text
stringlengths
1
3.78M
meta
dict
James Baldwin: A Biography This is a biography of James Baldwin, author, one-time preacher, and civil rights activist. He chose David Leeming, a close friend and colleague, to write his biography and granted him access to his correspondence. Leeming traces his life from his birth in Harlem in 1924 to his self-imposed exile in Europe, his later years as political activist, and his public funeral in 1987. Love in the Time of Cholera From the Nobel Prize-winning author of One Hundred Years of Solitude comes a masterly evocation of an unrequited passion so strong that it binds two people's lives together for more than half a century. In their youth, Florentino Ariza and Fermina Daza fall passionately in love. When Fermina eventually chooses to marry a wealthy, well-born doctor, Florentino is devastated, but he is a romantic. As he rises in his business career, he whiles away the years in 622 affairs - yet he reserves his heart for Fermina. Her husband dies at last, and Florentino purposefully attends the funeral.... Go Set a Watchman Scout (Jean Louise Finch) has returned to Maycomb from New York to visit her father, Atticus. She is forced to grapple with issues both personal and political as she tries to understand both her father's attitude toward society and her own feelings about the place where she was born and spent her childhood. A History of Britain in 21 Women Britain has been defined by its conflicts, its conquests, its men and its monarchs. To say that it's high time it was defined by its women is a severe understatement. Jenni Murray draws together the lives of 21 women to shed light upon a variety of social, political, religious and cultural aspects of British history. In lively prose Murray reinvigorates the stories behind the names we all know and reveals the fascinating tales behind those less familiar. Casino Royale (with Interview) For James Bond and the British Secret Service, the stakes couldn't be higher. 007's mission is to neutralise the Russian operative Le Chiffre by ruining him at the baccarat table, forcing his Soviet masters to 'retire' him. When Le Chiffre hits a losing streak, Bond discovers his luck is in - that is, until he meets Vesper Lynd, a glamorous agent who might yet prove to be his downfall. Days Without End Having signed up for the US Army in the 1850s, aged barely 17, Thomas McNulty and his brother-in-arms, John Cole, go on to fight in the Indian wars and ultimately the Civil War. Orphans of terrible hardships themselves, despite the horrors they both see and are complicit in, they find these days to be vivid. Both an intensely poignant story of two men and the lives they are dealt and a fresh look at some of the most fateful years in America's past. D DAY Through German Eyes: The Hidden Story of June 6th 1944 Almost all accounts of D-Day are told from the Allied perspective, with the emphasis on how German resistance was overcome on June 6, 1944. But what was it like to be a German soldier in the bunkers and gun emplacements of the Normandy coast, facing the onslaught of the mightiest seaborne invasion in history? What motivated the German defenders, what were their thought processes - and how did they fight from one strong point to another, among the dunes and fields, on that first cataclysmic day? A Rising Man Captain Sam Wyndham, former Scotland Yard detective, is a new arrival to Calcutta. Desperately seeking a fresh start after his experiences during the Great War, Wyndham has been recruited to head up a new post in the police force. But with barely a moment to acclimatise to his new life or to deal with the ghosts which still haunt him, Wyndham is caught up in a murder investigation that will take him into the dark underbelly of the British Raj. The Decline and Fall of the Roman Empire Here in a single volume is the entire, unabridged recording of Gibbon's masterpiece. Beginning in the second century A.D. at the apex of the Pax Romana, Gibbon traces the arc of decline and complete destruction through the centuries across Europe and the Mediterranean. It is a thrilling and cautionary tale of splendor and ruin, of faith and hubris, and of civilization and barbarism. Follow along as Christianity overcomes paganism... before itself coming under intense pressure from Islam. Memories, Dreams, Reflections In 1957, four years before his death, Carl Gustav Jung, psychiatrist and psychologist, began writing his life story. But what started as an exercise in autobiography soon morphed into an altogether more profound undertaking. Knots and Crosses 'And in Edinburgh of all places. I mean, you never think of that sort of thing happening in Edinburgh, do you...?' 'That sort of thing' is the brutal abduction and murder of two young girls. And now a third is missing, presumably gone to the same sad end. Detective Sergeant John Rebus, smoking and drinking too much, his own young daughter spirited away south by his disenchanted wife, is one of many policemen hunting the killer. God Is Disappointed in You God Is Disappointed in You is for people who would like to read the Bible...if it would just cut to the chase. Stripped of its arcane language and interminable passages, every book of the Bible is condensed down to its core message, in no more than a few pages each. Written by Mark Russell with cartoons by New Yorker cartoonist Shannon Wheeler, God Is Disappointed in You is a frequently hilarious, often shocking, but always accurate retelling of the Bible, including the parts selectively left out by Sunday School teachers. Hannibal Rising Longlisted for the Audiobook Download of the Year, 2007.Hannibal Lecter emerges from the nightmare of the Eastern Front, a boy in the snow, mute, with a chain around his neck. He seems utterly alone, but he has brought his demons with him. Hannibal's uncle, a noted painter, finds him in a Soviet orphanage and brings him to France, where Hannibal will live with his uncle and his uncle's beautiful and exotic wife, Lady Murasaki. Presenting the essential writings of black lesbian poet and feminist writer Audre Lorde, Sister Outsider celebrates an influential voice in 20th-century literature. In this charged collection of 15 essays and speeches, Lorde takes on sexism, racism, ageism, homophobia, and class and propounds social difference as a vehicle for action and change. Her prose is incisive, unflinching, and lyrical, reflecting struggle but ultimately offering messages of hope. My Brilliant Friend: The Neapolitan Novels, Book 1 A modern masterpiece from one of Italy's most acclaimed authors, My Brilliant Friend is a rich, intense, and generous-hearted story about two friends, Elena and Lila, who represent the story of a nation and the nature of friendship. You Are a Badass: How to Stop Doubting Your Greatness and Start Living an Awesome Life You Are a Badass is the self-help audiobook for people who desperately want to improve their lives but don't want to get busted doing it. In this refreshingly entertaining how-to guide, best-selling author and world-travelling success coach Jen Sincero serves up 27 bite-size chapters full of hilariously inspiring stories, sage advice, easy exercises, and the occasional swear word, helping you to identify and change the self-sabotaging beliefs and behaviours that stop you from getting what you want. The Velvet Rage: Overcoming the Pain of Growing Up Gay in a Straight Man's World The most important issue in a gay man's life is not "coming out", but coming to terms with the invalidating past. Despite the progress made in recent years, many gay men still wonder, "Are we better off?" The byproduct of growing up gay in a straight world continues to be the internalization of shame, rejection, and anger - a toxic cocktail that can lead to drug abuse, promiscuity, alcoholism, depression, and suicide. Kindred Having just celebrated her 26th birthday in 1976 California, Dana, an African-American woman, is suddenly and inexplicably wrenched through time into antebellum Maryland. After saving a drowning white boy there, she finds herself staring into the barrel of a shotgun and is transported back to the present just in time to save her life. During numerous such time-defying episodes with the same young man, she realizes she's been given a challenge.
{ "pile_set_name": "Pile-CC" }
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package unicode import ( "testing" "golang.org/x/text/encoding" "golang.org/x/text/encoding/charmap" "golang.org/x/text/encoding/internal/enctest" "golang.org/x/text/transform" ) func TestBasics(t *testing.T) { testCases := []struct { e encoding.Encoding encPrefix string encSuffix string encoded string utf8 string }{{ e: utf16BEIB, encoded: "\x00\x57\x00\xe4\xd8\x35\xdd\x65", utf8: "\x57\u00e4\U0001d565", }, { e: utf16BEEB, encPrefix: "\xfe\xff", encoded: "\x00\x57\x00\xe4\xd8\x35\xdd\x65", utf8: "\x57\u00e4\U0001d565", }, { e: utf16LEIB, encoded: "\x57\x00\xe4\x00\x35\xd8\x65\xdd", utf8: "\x57\u00e4\U0001d565", }, { e: utf16LEEB, encPrefix: "\xff\xfe", encoded: "\x57\x00\xe4\x00\x35\xd8\x65\xdd", utf8: "\x57\u00e4\U0001d565", }} for _, tc := range testCases { enctest.TestEncoding(t, tc.e, tc.encoded, tc.utf8, tc.encPrefix, tc.encSuffix) } } func TestFiles(t *testing.T) { enctest.TestFile(t, UTF8) enctest.TestFile(t, utf16LEIB) } func BenchmarkEncoding(b *testing.B) { enctest.Benchmark(b, UTF8) enctest.Benchmark(b, utf16LEIB) } var ( utf16LEIB = UTF16(LittleEndian, IgnoreBOM) // UTF-16LE (atypical interpretation) utf16LEUB = UTF16(LittleEndian, UseBOM) // UTF-16, LE utf16LEEB = UTF16(LittleEndian, ExpectBOM) // UTF-16, LE, Expect utf16BEIB = UTF16(BigEndian, IgnoreBOM) // UTF-16BE (atypical interpretation) utf16BEUB = UTF16(BigEndian, UseBOM) // UTF-16 default utf16BEEB = UTF16(BigEndian, ExpectBOM) // UTF-16 Expect ) func TestUTF16(t *testing.T) { testCases := []struct { desc string src string notEOF bool // the inverse of atEOF sizeDst int want string nSrc int err error t transform.Transformer }{{ desc: "utf-16 IgnoreBOM dec: empty string", t: utf16BEIB.NewDecoder(), }, { desc: "utf-16 UseBOM dec: empty string", t: utf16BEUB.NewDecoder(), }, { desc: "utf-16 ExpectBOM dec: empty string", err: ErrMissingBOM, t: utf16BEEB.NewDecoder(), }, { desc: "utf-16 dec: BOM determines encoding BE (RFC 2781:3.3)", src: "\xFE\xFF\xD8\x08\xDF\x45\x00\x3D\x00\x52\x00\x61", sizeDst: 100, want: "\U00012345=Ra", nSrc: 12, t: utf16BEUB.NewDecoder(), }, { desc: "utf-16 dec: BOM determines encoding LE (RFC 2781:3.3)", src: "\xFF\xFE\x08\xD8\x45\xDF\x3D\x00\x52\x00\x61\x00", sizeDst: 100, want: "\U00012345=Ra", nSrc: 12, t: utf16LEUB.NewDecoder(), }, { desc: "utf-16 dec: BOM determines encoding LE, change default (RFC 2781:3.3)", src: "\xFF\xFE\x08\xD8\x45\xDF\x3D\x00\x52\x00\x61\x00", sizeDst: 100, want: "\U00012345=Ra", nSrc: 12, t: utf16BEUB.NewDecoder(), }, { desc: "utf-16 dec: Fail on missing BOM when required", src: "\x08\xD8\x45\xDF\x3D\x00\xFF\xFE\xFE\xFF\x00\x52\x00\x61", sizeDst: 100, want: "", nSrc: 0, err: ErrMissingBOM, t: utf16BEEB.NewDecoder(), }, { desc: "utf-16 dec: SHOULD interpret text as big-endian when BOM not present (RFC 2781:4.3)", src: "\xD8\x08\xDF\x45\x00\x3D\x00\x52\x00\x61", sizeDst: 100, want: "\U00012345=Ra", nSrc: 10, t: utf16BEUB.NewDecoder(), }, { // This is an error according to RFC 2781. But errors in RFC 2781 are // open to interpretations, so I guess this is fine. desc: "utf-16le dec: incorrect BOM is an error (RFC 2781:4.1)", src: "\xFE\xFF\x08\xD8\x45\xDF\x3D\x00\x52\x00\x61\x00", sizeDst: 100, want: "\uFFFE\U00012345=Ra", nSrc: 12, t: utf16LEIB.NewDecoder(), }, { desc: "utf-16 enc: SHOULD write BOM (RFC 2781:3.3)", src: "\U00012345=Ra", sizeDst: 100, want: "\xFF\xFE\x08\xD8\x45\xDF\x3D\x00\x52\x00\x61\x00", nSrc: 7, t: utf16LEUB.NewEncoder(), }, { desc: "utf-16 enc: SHOULD write BOM (RFC 2781:3.3)", src: "\U00012345=Ra", sizeDst: 100, want: "\xFE\xFF\xD8\x08\xDF\x45\x00\x3D\x00\x52\x00\x61", nSrc: 7, t: utf16BEUB.NewEncoder(), }, { desc: "utf-16le enc: MUST NOT write BOM (RFC 2781:3.3)", src: "\U00012345=Ra", sizeDst: 100, want: "\x08\xD8\x45\xDF\x3D\x00\x52\x00\x61\x00", nSrc: 7, t: utf16LEIB.NewEncoder(), }, { desc: "utf-16be dec: incorrect UTF-16: odd bytes", src: "\x00", sizeDst: 100, want: "\uFFFD", nSrc: 1, t: utf16BEIB.NewDecoder(), }, { desc: "utf-16be dec: unpaired surrogate, odd bytes", src: "\xD8\x45\x00", sizeDst: 100, want: "\uFFFD\uFFFD", nSrc: 3, t: utf16BEIB.NewDecoder(), }, { desc: "utf-16be dec: unpaired low surrogate + valid text", src: "\xD8\x45\x00a", sizeDst: 100, want: "\uFFFDa", nSrc: 4, t: utf16BEIB.NewDecoder(), }, { desc: "utf-16be dec: unpaired low surrogate + valid text + single byte", src: "\xD8\x45\x00ab", sizeDst: 100, want: "\uFFFDa\uFFFD", nSrc: 5, t: utf16BEIB.NewDecoder(), }, { desc: "utf-16le dec: unpaired high surrogate", src: "\x00\x00\x00\xDC\x12\xD8", sizeDst: 100, want: "\x00\uFFFD\uFFFD", nSrc: 6, t: utf16LEIB.NewDecoder(), }, { desc: "utf-16be dec: two unpaired low surrogates", src: "\xD8\x45\xD8\x12", sizeDst: 100, want: "\uFFFD\uFFFD", nSrc: 4, t: utf16BEIB.NewDecoder(), }, { desc: "utf-16be dec: short dst", src: "\x00a", sizeDst: 0, want: "", nSrc: 0, t: utf16BEIB.NewDecoder(), err: transform.ErrShortDst, }, { desc: "utf-16be dec: short dst surrogate", src: "\xD8\xF5\xDC\x12", sizeDst: 3, want: "", nSrc: 0, t: utf16BEIB.NewDecoder(), err: transform.ErrShortDst, }, { desc: "utf-16be dec: short dst trailing byte", src: "\x00", sizeDst: 2, want: "", nSrc: 0, t: utf16BEIB.NewDecoder(), err: transform.ErrShortDst, }, { desc: "utf-16be dec: short src", src: "\x00", notEOF: true, sizeDst: 3, want: "", nSrc: 0, t: utf16BEIB.NewDecoder(), err: transform.ErrShortSrc, }, { desc: "utf-16 enc", src: "\U00012345=Ra", sizeDst: 100, want: "\xFE\xFF\xD8\x08\xDF\x45\x00\x3D\x00\x52\x00\x61", nSrc: 7, t: utf16BEUB.NewEncoder(), }, { desc: "utf-16 enc: short dst normal", src: "\U00012345=Ra", sizeDst: 9, want: "\xD8\x08\xDF\x45\x00\x3D\x00\x52", nSrc: 6, t: utf16BEIB.NewEncoder(), err: transform.ErrShortDst, }, { desc: "utf-16 enc: short dst surrogate", src: "\U00012345=Ra", sizeDst: 3, want: "", nSrc: 0, t: utf16BEIB.NewEncoder(), err: transform.ErrShortDst, }, { desc: "utf-16 enc: short src", src: "\U00012345=Ra\xC2", notEOF: true, sizeDst: 100, want: "\xD8\x08\xDF\x45\x00\x3D\x00\x52\x00\x61", nSrc: 7, t: utf16BEIB.NewEncoder(), err: transform.ErrShortSrc, }, { desc: "utf-16be dec: don't change byte order mid-stream", src: "\xFE\xFF\xD8\x08\xDF\x45\x00\x3D\xFF\xFE\x00\x52\x00\x61", sizeDst: 100, want: "\U00012345=\ufffeRa", nSrc: 14, t: utf16BEUB.NewDecoder(), }, { desc: "utf-16le dec: don't change byte order mid-stream", src: "\xFF\xFE\x08\xD8\x45\xDF\x3D\x00\xFF\xFE\xFE\xFF\x52\x00\x61\x00", sizeDst: 100, want: "\U00012345=\ufeff\ufffeRa", nSrc: 16, t: utf16LEUB.NewDecoder(), }} for i, tc := range testCases { b := make([]byte, tc.sizeDst) nDst, nSrc, err := tc.t.Transform(b, []byte(tc.src), !tc.notEOF) if err != tc.err { t.Errorf("%d:%s: error was %v; want %v", i, tc.desc, err, tc.err) } if got := string(b[:nDst]); got != tc.want { t.Errorf("%d:%s: result was %q: want %q", i, tc.desc, got, tc.want) } if nSrc != tc.nSrc { t.Errorf("%d:%s: nSrc was %d; want %d", i, tc.desc, nSrc, tc.nSrc) } } } func TestUTF8Decoder(t *testing.T) { testCases := []struct { desc string src string notEOF bool // the inverse of atEOF sizeDst int want string nSrc int err error }{{ desc: "empty string, empty dest buffer", }, { desc: "empty string", sizeDst: 8, }, { desc: "empty string, streaming", notEOF: true, sizeDst: 8, }, { desc: "ascii", src: "abcde", sizeDst: 8, want: "abcde", nSrc: 5, }, { desc: "ascii and error", src: "ab\x80de", sizeDst: 7, want: "ab\ufffdde", nSrc: 5, }, { desc: "valid two-byte sequence", src: "a\u0300bc", sizeDst: 7, want: "a\u0300bc", nSrc: 5, }, { desc: "valid three-byte sequence", src: "a\u0300中", sizeDst: 7, want: "a\u0300中", nSrc: 6, }, { desc: "valid four-byte sequence", src: "a中\U00016F50", sizeDst: 8, want: "a中\U00016F50", nSrc: 8, }, { desc: "short source buffer", src: "abc\xf0\x90", notEOF: true, sizeDst: 10, want: "abc", nSrc: 3, err: transform.ErrShortSrc, }, { // We don't check for the maximal subpart of an ill-formed subsequence // at the end of an open segment. desc: "complete invalid that looks like short at end", src: "abc\xf0\x80", notEOF: true, sizeDst: 10, want: "abc", // instead of "abc\ufffd\ufffd", nSrc: 3, err: transform.ErrShortSrc, }, { desc: "incomplete sequence at end", src: "a\x80bc\xf0\x90", sizeDst: 9, want: "a\ufffdbc\ufffd", nSrc: 6, }, { desc: "invalid second byte", src: "abc\xf0dddd", sizeDst: 10, want: "abc\ufffddddd", nSrc: 8, }, { desc: "invalid second byte at end", src: "abc\xf0d", sizeDst: 10, want: "abc\ufffdd", nSrc: 5, }, { desc: "invalid third byte", src: "a\u0300bc\xf0\x90dddd", sizeDst: 12, want: "a\u0300bc\ufffddddd", nSrc: 11, }, { desc: "invalid third byte at end", src: "a\u0300bc\xf0\x90d", sizeDst: 12, want: "a\u0300bc\ufffdd", nSrc: 8, }, { desc: "invalid fourth byte, tight buffer", src: "a\u0300bc\xf0\x90\x80d", sizeDst: 9, want: "a\u0300bc\ufffdd", nSrc: 9, }, { desc: "invalid fourth byte at end", src: "a\u0300bc\xf0\x90\x80", sizeDst: 8, want: "a\u0300bc\ufffd", nSrc: 8, }, { desc: "invalid fourth byte and short four byte sequence", src: "a\u0300bc\xf0\x90\x80\xf0\x90\x80", notEOF: true, sizeDst: 20, want: "a\u0300bc\ufffd", nSrc: 8, err: transform.ErrShortSrc, }, { desc: "valid four-byte sequence overflowing short buffer", src: "a\u0300bc\xf0\x90\x80\x80", notEOF: true, sizeDst: 8, want: "a\u0300bc", nSrc: 5, err: transform.ErrShortDst, }, { desc: "invalid fourth byte at end short, but short dst", src: "a\u0300bc\xf0\x90\x80\xf0\x90\x80", notEOF: true, sizeDst: 8, // More bytes would fit in the buffer, but this seems to require a more // complicated and slower algorithm. want: "a\u0300bc", // instead of "a\u0300bc" nSrc: 5, err: transform.ErrShortDst, }, { desc: "short dst for error", src: "abc\x80", notEOF: true, sizeDst: 5, want: "abc", nSrc: 3, err: transform.ErrShortDst, }, { desc: "adjusting short dst buffer", src: "abc\x80ef", notEOF: true, sizeDst: 6, want: "abc\ufffd", nSrc: 4, err: transform.ErrShortDst, }} tr := UTF8.NewDecoder() for i, tc := range testCases { b := make([]byte, tc.sizeDst) nDst, nSrc, err := tr.Transform(b, []byte(tc.src), !tc.notEOF) if err != tc.err { t.Errorf("%d:%s: error was %v; want %v", i, tc.desc, err, tc.err) } if got := string(b[:nDst]); got != tc.want { t.Errorf("%d:%s: result was %q: want %q", i, tc.desc, got, tc.want) } if nSrc != tc.nSrc { t.Errorf("%d:%s: nSrc was %d; want %d", i, tc.desc, nSrc, tc.nSrc) } } } func TestBOMOverride(t *testing.T) { dec := BOMOverride(charmap.CodePage437.NewDecoder()) dst := make([]byte, 100) for i, tc := range []struct { src string atEOF bool dst string nSrc int err error }{ 0: {"H\x82ll\x93", true, "Héllô", 5, nil}, 1: {"\uFEFFHéllö", true, "Héllö", 10, nil}, 2: {"\xFE\xFF\x00H\x00e\x00l\x00l\x00o", true, "Hello", 12, nil}, 3: {"\xFF\xFEH\x00e\x00l\x00l\x00o\x00", true, "Hello", 12, nil}, 4: {"\uFEFF", true, "", 3, nil}, 5: {"\xFE\xFF", true, "", 2, nil}, 6: {"\xFF\xFE", true, "", 2, nil}, 7: {"\xEF\xBB", true, "\u2229\u2557", 2, nil}, 8: {"\xEF", true, "\u2229", 1, nil}, 9: {"", true, "", 0, nil}, 10: {"\xFE", true, "\u25a0", 1, nil}, 11: {"\xFF", true, "\u00a0", 1, nil}, 12: {"\xEF\xBB", false, "", 0, transform.ErrShortSrc}, 13: {"\xEF", false, "", 0, transform.ErrShortSrc}, 14: {"", false, "", 0, transform.ErrShortSrc}, 15: {"\xFE", false, "", 0, transform.ErrShortSrc}, 16: {"\xFF", false, "", 0, transform.ErrShortSrc}, 17: {"\xFF\xFE", false, "", 0, transform.ErrShortSrc}, } { dec.Reset() nDst, nSrc, err := dec.Transform(dst, []byte(tc.src), tc.atEOF) got := string(dst[:nDst]) if nSrc != tc.nSrc { t.Errorf("%d: nSrc: got %d; want %d", i, nSrc, tc.nSrc) } if got != tc.dst { t.Errorf("%d: got %+q; want %+q", i, got, tc.dst) } if err != tc.err { t.Errorf("%d: error: got %v; want %v", i, err, tc.err) } } }
{ "pile_set_name": "Github" }
- WWE published an article looking at the “20 ridiculous WCW moments you may have missed.” Some of the angles include Hulk Hogan seeing The Ultimate Warrior’s reflection in his mirror, Ric Flair being sent to a mental hospital, Raven taking Kanyon shopping at Versace and Jimmy Hart battling radio shock jock Mancow on pay-per-view. Here is the list:
{ "pile_set_name": "Pile-CC" }
Welcome! Welcome! This blog addresses various emotional aspects of experiencing infertility. It is written by a clinical psychologist who specializes in infertility counseling. Thank you for reading, and best of luck with your journey!
{ "pile_set_name": "OpenWebText2" }
i dont have a step daughter t shirt Crewneck Sweat ... i hate people t shirt Crewneck Sweatshirt zombie Crewneck Sweatshirt i have tattooed daughter t shirt Crewneck Sweatshi ... Women Sweatshirts — what can you expect? If you want to buy a good women sweatshirt online that will last for a while, you’ve come to the right place! With plenty of outstanding designs and a whole array of different custom sweatshirts, we aim to satisfy the needs of even the most demanding customers. So if you want a truly exceptional custom women sweatshirt, our shop has got you covered.. Regardless of which sweatshirt caught your interest the most, we can proudly say that all of them are of truly exceptional quality. Not only do they look great, but they can also warm you up in a matter of minutes. There are countless different designs that you can choose from and all of them are unique and special in their own regard. One thing is certain here — you will spend hours on end in order to find your ideal design. Yes, they’re that good! Another thing that we are proud of is that all of our sweatshirts combine price and value very effectively. Our main goal is to provide superb value for a very reasonable price and that’s exactly what you will find in our shop. With this kind of equation, chances that you will be disappointed with your purchase are very minimal. On the other hand, the chances of getting the best sweatshirt ever are fairly high. The main inspiration for us are our customers — when they are happy, we are happy as well. You can rest assured that we always value your feedback, and we always seek to improve our services. Our sweatshirts may not be “perfect”, but they’re very close, we guarantee! Custom women sweatshirt — many different variations to choose from Getting a proper women sweatshirt online is never easy. Some women may struggle to choose the right size while others can’t find an appropriate design. However, with a vast selection of different custom sweatshirts in our catalog, we aim to change that! All of our sweatshirts come in a variety of different sizes and with truly diverse designs. Is your favorite sweatshirt too short? Maybe you want longer sleeves? Not a problem! Other than choosing the right size for the entire sweatshirt, you can customize the size of separate parts as well. With ArtistShot, you will never have to worry about improper sizes at all. Regardless of whether you prefer strong and prominent color combinations or breathtaking visuals, you can find it all in our shop. Furthermore, you can even customize the themes on your own! So even if some of these default designs are not really your cup of tea, you can tweak them as you like! Flexibility is the key to success, and we aim to maximize it all the time! ArtistShot is undoubtedly the best spot for getting a good women sweatshirt online. You don’t need to spend loads of money to get expensive sweatshirts that you will only wear for a short time. Our sweatshirts are made of high-quality materials, they are customizable, and you can get them for very reasonable prices. We don’t want to provide good sweatshirts — we want to provide the best sweatshirts on the market! So if the quality is your main concern, you are more than welcome to drop by! Our custom women sweatshirt will not only keep your body warm, but they will also make you feel great while wearing them as well. A true win-win scenario! Customer Reviews D Pierogi sweatshirt Dana Damico28 January 2019 Bought this as a gift for my mom... Very pleased with it. And she loves it R Love this sweater! Rachel Mans18 January 2019 I ordered this for my husband for Christmas and it is awesome! My hubby loves it and it was sized right. It also looks really nice; not sloppy like you sometimes get from online orders. C #Amazing Cyndi Rodriguez17 January 2019 Great guys. Got me more than what I wanted. Were excellent in service! S Titleist Sweatshirt Shirley Grasso17 January 2019 Great shirt, size was great fit, material is soft and my fiancé was quite happy with it! H Great Heather Elayan17 January 2019 Bought as a gift for my dad, to go with his new Roush Mustang he just purchased. He loved it! It comes on a regular ol’ (Hanes or Gilden) sweatshirt, but it’s thick, soft, and great quality. Can’t find another one this cool looking on the internet! Shipping was fast also. Would purchase from here again. E Awesomely good fit! Emma Peele17 January 2019 Bought this for my dad who was recently diagnosed, and it was exactly as pictured! Perfect fit and fast shipping. L Great Sweatshirt!! Lisa Lefkowitz16 January 2019 Matches sneakers perfectly! Sweatshirt is good quality and nice weight. C Exceptional product and service! Christian Alexander4 December 2018 I purchased a sweatshirt with the MUSE logo black on white and came with a few stains upon delivery. I contacted ArtistShot and they apologized for the inconvenience and sent me a replacement at no cost! They handled my concern very professionally and fast. The printing is incredible and the Sweatshirt feels very soft. I'd recommend them for your printing needs and I would definitely purchase from them again! C Fast and reliable! Cynthia P27 March 2018 The sweatshirt was fantastic. I ordered the incorrect size and their solution was beyond expectation!
{ "pile_set_name": "Pile-CC" }
North Korea's space agency is celebrating its one-year anniversary with a new logo. And the Wall Street Journal fittingly describes its design in retro-futuristic terms: a "Jetsons-era throwback that captures the optimism of the Space Age." »4/01/14 8:28pm 4/01/14 8:28pm If you want to know the true effect of departed despot Kim Jong-il (and his father Kim Il-Sung), just take a look at this sad, sad picture of North Korea and South Korea at night from space. South Korea is like any other modern country, lit up with life. North Korea is completely dark. »12/19/11 10:40pm 12/19/11 10:40pm
{ "pile_set_name": "Pile-CC" }
// Copyright (c) Microsoft. All rights reserved. // Licensed under the MIT license. See LICENSE file in the project root for full license information. package org.bondlib; import java.io.IOException; import java.lang.reflect.Method; import java.util.Arrays; import java.util.HashMap; import java.util.Map; import java.util.concurrent.ConcurrentHashMap; /** * Partially implements the {@link BondType} contract for generated Bond struct data types. * Leaves the rest of implementation details to generated subclasses specific to the struct type, * which are generated private classes nested within the struct classes. * @param <TStruct> the class of the struct value */ // This API is consumed by codegen, which static analysis isn't aware of. @SuppressWarnings({"unused", "WeakerAccess"}) public abstract class StructBondType<TStruct extends BondSerializable> extends BondType<TStruct> { // The registry of all loaded struct type builders, for generic and non-generic generated struct types. // Entries are added by static initializeBondType methods of the generated struct types which is called // by the static class initializer and can also be called manually if the static class initializer hasn't // completed yet (which happens with circular class dependencies). // // This registry's purpose is to provide an alternative solution to obtain a type descriptor for a struct // type, that can be used when executing generated code initializing fields of struct type descriptors. // An alternative solution is necessary since the user-facing solution of accessing public static fields // BOND_TYPE doesn't work when running as part of initialization of a generated class (the static fields // may not be set yet). Thus, there are two approaches to get a Bond type descriptor for a user-defined // generated struct: // 1. [public-facing API used by all user code] Use the public static field BOND_TYPE which is: // (a) The type descriptor, for struct types that do not declare generic type parameters. or // (b) A builder of type descriptor that takes generic type arguments and returns an instance // of the type descriptor, for struct types that declare generic type parameters. // 2. [private API used only by generated initialization code] Use the protected method getStructType // that returns the type descriptor given the Class and generic type arguments (empty for non-generic // types. This method relies on the registry of struct type builders, and will initialize the class // (thus executing its registration) if necessary. // // Note that #2 doesn't distinguish between generic and non-generic types, by abstracting the type builder // for all types, with empty generic type argument list for non-generic types. On the contrary, #1 has // that distinction since it's intended for public API and needs to be convenient (i.e. it's not elegant // to ask client code to "build" an invariant non-generic type). private static final ConcurrentHashMap< Class<? extends BondSerializable>, StructBondTypeBuilder<? extends BondSerializable>> structTypeBuilderRegistry = new ConcurrentHashMap< Class<? extends BondSerializable>, StructBondTypeBuilder<? extends BondSerializable>>(); private static final String BOND_TYPE_INITIALIZATION_METHOD_NAME = "initializeBondType"; // The global initialization lock, used to initialize type descriptors. // Global locking is necessary to avoid deadlocks when multiple threads initialize generated classes // that reference each other. The contention for this lock is generally not expected to be a problem because: // 1. A lock is acquired only once per type descriptor object when it is actually initialized. This is // achieved by double-checked locking in the ensureInitialized method. // 2. Due to type caching, there is at most one lock acqusition for each type (or each specialization of // a generic type), which is constrained by the application. Note that temporary type descriptors // are used only to lookup the cached equivalent and are themselves not initialized. // This lock is also used to protect schema def initialization, and the same two points above apply. private static final Object initializationLock = new Object(); // set by the constructor (part of the object identity) private final GenericTypeSpecialization genericTypeSpecialization; private final int precomputedHashCode; // set by the initialization method instead of the constructor since may have cyclic dependencies private StructBondType<? super TStruct> baseStructType; private StructField<?>[] structFields; // cached schema def, thread-safe (atomic) read and write from/to memory private volatile SchemaDef schemaDef = null; // indicates whether this instance is initialized, thread-safe (atomic) read and write from/to memory private volatile boolean isInitialized = false; // indicates whether this instance is currently being initialized by the thread holding the global lock; // the flag is used to prevent a thread from re-entering initialization method due to cyclic references private boolean isCurrentlyInitializing = false; /** * Used by generated subclasses to instantiate the type descriptor. * * @param genericTypeSpecialization specialization of a generic struct or null if not a generic struct */ protected StructBondType(GenericTypeSpecialization genericTypeSpecialization) { this.genericTypeSpecialization = genericTypeSpecialization; precomputedHashCode = this.getClass().hashCode() + (genericTypeSpecialization == null ? 0 : genericTypeSpecialization.hashCode()); } /** * Used by generated subclasses to initialize the base struct reference and fields of the type descriptor. * Field types (including fields of the base struct) may refer back to the declaring struct which causes * cyclic dependencies, and therefore this initialization is separated from the constructor. * * @param baseStructType the type descriptor of the base struct or null if it doesn't exist * @param structFields an array of descriptors of the declared fields of the struct (excluding inherited) */ protected final void initializeBaseAndFields( StructBondType<? super TStruct> baseStructType, StructField<?>... structFields) { this.baseStructType = baseStructType; this.structFields = structFields; } /** * Called from generated code to make sure the type descriptor is initialized. */ protected final void ensureInitialized() { // double-checked locking to make sure initialization happens only one in a single thread; // the contention is restricted since there is at most one initialization per each distinct // non-generic struct type or per each distinct specialization of a generic struct type if (!this.isInitialized) { synchronized (initializationLock) { if (!this.isInitialized) { // enter initialization only if not already initializing by the current thread // (which already holds the lock and hence can be the only initializing thread) if (!this.isCurrentlyInitializing) { try { // mark this object as currently being initialized, so that this thread // does not re-enter initialization when there is a cyclic type reference this.isCurrentlyInitializing = true; // initialize (call generated method which initializes struct type fields // and then calls initializeBaseAndFields) and mark this instance as // initialized (using a volatile variable), so that from this point on // every thread will skip initialization and lock acquisition this.initialize(); this.isInitialized = true; } finally { // clean up after the current thread so that if the initialize method // threw an exception and the object was not successfully initialized // then some other thread can still try to initialize // // Please note that the initialize methods do not throw any exceptions // under normal circumstances, and if they throw something then it is // almost certainly a fatal error (e.g. OutOfMemory or ThreadDeath). this.isCurrentlyInitializing = false; } } } } } } /** * Implemented by generated subclasses to initialize the type descriptor, speficially initialize the * fields and then call {@link #initializeBaseAndFields(StructBondType, StructField[])}. */ protected abstract void initialize(); /** * Used by generated subclasses to serialize declared fields of this struct, excluding inherited fields. * * @param context contains the runtime context of the serialization * @param value the value to serialize from * @throws IOException if an I/O error occurred */ protected abstract void serializeStructFields( SerializationContext context, TStruct value) throws IOException; /** * Used by generated subclasses to deserialize declared fields of this struct, excluding inherited fields. * * @param context contains the runtime context of the deserialization * @param value the value to deserialize into * @throws IOException if an I/O error occurred */ protected abstract void deserializeStructFields( TaggedDeserializationContext context, TStruct value) throws IOException; /** * Used by generated subclasses to deserialize fields of this struct using the runtime schema, excluding inherited * fields. * * @param context contains the runtime context of the deserialization * @param structDef the StructDef of this struct * @param value the value to deserialize into * @throws IOException if an I/O error occurred */ protected abstract void deserializeStructFields( UntaggedDeserializationContext context, StructDef structDef, TStruct value) throws IOException; /** * Used by generated subclasses to initialize declared fields of this struct, excluding inherited fields. * * @param value the value to initialize */ protected abstract void initializeStructFields(TStruct value); /** * Used by generated subclasses to memberwise-copy declared fields of this struct, excluding inherited fields. * * @param fromValue the value to copy from * @param toValue the value to copy to */ protected abstract void cloneStructFields(TStruct fromValue, TStruct toValue); /** * Gets the generic specialization or null if not generic struct. * * @return the generic specialization or null if not generic struct */ protected final GenericTypeSpecialization getGenericSpecialization() { return this.genericTypeSpecialization; } /** * Gets the descriptor of the base struct type. * * @return the type descriptor of the base struct or null if there is no base struct */ public final StructBondType<? super TStruct> getBaseStructType() { return this.baseStructType; } /** * Gets an array containing the descriptors of the struct fields. * * @return an array containing the descriptors of the struct fields */ public final StructField<?>[] getStructFields() { return this.structFields.clone(); } /** * Builds a new {@link SchemaDef} instance describing the schema of this struct. * * @return a new schema definition instance */ public final SchemaDef buildSchemaDef() { SchemaDef schemaDef = new SchemaDef(); HashMap<StructBondType<?>, StructDefOrdinalTuple> typeDefMap = new HashMap<StructBondType<?>, StructDefOrdinalTuple>(); schemaDef.root = this.createSchemaTypeDef(typeDefMap); StructDef[] tempArray = new StructDef[typeDefMap.size()]; for (Map.Entry<StructBondType<?>, StructDefOrdinalTuple> e : typeDefMap.entrySet()) { StructDefOrdinalTuple structDefInfo = e.getValue(); tempArray[structDefInfo.ordinal] = structDefInfo.structDef; } schemaDef.structs.addAll(Arrays.asList(tempArray)); return schemaDef; } /** * Returns the {@link SchemaDef} object containing runtime schemas of this struct type * and any referenced struct types (ancestors or types of struct fields). * The returned instance is permanently cached in this type * descriptor and mutating it can have adverse side effects. * * @return schema definition instance */ public final SchemaDef getSchemaDef() { // double-checked locking to make sure the schema is built and cached in a single thread; // the contention is restricted since there is at most one schema building per each distinct // non-generic struct type or per each distinct specialization of a generic struct type if (this.schemaDef == null) { synchronized (initializationLock) { if (this.schemaDef == null) { this.schemaDef = this.buildSchemaDef(); } } } return this.schemaDef; } /** * Returns the {@link StructDef} object represening runtime schema of this struct type. * The returned instance is permanently cached in this type * descriptor and mutating it can have adverse side effects. * * @return struct definition instance */ public final StructDef getStructDef() { return this.getSchemaDef().structs.get(this.schemaDef.root.struct_def); } @Override public final BondDataType getBondDataType() { return BondDataType.BT_STRUCT; } @Override public final boolean isNullableType() { return false; } @Override public final boolean isGenericType() { return this.genericTypeSpecialization != null; } @Override public final BondType<?>[] getGenericTypeArguments() { return this.genericTypeSpecialization != null ? this.genericTypeSpecialization.genericTypeArguments.clone() : null; } @Override public final Class<TStruct> getPrimitiveValueClass() { return null; } @Override protected final TStruct newDefaultValue() { return this.newInstance(); } @Override protected final TStruct cloneValue(TStruct value) { TStruct clonedValue = this.newInstance(); StructBondType<? super TStruct> currentStructType = this; while (currentStructType != null) { currentStructType.cloneStructFields(value, clonedValue); currentStructType = currentStructType.baseStructType; } return clonedValue; } /** * Instantiates a new instance of this struct type. * * @return new struct instance */ public abstract TStruct newInstance(); /** * Returns a value indicating whether this type is a subtype of (or the same as) the argument type. * * @param other the argument type * @return true if this type is the same type or a subtype of the argument type */ public final boolean isSubtypeOf(StructBondType<?> other) { ArgumentHelper.ensureNotNull(other, "other"); StructBondType<?> currentType = this; while (currentType != null) { if (currentType.equals(other)) { return true; } currentType = currentType.baseStructType; } return false; } @Override protected final void serializeValue(SerializationContext context, TStruct value) throws IOException { this.verifyNonNullableValueIsNotSetToNull(value); context.writer.writeStructBegin(this.getStructDef().metadata); if (this.baseStructType != null) { this.baseStructType.serializeValueAsBase(context, value); } this.serializeStructFields(context, value); context.writer.writeStructEnd(); } private void serializeValueAsBase( SerializationContext context, TStruct value) throws IOException { if (this.baseStructType != null) { this.baseStructType.serializeValueAsBase(context, value); } context.writer.writeBaseBegin(this.getStructDef().metadata); this.serializeStructFields(context, value); context.writer.writeBaseEnd(); } @Override protected final TStruct deserializeValue(TaggedDeserializationContext context) throws IOException { TStruct value = this.newDefaultValue(); context.reader.readStructBegin(); if (this.baseStructType != null) { this.baseStructType.deserializeValueAsBase(context, value); } this.deserializeStructFields(context, value); context.reader.readStructEnd(); return value; } private void deserializeValueAsBase(TaggedDeserializationContext context, TStruct value) throws IOException { if (this.baseStructType != null) { this.baseStructType.deserializeValueAsBase(context, value); } context.reader.readBaseBegin(); this.deserializeStructFields(context, value); context.reader.readBaseEnd(); } @Override protected final TStruct deserializeValue( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { TStruct value = this.newDefaultValue(); this.deserializeValue(context, typeDef, value); return value; } private void deserializeValue( UntaggedDeserializationContext context, TypeDef typeDef, TStruct value) throws IOException { final StructDef structDef = context.schema.structs.get(typeDef.struct_def); if (this.baseStructType != null) { final TypeDef baseDef = structDef.base_def; this.baseStructType.deserializeValue(context, baseDef, value); } this.deserializeStructFields(context, structDef, value); } @Override protected final void serializeField( SerializationContext context, TStruct value, StructField<TStruct> field) throws IOException { this.verifySerializedNonNullableFieldIsNotSetToNull(value, field); // struct fields are never omitted context.writer.writeFieldBegin(BondDataType.BT_STRUCT, field.getId(), field.getFieldDef().metadata); try { this.serializeValue(context, value); } catch (InvalidBondDataException e) { // throws Throw.raiseStructFieldSerializationError(false, field, e, null); } context.writer.writeFieldEnd(); } @Override protected final TStruct deserializeField( TaggedDeserializationContext context, StructField<TStruct> field) throws IOException { // a struct value may be deserialized only from BT_STRUCT if (context.readFieldResult.type.value != BondDataType.BT_STRUCT.value) { // throws Throw.raiseFieldTypeIsNotCompatibleDeserializationError(context.readFieldResult.type, field); } TStruct value = null; try { value = this.deserializeValue(context); } catch (InvalidBondDataException e) { // throws Throw.raiseStructFieldSerializationError(true, field, e, null); } return value; } @Override public final int hashCode() { return this.precomputedHashCode; } @Override public final boolean equals(Object obj) { if (obj instanceof StructBondType<?>) { StructBondType<?> that = (StructBondType<?>) obj; return this.precomputedHashCode == that.precomputedHashCode && this.getClass().equals(that.getClass()) && (this.genericTypeSpecialization == null ? that.genericTypeSpecialization == null : this.genericTypeSpecialization.equals(that.genericTypeSpecialization)); } else { return false; } } /** * Serializes an object into the given protocol writer. * * @param obj the object to serialize * @param writer the protocol writer to write into * @throws IOException if an I/O error occurred */ void serialize(TStruct obj, ProtocolWriter writer) throws IOException { // first pass if (writer instanceof TwoPassProtocolWriter) { ProtocolWriter firstPassWriter = ((TwoPassProtocolWriter) writer).getFirstPassWriter(); if (firstPassWriter != null) { SerializationContext firstPassContext = new SerializationContext(firstPassWriter); this.serializeValue(firstPassContext, obj); } } // second pass SerializationContext context = new SerializationContext(writer); this.serializeValue(context, obj); } /** * Deserializes an object from the given tagged protocol reader. * * @param reader the protocol reader to read from * @return deserialized object * @throws IOException if an I/O error occurred */ TStruct deserialize(TaggedProtocolReader reader) throws IOException { TaggedDeserializationContext context = new TaggedDeserializationContext(reader); return this.deserializeValue(context); } /** * Deserializes an object from the given untagged protocol reader. * * @param reader the protocol reader to read from * @return deserialized object * @throws IOException if an I/O error occurred */ TStruct deserialize(UntaggedProtocolReader reader) throws IOException { return this.deserialize(reader, this.buildSchemaDef()); } /** * Deserializes an object from the given untagged protocol reader using the supplied runtime schema. * * @param reader the protocol reader to read from * @param schema the runtime scheam * @return deserialized object * @throws IOException if an I/O error occurred */ TStruct deserialize(UntaggedProtocolReader reader, SchemaDef schema) throws IOException { UntaggedDeserializationContext context = new UntaggedDeserializationContext(reader, schema); return this.deserializeValue(context, schema.root); } @Override final TypeDef createSchemaTypeDef(HashMap<StructBondType<?>, StructDefOrdinalTuple> structDefMap) { // first need to get the struct def info since need to reference it by the ordinal StructDefOrdinalTuple structDefInfo = structDefMap.get(this); if (structDefInfo == null) { // struct def wasn't created yet, create one and associate with the current struct in the map; int nextOrdinal = structDefMap.size(); StructDef structDef = new StructDef(); structDefInfo = new StructDefOrdinalTuple(structDef, nextOrdinal); // the struct def instance that is associated in the map with the current struct type is not yet // initialized, but any descendants that use this struct will reference the same struct def instance structDefMap.put(this, structDefInfo); this.initializeSchemaStructDef(structDef, structDefMap); } TypeDef typeDef = new TypeDef(); typeDef.id = this.getBondDataType(); typeDef.struct_def = (short) structDefInfo.ordinal; return typeDef; } /** * Codegen helper method that tries to read a field from payload and indicates whether there is a field to read. * * @param context contains the runtime context of the deserialization * @return true if there are more fields to read * @throws IOException if an I/O error occurred */ protected static boolean readField(TaggedDeserializationContext context) throws IOException { context.reader.readFieldBegin(context.readFieldResult); int statusValue = context.readFieldResult.type.value; return statusValue != BondDataType.BT_STOP.value && statusValue != BondDataType.BT_STOP_BASE.value; } private void initializeSchemaStructDef( StructDef structDef, HashMap<StructBondType<?>, StructDefOrdinalTuple> structDefMap) { structDef.metadata.name = this.getName(); structDef.metadata.qualified_name = this.getFullName(); if (this.baseStructType != null) { structDef.base_def = this.baseStructType.createSchemaTypeDef(structDefMap); } for (StructField<?> field : this.structFields) { FieldDef fieldDef = new FieldDef(); fieldDef.metadata.name = field.name; fieldDef.metadata.modifier = field.modifier; initializeSchemaVariantWithDefaultValue(fieldDef.metadata.default_value, field); fieldDef.id = field.id; fieldDef.type = field.fieldType.createSchemaTypeDef(structDefMap); structDef.fields.add(fieldDef); field.fieldDef = fieldDef; } } private void initializeSchemaVariantWithDefaultValue(Variant variant, StructField field) { variant.nothing = field.isDefaultNothing(); if (!variant.nothing) { switch (field.fieldType.getBondDataType().value) { case BondDataType.Values.BT_UINT8: case BondDataType.Values.BT_UINT16: case BondDataType.Values.BT_UINT32: case BondDataType.Values.BT_UINT64: variant.uint_value = ((Number) field.getDefaultValue()).longValue(); break; case BondDataType.Values.BT_INT8: case BondDataType.Values.BT_INT16: case BondDataType.Values.BT_INT64: variant.int_value = ((Number) field.getDefaultValue()).longValue(); break; case BondDataType.Values.BT_INT32: // could be an enum if (field.fieldType instanceof EnumBondType) { variant.int_value = ((BondEnum) field.getDefaultValue()).getValue(); } else { variant.int_value = (Integer) field.getDefaultValue(); } break; case BondDataType.Values.BT_BOOL: // bool is piggy-backing on the int value variant.int_value = (Boolean) field.getDefaultValue() ? 1 : 0; break; case BondDataType.Values.BT_FLOAT: case BondDataType.Values.BT_DOUBLE: variant.double_value = ((Number) field.getDefaultValue()).doubleValue(); break; case BondDataType.Values.BT_STRING: variant.string_value = (String) field.getDefaultValue(); break; case BondDataType.Values.BT_WSTRING: variant.wstring_value = (String) field.getDefaultValue(); break; default: // the default is null for structs and containers break; } } } /** * Registers a struct type builder from generated code. * * @param clazz the struct class * @param structTypeBuilder type builder for the given struct type * @param <TStruct> the Bond struct value class */ protected static <TStruct extends BondSerializable> void registerStructType( Class<TStruct> clazz, StructBondTypeBuilder<TStruct> structTypeBuilder) { structTypeBuilderRegistry.putIfAbsent(clazz, structTypeBuilder); } /** * Gets a type descriptor for a struct represented by a particular generated class. * This method is used when initializing struct type descriptors, so that a particular * type descriptor may access a type descriptor of another type. This method is the only * accessor to a struct type descriptor that is used in generated code when initializing * struct type descriptors (generic type arguments, the base, or fields) and since the * type descriptor is returns is always initialized, there's the invariant condition that * all cached struct type descriptors are initialized. * * @param clazz the struct class * @param genericTypeArguments the generic type arguments in the declaration order * @return a type descriptor instance */ protected static StructBondType<? extends BondSerializable> getStructType( Class<? extends BondSerializable> clazz, BondType<?>... genericTypeArguments) { StructBondTypeBuilder<?> structTypeBuilder = structTypeBuilderRegistry.get(clazz); if (structTypeBuilder == null) { // the type builder is not found in the registry, which could be due to the following two reasons: // 1. The type builder class hasn't been registered yet, which means that the struct class // (whose generated static initializer does this registration) hasn't been initialized yet, or // 2. The struct class was not generated by the same code generator, which should never happen // since this method is protected and intended to be called only from generated code try { // Class initialization may not be enough since the class may already be in the middle of // initialization, where is needed to initialize a referenced class that had a circular // reference back to it. Therefore, call the static initialization method Method typeInitMethod = clazz.getMethod(BOND_TYPE_INITIALIZATION_METHOD_NAME); typeInitMethod.invoke(null); } catch (Exception e) { // if there is an error, then the class implemenation is invalid throw new RuntimeException( "Unexpected program state: invalid struct implementation: " + clazz.getName(), e); } // at this point the class initialization should register the struct type builder; // if it's still not registered then the struct class initialization is not doing what // it should (although the initialization method exists and was successfully invoked), // so the conclusion is that it's not generated per our expectations structTypeBuilder = structTypeBuilderRegistry.get(clazz); if (structTypeBuilder == null) { throw new RuntimeException( "Unexpected program state: invalid struct implementation: " + clazz.getName()); } } // make sure the generic type argument count matches the expected count; // since this should be called only be generated code, this must be always the case if (structTypeBuilder.getGenericTypeParameterCount() != genericTypeArguments.length) { throw new RuntimeException( "Unexpected program state: generic argument count mismatch: " + clazz.getName() + ", expected: " + structTypeBuilder.getGenericTypeParameterCount() + ", actual: " + genericTypeArguments.length); } // build, cache, and initialize the type descriptor return structTypeBuilder.getInitializedFromCache(genericTypeArguments); } /** * Responsible for building and caching Bond struct types with generic type parameters. Please note * that a {@link StructBondType} instance for a generic type can exist only when all generic type * parameters are bound. This class is responsible for this binding: it takes the generic type * arguments and instantiates a new {@link StructBondType} instance representing a specialization * of the generic type. As a special case, it can instantiate new type descriptors for non-generic * types (for which the list of generic type arguments is null). * * @param <TStruct> the class of the struct value */ protected static abstract class StructBondTypeBuilder<TStruct extends BondSerializable> { /** * Gets the number of generic type parameters or (as a special case) 0 for non-generic types. * * @return the number of generic type parameters */ public abstract int getGenericTypeParameterCount(); /** * Creates a new instance of type descriptor that is neither initialized nor cached. This instance * is used to locate the cached instance (or will be cached itself if no cached instance exists yet). * * @param genericTypeArguments generic type arguments * @return new uninitialized uncached type descriptor instance */ protected abstract StructBondType<TStruct> buildNewInstance(BondType<?>[] genericTypeArguments); /** * Returns an initialized instance of the struct type descriptor from the cache, * building/caching/initializing it if necessary. * * @param genericTypeArguments generic type arguments * @return new initialized type descriptor instance (cached) */ public final StructBondType<TStruct> getInitializedFromCache(BondType<?>... genericTypeArguments) { StructBondType<TStruct> cacheKey = this.buildNewInstance(genericTypeArguments); StructBondType<TStruct> cachedType = (StructBondType<TStruct>) getCachedType(cacheKey); cachedType.ensureInitialized(); return cachedType; } } /** * A descriptor of a single field in a struct declaration that encapsulates the details * of that field behavior such as initialization, serialization and deserialization. * This class is the root of the class hierarchy for various Bond types (primitives and objects) * as well as for whether the field defaults to "nothing" (i.e. needs a "Something" wrapper). * The purpose of this class hierarchy is that field initialization/serialization/deserialization * code can just call initialize/serialize/deserialize method without any regard to the field type, * which is setup in the struct type descriptor's {@see StructBondType#initialize} method. * * @param <TField> the class of the field value, using corresponding wrappers for primitive types */ protected static abstract class StructField<TField> { // accessed by subclasses final StructBondType<?> structType; final BondType<TField> fieldType; final short id; final String name; final Modifier modifier; private FieldDef fieldDef; // restrict subclasses to nested classes only private StructField( StructBondType<?> structType, BondType<TField> fieldType, int id, String name, Modifier modifier) { this.structType = structType; this.fieldType = fieldType; this.id = (short) id; this.name = name; this.modifier = modifier; } /** * Gets the declaring struct type descriptor. * * @return the declaring struct type descriptor */ public final StructBondType<?> getStructType() { return this.structType; } /** * Gets the field type descriptor. * * @return the field type descriptor */ public final BondType<TField> getFieldType() { return this.fieldType; } /** * Gets the field definition schema. * * @return field definition schema. */ public final FieldDef getFieldDef() { return this.fieldDef; } /** * Gets the field ID. * * @return the field ID */ public final short getId() { return this.id; } /** * Gets the field name. * * @return the field name */ public final String getName() { return this.name; } /** * Gets the field modifier. * * @return the field modifier */ public final Modifier getModifier() { return this.modifier; } /** * Gets the default value of the field if the field is of primitive data type, or null otherwise. * * @return the default value of the field or null */ public abstract TField getDefaultValue(); /** * Gets a value indicating whether the field is defaulting to "nothing", which means that its * value is wrapped by the {@link Something} wrapper. * * @return a value indicating whether the field is defaulting to "nothing" */ public abstract boolean isDefaultNothing(); /** * Codegen helper to verify deserialized field. * * @param isFieldSet a boolean tracking whether the field was set during deserialization * @throws InvalidBondDataException if the field is required and was not set */ public final void verifyDeserialized(boolean isFieldSet) throws InvalidBondDataException { if (!isFieldSet && this.modifier.value == Modifier.Required.value) { // throws Throw.raiseRequiredStructFieldIsMissingDeserializationError(this); } } final void verifyFieldWasNotYetDeserialized( boolean wasAlreadyDeserialized) throws InvalidBondDataException { if (wasAlreadyDeserialized) { Throw.raiseStructFieldIsPresentMoreThanOnceDeserializationError(this); } } final boolean isOptional() { return this.modifier.value == Modifier.Optional.value; } } /** * Implements the {@link StructField} contract for fields of general object data types * (i.e. any field that is not of a Java primitive type, string, or an enum) that are * not defaulting to "nothing". Since these field types cannot have explicit default * values, there is no constructor that takes a default value. */ protected static final class ObjectStructField<TField> extends StructField<TField> { public ObjectStructField( StructBondType<?> structType, BondType<TField> fieldType, int id, String name, Modifier modifier) { super(structType, fieldType, id, name, modifier); } @Override public final boolean isDefaultNothing() { return false; } @Override public final TField getDefaultValue() { return this.initialize(); } public final TField initialize() { return this.fieldType.newDefaultValue(); } public final TField clone(TField value) { return this.fieldType.cloneValue(value); } public final void serialize( SerializationContext context, TField value) throws IOException { this.fieldType.serializeField(context, value, this); } public final TField deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeField(context, this); } public final TField deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return this.fieldType.deserializeValue(context, typeDef); } } /** * Implements the {@link StructField} contract for fields of general object data types * (i.e. any field that is not of a Java primitive type, string, or an enum) that are * defaulting to "nothing". The default value for such fields is null (meaning "nothing"). */ protected static final class SomethingObjectStructField<TField> extends StructField<TField> { public SomethingObjectStructField( StructBondType<?> structType, BondType<TField> fieldType, int id, String name, Modifier modifier) { super(structType, fieldType, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final TField getDefaultValue() { return null; } public final SomethingObject<TField> initialize() { return null; } public final SomethingObject<TField> clone(SomethingObject<TField> value) { return value == null ? null : Something.wrap(this.fieldType.cloneValue(value.value)); } public final void serialize( SerializationContext context, SomethingObject<TField> value) throws IOException { this.fieldType.serializeSomethingField(context, value, this); } public final SomethingObject<TField> deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeSomethingField(context, this); } public final SomethingObject<TField> deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(this.fieldType.deserializeValue(context, typeDef)); } } /** * Implements the {@link StructField} contract for fields of the uint8 primitive data type * that are not defaulting to "nothing". */ protected static final class UInt8StructField extends StructField<Byte> { private final byte defaultValue; public UInt8StructField( StructBondType<?> structType, int id, String name, Modifier modifier, byte defaultValue) { super(structType, BondTypes.UINT8, id, name, modifier); this.defaultValue = defaultValue; } public UInt8StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, UInt8BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Byte getDefaultValue() { // box return this.initialize(); } public final byte initialize() { return this.defaultValue; } public final byte clone(byte value) { return value; } public final void serialize( SerializationContext context, byte value) throws IOException { UInt8BondType.serializePrimitiveField(context, value, this); } public final byte deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt8BondType.deserializePrimitiveField(context, this); } public final byte deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return UInt8BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the uint8 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingUInt8StructField extends StructField<Byte> { public SomethingUInt8StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.UINT8, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Byte getDefaultValue() { return null; } public final SomethingByte initialize() { return null; } public final SomethingByte clone(SomethingByte value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingByte value) throws IOException { UInt8BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingByte deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt8BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingByte deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(UInt8BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the uint16 primitive data type * that are not defaulting to "nothing". */ protected static final class UInt16StructField extends StructField<Short> { private final short defaultValue; public UInt16StructField( StructBondType<?