text
stringlengths
1
2.15M
meta
dict
Q: How to display form using formGroup inside table row in angular 8 i want to display form inside table row. Each row has factor wise self rating functionality. and user can edit individual factor rating. so i want to display each row has insert functionality later on edit and update as well as.that's why i am using form inside table with in row but formGroup getting error. then after i have used form before table. i got same errors. Here My Error **Uncaught Error: Template parse errors: Can't bind to 'formGroup' since it isn't a known property of 'form'**. Here is my code .html file `<form [formGroup]="appraisalApplyForm" (ngSubmit)="submitApplyAppraisal()"> <table class="table table-bordered" style="overflow-y: auto;"> <thead> <tr> <th class="pdten">Rating Factors</th> <th class="pdten">Self Appraisal Rating </th> <th class="pdten">Supervisor Appraisal Rating</th> <th class="pdten">Justification/Remark</th> <th class="pdten">Action</th> </tr> </thead> <tbody> <ng-container *ngFor="let factor of factors; index as i"> <tr *ngIf="factor.department_id ===parameter.id"> <!-- <form method="post" [formGroup]="appraisalApplyForm" (ngSubmit)="submitApplyAppraisal()"> --> <td class="pd_custom fw " >{{factor.rating_factor_name}}</td> <input type="hidden" formControlName = "department_id" value="{{parameter.id}}"/> <input type="hidden" formControlName = "factor_id" value="{{factor.id}}"/> <td><input class="form-control" id="" placeholder="Enter Rating.." type="text" formControlName = "self_rating[]"></td> <td><input class="form-control" id="" placeholder="Enter Rating.." type="text" formControlName = "supervisor_rating[]"></td> <td> <textarea class="form-control" id="" placeholder="remark.." formControlName = "remark[]"></textarea> </td> <td><input type="submit" class="btn bg-olive btn-flat margin " value="submit"></td> <!-- </form> --> </tr> </ng-container> </tbody> </table> <div class="box-footer"> <input type="submit" class="btn bg-olive btn-flat margin " value="submit"> </div> </form>`. .ts file code export class AppraisalApplyComponent implements OnInit { appraisalApplyForm :FormGroup; constructor(private _services: ApiService, private router: Router, private fb: FormBuilder, private http: HttpClient) { } factors:any; parameters:any; data = { } ngOnInit() { this.getRatingFactorParameter(); this.getRatingFactors(); this.appraisalApplyForm = this.fb.group({ factor_id: [''], department_id: [''], self_rating: [''], supervisor_rating: [''], remark: [''], //arr: this.fb.array([]) }); } submitApplyAppraisal(){ let route = 'add-apply-appraisal'; let data = this.appraisalApplyForm.value; alert(data); return ; const token = localStorage.getItem('token')?localStorage.getItem('token'):''; console.log(data); this._services.requestCreator(data, route, token).subscribe((result: any) => { console.log(result.result); if (result.status = 200) { alert('Rating Factor Data Added Successfully !.'); console.log("Form Submitted!"); // this.applyAppraisalForm.reset(); } }); Welcome for Any suggestion for better coding. A: Firstly you cannot use the form inside a table. This will distort the DOM tree. Secondly, You want that each row has unique functionality. For this, you will have to declare an array of form groups and pass each row data to it. In your form (ngOnInit) you declared only one form group. I refactor your code. Have a look. Please note that this is not the whole code. .html file <form [formGroup]="appraisalApplyForm" class=""> <div formArrayName="appraisalForm"> <div *ngFor="let appraisalForm of appraisalApplyForm.get('appraisalForm')['controls']; let i = index"> <form [formGroup]="appraisalForm" (ngSubmit)="submitApplyAppraisal(appraisalForm.value)"> <tr> <td class="pd_custom fw ">--</td> <td><input class="form-control" id="self_rating_{{i}}" placeholder="Enter Rating.." type="text" formControlName = "self_rating"></td> <td><input class="form-control" id="supervisor_rating_{{i}}" placeholder="Enter Rating.." type="text" formControlName = "supervisor_rating"></td> <td> <textarea class="form-control" id="remark_{{i}}" placeholder="remark.." formControlName = "remark"></textarea> </td> <td><input type="submit" class="btn bg-olive btn-flat margin " value="submit"></td> </tr> </form> </div> </div> </form> .ts file export class AppraisalApplyComponent implements OnInit { name = 'Angular'; appraisalApplyForm :FormGroup; constructor(private fb: FormBuilder) { } factors:any; parameters:any; new_factors = [ { department_id: '1', rating_factor_name : 'none', self_rating : 2, supervisor_rating: 3, remark: 'Temp' }, { department_id: '2', rating_factor_name :'none', self_rating : 6, supervisor_rating: 2, remark: 'qwertyuiop' }, { department_id: '3', rating_factor_name : 'none', self_rating : 6, supervisor_rating: 9, remark: 'asdfghjkl' }, ] data = { } get formArray() { return <FormArray>this.appraisalApplyForm.get('appraisalForm'); } ngOnInit() { this.appraisalApplyForm = this.fb.group({ appraisalForm : this.fb.array([]) }); this.fill_appraisal_form(this.new_factors); console.log(this.appraisalApplyForm); } addForm() { const control = <FormArray>this.appraisalApplyForm.controls['appraisalForm']; control.push( this.fb.group({ factor_id: this.fb.control(''), department_id: this.fb.control(''), self_rating: this.fb.control(''), supervisor_rating: this.fb.control(''), remark: this.fb.control(''), }) ); } fill_appraisal_form(form_list) { for (let i = 0; i < form_list.length; i++ ) { if (this.formArray.length < form_list.length) { this.addForm(); } this.formArray.at(i).patchValue({ department_id: form_list[i].department_id, self_rating: form_list[i].self_rating, supervisor_rating: form_list[i].supervisor_rating, remark: form_list[i].remark }); } } submitApplyAppraisal(data){ let route = 'add-apply-appraisal'; // let data = this.appraisalApplyForm.value; console.log(data); return ; const token = localStorage.getItem('token')?localStorage.getItem('token'):''; console.log(data); this._services.requestCreator(data, route, token).subscribe((result: any) => { console.log(result.result); if (result.status = 200) { alert('Rating Factor Data Added Successfully !.'); console.log("Form Submitted!"); // this.applyAppraisalForm.reset(); } }); } }
{ "pile_set_name": "StackExchange" }
Improvement of hyperlipidaemia by bezafibrate treatment in RDT patients. The pharmacokinetics and therapeutic effects of bezafibrate were studied in 15 RDT patients in a placebo controlled trial. Serum half life of bezafibrate was prolonged to 17--21.5 hours compared to 1.6--2.1 hours in normals. Adequate dosage in RDT patients was found to be 200mg every 3rd day. Bezafibrate treatment resulted in significant decrease in the serum concentrations of triglycerides, total cholesterol and LDL-cholesterol, whereas HDL-cholesterol serum levels increased. Under this dosage regimen no adverse side effects were observed. Bezafibrate offers the possibility of correcting disturbances of lipid metabolism of RDT patients, possibly involved in the pathogenesis of atherosclerosis of these patients.
{ "pile_set_name": "PubMed Abstracts" }
[Acquired immunodeficiency syndrome (AIDS) in Lubumbashi. Clinical and epidemiological observations]. 26 AIDS cases (13 males and 13 females) have been noticed in the internal medicine service of the Lubumbashi University Clinics, town at the boundary of the south-east of Zaïre. The clinical data are conventional: only heterosexual transmission seems prevalent. The shortage of HIV diagnosis means restrain larger survey, but 5 to 7% of blood givers are AIDS carriers. The risk of AIDS dissemination is real, even in rural areas of some regions with permanent connections of larger urban centres.
{ "pile_set_name": "PubMed Abstracts" }
Standard off-cord lung oblique fields do not include the entire mediastinum: a computed tomography simulator study. The routinely recommended target volume for off-cord lung oblique fields in the treatment of postoperative bronchogenic carcinoma includes the entire mediastinum, as defined by coverage of the contralateral mainstem bronchus and subcarinal space. However, this may be difficult to accomplish with the field angles of 20 degrees to 40 degrees, recommended in the recently completed Intergroup Trial (Radiation Therapy Oncology Group 91-05). This project was undertaken to define the oblique angle necessary to encompass the entire mediastinum as determined by computerized tomography simulator verification. Axial computerized tomography simulation images of 25 patients with non-small-cell lung cancer were used in this study. Ten patients had prior lobectomy or pneumonectomy as part of their management. The contralateral mainstem bronchus, subcarinal space (SS), and the spinal cord were each contoured as separate volumes. The length of the contralateral mainstem bronchus was defined as extending from the carina to the bifurcation of the lobar bronchi. The subcarinal space was defined as a triangular space (in a coronal plane) with the carina at the apex, the mainstem bronchi superiorly, and a horizontal line 5 cm below the carina as the base of the triangle. The minimal angle to encompass the contralateral mainstem bronchus and subcarinal space, and to exclude the spinal cord was determined for each patient. The contoured volumes did not have additional margin added. The position of the carina was scored as "midline" if located in the midsagittal plane, or "off-midline" if deviated to either side from midline. Midline deviation was determined at the level of the carina to evaluate possible anatomical distortion relating to the tumor or prior surgery, and its effect on the minimal angle was assessed. The median minimal angle measured was 45 degrees (range: 28-65 degrees) for the entire group, and in 64% of those evaluated, this oblique angle was significantly greater than the 40 degrees recommended in Radiation Therapy Oncology Group guidelines (p = 0.017). In patients without midline deviation (n = 17), the median minimal angle was 45 degrees (range: 28-60 degrees), and in patients with midline deviation (n = 8), it was determined to be 44 degrees (range: 27-65 degrees), with no statistical difference noted between the two groups (p = NS). Although midline deviation was present in 4 of 10 patients previously resected, the above relationship remained unchanged. Based on computerized tomography simulation verification, off-cord oblique field angles of 20 degrees to 40 degrees do not adequately cover the entire mediastinum in most patients. To adequately encompass the entire mediastinum as defined in the Intergroup Trial (Radiation Therapy Oncology Group 91-05) with off-cord oblique fields, treatment angles greater than 40 degrees are necessary. Whether the potential increase in lung volume exposed to radiation from these larger angles results in a poorer therapeutic ratio requires further investigation.
{ "pile_set_name": "PubMed Abstracts" }
Q: Remove class after 5 second on ViewportChecker I'm using ViewportChecker jquery plugin, script that detects if an element is in the viewport and adds or remove a class to it. I'm trying to hold class for 5 second, means remove class .invisible after 5 second. I've made a demo, when scroll down to the element/class then it get window view and then ViewportChecker remove .invisible class then add .visible class. See fiddle > HTML: <div class='parent-div'> <div class="a invisible"> <!-- Content --> New blog writers everywhere are faced with a serious dilemma when they first reach the Internet and must decide which blogging platform is best for their new website. There are actually dozens of options on the market, ranging from the basic blog settings of the social networks to the self-hosted open sources software solutions. </div> <br></br> <div class="b invisible"> <!-- Content --> New blog writers everywhere are faced with a serious dilemma when they first reach the Internet and must decide which blogging platform is best for their new website. There are actually dozens of options on the market, ranging from the basic blog settings of the social networks to the self-hosted open sources software solutions. </div> </div> <!--main div end--> JS: // For Class a $('.a').viewportChecker({ classToAdd: 'visible', // Class to add to the elements when they are visible classToRemove: 'invisible', // Class to remove before adding 'classToAdd' to the elements offset: 2, // The offset of the elements (let them appear earlier or later). This can also be percentage based by adding a '%' at the end invertBottomOffset: true, // Add the offset as a negative number to the element's bottom repeat: false, // Add the possibility to remove the class if the elements are not visible callbackFunction: function(elem, action){}, // Callback to do after a class was added to an element. Action will return "add" or "remove", depending if the class was added or removed scrollHorizontal: false }); There have any way to hold to remove class for 5 second only on class .a I means ViewportChecker will remove class immediately, so i want to hold this class .invisible for 5 second only on <div class="a invisible">. A: removing the given classes and then adding the class after the delay inside the callbackFunction using setTimeout() will do the job: DEMO // For Class a $('.a').viewportChecker({ classToAdd: 'visible', // Class to add to the elements when they are visible classToRemove: 'invisible', // Class to remove before adding 'classToAdd' to the elements offset: 2, // The offset of the elements (let them appear earlier or later). This can also be percentage based by adding a '%' at the end invertBottomOffset: true, // Add the offset as a negative number to the element's bottom repeat: false, // Add the possibility to remove the class if the elements are not visible callbackFunction: function(elem, action){ $('.a.visible').addClass('invisible').removeClass('visible'); setTimeout(function(){ $('.a.invisible').addClass('visible').removeClass('invisible'); },5000); }, // Callback to do after a class was added to an element. Action will return "add" or "remove", depending if the class was added or removed scrollHorizontal: false }); // For Class b $('.b').viewportChecker({ classToAdd: 'visible', // Class to add to the elements when they are visible classToRemove: 'invisible', // Class to remove before adding 'classToAdd' to the elements offset: 2, // The offset of the elements (let them appear earlier or later). This can also be percentage based by adding a '%' at the end invertBottomOffset: true, // Add the offset as a negative number to the element's bottom repeat: false, // Add the possibility to remove the class if the elements are not visible callbackFunction: function(elem, action){ $('.b.visible').addClass('invisible').removeClass('visible'); setTimeout(function(){ $('.b.invisible').addClass('visible').removeClass('invisible'); },5000); }, // Callback to do after a class was added to an element. Action will return "add" or "remove", depending if the class was added or removed scrollHorizontal: false });
{ "pile_set_name": "StackExchange" }
[Serological diagnosis of Staphylococcus aureus infections using anti-A beta teichoic acid antibodies assay (author's transl)]. 225 control subjects, 12 hospitalized Staphylococcus free (34 sera) and 16 S. aureus infected patients (79 sera) were tested for anti-A beta teichoic acid antibodies, using counter-immunoelectrophoresis. Anti-alpha and gamma haemolysins antibodies were dosed in parallel in 164 sera. Less than 5 per cent of control sera (3,11 per cent) have an antibody tire higher than 1/8: this tire is therefore selected as threshold level of positivity. Ten of the 12 hospitalized patients without staphylococcal infections are below this level. 31,6 per cent of staphylococcus infected patients have higher serum titers; only 3,7 per cent have no antibodies. In the others, a significant rise in titres is observed. There is no correlation between anti-alpha and gamma staphylolysin and anti-teichoic acid antibodies titres. The method suggested, both easy and rapid, could be used in association with anti-staphylolysin dosage for serological diagnosis of staphylococcal infections.
{ "pile_set_name": "PubMed Abstracts" }
Bernie Sanders offered his most pointed criticism yet of Hillary Clinton and the Clinton Foundation, telling CNN’s Jake Tapper in an interview airing Sunday that he thinks the charity poses a “conflict of interest” for the Democratic presidential front-runner. “Do I have a problem when a sitting secretary of state and a foundation run by her husband collects many millions of dollars from foreign governments, governments which are dictatorships? … Yeah, I do,” Sanders told Tapper. The Clinton Foundation has received tens of millions of dollars in donations from foreign governments. The biggest donor has been Saudi Arabia, which gave between $10 million and $25 million. “You don’t have a lot of civil liberties or democratic rights in Saudi Arabia. You don’t have a lot of respect there for opposition points of view, for gay rights, for women’s rights,” Sanders told Tapper. Tapper followed up, asking Sanders if he believes the foreign donations present a conflict of interest for Clinton.
{ "pile_set_name": "Pile-CC" }
Story highlights Republicans look to retain governorship in battleground state Race between Terry McAuliffe and Ken Cuccinelli is viewed by some as "lesser of two evils" Enter Robert Sarvis, a Libertarian candidate who has quietly crept up in the polls He says "the system is rotten" due to Republican and Democratic "malfeasance" The Virginia governor's race has often been looked to as an off-year barometer of national political sentiment. This year's grind-it-out race, an acrimonious spitball contest between two candidates only slightly more likeable than Walter White, is anything but. In a lesser-of-two-evils campaign, Terry McAuliffe, the longtime Democratic fundraiser and confidante to former President Bill Clinton, is clinging to a modest but sturdy lead over Republican Ken Cuccinelli, the state's attorney general. Republicans have pilloried McAuliffe as a sleazy political operator and failed businessman who exploited his Washington connections to help his sputtering car company, GreenTech Automotive. Cuccinelli has been targeted as a far-right social crusader who would curb abortion rights and access to contraception. Democrats on Twitter are fond of calling him #creepyken. McAuliffe is leading Cuccinelli among likely voters by an eight-point margin, 47% to 39%, according to a Washington Post poll out this week. McAuliffe is hardly bulletproof: A federal investigation into GreenTech has sullied his reputation, and only two-thirds of Democrats -- his own party -- consider him "honest and trustworthy." But Cuccinelli is on much shakier ground. While Republicans are slightly more fired up about voting for him than Democrats are for McAuliffe, Cuccinelli's favorable ratings are next-to-toxic: More than half of likely voters view him unfavorably. JUST WATCHED Virginia's gubernatorial candidate Terry McAuliffe under fire Replay More Videos ... MUST WATCH Virginia's gubernatorial candidate Terry McAuliffe under fire 02:26 Enter Robert Sarvis. As public dismay with the two main candidates calcifies, the baby-faced 37-year old Libertarian candidate from Fairfax has quietly crept northward in the polls, reaching 10% in the Post poll. That's not nearly enough to win in November -- with just five weeks until Election Day, even Sarvis admits "we have to get a lot higher" -- but he looks increasingly likely to play the role of spoiler by siphoning conservative votes away from Cuccinelli. Sarvis chafes at the label. "I don't even know what it means to be a spoiler," he said in an interview. "The system is rotten to the core from Republican and Democratic malfeasance. They have already spoiled the system. I don't even know what it means to be a spoiler. If I am the only one arguing for freedom and the rule of law, then those two are the spoilers as far as I'm concerned." Positioning himself as a moderate The Harvard and NYU-educated attorney and software programmer -- he was part of a team that won Google's Android Developer Prize for creating a "mobile app for true nightlifers" -- is positioning himself as the moderate choice between two "extreme" candidates. In his telling, McAuliffe "stands for an extreme version of crony capitalism." Cuccinelli is "very regressive on social issues" and "unreliable" on economic matters. Both parties, he said, are in league with the banks and "rich folks" -- a frustration that first motivated him to run for office in 2011, when he mounted an unsuccessful Republican bid to unseat longtime Democratic state Senate leader Dick Saslaw. Though he said he left the GOP after that race, he voted in Virginia's Republican presidential primary in 2012, casting a ballot for Ron Paul. That November, he voted for Gary Johnson, the Libertarian nominee. Sarvis supports same-sex marriage, marijuana legalization and says climate change is real. He opposes gun restrictions, higher taxes, the expansion of Medicaid under the Affordable Care Act, and last year's landmark transportation bill in Richmond that raised some taxes to help fix northern Virginia's clogged roadways. Sarvis said he would pay for transportation funding, in part, by cutting from the education budget and finding ways to "prioritize spending." Sarvis might deny being a spoiler, but Cuccinelli's campaign conceded Thursday that the Libertarian is draining support from the Republican nominee. "There's no question that a vote for Robert Sarvis is a vote for Terry McAuliffe and a vote against liberty," said Richard Cullen, Cuccinelli's communications director. "It's important to remember that there's no greater defender of first principles and liberty in Virginia than Ken Cuccinelli," Cullen said, outlining why Libertarian-leaning Republicans should stay in the party fold. "Ken was the first attorney general in the nation to sue to stop Obamacare and he led an eight year battle to secure Virginians' private property rights in the state constitution. He's also the only candidate in this race who's laid out a clear, substantive plan to free up the private sector and create 58,000 jobs." Challenges for third-party candidates Few political observers in Virginia expect Sarvis, who has little money in the bank and almost no political machinery behind him, to reach the 10% threshold, or even the 8% mark he hit in another recent poll from NBC News and Marist. The last third-party candidate in Virginia to reach that level of support was Marshall Coleman, who snagged 11% of the vote in the madcap three-way 1994 Senate race. Unlike Sarvis, though, Coleman had political pedigree and bona fide institutional support: then-Sen. John Warner backed Coleman that year over the flame-throwing Republican nominee, Oliver North. The Democratic incumbent, Chuck Robb, eked out a three-point win that year. A more recent example of third-party noise-making came in the 2005 governor's race, when Russ Potts, a GOP state senator who ran as an independent, aired a memorable statewide television ad featuring people loudly banging on pots as they chanted "We want Potts!" Despite polling as high as 9% that year, Potts only garnered 2% in the end, as Democrat Tim Kaine edged out Republican Jerry Kilgore to win the governorship. Even if Sarvis tumbles from his current standing and only captures a small slice of the vote on Election Day, Republicans fear that most of that support will come straight out of Cuccinelli's back pocket, especially in what's expected to be a low turnout election. "Nearly all of his vote will come from people right of center who feel obligated to vote but can't support Cuccinelli because he is too far to the right, or they fear what he would be like as governor and can't vote for McAuliffe because he's a Democrat," observed one well-connected Richmond Republican who is not directly involved in the race. Cuccinelli faces gender gap Cuccinelli is in trouble with or without a third party candidate, due in large part to a startling gender gap that emerged this summer after free-spending Democrats began hammering the Republican on women's health issues. Women favor McAuliffe over Cuccinelli by an enormous 24-point margin, and even without Sarvis in the race, the Post poll showed McAuliffe leading Cuccinelli by a five-point margin, 49-44. But Sarvis isn't going anywhere, and his rising poll numbers are making an uphill fight for Cuccinelli that much steeper. Sarvis' most obvious challenge is exposure. A large majority of Virginia voters still have no clue who he is or what he stands for, a challenge that wasn't made easier by his exclusion from a debate Wednesday night sponsored by the Fairfax County Chamber of Commerce. In response, Sarvis tapped into his meager campaign budget -- he reported having only $19,109 in the bank at the end of August -- to run a TV ad during the debate attacking McAuliffe's "cronyism" and Cuccinelli's "narrow-minded social agenda." The ad starred his two children and his African-American wife, Astrid, whom he met in a Mississippi book store when he spied her reading "The Da Vinci Code" and told her he had recently seen the movie. John Vaught LaBeaume, a Sarvis adviser, said the campaign has been in touch with the organizers of the third and final debate in Roanoke in late October, and have received "encouraging" signals about being included. Until then, Sarvis said he's content to meet voters by driving around the commonwealth in his van, listening to Pink Floyd, as the other campaigns savage each other on the airwaves. "If they keep destroying each other with negative ads that's fine with us," he said drily.
{ "pile_set_name": "OpenWebText2" }
We know Donald Trump is a racist. He passes the pretty simple test for being a racist: does he do and say racist things? The answer is yes, regularly and repeatedly. After the revelations of camps and forced separation, there’s now a bigger question that’s been lurking for too long: is Donald Trump a fascist? Phrases like ‘alt-right’ or ‘white nationalism’ are fashionable ways of avoiding the big f-word. In one sense, George Orwell was right long ago in 1944 when he said the word fascism is “almost entirely meaningless”, especially as people still “recklessly fling the word... in every direction”. It’s hard to pin down exactly what a fascist is. There are common threads, a fascist family resemblance if you like, such as a glorification and love of violence. However, fascism was different in form, from Spain where it was a kind reactionary oppression to Germany where it was ultimately about racism and genocide. A further problem, as many scholars point out, is that it was easier to work out what fascism was against than what it was for. Even a rough list of what it was against is enlightening when we think about Trump: equality, diversity, democracy. There are very obvious ways in which Trump isn’t a fascist. He has no armed squads, youth movements or a one-party state. He is surrounded, hemmed in, with democratic institutions. I don’t know if, in the darkest and deepest recesses of his imagination, he wants parades and uniforms and marching squads. Perhaps. Probably. But are the parades just trappings? Orwell argued that fascism, beyond the marching, was more accurately a state of mind. He went on to say that ‘‘bully’ is a synonym for ‘fascist’’. Trump has been nothing if not a bully, attacking grieving ethic minority fathers of servicemen and kneeling ethnic minority footballers (see the link?) and throwing toddlers in camps. Trump and Trumpism is, in some senses, just politicised bullying of the vulnerable. Even without the parades, I’d argue Trump does have a fascist state of mind and, at the very least, borrows their way of seeing the world and mode of working. Joe Biden said as much a few day ago. Trump has already done what fascists did, just as Salvini is busily doing in Italy (in the fascist office of choice, the interior ministry). He has poisoned the well of public discourse, pushing away the boundaries of decency and spewing hate. He called Mexicans rapists and publicly mocked a disabled reporter. He went on, while in the office of Abraham Lincoln and FDR, to praise Nazis. Remember? Time and again he has struck the classic famous leadership pose of a man with a ‘grievance against the universe’ and styled himself as ‘the martyr, the victim... the self-sacrificing hero who fights single-handed against impossible odds’. In office, again like Salvini, he is trying to undermine democratic norms daily, as if melting democracy from the inside out. He seeks to undermine the very essence of democracy at the push of a tweet: yesterday it’s judges, today it’s the rule of law, and tomorrow it’s the voting system. What the past week has shown is that his policies too now resemble fascism. He has created a series of camps, yes that word again, camps, perhaps the word that defined the 20th Century. He separated out vulnerable groups and targeted them, testing the waters of extreme policy semi-secretly, to see how the public react. For all the myth of imposition, Fascist regimes too carefully calibrated and re-calibrated policy, while covering them in a smoke screen of denial, partial back down and obfuscation. See how Trump’s defenders argued the nuances of Nazism or what constitutes a ‘cage’ for a toddler? This is not to say Trump is a full-on fascist dictator, much as he may want to be. He remains constrained, so far. Much of his success has been because others, notably the Republicans and parts of the media, have allowed him, excused him and appeased him. Rather than a new Hitler he perhaps resembles some of the incompetent leaders in Weimar Germany before him, happily eroding democratic defences before letting in (actually inviting in) the Nazis. Most of all, he looks like his idol Mussolini, heading a ramshackle ‘propaganda regime’ long on rhetoric but short on concrete achievements. Before we make ‘hail Mussolini’ jokes, bear in mind , according to Bosworth, that Mussolini was responsible for a million deaths, the dropping of poison gas and the kick starting of a vicious civil war from Italy has not fully recovered. For those who doubt, perhaps we can turn the question around. Let’s apply the LBJ test and see if Trump can deny it. How often has Trump proved himself not to be fascist and a supporter of democracy? I don’t mean his own imbecilic boasting, but democracy in general? How often has he championed freedom of speech (for everyone)? Or praised an opponent? Or publicly favoured minority rights? Never. Trump’s inclination may not be the full-throated marching fascism of the past but, as Umberto Eco pointed out, it can change forms. So we should assume the worst and point out the worst. Never normalise, never accept. Primo Levi’s warning echoes back to us “it happened, so it can happen again”.
{ "pile_set_name": "OpenWebText2" }
Catholic Archbishop of Dublin Diarmuid Martin has strongly dissociated himself from a parish priest who cast doubt on claims that Fr Michael Cleary had fathered children. Fr Cleary, who was among the best-known priests in Ireland and a champion of orthodox church teaching on sexuality, died at the end of 1993. In 1995 it was revealed he had a son, Ross, with his housekeeper Phyllis Hamilton, who subsequently revealed the couple had previously given another son up for adoption. In his June newsletter for St Brigid’s parish in Cabinteely, Fr Arthur O’Neill described these revelations as “exasperating”, unproven and the result of “shoddy practice” by named journalists, whom he challenged to prove them. He suggested his former clerical colleague had suffered a serious injustice: “The burial of a person’s legacy deeper than their body just isn’t fair – if it’s based on a falsehood.” Responding to questions from The Irish Times, Archbishop Martin rebuked Fr O’Neill. “Fr Arthur O’ Neill’s publicly expressed views are his alone and are not supported by Archbishop Martin,” a spokeswoman for Dr Martin said. “Parish newsletters are not vehicles for the expression of personal views. Archbishop Martin fully respects Ross Hamilton’s right to privacy and his right to determine what is said publicly about him.” Meanwhile, a former confidante of Fr Cleary and Ms Hamilton, who died in 2001, has revealed she “sounded out” the Dublin diocese on their behalf while Fr Cleary was still alive. In a statement published in The Irish Times today, Róisín O’Shea writes that following the revelation in 1992 that the bishop of Galway Eamon Casey had fathered a son, she urged Fr Cleary to tell his family the truth about his relationship.
{ "pile_set_name": "OpenWebText2" }
Light response of sunflower and canola as affected by plant density, plant genotype and N fertilization. Crop response to light is an important parameter determining crop growth. Three field (split plots) experiments were conducted to investigate the effects of plant density, plant genotype and N fertilization on the light absorption and light extinction of sunflower (Helianthus annuus L.) and canola (Brassica napus L.). A detailed set of plant growth, light absorption and crop yield and oil related parameters were determined. Light was measured at noon during the sunny days with clear sky. In experiment I, although the plant density (PD) of 14 resulted in the highest rate of sunflower light absorption (31.37%) and light extinction (0.756), the highest rate of grain yield and grain oil yield was resulted at PD12 at 3639 and 1457.9kg/ha, respectively; as well as by genotype SUP.A. In experiment II (canola), PD80 resulted in the highest rate of light absorption (13.13%), light extinction (0.63), grain yield (2189.4kg/ha) and grain oil yield (556.54kg/ha). This was also the case for Genotype H. In experiment III (canola), although N150 resulted in the highest rate of light absorption (10.74%) and light extinction (0.48), the highest rate of grain yield (3413.6kg/ha) and grain oil yield (891.86kg/ha) was resulted at N100 as well as by Genotype H401. Results indicate how light properties, crop growth and yield of sunflower and canola can be affected by plant and environmental parameters, which are also of practical use by farmers.
{ "pile_set_name": "PubMed Abstracts" }
/** ****************************************************************************** * @file stm32l4xx_ll_pwr.c * @author MCD Application Team * @brief PWR LL module driver. ****************************************************************************** * @attention * * <h2><center>&copy; COPYRIGHT(c) 2017 STMicroelectronics</center></h2> * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * 3. Neither the name of STMicroelectronics nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * ****************************************************************************** */ #if defined(USE_FULL_LL_DRIVER) /* Includes ------------------------------------------------------------------*/ #include "stm32l4xx_ll_pwr.h" #include "stm32l4xx_ll_bus.h" /** @addtogroup STM32L4xx_LL_Driver * @{ */ #if defined(PWR) /** @defgroup PWR_LL PWR * @{ */ /* Private types -------------------------------------------------------------*/ /* Private variables ---------------------------------------------------------*/ /* Private constants ---------------------------------------------------------*/ /* Private macros ------------------------------------------------------------*/ /* Private function prototypes -----------------------------------------------*/ /* Exported functions --------------------------------------------------------*/ /** @addtogroup PWR_LL_Exported_Functions * @{ */ /** @addtogroup PWR_LL_EF_Init * @{ */ /** * @brief De-initialize the PWR registers to their default reset values. * @retval An ErrorStatus enumeration value: * - SUCCESS: PWR registers are de-initialized * - ERROR: not applicable */ ErrorStatus LL_PWR_DeInit(void) { /* Force reset of PWR clock */ LL_APB1_GRP1_ForceReset(LL_APB1_GRP1_PERIPH_PWR); /* Release reset of PWR clock */ LL_APB1_GRP1_ReleaseReset(LL_APB1_GRP1_PERIPH_PWR); return SUCCESS; } /** * @} */ /** * @} */ /** * @} */ #endif /* defined(PWR) */ /** * @} */ #endif /* USE_FULL_LL_DRIVER */ /************************ (C) COPYRIGHT STMicroelectronics *****END OF FILE****/
{ "pile_set_name": "Github" }
op { name: "DeepCopy" input_arg { name: "x" type_attr: "T" } output_arg { name: "y" type_attr: "T" } attr { name: "T" type: "type" } is_stateful: true }
{ "pile_set_name": "Github" }
Anjappar Chettinad specializes in South Indian cuisine, with locations worldwide. In the GTA, outposts in Brampton, Mississauga and Scarborough offer a varied selection of seafood, meat, vegetarian and rice dishes,... Big Meal Authentic Japanese Cuisine is a Japanese all-you-can-eat place right off of McNicoll Avenue in Scarborough. It offers a stunningly diverse array of options, with numerous special house rolls... Bluffer's Restaurant is a beautiful, large-windowed space that's set in 400 acres of parkland and offers views of the Scarborough Bluffs from both indoors, and their wraparound patio. Seafood figures... Bombay Palace is a long-standing Indian all-you-can-eat buffet that has recently undergone a complete facelift, with new management and refurbished interior. Other than the buffet table, which is always... Caribbean Wave certainly has square-footage over the other Caribbean spots on this list, occupying an expansive restaurant and lounge on Milner Avenue in Scarborough. While you should expect to wait... Ceylon Flavor is not your typical Sri Lankan takeout-counter-style restauran, but rather features a sleek design and comfortable seating area. Enjoy their bountiful selection of vegetarian and meat dishes including... El-Sabil Restaurant is a Halal restaurant that specializes in Middle-Eastern dishes. While it also offers excellent Western favourites such as thick and juicy burgers, their specialty is definitely the shawarmas.... Fishman Lobster Clubhouse, often mispronounced as FishERman Lobster, is a modest-looking but rather roomy Scarborough joint that serves as the definitive go-to place for Chinese lobster in the 905. The... Fortune Restaurant is a family-run Chinese restaurant located on Midland Avenue in Scarborough. It is usually extremely busy with families on weekends and mealtimes, making your dining experience a bit... Hi Shanghai is a rather large traditional Chinese restaurant that rolls back the years and evokes old-school Chinese dining memories, with minimal décor, no fancy fusion-like interior accoutrements, and just... Jesse Jr. (Scarborough) is a Filipino restaurant offering traditional dishes such as Pancit Sotanghon, Pork Sisig, and Chicken Adobo. The Scarborough restaurant also has plenty of dessert options including Maja... Kairali offers traditional Travancore style cooking in a contemporary setting. Find specialties of the the South Indian coastal state on the menu including selections like Nadan fish curry, mutton curry,... La Zeez (Scarborough) offers all the delicious shawarma, falafel, and other Middle Eastern plates and wraps as its downtown counterpart, without all the hoards of Ryerson students. Chicken shawarma is... Matsuda Japanese Cuisine is quickly becoming a new favourite for Scarborough residents for its welcoming and modern decor, extremely spacious interior, and attentive service. Try their Sunshine Roll, an interesting... Regino's Pizza in Scarborough offers a wide range of toppings that encompasses traditional favourites along with unusual finds like zucchini, corn, and Philly steak. Locations can be found across the... Royal Chinese Seafood Restaurant offers Hakka Chinese/Indian Chinese favourites, and while their prices are a bit higher than many similar establishments, they make up for it with generous portions (rice... Safa Tikka and Kabab House dishes up spicy, flavourful food at deliciously cheap prices. Despite the abundance of restaurants serving Pakistani/Indian cuisine in the area, this restaurant allows for a... Ten-Ichi Japanese is a huge Japanese restaurant in Scarborough offering both all-you-can-eat and a-la-carte menus. The space also features several teppanyaki tables where you can watch a chef prepare your... The Amazing Ted's Diner isn't just '50s-styled, it has actually been around since 1954. Even after recent renovations, the spot preserves its nostalgic charm. The menu features familiar greasy spoon... Yogi's Pizza and Wings is a certified halal pizzeria dealing primarily in take-out. They offer a pork-free pizza experience by substituting pepperoni and bacon with all-beef alternatives. The family owned...
{ "pile_set_name": "Pile-CC" }
p: 1, e: 1}. Give prob of sequence me. 1/14 Three letters picked without replacement from kqkq. What is prob of sequence kqk? 1/6 What is prob of sequence oo when two letters picked without replacement from {o: 4, a: 6, h: 3, k: 1}? 6/91 Calculate prob of sequence ddxg when four letters picked without replacement from {x: 3, r: 4, d: 2, g: 7, w: 1}. 1/1360 Two letters picked without replacement from rrrrrrqrqrrrrrerr. What is prob of sequence re? 7/136 Four letters picked without replacement from juyyxu. Give prob of sequence uujx. 1/180 Four letters picked without replacement from {i: 3, g: 13}. Give prob of sequence iigg. 3/140 Four letters picked without replacement from xppxxruuuxnxxuxnnpur. Give prob of sequence pnpn. 1/3230 Three letters picked without replacement from {z: 1, v: 4, g: 2, y: 3, c: 2, o: 2}. What is prob of sequence oco? 1/546 Four letters picked without replacement from {o: 3, n: 4}. Give prob of sequence nnon. 3/35 Three letters picked without replacement from {t: 1, g: 7, i: 3, c: 5}. What is prob of sequence ccc? 1/56 Calculate prob of sequence pnn when three letters picked without replacement from {b: 2, r: 1, w: 8, p: 1, m: 5, n: 3}. 1/1140 Two letters picked without replacement from {v: 4, x: 3}. Give prob of sequence vv. 2/7 Calculate prob of sequence ejej when four letters picked without replacement from {j: 4, x: 3, e: 7}. 3/143 Two letters picked without replacement from {m: 4, u: 3, n: 1, r: 2}. What is prob of sequence mm? 2/15 What is prob of sequence sssd when four letters picked without replacement from sdvsvsdsssdssss? 6/91 What is prob of sequence jjj when three letters picked without replacement from jjjj? 1 Calculate prob of sequence wwww when four letters picked without replacement from {w: 7}. 1 Calculate prob of sequence aaa when three letters picked without replacement from aaaadad. 2/7 Calculate prob of sequence uu when two letters picked without replacement from {u: 6, o: 1, b: 7, x: 1}. 1/7 Two letters picked without replacement from rvururrrvsrqrzzurrr. What is prob of sequence rr? 5/19 Calculate prob of sequence kr when two letters picked without replacement from {r: 1, k: 3}. 1/4 Calculate prob of sequence gxvm when four letters picked without replacement from ccxxucmcmxugcxvcx. 1/5712 Four letters picked without replacement from tgtggtgmmttmtmt. What is prob of sequence gtgm? 2/195 What is prob of sequence bn when two letters picked without replacement from {n: 4, t: 3, d: 3, b: 6, e: 3}? 4/57 What is prob of sequence rrcc when four letters picked without replacement from {r: 4, c: 2}? 1/15 What is prob of sequence ep when two letters picked without replacement from epepppeffepfpp? 2/13 Calculate prob of sequence vt when two letters picked without replacement from {v: 1, t: 2}. 1/3 Four letters picked without replacement from bbhbhhh. Give prob of sequence hhhb. 3/35 Calculate prob of sequence at when two letters picked without replacement from {a: 1, f: 4, n: 2, l: 2, h: 3, t: 2}. 1/91 Three letters picked without replacement from cpppcc. Give prob of sequence pcp. 3/20 Four letters picked without replacement from hhoooqm. What is prob of sequence qooo? 1/140 Three letters picked without replacement from lglrrqgqg. Give prob of sequence grq. 1/42 Two letters picked without replacement from rfrfrorffn. What is prob of sequence of? 2/45 Four letters picked without replacement from {u: 3, m: 4}. What is prob of sequence uumm? 3/35 Four letters picked without replacement from wfwffywwwf. Give prob of sequence wyyw. 0 Calculate prob of sequence jjjj when four letters picked without replacement from jjjjjj. 1 Four letters picked without replacement from {f: 17, i: 2}. What is prob of sequence ffii? 1/171 Two letters picked without replacement from pawyrgp. What is prob of sequence ry? 1/42 Three letters picked without replacement from {j: 1, e: 2, d: 4, s: 2}. Give prob of sequence dej. 1/63 Two letters picked without replacement from fqqffmffff. Give prob of sequence mq. 1/45 Two letters picked without replacement from {w: 1, k: 1, i: 1, a: 1, r: 2, z: 2}. What is prob of sequence kz? 1/28 What is prob of sequence al when two letters picked without replacement from {a: 3, l: 5}? 15/56 Three letters picked without replacement from {d: 2, p: 2, y: 2}. Give prob of sequence dyy. 1/30 Two letters picked without replacement from {t: 1, c: 1, s: 2, o: 1, i: 1, z: 1}. Give prob of sequence cs. 1/21 Three letters picked without replacement from dllddlll. Give prob of sequence ldl. 5/28 Two letters picked without replacement from {r: 1, b: 2, m: 1, j: 1}. Give prob of sequence mj. 1/20 Four letters picked without replacement from {h: 1, s: 3, d: 1, j: 4, o: 7}. Give prob of sequence ossj. 1/260 Calculate prob of sequence ff when two letters picked without replacement from zzmmff. 1/15 Four letters picked without replacement from gtgtjgt. What is prob of sequence jtgg? 3/140 Calculate prob of sequence fqrr when four letters picked without replacement from huuruqurhfhurhhquh. 1/6120 Calculate prob of sequence mpxm when four letters picked without replacement from {p: 1, m: 2, x: 2}. 1/30 Calculate prob of sequence vvf when three letters picked without replacement from zvvvvfzfvzf. 2/33 Three letters picked without replacement from {a: 11, z: 3}. What is prob of sequence zaa? 55/364 Four letters picked without replacement from {v: 7, q: 4, z: 3}. Give prob of sequence vzvq. 3/143 Two letters picked without replacement from {l: 7, i: 1, o: 2}. Give prob of sequence il. 7/90 Two letters picked without replacement from zyyzy. Give prob of sequence zy. 3/10 Calculate prob of sequence emev when four letters picked without replacement from veem. 1/12 Four letters picked without replacement from meeeeeeeemmeeee. Give prob of sequence mmem. 1/455 Two letters picked without replacement from xxkxxxxkx. What is prob of sequence xk? 7/36 Calculate prob of sequence rxw when three letters picked without replacement from {r: 3, w: 6, p: 3, f: 2, x: 1}. 3/455 Three letters picked without replacement from {n: 3, r: 2, x: 3}. Give prob of sequence nrn. 1/28 Four letters picked without replacement from {t: 6, q: 8, l: 3}. Give prob of sequence tltq. 3/238 What is prob of sequence kmh when three letters picked without replacement from {m: 1, l: 1, h: 2, a: 1, k: 1, b: 2}? 1/168 Three letters picked without replacement from exyyxzxyyixzdzyixyxd. What is prob of sequence idi? 1/1710 Four letters picked without replacement from pppsspsppssspspspspp. What is prob of sequence pppp? 22/323 What is prob of sequence shs when three letters picked without replacement from shshhs? 3/20 What is prob of sequence sa when two letters picked without replacement from {f: 1, y: 1, a: 2, u: 2, s: 1, e: 2}? 1/36 Two letters picked without replacement from {b: 2, p: 6, c: 9}. Give prob of sequence bp. 3/68 What is prob of sequence ii when two letters picked without replacement from dddddididdiiid? 10/91 What is prob of sequence ggbb when four letters picked without replacement from tbbcggtgtztttggtr? 1/1428 Two letters picked without replacement from lqllllll. Give prob of sequence lq. 1/8 Four letters picked without replacement from nkkknnkkkkkkkkknkk. Give prob of sequence kkkk. 1001/3060 Two letters picked without replacement from {z: 13, j: 5}. What is prob of sequence zj? 65/306 What is prob of sequence dsxs when four letters picked without replacement from edxss? 1/60 Four letters picked without replacement from ddxddddyxzdyidi. Give prob of sequence dizi. 2/4095 What is prob of sequence iez when three letters picked without replacement from zeeiz? 1/15 Calculate prob of sequence lwwl when four letters picked without replacement from wwwwlwlwwlwwwwwwlwww. 8/323 What is prob of sequence vv when two letters picked without replacement from vevvffvfefe? 6/55 Two letters picked without replacement from {w: 6, t: 3, r: 3, a: 2, k: 1}. What is prob of sequence wt? 3/35 Calculate prob of sequence tt when two letters picked without replacement from {b: 6, g: 9, t: 2, p: 2}. 1/171 Four letters picked without replacement from ipipu. Give prob of sequence piup. 1/30 Calculate prob of sequence qkqq when four letters picked without replacement from {
{ "pile_set_name": "DM Mathematics" }
Mackenzie Smith All Blog Posts As a tenant you will probably have paid a considerable sum of money as a security deposit, usually equivalent to one and a half times the monthly rent, and you’ll want to make sure this is protected and dealt with fairly. All deposits have to be protected in one of the Government backed schemes. Some… Read More Months of research, deliberation and planning leads up to the purchase of an investment property. But why for many investors does the story end there? Investing in a rental property can take months of research, planning and saving. Consideration of factors, such as the size and location of the property, are invariably contemplated to ensure… Read More To view our current list of available properties, please visit our website. Alternatively, feel free to register your requirements with us so that we may contact you with any relevant listings as and when they come to market. Contact Lettings: (01252) 514000. lettings@mackenziesmith.co.uk … Read More The new year has brought around a real peak in the lettings properties that have come to the market. This can be seen market wide in the area, offering more rental choice than ever before. With renting becoming an increasingly viable choice for many people, the rise in properties available will surely be welcomed, giving… Read More A new report from a London lettings specialist has pinpointed 5 top likes and dislikes Tenants and Landlords have about each other. Needless to say many are not surprising… Top 5 Tenant dislikes: Rent increases Failure to fix problems in a timely manner Showing up at a property unannounced Poor performance of maintenance staff Messy… Read More Figures from the National Housing Federation show that renters have to move frequently; tenants are nine times more likely to have moved in the last 12 months than owner occupiers. Whilst letting a property has the advantage of flexibility for those who want it, 28% of tenants said they have not been able to settle… Read More The Intermediary Mortgage Lenders Association (IMLA) has forecast that 51% of residential homes in the UK will be rented rather than owner occupied by 2032 as house ownership is predicted to get further out of reach for many. To build up the picture of how the rental and owner occupier mix is changing, owner-occupation peaked… Read More People looking to move locally are finding a distinct lack of properties available to either buy or rent! We have always seen a strong demand for good quality properties to rent in our area but the upturn in the economy has seen a huge increase in the demand. It is very frustrating when excellent quality applicants register… Read More We are pleased to be letting property quickly with many happy Landlords and Tenants along the way. We have tenants waiting for a range of property so please contact us if you would like to find out more about our service to Landlords or are looking for a rental valuation on a property. “The service… Read More We are delighted to report that hot on the heels of a bumper month for lettings in February, the rental market in March has been even better with just over 50% of the properties that we let being investment properties. The upturn in the housing market has prompted many people to invest in property but… Read More
{ "pile_set_name": "Pile-CC" }
Proteomic analysis of membrane proteins expressed specifically in pluripotent murine embryonic stem cells. Embryonic stem cells (ESCs) are established from the inner cell mass of preimplantation embryos, are capable of self-renewal, and exhibit pluripotency. Given these unique properties, ESCs are expected to have therapeutic potential in regenerative medicine and as a powerful tool for in vitro differentiation studies of stem cells. Various growth factors and extracellular matrix components regulate the pluripotency and differentiation of ESC progenies. Thus, the cell surface receptors that bind these regulatory factors are crucial for the precise regulation of stem cells. To identify membrane proteins that are involved in the regulation of pluripotent stem cells, the membrane proteins of murine ESCs cultured with or without leukemia inhibitory factor (LIF) were purified and analyzed by quantitative proteomics. 2-D PAGE-based analysis using fluorescently labeled proteins and shotgun-based analysis with isotope-labeled peptides identified 338 proteins, including transmembrane, membrane-binding, and extracellular proteins, which were expressed specifically in pluripotent or differentiated murine ESCs. Functions of the identified proteins revealed cell adhesion molecules, channels, and receptors, which are expected to play important roles in the maintenance of murine ESC pluripotency. Membrane proteins that are expressed in pluripotent ESCs but not in differentiated cells such as Slc16a1 and Bsg could be useful for the selection of the stem cells in vitro.
{ "pile_set_name": "PubMed Abstracts" }
‘What does the kooky libertarian see in the authoritarian Putin regime?’ So asked the Weekly Standard’s Editor-in-Chief Stephen F. Hayes on Tuesday in his op-ed ‘Rand Paul, Russian Stooge’. ‘Senator Rand Paul has been making the rounds in recent days touting deeper US engagement with Vladimir Putin’s Russia. It’s often the case when Senator Paul talks about foreign policy his pronouncements are a curious admixture of odd conspiracy theories, pacifist banalities, and ahistorical analogies—all delivered with the confident condescension of someone who doesn’t have any idea what he’s talking about.’ Hayes’s piece is laden with similar insults, where Paul’s supposedly ‘lonely effort to provide intellectual backing for Donald Trump’s instinctive desire to make nice’ is dismissed as mere ‘foolishness,’ as is the senator’s general more restrained foreign policy worldview. Which is really the subtext to why Hayes is upset — Paul had the nerve to go to Russia emphasising diplomacy in tandem with a Republican president explicitly seeking peace. Trump and Paul believe in talking to foreign adversaries, against the will of virtually the entire Washington foreign policy establishment, most particularly hawks like Hayes. In other words, it’s not exactly the Weekly Standard’s Republican party anymore. For many years, neoconservatives had outsized influence in shaping Republican foreign policy, which typically meant striking an aggressive posture in lieu of diplomacy, or as Sen. Paul has often framed it ‘shoot first, ask questions later.’ The 2003 US invasion of Iraq was the neocons’ philosophy put into disastrous action, where failure to ask the right questions beforehand — by both politicians and the media — led to a war most Americans and people around the world today consider a mistake by any measure. But not the neoconservatives. They still defend it. For them, the only foreign policy mistakes are inaction. Hayes lampoons Paul for believing that most opposed to Trump’s Russian diplomacy want war, citing Paul’s 2014 comment on the Ukraine crisis, ‘Some on our side are so stuck in the Cold War era that they want to tweak Russia all the time and I don’t think that is a good idea.’ But Hayes’s own position on Ukraine reinforces Paul’s position on hawks like him. In 2014, Hayes chided President Obama for not sending American military men and women into that conflict, saying on Fox News (emphasis added), ‘[If] we had said when Russia first invaded Crimea, if we had sent troops, hopefully more than 150, to our NATO allies at that time, it would have suggested that the president was resolute, that he was determined not to let Russia push our allies around.’ Though Hayes mocks Paul’s portrayal of neoconservatives as eager for war, the fact remains that Hayes and his fellow ideological travelers continue to unscrupulously want boots on the ground abroad and support regime change in hotspots like Libya, Syria and Iran, as if the Iraq War never happened. Paul is not imagining this. This is not ‘pacifist banality.’ The common stereotype of neoconservatives as ‘warmongers’ is generally true no matter how you slice it. The Weekly Standard carried so much weight during the George W. Bush administration, that Vice President Dick Cheney said it was the ‘best source of information’ to find out about the relationship between Saddam Hussein and al-Qaeda. But there was one major problem: There was never a relationship between Hussein and al-Qaeda. Still, Cheney said, ‘I think Steve Hayes has done an effective job in his article of laying out a lot of those connections.’ Hayes would write an entire book called The Connection about the supposed ties between Hussein and Osama bin Laden. This theory was made up, based on the discredited Feith memo (described as ‘alternative intelligence’) Hayes used as his source. President Cheney eventually reluctantly admitted there was no connection after originally promoting this theory in gin up support for war with Iraq. Many Americans bought into it though, especially when mouthed by no less an authority than the Vice President. To date, Hayes’s Hussein-bin Laden ‘connection’ is arguably the most damaging conspiracy theory to take root in the history of the US. Perhaps the biggest difference between conspiracy nut Alex Jones and Hayes is that Jones’s baseless musings never helped start a war. If Hayes is looking for ‘kooks’, he might want to look in the mirror. Hayes was allowed to concoct such a fantasy precisely because he, Cheney and others of like-mind were more eager to find reasons for war, than reasons not to go to war, as is the neoconservatives’ eternal proclivity. The Weekly Standard was able to aid the Bush administration with such a fabrication, because neocons were in the foreign policy driver’s seat during that era. Today, they are not, and that’s putting it mildly. The Weekly Standard’s founder, Bill Kristol, is today’s leading ‘Never Trumper.’ Many neoconservatives supported Hillary Clinton during the election, precisely because they thought she would be more hawkish than Trump. President Trump has blasted Bush and calls the Iraq War ‘the single worst decision ever made.’ According to Politico this month, Trump refers to his own neocon advisers like John Bolton as ‘eggheads’, instead opting for foreign policy counsel with the more non-interventionist Sen. Paul regarding US relations with not only Russia but Iran. The relationship between Trump and Paul could potentially have significant ramifications for the future of the Republican Party. ‘There is a wing of the party, represented by Paul and his modest but loyal network, ready to pick up the mantle of a more restrained Republican foreign policy if no Trump-style America First nationalists are ready to do so in the 2020s,’ wrote Spectator USA’s Daniel McCarthy last week. ‘And if Trump-like Republican nationalists are able to institutionalise, or remain a force in politics one way or the other, they will have Paul Republicans by their side to reinforce their aversion to foreign interventionism.’ Hayes and his neoconservative friends once used their White House connections to pursue their agenda, and now their greatest foreign policy rival within the Republican party is doing the same under a very different GOP administration. How successful Paul is in helping course-correct American foreign policy under Donald Trump is anyone’s guess. But figuring out why The Weekly Standard and its editor so harshly targets Rand Paul in this moment is no mystery. Jack Hunter is the former political editor of Rare.us and co-authored the 2011 book The Tea Party Goes to Washington with Senator Rand Paul.
{ "pile_set_name": "OpenWebText2" }
Boeing, Lion Air Group Announce Order for 50 737 MAX 10 Airplanes May 15, 2018, 14:41 PM by Lion Corporate JAKARTA,April 10,2018 — Boeing [NYSE: BA] and the Lion Air Group today announced the airline purchased 50 of Boeing’s new 737 MAX 10 airplane, which will be the most fuel-efficient and profitable single-aisle jet in the aviation industry. The deal, valued at approximately $6.24 billion at list prices, is the largest incremental order to date of the MAX 10 variant. The order was previously listed as unidentified on Boeing’s Orders & Deliveries website. "Lion Air very excited to be a launch customer of the latest version of the 737. This airplane delivers a new level of fuel efficiency and operating economics and fits in perfectly with our fleet of modern airplanes,” said Edward Sirait, President Director, the Lion Air Group. "We are proud to continue our tradition of innovation at Lion Air as we again lead the way with new airplane technology.” The Lion Air Group was first in the world to put the 737 MAX 8 into service and the first to order the 737 MAX 9. Last month, the group became the first to take delivery of a 737 MAX 9, using the airplane’s added capacity to launch several international routes. “We are honored that Lion Air Group, one of the most innovative and fast-growing carriers, has once again placed its trust in the 737 family,” said Dinesh Keskar, senior vice president, Asia Pacific & India Sales, Boeing Commercial Airplanes. “With the 737 MAX 10, Lion Air will have a range of efficient and reliable options to optimize their network to serve their customers and grow profitably.” The 737 MAX is a family of airplanes that offer about 130 to 230 seats with the ability to fly up to 3,850 nautical miles (7,130 kilometers). These jets incorporate the latest CFM International LEAP-1B engines, Advanced Technology winglets, the Boeing Sky Interior, large flight deck displays and other features to deliver the highest efficiency, reliability and passenger comfort in the single-aisle market. The 737 MAX 10 is the largest variant in the family. At 43.8 m (143 ft 8 in) long, the airplane can seat a maximum of 230 passengers and offer airlines the lowest seat-mile cost ever in a single-aisle aircraft. The 737 MAX is the fastest-selling airplane in Boeing history, accumulating more than 4,400 orders from 96 customers worldwide.
