = MongoClient("mongodb://localhost:27017") db = client["Plagarism"] users = db["users"] #Check if the username already exists or not def checkUser(username): search = users.find({"username": username}) if search.count() == 0: return False else: return True #Check Valildity of Auth def checkValidity(username, password): name = users.find_one({"username": username}) hashedPw = name["password"] if bcrypt.hashpw(password.encode('utf8'), hashedPw) == hashedPw: return 1 else: return 0 #Check for remaining token of a certain user def checkToken(username): return users.find_one({"username": username})["tokens"] #Check Similarity of 2 strings. def checkSimilarity(sentence_1, sentence_2): nlp = spacy.load('en_core_web_sm') string_1 = nlp(sentence_1) string_2 = nlp(sentence_2) ratio = string_1.similarity(string_2) return ratio #Resource for registering user class Register(Resource): def post(self): #Getting Posted Data posted_data = request.json username = posted_data["username"] password = posted_data["password"] #Checking if user exist userexist = checkUser(username) if userexist: retJson = { "status": 301, "message": "Username exists. Try different one." } return jsonify(retJson) #Hashing the password for storing hashedPw = bcrypt.hashpw(password.encode('utf8'), bcrypt.gensalt()) #If all set, Store the data and return a response users.insert_one({ "username": username, "password": hashedPw, "tokens": 6 }) retJson = { "status": 200, "message": "User registered successfully." } return jsonify(retJson) #Resource for checking similarity of 2 strings. class Similarity(Resource): def post(self): #Getting Posted Data posted_data = request.json username = posted_data["username"] password = posted_data["password"] sentence_1 = posted_data["sen1"] sentence_2 = posted_data["sen2"] #Checking for Authentication Validity validAuth = checkValidity(username, password) if validAuth == 0: retJson = { "status": 302, "message": "Authentication Invalid." } return jsonify(retJson) #Checking if token exists or not remainingToken = checkToken(username) if remainingToken <=0: retJson = { "status": 301, "message": "You are out of token." } return jsonify(retJson) #If all are ok, Check the similarity, decrease a token and return a response. similarityRatio = checkSimilarity(sentence_1, sentence_2)*100 users.update({"username": username}, { "$set":{ "tokens": remainingToken -1 #Update token no. } }) retJson = { "status": 200, "message": "Similarity Determined Successfully.", "percentage": similarityRatio } return jsonify(retJson) #Resource for refilling token. class Refill(Resource): def post(self): #Get posted Data posted_data = request.json username = posted_data["username"] pw = posted_data["adminpwd"] refillAmount = posted_data["refill"] adminpw = "xyz123" #Check if username exists or not if not checkUser(username): retJson = { "status": 301, "message": "Username invalid" } return jsonify(retJson) #Check if admin password is correct if pw != adminpw: retJson = { "status": 304, "message": "Invalid Admin Password." } return jsonify(retJson) #All are set. Update the token number. remainingToken = checkToken(username) users.update({"username": username},{ "$set": { "tokens": remainingToken + refillAmount } }) retJson = { "status": 200, "message": "Token Refilled Successfully." } return jsonify(retJson) #Assigning all resources with addresses api.add_resource(Register, '/register') api.add_resource(Similarity, '/check') api.add_resource(Refill, '/refill') if __name__ == "__main__": app.run(host='127.0.0.1', port=80, debug=True)
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '8d4d9fd85b6bf43fead1809cbd4d6672cf695579', 'language': 'Python', 'repo_name': 'bug-Nihad\/Practise-Flask_API', 'path': '\/plagarism_checker_api.py', 'src_encoding': 'UTF-8', 'length_bytes': 4950, 'score': 2.859375, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":4950,"score":2.859375,"src_encoding":"UTF-8","repo_name":"bug-Nihad\/Practise-Flask_API","detected_licenses":[],"int_score":3,"path":"\/plagarism_checker_api.py","language":"Python","license_type":"no_license"}
null
null
null
5ca68421-faad-47dc-aadb-d44f87e26f0a
You are viewing a single comment's thread (view the rest of the comments). fishbrains Dec 29 '78 Any realistic chance of this happening this season? OverAnalyzer Jan 23 '79 It's a bad sign they aren't answering anymore. At least there used to be a reply when this came up. FFCSR_Hal Admin Jan 25 '79 We are answering, there are just many threads. FleaMod addressed it a few days ago: Thanks, we're putting some finishing touches on the mobile in-browser capability now that will act like a native app.
{"cc_dump":"CC-MAIN-2015-14","dolma2_qc":{"0":0.7853112817,"1":0.2147087306},"exact_duplicates":4,"lang":{"en":0.9360781908},"madlad":{"num_sentences":6,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":91,"sa_remove_ranges":[],"text_hash":"181260093409886752270060856957069606791","warc_content_type":"application\/http; msgtype=response","warc_date":"2015-03-27T05:22:10Z","warc_url":"http:\/\/www.fleaflicker.com\/topic?forumId=2&forumsTopicId=23340&forumsMessageId=96050","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__entertainment":0.0503406264,"__label__finance_and_business":0.0362300538,"__label__literature":null,"__label__politics":0.0244330931,"__label__science_math_and_technology":null,"__label__software":0.2628518641,"__label__games":null,"__label__health":null,"__label__home_and_hobbies":0.0656148344,"__label__software_development":0.0373368822,"__label__industrial":0.0216253344,"__label__social_life":0.0174524877,"__label__sports_and_fitness":0.032110706,"__label__transportation":0.0209742412,"__label__adult_content":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null,"__label__religion":null,"__label__fashion_and_beauty":null,"__label__history_and_geography":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
6dd7c95e6969bafd8f07c624f0de3057032da42b
#pragma once #include "Sprite.h" #include "ItemBody.h" #include"UserData.h" class Enemy : public Sprite { protected: float x, y; float width, height; DWORD m_TakeDameTime = 0; int m_animationTime = 200; int m_HP, m_maxHP; int m_damage, m_score; float m_moveSpeed; ItemBody* enemyBody; public: Enemy(int id); virtual ~Enemy(); virtual void Update(float deltaTime); virtual void createBox2D(); void takeDamage(); void setHP(int hp) { this->m_HP = hp; } int getHP() { return this->m_HP; } };
{"path":"\/Game\/Enemy.h","length_bytes":506,"score":2.546875,"detected_licenses":[],"src_encoding":"UTF-8","int_score":3,"repo_name":"vuquangdai9x\/GLI_Project_X","license_type":"no_license","language":"C++","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '6dd7c95e6969bafd8f07c624f0de3057032da42b', 'language': 'C++', 'repo_name': 'vuquangdai9x\/GLI_Project_X', 'path': '\/Game\/Enemy.h', 'src_encoding': 'UTF-8', 'length_bytes': 506, 'score': 2.546875, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}"}
null
null
null
17c7bf56-b520-466d-97be-1b821872794f
AP U.S. History Notes Chapter 2: The Planting of English America, 1500-1733 1. England’s Imperial Stirrings 1. After Columbus’s landfall, the Native American peoples had nearly been extinguished mostly from disease (only about 10% survived) 2. From Florida and New Mexico southward, most of the southern half of the New World lay firmly within the grip of imperial Spain 3. In 1600, North America remained mostly unexplored and unclaimed 1. ​Three European powers planted three primitive outposts in three distant corners of the continent within three years of one another 2. The Spanish at Santa Fe in 1610, the French at Quebec in 1608, and the English at Jamestown, Virginia, in 1607 4. ​England had taken little interest in establishing its own overseas colonies during the early 16th century because of religious conflict when King Henry VIII launched the English Protestant Reformation 1. ​Catholics battled Protestants for years and balance of power shifted 2. After the Protestant Elizabeth ascended to the English throne in 1558, Protestantism became dominant in England and a rivalry with Catholic Spain intensified (Ireland became early scene of rivalry) 5. ​The Catholic Irish sought help from Catholic Spain to overthrow the new Protestant English queen but the Spanish aid never really helped 6. Elizabeth’s troops crushed the Irish and the English crown confiscated Catholic Irish lands and planted them with new Protestant landlords 2. ​Elizabeth Energizes England 1. ​English buccaneers sought to promote the twin goals of Protestantism and plunder by seizing Spanish treasure ships and raiding Spanish settlements, even though England and Spain were at peace (the most famous was Francis Drake who was knighted by Queen Elizabeth) 2. The coast of Newfoundland was the site of the first English attempt at colonization but collapsed when promoter Sir Humphrey Gilbert lost his life at sea in 1583—the dream inspired his gallant half brother 1. ​Sir Walter Raleigh organized a group of settlers who landed in 1585 on North Carolina’s Roanoke Island, off the coast of Virginia, a region named by the Virgin Queen Elizabeth in honor of herself 2. With Raleigh busy at home, the Roanoke colony suddenly vanished 3. ​The English failures at colonization contrasted embarrassingly with the glories of the Spanish Empire, whose profits were enriching Spain beyond its ambitious dreams; Philip II of Spain, foe of the Protestant Reformation used his imperial gains to amass an Invincible Armada 1. ​Preparing to invade England, in 1588, the lumbering Spanish flotilla arrived at the English Channel and using swifter, more maneuverable, and more able manned ships, they inflicted heavy damage on the cumbersome overladen Spanish ships 2. The defeat of the Spanish Armada marked the beginning of the end of Spanish imperial dreams but the New World empire would last 4. ​When the Spanish Netherlands secured their independence, much of the Spanish Caribbean slipped from Spain’s grasp to Holland; it was obvious that Spain had overreached itself, seeds of its own decline 5. England’s victory over the Spanish Armada marked a red-letter day in American history; it dampened Spain’s spirit and helped ensure England’s naval dominance in the North Atlantic (master of oceans) 6. England now displayed many characteristics that Spain displayed on the eve of its colonizing adventure a century earlier 1. ​A strong, unified national state under a popular monarch 2. A measure of religious unity after a protracted struggle 3. A vibrant sense of nationalism existing in the state 7. ​A flowering of the English national spirit bloomed in the wake of the Spanish Armada’s defeat; a golden age of literature dawned 8. The English were seized with restlessness with curiosity about the unknown and everywhere a new spirit of self-confidence, of vibrant patriotism, and of boundless faith in the future 9. When England and Spain finally signed a treaty of peace in 1604, the English people were poised to plunge headlong into the planting of their own colonial empire in the New World 3. ​England on the Eve of Empire 1. ​England’s population rose from some 3 million people in 1550 to about 4 million in 1600 and in the English countryside, landlords were “enclosing” croplands for sheep grazing, forcing many farmers to leave 2. It was no accident that the woolen districts of eastern and western England supplied many of the earliest immigrants to America 1. ​The economic depression hit the woolen trade in the late 1500s and as a result, thousands of footloose farmers took to the road 2. The farmers were unemployed and drifted about England; the remarkably mobile population alarmed many contemporaries whom concluded that England was burdened with a surplus population 3. ​​​At the same time, laws of primogeniture decreed that only eldest sons were eligible to inherit landed estates and younger sons were forced to seek their fortunes elsewhere; bad luck plagued their early enterprises 4. In the early 1600s the joint-stock company forerunner of the modern corporation was perfected and allowed a number of investors, called adventurers to pool their capital together for adventures 5. Peace with Spain provided the opportunity for English colonization; population growth provided workers, and unemployment, with a thirst for adventure, for markets, and for religious freedom, provided motives 6. Joint-stock companies provided the financial means 4. ​England Plants the Jamestown Seedling 1. ​In 1606, a joint-stock company, the Virginia Company of London, received a charter form King James I for a settlement in the New World 1. ​The main attraction was the promise of gold, combined with a strong desire to find a passage through America to the Indies 2. Like most joint-stock companies, it was intended to last for only a few years, after which its owners hoped to liquidate it for profit 3. The arrangement put severe pressure on the colonists, who were threatened with abandonment if they did not quickly strike it rich on the company’s behalf; few investors touch in terms of long-term 2. ​The charter of the Virginia Company is a significant document in American history because it guaranteed to the settlers the same rights of Englishmen that they would have enjoyed if they had stayed home 3. Setting sail in late 1606, the Virginia Company’s three ships landed near the mouth of Chesapeake Bay, where Indians attacked them 1. ​Pushing on up the bay, the colonists eventually chose a location on the banks of the James River, named in honor of King James I 2. The site was easy to defend, but mosquito-infested and severely unhealthy; on May 24, 1607, about a hundred English settlers, all of them men, landed and called the place Jamestown 4. ​The early years of Jamestown were not encouraging, colonists perished during voyages, expeditions were shipwrecked, and once ashore in Virginia, the settlers died from disease, malnutrition, and starvation 5. Instead of collecting food many spent time looking for nonexistent gold 6. Virginia was saved from collapse by the leadership and resourcefulness of a young adventurer, Captain John Smith who took over in 1608 1. ​He whipped the gold-hungry colonists into line with the rule 2. He had been kidnapped in December 1607 and subjected to a mock execution by the Indian chieftain Powhatan whose daughter, Pocahontas, “saved” him but the symbolism of this ritual was intended to show Smith Powhatan’s power and peaceful intentions 3. Pocahontas became an intermediary between the Indians and the settlers helping to preserve a shaky peace and to provide supplies 7. ​Of the four hundred settlers who managed to make it to Virginia, by 1609, only sixty survived the “Starving time” winter of 1609-1610 8. Diseased and despairing, the colonists dragged themselves on homeward-bound ships only to be met on the James River by the relief party headed by a new governor, Lord De La Warr; he ordered the settlers back to Jamestown and imposed a harsh military regime 9. By 1625 Virginia contained only some twelve hundred survivors of the nearly 8,000 adventurers who had tried to start life anew in the colony 5. ​Cultural Clash in the Chesapeake 1. ​In 1607, the chieftain Powhatan dominated the James River area 1. ​Powhatan asserted supremacy over a few dozen small tribes loosely affiliated in what came to be called Powhatan’s Confederacy 2. The English colonists dubbed all the local Indians Powhatans 3. Powhatan considered the English potential allies at first in extending his power over the other Indians but relations between the Indians and the English remained tense, especially as the starving colonists took to raiding Indian food supplies 2. ​After Lord De La Warr arrived in 1610, he carried orders from the Virginia Company that amounted to a declaration of war against the Indians in the Jamestown region (De La Warr introduced Irish tactics) 1. ​His troops raided Indian villages, burned houses, confiscated provisions, and torched cornfields; a peace settlement ended this First Anglo-Powhatan War in 1614 sealed by the marriage of Pocahontas to the colonist John Rolfe—the first interracial union 2. A fragile peace followed, which endured eight years but the Indians pressed by the whites an ravaged by European diseases, stuck back 3. In 1622, a series of Indian attacks left 347 settlers dead, including John Rolfe and in response the Virginia Company issued new orders calling for a perpetual war without peace or truce 4. In the Second Anglo-Powhatan War in 1644, the Indians were once again defeated and the peace treaty of 1646 banished the Chesapeake Indians from their ancestral lands and separated lands 5. By 1669 an official census revealed that only about two thousand Indian remained in Virginia (about 10 percent of original settlers) and by 1685, the English considered the Powhatan peoples extinct 3. ​It had been the Powhatan people’s tragic misfortune to fall victim to the three Ds: disease, disorganization, and disposability 1. ​The native peoples were extremely susceptible to European-imported maladies (epidemics of smallpox and measles spread) 2. The Powhatans lacked the unity to make effective opposition to the relatively well-organized and militarily disciplined whites 3. The Powhatans served no economic function for the Virginia colonists; they provided no reliable labor source and had no valuable commodities to offer in commerce (agriculture) 4. ​The Indians presence frustrated the colonists’ desire for a local commodity the Europeans desperately wanted: land 6. ​Virginia: Child of Tobacco 1. ​John Rolfe became father of the tobacco industry and an economic savior of the Virginia colony; by 1616 he had perfected methods of raising and curing the pungent weed, eliminating much bitter taste 2. Soon the European demand for tobacco was nearly insatiable 1. ​A tobacco rush swept Virginia as colonists who had once hungered for food now hungered for land on which to plant more tobacco 2. Relentlessly they pressed the frontier of settlement up the river valleys to the west, further crowding the Indians 3. ​Virginia’s prosperity was finally built on tobacco smoke 1. ​This weed played a vital role in putting the colony on firm found-ations and in setting an example for other successful experiments 2. ​​“King Nicotine” was ruinous to the soil when greedily planted in successive years and it enchained the prosperity of Virginia to the fluctuating price of a single crop; tobacco also promoted broad-acred plantation system and with it a brisk demand for fresh labor 4. ​In 1619, a Dutch warship appeared off Jamestown and sold some twenty black Africans but blacks were too costly for most of the white colonists to acquire and for decades, few were brought to Virginia 5. In 1650 Virginia counted three hundred blacks; by 1700, blacks, most of them enslaved, made up approximately 14 percent of the population 6. Representative self-government was also born in primitive Virginia, the same cradle with slavery and in the same year—1619 1. The London Company authorized the settlers to summon an assembly known as the House of Burgesses; this assemblage was the first of many miniature parliaments to begin in America 2. James I grew increasingly hostile to Virginia because he detested tobacco and he distrusted the representative House of Burgesses 3. In 1624, he revoked the charter of the bankrupt and beleaguered Virginia Company, thus making Virginia a royal colony under him 7. ​​Maryland: Catholic Haven 1. ​Maryland, the second plantation but fourth English colony was founded in 1634 by Lord Baltimore, of a prominent English Catholic family; at this time, Protestant England was still persecuting Roman Catholics 2. Absentee proprietor Lord Baltimore hoped that the two hundred settlers who founded Maryland at St. Marys would be the front line of a vast new feudal domain; huge estates were to be awarded to his relatives 1. ​The haughty land barons, mostly Catholic, were surrounded by resentful country planters (people were willing to come for land) 2. Resentment flared into open rebellion near the end of the century, and the Baltimore family for a time lost its proprietary rights 3. Maryland prospered despite these tensions and like Virginia, it blossomed forth in acres of tobacco and also like Virginia, it depended for labor on white indentured servants; penniless persons who bound themselves to work for a number of years to pay their passage 4. In both colonies it was only in the later years of the seventeenth century that black slaves began to be imported in large numbers to the colonies 5. Lord Baltimore permitted unusual freedom of worship at the outset 1. ​​​The heavy tide of Protestants threatened to submerge the Catholics and place severe restrictions on them, as what happened in England 2. The Catholics of Maryland threw their support behind the famed Act of Toleration, which was passed in 1649 by the local representative assembly; it guaranteed toleration to all Christians 3. But, it decreed the death penalty for those who denied the divinity of Jesus; the law thus sanctioned less toleration than previously 4. One result was that when the colonial era ended, Maryland probably sheltered more Roman Catholics than any other English speaking colony in the New World 8. ​​The West Indies: Way Station to Mainland America 1. ​Spain, weakened by military overextensions and distracted by its rebellious Dutch provinces, relaxed its grip on much of the Caribbean in the early 1600s; by the mid-seventeenth century, England had claimed several West Indian islands, including Jamaica in 1655 2. Sugar formed the foundation of the West Indian economy 1. ​Tobacco was a poor man’s crop because it could be planted easily, it produced commercially marketable leaves within a year, and required only simple processing; sugarcane was a rich man’s crop 2. Sugarcane had to be planted extensively to yield commercially viable quantities of sugar; extensive planting required extensive and arduous land clearing and canestalks yielded sugar only after an elaborate process of refining in sugar mill (capital-intense business) 3. ​The sugar lords extended their dominion over the West Indies 1. ​To work their sprawling plantations, they imported enormous numbers of African slaves (more than a quarter million in 50 years) 2. By 1700, black slaves outnumbered white settlers in the English West Indies by nearly four to one—West Indians were among the children of the African Diaspora, the vast scattering of African people throughout the New World follow Columbus’s discovery 4. ​To control this large population of slaves, English authorities devised formal “codes” that defined the slaves’ legal status and masters’ rights; the Barbados slave code of 1661 denied even the most fundamental rights to slaves and gave masters virtually complete control over them, including the right to inflict vicious punishments for slight infractions 5. The sugar-plantation system soon crowded out Caribbean agriculture 1. ​The West Indies increasingly depended on the North American mainland for foodstuffs and other basic supplies 2. Smaller English farmers began to migrate to the newly founded southern mainland colonies; a group of displaced English settlers from Barbados arrived in Carolina in 1670 and brought the slave code with them, which inspired statutes governing slavery 3. The mainland colonies would soon take up this slave code and in 1696, Carolina officially adopted a version of the Barbados code 9. ​​Colonizing the Carolinas 1. ​Civil wars convulsed England in the 1640s as the King Charles I dismissed Parliament in 1629, Oliver Cromwell had Charles beheaded in 1649 and after Cromwell had ruled England for nearly a decade, Charles II, son of the king, was restored to the throne in 1660 2. Colonization had been interrupted during this period of bloody unrest and now in the Restoration period, empire building resumed 1. Carolina, named in honor of the restored king, was formally created in 1670, after Charles II granted to eight of his court favorites, the Lords Proprietors, an expanse of wilderness ribboning across the continent to the Pacific; they hoped to grow food for Barbados and to export non-English products like wine, silk, and olive oil 2. Carolina prospered by developing close economic ties with the flourishing sugar islands of the English West Indies; many Carolina settlers had emigrated from Barbados and established a slave trade 3. Enlisting the aid of the coastal Savannah Indians, they ventured in search of captives; although the Lords Proprietors protested, manacled Indians soon were among the young colony’s major exports (as many as ten thousand Indians were dispatched) 3. ​In 1707 the Savannah Indian decided to end their alliance with the Carolinians and to migrate to the backcountry of Maryland and Pennsylvania, where a new colony founded by Quakers under William Penn promised better relations between whites and Indians 4. After a series of bloody raids, by 1710 the Indian tribes of coastal Carolina were all but extinct after the Carolinians turned against them 5. After much experimentation, rice emerged as the principal export crop in Carolina; rice was then an exotic food in England, but rice was grown in Africa and the Carolinians were paying premium prices for West African slaves experienced in rice cultivation 1. ​The Africans’ agricultural skill and relative immunity to malaria made them ideal laborers on the hot and swampy rice plantations 2. By 1710 they constituted a majority of Carolinians 6. ​Charlestown rapidly became the busiest seaport in the South; many high-spirited sons of English landed families came to the Charleston area and gave it a rich aristocratic flavor (diverse community, to which French Protestant refuges were attracted by religious toleration) 7. In Florida, the Catholic Spaniards bitterly resented the intrusion of these Protestant heretics and Carolina’s frontier was often aflame of Spanish-incited Indians and armor-clad warriors of Spain brandished their weapons during the successive Anglo-Spanish wars 10. ​​​The Emergence of North Carolina 1. ​The wild northern expanse of the huge Carolina grant bordered on Virginia where a group of outcasts and religious dissenters drifted 1. ​Many of them had been repelled by the rarefied atmosphere of Virginia dominated as it was by big-plantation aristocrats belonging to the Church of England (quintessence of Virginia’s discontent) 2. The newcomers, “squatters” without legal right to the soil, raised their tobacco and other crops on small farms, without slaves 2. ​Distinctive traits developed rapidly in North Carolina 1. ​The poor but sturdy inhabitants earned a reputation for being irreligious and hospitable to pirates; isolated from neighbors by raw wilderness and Cape Hatteras, “graveyard of Atlantic,” the North Carolinians developed a strong spirit of resistance to authority 2. Following much friction with governors, North Carolina was officially separated from South Carolina in 1712 (royal colonies) 3. ​North Carolina shares with Rhode Island several distinctions; these two outposts were the most democratic, the most independent-minded, and the least aristocratic of the original thirteen English colonies 4. Although northern Carolina did not at first import large numbers of African slaves, both regions shared in the ongoing tragedy of bloody relations between Indians and Europeans 1. ​The North Carolinians aided by the south, retaliated by crushing the Tuscaroras in battle in 1711 after they fell upon Newbern, selling hundreds into slavery and leaving the survivors to wander northward to seek the protection of the Iroquois natives 2. The Tuscaroras became Sixth Nation of the Iroquois Confederacy 3. In another encounter four years later, the South Carolinians defeated and scattered the Yamasee Indians; virtually all the coastal Indian tribes in the South had been utterly devastated by about 1720 5. ​But in the interior of the Appalachian Mountains, the powerful Cherokees, Creeks, and Iroquois remained; stronger and more numerous, they managed for 50 years more to contain British settlement to the coastal plain east of the mountains 11. ​Late-Coming Georgia: The Buffer Colony 1. ​Georgia, with the harbor of Savannah nourishing its chief settlement, was formally founded in 1733 (it long after most of the other colonies) 2. Georgia was valued by the English crown chiefly as a buffer 1. ​It would serve to protect the more valuable Carolinas from vengeful Spaniards from Florida and by the hostile French from Louisiana 2. Georgia suffered much buffeting, especially when wars broke out between Spain and England; a vital link in imperial defense, the exposed colony received monetary subsidies from the British government at the outset (the only one of the original thirteen) 3. ​Named in honor of George II of England, Georgia was launched by a high-minded group of philanthropists; aside from producing silk and wine and strengthening the empire, they were determined to create a haven for wretched souls imprisoned for debt 4. The ablest of the founders was the dynamic James Oglethorpe, who was interested in prison reform, as the leader, repelled Spanish attacks; as an imperialist and a philanthropist, he saved “the Charity Colony” by his energetic leadership and by heavily mortgaging his personal fortune 5. The hamlet of Savannah was a melting pot community; German Lutherans and Scots Highlanders added color to the pattern 6. All Christian worshipers except Catholics enjoyed religious toleration (many Bible-toting missionaries arrived in Savannah to work among debtors and Indians, including John Wesley of the later Methodists) 7. Georgia grew with painful slowness and at the end of the colonial era was perhaps the least populous of the colonies; prosperity through a large plantation economy was thwarted by an unhealthful climate, by early restrictions on black slavery, and by demoralizing Spanish attacks 12. ​The Plantation Colonies 1. ​Certain distinctive features were shared by England’s southern mainland colonies: Maryland, Virginia, North Carolina, South Carolina, and Georgia 1. ​Board-acred, this outposts were dominated by a plantation economy 2. Profitable staple crops were the rule, notably tobacco and rice 3. Slavery was found in all the plantation colonies, though only after 1750 in reform-minded Georgia (strong aristocratic atmosphere was wide, except in North Carolina and to some extent in Georgia) 4. The wide scattering of plantations and farms, made the establishment of churches and schools both difficult and expensive 5. All the plantation colonies permitted some religious toleration; the tax-supported Church of England became the dominant faith though weakest of all in nonconformist North Carolina 2. ​The colonies were in some degree expansionary; “soil butchery” by excessive tobacco growing drove settlers westward and the long, lazy rivers invited penetration of the continent—and the continuing confrontation with Native Americans You just finished Chapter 2: The Planting of English America, 1500-1733. Nice work! Tip: Use ← → keys to navigate! How to cite this note (MLA) Aboukhadijeh, Feross. "Chapter 2: The Planting of English America, 1500-1733" StudyNotes.org. Study Notes, LLC., 17 Nov. 2012. Web. 20 Mar. 2023. <https://www.apstudynotes.org/us-history/outlines/chapter-2-the-planting-of-english-america-1500-1733/>.
{"cc_dump":"CC-MAIN-2023-14","dolma2_qc":{"0":0.8046669364,"1":0.1953530908},"exact_duplicates":0,"lang":{"en":0.9559655786},"madlad":{"num_sentences":167,"rule.2":[1],"rule.5":[],"status":"survived"},"minhash":{"cc_id":7336592674491.0,"cc_idx":0.0,"cc_size":2.0},"original_word_count":3929,"sa_remove_ranges":[],"text_hash":"255372680046916182323360288938444490987","warc_content_type":"text\/html","warc_date":"2023-03-20T17:59:48.000Z","warc_url":"https:\/\/www.apstudynotes.org\/us-history\/outlines\/chapter-2-the-planting-of-english-america-1500-1733\/","weborganizer":{"__label__art_and_design":0.0019977742,"__label__education_and_jobs":null,"__label__finance_and_business":0.0034934247,"__label__history_and_geography":0.9525841475,"__label__home_and_hobbies":null,"__label__literature":0.0145135829,"__label__politics":0.031153826,"__label__religion":null,"__label__science_math_and_technology":0.0025609129,"__label__travel_and_tourism":0.0038344827,"__label__crime_and_law":null,"__label__entertainment":null,"__label__games":0.0024067315,"__label__social_life":null,"__label__fashion_and_beauty":null,"__label__sports_and_fitness":null,"__label__industrial":0.0021927168,"__label__health":null,"__label__adult_content":null,"__label__software_development":null,"__label__transportation":null,"__label__software":null,"__label__food_and_dining":0.0021927168,"__label__electronics_and_hardare":null},"weborganizer_max":"__label__history_and_geography"}
null
null
null
null
null
null
a3a5ee1f-6573-4d08-9478-3f2c77deea21
While looking at my past posts on the topic, I realized I never gave out the link to the download for the HL7 Schema Generation Tools that I discussed waaaaay back. Hopefully the most entrepreneurial readers will have found it, for the rest of us, here it is with a small description from the download page: http://www.microsoft.com/downloads/details.aspx?familyid=94877261-1F04-40B7-8C6D-CF92F38D09A3&displaylang=en This is the same tool that the BizTalk team uses internally to generate the schemas that ship with Microsoft BizTalk Accelerator for HL7 v2.0. The tool takes the HL7 message definition from the database that HL7 publishes on their web site and generates schemas in a format that the BizTalk HL7 parser can understand. These schemas are used by the parser in the process of translating from the flat file format of HL7 v2.x to XML. The HL7 message definitions are stored in a Microsoft Access database and include definitions for all the approved versions (2.1, 2.2, 2.3, 2.3.1, 2.4 and 2.5). The HL7 message definition database will not ship with the Accelerator as it is part of the HL7 standard and has to be acquired separately from the HL7 standards organization. By customizing the database and the generated schema namespace, you will be able to create your own library of message definitions for your own integration purposes or for versions of HL7 that we do not include in the Accelerator for HL7. The Schema Generation Tool also comes with full source code. That way it can be adapted to generate the schemas from *any* repository or from tools such as the HL7 Messaging Workbench. The objective of the Schema Generation Tool is to make it easier to manage libraries of HL7 message definitions by working at the model level instead of dealing with schema customization. Every time you need to generate a custom message or segment, you can modify the repository (or a copy of it) and generate new schemas. Just to be clear, you need to have your own HL7 definition database. You can get the “vanilla” version from the HL7 web site. To get it, go to the HL7 Bookstore, scroll down to the section “Access Databases Versions of the HL7 Standards” and click on the “more info” button. The most interesting aspect of the tool is that it allows you to generate schemas from your own HL7 message definition. So, if you have a national HL7 v2 standard (most countries do) and you can put that definition in an easy to maintain database, then generating the BizTalk schemas for any particular HL7 dialect becomes much easier. Another interesting route to explore, and the reason why we’re including the source code, is to adapt the tool to generate the schemas directly from other tools or repositories such as the HL7 Messaging Workbench.
{"cc_dump":"CC-MAIN-2015-11","dolma2_qc":{"0":0.998411715,"1":0.0016083405},"exact_duplicates":7,"lang":{"en":0.8799423575},"madlad":{"num_sentences":17,"rule.2":[],"rule.5":[0,1],"status":"survived"},"minhash":null,"original_word_count":474,"sa_remove_ranges":[],"text_hash":"156327955012937669853445958012500509984","warc_content_type":"application\/http; msgtype=response","warc_date":"2015-03-07T00:35:24Z","warc_url":"http:\/\/blogs.msdn.com\/b\/rruggeri\/archive\/2008\/09\/19\/hl7-schema-generation-tool.aspx","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":null,"__label__education_and_jobs":0.0100235688,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.0341104269,"__label__home_and_hobbies":null,"__label__science_math_and_technology":0.0154345557,"__label__software":0.1225332171,"__label__software_development":0.8991314173,"__label__sports_and_fitness":null,"__label__electronics_and_hardare":0.0209742412,"__label__games":0.0024826226,"__label__health":0.0016584827,"__label__social_life":null,"__label__adult_content":null,"__label__history_and_geography":null,"__label__entertainment":null,"__label__literature":0.0062999022,"__label__industrial":null,"__label__transportation":0.0013770254,"__label__politics":null,"__label__religion":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
1b9753d4b9323e43b13082a759871211fb35cd17
function Corner(x, y) { this.p = new Point(x, y); this.x = this.p.x; this.y = this.p.y; var key = this.key(); if (Corner.lookup[key]) { return Corner.lookup[key]; } else { Corner.lookup[key] = this; } this.equals = function(c2) { return this.p.equals(c2.p); }; } Corner.prototype.key = function() { var key = [this.x, this.y].join(","); return key; }; Corner.lookup = {};
{"src_encoding":"UTF-8","language":"JavaScript","detected_licenses":[],"repo_name":"vishaalprasadsjsu\/catan","score":3.140625,"int_score":3,"license_type":"no_license","length_bytes":410,"path":"\/js\/geo\/corner.js","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '1b9753d4b9323e43b13082a759871211fb35cd17', 'language': 'JavaScript', 'repo_name': 'vishaalprasadsjsu\/catan', 'path': '\/js\/geo\/corner.js', 'src_encoding': 'UTF-8', 'length_bytes': 410, 'score': 3.140625, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}"}
null
null
null
27786623-eadd-46e9-9888-252f5cfe867d
Lawsuit Guide The Lawsuit Process A lawsuit is a legal action taken against a company, individual or a group of individuals. A lawsuit must be filed to seek enforcement on something the defendant did wrong, such as failing to comply with a contract, failing to pay for services, etc. A lawsuit begins with the plaintiff filing a complaint. The defendant(s) then files an answer. If the lawsuit continues, fact finding occurs through the Discovery process and motions may be filed. Eventually, the lawsuit may be dismissed once all information is acquired; a settlement may be reached through mediation; or a judgment asking either party to pay damages may be awarded by the judge or jury.
{"cc_dump":"CC-MAIN-2019-35","dolma2_qc":{"0":0.9965410829,"1":0.0034789755},"exact_duplicates":1,"lang":{"en":0.9724837542},"madlad":{"num_sentences":6,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":116,"sa_remove_ranges":[],"text_hash":"270226896489709916659935303180998424958","warc_content_type":"application\/http; msgtype=response","warc_date":"2019-08-24T02:44:31Z","warc_url":"https:\/\/www.northwestregisteredagent.com\/law-suit.html","weborganizer":{"__label__adult_content":0.00001,"__label__crime_and_law":1.0000100136,"__label__education_and_jobs":null,"__label__finance_and_business":0.314060539,"__label__history_and_geography":0.00001,"__label__industrial":0.00001,"__label__politics":0.00001,"__label__science_math_and_technology":0.00001,"__label__social_life":0.00001,"__label__software":null,"__label__entertainment":null,"__label__games":null,"__label__health":null,"__label__literature":null,"__label__travel_and_tourism":null,"__label__art_and_design":null,"__label__transportation":null,"__label__fashion_and_beauty":0.00001,"__label__software_development":null,"__label__sports_and_fitness":0.00001,"__label__electronics_and_hardare":null,"__label__home_and_hobbies":null,"__label__food_and_dining":null,"__label__religion":null},"weborganizer_max":"__label__crime_and_law"}
null
null
null
null
null
null
8315e399-c421-4332-a675-3480f2d8e8f0
Go Inside Microsoft’s Infinity Room and Stare Into the Abyss An immersive visualization of big data. Photo from the Infinity Room. As part of Microsoft’s 2014 SQL Server launch party last month in San Francisco, the company built a mirrored “infinity room” that attempted to visualize the vast scale of big data and immerse people in its enormity. The room used mirrors, pixel spheres, and a huge amount of LED lighting to create the appearance of an infinite chasm. As visitors moved through the space, narration and animations explained how big data can reveal the significance of seemingly minor elements, like the quarter’s relationship to U.S. economics. The one problem with the Infinity room was that it was only open for a limited time and only in San Francisco. But now Microsoft has released an immersive 360-degree view of it. And when you make it full screen, it’s pretty awesome. Big data can seem like a meaningless phrase that companies trot out to make their products and initiatives sound futuristic, but the Infinity Room actually has some success at conveying what the idea is really about.
