text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Flexural eczema versus atopic dermatitis.
Flexural eczema and atopic dermatitis are frequently synonymized. As respiratory atopy is rarely tested for and found in these patients, systematically equating a flexural distribution of dermatitis with atopic dermatitis may too frequently result in misclassified diagnoses and potentially missed opportunity for intervention toward improving patients' symptoms and quality of life. We present a critical review of the available evidence for the atopic dermatitis diagnosis and discuss the similarities between atopic dermatitis and allergic contact dermatitis. Because neither flexural predilection nor atopy is specific for atopic dermatitis, we conclude that the term atopic dermatitis is a misnomer and propose an etymologic reclassification of atopic dermatitis to "atopy-related" dermatitis. Allergic contact dermatitis can induce an atopic dermatitis-like phenotype, and thus, flexural dermatitis cannot be assumed as atopic without further testing. Patch testing should at least be considered in cases of chronic or recurrent eczema regardless of the working diagnosis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
National Blog
H.B. 512 Poison Pill Provisions
H.B. 512, the so-called "Safe Carry Protection Act," passed the Georgia House of Representatives on March 7th with a "poison pill" amendment attached.
One of the worst of these provisions states:
"(L) Any person who, within the five years immediately preceding the application, has made a credible threat to do physical violence to another person which threat was heard by a law enforcement officer and reported to the Georgia Crime Information Center. The judge of the probate court shall request such information from the Georgia Crime Information Center and shall be entitled to such information as set forth in subsection (e.1) of Code Section 35-3-34;" (emphasis added)
These poison pill provisions could disarm law-abiding Georgians without due process of law!
During debate over the bill, Republicans lined up to cheer lead for its passage and ignored the dangers of the amendment which was being pushed by Governor Nathan Deal and House "leadership."
One "pro-gun" group in Georgia even gave these politicians cover by claiming that the provisions were politically "necessary" in order for the bill to pass and that it would be cleaned up in the State Senate!
The only Republican to stand up and speak-out against these poison pill provisions was Representative Charles Gregory of Kennesaw. Rep. Gregory stated in his floor testimony:
"In America we are supposed to have the presumption of innocence and should never have to lose any rights without due process and a trial by a jury of 12. Individuals shouldn't have to prove their 'mental competency' in order to exercise their natural rights... I find it extremely disconcerting that a law enforcement officer, without notice or without due process, can unilaterally put an individual into a database that can be used to deny that individual his God-given natural rights.
Now I've already heard some people say 'don't worry about it, we'll fix it later in the Senate.' The last time I heard such foolish nonsense it came from Nancy Pelosi when she said that we'll have to pass the bill and then we'll find out what's in the bill."
The State Senate quickly assigned H.B. 512 to the SenateJudiciary Non-Civil Committee where it may receive a hearing as early as Wednesday, March 13th.
Please contact these State Senators and insist that theyeither remove all of the "poison pill" provisions from H.B. 512 or kill the bill outright.
Insist that the bill respect all of our natural rights and particularly those protected by the 2nd, 4th, 5th, and 8th Amendments to the U.S. Constitution:
Oppose any new expansion of 'mental health' background checks;
Oppose any provisions that would deny citizens due process of law;
Oppose any provisions that do not adhere to the presumption of innocence;
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Gradle multiple android apps
I want with help of gradle build 2-3 different APKs where the app name changes and some lines of code. I don't want to change whole directories or whole files, only snippets of code, is this possible?
I have tried to understand Build variants and Product flavor. but can't figure out how it works. Also this tutorial.
Thanks
A:
This is just a suggestion. We faced the same thing and this is how we got it to work. In my opinion it's very clean and yes it does use product flavors.
So let's say you have a class Address, which is formatted differently from country to country, but of course has a lot of common code. For the sake of simplicity let's say you have only street_number and street_name, but on country A the address should be formatted as street_number street_name and on country B it should be formatted as street_name, street_number.
The way we did this was having a project structure like so:
src
|
|\ main
|\ countryA
|\ countryB
So the project has 2 flavors - countryA and countryB. Here's the relevant build.gradle part:
productFlavors {
countryA {
applicationId "com.countryA"
}
countryB {
applicationId "com.countryB"
}
}
Now for the code part. So Address is a common class which we placed inside main and would look more or less like:
public abstract class AbstractAddress {
private String streetNumber;
private String streetName;
// ... your favorite getters and setters plus some common methods
public abstract String getFormattedAddress();
}
The key here is that the class is abstract and the sub-classes need to implement getFormattedAddress(). Now in the countryA folder you'd have:
package com.myapp.addresses;
public class Address extends AbstractAddress {
public String getFormattedAddress() {
return getStreetNumber() + " " + getStreetName();
}
}
Now in the same package as in countryA but in countryB's folder, you'd have the same class, but with a different implementation:
package com.myapp.addresses;
public class Address extends AbstractAddress {
public String getFormattedAddress() {
return getStreetName() + ", " + getStreetNumber();
}
}
Gradle will take care of generating the tasks for you. Something on the lines of assembleCountryA and assembleCountryB (It also depends on the build variants you have). Of course you can also generate all apks using only one task.
|
{
"pile_set_name": "StackExchange"
}
|
Tag Archives: world poker tour
There are a lot of ways to make a living after a spinal cord injury, but Garrett Greer may have one of the coolest professions any quadriplegic has landed post-injury – a professional poker player, and since 2012 he’s won over $3.6 million dollars.
He is 31 years old and a rising star on the World Poker Tour circuit, and a lifelong California boy currently living in Newport Beach who believes he was destined for the game. Long before his spinal cord injury he was already a diehard poker player, but Garrett’s accident brought him back after a brief stint in the movie production world.
Driven and dead-set on changing the stinging stereotype that most people would rather be dead than be like him (and maybe win some big bucks along the way), read up on the rising star of poker, Garrett Greer.
Why he’s fearless
Growing up in the sleepy town of Hemet, CA, Garrett was your typical young man dreaming of a bigger life, and he finally got his opportunity after graduating from high school, enrolling at UCLA. But he wasn’t sure how he was going to afford tuition. Fortunately, when he started college it was also when the big poker boom was happening online.
After discovering poker through an old high school buddy, he returned to college and began to study the mathematics and strategy of the game, and he was hooked. And he began to win right away, both online and at casinos near home. He began to win almost $7,000 a week, which he would use towards tuition. He was working towards a degree in sociology, with plans to go to law school.
That is exactly what he was planning on doing, even scoring a 163 on the law school entrance exam. But Garrett had another love, the movie industry. He left poker to produce a short film called Hours Before in 2010 with some of his winnings, and he was thrilled about his future in the business, but in March, just one day after his first day as a paid producer, he broke his neck in a swimming pool accident.
Waking up as a quadriplegic, Garrett knew he needed to refine his career, and he found himself returning to poker. Almost a year later he began playing poker again online, and he began to win just like before. By the end of 2011, Garrett even made his first appearance in-person playing at the Hustler casino, winning $18,000.
By 2013, the poker world began to notice Garrett when he finished seventh at the World Poker Tour L.A. Poker Classic Main Event, winning $161,300. And in March 2014, he finished six in the Bay 101 Shooting Star tournament and won a cool $174,080. He won another $230,487 later in 2014 when he finished 32nd place in the World Series of Poker main event. And at the $10,400 No-Limit Hold’em World Poker Tour in December 2014, he won a whopping $1,169,683
April and June of 2016 treated him very well. He had two second-place finishes. One was for $458,722 and the other was at the Bellagio Casino in Las Vegas. He was playing in the $1,500 No-Limit Hold’em Millionaire Maker 1st & 2nd $1 Million GTD, winning $1,000,000 in a very tight game. “It was a life-changing amount,” he says.
What’s next?
Since his big win nearly a year ago, he has kept busy in 2016 on the pro-poker circuit, and he started a new venture – a TV and movie production company he founded with two friends, Greater Good Productions. Currently they’re working on a documentary about Garret’s life, and following him around as he travels and plays.
In January of 2015, he finished 17th in the PokerStars Caribbean Adventure tournament at the Atlantis resort, winning $79,400. Most recently he played the World Poker Tour in Montreal, and donated a portion of his winnings to the Life Rolls On Foundation.
Garrett also loves sharing his life on social media (which we highly highly recommend following). From sharing videos of his travels to his adventures with his fabulous girlfriend, Youtube fitness star Jessica Arevalo, his entire life is a giant motivational pill you actually want to swallow.
And we hope to see Garrett win another million-dollar jackpot soon. You have it in you, Garrett-boy. We believe in you.
|
{
"pile_set_name": "Pile-CC"
}
|
/**
* Copyright 2013-2015, Facebook, Inc.
* All rights reserved.
*
* This source code is licensed under the BSD-style license found in the
* LICENSE file in the root directory of this source tree. An additional grant
* of patent rights can be found in the PATENTS file in the same directory.
*
* @providesModule invariant
*/
"use strict";
/**
* Use invariant() to assert state which your program assumes to be true.
*
* Provide sprintf-style format (only %s is supported) and arguments
* to provide information about what broke and what you were
* expecting.
*
* The invariant message will be stripped in production, but the invariant
* will remain to ensure logic does not differ in production.
*/
var invariant = function(condition, format, a, b, c, d, e, f) {
if (__DEV__) {
if (format === undefined) {
throw new Error('invariant requires an error message argument');
}
}
if (!condition) {
var error;
if (format === undefined) {
error = new Error(
'Minified exception occurred; use the non-minified dev environment ' +
'for the full error message and additional helpful warnings.'
);
} else {
var args = [a, b, c, d, e, f];
var argIndex = 0;
error = new Error(
'Invariant Violation: ' +
format.replace(/%s/g, function() { return args[argIndex++]; })
);
}
error.framesToPop = 1; // we don't care about invariant's own frame
throw error;
}
};
module.exports = invariant;
|
{
"pile_set_name": "Github"
}
|
Name: privateColors
Type: property
Syntax: set the privateColors to true
Summary:
Specifies whether LiveCode uses its own <color table> or the system
<color table> on <Unix|Unix systems>.
Introduced: 1.0
OS: linux
Platforms: desktop, server
Example:
set the privateColors to true
Value (bool):
The <privateColors> is true or false.
By default, the <privateColors> <property> is set to false.
Description:
Use the <privateColors> <property> to improve display on <Unix|Unix
systems> when the <bit depth> of the screen is 8 <bit|bits> (256 colors)
or less.
Set the <privateColors> <property> to true for a <stack> that uses
colors that aren't in the <default> <color table>. This has the
advantage of letting the <stack> display more colors than normally
possible on an 8- <bit> display. The disadvantage is that if the
<privateColors> is true, the colors of other applications' windows may
be distorted while LiveCode is the foreground application.
When the <privateColors> is set to false, the <engine> uses the system
<color table>. When it is set to true, the <engine> uses its own custom
<color table>.
This property has no effect unless the <screenType> <property> has a
value of "PseudoColor" --that is, each <pixel> on the screen is one of a
<color table> of colors (usually 256 colors), and the colors in that
<color table> can be changed by the <engine>.
>*Important:* Once the <privateColors> <property> is set to true, it
> cannot be set back to false. To change it back to true, you must quit
> and restart the <application>.
The setting of this property has no effect on Mac OS or Windows systems.
References: screenType (function), property (glossary),
bit depth (glossary), engine (glossary), pixel (glossary),
color table (glossary), bit (glossary), Unix (glossary),
application (glossary), default (keyword), stack (object),
remapColor (property)
|
{
"pile_set_name": "Github"
}
|
/210 - 7*q**6/90 - 2*q**5/5 + 37*q**3/6 + 4*q**2 + 10. Let s(a) be the first derivative of x(a). Solve s(r) = 0.
-4, -3, 0
Let r(l) be the second derivative of 2*l**6/45 + 2*l**5/9 - 65*l**4/27 + 160*l**3/27 - 56*l**2/9 + 2*l + 324. Let r(f) = 0. Calculate f.
-7, 2/3, 1, 2
Suppose 16*x = 629*x + 354*x - 2901. Factor 3/5*q**5 + 0 - 21/5*q**2 + 27/5*q**3 - x*q**4 + 6/5*q.
3*q*(q - 2)*(q - 1)**3/5
Let q(v) be the third derivative of v**6/50 + 43*v**5/150 + 23*v**4/30 - 19*v**3/3 + 2772*v**2. Suppose q(y) = 0. What is y?
-5, -19/6, 1
Let b(x) = x**2 + 1. Let m(d) = 9*d**2 - 3936*d + 1936519. Let j(u) = 14*b(u) - 2*m(u). Determine c so that j(c) = 0.
984
Let z(m) = 2*m**2 - 28*m + 82. Let t be z(4). Let i(b) be the first derivative of 10 + 0*b + 2/39*b**3 + 4/13*b**t. Factor i(o).
2*o*(o + 4)/13
Let n(o) be the third derivative of -18*o**4 + 8*o**2 - 56/3*o**3 + 0*o + 2/35*o**7 - 4/15*o**6 + 1 - 5*o**5. Let n(a) = 0. What is a?
-2, -1/3, 7
Let r(u) be the third derivative of -u**7/210 - 89*u**6/120 - 1739*u**5/60 + 11045*u**4/24 + 2*u**2 + 435*u. Determine k, given that r(k) = 0.
-47, 0, 5
Let n be (-12)/(-10)*400/15. Let j = n + -28. Factor -3*m**j + 24*m**3 - 30*m**3 - 6*m**4 - 3*m**5.
-3*m**3*(m + 1)*(m + 2)
Let h(s) = 19*s - 5. Let y be h(7). Suppose 8*k - 16*k + y = 0. Factor -4*z**2 + 14*z + 18*z - k - 13*z**2 + 5*z**2.
-4*(z - 2)*(3*z - 2)
Let q be 0 + (126/(-26) - 46/299). Let m(x) = -24*x**3 - 42*x**2 - 26*x - 2. Let p(g) = 23*g**3 + 42*g**2 + 27*g + 3. Let r(c) = q*m(c) - 6*p(c). Factor r(i).
-2*(i + 1)*(3*i + 2)**2
Find o, given that -1183 + 2889 - 902 + 732*o + 4*o**2 + 76*o = 0.
-201, -1
Suppose -75*f = 206*f + 137*f + 112*f. Find p, given that 2/13*p**3 - 18/13*p**2 + f + 16/13*p = 0.
0, 1, 8
Let i(c) = -2*c**3 + 4*c**2 + 2*c - 4. Let h = -2 + 10. Suppose -9*m - h = -7*m. Let q(w) = w**3 - 4*w**2 - w + 4. Let l(r) = m*i(r) - 6*q(r). Factor l(n).
2*(n - 1)*(n + 1)*(n + 4)
Let o = 2/1817 + 1813/3634. Let s(c) be the second derivative of 0 - 1/4*c**5 + 5/6*c**3 + 0*c**2 + o*c**6 + 4*c - 5/4*c**4. Factor s(x).
5*x*(x - 1)*(x + 1)*(3*x - 1)
Suppose r + y + 2 = 0, -19*r + 17*r + 3*y + 26 = 0. Let b(c) be the second derivative of 1/2*c**3 - 1/48*c**4 + 0 + r*c - 9/2*c**2. Factor b(s).
-(s - 6)**2/4
Let u(m) = 5*m + 104. Let n be u(-18). Find l, given that -9 + 50*l - 5*l**2 - 62 + 40 - n = 0.
1, 9
Let w(k) be the third derivative of -147*k**5/20 + 287*k**4 - 13448*k**3/3 + 8997*k**2. Factor w(s).
-(21*s - 164)**2
Let t(h) be the second derivative of 8/35*h**5 + 12/7*h**2 + 92/21*h**4 - 40*h - 95/21*h**3 + 1. Factor t(c).
2*(c + 12)*(4*c - 1)**2/7
Suppose -5*o = z - 2*z + 59, 4*o = -z + 14. Suppose 20*r - 34 = -z. Suppose 1/9*k**3 + 0*k - 2/9*k**2 + r = 0. Calculate k.
0, 2
Suppose 4*m + 20 = 2*a - a, 0 = 4*a - 3*m - 80. Let q be 3 + (-65)/25 - (-32)/a. Factor -16/3*j**q - 2*j + 0 - 4*j**3 + 2/3*j**5 + 0*j**4.
2*j*(j - 3)*(j + 1)**3/3
Let l be 201/315 - (-1077)/(-16155). Solve -74/7*y**3 + 24/7*y**4 + l*y**2 + 0 + 6/7*y = 0 for y.
-1/4, 0, 1/3, 3
Solve -17/3*i**2 + 22/3 - 185/3*i = 0.
-11, 2/17
Find c such that -c**2 - 36691*c - 450 + 73389*c - 36793*c = 0.
-90, -5
Find d such that 5*d**5 + 69*d - 8*d**4 + 19*d**2 + 5*d**3 - 2*d**5 - 29*d**3 + 11*d**2 + 30 - 4*d**4 = 0.
-1, 2, 5
Let i(f) be the second derivative of f**6/140 + 89*f**5/140 - 45*f**4/56 - 85*f**2 + 9*f - 5. Let a(z) be the first derivative of i(z). Factor a(s).
3*s*(s + 45)*(2*s - 1)/7
Let t = -178259/20 + 8913. Let w(k) be the first derivative of -3/8*k**4 + 11 - 3/2*k**2 + k + 13/12*k**3 + t*k**5. Factor w(h).
(h - 2)**2*(h - 1)**2/4
Let w(d) be the first derivative of 22*d**5/45 + 125*d**4/18 + 286*d**3/9 + 415*d**2/9 + 200*d/9 + 1611. Suppose w(s) = 0. Calculate s.
-5, -1, -4/11
Let u(c) = 19*c**2 - 1076*c + 1105. Let m(z) = 22*z**2 - 1074*z + 1108. Let g(s) = -6*m(s) + 7*u(s). Suppose g(j) = 0. What is j?
1, 1087
Let z(f) be the third derivative of f**7/105 - 9*f**6/20 + 11*f**5/5 + 38*f**4/3 - 64*f**3 - f**2 + 450*f. Find w, given that z(w) = 0.
-2, 1, 4, 24
Let p(k) be the second derivative of 1/100*k**5 + 7/6*k**3 - 11/5*k**2 + 128*k + 0 - 7/30*k**4. Solve p(o) = 0.
1, 2, 11
Let w(g) = -2*g**3 - g**2 - 27*g. Let c(j) = 3*j**3 + 369*j**2 + 108*j. Let k(b) = -c(b) - 4*w(b). Factor k(q).
5*q**2*(q - 73)
Let x(z) = 7*z**2 - 22*z + 18. Let j(p) = 61*p**2 - 176*p + 145. Let m(l) = 6*j(l) - 51*x(l). Find o such that m(o) = 0.
-8, 2/3
Factor 0*m + 0 - 29/4*m**3 - 15/2*m**4 - 1/4*m**5 + 0*m**2.
-m**3*(m + 1)*(m + 29)/4
Suppose -5*k + 20 = -10*k - q, 3*k = q - 20. Let m be (1 - 37/k) + 0. Let -m*h**2 + 27/5*h**4 + 72/5*h**3 - 48/5*h - 9/5 = 0. What is h?
-3, -1/3, 1
Let f(u) be the first derivative of -u**3/6 - 377*u**2 - 284258*u + 1317. Factor f(z).
-(z + 754)**2/2
Let j(f) be the second derivative of -7/39*f**3 - 29 - 8/13*f**2 + f + 1/78*f**4. Factor j(h).
2*(h - 8)*(h + 1)/13
Let p = 20863 - 834519/40. Let z(o) be the third derivative of -7/20*o**5 + 7/4*o**4 + 0*o + p*o**6 + 0 - 4*o**3 - 47*o**2. Determine k so that z(k) = 0.
1, 2, 4
Let b(n) be the second derivative of 56*n - 2*n**3 + 5/6*n**4 + 1/10*n**5 + 0*n**2 - 1. Factor b(f).
2*f*(f - 1)*(f + 6)
Let v(w) be the second derivative of 90*w + 1/30*w**6 - w**2 + 1/12*w**4 + 0 - 1/2*w**3 + 3/20*w**5. Factor v(h).
(h - 1)*(h + 1)**2*(h + 2)
Let p(d) = -3*d**2 - 15*d - 10. Let u be p(-4). Factor 82*z**u + 7*z**4 - 60 - 37*z + 72*z**2 + 5*z**2 + 34 - 103*z**3.
(z - 13)*(z - 1)**2*(7*z + 2)
Let z(v) be the first derivative of 25*v**6/2 - 782*v**5 + 51215*v**4/4 - 6500*v**3/3 - 1690*v**2 - 1154. Let z(d) = 0. Calculate d.
-1/5, 0, 1/3, 26
Let x(l) be the third derivative of l**5/75 + 28*l**4/5 - 33*l**2 + 10. Factor x(o).
4*o*(o + 168)/5
Factor 0 + 0*j + 2/3*j**4 - 98/3*j**3 + 196*j**2.
2*j**2*(j - 42)*(j - 7)/3
Let k(m) = 24*m**3 - 2*m**2 - 4*m + 1. Let y be k(-1). Let r be (y/63)/(6/(-54)). Determine u, given that -1/6*u**r + 2/3*u**2 - 1/2*u + 0 = 0.
0, 1, 3
Let t(o) be the third derivative of -1/840*o**8 + 1/150*o**6 - 20*o**2 + 1/75*o**7 - 7/75*o**5 - o + 0 - 1/60*o**4 + 7/15*o**3. Find b such that t(b) = 0.
-1, 1, 7
Let m = 5304 - 37122/7. Let r(f) be the second derivative of -6*f**4 + m*f**7 - 4*f**2 + 4/5*f**5 + 8/3*f**6 + 0 + 23*f - 26/3*f**3. Factor r(z).
4*(z - 1)*(z + 1)**3*(9*z + 2)
What is r in -1104*r**2 - 92/11*r**4 - 3168*r - 2/11*r**5 + 0 - 1586/11*r**3 = 0?
-12, -11, 0
Let h(q) = q**3 + 32*q**2 + 59*q - 27. Let o be h(-30). Let -4*s**4 + 100 - 132*s - 11546*s**3 - 164*s + 288*s**2 + 11458*s**o = 0. What is s?
-25, 1
Let -8/3*v + 0 - 50/3*v**2 + 11/3*v**4 - 31/3*v**3 = 0. What is v?
-1, -2/11, 0, 4
Let 0 - 472/15*x**3 + 746/15*x**2 - 26/15*x**4 - 84/5*x + 4/15*x**5 = 0. What is x?
-9, 0, 1/2, 1, 14
What is i in 56*i - 10*i + 16*i - 33*i + 3*i**2 + 22*i - 414 = 0?
-23, 6
Let o = -226670 - -2493372/11. Suppose 8/11*n + o*n**2 + 6/11 = 0. Calculate n.
-3, -1
Let i be (-5*(-7)/(-70))/(2/(-68)). Let n(j) = -11*j**3 + 11*j**2 - 29*j - 17. Let m(q) = -4*q**3 + 4*q**2 - 10*q - 6. Let c(o) = i*m(o) - 6*n(o). Factor c(s).
-2*s*(s - 2)*(s + 1)
Solve -4280*i - 1173*i**3 + 3300*i**3 + 2497*i**3 - 4290*i**2 - 344*i**3 + 5*i**4 + 4285 = 0.
-857, -1, 1
Let m(z) be the second derivative of 3*z**6/10 + 57*z**5/20 - 163*z**4/2 + 464*z**3 - 720*z**2 - 9*z - 76. What is k in m(k) = 0?
-15, 2/3, 4
Suppose -5*j + 5*o = 10*o + 710, 3*j = 2*o - 441. Let z = j - -148. Determine k, given that -18/5*k + 18/5*k**z - 8/5*k**4 + 4/5*k**2 + 4/5 = 0.
-1, 1/4, 1, 2
Solve -2/5*x**2 - 966/5*x + 0 = 0.
-483, 0
Solve 1/5*n**3 - 212/5*n - 10*n**2 - 216/5 = 0.
-2, 54
Let c(u) be the second derivative of 2*u + 0*u**2 - 5/12*u**4 - 5*u**3 + 12 + 1/6*u**6 + 3/2*u**5. Factor c(j).
5*j*(j - 1)*(j + 1)*(j + 6)
Let l(a) = 5*a**3 + 233*a**2 + 387*a - 615. Let m(j) = -70*j**3 - 3271*j**2 - 5414*j + 8610. Let z(g) = 29*l(g) + 2*m(g). Suppose z(s) = 0. Calculate s.
-41, -3, 1
Let o(j) be the second derivative of -j**4/42 + 19*j**3/21 + 780*j**2/7 + 33*j + 87. What is b in o(b) = 0?
-20, 39
Let t(q) be the first derivative of 13*q**6/21 - 472*q**5/35 - 1355*q**4/14 - 4252*q**3/21 - 836*q**2/7 + 368*q/7 + 719. Solve t(p) = 0 for p.
-2, -1, 2/13, 23
Let b be -14*(-1938)/9310 - (-1 + 30/42). Factor 9/5*t**4 + 48/5 - 112/5*t + b*t**2 + 12*t**3.
(t + 2)*(t + 6)*
|
{
"pile_set_name": "DM Mathematics"
}
|
The Controlled Direct Effect of Early-Life Socioeconomic Position on Periodontitis in a Birth Cohort.
This study used data from the 1982 Pelotas Birth Cohort Study, Brazil, to estimate the controlled direct effect of early-life socioeconomic position (SEP) on periodontitis at age 31 years, controlling for adulthood income and education, smoking, and dental hygiene. Sex was included as a covariate. Early-life SEP was measured at participant birth based on income, health services payment mode, maternal education, height, and skin color (lower versus middle/higher SEP). Periodontitis was assessed through clinical examination at age 31 years (healthy, mild periodontitis, or moderate-to-severe disease). Adulthood behaviors (smoking, dental hygiene) were the mediators, and adulthood SEP (education and income) represented the exposure-induced mediator-outcome confounders. A regression-based approach was used to assess the controlled direct effect of early-life SEP on periodontitis. Multinomial regression models were used to estimate risk ratios and their 95% confidence intervals. The prevalences of mild and moderate-to-severe periodontitis were 23.0% and 14.3%, respectively (n = 539). Individuals from the lowest early-life SEP had a higher risk of moderate-to-severe periodontitis controlled for mediators and exposure-induced mediator-outcome confounders: risk ratio = 1.85 (95% confidence interval: 1.06, 3.24), E value 3.1. We found that early-life SEP was associated with the development of periodontitis in adulthood that was not mediated by adulthood SEP and behaviors.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
ST. LOUIS (AP) — David Freese homered, doubled and drove in three runs, leading the St. Louis Cardinals to a 5-3 victory over the Chicago White Sox on Thursday night.
Adam Dunn tied Texas’ Josh Hamilton for the major-league home run lead with his 22nd, a three-run shot in the sixth that pulled the White Sox to 5-3.
Matt Adams had a two-run single for St. Louis, which had scored one run in three straight games coming in and no more than two in each of the last five.
Cardinals starter Jake Westbrook (5-6) retired the first 12 batters on 41 pitches before giving up a leadoff single in the fifth inning to Paul Konerko, who leads the American League with a .364 average. Westbrook threw only 67 pitches in six innings, allowing five hits and three runs.
The win snapped a slump for Westbrook, who had gone 0-4 with a 7.55 ERA in his previous six outings since winning May 8 at Arizona.
Westbrook also broke his skid against Chicago. He was 0-5 with a 5.87 ERA in his previous eight starts against the White Sox since beating them Aug. 7, 2007, when he was with Cleveland. He had not faced Chicago since 2010.
Jason Motte pitched the ninth for his 13th save.
White Sox starter Gavin Floyd (4-7) is 1-4 with a 10.38 ERA in his last six starts. Floyd, who is 0-5 in his last eight interleague starts, allowed five runs in 42⁄3 innings, hiking his ERA to 5.63.
Freese gave the Cardinals a 1-0 lead with a double in the second inning. He made it 3-0 with a two-out, two-run homer to center field in the third.
After striking out twice, Adams drove in two runs when he singled on a full-count pitch with the bases loaded. That gave St. Louis a 5-0 lead in the fifth inning.
In the sixth, with two on and two outs, Dunn slammed the first pitch from Westbrook over the center field fence. Dunn, who has 50 RBI, was back in the starting lineup after being scratched Wednesday because of a mild ankle sprain. Dunn has four home runs and 11 RBI in his last six games.
St. Louis shortstop Rafael Furcal snapped an 0-for-23 skid with a single in the eighth.
Notes: St. Louis RF Carlos Beltran did not play because of a stomach virus. ... Chicago fell to 21-6 in its last 27 interleague road games. ... the White Sox lost their first interleague road series after winning their last 11 away from home. Michael Wacha, the St. Louis Cardinals’ top pick in the draft, visited Busch Stadium after he signed his contract earlier Thursday.
The right-pitcher from Texas A&M was the No. 19 overall pick in the draft. Wacha was taken with the pick the Cardinals earned as compensation from the Angels for the free-agent departure of Albert Pujols over the winter.
The 6-foot-6, 200-pound Wacha flew Wednesday to St. Louis. He took his physical and passed the medical exams before he signed his contract. Terms of the deal were not disclosed.
|
{
"pile_set_name": "Pile-CC"
}
|
Rick Perry gang rides into the sunset
Texas Gov. Rick Perry finds himself at a fork in the road as he ponders his electoral future — and he may have to find his way without the full gang of political knife fighters who have had his back for over a decade.
Perry, the longest-serving governor in Texas history, has been renowned for the loyalty and ruthlessness of his inner circle — a team regarded as one of the nation’s most feared campaign operations. Steering the governor through a four-way reelection fight in 2006 and then a savage 2010 GOP primary campaign, the Perry gang became known as perhaps the most ferocious state-level political team in America.
Text Size
-
+
reset
Perry at CPAC 2013
TOP 5 races to watch in 2013
Now, in the aftermath of Perry’s calamitous and dissension-riddled 2012 presidential bid, much of that gang has dispersed. As the governor weighs whether to run for an unprecedented fourth full term, Texas politicos say it’s largely unclear who would steer another reelection campaign — or a second Perry attempt at the White House.
Perry’s longtime political maestro, Dave Carney, exited after the presidential campaign and is not expected to return. In fact, Carney has met with aides to Texas Attorney General Greg Abbott — a possible Perry successor or primary challenger — about the 2014 cycle. The governor remains in contact with a handful of other veteran advisers, such as former chiefs of staff Deirdre Delisi and Ray Sullivan, but they are no longer on his payroll.
Part of the winding-down of Perry’s campaign apparatus is a function of where he is in the Texas political cycle: The first order of business for the governor is the current session of the state Legislature, which meets only once every two years. He feels little pressure, aides say, to focus on electoral politics right now.
But interviews with more than a dozen past and present Perry advisers revealed that the wounds of the 2012 cycle have not fully healed in Perry world. Some relationships ruptured when Perry brought in national consultants to layer over his Texas-based personnel. Other aides simply reacted to the crushing defeat — an effort criticized as historically inept — by turning over a new leaf professionally. Just as Perry’s profile as a crusading conservative governor has shrunk, so has the circle of political strategists around him.
As Perry mulls his political future — and the prospect of extending the Perry era in Texas to 18 years — Republicans say the governor is keeping his thought bubble almost entirely to himself.
“I don’t know who or what, or what the team is, that’s driving the train now,” said Carney, who called it a natural “maturing process” for Perry’s close aides to move on to other work eventually. “Perry was able to attract really great people — really smart, hardworking, creative folks, myself aside. And they’ve gone on to have really successful careers. I mean, there’s nobody in the Perry team that’s out panhandling.”
|
{
"pile_set_name": "Pile-CC"
}
|
Monday, August 27, 2007
Mónica de la Torre’s new book, Talk Shows, uses the navigatory apparatuses of synonym, antonym, palindrome, anagram, and translation, among others, to steer her poems directly in upon themselves. Shaped from multiples of sound and meaning, Talk Shows is a text that uses concentrated variation to complicate the sense of the “original.” Whether working from a source text or (re)generating her own work, de la Torre reckons directly with the idea and possibility of “source.” The poems in this collection are narrative impressions of each other that create a textured vertical field, one that all depends upon us looking downwards, into a stratified storying. An exuberant text that takes on the complications of communication, Talk Shows deliberately confuses a sense of source by fully undoing the ease of transmitting idea.
De la Torre uses coverings to layer lines against each other. In “Skin is Warm: 31 Nudes,” juxtaposed phrases act as coverings for each other:
Asleep I am all. (She stretches.) I wake. (A question.) To see the world from a bed. If I could cover my face with one finger. Or be. (Flower in hair.)
I am many. (Seen from behind.) Black is white. (Placid turning.) I will lie. We are not different. (Face with a stain.)
The parenthetical lines overlay the text they follow in what seems to be an attempt to discover the counterparts of meaning. In this poem, as in the majority of the text, single tactics do not suffice; synonym is placed on antonym, which is in turn woven into translation. All of these can attempt approximation at meaning, but the effort seems targeted towards a layering of counterpart.
In “On Translation,” denotation is covered, replaced by gesture: “Not to search for meaning, but to reenact a gesture, and intent. / As a translator, one grows attached to originals. Seldom are choices so / purposeful.” While the original here is valued above the translation, de la Torre recognizes the inability to recreate or possibly ever reach the original. In Talk Shows, de la Torre performs the translator’s task, even when she isn’t reproducing a text from one language to another. In “Bankrupt Books: A Collage,” de la Torre lists antonyms of bestsellers, where A Heartbreaking Work of Staggering Genius is transformed into “ridiculous accounts of staggering idiocy” and Tuesdays with Morrie is turned to “Sundays on a couch.” Some words allow for this translation; others, like “Beowulf” remain in their original form, seemingly untranslatable, and so, untranslated.
De la Torre tells story by returning to story, in a sense navigating further into the narrative with every (re)telling:
María was usually bumping intofurniture. Each time she got closer to whatshe wanted. “What do you want from me?”“Nothing,” he replied, so she took offand felt like migrating birds. But many.
“Bumping/into furniture” would seem to halt movement instead of bringing the character “closer to what/she wanted,” but here, it is in the act of moving, of telling, that precision is gained. Additionally, María is many birds--a flock that cannot be divested of its counterparts. It is to this collectivity that de la Torre seems to be speaking. In “The Script,” she traces the constellation possible in gathering in on a story, in reckoning with the inherent multiples of meaning:
To permutate dots so that lines are never identical to each other.
To return to known places and act always the same, thus the slightestchange might become apparent.
To force things to happen.
To pretend there’s meaning when all that comes out is “My dog lovesme and he’s no showboat.”
Here, the desire to return waxes against the possibility of returning ever to the same place; we can pretend at meaning, but it will always be pretend. In returning to apparently similar events or places, we can play at getting closer, we can “trace the line that / connects the dots,” but “dots speak louder.” Any attempt at distinguishing the whole becomes a seemingly fruitless task; in fact, this task of confronting the meaningless, or lack of meaning, often takes on the tone of the absurd.
Absurdity isn’t something de la Torre shies from. “The Other Practitioner Writes Back” begins with a series of palindromes, none of which come close to the dialogic ideal:
The attempt in this poem seems to be the thrust towards meaning with the understanding that meaning will never arrive, that despite doubles and rearranging, only absurdity can arise from the attempt to make sense. And de la Torre revels in this play with the ridiculous and incongruous, accepting it with ready vigor.
Within the interaction of these counterparts, however, the text seems held together only by adaptation, or difference. At times, the text feels dissociated from itself, pulled apart, as though dependent only on alterity. This results in an unsettled discontinuity, where the poems individually speak forcefully, but drawn into a collection, seem unhinged from each other. Although Talk Shows is a jubilant text, its moments of quiet are few; this is not a manuscript in which one can find rest, and the unvarying reveling tends to wear the text out. The poems end up feeling as varied as the ways in which de la Torre approaches meaning, in which a mirror is held up to language, but in it, we see only the reverse image. The title poem, “Talk Shows,” intersects multiple unattributed voices, presumably the chatter of talk shows:
-Get away from me! Who do you think you are, hitting my arm likethat! What kind of person are you? A terrorist?
-Don’t look at me as if I was a woman with a rotten tooth, look at meas if I was me.
-¡Viva Mèxico cabrones!
-I can’t think of anything I’d like less to do than to go to Disney with my dad.