{ "pile_set_name": "Pile-CC" }
Q: Two-level hierarchical model using time-series cross sectional data? A question from someone who is fairly new to hierarchical modeling, and I'm looking for the best approach within R, preferably with the package lme4, MCMCpack, or rjags using a BUGS document. I'm unsure of the best approach, so I would like some guidance. I'm interested in creating a two-level hierarchical model with data that is cross-sectional, time series, and at the individual level merged with data from the group level. Let me explain the two datasets that were merged: The group level dataset shows the number of police on duty within 100 different counties. This data was collected 10 different times, so there are 10 sets of 100 counties. I merged this group level county data with individual level demographic and crime data (merged by county of the individual). The individual-level data also has an indicator (1 or 0) for each individual on whether or not they reported a crime during that period. This individual level data was also collected at 10 points in time -- so it matches up with the group level data -- but it is cross-section, not panel data (different people each period). This is my dependent variable, so I'm looking for a logit or probit approach. Basically, I would like to create a hierarchical model with two levels: county and time, where the period variable (1-10) is nested within the counties (1-100). This seems fairly straight forward -- a two level nested model -- but my approaches up to this point have failed. Based on a book (Gelman and Hill) recommended by a colleague, I feel like I have the understanding to program the basic hierarchical models in BUGS and lme4, but the book does not go into detail on the more complicated models like nested over time, and other references have not been useful. Below is a truncated sample of what my data looks like in R. Any advice, recommendations on packages to use, and sample code for modelling is much appreciated! counties <- c(1,1,1,1,1,1,1,1,1,2,2,2,2,2,2,2,2,2,3,3,3,3,3,3,3,3,3) #only 3 counties for explanation purposes police <- c(1,22,4,56,3,32,12,8,43,5,45,34,33,21,62,22,3,12,19,29,11,8,32,33,18,12,12) #number of police per county personID <- seq(1,27) # only 27 people for explanation purposes period <- c(1,1,1,2,2,2,3,3,3,1,1,1,2,2,2,3,3,3,1,1,1,2,2,2,3,3,3) #only 3 periods for explanation purposes age <- c(45,55,23,67,21,34,39,48,52,45,32,71,55,56,19,34,48,56,77,33,22,21,44,64,51,55,60) #an individual level predictor not in the hierarchy crime <- c(1,1,0,0,1,1,0,0,1,0,0,1,1,0,1,0,0,1,1,0,0,0,0,1,0,1,0) #Dependent Var: Did individual report a crime? Yes/No sample <- matrix(c(personID, period, age, crime, counties, police), nrow=27, ncol=6) colnames(sample) <- c("personID", "period", "age", "crime", "counties", "police") > sample personID period age crime counties police [1,] 1 1 45 1 1 1 [2,] 2 1 55 1 1 22 [3,] 3 1 23 0 1 4 [4,] 4 2 67 0 1 56 [5,] 5 2 21 1 1 3 [6,] 6 2 34 1 1 32 [7,] 7 3 39 0 1 12 [8,] 8 3 48 0 1 8 [9,] 9 3 52 1 1 43 [10,] 10 1 45 0 2 5 [11,] 11 1 32 0 2 45 [12,] 12 1 71 1 2 34 [13,] 13 2 55 1 2 33 [14,] 14 2 56 0 2 21 [15,] 15 2 19 1 2 62 [16,] 16 3 34 0 2 22 [17,] 17 3 48 0 2 3 [18,] 18 3 56 1 2 12 [19,] 19 1 77 1 3 19 [20,] 20 1 33 0 3 29 [21,] 21 1 22 0 3 11 [22,] 22 2 21 0 3 8 [23,] 23 2 44 0 3 32 [24,] 24 2 64 1 3 33 [25,] 25 3 51 0 3 18 [26,] 26 3 55 1 3 12 [27,] 27 3 60 0 3 12 A: I'm not 100% sure, so check carefully, and you'll probably want to put priors on the variances instead of the 1.0E-12, but maybe something like this? model { for( i in 1 : nData ) { crime[i] ~ dbern( mu[i] ) logit(mu[i]) <- base + b0[counties[i], period[i]] + b1[counties[i], period[i]] * police[i] } base ~ dnorm( 0 , 1.0E-12) for (j in 1 : nCounties){ for (k in 1 : nPeriod) { b0[j, k] ~ dnorm(b0h[j], 1.0E-12) b1[j, k] ~ dnorm(b1h[j], 1.0E-12) } } for ( j in 1 : nCounties ) { b0h[j] ~ dnorm( 0 , 1.0E-12 ) b1h[j] ~ dnorm( 0 , 1.0E-12 ) } }
{ "pile_set_name": "StackExchange" }
Heath Town Heath Town is a district of Wolverhampton, West Midlands, England, located east of the city centre. It is also a ward of Wolverhampton City Council. The ward forms part of the Wolverhampton North East constituency. Heath Town ward borders the wards of Bushbury South and Low Hill, Fallings Park, Wednesfield North, Wednesfield South, East Park and St Peter's. As well as Heath Town, the ward covers parts of Park Village, Springfield, Horseley Fields and Wednesfield. It is home to New Cross Hospital (the city's main Hospital), Wolverhampton Railway station, Heath Park Secondary school and a Royal Mail distribution centre. History The railways reached Wolverhampton in 1837, with the first station located at Wednesfield Heath, later known as Heath Town, on the Grand Junction Railway. This station was demolished in 1965. In 1850 the Holy Trinity Church and almshouses were built, as part of the expansion of Heath Town and in 1888 the separate Wednesfield and Heath Town urban district councils were created. The Heath Town Urban District was later abolished in 1927 to become part of Wolverhampton.) In the late 19th century, many terraced houses were built next to the factories near the main road to Lichfield. In the 1960s many of these were demolished, they were replaced with a new estate designed by Wolverhampton Borough architects. The new Heath Town estate was officially opened in April 1969 by Princess Margaret. The former street plan was defined by the line of the Wolverhampton Road and Lincoln, Inkerman and Grove streets have kept their original names. New Cross Hospital is built on the site of the former New Cross Workhouse. The design of the new buildings came about through a competition and the winning entry was from Arthur Marshall of Nottingham. The foundation stone was laid in September 1900 by Chairman of the Guardians, Mr Price, and the workhouse was formally opened on 24 September 1903. The workhouse could take up to 1,246 inmates, 20 nurses, and 60 other officers. The buildings occupied an area of six acres, and the total cost was £156,879. After 1930, control of the workhouse site passed to the Wolverhampton Public Assistance Committee and it became New Cross Hospital. Many of the old workhouse blocks have now been replaced by modern buildings. In the 1900s the Chubb Lock and Safe Company was a major employer in Heath Town. In 1908 the Chubb safe works was opened on Wednesfield Road and workers were transferred from the London safe works which had closed. In 1938 Chubb & Son's Lock & Safe Co Ltd premises were expanded and workers were moved from the premises in Railway Street. Chubb remained an important industry in Heath Town until 2000 when it was sold to Assa Abloy, a Swedish lock maker and Gunnebo, another Swedish security company. The Wednesfield Road safe works were closed and much of the site was sold off for housing. Demographics White British residents are still the largest ethnic group in Heath Town. However, it has a large percentage of Asian and Afro-Caribbean residents who migrated to England during the 1950s and 1960s and originally settled in the Victorian terraces before relocating to the modern council flats. In more recent years, the area has become a popular destination for Eastern European and African immigrants. The 2011 census states the population as 13,965 made up of approximately 48% females and 52% males with an average age of 34. 70.0% of people living in Heath Town were born in England. 5.0% India, 3.1% Jamaica, 1.7% Zimbabwe, 1.6% Philippines, 0.9% Somalia, 0.7% Nigeria, 0.6% Ireland, 0.5% China, 0.5% Pakistan. The 2011 census shows the ethnic mix of Heath Town ward as predominantly white: 48.66% white British 16.4% black 16.1% Asian 8% mixed 7% white other 0.8% Chinese. 80.7% of people living in Heath Town ward speak English. The other top languages spoken are 3.5% Punjabi, 2.1% Polish, 1.9% Kurdish, 1.2% Lithuanian, 1.0% Tagalog/Filipino, 0.7% Persian, 0.7% Somali, 0.7% Arabic, 0.6% Greek. The rich diversity of culture in the area is celebrated each August with an international fun day event on Heath Town Park. Religion The religious make up of Heath Town is 52.9% Christian, 21.2% no religion, 7.4% Muslim, 6.4% Sikh, 2.8% Hindu, 0.5% Buddhist, 0.1% agnostic. Churches and temples in the area are: Guru Nanak Satasang Sikh Temple, Cannock Road Holy Trinity Church, Bushbury Road New Testament Church of God, Wednesfield Road St Patrick’s Catholic Church, Wolverhampton Road St Stephen’s Church, Hilton Street Places of interest Heath Town Park Heath Town Park is a neighbourhood park that serves the local community. The site is a public memorial to the men of Heath Town who gave their lives in the Great War. The park is surrounded on three sides by residential properties with a main road running along the fourth. The main entrance to the park is from Church Street which is accessed from the residential area. The park is compact but has many facilities including two football pitches, play area, fitness trail, multi-use games area, wooded area, open space and seating. There is also a WW1 War Memorial said to be the oldest in Wolverhampton. The park is well used by the local community and since 2012 has been protected by Fields in Trust as part of the Queen Elizabeth II Fields Challenge. This was a project to safeguard the future of parks and green spaces as public recreation land for future generations to enjoy and provide a permanent legacy of the Diamond Jubilee and the Olympics. Heath Town Baths Heath Town public baths were designed by H. B. Robinson, Borough Surveyor and Engineer. They were opened on 16 December 1932, by Alderman F. A. Willcock, chair of Wolverhampton Borough Council's Parks and Baths Committee. The Main Swimming Bath was 75 feet long by 34 feet wide. The Children's Swimming Bath was 40 feet long by 25 feet wide-ranging from a depth from three feet to three feet three inches deep. The building also included Wolverhampton's first large public washhouse which housed four rotary washing machines, twenty one drying horses, three electrically operated hydro-extractors, fifteen washing stalls for hand washing, drying houses and irons. The building also housed Heath Town's public library. The baths eventually closed in 2002, and the library closed on 3 November 2006. Heath Town Baths is a grade II listed building and has both architectural and social-historical importance locally and architectural significance nationally. Since 2006 it has since fallen into substantial disrepair. The building sits at the heart of Heath Town and its preservation and bringing back into use is stated to be a high priority in the Neighbourhood Plan. The Tessa Sanderson Foundation and Academy supports the campaign to bring the baths back into use. Heath Town Swimming Club which won several international competitions in the 1940s-1950s was based at the baths. Grand Station / Wolverhampton Low Level Railway Station Grand Station is a Grade II listed building used as a venue for Weddings, Banquets & Conferences. but was originally the Wolverhampton Low Level Station. The station opened 1854 and closed in 1981 but the buildings were listed in 1986. Almshouses A terrace of six, grade II listed, 19th century almshouses is located in the graveyard of Holy Trinity Church. They were built in 1850 by the benevolent industrialist Henry Rogers. After a period of dereliction, the houses were restored in 1996 to one bedroom houses for elderly people. Victoria Hall Victoria Hall is a block of student accommodation with four tower blocks in the Springfield area of Heath Town. The tallest block is 25 stories and is the tallest modular building in Europe. Housing The area is mainly residential fronting on Wednesfield Road and in the centre of the estate itself. One of the last estates of tower blocks to be built in the area, it incorporated a number of features – a district heating scheme and deck level access. The estate's tower blocks were for a long time the city’s tallest residential structures and are visible landmarks from some distance. The blocks of flats are divided by grassed areas, the largest of which is in the south-central part of the development and designed for recreational use. The estate includes a variety of other housing types—including two-storey houses and low-rise maisonettes. Green space has been incorporated into the areas between blocks of flats and mature trees are visible along the southern edge of the estate. There is an extensive housing development off the Wednesfield Road on the former site of the Chubb Works which was part of the new century's Wolverhampton regeneration plan. The 2011 census shows housing types as: 47% purpose built flats 24% semi-detached houses 22% terraced houses 6% detached 1% converted or shared house 1% flats/apartments in commercial buildings. Education Primary Schools in Heath Town are: Stephen's Church of England Primary School Woden Primary School Trinity Church of England Primary School The Secondary school is the highly rated Heath Park. Sport Heath Town Swimming Club was originally based at Heath Town Baths but now meets at the nearby Wolverhampton Swimming and Fitness Centre. Heath Town is home to Heath Town United Football Club. Transport Roads Heath Town straddles the A4124 Wolverhampton-Wednesfield Road, which runs westwards to Wolverhampton and eastwards to Bloxwich and eventually Brownhills It is bounded by railway lines to the north-east and south (the latter disused). Wolverhampton Railway Station is located in Heath Town. Railway Wolverhampton station originally opened on 1 July 1852 by the Birmingham, Wolverhampton and Stour Valley Railway, a subsidiary of the London and North Western Railway (LNWR); it was named Wolverhampton Queen Street. It was known as Wolverhampton High Level from 1 June 1885. From 1923, it was operated by the London Midland and Scottish Railway (LMS), and in 1948 the station became part of the London Midland Region of British Railways. The present Wolverhampton station dates from 1965, when the High Level station was completely rebuilt as part of the modernisation programme which saw the West Coast Main Line electrified. The former Heath Town railway station, on the line from High Level to Wednesfield station, was just off Grove Street. Built by the Wolverhampton and Walsall Railway in 1872, and was operated by the Midland Railway from 1876, it closed in 1910. Wolverhampton Low Level Station was opened 1854 by the Oxford, Worcester and Wolverhampton Railway later to fall under the auspices of the Great Western Railway. It was closed to passengers in 1972, but continued to function as a parcels depot until 1981. Once an important stop on the London-Birkenhead line and linked with Snow Hill station in Birmingham. However, the station buildings were listed in 1986. The building has since been redeveloped as a venue for weddings, banquets & conferences. Buses Public transport is coordinated by Network West Midlands. Services run from the town centre to Heath Town and on to New Cross, Bentley Bridge and then to Cannock or Walsall. Canal The Wyrley and Essington Canal passes through Heath Town. The canal runs from Wolverhampton via Wednesfield towards the coalfields at Essington and Great Wyrley, Bloxwich, Pelsall and Chasewater. Future Plans Heath Town Master Plan In 2013 the Heath Town Master Plan was unveiled setting out plans to increase the provision of housing by up to 550, improve community facilities and enhance landscaping. Heath Town Neighbourhood Plan Heathfield Park Neighbourhood Plan received a resounding yes vote on 17 July 2014 and will be taken to Wolverhampton City Council in September 2014 for adoption. The Plan will help to shape all future planning applications for the Springfield, New Park Village, Heath Town and New Cross areas of Heath Town. The Plan identifies six key themes for improving and sustaining the area which focus on identity and image, housing and environment, employment and skills, assets and buildings, transport and traffic and healthy living. This is one of Wolverhampton's first neighbourhood plans (with Tettenhall) and puts Wolverhampton at the forefront of neighbourhood planning nationally. Wolverhampton is the first metropolitan area to hold a neighbourhood plan referendum and the first anywhere to hold a referendum with more than one area taking part. The plan was created by residents from Heathfield Park via their local neighbourhood partnerships, with support from the council's planning, housing and neighbourhood services teams. In March 2015, Wolverhampton Council announced that the maisonettes in Chervil Rise would be demolished as part of the regeneration, resulting 34 tenants having to leave the estate. Famous Residents Tom Barrett (1891–1924) - riding mechanic, born and buried in Heath Town. Goldie (born 1965) - electronic music artist, disc jockey, visual artist and actor, member of the breakdance crew Westside, based in Heath Town. Don Howe (born 1935) - English football player, turned coach and manager, born in Springfield. Brian Pendleton (1944-2001) - musician born in Heath Town. Alan Marshall - New Zealand-born writer lived in Heath Town for three years in the 1990s during his undergraduate study at Wolverhampton University. References External links Holy Trinity Church Hope Community Project Heathfield Park LNP Category:Areas of Wolverhampton Category:Wards of Wolverhampton City Council
{ "pile_set_name": "Wikipedia (en)" }
Introduction {#Sec1} ============ Cell replacement therapy offers hope for the treatment of late-stage retinal degeneration, when the outer retinal photoreceptor layer is lost^[@CR1]--[@CR3]^. However, a remaining obstacle of photoreceptor replacement is that transplanted cells have to develop into functional photoreceptors with light sensitive outer segments (OS). Indeed, in mouse models of severe degeneration, the formation of light-sensitive OS by transplanted photoreceptors has been difficult to achieve^[@CR4]--[@CR6]^. Recent studies, using retinal sheet transplantation lead to major improvements in terms of OS formation and light sensitivity^[@CR7],[@CR8]^. Despite these promising results, a major problem has not yet been solved: photoreceptors need tight interaction with the retinal pigment epithelium (RPE) in order to maintain their structure and function via continuous disc shedding and renewal^[@CR9]^. Since in retinal degenerative diseases the RPE is often also compromised^[@CR9],[@CR10]^, the probability that transplanted photoreceptors stay sensitive to light is very low^[@CR11],[@CR12]^. To tackle this problem, we introduce optogenetic light sensors into photoreceptors, derived from the developing mouse retina as well as from human induced pluripotent stem cells (hiPSCs), and transplant them into mouse models of severe retinal degeneration. The key point of our approach is that these optogenetically-transformed photoreceptors stay functional based on the activity of the microbial opsin, even in the absence of properly formed OS and without the support from the RPE. Results {#Sec2} ======= Neonatal mouse-derived NpHR photoreceptor precursors {#Sec3} ---------------------------------------------------- For optogenetic transformation of mouse photoreceptors, eyes of newborn wild-type mice at post-natal day (P) 2 were injected with an adeno-associated viral (AAV) vector encoding enhanced *Natronomonas pharaonis* halorhodopsin eNpHR2.0 (NpHR)^[@CR13]^ under the control of the rhodopsin promoter (AAV-Rho-NpHR-YFP) (Fig. [1a](#Fig1){ref-type="fig"} and Supplementary Fig. [1](#MOESM1){ref-type="media"}). At P4, photoreceptor precursors were sorted by magnetic activated cell sorting (MACS) using the photoreceptor specific cell surface marker CD73^[@CR14],[@CR15]^. The harvested cells were transplanted via sub-retinal injections into two blind mouse models of late-stage retinal degeneration (*Cpfl1/Rho*^−/−^ mice^[@CR16]^ aged 9 to 18 weeks and *C3H rd/rd* (rd1*)* mice^[@CR17]^ aged 4 to 11 weeks; see Supplementary Table [1](#MOESM1){ref-type="media"} for a complete overview of mouse ages). At these ages, the vast majority of outer nuclear layer (ONL) cells were lost in host mice (Fig. [1b, e](#Fig1){ref-type="fig"}). *Cpfl1/Rho*^−/−^ mice are left with 2--3 rows of photoreceptors at the age of 9 weeks, and a single row of photoreceptors by 10--12 weeks of age. These mice are born with non-functional rods and cones^[@CR16]^. Rd1 mice loose photoreceptor OS and only a single row of cone cell bodies in the ONL remains by 3 weeks after birth^[@CR18]^. Four weeks after transplantation, we investigated the morphology of the transplanted donor cells and their ability to integrate into the host retina. In both mouse models, we found NpHR-positive donor cells in close contact to cell bodies of rod bipolar cells, but none of the transplanted cells displayed correctly formed OS (Fig. [1c, d, f, g](#Fig1){ref-type="fig"}). Transplanted cells expressed the synaptic marker Synaptophysin (Supplementary Fig. [2](#MOESM1){ref-type="media"}) suggesting synapse formation between donor photoreceptors and the downstream neurons. We quantified the number of YFP^+^ cells in the subretinal space transplanted with donor-derived NpHR-expressing rod precursors and found substantial numbers of cells to survive at four weeks post transplantation (Supplementary Fig. [3](#MOESM1){ref-type="media"}). Next, we assessed potential material transfer between transplanted cells and remaining photoreceptors by fluorescence in situ hybridization with Y chromosome-specific probe (Y chromosome FISH). NpHR-expressing rod precursors derived from male P4 mice were injected into female *Cpfl1/Rho*^−/−^ mice at 9 weeks of age, and imaged after 4 weeks using structured illumination microscopy (Fig. [1h](#Fig1){ref-type="fig"}). Y chromosome^+^/YPF^+^ cells (transplanted donor cells) and Y chromosome^−^/YFP^+^ cells (endogenous photoreceptor that underwent material transfer) were quantified. 90% of YFP^+^ cells co-stained with Y chromosome probe, leaving only very few cells exclusively YFP^+^. This could either be due to an artifact or very rare events of cytoplasmic exchange among donor and host photoreceptors (Fig. [1h, i](#Fig1){ref-type="fig"}). We then tested if we can elicit light responses from these NpHR-positive donor cells in the absence of functional OS. Two-photon targeted patch-clamp recordings revealed robust responses to orange light pulses (580 nm, 10^16^ photons cm^−2^s^−1^) (Fig. [2b](#Fig2){ref-type="fig"} and Supplementary Fig. [4](#MOESM1){ref-type="media"}). There were no measurable light-evoked currents in transplanted photoreceptors expressing GFP only, which is consistent with the finding that the transplanted cells lacked their light sensitive OS. Stimulation at different wavelengths showed a spectral sensitivity matching the action spectrum of NpHR (Fig. [2b](#Fig2){ref-type="fig"}). To measure the temporal properties of NpHR-positive photoreceptors, we recorded photocurrents using light pulses at increasing frequencies, and we observed that they could follow up to 25 Hz (Fig. [2c](#Fig2){ref-type="fig"} and Supplementary Fig. [4](#MOESM1){ref-type="media"}). Although, frequencies above 10 Hz are filtered out by the bipolar cells, the ability of optogenetically engineered photoreceptors to respond to light in a faster than natural pace implies that retinal ganglion cells (RGCs) receiving signal from these cells should follow high-frequency stimulation in a similar manner to normal retina^[@CR19]^. The rise constants were significantly faster compared to photocurrents of wild-type mice (Fig. [2d](#Fig2){ref-type="fig"}). Both, from the spectral (peak current at 580 nm) and the temporal (Tau~ON~ \< 10 ms) response properties we concluded that the photocurrents were driven by the introduced NpHR (Fig. [2a--d](#Fig2){ref-type="fig"} and Supplementary Fig. [4](#MOESM1){ref-type="media"}).Fig. 1Transplanted photoreceptor precursors, expressing NpHR, integrate into the retina of blind mice. **a** Eyes of wild-type mice at P2 were injected with AAV-Rho-NpHR-YFP. Two days later, retinas were dissected and photoreceptor precursors sorted out. These cells were transplanted via sub-retinal injections into blind mice. **b**--**g** Immunofluorescence analysis on vertical sections of *Cpfl1/Rho*^−/−^ (**b**--**d**) and rd1 (**e**--**g**) retinas. **b** Age-matched non-transplanted *Cpfl1/Rho*^−/−^ retina. **c**, **d** *Cpfl1/Rho*^−/−^ retina transplanted with NpHR-photoreceptors showing NpHR-YFP^+^ cells (stained with anti-GFP antibody, green) located on top of host PKCα bipolar cells (red). **e** Age-matched non-transplanted rd1 retina. **f**, **g** Rd1 retina transplanted with NpHR-photoreceptors. **h**, **i** Y chromosome FISH. **h** A retinal section showing Y chromosome labelling (magenta) and immunohistochemistry staining for GFP (green) with DAPI counterstaining (white) 4 weeks after transplantation of NpHR-expressing rods from male donors into a female *Cpfl1/Rho*^−/−^ mouse (P60 at the time of transplantation). **i** Quantification of NpHR-expressing cells containing Y chromosome from five individual experimental retinas (*N* = 5). The vast majority of NpHR-YFP^+^ cells (stained with anti-GFP antibody) also contained a Y chromosome (90.9 ± 1.2%), proving that they originate from donor mice Values are mean ± SEM with corresponding data points overlaid. Error bars are SEM. Source data are provided as a Source Data file. Scale bars are 25 μm. SRS---subretinal space, OPL---outer plexiform layer, INL---inner nuclear layer, GCL---ganglion cell layer, P---postnatal dayFig. 2Transplanted NpHR-expressing photoreceptor precursors respond to light. Light response characteristics from cells recorded by whole-cell patch-clamp technique in treated *Cpfl1/Rho*^−/−^ mice. The resting membrane potential (RMP) of transplanted photoreceptors in the dark (at 0 current) for the recordings presented in the figure was −36 ± 1.5 mV. **a** Left, light-evoked responses of NpHR- photoreceptors stimulated with two consecutive flashes (top, current response; bottom, voltage response), absence of the response in GFP only expressing photoreceptor shown in grey. Right, comparison of response amplitudes. Mean photocurrent peak (top) and mean peak voltage response (bottom). Mean values observed in wild-type rods and cones are indicated with a dashed line^[@CR58]^. **b** Representative action spectrum from a NpHR photoreceptor stimulated at different wavelengths. Top, stimuli ranging from 400 nm to 650 nm, separated by 25 nm steps. Maximal voltage responses were obtained at 575 nm (denoted with an orange star). Bottom, continuous 'rainbow' stimulation between 350 and 680 nm. **c** Temporal properties: Modulation of NpHR-induced voltage responses at increasing stimulation frequencies from 2 to 25 Hz. **d** Comparison of rise time constants in the two models and in wild-type cones. In all panels: Light stimulations were performed at 8.7 × 10^16^ photons cm^−2^ s^−1^ and 590 nm, if not stated otherwise. The timing and duration of stimulation is depicted with underlying orange lines (for 590 nm stimuli; **a**, **c**) or with a black line with associated wavelengths noted below (**b**). *n* = number of cells. Values are mean ± SEM with corresponding data points overlaid. Error bars are SEM. Source data are provided as a Source Data file (for **a**, **d** and RMP) Connectivity and signal transmission to host neurons {#Sec4} ---------------------------------------------------- Next, we investigated if the signals from transplanted photoreceptors are transmitted to RGCs, the output neurons of the retina. By using extracellular spike recordings, we measured ON- and OFF-light responses in RGCs. These results demonstrate that NpHR-induced signals are transmitted to the retinal output neurons via ON- and OFF-pathways suggesting that the transplanted photoreceptors can form functional synaptic connections with the inner retinal neurons (Fig. [3a](#Fig3){ref-type="fig"} and Supplementary Fig. [5](#MOESM1){ref-type="media"}), which was supported by histological analysis (Supplementary Fig. [2](#MOESM1){ref-type="media"}). Recordings performed under pharmacological block of photoreceptor input to ON-bipolar cells (50 µM L-AP4) showed complete abolition of ON light responses, which recovered after 20 min of L-AP4-washout. These control experiments confirmed that light-induced signals were indeed transmitted via photoreceptor-to-bipolar cell synapses (Fig. [3b, c](#Fig3){ref-type="fig"}). By stimulating treated retinas at different wavelengths we determined the spectral sensitivity of the light responses, which peaked at 580--600 nm, reflecting the action spectrum of NpHR (Fig. [3d, e](#Fig3){ref-type="fig"}). To assess the light intensities required to trigger spike responses, we used light pulses (580 nm) at different intensities. Importantly, the intensities required to evoke light responses were well below the safety limit for optical radiation in the human eye^[@CR20],[@CR21]^ (Fig. [3f, g](#Fig3){ref-type="fig"} and Supplementary Fig. [5](#MOESM1){ref-type="media"}). We did not observe measurable light responses in retinae from age-matched control-mice, where photoreceptor precursors expressing only GFP were transplanted (Fig. [3h, i](#Fig3){ref-type="fig"} and Supplementary Fig. [5](#MOESM1){ref-type="media"}). Lastly, to test whether the behaviour of treated mice could be modulated by light, we used the light/dark box test^[@CR22]^ employing high intensity orange light (Fig. [3j](#Fig3){ref-type="fig"}). Treated *Cpfl1/Rho*^−/−^ mice displayed robust light avoidance behaviour (40.7 ± 3.5% of time in the illuminated compartment), compared to non-injected (59.8 ± 2.2%) mice and mice transplanted with photoreceptor precursors expressing GFP (56.6 ± 4.5%) (Fig. [3k](#Fig3){ref-type="fig"}).Fig. 3NpHR-triggered responses are transmitted to RGCs and induce light avoidance behaviour. **a**--**i** Averaged spike responses obtained from multi-electrode array (MEA) recordings shown as PSTH and raster plots recorded in transplanted *Cpfl1/Rho*^−/−^ mice (stimulation: 580 nm, 7 × 10^16^ photons cm^−2^ s^−1^). **a** Representative traces from three RGCs responding either with an ON-, OFF-, or ON/OFF-response pattern. **b** Representative traces from a cell before, during ON bipolar cell blockade, and after wash-out, and **c** quantification of maximum firing rates for these conditions. **d** Representative responses to wavelengths ranging from 450 nm to 650 nm. **e** Quantification of RGC action spectrum (shown for OFF responses). The cells reach their peak firing rate at 580 nm (ON responses, data not shown) and 600 nm (OFF responses). **f** PSTHs of a single RGC responding to stimuli of increasing intensities (from 7 × 10^14^ to 7 × 10^16^ photons cm^−2^ s^−1^). **g** Intensity curve. The dashed line indicates the maximum light intensity allowed in the human eye at 590 nm^[@CR20],\ [@CR21]^. **h** Unresponsive cell from a control retina transplanted with GFP only-expressing photoreceptors. **i** Maximum firing rate in mice treated with GFP only photoreceptors versus mice treated with NpHR-photoreceptors (shown for ON responses). **j** Schematic representation of the dark/light box test. **k** Percentage of time spent in the light compartment for: non-treated *Cpfl1/Rho*^−/−^ mice, *Cpfl1/Rho*^−/−^ mice treated with GFP only photoreceptors, and *Cpfl1/Rho*^−/−^ mice treated with NpHR-photoreceptors (illumination: 590 nm, 2.11 × 10^15^ photons cm^−2^ s^−1^). In all panels: The timing and duration of stimulation is depicted with underlying orange lines (for 580 nm stimuli; **a**, **b**, **f**, **h**) or with a black line with associated wavelengths noted below (**d**). *N* = number of retinas, *n* = number of cells. Values are mean ± SEM. Corresponding data points are overlaid in (**k**). Error bars are SEM. Statistical significance assessed using Mann--Whitney Student's test (\*\**p* \< 0.01; \*\*\*\**p* \< 0.0001; ns---not significant). Source data are provided as a Source Data file (for **c**, **e**, **g**, **i**, **k**) Generation of hiPSC-derived Jaws-expressing photoreceptors {#Sec5} ---------------------------------------------------------- To evaluate the translatability of our approach to human subjects, we asked if it is possible to replace the mouse donor cells with optogenetically-transformed hiPSCs (Fig. [4a](#Fig4){ref-type="fig"}). To do so, we first optimized a previous protocol of differentiation based on the self-generation of 3D neural-retina-like structures^[@CR23]^. Using this system, we generated cone-enriched retinal organoids, expressing the pan-photoreceptor markers Cone Rod Homeobox (CRX) and recoverin (RCVRN) alongside the cone-specific marker cone arrestin (CAR) (Fig. [4b--f](#Fig4){ref-type="fig"} and Supplementary Fig. [6](#MOESM1){ref-type="media"}). Contrary to nocturnal rodents, cone photoreceptors are responsible for high acuity daylight vision in humans, and are therefore the preferred choice for transplantation. To render these immature cones light sensitive, we used the hyperpolarizing chloride pump Jaws, a red-shifted cruxhalorhodopsin, Jaws, derived from *Haloarcula (Halobacterium) salinarum* and engineered to result in red light--induced photocurrents three times those of earlier silencers^[@CR24]^. Jaws was chosen for iPSC experiments based on its enhanced expression level and improved membrane trafficking in human tissue, compared to NpHR^[@CR24]--[@CR26]^. By using an AAV vector, encoding Jaws-GFP under the control of CAR promoter, we delivered the microbial opsin to the hiPSC-derived cone photoreceptors (Fig. [4g, h](#Fig4){ref-type="fig"}). Single cell recordings from optogenetically transformed cones in retinal organoids revealed solid light responses, matching the response properties of Jaws, while recordings from hiPSC-derived cones, expressing GFP only, showed no light responses (Fig. [4i--l](#Fig4){ref-type="fig"}). Additionally, monolayer cultures of these human cones expressing Jaws, maintained their ability to strongly respond to light after dissociation of the retinal organoids (Supplementary Fig. [7](#MOESM1){ref-type="media"}). These results collectively demonstrate the possibility to induce robust optogenetic light responses in photoreceptors derived from hiPSCs in the absence of light sensitive OS.Fig. 4Jaws-expressing photoreceptors, derived from hiPSCs, are sensitive to light. **a** Human iPSCs were differentiated towards retinal organoids and were infected with AAV-mCar-Jaws-GFP. After further maturation, cells were dissociated and iPSC-derived photoreceptors were transplanted into blind mice. **b** Schematic diagram of the differentiation and viral transformation of retinal organoids. **c** Bright-field image of a retinal organoid at D30 of differentiation. **d**, **e** Characterization of a representative retinal organoid at D70, depicting a thick layer of photoreceptors immunoreactive for CRX (green) and CAR (red). **f** Real-time qRT-PCR analysis of photoreceptor specific markers *CAR (ARR3)* and *RCVRN*. N = number of biological replicates, *n* = number of organoids. Values are mean ± SEM. Error bars are SEM. Statistical significance assessed using Mann--Whitney Student's test (\*\**p* \< 0,01; \*\*\**p* \< 0,001). Source data are provided as a Source Data file. **g** Live GFP fluorescence observed at D54 (12 days post infection). **h** A single cone photoreceptor stained with GFP (green) and CAR (red) at D70. **i** Bright field/epifluorescence image of a GFP^+^ cell patched inside a retinal organoid at D70 of differentiation. Scale bars are 100 μm (**c**, **d**, **g**, **i**) and 25 μm (**e**, **h**). **j**--**l** Patch-clamp data from Jaws-cones within organoids. The resting membrane potential (RMP) of Jaws-expressing photoreceptors in the dark (at 0 current) for the recordings presented in the figure was -41,7 ± 3,9 mV. Source data are provided as a Source Data file. Stimulation at 590 nm if not stated otherwise. **j** Photocurrent responses after stimulation with two consecutive flashes at 3.5 × 10^17^ photons cm^−2^ s^−1^, absence of response in GFP only expressing cones is shown in grey. **k** Photocurrent action spectrum corresponding to a Jaws-cone stimulated at wavelengths ranging from 400 to 650 nm. Maximal responses were obtained at 575 nm (at 8.7 × 10^16^ photons cm^−2^ s^−1^). **l** Modulation of Jaws-induced voltage responses at increasing stimulation frequencies from 2 to 30 Hz. The timing and duration of stimulation is depicted with underlying orange lines (for 590 nm stimuli; **j**, **l**) or with a black line with associated wavelengths noted below (**k**) Transplantation of hiPSC-derived Jaws-expressing PRs {#Sec6} ---------------------------------------------------- In order to transplant Jaws-positive photoreceptors, we dissociated the retinal organoids and injected the cell suspension subretinally into the blind hosts (*Cpfl1/Rho*^−/−^, age 10 to 15 weeks; rd1, age 4 to 5 weeks). In both *Cpfl1/Rho*^−/−^ and rd1 mice, we observed Jaws-expressing donor cells in close proximity to the host INL several weeks after transplantation (Fig. [5a--c](#Fig5){ref-type="fig"}). Due to recent concerns about material transfer in photoreceptor transplantation^[@CR27]--[@CR29]^, we stained cryosections from the transplanted retinas with the human nuclear antigen (HNA) and we examined the size of the transplanted cells (HNA^+^) in relation to the chromatin structure and diameter of host cells (Fig. [5d](#Fig5){ref-type="fig"}). HNA stained cell counts confirmed that only a very small portion (5%) of the GFP^+^ labeled cells could potentially be endogenous mouse cells that underwent material transfer (HNA^−^/GFP^+^) (Supplementary Fig. [8](#MOESM1){ref-type="media"}). Both the HNA staining and nuclei comparison confirmed the human identity of transplanted cells in close proximity of the host INL. The transplanted GFP^+^ cells were RCVRN positive (Supplementary Fig. [8](#MOESM1){ref-type="media"}) and located next to PKCα-positive bipolar cells (Fig. [5a](#Fig5){ref-type="fig"}). They expressed the synaptic marker Synaptophysin in close apposition to the bipolar cell dendrites (Fig. [5b](#Fig5){ref-type="fig"}), suggesting that the human cells form synaptic connections with the host bipolar cells. The transplanted cells displayed robust Jaws-induced photocurrents by patch clamp, demonstrating the functionality of the microbial opsin in the host environment (Fig. [5e](#Fig5){ref-type="fig"}). The measured photocurrents peaked at 575 nm and showed fast kinetics (Tau~ON~ \< 10 ms) (Fig. [5f--h](#Fig5){ref-type="fig"}), reflecting the response properties of Jaws. At the ganglion cell level, we observed ON- and OFF responses from different ganglion cell types, which shows that Jaws-driven signals from transplanted photoreceptors were transmitted via second order neurons (Supplementary Fig. [9](#MOESM1){ref-type="media"}) to ON and OFF ganglion cells (Fig. [5i](#Fig5){ref-type="fig"} and Supplementary Fig. [10](#MOESM1){ref-type="media"}). The light intensity requirements were again below the safety threshold for the human retina^[@CR20],[@CR21]^ (Fig. [5j](#Fig5){ref-type="fig"} and Supplementary Fig. [10](#MOESM1){ref-type="media"}). After transplantation of control human donor cells, expressing GFP only, no light responses were detected (Fig. [4k](#Fig4){ref-type="fig"} and Supplementary Fig. [10](#MOESM1){ref-type="media"}), as expected in absence of OS-like structures.Fig. 5hiPSC-derived photoreceptors display Jaws-induced light responses that are transmitted to RGCs. Immunofluorescence analysis of Jaws-cone-treated *Cpfl1/Rho*^−/−^ (**a**, **b**) and rd1 (**c**) retinas. **a** Transplanted cells (green) overlie host PKCα bipolar cells (red), DAPI counterstaining (blue). **b** GFP, PKCα and synaptophysin staining. Arrows point to synaptic connections. **c** GFP^+^ Jaws-cones co-express HNA. Scale bars are 20 µm. SRS---subretinal space, OPL---outer plexiform layer, INL---inner nuclear layer. **d** Measurement of nuclear size of HNA^+^ cells, transplanted in rd1 mice, and ONL cells of a wild-type mouse. **e**--**h** Patch-clamp data from Jaws-cones after transplantation into blind mice. The RMP of Jaws-photoreceptors at 0 current was −40.8 ± 5.2 mV. Stimulation at 590 nm if not stated otherwise. **e** Left, representative photocurrents (top) and voltage hyperpolarization (bottom) after stimulation with two consecutive flashes, absence of the response in GFP only cones shown in grey. Right, comparison of response amplitudes of Jaws-cones in different models (top, mean photocurrent peak; bottom, mean voltage peak). **f** Voltage action spectrum corresponding to a Jaws-expressing cell stimulated at wavelengths from 400 to 650 nm. Maximal responses were obtained at 575 nm (orange star). **g** Temporal properties: Jaws-induced hyperpolarization at increasing stimulation frequencies from 2 to 25 Hz. **h** Comparison of response rise time constant between Jaws-cones transplanted in *Cpfl1/Rho*^−/−^ and rd1 models, and wild-type cones. **i**--**k** Averaged spike responses obtained from MEA recordings shown as PSTH and raster plots from a transplanted *Cpfl1/Rho*^−/−^ mouse. **i** Representative examples of ON/OFF and OFF-responding RGCs (stimulation: 580 nm, 7 × 10^16^ photons cm^−2^ s^−1^). **j** Intensity curve. **k** Recording from a control retina transplanted with GFP only cones. In all panels: Stimulations are depicted with underlying orange lines (for 580--590 nm stimuli; **e**, **g**, **i**, **k**) or with a black line with associated wavelengths noted below (**f**). *n* = number of cells. Values are mean ± SEM. Corresponding data points are overlaid in (**e**, **h**). Error bars are SEM. Statistical significance assessed using Mann--Whitney Student's test (\*\*\*\**p* \< 0,0001). Source data are provided as a Source Data file (for **d**, **e**, **h**, **j** and RMP) Discussion {#Sec7} ========== Transplantation of healthy photoreceptors holds great promise to restore vision in patients with outer retinal degeneration. This approach has received significant attention over the past years as it can restore vision independently from the cause of photoreceptor cell loss^[@CR30]^. Significant progress has been made in the generation^[@CR23],[@CR26],[@CR31]--[@CR35]^, purification^[@CR36],[@CR37]^ and transplantation of photoreceptors^[@CR3],[@CR7],[@CR35],[@CR36],[@CR38]--[@CR40]^ from hiPSCs. However, photoreceptor replacement faces a three-fold challenge: transplanted cells need to develop (1) synaptic contact to bipolar cells for signal transmission, (2) functional photoreceptor OS, and (3) tight contact to RPE cells to maintain OS light-sensitivity (Fig. [6](#Fig6){ref-type="fig"}). This makes photoreceptor transplantation complex and challenging. Recent studies have shown that the recipient environment is of great importance for successful integration and survival of transplanted photoreceptor cells. In animals with severely degenerated ONL, transplanted photoreceptor precursors derived from postnatal mouse retina^[@CR4]--[@CR6]^ or from hiPSCs^[@CR35]^ failed to develop normal OS structure and establish correct OS polarity with respect to host RPE. The RPE cells are indispensable for OS renewal as they phagocytose the shed OS discs. Moreover, they re-isomerize the chromophore all-*trans*-retinal into 11-*cis*-retinal. Thus, in the absence of intimate contact with the RPE photoreceptors cannot maintain their light sensitivity^[@CR41]^.Fig. 6Schematic illustrating the three-fold challenge in photoreceptor cell replacement. In order to provide visual improvement, transplanted photoreceptors need to form functional OS, retain in close contact to the RPE to maintain light sensitivity, and develop synaptic connection to host bipolar cells for signal transmission. After transplantation into animals with severely degenerated ONL, photoreceptors fail to develop normal OS structure and establish correct polarity with respect to host RPE. In addition, in retinal degeneration, the RPE is often compromised alongside photoreceptors. All this undermines the success of photoreceptor replacement. We therefore introduced a hyperpolarizing microbial opsin into the photoreceptors before transplantation, developing an OS- and RPE-independent approach for vision restoration in late-stage retinal degeneration. RPE---retinal pigment epithelium, PR---photoreceptors, BPC---bipolar cells For an OS and RPE-independent treatment approach, we introduced a hyperpolarizing microbial opsin into photoreceptors derived from either neo-natal mouse retinas or from human retinal organoids derived from iPSCs. We transplanted these optogenetically-transformed photoreceptors into blind mice lacking the photoreceptor layer. We have shown that these cells can mediate visual function, as demonstrated by a battery of tests from RGC recordings to behavioural tests. The paradigm that transplanted photoreceptors migrate and structurally integrate into the ONL of the recipient has been challenged recently by several groups^[@CR27]--[@CR29]^ providing strong evidence that cytoplasmic material transfer occurs between transplanted cells, residing in the sub-retinal space, and remaining photoreceptor cells of the host. In these experiments, however, late-stage degeneration animals were used to model patients with advanced disease, thus there are only few remaining photoreceptors, minimizing the potential contribution of material transfer^[@CR42]^. To distinguish between potential fusion events and structural integration of donor photoreceptors, we performed Y chromosome FISH and HNA staining in the *Cpfl1/Rho*^−/−^ model where some remaining cells were visible in earlier transplantation time-points. Our Y chromosome FISH experiments revealed a very limited number of events of potential material transfer (\<10%). In our blind rd1 mice, only sparse population of cones and no rods remain after 36 days of age^[@CR18]^. We confirmed this observation in our control animals, obviating the possibility of material transfer from the transplanted NpHR-expressing mouse progenitors to remnant ONL cells of the host. Moreover, NpHR-positive cells that were attached to the host INL visibly show rod nuclear morphology, indicating that these are indeed donor cells and not remaining cones. As for the transplantation of Jaws-expressing hiPSCs, histological analysis using a human-specific nuclear marker (HNA) in transplanted mice, confirmed that the vast majority (95%) of GFP-expressing cells were HNA positive. This result along with the measured nuclei size confirmed the human origin of the transplanted cells, ruling out material exchange between human donor photoreceptors and mouse host cells. Although these do not fully rule out that material transfer may contribute to the improved functional responses, we have observed that the level of functional improvement is independent of the host age at time of transplantation, further supporting the optogenetically transformed photoreceptors are the major source of functional light responses (Supplementary Fig. [11](#MOESM1){ref-type="media"}). Moreover, material transfer is rare between human donor and mouse host photoreceptors^[@CR35],[@CR36]^ (Fig. [5d](#Fig5){ref-type="fig"} and Supplementary Fig. [8](#MOESM1){ref-type="media"}), arguing against a significant contribution of material transfer to the observed functional improvements. Lastly, any possible rescue effect mediated by remaining host photoreceptors is expected to be very minor as our control groups transplanted at the same ages with wild-type donor-derived photoreceptor precursors or hiPSC-derived photoreceptors expressing GFP only, never showed any detectable functional responses. This confirms that any possible rescue effect on remaining host photoreceptors cannot be a result of the transplantation itself and suggests that the functional outcomes are a direct consequence of the presence of an optogenetic protein expressed in the transplanted photoreceptors. In conclusion, by using immature photoreceptors equipped with a microbial opsin, we went beyond the current limitations of optogenetic gene therapy approaches. Optogenetic approaches commonly target bipolar cells or RGCs that are viable targets in late stages of retinal degenerative diseases such as retinitis pigmentosa or age-related macular degeneration. Unfortunately, conferring light sensitivity to cells downstream from photoreceptors, bypasses the important information processing normally conducted by the inner retinal circuitry. Photoreceptor-directed optogenetic therapy that aims to rescue the function of remaining dormant cones harnesses the information processing of the inner retina allowing the recovery of complex visual responses such as lateral inhibition and directional selectivity in previously blind mice^[@CR43]^, but this strategy can only be useful in patients with remaining cones which represent a minor portion of late-stage retinitis pigmentosa patients^[@CR44]^. Here, we use the synergy of cell replacement and optogenetic therapy that allows the restoration of retinal structure with stem cell derivatives and visual function with microbial opsins. In a future perspective, optogenetically engineered hiPSC-derived cones could serve as donor cells for photoreceptor transplantation in late-stage retinal degeneration. In patients, degenerative diseases of the retina such as retinitis pigmentosa, age-related macular degeneration, and Leber congenital amaurosis, often manifest RPE degeneration along with photoreceptor degeneration, especially in their late stages^[@CR10],[@CR45]--[@CR47]^. Our approach bodes well for applications in such patients who can only obtain limited benefit from transplantation of photoreceptors in the absence of chromophore replenishment from their dystrophic RPE. Methods {#Sec8} ======= Animals {#Sec9} ------- Wild-type C57BL/6 mice (Janvier Laboratories) were used as a source of photoreceptor precursor donor cells. The following two models are both models of late-stage degeneration and were used as cell recipients. Cone photoreceptor function loss 1/rhodopsin-deficient double-mutant *Cpfl1/Rho*^*−/−*^ mice^[@CR16]^ were provided by Marius Ader and rederived by Charles River Laboratory. The line was the result of crossing Cone photoreceptor function loss 1 (*Cpfl1*) mice^[@CR48]^ with rhodopsin knock-out mice (*Rho*^*−/−*^)^[@CR49]^. The outcome were mice with no functional photoreceptors starting from eye opening and with the ONL degenerating to one row of cell bodies by 10 to 12 weeks^[@CR16]^. Retinal degeneration 1 (rd1) mice (*C3Hrd/rd*)^[@CR17]^ were provided by Thierry Leveillard. The retina in these mice degenerates to a single row of cones by 3 weeks of age^[@CR18],[@CR50]^. All mice were housed under a 12-h light-dark cycle with free access to food and water. We have complied with all relevant ethical regulations for animal testing and research. All animal experiments and procedures were approved by the local animal experimentation ethics committee (Le Comité d'Ethique pour l'Expérimentation Animale Charles Darwin) and were carried out according to institutional guidelines in adherence with the National Institutes of Health guide for the care and use of laboratory animals as well as the Directive 2010/63/EU of the European Parliament. AAV production {#Sec10} -------------- Recombinant AAVs were produced using the triple-transfection method on HEK293 cells (ATCC CRL-1573), harvested 24--72 h post transfection and purified by iodixanol gradient ultracentrifugation^[@CR51]^. The 40% iodixanol fraction was collected after a 90 min spin at 354000 g. Concentration and buffer exchange were performed against PBS containing 0.001% Pluronic. AAV vector stocks titers were then determined based on real-time quantitative PCR titration method using ITR primers^[@CR52]^ and SYBR Green (Thermo Fischer Scientific). AAV-infection of photoreceptor precursors {#Sec11} ----------------------------------------- Wild-type mice (C57BL/6J) at P2 were anesthetized on ice. Eyelids were cut and 1 µl of AAV9 2YF carrying eNpHR gene under the control of human rhodopsin promoter and fused to the fluorescent reporter eYFP (AAV9 2YF hRho-eNpHR-eYFP), or of AAV9 2YF hRho-GFP in the case of GFP only-expressing controls, was injected bilaterally using an ultrafine 34-gauge Hamilton syringe. MACS with CD73 {#Sec12} -------------- Two days following the AAV injections in P2 mice, at P4, retinas were isolated from the injected wild-type mice and cells were enriched using CD73 cell surface marker before transplantation^[@CR14],[@CR15]^. Briefly, retinas were dissociated, pelleted by centrifugation (5 min at 300 g), resuspended in 500 µL MACS buffer (phosphate-buffered saline \[PBS; pH 7.2\], 0.5% BSA, 2 mM EDTA) and incubated with 10 µg/mL rat anti-mouse CD73 antibody (BD Biosciences, 550738) for 5 minutes at 4 °C. After washing in MACS buffer, cells were centrifuged for 5 minutes at 300 g. The cell pellet was resuspended in 480 µL MACS buffer and 120 µL goat anti-rat IgG magnetic beads (Miltenyi Biotec, 130-048-501). The suspension was incubated for 15 min at 4 °C followed by a washing step with MACS buffer and centrifugation. Before magnetic separation, the cells were resuspended in MACS buffer and filtered through a 30-µm pre-separation filter. The cell suspensions were applied onto a LS column fixed to a MACS separator. The column was rinsed with 3 × 3 mL MACS buffer and the flow through was collected (CD73 negative cells). The column was removed from the magnet and placed in a new collection tube. The CD73-positive fraction was eluted by loading 5 mL MACS buffer and immediately applying the plunger supplied with the column. The cells were then counted and concentrated to about 200,000 cells/µl. Maintenance of hiPSC culture {#Sec13} ---------------------------- All experiments were carried out using hiPSC-2 cell line, previously established from human dermal fibroblasts from an 8-year-old boy (gift from P. Rustin, INSERM U676, Paris) by co-transfecting OriP/EBNA1-based epi-somal vectors pEP4EO2SEN2K (3 μg), pEP4EO2SET2K (3 μg) and pCEP4-M2L (2 μg) (Addgene) via nucleofection (Nucleofector 4D, V4XP, withDT-130 program; Lonza)^[@CR31]^, and recently adapted to feeder-free conditions^[@CR23]^. Cells were kept at 37 °C, under 5% CO~2~/95% air atmosphere, and 20% Oxygen tension and 80-85% of humidity. Colonies were cultured with Essential 8™ medium (Thermo Fisher Scientific) in culture dishes coated with truncated recombinant human Vitronectin and passaged once a week^[@CR23]^. Generation of retinal organoids from human iPS cells {#Sec14} ---------------------------------------------------- Human iPSC were differentiated towards retinal organoids following an optimized protocol based on the one published by Reichman et al.^[@CR23]^. Briefly,hiPSC-2 cell line was expanded to 80% confluence in Essential 8™ medium were switched in Essential 6™ medium (Thermo Fisher Scientific). After 3 days, cells were moved to the Proneural medium (Supplementary Table [2](#MOESM1){ref-type="media"}). The medium was changed every 2--3 days. After 4 weeks of differentiation, neural retina-like structures grew out of the cultures and were mechanically isolated. Pigmented parts, giving rise to RPE were carefully removed. The extended 3D culture in Maturation medium (Table [S1](#MOESM1){ref-type="media"}) allowed the formation of retinal organoids. Addition of 10 ng/ml Fibroblast growth factor 2 (FGF2, Preprotech) at this point favoured the growth of retinal organoids and the commitment towards retinal neurons instead of RPE lineage^[@CR53]^. In order to promote the commitment of retinal progenitors towards photoreceptors, we specifically blocked Notch signalling for a week starting at day 42 of differentiation using the gamma secretase inhibitor DAPT (10 µM, Selleckchem)^[@CR54]^. Floating organoids were cultured in 6 well-plates (10 organoids per well) and medium was changed every 2 days. Supplementary Table [2](#MOESM1){ref-type="media"} summarizes the formulations for the different media used. Infection of retinal organoids with AAV expressing Jaws {#Sec15} ------------------------------------------------------- Introduction of Jaws optogene was done by one single infection at day 42 at a 5 × 10^10^ vg per organoid. Retinal organoids were infected with an AAV with an engineered capsid, AAV2-7m8^[@CR55]^ carrying Jaws gene under the control of mouse cone arrestin promoter and fused to the fluorescent reporter GFP (AAV2-7m8-mCAR-Jaws-GFP). For GFP only-expressing controls, an infection with AAV2-7m8-mCAR-GFP was carried out in the same manner as mentioned above. Monolayer cultures of dissociated cells {#Sec16} --------------------------------------- After removal of any pigmented tissue, 70-day old retinal organoids were collected and washed three times in Ringer solution (Supplementary Table [2](#MOESM1){ref-type="media"}) before dissociation with two units of pre-activated papain at 28.7 μ/mg (Worthington) in Ringer solution for 25 min at 37 °C. Once a homogeneous cell suspension was obtained after pipetting up and down, papain was deactivated with Proneural medium (Supplementary Table [2](#MOESM1){ref-type="media"}). Cells were centrifuged and resuspended in pre-warmed Proneural medium. Dissociated retinal cells were plated onto coverslips coated with human recombinant 30 µg/cm² Laminin (Sigma-Aldrich) and 150 µg/cm² Poly-L-Ornithine in 24 well-plates^[@CR56]^. Monolayers were incubated at 37 °C in a standard 5% CO2/95% air incubator and medium was changed every 2 days for the next 15--20 days, before immunostaining. Preparation of cells for transplantation {#Sec17} ---------------------------------------- At day 70 of differentiation retinal organoids were dissociated using papain as described above to obtain a single cell suspension in Proneural medium (Supplementary Table [2](#MOESM1){ref-type="media"}). Cell suspension was filtered through a 30 µm mesh (Miltenyi Biotec) to remove residual aggregates. After counting, cells were centrifuged and resuspended in Proneural medium at a concentration of 300,000 cells/µl. RNA isolation and real-time RT-qPCR {#Sec18} ----------------------------------- Total RNA isolation was performed using a NucleoSpin RNA XS kit (Macherey-Nagel), according to the manufacturer's instructions. RNA concentration and purity were determined using a NanoDrop ND-1000 Spectrophotometer (Thermo Fisher Scientific). Reverse transcription was carried out with 250 ng of total RNA using the QuantiTect retrotranscription kit (Qiagen). Quantitative PCR (qPCR) reactions were performed using Taqman Array Fast plates and Taqman Gene expression master mix (Thermo Fisher Scientific) in an Applied Biosystems real-time PCR machine (7500 Fast System). All samples were normalized against a housekeeping gene (18S) and the gene expression was determined based on the ΔΔCT method. Average values were obtained from at least four biological replicates. The primer sets and MGB probes (Thermo Fisher Scientific) labelled with FAM for amplification are listed in Supplementary Table [3](#MOESM1){ref-type="media"}. Transplantation procedure {#Sec19} ------------------------- Mice were sedated by intraperitoneal injection of ketamine (50 mg/kg) and xyazine (10 mg/kg) and the pupils were dilated with tropicamide drops. The mice were placed onto a heating pad to maintain the temperature at 37 °C. A drop of Lubrithal eye gel (Dechra) was used to keep the eyes hydrated during the surgery. A small glass slip was put on the eye to enable visualization through the Leica Alcon ophthalmic microscope while a syringe with a blunt, 34-gauge needle was inserted tangentially through the conjunctiva and sclera. One microlitre of cell suspension including 200,000--300,000 cells was injected between the retina and RPE, into the subretinal space, creating a bullous retinal detachment. Injections were performed bilaterally. Mice were placed into a warm chamber after the surgery until their awakening. Tissue preparation and immunostaining {#Sec20} ------------------------------------- 70-day old organoids were washed in PBS and fixed in 4% paraformaldehyde for 10 min at 4 °C before they were incubated overnight in 30% sucrose (Sigma-Aldrich) in PBS. Organoids were embedded in gelatin blocks (7.5% gelatin (Sigma-Aldrich), 10% sucrose in PBS) and frozen using isopentane at −50 °C. At least 4 weeks after transplantation, mice were sacrificed by CO~2~ inhalation followed by a cervical dislocation. The eyeballs were removed, fixed in 4% paraformaldehyde for 30 minutes at room temperature (RT) and incubated overnight at 4 °C in PBS containing 30% (w/v) sucrose (Sigma-Aldrich). The eyes were then dissected to obtain only the back of the eye with the retina and the RPE. The samples were embedded in gelatin blocks (7.5% gelatin (Sigma-Aldrich), 10% sucrose in PBS), frozen with liquid nitrogen and stored at −80 °C. Ten micrometres of thick sections were obtained using a Cryostat Microm and mounted on Super Frost Ultra Plus® slides (Menzel Gläser). Cryosections were washed in PBS (5 min, RT) and then permeabilised in PBS containing 0.5 % Triton X-100 during 1 h at RT. Blocking was done with PBS containing 0.2% gelatin, 0.25% Triton X-100 for 30 min at RT and incubation with primary antibodies was performed overnight at 4 °C. We used the following primary antibodies for immunostaining: hCAR (1:20,000; gift from Cheryl Craft), CRX (1:5000; Abnova, H00001406-M02), GFP (1:500; Abcam, ab13970), HNA (1:200; Millipore, MAB4383), Ki67 (1:200; BD Pharmagen, 550609), PKCα (1:100; Santa Cruz, sc-208), RCVRN (1:5000-1:2000; Millipore, AB5585), Synaptophysin (1:200; Sigma, SAB4502906). The antibodies used are also listed in Supplementary Table [4](#MOESM1){ref-type="media"}. After incubation with primary antibodies, sections were washed with PBS containing 0.25% Tween20 and incubated with fluorochrome-conjugated secondary antibodies (1:500; Thermo Fisher Scientific) for 1 h at RT. After successive washing in PBS-Tween20, nuclei were counterstained with DAPI (4′-6′-diamino-2-phenylindole, dilactate; Invitrogen-Molecular Probe, Eugene, OR) at a 1:1000 dilution. Samples were further washed in PBS and dehydrated with 100% ethanol before mounting using fluoromount Vectashield (Vector Laboratories). FISH for Y chromosome detection {#Sec21} ------------------------------- For combined chromosomal fluorescence in situ hybridization (Y chromosome FISH) and immunohistochemistry, retinas from female *Cpfl1/Rho*^−/−^ mice transplanted with male donor-derived rod precursors (*N* = 5) were collected 4 weeks post-surgery, fixed for 1 h at 4 °C with freshly prepared 4% paraformaldehyde (Merck Millipore), incubated in 30% sucrose overnight, followed by cryopreservation. After embedding and freezing in OCT medium, cryosections of 12 µm were rehydrated with 10 mM sodium citrate buffer pH 6, antigen retrieval performed (80 °C, 25 min). Sections were washed in PBS for 5 min and incubated with a primary antibody against GFP (1:500; Abcam, ab13970) overnight at RT, followed by incubation with secondary antibody conjugated to AlexaFluor 488 (1:1000; Jackson Immunoresearch, 103545155) overnight at RT. Next, slides were post-fixed in 2% PFA for 10 min, pre-treated with 50% formamide for 1 h at RT, then hybridization of the XMP Y orange probe (Metasystems, D-1421-050-OR) to the Y chromosome was performed. To allow the probe to penetrate the tissue, samples were incubated for 3 h at 45 °C in a HybEZ II oven. Then, samples were transferred to a hot block at 80 °C for 5 min, to denature DNA. Afterwards, probes were hybridized with DNA for 2 days at 37 °C. Posthybridization consisted of 3 × 15 min washes with 2× SCC at 37 °C and 2 × 5 min stringency washes with 0.1× SCC at 60 °C. Finally, sections were counterstained with DAPI (1:15,000; Sigma). The samples were imaged and quantified using structured illumination microscopy (SIM; ApoTome, Zeiss). For information on antibodies used, see Supplementary Table [4](#MOESM1){ref-type="media"}. Quantification of YFP^+^ cells after transplantation {#Sec22} ---------------------------------------------------- Tranplanted host eyes (*N* = 6) were processed and cryosectioned as described for the Y chromosome FISH experiment, and subsequently stained for GFP (1:500; Abcam, ab13970) and photoreceptor specific marker RCVRN (1:5000; Millipore, AB5585), followed by secondary antibody staining (1:1000; Jackson Immunoresearch) Every fourth serial section from whole experimental retinas was used to quantify the total amount of YFP^+^ photoreceptors. Cells were counted from images obtained with the NanoZoomer microscope (Hamamatsu Photonics). Following these cell counts, the resulting value was multiplied by four to estimate the total amount of labelled cells per retina. For information on antibodies used, see Supplementary Table [4](#MOESM1){ref-type="media"}. Nuclear size measurements {#Sec23} ------------------------- Measurements of the nuclear size were performed with FIJI software (NIH) on immunostained sections of rd1 transplanted retinas and compared with the values in wild-type mice. Image acquisition {#Sec24} ----------------- Immunofluorescence was observed using a Leica DM6000 microscope (Leica microsystems) equipped with a CCD CoolSNAP-HQ camera (Roper Scientific) or using an inverted or upright laser scanning confocal microscope (FV1000, Olympus) with 405, 488, 515 and 635 nm pulsing lasers. The images were acquired sequentially with the step size optimized based on the Nyquist--Shannon theorem. The analysis was conducted in FIJI (NIH). Images were put into a stack, Z-sections were projected on a 2D plane using the MAX intensity setting in the software's Z-project feature, and the individual channels were merged. Images of Y chromosome labelled retinas were acquired using SIM (ApoTome, Zeiss). Samples stained to perform quantification of surviving YFP^+^ photoreceptors were imaged with the NanoZoomer microscope (Hamamatsu Photonics). Light stimulation of NpHR-positive, Jaws-positive, and control cells {#Sec25} -------------------------------------------------------------------- Light-triggered responses were measured in donor cells before transplantation---in vivo in AAV-injected wild-type donor mice at P12 for NpHR+, and in retinal organoids and monolayer cultures from dissociated organoids for Jaws+ cells. In order to measure light responses we used a monochromatic light source (Polychrome V, TILL photonics). After patching the cells we first stimulated them with a pair of 590 nm full-field light pulses. Then the activity spectrum was measured by using light flashes ranging from 400 to 650 nm (separated by 25 nm steps). Finally we generated light pulses at different frequencies ranging between 2 and 30 Hz in order determine the temporal response properties of NpHR and Jaws in AAV-transduced cells. Stimulation and analysis were performed using custom-written software in Matlab (Mathworks) and Labview (National Instruments). We used light intensities ranging between 1 × 10^16^ and 3.2 × 10^17^ photons cm^−2^ s^−1^. Live two-photon imaging and patch-clamp recordings {#Sec26} -------------------------------------------------- Donor mouse retina (P12), retinal organoids or monolayer cultures from dissociated organoids were placed in the recording chamber of the microscope at 36 °C in oxygenated (95% O~2~/5% CO~2~) Ames medium (Sigma-Aldrich) during the whole experiment. Transplanted mice were sacrificed by CO~2~ inhalation followed by quick cervical dislocation, and eyeballs were removed. Retinae from *Cpfl1/Rho*^−/−^ or rd1 mice were isolated in oxygenated (95% O~2~/5% CO~2~) Ames medium and whole mount retinas with ganglion cell side down were placed in the recording chamber of the microscope at 36 °C for the duration of the experiment for both live two-photon imaging and electrophysiology. A custom-made two-photon microscope equipped with a 25x water immersion objective (XLPlanN-25 × -W-MP/NA1.05, Olympus) equipped with a pulsed femto-second laser (InSight™ DeepSee™ - Newport Corporation) were used for imaging and targeting AAV-transduced fluorescent photoreceptor cells (eYFP^+^ or GFP^+^ cells). Two-photon images were acquired using the excitation laser at a wavelength of 930 nm. Images were processed offline using ImageJ (NIH). A CCD camera (Hamamatsu Corp.) was also used to visualize the donor cells or the retina under infrared light. For patch-clamp recordings, AAV-transduced fluorescent cells were targeted with a patch electrode under visual guidance using the reporter tag's fluorescence. Whole-cell recordings were obtained using the Axon Multiclamp 700B amplifier (Molecular Device Cellular Neurosciences). Patch electrodes were made from borosilicate glass (BF100-50-10, Sutter Instrument) pulled to 7--10 MΩ and filled with 115 mM K Gluconate, 10 mM KCl, 1 mM MgCl~2~, 0.5 mM CaCl~2~, 1.5 mM EGTA, 10 mM HEPES, and 4 mM ATP-Na2 (pH 7.2). Photocurrents were recorded while voltage-clamping cells at a potential of −40 mV. Some cells were also recorded in current-clamp (zero) configuration, hence allowing us to monitor the membrane potential during light stimulations. A monochromatic light source (Polychrome V, TILL photonics) was used to stimulate cells during electrophysiological experiments and hence record photocurrents or changes in cells membrane potential. First, in order to measure the activity spectrum of NpHR and Jaws, we used 300 ms light flashes ranging from 650 to 400 nm (25 nm steps; interstimulus interval 1.5 s) at a constant light intensity of 1.2 × 10^16^ photons cm^−2^ s^−1^. Then this light source was used at a constant wavelength of 590 nm to generate light pulses at different frequencies (ranging from 2 to 30 Hz) in order determine the temporal response properties of optogenetic proteins used. Stimuli were generated using custom-written software in LabVIEW (National Instruments) and output light intensities were calibrated using a spectrophotometer (USB2000+, Ocean Optics). Multi-electrode array recordings and data analysis {#Sec27} -------------------------------------------------- The mice were euthanized, the retinas isolated, cut each in two pieces and placed in Ames medium bubbled with 95% O~2~ and 5% CO~2~. Each piece was mounted separately on a cellulose membrane soaked overnight in poly-L-lysin and gently pressed against a 60-µm electrode spacing 252 channel multi-electrode array chip (256MEA60/10iR, Multi Channel Systems) with RGCs facing the electrodes. The piece remained perfused with oxygenated Ames medium at 34 °C throughout the experiment. Full field light stimuli were applied with a Polychrome V monochromator (TILL Photonics) driven by a STG2008 stimulus generator (Multichannel Systems) using custom written stimuli in MC_Stimulus II (MC_Stimulus II Version 3.4.4, Multichannel Systems). The basic stimulus pattern applied was 10 repetitions of 2-s stimuli of 580 nm light (close to excitation maximum for NpHR and Jaws) and intensity of 7 × 10^16^ photons cm^−2^ s^−1^, with 10 s intervals. To assess temporal dynamics of responding cells, stimuli ranging from 1 ms to 2 s were played to the retina. Action spectrum of optogenetic protein-expressing cells was examined by playing sets of stimuli of different wavelengths (450 nm, 500 nm, 550 nm, 580 nm, 600 nm, 650 nm; 10 stimuli of 2 s with 10 s intervals for each wavelength). To determine sensitivity of responding cells, stimuli of lower intensities were also used (1 × 10^14^, 7 × 10^14^, 2 × 10^15^ and 9 × 10^15^ photons cm^−2^ s^−1^). During the experiments aiming to show that the light responses are really coming from the ONL, we perfused the tissue with L-AP4 (50 μM) for at least 20 min before the recordings in order to block input from photoreceptors to ON bipolar cells. This was followed by at least 15 min rinse with Ames medium and another set of light stimulation to observe whether the response returned. Data were acquired using the MC_Rack software (MC_Rack v4.5, Multi Channel Systems). RGC responses were amplified and sampled at 20 kHz. Data was then filtered with a 200 Hz high pass filter and individual channels were spike sorted using template matching and cluster grouping based on principal component analysis of the waveforms in Spike2 software v.7 (Cambridge Electronic Design Ltd). The raster plots and peristimulus time histogram data (bin size of 10 ms) were constructed in MATLAB using custom scripts from spike-sorted channels and further processed in Adobe Illustrator CS4 (Adobe Systems) for presentation. Maximum firing rate for each responding cell was measured in the 2 s after the onset (for ON-responding cells) or 2 s after the offset (for OFF-responding cells) of the stimulus. The number of cells and mice that were used for quantitative analysis are stated in Figure legends. Error bars were calculated over cells. Light/dark box {#Sec28} -------------- For light-avoidance behaviour, we used a custom-made dark-light box^[@CR22],[@CR57]^ of dimensions 36 cm × 20 cm × 18 cm, divided longitudinally into two equal sized compartments with a non-transparent wall with a 7 cm × 5 cm hole in the middle. The light compartment was equipped with eight 590 nm LEDs (Cree XP-E, amber, Lumitronix) 3 cm from the bottom of the box. A light intensity of 2.05 × 10^16^ photons cm^−2^ s^−1^ was used for all the experiments. The mice were habituated in the dark for at least 2 h prior the testing. Each mouse was introduced into the light compartment and was left in the box for at least 5 min before the start of illumination. The lights were turned on when the mouse was in the light compartment and were left on for at least 5 min. The behaviour of the mice was recorded with a camera and subsequently analyzed manually by recording the times spent in each compartment after the start of illumination, and using the Smart Vision Tracking Software (Harvard Apparatus). The mouse's head was used to define the compartment it occupied. Statistical analyses {#Sec29} -------------------- Data was analyzed with GraphPad Prism and it was expressed as mean ± standard error of mean (SEM). Comparisons between values were analyzed using unpaired two-tailed non-parametric Mann----Whitney Student's test. A level of *p* \< 0.05 was considered significant. The labels used were: \**p* \< 0.05, \*\**p* \< 0.01, \*\*\**p* \< 0.001 and \*\*\*\**p* \< 0.0001. Reporting summary {#Sec30} ----------------- Further information on research design is available in the [Nature Research Reporting Summary](#MOESM2){ref-type="media"} linked to this article. Supplementary information ========================= {#Sec31} Supplementary Information Reporting Summary Peer Review File **Peer review information** *Nature Communications* thanks John Flannery and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available. **Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. These authors contributed equally: Marcela Garita-Hernandez, Maruša Lampič. These authors jointly supervised this work: Deniz Dalkara, Jens Duebel. Supplementary information ========================= **Supplementary Information** accompanies this paper at 10.1038/s41467-019-12330-2. We thank Thierry Léveillard for providing the rd1 mice and Cheryl Craft for providing the hCAR antibody. We are thankful to Romain Caplette, Olivier Marre and Stéphane Deny for their help with the MEA recordings and analysis. We thank Abhishek Sengupta for the construction of the light/dark box. We are grateful to Mélissa Desrosiers and Camille Robert for AAV productions and the fundraising department of the Vision Institute for LCL fundraising. This study was supported by a ERC Starting Grants (OPTOGENRET, 309776/JD, REGNETHER 639888/DD), the Centre National de la Recherche Scientifique (CNRS), the Institut National de la Santé et de la Recherche Médicale (INSERM), Labex-Lifesenses (D.D., J.D.), Sorbonne Université, Marie Curie CIG (334130, Retinal Gene Therapy, D.D.), INSERM, ANR grant RHU Light4Deaf (D.D.,O.G.), LCL Foundation (D.D.), Deutsche Forschungsgemeinschaft (DFG) FZT 111, Center for Regenerative Therapies Dresden, FZT 111 Cluster of Excellence (M.A.), DFG Grant AD375/6-1 (M.A.), BMBF Research Grant 01EK1613A (M.A.). M.G. optimized differentiation and AAV. mediated transduction of hiPSC-derived retinal organoids, performed culture, histology, imaging, qPCR, designed experiments and wrote the manuscript. M.L. performed cell transplantation, imaging, histology, cell quantification, MEA recordings, behavioural experiments, designed experiments and wrote the manuscript. A.C. performed patch-clamp recordings and 2-photon imaging. L.G. generated hiPSC-derived retinal organoids, performed cell transplantation, imaging, histology and behavioural experiments. F.R. performed behavioural experiments. T.F. contributed to cell transplantation. S.G. and O.B. performed Y-chromosome FISH experiments and quantification, cell transplantation, histology and imaging. G.G. and S.R. helped to optimize hiPSC cultures and differentiation protocols. S.P. and J.A.S. provided scientific input, financial and administrative support. O.G. provided hiPSCs and gave feedback on the manuscript. M.A. provided *Cpfl1/Rho*^−/−^ mice, contributed to cell transplantation and gave feedback on the manuscript. D.D. and J.D. designed experiments and wrote the manuscript. The data that support the findings of this study are available from the corresponding author upon reasonable request. The source data underlying Figs. [1](#Fig1){ref-type="fig"}i, [2](#Fig2){ref-type="fig"}a, d, [3](#Fig3){ref-type="fig"}c, e, g, i, k, [4](#Fig4){ref-type="fig"}f, [5d, e, h, j](#Fig5){ref-type="fig"}, resting membrane potential values (RPM), and Supplementary Figs. [3c](#MOESM1){ref-type="media"}, [6b, e, j](#MOESM1){ref-type="media"} and [8c](#MOESM1){ref-type="media"} are provided as a Source Data file. The MATLAB codes that were used to represent MEA raster and PSTH data are available from the corresponding author upon reasonable request.  Sorbonne Universite, Centre National De La Recherche Scientifique and INSERM have submitted a patent application (PCT/EP2017/074125) based on the work covered in this manuscript. J.D., M.A., A.C., M.G.-H., M.L., D.D., O.G. and J.-A.S are affiliated with these organisations and the patent. The remaining authors declare no competing interests.
{ "pile_set_name": "PubMed Central" }
Syma RC Helicopters - A Quick Review Posted 2010-10-24 There are numerous RC helicopter brands that you can find in the market today but we are going to present a quick review of some Syma RC helicopter models. If you want to know more about the RC helicopter products offered by this brand, read on to have an idea how consumers find the models listed below. Syma S006 Alloy Shark [caption id="attachment_197" align="alignleft" width="300" caption="Syma S006 Alloy Shark RC Helicopter"][/caption] Flying this RC helicopter will offer a lot of enjoyment. It may be a little tricky to fly during your first attempt but you are bound to have a lot of fun once you get familiar with the remote. It has a durable design that can withstand crashes which is inevitable even for expert RC pilots. The good thing about this helicopter is that it comes with replacement blades, a major plus for the kit because blades are the easiest to break with RC helicopters. Though it is designed to be flown indoors, you can also fly it outdoors on days with favorable wind conditions. With the satisfaction you can get from this model, it is highly recommended for children and adults alike. Syma S012 AH-64 Military Mini Apache [caption id="attachment_198" align="alignleft" width="300" caption="Syma S012 Apache AH-64 Mini RC Helicopter"][/caption] This tiny RC model is best used indoors and you will definitely get your money’s worth. The minor drawback is the flimsiness of the plastic wheels but this doesn’t matter that much because of the other benefits that make this disadvantage negligible. Because of the ease of use, this model comes highly recommended. Syma S009 AH-64 Apache [caption id="attachment_199" align="alignleft" width="300" caption="Syma S009 AH-64 RC Helicopter"][/caption] This 10-inch mini electric helicopter is easy to use and affordable. Some people find it amazing but others don’t have too much fun with this unit. For a relative low price, you can enjoy this helicopter both indoors and outdoors. For beginners, it would be best to have safe landing grounds like grass to avoid damaging the unit because durability is a little questionable. Another weakness is the poorly written instructions. But overall, this model is recommended but caution should be practiced while flying this RC helicopter model. Syma S010 Vision [caption id="attachment_200" align="alignleft" width="300" caption="Syma S018 Mini Airwolf RC Helicopter"][/caption] When you own this RC model, you will definitely agree that it is easy to control and has a steady flight thus offering a lot of gratification while flying. It is well-designed and constructed for long term use. Such an amazing RC helicopter at a very affordable price. Charging is fast and allows for longer flight times. However, it can be a challenge to fly it when the wind suddenly blows because of the size. Due to the durability of this RC helicopter model, it is highly recommended for beginners and experts who fancy small RC helicopters. Syma S018 Mini Airwolf Most users of this RC helicopter model agree that it is very easy to control. It is durable enough to withstand crash landings but the rotor blades are the easiest to break. The short battery life can also spoil the fun most of the time. Suitable for indoor flying for older kids and adults. This easy flyer is highly recommended for beginners. Comments <strong>Syma RC Helicopters ? A Quick Review...</strong> I found your entry interesting do I've added a Trackback to it on my weblog :)... hi!This was a really fabulous subject! I come from roma, I was luck to seek your theme in bing Also I get much in your subject really thank your very much i will come later I think youve made some truly interesting points. Not too many people would actually think about this the way you just did. Im really impressed that theres so much about this subject thats been uncovered and you did it so well, with so much class. Good one you, man! Really great stuff here. <a href="//legosforgirls.info/ this is the way a blog should be! thanks! Excellent post with some good info, think i'll share this on my twitter if you don't mind and maybe even blogroll it depending on the feedback, thanks for sharing hi great site love these helicopters check back for more info thanks john
{ "pile_set_name": "Pile-CC" }
Send this page to someone via email A man charged with multiple murders at a Fredericton apartment complex is being described as seemingly “polite and pleasant,” with police yet unable to offer the public any alleged motive for Friday’s burst of violence. Matthew Vincent Raymond, 48, of Fredericton is accused of killing 32-year-old Bobbie Lee Wright, her boyfriend Donnie Robichaud, and police constables Robb Costello and Sara Burns, police said Saturday. Raymond has lived in the complex for about four months, said Judith Aguilar, an office manager for Sunfield Apartment Rentals, the complex’s owners. Aguilar said he is an avid cyclist who often came into pay his rent in cash while wearing a bike helmet. “He seemed like a reasonably normal person. He seemed normal and made small talk every time you saw him,” Aguilar said Saturday. Tweet This WATCH: Trudeau to visit Fredericton in wake of shooting as city works to heal after fatal event 1:30 Trudeau to visit Fredericton in wake of shooting as city works to heal after fatal event Trudeau to visit Fredericton in wake of shooting as city works to heal after fatal event “He came in every month to pay rent. He was always polite and pleasant.” Story continues below advertisement Both Robichaud, 42, and Raymond were residents of the complex, but lived in different buildings, she said. The owner of a local coffee shop said that Raymond was a regular customer, though he asked him to leave after he began discussing the dangers of Muslim immigrants. Investigators have not established a relationship between the accused and the deceased, said Fredericton deputy police chief Martin Gaudet. “That is a piece of information we’re looking to establish, and we haven’t established it yet,” he said at a news conference outside police headquarters, where residents have placed flowers, notes and teddy bears for the fallen officers. WATCH: Heartbroken Fredericton tries to heal as shooting suspect charged 2:29 Heartbroken Fredericton tries to heal as shooting suspect charged Heartbroken Fredericton tries to heal as shooting suspect charged While little is known about the alleged gunman’s potential motives, police have begun piecing together what happened. Story continues below advertisement Investigators allege a man shot at Wright and Robichaud from an elevated position shortly after 7 a.m. Friday, using a long gun. They said Costello and Burns were responding to the shooting and found two victims on the ground, a man and woman. That’s when the officers were shot, police said. Officials said Saturday that just one person was hospitalized after the shooting – Raymond, who is being treated for serious injuries after being shot by police. He is to remain in custody until he appears in court Aug. 27, police said. In an interview, Aguilar said that at one point maintenance workers needed to do some repairs in his apartment and he didn’t want them there while he wasn’t present. WATCH: Police provide update on Fredericton shooting, announce charges Story continues below advertisement “He seemed concerned, he said he had an expensive computer and an expensive bike and he didn’t want anyone to be there alone,” she said. “They didn’t even have to go all the way into the apartment, they were just fixing his door frame at the time.” She said she didn’t interact with Robichaud much because he didn’t come into the office to make his rent payments, and she did not know if he knew Raymond. As of Saturday morning, the area surrounding the crime scene remained cordoned off by yellow tape, but police allowed some shaken residents through to check on their pets. An RCMP forensic unit was on scene and police could be seen moving through the complex of low-rise brick apartments. More than half a dozen bullet holes could be seen in the window of an upper-floor corner apartment, while a second window appeared to have been mostly smashed. Joe Cartwright emerged from the building to say all the doors in the complex had been kicked in and one of his cats had escaped. Cartwright said his girlfriend, Caitlyn Francis, and four-year-old son had been at home during the shooting, and he rushed to the scene in a panic once he realized his family could be in danger. Story continues below advertisement “I’m very torn up,” he said. “I’m not doing very well at all, my girlfriend’s not, my son’s not, so we’re going to go and just try to calm down from this.” WATCH: Fredericton police confirm identities of civilians killed in shooting 0:49 Fredericton police confirm identities of civilians killed in shooting Fredericton police confirm identities of civilians killed in shooting Francis said she had been getting her stepson ready for daycare at 7:10 a.m. when she heard police sirens. She looked out and saw a police car pull in, driven by a man she believes was Costello. “Not even a minute or two later I heard the first gunshot,” she said Saturday morning, as she stood wrapped in a Red Cross blanket outside the apartment complex. “I started bolting into my apartment and heard a second one.” Story continues below advertisement The next moments were a blur as she focused on keeping her stepson safe and calm as several more shots could be heard, she said. WATCH: Coverage of the Fredericton shooting “I pulled him into my bedroom, got him to lay on the floor back there, tried to play cartoons for him, but he still could hear (the gunshots),” she said. “There was no playing off what those sounds were, he knew it.” Five minutes after the gunfire ceased, she said she peeked out the window and saw the leg of a person who was lying on the ground. Police have asked anyone who captured photos or video of the incident to come forward. Story continues below advertisement Fredericton police said Friday night that the city and Red Cross had found lodging for 50 residents unable to return to their homes on Brookside Drive on the city’s north side. At least 10 children lost a parent in the shooting. Costello, 45, was a 20-year police veteran with four children, while Burns, 43, had been an officer for two years and was married with three children. On Saturday evening, the Fredericton police released statements from both officers’ families. WATCH: 2 police officers among 4 killed in Fredericton shooting 4:12 2 police officers among 4 killed in Fredericton shooting 2 police officers among 4 killed in Fredericton shooting Burns’ family expressed sympathy for the families of Costello and the other victims, and asked for privacy as they grieved. Story continues below advertisement “Sara absolutely loved her job, and went to work each shift committed to serving this great community. We appreciate all of the thoughts and prayers during this difficult time,” the statement said. Costello’s partner, Jackie McLean, said in a statement of behalf of the family that she also sought privacy, but wanted to say a few things about him. “Robb was the single most positive person I have ever met; and that was obvious to everyone who met him. He had a special way of dealing with people – fair, but strong and tough when needed. He was the only officer I’ve ever known to write a ticket and have the recipient thank him for it,” she said. Tweet This “He was often heard to say he was a ‘CFL’ – constable for life. He loved the people, he loved the variety of calls, but mostly he loved being able to de-escalate an escalating situation. I know he responded eagerly and willingly to that last call.” Robichaud, a father of three who played bass and sang in a few local bands, had just begun dating Wright. “It is just unfair, cruel and senseless. I have a lot of mixed emotions right now. I just pray to God that justice is served in this situation,” said Amanda Lee Leighton, 32, of Fredericton, a close friend of Wright. Story continues below advertisement “I feel horrible that this could happen to one of the nicest girls I had ever known. Literally, she never fought with anyone or disliked anyone,” she wrote in a text. -With Nicole Thompson and Gabriele Roy in Toronto and Alex Cooke and Michael Tutton in Halifax
{ "pile_set_name": "OpenWebText2" }
Ultrastructural characterization and Fourier analysis of fiber cell cytoplasm in the hyperbaric oxygen treated guinea pig lens opacification model. The structural characteristics of differentiated fiber cells in control and hyperbaric oxygen (HBO)-treated guinea pig lenses were examined by transmission electron microscopy (TEM). Emphasis was placed on cell damage, membrane integrity, and cytoplasmic texture. Given the faint gross opacities observed in HBO-treated lenses in previous studies, it was hypothesized that subtle but significant morphological differences due to oxidative damage exist between control and treated animals. Experimental animals received either 70 or 85 treatments with HBO (2.5 atm of 100% O(2) for 2.5 hr, 3 times per week for 5-7 months). All specimens were obtained within 24 hr of death. Freshly cut Vibratome lens sections were fixed and processed for low and high-magnification thin-section TEM analysis. Cytoplasmic texture was analyzed using Fourier and autocorrelation image processing techniques. Low-magnification analysis revealed relatively insignificant differences in general appearance between the fiber cells of the inner fetal and embryonic nuclei in control and HBO-treated guinea pigs. Both groups demonstrated cells of similar morphology with equivalent membrane complexity and homogeneous cytoplasmic texture. Evidence of any major cellular damage or extracellular space debris was not obvious. High-magnification analysis of the cytoplasm of the treated lenses exhibited a mild, yet detectable increase in texture compared with controls and was confirmed by Fourier analysis. Cytoplasmic texture increased in complexity with additional treatments. The absence of major cellular damage in the lenses of HBO-treated animals suggests a less conspicuous source of light scattering. The small changes in cytoplasmic organization observed between treated and control animals may entirely account for the increase in nuclear light scattering observed by slit lamp. The results obtained with this guinea pig/HBO model parallel many of the morphological data associated with human nuclear cataracts. The high-angle scattering observed in the lens of the HBO-treated guinea pig may represent the type of cytoplasmic reorganization that occurs with mild oxidation, effectively making it a valuable model for human lens aging.