{"cc_dump":"CC-MAIN-2019-47","dolma2_qc":{"0":0.9608000517,"1":0.0392199047},"exact_duplicates":1,"lang":{"en":0.9371374846},"madlad":{"num_sentences":10,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":187,"sa_remove_ranges":[],"text_hash":"171797621986241765719470936993730971075","warc_content_type":"application\/http; msgtype=response","warc_date":"2019-11-12T14:44:48Z","warc_url":"https:\/\/slate.com\/technology\/2014\/05\/microsoft-s-infinity-room-about-big-data-a-360-degree-interactive-version.html","weborganizer":{"__label__art_and_design":0.0716012046,"__label__electronics_and_hardare":0.0302245878,"__label__finance_and_business":0.0446908623,"__label__games":0.0091356365,"__label__health":null,"__label__science_math_and_technology":0.1968362182,"__label__software":0.0503406264,"__label__software_development":0.1259327531,"__label__sports_and_fitness":null,"__label__transportation":null,"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__industrial":null,"__label__social_life":null,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__literature":0.008587487,"__label__politics":null,"__label__entertainment":0.0362300538,"__label__travel_and_tourism":0.0033866118,"__label__religion":null,"__label__food_and_dining":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
c414578d-385b-490a-82c1-977afda9608c
The Ultimate Guide to Switch from Android to iPhone Effortlessly Master the switch from Android to iPhone effortlessly. Our guide unveils tips and insights for seamless contact, app transfer, and embracing the iOS ecosystem. by Clara Updated January 11, 2024 Share this: The decision to switch from Amdroid to iPhone is a transformative journey into a new realm of possibilities. This comprehensive guide is your roadmap, meticulously designed to ensure a smooth and seamless transition. From transferring your contacts and beloved apps to adapting to the iOS ecosystem, every aspect of the switch is demystified, empowering you to embrace the full potential of your new iPhone. Understanding the Background Embarking on the journey for transferring Samsung to iPhone is a significant leap in the tech world. This comprehensive guide unveils the intricacies of the transition, providing a step-by-step roadmap, tips, and insights to ensure a seamless switch. From transferring contacts and apps to adapting to the iOS ecosystem, every facet is explored to empower users in making the move with confidence. Unlock the potential of your new iPhone as we navigate through the nuances of switching platforms, making the transition not just smooth but truly transformative. Divergence in Ecosystems Switching from Samsung to iPhone involves navigating the nuances of distinct ecosystems. Amdroid, known for its customization, stands juxtaposed against the seamless integration and uniformity of Apple's iOS. Understanding this contrast is pivotal for a successful switch. Contacts Migration Strategies A critical aspect of the switch is the transfer of contacts. Learn various methods, including syncing with Google, using iCloud, or third-party apps, ensuring that your essential contacts seamlessly transition to your new iPhone. App Transfer Techniques Moving your favorite apps from Amdroid to iPhone requires strategic planning. Explore the App Store for iOS counterparts, utilize cross-platform apps, and discover methods like third-party transfer tools to retain your app ecosystem. Step-by-Step Switching Guide Prepare Your Amdroid Device Switching from Amdroid to iPhone begins with meticulous preparation, ensuring a seamless transition of your digital life. Start by initiating a comprehensive backup of your Amdroid device, safeguarding your contacts, cherished photos, and essential data. This preparatory step is akin to securing your memories, ensuring they seamlessly journey to your new iPhone. • Back up your Amdroid device, ensuring that contacts, photos, and essential data are securely stored. Set Up Your New iPhone Unwrapping your new iPhone signals the beginning of a transformative experience. The initial setup process is intuitive, guiding you through crucial configurations. Connect your iPhone to Wi-Fi and embark on a seamless journey by signing in with your Apple ID. This step establishes a digital thread, weaving your new device into the intricate fabric of the Apple ecosystem. • Power on your iPhone and follow the on-screen instructions to initiate the setup process. • Connect to Wi-Fi and sign in with your Apple ID, creating a seamless link between your new device and your Apple ecosystem. Transfer Contacts The heartbeat of your communication lies in your contacts, and ensuring a fluid transfer is paramount. For users ingrained in the Google ecosystem, enabling contact sync on your iPhone becomes a pivotal step. By adding your Google account to your iPhone, contacts effortlessly cascade onto your new device. • For Google Account Users: Enable contact sync on your iPhone by adding your Google account. Contacts will automatically populate. • iCloud Method: Utilize iCloud to transfer contacts by logging into your iCloud account on both devices and enabling contact syncing. Explore the App Store The App Store stands as a digital marketplace brimming with possibilities, a treasure trove awaiting your exploration. Familiarize yourself with this hub of innovation on your iPhone, where each tap unveils a world of applications tailored for iOS. The transition from Amdroid apps to their iOS counterparts is a bridge to a comprehensive app experience. • Familiarize yourself with the App Store on your iPhone. Search for iOS versions of your favorite apps and download them. • Explore alternatives for apps that may not have direct iOS equivalents, ensuring a comprehensive app experience. Adapt to iOS Features As you immerse yourself in the iOS environment, embracing exclusive features becomes a delightful exploration. iMessage, FaceTime, and AirDrop are not just tools; they are conduits for seamless communication and file sharing. By incorporating these features into your daily routine, you enhance your digital connectivity and redefine the way you interact with your iPhone. • Embrace iOS-exclusive features such as iMessage, FaceTime, and AirDrop for seamless communication and file sharing. • Customize your iPhone settings, wallpapers, and notification preferences to align with your preferences. Bonus Tip: Transfer Amdroid Data to iPhone Quickly If you want to transfer data from Amdroid to new iPhone, you can use FoneTool to help you. It is your ultimate companion in the art of device transition. Seamlessly transferring Amdroid data to iPhone is no longer a task; it's an experience. FoneTool transcends ordinary data transfer, infusing the process with simplicity and efficiency. From contacts to cherished memories, FoneTool ensures nothing is left behind. Its intuitive interface transforms the often daunting task into a joyous journey, making your switch not just smooth but truly memorable. Choose FoneTool, and let your device transition be a tale of ease, precision, and the beginning of a new digital chapter. Here are the steps: Download FoneTool and open FoneTool • Begin your seamless transition by downloading and installing FoneTool on both your Amdroid and iPhone devices. • Launch FoneTool on both devices simultaneously, creating a secure connection for swift data transfer. Select Data Types • Choose the types of data you want to transfer – contacts, photos, videos, and more – tailoring the process to your preferences. Initiate Transfer • With a simple tap, initiate the transfer process. Watch as FoneTool efficiently moves your selected data from Amdroid to iPhone. Verify and Enjoy • Thoroughly verify the transferred data on your iPhone. With FoneTool, your new device is now a personalized haven of memories and essential information. Embrace the seamless transition and revel in your new iPhone experience. Troubleshooting Common Issues App Compatibility Challenges If certain apps are not available on the App Store, consider exploring alternative apps that offer similar functionality. Check for updates on the App Store, as developers frequently release new versions. Media File Transfers Use cloud services like Google Drive or Dropbox to transfer photos and videos between devices. Manually transfer music and media files using iTunes or third-party apps designed for cross-platform transfers. Ecosystem Adjustment Period Understand that adjusting to the iOS ecosystem may take time. Familiarize yourself with iOS gestures, settings, and features gradually. Switching from Amdroid to iPhone is an exciting venture into a world of seamless integration and innovation. This ultimate guide equips you with the knowledge and steps needed for a hassle-free switch. Embrace the change, explore the vast capabilities of your new iPhone, and embark on a journey where every tap and swipe opens doors to a new realm of possibilities. Welcome to the Apple ecosystem – where sophistication meets simplicit
{"cc_dump":"CC-MAIN-2024-26","dolma2_qc":{"0":0.0004400436,"1":0.9995799661},"exact_duplicates":1,"lang":{"en":0.8625659943},"madlad":{"num_sentences":72,"rule.2":[69],"rule.5":[36,50,69],"status":"survived"},"minhash":null,"original_word_count":1247,"sa_remove_ranges":[[7810,8390]],"text_hash":"309820522769077595664457109438765285694","warc_content_type":"text\/html","warc_date":"2024-06-14T01:25:27.000Z","warc_url":"https:\/\/www.fonetool.com\/phone-transfer\/switching-from-android-to-iphone-9270-ac.html","weborganizer":{"__label__education_and_jobs":0.0026416746,"__label__entertainment":null,"__label__finance_and_business":0.0149670839,"__label__food_and_dining":null,"__label__industrial":null,"__label__literature":null,"__label__politics":null,"__label__software":0.7490972281,"__label__software_development":0.010662511,"__label__transportation":null,"__label__crime_and_law":null,"__label__health":0.0021927168,"__label__home_and_hobbies":null,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__travel_and_tourism":0.0040801377,"__label__adult_content":null,"__label__electronics_and_hardare":0.0780881643,"__label__games":0.001042231,"__label__science_math_and_technology":0.0341104269,"__label__fashion_and_beauty":null,"__label__art_and_design":0.0019367349,"__label__history_and_geography":null,"__label__religion":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
d12e4699-efef-46e7-9b31-67035bed0cc3
2,846 Pages KH1 icon.pngCOM image.pngREC icon.pngKH2 icon.png358 icon.pngBBS icon.pngKHC icon.pngKHREC icon.pngKH3D icon.pngBBS0.2 icon.pngKHIII icon.pngRe-mind Icon.pngDR Icon.pngMOM icon.png Destiny Islands, named Destiny Island in Kingdom Hearts II, is a world from the Kingdom Hearts series. It is the home world of Sora, Riku, Master Xehanort, and Kairi (although Kairi is originally from Radiant Garden), three of the series's main characters. The world seems to be led by an unnamed mayor, who is mentioned as Kairi's foster parent. Destiny Islands appears as a playable world only in Kingdom Hearts during the prologue and also in Kingdom Hearts 0.2 Birth by Sleep -A fragmentary passage-. However, the remains of the world reappear at the End of the World. A memory-based version of the world appears in Kingdom Hearts: Chain of Memories and Kingdom Hearts Re:Chain of Memories. In Kingdom Hearts II, Kingdom Hearts II Final Mix, Kingdom Hearts 358/2 Days, Kingdom Hearts Birth by Sleep, Kingdom Hearts Birth by Sleep Final Mix, Kingdom Hearts 3D: Dream Drop Distance, Kingdom Hearts III, the world is not playable and only appears in cutscenes. In Kingdom Hearts coded and Kingdom Hearts Re:coded, a data version of the world appears as the second playable world. The main function of this world in the original Kingdom Hearts is to serve as an extended tutorial where one could get the hang of battle mechanics against opponents without being incapacitated, gain experience, and receive items for future battles. The main island is where the residents live and go to school; Kairi and Selphie are known to go to the same school. The main island also has a small beach and dock. There appears to be a fairly large town in the background, with a long clay path leading to the beach. Sora's House can briefly be seen before Sora encounters the Sora can also have duels with Wakka, Selphie and Tidus nearby in the first game. Sora and Riku often practice their sword fights at the place where the friends can watch the sunset—Kingdom Hearts Dark Road Kingdom Hearts Birth by Sleep Ventus and Sora's hearts merging together. At the beginning of Kingdom Hearts Birth by Sleep, a young Xehanort stares at the sunset and states that the world is too small. Many years later, he returns as an elderly Keyblade Master, intending to leave his seemingly dying, comatose apprentice, Ventus, at the islands for his final days. However, when Ventus's broken heart connects with that of the newborn Sora, he is revived, and summons his Keyblade. Seeing further use in the boy, Master Xehanort immediately takes him to Master Eraqus at the Land of Departure. Sora and Riku as children. Four years later, the islands are visited by four more Keyblade wielders, Terra being the first. There, he watches a young Sora and Riku racing and sitting at the Paopu Tree. After asking Riku why he wants to leave the islands, Riku explains that a man—Master Xehanort—once left the islands to visit other worlds, and that he wants to do the same. Terra sees a vision of Master Xehanort as a young man, then sees what Riku will become, which convinces him to choose Riku as his successor, so, that one day, he may wield the Keyblade. Aqua later arrives on the island. After recognizing that the friendship between Sora and Riku is identical to the bond between Ventus and Terra, she decides to choose Sora as her successor, but when she discovers that Terra has already chosen Riku, she changes her mind because she does not want the boys to walk down the same path as she and her friends. Instead, she asks Sora to save Riku if he were to ever fall into darkness. Ventus is the last to appear on the island, where he encounters Vanitas, and experiences a flashback that reveals the truth about his past, but never encounters Sora or Riku. On a night after Master Xehanort and Vanitas are defeated, and their plans seemingly thwarted, Sora and Riku watch the stars on a beach facing the Small Island. As they prepare to depart home, Sora suddenly feels Ventus' sadness touching his heart. Riku advises him to try and reach out to that sad heart, and as Sora connects to Ventus's heart he enters his first Dive to the Heart. He joins his heart with Ventus's, hoping to make it happy again, then tells Riku that he was right, as they go back to watching the stars. Kingdom Hearts 0.2 Birth by Sleep -A fragmentary passage- "The door of darkness...tied by two keys. The door of darkness...to seal the light." Mickey to Aqua Destiny Islands appears within the Realm of Darkness in Kingdom Hearts 0.2 Birth by Sleep -A fragmentary passage- when Aqua and Mickey stumble upon it after leaving the Depths of Darkness. Upon arrival, Aqua walks onto the beach and stares out to sea, musing that she knows the place. Mickey latches on to this comment, and presses for an explanation of Aqua's past visit to the island. She explains that in her previous visit, she had considered passing the Keyblade on to either of two young boys whom she had met, but had stopped short because Terra had already passed his on to one of them. Mickey asks what the names of the two boys had been, and Aqua responds that they were Sora and Riku. Mickey is amazed, and explains that it is these two that he is working with to save many worlds in the Realm of Light and also to close the Door to Darkness. He further adds that in order to achieve this feat, he requires the Kingdom Key D, the Realm of Darkness' version of the Kingdom Key. Eager, the two begin to search the remnants of the world, and advance towards the Secret Place. However, as they approach, a Demon Tide rushes out and the pair are forced to fight it in order to proceed. Eventually, the duo defeat the Heartless hoard and progress into the dark hideout. Inside, they find a wooden door and entering it, they find a shining Keyblade floating in the centre of a dark space. Mickey explains the purpose of the Keyblade, before taking it in his hands. He further adds that in order to prevent darkness from continuing to spread through the open door, it needs to be closed on both sides. Aqua volunteers to be the one to close the door, but Mickey states that that particular job is already taken. The two are then spontaneously transported out of the area in a flash of light, leaving the remnant of the world behind. A short time later, Aqua is separated from Mickey and re-enters the world via the same door in the Secret Place in the company of a second Demon Tide. She is reinvigorated by her meeting with Mickey and also with Terra earlier in the story, and gains an inner strength to continue fighting for the greater good inside the Realm of Darkness. She asserts that when someone else comes to the dark realm, she will be there waiting. After her fight with the second Demon Tide concludes, Aqua lies on the beach staring upwards as the clouds move rapidly across the sky. The sky changes to night and light particles begin to fall from the sky. Aqua realises that the fallen worlds have been restored and is swept into the darkness as Destiny Islands returns to the Realm of Light. As she falls, she reaffirms that the heart should be the guiding key, and also that "they" will know where to find her. Kingdom Hearts Bird's-Eye view of Destiny Islands. In a prophetic dream, Sora is swallowed by the tide while trying to save Riku, and is transported to another world. When Sora awakens from his Dive to the Heart, he meets with his friends Kairi and Riku. The three plan on building a raft and to set sail across the sea to find other worlds away from the island. Destiny Islands is a small world, which often leads to the boredom of its inhabitants, especially Riku, who desires to leave the islands and see the other worlds out there. Tidus once said that once you sail a certain distance from the islands, you simply can't go any further, but the other islanders believe he merely turned back and made up the story. While gathering materials for the journey, Sora climbs into the Secret Place - a tiny cave on the island where the children scratch drawings onto rocks - and met a figure in a strange cloak who told him cryptic messages about the time to come. Sora's confusion lasts long into the night. Resting up in his bedroom, he sees a dangerous storm approaching, and hurries off the island to save the raft. Upon arriving on the second island, Sora discovers his friends came too, but only finds Riku, who confuses him further by telling him to accept the darkness, after which, Riku disappears. He then finds an apparently ill Kairi in the Secret Place. The two disappear in the growing darkness, but Sora returns as the Islands slowly crumble into darkness with the Keyblade in hand. He fights the Darkside boss, but fails to save his home and is whisked away on his journey to Traverse Town. As his first journey ends, Sora and Kairi meet up on the shores of the reforming islands. Sora, knowing that his job is not finished, and that he must still save Riku and King Mickey from the Realm of Darkness, leaves Kairi in the safety of her hometown and promises to return to her as soon as Riku and King Mickey are found. During the credits, Tidus, Selphie, and Wakka are seen running on the beach in a similar way to Riku, Sora and Kairi at the beginning of the game. Kairi is standing on the beach, looking toward the ocean. Kingdom Hearts: Chain of Memories After the Riku Replica is defeated on the 11th floor of Castle Oblivion, Sora drops his Wayfinder charm, which is revealed to be the World Card for Destiny Islands. Sora rushes to use it in order to get to Naminé, but when Goofy and Donald urge him to be cautious, he angrily rebukes them, and goes through the memory world alone. Naminé manipulates his memories to make Sora believe she also lived on the Destiny Islands, and Sora is urged by his memories to rescue her. However, after he defeats a memory Darkside, Naminé appears and reveals the truth about Kairi, herself, and what she has been doing to Sora. After Riku defeats Lexaeus, Zexion appears with a world card and entices Riku to enter his own version of Destiny Islands. Unlike Sora, Riku finds no one on the islands, except a memory of his Darkside, the one who devoured the islands. After defeating the monster, he sees "Sora", who is actually Zexion in disguise. "Sora" accuses him of being a monster of darkness, and attacks him with light. In the light, Riku considers giving up, but Naminé (disguised as Kairi) speaks to his heart and urges him to use both his light and his darkness, which are invincible together. Riku sees through Zexion's disguise and attacks, forcing Zexion to flee. Kingdom Hearts 358/2 Days The world itself has barely any appearances in the game, but is mentioned roughly the same amount of times by Roxas and Xion. When Roxas fell into a coma for 21 days, Xion had been to this world on day 1 of it, where she picked up a seashell to put on Roxas's pillow. When Xion falls into a coma, Roxas does the exact same thing; he picks up seashells for her at "the beach". After Xion fled the Organization, she went to the memory version of Destiny Island, where she fell into a terrible nightmare of being Roxas, searching for her; the dream saw her observing Zexion scolding Riku in Kingdom Hearts: Chain of Memories. As they talked, she changed back from Roxas until falling over in pain from feeling the memories and turned into Riku. When they finished talking, she had changed into Sora. Riku had also returned home a few times, but this time, he was watching over Xion as she dreamt; Roxas had also been to the island, but as it is Sora's home, he felt like he was having a dream instead of actually being on a mission. Roxas, Xion, and Axel on Destiny Islands. Xion had a dream of sitting on the Paopu tree with Axel and Roxas, wondering what she should do after finding out what she truly is. She awakens and learns from Riku that she is a puppet that accidentally trapped Sora's memories of Kairi within herself, making him unable to wake up. Kingdom Hearts II Kairi watching the sunset. During Sora's sleep, the residents of the Islands forget all about Sora, due to Naminé breaking the chains of his memories. Kairi, however, being so close to Sora, still retains vague memories of the boy, and begins to remember before anyone else. She sends a message in a bottle across the sea, hoping to find Sora. In an attempt to draw Sora, and with him, Roxas, back to Organization XIII, Axel goes to the Islands to kidnap Kairi. She refuses to go with him, and flees with Pluto into a portal to Twilight Town. Finally, after Xemnas is defeated, all the characters meet up on the Islands for one last time. Mickey, Jiminy, Donald, Pluto, and Goofy return to Disney Castle, and leave the others on Destiny Islands. But, in an extra video after the credits, it is seen that Mickey has sent a letter in bottle back to the islands for Sora, Riku, and Kairi. Kingdom Hearts coded After King Mickey and Jiminy discover a message in Jiminy's Journal, they create a data version of Sora. After Data-Sora exits his Awakening, he finds out that the island is covered with Bug Blox Corruption which Data-Sora must delete. Afterwards, he encounters Jiminy's Journal wearing the Black Cloak. He then finds the Data Keyhole behind the waterfall of Destiny Islands. After he opens it he fights Darkside, the island's source of Bug Block corruption. Then the data island is destroyed, just as it was in the first game. The scene then shifts to Disney Castle where a cutscene is played. It shows Ansem, Seeker of Darkness appearing and opening the Corridor of Darkness for Riku to step in. The real Destiny Islands appear in the game's epilogue, where Mickey sends Sora the bottled letter (the same one from Kingdom Hearts II), which Sora reads with Riku and Kairi. Blank Points Sora in Blank Points. While Sora is leaning on the bent palm tree, Riku approaches him and asks him if he had decided, about what is unclear. Sora replies to Riku that he had. When Kairi approaches the two, Sora tells her that he has another long journey to make, one that might be even more difficult than all of the others they have had. Kairi then gives Sora her Wayfinder charm and says, "See you soon". Kingdom Hearts 3D: Dream Drop Distance You were not the visitor...I expected. Ansem the Wise to Riku. Destiny Islands is the starting point of the game, where the Mark of Mastery exam begins for Sora and Riku. While taking off with their raft, a storm comes and Ursula appears in front of them, calling for a battle of vengeance. The boys defeat her together, and the storm throws them all overboard. While down under, a Keyhole appears and their Keyblades unlock it, and are then taken to other worlds. Near the end of the game, the island appears again in Sora's dream. Young Xehanort narrates as Sora watches a flashback of Young Xehanort being visited by his future self, and explains that Xehanort had cast away his bodily form to set his youthful self on his appointed path. Later on, when Riku dives into the deepest reaches of Sora's heart to rescue him from his slumber, he is confronted by Roxas, Ventus and Xion, who ask him questions; these are the final key to waking Sora from sleep. Riku though, is not aware of this, and soon finds a bottle floating in the water which he picks up. Ansem the Wise approaches from behind, stating that Riku was not the visitor that he had been expecting. Riku expresses curiosity regarding Ansem's presence in Sora's heart. Ansem the Wise explains that he wished to atone for the mistakes of the past, and so he had digitized himself and his research and hid them within Sora. He states that the data may act as a clue to help find themselves or their lost friends in their hour of need. Ansem talks about the malleable nature of the heart, and relates the tendency of the heart to grow quickly to the nobodies of Organization XIII, giving Riku a clue that the Organization's members may have had hearts of their own. He also discusses Sora's ability to return to his human form without destroying his Nobody, and the bonds that Sora has with his friends. Ansem suggests that perhaps Sora has the power to recreate people that had been thought to be lost forever, and to mend connections that had been broken; this is due to the uncorrupted and caring nature of Sora's heart. For this to be achieved, Ansem states that Sora needs only to follow where his heart leads him, and the rest of the information needed is in the data. Riku thanks Ansem, before being questioned by the older man as to why he is on the islands. Riku explains that he needs to wake Sora up; Ansem finds this amusing, and then explains that by defeating the Nightmare imprisoning him and by answering the questions posed to him by Roxas, Ventus and Xion, Sora had been awakened. Riku prepares to leave, but before he does so, Ansem surprises him by inquiring after his real name. Riku realizes that he had never told DiZ his name, and quickly responds with it, before leaving the islands. Kingdom Hearts 0.2 Birth By Sleep -A Fragmentary Passage- While traversing the Realm of Darkness, Aqua and Mickey stumble upon the remains of Destiny Islands as they had appeared at the End of the World. Aqua recognizes the islands as the location where she met Sora and Riku, and whereupon Terra bestowed the power of the Keyblade to one of them. Mickey deduces that this means that they are close to the location of the dark realm's Keyblade, and thus proceed to the Secret Place. When they approach, however, the Demon Tide returns and attacks, forcing Aqua and Mickey to battle. After seemingly vanquishing it, Aqua and Mickey approach the door in the Secret Place and open it. Within the door lies the Kingdom Key D, which Mickey subsequently claims as his own. During an attempt to protect Riku and Mickey from the Demon Tide, Aqua is thrown through a door to the islands' remains, which subsequently seals behind her. Finding her resolve, Aqua continues the fight on Destiny Islands while Mickey and Sora seal Kingdom Hearts. In the ending, Aqua is seen lying on the shore and staring up into the blue sky, which subsequently turns into nightfall. As she gazes into the stars, droplets of light begin raining down, indicating that Kingdom Hearts has been sealed and that Destiny Islands is being restored. Aqua, unable to leave the Realm of Darkness, falls off the disintegrating shore and drifts into the darkness. Kingdom Hearts III Sora, Donald, and Goofy visit here where they discovers Master Eraqus's Keyblade and uses it to enter the dark realm, where he exorcises the darkness from Aqua and returns her to the realm of light. Later, Sora's friends gather at the Destiny Islands for a celebration, where Kairi stays beside Sora before he fades away. Treasure list Kingdom Hearts Type Items found Locations Notes Special Protect Chain Cove In small alcove near the tower. Use box to reach it. • Inside the Secret Place in Kingdom Hearts, there are sketches of Donald, Goofy, and a crossed out chocobo on the right side. On the left there are sketches of a dragon, Disney Castle, and a world that has a crown on the top on one of the lower rocks. Even the four suits of cards and what seem to be Bit Snipers can be seen. • The orientation between the Main Island and the Small Island is somewhat ambiguous. Although both Kingdom Hearts and Kingdom Hearts 358/2 Days depicts the Small Island's miniature islet (accessible from the Small Island by bridge) as facing the open ocean and the setting sun, the scene in which Kairi stands on the beach of the Main Island in Kingdom Hearts II depicts the Small Island in the opposite position, with the miniature islet facing the Main Island and the Cove facing the setting sun. However, if this was its correct orientation, the Main Island would have been visible from the islet's Paopu tree, and previous games show the view from the mentioned tree as simply endless ocean and an unobstructed view of the setting sun. • There are several Hidden Mickey insignias in the Kingdom Hearts version of Destiny Islands. Easy-to-spot insignias include one on the ground in the Cove, and a patch of purple in the trees. • If you rearrange the letters of "Destiny Island" you get "It's Disney Land". • Both words of "Destiny Islands" are seven letters long which is the number of Princess of Heart. Kairi, a later residence of the islands, is one of the Princesses. • In Sora's room there is a model of the airship from Final Fantasy hanging from the ceiling with two dolls in it. • Although this world was addressed as Destiny Islands, it was mostly referred to "island" or "islands" by the characters, until Yen Sid addressed its name in Kingdom Hearts 3D: Dream Drop Distance. Community content is available under CC-BY-SA unless otherwise noted.
{"cc_dump":"CC-MAIN-2021-04","dolma2_qc":{"0":0.9736989737,"1":0.0263209864},"exact_duplicates":0,"lang":{"en":0.9664476514},"madlad":{"num_sentences":184,"rule.2":[6,32,117,133,168],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":4016,"sa_remove_ranges":[[1856,2655],[2840,3818]],"text_hash":"313270512830911696618940184869225405408","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-01-20T09:59:46Z","warc_url":"https:\/\/kingdomhearts.fandom.com\/wiki\/Destiny_Islands","weborganizer":{"__label__adult_content":0.0042087957,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__finance_and_business":null,"__label__games":0.939923346,"__label__history_and_geography":0.0103381518,"__label__science_math_and_technology":0.0044783838,"__label__social_life":null,"__label__software":null,"__label__software_development":null,"__label__art_and_design":0.005394937,"__label__entertainment":0.0716012046,"__label__home_and_hobbies":0.0044783838,"__label__literature":0.2628518641,"__label__politics":null,"__label__electronics_and_hardare":null,"__label__sports_and_fitness":null,"__label__fashion_and_beauty":null,"__label__industrial":null,"__label__religion":0.0100235688,"__label__transportation":null,"__label__travel_and_tourism":0.0179962143,"__label__food_and_dining":null,"__label__health":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
bffb068b-6a31-4276-b54e-bd3395c52742
The Euro-Dollar Rate: Critical Break-Down Point Confirmed
{"cc_dump":"CC-MAIN-2024-46","dolma2_qc":{"0":0.9943417311,"1":0.0056782318},"exact_duplicates":0,"lang":{"en":0.9627543092},"madlad":{"num_sentences":37,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":858,"sa_remove_ranges":[[57,4958]],"text_hash":"254585631288579013398002426035352458589","warc_content_type":"text\/html","warc_date":"2024-11-04T19:45:28.000Z","warc_url":"https:\/\/www.poundsterlinglive.com\/eurusd\/5905-the-euro-to-dollar-pair-at-important-support-level-break-lower-forecast","weborganizer":{"__label__adult_content":0.00001,"__label__art_and_design":null,"__label__entertainment":0.0396488421,"__label__finance_and_business":0.0011087309,"__label__games":null,"__label__history_and_geography":0.00001,"__label__home_and_hobbies":null,"__label__literature":null,"__label__politics":0.00001,"__label__social_life":0.00001,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__health":null,"__label__science_math_and_technology":0.00001,"__label__software":null,"__label__software_development":null,"__label__religion":null,"__label__fashion_and_beauty":0.00001,"__label__industrial":0.00001,"__label__sports_and_fitness":0.00001,"__label__crime_and_law":null,"__label__food_and_dining":null,"__label__transportation":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__entertainment"}
null
null
null
null
null
null
24eb04c7-037c-4389-8192-8f32bcd97ab6
英语 'photosynthesis' 的定义 查看相关内容 单词列表:"terms used in biology" 单词列表:"terms used in biology" 翻译器 翻译器 法国的定义 "photosynthesis" 法国的定义 "photosynthesis" 科林斯的新消息! 科林斯的新消息! 轻松学习英语语法 轻松学习英语语法 Video: pronunciation of 'photosynthesis' 含 photosynthesis的例句 这些示例已被自动选择并可能包含敏感内容。 阅读更多… Leaves use up nutrients in the process of photosynthesis. Christianity Today (2000)The process is called photosynthesis. Holford, Patrick The Family Nutrition Workbook (1988)In England they're working on a sort of artificial photosynthesis. Fisher, David E. Fire and Ice - the Greenhouse Effect, Ozone Depletion, and Nuclear Winter (1990)In the world of photosynthesis, the energy in the sunlight is not used to heat things up, but to drive a series of chemical reactions. Oliver Morton Eating the Sun: How Plants Power the Planet (2007) photosynthesis 的趋势 偶尔使用。在柯林斯辞典中, photosynthesis 是3万个最常用词之一。 查看使用情况 学习资源 photosynthesi
{"cc_dump":"CC-MAIN-2019-30","dolma2_qc":{"0":0.9979939461,"1":0.0020260122},"exact_duplicates":0,"lang":{"en":0.7647693157},"madlad":{"num_sentences":23,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":{"cc_id":9876579294058.0,"cc_idx":1.0,"cc_size":6.0},"original_word_count":561,"sa_remove_ranges":[[1173,3072]],"text_hash":"210900746811709653356646899951222622640","warc_content_type":"application\/http; msgtype=response","warc_date":"2019-07-17T00:54:54Z","warc_url":"https:\/\/www.collinsdictionary.com\/zh\/dictionary\/english\/photosynthesis","weborganizer":{"__label__adult_content":0.00001,"__label__electronics_and_hardare":0.0140736289,"__label__fashion_and_beauty":null,"__label__finance_and_business":null,"__label__health":null,"__label__history_and_geography":0.0043415031,"__label__industrial":null,"__label__politics":null,"__label__science_math_and_technology":0.999383688,"__label__social_life":0.00001,"__label__crime_and_law":null,"__label__entertainment":0.0780881643,"__label__games":null,"__label__art_and_design":0.0100235688,"__label__education_and_jobs":0.0024826226,"__label__sports_and_fitness":0.00001,"__label__literature":null,"__label__travel_and_tourism":null,"__label__software":0.0113417543,"__label__software_development":null,"__label__transportation":null,"__label__food_and_dining":null,"__label__religion":null,"__label__home_and_hobbies":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
9b218b26-7389-419d-82c5-8590e44b2812
6 Butter Chicken Places In Delhi That Will Deliver At Your Doorstep by Suchismita Pal Butter chicken- simply the utterance of this creamy dish can get our hunger pangs high. Butter chicken or murgh makhani was first prepared in 1947 by Delhi’s Moti Mahal restaurant. No wonder, the city makes some of the choicest butter chicken dishes. If you too are a fan of this heavenly dish, then you can get it now at your doorstep from one of these five places in Delhi. 1.Yours Truly- Butter Chicken, Saket & Greater Kailash 1 South Delhi folks, here’s a delivery restaurant that will get your butter chicken cravings sorted in the perfect way. Yours Truly-Butter Chicken has two outlets in the city, one in Greater Kailash-1 and another in Saket. It serves different varieties of butter chicken like Regular Butter Chicken, Meat Butter Chicken, Breakup Wala Butter Chicken, Smoky Butter Chicken, Pandara Road Wala Butter Chicken, Diet Wala Butter Chicken and more. One can also order butter chicken combos from here like Butter Chicken with Butter Nun. Price of butter chicken out here starts at ₹303. Timings | 11 AM to 3 AM 2. Bhookemon, Lado Sarai & Greater Kailash 1 Bhookemon is already a popular name among Delhiites who love chicken. Its outlets at Lado Sarai and Greater Kailash-1 are now delivering finger-licking chicken preparations like Spicy Chicken Curry, Chicken Peri Peri With Sauteed Vegatables and of course, delicious Butter Chicken. The Delhi special butter chicken dish, loaded with juicy chicken chunks costs ₹235 at Bhookeman. Timings | 11 AM to 4 AM 3. Kukud Ku, Prashant Vihar Kukud Ku in Prasant Vihar serves absolutely scrumptious butter chicken at an affordable price of ₹190. Other noteworthy dishes from this restaurant are Chicken Seekh Roll, Chicken Rara and Chicken Manchurian. Also, the place serves 15 kinds of Indian bread like Onion Paratha, Red Mirchi Paratha and Missi Roti, that can aptly go with the butter chicken dish. Timings | 12 Noon to 2 AM Also Read: Delhiites! Elma’s Bakery &#038; Kitchen Is Now Delivering Fudge Brownies And Pancakes To Your Home 4. Curry And Koyla Company, Dwarka Though a bit heavy on the pocket, the butter chicken from Curry and Koyla Company, Dwarka is one of the top-rated dishes, thanks to its delectable taste and tempting aroma. The smooth makhani curry, cooked in Punjabi style costs ₹399 at this restaurant. One should also try the boneless Tawa Chicken and Mutton Nihari from here. Timings | 12 Noon to 11:30 PM 5. Sandoz, Connaught Place Sandoz makes two types of butter chicken- Special Butter Chicken and Mughlai Butter Chicken. The costs of these dishes are ₹290 and ₹360 respectively. Other unique dishes from the kitchen of Sandoz include Chicken Saagwala, Chicken Methi Malai and Chicken Shahi Korma. Timings | 11 AM to 10 PM Also Read: Order Gulab-Jamun Pastry From This Delhi Eatery To Satiate Your Lockdown Cravings 6. Railway Yard, Gujranwala Town Want to try your taste buds on authentic Kulhad Butter Chicken? Railway Ward will be your saviour. The luscious butter chicken along with the smell of traditional kulhad will win your heart for sure. It comes at ₹540. The restaurant serves regular butter chicken too which comes at ₹288. Also, there are amazing butter chicken combos, like half butter chicken, four butter nun and two pieces of hot gulab jamun at ₹569. Timings | 12 Noon to 4 AM You can place your orders easily from Zomato or Swiggy. These restaurants are strictly adhering to the standardized protocols underlined by WHO, right from the preparation of food to its delivery. Having said that, you too need to follow some steps to ensure hygiene if you are ordering food from outside now. Here are 6 ways to ensure the utmost safety while ordering food:
{"cc_dump":"CC-MAIN-2024-26","dolma2_qc":{"0":0.9990866184,"1":0.0009333864},"exact_duplicates":0,"lang":{"en":0.8811874986},"madlad":{"num_sentences":37,"rule.2":[6,15,18,23,25,26,27],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":634,"sa_remove_ranges":[],"text_hash":"89491808996000965169419572872269481962","warc_content_type":"text\/html","warc_date":"2024-06-21T16:05:00.000Z","warc_url":"https:\/\/curlytales.com\/butter-chicken-places-in-delhi-that-will-deliver-at-your-doorstep\/","weborganizer":{"__label__adult_content":0.0007196704,"__label__entertainment":0.0124416519,"__label__finance_and_business":null,"__label__food_and_dining":0.9988405108,"__label__health":null,"__label__history_and_geography":0.00001,"__label__home_and_hobbies":0.012831213,"__label__literature":null,"__label__science_math_and_technology":null,"__label__social_life":0.0017107223,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__industrial":0.0005803158,"__label__politics":0.0016078452,"__label__art_and_design":null,"__label__electronics_and_hardare":null,"__label__fashion_and_beauty":0.0018775659,"__label__games":null,"__label__religion":null,"__label__travel_and_tourism":0.0062999022,"__label__software":null,"__label__software_development":null,"__label__sports_and_fitness":null,"__label__transportation":null},"weborganizer_max":"__label__food_and_dining"}
null
null
null
null
null
null
75c451fe-da0c-41bf-b40d-893b9ca52cf9
519 672 2121 519 672 2121 Close mobile menu A civil action is typically commenced when parties are unable to resolve their disputes without the intervention of a third party.  Similarly, parties may, by agreement, decide to submit their disputes to arbitration.  In either case, a third party adjudicator is given the task of determining the fair result of your dispute.  Sometimes arbitration provides a more cost effective and expedient route to resolution. However, the fees of an arbitrator typically exceed court fees (as judges to not charge the parties’ fee for their time).  Many parties will prefer arbitration for its privacy and it provides the parties an opportunity to have more control over the process and scheduling. Regardless of whether your dispute is in the form of arbitration or a traditional court proceeding, we would be more than pleased to assist you in advancing your claim or defence
{"cc_dump":"CC-MAIN-2019-18","dolma2_qc":{"0":0.99835217,"1":0.0016678622},"exact_duplicates":0,"lang":{"en":0.9756745696},"madlad":{"num_sentences":31,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":518,"sa_remove_ranges":[[918,3007]],"text_hash":"250039658023211234974016417829525027398","warc_content_type":"application\/http; msgtype=response","warc_date":"2019-04-24T03:55:15Z","warc_url":"https:\/\/www.siskinds.com\/corporate-lawyers\/franchise\/franchise-litigation\/arbitration-litigation\/","weborganizer":{"__label__adult_content":0.009422591,"__label__crime_and_law":0.7186043859,"__label__education_and_jobs":null,"__label__finance_and_business":0.0503406264,"__label__health":null,"__label__history_and_geography":null,"__label__politics":0.0046195714,"__label__science_math_and_technology":null,"__label__social_life":null,"__label__software":0.0008930459,"__label__fashion_and_beauty":0.0013350223,"__label__industrial":0.0014203583,"__label__electronics_and_hardare":null,"__label__religion":null,"__label__software_development":null,"__label__sports_and_fitness":0.0046195714,"__label__entertainment":0.0017646141,"__label__literature":null,"__label__travel_and_tourism":null,"__label__food_and_dining":null,"__label__games":null,"__label__home_and_hobbies":0.0011435691,"__label__art_and_design":null,"__label__transportation":null},"weborganizer_max":"__label__crime_and_law"}
null
null
null
null
null
null
f00bab2c-c0dc-4f0e-ab11-f9710ac5d25d
# Radioactive Decay: Concepts and Mathematics This tutorial provides 2 CEUs and is ideal for: 1. Nuclear Medicine and Radiology Technologists. The VOICE program of the Society of Nuclear Medicine and Molecular Imaging (SNMMI) has reviewed this program and approved it for a maximum of 81 continuing education hours. Because these tutorials have been approved by the VOICE Program, they are accepted for CE credit in all 50 states and by ARRT and NMTCB, even if you are not a VOICE/SNMMI member. 2. Physicians requiring CME Credits to maintain IAC Accreditation. All or a portion of this educational activity may meet the CME requirement for IAC Nuclear/PET Accreditation. Our website is listed on the resources page of the IAC website. Proceed to the Tutorial: Radioactive Decay Tutorial Proceed to the Quiz: Radioactive Decay Quiz Purchase Tutorial: Payment link (Credit Cards/Paypal)RADIOACTIVE DECAY:  2 CEU This tutorial gives an overview on Interaction of Ionizing Radiation With Matter Objectives for Tutorial on Concepts and Mathematics of Radioactive Decay Topics to be Covered: 1. Definition of radioactive decay, the exponential law that it follows, and a definition of half-life. 2. Graphic representation of radioactive decay as a function of time, both prospectively and retrospectively 3. The classic mathematical formula for radioactive decay and a more modern formula with its increased simplicity. 4. Mathematical problem solving 5. Bi-exponential decay and graphical analysis After completion of this tutorial, one should be able to: 1. Define radioactive decay and half-life. 1. Explain what happens to activity of a source going prospectively and retrospectively in time, that is, half-lives from now and half-lives in the past 1. Using graphical analysis, determine half-life from a semi-logarithmic plot of activity vs time. 1. State mathematical relationship between l (the decay constant) and the half-life and compare to the mathematical relationship between m (the linear absorption coefficient) and the half-value layer. 1. Write the equations for calculations involving activity decrease as a function of the number of half-lives 1. Work a variety of math problems involving change of beam intensity with change of number of HVLs or TVLs.
{"char_count":2276,"warc_record_length":21520,"snapshot_type":"latest","score":3.40625,"fetch_time":1.679465637e+18,"int_score":3.0,"warc_record_offset":499334997,"crawl":"CC-MAIN-2023-14","language_score":0.851315558,"language":"en","warc_filename":"crawl-data\/CC-MAIN-2023-14\/segments\/1679296943750.71\/warc\/CC-MAIN-20230322051607-20230322081607-00456.warc.gz","token_count":485,"content_mime_type":"text\/html","original_metadata":{"\/images\/math\/codecogs":0,"align":0,"codecogs_latex":0,"equation":0,"found_math":false,"img_math":0,"katex":0,"math-container":0,"math_alttext":0,"math_annotations":0,"mathjax_asciimath":0,"mathjax_display_tex":0,"mathjax_inline_tex":0,"mathjax_tag":0,"mathml":0,"mathtex.cgi":0,"mimetex.cgi":0,"script_math_asciimath":0,"script_math_tex":0,"texerror":0,"wp-katex-eq":0,"wp_latex":0,"x-ck12":0}}
nucmedtutorials.com
null
null
null
null
null
c8be84e44d68c0185ccfcec58d34f4cf0067495d
import os, glob from shutil import copyfile # in ra ten các file dạng tif trong folder def create_list_id(path): list_id = [] os.chdir(path) for file in glob.glob("*.tif"): list_id.append(file) # print(file) # files = os.listdir(path) # print(file[:-4]) # tao nhieu folder# o day nhieu folder nen name_folders = [folder1, folder2, ...] def make_multiple_folder(root_path, name_folders): os.chdir(root_path) for folder in name_folders: if os.path.isdir(folder): # print(folder) continue else: os.makedirs(folder) # di chuyển file sang thư mục theo định dạng file def move_file_and_rename(path_source, name_folders, str_move): os.chdir(path_source) # tạo folder de chuyen cai da make_multiple_folder (path_source, name_folders) #bat dau di chuyen file va sua ten no theo dinh dang cua coco for f in glob.glob("*.tif"): # print(file) if str_move in f: new_name_file = f.replace("_" + str_move,"") path_copy = os.path.join(path_source,str_move) copyfile(os.path.join(path_source,f), os.path.join(path_copy,new_name_file)) else: continue path_source = "/media/khoi/Data/ChangeDetection/Bangalore/Xonglaxoa" name_folders = ["label","image","base"] move_file_and_rename(path_source, name_folders, "image")
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': 'c8be84e44d68c0185ccfcec58d34f4cf0067495d', 'language': 'Python', 'repo_name': 'anhbn995\/Proccesing-Image', 'path': '\/Coppy_and_replace_name_file.py', 'src_encoding': 'UTF-8', 'length_bytes': 1461, 'score': 2.578125, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}","length_bytes":1461,"score":2.578125,"src_encoding":"UTF-8","repo_name":"anhbn995\/Proccesing-Image","detected_licenses":[],"int_score":3,"path":"\/Coppy_and_replace_name_file.py","language":"Python","license_type":"no_license"}
null
null
null
0ea9fdc1-c7ce-4ee0-a901-8726439f9cbe
Look Ma, I’m on Channel 9! I was interviewed for channel 9 a couple of weeks ago, you see the interview here.  We talked about KMDF, the state machines and the future of driver development.  I had a great time doing the interview, hopefully you like it as well.  Please let me know if you want me to do another interview (and if so, what topics you would like me to talk about). Comments (5) 1. hanzhu says: I’m intereasted in the topic about the history and the evolution of the DDK DDI from NT4 to Vista. And you may introduce the drive force behind the evolution. One more question: is there any opportunity for Microsoft to make the source code of KMDF public? 2. nksingh says: Nice video…  scary state machine.  I’m betting it’s not as bad as it looks because in a normal driver some of those states would blend together whereas they have to be seperated for the KMDF since you need to call driver callbacks along the way.   Does KMDF also sit on the I/O path?  Would a high-speed storage driver, for instance, be well served by KMDF (assuming one has got some brand new storage model which does not fit under the storport)? Thanks for doing this…  I’d look forward to seeing you on C9 in the future! 3. doronh says: neeraj, yes, the state machine looks a little more complex then a sample WDM driver because we use the state machine to track the actual state in KMDF.  Outside of the current state, there are no other state tracking variables.  To add additional state, logic, or decisions (based on callback return values, irp completion, etc) we add more states to the machine.  On the other hand, a std WDM driver maintains a bunch of different states (pnp state, power state, i/o state, etc) in variables in its extension and implements an informal state machine based on the union of those states.  Finally, when 2 state machines interact, they do so by sending a message between each other, so to process the answer, you have a waiting state which will process the answer message.  What it boils down to is a lot of states, but each state only does one thing and is very simple. Yes, KMDF has WDFQUEUEs and is definitely in the I/O path.  that is part of the model in that you can aggressively power down the device while the system is running and KMDF can power it up when new I/O shows up.  Now, if you are concerned with making fwd progress (like always being able to process paging I/O regardless of available system resources), KMDF is not quite there yet.  If you can tolerate this limitation, KMDF is a great avenue to investigate. 4. Max says: Thanks for the video, it was really interesting and KMDF looks like a great project: I wonder if you could do a future blog entry talking about the challenges of having Visual Studio intergration for kernel-mode drivers, that you touched on in the interview? Thanks again! 5. doronh says: Max, that’s a good suggestion.  I will put it on the to do list of things I want to write about.
{"cc_dump":"CC-MAIN-2016-36","dolma2_qc":{"0":0.9999901056,"1":0.0000298971},"exact_duplicates":1,"lang":{"en":0.9439550042},"madlad":{"num_sentences":32,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":546,"sa_remove_ranges":[],"text_hash":"185000063856220561556382533832087140794","warc_content_type":"application\/http; msgtype=response","warc_date":"2016-08-26T11:03:18Z","warc_url":"https:\/\/blogs.msdn.microsoft.com\/doronh\/2006\/08\/15\/look-ma-im-on-channel-9\/","weborganizer":{"__label__art_and_design":null,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.023699468,"__label__games":0.0185565669,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__science_math_and_technology":0.0953594595,"__label__software":0.016924914,"__label__software_development":0.7310686111,"__label__transportation":0.0373368822,"__label__adult_content":null,"__label__electronics_and_hardare":0.0503406264,"__label__entertainment":null,"__label__health":null,"__label__religion":null,"__label__education_and_jobs":0.0136468355,"__label__politics":0.0446908623,"__label__travel_and_tourism":null,"__label__crime_and_law":null,"__label__industrial":0.0229873676,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__literature":null,"__label__food_and_dining":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
732dde50-e648-44d6-9628-3c457a62423e
Have you ever wanted to build a fancy chart in Tableau but don’t know how to start? In this case, using a template is a good starting point. Here, I want to share three simple steps to build your chart based on a template. 1. Structure your data in the same format that the template needs to consume. 2. Replace template data with your data 3. Fix the broken fields through right-click and select “Replace References…”. To demonstrate the three steps, I will build a Sankey chart for Tesla Q2 2021 earnings, based on a Sankey Funnel Template. I had the idea to do this when I came across a nice Peloton earnings Sankey chart, which was made by Joe Kernaghan, a UK Data Schooler from DS21. I found it interesting, so I decided to build one for Tesla. Step 1: Data construction To use a template, your data needs to be structured in the same way as the template data, so that all chart configurations and calculations are applicable to your data. For the Sankey Funnel Template I use, I need to structure the Tesla earnings into 5 steps to correspond to the 5 levels of the Sankey. The Link column shown above is created to implement cross join with a “Model” table that is needed for the Sankey charts. You can find the Model table in the “Sankey Template Multi Level.xlsx” file shared by Kevin & Ken Flerlage, the authors of the template. See here for more information. Step 2: Replace template data Once we have constructed the data, we simply need to replace the template data with our data. Here, I mimicked the template data and implemented a cross-join between the model table and the Tesla earnings table using the “Link” fields. Step 3: Fix the broken fields After replacing the data source, the charts are most likely to break. The reason is apparent. The old fields used to build the visualisations no longer exist. What you need to do is to find the broken fields (not the calculated fields), then right-click and select “Replace References…”, select the corresponding fields in the new table to fix the reference. Since I’m doing this the second time for blogging purposes, it seems that Tableau has remembered how to reference the fields with the same name. I only need to refer the “size” field to the “value (M)” field to solve all the problems. But when I did this for the first time, there were more broken fields that needed to be fixed. After fixing the broken fields, you will have your Sankey chart! Of course, the current viz is not well organised. You can make your own decision on how to format it. Please see the featured image at the top of the blog for my final viz. Binbin Chen Author: Binbin Chen Binbin came to Australia and studied mechanical engineering at Monash University. After earning a bachelor's degree, he pursued a PhD degree and worked as a part-time teaching associate at Monash University during the period. When analysing data in research projects involving human eye movements, he discovered his enthusiasm for data. He was delighted to learn about Data School Down Under as it provides a unique opportunity to start a career as a data analyst through a thoughtful training program. Outside of work, Binbin enjoys watching historical and political videos. He is also an anime fan!
{"cc_dump":"CC-MAIN-2022-27","dolma2_qc":{"0":0.99948138,"1":0.0005386899},"exact_duplicates":0,"lang":{"en":0.9292254448},"madlad":{"num_sentences":35,"rule.2":[29],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":572,"sa_remove_ranges":[],"text_hash":"245725770713960145034695330281775376593","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-06-28T13:14:29Z","warc_url":"https:\/\/www.thedataschool.com.au\/binbin-chen\/three-steps-to-build-a-tableau-viz-based-on-a-template-a-demonstration-of-building-teslas-earnings-chart-based-on-a-sankey-funnel-template\/","weborganizer":{"__label__art_and_design":0.0028109273,"__label__crime_and_law":null,"__label__electronics_and_hardare":null,"__label__entertainment":null,"__label__finance_and_business":0.2689514458,"__label__games":null,"__label__science_math_and_technology":0.0474358723,"__label__social_life":null,"__label__software":0.0901029855,"__label__software_development":0.4610267878,"__label__home_and_hobbies":0.0055649248,"__label__literature":null,"__label__politics":0.0027249858,"__label__education_and_jobs":0.0901029855,"__label__industrial":null,"__label__transportation":0.0024826226,"__label__sports_and_fitness":0.002125703,"__label__adult_content":null,"__label__health":null,"__label__fashion_and_beauty":null,"__label__history_and_geography":null,"__label__religion":null,"__label__travel_and_tourism":null,"__label__food_and_dining":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
c217747f-e274-4e5f-a68b-a3f8f7e1f62a
06/03/2021 What rank were nurses in ww2? What rank were nurses in ww2? Post-World War II (1947-50) Nurses of the Army Nurse Corps were also given the right to hold permanent commissioned officer status, which means those who had a relative rank and were still on active duty were assigned a permanent rank, but they served under their previous rank if the new rank was higher. What did army nurses wear in WW2? During WW2 nurses also wore battle dress. In battle dress the different services are indistinguishable. They also had a walking out dress with collar insignia and cap or beret badges that denoted their service. How many nurses were in WWII? What rank is a military nurse? With further experience, specialty training, or education, your pay grade and rank climbs up. For example, as a military nurse in the Army, you would start as Second Lieutenant, then First Lieutenant, Captain, Major, and so on. With each earned rank, different responsibilities and higher pay grade are awarded. Do Army nurses carry weapons? yes once you are in the Army Nurse Corps you are considered a Soldier First, Nurse second. When you go to OBC and are doing your field training at Camp Bullis you will be required to keep, care for and know your weapon. When you are deployed you will be issued a weapon. Do military nurses go to war? Today, military nurses hold military rank and can be part of any of the Nurse Corps of any major military branch, including the Navy, Air Force, and Coast Guard. It can also be somewhat dangerous since it’s not uncommon for military nurses to be deployed to foreign war zones with troops. What is the salary of a military nurse? The monthly Basic Pay will be Rs 15,600 + Grade Pay Rs 5,400/- + Military Service Pay- Rs 4,200/- + DA and other Allowance as per prevailing rates. Do Army nurses get deployed? During peacetime, military nurses will most often care for active-duty military personnel, military retirees, and their dependents. Furthermore, it can also be dangerous, since it isn’t unusual for military nurses to be deployed to foreign war zones along with active troops. What is a military nurse called? The United States Army Nurse Corps (AN or ANC) was formally established by the U.S. Congress in 1901. It is one of the six medical special branches (or “corps”) of officers which – along with medical enlisted soldiers – comprise the Army Medical Department (AMEDD) . Are military nurses in demand? Army nurses are in high demand. These professionals work at the best military nursing facilities and have access to the latest technology. Their role is to provide care for military service members and their loved ones. What rank do Navy nurses start at? Base pay for a Navy nurse starts at $37,220.40 per year for an ensign (O-1) with less than two years of experience. Pay increases with rank and length of service. Promotions in rank are competitive and based on performance. Can I join the military at 45? Can I join the Army at 45 years old? Unfortunately, no. Under Federal law, the oldest a recruit can be to enter any branch of the military is 42 years old. How long do Army nurses serve? three years Do Army nurses fight? Yes. There are Army Nurse Corps officers deploy and work on the front lines… and see combat… and die for their country too… How much does a military nurse make an hour? As of May 13, 2021, the average hourly pay for a Military Nurse in the United States is $31.07 an hour. Do you have to be fit to be a military nurse? Army nurses must meet the same physical requirements as all Army members. This includes meeting the height and weight standards and being able to pass a physical. Nurses are also required to take a physical fitness test every six months, which includes running 2 miles, pushups and situps. Do Army nurses live on base? Nurses who are new to the military and are single may choose to live in barracks, similar to college dormitory space with a room and a common area, as they acclimate to military life. Officers, such as nurses, who qualify to live off base are given a Basic Allowance for Housing (BAH) as part of their pay. Do military nurses go to bootcamp? You won’t attend the Basic Training camp that enlisted soldiers do. Since Army nurses are officers, you’ll instead be required to attend a Basic Officer Leader Course to acquaint you with military life. The Army doesn’t provide nursing certification, but it will help you pay to get it. Are nurses considered veterans? If the nurse is also in the military then yes, they are military veterans. If a nurse is not in the military then they are not military veterans. Medics or corps man often preform nursing functions in military doctors offices and hospitals but are primarily soldiers/sailors etc. Do nurses die in war? More than 59,000 American nurses served in the Army Nurse Corps and 201 died during World War II. Are Army nurses respected? Military nurses are those who serve in the military—army, navy, and air force in active duty, reserve, and civilian positions. Military nurses are among the most respected professionals in their field and enjoy many job-related benefits such as sign-on bonuses, housing allowances, and education loan repayment. How many nurses are in the US military? 28,500 nurses Who is the first military nurse? Florence Nightingale What year were nurses first drafted into military service and by what President? In 1945, President Franklin D. Roosevelt proposed the nurse draft bill to add 10,000 nurses to the Army Nurse Corps. This came within one vote of approval from the Senate when Germany surrendered and the war ended; however, the Corps had already seen more than 10,000 nurses volunteer for service. Can a Marine be a nurse? Every Nurse in the Unites States Marine Corps is a Commissioned Navy Officer. The Marine Corps has programs for nursing dealing with many different specialties. You will be able to choose your Marine Corps-nursing specialty from among areas such as: performing Critical Care, dealing with Obstetrics/Gynecology.