Although each of these phrases, like each of the poems, hold individual intrigue, when collaged, they don’t so much reflect on each other, but instead point to the disparate genre that holds them together, and often, disparateness alone cannot sustain a text. The inertia created by the narrative and visual pull of the text slows when the poems become so disparate that there is little to hold them together but their continuity of difference. De la Torre has set a difficult task for herself in attempting to create an exuberant text that directly tackles problems of linguistic apprehension, and while Talk Shows is an intrepid attempt at achieving this complicated undertaking, its persistent difference eventually destabilizes itself.
Monday, August 20, 2007
Fruit the color of the sky, apples blue. A hat, an aspect, flight. Eyes represented by small birds at a fountain (if I am a day). As when you dream you're awake and I say what did you say and you wake and say what did I say. The watch changes itself as though nothing has changed. Handprint on the mirror three nights old and between me and the mirror you touching the mirror. "Section reserved for silent prayer." As it happens (the only spot from which one can see the contemporary metropolis). Sebastian swoons through arrows.
I’d anticipated winter here but winter here recalled itself and longed for five long years. To advance then now from loss and quiet and reverence of cost? I do not wonder at the elegance of lack. There is no expenditure of anger, the motion of ferocity and fear, when it is free in the slaughter shed. When it is shredded in the beaming where the cooing wings nest.
Notes of dusted light make pilgrimages from choired rafters through the dimness, the ploughing shears, the cardboard barrels of feed and mice that are and are not inside themselves. And I am knotted in the beams and a bloom is on the floor. Christliness
perpetual empties to the earthy floor--not formed of dirt or clay or hardened irrigants of ditch and field but something finer, deep and silky--perpetual. Light hazes pallid on errancy, descends beneath the swaying creak of wrought pulleys, wheelbarrows, rat burrows. And light
cracks in from where branches slog in March, where winter melts to gift in slanted afternoon, to here where air is choir and choirs disparate--a dirge, a hymn, a requiem, natival, excommunicatio--pigeons knotted in the blush.
Monday, August 06, 2007
I slap the knee of the girl I love, openThe door and greet the next donor.Yes, my little antigen, progressRises from the bath. You crush your fiddlerCrab, I’ll crush mine. Opal beadsAbout your neck line evenly, cough offYesterday’s dress. Nostalgia, a sudden nudeTurns the cells lachrymose. If you want to cryAbout it you can use this tissueFor protection. Just call the girl fromConcord and tell her that tonightThoreau is completely out of the question!Don’t smile, moss courses through Your teeth. God never finishes lurking.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How to run android app in emulator by rewriting old databases?
When I always run app to test in emulator from Eclipse , by default it never uninstalls previous one. It will maintain previous copy of database and files of the same app and run a new compiled code.
What if I want to remove all app related files, databases every time I compile and run it to test? Any settings for this in Eclipse ? I want to avoid the step of manually uninstalling it before every run. Thanks.
A:
You can have a command prompt window open, and before launching, execute:
adb uninstall your.project.package
when using adb install with the -r modifier, the app re-installs and its data is saved. I haven't found any place in Eclipse to change this configuration, but I think this is done inside the SDK's Ant tasks. Take a look at this class for more information
|
{
"pile_set_name": "StackExchange"
}
|
/**
* Mobile Photo Compress Solution
*
* Fixes iOS6 Safari's image file rendering issue for large size image (over mega-pixel),
* which causes unexpected subsampling when drawing it in canvas.
* By using this library, you can safely render the image with proper stretching.
*
* compress image in mobile browser which is file-api and canvas supported.
* be compatible with these certain situation
* 1. some android phones that do not support jpeg format output form canvas
* 2. fix ios image render in canvas
*
* Copyright (c) 2013 QZone Touch Team <tedzhou@tencent.com>
* Released under the MIT license
*/
define(function (require) {
var $ = require("zepto");
var JpegMeta = require("jpegMeta");
var JPEGEncoder = require("jpegEncoder");
var MegaPixImage = require("megapiximage");
function getImageMeta(file, callback) {
var r = new FileReader;
var err = null;
var meta = null;
r.onload = function (event) {
if (file.type === "image/jpeg") {
try {
meta = new JpegMeta.JpegFile(event.target.result, file.name)
} catch (ex) {
err = ex
}
}
callback(err, meta)
};
r.onerror = function (event) {
callback(event.target.error, meta)
};
r.readAsBinaryString(file)
}
function compress(file, picParam, callback) {
var mpImg = new MegaPixImage(file);
// defautl config
var param = $.extend({
type: "image/jpeg",
maxHeight: 800,
maxWidth: 600,
quality: .8
}, picParam);
getImageMeta(file, function (err, meta) {
// if file is a jpeg image,
// using exif messagees
// to transform the iamge at right orientation
if (meta && meta.tiff && meta.tiff.Orientation) {
param = $.extend({orientation: meta.tiff.Orientation.value}, param);
}
var canvas = document.createElement('canvas');
mpImg.onrender = function () {
var base64Str = "";
if ($.os.android && param.type == "image/jpeg") {
// using jpegEncoder to fix android machine does not support jpeg
var ctx = canvas.getContext('2d');
var imgData = ctx.getImageData(0, 0, canvas.width, canvas.height);
var encoder = new JPEGEncoder(param.quality * 100);
base64Str = encoder.encode(imgData);
encoder = null
} else {
base64Str = canvas.toDataURL(picParam.type, picParam.quality);
}
callback(base64Str);
};
mpImg.render(canvas, param);
});
}
return {compress: compress};
});
|
{
"pile_set_name": "Github"
}
|
//
// ZMViewController.h
// ZMBCY
//
// Created by Brance on 2017/11/24.
// Copyright © 2017年 Brance. All rights reserved.
//
#import <UIKit/UIKit.h>
#import "ZMNavView.h"
@interface ZMViewController : UIViewController
@property (nonatomic, strong) ZMNavView *navView;
- (void)setupNavView;
@end
|
{
"pile_set_name": "Github"
}
|
Software
Links
User
Search
Search:
Astronomical Medicine Project Home
News
Make sure to check-out our What's New page for the latest updates and information!
About Astronomical Medicine
The goal of the "Astronomical Medicine" (AM) project is to extend the state of the art of complex data understanding in two very different fields, astronomy and medical imaging, using a broad-based approach to data exploration and analysis.
At present we have a particular focus on 3D visualization in astronomy. Please refer to our dedicated pages to learn why this is crucial for the exploitation of complex data which is rich in structure.
The best of two disciplines
While astronomy and medical imaging seem very different, both fields search through large amounts of image data looking for meaningful patterns. For example, a physician may inspect a patient's MRI scans looking for signs of disease, while an astronomer will analyze radio telescope image data to find evidence of a new star being born. The two sciences have separately developed many techniques to analyze, visualize, and catalog complex multi-dimensional imaging data, but seldom have experts from the two areas worked together.
The AM project brings together researchers from the Harvard Medical School and the Harvard-Smithsonian Center for Astrophysics, along with both national and international collaborators, to combine their knowledge and advance the state-of-the-art in both medical imaging and astronomy.
The project was started at Harvard's Initiative in Innovative Computing as part of the IIC's effort to drive new science at Harvard through cross-discipline collaboration and computation.
Our approach
By combining the expertise of medical imaging and astronomy through shared software and professional collaboration, the AM project is developing tools and techniques that address common research goals in the imaging sciences:
adapting and developing software to allow researchers to visually explore their data,
creating new data segmentation techniques based on medical imaging and astronomy research,
linking landmarks and data features to established catalogs of scientific knowledge.
This broad approach to science is designed to benefit fields beyond the astronomy and medical domains and to incorporate good ideas from many other disciplines.
Current work
Our current work is focused on the development of 3D Slicer for astronomy data, the development of new innovative astronomy visualization tools, and interdisciplinary scientific research. To see a sample of our research and software development projects, go to our research and software overview pages.
Our software
Collaboratively-developed, freely-available, open source software is a tool for the AstroMed project to advance its research goals and help scientists everywhere make new discoveries.
Our current software engineering effort is focused on adapting 3D Slicer for astronomy visualization. While this work is still in its early stages, we are releasing tools that allow qualitative analysis of medical data in ways that are generally not supported with existing astronomy software. This software should be considered "beta" quality, but we use it ourselves to understand the structure of complex astronomy data.
We will make sources for our tools available in the near future to encourage participation by the larger research community. Please contact us for more information and to be notified of ongoing developments.
Working together
Although we are a small team, we are actively interested in working with other researchers to make new science in astronomy and data visualization possible. Please contact us if you have any questions about our ongoing work, or with ideas about how you might like to participate.
|
{
"pile_set_name": "Pile-CC"
}
|
Meek Mill x Tory Lanez – Lord Knows (Video)
It would appear that Meek Season has arrived! Dreamchaser captain Meek Mill recently broke the internet releasing the artwork for his upcoming project ‘DC4’ and today he has released the video for my favorite record of of his sophomore album ‘Dreams Worth More Than Money’.
Meek Mill has dropped off this new video for his record “Lord Knows” featuring Tory Lanez. Meek’s “Lord Knows” record will also be featured on the soundtrack for the upcoming film “Creed” which hits theaters on Thanksgiving.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Change password profile
I'm running CiviCRM under Wordpress.
I want to create a donor area, where they can change their information.
But I can't find way to let them change their password.
Why is not possible to add a "password" field in profiles?
A:
CiviCRM does not maintain logins or credentials. It instead opts to let the CMS (WordPress in your case) to manage it all. CiviCRM can maintain the link between a user account on the CMS with a contact in CiviCRM though.
As Andrew West points out, you need to manage the password via WordPress.
A:
You can't put this into a profile afaik. I use Profile Builder to create a separate front-end WP page. Theme My Login works ok too.
|
{
"pile_set_name": "StackExchange"
}
|
Each title in the new Vintage Classics Japanese Classics Series sets a different tone with distinctive characters and an array of brilliant plot twists.
Japanese Classics Series, by Various authors.
VINTAGE CLASSICS, Fiction.
“Out” by Natsuo Kirino is a gruesome story so well-written you’ll be completely captivated. Four dissatisfied women find themselves looking for a way out of their backbreaking factory work and unhappy relationships at home. When one murders her husband, the other three are persuaded to help her get away with it, leading to more violence and criminality. Kirino focuses on the way people deal with shame, anger and fear in such desperate situations.
Yoko Ogawa’s “The Housekeeper and the Professor” tells the story of a kindhearted woman employed to look after a former university professor who suffers from amnesia following a car accident. He’s obsessed with mathematics and prime numbers, and every morning quizzes the housekeeper with questions relating to her shoe size or zip code, thinking he’s meeting her for the first time. When the housekeeper brings her son to work, the professor immediately warms to him. As time passes by, his teachings open up a whole new world to the boy and his mother. It’s spellbinding and heartwarming; a discovery of the noble beauty of mathematics.
“The Wind-Up Bird Chronicle” is one of Haruki Murakami’s most famous novels. This wind-up bird has a cry only certain people can hear. Its sorrowful sound plunges protagonist Toru Okada into chaos every time he hears it. The themes and symbolism here are typical of Murakami: time is fluid, relationships are analyzed, the obligatory cat and crows appear, Western food is prepared and classical music is preferred. Fate rules and the individual counts for nothing.
“The Makioka Sisters” by Junichiro Tanizaki centers on an overly proud Osaka family trying but failing to find the perfect husband for their third sister, Yukiko. The development of the sisters’ personalities, the parallels with Murasaki Shikibu’s “The Tale of Genji,” the contrast between Tokyoites and Osakans, and Tanizaki’s interpretation of a declining middle class family in the 1930s make this book one of the greatest novels in Japanese literature.
Last but not least is Yukio Mishima’s exquisitely written “The Sailor Who Fell from Grace With the Sea.” The love that sailor Ryuji feels for the beautiful Fusako is endearing and beyond reproach. However, all sweetness turns sour as it emerges that Fusako’s son is affiliated with a gang led by a chief who thinks in terms of absolute cruelty and dispassion. The comparisons between life and death, order and chaos, love and hate, as well as the freedom of the sea and ties to the land, all make this a wonderful addition to a magnificent series.
Another highlight is the books’ stunning covers, designed by Vintage Creative Director Suzanne Dean and illustrator Yuko Shimizu. Individually and as a collection, they evoke a sense of Japanese subtlety infused with modernity.
“I have a great love of Japanese culture and aesthetics, so I leaped at the chance to create a look for this series,” says Dean. “I decided to commission Yuko as I’d always admired her sense of color, dramatic composition and wit. Plus, she can draw beautifully.”
As momentum grows and excitement builds for the 2020 Olympics, interest in Japan grows across the board. This series provides the perfect introduction to the country’s multilayered culture as well as insight into Japanese society on a level usually reserved only for the Japanese.
|
{
"pile_set_name": "OpenWebText2"
}
|
EA Sports Hockey League
The World of Chel invites you to join the EA Sports Hockey League, a place where you can create and customize your own virtual pro, your way, then grab a few friends (or make some new ones) and compete together against some of the best clubs from around the world. Select the player class & traits that best suits you, and your clubs play style to work together & strive for victory in 3 vs 3, or 6 vs 6 online season matches and monthly playoffs. This is where players come to play, and superstars are born!
|
{
"pile_set_name": "OpenWebText2"
}
|
Sponsored Links
What We Like About The Chrysler Portal Concept
Sponsored Links
Earlier this year Fiat Chrysler pulled the wraps off of its new Chrysler Portal concept – a self-driving, fully-electric people mover designed and built with millennial car shoppers in mind. In our opinion, the Portal would have been more groundbreaking and effective if it were released two or three years ago, but that’s not to say there aren’t a few aspects of the concept that we like.
Flexible Seating And Cargo Configurations
One of the better ideas employed in the Portal is the flexible seating and cargo configurations. The seats in the vehicle are mounted on metal tracks that allows them to be easily moved toward the front or rear of the vehicle or removed from it entirely.
This implementation of modular seating is critical to the Portal’s millennial appeal, Chrysler says. A millennial buyer might purchase their Portal with only four seats to begin with, later deciding to add additional seats as their family grows. This saves consumers money upfront and allows them to only upgrade their car when they deem fit.
Fully Electric Powertrain
We we’re happy to see a fully electric powertrain in the Portal, as FCA has famously taken a stubborn stance against bringing hybrid and electric vehicles to market. The Portal’s powertrain consists of a single electric motor providing drive to the front wheels, with the juice arriving via 100 kWh battery lithium ion battery pack housed within the floor on the vehicle.
FCA says the Portal has a total range of 250 miles on a full charge. The integrated charging port, located at the front of the vehicle, is capable of bringing the battery pack from empty to 150 miles of range in just 20 minutes when paired with a 359 kW DC fast charging station. Chrysler’s wing badge at the front serves as an indicator light to inform the driver as to the vehicle’s charge status.
Autonomous Operation
Most impressive part of the Portal is its ability to drive itself. LIDAR, radar, sonar and cameras work together to enable SAE Level Three semi-autonomous operation – meaning the vehicle can pilot itself in certain highway driving scenarios. FCA plans on upgrading the Portal’s self-driving hardware and software as the technology advances and we assume it eventually hopes to bring it to Level Five autonomy.
|
{
"pile_set_name": "Pile-CC"
}
|
(b) -1/9 (c) -1/3 (d) f
a
Let o = -186 + 181. Which is the third biggest value? (a) 17 (b) o (c) 0.29
b
Suppose -80*s = -75*s + 70. Let d be (-2)/5*(9 + s). Let i = 2 + -5. What is the second biggest value in i, 4, d, 0.3?
d
Let w = -408.1 - -411. Let o = 95.9 + -88. Let u = w - o. Which is the third biggest value? (a) -0.3 (b) u (c) 0
b
Let h = -204645 - -204644.8. Let z(k) = -4*k**3 - 1. Let m be z(1). What is the second smallest value in m, h, -53?
m
Let d = -0.35 + 2.35. Let b = -1054 - -13704/13. What is the biggest value in 1/4, 5, d, b?
5
Let j = -2.6 + 4. Let z be 1701/252*8/9. Which is the fourth biggest value? (a) 1 (b) 5 (c) z (d) j
a
Let g(l) = 4*l - 19. Let v be g(28). Suppose -v*z - 376 = -101*z. What is the fourth biggest value in -5, 3, z, 4?
-5
Let r = 1/148 - 449/740. Suppose -2*y = -3*b - 8, -47*y + 4*b + 13 = -42*y. What is the biggest value in y, r, 4, -0.1?
4
Let h = 0 - -3. Let x = -6749 + 6751. What is the second smallest value in h, x, -1, 2/35?
2/35
Let d be -2*(45/10 - 2). Let n be ((-1)/(-3 + 4))/((-10)/4). Let x = -19 - -18.5. What is the second smallest value in n, x, 4/7, d?
x
Let t = 916 + -418. Let y = -496 + t. What is the fourth smallest value in 3, -3, -0.1, y?
3
Let w be 1719/(-345) + (-452)/25990. Let k be (-1 - -1) + 6/7. Let p = 3 - -1. Which is the smallest value? (a) k (b) p (c) 2 (d) w
d
Let m be 19*(-8 + -5 + 10). Let t = -53 - m. Let v = 24 - 11. Which is the smallest value? (a) v (b) 0.1 (c) t
b
Let m be 1005/(-10)*(9 + 0 - 15). What is the third smallest value in -2, m, -3?
m
Let a = 11 - 6. Let x = 0.3 + 0.1. Let q = -343 - -343. What is the second smallest value in q, x, a?
x
Let t = -20 - -104. Let c be (-2*3)/((-9)/9). Let r be (0 - (-8)/t)/(c/9). What is the third smallest value in r, -2/11, 3/5, -0.1?
r
Let j = 38249/15 - 2550. Which is the third smallest value? (a) 0.5 (b) -3 (c) -12 (d) j
d
Let g = 122 + -122.118. Let o = -0.178 - g. Let p = 2202/11 - 200. What is the third biggest value in o, p, 5?
o
Let q be (-86)/(-8) + 28 + -39. Let h = -0.1 - -0.5. Let o(i) = -2*i - 25. Let u be o(-15). Which is the second biggest value? (a) h (b) u (c) q
a
Suppose 5*y - 6*y + 5 = 0. Let l = -2/39 + 121/78. Let n = -4807.2 - -4807. Which is the third biggest value? (a) -4 (b) l (c) n (d) y
c
Let r = -0.159 + 61.159. Let h = -56 + r. Let t be (-6)/8*(-4)/8. Which is the biggest value? (a) h (b) -1 (c) t
a
Let q = -0.06 - -0.13. Let f = 0.029 + -3.129. Let z = f - -3.1. What is the third biggest value in 1/2, z, -0.3, q?
z
Let f = 4253 - 4134. Which is the second biggest value? (a) 0.1 (b) -4 (c) f
a
Let q = 0.04419 + 0.15581. Which is the smallest value? (a) -10 (b) 1 (c) q (d) 3 (e) 1/10
a
Let o be ((-5)/(-45))/(123/(-369)). Which is the third smallest value? (a) 16 (b) o (c) 583
c
Let f = 15.7 - 2.7. Let v = -10 + f. Suppose 153*k = 145*k - 16. Which is the biggest value? (a) k (b) v (c) 2/3
b
Let c = -890 + 890.14. What is the second biggest value in 16, -2/7, c, -2/9?
c
Let o = 6191 + -6182. Which is the fifth biggest value? (a) -3/4 (b) o (c) 0.5 (d) -5 (e) -0.23
d
Let u = -356.6 - -432.6. What is the second smallest value in -4, -1, u?
-1
Let q = -37 - -54. Let i = -148.6 - -148.1. What is the second smallest value in i, -0.3, q?
-0.3
Let a = -51.702 + 121.585. Let d = a - -0.117. What is the second smallest value in -3, d, 0?
0
Let a = -50 + 50.4. Let d = -0.1 + a. Let k = -20.5 - -20. What is the second smallest value in d, -2/5, -4, k?
k
Let n = -1.37645 + 1.45645. Let o = -563/420 + 1/140. What is the second biggest value in 1/2, o, n?
n
Let h = 1.1 - 0.3. Let z = 1 - h. Let t = -39493 + 39492.9. Which is the third biggest value? (a) z (b) t (c) -4 (d) -1
d
Let h = -2 - 3. Let y = 42840/13 - 85719/26. What is the third biggest value in 0.1, y, h, 1/31?
y
Suppose 4*v - 2*q - 24 = 8, -3*v - 3 = 3*q. Which is the third biggest value? (a) -10 (b) -3/5 (c) v (d) -5 (e) 0
b
Let v = -1 - -1.47. Let y = -0.459502 - -0.059502. What is the biggest value in v, y, 0?
v
Let a = -13/8 - -3/2. Let n = 14.89 + -0.89. Let i = -22 + n. What is the third biggest value in -1, i, a?
i
Let t = 5.24 - -59.56. Let n = t + -65. Let u = -0.045 - -1.045. Which is the second biggest value? (a) u (b) n (c) 3
a
Let w be (2 + 306/(-248))*2. Let m = w - 1/31. Let o = 12.842 + -13.142. Which is the second smallest value? (a) o (b) m (c) 5
b
Let f = 84 - 76.7. Let b = -0.15 - 0.15. Let n = b + f. What is the smallest value in 5, n, 5/3, -1/5?
-1/5
Suppose -37 = -7*q - 611. Let o = -250 - q. Let m be 54/o - (-2 + (-30)/(-21)). What is the biggest value in m, -1/10, 4/3, 5?
5
Suppose 2 = -2*z + z. Let l(y) = -2*y**2 + 280*y - 9413. Let x be l(56). Let b = 1 - 0. What is the third smallest value in z, 5, b, x?
b
Let f = 0.59 + -0.79. Which is the second biggest value? (a) -16 (b) f (c) 1.2 (d) 2/5 (e) 0.01
d
Let i = -86262.43 + 86262. Let l = 0.2 + -0.2. Which is the third smallest value? (a) l (b) i (c) 3/5
c
Let i be 1418*(1 + 6/8)/((-252)/(-72)). What is the fourth smallest value in 2/5, -2/7, i, 2/7?
i
Let s be (-12)/27*(-36)/(-40). What is the third smallest value in s, 0.02, -1/4?
0.02
Let f = -31 + 26. Let r = 1.234 - 1.734. Which is the second smallest value? (a) -0.08 (b) r (c) 4 (d) f
b
Let j = 44.1 - 45.1. Let z(c) = c**2 - 12*c + 13. Let k be z(15). Let l be k/(-15) - (-1 + -3). What is the third smallest value in 3/5, 0, l, j?
l
Let m = 0.166 + 1.334. Let w = -2.5 + m. Which is the fourth smallest value? (a) w (b) -4 (c) 7 (d) -0.4
c
Let b be ((-7)/(98931/(-14)))/(-1). Let u = b + 1348/2019. Let i(x) = -4*x + 1. Let a be i(3). What is the second biggest value in u, 0.2, a, 0?
0.2
Let c = 0.3066 + -0.4366. What is the second smallest value in -0.3, 0.3, c, 0.5?
c
Let j = -2 - 2. Let z(y) = -28*y - 22. Let p be z(3). Let c = -637/6 - p. What is the second smallest value in c, 7, j?
c
Suppose -m - 4*c - 9 = 0, -46*c + 9 = -3*m - 49*c. Let l = -0.13 - -0.13. Let w = l + -0.2. What is the third biggest value in -4, w, m?
-4
Let j be ((-186)/(-24) - 4)/((135/12)/(-15)). Which is the third biggest value? (a) 19 (b) 2 (c) 9 (d) j (e) 0.03
b
Let h = 1355 + -1259. Which is the second biggest value? (a) h (b) 2/7 (c) 3/2
c
Let q = 165 - 156. Let m = q - 6. What is the second biggest value in m, -2/3, 1/7?
1/7
Let w be ((-34)/68)/(21/(-188)). Let y = -36/7 + w. What is the third biggest value in 13, y, -0.1?
y
Let f = 817 + -532. Let o = f + -295. What is the third biggest value in o, -11, -4?
-11
Suppose -5*h = 29*h - 510. Suppose 0 = d + 2*g + 3, -5*g = 5*d + h - 0. Which is the third biggest value? (a) -1 (b) 4 (c) d
c
Let k be (-3)/((-144)/717)*4. Let o = -59 + k. Which is the smallest value? (a) 5 (b) o (c) 1/7 (d) -1/7
d
Suppose 18*q = 15*q + 57. Suppose q + 62 = -3*u. Let w be (-18)/u*(-6)/(-20). Which is the third biggest value? (a) -0.5 (b) 0 (c) w
a
Let m(z) = z**2 + 67*z + 737. Let i be m(-53). Let t = 6.5 - 20. Let k = t + 14. Which is the third smallest value? (a) k (b) i (c) 6.5
c
Let k = 0.5 - 4.5. Let i = 924/103 + -4929/515. Let j = 1.5 - 2. Which is the third smallest value? (a) k (b) j (c) i
b
Let n = -2077.37 - -2086. Let g = 50.63 - 51. Let j = n - g. What is the third smallest value in -0.1, -1, j?
j
Let p = 1661 - 1666. Which is the smallest value? (a) -2 (b) 3 (c) p (d) -2/5 (e) 9.9
c
Let h(f) be the second derivative of f**3/2 - 31*f**2/2 + 14*f. Let c be h(10). Let s = 6.033 + -0.033. What is the second smallest value in c, 0.4, -4, s?
c
Suppose 0 = -3*y - 2*p + 4, -2*y + 263*p - 260*p + 20 = 0. Which is the second biggest value? (a) -5 (b) 1 (c) -3 (d) 14 (e) y
e
Let a(h) = 4*h + 170. Let b be a(-42). Let k be (-36)/(-120)*(0 - -2). What is the biggest value in b, k, 3/53?
b
Let s = -38 + -8. Let p = 17571 - 17524.91. Let d = p + s. What is the second smallest value in 1, 2, d?
1
Let g = -1965 + 1976.93. Let f = 12 - g. Let u be (-56)/(-84) - 32/66. Which is the third smallest value? (a) u (b) -0.4 (c) f
a
Let m = -1345.1 + 1221. Let x = 124 + m. Let r(o) = -o + 1. Let q be r(-1). What is the third smallest value in q, -1/2, x, 1/9?
1/9
Let z = -2.1285 + 0.1285. Which is the b
|
{
"pile_set_name": "DM Mathematics"
}
|
John Peel Sessions (The Moondogs album)
John Peel Sessions is an album by The Moondogs, released in 2003.
Track listing
"Schoolgirl Crush" – 2:51
"Who's Gonna Tell Mary" – 3:07
"Talking in the Canteen" – 3:37
"Roddy's Gang" – 2:50
"Dream Girl" – 2:24
"Home Is Where the Heart Is" – 4:43
"That's What Friends Are For" – 3:48
"I'm Not Sleeping" – 3:34
Personnel
Gerry McCandless - guitar, vocals
John Peel - liner notes
Mike Robinson - producer
Tony Wilson - producer
David Dade - engineer
James Bartlett - liner notes
The Moondogs - main performer
Austin Barrett - drums
Jackie Hamilton - bass guitar, vocals
Category:The Moondogs albums
Moondogs
Category:2003 live albums
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Stability analysis and optimal control of an epidemic model with awareness programs by media.
The impact of awareness campaigns and behavioral responses on epidemic outbreaks has been reported at times. However, to what extent does the provision of awareness and behavioral changes affect the epidemic trajectory is unknown, but important from the public health standpoint. To address this question, we formulate a mathematical model to study the effect of awareness campaigns by media on the outbreak of an epidemic. The awareness campaigns are treated as an intervention for the emergent disease. These awareness campaigns divide the whole populations into two subpopulation; aware and unaware, by inducing behavioral changes amongst them. The awareness campaigns are included explicitly as a separate dynamic variable in the modeling process. The model is analyzed qualitatively using stability theory of differential equations. We have also identified an optimal implementation rate of awareness campaigns so that disease can be controlled with minimal possible expenditure on awareness campaigns, using optimal control theory. The control setting is investigated analytically using optimal control theory, and the numerical solutions illustrating the optimal regimens under various assumptions are also shown.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The invention relates to closures for fluid containers, and in particular to a safety locking closure assembly resistant to unauthorized opening by a child.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Extrapancreatic effects of sulfonylureas--a comparison between glimepiride and conventional sulfonylureas.
The contribution of extrapancreatic effects of sulfonylureas to the blood glucose-decreasing activity was reevaluated in vivo and in vitro with several conventional sulfonylureas and with the new one glimepiride. In vivo, in dogs, after single approximately equipotent blood glucose-decreasing doses, the sulfonylureas were tested for a ranking in the ratios of mean plasma insulin-increasing and blood glucose-decreasing activity. Studies were also performed in hyperglycemic hyperinsulinemic KK-Ay mice under once daily treatment for 8 weeks. In vitro, glimepiride and glibenclamide were tested for the ranking of their extrapancreatic activity with respect to the stimulation of glucose transport and glucose metabolizing processes in normal and insulin-resistant fat cells as well as in the isolated diaphragm. Furthermore, in vitro studies were performed, especially with glimepiride, in order to characterize the molecular mechanism for the extrapancreatic activity. The dog studies revealed a marked ranking in the ratios of plasma insulin-increasing and blood glucose-decreasing activity between the different sulfonylureas (glimepiride < glipizide < gliclazide < glibenclamide). In the hyperglycemic hyperinsulinemic KK-Ay mice, glimepiride reduced blood glucose by 40%, plasma insulin by 50% and HBA1c by 33%, whereas glibenclamide and gliclazide had no effect on these parameters. In vitro, glimepiride and glibenclamide had extrapancreatic effects within the lower microM range, with glimepiride exhibiting 2-3-fold lower ED50 values than glibenclamide. In the absence of insulin, both stimulated glucose transport--up to 60% of the maximum insulin response in the rat diaphragm and up to 35% in 3T3 adipocytes. Glycogenesis was stimulated in the rat diaphragm--up to 55% of the maximum insulin effect; lipogenesis in 3T3 adipocytes--up to 40%. The studies on the molecular mechanism of extrapancreatic activity with rat adipocytes and diaphragm suggest that these direct insulin-mimetic effects rely on the induction of GLUT4 translocation from internal stores to the plasma membrane and on the activation of the key metabolic enzymes, glycogen synthase and glycerol-3-phosphate acyltransferase. These processes occur within the same drug concentration range and with the same ranking between glimepiride and glibenclamide as observed for glucose utilization and transport. The direct effects of sulfonylureas may ultimately be regulated by a glycosyl-phosphatidylinositol-specific phospholipase C, shown to be activated by glimepiride in rat adipocytes. Lipolytic cleavage products thereby generated from glycolipidic structures may in turn stimulate specific protein phosphatases which activate key regulatory proteins/enzymes of glucose and lipid metabolism.(ABSTRACT TRUNCATED AT 400 WORDS)
|
{
"pile_set_name": "PubMed Abstracts"
}
|
include_rules = [
"+crypto",
]
|
{
"pile_set_name": "Github"
}
|
program linkedlist2(input,output);
(* Example linked list Pascal Program *)
(* *)
(* The file list.data would be used as the data file. *)
(* If there was an executable, a.out, run: a.out < list.data *)
const
grades = 5; (* number of grades to be averaged *)
avgPosition = 6; (* position of grade average *)
size = 4; (* number of students *)
type
integerArray = array [1..avgPosition] of integer;
cellPtr = ^cell;
cell = record
id: integer;
info: integerArray;
next: cellPtr
end;
var
list, newrec: cellPtr;
count, classNum: integer;
(* ************************************************************************* *)
(* procedure insert *)
(* ************************************************************************* *)
procedure insert(var list: cellPtr; newrec: cellPtr);
var
current: cellPtr;
found: boolean;
begin
current := list;
found := false;
if (list = nil) then
begin
newrec^.next := list; (* fix bug so next is set to nil *)
list := newrec;
end
else if (newrec^.id < list^.id) then
begin
newrec^.next := list;
list := newrec;
end
else
begin
while (current <> nil) and (not found) do
begin
if (current^.next = nil) then
begin
newrec^.next := nil; (* fix bug so next is set to nil *)
current^.next := newrec;
found := true;
end
else if (newrec^.id < current^.next^.id) then
begin
newrec^.next := current^.next;
current^.next := newrec;
found := true;
end;
current := current^.next;
end;
end;
end;
(* ************************************************************************* *)
(* function average *)
(* ************************************************************************* *)
function average(newrec: cellPtr): integer;
var
i, sum : integer;
begin
sum := 0;
for i := 1 to grades do
sum:=sum + newrec^.info[i];
average:=sum div grades;
end;
(* ************************************************************************* *)
(* procedure makeNewrec *)
(* ************************************************************************* *)
procedure makeNewrec(var newrec : cellPtr);
var
i: integer;
begin
new(newrec);
read(newrec^.id);
for i := 1 to grades do
read(newrec^.info[i]);
newrec^.info[avgPosition] := average(newrec);
end;
(* ************************************************************************* *)
(* procedure displayInfo *)
(* ************************************************************************* *)
procedure displayInfo(var list : cellPtr);
var
i: integer;
current: cellPtr;
begin
current := list;
if (list <> nil) then
begin
write(' ');
for i := 1 to grades do
write('Grade ');
writeln;
write('Student');
for i := 1 to grades do
write(i);
writeln(' Average');
for i := 1 to grades+2 do
write('-----------');
writeln;
while (current <> nil) do
begin
write(current^.id);
for i := 1 to (grades + 1) do
write(current^.info[i]);
writeln;
current:= current^.next;
end;
end;
end;
(* ************************************************************************* *)
(* procedure cleanup *)
(* ************************************************************************* *)
procedure cleanup(var list : cellPtr);
var
current: cellPtr;
begin
while (list <> nil) do
begin
current := list;
list := list^.next;
current^.next := nil;
dispose(current);
end;
current := nil
end;
(* ************************************************************************** *)
(* main program *)
(* ************************************************************************** *)
begin
read(classNum);
list := nil;
for count := 1 to size do
begin
makeNewrec(newrec);
insert(list, newrec);
end;
writeln('Here are the class grades for class:', classNum); writeln;
displayInfo(list);
cleanup(list);
end.
|
{
"pile_set_name": "Github"
}
|
With the tremendous box office of director Marc Forster’s World War Z still coming in and “The Walking Dead” continuing to be one of the most successful shows on television, it doesn’t look like zombies are going anywhere anytime soon. It should come as no surprise then that Deadline is reporting that one of the all-time undead classics, Day of the Dead, is planning a big screen remake.
George Romero followed his genre-defining Night of the Living Dead and Dawn of the Dead with Day of the Dead in 1985. Set in an underground military base, the film follows the zombie apocalypse from the point of view of both soldiers, scientists and a zombie test subject named Bub.
The new film arrives from Millennium Films and Taurus Entertainment with Christa Campbell and Lati Grobman producing. Both names previously served as producers on the recent Texas Chainsaw 3D.
Day of the Dead was previously remade in 2008 as a direct-to-home video effort. The producers on the new film are promising that it will attempt to honor Romero’s original and assure that the zombies will be of the slow-moving horde variety.
Production is planned for later this year with a 2014 release being targeted.
|
{
"pile_set_name": "OpenWebText2"
}
|
On Sunday night, UFC fans witnessed Conor McGregor take the final step towards a highly anticipated title shot against longtime featherweight kingpin Jose Aldo. The Irishman defeated Dennis Siver with remarkable ease to earn his fifth consecutive UFC win and silence his remaining doubters.
In the aftermath of the main event in Boston, UFC President Dana White believes the promotion has something special on their hands.
"It was phenomenal. I said it before and I'll say it again: this kid is a huge superstar. He is exciting and he's got that special gift."
While McGregor may dominate the headlines over the coming days, White explained that his featherweight champion is more than ready to take on the Irish challenge.
"He wants this fight so bad," said White. "He loves this fight."
Given that Aldo was present at the event, many were surprised when the UFC didn't feature a in-cage staredown between the two men. Apparently, the champion simply refused to step inside the octagon for superstitious reasons.
"He is superstitious. He will not step foot inside the octagon unless it is to fight. I just wanted to clarify that because it looked weird but nobody told Jose and he doesn't go in there except to fight."
|
{
"pile_set_name": "OpenWebText2"
}
|
Coudal Partners, our officemates, are a great example of what a design firm can do when it decides to take control of its own destiny.