{ "pile_set_name": "PubMed Abstracts" }
All the pennies you spend add up to some serious purchasing power – why not use it for something good. Shopanthropic invites ethically-minded consumers to put their dollars to work and shift their spending toward a positive impact. Their trendy ‘feel good’ items are made from natural, organic materials by talented artisan groups across India and around the world. Add some fair-trade flair to your fashion repertoire with a Hand Embroidered Cotton or Silk Scarves ($30.00+) or clutches and bags ($12+). Find beautifully crafted artisan necklaces, pendants, bracelets and rings to complement your outfit. Decorate your home with colourful hand-crafted Cushion Covers ($30.00+) that support women in rural communities. Or gift someone an eco-friendly journal ($12+) with paper that has been created with the pulp from recycled scraps of waste textile. Shopanthropic does their part here at home too, lending their products to fundraising campaigns with local non-profits to promote social and economic development on the local as well as international scale. Accessorize in the inspiring style of social change with today’s ethicalDeal. So how does it work? First you go on the website, choose your city and purchase this ethicalDeal. Then starting June 7, choose your items online and enter your ethicalDeal voucher # in the promo/coupon code field. You can email info@shopanthropic.com to arrange for free local delivery within the downtown core. Otherwise shipping is a flat rate of $10.95 across Canada. It’s as simple as that! A reminder that this coupon expires October 6th, 2011. Check out the website here. A recent article published in the Wall Street Journal address the recent predominance of handicrafts in the fashion market. Instead of making products appear immaculate, with no trace of the handiwork behind them, this new trend is to embrace the “handmade craftsmanship.” So you might not be able to afford a Tom Ford Clutch worth $3,150 or a Hermès Bag worth $12,000 but you will be able to afford this new addition to our collection. New clutches at Shopanthropic This hand-embroidered Indian Silk clutch is made by women artisans in the southern state of Karnataka, India with the cooperation of a society actively involved with the local community in restoring the traditional art & crafts of the region. They are encouraging and training local ‘Lambani’ craftswomen and helping them in developing their traditional skills keeping current trends and styles in mind. By promoting and marketing their handicrafts, the society is playing a significant role in ensuring regular fair income to its artisans and improving the quality of life of these craftswomen. We are excited to be featuring products from Sandur Kushala Kala Kendra (SKKK), a cooperative that is reviving the traditional crafts of Sandur, and neighbouring areas in Karnataka, India, on our website now! We came across a blog post a few days ago which discussed the concept of “We First” – the platform that celebrates the brands, agencies, social entrepreneurs, not-profits and individuals choose when they serve social interests as well as their own interests. The blog outlined 10 core beliefs that defined the “We First” mentality. These beliefs recognize that “Me First” thinking hurts businesses and individuals, that “We First” thinking embraces digital and social technology, that the challenge to make “We First” thinking mainstream is to make brands be a force of change, and that this “we first” thinking has the power to “transform our world.” As we read through the 10 core beliefs, we started figuring out how these beliefs relate to Shopanthropic: An inter-dependent, global community requires an expanded definition of self-interest: By working to create a sustainable venture that is also profitable, we hope we are helping expand the definition of self-interest to include the concept that helping others can lead to helping oneself The future of profit is purpose: Having the double advantage of getting quality fashion and lifestyle products while helping the world become a better place is something that will help show how the future of profit is products that have a purpose Technology is teaching us to be human again: By using social media and other technology – we are putting human faces to our brand and stories Consumers want a better world, not just better widgets: We are providing high quality products that make the world a better place – both come hand in hand Brands must become architects of community: Social consumerism is still a concept that is yet to enter the mainstream market – we hope our brand can help build this new sense of community Brands and ad agencies must become day traders in social emotion: We don’t just want to provide products, we want to provide stories. Stories about our artisans, the charities we work with and our goals… The evolution of revolution is contribution: We don’t expect this change in consumer mindset to occur overnight. It will take time and effort. We want to contribute as the revolution evolves The false separation between living and giving must end: There is a common misconception that philanthropy is not part of everyday life. Through social entrepreneurship, we are hoping to make everyday purchases a method of giving, thereby removing the so-called separation between living and giving Life’s necessities must generate the necessities for life: We must look at our life necessities to figure out what is important to us in order to create a more sustainable world. By selling products that are eco-friendly and using natural materials – we hope to play our part in making the world better Prosperity is not the wealth of a few but the well-being of many: By working with artisans and charities – we hope to spread social and economic well-being to many people in some of the most impoverished reasons around the world “Sustainable business is about delivering the required quality at a competitive price using sustainable processes.” All of this brings up the question: are competitively priced, high quality sustainable products realistic? In our opinion, it is possible but it requires a lot of ingenuity, innovation and the willingness to make long-term investments. There are so many processes and stakeholders to consider in a sustainable business, summarized in the following questions: Is the process to making the product – sustainable? Is the process to making the product affordable? Is the product sustainable? Is the product high-quality? Is the product priced competitively? Is this price covering the cost it takes to produce the product including fair wages? Can this product sell? Can this product fit into mainstream consumer practices? If the answer to all of these questions is yes, then yes it is a sustainable business. However, if some of these answers are no – there is still much to be done. Do you think such a business is realistic? What other criteria do you see being necessary to determining how sustainable a business is? Recently, Yves Saint Laurent debuted a special-edition tote bag, dubbed the Muse Two Artisanal Recycled Handbag, made out of recycled plastic bags. With only 60 of these limited edition babies out, this bag retails for $1720. What’s so special about the bag? It has been handcrafted by women artisans in Burkina Faso (West Africa) from materials like plastic bags and recycled cotton. In fact, YSL has an ultra-exclusive “New Vintage” line, which uses unused fabrics from their past collections. At first look, this seems like an inspired step for an influential fashion retailer. On closer look, you realize its only 60 bags – 5 dozen – and this doesn’t really seem like an impactful number. Is this a sign of low-confidence in eco-friendly fashion or a chance for a haute couture retailer to test the sustainable fashion waters? Will this really make an impact? Whatever their decision behind the insignificant number, I am excited on the step that they have taken. You might not have the financial resources or the social connections to snag one of these exclusive and iconic pieces – but you have the inspiration to find other ways to implement eco-friendly fashion into your life. On June 16th, 2011, we are excited to host Ethical & Fair Trade Products in the Marketplace – A discussion & networking evening at Network Orange (ING Direct Café) on 221 Yonge St. in Toronto Ontario from 5pm to 7pm! The evening will be the first event of its kind with a goal to encourage and promote conversations focused on the state of sustainable and ethical products in our marketplace today. Ethically-made or fair-trade products have had an established history in Canada, however, ethical consumerism has lacked significant momentum in gaining mass market presence. Our panel (which will be announced soon!) will be focused on the discussion of where this niche sector stands today and what must be done in order to achieve scale and mass market appeal. Consumerism can be used a tool to promote social change. Does the sector need to look at how traditional retail operates? Do fashion and industry trends need to play a greater part in ethical sourcing of products? What will it take to attract a larger group of consumers to go ethical? An exhibition in the US titled Paper Dresses Fashion Exhibition is giving the world a sample of an ultra-sustainable fashion product: paper dresses. Cheap, pretty, and wearable – these dresses would reduce the millions of tonnes of textile clothing that is discarded into landfills every year. Now this is 100% guilt free shopping, since they are cheap, environmentally-responsible, biodegradable, and easily disposable! The collection features pieces from 18th and 19th-century Japan and China, A-Line Souper’s from the 1960s and some modern creations. It is an interesting fantasy – walking around in paper clothing. However, if paper isn’t your material of choice – consider creations made through age-old artisan practices. There was a time when we didn’t have mile-high landfills and the concept of artificial materials. In our collection, fashion products like these Hand-Embroidered cotton stoles and this ‘I am Fair Trade’ Bag display hand-crafted fashion that is made of natural materials. These are materials that are easily available, often times bio-degradable and therefore easily disposable. So paper dresses may be a bit too extreme for you, but don’t fret, there are plenty of less extreme options (Check out our collection!) for you to buy pretty, wearable and environmentally-responsible fashion! A unique program has been launched at the Cipinang Penitentiary in Indonesia, where young male prisoners are learning to stitch patchwork handicrafts from textile scraps from factories. These products are then sold in bazaars and exhibitions under the label “Elpina Craft.” These inmates and criminal offenders are referred to as sampah masyarakat, dangerous and useless to society. Even after they serve their time, they suffer from the stigma of having been on the ‘inside’. Now, they are learning a skill they will help them to create new and useful items that may help them improve their lives. Not only do they develop their skills, but they also have a savings account in which the proceeds of their handicraft sales are deposited. Prisoners learn to work in a routine, to work in a better environment and have a sense of accomplishment, while empowering themselves and their communities. In fact, one of the inmates, Narto, plans to open a small shop selling handmade patchwork clothes and handicrafts after he is released in 2012. Such a story is great inspiration to the power that social entrepreneurs have around the world and the difference a skill like creating handicrafts can make in people’s lives. Many of our products at Shopanthropic have unique stories like this one. So check out our products and experience the difference handicrafts can make in your life and in the lives of the artisans to create these beautiful products. Share this: Like this: The Bay & Harbour Blog Bay & Harbour is the brainchild of a Toronto-based mother/daughter team with an eye for trend-setting, unique and high-quality fashion & lifestyle products. The pair is inspired by different cultures, handicraft techniques, discrete designs, and fashion trends from their travels around the world. Bay & Harbour as their outlet to share that love of design with others. The Bay & Harbour collections feature a variety of accessories & lifestyle products for both men & women. The co-founders are passionate about fashion with a cause. Many of the Bay & Harbour collections also include pieces that are sustainable and / or ethically made.
{ "pile_set_name": "Pile-CC" }
Q: Undefined offset 1 errors on using "Business Connect" theme with drupal 7 I installed the "Business Connect" theme in drupal 7.10, this theme is working fine, but some time I receive these error messages. If I install another theme then no error messages display, it means that the problem is with "Business Connect" theme’s template.php file. Error messages: Notice: Undefined offset: 1 in businessconnect_process_page() (line 44 of C:\xampp\htdocs\my-site-name\sites\all\themes\businessconnect\template.php). Notice: Undefined offset: 2 in businessconnect_process_page() (line 44 of C:\xampp\htdocs\my-site-name\sites\all\themes\businessconnect\template.php). Notice: Undefined offset: 3 in businessconnect_process_page() (line 44 of \C:\xampp\htdocs\my-site-name\sites\all\themes\businessconnect\template.php). Template.php code : if ($variables['is_front']) { $variable=$variables['title']; $text=(explode(" ", $variable)); $variables['title'] = '<span>'.$text[0].' '.$text[1].' '.'<span class="title_default">'.$text[2].' '.$text[3].'</span>'.'</span>'; } line# 44: $variables['title'] = '<span>'.$text[0].' '.$text[1].' '.'<span class="title_default">'.$text[2].' '.$text[3].'</span>'.'</span>'; A: At the risk of @hakre getting mad at me ... :) The error message is the result of the business connect script referencing variables that don't actually exist ($text[1], $text[2], $text[3]). You can correct the problem by replacing line #44 with the following: for ($i=0;$i<4;$i++) { $var = "mytext$i"; $$var = isset($text[$i]) ? $text[$i] : ''; } $variables['title'] = '<span>'.$mytext0.' '.$mytext1.' <span class="title_default">'.$mytext2.' '.$mytext3.'</span></span>'; Hacking up the internals of third-party scripts isn't usually a good idea ... but in a case like this it's unlikely the insufficiently experienced person who created the theme will be correcting the issue any time soon.
{ "pile_set_name": "StackExchange" }
UPDATE: SUCCESS!!! WE REACHED OUR GOAL OF $3,000!! THANK YOU THANK YOU THANK YOU TO EVERYONE WHO HELPED US KNOCK THIS OUT IN SUCH A SHORT PERIOD OF TIME!!!! BUT THERES MORE.... For anyone still interested in pre-ordering a copy of the new album and simple continuing to pledge towards the birth of this record, the kickstarter project will be open for pledges and pre-orders until September 16th at midnight. All rewards are still intact and no pledges will be charged until the end of the project (Sept. 16th at midnight).
{ "pile_set_name": "Pile-CC" }
Indoor positioning systems are useful for determining device location within buildings. One type of indoor positioning system is based on wireless access point fingerprinting. A common indoor wireless network is a WiFi network based on the IEEE 802.11 standard. An indoor positioning system stores “fingerprints” of expected wireless access point signal associated with various points or location in the facility. Meeting room allocation, scheduling and occupancy often relies upon a meeting organizer to correctly book the meeting room via a scheduling application and to faithfully adhere to start and end times. Many times people may use a meeting room without pre-booking the room via the scheduling system, or a pre-booked meeting may run late. Someone that has a subsequent booking of the meeting room may be unsure of whether the meeting room is occupied and whether he or she should possibly interrupt the meeting. If the meeting room is not equipped with a dedicated room occupancy sensor, e.g. a motion sensor, temperature sensor, or pressure sensor, for example, designed to detect the actual presence of a person, then someone outside the room may be unaware of whether the room is actually occupied. Like reference numerals are used in the drawings to denote like elements and features.
{ "pile_set_name": "USPTO Backgrounds" }
Ask a number of enthusiasts to define “folk music” and you will likely get as many different responses. They may talk about traditional British ballads and Appalachian mountain music or Vietnam War-era protest songs, Celtic or world music, blues and roots music, sung and played by legends and just-emerging singer-songwriters. Ask a “folkie” in Philadelphia the same question, and there really is just one answer: Gene Shay. For more than half a century, the Philadelphia native and radio pioneer has been introducing local and broader audiences to that ever-evolving body of music through his Sunday night shows and career-launching interviews with artists. A founder of the Philadelphia Folk Festival, he has not missed a year onstage as emcee in its 52-year history. He is the man who brought Bob Dylan to Philadelphia for his first concert in 1963, and, drawing on his second calling as an ad man, coined the name “World Café” for the popular WXPN-FM show, carried on National Public Radio. This week Shay, a 40-year Wynnewood resident, became one of the newest inductees in Philadelphia Music Alliance’s Walk of Fame. In a noon-time ceremony Oct. 24 – 50 years to the day from that Dylan concert -- bronze plaques honoring him and eight other major contributors to the city’s music legacy were unveiled on the Avenue of the Arts. Although the 78-year-old Shay has seen many other honors, he acknowledged in a recent interview, this one is special. “It feels good,” he said. “They are recognizing my career rather than individual things.” “Taking each one separately might not be notable,” he remarked – though many might argue with that – “but this pretty much is the work of my lifetime.” In that, Shay gives credit to the power of the music with which he has become identified. “There are people, lawyers , who have told me they changed their whole careers because of people like Phil Ochs. Music can change lives, it can stop wars.” Shay, born Ivan Shaner on March 4, 1935, to parents who owned a lingerie shop in Nicetown, may not have come to hosting a folk show with that realization, but the timing was certainly right. An alumnus of Olney High School, Shay said he enrolled at Temple University intending to pursue a focus in psychology, but was quickly drawn to the school’s new courses in television and radio, working on its student-run station in its early stages. Graduating to face the possibility of the peacetime draft, he volunteered for Army service and was posted to Germany, where he was an announcer for the American Armed Forces Radio. “I lived in a 13th-century castle overlooking the Main River. It was one of the happiest times of my life,” he recalled. Back in Philadelphia in 1959, he took an on-air job at WHAT-FM as a jazz DJ – jazz and classical music were his early preferences – but agreed to take on the station’s folk show when a colleague begged off. That show would migrate through five different radio stations to find its now longtime home at WXPN. It was around that same eventful time that Shay met his wife, Gloria, at a square dance. “Her guitar teacher and my guitar teacher were friends,” and, though she was dancing “with another guy,” he asked to be introduced, telling a friend, “That’s the kind of person I want to marry.” Gloria, an anthropologist who worked for many years as education director at the Mutter Museum, and Shay have been married 54 years. They have two daughters, Elana and Rachel, who grew up in Lower Merion, and two grandchildren. Shay, who describes as his mentor the late Dr. Kenneth Goldstein, a music professor and head of the Folklore Department at Penn, had gotten involved with the Philadelphia Folksong Society. Not long after his signature Sunday night show debuted in 1962, the Society was looking for help to put together an outdoor music festival, and Shay played a leading role. That fall, the first festival, then called Hootenanny, took place at the Wilson Farm (now Wilson Farm Park) in Tredyffrin. The owner, C. Colket Wilson, was a generous supporter of the arts, Shay said, having built a stage for summer rehearsals of the Pennsylvania Ballet, and let them use the land for free. Pete Seeger, a standard-bearer of the folk revival, performed that first year, for the grand fee of $150 – then “gave us the check back and told us, ‘Use it for the next one,’” Shay remembered. A few hundred people attended. “Tickets were like a dollar and a half.” The Newport Folk Festival had started three years earlier, but Shay said Philadelphia’s event followed a very different model. Newport was “a commercial enterprise,” intended to be a “money-maker.” Incongruously, it was staffed with Pinkerton guards for security. “When we decided to do ,” Shay explained, “we did it as a non-profit. We used kids in straw hats with a badge. They were our security.” The second year, Shay said he saw Seeger steering around a man who turned out to be Newport organizer George Wein. They were there checking out the mostly-volunteer model that has worked for the Philadelphia Folk Festival ever since. As it grew, organizers needed a larger home for the event. It found one in Upper Salford Township near Schwenksville on the Old Pool Farm, where it attracts thousands each August. It has done so through sun and rain and hurricane – Agnes, specifically, in 1972 – and in each of those years Shay has emceed, his notorious penchant for corny jokes unabated. In those same early years, Shay was interviewing and introducing to local listeners some of the leaders of a new generation of folk and folk-rock performers. Joni Mitchell reportedly sang “Both Sides Now” on Shay’s show, three days after she wrote it. Later, Jackson Browne debuted “For Everyman” on the program. Both performers were headliners at Bryn Mawr’s famous folk club, the Main Point, which was in its heyday in the early 1970s. Later, as the venue began to struggle, Shay, now a Main Line neighbor, pitched in to help owner Jeanette Campbell, known to audiences simply as “Mrs. Campbell.” With others, he organized a benefit concert at the Tower Theater, featuring Mitchell and Dave Van Ronk. The two shows sold out. “We kept going another five years,” Shay said, before the club finally closed in 1981. These days, Shay calls himself semi-retired, but he keeps a schedule that few would describe that way. He still does his weekly show, Sunday nights from 8 to 11 p.m. on XPN. He does two shows, Wednesdays and Saturdays from 5 to 7 p.m., on Folk Alley, the station’s 24-hour online music stream. And he presents shows with folk performers at Jamey’s House, a 60-seat venue not far from his home at Saint Joseph’s University. His “Folk Show” on Sunday nights attracts a loyal following as Shay continues to present traditional and new music. He stays at the forefront of the folk scene by “listening to as much as I can,” and taking part in organizations like the Northeast Regional and International Folk Alliances, attending the latter’s conferences in Canada. “I always felt I didn’t want to be static, to be put in a museum where people would have to come and dust me off” from time to time,” Shay said. On Thursday, Shay was honored along with others including Peter Richard Conte, maestro of the Wanamaker Organ, and songwriters Madara and White. The public ceremony in front of the Doubletree Center City on Broad Street, between Walnut and Spruce, was followed by a celebratory luncheon. (For a full list and more about the Walk of Fame, visit www.philadelphiamusicalliance.org.) His plaque joins more than 100 others bearing the names of Philadelphia greats like Dick Clark, whom Shay knew during “American Bandstand” days, Frankie Avalon, John Coltrane, Teddy Pendergrass and fellow Wynnewood resident Patti LaBelle. And in case you’re wondering, Gene Shay’s own definition of folk music goes something like this: “Folk music is music people make up in their homes, singing to family or to sing at their summer camps.” It can also be, as he has witnessed during his decades as a folk host, “music to express some idea, to get people to change their ideas about love and hate, peace and war.”
{ "pile_set_name": "Pile-CC" }
Attorney General William Barr told Congress last week that the Department of Justice and attorneys from the special counsel’s office were working together to redact four types of information from Robert Mueller’s full report before its release: grand jury information, classified information, information related to ongoing investigations, and information that would infringe on the privacy of “peripheral third parties.” Barr said the four categories would be color-coded, so lawmakers and the public would better understand the redactions in the report. He also said some of the redactions would come with short explanations. But the redactions will likely still make parts of the report difficult to read. We may not know what the secret material is, but at least we’ll know why it wasn’t disclosed. With that in mind, let’s break down each redaction category and what it means. Grand jury information Mueller used a grand jury to interview more than 500 witnesses and issue more than 2,800 subpoenas and 500 search warrants throughout his 22-month-long investigation. The attorney general will redact these materials from the report Thursday morning. Material collected through the grand jury process cannot be disclosed, according to Title III, Rule 6 of the Federal Rules of Criminal Procedure. The rules were put in place to protect the secrecy of federal investigations and people who may be under investigation but haven’t been charged with a crime. READ MORE: What to look for in the Mueller report Because of these guidelines, any grand jury material in the report must be redacted. Of all four categories of redacted material in the report, the rules protecting grand jury material are the most inflexible, Barr told Congress. Barr said the Department of Justice was working with attorneys in the special counsel’s office to identify the sections in the report that have grand jury material and need to be redacted. But while Barr does not have the authority to disclose grand jury material on his own, it can be released by court order. If court-ordered, disclosure of grand-jury matter may be made to a government attorney, other government personnel, or another federal grand jury, if the information involves foreign intelligence or counterintelligence. Barr has indicated that he is not going to seek such a court order, but others could make the request, including congressional Democrats. But attorneys said convincing the judge to release grand jury material is a long shot. Barr does not have the authority to disclose grand jury material on his own, but it can be released by court order. “Unless Attorney General William Barr walks arm-in-arm [to a judge] with Jerry Nadler, the chairman of the House Judiciary Committee, to say that there is a need for this material in connection with an impeachment proceeding, it’s not going to be released,” said Robert Ray, who succeeded Ken Starr as head of the independent counsel investigation into former President Bill Clinton in the late 1990s. The D.C. Circuit Court of Appeals earlier this month ruled that with a few exceptions, including in response to an impeachment proceeding, federal judges cannot order grand jury material to be released. This decision could affect the disclosure of the grand jury material in the Mueller report; based on the ruling, Democrats would likely have to start the impeachment process before asking a judge to release grand jury information. “Democrats in Congress would have to make a difficult choice in order to initiate formally an impeachment proceeding in order to get grand jury material,” said Jessica Roth, a former federal prosecutor for the Southern District of New York. Barr said last week that he would work with the House and Senate Judiciary Committees to try to disclose grand jury materials if necessary. It’s unclear, however, if Barr and congressional leaders would wind up working together to disclose grand jury information, or if the process would spark a political and legal fight. Classified information The report will also redact any classified information that, if publicly released, would disclose secret intelligence sources and methods, or, put someone’s life at risk. Congress could see the sections of the report that fall into this classified information category, even if the public doesn’t. The Department of Justice could share it with a limited group of House and Senate leaders in a closed session, as often happens with classified intelligence information. As Barr noted in his testimony last week: “The fact that information is classified doesn’t mean that Congress can’t see it.” “I can envision a situation where under appropriate safeguards, that information would be shared,” Barr added. “I’m willing to work with the Judiciary Committee on that.” Information relating to ongoing investigations Barr also said he would redact any information in the report that pertains to ongoing investigations stemming from the special counsel’s original probe. Federal and state prosecutors across the country — from Los Angeles to Washington, D.C., and the Southern District of New York — are pursuing several inquiries and investigations that grew out of the Mueller probe. An example is the federal investigation into Michael Cohen, which Mueller referred to the prosecutors in New York. The exact number and the focus of these investigations is unknown. “You will recognize that special counsel Mueller did spin off a number of cases which continue in progress and are being handled in the department. And so, we have to make sure nothing in the report impinges on those ongoing cases,” Barr told Congress. Federal and state prosecutors across the country are pursuing several inquiries and investigations that grew out of the Mueller probe. Those redactions are likely only “temporary,” Ray said, because the information could be disclosed once the other investigations close. Information that would infringe on the privacy of individuals The report will also have redacted any information that could be damning to “peripheral third parties,” as Barr put it. This follows a long-standing Justice Department precedent to not release damaging information about uncharged individuals because they cannot defend themselves in court. (This category overlaps with protected grand jury material and information connected to other cases, both of which follow the same Justice Department guideline.) “The Department of Justice speaks through indictment. If it decides not to charge something, it says nothing,” Ray said. The most recent high-profile violation of this rule came in 2016, when former FBI Director James Comey wrote a letter to Congress about the bureau’s investigation into Hillary Clinton’s email use, though no charges had been brought against her. How the term “peripheral” will be applied to individuals mentioned in the report is unclear. Roth, the former federal prosecutor, said the president would likely not be considered “peripheral” to the investigation. Barr appeared to take that view at his recent congressional hearing. When asked if he would redact information to protect the reputational interests of the president, Barr responded: “No. I’m talking about people in private life, not public office holders.” Ray, the former independent counsel, said the general rule to redact information on non-indicted persons typically does not apply to the president, for two reasons: The president has the ability to defend himself publicly, and there is an overriding public interest to evaluate the president’s conduct. “I would imagine if the report arrives at Congress’ door with no mention of the president on the grounds that he is peripheral, [lawmakers] will push back tremendously,” Roth said.
{ "pile_set_name": "OpenWebText2" }
/* * jdcolor.c * * Copyright (C) 1991-1997, Thomas G. Lane. * This file is part of the Independent JPEG Group's software. * For conditions of distribution and use, see the accompanying README file. * * This file contains output colorspace conversion routines. */ #define JPEG_INTERNALS #include "jinclude.h" #include "jpeglib.h" /* Private subobject */ typedef struct { struct jpeg_color_deconverter pub; /* public fields */ /* Private state for YCC->RGB conversion */ int * Cr_r_tab; /* => table for Cr to R conversion */ int * Cb_b_tab; /* => table for Cb to B conversion */ INT32 * Cr_g_tab; /* => table for Cr to G conversion */ INT32 * Cb_g_tab; /* => table for Cb to G conversion */ } my_color_deconverter; typedef my_color_deconverter * my_cconvert_ptr; /**************** YCbCr -> RGB conversion: most common case **************/ /* * YCbCr is defined per CCIR 601-1, except that Cb and Cr are * normalized to the range 0..MAXJSAMPLE rather than -0.5 .. 0.5. * The conversion equations to be implemented are therefore * R = Y + 1.40200 * Cr * G = Y - 0.34414 * Cb - 0.71414 * Cr * B = Y + 1.77200 * Cb * where Cb and Cr represent the incoming values less CENTERJSAMPLE. * (These numbers are derived from TIFF 6.0 section 21, dated 3-June-92.) * * To avoid floating-point arithmetic, we represent the fractional constants * as integers scaled up by 2^16 (about 4 digits precision); we have to divide * the products by 2^16, with appropriate rounding, to get the correct answer. * Notice that Y, being an integral input, does not contribute any fraction * so it need not participate in the rounding. * * For even more speed, we avoid doing any multiplications in the inner loop * by precalculating the constants times Cb and Cr for all possible values. * For 8-bit JSAMPLEs this is very reasonable (only 256 entries per table); * for 12-bit samples it is still acceptable. It's not very reasonable for * 16-bit samples, but if you want lossless storage you shouldn't be changing * colorspace anyway. * The Cr=>R and Cb=>B values can be rounded to integers in advance; the * values for the G calculation are left scaled up, since we must add them * together before rounding. */ #define SCALEBITS 16 /* speediest right-shift on some machines */ #define ONE_HALF ((INT32) 1 << (SCALEBITS-1)) #define FIX(x) ((INT32) ((x) * (1L<<SCALEBITS) + 0.5)) /* * Initialize tables for YCC->RGB colorspace conversion. */ LOCAL(void) build_ycc_rgb_table (j_decompress_ptr cinfo) { my_cconvert_ptr cconvert = (my_cconvert_ptr) cinfo->cconvert; int i; INT32 x; SHIFT_TEMPS cconvert->Cr_r_tab = (int *) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, (MAXJSAMPLE+1) * SIZEOF(int)); cconvert->Cb_b_tab = (int *) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, (MAXJSAMPLE+1) * SIZEOF(int)); cconvert->Cr_g_tab = (INT32 *) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, (MAXJSAMPLE+1) * SIZEOF(INT32)); cconvert->Cb_g_tab = (INT32 *) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, (MAXJSAMPLE+1) * SIZEOF(INT32)); for (i = 0, x = -CENTERJSAMPLE; i <= MAXJSAMPLE; i++, x++) { /* i is the actual input pixel value, in the range 0..MAXJSAMPLE */ /* The Cb or Cr value we are thinking of is x = i - CENTERJSAMPLE */ /* Cr=>R value is nearest int to 1.40200 * x */ cconvert->Cr_r_tab[i] = (int) RIGHT_SHIFT(FIX(1.40200) * x + ONE_HALF, SCALEBITS); /* Cb=>B value is nearest int to 1.77200 * x */ cconvert->Cb_b_tab[i] = (int) RIGHT_SHIFT(FIX(1.77200) * x + ONE_HALF, SCALEBITS); /* Cr=>G value is scaled-up -0.71414 * x */ cconvert->Cr_g_tab[i] = (- FIX(0.71414)) * x; /* Cb=>G value is scaled-up -0.34414 * x */ /* We also add in ONE_HALF so that need not do it in inner loop */ cconvert->Cb_g_tab[i] = (- FIX(0.34414)) * x + ONE_HALF; } } /* * Convert some rows of samples to the output colorspace. * * Note that we change from noninterleaved, one-plane-per-component format * to interleaved-pixel format. The output buffer is therefore three times * as wide as the input buffer. * A starting row offset is provided only for the input buffer. The caller * can easily adjust the passed output_buf value to accommodate any row * offset required on that side. */ METHODDEF(void) ycc_rgb_convert (j_decompress_ptr cinfo, JSAMPIMAGE input_buf, JDIMENSION input_row, JSAMPARRAY output_buf, int num_rows) { my_cconvert_ptr cconvert = (my_cconvert_ptr) cinfo->cconvert; register int y, cb, cr; register JSAMPROW outptr; register JSAMPROW inptr0, inptr1, inptr2; register JDIMENSION col; JDIMENSION num_cols = cinfo->output_width; /* copy these pointers into registers if possible */ register JSAMPLE * range_limit = cinfo->sample_range_limit; register int * Crrtab = cconvert->Cr_r_tab; register int * Cbbtab = cconvert->Cb_b_tab; register INT32 * Crgtab = cconvert->Cr_g_tab; register INT32 * Cbgtab = cconvert->Cb_g_tab; SHIFT_TEMPS while (--num_rows >= 0) { inptr0 = input_buf[0][input_row]; inptr1 = input_buf[1][input_row]; inptr2 = input_buf[2][input_row]; input_row++; outptr = *output_buf++; for (col = 0; col < num_cols; col++) { y = GETJSAMPLE(inptr0[col]); cb = GETJSAMPLE(inptr1[col]); cr = GETJSAMPLE(inptr2[col]); /* Range-limiting is essential due to noise introduced by DCT losses. */ outptr[RGB_RED] = range_limit[y + Crrtab[cr]]; outptr[RGB_GREEN] = range_limit[y + ((int) RIGHT_SHIFT(Cbgtab[cb] + Crgtab[cr], SCALEBITS))]; outptr[RGB_BLUE] = range_limit[y + Cbbtab[cb]]; outptr += RGB_PIXELSIZE; } } } /**************** Cases other than YCbCr -> RGB **************/ /* * Color conversion for no colorspace change: just copy the data, * converting from separate-planes to interleaved representation. */ METHODDEF(void) null_convert (j_decompress_ptr cinfo, JSAMPIMAGE input_buf, JDIMENSION input_row, JSAMPARRAY output_buf, int num_rows) { register JSAMPROW inptr, outptr; register JDIMENSION count; register int num_components = cinfo->num_components; JDIMENSION num_cols = cinfo->output_width; int ci; while (--num_rows >= 0) { for (ci = 0; ci < num_components; ci++) { inptr = input_buf[ci][input_row]; outptr = output_buf[0] + ci; for (count = num_cols; count > 0; count--) { *outptr = *inptr++; /* needn't bother with GETJSAMPLE() here */ outptr += num_components; } } input_row++; output_buf++; } } /* * Color conversion for grayscale: just copy the data. * This also works for YCbCr -> grayscale conversion, in which * we just copy the Y (luminance) component and ignore chrominance. */ METHODDEF(void) grayscale_convert (j_decompress_ptr cinfo, JSAMPIMAGE input_buf, JDIMENSION input_row, JSAMPARRAY output_buf, int num_rows) { jcopy_sample_rows(input_buf[0], (int) input_row, output_buf, 0, num_rows, cinfo->output_width); } /* * Convert grayscale to RGB: just duplicate the graylevel three times. * This is provided to support applications that don't want to cope * with grayscale as a separate case. */ METHODDEF(void) gray_rgb_convert (j_decompress_ptr cinfo, JSAMPIMAGE input_buf, JDIMENSION input_row, JSAMPARRAY output_buf, int num_rows) { register JSAMPROW inptr, outptr; register JDIMENSION col; JDIMENSION num_cols = cinfo->output_width; while (--num_rows >= 0) { inptr = input_buf[0][input_row++]; outptr = *output_buf++; for (col = 0; col < num_cols; col++) { /* We can dispense with GETJSAMPLE() here */ outptr[RGB_RED] = outptr[RGB_GREEN] = outptr[RGB_BLUE] = inptr[col]; outptr += RGB_PIXELSIZE; } } } /* * Adobe-style YCCK->CMYK conversion. * We convert YCbCr to R=1-C, G=1-M, and B=1-Y using the same * conversion as above, while passing K (black) unchanged. * We assume build_ycc_rgb_table has been called. */ METHODDEF(void) ycck_cmyk_convert (j_decompress_ptr cinfo, JSAMPIMAGE input_buf, JDIMENSION input_row, JSAMPARRAY output_buf, int num_rows) { my_cconvert_ptr cconvert = (my_cconvert_ptr) cinfo->cconvert; register int y, cb, cr; register JSAMPROW outptr; register JSAMPROW inptr0, inptr1, inptr2, inptr3; register JDIMENSION col; JDIMENSION num_cols = cinfo->output_width; /* copy these pointers into registers if possible */ register JSAMPLE * range_limit = cinfo->sample_range_limit; register int * Crrtab = cconvert->Cr_r_tab; register int * Cbbtab = cconvert->Cb_b_tab; register INT32 * Crgtab = cconvert->Cr_g_tab; register INT32 * Cbgtab = cconvert->Cb_g_tab; SHIFT_TEMPS while (--num_rows >= 0) { inptr0 = input_buf[0][input_row]; inptr1 = input_buf[1][input_row]; inptr2 = input_buf[2][input_row]; inptr3 = input_buf[3][input_row]; input_row++; outptr = *output_buf++; for (col = 0; col < num_cols; col++) { y = GETJSAMPLE(inptr0[col]); cb = GETJSAMPLE(inptr1[col]); cr = GETJSAMPLE(inptr2[col]); /* Range-limiting is essential due to noise introduced by DCT losses. */ outptr[0] = range_limit[MAXJSAMPLE - (y + Crrtab[cr])]; /* red */ outptr[1] = range_limit[MAXJSAMPLE - (y + /* green */ ((int) RIGHT_SHIFT(Cbgtab[cb] + Crgtab[cr], SCALEBITS)))]; outptr[2] = range_limit[MAXJSAMPLE - (y + Cbbtab[cb])]; /* blue */ /* K passes through unchanged */ outptr[3] = inptr3[col]; /* don't need GETJSAMPLE here */ outptr += 4; } } } /* * Empty method for start_pass. */ METHODDEF(void) start_pass_dcolor (j_decompress_ptr cinfo) { /* no work needed */ } /* * Module initialization routine for output colorspace conversion. */ GLOBAL(void) jinit_color_deconverter (j_decompress_ptr cinfo) { my_cconvert_ptr cconvert; int ci; cconvert = (my_cconvert_ptr) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, SIZEOF(my_color_deconverter)); cinfo->cconvert = (struct jpeg_color_deconverter *) cconvert; cconvert->pub.start_pass = start_pass_dcolor; /* Make sure num_components agrees with jpeg_color_space */ switch (cinfo->jpeg_color_space) { case JCS_GRAYSCALE: if (cinfo->num_components != 1) ERREXIT(cinfo, JERR_BAD_J_COLORSPACE); break; case JCS_RGB: case JCS_YCbCr: if (cinfo->num_components != 3) ERREXIT(cinfo, JERR_BAD_J_COLORSPACE); break; case JCS_CMYK: case JCS_YCCK: if (cinfo->num_components != 4) ERREXIT(cinfo, JERR_BAD_J_COLORSPACE); break; default: /* JCS_UNKNOWN can be anything */ if (cinfo->num_components < 1) ERREXIT(cinfo, JERR_BAD_J_COLORSPACE); break; } /* Set out_color_components and conversion method based on requested space. * Also clear the component_needed flags for any unused components, * so that earlier pipeline stages can avoid useless computation. */ switch (cinfo->out_color_space) { case JCS_GRAYSCALE: cinfo->out_color_components = 1; if (cinfo->jpeg_color_space == JCS_GRAYSCALE || cinfo->jpeg_color_space == JCS_YCbCr) { cconvert->pub.color_convert = grayscale_convert; /* For color->grayscale conversion, only the Y (0) component is needed */ for (ci = 1; ci < cinfo->num_components; ci++) cinfo->comp_info[ci].component_needed = FALSE; } else ERREXIT(cinfo, JERR_CONVERSION_NOTIMPL); break; case JCS_RGB: cinfo->out_color_components = RGB_PIXELSIZE; if (cinfo->jpeg_color_space == JCS_YCbCr) { cconvert->pub.color_convert = ycc_rgb_convert; build_ycc_rgb_table(cinfo); } else if (cinfo->jpeg_color_space == JCS_GRAYSCALE) { cconvert->pub.color_convert = gray_rgb_convert; } else if (cinfo->jpeg_color_space == JCS_RGB && RGB_PIXELSIZE == 3) { cconvert->pub.color_convert = null_convert; } else ERREXIT(cinfo, JERR_CONVERSION_NOTIMPL); break; case JCS_CMYK: cinfo->out_color_components = 4; if (cinfo->jpeg_color_space == JCS_YCCK) { cconvert->pub.color_convert = ycck_cmyk_convert; build_ycc_rgb_table(cinfo); } else if (cinfo->jpeg_color_space == JCS_CMYK) { cconvert->pub.color_convert = null_convert; } else ERREXIT(cinfo, JERR_CONVERSION_NOTIMPL); break; default: /* Permit null conversion to same output space */ if (cinfo->out_color_space == cinfo->jpeg_color_space) { cinfo->out_color_components = cinfo->num_components; cconvert->pub.color_convert = null_convert; } else /* unsupported non-null conversion */ ERREXIT(cinfo, JERR_CONVERSION_NOTIMPL); break; } if (cinfo->quantize_colors) cinfo->output_components = 1; /* single colormapped output component */ else cinfo->output_components = cinfo->out_color_components; }
{ "pile_set_name": "Github" }
This study was undertaken to elicit barriers and knowledge gaps regarding the benefits of family planning among women in Irrua, Edo State, Nigeria. Using a cross-sectional design, a structured questionnaire was administered to 180 consenting women attending antenatal clinic sessions in a large hospital. The control of family size, 72/180 (40.0%) and child spacing, 64/180 (35.6%) were the major benefits of family planning stated. The most direct benefit to maternal health - absence of pregnancy complications - was the least mentioned (5%). A total of 18/180 (10.0%) stated that family planning w as of no benefit. No statistically significant association was demonstrated between educational levels and the knowledge of family planning benefits. Respondents aged 30 - 49 years were more likely than the younger ones to state child spacing as a benefit of family planning methods [logistic regression: p = 0.004; OR = 2.61 (95% CI = 1.37 - 4.98)]. The commonest reasons for objecting to family planning were the fear of infertility, 28/114 (24.6%), incom plete family size, 24/114 (21.1%), side effects of contraceptives, 19/114 (16.7%) and partners’ objection, 17/114 (14.9%). This study demonstrates important knowledge gaps with respect to family planning benefits. T his could reflect poor knowledge delivery or uptake on family planning. The findings suggest that women’s knowledge and experiences regarding family planning are crucial to interventions on fertility control. Overall, the study shows that the identified knowledge gaps and barriers reflect opportunities for holistic interventions including needs-sensitive health education for males and females on family planning.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The invention relates to cycloidal drives, and more particularly to drives for reciprocating parts which require speed reduction during intermediate portions of their strokes. An example of such driven parts is a mechanical welding press which requires a mid-stroke slow down so as to minimize shock to parts when they are being lifted from automation rails, and reduce the noise level inherent with this shock condition. Another example is an automation system in which a reciprocating shuttle on a conveyor must be slowed down at mid-stroke for similar purposes. 2. Description of the Prior Art Gervais U.S. Pat. No. 3,559,767 shows a planetary gear system with a crank arrangement describing an epicycloidal path in order to reduce the platen speed at certain points in the motion. This patented construction has a number of disadvantages as compared with the apparatus of this invention. It utilizes two fixed external sun gears and pin-ended joints, thus requiring two primary gear assemblies and making it impossible, because of the geometry of the construction, to support the bull gear shafts at opposite ends. Instead they must be cantilever mounted. It is further believed that the Gervais construction would not be interchangeable with most present day welding press configurations. Matsushita U.S. Pat. No. 3,971,261 pertains to a slide driving device for use in metal working presses which is of the cycloidal type. This patent utilizes an external fixed gear and exhibits certain disadvantages as compared with the present invention which will become apparent from the following description. Seki U.S. Pat. No. 3,956,942 also illustrates a cycloidal arrangement in which there is a reduction of velocity in the center of the stroke. However the mechanism is substantially different than that of the present invention, and advantages of the present invention wll become apparent below. The following patents are of interest insofar as they pertain to either cycloidal gear trains or to gear train arrangements having some features pertinent to the present invention: Staecker et al: U.S. Pat. No. 2,822,696 PA1 Fracke: U.S. Pat. No. 3,468,173 PA1 Koderman: U.S. Pat. No. 3,886,805 PA1 Hosoda et al: U.S. Pat. No. 3,921,465 PA1 Mori et al: U.S. Pat. No. 3,960,024 PA1 Obra: U.S. Pat. No. 4,020,708 PA1 Obra: U.S. Pat. No. 4,089,228 PA1 Drungil: U.S. Pat. No. 4,095,522
{ "pile_set_name": "USPTO Backgrounds" }
ITP–UU–02/43\ SPIN–02/25\ hep-th/0208145 [**Instantons in the Double-Tensor Multiplet**]{}\ Ulrich Theis and Stefan Vandoren\ [ *Spinoza Instituut, Universiteit Utrecht\ Postbus 80.195, 3508 TD Utrecht, The Netherlands\ U.Theis, S.Vandoren@phys.uu.nl*]{} ------------------------------------------------------------------------ **Abstract** The double-tensor multiplet naturally appears in type IIB superstring compactifications on Calabi-Yau threefolds, and is dual to the universal hypermultiplet. We revisit the calculation of instanton corrections to the low-energy effective action, in the supergravity approximation. We derive a Bogomol’nyi bound for the double-tensor multiplet and find new instanton solutions saturating the bound. They are characterized by the topological charges and the asymptotic values of the scalar fields in the double-tensor multiplet. ------------------------------------------------------------------------ Introduction ============ Instanton effects in string and M-theory are still relatively poorly understood. This is due to the lack of a conventional instanton calculus as we know it from (supersymmetric) field theory. A well-known open problem is to determine the instanton corrections to the hypermultiplet moduli space of type II superstrings or M-theory compactified on a Calabi-Yau (CY) threefold down to four or five dimensions. Supersymmetry requires the hypermultiplet moduli space ${\cal M}_H$ to be quaternion-Kähler [@BW]. The four- (or five-) dimensional dilaton lives in a multiplet which can be dualized into the universal hypermultiplet. Hence, ${\cal M}_H$ receives quantum corrections, and the instantons correspond to Euclidean $p$-branes wrapping $p+1$ cycles of the CY [@BBS]. The simplest setup for studying this problem, is to consider CY-compactifications of M-theory/type IIA superstrings with Hodge number $h_{2,1}=0$, or, for type IIB, $h_{1,1}=0$ [^1], since this yields a low-energy effective action of $N=2$ supergravity coupled to a single hypermultiplet, such that the moduli space ${\cal M}_H$ has dimension four. From a type IIB perspective, this hypermultiplet arises from dualizing the *double-tensor* multiplet, whose bosonic components descend from the $NS$-$NS$ and $R$-$R$ two-forms and scalars in ten dimensions. This suggests that instanton calculations should be done on the double-tensor multiplet side. In the next section, we shall make another argument, which also applies to type IIA and M-theory, why the double-tensor multiplet is more appropriate for our purposes. Yet, even in the case of a single hypermultiplet, it is difficult to compute instanton effects directly in string theory, without explicit knowledge of the instanton measure and the details of the wrapped branes along the CY cycles. Therefore, we will study this problem in a pure supergravity context, in which semi-classical instanton calculations can be done in the more conventional and “field-theoretic” way, following a similar strategy as in [@BB; @GS1], or as in [@R] for matter coupled to $N=1$ supergravity. Although being an approximation of the exact result, the hope is that the leading supergravity corrections, combined with the constraints from quaternion-Kähler geometry, and together with some knowledge from string theory on the isometries and singularity structure of ${\cal M}_H$, should fix the answer uniquely. Such a program has worked succesfully in the context of supersymmetric field theories in three dimensions with eight supercharges, where the hypermultiplet moduli space is hyperkähler [@SW; @DKMTV]. See [@OV; @K] for related issues. In this paper, we carry out the first steps of the supergravity instanton calculation. In section 2, we explain how the Euclidean theory is best understood in terms of the double-tensor multiplet, since then the action is manifestly positive definite, a requirement needed for a semiclassical approximation. In section 3, we derive a Bogomol’nyi bound and show that the instanton action is purely topological and given by a surface term. We then solve the BPS equation explicitly and compute the instanton action for the solutions. A similar approach was followed in [@BB] and [@GS1]. Compared to these papers, we propose a different Euclidean version of the universal hypermultiplet Lagrangian, so our results, where comparable, are somehow different. Moreover, we have found new instanton solutions, which will play an important role in understanding the quantum corrected hypermultiplet moduli space, as explained in the discussion at the end of the paper. The double-tensor multiplet =========================== As mentioned in the introduction, we are interested in the case of a single hypermultiplet coupled to $N=2$ supergravity. Classically, the four scalars of the universal hypermultiplet parametrize the homogeneous quaternion-Kähler manifold [@CFG; @FS] $$\label{UHM-QK} {\mathcal{M}}_H = {\frac{\raisebox{-2pt}{$\mathrm{SU}(1,2)$}}{\mathrm{U}(2)}}\ .$$ In a basis of real fields $\{\phi,\chi,\varphi,\sigma\}$, the bosonic Lagrangian takes the form[^2] $$\label{UHM-action} {\mathcal{L}}_\mathrm{UH} = - {\mathrm{d}}^D x\, \sqrt{g\,} R + {\tfrac{1}{2}}|{\mathrm{d}}\phi|^2 + {\tfrac{1}{2}}\, {\mathrm{e}}^{-\phi} \big( |{\mathrm{d}}\chi|^2 + |{\mathrm{d}}\varphi|^2 \big) + {\tfrac{1}{2}}\, {\mathrm{e}}^{-2\phi}\, |{\mathrm{d}}\sigma + \chi {\mathrm{d}}\varphi|^2\ ,$$ with $D=4$ or $5$, depending on whether one is interested in type II or M-theory compactifications. The Lagrangian has a global SU(1,2) isometry group. For our purposes, it will be convenient to discuss the dual version of ${\mathcal{L}}_\mathrm{UH}$ in terms of a double-tensor multiplet. Consider the first-order Lagrangian $$\label{DTM-action} {\mathcal{L}}_\mathrm{DT} = - {\mathrm{d}}^Dx\, \sqrt{g\,} R + {\tfrac{1}{2}}|{\mathrm{d}}\phi|^2 + {\tfrac{1}{2}}\, {\mathrm{e}}^{-\phi} |{\mathrm{d}}\chi|^2 + {\tfrac{1}{2}}M_{ab} *\! H^a {\wedge}H^b - \lambda_a\, {\mathrm{d}}H^a\ ,$$ where the $H^a$ are a doublet of $(D-1)$ forms, the $\lambda_a$ are two scalars, and $$M = {\mathrm{e}}^{\phi} \begin{pmatrix} 1 & - \chi \\[2pt] - \chi & {\mathrm{e}}^{\phi} + \chi^2 \end{pmatrix}\ .$$ The two scalars $\phi$ and $\chi$ parametrize the coset SL$(2,\fieldR)/ \mathrm{O}(2)$; in terms of the complex combination $$\label{tau} \tau \equiv \chi + 2{\mathrm{i}}\, {\mathrm{e}}^{\phi/2}$$ the scalar part of ${\mathcal{L}}_\mathrm{DT}$ can be written as $2|d\tau/\operatorname{Im}\tau|^2$. The tensor terms, however, break the global SL$(2,\fieldR)$ symmetry, leaving only shift symmetries of $\phi$ and $\chi$. The shift in $\chi$ acts as $$\label{shift-chi} \tau \rightarrow \tau + b\ ,\quad \begin{pmatrix} H^1 \\[2pt] H^2 \end{pmatrix} \rightarrow \begin{pmatrix} 1 & b \\[2pt] 0 & 1 \end{pmatrix} \begin{pmatrix} H^1 \\[2pt] H^2 \end{pmatrix}\ , \quad \begin{pmatrix} \lambda^1 \\[2pt] \lambda^2 \end{pmatrix} \rightarrow \begin{pmatrix} 1 & 0 \\[2pt] -b & 1 \end{pmatrix} \begin{pmatrix} \lambda^1 \\[2pt] \lambda^2 \end{pmatrix}\ ,$$ whereas the shift in $\phi$ acts as $$\label{shift-phi} \tau \rightarrow {\mathrm{e}}^\kappa \tau\ ,\quad \begin{pmatrix} H^1 \\[2pt] H^2 \end{pmatrix} \rightarrow \begin{pmatrix} {\mathrm{e}}^{-\kappa} H^1 \\[2pt] {\mathrm{e}}^{-2\kappa} H^2 \end{pmatrix}\ ,\quad \begin{pmatrix} \lambda^1 \\[2pt] \lambda^2 \end{pmatrix} \rightarrow \begin{pmatrix} {\mathrm{e}}^\kappa \lambda^1 \\[2pt] {\mathrm{e}}^{2\kappa} \lambda^2 \end{pmatrix}\ .$$ Note that the latter acts like an SL$(2,\fieldR)$ transformation on $\tau$, but not on the $H^a$. The full type IIB theory compactified to four dimensions (classically) has SL$(2,\fieldR)$ symmetry, due to the presence of additional tensor multiplets which transform nontrivially [@BGHL]. Setting the scalars in these multiplets to nonvanishing constants results in a breakdown of the symmetry and leaves only the above transformations as residual invariances. The equations of motion for the Lagrange multipliers $\lambda_a$ imply that the $H^a$ are closed. Writing $H^a={\mathrm{d}}B^a$, one obtains the double-tensor multiplet. Integrating out the tensors instead gives the duality relation $$\label{dual-rel} {\mathrm{d}}\lambda_a = - M_{ab} *\! H^b\ .$$ Substituting this back yields the action for the universal hypermultiplet , upon identifying $$\label{mult1} \lambda_1 = \varphi\ ,\quad \lambda_2 = \sigma\ .$$ The dual formulation in terms of the double-tensor multiplet is not unique[^3]. We can start with , but write everywhere $\varphi$ instead of $\chi$. Dualizing the tensors and identifying $$\label{mult2} \lambda_1 = - \chi\ ,\quad \lambda_2 = \sigma + \varphi\, \chi$$ yields the same hypermultiplet action, as one can easily check. In addition, the dualization procedure yields a boundary term which has to be added to the hypermultiplet action, $$\label{surf-term} {\mathcal{L}}_\mathrm{bnd} = (-)^D\, {\mathrm{d}}\big[ \lambda_a\, (M^{-1})^{ab} *{\mathrm{d}}\lambda_b\big]\ ,$$ where we used that, when acting on a $p$-form in Minkowski space, $**= -(-)^{(D-1)p}$. The different choices corresponding to and would now give different boundary terms. However, due to the isometries of the scalar manifold, they are related to each other by a field redefinition of the multipliers, $\tilde{\sigma}=\sigma+\varphi \chi$, $\tilde{\varphi}=-\chi$, $\tilde{\chi}=\varphi$. Substituting into , we get $${\mathcal{L}}_\mathrm{bnd} = (-)^D\, {\mathrm{d}}\big[ {\mathrm{e}}^{-\phi} \chi *\! {\mathrm{d}}\chi + {\mathrm{e}}^{-2\phi} \sigma *\! ({\mathrm{d}}\sigma + \chi {\mathrm{d}}\varphi) \big]\ .$$ The total action for the universal hypermultiplet is then $${\mathcal{L}}= {\mathcal{L}}_\mathrm{UH} + {\mathcal{L}}_\mathrm{bnd}\ .$$ The fermions have been suppressed here. For hypermultiplets, the supersymmetry transformation rules and the fermion-terms in the Lagrangian are known in general. For the double-tensor multiplet Lagrangian , the fermion-terms and susy rules can be determined by dualization. However, the most general self-interacting supersymmetric double-tensor multiplet Lagrangian has not been worked out. For a discussion on this in the context of rigid $N=2$ supersymmetry, we refer to [@B]. Euclidean formulation {#euclidean-formulation .unnumbered} --------------------- To find instanton solutions, we need the Euclidean formulation of the universal hypermultiplet, or, equivalently, the Euclidean double-tensor multiplet Lagrangian. For the latter, apart from the usual complications with the Euclidean Einstein-Hilbert term, the Wick rotation acts in the standard way on the scalars and tensors. While the double-tensor multiplet Lagrangian formally stays the same, $$\label{E-DTM} {\mathcal{L}}_\mathrm{DT}^E = {\mathrm{d}}^Dx\, \sqrt{g\,} R + {\tfrac{1}{2}}|{\mathrm{d}}\phi|^2 + {\tfrac{1}{2}}\, {\mathrm{e}}^{-\phi} |{\mathrm{d}}\chi|^2 + {\tfrac{1}{2}}M_{ab} *\! H^a {\wedge}H^b\ ,$$ the dual Euclidean universal hypermultiplet Lagrangian has two sign flips in the kinetic terms, due to the fact that we now have $**=(-)^{(D-1)p}$ when acting on a $p$-form in Euclidean space. The dualization procedure yields $$\label{EUHM-action} {\mathcal{L}}_\mathrm{UH}^E = {\mathrm{d}}^D x\, \sqrt{g\,} R + {\tfrac{1}{2}}|{\mathrm{d}}\phi|^2 + {\tfrac{1}{2}}\, {\mathrm{e}}^{-\phi} \big( |{\mathrm{d}}\chi|^2 - |{\mathrm{d}}\varphi|^2 \big) - {\tfrac{1}{2}}\, {\mathrm{e}}^{-2 \phi}\, |{\mathrm{d}}\sigma + \chi {\mathrm{d}}\varphi|^2\ ,$$ together with the boundary term $$\label{E-BT} {\mathcal{L}}_\mathrm{bnd}^E = - (-)^D\, {\mathrm{d}}\big[ {\mathrm{e}}^{-\phi} \chi *\! {\mathrm{d}}\chi + {\mathrm{e}}^{-2\phi} \sigma *\! ({\mathrm{d}}\sigma + \chi {\mathrm{d}}\varphi) \big]\ .$$ By setting $\varphi=\chi=0$, this boundary term is the same as for the $D$-instanton of type IIB in ten dimensions, obtained by dualizing the nine-form field strength into the $R$-$R$ scalar $\sigma$ [@GGP; @GG]. In four dimensions, we generate more terms due to the fact that we dualize two tensors. The sign flips of the kinetic terms of the two dual fields $\lambda_a$ are compatible with the prescription of Wick rotating pseudoscalars $\lambda_a\rightarrow{\mathrm{i}}\lambda_a$ [@vNW]. This is consistent with the duality relation . A Euclidean version of the universal hypermultiplet action was also proposed in [@GS1]. Both their bulk Lagrangian and boundary term differ from ours. This has important consequences since the instanton action defines the weight in the path integral, and hence correlation functions and eventually the quantum-corrected hypermultiplet moduli space will be different. Due to the sign changes in , the geometry of the scalar manifold is no longer SU(1,2)/U(2). Instead, it is given by the coset space $$\label{SL3} {\mathcal{M}}_H^E = {\frac{\raisebox{-2pt}{$\mathrm{SL}(3,\fieldR)$}}{\mathrm{SL}(2,\fieldR) \times \mathrm{SO}(1,1)}}\ ,$$ which is *not* a quaternion-Kähler manifold. This is not in contradiction with supersymmetry, since only *Minkowskian* supersymmtry requires the target space to be quaternionic [@BW]. A brief discussion on the geometry of the space is given in appendix \[SL3R\]. In four dimensions, the same target space can be obtained by applying the **c**-map [@CFG] to pure $N=2$ Euclidean supergravity [@TvN]. This turns the four bosonic degrees of freedom contained in the metric and graviphoton into the four scalars of the universal hypermultiplet and gives rise to the two sign flips. Moreover, the **c**-map maps Reissner-Nordstrom black hole solutions to D-instantons in the universal hypermultiplet, as was shown in [@BGLMM]. We remark that it is the inverted signs in the Euclidean hypermultiplet action that make instanton solutions in flat space possible. Indeed, the trace of the Einstein equation sets the bulk Lagrangian to zero, hence nontrivial field configurations would require a nonvanishing curvature scalar if the sigma model part of the Lagrangian were positive definite. The negative signs in allow for cancellations that are compatible with $R=0$. Note also that since on the hypermultiplet side the bulk action vanishes for any solution, the instanton action comes entirely from the boundary term discussed above. As already stated, the boundary term is different from the one proposed in [@GS1]. For this reason, we get different results for the instanton action, and eventually for the instanton corrected hypermultiplet moduli space. What is more important from the point of view of instanton calculations, is that the Euclidean Lagrangian is no longer positive definite. In a path integral formulation, this makes the finite action configurations irrelevant, since the action is not bounded from below. Moreover, perturbative fluctuations around the instanton yield diverging non-Gaussian integrals, and the semiclassical approximation would break down. Similar considerations apply to the $N=2$ tensor multiplet, whose Euclidean action is not positive definite. On the other hand, the Euclidean double-tensor multiplet Lagrangian is bounded from below, since the matrix $M_{ab}$ is positive definite. This leads to a well-defined semiclassical treatment, in which the instantons dominate the Euclidean path integral. For this reason, it is important to perform all calculations on the double-tensor multiplet side, and after having computed the instanton corrections there, we can dualize to the hypermultiplet formulation. Instanton solutions =================== Asymptotics ----------- Before finding the explicit instanton solutions, it will be useful to discuss the asymptotic behaviour of the fields that can lead to a finite action. Since the Euclidean action consists of three positive definite terms, each term individually should integrate to a finite quantity. For simplicity we consider for the moment flat four-dimensional space. This determines the following behaviour at infinity: $$\label{large-r} \phi \rightarrow \phi_\infty + \mathcal{O} \Big( {\frac{\raisebox{-2pt}{$1$}}{r^2}} \Big)\ ,\quad \chi \rightarrow \chi_\infty + \mathcal{O} \Big( {\frac{\raisebox{-2pt}{$1$}}{r^2}} \Big)\ ,\quad H_{\mu\nu\rho} \propto {\frac{\raisebox{-2pt}{$1$}}{r^3}}\ .$$ The asymptotic value of $\phi$ is identified with the four- (or five-) dimensional string coupling constant, $$g_s \equiv {\mathrm{e}}^{-\phi_\infty/2}\ .$$ The field strengths determine topological charges, defined by integrating the tensors $H^a$ over spheres at infinity, $$\label{HQ} \int_{S^{D-1}_\infty}\! H^a = Q^{(a)} \ ,\quad a = 1,2\ .$$ In the dual (hypermultiplet) formulation, topological charges become Noether charges, corresponding to the Peccei-Quinn symmetries which act as constant shifts in the Lagrange multipliers $\lambda_a$. These charges descend from the brane charges in ten or eleven dimensions, and, in the appropriate units, are expected to be quantized. The Euclidean space we shall concentrate on is actually flat space with a countable number of points, the locations of the instantons, excised[^4], $$\label{space} {\mathcal{M}}= \fieldR^D - \cup_i\, \{\vec{x}_i\}\ ,$$ such that non-trivial cycles with corresponding charges exist. Stated differently, in the supergravity approximation it will typically not be possible to find regular solutions at the locations of the instantons, as we will explicitly see below. The only singularity which can still lead to a finite action is a logarithmic singularity in $\phi$ at the origin, $$\label{small-r} \phi \rightarrow c\, \ln r\ ,$$ for some constant $c$. In our examples below, $\chi$ will tend to a constant $\chi_0$, and the tensors have the same $1/r^3$ behaviour such that the charges stay the same when the $H^a$ are integrated around an infinitesimal sphere around the origin. The Bogomol’nyi bound --------------------- The Euclidean double-tensor multiplet action is positive semi-definite (apart from the Einstein-Hilbert term). In fact, we can derive a lower bound by writing it as $${\mathcal{L}}_\mathrm{DT}^E = {\mathrm{d}}^Dx\, \sqrt{g\,} R + {\tfrac{1}{2}}*\! \big( N\! *\! H + O E \big)^t {\wedge}\big( N\! *\! H + O E \big) + (-)^D H^t {\wedge}N^t O E\ .$$ Here we have defined $$H = \begin{pmatrix} H^1 \\[2pt] H^2 \end{pmatrix}\ ,\quad E = \begin{pmatrix} {\mathrm{d}}\phi \\[2pt] {\mathrm{e}}^{-\phi/2}\, {\mathrm{d}}\chi \end{pmatrix}\ ,\quad N = {\mathrm{e}}^{\phi/2} \begin{pmatrix} 0 & {\mathrm{e}}^{\phi/2}\, \\[2pt] 1 & -\chi \end{pmatrix}\ ,$$ such that $N^t N=M$, and $O$ is some orthogonal (scalar) field-dependent matrix, whose appearance is due to the fact that $N$ and the zweibein $E$ are determined only modulo local O(2) transformations. Clearly, the action is bounded from below by $$\label{bound} S^E \geq \int_{{\mathcal{M}}} \big( {\mathrm{d}}^Dx\, \sqrt{g\,} R + (-)^D H^t {\wedge}N^t O E \big)\ ,$$ where the second term is topological, as it is independent of the spacetime metric. The bound is saturated by field configurations satisfying the BPS condition $$\label{BPS} * H = - N^{-1} O E\ .$$ A similar Bogomol’nyi equation was derived for an $N=1$, $D=4$ tensor multiplet (containing one tensor and one scalar) in [@R]. Notice that, if the matrix $O$ is invariant, this equation transforms covariantly under and . Equation is a proper BPS condition only if it implies the equations of motion, and this will fix the O(2) degeneracy. It is easily verified that field configurations satisfying have vanishing energy-momentum tensors, hence they can exist only in Ricci-flat spaces. We therefore have to amend our BPS condition by the equation $R_{\mu\nu}(g)=0$. For the field equations of the tensors, ${\mathrm{d}}(M\!*\!H)=0$, to hold we must have $$\label{closed} {\mathrm{d}}(N^t O E) = 0\ .$$ This condition also guarantees that the topological term in is closed and hence can locally be written as a total derivative. As a consequence, it does not contribute to the equations of motion such that also the field equations for the scalars are guaranteed to be satisfied. The latter follow from requiring that the solution of correspond to closed forms for $H^a$, $${\mathrm{d}}(N^{-1} O *\! E)=0\ .$$ To determine the O(2) matrices that are compatible with , we parametrize $O$ by $$O = \begin{pmatrix} 1 & 0 \\[2pt] 0 & {\epsilon}\end{pmatrix} \begin{pmatrix} c & -s \\[2pt] s & c \end{pmatrix}\ ,$$ where the functions $c(\phi,\chi)$ and $s(\phi,\chi)$ are constrained by $c^2+s^2=1$, and ${\epsilon}=\pm 1$ for the two components of O(2) with $\det O={\epsilon}$. Equation then gives rise to the differential equations $$\begin{aligned} 0 & = {\partial}_\phi c - {\mathrm{e}}^{\phi/2} {\partial}_\chi s \notag \\* 0 & = {\partial}_\phi s + {\mathrm{e}}^{\phi/2} {\partial}_\chi c - {\tfrac{1}{2}}(2{\epsilon}- 1) s\ . \end{aligned}$$ We derive the general solution in appendix \[appO2\]. The result is that there are *three* distinct BPS conditions corresponding to the O(2) matrices $$O_{1,2} = \pm \begin{pmatrix} 1 & 0 \\[2pt] 0 & {\epsilon}\end{pmatrix}\ ,\quad O_3 = \pm {\frac{\raisebox{-2pt}{$1$}}{|\tau'|}} \begin{pmatrix} \operatorname{Re}\tau' & -\operatorname{Im}\tau'\, \\[4pt] \operatorname{Im}\tau' & \operatorname{Re}\tau' \end{pmatrix}\ ,$$ invariant under both and . Here $\tau'=\tau-\chi_0$ with $\tau$ as in , $\chi_0$ is a real integration constant, and the plus and minus signs refer to the instanton and anti-instanton, respectively. For these three O(2) matrices the 1-form $N^t OE$ is exact, $$\label{dY} N^t O E = \pm\, {\mathrm{d}}Y\ ,$$ where modulo an additive constant $$Y_{1,2} = \begin{pmatrix} {\epsilon}\chi \\[2pt] {\mathrm{e}}^\phi - {\tfrac{1}{2}}{\epsilon}\chi^2 \end{pmatrix}\ ,\quad Y_3 = {\tfrac{1}{2}}\sqrt{4 {\mathrm{e}}^{\phi} + (\chi - \chi_0)^2\,} \begin{pmatrix} 2 \\ - \chi - \chi_0 \end{pmatrix}\ .$$ It follows that the action for BPS configurations is given by a topological boundary term $$\label{top-BT} S^E\,|_\mathrm{BPS} = (-)^D \int_{\mathcal{M}}H^t {\wedge}N^t O E = \mp \int_{{\partial}{\mathcal{M}}} Y^t H\ .$$ The instanton action is therefore determined by the charges $Q^{(a)}$ and the values of the fields $\chi$ and ${\mathrm{e}}^{\phi}$ at the boundaries. It is easy to find the corresponding BPS equation in the dual hypermultiplet formulation. Using , , and the fact that $M=N^t N$, we find for the Lagrange multipliers $${\mathrm{d}}\lambda = \pm\, {\mathrm{d}}Y\ ,$$ such that, up to a constant, the solutions for the two extra scalars are completely determined in terms of $\phi$ and $\chi$. Solutions and instanton action ------------------------------ We can solve the BPS condition for the three possible matrices $O$. For $O_1=\pm 1$, the condition reads $$\label{O1_BPS} * H = \pm \begin{pmatrix} \chi {\overset{\leftrightarrow}{{\mathrm{d}}}} {\mathrm{e}}^{-\phi} \\[2pt] {\mathrm{d}}{\mathrm{e}}^{-\phi} \end{pmatrix}\ .$$ Applying ${\mathrm{d}}*$ to the equation and using the Bianchi identities of $H$, we find that ${\mathrm{e}}^{-\phi}$ must be harmonic, and from the first component it then follows that also $\chi$ satisfies the Laplace equation, $$O_1:\quad {\mathrm{d}}*\! {\mathrm{d}}{\mathrm{e}}^{-\phi} = 0\ ,\quad {\mathrm{d}}*\! {\mathrm{d}}\chi = 0\ .$$ As mentioned above, scalars satisfying these conditions will also solve their field equations. In the following, we consider for simplicity spherically symmetric configurations (single instantons) in flat space only. The dilaton equation of motion is then solved by $$\label{O1_dil} {\mathrm{e}}^{-\phi} = {\mathrm{e}}^{-\phi_\infty} + {\frac{\raisebox{-2pt}{$|Q^{(2)}|$}}{\Omega_D\, r^{D-2}}}\ .$$ Here $\Omega_D=(D-2)\mathrm{Vol}(S^{D-1})$, and we have chosen the location of the instanton ($\vec{x}_1$ in ) as the origin. The integration constant $Q^{(2)}$ appearing in the solution is equal to the topological charge associated with $H^2$, as follows from the second equation of . The ‘selfdual’ instanton (upper sign in ) is taken for negative $Q^{(2)}$, the ‘anti-selfdual’ instanton for positive $Q^{(2)}$. Since, up to proportionality factors, there is only a unique spherically symmetric harmonic function, $\chi$ must be of the form $\chi=\chi_1 {\mathrm{e}}^{-\phi}+\chi_0$ with $\chi_0$, $\chi_1$ constant. It then follows from that $\chi_0$ is determined by $$\chi_0 = {\frac{\raisebox{-2pt}{$Q^{(1)}$}}{Q^{(2)}}}\ ,$$ and this relation is consistent with the shift symmetries and , since the charges transform non-trivially. The instanton action for $O_1$ is given by $$S_1^E = \mp \int_{{\partial}{\mathcal{M}}} \big[ \chi H^1 + ({\mathrm{e}}^{\phi} - {\tfrac{1}{2}}\chi^2) H^2 \big]\ ,$$ where the boundary consists of the disjoint union of two spheres, ${\partial}{\mathcal{M}}=S^{D-1}_\infty\,\cup\,S^{D-1}_0$, with radii as indicated. The terms involving $\chi$ will diverge on $S^{D-1}_0$ since $\chi$ is harmonic, so in order to obtain a finite action we have to take $\chi= \chi_0$ constant. This was already anticipated from the asymptotic behaviour of the fields, discussed in the beginning of this section. The action then reads $$S_1^E = \frac{\big| Q^{(2)} \big|}{g_s^2}\ .$$ This solution was also found in [@BB; @GS1], and should correspond to the fivebrane wrapping the entire Calabi-Yau [@BBS]. The instanton action is positive and hence does not distinguish instantons from anti-instantons. Imaginary theta-angle-like terms will have to be added to make this distinction. Turning to $O_2$, we have the BPS condition $$\label{H-O2} * H = \pm\, {\mathrm{d}}\begin{pmatrix} {\mathrm{e}}^{-\phi} \chi \\[2pt] {\mathrm{e}}^{-\phi} \end{pmatrix}\ .$$ Again, ${\mathrm{e}}^{-\phi}$ is harmonic, and the same now applies to ${\mathrm{e}}^{-\phi} \chi$. If one imposes rotational symmetry then $$\label{O2-sol} O_2:\quad {\mathrm{d}}*\! {\mathrm{d}}{\mathrm{e}}^{-\phi} = 0\ ,\quad \chi = \chi_1 {\mathrm{e}}^{\phi} + \chi_0\ ,$$ and from , it follows again that $Q^{(1)}=\chi_0 Q^{(2)}$. Notice that the field $\chi$ is now completely regular everywhere, and interpolates between the boundaries according to $$\Delta \chi \equiv \chi_\infty - \chi_0 = {\frac{\raisebox{-2pt}{$\chi_1$}}{g_s^2}}\ .$$ The complete solution agrees with the asymptotics derived in and . For this solution, with the dilaton again given by , the instanton action then becomes $$\label{S2-inst} S_2^E = \big| Q^{(2)} \big|\, \Big( {\frac{\raisebox{-2pt}{$1$}}{g_s^2}} + {\tfrac{1}{2}}\, (\Delta \chi)^2 \Big)\ .$$ For the particular case of $\Delta \chi=0$, the solution and instanton action are the same as for the $O_1$ solution. Notice also that both terms are positive and invariant under the shift symmetries and , as guaranteed by the properties of the original action. For $\Delta\chi\neq 0$, our instanton solution is new, and this term in the instanton action does not depend on the string coupling constant $g_s$. The appearance of $\Delta\chi$ in the instanton action is one of the new results in this paper. Its presence was somehow anticipated in [@BBS], and here we have computed it explicitly. We now turn to $O_3$. The BPS equation for this case reads $$* H = \pm {\frac{\raisebox{-2pt}{$1$}}{|\tau'|}} \begin{pmatrix} -2\, {\mathrm{d}}\phi + {\mathrm{e}}^{-\phi} (\chi + \chi_0)\, {\mathrm{d}}\chi + \chi (\chi - \chi_0)\, {\mathrm{d}}{\mathrm{e}}^{-\phi}\, \\[4pt] (\chi - \chi_0)\, {\mathrm{d}}{\mathrm{e}}^{-\phi} + 2 {\mathrm{e}}^{-\phi} {\mathrm{d}}\chi \end{pmatrix}\ .$$ We have been unable to find the general solution[^5]. Instead, let us consider two Ansätze for which we can explicitly solve the equations. First, we set $\chi=2\chi_1{\mathrm{e}}^{\phi/2} +\chi_0$. Then the equations simplify to $$* H = \pm 2\, {\mathrm{d}}{\mathrm{e}}^{-\phi/2} \begin{pmatrix} \sqrt{1 + \chi_1^2\,}\, \\[2pt] 0 \end{pmatrix}\ .$$ It follows that now ${\mathrm{e}}^{-\phi/2}$ is harmonic, with solution $${\mathrm{e}}^{-\phi/2} = {\mathrm{e}}^{-\phi_{\infty}/2} + \frac{\big|Q^{(1)}\big|} {2 \sqrt{1 + \chi_1^2\,}\, \Omega_D\, r^{D-2}}\ .$$ The scalar $\chi$ is then completely regular and interpolates between the boundaries as $$\Delta \chi = \chi_{\infty} - \chi_0 = \frac{2\chi_1}{g_s}\ .$$ Since $H^2=0$ we have $Q^{(2)}=0$, and for the instanton action we find $$\label{Sinst_O3_1} S_3^E = \big| Q^{(1)} \big|\, \sqrt{{\frac{\raisebox{-2pt}{$4$}}{g_s^2}} + (\Delta \chi)^2} = \big| Q^{(1)} \big|\, \big| \tau'_{\infty} \big|\ ,$$ where $\tau'_{\infty}=(\chi_\infty-\chi_0)+2{\mathrm{i}}\,{\mathrm{e}}^{\phi_{\infty}/2}$ is the value of $\tau'$ at infinity. For $\Delta\chi=0$, a similar solution was also found in [@GS1]. Following the discussion in [@BBS], it should correspond, from a IIA point of view, to the D2-brane wrapping a three-cycle in the Calabi-Yau, or to the D1+D3+D5-branes wrapping even cycles in type IIB. Notice again consistency with the symmetries and . Observe also that for $\Delta \chi=0$, the solution is inversely proportional to $g_s$, and is for small $g_s$ dominating over the fivebrane instanton . As a second Ansatz, consider $\chi=2\chi_1{\mathrm{e}}^\phi+\chi_0$. This differs from the first Ansatz in the power of ${\mathrm{e}}^\phi$. The BPS condition turns into $$* H = \pm 2\, {\mathrm{d}}\sqrt{{\mathrm{e}}^{-\phi} + \chi_1^2\,} \begin{pmatrix} 1 - \chi_1 \chi_0 \\[2pt] -\chi_1 \end{pmatrix}\ .$$ Accordingly, the square root must be harmonic, and we find for $\chi_1 \neq 0$ (the case $\chi_1=0$ is included in the previous Ansatz), $${\mathrm{e}}^{-\phi} = (h - \chi_1) (h + \chi_1)\ ,\quad h = \sqrt{ {\mathrm{e}}^{-\phi_\infty} + \chi_1^2\,} + \Big| {\frac{\raisebox{-2pt}{$Q^{(2)}$}}{2\chi_1}} \Big|\, {\frac{\raisebox{-2pt}{$1$}}{\Omega_D\, r^{D-2}}}\ .$$ The scalar field $\chi$ is regular everywhere and interpolates between zero and infinity as $$\Delta \chi = \frac{2\chi_1}{g_s^2}\ .$$ The BPS equation further fixes the constant $\chi_1$ to be $$\chi_1 = - {\frac{\raisebox{-2pt}{$Q^{(2)}$}}{Q^{(1)} - \chi_0 Q^{(2)}}}\ ,$$ and the instanton action is easily computed from , $$S_3^E = \big| \tau'_\infty \big|\, \Big( \big| \hat{Q}^{(1)} \big| + {\tfrac{1}{2}}\big| \Delta \chi\, Q^{(2)} \big| \Big)\ .$$ We have redefined the $Q^{(1)}$ charge according to $$\hat{Q}^{(1)} \equiv Q^{(1)} - \chi_0 Q^{(2)}\ ,$$ such that it is invariant under . For $Q^{(2)}=0$, the instanton action then clearly reduces to . The obtained results for the instanton action carry over to the hypermultiplet side, because the dualization procedure does not affect the real part of the instanton action. Discussion ========== In this paper, we have carried out the first steps of calculating instanton corrections to the hypermultiplet moduli space. An important ingredient was to derive a Bogomol’nyi bound for the double-tensor multiplet Lagrangian, and to solve the corresponding BPS equation. In a supersymmetric formulation, adapted to Euclidean space, we expect our instanton solutions to preserve one half of the supersymmetries. A more general formulation for the double-tensor multiplet Lagrangian, including the fermions and supersymmetry transformation rules, is presently under study. This will be important for finding the fermionic zero modes and eventually for computing instanton corrections to the relevant correlation functions that determine the hypermultiplet quantum-geometry. The exact moduli space must be consistent with the results derived in our paper. In particular, our supergravity instanton solutions should match with the results obtained from wrapping branes in the full ten-dimensional string theory. Stated differently, the universal hypermultiplet metric must contain exponential corrections which, at leading order in the string coupling constant and $\alpha'$, agree with the form of our instanton action. Using some results about quaternionic geometry [@CP; @DWRV], it should be possible to find quaternionic metrics which asymptotically reproduce our results. We intend to report further on these issues in the near future. Acknowledgements {#acknowledgements .unnumbered} ================ We thank Michael Gutperle and Thomas Mohaupt for discussions and reading an earlier draft of this paper. U.T. thanks the Deutsche Forschungsgemeinschaft for financial support. SL(3,R) / SL(2,R) $\times$ SO(1,1) {#SL3R} ================================== In this appendix, we discuss some geometrical aspects related to the sigma model corresponding to , with target space . The easiest way to study this space is by using the fact that the Minkowskian version of the universal hypermultiplet moduli space is both Kähler and quaternion-Kähler. Since Kähler geometry is simpler to analyze, we will study the coset from the point of view of Kähler geometry. Because of the sign flips compared to the Minkowskian version, the target space will no longer be Kähler. It is therefore not possible to define complex coordinates together with a Kähler potential that determines the metric. As we show below, it is still possible to define coordinates and a potential from which the metric can be computed. To see this, we first define the fields $$a = \sigma + {\tfrac{1}{2}}\chi \varphi\ ,\quad C_\pm = {\tfrac{1}{2}}(\varphi \pm \chi)\ ,$$ in terms of which the sigma model part of the Euclidean Lagrangian reads $${\mathcal{L}}_\mathrm{UH}^E = {\tfrac{1}{2}}|{\mathrm{d}}\phi|^2 - 2 {\mathrm{e}}^{-\phi} *\! {\mathrm{d}}C_+ {\wedge}{\mathrm{d}}C_- - {\tfrac{1}{2}}{\mathrm{e}}^{-2\phi}\, |{\mathrm{d}}a + C_+ {\overset{\leftrightarrow}{{\mathrm{d}}}} C_-|^2\ .$$ If we further pass to coordinates $u^1_\pm,u^2_\pm\in\fieldR$ via the relations $$S_\pm = {\mathrm{e}}^{\phi} \mp a - C_+ C_- = {\frac{\raisebox{-2pt}{$1 \mp u^1_\pm$}}{1 \pm u^1_\pm}}\ ,\quad C_\pm = {\frac{\raisebox{-2pt}{$u^2_\pm$}}{1 \pm u^1_\pm}}\ ,$$ then the Lagrangian can be written as $${\mathcal{L}}^E_\mathrm{UH} = 2 g_{ij} *\! {\mathrm{d}}u^i_+ {\wedge}{\mathrm{d}}u^j_-$$ with a metric $$\label{K+-} g_{ij} = - {\frac{\raisebox{-2pt}{${\partial}^2$}}{{\partial}u^i_+ {\partial}u^j_-}}\, \ln\! \big( 1 + u^1_+ u^1_- + u^2_+ u^2_- \big)\ .$$ The $u^i_\pm$ are inhomogeneous coordinates of the coset space , transforming under $M\in\mathrm{SL}(2,\fieldR)$ as $u_+ \rightarrow M u_+$, $u_-\rightarrow (M^{-1})^tu_-$. We have therefore identified a potential in terms of real coordinates which determines the metric components. Such spaces are called para-Kähler[^6]. The metric for the Minkowskian universal hypermultiplet moduli space is of the same form as in , but with $u^i_\pm$ treated as complex coordinates, where $u^i_-=- \bar{u}^i_+$ under complex conjugation. Determination of O(2) matrices {#appO2} ============================== We need to solve the differential equations $$\begin{aligned} 0 & = {\partial}_\phi c - {\mathrm{e}}^{\phi/2} {\partial}_\chi s \label{O2_1} \\[2pt] 0 & = {\partial}_\phi s + {\mathrm{e}}^{\phi/2} {\partial}_\chi c - {\tfrac{1}{2}}(2{\epsilon}- 1) s\ , \label{O2_2} \end{aligned}$$ where $c$ and $s$ are subject to the constraint $c^2+s^2=1$. We first multiply by $s$ and by $c$, respectively, and use $-s{\partial}s=c{\partial}c$ to write the equations as $$\begin{aligned} 0 & = s\, {\partial}_\phi c + {\mathrm{e}}^{\phi/2} c\, {\partial}_\chi c \label{O2_3} \\[2pt] 0 & = c\, {\partial}_\phi s + {\mathrm{e}}^{\phi/2} c\, {\partial}_\chi c - {\tfrac{1}{2}}(2{\epsilon}- 1) c s\ . \label{O2_4} \end{aligned}$$ Multiplying the difference of these equations by $c$ gives $$\label{O2_5} 0 = c \big[ c\, {\overset{\leftrightarrow}{{\partial}_\phi}} s - {\tfrac{1}{2}}(2{\epsilon}- 1) c s \big] = {\partial}_\phi s - {\tfrac{1}{2}}(2{\epsilon}- 1)\, (1 - s^2) s\ ,$$ which involves only $s$ and can easily be integrated: $${\frac{\raisebox{-2pt}{$s^2$}}{1 - s^2}} = {\frac{\raisebox{-2pt}{$1 - c^2$}}{c^2}} = f^2(\chi)\, {\mathrm{e}}^{(2{\epsilon}- 1) \phi}\ .$$ The positive integration constant $f^2$ may depend on $\chi$. These expressions we plug into the sum of and , $$\begin{aligned} 0 & = {\mathrm{e}}^{\phi/2} {\partial}_\chi c^2 + {\partial}_{\phi} (cs) - {\tfrac{1}{2}}(2{\epsilon}- 1) cs \notag \\[2pt] & = - {\frac{\raisebox{-2pt}{$2 f\, {\mathrm{e}}^{(3 - 4{\epsilon})\phi/2}$}}{(f^2 + {\mathrm{e}}^{(1 - 2{\epsilon})\phi} )^2}}\ \big[ {\partial}_\chi f \pm {\tfrac{1}{2}}(2{\epsilon}- 1)\, {\mathrm{e}}^{({\epsilon}- 1)\phi} f^2 \big]\ , \end{aligned}$$ where the sign ambiguity originates from taking the square root of $(cs)^2$. The equation is satisfied if the expression in square brackets vanishes. For ${\epsilon}=-1$, this is only possible if $f=0$ since $f$ is independent of $\phi$. For ${\epsilon}=+1$, which corresponds to $O\in \mathrm{SO}(2)$, we find $$f = 0 \quad\text{or}\quad f = \pm {\frac{\raisebox{-2pt}{$2$}}{\chi - \chi_0}}\ ,$$ with $\chi_0$ an integration constant. $f=0$ implies $c=\pm 1$ and $s= 0$. For nontrivial $f$ we obtain (with the relative sign fixed by the original equations and $\eqref{O2_2}$) $$c = \pm \frac{\chi - \chi_0}{\sqrt{4 {\mathrm{e}}^\phi + (\chi - \chi_0)^2\,} \,}\ ,\quad s = \pm {\frac{\raisebox{-2pt}{$2\, {\mathrm{e}}^{\phi/2}$}}{\sqrt{4 {\mathrm{e}}^\phi + (\chi - \chi_0)^2\,}\,}}\ ,$$ or in terms of $\tau'=(\chi-\chi_0)+2{\mathrm{i}}\,{\mathrm{e}}^{\phi/2}$, $$c + {\mathrm{i}}s = \pm {\frac{\raisebox{-2pt}{$\tau'$}}{|\tau'|}}\ .$$ [99]{} J. Bagger and E. Witten, *Matter couplings in $N=2$ supergravity.* Nucl. Phys. **B222** (1983) 1. K. Becker, M. Becker and A. Strominger, *Fivebranes, membranes and non-perturbative string theory.* Nucl. Phys. **B456** (1995) 130, `hep-th/9507158`. P.S. Aspinwall and B.R. Greene, *On the geometric interpretation of N = 2 superconformal theories.* Nucl. Phys. **B437** (1995) 205, `hep-th/9409110`. K. Becker and M. Becker, *Instanton action for type II hypermultiplets.* Nucl. Phys. **B551** (1999) 102, `hep-th/9901126`. M. Gutperle and M. Spalinski, *Supergravity instantons and the universal hypermultiplet.* JHEP **0006** (2000) 037, `hep-th/0005068`; *Supergravity instantons for $N=2$ hypermultiplets.* Nucl. Phys. **B598** (2001) 509, `hep-th/0010192`. S.-J. Rey, *The confining phase of superstrings and axionic strings.* Phys. Rev. **D43** (1991) 526. N. Seiberg and E. Witten, *Gauge dynamics and compactification to three dimensions.* In *The mathematical beauty of physics*, p. 333, Eds. J.M. Drouffe and J.-B. Zuber (World Scient., 1997), `hep-th/9607163`. N. Dorey, V.V. Khoze, M.P. Mattis, D. Tong and S. Vandoren, *Instantons, three-dimensional gauge theory, and the Atiyah-Hitchin manifold.* Nucl. Phys. **B514** (1998) 553, `hep-th/9703228`;\ N. Dorey, D. Tong and S. Vandoren, *Instanton effects in three-dimensional supersymmetric gauge theories with matter.* JHEP **9804** (1998) 005, `hep-th/9803065`. H. Ooguri and C. Vafa, *Summing up D-instantons.* Phys. Rev.Lett. **77** (1996) 3296, `hep-th/9608079`. S. V. Ketov, *Universal hypermultiplet metrics.* Nucl. Phys.**B604** (2001) 256, `hep-th/0102099`; *D-instantons and universal hypermultiplet.* CITUSC-01-046, `hep-th/0112012`. S. Cecotti, S. Ferrara and L. Girardello, *Geometry of type II superstrings and the moduli of superconformal field theories.* Int.J. Mod. Phys. **A4** (1989) 2475. S. Ferrara and S. Sabharwal, *Dimensional reduction of type II superstrings.* Class. Quant. Grav. **6** (1989) L77; *Quaternionic manifolds for type II superstring vacua of Calabi-Yau spaces.* Nucl. Phys. **B332** (1990) 317. R. Böhm, H. Günther, C. Herrmann and J. Louis, *Compactification of type IIB string theory on Calabi-Yau threefolds.* Nucl. Phys. **B569** (2000) 229, `hep-th/9908007`. B. de Wit, M. Roček and S. Vandoren, *Hypermultiplets, hyperkähler cones and quaternion-Kähler geometry.* JHEP **0102** (2001) 039, `hep-th/0101161`. F. Brandt, *New N=2 supersymmetric gauge theories: The double tensor multiplet and its interactions.* Nucl. Phys. **B587** (2000) 543, `hep-th/0005086`. G.W. Gibbons, M.B. Green and M.J. Perry, *Instantons and seven-branes in type IIB superstring theory.* Phys. Lett.**B370** (1996) 37, `hep-th/9511080`. M. Green and M. Gutperle, *Effects of D-instantons.* Nucl. Phys.**B498** (1997) 195, `hep-th/9701093`. P. van Nieuwenhuizen and A. Waldron, *On Euclidean spinors and Wick rotations.* Phys. Lett. **B389** (1996) 29, `hep-th/9608174`. U. Theis and P. van Nieuwenhuizen, *Ward identities for $N=2$ rigid and local supersymmetry in Euclidean space.* Class. Quant.Grav. **18** (2001) 5469, `hep-th/0108204`. K. Behrndt, I. Gaida, D. Lüst, S. Mahapatra and T. Mohaupt, *From type IIA black holes to T-dual type IIB D-instantons in N=2, D=4 supergravity.* Nucl. Phys. **B508** (1997) 659, `hep-th/9706096`. M. Davidse, M. de Vroome, U. Theis and S. Vandoren, *Instanton solutions for the universal hypermultiplet.* `hep-th/0309220`. D. Calderbank and H. Pedersen, *Selfdual Einstein metrics with torus symmetry.* J. Diff. Geom. **60** (2002) 485, `math.DG/0105263`;\ D. Calderbank and M. Singer, *Einstein metrics and complex singularities.* `math.DG/0206229`. V. Cortes, C. Herrmann and T. Mohaupt, in preparation. [^1]: By type IIB with $h_{1,1}=0$ we mean the mirror version of IIA with $h_{1,2}=0$. As explained in [@AG], this model has to be understood in terms of a Landau-Ginzburg description instead of a geometric compactification, since all CY manifolds are Kähler and have $h_{1,1}>0$. [^2]: Throughout this paper, we use form notation. Lagrangians are written as volume forms, and we use the notation $|\omega_p|^2\equiv *\omega_p{\wedge}\omega_p$. [^3]: This fact was already observed in [@DWRV]. The reason is that one can choose inequivalent commuting $U(1)\times U(1)$ factors in the isometry group SU(1,2) with respect to which we dualize the universal hypermultiplet into the double-tensor multiplet. The choices above correspond to shifts in $\varphi$ and $\sigma$, and a shift in $\sigma$ together with the transformation $\chi\rightarrow \chi+\epsilon$, $\sigma\rightarrow\sigma-\epsilon\varphi$. [^4]: A possible contribution to the action from a Gibbons-Hawking boundary term will then be absent. [^5]: The most general spherically symmetric solution was later found in [@DdVTV]. [^6]: A more general discussion on para-Kähler manifolds, in the context of Euclidean supergravity coupled to vector multiplets, will be given in [@CHM].