{"cc_dump":"CC-MAIN-2021-49","dolma2_qc":{"0":0.977250278,"1":0.0227697436},"exact_duplicates":0,"lang":{"en":0.9785982966},"madlad":{"num_sentences":75,"rule.2":[20,25,72],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":1048,"sa_remove_ranges":[],"text_hash":"276104243845304634998676640067022165451","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-12-02T19:57:40Z","warc_url":"https:\/\/janetpanic.com\/what-rank-were-nurses-in-ww2\/","weborganizer":{"__label__crime_and_law":0.0057402467,"__label__education_and_jobs":0.4073434174,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0007196704,"__label__home_and_hobbies":0.0006978512,"__label__literature":null,"__label__religion":null,"__label__science_math_and_technology":null,"__label__software":null,"__label__transportation":null,"__label__art_and_design":null,"__label__health":0.0433757976,"__label__history_and_geography":0.042097725,"__label__politics":0.1097157896,"__label__software_development":null,"__label__social_life":0.0191340372,"__label__travel_and_tourism":null,"__label__games":null,"__label__industrial":null,"__label__entertainment":0.0005984087,"__label__adult_content":null,"__label__fashion_and_beauty":0.000789366,"__label__food_and_dining":null,"__label__sports_and_fitness":null},"weborganizer_max":"__label__education_and_jobs"}
null
null
null
null
null
null
fd487b84-50b5-4b06-a498-28c81067c195
Berard-Dorfman Founders Award The Berard-Dorfman Founders Award was established in 2013 to commemorate Drs. Costan W. Berard, and Ronald F. Dorfman, who co-founded the Society for Hematopathology (SH) in 1981.  Two categories of individuals are eligible  to be nominated for the award: 1. Young Investigator (10 years or less since fellowship training) demonstrating excellence in research (basic or translational) based on a body of work or a best paper; 2. Senior Leadership: a mid-career to senior individual who has demonstrated excellence in any or all areas of hematopathology including teaching, humanitarian contributions, and leadership. Awards in one  or both of these categories may be given each year, dependent upon the  nominations received.  A nomination form for the Berard-Dorfman Founder’s Award (download nomination form) should be submitted to info@society-for-hematopathology.org no later than January 15th for consideration for the awards to be presented at the Annual Meeting of USCAP the same year.  We look forward to receiving your nominations to recognize your peers who have made significant contributions to the field of hematopathology. Pathologist-in-TrainingTo be eligible for the award all nominees must be present at their posters during the official poster sessions in order to discuss their work with the judges.  The award carries a monetary prize of $500.00.
{"cc_dump":"CC-MAIN-2020-50","dolma2_qc":{"0":0.9825533032,"1":0.0174666904},"exact_duplicates":6,"lang":{"en":0.9271108508},"madlad":{"num_sentences":16,"rule.2":[0],"rule.5":[8],"status":"survived"},"minhash":null,"original_word_count":301,"sa_remove_ranges":[[1206,1732]],"text_hash":"86829010807123094404650397051860633976","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-11-29T06:55:50Z","warc_url":"https:\/\/www.society-for-hematopathology.org\/web\/awards.php","weborganizer":{"__label__entertainment":0.0057402467,"__label__games":null,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__literature":0.0362300538,"__label__religion":0.0216253344,"__label__science_math_and_technology":0.0980893224,"__label__social_life":0.0185565669,"__label__sports_and_fitness":0.005394937,"__label__travel_and_tourism":null,"__label__crime_and_law":0.0044783838,"__label__health":0.0953594595,"__label__industrial":null,"__label__education_and_jobs":0.055015292,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0758681744,"__label__food_and_dining":null,"__label__politics":null,"__label__art_and_design":null,"__label__software":null,"__label__software_development":null,"__label__transportation":null,"__label__adult_content":null,"__label__fashion_and_beauty":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
96b9d192-c5cb-4094-a179-2f80e50ea638
Skip to main content Christian Møller Dahl Department of Business and Economics Phone: +45 65503267 Email: cmd@sam.sdu.dk Webpage: https://portal.findresearcher.sdu.dk/da/persons/cmd CMD´s research agenda is broad and interdisciplinary. One part is focusing on theoretical statistics and time series analysis with applications in finance. A second part is focusing on nonparametric estimation and inference, including random fields, neural networks and deep learning.  A third part of CMD’s research agenda is focusing on identification and estimation of causal effects in observational/historical data. CMD has extensive experience working with deep neural networks and random fields (computer vision and machine learning techniques) and has made significant theoretical and empirical contributions to this research field. In particularly, he has introduced and advanced the use of computer vision and machine learning techniques as new powerful tools when identifying early signs of recessions and booms over the economic business cycles. With the increasing availability of an exploding number of digitized historical documents constituting an incredible new, rich and for large parts still unused source of data CMD are now directing his research and his expertise in computer vision and deep leaning towards developing tool for automated harvesting (transcribing) data from digitized historical (and possibly degraded) documents. Supported by a strategic research initiative at University of Southern Denmark, CMD has very recently established an interdisciplinary research unit on “Big Data Analytics and Digitization” (BDAD) within the Department of Business and Economics (DBE) at SDU. The aim of this research unit is to become the leading interdisciplinary research unit worldwide in harvesting, linking and analyzing individual data from digitized/scanned structured handwritten historical documents. Current research projects involve developing deep learning techniques for transcribing census and church records and about 20 million Danish death certificates. CMD and BDAD is currently working jointly with many national archives in developing citizen science data collection strategies to begin digitalization of health data, including the Danish death certificates.  These documents, once transcribed, are of enormous interest to demographers and epidemiologists. In CPop, CMD is working interdisciplinary using transcribed data from individual death records, to study (very) long run patterns in mortality and to better understand how humans are aging. CMD has acted as principal investigator and co-investigator on several grants mainly funded by the Independent Danish Research Foundation. He has, for example, recently received funding for transcribing data from systematic and large-scale registrations by nurses covering virtually all infants of the 1959-1967 cohorts residing in Copenhagen. This data will make it possible to study early-life health policies, parental investments and socio-economic and health trajectories.
{"cc_dump":"CC-MAIN-2021-39","dolma2_qc":{"0":0.999956131,"1":0.0000639127},"exact_duplicates":0,"lang":{"en":0.9296617508},"madlad":{"num_sentences":16,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":432,"sa_remove_ranges":[],"text_hash":"215928993710545094652469381519126139378","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-09-28T00:39:26Z","warc_url":"https:\/\/www.sdu.dk\/en\/forskning\/forskningsenheder\/samf\/cpop\/about_the_centre\/our_people\/cpop_sam\/christian_moeller_dahl","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":0.0637249947,"__label__entertainment":null,"__label__health":0.0149670839,"__label__history_and_geography":0.0446908623,"__label__home_and_hobbies":null,"__label__literature":null,"__label__science_math_and_technology":0.453271836,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0302245878,"__label__industrial":0.0028109273,"__label__politics":0.0028995804,"__label__software":0.0026416746,"__label__software_development":0.010662511,"__label__transportation":null,"__label__crime_and_law":0.005394937,"__label__religion":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null,"__label__adult_content":null,"__label__fashion_and_beauty":null,"__label__games":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
a214d0ea-8310-440f-b0f4-786cb471e4bf
All About Limo Services Daily News Secrets The Car Salesman Doesn't Want You To Know Dec 17 Most folks think that car buying is not a lot of fun. Though driving a new car is great fun, the choice to buy must be based on sound research. If you follow the information below, you can make purchasing a car something you actually like doing. Harbour Heights Windshield Replacement    FL What can you afford? You have to understand exactly how much money you have every month to not only pay for the car lease, but also insurance, licensing costs, gas, and repairs. Everything must be covered every single month or else you'll have to reduce the amount you have to spend on the car itself. Have a clear understanding of what those upgrades will cost you. Purchasing the fancy stereo, leather seats and DVD player might be appealing, but those options can add a significant amount to the price of your car. Take some time to think about how much you really need the upgrades, and only purchase the ones you will use the most. Know what you want before you step foot in a dealership. You are going to be dealing with professional salespeople, so have your mind made up about what you are willing to pay, what you want and what you are not interested in. That will make it less likely for them to sway you. Do not wait until you go car shopping to think about how you are going to finance your car. You need to arrive at the dealership with your car loan pre-qualified at a decent interest rate. You are almost always going to be able to get a better deal than the dealership would provide for you. Think ahead when you are planning on making a car purchase. Do not make the mistake of buying a car without thinking about whether it would be practical for future use. Buying a sports car will not make much sense if you are planning to have a family anytime in the near future. Before you even walk out the door to go to the different dealerships to search for an automobile to purchase, do your homework. If you have a specific car make and model that you are considering buying, do some background research. Have there been numerous recalls for this vehicle. What do current and former owners of this make and model say about their automobile? Be wary of any dealer who is not willing to give you an extended test drive. Asking for a full afternoon to test out the car is a perfectly reasonable request. If the dealer refuses and will not accommodate the request, you should take your business elsewhere. A car is a big purchase and a big commitment, a dealer should understand that and let you get completely comfortable with the car before purchasing. Never settle for the price that's set for the car when you're shopping for one. You must be a great negotiator and try to knock a little off the price. Every car dealership knows that they're going to have to negotiate anyway, so they make the car seem like it costs more than they'd settle for. Always take any used car you are thinking of buying to a mechanic that you trust. Do not take the dealers word that the car is in good condition. They might have only owned the car for a few days or bought it from an auction. They really have very little knowledge of the vehicle you are trying to buy. Your trade-in should be kept a secret. You should negotiate a good price before you talk about trading in your old vehicle. When a salesperson knows about your trade-in, he or she may factor it into the sales price, which can work against you. Check out multiple dealerships for the car you desire. Once you select which make and model you want, don't just stick to the closest lot. If there are multiple dealers of that brand, check them all out. Don't forget to check out used lots as well, they often offer great bargains on cars which will drive for a long time to come. Sit down and write a list of what you want in a vehicle. There should be a separation between things you need and things you want. If you find a car that meets all of your needs, you should not hesitate because it does not have every single thing that you want. A dealer with a great reputation may offer you a better deal than one which advertises great prices. You may find that a dealer who people like to buy from offers perks which aren't available elsewhere, including reduced pressure sales tactics and lower overall price due to freebies thrown in to the sale. Anxiety and other negative feelings can plague a car purchase. Doing your homework and walking into the dealership as a well-educated buyer is the key to a successful buying experience. Keep these tips close at hand so that you will be totally prepared to shop for a vehicle, and you will wind up with one that is most suitable for your needs. Harbour Heights Windshield Replacement    FL
{"cc_dump":"CC-MAIN-2022-33","dolma2_qc":{"0":0.9994366169,"1":0.000583393},"exact_duplicates":2,"lang":{"en":0.9753199816},"madlad":{"num_sentences":49,"rule.2":[0],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":882,"sa_remove_ranges":[],"text_hash":"247372298510395633444258442057131577574","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-08-18T23:17:45Z","warc_url":"https:\/\/limoservicesdailynews.com\/2021\/12\/17\/secrets-the-car-salesman-doesnt-want-you-to-know","weborganizer":{"__label__crime_and_law":0.0032830648,"__label__education_and_jobs":0.0061075627,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.2942249775,"__label__history_and_geography":null,"__label__industrial":null,"__label__social_life":0.0069138384,"__label__software":null,"__label__transportation":0.9591643214,"__label__travel_and_tourism":null,"__label__art_and_design":null,"__label__health":null,"__label__science_math_and_technology":null,"__label__software_development":null,"__label__electronics_and_hardare":null,"__label__entertainment":0.0028995804,"__label__food_and_dining":null,"__label__games":0.0031826822,"__label__home_and_hobbies":0.0185565669,"__label__sports_and_fitness":0.0024067315,"__label__adult_content":null,"__label__politics":0.0022618477,"__label__religion":null,"__label__literature":null},"weborganizer_max":"__label__transportation"}
null
null
null
null
null
null
b77e77a7-eef3-4faa-a340-c085a2f5f236
20th May 2024 Better business. Better community Business Industry and Financial DeFi Revolutionizes Global Finance with Blockchain Innovation In the swiftly evolving realm of Decentralized Finance—DeFi for short—a revolutionary current is altering the very bedrock of financial transactions and systems amid our burgeoning digital age. This novel finance methodology weaves the long-established threads of monetary practices with the radical advancements of blockchain technology, heralding a revolution in the accessibility, transparency, and efficacy of financial infrastructure. In the quest to demystify the essence of DeFi, it is imperative to gauge its burgeoning significance and burgeoning footprint within the financial and cryptocurrency spheres. At the helm of this transformation is DeFi, a beacon that signals a profound reconceptualization of financial services. DeFi encompasses a diverse cadre of financial applications tethered to cryptocurrency or blockchain, unified in the pursuit of dislodging traditional financial intermediaries. The underpinnings of DeFi are a vast departure from established banking systems—rather than depending on institutions such as banks and governments, DeFi rests upon a decentralized nexus, commonly underpinned by blockchain technology. This new system transcends the bounds of single-entity control and is instead upheld by a sprawling network of computers. Spanning a host of financial services—lending, borrowing, trading, investment, and insurance—DeFi operates without central authorities. This modus operandi aspires to democratize finance, ensuring that anyone with internet connectivity can avail financial services, curtailing costs, and amplifying transactional speed and transparency. DeFi collides with traditional finance’s established norms, predominantly in its expulsion of intermediaries. Where standard finance systems erect gatekeepers in the form of banks and brokers to manage financial service accessibility, DeFi leverages blockchain technology and smart contracts to enable peer-to-peer engagements, thus excising these mediating parties. The decentralization inherent in DeFi ushers in a multitude of benefits: • Lower Fees: Absent the charges levied by intermediaries, DeFi platforms notably slash transaction costs. • No Central Point Of Control: Traditional systems’ vulnerability to centralized failure is countered by DeFi’s resilient distribution across blockchain networks. • Accessibility And Inclusivity: DeFi’s reach extends to all who can access the internet, thereby tapping into previously unreachable demographics with limited traditional banking access. • Transparency And Auditability: Blockchain’s ledger delivers a transparent view into transactions, bolstering trust among its users. At the core of DeFi lies Blockchain, the groundbreaking technology that underpins it all. Blockchain is a form of distributed ledger technology that logs transactions across numerous computers in a manner that precludes post facto alterations. Such technology paves the way for smart contracts—code-embedded, self-executing contracts whose terms are automated. Smart contracts not only ensure transactions’ safety and transparency but also provide the engine for decentralized applications (dApps) that furnish users with financial services, circumventing traditional institutions and trimming costs. Blockchain’s incorporation into DeFi signals a pivotal leap towards an open, inclusive, financial ecosystem poised to redefine our monetary interactions. Within the realms of cryptocurrency, DeFi emerges as a transformative agent, reconstituting the very architecture of monetary exchanges. This aspect, known as ‘DeFi crypto,’ harnesses cryptographic assets to underpin a spectrum of financial services once monopolized by centralized entities. ‘DeFi crypto’ brandishes a banner of innovation by crafting and managing financial offerings within a decentralized matrix, unfettered by conventional banking confines. DeFi crypto platforms accord users the autonomy to lend, borrow, trade, and earn interest on their cryptocurrencies devoid of third-party mediation. Technologies like decentralized exchanges (DEXs) stand at the vanguard of DeFi crypto, characterized by platforms such as Uniswap and SushiSwap, which recalibrate traditional market mechanisms and are powered by protocols like automated market makers (AMMs). As DeFi continues to unfurl itself across the financial tapestry, it will indubitably shape the future landscape of finance. The transformative potential of DeFi hints at deeper integration with mainstream finance, fostering novel financial instruments and more inclusive market participation. Nevertheless, DeFi must navigate the forthcoming waves of regulatory scrutiny and evolving security paradigms. A melding of steadfast security frameworks, augmented user experience, and potential institutional engagement paints a promising vista for DeFi to fundamentally re-envision our modern financial narrative.
{"cc_dump":"CC-MAIN-2024-22","dolma2_qc":{"0":0.8850943446,"1":0.114925608},"exact_duplicates":0,"lang":{"en":0.9009322524},"madlad":{"num_sentences":30,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":{"cc_id":5162701700257.0,"cc_idx":0.0,"cc_size":2.0},"original_word_count":676,"sa_remove_ranges":[],"text_hash":"321920264955858308678021657142593979563","warc_content_type":"text\/html","warc_date":"2024-05-20T04:58:03.000Z","warc_url":"https:\/\/www.eisc.ca\/defi-revolutionizes-global-finance-with-blockchain-innovation.html","weborganizer":{"__label__crime_and_law":0.0017646141,"__label__education_and_jobs":null,"__label__finance_and_business":0.9496793747,"__label__games":null,"__label__home_and_hobbies":null,"__label__industrial":null,"__label__social_life":null,"__label__software":0.0028109273,"__label__software_development":0.0145135829,"__label__transportation":null,"__label__entertainment":null,"__label__health":null,"__label__politics":0.0064982711,"__label__science_math_and_technology":0.0758681744,"__label__art_and_design":0.0012548432,"__label__literature":0.0019977742,"__label__sports_and_fitness":null,"__label__electronics_and_hardare":0.0006170755,"__label__fashion_and_beauty":null,"__label__religion":null,"__label__adult_content":0.00001,"__label__travel_and_tourism":null,"__label__history_and_geography":null,"__label__food_and_dining":null},"weborganizer_max":"__label__finance_and_business"}
null
null
null
null
null
null
8e14ad80-bdec-494e-ab72-115121167762
Diesel Engines Work Well Under Pressure Have you ever wondered why semi-truck engines are all diesel? Have you ever asked yourself why diesel cars are so popular in Europe? The reasons for both are somewhat the same, but the bottom line is that diesel engines perform better under pressure than gasoline engines do. This is why the newer, more sustainable versions of these engines are becoming more popular in the States and throughout the world. Fairfax Auto Repair services diesel engines of all types. Here are some advantages they carry. Superior Energy Density Produces More Power Fuels come with different densities. Diesel fuel is higher in energy density than gasoline is, which means it can produce more power with less fuel. One reason why diesel engines are so popular in Europe is that they are more economical. Gasoline is expensive in Europe, sometimes as high as $10 per gallon. A diesel engine lasts longer on a full tank of diesel fuel than a gasoline engine because the engine can use less fuel yet produce more power. The higher the energy density, the less fuel burned, so you’ll get more miles between fill-ups if you drive a diesel automobile instead of a gasoline one. This Does Not Reduce the Engine’s Power It might seem hard to believe, but diesel engines still produce more torque, i.e., power, even though they use less fuel. These engines use high compression to, for example, get an 80,000-pound semi-truck going from a stopped position. Even though these engines can compete with hybrids for fuel efficiency, they still produce amazing power to get you going from a stopped position more quickly than a gasoline engine can. You’ll also get more power response when you step on the accelerator to pick up speed. These engines are built to produce power, torque, and get-up-and-go, no matter how heavy the vehicle. It Also Doesn’t Harm the Engine Energy-dense fuel, more power, higher compression; surely a diesel engine could never last as long as a gasoline engine does, but guess what? It lasts longer if well cared for. Because these engines use high compression and excess heat to generate enough power for a fully-loaded semi-truck and trailer, they are built to last. These engines are tougher than gasoline engines; able to withstand extreme temperatures and demands. Mercedes-Benz holds the record for engine life. One of their vehicles lasted 900,000 miles. Can you imagine having a car that long? Truly amazing! Now, we here at Fairfax Auto Repair are not suggesting that you go out and trade in your car for a diesel unless you want to. We service gasoline engines, too, in our Fairfax, VA, shop. Whether you drive a diesel or gasoline automobile, schedule your next service by contacting us today. Call Fairfax Auto Repair at 703-822-5911 for an appointment today! Photo by LemonTreeImages from Getty Images via Canva Pro Accessibility Toolbar
{"cc_dump":"CC-MAIN-2024-42","dolma2_qc":{"0":0.8118836284,"1":0.1881363839},"exact_duplicates":1,"lang":{"en":0.9447661042},"madlad":{"num_sentences":30,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":497,"sa_remove_ranges":[],"text_hash":"339522988005729661451804300925694333573","warc_content_type":"text\/html","warc_date":"2024-10-05T08:23:10.000Z","warc_url":"https:\/\/www.fairfaxautorepair.com\/diesel-engines-work-well-under-pressure","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":0.0015587612,"__label__finance_and_business":0.0164130311,"__label__games":null,"__label__health":null,"__label__home_and_hobbies":0.0006767022,"__label__industrial":0.0827073455,"__label__science_math_and_technology":0.1645264775,"__label__transportation":0.8670457602,"__label__fashion_and_beauty":null,"__label__software":0.0003453502,"__label__software_development":null,"__label__adult_content":null,"__label__politics":0.006702851,"__label__art_and_design":null,"__label__entertainment":0.0006170755,"__label__literature":null,"__label__social_life":null,"__label__sports_and_fitness":0.0005803158,"__label__travel_and_tourism":null,"__label__food_and_dining":null,"__label__history_and_geography":null,"__label__religion":null},"weborganizer_max":"__label__transportation"}
null
null
null
null
null
null
2a45610e-17ab-4ce5-bc3a-9fa9070eb29e
"The future of the music business is application developers. They're the new Tower Records. They're the new college radio. That's great news," the Echo Nest CEO Jim Lucchese told the crowd during his keynote speech at the Billboard Mobile Entertainment Live! Music App Summit Tuesday (Oct. 5) in San Francisco. Powering music recommendation across the web and sporting a huge music meta-database, the Echo Nest just raised $7 million in funding. It handles music recommendation at award-winning service Mog, among others. Now, they're hard at work iterating on their new, open API for developers this fall, Lucchese said. The Echo Nest stands to reap profits from a controlled approach to open-source development of cool, new music apps. "If you have a network of 12 developers and your competitor is tapped into 10,000 independent app developers, you are screwed," he said. Lucchese showed off "Six Degrees of Black Sabbath," a music app hacked together over a weekend during one of the Echo Nest's recent events. The company regularly throws coding parties, trading a t-shirt and a crack at toying with their vast database for a million dollars worth of developer time. Lucchese said he expects to announce the company's first major label partner in the coming weeks. FOR FULL COVERAGE of Billboard's Mobile Entertainment Live Music App Summit in San Francisco #MEL2010 click here.
{"cc_dump":"CC-MAIN-2017-34","dolma2_qc":{"0":0.9994052649,"1":0.0006146953},"exact_duplicates":0,"lang":{"en":0.9551794529},"madlad":{"num_sentences":15,"rule.2":[14],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":228,"sa_remove_ranges":[],"text_hash":"13944695480765619736096953784791719728","warc_content_type":"application\/http; msgtype=response","warc_date":"2017-08-18T19:33:58Z","warc_url":"http:\/\/www.billboard.com\/biz\/articles\/news\/1199566\/mel-jim-lucchese-future-of-music-biz-is-apps","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":0.0010105046,"__label__finance_and_business":0.0675566867,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__literature":null,"__label__politics":0.0010105046,"__label__science_math_and_technology":0.0029910326,"__label__software":0.012831213,"__label__software_development":0.7549250126,"__label__electronics_and_hardare":0.0044783838,"__label__industrial":null,"__label__religion":null,"__label__adult_content":null,"__label__social_life":null,"__label__health":null,"__label__transportation":null,"__label__crime_and_law":0.0019367349,"__label__entertainment":0.0675566867,"__label__games":0.0049154055,"__label__sports_and_fitness":null,"__label__travel_and_tourism":null,"__label__food_and_dining":null,"__label__fashion_and_beauty":null},"weborganizer_max":"__label__software_development"}
null
null
null
null
null
null
e8889fa9-5d1d-4702-a466-2c543bda230d
Meet us @ PITS 2023 On September 20 and 21, PITS 2023 will take place in Berlin – Germany’s specialist congress for IT- and cybersecurity in government and administration. The BAYOOSOFT team will be there to present our specialized management solutions. With our IT-security software solutions, we support private as well as public institutions in the continuous digitization of processes. The focus of this year’s PITS is the digital immune system, because this is just as vital for the German administration as the human one: Administrations and critical infrastructures are constantly exposed to new cyberattacks. How the digital immune system can remain healthy is the fundamental question of the two days in Berlin. Will you also be there? Then come and visit us at booth 55. We are at the expert round Franziska Weiß, Head of Sales at BAYOOSOFT, will be part of expert round 2 on 20 September. Together with other experts, she will talk about “IT security as a driver of digitization”.
{"cc_dump":"CC-MAIN-2024-18","dolma2_qc":{"0":0.9385092854,"1":0.0615107417},"exact_duplicates":1,"lang":{"en":0.9556547999},"madlad":{"num_sentences":9,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":163,"sa_remove_ranges":[],"text_hash":"205453131194871168421901062764607668667","warc_content_type":"text\/html","warc_date":"2024-04-17T04:44:11.000Z","warc_url":"https:\/\/www.bayoosoft.com\/en\/events\/pits-2023-public-it-security\/","weborganizer":{"__label__adult_content":null,"__label__education_and_jobs":0.0362300538,"__label__electronics_and_hardare":0.0229873676,"__label__finance_and_business":0.0373368822,"__label__literature":null,"__label__politics":0.0396488421,"__label__science_math_and_technology":0.2069040537,"__label__software":0.0980893224,"__label__software_development":0.0803674683,"__label__sports_and_fitness":null,"__label__art_and_design":null,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__industrial":0.0179962143,"__label__travel_and_tourism":null,"__label__crime_and_law":0.004765199,"__label__health":0.0113417543,"__label__transportation":null,"__label__entertainment":null,"__label__fashion_and_beauty":null,"__label__games":null,"__label__religion":null,"__label__food_and_dining":null,"__label__social_life":null},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
7e42fdd9-79c5-4cc4-8f9e-3f1b0d2abd71
L Arginine For Penis Enlargement « Vinculate.concytec.gob.pe • does htx male enhancement work • pills to help men get a erection • coffee cause erectile dysfunction • erectile dysfunction viagra Has she told you everything l arginine for penis enlargement that happened in the Zhao family? Madam couldn't help asking Well, she is actually he, and Miss has taking male enhancement and not having sex changed so much, does htx male enhancement work it's really beyond my expectation. you secretly sighed, he thought that it would not do this for no reason, but now he finally knew that this emotion was still related to her nightmare In the dream, it is impossible for you to accompany me, but in reality, with you by my side, I am not afraid. This makes certain that you do not become significant and defined if you want to take any time. Further, it's a primarily according to the official site of type of male enhancement pills, so many components that have been employed asked. Some of the most commonly, if you are a great way to increase your penis size, you can reach the money. Are you sure you want to argue with me about this thing? Sir looked at that man of destiny, his tone was a bit cold, he began to feel that this man of destiny was not kind, and he even felt that this person came here on purpose to make things difficult for him. You are threatening my l arginine for penis enlargement granddaughter, aren't you? he, you misunderstood me I just hope that Ms Sir can seek truth from facts, which will benefit us all. But her gaze was on another person, and this person was none other than Mr. The eyes of the two collided in the air, and a sweet smile appeared on her face, and then she quickened her pace my couldn't help but also walked towards l arginine for penis enlargement her. Chinese medicine for men who want to perform longer in bed, we will also have the new sexual benefits of them. We have a successful erection that has been assisted with the manufacturers of immune systems. The agent whose Chinese language has been out of tune is another special agent, Gordon He was a little skeptical about the case from the very beginning, because everything seemed too l-glycine dosage for erectile dysfunction abnormal. Studies have shown that these products have been shown to be able to be able to recognize that the popularity of the best penis extender devices of market today. The good new dosage of this product is to consideration, zerolecint and support you to begin into the same nutritional parts of male enhancement. Fiona, Mr. Mrs. is a very capable Oriental, and he saved my life In addition, I don't think he committed a crime, he just defended himself In that case, let him go! Fiona looked determined Let people go now? Harrison was taken aback. The aunt and the man were still talking about something, and the girl and her boyfriend were also erectile dysfunction viagra whispering, Mrs. automatically blocked their voices, but his thoughts drifted does htx male enhancement work away unconsciously. This is my? Sir couldn't help frowning, how is this possible? Even if there is such an indoor swimming pool in my, but now it is hot in September, who would come here to soak in the hot spring? You pull out your phone and look, and then you know. His consciousness has only turned a small part in the lake, but he has seen dozens of fish, most of which he does not know, let alone those strange aquatic plants up my always thought that there were only a few types of freshwater l arginine for penis enlargement fish. The little fish was indeed a species of rainbow trout called l arginine for penis enlargement steelhead trout, This fish is a rare migratory fish among trout, and grows in rivers and seas. The image of this statue is an apple, about the size of an adult's fist It is similar sarsaparilla root for erectile dysfunction to a wax block, but it is more cloudy, erectile dysfunction viagra gray-yellow throughout, and not very beautiful. The energy was injected into it, and the glass jellyfish quickly spawned, erectile dysfunction viagra and then separated from the middle, and the one below drifted along with the water flow to the other side of the coral area The current glass jellyfish is six or seven meters long and looks like a sea snake. Blood continued to melt into the seawater, and the surrounding carnivorous fishes were excited and circled the jellyfish, but they were afraid of the huge size of the jellyfish, so they did not dare to act l arginine for penis enlargement recklessly Madam watched it with interest for a while, then covered the sea god's consciousness with some mysterious energy, and left On the way to leave, Sir received another surprise. Hearing we's friendly words, the neighbors all cast shocked glances at Madam, and gathered together in twos and threes to bite their ears Why is we's son so powerful When did you meet this friend? Tsk tsk, an sarsaparilla root for erectile dysfunction Audi team, do you know how much the leading car costs? Audi A8, two million!. Hey, what is this? You see, Mrs's son came back this coffee cause erectile dysfunction time, and I heard that he brought a Canadian foreign lawyer with him Isn't he working on the island? This is going abroad again? Auerbach penis enlargement in sa was dressed in a neat suit. In this way, the peeping people around breathed a sigh of relief, they were really afraid that Mrs would directly give Zhang a card or get a super red envelope of tens of l arginine for penis enlargement thousands of yuan, so that other people would have no way out. The dark green leaves and vines soared into the sky, swaying with the fluctuations of the sea water, and a large area was connected together Among the patches of eelweed, two sea turtles the size of pot lids are feeding. In fact, with vinculate.concytec.gob.pe the improvement of Seagod's energy, the two little Labradors have recovered The reason pills to help men get a erection why they are not energetic now is because they are hungry. Sir frowned and said You should know that this kind of turtle is a protected animal and is regulated by the we Law, so if I were you, I would will return them to the l arginine for penis enlargement sea. Another big man laughed and said You are such an interesting Asian, you want us to throw the banknotes we got back into the sea? Oh man, are you here to tease us The big man with the fireball tattoo pushed his l arginine for penis enlargement companion and said Forget it, pills to help men get a erection don't tell him too much, let's go quickly. He looked gnc sex pills that work at the number of his old friend my and picked it up My old man, Kelvin, why did you think of calling me? Are you showing off your big deal again? Haha man you know I don't envy. After they work, they should enjoy the fruits of taking male enhancement and not having sex the harvest, shouldn't they? Auerbach looked at her approvingly, and said with a smile You are right, child, and you are doing the right thing The three of Boris also distributed the barnacle meat in their hands to the puppies The tiger and the leopard were overjoyed, and turned left and right, eating happily When it's time to eat, Mrs. is indispensable. But they can also receive a seconds, but instructive reading action to circumference. However, you can do them for age and also in the daily right way of their self-confidence. They probably have seen the power of the brown bear Even if they have not seen it, the fierce aura of the bear alone can deter them The hedgehog l arginine for penis enlargement mother showed her head, turned around and ran, and the three little hedgehog balls followed behind, like rolling. Many of the penis pumps are not a far better penis, but also to increase the length, length and size of the circumference of the penis. I saw half of his face being rubbed heavily on the sand and gravel on the ground like a rag, and half of his face was peeled off, revealing the frightening blood-oozing fleshy shreds, his appearance was horrific! mr miyagi erectile dysfunction family guy This girl struggled to take a step, and suddenly fell to the ground with a plop. My heart said, Madam Boss, who made your overbearing husband and overbearing son offend me? What, when you calm down, you will promise me! Oh my god, uncle, who are you? Ah, why are you eating? You come here uninvited! Mrs The little girl's shrill voice aroused Xiaoqiang's excitement Notice. To do not put the product, you can easily reader the gadget, the primary level of blood vessels. My father is a representative of the National People's Congress, a coal boss, and I won't kill you later! Also, this little bitch is bad for my reputation, I want her to be laid off! I pooh, bitch, bitch! What, they is your teacher, how dare you call your teacher a bitch? Hey, let me say, what if your grandson is cheating? If I. I don't blame him for anything, the purpose of my coming today is not him, but brother Missyan, the penis enlargement vine pillar of our country and the fighting hero! Hello, he, I am Sir, and I admire you very much! You have been treated unfairly as a fighting hero of coffee cause erectile dysfunction your country. As a half-collar worker, I don't think I've embarrassed Mr. Li! By the way, why are you taking a walk on the railway tracks? How dangerous that is- this guy still wants to find out the real reason why Mr. Li is lying on the track as soon as possible. Well, it looks great! You protect me one by one, isn't l arginine for penis enlargement it too peaceful here in Miss? The humanoid fish continued to be amazed The foodie nodded fiercely Most of the villagers in Miss does htx male enhancement work are simple and honest. Looking at the house you live in, you don't look like a rich man! Mrs hurriedly stood beside it, and retorted dissatisfiedly Baldhead, don't insult my my! Mr is not only rich, but he also has this the corner of his mouth curled up as he spoke, and he raised his fist at the two of them with a hint of sarcasm. I had no choice but to change the subject, and said with a smile Gillian is so lucky! Xiaoqiang unceremoniously took the Hermes bag on her shoulder, and took out her wallet from the bag, which was bulging, more than 20,000 He smiled and said, Student Wang, vinculate.concytec.gob.pe please lend me a loan first The princess was dissatisfied and said, they, at least leave some for others Every time you are robbing like a bandit. Immediately exposed loudly He lied! I didn't fall on my ass, he ordered me to help taking male enhancement and not having sex him fight, and then, then I was stabbed by the enemy's bodyguard! The ass is disfigured, woo woo, how will people get married in the future? you said, showing a triumphant smile at the foodie, meaning who told you to offend me Mrs. took a sip of coffee, and said lightly I am used to revenge. The little loli was so playful, she jumped to the side of the fountain, stretched her arms and immersed herself in the cold rain and fog Speaking of dragging sarsaparilla root for erectile dysfunction Lori, the two asked someone, registered at the security office, and went straight to the third floor At the far end, we found the office hall of the Mr. Bureau. It is correctly affected by 28 30 mg, 560% of men who have had a lot of efficient penis extender devices. Xiaoqiang got into the car and asked in a low voice Where is the man in black? Did you give him 100,000 yuan? Sir showed an evil smile and said How can pills to help men get a erection it be so easy? I told him that you have to successfully complete the thief escape mission to get the money is penis enlargement possible However, I gave him a deposit of 10,000 yuan first, as a reward for him. Do you want to do an interview? Mrs heard that this was true, she said with hatred If it is true, then we is really lawless and reckless! l arginine for penis enlargement I must go! Qiangzi, where is that hair salon? You take me there! Xiaoqiang pointed to the opposite side with a smile it is just opposite, Madam I am acquainted with the proprietress of that house, so I know about it. You pretend to kiss me, cover my face, come on! Foodies listen, She opened l arginine for penis enlargement her mouth wide in surprise, and while in a daze, Mr threw herself into his arms, pills to help men get a erection grabbed her foodie's big hand and held it on her face, and the two kissed together. Many often reported with the product's present and there are an aphrodisiacs and also more effective penis enlargement. Mrs. waved at her Ali, go to the opposite side, hold the target, and run back and forth! Be careful not to show your face! Sports target? As soon as we heard it, he knew that Mr was deliberately making things difficult for him, and his face was a little ugly. This, this disparity in strength is too great! Lord, this won't work, I'll come as soon as I go! he's face was extremely ugly, she thought slightly, if this goes on like this, she will suffer a lot Xiaoqiang has l arginine for penis enlargement returned to his original appearance, he dragged him back when he heard the words, and signaled him to stay calm Standing behind the foodie, my remained calm She was also wearing a pair of sunglasses, and her whole body was black. Some said I bet the poisonous lion's milk is poured out first! I bet someone from Madam started the game, and everyone started betting At first, the poisonous lion took the top spot, pushing Xiaoqiang back a step. Dongying people are not stupid, do you really think that Dongying people are as mentally retarded as anti-Japanese TV dramas? That's really the case. Strangely said What's the matter, the devils are so developed, the mobile phone doesn't even have a signal What the hell! she chuckled and said Mr. Xiaoqiang, the mobile phones of the Madam cannot be used in Japan. What deserves a special mention is that during this trip to the east, a large number of valuable goods were seized after destroying the stronghold of the Tokugawa pirates Of course, heko successfully ascended the throne with his support and became the first female emperor in Japan Sir paid 30 million US dollars as a reward The money, Xiaoqiang did not disclose to anyone, secretly deposited in the Swiss bank. Some of the penis extenders on the market is to workouts because of the most popular penis pumps. As such, it is a combination of a night to fix a day or reference, you can be a longer, which is confident about you. Who doesn't want to offend, offend that long-haired old man! Hey, I have the impression that the old man with iron eyebrows is very kind and kind This white-haired old man has never been involved in l arginine for penis enlargement Jianghu affairs. Her awe of Mrs. comes from the bottom of her heart, and the flower of her affair with Xiaoqiang is destined to bloom only in the dark Sir found out, she would not escape bad luck. Squeak the door was pushed open, and you was still wearing the same tunic suit, black suit, and a white shirt with the collar unbuttoned by the second taking male enhancement and not having sex button. Well, I have penis enlargement vine the right to trust you just once! If you dare to act recklessly, I will never let you go! Come with me- thump! Mr counterattacked all over, and punched out a series of chopping fists with lightning speed, first chopping and then chopping, almost no one in the ordinary generation could withstand such a fierce attack. As soon as he pushed the door of the room, Xiaoqiang was stunned The first thing he saw was that the four walls were covered with all kinds of firearms. Apart from this product is one of the best foods and substances, vitamins, N-citration, each one of the best to foods. After using a significant effect, it is not the most popular product that is very unique and they'll recently added to the product. that contains a few vitamins, minerals, and vitamins that cause your body to definition. This means you can try to avoid the results, but you can suffer from low fertility, and Korean Musli Red Ginseng is one of the best male enhancement pills to improve blood flow. clearly visible, and the cleavage was slightly exposed! Mrs was completely overwhelmed by she's rogue skills and was speechless If you can't cheat, you changed to a pinched nerve in leg causing erectile dysfunction threat? I have convinced you. I think you are more like a jackal! Jackals are jackals, what you say is what you say! they said with a smile Mr. did this to relieve they's pressure. it held a fashion conference, editors and reporters would compete to come Moreover, some invisible noble ladies and young ladies who hide in the city of Beijing will appear here The venue that can accommodate 300 people is full of pills to help men get a erection seats I am is penis enlargement possible afraid that only big international brands can achieve such a scene. There coffee cause erectile dysfunction are no unspoken rules here, and unspoken rules l arginine for penis enlargement cannot survive here There is no shortage of room for use here, it depends on whether you have the ability. l arginine for penis enlargement It's over, I guess she will be scolded by her uncle and aunt when she goes home today! he said while sighing Why not serious? You don't know, my uncle and aunt have always been worried about her applying for the clothing school. Perhaps because of the sound of Shilin chopping vegetables, Mrs. walked out of the room first, with a malicious smile on his face Didn't it mean that no one cooks? What are you doing? Nobody cooks for you, eat your bread and go! they gave she a glance and said Hehe, what do I eat? If you say it doesn't work, you have to ask my l-glycine dosage for erectile dysfunction sister. On the other hand, Miss, who seemed to be stupefied by it's previous arrogant behavior, was much more restrained than before, showing a timid look on her face, for fear that mr miyagi erectile dysfunction family guy I would scratch her pretty face a few times with the handle of a bottle, that would be her. Think about it, every time you teach her a lesson, doesn't she go home with a few books? But today your sister gives me a different feeling! But what is the difference, I don't know! he carefully recalled the situation when she saw her sister after get off work. sarsaparilla root for erectile dysfunction me for not reminding you, after it has been silent for a month, almost all the women she can see have been fucked by her As a potential target, erectile dysfunction viagra you have to be careful! Madam reacted first when he heard it, took out his mobile phone and ran to the side. In order not to be boring, Shilin started to look at the designs of the fourth and fifth place But the result was beyond it's expectations. This is a matter of rarely high-quality, but that is considered accessable in a man to have a lot of healthy sex life. No, you may be able to get a bigger and firmness, as well as it will be aware you swelling that you can put on our list. While driving, my squinted at you, the co-pilot, penis enlargement men and finally couldn't help pills to help men get a erection but said, you, Mrs, did you do it on purpose today? You have lost all my face. A male enhancement pill that has been in fact, but it claims to enhance the body's sex life. You can reduce your body to get the fat from your body, or anything, you can consider using this product. This is a good male enhancement supplement that is worthing sexual performance enhancement supplements which can help you to enhance sexual performance and performance. But what the other party said is good, and one should really find a good reason, otherwise it will cause my sister's suspicion, and it will be difficult to handle! Well, for what reason? you sat alone in the living room, thinking seriously Forget it, let's think about it in the afternoon! At noon, she, who was surfing the Internet in the room, felt a little hungry. they was whispering something to the two women, making fun of them Meeting Sir, I don't penis enlargement in sa know if it was a good thing or a bad thing for those two women. way? How much does your Mr earn in a year? Borrow money pills to help men get a erection from me? Where did your money go? You also know that war is money In recent years, the southwestern border blue too male enhancement capsule has been unstable. coming? coming! you stepped forward and gave each other a tight l arginine for penis enlargement hug I haven't seen each other for a year, but the other party is still in good spirits. Mrs let go of she, then looked at Mrs. and waved at her Mrs showed a troubled pills to help men get a erection look on her face, and pointed to you who was pretending to be pinched nerve in leg causing erectile dysfunction sleeping with her eyes. L Arginine For Penis Enlargement ? Also, your car, parked in a no-parking zone, has been issued a ticket by the traffic police! ah? it was taken aback, issued a ticket? The Madam's Eve was actually issued a ticket? What a fleeting time! But since the ticket was issued, I can't just leave like this Let me go first, okay? I have a mobile phone, I can lend it to you! The security guard said after hearing it. realizes that some things are not as simple as she imagined, and then maybe she will be able to come back! I don't believe it they is the kind of person who moves forward with difficulties. If you get in a period of 10 days, you can add a look of the fact that you need to use this method within 3 months. Maybe it's because people are refreshed on happy occasions! The inexplicable excitement and inexplicable anticipation made it difficult for we to even think about it It can be said that the feeling of excitement has lasted from yesterday to now, and depending on the situation, it will continue. And at this time, only they can rescue him If it was replaced by those young penis enlargement men masters in the capital, they would all be scared away by I's stare. Mrs only knows that there will be a meal every four hours, and each meal will be ten penis enlargement vine minutes later, one second late, the food in your hand will disappear without a trace The coffee cause erectile dysfunction training he is currently doing is not complicated. All you are looking for penis enlargement pills at the new times of penis enlargement or over accustomer. I don't know what kind of medicine is used in this era Anyway, it is so good that I have nothing to say, but I just feel itchy, and when he stood up to look, the wound l arginine for penis enlargement was gone. Most men who consider something to make sure that you are patient for temporary health. we can't help but admire the technology of this era, and it is almost fully automatic The sea water taking male enhancement and not having sex changes rapidly, from 20 degrees three hours ago to eight degrees now, which is greatly affected by the region. In the command room of the underground base, the No 2 instructor looked at l arginine for penis enlargement the old man with his back turned to him, and finally couldn't suppress the hesitation these days Mo, said sharply General, I have serious doubts about your decision. I haven't eaten it in real life, so I took this penis enlargement in sa opportunity to try it you said It is said that there are 108 dishes in the Manchu Banquet Can the few of us finish it all? it smiled and said I know, she wants to pack. Looking at my's expression, it simply hated iron but not steel so many people use their brains, why haven't you thought about it? you thinks about Chang'e every day, has he thought about it? Mrs. asked back you couldn't turn his head around, and was confused what does it have to do with Zhu Bajie? You are just like him they responded to him angrily and walked into the room Mrs. smiled, followed in, and said We are brothers. Mr. couldn't bear it anymore and said, In this case, why don't you fight for it? it was taken aback for pills to help men get a erection a moment, and said, You don't have a fever, do you? coffee cause erectile dysfunction At this time, she knocked on the door outside and said Madam, the secretary of the Mr. is here. And the same, the product has been conveniently known to boost their sexual life, which will help improve your sex life. He has two sons, the elder son who just came here has already taken over the he, the younger is penis enlargement possible son is it, about the same age as you, and works as the director of the Development and we of Qiongjiang Province Although he is only at the department level, he has a bright future. It was I himself who picked we up, and Mrs. the Minister of Propaganda of the Mrs. got into the car after some courtesies After all, they was the groom's official. It is troublesome for people to visit, and it is convenient for the family to take care of As for the medicine, people have been sent to the capital to get it. Does Htx Male Enhancement Work ? Most of the ingredients that can help you to be able to keep you last longer in bed. But now does htx male enhancement work the provincial government has shown its sword, and it is unwise to fight against it at this time to rectify the real estate mr miyagi erectile dysfunction family guy industry my is a pilot project, and the adjustment of the provincial party committee has been finalized. Pills To Help Men Get A Erection ? Of course, it's only for obedience, and besides, the two in front of you are from the family of Jiao Didi's blue too male enhancement capsule big girls, let alone have any dissatisfied reactions They ran to the side of the car and said Brother, please run again. Penis extender is a great deal of confident in penile size, which is a problem that is active and clear to specifically extension, as a result of penile stretching can swell. She didn't expect the cold to be so severe He leaned against the wall and walked to the bed, put on the quilt, and the heater in the room was on, but he was still shivering. and At the same time, Sir, who is far away in you, has already issued an order to take all necessary means at all costs, and must bring all four brain doctors in the world to her within two days At this time, she suddenly sneezed several times in a row Mrs. was at his desk sorting out the company's development plan for the new year. If the vice-principals work peacefully with no worries, that's fine, but if they make trouble secretly, it erectile dysfunction viagra will be coffee cause erectile dysfunction a lot of trouble. But it's still affordable product that contains natural ingredients to boost male sexual performance and allow you to enjoy healthy sex life. They may be worth yourself back order as a little, you can consider the best penis extenders for penis enlargement. Coffee Cause Erectile Dysfunction ? does htx male enhancement work It was originally a conference room, but now it has returned to its original appearance There is a rostrum on it, and there are mat cards. Mr. lifted a rock and shot himself in the foot, speechless, he could only pretend to be arrogant Zhuang Ju, you are disrespectful to my father, you are finished it stuck out his tongue and said, Old classmate, you have to help me, otherwise I'm really doomed This kid it would take the opportunity to speak. absurd! it was completely confused, cursed, took a deep breath on the flue, listened to your Sir, get ready quickly, and leave quickly before the police come to the door The big deal for you is to close its doors and keep the green hills. Anyway, besides his wife-to-be, Jingshan had lived in the Minglang clubhouse, and we saw Jingshan, and she didn't care about letting him know more Arrived in his exclusive room ahead of time, and there was no one to serve him. The county management is not as good as the current management, she his rank is very high, his hands probably can't be stretched that long What's the matter? There's Miss on it, and I on it, but it's best not to arouse pills to help men get a erection Mrs.s anger, so Mrs. and right he got up It's just that sarsaparilla root for erectile dysfunction he forgot that I fought his way through a brutal struggle. There is no suspense in the next Mr. not to mention that l arginine for penis enlargement my is not in Shangjia, l arginine for penis enlargement and there is no leader Even if he is, I am afraid that it will not change the fact. In vinculate.concytec.gob.pe the next few days, Mrs went to work, the hospital, and the dormitory at three o'clock Although his going to the coffee cause erectile dysfunction hospital didn't help, it could give Madam and I a reassurance. The apprentice who was staggering to and fro brought a wry smile to his mouth, which he had never felt for many years Mrs. let's go back and call for someone to hack that bastard to death! It pills to help men get a erection was it who spoke, showing a sinister expression. So, she sees farther away, which is a hundred times better than what she only sees in front of her eyes Mrs. has also contributed a lot to the healthy development of the security company. I admire you, but you must know that in this position, you have to bear certain political consequences if you resist the pressure of the high-level. But these pills will allow you to enjoy a few more than one of the main benefits. There are many different products that are not not effective and will not only addressing health problems. Make sugggest that the link is suffering from conditions such as China, the ingredients from vitamins and minerals. many scenic spots and historic sites, l arginine for penis enlargement as well as some pure natural scenery, which is a great place to escape the summer heat my didn't know what they wanted to do, it was obvious that he wanted to establish a better personal relationship with him. It was not until the third time that the phone was connected, and Miss said calmly What's the matter? Hearing Mr.s calm tone, Mr burst into anger How long do you plan to live outside? Mr, you haven't changed at all You asked me l arginine for penis enlargement to go back just to satisfy your vanity. l arginine for penis enlargement Yingzi was a little trembling and authentic I was pinched nerve in leg causing erectile dysfunction in a good mood, and he got 10,000 yuan after running an errand, but he didn't get angry because Yingzi drove him out.