Coudal used to generate revenues almost exclusively from client work. Anyone who’s done client work knows the inherent frustrations that come along with that. But instead of merely accepting these frustrations as “the real world” (aka The Way It Has To Be), Coudal searched for another path.
From Jewelboxing to Field Notes
When they had trouble finding great CD packaging, they realized other designers probably had the same issue. So Jewelboxing was born.
It was a hit and soon more products came down the pipe: lowercase tees, The Deck, Pinsetter, and Field Notes. Some were bigger hits than others, but, overall, the strategy has succeeded: Coudal now gets the majority of its income from products it creates.
And you can tell they’re having fun along the way too. They also created Swap Meat “in an attempt to make lots of people as happy as we are when the FedEx guy shows up unannounced.” And they even financed and shot a movie, Copy Goes Here, “for no very good reason.”
Risky? Sure, but it’s paid off. Sometimes you need to risk to get reward. The reward for Coudal is a real sense of ownership in the project, from both a financial and creative standpoint.
Advice from Jim Coudal
I asked Jim Coudal if he had any advice for work-for-hire types that want to into selling their own products. His reply:
Two quick points. Not every idea is going to work. Know that going in. Ideas tend to follow the path of least resistance and more often than not that path is the one where you find yourself talking an idea to death, by getting hung up on the “what ifs.” So you need to actively push ideas out and embrace failure. Fail spectacularly whenever possible.
Secondly, every single person I have ever met or corresponded with about leaving the work-for-hire world and trying to create something of their own, something that they really care about, says exactly the same thing. Win, lose or draw they always express the same thought and most of the time they say it in exactly these words.
Forming Jewelboxing enabled Coudal Partners to become choosier when picking clients, Bedell says, because the company doesn’t have to rely on as much conventional income. “If we can think of a way to improve a product or design, or solve a problem that’ll make us happier, chances are the client will feel the same way,” he says…
The company prefers working with clients that don’t expect 100-page reports that justify what it provides. “Our idea is to get the creative work as close as possible to the place where the decision is made.” Says Everett: “To me, design is primarily a verb, not a noun. The interactions and conversations that guide it are very important to the final result.”
Coudal shows you don’t have to just accept the traditional status quo model when you run a business. Thanks for the inspiration guys!
Brilliant. If one of the agencies I worked for - full of incredibly talented people - had produced products instead of redesigning their Web sites and portfolios during downtime they might still be in business…
And if Coudal is planning some kind of Field-Tested Books Book approach to the Tournament of Books, I’ve got my money ready.
We won’t be having wagering on Field-Tested Books this year but we will have tons of new reviews and lots of other stuff as a part of that project. In fact, Steve and Bryan are out right now, shooting video at the unstoppable Spike Press. Our new limited-edition FTB posters are being screened today. Stay tuned.
You’re absolutely right, but the challenge we’ve been facing at City On Fire is trying to build up enough of a cache of funding from our client-work to research and develop and launch the products…. Despite the fact that an idea is financially lucrative and artistically and otherwise rewarding, we must still endure the pain of watching a product linger on the drawing board while the minimal financing it requires can be met.
Jim: were investors crucial in your development of the products or was it all funded internally?
Our situation was such that we lost a couple of large pieces of client business through no fault of our own and had to decide whether scrambling after replacement clients was what we wanted to do. We decided it wasn’t.
It wasn’t all rainbows and unicorns. We used our line of credit, cut off bonuses and and I didn’t always take a paycheck but we made it through. In some ways, the best thing that ever happened to us was having a chunk of our client biz go south.
Working for months on some damn project that gets watered down and compromised and eats up your time and your soul until when you’re all done with it you realize you’re not proud of it and you don’t even want to show it to anyone… well, there’s no amount of money that is going to make that feel better.
Coudal, I cannot agree more with that last comment. Working on a project for months until the point of “let me jump out of the window” is something that can destroy anyone (and I mean anyone) confidence. I’m there with you; being there, done that. It really sucks. That’s why people like 37signals are necessary; we need examples that show the way (or at least another way of doing things).
Only thing I hated most in the past than working for months in a project is feeling you actually didn’t went as far as you needed to avoid that situation where no one wins, and everyone loses.
That feeling stick with you for the rest of the year. It sucks big time.
I forgot to mention the ugly client approach where you accept the job, knowing the client will be a pain, because “it is good for business” and actually, end up being not good for business. Anyone of us took one of those clients that became “that client”... the truth is, there are little projects one can put a tremendous effort and end up being compensated for it; not by money, but by the feel of having finished something amazing.
I usually try to sign with one of those ones, but the other get in the way all the time.
Matt, great post fellow, great post.
J. Ray
on 22 Apr 08
jc,
I like the ‘Stuff you make’, your web site, and really enjoyed ‘Hobbies’!
Just curious, if/when you get to the point where you’re not dependent on any client work that comes along in order to “make payroll”, what criteria do you use (have the luxury of using) in choosing the client work you do want to do?
Keep up the great work. [Wish I could go to the SEED conference, maybe another edition in the future.]
“Working for months on some damn project that gets watered down and compromised and eats up your time and your soul until when you’re all done with it you realize you’re not proud of it and you don’t even want to show it to anyone… well, there’s no amount of money that is going to make that feel better.”
I might just tattoo that twice on my face. Once for clients, once for me in mirror writing.
If we can answer yes to these three questions then a job or project is usually worth considering.
1. Can we do good creative work?
2. Can we make some money?
3. Will we learn something new along the way?
Eran Friedman
on 22 Apr 08
thanks for the inspiration – it is always a lovely and ispiring thing to see that someone else shares the same feelings as you – and he did something to get outside of this loop with great success. love your work and your thought. both the host and coudal.
So smart because it’s so simple and straightforward. One key insight from the article is simply that 47signals and Coudal are in the same officespace. That is an awful lot of good thinking for one building.
Our situation was such that we lost a couple of large pieces of client business through no fault of our own and had to decide whether scrambling after replacement clients was what we wanted to do. We decided it wasn’t.
What independent creative/interactive shop hasn’t been there at some point? The tough part is making the decision on what the best course of action is and then making it happen.
Design and internet agencies have this advantage that they can create their own products not only to diversify the source of income, but also to make sure people stay motivated by working on the projects the like. It seems very risky these days to rely on clients only. Especially if you are a group of ambitious and hungry individuals.
It is very nice to see other companies undergoing the same transition as we went (or are going) through, and get as much energy and creativity out of it….
In 2005 we started the design consultancy innberg and we did pretty well. We had nice customers and we even did a few shared risk/reward deals with our customers. They all paid off.
We started getting into the atoms business (designing and making things) when our end-of-year gift was such a big hit that people kept on asking for it and we decided to make/sell them (innskines.
This really gave us a taste for more, and for a large number of reasons in 2007 we set out designing and marketing our < a href=”http://www.innvire.com”>innvire product concept. Innvire aims to bring getting real ways of working and doing meetings to any workplace and office, simply, aesthetically…
We are now in 2008 and we see we do customer projects less and less, and we can also be more picky, although we don’t have the luxury to really choose to say no, but it seems that time constraints make you choose anyway…
It is not easy to transition from an (internet/interaction/user experience) design consultancy into a physical product company, but you’d be amazed how much mileage you get from GOOD design principles and getting real in the real world.
you might notice a trend here, most of the sites mentioned here are shopify or mephisto, and the frequent usage of the word: getting real..
Jim Coudal’s biggest contribution to this meme - in my opinion - is his willingness and advice to Just Try Stuff.
Try something that gets your interest. If you lose interest, set the business plan (for, say, a movie house!) aside and move to the next shiny thing you see!
I love that.
Eventually, things “stick” and one day you turn around and you’re doing something you love and making a decent income, too.
Simon Graham
on 23 Apr 08
@coudal
I don’t have any major comment to make other than good luck and thanks for all the feedback on this thread. Really enjoying it.
@Javier [EmaStudios] – agree with you totally, I think we all have had “that client”.
When I first started working for myself, I found it hard to say no, it took a while to learn that it is ok to say no to work. Something else will always come along and it will most likely be something more fun.
Simon
This discussion is closed.
About Matt Linderman
Now: The creator of Vooza, "the Spinal Tap of startups." Previously: Employee #1 at 37signals and co-author of the books Rework and Getting Real.
|
{
"pile_set_name": "Pile-CC"
}
|
Characterization of the allosteric interactions between antagonists and amiloride analogues at the human alpha2A-adrenergic receptor.
The purpose of this study was to determine whether there is a well-defined allosteric site on the human alpha2A-adrenergic receptor. To explore this question, we examined the effects of amiloride analogues on the dissociation of [3H]yohimbine, [3H]rauwolscine, and [3H]RX821002. The dissociation data fitted well to an equation derived from the ternary complex allosteric model with amiloride analogue concentration and time as two independent variables. The estimated maximal increase in the [3H]yohimbine dissociation rate caused by the 5-N-alkyl amilorides varied from 2-fold for the parent amiloride to 140- and 160-fold for 5-(N, N-hexamethylene)-amiloride and 5-(N-ethyl-N-isopropyl)-amiloride, respectively. The calculated log affinities at the yohimbine-occupied receptor ranged from 1.75 for 5-(N-ethyl-N-isopropyl)-amiloride to 2.5 for 5-(N, N-hexamethylene)-amiloride. The increase in affinity found at the yohimbine-occupied receptor was not correlated with increase in size of the 5-N-alkyl side chain, in contrast to the situation found at the unoccupied receptor. The effect of competition between two amilorides on yohimbine dissociation also was explored. The data obtained were well fitted by the equation derived from the relevant model, with the off-rate increases caused by 5-(N, N-hexamethylene)-amiloride being either decreased or increased by the competing amiloride analogue in line with predictions, and the parameters derived from the fits were in good agreement with those obtained in the above dissociation assays. Thus, the data are compatible with the amilorides competing at the one allosteric site on the alpha2A-adrenergic receptor and rules out the possibility that the amilorides are acting in a nonspecific fashion.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Todays figure from the vaults is the leader of the Eldar army that I painted in 2002, the Eldar from the Iacon fleet.
The army was made from GW parts from a variety of sources but mainly from a mix of Eldar and Dark Eldar parts. At the time I played using the army chosen from a Craftworld Eldar list, but I wanted to be able to field the figures as Dark Eldar if desired too, even though I never did in the end.
The background for the army plonked the Iaconian Eldar somewhere between the Craftworld Eldar and the Dark Eldar in philosophy. The idea was that rather than base themselves in a craftworld after The Fall, that the Iacon fleet had assembled for safety in numbers. As a result the fleet contained ships of many sizes along with occupants with their own agendas. Obviously this was loosely based on the concept of Battlestar Galactica, although the remake wasnt around at the time.
Another influence was a vaguely Egyptian theme, mostly added so that I could tie the figures to some cheesy decorations that I had been collecting with a magazine around then (visible in a game here). It also helped to focus me on some of the visual elements of the army such as colour and some of the decoration. Everyone is familiar with the concept of “Space Egypt” anyway due to Stargate. Funnily enough I didnt like the Stargate show (because it is shite), although the look of the tech in the movie was cool.
Farseer/Archon Yuminor
Yuminor above is assembled exclusively from plastic parts: Dark Eldar and Craftworld Eldar jetbikes, High Elf arms, a modified pair of High Elf spears, Dark Elf torso and helmet, a bit from a Falcon grav tank, some old shuriken catapults, some styrene strips and a Bretonnian helmet crest. I think that the cape is High Elf too, but it might be from a Chaos Warrior, I cant remember.
The circular thing stuck to the back of Yuminors head is a part of a Falcon kit. It is supposed to tie in with circular gold Egyptian decorative elements that were used to venerate Ra, representing the sun. The piece of plastic that I used was just a bit too thick and so looks a little odd (or maybe just a little bit foreign and alien if I am feeling charitable).
Jetbike Canopy & Singing Spear Detail
Just about visible in the shot above and easier to see in the photo above it is the hand painted glyph in the side of the canopy. Each unit in the army has their own unique glyph inspired by both the existing Eldar look and Egyptian heiroglyphs. Obviously they dont mean something specific or anything like that but they do give a nice element of detail on the figures, Yuminor included. I find that one area on a miniature brought to fine detail like that can help to give a sense of scale to figures. When it works the figures start to look a little less toy-like and just a little more real (as far as space elf sorcerers on jetbikes look real, but you know what I mean).
Another element that I carried through the larger models in the army was a phoenix-y bird type motif. The main reason that I did that was because there was a suitable crest on the High Elf sprues that I had in sufficient numbers to put on all of the vehicles that I had planned for the army. The bird on the jetbike canopy above however is a Bretonnian knghts helmet crest with some styrene strips making a sort of tail. That shot also shows the High Elf Spear which I made double ended because I think that it looks good like that. It also looks a bit like Prince Nuadas spear from Hellboy II now that I look at it. That cant be a bad thing.
The Entire Model
I like this model a lot even though as I mentioned in a previous Iacon post the paint scheme was laborious in its execution. Still, Yuminor (name inspired by a character from the super cool Ulysses 31 cartoon) is one of my better examples of a unique figure used to represent an army leader. Yuminors career didnt have the same gaming span as my Nurgle Chaos Lord but he still stands as one of the better examples from my own corner of the hobby.
Like this:
I painted this guy up in 1993, when I was seventeen. The paint job is far from perfect but it is still good enough for me to be quite happy to use the figure in any of my games that require it.
Harlequin Troupe Leader
As my Harlequin project never got any further than that Troupe Leader (or High Avatar as it was called back then) I still have a few lovely old Harlequin figures knocking around that tempt me from time to time. If I do get around to painting them I may tie the scheme in to resonate with this figure in some way, just for fun
I will probably avoid copying the hairdo that looks like a decorated Xmas tree though, I am not so keen on that. It does however make the figure a little more appropriate for an Xmas post.
Festive Head
I hope that all of you guys get the nerdy stuff that you want under the tree this year.
Would enter a state of prion induced cannibalistic living death that would result in their souls being drained.
100% Polyester
Randolf is my favourite figure from the Studio Miniatures “A Christmas Nightmare” pack. Like the majority of Studio Miniatures stuff, the figure is very nicely sculpted.
My painting worked out well here I think, as I was concerned that Randolphs costume would look like the appropriate horrible, cheap and sweaty material rather than actual fur. Having spent a couple of hours in a Sylvester the Cat outfit many years ago, getting that part of the painting right was a priority. I can still remember the smell, and I wasnt even dead.
Like this:
I had two zombie miniature related problems. One issue was that the Mantic zombies and ghouls that I owned were going to be hard to make look like modern figures. The second problem was that I didnt have any figures that I had specifically designated for use as fast/rage zombies in games.
I decided to kill two birds with one stone by theming my fast zombies as hospital patients. That way the slightly odd toga like clothing could be painted to feasibly look like hospital gowns. Thematically, the idea that some sort of “cure” administered in a hospital could have backfired and had a negative effect that created a more hyperactive version of the infected works for me. You could call it the “running” out of patients maybe, but Id rather you didnt.
Having recently picked up the Studio Miniatures Big Zombie Deal I also decided to add the patients from Zombie Mob 5 who also fit nicely with my Patient Zero figure from last year. Hopefully the “proper” dead patients lend some authenticity to the Mantic stuff.
In keeping with how I am basing my zombies for gaming, fast zombies have a hex-base, while regular zombies have standard round bases and so on. Just in case anyone is wondering about why the bases vary.
As ever the figures are painted to a decent enough tabletop standard and definitely not as display pieces. This is the first batch. I have a few more batches coming up with similar skin tones but wearing different gowns and the like. There will be twenty eight or so when the sub-project is finished.
The Sin Eaters set up with squads of three sentries plus Brother Damien leading the defence.
In Kill Team the more exceptions that are made to build the Kill Team force the more sentries are allowed in defence. Additionally, the defenders are allowed to buy one low level character who in this case was Brother Damien.
Brother Damien and his bodyguard are shown above guarding the dark altar with Trixie the captured Eldar tied up and ready for sacrifice.
MT went for a pretty big, pretty bog standard codex squad Kill Team, with few alterations made to it (the added Howling Banshee being the only one that I remember). This also made for correspondingly smaller defending forces.
Personally my preference for Kill Teams is to use mixtures of figure types to make for a fun, idiosyncratic group of badasses, like the guys from Predator or the A-Team or whatever. While this may not always be the most effective way of ensuring a win, the team in itself will be a talking point and fun to use. This meant that I thought that the Kill Team above was dull, even if it meant that it stood a better chance of winning the game.
The vast Kill Team surged forward and swamped the first group of sentries…
…killed them and proceeded towards the next bunch…
…bumped them off…rinsed, repeated…
…and made it to the altar and mangled the defenders there too. Successful, for the victorious Eldar yes. For the people playing it was less so. A humdrum exercise in dice rolling. Yawn.
———-
Conclusions: that was dull, but mercifully quick, showcasing the worst of 40k. The perfect venture to enable me to put all of that stuff behind me again for another five years at least.
I still hope to use my 40k figures in a skirmish level game at some point soon, but as yet I havent found something suitable. Savage Worlds Showdown is the next rule set that I am going to consider.
For the second last game of 40k that we played that weekend we decided to try a “Kill Team” scenario. For those that dont know, Kill Team is a way of playing games using a small, hand-picked force from an army list that doesnt conform to the usual restrictions and getting them to do something cinematic like rescue a hostage, blow up a reactor etc. It is a potentially fun way to use some of the more oddball figures in your collection to do something worthy of a crappy yet entertaining movie. One of the main reasons to play miniature games in my opinion.
Kill Team games are also by definition quick affairs with only a handful of figures on one side and not really a vast amount on the other side either, sentry types mostly.
The Sin Eater Kill Team consisted of three Chaos Space marines (here and here), of which one had a Plasma Gun (right), two Possessed Marines from Squad Nemesis and Sgt Damien, a vintage Nurgle Chaos Renegade that I am very fond of (he oozes character), representing a Veteran Sergeant/Aspiring Champion type.
The Kouranaya Eldar set up around the table in an unalerted state, talking about the good old days ten thousand years ago when they didnt have to live like monks for fear of their souls being devoured by an evil god (represented by the yellow markers. The unlaerted state that is, not the evil god). The floating pyramid in the middle of the table is the webway portal which the Kill Team has been sent to destroy.
The Kill Team enter from the East…
…and quickly blow one unit of Guardians to pieces, forcefeed knuckle sandwiches to a second squad and send a third running back home to tell on them. All in a days work for paranormal, post-human, pestilent pantheon proclaimers.
Although the Kill Team kept the noise down a reasonable amount, most of the Eldar cottoned on (the yellow markers have turned red) and they regrouped ready to provide a reasonably coherent defence of the portal.
The Kill Team is surrounded. What we got here is a Mexican stand off… ‘cept there aint no Mexicans.
In a potent display of why the Kill Team is comprised of the best of the best (with honours), the Guardians are either killed or driven off, with some casualties to the Sin Eaters.
Sgt Damien allows himself a rare, rotten-gobbed smile as the corrupting influence of Chaos permeates the sacred ground of the Eldar, all according to plan.
——-
Conclusions: The game was fun, but would probably have been more so if another gaming system was used: it was hampered by the Warhammer system.
I was surprised at the time when GW published the Kill Team rules and even more so when they codified them fully and comprehensively in the 4th edition rulebook. It showed that they were willing to acknowledge that there was more to figure gaming than just their usual tedious big battle fare. Within the limitations of the 40k system they did a good job too.
I dont think that the Kill Team rules are included in the current rulebook which is both a sign of the times and a pity.
|
{
"pile_set_name": "Pile-CC"
}
|
CTA buttons – or buttons on your website that push the visitor to take action (i.e., a “Call to Action“) are tricky little things. They seem so simple. So straightforward. But a year or two ago, I had my eyes opened to the crazy power of a really, really good call-to-action button. Back then, I […]
|
{
"pile_set_name": "Pile-CC"
}
|
United States Court of Appeals
FOR THE EIGHTH CIRCUIT
___________
No. 98-3936
___________
United States of America, *
*
Appellee, *
* Appeal from the United States
v. * District Court for the
* Northern District of Iowa.
Raydell Lacey, also known as Lacey, *
also known as Camile, also known as *
Raydell Laye Lacey, also known as *
Raydell F. Lacey, *
*
Appellant. *
___________
Submitted: April 11, 2000
Filed: July 19, 2000
___________
Before WOLLMAN, Chief Judge, MURPHY, Circuit Judge, and GOLDBERG,1
Judge.
___________
WOLLMAN, Chief Judge.
1
The Honorable Richard W. Goldberg, Judge, United States Court of
International Trade, sitting by designation.
Raydell Lacey appeals from her conviction for conspiracy to distribute cocaine
and crack cocaine in violation of 21 U.S.C. § 846 and from the district court’s2 denial
of her motion for a mistrial. We affirm.
I.
On September 25, 1995, Cedar Rapids, Iowa, police officers obtained a warrant
to search an apartment shared by Lacey and Kelvin Knight. Much of the information
used to procure the warrant was provided by Sue Zieser Perkins (Zieser), a confidential
informant who made a controlled drug buy from Lacey and provided police with
additional information regarding Lacey’s alleged drug activity. Later that day, officers
executed the warrant and discovered cocaine, crack cocaine, a pager, a glass tube with
residue consistent with the production of crack cocaine, and other drug packaging and
use paraphernalia. Lacey and Knight were charged with possession with intent to
distribute cocaine and crack cocaine and conspiracy to distribute these substances.
Lacey was tried before a jury in August of 1998. Among the government’s
witnesses was Zieser. The government failed to inform Lacey prior to trial that Zieser
was the confidential informant used to secure the September 1995 warrant, and during
direct examination Zieser testified only about other drug purchases that she had made
from Lacey, making no specific mention of the controlled buy. As a result, Lacey did
not learn of Zieser’s cooperation with the police until a sidebar conference during
Lacey’s cross-examination of Zieser. Upon learning of this information, Lacey moved
for a mistrial.
The court deferred ruling on Lacey’s motion and proceeded with trial. The jury
convicted Lacey of conspiracy to distribute cocaine and crack cocaine but failed to
2
The Honorable Michael J. Melloy, then Chief Judge, United States District
Court for the Northern District of Iowa.
-2-
reach a verdict on the possession with intent charge. Lacey then moved for a judgment
of acquittal pursuant to Rule 29 of the Federal Rules of Criminal Procedure and for a
new trial under Rule 33, asserting in each motion that there was insufficient evidence
to support her conviction. The court denied Lacey’s motion for a mistrial and her Rule
29 and Rule 33 motions and sentenced her to 121 months’ imprisonment and eight
years’ supervised release. This appeal followed.
II.
Lacey first contends that the district court improperly denied her motion for a
mistrial. She argues that the government’s failure to disclose Zieser’s cooperation with
the police hindered her ability to impeach Zieser’s credibility, thus violating her Sixth
Amendment right to confrontation and warranting a declaration of mistrial. We may
reverse a district court’s denial of a motion for a mistrial only if the denial was an abuse
of discretion that clearly prejudiced the moving party. United States v. Van Chase, 137
F.3d 579, 583 (8th Cir. 1998).
“The Confrontation Clause of the Sixth Amendment guarantees to a defendant
the opportunity for effective cross-examination of witnesses against [her], including
inquiry into the witnesses’ motivation and bias.” United States v. Triplett, 104 F.3d
1074, 1079 (8th Cir. 1997) (quoting United States v. Willis, 997 F.2d 407, 415 (8th
Cir. 1993)). This guarantee is not without limitation, however, as district courts “retain
wide latitude . . . to impose reasonable limits on cross-examination when they have
concerns about harassment, prejudice, confusion of the issues, a witness’s safety, or
interrogation that is repetitive or only marginally relevant.” United States v. Stewart,
122 F.3d 625, 626-27 (8th Cir. 1997). The Confrontation Clause is thus violated only
“when the defendant shows ‘[s]he was prohibited from engaging in otherwise
appropriate cross-examination designed to show a prototypical form of bias on the part
of the witness.’” United States v. Boykin, 986 F.2d 270, 276 (8th Cir. 1993) (quoting
Delaware v. Van Arsdall, 475 U.S. 673, 680 (1986)).
-3-
We conclude that Lacey was not improperly prohibited from effectively cross-
examining Zieser. Although the government failed to disclose Zieser’s police
involvement prior to trial, once that fact was disclosed the court halted the trial and
ordered the government to produce all police reports regarding Zieser’s involvement
in this case and in any other drug investigation. The court then conducted an in camera
review of these materials and disclosed to Lacey all information pertaining to her case,
as well as all relevant information regarding Zieser’s cooperation in an unrelated
investigation.3 Following this disclosure, Lacey’s counsel was given the opportunity
to question Zieser regarding these matters but declined to do so. Thus, the
Confrontation Clause was satisfied. See Van Arsdall, 475 U.S. at 679 (“[T]he
Confrontation Clause guarantees an opportunity for effective cross-examination . . . .”
(citation omitted) (emphasis in original)); United States v. Ortega, 150 F.3d 937, 941
(8th Cir. 1998).
Particularly instructive on this point is our ruling in Boykin. See 986 F.2d at
276-77. There, we held that the government’s failure to initially disclose information
showing that a government witness may have perjured himself did not violate the
Confrontation Clause because the defendant was eventually given the opportunity to
confront the witness with this information at trial. See id. We reasoned that “[the
witness’s] perjury was revealed before the trial was over, he was recalled to the
witness stand, and [the defendant] ‘had the opportunity to expose to the jury the facts
that would allow the jury to draw inferences regarding [the witness’s] credibility.’” Id.
at 277 (quoting United States v. Simmons, 964 F.2d 763, 770 (8th Cir. 1992)). The
same is true here: Lacey learned of Zieser’s police cooperation at the close of her
cross-examination of Zieser and the court gave Lacey’s counsel the opportunity to
recall Zieser to the stand and question her regarding these matters. Thus, Lacey cannot
3
The district court withheld the specific details of the unrelated investigation in
which Zieser assisted because it found that they were not relevant to any bias or
improper motivation that Zieser may have had. Lacey does not contest this ruling.
-4-
now claim that she was “prohibited from engaging in otherwise appropriate cross-
examination designed to show a prototypical form of bias on the part of the witness.”
Boykin, 986 F.2d at 276 (quoting Van Arsdall, 475 U.S. at 680).
In a related argument, Lacey asserts that the government failed to tender to the
district court all existing evidence regarding Lacey’s police cooperation and thus
violated the disclosure requirements of Brady v. Maryland. See 373 U.S. 83, 87 (1963)
(requiring government to provide defendant with evidence material to defendant’s guilt
or punishment). We disagree. Brady requires the government to disclose to a
defendant only evidence that is in the government’s possession or that of which the
government is aware. See United States v. Turner, 104 F.3d 217, 220 (8th Cir. 1997);
United States v. Jones, 34 F.3d 596, 599-600 (8th Cir. 1994). Here, there is no
evidence that there exists any information regarding Lacey’s police cooperation other
than that which was given to the district court at trial. Thus, the dictates of Brady were
not violated.
In light of the sequence of events at trial, we conclude that the district court did
not abuse its discretion in denying Lacey’s motion for a mistrial.
II.
Lacey also contends that her conviction is not supported by sufficient evidence
and thus that the district court improperly denied her Rule 29 and Rule 33 motions. We
turn first to Lacey’s Rule 29 motion for judgment of acquittal. In reviewing a district
court’s denial of a motion for acquittal based on the insufficiency of the evidence, we
view the evidence in the light most favorable to the verdict and will reverse only if no
reasonable jury could have found beyond a reasonable doubt that the defendant is guilty
of the offense charged. See United States v. Scott, 91 F.3d 1058, 1061 (8th Cir. 1996).
To be guilty of conspiracy, a defendant must be shown to have knowingly entered into
-5-
an agreement with at least one other person to violate the law. See United States v.
Holloway, 128 F.3d 1254, 1257 (8th Cir. 1997).
After reviewing the record, we are satisfied that there is ample evidence to
support a jury finding that Lacey entered into an agreement with Knight to distribute
controlled substances. A search of the residence shared by Lacey and Knight revealed
more than 5 grams of crack cocaine, 53 grams of cocaine, and various items of drug
trafficking paraphernalia. In addition, Zieser testified that Knight would often deliver
drugs that Zieser previously had agreed via telephone to purchase from Lacey. Tally
Morales and Ted Hinrichsen offered similar testimony linking Knight and Lacey
together in a joint venture to distribute cocaine and crack cocaine. Lacey attacks the
credibility of these witnesses, but in considering a motion for acquittal we defer to the
jury’s assessment of witness credibility, and here the jury deemed them credible. See
Scott, 91 F.3d at 1062; United States v. Brown, 956 F.2d 782, 785-86 (8th Cir. 1992).
Thus, based on the foregoing evidence, we cannot conclude that no reasonable jury
could have found Lacey guilty of conspiring to distribute cocaine and crack cocaine.
Accordingly, the district court properly denied Lacey’s motion for acquittal.
We turn next to Lacey’s Rule 33 motion for a new trial. A district court may
grant a new trial for insufficiency of the evidence “only if the evidence weighs heavily
enough against the verdict that a miscarriage of justice may have occurred.” Brown,
956 F.2d at 786 (quoting United States v. Lanier, 838 F.2d 281, 284-85 (8th Cir.
1988)). In making this determination, the court need not view the evidence in the light
most favorable to the government, but may instead weigh the evidence and evaluate for
itself the credibility of the witnesses. See Brown, 956 F.2d at 786. We review the
denial of a motion for a new trial for a clear and manifest abuse of discretion. See
United States v. Goodson, 155 F.3d 963, 967 (8th Cir. 1998).
Again, after reviewing the evidence, we find no abuse of discretion in the court’s
denial of Lacey’s new trial motion. Although the testimony of Zeiser, Morales, and
-6-
Hinrichsen was not without flaw, the cumulative effect of this evidence, together with
the contraband discovered during the search of Lacey’s and Knight’s apartment,
satisfies us that no miscarriage of justice has occurred.
The judgment is affirmed.
A true copy.
Attest:
CLERK, U.S. COURT OF APPEALS, EIGHTH CIRCUIT.
-7-
|
{
"pile_set_name": "FreeLaw"
}
|
/* xdcon - description
*
* Purpose:
*
* Written by: R. Mortensen
* Date:
*
* Calling Sequence:
*
* STATUS = xdcon( parameters )
*
* Parameter List:
*
* Unit: Display device unit number
*
* Possible Error Codes:
*
*/
#include "xvmaininc.h"
#include "ftnbridge.h"
#include "xdexterns.h"
#include "xdroutines.h"
#include "xderrors.h"
#include "xdfuncs.h"
#define DEFAULT_FORM 1
FUNCTION FTN_NAME(xdcon)( Unit, Cursor, Form, Blink )
INTEGER Unit, Cursor, Form, Blink;
{
return ( zdcon( *Unit, *Cursor, *Form, *Blink ) );
}
FUNCTION zdcon( unit, cursor, form, blink )
int unit, cursor, form, blink;
{
int status, tmpForm;
xd_current_call = CON;
if (!ZCHECK_UNIT_NUMBER) {
status = UNIT_OUT_OF_RANGE;
}
else if (!ZCHECK_DEVICE_OPEN) {
status = DEVICE_NOT_OPEN;
}
else if (!ZCHECK_DEVICE_ACTIVE) {
status = DEVICE_NOT_ACTIVE;
}
else if (!ZCHECK_CURSOR( cursor )) {
status = NO_SUCH_CURSOR;
}
else if (!ZCHECK_CURSOR_TYPE( form )) {
status = NO_SUCH_CURSOR_FORM;
}
else if ((form < 0) && (!ZMAY_RESIZE_CURSOR)) {
status = NO_SUCH_CURSOR_FORM;
}
else if (!ZCHECK_CURSOR_BLINK_RATE( blink )) {
status = NO_SUCH_CURSOR_RATE;
}
else {
tmpForm = (form == 0 ? DEFAULT_FORM : form );
ZCURSOR_FORM( cursor ) = tmpForm;
ZCURSOR_BLINK( cursor ) = blink;
ZCURSOR_ACTIVE( cursor ) = TRUE;
status = XD_Device_Interface( &unit, CURSOR_ON, cursor, tmpForm, blink );
}
xd_error_handler( &unit, status );
return (status);
}
|
{
"pile_set_name": "Github"
}
|
Evaluation of the polarographic technique for assay of the viability of freeze-dried BCG vaccine: I. The polarographic technique.
In this paper, a new assay based on oxygen uptake assessed by polarography was evaluated with the aim of establishing the viability of freeze-dried BCG vaccine. An oxygen electrode possessing a temperature sensor was designed for this purpose. The polarographic method used had several advantages, particularly its rapidity and use of small amounts of biological material. These advantages are ideal for quality control of BCG vaccine.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Gastrojejunal anastomotic strictures following laparoscopic Roux-en-Y gastric bypass surgery: analysis of 1291 patients.
The development of an anastomotic stricture at the site of the gastrojejunostomy following Roux-en-Y gastric bypass (RYGBP) is associated with substantial morbidity. Various techniques are available for creating the gastrojejunal anastomosis, including hand-sewing and using a circular or linear stapler, to reduce complication rates. The aim of this study was to assess the incidence of gastrojejunal anastomotic strictures in patients who underwent antecolic antegastric Roux-en-Y gastric bypass (AA-RYGBP) with the use of a linear stapler and to evaluate the outcomes of endoscopic pneumatic dilatation as a treatment option for patients with anastomotic stricture. All patients who met the National Institutes of Health (NIH) criteria for bariatric surgery and underwent AA-RYGBP using a linear stapler technique between July 2000 and November 2004 were included in the study. Following Institutional Review Board approval, the medical records of these patients were retrospectively reviewed. Two surgeons performed all of the surgical procedures in this series using a standardized surgical protocol. Between July 2000 and November 2004, 1291 patients (1016 females [79%] and 275 male [11%]) underwent AA-RYGBP. The patients' mean age was 43 years (range, 19-75 years), and mean preoperative body mass index (BMI) was 49.6 kg/m2 (range, 34-97.5 kg/m2). Out of 1291 procedures, 1265 were performed laparoscopically (98.3%), with the reminder performed by laparotomy. A linear stapler was used to create the gastrojejunal anastomosis in all of the procedures. A total of 405 (31%) complications occurred, with gastrojejunal anastomotic strictures the most common complication, found in 94 (7.3%) patients more than 30 days after the procedure. All of these cases of stricture were treated by endoscopic pneumatic dilatation with a through the scope (TTS) balloon, requiring between one and four dilatory sessions. Of the 94 patients (2.1%) who underwent balloon dilatation, 2 developed perforation, only 1 of whom required surgical intervention. The mean postoperative hospital stay for the 94 patients was 4.2 days (range, 2-24 days); there was no perioperative patient mortality. Our results demonstrate that AA-RYGBP can attain a relatively low complication rate and no mortality. Gastrojejunal anastomotic strictures were the most common complication and were diagnosed 30 days after the procedure. Endoscopic balloon dilatation can be offered as a first-line treatment for gastrojejunal anastomotic strictures. Perforation is a potential complication of this treatment and may necessitate surgical intervention.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Stephanie Zimbalist Net Worth
How much is Stephanie Zimbalist Worth?
Stephanie Zimbalist net worth: Stephanie Zimbalist is an American actress who has a net worth of $3 million. Stephanie Zimbalist earned her net worth from a successful acting career that has spanned more than 35 years. Born in New York, Zimbalist moved to Los Angeles with her family and started quickly started her acting career. From a young age, she started appearing in films, including The Triangle Factory Fire Sandal (1978), The Awakening (1980) and The Best Place To Be (1979). Zimbalist also made appearances in several TV series including NBC's 1980 program Remington Steele, starring alongside Pierce Brosnan and Doris Roberts. She took the lead role in the Emmy award-winning TV film Caroline (1990). In theater, Zimbalist is a regular in California's Rubicon Theater, winning the Robby Awards for her performance in The Rainmaker in 2001. Throughout the nineties, Zimbalist continued to be a regular in the theater world, mainly featuring in plays about 19th century artists. In 2009 she appeared in a one-woman play, portraying the iconic Audrey Hepburn, in Tea at Five. Zimbalist is also an award-winning author, receiving a Listen Up award for her audio books, The Girls and the Queen.