{ "pile_set_name": "ArXiv" }
Münstermann Münstermann is a surname of German origin. Notable persons having this surname include: Carl von Münstermann (1843–1930), professor of culture and technology at the Agricultural University of Berlin Hans Münstermann, (born 1947), Dutch novelist Henricus Münstermann (died 1537), Catholic priest and abbot of Marienfeld Julia Münstermann, German artist Lasse Münstermann (born 1979), German snooker player Ludwig Münstermann (1560 or 1575–1638/1639), German sculptor Paul Münstermann (1932–2010), former Vice President of the Federal Intelligence Service (Bundesnachrichtendienst) Peter Münstermann (born 1956), German politician (SPD) Willi Münstermann (1903–1982), German entrepreneur, sponsor of the Krefeld Penguins Category:German-language surnames
{ "pile_set_name": "Wikipedia (en)" }
Q: Select if comma separated string contains a value I have table raw TABLE ========= id class_ids ------------------------ 1 1234,12334,12341,1228 2 12281,12341,12283 3 1234,34221,31233,43434,1123 How to define regex to select raws if class_ids contains special id. If we select raws with '1234' in class_ids result list should not contain raws with '12341' in class_ids. IDs in column class_ids separated with , SELECT FROM raw re WHERE re.class_ids LIKE (regex) A: You shouldn't be storing comma separated values in a single column. However, this is better done using string_to_array() in Postgres instead of a regex: SELECT * FROM raw WHERE '1234'= any(string_to_array(class_ids, ',')); If you really want to de-normalize your data, it's better to store those numbers in a proper integer array, instead of comma separated list of strings A: If you really want to do this with regular expressions, you can use the ~ operator: SELECT FROM raw re WHERE re.class_ids ~ '^(^|,)1234(,|$)$'; But I prefer a_horse_with_no_name's answer that uses arrays.
{ "pile_set_name": "StackExchange" }
Arkansas is home to nearly 500,000 African-Americans; approximately 3,000 of those individuals identify themselves as United Methodists. According to Bishop Mueller, this low ratio must be thoughtfully examined, and addressed with urgency, if the church in Arkansas is to accomplish Step 9 of the Bishop’s Mission Plan: Create Vital African-American Congregations. “When we look at context, there are some unique factors that we must take into account,” Mueller said. “We do not have nearly as many strong, vital, self-sustaining African-American churches in Arkansas as we need.” Recognizing the historic realities of racism in Arkansas that have played a role in the involvement of African-Americans, Mueller acknowledges that this step of the plan is hard and important work. He also believes now is the time to invest in African-American churches in order to strengthen them—not only for their own sake, but also for the potential they hold for the future. “Strong churches can create more strong, self-sustaining churches,” he said. “In Arkansas today we have to invest, provide training and lift churches up in prayer so that we can reach out into the mission field.” Because of the importance of this task that affects not only African-American churches but also the entire Conference, Mueller has announced the appointment of the Rev. Maxine Allen to a reconfigured position of Assistant Director of Mission and Ministry for Mission Field Engagement, a full-time appointment effective July 1. “I’m excited to begin this new work in the Arkansas Conference,” Allen said. “I believe that with the guiding of the Holy Spirit, we can move forward in new and exciting ways that will extend beyond African-Americans and deepen our engagement in many of our mission fields.” The Step 9 launch team has met three times in various configurations. Allen said their discussions have ranged from an examination of the historical background of how African-Americans in Arkansas experienced the 1968 merger that gave birth to the United Methodist Church to envisioning what might be in store for the church in the future. “A young man on our team was raised outside of Arkansas and was not aware of deep-seated feelings and perceptions some historical events in Arkansas have created for African-American church members,” said Allen. “Our discussions have been wide-ranging and enlightening, and I believe they will bear fruit as we continue to work on this step of the mission plan.” In her new role, Allen will be responsible for connecting with existing African-American churches in Arkansas, as well as seeking new opportunities to increase ministry with Arkansas African-Americans through the UMC.
{ "pile_set_name": "Pile-CC" }
Q: Looking for ideas on how to display data on Files and Changelists/Bugs associated with them Title says mainly the problem. On my spare time for our group at school, I've written something to parse our p4 submissions and the files associated with each changelist. I've then created a tree structure and each file has a list of all the changelists and ones that pertain to bugs associated with them. I'm looking for awesome ideas on meaningful ways to display the data. Currently I've thought of: Pie chart of files with largest changelists (display only those past a certain threshold) Histogram The problem is tons of files have only 1-2 submissions.... Is there even a great way of showing this data? A: Take a look at code_swarm: Organic software visualization of project repositories. This is a great way to visualize repository changes over time in a very intuitive and appealing way. I have created videos for perforce projects with about 13000 changelists including more than 2 million file changes.
{ "pile_set_name": "StackExchange" }
Q: Forcing HTTPS requests in node.js server on azurewebsites I have node.js server deployed in IIS on azure web sites and i want to block or redirect http requests. I use express + socket.io in my server. I found 2 ways to do that: in actual socket.io code by passing allowRequest parameter to socket.io. So my code will look like that : var checkRequest = function (req, fn) { fn(err, true); }; var ioOptions = { pingInterval: socketPingInterval, pingTimeout: socketPingTimeout, path: "/" + config.API_VERSION + "/socket.io", allowRequest : checkRequest }; _socketListener = io.listen(server, ioOptions); the problem is that code never enters checkRequest method, and i dont know why. Add rule to web.config file. I checked several forums, and everybody says that if i add this code: <rule name="RedirecttoHTTPS"> <match url="(.*)" /> <conditions> <add input="{HTTPS}" pattern="off" ignoreCase="true" /> <add input="{URL}" pattern="/$" negate="true" /> <add input="{REQUEST_FILENAME}" matchType="IsFile" negate="true" /> </conditions> <action type="Redirect" url="https://{SERVER_NAME}/{R:1}" redirectType="SeeOther" /> </rule> It will redirect my hpt requests to HTTPS. But it still works and i can access via HTTP. Can anyonw help with any option ? A: Using Kudu Console, create an applicationhost.xdt file in your d:\home\site folder, containing the following: <rewrite xdt:Transform="InsertIfMissing"> <rules xdt:Transform="InsertIfMissing"> <rule name="Force HTTPS" enabled="true" stopProcessing="true"> <match url="(.*)" ignoreCase="false" /> <conditions> <add input="{HTTPS}" pattern="off" /> <add input="{WARMUP_REQUEST}" pattern="1" negate="true" /> </conditions> <action type="Redirect" url="https://{HTTP_HOST}/{R:1}" appendQueryString="true" redirectType="Permanent" /> </rule> </rules> </rewrite> </system.webServer> And remove whatever you added to your web.config. This should just work.
{ "pile_set_name": "StackExchange" }
Q: how to check what is inside javascript object Is there any method or way to check what is inside a JavaScript object. something like print_r in PHP? Cheers A: Use Firebug for Firefox or Developer Tools for Google Chrome/Safari to inspect your objects. It's the best way to do it in my opinion. A: Javascript objects are esentially maps of key/value pairs. You can access members through both dot notation (e.g. myObject.someProp), or even through index notation (myObject["someProp"]). The use of the latter will probably help you: function print(obj) { for (var i in obj) console.log(i + " - " + obj[i]); } } Run that through Firebug and see what you get :) A: If you use Mozilla Firefox, you can use Firebug. To see what your variable or object is, do it like code below (for example, I use JSON variable) var yourObject = {test: 'this is just a test'}; console.log(yourObject); After you install Firebug, run your html file that contains this javascript and choose Console tab in Firebug. You will see the result there. Hope this helps you. :)
{ "pile_set_name": "StackExchange" }
CLEOBURY MORTIMER, SHROPSHIRE, DY14 8JG Contagious West 2018: Hooked Technology; gambling; entertainment; drugs; body image; phones; success; shopping; porn; eating. It doesn’t matter what it is, they can all hook us into an unhealthy obsession. Christians struggle in this world of addiction, but we have a glorious message of light and hope that gives life.
{ "pile_set_name": "Pile-CC" }
Singapore Badminton Hall The Singapore Badminton Hall (Abbreviation: SBH; Chinese: 新加坡羽毛球馆; pinyin: xīnjiāpō yǔmáoqiúguǎn) is an indoor sports hall for badminton located at 1 Lorong 23 Geylang in Geylang, Singapore. Background Three years after the closure of the original Singapore Badminton Hall in 2008, the new Singapore Badminton Hall was opened in 2011 at Lorong 23 Geylang with an land area of 2,500 sqm. The current badminton hall has 14 of Olympic-standard courts, and was installed with permanent seatings for 400 spectators, hospitality and VIP viewing galleries, the hall was divided into two sections: with a premier section of six courts in an air-conditioned complex, and a deluxe section of eight courts without air-conditioning. There was also space to erect another 1,400 spectator seats for competitions. Outside the main hall, there is a gymnasium and 14 dormitory rooms for badminton trainees. It currently serves as a sport venue for badminton trainings and main tournaments like Singapore Badminton Association National Age-group Doubles Championships, the Pilot Pen National Age-group Singles Championships and the Li-Ning Singapore Youth Invitational Series. See also Sport in Singapore References Category:Sports venues completed in 2011 Category:Indoor arenas in Singapore Category:Badminton in Singapore Category:Geylang Category:Badminton venues
{ "pile_set_name": "Wikipedia (en)" }
Fee Arbitration To request arbitration of an attorney's fee.… Please read the Consent to Arbitration form carefully to be sure you understand the terms of the arbitration process. If you agree to those terms, and wish to request arbitration of your fee dispute, please sign and date the Consent to Arbitration form in the space for Complainant. Use the Statement of Facts form to provide a brief statement of the facts regarding your fee problem. Both forms should be signed, dated, and returned to this office. Please attach copies of any written fee contract or agreement, billing statement for services, or receipts for payment to the attorney. Arbitration is a voluntary process… Your written statement, copies and the signed consent form will then be forwarded to your attorney advising him or her that you have requested arbitration of his or her fee. Arbitration is a voluntary process, and the parties to a fee dispute, attorney and client, must give their written consent before a matter can be accepted for fee arbitration. Attorney-client fees are a matter of contract between parties and the Cincinnati Bar Association cannot intercede without the consent of all parties. If the attorney declines or consents… If your attorney declines to submit this matter to fee arbitration, you will be notified, and may pursue any remedy to which you may be entitled through the court system. If your attorney consents to fee arbitration, your written statement will be forwarded to the Fee Arbitration Committee of the Cincinnati Bar Association for appointment of a hearing panel. A member of that panel will contact you directly regarding the time, date, and place of the arbitration. Arbitration will then proceed in accordance with the terms described in the Consent to Arbitration form. After the arbitration, a written Opinion and Award will be issued by the hearing panel and a copy provided to all parties. For questions or assistance… If you have any additional questions or need assistance, please call the Cincinnati Bar Association at (513) 381-8213 and ask to speak with the grievance department.
{ "pile_set_name": "Pile-CC" }
Failing Italian Airline Faces Deadlines September 9, 2008 ROME (AP) — Government and union officials must reach a deal on a plan to save Alitalia by the end of next week because the failing airline cannot keep flying much longer, Italy’s labor minister said Monday. By mid-September, the state-controlled carrier could begin experiencing “operational problems, which in time can result in an impossibility to survive,” Maurizio Sacconi told reporters during a break in initial talks between the government and unions representing Alitalia workers. The head of a powerful labor confederation took a tough stand going into the meeting called to discuss plans to sell parts of Alitalia. CGIL labor confederation chief Guglielmo Epifani said the government should not expect unions to rubber-stamp the plan without substantive talks — especially concerning layoffs. Newspapers have reported that 5,000 to 7,000 jobs could be lost from a work force of 20,000. The laid-off workers might be enrolled on welfare programs for up to seven years, according to the reports. “There needs to be real discussion on the industrial plan,” Epifani said in an interview published in the daily L’Unita. “It is not a take-it-or-leave-it deal.” Speaking in Brussels, where he was attending an EU summit, Premier Silvio Berlusconi said the plan was conditional on union approval, but he added that “no” was hardly an option. “They can’t go against the right thing and against the only possible choice,” he was quoted as saying by Italy’s ANSA news agency. “The alternative is for all the 20,000 to go home.” Union opposition prompted Air France-KLM to abandon efforts to buy the failing carrier last spring. But analysts say that either the airline is sold or it will fail. “When Alitalia’s unions meet government officials to thrash out an understanding, they don’t start from a strong position,” the Center for Asia-Pacific Aviation said in an analysis. “But they still have the power to undermine Berlusconi’s ‘miracle’ — and that will be their main card.” Alitalia declared bankruptcy last week and has sought bankruptcy protection. Former finance minister Augusto Fantozzi was named by the government as the company’s administrator as part of the plan to restructure the unprofitable and debt-laden national carrier. The plan reportedly calls for breaking Alitalia into two parts, with the profitable assets to be taken over by a group of Italian investors ready to inject 1 billion euros ($1.5 billion) and the other assets liquidated. Italian investors are headed by Piaggio’s Roberto Colaninno.
{ "pile_set_name": "Pile-CC" }
Sequence of pituitary-adrenal cortical hormone responses to low-dose physostigmine administration in young adult women and men. We previously demonstrated greater HPA axis activation in adult men compared to adult women following low-dose administration of the anticholinesterase inhibitor, physostigmine (PHYSO). Because blood sampling was done infrequently following PHYSO, the rise times of AVP, ACTH1-39, and cortisol could not be determined. In the present study, we determined the sequence of hormone increases by frequent blood sampling following PHYSO. Twelve adult women and 12 adult men underwent three test sessions 5-7 days apart: PHYSO, saline control, and repeat PHYSO. As in the earlier study, PHYSO produced no side effects in half the subjects and mild side effects in the other half, with no significant female-male differences. None of the hormone responses was significantly correlated with the presence or absence of side effects. In both women and men, the AVP increase preceded the ACTH1-39 increase, which in turn preceded the cortisol increase. The AVP and ACTH AUCs were significantly positively correlated in both women and men, supporting AVP as an acute stimulus to ACTH secretion. Also as in the earlier study, the AVP response to PHYSO was more than twice as great in men as in women, but the difference was not statistically significant. We therefore analyzed the results of both studies combined (N=26 women and 26 men). The men had a significantly greater AVP response and a trend toward a greater ACTH1-39 response compared to the women. These findings further support the concept of sexual diergism (functional sex difference) in the influence of CNS cholinergic systems on HPA hormone secretion.
{ "pile_set_name": "PubMed Abstracts" }
Jerahmy meaning, origin, history | Meaning of name Name: JerahmyNo. of characters: 7Gender: Boy Origin of Jerahmy:UnknownHow to pronounce Jerahmy je-ra-hmy, jer-ah-my , What does my name mean?Meaning of Jerahmy:Son of Jeffrey Jerahmy was ranked 818 and came to ranking only once in list of US male names in 2000. Full form of Jerahmy : JoyfulExtrovertedRighteousAuthoritativeHumbleMoralYouthful Jerahmy is a rare first name for a boy in United States which is not even used by anyone since 2000. Only 8 people have Jerahmy as their first name. Jerahmy is not a native United States and Jerahmy may be came from another language or is a short form of some other name. 0.000002% of people in US have this given name. Complete history of Jerahmy Year Rank Occurence Rare boy name in 2000 818 8 Expression number of Jerahmy is 8. Jerahmy has the potential to attain power and authority in their life. Jerahmy are skilled and efficient who enjoys rivalries and Jerahmy does not back away from working hard to achieve what they have resolved in their mind Get the meaning of Jerahmy and celebrities who also shares the same name and some names related to Jerahmy, english baby names list, list of names in english. Know what does Jerahmy mean? This website serves as the extended english names list which will help in naming your child.
{ "pile_set_name": "Pile-CC" }
Monday, August 29, 2016 A RABBI WHO DEFENDS THE BURKINI BAN A senior Paris rabbi defended a string of controversial municipal bans in France on wearing the full-body swimsuit known as a burkini in public. Moshe Sebbag of the Grand Synagogue told JTA on Tuesday that he supported in principle the regulations adopted earlier this month in 15 French municipalities, including the famed beach resort Cannes. Last week, Prime Minister Manuel Valls said the garb, worn by Muslim women in accord with their religious views of modesty, was part of a “political project” to perpetuate female servitude. “It’s a complicated subject and both sides have compelling arguments,” Sebbag said in an interview. While the French state is a “secular country with freedom of religion,” he said, the mayors in question “understood this is not about women’s liberty to dress modestly, but a statement as to who will rule here tomorrow.” The rabbi added that this owed to recent jihadist terror attacks in France. “They understand today there’s a religious war, a takeover of the secular establishment of the French republic, and this is what they find unacceptable,” Sebbag said. Asked if he agrees with the burkini bans, he said: “Yes, because you see that going with it [a burkini] is not innocent, it’s sending a message.” Yes, the way those Muslims involved are going about it, it's clear they're doing everything they can to disgust the public and symbolize contempt. And, as I may have noted before, burkinis can be used to smuggle small weapons like dynamite sticks and grenades, and could even be used for drug smuggling. There's also hygiene to worry about. So all municipalities who consider the burkini a bad idea should stand firm on their decision to keep it off the beaches.
{ "pile_set_name": "Pile-CC" }
Used 2006 Honda Accord Sdn Values A carry-over from 2005, the Accord sedan is offered in VP (Value Pricing), LX, SE, and EX trim levels, and comes standard with a 2.4-liter four-cylinder engine that produces 166 horsepower linked to a five-speed manual transmission (or an optional five-speed automatic). There is also a 3.0-liter 24-valve V6 that produces 244 horsepower with a five-speed automatic transmission. The EX can be ordered with a six-speed manual transmission.
{ "pile_set_name": "Pile-CC" }
build/default/production/mcc_generated_files/boot/memory_partition.o: \ mcc_generated_files/boot/memory_partition.S \ mcc_generated_files/boot/boot_config.h build/default/production/mcc_generated_files/boot/memory_partition.o: \ mcc_generated_files/boot/boot_config.h \ mcc_generated_files/boot/memory_partition.S \
{ "pile_set_name": "Github" }
Day 9 She knew. Before the sun rose, Rags knew. It was a gaping hole in her heart, a certainty of loss. It was fury and grief. And tears. Goblins didn’t cry. It was a waste of water. But despite knowing that, despite knowing that the Goblins clustered around her were watching their Chieftain, she couldn’t stop. Nor could she explain the pain in her to her anxious tribe. She just knew, that was all. So she told them to search. The first thing they did was run a check on the patrols. But nothing had disturbed the camp’s perimeter during the night. So Rags told them to search for something else. Pyrite, Redscar, Noears, Poisonbite, and the other Hobs did just that. Dawn was just breaking when they realized someone was missing. Quietstab. There was nothing too unusual about that—Quietstab was a [Rogue] and good at hiding. But he hadn’t turned up and he would have with the entire camp abuzz with concern. That was when Rags knew. She knew, but she didn’t know. She didn’t want to know. So she told the others to look for him. She busied herself with getting her camp packed up, readying her tribe for the day’s march. But the tears wouldn’t stop. The other three tribes were rousing themselves as well. Tremborag’s Mountain City tribe, Garen’s Redfangs, and of course the army of the Goblin Lord, Reiss. Rags could see Goblins staring at her camp. They could tell something was wrong, too. She saw Reiss’ warriors moving to relay that information to a senior Hob, and Garen’s warriors watching with clear confusion. But Tremborag’s Goblins were different. They looked amused as Hobs and Goblins from Rags’ tribe started combing the camp systematically. They gathered, a vast mass of Goblins, the only group large enough to rival Reiss’ army, and watched and laughed. As if they knew something. Dark fear and suspicion wormed its way into Rags’ stomach. She knew, but she didn’t want to put the pieces together. Not yet. The tears had stopped by the time the first [Fireball] exploded overhead. It was time to move. But Quietstab was still missing. Rags strode around her camp, watching Reiss’ army take the lead and Garen’s small tribe begin to move as well. Tremborag’s Goblins were still watching. And her tribe— “Chieftain, orders?” Noears looked slightly nervous as he glanced at the line of mounted Humans beginning to approach from the south. More [Fireballs] were exploding overhead, warning the Goblins to move or die. Rags knew that the [Mages] would begin lobbing spells at them in minutes if they didn’t move. But she knew. “Not yet. Wait. Find Quietstab.” The earless Goblin [Mage] hesitated, but he didn’t argue further. Rags saw her Goblins glancing more and more rapidly at the coming Humans. Now even Tremborag’s tribe, usually slowest of the four tribes, was moving. The Humans were yet ten minutes away from reaching the spot where Rags stood at the speed they were travelling, but they were in range of the [Mage]’s spells. Any Goblins who got too close to the front line of advancing riders would die. And yet, Rags refused to move. She waited, watching the glittering line of horses and humans draw closer. Her Goblins looked to her nervously. Now they were alone, a small group of stationary Goblins compared to the mass of marching Goblins ahead of them. A spell exploded overhead, making Rags look up. She saw another spell—a long, sinuous cloud of green smoke—twist over the heads of the Goblins. It was shaped like a worm, but it had a Dragon’s face. It’s eyes were red and it roared at the Goblins, although the sound was silent. Below it, the Goblins backed away. Poison. Or something close to it. The [Mages] were getting impatient. And still, Rags didn’t move. She saw her warriors spreading outside her camp, searching, calling out at each other. And then one group approached the latrines. And stopped. Rags saw the ripple go through the searching Goblins without the need for words. The ones near the latrines waved their arms frantically as the Hob recoiled, his entire posture displaying shock and horror. And grief. In an instant, Pyrite was there. He stared down at something and then turned. Rags was already riding towards him. “Chieftain.” He met her halfway. The other Goblins were converging on the spot. But Pyrite blocked Rags’ Carn Wolf from going any further. She slid from the saddle, but Pyrite gently blocked her. “Chieftain.” “Is Quietstab there?” Pyrite nodded. He blocked Rags with one huge claw. Rags looked up at him. Pyrite’s eyes were troubled. She took a breath. “Bad?” “Bad.” “Show me.” It was not an order. Pyrite hesitated, but then he moved aside. Rags strode forwards, pushing Goblins aside. Since she was smaller than most, they had to realize she was pushing them and move aside for her. Goblins were crowded around the shallow ditch that was the latrines. Hobs, warriors, all looking down. All silent. Rags pushed a Goblin aside. She glanced down into the ditch and saw something lying down there. For a second her eyes didn’t put together the strange form that was lying there. It wasn’t dirt, or even a bad poo. It was green, twisted. It almost looked like— Rags recoiled. She stumbled away, her mind rejecting what it had seen. But just as quickly, shock became certainty. Rags heard pounding feet. She saw Poisonbite appear. The Goblin looked down and screamed in horror and fury. Noears was there, his eyes wide. Pyrite just looked down, his gaze finding the body that had been a Hob. Redscar rode forwards through the ranks of Goblins. He took one look and drew his sword. And Rags knew. She looked down into the pit that held a body. The form bent, twisted. And the head had been turned around, snapped. But she recognized the face. Quietstab looked up at her, his expression terrified. Rags felt the empty spot in her heart. But she had no time to look longer. She heard a scream and saw the poisonous serpent was swooping lower. Now she could feel particles of the gas spell drifting down, burning her eyes and skin. Pyrite blinked upwards and turned. He didn’t wait for Rags to give an order. “Run!” The Goblins around him started. They took one look at the Humans approaching and realized they were too close. They began to stream away from the pit, taking one last look. Poisonbite had to be grabbed by Noears. Redscar saluted the body with his sword, then rode away, shouting at the Goblins to move. “Chieftain.” Pyrite stood next to Rags. He spoke urgently, but she couldn’t take her eyes off the dead body. She didn’t move, even when Pyrite shook her. Only when he lifted her up did she react. Pyrite effortlessly heaved Rags up and onto the back of her Carn Wolf. He poked the wolf in the side and the animal growled. Pyrite growled back and the Carn Wolf bounded after the Goblins. Rags almost turned him back. Almost. But she didn’t have the strength to look at the miserable form lying there. Quietstab was dead. It had happened so suddenly. As they all slept. It didn’t seem possible. It didn’t seem right. Yet Rags was certain she knew the moment he had died. And then the shock gripping her faded. She asked the second question that was growing louder in her head. He had died. So someone had killed him. Who? And she already knew the answer. It was obvious. Rags rode with her head bowed, hearing more shouts as her tribe began to rush after the others. She slowly, painfully put together the conclusion in her mind, checking it for errors. But there were none. She rode at the head of her tribe, passing by her Goblins, her people. They watched her anxiously. Because now they knew. And then she looked up and saw him. He was marching in the center of his tribe, head and shoulders taller than the others. By his side walked his Hob liutenants, smug, wearing magical weapons and armor. And amid them was Ulvama, her nearly bare skin painted with symbols. But Rags had only eyes for Tremborag. He was watching her. The Great Chieftain of the Mountain was looking at her, at the Goblins in her tribe, watching as Pyrite ushered them forwards. And then he looked at Rags as she slowed to stare at him. Redscar drew up besides Rags. His sword was still bared. He peered at Tremborag. Yes, it was obvious. Tremborag wasn’t trying to hide it. He grinned with all his teeth, a massive face consumed with satisfaction and malicious glee. And then he laughed. There were tens of thousands of Goblins between him and Rags. An army, his tribe. Enough Goblins to overwhelm her smaller tribe by sheer numbers. And there he was, bloated, obscenely gloating. Rags glared at Tremborag. He laughed at her and then said something. She could not hear him, far away as they were and with the [Mage] spells roaring behind her. The roar of her blood in her ears would have drowned it out. But she could read his lips. See, child? Do you see? And she did see. Rags focused on Tremborag. Redscar grabbed her arm, looking worried. But Rags had no eyes for him. She stared at Tremborag. And she knew then that she would watch him die, or he would watch her. And she would write that promise a hundred thousand times in blood if need be. Rags lowered her head and Redscar relaxed. Then she grabbed her sword and screamed. —- Reiss rode ahead, but he looked behind. At her. The small Goblin who was somehow a child and adult as any Hob at the same time. Rags, the Chieftain of the Flooded Waters tribe. He could scarcely believe it. She was only a child, even by Goblin standards. But she was a Chieftain, and her tribe impressed him. If she had been born at the same time he and Garen had, would she have become…? No, not necessarily. Reiss shook his head. There was more to a Goblin Lord than just the size of a tribe. But there was something in Rags that hinted at that potential. It was raw, and she was too young. But Reiss thought he saw it. It gave him hope, or it had. But today, Reiss was guilty. He had watched Rags’ tribe moving about in confusion as dawn broke. All the Goblins had. They could sense the trouble in the Flooded Waters tribe, even if they didn’t know the reason. But Reiss did. He watched in silent agony as Rags sent patrols searching her camp, and then as they found the latrine where Quietstab lay. It wasn’t hard to understand why none of the other Goblins had spotted him in the early morning. They had all been asleep, and the pit was hardly a place where Goblins would investigate normally. But they found him. After that shock spread through their tribe. Shock and grief. And rage. Reiss sat on the back of the undead shield spider, watching Rags. She was fixed on Tremborag. So she’d put together who was responsible. That wasn’t hard. What came next was important, though. Reiss forced himself to watch; he couldn’t reveal that he knew what had happened. Not yet. Rags was very still as she sat on the back of her Carn Wolf. Reiss could see her looking at Tremborag. The Great Chieftain was laughing, surrounded by his warriors. And why not? It didn’t matter if Rags knew. His tribe was a sprawling mass of marching Goblins, lacking the discipline of Reiss’ black armored warriors, but too many to count. And he knew it. There was another Goblin riding next to Rags. Small, not a Hob, but one of her lieutenants. Reiss tried to remember his name, but couldn’t. He saw the Goblin arguing with Rags, pulling at her arm. Reiss watched, a lump churning in his stomach. But Rags was too still. She lowered her head. And then she grabbed her sword and tried to charge. “No. Stop her!” The Hobs, Reiss’ personal escort, looked up at their lord in confusion. Reiss forced himself not to move. His claws dug into the palm of his hand as he watched. The other Goblin—Redscar?—seized Rags before she could charge at Tremborag. Rags fought him, but he was clearly strong and he shouted for help. Hobs grabbed the Carn Wolf and slowed it. The fat Hob who knew too much, Pyrite, ran forwards. He knocked Rags from the saddle. She fought him and Redscar, screaming, though she was too far away for Reiss to hear. Her tribe encircled their Chieftain. And Tremborag and his Goblins watched the entire thing and laughed. Reiss lowered his head. He felt sick, but at least Rags wouldn’t charge to her death. He’d wondered what her reaction would be. And it had been genuine. Reiss turned in his saddle and looked around. The other Goblins could hardly miss what had occurred. They were glancing back at Rags’ tribe, clearly confused. Reiss turned and called, fighting the nausea. “Snapjaw!” One of the Goblins riding ahead of him turned. Snapjaw rode her horse towards Reiss. He eyed the ground and leapt from the back of his Shield Spider, landing with a grunt. “Lord? Trouble?” Snapjaw looked wary as she peeked at Rags’ tribe. Reiss shrugged. He glanced back at Rags’ tribe, pretending again not to know. “Go to the Flooded Water tribe. Ask what is happening.” “Yes, Lord.” Snapjaw turned her mount and whistled. Immediately, several of the Goblins under her command—Goblins who’d mastered horseback riding—joined her. She raced back towards Rags’ tribe. Reiss knew it would take her a while to come back. He looked at the mindless Shield Spider, moving forwards blindly. He didn’t want to ride it and pretend in front of all of his tribe. So instead he looked around and made eye contact with one of his Hobs. “Take me to her.” The Hob nodded. He poked his companion and conferred. Then he pointed through the crowd of Goblins. Reiss nodded. He followed the Hob as the Goblins parted for their Lord. There was no need for Reiss to say which ‘her’ he meant. The Goblin Lord walked through the ranks of his tribe, trying to smile at his subjects as they looked to him for reassurance, strength. He reached for something in his pocket, hunched his shoulders. He saw a group of burly Hobs part in front of him. And then he saw her. Osthia Blackwing was marching in the center of the ranks of Hobs. Her wings were bound, but both her hands and legs were free. She’d insisted on it. She’d told Reiss plainly that if she had to sit in a covered wagon all day, she would bite her tongue off. So he’d let her walk. “You.” The Drake looked up and met Reiss’ eyes challengingly, as she did every time they met. Reiss nodded. “Me.” He glanced at the Hobs surrounding them. “Give us space. Warn me if anyone approaches.” They nodded and spread out, forming a bubble of space around him and Osthia. Reiss waited until they were all clear, and then outlined a space in his mind. He whispered. “[Silent Air].” Instantly, the world went quiet. The sounds of the Goblins marching, of metal touching metal, even the sound of the wind itself—vanished. Reiss and Osthia walked in a bubble of silence. The Drake looked around and then at Reiss. “Worried someone will hear you?” “Yes.” The Drake blinked. It was still slightly amusing to Reiss how she reacted when he told her the truth. But Goblins almost never lied to each other and Reiss lied only when he had to. The Goblin Lord sighed. “What’s happening?” Osthia glanced over her shoulder. She couldn’t see what had occurred with the Flooded Waters tribe, but she was sharp enough to pick up on the reactions of the Goblins around her. Reiss even thought she’d picked up a few words of the Goblin’s dialect. He shook his head. “Tremborag killed a Hob from Rags’ tribe. Last night. They found the body this morning.” The Drake went still as she processed that. Her eyes flicked to Reiss’ face, and then she craned her neck, trying to see over the Hob’s heads. That was impossible. Her wings flexed a bit in their constraints. “I see. Tremborag’s the huge Hob you showed me. And Rags is—the small one?” “Yes.” “What’s she doing about it?” “Nothing. Yet. She tried to charge his tribe alone when she found out.” Osthia snorted contemptuously. “Idiot.” Reiss ignored that comment. After a moment, the Drake glanced at him. “Well? What are you going to do? I assume that this Tremborag violated some kind of Goblin law, didn’t he?” “It was not good. But there aren’t any ‘laws’ against it. His tribe will celebrate it and the other tribes will be furious. Especially the Flooded Waters tribe.” “Which is…?” “Rags’ tribe.” “Ah. So they’ll want revenge. So what will you do? Unless you’re coming to me for advice.” The Oldblood Drake glanced sidewise at Reiss. She was his enemy. And she hated him, but she hated his master more. That made them unlikely allies; Osthia would help Reiss, if only so that she could survive and escape when the time was right. Reiss had consulted her for advice, and the Drake had good ideas, even if she lied to him more often then she told the truth. Reiss shrugged, knowing she was trying to find out everything she could from him. “I will do nothing until Snapjaw comes back and tells me Quietstab is dead.” “Why would she do that?” Reiss turned his head slowly to regard Osthia. “Because I do not know Quietstab is dead and that Tremborag murdered him. Rags knows just now. I knew last night.” The Drake frowned. Her brows snapped together. “You knew? How?” For a second Reiss debated not telling Osthia. It was a risk. But he—the knowledge burned in his gut. He felt guilty, so against his better judgment, he confessed. “I watched him die. I could have stopped it. But I did not. Because one Hob’s death will help me save tens of thousands of lives.” Osthia’s eyes widened. For a moment she was surprised. But then contempt replaced surprise. She was not shocked. It was almost a relief. She had no expectations of Reiss. “I see. You were there?” “Invisible. I watched it happen. It was a necessity. It will make Rags’ tribe and my army allies.” It was an excuse. And it was the truth. But sometimes it felt like he was becoming more like his master with each passing day. Reiss closed his eyes for a second. When he opened them, Osthia was still looking at him with narrowed eyes. “I see. I suppose I shouldn’t have expected anything else from you. Goblins betray even their allies, it seems. Just like your race.” For some reason, that nettled Reiss. He looked over at Osthia. “My kind does not sacrifice their own. I learned that from Drakes. I studied your wars. You send a hundred to hold a gap and know they will die. You kill your own for advantage, just like me. I did not learn such things from Goblins.” He regarded Osthia coldly, basking in his anger for a moment. The Drake bristled, and her manacled wings stirred with anger. “Drakes—our leaders know when sacrifice is necessary. But that doesn’t mean—” “Spare me.” Reiss turned his head. He heard Osthia inhale and altered his spell. The world around him grew silent for a minute. Reiss was alone with his thoughts. He bowed his head. Quietstab had died in front of him. He had been there, on a nightly errand when he’d seen Tremborag stalking the Hob. He had watched the confrontation. The rapid murder had surprised him. But he could have stopped it. If he had so much as raised his voice or revealed himself, Tremborag would have retreated. If he had cast a spell— He hadn’t. Reiss was sure, quite sure, that even his best spell wouldn’t kill Tremborag outright. He was a [Necromancer] and lacked the raw power of other [Mage] classes. So he had let Quietstab die because it would benefit his tribe, convince Rags to ally with him. It was necessary. But it was such a Human thing to do. Reiss felt the guilt gnawing at him. What was he doing. Was he really becoming— He saw a flicker of movement and turned his head. Osthia punched Reiss. He staggered and saw a Hob roar soundlessly and charge Osthia. The Goblin Lord raised a claw and dispelled the [Quiet Air] spell. “Stop!” The Hob skidded to a halt before he could slam into Osthia. The Drake was ready. She glared at Reiss as he rubbed his cheek. That had hurt. But it was no less than he deserved. And he’d forgotten how touchy Drakes could be. “Leave us.” The Hob hesitated, and then moved back, giving Osthia the evil eye. Reiss reapplied his silencing spell and then looked at Osthia. “Punch me again and I can’t guarantee my Hobs won’t seek revenge.” The Drake sneered. “All they do is poke me with sticks. Ignore me again and I’ll hit you somewhere else.” “Fine.” Reiss looked around. He couldn’t see over the top of the tall Hobs he’d selected to screen Osthia from sight, but he knew that Snapjaw would be returning any moment with the dire news. Reiss shook his head. “So you’re going to use this to tie that little Goblin’s tribe to you. What next after that?” Osthia looked at Reiss. He glanced at her, and then sighed. His shoulders felt heavy. But cold certainty filled him. “He killed her subordinate. So I will help her bring him down. As allies.” The Drake’s eyes widened. Reiss nodded. It was time. Whatever the Humans had planned, it would surely mean the end of his tribe. But if he could face them with combined forces— Garen was an obstacle, but his tribe was small. Tremborag was the real threat. If he fell, his tribe would splinter. That was Reiss’ chance. The Great Chieftain had to die. Somehow. That reminded Reiss. He fished in his pocket and pulled something out. He turned and offered it to Osthia. She blinked down at the thing he was holding. “Here. I made it at last.” It was a ring, a white band of wood. It had been carved carefully and it shone in the daylight. Osthia hesitated. Reiss pushed it at her. “Take it.” “I don’t want—” “Take it. I told you what it does. I didn’t lie.” The Drake suspiciously took the ring. She turned it over, although Reiss knew she had no ability to detect magic. “If you enchanted it with anything but what you said—” Reiss nearly growled. That was the problem with Drakes. They were touchy and suspicious. And kind. Some of them could be—he growled, pushing the memories back. “I did not. Put it on or I will make you wear it.” Osthia glared at him, but she slipped the ring on with ill grace. She blinked at the ring. “It’s a perfect fit.” “Obviously. It was made for you.” The Goblin Lord sighed. He shook his head as Osthia growled. Maybe he should have made a necklace. He’d forgotten how touchy Drakes and Humans were about rings on fingers. Didn’t it mean something when they put it on a certain finger? Oh well. He dispelled the [Quiet Air] spell a second time and heard the hubbub around him. Snapjaw must have returned. The Goblin Lord glanced at Osthia. “I must go now.” “Don’t stay on my account.” Osthia growled. Her face was irritated, but her tail curled up a bit, betraying her true emotions. Reiss had learned to read Drake’s emotions in their tails. He pretended to be scratching an itch as he read her body language. She was lonely. Lonely, bored, and…worried. For him? Of course not. Reiss nodded. “I will let you know what happened tonight. Or sooner if Rags wishes to talk.” “Yes, yes. Go away.” The Drake turned her head. Reiss nodded to her and turned. The Hobs parted before him and closed, creating a wall of black armor. Reiss strode back through his tribe. Snapjaw was waiting for him, anxiety clearly written on her face. In response, Reiss quickened his footsteps. But only half of his mind was on the act. As he moved, he raised his right claw and pressed a fingertip to his temple. Master? Are you there? He heard nothing. As usual. Reiss held the connection open, waiting. But there was no response. At last, Reiss lowered his hand. He met Snapjaw and Eater of Spears as they came to him. He became Reiss, the honest Goblin Lord. He was shocked, enraged, and then concerned. He sent Snapjaw back to speak with Rags, played his part so well that for a moment he really was burning with righteous fury. But that faded as Reiss climbed onto the back of his Shield Spider. Thereafter he sat, half miserable, half calculating as he studied the other tribes. All the Goblins were marching. Reiss’ army moved ahead smoothly, although he could sense the ripples spreading as the Goblins told each other what had happened. There was shock, anger, sympathy—but generally, the Goblins just kept marching. They knew there would be battle with Tremborag’s tribe in time, and Quietstab’s death changed nothing. It had just happened. The other tribes reacted differently, though. Garen’s warriors rode ahead of Tremborag’s forces, back straight with fury and indignation. Some were arguing, but the ones around Garen Redfang were deathly quiet. Sullen. They stared at their Chieftain’s back and Reiss could almost hear their thoughts. Again, the pride and warrior spirit that Garen had taught them went at odds with their alliance with Tremborag. Some were even glancing at Rags’ tribe now and then. That was unexpected. And promising. And Rags’ tribe? Well, they marched fast, catching up with Reiss’ forces. Their postures were tense, their expressions dark. They were furious. Reiss saw some pausing to poop in the path of Tremborag’s tribe, but the rest just kept moving, because there was no other option. And Tremborag’s tribe marched in the rear, as always. They laughed, in the best of spirits and their Great Chieftain was loudest of them all. He walked amid his Goblins, proud to have killed his fellow Goblins. Reiss watched him, thinking dark thoughts. He promised himself it would be soon. He told himself that it was necessary. But he still couldn’t forget Quietstab’s gasp and the sound in the night. Reiss lowered his head. Some days he wondered if Garen was right. But he had come too far to stop now. Reiss waited for his moment. He waited and waited and watched Rags. Waiting for her to see what had to be done. —- Tremborag was laughing. His huge voice boomed across the heads of his tribe as he laughed. He was eating and drinking as he walked. His feet hurt and he considered using a healing potion. But though the Great Chieftain normally resented being forced to march with a burning hatred, he was in good spirits. He chewed on the salted beef and drank wine, feeling some run onto his chest. “Look at them run! Cowards! Weaklings!” He bellowed, pointing at Rags’ tribe. They were moving ahead of his tribe, marching fast. The Goblins around Tremborag laughed and jeered as well. They all knew what had happened last night and they were all happy. Well, most. Some who knew Quietstab hadn’t been pleased. But Tremborag didn’t care. A traitor was a traitor and ending that wretched Hob’s life had shown everyone the truth. Sit-abouts? Working together? It was all meaningless. This was all that mattered. Defeating your enemy. Crushing them. Hurting them. The slave Goblin Lord, Garen, Rags—they could all see the truth. Tremborag felt his spirits rise. “Look at them, running to hide behind the Goblin Lord. They’ll hide in their camp tonight. Plot and scheme like the—the cowards they are. Conspire with that slave who pretends to be a Goblin Lord. Pretend to be friends. Hah!” Spittle flew from Tremborag’s mouth, spraying the Goblins in front of him. He could see Ulvama flinching out of the way. His [Chief Shaman] looked displeased as Tremborag waved her closer. The Hob continued, reaching for another wine flask as he walked forwards. “The Goblin Lord will probably take the child’s tribe in. Only, she won’t be his Chieftain. She’ll be his puppet. He pretends to be concerned with the good of Goblins. A kingdom? Peace with Humans and Drakes? There is no peace. There is no working together. There is only killing your enemies. Redfang should know that. Where is he?” Tremborag looked around vacantly. Garen’s tribe was marching far ahead of them and to the left, keeping pace with Reiss’ forces. Tremborag scowled. “Fool. If he was half the warrior he claimed to be, he would have slain his traitors already. Ulvama, bring him here. And give me a healing potion.” The [Shaman] made a face. “Great Chieftain, Garen Redfang is angry.” “So?” “He will not come. And we have only a few hundred healing potions after—” Tremborag turned and Ulvama flinched. The Hobs around him drew back warily. “Redfang. Healing potion.” The Great Chieftain’s crimson eyes flashed. Ulvama nodded rapidly. She beckoned and a Goblin raced over with a healing potion. Tremborag fumbled with it, watching as a group of Goblins were sent racing ahead to summon Garen Redfang. He noticed Rags’ tribe had slowed their pace somewhat. The small Chieftain had actually tried to charge him. Tremborag had nearly died of laughter when that happened. If she had tried to attack with her tribe, he would have been only too happy to rip her apart. Her tribe was a speck compared to his. Her fancy pikes and crossbows were useless against his warriors. She’d even deployed her pikes to her rear, as if she was afraid he’d charge her. That was an amusing idea. Maybe he should try that. For a second Tremborag contemplated the thought, but he knew that would be a mistake. Killing Quietstab was one thing, but if it came to a battle, Reiss and the damned Humans would intervene. But if he could send Ulvama or one of his stealthier Goblins to pick off another of Rags’ lieutenants…and what could she do about it? Tremborag was so caught up with the idea that he didn’t notice that Rags’ tribe was slowing even further. Only when he noticed the gap between them was shortening from a few hundred paces to less than a hundred did he frown. He saw the back of Rags’ Goblins with pikes marching ahead of him. Tremborag raised a lazy arm, about to order his tribe to push the Goblins forwards faster. And then he heard a shout. The back rank of Rags’ forces turned. The lines of Goblins with pikes turned to face Tremborag’s oncoming tribe. And then the pikes lowered. A wall of spikes faced Tremborag’s front ranks. The Goblins froze, and the ones behind bumped into them. Tremborag halted. His jaw opened. What was— “Loose!” He heard a scream ahead of him. Then he saw a flicker run through the Goblins behind the ones with pikes. A black hail flew up from the ranks of Goblin’s tribe, and then fell towards Tremborag’s tribe. He gaped as they struck the Goblins in front of him. He saw a Hob raise a hand, and then jerk as one of the black shapes struck him. The Hob blinked down at the crossbow bolt that had impaled itself through his hand. And then more bolts were failing, like rain— Tremborag looked about wildly as he heard Goblins screaming. His tribe froze in their tracks and his celebrating warriors grabbed for their shields, tried to back away. All around Tremborag was chaos, confusion. Disbelief. This couldn’t be happening! But it was. They were under attack. The first deadly rain of crossbow bolts left hundreds wounded or dead. But before Tremborag could blink, the Goblins with crossbows had reloaded and sent another arc of deadly missiles into the air! Tremborag blinked as more fell around him, and then felt a stinging pain in his shoulder. He looked down and saw an arrow had penetrated his shoulder. It had barely gotten through the first layer of his fat, but the pain woke him up. He gawked at Rags. Then he roared. “Kill them!” His warriors flinched and came out of their trance of stupefaction. They surged across the grass and churned up soil towards Rags’ forces, roaring. A wave of crossbow bolts cut down the advancing Goblins. And then the pikes were there. Rags’ pikes charged the first rank of Tremborag’s warriors and skewered them. The twenty-foot long pikes impaled Goblins, knocked others off their feet. And what few Goblins made it past the jabbing, deadly tips found Hobs and Goblin warriors waiting for them. Tremborag saw his warriors backing away as the second rank met the same fate as the first. Rags’ pikes advanced, threateningly. But they didn’t go further than a dozen steps before they suddenly retreated. The Goblins of the Flooded Waters tribe planted themselves firmly in the ground, pikes raised, Hobs fighting or loosing arrows among the smaller Goblins. And the crossbows fired again, and then again, reloading and sending hundreds, over a thousand bolts into the air each time. Tremborag roared in fury. “Push into them! Cowards! Push!” He whirled as his Hobs tried to force the Goblins in front of them to charge into certain death. Tremborag took a huge breath and bellowed. “Ulvama!” The [Shaman] was there in an instant. Tremborag pointed. “Break their pikes!” The female Hob nodded. She grabbed her staff and strode forwards, protected by two Hobs with massive tower shields. She raised her staff and aimed at the front rank of pikes, perhaps to enchant Tremborag’s warriors or destroy the pikes directly. Either way, she never got the chance to cast. As she raised her staff, a bolt of lightning shot towards her. Tremborag saw Ulvama’s eyes widen and she swept her staff up. The jagged lightning curved up and Ulvama screeched and threw herself to the ground as the bolt earthed itself just past her. Tremborag saw a Goblin standing amid Rags’ tribe. He threw another bolt of lightning that blasted one of the Hobs and sent the smoldering body crumbling to the ground. “Kill that mage!” Tremborag roared, but his Goblins were in disarray. They finally managed to loose arrows of their own, but by that time the Goblin had disappeared. “Chieftain! What do we do?” One of Tremborag’s lieutenants screamed at him. The Great Chieftain snarled and backhanded the Hob. He bellowed so his entire tribe could hear him. “Advance! Kill the traitors! Any Goblin who runs I will kill myself!” Slowly, his warriors advanced. They battled the pikes, pushing forwards slowly. Tremborag whirled and ordered his archers forwards. Now his Goblins began exchanging arrows with Rags’ crossbows. And yet, his advance was stymied once again by his warrior’s pragmatism. It was one thing to loose arrows back at the other Goblins, but charge into a wall of pike tips? Tremborag bellowed and struck his Hobs, but even they couldn’t motivate his warriors to pay the price in blood to take the pikes. And the Great Chieftain wasn’t willing to stay within range of the crossbows. Five had already struck him and the lightning mage had sent two bolts at Tremborag that Ulvama had barely deflected. So Tremborag took the only other option he could think of. “Shields up! Archers, kill them!” Thousands of Goblins with bows raced into place behind Tremborag’s warriors with shields. They began loosing thousands of arrows. At last, Tremborag saw Rags’ tribe begin to waver. His tribe didn’t have the disciplined ranks of crossbows, but they outnumbered Rags’ forces practically ten to one. Rags’ warriors started falling as arrows showered them. Slowly, they began to pull back. “Kill them! Cover them with arrows and slaughter them by the thousand!” Tremborag was howling with glee. He could see Rags’ tribe faltering as his massive tribe began to outrange them in the archery duel. The Great Chieftain was impatient, pacing behind the lines of his stationary Goblin warriors. He would kill her for this. That child dared to attack him? He’d break her tribe and send his warriors to claim her. Alive. Garen thought she was smart? She was a fool. She’d attacked the wrong foe. No matter what she did, there was no way she could win— The Great Chieftain felt the heat before the screams. He turned and saw the gout of flame a moment before the burning wheel of flames engulfed a group of Goblins at his rear. Tremborag blinked. Then a [Fireball] blasted apart another section of Goblins, sending burning body parts flying. He saw a glowing comet smash into his warriors. At the back. The back? But how had Rags’ tribe done that? Tremborag’s face went slack for a moment. And then he realized what was happening. Slowly, he looked up and saw the Humans. They were approaching from the north, a line of riders. And mages. They were the ones lobbing spells at him, forcing the Goblins to move. Only, they couldn’t move. And so the Humans had stopped firing warning shots. Now the spells were striking his tribe. Tremborag saw a serpent made of poisonous gas descend on his back ranks as more spells began striking his warriors. He stared at Rags’ tribe, hunkered down in their path. They were fighting, holding his warriors at bay, firing their crossbows. And meanwhile, the Humans were blasting apart Tremborag’s rear. —- “That is strategy.” Reiss eyed the two battling tribes with something akin to awe. Not at the plan, but the daring of it. The way it worked. Rags’ tribe was holding Tremborag’s in place, less than ten thousand facing Tremborag’s full army. They would perish in a moment in a pitched battle. But all they had to do was stall Tremborag for a few minutes. Already the Humans were blasting Tremborag’s rearguard apart. And she’d done it herself. Without speaking to him. Within two hours of Quietstab being discovered. Was she mad or overconfident? Or— Reiss’ forces had stopped marching. So had Garen’s. Both tribes were watching the conflict to the north. Reiss stood with his two top lieutenants, Snapjaw and Eater of Spears. He turned to them. “She’s slowing him down. And the Humans are chewing him apart from behind. They’re willing to kill a few thousand Goblins to force Tremborag to move.” Snapjaw looked impressed. Her jaw was open slightly, revealing her metallic rows of teeth. But Eater of Spears looked worried. He shook his head and rumbled. “It is a bad idea. Tremborag has no choice but to advance.” Snapjaw glanced up at Eater of Spears, surprised he’d said anything. But he was right. Reiss looked back at the conflict and nodded slowly. “They’re going to be overrun. Unless they retreat.” It was true. Despite the pikes, Tremborag’s warriors were pushing forwards, realizing that there was no safety in staying still. Reiss saw several points in Rags’ rear opening up. But before Tremborag’s forces could overwhelm her, he heard a horn blow. Instantly, Rags’ tribe began moving again. “They’re running!” Snapjaw’s addition to the commentary was to point out the obvious. The female Hob hopped up and down, watching anxiously as Rags’ tribe disengaged. They retreated, running after Reiss and Garen’s forces. Thanks to Rags’ [Fleet Foot] Skill, they outdistanced Tremborag’s desperate Goblins. “They’ll have to run fast. Tremborag will chase.” Eater of Spears frowned, eying Rags’ tribe. Reiss nodded. If she’d wanted to anger the Great Chieftain and give him a bloody wound, she’d done it. But she’d have to run fast. He began calculating her trajectory, wondering if he should put his tribe between hers and Tremborag’s. “He has to get free of the Humans, first. No time for fighting.” “Mm.” Tremborag’s tribe was moving as more spells rained on them from behind. They surged forwards, following Rags’ tribe. Reiss saw both groups of Goblins coming at him like a green wave—and then Rags’ tribe halted again. They turned, and he saw the small Chieftain raise her sword. “Is she—” The Goblins with crossbows raised their weapons and loosed another wave of bolts. Then they turned and kept running. Tremborag’s forces wavered as the crossbow bolts landed among them. Some tried to return fire, but they were still under attack from behind! And the sudden attack had slowed them. Rags’ tribe ran for another fifty feet with ease. They turned, bent to reload their crossbows, and fired again. “Hm. Good plan.” Eater of Spears grunted approvingly. Reiss just watched. Rags was fighting on the move! That too wasn’t surprising as a tactic, but—he focused on the small Goblin. What was she doing? Was she really trying to kill Tremborag’s entire tribe? She couldn’t. It was impossible. And yet, the small Goblin turned and waved her sword again and again, and her tribe continued loosing quarrels. And Tremborag’s Goblins had no choice but to advance and die or die. —- “Loose!” Rags screamed the word at her warriors. She pointed, and saw the crossbows rise. Her Goblins cocked their crossbows, slapped bolts into place, and fired. Then they turned and ran after her as she wheeled her Carn Wolf and raced forwards. It was a rhythm, a deadly rhythm that sang in sync with her heart. Stop, turn, loose, and run again. Rags pointed at Tremborag as his warriors surged towards her tribe, ignoring the sporadic arrows flying towards her tribe and screamed. “Kill him!” A hundred crossbow strings snapped in agreement. The bolts soared up and fell around Tremborag. Rags saw him raise a huge hand to shield his face and roar in fury. She saw a dozen bolts strike him, but none penetrated deeply. They were too far away, the crossbows were too weak, and he was too big. But he was hurt. Rags raised her own crossbow and fired. The arrow shot up and arced toward Tremborag’s face. At the last moment it snapped in midair. Rags saw a Hob with a staff pointing and recognized her. Ulvama waved her staff urgently, chanting. Rags growled as she waved her staff. The spell the [Shaman] cast made Tremborag and the Goblins around him flicker and turn hazy. Rags saw multiple Tremborag’s appear and then felt her eyes slide away as he became a green, indistinct blob. The Goblins with crossbows around her wavered; it was hard to even look in his direction. “Move!” Rags ordered them. Her tribe ran, turned, and loosed. This time they aimed at Tremborag’s front ranks. More Goblins fell. Rags heard them screaming. She didn’t care. Her blood was on fire. It was only when she heard a shout that she looked up and saw the falling fireball. This was no ordinary fireball, the size of a torso, or even a [Grand Fireball], which was a ball of roiling flames as tall as a Human in every direction. This was like a second sun. Rags had seen it once before. It was falling towards her tribe, almost lazily. Her eyes widened. “Run, run!” Her tribe ran, scattering before the fireball could land. When it did, the explosion kicked Rags in the back and made her Carn Wolf howl in pain. She looked back, wondering if it was a missed spell. But then she saw more spells falling from above. The Humans were beginning to lob spells at her warriors now as well. “Chieftain! We have to run!” Redscar pulled up beside Rags. He was staring at the sky. Rags knew he was right. She turned and waved at her tribe. “Run fast! Fastest! Don’t look back!” The Goblins hesitated, but Rags urged them onwards. She kept her eyes on the sky, and Redscar’s mounted warriors did the same. They screamed orders and the tribe split to avoid the falling spells. Rags rode with them, racing ahead. Reiss’ army was on the march and as soon as they drew close to them, the spells stopped falling. Rags turned and saw Tremborag’s tribe was running in their wake, also free from attack for the moment. “Humans saw what we were doing.” Noears gasped as he jogged over, his face sweaty. Rags nodded. She looked around and saw her tribe was gasping for air. All of them were tired and many were hurt. She looked back and saw a trail of bodies behind her. For a second she felt numb. Then she looked up and saw Tremborag’s tribe. They were hurt. But he was still there. Rags glamced at the huge Hob who was running, bellowing at his Goblins to move faster. Then she turned as she heard a commotion from the front. “Chieftain! Goblin Lord coming!” Poisonbite shouted. Rags nodded. She saw Pyrite wearily approaching from the rear, holding a wounded Goblin and waved at him. The Hob laid the Goblin with an arrow in his leg on a wagon and strode forwards. “Rags.” Reiss rode towards her on his headless, undead Shield Spider with Snapjaw and Eater of Spears flanking him. He stared at Rags for a moment as if he’d never seen her before, and then looked at Tremborag’s approaching forces. “You attacked him.” “He killed Quietstab.” “I know.” Reiss nodded slowly. He looked at Rags. “But you attacked him.” She nodded. “Because he killed Quietstab.” Reiss stared at her. After a moment he nodded uncertainly. Rags nodded as well, conscious of the eyes on her. That was all there was to it. He killed Quietstab and so he had to pay. “You bloodied him. He won’t forgive that easily.” “So?” The question threw Reiss. He glanced at Tremborag’s tribe again, and then at the Humans. “So you can’t attack him. The Humans will force you to stop.” “Stop? Why? This is not stopped. This is waiting.” Rags glared at Reiss. He opened his mouth, flicking his eyes to her, then to Pyrite, Redscar, and the others. They all stared at him silently. They weren’t going to stop. Not until Tremborag was dead. Why would they stop? He killed Quietstab. One Hob, yes. One Goblin. But he had been of Rags’ tribes. He had been her subordinate, her trusted aide and lieutenant, even if he wasn’t the greatest of them. He had been her friend. And he was dead. So she would kill Tremborag or die trying. It was a simple as that. Her tribe understood all of this without Rags having to say it, but Reiss didn’t seem to. He opened his mouth again and his black eyes fixed on Rags’ face. “What will you do?” “Keep marching, stupid.” The answer made Reiss frown in vexation and Snapjaw grind her teeth, but Rags was in no mood to bandy words. She turned and pointed at Pyrite. “Get wounded in wagons. Ready to march. Use healing potions on bad hurt—so not die. Not full heal. Get food and ready rear. We march fast, ahead of Mountain City tribe. Get more bolts for crossbows and get ready.” Pyrite nodded. “Another fight, Chieftain?” “Not now. Tonight. He dies tonight.” Reiss inhaled sharply. Rags ignored him. She looked around. “Redscar, Pyrite, Noears. Can you win if fight?” They hesitated. Poisonbite bristled, but Rags ignored her. Pyrite looked back at Tremborag. He shrugged. “Probably not.” “Chieftain Rags. Are you serious?” Rags turned and stared at Reiss. The look in her eyes was all the answer she needed to give. She turned back. “How many Hobs you need? Or Redfangs?” Noears glanced at Redscar. The warrior was frowning and checking the edge of his blade. Noears shrugged. “Lots. Tremborag is strong. Saw him kill six Hobs in a fight once. When he gets big, too strong? Need Pyrite to hit hard. Or Redscar stab in eyes?” The mounted Goblin nodded. “Good plan.” Rags nodded slowly. “Lots of Hobs, then. And get free of others. Poisonbite and I will hold off others. Have to kill fast. Surprise attack.” “Chieftain Rags.” She turned and glared at Reiss. He was staring at her. “What?” He hesitated. He looked so…surprised. Why? The instant Rags had known that Quietstab was dead and Tremborag was to blame she had sworn to kill him. Why would she wait? For a better moment? For the right time? Those were Human ideas. Rags would kill Tremborag. And she wouldn’t stop. Ever. Reiss finally understood that. Or he realized it was fruitless to argue. His eyes flickered as he stared at Rags’ tribe, and then glanced at his lieutenants. Then he stared past Rags at a small group of a few thousand Goblins, who had watched the conflict without intervening. Garen Redfang sat on his Carn Wolf, staring at Rags and Reiss. The Goblin Lord pointed at him. “If you continue to fight, Garen will intervene.” “Probably.” Rags gritted her teeth. She was trying to figure out how to catch Tremborag off-guard tonight. Could it be tonight? Or did they have to wait until he’d lowered his guard somehow? His tribe would be on alert, but if she could figure out a way to poison their supplies or take them off-guard somehow—how could she slow Garen and keep him from intervening? “If you plan to attack at night, you’d have to cut into Tremborag’s camp and attack him in the center of his warriors.” “Only if I have stupid plan.” Rags muttered under her breath. Reiss paused. “If you need a distraction, I will help you. My warriors can attack Tremborag’s tribe from the side while yours cut in. I will help you kill Tremborag.” The small Goblin froze in her saddle. Then she looked at Reiss and narrowed her eyes. The Goblin Lord met her gaze steadily, unblinking. “Really?” He nodded. “Tremborag has no…he is not-Goblin. I will help you. I can stop Garen myself. As for Tremborag—I can lend you Eater of Spears and some of my best Hobs and the Draug I have remaining for the battle.” Rags blinked. Eater of Spears and Hobs and Draug? She remembered some of the hulking undead she’d seen. If she had those—she glanced at Pyrite, who raised his eyebrows. Redscar was frowning, but Rags had mastered her face when she looked back at Reiss and nodded. “Yes. Thank you. We will fight together.” “Good. Tremborag must fall, after all.” Reiss smiled at Rags. She nodded, but didn’t smile. She saw the Goblin Lord’s eyes shift towards Tremborag. His gaze was cold as he fixed on the distant Great Chieftain. Rags knew—she thought she knew—that he was serious about aiding her. Tremborag dying would help Reiss, after all. And Rags would accept his help. But all the trust she’d had in Reiss was teetering on the edge of sudden doubt. Not because she suspected him of lying to her. And not because she thought he’d betray her. No, it was just because of how surprised he was. Of course it was insane to attack Tremborag’s tribe. Of course it was strange, suicidal even. All of his reactions were normal. But while those reactions were normal, they were what Rags would expect from someone like Erin. Reiss was acting