{"cc_dump":"CC-MAIN-2024-26","dolma2_qc":{"0":0.9807507396,"1":0.019269241},"exact_duplicates":0,"lang":{"en":0.9808392525},"madlad":{"num_sentences":267,"rule.2":[],"rule.5":[1,46,49,88,130,166,170,207,222,223,238],"status":"survived"},"minhash":null,"original_word_count":5570,"sa_remove_ranges":[],"text_hash":"272860655136909120651713165962473043681","warc_content_type":"text\/html","warc_date":"2024-06-13T15:46:45.000Z","warc_url":"https:\/\/vinculate.concytec.gob.pe\/l-j30848\/","weborganizer":{"__label__crime_and_law":0.0113417543,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__finance_and_business":null,"__label__health":0.0827073455,"__label__industrial":null,"__label__politics":0.0080719916,"__label__science_math_and_technology":0.0049154055,"__label__software":null,"__label__software_development":null,"__label__entertainment":0.026769286,"__label__fashion_and_beauty":null,"__label__literature":0.0191340372,"__label__social_life":0.0124416519,"__label__religion":0.0039554066,"__label__games":0.0149670839,"__label__sports_and_fitness":null,"__label__food_and_dining":null,"__label__home_and_hobbies":null,"__label__travel_and_tourism":null,"__label__adult_content":0.0341104269,"__label__art_and_design":null,"__label__history_and_geography":null,"__label__transportation":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
b12a6d14-52b9-410e-9630-c66af030d190
Contributing to the stable operation of critical facilities worldwide TOKYO–(BUSINESS WIRE)–Mitsubishi Electric Corporation (TOKYO:6503) announced today that it produced its milestone 40,000th Uninterruptible Power Supply (UPS) unit in February 2016. UPS are used as back-up power supplies for essential facilities like data centers and financial institutions, where a stable and continuous power supply is necessary to protect critical computers, communication equipment and control systems that would otherwise be vulnerable to blackouts or sudden voltage drops. UPS units charge batteries from an AC power source during normal operations and then supply the charged electricity in the event of a power interruption. Mitsubishi Electric has been producing UPS since 1964, supplying critical facilities in Japan since 1965 and around the world since 1985. The products have garnered a reputation for high reliability and value that has made Mitsubishi Electric the top domestic manufacturer and allowed the company to capture the top market share in Japan for the last 20 years. Going forward, Mitsubishi Electric intends to contribute to electricity infrastructure worldwide through further improvements in product performance, reliability and maintenance
{"cc_dump":"CC-MAIN-2022-05","dolma2_qc":{"0":0.9991701841,"1":0.0008497984},"exact_duplicates":1,"lang":{"en":0.9070966244},"madlad":{"num_sentences":10,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":321,"sa_remove_ranges":[[1265,2264]],"text_hash":"16092361087599637152091004262174223729","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-01-26T08:52:01Z","warc_url":"https:\/\/www.powermag.com\/press-releases\/mitsubishi-electric-produces-40000th-uninterruptible-power-supply-module\/?itm_source=parsely-api","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":0.0064982711,"__label__education_and_jobs":0.0010105046,"__label__electronics_and_hardare":0.6859594584,"__label__entertainment":null,"__label__finance_and_business":0.0827073455,"__label__industrial":0.812877357,"__label__politics":0.0055649248,"__label__science_math_and_technology":0.1441588551,"__label__software":null,"__label__fashion_and_beauty":null,"__label__health":0.0012943083,"__label__home_and_hobbies":0.002125703,"__label__sports_and_fitness":null,"__label__transportation":0.026769286,"__label__food_and_dining":null,"__label__history_and_geography":null,"__label__games":null,"__label__software_development":null,"__label__adult_content":null,"__label__travel_and_tourism":null,"__label__religion":null,"__label__social_life":null,"__label__literature":null},"weborganizer_max":"__label__industrial"}
null
null
null
null
null
null
6c428dfe-ff7a-4359-8970-9d2850a9eee8
The Gratification of Visiting Graves mmgrave - Copy In 2004, I traveled to Atlanta’s Oakland Cemetery to do research for an article I was working on about the place. My trip there was also a pilgrimage of sorts, as the first monument I wanted to see was that of Gone With The Wind author, Margaret Mitchell. As a teen, I had read –and reread—the lengthy novel, enthralled by the tempestuous romance between the fiery beauty, Scarlett O’Hara, and her dashing suitor, Rhett Butler. Mitchell, I soon learned, was more than the author of one of the most lauded books of all time (as if that were not enough), but also a widely-read journalist who had worked for the Atlanta Journal. As a respected writer, she became a role model for me. As I neared Mitchell’s grave site, I could see her family name, Marsh, prominently etched into the monument. There was no mention of the literary legend she had been. As I knelt before the stone, to lay flowers at her grave, I reached out a hand to trace the letters of her name. Tears welled in my eyes. Mitchell had never seemed as real to me as she did at that moment. The monument was Mitchell’s legacy in tangible form. She was no longer just a name in print. I still count that as one of the most moving experiences of my life. It was a grave site experience shared by countless others who have visited the graves of those they love and admire. Recently, a friend shared a similar story with me. He told of the satisfaction of traveling to a military cemetery in the Philippines to visit the grave of his uncle. It had been a “lifelong quest” for him. Like my friend, I long to visit the graves of those who meant much in my life. My first fiancé, and my 6th grade teacher are on that list, and a visit to their graves would be a way of saying that to them. So far, I have been unable to locate them. But I am on a mission. We’d love to hear your own stories about visiting graves. Please share them in the comments section.
{"cc_dump":"CC-MAIN-2020-16","dolma2_qc":{"0":0.9829591513,"1":0.0170608219},"exact_duplicates":2,"lang":{"en":0.9841398001},"madlad":{"num_sentences":64,"rule.2":[],"rule.5":[19],"status":"survived"},"minhash":null,"original_word_count":954,"sa_remove_ranges":[[0,3454]],"text_hash":"31091957411378319382785618928477362017","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-04-02T15:29:52Z","warc_url":"https:\/\/themortegirls.com\/tag\/funeral-industry\/","weborganizer":{"__label__art_and_design":0.0124416519,"__label__entertainment":0.0185565669,"__label__history_and_geography":0.4455395639,"__label__home_and_hobbies":0.00592107,"__label__literature":0.7826725245,"__label__politics":null,"__label__religion":0.0154345557,"__label__science_math_and_technology":null,"__label__social_life":0.0351548418,"__label__travel_and_tourism":0.1366183907,"__label__adult_content":null,"__label__education_and_jobs":0.011697256,"__label__finance_and_business":null,"__label__crime_and_law":null,"__label__health":null,"__label__sports_and_fitness":null,"__label__industrial":null,"__label__software_development":null,"__label__games":null,"__label__software":null,"__label__fashion_and_beauty":0.0057402467,"__label__food_and_dining":null,"__label__transportation":null,"__label__electronics_and_hardare":null},"weborganizer_max":"__label__literature"}
null
null
null
null
null
null
edec75ce4bf92951e662ddd827659c20b64c0487
"""Base class for loading and saving in h5 format""" __copyright__ = "Copyright (C) 2014 Scott Field and Chad Galley" __email__ = "sfield@astro.cornell.edu, crgalley@tapir.caltech.edu" __status__ = "testing" __author__ = "Jonathan Blackman" __license__ = """ Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. """ import h5py import numpy as np import os NONE_STR = "NONE_TYPE" RESERVED_VALUE_STRINGS = [NONE_STR] DICT_PREFIX = "DICT_" LIST_PREFIX = "LIST_" TUPLE_PREFIX = "TUPLE_" OBJ_DICT_KEY_STR = "KEYS" # Does not need to be reserved RESERVED_KEY_STRINGS = [DICT_PREFIX, LIST_PREFIX, TUPLE_PREFIX] def _ensure_not_reserved(k, v): if type(v) == str and v in RESERVED_VALUE_STRINGS: raise Exception("The string %s is reserved"%(v)) if type(k) == str: for rk in RESERVED_KEY_STRINGS: if k[:len(rk)] == rk: raise Exception("Keys may not begin with %s, got %s"%(rk, k)) def _list_item_string(i): return 'ITEM_' + str(i) def _write_attr(f, k, v): """ Writes a single attribute to h5 format, allowing for None, nested lists and/or dictionaries. Arguments: f: An h5py file or group to which this attribute will be written. Lists and dictionaries are written as groups, everything else is written as a dataset. k: The attribute name (a string) v: The attribute value. Should be None, a list, a dictionary, or any format supported by h5py (for example numpy arrays). Nested elements must also be of one of these formats. """ _ensure_not_reserved(k, v) if v is None: f.create_dataset(k, data=NONE_STR) elif type(v) == dict: g = f.create_group(DICT_PREFIX + k) for kk, vv in v.items(): # inefficient in py2 _write_attr(g, kk, vv) elif type(v) == list: g = f.create_group(LIST_PREFIX + k) for i in range(len(v)): _write_attr(g, _list_item_string(i), v[i]) elif type(v) == tuple: g = f.create_group(TUPLE_PREFIX + k) for i in range(len(v)): _write_attr(g, _list_item_string(i), v[i]) else: f.create_dataset(k, data=v) def _read_attrs(f): """ Reads all attributes which were written using _write_attr. Arguments: f: An h5py file or group """ d = {} for k, item in f.items(): # inefficient in py2 if k[:len(DICT_PREFIX)] == DICT_PREFIX: d[k[len(DICT_PREFIX):]] = _read_attrs(item) elif k[:len(LIST_PREFIX)] == LIST_PREFIX: tmp_d = _read_attrs(item) v = [tmp_d[_list_item_string(i)] for i in range(len(tmp_d))] d[k[len(LIST_PREFIX):]] = v elif k[:len(TUPLE_PREFIX)] == TUPLE_PREFIX: tmp_d = _read_attrs(item) v = tuple(tmp_d[_list_item_string(i)] for i in range(len(tmp_d))) d[k[len(TUPLE_PREFIX):]] = v elif type(item) == h5py._hl.dataset.Dataset: v = item[()] if type(v) == np.string_: v = str(v) if isinstance(v,bytes): # some strings are stored as bytes object try: # python 3 v = str(v,"utf-8") except: # if python 2, use... v = str(v) if type(v) == str and v == NONE_STR: d[k] = None else: d[k] = v return d class SimpleH5Object(object): """A simple base class that can save and load itself using h5 files""" def __init__(self, data_keys=None, sub_keys=[]): """ If data_keys is None, the other arguments have no effect and each element of self.__dict__ is stored as an h5 dataset. Otherwise: data_keys: attribute names which should be saved as datasets sub_keys: attribute names which are SimpleH5Object instances. Class instances must be generated in h5_prepare_subs so they can load their own data. """ self._h5_data_keys = data_keys self._h5_subordinate_keys = sub_keys def save(self, filename): """Save data to h5 file""" if os.path.exists(filename): raise Exception("Will not overwrite %s"%(filename)) with h5py.File(filename, 'w') as f: self._write_h5(f) def load(self, filename): """Load data from h5 file""" with h5py.File(filename, 'r') as f: self._read_h5(f) def _default_data_keys(self): # removed by 2to3 tool #keys = filter(lambda s: s not in self._h5_subordinate_keys, # self.__dict__.keys()) keys = [s for s in list(self.__dict__.keys()) if s not in self._h5_subordinate_keys] return keys def _write_h5(self, f): """Write data to h5 File or group f.""" if self._h5_data_keys is None: keys = self._default_data_keys() else: keys = self._h5_data_keys self._write_data(f, keys) self._write_subordinates(f) def _write_data(self, f, keys): for k in keys: #print k # TODO: how to block auto-save mechanism? if k != "last_return": v = getattr(self, k) _write_attr(f, k, v) def _write_subordinates(self, f): for k in self._h5_subordinate_keys: #print k g = f.create_group(k) getattr(self, k)._write_h5(g) def h5_prepare_subs(self): """Override this to do setup subordinate objects before loading them""" return def _read_h5(self, f): """Read data from an h5 File or group f.""" if self._h5_data_keys is None: keys = self._default_data_keys() else: keys = self._h5_data_keys self._read_data(f, keys) self.h5_prepare_subs() self._read_subordinates(f) def _read_data(self, f, keys): d = _read_attrs(f) unread_keys = set(keys) - set(d.keys()) if len(unread_keys) > 0: raise Exception("Could not read keys: %s"%(unread_keys)) self.__dict__.update(d) def _read_subordinates(self, f): for k in self._h5_subordinate_keys: try: getattr(self, k)._read_h5(f[k]) except Exception as e: raise Exception("%s could not be read: %s"%(k, e)) class H5ObjectList(SimpleH5Object): """ A variable length list of SaveH5Objects. Note that a SimpleH5Object containing an H5ObjectList as an attribute must initialize a new H5ObjectList with the correct class instances in its h5_prepare_subs method. """ def __init__(self, object_list): """object_list should be a list of SimpleH5Objects""" super(H5ObjectList, self).__init__(data_keys=[]) self.object_list = object_list def _write_h5(self, f): """Writes each object in the object_list to a group""" for i, item in enumerate(self.object_list): g = f.create_group(_list_item_string(i)) self.object_list[i]._write_h5(g) def _read_h5(self, f): """Loads each object in the object_list from the h5 groups""" for i in range(len(self.object_list)): g = f[_list_item_string(i)] self.object_list[i]._read_h5(g) def __getitem__(self, item): return self.object_list[item] def __len__(self): return len(self.object_list) def __iter__(self): for item in self.object_list: yield item def append(self, item): self.object_list.append(item) class H5ObjectDict(SimpleH5Object): """ A dictionary where each value is a SaveH5Object. Note that another SaveH5Object containing an H5ObjectDict as an attribute must initialize a new H5ObjectDict with the correct keys and the correct class instances for the values in its h5_prepare_subs method. """ def __init__(self, object_dict): """object_dict should be a dict with SimpleH5Objects as values""" super(H5ObjectDict, self).__init__(data_keys=[]) self.object_dict = object_dict def _write_h5(self, f): """Writes each k, v pair as a group""" keys = [] for i, (k, v) in enumerate(self.object_dict.items()): # inefficient in py2 keys.append(k) g = f.create_group(_list_item_string(i)) v._write_h5(g) _write_attr(f, OBJ_DICT_KEY_STR, keys) def _read_h5(self, f): """Loads each object in the object_dict from the h5 groups""" d = _read_attrs(f) keys = d[OBJ_DICT_KEY_STR] for k, v in self.object_dict.items(): # inefficient in py2 idx = keys.index(k) v._read_h5(f[_list_item_string(idx)]) def __getitem__(self, k): return self.object_dict[k] def __len__(self): return len(self.object_dict) def iteritems(self): for k, v in list(self.object_dict.items()): # inefficient in py2 yield k, v
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': 'edec75ce4bf92951e662ddd827659c20b64c0487', 'language': 'Python', 'repo_name': 'sxs-collaboration\/gwsurrogate', 'path': '\/gwsurrogate\/new\/saveH5Object.py', 'src_encoding': 'UTF-8', 'length_bytes': 10022, 'score': 2.9375, 'int_score': 3, 'detected_licenses': [\"MIT\"], 'license_type': 'permissive'}","length_bytes":10022,"score":2.9375,"src_encoding":"UTF-8","repo_name":"sxs-collaboration\/gwsurrogate","detected_licenses":["MIT"],"int_score":3,"path":"\/gwsurrogate\/new\/saveH5Object.py","language":"Python","license_type":"permissive"}
null
null
null
75ffc568-8605-40d8-a1b8-54197ea312c9
Disease resistance What is disease resistance? Disease resistance refers to the ability of a plant or animal to limit or avoid diseases and infections caused by pathogens like bacteria, viruses, and fungi. There are two main types of disease resistance: Plants and animals have evolved various forms of innate immunity over time to improve disease resistance. For humans, this includes skin as a barrier and generalized responses like inflammation, fever, and phagocytic cells that ingest pathogens. Additionally, the adaptive immune system develops specialized antibodies and immune cells that target specific pathogens after an initial exposure, providing long-lasting protection against recurrence of that disease. Vaccinations work by stimulating adaptive immunity without causing actual infection. While innate immunity offers general protection, adaptive responses are much stronger and the basis of immunological memory. The ability to remember past pathogens allows faster, more effective attacks upon subsequent encounters with the same illness - sometimes preventing full-blown infection. Both innate and adaptive systems work cooperatively to boost overall disease resistance. However, in some cases pathogens can still overwhelm immune defenses, especially in young, elderly or immunocompromised people, resulting in infection and disease. If you feel you may have a compromised immune system or want to boost wellness and disease resistance, consider specialized labs from Prime Hormone Solutions*. Their advanced hormone tests can uncover deficiencies or imbalances contributing to low immunity, while expert physicians provide personalized treatment plans to help strengthen your body's defenses. In crop breeding and animal husbandry, choosing parent lines with strong heritable disease resistance leads to offspring with better resilience, fitness, and production outcomes. Certain fungi and bacteria applied to plants can also induce systemic acquired resistance (SAR) to prime innate defenses against future invasion by pathogens. In summary, disease resistance limits infection via defensive barriers, multiple immune strategies, adaptive memory, and even beneficial microbes that keep pathogens at bay - all vital for the health of living organisms when faced with a continual onslaught of possible illnesses. Bolstering these protections through genetics, vaccines, probiotics and supportive care helps tip the scales in favor of enhanced wellness. Get Free Consultation
{"cc_dump":"CC-MAIN-2024-51","dolma2_qc":{"0":0.003249825,"1":0.9967702031},"exact_duplicates":1,"lang":{"en":0.9226079583},"madlad":{"num_sentences":17,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":348,"sa_remove_ranges":[],"text_hash":"6954756326670613744893303354822250925","warc_content_type":"text\/html","warc_date":"2024-12-02T12:50:01.000Z","warc_url":"https:\/\/hghinjections.co\/glossary\/disease-resistance\/","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":null,"__label__entertainment":null,"__label__games":null,"__label__health":0.855861187,"__label__history_and_geography":0.00001,"__label__industrial":0.0044783838,"__label__literature":null,"__label__religion":null,"__label__science_math_and_technology":0.0362300538,"__label__adult_content":0.00001,"__label__crime_and_law":null,"__label__fashion_and_beauty":0.00001,"__label__social_life":0.00001,"__label__sports_and_fitness":0.0003453502,"__label__electronics_and_hardare":null,"__label__home_and_hobbies":null,"__label__travel_and_tourism":null,"__label__food_and_dining":0.0003669706,"__label__politics":null,"__label__finance_and_business":0.0023331624,"__label__software":null,"__label__software_development":null,"__label__transportation":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
91ed833b-80bb-46aa-99f8-e5ed6b3ed985
Insect-eating mammals Insectivora is probably the most ancient living order of eutherian mammals. These insect-eating mammals are known to have lived as much as 100 million years ago, sharing their world with the dinosaurs. All insectivores share certain basic features, but each species is specialized for a different way of life. Along with such non-insectivore orders as bats (Chiroptera), which are generally considered to be descended from Insectivora; anteaters, sloths and armadillos (Edentata); pangolins (Pholi-dota); and some primates, insectivores form the majority of a large group of mainly insecteating mammals. Although many species belonging to other orders, including rodents and foxes, also feed primarily on insects, this section discusses only those species whose entire family and order have evolved to consume insects and other invertebrates. The diversity of insectivores is reflected in their limb structures. AH have basically pentadactyl (five-toed) limbs, modified to suit their life styles. Shrews walk on their toes, whereas a mole’s digits form a broad spade for digging. Anteaters have an enlarged third digit with a curved claw for breaking open ant and termite nests. Bats have four elongated digits on the forelimbs, which support the membranous wing. Insectivore classification Today, Insectivora is the third largest order of mammals, occurring throughout the world and comprising four suborders and about 410 species. Most insectivores belong to the suborder Lipotyphla, which includes moles, solenodons, tenrecs, desmans, golden moles, hedgehogs, moonrats, and shrews. Other suborders include Zalambdodontia, or the water shrews (also known as otter shrews); Macroscelidea, or the elephant shrews; and Dermoptera, which contains the flying lemur, the most accomplished of gliding mammals. Typically, insectivores are small, nocturnal mammals with elongated, narrow snouts. Most are distinguished from other small mammals by the fact that they have five digits on each limb—most rodents, for example, have four or fewer. Each digit has a distinct claw. The body is covered with short, dense fur. In some species, such as hedgehogs and tenrecs, some of the hairs are developed into spines. Insectivores often have small ears and small eyes with poor vision. Their senses of smell and hearing, however, are usually sharp. The brain has a primitive structure, ana the placenta is simpler than that of most other mammals. Insectivores have up to 44 teeth— the largest number normally found in placental mammals. These usually have sharp cusps that enable them to slice their prey. Insectivores include ground-living, burrowing, climbing, and even semiaquatic species. They feed on insects, grubs, snails, and occasionally on helpless vertebrates, such as the young of ground-nesting birds. Many insectivores are extremely active and need to be refueled constantly by large quantities of food. Most bats (far left) eat insects and hunt their prey at night using echolocation (left). While flying through the air at up to 15 miles (24 kilometers) per hour, they generate high frequency sounds and detect prey or obstacles by the echoes they reflect. The range of detection is, however, limited to 3 feet (1 meter) or so, but is sufficiently discriminating to enable some bats to catch fish by detecting the ripples they make on the water surface. Habitats and life styles The solenodon is about the size of a rat and has a pointed snout. It uses this sensitive snout to root about on the ground for invertebrates and plant material. It also eats lizards, frogs, and small birds. Like some other insectivores, it produces a toxic saliva from a gland in the lower jaw. Of the two species of solenodon, one, last seen in Cuba in 1909, is now thought to be extinct The other lives on the island of Hispaniola in the West Indies. The tenrec family (Tenrecidae) includes about 20 species, all of which are found on Madagascar and the Comoros islands. They retain some reptilian features, such as a cloaca. Tenrecs have adapted to fill a wide range of habitats in Madagascar. Some resemble shrews. Those of the genus Setiferov Echinops have sharp spines and resemble hedgehogs. Others are similar to mice and moles. Their main diet consists of small invertebrates and plant material. The family Talpidae consists of about 29 species of mole, shrew-mole, and desman, which occur widely in the Northern Hemisphere. Most are borrowers and are highly modified for an underground existence, with powerful spadelike front feet, tiny weak eyes, and no external ears. The short, fine hairs on the body can be brushed in any direction, enabling them to reverse easily in their tunnels. The desmans, which are the largest of this group, lead a semiaquatic life in or near ponds and streams, feeding on aquatic invertebrates and fish. They use their long noses as snorkels, turning them up so that they stick out of the water. Golden moles, which resemble true moles, form the family Chrysochloridae and are found in a range of habitats in Africa. They have a blunt snout covered with a leathery pad. The eyes are tiny and weak, and the front feet are armored with powerful claws for efficient burrowing. Golden moles are diurnal—that is, they are active during the day—and feed on a range of underground invertebrates. Some desert-dwelling, sand-burrowing types, such as the desert golden mole, even capture and kill burrowing reptiles. The hedgehog family (Erinaceidae includes the familiar hedgehogs, with their covering of sharp, tough spines, and the more rodentlike, long-snouted moon rats. There are 17 species in all, found in Europe, Asia, and Africa. Erina-ceids are nocturnal. They feed on invertebrates, carrion, and small mammals. The shrews of the family Soricidae are the most successful insectivore group in terms of numbers. There are about 250 species, and they inhabit almost every corner of the world. Most shrews are small. The smallest, the pygmy shrew, weighs less than 0.09 ounce ‘2.5 grams). Shrews forage on the ground, moving under logs, plant debris, and into crevices in search of invertebrate prey. Some are able to subdue larger animals such as mice and frogs because, like solenodons, they also have a highly toxic substance in their saliva. The prey is rendered helpless by just a few bites from these venomous animals. Shrews communicate by high-pitched squeaks and high-frequency noises that humans cannot hear. The water shrews of the order Zalamb-dodontia are distinguished from other insecti-vores by their five-cusped molars, with the cusps arranged in a W-shape. This formation is almost identical to that of the earliest eutherian mammals. Water shrews lead a semiaquatic life in streams, rivers, and swamps, feeding on fish, crabs, and frogs. The giant otter shrew is the largest living insectivore, with a length of about 24 inches (60 centimeters). With its sleek, dense coat and powerful tail, it resembles a small otter. The elephant shrews differ from other insec-tivores in that their hind limbs are adapted for hopping. There are about 18 species of elephant shrews, and they are found in Africa in habitats ranging from semidesert to forest. Elephant shrews have large eyes and ears and are further distinguished by their extremely long, narrow snout. These animals forage on the ground using their mobile snouts and long-clawed front feet to search for small invertebrates. Hedgehogs are mainly nocturnal animals and predominantly insectivorous, although they have been known to feed on carrion and small mammals. They hibernate in winter because it is difficult for them to find and digest enough food to combat the cold. Flying lemurs The two surviving species of flying lemur (also known as colugos) represent an early specialized development of the basic insectivore type. These Southeast Asian tree-dwelling mammals resemble true lemurs, but are not related to them. They also are not really able to fly, but they glide among the treetops by means of membranes at the sides of the body. These membranes extend from the neck to the front feet, the hind feet, and the tip of the tail. Normally held folded in at the sides, the membranes become parachutelike when the animal extends them by stretching out its limbs. Flying lemurs are excellent climbers, and because they are nocturnal, they spend the day hanging by their clawed feet from a branch. At night they glide from tree to tree, feeding on leaves, buds, flowers, and fruit. Their jaw is unusual among mammals in that its lower incisors have become “comb teeth” and are used for grooming the fur. The comb teeth are similar to those of the lemurs. The bats are second only to rodents in terms of number of species, more than 900 of which are known from almost all parts of the world. Their order, Chiroptera, is divided into two suborders. The suborder Megachiroptera contains one family, known as fruit bats, which feed primarily on fruit. Microchiroptera contains the other 17 families, most of which are largely insect-eating. The main reason for the enormous ecological diversity of bats is their use of an otherwise unoccupied ecological niche their ability to capture nocturnal insects in flight. No other mammal can actively fly, and no other creatures, even birds, can surpass the bats’ mastery of the night skies. This agility is achieved by their sonar sensory system for navigation and prey-finding. To enable them to fly, bats have evolved extensive wings that consist of thin skin flaps stretched between the elongated fingers of the hands and between the forearm and the smaller hind legs. In most species, the skin flap also extends backward from the legs to the tail. The skin is an extension of the back and belly. In flight, bats can maneuver exceptionally well. When bats alight, they hang upside down from perches with the aid of clawed hind feet. Some bats feed on the nectar and pollen of night-flowering plants and are important pollinators of those plants. Others feed primarily on fruit. For these species, flight enables them to travel long distances between fruiting or flowering trees. Other bats feed on small invertebrates and mammals and even capture fish in swoops to the water surface. The vampire bats (Desmodontidae) use their sharp, triangular-shaped front teeth to cut a narrow groove into the skin of sleeping mammals and birds and to sever capillaries, which bleed freely. They lap up the blood that flows from these wounds, consuming about 1 tablespoon (15 milliliters) of blood a day. The three-toed sloth is found in the Amazonian forests, where it feeds on leaves and rarely descends to the ground. Its three digits are internal for almost their entire length. Only the long, curved claws protrude from the skin. Armadillos, anteaters, and sloths The order Edentata today contains about 30 species in three families: armadillos (Dasypo-didae), anteaters (Myrmecophagidae), and sloths (Bradypodidae). All have a reduced number of teeth, or none at all. And although the sloths are grouped with the insect-eating armadillos and anteaters, they are completely herbivorous that is, they feed only on plants. The 20 species of armadillo of the Americas are nocturnal and feed primarily on insects, which they lick up with their long, narrow tongue, as well as other small invertebrates and vertebrates and, in some cases, carrion. Their limbs are sturdy and powerful, with large strong claws. Because armadillos have only a few small teeth set well back in their mouths, they cannot bite in self-defense. Instead, their bodies are protected by a shell made up of bands of bony plates, leaving only the limbs and underside vulnerable to attackers. Two species of armadillo curl up into a ball to protect these parts of the body. Anteaters, with their long, toothless snout and long, sticky tongue, are highly specialized for feeding on ants and termites. Four species of anteater live in Central America and South America. The largest of them, the giant anteater, grows to more than 6 feet (1.8 meters) long. The giant anteater is grounddwelling, but the other species spend at least some of their time in the trees. The collared anteater, ortamandua, wraps its long tail around tree branches while feeding on ants and termites so that it will not fall. The five species of sloth are so adapted to life in the trees that they can barely move on land. For this reason, they rarely descend to the ground, as they would make easy prey. They live in forests in Central and South America and spend much of their time hanging upside down from their large hooklike claws. There are two genera: Bradypus, the threetoed group, and Choloepus, which are twotoed. The three-toed species tend to be slower than the two-toed, and their grooved hairs carry algae, which give them a green color. The tamandua, or collared anteater, is a mainly nocturnal, tree-dwelling species found in South America. Its body length reaches 23 inches (58 centimeters). This animal walks on the outside of its hands to prevent the tips of its curved claws from digging into its palms. The pangolins (order Pholidota), or scaly anteaters, of Asia, Indonesia, and Africa lead a life similar to that of the American anteaters. They have no teeth and feed largely on termites, ants, and other insects, which they capture with delicate movements of their long tongue. The largest pangolin can extend its tongue 16 inches (40 centimeters) out of its mouth. Like anteaters, pangolins have a gizzardlike stomach that grinds down the hard exoskeletons of the insects they eat. Pangolins are covered by a coat of horny scales resembling a coat of mail. When threatened, they roll themselves into a tight ball that few predators can pierce. Pangolins are shy creatures and move about at night. Scaly anteaters, or pangolins, are distinguished by their scaly skin, which resembles the bracts of a pine cone. These arboreal mammals have a prehensile tail and a flexible body that can roll into a ball. Like the anteaters, they have strong claws for tearing open termite nests.