> structType, int id, String name, Modifier modifier, short defaultValue) { super(structType, BondTypes.UINT16, id, name, modifier); this.defaultValue = defaultValue; } public UInt16StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, UInt16BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Short getDefaultValue() { // box return this.initialize(); } public final short initialize() { return this.defaultValue; } public final short clone(short value) { return value; } public final void serialize( SerializationContext context, short value) throws IOException { UInt16BondType.serializePrimitiveField(context, value, this); } public final short deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt16BondType.deserializePrimitiveField(context, this); } public final short deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return UInt16BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the uint16 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingUInt16StructField extends StructField<Short> { public SomethingUInt16StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.UINT16, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Short getDefaultValue() { return null; } public final SomethingShort initialize() { return null; } public final SomethingShort clone(SomethingShort value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingShort value) throws IOException { UInt16BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingShort deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt16BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingShort deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(UInt16BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the uint32 primitive data type * that are not defaulting to "nothing". */ protected static final class UInt32StructField extends StructField<Integer> { private final int defaultValue; public UInt32StructField( StructBondType<?> structType, int id, String name, Modifier modifier, int defaultValue) { super(structType, BondTypes.UINT32, id, name, modifier); this.defaultValue = defaultValue; } public UInt32StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, UInt32BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Integer getDefaultValue() { // box return this.initialize(); } public final int initialize() { return this.defaultValue; } public final int clone(int value) { return value; } public final void serialize( SerializationContext context, int value) throws IOException { UInt32BondType.serializePrimitiveField(context, value, this); } public final int deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt32BondType.deserializePrimitiveField(context, this); } public final int deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return UInt32BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the uint32 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingUInt32StructField extends StructField<Integer> { public SomethingUInt32StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.UINT32, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Integer getDefaultValue() { return null; } public final SomethingInteger initialize() { return null; } public final SomethingInteger clone(SomethingInteger value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingInteger value) throws IOException { UInt32BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingInteger deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt32BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingInteger deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(UInt32BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the uint64 primitive data type * that are not defaulting to "nothing". */ protected static final class UInt64StructField extends StructField<Long> { private final long defaultValue; public UInt64StructField( StructBondType<?> structType, int id, String name, Modifier modifier, long defaultValue) { super(structType, BondTypes.UINT64, id, name, modifier); this.defaultValue = defaultValue; } public UInt64StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, UInt64BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Long getDefaultValue() { // box return this.initialize(); } public final long initialize() { return this.defaultValue; } public final long clone(long value) { return value; } public final void serialize( SerializationContext context, long value) throws IOException { UInt64BondType.serializePrimitiveField(context, value, this); } public final long deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt64BondType.deserializePrimitiveField(context, this); } public final long deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return UInt64BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the uint64 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingUInt64StructField extends StructField<Long> { public SomethingUInt64StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.UINT64, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Long getDefaultValue() { return null; } public final SomethingLong initialize() { return null; } public final SomethingLong clone(SomethingLong value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingLong value) throws IOException { UInt64BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingLong deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return UInt64BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingLong deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(UInt64BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the int8 primitive data type * that are not defaulting to "nothing". */ protected static final class Int8StructField extends StructField<Byte> { private final byte defaultValue; public Int8StructField( StructBondType<?> structType, int id, String name, Modifier modifier, byte defaultValue) { super(structType, BondTypes.INT8, id, name, modifier); this.defaultValue = defaultValue; } public Int8StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, Int8BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Byte getDefaultValue() { // box return this.initialize(); } public final byte initialize() { return this.defaultValue; } public final byte clone(byte value) { return value; } public final void serialize( SerializationContext context, byte value) throws IOException { Int8BondType.serializePrimitiveField(context, value, this); } public final byte deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int8BondType.deserializePrimitiveField(context, this); } public final byte deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Int8BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the int8 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingInt8StructField extends StructField<Byte> { public SomethingInt8StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.INT8, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Byte getDefaultValue() { return null; } public final SomethingByte initialize() { return null; } public final SomethingByte clone(SomethingByte value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingByte value) throws IOException { Int8BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingByte deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int8BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingByte deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(Int8BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the int16 primitive data type * that are not defaulting to "nothing". */ protected static final class Int16StructField extends StructField<Short> { private final short defaultValue; public Int16StructField( StructBondType<?> structType, int id, String name, Modifier modifier, short defaultValue) { super(structType, BondTypes.INT16, id, name, modifier); this.defaultValue = defaultValue; } public Int16StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, Int16BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Short getDefaultValue() { // box return this.initialize(); } public final short initialize() { return this.defaultValue; } public final short clone(short value) { return value; } public final void serialize( SerializationContext context, short value) throws IOException { Int16BondType.serializePrimitiveField(context, value, this); } public final short deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int16BondType.deserializePrimitiveField(context, this); } public final short deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Int16BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the int16 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingInt16StructField extends StructField<Short> { public SomethingInt16StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.INT16, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Short getDefaultValue() { return null; } public final SomethingShort initialize() { return null; } public final SomethingShort clone(SomethingShort value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingShort value) throws IOException { Int16BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingShort deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int16BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingShort deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(Int16BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the int32 primitive data type * that are not defaulting to "nothing". */ protected static final class Int32StructField extends StructField<Integer> { private final int defaultValue; public Int32StructField( StructBondType<?> structType, int id, String name, Modifier modifier, int defaultValue) { super(structType, BondTypes.INT32, id, name, modifier); this.defaultValue = defaultValue; } public Int32StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, Int32BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Integer getDefaultValue() { // box return this.initialize(); } public final int initialize() { return this.defaultValue; } public final int clone(int value) { return value; } public final void serialize( SerializationContext context, int value) throws IOException { Int32BondType.serializePrimitiveField(context, value, this); } public final int deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int32BondType.deserializePrimitiveField(context, this); } public final int deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Int32BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the int32 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingInt32StructField extends StructField<Integer> { public SomethingInt32StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.INT32, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Integer getDefaultValue() { return null; } public final SomethingInteger initialize() { return null; } public final SomethingInteger clone(SomethingInteger value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingInteger value) throws IOException { Int32BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingInteger deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int32BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingInteger deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(Int32BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the int64 primitive data type * that are not defaulting to "nothing". */ protected static final class Int64StructField extends StructField<Long> { private final long defaultValue; public Int64StructField( StructBondType<?> structType, int id, String name, Modifier modifier, long defaultValue) { super(structType, BondTypes.INT64, id, name, modifier); this.defaultValue = defaultValue; } public Int64StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, Int64BondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Long getDefaultValue() { // box return this.initialize(); } public final long initialize() { return this.defaultValue; } public final long clone(long value) { return value; } public final void serialize( SerializationContext context, long value) throws IOException { Int64BondType.serializePrimitiveField(context, value, this); } public final long deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int64BondType.deserializePrimitiveField(context, this); } public final long deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Int64BondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the int64 primitive data type * that are defaulting to "nothing". */ protected static final class SomethingInt64StructField extends StructField<Long> { public SomethingInt64StructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.INT64, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Long getDefaultValue() { return null; } public final SomethingLong initialize() { return null; } public final SomethingLong clone(SomethingLong value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingLong value) throws IOException { Int64BondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingLong deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return Int64BondType.deserializePrimitiveSomethingField(context, this); } public final SomethingLong deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(Int64BondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the bool primitive data type * that are not defaulting to "nothing". */ protected static final class BoolStructField extends StructField<Boolean> { private final boolean defaultValue; public BoolStructField( StructBondType<?> structType, int id, String name, Modifier modifier, boolean defaultValue) { super(structType, BondTypes.BOOL, id, name, modifier); this.defaultValue = defaultValue; } public BoolStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, BoolBondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Boolean getDefaultValue() { // box return this.initialize(); } public final boolean initialize() { return this.defaultValue; } public final boolean clone(boolean value) { return value; } public final void serialize( SerializationContext context, boolean value) throws IOException { BoolBondType.serializePrimitiveField(context, value, this); } public final boolean deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return BoolBondType.deserializePrimitiveField(context, this); } public final boolean deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return BoolBondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the bool primitive data type * that are defaulting to "nothing". */ protected static final class SomethingBoolStructField extends StructField<Boolean> { public SomethingBoolStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.BOOL, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Boolean getDefaultValue() { return null; } public final SomethingBoolean initialize() { return null; } public final SomethingBoolean clone(SomethingBoolean value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingBoolean value) throws IOException { BoolBondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingBoolean deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return BoolBondType.deserializePrimitiveSomethingField(context, this); } public final SomethingBoolean deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(BoolBondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the float primitive data type * that are not defaulting to "nothing". */ protected static final class FloatStructField extends StructField<Float> { private final float defaultValue; public FloatStructField( StructBondType<?> structType, int id, String name, Modifier modifier, float defaultValue) { super(structType, BondTypes.FLOAT, id, name, modifier); this.defaultValue = defaultValue; } public FloatStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, FloatBondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Float getDefaultValue() { // box return this.initialize(); } public final float initialize() { return this.defaultValue; } public final float clone(float value) { return value; } public final void serialize( SerializationContext context, float value) throws IOException { FloatBondType.serializePrimitiveField(context, value, this); } public final float deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return FloatBondType.deserializePrimitiveField(context, this); } public final float deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return FloatBondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the float primitive data type * that are defaulting to "nothing". */ protected static final class SomethingFloatStructField extends StructField<Float> { public SomethingFloatStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.FLOAT, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Float getDefaultValue() { return null; } public final SomethingFloat initialize() { return null; } public final SomethingFloat clone(SomethingFloat value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingFloat value) throws IOException { FloatBondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingFloat deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return FloatBondType.deserializePrimitiveSomethingField(context, this); } public final SomethingFloat deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(FloatBondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the double primitive data type * that are not defaulting to "nothing". */ protected static final class DoubleStructField extends StructField<Double> { private final double defaultValue; public DoubleStructField( StructBondType<?> structType, int id, String name, Modifier modifier, double defaultValue) { super(structType, BondTypes.DOUBLE, id, name, modifier); this.defaultValue = defaultValue; } public DoubleStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, DoubleBondType.DEFAULT_VALUE_AS_PRIMITIVE); } @Override public final boolean isDefaultNothing() { return false; } @Override public final Double getDefaultValue() { // box return this.initialize(); } public final double initialize() { return this.defaultValue; } public final double clone(double value) { return value; } public final void serialize( SerializationContext context, double value) throws IOException { DoubleBondType.serializePrimitiveField(context, value, this); } public final double deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return DoubleBondType.deserializePrimitiveField(context, this); } public final double deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return DoubleBondType.deserializePrimitiveValue(context); } } /** * Implements the {@link StructField} contract for fields of the double primitive data type * that are defaulting to "nothing". */ protected static final class SomethingDoubleStructField extends StructField<Double> { public SomethingDoubleStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.DOUBLE, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final Double getDefaultValue() { return null; } public final SomethingDouble initialize() { return null; } public final SomethingDouble clone(SomethingDouble value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingDouble value) throws IOException { DoubleBondType.serializePrimitiveSomethingField(context, value, this); } public final SomethingDouble deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return DoubleBondType.deserializePrimitiveSomethingField(context, this); } public final SomethingDouble deserialize(UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(DoubleBondType.deserializePrimitiveValue(context)); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are not defaulting to "nothing". */ protected static final class StringStructField extends StructField<String> { private final String defaultValue; public StringStructField( StructBondType<?> structType, int id, String name, Modifier modifier, String defaultValue) { super(structType, BondTypes.STRING, id, name, modifier); this.defaultValue = defaultValue; } // used by codegen public StringStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, StringBondType.DEFAULT_VALUE_AS_OBJECT); } @Override public final boolean isDefaultNothing() { return false; } @Override public final String getDefaultValue() { return this.initialize(); } public final String initialize() { return this.defaultValue; } public final String clone(String value) { return value; } public final void serialize( SerializationContext context, String value) throws IOException { this.fieldType.serializeField(context, value, this); } public final String deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeField(context, this); } public final String deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return this.fieldType.deserializeValue(context, typeDef); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are defaulting to "nothing". */ protected static final class SomethingStringStructField extends StructField<String> { public SomethingStringStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.STRING, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final String getDefaultValue() { return null; } public final SomethingObject<String> initialize() { return null; } public final SomethingObject<String> clone(SomethingObject<String> value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingObject<String> value) throws IOException { this.fieldType.serializeSomethingField(context, value, this); } public final SomethingObject<String> deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeSomethingField(context, this); } public final SomethingObject<String> deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(this.fieldType.deserializeValue(context, typeDef)); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are not defaulting to "nothing". */ protected static final class WStringStructField extends StructField<String> { private final String defaultValue; public WStringStructField( StructBondType<?> structType, int id, String name, Modifier modifier, String defaultValue) { super(structType, BondTypes.WSTRING, id, name, modifier); this.defaultValue = defaultValue; } // used by codegen public WStringStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { this(structType, id, name, modifier, WStringBondType.DEFAULT_VALUE_AS_OBJECT); } @Override public final boolean isDefaultNothing() { return false; } @Override public final String getDefaultValue() { return this.initialize(); } public final String initialize() { return this.defaultValue; } public final String clone(String value) { return value; } public final void serialize( SerializationContext context, String value) throws IOException { this.fieldType.serializeField(context, value, this); } public final String deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeField(context, this); } public final String deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return this.fieldType.deserializeValue(context, typeDef); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are defaulting to "nothing". */ protected static final class SomethingWStringStructField extends StructField<String> { // used by codegen public SomethingWStringStructField( StructBondType<?> structType, int id, String name, Modifier modifier) { super(structType, BondTypes.WSTRING, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final String getDefaultValue() { return null; } public final SomethingObject<String> initialize() { return null; } public final SomethingObject<String> clone(SomethingObject<String> value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingObject<String> value) throws IOException { this.fieldType.serializeSomethingField(context, value, this); } public final SomethingObject<String> deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeSomethingField(context, this); } public final SomethingObject<String> deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(this.fieldType.deserializeValue(context, typeDef)); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are not defaulting to "nothing". */ protected static final class EnumStructField<TEnum extends BondEnum<TEnum>> extends StructField<TEnum> { private final TEnum defaultValue; public EnumStructField( StructBondType<?> structType, EnumBondType<TEnum> fieldType, int id, String name, Modifier modifier, TEnum defaultValue) { super(structType, fieldType, id, name, modifier); this.defaultValue = defaultValue; } public EnumStructField( StructBondType<?> structType, EnumBondType<TEnum> fieldType, int id, String name, Modifier modifier) { this(structType, fieldType, id, name, modifier, fieldType.newDefaultValue()); } @Override public final boolean isDefaultNothing() { return false; } @Override public final TEnum getDefaultValue() { return this.initialize(); } public final TEnum initialize() { return this.defaultValue; } public final TEnum clone(TEnum value) { return value; } public final void serialize( SerializationContext context, TEnum value) throws IOException { this.fieldType.serializeField(context, value, this); } public final TEnum deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeField(context, this); } public final TEnum deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return this.fieldType.deserializeValue(context, typeDef); } } /** * Implements the {@link StructField} contract for fields of the string primitive data type * that are defaulting to "nothing". */ protected static final class SomethingEnumStructField<TEnum extends BondEnum<TEnum>> extends StructField<TEnum> { // used by codegen public SomethingEnumStructField( StructBondType<?> structType, EnumBondType<TEnum> fieldType, int id, String name, Modifier modifier) { super(structType, fieldType, id, name, modifier); } @Override public final boolean isDefaultNothing() { return true; } @Override public final TEnum getDefaultValue() { return null; } public final SomethingObject<TEnum> initialize() { return null; } public final SomethingObject<TEnum> clone(SomethingObject<TEnum> value) { return value == null ? null : Something.wrap(value.value); } public final void serialize( SerializationContext context, SomethingObject<TEnum> value) throws IOException { this.fieldType.serializeSomethingField(context, value, this); } public final SomethingObject<TEnum> deserialize( TaggedDeserializationContext context, boolean wasAlreadyDeserialized) throws IOException { this.verifyFieldWasNotYetDeserialized(wasAlreadyDeserialized); return this.fieldType.deserializeSomethingField(context, this); } public final SomethingObject<TEnum> deserialize( UntaggedDeserializationContext context, TypeDef typeDef) throws IOException { return Something.wrap(this.fieldType.deserializeValue(context, typeDef)); } } }
{ "pile_set_name": "Github" }
Latest digital cameras put to the test Do you love taking photos, but feel overwhelmed when it comes to buying a digital camera? Or maybe you're looking for present for Father's Day, or something for the recent graduate in your family.We teamed up with Consumer Reports to test out 77 digital cameras, including one that claims to be shockproof even if you drop it from five feet above the ground.
{ "pile_set_name": "Pile-CC" }
Proton-proton homonuclear dipolar decoupling in solid-state NMR using rotor-synchronized z-rotation pulse sequences. We present a theoretical analysis of rotor-synchronized homonuclear dipolar decoupling schemes that cause a z-rotation of the spins. These pulse sequences applicable at high spinning rates (nu(r) > or = 30 kHz) yield high-resolution proton NMR spectra that are free of artifacts, such as zero lines and image peaks. We show that the scaled isotropic chemical-shift positions of proton lines can be calculated from the zero-order average Hamiltonian and that the scaling factor does not depend on offset. The effects of different adjustable parameters (rf field, spinning rate, pulse shape, offset) on the decoupling performance are analyzed by numerical simulations of proton spectra and by (1)H solid-state NMR experiments on NaH(2)PO(4) and glycine.
{ "pile_set_name": "PubMed Abstracts" }
Q: QmlApplicationViewer::setFixedSize does not reflect the same size in xwininfo How can one control the size of QmlApplicationViewer ? I am using QmlApplicationViewer as a launcher for QML application, and in QML, I set size as... QmlApplicationViewer viewer; viewer.setFixedSize(1280,720); but on X11 side, if i query size. it does not match the size requested in Cpp side. xwininfo -root -children | grep application_name can anyone please tell, how can I control the size from with in Qt/QML code ? Thanks in advance for any tip. A: What one could do, if one can't get WM to play nice/or has no window manager, is to set this flag on your top-level window right after the constructor and before the setFixedSize(): viewer.setWindowFlags(viewer.windowFlags() | Qt::X11BypassWindowManagerHint); Please note the documentation for this flag: "Bypass the window manager completely. This results in a borderless window that is not managed at all (i.e., no keyboard input unless you call QWidget::activateWindow() manually)."
{ "pile_set_name": "StackExchange" }
Philemon Mateke Philemon Mateke (born in 1933), is a Ugandan politician. He is the current Minister of State for Regional Affairs in the Ugandan Cabinet. He was appointed to that position on 1 March 2015, replacing Asuman Kiyingi, who was appointed State Minister of Works. On account of his cabinet post, he is an Ex-Officio Member of Parliament. He is also the Chancellor of Metropolitan International University, Kisoro See also He was born in Kisoro District, Western Uganda, circa 1943. After attending local elementary schools, he was admitted to Kigezi College Butobere, where he completed his O-Level studies. He transferred to Busoga College Mwiri, where he completed his A-Level education. He was admitted to Makerere University, where he obtained the degrees of Bachelor of Arts, Master of Arts in India and Doctor of Philosophy at University of London. His chosen area of study was History. Career Following his studies at Makerere, Mateke worked as a Lecturer in the Department of History at Makerere University from the late 1960s until the late 1970s. During the Obote II regime, from 1980 until 1985, he served as the State Minister of Education. A member of the Uganda People's Congress prior to 1986, he became a member of the National Resistance Movement (NRM), soon after NRM captured power. He served in the National Resistance Council, which was the parliament of the times, from 1989 to 1996. In the 1996 election he was incharge of the Elect Museveni Task Force. He served a member of the Parliamentary Commission and later as State Minister for Labor and Industrial Relations 1998-2001. In the 2001 election, he was elected unopposed as the Chairman of Kisoro District Council (LC5). In 2011, at the end of his five-year term, he retired, until he was named State Minister for Regional Affairs on 1 March 2015. His appointment was approved by parliament on Wednesday 18 March 2015. See also Cabinet of Uganda Parliament of Uganda Government of Uganda African Union References External links Website of the Parliament of Uganda Category:1943 births Category:Living people Category:Government ministers of Uganda Category:Uganda People's Congress politicians Category:National Resistance Movement politicians Category:Members of the Parliament of Uganda Category:Makerere University alumni Category:Makerere University academics Category:Alumni of the University of London Category:People from Kisoro District Category:People educated at Busoga College
{ "pile_set_name": "Wikipedia (en)" }
The proposed research seeks to understand determinants of maladaptive achievement patterns in children--patterns that may put children at risk for low self-esteem and negative affect. The first major issue examined is the potential adverse effects of certain kinds of teacher strategies and practices (i.e., controlling techniques) on the development of an extrinsic motivational orientation which is assumed to increase children's vulnerability to performance decrement, negative self-cognition and affect, and overall poor achievement. This issue will be examined in a longitudinal study to see the cumulative negative effects on children's propensity to maladaptive achievement patterns because of exposure to controlling teachers over consecutive years. By use of combined self-report, observational and experimental methods in a longitudinal design, we hope to examine both determinants of maladaptive achievement patterns and the severity of such patterns as a function of socialization practices in the classroom. The second aim focusses on an intervention strategy to "immunize" children from the proposed negative effects of controlling techniques on achievement patterns. Our goal, then, is to use a multiple method approach to provide converging evidence regarding socialization factors influencing the formation of maladaptive achievement patterns and intervention techniques that may produce more adaptive patterns.
{ "pile_set_name": "NIH ExPorter" }
<!DOCTYPE HTML> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc --> <title>StyleConstants.CharacterConstants (Java SE 12 &amp; JDK 12 )</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta name="keywords" content="javax.swing.text.StyleConstants.CharacterConstants class"> <link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style"> <link rel="stylesheet" type="text/css" href="../../../../jquery/jquery-ui.css" title="Style"> <script type="text/javascript" src="../../../../script.js"></script> <script type="text/javascript" src="../../../../jquery/jszip/dist/jszip.min.js"></script> <script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils.min.js"></script> <!--[if IE]> <script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils-ie.min.js"></script> <![endif]--> <script type="text/javascript" src="../../../../jquery/jquery-3.3.1.js"></script> <script type="text/javascript" src="../../../../jquery/jquery-migrate-3.0.1.js"></script> <script type="text/javascript" src="../../../../jquery/jquery-ui.js"></script> </head> <body> <script type="text/javascript"><!-- try { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="StyleConstants.CharacterConstants (Java SE 12 & JDK 12 )"; } } catch(err) { } //--> var pathtoroot = "../../../../"; var useModuleDirectories = true; loadScripts(document, 'script');</script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <header role="banner"> <nav role="navigation"> <div class="fixedNav"> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a id="navbar.top"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div> <a id="navbar.top.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../index.html">Overview</a></li> <li><a href="../../../module-summary.html">Module</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/StyleConstants.CharacterConstants.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../index-files/index-1.html">Index</a></li> <li><a href="../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 &amp; JDK 12</strong> </div></div> </div> <div class="subNav"> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li><a href="#nested.class.summary">Nested</a>&nbsp;|&nbsp;</li> <li><a href="#field.summary">Field</a>&nbsp;|&nbsp;</li> <li>Constr&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li>Constr&nbsp;|&nbsp;</li> <li>Method</li> </ul> </div> <ul class="navListSearch"> <li><label for="search">SEARCH:</label> <input type="text" id="search" value="search" disabled="disabled"> <input type="reset" id="reset" value="reset" disabled="disabled"> </li> </ul> </div> <a id="skip.navbar.top"> <!-- --> </a> <!-- ========= END OF TOP NAVBAR ========= --> </div> <div class="navPadding">&nbsp;</div> <script type="text/javascript"><!-- $('.navPadding').css('padding-top', $('.fixedNav').css("height")); //--> </script> </nav> </header> <!-- ======== START OF CLASS DATA ======== --> <main role="main"> <div class="header"> <div class="subTitle"><span class="moduleLabelInType">Module</span>&nbsp;<a href="../../../module-summary.html">java.desktop</a></div> <div class="subTitle"><span class="packageLabelInType">Package</span>&nbsp;<a href="package-summary.html">javax.swing.text</a></div> <h2 title="Class StyleConstants.CharacterConstants" class="title">Class StyleConstants.CharacterConstants</h2> </div> <div class="contentContainer"> <ul class="inheritance"> <li><a href="../../../../java.base/java/lang/Object.html" title="class in java.lang">java.lang.Object</a></li> <li> <ul class="inheritance"> <li><a href="StyleConstants.html" title="class in javax.swing.text">javax.swing.text.StyleConstants</a></li> <li> <ul class="inheritance"> <li>javax.swing.text.StyleConstants.CharacterConstants</li> </ul> </li> </ul> </li> </ul> <div class="description"> <ul class="blockList"> <li class="blockList"> <dl> <dt>All Implemented Interfaces:</dt> <dd><code><a href="AttributeSet.CharacterAttribute.html" title="interface in javax.swing.text">AttributeSet.CharacterAttribute</a></code></dd> </dl> <dl> <dt>Enclosing class:</dt> <dd><a href="StyleConstants.html" title="class in javax.swing.text">StyleConstants</a></dd> </dl> <hr> <pre>public static class <span class="typeNameLabel">StyleConstants.CharacterConstants</span> extends <a href="StyleConstants.html" title="class in javax.swing.text">StyleConstants</a> implements <a href="AttributeSet.CharacterAttribute.html" title="interface in javax.swing.text">AttributeSet.CharacterAttribute</a></pre> <div class="block">This is a typesafe enumeration of the <em>well-known</em> attributes that contribute to a character style. These are aliased by the outer class for general presentation.</div> </li> </ul> </div> <div class="summary"> <ul class="blockList"> <li class="blockList"> <!-- ======== NESTED CLASS SUMMARY ======== --> <section role="region"> <ul class="blockList"> <li class="blockList"><a id="nested.class.summary"> <!-- --> </a> <h3>Nested Class Summary</h3> <ul class="blockList"> <li class="blockList"><a id="nested.classes.inherited.from.class.javax.swing.text.StyleConstants"> <!-- --> </a> <h3>Nested classes/interfaces declared in class&nbsp;javax.swing.text.<a href="StyleConstants.html" title="class in javax.swing.text">StyleConstants</a></h3> <code><a href="StyleConstants.CharacterConstants.html" title="class in javax.swing.text">StyleConstants.CharacterConstants</a>, <a href="StyleConstants.ColorConstants.html" title="class in javax.swing.text">StyleConstants.ColorConstants</a>, <a href="StyleConstants.FontConstants.html" title="class in javax.swing.text">StyleConstants.FontConstants</a>, <a href="StyleConstants.ParagraphConstants.html" title="class in javax.swing.text">StyleConstants.ParagraphConstants</a></code></li> </ul> </li> </ul> </section> <!-- =========== FIELD SUMMARY =========== --> <section role="region"> <ul class="blockList"> <li class="blockList"><a id="field.summary"> <!-- --> </a> <h3>Field Summary</h3> <ul class="blockList"> <li class="blockList"><a id="fields.inherited.from.class.javax.swing.text.StyleConstants"> <!-- --> </a> <h3>Fields declared in class&nbsp;javax.swing.text.<a href="StyleConstants.html" title="class in javax.swing.text">StyleConstants</a></h3> <code><a href="StyleConstants.html#ALIGN_CENTER">ALIGN_CENTER</a>, <a href="StyleConstants.html#ALIGN_JUSTIFIED">ALIGN_JUSTIFIED</a>, <a href="StyleConstants.html#ALIGN_LEFT">ALIGN_LEFT</a>, <a href="StyleConstants.html#ALIGN_RIGHT">ALIGN_RIGHT</a>, <a href="StyleConstants.html#Alignment">Alignment</a>, <a href="StyleConstants.html#Background">Background</a>, <a href="StyleConstants.html#BidiLevel">BidiLevel</a>, <a href="StyleConstants.html#Bold">Bold</a>, <a href="StyleConstants.html#ComponentAttribute">ComponentAttribute</a>, <a href="StyleConstants.html#ComponentElementName">ComponentElementName</a>, <a href="StyleConstants.html#ComposedTextAttribute">ComposedTextAttribute</a>, <a href="StyleConstants.html#Family">Family</a>, <a href="StyleConstants.html#FirstLineIndent">FirstLineIndent</a>, <a href="StyleConstants.html#FontFamily">FontFamily</a>, <a href="StyleConstants.html#FontSize">FontSize</a>, <a href="StyleConstants.html#Foreground">Foreground</a>, <a href="StyleConstants.html#IconAttribute">IconAttribute</a>, <a href="StyleConstants.html#IconElementName">IconElementName</a>, <a href="StyleConstants.html#Italic">Italic</a>, <a href="StyleConstants.html#LeftIndent">LeftIndent</a>, <a href="StyleConstants.html#LineSpacing">LineSpacing</a>, <a href="StyleConstants.html#ModelAttribute">ModelAttribute</a>, <a href="StyleConstants.html#NameAttribute">NameAttribute</a>, <a href="StyleConstants.html#Orientation">Orientation</a>, <a href="StyleConstants.html#ResolveAttribute">ResolveAttribute</a>, <a href="StyleConstants.html#RightIndent">RightIndent</a>, <a href="StyleConstants.html#Size">Size</a>, <a href="StyleConstants.html#SpaceAbove">SpaceAbove</a>, <a href="StyleConstants.html#SpaceBelow">SpaceBelow</a>, <a href="StyleConstants.html#StrikeThrough">StrikeThrough</a>, <a href="StyleConstants.html#Subscript">Subscript</a>, <a href="StyleConstants.html#Superscript">Superscript</a>, <a href="StyleConstants.html#TabSet">TabSet</a>, <a href="StyleConstants.html#Underline">Underline</a></code></li> </ul> </li> </ul> </section> <!-- ========== METHOD SUMMARY =========== --> <section role="region"> <ul class="blockList"> <li class="blockList"><a id="method.summary"> <!-- --> </a> <h3>Method Summary</h3> <ul class="blockList"> <li class="blockList"><a id="methods.inherited.from.class.javax.swing.text.StyleConstants"> <!-- --> </a> <h3>Methods declared in class&nbsp;javax.swing.text.<a href="StyleConstants.html" title="class in javax.swing.text">StyleConstants</a></h3> <code><a href="StyleConstants.html#getAlignment(javax.swing.text.AttributeSet)">getAlignment</a>, <a href="StyleConstants.html#getBackground(javax.swing.text.AttributeSet)">getBackground</a>, <a href="StyleConstants.html#getBidiLevel(javax.swing.text.AttributeSet)">getBidiLevel</a>, <a href="StyleConstants.html#getComponent(javax.swing.text.AttributeSet)">getComponent</a>, <a href="StyleConstants.html#getFirstLineIndent(javax.swing.text.AttributeSet)">getFirstLineIndent</a>, <a href="StyleConstants.html#getFontFamily(javax.swing.text.AttributeSet)">getFontFamily</a>, <a href="StyleConstants.html#getFontSize(javax.swing.text.AttributeSet)">getFontSize</a>, <a href="StyleConstants.html#getForeground(javax.swing.text.AttributeSet)">getForeground</a>, <a href="StyleConstants.html#getIcon(javax.swing.text.AttributeSet)">getIcon</a>, <a href="StyleConstants.html#getLeftIndent(javax.swing.text.AttributeSet)">getLeftIndent</a>, <a href="StyleConstants.html#getLineSpacing(javax.swing.text.AttributeSet)">getLineSpacing</a>, <a href="StyleConstants.html#getRightIndent(javax.swing.text.AttributeSet)">getRightIndent</a>, <a href="StyleConstants.html#getSpaceAbove(javax.swing.text.AttributeSet)">getSpaceAbove</a>, <a href="StyleConstants.html#getSpaceBelow(javax.swing.text.AttributeSet)">getSpaceBelow</a>, <a href="StyleConstants.html#getTabSet(javax.swing.text.AttributeSet)">getTabSet</a>, <a href="StyleConstants.html#isBold(javax.swing.text.AttributeSet)">isBold</a>, <a href="StyleConstants.html#isItalic(javax.swing.text.AttributeSet)">isItalic</a>, <a href="StyleConstants.html#isStrikeThrough(javax.swing.text.AttributeSet)">isStrikeThrough</a>, <a href="StyleConstants.html#isSubscript(javax.swing.text.AttributeSet)">isSubscript</a>, <a href="StyleConstants.html#isSuperscript(javax.swing.text.AttributeSet)">isSuperscript</a>, <a href="StyleConstants.html#isUnderline(javax.swing.text.AttributeSet)">isUnderline</a>, <a href="StyleConstants.html#setAlignment(javax.swing.text.MutableAttributeSet,int)">setAlignment</a>, <a href="StyleConstants.html#setBackground(javax.swing.text.MutableAttributeSet,java.awt.Color)">setBackground</a>, <a href="StyleConstants.html#setBidiLevel(javax.swing.text.MutableAttributeSet,int)">setBidiLevel</a>, <a href="StyleConstants.html#setBold(javax.swing.text.MutableAttributeSet,boolean)">setBold</a>, <a href="StyleConstants.html#setComponent(javax.swing.text.MutableAttributeSet,java.awt.Component)">setComponent</a>, <a href="StyleConstants.html#setFirstLineIndent(javax.swing.text.MutableAttributeSet,float)">setFirstLineIndent</a>, <a href="StyleConstants.html#setFontFamily(javax.swing.text.MutableAttributeSet,java.lang.String)">setFontFamily</a>, <a href="StyleConstants.html#setFontSize(javax.swing.text.MutableAttributeSet,int)">setFontSize</a>, <a href="StyleConstants.html#setForeground(javax.swing.text.MutableAttributeSet,java.awt.Color)">setForeground</a>, <a href="StyleConstants.html#setIcon(javax.swing.text.MutableAttributeSet,javax.swing.Icon)">setIcon</a>, <a href="StyleConstants.html#setItalic(javax.swing.text.MutableAttributeSet,boolean)">setItalic</a>, <a href="StyleConstants.html#setLeftIndent(javax.swing.text.MutableAttributeSet,float)">setLeftIndent</a>, <a href="StyleConstants.html#setLineSpacing(javax.swing.text.MutableAttributeSet,float)">setLineSpacing</a>, <a href="StyleConstants.html#setRightIndent(javax.swing.text.MutableAttributeSet,float)">setRightIndent</a>, <a href="StyleConstants.html#setSpaceAbove(javax.swing.text.MutableAttributeSet,float)">setSpaceAbove</a>, <a href="StyleConstants.html#setSpaceBelow(javax.swing.text.MutableAttributeSet,float)">setSpaceBelow</a>, <a href="StyleConstants.html#setStrikeThrough(javax.swing.text.MutableAttributeSet,boolean)">setStrikeThrough</a>, <a href="StyleConstants.html#setSubscript(javax.swing.text.MutableAttributeSet,boolean)">setSubscript</a>, <a href="StyleConstants.html#setSuperscript(javax.swing.text.MutableAttributeSet,boolean)">setSuperscript</a>, <a href="StyleConstants.html#setTabSet(javax.swing.text.MutableAttributeSet,javax.swing.text.TabSet)">setTabSet</a>, <a href="StyleConstants.html#setUnderline(javax.swing.text.MutableAttributeSet,boolean)">setUnderline</a>, <a href="StyleConstants.html#toString()">toString</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a id="methods.inherited.from.class.java.lang.Object"> <!-- --> </a> <h3>Methods declared in class&nbsp;java.lang.<a href="../../../../java.base/java/lang/Object.html" title="class in java.lang">Object</a></h3> <code><a href="../../../../java.base/java/lang/Object.html#clone()">clone</a>, <a href="../../../../java.base/java/lang/Object.html#equals(java.lang.Object)">equals</a>, <a href="../../../../java.base/java/lang/Object.html#finalize()">finalize</a>, <a href="../../../../java.base/java/lang/Object.html#getClass()">getClass</a>, <a href="../../../../java.base/java/lang/Object.html#hashCode()">hashCode</a>, <a href="../../../../java.base/java/lang/Object.html#notify()">notify</a>, <a href="../../../../java.base/java/lang/Object.html#notifyAll()">notifyAll</a>, <a href="../../../../java.base/java/lang/Object.html#wait()">wait</a>, <a href="../../../../java.base/java/lang/Object.html#wait(long)">wait</a>, <a href="../../../../java.base/java/lang/Object.html#wait(long,int)">wait</a></code></li> </ul> </li> </ul> </section> </li> </ul> </div> </div> </main> <!-- ========= END OF CLASS DATA ========= --> <footer role="contentinfo"> <nav role="navigation"> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a id="navbar.bottom"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div> <a id="navbar.bottom.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../index.html">Overview</a></li> <li><a href="../../../module-summary.html">Module</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/StyleConstants.CharacterConstants.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../index-files/index-1.html">Index</a></li> <li><a href="../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 &amp; JDK 12</strong> </div></div> </div> <div class="subNav"> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li><a href="#nested.class.summary">Nested</a>&nbsp;|&nbsp;</li> <li><a href="#field.summary">Field</a>&nbsp;|&nbsp;</li> <li>Constr&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li>Constr&nbsp;|&nbsp;</li> <li>Method</li> </ul> </div> </div> <a id="skip.navbar.bottom"> <!-- --> </a> <!-- ======== END OF BOTTOM NAVBAR ======= --> </nav> <p class="legalCopy"><small><a href="https://bugreport.java.com/bugreport/">Report a bug or suggest an enhancement</a><br> For further API reference and developer documentation see the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase12.0.2&amp;id=homepage" target="_blank">Java SE Documentation</a>, which contains more detailed, developer-targeted descriptions with conceptual overviews, definitions of terms, workarounds, and working code examples.<br> Java is a trademark or registered trademark of Oracle and/or its affiliates in the US and other countries.<br> <a href="../../../../../legal/copyright.html">Copyright</a> &copy; 1993, 2019, Oracle and/or its affiliates, 500 Oracle Parkway, Redwood Shores, CA 94065 USA.<br>All rights reserved. Use is subject to <a href="https://www.oracle.com/technetwork/java/javase/terms/license/java12.0.2speclicense.html">license terms</a> and the <a href="https://www.oracle.com/technetwork/java/redist-137594.html">documentation redistribution policy</a>. <!-- Version 12.0.2+10 --></small></p> </footer> </body> </html>
{ "pile_set_name": "Github" }
Les époux Balkany, lors d’un conseil municipal à Levallois-Perret, le 15 avril. STEPHANE DE SAKUTIN / AFP A partir du lundi 13 mai, la 32e chambre du tribunal correctionnel de Paris va passer six semaines dans un épais brouillard, formé de sociétés offshore au Panama et aux Seychelles, de comptes bancaires au Liechtenstein et à Singapour, de fiduciaires suisses et de prête-noms zélés, dans lequel Patrick et Isabelle Balkany ont tenté, selon la justice, de dissimuler aux yeux du fisc une partie de leur patrimoine. « Au minimum 13 millions d’euros », évalue l’ordonnance de 92 pages qui a renvoyé les deux époux de 70 et 71 ans devant le tribunal. Dans cet entrelacs qu’ils ont passé plus de quatre ans à démêler, les juges chargés de l’instruction du dossier, Renaud Van Ruymbeke et Patricia Simon, ont trouvé de quoi faire comparaître le maire (Les Républicains) de Levallois-Perret (Hauts-de-Seine) et sa femme, qui est également première adjointe, pour « fraude fiscale » et « blanchiment de fraude fiscale ». Lui devra également répondre des chefs de « corruption passive » et « blanchiment de corruption ». L’indéboulonnable édile – élu pour la première fois en 1983, candidat déclaré pour 2020 – et sa femme encourent dix ans de prison. L’affaire est autrement plus sérieuse que celle qui, en 1996, avait valu quinze mois de sursis au couple, condamné à l’époque pour avoir payé avec l’argent municipal trois employés de maison travaillant exclusivement à son service. « Instruction exclusivement à charge » Le procès doit se dérouler jusqu’au 20 juin. A la veille de son ouverture, le doute subsistait quant à la présence d’Isabelle Balkany, hospitalisée le 1er mai à la suite d’une tentative de suicide survenue quelques heures après la publication, sur Facebook, d’un texte dans lequel elle disait tout le mal qu’elle pensait des journalistes, « navrants scribouillards nécrophages », et des juges, coupables d’une « instruction exclusivement à charge ». Lire aussi Isabelle Balkany hospitalisée à la suite d’une tentative de suicide « Les investigations ont été guidées par deux questions, écrivent Renaud Van Ruymbeke et Patricia Simon dans leur ordonnance. Quelle est l’étendue du patrimoine des époux Balkany ? Comment ces avoirs ont-ils été financés ? » La réponse à la première question a été soufflée en grande partie par Didier Schuller, un ancien proche de Patrick Balkany, qui a été trahi par ce dernier. Entendu en 2013 dans le cadre d’une autre instruction, Didier Schuller – condamné en 2005 dans l’affaire des HLM des Hauts-de-Seine, tandis que Patrick Balkany était relaxé – a déballé ses dossiers en guise de vengeance, révélant que son ancien allié possédait un important patrimoine immobilier occulte. Une enquête a été ouverte, qui a fait apparaître la luxueuse villa Pamplemousse à Saint-Martin, dans les Antilles françaises, la villa Dar Gyucy, dans la palmeraie de Marrakech (Maroc), et « les montages de plus en plus sophistiqués » mis en place par les Balkany afin de « ne pas apparaître comme les véritables propriétaires ». Il vous reste 52.48% de cet article à lire. La suite est réservée aux abonnés.
{ "pile_set_name": "OpenWebText2" }
Evaluation of internal and external doses from 11C produced in the air in high energy proton accelerator tunnels. Air has been irradiated with high energy protons at the 12 GeV proton synchrotron to obtain the following parameters essential for the internal dose evaluation from airborne 11C produced through nuclear spallation reactions: the abundance of gaseous and particulate 11C, chemical forms, and particle size distribution. It was found that more than 98% of 11C is present as gas and the rest is aerosol. The gaseous components were only 11CO and 11CO2, and their proportions were approximately 80% and 20%, respectively. The particulate 11C was found to be sulphate and/or nitrate aerosols having a log-normal size distribution; the measurement using a diffusion battery showed a geometric mean radius of 0.035 micron and a geometric standard deviation of 1.8 at a beam intensity of 6.8 x 10(11) proton.pulse-1 and an irradiation time of 9.6 min. By taking the chemical composition and particle size into account, effective doses both from internal and from external exposures per unit concentration of 11C were calculated for various room sizes. The values can be used to evaluate the effective dose from the airborne 11C produced in the accelerator tunnels.
{ "pile_set_name": "PubMed Abstracts" }
Q: Recommended approaches for making my code swiggable? I'm currently refactoring a Tcl plugin library written in C++. Originally the code was hand-written. A second library exists that does the same thing for Java. The refactored library will be a single C++ library that can be used to create bindings to different languages. My first tests with SWIG are promising. However, a lot of junk is generated as well. Various base classes and utilities are all exported. These don't make sense from the scripting point of view and only increase clutter. Possible solutions that I can think of are: Use #ifndef SWIG in the original codebase to filter out unneeded code Create a SWIG-compatible wrapper around the API classes. Differentiate between public and private headers. Public headers are pure abstract base classes that contain no implementation. The private headers inherit and implement them. Only SWIG the public headers. The opposite of the above solution: inherit a SWIG-compatible class for each API class. I'm currently leaning towards solution 3 at the moment. However, I'm not really certain so I'd like to know the SO community's opinion on this. Feel free to share your thoughts. Update I forgot to list one solution: Code that should not exported by SWIG should probably not be in the public section of your class. Perhaps this is the answer. I'll have another look on Monday. Update I settled with a solution. See my answer. A: Any approach that means that the C++ library becomes less useful to the C++ user is not the ideal solution. #ifdef SWIG in the middle of .hpp files: Muddies up your C++ with unnecessary cruft, so it's not ideal SWIG Specific Interface: This is a viable option, but only makes sense if the code you want to expose to SWIG is significantly higher level then the base C++ API. Public vs Private interface: Might make sense, but again you have to ask at what cost to the C++ user of the API? Are you limiting the public interface too much? Who has access to the private interface? Should the pImpl idiom be considered instead? SWIG Compatible Class for each interface: Probably more work than necessary. First and foremost, to keep your SWIG related code separate from the rest of the API. You probably don't want to import the .hpp files directly into SWIG (if SWIG wasn't considered during the initial design of the library), but if you do, you want to use a SWIG .i file to help you clean up the mess. There are three basic approaches we use, each with different use cases. First, direct inclusion. This is useful if you know your API is nice and clean and well suited for parsing by SWIG: // MyClass.i %{ #include "MyClass.hpp" // included for the generated .cxx file %} %include "MyClass.hpp" // included and parsed directly by SWIG The second case is for code that is most of the way there. This is code that had SWIG taken into consideration, but really needed some stuff for the C++ user that we didn't want to expose to SWIG: // MyClass.i %{ #include "MyClass.hpp" // included for the generated .cxx file %} %ignore MyClass::someFunction(); // This function really just causes us problems %include "MyClass.hpp" // included and parsed directly by SWIG The third case, and probably the one you want to use, is to directly choose which functions you want to expose to SWIG. // MyClass.i %{ #include "MyClass.hpp" // included for the generated .cxx file %} // With this example we provide exactly as much information to SWIG as we want // it to have. Want it to know the base class? Add it. Don't want it to know about // a function? Leave it out. want to add a new function? %extend it. class MyClass { void importantFunction(); void importantFunction2(); }
{ "pile_set_name": "StackExchange" }
Here’s Why Doctors Have Stopped Prescribing Metformin We are quickly approaching the day when people diagnosed with type 2 Diabetes can kiss goodbye to their expensive pills and annoying needles and test strips. This is thanks to a breakthrough from a Texan doctor that is going to change everything we thought we knew about how to treat type 2 Diabetes.. No more needles! Would you be willing to try a "miracle shake" that could solve the problem of diabetes? Dr. David Pearson has received threats about revoking his medical license if he even dares introduce the idea of his miracle shake to those suffering from type 2 Diabetes. He said that he was tired of giving patients the same shots and pills, and watching them be unable to cast off the shackles of diabetes. He wanted to find a better way. Now, several years of study and experiments later, Dr. Pearson has discovered a surprisingly simple way to stop diabetes and even reverse it, giving you back the life you had before. The method involves doing away with the foods that are making the problem worse, and replacing them with a superfood that has doctors baffled. Dr. Pearson was met with harsh criticism from his fellows in the medical community, but he was never criticised by his patients; most of them experienced success in just a few weeks. Dr. Pearson says that hearing how his patients had gotten their lives back was the only accolade he needed. His method has proven results, and these results can speak for themselves. By now you’re probably wondering why you’ve never heard of this method. The answer is pretty simple really; Big Pharma. The pharmaceutical industry has gone to great lengths to keep this information suppressed. The diabetes "market" is worth billions of dollars in expensive prescription pills. Pharmaceutical companies make more money when you’re sick, which is why they aren’t in a hurry to let a diabetes cure get out there. Metformin makers are hardly about to step aside and lose out on the tens of billions of dollars it’s expected they will bring in during 2017. Dr. Pearson believes that keeping diabetics in the dark about safe alternative treatment options is unfair. Even though Dr. Pearson was heavily pressured by Big Pharma to let the issue go, he went ahead and created this presentation to let diabetics around the world make the change and free themselves. Watch the Presentation Below Right Now! Watch The Video >> There has been quite a shocking response to the presentation, which has been shared and seen by diabetic communities thanks to the power of the internet. Some viewers are outraged over the information being suppressed and hidden, while others are just happy to find out that their lives will no longer revolve around pills and insulin. Dr. Pearson is keen to stress that everyone can follow this method. He says that you would be surprised how powerful drinking the "miracle shake" at the right time each day. Of course, viewers must exercise common sense. You should only discontinue a medicine with a doctor’s supervision. This video could be pulled down any moment, so make sure you click on it and watch all of it if it’s still up for you. Watch the Presentation Here >>
{ "pile_set_name": "OpenWebText2" }
Screenshot : Sunrise Previously, it was officially announced that the Gintama manga was slated to end in the September 15th issue of Weekly Jump. Now its creator says the popular manga isn’t actually ending. As translated by Twitter user Kewl0210, Gintama creator Hideaki Sorachi write a one-page letter to fans explaining the situation. While Gintama won’t be in Weekly Jump, Sorachi wrote, the manga isn’t ending. The reason, he continued, is that Jump has a system in which manga creator tells the editorial department half a year in advance that the story is coming to a close. At that point, it all starts wrapping up. “But with Gintama, I misread this and for the past three years now I’ve been saying, ‘I don’t think I can wrap up quite yet,’” Sorachi wrote (via Kewl0210). Thus, Gintama will be published in spin-off mag Jump Giga, where the manga can apparently get more pages, while Sorachi wraps up the story. “I honestly would’ve preferred to bring you the story all the way to the end in Jump,” Sorachi wrote (via Kewl0210), “so I really have to apologize for screwing the whole thing up.”