more like a Human than a Goblin. And that, more than anything, bothered her. Rags turned her Carn Wolf and pointed ahead. Tremborag’s tribe was catching up at last. “Come. We move. And plan attack.” “I will ride with you. Snapjaw, lead my army. Eater of Spears, take a thousand Hobs to the rear of Chieftain Rags’ tribe.” Reiss immediately snapped at his Goblins. They nodded and disappeared. Reiss rode next to Rags, looking down at her and clearly wondering how they should talk with him several feet above her head. Rags ignored him as her Carn Wolf padded forwards. Her mind was racing, trying to fit Reiss’ forces into a plan that would end with Tremborag’s death with the least amount of cost. Because it would cost her. Who would die killing him? Redscar? Noears? Pyrite? No. Rags’ heart hurt at the very thought. But she also knew she couldn’t not kill Tremborag. He had killed Quietstab. He had killed her Goblin. Her friend. For that, she would set everything ablaze and slaughter his tribe to the last. Like last time. Like the Humans. Rags remembered a burning house. She remembered screaming Humans, the smell of blood, and a blind [Emperor]’s words. And she hesitated. It was the same and not the same. For a second Rags wavered. But there was only vengeance and death. That was what she had to do. As Goblins do. As Goblins have always done. Rags felt something familiar about what she was doing and felt uneasy. She saw a pattern in her mind, a pattern that she had seen play out again and again. But it faded as she looked back and saw him. Tremborag. Her blood was rage, her heartbeats pain. She looked at him and knew one truth. He had to die. —- Lord Yitton Byres found Tyrion Veltras standing next to his mount. Yitton was on foot himself, having left his mount with a [Groom] during the break. The main company was moving onwards, pursuing the Goblins, but Tyrion had called a halt to assess the situation in light of the morning’s events. It was something Yitton would have liked time to think on himself. He shook his head as he strode towards Tyrion. The man was alone and several of his aides were keeping a wide space around him. From the way his lips blurred and the way Yitton couldn’t hear a thing he was saying even as he approached, he was probably under several anti-spying spells as well. One of the men assigned to keep everyone back hesitated when he saw Lord Yitton. But for whatever reason he let Lord Yitton past. That was a curiosity in itself, but Yitton Byres had accepted that Tyrion Veltras held him in some esteem. At least enough to let Yitton into the protective spell bubble and hear Tyrion speaking. He was conversing with his personal aide, his [Mage], Jericha. Yitton paused with both hands behind his back. Tyrion glanced at him and gave him a slight nod of acknowledgement, then returned to speaking with Jericha. “And the number of dead?” “Our [Scouts] estimate it at around eight thousand dead, Lord Veltras. Mostly from the ah, Great Chieftain’s tribe, although several hundred were killed in the…Flowing Waters tribe. Mainly from arrows, not the spells cast by our mages.” “I see.” Tyrion grimaced, although Yitton had only the barest inkling of an idea why. By all rights, eight thousand dead Goblins should be a step in the right direction. But the man had plans, and if what Lord Erill had told Yitton over their cups last night was true, then the man would want as many Goblins alive as possible. If it were true. Yitton had no intention of asking Tyrion that. He stood patiently with both legs braced as Tyrion kept talking. The head of the Byres family kept one ear on the conversation while he thought about what he’d witnessed. Goblins laying traps for one another. Using formations. That had been a classic pike wall with crossbows firing over. And then one of the tribes had used mobile harassing tactics! It bothered Yitton to see anything like strategy coming out of the Goblins. But those Chieftains seemed every bit as dangerous as the Goblin Lord. What he couldn’t understand was what had set them against each other. Yitton frowned, and then realized that the topic of conversation had shifted when he hadn’t noticed. Jericha was perusing a piece of parchment in her hands. “We’ve received several concerned [Message] spells inquiring about your grand strategy, Lord Veltras. Nothing that merits a reply, but I have just received a missive from Lady Magnolia Reinhart, and ah—” She paled for a second as she read the transcribed [Message]. Lord Tyrion raised one eyebrow. “Pass it to me.” The [Mage] hesitated only for a second before handing the parchment over. Tyrion read impassively. Yitton saw his eyebrows raise just once. For the man, it was as good as an exclamation. Tyrion stared at the parchment, then folded it up and handed to Jericha. She silently burned it in her hands with a small spell. Tyrion shook his head. “That was surprisingly direct. Give Reinhart my regards, Jericha. Inform her—politely—that I will not be swayed from my course. Any attempts she may make I will counter to the full extent of my ability.” “Yes, Lord Veltras.” “Good. I will peruse all the other [Message] spells tonight. And have we received any [Messages] from the Drakes?” “Nothing but polite inquiries from the [Strategists] of some of the Walled Cities, sire.” “Good.” Tyrion closed his eyes for a moment and folded his arms. He nodded once, and opened his eyes. “Keep me informed of any changes. Now, onto more pressing matters. Lord Yitton?” He turned briskly to the other man. Yitton Byres snatched one hand down from his beard. “Lord Tyrion, the company is continuing to pursue the Goblins. They’ve stopped fighting although our [Mages] had to fire more warning spells, but both tribes are keeping a distance now.” “Excellent. And?” Yitton grimaced. “I’ve consulted with our [Scouts] familiar with Goblins. They’ve given me their assessment and I agree—those two tribes are about to clash and one of the Chieftains is going to kill the other by night’s end. I intended to ask if you wished to separate them to prevent a conflict.” Tyrion’s brows drew together. He drummed his fingers restlessly against his side while keeping still. Then he shook his head. “No. Splitting up the Goblins would only increase the complexity of our task and make it likely that one tribe would attempt to escape. Did the [Scouts] have any speculation about why the two tribes began fighting? The conflict was between—” He glanced at Jericha. The [Mage] raised her head briefly. “The Mountain City tribe led by the Grand Chieftain and the raiding tribe that assaulted Riverfarm, Lord Veltras.” A spark of interest entered Tyrion’s eyes. “Yes, I recall that tribe. And that Chieftain. Lord Yitton?” Yitton hesitated, frowning. “The [Scouts] drew the conclusion that it was the death of one Hob that sparked the conflict, Lord Byres. They observed the Flooded Waters tribe gathering around a dead Goblin that had been hidden in a latrine. The [Scouts] speculate that he was killed by a member of the other tribe, which sparked the conflict. Our [Strategists] disagree, however. They believe it was a conflict over resources, as this Mountain City tribe has consistently consumed far more of the supplies we’ve placed in their way than the other tribes.” “I see. Well, the reason matters not. This fighting will wear down both sides, especially if the Goblin Lord involves himself. As for the delays—unacceptable.” Tyrion shook his head. Yitton waited. Jericha looked up, having sent her [Message] and frowned. “Lord Veltras, we may be able to force both tribes to move and camp separately. It would require our [Mages] to create a neutral zone and enforce it, but—” She broke off as Tyrion raised a hand. The [Lord] was staring at nothing, frowning. Then he looked up. “No. This may serve our purpose, Jericha. Rather than tire out our [Mages], I intend to solve the matter directly.” He turned and looked at his aide. “Summon the Gold-rank adventurer captains immediately, to meet me at the front within twenty minutes. Provide them with mounts if they are marching with the foot.” Jericha nodded and raised a finger to her temple. “And Miss Arcsinger?” A flicker of expression passed across Tyrion’s face, so quickly that Lord Yitton couldn’t read what emotion it had been. Tyrion shook his head briskly, his face impassive. “No. We have an arrangement. Let her continue onwards—I will request her use of Skills as needed. That will be all. Lord Yitton, I would value your input if you would ride with me.” He strode towards his mount and briskly mounted himself. Yitton looked around, cursing and wishing he’d kept his horse nearby, but it was already being brought. Tyrion watched as Yitton swung himself into his saddle and then the two [Lords] were riding quickly to the front. Yitton saw the ground flash past him as he rode under the aegis of Lord Tyrion’s Skills. “You have a plan, Lord Tyrion?” “I do, Lord Yitton. I intend to send the Goblins and our watchers a message.” Yitton glanced sharply at Lord Tyrion as the man calmly surged up and down in his saddle with his horse. “A message, Lord Tyrion? Of what kind?” Tyrion looked back at the older man and almost smiled. “The simplest of messages, Yitton. The kind even Goblins understand.” —- “Can’t win with spells. Bad idea.” Pyrite grunted as he jogged along with Reiss, Rags, and a cluster of the other high-ranking Goblins in both her tribe and the Goblin Lord’s army. The Hob pretended not to notice the glares both Reiss and Noears gave him. “Why not? I can weaken Tremborag with death spells.” “Can try.” Eater of Spears nodded as he stumped along. Smaller Goblins and Hobs stared up at him as they ran around him. Both Rags’ tribe and Reiss’ army were marching far ahead of Tremborag’s tribe, and quickly too. The Humans had pushed them hard and the Goblins were tired despite it being just past midmorning. Rags wasn’t tired. Her mind was buzzing with ideas. The impromptu war council was deliberating hard about how to attack Tremborag successfully. She looked at Pyrite. “Why no spell?” “Bad idea.” Pyrite ducked as Snapjaw threw a pebble at him. He rumbled, and explained as he fished out a speckled blue egg and began to eat it raw, shell and all. He offered one to Eater of Spear, who took it with a grunt of satisfaction and popped the entire thing into his mouth. “Tremborag is old Hob. Very strong. Knows how to fight adventurers. If [Mage] casts spell, may hurt. Won’t kill. Then Tremborag comes and tears head off. Very quick.” He gestured at Noears and mimed the very action. Noears felt at his head, looking concerned. Reiss frowned. “I could fight Tremborag myself.” “Could try.” Pyrite glanced impassively at Reiss. This time Snapjaw growled and leaned out of her saddle, ready to punch Pyrite. Poisonbite tugged her back and Reiss frowned. It was Rags who nodded. “Too risky. Can’t have one or two. Better to have Reiss fight Garen.” “Why? Goblin Lord not strong enough?” Snapjaw challenged Rags angrily. She just shrugged. “No. Garen too annoying. Reiss stop Garen. That easy. Hard part is get Tremborag alone. How about—” She glanced up and frowned. So did the other Goblins. They turned as they heard a horn blaring behind them. Only, it wasn’t a Goblin horn. It was coming from the Humans riding behind them. The difference in sound was minimal, as both Goblins and Humans made the same instrument. But it was the oddity of the sound that bothered Rags. She stared as first one horn blew, and then two, then a dozen. And then a hundred. The advancing line of cavalry stopped as all four Goblin tribes halted and stared back at the Humans. The flanking parties of Humans riding to either side of them paused as well. Rags stared as, in the distance, she saw the lines of Humans part. “What’s going on?” Reiss stared hard at the Humans. He looked around and Rags saw his undead Shield Spider crawl towards them. No one else moved as Reiss swung himself up into his saddle for a better look. Rags saw the Humans part. And then someone appeared between the lines of riders. A flash of golden hair. And a silver bow. Though she was far away, Rags could see the figure had pointed ears. And when she looked up— Fear. It ran through the Goblins like a physical thing. They shuddered as they remembered. Golden hair. A bow. A fallen King. Elia Arcsinger. Kingslayer. She stood at the head of the ranks of Humans. And someone else rode up to join her. A man with dark hair, his armor gleaming. He looked like any other Human in one sense, but Rags recognized him. Tyrion Veltras. The [Lord] regarded the mass of Goblins ahead of him. Rags could see Reiss reconsidering his vantage point and swinging himself down into the safety of the mass of his warriors who surged forwards to put themselves between him and Elia. But it was not at the Goblin Lord who Tyrion looked at. His gaze swept past Reiss, past Garen who sat on his Carn Wolf, teeth bared. He looked at Rags first and she felt a shudder. She thought that Tyrion was smiling, but she couldn’t see his expression so far away. And then the [Lord] looked down, at the sprawling tribe of Goblins, half of whom were sitting, imitating their Chieftain. Tremborag, Great Chieftain of the Mountains, sat on the ground, footsore, furious. His skin was healed and the crossbow bolts had been plucked out, but his gaze was still malevolent fury as he stared at Rags. He ignored Tyrion Veltras and the Humans, his back a solid mass of contempt. He was not afraid of them, or so his posture said. So he never saw Elia Arcsinger raise her bow. He never saw the arrow. It struck Tremborag in the back. A single arrow, fired hundreds of feet. It flew straight and true and embedded itself in Tremborag’s flesh, just above his shoulder. He howled, more from shock then pain, and whirled. His eyes widened as he saw Elia Arcsinger lower the bow, and his hand reached up, trying to grab the arrow. “She shot him?” Reiss’ voice was incredulous. The arrow had struck the Great Chieftain precisely, and Rags couldn’t imagine she’d missed. But it hadn’t done more than wound Tremborag slightly. Frankly, it wasn’t even a good shot if the half-Elf had been trying to kill him. But as Tremborag yanked the arrow from his back and stared at the red, dripping point, Rags felt terribly uneasy. She looked up and saw Elia Arcsinger turn away. And Tyrion Veltras pointed. At Tremborag. The Great Chieftain froze, his expression outraged and confused at once. Another person, a woman, a [Mage], stepped up besides Tyrion. Rags watched her, feeling her pulse thudding in her ears. She saw the [Mage] link arms with two others, a woman and a man, and then saw the fire. This was how she spun the fireball. Out of air a wisp of fire appeared, a thin tendril. Then it thickened, curled in on itself and other strand appeared. Like yarn, it knitted itself together, twisting into a ball of fire, only this ball was ever-shifting, the cords of flame shifting around together. And the blaze grew until the fireball was as large as the woman, larger, as large as a horse. Larger still. The Goblins watched in silence. Tremborag slowly got to his feet. He stared at the [Mages], incredulous. Rags stared at him and then at Tyrion. At the Humans. They were all looking at Tremborag. The Great Chieftain looked around. Now the fireball was floating overhead. He backed up a step, his face written with incredulity. He did not want to believe. He did not want to know. But it was too late. The [Mage] let go of the other’s hands and pointed. The [Siege Fireball] shot forwards, a blazing inferno as bright as the sun. Tremborag turned. He began to run. The Goblins around him ran too. Rags heard not a word from them. They just ran, streaming away from the spot. And then the fireball touched the earth where Tremborag had been, as the Great chieftain tried to flee. Rags saw a flash— Then she felt something kick her in the chest. Hot air blasted Rags’ face and she heard cries as the Goblins were bombarded with light, heat, and sound. When Rags could see again, she saw Tremborag lying on the ground. He was alive. He’d dove to avoid the blast. As he got to his feet, shakily, a horn blew. Rags turned and saw the Humans advancing. Only, it wasn’t a steady trot. They were charging. [Mages] standing behind the ranks of Humans on horseback began throwing spells. Crackling lightning and shards of ice rained down from the sky, as the earth broke underfoot. Goblins screamed and ran, but Rags stayed where she was. So did her entire tribe. Because the onslaught was not aimed at them. The center of the storm, the one figure that the Humans encircled, cut off from his tribe and threw spells at was the huge figure, the Great Chieftain of the Mountain. Tremborag. He looked around, bellowing in fear and fury. He turned to run, but a line of [Riders] and [Knights] cut him off. He shouted for his Goblins, but his warriors who rushed to surround him were blown to pieces, feathered by arrows, cut down by swords. Tremborag roared. He turned and saw the watching Goblins, the three tribes who stared at him. Tremborag went still. His eyes went to Reiss, who stood amid his warriors, his face impassive, to Garen Redfang, who looked shocked. And then to Rags, who met his eyes. Tremborag looked back at the Humans who were attacking his tribe, sending his warriors fleeing further and further away from their Chieftain. He looked around and saw Tyrion Veltras, riding towards him. And then he knew. —- “They’re going to kill him.” Reiss breathed the words incredulously as he watched Tremborag’s tribe disintegrate before his eyes. The Mountain City tribe had scattered in the face of the first spell. Now they were trying to reform, but the wave of Humans that crashed into their backs forced them to keep running. Spells hammered the ground, enforcing the imminent threat of death behind them. The Goblins turned and ran, but they could hardly ignore the bellowing voice behind them. “Warriors to me! Protect your Chieftain! Ulvama! Kerist! Qent! Where are my Hobs?” Tremborag shouted, running, thrusting aside Goblins, trying to put anything and everything behind him and the Humans racing to cut him off. He was fast, and he barreled through a rider and horse, knocking both aside, though the impact made Tremborag stagger. He ran forwards, trying to get away. But the Humans were aimed only at him. “They are going to kill him.” Noears stared at the scene with amazement and delight. He and the others watched as Tremborag’s tribe fled towards them. Rags could see tens of thousands of Goblins streaming away from Tremborag. Few turned despite his shouts. And those that did—died. It wasn’t a fair battle. It wasn’t even a battle. If a Goblin or Hob turned to strike or cast a spell, a [Knight], a dozen [Knights], would ride down on them and hack them to shreds. Or a [Lord] would use an artifact, or an adventurer loose an arrow, or a [Mage] a spell. No matter what Tremborag said, no matter how he threatened and ordered, he couldn’t force his Goblins to turn and fight that. “Stop! Obey me! Turn and fight for your Chieftain! Fight for your tribe!” Tremborag caught a Goblin warrior who was fleeing. He stared at the Goblin’s terrified face, and then hurled her at the oncoming Humans. The Goblin disappeared with a scream beneath the oncoming horses. Tremborag looked around desperately. “Ulvama! My Hobs!” There they were, fleeing ahead of him. Tremborag roared at them and for a moment they turned. Ulvama with her staff, the Hobs wearing their precious, looted gear. They looked back at their Great Chieftain as he labored to run after them. Tremborag raised a claw, calling. Imploring. And the Humans were behind him. Surrounding him. They formed up at his back, and on his sides, creating a passage edged by steel. They held their position there, daring the Goblins to run back. There was a clear path between them and Tremborag. But if they went back—the Goblins of the Mountain City tribe stared at the lines of Humans. They looked at death and death looked back. Ulvama stared at Tremborag. He looked at her, his face desperate. It was an expression few of the Goblins in his tribe had seen. They looked at their Great Chieftain. And then Ulvama turned away. She was the first. Then one of the Hob lieutenants turned his back. And then a warrior. And then a child. Tremborag stared as his Goblins turned and began streaming further away. All of them. Ulvama, his Hob sub-Chieftains, his warriors—they fled as the Humans raced past him on horseback. They pursued the Goblins, chasing them towards the other three tribes that were watching Tremborag. And then the Great Chieftain was alone. He stared around at the Humans. They watched him, faces hidden behind visors, mask of hatred. But they didn’t attack. More movement. Tremborag started, whirled as the Humans in front of him parted. He stared in disbelief as the lines of Humans moved aside, giving him a path towards the Goblins to the south. He looked in disbelief at the Humans, and then narrowed his eyes. A trick? No. The Humans drew back, waiting. Tremborag turned as a man in armor rode up behind him. Lord Tyrion Veltras drew his sword and pointed past Tremborag, towards the waiting Goblins. The Great Chieftain turned and saw his tribe staring back at him. Along with the other Goblins. A [Fireball] exploded over their heads and the Goblins started, began to run. South, again. Then Tyrion pointed at Tremborag. The Great Chieftain met his eyes, snarling, defiant. But Tyrion didn’t order the attack. Instead he raised one hand and shouted an order. “Advance at a trot!” The Humans around him moved. Their horses began to trot forwards, at Tremborag. The Great Chieftain backed up. He turned, and looked at the Goblins moving swiftly south. Then he looked at the Humans, advancing behind him, slowly. And then it became clear. They wanted him to run. To run until he fell. Tremborag’s claws clenched. Red fury rose in his eyes and for a second he turned back to the front ranks of Humans. For a second. Then the fury dimmed. He looked back at his tribe, so far away in the distance. And he turned and ran. —- At first, it was one mile. Rags and her tribe raced across the rocky landscape until it turned to grass. Then it was two miles. She heard the scream of spells overhead, saw her tribe start to mix with the other Goblins running. They couldn’t help it. The Humans drove them onwards faster than they ever had before. Rags saw the wagons jolting as the animals strained to keep up, saw Goblins trip, fall, and be trampled or blown to bits. And then it was five miles. Six? She lost count. The Goblins slowed after a time. The frantic pace eased. Because the Humans weren’t chasing them. Not just them. It was the figure in the distance, always a thousand feet or so behind that they were concerned with. Tremborag. He ran as hard as he could, his body heaving with effort. He stumbled and fell and got up, he gasped for air. He ran, but the Goblins ahead of him were always out of reach. The Humans forced them to keep away from the Great Chieftain. And he was tiring. Of all the Goblins, he was the largest. And his footsteps grew ever more slower, his breathing harder. He collapsed after the eighth mile of running. The Hob fell to his knees as the Humans slowed to a snail’s pace behind him. They threw spells over his head, blew their horns. But he could run no further. Tremborag panted, so dehydrated that the sweat had stopped rolling off his body. He looked behind him and saw the Humans approaching slowly, so slowly, at a leisurely walk. Like hunters moving in for the kill. Tremborag turned and bared his teeth. “You damned Humans. You think that this—” He tried to heave himself up and failed. Tremborag sprawled onto his back. He stared up at the sky and made a noise. It might have been a growl of frustration. But it sounded like a sob. “Like this? Like this? Without my tribe? Those cowards—like this? Impossible. I cannot die here. Not like this. It should have been—I should have—” He scrabbled at the grass and dirt, trying to pull himself up. He stared at the Goblins, who’d paused to look back at him, no longer hounded by the Humans. Tremborag stared at his tribe, at the faces in the distance. He tried to shout, but his lungs were too exhausted. “Damn you. Cowards! Traitors, every one! I am your Chieftain! I am Tremborag! I—” His voice faltered. Tremborag sagged. He stared at the Goblins. They made no move to help him. They watched, as the Humans drew closer in the distance. All except one. She kicked her Carn Wolf forwards, ignoring the warnings of her tribe. She raced past the Goblins who tried to catch her. A small Goblin riding a Carn Wolf. Tremborag’s eyes widened as he saw Rags riding at him. She had a black crossbow in her hands, a short sword and buckler at her side. Her eyes blazed as she stopped her Carn Wolf in front of Tremborag. She raised her crossbow. “You.” “Me.” Rags agreed softly. Tremborag stared at her. Then he pushed himself up. He sat back and laughed. “So! The child comes in the moment of my death. Not Redfang or the slave, but the child. How pathetic. How fitting, isn’t it? For this?” He waved a claw back at the Humans. Rags narrowed her eyes. She raised her crossbow and aimed at Tremborag’s chest. “Didn’t come here to talk.” “No. You came to kill me before the Humans did.” Tremborag grinned at Rags, his chest heaving painfully. He tapped his chest. “Well? Go on. Shoot me. Kill me! End the Great Chieftain of the Mountain here, child! End it! I have outlived our last Goblin King! I have built my tribe, seized the home of Dwarves and seen the rise and fall of legends! End it with one pathetic little piece of wood and metal. And ride away until it is your turn. Know the truth.” Rags raised her crossbow. “Truth? Truth is that Humans won. You die.” Tremborag laughed hoarsely. He sat forwards, his shoulder drooping. The Great Chieftain looked beaten as he shook his head. “You think so? This—this was never about Humans. This was about Goblins. About pride. About our destiny.” The small Goblin paused. Rags had been aiming carefully, choosing her shot. She stared suspiciously at Tremborag. “Destiny? What destiny? This is your fault. You lose mountain, fight Reiss. You run, now Humans kill you for trouble. You die.” Tremborag chuckled. “You think so? This started—all of this started with that damned Goblin. Greydath. You met him. You know what he’s capable of. Do you think he couldn’t have stopped the Humans? Or—or challenged Reiss to battle? Or led the tribes? But no, he stayed in my mountain. Hidden. It was only when you appeared. You and Redfang and the slave. When you came, he had no more use for me. So—it ends.” He gestured around aimlessly. Rags frowned. “Greydath did? How?” “By doing nothing.” Tremborag hissed. His chest was fire. He clutched it, trying to breathe more steadily. “Do you think—he was just sitting in my mountain, pretending to be Greybeard—for nothing? No. The world is vast. You think this army is frightening? I have known greater. Far greater. And our King—even he was not enough to face it all. See the truth, child. The Goblin Kings are pawns. Not of Humans or Drakes—but of the Goblin Lords.” Rags had settled on Tremborag’s nose. Her finger hesitated in the trigger. “Goblin Lords?” Tremborag heaved one pain-filled breath, and then another. He sat forwards as Rags uncertainly moved her Carn Wolf a step forwards, and then back. “Yes. But not like the slave. Reiss is a lord, but the true ones…why do you think Greydath sat in my mountain for so long after his King’s death? When the others died? No—the true Lords—don’t trust them. They are not Goblin.” He breathed hard as Rags hesitated. Was Tremborag insane? But he was speaking urgently now, leaning forwards and despite herself, Rags listened. “What do you mean?” Tremborag’s breathing was weaker. He gestured Rags closer, gasping for air. “Greydath. The true Lords search for a King. Not because we need one, but because they can use them. You do not remember. You—Curulac listened and they used him. Velan did not and he died less than a year after becoming a King.” Rags shook her head. “Curulac? But he lived only hundred days. Curulac of Hundred Days.” “Hah!” Tremborag sat back, and laughed once, hoarsely. “You think that was all he lived? You have not seen his past. He lived longer than Velan. For years! But when they were done with him, the Lords—they betrayed him. They turned him against the Humans for a hundred days of war! That is the fate of kings. But Velan didn’t listen. So they sent only one of their number with Velan. Greydath of Blades. The other lord were lesser. Not like Greydath.” “What?” None of that made sense. Rags knew of the Second Antinium War, at least, parts of it. She remembered. “Other Lords were strong. There was—Tallis. Stormbreaker.” He had been powerful. But again Tremborag laughed. He scooted forwards, coughing, looking at Rags. The Humans were drawing closer now. Rags could see them watching her and him. Her attention wavered between the riders and Tremborag. “Tallis? Tallis wasn’t one of them. He could have been. But he rose at the same time as Velan. He was Velan’s friend. He told me the truth. And I begged Velan to reconsider. But he didn’t. And the Lords conspired. They let him die.” Tremborag’s voice was softer. Rags drew closer, ignoring the warnings ringing in her mind that she should run before the Humans reached her. She stared at Tremborag. He had known this? Why didn’t he tell the others? Or was that why Greydath had been in his mountain for so long? He had begged— Tremborag? Beg? Rags wavered. She opened her mouth and realized Tremborag was right in front of her. Then she saw the Great Chieftain look up and his eyes flare blood-red. He lunged. Rags yelped and her Carn Wolf leapt back, barking in surprise. Tremborag swiped at her and the tips of his claws nearly caught Rags. Nearly. She felt the wind as they missed her and turned her Carn Wolf. It leapt back as Tremborag cursed and swiped at her again. But the wolf bounded back and Rags paused, panting, twenty feet away. “Damn you!” Tremborag coughed and roared at her. Rags raised her crossbow in one trembling claw. Nearly. He’d nearly got her. She stared at Tremborag with pure hatred. “You are a stinky wolf poo! Was it a lie? All?” She waved her free hand angrily. Tremborag was lying on his back, covered in sweat and dirt. He stared up at the sky. When he spoke, it was angrily. “A lie? What does it matter?” He heaved himself up, panting with effort. Tremborag glared at Rags, ignoring the crossbow aimed at his eye. “Why do I need to tell you anything? Truth? Lies? I owe you nothing, child! Why do you need to know my past? I am Tremborag! And you are worthless. Just like that traitor. Quietstab.” Rags felt the word strike her like blow to the chest. She reeled, and her eyes narrowed. “You are not-Goblin.” “Am I? Then kill me, nameless child! Shoot me! Or are you afraid?” Tremborag grinned at Rags. He lowered his voice. The Humans were so close now. Rags could see their faces, looking at her like Tremborag. Like monsters. And Tremborag was whispering to her. “You think Quietstab was loyal? He told me everything about your tribe before the end. Everything, every scrap he could before he perished, to save his miserable neck. Should I tell you about how he begged me when he died? How I made him suffer at the last?” Rags saw flashes of red. Her finger trembled on the crossbow’s trigger. Tremborag spread his arms, daring her. He was right there. She could kill him. It didn’t matter if she died. She just wanted to hurt him for hurting her. Hurt him and hurt his tribe. And then they would attack her, and she would kill them, and— She barely saw Tremborag’s claw sliding into the ground in time. Rags shouted and pulled the crossbow’s trigger. Her bolt went wide, but Tremborag jerked and the handful of soil he was about to hurl at her and Carn Wolf missed. He lunged again, but Rags danced back. “You—you—” She shouted at Tremborag, trembling. He just laughed. “Come on! Strike me! You coward! You traitor with no name!” He wanted her to kill him. He wanted her to attack. Because if he did, he could kill her. And Rags would gladly do it. But she could see the future, not because of a Skill or magic, but just because she knew what would happen. She would kill Tremborag. Or he would kill her. And then his tribe would try and kill her, or the Humans would kill him. It didn’t matter who killed who. Someone else would do more killing. Just like Riverfarm. Just like the burning. Like the [Emperor]. He killed her Goblins. So she burned the Humans. And so he sent his army to kill her. It was what the fate of Goblins. Kill and be killed and kill again. As Goblins do. As Goblins have always done. Rags’ eyes opened wide. She looked Tremborag, who was watching her, teeth bared. Then she looked around. At the Humans, at the watching Goblins. And slapped her forehead. “Oh. A circle.” “A what?” Tremborag blinked at her. Rags stared at him blankly, then looked down at her crossbow. It wasn’t even reloaded. She absently patted her growling Carn Wolf on the head and looked around. “Okay. Going now. Bye.” “What? No! Come back and finish this!” Tremborag looked incredulous as Rags turned her mount. He rose up, managed to get to his feet. He stood straighter and Rags realized he’d been pretending to be more tired than he was as well! Tremborag’s voice grew deeper and he shouted at her. “You coward! Don’t you want to see me dead?” Rags shrugged. She stowed the crossbow on the holster on her back. “Humans will do that. I don’t need to.” “You—is that how you fight? Hiding behind Humans? Running? I challenge you, Chieftain to Chieftain!” The huge Hob pounded his chest. But now Rags looked at him and didn’t feel angry. She shook her head as Tremborag lumbered a few steps towards her and kicked her Carn Wolf, keeping a distance between him and her. She spoke slowly and deliberately to Tremborag’s snarling, desperate face. “Tremborag. You are big. And fat. And stupid. And ugly. And smelly. And have bad breath.” He looked at her. Rags met his eyes and for a moment the two Chieftains just glared at each other. A child riding a wolf and the exhausted Goblin of the Mountain. For a moment Rags thought she knew Tremborag. Because she recognized the terrible fear and desperation in his eyes. She looked away. “Sorry. Goodbye.” Rags kicked her Carn Wolf in the side and it bounded away, towards the Goblins in the distance. Tremborag watched her go. He stared at the distant shape, a bounding red wolf and green rider. Then he turned. The Humans had stopped to let him finish his conversation with Rags. Perhaps they’d been hoping she’d kill him. Humans loved stories like that. Now they rode forwards. Tremborag saw a group of Humans dismount from their horses and spread out. He saw glowing armor, grim faces. Tremborag glanced over his shoulder at Rags. He wished he could have killed her. The Great Chieftain’s claws clenched as the Humans spread out. More were dismounting, regular [Soldiers]. And he could see a winding column behind them, moving fast. The Human’s infantry, armed with spears, swords. So many of them. An army far too large for even a Goblin Lord. Or at least, one of Reiss’ caliber. That struck Tremborag as funny. He laughed and then wheezed as the blood in his lungs made him cough. He wiped at his mouth and glanced around. There were two dozen men and women, all armed with magical artifacts encircling him. Gold-rank adventurers. Tremborag saw the first, a man with a bow, step forwards. He looked like any other Human, really. Save for the enchanted gear, Tremborag wouldn’t have recognized him as different from the others he’d killed over the years. Even his voice was the same. “We remember you, Goblin. We owe you death a hundred times over for our friends. So this will be slow.” Tremborag sighed. He turned and looked back at Rags. She was still riding towards his tribe, towards her tribe and the Goblin Lord’s army and Garen Redfang’s warriors. But he thought she was looking at him. The Great Chieftain of the Mountain stared at Rags and imagined crushing her head between his claws for a second. Then he felt a sharp pain in his arm. He looked back. The Human had shot him! Tremborag glanced down at the arrow. It wasn’t enchanted. Stupid Humans. He plucked the arrows from his arm. “Goblin—” So this was how it ended. Tremborag looked back at the distant Rags, tuning out the Humans again. He looked at his kind, watching him, and felt the Goblin Lord, sitting there like a mountain in his mind. But the true mountain was ahead of Tremborag. He looked over the angry Gold-rank adventurer’s head at the mountain far off in the distance, so far away. His home. How far he’d come. Tremborag glanced back at Rags again, and growled. So the child fled. Fine. But let her see one thing at least. Let her look. He turned as the Gold-rank adventurer, indignant at being ignored, raised his bow. He was ten paces away from Tremborag. Ten Human paces. Or a single bound for the Hob. Tremborag leapt. The sweaty fat on his body rippled. Muscles grew and his face contorted. A claw reached out and seized the Human before he could leap back. Tremborag bent and pulled. The Human’s head screamed and screamed before it crushed between his fingers. Tremborag dropped the body and looked around. Gone was the fat Hob that had stood there moments before. A monster rose, teeth shining, muscle and flesh rippling. Tremborag’s voice was booming as he turned to the shocked Humans. “Slow enough for you, Humans?” They backed up away from him, and then remembered they were here to kill him. The Gold-rank adventurers raised their weapons and the [Soldiers] aimed bows and trained spears on Tremborag. The Great Chieftain of the Mountains laughed. He spread his arms. “Let me show you fear.” Then he leapt. The tip of a spear pierced his stomach. The adventurer hacked at his arm. Fire faced down his body and light exploded in his eyes. Tremborag roared and bit the Human in two. He swung his arm and sent soldiers flying. He pounded a Human with a shield to paste and flung another screaming into the air. The Gold-rank adventurers swarmed around him, but they were slow. Their magic was weak. He grabbed them, tore their arms off. Then they fled. The soldiers attacked Tremborag from all sides, but their arrows were weak. Their steel bent. The [Mages] burned him. They struck him with missiles made of light. Tremborag charged one and felt his body shiver as it struck a barrier. He broke it and bore the mage to the ground, biting him, tearing him apart. The soldiers drew back. Tremborag flung the guts at them, roared— And then saw them pull back. The flames burning him went out. Tremborag turned, his blood boiling, and saw him. Tyrion Veltras. The [Lord] sat on top of his mount, lance in hand. For a moment the Great Chieftain hesitated, then he grinned savagely. Better than the child. He made a mocking bow. “Greetings, Lord Veltras.” The move surprised Tyrion. The Human stared at Tremborag as his soldiers pulled back, forming a ring around Tremborag. “You know of me, Goblin?” Tremborag grinned. He was bleeding. But he made his voice mocking. “Even we wretched Goblins heard of the mighty Tyrion Veltras. And his fallen wife. Did she trip off the balcony, boy? Or did one of your enemies push her? And do you fill your bed with another woman or do you sleep alone?” His insults struck home. Tyrion’s cold face twisted into fury and the Humans behind him shuddered. The [Lord] slowly reached up and lowered his visor. His voice, when he spoke, was barely controlled with fury. “There is nothing you know of me.” Tremborag grinned. “I know how you bleed. Come, boy. Show me how strong Humans are with your enchanted weapons and magic.” He spread his arms. Tyrion didn’t wait. He kicked his mount forwards and sped at Tremborag, lance aimed for his heart. But the Goblin was ready. He turned and struck like lightning, trying to punch Tyrion off his mount. The [Lord] raised his shield and the fist met the enchanted metal. A thunderous impact made the watchers wince. The horse reared and Tyrion reeled back in his saddle. Tremborag roared as swiped again, but Tyrion lashed out with his lance. “[Repel Point]!” The lance tip struck Tremborag’s raised arm. But instead of sending the Great Chieftain flying backwards, it was Tyrion’s mount that was thrust back. The horse reared and danced, but the [Lord] fought it down. He circled Tremborag, checking himself as the Great Chieftain growled. “Was that it? Come on, boy. Save your life with another Skill. Did you fail to save your wife? Or was she a nuisance?” He expected Tyrion to charge again, but the [Lord] didn’t. Instead, he rode his mount back towards the edge of the circle. There he turned and set himself. He was going to charge. Tremborag grinned. He made a fist. One Skill. One Skill would do it. He waited as Tyrion lowered his lance. Then the [Lord] charged. He came at Tremborag from the left, his lance aimed at Tremborag’s shoulder. Before he was in range, Tremborag roared. “[Great Slash]!” He cut at Tyrion and his horse with a blow that severed the air. The ground tore. Tremborag saw Tyrion raise his lance and he heard a calm voice. As calm as ice. “[Lightning Hooves].” And his horse blurred. Tremborag saw it blur around his claw. Tyrion appeared on his left, circled, charged again. So quick. Tremborag lashed out once more, but his claws were so slow. And Tyrion’s lance flickered in his hands. He changed directions as he switched his grip. Suddenly his horse was galloping right and his lance was aimed— A cold tip pierced Tremborag’s chest, just above his heart. For a second Tremborag blinked at it, watching the lance move slowly. So slowly. He looked up and saw two blazing eyes staring at him through the visor. Then time returned. The lance went through his chest, shattering bone and piercing flesh. Tremborag stumbled. He raised a claw, gasped. The pain was—he tried to grab Tyrion, but the [Lord] had one hand on the lance. He twisted it and pulled it from Tremborag’s chest. And the Great Chieftain fell. His knees struck the ground and he lay on his back. So quick. It had been just like—just like—like— —- “Tremborag. Join me.” Velan the Kind stood in Tremborag’s throne room. Alone. His Goblin Lords had left him. His legions of warriors were camped outside Tremborag’s mountain. That left only Tremborag with Velan, and the Goblin King was small, barely taller than any other Hob, really. But it didn’t make Tremborag feel any less small. The Chieftain of the Mountain City tribe hesitated. He was huge, a giant among Hobs. Or perhaps something else. Velan had brought other Goblins like him, Goblins who were more than just Hobgoblins. Hulking creatures of muscle and teeth, as close to half-Giants as anything else. Like him. But for all his strength and height, Tremborag felt crushed by the Goblin King. Velan stood in front of him, looking up and looking down on Tremborag all at once. He repeated himself. “Join me, Tremborag.” “No.” Tremborag’s voice trembled with the effort of saying it. He had nearly quailed in the face of the Goblin Lord. To say it to the Goblin King was a thousand times harder. But he had his reason. He did not want to die. And he was prepared to grovel or argue to beg or bribe. But Velan just nodded. “Very well.” He turned away. Tremborag gaped at him. Velan looked around the grand throne room, centuries of neglect and filth turning rich Dwarven work into a Goblin’s home. “Will you stay here?” “Yes. I will not march. I will hide from the Humans. This mountain will be my home. Forever.” Again, Tremborag expected Velan to argue, to call him a coward. To say anything. But all the Goblin King did was smile as if he was pleased. “Good. Hide here. It will not be many months, before it ends, I think.” He looked around the throne room again. Tremborag gaped at him. The question slipped from his mouth before he could stop it. “Why are you doing this? What is the reason for this war? What is our purpose?” “Purpose?” Velan turned back to Tremborag. His gaze flickered and Tremborag quailed. A memory of Velan’s rage made him look to his doors. If he were to be engulfed in his fury, only the Goblin Lords would be able to calm him. But Velan did not rage. Instead, he looked up at Tremborag and shrugged. It was a very Goblin thing to do. “We have no purpose. This war is not to create or fill any task. Just to end. Just because must be.” Tremborag stared at Velan. “Then why—why fight? You made peace on Baleros. Why fight?” Velan didn’t answer him. Not at first. The Goblin King looked up at the ceiling and at Tremborag’s throne. And there was sadness in his eyes. Sadness, and a regret that haunted Tremborag’s dreams ever after. “We fulfilled our oaths long ago. We were there when the world betrayed itself. And we brought death to the world in return. We won that war, though it cost us all. Our family, our people, our King—all of it was worth the price. And now, what remains is vengeance.” “Against what?” “Everything.” The Goblin King gazed past Tremborag, straight through him. He touched his eyes and shook his head. When he looked at Tremborag, dark rage filled his eyes, a rage so hot that it could burn Dragons. “Rage consumes me. Stay in your mountain. Let the children hide here. The children and the next. I have failed. All I can do is plant the seeds for the next. If you would be one of them, seek these out.” He turned abruptly and reached for something at his side. He showed Tremborag the keys. They were ordinary, apparently made of steel. But they captured the light. Velan looked at them sadly. “One day there will be a King again. And they will follow in my footsteps. Forever. Until all Goblins perish or all others do. We cannot help it. We cannot forget. But maybe next time…” He trailed off. Velan turned towards the doors and walked away. Tremborag sat on his throne, feeling small. He half-rose and shouted after Velan. “What should I do, then? What is my purpose? To hide? To wait? To seek?” Velan turned at the doors. His eyes captured Tremborag’s and he shook his head. “Live, Chieftain of the Mountain. Just—live.” And then he was gone. Tremborag never saw Velan again, but he remembered the keys. He remembered the past. And he wondered— He wondered if Velan had known all along how it would end. —- Tyrion Veltras shook blood off of his lance as he slowly rode back. Cheering filled the air and the Humans raised their weapons and shouted wildly. The gigantic Goblin lay on the ground, a bloodied mess. Tyrion was checking his mount and offering his lance to Jericha when the body stirred. The cheering stopped. Slowly, Tremborag sat up. He blinked down at the hole in his chest and touched the blood running to the ground like water. Tyrion paused as Tremborag rose to his feet. The Great Chieftain stared at the [Lord]. Tyrion spoke calmly. “You are dead, Goblin.” Tremborag laughed. He shook his head and bared his teeth at Tyrion. His voice was hoarse. His face pale. But he stood and opened his claws. “I am Tremborag. And only I decide when it is time to die.” Tremborag took a step forwards. Bows twanged and arrows sprouted from his body from all sides. He laughed as more struck him and Humans rushed forwards. He turned and brought his claws down, crushing metal and bone. He raised his arms as a fireball exploded, burning away part of the flesh on his chest. “Come, Humans! Come with your armies! Bring your thousands against me!” He swept the Humans away. He crushed them with his feet. He bit and roared as they cut at him. “I am TREMBORAG! Chieftain of the Mountains! Come! Show me death!” And they tried. They brought steel by the hundreds, piercing his flesh. They shot arrows into him, seeking his heart. Tremborag rampaged through their lines, leaving crimson in his wake. Bleeding it. Fire rained from the skies. They broke the earth. Spears of magic pierced his flesh. Metal shattered his bones. Tremborag felt none of it. He burned, cutting, snarling, tearing. And a thought grew in his mind. Is this what you saw, Velan? Is this the fate of Goblins? There were so many. Every Human he killed seemed to spawn another one. But there was one Tremborag was looking for. His eyes were filled with blood. Then one was gone. But he could see Tyrion Veltras at last. Standing in front of him, sword drawn. There were…Humans in front of him. Tremborag strode towards him, ignoring the pain, the shadows that tore parts of him away. A little bit further. A little bit. The Human was standing in front of him, surrounded by steel and spell. But his eyes were only for Tremborag. The Great Chieftain lurched forwards, teeth bared. He had to do it. Show them what a Goblin was. What a real Chieftain was. Show them—show them— Show who? Tremborag looked around. He couldn’t remember who he was trying to show. And now he was alone. He couldn’t see anything anymore. It was all dark. Why was he here? Tremborag tried to remember. He blundered around. And then he saw it. Sitting there, just a little bit away. A giant heavy thing. Something to focus on. A beautiful piece of stone. His mountain. His small home. Why wasn’t he there? Tremborag belonged in his home. He walked forwards, stumbling. The world had gone quiet around him. He walked towards the mountain, stumbling, falling, getting back up. He was getting tired and the mountain was so far way. Why had he left it? He was so tired. Maybe if he had a nap, he’d feel better. Tremborag looked around. It was so quiet. So dark. So…peaceful. He sat down and closed his eyes. He’d just sleep a little bit. Until he could wake up. His mountain wasn’t going anywhere. And Tremborag would return. He would. He had made his home there. A place to live. He sat, exhausted. The air was so warm— —- At last he stopped. Rags saw the Goblin, the Great Chieftain of the Mountain, sit down. His back was to them. The bloody, torn figure wasn’t green anymore. It was black. And it lo
{ "pile_set_name": "OpenWebText2" }
I loath Rogers just as much as the next red-blooded Canadian, and, on certain days, possibly even more. But I have to give the telecom conglomerate, and others like it, credit for figuring out how to promote the idea of bundling all sorts of services and options, plus financial incentives, into an all-in-one offering. My question is whether there’s something positive to be learned from this particular marketing/pricing strategy that could build on the proliferation of mobility options now available in large urban areas that still struggle to deal with the so-called first mile/last mile problem. The explosive popularity of Uber has certainly prompted policy-makers to consider the prospect of joining forces with ride-sharing companies as a means of providing more coordinated options in areas not well served by transit. According to a 2015 article in CityLab, cities like Dallas, Atlanta, Los Angeles, and Minneapolis have established service or payment partnerships with Uber. Late last month, the Toronto Transit Commission accepted a recommendation from CEO Andy Byford to study how the agency (and the City) might pilot an on-demand ride sharing service that conforms with the TTC’s policy of requiring transportation providers to only use accessible vehicles. Metrolinx in August also put out a report prepared by the University of Toronto’s Mowat Centre calling for more coordination between transit agencies, including Metrolinx, and ride-, car- and bike-sharing organizations, with a proposal that the integration should be delivered to riders via the Presto card. But should transit agencies be tasked with orchestrating this kind of integration, and, more specifically, marketing it to riders? Given that there’s some promotional savvy involved, I’m not convinced. Indeed, I’d say there’s an intriguing argument to be made for the role of private “mobility-as-a-service” (MaaS) players that can bundle and market various incentive-based subscriptions to customers who routinely use a range of modes (transit, as well as taxis and bike-, car- and ride-sharing) to move around their own urban regions. Think Expedia, but for getting around the city. One such company, Global MaaS — which describes itself as the world’s first mobility-as-a-service firm — launched a test in the Helsinki region in the summer and will go live this fall there as well as two other Finnish cities. Travelers may buy monthly “Whim” packages with a specified number of “mobility points” that allow them access to transit, taxis, ride-sharing, car-sharing and bike-sharing. The firm offers consumers various bundles, and they draw down points based on the mobility options they select (public transit, ride-share, etc.), with the service delivered via an app that also antes up optimal travel routes. As The Economist reported last week, “Once a route has been chosen it will make any bookings needed, as well as ensuring that hire vehicles are available and public-transport sections are running on time.” A slightly more advanced version of Whim formally went into service in Hannover, Germany, last February after a 15-month pilot, according to UTIP, an international transit operators network. As UTIP noted, “The [Mobility Shop] service offers users the possibility to tailor the bundle to their individual needs and to directly book their journeys, whether it’s a public transport ticket or a taxi ride with mobility options, including travel times, appearing in real time.” Users receive a monthly bill. The emergence of such entities depends, to a significant degree, on whether transit agencies (or any of the other mobility operators for that matter) would be prepared (or directed) to sell monthly passes or fares on a wholesale basis to re-sellers. That’s clearly a policy decision with financial consequences and trade-offs. After all, notwithstanding the long-standing availability of transit tickets in corner stores, the TTC (and many transit agencies) still has a lock on the distribution of its own fares and fare media. The case for emergence of arm’s length bundlers is that they’d be focused on figuring out the best way of promoting and pricing service packages. Theoretically, they would also function as honest brokers, sourcing mobility services from competing providers/modes, including public transit operators. If transit agencies ran such services, there would be clearly a risk of self-dealing, as happens, for example, with LCBO, whose merchandising policies discriminate against wines from other parts of Canada. There’s no question that allowing this kind of player into the mobility market would introduce a new dynamic, and one that is potentially disruptive for dominant transit operators like the TTC. As this presentation by a Hannover transit official notes, the bundlers may well turn out to be large, profit-minded players, like Amazon or Uber. What’s more, policy-makers need to ensure that if they move towards allowing MaaS companies to gain access to the market, they’re not inadvertently creating private-sector monopolies or oligopolies, as is now the case with the telecom industry (and, indeed, in the online travel booking sector, where Expedia has been systematically buying its competitors in the past year or so). As TTC, Metrolinx, and City officials begin their deep dive into the potentially beneficial relationship between conventional transit agencies and all these other operators, they’d be well advised to have a close look at these commercial experiments in Helsinki and Hannover. Why? Despite the above-noted caveats, I’d say the MaaS value proposition is highly compelling, and could provide one potential answer (among others) to this interesting question of how city-dwellers consume the various urban travel options now on offer. After all, if residents can simply subscribe to a monthly package that gives them easy (and bulk discounted) access to a range of shared mobility services that extends across the complete chain of their travel needs, they’ll have an incentive to use the shared options more. And therefore their private vehicles, less.
{ "pile_set_name": "OpenWebText2" }
Q: invalid cross-thread access When calling IAP function in Windows phone 8 I am integrating In App Purchase using Cordova Plugin for Windows Phone 8.0 I have added a function in plugin called PurchaseProduct that will be called in JS Cordova project. namespace WPCordovaClassLib.Cordova.Commands { ............... public async void PurchaseProduct(string options) { string productId = JSON.JsonHelper.Deserialize<string[]>(options)[0]; ...... try { await CurrentApp.RequestProductPurchaseAsync(productId, false); ........ } ............ Calling below line is working very well. listing = await Store.CurrentApp.LoadListingInformationAsync(); but When I called await CurrentApp.RequestProductPurchaseAsync(productId, false); exception occurred as below. invalid cross-thread access I have no idea what happened now. Anybody can help me? A: Sorry. I've fixed this ridiculous one. used aysnc keyword. Deployment.Current.Dispatcher.BeginInvoke(() => { functionA(); }); ..... public async void functionA(string options) { ..... await CurrentApp.RequestProductPurchaseAsync(productId, false); ..... }
{ "pile_set_name": "StackExchange" }
DROP TABLE IF EXISTS t11; CREATE TABLE t11(c1 TINYINT(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` tinyint(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 SMALLINT(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` smallint(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 MEDIUMINT(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` mediumint(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 INT(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` int(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 INTEGER(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` int(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 BIGINT(5) NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` bigint(5) DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 TINYINT(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` tinyint(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 SMALLINT(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` smallint(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 MEDIUMINT(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` mediumint(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 INT(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` int(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 INTEGER(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` int(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test CREATE TABLE t11(c1 BIGINT(5) NOT NULL DEFAULT 1); SHOW TABLES; Tables_in_test t11 SHOW CREATE TABLE t11; Table Create Table t11 CREATE TABLE `t11` ( `c1` bigint(5) NOT NULL DEFAULT '1' ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t11; SHOW TABLES; Tables_in_test
{ "pile_set_name": "Github" }
MicroRNAs (miRNAs) are small, generally between 18 and 24 residues, polyribonucleotides derived from longer hairpin noncoding transcripts in eukaryotes miRNAs play a significant role in cellular developmental and differentiation pathways. Consequently, there have been considerable efforts made to understand and characterize the temporal, spatial and cellular expression levels and patterns of expression of miRNAs to ascertain their precise role in cellular development and differentiation in both normal and disease states. miRNAs are currently studied by, first, obtaining the total RNA from a sample. Next, the total RNA is fractionated into subpopulations by gel electrophoresis or by chromatographic fractionation and size selective elution. Then, the appropriate section of the gel is cut, and the 18-24 RNAs are eluted from the gel, or the eluted fraction containing single stranded RNAs in the size range of 18-24 ribonucleotides is collected. Next, the RNAs are isolated by precipitation and the miRNAs are characterized. Disadvantageously, however, these methods do not work well when the amount of sample is small, such as samples from tumor tissue or biopsy material. Further, characterization of the miRNAs isolated by present methods usually comprises a several step amplification procedure followed by detection, quantitation, cloning and sequencing. Because of the large number of steps in these processes and the notorious inefficiencies associated with the repeated purification, the isolation and identification of miRNAs using present methods is time consuming, relatively expensive, requires relatively large amounts of material and is not fully representative of the population of miRNAs expressed within a small sample, such as within a biopsy of a tumor. Additionally, the present methods are not specific to isolating and identifying an miRNA, and therefore, often isolate and identify siRNA, tRNA, 5S/5.8SrRNA and degraded RNA from additional cellular RNAs. Therefore, there is the need for an improved method for isolation and identification of miRNAs that is not associated with these disadvantages.
{ "pile_set_name": "USPTO Backgrounds" }
Strategies to address financial abuse. Financial abuse is a growing problem for older adults. This article outlines four major strategies for addressing elder financial abuse: (a) education and outreach, (b) general detection and universal screening, (c) legal interventions, and (d) multidisciplinary teams. Future efforts should be devoted to understanding the efficiency and effectiveness of these various strategies in order to keep older adults from becoming victims of financial abuse and to intervene as soon as possible once financial abuse has been identified.
{ "pile_set_name": "PubMed Abstracts" }
Q: How can I recover steganographically hidden data from a photographic copy of the image? I need to photograph an image containing a steganographically hidden message, then decode the stego content from the photograph without recourse to the original image data. Are there any steganography algorithms that would make the task more reliable? Note: I tried the Least Significant Bit (LSB) method, but when I processed the photos from the camera there was too much distortion. A: There are multiple ways to perform steganography using images. The kind most people are familiar with today is to embed invisible (or barely visible) data in the data of the image file. That means starting with an ordinary image file, then using steganographic software to modify the file to embed the secret message, then publishing that photo so it can be viewed by a conspirator. Such modifications can be as simple as LSB; or they can hide data in the JPEG quantitization of the image; or they can invisibly hide data in an embedded thumbnail image or the metadata of the photo. Different schemes have different visibility. Consider selecting a "more visible" steganographic algorithm than just LSB. One example might be to modify a GIF palette substitution steganography scheme. Using GIFs for stego can be done by choosing 128 doubled colors instead of 256 single colors, then choosing high-bit or low-bit versions of each pixel to transmit the message. Because the low bit colors in the palette are the exact same color as the high bit colors, the stego is normally invisible (although the picture quality is degraded due to the reduced number of colors in use.) By altering each of the high-bit colors slightly, you could make them more visible to the camera. The advantage of using the GIF scheme is that you can test your scheme by keeping the color changes small, and tweaking the high bit colors just a little at a time until you can reliably decode the message. Also, consider encoding your stego data using error correcting codes, such as a Reed-Solomon encoding. These are used by systems such as QR codes to reliably allow scanning when part of the code is damaged or obscured. If you don't want to spend that kind of effort, try repeating the plaintext message dozens of times and spread it throughout the image, improving your chances of detecting it from one or more places in the image. EDIT: In your comment, you mentioned you were trying to use JPEG pictures from your camera. Don’t. They will not work because JPEG is designed to combine “close” colors in order to compress the image, and this will totally obliterate any evidence of stego. You need to process the image file as RAW, not JPEG. Based on your comment, I now realize you may also run into problems with the color response of your camera, and how it will perceive the colors in your image. The traditional RGB approach probably won’t work, especially since the camera’s RGB color values won’t be the same as your monitor’s color values. If you try this, you may have to calibrate your camera’s color response. Or, you can try converting the colors in your camera picture into a color space better suited for comparisons. Translating each pixel into the L * a * b color space would probably be the best way to spot differences. All this is horribly complex, and will probably require a degree in digital image processing. Can you instead find a way to hide a QR code in the original image?
{ "pile_set_name": "StackExchange" }
![](medchirrev77246-0055){#sp1 .49} ![](medchirrev77246-0056){#sp2 .50} ![](medchirrev77246-0057){#sp3 .51} ![](medchirrev77246-0058){#sp4 .52} ![](medchirrev77246-0059){#sp5 .53} ![](medchirrev77246-0060){#sp6 .54} ![](medchirrev77246-0061){#sp7 .55} ![](medchirrev77246-0062){#sp8 .56} ![](medchirrev77246-0063){#sp9 .57} ![](medchirrev77246-0064){#sp10 .58} ![](medchirrev77246-0065){#sp11 .59} ![](medchirrev77246-0066){#sp12 .60} ![](medchirrev77246-0067){#sp13 .61} ![](medchirrev77246-0068){#sp14 .62} ![](medchirrev77246-0069){#sp15 .63} ![](medchirrev77246-0070){#sp16 .64} ![](medchirrev77246-0071){#sp17 .65} ![](medchirrev77246-0072){#sp18 .66} ![](medchirrev77246-0073){#sp19 .67} ![](medchirrev77246-0074){#sp20 .68}
{ "pile_set_name": "PubMed Central" }
Q: Ubuntu networking: can't connect to LAN I have a server with Zentyal 3.03 (Ubuntu 12.04) LTS. It has 3 network devices: eth0 - dhcp fast internet (I pay for it) eth1 - static slow internet (it's free for the school) eth2 - LAN I can reach the server with SSH, but I can't reach a LAN server from outside. I have set up portforwarding for port 80, it made no sense. I used: sudo iptables -A FORWARD -p tcp -i eth1 --sport 8888 -o eth2 -d 192.168.1.90 -dport 8888 -j ALLOW I don't know what can help, please ask what to show you. Please help me and do not send me to an another stackexchange website. (this wolud be the 4th time) A: You were thinking in a right direction, but used a bit wrong rule. $ iptables -t nat -A PREROUTING -p tcp -d your_static_ip_of_eth1 \ --dport 8888 -j DNAT --to-destination 192.168.1.90:8888 This rule will forward all traffic that reaches your server with destination port 8888 and with destination ip of its eth1 interface to your internal webserver. If you wish to change it so your server responds at port 80 then replace the port number of the --dport option. If you like to change the port of webserver then change the port of --to-destination option. I assume that you secured your system with proper set of iptables rules, but for completeness please consider these rules as well: -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A INPUT -p icmp -j ACCEPT -A INPUT -i lo -j ACCEPT -A INPUT -i eth2 -j ACCEPT -A INPUT -m state --state NEW -m tcp -p tcp --dport 8888 -j ACCEPT -A INPUT -j REJECT --reject-with icmp-host-prohibited -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT -A FORWARD -p icmp -j ACCEPT -A FORWARD -i lo -j ACCEPT -A FORWARD -o eth0 -j ACCEPT -A FORWARD -o eth1 -j ACCEPT -A FORWARD -i eth2 -j ACCEPT -A FORWARD -j REJECT --reject-with icmp-host-prohibited Also you need the ipv4 routing enabled, so edit /etc/ufw/sysctl.conf and uncomment: net/ipv4/ip_forward=1
{ "pile_set_name": "StackExchange" }
/* * Copyright (C) 2011 ~ 2018 Deepin Technology Co., Ltd. * * Author: sbw <sbw@sbw.so> * kirigaya <kirigaya@mkacg.com> * Hualet <mr.asianwang@gmail.com> * * Maintainer: sbw <sbw@sbw.so> * kirigaya <kirigaya@mkacg.com> * Hualet <mr.asianwang@gmail.com> * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ #ifndef DISPLAYITEMDELEGATE_H #define DISPLAYITEMDELEGATE_H #include <QAbstractItemDelegate> class DisplayItemDelegate : public QAbstractItemDelegate { Q_OBJECT public: explicit DisplayItemDelegate(QObject *parent = 0); void paint(QPainter *painter, const QStyleOptionViewItem &option, const QModelIndex &index) const; QSize sizeHint(const QStyleOptionViewItem &option, const QModelIndex &index) const; }; #endif // DISPLAYITEMDELEGATE_H
{ "pile_set_name": "Github" }
[Patient with stable ischaemic heart disease and essential thrombocythemia in Invasive Cardiology Laboratory -- role of the automated systems for estimation of platelet aggregation]. Patient with stable ischaemic heart disease and essential thrombocythemia in Invasive Cardiology Laboratory -- role of the automated systems for estimation of platelet aggregation. A case of a 63-year-old male patient with essential thrombocythemia and coronary artery disease is presented. The patient underwent elective coronary angiography and subsequent angioplasty of the intermediate branch. The procedure was complicated by a massive thrombosis of the right coronary artery. Tirofiban and subsequent stenting relieved anginal symptoms. Next, platelet activity was monitored using the platelet function analyser PFA-100 which enabled optimisation of the antiplatelet agent dosages. The usefulness of this device in the catheterisation laboratory is discussed.