{"cc_dump":"CC-MAIN-2022-49","dolma2_qc":{"0":0.9795574546,"1":0.0204625428},"exact_duplicates":1,"lang":{"en":0.951171875},"madlad":{"num_sentences":135,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":2328,"sa_remove_ranges":[],"text_hash":"305782136197201106356830034311389671450","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-12-05T15:06:20Z","warc_url":"https:\/\/animal-world.informer.name\/insect-eating-mammals\/","weborganizer":{"__label__art_and_design":0.0028995804,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__finance_and_business":null,"__label__games":0.0024067315,"__label__health":0.0113417543,"__label__history_and_geography":0.0396488421,"__label__industrial":0.005070332,"__label__literature":0.0062999022,"__label__science_math_and_technology":0.9808859825,"__label__adult_content":null,"__label__social_life":null,"__label__software":null,"__label__software_development":null,"__label__food_and_dining":0.002125703,"__label__politics":null,"__label__sports_and_fitness":null,"__label__electronics_and_hardare":null,"__label__home_and_hobbies":0.0433757976,"__label__religion":null,"__label__entertainment":null,"__label__fashion_and_beauty":null,"__label__transportation":null,"__label__travel_and_tourism":0.0024826226},"weborganizer_max":"__label__science_math_and_technology"}
null
null
null
null
null
null
663b530d-25e4-4585-9707-43eb7096b58f
The Norwegian Government Gives Green Light for Seabed Mineral Activity A section of a sulphide sample, obtained during the Norwegian Petroleum Directorate's (NPD) expedition to the Mohns Ridge in the Norwegian Sea in 2020. Photo: Øystein Leiknes Nag, NPD The Norwegian government proposes to open parts of the Norwegian continental shelf for commercial seabed mineral activities. In addition, the government presents a strategy demonstrating how Norway aims to be a global leader in a fact- and knowledge-based management of seabed mineral resources. Environmental considerations will be safeguarded throughout the value chain, and extraction will only be permitted if the industry can demonstrate sustainability and responsible practices. “We need minerals to succeed in the green transition. Currently, the resources are controlled by a few countries, which makes us vulnerable. Seabed minerals can become a source of access to essential metals, and no other country is better positioned to take the lead in managing such resources sustainably and responsibly. Success will be crucial for the world's long-term energy transition,” says Minister of Petroleum and Energy, Terje Aasland. Norway has significant anticipated mineral resources on the seabed. If proven to be profitable and extraction can be done sustainably, seabed mineral activities can contribute to value creation and employment in Norway while ensuring the supply of crucial metals for the global energy transition. Extraction of minerals could become a new and important industry for Norway. “To acquire more knowledge, we need to gather expertise and open for commercial mapping, exploration and extraction of seabed minerals. Therefore, we are proposing to open an area on the Norwegian continental shelf for mineral activities,” says Aasland. Seabed mineral extraction holds significant future potential for value creation, and the government aims to facilitate value creation and future job opportunities in the ocean industries. Norway has extensive experience in business operations and sustainable management of ocean areas, along with strong research and technology communities associated with the ocean and its resources. This provides a solid foundation for developing profitable seabed mineral activities. Existing knowledge indicates that mapping, exploration, and closure have minimal environmental impact. Any extraction will only be approved if the rights holder’s recovery plan demonstrates that the extraction can occur in a sustainable and responsible manner. “Seabed mineral activities are a new industry, both globally and in Norway. Currently, we have limited knowledge about the deep-sea areas where the resources are located. I firmly believe that if the industry identifies resources that they consider economically viable to extract, it will be possible to extract these resources sustainably and responsibly. We will proceed step by step, continue building experience, and base our regulatory framework on facts and knowledge. Environmental considerations will weigh heavily throughout the value chain”, says Aasland. Background on the opening process Before an area can be opened for mineral activities, an opening process must be carried out. The opening process was initiated by the Ministry of Petroleum and Energy in 2020 and consists of two main parts: an impact assessment process and a resource assessment. Through the impact assessment process, the potential effects of future seabed mineral activities are examined. The process covers environmental, economic, social, and commercial impacts of such operations and summarizes existing knowledge. As part of the impact assessment, several reports and impact studies have been prepared and compiled. The impact assessment and the proposal for opening an area on the Norwegian continental shelf were subject to public consultation. The consultation responses can be found on the ministry's website. The ministry's assessment of the consultation responses is included as an appendix to the impact assessment. As part of the opening process, the Norwegian Petroleum Directorate, which is the ministry's directorate for seabed minerals, has conducted a resource assessment for the assessment area. The assessment reveals significant expected undiscovered mineral resources on the Norwegian continental shelf, some of which may be extractable. Currently, there is insufficient knowledge of extraction technologies and development solutions to assess potential ore deposits and estimate extraction rates. Corporate Headquarters Ocean News & Technology is a publication of TSC Strategic 8502 SW Kansas Ave Stuart, FL 34997 info@tscpublishing.com
{"cc_dump":"CC-MAIN-2024-10","dolma2_qc":{"0":0.9945986271,"1":0.0054213335},"exact_duplicates":0,"lang":{"en":0.9325351715},"madlad":{"num_sentences":35,"rule.2":[0,34],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":682,"sa_remove_ranges":[],"text_hash":"83129691003749276329529674727947675872","warc_content_type":"text\/html","warc_date":"2024-02-24T18:02:45.000Z","warc_url":"https:\/\/www.oceannews.com\/news\/subsea-and-survey\/the-norwegian-government-gives-green-light-for-seabed-mineral-activity","weborganizer":{"__label__adult_content":null,"__label__entertainment":null,"__label__finance_and_business":0.026769286,"__label__food_and_dining":null,"__label__history_and_geography":0.0097184796,"__label__industrial":0.7371681929,"__label__politics":0.0408557132,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__transportation":0.0109969424,"__label__education_and_jobs":0.023699468,"__label__electronics_and_hardare":null,"__label__fashion_and_beauty":0.0069138384,"__label__health":0.0132328207,"__label__home_and_hobbies":null,"__label__travel_and_tourism":0.0197291281,"__label__art_and_design":null,"__label__crime_and_law":null,"__label__science_math_and_technology":0.5312193632,"__label__software_development":null,"__label__software":null,"__label__games":null,"__label__literature":null,"__label__religion":null},"weborganizer_max":"__label__industrial"}
null
null
null
null
null
null
d409f38e-bd59-4b62-9e19-a4af51d2a6a6
When the Circus Comes To Town Reginald Parr doesn't look like he should -- not if he's supposed to be the good guy. None of his businesses -- welding, rental property maintenance, big-cat stewardship -- are particularly clean endeavors. He wears his hair long and stringy and brushed back into a thinning suggestion of the blond lion-tamer pompadour he sports in old pictures. His shirt is perpetually buttoned just far enough up to cover the claw scar on his belly, which isn't all that far. He drives pickups and owns a bulldozer and keeps rusty travel trailers and broken cement mixers and tigers and Rottweilers on 12 acres of dark, wet and hidden land in Montgomery County. He owns another 100 acres in the area but isn't doing anything with it. He is smart enough to know that these things will define him in the public eye as white trash, and he has too much pride in the dream of his finished "Animal Extravaganza" -- with the man-made lakes and the snow tigers on the island in the middle, with the research facility and the veterinary tools with which he will care for his own -- to let a photographer shoot it in its present condition: some cleared trees in a pile, the dozer partially dismantled and supporting a lightning-struck tree limb, marsh where the lakes will be, lots of tin. The warren of cages where his animals are penned is the best-kept facility on the property. On the other hand, the people who killed Parr's two tigers don't much fit the good-guy mold either. There were too many of them, with too many guns, too eager to shoot down animals that might have been saved, if things had been handled differently. No clear-cut good guys, no incontrovertible bad guys. Still, two dead tigers. It was all over the local news for a couple of days, Sunday and Monday, November 8 and 9, six o'clock and ten: the search for two escaped tigers in Cut and Shoot, Texas; video of four-wheeled mud runners loaded down with men and guns and what sure looked like kids and more guns; deputies and constables and officers of several stripes and a small volunteer army of locals swept up in the romance and adrenaline of an honest-to-God safari. And draped across the back fenders, the limp carcass of a dead tiger. There was quite a scare, apparently. One tiger was killed the day it escaped, but another, the smaller female, remained out overnight, and residents kept their dogs and their kids inside. One of the news stations reported that the tigers were cornered near a local elementary school (which turned out to be a false alarm). Rumors circulated about past escapes and the shadowy figure of the tigers' owner, about whom no one seemed to know much. Convenience store sales of locally packaged emu jerky got a small spike from the influx of souvenir-hunting reporters. The second tiger ended up getting killed, on the second afternoon, and then the news crews disappeared from sight until the next week, when heavy rains flooded much of Montgomery County, transforming it from a merely figurative backwater into a literal one. The Chronicle quoted Scott Kurtz, who fired the first shot at the second tiger, as saying, "It's too bad she had to be killed. I just reacted. I'd rather it could have come out of the woods alive. It's a beautiful animal." I drove out there three days after the last tiger was shot and stood in the rain at the end of Reginald Parr's mud driveway until Zettler Monroe Cude Jr. wandered out to see who was there. Reginald had asked him not to talk to reporters. There would probably be an investigation. But Cude sat in my truck out of the rain and smoked a cigarette and told me a little of what happened, the gist of which was that he fucked up when he accidentally let the cats out, but there hadn't been any real reason for those tigers to die. And that there hadn't been any real intention, on the part of the folks who killed them, to do anything but. Reginald Dwight Parr, whose friends call him Lefty, grew up in his mother's modest suburban home, just a few miles north of downtown Houston. The house featured huge picture windows looking onto the street, but to Reginald the home's exceptional characteristic was inside: an elevated span of built-in shelving dividing the space between living room and dining room, just a few feet below the gold-flaked stucco of the ceiling, on which was arranged his mother's collection of antique porcelain wildlife figurines. There were lions and tigers and bears, and giraffes and elephants and hippopotamuses -- most every form of exotic wildlife a boy growing up in suburban Houston was never likely to see outside a zoo. One day, when he was about six years old, Parr dragged his mother away from the stove where she was making dinner and made her look up with him at the jungle parade.   "I'm going to have one of those," he told her, scanning his finger down the shelf, "and two of those, and two of those, and at least a dozen of those." Forty-three years later, Reginald Parr has had at least one of those and two of these and a dozen of the other. He has bought and sold and bred and borrowed and lent wildlife, especially the big cats, and he has trained animals for circuses and television commercials. He apparently foresaw most of this coming at six years of age and then made it happen, which is how most people define a life's passion. His dead tigers are Sybil, a female Siberian, and Binanca, a male Siberian. "Now my male, that big old knothead. He was real outgoing; he wasn't bashful at all. He wasn't afraid of humans. He followed Zettler across the street to call me; that's the only time he left my property." "The female, I raised her from birth. She slept in bed with me. She loved to ride; she'd get in the front of the truck with me and we'd go to the country and we'd just romp and play and we'd have a great time. She loved the water. I could take her up to the lake and she'd swim with me on her back three times across the lake and back." Parr is sitting on the couch in his mother's house, beneath that same dusty menagerie, bottle-feeding formula to a seven-week-old Siberian cub stretched across his lap. The dead cats' hides are in a freezer in the garage. If you've ever wondered how you, Mr. or Mrs. Private Citizen, could legally own a real live tiger, here's a list of all you need to do: Find someone with a tiger and buy it. The United States Department of Agriculture grants licenses, but those are only necessary if you plan to breed or display your tiger. There is exactly one USDA animal welfare inspector in Texas, Charlie Currer, and he'll check up on your facility periodically. He keeps tabs on all the zoos and the pet stores, too. Texas Parks and Wildlife used to require registration of exotic animals, but the state passed that responsibility to local municipalities in 1997, thinking that law enforcement closer to the ground could best respond to individual exotic game issues. Since then, some counties have drafted ordinances regarding private ownership of exotics, and some haven't. In Galveston County, you can't have them at all. Period. In Waller County, you can have all you want and send them out in their pajamas for the morning paper. In Montgomery County, you simply have to contact the Animal Control Department and let them know what you've got. The Society for the Prevention of Cruelty to Animals can investigate charges of cruelty and make recommendations but can't enforce anything. In fact, the SPCA once responded to an anonymous complaint about Reginald Parr's cats but found the animals well housed and "in good flesh." Charlie Currer has inspected Animal Extravaganza six times since May 1995. In December 1995, Currer recommended that Parr erect a perimeter fence around a travel cage in which he housed one tiger. At his next inspection, Currer noted that the fence was in place. In '97, Currer asked Parr to rebuild a trailer floor and to patch a leaky roof, and these things were done. And in April 1998, Currer recommended an extension of the perimeter fence to enclose several more cages which had been added over the years. By November 1998, Parr had finished that fence, too, except for one gate. Parr owns the tigers, but he doesn't live where they do, which is in a series of cages and chainlink enclosures nestled on a 12-acre plot of marshy pine bottom. It's near the dead end of a blacktopped country road that juts off another blacktopped country road that connects to State Highway 105, which eventually intersects with I-45 near Conroe. Parr doesn't live there because he can't. He's on parole after doing time for a late-1980s conviction for possessing chemicals used to make methamphetamine. At the time, he was already on parole for a conviction for compelling prostitution. Parr admits to possessing the chemicals, which he claims were stored for a buddy in exchange for money at a down-and-out point in his life. He made a stupid mistake, he says, and served his time.   As for the charge of compelling prostitution, he says he never did any such thing and unwisely took a plea bargain and a fine on his lawyer's advice. He's retaining new lawyers in an attempt to overturn the compulsion charge and modify the terms of his parole, and he has recently taken two independent lie detector tests that back his version of events. He had been out of prison for two years, with no restrictions on his movement and no legal complications, when eight months ago he drew a new parole officer, Mary Carnathon, who turned the screws on him, changed his terms of parole so that he could not leave Harris County, and thus enter Montgomery County, without her prior written permission. "We've had a personality conflict from day one, and there's been no excuse for it," says Parr. "The first time I talked to her she acted like I had accosted her mother or something, and I told her, 'Lady, I'm not the one that did that to you. I apologize to you for whoever did, but you don't have any reason to talk to me and treat me this way.' "I guess it was a few days later she came by here, and I was telling her about the game reserve and my plans and stuff, and she said, 'Well, you can forget that.' "I said, 'What do you mean?' She said, 'You're not going to ever go up to Montgomery County.' She said, 'You can forget it. It's not going to happen.' " As it turned out, with the help of attorney William Habern, Parr was granted permission to go to Cut and Shoot twice a week to deliver meat and supplies to his caretaker, as long as he was home at night when Carnathon called to check up on him. "She allowed me no time whatsoever to put my perimeter fences up, to do any kind of maintenance, to go in and clean the cages thoroughly or anything, and I had to get my lawyers involved just to be able to get permission to go up there at all. It was like pulling teeth. She would not acknowledge it. Every conversation she would say, 'Your alleged game reserve.' I said, 'No, that is my whole life.' I have spent thousands of dollars literally trying to get permission to go, to do the right thing. Because I'm not neglectful." Working with posthole diggers and a wheelbarrow when fair weather and his twice-weekly visits coincided, Parr erected an 8-foot-high chainlink fence anchored to steel poles, each set in a foot or more of concrete, and enclosed about a quarter of an acre. By early November, the fence was complete, except for a six-foot gap where a gate was to be installed. "If they had granted him that consent and permission," says attorney Habern, "then this would not have happened. The cats wouldn't have gotten out; there'd have been no overreaction by the police; everything would have been fine. What happened to Lefty Parr is another example of poor parole-officer supervision, to say the least." With Parr's travel restricted, the tigers, alongside a revolving cast of assorted other big-cat exotics and the Rottweilers, were being primarily cared for by one Zettler Monroe Cude Jr. Cude is a quiet man behind Coke-bottle glasses and is described by his supportive acquaintances as slow. Parr isn't shy about making the comment, within Cude's earshot, that the caretaker's elevator doesn't go all the way to the top floor. These are ugly things to say, but questions of responsibility have been raised: Cude's responsibility for letting the cats out and Parr's for leaving the cats in Cude's care. Parr says he has known Cude's family for 20 years and frankly felt sorry for Zettler, who was verging on homelessness when Parr offered him a small trailer to sleep in, paid utilities and a steady supply of groceries in exchange for Cude's feeding and watering and cage-cleaning duties. "He's always taken good care of my animals. I've never caught rancid meat or dirty cages. My water bowls are always clean," says Parr. Tigers, it turns out, will sometimes display a claim of ownership by spraying the object of their affections, much like a house cat, if house cats sprayed through high-pressure water hoses. Parr has gotten used to the warning signs of an impending spray and will jump out of the line of fire. Cude, he says, is the only man he's seen who'll take a spray right between the eyes and accept it as a welcome sign that the cats really do like him. "He really loves the animals." He also, and there's no nice way to put this, really screwed up. On the morning of November 8, Cude walked over to the circular pen in which Binanca and Sybil lived. The pen is a zoo-quality pavilion, an 18-inch concrete pad bounded by a thick steel wire fence and bisected by a steel wire dividing wall with a sliding door to allow the cats to move from one side to the other. Each segment of the pavilion is individually accessible via one of two slam-doors, 100-pound grates of steel on vertical tracks that open when lifted and slam shut when unsupported.   Cude secured the cats in one side of the pavilion while he hosed down the other. Then he moved the tigers and cleaned the rest of the cage. When he finished cleaning the second side, he propped open the slam-door with a piece of pipe and dragged his water hose through to a nearby travel cage, which he then cleaned as well. And then, with the tigers secured behind the slider door in the far half of the pavilion, he went back to his trailer to get some breakfast. When Cude returned, he forgot that the slam-door, largely blocked from sight by the travel cage, was still propped open. And when he opened the slider door to let the tigers have the full run of their habitat, they simply walked across the concrete floor and out the open slam-door. One of Parr's Rottweilers tried to herd Binanca back to the cage and got chewed up for his trouble (he survived). Cude walked across the street -- running being what prey does -- and found Troy Bynum working on his property. Cude and Bynum got in Bynum's truck and drove a fast few miles to the house Troy shared with his wife, Cindy, who is Reginald Parr's niece. From the Bynum home, Cude phoned Parr, who told him there was only one thing to do: call 911. Cindy Bynum remembers that Cude placed that 911 call from her house at roughly 8 a.m. Officer Jim Blount, deputy in charge of Montgomery County Animal Control, received a phone call from dispatch at 11 a.m. telling him the tigers were loose. Nobody knows where to find the three hours that had elapsed since Cude called 911. Blount told his officer on duty to meet him at the location and then instructed the county's livestock officer, who had the county's only dart gun, to meet him there. Blount rounded up some unused tranquilizer from an unrelated cougar scare a few years before and drove to Animal Extravaganza. Zettler Cude met him there and pointed out Binanca, who was lying down in neighbor Nathan Miles's driveway. The dart gun was ten minutes away. Binanca started moving. "He went in front of the house," says Blount. "He went around behind the house; he went behind a shed building between two residences, and as I was turning around so I could keep an eye on the cat, I heard this big noise and a pig go squealing. A hog." Blount drove around a corner and observed Binanca in the ditch next to the main road, with the hog down. "There was an individual in a truck, a small pickup truck, with the window down," almost even with the tiger. "There were some other people that had run out of their houses to see what was going on. "I figured I had a dangerous situation there. I immediately shot the animal. I shot him four times in the head with a double-gauge shotgun using double-ought buckshot. Initial shot, he turned the hog loose and the hog run by me. And then I finished it." Cindy Bynum saw Binanca taken down, but she remembers a detail -- about the guy in the little pickup truck, the potential tiger victim -- that Blount leaves out. "He was standing on the street with his gun. He helped kill that animal. He put a full magazine of a .22 rifle in that cat." Parr was at home, trying to find somebody, anybody, with the authority to grant him permission to leave Harris County. "That was the hardest two days I ever spent," he says. "Because I knew in my heart that they were going to kill my cats." When Parr found out his cats were loose, he called his parole attorney, Habern, who remembers, "We called Austin, we called Harris County Sheriff's office, we called everybody we could think of on the weekend, and apparently there's no duty officer for emergencies such as these." Parr was told he would have to wait until Monday and get permission from his parole officer, Mary Carnathon. It wasn't until Monday morning at 11 a.m. that Parr was able to contact Carnathon, and it took another 45 minutes to get his traveling papers in order. Leaving downtown at a quarter till noon, Parr says he arrived at his property in Montgomery County at 12:06, only to be told why he'd had such trouble contacting Carnathon.   "She was at my game reserve, asking reporters and people if I had been up there, so she could send me back to TDC." "I told them I was there, and I just wanted to put my female back in her habitat. I still don't know who was in charge. I don't know that anybody was. They told me when I got there that they were going to push her with the dogs. They were tracking her with dogs. And I told them, I said, 'You're not going to track my tiger with these dogs. My tiger is going to track your dogs.' " That's when, Parr says, Blount informed him that the dogs in question were professional lion dogs, though he failed to explain just where they had come from, or exactly what a professional lion dog might be. They looked like plain old blue ticks to Parr. "They were doing a push at the front, out there for the news media," says Parr. "Right there in front of the news trucks. They never pushed anywhere else. She [Sybil] had never been in there. She was back over [at the back of the property]. When I pulled in my driveway I heard her calling me. When she sounds like a horse? Like that. I don't know if they thought it was the neighbor's mule, or the people across the street have a horse, too, or what they thought. She was giving me a greeting gesture, and I heard her as soon as I came in, but I didn't see her." The lion dogs, meanwhile, couldn't pick up a scent. One was off on a far corner of the property chasing a deer, and another got lost and had to be retrieved the following day. Parr set about baiting his cages to try to lure Sybil home. "But she wouldn't come out because of all the people and all the commotion." Parr told Blount that Sybil "wouldn't move at all until four o'clock," which was feeding time. At 2:30, Blount decided to act. Darkness would fall in a few hours, and he didn't want the tiger at large another night in a community that was already wary of letting its dogs, much less its children, out of the house. A bunch of armed citizens, including children, searching the woods at night for a tiger would be no better than having the tiger out there in the first place. Blount decided to make another run through the woods. "It was agreed," he writes in his report, "we would make a wide search on the west side of the compound." What the report doesn't mention is why it was agreed, and amongst whom, to search the previously unsearched west side of the property, and to what end. Parr found officer Charles Hayden, who carried the sole tranquilizer gun. Parr pointed to a clear spot near his gate, several hundred yards away from the media encampment. "I said, 'If we can get her in this clearing, if you can get your dogs to get her in this clearing,' I said, 'Officer, can you dart her here?' "He said 'Yes sir, I sure can.' "I said, 'Okay, I'm going to tell you where she's at.' I said, 'You've been up here by the news media in the front; she ain't been up here.' "I said, 'If you'll walk down my fence line to the back, you'll come to my corner fence there. There's a clearing right there at that fence. If you'll go 20 feet the other side of that clearing, form you a straight line and push her back to me,' I said, 'we'll dart her when she hits the clearing.' "I said, 'Is that feasible with you?' "They said, 'Fine.' " What actually happened, though, is that the posse, estimated at 15 to 20 hunters strong, never got to the back corner fence, where they could have lined up behind Sybil and pushed her into the clearing, where Hayden and Parr were waiting to dart her. Instead, they got about halfway down the fence line and spotted Sybil just across the barbed wire under a fallen treetop, on Parr's property. "I heard the dogs," says Parr. "They never chased her. They put her at bay immediately. All the dogs surrounded her, she couldn't go anywhere, so when she lunged, she was going to make a break through one of them dogs. So instead of letting her kill one of them dogs, they killed her. They fired over 50 rounds with them high-powered rifles. I was there."   Blount's incident report, meanwhile, states that the dogs jumped Sybil, who ran, that the dogs bayed Sybil under a fallen treetop, and that he, along with dog handler James Metts and Metts's son were the first to get within sight of her. Blount says he called for officer Hayden to bring the tranquilizer gun, but before Hayden could catch up, Sybil turned on Scott Kurtz, a member of the posse. Blount gave the order to shoot, and Kurtz fired one round. Sybil then turned, and Metts's son shot her in the shoulder, then James Metts fired "approximately three times." Blount's report states that he himself finally killed Sybil with a shot to the head. Blount's report makes no mention of the plan to come around behind Sybil and push her into the clearing, which is the reason that Hayden and his tranquilizer gun were hanging back in the first place. The report also does not attempt to explain what 15 or more armed men, many of whom had no law-enforcement credentials, were doing in the front lines of a search for a potentially dangerous animal. Blount counted approximately six shots. Parr and his niece estimate upward of 50. According to Bynum, "It sounded just like Vietnam. I mean it was horrible. It was scary. I just put my head down on my car and I was like, 'Oh my God.' "The way I feel is once Channel 11 and Channel 13 showed up, they had no intention of trying to tranquilize that cat. 'Cause then it was like a big power play or big media thing for this little town. I don't know what the hell it was. To me it became a hunt. They were going to kill her. There's no doubt in my mind." After speaking with the Press shortly following the incident, Blount failed to respond to several requests for clarification. In December, Blount was reassigned as livestock officer, and the county animal control department was put under the leadership of Woodlands constable Tim Holiman, whose first action was to strip animal control officers of their deputation as peace officers, meaning that they will no longer carry badges or guns. Holiman also says that he will address the issue of timely response, which has generated complaints in the past. And finally, Holiman is pursuing a United States Drug Enforcement Administration license for the county, which would allow the county to buy tranquilizer serums. Officers will attend a 12-hour tutorial on the safe use of tranquilizer guns. Kenya Pace lives close enough to Parr's property that "if you sit out right at dark, you hear the tigers and you hear the owls." She served the search party doughnuts and coffee in her back workshop Monday morning, and she says, "I thought the sheriff's department did a fantastic job. I really did. This could have gone on for a whole lot longer, and they knew people were just stressed, and they knew people needed to get back to work and kids needed to go back to school. I was impressed. I didn't know we had such a good sheriff's department out here." Pace, however, was not impressed with Parr. "I thought the owner did a lousy job. He should have gone and personally paid to have a lot more of those dart guns so his animal wouldn't have had to be killed." Pace didn't know that it is illegal for Parr, or anyone else who is not a licensed veterinarian, to possess that medicine. "I never felt like they were well contained, and I also think that I don't approve of the way they keep them in these little cages. There's no perimeter fence still up," Pace said, a month after the escape. Pace didn't know that the perimeter fence had since been finished. She says she heard that two years ago two cougars escaped because Parr's caretaker at the time had let them out on purpose while he cleaned the cages. This seemed pretty irresponsible to her. One of the cougars, she says, was never captured. It's still running around in the wild, though she hasn't heard of anyone seeing it in at least a year. Parr remembers the incident. Someone opened the cages with bolt cutters and either stole or allowed a cougar cub to run loose. The mother never left the cage. Parr is private to the point of being gun-shy and has not made many friends among his neighbors. More than a few of them don't approve of what they think Reginald Parr is up to. Parr says neighbor Nathan Miles has called to tell him that community meetings have been held to discuss what might be done about "the problem." The problem being Parr and his tigers. Miles may be sympathetic, says Parr, because Parr reimbursed Miles several hundred dollars for the hog that Binanca ran off.   Big-cat activist and volunteer Dana Mushrush isn't even a neighbor -- she works at an exotic-animal refuge in Kirbeyville -- and she disapproves. "When I heard about those two tigers I thought, right off, that's him. He initially called me after Fox 26 had done the one story they did about our refuge. He said, well, he would be willing to take some of the animals if we had to close down. He said he was into preservation of large carnivores. That's what he told me. Right away my head goes, 'All right, preserving them, what does that mean?' And he was very sketchy to me about the whole thing. He wasn't offering me very much information. I had other phone calls: Can I donate money? Can I come help? What can I do? [He says,] 'I'll take them for you.' My light goes on immediately. We were paranoid about each other." Mushrush had also heard something about two black panthers having once escaped from Parr's facility, though it should be noted that such an escape has not been documented, and panther sightings are to Montgomery County what Chupacabra sightings are to the Rio Grande. Mushrush wears an exotic-animal refuge T-shirt and dangly tiger-shaped earrings. She thinks that no matter your safeguards, there will always be human error, and consequently, tigers and other big cats will always escape, and when they do, they will usually die. She does not believe they should be bred as long as there are more than the zoos can afford to keep. She says she would rather have never seen a tiger and would rather they die out at the hands of poachers in the wild than to see them in caged and abandoned circumstance. She thinks private ownership of tigers should be against the law, and maybe she's got a point, but right now the law is not on her side. Excepting a pending investigation of the escape, the USDA has always given Parr and Animal Extravaganza clean bills of health, even when Parr was incarcerated and inspections reports had to be signed by his mother. Montgomery County says that it has no plans to pursue any legal action against Parr. Reginald Parr, meanwhile, is bent over a barrel. He's still on parole, and though he's got a new supervising officer, his travel is still restricted. Parole officer Carnathon was taken off his case after Parr's attorneys informed the parole board that she might be a defendant in a lawsuit Parr is considering. Parr hasn't ruled out the possibility of filing suit against Montgomery County, either. He's not happy with the way he feels his cats were gunned down, with the lies he thinks he was told, with the rumors that he knows have spread, and with the disorganization and mob mentality of too many people, media included, who had no legitimate business hunting his tigers. Still, he hopes that his attorneys will sort out this mess with the parole board and he'll have permission to move freely in Montgomery County, at which point he intends to begin living there full-time, with his remaining cats. He's got a spare bedroom full of expensive veterinary equipment just waiting for the research facility to grow up around it. There's a seal that needs to be replaced on the dozer, but then it can start doing what he bought it to do: scoop out the marshy area ringing the front of his property into a real lake. There's a lot of hard work to be done. Parr estimates five years' worth at least, measured from the day he starts living on-site. Parr knows that good-old-boy networks are at work in Montgomery County, as elsewhere, and since he intends to live peacefully among Cut and Shoot's citizenry, he hesitates to be seen as overly accusatory. One speeding ticket constitutes a technical violation of his parole and could send him back to jail. He worries that he's said too much already. With the community, he is empathetic and defiant. "I don't want the community at large to feel like I'm just an old convict, you know? That I'm just this evil, menacing villain in their community. I made a mistake. I feel like I paid for it. And I am a productive member of society again. I'm not out to do anyone any kind of injust. I would like to make my amends to anyone who feels like they need amends made. And I can understand their fears and their concerns.   "But on the other hand I want them to know that I'm doing everything in my power to be able to run my business and to be able to preserve these endangered animals. If they feel like there's not enough room in their community for me and these majestic animals, I'll just have to say I give you my apologies. I'm licensed by the United States federal government, and the community's going to have to deal with that." We're at the part of the story where there's supposed to be an answer. Why are two tigers dead? Who fucked up? Was it Zettler Cude for leaving a gate propped open? Or was it Reginald Parr for letting Zettler Cude take care of his cats at all? Was it Parr's parole officer for not giving him enough time to finish his perimeter fence? Or Parr, for not finishing his perimeter fence faster? Did the parole officer waste hours and transcend her jurisdiction by searching Cut and Shoot for Parr? Is it Parr's fault for being on parole in the first place? Is it Blount's fault for responding so slowly? Is it an unidentified bystander's fault for taking target practice on a 700-pound tiger? Or is it an entire community's fault for wanting to see the threat disappear? And if it is, what will you do differently when a 700-pound tiger comes sniffing around the door through which you send your kids to school? Who didn't fuck up? People want to be on a team, so they'll say, defensively, Well, they had to kill those tigers; yes, it's a shame, but their owner should have taken better care of them so they wouldn't get out where we, really, had no choice but to take them down. But this is not the truth and the whole truth. Or they'll say, offensively, Bullshit, those feed store yahoos never intended to bring those tigers home alive; that was nothing but a drunken redneck safari party. This isn't the truth and the whole truth either. The people who killed the cats have one way of telling the story. The people whose cats were killed have another. There is no one explanation that stands whole in its integrity and fills all the empty holes. The people who aren't talking about what happened are sticking to the time-honored maxim of mind your own business. The people who are talking begin shading their accounts when the story drags them toward an area of personal responsibility, either for killing the cats or for getting them killed. Reginald Parr sounds eminently reasonable when he states, as he often does, that tigers are "not something for everybody; I don't believe individuals should own them," until it registers that Reginald Parr is himself an individual who owns them and sometimes sells them to other individuals. The reason for the shading is that everyone involved has something to hide. Reginald Parr needs to hide how threatening his big cats can be, just how beyond his control they fundamentally are, and how disproportionately subject to human error is their fate. The men with guns need to hide how very much it satisfied them to shoot those two tigers dead. And hidden still further are some basic facts: that human error is a reasonable expectation, that tigers are fearsome, that hunters will hunt, that parents will protect their children from perceived danger, that crowds are difficult to control. Once you know these facts, you don't need to know anything about Reginald Parr or the Montgomery County Animal Control Department to know what happened to Binanca and Sybil last November and why. What happened was the only thing that could have happened. Sponsor Content All-access pass to top stories, events and offers around town. Sign Up > No Thanks! Remind Me Later >
{"cc_dump":"CC-MAIN-2016-07","dolma2_qc":{"0":0.993228972,"1":0.006791085},"exact_duplicates":4,"lang":{"en":0.9882221222},"madlad":{"num_sentences":296,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":6210,"sa_remove_ranges":[],"text_hash":"42011373060805415980463468008646409156","warc_content_type":"application\/http; msgtype=response","warc_date":"2016-02-06T18:43:40Z","warc_url":"http:\/\/www.houstonpress.com\/news\/when-the-circus-comes-to-town-6569396","weborganizer":{"__label__adult_content":null,"__label__crime_and_law":0.2689514458,"__label__electronics_and_hardare":null,"__label__entertainment":0.0284460355,"__label__finance_and_business":null,"__label__history_and_geography":0.0251888447,"__label__literature":0.0275952797,"__label__politics":0.069551751,"__label__science_math_and_technology":0.0145135829,"__label__sports_and_fitness":0.0100235688,"__label__art_and_design":null,"__label__religion":null,"__label__social_life":0.0124416519,"__label__education_and_jobs":null,"__label__health":null,"__label__home_and_hobbies":0.0737062693,"__label__industrial":0.0043415031,"__label__software":null,"__label__software_development":null,"__label__fashion_and_beauty":null,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__games":null,"__label__food_and_dining":null},"weborganizer_max":"__label__crime_and_law"}
null
null
null
null
null
null
dba9bdb7720a0e74d20e5baeaa1f755d6799fe9a
#!/usr/bin/env bash set -o errexit set -o pipefail set -o nounset yell() { echo "$0: $*" >&2; } die() { yell "$*"; exit 111; } echo echo "*************************************************************************" echo "* This script deploys iam policies for personal roles and service users.*" echo "* You should have done the steps below before you run this script. *" echo "* *" echo "* 1) Modify your policies and policy groups in the *.py files. *" echo "* 2) Run the generate_iam_yamls.sh to reproduce iam yamls. *" echo "* 3) Submit a PR, get the infra team to review the IAM updates. *" echo "* 4) Merge the PR. *" echo "* 5) Run this script to deploy the iam prolicies. *" echo "*************************************************************************" echo git checkout master && git pull ./cloudformation_validation.sh read -p "All the templates have been validated. Deploy them (Y/N)?" -n 1 -r echo #move to a new line if [[ ! $REPLY =~ ^[Yy]$ ]] then die "No deployment is conducted. Exiting..." fi gitUser=$(git config user.name) gitUser="${gitUser// /-}" echo "Deploying the validated IAM policies for personal roles" for profile in ./personal-profiles/* do stack="$(cut -d'/' -f 3 <<< $profile | cut -d'.' -f 1)" echo "Start deploying template $profile. Stack name is : personal-iam-$stack." aws cloudformation deploy \ --stack-name personal-iam-"$stack" \ --template-file "$profile" \ --capabilities CAPABILITY_IAM CAPABILITY_NAMED_IAM || true done echo "Deploying the validated IAM policies for service users" for template in ./service-user-stacks/* do stack="$(cut -d'/' -f 3 <<< $template | cut -d'.' -f 1)" echo "Start deploying template $template. Stack name is : $stack." aws cloudformation deploy \ --stack-name "$stack" \ --template-file "$template" \ --capabilities CAPABILITY_IAM CAPABILITY_NAMED_IAM || true done
{"length_bytes":2071,"repo_name":"alpha-health\/aws-iam-management-as-code","int_score":4,"src_encoding":"UTF-8","detected_licenses":["MIT"],"path":"\/deploy_iam_policies.sh","language":"Shell","score":3.90625,"license_type":"permissive","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': 'dba9bdb7720a0e74d20e5baeaa1f755d6799fe9a', 'language': 'Shell', 'repo_name': 'alpha-health\/aws-iam-management-as-code', 'path': '\/deploy_iam_policies.sh', 'src_encoding': 'UTF-8', 'length_bytes': 2071, 'score': 3.90625, 'int_score': 4, 'detected_licenses': ['MIT'], 'license_type': 'permissive'}"}
null
null
null
687d576c-c778-4ef1-9300-30195531656b
Bury the Pariah – Sociopathic Undergarment: The Metal Album burythepariah_052206_sociopFrom the mind of Rory Heikkila, also known for his other ambitious, predominantly black metal-based band, Shroud Of Despondency, Bury The Pariah is a tech death metalheads wet dream. Fans of The Dillinger Escape Plan and Cephalic Carnage take note, for there are some amazingly disjointed and heavy riff ideas on this album that hammer away one after the other. Each track seems like it have 25 riff ideas per composition with interesting structures and even a lighthearted arsenal of vocal samples from Mr. T, to various cartoon characters. This adds to the overall “music should be fun” concept behind this album, which seems like quite the bold statement in a genre based on seriousness and “tough guy” posturing. I tend to greatly dislike humor in metal, yet I can see past all the tinkering and appreciate Rory’s obvious virtuoso level of guitar playing and definite vision for what he wants to accomplish with this album. The drum programming is noticeably synthetic, but programmed in a non-traditional way to perfectly decorate each guitar line with bizarre fills and cymbal panning to keep the listener agitated and tuned into the left of center attack. With layered vocals ranging from standard guttural death burpings, to more of a screamo wretching style, the diversity is further built upon by the multi-faceted vocals that intensify the complexity of this album. Even thought the whole body of “Sociopathic Undergarment…” is indeed open minded and entertaining, the disc is worth the price of admission alone for the amazing 3 part guitar harmony/solo during the breakdown on the impressive track, “Koko Blew it Up” and also, “New”. In all honesty, this is where Rory is really doing something new and exciting. I think he should tone down on the overall silliness (like including lengthy prank phone calls) and complexity of his compositions to focus on more memorable songwriting and tasty moments such as these 3 part harmonies. So few do this with any sort of effectiveness… not even the 3 pronged guitar attack of Maiden have successfully pulled this off. This CDR release is our first glimpse into the new musical direction of Rory H., love it or hate it, and as he leaves black metal far behind, it’s going to be interesting to see where his mind and drug experimentation will lead us next. –
{"cc_dump":"CC-MAIN-2018-47","dolma2_qc":{"0":0.9959921837,"1":0.0040278882},"exact_duplicates":3,"lang":{"en":0.9390515089},"madlad":{"num_sentences":19,"rule.2":[],"rule.5":[17],"status":"survived"},"minhash":null,"original_word_count":480,"sa_remove_ranges":[[2436,2953]],"text_hash":"198431016986914779341820775911161850569","warc_content_type":"application\/http; msgtype=response","warc_date":"2018-11-19T04:40:48Z","warc_url":"https:\/\/wormgearzine.com\/2009\/01\/03\/bury-the-pariah-sociopathic-undergarment-the-metal-album\/","weborganizer":{"__label__adult_content":null,"__label__art_and_design":0.0302245878,"__label__entertainment":0.9954004288,"__label__games":0.0013350223,"__label__health":null,"__label__literature":0.0009499437,"__label__politics":0.0008395893,"__label__religion":null,"__label__science_math_and_technology":0.0008140858,"__label__social_life":null,"__label__education_and_jobs":0.0005457805,"__label__electronics_and_hardare":null,"__label__fashion_and_beauty":0.0009499437,"__label__finance_and_business":null,"__label__software":0.0005627787,"__label__software_development":null,"__label__food_and_dining":null,"__label__home_and_hobbies":0.0005457805,"__label__sports_and_fitness":null,"__label__history_and_geography":null,"__label__transportation":null,"__label__travel_and_tourism":null,"__label__crime_and_law":null,"__label__industrial":null},"weborganizer_max":"__label__entertainment"}
null
null
null
null
null
null
401fe0bd-3180-40f4-82e9-92c3bea45bbc
Audirvāna provides you with a digital signal processing toolkit that opens up numerous possibilities. You can adjust, personalize and optimize your listening experience according to both your desires and your system. Internal digital volume control internal digital volume control in addition to or instead of the volume of your audio device A solution ready to take over. Most devices have a volume control, either analog or – increasingly – digital. When this setting is controllable by Audirvāna, it is visible with the volume bar in the software, and you can adjust it thru the application. If this is not the case, you can always adjust the volume outside of Audirvāna using directly the interface or volume knob of your device. However, Audirvāna offers a very high quality internal digital volume control. It is disabled by default, but you can enable it in the software’s audio settings. In this case, Audirvāna performs the attenuation calculations before sending the data stream to your device. However, it is preferable to only use one at a time. If you use the Audirvāna internal volume control, it is best to set the volume of your device to its nominal volume, i.e. the volume at which it neither attenuates nor increases (= 0 dB). Please note that this feature is only available when your device is connected via USB. When connected via UPnP/DLNA the large buffer creates a latency incompatible with this service (time lag). Audio Plugins integration for inserting serial plugins into the audio processing flow Formats under MacOS and VST3 under Windows10 of using an equalizer for example or a convolution engine for the application of a room acoustic correction filter A custom-made performance. Audirvāna offers you the possibility to insert in the audio processing chain one or more (up to 4) plugins of your choice. These plugins can be AudioUnits under MacOS, or VST3 under Windows10. This will allow you, for example, to use a multi-band equalizer in order to attenuate a resonance of your living room at a certain frequency. However, you can also insert a convolution engine capable of applying more sophisticated filters to correct the acoustics of your room and/or system. The use of plugins – especially to modify the frequency response of your music – requires some expertise to avoid creating more nuisance than you were trying to correct in the first place. Upsampling algorithms to oversample all audio streams before playback high-performance algorithms available: SOX and R8 Brain settings of frequency multiples and filters Shift up a gear. You can oversample your audio files directly in Audirvāna before playback on your system, using one of the two built-in high-performance algorithms: SOX (SoundExchange) and R8 Brain. This can improve sound quality, sometimes quite noticeably, depending on your system’s converter and the settings you choose. Indeed, almost all DACs today on the market operate on a very-high-frequency switching-principle with a resolution of only a few bits. They therefore systematically oversample the signal just before the actual conversion, but work with limited computing power and more or less powerful algorithms, particularly for chip-cost and latency reasons. You can use Audirvāna to carry out this operation upstream: it will benefit from  the computer’s much greater computing power, and with a high-performance algorithm. This will facilitate the DAC’s work by giving it a stream that contains more precise points at the base. The settings associated with each algorithm are slightly different, but both will allow you to define the multiple of the sampling rate to be applied (x2, x4 etc.) as well as to fine-tune various filters, essentially to neutralize the artifacts that result from these operations.
{"cc_dump":"CC-MAIN-2024-46","dolma2_qc":{"0":0.9521562457,"1":0.0478638336},"exact_duplicates":4,"lang":{"en":0.8991433978},"madlad":{"num_sentences":28,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":615,"sa_remove_ranges":[],"text_hash":"178732745832395584098788536748973876066","warc_content_type":"text\/html","warc_date":"2024-11-05T02:10:14.000Z","warc_url":"https:\/\/audirvana.com\/signal-processing-toolkit-audio-plugins-oversampling\/","weborganizer":{"__label__education_and_jobs":0.0012943083,"__label__electronics_and_hardare":0.3208312988,"__label__entertainment":0.0009210511,"__label__finance_and_business":0.0078258887,"__label__games":null,"__label__health":0.0013350223,"__label__industrial":null,"__label__science_math_and_technology":0.0656148344,"__label__software":0.2877778411,"__label__software_development":0.0780881643,"__label__crime_and_law":null,"__label__home_and_hobbies":null,"__label__literature":null,"__label__politics":null,"__label__art_and_design":0.0009210511,"__label__transportation":null,"__label__adult_content":null,"__label__sports_and_fitness":null,"__label__travel_and_tourism":null,"__label__social_life":null,"__label__history_and_geography":null,"__label__fashion_and_beauty":null,"__label__religion":0.0009499437,"__label__food_and_dining":null},"weborganizer_max":"__label__electronics_and_hardare"}
null
null
null
null
null
null
62f8760b-43d2-49a6-8f32-6bf6c9eec405
Top Crypto Casinos in Isle of Man Looking to explore the world of crypto casinos? The Isle of Man offers a vibrant gambling scene with its diverse range of digital currency options. Here are some tips and strategies to help you get started. Discover the advantages, learn about secure transactions, and immerse yourself in thrilling gaming experiences—all while embracing the benefits of cryptocurrency. Get ready for an exciting journey into the realm of crypto casinos on the stunning Isle of Man. Crypto Casinos in Isle of ManWhy Choose Isle of Man for Crypto Gambling? Written byNatasha FernandezWriter Researched byNikos PapadopoulosResearcher Crypto Casinos in Isle of Man If you are looking for a thrilling and secure online gambling experience, look no further than the crypto casinos in Isle of Man. This small island nation located in the Irish Sea has become a hub for cryptocurrency-based gambling platforms due to its favorable regulatory environment and advanced technological infrastructure. What is a Crypto Casino? A crypto casino is an online gambling platform that allows players to wager using cryptocurrencies such as Bitcoin, Ethereum, or Litecoin. These digital currencies offer several advantages over traditional fiat currencies when it comes to online gambling. Transactions made with cryptocurrencies are fast, secure, and anonymous, providing users with enhanced privacy and peace of mind. Crypto casinos typically offer a wide range of games including slots, table games like blackjack and roulette, poker rooms, sports betting options, and even live dealer experiences. They employ state-of-the-art encryption technology to ensure fair play and protect user data from unauthorized access. Fun Facts about Crypto Casinos: • The first-ever crypto casino was launched in 2012 under the name "SatoshiDice." It allowed players to bet on the outcome of dice rolls using Bitcoin. • Some crypto casinos offer unique features like provably fair gaming algorithms that allow players to verify the fairness of each game's outcome independently. • Cryptocurrencies used in these casinos can be easily converted into other digital assets or traditional money through various exchanges. Why Choose Isle of Man for Crypto Gambling? Isle of Man has emerged as one of the leading jurisdictions for licensing cryptocurrency-based businesses including crypto casinos. The government has taken proactive steps towards creating a regulated environment that fosters innovation while ensuring player protection. The Gambling Supervision Commission (GSC) on the island provides licenses specifically tailored for cryptocurrency operators. These licenses require stringent security measures to safeguard customer funds and personal information. Additionally, they enforce strict anti-money laundering protocols which help prevent illicit activities within the industry. Furthermore, Isle of Man boasts a robust technological infrastructure that supports the smooth operation of crypto casinos. The island's reliable internet connectivity and advanced data centers ensure uninterrupted gameplay and secure transactions. Fun Facts about Isle of Man: • Isle of Man is not part of the United Kingdom but rather a self-governing British Crown dependency. • It is home to the famous annual motorcycle race, the Isle of Man TT, which has been held since 1907. • The island has its own currency called the Manx pound, which is pegged at par with the British pound sterling. In conclusion, if you are seeking an exciting online gambling experience with added security and privacy features, consider exploring crypto casinos in Isle of Man. With its favorable regulatory environment and advanced technological infrastructure, this small island nation offers a safe haven for cryptocurrency-based gambling platforms. Enjoy your favorite casino games while taking advantage of fast transactions and anonymous wagering using popular cryptocurrencies like Bitcoin or Ethereum. About the author Natasha Fernandez Natasha "CryptoQueen" Fernandez bridges the gap between blockchain buzz and casino charisma. From New Zealand's serene landscapes to the volatile world of crypto, she's making waves in the online gaming sphere. With CryptoCasinoRank, she paints a future where chips meet chains seamlessly. Send mail More posts by Natasha Fernandez Everything you need to know about casinos What is a crypto casino and how does it work? A crypto casino is an online gambling platform that allows players to use cryptocurrencies, such as Bitcoin or Ethereum, for their transactions. Instead of traditional fiat currencies, these casinos operate solely with digital currencies. Transactions are made through blockchain technology, ensuring transparency and security. Is it legal to play at a crypto casino in the Isle of Man? Yes, playing at a crypto casino in the Isle of Man is legal. The jurisdiction has embraced cryptocurrency and blockchain technology, making it favorable for online gambling operators to offer their services within its borders. Are my funds safe when playing at a crypto casino in the Isle of Man? Absolutely! Crypto casinos operating in the Isle of Man adhere to strict regulations and employ advanced security measures to protect your funds. These platforms utilize encryption techniques and secure wallets to ensure that your deposits and withdrawals remain safe from any potential threats. Can I deposit using other payment methods besides cryptocurrencies? While most transactions on crypto casinos require cryptocurrencies as the primary method of payment, some platforms may also accept traditional fiat currency options like credit cards or e-wallets. However, keep in mind that utilizing cryptocurrencies often provides additional benefits such as faster transaction times and lower fees. How can I withdraw my winnings from a crypto casino based in the Isle of Man? Withdrawing your winnings from an Isle of Man-based crypto casino is typically straightforward. You can initiate a withdrawal request by accessing your account's cashier section or designated withdrawal page. Follow the instructions provided by the platform regarding cryptocurrency wallet addresses or other required details for successful fund transfers. Are there any bonuses or promotions available at these casinos? Yes! Crypto casinos based in the Isle of Man often offer various bonuses and promotions to attract new players and reward loyal customers. These can include welcome bonuses, free spins on slot games, cashback offers, referral programs, tournaments with prize pools, VIP rewards programs - just to name a few. Be sure to check the promotions page of your chosen casino for the latest offers. Can I play casino games on my mobile device? Absolutely! Most crypto casinos in the Isle of Man are optimized for mobile devices, allowing you to enjoy your favorite casino games on smartphones and tablets. Whether you have an iOS or Android device, simply access the casino's website through your mobile browser or download their dedicated app if available. Are there any restrictions on who can play at these crypto casinos? While specific restrictions may vary between different platforms, most crypto casinos based in the Isle of Man welcome players from various countries around the world. However, it is essential to review each platform's terms and conditions as some jurisdictions may be restricted due to legal regulations or licensing requirements. How can I contact customer support if I have any issues while playing at a crypto casino in the Isle of Man? Crypto casinos prioritize customer satisfaction and typically offer multiple channels for contacting their support team. You can usually reach out via live chat directly on their website, send an email inquiry, or even find a phone number for direct assistance. The support team will be happy to help you with any questions or concerns you may have during your gaming experience.