Stephanie Zimbalist Articles
Prior to launching Celebrity Net Worth, Brian spent seven years as the Managing Editor of one of the largest entertainment portals on the internet. Before that, Brian attended Georgetown University where he double majored in finance and marketing. A native of Northern California, Brian currently resides in Los Angeles. Follow him on Google+.
|
{
"pile_set_name": "Pile-CC"
}
|
Ruge Mutahaba
Ruge Mutahaba (1970 – 26 February 2019) was a Tanzanian bureaucrat. He served as Director of Strategy and Programs Development at Clouds Media Group.
Early life
Mutahaba was born in Brooklyn in 1970. On his return from the United States to Tanzania. Mutahaba attended primary school in Arusha from standard 1 to 6 and then attended Mlimani. He attended secondary school at Forodhani in Dar Es Salaam for ordinary level education (O-level) and high school in Pugu for advanced level (A – Level) education. He earned a bachelor degree in marketing and BA in finance at San Jose State University.
Career
Mutahaba's collaborated with his friend Joseph Kusaga, who was running Clouds Disco. Their collaboration led to the founding of Clouds Media Group in Arusha and later in Dar es Salaam. Clouds produces information and entertainment for young audiences that works to inspire and empower young Tanzanians to engage in finding entrepreneurial opportunities.
Death
According to some sources Mutahaba had kidney problems that sent him to South Africa to receive treatment, where he died on 26 Feb 2019.
Tanzanians, were shocked by his death and delivered condolence messages due to Mutahaba's contribution to the media and entertainment sector, constructive strategic planning, the development of Tanzanian youths' talents, instillation of hard working spirit to the community and the development of the Tanzania in general, Over 100,000 people were estimated to have attended his funeral.
References
Category:1970 births
Category:2019 deaths
Category:People from Brooklyn
Category:San Jose State University alumni
Category:Place of death missing
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Weird knit jumper - 80s vintage sweater
An artsy patterned knit jumper from the 80s. The 80s were the best in knit jumpers, just sayin'! This beauty features ribbings at cuffs, neck and hem. Made of an easy-to-care acrylic fabric with silver fibres. It's a nice oversized fit for a UK size 6-10.
Fabric: polyacrylic 100
Condition: Vintage
Vintage Era: 1980s
Colour: Multi
Brand: Pop Sick
Size Details
Garment Care
Machine wash cold
Returns & Exchanges
You may cancel an order from your account before it is shipped. Please note that if the item is made-to-measure you may only be able to cancel the order before it is shipped provided that the garment hasn’t been altered or made yet.
If you receive an item and wish to return it for any reason you must inform the Seller in writing within 14 days of receiving the item.
You may also return any item to the Seller within 28 days if the item becomes faulty.
The Seller will then provide you instructions on how to return your item and once your item is received back, they will process your refund through Paypal.
Return postage is your responsibility unless the item is incorrect or faulty, in which case the Seller will refund the return postage. If you cancel your contract under the Consumer Contracts (Information, Cancellation and Additional Charges) Regulations 2013 any standard shipping charges that you have paid to receive your purchase will be included as part of your refund.
Please note that the Seller may refuse a refund if the garment has been made according to your precise measurements ie) made-to-measure. The items you return must be unworn and in their original condition save for your right to inspect the goods and try on the garments. It is your responsibility to ensure that you package the returned goods adequately so that it arrives back to the Seller undamaged.
If you have any further questions on returns, refunds or cancellations please contact the Seller.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
extend images across slide active slide
I am creating a website for a school project and we were asked to choose a company to design a mock promotional website for. I chose CVS but you could choose anyone. I managed to use a template which I had done completing some codecamdemy classes but the tutorials didn't appear to be helpful in regards to changing the length of the images. What I want to do is to extend the images called "nyse", "mentor" and "mountain" across the length of the whole slide container, but so far, when I change it, the image doesn't seem to do anything. Can anyone tell me where it is going wrong or where to put my code to extend the images? I have tried numerous divs but no luck so far. My code is presented below.
HTML
<!doctype html>
<html>
<head>
<link href='http://fonts.googleapis.com/css?family=Oswald:400,300' rel='stylesheet'>
<link href="http://s3.amazonaws.com/codecademy-content/courses/ltp2/css/bootstrap.min.css" rel="stylesheet">
<link href="style.css" rel="stylesheet">
</head>
<body>
<div class="header">
<div class="container">
<a href="#" class="logo-icon">
<img src="img/cvs.png">
</a>
<div class="headerNi">
<div class="container">
<a href="#" class="logo-icon">
<p><a href title="Click this link to view the scheme.">NIDC Graduate Scheme</a></p>
</a>
<div id ="headerMission">CVS Health's Northern Ireland Development Centre, which opened in 2012,<br>
creates software solutions for all parts of the US company,<br>
with particular focus on internet and mobile applications.</div></div>
<ul class="menu">
<li><a href="#">Home</a></li>
<li><a href="#">About Us</a></li>
<li><a href="#">Curriculum</a></li>
<li><a href="#">Staff Profiles</a></li>
<li><a href="#">Careers</a></li>
<li><a href="#">Register</a></li>
<li class="dropdown">
<a href="#" class="dropdown-toggle">More <b class="caret"></b></a>
<ul class="dropdown-menu">
<li><a href="#">Graduate Scheme</a></li>
<li><a href="#">What we look for</a></li>
<li><a href="#">Links</a></li>
</ul>
</li>
</ul>
</div>
</div>
</div>
</div>
<div class="slider">
<div id="nyse-slide" class="slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>CVS is now hiring</h1>
<p>We will soon have a nice new building.</p>
<ul class="get-app">
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/ios.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/android.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/windows.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/blackberry.png"></a></li>
</ul>
</div>
<div class="slide-img col-xs-7">
<img src="img/nyse.jpg" width="540px">
</div>
</div>
</div>
</div>
<div class="slide slide-feature">
<div class="container">
<div class="row">
<div class="col-xs-12">
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<a href="#">Accountability</a>
<p>Take responsibility for your actions.</p>
</div>
</div>
</div>
</div>
<div id="mountain-slide" class="slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>Collaboration</h1>
<p>At CVS, it's important to work together with your mentor!</p>
</div>
<div class="slide-img col-xs-7">
<img src="img/mountain.png">
</div>
</div>
</div>
</div>
<div id="pharm-slide" class="slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>Tenacity</h1>
<p>Be determined.</p>
<ul class="get-app">
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/ios.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/android.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/windows.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/blackberry.png"></a></li>
</ul>
</div>
<div class="slide-img col-xs-7">
<img src="img/pharm.jpg" width="540px">
</div>
</div>
</div>
</div>
</div>
<div class="slider-nav">
<a href="#" class="arrow-prev"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/arrow-prev.png"></a>
<ul class="slider-dots">
<li class="dot active-dot">•</li>
<li class="dot">•</li>
<li class="dot">•</li>
<li class="dot">•</li>
</ul>
<a href="#" class="arrow-next"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/arrow-next.png"></a>
</div>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script>
<script src="app.js"></script>
</body>
</html>
CSS
.container {
width: 960px;
color: gray;
}
/* Header */
.header {
background-color: rgba(255, 255, 255, 0.95);
border-bottom: 1px solid #ddd;
font-family: 'Oswald', sans-serif;
font-weight: 300;
font-size: 17px;
padding: 15px;
}
/* Menu */
.header .menu {
float: right;
list-style: none;
margin-top: 5px;
}
.menu > li {
display: inline;
padding-left: 20px;
padding-right: 20px;
}
.menu a {
color: #898989;
}
/* Dropdown */
.dropdown-menu {
font-size: 16px;
margin-top: 5px;
min-width: 105px;
}
.dropdown-menu li a {
color: #898989;
padding: 6px 20px;
font-weight: 300;
}
/* Carousel */
.slider {
position: relative;
width: 100%;
height: 470px;
border-bottom: 1px solid #ddd;
}
.slide {
background: transparent url('http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/feature-gradient-transparent.png') center center no-repeat;
background-size: cover;
display: none;
position: absolute;
top: 0;
left: 0;
width: 100%;
height: 100%;
}
.slide {
text-align: center;
height: 550px;
}
#nyce-slide{
background-image: url('nsce.jpg');
}
#pharm-slide-feature{
background-image: url('pharm.jpg');
}
#mountain-slide-feature{
background-image: url('mountain.jpg');
}
.active-slide {
display: block;
}
.slide-copy h1 {
color: #363636;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 40px;
margin-top: 105px;
margin-bottom: 0px;
}
.slide-copy h2 {
color: #b7b7b7;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 40px;
margin: 5px;
}
.slide-copy p {
color: #959595;
font-family: Georgia, "Times New Roman", serif;
font-size: 1.15em;
line-height: 1.75em;
margin-bottom: 15px;
margin-top: 16px;
}
.slide-img {
text-align: right;
}
/* Slide feature */
.slide-feature {
text-align: center;
background-image: url('http://devonsstudio.com/businesspeople.png');
height: 550px;
}
.slide-feature img {
margin-top: 112px;
margin-bottom: 28px;
}
.slide-feature a {
display: block;
color: #6fc5e0;
font-family: "HelveticaNeueMdCn", Helvetica, sans-serif;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 20px;
}
.slide-feature p {
color: red;
}
.slider-nav {
text-align: center;
margin-top: 80px;
}
.arrow-prev {
margin-right: 45px;
display: inline-block;
vertical-align: top;
margin-top: 9px;
}
.arrow-next {
margin-left: 45px;
display: inline-block;
vertical-align: top;
margin-top: 9px;
}
.slider-dots {
list-style: none;
display: inline-block;
padding-left: 0;
margin-bottom: 0;
}
.slider-dots li {
color: #bbbcbc;
display: inline;
font-size: 30px;
margin-right: 5px;
}
.slider-dots li.active-dot {
color: #363636;
}
/* App links */
.get-app {
list-style: none;
padding-bottom: 9px;
padding-left: 0px;
padding-top: 9px;
}
.get-app li {
float: left;
margin-bottom: 5px;
margin-right: 5px;
}
.get-app img {
height: 40px;
}
color: #898989;
padding: 6px 20px;
font-weight: 300;
}
/* Carousel */
.slider {
position: relative;
width: 100%;
height: 470px;
border-bottom: 1px solid #ddd;
}
.slide {
background: transparent url('http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/feature-gradient-transparent.png') center center no-repeat;
background-size: cover;
display: none;
position: absolute;
top: 0;
left: 0;
width: 100%;
height: 100%;
}
.active-slide {
display: block;
}
.slide-copy h1 {
color: #363636;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 40px;
margin-top: 105px;
margin-bottom: 0px;
}
.slide-copy h2 {
color: #b7b7b7;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 40px;
margin: 5px;
}
.slide-copy p {
color: #959595;
font-family: Georgia, "Times New Roman", serif;
font-size: 1.15em;
line-height: 1.75em;
margin-bottom: 15px;
margin-top: 16px;
}
.slide-img {
text-align: right;
}
/* Slide feature */
.slide-feature {
text-align: center;
background-image: url('http://devonsstudio.com/businesspeople.png');
height: 550px;
}
.slide-feature img {
margin-top: 112px;
margin-bottom: 28px;
}
.slide-feature a {
display: block;
color: #6fc5e0;
font-family: "HelveticaNeueMdCn", Helvetica, sans-serif;
font-family: 'Oswald', sans-serif;
font-weight: 400;
font-size: 20px;
}
.slide-feature p {
color: red;
}
.slider-nav {
text-align: center;
margin-top: 80px;
}
.arrow-prev {
margin-right: 45px;
display: inline-block;
vertical-align: top;
margin-top: 9px;
}
.arrow-next {
margin-left: 45px;
display: inline-block;
vertical-align: top;
margin-top: 9px;
}
.slider-dots {
list-style: none;
display: inline-block;
padding-left: 0;
margin-bottom: 0;
}
.slider-dots li {
color: #bbbcbc;
display: inline;
font-size: 30px;
margin-right: 5px;
}
.slider-dots li.active-dot {
color: #363636;
}
/* App links */
.get-app {
list-style: none;
padding-bottom: 9px;
padding-left: 0px;
padding-top: 9px;
}
.get-app li {
float: left;
margin-bottom: 5px;
margin-right: 5px;
}
.get-app img {
height: 40px;
}
JAVASCRIPT
var main = function() {
$('.dropdown-toggle').click(function() {
$('.dropdown-menu').toggle();
});
$('.arrow-next').click(function(e) {
e.preventDefault();
var currentSlide = $('.active-slide');
var nextSlide = currentSlide.next();
var currentDot = $('.active-dot');
var nextDot = currentDot.next();
if(nextSlide.length === 0) {
nextSlide = $('.slide').first();
nextDot = $('.dot').first();
}
currentSlide.fadeOut(600).removeClass('active-slide');
nextSlide.fadeIn(600).addClass('active-slide');
currentDot.removeClass('active-dot');
nextDot.addClass('active-dot');
});
$('.arrow-prev').click(function(e) {
e.preventDefault();
var currentSlide = $('.active-slide');
var prevSlide = currentSlide.prev();
var currentDot = $('.active-dot');
var prevDot = currentDot.prev();
if(prevSlide.length === 0) {
prevSlide = $('.slide').last();
prevDot = $('.dot').last();
}
currentSlide.fadeOut(600).removeClass('active-slide');
prevSlide.fadeIn(600).addClass('active-slide');
currentDot.removeClass('active-dot');
prevDot.addClass('active-dot');
});
}
$(document).ready(main);
A:
Heres a DEMO FIDDLE (You only need to add your images URLS to the CSS)
The first thing you need to do is to add e.preventDefault(); to your click evennts like this:
$('.arrow-next').click(function(e) {
e.preventDefault();
//..more code
});
$('.arrow-prev').click(function(e) {
e.preventDefault();
//..more code
});
Then you need to give each slide a unique ID and give it a background for the image, just like you have a background for the .slide-feature like this:
HTML:
<div id="nyce-slide" class="slide">
<!-- ...code.. -->
</div>
<div id="mountain-slide" class="slide">
<!-- ...code.. -->
</div>
<div id="mentor-slide" class="slide">
<!-- ...code.. -->
</div>
CSS:
.slide {
text-align: center;
height: 550px;
}
#nyce-slide{
background-image: url('nyce.jpg');
}
#mentor-slide{
background-image: url('mentor.jpg');
}
#mountain-slide{
background-image: url('mountain.jpg');
}
Heres the final edit:
<body>
<div class="header">
<div class="container">
<a href="#" class="logo-icon">
<img src="img/cvs.png">
</a>
<div class="headerNi">
<div class="container">
<a href="#" class="logo-icon">
<p><a href title="Click this link to view the scheme.">NIDC Graduate Scheme</a></p>
</a>
<div id ="headerMission">CVS Health's Northern Ireland Development Centre, which opened in 2012,<br>
creates software solutions for all parts of the US company,<br>
with particular focus on internet and mobile applications.</div></div>
<ul class="menu">
<li><a href="#">Home</a></li>
<li><a href="#">About Us</a></li>
<li><a href="#">Curriculum</a></li>
<li><a href="#">Staff Profiles</a></li>
<li><a href="#">Careers</a></li>
<li><a href="#">Register</a></li>
<li class="dropdown">
<a href="#" class="dropdown-toggle">More <b class="caret"></b></a>
<ul class="dropdown-menu">
<li><a href="#">Graduate Scheme</a></li>
<li><a href="#">What we look for</a></li>
<li><a href="#">Links</a></li>
</ul>
</li>
</ul>
</div>
</div>
</div>
<div class="slider">
<div id="nyce-slide" class="slide active-slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>CVS is now hiring</h1>
<p>We will soon have a nice new building.</p>
<ul class="get-app">
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/ios.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/android.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/windows.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/blackberry.png"></a></li>
</ul>
</div>
</div>
</div>
</div>
<div id="accountability-slide" class="slide">
<div class="container">
<div class="row">
<div class="col-xs-12">
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<br></br>
<a href="#">Accountability</a>
<p>Take responsibility for your actions.</p>
</div>
</div>
</div>
</div>
<div id="mountain-slide" class="slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>Collaboration</h1>
<p>At CVS, it's important to work together with your mentor!</p>
</div>
</div>
</div>
</div>
<div id="mentor-slide" class="slide">
<div class="container">
<div class="row">
<div class="slide-copy col-xs-5">
<h1>Tenacity</h1>
<p>Be determined.</p>
<ul class="get-app">
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/ios.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/android.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/windows.png"></a></li>
<li><a href="#"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/blackberry.png"></a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
<div class="slider-nav">
<a href="#" class="arrow-prev"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/arrow-prev.png"></a>
<ul class="slider-dots">
<li class="dot active-dot">•</li>
<li class="dot">•</li>
<li class="dot">•</li>
<li class="dot">•</li>
</ul>
<a href="#" class="arrow-next"><img src="http://s3.amazonaws.com/codecademy-content/courses/ltp2/img/flipboard/arrow-next.png"></a>
</div>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script>
<script>
var main = function() {
$('.dropdown-toggle').click(function() {
$('.dropdown-menu').toggle();
});
$('.arrow-next').click(function(e) {
e.preventDefault();
var currentSlide = $('.active-slide');
var nextSlide = currentSlide.next();
var currentDot = $('.active-dot');
var nextDot = currentDot.next();
if (nextSlide.length === 0) {
nextSlide = $('.slide').first();
nextDot = $('.dot').first();
}
currentSlide.fadeOut(600).removeClass('active-slide');
nextSlide.fadeIn(600).addClass('active-slide');
currentDot.removeClass('active-dot');
nextDot.addClass('active-dot');
});
$('.arrow-prev').click(function(e) {
e.preventDefault();
var currentSlide = $('.active-slide');
var prevSlide = currentSlide.prev();
var currentDot = $('.active-dot');
var prevDot = currentDot.prev();
if (prevSlide.length === 0) {
prevSlide = $('.slide').last();
prevDot = $('.dot').last();
}
currentSlide.fadeOut(600).removeClass('active-slide');
prevSlide.fadeIn(600).addClass('active-slide');
currentDot.removeClass('active-dot');
prevDot.addClass('active-dot');
});
}
$(document).ready(main);
</script>
</body>
|
{
"pile_set_name": "StackExchange"
}
|
Q:
How can I retrieve all property values from a list of common objects?
I want to retrieve all single properties from a collection as an array:
class Foo{
public string Bar { get; set; }
public string Baz { get; set;}
}
I want to get i.e. all Bar properties from the collection
var list = new List<Foo>();
string[] allBars = list. ....
and how does it go on???
Thanks for any help.
A:
You can use:
string[] allBars = list.Select(foo => foo.Bar).ToArray();
I would only convert this to an array if you specifically need it to be in an array. If your goal is just to output the "Bar" list, you could just do:
var allBars = list.Select(foo => foo.Bar); // Will produce IEnumerable<string>
foreach(var bar in allBars)
{
// Do something with bar
}
|
{
"pile_set_name": "StackExchange"
}
|
Pixabay
A Russian lab says it has produced the country’s first artificially grown piece of meat, opening up possibilities for a sustainable alternative to traditional meat products for the country’s consumers.
The idea of “cultivating” meat in labs using in vitro animal cells has gained worldwide popularity over the past several years as a more ethical and environmentally sound way for people to eat meat without resorting to plant-based meat substitutes. The United Nations has said that livestock accounts for 14.5% of greenhouse gas emissions.
ochakovo-food.ru
The Ochakov Food Ingredients Plant (OKPI) produced a 40-gram “meatloaf” after three experiments carried out over two years, the Moscow-based lab said in a press release cited by Interfax.
“From our point of view, laboratory meat production has the highest ethical significance for modern society, since we can avoid the slaughter of living creatures to obtain meat for food,” Nikolai Shimanovsky, a molecular pharmacologist and the project’s curator, said in the press release.
The meat, which was grown using the muscle tissue of an Aberdeen Angus calf, cost 900,000 rubles ($14,000) to produce, the lab said.
Domestically produced cultured meat could appear on Russian shelves as soon as 2023, OKPI said, depending on when it is legalized. While the retail price of cultured meat is currently too high for the average consumer at 5,800 rubles ($91) per kilogram, OKPI predicts that prices will fall to 800 rubles ($12) per kilogram in the next five years.
The lab added that lab-cultivated meat is safe for humans to eat and has a shelf life twice as long as traditional meat.
Click here to view full article
|
{
"pile_set_name": "OpenWebText2"
}
|
Jodi Thelen
Jodi Thelen (born June 12, 1962) is an American actress.
Born in St. Cloud, Minnesota, Thelen made her screen debut as Georgia Miles, "a willfully free-spirited girl, naive and narcissistic" in Four Friends in 1981.
Thelen appeared on Broadway in Brighton Beach Memoirs in 1983. Her off-Broadway credits include Springtime for Henry, Largo Desolato at The Public Theater, The Nice and the Nasty at Playwrights Horizons, The Chemistry of Change, and A Body of Water, in which she played the dual roles of Sandy and Malka. For the latter, Variety praised her "stunning transformation" between roles, while The New York Times noted the "welcome comic bite" of her Malka portrayal.
Thelen's television credits include Duet, Grace Under Fire, Touched by an Angel, Joan of Arcadia and Twin Peaks.
Additional screen credits
Four Friends (1981)
Twilight Time (1982)
The Black Stallion Returns (1983)
One Night Stand (1995)
Playback (1996)
The Wedding Singer (1998)
You're Still Young (2004)
Til Death Does His Part (2007)
References
External links
Jodi Thelen at the Off-Broadway Internet Database
Category:1962 births
Category:American film actresses
Category:American stage actresses
Category:American television actresses
Category:Living people
Category:People from St. Cloud, Minnesota
Category:Actresses from Minnesota
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Some time ago, we asked our members to take part in a project compiling the stories of people who live with non epileptic seizures. Lots of people contributed and the result is this excellent book. FND Action was invited to write one of the forewords. Hopefully, this will become a ‘must read’ not just for […]
This year we have partnered up with other UK charities and groups (see details below) to have a national day of raising awareness of Functional Neurological Disorders (FND), including Non Epileptic Attack Disorder (NEAD). Our theme for Awareness Day this year is: #Voices4FND We are asking for people to get involved by taking a short […]
Research is so important as it leads to a better understanding of the condition and hopefully to better and more effective treatments. Ongoing research projects in which you may like to participate include one which assesses how different self-perceptions (self-compassion, gratitude, perfectionism) are related to how individuals with epilepsy and non-epileptic attack disorder cope with their […]
When a seizure is about to happen, you go into what is known as a dissociative state. You may feel as if you are detached from your surroundings or as if the room is moving around, or just get a feeling of unreality. Not everyone gets this kind of feeling, sometimes known as an ‘aura’. […]
One of our Facebook group members came up with a great checklist for getting the most out of your neurology appointment. Thanks Nicole! 1) Write a description of your attacks in advance with as much detail as possible about any auras, what goes on during them, what you experience and what happens post seizure and […]
Non epileptic attacks look like epileptic seizures but are not caused by electrical activity in the brain. The condition has several other names such as dissociative seizures, psychogenic non epileptic seizures (PNES), functional seizures or, fortunately used rarely now, pseudo-seizures. Many people may first be diagnosed with epilepsy and be put on anti-epileptic medication before […]... Read More
Latest News
We have been asked to take part in a new research project. Study title The Effects of Repetitive Thoughts and Feelings in People with Chronic Seizure Disorders Institution The University of Sheffield About the study The project aims to explore two main areas: 1. People who suffer seizures often worry about these and have […]
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Get the full exception type/message and stack trace
I've written an API which returns Json in the following format...
{"Success": true, Result: {...}}
{"Success": false, ExceptionId: "(some uuid)"}
The exceptions are logged. This is fine in principle for allowing someone to discuss an error without us ever telling them what it is (as a security measure). During debugging I also want to output the error message to stop me having to refer to a database all the time.
As things stand, the problem is getting useful information from the exception (either to return or log in the db)
I'm doing something like this...
try:
Ret['Result'] = <Blah>
Ret['Success'] = True
except Exception as e:
# ... Logging/ExceptionId
if Settings.DebugMode:
Ret['Exception'] = str(e)
If I put a breakpoint on the last line and inspect e in eclipse's watch window, I get KeyError: 'Something', but str(e) results in 'Something' which is very unhelpful.
I've googled and I can't find any way to get a proper message from an exception. Apparently there used to be a .message in v<2.4 but that's no help to me in 3.3
As an alternative, I tried doing:
Ret['Exception'] = str(type(e)) + ": " + str(e)
Which resulted in <class 'KeyError'>: 'job' which is a little closer but it's starting to feel more and more hackish.
I also want to include a Stack Trace but have had even less luck there - I can get the __traceback__ but of course it's not serializable and calling str() on it just results in a description of the object eg <traceback object at 0x0000000004024E48>
How can I get a decent/comprehensive error message?
A:
You probably want repr:
Ret['Exception'] = repr(e)
For the traceback, use the traceback module:
from traceback import format_exc
Ret['Traceback'] = format_exc()
|
{
"pile_set_name": "StackExchange"
}
|
Detect Memory Leaks with LeakCanary - ingve
https://realm.io/news/droidcon-ricau-memory-leaks-leakcanary/
======
parth16
We adopted LeakCanary the day it was released but we don't find it useful at
all. In fact, it makes the app almost unusable for us. Every 2-3 mins, it
would just freeze the app to capture a heap dump. As our app is quite
complicated with a big memory footprint, this just aggravates the problem. I
just hope it was more usable.
~~~
herbig
I've found LeakCanary incredibly useful at rooting out context related leaks
you probably wouldn't otherwise think of.
If you look under "no-op dependency" you'll find a solution to the issue
you're describing.
I've found it useful to have a leak canary specific build flavor or type,
which only I ever see. For all other debug / production build leak canary is
not initialized.
------
Mickydtron
"That's terrible, and no one should do that." I find that I really enjoy talks
that go through some of the antipatterns before showing the way they are
showing off. It both helps build a pattern match of when I should be thinking
about their solution, as well as being entertaining.
------
chambo622
I heard Pierre give a talk about LeakCanary at Square this summer. It's an
impressive tool and I'm already seeing it become a standard recommendation
from Google engineers and DevRel people. Props to Square for another awesome
open-source offering.
|
{
"pile_set_name": "HackerNews"
}
|
[Complex diagnosis of breast diseases in a polyclinic].
In 159 patients with malignant and in 170 patients with benign tumors the diagnosis was established on the basis of clinical data, cytographic findings, obtained in puncturing the node and the results of roentgenological studies of mammary glands. In patients with malignant tumors all these methods yielded the similar results in 71.7% of cases, none of the methods concerned helped to diagnose the lesion in 2.5% of cases. The ultimate diagnosis in patients to be directed to the clinic coincided with histological findings in 97.5%. The coincidence of diagnoses, while using the mentioned three methods in patients with benign breast tumors was noted in 72.9% of cases. The methods under consideration failed to establish the diagnosis in 3% of cases. The ultimate diagnosis coincided with histological findings in 97.0%. The presence of negative results while using each of these methods is shown to be the characteristic of their resolving power.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
We’re excited to announce Coinbase Index Fund.
Coinbase Index Fund will give investors exposure to all digital assets listed on Coinbase’s exchange, GDAX, weighted by market capitalization.
Index funds have changed the way that many people think about investing. By providing diversified exposure to a broad range of assets, index funds enable investors to track the performance of an entire asset class, rather than having to select individual assets. We’re excited to give our customers the ability to invest in the potential of blockchain-based digital assets as a whole.
At this stage, investing in Coinbase Index Fund will only be available to US-resident, accredited investors. We’re working on launching more funds which are available to all investors and cover a broader range of digital assets.
Sign up today for updates and early access to Coinbase Index Fund.
Today, we’re also introducing Coinbase Index.
Coinbase Index is a measure of the financial performance of all assets listed on GDAX, weighted by their market capitalization.
You can view the current and historical levels for Coinbase Index on our website. We are also releasing a detailed index construction and methodology document.
If you’re passionate about cryptocurrency and building new things we are hiring in San Francisco, New York and London.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
SAS - How to filter by max value from one column in a datastep
I have a yearly survey that I do some validations on. I only want to do the validations for the current year (max year in the column surveyYear). The survey comes every year so I want to have it automatised instead of writing the current year. So when the survey for 2019 comes I do not need to change the code.
Is it possible to filter surveyYear in the set statement to only take the largest number in the column? I have tried different combinations but do not sucseed. And if it is not possible, how could I solve it otherwise
I would also like to do it in a datastep and not in proc as the validation code comes in the want datastep after the set statement.
data have;
input surveyYear id score varChar$10. ;
datalines;
2016 1 10 Yes
2016 2 6 Yes
2016 3 8 Yes
2016 4 . No
2017 5 6 No
2017 6 5 No
2017 7 12 IU
2017 8 3 IU
2017 9 2 IU
2017 10 15 99999
2018 11 0 .
2018 12 . No
2018 13 10 Yes
2018 14 8 No
2018 15 11 No
2018 16 3 IU
;
run;
data want;
set have (where=(surveyYear > 2017));
/* I would like to have something that states the max surveyYear instead */
/* (where=(surveyYear = max(surveyYear))) */
run;
A:
To filter for the max you can first get hte max and then apply a filter.
proc sql noprint;
select max(year) into :latest_year from have;
quit;
Then use it in your filter.
data want;
set have (where=(year=&latest_year.));
|
{
"pile_set_name": "StackExchange"
}
|
Ghostbusters has driven divisions down several fissures in society. We’re not talking about the gold standard 1984 comedy, or the multi-million franchise that followed – we’re focusing specifically on the 2016 reboot.
It divided fans and critics, old and young, and – most tellingly – men and women. This data went viral on the film’s release. It pointed out the cavern of difference between Ghostbusters‘ ratings from men and women: the average male rating was 3.6, average female 7.7, and IMDb’s proprietary average was 5.5.
These figures are easily available for every film on IMDb so we decided to delve deeper and compare the ratings from different genders across about 14,500 top films.
Boys’ Club
Despite what many comment sections and, er, Twitter would have you believe, the gender split of people who use the internet is about 50/50. That’s not the case with people who rate films on IMDb.
For the 14,500+ films we analysed, 81% of ratings were from men and just 19% were from women. That’s a huge disparity.
When you break that down on a film-by-film basis, it means just 296 films had more ratings from women than men. The remaining 14,043 all had a more active male rating-base, and the numbers of men and women were exactly equal for 41 films.
Some of those films split 50/50 are Dirty Dancing, The Phantom of the Opera and P.S. I Love You.
Different Strokes
Ghostbusters proves how polarised IMDb ratings can be – though our suspicion is that both sides mostly were rating to make a point, rather than reflecting their opinions. That’s backed up by the fact that 45% of women voting on Ghostbusters rated it 10/10 and 35% of men voted it 1/10. Outside this example, the IMDb top charts show the broad subtle nuances in film preferences across gender lines.
Mostly, the top films for both men and women are the same. One Flew Over the Cuckoo’s Nest makes an appearance in the women’s list, but not in the men’s. Likewise for The Matrix and Star Wars: Episode V in the men’s list.
When hate starts coursing through filmgoers’ veins, the differences start to show. Who can forget Tom Green’s 2001 cult classic Freddy Got Fingered, the film that birthed ‘Daddy Would You Like Some Sausages‘?
I certainly can’t. Women on IMDb can’t either, as much as they wish they could. Unlike men, they ranked it in their ten worst films of all time, shown below. They also hold 2003’s freakish The Cat in The Hat in slightly higher esteem than men. Which is odd, given it’s the film that made Dr. Seuss’ widow ban any future live-action remakes.
By comparing the rating for each and every film, we can find the films where men and women are most split.
2016’s Ghostbusters does indeed set the record for the biggest gender differential, with a huge 3.3 point gap. Also, the entire Twilight series makes the list – though everyone’s in most agreement on the first one.
I had never heard of the rom-com Practical Magic, which Roger Ebert said “veer[s] uncertainly from horror to laughs to romance”, before writing this article – perhaps it’s because I’m a man.
Nor had I heard of Middle Men, a 2009 business drama starring Luke Wilson, but it’s the film that men rated consistently higher than women. Men only rated it 6.7, though – so maybe women just have it in for Wilson after his portrayal of Casey Kelso in That ’70s Show.
So, what conclusions can we draw from the chart?
Well, there two types of film that are divisive along gender lines: low-brow, juvenile comedies and films with female leads.
Dumb & Dumber, Freddy Got Fingered and Borat are all crammed with jokes about fecal matter and private parts – and they’re scored much higher by men than women. Almost every film with a higher female rating has a female lead – all apart from High School Musical 3: Senior Year. We can’t work out why the difference is so large here, so we’ll let you speculate in the comments.
Also, it’s worth noting the calibre of films on each list. Where women’s votes are much higher, the films are mostly mediocre blockbusters. Men’s preferred films are more diverse. Among the gross-out comedies are some critically (but not commercially) acclaimed films: Punch-Drunk Love, The Wild Bunch and Patton were all received well by both male IMDb users and the critics – Patton in fact won seven Oscars.
For Me, For You
There’s some back-of-the-napkin research out there that shows films about women have tended to earn more at the box office than ones about men. Our number-crunching also showed that films watched and rated more by women tended to have lower average scores.
A similar phenomenon has been looked at before by data-journo-extraordinaires FiveThirtyEight, which found that TV shows with a high proportion of female ratings tend to get bombarded with ratings of 1 by men. (Note: We haven’t done that same test with films, but when we do, we’ll let you know.)
You might be concerned by the seemingly huge male bias on IMDb. The back-end people actually make sure the headline film rating figure is a weighted average, and they’re really cagey about how they weight it.
There’s bound to be another film in the near future that cuts along gender lines as hard as Ghostbusters or Twilight – if you want to make a bet on it, I’d recommend scanning the comment sections on Breitbart for movie titles.
[A note on Ghostbusters (2016): our reviewer liked the film, and another of our writers was generally skeptical of the furore that accompanied the marketing.]
For any questions about the data, please contact the editor at [email protected].
|
{
"pile_set_name": "OpenWebText2"
}
|
Bad news for trade-restraining state medical boards, good news for consumers in teeth-whitening case.
On February 25, the US Supreme Court ruled that North Carolina’s dental board violated antitrust laws by shutting down hair salons and day spas that offered teeth whitening services. According to the Wall Street Journal, “The decision preserves the power of antitrust enforcers to scrutinize professional licensing organizations, even if they are designated as state-government entities.”
The dental board had claimed they were exempt from antitrust law because they were a government body, but the court found that the board was acting without proper state supervision. Writing for the court, Justice Kennedy stated that antitrust law “does not authorize the states to abandon markets to the unsupervised control of active market participants, whether trade associations or hybrid agencies.”
This ruling is a clear message of caution to all state medical boards that use their power to protect their monopoly on the practice of medicine, typically to the detriment of CAM doctors.
Take, for instance, the state of Washington’s Medical Quality Assurance Commission (MQAC), a state board infamous for its malicious treatment of integrative physicians.
We have recounted MQAC’s ongoing attacks against integrative medical practitioner Dr. Jonathan Wright. In the most recent case, Dr. Wright’s Tahoma Clinic had hired a medical doctor who had been licensed in another state, under the condition that he apply for a Washington medical license. He did so, and the doctor’s Washington license was listed as “pending” on MQAC’s website. During this period, Dr. Wright followed the legal advice he had received and monitored him closely as required by Washington law.
Suddenly, MQAC charged Dr. Wright with “aiding and abetting the unlicensed practice of medicine” because the doctor’s out-of-state license had been revoked! To add insult to injury, it soon became known that at least four MQAC staff members knew from the beginning that the doctor’s out-of-state license had been revoked and that he could therefore not be licensed in Washington, but they never put that information on the MQAC website or made any effort to inform Dr. Wright. It seems apparent that the intent was to entrap Dr. Wright by denying him any information.
Sadly, this is just one example among many of MQAC harassing integrative doctors. Examples abound where infractions by conventional doctors are overlooked entirely or given a slap on the wrist by MQAC and other state medical boards. When integrative doctors engage in similar behavior, however, MQAC throws the book at them.
This Supreme Court ruling offers hope to consumers, practitioners of integrative medicine, and all who oppose monopolies in healthcare—monopolies that usually have nothing to do with protecting public health and everything to do with protecting turf. That is why various nurses’ groups opposed the NC medical board.
The Academy of Nutrition and Dietetics (AND) has also been at this game for a while in its efforts to pass “scope-of-practice” laws whereby only Registered Dieticians (RDs) can offer nutrition services. This, of course, explicitly excludes other nutrition professionals, who are often better educated, more experienced, and better qualified than RDs.