{ "pile_set_name": "OpenWebText2" }
Ultra Small Gold Conjugates and R-Gent SE-EM Silver Enhancement Reagent in Pre-embedding Single and Double Immunolabeling Answering Your Questions Aurion has collected answers to frequently asked questions from immunogold users. They are listed below. When your question is not listed on this page, please contact us -> info@scienceservices.eu . We will do our best to give you an answer by return mail. Frequently Asked Questions What kind of particle size should I use? Is it true that gold conjugates are more background prone than other conjugates? Should I use a secondary gold conjugate or Protein A (or G)? Is there a training programme for immunogold (silver) staining where I can bring my own specimens? Is it possible to do pre-embedding labeling of intracellular antigens? How can I verify that my conjugates are still active? How can I verify that the silver enhancement reagents are still fine? Is it advisable to use outdated conjugates? Is it possible to double label using two antibodies from the same animal source? What kind of grids should I use for silver enhancement? What about silver enhancement and OsO4? I get no positive results, now what? I am having background problems; is this due to the gold conjugate? Are there any fora which I can address with questions regarding labeling or microscopy? How can I do a controlled silver enhancement with pre-embedding? In which case should I use a F(ab) or F(ab)2 conjugate in stead of the complete immunoglobulin conjugate? When should I use normal serum in the incubations? What about sensitivity, signal-to-noise ratios and detectability? What is epi-polarization microscopy? My specimens for pre-embedding have a lot more antigens than a corresponding ultrathin section. Should I use more concentrated reagents? What kind of particle size should I use? Always use the smallest particle size to fit your application. Conjugates based on smaller particles are more efficient than larger particle based conjugates. If visualization is difficult with smaller particles these can be enlarged with silver enhancement, which is a must for the conjugates from the Ultra Small series. The new silver enhancement system AURION SE-EM provides for homogeneous and high efficiency enhancement. Is it true that gold conjugates are more background prone than other conjugates? No! This fairy tale comes from the fact that gold conjugates are based on particles and that visualization is also based on separate particles. Contrary to enzyme and fluorescent markers, gold conjugates are more like a digital system, either they are there and then you will see them, or they are not present. Enzyme and fluorescent markers are sooner to be considered as "analogue" markers, their visibility in detection increases with their local concentration or with the time the enzyme marker can produce a visible reaction product. An unbiased look at controls in fluorescence shows always a low level of light that is inherent to the presence of double bonds in biological compounds and on top of this comes the fluorescence from the labeled antibodies. Likewise will an unbiased look at control specimens incubated only with alkaline phosphatase or peroxidase labeled antibodies usually show a faint overall staining of the specimen. Such faint levels are easily accepted or even mentally filtered out. You cannot do this with gold conjugates since they are based on particles. Should I use a secondary gold conjugate or Protein A (or G)? That depends on what your goal is. Using secondary conjugates results in a higher labeling density. Therefore it is often said that secondary conjugates are more sensitive than Protein A conjugates. This is partly true. Protein A (or G) recognizes only one site on a primary antibody molecule. Binding will occur only when this site is available and not obscured by its environment. Secondary conjugates recognize more sites on primaries and therefor the chance that a primary antibody will be detected is greater. Essentially this is the increase in sensitivity. Is there a training programme for immunogold (silver) staining where I can bring my own specimens? Aurion organizes wet-workshops worldwide where you preferably work with your own specimens and primary antibodies. After all, that is where your interest lies. If required, we will expand our activities to additional venues. The workshops last for two or three days and give an in-depth view in immunogold (silver) staining. The number of participants is limited to warrant optimum teaching. You may contact us directly for more info. Our distributors can give you more data on forthcoming workshops in their area. Detailed information on the setup of our workshops can be found in this website. Is it possible to do pre-embedding labeling of intracellular antigens? Yes. Single cells are most suited. Plant material with a thick impenetrable wall is not. The ultra small gold conjugates are the conjugates of choice. In many cases a permeabilization step with NaBH4 suffices to open up the specimens and allow penetration of reagents. Low concentrations of mild detergents like saponin help. One thing should be emphasized: reaction times have to be prolonged since full penetration of the reagents to the internal antigens has to be achieved. To remove unreacted reagents after incubation wash procedures have to be adapted likewise! The Aurion Newsletter #5 deals with this topic. Please see elsewhere on this site. How can I verify that my conjugates are still active? There is a simple procedure to check this. It is described in great detail in Aurion's Newsletter #4 about which some information can be found in the "Sharing our Knowledge" section of this web site. In short: you need a nitro-cellulose strip, apply dots from a dilution series of your primary antibody and incubate the strip with the gold reagent. The dots will stain red with the larger conjugates. When testing an Ultra Small conjugate silver enhancement has to be applied for visualization. How can I verify that the silver enhancement reagents are still fine? Again, there is a simple procedure to check this. It is described in great detail in our Newsletter #4 (please refer to the "Sharing our Knowledge" section of this web site). In short: you need a nitro-cellulose strip, apply dots from a dilution series of your gold conjugate and incubate the strip with the silver enhancement reagents. The dots should become brown-black. During this period of time the mix of reagents should remain glass clear without any visible presence of silver caused by auto nucleation.The activity of the Silver Enhancement reagent SE-EM for Electron microscopy can be tested by adding 10µl of the diluted ultra small reagent to 100µl of the enhancement mix. The solution should turn yellow in 30-45 minutes. Is it advisable to use outdated conjugates? As long as their reactivity is OK and there are not too many clusters formed this is no problem. Gold conjugates are very stable. There may be some release of protein from the particle surface with time, but generally this does not result in noticeably reduced reactivity. The reactivity of the conjugate is easily checked with a dot-spot test as described in Newsletter #4. Cluster formation may increase with time, depending on the type of conjugated protein and the particle size. The larger the particles the more clusters. These can be removed by centrifugation of the diluted conjugate before use. Is it possible to double label using two antibodies from the same animal source? Yes, there are ways to do this. One is by using Protein G or Protein A conjugates with different particle sizes. The procedure would be: first incubate with primary antibody I, detect this with Protein A (or G) with the smaller particle size. Then incorporate an incubation with excess free Protein A or G (50-100 µg/ml). This will block practically all binding sites for Protein A or G. Next, incubate for the second antigen with primary antibody II and detect this with the larger sized Protein A or G gold conjugate. A second possibility is to use one-step incubations with a mix of primary antibodies, each labeled directly with a different gold particle size. Aurion offers a custom labeling service. Details can be found in the section on custom labeling. What kind of grids should I use for silver enhancement? Nickel is the material of choice. Gold grids are out of the question as they will be neatly enhanced as well. The same with copper. Nickel grids are preferred to copper ones for immuno incubations anyway, since nickel is more inert and less poisonous to immuno or enzyme reactions. Nickel grids can be annoying because of their magnetic properties. This is easily overcome by using either non-magnetic tweezers or by using a flattened loop to transfer grids from droplet to droplet during immuno incubations. Science Services offers an excellent "perfect loop" for this purpose. What about silver enhancement and OsO4? OsO4 fixation can be used before incubation, after incubation or after silver enhancement. Because of its destructive effect on antigens OsO4 fixation is not often used when immuno incubations are intended. However, in general silver enhancing immuno incubated OsO4 fixed specimens causes no difficulties. An Osmium fixation step can be introduced after incubation to improve contrast in specimens. As stated before, applying silver enhancement generally causes no difficulties. Using OsO4 fixation after enhancement is also possible but since OsO4 is a strong oxidant it is capable of oxidizing metallic silver, especially when present as particles. This results in removal part of silver. A simple remedy is to combine slightly over-enhanced specimens with a limited OsO4 fixation, for example 1% OsO4 for 15 minutes. Residual fixative activity, which is eliminated by using a NaBH4 or Glycine block step prior to the protein block step, Stickiness to hydrophobic areas (embedding medium, lipid rich specimen compounds). This is reduced by using an adequate protein block step involving a partly hydrophobic protein like BSA or Casein, Charge-based interactions causing negatively charged reagents such as antibodies and gold conjugates to adhere to oppositely charged areas in the specimen (notorious are the histone proteins, some collagen types and poly-L-lysine that is sometimes used to make sections stick to surfaces). This type of interaction can only be overcome by adding an excess of negatively charged indifferent molecules to the incubation media. Aurion has developed a chemically modified BSA termed BSA-c ™ especially for this purpose. Newsletter #1 gives in-depth information. Information on the Aurion Newsletters is available in the "Sharing our knowledge" section of the Aurion web site. Are there any fora which I can address with questions regarding labelling or microscopy? Feel free to address our HELPDESK by e-mail with questions regarding immunolabeling.There are a few newsgroups which may be of interest such as: bionet.cellbiol, bionet.cellbiol.cytonet, bionet.molbio.methds-reagnts and sci.bio.immunocytochem. And last but not least: there is a microscopy listserver to which you can subscribe and which offers a platform to ask questions regarding light and electron microscopy in all its facets. You can subscribe by sending an e-mail message to ListServer@MSA.Microscopy.Com. The message only has to contain the word "subscribe micrsocopy". How can I do a controlled silver enhancement with pre-embedding? With pre-embedding there are two possibilities: either the enhancement is done before embedding or on the sections after embedding. We prefer to do the enhancement on sections (on nickel grids) since this gives more control over the degree of enhancement. Using longer enhancement times allows to observe larger (even ultra thin) sections in the light microscope. This facilitates searching for the area in the specimens where a reaction has occurred and allows easy targeting and trimming down to the area of interest for EM sectioning. Shorter enhancement is then used on sections for EM. Using enhancement before embedding has the disadvantage that once enhancement proves to be too long (resulting in too large particles) this can not be reversed. In which case should I use a Single Fab or F(ab)2 conjugate in stead of the complete immunoglobulin conjugate? The size of a conjugate is co-responsible for its efficiency. The overall size is determined by the particle size and by the size of the proteins adsorbed onto the particle surface. That is why we introduced ultra small particles in the first place. Whenever a specimen is relatively dense or intensely cross-linked immuno reagents will be more hindered in their action. If you are already using an ultra small conjugate further improvement may result from using a single Fab or F(ab)2 fragment of the specific secondary antibody instead of the intact Ig-molecule. When should I use normal serum in the incubations? It is a good idea to use normal serum as an additive to the blocking and incubation buffer when using secondary antibody conjugates. The normal serum should be the same species as the secondary antibody conjugate. Its action is similar to the action of BSA. Please be careful when using normal sera to suppress background with Protein A or Protein G conjugates. These conjugates detect several Ig-types from different species which, when used as normal serum additive, would lead to an impressive amount of gold particles all over the specimen. Aurion offers several Blocking Solutions tailored for specific secondary antibody or protein A/G incubations. What about sensitivity, signal-to-noise ratios and detectability? Sensitivity can be considered at different levels in the total of preparation and incubations. Ideally during preparation one would like to preserve all antigens present. In many cases this is not possible. But at least a representative fraction should be preserved and be available for immuno labeling. It all depends on the preparation procedure (fixation, embedding, temperature, etc.), which leaves you with a specimen or section with a given number of available and recognizable antigens. The ensuing detection protocol has 100% sensitivity if all the remaining antigens are detected, i.e. are represented by at least one gold particle or marker molecule. Again, due to masking and steric hindrance by the specimen composition this will only in exceptional cases be fully attained. The immuno labeling sensitivity thus expresses the degree to which available antigens can be detected by the employed combination of primary antibody and secondary conjugate. The quality of the primary antibody is the next important item. Theoretically the Kd-value of an antibody/antigen reaction is a measure for the dilution at which the incubations should be performed and for the stability of the ensuing bond. Sensitivity will go up with more concentrated antibody solutions up to a maximum level. However, when the primary antibody shows cross-reactivity there is not necessarily an improved signal-to-noise ratio. The reliability of the detection by the primary antibody improves in such cases with higher dilutions, probably leading to a smaller amount of antigens detected, but to an improved signal-to-noise ratio. Thus, sensitivity at the level of the primary antibody has to be balanced against the signal-to-noise ratio. The last step is the quality of the secondary reagent. In fact you will be looking at a number of gold particles which represents a number of secondary antibodies which have detected a number of primary antibodies. For the interaction between the secondary reagent and the primary antibody the same rules apply as indicated for the antigen/primary antibody reaction. Detectability reflects the degree to which the final result of all the reactions involved can actually be seen. This is depending on the right match between particle size and magnification. Ultra small particle-based conjugates for instance are among the most efficient detection systems, but you will only detect them after silver enhancement (in most applications). What is epi-polarization microscopy? Epi-polarization is a technique used for the very sensitive light microscopical observation of metal particles. Where bright field microscopy depends on contrast levels in discriminating signals, epi-polarization works differently: provided particles are large enough individual particles will be observed. So in fact you are evaluating your labeling results on the same basis as with an electron microscope by looking at individual particles. This makes this technique so valuable as it builds a bridge between the light level and the electron microscopical observation. What do you need to do this: a high-quality light microscope equipped with an epi-illumination source, preferably a high pressure Hg-lamp (although a halogen source may also do). Many laboratories have an epi-fluorescence microscope at their disposition with a 40X (or higher) oil objective. Such microscope equipment forms the correct basis. You only need to implement an epi-polarization filter (the so-called epi-block or IGSS filter) in the filter housing. The epi-block contains two polarizers, differing 90 degrees in orientation with respect to each other. How does it work (in short): High intensity light passes the first polarizer in the epi-block and becomes polarized. The polarized incident light passes the objective lens and interacts with the specimen. The biological material hardly gives any reflection, and the reflected light is unmodified. The metal particles mirror the polarized light, thereby randomizing the polarization angle. Reflected light passes up through the objective lens. On its way to the eye pieces or the photo camera the light passes the second polarizer in the epi-block. While doing so, light with the original polarization angle (the way it was polarized in the first place before ever hitting the specimen) is extinguished, whereas light that has become randomly polarized (and which comes from the silver metal particles) passes the epi-block. As a result you will see individual bright stars (the gold/silver particles) against a dark background. Epi-polarization observation can be combined in real time with bright field imaging, providing for a very sensitive detection of even extremely low amounts of antigen while still having the advantage of full morphological details in the specimen. My specimens for pre-embedding have a lot more antigens than a corresponding ultrathin section. Should I use more concentrated reagents? No, the higher amount of antigens should be balanced by a larger amount of reagent volume at an appropriate dilution (the same as used on sections with low amounts of antigen), and not by more concentrated reagents. The reason is that with increased concentrations more cross-reactions may occur and signal-to-noise ratios will decrease.Incubating specimens for pre-embedding in lager volume quantities is best performed on a rocking table for a prolonged time to warrant penetration to antigenic sites in the specimen. I get no positive results, now what? When your incubated specimens look as clean as your controls, either (one or more of) the reagents are inactive, or the antigens are destroyed, masked or absent. The cause is easily found by performing tests working backwards through the incubation protocol using dot-spot tests as described in Newsletter #4 (please refer to the "Sharing our Knowledge" section of the Aurion web site www.Aurion.nl ). First test the activity of the silver enhancement reagents (if they were used at all) on the gold conjugate that was used. If silver enhancement is fine, the next step is to test the gold conjugate on the primary antibody used and so on. If it proves that the problem is not in the reagents, you will have to look into antigen preservation. Is a different fixation due? Or a different embedding medium? Using light microscopical evaluation of the results such questions are answered without tedious EM experimental work. I am having background problems; is this due to the gold conjugate? When specimens are blocked correctly and the right composition and condition of incubation buffer is used, background levels should not be interfering with specific signals. Some background will always exist: to some extent all compounds have a certain affinity for other compounds and depending on availability and concentration an interaction may occur. There is no absolute black and white in this respect. When you leave out the primary antibody incubation and only use the gold step and your background has become much reduced, then your primary antibody causes background. Remedy: purify the primary antibody by either affinity chromatography (in case of an antiserum) and/or by cross-adsorption. If you have unacceptable levels of background without using a primary incubation, then the specimen has a tendency to bind to gold conjugates. Background may have many causes which are centered around three different types of interactions: This website requires cookies to provide all of its features. By using our site, you agree that we use cookies. For more information on what data is contained in the cookies and how you can unsay, please see our Data privacy statement.
{ "pile_set_name": "Pile-CC" }
Waft is an institution engaged in the development of interdisciplinary art in Surabaya. It was founded by a group of local practitioners with various backgrounds of event organizing and art movement. Since the establishment, Waft emphasizes on documentation as a basic idea of sharing information within the scope of art. Waft takes role as educative yet innovative media of dynamic art sphere. To that end, Waft developed basic agenda which stimulate more creativities. They are:
{ "pile_set_name": "Pile-CC" }
KC the tight slut gets what she deserves!!! TributeKing69 FOLLOW 27 1 1569 VIEWS SHARE SAVE FLAG CONTENT
{ "pile_set_name": "OpenWebText2" }
Myenteric ganglionic 5-hydroxytryptamine(1P) signal transmission is mediated via Go protein. The role of G proteins in mediating the signal transduction of the guinea pig myenteric ganglionic 5-hydroxytryptamine (5-HT)1P receptors was examined. Stimulation of ganglionic membranes with 5-HT in the presence of [35S]GTPgammaS or [alpha 32P]GTP increased guanine nucleotide binding to G(alpha)o but not to G(alpha)s, G(alpha)i or G(alpha)q in a concentration-dependent fashion. Pertussis toxin pretreatment markedly reduce this 5-HT induced response. Similarly, the 5-HT1P receptor-mediated slowly developing and long-lasting depolarizing response is potentiated by GTPgammaS and is inhibited by GDPbetaS or pertussis toxin. The activation of G(alpha)o by 5-HT also was mimicked by the 5-HT1P agonist, 5-hydroxyindalpine and was blocked by the selective 5-HT1P antagonist, N-acetyl-5-hydroxytryptophyl-5-hydroxytryptophan amide. These data provide compelling evidence to suggest that transmembrane signaling for the 5-HT1P receptors in isolated myenteric ganglia is transduced by the trimeric Go protein.
{ "pile_set_name": "PubMed Abstracts" }
![](jpmedmentpath69165-0123){#sp1 .277} ![](jpmedmentpath69165-0124){#sp2 .278} ![](jpmedmentpath69165-0125){#sp3 .279} ![](jpmedmentpath69165-0126){#sp4 .280} ![](jpmedmentpath69165-0127){#sp5 .281} ![](jpmedmentpath69165-0128){#sp6 .282} ![](jpmedmentpath69165-0129){#sp7 .283} ![](jpmedmentpath69165-0130){#sp8 .284} ![](jpmedmentpath69165-0131){#sp9 .285} ![](jpmedmentpath69165-0132){#sp10 .286} ![](jpmedmentpath69165-0133){#sp11 .287} ![](jpmedmentpath69165-0134){#sp12 .288} ![](jpmedmentpath69165-0135){#sp13 .289} ![](jpmedmentpath69165-0136){#sp14 .290} ![](jpmedmentpath69165-0137){#sp15 .291} ![](jpmedmentpath69165-0138){#sp16 .292} ![](jpmedmentpath69165-0139){#sp17 .293} ![](jpmedmentpath69165-0140){#sp18 .294} ![](jpmedmentpath69165-0141){#sp19 .295} ![](jpmedmentpath69165-0142){#sp20 .296} ![](jpmedmentpath69165-0143){#sp21 .297} ![](jpmedmentpath69165-0144){#sp22 .298} ![](jpmedmentpath69165-0145){#sp23 .299}
{ "pile_set_name": "PubMed Central" }
One- or Three-Night Stay with Option for a Large Pizza at Landmark Resort in Myrtle Beach, SC Landmark Resort Hotel Splash-Park Resort near Myrtle Beach Attractions The elaborate indoor aquatic facility at Landmark Resort Hotel keeps visitors splishing and splashing even during the winter. Set beneath a glass ceiling, the massive swimming pool centers on a tiled fountain and is augmented by a pint-sized pool for kids and a slowly drifting lazy river for tubers. Just steps from Myrtle Beach, this family-friendly, water-soaked resort makes for a fun-filled home base for exploring the Grand Strand—a popular 60-mile stretch of Carolina beachfront—and its amusement parks, live shows, and white-sand beaches. Each interior guest room has been decorated in a palette of cornflower blue and canary yellow. For dinner, grab a sandwich at the recently renovated Latitudes Grill, where wicker chairs and nautical ropes create a maritime atmosphere. Afterward, families can head out to the recently renovated poolside food-and-beverage area for ice cream or yogurt. In addition to the outdoor park, Landmark Resort has a massive indoor swimming pool, a pintsize pool for kids, five whirlpools, and a slowly drifting lazy river. Myrtle Beach is located along South Carolina's Atlantic coast, making the area a popular destination for surfers, fishers, and kayakers. The city was named one of the best vacation spots in the United States for a family by USA Today, and you’ll find plenty of activities for people of all ages at its wooden boardwalk along the coast. The boardwalk stretches for more than a mile and buzzes with carnival games and amusement-park rides, including the SkyWheel ferris wheel, which boasts glass-floored gondolas and more than a million LED lights. Just 10 miles south of Myrtle Beach, the tiny fishing village of Murrells Inlet provides a tranquil contrast to the boardwalk's hustle and bustle. At Brookgreen Gardens, more than 1,400 original sculptures play freeze tag amid sprawling floral gardens and massive, moss-covered oak trees. Murrells Inlet is also home to the Tom Fazio–designed TPC Myrtle Beach golf course, one of more than 100 courses in the area that help Myrtle Beach earn its title of the seaside golf capital of the world.
{ "pile_set_name": "Pile-CC" }
Non-atheroprotective effects of statins: a systematic review. Since the introduction of HMG-CoA reductase inhibitors (statins) for lowering lipids, a large amount of data has been published demonstrating their potential benefits in conditions as varied as cancer, osteoporosis, and Alzheimer's dementia. We reviewed the published literature on MEDLINE from articles between 1950 and 2008 on the non-atheroprotective effects of statins and noted consistent benefits of statin use in improving outcomes of ventricular arrhythmias, sudden cardiac death, cardiac transplant rejection, chronic obstructive pulmonary disease, and sepsis. However, for these conditions, the level of evidence was inadequate to recommend statin use. The evidence for improving outcomes in atrial fibrillation, mortality in heart failure, contrast-induced nephropathy, cataract, age-related macular degeneration, sub-arachnoid hemorrhage, osteoporosis, dementia, and cancer incidence was conflicting and inconclusive. Furthermore, we found that most of the literature consists of small observational studies and their conclusions are often not corroborated by results from larger or randomized studies. Pending large, well designed, randomized trials, we conclude that there is no definite evidence for the use of statins in any condition besides hyperlipidemia and atherosclerosis.
{ "pile_set_name": "PubMed Abstracts" }
In not-so-shocking-but-certainly-infuriating news, it’s been reported that several big cable television networks have refused to promote the new pro-life anti-Planned Parenthood movie, Unplanned. “It isn’t for lack trying on the part of marketers,” The Hollywood Reporter claimed. “It’s that their “efforts have been consistently rebuffed by TV networks.” Several mainstream channels like HGTV, Lifetime, and Hallmark have straight up rejected advertising for Pureflix’s new movie, so if you’ve been wondering why you’ve only seen ads for the film on Fox News Channel, the promotional fix is in. Oddly enough, this is coming from channels that we regularly consider as providing wholesome, family friendly material. THR reported that, besides FNC, “every other mainstream television outlet has declined to air the ad.” Among these, the Travel Channel, Cooking Channel, HGTV and Food Network, — all owned by Discovery — “refused to sell ad time for Unplanned due to the ‘sensitive nature’ of the movie,” Unplanned’s promoters claimed. Unplanned producer John Sullivan claimed, “We were looking to spend money, but they didn't want to get involved.” The Hallmark Channel and USA Network (NBC Universal) also firmly rejected the film’s ads, objecting to the controversial nature of the movie. Another producer, Joe Knapp, surmised, “Most of the networks didn't go into detail beyond citing the subject matter of the film and that they didn't want to get into politics.” Yeah, maybe. Though it’s not like some of these networks have ever shied away from promoting a certain left wing bias. Lifetime for example, (owned by A&E, a Walt Disney/Hearst Communications Venture) “previously promoted an interview with Scarlett Johansson where she pitches Planned Parenthood.” Sounds about right. It wouldn’t surprise any of us if a Hollywood production about a heroic Cecile Richards was given the promotional works by most of these companies. But then again, we’re just spitballing. While this is highly unfortunate, there are still some good people out there putting some serious cash into promoting the film before it’s March 29 release. THR reported that “along with Fox News, The Christian Broadcast Network accepted ads, as has conservative talk radio, with Glenn Beck taking a particularly active role in promoting the movie.” Also, MyPillow founder Mike Liddell has donated a whopping $1 million of his own to Unplanned in order to get it off the ground amidst promotional woes, including the film receiving an official MPAA R-rating (which the directors have claimed has a political motive,) and being unable to license “mainstream music for the movie.” THR claimed, “a half-dozen major music labels said no to the filmmakers, including Disney, Universal Music, Sony/ATV and Round Hill Music.” Unplanned isn’t the first movie dealing with abortion to be blacklisted this year. Marketing for Gosnell - The Trial of America’s Most Prolific Serial Killer was stymied by The New York Times, NPR, Facebook and Rotten Tomatoes. Unplanned opens across America on Friday, March 29.
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to a method for the compaction of asphalt and a compaction apparatus. More particularly, the present invention relates to a method and apparatus for compacting hot mix asphalt under conditions which advantageously optimize binder flow within the asphalt during compaction. 2. Description of the Related Art By the term “binder” as used throughout this specification is meant any thermoplastic visco-elastic material which may be used in hot mix asphalts. Generally the binder will be bitumen or bituminous, that is a bitumen incorporating, for example polymeric modifiers. It is also known for hot mix asphalt to incorporate polymer binders with no bitumen based binders present, and the present invention extends to the compaction of all such hot mix asphalts. Inherent in modern asphalt mix design for heavy duty applications is the use of components (aggregates and binders) which are purposely selected to resist compaction and loss of shape under heavy traffic. These properties will generally hinder the achievement of the desired compaction during laying of the asphalt. The principal asphalt mix design element to resist compaction under heavy traffic is the use of aggregates with extremely rugose texture and cuboid shape, aimed at providing high shear resistance within the aggregate skeleton. In simple terms the objective is to ensure the physical properties of the aggregate inhibit particle movement and promote “lock up” in the structure under the applied load stress in operation. Stiffer binders such as polymer modified binders are increasingly being used to augment both the shear strength of the mix and also to improve the flexural or fatigue properties of the mix. The achievement of lock up of the aggregate and the distribution of air voids in the mix on compaction and during laying determines asphalt durability and overall performance over the entire range of pavement loadings. Lock up of aggregate is advantageously achieved by displacing the aggregate within the binder during compaction of the asphalt mat. The properties of the asphalt mix are also determined by the visco-elastic properties of its binder. At ambient service temperatures the binder desirably acts as a stiff elastic solid; the response to load in the asphalt mix is very nearly elastic and a rapid load pulse will result in a virtually instant elastic deformation which will recover almost the instant the load is removed. Thus, there is substantially no viscous flow and resultant permanent plastic strain. At the higher temperatures at which asphalt is laid and compacted, the binder in the mix is a visco-elastic fluid. The higher the temperature, the lower the viscosity of the binder and the more readily the binder will deform under any applied stress. The compaction process begins with the laydown of hot asphalt by a paver on a prepared base, usually followed by pressure on the hot asphalt mat applied by a screed (with or without vibration). The screed is a plate or skid carried by the paver which slides over the surface of the asphalt mat desirably at or close to the temperature at which the mat is laid. The screed applies some initial compaction, but by its sliding action may undesirably cause shear stress in the mat leading to tearing of the mat. Typically the applied static screed pressure is in the order of 10 kPa (1.450 psi) to 20 kPa (2.901 psi) and the load duration may be as long as 10–15 seconds. Conventionally, asphalt compaction has been carried out using equipment originally intended for compacting granular non-cohesive materials designed to maximize the compaction energy applied to the material, primarily by using large and heavy steel drum rollers, often in combination with high energy oscillation or vibration. Rubber-tired roller compaction is often used in conjunction with steel drum roller compaction, as described hereinafter. The contact stress between the roller and the asphalt mat generally depends on the stiffness of the asphalt mix which is in turn strongly influenced by the stiffness of the binder. The contact area between the steel drum and the asphalt, that is the length of contact by the width of the roller drum, will diminish as a result of the compaction achievement and the increase in mix stiffness with the cooling of the mat. Typically the mix is at a temperature of about 150° C. (302° F.) when it is laid. In low temperature environments under adverse conditions such as when a strong wind is blowing, it is quite feasible the mix will cool to say 140° C. (284° F.) at the bottom of the layer and 120° C. (248° F.) at the surface before the first compaction pass. The largest dual steel drum vibratory roller compactor presently in general use has a static mass of about 16 tonne (17.6 ton) with each drum having an axial length of about 2 m (6.56 ft). Assuming a nominal 100 mm (3.94 in) contact length in the roller direction (more in the initial pass, less in the final pass), each drum will apply a contact stress of about 400 kPa (58.015) static and considerably more with vibration. In fact, each drum may apply a contact stress from about 100 kPa (14.504 psi) in a first static breakdown pass to well over 1000 kPa (145.038 psi) as the asphalt mix stiffness and the contact area reduces. Compaction by the roller compactor usually occurs at varying distances, up to several hundred meters, behind the paver and at speeds of about 1.1 m/s (3.61 ft/s) (4 km/h (2.49 mph)) or more. The two drums of the roller compactor each having the above nominal contact length of 100 mm (3.94 in) and therefore the roller will typically be in contact with any part of the asphalt mat for about 0.2 seconds in each pass. Typically, about four steel roller passes are used, giving a total load time of about 0.8 seconds. The roller compactor typically vibrates at about 20 Hz, which at temperatures of 140° C. (284° F.) and 120° C. (248° F.) corresponds to relatively high binder stiffness (shown by Van der Poel's nomograph) of about 0.2 kPa (0.029 psi) and 1 kPa (0.145 psi) respectively (each 20° C. (68° F.)) reduction in temperature has about a 5 fold increase in bitumen stiffness). As described above, the surface temperature of the mat may fall to temperatures of about 120° C. (248° F.) before the roller compaction process is begun. The compaction process may typically include up to 4 roller compactor passes, by which time the mat surface temperature may be in the range 80 C (176° F.)–90° C. (194° F.). At mat temperatures below about 120° C. (248° F.) cracking of the mat may be initiated in the mat at high contact stresses, particularly at stresses induced using vibration-Mat cracking typically occurs when the applied stress induces strain in the binder in excess of its yield strength. At temperatures considerably above 120° C. (248° F.) conventional roller compaction may lead to significant shear failure in the mat, depending on the asphalt mix type. This may result in the mat being displaced laterally with loss of level and shape and ultimately in de-compaction of the mat. Roller cracking resulting from low mat temperatures is usually manifest as fine, parallel cracks in the asphalt mat which are transverse to the direction of rolling. A multi-wheeled rubber-tired roller following the vibratory roller compactor is commonly used to apply a kneading/shearing action to at least the surface of the compacted asphalt mat, and thereby complete the compaction of the mat. Such rubber-tired rolling is thought to close steel roller induced cracks, at least at the surface of the asphalt mat, and increases surface texture by compressing the asphalt mortar between any coarse aggregate particles. Water is applied to the tires of the rubber-tired roller during rolling to alleviate material pick-up. However, although the cracks may be closed at the surface this water may inadvertently be injected into the cracks before they are sealed, forming encapsulated water deposits beneath the surface of the asphalt mat. Encapsulated water may inhibit healing or encourage stripping in the asphalt mat. U.S. Pat. Nos. 4,661,011 and 4,737,050 claim to alleviate roller-induced cracking in the asphalt mat by use of an asphalt compaction machine in which pressure is applied to the asphalt mat through an endless elastomeric belt extending between two rollers. The machine is configured to apply a more uniform pressure over the area of the belt in contact with the asphalt mat. It has now been recognized in accordance with the present invention that in a visco-elastic fluid, such as the binder in a hot mix asphalt, the response to load is not only temperature dependent but also time dependent. Thus, the application of a load of short duration will result in an asphalt response which is more elastic than viscous as the binder simply does not have time to flow. Therefore, using a vibratory roller compactor at an accepted loading rate in the order of 20 Hz, the binder in the asphalt mix reacts during compaction more as an elastic solid than as a viscous fluid and the compaction attempts to force the aggregate through the binder into a more compact arrangement, rather than causing the binder to flow around the aggregate with consequent movement of the aggregate. The previously mentioned Van der Poel nomograph provides an estimate of the stiffness of standard bitumen grades at selected rates of load application and temperature. Even though the nomograph is well known to those skilled in the art of asphalt compaction, the disadvantages of applying compaction loads of short duration have not previously been fully recognized and short duration compaction using rollers with both steel and rubber interfaces, with or without vibration, has continued to be the accepted practice. It may now be recognized that by using the belt compactor of the aforementioned U.S. Patents, improved compaction can be achieved by inducing viscous flow of the binder. Test uses of the belt compactor are described, for example, by Halim OAE et al in “Improving the Properties of Asphalt Pavement Through the Use of AMIR Compactor: Laboratory and Field Verification”, 7th International Conference on Asphalt Pavements, Nottingham, 1992. However, no recognition is given to the advantages of longer load times. The described belt compactor may apply a load stress of only about 5% of the aforementioned 16 tonne (17.6 ton) roller compactor under static load, but assuming conventional advancement rates are used the load may be applied over a longer duration than a roller compactor due to the increased contact length of the belt. For a contact length of 1.25 m (4.10 ft) as described in the aforementioned paper and atypical compaction speed of about 1.1 m/s (3.61 ft/s), the load duration will be about 1.1 sec. Using Van der Poel's nomograph, this increased load duration can be shown to reduce the binder stiffness at 120° C. (248° F.) from about 1000 Pa (0.145038 psi) for the aforementioned conventional vibrating roller compaction to about 5 Pa (0.000725 psi) for the belt compactor.
{ "pile_set_name": "USPTO Backgrounds" }
Monitoring with an eye towards cost-effectiveness in the Pacific Groundfish fishery In the Pacific, electronic monitoring (EM) research is currently focused on individual accountability of both catch and bycatch in the trawl catch share fishery. Since 2011, vessels in this fishery have been required to carry an on board observer. Additionally, the crew of each vessel operates a vessel monitoring system (VMS), submits logbooks, and reports 100% of landings. This comprehensive program, along with individual fishing quotas (IFQs), has proven to be an effective approach to managing the fishery. This success is evidenced by a decrease in catch of overfished and rebuilding species, as well as a significant reduction in unwanted catch, or “discards.” Why Electronic Monitoring? The West Coast Groundfish monitoring program is working well, but its high costs could push some of the smaller vessels out of the fishery, especially those that operate out of remote locations where it is difficult to deploy fisheries observers. EDF’s Pacific Ocean team, along with many other stakeholders, is working with the Pacific Fishery Management Council to identify and approve appropriate electronic monitoring options. The integration of EM into the Pacific groundfish monitoring program is expected to help reduce costs and increase operational flexibility while maintaining high levels of accountability. Preliminary EM Research Results: Pacific States Marine Fisheries Commission (PSFMC) has overseen EM research with various portions of the groundfish fleet since March 2012. Results of the 2012 research from whiting (midwater trawl) and shoreside groundfish (longline, pot and trap) vessels were released at the Pacific Fisheries Management Council meeting in June 2013, highlighting key factors to be considered to ensure successful deployment of EM, including: Hardware makes a difference. Digital cameras (as opposed to analog cameras) facilitate the accurate identification of fish species. Vessels will also need to have an adequate power supply to avoid situations necessitating powering down an EM system during a fishing trip. Communication is key. Feedback between data analysts/program managers and the captain/crew is needed to ensure: catch handling protocols are appropriate for the vessel and the camera locations; equipment is properly maintained; and that cameras are not obstructed during fishing operations. This collaboration is essential for developing vessel-specific monitoring plans. Define your terms. A clear definition and expectation of what constitutes “catch” and “discard” is necessary to accurately compare EM and observer collected data. Data drives it. The duration of a fishing trip and fishing activities will determine the amount of data to be recorded and stored. Knowing data storage needs in advance will ensure hard drive capacity is not exceeded, which can result in the inadvertent loss of data. Size matters. Knowing the dimensions of the vessel and fishing gear can assist data reviewers in calculating volumetric estimates of catch. Next Steps: PSMFC and Archipelago Marine Research are currently working with 14 fishing vessels to continue EM research. Likewise, the Pacific Fishery Management Council is on track to tackle regulatory aspects of implementing EM in the groundfish fishery. Starting this week, the Pacific Fishery Management Council is meeting to adopt a range of alternatives for EM regulations, with the goal of implementing electronic monitoring for major segments of the groundfish catch share fishery by January 1, 2015. To accomplish this work, the Council established two ad-hoc EM advisory committees, one of which I serve on along with stakeholders from the Pacific Groundfish fishery. A calendar of the Pacific Council’s EM-related work can be found here. Although a timeline has been established, much work remains to complete the Pacific regional implementation plan and resolve some of the logistical and political challenges to putting a fully operational EM program in place. Given the importance of fishery-dependent data to fishery management, and the need for cost-efficient means to monitor fishing activities, EDF will continue to support the adoption of EM and other technological solutions in the Pacific and nationally.
{ "pile_set_name": "Pile-CC" }
Summary: “I will forgive-but I will not forget” is a well worn out phrase some people often use. Even the smallest of offenses can cause someone to carry a grudge against another person. “I will forgive-but I will not forget” is a well worn out phrase some people often use. Even the smallest of offenses can cause someone to carry a grudge against another person. The Lord’s Prayer is repeated by some with all most no thought to the intensity of those words spoken in the prayer. I want to focus on the part of that prayer that says … “And forgive us our trespasses as we forgive those who trespass against us.” Take for a second and think of the gravity of those words you just spoke in prayer. Repeat those words quietly to yourself this time. When you ask God to forgive you of your sins and mistakes I am sure you are being sincere. However it seems that we mumble and quickly speed up when we get to the line right after that says, “We FORGIVE those who trespass against us.” “FORGIVE” That is a six-letter word that some have problems with. I looked up the word to really get a good grasp on its meaning and this is what I found: 1. Stop being angry about something: to stop being angry about or resenting somebody or somebody’s behavior 2. Pardon: to excuse somebody for a mistake, misunderstanding, wrongdoing, or an inappropriateness 3. Cancel obligation: such as a debt Pardon, excuse, forgive and forget, let off, absolve, exonerate Some of you here today can say to me; · “Mil you do not know how such and such treated me.” · “You just don’t know the terrible things they said about me behind my back” · “What that person did to me was uncalled for, I did nothing to them” Do those words sound familiar? Have you said something like this at one time or another? "Be angry, and do not sin": do not let the sun go down on your wrath, nor give place to the devil. Be honest. When some one has said or done something to you, haven’t you maybe tried to devise a way to get even with that person? Well when we attempt to “get even” this is where the enemy gets a major foothold to create havoc in your life. When someone does or says hurtful things we have a tendency to talk to others about how some one just did us in. Actually what we are doing is trying to get others to also turn against the person who did the offense. “Misery loves company” as the saying goes. A part of Proverbs 6 talks about the things that God hates and a part of the verse says: A heart that devises wicked plans, Feet that are swift in running to evil So in our heart we devise “wicked plans”. Stories of an offense can stretch to gigantic proportions. Once I saw a mouse and this mouse was climbing the side of this shelf. Well when I went to relay this episode to my Pastor, instead of describing by my hand a mouse of 2-3 inches long. I stretched my hands wide to describe a Godzilla mouse. Kind of like the fish story. Whenever a fisherman tells his story of either his catch or loses of the fish, it always grows in size. Before you know it seems like the fisherman caught Moby Dick out of little stream. Offenses are like fish stories; they can grow to a Moby Dick proportion. Even if you don’t stretch the facts of the story, the person you just told it to will either add or delete a detail to it.
{ "pile_set_name": "Pile-CC" }
In 1971, a teenage boy from Cheetham Hill applied to work at Manchester town hall, fresh out of school. Howard Bernstein was hired on an annual wage of around £500 into a role that bore little relation to his aspirations of public service. “I saw working in the town hall as an interesting prospect,” he recollects. “My first job was being given a big bowl of cups and being told to go and wash them. Which was a bit of a culture shock, because I’d never washed anything in my life.” It’s probably safe to say that whoever handed him that bowl of cups could never in their wildest dreams have predicted what the 18-year-old office dogsbody would go on to achieve. Forty-five years later, as he prepares to step down from the very top of the town hall ladder, here are just a few of the projects bearing Sir Howard Bernstein’s stamp: the regeneration of Hulme (‘one of the most important experiences of my life’); the Commonwealth Games; the success of Manchester Airport; the rebuild after 1996’s IRA bomb; the Metrolink; the Bridgewater Hall; devolution. All of which – and more – have earned him a reputation as the most powerful civil servant outside of Whitehall and doubtless more powerful than a fair few there to boot. A wheeler, a dealer, a persuader. He has been described more than once as Greater Manchester’s most powerful politician – only half-jokingly – thanks to his shrewdness and renowned ability to get things done. And yet he remains an enigma to many: the man who rose from a humble start to become synonymous with Manchester’s millennial renaissance. Howard Bernstein was born into a Jewish family in Cheetham Hill in 1953, the older of two brothers. His dad Maurice – whose parents had emigrated from Russia in the 1900s – sold raincoats on Cheetham Hill Road, above the laundrette opposite the library. A Jewish upbringing - at a time when the war was still fresh in the collective memory - would come to shape his outlook, one which in turn would come to shape his home city. “My father was always very... not political, but very socially aware,” he says. “I think most Jewish families were in that era, from where they came from, and where their parents came from. “Being in a community was fundamental. Treating people with respect, working across the community – that always was seen as being very, very important.” Even as a teenager, Bernstein was interested in public service, particularly in economics. It became apparent fairly quickly that he was not destined to wash pots. “I lasted about three months in that job and they moved me to the legal department, where I became a junior there, doing the post and serving a whole range of lawyers. I always remember the assistant chief executive – I had to come in and make his tea in the morning. I got so fed up with him I decided I wasn’t going to make his tea.” From there he moved into conveyancing: “One of the most boring jobs I have ever done in my life. They gave me work which I managed to do in about half an hour. They all thought it was incredibly complicated, but it wasn’t.” It would be partly that streak of bravado – and impatience – that would spur him up the echelons of a town hall that in the 1970s looked very different. The women were only there to do the filing. The clerks all had ‘stiff collars’, he remembers, and everyone referred to each other by ‘Mr this or Mr that’. By the time Graham Stringer came to lead the council in 1984, Bernstein was a junior officer. Stringer remembers being impressed, on taking over, by his energy in fighting Stansted Airport over unfair competition. “It’s ironic that he ended up masterminding the takeover of Stansted,” he notes. The pair, says Bernstein, became ‘soul mates’ in the years that followed. Manchester was about to reinvent itself. “Manchester during the 1980s was a very different place,” says Bernstein. “We’d just lost our way. We didn’t really have an economic policy. We certainly didn’t work with the government. Then Graham came in and I think revolutionised – over time – the thinking.” Between them they embarked on a different relationship with the private sector, effectively starting from scratch after years of underinvestment. It was in these years that plans were hatched for a whole host of regeneration projects: the Bridgewater Hall, the Metrolink, the Free Trade Hall, all radical approaches to business at the time that would eventually come to fruition in the 1990s. Bernstein would also become central to forging a new relationship with Whitehall after – by 1987 – years of Labour’s political battles with Thatcher had ultimately led nowhere. (Image: PA) Manchester is now well-known for its working with the current government, an enigma many struggle to understand: a partnership between a virtually 100pc Labour council and a right-wing Treasury. But it started far earlier, a decade before the IRA hatched its plot to blow up the Arndale – and when George Osborne was still doing his O-Levels. “You have got to work with the government, because of the entirely centralised way they deal with power,” says Bernstein. “You could have the Liverpool approach, which in the 1980s was conflict. Or you could recognise that there were serious shortcomings in national policies and try to overcome them by persuading them and working with them where you can. I think we got there on that.” Michael Heseltine was key. They would work together first on the regeneration of Hulme in 1991 and later on the post-IRA plans in 1996. Bernstein speaks of him as an ‘innovative thinker’ – and Hulme as one of his own proudest moments. “I took Heseltine around Hulme last year. He was quite moved by it,” he says. “I think there’s something quite chastening about have turned around a failing neighbourhood, transforming people’s lives. I can remember when we were on our knees pleading of Asda to open a superstore there. “Now it’s one of their best performers.” At the same time Manchester was bidding for the 2000 Olympic games. That did not come off, but it did provide the city’s medal-busting velodrome. And visits to Barcelona – host of the 1992 games – taught Bernstein and Stringer not only how to bid for a major sporting event but how to persuade. Those powers of persuasion would be quickly tested, weeks after new council leader Richard Leese took over from Stringer in 1996. As they were working up plans to reshape the city centre, someone else did it for them. “I was at a wedding in North Manchester. I heard the bomb,” says Bernstein of June 15, 1996. “There was shock. It was appalling, really. “It was like those eerie films from the 60s of what a nuclear bomb might look like, the radios still playing in hairdressing salons, no-one around in the entire city. “I thought: ‘Wow’. This is going to take some herculean effort to get this back together. I was angry and upset.” The complexities of the rebuild were the ‘biggest intellectual challenge’ he has ever faced, he says. Securing the money – nearly £100m famously agreed by Michael Heseltine in the time it took for Bernstein and Leese to get a taxi from his Westminster office to Euston station – was the easy bit. The struggle would be in assembling all the different bits of land from different owners. How did he – does he – persuade people to do things they don’t initially want to do? “You get them to focus on the bigger picture. I put the city first. I make clear if you don’t want to do it, make way for somebody who does,” he says. His determination and cajoling, a mixture of hard and soft power, would eventually see the Arndale taken over by the Prudential, who were sympathetic to the plans – removing a key barrier to the rebuild. The Commonwealth Games would not be plain sailing, either. After 9/11 the event’s security bill shot up overnight, leaving them with a £100m black hole. “We were in deep sh*t, if I’m being frank,” he says. The council had to go ‘cap in hand’ to the Blair government, but with the help of friendly ministers – including Ian McCartney – and more cajoling they were given the cash and sent on their way. The games remain one of his proudest moments to this day, and that of Sir Richard Leese. “Without Manchester and the Commonwealth Games there would never have been a London Olympics,” notes Bernstein. But it was a tough time, he says, ‘probably the most difficult two years of my life’. In the year leading up to it, Bernstein lost both his parents. They would never see him get his knighthood in 2003. “That is a major regret of my life that mum and dad weren’t here to see that,” he admits. “But having said that, being made president of Manchester City would have made them even prouder.” His working relationship with his beloved club and its latterly Middle Eastern owners would pay dividends, too. In the late 1990s, well before the games took place, he ensured the Blues would provide a sustainable future for what would initially be known as the City of Manchester stadium. But it went further than that - City's commitment to the area would start with the regeneration of Eastlands and go on to include a £1bn investment in housing for north and east Manchester over the next decade. It was the kind of deal not many council chief executives probably spend their time planning. Inevitably, not everything has gone right in the last 45 years. Although he is absolutely adamant he has no regrets professionally, ask him about the congestion charge and he tussles with the question. “Intellectually, it was right. We should never have gone to the referendum. It was a political failure. “It was exactly the right strategy. Do I regret it? I gave so much to that... Was it a mistake? Yes, because it was a classic example of focusing on the intellectual stuff rather than facing up to the day to day political and practical implications.” And he still thinks the BBC should have moved to Manchester, not Salford. “I think it could have been better. I’m not saying it’s not great where it is now, but I think a city centre location would have been the best location.” Nevertheless, he points out, Manchester’s Plan B – the Sharp Project in Newton Heath – has been phenomenally successful. Criticism has nevertheless been levelled at Manchester’s performance in areas outside of the city’s high profile regeneration and capital projects. In 2014 its children’s services received a damning Ofsted inspection, a failure that perhaps in other cities would have tarnished the chief executive’s reputation more than it has done Bernstein’s. At the time of writing, inspectors were due back in any day. Is this, perhaps, a regret? “No. I think we are on an improvement journey,” he says, adding that Ofsted’s report was a criticism not only of the council but other public child protection services such as health and police. “I’m very confident in the long term future.” Perhaps one of the defining characteristics of Bernstein’s career has been the ability to get back up again, to find a way through, particularly to find a Plan B. Council leader Sir Richard Leese – whose partnership with Bernstein since he was made chief executive in 1998 is unrivalled anywhere in government – admits there has to be more to his success than hard work. Again, it comes down to the art of persuasion. “It’s that ability to bring people together and come out with a shared plan. He is always described as the deal-maker – and it’s the ability to talk to a whole range of people and come out with a shared objective. Although the outcomes appear dramatic, getting there is generally very prosaic.” And then, always, it’s on to the next thing. “People who know me understand I never look backwards,” says Bernstein. “I only ever look forwards. You are only as good as your last failure.” That constant drive forwards is borne, he admits, of obsessiveness. “I’m pretty driven. If an email goes unanswered for half an hour they probably think ‘he’s lost his focus’. I am obsessive. “If somebody annoys me it takes me three hours to get over it. That’s as much the case today as it was 20 years ago. Sometimes I just don’t understand why people don’t agree with me.” That enduring impatience is underpinned by the fierce, visceral pride in a home city that shares many of his characteristics: canniness, ambition, that streak of bravado. And none of that is likely to diminish once he is no longer in the town hall. Standing down from the council in no way constitutes a retirement, he insists - and neither his wife Vanessa, nor his two children and three step-children, now expect him to 'sit about the house'. But Manchester is still the only place he would consider working. “It’s my city. I’ve always been a proud Manc. I’ve always regarded this place as the most cosmopolitan, the most successful city about. “For a Jewish guy to become chief executive of the city council and never once in his entire career experience any kind of racism or prejudice – I find that quite remarkable. I think that speaks a lot about this city. “I could never do another job in another place because it would never, ever have the same... I could never, ever create the same commitment. “If you chopped off people’s hands here they’d have Manchester through it. I think people here are different.”
{ "pile_set_name": "OpenWebText2" }
Q: Eclipse RCP Fragment How to Build library.jar I have a plug-in fragment which contributes a jar file to the host plug-in, following these instructions. It works by creating a file library.jar which is specified in build.properties and associated with a directory which contains the source to be built. It all works as expected, except I can't figure out how to cause library.jar to be created in Eclipse. When I run a Maven build that points to my fragment project and includes it as a module, the file library.jar shows up in the project directory. But building or cleaning the project in eclipse does not create the file. I want other developers to be able to generate library.jar in their Eclipse workspace without running the Maven build. I'm really surprised that the Maven build creates libary.jar in the plug-in project itself, and not just in the product created in the build target. There should be a way to get Eclipse to do this without running the Maven build. EDIT: build.properties: bin.includes = META-INF/,\ library.jar source.library.jar = src/ MANIFEST.MF: Manifest-Version: 1.0 Bundle-ManifestVersion: 2 Bundle-Name: Custom Bundle-SymbolicName: org.python.pydev.custom Bundle-Version: 1.0.0.qualifier Fragment-Host: org.python.pydev;bundle-version="5.1.2" Bundle-RequiredExecutionEnvironment: JavaSE-1.8 Eclipse-PatchFragment: true Bundle-ClassPath: library.jar, . Require-Bundle: org.python.pydev.debug;bundle-version="5.5.0", org.eclipse.cdt.debug.core;bundle-version="8.0.0", org.apache.log4j A: Eclipse will build the library.jar rather than putting the class files in the normal place when the build.properties file looks like: bin.includes = META-INF/,\ library.jar source.library.jar = src/ The library.jar entry in the bin.includes replaces the normal . entry. The source.library.jar entry says that the Java files in the src directly should be put in the library.jar. The Bundle-Classpath entry in your MANIFEST.MF should be: Bundle-ClassPath: library.jar (so no '.' entry)
{ "pile_set_name": "StackExchange" }
Mizpah, New Jersey Mizpah is an unincorporated community located within the Mays Landing section of Hamilton Township, in Atlantic County, New Jersey, United States. Mizpah was established as a Jewish colony in southern New Jersey and was planned out by a New York firm of cloak makers. It originally had a factory, 30 houses, and about 100 settlers. Uncle Dewey's is a popular barbecue stand located in Mizpah, along U.S. Route 40. Notable people People who were born in, residents of, or otherwise closely associated with Hamilton Township include: Shameka Marshall (born 1983), long jumper who won the gold medal at the 2007 NACAC Championships in Athletics. References Category:Hamilton Township, Atlantic County, New Jersey Category:Unincorporated communities in Atlantic County, New Jersey
{ "pile_set_name": "Wikipedia (en)" }
/* * Copyright 2014 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.gradle.plugins.ide.internal.resolver.model; import org.gradle.api.artifacts.Configuration; import java.io.File; public class UnresolvedIdeRepoFileDependency extends IdeExtendedRepoFileDependency { private Exception problem; public UnresolvedIdeRepoFileDependency(Configuration declaredConfiguration, File file) { super(declaredConfiguration, file); } public Exception getProblem() { return problem; } public void setProblem(Exception problem) { this.problem = problem; } }
{ "pile_set_name": "Github" }
--- abstract: 'We have identified a new class of galaxy cluster using data from the Galaxy Zoo project. These clusters are rare, and thus have apparently gone unnoticed before, despite their unusual properties. They appear especially anomalous when the morphological properties of their component galaxies are considered. Their identification therefore depends upon the visual inspection of large numbers of galaxies, a feat which has only recently been made possible by Galaxy Zoo, together with the Sloan Digital Sky Survey. We present the basic properties of our cluster sample, and discuss possible formation scenarios and implications for cosmology.' author: - | Marven F. Pedbost,$^{1}$[^1] Trillean Pomalgu,$^{1}$ and the Galaxy Zoo team\ $^{1}$Institute of Cosmology, University of Brentwood, Brentwood, Essex, HG4 2TG, UK. --- \[firstpage\] galaxies: clusters: general — galaxies: structure — galaxies: fundamental parameters Introduction ============ For nearly as long as it has been recognised that galaxies are stellar systems external to our own, we have known that they are not distributed randomly throughout space, but tend to cluster together [@hubble]. This structure is now well understood by the amplifying influence of gravity on small scale fluctuations in the early universe. We are able to predict, both through simulations and analytically, the clustering of the collisionless dark matter component that is inferred to exist from a range of observations. It is an important and popular fact that the initially smooth matter distribution collapses to form haloes, roughly spherical in shape, though with some ellipsoidal or triaxial distortions. These high density haloes are joined by lower density filaments, along which smaller haloes move, to be eventually accreted by the larger haloes, which thus grow more massive with time [@bubble]. Although the dark matter component is well understood, the behaviour of baryonic matter is necessarily more complicated. On large scales it is expected to follow the dark matter, and hydrodynamical simulations demonstrate this. However, on small scales the density field evolves non-linearly and the densities are such that gas physics and feedback from collapsed baryonic objects, such as stars and black holes, become important. On the scale of galaxy clusters the interplay between gas and dark matter may cause the density profiles and shapes of haloes to vary from those predicted by models based on dark matter alone. In the regime of galaxies, this becomes even more likely, as here baryons dominate the matter density. Observationally, clusters are found to host galaxy populations quite different to the Universal average. Their members tend to have red colours and suppressed or entirely absent star-formation. They also mostly possess smooth, early type morphologies, particularly toward the centre of a cluster. This can partly be explained by the preference for clusters to host the most massive galaxies, together with the observation that more massive galaxies are more likely to be red, passive and elliptical in any environment [@toil]. However, there remains a large population of lower-mass galaxies in clusters whose “red and dead” condition is in stark contrast with the properties of their counterparts in the field. At higher redshifts, this dichotomy between cluster and field galaxy populations appears to diminish, with a growing proportion of clusters containing significant starforming components [@trouble]. At $z \ga 1$ it even appears to reverse, with clusters hosting the most actively starforming objects. An unusual galaxy cluster ========================= ![image](fig1.ps){width="\textwidth"}\ Given the typical properties of galaxy clusters as described above, the existence, at low redshift ($z \sim 0.05$), of the structure displayed in Fig. \[fig1\] is somewhat surprising. Our attention was called to this cluster by the community of Galaxy Zoo participants, who fortuitously recognised its unusual properties whilst classifying its individual galaxies. The overdensity of galaxies clearly identifies this structure as a rich galaxy cluster, however it possesses strikingly different properties compared to typical clusters of this richness. One of the most distinctive aspects of this cluster is the morphologies and colours of its component galaxies. Many of its members have blue colours and show clear evidence of spiral morphology, even if the spiral arms are often disturbed. These disturbed morphologies are probably the result of a high frequency of close pairs and merging systems. Such a high fraction of merging systems is unexpected for high mass clusters due to the large velocity dispersion, and much more typical of lower mass galaxy groups. Another unusual aspect is the morphology of the cluster as a whole. The structure is rather linear, and boxy, reminiscent of the filaments seen in N-body simulations. However, the observed galaxy density is far higher than seen in simulations of filaments. There is no obvious central concentration of the number density or luminosity profile, unlike any normal cluster of this richness. Weak lensing and x-ray data may assist in understanding this cluster’s strange appearance, by adding information on the distribution of the cluster’s dark matter and gas content. Finally, but perhaps most surprising, is that upon detailed inspection, the morphologies of individual galaxies and close systems approximate the familiar geometric shapes of letters of the basic modern Latin alphabet. From East to West and North to South, respectively, these shapes may be represented as “w e a p o l o g i s e f o r t h e i n c o n v e n i e n c e”. Although galaxies displaying morphologies corresponding to Latin characters have been noticed before, ‘S’ and ‘Z’ being particularly common, a localised collection of this size is highly improbable. A close visual inspection suggests that the galaxy distribution exhibits an element of substructure. The galaxies appear to divide into five distinct groups. These are: Group I: “w e”, Group II: “a p o l o g i s e”, Group III: “f o r”, Group IV: “t h e”, and Group V: “i n c o n v e n i e n c e”. These may be familiar to the reader as common words of the English language. The appearance of rational English within an astrophysical system is widely regarded as impossible. Furthermore, the event that an arrangement of galaxies should express regret would be considered by many to be ludicrous. The data could be disregarded simply as a statistical anomaly, an unlikely occurrence which just happens to have occurred. Space is, after all, not only big, but really big, and full of really surprising things. The authors, however, maintain that, since it is observed, the cluster requires explanation. It remains a possibility that previous estimates of the likelihood of such events have been grossly underestimated and no fundamentally new physics is required to explain this observation. Although current cosmological simulations are not known to produce English sentences on cluster scales, there has been little effort to test this, and in particular a lack of visual inspection. It is plausible that with suitably chosen prescriptions, semi-analytic models could reproduce an abundance of clusters similar to those presented in this paper. On the other hand, many would attribute a much deeper meaning to the appearance of this cluster. Firstly, the occurrence of these phenomena could potentially lend support to some of the more exotic models for Dark Energy or modified gravity, if they are able to predict such structures. More controversially, as most occurrences of English sentences are considered to be the work of intelligent beings, the existence of these messages might indicate intelligent life beyond our own. The scale of the messages would require a lifeform with abilities far beyond those currently possessed by humans, and even beyond those which we could realistically expect to acquire; implying the existence of an intelligent being with extraordinary powers. Indeed, another appearance of exactly the same message has been previously reported in the hotly debated work by @adams, where the text is interpreted as God’s final message to His creation. Additional examples =================== ![image](fig2.ps){width="\textwidth"}\ The significance of the cluster discussed in the previous section is modified somewhat by the discovery of additional examples of clusters belonging to this unusual class. These share many properties with the prototype, as is clear from Figs. \[fig2\] & \[fig3\]. In particular, both exhibit natural subgroups of galaxies with morphologies that conspire to resemble English words. The cluster in Fig. \[fig2\] exhibits the natural sub-structure groups “c a u t i o n !”, “s t r u c t u r e”, “f o r m a t i o n”, “i n”, “p r o g r e s s”, whereas the cluster shown in Fig. \[fig3\] is apparently another warning, comprising the groups “D e l a y s”, “p o s s i b l e”, “f o r”, “7 Gyr”. Each of the additional clusters demonstrates new features, compared with Fig. \[fig1\]. The cluster in Fig. \[fig2\] appears to contain punctuation, in the form of an exclamation mark. The cluster in Fig. \[fig3\], on the other hand, includes the first unambiguous appearance of a capital letter, “D”, a numeral, “7”, and an abbreviated unit “Gyr”. In addition, the latter figure demonstrates a notable left-hand justification across multiple lines. Individually, these two further clusters present the same problems as the first when considered within the context of currently well-regarded cosmologies. In such models, clusters that form sensible English phrases are generally regarded as impossible. The three known instances, presented here, thus appear to constitute an event that would traditionally be viewed as really not very likely at all. Their discovery also suggests the possibility of other messages, not yet identified, and in particular the potential existence of a similar clusters, utilising other languages and alphabets. When considered collectively, the various examples presented here of this “unusual” class, seem to suggest a possible common theme, being reminiscent of the familiar local phenomenon of road works [@roadworks]. Making this identification, the message in Fig. \[fig1\] may then be understood as a general acknowledgement of blame for the specific problems conveyed in Figs. \[fig2\] and \[fig3\]. Thus, these vivid messages are apparently not to be understood as, in the paradigm of @adams, a message from God, but rather a notification of the common frustrations that one group of intelligent beings imposes on other intelligent beings in the name of progress, or even, simply, basic maintenance of former progress. Such a model, however, must evoke the existence of other, so called, “intelligent beings” beyond our own planet. While regarded by many to be a good long-term bet, current evidence for the existence of extra-terrestrial life is in seriously short supply. Even the predictions of how much intelligent life we might reasonably expect to find are ambiguous at best. Indeed, some of the most rigorous arguments on the subject actually find in favour of a total absence of intelligent life of any kind [@universe]. A suitably advanced civilisation capable of fashioning galactic sized structures into directed notifications, therefore, tends towards the absurd. From this vantage, we cannot exclude the alternative that the appearance of familiar English phrases of unified sense in large scale cluster morphologies are anything more than chance occurrences, which one might hope to better understand via future insights into probability theory or cosmology. If we interpret these unusual clusters in this manner, we must necessarily re-evaluate our understanding of their local counterparts [@roadworks]. Observations that hitherto had been taken as certain indications the presence of intelligent life are then reduced to nothing more than the product of pure chance. ![\[fig3\] SDSS colour composite image ($vri$) for another unusual galaxy cluster, at $\rmn{RA}=27^{\rmn{h}}10^{\rmn{m}}99^{\rmn{s}}$, $\rmn{Dec}=-97\degr 71\arcmin 23\arcsec$, identified by Galaxy Zoo participants. Orientation as Fig. \[fig1\].](fig3.ps "fig:"){width="45.00000%"}\ Conclusions =========== Thanks to the visual inspection of SDSS images afforded by the Galaxy Zoo project, we have identified a new class of galaxy clusters which possess number of unusual properties. These clusters are unusually elongated, possess young and highly dynamic galaxy populations, and most unexpectedly, present neatly typeset, left-justified, messages written in the English language. One interpretation for the existence of these galaxy clusters is as conclusive evidence for intelligent life elsewhere in the universe. Conversely, however, they could indicate that many phenomena usually attributed to intelligent life on Earth actually occur spontaneously, without any thought necessarily being involved at all. Acknowledgements {#acknowledgements .unnumbered} ================ This work has been made possible by the participation of many members of the public in visually classifying SDSS galaxies on the Galaxy Zoo website. Their contributions, many individually acknowledged at http://www.galaxyzoo.org/Volunteers.aspx, have produced a number of published scientific papers, with many more yet to come. This article is particularly indebted to those who have tirelessly sought out odd and unusual objects and brought them to general attention on the Galaxy Zoo Forum.[^2] We thank them for their extraordinary efforts in making this project a success. We are also grateful to various members of the media, both traditional and online, for helping to bring this project to the public’s attention. Funding for the Sloan Digital Sky Survey (SDSS) and SDSS-II has been provided by the Alfred P. Sloan Foundation, the Participating Institutions, the National Science Foundation, the U.S. Department of Energy, the National Aeronautics and Space Administration, the Japanese Monbukagakusho, and the Max Planck Society, and the Higher Education Funding Council for England. The SDSS Web site is http://www.sdss.org/. The SDSS is managed by the Astrophysical Research Consortium (ARC) for the Participating Institutions. The Participating Institutions are the American Museum of Natural History, Astrophysical Institute Potsdam, University of Basel, University of Cambridge, Case Western Reserve University, The University of Chicago, Drexel University, Fermilab, the Institute for Advanced Study, the Japan Participation Group, The Johns Hopkins University, the Joint Institute for Nuclear Astrophysics, the Kavli Institute for Particle Astrophysics and Cosmology, the Korean Scientist Group, the Chinese Academy of Sciences (LAMOST), Los Alamos National Laboratory, the Max-Planck-Institute for Astronomy (MPIA), the Max-Planck-Institute for Astrophysics (MPA), New Mexico State University, Ohio State University, University of Pittsburgh, University of Portsmouth, Princeton University, the United States Naval Observatory, and the University of Washington. Adams D., 1985, “So Long, and Thanks for All the Fish”, London: Pan Books Aunty B.B.C., 2009,\ [http://www.bbc.co.uk/cult/hitchhikers/guide/universe.shtml]{} Boubl[' e]{} B., 1960, Csi, 42, 42 Transport D.F., 2005,\ [http://www.dft.gov.uk/pgr/roads/tss/workingdrawings/roadworksp7000series/]{} Hubble E. P., 1932, Sci, 75, 24 Toil T., 1980, Tat., 666, 999 Trobble T., 2000, AjP., 123, 456 \[lastpage\] [^1]: E-mail: team@galaxyzoo.org [^2]: We stress that, despite their implausible appearance, the galaxies comprising each character in the figures presented in this paper are taken directly from the SDSS multicolour composite imaging. Note, however, that some degree of translation and rotation has been performed to the individual characters, for presentation purposes.