{ "pile_set_name": "PubMed Abstracts" }
Q: How do I use ajax to post form data How can I use ajax to post value from user input to my web service api? It seems that I can't append value at ajax url. The following is my code... <form action="javascript:Start()"> <input type="text" id="target" value="tar"/> <input type="text" id="profile" value="pro"/> <input type="submit" value="Submit"> </form> function Start() { var target = $('#target').val(); var profile = $('#profile').val(); if(validateIdata()) { $.ajax({ type: 'POST', url: "webapi/"+ target + "/" + profile, data: $form.serialize(), success: function(){ alert('success'); } }); } return false; } Thanks A: You can solve it passing data on URL instead of data field. Try this. Html. (add id to form in order to access later to its data) <form id="form" action="javascript:Start()"> <input type="text" id="target" value="tar"/> <input type="text" id="profile" value="pro"/> <input type="submit" value="Submit"> </form> Javascript. function Start() { var target = $('#target').val(); var profile = $('#profile').val(); if(validateIdata()) { $.ajax({ type: 'POST', url: "webapi/"+ target + "/" + profile?+$('#form').serialize(), success: function(){ alert('success'); } }); } return false; }
{ "pile_set_name": "StackExchange" }
--- abstract: | We present *Hubble Space Telescope* ultraviolet spectroscopy of the white dwarfs PG0843+516, PG1015+161, SDSS1228+1040, and GALEX1931+0117, which accrete circumstellar planetary debris formed from the destruction of asteroids. Combined with optical data, a minimum of five and a maximum of eleven different metals are detected in their photospheres. With metal sinking time scales of only a few days, these stars are in accretion/diffusion equilibrium, and the photospheric abundances closely reflect those of the circumstellar material. We find C/Si ratios that are consistent with that of the bulk Earth, corroborating the rocky nature of the debris. Their C/O values are also very similar to those of bulk Earth, implying that the planetary debris is dominated by Mg and Fe silicates. The abundances found for the debris at the four white dwarfs show substantial diversity, comparable at least to that seen across different meteorite classes in the solar system. PG0843+516 exhibits significant over-abundances of Fe and Ni, as well as of S and Cr, which suggests the accretion of material that has undergone melting, and possibly differentiation. PG1015+161 stands out by having the lowest Si abundance relative to all other detected elements. The Al/Ca ratio determined for the planetary debris around different white dwarfs is remarkably similar. This is analogous to the nearly constant abundance ratio of these two refractory lithophile elements found among most bodies in the solar system. Based on the detection of all major elements of the circumstellar debris, we calculate accretion rates of $\simeq1.7\times10^8\,\mathrm{g\,s^{-1}}$ to $\simeq1.5\times10^9\,\mathrm{g\,s^{-1}}$. Finally, we detect additional circumstellar absorption in the [[Si]{}1394,1403Å]{} doublet in PG0843+516 and SDSS1228+1040, reminiscent to similar high-ionisation lines seen in the *HST* spectra of white dwarfs in cataclysmic variables. We suspect that these lines originate in hot gas close to the white dwarf, well within the sublimation radius. author: - | B.T. Gänsicke$^1$, D. Koester$^2$, J. Farihi$^3$, J. Girven$^1$, S.G. Parsons$^1$, E. Breedt$^1$\ $^{1}$ Department of Physics, University of Warwick, Coventry CV4 7AL, UK\ $^{2}$ Institut für Theoretische Physik und Astrophysik, University of Kiel, 24098 Kiel, Germany\ $^{3}$ Department of Physics Astronomy, University of Leicester, Leicester LE1 7RH, UK date: 'Accepted 2005. Received 2005; in original form 2005' title: 'The chemical diversity of exo-terrestrial planetary debris around white dwarfs' --- \[firstpage\] Stars: individual: PG0843+516, PG1015+161, SDSSJ122859.93+104032.9, GALEXJ193156.8+011745 – white dwarfs – circumstellar matter – planetary systems Introduction ============ Most of our current insight into the interior structure of exo-planets is derived from the bulk density of transiting planets [e.g. @valenciaetal10-1], and transit spectroscopy provides some information on the chemical composition of their atmospheres [e.g. @grillmairetal08-1]. More detailed investigations of the chemistry of exo-planetary systems around main-sequence host stars are beyond the reach of present observational instrumentation. However, @zuckermanetal07-1 demonstrated in a pioneering paper that the photospheric abundances of polluted white dwarfs can be used to infer the bulk abundances of the planetary debris material detected around the white dwarf GD362, and showed that the composition of this material is broadly comparable to that of the Earth-Moon system. The strong surface gravity of white dwarfs implies that metals will sink out of the photosphere on time scales that are orders of magnitude shorter than their cooling ages, and therefore white dwarfs are expected to have either pure hydrogen or helium atmospheres [@fontaine+michaud79-1]. Exceptions to this rule are only hot (${\mbox{$T_{\mathrm{eff}}$}}\ga25\,000$K) white dwarfs where radiative levitation can support some heavy elements in the photosphere [e.g. @chayeretal95-1], and cool (${\mbox{$T_{\mathrm{eff}}$}}\la10\,000$K) white dwarfs where convection may dredge up core material [@koesteretal82-2; @fontaineetal84-1]. Yet white dwarfs with metal-contaminated atmospheres have been known for nearly a century [@vanmaanen17-1], and accretion from the interstellar medium [e.g. @koester76-1; @wesemael79-1; @dupuisetal93-2] has been the most widely accepted scenario, despite a number of fundamental problems [e.g. @aannestadetal93-1; @friedrichetal04-1; @farihietal10-2]. However, the rapidly growing number of white dwarfs that are accreting from circumstellar discs [e.g. @becklinetal05-1; @kilicetal05-1; @gaensickeetal06-3; @vonhippeletal07-1; @farihietal08-1; @vennesetal10-1; @dufouretal12-1] unambiguously demonstrates that debris from the tidal disruption of main-belt analogue asteroids or minor planets [@grahametal90-1; @jura03-1], or Kuiper-belt like objects [@bonsoretal11-1], likely perturbed by unseen planets [@debesetal02-1; @debesetal12-1], is the most likely origin of photospheric metals in many, if not most polluted white dwarfs. Because of the need for high-resolution, high-quality spectroscopy, detailed abundance studies have so far been limited to a handful of white dwarfs [@kleinetal10-1; @kleinetal11-1; @vennesetal11-1; @melisetal11-1; @zuckermanetal11-1; @dufouretal12-1; @juraetal12-1]. For a given abundance and white dwarf temperature, metal lines are stronger in a helium-dominated (DB) atmosphere than in a hydrogen-dominated (DA) atmosphere, as the opacity of helium is much lower than that of hydrogen. Therefore, the small sample of well-studied metal polluted white dwarfs is heavily biased towards DB white dwarfs, which have diffusion time scales of $\sim10^5-10^6$yr. These long diffusion time scales introduce a significant caveat in the interpretation, as the abundances of the circumstellar debris may substantially differ from those in the white dwarf photosphere if the accretion rate varies on shorter time scales [@koester09-1]. While the life times of the debris discs are subject to large uncertainties, there are theoretical [@rafikov11-2; @metzgeretal12-1] and observational (@girvenetal12-1, Farihi et al. 2012 in press) arguments that suggest that the accretion rates onto the white dwarfs may vary significantly over periods that are short compared to the diffusion time scales. In fact, some of the most heavily polluted white dwarfs have no infrared excess [@farihietal09-1; @kleinetal11-1], and may have accreted all the circumstellar debris a few diffusion time scales ago [@farihietal09-1; @girvenetal12-1]. We are currently carrying out an ultraviolet spectroscopic survey of young DA white dwarfs that have cooling ages of 20 to 200Myr, metal sinking time scales of a few days, and are hence guaranteed to be in accretion-diffusion equilibrium. The aim of this survey is to determine the fraction of white dwarfs that are presently accreting planetary debris, and to determine accurate abundances for a subset. Here we present the analysis of four heavily polluted white dwarfs that are known to also host planetary debris discs. ![image](4daz_f1.ps){width="2\columnwidth"} Observations ============ The targets for our ongoing far-ultraviolet spectroscopic survey of young and correspondingly warm ($17\,000\,\mathrm{K}<{\mbox{$T_{\mathrm{eff}}$}}<25\,000$K) DA white dwarfs were drawn from the compilations of @liebertetal05-1 and @koesteretal09-2, supplemented with a few recent discoveries [e.g. @gaensickeetal06-3; @vennesetal10-1]. Our sample also includes a small number of post-common envelope binaries (PCEBs) in which the white dwarf accretes from the wind of the M-dwarf companion. These systems were selected from @schreiber+gaensicke03-1 and @farihietal10-3 with the same cut on white dwarf temperature and cooling age. Under the assumption that the M-dwarfs have a solar-like composition, the white dwarfs in PCEBs serve as “abundance standards” for our abundances analyses and diffusion calculations. *HST*/COS spectroscopy {#s-hstobs} ---------------------- PG0843+516, PG1015+161, and GALEXJ193156.8+011745 (henceforth GALEX1931+0117) were observed as part of our snapshot survey, with exposure times of 1420s, 1424s, and 800s, respectively. We used the G130M grating with a central wavelength of 1291Å, which covers the wavelength range $1130-1435$Å, with a gap at $1278-1288$Å due to the space between the two detector segments. To mitigate the fixed pattern noise that is affecting the COS far-ultraviolet detector, we split the exposure time equally between two FP-POS positions (1&4, the limited duration of the snapshot visits did not allow to use the full set of four different FP-POS positions). We also report COS observations of three PCEBs observed within this snapshot survey, that will be used as “abundances standards”: GD448 (HRCam, @maxtedetal98-1), GD245 (MSPeg, @schmidtetal95-3), and PG2257+162 (KUV22573+1613, @wachteretal03-1), with exposure times of 900s, 600s, and 1070s, respectively. SDSSJ122859.93+104032.9 (henceforth SDSS1228+1040) was observed in Cycle17 as part of a regular Guest Observer programme. We obtained two sets of spectroscopy with the G130M grating with central wavelengths of 1291Å and 1327Å, and both observations were again split among two FP-POS positions (1&4). In addition, we obtained G160M spectroscopy with central wavelengths of 1577Å and 1623Å. The total exposure time of the G130M and G160M observations were 2821s and 4899s, respectively, seamlessly covering the wavelength range $1130-1795$Å. The data retrieved from the *HST* archive were processed and calibrated with CALCOS 2.15.6. The COS spectra of the four white dwarfs shown in Fig.\[f-cos\] reveal the broad  profile typical of DA white dwarfs, plus a multitude of narrow absorption lines from a range of metals. The peak signal-to-noise ratio (S/N) of the COS spectra is reached in a line-free region near $1320$Å, and ranges from $\simeq25$ for PG0843+516 and PG1015+161 to $\simeq40$ for SDSS1228+1040 and GALEX1931+0117. However, these values only include photon count statistics, and do not account for the residual fixed-pattern noise related to the use of only two FP-POS positions. The resolving power of the COS spectra, as measured from on-orbit data ranges from $\sim15\,000$ at 1150Å to $\sim20\,000$ at 1430Å. Optical observations {#s-optobs} -------------------- The wavelength spanned by our COS observations does not cover any strong line of either Ca (traditionally the most important tracer of metal pollution in white dwarfs, and an important refractory element) or Mg (one of the major constituents of rocky material in the solar system, including the Earth). Ground-based abundance studies using the [Ca]{} H/K doublet and the [[Mg]{} 4482Å]{} line are already published for GALEX1931+0117 [@vennesetal10-1; @vennesetal11-1; @melisetal11-1]. Two short (10min) VLT/UVES spectra of PG1015+161 were obtained as part of the SPY project [@napiwotzkietal01-1], which @koesteretal05-2 analysed to determine the Ca abundance of PG1015+161 (Sect.\[s-pg1015\]). Here we use the same spectra to determine in addition the abundance of Mg. We observed PG0843+516 for a total of 2h on the WHT using ISIS with the R600B grating and a $1\arcsec$ slit, covering the Ca and Mg lines at a resolving power of $\simeq2500$ and a S/N of $\approx90$. The data were reduced and calibrated as described in @pyrzasetal12-1. We also obtained a total of 9h VLT/UVES spectroscopy of SDSS1228+1040 between 2007 and 2009 using the Blue390 and Blue437 setup with a $0.9\arcsec$ slit, covering both the Ca and Mg features with a resolving power of $\simeq40\,000$. The data were reduced in Gasgano using the UVES pipeline. The individual spectra were of relatively low S/N, and we analysed only the error-weighted average spectrum, binned to 0.05Å, with $\mathrm{S/N}\simeq35$. The optical spectra around the [Ca]{}K and [[Mg]{} 4482Å]{} lines are shown in Fig.\[f-camg\]. We note that while most previous studies of metal-polluted white dwarfs have focused on the [Ca]{} H/K lines, their strength for a given abundance decreases strongly with increasing temperature, as [Ca]{} is ionised to [Ca]{}. For temperatures ${\mbox{$T_{\mathrm{eff}}$}}\simeq20\,000-25\,000$K, [[Mg]{} 4482Å]{} becomes a more sensitive probe of metal pollution (e.g. @gaensickeetal07-1 [@farihietal12-1]). [lrr]{} Object &  \[K\] & $\log g$ \[cgs units\]\ \ optical, [@liebertetal05-1]& $23\,870 \pm 392$& $7.90 \pm 0.05$\ HST, this paper & $23\,095 \pm 230$& $8.17 \pm 0.06$\ \ optical, [@liebertetal05-1]&$19\,540 \pm 305$ & $8.04 \pm 0.05$\ optical, [@koesteretal09-2]&$19\,948 \pm 33$ & $7.925\pm0.006$\ HST, this paper &$19\,200 \pm 180$& $8.22 \pm 0.06$\ \ optical, [@eisensteinetal06-1] &$22\,125 \pm 136$& $8.22 \pm 0.02$\ optical, [@gaensickeetal07-1] &$22\,292 \pm 296$& $8.29 \pm 0.05$\ optical, our fit to SDSS spectrum &$22\,410 \pm 175$& $8.12 \pm 0.02$\ HST, this paper &$20\,565 \pm 82$ & $8.19 \pm 0.03$\ adopted, this paper (Sect. \[s-teff\_logg\]) &$20900 \pm 900$& $8.15 \pm 0.04$\ \ optical, [@vennesetal10-1] & $20\,890 \pm 120$& $7.90 \pm 0.03$\ optical, [@melisetal11-1] & $23\,470 \pm 300$& $7.99 \pm 0.05$\ HST, this paper & $21\,200 \pm 50$ & $7.91 \pm 0.02$\ ![image](PG0843+516_cosfit.eps){width="\columnwidth"} ![image](PG1015+161_cosfit.eps){width="\columnwidth"} ![image](SDSS1228+1040_cosfit.eps){width="\columnwidth"} ![image](GALEX1931+0117_cosfit.eps){width="\columnwidth"} Atmosphere models ================= \[s-teff\_logg\]Effective temperature and surface gravity --------------------------------------------------------- All observed *HST*/COS and optical spectra were analysed with theoretical model atmospheres using input physics as described in @koester10-1, and including the Lyman and Balmer line profiles of @tremblay+bergeron09-1. We used a fine grid of models spanning the range of temperatures and surface gravities found for the four targets by previous studies (Table \[t-parameters\]) and determined the best-fit parameter by minimising $\chi^2$, using the very good relative flux calibration as an additional constraint. The errors reported in Sect.\[s-notes\] are statistical only and do not include systematic effects of observation, reduction, or models. More realistic errors can be estimated from a comparison with the other measurements in the literature, which used similar models, but optical spectra. Table \[t-parameters\] suggests a systematic trend for somewhat lower temperatures derived from the ultraviolet data when compared to the values based on optical spectroscopy. A similar trend is seen for DA white dwarfs with ${\mbox{$T_{\mathrm{eff}}$}}\sim20\,000$K in @lajoie+bergeron07-1, who compared the effective temperatures derived from optical and (*International Ultraviolet Explorer *) ultraviolet spectroscopy. We carried out a range of test calculations to explore the effect of these systematic uncertainties in ${\mbox{$T_{\mathrm{eff}}$}}$ and $\log g$ on the derived metal abundances (Sect. \[s-abundances\]). The abundances and mass fluxes do not change by more than $\simeq0.1$dex, which is less than the typical uncertainty of our fits, and the abundance ratios vary by much less. Hence, the discussion in Sect. \[s-debrisnature\] and \[s-mdot\] is not affected by the systematic uncertainties in ${\mbox{$T_{\mathrm{eff}}$}}$ and $\log g$. Finally, to assess the possible effect that the presence of metals has on the effective temperature and surface gravity, we computed a small grid of models for the two most metal-polluted stars (PG0843+516, GALEX1931+0117), including metals at the abundances determined in Sect.\[s-abundances\], and re-fitted the *HST*/COS spectra. For both stars, the best-fit ${\mbox{$T_{\mathrm{eff}}$}}$ and $\log g$ did not change significantly, and we therefore adopted the atmospheric parameters from the pure-hydrogen fits for all four targets. Ion Vacuum wavelengths \[Å\] ---------------- -------------------------------------------------------- [C]{} 1334.530,1335.660,1335.708 [C]{} 1174.930,1175.260,1175.590,1175.710,1175.987,1176.370 [N]{} 1199.550,1200.220,1200.710 [O]{} 1152.150,1302.170,1304.860,1306.030 [Mg]{} 1239.925,1240.395,1367.257,1367.708,1369.423, 4482.383,4482.407,4482.583 [Al]{} 1670.787,1719.442,1724.922,1724.982,1760.106,1761.977, 1763.869,1763.952,1765.816 [Al]{} 1379.670,1384.132,1605.766,1611.873 [Si]{} 1190.416,1193.292,1194.500,1197.394,1246.740,1248.426, 1250.091,1250.436,1251.164,1260.422,1264.738,1265.002, 1304.370,1305.592,1309.276,1309.453,1311.256,1346.884, 1348.543,1350.072,1350.516,1350.656,1352.635,1353.721, 1526.707,1533.431,3854.758,3857.112,3863.690,4129.219, 4132.059,5042.430,5057.394,6348.864,6373.132 [Si]{} 1140.546,1141.579,1142.285,1144.309,1144.959,1154.998, 1155.959,1156.782,1158.101,1160.252,1161.579,1206.500, 1206.555,1294.545,1296.726,1298.892,1301.149,1303.323, 1312.591,1341.458,1342.389,1365.253,1417.237 [Si]{} 1393.775,1402.770 [P]{} 1149.958,1152.818,1153.995,1155.014,1156.970,1159.086, 1249.830,1452.900,1532.533,1535.923,1536.416,1542.304, 1543.133,1543.631 [P]{} 1334.813,1344.326 [S]{} 1250.584,1253.811,1259.519 [S]{} 1194.041,1194.433 [Ca]{} 1169.029, 1169.198,1341.890,3737.965,3934.777 [Sc]{} 1418.773,1418.793 [Ti]{} 1298.633,1298.697,1298.996,1327.603 [V]{} 1148.465,1149.945,1149.945 [Cr]{} 1136.669,1146.342,1247.846,1252.616,1259.018,1261.865, 1263.611 [Mn]{} 1162.015,1188.505,1192.316,1192.330,1197.184,1199.391, 1201.118,1233.956,1254.410 [Mn]{} 1174.809,1177.478,1179.851,1183.308,1183.863,1183.880 [Fe[/iii]{}]{} many weak lines, individually recognisable 1140-1152 [Ni]{} 1317.217,1335.201,1370.123,1381.286,1393.324,1411.065 : \[t-idlines\] List of major line features used for the abundance determinations and upper limits. Because of the different wavelength ranges of the available spectra not all lines could be used for all four stars. \[s-abundances\] Metal abundances --------------------------------- The COS spectra of the four white dwarfs contain a multitude of absorption lines from a range of elements. GALEX1931+0117 has the richest absorption spectrum, in which we securely identified transitions of nine elements (C, O, Al, Si, P, S, Cr, Fe, Ni), and we included those metals in the abundance analysis of all four targets. We also include in the analysis N, Na, Ti, V, Mn, which have moderately strong transitions in the wavelength range covered by the COS observations, but that were not detected. All metals were fully included in the calculation of the equation of state. Synthetic spectra were calculated adopting the atmospheric parameters determined in Sect.\[s-teff\_logg\], and including approximately 2500 metal lines. The basic source of atomic line data (wavelengths, excitation energies, transition probabilities $\log$gf, Stark broadening constant $\Gamma_4$) was VALD (Vienna Atomic Line Database), which is described in [@piskunovetal95-1], [@ryabchikovaetal97-1], and [@kupkaetal99-1; @kupkaetal00-1]. The ion [Si]{} has a large number of lines in the ultraviolet, and we noted a significant scatter in the abundances derived from different lines. Replacing the $\log$ gf values from VALD values with those from the NIST (National Institute of Standards) database, which differ for some lines by up to 0.3dex, leads to more consistent results. Nevertheless, the situation for this ion is not satisfactory (Sect.\[s-silicon\]), and we have consulted a number of original sources in the literature [@lanz+artru85-1; @nahar98-1; @bautistaetal09-1] during the compilation of the most reliable atomic data. The abundances were varied until a satisfactory fit, as judged by visual inspection, was achieved for each element. We then changed the abundances in several steps of 0.1 - 0.2 dex, until the fit was clearly worse. The resulting difference was used as a conservative estimate for the abundance error, or for an upper limit if no line was identified. Table \[t-idlines\] lists the lines used in this procedure, although not all lines could be used for all four stars. The best-fit models to the COS observations are illustrated in Figs.\[f-fit1\] and \[f-fit2\], and the metal abundances of the four white dwarfs are given in Table\[t-abundances\] (along with the previous abundance studies were carried out for GALEX1931+0117, @vennesetal11-1 [@melisetal11-1]). Notably, upper limits for N were always larger than solar relative to C. For Na, Ti, V, Mn (and additionally Ca in PG0843+516 as well as Ca, Al, P, S, Ni in PG1015+161) the upper limits were larger than solar relative to Si. We have used these (solar) values in the models, but it did not change the atmosphere structure and the results for the detected elements. ### Interstellar line absorption and airglow In all objects interstellar absorption is visible in the resonance lines of [C]{}, [N]{}, [O]{}, [Si]{}, and [S]{}. In SDSS1228+1040, PG1015+161, and GALEX1931+0117 the interstellar absorption lines are shifted blue-wards with respect to the photospheric lines by velocities of $v = 57$, $36$, and $61$ , respectively. In PG0843+516, $|v| < 7$ , and the interstellar lines are not fully separated from the photospheric features. However, the presence of some interstellar absorption is obvious from the line ratio of [[C]{} 1334.5Å]{}/[[C]{} 1335.7Å]{} (Fig. \[f-fit1\] & \[f-fit2\]). Because the latter line originates from a level only 0.008 eV above the real ground state, it is equally populated in a stellar photosphere, but not in the interstellar medium, where the blue component is much stronger in spite of a lower transition probability. Nevertheless, the abundances of C, O, Si, and S are robust, as a sufficient number of excited transitions are present in the photospheric spectrum (Table\[t-idlines\]). The COS pipeline does not correct for airglow emission. Therefore, the reduced COS spectra can contain geocoronal lines of [[O]{}1302, 1305, 1306Å]{} whose intensity, and, to a lesser extent, profile shape, vary as a function of *HST*’s orbital day/night, and weakly with the Earth-limb angle. Airglow is clearly seen in the spectrum of GALEX1931+0117 (Fig.\[f-fit2\], right panel), which affects the fit to the photospheric [O]{} and [Si]{} lines in this region. For Si, this is a minor problem as there are many additional lines of [Si[-iv]{}]{}. For O, another strong line in the COS spectra is [[O]{} 1152Å]{}. ### Silicon {#s-silicon} We notice relatively large differences of the silicon abundance determined from optical versus ultraviolet spectra in SDSS1228+1040 and GALEX1931+0117, for the latter also the oxygen abundances show this difference. There are at least three possible explanations: *Uncertain atomic data.* This is a perennial problem, as there are many, and large differences in various compilations of atomic data. The [O]{} resonance lines in GALEX1931+0117 are perturbed by airglow, interstellar absorption and overlapping [Si]{} lines (see above), and the ultraviolet abundance determination rests largely on one excited line at 1152.1 Å. Similarly, the optical O abundance is measured only from the [[O]{}7777Å]{} triplet [@vennesetal10-1; @melisetal11-1]. However, our abundance measurements for Si use many lines in the ultraviolet. In the recent compilation by [@bautistaetal09-1] the authors combined several different computational methods, previous theoretical calculations by other authors, and experimental data into a “recommended” value for $\log$ gf. These values agree fairly well with the ultraviolet data from NIST that we have used. However, for the five optical lines they consider, the values are $0.25-0.30$dex smaller, though with errors as large as 0.3dex. Using these values would [*increase*]{} the abundance determined from optical spectra, contrary to what would be needed for a more consistent solution. In addition, in a recent analysis of ultraviolet spectra for the DBZ star GD40, @juraetal12-1 find a discrepancy between optical and ultraviolet abundances for Si of the same size, but in opposite direction - the abundances are smaller for the optical determinations. Since that study used the same models and atomic data as the one presented here, there is no indication that the atomic data are behind this discrepancy. ------------ ---------------- ---------------- ---------------- ---------------- ----------------- ---------------- Element PG0843+516 PG1015+161 SDSS1228+1040 Vennes et al. Melis et al. C $-7.30\pm0.30$ $<-8.00$ $-7.50\pm0.20$ $-6.80\pm0.30$ $<-4.15$ $<-4.85$ O $-5.00\pm0.30$ $-5.50\pm0.20$ $-4.55\pm0.20$ $-4.10\pm0.30$ $-3.62\pm0.05$ $-3.68\pm0.10$ Mg $-4.90\pm0.20$ $-5.30\pm0.20$ $-5.10\pm0.20$ $-4.42\pm0.06$ $-4.10\pm0.10$ Mg (strat) $-5.00\pm0.20$ $-5.30\pm0.20$ $-5.20\pm0.20$ Al $-6.50\pm0.20$ $-5.75\pm0.20$ $-6.20\pm0.20$ Si $-5.20\pm0.20$ $-6.40\pm0.20$ $-5.20\pm0.20$ $-4.75\pm0.20$ Si (opt) $-4.70\pm0.20$ $-4.24\pm0.07$ $-4.35\pm0.11$ P $-6.60\pm0.20$ $<-7.30$ $-7.00\pm0.30$ S $-5.50\pm0.30$ $<-6.20$ $-6.60\pm0.20$ Ca $-6.30\pm0.20$ $-5.70\pm0.20$ $-6.11\pm0.04$ $-5.83\pm0.10$ Ca (strat) $-6.45\pm0.20$ $-5.94\pm0.20$ Cr $-5.80\pm0.30$ $<-5.80$ $<-6.00$ $-6.10\pm0.30$ $-5.92\pm0.14$ Mn $-6.26\pm0.15$ Fe $-4.60\pm0.20$ $-5.50\pm0.30$ $-5.20\pm0.30$ $-4.50\pm0.30$ $ -4.43\pm0.09$ $-4.10\pm0.10$ Ni $-6.30\pm0.30$ $<-6.50$ $-6.70\pm0.30$ $<-5.60$ ------------ ---------------- ---------------- ---------------- ---------------- ----------------- ---------------- *Abundance stratification.* Contrary to DB stars like GD40 at similar temperatures, there are no convection zones in the atmospheres and envelopes of our four objects, which would act as a homogeneously mixed reservoir in the accretion/diffusion scenario. Assuming a steady state between the two processes, we thus expect a stratified abundance configuration. Whether this can explain the observations will be studied in Sect.\[s-diffusion\]. *Genuine variation of the accretion rates.* As will also be discussed in the next section, the time scales for diffusion in these atmospheres are of the order of days. If the accretion rate is not constant the observed abundances may change on the same short time scales. Given that the COS and ground-based observations that we analysed were taken months to years apart, such variations can not be excluded. Noticeable variations of the [Ca]{} equivalent widths in the debris disc white dwarf G29-38 were reported by @vonhippeletal07-2. However, a similar study on the same star by @debes+lopez-morales08-1 did not find any variations in the line strengths. Thus, the current evidence for accretion rate variations on time scales of months to years is ambiguous, and a second-epoch COS observations of the stars studied here would be desirable. We also noticed an unidentified absorption feature between 1400 and 1410 Å, with a strength roughly correlated with the Si abundances. Such a feature has been discussed in the literature and related to an autoionisation line of [Si]{} or to a resonance feature in the photoionisation cross section [@artru+lanz87-1; @lanzetal96-1]. We have tested such a hypothetical line with their data for the oscillator strength and line width data. However, the width ($\approx 80$Å) is much too broad to lead to visible features in the spectrum. We have also included the [Si]{} photoionisation cross sections from the Opacity Project [@seatonetal94-1], which indeed show a resonance maximum in this spectral region. But again, the Si abundance is too small to let this feature show up in the spectrum. Our model uses the six [Si]{} lines at 1403.8, 1404.2, 1404.5, 1409.1, 1409.9, and 1410.2 Å in this range (Table\[t-idlines\]). The first two have the source “guess” in VALD, the first three have no entry in NIST, and the $\log$ gf values of the strongest line (1410.2Å) differ by $\approx 0.8$dex between the two databases. The upper levels of the transitions have a parent configuration belonging to the second ionisation limit of [Si]{}. They are still $\approx0.7$eV below the first ionisation limit and thus not strictly auto-ionising. However, the broadening may well be underestimated by our simple approximation formulae. In summary, the atomic data of the lines in the region are very uncertain and may be the explanation for the broad feature. However, with the present data we cannot prove that hypothesis. Finally, we note that the [[Si]{}1394,1403Å]{} doublet in PG0843+516 is very poorly fit by our atmosphere model (Fig.\[f-fit1\]). A weaker additional [[Si]{}1394,1403Å]{} absorption is also seen in the spectrum of SDSS1228+1040 (Fig.\[f-fit2\]). We interpret this as evidence for absorption by hot gas close to the white dwarf, see the discussion in Sect.\[s-hotgas\]. Element ---------- -------------------- --------------------- --------------------- -------------------- C $1.66\times10^{5}$ $4.65\times10^{4}$ $1.25\times10^{5}$ $4.57\times10^{5}$ O $9.27\times10^{7}$ $3.78\times10^{7}$ $2.70\times10^{8}$ $5.61\times10^{8}$ Mg $4.47\times10^{7}$ $2.66\times10^{7}$ $3.21\times10^{7}$ $1.47\times10^{8}$ Al $2.09\times10^{6}$ $1.18\times10^{7}$ $3.08\times10^{6}$ Si $4.77\times10^{7}$ $3.64\times10^{6}$ $4.80\times10^{7}$ $9.93\times10^{7}$ P $2.44\times10^{6}$ $<5.24\times10^{5}$ $7.57\times10^{5}$ S $3.92\times10^{7}$ $<9.46\times10^{6}$ $2.64\times10^{6}$ Ca $4.84\times10^{6}$ $1.57\times10^{7}$ $8.10\times10^{6}$ Cr $3.81\times10^{7}$ $<3.85\times10^{7}$ $<2.29\times10^{7}$ $1.37\times10^{7}$ Mn $1.06\times10^{7}$ Fe $7.11\times10^{8}$ $9.50\times10^{7}$ $1.72\times10^{8}$ $6.45\times10^{8}$ Ni $1.66\times10^{7}$ $<9.98\times10^{6}$ $4.71\times10^{6}$ $\Sigma$ $1.02\times10^{9}$ $1.68\times10^{8}$ $5.61\times10^{8}$ $1.50\times10^{9}$ ### Diffusion and stratified atmosphere models {#s-diffusion} In the absence of a convection zone there is no deep homogenous reservoir in our DAZ sample, and therefore there is no straightforward definition of diffusion time scales. Adopting the usual definition, i.e. dividing the mass of some element above a layer in the envelope or atmosphere of the star by the diffusion flux, results in diffusion time scales that strongly depend on the chosen layer. [@koester+wilken06-1] and [@koester09-1] defined the Rosseland optical depth $\tau=5$ as the “standard” layer, assuming that no trace of any heavy element below this would be seen in a spectrum. However, a more consistent way to determine the abundances in the accreted material, which is the quantity ultimately desired, is the assumption of a steady state between accretion and diffusion throughout the whole atmosphere. At Rosseland optical depth $\tau = 2/3$, and typical conditions for the observed ultraviolet spectra, the diffusion times in the four white dwarfs analysed here are $\simeq0.4$ to four days. Assuming that the accretion rate does not vary over such time scales, we can use the condition of constant flow of an element with mass fraction $X(\tau)$ $$\rho X v = \mbox{const}$$ with $\rho$ and $v$ the mass density and the diffusion velocity of this element. $\rho$ and $v$ are known from the atmosphere model and diffusion calculations, and $X(\tau=2/3)$ is derived from the spectral analysis. This determines the diffusion flux at $\tau = 2/3$. In steady state, as it is the case for the DAZ analysed here, the diffusion flux is constant throughout the atmosphere, and is equal to the accretion rate polluting the atmosphere. The constant diffusion flux then in turn allows the determination of the abundance stratification $X(\tau)$ [see also @vennesetal11-1 for a thorough discussion]. We calculated new stratified models and synthetic spectra for all objects, using the steady state condition and the abundances (at $\tau = 2/3$) from Table \[t-abundances\]. The resulting spectra are almost indistinguishable from those of the homogeneous atmospheres; the only exception are small increases of the optical [Mg]{} and [Ca]{} line strengths. The small change can easily be explained by the structure of the stratified atmosphere. In these models $\rho \,v$ increases with depth, and consequently the abundance decreases. On the other hand a monochromatic optical depth of $\approx 2/3$ is reached in the ultraviolet near Rosseland optical depth of $\tau_\mathrm{Ross}\simeq2/3$, while it is reached at $\tau_\mathrm{Ross} \approx 0.15$ for $\lambda = 4480$ Å, i.e. higher in the atmosphere, where the abundance is correspondingly higher. For PG0843+516, PG1015+161, and SDSS1228+1040, the Ca and Mg abundances were obtained from the optical data (Sect.\[s-optobs\]) and our models. We have iterated them by fitting to stratified models (denoted with “strat” in Table \[t-abundances\]). For GALEX1931+0117, we adopted the photospheric Mg an Ca abundances of @vennesetal11-1 and the Mn abundance of @melisetal11-1 to calculate the corresponding diffusion fluxes. As a result we have to conclude that diffusion and a stratified abundance structure lead only to minor adjustments of the abundances that cannot explain the large discrepancy between optical and ultraviolet determinations for silicon. There is, however, an important caveat to this conclusion. Our diffusion calculations use only the surface gravity (and as a minor effect the temperature gradient for thermal diffusion) as driving force. [@chayer+dupuis10-1] have recently demonstrated that for silicon, radiative levitation can lead to a negative effective gravity and support the atoms in the outer layers of the atmosphere against diffusion. They only published detailed data for a DAZ model with 20000K and $\log g=8.00$, and in their model only abundances smaller than $\log\mathrm{[Si/H]}=-8.0$ are really supported, because the lines saturate at higher abundances, effectively reducing the radiative support. However, it is quite feasible that even if the atoms are not totally supported, the diffusion velocity would be smaller, changing the abundance gradient. The answer to this puzzle will have to await similar, detailed models for a variety of stellar parameters and heavy elements that can be tested against the large range of Si abundances found in our snapshot survey (Gänsicke et al. in prep). Other points worth mentioning are that the determination of an effective ion charge with the simple pressure ionisation description of @paquetteetal86-1 is not appropriate in the absence of deep convection. We have used the usual Saha equation (with a small lowering of the ionisation potential from non-ideal interactions) to determine the abundances of different ions from an element. The diffusion velocity is then calculated as a weighted average of the ionisation stages. This procedure was already used in @koester+wilken06-1 and @koester09-1 for the models without or with only a shallow convection zone, although not explicitly stated in those papers. New in our present calculation is the consideration of neutral particles, following the discussion and methods outlined in @vennesetal11-2. The main results of our calculations are the diffusion fluxes, $X \rho v$, for each element, which are assumed (in steady state) to be the abundances of the accreted matter. These are summarised for the four objects in Table \[t-fluxes\]. The total diffusion fluxes (=accretion rates) are obtained by multiplying these fluxes with $4 \pi R_\mathrm{wd}^2$, where we used the cooling tracks of [@wood95-1] to obtain the white dwarf radii from ${\mbox{$T_{\mathrm{eff}}$}}$ and $\log g$. The mass fluxes (=accretion rates) of the individual elements, as well as their sum, are shown in Fig.\[f-mdot\] and discussed in Sect. \[s-mdot\]. The number abundances of the circumstellar debris are then calculated from the diffusion fluxes via $$\mathrm{\frac{N(X)}{N(Si)}=\frac{\dot M(X)}{\dot M(Si)}\frac{A(Si)}{A(X)}}$$ where A is the atomic mass. The implications that these abundances have on the nature and origin of the circumstellar debris are discussed in detail in Sect.\[s-debrisnature\]. ![\[f-mdot\] Accretion rates of the elements detected in our four targets. Their sum is given in the right-most column.](mdot.ps){width="\columnwidth"} Notes on individual white dwarfs {#s-notes} ================================ In the following sections, we give a brief overview of previous work on the four white dwarfs that we have analysed, as well as a summary of the key results of our observations. PG0843+516 ---------- PG0843+516 was identified as a DA white dwarf in the Palomar-Green Survey [@greenetal86-1], and @liebertetal05-1 obtained ${\mbox{$T_{\mathrm{eff}}$}}=23\,870\pm392$K, $\log g=7.90\pm0.05$ from the analysis of a high-quality optical spectrum. The best fit to our *HST* data was ${\mbox{$T_{\mathrm{eff}}$}}=23\,095 \pm 230$K, $\log g=8.17\pm0.06$. Our COS spectrum reveals PG0843+516 to be an extremely polluted DAZ white dwarf (Fig.\[f-cos\] & \[f-fit1\]), with an accretion rate of $\simeq10^9\,\mathrm{g\,s^{-1}}$, placing it head-to-head with GALEX1931+0117 (Sect.\[s-mdot\]). We identified in the COS spectrum photospheric absorption lines of C, O, Al, Si, P, S, Fe, Cr, and Ni, plus Mg in the optical WHT spectrum, the second largest set of elements detected in a DAZ white dwarf. The fact that the metal pollution of PG0843+516 went unnoticed in the published high-quality intermediate resolution spectroscopy underlines the strength of our ultraviolet survey for young and relatively warm white dwarfs accreting planetary debris. We note that @xu+jura12-1 recently detected infrared flux excess at PG0843+516 in an analysis of archival *Spitzer* data, making this the second white dwarf (after G29-38, @zuckerman+becklin87-1 [@koesteretal97-1]) where circumstellar dust was found without prior knowledge of photospheric metal pollution. PG1015+161 {#s-pg1015} ---------- PG1015+161 is another DA white dwarf discovered in the Palomar-Green Survey [@greenetal86-1]. @liebertetal05-1 determined ${\mbox{$T_{\mathrm{eff}}$}}=19\,540\pm305$K, $\log g = 8.04\pm0.05$ from optical spectroscopy. High-resolution spectroscopy of PG1015+161 was obtained as part of the SPY project [@napiwotzkietal01-1], from which @koesteretal09-2 measured ${\mbox{$T_{\mathrm{eff}}$}}=19\,948\pm33$K and $\log g=7.925\pm0.006$. Our fit to the HST spectrum gives in ${\mbox{$T_{\mathrm{eff}}$}}=19\,200 \pm 180$K, $\log g = 8.22 \pm 0.06$. @koesteretal05-2 detected of a photospheric [Ca]{}K absorption line in the SPY data, with a number abundance $\log\mathrm{[Ca/H]}=-6.3$, which triggered follow-up observations with *Spitzer* that revealed the presence of circumstellar dust [@juraetal07-1]. The COS spectrum contains absorption lines of O, Si, and Fe. In addition to [Ca]{}K, we detected [[Mg]{} 4482Å]{} in the SPY spectrum. PG1015+161 has the lowest accretion rate among the four stars discussed in this paper. SDSS1228+1040 ------------- @eisensteinetal06-1 identified this DA white dwarf in Data Release 4 of the Sloan Digital Sky Survey, and found ${\mbox{$T_{\mathrm{eff}}$}}=22\,125\pm136$K, $\log g=8.22\pm0.02$ from a fit to the SDSS spectrum. @gaensickeetal06-3 discovered double-peaked emission lines of [[Ca]{}8498,8542,8662Å]{} as well as weak [Fe]{} emission lines and [[Mg]{} 4482Å]{} absorption, and concluded that SDSS1228+1040 accretes from a volatile-depleted gaseous circumstellar disc. The [Ca]{} lines form in a region extending in radius from a few tenths  to $\simeq1.2$, no emission is detected from closer in to the white dwarf (but see Sect. \[s-hotgas\]). *Spitzer* observations showed that SDSS1228+1040 also exhibits an infrared excess [@brinkworthetal09-1], and that there is a large radial overlap between the gaseous and dusty components of the disc. Yet, the strong [Ca]{} emission lines require a gas temperature of $T\sim4000-6000$K (e.g. @hartmannetal11-1), substantially exceeding the sublimation temperature of the dust. This implies the thermal decoupling of the gas and dust, most likely in the form of a complex vertical temperature structure, with hotter, optically thin gas on top cooler, probably optically thick dust [@kinnear11; @melisetal10-1]. Irradiation from the white dwarf is sufficient to explain this temperature inversion [@kinnear11; @melisetal10-1], but the origin of the gas found at radii larger than the sublimation radius is unclear, and may be related to relatively fresh disruption events [@gaensickeetal08-1; @melisetal10-1] or the intrinsic evolution of the debris disc [@bochkarev+rafikov01-1; @metzgeretal12-1]. Among the four white dwarfs studied here, SDSS1228+1040 is the only one that exhibits emission lines from a gaseous disc. The COS spectrum of SDSS1228+1040 contains absorption lines of C, O, Al, Si, Cr, and Ni. SDSS1228+1040 was observed outside the snapshot program described in Sect.\[s-hstobs\], and our COS spectroscopy extends up to 1790Å, i.e. 360Å further than that obtained for the other three white dwarfs. This extended wavelength range includes additional strong lines of [Si]{}, [Al]{}, and [Al]{}, but no further elements. Our high-quality average UVES spectrum is used to determine the abundances of Mg and Ca, bringing the total number of detected elements in SDSS1228+1040 to eight. We fitted the SDSS spectrum, finding ${\mbox{$T_{\mathrm{eff}}$}}=22\,410\pm175$K, $\log g= 8.12 \pm 0.03$, whereas a fit to the ultraviolet spectrum gives ${\mbox{$T_{\mathrm{eff}}$}}=20\,565 \pm 82$K, $\log g=8.19 \pm 0.03$. This discrepancy underlines that, for high-quality data, the uncertainties are dominated by systematic rather than statistical errors. As a compromise we take the weighted mean of the latter two results with increased errors, ${\mbox{$T_{\mathrm{eff}}$}}=20\,900 \pm 900$K, $\log g = 8.15 \pm 0.04$. GALEX1931+0117 -------------- As part of a spectroscopic identification program of ultraviolet-excess objects @vennesetal10-1 recently identified GALEX1931+0117 as a nearby ($\simeq55$pc) DAZ white dwarf. @vennesetal10-1 and @melisetal11-1 analysed optical spectroscopy, and obtained ${\mbox{$T_{\mathrm{eff}}$}}= 20\,890\pm120$K, $\log g=7.90{+0.03\atop-0.06}$ and ${\mbox{$T_{\mathrm{eff}}$}}= 23\,470\pm300$K, $\log g=7.99\pm0.05$, respectively. Our best-fit parameters from the *HST*/COS spectrum are ${\mbox{$T_{\mathrm{eff}}$}}=21\,200\pm50$K, $\log g=7.91\pm0.02$, consistent with that of @vennesetal10-1 but somewhat lower than that of @melisetal11-1[^1]. The VLT/UVES spectroscopy obtained by @vennesetal10-1 [@vennesetal11-1] revealed strong metal lines of O, Mg, Si, Ca, and Fe, indicating ongoing accretion. @vennesetal10-1 also showed that the 2MASS $H$- and $K$-band fluxes exceeded those expected from the white dwarf, and suggested a close brown dwarf or a dusty debris disc as origin of the accreting material. @debesetal11-1 ruled out the presence of a sub-stellar companion based on the infrared fluxes detected by *WISE*, and argued that the white dwarf accretes from a dusty disc. This was independently confirmed by VLT/ISAAC near-IR observations obtained by @melisetal11-1, who also measured abundances for Cr and Mn. Our *HST*/COS spectroscopy provides independent measurements for O, Si, Cr, and Fe, as well as the first detection of C, Al, P, S, and Ni, bringing the total number of elements observed in the photosphere of GALEX1931+0117 to 11 (Table\[t-abundances\]). As discussed in Sect.\[s-abundances\], the O, Si, Cr, and Fe abundances that we derive from the COS spectroscopy are lower than those determined by @vennesetal11-1 and @melisetal11-1. However, the discussion of the nature of the planetary material is usually based on relative metal-to-metal abundance ratios [@nittleretal04-1], which are more robust than absolute abundances measurements. Figure\[f-mm\] compares the metal abundances determined for GALEX1931+0117 normalised with respect to Si, and relative to the corresponding ratios for the chemical composition of the bulk Earth. It is evident that our metal-to-Si ratios are consistent with those of @melisetal11-1, whereas the Mg/Si, Fe/Si, and Ca/Si ratios of @vennesetal11-1 are systematically lower. ![image](mm_wd1929.ps){width="\columnwidth"} ![image](mm_4daz.ps){width="\columnwidth"} The nature and origin of the circumstellar material {#s-debrisnature} =================================================== The four white dwarfs studied here have diffusion time scales of a few days (Sect.\[s-diffusion\]), and we can therefore safely assume that we observe them in accretion-diffusion equilibrium. In other words, the abundances of the circumstellar debris can be determined from the photospheric analysis without any additional assumptions regarding the history of the accretion rate that are necessary for stars with very long diffusion time scales [e.g. @kleinetal11-1]. In what follows, we discuss the abundances of the circumstellar debris normalised to Si, the main rock-forming element, as is common use for solar-system objects [e.g. @lodders+fegley11-1]. Figure\[f-mm\] (right panel) illustrates the metal-to-Si ratios of the planetary debris around the four white dwarfs relative to the same abundances of the bulk Earth model by @mcdonough00-1. The first striking observation is that the C/Si ratios of all four stars (including one upper limit) are much lower than that of CI chondrites, and in fact agree within their errors with the C/Si value of the bulk Earth model. While the C abundance of the bulk Earth is subject to some model-dependent assumptions (see the left panel of Fig.\[f-mm\] for an alternative chemical model of the Earth by @allegreetal01-1), these uncertainties are comparable to the errors in our abundance determinations. For comparison, we include in Fig.\[f-mm\] the abundance ratios of three white dwarfs that accrete from the wind of a close M-dwarf companion, that were also observed as part of our COS snapshot programme[^2]. The only elements detected in the COS spectra of these three stars are C, O, Si and S, and they exhibit high abundances in C and S, as expected for the accretion of solar-like material. The extremely low abundances of the volatile C found for the debris around the four white dwarfs strongly underlines its rocky nature. This corroborates the previous studies of @jura06-1 and @juraetal12-1, who found strong evidence for substantial depletion of C around three DB white dwarfs. However, Fig.\[f-mm\] also shows that there is a significant scatter among the individual abundances for a given element. Among the four targets, the abundances of the debris in SDSS1228+1040 most closely resembles those of the bulk Earth. PG1015+161 stands out by having all detected elements over-abundant with respect to Si, when compared to the bulk Earth. An interesting trend is seen in PG0843+516, where Fe, Ni, and S are significantly over-abundant, and, in fact, broadly consistent with the abundance ratios of the core Earth model. In particular, the volatile S is extremely overabundant with respect to C, compared to the bulk silicate Earth. In melts, S will form FeS, and hence be depleted from remaining minerals. The affinity of S to Fe is thought to be the reason for the depletion of S in the silicate mantle of the Earth, as it will have settled into the Earth’s core in the form of iron sulfide [@ahrens79-1; @dreibus+palme96-1]. Similarly, also Cr is significantly over-abundant in PG0843+516 with respect to the bulk Earth. While Cr is a moderately volatile element, the depletion of Cr in the silicate Earth is thought to be due to partitioning into the Earth’s core [@moynieretal11-2]. Finally, the refractory lithophile Al is under-abundant compared to the silicate Earth. Thus, the abundance pattern seen in PG0843+516 suggests that the planetary debris is rich in material that has undergone at least partial melting, and possibly differentiation. A possible test of this hypothesis would be a measurement of the abundance of Zn, a lithophile element with a similar volatility as S that is not depleted into iron melt [@lodders03-1], and it will be important to test whether the refractory lithophile Ca is depleted at a similar level as Al. The most promising feature to measure the Zn abundances is the [[Zn]{}2026,2062Å]{} resonance doublet, and [Ca]{}K should be easily detectable in high-resolution optical spectroscopy. To further explore the chemical diversity of the planetary debris around the four white dwarfs studied here, we compare pairwise a range of metal-to-Si abundance ratios with those of the bulk Earth and bulk silicate Earth [@mcdonough00-1], as well as with those of a variety of meteorites (taken from @nittleretal04-1). We inspect first the relative abundances of Al and Ca, which are two of the three most abundant refractory lithophile elements (the third one being Ti), i.e. elements that sublimate only at very high temperatures, and that do not enter the core in the case of differentiation. Therefore, the Al/Ca ratio is nearly constant across most classes of meteorites, and hence, the Al/Si values determined from many solar-system bodies follows a linear correlation with Ca/Si (Fig.\[f-mm\_mm\], top right). Finding that the abundances for the debris discs, where Al, Ca, and Si are available, generally follow that trend is reassuring, as large variations in the relative Al and Ca abundances would cast doubts on the overall methodology using white dwarf photospheres as proxies for the abundances of the circumstellar material. The relative abundances of O, Si, Mg, and Fe, which are the major constituents of the terrestrial planets in the solar system, show substantial variations between different meteorite groups (Fig.\[f-mm\_mm\], top left and bottom right panels), and at least as much scatter between the individual white dwarfs. The difficulty with these elements is that they form a range of different minerals (metal oxides), depending on the prevailing pressure and temperature. Iron in particular may occur as pure metal, alloy, or mineral, and is subject to differentiation into planetary cores. Oxygen, on the other hand, can be be locked in a wide range of oxides (see the discussion by @kleinetal10-1), or potentially water [@kleinetal10-1; @jura+xu10-1; @farihietal11-1; @jura+xu12-1]. Therefore, the relative abundances of O, Si, Mg, and Fe will vary according to the processing that material underwent (e.g. condensation, melting, and differentiation), and it is maybe not too surprising to find that the debris around white dwarfs exhibits at substantial degree of diversity, as it represents different planetary systems formed around different stars. We note that the debris at PG0843+516 falls close to the abundance ratios of Pallasites, a class of stony-iron meteorites. This further supports our hypothesis that PG0843+516 is accreting material in which iron has undergone (partial) melting. ![image](mm_mm.ps){width="1.5\columnwidth"} Another interesting pair of elements is C and O (Fig.\[f-mm\_mm\], lower left panel). The possible range of the C/O ratio among exo-planets has been subject to intense discussion. It is thought that for $\mathrm{C/O}>0.8$ in the proto-planetary discs, the ambient chemistry will favour solid “carbon planets”, that are dominated by carbides rather than oxides [@kuchner+seager05-1]. The possible existence of carbon planets has gained some support by the recent report of a C/O value exceeding unity in the atmosphere of the transiting hot Jupiter WASP-12b [@madhusudhanetal11-1], and by abundance studies that found a significant fraction of exo-planet host stars having $\mathrm{C/O}>0.8$ (@petigura+marcy11-1 [@delgademenaetal10-1]), but see @fortney12-1 for a critical discussion. Planetary debris at white dwarfs provides a unique opportunity to probe the C/O ratio of exo-terrestrial material. However, measuring C abundances in white dwarfs is challenging, as the optical detection of carbon in cool white dwarfs is usually related to dredge-up from the core rather than external pollution [e.g. @dufouretal05-1; @koester+knist06-1; @desharnaisetal08-1]. At higher temperatures, where convective dredge-up can be excluded, suitable lines of C are only found at ultraviolet wavelengths. As mentioned above, the four stars studied here have very similar (low) C/Si ratios, but do show a range of O/Si ratios. Nevertheless, the debris around all four stars studies here, as well as GD40 [@juraetal12-1], have $-3\la\log(\mathrm{C/O})\la-2.3$, very similar to the bulk silicate Earth, $\log(\mathrm{C/O})\simeq-2.5$, and are hence representative of solar system minerals. Accretion rates {#s-mdot} =============== Estimating accretion rates for metal-polluted white dwarfs is notoriously difficult, as it is based on scaling from the elements detected in the photosphere to an assumed bulk composition of the accreted material. In addition, in the case of white dwarfs with significant convective envelope masses, only the average accretion rate over the diffusion time scale can be obtained. @koester+wilken06-1 calculated accretion rates for 38 DAZ white dwarfs based on the abundance of Ca, and adopting solar abundances for the accreting material. For PG1015+161, these assumptions implied $\dot M\simeq2\times10^{11}\,\mathrm{g\,s^{-1}}$. Since then, it has become increasingly clear that many, if not most, metal-polluted (single) white dwarfs accrete volatile-depleted material from circumstellar planetary debris. @farihietal09-1 estimated accretion rates for 53 metal-polluted white dwarfs following the prescription of @koester+wilken06-1, but scaling the results by the typical gas-to-dust ratio in the interstellar medium to account for the absence of H and He in the accreted debris, resulting in $\dot M\simeq2\times10^{9}\,\mathrm{g\,s^{-1}}$ for PG1015+161. The uncertainty in the estimated accretion rates can be greatly reduced if photospheric abundances for the major constituents of the debris material can be measured. While we do not detect all elements that are likely present in the circumstellar debris at the four white dwarfs studied here, we have determined the accretion rates of all the major elements, in particular O, Si, Mg, and Fe (Sect.\[s-diffusion\]). The accretion rates of all detected elements, as well as their sum are given in Table \[t-fluxes\], and are illustrated in Fig. \[f-mdot\]. For PG1015+161, we find $\dot M\simeq1.7\times10^8\,\mathrm{g\,s^{-1}}$, which is strictly speaking a lower limit, however, the undetected elements (e.g. Al, S, Ti, Mn, Cr) are unlikely to contribute more than 10% of the total accretion rate. Similarly, we find the accretion rates of PG0843+516, SDSS1228+1040, and GALEX1931+0117 to be $\dot M\simeq1.0\times10^9\,\mathrm{g\,s^{-1}}$, $5.6\times10^8\,\mathrm{g\,s^{-1}}$, and $1.5\times10^9\,\mathrm{g\,s^{-1}}$, respectively. Hot circumstellar gas {#s-hotgas} ===================== The discs around white dwarfs are passive, i.e. their emission is solely due to the thermal reprocessing of intercepted stellar flux. The inner disc radius where typical dust grains will rapidly sublimate is determined by the luminosity of the white dwarf [@vonhippeletal07-1]. The gaseous material will viscously spread, both flowing inwards onto the white dwarf, and outwards over the dusty disc, potentially accelerating the inwards migration of the dust via aerodynamic drag [@rafikov11-2]. While gaseous material orbiting at radii coincident with circumstellar dust is observed in a number of systems in the form of double-peaked emission lines [@gaensickeetal06-3; @gaensickeetal07-1; @gaensickeetal08-1; @brinkworthetal09-1; @brinkworthetal-12; @melisetal11-1; @melisetal12-1; @farihietal12-1; @dufouretal12-1], there has yet been no detection of gaseous material well inside the sublimation radius. Inspection of Fig. \[f-fit1\] reveals that the strength of the [[Si]{}1394,1403Å]{} doublet in PG0843+516 is extremely under-predicted by the photospheric model. These [Si]{} lines correspond to the highest ionisation energy of all transitions detected in the COS spectrum. For the temperature and the Si abundance of PG0843+516, the observed strength of the [Si]{} lines is absolutely incompatible with a purely photospheric origin. The most plausible explanation is that there is additional absorption along the line of sight, associated with hot gas close to the white dwarf that is optically thin except for the strong resonance lines of high-ionisation species, such as [Si]{}. In fact, extremely similar features were found in the far-ultraviolet observations of cataclysmic variables, i.e. white dwarfs that accrete from a (hydrogen-rich) accretion disc that is in turn fed by Roche-lobe overflow of a close M-dwarf companion. *HST*/GHRS and *FUSE* spectroscopy of the white dwarf in UGem contains very strong absorption of [[N]{}1239,1243Å]{} and [[O]{}1032,1038Å]{} that can not form in the $\simeq30\,000$K photosphere, as well as excess absorption in [[Si]{}1394,1403Å]{} [@sionetal98-1; @long+gilliland99-1; @longetal06-1]. All three high-ionisation doublets are red-shifted with respect to the systemic velocity of the white dwarf, but somewhat less so than the lower-ionisation photospheric lines, which are subject to the gravitational redshift at the photospheric radius. These observations were interpreted as evidence for a hot ($\sim80\,000$K) layer of gas sufficiently close to the white dwarf to still experience a noticeable gravitational redshift. Measuring the central wavelengths of the strong [[Si]{}1394, 1403Å]{} lines in PG0843+516, we find that they are blue-shifted with respect to the photospheric features by $\simeq25$, which implies a height of $\simeq1.5$ white dwarf radii above the white dwarf surface. This assumes that there is no significant flow velocity, which seems reasonably well justified given the symmetric shape of the [Si]{} profiles. A discrepancy between the best-fit white dwarf model and the region around the [Si]{} doublet is also seen in the COS spectrum of SDSS1228+1040 (Fig. \[f-fit2\], bottom left panel), however, in this star, the additional absorption is rather weak. These additional absorption features are clearly blue-shifted with respect to the photospheric lines, however, the relatively low signal-to-noise ratio of the spectrum prevents an accurate determination of this offset. For PG1015+161 and GALEX1931+0117, the photospheric fits match the observed [Si]{} lines well, i.e. there is no evidence for any additional absorption component. Given that these two stars have, respectively, the lowest and highest accretion rate of our small sample (Sect.\[s-mdot\]), there seems to be no clear correlation between the detection of absorption from highly ionised gas to the mass flow rate onto the white dwarf. A key difference between the two stars where circumstellar [Si]{} absorption is detected is that SDSS1228+1040 also shows strong *emission* lines from circumstellar gas, which indicate a relatively high inclination of the accretion disc. In contrast, no gaseous emission is found in PG0843+516 (Gänsicke et al. in prep). Identifying additional absorption features from these hot layers of gas would provide substantial constraints on the physical parameters in the corresponding regions. The strongest line seen in cataclysmic variables, [N]{}, is naturally absent in the white dwarfs accreting rocky debris[^3], but the [[O]{}1032,1038Å]{} doublet detected in UGem [@longetal06-1] is a promising candidate. Conclusions =========== Recent years have seen a surge of interest in the evolution of extra-solar planetary systems through the late phases in the lifes of their host stars [e.g. @burleighetal02-1; @debesetal02-1; @villaver+livio07-1; @villaver+livo09-1; @nordhausetal10-1; @distefanoetal10-1]. While no planet has yet been discovered orbiting a white dwarf [@hoganetal09-1; @faedietal11-1], significant progress has been made in the discovery and understanding of planetary debris discs around white dwarfs. Our COS study substantially increases the number of polluted white dwarfs for which a wide range of chemical elements have been detected. We find that the C/Si ratio is consistent with that of the bulk Earth, which confirms the rocky nature of the debris at these white dwarfs, and their C/O values are typical of minerals dominated by Fe and Mg silicates. There is so far no detection of planetary debris at white dwarfs that has a large C/O ratio which would be indicative of silicon carbide-based minerals. The abundances of planetary material found around white dwarfs show a large diversity, comparable to, or exceeding that seen among different meteorite classes in the solar system. We find that the Al/Ca ratio follows a similar trend as observed among solar system objects, which suggests that processing of proto- and post-planetary material follows similar underlying principles. A particularly interesting pattern is found in PG0843+516, where over-abundances of S, Cr, Fe, and Ni are suggestive of the accretion of material that underwent melting and possibly differentiation. Extending the abundance studies of metal-polluted white dwarfs both in detail and number will provide further insight into the diversity of exo-terrestrial material, and guide the understanding of terrestrial exo-planet formation [@bondetal10-1; @carter-bondetal12-1]. Acknowledgements {#acknowledgements .unnumbered} ================ We gratefully acknowledge Larry Nittler for sharing his meteorite abundance data with us, and William Januszewski, Charles Proffitt, and Elena Mason for their tireless efforts in the implementation of the *HST* program. D.K. wants to thank P.-E. Tremblay and P. Bergeron for sharing their new calculations of the hydrogen Lyman and Balmer line Stark profiles. Based on observations made with the NASA/ESA Hubble Space Telescope, obtained at the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS 5-26555. These observations are associated with program \#11561, \#12169 and \#12474. Also based on observations made with ESO Telescopes at the La Silla Paranal Observatory under programme ID 79.C-0085, 81.C-0466, 82.C-0495, 383.C-0695. We thank the anonymous referee for a constructive report. [119]{} natexlab\#1[\#1]{} , P. A., [Kenyon]{}, S. J., [Hammond]{}, G. L., [Sion]{}, E. M., 1993, AJ, 105, 1033 , T. J., 1979, Journal of Geophysical Research, 84, 985 , C., [Manh[è]{}s]{}, G., [Lewin]{}, E., 2001, Earth and Planetary Science Letters, 185, 49 , C. J., [Poirier]{}, J., [Humler]{}, E., [Hofmann]{}, A. W., 1995, Earth and Planetary Science Letters, 134, 515 , M.-C., [Lanz]{}, T., 1987, A&A, 182, 273 , N. P., [Barstow]{}, M. A., [Holberg]{}, J. B., [Bruhweiler]{}, F. C., 2003, MNRAS, 341, 477 , M. A., [Quinet]{}, P., [Palmeri]{}, P., [Badnell]{}, N. R., [Dunn]{}, J., [Arav]{}, N., 2009, A&A, 508, 1527 , E. E., [Farihi]{}, J., [Jura]{}, M., [Song]{}, I., [Weinberger]{}, A. J., [Zuckerman]{}, B., 2005, ApJ Lett., 632, L119 , K. V., [Rafikov]{}, R. R., 2011, ApJ, 741, 36 , J. C., [O’Brien]{}, D. P., [Lauretta]{}, D. S., 2010, ApJ, 715, 1050 , A., [Mustill]{}, A. J., [Wyatt]{}, M. C., 2011, MNRAS, 414, 930 , C. S., [G[ä]{}nsicke]{}, B. T., [Marsh]{}, T. R., [Hoard]{}, D. W., [Tappert]{}, C., 2009, ApJ, 696, 1402 , C. S., [G[ä]{}nsicke]{}, B. T., [Girven]{}, J. M., [Hoard]{}, D. W., [Marsh]{}, T. R., [Parsons]{}, S. G., [Koester]{}, D., 2012, ApJ, 750, 86 , M. R., [Clarke]{}, F. J., [Hodgkin]{}, S. T., 2002, MNRAS, 331, L41 , J. C., [O’Brien]{}, D. P., [Delgado Mena]{}, E., [Israelian]{}, G., [Santos]{}, N. C., [Gonz[á]{}lez Hern[á]{}ndez]{}, J. I., 2012, ApJ Lett., 747, L2 , P., [Dupuis]{}, J., 2010, in [Werner]{}, K., [Rauch]{}, T., eds., 17$^\mathrm{th}$ European White Dwarf Workshop, no. 1273 in AIP Conf. Ser., AIP, p. 394 , P., [Fontaine]{}, G., [Wesemael]{}, F., 1995, ApJS, 99, 189 , J. H., [L[ó]{}pez-Morales]{}, M., 2008, ApJ Lett., 677, L43 , J. H., [Sigurdsson]{}, S., 2002, ApJ, 572, 556 , J. H., [Hoard]{}, D. W., [Kilic]{}, M., [Wachter]{}, S., [Leisawitz]{}, D. T., [Cohen]{}, M., [Kirkpatrick]{}, J. D., [Griffith]{}, R. L., 2011, ApJ, 729, 4 , J. H., [Walsh]{}, K. J., [Stark]{}, C., 2012, ApJ, 747, 148 , E., [Israelian]{}, G., [Gonz[á]{}lez Hern[á]{}ndez]{}, J. I., [Bond]{}, J. C., [Santos]{}, N. C., [Udry]{}, S., [Mayor]{}, M., 2010, ApJ, 725, 2349 , S., [Wesemael]{}, F., [Chayer]{}, P., [Kruk]{}, J. W., [Saffer]{}, R. A., 2008, ApJ, 672, 540 , R., [Howell]{}, S. B., [Kawaler]{}, S. D., 2010, ApJ, 712, 142 , N. J., [Barstow]{}, M. A., [Welsh]{}, B. Y., [Burleigh]{}, M., [Farihi]{}, J., [Redfield]{}, S., [Unglaub]{}, K., 2012, MNRAS, in press, arXiv:1203.5226 , G., [Palme]{}, H., 1996, Geochimica et Cosmochimica Acta, 60, 1125 , P., [Bergeron]{}, P., [Fontaine]{}, G., 2005, ApJ, 627, 404 , P., [Kilic]{}, M., [Fontaine]{}, G., [Bergeron]{}, P., [Melis]{}, C., [Bochanski]{}, J., 2012, ApJ, 749, 6 , J., [Fontaine]{}, G., [Wesemael]{}, F., 1993, ApJS, 87, 345 , D. J., et al., 2006, ApJS, 167, 40 , F., [West]{}, R. G., [Burleigh]{}, M. R., [Goad]{}, M. R., [Hebb]{}, L., 2011, MNRAS, 410, 899 , J., [Zuckerman]{}, B., [Becklin]{}, E. E., 2008, ApJ, 674, 431 , J., [Jura]{}, M., [Zuckerman]{}, B., 2009, ApJ, 694, 805 , J., [Barstow]{}, M. A., [Redfield]{}, S., [Dufour]{}, P., [Hambly]{}, N. C., 2010, MNRAS, 404, 2123 , J., [Hoard]{}, D. W., [Wachter]{}, S., 2010, ApJS, 190, 275 , J., [Brinkworth]{}, C. S., [G[ä]{}nsicke]{}, B. T., [Marsh]{}, T. R., [Girven]{}, J., [Hoard]{}, D. W., [Klein]{}, B., [Koester]{}, D., 2011, ApJ Lett., 728, L8 , J., [G[ä]{}nsicke]{}, B. T., [Steele]{}, P. R., [Girven]{}, J., [Burleigh]{}, M. R., [Breedt]{}, E., [Koester]{}, D., 2012, MNRAS, 421, 1635 , G., [Michaud]{}, G., 1979, ApJ, 231, 826 , G., [Villeneuve]{}, B., [Wesemael]{}, F., [Wegner]{}, G., 1984, ApJ Lett., 277, L61 , J. J., 2012, ApJ Lett., 747, L27 , S., [Jordan]{}, S., [Koester]{}, D., 2004, A&A, 424, 665 , B. T., [Marsh]{}, T. R., [Southworth]{}, J., [Rebassa-Mansergas]{}, A., 2006, Science, 314, 1908 , B. T., [Marsh]{}, T. R., [Southworth]{}, J., 2007, MNRAS, 380, L35 , B. T., [Koester]{}, D., [Marsh]{}, T. R., [Rebassa-Mansergas]{}, A., [Southworth]{}, J., 2008, MNRAS, 391, L103 , J., [Brinkworth]{}, C. S., [Farihi]{}, J., [G[ä]{}nsicke]{}, B. T., [Hoard]{}, D. W., [Marsh]{}, T. R., [Koester]{}, D., 2012, ApJ, 749, 154 , J. R., [Matthews]{}, K., [Neugebauer]{}, G., [Soifer]{}, B. T., 1990, ApJ, 357, 216 , R. F., [Schmidt]{}, M., [Liebert]{}, J., 1986, ApJS, 61, 305 , C. J., et al., 2008, Nat, 456, 767 , S., [Nagel]{}, T., [Rauch]{}, T., [Werner]{}, K., 2011, A&A, 530, A7 , E., [Burleigh]{}, M. R., [Clarke]{}, F. J., 2009, MNRAS, 396, 2074 , M., 2003, ApJ Lett., 584, L91 , M., 2006, ApJ, 653, 613 , M., [Xu]{}, S., 2010, AJ, 140, 1129 , M., [Xu]{}, S., 2012, AJ, 143, 6 , M., [Farihi]{}, J., [Zuckerman]{}, B., 2007, ApJ, 663, 1285 , M., [Xu]{}, S., [Klein]{}, B., [Koester]{}, D., [Zuckerman]{}, B., 2012, ApJ, 750, 69 , M., [von Hippel]{}, T., [Leggett]{}, S. K., [Winget]{}, D. E., 2005, ApJ Lett., 632, L115 , T., 2011, Irradiated Gaseous Discs Around White Dwarfs, Master’s thesis, University of Warwick , B., [Jura]{}, M., [Koester]{}, D., [Zuckerman]{}, B., [Melis]{}, C., 2010, ApJ, 709, 950 , B., [Jura]{}, M., [Koester]{}, D., [Zuckerman]{}, B., 2011, ApJ, 741, 64 , D., 1976, A&A, 52, 415 , D., 2009, A&A, 498, 517 , D., 2010, Memorie della Societa Astronomica Italiana,, 81, 921 , D., [Knist]{}, S., 2006, A&A, 454, 951 , D., [Wilken]{}, D., 2006, A&A, 453, 1051 , D., [Weidemann]{}, V., [Zeidler]{}, E.-M., 1982, A&A, 116, 147 , D., [Provencal]{}, J., [Shipman]{}, H. L., 1997, A&A, 320, L57 , D., [Rollenhagen]{}, K., [Napiwotzki]{}, R., [Voss]{}, B., [Christlieb]{}, N., [Homeier]{}, D., [Reimers]{}, D., 2005, A&A, 432, 1025 , D., [Voss]{}, B., [Napiwotzki]{}, R., [Christlieb]{}, N., [Homeier]{}, D., [Lisker]{}, T., [Reimers]{}, D., [Heber]{}, U., 2009, A&A, 505, 441 , M. J., [Seager]{}, S., 2005, ApJ, in press, arXiv:1201.6252 , F., [Piskunov]{}, N., [Ryabchikova]{}, T. A., [Stempels]{}, H. C., [Weiss]{}, W. W., 1999, A&AS, 138, 119 , F. G., [Ryabchikova]{}, T. A., [Piskunov]{}, N. E., [Stempels]{}, H. C., [Weiss]{}, W. W., 2000, Baltic Astronomy, 9, 590 , C., [Bergeron]{}, P., 2007, ApJ, 667, 1126 , T., [Artru]{}, M.-C., 1985, Physica Scripta, 32, 115 , T., [Barstow]{}, M. A., [Hubeny]{}, I., [Holberg]{}, J. B., 1996, ApJ, 473, 1089 , J., [Bergeron]{}, P., [Holberg]{}, J. B., 2005, ApJS, 156, 47 , K., 2003, ApJ, 591, 1220 , K., [Fegley]{}, B., 2011, Chemistry of the Solar System, RSC Publishing, Cambrige , K. S., [Gilliland]{}, R. L., 1999, ApJ, 511, 916 , K. S., [Brammer]{}, G., [Froning]{}, C. S., 2006, ApJ, 648, 541 , N., et al., 2011, Nat, 469, 64 , P. F. L., [Marsh]{}, T. R., [Moran]{}, C., [Dhillon]{}, V. S., [Hilditch]{}, R. W., 1998, MNRAS, 300, 1225 , W., 2000, in Teisseyre, R., Majewski, E., eds., Earthquake Thermodynamics and Phase Transformation in the Earth’s Interior, Elsevier Science Academic Press, p. 5 , C., [Jura]{}, M., [Albert]{}, L., [Klein]{}, B., [Zuckerman]{}, B., 2010, ApJ, 722, 1078 , C., [Farihi]{}, J., [Dufour]{}, P., [Zuckerman]{}, B., [Burgasser]{}, A. J., [Bergeron]{}, P., [Bochanski]{}, J., [Simcoe]{}, R., 2011, ApJ, 732, 90 , C., et al., 2012, ApJ Lett., in press, arXiv:1204.1132 , B. D., [Rafikov]{}, R. R., [Bochkarev]{}, K. V., 2012, ApJ, in press, arXiv:1202.0557 , F., [Yin]{}, Q.-Z., [Schauble]{}, E., 2011, Science, 331, 1417 , S. N., 1998, Atomic Data and Nuclear Data Tables, 68, 183 , R., et al., 2001, Astronomische Nachrichten, 322, 411 , L. R., [McCoy]{}, T. J., [Clark]{}, P. E., [Murphy]{}, M. E., [Trombka]{}, J. I., [Jarosewich]{}, E., 2004, Antarctic Meteorite Research, 17, 231 , J., [Spiegel]{}, D. S., [Ibgui]{}, L., [Goodman]{}, J., [Burrows]{}, A., 2010, MNRAS, 408, 631 , C., [Pelletier]{}, C., [Fontaine]{}, G., [Michaud]{}, G., 1986, ApJS, 61, 177 , E. A., [Marcy]{}, G. W., 2011, ApJ, 735, 41 , N. E., [Kupka]{}, F., [Ryabchikova]{}, T. A., [Weiss]{}, W. W., [Jeffery]{}, C. S., 1995, A&AS, 112, 525 , S., et al., 2012, MNRAS, 419, 817 , R. R., 2011, MNRAS, 416, L55 , T. A., [Piskunov]{}, N. E., [Kupka]{}, F., [Weiss]{}, W. W., 1997, Baltic Astronomy, 6, 244 , G. D., [Smith]{}, P. S., [Harvey]{}, D. A., [Grauer]{}, A. D., 1995, AJ, 110, 398 , M. R., [G[ä]{}nsicke]{}, B. T., 2003, A&A, 406, 305 , M. J., [Yan]{}, Y., [Mihalas]{}, D., [Pradhan]{}, A. K., 1994, MNRAS, 266, 805 , E. M., [Cheng]{}, F. H., [Szkody]{}, P., [Sparks]{}, W., [G[ä]{}nsicke]{}, B., [Huang]{}, M., [Mattei]{}, J., 1998, ApJ, 496, 449 , P.-E., [Bergeron]{}, P., 2009, ApJ, 696, 1755 , D., [Ikoma]{}, M., [Guillot]{}, T., [Nettelmann]{}, N., 2010, A&A, 516, A20 , A., 1917, PASP, 29, 258 , S., [Kawka]{}, A., [N[é]{}meth]{}, P., 2010, MNRAS, 404, L40 , S., [Kawka]{}, A., [N[é]{}meth]{}, P., 2011, in [Schuh]{}, S., [Drechsel]{}, H., [Heber]{}, U., eds., Planetary systems beyond the main sequence, no. 1331 in American Institute of Physics Conference Series, p. 246 , S., [Kawka]{}, A., [N[é]{}meth]{}, P., 2011, MNRAS, 413, 2545 , E., [Livio]{}, M., 2007, ApJ, 661, 1192 , E., [Livio]{}, M., 2009, ApJ Lett., 705, L81 , T., [Thompson]{}, S. E., 2007, ApJ, 661, 477 , T., [Kuchner]{}, M. J., [Kilic]{}, M., [Mullally]{}, F., [Reach]{}, W. T., 2007, ApJ, 662, 544 , S., [Hoard]{}, D. W., [Hansen]{}, K. H., [Wilcox]{}, R. E., [Taylor]{}, H. M., [Finkelstein]{}, S. L., 2003, ApJ, 586, 1356 , F., 1979, A&A, 72, 104 , M. A., 1995, in [Koester]{}, D., [Werner]{}, K., eds., White Dwarfs, no. 443 in LNP, Springer, Heidelberg, p. 41 , S., [Jura]{}, M., 2012, ApJ, 745, 88 , B., [Becklin]{}, E. E., 1987, Nat, 330, 138 , B., [Koester]{}, D., [Melis]{}, C., [Hansen]{}, B. M., [Jura]{}, M., 2007, ApJ, 671, 872 , B., [Koester]{}, D., [Dufour]{}, P., [Melis]{}, C., [Klein]{}, B., [Jura]{}, M., 2011, ApJ, 739, 101 \[lastpage\] [^1]: @melisetal11-1 discuss the discrepancy between their model and the *GALEX* fluxes. From their Table1, it appears that they did not correct for the non-linearity of the *GALEX* detectors for bright targets. The corrected *GALEX* magnitudes given by @vennesetal10-1 are in good agreement with our best-fit model. [^2]: A more detailed discussion of these binaries will be published elsewhere. Here, they merely serve as “abundance standard white dwarfs” which accrete material with abundance ratios that are expected to be close to solar, i.e. rich in volatiles. [^3]: For completeness, we note that circumstellar high-ionisation absorption lines have also been found around a number of hot white dwarfs [@bannisteretal03-1; @dickinsonetal12-1]. However, the origin of the circumstellar material is not clear, and the detection of strong C lines suggests a different nature compared to the rocky debris found around the stars studied here.