We can only hope that this Supreme Court decision serves as a precedent— not only for monopolistic state medical boards across the country, but for state nutrition/dietetics boards as well. The recent victory of Steve Cooksey in North Carolina offers another glimmer of hope that governmental and legal bodies are starting to crack down on medical and nutritional monopolies, and we at ANH-USA applaud these actions.
|
{
"pile_set_name": "Pile-CC"
}
|
defmodule Backoffice.ExAdmin.AuthAccount do
use ExAdmin.Register
register_resource Auth.Account do
menu label: "Auth Accounts"
options resource_name: "auth_account", controller_route: "auth_accounts"
filter [:id, :email]
index do
column :id
column :email
end
show _account do
attributes_table do
row :id
row :email
row :inserted_at
row :updated_at
end
end
form account do
inputs do
input account, :email
unless account.id do
input account, :password
end
end
end
end
end
|
{
"pile_set_name": "Github"
}
|
The rise and fall of medicaid managed care in Mississippi: lessons for public health policy makers.
This article describes the development, implementation, and termination of a primary care case management program in the State of Mississippi. The study provides policy makers with critical information as to factors associated with successful implementation of current health care initiatives.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[The role of bone marrow macrophages in regulating erythropoiesis in different states of the erythron].
Stimulation and inhibition of erythropoiesis were modelled in rats to study the functional condition of central macrophages of the erythroblastic islets (EI) in the bone marrow by determining the total content of lysosomes, pH of lysosomes, activity of acid phosphatase, and 3H-thymidine inclusion in DNA. The properties of the surface charges of the EI cells were judged according to the electrophoretic mobility, the number of acid glycoproteins--according to the staining of the preparations with alcian blue. It is shown that the intensity of erythropoiesis in the EI determines the studied values. Sensitivity of EI macrophages to erythropoietin was demonstrated in EI cultivation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The management of anorectal malformation with congenital vestibular fistula: a single-stage modified anterior sagittal anorectoplasty.
This study aimed to evaluate the mid-term outcomes of single-stage modified anterior sagittal anorectoplasty (ASARP) for anorectal malformation with vestibular fistula. Twenty-six patients with congenital imperforate anus and vestibular fistula underwent single-stage modified sphincter-saving ASARP between January 2008 and December 2012. The ages of the patients at the time of operation ranged from 1 month to 5.1 years. Standard ASARP procedure was modified to avoid the incision of the external sphincter complex. Instead a potential tunnel was created through the center of external sphincter complex under the endoscopic guidance. The patients were evaluated for fecal continence and complications. Modified ASARP was successfully performed in all patients. The mean operation time was 52.2 ± 3.5 min (range 47-61 min). The operative blood loss was minimal. There was no operative complication. Wound infection occurred in 3 patients (3/26, 11.5%). All patients were followed up for 4.2 ± 1.5 years (range 2-6 years). No patient developed fecal incontinence. Three patients (3/26, 11.5%) had soiling once or twice per week. Four patients (4/26, 15.4%) had constipation amenable to diet management. Mucosal prolapse occurred in 1 patient (1/26, 3.8%). There was no recurrence of fistula, anal stenosis or anterior displacement of the neorectum. Mid-term results show that single-stage modified ASARP is an effective and safe option for patients with anorectal malformation and congenital vestibular fistula.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
142 F.3d 512
MEDICAL RECORDS ASSOCIATES, INC., Plaintiff, Appellant,v.AMERICAN EMPIRE SURPLUS LINES INSURANCE COMPANY, Defendant, Appellee.
No. 97-2145.
United States Court of Appeals,First Circuit.
Heard March 3, 1998.Decided April 30, 1998.
Thomas C. Regan for appellant.
James F. Kavanaugh, Jr. with whom James Gray Wagner was on brief for appellee.
Before LYNCH, Circuit Judge, COFFIN and BOWNES, Senior Circuit Judges.
COFFIN, Senior Circuit Judge.
1
This diversity case requires us to determine whether setting fees for copies of medical records is, under Massachusetts law, part of the "professional service" provided by a medical records processing company, thus putting it within the coverage of a professional errors and omissions insurance policy. The appellee, American Empire Surplus Lines Insurance Co. (American Empire), refused to defend and indemnify the appellant, Medical Records Associates, Inc. (MRA), in connection with a claim of overcharging. The district court concluded that the insurer acted properly because its policy does not cover billing practices. We agree, and therefore affirm the dismissal of Medical Records' case.
I. Background
2
Appellant MRA is a medical records processing business. It contracts with Massachusetts hospitals and medical centers to carry out the medical facilities' statutory obligation to provide patients or their attorneys with copies of the patients' medical records upon request. See Mass. Gen. L. ch. 111, §§ 70, 70E(g). MRA charges a fee, which is paid by the recipient of the records.
3
In August 1993, MRA received a demand letter on behalf of the law firm Lubin & Meyer, P.C., and others similarly situated, claiming that MRA had overcharged for copies and also may have included improper charges on its bills, in violation of Mass. Gen. L. ch. 93A and other state statutes. MRA referred the claim to American Empire, with whom it had an errors & omissions (E & O) policy providing defense and indemnification for claims based on the company's professional activities. American Empire declined coverage based on several policy exclusions, and MRA thereafter settled the case for an unspecified sum. The company then demanded that American Empire reimburse attorney's fees and settlement costs, but the insurer again refused. This breach of contract action followed.
4
The district court concluded that the Lubin & Meyer claim fell outside the coverage provided by the American Empire policy because the alleged overbilling was not part of MRA's professional service as a medical records processing company. It viewed billing as a "ministerial act," or "routine aftereffect," associated with, but not part of, the professional service performed by MRA. It therefore granted American Empire's motion to dismiss the complaint. MRA subsequently filed this appeal. Our review of a grant of dismissal is plenary. See Beddall v. State Street Bank & Trust Co., 137 F.3d 12, 16 (1st Cir.1998).
II. Discussion
5
A professional errors and omissions insurance policy provides limited coverage, usually as a supplement to a general comprehensive liability (CGL) policy,1 for conduct undertaken in performing or rendering professional acts or services. See, e.g., Jefferson Ins. Co. v. National Union Fire Ins. Co., 42 Mass.App. 94, 677 N.E.2d 225 (1997); American Int'l Bank v. Fidelity & Deposit Co., 49 Cal.App.4th 1558, 1574, 57 Cal.Rptr.2d 567 (1996) ("the insurer who issues a policy for errors and omissions insures against a far different risk than that insured against" under a comprehensive general liability policy). See also J. Appleman, 7A Insurance Law and Practice § 4504.01, at 310 (1979) ("An errors-and-omissions policy is professional-liability insurance providing a specialized and limited type of coverage as compared to comprehensive insurance ...") Whether the American Empire policy provides coverage is determined by comparing the allegations of the underlying claim--in this case, those contained in the Lubin & Meyer demand letter--with the policy provisions. See Sterilite Corp. v. Continental Cas. Co., 17 Mass.App. 316, 318, 458 N.E.2d 338, 340 (1983). The duty to defend arises if those allegations are "reasonably susceptible" of an interpretation that they state a covered claim, see id., but there is no duty to defend or indemnify if the allegations fall "expressly outside" the policy provisions, see Timpson v. Transamerica Ins. Co., 41 Mass.App. 344, 347, 669 N.E.2d 1092, 1095 (1996).
6
The policy at issue here states that American Empire's duty to defend attaches when a suit alleges "damages from, or connected with negligent acts, errors, omissions" within the scope of the policy's coverage. The nature of the insurance afforded by the policy is described in the indemnity provision, which states that the insurer will cover:
7
Loss which the Insured shall become legally obligated to pay ... by reason of any actual or alleged negligent act, error or omission committed in the rendering or failure to render the Professional Services stated in the Declarations.
8
The Declarations attachment identifies the professional services as "Medical Records Processor," but contains no elaboration of that term.
9
The policy thus requires American Empire to provide a defense and coverage for any claim that MRA improperly "render[ed] or fail[ed] to render the Professional Services" of a medical records processor. The question for us is whether the conduct that is the subject of the demand letter--fee-setting and billing--is among those services. Guided by the relevant cases and, as the caselaw directs, "ordinary experience and common sense," see Jefferson Ins., 42 Mass.App. at 102, 677 N.E.2d at 231 (citing Roe v. Federal Ins. Co., 412 Mass. 43, 49, 587 N.E.2d 214, 217 (1992)), we conclude that it is not.
10
A widely accepted description of the coverage provided by a professional E & O policy, framed by the Nebraska Supreme Court and endorsed repeatedly by Massachusetts courts, limits the scope of such policies to activity involving "specialized" knowledge or skill:
11
The term "professional" in the context used in the policy provision means something more than mere proficiency in the performance of a task and implies intellectual skill as contrasted with that used in an occupation for production or sale of commodities. A "professional" act or service is one arising out of a vocation, calling, occupation, or employment involving specialized knowledge, labor, or skill, and the labor or skill involved is predominantly mental or intellectual, rather than physical or manual.... In determining whether a particular act is of a professional nature or a "professional service" we must look not to the title or character of the party performing the act, but to the act itself.
12
Marx v. Hartford Acc. & Indem. Co., 183 Neb. 12, 13, 157 N.W.2d 870, 872 (1968), quoted in Roe, 412 Mass. at 48, 587 N.E.2d at 217 (noting that this standard has been "widely accepted"). Thus, even tasks performed by a professional are not covered if they are "ordinary" activities "achievable by those lacking the relevant professional training and expertise," Jefferson Ins., 42 Mass.App. at 100, 677 N.E.2d at 230.
13
In Jefferson Ins., the alleged negligent conduct involved delay by the insured company's ambulance in responding to a medical emergency. The court concluded that the basis for the delay--miscommunication between the ambulance company's radio dispatcher and the ambulance attendants about an address--did not constitute professional services. The court explained:It was rather in the nature of nonspecialized, clerical or administrative activity requiring neither special learning, intellectual skill, nor professional judgment. Nothing in the record suggests that specialized training, skill, or knowledge, beyond the normal intelligence of the ordinary prudent person, is required: to receive messages from the police, to relay those messages or otherwise supply ambulances with the information necessary for emergency medical technicians to render emergency services, to follow directions, or to locate and drive to specified addresses. To the contrary, ordinary experience and common sense ... indicate that such activities require only the everyday, practical abilities of the average adult, not the art of the adept.
14
Id. at 102, 677 N.E.2d at 231. In another of the few Massachusetts cases tackling the "professional services" issue, Camp Dresser & McKee, Inc. v. Home Ins. Co., 30 Mass.App. 318, 324-25, 568 N.E.2d 631, 635 (1991), the inquiry concerned the failure of a consulting company to warn employees working on a project of certain job hazards. In deciding that an exclusion in a CGL policy for damages arising out of professional services did not apply, the court concluded that the challenged activities properly were viewed as "management tasks" of a nonprofessional nature. In Roe, too, application of the Marx standard led to a holding that the challenged conduct was nonprofessional; a dental malpractice policy was found inapplicable to damages caused by a dentist's improper sexual relationship with a patient. 412 Mass. at 49, 587 N.E.2d at 218.2
15
These cases do not paint an unwavering line of demarcation between "professional" and "nonprofessional" activities. While the conduct in Roe was entirely outside the provision of dental services, in both Jefferson and Camp Dresser, the alleged negligence occurred during the performance--or non-performance--of tasks that are "inherent in the practice of the insured's profession," see USM Corp. v. First State Ins. Co., 420 Mass. 865, 867, 652 N.E.2d 613, 614 (1995). In those cases, it was the unskilled nature of the specific task--not the absence of a professional endeavor--that rendered the professional services exclusion inapplicable. It is perhaps of some significance that the latter two cases involved exclusions to CGL policies--removing professional services from the policies' otherwise comprehensive coverage--rather than professional E & O policies, in light of the well established canon that insurance policies are to be construed in favor of the insured, see Hazen Paper Co. v. United States Fid. & Guar. Co., 407 Mass. 689, 700, 555 N.E.2d 576, 583 (1990); Charles Dowd Box Co. v. Fireman's Fund Ins. Co., 351 Mass. 113, 119-20, 218 N.E.2d 64, 68 (1966). A court applying that maxim might well be inclined to find certain conduct to be both covered by a professional E & O policy but not excluded by a CGL policy's professional liability exclusion.
16
We think the bottom line, however, is that "professional services" as covered by an E & O policy in Massachusetts embrace those activities that distinguish a particular occupation from other occupations--as evidenced by the need for specialized learning or training--and from the ordinary activities of life and business. In this case, MRA has made a valiant effort to depict its fee-setting activity as an integral part of the service it provides to medical patients and their representatives. Because MRA is required by statute to charge a "reasonable" fee for the copies it provides, and because a high cost for copies could impact the statutorily guaranteed patient access to records, MRA makes the argument that billing is a crucial component of its professional activity--distinguishing it in that respect from other types of businesses.
17
Accepting the premise that MRA's billing practices are distinctively important because of the public policy concerns reflected by the state laws governing them does not, however, lead inevitably to the conclusion that they fall within the category of professional services. Simply because a task is regulated does not make it "professional." And, while knowing how to access a patient's file, determining whether a medical file is complete, and judging who is a proper recipient of medical records are activities that reasonably may be viewed to require particularized knowledge, we fail to see how setting a price for photocopies and producing accurate invoices are other than generic business practices.3
18
In addition, at oral argument on appeal, MRA acknowledged that the hospitals could have chosen to meet their statutory obligation of providing access to patient records by paying Medical Records directly, rather than imposing the cost on the requestors. And, before the district court, Medical Records conceded that "it could retrieve, copy and provide medical records without billing for the service." These assertions reinforce our view that the billing is most sensibly seen as either a separate service provided by Medical Records for the hospitals or, as the district court found, an incidental part of the business--but not the profession--of medical records processing. As in most other businesses, the bill is an effect of the service provided, not part of the service itself.
19
MRA suggests that characterizing the fee-setting component of its business as non-professional, because it does not satisfy the standard of "special learning acquired through considerable rigorous intellectual training," see Roe, 412 Mass. at 49, 587 N.E.2d at 217, would lead to exclusion of all of its services since any error committed by MRA could be traced to a ministerial act, e.g., searching the wrong hospital's records, omitting an important report from a medical record, or retrieving the wrong patient's file. The upshot, says MRA, is that a professional E & O policy such as the one it paid for would be worthless to a medical records business.
20
We disagree that classifying some of MRA's work as nonprofessional would cast all of it into that category. For example, in an age when privacy concerns are fundamental, judgments about who may have access to medical information are both significant and, it seems to us, not always easily made. The ability to make such decisions arguably depends on "special learning" and "intellectual skill," and the risks associated with release of records to unauthorized individuals appear substantial. Even if some aspects of record-processing, such as the copying of files or setting of fees, are deemed ministerial or "ordinary," that characterization does not negate the professional nature of its core functions.
21
Also unavailing is MRA's reliance on two attorney's fee cases, Continental Cas. Co. v. Cole, 809 F.2d 891 (D.C.Cir.1987), and Lyons v. American Home Assur. Co., 354 N.W.2d 892 (Minn.App.1984), neither of which involved a dispute over the amount charged for a professional service. In Cole, a referring attorney filed suit for breach of contract and fiduciary duty against a law firm that had not, as promised, obtained his consent to a settlement, and did not share the fees it received. In Lyons, partners of a lawyer, Lyons, sued, inter alia, for breach of fiduciary duty when Lyons forewent, without consulting them, a one-third contingency fee in favor of a smaller amount. Both cases, therefore, were attorney vs. attorney actions involving judgments in dealing with clients, not client disputes centering on the administrative procedures of setting fees or generating invoices.4
22
MRA also relies heavily on Jefferson Ins. Co., 42 Mass.App. at 94, 677 N.E.2d at 225, in which both a CGL insurer and an E & O insurer claimed the other was responsible for covering their common insured, an ambulance company. The allegedly negligent conduct was the delay in arriving at the home of a stricken individual who later died; the delay, as noted above, resulted from miscommunication of an address. The trial court allocated the loss solely to the E & O insurer, ruling that the CGL policy's professional services exclusion relieved that insurer of responsibility. On appeal, the only issue raised was whether the CGL policy also covered the loss. The appeals court held that it did, concluding that "the negligent conduct complained of did not constitute professional services," id. at 101-102, 677 N.E.2d at 230-31, and thus was not within the professional liability exclusion. Because there was no appeal from the ruling that the exclusion for professional services applied, the odd result was that both insurers were held liable.
23
MRA argues that Jefferson supports its position because the professional liability policy there was deemed applicable even though the alleged negligent conduct did not involve medical services or any activity or treatment typically thought of as "professional." Other than at that superficial level, however, Jefferson provides little support for MRA. First, the appeals court never considered whether the E & O policy provided coverage for the dispatcher/driver miscommunication, as the E & O insurer's liability was not challenged on appeal. Second, although the appeals court did explicitly recognize that the two policies overlapped in coverage in the circumstances of that case, see id. at 103 n. 18, 677 N.E.2d at 231 n. 18, it did not interpret the E & O policy. Rather, it noted the trial judge's reliance on deposition testimony from the E & O insurer's underwriting manager that the policy covered "any employee acting within the scope of his duties," and the judge's view that "the essential injury alleged in the complaint arose out of the failure to render (timely) emergency care services." Id. at 97 n. 9, 677 N.E.2d at 228 n. 9. The E & O insurer's concession of coverage therefore played a significant role in Jefferson.
24
Third, on the continuum of professional services, we think an ambulance company's failure to find the correct address quickly is much closer to the core of the emergency care profession than fee-setting is to the central function of the medical records profession. Indeed, setting a price for services and sending bills are functions of every business, and not ones inherent in the processing of medical records.
25
In sum, we are persuaded that the district court properly found that the allegedly improper conduct challenged in the Lubin & Meyer letter is not within the coverage of MRA's E & O policy. The judgment of the district court is therefore AFFIRMED.
1
Such a supplement is necessary because CGL policies often include a professional services exclusion. See Jefferson Ins. Co. v. National Union Fire Ins. Co., 42 Mass.App. 94, 96, 677 N.E.2d 225, 227 (1997)
2
The court stated: "The dentist's area of professional work involved the patient's teeth, and it is obvious that the patient's dental treatment did not require any of the acts that occurred." 412 Mass. at 50, 587 N.E.2d at 218
3
Further support for the conclusion that the policy did not include billing or fee-setting among the services for which coverage was provided is found in the policy application itself. The application asked MRA to "[d]escribe in detail the profession and professional services for which coverage is desired." MRA did not include billing or fee-setting in its response. It listed only the hands-on tasks associated with obtaining and providing copies of the medical records themselves: "Process Medical Record requests for Hospitals; Photocopy said records and forward to requestors; Provide other medical record consultative and management services, as required."
We note that not all of the activities listed would, in fact, qualify as professional services. Photocopying, for example, would quite clearly not satisfy the Marx standard.
4
The district court distinguished Cole and Lyons based on their policy language. The policies at issue in those cases provided coverage for claims "arising out of" professional services; the American Empire policy requires that the claimed harm be "by reason of" acts or omissions "committed in the rendering or failure to render the Professional Services." It is a closer question whether the asserted injury here "arose out of" MRA's professional records processing service than whether it was "by reason of" the professional service. The latter arguably requires a determination that the harm alleged was due to the manner in which professional services were provided; the former appears to require only a connection between the challenged conduct and the insured's provision of professional services. See New England Mut. Life Ins. Co. v. Liberty Mut. Ins. Co., 40 Mass.App. 722, 726, 667 N.E.2d 295, 298 (1996) ("The usual meaning ascribed to the phrase 'arising out of' is much broader than 'caused by'...."). As the policy here employs the narrower language, and MRA does not argue that that language provides coverage for conduct other than professional services, the difference in the formulations is of no consequence to our decision
|
{
"pile_set_name": "FreeLaw"
}
|
1. Field of the Invention
The present invention relates to a method of fabricating a strained silicon channel metal oxide semiconductor (MOS) transistor, and more particularly, to a method of fabricating a strained silicon channel MOS transistor by using a mask layer to avoid the defects resulting from etching the recesses and the selective epitaxial growth (SEG) process in the prior art.
2. Description of the Prior Art
The selective epitaxial growth (SEG) process is widely applied in manufacturing numerous kinds of semiconductor devices, such as complementary metal oxide semiconductor (CMOS) transistors having raised source/drain regions and strained silicon channel CMOS transistors. The SEG process is used to form an epitaxial layer on a single-crystalline substrate, in which the crystalline orientation of the epitaxial layer is almost identical to that of the substrate.
Please refer to FIG. 1 to FIG. 3. FIG. 1 to FIG. 3 shows the strained silicon channel CMOS transistors fabricating process by using the SEG process. As shown in FIG. 1, a semiconductor substrate 100 such as a silicon substrate is provided first and the semiconductor substrate 100 has a first active area 102, a second active area 104, and a shallow isolation trench (STI) 106 positioned between the first active area 102 and the second active area 104, and then a first gate structure 112 and a second gate structure 114 are formed on the semiconductor substrate 100. A cap layer 116 is formed on the first gate structure 112, the second gate structure 114, and the semiconductor substrate 100, and a photoresist layer 117 is formed on the cap layer 116 above the second active area 104 and a portion of the STI 106, wherein the thickness of the cap layer 116 is about 500 to 600 angstroms. The first gate structure 112 includes a first gate oxide layer 118, a first gate 120 positioned on the first gate oxide layer 118, a silicon nitride layer 122 positioned on the first gate 120, and a first spacer 124, and the second gate structure 114 includes a second gate oxide layer 128, a second gate 130 positioned on the second gate oxide layer 128, a silicon nitride layer 132 positioned on the second gate 130, and a second spacer 134. In general, the first gate oxide layer 118 and the second gate oxide layer 128 are composed of silicon dioxide (SiO2), and the first gate 120 and the second gate 130 are composed of doped polysilicon. The silicon nitride layer 122 and 132 are used to protect the first gate 120 and the second gate 130 respectively.
As shown in FIG. 2, the first gate structure 112 and the photoresist layer 117 are used as an etching mask to perform an etching process in order to form two recesses 140 within the first active area 102 uncovered by the first gate structure 112, and then the photoresist layer 117 is removed.
Next, as shown in FIG. 3, after a pre-cleaning step is carried out for the first active area 102 of the semiconductor substrate 100, a SEG process is carried out to form an epitaxial layer 142 composed of SiGe in the recesses 140 respectively as SiGe source/drain. A photoresist layer is formed on the second active area 104.
Please note that when performing the etching process and the pre-cleaning step for the recesses 140, the etching gas and cleaning liquid such as diluted HF (DHF), will etch the corners of silicon nitride layer 122 and a portion of the first gate 120 is exposed, as shown in FIG. 2. The SEG process, which is carried out later, will form SiGe bumps 144 on the exposed portion of the first gate 120. Please refer to FIG. 3 and FIG. 4, wherein FIG. 3 is a schematic, cross-sectional diagram, and FIG. 4 is a photograph in reality. This defect will result in spacer leakage current or short problems, and the follow-up processes will be much more difficult. For example, when fabricating the contact plugs of the source/drain regions, the SiGe bumps might contact the contact plugs and become short, i.e. the contact plug process is affected by the SiGe bumps, and the yield is also affected badly.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Experts discuss consumer rights in the digital age at forum organised by IPS
Discussing the rapidly changing digital commercial environment in Sri Lanka, experts pointed out that gaps still exist in the current laws that regulate consumer rights and data protection in mobile and online platforms.
Thishya Weragoda, Attorney at Law of the Supreme Court Sri Lanka pointed out that the Consumer Affairs Authority Act of Sri Lanka is not adequate as a dispute resolution mechanism in the current digital era where transactions take place in online trading platforms. He highlighted the need for umbrella organisations that unify traders and consumers of online platforms to resolve commercial disputes internally. He also noted that Sri Lanka lacked a proper and fair mechanism to protect online traders’ rights.
These observations were made at a forum organised by the Institute of Policy Studies of Sri Lanka (IPS) to mark the 34th World Consumer Rights Day on Wednesday (15) at the IPS Auditorium. The forum centred on the theme ‘Consumer Rights in the Digital Age’ and saw the participation of experts in the field, digital consumers, entrepreneurs and stakeholders.
IPS Deputy Director Dr. Dushni Weerakoon delivered the welcome address, highlighting the prevalence of e-commerce in Sri Lanka and its benefits and risks, and noting that 30% of the Sri Lankan population is connected to the internet today.
The keynote address was delivered by Information and Communication Technology Agency (ICTA) Legal Adviser Jayantha Fernando. His speech focused on the ‘Legal Regime for Consumers in the Digital Age’, especially addressing issues such as gaps in the Electronics Transaction Act No. 19 of 2006, cybercrime and security and data protection in the e-world. Noting that legal measures to protect consumers in the digital age could be strengthened, Fernando highlighted the need for a comprehensive data protection regime with an institutional framework.
Meanwhile, speaking from the vendors’ point of view, Takas Ltd. CEO Lahiru Pathmalal highlighted the challenges in serving consumers in the digital age. Lack of trust of consumers in online transactions, cultural and language barriers, and regulatory hurdles were some of the issues that were discussed during his presentation.
The other panellists were President’s Counsel, former Chairman of Securities and Exchange Commission (SEC) Dr. Dayanath Jayasuriya, Sri Lanka Housewives Association President Suhaila Hussain, Digital Mobility Solutions Lanka CEO Jiffrey Zulfer, as well as Thishya Weragoda. Their presentations highlighted many salient aspects of digital consumerism in Sri Lanka such as the rights of consumers, the rights of traders, the needs of consumers in the e-market, entrepreneurship to expand e-commerce in Sri Lanka and the changing regulatory landscape for consumer protection in the digital era.
The panel discussion was chaired by IPS Research Assistant Vishvanathan Subramanian. A lively Q&A session followed the panel discussion.
‘Koley iragena angey halaganta epa. Londery hathakinn suddda karanta behe’ is the advice in pithy Sinhala idiom, the President offered to his critics and opponents in a recent homily delivered at Nikaweratiya.
|
{
"pile_set_name": "Pile-CC"
}
|
Shape-controlled synthesis of porous carbons for flexible asymmetric supercapacitors.
N-Doped carbon nanomaterials have gained tremendous research interest in energy storage because of their high capacitance and chemical stability. Here, N-doped porous carbons (NPCs) with multiple shape-controlled and tunable morphologies are developed through a direct one-step pyrolysis/activation method. Typically, NPC-700-1, which is 5 nm thick and 6 μm wide, shows a high surface area (1591.5 m2 g-1) and hierarchical micro-, meso-, and macroporous architecture. The maximum specific capacitance of the as-prepared carbon nanosheets is 406 F g-1 at 1 A g-1 in KOH electrolyte. Moreover, flexible all-solid-state asymmetric supercapacitor devices assembled from NPCs and NiCo2O4 deliver a superior energy density of 42.7 W h kg-1 at 794.6 W kg-1, and good cycling ability (94% after 10 000 cycles). All the results suggest that NPCs have great potential for high performance wearable electronics and energy storage devices.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
This invention relates to a gas discharge plasma device wherein an ionizable gas is confined within an enclosure and is subjected to sufficient voltage(s) to cause the gas to discharge. This invention particularly relates to the use of hollow microspheres containing ionizable gas in a plasma display panel (PDP).
In a gas discharge plasma display, a single addressable picture element is a cell, sometimes referred to as a pixel. The cell or pixel element is defined by two or more electrodes positioned in such a way, so as to provide a voltage potential across a gap containing an ionizable gas. When sufficient voltage is applied across the gap, the gas discharges and produces light. In an AC gas discharge plasma display, the electrodes at a cell site are coated with a dielectric and insulated from the gas. In a DC gas discharge display, one or more electrodes is in direct contact with the gas. The electrodes are generally grouped in a matrix configuration to allow for selective addressing of each cell or pixel.
To form a display image, several types of voltage pulses may be applied across a plasma display cell gap. These pulses include a write pulse, which is the voltage potential sufficient to ionize the gas at the pixel site. A write pulse is selectively applied across selected cell sites. Sustain pulses are a series of pulses that produce a voltage potential across pixels to maintain ionization of cells previously ionized. An erase pulse is used to selectively extinguish ionized pixels.
The voltage at which a pixel will ionize, sustain, and erase depends on a number of factors including the distance between the electrodes, the composition of the ionizing gas, and the pressure of the ionizing gas. Also of importance is the dielectric composition and thickness. To maintain uniform electrical characteristics throughout the display it is desired that the various physical parameters adhere to required tolerances. Maintaining the required tolerance depends on cell geometry, fabrication methods, and the materials used. The prior art discloses a variety of plasma display structures, a variety of methods of construction, and a variety of materials.
Examples of AC gas discharge (plasma) devices contemplated in the practice of this invention include both monochrome (single color) AC plasma displays and multicolor (two or more colors) AC plasma displays.
Examples of monochrome AC gas discharge (plasma) displays contemplated in the practice of this invention are well known in the prior art and include those disclosed in U.S. Pat. Nos. 3,559,190 (Bitzer et al.), 3,499,167 (Baker et al.), 3,860,846 (Mayer), 3,964,050 (Mayer), 4,080,597 (Mayer), 3,646,384 (Lay), and 4,126,807 (Wedding), all incorporated herein by reference.
Examples of multicolor AC plasma displays contemplated in the practice of this invention are well known in the prior art and include those disclosed in U.S. Pat. Nos. 4,233,623 (Pavliscak), 4,320,418 (Pavliscak), 4,827,186 (Knauer et al.), 5,661,500 (Shinoda et al.), 5,674,553 (Shinoda et al.), 5,107,182 (Sano et al.), 5,182,489 (Sano), 5,075,597 (Salavin et al.), 5,742,122 (Amemiya et al.), 5,640,068 (Amemiya et al.), 5,736,815 (Amemiya), 5,541,479 (Nagakubi), 5,745,086 (Weber), and 5,793,158 (Wedding), all incorporated herein by reference.
In addition, this invention may be practiced in a DC gas discharge (plasma) display, for example as disclosed in U.S. Pat. Nos. 3,886,390 (Maloney et al.), 3,886,404 (Kurahashi et al.), 4,035,689 (Ogle et al.), and 4,532,505 (Holz et al.), all incorporated herein by reference.
In the practice of this invention, the microspheres may be used with any plasma display panel (PDP) structure. The PDP industry has used two different AC plasma display panel (PDP) structures, the two-electrode columnar discharge structure and the three-electrode surface discharge structure.
The two-electrode columnar discharge display structure is disclosed in U.S. Pat. Nos. 3,499,167 (Baker et al.) and 3,559,190 (Bitzer et al.) The two-electrode columnar discharge is also referred to as opposing electrode discharge, twin substrate discharge, or co-planar discharge. In the two-electrode columnar discharge AC plasma display structure, the sustaining voltage is continuously applied between an electrode on a rear or bottom substrate and an opposite electrode on the front or top viewing substrate. The gas discharge takes place between the two opposing electrodes in between the top viewing substrate and the bottom substrate.
The columnar discharge structure has been widely used in monochrome AC plasma displays that emit orange or red light from a neon gas discharge. Luminescent substances such as phosphors may be used in a monochrome structure to obtain a color other than neon orange.
In a multicolor PDP, two or more different luminescent substances such as phosphors are used. In a multicolor columnar discharge (PDP) structure as disclosed in U.S. Pat. No. 5,793,158 (Wedding), phosphor stripes or layers are deposited along the barrier walls and/or on the bottom substrate adjacent to and extending in the same direction as the bottom electrode. The discharge between the two opposite electrodes generates electrons and ions that bombard and deteriorate the phosphor thereby shortening the life of the phosphor and the PDP. Wedding ('158) teaches the use of phosphor overcoats to protect the phosphor from electron/ion bombardment and extend life.
In a two electrode columnar discharge PDP as disclosed by Wedding ('158), each light-emitting pixel is defined by a gas discharge between a bottom or rear electrode x and a top or front opposite electrode y, each cross-over of the two opposing arrays of bottom electrodes x and top electrodes y defining a pixel or cell.
The three-electrode multicolor surface discharge AC plasma panel structure is widely disclosed in the prior art including U.S. Pat. Nos. 5,661,500 (Shinoda et al.), 5,674,553 (Shinoda et al.), and 5,736,815 (Amemiya), all are incorporated herein by reference.
In a surface discharge PDP, each light-emitting pixel or cell is defined by the gas discharge between two electrodes on the top substrate. In a multicolor RGB display, the pixels may be called sub-pixels or sub-cells. Photons from the discharge of an ionizable gas at each pixel or sub-pixel excite a luminescent substance such as photoluminescent phosphor that emits red, blue, or green light.
In a three-electrode surface discharge AC plasma display, a sustaining voltage is applied between a pair of adjacent parallel electrodes that are on the front or top viewing substrate. These parallel electrodes are called the bulk sustain electrode and the row scan electrode. The row scan electrode is also called a row sustain electrode because of its dual functions of address and sustain. The opposing electrode on the rear or bottom substrate is a column data electrode and is used to periodically address a row scan electrode on the top substrate. The sustaining voltage is applied to the bulk sustain and row scan electrodes on the top substrate. The gas discharge takes place between the row scan and bulk sustain electrodes on the top viewing substrate.
In a three-electrode surface discharge AC plasma display color panel containing phosphor, the sustaining voltage and resulting gas discharge occurs between the electrode pairs on the top or front viewing substrate above and remote from the phosphor on the bottom substrate. This separation of the discharge from the phosphor minimizes electron bombardment and deterioration of the phosphor deposited on the walls of the barriers or in the grooves (or channels) on the bottom substrate adjacent to and/or over the third (data) electrode. Because the phosphor is spaced from the discharge between the two electrodes on the top substrate, the phosphor is subject to less electron bombardment than in a columnar discharge PDP.
This invention may be practiced with an AC and/or DC plasma display panel structure having two opposing substrates. It may also be practiced in an AC and/or DC monolithic plasma display panel structure having one substrate with or without a top or front viewing envelope or dome. Single-substrate or monolithic plasma display panel structures are disclosed by U.S. Pat. Nos. 3,860,846 (Mayer), 3,964,050 (Mayer), and 3,646,384 (Lay), all cited above and incorporated herein by reference.
Each microsphere may be positioned on the surface of the single substrate or within a substrate cavity, well, or hollow. The microsphere may be in electrical contact with 2, 3, or more electrodes.
In one embodiment of this invention, the microspheres are positioned on the surface of or within a single-substrate or monolithic gas discharge structure that has a flexible or bendable substrate.
The practice of this invention is not limited to flat surface displays. The microspheres may be positioned or located on a conformal surface of a substrate so as to conform to a predetermined shape such as a curved surface, round shape, or multiple sides.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
If the Chicago Bulls allow their season to end 11 days from now, they’ll only have themselves to blame.
They've completed the "contenders" portion of their schedule and all that remains is the "Waiting on Secaucus" segment, as every team left is lottery bound, throwing out and trying out different lineups for the rest of the season to give young players time to play and explore—similar to when the Bulls trotted out every available player for a stretch and looked like a mess a couple weeks back.
All the Bulls have to do is take care of business, but if they conducted their business the right way for most parts of the season, they wouldn’t be in this spot, scratching and clawing with a handful of games left.
A scary proposition indeed: 28 quarters to relevance and a new life or 28 quarters to another offseason where leadership and competence and direction is questioned.
Not many pictured this after Taj Gibson was traded at the deadline and certainly when Dwyane Wade’s elbow went "pop-pop" a few games back, the playoffs seemed like a Vegas mirage.
But through the ineptitude of the East and a couple unexpected wins, the Bulls are in the driver's seat. Jimmy Butler's play has risen from "Huh?" to "Wow!" and with it, expectations have to be raised.
They don't want to say it aloud, because acknowledgement means there will have to be some serious accountability on the back end if they come up short, but they know what's in front of them.
"We're not looking at it that way, we're taking it day by day," Bulls coach Fred Hoiberg said. "We have a great challenge in front of us. This was an emotional game."
Such an emotional game that Hoiberg couldn't remember if the Bulls were traveling to New Orleans or Sacramento for a game on Sunday, having to be corrected by the all-knowing media members—as all have one thing in common: Not having a single clue where things are going from here as the Bulls try to clinch a playoff berth following a one-year sabbatical.