{ "pile_set_name": "ArXiv" }
Q: Linux server compatibility questions I'm replacing an ancient server I have at home. The old machine is currently running Windows 2000 Server edition. It's an Active Directory domain controller, functions as a basic file server, hosts an ASP.Net 2.0 web site (dasBlog), and I occasionally need to remote in to it when visiting places that won't have a vnc client installed other than the windows terminal services rdp client. I'd like to put an operating system on new box that's not almost 10 years old, and so I'm wondering what a linux distro has to offer in the following departments: Can I run dasBlog on mono? Where can I find help setting that up? Is it possible to migrate my Active Directory domain to a linux clone of some kind, such that my wife's laptop doesn't even notice (she won't be happy if I have to mess with it again)? Where should I look for help with that? Can I set up a terminal services/rdp-compatible remote desktop solution? How? How do I set up file shares to replace the existing shares that will work with the defined NT security groups? These shares are currently also available via the web if you know where to go and can log into a domain account with the proper security. How can I replicate that? A: dasBlog on mono - dont think so (third party libraries?) migrate active directory - ive never been able to do this,, but the last time i tried this was about 2 years ago No, RDP is microsofts proprietary protocol. X Server & VNC is all you got. File sharing - Samba will take care of it should be doable, but i think u need to adress #1-4 above first./
{ "pile_set_name": "StackExchange" }
Q: Access instance members through local static instance I have a communication manager who is an instanced by de-serialization. Now I want to create some static methods to access instance data. On other posts i see people be advice not to access static fields of instance objects. But now I create the following code and this work like expected, i can de-serialize and use the static method without a new instance of the CommManager. Great! The question: Is this is approach safe? I want to apply Threading, GetChannel is a core of my application and will be used by many application parts on multiple threads. I find it important that i do not create a performance penalty or into other consequences. Please advice. I ask this cause i find it strange that i cannot find any similar example of this approach, The way i see it now, i can easily make every method static without disadvantages. public class CommManager { public ObservableCollection<ChannelConfig> channelConfigs; private List<iChannel> channels; private static CommManager StaticMe; public CommManager() { channelConfigs.CollectionChanged += ChannelCollectionChanged; StaticMe = this; } private void ChannelCollectionChanged(object sender, NotifyCollectionChangedEventArgs args) { if (channels == null) channels = new List<iChannel>(); switch (args.Action) { case NotifyCollectionChangedAction.Add: foreach (ChannelConfig newItem in args.NewItems) channels.Add(CreateChannel(newItem)); break; case Notif.. /// etc. etc. } } /// <summary> /// I can access this method without instance and i get normal de-serialized values /// </summary> public static iChannel GetChannel(CommChannel channelnr) { return StaticMe.Channels[(int)channelnr]; } } A: A problem might arise the moment you create a second instance of your class. A static field can only exist once. The moment you overwrite a static field, it will change the reference to the new object. Any old reference set to the old object that might still be used elsewhere will not update - or worse, if it holds any data, it might change unexpectedly. CommManager manager = new CommManager(); manager.GetChannel(); // refers to the static field StaticMe.channels which is manager.channels. CommManager manager2 = new CommManager(); manager2.GetChannel(); // refers to the static field StaticMe.channels which is manager2.channels. manager.GetChannel(); // still exists, now refers to manager2.channels because of StaticMe now being manager2 // It is not retaining any of the original channels because of the changed reference. Because of that, static fields or properties should better be immutable and not rely on anything stored within the static property other than default or fixed values. If you really have to store mutable values globally, don't assign them in a constructor or in any instance method but on the definition. If your channels should be available globally, then make the List globally available by making that one static readonly (as the List reference will stay the same, only the contents may change). // for brevity, removed all unchanged parts... public class CommManager { private static readonly List<IChannel> channels = new List<IChannel>(); private void ChannelCollectionChanged(object sender, NotifyCollectionChangedEventArgs args) { switch (args.Action) { case NotifyCollectionChangedAction.Add: foreach (ChannelConfig newItem in args.NewItems) CommManager.channels.Add(CreateChannel(newItem)); break; case Notif.. /// etc. etc. } } public static IChannel GetChannel(CommChannel channelNr) { return CommManager.channels[(int)channelNr]; } } Also if you are going to a multi threading approach, you might need a ConcurrentBag<T> that is thread safe instead of a normal List<T> which is not.
{ "pile_set_name": "StackExchange" }
The Fastest Metronomes in the Universe Astrophysicists are extremely interested in detecting and measuring repeating events, since such events can be studied in detail. Many astrophysical phenomena are strictly periodic, recurring on a variety of timescales from years (for example, the earth's orbit around the sun) to days (the time it takes a star to transit the meridian) to hours, minutes, seconds, and fractions of seconds. How fast can things repeat? The fastest periodic signals seen to date in astronomy have been observed by the Rossi X-ray Timing Explorer(RXTE) in binary stars systems in which one star is an ultra-dense neutron star accreting material from its companion. In February 1996, two groups analyzing data at Goddard Space Flight Center began to see evidence for these ultrafast variations in the X-ray light curves of 4U 1728-34 (led by Tod Strohmayer of Goddard) and Sco X-1 (led by Michiel van der Klis of the University of Amsterdam). The oscillations they observed are nearly (but not quite) periodic and have frequencies of about 1000 cycles per second (hertz). Hence these signals are called "kilohertz (kHz) quasi-periodic oscillations (QPO)". The figure above shows the "power spectrum" of the X-ray signal detected from 4U 1728-34. The "power spectrum" measures the strength of the time signal frequency as a function of time. A "good" clock (one that would be strictly periodic) would show a bright red horizontal streak in the image above. The 2 bright red streaks that are visible tell astrophysicists that there are at least 2 signals from this star, one near 1000 kHz and one at 600 kHz, and that the frequencies of these signals increase with time (the "streaks" have a positive slope, indicating that whatever's happening, it's happening more frequently as time goes on). To date these signals have been seen in about 15 neutron stars in the galaxy. In many of the sources one sees two frequencies which vary with source brightness, though the exact relationship is different for different objects. For some of the sources the difference between the frequencies remains constant, and is thought to be telling us the rotation rate of the neutron star. The rotation rates seen so far are all between about 250 and 350 hertz (i.e., rotations per second). These kHz QPO are among the most important scientific results to date of RXTE, since the material giving rise to the kHz QPO is thought to be produced by gas spiraling towards the neutron stars supersonically and colliding with the neutron star's surface. These observations allow scientists to measure the physical nature of the ultracondensed matter that makes up the neutron star's interior under conditions impossible to reproduce on earth.
{ "pile_set_name": "Pile-CC" }
OK, good evening. My name is Larry Fuell, director of the Global Affairs Center. Thank you very much for coming out this evening. Before we begin, I just have two quick announcements I want to make. This evening's program is being recorded for classroom use and other uses on campus, so be aware of that. And it also means that during the question and answer, if you have a question-- we will remind you of this, but raise your hand, and somebody will run to you with a microphone. It's not just about making sure that everybody else in the room can hear you. Sometimes some of us know for a fact that we have big mouths, and that's not a problem. But the fact is the camera does a better job of picking it up without a lot of static if you're speaking into a microphone, so do that. The second announcement I want to make is if you're carrying a cell phone, please turn it off or put it on silent. And now it's my pleasure to turn the microphone over to Aura Rios-Erickson, who is ESL advisor here. And she personally knows the speaker, and she's here to do the introduction. Thank you, Larry. When I think about my country, the word that comes to mind is diversity. Peru is diverse economically, politically, geographically, and ethnically. Tonight, I cannot think of a more qualified individual to lead the discussion of my fascinating country than Consul Velasquez. Consul Velasquez is a leader in the Peruvian community in Washington state. His educational background includes a law degree from [INAUDIBLE],, [INAUDIBLE],, [INAUDIBLE],, and a graduate degree from Seattle University. He has been serving in his posts since 1997. In addition to doing that, he is dedicated to helping Peruvians [? here ?] in Washington state as well as my country, Peru. He does this by leading cultural efforts and promoting educational exchanges as well as business connections between Washington state and Peru. His list of accomplishments is too long to list tonight. I am very honored to have met Consul Velasquez. He is not only my compatriot but my friend. Please help me welcome Consul Velasquez. [APPLAUSE] I want to start with a question, as this practice in any higher education center like this one. And the question is, what is the country that is closest to heaven? And this is not a religious question, so don't get nervous, please. What is the country that is closest to heaven? Nepal. Well, that's a good answer, Nepal. Huh? Peru. Peru, no. The one that's closest to heaven is actually Brazil. We don't have the map here. Well, Brazil, because it's next to Peru that is heaven. And that's what the Incas thought of Peru, the center of the universe, center of the world at that time-- our little heaven. Let me give you some statistics about Peru that perhaps will give you an idea about the [? vast ?] of Peru's wealth. I don't know if you know that Peru has more than 3,000 kinds of potato. I like to start with that because most people think that potatoes are from Idaho, and actually, potatoes are from Peru. There's even a sentence that says, I am not more Peruvian than a potato. [SPEAKING SPANISH] Potatoes actually grow in the different altitudes of Peru. And we have all kinds of potatoes, colors, tastes, textures, all [? this ?] study about potatoes, also 55 varieties of corn. I don't know if you knew this, too. We have wonderful corn. People who have visited Peru have tried some of the best corn. And the official language of Peru-- we have three languages in Peru that shows some of the diversity that Aura mentioned before. We have, of course, Spanish, or what we used to call Castilian. Quechua comes from the Incas' time. And Aymara, which is in the border with Bolivia, where it's Puno now. Three languages. And I'm sure you know some words in Quechua already. Any volunteer with that? Not the ones who live in Peru. That doesn't count for the class. [LAUGHS] Any ideas? Do you know any words in Quechua, the language of the Incas? Quinoa, OK, that's one. We all know quinoa. Another one? If you get two right, you get a prize. [LAUGHS] This is a different kind of class. You get actually a price. Are there any other volunteers? Quinoa, and? Well, [INAUDIBLE]. But words that you use here in the English language? You have quinoa. You have the word, puma. What else? The word, alpaca, mm-hmm. What else? Condor, llama. One that is maybe not as known, but the word, jerky. Jerky comes from the word ch'arki, which means, dry meat, in Quechua. Do you know that? No. [LAUGHS] You are here to learn. [LAUGHTER] And the most most-known word, coca. Everybody knows coca-- Coca-Cola, and all other kind of coke, of course. But what is the identity of Peruvians? That's a good question, that somebody was asking me before I came. And [? half ?] Peruvians identify as Latinos. Something that we never ourselves introspect about, when we came to the United States, is [? our ?] Peruvian Latinos. Well, they don't speak Latin, so they don't qualify for being Latinos perhaps. Are they Hispanic? Well, Peruvians are not from Espana. No, they want to be associated with a word that has "panic" on it. So I don't even want to be Hispanic. We are Peruvians. We have a distinct identity, distinct culture-- distinct gastronomy, history. And it's a little bit what we're going to not discuss, but talk today. More than a lecture, I think it's a conversation about Peru-- some of the things you already know, and some things that we all want to learn today. A little bit about Peruvians' history-- but before that, I want to explain something, because we were talking about consulates. And sometimes it is good to understand our function here. The difference between a consulate or a consul, and an embassy and an ambassador. Most people have an idea there is a difference. I know some people here have worked in an embassy, so they have that very clear. But it's good to know. Consulates have a jurisdiction. Mine is Washington state, but I also help Peruvians that live in Oregon, and Idaho, and Alaska. The embassy is always located in the capital of the country. So the Peruvian embassy is located in Washington, DC, and is headed by an ambassador. And mostly, they will be dedicated about political matters and trade, because they can deal directly as a representative of our president to the federal government. My relationship here is with our local community, the business community, and the desire to promote Peru and exchanges with Peru. So my job is more local. And our ambassador's job is more national, and deals directly with the president-- because the ambassador of a country represents the president of that nation. And there is a Peruvian consulate here since 1904, believe it or not. Most consulates at that time were located in Port Townsend. And there was a reason for that. If you go to Port Townsend, you will see the old German consulate, the old Japanese consulate located there, because the Customs House of the United States was located there. We have some history buffs here. At that time, consoles were very dedicated about the trade between the countries, so they had to legalize, certify, the merchandise that was imported, exported. They have to deal with the crews of the ships. And because the US Customs House was located in Port Townsend, they needed to be close to it. And then, in 1967, they moved mostly to Seattle, and some to Tacoma. And I have read the letter that our consul at the time wrote to the Ministry of Foreign Affairs, in 1905, requesting to move the consulate from Port Townsend to another city. And he says, Dear Minister, it's time that we consider moving our office to a small city that is growing. Seattle, he says, because this is where we need to be located, for trade and promotion of Peru. And that was 1905. In the 1920s, our consul at that time wrote about this company that was going to probably change the history of the world-- Boeing, he said. He sent a lengthy report about Boeing, because consuls at that time, that's what they used to do. They used to be the internet, you know? They used to send information to our countries. And that's how we learned about distant places. And that's what we're trying to do-- [INAUDIBLE] to do now, is trying to show you about a distant place that is not far now. We are on the same Pacific coast, and we share many things, as you will see in a little bit. Talking about history of Peru-- well, that would take us a degree, not a class, because there is so much to talk about Peru. Before the Incas, as probably many of you know a little bit of the Incas' empire in Peru-- as the Aztecs were the two largest and most advanced civilizations in the Americas when the Spaniards arrived. The Incas were located in the southern part, and the capital-- I shouldn't get closer here. --of the Incas-- oh, thank you so much. Technology is wonderful, isn't it? One day it's going to kill us all, but before that, we should use it the best way we have. That's not the one. Here we go. Well, here it is. Oh, there's a center. You should be the one in the center. It is not a TV that you turn it on, like this, no? Here we have Lake Titicaca. But most people are not aware that before the Incas there were large cultures in Peru. We have in the northern part of Peru-- let's see-- we have the Chimus, the Mochicas. In the southern part, the Nazca, the Paracas, and the Chavin in the center-- here, with the little northern part of Peru. The cultures were very advanced, in arts, in architecture, in math, medicine. And we can talk a little bit about each one, so it gives you an idea. The Incas took advantage of that. As they were expanding their kingdom, that started in this area to the coast and the northern part of Peru, they took advantage of all that information-- and were able to have the civilization that we know now-- the Inca Empire. But for example, if you talk about the Nazca-- have you heard about the Nazca Lines? Many of you. These are not alien ships that came to Peru. Shirley MacLaine, the actor, famously one time promoted. Actually, they were the ancient Peruvians-- these wonderful signs in the sun. We don't know now for all the purposes. We have some ideas of it. But they were smart. [INAUDIBLE] that you can see only by air-- you know, the Nazca Lines that you have heard. The Paracas were nearby. The Paracas was a culture that is magnificent in medicine. They did brain surgery. And we know that people survived, because we can tell that it is grow in the bone of the head, and the portions where they performed the surgeries. They did wonderful textiles. There is some simple textiles at the Seattle Art Museum. I think someone took it as a souvenir and they forgot to return it to Peru. I'm fighting to return it, eventually. But in the meantime, you can enjoy that at the Seattle Art Museum. And the textiles that they produce, in color-- with natural colors. And maybe the ladies will help me. I don't want to be-- but the points, when you needle a sweater-- the number of points that they were able to accomplish was not able to be done until probably 80, 90 years ago. That advance, for a textile, people were very amazed how they did it. In the northern part of Peru, we have the Chimus. We have the Mochicas-- all these cultures before the Incas. if you visit Trujillo, you can see Chan Chan, the famous city of clay-- which is beautiful. And recently, it was uncovered, the Temple of the Sun and the Moon, near Chan Chan. And the good thing that it was preserved-- these temples-- is because they were covered, and they were building on top of each-- like a pyramid. And because they cover them, every platform, the colors were preserved. So now that is unearthed, you can see the beautiful colors-- how they use them, and the stories that they told in these murals. And then, of course, we have, as I said, the Incas-- the Inca Empire. We have this story of the beginning of our empire. I don't know if you have ever heard of this story. No? It's a beautiful story-- how would the children of the sun came out of Lake Titicaca and founded or started the Incas' Empire. We have probably 140 years before the Spaniards arrive in the conquest. And you can read, or you can see more of what we have of remnants of this architecture in the city of Cuzco, mainly-- because it was the capital. They used to think that it was the center of the world-- Cusco. And they built beautiful temples, and palaces, and ceramics, because the Inca used to live there. Many people have heard of Machu Picchu, of course. Machu Picchu was not recently-- I don't want to use the word, discover, because I think it would be misleading. Hiram Bingham, which was a famous US archaeologists and discoverer, working for National Geographic, was the one who I think put it in the knowledge of the world. But the people that were living there, they all knew about Machu Picchu, so it was not a mystery per se. There were a lot of families living already in Machu Picchu, when Hiram Bingham came, and what we said now, discover Machu Picchu. I would say, 1910, I believe, something like that. And it was a major discovery for National Geographic. And Machu Picchu, as most people know, there are different versions of what it was used for. Some people think it was like a spa for the Incas. Because by train, now it's four hours. Probably back then it was a couple of days or so, or three or four days for what is called now the Incas path. Inca trail, yes. Inca trail, thank you. No, no confusing with Shining Path, which is a different path. And it took around three to four days to arrive in Machu Picchu. I mean, and it was possibly because of the climate, and near to the Amazon jungle-- a really pleasant place for the Inca to spend some time there. But it was abandoned after the Spaniards came for many, many years-- almost 400, until Hiram Bingham, as I said, showed it to the world. Most people always ask, why is it that the Peruvians now live so far in the highlands? Because we have a large population-- people who live really far in the highlands of Peru. And looking at the history at the time of the Incas, they didn't have a custom to live that high. At the time of the colonization of Peru, they escape the Spaniard conquest, and they just move to the highest portion to be left alone. That is still until now. And it's hard for our nation to give services, and provide what is needed to these communities, because they are so far in the highlands. So it gives you a little idea. When the Spaniards came to Peru, they encountered a little civil war. It was the right time when they arrived, between the brothers at [INAUDIBLE] and Huascar Remember that the Incas' Empire covered Ecuador-- what is now Ecuador, parts of Colombia, Bolivia, parts of Chile, and a little bit of Argentina. Believe it or not, that was the extension of the Incas' Empire. So they arrive at the right time in history, in the sense for them-- not for us. But for them it was the right time. And they were with very few men to conquest Peru, and they stay there for 400 years-- our colonial period-- and [? blow ?] a fusion between Europe and the Incas' Empire. They found a civilization, and they were very impressed with what they found. Many of the structures that they found at that time-- and that's what some people ask me about this. I said, why are there so many structures when the Incas [INAUDIBLE] that are destroyed-- that look like piles of rocks or sand? And the answer is, that at the time of the conquest, those buildings were assigned to the different conquistadors, or part of the military groups that arrived, as mining rights. So, and Espana was given the right to mine in a certain temple, or a certain construction of buildings. And that's why they-- looking for gold, or precious things-- most of the time destroy the walls and the edification itself. And we have a lot of places that even until now we still discover because they were left as a pile of rocks or sand-- that looks from afar like a small hill, when actually we understand now there were buildings at the time. So I'll give you an idea what happened. But 400 years of colonization of Peru give us a very interesting position in South America. Sometimes people ask me, why is it that the most capitals of South America are located in the ports? And that can be answered by a teacher, or me. But Lima is by the coast, as more cities, like Santiago and the major cities, because the Spaniards wanted to take all, where they could, through the ports of the major cities in South America. So for them it was more convenient to have the capitals or the center of the administration near the sea. And that's why we have Lima, which has a horrible weather. I hope this is not being taped, but yes. [LAUGHS] Most people agree, there is other places in Peru that has such wonderful weather. We should have Lima, or the capital of Peru, and other places to enjoy better weather-- but Lima itself suffers by El Nino, and sometimes La Nina, and Los Ninos, and we have horrible weather right on the coast. But if you leave Lima-- a little bit in the south, in the north-- people who have lived there, they enjoy sun, and it's warmer, and it's nicer. But this is what we had at that time. We have two wonderful things if you visit Peru, by the way. You have Machu Picchu, is one of the wonders of the world. And you have the Amazon, which is one of the natural wonders of the world. The Amazon River does not start in Brazil. It starts in Peru, believe it or not. Do you know that? Yeah, that was me. Well, the Amazon is so big that you cannot see it, actually. [LAUGHTER] And it's true-- if you are in one side of the Amazon River, you cannot see the other side of the river. You feel like you are looking at-- this is one of the parts where the river actually is not that wider. But in many parts of the Amazon, that is that wide. So it's such experience, actually, to visit the Amazon and the jungle, when almost 13 different languages are spoken there-- completely different of each other, and in small groups. In the colonial times there is an expression that still survives until now, that is called [INAUDIBLE] Peru. Have you heard that expression? It seems you are worth a Peru. Because for the Europeans at that time, Peru's goal was wealth. And that expression, it was used until even recently in Europe, when people said, you are worth a Peru. That was the idea of the Europeans about the worth of gold and riches in Peru. Well, we jump very quickly to the independence of Peru. We could go on talking about the Incas. But General San Martin, who actually is an Argentinian, started going to Chile, to Bolivia, and arrived in Peru, declaring the independence of this country. And this is a very interesting period and the Americas and in Europe. And so people say, why was it a little easy-- not that it was that easy, but easy for General San Martin to declare independence in all these countries, and in Peru. And Peru was not that easy, for the fact that us being in the center of South America, most Spanish armies were contracting in Peru. As the rebellion and independence was growing in other parts-- in Venezuela, in Argentina-- the armies left were concentrated in Peru. And anybody's a history buff? What was happening in 1821 in Spain? Revolution [INAUDIBLE]. No, no, in Spain-- in Spain. Do we have any history professor here? [LAUGHS] Napoleon, he took over Spain, so the colonial possessions of Spain were like in a [INAUDIBLE]. What was happening, because we didn't have a king at that time in Spain. So it was a great time for us to get to be independent-- when the Spaniards couldn't get their act together at the time. They didn't know what was going on in Europe. They were under Napoleon, and it was the right time for us to become independent. And General San Martin went to the main square in Lima and declared the independence of Peru. And he's also the one that dreamed of our flag-- in red, white, and red. And you have the seal of Peru. And you see the begonia there. You see the quinina tree. Another quinoa-- the quinina tree. And the horn of plenty, or of gold, showing the richness of Peru. You know, the animal kingdom, the mineral, and also the floral of Peru. Now we took out a little of the culture, because we have here to talk about Peru now. And we cannot talk about the culture of Peru without speaking about the gastronomy in Peru. I don't know if you know that. Because Peruvians are as fanatics about food as Argentinians about soccer. [LAUGHTER] They are very fanatic about food. We decided to be good about something. India decided to be good about computers, and Hyderabad and those places [? forty ?] years ago. Peruvians decided, we have to be good about something-- food. And we already had a good gastronomy from the start, but 40 years ago, we decided to be really, really good. And we have become one of the culinary destinations in the Americas. The four best restaurants in the world is in Lima. I think two of the 40 best restaurants in the world are also located in Lima. The best in Latin America is located in Lima. So we have been very intentional about taking advantage of the fusion of our food. And that has an explanation. We have huge immigration from China. Almost 10% of our population are from Chinese origin. We have almost 5% of our population of Japanese origin. We have large Afro descendents, from Africa. And of course, we have our indigenous population, that is more than 50%-- almost 60%. And we have European influence. Italians at one time were the largest community in Lima-- and Spaniards. And we have this influence. I didn't pick this menu today. Somebody else did. But we have the ceviche, which is not like any other country's ceviche, I will tell you. It must be the lemon, I don't know. But this dish is from Asian influence, which originally was created in a wok. It has a little soy sauce on it. I will not give you the whole description of it, because you have to try. But it's called lomo saltado. And this one is called causa, I believe. And this has a name-- causa, cause-- because it was created for the independence of Peru-- for the cause of independence. It's called causa. And it was sold-- not like these. These are more sophistication of the causa. But the basic one, to get some funding for the independence of Peru. So Peruvians are very proud of it. And our gastronomy is one of the things that we're very proud. Perhaps you don't know, but we eat guinea pig. Did you know that? We love guinea pig. Guinea pig love us, because we take care of them. And then they become part of us. So they are very loved, the guinea pigs. I know guinea pigs here are pets. I know. I respect that very much. But this is the Incas' food, and it's a powerful food-- the meat of the guinea pig-- what we call cuy. I know, nobody's perfect. There is always something there. We also have the pisco sour. Have you heard about the pisco sour? Oh, that was more popular than the guinea pig, I would think. [LAUGHTER] Pisco is a brandy that is produced in Peru, in a port that is called Pisco. It started there, and we are very proud of that. It is very tasty. And we created a pisco sour, that many people have sometimes tried. In our culture we have in place, as I said, for this fusion of different groups and communities, that right now are Peru. And one of the expressions is in our current president. Our current president is Pablo Kuczynski. His father German, grandfather Polish, mother French. We have a president that was from Japanese origin-- President Fujimori. Yeah, here we have the visit of our president. Last week he was in the White House meeting with Mr. Trump. He has become the first Latin American president to visit the White House. We have a nice conversation. He has invited President Trump to visit Peru, and he has accepted. So he said he is going to be in Peru in 2018, as part of the Americas Summit of Presidents. So hopefully that will happen. It would be nice, I'm sure. We would like him to have some guinea pig and pisco sour there, too. [LAUGHTER] And we'll talk a little bit about the free trade agreement, at the end, with the United States. But I wanted to talk a little bit more about things from Peru and Washington state that are having [INAUDIBLE] to talk about. Many people perhaps don't know that one of the first Europeans-- well, he was not European, but non-- well, the description is white. But that arrive in Washington state is Juan de la Bodega y Quadra. Juan de la Bodega y Quadra was born in Lima. And at that time he was under the Spanish crown, of course. But nevertheless, to us he's Peruvian. And he was here for two years in Washington state, with an expedition from Spain. And they had a lot of contacts with the native population here. And he died on his way back to Peru, in the port of San Blas. San Blas is in Mexico, and at that time was a main port for the Spanish crown to go around the Pacific and to the Philippines. But he stayed here two years. And he's the one that established the current-- we have the current borders between Canada and the United States here, in the north in the Pacific Northwest. IT hasn't been touched since that time. At the time it was the British colony-- the crown, and the Spanish crown. He was a little upset, because he was here two years trying to get more territory and at the end he didn't get it. But nevertheless, he respected that, and then he left. And this is the borders that we have now with Canada, here in the Pacific Northwest, because of Juan de la Bodega y Quadra One of the things I wanted to mention, that perhaps people would like to know, is that Peru-- and this is kind of interesting-- has the second largest amount of shamans in the world, after India. I didn't know that either. I get a lot of inquiries about visiting Peru because of the shamans and a special practice that is called ayahuasca. Have you heard that? Where they have some-- and I am not promoting this, by the way. This is a description of a cultural activity, which is that they have like a chicha, or a drink that is done by the shamans. I know some people are taking notes. Don't. It takes a few days to get this drink. And then people have a ceremony with the shamans, and sometimes in the jungle of Peru, or in the highlands of Peru. And they go back in their lives. And it's a process of two or three days. And for some people, they're very interested in that. They do it. They think it's great therapy-- they help them. I have never seen it myself, but it's becoming a little tourist activity there for some. I personally do a lot of research before I do anything like this, because you have to be careful. But it is interesting. I didn't know that also that it was the second. The other thing that I found out that is very interesting-- I knew we have a large number of orchids. But we have 1,625 types of orchids in Peru. Did you know that? I found that out myself. Also, that Peru is a surfer's paradise, because it has a wave at 4 kilometers long. That's in Mancora in Piura, and it has the world's largest left-handed point break. That I don't know. If someone knows about those things, can you [INAUDIBLE] a little more? This I knew-- which was the Cotahuasi, which is a canyon in Arequipa-- probably visit Arequipa one time-- is I think twice as deep as the Grand Canyon here in the United States. That is interesting. Lake Titicaca is the highest navigable lake in the world. Perhaps that you knew. Half belongs to Peru, and half belongs to Bolivia now. Peru is the eighth largest producer of coffee. We have great coffee. A couple of years ago, we won the best coffee in the world. And I had a chance to meet the winner. And something that I really like to share with you is that Peru has nine different micro climates. And we are blessed with that, because we have such a diversity in our flowers, plants. And the Amazon River has become like the pharmacy of the world. And that's why we have to all work to preserve it. Because there are so many things coming out of the Amazon-- maca, which was the Viagra of the Incas. That's what they said. I don't know for sure. But this is not a joke. This is what it says officially. [INAUDIBLE] I don't know if you know of those herbs. Many things-- so we need to preserve the Amazon, because we still need to find many more cures in the Amazon jungle. But because of the climates, we have such differences in types of potato, and fruits-- from the coast way up to the highlands, and then to the Amazon jungle. One thing I wanted to also share with you regarding globalization, and Washington state, and Peru-- I was approached a few years ago by a nation. I think it's called your new tribal communities-- nations here. And they have an exchange with an indigenous community in Cuzco in Peru. And they've become really good friends. They love the exchanges and the culture. So they told me and said, Consul, we want to go there, and we want to give them a gift. So I said, well, that's a nice thought, please think your gift well. And they went and said, well, we want to ask them. So they went all the way to Cusco, to this indigenous community, and said, we want to give you a gift What is that you want here in the community for economic growth? Because we have help from our casinos, and we have some money there that we can share with you. And you know what the community asked? A taco factory. [LAUGHTER] That is globalization. Because we don't have tacos in Peru. Tacos are from Mexico and Central America. And I said, how is that that we are asking for taco factory in Peru? But it's because in Cusco there is so much demand for an American tourist for burritos and enchiladas that the people in Cusco are saying, what is this burritos, and enchiladas, and tacos? There's money to be made here. So the indigenous communities start producing tortillas, and to make tacos. That was a very interesting example of globalization, when we have that. And that was OK. They still have a great experience with that. Washington state, of course, has Costco. And Costco buys from Peru $160 million a year in produce. It buys quinoa. It buys [INAUDIBLE],, blueberries, bananas, grapes. Have you seen the balloon grapes? If you haven't seen it, try them. Magnificent. Because we are blessed, once again, with these climates. So we produce things year round-- many things, like asparagus. I had a little challenge a few years back between the Peruvian asparagus and Washington asparagus. I don't know if you know that I was in the middle of that trade war. And Peruvian asparagus, as [INAUDIBLE] any free market, the buyer is the one who imposed the needs of the market-- price and freshness. So we're doing really well with Peruvian asparagus, which is big, tasty. And because of my work with the Peruvian asparagus, the Peruvian Asparagus Association invited me to visit them in Peru, and visit the asparagus growers. And I couldn't believe it. They were producing asparagus twice a day. They would go in the morning and cut it, and they would go in the evening and cut it again. And they were producing year round. That was hard for Washington state to compete, but we always can find something in the middle. So we are in the fresh asparagus production, and Washington state is cutting it. And that's good for Washington state, too. And we were happy about that decision. That was not done by us, but it was the market itself. Because we don't place the price. It's the consumer that does. Peru signed a free-trade agreement with the United States. In 2009, it was signed finally. And I believe it's doing well for both of us. At least our president and Mr. Trump think so, that it's working for us. We are producing things that the United States needs. The United States is exporting to Peru, and so far it's working well. There are some parts of the agreement that takes care of our biodiversity, and working together, and save our biodiversity-- and taking care of it. The investors from the United States are well covered in our legal system here in the US. So we have a good agreement with the United States. Hopefully, we'll continue in that sense. But I just wanted to close with a sentence that Antonio Raymondi, which was an Italian that was in Peru studying the flowers. He said, Peru is like a pauper-- [? mandigo, ?] a poor man-- sitting in a gold bench-- because we have so much richness. But that was at that time. I think now we have learned what we have. We need to preserve it. We need to grow it. And we need to do it together with natural partners, like Washington state. Thank you very much. [APPLAUSE] Do you have any questions? Remember, if you have a question, just raise your hand and we'll bring a mic to you. There's two microphones in the room. The one thing that's not mentioned on the facts here is the education of your people-- what levels and so forth. What institutions-- how they compare with other countries in South America. Thank you. That's a great question. And that's one of the goals of the last governments in Peru, is education. We're working really hard on infrastructure that is needed. Part of it has been accomplished, but there's still a lot to be done-- especially in the rural areas and the highlands. But our curricula and our teachers, we are trying to put as much of our national budget into education now, to reflect that interest that we have in educating our children. One of the things that is good, perhaps, is that English now is becoming more compulsory, and so more people have access to learn more about the world through the internet and English. But yes, this is something that is hard. Even though we have a large population that is located-- and it's expressed here-- our community of immigrants from Peru here are mostly professional business people, trade people. And our families focus their children into education. So within the Latin American communities, perhaps Peruvians have the highest number of children in colleges, graduating from colleges, and having higher point average. We're very proud of that within the Latin American communities, because Peruvians place such high importance in education. Could you speak to politics in your country? I will. Well, as we were talking about the roles of consulates and embassies, one of the main roles of our embassies is policies and politics. And they are the ones who are more called to present those issues to you than actually myself. But if you want to talk about our recent election, we just had one in 2016. President Kaczynski was elected president. And the second candidate was Keiko Fujimori, who was the daughter of President Fujimori. So that was very interesting to see the daughter of Japanese immigrants with a son of a German immigrant in Peru competing for election. And by the anecdote of all of that is that the wife of President Kaczynski is an American. The husband of Ms. Fujimori is American. So we'll have a first lady or first husband an American anyway-- if any of them win. So that was nice. And we have now Miss Nancy Lange, who is a US citizen-- our first lady. And hopefully, she will visit us very soon. That's what we are trying to accomplish. Gracias. Can you talk a little bit about the condition of Afro Peruvians, in terms of representation in the government and politics, socioeconomic status-- maybe representation in television, and various ways that racism is manifested. It's a very simple question. Well. [LAUGHS] [LAUGHTER] I like that. I like the end of it-- a very complex, simple question. I will give you my perspective. That I can give you. We call Peru the country of all bloods, [SPEAKING SPANISH] because of our mixture and fusion. And we call ourselves one race-- the human race. Because we feel that our blood is so intermixed, that how can you describe someone from this particular group or that particular group? In the specific area of the Afro descendants, as we recall, from them we have inherited wonderful music. Afro Peruvian music is magnificent. I wish I brought some examples of music, too, because we are blessed with the music. The influence in food-- in our gastronomy. But definitely, we still need to be more inclusive of different groups. But I think the challenge will say what I said in the beginning, that we all now so intermix in that sense. Families couldn't tell exactly if they descend from one group or the other. Myself, for example, from my father's side I'm Italian and Spaniard. And from my mother's side, have indigenous and Spanish also. And sometimes people ask me, who am I? You know what they're wondering. And I am Peruvian, because Peruvian is like that. Sometimes at the consulate I have someone whose last name is Chang, or Wu. Sometimes I have a Peruvian that their last name could be Fujimori. So we have that diversity in that sense in Peru, but so intermixed together that sometimes it would be hard to-- know but definitely, as I said, yes, we need to have more inclusion. Sometimes we don't have the best models on TV, I will say. That's one of the things that we are working on it, because there were a lot of stereotypes and thinking that it was funny. But it has to be funny for both of us, not just that people who laugh on the TV. And that's something that Peruvian TV is working, because it could be demeaning to certain groups to be portrayed the way they are. I don't know, I hope I answered a little bit of your question. What representation in the government? Are there blacks in the government [INAUDIBLE] positions? Well, we don't call it black. We call it Afro descendant. And as I said, yes, in the sense that in the military, and air force, and the police-- but it will be hard to just say this person is, for their look, is Afro descendant. Yes, Afro descendent. We will say that is Peruvian, perhaps with a darker skin than other Peruvians, but it's no less Peruvian than anybody else. Our Afro descendent community is small. But it's not perhaps well represented in politics, as you said. Other questions? Wow, we all want to go eat. Well, if you want to go to Peru, give us a call. We have wonderful brochures to give to you. So what do Peruvians like to do for fun? Oh wow. Besides eat, of course. Well, if you're on the coast of Peru, there is a lot of water sports, and sliding that you can do. I don't know if you have a picture of Lima. Lima is right in the coast of Peru. We have wonderful beaches in Peru, that you can enjoy. This looks like this is the sun. But hiking-- you see, here's the coast of Lima-- very modern city. This is the Marriott hotel. A couple of years ago it was selected the best Marriott in the world to stay. Peru also has between the 25 best hotels in Cusco, and one of the best 25 hotels in the world. And in the Sacred Valley I think is one of the best to 20 small hotels, family owned, because we have a wonderful hotel infrastructure now. This is the main square in Peru. You will see this is from the colonial times-- our cathedral. In front you will see our presidential palace. That is more representative of contemporary times. And it was built in the place where Pissaro, the conquistador of Peru, had their home. Now we only see what we have seen now, this magnificent building, but it was done in the 1920s and '30s. This is Cusco. Cusco keeps more the Incas' and colonial flavors in the city. That's the cathedral that you can visit. And that's the Church of the Jesuits-- the Compania church. And around the square you will see some of the buildings from the colonial times. These are from 1600 and 1700, and they are well preserved-- now mostly hotels. If you go to Cusco be sure to check the hotel prices. They are quite pricey nowadays. You have to find a good bargain. And probably you have seen Machu Picchu in many ways. And this is Huayna Picchu, which is the mountain behind this structure. This is what we call [INAUDIBLE].. What do we say? Is it steps? Terrace. That's where they used to have the potatoes, or grow wherever it is needed for this site. And then there are some main squares, where they'll do ceremonial events. And there some is some quarters for the Inca and their family. The Incas' was not a monarchy, as the Europeans had the ambition. So [INAUDIBLE] monarchy, they pretty much designated who was the king for the Inca next. And to make it royal what they will do to the best general or to the best leader, is they will marry their ancestors. They will give them the ancestors and mummies in different temples. And when it was time to make them royal, they would just marry them-- became family with the king, or the Inca at that time, because of this kind of ceremonies. To them, of course makes sense. To us, it was a little [AUDIO OUT] clay. And it's a construction before the Incas, but the Incas used it too. Well, thank you so much. As I say, if you decide to visit Peru and you want to have a little more information, please give us a call. We are more than happy to give you some brochures, and some ideas, and what to do for fun in Peru. Good night. [APPLAUSE]
{ "pile_set_name": "YoutubeSubtitles" }
Earlier this week we reported that the people behind the NOLA Caribbean Festival were organizing a brand new event called the Marley Gras Jerk Chicken Festival. The party was slated to take place on Saturday, February 11, when it would celebrate the intersection of Jamaican and New Orleans culture. Things have changed since then. The date and concept will still be the same, but a threat of legal action has forced the festival to change its name and logo. Evidently, the event caught the attention of Marley International, who sent the organizers a letter demanding they “cease and desist” the use of Bob Marley’s name and likeness. So in the interest of peace and not getting sued, the celebration will now take place under the NOLA Jerk Chicken Festival moniker. As previously reported, the event will blend the Jamaica’s rich culture with the rich culture of New Orleans, bringing nationally touring reggae acts and DJs together with New Orleans brass bands (who will perform brass covers of Marley’s hits). There will be plenty of food at the gathering as well, with various restaurants and food trucks serving up creative takes on jerk chicken, along with other Caribbean dishes, New Orleans staples and Caribbean drinks. The festival will also host New Orleans’ first-ever Scotch Bonnet pepper eating contest, plus a jerk chicken competition with local celebrity judges. The NOLA Jerk Chicken Festival will go down at NOLA Caribbean Festival’s new Central City BBQ compound, which is located at 1201 South Rampart St. Tickets for Marley Gras are on sale now for $10, and organizers expect the event to sell out.
{ "pile_set_name": "OpenWebText2" }
Q: PayPal Express not giving option for Check out as Guest, even if it is active (PayPal Paying Guest option to YES) I had some problems with paypal settings in Magento 1.7.0.2. The problem is this: I am using using paypal express (I have my account created and verified Paypal Company). It has active PayPal Paying Guest option set to YES, but when a user in my shop will complete your purchase and pay with Paypal will be the option PayPal API perfect, but does not show me the option to pay without paypal account. I have VERIFIED ALL settings in Magento Admin Panel and everything "seems to be fine". I have also tried making a new store to rule out any configuration already had my store "old", that might not let me do my Enable PayPal Guest Checkout, but still have the same problem. I look forward to your help to solve the problem, since I have no idea what else to do on my page. thanks A: One thing to do is to make sure that your call to paypal includes SOLUTIONTYPE=Sole as this should be the flag to inform paypal to allow guest checkouts. If this flag is not set then you can investigate the Magento side to see why this is not being set of request, If this is set but set to Mark then your config value is set to not allow guest checkout from the Magento admin config, If this value is set then I would suggest there is a problem on the paypal side of things and would recommend getting in contact with them directly, I hope this helps you find your issue.
{ "pile_set_name": "StackExchange" }
142 F.3d 439 NOTICE: Seventh Circuit Rule 53(b)(2) states unpublished orders shall not be cited or used as precedent except to support a claim of res judicata, collateral estoppel or law of the case in any federal court within the circuit.Mervyn BUTLER, Petitioner-Appellant,v.United States of America, Respondent-Appellee. No. 95-3340. United States Court of Appeals,Seventh Circuit. .Submitted Mar. 12, 1998*.Decided Apr. 1, 1998. Appeal from the United States District Court for the Central District of Illinois. No. 95-3340 Richard Mills, Judge. Before Hon. FRANK H. EASTERBROOK, Hon. ILANA DIAMOND ROVNER, Hon. DIANE P. WOOD, Circuit Judges. ORDER 1 Mervyn Butler appeals the denial of his motion to vacate, 28 U.S.C. § 2255, claiming that the holding in Bailey v. United States, 516 U.S. 137, 116 S.Ct. 501, 133 L.Ed.2d 472 (1995), invalidates his conviction for using and carrying a firearm during a drug trafficking offense. 18 U .S.C. § 924(c). We affirm. 2 Initially, we must address a challenge to our jurisdiction. The government contends that because the Central District of Illinois docketed this collateral attack as a continuation of the criminal case, instead of as a separate civil action, a separate document of judgment was not entered as required by Federal Rule of Civil Procedure 58. Thus, the government asserts, under Armstrong v. Ahitow, 36 F.3d 574 (7th Cir.1994), we lack jurisdiction over this appeal. The government misunderstands the import of the separate document rule of Rule 58, which is to protect the appellant's opportunity to appeal by providing certainty as to the deadline for filing a notice of appeal. Bankers Trust Co. v. Mallis, 435 U.S. 381, 384-85, 98 S.Ct. 1117, 55 L.Ed.2d 357 (1978); Armstrong, 36 F.3d at 575. 3 A Rule 58 entry, however, is not essential to an appeal. Mallis, 435 U.S. at 387; Otis v. City of Chicago, 29 F.3d 1159, 1165 (7th Cir.1994). If the district court clearly intended the order from which an appeal is taken to be a final decision, and if the appellee would not be misled or prejudiced as a result, the appellant may waive entry of a separate judgment. Mallis, 435 U.S. at 387; Armstrong, 36 F.3d at 575. The government does not argue that it has been misled or that it would suffer prejudice; nor does it argue that the district court did not intend the order from which Butler appeals to be final. If we dismissed this appeal, the district court would simply enter a separate judgment. In other words, "[w]heels would spin for no practical purpose." Mallis, 435 U.S. at 385. We conclude, therefore, that we have jurisdiction over this appeal. 4 The facts relevant to the substantive issue on appeal are as follows. Butler and two co-conspirators were arrested during a sting operation. The three conspirators planned to purchase cocaine from a supplier named Scott who was a government agent. The three men drove to a pre-arranged meeting and paid Scott with cash supplied by Butler and guns supplied by one of the co-conspirators. Immediately thereafter the three men were arrested. Throughout the transaction Butler remained sitting in the back seat of the car. A search of the car revealed a .22 caliber semi-automatic pistol on the floor of the back seat. Butler was charged with conspiracy to distribute cocaine, 21 U.S.C. § 846, attempt to possess and distribute cocaine, 21 U.S.C. § 841(a), and using or carrying the .22 caliber pistol during a drug trafficking offense ("weapon count"), 18 U.S.C. § 924(c). Butler was tried by a jury, which convicted Butler on all three counts. We affirmed the conviction and sentence. United States v. Butler, No. 93-1095 (7th Cir. Nov.29, 1993) (unpublished order). 5 Butler then filed the motion at issue in this appeal. He brought a Bailey challenge to the jury instruction on the weapon count. The district court denied Butler's motion on the ground that the jury necessarily believed that Butler personally carried the gun when it found him guilty on the weapon count. Butler appeals, arguing that the jury could have convicted him of mere possession simply because the gun was in the car.1 He also argues that he could not be convicted under the "carrying" prong of § 924(c) because he was not the person driving the car and the evidence was insufficient to prove he ever carried the gun on his person.2 6 An erroneous instruction under Bailey does not necessarily entitle a petitioner to a new trial. Wilson v. United States, 125 F.3d 1087, 1090 (7th Cir.1997); United States v. Cooke, 110 F.3d 1288, 1293-94 (7th Cir.1997). In fact, if "all the evidence presented [at trial] qualifies as either active-employment 'use' or 'carry,' [this] court will affirm a conviction despite the bad instruction." Cooke, 110 F.3d at 1294 (quoting United States v. Cotton, 101 F.3d 52, 56 (7th Cir.1996). If, however, some of the evidence qualifies as "use" or as "carry," but other evidence "points to mere possession or some type of now-defunct, inactive 'use,' the court will reverse and remand for a new trial." Id. Essentially, this court looks to whether a properly instructed jury could have convicted the defendant under § 924(c). Id. 7 "[P]ossession of [a] firearm coupled with the affirmative act of transporting it" constitutes carrying under § 924(c). Cooke, 110 F.3d at 1297; see Wilson v. United States, 125 F.3d 1087, 1090 (7th Cir.1997); United States v. Baker, 78 F.3d 1241, 1247 (7th Cir.1996). Whether Butler personally possessed and transported (and therefore "carried") the gun is irrelevant because he was convicted of conspiracy. "[T]he rule of co-conspirator liability announced in Pinkerton [v. United States, 328 U.S. 640, 66 S.Ct. 1180, 90 L.Ed. 1489 (1946) ] applies to § 924(c) convictions." Woodruff, 131 F.3d at 1243; cf. Cooke, 110 F.3d at 1297 n. 9 (noting that because the defendant was not charged with conspiracy, it was unnecessary to consider whether he would have been properly convicted for his cohort's activities). Thus, even if the gun was carried by one of his co-conspirators, Butler is responsible as long as the gun was carried in furtherance of the conspiracy and it was reasonably foreseeable to Butler that the gun would be carried. Woodruff, 131 F.3d at 1243. That the gun was carried in furtherance of the conspiracy is necessarily established because the jury found that the gun was carried "during and in relation to" the drug transaction. See Broadway v. United States, 104 F.3d 901, 903-04 (7th Cir.1997). Likewise, the evidence showed that it was reasonably foreseeable to Butler that one of his co-conspirators would carry a gun to the drug transaction; after all the conspiracy involved trading guns for drugs. Moreover, "the inherently violent nature of the drug trade makes the presence of firearms ... reasonably foreseeable." United States v. Edwards, 36 F.3d 639, 644 (7th Cir.1994); see also United States v. Sandoval-Curiel, 50 F.3d 1389, 1393 (7th Cir.1995) ("[T]he presence of firearms in transactions involving a sizeable amount of money and drugs is reasonably foreseeable."). Finally, that Butler was not driving the car is irrelevant: either he or one of his co-conspirators carried the gun during the drug transaction. Under Woodruff, that is enough. 8 Butler also argues that, based on the wording of the indictment, the government was required to prove that he both used and carried the .22 caliber pistol. We rejected an identical claim in Stanback, 113 F.3d at 656 n. 3. The remainder of Butler's assertions go to the credibility of various witnesses. We do not review credibility determinations. United States v. Earnest, 129 F.3d 906, 913 (7th Cir.1997). 9 Butler's final argument is that the district court erred in denying his motion for reconsideration. In the motion, Butler argued that the district court should not have decided his case before he filed his traverse, arguably delayed through no fault of his own. The only new argument presented in Butler's traverse is that the mere presence of the gun in the car should not necessarily satisfy the carrying prong of § 924(c). Because resolution of this case does not depend on the answer to this question, the district court did not abuse its discretion by denying reconsideration. 10 For these reasons, the district court's judgment is AFFIRMED. * After an examination of the briefs and the record, we have concluded that oral argument is unnecessary, and the appeal is submitted on the briefs and record. See Fed. R.App. P. 34(a); Cir. R. 34(f) 1 This court will address Bailey claims on collateral attack because convictions obtained before Bailey "may have been premised on conduct that is no longer regarded as criminal." Stanback v. United States, 113 F.3d 651, 654 (7th Cir.1997). Thus, petitioners alleging error under Bailey may establish a complete miscarriage of justice. See id.; Woodruff v. United States, 131 F.3d 1238, 1241 (7th Cir.1997) 2 The Supreme Court has recently granted certiorari to three cases involving Bailey challenges. Muscarello v. United States, --- U.S. ----, 118 S.Ct. 621, 139 L.Ed.2d 506 (1997); Hohn v. United States, --- U.S. ----, 118 S.Ct. 361, 139 L.Ed.2d 281; Bousley v. Brooks, 118 S.Ct. 31 (1997). In Muscarello, the Court will address the question of whether a weapon must be "readily accessible" in order to be carried under § 924(c). The question presented by Hohn is whether the Supreme Court has jurisdiction to review the court of appeals' denial of a petitioner's request for a certificate of appealability. Bousley involves the question of whether a guilty plea waives a Bailey challenge when the plea was entered before Bailey was decided. The outcome of this case does not depend upon the answer to any of these questions
{ "pile_set_name": "FreeLaw" }
FURTHER READING Konchesky scored a half-volley on the stroke of half-time to end a wait of over five years since his last top-flight strike. The win made it three league games unbeaten Leicester, who remain bottom despite having not tasted defeat in four games in all competitions, their best run of form this season. Aston Villa's terrible season in front of goal continued and they were clueless to find an adequate response to Konchesky's strike. Villa ended up drawing a blank for the 12th time this season to leave Paul Lambert's side in danger of being dragged into a relegation battle. The game ended in acrimony when Matty James saw red late on for a dangerous challenge on Jores Okore, an incident that also saw Villa's Ciaran Clark shown a second yellow for confronting the 23-year old. Villa have failed to score in 5 of their last 6 Premier League matches and netted just 1 in the other game. There have been just 13 goals scored in the last 11 Premier League games involving Aston Villa. Aston Villa have picked up red cards in 4 of their last 6 Premier League matches. Christian Benteke has only scored 2 goals in his last 13 league appearances. Paul Konchesky has scored his first Premier League goal for 1945 days (September 2009 for Fulham vs Everton). Villa did not manage a shot on target in the first half and only 1 after the break. This was only Leicester’s second Premier League win in their last 16 games. Villa’s total of 11 goals from 21 games is the second lowest at this stage of a Premier League season (Derby in 2007/08 had 10 from 21 matches). Indeed only two sides in top-flight history have scored fewer than 11 goals at this stage (Leicester in 1977/78 with eight and Derby in 2007/08 with 10). Leicester have taken 7 points from their last 3 Premier League games after getting 2 from their previous 13.