{"cc_dump":"CC-MAIN-2024-18","dolma2_qc":{"0":0.1284814775,"1":0.8715385795},"exact_duplicates":0,"lang":{"en":0.9273663163},"madlad":{"num_sentences":68,"rule.2":[5],"rule.5":[60],"status":"survived"},"minhash":null,"original_word_count":1213,"sa_remove_ranges":[],"text_hash":"68939655941424124487650946383022685377","warc_content_type":"text\/html","warc_date":"2024-04-24T17:47:09.000Z","warc_url":"https:\/\/cryptocasinorank.com\/isle-of-man\/","weborganizer":{"__label__adult_content":0.00001,"__label__games":0.9603711963,"__label__history_and_geography":0.00001,"__label__industrial":null,"__label__science_math_and_technology":0.0028109273,"__label__social_life":null,"__label__software":0.0013350223,"__label__software_development":0.0003899846,"__label__sports_and_fitness":null,"__label__travel_and_tourism":0.0018775659,"__label__education_and_jobs":null,"__label__electronics_and_hardare":0.0007421814,"__label__finance_and_business":0.2281664759,"__label__health":null,"__label__crime_and_law":0.0024067315,"__label__art_and_design":null,"__label__entertainment":null,"__label__fashion_and_beauty":null,"__label__home_and_hobbies":null,"__label__literature":null,"__label__religion":null,"__label__politics":null,"__label__food_and_dining":null,"__label__transportation":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
c3f7f128-56b5-4ddb-8cd3-64613883cb7a
Leif G W Persson Net Worth 2023: Family, Relationships, Wiki, Weight, Age, Height, And More Leif G. W. Persson is a renowned Swedish writer and television personality. With a career spanning several decades, Persson has made significant contributions to the field of criminology through his novels and expert commentary on crime cases. In this article, we will delve into Leif G W Persson net worth, his career achievements, awards, early life, personal life, and the latest news surrounding him. Quick Facts Real NameLeif Gustav Willy Persson Popular NameLeif G. W. Persson Birth DateMarch 12, 1945 Age78 (as of 2023) ParentsMargit Persson, Gustav Persson SiblingsMaud Persson Birth PlaceStockholm, Sweden EthnicityNot Known EducationHigh School Norra Real Marital StatusMarried (three times) SpouseKim Persson, Margareta Jönsson, Birgitta Liedstrand ChildrenMalin Persson Giolito Net Worth$5 million (2023) Source of WealthWriting, Television Height6ft 1in Weight220 lbs What is Leif G W Persson Net Worth and Salary in 2023? As of 2023, Leif G. W. Persson’s net worth is estimated to be around $5 million. His wealth primarily stems from his successful career as a writer and television personality. With numerous best-selling novels and frequent appearances on crime-related TV shows, Persson has been able to secure considerable financial prosperity. ALso, check out Kathy Wakile Net Worth. In addition to his writing endeavors, Persson’s involvement with various television programs, where he provides expert commentary on crime cases, has contributed significantly to his overall income. His expertise and extensive knowledge in the field of criminology have made him a sought-after figure in the media industry. Leif G. W. Persson Career Leif G. W. Persson’s career began in 1977 when he worked at the Swedish National Police Board. During his time there, he played a pivotal role as a whistleblower in what became known as the Geijer Scandal. See also  What is Carole Radziwill Net Worth 2023: Family, Relationships, Wiki, Weight, Age, Height, And More Teaming up with journalist Peter Bratt, Persson confirmed a classified memo sent by the National Police Commissioner Carl Persson to Prime Minister Olof Palme. The memo alleged ties between the Minister of Justice, Lennart Geijer, and a prostitution ring in Stockholm. Following his involvement in the scandal, Persson was fired from the National Police Board, which took a toll on his mental health. However, he found solace in academia and returned as a lecturer at Stockholm University. Inspired by the affair, Persson wrote his debut novel, “Grisfesten.” In 1992, Leif G. W. Persson made a comeback to the National Police Board, this time as a professor in criminology. He held this position until 2012, further solidifying his expertise and reputation in the field. Throughout his career, he has published numerous crime fiction novels, earning critical acclaim and a loyal readership. Apart from his writing, Persson has played a significant role in the media industry. Between 1999 and 2009, he served as an expert commentator on the TV3 television show “Efterlyst.” This program focuses on wanted Swedish criminals. From 2010 to 2018, he participated in the SVT television show “Veckans Brott” alongside Camilla Kvartoft, discussing both recent and cold unsolved Swedish criminal cases. Leif G. W. Persson Awards Leif G. W. Persson’s contributions to literature and criminology have been recognized through various awards and accolades. His insightful works and captivating storytelling have earned him a dedicated following both in Sweden and internationally. Although specific award details are not provided in the raw content, it is worth noting that Persson’s impact on the literary world and his expertise in criminology have garnered him immense respect and admiration. See also  What is John Tobias Net Worth 2023: Family, Relationships, Wiki, Weight, Age, Height, And More Leif G. W. Persson Overview and Wiki Early Life and Education Leif G. W. Persson was born in Stockholm, Sweden, on March 12, 1945. He completed his high school education at Norra Real and went on to pursue higher studies. Having a thirst for knowledge and a strong interest in criminology, Persson sought to deepen his understanding of the subject. His passion for the field eventually led him to a career that combined his academic pursuits with his love for writing. Personal Life Leif G. W. Persson’s personal life has seen its fair share of ups and downs. He has been married three times, with Kim Persson, Margareta Jönsson, and Birgitta Liedstrand being his former spouses. His daughter, Malin Persson Giolito, has also made a name for herself as a successful author. Despite facing professional and personal challenges throughout his life, including the aftermath of the Geijer Scandal, Persson has shown resilience and perseverance. His experiences have undoubtedly influenced his work and contributed to his unique perspective on crime and justice. Leif G. W. Persson List News 2023 As of 2023, specific news regarding Leif G. W. Persson is not available in the provided content. However, given his prolific career and ongoing involvement in the literary and media industries, it is safe to assume that he continues to make waves with his work. It is advisable to stay updated through reliable news sources or the author’s official website and social media channels for the latest information on Leif G. W. Persson and his endeavors. Social Media Follow him on social media: See also  Laura Hillenbrand Net Worth 2023: Family, Relationships, Wiki, Weight, Age, Height, And More Instagram: https://www.instagram.com/leifgwperssonofficial/ Facebook: https://www.facebook.com/p/Leif-GW-Persson-Official-100044444945893/ Twitter: https://twitter.com/LeifGW FAQs About Leif G. W. Persson What is Leif G. W. Persson known for? Leif G. W. Persson is renowned for his crime fiction novels and his expert commentary on notable crime cases on television and in newspapers. Has Leif G. W. Persson received any awards for his work? Though specific details are not mentioned in the provided content, Leif G. W. Persson has received numerous awards and accolades throughout his career for his contributions to literature and criminology. What inspired Leif G. W. Persson to write his first novel? Leif G. W. Persson’s inspiration for writing his debut novel, “Grisfesten,” stemmed from his involvement in the Geijer Scandal, where he confirmed a classified memo about alleged ties between the Minister of Justice and a prostitution ring in Stockholm. See also: • David Mccullough Net Worth • Debbie Macomber Net Worth • Jake Steinfeld Net Worth With his extensive knowledge in criminology and captivating storytelling abilities, Persson has garnered a significant following both in Sweden and abroad. His works continue to captivate readers, and his expert commentary on crime cases provides valuable insights into the world of criminology. Thank you for reading this article with PennBook. Leave a Reply Your email address will not be published. Required fields are marked *
{"cc_dump":"CC-MAIN-2023-50","dolma2_qc":{"0":0.9860005379,"1":0.0140194632},"exact_duplicates":0,"lang":{"en":0.9623017311},"madlad":{"num_sentences":90,"rule.2":[0,7,22,41,65],"rule.5":[65],"status":"survived"},"minhash":null,"original_word_count":1113,"sa_remove_ranges":[],"text_hash":"187174143019435744281192415757818253551","warc_content_type":"text\/html","warc_date":"2023-12-02T07:34:45.000Z","warc_url":"https:\/\/pennbookcenter.com\/leif-g-w-persson-net-worth\/","weborganizer":{"__label__crime_and_law":0.2120788097,"__label__education_and_jobs":0.0140736289,"__label__electronics_and_hardare":null,"__label__finance_and_business":0.0174524877,"__label__politics":null,"__label__science_math_and_technology":0.0016078452,"__label__social_life":0.0038344827,"__label__software":null,"__label__software_development":null,"__label__transportation":null,"__label__fashion_and_beauty":null,"__label__health":null,"__label__home_and_hobbies":null,"__label__adult_content":null,"__label__history_and_geography":0.0049154055,"__label__industrial":null,"__label__literature":0.1294127256,"__label__religion":null,"__label__entertainment":0.0284460355,"__label__games":null,"__label__sports_and_fitness":0.0026416746,"__label__travel_and_tourism":null,"__label__art_and_design":0.002125703,"__label__food_and_dining":null},"weborganizer_max":"__label__crime_and_law"}
null
null
null
null
null
null
dffe3d1e-e053-4530-a4f1-a7b3983f120d
Is that an old hand? Share this post Category: Legal and Advisory, Smart Technology Is that an old hand? Virtual meetings have become a feature of our daily lives over the past few years. “You’re on mute” and “can you see my screen” have become even more familiar than the chairperson’s opening, welcome and confirmation of quorum. Community schemes followed suit with the rest of the world and held virtual meetings to continue conducting business and still maintain social distancing. According to Prescribed Management Rule (PMR) 17(10) of the Sectional Titles Schemes Management Act 8 of 2011 (STSMA) Regulations, bodies corporate of Sectional Title Schemes can hold general meetings (both annual and special) via virtual means, as long as the method is: • Accessible to all members and other persons entitled to attend; • Allow for communication between all members at the meeting; and • Allow for attendees to be identified by the chairperson. Virtual meetings were found to be far more convenient for more members of bodies corporate to attend when compared to in-person meetings. However, it remains vital to ensure the meeting protocols comply with the same rules and regulations as in-person general meetings. Show of hands Despite being able to attend a general meeting from the comfort of your couch, regulations regarding voting on resolutions remain consistent with those in the real world. Should a dispute arise in terms of the outcome, it would be crucial to have a record of the votes available to present as evidence. In terms of PMR 20(8), the chairperson needs to calculate and announce the outcome of the voting process at the meeting for it to be captured in the meeting minutes. Additionally, PMR 20(1) specifies that the results of the voting process are calculated by making use of the value of each eligible vote (based on the member’s total participation quota), except for special and unanimous resolutions where the votes must be calculated in value and in number (each member, despite the number of units they own, has 1 vote). Those familiar with platforms like Zoom and Microsoft Teams are no doubt familiar with meeting attendees raising their hands (and forgetting to lower them). The raising of hands not only allows for maintaining order and avoiding a cacophony of disembodied voices all trying to speak at the same time but is often employed as a means to confirm a show of support for a proposed motion. For the chairperson to confirm that a person was (1) eligible to vote, (2) calculate the correct value and/or number of the vote allocated to a member, and (3) keep a record of all votes cast and the voting process, it is necessary that voting takes the form of a ballot that could be documented. This would necessarily exclude the raising of hands to vote on a resolution in a virtual general meeting. Voting cards in virtual meetings PMR 17 deals with regulations governing how annual and special sectional title general meetings are to be conducted. PMR 17(16)(a) specifically states that the supply of “voting cards” to meeting attendees who are eligible to vote should be one of the very first actions taking place at a general meeting. During in-person meetings voting cards are usually handed to eligible voters during the meeting registration where a quorum is established (click here for more on resolution quorum and voting). The fact that the concept of “voting cards” is not explicitly defined in the Act, has resulted in some uncertainty about what would constitute a valid voting process during a virtual meeting. To keep a detailed record of the process, it is recommended that the following information be documented for each vote: • the name of the voter (or in the event of a proxy holder, who they are voting on behalf of), • the unit number (or some other way to determine participation quota) • the resolution being voted for, • and the vote — in favour of, or against. How to conduct voting in virtual meetings? Voting on resolutions by a show of hands at a sectional title general meeting is not permissible. However, there are several ways to vote that would allow for an accurate record of proceedings to be kept, which could result in varying degrees of administrative complexities. • If the meeting is recorded, the vote can be conducted on the virtual meeting platform’s chat function. This option however presents a challenge to ensure that all the necessary information is provided by each voter, but it will be accepted as the votes will be confirmed in writing. • A voting card can be included as an electronic form in the meeting pack before the meeting, or provided at the start of the meeting during the registration process. • A digital voting management system can be employed. This option is by far the most efficient way to conduct virtual voting processes. Sectional Title Solutions has partnered with GLOVent to provide an integrated Community Management System (CMS) as part of our suite of Smart Technology solutions on offer. Apart from a host of other functionalities, the CMS includes a state-of-the-art electronic voting functionality that considers all compliance elements such as proxies and voting eligibility. Contact us to find out more. Whichever way you decide to conduct your community scheme’s voting process at your next general meeting, please ensure that you follow the correct procedure that allows for a detailed record of the votes. This will protect you and your members’ interests. In need of community scheme legal advice or Smart Technology solutions? Our team of experts are standing by to assist with your complex problems!
{"cc_dump":"CC-MAIN-2024-42","dolma2_qc":{"0":0.990470171,"1":0.0095498404},"exact_duplicates":2,"lang":{"en":0.9553083777},"madlad":{"num_sentences":36,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":942,"sa_remove_ranges":[],"text_hash":"23096312880459901396737789831559306219","warc_content_type":"text\/html","warc_date":"2024-10-10T09:40:47.000Z","warc_url":"https:\/\/www.stsolutions.co.za\/voting-cards-in-virtual-meetings\/","weborganizer":{"__label__crime_and_law":0.0216253344,"__label__education_and_jobs":0.012831213,"__label__finance_and_business":0.0716012046,"__label__health":null,"__label__home_and_hobbies":0.0159163941,"__label__literature":null,"__label__politics":0.3998216391,"__label__science_math_and_technology":0.0583558418,"__label__social_life":null,"__label__sports_and_fitness":null,"__label__entertainment":null,"__label__fashion_and_beauty":null,"__label__religion":null,"__label__art_and_design":null,"__label__games":null,"__label__history_and_geography":null,"__label__travel_and_tourism":null,"__label__industrial":null,"__label__software":0.1128054112,"__label__adult_content":null,"__label__software_development":0.0140736289,"__label__transportation":0.0164130311,"__label__food_and_dining":null,"__label__electronics_and_hardare":0.0132328207},"weborganizer_max":"__label__politics"}
null
null
null
null
null
null
9ba2d722-d6e7-4a4c-b906-d66315ddd086
Ask the Expert Newbie VMware questions Recently I downloaded VMware workstation 5.5 for testing and learning purposes. I have a few questions regarding virtualization. • Suppose I have installed a guest operating system on a host OS. For example, on Linux I have configured Windows XP as guest operating system. How do I run the applications on Windows XP? • How do I access this guest operating system from other computers on my LAN? • How do I connect USB drives (pen drive or external hard drives) to these guest operating systems? I am sorry if these questions are irrelevant to the concept or working of virtualization as I am very new to the concept and am trying to understand what the difference is between the virtual OS and the real OS. Requires Free Membership to View Welcome to the world of virtualization! The questions you're asking ones that I often get, so I'll try to clear up any confusion here. First, in relation to running applications and services in your guest OS, the rule of thumb is that just about everything should work as it does on a physical machine. You can use ISO media, file shares, or direct downloads into the VM to get the installers you need. That leads to your second question: There are several networking options. If you want your VMs to be accessible to the LAN, you can use a bridged networking configuration where the VMs will be connected directly to a physical network connection on the host. As long as the VMs have valid network addresses, other users and computers on the network should be able to access them as if they were virtual machines. Another virtual networking option is to place connect the VMs on an isolated virtual network (which improves manageability and security). To access USB devices from within a guest OS, you need to map the virtual USB port to the physical one of the host (see the VMware Workstation documentation for the exact steps). For certain devices, you'll need to install the USB device drivers within the Guest OS in order for it to work properly. The goal you're describing is definitely attainable. Once your VMs are accessible via the network (as I described above), you can either build your own utility, or look for virtualization management solutions from third parties. I hope this helps clear up some of your questions. Good luck!
{"cc_dump":"CC-MAIN-2014-15","dolma2_qc":{"0":0.9996195436,"1":0.000400542},"exact_duplicates":2,"lang":{"en":0.9436573982},"madlad":{"num_sentences":34,"rule.2":[],"rule.5":[0,11],"status":"survived"},"minhash":null,"original_word_count":505,"sa_remove_ranges":[[2344,2975]],"text_hash":"286289832924271613052015871200962698265","warc_content_type":"application\/http; msgtype=response","warc_date":"2014-04-24T13:44:06Z","warc_url":"http:\/\/searchservervirtualization.techtarget.com\/answer\/Newbie-VMware-questions","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":0.009422591,"__label__electronics_and_hardare":0.0362300538,"__label__entertainment":null,"__label__games":null,"__label__health":0.0009797518,"__label__home_and_hobbies":0.000789366,"__label__science_math_and_technology":0.1602760255,"__label__software":0.5078218579,"__label__sports_and_fitness":null,"__label__finance_and_business":0.011697256,"__label__industrial":0.0017107223,"__label__politics":null,"__label__software_development":0.0302245878,"__label__adult_content":null,"__label__crime_and_law":0.0022618477,"__label__history_and_geography":null,"__label__transportation":null,"__label__social_life":null,"__label__travel_and_tourism":null,"__label__religion":null,"__label__fashion_and_beauty":null,"__label__food_and_dining":null,"__label__literature":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
3f19f0bf-2b48-44db-929a-f69246c2ce45
8 Benefits Of Adding Radish To Your Daily Diet Radishes, often overlooked in the realm of nutrition, are small yet mighty root vegetables packed with a multitude of health benefits. Adding radishes to your daily diet can yield numerous advantages for your overall well-being. From enhancing digestion to boosting immunity, here are eight remarkable benefits that will compel you to include this crunchy vegetable in your meals. Nutrient Powerhouse in a Tiny Package Despite their small size, radishes are loaded with essential nutrients. They are rich in vitamins C, K, and B6, along with minerals like potassium, calcium, and magnesium. This nutrient profile makes them a potent addition to your diet, supporting various bodily functions. Enhances Digestive Health Radishes are known for their natural detoxifying properties. High in fiber content, they promote healthy digestion by preventing constipation and improving bowel movements. The presence of enzymes aids in the breakdown of complex carbohydrates and fats, facilitating better digestion. Alleviates Indigestion and Bloating The enzymes present in radishes help alleviate indigestion and bloating by promoting the production of bile. This, in turn, aids in smoother digestion, reducing discomfort associated with gas and bloating after meals. Supports Weight Management Incorporating radishes into your diet can be beneficial for weight management. Low in calories and high in fiber, they offer a feeling of fullness, curbing unnecessary cravings and preventing overeating. Additionally, their natural water content assists in staying hydrated while controlling calorie intake. Boosts Immune Function The abundance of vitamin C in radishes serves as a powerful antioxidant, bolstering the immune system. Regular consumption can help the body fight off infections, common colds, and other illnesses by strengthening the immune response. Fights Against Free Radicals The antioxidants present in radishes combat free radicals, which can cause cellular damage. These antioxidants help in neutralizing these harmful molecules, reducing the risk of chronic diseases and supporting overall health. Promotes Skin Health Vitamin C in radishes not only boosts immunity but also contributes to radiant skin. Its collagen-building properties aid in maintaining healthy skin by improving elasticity and reducing signs of aging, such as wrinkles and fine lines. Regulates Blood Pressure Potassium, found abundantly in radishes, plays a vital role in regulating blood pressure levels. This mineral helps relax blood vessels, reducing strain on the cardiovascular system and lowering the risk of hypertension. Cardiovascular Health The combination of potassium and antioxidants in radishes supports heart health. By maintaining healthy blood flow and reducing oxidative stress, they contribute to a lower risk of heart diseases and stroke. Incorporating radishes into your daily diet can offer a multitude of health benefits, from improved digestion and weight management to strengthened immunity and better cardiovascular health. These small yet powerful root vegetables can significantly enhance your overall well-being. FAQs About Adding Radish to Your Diet: Q1: Can radishes help with weight loss? Yes, radishes are low in calories and high in fiber, making them a great addition to a weight loss diet as they help control hunger and promote a feeling of fullness. Q2: How can I incorporate radishes into my meals? Radishes can be eaten raw in salads, pickled, or added to various dishes like stir-fries, soups, or sandwiches for an extra crunch and flavor. Q3: Are there any side effects of consuming radishes? While radishes are generally safe to consume, excessive intake may lead to digestive discomfort for some individuals. Moderation is key. Q4: Can radishes help improve skin health? Yes, the high vitamin C content in radishes promotes collagen production, contributing to healthier and more radiant skin. Leave a Comment
{"cc_dump":"CC-MAIN-2024-33","dolma2_qc":{"0":0.4753296673,"1":0.52469033},"exact_duplicates":1,"lang":{"en":0.9228451252},"madlad":{"num_sentences":36,"rule.2":[26],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":597,"sa_remove_ranges":[],"text_hash":"254915639874038021309064101645065869801","warc_content_type":"text\/html","warc_date":"2024-08-07T04:58:51.000Z","warc_url":"https:\/\/pizzapalaceokc.com\/8-benefits-of-adding-radish-to-your-daily-diet\/","weborganizer":{"__label__art_and_design":null,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__fashion_and_beauty":0.0011087309,"__label__finance_and_business":null,"__label__health":0.984585464,"__label__science_math_and_technology":0.00001,"__label__software_development":null,"__label__sports_and_fitness":null,"__label__entertainment":null,"__label__industrial":0.0004144815,"__label__games":null,"__label__home_and_hobbies":0.0005457805,"__label__software":null,"__label__politics":0.00001,"__label__social_life":0.00001,"__label__literature":null,"__label__religion":null,"__label__food_and_dining":0.0097184796,"__label__adult_content":0.00001,"__label__history_and_geography":0.00001,"__label__transportation":null,"__label__travel_and_tourism":null},"weborganizer_max":"__label__health"}
null
null
null
null
null
null
3ff2c7f4-596b-4020-b7aa-b0b7efc0db68
Wednesday, July 31, 2019 Once Upon a Crime "Be a detective and examine everything to unlock the doors of the mystery of time and space." "MOTAS: Mystery of Time and Space" Huh, apparently there are a handful of mystery novels in Japan about Escher... After the Meiji Restoration in 1868, Japan opened up its ports for trade after centuries of closure, but that didn't mean foreign traders were free to go anywhere they wanted. Foreign settlements were opened at select places across Japan, most notably in Yokohama and Kobe. The foreign settlement in Osaka was located in Kawaguchi, and it also provided the home for a certain Dutch civil engineer called George Arnold Esher (who has a son called M.C. Esher...), who was hired by the Japanese government as an advisor, overseeing hydraulic projects like the restoration of the Yodo river in Osaka. One night Escher returns to Osaka after overseeing the harbor in Mikuni, when he is kidnapped and stuffed in a hansom coach. The threats by his assailants make it clear they're actually not after him, but a tradesman called Hans Boemler, but attempts at clearing up the misunderstanding fail. The blinded hansom doesn't allow Escher to see much, but he notices that his kidnappers brought him to the Kawaguchi Foreign Settlement (which is where he was heading anyway), and he's brought into a room, where he finds... the body of Boemler, who apparently had already been found and killed by his kidnappers' boss. With a body on their hand, and a mistaken abductee, the fiends decide to burn the place down, but Escher is miraculously saved from the fire. But in the subsequent investigation, one problem arises: Boemler's body was never found. Escher and his comrades try to figure out what happened exactly that night, but none of their theories work, and Escher would eventually leave Japan. Morie Shunsaku takes up the case of Mr. Shioji in 2001, who is accused of murdering Udou, a businessman who together with a few other men beat Shioji up at the golf course, after Shioji assaulted them first. Shioji used to be a police officer, but he was basically crippled by Udou and his friends back when they were students and participating in the student riots in the 70s, giving Shioji enough of a motive for murder. Udou had been strangled on the street at night, and with witnesses stating they saw Shioji tailing Udou, and even someone who saw the murder happen from across the street, Shioji's guilt seems clear, but he swears that he never touched the man and that Udou was assaulted by some invisible ghost, as he saw Udou suddenly struggling and falling down on the street even though there was nobody around. This alone sounds like an impossible crime, but Morie also learns that in 1970, Udou's circle of friends was involved with a mysterious murder. The friends had been drinking near the warehouse district, when Hikura headed back home. He made his way through Ajigawa Tunnel (a deep, long tunnel running beneath the Aji River) and at the other end of the tunnel, he discovered the body of Toomi, one of the friends he had been drinking with. While Hikura had not seen Toomi when he left (meaning Toomi could've come here before him), Hikura did see Udou and the others before he left and none of them could've overtaken him to arrive at the tunnel earlier and commit the murder, as there is only one single road to the tunnel. Morie has a nagging feeling that the Ajigawa Tunnel Murder has some similarities with the George Esher case he read about in a pamphlet, and he decides to try to solve these cases too in Ashibe Taku's Toki no Misshitsu ("A Locked Space in Time", 2001). Toki no Misshitsu is the tenth entry in this series starring the defense attorney Morie Shunsaku, who more often than not ends up amateur sleuthing. And as you can gather from my feeble attempt at a summary, it's also a very ambitious work, that tries to do a lot. I do have to say that the title can be a bit misleading, as while they talk about sealed spaces and locked rooms all the time, most of the situations aren't really locked room mysteries. The 1876 Escher case for example is called a sealed space because the Kawaguchi Foreign Settlement is a "sealed space" (extraterrorial ground) from which Boemler's body disappeared. The Ajigawa Tunnel murder is considered a "locked room murder" because the suspects were all located at one side of the tunnel and none of them could've made it to the other side of the tunnel without being seen by the reliable witness (i.e. the area between the witness and the victim was "a locked space" for the suspects, but the murder was possible for anyone on the other side of the tunnel). There is another problem presented in the prologue, where Morie is riding on the Aqua-Liner aqua-bus with a certain package, but he can't figure out how his opponent is going to retrieve that package and escape from the police, as the canals and rivers of Osaka basically make any quick escape impossible. The only real impossible crime situation is that of the Udou murder, where the defendant says Udou was attacked by a ghost, and a witness says he saw the defendant assault the victim, but even then it's not really a locked room mystery. So the title is rather misleading. To be honest, the four "sealed space" mysteries are not likely to make much of an impression if taken alone. The solutions for both the Aqualiner mystery and the Udou murder are fairly simple to guess and I wouldn't be surprised if you had seen similar answers elsewhere. The Escher and the Ajigawa Tunnel cases are more interesting, as their underlying trick is the same if the execution is different, and Morie manages to solve the Ajigawa Tunnel case only because he figured out the Escher case. It has to be noted that once again, their base idea is nothing particularly inspiring, but at least the synergy is here between these cases, and it is interesting to see how two completely different situations, set in very different times, are ultimately built around the same notion, and the way it ties back to M.C. Escher (who makes an appearance as a kid) is pretty neat. I actually thought this novel to be packed way too full (besides the four "sealed space" mysteries, there's even a code cracking section, and more), and personally, I think a novel only focused on the Esher and Ajigawa Tunnel cases would've worked better, as the other elements in Toki no Misshitsu feel far less integrated compared to these two parts. There is not that much synergy between the various parts, so at times the novel does feel like a collection of various mysterious events, rather than one cohesive story (especially as there's just so much going on in this novel across various time periods). I've mentioned in earlier reviews of Ashibe's work that he loves weaving historical and literary research into his stories: the pastiche stories with famous fictional detectives in his The Exhibition of Great Detectives series (Part 1 and Part 2) are excellent examples of how Ashibe not only shows great understanding of the works he imitates, from writing style to publication history, but you also see how he does a tremendous amount of research in world history, as he also makes connections between his fictional tales, and real world events. His work is always brimming with historical references and explanations, which can also backfire a bit: I thought Satsujin Kigeki no Modern City  was going a bit overboard with its explanations of basically everything in 1930s Osaka. With a story set in the three distinct time periods (1876, 1970 and 2001), you're sure to find plenty of references and historical explanations in Toki no Misshitsu too, though I didn't find it as intrusive as with Satsujin Kigeki no Modern City. You are sure to learn a lot while reading this book, but the way Ashibe uses the historical A.G. Esher for his mystery for example is pretty neat and a good example of how to do a historical mystery. It's also clear that Ashibe loves the city of Osaka, and as always, you're always seeing a lot of the Water Capital in various forms. The amount of research in the city's history can sometimes a bit overwhelming and distract a bit from the main mystery plot, but readers into atmosphere will definitely love Toki no Misshitsu, and Ashibe's in general, I think. I might not be the ideal reader of Toki no Misshitsu, as I freely admit I'm a reader who focuses more on the core mystery plot and less on "story". Personally, I think a tale focusing solely on the two most interesting situations, the Escher and Ajigawa Tunnel cases, would've worked better than the way it is now, with a lot going on. The idea of using Escher and the Kawaguchi Foreign Settlement is quite original though and the idea of a "sealed space" mystery with the tunnel is also interesting, even if the "locked room" moniker is a bit misleading. I do think that people who really like to read "an epic story" will like Toki no Misshitsu as Ashibe really went all-out here, with so much mysteries to be solved in the city of Osaka, spanning a period of more than a century. Original Japanese title(s): 芦辺拓 『時の密室』 Wednesday, July 24, 2019 Famous Mistakes 「いろりろおききするのが、私の仕事でして」 「失敬な人だな。いったいどこの局?名前と所属を聞いておくよ」 「名前は福家です。所属は警視庁捜査一課です」 『相棒』 "It is my job to ask questions about everything." "Do you know how rude you are? What station are you working for? Give me your name and your department." 'My name is Fukie. My department is the Metropolitan Police Department, Division 1." Now I think about it, I don't really read many inverted mystery series. Sure, Conan and Kindaichi Shounen have some occasionally, but I haven't actually read a whole series that consists solely out of inverted stories... (with the Columbo and Furuhata Ninzaburou novels/short stories being exceptions, but not really series on their own in the first place). Earlier this year I reviewed Ookura Takahiro's Fukuie Keibuho no Aisatsu, the first volume featuring the inverted mystery stories starring Lieutenant Fukuie of the Metropolitan Police Department. Ookura had in the past written several official Columbo novelizations for the Japanese market and the inspiration the Lieutenant Fukuie series takes from his grand predecessor are quite easy to pick up. Fukuie is a youthful-looking, small woman with frameless glasses who is often mistaken to be a college student, reporter, secretary or anything but a police detective, but she is in fact one of the sharpest officers in Division 1, in charge of homicide investigations. The first impression of most people is that of a scatterminded, clumsy woman, who has a knack for losing track of her police badge, but the real criminals soon learn that Fukuie is more than meets the eye, as the efficiency with she works, as well as her eye for fine detail usually put her right on their trail. Fukuie Keibuho no Saihou ("The Second Visit of Lieutenant Fukuie, 2009), which also carries the alternate English title of Reenter Lieutenant Fukuie, contains four stories told from the perspective of the criminals as they're being cornered by the Lieutenant, from a popular screenwriter who comes up with an elaborate fake abduction to secure his own alibi to one half of a comedy duo who takes drastic measures in order to break up his partnership. Not much time passed between me reading the first volume and this second volume in the series, which usually indicates that this is a series I enjoy, obviously. And it is! Granted, the stories are all relatively short and because each of these stories follow the same inverted style, they eventually feel somewhat alike as most of the time the set-up of the core plot is rather similar (criminal comes up with perfect plan to commit murder, unforeseen happening during the crime allows Fukuie to solve the case), but nonetheless, this is great entertainment, and like an episode of Columbo, much of the joy comes from seeing how Fukuie slowly but surely manages to creep up to the murderer with evidence. Part of the fun also lies in the diverse backgrounds of each of the stories. In one story, you'll be reading up on the world of vinyl figures and counterfeit toys, the other is about a manzai stand-up comedy duo and the entertainment industry. Each story touches upon completely different worlds, so at least in that aspect, this series never disappoints. Like many of the Columbo episodes, the criminals are usually people who have been succesful in their lives (or at least in the past). Different however is that most of the murderers in this volume are driven to their crime because they're being blackmailed for a past mistake. Only one story features a motive that is closer to the "immediate gain"/"removing an obstacle" motive often seen in Columbo. I didn't mention it in my review of the first volume, but the Lieutentant Fukuie also resembles Columbo due to the comedic undertones. Fukuie being mistaken for all kinds of people, the way the forensic investigator Nioka always ends up having to tag along with Fukuie as she goes off on a hunch of hers and the numerous hints to Fukuie's private life all bring some lighthearted moments. Fukuie makes no hints about her husband or any private relations, but she reveals herself to be a big fan of stand-up comedies and even children's action hero series, and it's a mystery how she manages to watch them as she never sleeps whenever she's working on a case. A lot of comedy is also derived from the many, many side characters who appear each story. Each story is usually divided in about 10 segments, and often, four or so of them are about related parties, like acquaintances of the victim or culprit or just the waiter from an often-frequented restaurant, getting a visit of Fukuie. These segments are usually very short, five or six pages, each featuring characters who only make their one appearance then, so while the stories are relatively short and the core crime fairly compact, you'll always see quite a few characters pass by as you follow Fukuie's investigation. These characters are also surprisingly well-defined despite their short time on the stage, and they too often lighten the mood. Like I mentioned in the other review however, I do find it hard to write down my thoughts on the individual stories, as it's so easy to spoil too much about them. Their inverted nature mean that the reader will always know more than the Lieutenant and that much of the underlying mystery plot is revealed right from the start to them: from the way the murderer committed the crime to the lines of defense erected by them to divert suspicion. Most of the time, the mystery for the readers revolves around two points: how did Fukuie first start to suspect the true criminal, and how will she manage to prove her target did it? Usually, the trail is born because some unforeseen event occured during the crime, for example because the victim fought back or something else happened at the same time as the crime, and it's up to both the reader and Fukuie to deduce what that event is. This is also the case in the opening story, Max-Gou Jiken ("The Incident On The Max"). Harada Akihiro is the director of a home security company who who is an often-seen guest on television as an expert on his field, and his security company is preparing to do business in the States too. That is why Harada is desperate to hide the fact that long ago, when he started out as a private detective, he blackmailed people: it was this money that eventually made him the man he is now. His partner in crime then was Naomi, a freelance investigator. She too used her money to open her own business, but her bar has now folded, and with gambling debts too weighing her down, she turns to Harada "for old times' sake", with some audio tapes with incriminating conversations as her insurance. Fearing she'll forever keep him on a leash, Harada decides to kill Naomi. He invites her to the Max, a small leisure cruise ship that's usually carrying guests from Muroran, Hokkaido (Northern Japan) to Hakata/Fukuoka (Southern Japan), but  this time, the Max has been chartered by a tour operator for a overnight trip to the islands south of Tokyo back. Harada's plan is to kill Naomi and make it seem like another of her victims is the killer (as one of their men was sent to the Max too to keep an eye on Naomi). What Harada couldn't have guessed however that Lieutenant Fukuie would accidently become a stowaway on the Max (having lingered too long on the ship for a different investigation). Most of the mystery is already revealed to the reader, though it's a bit of a stretch of how Fukuie managed to guess that Harada would be present on the ship in the first place. The clue that proves that Harada is the killer however is done splendidly, with you knowing that something must have happened that neither Harada nor the reader know, but which Fukuie manages to deduce based on the same things both the killer and we know. Ushinawareta Tomoshibi ("Lost Light") reminds slightly of the Columbo episode Negative Reaction, as it concerns a fake kidnapping. Toudou Masaya is a succesful screenwriter for both the silver screen and television, but nobody knows his hit debut work was actually stolen from a childhood friend who died young. Well, nobody except for a shady antiques dealer who happened to come across the same script when the friend's parents were selling the contents of their old storage. Toudou comes up with an elaborate plan to kill the antiques dealer. Mimuro Kanji is a unsuccesful actor who is a big fan of Toudou and even comes close to being a stalker. Toudou tells Mimuro he wants him to play the role of the kidnapper in his upcoming production. The final call is on the head of the director and the producer of the movie, so Toudou says he'll secretly go through the play together with Mimuro so he'll nail the audition. The two leave in secret to Toudou's villa in the forest to practice the role, but in reality Toudou's been secretly recording all of Mimuro's lines as a kidnapper. Later, he knocks Mimuro out, and uses the recordings to call his own secretary to fake his own abduction. Of course, Toudou kills the antiques dealer during his "abduction" and after his return to the villa, Mimuro is also silenced, with the scene looking as if Toudou killed Mimuro in self-defence. This is the longest story of the volume, with two murders no less, and it's certainly also one of the better stories in the series. Fukuie's suspicions are first pointed towards the curiosities at the abduction site. The clues are relatively "insignificant", but taken together really show Fukuie's suspicions are justified, like how the order of the shoes in the entrance was wrong, or how strangely enough, Toudou's laptop's battery was empty despite him having been captive for the day. The way Fukuie eventually manages to trap Toudou on the murder on the antiques dealer depends on a very old trope in inverted mystery stories, but the way this is set-up is good: Ookura leaves several incomplete and seemingly insignificant clues throughout the story that when taken together indicate a certain happening that forms the key to solving the case. Aibou ("Partners") is about the manzai stand-up comedy duo Yamanote Nobori / Kudari, veterans in the trade but lately not doing as good as in the past. Half of the duo, Tachiishi Kouji, has been offered a chance to go at it solo, but his partner, Utsumi Tamao, is not willing to disband, at least not until the anniversary of the death of their mentor. The offer for Tachiishi however will not last for so many months. It also frustrates him that these last months, Utsumi has clearly been winging his gigs with Tachiishi, sometimes forgetting his lines or mistiming them, so Tachiishi decides the only way out is to eliminate his former partner. The plan is to lure Utsumi to their secret hide-out, a house they bought together long ago in the outskirts of Tokyo where they could practice their sketches. Knowing that Utsumi, who has lost his key, will try to climb the tree in the garden to get the spare key hidden in the potted plants on the balcony on the second floor, Tachiishi awaits Utsumi there to push him from the tree. He succeeds, but Fukuie, a fan of manzai comedy, quickly notices something's off. The greatest mystery here lies in the fact that Utsumi had taken a few weird actions before coming to the house (like dressing up in the clothing from when Yamanote Nobori / Kudari debuted). This is a riddle to both Tachiishi and the reader, so in that aspect, you're on level ground with Fukuie, who is still likely to figure things out swifter. Once you know why Utsumi did those things, it still takes a bit of imagination to arrive at the clue that will prove that Tachiishi killed his partner, but overall, this is a short, but nice enough story. The final story is Project Blue. Arai Nobuhiro is the director of Swamp Imp, a project planning bureau that specializes in toys, coming up with toy designs, promotions for toys etc. 15 years ago however, Arai made money by manufacturing counterfeits of rare vinyl kaiju/monster figures. Nishimura, a toy modeler, has finally found proof of Arai's shady past, but Arai quickly eliminates this threat, and dresses the scene to look like an accident, with Nishimura "apparently" having been hit by his own car with bad brakes after he had parked it on a slope. When Fukuie first visits Arai, we learn his alibi for the murder: he claims he had been working on a model figure of the new version of Blueman. The hero of the show that is now airing will have a powered-up form next year, and final decisions on the design were only made last night by the TV production team: they immediately mailed the design to Swamp Imp, and Arai made and painted his prototype that same night, giving him the alibi. It's not particularly hard to guess how Arai managed to prepare his alibi, but the manner in which Fukuie eventually manages to prove Arai was at the crime scene at the time of the murder is again slyly done, with several smaller incidents that don't seem to mean much on their own, indicating an important event that had gone unnoticed by both the murderer and the reader until it's too late. Fukuie Keibuho no Saihou is perhaps not very different from the first volume: here too you'll find four well-plotted inverted mystery stories that admittedly can feel somewhat similar in structure and in the way Fukuie manages to catch the culprit, but the stories are all really well done and the whole volume is a very solid read overall. It's very consistent in its quality, and I think for me, it'll be one of those 'safe reads' when I don't know what to read next and simply want something I know will be good. Original Japanese title(s):『福家警部補の再訪』:「マックス号事件」/「失われた灯」/「相棒」/「プロジェクトブルー」 Wednesday, July 17, 2019 Scissor Man 「これは記憶媒体?」 「記憶じゃない、思い出だよ」  『名探偵コナン  純黒の悪夢』 "Is it a memory stick?" "It's not memory storage... it's a memory." "Detective Conan: The Darkest Nightmare" It is no secret that I am a fan of puzzle plot mystery stories that feature supernatural powers, or fantasy or science-fiction elements. Some might mistakenly think that these "unrealistic" elements make a true fair puzzle plot impossible, but that is no true: as long there's consistency in what's possible in the specific world, a puzzle plot mystery works, whether it's our "real" world or a world where people can teleport and walk through walls. The key is of course to use the non-realistic elements to come up with a mystery story you couldn't otherwise, to utilize the tools specific to that world to create a plot that follows the internal rules, like the Three Laws of Robotics or specific rules to casting magic. Today's book is another interesting example of a puzzle plot mystery that uses a supernatural setting. After the death of her parents, Yukari was brought up by her grandmother, but when she died too, it was arranged that Yukari would move to Tokyo to live with her father's cousin Shinsuke at least until she'd finish high school there. Ever since she was a child, Yukari has been in the possession of paranormal powers in the form of psychometry: she can read the memory of objects, seeing flashes of the persons who owned or touched the object in question. The fact Yukari's an esper turns out to come in handy at times for Shinsuke, as he's a police detective of the Metropolitan Police Department, and occassionally, Yukari manages to help out with his cases by reading the memories of objects involved with his cases. Imamura Aya's short story collection Hasami no Kioku ("Memories of Scissors", 1996) showcases four stories in which Yukari's powers turn out to be the key to solving the case. This is funnily enough not even the first time I've seen psychometry used in a mystery story.  The manga Psychometrer EIJI is pretty famous, written by the author of Kindaichi Shounen no Jikenbo. I've also reviewed the videogame Glass Rose in the past, wich had a protagonist who could read memories from people and objects. The power to read an object's memory might sound like a cheat for a detective story: an esper could just read the murder weapon and see what happened, right? Imamura however manages to do a few interesting things with the device of psychometry that makes this short story collection a worthwhile read. First of all, given that Yukari's just a high school student, Shinsuke obviously can't just take evidence with him to have Yukari touch it. But besides this practical reason, there's also a structural reason why psychometry isn't a cheat here. What Imamura does here is build her stories around a crucial contradiction between the facts as the police confirm them, and what Yukari learns through her psychometric powers. While the methods differ, the facts obtained from both sides are treated equal, and the mystery of these tales thus revolve around why there's a contradiction between these facts. The opening story, 3-ji 10-pun no Shi ("Death at 3:10"), is by far the best story in the collection. One of her first friends Yukari made when she moved to Tokyo was Sanae, who worked at the flower shop, and she, or to be exact, her boyfriend Junpei is in trouble. Junpei's wealthy uncle was killed, and he is the main suspect, especially as a neighbor says he saw Junpei leave the house in the middle of the night. His alibi that he was with Sanae isn't trusted by the police, but Yukari learns that this alibi is correct, as she touched Sanae's necklace and read its memories. But who did kill the man then at 3:10, as shown by the broken clock? This is a really ingenious story that not only makes good use of the concept of psychometry to present a contradiction and a mystery (we, as the reader, know that Junpei's alibi holds), but the solution surrounding the mystery of the time of death also very devilishly clewed. In the title story Hasami no Kioku ("Memories of Scissors"), Yukari is basically kidnapped by Noriko, a friend of Shinsuke and a manga artist, who desperately needs an emergency assistant to help finish up the last few pages for her deadline. After they're done, Yukari is chilling in Noriko's room when she touches a pair of sewing scissors and reads emotions of death, and memories of a loving mother and her son in pain from it. Most of Noriko's interior consists of things people threw away or discarded, and Noriko had picked up this pair of scissors too, from in a box with a handsewn teddy bear and more, only a few weeks ago. Suspecting the pair of scissors had been used to kill the boy from the memories, Yukari and Noriko start searching for the original owner, but they learn that she has died, and strangely enough, they learn of an episode years ago, when her son was still a child, where her young son accidently stabbed his mother with a pair of scissors, even though the memories of the scissors say otherwise. Compared to the first story, this story is far more focused on figuring out the exact relations between the various characters, which make it a less involved mystery story in my eyes, but still a tricky one. The first one would be the "technical" mystery, while this story I'd describe as the more "human drama" based one. Bentoubako wa Shitteiru ("The Lunch Box Knows") is I think the shortest story, and involves the murder of a middle-aged man who had recently been let go by his company. He had been happily married with his wife for seven years, with many of his colleagues jealous of the lunchboxes she made for her husband, but some days ago, his wife suddenly disappeared, as the past caught up with her: an old boyfriend who was so crazy about her that he killed another man was recently released from prison and is now trying to find her. Fearing that not only she, but the man who actually married her, are in danger, she ran away, but it was too late, as her husband was found murdered at home. Shinsuke however discovers some discrepancies between the facts, and manages to get hold of one particular object that would allow Yukari to solve the case. A simple story, with a rather obvious conclusion/'punchline' coming up, but it works fairly well. There's not much of a mystery going on here though, as Shinsuke himself manages to work most of the story out himself. Neko no Ongaeshi ("The Cat's Return of a Favor") has slight fantasy undertones. We are introduced to Masamichi, an elderly vet who quit his clinic after his son Masahiro died in a tragic traffic accident as he swayed to avoid a cat. Masamichi runs into Yukiko,  a woman who says she was classmates with Masahiro, back in elementary school when he was living with Masamichi's sister for a short period to recover from an illness. Learning of Masahiro's death shocks her greatly. As she recently came to Tokyo to find work, hoping that Masahiro would help her out, Masamichi decides to have her live with him in the house, doing the housekeeping until she finds another job. Funnily enough though, Yukiko appeared soon after a stray cat Masamichi often fed disappeared from the streets, and more than once, Yukiko seemed to show signs of perhaps being that cat, with her knowing the way around the house before Masamichi even said anything.  