{ "pile_set_name": "ArXiv" }
Effect of whole-body microwave hyperthermia on delayed cutaneous hypersensitivity in tumor-bearing mice. Tumor-bearing and normal BALB/c mice were examined for their responsiveness to contact-sensitizing agent oxazolone after whole-body microwave hyperthermia treatment. The effective therapy with hyperthermia prolonging mean survival time of the animals and causing tumors regression resulted in strongly pronounced hyporeactivity to oxazolone. The impaired responsiveness remained unchanged until death of the tumor-bearing animals. In the case of tumor-free animals delayed cutaneous response returned to normal values within 8-12 days after hyperthermia treatment. It is documented that the longer exposure to hyperthermia sessions the more pronounced depression of reactivity to oxazolone occurs.
{ "pile_set_name": "PubMed Abstracts" }
Tag Archives: tracking A user-transparent privacy enhancement may allow online service providers like Google to provably shield personal data from prying eyes—even from themselves. Personal user data like search, email, doc and photo content, navigation and clicks will continue to support clearly defined purposes (advertising that users understand and agreed to), data will be unintelligible if inspected for any other purpose. In effect, the purpose and processes of data access and manipulation determine whether data can be interpreted or even associated with individual users. If data is inspected for any purpose apart from the original scope, it is unintelligible, anonymous and self-expiring. It is useless for any person or process beyond that which was disclosed to users at the time of collection. It cannot even be correlated to individual users who generate the data. Blind Signaling and Response is not yet built into internet services. But as it crosses development and test milestones, it will attract attention and community scrutiny. A presentation at University of Montreal Privacy Workshop [video] gives insight into the process. The presenter can be contacted via the contact link at the top of this Blog page. Can Internet services like Google protect user data from all threats—even from their own staff and processes—while still supporting their business model? If such commitment to privacy could be demonstrable, it could usher in an era of public trust. I believe that a modification to the way data is collected, stored and processed may prevent a breach or any disclosure of personal user information, even if compelled by a court order. The goal of Blind Signaling and Response is define a method of collecting and storing data that prevents anyone but the intended process from making sense of it. But this pet theory has quite a road ahead… Before we can understand Blind Signaling and Response, it helps to understand classic signaling. When someone has a need, he can search for a solution. When an individual is aware of their needs and problems, that’s typically the first step in marrying a problem to a solution. But in a marketing model, a solution (sometimes, one that a user might not even realize he would desire) reaches out to individuals. Of course the problem with unsolicited marketing is that the solution being hawked may be directed at recipients who have no matching needs. Good marketing is a result of careful targeting. The message is sent or advertised only to a perfect audience, filled with Individuals who are glad that the marketer found them. Poor marketing blasts messages at inappropriate lists or posts advertisements in the wrong venue. For the marketer (or Spam email sender), it is a waste of resources and sometimes a crime. For the recipient of untargeted ads and emails, it is a source of irritation and an involuntary waste of resources, especially of the recipient’s attention. Consider a hypothetical example of a signal and its response: Pixar animators consume enormous computing resources creating each minute of animation. Pixar founder, John Lasseter, has many CGI tools at his disposal, most of them designed at Pixar. As John plans a budget for Pixar’s next big film, suppose that he learns of a radical new animation theory called Liquid Flow-Motion. It streamlines the most complex and costly processes. His team has yet to build or find a practical application that benefits animators, but John is determined to search everywhere. Method #1: A consumer in need searches & signals Despite a lack of public news on the nascent technique, John is convinced that there must be some workable code in a private lab, a university, or even at a competitor. And so, he creates a web page and uses SEO techniques to attract attention. The web page is a signal. It broadcasts to the world (and hopefully to relevant parties) that Pixar is receptive to contact from anyone engaged in Liquid Flow-Motion research. With Google’s phenomenal search engine and the internet’s reach, this method of signaling may work, but a successful match involves a bit of luck. Individuals engaged in the new art may not be searching for outsiders. In fact, they may not be aware that their early stage of development would be useful to anyone. Method #2: Google helps marketers target relevant consumers Let’s discuss how Google facilitates market-driven signaling and a relevant marketing response today and let us also determine the best avenue for improvement… At various times in the past few weeks, John had Googled the phrase “Liquid Flow-Motion” and some of the antecedents that the technology builds upon. John also signed up for a conference in which there was a lecture unit on the topic (the lecture was not too useful. It was given by his own employee and covered familiar ground). He also mentioned the technology in a few emails. Google’s profile for John made connections between his browser, his email and his searches. It may even have factored in location data from John’s Android phone. In Czechoslovakia, a grad student studying Flow-Motion has created the first useful tool. Although he doesn’t know anything about Google Ad Words, the university owns 75% of the rights to his research. They incorporate key words from research projects and buy up the Google Ad Words “Liquid Flow-Motion”. Almost immediately, John Lasseter notices very relevant advertising on the web pages that he visits. During his next visit to eBay, he notices a home page photo of a product that embodies the technique. The product was created in Israel for a very different application. Yet it is very relevant to Pixar’s next film. John reaches out to both companies–or more precisely, they reached out in response to his signal, without even knowing to whom they were replying. Neat, eh? What is wrong with this model? For many users, the gradual revelation that an abundance of very personal or sensitive data is being amassed by Google and the fact that it is being marketed to unknown parties is troubling. Part of the problem is perception. In the case described above and most other cases in which the Google is arbiter, the result is almost always to the user’s advantage. But this fact, alone, doesn’t change the perception. But consider Google’s process from input to output: the collection of user data from a vast array of free user services and the resulting routing of ads from marketing partners. What if data collection, storage and manipulation could be tweaked so that all personal data–including the participation of any user–were completely anonymized? Sounds crazy, right? If the data is anonymized, it’s not useful. A signaling and response system can be constructed on blind credentials. The science is an offshoot of public key cryptography and is the basis of digital cash (at least, the anonymous form). It enables a buyer to satisfy a standard of evidence (the value of their digital cash) and also demonstrate that a fee has been paid, all without identifying the buyer or even the bank that guarantees cash value. The science of blind credentials is the brainchild of David Chaum, cryptographer and founder of DigiCash, a Dutch venture that made it possible to guaranty financial transactions without any party (including the bank) knowing any of the other parties. The takeaway from DigiCash and the pioneering work of David Chaum is that information can be precisely targeted–even with a back channel–without storing or transmitting data that aids in identifying a source or target. (Disclosure: I am developing a specification for the back channel mechanism. This critical component is not in the DigiCash implementation). Even more interesting is that the information that facilitates replying to a signal can be structured in a way that is useless to both outsiders and even to the database owner (in this case, Google). The benefits aren’t restricted to Internet search providers. Choose the boogeyman: The government, your employer, someone taking a survey, your grandmother. In each case, the interloper can (if they wish) provably demonstrate that meaningful use of individually identifiable data is, by design, restricted to a stated purpose or algorithm. No other person or process can find meaning in the data—not even to whom it belongs. The magic draws upon and forms an offshoot of Trusted Execution Technology, a means of attestation and authentication. In this case, it is the purpose of execution that must be authenticated before data can be interpreted, correlated with users or manipulated. This presentation at a University of Montreal privacy workshop pulls back the covers by describing a combination of TXT with a voting trust, (the presenter rushes through key slides at the end of the video). It’s reasonable to assume that privacy doesn’t exist in the Internet age. After all, unlike a meeting at your dining table, the path from whisper to ear passes through a public network. Although encryption and IP re-routing ensure privacy for P2P conversations, it seems implausible to maintain privacy in everyday searches, navigation, and online email services, especially when services are provided at no cost to the user. Individuals voluntarily disgorge personal information in exchange for services, especially, if the goal is to keep the service provider incented to offer the service. For this reason, winning converts to Blind Signaling and Response requires a thoughtful presentation. Suppose that you travel to another country and walk into a bar. You are not a criminal, nor a particularly famous or newsworthy person. You ask another patron if he knows where to find a good Cuban cigar. When you return to your country, your interest in cigars will probably remain private and so will the fact that you met with this particular individual or even walked into that bar. Gradually, the internet is facilitating at a distance the privileges and empowerment that we take for granted in a personal meeting. With end-to-end encryption, it has already become possible to conduct a private conversation at a distance. With a TOR proxy and swarm routing, it is also possible to keep the identities of the parties private. But today, Google holds an incredible corpus of data that reveals much of what you buy, think, and fantasize about. To many, it seems that this is part of the Faustian bargain: If you want the benefits of Google services, you must surrender personal data Even if you don’t want to be the target of marketing,* it’s the price that you pay for using the Google service (Search, Gmail, Drive, Navigate, Translate, Picasa, etc). Of course, Google stores and act on the data that it gathers from your web habits. But both statements above are false! a) When Google incorporates Blind Signaling into its services, you will get all the benefits of Google services without anyone ever discovering personal information. Yet, Google will still benefit from your use of their services and have even more incentive to continue offering you valuable, personalized services, just as they do now. b) Surrendering personal data in a way that does not anonymize particulates is not “the price that you pay for Google services”. Google is paid by marketers and not end users. More importantly, marketers can still get relevant, targeted messages to the pages you visit, while Google protects privacy en toto! Google can make your personal data useless to any other party and for any other purpose. Google and their marketing partners will continue to benefit exactly as they do now. Article in process… * This is also a matter of perception. You really do want targeted messaging. Even if you hate spam and, like me, prefer to search for a solution instead of have marketers push a solution to you. In a future article, I will demonstrate that every individual is pleased by relevant messaging, even if it is unsolicited, commercial or sent in bulk. Google captures and keeps a vast amount of personal information about its users. What do they do with all that data? Despite some very persistent misconceptions, the answer is “Nothing bad”. But they could do a much better job ensuring that no one can ever do anything bad with that data—ever. Here is a rather simple but accurate description of what they do with what is gleaned from searches, email, browsing, documents, travel, photos, and more than 3 dozen other ways that they learn about you: Increase the personal relevance of advertising as you surf the web Earn advertising dollars–not because they sell information about you–but because they use that data to match and direct relevant traffic toward you These aren’t bad things, even to a privacy zealot. With or without Google, we all see advertising wherever we surf. Google is the reason that so many of the ads appeal to our individual interests. But what about all that personal data? Is it safe on Google’s servers? Can they be trusted? More importantly, can it someday be misused in ways that even Google had not intended? I value privacy above everything else. And I have always detested marketing, especially the unsolicited variety. I don’t need unsolicited ‘solutions’ knocking on my door or popping up in web surfing. When I have needs, I will research my own solutions—thank you very much. It took me years to come to terms with this apparent oxymoron, but the personalization brought about by information exchange bargains are actually a very good bargain for all parties concerned, and if handled properly, it needn’t risk privacy at all! In fact, the things that Google does with our personal history and predilections really benefits us, but… This is a pro-Google posting. Well, it’s ‘pro-Google’ if they “do no evil” (Yes—it’s the Google mantra!). First the good news: Google can thwart evil by adding a fortress of privacy around the vast corpus of personal data that they collect and process without weakening user services or the value exchange with their marketing partners. The not-so-good news is that I have urged Google to do this for over two years and so far, they have failed to act. What they need is a little urging from users and marketing partners. Doing no evil benefits everyone and sets an industry precedent that will permeate online businesses everywhere. The CBS prime time television series, Person of Interest, pairs a freelance ‘James Bond’ with a computer geek. The geek, Mr. Finch, is the ultimate privacy hack. He correlates all manner of disparate data in seconds, including parking lot cameras, government records, high school yearbook photos and even the Facebook pages of third parties. Mr. Finch & Eric Schmidt: Separated at birth? It’s an eerie coincidence that Google Chairman, Eric Schmidt, looks like Mr. Finch. After all, they both have the same job! They find a gold mine of actionable data in the personal dealings of everyone. Viewers accept the TV character. After all, Finch is fictional, he is one of the good guys, and his snooping ability (especially the piecing together of far-flung data) is probably an exaggeration of reality. Right?! Of course, Eric Schmidt & Google CEO Larry Page are not fictional. They run the largest data gathering engine on earth. I may be in the minority. I believe that Google is “one of the good guys”. But let’s first explore the last assumption about Mr. Finch: Can any organization correlate and “mine” meaningful data from a wholesale sweep of a massive eavesdropping machine and somehow piece together a reasonable profile of your interests, behavior, purchasing history and proclivities? Not only are there organizations that do this today, but many of them act with our explicit consent and with a disclosed value exchange for all that personal data. Data gathering organizations fall into three categories, which I classify based on the exchange of value with web surfers and, more importantly, whether the user is even aware of their role in collecting data. In this classification, Google has moved from the 2nd category to the first, and this is a good thing: Organizations that you are aware of–at least peripherally–and for which there is a value exchange (preferably, one that is disclosed). Google comes to mind, of course. Another organization with informed access to your online behavior is your internet service provider. If they wanted to compile a dossier of your interests, market your web surfing history to others, or comply with 3rd party demands to review your activities, it would be trivial to do so. Organizations with massive access to personal and individualized data, but manage to “fly beneath the Radar”. Example: Akamai Technologies operates a global network of servers that accelerate the web by caching pages close to users and optimizing the route of page requests. They are contracted by almost any company with a significant online presence. It’s safe to say that their servers and routers are inserted into almost every click of your keyboard and massively distributed throughout the world. Although Akamai’s customer relationship is not with end users, they provide an indirect service by speeding up the web experience. But because Internet users are not actively engaged with them (and are typically unaware of their role in caching data across the Internet), there are few checks and on what they do with the click history of users, with whom they share data, and if–or how–individualized is data is retained, anonymized or marketed. National governments. There is almost never disclosure or a personal value exchange. Most often, the activity involves compulsory assistance from organizations that are forbidden from disclosing the privacy breach or their own role in acts of domestic spying. The US is preparing to spy on everyone, everywhere, at all times. The massive & intrusive project stuns scientists involved. I have written about domestic spying before. In the US, It has become alarmingly broad, arbitrary and covert. The über secretive NSA is now building the world’s biggest data gathering site. It will gulp down everything about everyone. The misguided justification of their minions is alternatively “anti-terrorism” or an even more evasive “911”. Regarding, category #2, I have never had reason to suspect Akamai or Verizon of unfair or unscrupulous data mining. (As with Google, these companies could gain a serious ethical and market advantage by taking heed of today’s column.) But today, we focus on data gathering organizations in category #1—the ones with which we have a relationship and with whom we voluntarily share personal data. Google is at the heart of most internet searches and they are partnered with practically every major organization on earth. Forty eight free services contain code that many malware labs consider to be a stealth payload. These doohickeys give Google access to a mountain of data regarding clicks, searches, visitors, purchases, and just about anything else that makes a user tick. It’s not just searching the web that phones home. Think of Google’s 48 services as a marketer’s bonanza. Browser plug-ins phone home with every click and build a profile of user behavior, location and idiosyncrasies. Google Analytics, a web traffic reporting tool used by a great many web sites, reveals a mountain of data about both the web site and every single visitor. (Analytics is market-speak for assigning identity or demographics to web visits). Don’t forget Gmail, Navigate, Picassa, Drive, Google Docs, Google+, Translate, and 3 dozen other projects that collect, compare and analyze user data. And what about Google’s project to scan everything that has ever been written? Do you suppose that Google knows who views these documents, and can correlate it with an astounding number of additional facts? You can bet Grandma Estelle’s cherry pie that they do! How many of us ever wonder why all of these services are free to internet users everywhere? That’s an awful lot of free service! One might think that the company is very generous, very foolish, or very unprofitable. One would be wrong on all counts! Google has mastered the art of marketing your interests, income stats, lifestyle, habits, and even your idiosyncrasies. Hell, they wrote the book on it! But with great access to personal intelligence comes great responsibility. Does Google go the extra mile to protect user data from off-label use? Do they really care? Is it even reasonable to expect privacy when the bargain calls for data sharing with market interests? At the end of 2009, Google Chairman, Eric Schmidt made a major gaffe in a televised interview on CNBC. In fact, I was so convinced that his statement was toxic, that I predicted a grave and swift consumer backlash. Referring to the Billions of individuals using Google search engine, investigative anchor, Maria Bartiromo, asked Schmidt why it is that users enter their most private thoughts and fantasies. She wondered if they are aware of Google’s role in correlating, storing & sharing data—and in the implicit role of identifying users and correlating their identities with their interests. Schmidt seemed to share Bartiromo’s surprise. He suggested that internet users were naive to trust Google, because their business model is not driven by privacy and because they are subject to oversight by the Patriot Act. He said: If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place. If you really need that kind of privacy, the reality is that search engines — including Google — do retain this information for some time and it’s important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities. At the time, I criticized the statements as naive, but I have since become more sanguine. Mr. Schmidt is smarter than me. I recognize that he was caught off guard. But clearly, his response had the potential to damage Google’s reputation. Several Google partners jumped ship and realigned with Bing, Microsoft’s newer search engine. Schmidt’s response became a lightning rod–albeit brief–for both the EFF (Electronic Freedom Foundation) and the CDT (Center for Democracy & Technology). The CDT announced a front-page campaign, Take Back Your Privacy. But wait…It needn’t be a train wreck! Properly designed, Google can ensure individual privacy, while still meeting the needs of their marketing partners – and having nothing of interest for government snoops, even with a proper subpoena. I agree with the EFF that they undermine Google’s mission. Despite his high position, Schmidt may not fully recognize to that Google’s marketing objectives can coexist with an ironclad guarantee of personal privacy – even in the face of the Patriot Act. Schmidt could have had salvaged the gaffe quickly. I urged him to quickly demonstrate that he understands and defends user privacy. But I overestimated consumer awareness and expectations for reasonable privacy. Moreover, consumers may feel that the benefits of Google’s various services inherently trade privacy for productivity (email, taste in restaurants, individualized marketing, etc). Regarding a damning consumer backlash for whitewashing personal privacy with their public, I was off by a few years, but in the end, my warnings will be vindicated. Public awareness of privacy and especially of internet data sharing and data mining has increased. Some are wondering if the bargain is worthwhile, while others are learning that data can be anonymized and used in ways that still facilitate user benefits and even the vendor’s marketing needs. With massive access to public data and the mechanisms to gather it (often without the knowledge and consent of users), comes massive responsibility. (His interview contradicts that message). Google must rapidly demonstrate a policy of “default protection and a very high bar for sharing data. In fact, Google can achieve all its goals while fully protecting individual privacy. Google’s data gathering and archiving mechanism needs a redesign (it’s not so big a task as it seems): Sharing data and cross-pollination should be virtually impossible – beyond a specified exchange between users and intended marketers. Even this exchange must be internally anonymous, useful only in aggregate, and self expiring – without recourse for revival. Most importantly, it must be impossible for anyone – even a Google staffer – to make a personal connection between individual identities and search terms, Gmail users, ad clickers, voice searchers or navigating drivers! I modestly suggest that Google create a board position, and give it authority with a visible and high-profile individual. (Disclosure, I have made a “ballsy” bid to fill such a position. There are plenty of higher profile individuals that I could recommend). Schmidt’s statements have echoed for more than 2 years now. Have they faded at all? If so, it is because Google’s services are certainly useful and because the public has become somewhat inured to the creeping loss of privacy. But wouldn’t it be marvelous if Google seized the moment and reversed that trend. Wouldn’t it be awesome if someone at Google discovered that protecting privacy needn’t cripple the value of information that they gather. Google’s market activity is not at odds with protecting their user’s personal data from abuse. What’s more, the solution does not involve legislation or even public trust. There is a better model! They are difficult to contain or spin. As Asa Dotzler at FireFox wrote in his blog, the Google CEO simply doesn’t understand privacy. Here in USA, Schmidt’s statements have become a lightning rod for both the EFF and CDT (Center for Democracy & Technology). The CDT has even launched a front page campaign to “Take Back Your Privacy”. Google’s not the only one situated at a data Nexus. Other organizations fly below the radar, either because few understand their tools or because of Government involvement. For example, Akamai probably has more access to web traffic data than Google. The US government has even more access because of an intricate web of programs that often force communications companies to plant data sniffing tools at the junction points of massive international data conduits. We’ve discussed this in other articles, and I certainly don’t advocate that Wild Ducks be privacy zealots and conspiracy alarmists. But the truth is, the zealots have a leg to stand on and the alarmists are very sane.
{ "pile_set_name": "Pile-CC" }
Q: MySQL select distinct query not using index I have a table clicks: CREATE TABLE `clicks` ( `id` bigint(20) NOT NULL AUTO_INCREMENT, `link_id` int(11) NOT NULL, `date_added` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP PRIMARY KEY (`id`), KEY `link_id` (`link_id`), KEY `date_added` (`date_added`) ) ENGINE=InnoDB AUTO_INCREMENT=90899051 DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci With the following indexes: +--------+------------+------------+--------------+-------------+-----------+-------------+----------+--------+------+------------+---------+---------------+ | Table | Non_unique | Key_name | Seq_in_index | Column_name | Collation | Cardinality | Sub_part | Packed | Null | Index_type | Comment | Index_comment | +--------+------------+------------+--------------+-------------+-----------+-------------+----------+--------+------+------------+---------+---------------+ | clicks | 0 | PRIMARY | 1 | id | A | 79808649 | NULL | NULL | | BTREE | | | | clicks | 1 | link_id | 1 | link_id | A | 276154 | NULL | NULL | | BTREE | | | | clicks | 1 | date_added | 1 | date_added | A | 79808649 | NULL | NULL | | BTREE | | | +--------+------------+------------+--------------+-------------+-----------+-------------+----------+--------+------+------------+---------+---------------+ I'm trying to run some analytical queries on this table and I'm finding that it's taking ages to run. Take the following query for example: SELECT DISTINCT(link_id) AS link_id FROM clicks WHERE date_added >= '2016-11-01 00:00:00' AND date_added <= '2016-12-05 10:16:00' This query took almost a minute to complete. I found by running an EXPLAIN on the query that the indexes weren't used. +----+-------------+--------+-------+---------------+---------+---------+------+----------+-------------+ | id | select_type | table | type | possible_keys | key | key_len | ref | rows | Extra | +----+-------------+--------+-------+---------------+---------+---------+------+----------+-------------+ | 1 | SIMPLE | clicks | index | date_added | link_id | 4 | NULL | 79786609 | Using where | +----+-------------+--------+-------+---------------+---------+---------+------+----------+-------------+ I expected that the query would have been run by using the index on the date_added column to filter down the result set before then pulling out the distinct link_ids from the result. Does anyone know why the index is not being used or if there's anything I can do to force it to be used? Note: This question is part of a bigger issue and is closely related to an unsolved issue I posted last week - MySQL query with JOIN not using INDEX Edit Explain on my query, without using any index hints: EXPLAIN SELECT DISTINCT(link_id) FROM clicks WHERE date_added >= '2016-11-01 00:00:00' AND date_added <= '2016-12-05 23:59:59'; +----+-------------+---------------------------+-------+---------------+---------+---------+------+----------+-------------+ | id | select_type | table | type | possible_keys | key | key_len | ref | rows | Extra | +----+-------------+---------------------------+-------+---------------+---------+---------+------+----------+-------------+ | 1 | SIMPLE | clicks | index | date_added | link_id | 4 | NULL | 79816660 | Using where | +----+-------------+---------------------------+-------+---------------+---------+---------+------+----------+-------------+ Explain on my query WITH index hints: EXPLAIN SELECT DISTINCT(link_id) FROM clicks USE INDEX(date_added) IGNORE INDEX(link_id) WHERE date_added >= '2016-11-01 00:00:00' AND date_added <= '2016-12-05 23:59:59'; +----+-------------+---------------------------+------+---------------+------+---------+------+----------+------------------------------+ | id | select_type | table | type | possible_keys | key | key_len | ref | rows | Extra | +----+-------------+---------------------------+------+---------------+------+---------+------+----------+------------------------------+ | 1 | SIMPLE | clicks | ALL | date_added | NULL | NULL | NULL | 79816882 | Using where; Using temporary | +----+-------------+---------------------------+------+---------------+------+---------+------+----------+------------------------------+ Edit 2 Using FORCE INDEX(date_added) on my query (Query completed even quicker, 12.05 sec): EXPLAIN SELECT DISTINCT(link_id) FROM clicks FORCE INDEX(date_added) WHERE date_added >= '2016-11-01 00:00:00' AND date_added <= '2016-12-05 23:59:59'; +----+-------------+---------------------------+-------+---------------+------------+---------+------+----------+------------------------------+ | id | select_type | table | type | possible_keys | key | key_len | ref | rows | Extra | +----+-------------+---------------------------+-------+---------------+------------+---------+------+----------+------------------------------+ | 1 | SIMPLE | clicks | range | date_added | date_added | 4 | NULL | 17277508 | Using where; Using temporary | +----+-------------+---------------------------+-------+---------------+------------+---------+------+----------+------------------------------+ A: First of all, it is not true that no index was used. The explain results clearly indicate that link_id index was used. As to why the date_added index was not used, the answer is simple: MySQL decided against because it thought that link_id index would be a better choice. What you need to understand is that there are 2 operations in your query that could be sped-up by an index: Filtering on the data range Making sure that each link_id is returned only once. If you really wanted to optimise this query, then you would create a multi-column index on link_id, date_added fields. You wrote in a comment to Gordon's answer, that this was not possible. Therefore, MySQL must decide which one of the 2 operations it is going to speed up using one of the indexes. It decided that link_id index is the better choice. If you disagree with its decision, then you can use index hints to indicate to MySQL that you prefer to use (use index or force index) or ignore (ignore index) a particular index. Just instruct MySQL to ignore the link_id index and use date_added index. Just make sure that you check the query speed after the adjustments.
{ "pile_set_name": "StackExchange" }
482 F.Supp. 448 (1979) Thomas FELTON, Petitioner, v. David HARRIS, Superintendent, Green Haven Correctional Facility, Respondent. No. 79 Civ. 2180. United States District Court, S. D. New York. October 31, 1979. *449 David Blackstone, New York City, for petitioner. Robert Abrams, Atty. Gen. of N. Y., New York City, for respondent; Andrea G. Iason, Deputy Asst. Atty. Gen., of counsel. OPINION EDWARD WEINFELD, District Judge. Petitioner, Thomas Felton, now serving a sentence of 25 years to life at Green Haven Correctional Facility, New York pursuant to a judgment of conviction of the murder in the second degree, of three separate victims, entered upon a jury verdict in the Supreme Court, Bronx County, petitions for his release under a federal writ of habeas corpus. Petitioner's co-defendant, Willie Lee Kirksey, also was convicted at their joint trial of the same charges and received the same sentence. The judgment of conviction was affirmed by the Appellate Division, First Department and leave to appeal to the Court of Appeals was denied. Soon thereafter, petitioner commenced this proceeding upon a claim that his conviction was obtained in violation of his right of confrontation under the Sixth Amendment in that Kirksey's confession, which directly implicated petitioner, was admitted in evidence over his objection, although Kirksey did not testify, as petitioner did. Before trial, each defendant moved pursuant to Huntley[1] to suppress his individual statements or confessions. Each motion was heard separately before State Supreme Court Justice Donald Sullivan who, after extensive testimony, denied each defendant's motion upon specific findings that appropriate Miranda warnings were given; that the statements were voluntary; that the People had established beyond a reasonable doubt that each defendant's constitutional rights had not been violated; and that each had made an intelligent waiver. The Court also denied motions made by Kirksey to suppress eyewitness identification evidence pursuant to Wade[2] and physical evidence, a school guard crossing shield, obtained during a search of his apartment, pursuant to Mapp.[3] Following the denial of the aforesaid motions, the case proceeded to trial before Judge Sullivan and resulted in the conviction of each defendant of the murders of Elsie Simon, Margaret Doyle and Stella Bloswick, committed during the commission of robbery and other felonies. Several days after petitioner had been sentenced thereon, he pled guilty to manslaughter in the first degree in the killing of another victim, Rose Jocelyn and was sentenced to a term of 8 1/3 to 25 years. He also pled guilty to an attempt to commit robbery in the second degree upon one Ethel Dyer and was sentenced to 2 1/3 to 7 years. The latter two sentences were to run concurrently with *450 those imposed upon the second degree murder convictions.[4] A series of murders of elderly women were committed between March and September 3, 1975 in Bronx County, New York City, each of which followed a common pattern. The assailants gained entry into apartments by a ruse and when the occupant opened the door she was pushed in and assaulted. The apartment was ransacked for money, jewelry and other valuables and in some instances, the aged woman was raped before she was killed either by violent assault, gagging or strangulation. The Kirksey Statements In the late afternoon of September 5, 1975, as a result of a report of a robbery in the general area of the most recent homicide, Willie Lee Kirksey was apprehended soon after he jumped over a fence of a hospital near the scene of the reported robbery. He was arrested and interrogated by detectives who, it so happened were in the vicinity investigating the murder of Margaret Doyle two days earlier on September 3. Kirksey was told that any leads he could give concerning the homicide might be helpful to him on the instant arrest charge. He mentioned that three of his friends — Tommy, Ronny and Bobby — had disclosed to him that they had "ripped off" an old lady; that when she opened the door of her apartment in response to their knock they pushed her in and she screamed. The detectives, with respect to the Doyle murder, had information that the deceased in fact had screamed. Kirksey's reference to this detail led one of them to suggest "you were there," whereupon, after a moment's reflection, Kirksey admitted he had been and said he wished to talk because his conscience was bothering him.[5] He agreed to take the detectives to the scene of the homicide. He led them to 2476 Webb Avenue, Bronx, walked three flights up to an apartment, described the layout before entering, and upon entry gave a detailed account of his and each accomplice's role in, and recounted events leading to, the assault, robbery and murder and how they later divided the proceeds of the crime. He said it was Tommy who pushed her inside when she screamed and then used a pillow as he began punching the struggling 75 year old woman. Margaret Doyle resided and was murdered in that apartment two days earlier. He also mentioned that before they had entered the apartment, using his shirt, he had unscrewed a hallway light bulb so that it would not light. It was the loosened bulb, which the custodian of the building was about to remove, that led to the discovery of the deceased when he checked the door of her apartment. When asked by the detectives if he had anything to so with any other homicides committed against elderly people, Kirksey stated he had been involved in another, four or five weeks earlier, and named Tommy, Ronny, Bobby and Skip as the other participants. He then led the detectives to a building at 2364 Tiebout Avenue, Bronx, and pointed out a ground floor apartment. It was the scene of the Elsie Simon murder committed on July 29, 1975. In this instance, he said his accomplices went into the building while he waited downstairs in a car; that in about twenty minutes they came running out of the building; and after meeting them at a pre-arranged spot, they told him that they had ripped off an *451 old woman, tied and gagged her and had gotten some jewelry and money and split the proceeds. The detectives then returned to the police precinct where Kirksey repeated his versions of the Doyle and Simon crimes and signed a statement summarizing what he had recounted to the detectives. Efforts late that evening to locate the named accomplices, including Tommy, proved fruitless. The detectives, in their quest for those named by Kirksey, were accompanied by him. He pointed out their usual haunts, but they were not to be found. Upon their return to the police precinct, Kirksey was asked whether or not there were really accomplices and had he acted on his own. He became visibly upset and told detectives he was responsible for a third murder, committed in March 1975, at De Voe Terrace in the Bronx. The homicide, as described by him, had been committed in similar fashion to the Doyle and Simon murders. The victim was pushed into her apartment, assaulted, robbed and killed. Again he directed the officers to an apartment at 2435 De Voe Terrace where Stella Bloswick's dead body was discovered on March 15, 1975. When they returned to the station house, Kirksey was again asked if in fact he had not committed the crimes by himself. This time he said he had committed the Doyle and Bloswick murders by himself and that Tommy was involved only in the Simon homicide. He also eliminated Ronny, Skip and Bobby as accomplices in any of the murders.[6] Following this reinterview, he repeated his revised version to an Assistant District Attorney that he alone was responsible for the Doyle and Bloswick murders and that he and Tommy committed the murder of Elsie Simon. He stated that he and Tommy entered the Tiebout apartment house on July 29, 1975, and met Elsie Simon as she was leaving her apartment to empty garbage; that they pushed her back into her apartment and he restrained her on the floor while Tommy tied and gagged her, following which they took money and jewelry from a rear bedroom. The question and answer statement was stenographically recorded. Later that morning, Kirksey was arraigned and charged with the three murders. Thomas Felton and His Statements Kirksey's reference to "Tommy" led detectives to believe that he was Thomas Felton, the petitioner. However, it was not until September 17 that contact was made with him. This was effected through Detective William Hoard who was known to be friendly with the Felton family and whose assistance was enlisted in locating Felton by the detectives investigating the murders. Hoard himself was not engaged in any aspect of the investigation into the murders. Hoard left word with James Felton that the investigating detectives desired to interview his son Tommy. Thereafter, Thomas Felton voluntarily appeared on September 17 at the police precinct. He first saw Hoard to whom he denied any knowledge of the crimes. He was later interviewed by the detectives investigating the murders. He was informed of Kirksey's arrest for several homicides and after first stating he did not know who Kirksey was, identified his picture as somebody he knew from the neighborhood. When told that Kirksey had named him as a participant in one of the homicides, he denied he had anything to do with Kirksey with respect to criminal activities. Felton was not detained. In the meantime, the detectives continued their investigation. On October 3, 1975, Felton, without solicitation, called on the detectives at the station house. He was again given his Miranda rights. He told detectives that he worked for a company as a protective gate installer which gave him access to residences; that he was thus in a position to "case" apartments; and that when he went into apartments he looked for valuables and later passed this information on to Kirksey. He told them he had "fingered" three locations; *452 that the Elsie Simon residence was one where he had seen an old lady and valuables in the apartment and subsequently had given this information to Kirksey. He agreed to locate the premises about which he had given the information to Kirksey. He then directed them to the building where the Simon murder occurred and pointed out the window gates on the ground floor apartment he had installed. He next led them to another building where he said he had taken measurements for gates to be installed in an apartment three flights up. This apartment was the scene of the Margaret Doyle murder. Later he identified yet another apartment on De Voe Terrace where he said he had fingered a job. This was the apartment where Stella Bloswick was murdered. He also admitted casing a fourth apartment, that of Rose Jocelyn on University Avenue, Bronx, and later implicated himself in a robbery and burglary there.[7] Felton acknowledged that he knew the purpose of furnishing the information to Kirksey was robbery and that after each robbery he was paid either 50, 60 or 70 dollars. However, he denied that he was present or knew what had happened at the various apartments when the crimes were committed or that he was informed any of the victims had been injured. He named Jerry Kirksey, Willie's brother and one Kevin McKinley as Willie Kirksey's confederates. At the station house, he repeated what he had told the detectives and the substance of his statements was recorded by a detective on five pages of notes, each of which he initialed. Later, in the early hours of October 4, he again repeated his earlier statements upon questioning by an Assistant District Attorney and they were stenographically recorded. Later that morning, October 4, he was arraigned in the Criminal Court upon an unrelated robbery charge, to which he had referred during the course of his questioning, and released on low bail. The decision to lodge this charge against him was based upon three factors: (1) his confession during the preceding night was at that time insufficient to warrant a murder prosecution; (2) the investigation was ongoing; and (3) the prospect that he might be used as a witness against Kirksey. On October 6, Felton, entirely on his own, called on Detective Hoard, revised his earlier version, volunteering that he was present at the three homicides, but denied he killed anyone. Hoard stopped him from speaking further and advised him of his Miranda rights. Hoard then phoned Detective Lyman, one of the investigating team, and arranged an appointment for Lyman and Felton the next day. Felton failed to keep that appointment. On the evening of October 9, Lyman and another detective called at petitioner's home where he was found hiding in a closet. He agreed to accompany them to the station house, where, at his request, he spoke to his father in privacy for about a half hour. Following this conversation, in the presence of his father, he told the police officers that his prior version about installing or measuring gates was false and that he had not worked during the period of the murders for the gate installing company. He stated that he knew Kirksey for three years and that he was present with Kirksey when the three robberies were committed. He confessed to the murders of Margaret Doyle, Elsie Simon and Stella Bloswick and inculpated himself in the murder of Rose Jocelyn. He described in detail his role, that of Kirksey and others in the Doyle robbery and murder; the others included Kirksey's brother, Jerry, and one Kevin McKinley. He described how when the quartet got to the floor of the apartment they unscrewed the light bulb in the hallway and that when Kirksey knocked on the door of the apartment he flashed a silver badge to encourage the occupant to open the door wide enough to force entry. He related how, after gaining *453 entrance, the victim was bound and gagged; how he and the others ransacked the apartment of money, jewelry and valuables; and how they split the money later that night, with Kirksey assigned to "fence" the jewelry and to divide the proceeds. With respect to the Simon robbery and murder, he also recounted in detail his role, Kirksey's and that of the other confederates. He described how they had stalked the victim for several days before following her from the street on the fatal day to her apartment; how she was pushed into her apartment as she was opening the door, then assaulted, robbed and murdered, and how they later split the spoils. Similarly, he described in minute detail events leading to the robbery and murder of Stella Bloswick on March 15, 1975; in that instance too, to gain entrance, a school crossing guard shield was displayed when the occupant of the apartment responded to their knock on the door or signal, following which they pushed her into the apartment. He identified for the detectives a school crossing guard shield as similar to the one displayed to the victims. This was the shield obtained during the search of Kirksey's apartment and the subject of his unsuccessful motion to suppress. Felton also identified a picture of a ring that was part of the loot taken in the Bloswick apartment that he had given to Kirksey and which the latter wore at the time of his arrest. Felton, at the conclusion of this interview, signed and initialed each page of the officer's notes summarizing his statements. Later, starting shortly after midnight on October 10th, he repeated his statement to an Assistant District Attorney which was recorded stenographically on eighty-six pages.[8] This statement was also made in his father's presence. When Felton named Jerry Kirksey as one of the accomplices, the police immediately went to the Kirksey home where they were informed, and soon verified, that Jerry Kirksey had been imprisoned during the period that Felton named him a participant in the crimes he described. Confronted with this information, petitioner said he wanted to get even with Willie Lee Kirksey because he informed on him. He then substituted his own brother Al for Jerry Kirksey. When the police brought Al Felton to the station house, and the brothers talked privately, Felton retracted, saying he had falsely accused his brother because he didn't want to go to jail alone and wanted somebody who knew him. Thereafter he repeated his final revised statement, that his confederates in the Simon, Doyle and Bloswick murders were Willie Kirksey and Kevin McKinley, to an Assistant District Attorney which also was recorded stenographically. Upon the trial, in addition to other evidence, each defendant's inculpatory statements and confessions, oral and written, were presented to the jury. Appropriate cautionary instructions were given to the jury that each defendant's statement was received in evidence only as to that defendant and was not to be considered against the other. Kirksey did not testify. He called as his only witness a psychiatric nurse at the Kingsbridge Veterans Hospital, who testified that Kirksey and his mother were at the hospital on July 29, 1975 between 1:15 and 1:45 p. m. The petitioner did testify. He categorically denied that he knew or had heard of Kirksey prior to October 1975 when questioned about him by the detectives. He denied that he had been in the apartment of the murder victims or that he played any role whatsoever in the crimes. He admitted he made the oral and written inculpatory statements which acknowledged his complicity in each of the three murders, but, despite the minutia of detail, denied the inculpatory statements were true. He testified that the various statements which detailed his role in the murders were in fact false; that they were drilled into *454 him by the family friend, Detective Hoard. His version was that Hoard, in whom he had confidence, told him that Kirksey had named him as a participant in three or four murders, and when he denied he was involved, Hoard said the authorities had helped him out on the unrelated robbery charge when he was released in low bail and in return asked him to become a state's witness against Kirksey; that Hoard asked him to make a statement to the detectives in charge of the murder investigation. Petitioner testified that Hoard told him what to say with respect to each murder and went over the details of each, giving the locations of each murder scene, the color of an ambulance called to the scene of one of the murders, a description of the school crossing badge and the jewelry he identified that Kirksey wore and had been stolen from one of the apartments. He further testified that he had memorized what Hoard had told him to say until he knew the answers by heart. Felton said that it was upon Hoard's instructions that he included the jailed Jerry Kirksey as a participant in the crimes, and gave the explanation that he included Jerry because he wanted to get at his brother Willie because Willie had named him as a confederate. Felton also testified that Hoard was present each time he made incriminating statements, the oral as well as the written ones, on October 3-4 and October 9-10. Felton admitted he made the confessions as testified to and as set forth in the question and answer recorded statements, but maintained that he simply was parroting what he was told to say — in sum, that his confession was false. Felton's father, with whom he conferred privately before, and who was present when he confessed, was not called as a defense witness. Detective Hoard categorically denied Felton's charge of a false confession or that he was present when Felton made either his oral inculpatory statements to the detectives or his recorded confessions to the Assistant District Attorneys. The testimony of the State's witnesses was of like tenor. The stenographic question and answer confessions do not list Hoard as present. Since petitioner does not dispute that he made the incriminating admissions and the confession, if in fact they were voluntary, they constitute the strongest evidence that can be given of the facts stated therein.[9] With the corpus delicti established in the instance of each murder, the guilt of the defendant could be based on his uncorroborated confession.[10] But there is corroborative evidence. Petitioner's detailed information as to each robbery, the ransacking of the apartments, their locations, the role of each participant in the crimes, and the minutia of events leading to each murder was consistent with the independent objective evidence that also was presented to the jury. On the other hand, if petitioner was innocent of the crimes but merely repeated what was told him upon assurance that this would help him on the unrelated robbery charge against him, then his confession and the inculpatory statements were of no value. Prior to trial, at the Huntley hearing, the Judge found that the statements were voluntarily and knowingly made and free from any constitutional taint. This determination is presumed to be correct in this proceeding, and in fact, petitioner has presented no challenge to the validity of that finding.[11] The jury, by its verdict, obviously rejected his version of a planted and false confession. Against the background of the trial record, we consider petitioner's claim that *455 nonetheless the admission of Kirksey's confession violated petitioner's right of confrontation since Kirksey did not testify and thus was not subject to cross-examination, and that as a consequence the judgment of conviction is void. There can be no question that petitioner's confessions, oral and written, "interlocked" with those of Kirksey, who did not testify. Each one separately described his own particular role and that of his confederates in each murder, and with such detail that only a participant could have known, including, but not limited to, the "fingering" of an apartment occupied by an elderly lady for a planned "rip-off"; the precise location of the apartment; in one instance, the unscrewing of an electric light bulb; in other instances, the use of the school guard badge to gain entry; and once entry was effected, specific acts of assault upon the victim, the ransacking of the apartment in search of valuables, a description of the loot and a subsequent meeting and sharing of the spoils of the crime. The fact that the confessions of each with respect to each separate crime do not jibe in perfection, or indeed that there are some contradictions, is of no consequence.[12] Absolute identical statements are not required. Indeed, it would be remarkable if suspects questioned separately with each seeking to minimize his role in the murders were in precise accord in their recital of details. It is sufficient if the two confessions are substantially the same and consistent on the major elements of the crime, particularly the slayings.[13] Here, the statements of Felton and Kirksey are in harmony as to the basic material events; they clearly interlock as to motive, plotting and execution of the crimes. Our Court of Appeals consistently has held that upon a joint trial, the Bruton rule[14] is not violated "[w]here the jury heard not only a co-defendant's confession but the defendant's own confession," since in that circumstance "no such `devastating' risk attends the lack of confrontation as was thought to be involved in Bruton."[15] This view, shared by most circuits, recently has been upheld by a plurality of the Supreme Court in Parker v. Randolph.[16] The precise issue there decided is four-square with that presented by the instant case, to wit, as stated by Mr. Justice Rehnquist, "whether Bruton requires reversal of a defendant's conviction when the defendant himself has confessed and his confession `interlocks' with and supports the confession of his codefendant." The holding was that the admission at a joint trial of such interlocking confessions with proper instructions did not infringe upon the right of confrontation secured under the Sixth Amendment. The continuing vitality of Bruton was recognized but the Court noted that its underlying rationale was not applicable to every case. That rationale is that at a joint trial the admission of extrajudicial statements of a non-testifying codefendant has the potential of such devastating impact upon a non-confessing defendant that potential prejudice cannot be removed by limiting instructions with the consequence that his right to a fundamentally fair trial may be impaired. But Mr. Justice Rehnquist went on to say: *456 [T]he same cannot be said, however, when the defendant's own confession — `probably the most probative and damaging evidence that can be admitted against him,' . . . —is properly introduced at trial. The defendant is `the most knowledgeable and unimpeachable source of information about his past conduct,' . . . and one can scarcely imagine evidence more damaging to his defense than his own admission of guilt. Thus, the incriminating statements of a codefendant will seldom, if ever, be of the `devastating' character referred to in Bruton when the incriminated defendant has admitted his own guilt. The right protected by Bruton — the `constitutional right of cross-examination,' . . . — has far less practical value to a defendant who has confessed to the crime than to one who has consistently maintained his innocence.[17] The case here is even stronger than Parker to support the non-applicability of the Bruton doctrine. Here Felton testified seeking to vitiate the force of his inculpatory statements by a denial of their verity. That the jury rejected his disavowal of his oral and written confessions did not give rise to a violation of his right of confrontation. Indeed, the confrontation clause, while of great importance in assuring an accused a fundamentally fair trial, has never been woodenly applied to bar every extrajudicial statement.[18] Petitioner's counsel urges that Parker has not conclusively resolved the issue of whether the Bruton rule precludes the use at trial of a non-testifying codefendant's confession when the defendant himself has confessed, pointing out that only four justices held that Bruton was not violated, whereas, according to him, four were of the view that it was, and that the majority vote was obtained by Mr. Justice Blackmun's concurrence which was based on the harmless error doctrine as explicated in Harrington v. California.[19] Accordingly, petitioner's counsel presses that Bruton be applied in the instant case. However one may view that contention, the short answer is that this Court is bound by the rulings of our Court of Appeals,[20] and under its repeated authorities on this subject, this case is beyond Bruton. Moreover, even were it assumed, contrary to the foregoing, that Bruton was applicable and that petitioner's conviction was obtained in violation of that rule, this Court, based upon its word-by-word study of the entire record, including not only the trial testimony but that taken over a four-day period with respect to the pretrial motions, is fully persuaded that the claimed error was harmless beyond a reasonable doubt. The detailed review of the record fully supports the trial court's observation there was "strong evidence of defendant's guilt." Once the jury rejected petitioner's disclaimer of his confession, and upon its face the disavowal does appear most implausible, the evidence that he committed the murders was most powerful. Perhaps the strongest proof that the jury convicted Felton upon his own confession of guilt and not that of his codefendant is that Kirksey in his final confession implicated Felton only in the Simon murder, whereas Felton confessed to and was convicted of all three, the Simon, Doyle and Bloswick murders. The petition for a writ of habeas corpus is denied. NOTES [1] People v. Huntley, 15 N.Y.2d 72, 255 N.Y.S.2d 838, 204 N.E.2d 179 (1965). [2] United States v. Wade, 388 U.S. 218, 87 S.Ct. 1926, 18 L.Ed.2d 1149 (1967). [3] Mapp v. Ohio, 367 U.S. 643, 81 S.Ct. 1684, 6 L.Ed.2d 1081 (1961). [4] The petitioner did not admit the underlying facts but expressed his desire to enter the guilty pleas. The Court, after closely questioning defendant and impressing upon him his right to a trial, accepted the pleas as voluntarily and intelligently entered under the doctrine of North Carolina v. Alford, 400 U.S. 25, 91 S.Ct. 160, 27 L.Ed.2d 162 (1970), noting that "the defendant's claim of innocence has been, in the Court's opinion negated by the proof and strong evidence of actual guilt." Minutes January 14, 1976, p. 32. [5] Kirksey was given the Miranda warning in this and other instances when questioned, as was the case when Felton was questioned at various times. As already noted, the Supreme Court Justice so found upon the Huntley hearing and the trial evidence abundantly establishes this and no claim is raised with respect thereto. Accordingly, hereafter reference will not be made to each instance when the warning was given. [6] His explanation: The first time I was kidding around a bit. I was scared the first time. Then the second time we started talking . . . I just told them everything. [7] Felton was separately indicted for the murder of Rose Jocelyn and in another indictment for robbery and burglary of another woman who was in the apartment and pled guilty to the latter charges. See text accompanying footnote 4 supra. [8] This statement was redacted upon the trial to exclude reference to the Rose Jocelyn murder and robbery. [9] Hopt v. Utah, 110 U.S. 574, 585, 4 S.Ct. 202, 28 L.Ed. 262 (1884); Cramer v. United States, 325 U.S. 1, 67, 65 S.Ct. 918, 89 L.Ed. 1441 (1945) (Douglas, J., dissenting); United States v. Mihalopoulos, 228 F.Supp. 994, 1000 (D.D.C. 1964). Cf. United States v. Drummond, 354 F.2d 132, 144 (2d Cir. 1965), cert. denied, 384 U.S. 1013, 86 S.Ct. 1968, 16 L.Ed.2d 1031 (1966). [10] Smith v. United States, 348 U.S. 147, 156, 75 S.Ct. 194, 99 L.Ed. 192 (1954). [11] 28 U.S.C. § 2254(d). See also United States ex rel. Stanbridge v. Zelker, 514 F.2d 45, 51 (2d Cir.), cert. denied, 423 U.S. 872, 96 S.Ct. 138, 46 L.Ed.2d 102 (1975). [12] United States ex rel. Ortiz v. Fritz, 476 F.2d 37, 39 (2d Cir.), cert. denied, 414 U.S. 1075, 94 S.Ct. 591, 38 L.Ed.2d 482 (1973). [13] United States ex rel. Stanbridge v. Zelker, 514 F.2d 45, 49 (2d Cir.), cert. denied, 423 U.S. 872, 96 S.Ct. 138, 46 L.Ed.2d 102 (1975); United States v. De Berry, 487 F.2d 448 (2d Cir. 1973); United States ex rel. Duff v. Zelker, 452 F.2d 1009 (2d Cir. 1971), cert. denied, 406 U.S. 932, 92 S.Ct. 1807, 32 L.Ed.2d 134 (1972). [14] Bruton v. United States, 391 U.S. 123, 88 S.Ct. 1620, 20 L.Ed.2d 476 (1968). [15] United States ex rel. Catanzaro v. Mancusi, 404 F.2d 296, 300 (1968), cert. denied, 397 U.S. 942, 90 S.Ct. 956, 25 L.Ed.2d 123 (1970); United States v. Dizdar, 581 F.2d 1031 (2d Cir. 1978); United States ex rel. Stanbridge v. Zelker, 514 F.2d 45, 49 (2d Cir.), cert. denied, 423 U.S. 872, 96 S.Ct. 138, 46 L.Ed.2d 102 (1975); United States ex rel. Duff v. Zelker, 452 F.2d 1009 (2d Cir. 1971), cert. denied, 406 U.S. 932, 92 S.Ct. 1807, 32 L.Ed.2d 134 (1972). [16] 442 U.S. 62, 99 S.Ct. 2132, 60 L.Ed.2d 713 (1979). [17] Id. at 72, 99 S.Ct. at 2139 (quoting from Bruton v. United States, 391 U.S. 123, 88 S.Ct. 1620, 20 L.Ed.2d 476 (1968) (White, J., dissenting)). [18] See Parker v. Randolph, 442 U.S. 62, 99 S.Ct. 2132, 60 L.Ed.2d 713 (1979); Dutton v. Evans, 400 U.S. 74, 80, 91 S.Ct. 210, 27 L.Ed.2d 213 (1970); Heike v. United States, 192 F. 83, 90 (2d Cir. 1911), aff'd, 227 U.S. 131, 33 S.Ct. 226, 57 L.Ed. 450 (1913); Montgomery v. Fogg, 479 F.Supp. 363, 79 Civ. 3626 (S.D.N.Y. Oct. 16, 1979). [19] 395 U.S. 250, 89 S.Ct. 1726, 23 L.Ed.2d 284 (1969). [20] See, e. g., United States v. Jenkins, 349 F.Supp. 1068, 1072 (E.D.N.Y.1972), app. dismissed, 490 F.2d 868 (2d Cir. 1973), aff'd, 420 U.S. 358, 95 S.Ct. 1006, 43 L.Ed.2d 250 (1975); United States ex rel. Johnson v. Zelker, 339 F.Supp. 227, 230 (S.D.N.Y.1971); Hoover v. Allen, 241 F.Supp. 213, 229 (S.D.N.Y.1965).
{ "pile_set_name": "FreeLaw" }
Q: Using std::string Datatype in std::vector's Constructor This isn't so much a specific question about RapidXML convention as it is a question about using a std::vector's constructor. In all examples that I have found of others using RapidXML, everyone always reads data into a vector of char's using the std::vector's constructor like so: vector<char> buffer((istreambuf_iterator<char>(theFile)), istreambuf_iterator<char>()); There must be a reason for this because when I try to change it to a vector of std::string's I get a screen full of errors with this being the first error: error: invalid conversion from ‘void*’ to ‘std::istreambuf_iterator<std::basic_string<char> >::streambuf_type* {aka std::basic_streambuf<std::basic_string<char>, std::char_traits<std::basic_string<char> > >*}’ Is there a way to use std::string and if not why? A: What are you trying to do? Do you want the contents of the file in a single string? If so, then string buffer((istreambuf_iterator<char>(theFile)), istreambuf_iterator<char>()); should do it. On the other hand, if you want a vector of strings, with each string containing a single line from the file, you'll have to write a loop like this (untested code): vector <string> lines; for (string aLine; std::getline(theFile, aLine) ; ) lines.push_back(aLine);
{ "pile_set_name": "StackExchange" }
Beastie Boys have been musically inactive since Adam "MCA" Yauch passed away in 2012. "We can't make new music without him," Michael "Mike D" Diamond said last year. But earlier this week, Mike D and Adam "Ad-Rock" Horovitz filed a trademark application with the United States Patent and Trademark Office for the Beastie Boys name in conjunction with "live performances by a musical group," as lawyer David Lizerbram points out. You can find the legal document here. According to Lizerbram, the application seems to point to some kind of reunion and live performance. However, as he writes, "it’s possible that their attorney (who signed the application on their behalf) filed this application for some other reason that we don’t know of, or that it was filed in error." Update: A representative says: "There will never be Beastie Boys live performances without Adam Yauch."
{ "pile_set_name": "OpenWebText2" }
Biotransformation of polycyclic aromatic compounds by fungi. Incubations of several polycyclic aromatic hydrocarbons (PAHs) and heteroaromatic compounds with a series of common micro-organisms have been performed. The PAHs were not metabolized by any of the fungi studied. The sulphur-containing heterocyclic aromatic compounds dibenzothiophene, thioxanthone and thiochromanone were oxidized at sulphur by C. elegans. Other fungi are capable of oxidation at the sulphur atom of dibenzothiophene and thioxanthone. C-1 and C-3 methyl substituted thioxanthones are hydroxylated at the methyl group by C. elegans.
{ "pile_set_name": "PubMed Abstracts" }
Hockey: Falmouth clinch promotion and league title with Plymouth win Falmouth sealed the title and promotion to the West Premier League second division with a comfortable 4-0 away win over Mannamead, writes Kat Barberry-Red. The visitors were frustrated for much of the first half as they failed to convert several chances, despite having a huge amount of possession. Clare Hudson broke the deadlock when her solid pass surprised everyone and found its way through a crowd into the back of the goal. With their noses ahead at the start of the second half Falmouth capitalised on a loose ball in the Mannamead circle, and player of the match, Hudson, netted her second goal of the game to double Falmouth’s lead. Rachael Tatlow sped up the wing to square the ball for Sam Dunstan who swept in number three, before Hudson’s penalty corner strike was deflected into the roof of the net by Victoria Pryor. The final whistle was met with jubilation from the team and a champagne celebration. And though the performance may not have been vintage Falmouth, given the team’s exploits over the course of the season, it was certainly a case of 'job done.' Falmouth gained a convincing win at Penryn College on Saturday as their run of good form continued, writes Kat Barberry-Red. The home team showed their intention to attack right from the start but the good display from the University keeper kept them at bay for the first quarter of the game. Iona Middleton was very unlucky not to beat the keeper with a number of good attempts on goal. The deadlock was broken when a good run down the right wing by Emma Bragg, followed by a testing cross, led to a penalty corner which Gill Lister struck well to dispatch into goal. Player of the match, Lister, had the final touch a few minutes later as she doubled the lead from close range. With half time approaching Emma Bragg scored the first of her two goals as she drew the goalkeeper out and slotted the ball in behind her. In the second half Falmouth continued to put pressure on the Plymouth team and had them penned into their own half but were unable to find a way through the crowded shooting area. First team squad members, Hanna Royle and Emily Dunstan, controlled the centre, while Molly Phillips, Hannah Whear and Jeanne Naylor played well in midfield. The visitors pulled one back from a quick break but Falmouth then restored their three goal lead as Emma Bragg claimed her second as she found space on the right to score from a narrow angle. The Falmouth defence was rarely troubled, making well-timed tackles when they were called upon to stop the occasional University attacking move and June Moore had a very quiet game in the Falmouth goal. A good team performance to gain a well deserved win. On Saturday Falmouth will end their season at home to Tavistock at Penryn College at 10.30am hoping to keep their unbeaten record intact. Falmouth seconds travel to Plymouth to play Mannamead seconds at Marjons at 10.30am.
{ "pile_set_name": "Pile-CC" }
_______________________________________________________________ This message and any attachments are intended for the individual or entity named above. If you are not the intended recipient, please do not read, copy, use or disclose this communication to others; also please notify the sender by replying to this message, and then delete it from your system. Thank you. _______________________________________________________________ Your proposed draft exhibit goes substantially beyond the ALJ's order. ALJ Biren specifically stated that the the late-filed exhibit "should be narrowly focused on the mismatch of capacity." Tr. 1021.Thus, you need to eliminate the column entitled "Total Take-away Capacity." Furthermore, the column is both suspect (e.g., the representation that EOR is 770 MMcfd) and misleading (e.g., the inclusion of SWG or PG&E in "S. Calif Take-away Capacity"). Also, you need to eliminate the "Avg. Daily Market" box. The following is what should be submitted to ALJ Biren: (See attached file: #1070989 v1 - FIRM PIPELINE CAPACITY DELIVERY (EX. TO I.99-07-003).doc) - #1070989 v1 - FIRM PIPELINE CAPACITY DELIVERY (EX. TO I.99-07-003).doc
{ "pile_set_name": "Enron Emails" }
A data center is a facility that physically houses various equipment, such as computers, servers (e.g., web servers, application servers, database servers), switches, routers, data storage devices, load balancers, wire cages or closets, vaults, racks, and related equipment for the purpose of storing, managing, processing, and exchanging data and information between hosts. A host typically corresponds to a computer system, a processor with associated physical memory, or a processor with shared memory and/or resources. Data centers also provide application services and management for various data processing functions, such as web hosting internet, intranet, telecommunication, and information technology. Data centers are a unique environment because all the machines and services provided to clients are within a controlled and well-monitored environment. Specifically, data centers are managed by one or more administrators. In order to provide the application services and data processing functions, software is installed by an administrator on each host of the data center. Typically, installing the software on each host is performed remotely. Provisioning is the act of installing the software. One type of software that is typically provisioned is the operating system (OS) on bare hardware. Provisioning an OS in a data center is challenging because data centers are typically large and heterogeneous with respect to different operating systems (e.g., Solaris™ developed by Sun Microsystems, Inc. (a trademark of Sun Microsystems, Inc. located in Santa Clara, Calif.), Redhat Linux® developed by Red Hat, Inc. (a registered trademark of Red Hat, Inc. located in Raleigh, N.C.), SUSE® Linux developed by Novell, Inc. (a registered trademark of Novell, Inc. located in Waltham, Mass.), Windows® developed by Microsoft Corporation (a registered trademark of the Microsoft Corporation located in Redmond, Wash.), etc.) and types of hosts (i.e., different hosts use different hardware). Further, each OS has a separate provisioning program that orchestrates the provisioning of the OS on the host. Each provisioning program typically has different input parameters, configuration file formats, and configuration steps. Accordingly, provisioning the different types of operating systems requires the administrator to be knowledgeable about the different input parameters, configuration file formats, and configuration steps.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Display more than one image at onmouseover event I have the following code which displays an image onmouseover and sets back the default image active onmouseout. <img src="image1.jpg" onmouseover="this.src='image2.jp'" onmouseout="this.src='image1.jpg'" /> I want to be able to display multiple images onmouseover event; each displaying after a set time. Can anyone help me out on this? A: HTML <div id="container"> <img id="initialIMG" src="http://icons.iconarchive.com/icons/jamespeng/construction/128/bonecrusher-icon.png" /> </div> <img src="http://icons.iconarchive.com/icons/jamespeng/construction/128/bonecrusher-icon.png" onmouseover="this.src='http://icons.iconarchive.com/icons/jamespeng/construction/128/longhaul-icon.png'" onmouseout="this.src='http://icons.iconarchive.com/icons/jamespeng/construction/128/bonecrusher-icon.png'" /> JavaScript $(document).ready(function(){ $("#container").mouseenter(function() { var t = setTimeout(function(){ $("#initialIMG").hide(); $("#initialIMG").attr("src", "http://icons.iconarchive.com/icons/jamespeng/construction/128/longhaul-icon.png" ) $("#initialIMG").fadeIn(50); $("#container").append( '<img id="addedIMG" src="http://icons.iconarchive.com/icons/jamespeng/construction/128/mixmaster-icon.png" style="display:none;"/>' ); $("#addedIMG").fadeIn(50); },500); }); $("#container").mouseleave(function() { var t = setTimeout(function(){ $("#initialIMG").hide(); $("#initialIMG").attr("src", "http://icons.iconarchive.com/icons/jamespeng/construction/128/bonecrusher-icon.png" ) $("#initialIMG").fadeIn(50); $("#addedIMG").remove(); },500); }); }); FIDDLE
{ "pile_set_name": "StackExchange" }
Hundreds of people celebrated Transgender Pride in Union Park July 29, for the first Chicago Transgender, Gender Non-Conforming and Intersex Freedom (TGIF) Rally and Picnic. Trans Pride, themed “enterprising from the margins,” focused on transgender people of color and honored the community members lost this year, including Paige Clay. Attendees also wrote down names of transgender people they’ve lost and hopes for the community’s future on a make-shift memorial. The event featured keynote speaker Kylar Broadus, founder of the Trans People of Color Coalition, and performances by the Youth Empowerment Performance Project, About Face Youth Theatre’s What’s The T?, KOKUMO and Queer Choir. Trans Pride was fantastic and exactly how a pride celebration should be: full of fun, food and family. It had a general feeling of openness and love that was hinged on community rather than corporations. I am a member of Queer Choir (holding it down for the tenors) and I spent most of the Trans Pride preparing for our performance, but I did have some friends snap some photos and video: I am reading my femme poem with Queer Choir. Full text of the poem is available here. The crowd at Trans Pride. KOKUMO is on stage with Queer Choir. KOKUMO interacting with the crowd while performing with Queer Choir. We backed her up as she sang “I’m Every Woman.” Some of the members of Queer Choir posing after the Trans Pride performance. Queer Choir performs femme poem, “Like a Prayer” and “I’m Every Woman” at Trans Pride Ebonii and El Ray perform Katy Perry’s “E.T.” at Trans Pride Follow @QueerKnowledge
{ "pile_set_name": "OpenWebText2" }
Providing a Personal Perspective of World War II History and the 1940s American Home Front. Search This Blog Tuesday, June 9, 2015 Highlights from the 71st Anniversary of D-Day Hello All, 71st Anniversary of D-Day This past Saturday, 6 June 2015, the 71st Anniversary of the Allied Invasion of Normandy, also known as D-Day, was held at The National D-Day Memorial. The annual commemoration ceremony honors the brave men and women who made the ultimate sacrifice for us on that fateful day of days. They encompass the many reasons why we are here today and why it is of utmost importance to never forget their sacrifice for generations to come. Over 1,900 people from across the world honored the Memorial with their presence for the 71st Anniversary of D-Day. Among the audience were at least 50 D-Day and World War II veterans. It is a true blessing to be able to honor these men and women while they are still with us. The theme for the day was honor, fidelity, and sacrifice; not a soul uttered a word when the 29th Division began the drum roll and Attention, followed by the Presentation of the Colors. The wreath laying portion of the ceremony, in tribute to units involved in the D-Day invasion, was especially emotional to observe, along with the playing of Taps shortly afterwards. Dame Mary S. Barraco and I in the Education Tent. Keynote Speaker Dame Mary Sigillo Barraco brought the audience to tears with her stirring and inspiring speech on the subject of honoring the past and preserving fierce patriotism in the face of evil. Dame Mary Barraco was an American teenager living in Nazi occupied Belgium. At the tender age of 17, Mary made the courageous decision to join the “Freedom Fighters”, a Resistance Group known for aiding downed pilots, sneaking supplies and knowledge in and out of detention camps, and providing safe haven for Jewish citizens fleeing from Nazi persecution. Mary and her fiancé were eventually betrayed, for the equivalent of $15, by none other than a fellow Belgian partisan. Both were captured and separated by the Gestapo and were sent to a series of detainment camps. Mary’s fiancé was executed while she spent the remainder of her captivity in a Nazi controlled concentration camp. Mary was subjected to unimaginable horrors while imprisoned, yet despite it all, she continued to fight for liberty and freedom, drawing strength from God, justice, and love of country. U.S. Coast Guard Silent Drill Team After Dame Mary’s moving speech, the Coast Guard Silent Drill team honored our D-Day veterans with a Tribute to Veterans performance in the Main Plaza. Once again, the audience was completely silent and in awe of the talented group of men and women displaying phenomenal discipline as they swung their battle ready rifles with precise execution. Col. Arnald D. Gabriel Shortly after the conclusion of the ceremony, patrons were treated to the delightful talents of the 29th Division Band featuring guest conductor Colonel Arnald D. Gabriel, legendary conductor and World War II veteran. Col. Gabriel served as a machine gunner with the 29th Infantry Division in Europe during World War II, receiving two Bronze Star Medals, the Combat Infantryman’s Badge, and the French Croix de Guerre. He continued his military career with 21 years dedicated to the United States Air Force, conducting the renowned U.S. Air Force Band, Symphony Orchestra, and the Singing Sergeants from 1964- 1985. Following his retirement, Col. Gabriel was awarded the Legion of Merit for his service to the U.S. Air Force and to music education. Woodmen of the World Lodge 175 D-Day cake. A highlight for so many each year is the Veterans Reunion Tent. D-Day and World War II veterans are able to meet for the first time or visit with old friends as they and their families share memories of the past and hopes for the future. This year, the Reunion Tent had a special treat for our veterans and visitors. The Woodmen of the World, in celebration of their 125th anniversary, wanted to pay tribute to our D-Day veterans by baking a magnificent cake for their enjoyment. The cake showcased the twelve Allied nations that took part in the Normandy landings, along with all five invasion beaches represented around the cake. Warmest thanks to all who supported the National D-Day Memorial for our most special event of the year, the Anniversary of D-Day. AREVA, Financial Designs, Freedom Aviation, Winoa USA, and Woodmen of the World Lodge 175 were fundamental to the success of the 71st Anniversary of D-Day. On that same token, the event would not have been such a triumph without the help of our wonderful, hardworking, and dedicated volunteers! Thank you on behalf of all of us at the National D-Day Memorial. No comments: Post a Comment The National D-Day Memorialis run by a private, non-profit educational foundation in Bedford, Virginia that seeks to preserve the lessons and legacy of D-Day, June 6, 1944. Meet Maggie About Me I work as the Education Coordinator for the National D-Day Memorial planning a variety of family-friendly programs for students of all ages. It is my passion to present history in a way that is fun and engaging.