{ "pile_set_name": "Pile-CC" }
South Korea’s president is engulfed in a political scandal with plotlines straight out of a soap opera: rumors of secret advisers, nepotism and ill-gotten gains. Updated on Nov. 21. (Anna Fifield, Yoonjung Seo, Jason Aldag/The Washington Post) South Korea’s president is engulfed in a political scandal with plotlines straight out of a soap opera: rumors of secret advisers, nepotism and ill-gotten gains. Updated on Nov. 21. (Anna Fifield, Yoonjung Seo, Jason Aldag/The Washington Post) South Korean President Park Geun-hye suffered a heavy blow Sunday when prosecutors indicted a friend of hers on charges including extortion and abuse of power, and indicated they thought the president was complicit in the crimes. The prosecution said it would continue to try to question Park, with the announcement effectively making her a suspect rather than a witness, while opposition leaders said they would redouble their efforts to force Park from office. “There are now sufficient grounds for her impeachment,” Moon Jae-in, a prominent opposition politician and presidential hopeful, said after the announcement. It came a day after hundreds of thousands of South Koreans took to the streets of central Seoul for a fourth consecutive Saturday, calling on Park to resign. The demonstrations are the largest since South Korea democratized in 1987. The prosecution said Sunday that it had indicted Choi Soon-sil, a Park friend of 40 years who held no official position, with abuse of power, coercion, attempted coercion and fraud. It also indicted two former presidential secretaries on charges including abuse of power, attempted coercion, fraud and divulging classified information. At a Nov. 18, 2016 rally in Seoul, protesters wearing masks of South Korean President Park Geun-hye, left, and Choi Soon-si call on the president to step down. (Ahn Young-Joon/AP) The charges come out of a corruption and influence- peddling scandal that has Park, South Korea’s first female president, fighting for her political life. [Scandal shows that ‘Korean disease’ of corruption is far from cured] A famously aloof person, Park is accused of relying on Choi for everything from policy advice to wardrobe choices, instead of seeking counsel from her aides. Choi, the daughter of a shamanistic cult leader, is accused of exploiting those ties to raise money and win favors for herself and her family. Sunday’s charges relate to Choi’s alleged extortion, with the help of one of the presidential secretaries, An Chong-bum, of $70 million from 53 companies through a big-business lobbying group, the Federation of Korean Industries. The companies felt they had to donate the money or they would be at risk of audits or unfair treatment from government authorities, prosecutors said. The money was meant for two foundations, but Choi is alleged to have siphoned off much of it for her personal use. The other presidential aide, Chung Ho-sung, leaked at least 180 government documents to Choi over three years, including 47 that included confidential information such as the appointments of ministers, prosecutors said. Based on cellphone records and notes containing instructions from Park about raising funds for Choi’s two foundations, the prosecution concluded that Park “played a large role” in the efforts to raise money from the businesses, said Lee Young-ryeol, chief of the investigation at the prosecutors’ office, during a news conference Sunday in Seoul. Although the president cannot be charged while in office, Lee said prosecutors would continue to investigate Park and her actions, voicing confidence that they could prove that she was an accomplice. Charges could be brought against her once she leaves office. [South Koreans gather en masse to protest president] Park was supposed to be questioned by prosecutors last week but instead hired an attorney, who asked for more time to prepare and for the interrogation to be in written form, rather than in person. The attorney said that Park would “try to cooperate” with prosecutors this week. Park’s spokesman, Jung Youn-kuk, said Sunday that it was “regrettable” that the prosecutors claimed the president had committed crimes, saying the results announced Sunday were not only false but were also “based on imagination and speculation rather than objective evidence.” “The president does not see the prosecutors’ investigation as fair and hopes these unproven allegations will not be exploited by politicians,” Jung said. But opposition leaders seized on the results of the investigation. Eight potential presidential candidates met Sunday to discuss how to push for impeachment. “President Park has now become a suspect, creating the legal conditions to table a motion for her impeachment,” Youn Kwan-suk, the spokesman for the main opposition Democratic Party, told reporters. “She should follow people’s demands through a decision to resign voluntarily rather than making the worst choice that would plunge the nation into a bigger crisis,” he added, according to the Yonhap News Agency. [South Korea’s Park offers to withdraw nominee to quell scandal] As the scandal has rumbled on, some politicians have been hesitant to move to impeachment proceedings because the lengthy legal procedures could take as long as eight months. As Park has only 14 months left in office, they have instead called on her to step down. Opposition parties lack the seats needed to impeach a president, which requires two-thirds of the National Assembly. However, if some of Park’s critics from her own Saenuri Party join with the opposition to vote for impeachment, the two-thirds figure might be achievable. Park has been digging in, apparently in the hope that she can ride out the scandal. After last weekend’s huge protest in central Seoul, her spokesman said that Park was “earnestly considering ways to normalize state affairs and fulfill her responsibility as the president.” Even before Sunday’s announcement, analysts at Eurasia Group, a consulting firm that focuses on political risk, were putting the chances of her leaving office early at 70 percent. “The longer Park tries to hold out, the stronger popular demands for her removal will grow, increasing pressures on opposition parties to seek to impeach her,” Eurasia’s Scott Seaman wrote in a note. Yoonjung Seo contributed to this report. Read more As a bizarre scandal unfolds, South Korea’s president depicts herself as lonely The South Korean political scandal started with a card game in Macau South Korean president says she’s willing to be investigated in corruption scandal Today’s coverage from Post correspondents around the world Like Washington Post World on Facebook and stay updated on foreign news
{ "pile_set_name": "OpenWebText2" }
Q: I'm looking for the sql term to remove duplicate rows from a report The adhoc report tool is a Shazam product and I have a sql filter that has these value options: Is Equal To Is Between Is Greater Than Is Greater or Equal Is Less Than Is Less or Equal To Is Like Is Not Equal To Is Not Between Is Not Like The report runs, but I have a couple duplicates of the same Incident Number. How can I tell it to remove any duplicates? A: I think you are looking for the DISTINCT clause: The SQL DISTINCT command used along with the SELECT keyword retrieves only unique data entries depending on the column list you have specified after it.
{ "pile_set_name": "StackExchange" }
INCIDENT #1: At about 5:30 PM on Thursday, March 31, 2016, officers performing a paid detail in the area of Columbia Road and Bird Street in Dorchester responded to a radio call for a person with a gun in the area of 692 Columbia Road. As the dispatcher broadcast the location of the suspect, officers realized they were nearby and began heading in that direction. The dispatcher stated that the suspect with the gun had been seen climbing scaffolding while holding a gun in his waist band. As officers approached 692 Columbia Road, they observed an individual known to them walking hurriedly away while holding his waistband and repeatedly looking back over his shoulder. Officers approached the male and immediately observed the handle of a firearm in his waistband. Officers removed the loaded black Springfield Arms Model XD455 ACP 3.3 firearm from the suspect. When the suspect reported he did not have a license to carry, officers placed him under arrest. Thirty-one-year-old Januario Oliveira of Dorchester was charged with Unlawful Possession of a Firearm, Unlawful Possession of Ammunition, Possession of a Firearm with Obliterated Serial Number, and Unlawfully Carrying a Loaded Firearm. INCIDENT #2: At about 3:05 AM on Friday, April 1, 2016, officers from District B-2 (Roxbury) responded to a radio call for a person with a gun in the area of Waumbeck Street. Upon arrival, officers were informed that the suspect had shown a firearm and made threats before placing the firearm in a tan bag. Officers located the suspect and then, with the help of a K-9, recovered the tan bag containing a Desert Eagle pistol loaded with a large capacity feeding device, a box of ammunition, and several personal papers with the suspect’s name from the rear of a residence. Officers arrested a 28-year-old male of Roxbury and charged him with Assault by Means of a Dangerous Weapon, Unlawful Possession of a Firearm, Unlawful Possession of Ammunition, Unlawful Possession of a Large Capacity Feeding Device, and Unlawfully Carrying a Loaded Firearm.
{ "pile_set_name": "Pile-CC" }
12 But I say unto you, That Elias is come already, and they knew him not, but have done unto him whatsoever they alisted. Likewise shall also the Son of man suffer of them. 13 Then the disciples understood that he spake unto them of John the Baptist. 14 ¶And when they were come to the multitude, there came to him a certain man, kneeling down to him, and saying, 15 Lord, have mercy on my son: for he is lunatic, and sore vexed: for ofttimes he afalleth into the fire, and oft into the water. 16 And I brought him to thy disciples, and they could not cure him. 17 Then Jesus answered and said, O afaithless and bperverse generation, how long shall I be with you? how long shall I suffer you? bring him hither to me. 18 And Jesus rebuked the devil; and he departed out of him: and the child was cured from that very hour. 19 Then came the disciples to Jesus apart, and said, Why could not we cast him out? 20 And Jesus said unto them, Because of your aunbelief: for verily I say unto you, If ye have bfaith as a grain of mustard seed, ye shall say unto this cmountain, Remove hence to yonder place; and it shall remove; and nothing shall be dimpossible unto you. 22 ¶And while they abode in Galilee, Jesus said unto them, The Son of man shall be abetrayed into the hands of men: 23 And they shall kill him, and the third day he shall be araised again. And they were exceeding sorry. 24 ¶And when they were come to Capernaum, they that received tribute money came to Peter, and said, Doth not your master pay atribute? 25 He saith, Yes. And when he was come into the house, Jesus aprevented him, saying, What thinkest thou, Simon? of whom do the bkings of the earth take custom or tribute? of their own children, or of strangers? 26 Peter saith unto him, Of strangers. Jesus saith unto him, Then are the children free. 27 Notwithstanding, lest we should offend them, go thou to the sea, and cast an hook, and take up the fish that first cometh up; and when thou hast opened his mouth, thou shalt find a piece of amoney: that take, and bgive unto them for me and thee.
{ "pile_set_name": "Pile-CC" }
Q: How to access a compiled element's template after it's been compiled? Say I have an element like this: <elemental></elemental> I can pull the scope by running: angular.element($('elemental')).scope() Is it possible to get an element's source template after it's been compiled in a similar fashion from the DOM? A: It is possible although I would think the use case for this should be pretty rare (i.e. your code is running outside the Angular "world"). I've given the directive an ID with the same name so I could locate it via the DOM, but this could be done using any DOM element that is part of the app: var appElement = angular.element(document.getElementById('elemental')); var injector = appElement.injector(); var myTemplate = injector.get('elementalDirective')[0].template; console.log(myTemplate); // the template First, get the app's injector. Then locate the provider for the custom directive, which will always be the name of the directive plus the string 'Directive' (in this case elementalDirective). Then access the template property. Demo: Here is a fiddle See also: Call Angular JS from legacy code Edit: My previous answer assumed the element was not compiled yet.
{ "pile_set_name": "StackExchange" }
We have begun a clinical protocol to determine if resident lymphocytes in non-small cell lung cancer are reactive with tumor specific mutated neo-antigens and if so, whether they can be therapeutic if given patients using methods recently developed in the Surgery Branch (Tran et al, Science 2014). We are studying ways to sequence the genome of a patient's lung cancer, identify all mutated proteins, redisplay them effectively to the T-cells in their tumors and search for T-cells that can react to these mutated neo-antigens. We then wish to develop ways to isolate or enrich them, grow them and readminister them for therapy.
{ "pile_set_name": "NIH ExPorter" }
There have been provided building elements which are principally limited to the construction of walls which when assembled together present hollow interiors intended to receive concrete or the like and the elements are provided with holes which afford internal communication between adjoining elements through which the concrete can flow. For example, German Specification DE C23003448 discloses the use of a large series of hollow square rectangular elements constructed from impregnated pressboard which are stood up side by side and then tied together by means of tie rods. The adjacent side walls of these blocks have holes therethrough so that when concrete is introduced therein it can flow therebetween to interconnect same. When such elements are used as ceilings, the holes therein are upwardly facing so that there is no provision for lateral concrete flow between adjoining elements. These hollow blocks or elements are awkward to assemble and require a great deal of handling of a large number of individual elements in their assembly into a wall formation. Moreover, their manufacture is relatively expensive requiring the assembly of the pressboard into square or rectangular form and the resulting wall does not present an impervious smooth aesthetic wall surface. A similar brick-like building element is disclosed in German Specification DE C2324489 which also has similar disadvantages. U.S. Pat. No. 5,216,863 discloses an elongated thin flexible walled cylinder-like shaped formwork elements with the elements being mutually interconnectable and when interconnected they provide a series of adjoining closed cylinders. These cylinders are internally connected through openings so that when concrete is poured therein it will flow therethrough to create a wall formed by a series of interconnected vertical concrete columns encompassed by the thin formwork walls which may be left in place or discarded. The formwork walls may be formed of polyvinyl chloride (PVC) to give the columns an attractive surface coating. Again, these individual formwork elements require a great deal of handling and, if they are formed of PVC, only virgin material can be used and the material cut out to provide the apertures becomes waste material. These formwork elements do not have individual structural integrity but require mutual interconnection and their cylindrical form to give them any structural substance capable of withstanding the introduction therein of wet concrete.
{ "pile_set_name": "USPTO Backgrounds" }
Replies Views Started Last Post tamageff A care miss happens when you neglect the calling of your tama. To be able to obtain a specific tomo you want, you need to intentionally neglect it. The charts tell how many times a tomo needs to get care misses. oddsandendswithlove ok ill break it down like I have in my tamagotchi binder...a are miss is adzactly what tamageff had explained above...but to add to his decription...to successfully get a care miss, when your character needs something it will beep and have the icon light up in the bottom right hand corner (face icon),and wil be calling your name in a speech bubble. you muct ignore it completely...it will take approximately 15 mins for this character to stop calling you.but watch carefully cause ive had my character get sick sometimes and need medication (and you don't want to ignore that cause the character can die if not answered.)when the character has finally stopped calling you then you have successfully obtained 1 care miss. in the above chart shows the caremiss's that you need to get particular characters for ex: patitchi she needs 3-7 care misses so you need to make sure she has the amount shown...but at the same time there is a little icon which shows a fork and knife by her name. that is a personality trait . I have a link to a graph below that I use I hope this helps... oh and p.s- if you ever have any other questions and need a full info list on a tamagotchi of any kind I have a binder that Ive been working on,it has over 300 pages of information.i can send you a scan of some info or even just give you any info you need <3 HopeMcCarthyAuroraLovingtn ok ill break it down like I have in my tamagotchi binder...a are miss is adzactly what tamageff had explained above...but to add to his decription...to successfully get a care miss, when your character needs something it will beep and have the icon light up in the bottom right hand corner (face icon),and wil be calling your name in a speech bubble. you muct ignore it completely...it will take approximately 15 mins for this character to stop calling you.but watch carefully cause ive had my character get sick sometimes and need medication (and you don't want to ignore that cause the character can die if not answered.)when the character has finally stopped calling you then you have successfully obtained 1 care miss. in the above chart shows the caremiss's that you need to get particular characters for ex: patitchi she needs 3-7 care misses so you need to make sure she has the amount shown...but at the same time there is a little icon which shows a fork and knife by her name. that is a personality trait . I have a link to a graph below that I use I hope this helps... oh and p.s- if you ever have any other questions and need a full info list on a tamagotchi of any kind I have a binder that Ive been working on,it has over 300 pages of information.i can send you a scan of some info or even just give you any info you need <3 Wowww.. Thank you so much natasha.. This is so helpful,now i understand. so if my character take a poop,or hungry just ignore it,until the face icon gone?or just ignore it for 15 minute. Does"face icon" can be gone for 15 minute? A care miss happens when you neglect the calling of your tama. To be able to obtain a specific tomo you want, you need to intentionally neglect it. The charts tell how many times a tomo needs to get care misses. Thank you geff.. omg i think i always take care of them when they call me,i am so wrong... haha oddsandendswithlove your more than welcome hun <3 im just happy i can help.the tamagotchi p's is one of my very favorite tama's...and yes it only counts as a care miss if the face icon turns on,then you wait the 15 mins and then it will also go away.thats when you know youve successfully completed the care miss <3 i always find it so hard to let my tama go that long personally lol...thats why ive been having trouble getting particular characters hehe.im happy that i could help >.< HopeMcCarthyAuroraLovingtn your more than welcome hun <3 im just happy i can help.the tamagotchi p's is one of my very favorite tama's...and yes it only counts as a care miss if the face icon turns on,then you wait the 15 mins and then it will also go away.thats when you know youve successfully completed the care miss <3 i always find it so hard to let my tama go that long personally lol...thats why ive been having trouble getting particular characters hehe.im happy that i could help >.< Natasha one more question,if my toddler become teen,so i just not giving them foodnit cleaning food,not touch them, except for medichine if they sick,am i right? but teen character can day,isn't it? HopeMcCarthyAuroraLovingtn your more than welcome hun <3 im just happy i can help.the tamagotchi p's is one of my very favorite tama's...and yes it only counts as a care miss if the face icon turns on,then you wait the 15 mins and then it will also go away.thats when you know youve successfully completed the care miss <3 i always find it so hard to let my tama go that long personally lol...thats why ive been having trouble getting particular characters hehe.im happy that i could help >.< Natasha one more question if my toddler become teen, so i just not giving them food and play with them ,so i will get miss care point.am i right? except for medicine. Teen also can die right? oddsandendswithlove lol yes er right, the teen can also die...and it works all the same for every character, the only differences are the amount of care misses it takes to get the characters...and er right the tamagotchi p's are complicated im still learning about mine lol...and ill teach you a little trick for getting the correct character...when your tamagotchi changes if its not the character you want quickly before the change is complete(a good time is when the gotchi points show up) hit the reset button on your tamagotchi and select DOWNLOAD..never reset! your tama character will be unchanged again then wait approximately 20 minutes or so, and it will change again..keep doing this until you recieve the character you want to get... this trick works for tamagotchi id, id l, and tamagotchi p's...im not sure if it works on the tamagotchi color plus yet cause i havent gotten mine yet lol... HopeMcCarthyAuroraLovingtn lol yes er right, the teen can also die...and it works all the same for every character, the only differences are the amount of care misses it takes to get the characters...and er right the tamagotchi p's are complicated im still learning about mine lol...and ill teach you a little trick for getting the correct character...when your tamagotchi changes if its not the character you want quickly before the change is complete(a good time is when the gotchi points show up) hit the reset button on your tamagotchi and select DOWNLOAD..never reset! your tama character will be unchanged again then wait approximately 20 minutes or so, and it will change again..keep doing this until you recieve the character you want to get... this trick works for tamagotchi id, id l, and tamagotchi p's...im not sure if it works on the tamagotchi color plus yet cause i havent gotten mine yet lol... heres the tamagotchi growth times chart: egg to baby =1minute baby to toddler=1 hour toddler to teen= 1 day teen to adult= 1 day adult to final tamatomo(happy symbol)= 72 hours(after becoming adult) Thank you for your help,you help me a lot,now i totally undarstand about miss care Thank youu HopeMcCarthyAuroraLovingtn sure usually is 48 hour,but sometimes with no reason it can be 72 hour like 3 day to get tamatomo happy symbol.Iever experiencedthiswhenIgetmametchi.i take 72 hour to get that happy symbol. But usually 48 hour. that's just special cases. oddsandendswithlove lol yes, you guys are correct too! but we are talking about the tamagotchi p's not the id l,ive actually had a lot of my characers have the 72 hrs baha and I have no clue why but I have had 48 hrs too...im not sure what makes the difference yet but im trying to figure it out <3
{ "pile_set_name": "Pile-CC" }
Rhett Miller's songs are about joy and loneliness, about girls named Doreen and Victoria and Salome, about four-eyed girls and Don DeLillo and J.D. Salinger, about T.Rex and Elliott Smith and Loretta Lynn. He's the thoughtful literature lover who has written for McSweeney's and the Atlantic and Salon. He's the generous musician known to show up and play a fan's bachelorette party. And he is the most messed-up motherfucker in this town. "Most Messed Up" is the title of the new Old 97's album, arriving on April 29, and first listen marks it an instant classic. It is an album steeped in pain -- pain caused to others, pain drowned in whiskey and pills. Also, bad behavior, bad decisions, betrayals, confusion, frustration, madness, some of which is also fueled by, or smoothed over by, drugs and booze. It's life on the road, it's life at home, and none of it is easy. Advertisement: In the lyrics, I count 11 fucks, seven bottles of whiskey, Jameson, malt liquor. Oh, and orange ones, blue ones, green ones, white ones. One intervention. People drink all the way to the bank and then drink again. They get drunk and get it on. They swim in oceans and oceans of alcohol. Yes, it has been an emotionally draining time for Miller -- but a liberating one as well, too. Something in the awfulness of the pain gave him the freedom to speak out and speak his mind. And this autobiographical song cycle is his most honest, revealing and often laugh-out-loud funny yet. "I’ve come to a decision where I don’t have to try and be perfect," he said over the phone last week, in an exclusive first interview about the album. "I don’t have to try and be nice. I don’t have to try and make everybody happy all the time." That's apparent from the very first song, "Longer Than You've Been Alive," which comes right out and admits to the drinking and pills, to how the road can be "a blast and a bore," to butting heads with band mates, and to nights onstage where everyone is checking the clock. That directness sets the tone for a total excavation of the heart, all of it set against a return of the careening, train-wildly-off-the-track beat that will make fans of "Too Far to Care" and other early albums rejoice. Advertisement: Rhett and I (full disclosure, we've known each other for a decade and I edited his Salon and McSweeney's work) talked about the new album last week; the interview has been lightly edited and condensed. "Most Messed Up" is a killing machine from start to finish: Raw, focused, honest, drunken, funny, deeply revealing about the challenges and joys and temptations of a life on the road. And it's quite a change from the last Old 97's albums, which were expansive, democratic affairs – three songwriters, 11 styles. Yeah. It is that. It’s funny, I went to the band with a pile of, like, 30 songs and about half of them were what you were just describing – every song, the song ends and you go: “You can’t sing that!” And then the other half were just these really pretty or sad songs or whatever. More conventional stuff. At first blush, the band was freaked out. Specific members of the band, especially, were like, “I got kids! I can’t be singing that!” Which I appreciate because it’s so weird to hear my kids walking around the house singing these songs. Advertisement: “I am the most messed-up motherfucker in this town,” daddy ... Oh yeah. Well, I’ve been able to hide that one. That one they’ve only heard once or twice. But I caught my 10-year-old son, Max, walking around singing “Wasted” and it’s so weird hearing a 10-year-old singing, “Tonight I want to get wasted with you.” And so I said to him, “Max, that’s kind of inappropriate,” and his line, which is a testament to what a glib con man he’s going to grow up into, was: “Dad, if you didn’t want me to sing it — if it was so inappropriate — you shouldn’t have made it so catchy.” Advertisement: He’s going to be a critic. He’s doomed to a life of poverty and writing for online magazines. Exactly. So you come in with half pretty songs and half crazy rocking honky-tonk songs about a band, life on the road, and one messed-up frontman. And somewhere you made a decision to strip the pretty ones out and focus on the ugly truth. The band gave in? Advertisement: Yeah, I’m sorry I didn’t finish my thought there. So we actually kind of decided, “I guess we’ll just go with those pretty songs then.” And then about a month later, Ken called me up and goes, “Man, I just finally listened to …” Oh! I guess I just outed the member of the band that was the most against the cursing. Ha! I guessed it anyway. Advertisement: Yeah, of course. Ken called me up and said, “Man, I just listened to these songs and these are the best songs you’ve ever written. Yeah, there’s a lot of cursing in there, but they're still honest and they’re so funny and real.” So he capitulated -- and not only did he capitulate, but he got excited about the idea. “Fuck it, let’s make a record where we drop like 47 f-bombs and talk about sex in every other song -- and whiskey!” You know, it’s not as if our catalog isn’t built on songs about sex and whiskey; we just always made it a little more subtle than that. So why be so direct now? It’s not just the sex and whiskey. There’s pills and lots of drugs. It’s not the way most bands announce, “Hey, we’ve been together for 23 years. Here’s a new album about sex, drugs and bourbon.” I’m typically not that interested in getting into personal life stuff because I don’t think it has much to do with the songs. But at this point in my life I’ve come to a decision where I don’t have to try and be perfect. I don’t have to try and be nice. I don’t have to try and make everybody happy all the time. And it was really liberating — that decision — and terrifying. And I think that with my music I’ve always tried so hard to make it kind of pretty, and not necessarily inoffensive, but I don’t want to push too many buttons. I’ve tried to keep it kind of clean and streamlined. This time around I just decided, who I really am is like most people. I am flawed and fucked up -- and I think I just feel like embracing it. I don’t feel like trying to be a perfect person anymore. So the most messed-up motherfucker is you. Advertisement: Oh yeah, from the title on down. I’m the most messed up. I’m the most messed-up motherfucker in this town. I’ve tried not to examine my body of work over the years, but I do think there is a theme that runs through it that I feel like the people who like our band and my songs have latched onto — this idea of just kind of being a mess, kind of being a loser. Not a loser. I guess that’s the wrong word. I think that this character that I’ve been toying with, or writing from the perspective of for all these years, is flawed. He’s kind of a mess. Things do not typically work out for the protagonist in my songs -- and it just felt right to amplify that instead of run from it. Bands tend to get quieter at this point, to retreat a little bit into what works … I just felt like something of a grand gesture was in order. It would make sense to go out there and do something just different. I’m the youngest guy in the band — and I’m 43 — and it would make a lot more sense for us to fold it up a little bit and go the way of the quiet singer/songwriter/alt-country troubadour/elder statesman. But we’ve never been that. We’ve always been sort of next wave of whatever outlaw country was at the time. Everybody is singing pretty but we’re getting fucked up and singing about getting fucked up. There’s a reason that we recorded all those years ago with Waylon Jennings and there is a reason he liked our band. I see this record as a torch getting passed years later by the outlaw country guys. We’re still carrying it. Advertisement: Did you feel like you had gotten off that path a little bit on some of the last records? They were bigger, more expansive, more songwriters chipping in. Yeah, you know, democracy is fucked because you end up having to make so many people happy. I’ve been proud of the last records, but I see how there is push and pull. There’s Murry who has this idea that we are a garage band, like a Nuggets record, that’s what we need to be. And I think Ken kind of wishes we were a surf band, and Philip, I don’t know. Philip is such a peacemaker; he just wants everybody to be happy. And I vacillate between wanting to make Belle and Sebastian records and wanting to make — God, that’s such an old reference now — you know, wanting to do kind of honky-tonk stuff. So there is a lot of pushing and pulling and it’s funny, because with this stack of songs, it sort of addressed everyone’s desire. It really rocks; it leaves a lot of room for a big surf guitar; and it’s got a lot of garage band elements. At its heart, it’s kind of a honky-tonk record, and then there are these beautiful moments that happen inevitably when you get the harmony happening or a middle break. It wasn’t necessarily by design, but as it started to unfold, and once Ken, for instance, embraced the idea of going there … I think we all really got into this idea that we were making something that was really different and raw and honest, once Ken decided that he was going to go to his teenage son and say, “Look, grown-ups deal with a lot of heavy-duty shit; maybe Rhett’s going through a lot, maybe these songs are addressed to people who aren’t all happiness all the time.” Advertisement: It has the spirit of "Let It Be"-era Replacements, and indeed, Tommy Stinson plays guitar on several songs. The Tommy Stinson thing was really by accident. We had decided to go this direction, and we were in Dallas working up the songs and really having fun and then I got a text from Tommy that Guns n’ Roses was in Dallas and that I should come and see the show. That's how a good story starts. Yes. I went to the show, stayed up late with them, and got, of course, super-wasted. So much so that when I got back to my hotel room, when I was trying to take my shoes off, I thought I was going to sit on the bed. I missed the bed and broke my elbow. And that's how a night with Guns n' Roses ends. It could have messed up your signature guitar move! Well, it wound up not being a fracture, but I ended up in a sling for two weeks and it was super-messed up. So I called Tommy and I said we have one more day of pre-production on this record, why don’t you come and be the rhythm guitarist -- because I can’t after you got me so wasted. The way he plays guitar is different, obviously, from the way I play it or the way Ken plays it. It really is part of the ‘Mats thing, it’s this loose, kind of lively, sloppy, fun, guitar. That angle really added to some of the songs. He only played on five of the songs, but having him in the equation just added an element of wheels-off insanity, you know, true rock 'n' roll to it. But for all the true rock 'n' roll, you make a point in "Longer Than You've Been Alive" of ruling out the serious drugs. "Mountains of weed a handful of pills / None of the hard stuff, that shit kills." Well, I honestly believe that, and it’s been one of the things in our band that we’ve stuck to. There was a producer we were going to work with, who I won’t name, but who was going to be the producer of “Too Far to Care” and ended having to back out. And I don’t think it was because of this demand that I made, but I made a demand early on in the process where I said, “When we go into the studio, I don’t want any cocaine or any of that shit because, you know, I don’t want to be the kind of the band that ends because of drugs.” To me, there’s such an obvious difference between weed or booze and stuff like that. I remember an interview where they asked Joe Strummer: Do you smoke weed in front of your kids? And he said no, not while they’re this young, because they’re not old enough to differentiate between good drugs and bad drugs. I don’t want them to go out and do heroin or blow. So I put that line in completely sincerely. I mean, there’s a reason we’ve been a band with all four members and we’ve all stayed alive -- because we’ve been able to exercise moderation. You wouldn’t know it from some of these songs! The line before that references “oceans and oceans of alcohol”? You know, 20 years is a long time! (laughs) How did “Longer Than You’ve Been Alive” start? It’s obviously such a big centerpiece and statement about where this album is going to go. Is that the first song that you wrote of this cycle? No, the song that sort of started the ball rolling on the “Most Messed Up” stack of songs was really weird. It was a trip to Nashville that my publishers at the time sent me on to co-write with this guy who had a few national hits, like Reba McEntire-type songs. It’s this guy Jon McElroy. He’s an old school, Nashville songwriter. As I was following him up to his songwriting room, he said, “Man, I’ve been checking you out on YouTube and I think your audience would really appreciate it if you would just walk out there and just say, “fuck.” And I thought, wow. It’s kind of an echo of something. When I was a kid, my mom worked for this psychologist who was a charismatic, brilliant guy and the line he had about me -- that I overheard him telling her -- that has always stuck in my head, was, “Rhett will be fine when he can walk up to me and say, ‘Fuck you, Dr. Hubbard.'” I’ve always tried to be such a nice guy. You know, that’s like the last thing I would ever say to anybody. I would never put these sentiments in these songs so forthrightly -- and to have Jon McElroy say that to me, well, the song we wrote in the next two hours was the story of this really frustrated guy who’d done bad shit, but was just trying to figure it out, just trying to do the right thing. It really opened the floodgates for me. I felt like, OK, it’s all right to go there. So this record is definitely about going there. Once I had opened the floodgates and decided that I could write this suite of songs that was kind of self-referential, kind of a meditation of what it means to be in this life of music, in this life in general … I remember I was on an airplane headed back from a trip and then it just came out, the final lyrics of that song were the original lyrics. It feels like it rushed out in one swoop. It just poured out and it was so much fun to write. I didn’t have a guitar, I was just writing in rhymes, in couplets, and assuming I could find a way to set it to music. So I just wrote it, and when it was over I read through it and I was just laughing my ass off on the airplane. I was laughing because I can’t believe I wrote this -- and I can’t believe it took me this long to write this. I published a tour diary you wrote many years ago, and I remember thinking it was one of the most honest pieces of writing I'd ever read, not only because it talked about how dull life on the road can be, how you end up doing your own laundry in some cities, but also in that sometimes your band mates can really annoy you. And of course they can. We have this sense that a band is this group of brothers, and well, like any brothers, or like anyone you work with for 20 years, sometimes you don't get along. I was reminded of that with the line "20 good years of about 25," which is very funny. Thanks. That one goes by so fast and to me I think it’s such a funny punch line, but not a single person yet has mentioned it till you. Nobody mentioned it in the band? No, we don’t give a shit. But that was sort of inspired by my day with Jon McElroy. He and his wife have been married for a long time and they were smoking their cigarettes and telling me about their life together. And he goes, “We’ve been married about 20 years, but, you know, about 15 good years.” So I stole the line from him. The guys were really cool about it. I wondered about the line, “I might butt heads with the guys in my band.” But I think they were like, “Well, duh!” They know better than anyone what I’m talking about. I remember when I was working with Jon Brian on “The Instigator,” he laid down one of his rules -- he can’t stand it when songs and songwriters reference songs and songwriting. That’s a pet peeve of his. And I’ve always remembered that -- just because I lived in that world and that’s what I do and think about all the time, doesn’t mean I have to be talking about it in the songs or writing about it or dwelling on it. It takes people out of the experience; the songs should be more universal. It should be applicable to any job or any moment in someone’s life. But because this record what so specifically a record about being in a rock band for all these years and living this crazy life, I sort of let myself go there. I did feel like I needed to address, “Yes, I understand that I am crossing an imaginary line, but fuck it.” There's also a handful of songs on the album where you take on critics or haters, and make a point of saying you've never worked in an office or for the man. Is that aimed at anything in particular? I’ve been doing a lot of work lately on aggregating artists’ power and the creators of content on the Internet and beyond, and trying to figure out how to address the demonetization and devaluing of these things we create. Of which, I’m sure, you’re completely aware. One of the functions of that is it makes it harder and harder for people who do what I do to make a living, so inevitably, I wonder: What else could I do?” And the problem/awesome thing is when I forfeited my full scholarship to Sarah Lawrence, got a gold tooth and made all these choices that would make it impossible for me to ever have a square job -- I didn’t want a safety net. I wanted the opposite. I wanted no other option but to succeed with this idea that I could make a living creating art -- and that I could spend my life getting paid to sing and dance and make up rhyming couplets. The other night we did a gig in Dallas that was a benefit for a school in Dallas. It wound up being a lot of parents whom I had gone to school with years ago, who now had kids in this school and who were also so wealthy. Oh my God! The money that they were dropping on this silent auction, like $18,000 for their kid to be headmaster for a day. Anyone with that much money deserves to have it taken away from them. I’m literally thinking, well, that’s great! I gotta figure out how I’m not gonna bounce the check that I’m writing for, whatever, my mortgage. So I’m onstage and I’m laughing because these people, any one of them, could buy and sell me 10 times over -- and yet I know they’re all sitting there thinking, “I wish I had his life.” I mean, I’m not patting my own back, but I talked to enough of them that I know they think my life is so much cooler than all of theirs. And it’s probably true, but it’s so funny -- I’m jealous of their dough and they're jealous of my actual life. And you know, they should be, it’s pretty fuckin’ fun. It's not all fun: "Wheels Off" goes to a very raw place, but "This Is the Ballad" is the one that knocks me over. "This is the ballad of long conversations / Heavy with silence and shuddering breaths / You’re self-destructing your voice is all shaken / My reservations are all I have left." That's the sound of self-destruction and collapse. How hard is it to lay that out, to make it clear you're not hiding behind a character, and then to have to take it city to city and relive it every night? It’s not easy to do this job but there is such a fun upside to it. It would be easy to just hide behind the idea of fiction and protagonists and all that stuff, but everything that maybe anyone writes -- and certainly that I ever write -- is some version of me. But it’s tough to walk out onstage and have to sort of relive things every night and do it for the sake of the audience and for the sake of the show. If it’s something I’m reliving that I’m not necessarily proud of then I deserve it to have to relive it. Maybe that's some sort of therapy for me. You can hear a new sampler from the album in this video:
{ "pile_set_name": "OpenWebText2" }
Daejeon Hanbat Baseball Stadium The Daejeon Hanbat Baseball Stadium, also known as the Hanwha Life Insurance Eagles Park due to sponsorship reasons, is a baseball park in Daejeon, South Korea. The stadium is located in southern skirt of Daejeon, vicinity of Daejeon Station. Located in Daejeon Hanbat Sports Complex with other main sports facilities in Daejeon, it is currently used as home of Hanwha Eagles of Korea Professional Baseball League. Built in 1964, the ballpark was once nicknamed as the Ping-Pong Table for having the smallest outfield dimension among professional ballparks in South Korea. But the ballpark underwent a series of large scale renovations with capacity extension from 2011 winter to 2012 spring, and outfield expansion in the winter of 2012. After the renovation, the ballpark currently has a second-largest outfield dimension in first-string professional ballparks in South Korea, and a seating capacity of 13,000. Transportation The ballpark can be accessed by public transit. Local bus #620 from the station runs directly past the stadium. Out of town visitors via express bus East Daejon Bus Terminal can ride a taxi, which requires approximately 6,000 KRW. Limited parking is shared with the nearby sports venues. References External links Baseball Journeyman blog on the ballpark Category:Baseball venues in South Korea Baseball Stadium, Hanbat Category:Sport in Daejeon Category:Hanwha Eagles Category:Doosan Bears Category:Sports venues completed in 1964
{ "pile_set_name": "Wikipedia (en)" }
Automatic server hardening framework - dewey https://telekomlabs.github.io/ ====== allendoerfer Seems like a nice and comfortable way to set sane defaults for nginx, Apache, MySQL, PostgreSQL and some Unix stuff - but they really should have been set by each software in the first place. I like, the private touch the screencast and the developer-designed website gives the project, even if part of a big company. This actually raises its credibility. ~~~ ams6110 _they really should have been set by each software_ Yes, and it seems to me that distros (at least those intended for "enterprise") should be hardened by default also. If I install RHEL or OEL and then have to run a Chef or Puppet config to "harden" it, something is wrong. ~~~ jlawer Well, thats been tried and rejected by the user base. If you harden too much it becomes a real PITA to do anything productive (SELinux running in strict mode). RHEL aims to be secure, while also remaining fairly compatible with previous versions. Red Hat do have documentation on how to harden, but most users don't use it and instead turn SELinux completely off as one of the first configuration steps. ------ iand675 Very cool, but seems like it would be nice to have the hardening steps documented outside of code too (for those of us with more exotic provisioning tastes). ~~~ mikegioia I completely agree. I was looking for the SSH settings but I don't use Puppet or Chef. This is why I prefer shell scripts so I can see what's going on and run parts of it on my own. ~~~ metatron31 You can check the references here in the lifecycle section: [http://telekomlabs.github.io/docs/](http://telekomlabs.github.io/docs/) ------ virtuallynathan Seems bad that it disables IPv6 "for security". ~~~ ownagefool Disable anything you don't use. I wish it weren't so but IPv6 is probably a safe assumption there. ------ crymer11 Ansible support would be spiffy. ~~~ kieranajp I was looking for the same thing; however I can't find any acknowledgement of Ansible's existence anywhere on the site or in the docs :( ------ zobzu tldr its a set of open source puppet/chef/others modules to harden the default configuration of common daemons. ------ codezero The audio on the demo video is really choppy, is that just me? ~~~ dewey The same is happening for me, didn't notice it when I watched it before I posted it though. Maybe Vimeo is having problems. ~~~ markcampbell It's not vimeo. Downloading the video and playing it locally with VLC yields the same problems. ------ Alupis It this an arm of T-Mobile (the US carrier)? Their logos are strikingly similar, but their websites make no reference to each other. Telekom Labs logo: [http://www.laboratories.telekom.com/public/Deutsch/Pages/def...](http://www.laboratories.telekom.com/public/Deutsch/Pages/default.aspx) T-Mobile logo: [http://www.t-mobile.com/](http://www.t-mobile.com/) ~~~ dsl T-Mobile is the US subsidiary of Deutsche Telekom. ~~~ pluma Nitpicking: T-Mobile is the international mobile branch of Deutsche Telekom, not just in the US (though there is a US subsidiary). Other branches include T-Online (private ISP, actually a former subsidiary), T-Systems (subsidiary proving services to the public sector and larger corporations) and T-Home (which I have trouble telling apart from T-Online). There may be other branches too, but in practice most people in Germany just lump them all together anyway.
{ "pile_set_name": "HackerNews" }
Love (The Cult album) Love is the second album by British rock band The Cult, released in 1985 on Beggars Banquet Records. The album was the band's commercial breakthrough, reaching number four in the UK and staying on the chart for 22 weeks. It produced three Top 40 singles in the UK, "She Sells Sanctuary", "Rain" and "Revolution". It has been released in nearly 30 countries and sold an estimated 2.5 million copies. Love was recorded at Jacob's Studios in Farnham, Surrey, in July and August 1985. Background Many European CD pressings, as well as Canadian and Australian pressings, include two bonus tracks: "Little Face" as track four, and "Judith" as track eleven. Various other foreign pressings have several other bonus tracks. For unknown reasons, the Korean vinyl and cassette tape editions omitted the songs "Big Neon Glitter" and "Revolution". Also inexplicably, in the Philippines a considerably shorter version of the song "Brother Wolf; Sister Moon" was used; it lasts only 5:18, omitting most of the guitar solos in the second half of the song. In 2000, the album was remastered and reissued on CD, with only the ten original songs and different artwork. "Big Neon Glitter" and "Hollow Man" are alternately listed with and without the article "The" in their title, respectively. In 2003, the record was issued on CD in Russia, Belarus and Lithuania, formerly being available only as a bootleg LP in the Soviet Union. These 2003 Eastern European releases came with the bonus tracks "Faith Healer" and "Edie (Ciao Baby)" (acoustic) as tracks 13 and 14, and the word acoustic is misspelled as ""; the pressings also use a different font for the lettering. There is also an Indonesian cassette tape version which rearranges the track listing, and includes "Dreamtime" and "Bad Medicine Waltz", from the previous Cult record Dreamtime. To coincide with the band's Love Live Tour in August 2009, the band released two different editions of the album: Version one is the "Expanded Edition", a 2-CD set consisting of the album on one disc as well as extended versions of album cuts, remixes and b-sides on the second disc. This set was released on 8 August 2009 in Varada and the USA, and 21 September in Europe. Version two is called the "Omnibus Edition" which features the first two discs from the "Expanded Edition" plus two more discs. Disc three features demos from the Love album presented for the first time, and disc four features a live concert recorded by the BBC at the Hammersmith Odeon in London on 31 October 1985. Track listing Original 1985 release All songs written by Ian Astbury and Billy Duffy. 2009 "Expanded edition" CD 2 track listing "She Sells Sanctuary" (Long version) – 6:59 "No. 13" – 4:40 "The Snake" – 8:09 "(Here Comes the) Rain" – 6:19 "Little Face" – 4:54 "Revolution" (Full length remix) – 5:29 "Judith" – 5:29 "Sunrise" – 5:11 "All Souls Avenue" – 4:45 "She Sells Sanctuary" (Howling mix) – 8:26 "Assault on Sanctuary" – 7:31 Omnibus edition CD 3 and 4 track listings CD 3: "The Demos" "Brother Wolf, Sister Moon" – 7:54 "Hollow Man" – 5:48 "She Sells Sanctuary" – 5:21 "All Souls Avenue" – 4:56 "Little Face" – 5:45 "No. 13" – 6:23 "Big Neon Glitter" – 6:34 "Waltz" (Instrumental) – 4:36 "Nirvana" (Instrumental) – 6:04 "Revolution" (Instrumental) – 6:50 "She Sells Sanctuary" (Olympic mix) – 7:04 CD 4: Live at the Hammersmith Odeon, 31 October 1985 "Love" – 5:54 "Nirvana" – 5:05 "Christians" – 4:33 "Hollow Man" – 5:01 "Big Neon Glitter" – 4:46 "Brother Wolf, Sister Moon" – 7:01 "Rain" – 5:12 "Dreamtime" – 3:10 "She Sells Sanctuary" – 5:35 "Go West" – 5:02 "Spiritwalker" – 4:35 "Horse Nation" – 3:17 "The Phoenix" – 5:19 Bonus tracks/international releases "Little Face" (bonus track, track four in some territories) "Judith" (bonus track, track eleven in some territories) "Faith Healer" (bonus track, track thirteen in Eastern Europe and Asia) "Edie (Ciao Baby)" (acoustic version) (bonus track, track fourteen in Eastern Europe and Asia) Indonesian cassette tape versions: Side A: Love, She sells Sanctuary, Rain, Nirvana, Revolution, Black Angel. Side B: The Phoenix, The Hollow Man, Big Neon Glitter, Brother Wolf Sister Moon, Dreamtime*, Bad Medicine Waltz*. *From the album Dreamtime. On these Indonesian pressings, the song "Brother Wolf Sister Moon" is incorrectly listed as "Brother Walf Sister Moon", and drummer Nigel Preston is listed as Nigel Reston. Saudi Arabian cassette tape versions includes "Spiritwalker/Dreamtime/Rider in the Snow/A Flower in the Desert" as bonus tracks, but it does not include "Judith" or "Little Face". An alternate Saudi Arabian version includes only nine of the original ten songs, omitting Revolution and comes with a different sleeve. 2009/2010 Love Live Tour In 2009 and 2010, The Cult played the Love album in its entirety during an extended tour. The setlist typically was formatted as follows. "Nirvana" "Big Neon Glitter" "Love" "Brother Wolf, Sister Moon" "Rain" "The Phoenix" "Hollow Man" "Revolution" "She Sells Sanctuary" "Black Angel" Encore: "Electric Ocean" "Wild Flower" "Illuminated" (later replaced with "Sun King") "Rise" "Fire Woman" "Dirty Little Rockstar" "Love Removal Machine" Personnel The Cult: Ian Astbury – lead vocals and backing vocals Billy Duffy – guitars and backing vocals Jamie Stewart – bass and backing vocals Additional personnel: Mark Brzezicki – drums on all tracks except "She Sells Sanctuary", "No. 13" and "The Snake" Simon Kliney – Fairlight Nigel Preston – drums on "She Sells Sanctuary", "No. 13" and "The Snake" The Soultanas (Mae McKenna, Lorenza Johnson, Jackie Challenor) – backing vocals on "Rain", "Revolution", and "The Phoenix". References Category:The Cult albums Category:1985 albums Category:Beggars Banquet Records albums Category:Sire Records albums
{ "pile_set_name": "Wikipedia (en)" }
The Giant Joshua The Giant Joshua is a 1941 novel written by Maurine Whipple about polygamy in nineteenth-century Utah Dixie. The idea for the novel started as a short story submitted to the Rocky Mountain Writer's conference in 1937. There Ferris Greenslet encouraged Whipple to apply for Houghton Mifflin Literary Fellowship, which she won in 1938 in advance of her first novel. With Greenslet's encouragement and support, she completed it over the course of three years. The novel focuses on the life of Clorinda (Clory), who becomes the third wife of Abijah MacIntyre and lives in Southern Utah during its early years of colonization by Mormon pioneers. Clory survives through both emotional and physical hardship as she experiences the deaths of her children and multiple miscarriages, near-starvation due to drought and floods, and emotional neglect from Abijah. One of the themes of the work is how polygamy and enduring harsh conditions are both tests of faith. Whipple embeds folk beliefs and narratives into her story, giving it greater depth. Contemporary reviewers praised Whipple's realistic portrayal of Mormon pioneers in Utah and the way her realistic characters elicited sympathy. John A. Widtsoe, a prominent church leader, wrote that its treatment of polygamy was unfair, but that it showed the "epic value" of early settlements. After a resurgence in interest in Mormon literature in the 1970s and 1980s, the book became one of the best-known examples of a Mormon novel. Terryl Givens wrote that it is "perhaps the fullest cultural expression of the Mormon experience," and Eugene England stated it was the greatest Mormon novel. Though Whipple planned to write a sequel, she never finished one. Plot Among the many real characters such as Brigham Young, John D. Lee, and Erastus Snow, The Giant Joshua focuses primarily on Abijah MacIntyre and his wives, Bathsheba, Willie, and Clorinda (Clory), who move to southern Utah in 1861, and become prominent members of the communities of Washington, Santa Clara, and St. George during their founding years. The book focuses on Clory's life, starting with her as a 17-year-old third bride to the forty-year-old Abijah. Abijah unexpectedly consummates their marriage and Clory becomes disillusioned with wifely obedience. Abijah's teenage son, Freeborn, comforts Clory and Abijah brings the two to Erastus Snow, who rebukes them all. Later, Clory is pregnant and determined to leave St. George, but stays after seeing the natural beauty of a large group of Sego Lilies. Drought and heavy rains wreak havoc on the town, and the harvest is poor. Clory gives birth to a daughter nicknamed Kissy, and John D. Lee is ignored by his neighbors after the Mountain Meadows Massacre. Freeborn is killed by Indians, and Clory becomes depressed and has a miscarriage. Abijah blesses Kissy after she falls out of a wagon in an accident, and Clory feels love for him. Clory has two more children, Abijah leaves on a mission to England, and all three of Clory's children die in the aftermath of a plague of grasshoppers. Abijah blames Clory, and she learns glovemaking to earn money. When Abijah returns from his mission, he gives her a house and she gives birth to a son, Jim. Abijah's second wife, Willie, dies in childbirth after he refuses to send for a doctor. Clory takes organ lessons from one of Brigham Young's wives, who also teaches her how to raise silk worms. Clory feels contentment with her position in life. The discovery of silver nearby brings miners to the town, which brings new challenges. Brigham Young dies and church leaders are arrested for practicing polygamy. Clory's hands are covered in sores from working with leather in her glovemaking work, and she keeps them bandaged. Abijah is called as the president of the Logan temple, takes a new, young wife and leaves his other wives behind. Erastus Snow dreams of using a spillway instead of dams to cope with St. George's flooding problems. Clory has a final miscarriage after she is frightened by a dog. On her deathbed, Clory realizes that she had a testimony of the truthfulness of her religion all along. Themes Mormon scholar Terryl Givens notes that the book presents plural marriage as a "marathon Abrahamic test" of faith similar to colonizing Utah's desert. Polygamy is more than an unusual set of sexual partners; it is the setting of emotional and spiritual sacrifice. Whipple also shows how isolated Clory was when she notes Clory's excitement to see a non-Mormon, or "Gentile." Whipple focuses on the actions of pioneers, not their beliefs. The way Mormons build up Zion by colonizing the desert mirrors a figurative building of the church as Zion. Folklorist William A. Wilson praised the way Whipple used folklore in context in a way that elicited sympathy and understanding of folk beliefs. He praised Whipple's portrayal of a Mormon experience, noting how she used folk narratives as plot elements, which paralleled the way faith-promoting events occurred and failed to occur. Clory herself vacillates between faith and disbelief. Wilson felt that the book's last 200 pages failed, which he attributed to their lack of concrete references to folklore. Background Whipple's "Beaver Dam Wash" was submitted to the 1937 Rocky Mountain Writer's Conference. At the conference, Ford Maddox Ford liked "Beaver Dam Wash" and convinced Ferris Greenslet, then vice president at Houghton Mifflin, to read it. Greenslet advised Whipple to make the novella a little longer; instead, she proposed a Mormon epic and sent a sample chapter. Greenslet encouraged her to apply for Houghton Mifflin's $1,000 literary fellowship for new writers working on their first novel. Whipple lived with her parents while she wrote the chapters for the fellowship application, often getting inspiration right before falling asleep and working through the night. Greenslet helped her to apply for the Houghton Mifflin Literary Fellowship, which she won in 1938 . Greenslet greatly encouraged her while she wrote The Giant Joshua over the next three years. He constantly gave her advice, personally lent her money, and made it possible for her to stay at the artist colony Yaddo to finish writing the book. Whipple disliked Yaddo, complaining that she felt lonely and isolated, and completed much writing there. Joseph Walker, an ex-Mormon doctor from St. George living in Hollywood, read early manuscripts and wrote Whipple encouraging letters. She wrote the manuscript in longhand and had others type it up for her. After its publication in 1941, The Giant Joshua was not very profitable to Whipple. As a fellowship winner, the accompanying contract was not generous, and Whipple had received advances on her royalty checks to finish the novel. Whipple also hired a literary agent, Maxim Liber, just after the publication of The Giant Joshua, and Liber took a percentage of money due to her. She fired him that August. Historian Juanita Brooks helped Whipple with historical details in The Giant Joshua, though Brooks was disappointed at the historical inaccuracies Whipple kept in the novel. Whipple was also inspired by her own family history and family stories from the Beckstrom family and Annie Atkin, who grew up in St. George and later married Vasco Tanner. A paperback edition was issued in 1964. It is not known when this edition by Doubleday went out of print. Whipple renewed the copyright in 1969 for twenty-eight years. Whipple asked two different publishers to reprint the book in 1974, but both declined. In 1976, Sam Weller, a prominent bookseller in Salt Lake City, reprinted it in hardback under his Western Epics imprint, where it went through several printings. Reception The Giant Joshua sold well. It was fifth in a list of ten in Harper's Poll of the Critics and was second in The Denver Post's list of bestsellers. The novel had fans who sent Whipple letters expressing their love for her epic novel. The U.S. Navy bought 200 copies for ship libraries. Writing in the Book-of-the-Month-Club Bulletin, Avis DeVoto praised the way Whipple used historical details about clothing and food in the book, which made her characters "bursting with vitality." Ray B. West in the Saturday Review of Literature wrote that the book showed the "tenderness and sympathy" between early Mormons. A review in Time stated that it was "competent but never quite excellent." John Selby's review, which appeared in multiple newspapers, described the characters as "real people, whose beliefs seal them up, as it were, in a kind of transparent separateness in which [they] seem oddly luminous." Edith Walton at The New York Times wrote that Whipple's writing was not anti-Mormon, but "scrupulously fair and even sympathetic," adding that though the book was "maybe a little over-long," it was "rich, robust and oddly exciting." A review appearing in The Coschocton Tribute predicted that Mormons would not like the book, which showed an "intimate side of earlyday Mormon life." Indeed, The Giant Joshua did not have the endorsement of any LDS Church leader. John A. Widtsoe, a member of the Quorum of the Twelve Apostles, wrote in The Improvement Era that its treatment of polygamy was unfair, though he praised how it showed the "epic value" of Mormon settlements. In a private letter, Emma Ray McKay said she was "so disgusted with the author of The Giant Joshua that I can scarcely contain myself." Whipple's father intercepted her advance copy and told her it was "vulgar" while other residents of St. George had mixed feelings about how their ancestors' stories were included or excluded. Not all Utah residents disliked the book; friends and acquaintances wrote her letters of congratulations and praise. In the 1970s, with the growth of Mormons arts and criticism, The Giant Joshua enjoyed a resurgence in attention from scholars. Writing for Sunstone in 1978, Bruce Jorgenson, a creative writing teacher at Brigham Young University, praised the "complicated" characters and strong portrayal of historical figures, with the exception of Erastus Snow. He critiqued the undisciplined narrative style, which he described as often succumbing to "ballooning clichés typical of the slick popular idiom of the thirties and forties." Later reception of the book was even more positive. In 1989, The Giant Joshua was the most-borrowed book in the Salt Lake City Public Library. In "Fifty Important Mormon Books", Curt Bench reported that Mormon scholars in 1990 unanimously chose The Giant Joshua as the best Mormon novel before 1980. In People of Paradox, Terryl Givens wrote that it is "perhaps the fullest cultural expression of the Mormon experience". Eugene England described The Giant Joshua as "not the great Mormon novel, but the greatest." The novel is well-known among Mormon religious faculty. In a 2002 survey, a group of mostly Mormon religious educators were asked to list the three most important books about Mormonism by LDS authors in several categories, including fiction. The Giant Joshua was the second-most popular item respondents listed under fiction (after The Work and the Glory series), although forty percent of respondents did not answer this question. Shortly before her death, Whipple was honored with a lifetime achievement award from the Association for Mormon Letters and which added substance to her longheld belief that Mormons would eventually recognize the worth of her work. Trilogy and derivative works Whipple planned to write a sequel to The Giant Joshua, at times also imagining a trilogy. In fall 1945, Whipple signed a contract with Simon and Schuster to publish the sequel, to be titled Cleave the Wood. The agreement included an allowance of $150 a month for a year. Whipple wrote five chapters, which are found in her papers, but was not able to complete the novel. According to Whipple, she worked with Gene Pack to arrange The Giant Joshua into a radio drama with 30-minute episodes. Gene Pack read the episodes five days a week during August and September in 1965. The owner of the KUER radio station, Ellen Winkelmann, allowed Pack and Whipple to tape the segments, but later kept and sold the tapes to a third party, much to Whipple's displeasure. In 1983, Whipple sold the movie rights to the book, which provided for her in her old age. Sterling Van Wagenen, cofounder of the Sundance Film Festival, often spoke of his desire to adapt The Giant Joshua to film. References Category:1942 American novels Category:Novels set in Utah Category:Works about polygamy in Mormonism Category:Polygamy in fiction Category:Novels set in the 19th century Category:Houghton Mifflin books
{ "pile_set_name": "Wikipedia (en)" }
In the sci-fi film Ex Machina, reclusive inventor Nathan Bateman foresees a bleak future, telling the movie's protagonist, Caleb, that "One day the AIs are going to look back on us the same way we look at fossil skeletons on the plains of Africa". When we don’t understand something, we tend to fear it; which is one reason popular movies like Ex Machina and HBO’s nail-biting new series Westworld like to imagine futures in which artificial intelligence plots to destroy humanity. Fortunately, AI is far more likely to recommend those titles to your Netflix queue than to result in a dystopian society out of a George Orwell novel. While technologies including Amazon’s Alexa have been busy making people’s lives outside of the workplace easier, bots were the big office story in 2016, helping companies handle routine tasks such as managing support tickets and streamlining workflows. In the coming years, machine learning will take on more of the non-routine work as well, ushering in the new era of artificial intelligence -- one that looks to be far brighter than the future Hollywood typically envisions. Big Data "Big data" is a bit of a misnomer. It’s like referring to a whale as "zooplankton". The digital universe isn’t just big; it’s a leviathan that’s becoming more massive by the day. Currently, the amount of information being collected is doubling in size every two years. Last year, it broke the zettabyte barrier. To put that in perspective, one zettabyte is around 1,000 times the size of an exabyte, which, in turn, can hold roughly 170,000 times the number of books currently stored in the British Library. Now imagine an interminable English literature class in which the teacher assigns you a stack of Herman Melville’s classic Moby Dick to read one after another... for the next 200 billion years! That’s probably worse than the worst recurring nightmare you ever had in secondary school -- and that’s just a single zettabyte! By 2020, there will be 44 of them. As the grey matter for AI, big data will be a big deal in 2017. The IoT Today, there are more connected devices than there are people. Consider the implications for an app like Waze. Today, Waze relies on crowdsourcing to help tens of millions of drivers "outsmart traffic" worldwide. As the Internet of Things (IoT) continues to expand, sensors embedded throughout a vehicle will add even more functionality to the app. In addition to alerting you to maintenance issues like out-of-alignment tires or guiding you to a petrol station when you’re low on fuel, it will communicate with systems such as the above-mentioned Alexa to adjust the temperature in your residence based on current weather conditions -- long before you even pull into the drive. At work, organizations in every industry will use sensors plugged into their collaboration hubs to exchange data in real-time, predicting delivery delays and controlling the office environment based on people’s personal algorithms and preferences. 2017 will be the year that IoT goes mainstream and it will be so intuitive you will hardly even notice. Predictive Analytics Predictive analytics can shorten the sales process by up to 30 percent and increase conversion rates by up to 10 percent, according to a recent McKinsey study. For that reason alone, expect it to begin playing a much bigger role in enterprise decision-making in 2017. Analytic and statistical techniques can also be a lifesaver for leaders as more and more employees become involved in non-routine work. For example, it’s often difficult today for managers to identify the right individuals for specific teams or certain jobs. By using network analysis of metadata to accurately identify amplifiers and drivers across a network regardless of title, role or department, executives will be freed to focus on non-routine work of their own, including strategy and innovation. Work Graph Big players like Microsoft and Facebook made a lot of noise in the collaboration space in 2016 with the release of Teams and Workplace, respectively. Yet, while team-based messaging may be all the rage, those apps don’t solve one of the biggest obstacles to successful collaboration: fragmentation. In fact, they create even more silos than they solve. It’s much the same story with stack solutions that don’t connect to one another in any kind of intuitive way. In 2017, organizations will turn to interactive intranets to unite all those disparate solutions into a single collaboration hub, ensuring that valuable metadata is visible, searchable and memorable across the enterprise, adding to corporate memory. Eventually, the work graph will become even more powerful and intuitive, taking on even more of the non-routine work within companies. Interactivity Voice-first and VR: The enterprise will begin getting a lot more interactive in 2017. Boosts in both quality and speed are making speech recognition technology a must have at home; and now it’s ready to help make your work life easier as well. You’ll be able to tell your AI assistant to organize your inbox, create a document and keep your meetings on track. While most people believe virtual reality (VR) is only good for gaming, it is already driving truly incredible innovations, which will only accelerate in the coming year. Imagine using VR to review large-scale process improvements in your organization, allowing you to not only see, but to interact with the proposed changes and make adjustments before any resources are dedicated to the project. Today’s employees have more opportunities to be happier and more engaged in their work than ever before. Rather than relegating human beings to a future in which machines run the show, AI will free us to be even more human. After all, it’s human relationships that have propelled civilization forward for more than 10,000 years. In the words of Herman Melville, "I know not all that may be coming, but be it what it will, I'll go to it laughing". John Schneider, vice president of product marketing at Jive Software. Published under license from ITProPortal.com, a Future plc Publication. All rights reserved. Image Credit: Mopic / Shutterstock
{ "pile_set_name": "OpenWebText2" }
feb 14, 2005 - Youtube was Founded Description: YouTube, the most popular site and app right now! The first video of youtube was uploaded on April 23, 2005. The site founder is a male named Jawed Karim and he is actually the one who uploaded the first video on YouTube. The video showed him at the zoo with an elephant in the background which now has over 41.8M views. He is also a German-American.