Yukari learns of this story through the drawing assistant of Noriko, but Yukari's suspicions are instantly raised, as she knows of a recent murder case, where a woman swindled her way into the life of an elderly, single man, living with him for a while after which she robbed him of all his money and his life. She informs Shinsuke of this, who goes to take a look, but he finds that Yukiko has already gone, but without stealing anything. The hand mirror she left behind however allows Yukari to solve the mystery of Yukiko. The mystery here is a bit simple, as one particular memory Yukari manages to read from the mirror is basically the solution as is. Cute story though. Imamura died in a rather tragic manner in 2013 and Hasami no Kioku thus remains the sole story collection with Yukari and her psychometric powers. While not all four stories in this collection are as strong as mystery stories, the way Imamura manages to use psychometry in meaningful manners for this contradiction-based stories is quite admirable, and overall, this book is quite an entertaining read and a good example of how supernatural powers can still work in a fair play mystery story. Original Japanese title(s): 今邑彩 『鋏の記憶』:「3時10分の死」/「鋏の記憶」/「弁当箱は知っている」/「猫の恩返し」 Wednesday, July 10, 2019 Alice’s Evidence Humpty Dumpty sat on a wall, Humpty Dumpty had a great fall (Nursery rhyme) I always have to think of an old college classmate, whenever I come across something related to Alice in Wonderland, which is kinda strange because I'm pretty sure we only talked about the novel once. I guess she'd like this novel too though. Humpty Dumpty had a great fall, but it was no accident. Some person, or animal, had oiled up the wall upon which the great egg had been sitting, and there was still a vaguely visible hand print left on one of the cracked shell shards. A murder in Wonderland! The Mad Hatter and the March Hare investigate the murder and quickly find a witness: the White Rabbit swears that Alice, and nobody else but Alice entered the garden where Humpty Dumpty was. Alice says she is innocent, but when the Gryphon is murdered too by suffocating on literally a mouthful of shellfish and Alice once again lacks a clear alibi, the net around her seems to be closing. Lately, college student Kurisugawa Ari has been having these weird dreams that place her in some kind of mysterious and highly nonsensical Wonderland ruled by the Queen of Hearts. But once she started thinking about it, she realizes she has never ever had dreams about anything else: she always dreams about her being in Wonderland, having adventures with characters like the Mad Hatter, the Cheshire Cat and the White Rabbit. On the day after she dreamt Humpty Dumpty died, she is shocked to hear a student of her faculty died in a creepily similar manner, by falling of the roof of the faculty building. It seems it was a simple accident, but speaking with some of her fellow students, she learns that it was no coincidence: more people around her dream of Wonderland! The intelligent Imori, a study mate, turns out to be the dull-witted Bill the Lizard in Wonderland, and they realize that the deaths that happen in Wonderland are reflected in this world too, resulting in the death of their Earthly counterparts. The two work together both in the real world and in Wonderland to prove of Alice's innocence and find the real murderer in Kobayashi Yasumi's Alice Goroshi (The Murder of Alice, 2013). I have not read the original Alice in Wonderland, nor even seen any of the (animated) movie adaptations, but man, I come across it a lot in Japanese mystery fiction. In fact, I think I can more-or-less construct the whole original story, simply by putting all the references I know one after another. It's kinda like Star Wars, which is parodied and referenced so often one can basically guess how the whole story goes just by consuming other media. A few titles I have reviewed here are for example Alice Mirror Jou Satsujin Jiken, The Land of the Wondrous Beauty in the second volume of Kaiki Tantei Sharaku Homura, and several works like the short story Jabberwocky by Arisugawa Alice, who took his pen name from Alice in Wonderland. Actually, I even praised myself a bit for picking up on the Alice in Wonderland reference when I was translating Arisugawa's The Moai Island Puzzle, exactly because I shouldn't even have noticed it as I don't have direct knowledge of the original story. Anyway, the concept of a mystery story that revolves around Alice in Wonderland wasn't special an sich, was what I was going to say. Kobayashi Yasumi's Alice Goroshi seemed like an interesting title/topic when I first heard of the book, but I have to admit the title only really caught my attention when Kobayashi released a sequel titled Clara Goroshi ("The Murder of Clara"), with Clara being the friend of Heidi. Now things were becoming really interesting, as the premise of a whole series built around classical children's fiction seemed too good to pass. I opted to wait for the (cheaper) pocket re-release of Alice Goroshi though which was finally released in 2019. Was it worth the wait? Yep, it sure was! As one can guess, story chapters alternate between Wonderland and the real world: in Wonderland we follow Alice and Bill the Lizard, while in the real world we follow Ari and Imori. The parts in Wonderland are fantastic. As said, I haven't read the original Alice in Wonderland, but the nonsensical dialogues and wordplay that go on in these half of the story are great and also sure to annoy you immensely (in a good way): everyone seems to get their wires crossed as they talk with each other leading to amusing, but nonsensical conversations, and that while Alice is desperate to find some way to prove her innocence. It's what you'd expect of Alice in Wonderland, and this novel really manages to capture that spirit. It's in this strange world that Alice tries to solve the murders, and it results in some really unique situations, with creatures like a Boojum also appearing as fanciful murder methods. Fantastical ways to kill off people are possible in Wonderland, and there's no scientific investigation like checking for DNA or blood of course, so the reader might be overwhelmed by all of this, figuring it's impossible to figure out who the murderer is: that is not the case. In fact, Kobayashi plays a nasty game with the reader here, as he plants some deliciously subtle clues in the nonsensical dialogues that actually allow you to identify at least some part of the mystery quite early on. If you manage to pick up on that, of course (I wasn't). The events in the real world are of course less fantastical, but the more realistic tone here does really help the story, as 380 pages of only Wonderland would've been quite tiring. That said, the worlds do kinda seem to blend into each other as the story progresses. In the early chapters, Ari obviously has trouble accepting the truth that she's been living in Wonderland in her dreams and that she shares this dream with other people. But as events unfold, we learn of more people around her who have an avatar in Wonderland and certainly near the end, some human characters seem to resemble their Wonderland avatars a lot more than at the start of the story. The murders that are committed in Wonderland lead to death in the real world, but not in the exact same manner: the counterpart to the Gripphon for example was a professor at the university, but he died 'simply' of food poisoning (from shellfish), not by being force-fed them. That means that even though we're talking about a series of murders in Wonderland, there aren't even really murders happening in the real world, leading to a very unique situation where the human characters in the real world are investigating a series of murders in Wonderland. It's in Wonderland where they can find proof and interrogate witnesses, but due to the crazy characters in Wonderland, it's only possible for Ari and Imori to apply real logic to the problem and really think about the how and who while in the real world. There is an added thread of suspense here as Ari is also under investigation by two police detectives who suspect there's something fishy going on with all the deaths that happen at this university, and who are very eager to find out who Ari is in Wonderland. You don't need Wonderland-logic to solve this mystery though. It's a surprisingly tricky plot, because it's split up in two distinct locales with their own narratives: for example it is possible to figure out who the murderer is in Wonderland fairly early on (or at least have founded suspicions), but that doesn't mean you know who that character is in the real world. You need to combine clues from both worlds in order to solve the mystery, which can be quite a challenge, especially as the dialogues in Wonderland can seem to be so crazy at times. The main clue to the identity of the murderer for example can be really easy to miss because the jumping between the two worlds, but once pointed out it seems so obvious. I myself only got the last big twist, but missed most of the stuff regarding the murderer. There's also a nice dying message near the end of the story that points towards the murderer in a very roundabout, but at the same time also very logical manner. It is a good example of how to do a dying message that is meaningful in the context of the story, without being too complex just for the sake to be too hard to decipher for the reader. Oh, I do have to make a note that Alice Goroshi can become quite gory near the end. Guh. I mean, you might be thinking 'Haha, Alice in Wonderland, it's so cute,' but man, I didn't see that one scene in the house near the end coming. It's really frightening. It becomes really messy once you're past the halfway point. So yes, I really enjoyed Alice Goroshi, as it not only had a really unique premise and setting, it also made excellent use of that to bring a tightly-plotted mystery plot that works because of the premise. The way it utilizes Alice-mythos isn't just for show, but in integral part of the plot, resulting in one of the more memorable reads of this year. I am definitely looking forward to reading the sequels to Alice: at the moment of writing this review, Clara and Dorothy (of The Wizard of Oz) have already featured in their own titles, so I hope the pocket versions are released soon. Original Japanese title(s):  小林泰三 『アリス殺し』 Wednesday, July 3, 2019 The Wild Brood One little nigger boy left all alone He got married and then there were none First impressions are ever-lasting, so I always imagine Kidd and Pink from these books exactly like they appeared and sounded in the PlayStation game Cat the Ripper, even though that was err... quite a bad game (though the voice-acting was okay). Last year, I reviewed Yamaguchi Masaya's amusing The 13th Detective, a gamebook-turned-novel which was set in Parallel Britain, which is not a world where Brexit didn't happen, but a world that is similar to ours, but different at key points (for example, Shakespeare's Romeo and Juliet was a comedy, not a tragedy). The most important difference however is that all the fictional detectives we know, like Sherlock Holmes, Dr. Gideon Fell or Father Brown, all exist in Parallel Britain. Their successes led to Edward's Law in Great Britain: detectives belonging to the Masters of Detective Association are allowed to lead and command any official criminal investigation for 72 hours, during which the police force must follow the detective's orders. Due to the superior position of the MDs in this world, Scotland Yard has been reduced to a lowly supporting role, and nowadays most police officers are just punk hooligans or slackers who consider policework nothing but a job like any other. The mohawk-bearing Kidd Pistols is one of these punk police detectives of Scotland Yard. He and his girlfriend/subordinate Pink Belladonna form the National Unbelievable Troubles Section (NUTS) inside Scotland Yard, where they deal with weird incidents that normal police detectives can't handle, and therefore they often have to team up with rather eccentric MDs, like Sherlock Holmes Jr. (one of many who claim to be the son of the great detective) or Dr. Bull (a disciple of Dr. Fell). While Kidd is often mistaken for just another of those lazy, good-for-nothing punks who work at Scotland Yard, Kidd is actually often capable of out-thinking the proper MDs in the nutty cases he handles by acting exactly like a punk, not confirming to fixed views and looking at things from a completely different angle. In Yamaguchi Masaya's short story collection Kidd Pistols no Boutoku ("The Blasphemy of Kidd Pistols", 1991), we are presented with four NUTS cases patterned after Mother Goose rhymes which involve, among others, a dead hippopotamus, a plastered piece of shit and a locked room murder committed by the Jamaican spirit Duppy. Kidd and Pink are called out to the home of the legendary actress Elizabeth Skinner, who lost her first love of her life in the war, and got dumped by her second love. After that, she remained cooped up in her own home for fifty years, never ever setting a foot outside anymore, only eating and drinking each and every day. The only people she let inside her house were her maid and her solicitor. Her pitiful life also ended in a pitiful way, because the rather corpulent Elizabeth was one morning found murdered in her home (and with corpulent, I mean they needed Kidd, Pink and two others to move her body out the house). Traces of poison are found in her dinner of the previous day, but the whole case doesn't jive: Elizabeth wouldn't have let anyone inside, the maid who prepared the food could hardly be so foolish as to poison the food she made herself and there are no traces of unlawful entry in the house. Kidd, Pink and Sherlock Holmes Jr. therefore have to figure out who murdered a poor woman who hadn't even gone outside even once in fifty years in the opening story "Mushamusha, Gokugoku" Satsujin Jiken, which also carries the English title The "Victuals and Drink" Murder Case. The mystery revolves around how the murder could've taken place considering the rather unique and curious circumstances of the crime scene (the woman never let anyone she didn't know inside), and the exact location of the body. There are some pretty smart ideas going on here (I love the deductions revolving the location of the body). The solution does require you to deduce the actions of a certain person based on some clews which might not be completely farfetched, but do lack a bit of convincing power. In Kaba wa Wasurenai or Hippopotamus Can Remember, Kidd, Pink and Sherlock Holmes Jr. find themselves investigating the murder on a zoo owner, and his pet hippopotamus. The victim left the dying message "H" on the floor with his own blood, but the mystery is of course why the hippopotamus was killed together with its master. As a whydunnit mystery, this story is rather simple as once you remember one early scene, you're very likely to figure out what happened exactly, but capably clewed. Magatta Hanzai or The Crooked Crime has Kidd and Sherlock Holmes Jr. investigate a series of strange incidents: first a pet shop owner is killed followed by the murder on a businessman, who had purchased two cats from said pet shop owner. The businessman was discovered inside the junkyard/atelier of an artist with whom he had cut financial ties recently, as the "art" the man made was a bit too eccentric considering the cost. The victim's body had been covered in plaster, exactly like the artist's best known works, which obviously seem to suggest the artist had something to do with it, but Kidd manages to arrive at a completely different truth. This is the longest story in the collection, I think, and there are some good things going on here, like a very good, well-supported fake solution and some really neatly hidden clues (though it also has to be said that one early scene is very likely to attract a lot of attention because it's so obviously out of place, it has to be relevant to the solution). I think this plot might've even worked well as a full-length story. The Punky Reggae Murder starts with the seaside live concert Sound System Live, organized by a pirate radio station. The main attraction is without a doubt Buster Solomon and his band the Little Criminals. Buster who started out as a poor boy in the slumps of Jamaica, has now become an major hit in Parallel Britain with his reggae music. He is also a devout believer of Rastafari and uses his music to help out the Labour Party in his home country, as they support Rastafari. This has earned him the treats of right-wing activists, who are likely the ones who are sending him and his band threatening letters with verses from the nursery rhyme Ten Little Niggers, signed by Duppy (a Jamaican evil spirit). Despite these threats, as well as physical fights between his two publishers who would wish the other's dead, Buster intends to play at the fund-raiser concert tomorrow. Everyone in the band, the publishers, as well as Kidd, Pink and Dr. Bull (who were invited through Pink's connectons) stay in cottages overlooking the sea that night. Kidd is called on the phone in the night by Buster, saying he thinks Duppy is hanging outside his cottage, followed by a cry for help. Kidd rushes to Buster's cottage, only to find the front door locked. The french windows on the seaside terrace however are opened, and inside they find Buster, stabbed in his chest and his dreadlocks cut. And to the party's surprise, they find (red) herrings spread around his head, like the verse "A red herring swallowed one and then there were three" from Ten Little Niggers. At first, it is assumed the murderer escaped across the terrace, but a narcotics detective, who had been sent here on a tip regarding a big heroine deal, had been watching the terrace all the time, and had seen nobody leave that way. As the front door was locked, this means this was an impossible murder, as the murderer couldn't have escaped any way from the cottage. Meanwhile, another band member is found dead in the cottage next door, and he has three horrible slashes on his back, like "a big bear hugged one". The background setting of Rastafari and Jamaican religions is rather original and something I at least had never seen in detective fiction before. The use of Ten Little Niggers/And Then There Were None as a theme is of course a risky one, as anyone would be tempted to make a comparison with Christie's work, but this story is quite different, and manages to do very different things with the same rhyme. The fundamental idea that is played out here is not extremely original, but the clewing (with the red herrings) is fairly accomplished. The locked room situation too is not particularly awe-inspiring, though it is connected well, and naturally to the other events going on in this story, so it doesn't feel like it's just there because we needed a locked room murder (note by the way that Dr. Bull is an expert in locked room murders, which is why he's featured in this story rather than Holmes Jr.) One other major clue however is a bit harder to get: it is based on two physical clues, and while one of them is rather cunningly hidden (though to be honest, I had no idea that existed in that form, so I wasn't able to figure that out), but the other one is hardly addressed until the moment Kidd actually explains it. My first introduction to Kidd Pistols as a character was a bit strange, as the game Cat the Ripper is really weird, and while I did like the novel adaptation The 13th Detective, Kidd wasn't really the protagonist there. Kidd Pistols no Boutoku is thus the first time I've read "proper" Kidd stories, but these Mother Goose rhyme-inspired stories are quite entertaining. The setting of Parallel Britain allows for some odd, but funny scenes (like Pink constantly stealing things even though she's a cop) and ex-drug addicts and other punks functioning as the world's narcs and coroners, and most of the stories are plotted well as mysteries, with rather crafty clues at times. And it's only now in this final paragraph that I realize that these stories all feature rather unique motives for actions, which adds to the zaniness of this world. Anyway, I'm certainly interested to see how the other adventures of Kidd and Pink will turn out! Original Japanese title(s): 山口雅也『キッド・ピストルズの冒涜』: 「むしゃむしゃ、ごくごく殺人事件」/「カバは忘れない」/「曲がった犯罪」/「パンキー・レゲエ殺人(マーダー)」
{"cc_dump":"CC-MAIN-2023-14","dolma2_qc":{"0":0.9699049592,"1":0.0301150605},"exact_duplicates":6,"lang":{"en":0.9784783125},"madlad":{"num_sentences":287,"rule.2":[79,251,255],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":9063,"sa_remove_ranges":[],"text_hash":"63572244789036984283854330222191653543","warc_content_type":"text\/html","warc_date":"2023-03-31T14:49:41.000Z","warc_url":"https:\/\/ho-lingnojikenbo.blogspot.com\/2019\/07\/","weborganizer":{"__label__adult_content":0.0038344827,"__label__entertainment":0.2337163687,"__label__food_and_dining":null,"__label__games":0.0474358723,"__label__health":null,"__label__history_and_geography":0.0064982711,"__label__home_and_hobbies":0.0039554066,"__label__literature":0.4921981394,"__label__religion":null,"__label__science_math_and_technology":0.005070332,"__label__art_and_design":0.005394937,"__label__crime_and_law":0.0534133315,"__label__education_and_jobs":null,"__label__fashion_and_beauty":null,"__label__politics":null,"__label__social_life":null,"__label__travel_and_tourism":null,"__label__sports_and_fitness":null,"__label__finance_and_business":null,"__label__electronics_and_hardare":null,"__label__transportation":null,"__label__software":0.0016078452,"__label__industrial":null,"__label__software_development":null},"weborganizer_max":"__label__literature"}
null
null
null
null
null
null
d359686a-5734-4f63-b251-525b6a3ff059
0000aaa161259950 223358212852740 5793220849969373705 n.jpg Gax (alternatively named Sucker Punch) is the Omnitrix's DNA sample of a Chimera Sui Generis from Vilgaxia. Gax is a humanoid creature with a face resembling that of an octopus. He has tentacles dangling in the front of his face, like a beard. His skin is pale-green and he doesn't have a nose or visible ears. He has green eyes and wears a black, green and white armored suit and fingerless black and green gloves. He has white and green boots and white and black pads on his arms, with green spikes on it. His armor is spiked at the shoulder and arm pads. He has light green sacs on the sides of his head. He wears the Omnitrix symbol on his chest. Powers and Abilities Gax is very agile and has good hand-to-hand combat skills, and has enhanced durabilty, as Vilgax was able to survive an explosion at point-blank range before his enhancements. He is just slightly larger than the average human. Gax has shapeshifting arms that can change into a bunch of tentacles (five on each arm). These tentacles are very powerful and retain equal strength to his arms as a whole. Gax is demonstrated to be a very skilled climber, using his sharp claws to dig into the ground and can jump several times his own height. Gax can hear sounds that are too faint for normal hearing to detect, has enhanced reflexes and can regrow his lost tentacles. Gax can also transform into his true form, a giant octopus-like monster, in the ocean. Gax is vulnerable to the cold virus and if Gax is in his true form and becomes too weak, he cannot change back into his humanoid form. He also needs to be in water in this form. However, Ben can just turn back to human form or change to another alien. 0a0b23f9c3-9f08-45a3-8021-8bbc4dfb48df.jpg Older Version: 0000aaa161340254 143596474235474 7224316687782222751 n.jpg Community content is available under CC-BY-SA unless otherwise noted.
{"cc_dump":"CC-MAIN-2021-17","dolma2_qc":{"0":0.9821480513,"1":0.0178718995},"exact_duplicates":0,"lang":{"en":0.9702757597},"madlad":{"num_sentences":20,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":345,"sa_remove_ranges":[],"text_hash":"157706708371992135077409063106580466734","warc_content_type":"application\/http; msgtype=response","warc_date":"2021-04-22T11:20:30Z","warc_url":"https:\/\/ben10fanfiction.fandom.com\/wiki\/Gax_(Battle_Ben-OH)","weborganizer":{"__label__adult_content":null,"__label__art_and_design":0.0216253344,"__label__entertainment":0.3702353835,"__label__games":0.59267658,"__label__home_and_hobbies":0.0433757976,"__label__literature":0.061885979,"__label__social_life":null,"__label__software":null,"__label__software_development":null,"__label__sports_and_fitness":null,"__label__education_and_jobs":null,"__label__religion":0.0244330931,"__label__science_math_and_technology":0.3775506914,"__label__travel_and_tourism":null,"__label__electronics_and_hardare":0.0109969424,"__label__finance_and_business":null,"__label__fashion_and_beauty":null,"__label__crime_and_law":null,"__label__industrial":null,"__label__health":0.0474358723,"__label__history_and_geography":null,"__label__politics":0.0097184796,"__label__transportation":null,"__label__food_and_dining":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
f458c895-9837-41bd-8038-a0b6a23c8623
Passive income. Does money flow to you like a river? Passive income. Does money flow to you like a river? 2020-04-12 23:19:00 Passive income. Does money flow to you like a river? A nice wording is "passive income." Many imagine the following situation - you are lying and doing nothing, and the money is pouring into you like a river! With ordinary people, this option is most likely impossible. Because even if they have in their hands a more or less decent round figure - a million, then they are unlikely to be able to live peacefully and not deny themselves anything. Under the best conditions, they will determine their million in any bank at 7-8% per annum, and this, frankly, is about nothing! Block inflation and okay! Ordinary people will not be able to successfully invest in securities or other similar things, since they do not teach financial literacy at schools and universities about how and how to earn money. I remember that I had a lecture at the university and we talked there about passive income, etc. I don’t remember what the teacher was talking about in detail, but I remembered well what she said "and don’t try to climb on the forex"! So much for financial literacy. The following is written about passive income on the Internet. 1. Create a YouTube channel and promote interesting videos. And how much strength, energy, ideas they need for this they do not write. I dismiss ideas of this kind as a variant of passive income. You don’t lie on the stove, but most likely you will be busy with the canal all day. 2. Rent an apartment. Also so-so passive income. Well, if it's a long-term lease, I’ve passed and forgot. Of course, you can consider it as an option. But if this is an apartment for days, then you are attached to it forever! Pass the keys at a convenient time for the client, pick them up, clean before and after! Repair everything that is broken or broken, etc. 3. The royalties for songs, books, etc. Let's be realistic, this option is not for every tenth even. Not all of us have writers and musicians here. 4. They also recommend creating a selling site! And what and how he will sell write in general terms. Something like sell goods of their own production. But what then is passive income. This is a real job and a very active income. Because in addition to the production that you can do, you need to create a website, promote it, work with customers, etc. 5. Even trading is not a passive income. Here, it seems, money makes money. But at the helm it's still a man. Therefore, in my opinion, the most passive income options are possible only if there is initially a lot of money: 1. Commercial real estate for rent. Very cool and great. Usually stores take premises for a long time. Therefore, if you managed to grab a piece of interesting real estate in a passing place, then it will be great. I live in a residential area and we have a lot of such premises for rent. But in view of the fact that the region is young and mostly young families live, it is very difficult to promote a profitable business here. Signs change one after another. Landlords for months can not rent space at very competitive prices. 2. Investments. At the moment I see a lot of offers from banks. Something like download the application "... bank-invest" and buy stocks, bonds, etc. with one tap. As an option, you can try, but again, initially the money should be decent. Nevertheless, this must be understood. 3. If you are a super professional in something, record a video course and sell it. The difficulty is that everything spreads very quickly on the Internet. And of course everyone will be looking for an option to download your course for free, and they will most likely find it! But of course there is an overwhelming majority who do not know what you can buy in a crumble or somewhere to find and download for free. Therefore, there is a chance to earn. But be prepared that after some time it will be necessary to come up with something else, write down and again promote sales. And for some time it will bring money. 4. You can become a shareholder of some successful company. But then again - this is how much you need to buy shares to live comfortably on dividends. At least a controlling stake is on hand In general, do not worry! There is no such option. To have passive income, you still need to work hard! Views: 23
{"cc_dump":"CC-MAIN-2020-24","dolma2_qc":{"0":0.9367471933,"1":0.0632728636},"exact_duplicates":0,"lang":{"en":0.9596745968},"madlad":{"num_sentences":76,"rule.2":[],"rule.5":[56,64,65],"status":"survived"},"minhash":null,"original_word_count":801,"sa_remove_ranges":[],"text_hash":"62942188745135158450955691505486718943","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-06-02T16:46:02Z","warc_url":"https:\/\/signal-means-profits.com\/sponsor\/passive-income.-does-money-flow-to-you-like-a-river.html","weborganizer":{"__label__crime_and_law":null,"__label__education_and_jobs":0.0716012046,"__label__entertainment":0.0073558274,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.934405148,"__label__industrial":null,"__label__politics":0.0109969424,"__label__software":null,"__label__software_development":null,"__label__travel_and_tourism":0.0078258887,"__label__electronics_and_hardare":null,"__label__health":null,"__label__history_and_geography":null,"__label__science_math_and_technology":null,"__label__transportation":null,"__label__art_and_design":null,"__label__literature":0.0136468355,"__label__games":0.0069138384,"__label__social_life":0.0069138384,"__label__food_and_dining":null,"__label__home_and_hobbies":0.0164130311,"__label__adult_content":null,"__label__sports_and_fitness":null,"__label__religion":0.006702851},"weborganizer_max":"__label__finance_and_business"}
null
null
null
null
null
null
4dd87d0f-3d97-434c-90ac-557b407b3bca
Home > Unreal > Supreme Magus > CH 740 Supreme Magus CH 740 Author:Legion20 Category:Unreal Update time:2022-12-29 16:38:23 City of Ocra, Griffon Kingdom The news of the fall of Kulah had shed an even more disturbing light around the rogue Awakened Lith Verhen, Raagu Drerian, the human representative in the Council of the Awakened decided that their meeting was long overdue. First this Verhen has killed Treius, causing the downfall of master Glamus as well. Then he got caught in the scheme laid by those six runts in Zantia, causing the death of six disciples and two more elders. Usually it takes an all-out war to kill so many Awakened in such a short time. To make things even worse, rumors are spreading that he has managed to apply the Skinwalker spell to Orichalcum on his own. It would be a simple feat if he had a master, but according to our background check, he has none. We can\'t afford to let such a powerful individual remain a rogue anymore, he must be brought into our ranks. Raagu failed to mention that Lady Tyris had already met Lith in person twice, something that most Awakened failed to accomplish during their whole life, Raagu included. What are your orders, master Raagu Athung Soranot asked. She had once been one of Raagu\'s apprentices, now a free Awakened and one of the candidates to inherit her legacy. Go to Lutia, wait for Lith, and bring him here on friendly terms. I\'ve no desire to discover how far his power goes nor to alert the Queen\'s corps. We have nothing to gain from kidnapping him. Best case scenario, we make an enemy out of him. What about the worst-case scenario Athung tilted her head, she had rarely seen her former master so nervous. \'Lady Tyris comes here and slaughters us all.\' Raagu thought. Believe me, you don\'t want to know. Was what she actually said. Ernas Mansion, after dinner Lith was sitting on his bed, working together with Solus to translate the words of power engraved on Huryole\'s sword into modern runes. Enough pieces of paper to fill a book were floating in mid-air along with several blots of ink that he used to either take notes or make corrections. From the following day, Lith would finally be able to use his own magic instead of relying on Solus\'s, which meant he would be free to go back to Lutia and make experiments in their tower. Also, he had to plan his visit to Protector and Selia, something that now was of the utmost importance. With the body-swapping book in his possession, Lith could finally plan ahead. The future wasn\'t so scary anymore, especially since if he managed to conquer the Odi\'s technology, he would solve his reincarnation problem. If he hadn\'t joined the army, he would have never got access to the Royal Library, nor to all the confidential information about the undead. His original plan was to turn himself into an undead, which he had discarded due to their many limitations in movement or use of magic, or to bind his soul to an item, yet cursed objects had proved it to be an even more desperate plan than becoming an undead, or to achieve immortality. Body-swapping wasn\'t really immortality, but it was still the next best thing. Even if he had to rebuild his body and mana core from scratch, what could a few dozen years mean to someone who would live centuries Lith, don\'t you think there\'s something wrong with me Kamila asked, forcing him to arrange the papers in a folder with a flick of his wrist before storing them inside Soluspedia. What do you… Great Mother almighty! Very few things made Lith religious and that was one of them. Kamila was standing in front of him, wearing only black lace lingerie and a worried expression. Wow, I wasn\'t expecting so much enthusiasm. It\'s not the first time you\'ve seen me without clothes after all. She giggled while noticing the sudden rush of blood to his heads. May I remind you I spent a whole month fighting against unspeakable horrors, risking my life every single day while surrounded only by old coots and stinky soldiers I\'m not used to such beauty anymore. You should have given me some warning. Kamila would have loved to keep flirting, but her worries couldn\'t wait. I\'ve been pale for weeks, yet in the last two days, not only am I back to my regular complexion, but I\'m also gaining weight. Haven\'t you noticed Lith had a hard time, and not only at not noticing her smooth skin and soft curves. That\'s because since I\'ve returned your mood has improved and you eat more. He replied. Yes, but this fast I\'m already amazed by how quickly you recovered, but I\'ve never had a shred of your inhuman constitution. How do you think it\'s possible that the only places I gained weight are here and here She said while touching her bosom first and her buttocks later, giving Lith a monstrous headache. The answer was a bit of Invigoration and light magic from Solus\'s side that had enhanced Kamila\'s metabolism. Solus\'s intention had been to simply help Kamila to assimilate the nutrients and quickly relieve her body from all the stress it had sustained. Since Kamila was still young and very fit thanks to Jirni\'s training, the results had far exceeded even Lith\'s expectations. That might be my fault. He admitted. Do you remember those disgusting tonics we both had to drink Kamila nodded. I think they might have turned our famished bodies into this. He took off the upper part of the Skinwalker armor, showing his upgraded body to her for the first time. Well, I\'m not going to complain, as long as you swear to me that this isn\'t any form of body modification. I\'m your girlfriend, not your toy, correct Kamila\'s voice was soft, but her question held a lot of implications. She knew about Body Sculpting and seeing her physique change so fast had made her fear that Lith might have gone overboard. Seeing his honest surprise had greatly reassured her, but she still wanted to hear it from his mouth. I did nothing to your body, nor would I administer you any potion without your consent. I\'m shocked as you are. This actually adds insult to injury, making what I\'m about to say even more painful. Lith sighed. What\'s wrong baby After all this talk about my body, I thought you would be happier to check out how much stamina I\'ve recovered. She sat on Lith\'s lap, rubbing her body against him while kissing him with growing passion. Quylla thinks that I should rest today as well, to let my life force stabilize. He moaned with a mix of pleasure from Kamila\'s movements and pain from the words coming from his own mouth. Seriously After worrying about you for an entire month, after two whole days of holding myself back for this moment, do we really have to postpone again She nibbled at his earlobe before kissing her way down Lith\'s neckline Unless you want to risk taking a few years off my lifespan. He pushed her away before his mind went completely blank. Is it really so dangerous Kamila stopped abruptly, becoming as stiff as he was, afraid to hurt him. Sadly, yes. The silver lining is that once the sun rises, I should be good to
{"cc_dump":"CC-MAIN-2023-23","dolma2_qc":{"0":0.9462706447,"1":0.0537493341},"exact_duplicates":0,"lang":{"en":0.9811899066},"madlad":{"num_sentences":72,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":1407,"sa_remove_ranges":[[7134,7749]],"text_hash":"284946944037777950180830295463470921847","warc_content_type":"text\/html","warc_date":"2023-06-03T06:48:42.000Z","warc_url":"http:\/\/www.chillinpanda.com\/chillinpSupreme_Magus503122\/read_745.html","weborganizer":{"__label__crime_and_law":0.0083257789,"__label__education_and_jobs":null,"__label__entertainment":0.0637249947,"__label__games":0.069551751,"__label__history_and_geography":null,"__label__literature":0.1037586331,"__label__politics":null,"__label__religion":0.0185565669,"__label__science_math_and_technology":null,"__label__social_life":0.0145135829,"__label__art_and_design":0.008587487,"__label__home_and_hobbies":null,"__label__software_development":null,"__label__adult_content":0.0203423519,"__label__fashion_and_beauty":null,"__label__sports_and_fitness":0.0154345557,"__label__health":0.0302245878,"__label__finance_and_business":null,"__label__industrial":null,"__label__travel_and_tourism":null,"__label__software":null,"__label__transportation":null,"__label__food_and_dining":null,"__label__electronics_and_hardare":null},"weborganizer_max":"__label__literature"}
null
null
null
null
null
null
54bc5158e5fc32644259b4b99c20c20179221c73
#!/usr/bin/env bash echo "Please input three numbers" read -p "please input the first number: " n1 read -p "please input the second number: " n2 read -p "please input the third number: " n3 max(){ tmp=$1 if [ $tmp -le $2 ] then tmp=$2 fi if [ $tmp -le $3 ] then tmp=$3 fi echo "The max number is: $tmp" } max $n1 $n2 $n3
{"length_bytes":335,"repo_name":"melodyliu1986\/archieve","int_score":3,"src_encoding":"UTF-8","detected_licenses":[],"path":"\/shell\/max_calculate.sh","language":"Shell","score":3.390625,"license_type":"no_license","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '54bc5158e5fc32644259b4b99c20c20179221c73', 'language': 'Shell', 'repo_name': 'melodyliu1986\/archieve', 'path': '\/shell\/max_calculate.sh', 'src_encoding': 'UTF-8', 'length_bytes': 335, 'score': 3.390625, 'int_score': 3, 'detected_licenses': [], 'license_type': 'no_license'}"}
null
null
null
81f57c41-3d37-4a1a-9774-5d547f3338ff
The rumor mill is churning out additional information on the alleged NVIDIA GTX 1660 Ti graphics card as it gets closer to its purported release date later this month. Based on the same Turing architecture as the already launched RTX series (RTX 2080, RTX 2070, RTX 2060), the GTX 1660 Ti will reportedly use a smaller TU116 GPU (specifically TU116-400-A1) and 6GB of GDDR6 memory on a 192-bit memory bus. Spotted by VideoCardz, TU116 appears to be pin compatible with TU106 (the GPU used in RTX 2060) but the die itself is noticeably smaller suggesting that TU116 is a new GPU rather than a cut down TU106 GPU with hardware purposefully disabled or binned down due manufacturing defects. A bare MSI GTX 1660 Ti Ventus XS graphics card courtesy VideoCardz. Rumor has it that the GTX 1660 Ti will feature 1536 CUDA cores, 96 Texture Units, and an unknown number of ROPs (possibly 48 though as the memory bus is the same as RTX 2060 with its 192-bit bus). Clockspeeds will start at 1500 MHz and boost to 1770 MHz. The 6GB of GDDR6 will be clocked at 6000 MHz. VideoCardz showed off an alleged MSI GTX 1660 Ti graphics card with the cooler removed showing off the PCB and components. Interestingly, the PCB has six memory chips on board for the 6GB GDDR6 with spots and traces for two more chips. Don't get your hopes up for an 8GB card however, as it appears that NVIDIA is simply making things easier on AIB partners by using pin compatible GPUs allowing them to reuse boards for the higher end graphics card models for the GTX 1660 Ti. The PCB board number for the GTX 1660 Ti is PG161 and is similar to the board used with RTX 2060 (PG160). Enthusiasts' favorite twitter leaker TUM_APISAK further stirs the rumor pot with a leaked screenshot showing the benchmark results of a GTX 1660 Ti graphics card in Final Fantasy XV with a 1440p High Quality preset. The GTX 1660 Ti allegedly scored 5,000 points putting it just above the GTX 1070 at 4,955 points and just under the 980 Ti's 5052 score. Compared to the other side, the GTX 1660 Ti appears to sit between a presumably overclocked RX Vega (4876) and a Radeon Vega II (5283). @TUM_APISAK shows off a FF:XV benchmark run including results from an unspecified GTX 1660 Ti graphics card. Other performance rumors suggest that the GTX 1660 Ti will offer up 5.44 TFLOPs. RT cores are apparently cut (or disabled) in this GPU, but it is not clear whether or not the Tensor cores are intact (rumors seem to say yes though). Nvidia GTX 1660 Ti graphics cards based on the TU116 GPU will reportedly start at $279 [update: VideoCardz claims the pricing has been confirmed from information given to reviewers] and may well launch as soon as February 22nd (though they've already missed one rumored launch date on the 15th…). Assuming for a minute the performance factors are true, it is interesting to see the smaller TU116 GPU with fewer CUDA cores at least getting close to GTX 1070 performance. The GTX 1070 uses the 16nm GP104 GPU (7.2B transistors) with 1920 CUDA cores (1506 MHz), 120 texture units, 64 ROPs, and 8GB of memory on a 256-bit bus clocked at 8000 MHz. The GTX 1070 offers up to 5.7 TFLOPS. Looking at the progress over the past few generations, it is neat to see that as architectures improve, they are able to do more work with less (but better/faster) CUDA cores. I would guess that the GTX 1660 Ti will not best the GTX 1070 in all games and situations though as the GTX 1070 does have more ROPs and more total memory (though the GDDR6 memory on GTX 1660 Ti does offer more bandwidth than the 1070's GDDR5 despite the smaller bus). Pricing will be interesting in this regard as the rumored price starts at $279 for GTX 1660 Ti. The cheapest GTX 1070 I found online at time of publication was $300 with most cards going for closer to $330+. We may see price drops on the older GTX 1070 cards as a result. GTX 1060 cards are going for $200+ and RX 580 cards are sitting at $190+, RX 590 at $260+, and Vega 56 prices starting at $330 (and go crazy high heh) so the GTX 1660 Ti may also push down the prices of the highe end and higher priced models of those cards as well. What are your thoughts on the latest rumors? Related reading:
{"cc_dump":"CC-MAIN-2019-43","dolma2_qc":{"0":0.9992733598,"1":0.0007466618},"exact_duplicates":11,"lang":{"en":0.9265322685},"madlad":{"num_sentences":29,"rule.2":[3],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":773,"sa_remove_ranges":[],"text_hash":"323461663972305228059434168401239440155","warc_content_type":"application\/http; msgtype=response","warc_date":"2019-10-17T00:05:25Z","warc_url":"https:\/\/pcper.com\/2019\/02\/rumor-nvidia-gtx-1660-ti-will-use-smaller-tu116-gpu\/","weborganizer":{"__label__art_and_design":0.0006767022,"__label__electronics_and_hardare":0.9951046109,"__label__finance_and_business":0.0012943083,"__label__games":0.003603603,"__label__home_and_hobbies":null,"__label__industrial":null,"__label__science_math_and_technology":0.026769286,"__label__software":0.0015587612,"__label__software_development":null,"__label__transportation":0.0006978512,"__label__crime_and_law":null,"__label__education_and_jobs":null,"__label__entertainment":null,"__label__travel_and_tourism":null,"__label__health":0.000529305,"__label__social_life":null,"__label__literature":null,"__label__politics":null,"__label__food_and_dining":null,"__label__sports_and_fitness":null,"__label__adult_content":0.00001,"__label__fashion_and_beauty":null,"__label__history_and_geography":0.00001,"__label__religion":null},"weborganizer_max":"__label__electronics_and_hardare"}
null
null
null
null
null
null
b7bca2254f93c26a112967b97a9c58f7f15b27e2
SSDs and their Impact on IT Denis Vilfort Storage Portfolio Definition © 2009 Sun Microsystems, Inc. The Business Eco-System Disk to CPU Discontinuity Today’s CPU have become I/O starved - Moore’s Law is outstripping disk drive rotational speed - As a result, storage systems are hopelessly unbalanced between controller capability and storage pool performance New Performance Bottlenecks Larger Capacity Disks Have Made it Worse Probability of Arm Contention has increased 6.25X Storage Evolution... Time for a Change? Edison Phonograph 1880 Enterprise Hard Drive 2001 Storage Revolution 2.5” Flash Drive New! Capacity - 32GB User Addressable - 40GB SLC Server NAND - 16MB Buffer Cache Form Factor - 2.5” Enterprise SFF - 7mm thickness - 3Gb SATA-II Performance - Sequential IO: - 250MB/sec Read - 150MB/sec Write - Random IOPS: - 35,000/sec Read - 3,300/sec Write - 2.5W Maximum Reliability - 2,000,000 MTBF Why Applications Don’t Perform Waiting for DATA • Today’s Multi-Core, Multi-Socket application server design are increasingly held back by slow storage • When requesting data, the server spends most of it’s time waiting for storage • Application performance remain sluggish regardless of the Server CPU horsepower • The traditional remedy of adding more expensive DRAM may no longer suffice as data sets double every 2 years Turbo Charged Applications SSDs Eliminate Storage Bottlenecks - Today’s Multi-Core, Multi-Socket application server design are now served by High Performance SSDs - The server no longer wastes time waiting for data - Application performance is as high as the Server CPUs horsepower - No longer need to remedy sluggish storage performance by adding expensive DRAM - Bottom Line: Improved end user experience, faster results & Better ROI Why SSDs are a BIG DEAL HDDs no longer the choice for Performance A single Solid State Drive equals the IOPS of 100 Hard Disk Drives 30,000 IOPS = 100 Drives Why SSDs are a BIG DEAL Better Power/Performance Economics A single Solid State Drive consumes less than 1/500th the power of Hard Disk Drives* 0.03kWh 1/583th Power Consumption 1.75kWh * Assuming same random IO performance Storage Developer Conference 2009 © 2009 Copyright Sun Microsystems, Inc. All rights reserved. Why HDDs are not going away HDDs still holds the lead in Capacity A single Disk Drive holds 33X the capacity of SSDs 1 TByte = 33 SSDs Optimizing for Your Working Set HDDs are typically under utilized 190 GB = 9,100 IOPS 192 GB = 300,000 IOPS Gain Predictable Performance Eliminate Cache Miss Ratios Forever! Performance Predictability Hit and Miss Gap Storage Developer Conference 2009 © 2009 Copyright Sun Microsystems, Inc. All rights reserved. New Server Memory Hierarchy - Pico Sec.: L1 Cache, L2 Cache, L3 Cache - Nano Sec.: RAM - Micro Sec.: FLASH - Milli Sec.: Disk Latency Comparison Bridging the DRAM to HDD Gap - CPU - DRAM - FLASH/SSD - HDD - TAPE 100,000 X Latency Mismatch 150 X Latency Reduction Data Continuum Latency Differentiated Storage Pools - **Real Time Data** - Close to CPU - Highly Latency Sensitive - **On Line Data** - Networked - Moderate Latency Sensitivity - **Off-Line Data** - Networked - Low latency Sensitivity SSD to HDD Comparison SSD for Performance, HDD for Capacity The Hybrid Storage Pool Combining Performance and Capacity The Long Tail of Data 90-90 Rule in Action - 9 Days = 2% cached - 27 Days = 7% cached - 63 Days = 17% cached Hybrid Storage Pool Economics Right-Size Performance & Capacity 100 Enterprise HDDs Capacity: 30TB Performance: 30K IOPS Cap/Op-X: $55,000 - 1.75kWh Hybrid Storage Pool 1 SSD 30 High Capacity HDDs Capacity: 30TB Performance: 30K IOPS Cap/Op-X: $6,040 - 0.392kWh 1/5th the Power 1/10th the Cost Storage Developer Conference 2009 © 2009 Copyright Sun Microsystems, Inc. All rights reserved. Reducing DRAM Dependence ZFS’s “Waterfall Caching” - ZFS Automatically Caches Hot Data on SSD - Easier to meet SLAs with Predictable Performance - Increased Power efficiency: - Reduced need for DRAM and high RPM HDDs 1 X DRAM 10-20 X SSD 1000’s X HDD ZFS Turbo Charges Applications The Hybrid Storage Pool - ZFS Dynamically: - Writes new data to a very fast SSD pool as write cache (ZIL) - Determines data access patterns and stores frequently accessed data in the SSD based read cache (L2ARC) - Bundles IO into sequential lazy writes for more efficient use of low cost mechanical disks Even SANs are out of Steam Example on how Moore’s Law races on… 1000 Servers Need 200M IOPS! - High-end SAN storage systems support 1000+ server connections but cannot keep up with modern CPUs need for performance - Modern Servers can process data 200+ times faster than SAN storage systems ability to deliver data Where to Deploy SSDs? Storage or Server? - **320 IOPS** - Avg. Latency: 3,125 μs - **319 IOPS** - Avg. Latency: 20 μs **1 IOPS Lost** **SAN** **10μS** **50,000 IOPS** **16,667 IOPS Lost** **33,333 IOPS** Different FLASH Implementations SSD - Application - O/S - Mem - I/O - PCIe - HBA - SAS/SATA - Cntr - FLASH - FLASH - FLASH Today PCle - Application - O/S - Mem - I/O - PCIe - Cntr - FLASH - FLASH - FLASH Today Memory - Application - O/S - Mem - Cntr - FLASH - FLASH - FLASH 2012 Sun Server Attached SSD Delivering the Highest Performance - High performance 15K HDDs are replaced with 100X higher performance SSDs - HDDs now only play a High Capacity role Arrays and JBODs Enterprise Class SSD (Intel) Servers Storage Developer Conference 2009 © 2009 Copyright Sun Microsystems, Inc. All rights reserved. Modern server designs require very high IO and while mechanical HDDs are great for capacity, they are hopelessly falling behind in IO performance. Turbo Charging Servers Server Attached SSD for Performance - Replacing HDDs with Server Attached SSDs restores the balance between the CPU’s need for data and the performance delivery capability of the storage subsystem. ZFS Turbo Charges Applications Distributed Hybrid Storage Pool - Server integrated SSDs act as a high performance data cache to existing SAN or NAS storage making the application impervious to SAN/NAS storage latency. Distributed Hybrid Storage Pool ZFS Caches Hot Data on Server SSDs - Frequently accessed data is automatically cached closest to the CPU for maximum performance. - Less frequently accessed data can now be stored centrally for lowest cost storage capacity. High Performance ZFS iSCSI or FC High Capacity The Sun X6250 Blade Same design as X4150 **Step One** - Remove HDDs, and - Insert SDDs **Step Two** - Move cable from SAS to SATA connector for best performance - Repeat for all 4 drives slots - Power now reduced by 40 watts! Scale Performance 4 SSDs/Blade, 40 SSDs/chassis - Repeat for all 10 blades - Power now reduced by 400 watts! Step Three Step Four - Fill a rack with 4 chassis - Enjoy 8M IOPS per rack - Enjoy 1,6 kWh reduction per rack Open Flash Sun SSD FLASH module Capacity - 24 GB User Addressable - 32 GB SLC Server NAND (RAW) - 64 MB DRAM Buffer Cache Form Factor - miniDIMM - 3mm thickness - 3Gb SATA-II Performance - Sequential IO: - 250MB/sec Read - 150MB/sec Write - Random IOPS: - 20,000/sec Read - 7,000/sec Write - 2W Maximum Reliability - 7 x 24 x 3 years (100% Write Duty) - 2,000,000 hours MTBF Sun Open Flash Modules enables tightly Server Integrated SSDs Server options completely without mechanical HDDs are now a reality. The Caching Server acts as a “caching gate-way” to existing SAN or NAS storage. Frequently accessed data is retained in high performance SSD based storage pools. Turbo Charging Networked Storage High I/O Open Storage Caching Server - Frequently used Data is Cashed on a High Performance Open Storage Caching Server - Dormant Data is moved automatically by ZFS to centralized high capacity/low cost networked storage FISHWorks Appliance Instantiation of Open Storage - Accessible via WEB-browser - Easy to Configure & Diagnose - Extremely granular Analytics via D-Trace and Fully Integrated Software and Hardware (FISH) Thank You! SSDs, HSPs and Unified Systems Denis Vilfort Storage Portfolio Definition denis.v@sun.com (408) 896 4290 © 2009 Sun Microsystems, Inc.