{ "pile_set_name": "Pile-CC" }
3 Ninjas Kick Back 3 Ninjas Kick Back is a 1994 American film directed by Charles T. Kanganis. It is a sequel to the film 3 Ninjas. Despite being released as the second installment of the franchise, Kick Back is chronologically the third installment of the 3 Ninjas series. Originally the other sequel 3 Ninjas Knuckle Up was shot back-to-back with the first film and with the original cast, but due to distribution issues it was released in 1995. Max Elliott Slade is the only actor to reprise his role from the previous films as Jeffrey "Colt" Douglas, one of the 3 main characters. The film has a continuity error where Mori's last name changes from Tanaka to Shintaro for no apparent reason. It is the only film in the series to receive a video game adaptation. Plot Rocky, Colt and Tum-Tum are experiencing the pains of growing up prior to a trip to Japan planned with their grandfather Mori Shintaro, who hopes to take them to a martial arts tournament of which he was the victor 50 years ago. Only Tum-Tum seems interested in going, and even then, only out of interest in seeing sumo wrestlers due to how much food they get to eat. He tells the boys he hopes to return a dagger awarded to him at the tournament when he defeated a boy named Koga, so that it may be presented to the incumbent victor. In Japan, a man (later revealed to be Koga) breaks into a museum and steals a sword before escaping via hang glider. At a baseball game, Rocky seems too focused on a cute girl named Lisa D. Marino to pitch properly. Tum-Tum causes constant breaks due to getting snacks, and Colt's short temper causes a fight with the opposing team that grows so large that the umpire calls off the game until the next week, driving a nail into the boys' plans to travel. Meanwhile, back at Mori's house, a trio of burglars led by Koga's nephew Glam try to break into the house to steal the dagger. The boys manage to drive them off, counting it as an ordinary robbery attempt. Grandpa leaves alone, but the boys' father Sam accidentally gives him Tum-Tum's bag. Once he arrives in Japan, Mori's taxi is rear-ended by Glam and his friends who steal his bag. After hearing from Mori at the hospital, the boys discover their bags had been switched and have the dagger. They arrange a trip with Mori's credit card and meet him in Japan. He instructs the boys to give it to the master of the tournament. Glam and his friends record the conversation and deliver it to Koga, who punishes them for not retrieving the dagger. At the tournament, Colt takes the place of a fallen competitor but is promptly beaten by a girl named Miyo, wounding his pride. She helps them deliver the dagger to the Grand Master, and allows the boys to stay with her and her mother. She has a love of baseball but is not very good. The boys offer to train her in baseball if she teaches them some of her martial arts skill. Koga attempts to trap the boys and retrieve the dagger himself by pretending to be the Grand Master, but the boys and Miyo catch onto his scheme. They face several adversaries before they are finally captured. Meanwhile, Mori is kidnapped from the hospital by Koga's assistant, Ishikawa, after fleeing Glam and the others. Koga forces Mori to tell him the location of the Cave of Gold; an urban legend which the sword and dagger are the keys to open. Fearing the safety for his grandchildren, Mori agrees to aid Koga. Soon after, the children come up with a plan and escape Koga's compound on hang gliders, arriving at the cave shortly after the adults. Inside, Koga and Mori realize the legend is true after they encounter walls and monuments of gold within. While the two battle each other, the boys and Miyo drop in on them and Koga pulls a gun. Using Mori's lesson on focus, Colt throws a ball bearing into the muzzle of the gun, causing it to backfire and start a cave in. The group flees the cave, and Koga, now realizing the price of his greed, apologizes and leaves the group unharmed. Rocky realizes that they are a day ahead of America and that they can still make it home by the championship game. At the game, the boys overcome their flaws. Down by two in the last inning, one of the opposing team player gets a hit off Rocky's pitch which is almost a home run, until a recent roster add, revealed to be Miyo, catches the ball. In the bottom of the inning, Colt focuses and hits a home run, allowing all three boys to score and win the game. The bullies face them down after the game, and he picks Miyo to fight for ruining his home run. Despite Tum-Tum's warning that "she's just a girl", he screams as she readies to attack him and the screen goes dark as he is beaten up soundly. Cast Victor Wong - Grandpa Mori Shintaro Max Elliott Slade - Jeffrey "Colt" Douglas Sean Fox - Samuel "Rocky" Douglas J. Evan Bonifant - Michael "Tum Tum" Douglas Caroline Junko King - Miyo Alan McRae - Samuel Douglas Sr. Margarita Franco - Jessica Shintaro-Douglas Sab Shimono - Koga Dustin Nguyen - Glam Scott Caudill - Darren “The Bully” Reception The film had a mostly negative reaction. Box office The film opened in the #3 position on opening weekend with a total of $3,556,310 USD. By the end of its 4-week run, the movie grossed $11,798,854 domestically. References External links Category:1994 films Category:1990s action comedy films Category:1990s sequel films Category:1994 martial arts films Category:American sequel films Category:TriStar Pictures films Category:American action comedy films Category:American films Category:American martial arts films Category:English-language films Kick Back Category:Films about brothers Category:Films directed by Charles T. Kanganis Category:Films set in Japan Category:Films set in the United States Category:American martial arts comedy films Category:Films adapted into comics Category:Films adapted into video games Category:Ninja films Category:Foreign films shot in Japan
{ "pile_set_name": "Wikipedia (en)" }
env = require('test_run') test_run = env.new() engine = test_run:get_cfg('engine') fiber = require('fiber') orig_synchro_quorum = box.cfg.replication_synchro_quorum orig_synchro_timeout = box.cfg.replication_synchro_timeout NUM_INSTANCES = 2 BROKEN_QUORUM = NUM_INSTANCES + 1 box.schema.user.grant('guest', 'replication') -- Setup an async cluster with two instances. test_run:cmd('create server replica with rpl_master=default,\ script="replication/replica.lua"') test_run:cmd('start server replica with wait=True, wait_load=True') -- [RFC, Snapshot generation] all txns confirmed, then snapshot on master, -- expected success. -- Testcase setup. test_run:switch('default') box.cfg{replication_synchro_quorum=NUM_INSTANCES, replication_synchro_timeout=1000} _ = box.schema.space.create('sync', {is_sync=true, engine=engine}) _ = box.space.sync:create_index('pk') -- Testcase body. box.space.sync:insert{1} box.space.sync:select{} -- 1 box.snapshot() box.space.sync:select{} -- 1 -- Testcase cleanup. box.space.sync:drop() -- [RFC, Snapshot generation] all txns confirmed, then snapshot on replica, -- expected success. -- Testcase setup. test_run:switch('default') box.cfg{replication_synchro_quorum=NUM_INSTANCES, replication_synchro_timeout=1000} _ = box.schema.space.create('sync', {is_sync=true, engine=engine}) _ = box.space.sync:create_index('pk') -- Testcase body. box.space.sync:insert{1} box.space.sync:select{} -- 1 test_run:switch('replica') box.space.sync:select{} -- 1 box.cfg{replication_synchro_timeout=1000} box.snapshot() box.space.sync:select{} -- 1 -- Testcase cleanup. test_run:switch('default') box.space.sync:drop() -- [RFC, Snapshot generation] snapshot started on master, then rollback -- arrived, expected snapshot abort. -- The test is temporary blocked on 5146 due to a crash when local -- WAL write fails inside the WAL thread. Since this is the only -- way to cause rollback of the transaction used in a snapshot -- without triggering snapshot timeout. -- test_run:switch('default') -- box.cfg{replication_synchro_quorum=NUM_INSTANCES, replication_synchro_timeout=0.1} -- _ = box.schema.space.create('sync', {is_sync=true, engine=engine}) -- _ = box.space.sync:create_index('pk') -- -- Testcase body. -- box.space.sync:insert{1} -- box.space.sync:select{} -- 1 -- test_run:switch('default') -- test_run:cmd("setopt delimiter ';'") -- _ = fiber.create(function() -- box.cfg{replication_synchro_quorum=BROKEN_QUORUM, replication_synchro_timeout=2} -- box.space.sync:insert{2} -- end); -- test_run:cmd("setopt delimiter ''"); -- box.snapshot() -- abort -- box.space.sync:select{} -- 1 -- test_run:switch('replica') -- box.space.sync:select{} -- 1 -- -- Testcase cleanup. -- test_run:switch('default') -- box.space.sync:drop() -- [RFC, Snapshot generation] snapshot started on replica, then rollback -- arrived, expected snapshot abort. test_run:switch('default') box.cfg{replication_synchro_quorum=NUM_INSTANCES, replication_synchro_timeout=1000} _ = box.schema.space.create('sync', {is_sync=true, engine=engine}) _ = box.space.sync:create_index('pk') -- Write something to flush the current master's state to replica. _ = box.space.sync:insert{1} _ = box.space.sync:delete{1} test_run:switch('default') box.cfg{replication_synchro_quorum=BROKEN_QUORUM} ok, err = nil f = fiber.create(function() \ ok, err = pcall(box.space.sync.insert, box.space.sync, {1}) \ end) test_run:switch('replica') fiber = require('fiber') box.cfg{replication_synchro_timeout=1000} test_run:wait_cond(function() return box.space.sync:count() == 1 end) ok, err = nil f = fiber.create(function() ok, err = pcall(box.snapshot) end) test_run:switch('default') box.cfg{replication_synchro_timeout=0.0001} test_run:wait_cond(function() return f:status() == 'dead' end) ok, err test_run:switch('replica') test_run:wait_cond(function() return f:status() == 'dead' end) ok, err box.space.sync:select{} test_run:switch('default') box.space.sync:select{} -- Testcase cleanup. test_run:switch('default') box.space.sync:drop() -- Teardown. test_run:cmd('switch default') test_run:cmd('stop server replica') test_run:cmd('delete server replica') test_run:cleanup_cluster() box.schema.user.revoke('guest', 'replication') box.cfg{ \ replication_synchro_quorum = orig_synchro_quorum, \ replication_synchro_timeout = orig_synchro_timeout, \ }
{ "pile_set_name": "Github" }
Q: Exporting database from MySql Workbench I have made a database in MySql Workbench. Along the design, I deleted a couple of tables since they weren't necessary. But, when I try to export the database to phpmyadmin, all of those tables appear in the code. How do I solve this? A: In MySQL Workbench 6.0 CE. I think it is very easy. Suppose first you add a table in the database. for doing that. Click on Database Menu. and then click on "Next to Database". You all database will show on left side. Click on db and then right click on table. Create New Table. Now you will create a new table. Click on Apply and you watch table is created. Now You need to drop this table. Just right click on a table. and click on drop table. and a dialog box will open. Choose drop and the your created table will be deleted. Now if you export your db, this deleted table will not show up. If you had made relationships among different tables then the table will not be deleted until you remove that relationship. Thanks.
{ "pile_set_name": "StackExchange" }
Regina Branner Regina Branner (5 September 1931 – 21 February 2017) was an Austrian athlete. She competed in the women's shot put at the 1956 Summer Olympics. References Category:1931 births Category:2017 deaths Category:Athletes (track and field) at the 1956 Summer Olympics Category:Austrian female shot putters Category:Olympic athletes of Austria Category:Place of birth missing
{ "pile_set_name": "Wikipedia (en)" }
Q: Redirect old links with parameters by .htaccess Still working on my Joomla 2.5-site, now I realized old links on Google and on other sites I'd like to 301 rewrite: http://www.my-site.com/index.php?p=26 to lead to http://www.my-site.com/new-link.html I tried RewriteRule ^index.php?p=26$ /new-link.html [L,R=301] but this didn't work. I'd like to add that I need specific rewrites, e.g. index.php?p=26 --> new-link.html, ...p=99 --> another-link.html etc. A: No that won't work since you can't match QUERY_STRING in RewriteRule. Try this rule: RewriteCond %{THE_REQUEST} \s/+index\.php\?p=([^\s&]+) [NC] RewriteRule ^ /new-link.html? [L,R=301] EDIT: Writing rules specific IDs: RewriteCond %{THE_REQUEST} \s/+(?:index\.php)?\?p=26(?:&|\s) [NC] RewriteRule ^ /new-link.html? [L,R=301] RewriteCond %{THE_REQUEST} \s/+(?:index\.php)?\?p=12345(?:&|\s) [NC] RewriteRule ^ /another-link.html? [L,R=301]
{ "pile_set_name": "StackExchange" }
Silicon integrated circuits continue to grow ever denser, requiring that the gate oxides in FETs (field effect transistors) be thinner and, in particular, that the gate electrodes in the FETs become narrower. Said gate electrodes are most usually made of polysilicon and, until relatively recently, were patterned by conventional use of photoresist masking. However, as gates have grown narrower, use of a photoresist mask has become increasingly problematical. There are a number of reasons for this--undercutting of the photoresist during etching, which can be tolerated in wider lines, introduces a degree of uncertainty into the process which can no longer be tolerated in very narrow lines; because of the high level of resolution required, the photoresist layer must be thinner than that used for etching wider lines; sensitivity of photoresist-based processes to process parameters such as exposure wavelength, brand of resist used, etc. becomes more of a problem; and line width control, and reduction of line edge roughness, through use of photoresist trimming, becomes more difficult if the photoresist is also used as the primary etch mask. Another factor that needs to be considered when forming structures through etching is the need to use an ARC (anti-reflection coating). This is laid down just below the photoresist layer to prevent formation of standing wave patterns within the resist. ARCs may be either organic or inorganic, the former being relatively thick while the latter are relatively thin. For reasons that will become apparent, an inorganic ARC is part of the present invention. A routine search of the prior art was performed but no references that describe the exact process taught by the present invention were discovered. Several references of interest were, however, encountered. For example, Bell (U.S. Pat. No. 5,767,018) determined that a process being used by him to etch a silicon oxynitride ARC caused pitting of the polysilicon gate structure. Polymer formation during etching was considered to be a large contributor to this problem so an etchant that did not form a polymer was selected. This allowed a passivating coating to form on the sidewalls as the polysilicon was etched (using HBr/Cl.sub.2 /He--O.sub.2). The final step was an anisotropic etch that cleaned the top surface of the gate without removing the protective layer from the sidewalls. Kumar et al. (U.S. Pat. No. 5,851,926) teach use of a tungsten silicide hard mask together with an NF.sub.3 and Cl.sub.2 etch to achieve vertical edges for a polysilicon gate. Keller (U.S. Pat. No. 5,346,586) etches a polysilicon layer that has been coated with a silicide layer by first forming an oxide hard mask and then successively etching the suicide and polysilicon layers. Muller (U.S. Pat. No. 5,674,409) shows a photoresist trim process for forming lines while Shin et al. (U.S. pat. No. 5,914,276) describe a process for etching a polycide/polysilicon gate.
{ "pile_set_name": "USPTO Backgrounds" }
Parole board rejects condemned Ohio inmate’s mercy request COLUMBUS >> The Ohio Parole Board on Friday rejected a request for mercy from a condemned inmate who argues he had such a bad childhood and is in such poor health that he should be spared from execution next month. The board’s 11-1 decision came in the case of Alva Campbell, set to die by lethal injection on Nov. 15 for killing a teen during a 1997 carjacking. The slaying came five years after he was paroled on a different murder charge. Republican Gov. John Kasich has the final say. The board concluded that Campbell’s upbringing and childhood experiences “were certainly dysfunctional and no doubt traumatic” but must be weighed against the circumstances of his crime. The board also cited the fact that he had been responsible for two killings, among other offenses. Advertisement “Those murders and other crimes committed by Campbell over the course of many years reflect a disturbing propensity to engage in extreme and senseless violence, a propensity that never abated despite multiple incarcerations and attempts by the state to rehabilitate him,” the board said. The board member who supported clemency concluded that Campbell’s “unstable, inhumane living conditions” as a child were made worse by his eventual removal from the home and that that was never fully considered by the courts. Campbell was paroled in 1992 after serving 20 years for killing a man in a Cleveland bar. On April 2, 1997, Campbell was in a wheelchair feigning paralysis when he overpowered a Franklin County sheriff’s deputy on the way to a court hearing on several armed robbery charges, records show. Campbell took the deputy’s gun, carjacked 18-year-old Charles Dials and drove around with him for several hours before shooting him twice in the head as Dials crouched in the footwell of his own truck, according to court records. Campbell’s attorney, David Stebbins, said Friday that Campbell was regularly beaten, sexually abused and tortured as a child. “We are disappointed that the majority of the Parole Board minimized the effect of this traumatic childhood as a source of his adult criminal behavior,” Stebbins said. He also said that Campbell is terminally ill with a variety of chronic diseases. He is unable to walk, or breathe without assistance and is dependent on an external colostomy bag, Stebbins said. “Executing Alva Campbell under these unique circumstances will result in an unseemly spectacle,” he said. Stebbins says they are asking Kasich to grant clemency or, at the very least, to issue a reprieve. O’Brien said it was ironic Campbell was raising health concerns to avoid execution given that he faked paralysis to carry out his crime. “As judgment day nears he again resorts to ill health as a reason to enable an escape from his capital sentence — and should not be permitted to do so,” O’Brien said in a filing with the parole board earlier this month. O’Brien also dismissed Campbell’s claims about his upbringing. “It is easy to blame deceased parents or a childhood for mistakes or even crimes — but not for two separate murders committed decades apart,” O’Brien said. Other inmates across the country have cited ill health as a way to avoid execution. Some have been successful, including Vernon Madison, a 66-year-old Alabama inmate with stroke-induced dementia, who was spared because he didn’t understand his death sentence or remember the killing. But many others have not had the same success, including double killer Richard Cooey, from Ohio, who was executed in 2008 despite arguing that his obesity would prevent humane lethal injection because viable veins in his arms were difficult to find.
{ "pile_set_name": "Pile-CC" }
ggest value? (a) 11 (b) -4 (c) v (d) 4 d Let i = 217.4 - 217. Which is the smallest value? (a) i (b) 0.1 (c) 2 b Let u = -518.01 - -518. What is the biggest value in 7, -2, u? 7 Let s = 0 + -0.2. Let h = -1.243 + 1.343. Let f = 7 + -5. Which is the smallest value? (a) f (b) s (c) h b Suppose 5*j + 135 = 5*c, -39 = -3*c - 4*j + 21. Let q be ((-2)/c)/(0 + 1)*2. What is the biggest value in 1, q, -0.03, 5? 5 Let m = 0.0276 - -0.0124. What is the smallest value in m, 2/9, 0? 0 Let j = -25.1 - -25. Let l = 4.8 - 5.1. What is the biggest value in 0.3, l, j, -8? 0.3 Let w = 70.92 + -73. Let o = -0.08 - w. What is the third smallest value in -3/5, -4/7, o? o Let r = -2 + 2.5. Let u be (-9)/(-6)*5/(-6)*(-352)/(-110). What is the fourth smallest value in r, -2, u, -3/5? r Let q = 47 - 189/4. Suppose -1 = 72*t - 1. Which is the smallest value? (a) q (b) t (c) -8 c Let y = 4771 + -14189/3. Let h = y + -41. Let g = -59 + 60. What is the second biggest value in h, g, -0.2? h Let h = -959.2 - -795. Let p = h - -180. Let w = -16 + p. What is the second biggest value in 4/3, 3/8, w? 3/8 Let m = -8 - 3. Let p = 0.33 - -14.67. Let l = p + m. Which is the smallest value? (a) 1 (b) l (c) -1 c Let u = -1.9 + 2. Let w = -48.9 + 49.1. Which is the second smallest value? (a) 6 (b) u (c) -0.2 (d) w b Let d = 1.3 - 6.3. Let o = 2068.7 + -2069. What is the second biggest value in d, 11/2, o? o Let o = -971 + 970.4. Which is the third smallest value? (a) 0.2 (b) -2/17 (c) o (d) 1 a Suppose 38*p + 24 = 44*p. Suppose -12 = -0*i + 2*i. Let k(h) = -h - 8. Let x be k(i). What is the third biggest value in -5, x, p? -5 Let v = 12 - -5. Let f = -17.1 + v. What is the third smallest value in f, 5, -3? 5 Suppose -2*w - 2*p - 1 = -21, w - 6 = -3*p. Let v = -7 + 16. Let c = v - w. What is the third biggest value in 0.1, c, -1? c Suppose 0*x = -4*x + 4. Let r = 1 - 0.6. What is the smallest value in r, x, -3? -3 Let v = 9.5 - 10. Suppose -5*o + 2*x - 16 = 0, 2*o - 5*x + 15 = -4. Which is the fourth biggest value? (a) v (b) 1 (c) o (d) 5 c Let i = 120.79 - -3.91. Let v = -125 + i. Which is the smallest value? (a) -1/5 (b) 3 (c) -3 (d) v c Let n = -8.9 - -8.5. Let t = 5 - 0. Which is the third smallest value? (a) -5 (b) n (c) t c Let y = 19193/5 - 3790. Let q = y - 49. What is the biggest value in -8, 2, q? 2 Let p = -0.71 - -3.71. Which is the third smallest value? (a) p (b) -2 (c) -0.64 (d) -0.3 d Let n = -6.15 + 0.15. Let w = -5.6 - n. Let z = 277 + -276.7. What is the third smallest value in w, z, -3? w Let l = -275 + 2203/8. Let j be 2/(-8) + (-126)/(-216). What is the second smallest value in l, 0.16, j? j Let m = -236/875 + -2/125. Let t(l) = -2*l**2 - 6*l + 2. Let s be t(-7). Let k be 3/s - (-8)/36. Which is the third biggest value? (a) k (b) m (c) -0.2 b Let j = 226 + -226.2. What is the third biggest value in 27, j, -3/2, -0.1? j Let u(f) = -f**3 + 12*f**2 - 12*f + 13. Let d be u(11). Suppose -2*p + 12 = -d*i, 4*p + 20 = -4*i + 6*p. Let w = 85 - 82. What is the biggest value in i, 1, w? w Let c(g) = 2*g**2 - 4. Let q be c(2). Suppose 0*p + p = 5*t - 96, q*t - 60 = 5*p. What is the smallest value in -0.4, 1/5, t? -0.4 Suppose 8 = 5*q + 3. Let p = -0.04 - -0.04. Let j be (((-325)/(-20))/(-13))/(2/8). What is the third biggest value in p, q, j? j Let k = -0.2 + 6.2. Let u = 8 - k. Let m = 9.2 + -8.7. What is the smallest value in m, 1/3, u? 1/3 Let o = -3.8 - -4. Let g = 9 + -14. Let x = g + 9. What is the third smallest value in x, o, 0.1? x Let u = 43/18 + -29/9. What is the biggest value in -6, -2/5, u, 2/5? 2/5 Let w = 837 + -838. What is the biggest value in 3, w, 4, -0.4? 4 Let m = -3.45 - 1.55. What is the second biggest value in -1/4, -2/13, m, -1/18? -2/13 Let s = 2.62 + -0.12. Let g = s + -8. Let d = g - -6. Which is the second smallest value? (a) 5 (b) 4 (c) d b Let n = 150 - 162. What is the smallest value in 3, n, -0.2? n Let o = -1.5 + 14.5. Let z = -14 + o. Let j be ((-27)/12*-2)/3. What is the second biggest value in z, 1, j? 1 Let f = -0.0645 - -1.0825. Let u = -0.062 - f. Let r = u - -1. What is the smallest value in r, -1, -3? -3 Suppose -24*s = -58*s - 102. Suppose h = 3 - 0. What is the second smallest value in s, h, 1/13? 1/13 Let f = 335 - 338. What is the third biggest value in 2/7, -1/2, f, -1? -1 Let n = 144 + -144. What is the second smallest value in 2, 2/3, n, 5? 2/3 Let z = 1596.74 - 1572. Let j = z - -0.26. Let m = -17 + j. Which is the second biggest value? (a) -2 (b) m (c) -2/5 c Let k = 1.55 + -25.55. Which is the smallest value? (a) 2/5 (b) k (c) 0 b Let w = -714 - -714.4. Which is the third smallest value? (a) -10 (b) w (c) 4 (d) 0.3 b Let m = -0.2 + -1.4. Let n = m - -2.6. Let s = 0 - 2. What is the second biggest value in -5, s, n? s Let i = -0.19 + -0.01. Suppose 0*x + 2*x = -m, -4*x - 4*m + 8 = 0. Which is the smallest value? (a) -3/2 (b) x (c) i b Let z = -799 + 1597/2. Which is the third biggest value? (a) -150 (b) -3 (c) z a Let g = -3.5 + 0.5. Let w = g + 6. What is the second biggest value in -3/8, -0.1, w? -0.1 Let z(o) = o. Let c(q) = -3*q - 2. Let v(s) = -c(s) - 6*z(s). Let h be v(-1). Let p = -0.2 + 0.4. What is the smallest value in h, p, 3/8? p Let w = -11.04 - -126.04. What is the third smallest value in -1/8, -5, w? w Let b(q) = -2*q + 6. Let l be 1/((3/12)/(30/24)). Let j be b(l). What is the third smallest value in j, 5, -0.1? 5 Let q = -0.221 + 0.721. Which is the third smallest value? (a) 2/97 (b) q (c) 0 b Let j = 0.11 - 8.11. Let u = 21 + j. Let k = u + -13.4. Which is the third smallest value? (a) 0.4 (b) -3/4 (c) k a Let x(y) = y - 7. Let c be x(8). Suppose 0 = 4*v + c + 19. What is the biggest value in 1/5, v, 0.3? 0.3 Let g = -1.6 + 2.7. Let t = -0.6 + g. Which is the second biggest value? (a) t (b) 0.3 (c) -16 (d) -3 b Let s = -93 - -92. Which is the third smallest value? (a) -1.4 (b) 24 (c) s b Let v = 1.2 + -14.2. Let l = -12.7 - v. What is the second biggest value in 10, l, 2? 2 Let t = 363 + -361. What is the fourth biggest value in 14, 2/5, t, 2/9? 2/9 Suppose 0 = -88*x + 93*x + 5. What is the biggest value in 2, -0.1, 1/5, x? 2 Let p = -304 + 300. Let f = -4/53 - -206/1325. Which is the second smallest value? (a) 4 (b) 2/9 (c) p (d) f d Let i = 4/355 - 391/3195. What is the second biggest value in -3, i, -13? -3 Let g = 11 - 11.3. Let l = 2.3 + -7.3. Let f = 9 + l. What is the second biggest value in g, f, 0? 0 Let z(q) = -q**3 - 10*q**2 + 12*q + 10. Let u be z(-11). Which is the second biggest value? (a) 2 (b) u (c) 18 a Let p = -0.1755 - -0.0255. Which is the third smallest value? (a) 0.2 (b) 0 (c) p a Let f = -3/10 - -1/20. Let j = -1 + -4.5. Let k = j + 5. Which is the second biggest value? (a) f (b) k (c) 2 a Let v = 20/37 + -137/185. Suppose -3*l = -0*l + 3. Which is the biggest value? (a) l (b) v (c) -3 (d) -4 b Suppose 7*a - 177 = -205. Let u = -1.1 - -0.1. Suppose -3*y + 23 = 2*c, 2*c - 18 = -3*y + y. What is the biggest value in c, u, a? c Let k = -2383/7 - -341. Which is the third smallest value? (a) 1 (b) 0.1 (c) 0.046 (d) k d Let f = 9 - 8.2. Let c = f + -0.5. Let k = -4.88 + -0.12. What is the second biggest value in 3, k, c? c Suppose -3*l + 368 = l. Let i = 643/7 - l. Let h be (-10)/25*75/(-345). Which is the smallest value? (a) h (b) i (c) -5 c Let y = 0.324 - 19.324. What is the second smallest value in y, -2/9, 0.1? -2/9 Let g = 0.43 - 0.13. Let h = -99.5 + 99. What is the second smallest value in g, -0.3, h? -0.3 Suppose 0 = 10*y - 15*y. Let o be -1 + -2 + y/(-4). Let x be (o + 0)/(16/48). Which is the third biggest value? (a) -0.3 (b) x (c) -2/15 b Let x(g) = -g**3 - 4*g**2 - 5*g - 25. Let t be x(-4). What is the third biggest value in 11, -3, t? t Let o = 47.51 - 42.51. Let i be 54/58 - (2 + -1). Which is the third biggest value? (a) o (b) i (c) 0 b Let b = 0.058 + -30.058. Let i = b + 34. Let f = i + -8. What is the third biggest value in 4, f, 1? f Let s = 105.24 - 102. Let y = s - 3.3. What is the smallest value in y, 3, 0.1? y Let v = -0.13 + 0.08. Let j = -3 - -3.5. Let m be -1 - -14*(-3)/(-54). Which is the smallest value? (a) v (b) j (c) m c Let c = 49 - 44. Let n = 0.13
{ "pile_set_name": "DM Mathematics" }
Calcium phosphate cements as drug delivery materials. Calcium phosphate cements are used as synthetic bone grafts, with several advantages, such as their osteoconductivity and injectability. Moreover, their low-temperature setting reaction and intrinsic porosity allow for the incorporation of drugs and active principles in the material. It is the aim of the present work to: a) provide an overview of the different approaches taken in the application of calcium phosphate cements for drug delivery in the skeletal system, and b) identify the most significant achievements. The drugs or active principles associated to calcium phosphate cements are classified in three groups, i) low molecular weight drugs; ii) high molecular weight biomolecules; and iii) ions.
{ "pile_set_name": "PubMed Abstracts" }
Tom wrote:Okay... but there wasn't anyone championing the hinayana doctrine in Tibet at this time- from a mahayana perspective it was already, game, set, and match long ago. True, but if I remember Hopkins correctly, in both Exposition of the Stages of the Path and Illumination of the Thought: Extensive Explanation of Chandrakirti's Supplement to Nagarjuna's "Treatise on the Middle", Tsongkhapa goes back to Yogācāra and Vasubhandu (and therefore, Sarvāstivāda/Sautrāntra) to put the nail in the coffin on "idealistic" readings of "Mind Only". If they can sever like and dislike, along with greed, anger, and delusion, regardless of their difference in nature, they will all accomplish the Buddha Path.. ~ Sutra of Complete Enlightenment Tom wrote:Okay... but there wasn't anyone championing the hinayana doctrine in Tibet at this time- from a mahayana perspective it was already, game, set, and match long ago. True, but if I remember Hopkins correctly, in both Exposition of the Stages of the Path and Illumination of the Thought: Extensive Explanation of Chandrakirti's Supplement to Nagarjuna's "Treatise on the Middle", Tsongkhapa goes back to Yogācāra and Vasubhandu (and therefore, Sarvāstivāda/Sautrāntra) to put the nail in the coffin on "idealistic" readings of "Mind Only". Yogācāra is a mahayana perspective on which Vasubhandhu wrote extensively... of course his bhaysa is from a sautrāntika position but not sure if that is relevant here...I'll have to check out what Hopkins says - no doubt he is spot on! Konchog1 wrote:So a book could be labeled a cat, car, or cloud. Why not? There's no inherent nature.1. Is this understanding of the criticism correct? i think a clearer example is the example of the king. if there were not characteristics on the side of the king which both identified that particular person as the king and excluded everyone else from being the king, then anyone could be a king as soon as you imputed the category 'king'. at the same time, this main defining characteristic of being a king is not separate nor identical to its parts, the collection of parts, nor to one particular part, etc, so the characteristic lacks true existence prasangika responds by saying that the meaning of emptiness has not been realize--svatantrikas are still asserting traces of inherent existence, that there is some particular mark or characteristic from his side which illustrates his existence as king. right? that is how the argument began, if being a king was 100% mentally labelled then anyone could be king Tom wrote:For something to be conventionally valid designation it must be:1. not undermined by another mind that is conventionally valid (valid and mistaken) 2. not undermined by another mind that is ultimately valid (valid and unmistaken) 3. Accords with worldly conventionCalling a book a car fails this test and so is not conventionally valid designation. the car is nevertheless valid. its only with respect to the conceived object that it is invalid Tom wrote:For something to be conventionally valid designation it must be:1. not undermined by another mind that is conventionally valid (valid and mistaken) 2. not undermined by another mind that is ultimately valid (valid and unmistaken) 3. Accords with worldly conventionCalling a book a car fails this test and so is not conventionally valid designation. the car is nevertheless valid. its only with respect to the conceived object that it is invalid Please just re-read the post I was talking about "calling a book a car" not sure how there is anything valid about this "car"! It seems we have very different understandings of dharma - so let's not do this! Tom wrote:For something to be conventionally valid designation it must be:1. not undermined by another mind that is conventionally valid (valid and mistaken) 2. not undermined by another mind that is ultimately valid (valid and unmistaken) 3. Accords with worldly conventionCalling a book a car fails this test and so is not conventionally valid designation. the car is nevertheless valid. its only with respect to the conceived object that it is invalid by the way, just to make it clear, it is the [img]mind[/img] that is described as being valid with respect to the appearing object (even when is a wrong consciousness) - not "car"! Tom wrote:For something to be conventionally valid designation it must be:1. not undermined by another mind that is conventionally valid (valid and mistaken) 2. not undermined by another mind that is ultimately valid (valid and unmistaken) 3. Accords with worldly conventionCalling a book a car fails this test and so is not conventionally valid designation. the car is nevertheless valid. its only with respect to the conceived object that it is invalid by the way, just to make it clear, it is the [img]mind[/img] that is described as being valid with respect to the appearing object (even when is a wrong consciousness) - not "car"! car is the appearing object, it is what is valid to the mind when it is imputed onto a book. this is more correct, contrary to your original position that there is nothing valid about car. thanks, keep up on those exposition texts Labeling in accordance with this label and in accordance with that label-viewpoint. Labeling as thought grasping, is believing apprended appearances are real solid and from these our story world is build up. Maybe this is not a Gelug approach. Apologizes. 5heaps wrote:car is the appearing object, it is what is valid to the mind when it is imputed onto a book. this is more correct, contrary to your original position that there is nothing valid about car. thanks, keep up on those exposition texts The fact that you continue to refer to the appearing object rather that the mind which apprehends it as valid demonstrates that we are not communicating. As I said wrong consciousness is said to be valid based on it realizing its appearing object (whether it be a car or rabbits horns), that's all - but it is still a wrong consciousness and mistaken . Good luck, I will not be participating any further unless the tone changes. Tom wrote:The fact that you continue to refer to the appearing object rather that the mind which apprehends it as valid demonstrates that we are not communicating. As I said wrong consciousness is said to be valid based on it realizing its appearing object (whether it be a car or rabbits horns), that's all - but it is still a wrong consciousness and mistaken. that an object is valid is a figure of speech, Tom. of course only a cognizer such as a mind or person can be either a valid or invalid cognizer. it is simpler to say that "dinner looks tasty" than it is to say that "my mind is currently establishing dinner as tasty" calling a book a car is valid in prasangika, meaning "car" is valid with respect to being imputed in dependence on a book, or as Tom would prefer it, the imputing thought consciousness is valid with respect to its appearing object "car" and its focal object the book. this is important because it is very easy to say what Tom originally said, "I was talking about "calling a book a car" not sure how there is anything valid about this "car"" Tom wrote:The fact that you continue to refer to the appearing object rather that the mind which apprehends it as valid demonstrates that we are not communicating. As I said wrong consciousness is said to be valid based on it realizing its appearing object (whether it be a car or rabbits horns), that's all - but it is still a wrong consciousness and mistaken. that an object is valid is a figure of speech, Tom. of course only a cognizer such as a mind or person can be either a valid or invalid cognizer. it is simpler to say that "dinner looks tasty" than it is to say that "my mind is currently establishing dinner as tasty" calling a book a car is valid in prasangika, meaning "car" is valid with respect to being imputed in dependence on a book, or as Tom would prefer it, the imputing thought consciousness is valid with respect to its appearing object "car" and its focal object the book. this is important because it is very easy to say what Tom originally said, "I was talking about "calling a book a car" not sure how there is anything valid about this "car"" Sorry, but it is simply wrong to say that the car is valid in this scenario. I was relating this conversation to my teacher and when I mentioned that you were claiming that the "car" is valid because wrong consciousness is valid with respect to the appearing object Geshela started laughing. Tom wrote:The fact that you continue to refer to the appearing object rather that the mind which apprehends it as valid demonstrates that we are not communicating. As I said wrong consciousness is said to be valid based on it realizing its appearing object (whether it be a car or rabbits horns), that's all - but it is still a wrong consciousness and mistaken. that an object is valid is a figure of speech, Tom. of course only a cognizer such as a mind or person can be either a valid or invalid cognizer. it is simpler to say that "dinner looks tasty" than it is to say that "my mind is currently establishing dinner as tasty" calling a book a car is valid in prasangika, meaning "car" is valid with respect to being imputed in dependence on a book, or as Tom would prefer it, the imputing thought consciousness is valid with respect to its appearing object "car" and its focal object the book. this is important because it is very easy to say what Tom originally said, "I was talking about "calling a book a car" not sure how there is anything valid about this "car"" Sorry, but it is simply wrong to say that the car is valid in this scenario. I was relating this conversation to my teacher and when I mentioned that you were claiming that the "car" is valid because wrong consciousness is valid with respect to the appearing object Geshela started laughing. unlike sautrantika, in prasangika what makes a cognition mistaken is not that the appearing object lacks concordance with its focal object. this is very crucial to what it means to lack inherent existencei was going to give my own response but i cant be bothered so i'll just quote others you accept, from berzin: "Consider the distorted sensory nonconceptual cognition of seeing a unicorn in a meadow: [...] According to the Prasangika tenets, the mental aspect that resembles a unicorn is an existent phenomenon, although the unicorn is nonexistent. Moreover, the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate. The distortion lies in considering the hallucinated unicorn to be an external, conventionally existent unicorn." "In imagining a unicorn in a meadow: The focal object is a meadow (which does exist) and the involved object is a unicorn there (which does not exist). There is no actual unicorn, however, as the focal condition casting its reflection on the consciousness.The mental aspect (which does exist) resembling a unicorn appears (arises) simply because of external and internal causes for distortion. The appearing object is a meaning/object category (which does exist) of unicorn, imputed on the mental aspect." and then as kensur yeshey tupden explains:"There is no valid direct perception in prasangika; there is only the valid cognition of the direct [because, except for cognizing emptiness, direct perception is always mistaken regarding appearances of inherent existence]." 5heaps wrote:i was going to give my own response but i cant be bothered so i'll just quote others you accept, from berzin: "Consider the distorted sensory nonconceptual cognition of seeing a unicorn in a meadow: [...] According to the Prasangika tenets, the mental aspect that resembles a unicorn is an existent phenomenon, although the unicorn is nonexistent. Moreover, the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate. The distortion lies in considering the hallucinated unicorn to be an external, conventionally existent unicorn." "In imagining a unicorn in a meadow: The focal object is a meadow (which does exist) and the involved object is a unicorn there (which does not exist). There is no actual unicorn, however, as the focal condition casting its reflection on the consciousness.The mental aspect (which does exist) resembling a unicorn appears (arises) simply because of external and internal causes for distortion. The appearing object is a meaning/object category (which does exist) of unicorn, imputed on the mental aspect." 5heaps wrote:i was going to give my own response but i cant be bothered so i'll just quote others you accept, from berzin: "Consider the distorted sensory nonconceptual cognition of seeing a unicorn in a meadow: [...] According to the Prasangika tenets, the mental aspect that resembles a unicorn is an existent phenomenon, although the unicorn is nonexistent. Moreover, the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate. The distortion lies in considering the hallucinated unicorn to be an external, conventionally existent unicorn." "In imagining a unicorn in a meadow: The focal object is a meadow (which does exist) and the involved object is a unicorn there (which does not exist). There is no actual unicorn, however, as the focal condition casting its reflection on the consciousness.The mental aspect (which does exist) resembling a unicorn appears (arises) simply because of external and internal causes for distortion. The appearing object is a meaning/object category (which does exist) of unicorn, imputed on the mental aspect." "Nonexistent phenomena (med-pa), such as unicorns and mirages, can be objects of cognition, but not objects of valid cognition (tshad-ma). They are objects only of distorted cognition (log-shes)." yes, but that is not what is being questioned ie. whether the cognition overall may be counted as valid or notwhat is being questioned is whether "car" imputed onto a book, this part itself (the appearing object, not the involved object, or the conceived object which conceives the involved object to be valid), is valid or not. its very important because in prasangika we find that it is, whereas in sautrantika it is not at all valid to establish "car" with a book. this is extremely pivotal to prasangika's explanation of imputation, because it illustrates that there are no findable characteristics waiting around from which categories are derived at correctly or incorrectly--as long as something appears, it is valid. what makes something invalid is the conceived object (for a conceptual consciousness) and whether it withstands scrutiny in reality. inherent existence as an appearing object is valid, but the conceived object of inherent existence which this appearing object contributes to shaping is the very object of negation in realizing emptiness. if one says that "car" here is in no way valid, then they are saying that there is some findable characteristic outside of mere imputation which at that time has set forth the boundaries as to what is or is not a valid mind 5heaps wrote:i was going to give my own response but i cant be bothered so i'll just quote others you accept, from berzin: "Consider the distorted sensory nonconceptual cognition of seeing a unicorn in a meadow: [...] According to the Prasangika tenets, the mental aspect that resembles a unicorn is an existent phenomenon, although the unicorn is nonexistent. Moreover, the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate. The distortion lies in considering the hallucinated unicorn to be an external, conventionally existent unicorn." "In imagining a unicorn in a meadow: The focal object is a meadow (which does exist) and the involved object is a unicorn there (which does not exist). There is no actual unicorn, however, as the focal condition casting its reflection on the consciousness.The mental aspect (which does exist) resembling a unicorn appears (arises) simply because of external and internal causes for distortion. The appearing object is a meaning/object category (which does exist) of unicorn, imputed on the mental aspect." "Nonexistent phenomena (med-pa), such as unicorns and mirages, can be objects of cognition, but not objects of valid cognition (tshad-ma). They are objects only of distorted cognition (log-shes)." yes, but that is not what is being questioned ie. whether the cognition overall may be counted as valid or notwhat is being questioned is whether "car" imputed onto a book, this part itself (the appearing object, not the involved object, or the conceived object which conceives the involved object to be valid), is valid or not. its very important because in prasangika we find that it is, whereas in sautrantika it is not at all valid to establish "car" with a book. this is extremely pivotal to prasangika's explanation of imputation, because it illustrates that there are no findable characteristics waiting around from which categories are derived at correctly or incorrectly--as long as something appears, it is valid. what makes something invalid is the conceived object (for a conceptual consciousness) and whether it withstands scrutiny in reality. inherent existence as an appearing object is valid, but the conceived object of inherent existence which this appearing object contributes to shaping is the very object of negation in realizing emptiness. if one says that "car" here is in no way valid, then they are saying that there is some findable characteristic outside of mere imputation which at that time has set forth the boundaries as to what is or is not a valid mind 5heaps you have already conceded that it is incorrect to term an appearing object as "valid". You originally said, "nevertheless the car is valid" this is what I objected to. I am not going to keep going back and forth but it seems you are conflating this claim of yours with prasangikas special presentation with regard real and unreal conventional truths. Since Prasangika does not accept existence by way of their own character even conventionally, they do not posit real and unreal conventionalities (i.e. this as real, that as unreal) even conventionally. While for Svatantrika since for them conventionally phenomena exist by way of their own character, they can posit real and unreal conventionalities. There is however in Prasangika, a presentation of the division of conventional truth into real and unreal based on worldly ordinary consciousness. In terms of the your quote referring to "direct" - I have written on the special presentation of "direct" in prasangika in another thread. I'm not sure I have much else to say on this topic. Last edited by Tom on Sat Dec 29, 2012 8:03 pm, edited 1 time in total. 5heaps wrote:yes, but that is not what is being questioned ie. whether the cognition overall may be counted as valid or notwhat is being questioned is whether "car" imputed onto a book, this part itself (the appearing object, not the involved object, or the conceived object which conceives the involved object to be valid), is valid or not. its very important because in prasangika we find that it is, whereas in sautrantika it is not at all valid to establish "car" with a book. this is extremely pivotal to prasangika's explanation of imputation, because it illustrates that there are no findable characteristics waiting around from which categories are derived at correctly or incorrectly--as long as something appears, it is valid. what makes something invalid is the conceived object (for a conceptual consciousness) and whether it withstands scrutiny in reality. inherent existence as an appearing object is valid, but the conceived object of inherent existence which this appearing object contributes to shaping is the very object of negation in realizing emptiness. if one says that "car" here is in no way valid, then they are saying that there is some findable characteristic outside of mere imputation which at that time has set forth the boundaries as to what is or is not a valid mind Surely if the appearing object is conventionally labelled as a "book" then it cannot also be valid to give it the conventional label "car". we cannot get rid of God because we still believe in grammar - Nietzsche Tom wrote:5heaps you have already conceded that it is incorrect to term an appearing object as "valid". You originally said, "nevertheless the car is valid" this is what I objected to. I am not going to keep going back and forth but it seems you are conflating this claim of yours with prasangikas special presentation with regard real and unreal conventional truths. actually as berzin said the appearance is valid. car itself is valid, even the nonconceptual cognition of a unicorn as an appearance is valid, this is entirely the point. NONE OF THESE THINGS is what qualifies that a perception is invalid. there are no valid perceptions at all (except for emptiness), there are only perceptions of the direct (and a nonconceptual cognition of a unicorn or a book called a car are perceptions of the direct ie. direct appearances). you say imputing car on a book is invalid because books dont fit into the the category car, but this is completely mistaken in prasangika and fails to understand it. how prasangika changes the meaning of direct and indirect greatly simplifies things actually futerko wrote:Surely if the appearing object is conventionally labelled as a "book" then it cannot also be valid to give it the conventional label "car". the appearing object of a conceptual consciousness is the mental image/category that is imputed. the book is the external object car is the appearing object...according to sautrantika what makes this an invalid/mistaken perception is that the appearing object and the mind which 'generated' it was so far away from correctly realizing the appearing characteristics of the book that it necessarily produced an invalid appearance of for example a car (could have been anything else, depending on the person, karma, etc). in other words the only way that a person could think "car" with respect to the self-existently appearing characteristics of the book is to misperceive those characteristics in the first place (whether it is dim lighting, confusion, doubt, etc, the mind is blocked from stably ascertaining what is really out there). 5heaps wrote:you say imputing car on a book is invalid because books dont fit into the the category car No, I said that "car" is not a correct designation for three reasons and then I said that you were incorrect when you said the "car" is valid. The problem is you are stuck in a wrong paradigm. Even it you flip your position from arguing for the car being valid to arguing (as you are doing now) against an imaginary opponent asserting that this appearance to the mind is invalid. You have applied the terms valid and invalid to the object and this implies it is being referenced to something else which is the very thing you are arguing against and opposite to the point you are trying to make. Geshe Lobsang Gyatso wrote a brilliant text on all this and I think it is the only specifically Prasangkika presentation - unfortunately it is only in Tibetan at present. "the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate" 5heaps wrote:No, I said that "car" is not a correct designation for three reasons and then I said that you were incorrect when you said the "car" is valid. no, you didnt. you said you didnt know any way in which "car" is valid. it has already been explained to you that the appearing object car when imputed onto a book is valid/accurate appearance. a hallucinated unicorn as the appearing object of a nonconceptual eye consciousness is also a valid appearance. that the unicorn as an object of operation or a car as the conceived object is not valid is what it means when Chandrakirti explains that it must "accords with worldly convention". it does not mean that 'car' is not valid "the cognition of a hallucinated unicorn as a hallucinated unicorn is accurate" This is quite different to what you were asserting. The equivalent to your claim would be "the unicorn is valid". In any case as Futerko pointed out Berzin was clear from the start that unicorns are not objects of valid cognitions. Your assertions and Berzin's explanations are worlds apart. Here Berzin is clearly talking about a cognition, and further he also qualifies the object as a hallucinated unicorn. In any case our subject was not a mind that knows a hallucination, it was not even a mind mistaken with regard to a hallucination, nor was it a misapprehension of rope as snake but someone being silly and calling a book a "car." 5heaps wrote:no, you didnt. you said you didnt know any way in which "car" is valid. it has already been explained to you that the appearing object car when imputed onto a book is valid/accurate appearance. a hallucinated unicorn as the appearing object of a nonconceptual eye consciousness is also a valid appearance. Actually if you re-read the posts I was the one to explain that for prasangika all minds are valid with regard to their appearing objects even for wrong consciousness but as I mentioned back then this does not support your odd claim that the "car" is valid (see the point re: Berzin above). 5heaps wrote:that the unicorn as an object of operation or a car as the conceived object is not valid is what it means when Chandrakirti explains that it must "accords with worldly convention". it does not mean that 'car' is not valid [/quote] Actually, in fact what Candrakirti is doing with such statements is ripping the rug from underneath such dharmakirtian epistemology!
{ "pile_set_name": "Pile-CC" }
Edward Snowden, the former National Security Agency contractor who leaked secrets about widespread surveillance, has spoken to the press for the first time since getting asylum in Russia. New York Times reporter James Risen talked to the whistleblower through "encrypted online communications" over the course of the last week. Snowden maintained that his leaks helped, rather than hurt, US security. “The secret continuance of these programs represents a far greater danger than their disclosure,” he told the paper. Snowden went on to insist that the documents were leaked only to journalists, and there was a "zero percent chance" any had fallen into the hands of the Russian or Chinese governments. Currently, Snowden said the documents are in the hands of the journalists he has worked with, and he doesn't even have a copy of any of them. Snowden wanted to be "divorced from the decision-making of publication," he said. "Technical solutions were in place to make sure the work of the journalists couldn't be interfered with." He also disputed a negative note in his CIA personnel file that was reported last week in the NYT. Snowden said that negative notation was the result of a "petty e-mail spat" with a senior manager. The retaliation for this petty spat was one of the things that convinced Snowden to become a leaker and persuaded him that seeking change from the inside would prove futile. Any efforts at reporting wrongdoing “would have been buried forever,” he told the NYT, and Snowden would “have been discredited and ruined.” He added “the system does not work” since “you have to report wrongdoing to those most responsible for it.” The decision to take action built up gradually, he said. Snowden finally chose to leak after seeing an inspector general's report on the warrantless wiretapping program, he told the Times. The report was from 2009, but Snowden wouldn't say when he read it. "[P]rograms that are implemented in secret, out of public oversight, lack... legitimacy, and that’s a problem," he said. "It also represents a dangerous normalization of ‘governing in the dark,’ where decisions with enormous public impact occur without any public input.”
{ "pile_set_name": "OpenWebText2" }
Q: GInfoWindow maxContent dependent on the currently selected tab I'm using Google Maps API to display a map and some markers on it. When the user clicks a marker, I use the openInfoWindowTabsHtml of my GMap2 object to display the little balloon, with tabs. I also pass in a maxContent to openInfoWindowTabsHtml, so the baloon becomes maximizable. Now my problem is, I would like the maximized content to depend on the currently selected tab (basically my maximized content is an extended version of the "short content" I display in the balloon). I don't really see a way to do that though. I was thinking to catch the maximizeclick event on the info window, and modify the maxContent, just before it gets maximized. But how to modify the maxContent? Any ideas? A: What I did in the end was to use tabbedmaxcontent.js from the open source library gmaps-utility-library - http://code.google.com/p/gmaps-utility-library - so the maximized balloon has tabs as well.
{ "pile_set_name": "StackExchange" }
[Correlation between clinical pathologic factors and enzymatic activity of orotate Phosphoribosyl transferase (OPRT), Dihydropyrimidine dehydrogenase (DPD) and Thymidylate synthase (TS) in colorectal cancer]. Orotate Phosphoribosyl Transferase (OPRT), Dihydropyrimidine dehydrogenase (DPD) and Thymidylate synthase (TS) are initial key enzymes in the 5-FU metabolic pathway. In this study, we measured the activities of OPRT, DPD and TS. We also investigated the correlation between these 3 enzymatic activities and the clinical pathologic factors (Histological typing, extent of tumor invasion,extent of metastasis to the lymph nodes,stage, lymphatic invasion and venous invasion). We had surveyed 79 cases of colorectal cancers surgically removed. Poorly-differentiated adenocarcinoma showed a tendency to lower OPRT and higher DPD, as compared to moderately or well-differentiated adenocarcinomas. In case with metastasis to lymph nodes, OPRT showed a tendency to lower activities, but a significant difference was not noticed. TS showed no relation to any of these pathologic factors. In each application of 5-FU, measuring the activities of these three enzymes is important for estimation of the antitumoral effect. With poorly-differentiated adenocarcinoma, it is estimated that many cases would show high DPD and if the enzyme activities can not be measured, so administration of TS-1, which includes DPD inhibitor, may be considered.
{ "pile_set_name": "PubMed Abstracts" }
2020 Audi A6 Wagon Pictures The all-new 2020 Audi S6 is accessible to booty Canadian anchorage by storm. This midsize achievement auto appearance a new twin-turbocharged, 2.9-litre TFSI V6 agent developed accurately to aftermath a added ambit of torque back accumulated with an electric compressor powered by a 48-volt balmy amalgam system. 2020 Audi A6 Wagon Speed Test | 2020 Audi A6 Wagon Want some numbers? Here you go: 444 horsepower, 443 pound-feet of torque and dispatch from 0-60 mph (96 km/h) in 4.4 seconds. In case you didn’t realize, it’s the above affair you get with the latest Audi RS models. With a acknowledgment time beneath 250 milliseconds and a best acceleration of 70,000 rpm, the above electric ability compressor pre-empts turbo lag, enabling actual admiration in any alive situation. Photo: Audi 2020 Audi A6 Wagon Prices | 2020 Audi A6 Wagon New for 2020, the Audi S6 comes accepted with an eight-speed Tiptronic automated manual that is adapted for the low-end torque of the V6 engine, additional quattro all-wheel drive featuring alive torque administration to both axles. In accustomed driving, the arrangement delivers 60 percent of the torque to the rear arbor and 40 percent to the front. However, back needed, ability can be redirected to the adverse axle, with up to 70 percent of torque to the advanced or up to 85 percent to the rear axle. The Action amalgamation adds a quattro action cogwheel and four-wheel council for above cornering activity and a added activating alive experience. A action bankrupt and red anchor calipers are additionally included. This amalgamation can be accumulated with the accessible action abeyance that uses adaptive dampers so drivers can accept amid a adventurous or adequate ride. The exoteric of the 2020 Audi S6 is differentiated by LED Matrix headlights as able-bodied as adventurous architecture elements including S-model bumpers, a platinum double-slat Singleframe grille and aluminum exoteric ancillary mirrors. Additionally, the advanced splitter makes the car attending wider, while four S-specific tailpipes and a diffuser applique in matte atramentous chrome accord ability to the rear. Caster choices accommodate 20- and 21-inch designs captivated in summer achievement tires. When it goes on auction ancient in the abutting few weeks, the 2020 Audi S6 will accompany the abject A6 auto (MSRP of $68,200) and the adventure-ready A6 allroad, which is a cast new addition. Pricing has yet to be announced. 2020 Audi A6 Wagon Price | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Review | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Redesign | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Rumors | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Price, Design and Review | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Price and Release date | 2020 Audi A6 Wagon 2020 Audi A6 Wagon Release Date and Concept | 2020 Audi A6 Wagon Find out the most recent images of 2020 Audi A6 Wagon Pictures here, and also you can get the image here simply image posted uploaded by admin that saved in our collection. This image is provided only for personal use. If you found any images copyrighted to yours, please contact us and we will remove it. We don't intend to display any copyright protected images.
{ "pile_set_name": "Pile-CC" }
UPDATE: Saying they are too old to prosecute, a judge on Monday dismissed 305 of the criminal charges against former Harrisburg Mayor Stephen R. Reed. Senior Judge Kevin A. Hess' ruling takes all of the charges that relate directly to Reed's actions as mayor off the table. Hess refused, however, to dismiss another 144 charges, most involving accusations that Reed, 66, stole historical artifacts that were purchased by the city. The state attorney general's office could appeal Hess' ruling to the state Superior Court. Henry Hockeimer Jr., one of Reed's attorneys, praised the judge's decision. "We are pleased with the ruling," Hockeimer said. "This was an ill-conceived prosecution from the start and we look forward to vigorously contesting the remaining charges at trial." Read the judge's opinion:
{ "pile_set_name": "OpenWebText2" }
Effects of prenatal alcohol exposure on uncoupling protein in brown adipose tissue in neonatal rats. Thermoregulatory deficits observed in neonatal rats exposed prenatally to alcohol may be due to peripheral and/or central dysfunction. One of the major mechanisms available to newborn mammals to generate heat is "nonshivering thermogenesis" in brown adipose tissue (BAT). In this study, the effects of prenatal alcohol exposure on the functional status of brown adipose tissue was assessed by immunoblot analysis of the content of mitochondrial uncoupling protein (UCP). BAT excised from 1- and 20-day-old male and female offspring from either alcohol-treated, pair-fed controls or standard control dams were analyzed. There were no effects of prenatal alcohol exposure on the UCP content. There was, however, a significant increase due to age. These results suggest that thermoregulatory deficits seen in alcohol-exposed offspring are not due to a deficiency in the concentration of mitochondrial UCP, and indicate a more central mechanism.
{ "pile_set_name": "PubMed Abstracts" }
<?xml version="1.0" encoding="utf-8"?> <android.support.design.widget.CoordinatorLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:fitsSystemWindows="true" tools:context="sg.vp.owasp_mobile.OMTG_Android.OMTG_CODING_003_Best_Practice"> <android.support.design.widget.AppBarLayout android:layout_height="wrap_content" android:layout_width="match_parent" android:theme="@style/AppTheme.AppBarOverlay"> <android.support.v7.widget.Toolbar android:id="@+id/toolbar" android:layout_width="match_parent" android:layout_height="?attr/actionBarSize" android:background="?attr/colorPrimary" app:popupTheme="@style/AppTheme.PopupOverlay" /> </android.support.design.widget.AppBarLayout> <include layout="@layout/content_omtg__coding_003__best__practice" /> <android.support.design.widget.FloatingActionButton android:id="@+id/fab" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_gravity="bottom|end" android:layout_margin="@dimen/fab_margin" android:src="@android:drawable/ic_dialog_email" /> </android.support.design.widget.CoordinatorLayout>
{ "pile_set_name": "Github" }
Q: Does the order of columns in a query matter? When selecting columns from a MySQL table, is performance affected by the order that you select the columns as compared to their order in the table (not considering indexes that may cover the columns)? For example, you have a table with rows uid, name, bday, and you have the following query. SELECT uid, name, bday FROM table Does MySQL see the following query any differently and thus cause any sort of performance hit? SELECT uid, bday, name FROM table A: The order doesn't matter, actually, so you are free to order them however you'd like. edit: I guess a bit more background is helpful: As far as I know, the process of optimizing any query happens prior to determining exactly what subset of the row data is being pulled. So the query optimizer breaks it down into first what table to look at, joins to perform, indexes to use, aggregates to apply, etc., and then retrieves that dataset. The column ordering happens between the data pull and the formation of the result set, so the data actually "arrives" as ordered by the database, and is then reordered as it is returned to your application.
{ "pile_set_name": "StackExchange" }
Alors que disparaît le dernier "découvreur" de la grotte de Lascaux, nous vous proposons de relire l'article de Bernadette Arnaud, grande reporteure à Sciences et Avenir : "Lascaux, la colline sanctuarisée" a été initialement publié dans le numéro 838 de Sciences et Avenir. Simon Coencas était notamment revenu en Dordogne fin 2016 pour l'inauguration, au côté du président François Hollande, du Centre International de l'Art Pariétal - plus communément appelé "Lascaux 4" - réplique intégrale à l'identique de Lascaux. Adolescent, il faisait partie du groupe de quatre jeunes gens qui avait découvert la célèbre grotte de Dordogne. Il est décédé à Paris où il résidait, ce dimanche 2 février 2020, a indiqué à l'AFP, Thierry Félix, historien spécialiste de Lascaux et proche de M. Coencas, qui a été informé du décès par la famille du nonagénaire. Lascaux, "chapelle Sixtine de la Préhistoire" Le 12 septembre 1940, avec trois copains âgés de 18 à 15 ans, Marcel Ravidat, Georges Agniel et Jacques Marsal, Simon Coencas, 13 ans à l'époque, avait découvert la grotte de Lascaux, en "explorant un trou" cachant une cavité, sur la colline boisée dominant le village de Montignac (Dordogne). Le "trou" allait se révéler une grotte ornée, des peintures réalisées il y a environ 18.000 ans et classées depuis 1979 au Patrimoine mondial de l'Unesco, un chef d'œuvre souvent qualifié de "Chapelle Sixtine de la Préhistoire". A l'origine de la découverte, il y avait le chien de Marcel Ravidat : le dénommé Robot était tombé en arrêt devant un trou profond sur la colline de Lascaux. Le jeune homme était revenu l'explorer quatre jours plus tard, tombant en chemin sur trois jeunes du coin qui décidèrent de l'épauler. "Avec ma petite bande, nous cherchions le souterrain du vieux château voisin. Nous espérions trouver un trésor. Nous en avons trouvé un mais pas celui que l'on croyait", racontait fin 2016 Simon Coencas, dans un entretien à l'AFP. Eclairés par une lampe-pigeon, ils progressèrent peu à peu "et à un moment nous sommes tombés sur la salle des taureaux", racontait-il alors. "Une merveille. Si grande, si impressionnante (...) Nous étions affolés. Nous nous sommes dit ce n'est pas possible de découvrir une chose pareille!". Les quatre compères décidèrent d'abord de garder le secret, "mais finalement tout le monde a bavardé". L'instituteur local, féru d'archéologie, fut d'abord sceptique mais en allant voir la grotte, "il est tombé des nues". La communauté archéologique fut alertée, et l'abbé Breuil, préhistorien renommé et professeur au Collège de France, visitait la grotte dès le 21 septembre. Les amis de Montignac Des trois autres "découvreurs" de Lascaux, Jacques Marsal était décédé en 1989, Marcel Ravidat en 1995, et Georges Agniel en 2012. MM. Agniel, Coencas et Ravidat, avaient reçu en 1991 la médaille de chevalier de l'Ordre national du mérite. Simon Coencas, dont les parents étaient des Juifs d'origine grecque établis à Paris, vivait en 1940 à Montignac, qu'il quitta peu de temps après la découverte. Ses parents sont morts en déportation, à laquelle lui-même échappa de justesse, bien qu'interné brièvement au camp de Drancy. Après la guerre, il se maria, eu trois enfants, et devint ferrailleur. Ci-dessus, un reportage de Valentine Delattre à Lascaux 4 filmé en 2019 pendant le premier Voyage du Savoir organisé par Sciences et Avenir et parrainé par Yves Coppens. Thierry Félix, enseignant-chercheur passionné de Lascaux, avait réuni en 1986 à Montignac, pour la première fois depuis 1940, les quatre "adolescents" qui ne s'étaient jamais retrouvés tous ensemble. Il est resté en "relation étroite" avec le quatuor, notamment Simon Coencas, qui revenait "souvent" à Lascaux. Le directeur de "Lascaux 4" s'est dit dimanche "très ému" par la disparition de M. Coencas. Il s'est rappelé "de ses yeux qui brillaient" lorsqu'il pénétra en 2016 dans la réplique à l'identique : humidité, odeurs, clair-obscur compris. "Il s'était écrié : J'y suis !, comme retrouvant une émotion, son univers d'enfant, d'adolescent. C'était un intense moment d'émotion pour tout le monde", a déclaré André Bardé à l'AFP. La grotte originale de Lascaux, menacée par une prolifération de champignons, d'algues vertes, due à l'afflux de visiteurs, est fermée au public depuis 1963. Lascaux 4 a franchi en 2019 le cap du million de visiteurs en moins de trois ans. Une première réplique (contenant environ 80% des fresques), "Lascaux 2", a accueilli depuis 1983 environ plus de 200.000 visiteurs par an. Et une exposition itinérante, "Lascaux 3", qui reproduit une partie de la grotte, sillonne le monde depuis 2012 et enregistrant à ce jour plus de 2 millions de visiteurs.
{ "pile_set_name": "OpenWebText2" }
[link] Not on Deviant art much, all questions in F.A.Q. or on CanadaCosplay siteThis is one of the winning hats from the 2012 Hat contest!My artistic interpretation of the entrants image for a Demonic skull mask style hat with a stylized grinning mouth just sitting above the wearers own mouth. Wears like a helmet or a mask and covers three quarters of the face. Very fun and difficult pattern that will hopefully open up my imagination to en entirely new way of making mats. This helm style is pretty cool.-----------------------------------------Hat Features: Interior Brim The CanadaCosplay interior brim pattern allows for the exciting shapes with the seamless look while still retaining functionality. Helm Style hat Extra long hat fits more like a "Helm" then a hat, like a mask. Eye Holes Designed to be worn over your eyes, angled demonic cut outs for visibility Stylized facial features Incredibly difficult to pattern details at the bottom of the hat, teeth and fangs that sit at nose level. No seams behind the horns No cut-off seams on the back of the horns, allow for a pleasing attached (not cheap!) look. Horns tilt forward I design my patterns for horns to defy the "side seam" and counter-angle the tilt. This allows for more animal accurate forward horn tilt and a better silhouette and visibility when wearing
{ "pile_set_name": "Pile-CC" }
Slideshow ( 2 images ) LISBON (Reuters) - A Portuguese court jailed a British pensioner couple for eight years on Thursday for smuggling nine kilos of cocaine into Europe in their luggage on a luxury cruise from the Caribbean. Roger Clarke, 72, and Sue Clarke, 71, a married couple from the southern English county of Kent, were arrested in December after Portuguese authorities found cocaine in their suitcases while their cruise ship MC Marco Polo was docked in Lisbon. The arrests came after a tip-off from British authorities. The judge said the court had taken into consideration not only the “devastating effects (of cocaine) on people’s lives” but also Portugal being often used as a major entry point for cocaine and other drugs to Europe. “(The couple) only accepted to do it because of high profits” from drug trafficking, the judge said. The couple had previously been convicted of a similar crime in Norway. The suitcases were brought to Lisbon from the Caribbean island of St Lucia and were found inside the couple’s cruise cabin. The judge said the couple was “fully aware” the cocaine was inside the suitcases. Holding hands and crying, the pensioners, who claim they were tricked into smuggling the drugs, said they want people to know the “real story” but did not make any further declarations to reporters. The couple’s lawyer Susana Paisana told reporters she would consider appealing the sentence, but for now the couple will remain in jail in Lisbon. The court did not find any reason why they should be expelled from Portugal to their home country.
{ "pile_set_name": "OpenWebText2" }
565 S.E.2d 530 (2002) 255 Ga. App. 347 WORMLEY v. The STATE. No. A02A0729. Court of Appeals of Georgia. May 10, 2002. Joseph S. Rhymer, Loganville, for appellant. W. Kendall Wynne, Jr., Dist. Atty., Alan A. Cook, Asst. Dist. Atty., for appellee. MIKELL, Judge. Neil Wormley was indicted for two counts of child molestation and one count of public indecency. After a bench trial, he was convicted of both child molestation counts and acquitted of public indecency. Wormley appeals from the denial of his motion for new trial, challenging only the sufficiency of the evidence. We affirm. On appeal, we do not reweigh the evidence but view it in a light most favorable to the verdict. Cochran v. State, 248 Ga. App. 705, 548 S.E.2d 417 (2001). The verdict must be upheld if any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979). Viewed most favorably to the verdict, the evidence shows that on July 4, 2000, the victims, two girls aged nine and ten, went swimming together in the lake at Matthews Park in Monroe while their families picnicked nearby. The girls were accompanied by a 13-year-old boy named Jacob, whose mother was a friend of the older girl's family. The girls testified that a stranger, subsequently identified as Wormley, approached them and asked for their names, addresses, telephone numbers, and whether they had websites. The children testified that they did not answer the man truthfully because they had been told not to talk to strangers. During the conversation, the older child felt something like a single finger touch the front of her thigh at least five times. The younger girl testified that she felt the palm of a hand swipe her knees three or four *531 times. Wormley's arms were under the water, so the children could not see his hands. While this was happening, the younger child testified, Wormley would duck under the water, emerge, and say he was sorry. The children testified that at Jacob's insistence, they tried to swim away from Wormley, but he followed them. The girls got out of the lake and went over to the older child's parents, but they did not mention Wormley at that time. Later, they went swimming again. The older girl testified that Wormley came up behind her, and she felt a hand "thumping" the lower part of her spine. The child left the water and told her mother. The child's father went running down to the water and saw Wormley floating on his stomach in the shallow end. Wormley was naked, and his swim trunks were lying on shore approximately 30 feet away. The father got the trunks and told Wormley to get dressed, but when Wormley tried to stand up unclothed, the father hit him. Wormley did not resist; he put his trunks on in the water and exited the lake. The older girl's grandparents, who witnessed this incident, testified that Wormley had an erection. Wormley testified that he had recently separated from his wife and was living out of his truck. He claimed that he enjoyed engaging in conversation with young girls and that he touched these girls accidentally. He offered no explanation for his erection, however. Moreover, when the prosecutor asked Wormley whether it was conceivable that he touched the girls for an inappropriate purpose, he replied, "I used to think that maybe I had a thing for younger women." Wormley claimed, however, that he found out after having a daughter that he had "no problems that way." "A person commits the offense of child molestation when he or she does any immoral or indecent act to or in the presence of or with any child under the age of 16 years with the intent to arouse or satisfy the sexual desires of either the child or the person." OCGA § 16-6-4(a). Wormley argues that the state failed to prove that he engaged in any "immoral or indecent" act within the meaning of the statute because the girls did not know that he was naked or had an erection while he was touching them. We disagree. The fact that the murky lake water obscured Wormley's state of sexual arousal is irrelevant. Immoral or indecent acts constituting child molestation refer to acts "generally viewed as morally indelicate or improper or offensive, ... [and] which offend against the public's sense of propriety." (Citation and punctuation omitted.) Chapman v. State, 170 Ga.App. 779, 780(1), 318 S.E.2d 213 (1984). "As explained in Chapman, the Georgia law against child molestation ... afford[s] protection to a child's body in those cases where the act or acts are more suggestive of sexually oriented misconduct than simply assaultive in nature." Smith v. State, 178 Ga.App. 300, 301(1), 342 S.E.2d 769 (1986). The testimony in the case at bar supports the conclusion beyond a reasonable doubt that Wormley's actions, including touching the girls, following them, and asking them personal questions, were "immoral or indecent" within the meaning of OCGA § 16-6-4(a). In addition, the evidence was more than sufficient for the trier of fact to conclude that Wormley touched the children with the intent to arouse his sexual desires. See, e.g., Arnold v. State, 249 Ga.App. 156, 158(1)(a), 545 S.E.2d 312 (2001) ("Intent, which is a mental attitude, is commonly detectable only inferentially, and the law accommodates this."). Judgment affirmed. ANDREWS, P.J., and PHIPPS, J., concur.
{ "pile_set_name": "FreeLaw" }
Q: Trigger on ContentDocument showing identical values for Trigger.old and Trigger.new I have a simple trigger designed to prevent updating the metadata for an existing ContentDocument but it's not working. Example code: trigger ContentDocument_PreventUpdate on ContentDocument (before update) { for ( ContentDocument oldCd : Trigger.old ){ ContentDocument newCd = Trigger.newMap.get(oldCd.Id); System.debug('oldCd.Title: ' + oldCd.Title); System.debug('oldCd.Description: ' + oldCd.Description); System.debug('newCd.Title: ' + newCd.Title); System.debug('newCd.Description: ' + newCd.Description); if ( oldCd.Title != newCd.Title || oldCd.Description != newCd.Description ){ oldCd.addError('You do not have permission to edit this record.'); } } } If I update a ContentDocument's title and description, the values are showing in the debug logs as identical between Trigger.old (oldCd variable) and Trigger.new (newCd variable). Am I missing something obvious here? A: Moving the trigger to ContentVersion resolved the issue. Example code: trigger ContentVersion_PreventUpdate on ContentVersion (before update) { for ( ContentVersion oldCv : Trigger.old ){ ContentVersion newCv = Trigger.newMap.get(oldCv.Id); if ( oldCv.Title != newCv.Title || oldCv.Description != newCv.Description ){ newCv.addError('You do not have permission to edit this record.'); } } }
{ "pile_set_name": "StackExchange" }
Around 1,000 kilometres north-east of Perth, in the northern Goldfields, lies the unique town of Leinster — where everyone has a job, free housing, and free access to the gym and local swimming pool. With next to no crime, no mortgages, leafy tree-lined streets and a thriving community, Leinster is truly an oddity of the outback. "It is the oasis in the desert," said Naomi Maher, who moved there with her family two years ago for her husband's mining job. "When you fly in and out all you can see is this abundance of trees [in the desert] and that's when you know you're at Leinster." Leinster was founded in 1976 because of mining nearby, and today it is a 'closed town' — home to around 500 permanent residents. That means that in order to live in Leinster, you need to be an employee or contractor of global mining company BHP. Naomi Maher first arrived in Leinster two years ago with her family and says she loves living there. ( ABC News: Tom Joyner ) Among other amenities, the company provides accommodation, a gym and swimming pool to its residents for free, as well as a supermarket and cafe. "You can only live here if you work here. We all work together so we all know each other," Ms Maher said. "We're very fortunate … BHP does everything for us, they do our maintenance — everything." Since moving to Leinster, Ms Maher has thrown herself into the community, volunteering with the school and day care on top of her job at the local contracting services hub. "Everyone is in the same boat. We're all here just to make a little bit of money before we move on to our real lives," she said. The town with (almost) no crime According to crime statistics published by WA Police, there have only been three offences committed in Leinster since July last year — all of them for stealing. Compare that to a town of similar size like Leonora, a couple of hours south, which recorded 183 over the same period. Unusual for small towns, BHP runs all the town's services and employs all its residents. ( ABC News: Tom Joyner ) So little crime is committed in Leinster that the town's police officer-in-charge, Paul Vargas, is often found assisting police in neighbouring communities or patrolling the highway. "Not a lot happens in Leinster as far as crime goes, or as far as policing services or the requirement for policing services go," Sergeant Vargas said. "Normally it's your low-end stuff. It's your stealings or your trespassing — it's not difficult investigations that you have to conduct." As for why the crime rate is so low, Sergeant Vargas has a theory. "I think there's a strong correlation between employment and crime," he said. "If you look at Leinster it's literally 100 per cent employment. "So people here are here for that purpose, they're here to work. They do work long hours and I think that contributes to the low crime rate." BHP provides leisure, fitness, medical, power and water facilities for residents of Leinster. ( ABC News: Tom Joyner ) Break the law? Expect to be expelled Having said that, because the town is run by BHP — and its residents are employees — if you break the law in Leinster, BHP will decide whether to kick you out. "They have a zero tolerance policy here … for things like violence and theft, anything like that," Ms Maher said. "So you lose your job, you lose your house, you lose all that sort of stuff if you break the law. "And up here everyone knows it. So everyone just follows the rules. And it's such a simple way of living, you just don't do anything wrong and you're fine." Leinster's lush, leafy streets are a far cry from the harsh and arid landscape surrounding it. ( ABC News: Tom Joyner ) Glenn Palman, who works at the nickel mine as a shift supervisor, said pretty much everyone abides by BHP's rules. Like Ms Maher, he said Leinster was a great place to live and raise kids precisely for the reasons that make it so unique. "This town is great for kids. And then to have the freedom of the pool and gym and all the free amenities in town is awesome," he said. "So my kids live in the desert, they live in the bush, but they're probably the best swimmers around compared to kids at suburban schools." In a statement, a spokesperson for BHP's Nickel West said the company was responsible for maintaining the town's facilities, as well as providing essential medical, power and water services. "Providing free access to these facilities is an essential part of supporting a vibrant and enjoyable community — the people who work around Leinster as well as their families," the spokesperson said. They added that while to live in Leinster you must be a mine employee, "short-term accommodation is available for travellers and visitors to the town, who we welcome". 'It's not like it's a holiday' As much as he loves living here, Mr Palman said the town does have its limits. In his case, it's so his kids can have a high school education elsewhere. "The reason why we're leaving town, we've made a decision over the last two weeks. It's quite a dramatic decision," he said. "I would have stayed here a lot longer if it wasn't for my children's friends who are actually at boarding school now." Officer-in-charge of Leinster police station, Paul Vargas, often helps police in neighbouring towns. ( ABC News: Tom Joyner ) Many families in Leinster send their children to board elsewhere in the state once they graduate from primary school. "I personally would have liked to see a bit more emphasis on the high school students here and having a proper teacher or a couple of teachers no matter what the number of students they have in the class," Mr Palman said. But it was never meant to be perfect. According to Ms Maher, most people only stay in Leinster for a few years before they move back to their old lives. "There's nothing fancy up here whatsoever. It's not like you're moving to a five-star beach resort or anything like that," she said. "At the end of the day, if somebody else is paying your rent, by the time we leave here, we'll be in a much better position than we could ever possibly imagine to be if we stayed in Perth. "It's definitely not for everyone. It's a tough lifestyle, it really is. Even though we're all together, everyone still works 12 to 14-hour days. So it's not like it's a holiday."
{ "pile_set_name": "OpenWebText2" }