{ "pile_set_name": "Pile-CC" }
Acoustic Alchemy Acoustic Alchemy is an English smooth jazz band formed in England in the early 1980s by Nick Webb and Simon James. 1981–1989: Early days Acoustic Alchemy was formed around the acoustic guitars of Simon James (nylon string) and Nick Webb (steel string), often backed up by double bass, percussion, and string quartet the Violettes. The band made two albums that were unprofitable. In the mid-1980s, James left, and in the 1990s he formed Kymaera, a similar, though more Latin oriented band. In 1985, Webb discovered Greg Carmichael, a guitarist with a London pub band called the Holloways (not affiliated with the indie band of the same name) who became James' successor. The new pairing found work as an in-flight band on Virgin Atlantic flights to and from the United States. Six weeks after sending demos to MCA, the band was called to record their first album, which was released in 1987 titled Red Dust and Spanish Lace. Appearing on the album were Mario Argandoña on percussion and Bert Smaak on drums. The album was the first of many to be recorded at the Hansa Haus Studios, in Bonn, Germany, where they met sound engineer Klaus Genuit, who worked on many of the band's albums. Two more albums followed for MCA: Natural Elements (1988) and Blue Chip (1989). The title track from Natural Elements became the theme music for the BBC TV programme Gardeners' World. 1990–1998: Mainstream success Acoustic Alchemy were soon moved to jazz label GRP as MCA bought GRP in February 1990. Six more albums followed, starting with Reference Point (1990), featuring a cover of "Take Five" by Dave Brubeck and Back on the Case (1991). Reference Point was nominated for a Grammy Award. Webb uncovered fourteen early tracks from 1982 to 1987 featuring Simon James which were released on the compilation Early Alchemy (1992). The New Edge (1993) and Against the Grain (1994) followed. For their eighth album, Arcanum (1996), the band re-recorded some of its popular tracks. The album was recorded in London's Pinewood Studios with the string section of the London Metropolitan Orchestra. The collection included three new tracks, "Columbia", "Something She Said", and "Chance Meeting". Personnel on the recording was Webb, Carmichael, Sheppard, Murphy and Parsons. It was produced by Aubry "Po" Powell, who worked with Pink Floyd, Paul McCartney, Jimmy Page, and Robert Plant. Positive Thinking (1998) was to be Acoustic Alchemy's last album with original frontman Nick Webb. It was recorded over a week's time in a Manor House near Bath, England, in Monkton Combe. Recorded by Steve Jones, the musicians were Greg Carmichael (guitar), John Sheppard (drums), and Dennis Murphy (bass). Webb was diagnosed with pancreatic cancer before working on the album and died on 5 February 1998. 1999: Reform and changes After Webb's death, Greg Carmichael brought in Miles Gilderdale as his partner, and the band moved label to Higher Octave Music. The debut album on the label, The Beautiful Game, (2000) was more experimental, borrowing from several genres of music. It featured the introduction of Anthony "Fred" White on keyboards. AArt (2001) was released a year later and was nominated for a Grammy Award for Best Contemporary Instrumental Album. Their 1990 album Reference Point was also nominated for a Grammy. Radio Contact (2003) contained "Little Laughter", the band's first song with a vocal, performed by Jo Harrop. Harrop was a backing vocalist who was discovered by Gilderdale during a session with Latin singer Enrique Iglesias. Early in 2006, bassist Frank Felix left the band to concentrate on other projects. The position was filled by two bass players: former Incognito and Down to the Bone bassist Julian Crampton for UK dates and guitarist Gary Grainger (brother of longtime drummer Greg Grainger) in the U.S. GRP re-released a concert/documentary video of Acoustic Alchemy entitled Best Kept Secret on 25 July 2006. This Way (2007) included guest appearances by trumpeter Rick Braun and Down to the Bone. Roseland followed in 2011. Discography Singles "The Earl of Salisbury's Pavane", GRP Christmas album Vol. 2 (1991) DVDs Sounds of St. Lucia: Live (2003) Best Kept Secret (2006, re-release of VHS from 1998) Albums References External links Official website Category:GRP Records artists Category:MCA Records artists Category:English musical groups Category:Musical groups established in the 1980s Category:Smooth jazz ensembles
{ "pile_set_name": "Wikipedia (en)" }
Dan B. Shields Dan B. Shields (August 9, 1878 – January 4, 1970) was an American politician who served as the Attorney General of Utah from 1917 to 1921 and as the United States Attorney for the District of Utah from 1933 to 1949. He died on January 4, 1970, in Salt Lake City, Utah at age 91. References Category:1878 births Category:1970 deaths Category:Utah Attorneys General Category:United States Attorneys for the District of Utah Category:Utah Democrats
{ "pile_set_name": "Wikipedia (en)" }
Blog Archives Field Trip: Fort Edmonton Park Tyler | August 25, 2017 This week, RMHCNA House Heroes, siblings, and some parents jumped on the bus and headed to learn about Edmonton’s history at Fort Edmonton Park! Eight of us headed to the Fort for a wonderful day of learning, sliding, train riding, horse rides, and movies! House siblings Rudina and Lynn couldn’t travel too far before they stopped in a 1920’s house for some tea. In between all of our activities we had a picnic and played in the park. The swings were a definite hot ticket as we laughed and reached for the sky! After the park we took in a 4-D movie at Capitol Theatre about the start of Fort Edmonton and its transition into a bigger city called “Northern Light.” We also stopped in one of the gardens next to the drug store. To end our day we visited the Horses, pigs, chickens, and ponies. The kids loved feeding, petting, and also getting to ride on the ponies! We practically had to pull Adam off the pony – he was having a blast!
{ "pile_set_name": "Pile-CC" }
ighest common factor of 1113 and 684972? 159 What is the highest common divisor of 28 and 3604888? 28 What is the greatest common divisor of 411219 and 45? 9 Calculate the highest common divisor of 70 and 350. 70 What is the highest common factor of 2665 and 147395? 205 What is the highest common divisor of 11 and 7792840? 11 What is the highest common divisor of 195 and 537160? 65 Calculate the greatest common divisor of 1728 and 9045. 27 What is the highest common divisor of 447899 and 272? 17 What is the greatest common factor of 1824 and 7676? 76 What is the highest common divisor of 92 and 67068? 92 What is the greatest common divisor of 8 and 1778? 2 Calculate the greatest common factor of 147 and 1112251. 49 What is the greatest common divisor of 2439360 and 360? 360 What is the greatest common divisor of 10971 and 345276? 207 Calculate the highest common factor of 42777 and 7350. 147 What is the highest common divisor of 306890 and 30? 10 Calculate the greatest common factor of 5282 and 14. 2 Calculate the highest common divisor of 187 and 462. 11 Calculate the greatest common factor of 70 and 123235. 35 Calculate the greatest common divisor of 19323170 and 10. 10 What is the greatest common factor of 3937 and 620? 31 What is the highest common factor of 825 and 480? 15 Calculate the greatest common factor of 19 and 194313. 19 Calculate the highest common factor of 432 and 2736. 144 Calculate the greatest common factor of 2574 and 285428. 286 Calculate the greatest common divisor of 316 and 1519486. 158 Calculate the highest common factor of 77 and 679. 7 Calculate the greatest common factor of 24010 and 322. 14 Calculate the highest common divisor of 5642 and 24180. 806 What is the highest common divisor of 756153 and 9? 9 Calculate the greatest common divisor of 249 and 5945539. 83 Calculate the highest common factor of 400 and 1982800. 400 Calculate the highest common divisor of 912 and 91504. 304 Calculate the highest common divisor of 98 and 26740. 14 What is the greatest common divisor of 48 and 79464? 24 Calculate the greatest common factor of 943 and 31898. 41 What is the highest common divisor of 181275 and 1200? 75 What is the highest common factor of 4284 and 108332? 28 Calculate the greatest common factor of 2156 and 836. 44 What is the highest common divisor of 290017 and 4186? 91 What is the greatest common factor of 3822 and 32448? 78 Calculate the highest common factor of 5194 and 12667. 53 Calculate the highest common divisor of 69 and 28451. 23 What is the greatest common divisor of 1086526 and 588? 98 Calculate the highest common factor of 17504 and 547. 547 What is the highest common divisor of 82 and 399217? 41 Calculate the highest common divisor of 41388 and 60. 12 What is the highest common divisor of 90 and 30170? 10 What is the highest common factor of 6200 and 899? 31 What is the highest common divisor of 94136 and 56? 56 Calculate the greatest common divisor of 3536 and 611286. 442 Calculate the greatest common factor of 23845 and 7781. 251 Calculate the highest common factor of 387 and 149683. 43 What is the highest common divisor of 158 and 268442? 158 Calculate the highest common factor of 2219912 and 488. 488 What is the greatest common factor of 264559 and 1? 1 What is the greatest common factor of 1003 and 33571? 59 What is the highest common divisor of 468195 and 260? 65 What is the highest common divisor of 236389 and 97? 97 Calculate the highest common factor of 259356 and 24. 12 Calculate the greatest common factor of 170900 and 200. 100 Calculate the greatest common factor of 50 and 94275. 25 What is the greatest common factor of 26904 and 156? 12 Calculate the greatest common factor of 651 and 4995123. 651 Calculate the greatest common divisor of 11 and 47223. 11 Calculate the highest common factor of 1919 and 1212. 101 What is the highest common divisor of 17 and 881773? 17 What is the highest common factor of 40807 and 32981? 559 Calculate the greatest common divisor of 854 and 499102. 122 Calculate the highest common divisor of 13 and 80665. 13 What is the highest common factor of 88810 and 50? 10 Calculate the greatest common factor of 179196 and 24. 12 What is the greatest common divisor of 3600 and 161145? 45 What is the greatest common factor of 1872 and 881424? 144 What is the highest common factor of 273015 and 585? 45 What is the highest common factor of 91058 and 22? 22 Calculate the highest common factor of 33 and 3286107. 33 Calculate the greatest common divisor of 145104 and 48. 48 What is the highest common factor of 4676 and 22540? 28 What is the greatest common divisor of 1597789 and 314? 157 Calculate the highest common factor of 10772280 and 230. 230 What is the highest common divisor of 5 and 15812870? 5 What is the highest common divisor of 2352 and 38514? 294 What is the highest common factor of 319836 and 492? 12 Calculate the highest common factor of 102 and 4367436. 102 Calculate the highest common factor of 3770 and 10440. 290 What is the highest common factor of 60825 and 1350? 75 What is the highest common divisor of 22220 and 380? 20 Calculate the greatest common factor of 2006 and 216886. 34 Calculate the greatest common divisor of 2825 and 125. 25 What is the highest common factor of 15225 and 573825? 525 Calculate the highest common factor of 241722 and 182. 26 What is the highest common divisor of 21 and 178346? 7 What is the greatest common factor of 2380888 and 1658? 1658 Calculate the highest common factor of 19543 and 2. 1 What is the highest common factor of 27 and 16917? 3 What is the greatest common factor of 120 and 89700? 60 Calculate the greatest common factor of 43101 and 819. 9 Calculate the highest common divisor of 49256 and 235. 47 Calculate the highest common divisor of 1064 and 6859. 19 What is the highest common factor of 617432 and 226? 226 What is the greatest common factor of 201660 and 120? 60 Calculate the greatest common divisor of 468644 and 308. 44 What is the highest common divisor of 112 and 62839? 7 What is the highest common divisor of 1022 and 25354? 14 Calculate the greatest common factor of 27022 and 2519. 229 What is the highest common factor of 30 and 77565? 15 Calculate the highest common factor of 193314 and 7018. 638 What is the highest common divisor of 972 and 243? 243 What is the greatest common factor of 125 and 364275? 25 What is the highest common factor of 1320 and 55880? 440 What is the highest common divisor of 3020 and 13565? 5 What is the greatest common factor of 18249 and 9471? 231 What is the highest common factor of 3222 and 414? 18 Calculate the greatest common factor of 91564 and 264. 44 Calculate the greatest common factor of 90 and 6939. 9 Calculate the highest common divisor of 208964 and 476. 476 What is the highest common factor of 12 and 230116? 4 What is the highest common divisor of 39 and 3570151? 13 Calculate the greatest common factor of 4095 and 3094. 91 What is the greatest common factor of 44 and 1607188? 44 What is the highest common divisor of 312 and 138606? 78 What is the highest common divisor of 15875 and 1? 1 What is the greatest common divisor of 3772845 and 216? 27 Calculate the greatest common factor of 20 and 6340. 20 What is the greatest common factor of 1178 and 7448? 38 What is the highest common divisor of 712 and 75739? 89 Calculate the highest common divisor of 9774 and 135. 27 What is the highest common factor of 554879 and 52? 13 What is the highest common divisor of 48 and 904176? 48 What is the greatest common factor of 192 and 33504? 96 What is the greatest common divisor of 322 and 73255? 161 Calculate the highest common divisor of 90304 and 1360. 272 What is the highest common divisor of 2821 and 11648? 91 Calculate the greatest common divisor of 15000 and 7440. 120 What is the greatest common divisor of 1079892 and 2916? 972 Calculate the greatest common divisor of 16309 and 18391. 347 What is the highest common divisor of 3976 and 736? 8 Calculate the highest common factor of 329172 and 24. 12 What is the highest common divisor of 5150 and 618? 206 Calculate the greatest common divisor of 3638 and 7922. 34 What is the greatest common divisor of 8689065 and 105? 105
{ "pile_set_name": "DM Mathematics" }
so we finally get a look at the  huawei mate 40 pro and i'll be   sharing the details right after this.   If you're new here and want to stay  up to date with the latest tech please   hit subscribe followed by the bell.  You can also keep up on facebook,   instagram and twitter by clicking the  links in the description. So today   we've got plenty of news to share  about the upcoming huawei mate 40   and the mate 40 pro we've got the design  the specs the certification and pricing   and it's not long until huawei released  the smartphone before we get started   though please like the video if you're  looking forward to the huawei mate 40   or the mate 40 pro let me know in the  comments what device you're watching   this video on but first up we've got the  sharing of a tpu case for the mate 40   and the mate 40 pro these were shared by  rodent 950 on twitter and they confirm   exactly what we expected it  from the back of the smartphone   we can see the presence of a large  circular cutout for the mate 40 pro's   rear cameras while there's no cutout  for the led flash in the top left   it's not technically required as  it doesn't protrude from the case   there are speaker marks on the top  and the bottom of the tpu case which   suggests we may see stereo speakers  on the mate 40 pro but the lack of any   large circular cutouts on the top or the  bottom confirm no three and a half mil   headphone jack we do however expect the  ir blaster rodent 950 also shared with   us a few days ago the screen protectors  showing us the main differences in size   and display curvature between  the mate 40 and the mate 40 pro   if we move on to the mate 40 tpu case  you can see it's similar to the mate 40   pro apart from it's a little bit smaller  and one big changes on the top where   you can see a large circular cutout  which is no doubt for a headphone jack   we've also had the mate 40 model numbers  appear on tenor which not only confirms   we'll be seeing a launch shortly  but also that three different models   exist we've got the oce-an00 model  which belongs to the huawei mate 40   and this is codenamed ocean we've got  the noh-an00 model which is the huawei   p40 pro and this is code named noah and  finally we've got the nop-an00 model   which at this stage is causing a lot of  confusion what we know it is going to   be the most premium model of the huawei  mate 40 we're unsure if this is the mate   40 pro plus or the kuawai mate 40 rs  porsche design we also have news from   rodent 950 that the huawei mate 40 is  going to have a 50 megapixel sensor with   liquid lens technology the liquid lens  technology was patented by huawei a few   months ago and this allows for faster  autofocus and better stabilization   earlier reports suggested that it may  be for the mate 50 but we're now pretty   certain that it's going to be making its  debut in the huawei mate 40. of course   within his tweet he's also shared many  other specs which we'll go over shortly   now with the recent leaks out of the  way we're going to run through the   full specs of the huawei mate 40 series  to help you guys decide if this is the   phone for you and if you should wait so  first up we've got the huawei mate 40   the huawei mate 40 is coming with a  6.4 inch full screen display and a   punch hole selfie camera in the top left  and this is of course an amoled display   unlike other smartphones the base model  of the huawei mate 40 is still going to   support a curved display and the mate  40 is going to have an in-display   fingerprint scanner and a dual punch or  camera in a pill shape cutout in the top   reports are suggesting that this amoled  display is going to be a 90 hertz panel   on the rear we've got a circular camera  module that houses three cameras and an   additional sensor at this moment in time  we're unsure what this sensor is for but   it could likely be a timer flight  depth sensor rodent 950 is advised   a 50 megapixel a 20 megapixel and an 8  megapixel camera but a few other sources   are claiming a 108 megapixel primary  the device will of course be powered by   the kirin 1020 system on chip the spec  sheet from pc online suggests it will   come with up to 12 gigs of ram and up  to 512 gigabytes of expandable storage   via the nm card slot it will of course  be running emui 11 out of the box and   it's going to pack a 4 300 milliamp hour  battery with 66 watt fast charge support   next up we've got the huawei mate 40  pro while very similar the mate 40 pro   is going to be larger than the standard  mate 40 with a 6.78 inch display it's   reportedly going to have a 90 or 120  hertz amoled display and as you can   see by the renders we've still got the  dual punch hole selfie camera and the   in display fingerprint scanner as you  can see we've got a physical volume   rocker as well as power buttons on the  right hand side of the phone which is a   welcome change from last year's touch  controls and the display looks to be   more curved than the standard mate 40.  on the top you can see it looks like the   ir blaster is going to be staying on the  mate 40 pro and as you can see it's got   the same circular camera module but this  time with a quad camera setup rodent 950   is advised that we'll be getting a 50  megapixel liquid camera an 80 megapixel   ultra wide a periscope lens and a timer  flight depth sensor but personally if on   leaks renders are correct then i think  we may not be getting the time of flight   the huawei mate 40 pro is of course  going to be powered up by the kirin   1020 system on chip and again it's  going to come with up to 12 gigs of ram   and up to 512 storage it's reportedly  coming with a 5 000 milliamp hour cell   with 66 watt fast charge support  and it's going to ship with emui 11.   as we touched on earlier there's also  reports of a mate 40 pro plus or a   mate 40 porsche design but with very  little information on them right now   we're going to save it until something  more solid comes to light we do however   think there's only going to be one or  the other and that we won't have both   unfortunately the same as last  year we're also going to have the   huawei mate 40 range being released  without google services so that may   put a few of you off we also don't  know at this stage if they plan on a   global launch or if they're just  going to be keeping it to china   as always though if more information  comes to light i'm going to be sharing   it with you guys straight away but  i'd like to know your thoughts in   the comments who out there is waiting  for the mate 40 does the lack of google   services put you off and what version  of the mate 40 are you waiting for   but thanks for watching the video  if you liked it smash a thumbs up   if you didn't hit the thumbs down twice  and i'll see you guys in the next one my you
{ "pile_set_name": "YoutubeSubtitles" }
1. Field of the Invention The present invention broadly relates to the field of electronic commerce and to global network job placement services. More particularly, the present invention relates to a system and method for gathering and disseminating information about employers, employment openings, and prospective employees, and a system and method for providing incentives to the prospective employees and employers encouraging the use of the employment service. 2. Background of the Invention Fueled by a robust economy and a decreasing pool of qualified applicants, employers today expend considerable resources on attracting, screening, and hiring employees to fill manpower needs. Faced with staffing shortages, employers must evaluate their needs, advertise such needs to reach as many qualified recruits as possible, and screen potential employees through burdensome hiring interviews, all typically on very short notice. Further compounding this tedious process, employers searching for employees with highly specialized skills suffer from a limited number of qualified personnel, especially when restricted to a specific geographic region. Since the advent of print media, the traditional method of job placement has been through classified advertisements. Although these newspaper advertisements may be sufficient for one-time searches for recruits in a particular location, advertisements in a single newspaper or series of newspapers fail to meet the needs of today's global economy, in which large regional, national, and even international employers are continually looking for employees. What is more, placing classified advertisements in newspapers is an expensive undertaking, often constituting an employer's single largest recruiting expense. Not surprisingly, most newspapers derive more than half of their revenue from classified advertisements. In light of the great expense and limited effect of print advertisements, employers have embraced the global computer network, or “Internet,” for its powerful ability to gather and disseminate information. In the context of employment placement, early uses of the technology involved simply posting job openings on employer's individual websites. Although this technique avoids the cost of classified advertisements, it requires job seekers to visit individual websites without really knowing if a position is available. In addition to being time-consuming for the recruit, this employment placement method is unreliable for the employer, because the employer has no way of assuring its advertisement is reaching enough qualified personnel. Seeing the need for centralized job listings, the next step in the evolution of Internet employment placement was to establish large websites that post open positions for multiple companies. These Internet job sites feature extensive lists of job openings organized by such criteria as company, location, and field of employment. Examples of such Internet job sites known in the prior art are HotJobs.com™, Hire.com™, Jobs.com™, JobOptions™, Monster.com™, CareerBuilder Network™, CareerPath.com™, America's Job Bank™, and IdealJobs.com™. Although some sites are free to employers, most typically charge for each listing or, perhaps, charge a monthly or annual fee. Through advertisement, each Internet job site strives to attract as many visits by potential applicants as possible. These advertisements, combined with the steadily increasing Internet usage by job applicants, enable employers to broadcast openings to many qualified applicants with relatively little effort and resources. In addition to posting openings, some Internet job sites offer additional services that aid an employer's search and hiring process. Some sites give employers special access through which to directly create and edit job listings. Some sites provide means for applicants to forward résumés to the employers and, in turn, provide employers with tracking tools that organize incoming résumés into categories. Typically, the sites provide screening and searching tools that help employers target the most qualified recruits. Some sites offer anonymous résumé postings to accommodate a job seeker who does not want her current employer to know about her job search. Finally, some sites provide files in which to keep notes on individual recruits, such as whether a recruit has been contacted, interviewed, or rejected. Related to Internet job sites, Internet recruiting services further expand an employer's reach by providing means to post open positions to several Internet job sites, while only having to enter the information once. Yahoo Recruiter™ is one example of such an Internet recruiting service. Once positions are posted, the recruiting service in turn collects the incoming résumés from the various job sites and organizes them into a single database for the employer. These Internet recruiting services therefore offer the advantage of a central place to manage the process of posting positions and filtering résumés. Despite the many conveniences Internet job sites and recruiting sites provide, there are still significant drawbacks. First and foremost, employers have no guarantee that the fees they pay will result in the finding and hiring of a recruit. In fact, a considerable number of job listings languish on the job sites, costing the employers money and producing no results. Through advertisements and offers of ancillary job search services (such as résumé writing software), the Internet job sites attempt to attract as many applicants as possible. However, no single Internet job sites offer a unique incentive that would persuade an applicant to use its service instead of another. Second, typical job listings provide candidates with only a limited amount of information about the position and an even more limited amount of information about the employer. Some job sites do offer hyperlinks to the employer's website. However, these hyperlinks require the candidate to exhaustingly browse the employer's website looking for recruiting information that is organized differently on each website. Such an inconvenience results in the candidate's losing patience and abandoning the search, thereby leaving the employer with no return on its investment. Also, current Internet job sites typically use the same basic approach for all types of job openings. It is not surprising, therefore, that these “one size fits all” sites are not tailored to fit the specific needs of many professions. Consider, for example, healthcare professionals such as hospital nurses. Unlike most other professions, hospital nurses have a skill set that is easily transportable. Since hospitals, unlike most service businesses, do not have a steady core of repeat business, it is easy for a nurse to take his or her skill set from one hospital to another or from one region to another. Thus, nursing is especially well-suited to temporary staffing. In contrast, other professions, such as engineering, require a significant investment in time to acclimate a new employee to the nuances of a new job. For this reason, one size fits all job websites are not optimal. Thus, a third drawback is the inability of current Internet job sites to satisfy the needs of highly specialized fields, such as healthcare. Typically, healthcare job seekers desire a quick, easy to use service that presents information about healthcare facilities (e.g., hospitals and medical clinics) and their position openings in a clear and uniform manner. The information must be concise, addressing the concerns most job seekers express when searching for a job. For example, in the healthcare context, pertinent information would include such facts as the number of beds in a particular unit, the number of operating rooms, whether the facility has a trauma center, and whether the facility is a teaching hospital. In effect, the job seeker desires an employment service that offers not only job listing abilities, but integrates the postings with a data warehouse filled with information on employer facilities. This integration would enable the job seeker to focus on specific employer facility criteria and formulate quick, targeted searches. From the employer's perspective, an employment service that accommodates highly specialized fields saves money. Because the job applicants are more focused and can better understand the needs of the employer's facility in reference to their own, such a specialized employment service integrated with a data warehouse appreciably reduces the time and effort employers waste on unqualified and incompatible applicants.
{ "pile_set_name": "USPTO Backgrounds" }
While not limited thereto, the present invention is particularly adapted for use as a dual mode transponder for a position location radar such as that used to guide an aircraft to an airborne tanker. In such a radar system, a transponder is provided on one of the aircraft which receives a signal modulated with range tones at the radar frequency from the other aircraft and transmits back a signal that is similarly modulated, but displaced in frequency with respect to the radar frequency. In the passive mode, the transponder behaves as a lossy frequency translator wherein a microwave mixer pumped by an oscillator at frequency f.sub.o generates two new signals on each side of that which is received by the frequency f.sub.o. One of these is transmitted back to the other aircraft and becomes the radar received signal. In the active mode, the transponder mixer is used to convert the received radar signal to an intermediate frequency where its modulation is detected, and processed for retransmission back to the radar with a net gain through the transponder. The dual mode apparatus described requires the radar range tone modulation to be either FM or phase modulation. Hereinafter, if neither is specifically mentioned it will be assumed that the modulation is phase modulation. A transponder of the type described above preferably utilizes a four-port dual mode mixer which will perform the passive as well as the active mixer function. In the past, four-port dual mode mixers have been provided which will perform the passive as well as the active mixer function; however they require the use of RF and IF switches which increases size and costs and degrade the mixer-IF amplifier integration for noise performance, bandwidth and conversion loss.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction Last weekend, my Nexus 5 suffered a tragic screen-related accident. It still works, but I’m too OCD to use a phone with a broken screen unless I absolutely have to. Unfortunately, I bought the phone secondhand from a friend of mine, and it was purchased directly from T-Mobile, so I’m not eligible for Google’s unofficial one-broke-screen-replacement policy. And yes, I did call to try anyway – the nice Google representative forwarded me to the LG representative, who confirmed that, alas, LG’s warranty did not cover a broken screen. Fortunately, since I’m a hoarder when it comes to tech devices, I still have my “old” HTC One, originally purchased back in April of 2013, and my daily driver until I got the Nexus 5 back in May of this year. I figured, at the very least, I could use the HTC One until I fixed the Nexus 5 – or used the broken phone as an excuse to upgrade to the Nexus 6. Now, I’m not sure I want a Nexus 6…or any other phone, for that matter. Why not just fix the Nexus 5? I could, but the replacement part is anywhere for $50-80, but the time investment to actually fix it – and that’s assuming the replacement part works as expected. Repair services in my area are unreasonably expensive, especially given the price of a new Nexus 5. Also, after using the HTC One for a few days…I honestly just don’t want to. But isn’t the HTC One ooooold? Technically, sure. But day-to-day? It sure doesn’t feel like it. It’s running Android 4.4.3, and Sense 6 – HTC’s custom skin – is in some ways just as good, if not better, than stock Android 4.4.3. I think I still prefer Android 5.0, but as I’ve said, Android 5.0 actually takes a great deal from Sense. It’s clean and functional enough that swapping the Sense launcher for the Google Now Launcher has scratched most of my stock Android itch – and like the Nexus 5, it supports voice commands with the screen off, as long as it’s plugged in. It honestly feels just as fast as my Nexus 5 ever did, with the exception of a few dropped frames during certain animations. Bottom-line: people who say Android is slow are full of shit. Bad Android phones may be slow, but when you get the right phone on the right software, it soars. Everything I originally said about the HTC One still stands today, and if anything, the experience is better than it ways back then. Full disclosure: I am running a custom ROM, something 99% of users will never do. Specifically, I am running Maximus HD, which I installed a few months ago as a side-project. Since the HTC One was no longer my daily driver, I felt comfortable messing with it ways that I’d be reluctant to do to before. That said, I haven’t done any performance tweaks beyond installing the ROM – I am not underclocking or overlocking anything, I’m simply running stock HTC software without AT&T’s horrible bloat. If the HTC One is so great, why did you even buy a Nexus 5? There are two answers to this, both equally accurate. The short answer is that I am easily distracted and like shiny new things. The more complicated answer is that I wanted an unlocked device, free of any carrier interference with regards to software and update delivery. I didn’t want any of their unwanted crap on my phone, and ideally I didn’t want to be at all financially tied to a carrier, though obviously I’d still have to finish the two-year contract I renewed when I purchased the HTC One. In my attempts to escape carrier bloatware with my original Android phone, the HTC One X, I experimented extensively with custom ROMs, and during that time I grew tired of the whole process. After months of jumping from ROM to ROM, in search of the perfect experience, I just wanted a phone that worked great out of the box – which the HTC One did provide, albeit at the cost of carrier bloatware and delayed updates. It turns out I never really needed the Nexus 5, though – I just needed to grow some cojones, dive back into the world of custom ROMs, and free the HTC One from its prison. So are you ever going back to the Nexus 5? Honestly? I don’t really think so, no. Even if both devices were fully functional, and knowing the One’s flawed, I’d be tempted to stay on the One. There’s just something about it – like my old iPhone 4, it feels like an iconic, timeless device. I still prefer its design to this year’s HTC One, and I’ll take an optically stabilized camera over a weird depth-based dual-camera gimmick any day of the week. It really can’t be overstated how great this device still feels in the hand; something I’d forgotten in my months with the understated, nice-in-the-hand-but-kind-of-boring Nexus 5. Build quality and materials is something some people will never care about, but to me, it makes all the difference in the world – it just took using another device for me to realize how important to me it was. It’s not just the materials and the build quality that makes me prefer the HTC One, though – it’s the little things in the hardware and software that I’ve redicovered. The lower-in-megapixel-but-infinitely-faster camera. The wide-angle, better-quality front-facing camera. The fantastic HTC camera software. Those still-best-in-class front-facing speakers. The (in my experience) more reliable Bluetooth connectivity. The higher-quality, higher pixel density display without any hint of backlight leaking. The fact it has 64 GB of storage, as opposed to the 16 GB of my Nexus 5. The little features of Sense, like the customizable Quick Settings. The superior lockscreen, complete with shortcuts to my most-used apps and e-mail/text notifications. HTC’s newfound drive to bring Android updates to flagship phones as quickly as possible. Special mention should go to the IR blaster, which – combined with the casting ability of various media apps, as well as the Playstation app – allows me to control basically every aspect of my media center with my phone. None of these alone would be a good reason to prefer the HTC One, but everything together – the complete package – is hard to resist. I do really miss wireless charging, though, and the ability to use the AirDock in my car. The side-mounted sleep/wake button was a bit more sane, too. Should I buy an HTC One? I feel like you could do a lot worse than to buy a used $200 HTC One, but I’m still not sure I could actively recommend it, if only because, at more than a year and a half old, it seems likely that Android 5.0 is the last major update it will get. So what’s next? I honestly don’t know. As I alluded to earlier, I originally thought I’d stick with the HTC One until I settled on a new phone, specifically the Nexus 6, but now I’m beginning to question that. Don’t get me wrong, I will be tempted, and I will certainly walk into an AT&T store to try the Nexus 6, but now I’m leaning towards what I probably should’ve done in the first place – riding out the HTC One as long as it will take me, or at least until something strikes me the same way it did when I first held it a year and a half ago. Maybe it will be the Nexus 6, or the next HTC flagship, or perhaps something else entirely. As I said, I am distracted by shiny and new things, and it’s very possible the HTC One is still just “shiny and new” since I haven’t used it for so long. What does seem likely is that I will no longer shy from messing with my phone, at least if that’s what it takes to tear out the carrier software and ensure more timely updates. In some ways, after spending just a couple of days with the HTC One I’ve come full-circle to what I originally said about the HTC One X: you can always change a phone’s software, but you can never change a phone’s hardware.
{ "pile_set_name": "OpenWebText2" }
Field The present disclosure relates generally to a terminal, a server and event suggesting methods thereof, and for example, to a terminal, a server and event suggesting methods thereof, in which an event is recommended based on a user's intent. Description of Related Art With development of Internet, Web 2.0 age has come and the smart phone has widespread. This leads to a paradigm of openness, participation and sharing, and thus various pieces of information are being shared in real time between users through a blog, a social network service (SNS), etc. For example, a variety of travel information offered by travelers is shared on the World Wide Web, and many people who plan a trip use the shared information. This information includes not only text information about reviews of visited destinations or famous restaurants but also pictures, sounds and moving pictures and the like data. Accordingly, in light of analyzing this information to catch a traveler's interest and recommending him/her optimized events, destinations, food, etc., there is a growing demand for improving performance of recommendation. Further, with recent development of text mining and big-data processing techniques, use of an intelligent recommendation system, where such techniques and various pieces of content are combined with each other, has been on the rise.
{ "pile_set_name": "USPTO Backgrounds" }
Ebola nurse Pauline Cafferkey ’not dishonest’, hearing told A Scots nurse who survived Ebola will not face charges of dishonesty at a misconduct hearing. Pauline Cafferkey, 40, was infected while working in Sierra Leone in 2014. The Nursing and Midwifery Council (NMC) is alleging that Ms Cafferkey allowed a wrong temperature to be recorded when she returned to Heathrow and she left a screening area without flagging it up. But it said she had no case to answer over dishonesty and that her judgement had been impaired due to illness. The panel at (...) A Scots nurse who survived Ebola will not face charges of dishonesty at a misconduct hearing. Pauline Cafferkey, 40, was infected while working in Sierra Leone in 2014. The Nursing and Midwifery Council (NMC) is alleging that Ms Cafferkey allowed a wrong temperature to be recorded when she returned to Heathrow and she left a screening area without flagging it up. But it said she had no case to answer over dishonesty and that her judgement had been impaired due to illness. The panel at the conduct and competence committee agreed to drop charges about "dishonesty" after the NMC agreed that medical evidence clearly showed Ms Cafferkey’s decision-making was impaired due to illness on her return from Sierra Leone. This means that the NMC will now make submission on two charges relating to Ms Cafferkey on her return to the UK on 28 December 2014. The first alleges that while in a Public Health England screening area, inside Terminal 4 at Heathrow, she allowed an incorrect temperature to be recorded on her screening form. The second charge alleges that she left the screening area without reporting her true temperature to medics. During Tuesday’s morning session, the panel heard that the screening area at Heathrow airport was "busy, disorganised and even chaotic" when Ms Cafferkey and other medics arrived back from Sierra Leone. The agreed facts in the case, as presented to the panel, show that the nurse’s temperature was recorded twice by a doctor at Heathrow at more than 38C. This was in the presence of another person referred to as "registrant A". The doctor claims that "registrant A stated at this point that she would record the temperature as 37.2C on Ms Cafferkey’s screening form and then they would ’get out of there and sort it out’". The agreed facts show that Ms Cafferkey stated that she recalled the words "let’s get out of here" being used but could not remember who said it or who entered the temperature on her screening form. The panel was told that Ms Cafferkey accepted that her temperature had been measured at above 38C yet allowed a reading of 37.2C to be recorded on her screening form, after which she continued to the arrivals area. It was heard that a temperature above 37.5C "is an elevated or pyrexial (feverish) temperature that requires further assessment and should be reported to a consultant". ’Severe viral load’ Ms Cafferkey admitted taking paracetamol at some point after she realised she had an elevated temperature. When she returned to the screening area, the doctor who examined her found her temperature to be normal and cleared the nurse to fly back to Scotland. The panel heard that hours later she was diagnosed with one of the most severe viral loads of Ebola ever recorded. Doctors said early symptoms would have impaired her judgement and that there was no evidence she had been deliberately dishonest to staff. At the hearing, the NMC’s representative said there was no question that Ms Cafferkey and other Ebola doctors were acting for the public good. But she said they had to ensure they did not cause any risk to others. She said Ms Cafferkey would have understood the importance of temperature checks and the expectation was that a nurse should "fully cooperate" and disclose her symptoms. The NMC rep said there were "significant mitigating factors" but the fact Ms Cafferkey did not disclose a symptom of Ebola still "amounts to misconduct". She said Ms Cafferkey was guilty of "unacceptable professional behaviour" by potentially putting the public at risk. Pauline Cafferkey’s lawyer, Joyce Cullen, argued that her actions did not amount to misconduct. She said the nurse should be viewed as a patient from the moment the first doctor took her temperature. She added that Ms Cafferkey "was not acting in a professional capacity" when the incorrect temperature was recorded at Heathrow. She said Ms Cafferkey’s ability to assess her own medical condition and make decisions was likely to have been "substantially impaired". The lawyer said Ms Cafferkey was an Ebola expert with "impeccable record" and it was "so unlikely" that her actions were deliberate. She also pointed to the "chaotic" scenes at the Heathrow airport screening process. The NMC had originally alleged that Ms Cafferkey "allowed an incorrect temperature to be recorded" on 28 December 2014 and intended to conceal from Public Health England staff that she had a temperature higher than 38C. The nurse, from Halfway, Cambuslang, contracted the virus while working as part of a British team at the Kerry Town Ebola treatment centre in 2014. She spent almost a month in isolation at the Royal Free at the beginning of 2015 after the virus was detected when she arrived back in the UK. Ms Cafferkey was later discharged after apparently making a full recovery, and in March 2015 returned to work as a public health nurse at Blantyre Health Centre in South Lanarkshire. In October last year it was discovered that Ebola was still present in her body, with health officials later confirming she had been diagnosed with meningitis caused by the virus. However in the months that followed, her health suffered as she had issues with her thyroid, her hair fell out and she had headaches and pains in her joints. But Ms Cafferkey stressed that she felt lucky because she had not lost her sight as others had done. The hearing was adjourned until Wednesday. Pauline Cafferkey leaves the Nursing and Midwifery Council hearing in Edinburgh YOUR OPINION ABOUT THIS ARTICLE RULES AND REGULATIONS RULES AND REGULATIONS Do not post comments that are defamatory, divisive and blasphemous.If you wish to receive a quick response to your opinion/comments, please provide your email address in the space provided. Your comments will appear after moderation from IGIHE.com. In case the above regulations are not observed, your comments might not appear or will be deleted. Thank you!
{ "pile_set_name": "Pile-CC" }
The only horror blog you will ever need.... if you need reviews of streaming movies, lists that are easy to read (in the event you become a brain dead zombie lists will become the preferred form of literature) and bright pictures...we're your huckleberry.
{ "pile_set_name": "OpenWebText2" }
We’re Still Learning about Sleep April 25, 2016 Even after centuries (or millennia) of study, no one really knows exactly why we sleep. Just the same, researchers continue to uncover important discoveries about the mysterious phenomenon that occupies about a third of our lives. For instance, they found that interrupted sleep is worse than short, steady sleep. Investigators say that people who experience frequent interruptions during their sleep are less happy and less energetic the next day than people who went to bed late but were able to sleep continuously for a few hours. And it’s a myth that our hectic modern lifestyle is stealing sleep from us. People living in contemporary hunter-gatherer societies in parts of Africa and South America sleep less than 6.5 hours a night. That’s less than the average American, who gets between 7 and 8 hours. Perhaps most interestingly, a recent study found evidence of a phenomenon in people that is most common in marine animals, like dolphins. They sleep by shutting down just half of their brain at a time. Participants in a study on sleep, on the first night that they slept in the lab, showed more activity in the left hemisphere of their brains during deep sleep than in the right hemisphere. It’s theorized that having one hemisphere remain more "vigilant" during sleep may be a survival strategy when humans are in a new environment -- the left hemisphere may serve as a "night watch" that wakes the sleeper up if there's danger.
{ "pile_set_name": "Pile-CC" }
[Maternal perception of premature birth and the experience of pre-eclampsia pregnancy]. To analyze maternal experiences of preeclampsia pregnancy with premature birth at a neonatal intensive care unit. A qualitative study using the focus group technique was conducted with 28 women in a facility specialized in high-risk pregnancies in the state of Rio Grande do Norte, Northeastern Brazil, in 2004. Mothers included had had preeclampsia during pregnancy and a preterm delivery with consequent hospitalization of their baby at a neonatal intensive care unit. The data were analyzed using thematic content analysis of three thematic nuclei subjects: information about preeclampsia during prenatal care; experiences with the preterm newborn, and their perception of neonatal intensive care unit professionals' attitudes. Maternal reports showed subjects' lack of knowledge with regard to preeclampsia and its association with prematurity. Difficulties inherent to the maternal role of caring for the child in the neonatal intensive care unit were identified, accentuated by communication flaws between health professionals and users. Some difficulties experienced by the mothers, in the context of preeclampsia and prematurity, were aggravated by lack or inadequacy of information provided to the users.
{ "pile_set_name": "PubMed Abstracts" }
Baba Karam Baba Karam (, also Romanized as Bābā Karam) is a village in Babarashani Rural District, Chang Almas District, Bijar County, Kurdistan Province, Iran. At the 2006 census, its population was 30, in 7 families. References Category:Towns and villages in Bijar County
{ "pile_set_name": "Wikipedia (en)" }
Amanda de Cadenet is coming at you live and direct – and trying hard not to say any bad words while she does. (She does not, however, believe "feminism" is one of them.) On this episode of Off the Cuff the host of Lifetime's new late-night talk show Undone talks about the pressures of live television ("I thought I was going to throw up right before we went on air"), adhering to the network's list of approved words ("badass" = yes, "dickhead" = no), Nicki Minaj's bare-bottom controversy, lesbian sex in Cosmo and what the end of Chelsea Lately means for the only other late-night lady left standing. "The fact that with all the cable and network shows," she explains, "that there is one woman, myself, who is fronting my own show at 10:30pm that doesn't have a male co-host - that is one of things that falls into the category of, 'This is 2014. How is this possible?'" The British-born host, who is also a mother of three and married to The Strokes guitarist Nick Valensi, doesn't hold back when asked about many topics other media figures shy away from, be it personal politics – she is, as they say, ready for Hillary – or the difference between when she first started in television, at the astounding age of 15, and now. "My boobs have dropped extremely since the last time I was on live TV," she pronounces with a hearty laugh. She's also the first to point out that the new show, though already finding an audience, still has some room for improvement. "It's a little rough around the edges, and my shows tend to be a little rough around the edges, maybe because I am. I'm a little undone."
{ "pile_set_name": "Pile-CC" }
Unmanned aircraft systems (UAS), also known as unmanned aerial vehicles (UAV) or drones, are self-powered aircraft that do not carry a human operator, uses aerodynamic forces to provide vehicle lift, are autonomously and/or remotely operated, may be expendable or recoverable and may carry lethal or nonlethal payloads. Unmanned aircraft systems are commonly used in military, commercial, scientific, recreational and other applications. For example, military applications include intelligence, surveillance, reconnaissance and attack missions. Civil applications include aerial photography, search and rescue missions, inspection of utility lines and pipelines, humanitarian aid including delivering food, medicine and other supplies to inaccessible regions, environment monitoring, border patrol missions, cargo transportation, forest fire detection and monitoring, accident investigation and crowd monitoring, to name a few. Certain unmanned aircraft systems have been networked together such that they are capable of cooperating with one another and even exhibit swarm behavior. Such swarm unmanned aircraft systems may have the ability to dynamically adapt responsive to changing conditions or parameters including the ability for group coordination, distributed control, distributed tactical group planning, distributed tactical group goals, distributed strategic group goals and/or fully autonomous swarming. Recent industry goals for deploying and recovering swarm unmanned aircraft systems include developing technologies and systems for enabling safe and reliable aerial launch and aerial recovery of unmanned aircraft systems.
{ "pile_set_name": "USPTO Backgrounds" }
I liked it! Almost no head on the golden-amber colored ale. Nose had bread-like maltiness with a background of spiciness and piney juniper berries. Taste was the best part, a wonderful balance of malt, hop and spice. A honey, bread malt invites you in, followed by the spice, very piney-notes that come from the conifer juniper berries. The berries are completed with some gentle, but noticeable hops, floral and citrusy in nature like a weak IPA which really wrap it up to a crisp and slightly bitter end to balance out the malt and sweetness present throughout. I disagree with all the average reviews, this juniper ale was a well-balanced, juniper pine spices were quite noticeable, which went great with the honey malt flavors and the hops at the finish. Worth getting again. A: Pours a pale yellow with two fingers of white head that lingers for a few seconds then slowly dissipates, leaving a little lacing on the sides of the glass and some floating foam on the top S: Very strong floral aroma, with some bitterness on the nose and some pale malts T: Tastes of pine, with some malt and juniper berry flavor. Its bitter, but not from the hops as much as the juniper berries. This is a very unique pale ale. As it warms, the juniper begins to stand out a bit more M: Not overly carbonated and a bit watery, but it works for this beer. Leaves a bit of an oily residue in the mouth after swallowing. D: Not overbearingly heavy or bitter, I could drink a few of these in one sitting Overall, this is a very good beer. This is both my first juniper beer, and my first Rogue ale, and I will definitely be seeking out more Rogue beers A- Pale sunshiny yellow color. Very golden incandescent bottom, with a darker honey near the head. Light, straw colored head that left little lacing. This beer looked like a summery ginger ale mixed cocktail. S- Nose immediately hit me with fresh honeycomb, pine, and lemon atop a pale malt backbone. I noticed as it warmed more of a citrus element to the hops and faint blackberries. Lots of dried, crusted honey. T- Smooth, moderately earthy pale malt flavor with light grass and hay that meld with spicy fruit and honey. Finishes with a surprisingly crisp hop kick of pine, spruce, and mint; the spicy bitterness is an enjoyable balance to the flavor hops. Sweeter characters of light fruits, biscuits, and apricots shined even more as it warmed. MF- Clean flavor profile with a sweet, slightly oily body. Surprising lingering hop activity on the tongue with an aftertaste of faint menthol and mint in the throat. Banana like wax texture pairs with a mild syrupy body. O- A gentle, earthy, plant-like pale ale with some added fruity sweetness and spice. Still had body, mouthfeel was a bit odd, but this could be a great beer for an occasion or food pairing, or even to throw at someone who typically prefers wine or sugary cocktails. Maybe this could act as a gateway beer? I used to drink this when it was called Yellow Snow ale, and I seriously had no idea that it had juniper berries in it because I couldn't taste anything fruity- and that's still the case. Pours a very slightly hazy golden color with practically no head. Aroma is balanced, with some citrusy hop flavors and a good amount of malt showing through. Taste is really balanced too, which makes this a good beer to introduce non-BAs into craft beer. The hops I would say are a little more powerful than the malt, with a lemony taste still on my tongue 10 minutes after finishing, but not over powering hop flavor like Hazed and Infused. An above average pale ale. Bartender served with a head that looked more like lacing. Dark olden in colour, and fairly clear. The Juniper flavour seemed to get lost in the excessive hoppinness early on. Not much malts, and it finished off a little disappointing to be honest. It did look and smell nice, if only the flavour had more resembled its appearance. Interesting, but nothing to write home about. A - A nice golden yellow. Crystal clear and a nice 1 finger head that stayed with the whole glass. S - Getting the earthy tones, some malt, but mostly earthy hops. T - I am quite intrigued with this beer. First off on the tounge is spice. It is somewhat tart, yet not sour, but packs a punch. After swallowing a earthy tastes is left in my mouth. It is resiny. Not bad, but just there. M - It is mod. to high carb. Nothing wrong here. D - I got a 6 pack and I have had 2. I will probably have another but I am not craving it. It is good, but nothing that I'd make a night of drinking. I am glad I tried it though. pours a nice clear gold with a touch of opacity... but overall pretty clear. nice 2 finger head subsides very quickly. looks extremely refreshing, though I'd like to see a bit more lacing. smells super refreshing as well... a touch estery with some faint hops. I don't pick up on the juniper very much at all... but it's sweet for sure. wow!... green apple right at first and then some light bitter hops and the juniper come through... surprising how much juniper presents itself considering I didn't really pick it up on the nose. finishes a touch bready... it's nice. a touch light, but overall pretty nice... a bit astringent. I could drink a lot of this... for a really long time. Thanks for another solid showing, rogue! A - Less than 1 finger head quickly dissipates but leaves a good eggshell-color layer throughout. Lacing is all but nonexistent. Color is extremely clear, burnt honey color with lighter yellow around the edges. Great effervescent carbonation. S - Juniper and hops hit immediately, sweet malts, some caramel. All pretty faint, not much to smell. Visual: Poured into a funky mason jar but still looks good. Dark copper-orange in color. Solid one-finger head with topo character that takes a a good 10 minutes to dip. leaves patchy lacing around glass. 22 oz. brown bottle. Great label! The picture on the bottle was what initially lured me towards this beer. I was expecting something really interesting, but alas, I was disapointed. Upon opening this beer, I was met with a huge gush of beer spilling out. As I quickly grabbed my mug and poured this beer, I noticed a yellow/orange color to the beer, with a nice 1 inch white head. The smell of this beer was skunky to me- definately NOT what I was expecting from a Rogue beer. Tasting this beer was much like smelling this beer- somewhat skunky. I couldn't believe it! I actually felt like Iwas drinking a Heineken! "Could this be?" I wondered. The taste was bitter with loads of carbonation. No complex aftertaste. No floral or citrus bouquet. Very dry. I love Rogue beers. I have come to cherish these beers, especially the Shakesphere Stout and the Mocha Porter. I am a big fan of of Pale Ales, too, and I thought that this offering would be an interesting twist to the somewhat mondane pale Ales I am so often presented with. I am disappointed with this beer, and might try it again only if I see it on tap again. Perhaps I got a bad bottle (?). Anyhow, this will not stop me from loving and trying as many Rogue beers as I possibly can....just maybe this one. Pours golden with plenty of foam. Nose is of vanilla (or something to do with baking besides yeast), hops, and spice...seems pretty balanced. Just a touch of alcohol. Very crisp, spicy and actually quite light. Understated malt and hop flavor. Juniper is somewhat difficult to detect, although it's in there somewhere. Pretty good, definitely worth a try, but maybe not again any time soon. Not quite as much as I had hoped for especially for someone who likes gin as much as I do. Had a deeper orange color than previous pales, apricoty? Pretty much straight dry and hops. Something interesting about the hop notes. Managed to be light on the taste and mouthfeel like a lager but still having a nice kick of hops. Refreshing and easy drinking but definitely stood out from the normal pale ale options. If it were only available in six packs I'd start reaching for it instead of the other stand by pales. I would not recommend this beer. The feel was assaulting and there was barely a hint of Juniper in it. I love Rogue and most of the beers I've had from them have been superb. That being said, you can't win them all and this beer is proof that even Rogue produces duds every once in a while. T: Unexpectly light on the malt flavor. More slightly biscuity and corn flavor. Quite a nice substantial spicy hoppiness. When it's cold, I'm getting very little juniper flavor. It's just there behind the hops. Remarkably close to a cream ale in my opinion--a little bit like a spicier version of Spotted Cow. M: Very light and clean. I'm really disappointed in the lack of juniper flavor in this beer, but moreover it's not really that great a pale ale. A: Pale ale? Maybe a little haze, but this one is too golden and translucent to be called a pale ale in my book, so I got to take it down a notch. But I'd be lying to say this doesn't look crispy and delicious. Slight & S: The slight gin flavor seems to broaden and deepen the hops while keeping everything somewhat muted. T: You would expect a more interesting taste, but even so it's a nice, mellow flavor, even keeled and balanced. M: Crispy, bubbly. Well-developed, but easily distinguished as an evolving flavor. D: I drink a six pack of Sierra Nevada, and I'm feeling like I've eaten a big meal. These pale ales go down easy but leave your tongue wanting it bit more. Just to say it's not too heavy but has a somewhat satisfying taste. Poured into pilsner. Nice vanilla head with minimal lacing. nice and simple golden color. Smells good and malty with good hops. The taste is nice and buttery, maybe caramel. Lots of carbonation and very drinkable. regular mouthfeel. Overall nice beer, its a rogue what can I say. I recommend it to anyone. Let's start with the good news. This is a really drinkable beer. Bitter without much hop aroma to balance. Light bodied and little aftertaste. Here's the bad news - not much taste. Really lacked in flavor. I didn't detect the slightest hint of juniper. Just a crisp beer with a slightly bitter finish. Nothing exceptional or offensive about the appearance: pours a pale orange color with a 2 finger head that slowly dissipated. Nice session beer actually, but I wouldn't go out of my way to sample this one.