Six games remaining, with five of them against the four worst teams in a bad Eastern Conference and another against a New Orleans Pelicans team that hasn't yet figured out how to use Anthony Davis and DeMarcus Cousins to full efficiency.
But because these are the Bulls, no game can be penciled in as an easy win. Against the Knicks, Nets, Magic and 76ers, the Bulls are a combined 6-4—and if not for a Jimmy Butler buzzer-beater against the Nets in late December, that record would be an even .500.
The combined teams have a winning percentage of .331, making it by far the easiest schedule of the teams vying for a playoff spot.
Short of the Nets, the Bulls have lost to the bottom feeders in the East—as those individual instances are chief reasons why the Bulls sit two games below .500 and needing the back end of their schedule to help push them to the postseason—along with timely collapses from the Indiana Pacers and Detroit Pistons to move things along.
Only Rajon Rondo would acknowledge the opportunity in front of his team, that the Bulls control their destiny. Ever the one who zigs when everyone else zags, Rondo has his sights set a bit higher than being tied for seventh seed in the East—which would put them in danger of playing a motivated Cleveland Cavaliers team in the first round.
"We’re not stopping at seven. We've got a nice schedule ahead of us," Rondo said. "(If) we take care of what we need to take care of, we can move up even more. I think other teams have a tougher schedule than us, but it's one game at a time."
Rondo having a hand in the Bulls being a more cohesive unit certainly elevates his level of confidence and the fact the Bulls beat the Bucks and Hawks—the teams occupying fifth and sixth seeds, respectively—gives credence to his beliefs.
"I always look at it like nobody picked us to be in the playoffs, nobody picked us to win, anyway," Butler said.
But expectations can be recalibrated and the Bulls must face the reality of what they've created and walked into: They should be somewhere when the playoffs begin two weekends from now, and it's not Bora Bora.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
In a RESTFul API, what's the correct http verb to a revert / rollback action?
Imagine a simple document management webservice strutured like this:
document/
GET -> retrieves all documents
POST -> creates a new document
document/[id]
GET -> retrieves the "latest" revision of document specified by ID
POST -> creates a new revision of the document
document/[id]/revision
GET -> retrieves all revisions of the document
POST -> Alias to POST->document/[id]
document/[id]/revision/[revisionID]
GET -> retrieves the specified revision of the document
Now, let's say I want to rollback a document to a previous arbitrary revision (for instance, from revision 5 to 3).
In a RESTful point of view, what ROUTE and what VERB should be used for this kind of operation? Should I create a new verb for rollback operations?
Keep in mind that in a rollback operation nothing is deleted. Internally, the server just recognises a different revision number as the latest.
A:
Since you have the representations for each revision available, and the rollback operation should be idempotent, the most straightforward approach would be simply doing a PUT to document/[id] with the contents of GET document/[id]/revision/[revisionid], for the revisionid you want document/[id] to be set to.
|
{
"pile_set_name": "StackExchange"
}
|
/**
* Information about a raid.
*/
export interface ChatRitualInfo {
/**
* The name of the ritual.
*
* Currently, the only known ritual is "new_chatter".
*/
ritualName: string;
/**
* The message sent with the ritual.
*
* With the "new_chatter" ritual, you can choose between a set list of emotes to send.
*/
message: string;
}
|
{
"pile_set_name": "Github"
}
|
A third (34%) of the British public is “uncomfortable” at the prospect of an ethnic minority Prime Minister
The research, conducted by YouGov for Demos and Birkbeck College and funded by the Economic and Social Research Council (ESRC), is part of a study about responses to ethnic change in Britain. It looks at how comfortable or uncomfortable respondents feel about people from ethnic minorities in certain roles and reveals widespread discomfort at non-whites filling various positions.
YouGov’s research finds that concern over a non-white Prime Minister is strongest among UKIP supporters with almost six in ten (59%) of the party’s backers being “uncomfortable” at the possibility. 45% state they are “very uncomfortable” with the idea.
The findings show sizable numbers of people who support other political parties are also resistant to a government led by someone from an ethnic minority. Over four in ten (41%) people who plan to vote Conservative, nearly three in ten (28%) Labour supporters and a quarter (25%) of Liberal Democrats say they are “uncomfortable” at the prospect of a Prime Minister from an ethnic minority.
The Birkbeck study finds that more Conservative and UKIP supporters are uncomfortable at the prospect of a non-white person in 10 Downing Street than are at ease with the idea. A third (33%) of Conservatives and one in seven (14%) UKIP backers would feel comfortable with the prospect compared to almost half (47%) of Liberal Democrats and over four in ten (43%) prospective Labour voters.
Professor Eric Kaufmann of Birkbeck College says: "Differences between party supporters are not explained by divergent age, education, regional or class profiles. Young university-educated London Tories are significantly less comfortable with a minority Prime Minister than young university-educated London Liberal Democrats."
As well as asking about the position of Prime Minister, YouGov’s survey also asked about how people feel about non-whites filling other positions of responsibility. It finds that one in six (18%) would be uncomfortable with a non-white babysitter.
The survey found that more UKIP supporters would be uncomfortable (32%) than comfortable (22%) with a babysitter from an ethnic minority. However, the opposite is true among backers of the other parties. 45% of Conservatives would be happy with a non-white babysitter and 16% would be troubled by, with similar numbers for Labour (48% and 18%). More than half (56%) of Liberal Democrats would be comfortable with the idea and 12% would be uncomfortable at the prospect.
YouGov’s research found that all the parties were closely aligned when asked about non-whites being part of the respondent’s peer group. Over four in ten (45%) prospective UKIP voters would be comfortable having a friend from an ethnic minority, compared to 58% of Conservatives and 57% of Labour and Liberal Democrat supporters. By comparison, 10% of UKIP supporters would be uncomfortable having a non-white friend, similar numbers to Conservatives (9%), Labour (9%) and Liberal Democrats (13%).
The research was commissioned by Professor Eric Kaufmann of Birkbeck College, University of London, and Demos, with funding from the ESRC. The data is part of Professor Kaufmann’s study into the responses among the white working-class to diversity in Britain.
Image: Getty
See the full poll results
|
{
"pile_set_name": "OpenWebText2"
}
|
In our continued efforts to promote a fair play environment within Hearthstone, we have permanently banned several thousand Hearthstone accounts found to be using third-party programs that automate gameplay, which is a violation of our Terms of Use.
We will continue to closely monitor Hearthstone and take action as needed to protect the game environment. Hearthstone accounts found to be cheating in any form will be permanently closed without warning.
If you believe that you’ve encountered a possible bot or other form of exploitation, please let us know by emailing our hacks team at hacks@blizzard.com.
|
{
"pile_set_name": "OpenWebText2"
}
|
beautiful & damned
A downloadable interactive fiction
❝ — nothing is permanent, not even death. ❞
After a tragic assassination cut your life short, everyone believed you were gone for good. You would have too, had you not woken to see the light again years later, aged not a day past your own death.
It was abominable, unnatural. After confronting the person who’d had a hand in your resurrection, you were met only with a cryptic answer; a vague promise of an explanation which left you with more anxiety than relief. And that person being the love of your life, Isaac, did nothing to assuage your unease.
At the back of your mind, you knew you had to accept the truth: more than two decades had passed since your death, and things had changed. Your friends and family had long moved on. What you didn’t know was whether it was for better or for worse.
❝ — ne quidem mors nos separabit. ❞
Before you and Isaac had had the chance to say your vows, you were separated by your death. A death that burned slow, and was ultimately unpreventable. However, even as time passed, it was undeniable that his love didn’t die with you.
For as long as you had known him, Isaac had always been true to you in spite of his reserved and stoic nature. And though you knew he’d never do anything to harm you, the lengths he’d gone to in order to bring you back meant you couldn’t help suspecting his actions.
You feared what he had inflicted upon himself, what he’d inflicted upon others, to restore your life. You knew that his actions would come at a steep price.
Whatever was to come, though, at least you’d always have him by your side. Until death do you part.
|
{
"pile_set_name": "Pile-CC"
}
|
In the Womb
In the Womb is a documentary television special miniseries that was premiered on March 6, 2005, on the National Geographic Channel. Originally beginning as a special about human pregnancy (titled Life Before Birth in the UK), the program features the development of embryos in the uterus of various animal species. The show makes extensive use of computer-generated imagery to recreate the real stages of the process.
Episodes
Currently, 7 episodes have been broadcast.
See also
List of programs broadcast by National Geographic Channel
References
External links
Category:National Geographic Channel original programming
Category:2005 American television series debuts
Category:2000s American documentary television series
|
{
"pile_set_name": "Wikipedia (en)"
}
|
/*******************************************************************************
* Copyright 2016-2019 Francesco Benincasa (info@abubusoft.com)
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy
* of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
******************************************************************************/
package sqlite.feature.rx.model;
import com.abubusoft.kripton.annotation.BindType;
// TODO: Auto-generated Javadoc
/**
* The Class PrefixConfig.
*/
@BindType
public class PrefixConfig {
/** The id. */
public long id;
/** The default country. */
public String defaultCountry;
/** The dual billing prefix. */
public String dualBillingPrefix;
/** The enabled. */
public boolean enabled;
/** The dialog timeout. */
public long dialogTimeout;
}
|
{
"pile_set_name": "Github"
}
|
1. Field of the Invention
The present invention relates to parental control of access to information from a computer system, for example, using a wireless telecommunications network wherein information relating to a communication device is stored and processed.
2. Background of the Invention
Typical wireless networks allow for two way telecommunications between multiple users utilizing communication devices, such as handsets or PDAs communicating with at least one base station. Advances in wireless telecommunications will soon provide a user location feature by locating a wireless communication device, for example, during an emergency. Such a feature typically utilizes a Global Positioning Satellite (GPS) system which has the capability of tracking the movements of each specific wireless communication device, such as a cellular telephone handset or PDA and its user. As GPS technology improves, the specific location of the cellular telephone handset and its user will be accurate within a few feet, or even less.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Loading state in react: Too many re-renders. React limits the number of renders to prevent an infinite loop
How do I prevent the following error:
Too many re-renders. React limits the number of renders to prevent an infinite loop.'
My code:
function App() {
const [items, setItems] = useState([]);
const [isLoading, setIsLoading] = useState(true);
if (items.length == 0) loadMore()
return <div>
{isLoading
? <div>Loading...</div>
: <ol>{items.map(i => <li>{i}</li>)}</ol>
}
<button disabled={isLoading} onClick={loadMore} style={{ width: "100%" }}>
{isLoading ? "Loading..." : "Load again"}
</button>
</div>;
function loadMore() {
setIsLoading(true); // ⚠ errors!
const uri = "https://www.reddit.com/r/reactjs.json";
fetch(uri)
.then(r => r.json())
.then(r => {
const newItems = r.data.children.map(i => i.data.title);
items.push(...newItems);
setItems([...items]);
setIsLoading(false);
});
}
}
Stackblitz link.
A:
That's because of this condition if (items.length == 0) loadMore().
Because at the beginning the length is 0, loadMore is called in which you set the state and you enter the condition again which call loadMore and so on.
Use the useEffect hook with an empty array of dependencies instead of the condition which will call the function once when the component mount.
useEffect(loadMore, [])
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Is there an alternative to a purchase order that sellers can use?
The only thing I can find is a sales order, but the problem with that is it isn't legally binding. To be more specific on what I mean:
Say that we want to sell someone business cards that includes a specific amount of time for graphic design. And we want to get paid after the graphic design, but before printing. Is there a way before graphic design starts to have a client binded to an agreement that they'll pay us for work done, and if/when design is approved, printing?
I know a contract would work, but for something as common as business cards - it seems like overkill and would put people off. Purchase orders from customers would be great, but most of them are too small to use them. Are there any options that are simple like a PO, can state a list of terms, and be very easy for customers to get through?
Every contract we've had written has been so long that customers don't fully understand the terms. Simple is better for a quick job like this so they DO get the terms clearly.
A:
There's a tradeoff in written contracts: The more precise and comprehensive, the longer they have to be.
The basics of a contract are described here, and it's possible to have a legally valid contract without writing anything at all.
But the more you care about avoiding ambiguity and covering "corner cases," the more you need an experienced attorney to write your contract.
You can ask an attorney to avoid "legalese" to the extent possible, and to try to make a contract as "easy to read and understand" as possible. Some are better at that than others.
|
{
"pile_set_name": "StackExchange"
}
|
The media is so saturated with coverage of Michael Jackson’s death and retrospectives of his life that I’m reluctant to add to the noise. Plus the story has little to do with life and culture in Portland, the reflecting upon which is Culture Shock’s ostensible mission. Last night, I spent a lovely evening with past and present theater colleagues gossiping about the local art scene. Our conversation included great material for this blog, but the phrases, "cone of silence" and "off the record" were invoked so often that I'm afraid I'm speechless. Therefore, lacking any other ideas for a weekend post, here's what I'm thinking about this morning:
Many reports are drawing the inevitable comparisons between Michael Jackson and the other “king,” Elvis Presley who died in 1977 at age 42 (which now seems so remarkably young). Parallels can be spotted between both men’s incredible artistic achievements and the intriguing and/or bizarre nature of their personal lives and tragic circumstances of their passing. Then there’s Jackson’s brief marriage to Lisa Marie Presley that further cements the two together. (As a side note, Ms. Presley posted a heart-felt and revealing comment about her relationship with Mr. Jackson on her My Space page yesterday).
All this has me thinking, “What is it that elevates an artist from star to king?” Here’s a test that I think both the King of Rock & Roll and the King of Pop met.
You may be a King in popular culture if:
1. You have influenced popular music in profound ways, demonstrating a unique genius either in creating something new or in interpreting an existing form in such a way that the public’s perception of it shifts radically. For example, while I will quibble with Elvis fans who argue that he “invented” rock and roll, I agree that he thrust the music into the marketplace in a way that profoundly redefined popular culture. The same for Michael Jackson with R&B and pop music.
2. You are more than just a singer, but are a brilliant entertainer whose performances can be described as spectacles. More than filling an arena, you deliver a concert that is packed with charismatic showmanship worthy of the best of Las Vegas and PT Barnum.
3. Your influence extends beyond your songs and recordings to areas of popular culture such as fashion, movies and television.
4. The public has a deep fascination with your private life, and your private life also happens to be weird enough to deserve that kind of attention.
5. Your popularity and influences extend beyond racial/ethnic boundaries and can be found on every continent.
6. Your career is long enough to have an impact on more than one generation of fans.
7. News of your death spreads around the world at the highest speed possible given current technology. (Thanks to Twitter, news of Jackson’s death was near instantaneous).
8. News of your death warrants front page headlines – and I mean banner headlines, not just a front page article. Also, your death is considered legitimate “breaking news” worthy of interrupting Oprah. Also, your death is recognized with special television programming of an hour or more on the major networks on the same day it is announced.
I would argue that there are many stars who fit some of these categories, but only Presley and Jackson fit all of them. I’m open to argument and debate.
Here are questions for you to ponder and comment on:
1. Have I left any defining characteristics off my list?
2. Can you think of anyone else (past or present) who would qualify?
3. Do you see anyone on the horizon who might assume the mantle of “King” in the next decade?
UPDATE: Bill Wyman (former arts editor for Salon, not the Rolling Stone) has some interesting posts about Michael Jackson on his blogsite, Hitsville, including one comparing Jackson and Presley titled, "The Lost Boys." He's also posted about the financial and legal clusterf*ck facing the Jackson estate, its creditors, and the vultures that have been pecking away for years.
6 comments:
GeorgeTaylor
said...
The closest additional entry I can think of would be John Lennon. He wasn't a solo performer, but he personified the Beatles more than any of the others, including McCartney. Any fanciful thoughts of a reunion that diehards may have retained ended with that murder, locking the Beatles firmly in the amber of our memories. Of course, his death was instant front page news in part because of the dramatic way it came about.
Though I'm not prepared to make a case for Pavarotti, he came close, and it's nice to have another musical style represented in your list. I suspect there would have been a number of others from earlier generations, had popular culture held such sway then as it does now, and had the means of communication been as abundant, fast, and aggressive as today. What about Judy Garland? Is she too niche to qualify?
Defining characteristic #8 imposes the obligation that the candidate die in order to be crowned, which is interesting and should keep people from nominating themselves. If we accept that characteristic, do we eliminate those who may have achieved royal status but for the sad fact that they lived long, productive lives and died peacefully in their beds? Must our kings and queens be resolved to a youthful (relatively) or unexpected end?
George, I had considered Mr. Lennon as well. He was certainly a genius artist and there's no debating the influence of the Beatles (speaking as someone who remembers watching their first appearance on the Ed Sullivan Show). I wouldn't put him in the "King" category for a couple of reasons. First, as you mention, I'm thinking of solo artists, and Lennon's solo career wasn't long enough (tragically), nor did it reach broadly enough to have the same impact as Presley or Jackson. By the time he was putting out solo albums, he was a niche artist (nothing wrong with that). His murder catapulted to worldwide attention because of its shock and violence. Had he quietly died from a chronic disease, by contrast, his death would certainly have been noticed and deeply grieved, but might not have reached banner headline status, methinks. Would Lennon be recognized as King if he quietly retreated into a comfortable old age with Yoko? I guess that depends on what he would have done next.
Finally, Lennon's live performance career was relatively short. What I would give to see the Beatles perform in a bar in Hamburg or Liverpool! Once they broke big, I imagine a Beatles concert was more about the screaming and fainting than the performance. Then, as as you know, the folded the live performance tent. (While I'm fantasizing, it would have been fun to have been on that rooftop while they performed tunes from "Let it Be"). Had Lennon lived, would he have mounted a series of comeback concerts? Or better yet, would Rick Rubin have produced a solo acoustic album of Lennon singing songs from Johnny Cash and ... let's say the Flaming Lips?
As for Ms. Garland, did she shape popular culture or reflect it? While beloved and revered, did she have a worldwide influence on styles, for example?
Being crowned King shouldn't require death to precede the honor. Elvis and Michael were named Kings before they went out. Is self-destructiveness a requirement? Hmmm.
How about Dylan? Influence and genius aplenty. He'll get an hour-long tribute special on the networks when he goes, along with front page headlines. Flowers, photos and stuffed animals will be placed in memorium. But King?
By the way, nobody reading my post and this comment should conclude that I'm just an old crank who thinks all these "new kids" don't rank. I don't think we're done with our need to find someone and crown them Pop King, I just can't point to anyone right now.
I don't disagree with you about Lennon, Ross (at least not substantially), merely stating that he's the closest in my living memory to your description. The term "king" (or "queen"), as you point out, suggests solo renown and brings up the question: can there be more than one king at a time? (The king is dead, long live the king.) I'm also letting personal bias creep in, I suppose. Though I acknowledge their impact and popularity, I was never an Elvis or Michael fan, but adored and admired the Beatles, especially John. But then, I'm not the sort of person who is generally called on to anoint kings and queens of popular culture.
Which brings up another issue: certainly critical regard is a defining characteristic, but there is also that rabid fan attraction that marks all kings, and many "lesser lights" as well. There are surely some demographics at play here, which may suggest, for instance, that there may never be a "queen" to compare with the kings we're talking about here. (Sidebar: Yes, Beatles concerts may have been more about the screaming than the music, but such was also the case with Elvis and Michael. And isn't that kind of electricity part of the royal regalia? Just asking.)
Here's another interesting point to consider: Both Elvis and Michael wore tarnished crowns late in their careers. That is, they fell out of favor and became sad, bad jokes, or at best parodies of themselves. Elvis in fact reinvented himself as such -- I'm thinking of the satin jump suits and the Las Vegas lounge act, so far removed from the sexy country boy image that brought him his initial fame. To be sure, they still retained their royal bloodlines (to overuse the metaphor), which became most evident once they had departed the throne -- perhaps because they both left a vacuum?
To me, perhaps the most interesting question has to do with the power they retained over their survivors -- by which I mean their fans. The feeling of personal loss for a person who did not share their lives in any substantive way, and who had been out of the spotlight for a significant length of time. I feel such loss for personal friends and relatives, whose death leaves a palpable gap in my life, but it's odd to me to see the very great, personal grief people feel for the loss of a pop culture icon. It seems to go much deeper than a general sorrow for a life snuffed out too young or regret for the art the person can no longer provide. I wonder if that's demographic as well? Does it have to do, for instance, with the generation of the star in relation to the generation of the fan base? Whatever the cause, certainly the ability to make a stong, long-lasting personal connection -- more than stage presence, more than garden-variety charisma -- must be one of the defining characterics.
Finally, I mentioned in my earlier post that there were undoubtedly kings of earlier generations and styles of music. We went to CMNW last night, so my thoughts turned to the classical field. Beethoven was a giant in his day, perhaps a self-appointed king, but I'm not sure about the rabid following. So I thought instead of Franz Liszt. A composer, yes, though not in the same league as Beethoven, but, my, what a showman! Glamorous, handsome, dramatic, flamboyant. And in that sense, he influenced generations of composer-performers to come. I suspect he was more famous for his concerts than for his music. Haven't done the research to check against the other characteristics, but I suspect he'd come out with a crown.
George, you raise several thought-provoking points in your follow-up comment--just the kind of conversation I was hoping to generate. (Others, please weigh in too).
First, I think the issue of fan adulation (or "rabid fan attraction" as you call it) is key. That's what got me thinking about the "king" issue: Who has enough clout in popular culture to engender true grieving on an international scale? Moreover, who can do that even if their power has faded? What keeps some people from being defined as "has-beens," even though they may not have produced anything new and worthwhile recently?
The "electricity" created in performance is certainly essential, though I'll bet there was plenty of that at the Jonas Bros. concert last night. Perhaps the other appropriate term is "mania." Who has the power to cause multitudes of fans to scream, faint, shout and swoon, and then eventually beat their chests and rend their clothes in sorrow? I agree that the sense of personal loss felt by fans is a defining characteristic. (John Lennon shared that one). I think it is a generational thing, tied most directly to one's memories of youth. When a revered pop star dies, a little nostalgia kicks in and we remember times of yore, perhaps more fondly than is warranted. So, we mourn the loss of our own youth along with the loss of the king.
As for the "tarnished crowns," it would have been fascinating to see how MJ's comeback concerts in London turned out. Would they have been a demonstration of his power, or a sad spectacle? Elvis may have turned into parody material, but he still had the chops (and I don't mean just karate chops).
I welcome your thoughts about past potential "kings," stretching back to Beethoven or Liszt. I don't know enough about their standing in popularity and in the imagination of their publics to comment. I do suspect that the pop King (or Queen) phenomenom is linked to the availability of mass communication--i.e., something not really made possible until radio and television.
Finally (!), one associate suggested that Madonna might fit the criteria I suggested. I'll have to think that one through. On the surface, she doesn't quite seem right, but maybe that's because I'm bored with her.
I'm going have to add Madonna to this list. She fits all of the criteria that don't involve death. Long live Madge!
I would also add that she was a master of manipulating mass media; even more than Michael Jackson. MJ often played the victim and felt like he was the unfortunate target of a vicious media. Madonna always makes us feel like she's running the show and loving every minute of it.
By the criteria I posted, I'm having a hard time excluding Madonna from royalty. Her cultural influence was huge, and she was (or is) a mighty entertainer. Still, I'm resisting this one. Perhaps the test is in the mourning. Will it feel like a personal loss to fans?
|
{
"pile_set_name": "Pile-CC"
}
|
Springville, New York
Springville is a village in the southeast part of the town of Concord in Erie County, New York, in the United States. Springville is the principal community in the town and a major business location in southern Erie County. The population was 4,296 at the 2010 census. It is part of the Buffalo–Niagara Falls Metropolitan Statistical Area. Springville was originally named "Fiddler's Green" before it was renamed "Springville".
History
In 1808, Samuel Cochran became the first permanent settler in the town. The Springville Academy, opening in 1830, became the first high school in Erie County. It was given its current name, Springville Griffith Institute, in 1867 to honor Archibald Griffith, a donor. The village of Springville was incorporated in 1834 from part of the town of Concord. The Dygert Farm on Elk Street was the site of the 1866 and 1867 Erie County Fair, and also served as training grounds for Jim Thorpe.
The Springville post office contains a mural, Fiddler's Green, painted in 1939 by Victoria Hutson Huntley. Federally commissioned murals were produced from 1934 to 1943 in the United States through the Section of Painting and Sculpture, later called the Section of Fine Arts, of the Treasury Department.
Springville is home to five National Register of Historic Places-listed (NRHP) buildings (Citizens National Bank; Buffalo, Rochester and Pittsburgh Railroad Station; Baptist Church of Springville; United States Post Office; Scoby Power Plant and Dam) and the NRHP-listed East Main-Mechanic Streets Historic District and East Hill Historic District.
Geography
According to the United States Census Bureau, the village has a total area of , of which is land and 0.27% is water.
Cattaraugus Creek and Cattaraugus County are south of the village.
New York State Route 39 (NY 39), a major east–west truck road, becomes Main Street upon entering Springville. U.S. Route 219, the Southern Expressway, passes just west of the village. NY 240 (Vaughn Street), a major north–south truck road, marks the east border of the village.
Demographics
As of the census of 2000, there were 4,252 people, 1,705 households, and 1,091 families residing in the village. The population density was 1,164.4 people per square mile (449.8/km2). There were 1,798 housing units at an average density of 492.4 per square mile (190.2/km2). The racial makeup of the village was 98.28% White, 0.49% African American, 0.21% Native American, 0.40% Asian, 0.02% Pacific Islander, 0.19% from other races, and 0.40% from two or more races. Hispanic or Latino of any race were 0.61% of the population.
There were 1,705 households out of which 31.4% had children under the age of 18 living with them, 49.3% were married couples living together, 10.3% had a female householder with no husband present, and 36.0% were non-families. 31.5% of all households were made up of individuals and 16.3% had someone living alone who was 65 years of age or older. The average household size was 2.40 and the average family size was 3.01.
The population was spread out in the village with 25.1% under the age of 18, 7.1% from 18 to 24, 26.9% from 25 to 44, 21.8% from 45 to 64, and 19.1% who were 65 years of age or older. The median age was 40 years. For every 100 females, there were 85.8 males. For every 100 females age 18 and over, there were 82.1 males.
The median income for a household in the village was $38,221, and the median income for a family was $49,422. Males had a median income of $39,452 versus $24,621 for females. The per capita income for the village was $19,302. About 5.4% of families and 7.4% of the population were below the poverty line, including 11.0% of those under age 18 and 3.5% of those age 65 or over.
Notable people
C. DeForest Cummings, former Syracuse Orange football coach
Emmons Dunbar, agriculturalist, college football coach
Erwin F. Dygert, noted importer of Belgian horses, and harness racing
Elon Howard Eaton, ornithologist, attended school in Springville
Ken Knowlton, computer graphics pioneer
Asher P. Nichols, state senator
Jessica Orsini, transgender alderwoman for Centralia, Missouri
Tom Reynolds, Republican politician
George Schuster, driver in the 1908 New York to Paris Auto Race
Allen D. Scott, former New York state senator
Bill Simon, songwriter (with Jack Yellen), jazz critic, saxophonist
Joey Snyder III, pro golfer
Bill Warner, college football coach, brother of Pop Warner
Glenn "Pop" Warner, coach, prompter, helped shape football into the form it is played today
Christine Weidinger, opera singer
Jack Yellen, songwriter (including "Ain't She Sweet" and the Franklin D. Roosevelt campaign tune "Happy Days Are Here Again")
Notable businesses and attractions
Springville Center for the Arts - A community multi-arts center that produces theater shows, gallery exhibits, workshops and more. The original establishment closed in 2007. Their new establishment is the former Baptist Church of Springville building on the corner of the four way stop of North Buffalo Street and Franklin Street.
Bertrand Chaffee Hospital - Opened in 1946, this 24-bed acute care hospital also has primary care, cardiology, emergency, surgical and outpatient services.
Concord Historical Society - Operates a general store in the style of Springville's early days, the Pop Warner Museum, Lucy Bensley Library, educational programs and coordinates the annual Fiddler's Green Country and Bluegrass Festival.
Gentner Commission Market - A weekly auction and market that includes farm fresh produce, flea market items, animal barns and more. It is held every Wednesday since 1939.
Joylan Theatre - A one-screen movie theater showing first-run films. The theater at this location was built in 1947.
Springville Area Chamber of Commerce The chamber coordinates events and activities to promote business and commerce in the greater Springville area.
Springville Journal Weekly subscription newspaper of record for over 150 years.
Schools
Springville-Griffith Institute Central School District
St. Aloysius Regional School
References
External links
Village of Springville official website
Concord Industrial Development Agency
Springville Chamber of Commerce
History of Springville
Springville Center for the Arts
Category:Villages in New York (state)
Category:Buffalo–Niagara Falls metropolitan area
Category:Villages in Erie County, New York
|
{
"pile_set_name": "Wikipedia (en)"
}
|
In the 29th round of Iran’s Premier League (IPL), capital-based club Esteqlal will meet Tractorsazi at Tehran’s Azadi Stadium.
Esteqlal is on top of the IPL table with 56 points while its opponent with a point less is second in the 18-team league table, Mehr News Agency wrote.
Many believe that a rivalry between the two teams is more than just a game. Amir Qalenoei, who is at the helm of the team, was Tractor’s boss. During his term, Tractor gained good results and took the Asian berth.
In the previous round of the competitions, Esteqlal thanks to a late penalty kick rescued from an away loss. The team need the full points of the home match to wide the gap with its close follower.
On the other side of the pitch, Tractor is in good shape. Following its victory against Persepolis and its good performance in the Asian competition, the team needs the full points of the game to dethrone Esteqlal.
Esteqlal’s loss in the game, will send them to the third position. Former Esteqlal player Mehdi Seyyed Salehi hopes to shine in this game and even score against his former club.
Away from this important game, four other matches will be held. In Isfahan, the title-holder Sepahan will meet Saba at Fouladshahr Stadium. The team has collected 53 points to stand third while Saba with 37 points is 9th.
The fixture of the other games are as follows;
Damash vs Naft Abadan
Mes vs Paykan
Saipa vs Malavan
Ferguson ‘Distraught’ After Man Utd Go Out
Manchester United manager Sir Alex Ferguson was too “distraught” to face the media after their Champions League exit against Real Madrid at Old Trafford.
Ferguson was visibly enraged after Turkish referee Cuneyt Cakir sent off Nani for a high challenge on Real’s Alvaro Arbeloa after 56 minutes with United leading through Sergio Ramos’s own goal, BBC wrote.
Real took advantage of the dismissal with quick goals from Luka Modric and Cristiano Ronaldo on his return to Old Trafford to confirm a 2-1 win on the night and 3-2 aggregate victory to reach the last eight.
United assistant manager Mike Phelan replaced Ferguson at the post-match media conference and said: “It’s a distraught dressing room and a distraught manager. That’s why I am sitting here now.
“I don’t think the manager is in any fit state to talk to the referee about the decision. It speaks volumes that I am sitting here now rather than the manager of this fantastic football club.”
Phelan continued, “We are extremely disappointed and wondering what has happened and why it has happened.
“We feel as though we had the tactics right for the game on such a big occasion. We felt we were comfortable at 0-0. It was where we wanted to be, then we scored the goal that put us in a commanding position.
“We were in reasonable control and then the game totally changed. The decision was amazing but we had to carry on because it is hard enough playing Real Madrid with 11 men.
“Referees are there to make decisions but there is also an element of doing the right thing. All the media and a television audience watching all over the world will have an opinion on the decision but it was a disappointing one and it spoiled the game.”
Thunder Hold Off Lakers’ Charge
There are times when coach Scott Brooks figures the best way to get his Oklahoma City Thunder to stop turning the ball over is to simply stop talking about the problem in the hope it goes away.
For at least one night, the Thunder’s turnover trouble almost vanished--and in record-setting fashion, AP wrote.
Russell Westbrook had 37 points and 10 rebounds, Kevin Durant scored 26, and Oklahoma City tied the NBA record with only two turnovers in a 122-105 victory over Los Angeles on Tuesday night in which Kobe Bryant hurt his elbow and the Lakers fell back below .500.
‘’It was just one of those games. We didn’t turn the ball over,’’ Brooks said, struggling to explain how the team that committed the most turnovers in the NBA last season and the second-most so far this season pulled off the feat.
‘’I mean, it’s only happened a few times in NBA history.’’
Westbrook had one of the miscues, getting called for traveling in the fourth quarter to keep Oklahoma City from holding the record outright. Ronnie Brewer had the other on a pass to Nick Collison that went out of bounds.
Otherwise, it was a clean game right down to a 12-0 run to finish it as the Lakers cut an 18-point deficit down to five before going scoreless over the final 6 minutes.
Milwaukee set the turnovers record in a game against Indiana on April 1, 2006, and Cleveland tied it in an overtime game against Portland on March 19, 2009.
Barca Probe ‘Spy’ Claims
Barcelona announced an internal investigation Tuesday after reports in Spain claimed that the club had commissioned detective agencies to spy on a number of their star players.
The Catalan giants confirmed on their official website that the club spent a total of 3.1 million euros ($4.04 million) on “espionage” between 2008 and 2010, CNN reported.
The money went to the now defunct Metodo 3 agency and another company called the Intelligence Bureau and Cyber Experience.
Barcelona said that “legal action will be taken to preserve the image of the club, the privacy of its employees and the legacy of the institution.”
Spokeman Toni Freixa added, “FC Barcelona wants to know ‘who was spied on and why.’ “
The alleged activities took place under the presidency of Joan Laporta, who was at the helm from 2003-2010, one of the most successful spells for the famous Spanish club.
Current president Sandro Rosell, a fierce critic of Laporta, succeeded him in June 2010, winning 60% of a vote among Barcelona club members.
The relationship between the two has remained cool since Rosell was elected, but on the pitch under former coach Pep Guardiola and his successor Tito Vilanova, the triumphs have continued.
Reports on the Spanish website El Confidencial, claimed Metodo 3 trailed defender Gerard Pique and his pop star wife Shakira in 2010--following them to a concert to log their activities.
Former stars Samuel Eto’o and Brazil’s Ronaldinho were also believed to have been monitored in the past.
The allegations come as Barcelona has suffered a mini slump in form, twice losing to rivals Real Madrid and having to cope with the absence of Vilanova, who is battling cancer.
Vettel Under Pressure
Sebastian Vettel and his Red Bull team have left their Formula One rivals trailing in their wake during a three-year domination of the sport.
But ahead of the 2013 season getting underway in Australia later this month, it is the triple world champion and his all-conquering team which has some catching up to do after a preseason which has not gone entirely to plan, CNN wrote.
Red Bull, and every other team, was left in Mercedes’ rear-view mirrors at the final preseason test in Barcelona last weekend, with Vettel failing to top the charts at any of the offseason practice.
Vettel insists there is still time for Red Bull to turn it around ahead of 2013’s curtain raiser on March 17, when he will begin his bid to become only the third driver to win four consecutive championships.
“I would have loved to work more on the set-up, but I don’t think that this is only me. I think everybody struggled in that area,” the 25-year-old told Formula One’s official website.
“We cannot be satisfied with the state of affairs right now ... there is still time before Melbourne to make some significant changes.”
Vettel has been left frustrated by the tires introduced by the sport’s official supplier Pirelli, which are softer than in 2012.
Pirelli claim the new tires will speed up races and promote overtaking.
“It is extremely difficult to pinpoint any exact area we are not satisfied with because the tires are not consistent enough,” continued Vettel.
Abedzadeh Invites to U-23
Amir Abedzadeh, son of former Iran goalkeeper Ahmad-Reza Abedzadeh, was invited to the country’s U-23 football team on Tuesday.
Iran’s U-23 football team will participate in the tournament in Doha, Qatar in late March, Mehr News Agency reported.
Iran U-23 coach, Alireza Mansourian, has summoned 35 players for the tournament.
Iran U-23 football team is scheduled to play Morocco on March 21. The team will face Qatar and Turkey on 23rd and 25th March respectively.
Abedzadeh is Persepolis’s third keeper. His father is Iran’s legendary keeper, who hanged up his gloves in 2000.
He led Iran to the World Cup 1998 in a dramatic match against Australia in Melbourne.
Arsenal to Play Friendly In Vietnam
English club Arsenal will play a friendly against Vietnam’s national team on July 17 making the north London side the first Premier League team to visit the communist country.
Arsenal will spend three days promoting the club in the capital Hanoi from July 15-17 and will field a full-strength team against the national side at the My Dinh National Stadium on the final day, the Vietnam Football Federation said on its website.