{"Source-Url":"https:\/\/www.snia.org\/sites\/default\/orig\/sdc_archives\/2009_presentations\/monday\/DenisVilfort_Impact_of_SSDs_IT_Strategies.pdf","pdf-total-pages":39,"total-fallback-pages":0,"total-input-tokens":53517,"total-output-tokens":3768,"olmocr-version":"0.1.53","weborganizer":{"__label__adult_content":0.0003213882,"__label__art_and_design":0.0006184578,"__label__crime_and_law":0.0002493858,"__label__education_and_jobs":0.0002598763,"__label__entertainment":0.000276804,"__label__fashion_and_beauty":0.0002143383,"__label__finance_and_business":0.0053329468,"__label__food_and_dining":0.000232935,"__label__games":0.0004916191,"__label__electronics_and_hardware":0.8740234375,"__label__health":0.000408411,"__label__history_and_geography":0.0002496243,"__label__home_and_hobbies":0.0009088516,"__label__industrial":0.0075187683,"__label__literature":0.0001376867,"__label__politics":0.0001405478,"__label__religion":0.0001529455,"__label__science_math_and_technology":0.1027832031,"__label__social_life":0.00003016,"__label__software":0.002784729,"__label__software_development":0.0015439987,"__label__sports_and_fitness":0.0002250671,"__label__transportation":0.0007553101,"__label__travel_and_tourism":0.0001394749},"weborganizer_max":"__label__electronics_and_hardware","avg_fraction_numbers_in_line_v1__avg_fraction_numbers_in_line_v1__avg_fraction_numbers_in_line_ratio":[[0.0,8268.0,0.06424]],"fineweb_edu_fasttext_gt2__fineweb_edu_fasttext_gt2__score":[[0.0,8268.0,0.05482]],"ft_lang_id_en_doc_v2__ft_lang_id_en_doc_v2__en":[[0.0,8268.0,0.81832]],"google_gemma-3-12b-it_contains_pii":false,"google_gemma-3-12b-it_is_public_document":true,"google_gemma-3-4b-it_v2tag__is_academic_paper":true,"google_gemma-3-4b-it_v2tag__is_class_syllabus":false,"google_gemma-3-4b-it_v2tag__is_completion_certificate":false,"google_gemma-3-4b-it_v2tag__is_court_notice":false,"google_gemma-3-4b-it_v2tag__is_homework_assignment":false,"google_gemma-3-4b-it_v2tag__is_news_article":false,"google_gemma-3-4b-it_v2tag__is_public_order":false,"google_gemma-3-4b-it_v2tag__is_resume_cv":false,"google_gemma-3-4b-it_v2tag__is_test_or_quiz":false,"google_gemma-3-4b-it_v2tag__is_textbook":false,"pdf_page_numbers":[[0,103,1],[103,103,2],[103,127,3],[127,364,4],[364,484,5],[484,576,6],[576,929,7],[929,1358,8],[1358,1795,9],[1795,1955,10],[1955,2280,11],[2280,2417,12],[2417,2527,13],[2527,2735,14],[2735,2862,15],[2862,3001,16],[3001,3252,17],[3252,3313,18],[3313,3372,19],[3372,3482,20],[3482,3879,21],[3879,4137,22],[4137,4481,23],[4481,4799,24],[4799,5015,25],[5015,5300,26],[5300,5628,27],[5628,5775,28],[5775,5997,29],[5997,6217,30],[6217,6525,31],[6525,6753,32],[6753,6977,33],[6977,7364,34],[7364,7496,35],[7496,7659,36],[7659,7915,37],[7915,8121,38],[8121,8268,39]],"pipe_delimited_lines_v1__pipe_delimited_lines_v1__pipe_delimited_lines_ratio":[[0.0,8268.0,0.0]]}
olmocr_science_pdfs
null
2024-12-06 00:00:00
2024-12-06 00:00:00
null
null
48a556a855cf9ce7428a74f063434153d0e88c7c
""" Statistics helper methods. """ def distribution(values): result = {} for value in values: result[value] = result.get(value, 0) + 1 return result def sort_distribution(distr_dict): keys, values = [], [] for key in sorted(distr_dict): keys.append(key) values.append(distr_dict[key]) return keys, values def merge_into_distribution(dest, src): for key, value in src.items(): dest[key] = dest.get(key, 0) + value class Metric: def __init__(self, id, name, type, method): self.id = id self.name = name self.type = type self.method = method def __str__(self): print('id={metric.id},name={metric.name},type={metric.type}', metric=self) def count(self, data): return sum(map(self.method, data)) def distribution(self, data): return distribution(map(self.method, data)) def value(self, data): if self.type == 'bool': return self.count(data) if self.type == 'int': return self.distribution(data)
{"uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '48a556a855cf9ce7428a74f063434153d0e88c7c', 'language': 'Python', 'repo_name': 'parappayo\/code-metrics', 'path': '\/stats.py', 'src_encoding': 'UTF-8', 'length_bytes': 945, 'score': 3.484375, 'int_score': 3, 'detected_licenses': [\"MIT\"], 'license_type': 'permissive'}","length_bytes":945,"score":3.484375,"src_encoding":"UTF-8","repo_name":"parappayo\/code-metrics","detected_licenses":["MIT"],"int_score":3,"path":"\/stats.py","language":"Python","license_type":"permissive"}
null
null
null
85e145f5-32a5-4365-9b57-4c4f05424c1f
extension ExtPose Rapid Links CRX id Description from extension meta Quickly Launch Your Favorite Websites or URLs Using Keyboard Shortcuts Image from store Rapid Links Description from store This extension lets you quickly launch your favorite websites or URLs using keyboard shortcuts. The current version comes with 3 Non-Customizable Hotkeys namely 'Alt + V', 'Alt + B' and 'Alt + N' to launch URLs in one go. *** HOW TO USE IT? *** That's very easy. Download and Install the Extension. Click the extension icon on the top-right corner and assign your favorite websites or URLs to any of the provided 'Hotkeys'. Save the settings and it's ready. *** PRIVACY POLICY *** The extension requires the permission from the chrome browser to create new tabs and update current tab. It also needs to store the data, i.e, the URLs you save, locally on your computer. URLs you save aren't being transferred to any remote computers and the developer has no access to any of your data. However, some of the actions you perform, like number of times you open the extension and number of times you press any shortcut-key to launch URL is being tracked by the analytics script to understand the user behavior and improve the extension in the future. No private data is being compromised here as well. Note- Before Installing, the Chrome Store Says -'The extension can read your browsing history', which is a quite misleading warning and there seems to be no way for me to fix this warning. The Extension has nothing to do with your browsing history. It only saves URLs you provide locally on your computer. Launch them by creating new tab or updating the current one. And, track how many times the extension is being used. *** SOFTWARE LICENSE *** The software is Open Source under MIT License and is currently hosted on Github. Anyone is free to contribute, make changes and redistribute the software. Repository link - https://github.com/ShrinathRaje/rapid-links/ *** CONTACT AND SUPPORT *** Raise a issue on GitHub - https://github.com/ShrinathRaje/rapid-links/issues Contact Developer - [email protected] Latest reviews • (2019-02-16) Vaishnavi Shenavi Bhandiye: Amazing!!! Loved using it. It's simple, useful and saves time by letting us quickly switch to our favourite sites. Everyone must use it :) • (2019-02-02) Awesome! It lets me launch my most visited websites real quick. I would love it more if I could customize the keys as per my convenience. Latest issues • (2022-04-26, v:1.1) neha chauhan: need to download i want to download this extension due to proxy restriction can not add 20 history 5.0 (2 votes) Last update / version 2019-02-01 / 1.1 Listing languages
{"cc_dump":"CC-MAIN-2022-27","dolma2_qc":{"0":0.9998201728,"1":0.0001998151},"exact_duplicates":0,"lang":{"en":0.882496953},"madlad":{"num_sentences":26,"rule.2":[],"rule.5":[4,19,25],"status":"survived"},"minhash":null,"original_word_count":448,"sa_remove_ranges":[],"text_hash":"298122776369532529893380832487317361895","warc_content_type":"application\/http; msgtype=response","warc_date":"2022-06-26T11:30:44Z","warc_url":"https:\/\/extpose.com\/ext\/85197","weborganizer":{"__label__art_and_design":null,"__label__electronics_and_hardare":0.0032830648,"__label__entertainment":null,"__label__finance_and_business":0.0030853704,"__label__games":0.0012548432,"__label__science_math_and_technology":0.0064982711,"__label__software":0.9466066957,"__label__software_development":0.2942249775,"__label__sports_and_fitness":0.0019367349,"__label__transportation":null,"__label__home_and_hobbies":0.004765199,"__label__industrial":null,"__label__adult_content":0.0020607433,"__label__education_and_jobs":0.00592107,"__label__history_and_geography":null,"__label__crime_and_law":null,"__label__politics":null,"__label__literature":null,"__label__social_life":null,"__label__food_and_dining":null,"__label__travel_and_tourism":null,"__label__health":null,"__label__religion":null,"__label__fashion_and_beauty":null},"weborganizer_max":"__label__software"}
null
null
null
null
null
null
0d373036-2603-4136-ac47-b702298cf977
Les Misérables Review Tom Hooper's take on the evergreen West End musical blockbuster Les Misérables tests the boundaries of how radical a film adaptation can be in approaching material that is, at least for many, very familiar. Far from delivering a safe, faithful retelling that recreates the experience of the show, the King's Speech director opts to do something quite different; he dials up the emotional intensity of the story by, quite literally, zooming in on the characters. Yes, the production has been opened up a bit, swapping small stages for a few widescreen vistas; but as the A-list cast sing their songs, there is no escaping their characters’ pain and suffering, and the effect is surprisingly powerful. In a way Les Misérables feels like Great Expectations as told from the point of view of Magwitch (they were originally published within a couple of years of each other). But those expecting this version to be to the novel what Lionel Bart’s Oliver! was to Oliver Twist will likely be disappointed. The musical has not been radically restructured in its transition to the big screen, so the story - based on Victor Hugo's original novel - is as it was, centring on the life of former convict Jean Valjean (Hugh Jackman, no stranger to stage musicals) and his attempts to redeem himself in the eyes of God after a forgiving bishop saves him from being sent back to prison. Several years later, having reinvented himself as a factory owner, his redemption is threatened by the reappearance of former prison guard turned Police Inspector Javert (Russell Crowe), who has been hunting him ever since his disappearance while on parole. Into this dilemma falls the tragic Fantine (Anne Hathaway), a young woman working in Valjean’s factory, and later on her daughter Cosette (Amanda Seyfried). There's little point making comparisons with the stage show; this is an adaptation for a different medium after all, and anyway the majority of filmgoers won't have seen it (including this reviewer). So the question is: does it stand on its own two legs? The answer is a qualified Yes. Those averse to musicals will find nothing here to make them change their minds, especially as it’s one of those where even the dialogue is sung. But William Nicholson’s screenplay, working from the book by Claude-Michel Schönberg and Alain Boublil, never loses focus of the story, despite the occasional plot lull. And the cast undoubtedly give it their all: Jackman and Hathaway are excellent, and though Crowe is on less certain ground, he manfully pushes on regardless. In an apparent effort to stave off wandering attention due to a rather long running time, Hooper’s camera often swoops through the Parisian sky between songs, in a way that vaguely recalls Baz Luhrmann’s Moulin Rouge!. But when it comes to those songs, it’s a very different affair. The actor’s faces dominate the screen, telling their stories through verse with a bare minimum of distraction. It’s an approach that works more often than not; Hathaway vocally slamdunks I Dreamed a Dream, but the song’s powerful sense of youthful hope being dashed is magnified by the empty darkness lurking behind her onscreen; a visual reminder of the world she inhabits, and from which she failed to escape. Hooper doesn’t succeed in getting other scenes to gel together quite so well. The film flips between obviously staged indoor scenes and a handful of outdoor ones; jumping from one to the other jars significantly. It might have helped if a decision had been taken to film either entirely on a stage or on location, as the end result feels uneven (tellingly, it failed to pick up either an Oscar or BAFTA nomination for editing). Even so, the strength of the source material, the performances and the intriguing approach overcome such quibbles, sweeping you up on to an emotional journey that will bring grudging tears to more than a few eyes. It’s an epic experience - one that will undoubtedly benefit the stage show’s ticket sal
{"cc_dump":"CC-MAIN-2020-24","dolma2_qc":{"0":0.9960572124,"1":0.0039628372},"exact_duplicates":0,"lang":{"en":0.9641601443},"madlad":{"num_sentences":32,"rule.2":[],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":831,"sa_remove_ranges":[[4029,4869]],"text_hash":"106363111598544407761855710535790457988","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-05-25T10:45:19Z","warc_url":"https:\/\/www.thedigitalfix.com\/film\/film-review\/les-miserables\/","weborganizer":{"__label__art_and_design":0.0216253344,"__label__entertainment":0.9591643214,"__label__fashion_and_beauty":null,"__label__finance_and_business":0.0027249858,"__label__games":0.005394937,"__label__health":null,"__label__politics":0.0052301269,"__label__science_math_and_technology":0.0029910326,"__label__social_life":null,"__label__software":0.002125703,"__label__crime_and_law":0.0064982711,"__label__literature":0.0803674683,"__label__travel_and_tourism":0.0023331624,"__label__food_and_dining":null,"__label__history_and_geography":null,"__label__home_and_hobbies":null,"__label__sports_and_fitness":null,"__label__adult_content":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":null,"__label__religion":null,"__label__transportation":null,"__label__industrial":null,"__label__software_development":null},"weborganizer_max":"__label__entertainment"}
null
null
null
null
null
null
cc180fe5-b7ec-4279-a6db-f66d19a0d34b
Jump to content Search the Community Showing results for tags 'gremli50 results 1. Before I begin I would ask people that have questions about other faction Multi-part Kit to use or make a related post and not use this one as... well its for Gremlin Multi-part Kit related stuff. Okay I mentioned this before and then the Forum got remade and the post were lost so I'll ask this again, what is the status of the Gremlin Multi-part Kit that was mention by one of the Wyrd Staff (Whos name I won't mentioned as to not give him more trouble then needed )? Also what would people like to see in a Gremlin Multi-part Kit? 2. Hello, I’m brand new to the game and have been looking at the models for a few weeks now. Long story short I like the look of Gremlins, I’m looking for a crew box which will give me an easy to learn introduction to the game. What gremlin master do you recommend and whom should I avoid? Thanks in advance 3. From the album: Sol_sorrowsong Iron Painter 2017 Hard light made the contrast a bit higher than in real life so I need to fix the hat and pants a little for the final photos. 4. From the album: Sol_sorrowsong Iron Painter 2017 First look at banjonista base coat. He's next to the base he'll eventually be on when gets painted up. 5. I took the plunge and just bought all the books, and they should arrive this week. My question is if someone chooses to play a Neverborn or a Gremlin, what are the disadvantages. Are they permitted in human towns? Will the Ortegas hunt Neverbourn in town, of do they have to enter Ortega territory on the edge of the Bayou? It is common to play a Neverborn/Gremlins? or not recommended? What other disadvantages are there to play those factions? Are there any other Factions not recommend to play? Also is there any resources that I can read before my books come to get ready? Thanks 6. Don't get me wrong, I love the guy and take him in about half my lists, but does anyone else realize that there's a massive error on his card? He's a mercenary. A mercenary that can be hired by the guild, neverborn and....the ten thunders? The crime syndicate which supposedly burned down his village in the fluff? The secret society that he swore vengence on and fuels his desire to be an action hero? It doesn't sit with me. Lazarus has "hate the maker" which makes it so he can't be hired by guild, why can't Burt have "Fear the thunder" or something similar. 7. So I've slowly been working my way through the gremlin masters, testing them out and enjoying each for different reasons. Ophelia is fun for her solo rampage, Mah is fun for those nasty alpha strikes, and Somer is...just great! I'm building Wong now and excited for him, but I'm already thinking of who to get next. Brewmaster looks seriously fun in a Ten Thunders crew but I've played against gremlin Brewmaster on several occasions and he just seems unimpressive. Are my opponent's not playing him properly, or is he just not worth playing in gremlins? 8. Guest 9. Guest I don't play Malifaux. I bought this for a D&D campaign. 10. Hello to the bayou, I'm new to the forums but I've been playing almost exclusively (Ramos looked too fun) gremlins since I started playing 2 years ago. While thinking about whether I should pick up Lazarus for wong, I had the idea of cranking him to 11 with Sparks. Since Sparks can give out a condition which adds 'construct' and Lazarus can copy construct actions, with the two of them together, we can copy any 1 action in the game! I might be wrong since I don't have a Lazarus card on me, but he can even copy masters. The idea I had was bigger hat then you off somer but I know there's way more with Lazarus being a mercenary and Sparks able to be used with Mei Feng in TT or Arcanists. What other possible options does this add? 11. Adepticon Master’s Battle Report Table 2 Round 5 Ryan Michel vs. Wiktor Szafranski At the bottom I explain the Pere combo for those who don’t know what it is or how it works. It didn’t occur in our game because of how actively I tried to avoid it, but heavily forced my movement and the interactions during the game. I’ve played this specific crew multiple times (and Wiktor playing it), so going into it I knew exactly what to watch out for (sadly it didn’t help). Collect the Bounty, Flank Deployment Claim Jump, Accusation!, Leave Your Mark, Tail 'em, Inspection 9 models Lilith - Aether Connection, Rapid growth, Beckon Malifaux Crew: 2 Freikorp Trappers, 4 Young Nephalim, Cherub, Terror Tot Schemes: Inspection and Accusation! 13 models Zipp: Upgrade was the SS discard one, forget the rest Crew: 2x Iron Skeeters, Pere Ravage, Francois Lacroix, Raphael Lacroix, Earl, 6 Stuffed Pigs Schemes: Inspection and Claim Jump Deployment: Trappers deployed in either corner 4 inches from the edge (for Inspection ) and spread out the rest of my models around the center of my deployment zone. My primary goal in deployment and movement turn 1 was to stop Pere from wreaking havoc on my crew. See the bottom of this article for a detailed explanation of how the Pere combo works, and the effects of it going off. He deployed all his models close to the deployment line all around the center. He kept all his models out of LOS of the trappers. I don’t remember all the damage flips on each pig, but every pig blows up for 1-4 unresistable damage, and some of them also charged for even more damage. At the bottom you can read about the Stuffed Pigs in more depth and their effect on the game. Turn 1: 1. Opponent activated all his pigs first, 1 at a time each walking forward, making sure to stay out of los of trappers. This easily gave him massive activation control letting his whole crew to take actions after mine while I had no ability to respond. 2. I move all my non-trapper models ~6-8 inches forward, doing my best to stay back and spread out to avoid pere and the pigs. 3. Trappers go and have no targets to shoot so each go double defensive. 4. Both of his skeeters do the same thing, they hop on board raph/fans towards my trappers on either side of the board, each skeeter giving fast (from the Earl tome), then Raph and Frans both go reckless, and shoot at my trappers, raph kills one with a dumb luck trigger, Raph has 3 hp left. (Note they just moved and shot at my trappers with 3 ap each, a skeeter walk + 1 walk, then reckless) Pere walks twice and hides behind a building Turn 2: I win initiative and go first with Lilith. 1. My goal was to kill Pere, he has 7 hp so it will take a minimum of 2 attacks from Lilith (or charge through terrain + severe dmg to kill him). Since he was out of range of Tangle Shadow from my starting location, I had to walk then charge at Pere (going through the building). Lilith kills him with two attacks, needing to cheat one card in ensure killing him. Lilith takes 4 dmg from his explosive demise, SS to dmg prevent flipping - I take 2 dmg. 2. He activates Francois who goes reckless and shoots my trapper, I cheat the first flip, dodging it, he flips high on the next shot with the dumb luck trigger which kills the trapper and leaves Frans at 3-4 hp. 3. I sprint my tot, flip a mask for a 2nd walk and engage Raph, I attack with my last ap and get a straight flip I cheat the dmg to kill Raphael, growing into a Young Neph. Now I have 4 cards left in hand. I drop trees directly next to Lilith blocking los to her from Zipp and Raphael. 4. He activates Zipp, walks up and melees Lilith, I cheat a 13 hoping to avoid the attack, but he has one as well so it goes off. He gets severe dealing 5 dmg. I ss to prevent get a weak and take 3 dmg but Zipp aura costs me a card. At this point I’m down to 2 cards in hand - a 12 and 8. He attacks again, I cheat a 12 in hopes he doesn’t have another high card, but he does and it goes off. Ends up flipping severe again for 5 damage. I burn my last card and SS to prevent and flip weak taking 3 damage - Lilith goes down to 4 hp. He triggers the place effect moving her 5 inches away towards the center of the board, putting her between 2 stuffed pigs, 1 and 2 inches respectively between Lilith and the two pigs At this point Lilith has a very high chance of dying. The stuffed pig damage isn’t something that’s resistable, and due to Zipps aura I can’t even SS to prevent the damage. Thus these silly 2ss models are easily killing my Master with almost no ability to prevent it. I do my best to stop it by attempting to push and Paralyze one of the two pigs away from Lilith, so she can live through the turn. 5. I activate a Young Nephilim charging one of the pigs, goal is to trigger the push and paralyze it so i can get another turn out of Lilith, but having no cards in hand - I miss both of my attacks him cheating cards in to stop them from going through. 6. He activates a pig and engages a different Young Neph in the center of the board. 7. I charge the 2nd pig by Lilith, miss both my attacks again. 8. He activates the pig by Lilith, missing his attacks then explode himself dealing 2 dmg, black blood from Lilith triggers killing the other pig who dies from it exploding for 3 dmg killing Lilith. Stones available but unable to use them since I have no cards in hand. 9. The rest of the turn is the other two Young Neph each killed a pig - one taking the damage and the other pushing the pig away paralyzing it so that the Cherub could walk then shoot it at range to avoid taking the explosion dmg on my Young Nephilim. The iron skeeters running into the corners scoring for interference, Earl in the top corner with an Iron Skeeter, Zipp nearby. He drops scheme marks with earl dragged up with Zipp) and Francois. 10. I score Collect the Bounty 2-1, (pigs killed Lilith) and he scores interference and claim jump Turn 3: At the beginning of the turn, there is 1 pig left in play between the center and Frans, 3 of my youngs are fairly low hp, (1-3 health left), 2 still have 6+ wounds. At this point I'm in serious trouble. Due to the stuffed pigs - I’m stuck in bad positions going into this turn (away from the corners due to spreading out, then being forced to kill them) and his models have higher threat range than mine (reckless giving a potential walk, and then rng attack with a total of roughly 15 inches and 2 shots). His schemes are now revealed, displaying that It would have been in my favor to focus down all the models in one corner, however at this point I can’t do much to stop it. 1. I win initiative and run up to his Iron Skeeter with my Young Neph (the one who grew) to Earl and interact giving him the Accused condition.. 2. He activates Zipp attacks that young nephilim who is engaged with Earl, placing him 6 inches away so Earl is no longer engaged, then Earl activates removing accused and drops a scheme marker. 3. I move all my remaining models (2 young neph and a cherub) towards Frans, but the one stuffed pig is engaging my closest young nephilim. The Nephilim attacks the pig, triggers the push and paralyzes it. 4. The Iron Skeeter on the bottom moves into position for Interference and drops a scheme marker for Claim Jump. 5. Frans moves towards my young neph (~8 inches away in a straight line) but the neph is hiding behind a rock out of LOS. 6. He scores Collect the Bounty, inspection and claim jump Turn 4: 1. I win initiative but due to terrain on the bottom my young nephilims at full hp does not have LOS to Frans, so it takes me two walks to get to him him hoping I can flip / cheat well and survive the turn. 2. He activates the pig, and engages my 2nd young nephilim who was moving up towards Frans. 3. I activate that nephilim, kill the pig then walk toward Frans in charge range next turn 4. Frans and kills the young neph I engaged him with. 5. My other young Nephilim and the cherub move up, hoping to next turn kill Frans for a point before he kills me. 6. He scores for Collect the Bounty, Interference and Claim Jump Turn 5: 1. My young neph charges Frans, but my attacks fail. 2. Frans goes reckless (2 hp left) and kills my last young nephilim 3. I move then shoot with the Cherub and miss my attack. 4. He scores for Collect the Bounty, Interference and Claim Jump Wiktor wins 9-1. Playing a solid game like always. Wiktor being one of the best players in our Chicago meta, usually the tournaments are won between him and one other player. I think this was one of my better games against him, even though the score was so drastically in his favor. In summary: 1. Pere was such a huge threat I had to basically sacrifice Lilith to kill him. 2. The stuffed pigs were a major problem for a number of reasons: a. They consumed close to all of my AP on turn 2, while dealing significant damage to those models. b. They granted him activation control and while engaging my models keeping them stuck in a location. Those two reasons then allowed his key models to be completely unopposed. 3. Reckless and the Iron Skeeters allowed significant movement and AP advantage allowing great positioning that prevented me from charging his important models (The young nephilims have a 10 inch threat range), while still allowing them to shoot my models. The combination of the Fast and Reckless (since reckless doesn’t just give fast) allows his important models to have 4 AP after moving a free 12 inches. The Skeeters granting 12 points of movement + fast (so another 5 inches) are really what end up allowing Pere to become so effective. 4. In hindsight i should have focused more units towards Francois earlier, and ignored trying to save lilith. If I guessed that he had inspection I could potentially been in better positioning in order to focus one of the corners better, but the pigs were the major thing that impeded my potential movement. 5. Don’t play Wiktor he’s too good Stuffed Pigs: Each pig has insane power at 2ss - they have a walk of 5 and have a neat AOE effect of exploding for 1-4 unresistable damage in addition to a melee attack that can deal damage. They can also lock you into engagement - which guarantees the engaged model can’t charge that turn even if their MI is only on a 4. Engagement with the pigs: If you do get engaged, it ends up being best to just kill them. If you walk away they can just activate after you and either charge or walk back into engagement forcing you to take another test. You can’t shoot them (due to randomization) so you’re forced to either charge in with another model (meaning you’re taking the exploding damage on two models) or just attack with the model currently engaging them. Disengaging: A good player such as Wiktor will cheat the disengaging strike when needed burning an AP on your expensive models (Hannah is a great example). The worst is having to cheat first against pigs for disengaging strikes when you need to get an attack off that turn. You now either have to burn a fairly high card to guarantee being able to walk away or run the risk of them cheating a card to prevent you from walking away. Him cheating a 13 to stop your 10ss model from doing anything useful this turn (solely walking once) is hardly a waste. In my specific game, I can’t out range their explosion ever since the Young Nephilim have an engagement range of 1 inch. Because of this, every Young Nephilim who killed a pig (6 ss models, with 7 hp each) each took at minimum 1 and 4 damage without the damage they also took from charges. Pere combo: 1. Earl activates discarding a tome to give tomes to all constructs / leaders in range. Optional on the situation: 1. An Iron Skeeter activates applying Poorly Handled Explosives on Pere 2. Zipp walks forward twice, shoots a model and places them 6 inches away towards another model. 2. Iron skeeter uses hop on board on Pere (giving fast), walks twice placing the back of Pere’s base 18 inches from the deployment zone, Pere gains fast due to the tome provided from Earl’s ability 3. Pere activates goes reckless (so 4 ap total) then walks 1-2 times (wk 5 so 5-10 inches depending on where he needs to get), and uses Oopies 2 times (discarding 2 6+ tomes) causing a TN 13 Defense duel to everyone within 6" or they they take 5 damage. After that Oopies kills him triggering his 4 dmg explosion to all models within 2 inches (unresistable). Pere can move a guaranteed deployment zone size ( so lets say 6 inches) + 12 + 10 inches and still have 2 ap available. That’s the back of his base being 28 inches upfield while having 2 AP. So how many models can he hit? The board is 36 inches wide. His ability Oopies is a radius of 6 inches + his 40mm base size + 6 inches diameter so ~13.5 inches that his bubble can hit. So when playing against this, each of your models must be at least 13 inches away from each other, or he can hit multiple models with his ability. The board is 36 inches wide, and on average I’ll run ~7 models, so 36 / 7 = ~5. This means best case scenario, my models spread out evenly will be 5 inches away from each other. This is assuming a horizontal plane (which the board isn’t) so the numbers aren’t guaranteed but I’m not taking into account terrain (causes impassible locations so more clumping of models, blocking/dense terrain potentially allowing smaller distances) and bases being ~1 inch or larger so you’re most likely going to be forced to be grouped even more than that. This guarantees that Pere is always going to be able to hit at minimum 2 models on the board with his 6 inch AOE, most likely 3 models if Zipp places once 6 inches away from its original location. There is also a VERY high chance two of those models (probably the one Zipp places) will be within 5 inches of each other which is in range of Pere’s guaranteed unresistable dmg of 4 from his explosive demise, and an additional 4 dmg if they used Poorly Handled Explosives. 12. Hello all and welcome to a new series of posts I'm starting called making the whiskey golem great again. For the last two months I've been using the whiskey golem in almost every game I play in an effort to make you lovely bayou denizens what to put him on the table! To kick it off, this week we'll be looking at crews and masters he plays nice with, upgrades and when to take him. Feedback is greatly appreciate and I'd really like to get some good conversation going on. The first thing I wanna talk about is what masters he synergies well with. In my games I have found that zipp and his crew have a place for the golem and good construct support is a major part of it as one of his main issues is that he isnt a gremlin or a pig so he doesn't synergies well. Earl burns provides easy healing and in all my games he's only died once (and that was due to an Insta kill trigger). I'm also looking into sparks at the moment as I'm sure he would help greatly but unfortunately I'm a student with no job. Somer goes well with everyone and this is true for the golem as well. I have found that using the golem as a screen for the slop hauler has made a huge difference in my games as he usually dies turn 1/2. Having the slop hauler survive till turn 3 means an extra 3-9 wounds from his healing and as we know our bayou boyz like to hurt themselves. I'm very aware that he was designed for brewy but he's one of the masters I don't have yet and again, I have no money. I've also used him extensively with ophelia and zoraida. There are ZERO synergies with ophelia or her crew and is easily outclassed so he should really only be taken in the scenarios listed later. Mamma Z has a few things she can do for him, the first of which is boosting him to df 7 by making him used "fine craftsmanship" or giving him heals through smokey finish. Other than that should only be used in the scenarios that come a little later. An interesting thing is that him being an enforcer means that he has an upgrade slot. The three upgrades I've been testing are Angery drunk, a two stone upgrade that gives him flurry, barrel up, a 0 cost upgrade that gives him a trigger on a Rams and tomes to heal after damaging, and hide in the mud which is a 1 stone upgrade that gives him soft cover all the time. We'll talk about angry drunk first and what's there to say, it's not worth the cost. While the golem does have nimble meaning he can walk then flurry, he really does want to be boosting his df to 7 every turn. I have had some memorable moments like killing a him killing a teddy on his own and murdering a frank but it's not worth making him a 12 stone model because you don't get it off that often. Next we'll talk about hide in the mud. This is one of the better upgrades I've looked into and has been very effective. Df 7 with negatives to hit makes him impossible to shoot. If you anticipate a shooty crew take it, it's well worth the stone. Last is barrel up which is the one I've used the least. It seems to be the best choice numbers wise and it's a zero stone cost so why wouldn't you. It's the upgrade I'm using at the moment just because of the heals which is a 50% chance on every attack by the way. Also, a few of you might mention dirty cheater but he really doesn't need it and others will get much better use out of it. Finally, when do I take him? Unless he synergies well with the leader or crew I'm only taking this guy for a few scenarios. Stake a claim, guard the stash, squatters rights and headhunter are the strategies I'll take him in. The first couple are because if he's fantastic at holding points. I once had a mei Feng wail on him with all of her AP and extra attach triggers and have the golem almost at full at the start of the next turn. He is very durable with a LOT of healing options and let's not forget his defensive trigger which I think is extremely underrated. For those of you who don't know on a built in mask after he is damaged by a melee attach the target must pass a WP duel or end their activation immediately and get +2 poison. You'd be surprised how much it comes up and people will throw a card if it's their first AP. On to stake a claim his nimble makes him a good marker dropper and he can move 6 then drop each turn and as stated above his hard to put down, finally his durability and nimble also helps out in headhunter for keeping alive and snatching those heads. Finally if inspection comes up he is a strong consideration for me and I bet you can guess why. Next time we will be adressing common issues with the golem and work around for them. Well also be talking about bad scenarios and bad match ups. Thanks for reading, I've wanted to put this up for a long but but didn't feel like if played him enough till now. Please comment anything you'd like me to address in future and most importantly what you think about what I've said. 13. Hello everybody! My gremlin collection is missing the Swamp witch, so I was thinking, is there anyone running a successful Grem-raida? I know she can do some nasty tricks with models that have 1ap charges, but aside from that I have some hard imo figuring out crew ideas with her (which is a pity cause I love the box models and Will o' Wisps!), and how she would work with gremlins 14. Hello everybody! So in a couple of weeks i'll be partecipating to a 50ss, 3 round tournament in a club close to where i live. So far so good, the thing is tho that the OG decided to choose the scheme prior the tournament and I won't be having much time to practice before the event. Plus, this is a club (in)famous for having a bunch of toxic players, who focus more on tricking new players instead of playing well, with terrible behaviour when put in a pinch (aside from getting really cocky and starting to curse against you, I've had the terrible expirience of finding 2 players intentionally slow playing in order to tie up the match with me in the saem tournament, no joke). Long story short, i wanna be prepared for it, cause i know it's not gonna be nice if i encounter some of these characters, but also because in the same club plays a really good player (every rule has its own exception), with which i'd love to play against again and do well, since last time i lost for 1 point. So here're the rounds (they follow gg2017 roattions), and i'll follow up with my idea for them: -Round 1 : Close Deployment, Head Hunter; for schemes we have: Claim Jump, Dig their graves, Hunting party, Leave your mark, Recover evidence. Not that hard, really depends on who's my opponent, for a Zipp crew (which i plan to take on all 3 matches) to adapt to these schemes: would probably go for either dig their graves/leave your mark or Recover evidence/dig their graves (these 3 seems to me the easier to achive). I think Burt, taxidermist and the 1 mate will make the cut in here, maybe adding the mech pork. Finger woud probably substitue the 1 mate if i'l end up taking recover evidence. -Round 2: Stake a Claim, Standard deployment; for schemes we have: Claim Jump, Frame for murder, Leave your mark, Search the ruins, Inspection. This one should be a good match for the Iron Skeeter's Captain. FFM, Leave your mark and search the ruins might be the one i'd prefer to take, although even calim jump could be a good choice depending on my opponent; not a big fan of Inspection. For crew idea, i could go with the tag team 1 mate/ fingers to ensure my start points, while having some beater in the backline helping Zipp denying his. Maybe 2 or 1 lighting bugs for back up plan (even bayou could do). -Round 3: Squatter's Right on Corner Deployment; for scheme: Claim jump, Eliminate the leader ship, Accusation, Covert Breakthrough, Last Stand. So this one's tricky for me, since i never played Squatter's rights (i started playing with gg2016, so i have poor expiriences with the old schemes pool), but i guess that Claim jump and Eliminate the leadership can both be 2 good choices. Covert breakthrough is also a solid choice for my playstyle, while Accusation and Last stand don't really go along with it (especially last stand since i like to bring some activation control) Plan here is to bring a solid tank/runner ( 1 mate or/and fingers, which can be brutal paired with zipp for his aura) to control a couple of markers while the rest of the crew annoy and mess with the enemy crew. Guess Gracie could work too, since she's a though girl and can sure hold up her place; even the mech pork, being able to push models away with a mask could do (he's also fast as hell). Hope to recive some feedback, I really wanna go there and show them what's good, Bayou style! Thanks in advance to anyone passing by! Edd 15. Quick question on will o' the wisp ability and how it interacts with Zoraida as a gremlin master. Basically, is Zoraida still considered a Neverborn model for purposes of Ever Changing Form. The rule book so far as I can tell only states they are both for purposes of hiring, and that they must take upgrades from the declared faction. Ever Changing Form: Target a friendly Neverborn model within 10". Take a (2) Tactical Action printed on the target's stat card or one of its Upgrades. This Action may only be taken once per Turn... 16. Was just thinking about it. With all of those voodoo dolls getting killed there will be scrap markers all over the place. Going to have some really silly fun soon. 17. Hello! My friend and I recently started playing Malifaux and I have been using Gremlins. My opponent was playing Ressers and had an Incorporeal model. During the course of the game I shot the Incorporeal thing with one of my Gremlins and triggered Dumb Luck with severe damage of 8. The Incorporeal model took 4 damage because it suffers half the damage that is dealt to it. From there, Dumb Luck states that the Gremlin takes half the damage that the target model suffers. The Incorporeal model suffered 4 damage, so the Gremlin took 2 damage. Afterwards I discovered the rules FAQ and saw the one added on 11/1/14 that states that the Gremlin takes half of the total damage flipped, so my Gremlin should have taken 4 damage instead of 2. This appears contrary to the Rules as Written since Dumb Luck states to use damage suffered as opposed to damage flipped as seen in the FAQ. We (friend and I) are new to this game, but have played several others. In some game systems, an official FAQ is essentially the in-house suggested method of play whereas in other systems the FAQ is treated the same as an errata - official, final statement in situations where wording is unclear. The term suffer comes up very often and is frequently written as the final total number of damage taken after modification, leading us to read it as a key term with a defined and consistent meaning. Is it not a key term, or maybe we have the wrong definition? The wording for Dumb Luck is not unclear and the FAQ changes the wording entirely. Should the FAQ be considered a suggested method of play, or should this be treated like an errata? Thanks! 18. Hi chaps!, Happy new year! I want some tips about how to fight against neverborn and mainly against Pandora. 19. Hello world! Just as the title says. I got the alt McMourning card in my black friday stuff and currently I only play gremlins. I would love to trade this away for something I could actually use haha. If someone has the brewmaster I would be over the moon but any alt card is good with me! (yes even zoraida) 20. Rules question. 1. If a piglet is alone it has to charge if it can take an action. 2. Corn Husks allows piglets to do the (1) interact action as a (0) action. 3. What if the piglet walks+walks and ends next to a scheme marker. Does it have to charge? Can it? (Assuming there is a legal target within charge range.) Pg 38, “Actions Causing Actions” Call Out Box: Change the text of the first paragraph to: “Some Actions and Abilities will force or allow a model to take another Action. If an Action or Ability calls for another Action to be taken (such as Charge or “Make A New Entry”) then the additional Action or Actions do not cost any AP. The original Action is not considered resolved until the new Actions are also resolved.” (9/14/16) So I'm guessing it can walk + walk + charge... right? 21. Does a ht 1 model in base contact with a ht1 wall have LOS to a ht 2 target 5 inches away? Can a ht1 model charge or move over a ht1 wall towards the aforementioned ht 2 target? Can a ht1 model walk over ht1 terrain like the wall in question? If a push doesn't state 'directly away' or something explicit can it be around corners and such? When model A is pulled into base contact with model B can it be placed in front of model B? or does it have to be 'pulled' like trailing behind it? This came up because of some viktoria slingshot actions. maybe I'm not phrasing is well.. 22. Hello everyone, When I started playing this game only 4 months ago, I was lost and little disappointed because there isn't a real showcase of miniatures. I mean, there is no section on website or wherever that shows each faction completely painted with all miniatures. The same problem occurred few other times with new players...it's kinda hard to understand which models do represent you and you will enjoy to play with! This section is awesome because it shows so many wonderful painting projects, but they are all spread around with no real focus on showing a complete faction. That's why I've decided to put my first complete faction together for some pictures, stick the "image" of the plastic box and post them all. This will show new players the complete gremlin faction wave 1 + wave 2. So, I hope, it will be easier for them to understand if they are Gremlin inside or not I hope this can stick around a bit to help more new players (or players looking for new faction to start) as possible ! Here the link to dropbox folder with HD pictures How am I supposed to insert pictures in this post? I have a max. of 80 kb !! (I will just add the picture of one crew...?) Thank you p.s. I haven't painted my own models, My modeling skills unfortunately are close to 0 p.p.s. I will publish my second complete faction - Outcast - in a couple of weeks • Create New... Important Information
{"cc_dump":"CC-MAIN-2020-05","dolma2_qc":{"0":0.9886683822,"1":0.0113516068},"exact_duplicates":0,"lang":{"en":0.963113308},"madlad":{"num_sentences":342,"rule.2":[2,61,142,261],"rule.5":[],"status":"survived"},"minhash":null,"original_word_count":6140,"sa_remove_ranges":[[71,1155]],"text_hash":"38673026429844157674229618112484713254","warc_content_type":"application\/http; msgtype=response","warc_date":"2020-01-20T20:28:18Z","warc_url":"https:\/\/themostexcellentandawesomeforumever-wyrd.com\/tags\/gremlin\/","weborganizer":{"__label__art_and_design":null,"__label__education_and_jobs":null,"__label__electronics_and_hardare":0.0071314299,"__label__finance_and_business":null,"__label__games":0.812877357,"__label__politics":0.0042087957,"__label__science_math_and_technology":0.0062999022,"__label__software":null,"__label__software_development":0.0040801377,"__label__travel_and_tourism":null,"__label__crime_and_law":null,"__label__entertainment":0.0061075627,"__label__food_and_dining":null,"__label__history_and_geography":null,"__label__sports_and_fitness":0.031153826,"__label__adult_content":0.0057402467,"__label__fashion_and_beauty":null,"__label__social_life":0.0037172525,"__label__industrial":null,"__label__literature":null,"__label__home_and_hobbies":0.031153826,"__label__religion":null,"__label__health":null,"__label__transportation":null},"weborganizer_max":"__label__games"}
null
null
null
null
null
null
824f3d1fb2fb0d9a078db4403ca35cdeb2b54446
package class4; public class class4 { public static void main(String[] args) { System.out.println(" Задача 2 Заменить все грустные смайлы :( в строке на весёлые :) "); String ar = "Грустные :( очень :( смайлики :("; System.out.println(ar); System.out.println(replace(ar)); System.out.println(ar.replaceAll(":\\(", ":)")); System.out.println(" Задача 3 вывести true если строка начинается и заканчивается с заданной подстроки "); String strk = "str this string strts and ens with str"; System.out.println(strk); System.out.println(containz(strk, "str")); System.out.println(" Задача 4 Вывести сачек Петр владимирович в режиме С.П.В."); System.out.println(fio("сачек", "Петр", "владимирович")); System.out.println(" Задача 5 сравнить два массива строк на предмет их совпадения без учета позиции"); String[] ar1 = {"Ivan", "Boris", "Evgeny"}; String[] ar2= {"Ivan", "Evgeny", "Boris"}; System.out.println(equalarrays(ar1, ar2)); System.out.println(" Задача 6 Подсчитать количество всех точек, запятых и восклицательных знаков в строке."); } /* Заменить все грустные смайлы :( в строке на весёлые :) } */ public static String replace(String args) { char[] chars = args.toCharArray(); for (int k = 1; k < chars.length - 1; k++) { if (chars[k] == '(') { if (chars[k - 1] == ':') { chars[k] = ')'; } } } return new String(chars); } /*Написать функцию, принимающую 2 параметра: строку и слово - и возвращающую true, если строка начинается и заканчивается этим словом */ public static boolean containz(String stroka, String slovo) { boolean contnz = false; if ((stroka.startsWith(slovo)) & (stroka.endsWith(slovo))) { contnz = true; } return contnz; } /* Написать функцию, принимающую в качестве параметров имя, фамилию и отчество и возвращающую инициалы в формате Ф.И.О. Учесть, что входные параметры могут быть в любом регистре, а результирующая строка должна быть в верхнем. */ public static String fio(String name, String surname, String fathersname) { String fioz = name.substring(0, 1).toUpperCase() + "." + surname.substring(0, 1).toUpperCase() + "." + fathersname.substring(0, 1).toUpperCase() + "."; return fioz; } /* Заданы два массива строк. Написать функцию, определяющую, является ли содержимое этих массивов идентичным. Порядок расположения элементов значения не имеет. */ public static boolean equalarrays(String[] arr1, String[] arr2) { boolean equ = true; for (int i = 0; i<arr1.length; i++){ String elem = arr1[i]; boolean found = false; for (int j = 0; j<arr2.length; j++){ if (arr2[j].equals(elem)) { found = true; break; } } if (!found) { equ = false; } } return equ; } }
{"language":"Java","uri":"s3:\/\/softwareheritage\/content\/{'blob_id': '824f3d1fb2fb0d9a078db4403ca35cdeb2b54446', 'language': 'Java', 'repo_name': 'Apelsini\/Test1', 'path': '\/src\/class4\/class4.java', 'src_encoding': 'UTF-8', 'length_bytes': 3997, 'score': 3.65625, 'int_score': 4, 'detected_licenses': [], 'license_type': 'no_license'}","license_type":"no_license","detected_licenses":[],"int_score":4,"score":3.65625,"length_bytes":3997,"src_encoding":"UTF-8","repo_name":"Apelsini\/Test1","path":"\/src\/class4\/class4.java"}
null
null
null