{ "pile_set_name": "Pile-CC" }
Exposure methodology and findings for dietary nitrate exposures in children of Transylvania, Romania. The primary focus of this exposure assessment work involved developing an exposure model and determining a numerical point estimate of the amount of biologically relevant nitrate/nitrite exposure that occurred for each child in the study. This assessment was done in support of two epidemiological studies. The first study was an epidemiological cohort study (three cohorts based on nitrate/nitrite exposure) that explored the relationship between high nitrate/nitrite exposure and neuropsychological development. The second study was a nested case/control study (cases of methemoglobinemia versus disease-free controls) that sought to explore the relationship between MHG and various risk factors for the disease. This work uses both dietary survey and environmental sampling and modeling in order to develop two point estimates of nitrate exposure in milligrams per kilogram per day of nitrite (the biologically active form of the hemoglobin-oxidizing agent) for the first 6 months of the child's life (2-months-of-age and 6-months-of-age point estimates). Methodologies included proxy interviews of primary caregivers, review of existing medical and environmental sampling and analysis. Exposure to nitrate--nitrogen (with final calculations converted to the biologically active form of the toxin, nitrite) was categorized as high, medium, and low as determined from the distribution of the data derived from final exposure calculations at both the 2-months-of-age point estimate and at the 6-months-of-age point estimate. These tertiles correspond to greater-than-or-equal1.5 mg/kg/day nitrite-nitrogen for high-exposure individuals, <1.5-> or = 0.1 mg/kg/day for medium-exposure individuals, and <0.1 mg/kg/day for low-exposure individuals. Analyses illustrate that over 90% of the nitrate exposure occurred through the consumption of liquids (water) at the 2-months-of-age point estimate while at the 6-months-of-age point estimate, a 10-fold change in the amount of solid consumables occurred. Final exposure calculations were well differentiated into three tertiles based on a point estimate of average daily intake of nitrite in milligrams per kilogram body weight per day at roughly 2 and 6 months of age. These categories of exposure, based on the exposure model point estimate, correspond well with the exposure estimates as estimated only on the basis of cohort status and their corresponding nitrate/nitrite well water levels. Comparisons of these two sets of data illustrate that following the MHG incident, Cohort II shifted places with Cohort I to become the high-exposure cohort. Further, the predictive ability of the exposure assessment in regard to the outcome of MHG was estimated using a Likelihood Ratio and Pearson's Crosstab analysis. This was performed on the 2-month-of-age point estimate. Likelihood Ratio and Pearson's chi-square were 39.40 and 33.74, respectively, with a probability of achieving these fits by chance alone of <0.0001. This indicates clearly that the children who experienced MHG were also the children at the 2-month-of-age point estimate who had received the highest exposure to nitrate/nitrite through their diet.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The present invention relates to the testing of embedded memory devices. More specifically, the present invention relates to a method and apparatus for diagnosing memory devices using selfxe2x80x94testing circuits. 2. Background Information Random access memory (RAM) devices are often tested by determining whether a value written to and a value later read from the same address space of the RAM match for all addresses specified within a predetermined test sequence. Various test sequences, or test algorithms, are known in the art including, for example, those defined in U.S. Pat. Nos. 4,061,908 and 5,377,148. A memory device is considered to be faultxe2x80x94free if, at the completion of a test, no value mismatches are found. If mismatches are found, however, additional information regarding the location and behavior of the one or more faulty cells may be desirable for several purposes. First, given the locations of the faulty cells, the RAM may be repaired by replacing the faulty cells with spare memory cells as described in U.S. Pat. No. 4,228,528. Additionally, the location and behavior of the one or more faulty cells may be mapped to physical defects to help pinpoint the cause of yield loss, as reported by S. Naik et al. in xe2x80x9cFailure Analysis of High Density CMOS SRAMsxe2x80x9d, published in the IEEE Design and Test of Computers, pg. 13-23, June 1993. RAM that is incorporated inside logic circuits, as opposed to discrete stand-alone RAM, is often referred to as embedded memory. Embedded memories are more difficult to test through external means because their input and output terminals are usually directly connected to logic circuitry instead of being connected to input/output (I/O) terminals of the integrated circuit (IC). One mechanism used to facilitate embedded memory testing is known as a built-in self-test (BIST) circuit. BIST circuits are built into ICs to generate input vectors and analyze output data in response to the generated input vectors. FIG. 1 illustrates a random access memory (RAM) device including built-in self-test (BIST) circuitry according to the prior art. Referring to FIG. 1, the BIST circuitry 2 is configured to test a RAM 1 containing a variable number of data blocks. During test execution, the BIST circuitry 2 generates input vectors which are input into RAM 1 through various input terminals including address input terminals 3, data input terminals 4, write enable terminal 5, and chip enable terminal 6. A bit comparator 9 is used to compare the data output 7 from the RAM 1, with the expected data output 8 generated by the BIST circuitry 2. A resulting initial fail vector 10, including data indicating whether a memory failure occurred, is output by the bit comparator 9 to I/O terminals 20. A value of xe2x80x9c1xe2x80x9d contained within any bit of the fail vector is referred to as a fail bit and indicates that the corresponding bit of data output does not match the expected value and therefore, may be faulty. The bit-width, m, of the fail vector 10 is often larger than the number of output pins available on the IC. Thus, outputting the entire fail vector directly to I/O terminals, such as I/O terminals 20, is often difficult. Conventional fail vector analyses, observe the result of a logical xe2x80x9cORxe2x80x9d operation performed on the fail vector as a whole to merely detect whether any one or more bits of the data output is faulty. In order to repair faulty cells or analyze yield loss, however, the locations and behavior of the defective cells may need to be diagnosed, thereby requiring a more detailed observation of the fail vector than such conventional methods provide. Several methodologies exist that attempt to address the problem of analyzing a large fail vector on an IC containing a relatively small number of I/O pads. First, additional I/O pads may be added to the IC to compensate for the large fail vector. This practice, however, often results in a substantial increase in circuit area and renders the IC diagnosable only before packaging. Another existing method used to analyze a large fail vector is to execute the relevant test m times (where m represents the bit-width of the fail vector), and during each test execution, one bit of the fail vector is multiplexed to the output pin. This method, however, multiplies the test duration by the bit-width of the fail vector. Another technique, disclosed in U.S. Pat. No. 5,148,398, halts test execution upon detecting a data mismatch to sequentially scan data and address information out of the chip. The interruption of test execution to scan out such information extends the time required for testing indefinitely, depending upon the number of faults encountered and the amount of data to be scanned out. Yet another technique has been reported by I. Schanstra et al. in a paper entitled xe2x80x9cSemiconductor Manufacturing Process Monitoring Using Built-In Self-Test for Embedded Memoriesxe2x80x9d published in the Proceedings of International Test Conference, Oct. 18-23, 1998. This technique recognizes faulty columns and faulty cells during testing and records their addresses and fail vectors in registers. At the end of the test, the data in the registers is serially outputted to the I/O terminals. This technique, however, is only effective at reporting the location of just a limited number of faulty cells. Furthermore, no information is provided to show whether the cell failed at reading a value of xe2x80x9c1xe2x80x9d or xe2x80x9c0xe2x80x9d, and the technique can only be used with limited test algorithms. Thus, there is a need for a method and apparatus to diagnose failing location and behavior of RAM without significant increase in the IC area or test time. In accordance with one aspect of the present invention, test data is generated and applied to an embedded memory. Actual data output from the embedded memory in response to the application of the test data is compared with expected responsive outputs to form a plurality of initial fail vectors. The initial fail vectors are compressed to form compressed fail vectors by performing a plurality of logical operations on groups of elements of a fail matrix logically formed from the initial fail vectors. In accordance with another aspect of the present invention, a plurality of compressed fail vectors is received in which each of the plurality of compressed fail vectors comprises a plurality of representations formed in accordance with results of logical operations performed on logically grouped elements of a fail matrix which were formed from a plurality of initial fail vectors. The initial fail vectors are recovered from the compressed fail vectors by successively ascertaining values of the data elements of the fail matrix. The values are ascertained by successively examining the representations formed in accordance with the results of the logical operations and applying a plurality of determination rules specifying assignment values for the data elements of the fail matrix in accordance with at least the results of the logical operations. In accordance with yet another aspect of the present invention, a computer system is programmed with software code to enable the computing device to receive a plurality of compressed fail vectors and to recover a plurality of initial fail vectors therefrom. The initial fail vectors are recovered by successively examining representations formed in accordance with results of logical operations performed on logically grouped elements of a fail matrix and applying a plurality of determination rules specifying assignment values for the elements of the fail matrix in accordance with at least the results of the logical operations. In accordance with yet another aspect of the present invention, an integrated circuit comprises a comparator to logically generate a sequence of comparison outputs, a plurality of logical operation circuits, and a plurality of couplings to couple a plurality of combinations of data elements of the sequence of comparison outputs to the logical operation circuits. Such coupling enables a plurality of logical operations to be performed on the combinations of data elements to compress the comparison outputs.
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention This invention relates to an electrographic apparatus comprising a photosensitive screen composed of an insulating layer, two electrically conductive layers coated on opposite sides of the insulating layer and a photosensitive layer coated on one of the electrically conductive layers, a corona discharge device arranged at one side of the photosensitive screen and emitting a flow of corona ions, and a dielectric coated record sheet arranged at the other side of the photosensitive screen, whereby an electrostatic latent image produced on the photosensitive layer of the photosensitive screen causes the flow of corona ions directed from the corona discharge device through the photosensitive screen toward the dielectric coated record sheet to modulate so as to produce, on the dielectric coated record sheet, an electrostatic charge image corresponding to the electrostatic latent image on the photosensitive layer of the photosensitive screen. 2. Description of the Prior Art Various kinds of electrographic apparatus have been proposed which can modulate a flow of corona ions by an electrostatic latent image produced on a photosensitive screen so as to produce on a dielectric coated record sheet an electrostatic charge image. One of these prior art apparatus makes use of a photosensitive screen of four layer construction composed of an insulating layer, two electrically conductive layers coated on opposite sides of the insulating layer and a photosensitive layer coated on one of the electrically conductive layers. Such apparatus can perform a first step of uniformly charging the photosensitive layer, a second step of illuminating the photosensitive screen with a light image and producing thereon an electrostatic latent image, and a third step of applying a high voltage between a field electrode arranged at the rear of a dielectric coated record sheet which is opposed to and spaced apart from the photosensitive layer of the photosensitive screen on the one hand and the photosensitive layer of the photosensitive screen on the other hand and directing a flow of corona ions from a corona discharge device arranged at the side of the electrically conductive layer of the photosensitive screen through the photosensitive screen toward the dielectric coated record sheet while applying a bias voltage between the two electrically conductive layers and producing on the dielectric coated record sheet an electrostatic charge image corresponding to the electrostatic latent image produced on the photosensitive layer of the photosensitive screen. This apparatus has the advantage that the picture image can be controlled by adjusting the bias voltage applied between the two electrically conductive layers in dependence with the number of copies set beforehand and that a plurality of copies can be reproduced by repeating the third step after the electrostatic latent image has been produced on the photosensitive screen. In practice, however, a concentration of the picture image becomes changed in dependence with the number of copies set beforehand owing to a dark decay characteristic of the photosensitive layer and to an undesirous detour of the flow of corona ions emitted from the corona discharge device. As a result, copies each having a picture image having a good quality are limited in number and it is impossible to obtain a large number of copies each of good quality. In order to obviate such drawback, another prior art electrographic apparatus has been proposed. In this apparatus, in the above mentioned third step, the bias voltage applied between the electrically conductive layers of the photosensitive screen can be changed in response to the number of copies set beforehand and hence can compensate for the decay of the electrostatic latent image on the photosensitive layer. In such electrographic apparatus constructed as above described, in the case of obtaining a plurality of copies from the electrostatic latent image produced on the photosensitive screen by repeating the third step, if the concentration of the first picture image becomes incorrect, the concentration of subsequent picture images becomes also incorrect.
{ "pile_set_name": "USPTO Backgrounds" }
Legionella pericarditis diagnosed by direct fluorescent antibody staining. Legionella pericarditis is a rare and serious manifestation of Legionnaire's disease. A case is presented in which the diagnosis was established by direct fluorescent antibody staining on a pericardial tissue specimen. Video-assisted thoracoscopy was used safely and effectively in diagnosis and management in this case.
{ "pile_set_name": "PubMed Abstracts" }
Our research on the 2016 election underscores how common this has become, with three-quarters of voters most often talking about politics only to people who shared their views. Red feed, blue feed More and more Americans live in partisan “bubbles,” reinforced by changed news and communications media. A 2014 Pew study found that just over a quarter of Facebook users (including 31 percent of consistent conservatives and 44 percent of consistent liberals) have muted or unfriended someone because of political disagreements. A study of Wisconsin voters also found that nearly a third of respondents said that they had stopped discussing politics with someone after disagreeing about Wisconsin Gov. Scott Walker’s 2012 recall election. Meanwhile, Americans have become better sorted into politically like-minded networks by geography, occupation and lifestyles. Although recent research suggest that Americans are not choosing where to live because of politics, the resulting clustering naturally limits exposure to those of different political persuasions. AD AD Such sorting into “red” and “blue” regions and communities means that, American politics increasingly feels “tribal.” Party competition routinely antagonizes ideological, cultural, and religious differences among factions, whose suspicion and dislike is exacerbated by ignorance about the other side’s motives. If getting to know one another as people helps reduce stereotypes of and prejudice toward groups different from our own, then the political homogenization of U.S. society bodes poorly for deliberation and tolerance. But how homogeneous are Americans’ political networks, really? How we did our research To find out how much “crosscutting” discussion — that is, conversation with those across the aisle — ordinary Americans had during the 2016 election season, we asked the 2016 Cooperative Congressional Election Study (CCES) respondents to name the three people with whom they most frequently discuss political matters. Then, using a format used by Edward Laumann, and later, political scientists Bob Huckfeldt and John Sprague, we asked questions about these three people (called “discussants”): What is their preferred party, who is their preferred candidate, how frequently do the two discuss politics, and so forth. These questions let us gauge how politically diverse voters’ social networks might be. Specifically, we categorized social networks (the three people with whom the respondent discusses politics) into five groups: composed of only Hillary Clinton voters; both Clinton and not sure/other voters; both Clinton and Donald Trump voters; both Trump and not sure/other voters; and only Trump voters. AD AD So how politically diverse are Americans’ social networks now? The figure below shows how common each social network type was, based on whether the respondent herself supports Clinton, Trump, or neither. You can see pretty clearly how polarized voters’ social networks are. Seventy-five percent of Clinton voters do not have a single Trump supporter in their immediate network, and just the reverse is true for Trump voters. More than half of Trump and Clinton voters say they do not regularly discuss politics with someone planning to vote for the other main candidate — or even with someone who wasn’t sure or planned to vote third party. Only about one-fifth of Clinton and Trump voters had truly mixed close social networks — that is, they regularly discussed politics with both Clinton and Trump supporters. And it’s not much different for voters who were undecided or planned to vote for a third-party candidate; only about 30 percent of those had their most regular conversations about politics with both Clinton and Trump supporters. Of course, it’s important to note that asking people who they talk politics with might lead to some measurement error. People’s memories might be faulty, or they might more readily recall people with whom they agree. Nonetheless, the approach we use has been scrutinized in previous research and shown to accurately represent people’s communication networks. AD AD Is this any different based on where someone lives? We were also curious how the patterns we found would vary across different kinds of counties: “red” (Trump received more than 60 percent of the vote), “blue” (Clinton received more than 60 percent of the vote), and “purple” (neither received more than 60 percent of vote). In the figure below, you can see that this does affect voters’ political discussion networks. Clinton voters in red counties and Trump voters in blue and purple counties are indeed talking politics across the aisle more often. But regional sorting means that there are fewer such counties than there were in the past. In just 15 years, Americans’ political discussion networks have become even more closed off AD It’s hardly new that birds of a political feather flock together. But as recently as the 2000 presidential election, political scientists Robert Huckfeldt, Paul Johnson, and John Sprague found that about 65 percent of Republicans and Democrats had homogeneous discussion networks — meaning, none of the people with whom they most often discussed politics were voting for the opposing presidential candidate. We find a 10-point increase in such homogeneity since then. AD * Here’s the actual Pauline Kael quote: “I live in a rather special world. I only know one person who voted for Nixon. Where they are I don’t know. They’re outside my ken. But sometimes when I’m in a theater, I can feel them.” Ross Butters is a PhD student in political science at the University of California at Davis, where he studies the impact of social factors on political attitudes and behavior.
{ "pile_set_name": "OpenWebText2" }
Saqalaksar Saqalaksar (, also Romanized as Saqālaksār) is a village in Lakan Rural District, in the Central District of Rasht County, Gilan Province, Iran. At the 2006 census, its population was 584, in 168 families. References Category:Populated places in Rasht County Category:Lakes of Iran
{ "pile_set_name": "Wikipedia (en)" }
Q: How to create this `through`` association? Organization and Link are associated through Node. Organization: has_many :nodes has_many :links, through: :nodes, source: :where_first_links Node: belongs_to :organization has_many :where_first_links, class_name: "Link", foreign_key: "first_node_id" has_many :where_second_links, class_name: "Link", foreign_key: "second_node_id" Link: belongs_to :first_node, class_name: "Node" belongs_to :second_node, class_name: "Node" Question:: How can I associate Link back to Organization? I tried the line below but that does not seem to work (ArgumentError: Unknown key: :through.): belongs_to :organization, through: :first_node, source: :where_first_links, inverse_of: :links A: belongs_to association not support through key you should use has_one association has_one :first_node_organization, through: :first_node, class_name: 'Organization', source: :organization
{ "pile_set_name": "StackExchange" }
Q: How can I remove characters around words? I need to remove all characters that are not alphabetical from the beginning and end of each word. For example: --Hello& World-@ 1234... Should look like: Hello World 1234 I tried replaceAll, but I have no idea how many different characters I need to remove or what those characters are. I tried the following, but it didn't work. word = resultString.replaceAll("[^a-zA-Z_0-9|$a-zA-Z_0-9]|^-|$-|^--|$--|^---|$---|\\$", ""); There were still words that showed up with dashes. Is there another way to do this without using replaceAll? A: To be strict, all the answers don't solve exactly what the author asked. The problem is that they all will delete special characters even inside words, and not only "from the beginning and end of each word". Here is the code which fixes it: String str = "--Hello& World-@ 1234... my email is me@example.com"; // Analyzing every word String[] words = str.split("\\s+"); String regex = "^[^a-zA-Z0-9]+|[^a-zA-Z0-9]+$"; String result = ""; for (String word : words) { result += word.replaceAll(regex, "") + " "; } System.out.println(result); // gives "Hello World 1234 my email is me@example.com " Regex "^[^a-zA-Z0-9]+|[^a-zA-Z0-9]+$" explanation: ^[^a-zA-Z0-9]+ matches one or more special characters at the beginning of the word | OR [^a-zA-Z0-9]+$ one or more special characters at the end of the word. You can modify the regex in order NOT TO DELETE the ,.!?:; or other meaningful characters at the end of a word.
{ "pile_set_name": "StackExchange" }
{ "name": "errno", "authors": [ "Rod Vagg @rvagg <rod@vagg.org> (https://github.com/rvagg)" ], "description": "libuv errno details exposed", "keywords": [ "errors", "errno", "libuv" ], "version": "0.1.7", "main": "errno.js", "dependencies": { "prr": "~1.0.1" }, "bin": { "errno": "./cli.js" }, "devDependencies": { "error-stack-parser": "^2.0.1", "inherits": "^2.0.3", "tape": "~4.8.0" }, "repository": { "type": "git", "url": "https://github.com/rvagg/node-errno.git" }, "license": "MIT", "scripts": { "test": "node --use_strict test.js" } }
{ "pile_set_name": "Github" }
Regional excitatory and inhibitory amino acid levels in epileptic El mouse brain. Inbred mutant El mice are highly susceptible to convulsive seizures upon "tossing" stimulation. The levels of excitatory (e.g. glutamate and aspartate) and inhibitory amino acids [e.g. gamma-amino-butyrate (GABA)] were examined in discrete regions of stimulated El mice [El(+)], non-stimulated El mice [El(-)] and ddY mice, which do not have convulsive disposition. In comparison with ddY, a general increased levels of aspartate, glutamate, glutamine, and taurine were detected in brain regions of El(-). The levels of GABA and glycine were almost the same in ddY and El(-). Compared to El(+), the levels of aspartate, glutamate, glutamine, and GABA in El(-) were either the same or higher. In the case of taurine and glycine, the levels in El(-) were either the same or lower than El(+). Alanine is special in that El(-) have a higher level than El(+) in hippocampus but lower in cerebellum. Furthermore, while marked changes were registered in several brain regions, none of the amino acids investigated showed any significant differences in the hypothalamus of three different groups of mice.
{ "pile_set_name": "PubMed Abstracts" }
The lavish party at District Attorney Mr. White's houseboat is interrupted by a diamond theft which leads to murder! The police and coroner arrive on the scene. However as the coroner starts uncovering clues his life is put in danger. Can he help the police solve the crime before he becomes the next victim?
{ "pile_set_name": "Pile-CC" }
Over recent years, the computing community developed a strong set of tools and methods used to analyze and monitor run-time behavior of a program. Performance analysis tools include, for example, basis tools which allow for mapping of periodically taken snapshots during a program's execution to the program's source (e.g. sampling applications) and more complex tools which allow a broader range of program analysis (e.g. code instrumentation applications). Measurements such as basic-block coverage and function invocation counting can be accurately made using code instrumentation. One specific type of code instrumentation is referred to as dynamic binary instrumentation. Dynamic binary instrumentation allows program instructions to be changed on-the-fly. Additionally, dynamic binary instrumentation, as opposed to static instrumentation, is performed at run-time of a program and only instruments those parts of an executable that are actually executed. This minimizes the overhead imposed by the instrumentation process itself. Furthermore, performance analysis tools based on dynamic binary instrumentation require no special preparation of an executable such as, for example, a modified build or link process. Unfortunately the benefits of conventional performance analysis tools are not available to all types of programs and functions. Specifically, conventional performance analysis tools will not work properly with inlined functions. As an explanation, many programming languages offer support for “inlining” functions. That is, many programming languages such as, for example, C++, allow the compiler to generate machine code for a function call such that the code from the function body gets directly inserted into the place where the call was made. The now inlined function causes the size of the text program to increase but removes the overhead of the function call. From the point of view of the programmer, there is some ambiguity as to whether a particular function has been inlined or not. For example, even if the programmer specifies in the source code that a certain function be inlined, that does not necessarily mean that the particular function will ultimately be inlined in the binary executable by the compiler. This ambiguity exists because there are certain cases where the compiler decides, on its own, not to inline a function even though the programmer has specified for the function to be inlined. Because conventional performance analysis tools correlate to the binary executable and the regular functions therein as opposed to the source code, and because conventional performance analysis tools do not take into account inlined function information, inlined functions can not be properly analyzed using existing performance analysis tools. Thus, a need has arisen for a method and system for examining an inlined function using a performance analysis tool.
{ "pile_set_name": "USPTO Backgrounds" }
More Videos Q39, one of Kansas City's most popular barbecue restaurants, will open its second location at 11051 Antioch Road in Overland Park on Monday, Aug. 14, 2017. Take a first look at the restaurant from Wednesday's Friends and Family event and hear owne A new choir in Kansas City brings people with disabilities together to express themselves musically. Called Tota Voces, or "Whole Voices," the choir began at The Whole Person, which provides services to people with disabilities and their families. Retired executive chef Jess Barbosa, 84, looked over old photos of his career, talked with old friends and posed for photos during a visit June 30, 2017, to the kitchen at the Marriott Muehlebach Tower in Kansas City. Barbosa, who was a hotel chef Fishtech, a third cyber security company founded by Gary Fish, a Kansas Citian who calls himself a serial entrepreneur, was launched in April 2016. Fish equipped the new office building in Martin City with the latest technology trends and modern w Mindy Corporon and Jim LaManno, who lost loved ones in the 2014 shooting rampage targeting the Jewish Community Center, visit The Star to promote SevenDays activities and discuss how violence changed their families. A golden retriever named Hunter is a rock star among the young patients at Children’s Mercy Hospital. The comfort canine won a national award for his work when he was honored this year by being named to Milk-Bone’s third annual list of “15 Dogs Wh Entrepreneur Jordan Williams operates Keefe Cravat, his Noble Neckware Co. out of the new Bloch Venture Hub at 4328 Madison Ave. The incubator is a collaboration among UMKC's Bloch School of Management, the Kauffman Foundation and the Country Club
{ "pile_set_name": "Pile-CC" }
? -0.00001 Let k(q) = q**3 + 27*q**2 + 15*q - 35. Let t(i) = -i - 45. Let o be t(-18). Let y be k(o). Let b = y - -182. What is b rounded to the nearest 10? -260 Suppose -15 = -5*v + 5*s, -v = -5*v - 2*s + 30. Let b(z) = 7196641*z + 154. Let w be b(v). Round w to the nearest 1000000. 43000000 Suppose 3*m + 2*m = 25, -5*y + 3*m = 45. Let j be 0/(-2 - -4) - y. Let h be 80*524*(-375)/j. Round h to the nearest one hundred thousand. -2600000 Let l(n) = -2589*n + 652. Let o be l(-10). What is o rounded to the nearest one thousand? 27000 Let j = 89.97 - 89.95657. What is j rounded to 2 dps? 0.01 Let b = -3228687 + 3228686.8180077. Let x = 44.818 + -45. Let a = b - x. What is a rounded to 6 decimal places? 0.000008 Let a = 973 + -973.449. Let q = 32.631 - a. Let z = q - 34. Round z to one dp. -0.9 Let k(i) = -665001*i**2 + 2*i. Let g be -2*5/2 + 7. Let c be k(g). What is c rounded to the nearest one hundred thousand? -2700000 Suppose -2*r + j - 93 = 4*j, -r = -3*j + 33. Let m be (-18 + r)*32/(-10). What is m rounded to the nearest ten? 190 Let w = -977 + 977.946. Let l = w - 1.64. What is l rounded to one dp? -0.7 Suppose 9*z + 7*z - 63109 - 509691 = 0. Round z to the nearest ten thousand. 40000 Let l = -56.6 + -218.4. Let d = 43897 + -44170.09. Let g = d - l. Round g to the nearest integer. 2 Let s = 1464.7999991724 + -1464.8. What is s rounded to seven decimal places? -0.0000008 Let n = -80582770 + 1915245. Let u = n + 78667853.99619. Let q = 329 - u. What is q rounded to 3 decimal places? 0.004 Let d = 277.912 + -278. Let i = 0.02551 + -0.11533. Let l = i - d. Round l to 4 decimal places. -0.0018 Let u be (-2)/10*1 - 3264/(-320). Suppose u*x + 1545000 = 13*x. What is x rounded to the nearest one hundred thousand? 500000 Let y(x) = 559*x**3 - 29*x**2 + 75*x - 16. Suppose -b - 4*b - 111 = -3*i, 0 = -3*i - 5*b + 81. Let j be y(i). What is j rounded to the nearest 1000000? 18000000 Let j = -693811201 - -693811186.49999885. Let w = j - -14.5. Round w to seven decimal places. -0.0000012 Let b = 4415.631215 + -0.031215. Round b to the nearest 10. 4420 Let p = 3899440 + -3899085.0223. Let a = -405 - -50. Let q = p + a. Round q to 3 dps. -0.022 Let a = 0.28267 - -30.03533. What is a rounded to the nearest integer? 30 Suppose 5*z - z - 8 = 0. Let i be 4 - (z + -3 + -289). Let b = -604 + i. What is b rounded to the nearest 100? -300 Let c = 0.2 + 27. Let w = 40.53668 + -13.33507. Let q = c - w. Round q to four decimal places. -0.0016 Let n = -21467.000017143 + 21467. What is n rounded to seven decimal places? -0.0000171 Let l = -1 + 1.022. Let i = -26.978 - l. Let p = 26.9999935 + i. Round p to six decimal places. -0.000007 Let y = 13133 - 13095.372. What is y rounded to the nearest 10? 40 Let k = -13033 - -13032.996102. What is k rounded to four decimal places? -0.0039 Let l = 870 + -92. Let q = -777.597 + l. Round q to two dps. 0.4 Suppose 25 = 3*l + 2*l - 5*n, -5*l = -n - 33. Suppose 0 = l*t + 686 + 3864. Let s be (-3)/(3 - -9)*t*-12. Round s to the nearest 100. -2000 Let p = 410493.44 - 410208.471685. Let b = p + -285.07. Let s = -0.102 - b. What is s rounded to five decimal places? -0.00032 Suppose -221*s - 3359787 = 8*s + 8068916. Round s to the nearest 10000. -50000 Let q = 34 - 33.986. Let z = -0.026 - q. Let l = z + -1.19. Round l to 1 decimal place. -1.2 Let m = 0.6983 + -0.698344204. What is m rounded to 7 decimal places? -0.0000442 Let y = 4.044634 - 4.038. What is y rounded to 4 dps? 0.0066 Let g = -33933.321 - -33951. Let b = 1.659 - g. Round b to the nearest integer. -16 Suppose -4*h - 2 = 10, 0 = 2*p + 4*h + 6. Suppose p*z + 0*z + m = -14943, -3*z - 14937 = -m. Round z to the nearest one hundred. -5000 Let f = -5735.88 - -12373.69. Let h = -6679 + f. What is h rounded to the nearest integer? -41 Let v(f) = 4*f**3 - 23*f**2 - 9*f + 28. Let q(o) = 13*o**3 - 69*o**2 - 26*o + 85. Let w(d) = -2*q(d) + 7*v(d). Let y be w(18). Round y to the nearest 1000. 4000 Suppose -3*y - 12 = -2*y + 5*o, 5*y - 2*o + 6 = 0. Let l(x) = 11*x**2 - 15*x**2 + 905 + 2*x - 4*x - 905 + 1361*x**3. Let q be l(y). Round q to the nearest 1000. -11000 Let b = -3017 - -1779. Let i = 21639 + -20460.3. Let u = b + i. Round u to the nearest integer. -59 Let l = 88.85 + 0.15. Let u = l + -154. Let z = -65.05 - u. What is z rounded to 2 decimal places? -0.05 Let p = -5619.6 + 6454. What is p rounded to the nearest 10? 830 Let q = -42333 + 42333.0049814. Round q to three decimal places. 0.005 Let b = -14568 - -14568.000050395. What is b rounded to five dps? 0.00005 Let n = 75081850 - -4208150. What is n rounded to the nearest one million? 79000000 Let c = -263.9691 + -0.0309. Let s = 273.26 + c. Round s to 0 dps. 9 Let m = 74113 - 74113.0054559. What is m rounded to four dps? -0.0055 Let m = -28 + 70. Let h(g) = m*g + 13*g**2 + 3247*g**3 - 7 - 14*g + 23. Let a be h(-23). Round a to the nearest 1000000. -40000000 Let h = -50627.99999977339 - -50628. What is h rounded to 7 decimal places? 0.0000002 Let c = 8.5 + -153.5. Let p = c + 144.615. What is p rounded to 1 dp? -0.4 Let c = -23479.405 - -23492. What is c rounded to one dp? 12.6 Let l = -1529.9059 + 1530. Let f = l - 0.093351. What is f rounded to 5 decimal places? 0.00075 Let x = 86903 - 45332. Round x to the nearest ten thousand. 40000 Suppose -2*i - 51*r + 52*r = -12, 32 = 3*i - 5*r. Suppose i*q - 15340000 = v, -3835000 = -5*q + 4*q - 5*v. What is q rounded to the nearest one million? 4000000 Let u = -39429.9999915052 - -39430. What is u rounded to seven decimal places? 0.0000085 Let w = -58 + 104. Let i = -38 + w. Suppose 6314 = i*p - 15*p. What is p rounded to the nearest 100? -900 Let q = -38293.37 - -38137. What is q rounded to the nearest 10? -160 Let c = -5152 + 10119. Round c to the nearest 1000. 5000 Suppose 3*y = t + 81305, -5*t = -4*y + 261016 + 145564. Round t to the nearest 1000. -81000 Let q(l) be the second derivative of l**5/20 - 17*l**4/12 + 13*l**3/3 + 31*l**2/2 + 19*l + 3. Let v be q(14). What is v rounded to the nearest 10? -190 Let p = -29911784023.899999447 - -29911784339.9. Let c = 316 - p. Round c to 7 decimal places. -0.0000006 Let q(y) = -659981*y + 55. Let a(x) = -329991*x + 27. Let c(t) = -7*a(t) + 3*q(t). Let b be c(-4). Round b to the nearest 100000. -1300000 Let u = -1.9 - -45.9. Let o = u - 44.06. Let w = -0.0533 - o. Round w to 3 decimal places. 0.007 Let b(l) = 6728*l - 10. Let t(r) = -2243*r + 4. Let h(w) = -6*b(w) - 17*t(w). Let d be h(16). What is d rounded to the nearest 1000? -36000 Let x = -990803 - -1106838.6. Let p = x + -115991.60152. Let a = p - 44. Round a to four decimal places. -0.0015 Let t = -367512 - -36618. Let l = 330885.50005 + t. Let p = -8.5 - l. What is p rounded to three decimal places? 0 Let m = -6596.9999984548 - -6597. What is m rounded to 7 dps? 0.0000015 Let r = -1283.974 - -4009.881. Let t = r - 2727. What is t rounded to 1 dp? -1.1 Let z = -0.00774 - -0.007754355. Round z to 7 dps. 0.0000144 Let o = 214 - 191. Suppose o*v - 21*v + 222400 = 0. Round v to the nearest ten thousand. -110000 Let w = -14.1763473 + 14.177. What is w rounded to four decimal places? 0.0007 Let m(t) = -60*t**2 - 34*t - 62. Let h(a) = 181*a**2 + 104*a + 186. Let q(d) = -2*h(d) - 7*m(d). Let k be q(-14). Round k to the nearest 1000. 11000 Suppose 0 = 27*b - 2037 - 15945. Let t = b + -497. What is t rounded to the nearest ten? 170 Let i = 0.0608 - -9.9392. Let w = -11.86 + i. What is w rounded to 1 decimal place? -1.9 Let g = 2.025 + -2.3. Let i = g - 0.069. Let b = -0.761 - i. Round b to two dps. -0.42 Suppose 3*i - 28 + 10 = 2*y, -5*y = -3*i + 36. Let p be (112/y)/(((-42)/(-48150))/(-7)). What is p rounded to the nearest ten thousand? 150000 Let k = 497.00013004 + -497. Round k to 5 dps. 0.00013 Let t = 2834 + -2622.55. Let m = -205 + t. Round m to 0 decimal places. 6 Let x = 0.0192 + -0.1192. Let h = 1193.89934 - 1194. Let v = x - h. What is v rounded to 4 dps? 0.0007 Let f(h) = -1396*h + 51. Let m be f(5). Let r = -47709 - m. What is r rounded to the nearest 1000? -41000 Let n = -86 + 87.36. Let t = -0.36 + n. Let s = t - 1.65. Round s to one dp. -0.7 Let l = 106612 - 106014.99. Round l to the nearest 100. 600 Let h = -14162 + 14163.99904. Let i = -2 + 4. Let o = h - i. Round o to 4 dec
{ "pile_set_name": "DM Mathematics" }
Tesla Makes its Patents ‘Fair Game’ June 16, 2014—Tesla Motors created a stir last week when it gave competitors permission to use all of its patents. In a blog post from founder and CEO Elon Musk, Tesla announced that it would not initiate patent lawsuits against those who use their technology in “good faith.” “When I started out with my first company, Zip2, I thought patents were a good thing and worked hard to obtain them,” Musk wrote. “And maybe they were good long ago, but too often these days they serve merely to stifle progress, entrench the positions of giant corporations and enrich those in the legal profession, rather than the actual inventors.” Musk continued to say that he created Tesla Motors to, “accelerate the advent of sustainable transport,” and that pursuing lawsuits against companies who share that goal would work against that mission. “Given that annual new vehicle production is approaching 100 million per year and the global fleet is approximately 2 billion cars, it is impossible for Tesla to build electric cars fast enough to address the carbon crisis,” Musk said. “By the same token, it means the market is enormous. Our true competition is not the small trickle of non-Tesla electric cars being produced, but rather the enormous flood of gasoline cars pouring out of the world’s factories every day.”
{ "pile_set_name": "Pile-CC" }
A violent, extremist film promoting jihadism was shown to a group of pupils at Birmingham state school, MPs have been told. Ian Kershaw, who led an inquiry into the "Trojan horse" allegations in the city, told the education select committee about the video as an example of "bad behaviour" he had come across during his investigation. The select committee is conducting its own hearings into the alleged plot to impose a hardline Muslim agenda in a group of Birmingham schools. Giving evidence, Kershaw said he had not been presented with any evidence of attempts to coerce young people into "extremist, violent, jihadist activity". But he added: "That's not to say that there weren't examples of very bad behaviour by some individuals in schools that needed to be corrected and addressed." Pressed to give examples, Kershaw said: "One would be the showing of a film which is completely inappropriate to young people, that was known by a senior member of staff to have happened and that member of staff in a senior position did not address that as a disciplinary matter." He described this film as a "violent, extremist video", and when committee chairman Graham Stuart asked if it was "jihadist, violent, extremist promotional video", Kershaw indicated that it was. "It was shown in one classroom at one moment and that should have been stopped and that should not have happened," Kershaw said. Peter Clarke, who led a government-commissioned inquiry into the allegations, also said he had heard of the video. "There were some suggestions that that sort of film had been shown or copied by a technician within one of the schools," he said. "But I did not come across direct evidence of the promotion of direct extremism, no." Clarke had earlier told the committee there had been clear evidence of people who had espoused, were sympathetic to, or did not challenge extremist views.
{ "pile_set_name": "OpenWebText2" }
About US$ 14 EARLY BIRD SPECIAL! Set of 8 Coffee Rox in minimalist cloth drawstring bag stamped with the "Coffee Rox" logo. Add $5 for domestic shipping. $10 for Canada. $15 for International. Estimated delivery Mar 2013
{ "pile_set_name": "OpenWebText2" }
The invention relates to a process for the manufacture of polyester fibers by spinning a polyester mass containing an oxalato complex and drawing of the resulting yarn, followed, as the case may be, by hydrosetting of the same in the presence of liquid water. A previously developed process is described in U.S. Pat. Nos. 4,307,152 and 4,371,485. The process for the manufacture of hydrophilic polyester fibers described in the above referenced U.S. patents is characterized by the spinning of a polyester mass containing 1 to 20% by weight of one or several oxalato complexes of the general formula EQU Me.sub.n [Z(C.sub.2 O.sub.4)m], drawing of the resulting yarn and hydrosetting in the presence of liquid water at temperatures within a range from 90.degree. to 170.degree. C., the meaning of the symbols in the formula being: Me=at least one of the ions Li, Na, K, Rb, Cs or NH; PA0 Z=at least one complex-forming central atom from the group Mg, Ca, Sr, Ba, Zr, Hf, Ce, V, Cr, Mn, Fe, Co, Ni, Cu, Zn, Cd, B, Al, Ga, In, Sn, Pb, and Sb; PA0 n=.about.1, .about.2, .about.3 or .about.4, and PA0 m=.about.2, .about.3 or .about.4. By means of this process, one obtains polyester fibers having outstanding hydrophilic characteristics and excelling through a high moisture uptake and a very favorable water retentivity. In addition, they are flame-resistant. The corresponding hydrophilic characteristics will not come about without hydrosetting. However, in the spinning of such polyester masses, which, as a result of the transesterification of terephthalic esters with ethylene glycol, still contain metal compounds, in particular zinc, calcium, magnesium, or manganese salts, originating from the transesterification catalyst, there is a danger that the melt pressure ahead of the spinning plate will increase relatively rapidly. Thus, in the conventional melt spinning of polyester masses not containing oxalato complexes, the melt pressure ahead of the spinning plate rises only within a period of about 14 days to pressures of about 300 bar. When polyester masses are spun which contain the oxalato complexes referred to above, the time within which such a high pressure is reached is shortened considerably. After only about 60 to 70 hours, a pressure is reached, at which the spinning process has to be terminated. This makes the manufacturing process of the polyester fibers more expensive. Consequently, there exists a need for an improved process for the manufacture of polyester fibers, in which such disadvantages will not occur.
{ "pile_set_name": "USPTO Backgrounds" }
Server computers are utilized extensively today to provide for, among other uses, centralized or distributed storage repositories for applications software and the other software. Often, a server computer is utilized in a network environment to provide these applications and other software to other computers that may be interconnected through the network. This type of arrangement is particularly efficient for downloading common applications that may be utilized by a variety of different computers from one conveniently serviced server computer. Today, it is not uncommon for a large number of server computers to be physically mounted within a single computer rack that may be many feet tall. In the interest of space and economics, it would be helpful if each of the servers within the rack was able to provide the equivalent of a standalone server computer including the variety of physical devices that may be attached thereto. For example, a standalone server may well include a disk drive, CD ROM drive, DVD ROM drive, or other such storage devices that may be accessed by users of the server computer. However, when multiple server computers are mounted within a single rack, it is highly desirable to eliminate redundant devices, such as disk drives that may be utilized in the boot up process to load an operating system onto the server computer. The industry today has pushed the limits of density such that the functionality of a standalone server computer has been integrated onto a single plug-in card. These cards, often called “server blades,” allow for extremely high density computing resources within a single rack enclosure. This relatively high density of servers has also accelerated the desire to eliminate bulky hardware to a greater degree. The present invention may address one or more of the above issues.
{ "pile_set_name": "USPTO Backgrounds" }
Oak Hill (Chillicothe, Ohio) Oak Hill is a historic former farmhouse in the southern part of the U.S. state of Ohio. Located along Dun Road in Ross County, it is one of the finest examples of sandstone farmhouses in the vicinity of the city of Chillicothe. The house was built by George William Dun, a native of Scotland who settled near Chillicothe in 1838. Almost immediately upon taking up residence at the site, he began the construction of his house, which was completed in 1840. A large two-story building constructed in the Federal style of architecture, it represents an American version of the British Adam style. In 1973, the house was listed on the National Register of Historic Places because of its well-preserved historic architecture. It received this recognition for multiple reasons: the massive hardwood trees on the grounds evoke a sense of antiquity; the exterior is better preserved than that of almost any other period sandstone house; and the interior retains much of its original condition, including much furniture once owned by George Dun's ancestors. References Category:Houses completed in 1838 Category:Federal architecture in Ohio Category:Houses on the National Register of Historic Places in Ohio Category:Houses in Ross County, Ohio Category:National Register of Historic Places in Ross County, Ohio Category:Sandstone houses in the United States Category:Buildings and structures in Chillicothe, Ohio
{ "pile_set_name": "Wikipedia (en)" }
533 S.W.2d 204 (1976) INSURANCE COMPANY OF NORTH AMERICA et al., Appellants, v. Billy B. NICHOLAS, Administrator, Appellee. No. 75-238. Supreme Court of Arkansas. March 1, 1976. *205 Plegge, Lowe & Whitmore, Little Rock, for Fireman's Fund American Ins. Co. Wright, Lindsey & Jennings, Little Rock, for Ins. Co. of North America. Kay L. Matthews, Little Rock, for appellee. GEORGE ROSE SMITH, Justice. This multi-party lawsuit arose as a result of there having been two concurrent fire insurance policies upon a house in Little Rock that was partially damaged by fire on December 2, 1972. The record owner, Hallie B. Nicholas, died some months later. The appellee, as the administrator of Mrs. Nicholas's estate, brought this suit against the two insurance companies (joining as defendants the other beneficiaries of the policies). The chancellor's decree held each insurer liable in the amount sued for, with penalty and attorney's fee. For reversal each insurer contends that it is not liable to the extent found by the chancellor. The facts are not in dispute. Mrs. Nicholas originally owned the house, subject to a mortgage not in controversy. She sold the property, by an installment contract, to Edward D. Briscoe, Jr. At that time one of the insurers, Fireman's Fund, insured the property for $10,000, naming Mrs. Nicholas and Briscoe as the insureds. That policy contained a "pro rata" other insurance clause (a term explained in Ark. Grain Corp. v. Lloyd's, 240 Ark. 750, 402 S.W.2d 118 [1966]). Briscoe later contracted to sell the property to Cleaster Coates. The other insurer, INA, then insured the property for $11,000, naming Briscoe and Coates as the insureds. That policy contained an "escape" other insurance clause (also explained in Lloyd's). The fire damage amounted to $13,153.47. The two insurers took different courses. INA, without invoking its escape clause, simply paid the full amount of its policy, $11,000, to its insureds, Briscoe and Coates, who presumably divided the money as they saw fit. Briscoe, before this suit was filed, fell behind in his payments to Mrs. Nicholas and reconveyed his interest to her. While the suit was pending Briscoe was adjudicated a bankrupt and was dismissed from the case. The other insurer, Fireman's Fund, invoked the benefit of its pro rata clause by tendering to its insureds, Nicholas and Briscoe, its proportionate part (10/21sts) of the loss. Nicholas rejected the tender and brought this suit, successfully contending in the trial court that Fireman's Fund is liable to him for its full $10,000 and that INA is liable to him for the remaining $3,153.47 of the loss. We first consider INA's appeal. Here the issue is comparatively simple. An insurance policy is ordinarily a personal contract, upon which the insured alone is entitled to recover. Langford v. Searcy College, 73 Ark. 211, 83 S.W. 944 (1904). INA was therefore justified in admitting liability, waiving its escape clause, and paying the full amount of its coverage to its named insureds, Briscoe and Coates. It makes no difference that INA knew of Mrs. Nicholas's interest in the property when it paid the loss. Whatever claim Mrs. Nicholas *206 might have asserted against INA was necessarily derived from Briscoe and was extinguished when INA paid Briscoe in full. Mrs. Nicholas could not claim the benefits of Briscoe's INA policy without also being subject to its burdens. Nicholas also asserts an equitable lien against the proceeds of the INA policy, but that also was a matter between Mrs. Nicholas and Briscoe. It is argued that this lien theory is supported by the presence of a standard mortgage clause in the INA policy. That clause, however, was never activated, because no mortgagee was named in the policy (as the clause required). We conclude that the chancellor erred in holding INA liable to Nicholas. As to Fireman's Fund, the pivotal question is whether the INA policy constituted other insurance within the meaning of Fireman's Fund's pro rata clause. Such double insurance exists when the two policies cover the same interests in the same property, against the same risks, and for the benefit of the same person. Couch on Insurance 2d, § 37:1394 (1962). Here the questions are whether the two policies covered the same interests for the benefit of the same person. Briscoe's insured interest under the two policies was evidently the same. What he purchased from Mrs. Nicholas is what he sold to Coates—nothing more, nothing less. That he was paying Mrs. Nicholas and being paid by Coates did not divide his estate into two ownerships. It must be remembered that the purpose of the pro rata clause is to protect the insurer against the hazards of overinsurance. Such a hazard would have existed if Briscoe had insured the full value of his estate with two different insurers. By the same reasoning the two policies were for the benefit of the same person —Briscoe. This particular point seems to have arisen very infrequently, but the cases are uniform in holding that there is double insurance where the same person is an insured in each policy. Horridge v. Dwelling-House Ins. Co., 75 Iowa 375, 39 N.W. 648 (1888); Pitney v. Glen's Falls Ins. Co., 65 N.Y. 6 (1875); Mussey v. Atlas Mut. Ins. Co., 14 N.Y. 79 (1856). Again the hazard of overinsurance would exist if Briscoe could recover in full under each policy. As a matter of fact, owing to INA's waiver of its escape clause, the two insurers will pay $11,000 plus $6,263.56, a total that exceeds the physical damage of $13,153.47. If the Nicholas estate sustains a loss it will be attributable to Mrs. Nicholas's not having taken out a policy by herself, instead of with Briscoe, and to the latter's insolvency after he was paid by INA. Needless to say, principles of law that reach a sound result with respect to solvent litigants cannot be abrogated simply because the fortuitous intervention of insolvency may cause a hardship. Reversed and remanded for the entry of a decree in harmony with this opinion. BYRD, J., dissents. FOGLEMAN, J., not participating. BYRD, Justice (dissenting). I disagree with so much of the majority opinion as holds that the INA policy constituted other insurance to Mrs. Nicholas. The Fireman's Fund policy lists the insured's name and address as follows: "Mrs. Hallie Nicholas, Vendor and Ed Briscoe, Vendee Arkansas Abstract Company 212 Center Street Little Rock, Arkansas" In 44 Am.Jur.2d Insurance § 1808 it is stated: "It is generally held that in order for a proportionate recovery clause to operate in the insurer's favor, there must, under the policies, be both an identity of the insured interest and an identity of risk; and the requirement with respect to an identity of risk is not obviated by the fact that the apportionment clause refers to other insurance `whether concurrent or not.'" *207 In 6 Appleman, Insurance Law And Practice § 3905 (1972), the author states: "The apportionment of loss between concurrent insurers is proper, where the policy so provides. Proration provisions are inserted in insurance policies to relieve the insurer from the burden of litigating with the insured as to the validity of other policies, and to eliminate any inducement to the insured to commit fraud. But every rule of construction in apportioning losses must yield to the right of the insured to be fully indemnified, and it must always be remembered that the contribution clause in an insurance policy should not be so applied as to diminish the protection of the insured." [Emphasis mine] In Couch on Insurance 2d § 37:1394 (1962), the author states: "By definition, other or double insurance exists where two or more policies of insurance are effected upon or cover the same interests in the same property, against the same risks, and in favor of, or for the benefit of, the same person. As all of these conditions must concur, it follows that if different persons have different interests in the same subject of insurance, each may insure his interest without effecting other or double insurance. Likewise a policy of insurance containing a stipulation against `other insurance' is not invalidated by the fact that at the time of its issuance a prior policy covering the same property is in existence, unless the insured has an interest in such prior policy, or will derive a benefit under it, in the event of the destruction of the property." Also, in 5 Appleman, Insurance Law And Practice § 3057 (1970), the author states: "The better rule is to the effect that the interests of vendor and vendee are distinct and different, and that an insurance by such vendee upon his own interest will not nullify insurance previously taken out by the vendor...." Furthermore, the trial court found: (Decree of Oct. 10, 1974) "16. That the plaintiff was never at any time informed by any of the parties of the existence of the policy coverage issued by the defendant, Insurance Company of North America, and had no actual knowledge of that fact until after payment had been made by Insurance Company of North America to Coates and Briscoe." Thus, while I would prefer that the proration be denied on the theory that it should yield to the right of Mrs. Nicholas to be fully indemnified, there is another basis upon which it should be denied—i. e. another policy obtained without the knowledge of the insured does not constitute other insurance. See Hall v. Concordia Fire Ins. Co., 90 Mich. 403, 51 N.W. 524 (1892), St. Paul Fire & Marine Insurance Co. v. Crutchfield, 162 Tex. 586, 350 S.W.2d 534 (1961) and 6 Appleman, Insurance Law And Practice § 3909 (1972). Therefore, I would enter judgment against Fireman's Fund for the full amount of the policy, the 12% statutory penalty and a $2,500 attorney's fee. For the reasons stated, I respectfully dissent.
{ "pile_set_name": "FreeLaw" }
Droplet sensing using small and compact high-Q planar resonator based on impedance matching technique. In this paper, we demonstrate the sensing feasibility of the proposed high-Q resonator using a phosphate-buffered saline droplet at microwave frequencies. In the experimental results, the resonant frequency, signal level, and Q-factor of the S21-parameter with and without a 1-μl droplet were changed to about 230 MHz, 32 dB, and 1500, respectively. The resonator system was found to be suitable for droplet sensing with a small volume due to its small and compact scheme. This resonator system is expected to play an important role in droplet sensing with different dielectric constants.
{ "pile_set_name": "PubMed Abstracts" }
Leersum Leersum is a town in the Dutch province of Utrecht. It is a part of the municipality of Utrechtse Heuvelrug, and lies about 7 km east of Doorn and 9 km west of Veenendaal. In 2001, the town of Leersum had 6013 inhabitants. The built-up area of the town was 1.44 km², and contained 2465 residences. Until 2006, there was a separate municipality Leersum, covering both the village of Leersum and Darthuizen. External links References Category:Populated places in Utrecht (province) Category:Former municipalities of Utrecht (province)
{ "pile_set_name": "Wikipedia (en)" }
Successful management of diabetes in youth is heavily dependent upon family adaptation to the affective, behavioral, and cognitive demands imposed by the disease. During pre and early adolescence, transition in responsibility for diabetes management, along with normal physiological and psychological developmental changes, create an especially challenging situation. Although many youths and parents negotiate this transition effectively, it is also a period when many other youths take costly, self-destructive paths resulting in preventable health care costs and psychological suffering in the short-term and accelerated onset and progression of long-term complications of the disease. Studies suggest that poor adaptation to diabetes during adolescence is likely to persist into early adulthood, accelerating the risks of long-term medical complications.[unreadable] [unreadable] Research to date suggest that adherence, quality of life, and glycemic control could be enhanced if behavioral interventions were routinely implemented as part of standard care. Yet there are many barriers to the translation of these interventions into routine clinical practice, including cost, access, third party coverage, availability of qualified clinicians, convenience, social stigma, and other such variables. A multi-component behavioral intervention that integrates psychological principles into medical management of diabetes is likely to enhance family management of diabetes during early adolescence in a practical, cost-effective and lasting manner.[unreadable] [unreadable] The goal of this multi-site study is to assess the efficacy of a clinic-integrated behavioral intervention for youth with type 1 diabetes and their parents. The study employs a randomized experimental design in which youth-parent dyads attending one of four clinical sites are stratified by degree of glycemic control and randomized to receive either standard care or a clinic-integrated behavioral intervention. The intervention is based on both individual and family system theoretical perspectives, including social cognitive theory, self-regulation, and authoritative parenting. It is designed to provide experiential training for families in the use of a problem solving approach to promote improved parent-child teamwork and more effective problem-solving skills for diabetes management. The intervention is designed to be applicable to the broad population of youth with diabetes and their families, flexibly implemented and tailored to the varying needs of families, and delivered at a low intensity over time to meet the changing needs and roles of families during the period in which responsibility for diabetes management typically undergoes transition. A combination of in-person assessments, telephone assessments, and in-clinic data collection will be utilized to assess glycemic control, adherence, quality of life, psychological status, and hypothesized mediators of these outcomes[unreadable] [unreadable] Unique aspects of the study include: (1) It is the largest to date, and the first multi-site study, to test the efficacy of behavioral interventions for improving adherence, glycemic control, and quality of life in youth with type 1 diabetes; (2) It is based on the concept that small changes across the distribution of risk factor may have a greater public health impact than individual or high-risk approaches, and as such is designed to address the population of youth with diabetes; (3) The sample is large enough to test intervention moderator effects including baseline level of glycemic control, socio-economic status, and family functioning; (4) 4 clinical sites are participating, 2 of which have substantial low socio-economic status and minority populations.[unreadable] [unreadable] Clinical Sites for this stucy include: Joslin Diabetes Center in Boston, MA; Nemours Childrens Clinic in Jacksonville, FL; Texas Childrens Hospital in Houston, TX; and Childrens Memorial Hospital in Chicago, IL. The coordinating center for this study is James Bell Associates.[unreadable] [unreadable] Several pilot studies informed this clinical trial. A longitudinal observational study, Developmental Influences on Management of Type 1 Diabetes, examined the influence of family, social, and behavioral variables on diabetes self-management behaviors with a particular focus on adolescent developmental transitions. A pilot intervention study, the Diabetes Personal Trainer Study, assessed the effectiveness of an individualized problem-solving approach, guided by principles of motivational interviewing and applied behavior analysis, and implemented by specially-trained undergraduate and graduate students, who served as diabetes personal trainers. A pilot study of an abbreviated form of the specific intervention approach used in the multi-site clinical trial assessed the feasibility of the study design and intervention approach.