According to Reuters, premier League rivals Chelsea, Manchester United and Liverpool are also making trips this summer to Southeast Asia, where top European clubs have huge followings and draw large revenues from television and merchandising.
Italian giants AS Roma will also play in Vietnam, seven weeks earlier than Arsenal on June 2, according to Vietnam’s state media.
Arsenal has for several years given support to Vietnamese soccer through a local project aimed at developing young players, the Hoang Anh Gia Lai-Arsenal JMG Academy.
Japanese Jeweler Unveils Messi’s Golden Foot
If anyone doubts Lionel Messi has a golden foot, now there’s proof.
A pure gold replica of the Barcelona forward’s left foot, valued at $5.25 million, was unveiled Wednesday in Tokyo. The foot was created by Japanese jeweler Ginza Tanaka to commemorate the soccer player’s achievements, AP wrote.
‘’It’s exceptional. You can see each line in the foot,’’ said Messi’s brother, Rodrigo. ‘’It’s an impressive piece of work.’’
The jeweler said he cast Messi’s foot in Spain at the end of 2012.
‘’We loved the sound of making the ‘golden left foot,’ and it being gold, it was our goal to make the project of recreating Messi’s left foot a reality,’’ said Masakazu Tanaka, president of the company that made the piece.
The foot will go on sale on Thursday, with an endorsement from the Leo Messi Foundation, which helps children at risk around the world.
Other golden artifacts going on sale are Messi’s golden footprint worth $94,500 and the ‘’Golden Foot Mini,’’ which is half the size of the actual golden foot, worth $42,000.
Part of the proceeds will go to Messi’s foundation, which in turn will go to support children in areas affected by the earthquake and tsunami disaster that hit Japan in March 2011.
Austin Gets Final MotoGP Inspection
Austin’s Circuit of the Americas has undergone its final FIM inspection prior to MotoGP’s test debut at the Texan venue next week.
The leading MotoGP teams will test at Austin from March 12-14, AutoSport wrote.
Its inaugural MotoGP race then takes place as round two of the 2013 championship on April 19-21.
The FIM’s new grand prix safety officer Franco Uncini carried out the inspection on Tuesday.
He recommended some modifications to barrier openings, additional air fences and the removal of some kerbs in order to prepare the track for MotoGP.
“I like Circuit of the Americas and the facilities are really impressive: it’s picturesque, modern, technical, difficult, challenging and interesting,” said Uncini.
“We should be seeing some good races in April because the corners allow for no respite for the riders and should deliver plenty of overtaking.
“The tour we’ve done this week was to polish over some safety details, as the homologation of the circuit had already been completed.
“We are confident the event will run smoothly because we are working with highly professional people who enjoyed a great debut last season with Formula 1.”
Klitschko Defends Against Pianeta
Wladimir Klitschko will defend his WBA, IBF and WBO heavyweight titles against former sparring partner Francesco Pianeta in Mannheim on 4 May.
|
{
"pile_set_name": "Pile-CC"
}
|
: Fuck porn jakarta escort
ASIAN WOMAN BRISBANE CBD SENSUAL MASSAGE
974
Fuck porn jakarta escort
136
TANGA PAIGE THOMAS ESCORT
Webcamsex room adelaide
Cream-pie For 18y Old Hooker From Jakarta Busty Amateur Escort Sucks And Fucks With Cum On Ass .. Indonesian Club Girl Get Fucked In Jakarta Hotel. Watch Indonesian Club Girl get Fucked in Jakarta Hotel video on xHamster - the ultimate archive of free Asian Indonesian Girl hardcore porn tube movies!. 17 Aug Jakarta sex guide brothels erotic massage prostitutes girls. All cities have The sex clubs in Jakarta are some of the best brothels in the world.
|
{
"pile_set_name": "Pile-CC"
}
|
The present invention deals with a garment. More specifically, the present invention deals with a garment that is provided with a handle that can be used to train a person in the use of such things as bicycles, in-line roller skates, roller skates, skateboards, etc.
To date, children the world over have learned to ride a bicycle by what is essentially a two step process. In the first step, on either a tricycle, or bicycle with training wheels, the child masters the bio-mechanics of peddling and steering through generally unsupervised trial and error. In the second step, the child is aided by an adult, parent or older sibling who then takes over, in lieu of the training wheels, responsibility for holding the bicycle upright. Few children are able to ride unassisted immediately after having their training wheels removed. Thus, it is clear that having the bicycle held upright for them, either by training wheels or by the hand of the parent or adult instructor, does precious little to facilitate the child's learning to maintain the bicycle in balance beneath them, while posing in the case of the latter unnecessary risk of injury to both the child and the adult instructor or trainer.
Accordingly, several guidance apparatus have been developed with the aim of permitting a trainer to control the balance of an inexperienced rider during training. Of these, most are designed to be attached in some way to the bicycle itself. While the majority of those apparatus do serve to minimize the aforementioned risk to the child student and their adult instructor, each serves (much like training wheels) as mere means by which to hold the bicycle up, independent of the child student, the intended subject of the instruction. Also, invariably, assembly by the end user is required for these apparatus.
Alternately, there seem to be few prior devices which aim simultaneously to expedite the training of a child by an adult to maintain balance on a bicycle, while reducing the risk of strain or injury to the child or the adult trainer during the course of instruction by means of supporting the child independent of the bicycle. These, prior devices generally either fail to offer the adult/instructor adequate positive lateral control over the child student, or they fail to provide adequate safety advantages to render the devices either effective, or commercially viable.
Of the first and largest group, those training aides designed for attachment to a bicycle, the vast majority vary in small degree and rely on the design of various attachment mechanisms (for which assembly is required). A number of these types of systems are set out in U.S. Pat. Nos. 6,488,302 B2; 6,244,612 B1; 6,120,050; 5,395,130; 5,303,944; 5,154,096; 4,903,975; 3,650,544.
Of the second group, or general type of bicycle training aids (those designed to support the child student independent of the bicycle), four will be described as being illustrative.
The first is set out in U.S. Pat. No. 5,226,820 entitled BICYCLE RIDING TRAINING DEVICE. The device amounts to little more than a length of rope looped around a child's waist and through a sliding handle of sorts held behind the child by the adult/instructor. This device offers the child little or no upper body support in a fall. Further, with no means of preventing the device from sliding around the child's waist, it offers the adult/instructor little or no lateral control over the child by which to guide the child away from impending obstacles or other hazards. Further, this device offers little more commercial viability than that of a length of rope available at any hardware store.
The second bicycle training aid is set out in U.S. Pat. No. 5,382,040 entitled BICYCLE TRAINING AID. The device comprises a “body member” or wooden board strapped to a child's back with a pivoting arm or handle mounted to the board perpendicular to the child's mid back. Implementation of the handle itself is ergonomically awkward, placing the hand of the instructor in a compromised position with the thumb over extended atop the horizontal handle. This poses a risk of injury to the instructor's hand, forearm or wrist and further injury to the child under subsequent loss of control on the part of the injured instructor. In the event of a fall, as with the device set out in U.S. Pat. No. 5,226,820, the board and straps of this device include no means of distributing the force of the straps over a broad section of the child's torso and so pose risk of injury to the child, while offering substantially no means for preventing the device from sliding around the child's torso. This reduces the already compromised lateral control offered to the instructor. As for fit, the device appears to be generally uncomfortable, for both the instructor and the child.
A third device is set out in U.S. Pat. No. 5,540,188 entitled TODDLER HARNES. This device comprises two padded loops of fabric connected adjacently by means of a “grasping portion” or handle of sorts. With one loop stretched across the child's chest, under the arms and up over the head from behind, and the other stretched across the child's back, under the arms and up over the head from the front. These crisscrossing loops depend on the child keeping his or her arms at their sides lest the whole thing slips off like any shirt when lifted from above by the would-be instructor. Further, held from well above the child's head, grasping hand held at shoulder height, the overlong loops offer the instructor little if any lateral control and generally render the device untenable for its stated alternate purpose as a bicycle training aid.
Another device is set out in U.S. Pat. No. 5,634,439 entitled BIKER RIDER BALANCE BELT. The device comprises a wide band of fabric secured about the child/student's upper torso, under the arms, with fabric strap type loops serving as handles in the back. This device, as with those set out in U.S. Pat. Nos. 5,226,820 and 5,382,040, offers no means by which to prevent the device from sliding around the child. This, coupled with the undesirable slack in the loop handles renders, negligible the lateral control, safety and overall utility offered by the device.
Other devices exist as well. For example, U.S. Pat. No. 5,074,795 entitled METHOD FOR TEACHING CHILDREN TO SKI, like U.S. Pat. No. 5,634,439, shows essentially a wide torso encircling band with two over-long slack loop handles or “reigns” by which an instructor exercises control over the child student. In addition, US Patent Application Publication Number US 2002/0096858 A1 describes yet another device for attaching a handle to a bicycle.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Calendar
Category Archives: Technology
From a ball with a camera embedded, to a flashlight that is powered by body heat, to a contact lens that zooms on its own — See selected six from the future that are already here: Garmin Smartphone HUD In-car GPS navigation requires one to
Most of us use computers for several reasons and these have become one of the most integral parts of our daily life. It would be very strange to find an office without computers and other peripherals. Why so far? To find a home without a
Android phones are everywhere and with almost everyone. Though these are the most loved devices of these times, there are few challenges as well those we face to have it well maintained. There are few things that need to be done to have your
Facebook has made enormous changes in our lives and also to their own privacy settings every now and then. The privacy settings have been drastically changed over the years Facebook has evolved. How to block your friends posting photos and comments directly to your Timeline?
When using gadgets such as smart phones and tablets we come across a very common issue – Low battery. As the applications and OS that’s running on your gadgets eats up all the energy at the time when you least expect it. Specially, if you
When it comes to Smartphones we surely know that Android is way forward than that of other competitive one’s. While the Android market is storming with many android phones launching and making waves in the market along with their extra ordinary features and with affordable
After several rumours hinting at the new features that Microsoft’s Windows 8.1 would bring, the Redmond giant has officially announced some of them through a new blog post taking a “first look.” According to Microsoft Windows 8.1 will not just respond to customer feedback, will add
It is time again to have a different interface when it comes to Gmail. Isn’t it just superb? Google is rolling out a revamped Gmail to all its users starting today promising to put them back in control of their inbox. The new interface allows users to
Are you one among those who like me finds it difficult to share images on social networks, emails, photo sharing sites and messaging services due to its file size using your android smartphones? Well, I did face some issues due to this, until I came
It was time for me to change my old PC and shift to a brand new model and new species of computers around with tremendous speed and huge data space in hard disks. If you did like me then for sure you would have also
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Why can't I be happy in the pursuit of Nirvana?
If you are happy, you will have to face sorrow right? So I am being told to just observe everything with equanimity or Anapana. TBH which is very boring So I observed that instead of thinking of everything leads to sorrow in this world, why not enjoy this moment. (Is is necessary to keep observing when you are happy.)
After all we want Nirvana because we are looking for a being in a state of something eternal, Which is equanimity.
According to me Equanimity is not happiness for sure.
In this Video Philosopher and writer Jim Holt says we can't live like dead humans as per Buddhism and think like a western.
I have experienced intoxication occasionally and I was in to Anapana for nearly a week and I have kept myself safe from any kind of intoxication for a year, everything was going smooth breathing while walking, lying, sitting, talking not always but I was satisfied with my pace of being aware.
But this weekend I had nothing to do and suddenly a teeny tiny thought arises which says to get drunk and at the same time one of my friend said the same thing and we get drunk.
I was still trying to figure out what is happening in mind, Why I am feeling different now.
I know I should not be drinking is there anyway I can punish myself. I was actually scared of getting attacked by mind when alone. It attacked.
Should i keep in doing Anapana as i believes that it cuts your Karmic chain for the moment.
A:
If you are happy, you will have to face sorrow right? So I am being told to just observe everything with equanimity or Anapana. TBH which is very boring So I observed that instead of thinking of everything leads to sorrow in this world, why not enjoy this moment. (Is is necessary to keep observing when you are happy.)
To answer this section:
You are temporarily right to try to be happy this moment. A wise person would think "How can I maintain this happiness forever without changing?". A sensible person, upon contemplating the matter for some time, realizes there is nothing created that he or she can retain forever. He or she furthermore realizes such possessions can't be guaranteed to be with oneself beyond death. Thus, a wise person decides the boring path provides freedom from such a mass, sorrow and disappointment.
After all we want Nirvana because we are looking for a being in a
state of something eternal, Which is equanimity
According to me Equanimity is not happiness for sure.
To answer this section:
Eternity is a word used to describe something that was created and lasts for ever. Nirvana isn't such a thing that is created. Nirvana has not been described as equanimity in the Tipitaka to my knowledge.
I have experienced intoxication occasionally and I was in to Anapana
for nearly a week and I have kept myself safe from any kind of
intoxication for a year, everything was going smooth breathing while
walking, lying, sitting, talking not always but I was satisfied with
my pace of being aware.
But this weekend I had nothing to do and suddenly a teeny tiny thought
arises which says to get drunk and at the same time one of my friend
said the same thing and we get drunk.
I was still trying to figure out what is happening in mind, Why I am
feeling different now.
To answer this section:
Where is that thought now? Did it come to your mind out of your own will? Can you control it? If you can't control it, is it suitable to think the thought is me, mine, or my soul?
I know I should not be drinking is there anyway I can punish myself. I
was actually scared of getting attacked by mind when alone. It
attacked.
To answer this section:
I suggest your reward yourself by contemplating the benefits of avoiding drinking rather than punishing yourself. I'm sure there's plenty online resources to explain these benefits apart from a Buddhist context.
Should i keep in doing Anapana as i believes that it cuts your Karmic
chain for the moment.
To answer this section:
False. If a person can cut the karmic chain for a moment as such and dies, he'll attain Nirvana. There is no moment a lay person is void of Karmic chain (sankhara). This is what binds us to bhava (world, so to speak).
I suggest your practice Satipattana Meditating which includes Anapana Sathi and extends a more insightful consciousness to day to day activity.
Buddha has asked us (citation needed) to travel in the Noble Eightfold Path even if it means crying along the way. Why Buddha says so is because he knows, and intelligent people understand that if someone missed the opportunity to understand the Four Noble Truths, the resultant suffering can be extremely large.
Buddha has said
Nibbanam Paraman Sukhan
Which translates to
Ultimate Luxury is Nibbana
|
{
"pile_set_name": "StackExchange"
}
|
1. Field of the Invention
The invention relates to an improved process for the continuous preparation of .alpha.- and/or .beta.-ionone or homologs of these compounds by cyclizing pseudoionones using concentrated sulfuric acid in the presence of organic solvents or diluents and by diluting the reaction mixture with water.
2. Description of the Background
It is known that a mixture of .alpha.- and .beta.-ionones is obtained on cyclization of pseudoionone in the presence of acids such as sulfuric acid or phosphoric acid. The ratio of the amounts in which these compounds are produced depends greatly on the conditions under which the reaction takes place.
Since both .alpha.-ionone and .beta.-ionone are of great industrial importance, there has been no lack of attempts to develop a maximally advantageous process for their preparation.
Processes for cyclizing pseudoionone with concentrated sulfuric acid have proven particularly suitable. Since this reaction is highly exothermic, it is very important to remove the heat produced in the reaction as quickly as possible in order to avoid local overheating. For this purpose, in the known processes, diluents have been added to the reaction mixture. Thus, for example, DE Patents 10 80 105 and 16 68 505 disclose the use of aliphatic or cycloaliphatic hydrocarbons. The disadvantage of this process is that resins are relatively quickly deposited in the reaction vessels in the procedure described therein, and interfere with continuous operation.
According to IN patent 77 225, the reaction is carried out in the presence of aliphatic chlorinated hydrocarbons such as methylene chloride, ethylene dichloride, chloroform and tetrachloromethane at temperatures from -10.degree. C. to +10.degree. C.
According to the description in DE-A 15 68 108, this Indian process is disadvantageous because the aliphatic chlorinated hydrocarbons eliminate hydrogen chloride with sulfuric acid, leading within a short time to corrosion of the apparatus used. To avoid these disadvantages, it is recommended to carry out the cyclization at -25.degree. C. to +10.degree. C. in a mixture of low-boiling hydrocarbons and chlorinated hydrocarbons. The disadvantage of the two last-mentioned processes is that the reaction temperature must be kept low with costly coolants in order to obtain good ionone yields.
Further known processes entail removing the considerable heat of cyclization by evaporative cooling with liquid gases. Thus, liquid sulfur dioxyde [sic] is used in the process of DE patent 16 68 496, propane, butane or isobutane is used in the process of DE patent 16 68 505, and methyl chloride is used in the process of DE patent 19 17 132, at temperatures from -25.degree. C. to room temperature, preferably temperatures below +10.degree. C.
The results obtained in these processes are generally quite good. The disadvantage thereof is the large expenditure necessary for reliquefying the gas vaporized in the reaction.
Further processes for preparing .beta.-ionone are disclosed in CS patent 179 046, SU patent 458 540 and SU patent 547 445, wherein thorough mixing of the reactants and rapid removal of heat are achieved by using a thin film reactor. The disadvantage of the two last-mentioned processes is that only about 3 to 6 kg of .beta.-ionone are obtained per m.sup.2 of thin film area and hour, and thus transfer to the industrial scale would result in enormous apparatus. The disadvantage of the process in the Czech patent is that temperatures between 10 and 15.degree. C. must be used to obtain good yields, which makes costly coolants necessary once again.
In all the known processes there is always formation of a mixture of .alpha.- and .beta.-ionones. According to DE patents 10 80 105, 16 68 496 and 16 68 505, .beta.-ionone is preferentially obtained at reaction temperatures from -20 to 0.degree. C., while the .alpha.-ionone content increases at temperatures from -10 to 25.degree. C.
In addition, EP 133 668 discloses a process for the continuous preparation of ionones, in which the pseudoionone is mixed with concentrated sulfuric acid, in a hydrocarbon which boils at 25 to 65.degree. C. under the reaction conditions, with vigorous mixing and evaporative cooling by partial or complete vaporization of the solvent, in such a way that the temperature of the reaction mixture is between 25 and 65.degree. C., and the residence time until the reaction mixture is diluted with water is 0.05 to 20 seconds. The disadvantage of this process, which functions very well in small systems, is that difficulties arise on transfer to the industrial scale.
Finally, EP 628 544 A1 discloses a process for preparing .beta.-ionone by sulfuric acid-catalyzed cyclization of pseudoionone in a two-phase solvent system consisting of concentrated sulfuric acid and a second solvent which is essentially immiscible with water, where liquid carbon dioxide under pressure is used as second solvent. The disadvantages of this process are that very high pressures and rather low temperatures must be used, and that the complexity of the apparatus for carrying out the process is considerable.
.beta.-Ionone is an essential precursor for the industrial preparation of vitamin A. In this case, a high content of .alpha.-ionone reduces the yield. Pure .alpha.-ionone and alkyl-substituted ionones are, on the other hand, in demand as fragrances in which a high content of .beta.-ionone would have an interfering effect.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
ED: Bruma sprak vrijdag met Inter, Wolfsburg ook concreet in de markt
14 mei 2016 06:32
Jeffrey Bruma heeft vrijdag in een hotel in Amsterdam een onderhoud gehad met Inter. Dat meldt het Eindhovens Dagblad zaterdagochtend. De Italianen zouden zich nog niet bij PSV hebben gemeld maar eerst de PSV'er willen overtuigen dat een stap naar Milaan de goede is. Daarnaast zou VfL Wolfsburg zich officieel bij PSV hebben gemeld voor de verdediger. Volgens het ED zal PSV naar verwachting zo'n 15 miljoen euro verlangen voor de centrumverdediger.
|
{
"pile_set_name": "OpenWebText2"
}
|
Psychology and climate change.
Research and theory from psychology are increasingly being utilized to understand potential impacts of climate change and to promote positive responses. In this Primer, Clayton describes three main areas in which psychological research provides relevant insights, and provides suggestions for encouraging mitigation and adaptation behavior.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
“We found things that she had written and she made reference to Slender Man. She also made references to killing,” the woman told WLWT. “She even created a world for Slender Man in the game Minecraft.”
Slender Man, a paranormal being created by Eric Knudsen, is portrayed as a lanky man with a black suit and no face. The character gravitates towards forests and kills or carries off victims. Since the character's inception, other writers and artists have produced their own versions of Slender Man stories.
|
{
"pile_set_name": "Pile-CC"
}
|
NW Rota-1
United States
14.601°N, 144.775°E; summit elev. -517 m
All times are local (unless otherwise noted)
During 18 April-13 May 2006, scientists from the National Oceanic and Atmospheric Agency (NOAA) and Oregon State University completed the 2006 Submarine Ring of Fire Expedition aboard the research vessel Melville. This expedition was the third in a series of explorations of the submarine volcanoes lying along the Mariana intra-ocean volcanic arc. That arc extends from S of the island of Guam northward more than 1,450 km through the Commonwealth of the Northern Mariana Islands (see map in above report on Daikoku). A previous expedition to Northwest Rota-1 in 2004 discovered and named this volcano and found it erupting (BGVN 29:03). Daily logs of the 2006 expedition, including photographs and video clips, can be viewed on the NOAA Ocean Explorer web site noted below, from which much of this report was taken.
On 23 and 24 April 2006, the unmanned (remotely operated vessel, ROV) submersible Jason 2 revisited Brimstone Pit, a spot on the volcano where an ash-and-gas plume was discovered in 2004 and observed again in 2005 (Embley and others, 2004 and 2006). The changes were striking. According to Robert Embley (Oregon State University press release, 25 May 2006), "we saw features of submarine volcanic activity never before directly observed, including explosions of lava from a crater accompanied by a red glow and voluminous volcanic gases and ejected rocks." A degassing event at Brimstone Pit began releasing bubbles that formed a growing submarine plume cloud. The Pit, at a depth of 560 m, was significantly deeper (by ~ 20 m) than it was in the previous visits and there appeared to have been a recent collapse of the summit area. The Pit exuded a sluggish pulsating cloud of white color along with some gas bubbles. Some time later, the pit was almost filled with the white cloud, which appeared to come from the lavas themselves. The observers concluded that they witnessed lava extruding on the seafloor.
Particle plumes were mapped using a light-scattering sensor (LSS), part of the CTD (conductivity-temperature-depth) instrument package towed over the summit and flanks of the volcano. The CTD revealed layers of turbid (cloudy) water extending as far as 8 km down the S flank, and to depths up to 2,900 m. The turbid layers may arise from periodic collapse of the unstable slopes of volcanic fallout material similar to that found in the white cloud observed at the summit.
Submersible dives on 25 April 2006 to the Brimstone Pit revealed a lava flow forming there. The initial approach to the Pit revealed a line of bubbles (mainly CO2) escaping from a fracture in the underlying rock. However, in place of the previously flat ground that described the Pit on 24 April, a small ash cone had formed. It was ~ 6 m in diameter with walls about 1 m high, made up entirely of fine-grained ash. As the submersible approached, observers saw a plume discharging out of the cone's center and, on closer inspection, it appeared that ash was raining out of the bottom of the plume and falling onto the flanks of the small cone.
Near Brimstone Pit, the submersible collected a piece of newly erupted andesite lava containing elemental sulfur filling vesicles. The lava flow advanced but slowly, traveling forward bit by bit, chunk by chunk. As the lava advanced, the flow's toe vigorously degassed. The emitted gas and the associated plume took on a yellow hue. Scientists interpreted the escaping gases as mainly sulfur-rich (SO2 and H2S), which can mix with and make the surrounding seawater strongly acidic and precipitate elemental sulfur, the source of the plume's yellow hue. Liquid native sulfur inside the plume was seen raining on the seafloor as small droplets and filled in the numerous holes in the lava where the gases escaped. Locally, carbon dioxide formed bubbles in front of the advancing lava. These different gases provided the force behind the vigorous 'mini-explosions' within the lava flow.
Finishing the last of six dives at Northwest Rota-1 on 29 April 2006, and combining observations from the two previous expeditions, scientists developed some conclusions about processes at this extremely dynamic site. Prior to arrival in 2006, a major landslide must have originated near Brimstone Pit. During the first day of 2006 submersible observations, a turbid layer generated by the slide surrounded the lower flanks. The next day, when the water had cleared, half of Brimstone Pit had fallen away and the seafloor around the vent was swept clean of recent lava. Over the next week, eruptive activity gradually increased in intensity and vigor. By the end of the week, a 5-m-high cone made of ash and lava blocks had built up over the vent, and the turbid layer on the flanks was almost gone. On the last dive, scientists saw glowing lava jetting from the vent (figure 5).
The scientists concluded that observing explosive volcanic activity at a submarine volcano was easier and more revealing in many ways than on land, perhaps because the eruptive activity, although violent at times, is usually limited to a small area due to the dampening effect of the surrounding water (figure 6). For example, at Brimstone Pit the pressure of 560 m of water over the site reduced the power of the explosive bursts. Also, the water quickly slows down the rocks and ash violently thrown out of the vent. The scientists viewed the release of volcanic gases from the erupting lava with new clarity, with the help of the streams of bubbles and multicolored plumes as they were emitted. In addition, the scientists recorded the activity using a portable underwater microphone (hydrophone).
Chadwick and his associates at NOAA have identified and named 56 seamounts in the Mariana Arc, 11 of which show hydrothermal activity, based primarily on CTD instrument tows (table 1; see figure 5 for map showing locations).
Table 1. Seamounts in the Mariana arc that are active volcanos based on submersible observations and/or that registered signs of hydrothermal activity on CTD tows. Brief comments on noteworthy observations from several of those visited in 2006 are included. Courtesy of William Chadwick, NOAA, June 2006.
Geologic Background. A submarine volcano detected during a 2003 NOAA bathymetric survey of the Mariana Island arc was found to be hydrothermally active and named NW Rota-1. The basaltic to basaltic-andesite seamount rises to within 517 m of the sea surface SW of Esmeralda Bank and lies 64 km NW of Rota Island and about 100 km north of Guam. When Northwest Rota-1 was revisited in 2004, a minor submarine eruption from a vent named Brimstone Pit on the upper south flank about 40 m below the summit intermittently ejected a plume several hundred meters high containing ash, rock particles, and molten sulfur droplets that adhered to the surface of the remotely operated submersible vehicle. The active vent was funnel-shaped, about 20 m wide and 12 m deep. NW Rota-1 is a large submarine volcano with prominent structural lineaments about a kilometer apart cutting across the summit of the edifice and down the NE and SW flanks.
|
{
"pile_set_name": "Pile-CC"
}
|
@BusinessDaily
Banking stock shrugs off rate cap
6 days ago, 13:42
By: Constant Munda
Investors who placed their biggest bet on their stake in banks or bought them during the turmoil that followed the passing of the interest capping law, are reaping the benefits of their decision. Shares of 10 of the 11 financiers listed on the Nairobi bourse have recouped hundreds of billions of shillings in losses they incurred during massive panic sale-offs after the Banking (Amendment) Act became law in September 2016. The ceiling of loan charges at 14 per cent saw risk-averse investors offlo ... Read More
Suggested
Kenyans will now pay 0.5 per cent less on all commercial loans following a revision of the policy rate from 10 to 9.5 per cent, meaning Kenyans will pay 13.5 per cent on loans compared to the 14 per c ...
The government’s thirst for infrastructure projects has sparked price and quality wars among cement manufactures.Devki Group chairperson Narendra Raval attributed the war to increasing inflow of subst ...
Insurance firms recorded significant growth during the fourth quarter of 2017, signalling tenacity in what most sectors have described as a tough economic environment.Data from the Insurance Regulator ...
Standard Chartered Bank last week launched its first digital bank in Africa.The bank, based in Côte d’Ivoire will have its digital services which range from opening a bank account to making a transact ...
@BusinessDaily
Banking stock shrugs off rate cap
6 days ago, 13:42
By: Constant MundaInvestors who placed their biggest bet on their stake in banks or bought them during the turmoil that followed the passing of the interest capping law, are reaping the benefits of their decision. Shares of 10 of the 11 financiers listed on the Nairobi bourse have recouped hundreds of billions of shillings in losses they incurred during massive panic sale-offs after the Banking (Amendment) Act became law in September 2016. The ceiling of loan charges at 14 per cent saw risk-averse investors offlo ... Read More
Suggested
Kenyans will now pay 0.5 per cent less on all commercial loans following a revision of the policy rate from 10 to 9.5 per cent, meaning Kenyans will pay 13.5 per cent on loans compared to the 14 per c ...
The government’s thirst for infrastructure projects has sparked price and quality wars among cement manufactures.Devki Group chairperson Narendra Raval attributed the war to increasing inflow of subst ...
Insurance firms recorded significant growth during the fourth quarter of 2017, signalling tenacity in what most sectors have described as a tough economic environment.Data from the Insurance Regulator ...
Standard Chartered Bank last week launched its first digital bank in Africa.The bank, based in Côte d’Ivoire will have its digital services which range from opening a bank account to making a transact ...
|
{
"pile_set_name": "Pile-CC"
}
|
<?php
/* vim: set expandtab tabstop=4 shiftwidth=4 softtabstop=4: */
/**
* DNS Library for handling lookups and updates.
*
* PHP Version 5
*
* Copyright (c) 2010, Mike Pultz <mike@mikepultz.com>.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* * Neither the name of Mike Pultz nor the names of his contributors
* may be used to endorse or promote products derived from this
* software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRIC
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*
* @category Networking
* @package Net_DNS2
* @author Mike Pultz <mike@mikepultz.com>
* @copyright 2010 Mike Pultz <mike@mikepultz.com>
* @license http://www.opensource.org/licenses/bsd-license.php BSD License
* @version SVN: $Id$
* @link http://pear.php.net/package/Net_DNS2
* @since File available since Release 0.6.0
*
*/
/*
* register the auto-load function
*
*/
spl_autoload_register('Net_DNS2::autoload');
/**
* This is the base class for the Net_DNS2_Resolver and Net_DNS2_Updater
* classes.
*
* @category Networking
* @package Net_DNS2
* @author Mike Pultz <mike@mikepultz.com>
* @license http://www.opensource.org/licenses/bsd-license.php BSD License
* @link http://pear.php.net/package/Net_DNS2
* @see Net_DNS2_Resolver, Net_DNS2_Updater
*
*/
class Net_DNS2
{
/*
* the current version of this library
*/
const VERSION = '1.4.3';
/*
* the default path to a resolv.conf file
*/
const RESOLV_CONF = '/etc/resolv.conf';
/*
* override options from the resolv.conf file
*
* if this is set, then certain values from the resolv.conf file will override
* local settings. This is disabled by default to remain backwards compatible.
*
*/
public $use_resolv_options = false;
/*
* use TCP only (true/false)
*/
public $use_tcp = false;
/*
* DNS Port to use (53)
*/
public $dns_port = 53;
/*
* the ip/port for use as a local socket
*/
public $local_host = '';
public $local_port = 0;
/*
* timeout value for socket connections
*/
public $timeout = 5;
/*
* randomize the name servers list
*/
public $ns_random = false;
/*
* default domains
*/
public $domain = '';
/*
* domain search list - not actually used right now
*/
public $search_list = array();
/*
* enable cache; either "shared", "file" or "none"
*/
public $cache_type = 'none';
/*
* file name to use for shared memory segment or file cache
*/
public $cache_file = '/tmp/net_dns2.cache';
/*
* the max size of the cache file (in bytes)
*/
public $cache_size = 50000;
/*
* the method to use for storing cache data; either "serialize" or "json"
*
* json is faster, but can't remember the class names (everything comes back
* as a "stdClass Object"; all the data is the same though. serialize is
* slower, but will have all the class info.
*
* defaults to 'serialize'
*/
public $cache_serializer = 'serialize';
/*
* by default, according to RFC 1034
*
* CNAME RRs cause special action in DNS software. When a name server
* fails to find a desired RR in the resource set associated with the
* domain name, it checks to see if the resource set consists of a CNAME
* record with a matching class. If so, the name server includes the CNAME
* record in the response and restarts the query at the domain name
* specified in the data field of the CNAME record.
*
* this can cause "unexpected" behavious, since i'm sure *most* people
* don't know DNS does this; there may be cases where Net_DNS2 returns a
* positive response, even though the hostname the user looked up did not
* actually exist.
*
* strict_query_mode means that if the hostname that was looked up isn't
* actually in the answer section of the response, Net_DNS2 will return an
* empty answer section, instead of an answer section that could contain
* CNAME records.
*
*/
public $strict_query_mode = false;
/*
* if we should set the recursion desired bit to 1 or 0.
*
* by default this is set to true, we want the DNS server to perform a recursive
* request. If set to false, the RD bit will be set to 0, and the server will
* not perform recursion on the request.
*/
public $recurse = true;
/*
* request DNSSEC values, by setting the DO flag to 1; this actually makes
* the resolver add a OPT RR to the additional section, and sets the DO flag
* in this RR to 1
*
*/
public $dnssec = false;
/*
* set the DNSSEC AD (Authentic Data) bit on/off; the AD bit on the request
* side was previously undefined, and resolvers we instructed to always clear
* the AD bit when sending a request.
*
* RFC6840 section 5.7 defines setting the AD bit in the query as a signal to
* the server that it wants the value of the AD bit, without needed to request
* all the DNSSEC data via the DO bit.
*
*/
public $dnssec_ad_flag = false;
/*
* set the DNSSEC CD (Checking Disabled) bit on/off; turning this off, means
* that the DNS resolver will perform it's own signature validation- so the DNS
* servers simply pass through all the details.
*
*/
public $dnssec_cd_flag = false;
/*
* the EDNS(0) UDP payload size to use when making DNSSEC requests
* see RFC 4035 section 4.1 - EDNS Support.
*
* there is some different ideas on the suggest size to supprt; but it seems to
* be "at least 1220 bytes, but SHOULD support 4000 bytes.
*
* we'll just support 4000
*
*/
public $dnssec_payload_size = 4000;
/*
* the last exeception that was generated
*/
public $last_exception = null;
/*
* the list of exceptions by name server
*/
public $last_exception_list = array();
/*
* name server list
*/
public $nameservers = array();
/*
* local sockets
*/
protected $sock = array(Net_DNS2_Socket::SOCK_DGRAM => array(), Net_DNS2_Socket::SOCK_STREAM => array());
/*
* if the socket extension is loaded
*/
protected $sockets_enabled = false;
/*
* the TSIG or SIG RR object for authentication
*/
protected $auth_signature = null;
/*
* the shared memory segment id for the local cache
*/
protected $cache = null;
/*
* internal setting for enabling cache
*/
protected $use_cache = false;
/**
* Constructor - base constructor for the Resolver and Updater
*
* @param mixed $options array of options or null for none
*
* @throws Net_DNS2_Exception
* @access public
*
*/
public function __construct(array $options = null)
{
//
// check for the sockets extension; we no longer support the sockets library under
// windows- there have been too many errors related to sockets under windows-
// specifically inconsistent socket defines between versions of windows-
//
// and since I can't seem to find a way to get the actual windows version, it
// doesn't seem fixable in the code.
//
if ( (extension_loaded('sockets') == true) && (strtoupper(substr(PHP_OS, 0, 3)) !== 'WIN') ) {
$this->sockets_enabled = true;
}
//
// load any options that were provided
//
if (!empty($options)) {
foreach ($options as $key => $value) {
if ($key == 'nameservers') {
$this->setServers($value);
} else {
$this->$key = $value;
}
}
}
//
// if we're set to use the local shared memory cache, then
// make sure it's been initialized
//
switch($this->cache_type) {
case 'shared':
if (extension_loaded('shmop')) {
$this->cache = new Net_DNS2_Cache_Shm;
$this->use_cache = true;
} else {
throw new Net_DNS2_Exception(
'shmop library is not available for cache',
Net_DNS2_Lookups::E_CACHE_SHM_UNAVAIL
);
}
break;
case 'file':
$this->cache = new Net_DNS2_Cache_File;
$this->use_cache = true;
break;
case 'none':
$this->use_cache = false;
break;
default:
throw new Net_DNS2_Exception(
'un-supported cache type: ' . $this->cache_type,
Net_DNS2_Lookups::E_CACHE_UNSUPPORTED
);
}
}
/**
* autoload call-back function; used to auto-load classes
*
* @param string $name the name of the class
*
* @return void
* @access public
*
*/
static public function autoload($name)
{
//
// only auto-load our classes
//
if (strncmp($name, 'Net_DNS2', 8) == 0) {
include str_replace('_', '/', $name) . '.php';
}
return;
}
/**
* sets the name servers to be used
*
* @param mixed $nameservers either an array of name servers, or a file name
* to parse, assuming it's in the resolv.conf format
*
* @return boolean
* @throws Net_DNS2_Exception
* @access public
*
*/
public function setServers($nameservers)
{
//
// if it's an array, then use it directly
//
// otherwise, see if it's a path to a resolv.conf file and if so, load it
//
if (is_array($nameservers)) {
$this->nameservers = $nameservers;
} else {
//
// temporary list of name servers; do it this way rather than just
// resetting the local nameservers value, just incase an exception
// is thrown here; this way we might avoid ending up with an empty
// namservers list.