{ "pile_set_name": "NIH ExPorter" }
// Copyright 2012 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package windows import ( "syscall" "unsafe" ) const ( NameUnknown = 0 NameFullyQualifiedDN = 1 NameSamCompatible = 2 NameDisplay = 3 NameUniqueId = 6 NameCanonical = 7 NameUserPrincipal = 8 NameCanonicalEx = 9 NameServicePrincipal = 10 NameDnsDomain = 12 ) // This function returns 1 byte BOOLEAN rather than the 4 byte BOOL. // http://blogs.msdn.com/b/drnick/archive/2007/12/19/windows-and-upn-format-credentials.aspx //sys TranslateName(accName *uint16, accNameFormat uint32, desiredNameFormat uint32, translatedName *uint16, nSize *uint32) (err error) [failretval&0xff==0] = secur32.TranslateNameW //sys GetUserNameEx(nameFormat uint32, nameBuffre *uint16, nSize *uint32) (err error) [failretval&0xff==0] = secur32.GetUserNameExW // TranslateAccountName converts a directory service // object name from one format to another. func TranslateAccountName(username string, from, to uint32, initSize int) (string, error) { u, e := UTF16PtrFromString(username) if e != nil { return "", e } n := uint32(50) for { b := make([]uint16, n) e = TranslateName(u, from, to, &b[0], &n) if e == nil { return UTF16ToString(b[:n]), nil } if e != ERROR_INSUFFICIENT_BUFFER { return "", e } if n <= uint32(len(b)) { return "", e } } } const ( // do not reorder NetSetupUnknownStatus = iota NetSetupUnjoined NetSetupWorkgroupName NetSetupDomainName ) type UserInfo10 struct { Name *uint16 Comment *uint16 UsrComment *uint16 FullName *uint16 } //sys NetUserGetInfo(serverName *uint16, userName *uint16, level uint32, buf **byte) (neterr error) = netapi32.NetUserGetInfo //sys NetGetJoinInformation(server *uint16, name **uint16, bufType *uint32) (neterr error) = netapi32.NetGetJoinInformation //sys NetApiBufferFree(buf *byte) (neterr error) = netapi32.NetApiBufferFree const ( // do not reorder SidTypeUser = 1 + iota SidTypeGroup SidTypeDomain SidTypeAlias SidTypeWellKnownGroup SidTypeDeletedAccount SidTypeInvalid SidTypeUnknown SidTypeComputer SidTypeLabel ) type SidIdentifierAuthority struct { Value [6]byte } var ( SECURITY_NULL_SID_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 0}} SECURITY_WORLD_SID_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 1}} SECURITY_LOCAL_SID_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 2}} SECURITY_CREATOR_SID_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 3}} SECURITY_NON_UNIQUE_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 4}} SECURITY_NT_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 5}} SECURITY_MANDATORY_LABEL_AUTHORITY = SidIdentifierAuthority{[6]byte{0, 0, 0, 0, 0, 16}} ) const ( SECURITY_NULL_RID = 0 SECURITY_WORLD_RID = 0 SECURITY_LOCAL_RID = 0 SECURITY_CREATOR_OWNER_RID = 0 SECURITY_CREATOR_GROUP_RID = 1 SECURITY_DIALUP_RID = 1 SECURITY_NETWORK_RID = 2 SECURITY_BATCH_RID = 3 SECURITY_INTERACTIVE_RID = 4 SECURITY_LOGON_IDS_RID = 5 SECURITY_SERVICE_RID = 6 SECURITY_LOCAL_SYSTEM_RID = 18 SECURITY_BUILTIN_DOMAIN_RID = 32 SECURITY_PRINCIPAL_SELF_RID = 10 SECURITY_CREATOR_OWNER_SERVER_RID = 0x2 SECURITY_CREATOR_GROUP_SERVER_RID = 0x3 SECURITY_LOGON_IDS_RID_COUNT = 0x3 SECURITY_ANONYMOUS_LOGON_RID = 0x7 SECURITY_PROXY_RID = 0x8 SECURITY_ENTERPRISE_CONTROLLERS_RID = 0x9 SECURITY_SERVER_LOGON_RID = SECURITY_ENTERPRISE_CONTROLLERS_RID SECURITY_AUTHENTICATED_USER_RID = 0xb SECURITY_RESTRICTED_CODE_RID = 0xc SECURITY_NT_NON_UNIQUE_RID = 0x15 ) // Predefined domain-relative RIDs for local groups. // See https://msdn.microsoft.com/en-us/library/windows/desktop/aa379649(v=vs.85).aspx const ( DOMAIN_ALIAS_RID_ADMINS = 0x220 DOMAIN_ALIAS_RID_USERS = 0x221 DOMAIN_ALIAS_RID_GUESTS = 0x222 DOMAIN_ALIAS_RID_POWER_USERS = 0x223 DOMAIN_ALIAS_RID_ACCOUNT_OPS = 0x224 DOMAIN_ALIAS_RID_SYSTEM_OPS = 0x225 DOMAIN_ALIAS_RID_PRINT_OPS = 0x226 DOMAIN_ALIAS_RID_BACKUP_OPS = 0x227 DOMAIN_ALIAS_RID_REPLICATOR = 0x228 DOMAIN_ALIAS_RID_RAS_SERVERS = 0x229 DOMAIN_ALIAS_RID_PREW2KCOMPACCESS = 0x22a DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS = 0x22b DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS = 0x22c DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS = 0x22d DOMAIN_ALIAS_RID_MONITORING_USERS = 0x22e DOMAIN_ALIAS_RID_LOGGING_USERS = 0x22f DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS = 0x230 DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS = 0x231 DOMAIN_ALIAS_RID_DCOM_USERS = 0x232 DOMAIN_ALIAS_RID_IUSERS = 0x238 DOMAIN_ALIAS_RID_CRYPTO_OPERATORS = 0x239 DOMAIN_ALIAS_RID_CACHEABLE_PRINCIPALS_GROUP = 0x23b DOMAIN_ALIAS_RID_NON_CACHEABLE_PRINCIPALS_GROUP = 0x23c DOMAIN_ALIAS_RID_EVENT_LOG_READERS_GROUP = 0x23d DOMAIN_ALIAS_RID_CERTSVC_DCOM_ACCESS_GROUP = 0x23e ) //sys LookupAccountSid(systemName *uint16, sid *SID, name *uint16, nameLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) = advapi32.LookupAccountSidW //sys LookupAccountName(systemName *uint16, accountName *uint16, sid *SID, sidLen *uint32, refdDomainName *uint16, refdDomainNameLen *uint32, use *uint32) (err error) = advapi32.LookupAccountNameW //sys ConvertSidToStringSid(sid *SID, stringSid **uint16) (err error) = advapi32.ConvertSidToStringSidW //sys ConvertStringSidToSid(stringSid *uint16, sid **SID) (err error) = advapi32.ConvertStringSidToSidW //sys GetLengthSid(sid *SID) (len uint32) = advapi32.GetLengthSid //sys CopySid(destSidLen uint32, destSid *SID, srcSid *SID) (err error) = advapi32.CopySid //sys AllocateAndInitializeSid(identAuth *SidIdentifierAuthority, subAuth byte, subAuth0 uint32, subAuth1 uint32, subAuth2 uint32, subAuth3 uint32, subAuth4 uint32, subAuth5 uint32, subAuth6 uint32, subAuth7 uint32, sid **SID) (err error) = advapi32.AllocateAndInitializeSid //sys createWellKnownSid(sidType WELL_KNOWN_SID_TYPE, domainSid *SID, sid *SID, sizeSid *uint32) (err error) = advapi32.CreateWellKnownSid //sys isWellKnownSid(sid *SID, sidType WELL_KNOWN_SID_TYPE) (isWellKnown bool) = advapi32.IsWellKnownSid //sys FreeSid(sid *SID) (err error) [failretval!=0] = advapi32.FreeSid //sys EqualSid(sid1 *SID, sid2 *SID) (isEqual bool) = advapi32.EqualSid //sys getSidIdentifierAuthority(sid *SID) (authority *SidIdentifierAuthority) = advapi32.GetSidIdentifierAuthority //sys getSidSubAuthorityCount(sid *SID) (count *uint8) = advapi32.GetSidSubAuthorityCount //sys getSidSubAuthority(sid *SID, index uint32) (subAuthority *uint32) = advapi32.GetSidSubAuthority //sys isValidSid(sid *SID) (isValid bool) = advapi32.IsValidSid // The security identifier (SID) structure is a variable-length // structure used to uniquely identify users or groups. type SID struct{} // StringToSid converts a string-format security identifier // SID into a valid, functional SID. func StringToSid(s string) (*SID, error) { var sid *SID p, e := UTF16PtrFromString(s) if e != nil { return nil, e } e = ConvertStringSidToSid(p, &sid) if e != nil { return nil, e } defer LocalFree((Handle)(unsafe.Pointer(sid))) return sid.Copy() } // LookupSID retrieves a security identifier SID for the account // and the name of the domain on which the account was found. // System specify target computer to search. func LookupSID(system, account string) (sid *SID, domain string, accType uint32, err error) { if len(account) == 0 { return nil, "", 0, syscall.EINVAL } acc, e := UTF16PtrFromString(account) if e != nil { return nil, "", 0, e } var sys *uint16 if len(system) > 0 { sys, e = UTF16PtrFromString(system) if e != nil { return nil, "", 0, e } } n := uint32(50) dn := uint32(50) for { b := make([]byte, n) db := make([]uint16, dn) sid = (*SID)(unsafe.Pointer(&b[0])) e = LookupAccountName(sys, acc, sid, &n, &db[0], &dn, &accType) if e == nil { return sid, UTF16ToString(db), accType, nil } if e != ERROR_INSUFFICIENT_BUFFER { return nil, "", 0, e } if n <= uint32(len(b)) { return nil, "", 0, e } } } // String converts SID to a string format suitable for display, storage, or transmission. func (sid *SID) String() string { var s *uint16 e := ConvertSidToStringSid(sid, &s) if e != nil { return "" } defer LocalFree((Handle)(unsafe.Pointer(s))) return UTF16ToString((*[256]uint16)(unsafe.Pointer(s))[:]) } // Len returns the length, in bytes, of a valid security identifier SID. func (sid *SID) Len() int { return int(GetLengthSid(sid)) } // Copy creates a duplicate of security identifier SID. func (sid *SID) Copy() (*SID, error) { b := make([]byte, sid.Len()) sid2 := (*SID)(unsafe.Pointer(&b[0])) e := CopySid(uint32(len(b)), sid2, sid) if e != nil { return nil, e } return sid2, nil } // IdentifierAuthority returns the identifier authority of the SID. func (sid *SID) IdentifierAuthority() SidIdentifierAuthority { return *getSidIdentifierAuthority(sid) } // SubAuthorityCount returns the number of sub-authorities in the SID. func (sid *SID) SubAuthorityCount() uint8 { return *getSidSubAuthorityCount(sid) } // SubAuthority returns the sub-authority of the SID as specified by // the index, which must be less than sid.SubAuthorityCount(). func (sid *SID) SubAuthority(idx uint32) uint32 { if idx >= uint32(sid.SubAuthorityCount()) { panic("sub-authority index out of range") } return *getSidSubAuthority(sid, idx) } // IsValid returns whether the SID has a valid revision and length. func (sid *SID) IsValid() bool { return isValidSid(sid) } // Equals compares two SIDs for equality. func (sid *SID) Equals(sid2 *SID) bool { return EqualSid(sid, sid2) } // IsWellKnown determines whether the SID matches the well-known sidType. func (sid *SID) IsWellKnown(sidType WELL_KNOWN_SID_TYPE) bool { return isWellKnownSid(sid, sidType) } // LookupAccount retrieves the name of the account for this SID // and the name of the first domain on which this SID is found. // System specify target computer to search for. func (sid *SID) LookupAccount(system string) (account, domain string, accType uint32, err error) { var sys *uint16 if len(system) > 0 { sys, err = UTF16PtrFromString(system) if err != nil { return "", "", 0, err } } n := uint32(50) dn := uint32(50) for { b := make([]uint16, n) db := make([]uint16, dn) e := LookupAccountSid(sys, sid, &b[0], &n, &db[0], &dn, &accType) if e == nil { return UTF16ToString(b), UTF16ToString(db), accType, nil } if e != ERROR_INSUFFICIENT_BUFFER { return "", "", 0, e } if n <= uint32(len(b)) { return "", "", 0, e } } } // Various types of pre-specified SIDs that can be synthesized and compared at runtime. type WELL_KNOWN_SID_TYPE uint32 const ( WinNullSid = 0 WinWorldSid = 1 WinLocalSid = 2 WinCreatorOwnerSid = 3 WinCreatorGroupSid = 4 WinCreatorOwnerServerSid = 5 WinCreatorGroupServerSid = 6 WinNtAuthoritySid = 7 WinDialupSid = 8 WinNetworkSid = 9 WinBatchSid = 10 WinInteractiveSid = 11 WinServiceSid = 12 WinAnonymousSid = 13 WinProxySid = 14 WinEnterpriseControllersSid = 15 WinSelfSid = 16 WinAuthenticatedUserSid = 17 WinRestrictedCodeSid = 18 WinTerminalServerSid = 19 WinRemoteLogonIdSid = 20 WinLogonIdsSid = 21 WinLocalSystemSid = 22 WinLocalServiceSid = 23 WinNetworkServiceSid = 24 WinBuiltinDomainSid = 25 WinBuiltinAdministratorsSid = 26 WinBuiltinUsersSid = 27 WinBuiltinGuestsSid = 28 WinBuiltinPowerUsersSid = 29 WinBuiltinAccountOperatorsSid = 30 WinBuiltinSystemOperatorsSid = 31 WinBuiltinPrintOperatorsSid = 32 WinBuiltinBackupOperatorsSid = 33 WinBuiltinReplicatorSid = 34 WinBuiltinPreWindows2000CompatibleAccessSid = 35 WinBuiltinRemoteDesktopUsersSid = 36 WinBuiltinNetworkConfigurationOperatorsSid = 37 WinAccountAdministratorSid = 38 WinAccountGuestSid = 39 WinAccountKrbtgtSid = 40 WinAccountDomainAdminsSid = 41 WinAccountDomainUsersSid = 42 WinAccountDomainGuestsSid = 43 WinAccountComputersSid = 44 WinAccountControllersSid = 45 WinAccountCertAdminsSid = 46 WinAccountSchemaAdminsSid = 47 WinAccountEnterpriseAdminsSid = 48 WinAccountPolicyAdminsSid = 49 WinAccountRasAndIasServersSid = 50 WinNTLMAuthenticationSid = 51 WinDigestAuthenticationSid = 52 WinSChannelAuthenticationSid = 53 WinThisOrganizationSid = 54 WinOtherOrganizationSid = 55 WinBuiltinIncomingForestTrustBuildersSid = 56 WinBuiltinPerfMonitoringUsersSid = 57 WinBuiltinPerfLoggingUsersSid = 58 WinBuiltinAuthorizationAccessSid = 59 WinBuiltinTerminalServerLicenseServersSid = 60 WinBuiltinDCOMUsersSid = 61 WinBuiltinIUsersSid = 62 WinIUserSid = 63 WinBuiltinCryptoOperatorsSid = 64 WinUntrustedLabelSid = 65 WinLowLabelSid = 66 WinMediumLabelSid = 67 WinHighLabelSid = 68 WinSystemLabelSid = 69 WinWriteRestrictedCodeSid = 70 WinCreatorOwnerRightsSid = 71 WinCacheablePrincipalsGroupSid = 72 WinNonCacheablePrincipalsGroupSid = 73 WinEnterpriseReadonlyControllersSid = 74 WinAccountReadonlyControllersSid = 75 WinBuiltinEventLogReadersGroup = 76 WinNewEnterpriseReadonlyControllersSid = 77 WinBuiltinCertSvcDComAccessGroup = 78 WinMediumPlusLabelSid = 79 WinLocalLogonSid = 80 WinConsoleLogonSid = 81 WinThisOrganizationCertificateSid = 82 WinApplicationPackageAuthoritySid = 83 WinBuiltinAnyPackageSid = 84 WinCapabilityInternetClientSid = 85 WinCapabilityInternetClientServerSid = 86 WinCapabilityPrivateNetworkClientServerSid = 87 WinCapabilityPicturesLibrarySid = 88 WinCapabilityVideosLibrarySid = 89 WinCapabilityMusicLibrarySid = 90 WinCapabilityDocumentsLibrarySid = 91 WinCapabilitySharedUserCertificatesSid = 92 WinCapabilityEnterpriseAuthenticationSid = 93 WinCapabilityRemovableStorageSid = 94 WinBuiltinRDSRemoteAccessServersSid = 95 WinBuiltinRDSEndpointServersSid = 96 WinBuiltinRDSManagementServersSid = 97 WinUserModeDriversSid = 98 WinBuiltinHyperVAdminsSid = 99 WinAccountCloneableControllersSid = 100 WinBuiltinAccessControlAssistanceOperatorsSid = 101 WinBuiltinRemoteManagementUsersSid = 102 WinAuthenticationAuthorityAssertedSid = 103 WinAuthenticationServiceAssertedSid = 104 WinLocalAccountSid = 105 WinLocalAccountAndAdministratorSid = 106 WinAccountProtectedUsersSid = 107 WinCapabilityAppointmentsSid = 108 WinCapabilityContactsSid = 109 WinAccountDefaultSystemManagedSid = 110 WinBuiltinDefaultSystemManagedGroupSid = 111 WinBuiltinStorageReplicaAdminsSid = 112 WinAccountKeyAdminsSid = 113 WinAccountEnterpriseKeyAdminsSid = 114 WinAuthenticationKeyTrustSid = 115 WinAuthenticationKeyPropertyMFASid = 116 WinAuthenticationKeyPropertyAttestationSid = 117 WinAuthenticationFreshKeyAuthSid = 118 WinBuiltinDeviceOwnersSid = 119 ) // Creates a SID for a well-known predefined alias, generally using the constants of the form // Win*Sid, for the local machine. func CreateWellKnownSid(sidType WELL_KNOWN_SID_TYPE) (*SID, error) { return CreateWellKnownDomainSid(sidType, nil) } // Creates a SID for a well-known predefined alias, generally using the constants of the form // Win*Sid, for the domain specified by the domainSid parameter. func CreateWellKnownDomainSid(sidType WELL_KNOWN_SID_TYPE, domainSid *SID) (*SID, error) { n := uint32(50) for { b := make([]byte, n) sid := (*SID)(unsafe.Pointer(&b[0])) err := createWellKnownSid(sidType, domainSid, sid, &n) if err == nil { return sid, nil } if err != ERROR_INSUFFICIENT_BUFFER { return nil, err } if n <= uint32(len(b)) { return nil, err } } } const ( // do not reorder TOKEN_ASSIGN_PRIMARY = 1 << iota TOKEN_DUPLICATE TOKEN_IMPERSONATE TOKEN_QUERY TOKEN_QUERY_SOURCE TOKEN_ADJUST_PRIVILEGES TOKEN_ADJUST_GROUPS TOKEN_ADJUST_DEFAULT TOKEN_ADJUST_SESSIONID TOKEN_ALL_ACCESS = STANDARD_RIGHTS_REQUIRED | TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE | TOKEN_IMPERSONATE | TOKEN_QUERY | TOKEN_QUERY_SOURCE | TOKEN_ADJUST_PRIVILEGES | TOKEN_ADJUST_GROUPS | TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_SESSIONID TOKEN_READ = STANDARD_RIGHTS_READ | TOKEN_QUERY TOKEN_WRITE = STANDARD_RIGHTS_WRITE | TOKEN_ADJUST_PRIVILEGES | TOKEN_ADJUST_GROUPS | TOKEN_ADJUST_DEFAULT TOKEN_EXECUTE = STANDARD_RIGHTS_EXECUTE ) const ( // do not reorder TokenUser = 1 + iota TokenGroups TokenPrivileges TokenOwner TokenPrimaryGroup TokenDefaultDacl TokenSource TokenType TokenImpersonationLevel TokenStatistics TokenRestrictedSids TokenSessionId TokenGroupsAndPrivileges TokenSessionReference TokenSandBoxInert TokenAuditPolicy TokenOrigin TokenElevationType TokenLinkedToken TokenElevation TokenHasRestrictions TokenAccessInformation TokenVirtualizationAllowed TokenVirtualizationEnabled TokenIntegrityLevel TokenUIAccess TokenMandatoryPolicy TokenLogonSid MaxTokenInfoClass ) // Group attributes inside of Tokengroups.Groups[i].Attributes const ( SE_GROUP_MANDATORY = 0x00000001 SE_GROUP_ENABLED_BY_DEFAULT = 0x00000002 SE_GROUP_ENABLED = 0x00000004 SE_GROUP_OWNER = 0x00000008 SE_GROUP_USE_FOR_DENY_ONLY = 0x00000010 SE_GROUP_INTEGRITY = 0x00000020 SE_GROUP_INTEGRITY_ENABLED = 0x00000040 SE_GROUP_LOGON_ID = 0xC0000000 SE_GROUP_RESOURCE = 0x20000000 SE_GROUP_VALID_ATTRIBUTES = SE_GROUP_MANDATORY | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_ENABLED | SE_GROUP_OWNER | SE_GROUP_USE_FOR_DENY_ONLY | SE_GROUP_LOGON_ID | SE_GROUP_RESOURCE | SE_GROUP_INTEGRITY | SE_GROUP_INTEGRITY_ENABLED ) // Privilege attributes const ( SE_PRIVILEGE_ENABLED_BY_DEFAULT = 0x00000001 SE_PRIVILEGE_ENABLED = 0x00000002 SE_PRIVILEGE_REMOVED = 0x00000004 SE_PRIVILEGE_USED_FOR_ACCESS = 0x80000000 SE_PRIVILEGE_VALID_ATTRIBUTES = SE_PRIVILEGE_ENABLED_BY_DEFAULT | SE_PRIVILEGE_ENABLED | SE_PRIVILEGE_REMOVED | SE_PRIVILEGE_USED_FOR_ACCESS ) // Token types const ( TokenPrimary = 1 TokenImpersonation = 2 ) // Impersonation levels const ( SecurityAnonymous = 0 SecurityIdentification = 1 SecurityImpersonation = 2 SecurityDelegation = 3 ) type LUID struct { LowPart uint32 HighPart int32 } type LUIDAndAttributes struct { Luid LUID Attributes uint32 } type SIDAndAttributes struct { Sid *SID Attributes uint32 } type Tokenuser struct { User SIDAndAttributes } type Tokenprimarygroup struct { PrimaryGroup *SID } type Tokengroups struct { GroupCount uint32 Groups [1]SIDAndAttributes // Use AllGroups() for iterating. } // AllGroups returns a slice that can be used to iterate over the groups in g. func (g *Tokengroups) AllGroups() []SIDAndAttributes { return (*[(1 << 28) - 1]SIDAndAttributes)(unsafe.Pointer(&g.Groups[0]))[:g.GroupCount:g.GroupCount] } type Tokenprivileges struct { PrivilegeCount uint32 Privileges [1]LUIDAndAttributes // Use AllPrivileges() for iterating. } // AllPrivileges returns a slice that can be used to iterate over the privileges in p. func (p *Tokenprivileges) AllPrivileges() []LUIDAndAttributes { return (*[(1 << 27) - 1]LUIDAndAttributes)(unsafe.Pointer(&p.Privileges[0]))[:p.PrivilegeCount:p.PrivilegeCount] } type Tokenmandatorylabel struct { Label SIDAndAttributes } func (tml *Tokenmandatorylabel) Size() uint32 { return uint32(unsafe.Sizeof(Tokenmandatorylabel{})) + GetLengthSid(tml.Label.Sid) } // Authorization Functions //sys checkTokenMembership(tokenHandle Token, sidToCheck *SID, isMember *int32) (err error) = advapi32.CheckTokenMembership //sys OpenProcessToken(process Handle, access uint32, token *Token) (err error) = advapi32.OpenProcessToken //sys OpenThreadToken(thread Handle, access uint32, openAsSelf bool, token *Token) (err error) = advapi32.OpenThreadToken //sys ImpersonateSelf(impersonationlevel uint32) (err error) = advapi32.ImpersonateSelf //sys RevertToSelf() (err error) = advapi32.RevertToSelf //sys SetThreadToken(thread *Handle, token Token) (err error) = advapi32.SetThreadToken //sys LookupPrivilegeValue(systemname *uint16, name *uint16, luid *LUID) (err error) = advapi32.LookupPrivilegeValueW //sys AdjustTokenPrivileges(token Token, disableAllPrivileges bool, newstate *Tokenprivileges, buflen uint32, prevstate *Tokenprivileges, returnlen *uint32) (err error) = advapi32.AdjustTokenPrivileges //sys AdjustTokenGroups(token Token, resetToDefault bool, newstate *Tokengroups, buflen uint32, prevstate *Tokengroups, returnlen *uint32) (err error) = advapi32.AdjustTokenGroups //sys GetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32, returnedLen *uint32) (err error) = advapi32.GetTokenInformation //sys SetTokenInformation(token Token, infoClass uint32, info *byte, infoLen uint32) (err error) = advapi32.SetTokenInformation //sys DuplicateTokenEx(existingToken Token, desiredAccess uint32, tokenAttributes *SecurityAttributes, impersonationLevel uint32, tokenType uint32, newToken *Token) (err error) = advapi32.DuplicateTokenEx //sys GetUserProfileDirectory(t Token, dir *uint16, dirLen *uint32) (err error) = userenv.GetUserProfileDirectoryW //sys getSystemDirectory(dir *uint16, dirLen uint32) (len uint32, err error) = kernel32.GetSystemDirectoryW //sys getWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) = kernel32.GetWindowsDirectoryW //sys getSystemWindowsDirectory(dir *uint16, dirLen uint32) (len uint32, err error) = kernel32.GetSystemWindowsDirectoryW // An access token contains the security information for a logon session. // The system creates an access token when a user logs on, and every // process executed on behalf of the user has a copy of the token. // The token identifies the user, the user's groups, and the user's // privileges. The system uses the token to control access to securable // objects and to control the ability of the user to perform various // system-related operations on the local computer. type Token Handle // OpenCurrentProcessToken opens an access token associated with current // process with TOKEN_QUERY access. It is a real token that needs to be closed. // // Deprecated: Explicitly call OpenProcessToken(CurrentProcess(), ...) // with the desired access instead, or use GetCurrentProcessToken for a // TOKEN_QUERY token. func OpenCurrentProcessToken() (Token, error) { var token Token err := OpenProcessToken(CurrentProcess(), TOKEN_QUERY, &token) return token, err } // GetCurrentProcessToken returns the access token associated with // the current process. It is a pseudo token that does not need // to be closed. func GetCurrentProcessToken() Token { return Token(^uintptr(4 - 1)) } // GetCurrentThreadToken return the access token associated with // the current thread. It is a pseudo token that does not need // to be closed. func GetCurrentThreadToken() Token { return Token(^uintptr(5 - 1)) } // GetCurrentThreadEffectiveToken returns the effective access token // associated with the current thread. It is a pseudo token that does // not need to be closed. func GetCurrentThreadEffectiveToken() Token { return Token(^uintptr(6 - 1)) } // Close releases access to access token. func (t Token) Close() error { return CloseHandle(Handle(t)) } // getInfo retrieves a specified type of information about an access token. func (t Token) getInfo(class uint32, initSize int) (unsafe.Pointer, error) { n := uint32(initSize) for { b := make([]byte, n) e := GetTokenInformation(t, class, &b[0], uint32(len(b)), &n) if e == nil { return unsafe.Pointer(&b[0]), nil } if e != ERROR_INSUFFICIENT_BUFFER { return nil, e } if n <= uint32(len(b)) { return nil, e } } } // GetTokenUser retrieves access token t user account information. func (t Token) GetTokenUser() (*Tokenuser, error) { i, e := t.getInfo(TokenUser, 50) if e != nil { return nil, e } return (*Tokenuser)(i), nil } // GetTokenGroups retrieves group accounts associated with access token t. func (t Token) GetTokenGroups() (*Tokengroups, error) { i, e := t.getInfo(TokenGroups, 50) if e != nil { return nil, e } return (*Tokengroups)(i), nil } // GetTokenPrimaryGroup retrieves access token t primary group information. // A pointer to a SID structure representing a group that will become // the primary group of any objects created by a process using this access token. func (t Token) GetTokenPrimaryGroup() (*Tokenprimarygroup, error) { i, e := t.getInfo(TokenPrimaryGroup, 50) if e != nil { return nil, e } return (*Tokenprimarygroup)(i), nil } // GetUserProfileDirectory retrieves path to the // root directory of the access token t user's profile. func (t Token) GetUserProfileDirectory() (string, error) { n := uint32(100) for { b := make([]uint16, n) e := GetUserProfileDirectory(t, &b[0], &n) if e == nil { return UTF16ToString(b), nil } if e != ERROR_INSUFFICIENT_BUFFER { return "", e } if n <= uint32(len(b)) { return "", e } } } // IsElevated returns whether the current token is elevated from a UAC perspective. func (token Token) IsElevated() bool { var isElevated uint32 var outLen uint32 err := GetTokenInformation(token, TokenElevation, (*byte)(unsafe.Pointer(&isElevated)), uint32(unsafe.Sizeof(isElevated)), &outLen) if err != nil { return false } return outLen == uint32(unsafe.Sizeof(isElevated)) && isElevated != 0 } // GetLinkedToken returns the linked token, which may be an elevated UAC token. func (token Token) GetLinkedToken() (Token, error) { var linkedToken Token var outLen uint32 err := GetTokenInformation(token, TokenLinkedToken, (*byte)(unsafe.Pointer(&linkedToken)), uint32(unsafe.Sizeof(linkedToken)), &outLen) if err != nil { return Token(0), err } return linkedToken, nil } // GetSystemDirectory retrieves the path to current location of the system // directory, which is typically, though not always, `C:\Windows\System32`. func GetSystemDirectory() (string, error) { n := uint32(MAX_PATH) for { b := make([]uint16, n) l, e := getSystemDirectory(&b[0], n) if e != nil { return "", e } if l <= n { return UTF16ToString(b[:l]), nil } n = l } } // GetWindowsDirectory retrieves the path to current location of the Windows // directory, which is typically, though not always, `C:\Windows`. This may // be a private user directory in the case that the application is running // under a terminal server. func GetWindowsDirectory() (string, error) { n := uint32(MAX_PATH) for { b := make([]uint16, n) l, e := getWindowsDirectory(&b[0], n) if e != nil { return "", e } if l <= n { return UTF16ToString(b[:l]), nil } n = l } } // GetSystemWindowsDirectory retrieves the path to current location of the // Windows directory, which is typically, though not always, `C:\Windows`. func GetSystemWindowsDirectory() (string, error) { n := uint32(MAX_PATH) for { b := make([]uint16, n) l, e := getSystemWindowsDirectory(&b[0], n) if e != nil { return "", e } if l <= n { return UTF16ToString(b[:l]), nil } n = l } } // IsMember reports whether the access token t is a member of the provided SID. func (t Token) IsMember(sid *SID) (bool, error) { var b int32 if e := checkTokenMembership(t, sid, &b); e != nil { return false, e } return b != 0, nil } const ( WTS_CONSOLE_CONNECT = 0x1 WTS_CONSOLE_DISCONNECT = 0x2 WTS_REMOTE_CONNECT = 0x3 WTS_REMOTE_DISCONNECT = 0x4 WTS_SESSION_LOGON = 0x5 WTS_SESSION_LOGOFF = 0x6 WTS_SESSION_LOCK = 0x7 WTS_SESSION_UNLOCK = 0x8 WTS_SESSION_REMOTE_CONTROL = 0x9 WTS_SESSION_CREATE = 0xa WTS_SESSION_TERMINATE = 0xb ) const ( WTSActive = 0 WTSConnected = 1 WTSConnectQuery = 2 WTSShadow = 3 WTSDisconnected = 4 WTSIdle = 5 WTSListen = 6 WTSReset = 7 WTSDown = 8 WTSInit = 9 ) type WTSSESSION_NOTIFICATION struct { Size uint32 SessionID uint32 } type WTS_SESSION_INFO struct { SessionID uint32 WindowStationName *uint16 State uint32 } //sys WTSQueryUserToken(session uint32, token *Token) (err error) = wtsapi32.WTSQueryUserToken //sys WTSEnumerateSessions(handle Handle, reserved uint32, version uint32, sessions **WTS_SESSION_INFO, count *uint32) (err error) = wtsapi32.WTSEnumerateSessionsW //sys WTSFreeMemory(ptr uintptr) = wtsapi32.WTSFreeMemory type ACL struct { aclRevision byte sbz1 byte aclSize uint16 aceCount uint16 sbz2 uint16 } type SECURITY_DESCRIPTOR struct { revision byte sbz1 byte control SECURITY_DESCRIPTOR_CONTROL owner *SID group *SID sacl *ACL dacl *ACL } type SecurityAttributes struct { Length uint32 SecurityDescriptor *SECURITY_DESCRIPTOR InheritHandle uint32 } type SE_OBJECT_TYPE uint32 // Constants for type SE_OBJECT_TYPE const ( SE_UNKNOWN_OBJECT_TYPE = 0 SE_FILE_OBJECT = 1 SE_SERVICE = 2 SE_PRINTER = 3 SE_REGISTRY_KEY = 4 SE_LMSHARE = 5 SE_KERNEL_OBJECT = 6 SE_WINDOW_OBJECT = 7 SE_DS_OBJECT = 8 SE_DS_OBJECT_ALL = 9 SE_PROVIDER_DEFINED_OBJECT = 10 SE_WMIGUID_OBJECT = 11 SE_REGISTRY_WOW64_32KEY = 12 SE_REGISTRY_WOW64_64KEY = 13 ) type SECURITY_INFORMATION uint32 // Constants for type SECURITY_INFORMATION const ( OWNER_SECURITY_INFORMATION = 0x00000001 GROUP_SECURITY_INFORMATION = 0x00000002 DACL_SECURITY_INFORMATION = 0x00000004 SACL_SECURITY_INFORMATION = 0x00000008 LABEL_SECURITY_INFORMATION = 0x00000010 ATTRIBUTE_SECURITY_INFORMATION = 0x00000020 SCOPE_SECURITY_INFORMATION = 0x00000040 BACKUP_SECURITY_INFORMATION = 0x00010000 PROTECTED_DACL_SECURITY_INFORMATION = 0x80000000 PROTECTED_SACL_SECURITY_INFORMATION = 0x40000000 UNPROTECTED_DACL_SECURITY_INFORMATION = 0x20000000 UNPROTECTED_SACL_SECURITY_INFORMATION = 0x10000000 ) type SECURITY_DESCRIPTOR_CONTROL uint16 // Constants for type SECURITY_DESCRIPTOR_CONTROL const ( SE_OWNER_DEFAULTED = 0x0001 SE_GROUP_DEFAULTED = 0x0002 SE_DACL_PRESENT = 0x0004 SE_DACL_DEFAULTED = 0x0008 SE_SACL_PRESENT = 0x0010 SE_SACL_DEFAULTED = 0x0020 SE_DACL_AUTO_INHERIT_REQ = 0x0100 SE_SACL_AUTO_INHERIT_REQ = 0x0200 SE_DACL_AUTO_INHERITED = 0x0400 SE_SACL_AUTO_INHERITED = 0x0800 SE_DACL_PROTECTED = 0x1000 SE_SACL_PROTECTED = 0x2000 SE_RM_CONTROL_VALID = 0x4000 SE_SELF_RELATIVE = 0x8000 ) type ACCESS_MASK uint32 // Constants for type ACCESS_MASK const ( DELETE = 0x00010000 READ_CONTROL = 0x00020000 WRITE_DAC = 0x00040000 WRITE_OWNER = 0x00080000 SYNCHRONIZE = 0x00100000 STANDARD_RIGHTS_REQUIRED = 0x000F0000 STANDARD_RIGHTS_READ = READ_CONTROL STANDARD_RIGHTS_WRITE = READ_CONTROL STANDARD_RIGHTS_EXECUTE = READ_CONTROL STANDARD_RIGHTS_ALL = 0x001F0000 SPECIFIC_RIGHTS_ALL = 0x0000FFFF ACCESS_SYSTEM_SECURITY = 0x01000000 MAXIMUM_ALLOWED = 0x02000000 GENERIC_READ = 0x80000000 GENERIC_WRITE = 0x40000000 GENERIC_EXECUTE = 0x20000000 GENERIC_ALL = 0x10000000 ) type ACCESS_MODE uint32 // Constants for type ACCESS_MODE const ( NOT_USED_ACCESS = 0 GRANT_ACCESS = 1 SET_ACCESS = 2 DENY_ACCESS = 3 REVOKE_ACCESS = 4 SET_AUDIT_SUCCESS = 5 SET_AUDIT_FAILURE = 6 ) // Constants for AceFlags and Inheritance fields const ( NO_INHERITANCE = 0x0 SUB_OBJECTS_ONLY_INHERIT = 0x1 SUB_CONTAINERS_ONLY_INHERIT = 0x2 SUB_CONTAINERS_AND_OBJECTS_INHERIT = 0x3 INHERIT_NO_PROPAGATE = 0x4 INHERIT_ONLY = 0x8 INHERITED_ACCESS_ENTRY = 0x10 INHERITED_PARENT = 0x10000000 INHERITED_GRANDPARENT = 0x20000000 OBJECT_INHERIT_ACE = 0x1 CONTAINER_INHERIT_ACE = 0x2 NO_PROPAGATE_INHERIT_ACE = 0x4 INHERIT_ONLY_ACE = 0x8 INHERITED_ACE = 0x10 VALID_INHERIT_FLAGS = 0x1F ) type MULTIPLE_TRUSTEE_OPERATION uint32 // Constants for MULTIPLE_TRUSTEE_OPERATION const ( NO_MULTIPLE_TRUSTEE = 0 TRUSTEE_IS_IMPERSONATE = 1 ) type TRUSTEE_FORM uint32 // Constants for TRUSTEE_FORM const ( TRUSTEE_IS_SID = 0 TRUSTEE_IS_NAME = 1 TRUSTEE_BAD_FORM = 2 TRUSTEE_IS_OBJECTS_AND_SID = 3 TRUSTEE_IS_OBJECTS_AND_NAME = 4 ) type TRUSTEE_TYPE uint32 // Constants for TRUSTEE_TYPE const ( TRUSTEE_IS_UNKNOWN = 0 TRUSTEE_IS_USER = 1 TRUSTEE_IS_GROUP = 2 TRUSTEE_IS_DOMAIN = 3 TRUSTEE_IS_ALIAS = 4 TRUSTEE_IS_WELL_KNOWN_GROUP = 5 TRUSTEE_IS_DELETED = 6 TRUSTEE_IS_INVALID = 7 TRUSTEE_IS_COMPUTER = 8 ) // Constants for ObjectsPresent field const ( ACE_OBJECT_TYPE_PRESENT = 0x1 ACE_INHERITED_OBJECT_TYPE_PRESENT = 0x2 ) type EXPLICIT_ACCESS struct { AccessPermissions ACCESS_MASK AccessMode ACCESS_MODE Inheritance uint32 Trustee TRUSTEE } // This type is the union inside of TRUSTEE and must be created using one of the TrusteeValueFrom* functions. type TrusteeValue uintptr func TrusteeValueFromString(str string) TrusteeValue { return TrusteeValue(unsafe.Pointer(StringToUTF16Ptr(str))) } func TrusteeValueFromSID(sid *SID) TrusteeValue { return TrusteeValue(unsafe.Pointer(sid)) } func TrusteeValueFromObjectsAndSid(objectsAndSid *OBJECTS_AND_SID) TrusteeValue { return TrusteeValue(unsafe.Pointer(objectsAndSid)) } func TrusteeValueFromObjectsAndName(objectsAndName *OBJECTS_AND_NAME) TrusteeValue { return TrusteeValue(unsafe.Pointer(objectsAndName)) } type TRUSTEE struct { MultipleTrustee *TRUSTEE MultipleTrusteeOperation MULTIPLE_TRUSTEE_OPERATION TrusteeForm TRUSTEE_FORM TrusteeType TRUSTEE_TYPE TrusteeValue TrusteeValue } type OBJECTS_AND_SID struct { ObjectsPresent uint32 ObjectTypeGuid GUID InheritedObjectTypeGuid GUID Sid *SID } type OBJECTS_AND_NAME struct { ObjectsPresent uint32 ObjectType SE_OBJECT_TYPE ObjectTypeName *uint16 InheritedObjectTypeName *uint16 Name *uint16 } //sys getSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) = advapi32.GetSecurityInfo //sys SetSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) = advapi32.SetSecurityInfo //sys getNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner **SID, group **SID, dacl **ACL, sacl **ACL, sd **SECURITY_DESCRIPTOR) (ret error) = advapi32.GetNamedSecurityInfoW //sys SetNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION, owner *SID, group *SID, dacl *ACL, sacl *ACL) (ret error) = advapi32.SetNamedSecurityInfoW //sys buildSecurityDescriptor(owner *TRUSTEE, group *TRUSTEE, countAccessEntries uint32, accessEntries *EXPLICIT_ACCESS, countAuditEntries uint32, auditEntries *EXPLICIT_ACCESS, oldSecurityDescriptor *SECURITY_DESCRIPTOR, sizeNewSecurityDescriptor *uint32, newSecurityDescriptor **SECURITY_DESCRIPTOR) (ret error) = advapi32.BuildSecurityDescriptorW //sys initializeSecurityDescriptor(absoluteSD *SECURITY_DESCRIPTOR, revision uint32) (err error) = advapi32.InitializeSecurityDescriptor //sys getSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, control *SECURITY_DESCRIPTOR_CONTROL, revision *uint32) (err error) = advapi32.GetSecurityDescriptorControl //sys getSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent *bool, dacl **ACL, daclDefaulted *bool) (err error) = advapi32.GetSecurityDescriptorDacl //sys getSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent *bool, sacl **ACL, saclDefaulted *bool) (err error) = advapi32.GetSecurityDescriptorSacl //sys getSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner **SID, ownerDefaulted *bool) (err error) = advapi32.GetSecurityDescriptorOwner //sys getSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group **SID, groupDefaulted *bool) (err error) = advapi32.GetSecurityDescriptorGroup //sys getSecurityDescriptorLength(sd *SECURITY_DESCRIPTOR) (len uint32) = advapi32.GetSecurityDescriptorLength //sys getSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) (ret error) [failretval!=0] = advapi32.GetSecurityDescriptorRMControl //sys isValidSecurityDescriptor(sd *SECURITY_DESCRIPTOR) (isValid bool) = advapi32.IsValidSecurityDescriptor //sys setSecurityDescriptorControl(sd *SECURITY_DESCRIPTOR, controlBitsOfInterest SECURITY_DESCRIPTOR_CONTROL, controlBitsToSet SECURITY_DESCRIPTOR_CONTROL) (err error) = advapi32.SetSecurityDescriptorControl //sys setSecurityDescriptorDacl(sd *SECURITY_DESCRIPTOR, daclPresent bool, dacl *ACL, daclDefaulted bool) (err error) = advapi32.SetSecurityDescriptorDacl //sys setSecurityDescriptorSacl(sd *SECURITY_DESCRIPTOR, saclPresent bool, sacl *ACL, saclDefaulted bool) (err error) = advapi32.SetSecurityDescriptorSacl //sys setSecurityDescriptorOwner(sd *SECURITY_DESCRIPTOR, owner *SID, ownerDefaulted bool) (err error) = advapi32.SetSecurityDescriptorOwner //sys setSecurityDescriptorGroup(sd *SECURITY_DESCRIPTOR, group *SID, groupDefaulted bool) (err error) = advapi32.SetSecurityDescriptorGroup //sys setSecurityDescriptorRMControl(sd *SECURITY_DESCRIPTOR, rmControl *uint8) = advapi32.SetSecurityDescriptorRMControl //sys convertStringSecurityDescriptorToSecurityDescriptor(str string, revision uint32, sd **SECURITY_DESCRIPTOR, size *uint32) (err error) = advapi32.ConvertStringSecurityDescriptorToSecurityDescriptorW //sys convertSecurityDescriptorToStringSecurityDescriptor(sd *SECURITY_DESCRIPTOR, revision uint32, securityInformation SECURITY_INFORMATION, str **uint16, strLen *uint32) (err error) = advapi32.ConvertSecurityDescriptorToStringSecurityDescriptorW //sys makeAbsoluteSD(selfRelativeSD *SECURITY_DESCRIPTOR, absoluteSD *SECURITY_DESCRIPTOR, absoluteSDSize *uint32, dacl *ACL, daclSize *uint32, sacl *ACL, saclSize *uint32, owner *SID, ownerSize *uint32, group *SID, groupSize *uint32) (err error) = advapi32.MakeAbsoluteSD //sys makeSelfRelativeSD(absoluteSD *SECURITY_DESCRIPTOR, selfRelativeSD *SECURITY_DESCRIPTOR, selfRelativeSDSize *uint32) (err error) = advapi32.MakeSelfRelativeSD //sys setEntriesInAcl(countExplicitEntries uint32, explicitEntries *EXPLICIT_ACCESS, oldACL *ACL, newACL **ACL) (ret error) = advapi32.SetEntriesInAclW // Control returns the security descriptor control bits. func (sd *SECURITY_DESCRIPTOR) Control() (control SECURITY_DESCRIPTOR_CONTROL, revision uint32, err error) { err = getSecurityDescriptorControl(sd, &control, &revision) return } // SetControl sets the security descriptor control bits. func (sd *SECURITY_DESCRIPTOR) SetControl(controlBitsOfInterest SECURITY_DESCRIPTOR_CONTROL, controlBitsToSet SECURITY_DESCRIPTOR_CONTROL) error { return setSecurityDescriptorControl(sd, controlBitsOfInterest, controlBitsToSet) } // RMControl returns the security descriptor resource manager control bits. func (sd *SECURITY_DESCRIPTOR) RMControl() (control uint8, err error) { err = getSecurityDescriptorRMControl(sd, &control) return } // SetRMControl sets the security descriptor resource manager control bits. func (sd *SECURITY_DESCRIPTOR) SetRMControl(rmControl uint8) { setSecurityDescriptorRMControl(sd, &rmControl) } // DACL returns the security descriptor DACL and whether it was defaulted. The dacl return value may be nil // if a DACL exists but is an "empty DACL", meaning fully permissive. If the DACL does not exist, err returns // ERROR_OBJECT_NOT_FOUND. func (sd *SECURITY_DESCRIPTOR) DACL() (dacl *ACL, defaulted bool, err error) { var present bool err = getSecurityDescriptorDacl(sd, &present, &dacl, &defaulted) if !present { err = ERROR_OBJECT_NOT_FOUND } return } // SetDACL sets the absolute security descriptor DACL. func (absoluteSD *SECURITY_DESCRIPTOR) SetDACL(dacl *ACL, present, defaulted bool) error { return setSecurityDescriptorDacl(absoluteSD, present, dacl, defaulted) } // SACL returns the security descriptor SACL and whether it was defaulted. The sacl return value may be nil // if a SACL exists but is an "empty SACL", meaning fully permissive. If the SACL does not exist, err returns // ERROR_OBJECT_NOT_FOUND. func (sd *SECURITY_DESCRIPTOR) SACL() (sacl *ACL, defaulted bool, err error) { var present bool err = getSecurityDescriptorSacl(sd, &present, &sacl, &defaulted) if !present { err = ERROR_OBJECT_NOT_FOUND } return } // SetSACL sets the absolute security descriptor SACL. func (absoluteSD *SECURITY_DESCRIPTOR) SetSACL(sacl *ACL, present, defaulted bool) error { return setSecurityDescriptorSacl(absoluteSD, present, sacl, defaulted) } // Owner returns the security descriptor owner and whether it was defaulted. func (sd *SECURITY_DESCRIPTOR) Owner() (owner *SID, defaulted bool, err error) { err = getSecurityDescriptorOwner(sd, &owner, &defaulted) return } // SetOwner sets the absolute security descriptor owner. func (absoluteSD *SECURITY_DESCRIPTOR) SetOwner(owner *SID, defaulted bool) error { return setSecurityDescriptorOwner(absoluteSD, owner, defaulted) } // Group returns the security descriptor group and whether it was defaulted. func (sd *SECURITY_DESCRIPTOR) Group() (group *SID, defaulted bool, err error) { err = getSecurityDescriptorGroup(sd, &group, &defaulted) return } // SetGroup sets the absolute security descriptor owner. func (absoluteSD *SECURITY_DESCRIPTOR) SetGroup(group *SID, defaulted bool) error { return setSecurityDescriptorGroup(absoluteSD, group, defaulted) } // Length returns the length of the security descriptor. func (sd *SECURITY_DESCRIPTOR) Length() uint32 { return getSecurityDescriptorLength(sd) } // IsValid returns whether the security descriptor is valid. func (sd *SECURITY_DESCRIPTOR) IsValid() bool { return isValidSecurityDescriptor(sd) } // String returns the SDDL form of the security descriptor, with a function signature that can be // used with %v formatting directives. func (sd *SECURITY_DESCRIPTOR) String() string { var sddl *uint16 err := convertSecurityDescriptorToStringSecurityDescriptor(sd, 1, 0xff, &sddl, nil) if err != nil { return "" } defer LocalFree(Handle(unsafe.Pointer(sddl))) return UTF16ToString((*[(1 << 30) - 1]uint16)(unsafe.Pointer(sddl))[:]) } // ToAbsolute converts a self-relative security descriptor into an absolute one. func (selfRelativeSD *SECURITY_DESCRIPTOR) ToAbsolute() (absoluteSD *SECURITY_DESCRIPTOR, err error) { control, _, err := selfRelativeSD.Control() if err != nil { return } if control&SE_SELF_RELATIVE == 0 { err = ERROR_INVALID_PARAMETER return } var absoluteSDSize, daclSize, saclSize, ownerSize, groupSize uint32 err = makeAbsoluteSD(selfRelativeSD, nil, &absoluteSDSize, nil, &daclSize, nil, &saclSize, nil, &ownerSize, nil, &groupSize) switch err { case ERROR_INSUFFICIENT_BUFFER: case nil: // makeAbsoluteSD is expected to fail, but it succeeds. return nil, ERROR_INTERNAL_ERROR default: return nil, err } if absoluteSDSize > 0 { absoluteSD = (*SECURITY_DESCRIPTOR)(unsafe.Pointer(&make([]byte, absoluteSDSize)[0])) } var ( dacl *ACL sacl *ACL owner *SID group *SID ) if daclSize > 0 { dacl = (*ACL)(unsafe.Pointer(&make([]byte, daclSize)[0])) } if saclSize > 0 { sacl = (*ACL)(unsafe.Pointer(&make([]byte, saclSize)[0])) } if ownerSize > 0 { owner = (*SID)(unsafe.Pointer(&make([]byte, ownerSize)[0])) } if groupSize > 0 { group = (*SID)(unsafe.Pointer(&make([]byte, groupSize)[0])) } err = makeAbsoluteSD(selfRelativeSD, absoluteSD, &absoluteSDSize, dacl, &daclSize, sacl, &saclSize, owner, &ownerSize, group, &groupSize) return } // ToSelfRelative converts an absolute security descriptor into a self-relative one. func (absoluteSD *SECURITY_DESCRIPTOR) ToSelfRelative() (selfRelativeSD *SECURITY_DESCRIPTOR, err error) { control, _, err := absoluteSD.Control() if err != nil { return } if control&SE_SELF_RELATIVE != 0 { err = ERROR_INVALID_PARAMETER return } var selfRelativeSDSize uint32 err = makeSelfRelativeSD(absoluteSD, nil, &selfRelativeSDSize) switch err { case ERROR_INSUFFICIENT_BUFFER: case nil: // makeSelfRelativeSD is expected to fail, but it succeeds. return nil, ERROR_INTERNAL_ERROR default: return nil, err } if selfRelativeSDSize > 0 { selfRelativeSD = (*SECURITY_DESCRIPTOR)(unsafe.Pointer(&make([]byte, selfRelativeSDSize)[0])) } err = makeSelfRelativeSD(absoluteSD, selfRelativeSD, &selfRelativeSDSize) return } func (selfRelativeSD *SECURITY_DESCRIPTOR) copySelfRelativeSecurityDescriptor() *SECURITY_DESCRIPTOR { sdBytes := make([]byte, selfRelativeSD.Length()) copy(sdBytes, (*[(1 << 31) - 1]byte)(unsafe.Pointer(selfRelativeSD))[:len(sdBytes)]) return (*SECURITY_DESCRIPTOR)(unsafe.Pointer(&sdBytes[0])) } // SecurityDescriptorFromString converts an SDDL string describing a security descriptor into a // self-relative security descriptor object allocated on the Go heap. func SecurityDescriptorFromString(sddl string) (sd *SECURITY_DESCRIPTOR, err error) { var winHeapSD *SECURITY_DESCRIPTOR err = convertStringSecurityDescriptorToSecurityDescriptor(sddl, 1, &winHeapSD, nil) if err != nil { return } defer LocalFree(Handle(unsafe.Pointer(winHeapSD))) return winHeapSD.copySelfRelativeSecurityDescriptor(), nil } // GetSecurityInfo queries the security information for a given handle and returns the self-relative security // descriptor result on the Go heap. func GetSecurityInfo(handle Handle, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION) (sd *SECURITY_DESCRIPTOR, err error) { var winHeapSD *SECURITY_DESCRIPTOR err = getSecurityInfo(handle, objectType, securityInformation, nil, nil, nil, nil, &winHeapSD) if err != nil { return } defer LocalFree(Handle(unsafe.Pointer(winHeapSD))) return winHeapSD.copySelfRelativeSecurityDescriptor(), nil } // GetNamedSecurityInfo queries the security information for a given named object and returns the self-relative security // descriptor result on the Go heap. func GetNamedSecurityInfo(objectName string, objectType SE_OBJECT_TYPE, securityInformation SECURITY_INFORMATION) (sd *SECURITY_DESCRIPTOR, err error) { var winHeapSD *SECURITY_DESCRIPTOR err = getNamedSecurityInfo(objectName, objectType, securityInformation, nil, nil, nil, nil, &winHeapSD) if err != nil { return } defer LocalFree(Handle(unsafe.Pointer(winHeapSD))) return winHeapSD.copySelfRelativeSecurityDescriptor(), nil } // BuildSecurityDescriptor makes a new security descriptor using the input trustees, explicit access lists, and // prior security descriptor to be merged, any of which can be nil, returning the self-relative security descriptor // result on the Go heap. func BuildSecurityDescriptor(owner *TRUSTEE, group *TRUSTEE, accessEntries []EXPLICIT_ACCESS, auditEntries []EXPLICIT_ACCESS, mergedSecurityDescriptor *SECURITY_DESCRIPTOR) (sd *SECURITY_DESCRIPTOR, err error) { var winHeapSD *SECURITY_DESCRIPTOR var winHeapSDSize uint32 var firstAccessEntry *EXPLICIT_ACCESS if len(accessEntries) > 0 { firstAccessEntry = &accessEntries[0] } var firstAuditEntry *EXPLICIT_ACCESS if len(auditEntries) > 0 { firstAuditEntry = &auditEntries[0] } err = buildSecurityDescriptor(owner, group, uint32(len(accessEntries)), firstAccessEntry, uint32(len(auditEntries)), firstAuditEntry, mergedSecurityDescriptor, &winHeapSDSize, &winHeapSD) if err != nil { return } defer LocalFree(Handle(unsafe.Pointer(winHeapSD))) return winHeapSD.copySelfRelativeSecurityDescriptor(), nil } // NewSecurityDescriptor creates and initializes a new absolute security descriptor. func NewSecurityDescriptor() (absoluteSD *SECURITY_DESCRIPTOR, err error) { absoluteSD = &SECURITY_DESCRIPTOR{} err = initializeSecurityDescriptor(absoluteSD, 1) return } // ACLFromEntries returns a new ACL on the Go heap containing a list of explicit entries as well as those of another ACL. // Both explicitEntries and mergedACL are optional and can be nil. func ACLFromEntries(explicitEntries []EXPLICIT_ACCESS, mergedACL *ACL) (acl *ACL, err error) { var firstExplicitEntry *EXPLICIT_ACCESS if len(explicitEntries) > 0 { firstExplicitEntry = &explicitEntries[0] } var winHeapACL *ACL err = setEntriesInAcl(uint32(len(explicitEntries)), firstExplicitEntry, mergedACL, &winHeapACL) if err != nil { return } defer LocalFree(Handle(unsafe.Pointer(winHeapACL))) aclBytes := make([]byte, winHeapACL.aclSize) copy(aclBytes, (*[(1 << 31) - 1]byte)(unsafe.Pointer(winHeapACL))[:len(aclBytes)]) return (*ACL)(unsafe.Pointer(&aclBytes[0])), nil }
{ "pile_set_name": "Github" }
The New York Islanders are among the NHL teams reported to be in contact with Emil Garipov, the KHL Gagarin Cup-winning goalie with Ak Bars Kazan. It’s a loose link, but one we’re obliged to pass on (along with another, see below) since we previously examined the possibility of a reunion with Mikko Koskinen, who now appears to be headed to the Oilers like fellow 2009 draft classmate Anders Nilsson before him. Both Isles links were reported by Latvia-based Euro hockey reporter Aivis Kalnins, who now says the supposed Koskinen agreement with the Islanders was a “misunderstanding” on Koskinen’s part. Garipov is younger (26) and has been with Kazan for seven seasons putting up consistently stellar numbers while carrying the majority of starts the last three seasons. Kalnins called him “lights out the best player on the ice” during the playoffs, where he put up a .944 save percentage while backing Ak Bars to an upset win in the finals over CSKA. But as with the Koskinen review, one is wise to be very cautious in translating KHL goaltending numbers to the NHL. And the report calls the Islanders one of four teams in contact with Garipov, who will be a free agent and is apparently ready to make the jump. So: Unlikely, but something to follow. Not Only, But Also Separately, Kalnins tweeted that former Kings defenseman Slava Voynov wants to return to the NHL. There are several murmurs that this is the case, including one (Sport-Express, Russian) that indicates the Islanders are among five teams Voynov is interested in. (This is where we should re-iterate that it’s silly season now, so players up for contract renewal in the KHL are wise to indicate interest in going to the NHL, just as NHLers hailing from the East are wise to indicate interest in returning home when it comes time to bid up their next NHL contract negotiations.) It’s hard to see how a Voynov return would happen given the legal and NHL disciplinary issues that caused his exit after pleading no contest to a misdemeanor charge of corporal injury to a spouse. (I’ve put that last sentence in strictly legal terms. My own view is it sounds like the man got off okay after assaulting his wife, not for the first time. Mike Milbury on air called it “an unfortunate incident” by a “special player.”) Cannot confirm other report out of KHL on #Isles interest in Slava Voynov, which (for obvious reasons) would be an unpopular choice. Seems #Isles are kicking lots of tires overseas; may be initial contact that goes no further. Many obstacles remain for a Voynov return to the NHL. — Arthur Staple (@StapeAthletic) April 23, 2018 The Islanders’ history would make it a shock if the interest is mutual here. So this connection sounds pretty dubious — at least in the sense that the player may be looking for nice places to land (the Rangers are also among the five teams, as are Florida, Montreal...and Winnipeg). I don’t really see a path back to the NHL for Voynov. But if came to be, and it was with the Islanders, well...no. Just no. UPDATE: Indeed. Arthur Staple of The Athletic confirms there is no “there” there, at least not on the Islanders’ part in terms of interest with Voynov:
{ "pile_set_name": "OpenWebText2" }