//
$ns = array();
//
// check to see if the file is readable
//
if (is_readable($nameservers) === true) {
$data = file_get_contents($nameservers);
if ($data === false) {
throw new Net_DNS2_Exception(
'failed to read contents of file: ' . $nameservers,
Net_DNS2_Lookups::E_NS_INVALID_FILE
);
}
$lines = explode("\n", $data);
foreach ($lines as $line) {
$line = trim($line);
//
// ignore empty lines, and lines that are commented out
//
if ( (strlen($line) == 0)
|| ($line[0] == '#')
|| ($line[0] == ';')
) {
continue;
}
//
// ignore lines with no spaces in them.
//
if (strpos($line, ' ') === false) {
continue;
}
list($key, $value) = preg_split('/\s+/', $line, 2);
$key = trim(strtolower($key));
$value = trim(strtolower($value));
switch($key) {
case 'nameserver':
//
// nameserver can be a IPv4 or IPv6 address
//
if ( (self::isIPv4($value) == true)
|| (self::isIPv6($value) == true)
) {
$ns[] = $value;
} else {
throw new Net_DNS2_Exception(
'invalid nameserver entry: ' . $value,
Net_DNS2_Lookups::E_NS_INVALID_ENTRY
);
}
break;
case 'domain':
$this->domain = $value;
break;
case 'search':
$this->search_list = preg_split('/\s+/', $value);
break;
case 'options':
$this->parseOptions($value);
break;
default:
;
}
}
//
// if we don't have a domain, but we have a search list, then
// take the first entry on the search list as the domain
//
if ( (strlen($this->domain) == 0)
&& (count($this->search_list) > 0)
) {
$this->domain = $this->search_list[0];
}
} else {
throw new Net_DNS2_Exception(
'resolver file file provided is not readable: ' . $nameservers,
Net_DNS2_Lookups::E_NS_INVALID_FILE
);
}
//
// store the name servers locally
//
if (count($ns) > 0) {
$this->nameservers = $ns;
}
}
//
// remove any duplicates; not sure if we should bother with this- if people
// put duplicate name servers, who I am to stop them?
//
$this->nameservers = array_unique($this->nameservers);
//
// check the name servers
//
$this->checkServers();
return true;
}
/**
* parses the options line from a resolv.conf file; we don't support all the options
* yet, and using them is optional.
*
* @param string $value is the options string from the resolv.conf file.
*
* @return boolean
* @access private
*
*/
private function parseOptions($value)
{
//
// if overrides are disabled (the default), or the options list is empty for some
// reason, then we don't need to do any of this work.
//
if ( ($this->use_resolv_options == false) || (strlen($value) == 0) ) {
return true;
}
$options = preg_split('/\s+/', strtolower($value));
foreach ($options as $option) {
//
// override the timeout value from the resolv.conf file.
//
if ( (strncmp($option, 'timeout', 7) == 0) && (strpos($option, ':') !== false) ) {
list($key, $val) = explode(':', $option);
if ( ($val > 0) && ($val <= 30) ) {
$this->timeout = $val;
}
//
// the rotate option just enabled the ns_random option
//
} else if (strncmp($option, 'rotate', 6) == 0) {
$this->ns_random = true;
}
}
return true;
}
/**
* checks the list of name servers to make sure they're set
*
* @param mixed $default a path to a resolv.conf file or an array of servers.
*
* @return boolean
* @throws Net_DNS2_Exception
* @access protected
*
*/
protected function checkServers($default = null)
{
if (empty($this->nameservers)) {
if (isset($default)) {
$this->setServers($default);
} else {
throw new Net_DNS2_Exception(
'empty name servers list; you must provide a list of name '.
'servers, or the path to a resolv.conf file.',
Net_DNS2_Lookups::E_NS_INVALID_ENTRY
);
}
}
return true;
}
/**
* adds a TSIG RR object for authentication
*
* @param string $keyname the key name to use for the TSIG RR
* @param string $signature the key to sign the request.
* @param string $algorithm the algorithm to use
*
* @return boolean
* @access public
* @since function available since release 1.1.0
*
*/
public function signTSIG(
$keyname, $signature = '', $algorithm = Net_DNS2_RR_TSIG::HMAC_MD5
) {
//
// if the TSIG was pre-created and passed in, then we can just used
// it as provided.
//
if ($keyname instanceof Net_DNS2_RR_TSIG) {
$this->auth_signature = $keyname;
} else {
//
// otherwise create the TSIG RR, but don't add it just yet; TSIG needs
// to be added as the last additional entry- so we'll add it just
// before we send.
//
$this->auth_signature = Net_DNS2_RR::fromString(
strtolower(trim($keyname)) .
' TSIG '. $signature
);
//
// set the algorithm to use
//
$this->auth_signature->algorithm = $algorithm;
}
return true;
}
/**
* adds a SIG RR object for authentication
*
* @param string $filename the name of a file to load the signature from.
*
* @return boolean
* @throws Net_DNS2_Exception
* @access public
* @since function available since release 1.1.0
*
*/
public function signSIG0($filename)
{
//
// check for OpenSSL
//
if (extension_loaded('openssl') === false) {
throw new Net_DNS2_Exception(
'the OpenSSL extension is required to use SIG(0).',
Net_DNS2_Lookups::E_OPENSSL_UNAVAIL
);
}
//
// if the SIG was pre-created, then use it as-is
//
if ($filename instanceof Net_DNS2_RR_SIG) {
$this->auth_signature = $filename;
} else {
//
// otherwise, it's filename which needs to be parsed and processed.
//
$private = new Net_DNS2_PrivateKey($filename);
//
// create a new Net_DNS2_RR_SIG object
//
$this->auth_signature = new Net_DNS2_RR_SIG();
//
// reset some values
//
$this->auth_signature->name = $private->signname;
$this->auth_signature->ttl = 0;
$this->auth_signature->class = 'ANY';
//
// these values are pulled from the private key
//
$this->auth_signature->algorithm = $private->algorithm;
$this->auth_signature->keytag = $private->keytag;
$this->auth_signature->signname = $private->signname;
//
// these values are hard-coded for SIG0
//
$this->auth_signature->typecovered = 'SIG0';
$this->auth_signature->labels = 0;
$this->auth_signature->origttl = 0;
//
// generate the dates
//
$t = time();
$this->auth_signature->sigincep = gmdate('YmdHis', $t);
$this->auth_signature->sigexp = gmdate('YmdHis', $t + 500);
//
// store the private key in the SIG object for later.
//
$this->auth_signature->private_key = $private;
}
//
// only RSA algorithms are supported for SIG(0)
//
switch($this->auth_signature->algorithm) {
case Net_DNS2_Lookups::DNSSEC_ALGORITHM_RSAMD5:
case Net_DNS2_Lookups::DNSSEC_ALGORITHM_RSASHA1:
case Net_DNS2_Lookups::DNSSEC_ALGORITHM_RSASHA256:
case Net_DNS2_Lookups::DNSSEC_ALGORITHM_RSASHA512:
case Net_DNS2_Lookups::DNSSEC_ALGORITHM_DSA:
break;
default:
throw new Net_DNS2_Exception(
'only asymmetric algorithms work with SIG(0)!',
Net_DNS2_Lookups::E_OPENSSL_INV_ALGO
);
}
return true;
}
/**
* a simple function to determine if the RR type is cacheable
*
* @param stream $_type the RR type string
*
* @return bool returns true/false if the RR type if cachable
* @access public
*
*/
public function cacheable($_type)
{
switch($_type) {
case 'AXFR':
case 'OPT':
return false;
}
return true;
}
/**
* PHP doesn't support unsigned integers, but many of the RR's return
* unsigned values (like SOA), so there is the possibility that the
* value will overrun on 32bit systems, and you'll end up with a
* negative value.
*
* 64bit systems are not affected, as their PHP_IN_MAX value should
* be 64bit (ie 9223372036854775807)
*
* This function returns a negative integer value, as a string, with
* the correct unsigned value.
*
* @param string $_int the unsigned integer value to check
*
* @return string returns the unsigned value as a string.
* @access public
*
*/
public static function expandUint32($_int)
{
if ( ($_int < 0) && (PHP_INT_MAX == 2147483647) ) {
return sprintf('%u', $_int);
} else {
return $_int;
}
}
/**
* returns true/false if the given address is a valid IPv4 address
*
* @param string $_address the IPv4 address to check
*
* @return boolean returns true/false if the address is IPv4 address
* @access public
*
*/
public static function isIPv4($_address)
{
//
// use filter_var() if it's available; it's faster than preg
//
if (extension_loaded('filter') == true) {
if (filter_var($_address, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) == false) {
return false;
}
} else {
//
// do the main check here;
//
if (inet_pton($_address) === false) {
return false;
}
//
// then make sure we're not a IPv6 address
//
if (preg_match('/^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/', $_address) == 0) {
return false;
}
}
return true;
}
/**
* returns true/false if the given address is a valid IPv6 address
*
* @param string $_address the IPv6 address to check
*
* @return boolean returns true/false if the address is IPv6 address
* @access public
*
*/
public static function isIPv6($_address)
{
//
// use filter_var() if it's available; it's faster than preg
//
if (extension_loaded('filter') == true) {
if (filter_var($_address, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) == false) {
return false;
}
} else {
//
// do the main check here
//
if (inet_pton($_address) === false) {
return false;
}
//
// then make sure it doesn't match a IPv4 address
//
if (preg_match('/^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/', $_address) == 1) {
return false;
}
}
return true;
}
/**
* formats the given IPv6 address as a fully expanded IPv6 address
*
* @param string $_address the IPv6 address to expand
*
* @return string the fully expanded IPv6 address
* @access public
*
*/
public static function expandIPv6($_address)
{
$hex = unpack('H*hex', inet_pton($_address));
return substr(preg_replace('/([A-f0-9]{4})/', "$1:", $hex['hex']), 0, -1);
}
/**
* sends a standard Net_DNS2_Packet_Request packet
*
* @param Net_DNS2_Packet $request a Net_DNS2_Packet_Request object
* @param boolean $use_tcp true/false if the function should
* use TCP for the request
*
* @return mixed returns a Net_DNS2_Packet_Response object, or false on error
* @throws Net_DNS2_Exception
* @access protected
*
*/
protected function sendPacket(Net_DNS2_Packet $request, $use_tcp)
{
//
// get the data from the packet
//
$data = $request->get();
if (strlen($data) < Net_DNS2_Lookups::DNS_HEADER_SIZE) {
throw new Net_DNS2_Exception(
'invalid or empty packet for sending!',
Net_DNS2_Lookups::E_PACKET_INVALID,
null,
$request
);
}
reset($this->nameservers);
//
// randomize the name server list if it's asked for
//
if ($this->ns_random == true) {
shuffle($this->nameservers);
}
//
// loop so we can handle server errors
//
$response = null;
$ns = '';
while (1) {
//
// grab the next DNS server
//
$ns = each($this->nameservers);
if ($ns === false) {
if (is_null($this->last_exception) == false) {
throw $this->last_exception;
} else {
throw new Net_DNS2_Exception(
'every name server provided has failed',
Net_DNS2_Lookups::E_NS_FAILED
);
}
}
$ns = $ns[1];
//
// if the use TCP flag (force TCP) is set, or the packet is bigger than our
// max allowed UDP size- which is either 512, or if this is DNSSEC request,
// then whatever the configured dnssec_payload_size is.
//
$max_udp_size = Net_DNS2_Lookups::DNS_MAX_UDP_SIZE;
if ($this->dnssec == true)
{
$max_udp_size = $this->dnssec_payload_size;
}
if ( ($use_tcp == true) || (strlen($data) > $max_udp_size) ) {
try
{
$response = $this->sendTCPRequest($ns, $data, ($request->question[0]->qtype == 'AXFR') ? true : false);
} catch(Net_DNS2_Exception $e) {
$this->last_exception = $e;
$this->last_exception_list[$ns] = $e;
continue;
}
//
// otherwise, send it using UDP
//
} else {
try
{
$response = $this->sendUDPRequest($ns, $data);
//
// check the packet header for a trucated bit; if it was truncated,
// then re-send the request as TCP.
//
if ($response->header->tc == 1) {
$response = $this->sendTCPRequest($ns, $data);
}
} catch(Net_DNS2_Exception $e) {
$this->last_exception = $e;
$this->last_exception_list[$ns] = $e;
continue;
}
}
//
// make sure header id's match between the request and response
//
if ($request->header->id != $response->header->id) {
$this->last_exception = new Net_DNS2_Exception(
'invalid header: the request and response id do not match.',
Net_DNS2_Lookups::E_HEADER_INVALID,
null,
$request,
$response
);
$this->last_exception_list[$ns] = $this->last_exception;
continue;
}
//
// make sure the response is actually a response
//
// 0 = query, 1 = response
//
if ($response->header->qr != Net_DNS2_Lookups::QR_RESPONSE) {
$this->last_exception = new Net_DNS2_Exception(
'invalid header: the response provided is not a response packet.',
Net_DNS2_Lookups::E_HEADER_INVALID,
null,
$request,
$response
);
$this->last_exception_list[$ns] = $this->last_exception;
continue;
}
//
// make sure the response code in the header is ok
//
if ($response->header->rcode != Net_DNS2_Lookups::RCODE_NOERROR) {
$this->last_exception = new Net_DNS2_Exception(
'DNS request failed: ' .
Net_DNS2_Lookups::$result_code_messages[$response->header->rcode],
$response->header->rcode,
null,
$request,
$response
);
$this->last_exception_list[$ns] = $this->last_exception;
continue;
}
break;
}
return $response;
}
/**
* cleans up a failed socket and throws the given exception
*
* @param string $_proto the protocol of the socket
* @param string $_ns the name server to use for the request
* @param string $_error the error message to throw at the end of the function
*
* @throws Net_DNS2_Exception
* @access private
*
*/
private function generateError($_proto, $_ns, $_error)
{
if (isset($this->sock[$_proto][$_ns]) == false)
{
throw new Net_DNS2_Exception('invalid socket referenced', Net_DNS2_Lookups::E_NS_INVALID_SOCKET);
}
//
// grab the last error message off the socket
//
$last_error = $this->sock[$_proto][$_ns]->last_error;
//
// close it
//
$this->sock[$_proto][$_ns]->close();
//
// remove it from the socket cache
//
unset($this->sock[$_proto][$_ns]);
//
// throw the error provided
//
throw new Net_DNS2_Exception($last_error, $_error);
}
/**
* sends a DNS request using TCP
*
* @param string $_ns the name server to use for the request
* @param string $_data the raw DNS packet data
* @param boolean $_axfr if this is a zone transfer request
*
* @return Net_DNS2_Packet_Response the reponse object
* @throws Net_DNS2_Exception
* @access private
*
*/
private function sendTCPRequest($_ns, $_data, $_axfr = false)
{
//
// grab the start time
//
$start_time = microtime(true);
//
// see if we already have an open socket from a previous request; if so, try to use
// that instead of opening a new one.
//
if ( (!isset($this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]))
|| (!($this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns] instanceof Net_DNS2_Socket))
) {
//
// if the socket library is available, then use that
//
if ($this->sockets_enabled === true) {
$this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns] = new Net_DNS2_Socket_Sockets(
Net_DNS2_Socket::SOCK_STREAM, $_ns, $this->dns_port, $this->timeout
);
//
// otherwise the streams library
//
} else {
$this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns] = new Net_DNS2_Socket_Streams(
Net_DNS2_Socket::SOCK_STREAM, $_ns, $this->dns_port, $this->timeout
);
}
//
// if a local IP address / port is set, then add it
//
if (strlen($this->local_host) > 0) {
$this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]->bindAddress(
$this->local_host, $this->local_port
);
}
//
// open the socket
//
if ($this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]->open() === false) {
$this->generateError(Net_DNS2_Socket::SOCK_STREAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
}
//
// write the data to the socket; if it fails, continue on
// the while loop
//
if ($this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]->write($_data) === false) {
$this->generateError(Net_DNS2_Socket::SOCK_STREAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
//
// read the content, using select to wait for a response
//
$size = 0;
$result = null;
$response = null;
//
// handle zone transfer requests differently than other requests.
//
if ($_axfr == true) {
$soa_count = 0;
while (1) {
//
// read the data off the socket
//
$result = $this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]->read($size, ($this->dnssec == true) ? $this->dnssec_payload_size : Net_DNS2_Lookups::DNS_MAX_UDP_SIZE);
if ( ($result === false) || ($size < Net_DNS2_Lookups::DNS_HEADER_SIZE) ) {
//
// if we get an error, then keeping this socket around for a future request, could cause
// an error- for example, https://github.com/mikepultz/netdns2/issues/61
//
// in this case, the connection was timing out, which once it did finally respond, left
// data on the socket, which could be captured on a subsequent request.
//
// since there's no way to "reset" a socket, the only thing we can do it close it.
//
$this->generateError(Net_DNS2_Socket::SOCK_STREAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
//
// parse the first chunk as a packet
//
$chunk = new Net_DNS2_Packet_Response($result, $size);
//
// if this is the first packet, then clone it directly, then
// go through it to see if there are two SOA records
// (indicating that it's the only packet)
//
if (is_null($response) == true) {
$response = clone $chunk;
//
// look for a failed response; if the zone transfer
// failed, then we don't need to do anything else at this
// point, and we should just break out.
//
if ($response->header->rcode != Net_DNS2_Lookups::RCODE_NOERROR) {
break;
}
//
// go through each answer
//
foreach ($response->answer as $index => $rr) {
//
// count the SOA records
//
if ($rr->type == 'SOA') {
$soa_count++;
}
}
//
// if we have 2 or more SOA records, then we're done;
// otherwise continue out so we read the rest of the
// packets off the socket
//
if ($soa_count >= 2) {
break;
} else {
continue;
}
} else {
//
// go through all these answers, and look for SOA records
//
foreach ($chunk->answer as $index => $rr) {
//
// count the number of SOA records we find
//
if ($rr->type == 'SOA') {
$soa_count++;
}
//
// add the records to a single response object
//
$response->answer[] = $rr;
}
//
// if we've found the second SOA record, we're done
//
if ($soa_count >= 2) {
break;
}
}
}
//
// everything other than a AXFR
//
} else {
$result = $this->sock[Net_DNS2_Socket::SOCK_STREAM][$_ns]->read($size, ($this->dnssec == true) ? $this->dnssec_payload_size : Net_DNS2_Lookups::DNS_MAX_UDP_SIZE);
if ( ($result === false) || ($size < Net_DNS2_Lookups::DNS_HEADER_SIZE) ) {
$this->generateError(Net_DNS2_Socket::SOCK_STREAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
//
// create the packet object
//
$response = new Net_DNS2_Packet_Response($result, $size);
}
//
// store the query time
//
$response->response_time = microtime(true) - $start_time;
//
// add the name server that the response came from to the response object,
// and the socket type that was used.
//
$response->answer_from = $_ns;
$response->answer_socket_type = Net_DNS2_Socket::SOCK_STREAM;
//
// return the Net_DNS2_Packet_Response object
//
return $response;
}
/**
* sends a DNS request using UDP
*
* @param string $_ns the name server to use for the request
* @param string $_data the raw DNS packet data
*
* @return Net_DNS2_Packet_Response the reponse object
* @throws Net_DNS2_Exception
* @access private
*
*/
private function sendUDPRequest($_ns, $_data)
{
//
// grab the start time
//
$start_time = microtime(true);
//
// see if we already have an open socket from a previous request; if so, try to use
// that instead of opening a new one.
//
if ( (!isset($this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns]))
|| (!($this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns] instanceof Net_DNS2_Socket))
) {
//
// if the socket library is available, then use that
//
if ($this->sockets_enabled === true) {
$this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns] = new Net_DNS2_Socket_Sockets(
Net_DNS2_Socket::SOCK_DGRAM, $_ns, $this->dns_port, $this->timeout
);
//
// otherwise the streams library
//
} else {
$this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns] = new Net_DNS2_Socket_Streams(
Net_DNS2_Socket::SOCK_DGRAM, $_ns, $this->dns_port, $this->timeout
);
}
//
// if a local IP address / port is set, then add it
//
if (strlen($this->local_host) > 0) {
$this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns]->bindAddress(
$this->local_host, $this->local_port
);
}
//
// open the socket
//
if ($this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns]->open() === false) {
$this->generateError(Net_DNS2_Socket::SOCK_DGRAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
}
//
// write the data to the socket
//
if ($this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns]->write($_data) === false) {
$this->generateError(Net_DNS2_Socket::SOCK_DGRAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
//
// read the content, using select to wait for a response
//
$size = 0;
$result = $this->sock[Net_DNS2_Socket::SOCK_DGRAM][$_ns]->read($size, ($this->dnssec == true) ? $this->dnssec_payload_size : Net_DNS2_Lookups::DNS_MAX_UDP_SIZE);
if (( $result === false) || ($size < Net_DNS2_Lookups::DNS_HEADER_SIZE)) {
$this->generateError(Net_DNS2_Socket::SOCK_DGRAM, $_ns, Net_DNS2_Lookups::E_NS_SOCKET_FAILED);
}
//
// create the packet object
//
$response = new Net_DNS2_Packet_Response($result, $size);
//
// store the query time
//
$response->response_time = microtime(true) - $start_time;
//
// add the name server that the response came from to the response object,
// and the socket type that was used.
//
$response->answer_from = $_ns;
$response->answer_socket_type = Net_DNS2_Socket::SOCK_DGRAM;
//
// return the Net_DNS2_Packet_Response object
//
return $response;
}
}
/*
* Local variables:
* tab-width: 4
* c-basic-offset: 4
* c-hanging-comment-ender-p: nil
* End:
*/
?>
|
{
"pile_set_name": "Github"
}
|
My changed body: breast cancer, body image, distress and self-compassion.
Bodily changes after breast cancer treatment can lead to long-term distress. Self-compassion, the ability to be kind to oneself, is an internal resource that may enhance a woman's ability to adjust to cancer-related bodily changes. The aim of the present study was to test the hypothesis that self-compassion mediates the relationship between body image and distress, controlling for alternate plausible mediators. Members of a nationwide breast cancer consumer network were invited to participate. A total of 279 women who had finished active cancer treatment completed the online survey. Assessments included the Body Image Scale; Self-compassion Scale; Depression, Anxiety and Stress Scale and items measuring perceived normative pressure and comfort with one's weight. Possible mediating effects of proposed variables on the body image-distress relationship were assessed. Tests using a bootstrapping approach with multiple mediators were significant for self-compassion on distress. Body image disturbance was indirectly associated with distress through low self-compassion. Body image disturbance and lower self-compassion were associated with increased psychological distress among these breast cancer survivors. This study provides preliminary evidence for a mediating role of self-compassion between body image disturbance and psychological distress, suggesting a potentially protective effect of higher levels of self-compassion for women at risk of experiencing body image disturbance.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
By MARK PAZNIOKAS The Connecticut Mirror
Publication: The Day
Hartford - It's a small state, and discussions about Sandy Hook and the Second Amendment rarely remain abstract, even at a University of Connecticut School of Law forum with the title, "Up in Arms: The Second Amendment in the Modern Republic."
Gov. Dannel P. Malloy delivered introductory remarks Friday, then briskly departed to applause, ready to begin a long day of public appearances. He stopped short when greeted by a late-arriving attendee, Mark Barden.
Barden has come to know the governor of Connecticut since Dec. 14, just as he's come to know the president and vice president of the United States, the governor of Delaware, senators and congressmen and state legislators. He's been to the White House. He's stood in the Rose Garden next to Gabby Giffords. He's learned much about politics and guns and the access and celebrity that tragedy conveys.
"How's everybody?" Malloy asked.
"Oh, as good as they can be, I think," Barden replied.
"Get this next month over," Malloy said, dropping his voice.
"Yeah," Barden said.
"I can do anything, let me know," Malloy said.
Barden nodded.
The two men continued on their opposite paths. Malloy's next stop was an educators' conference in Groton. Barden's was inside Starr Hall, where an audience of lawyers, students and academics sipped coffee at round tables, listening to a panel discussion about guns and the law.
Barden's son, Daniel, was one of the 20 first-graders and six women raked by semiautomatic rifle fire at Sandy Hook Elementary School on Dec. 14, an anniversary fast-approaching as a state prosecutor readies a final report on the massacre and the United States continues its unending argument about guns.
He is one of the parents who has chosen to be an activist, a voice for chilling America's ardor for firearms. On April 4, he stood tightly clasping hands with his wife, Jackie, watching Malloy sign a bipartisan gun-control law that the governor defended Friday.
The law bans the retail sale of military-style semiautomatic weapons and large-capacity magazines and requires universal background checks for firearms purchases.
Less than two weeks later, they stood with President Obama when an effort to require background checks failed in Washington.
"We'll return home now disappointed, but not defeated," Mark Barden said then, speaking from the same lectern as the president.
The Bardens and their two children still live in Newtown, where First Selectman Patricia Llodra has asked that residents be given some space, some respite from the nation's good wishes on Dec. 14.
Malloy sat with the Bardens and other waiting parents in a firehouse a year ago on that day, finally telling them what no one else would say, that there were no other survivors up the hill at Sandy Hook Elementary. Everyone who survived was accounted for. There would be no reunions.
"I think we need to respect Newtown and the families," Malloy said Friday, briefly taking questions about how Connecticut should observe the day. "At least with respect to Newtown, they want it to be low key."
Malloy said Connecticut would make another effort to find meaning in the loss.
"I think calling for acts of kindness and service makes a lot of sense as an appropriate way to remember those who died just under a year ago," Malloy said.
"I want to do everything I can to be helpful and supportive of the families and the community, not get in the way, but remind our Connecticut citizenry of what we've come through."
This story originally appeared at CTMirror.org, the website of The Connecticut Mirror, an independent, nonprofit news organization covering government, politics and public policy in the state.
|
{
"pile_set_name": "Pile-CC"
}
|
import { isElement } from "lodash";
export default isElement;
|
{
"pile_set_name": "Github"
}
|
Q:
True or false:if $A\subset B$, then $P(A)<P(B)$?
They ask me if this statement is true or false, and explain why. They suggest I write an example showing why it is false or true.
The statement is: if $A\subset B$, then $P(A)<P(B)$.
What I tried was to draw a Venn diagram and show that and show that $pa(A)=p(B)$, so then the answer is false. But I want to know if there is a better way to show this, or something a little bit more formal (not too much).
Thanks.
A:
False: In a normal distribution, $P(\Bbb R)=P(\Bbb R\setminus\{0\})=1$
A:
$$B=A\cup (B-A)\,\,\,,\,\,A\cap (B-A)=\varnothing\quad,P(B-A)\ge 0$$
$$P(B)=P(A)+P(B-A)\implies P(A)\le P(B)$$
|
{
"pile_set_name": "StackExchange"
}
|
## Changelog
### v2.0.0
**Breaking changes**
- The main export now returns the compiled string, instead of the object returned from the compiler
**Added features**
- Adds a `.create` method to do what the main function did before v2.0.0
### v0.2.0
In addition to performance and matching improvements, the v0.2.0 refactor adds complete POSIX character class support, with the exception of equivalence classes and POSIX.2 collating symbols which are not relevant to node.js usage.
**Added features**
- parser is exposed, so that expand-brackets parsers can be used by upstream parsers (like [micromatch][])
- compiler is exposed, so that expand-brackets compilers can be used by upstream compilers
- source maps
**source map example**
```js
var brackets = require('expand-brackets');
var res = brackets('[:alpha:]');
console.log(res.map);
{ version: 3,
sources: [ 'brackets' ],
names: [],
mappings: 'AAAA,MAAS',
sourcesContent: [ '[:alpha:]' ] }
```
|
{
"pile_set_name": "Github"
}
|
Dodgeball
ABOUT DODGEBALL
Dodgeball is played with 6 on court with a recommendation of 1-2 subs. There are 6 balls on court that are made with a foam core and are 7″ in size which makes them non sting and easy to throw. The basic aim of the game is to eliminate your entire opposition by either hitting them with a dodgeball or catching one of their thrown balls (which also revives one of your teammates). Once their entire opposition is out your team gains one point, and you reset the balls for another set. The team that wins the most sets in a 40 minute match is declared the winner!
Dodgeball is a sport that suits players of all genders, ages, fitness and experience levels. It’s a great way to keep active and engage with new people in a social fun atmosphere whilst learning a unique alternative sport! We accept team, pair, small group and individual registrations. Solo, pairs and small group players get matched with a team who needs extra players, or get put together with other individuals to make a team.
See below for details on our upcoming seasons, we’d love to have you join our amazing community!
Join our FB group to find a team to join, recruit players, ask questions and be updated about upcoming leagues, tournaments, international tours and more!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Using sed to find and replace a range of numbers
first poster here.
Trying to use sed to find and replace a word. Code is as follows:
configFile=ConnectionConfig.xml
sed 's/30??\" authentication=\"someuniqueauthkey/'$1'\" authentication=\"someuniqueauthkey/' $configFile
And I'd run the file like this:
./choosePort.sh 3001
When I run this code, there are no errors given like bad regex format, it just doesn't replace anything and the contents of tempXml.xml are just the contents of ConnectionConfig, unchanged.
What I'd like to be able to do is recognise any number 3000 - 3099 in the 30?? part of the expression, which I thought was what the '?' did.
The input line I'm trying to change is:
<host id="0" address="someip" port="3001" authentication="someauthkey"
Thanks in advance.
(Ip and authkeys in file blanked out for security reasons).
A:
Use [0-9] instead of ? to match a single digit.
sed 's/30[0-9][0-9]\" authentication=\"someuniqueauthkey/'$1'\" authentication=\"someuniqueauthkey/' $configFile
|
{
"pile_set_name": "StackExchange"
}
|
Vintages
My Wines
My Cellar
Dumol Wine Company:
Our 25 acre biodynamically farmed Estate Vineyard is located on an undulating eastfacing slope of one of the appellation's famous ridgelines. From this classic site and in tandem with some of our coastal area's finest growers, we craft wines that fully capture the aromatics, flavors and textures that exemplify their vineyard sites and varietals character in the purest and most precise form.
Do you love Dumol Wine Company? Follow them to show your support. Why?
|
{
"pile_set_name": "Pile-CC"
}
|
Conventional C-arm X-ray imaging systems acquire images along planar paths having a 3-dimensional acquisition axis. The 3-dimensional acquisition axis is the axis about which the x-ray source and radiation detector, held in fixed geometry by the C-arm, rotate. An examination subject being x-rayed by a conventional imaging system may have highly dense, radio-opaque objects (e.g. dental fillings, aneurysm clips or stents, screws, plates, etc.) disposed at various points through his/her body. These radio-opaque objects may include metals or other dense materials. When attempting to capture an image of an area of an examination subject's anatomy proximate the radio-opaque object(s), high x-ray absorption and deflection or scatter of the x-rays is directed at these objects. The deflected and scattered x-rays are picked up by the radiation detector at various locations other than their anticipated path from the source to the radiation detector. When the x-rays are deflected and strike the radiation detector, added noise is introduced into the x-ray image data. While some absorption and scatter is expected, the increased or complete absorption due to the presence of highly dense objects in the subject being imaged will result in artifact(s) obscuring the surrounding anatomy that is of interest. These artifact(s) include at least one of beam hardening artifacts and scatter artifacts. Beam hardening artifacts arise when x-rays are completely blocked from reaching the radiation detector due to the presence of highly dense objects. The presence of beam hardening artifacts produces streaking in the x-ray images. Scatter artifact occurs when dense objects deflect the x-rays and redirect them in different directions. When the x-rays strike the radiation detector, artifacts will result which effect image quality of the x-ray images. These artifact(s) created by the presence of metal or similarly dense radio opaque objects within the examination subject being x-rayed are hereinafter referred to as “metal artifacts.” These metal artifacts degrade the quality of the 3-dimensional image to be constructed. These metal artifacts are manifested in the 3-dimensional image as lines emanating from and extending radially away from the object. The metal artifacts raise the intensity value of voxels (a combination of the words volumetric and pixels) along these lines with a maximum increase in intensity proximal to the object and decreasing intensity moving away from the object. The term voxel refers to a volume element in 3-dimensional space. A voxel in 3-dimensional space is analogous to a pixel in 2-dimensional space. The metal artifacts are worst along the path of the x-ray beams as they pass through the radio-opaque object(s). By nature of conventional scanning geometry (rotation of the source and detector within a single plane) the metal artifacts are most prominent and create the most effects adjacent to the radio-opaque object and in the plane of rotation—within the acquisition plane. This means that metal artifacts in the 3-dimensional (CT) image are fixed and are largely constrained to the planes containing the radio-opaque object generating the metal artifacts and perpendicular to the 3-dimensional acquisition axis. The 3-dimensional acquisition axis is the axis about which the x-ray source and radiation detector rotate.
If the region of interest in the examination subject happens to lie adjacent to the radio-opaque object and in a direction perpendicular to the 3-dimensional acquisition axis, the metal artifacts in the image significantly degrade and even preclude an accurate diagnosis of the region of interest when the images are acquired along a planar path. A path, as used hereinafter, refers to the route along which the image acquisition system travels. A planar path refers to a path along a single plane.
FIGS. 2 and 3 illustrate the planar 3-dimensional acquisition problem caused by metal artifacts introduced by a radio-opaque object inside the examination subject along a single plane. The planar 3-dimensional path is defined by the rotation of the x-ray source and radiation detector about a single, fixed rotation axis 204. Metal artifacts 201 are formed by a previously-implanted platinum coil, which has been implanted in the examination subject being imaged in order to treat an aneurysm. The platinum coil mass 202 is located in close proximity to a vessel, which contains a stenosis 205. It is desirable to obtain a 3-dimensional constructed image of the examination subject that accurately depicts the vessel containing the stenosis 205 along with its location with respect to the coil mass 202 and other anatomy. This image is used to quantify the stenosis 205 and evaluate treatment options (e.g. angioplasty, stenting or stenting with angioplasty). However, metal artifacts 201 produced in a constructed 3-dimensional image taken along a planar path obscures the stenosis 205. The effects of the metal artifacts are worst and degrade the image most in the path of the x-ray beam and adjacent to the radio-opaque object(s) causing the metal artifacts.
FIG. 3 further shows the effects of metal artifacts 301 each time the x-ray imaging system is rotated and image data is acquired. FIGS. 2 and 3 show a situation where the axis of rotation is perpendicular to the image (e.g. coming out of the image toward the reader). In this arrangement, the metal artifacts branch out from a fan beam 203 in FIGS. 2 and 3. In the planar acquisition situation, as depicted in FIGS. 2 and 3, the number of projections that contain metal artifacts for areas around the radio-opaque object greatly outnumbers the number of projections that do not contain metal artifacts. When the ratio of the number of projections that contain metal artifacts to those that do not is high, more metal artifacts are present in the constructed image.
Metal artifact is sometimes moved away from a region of interest by changing the anatomical geometry of the examination subject with respect to the acquisition axis. For example, if an examination subject has dental fillings the examination subject is moved with relation to the scanner by tilting the head to shift metal artifacts created from dental fillings away from a particular region of interest (e.g. skull base or carotid arteries). However, moving the examination subject may not always be viable as it is not always possible to reorient the examination subject's anatomy with respect to the table support. Tilting the examination subject's head is hindered by the presence of a breathing tube or is precluded by a need to maintain examination subject's current positioning.
In computed tomography (CT) scanners the rotation plane is titled with respect to the examination subject (by applying a gantry tilt in a cranial or caudal direction), allowing the metal artifacts to be shifted without moving the examination subject. A “cranial” direction of movement is movement from the patient's middle toward the patient's head, while a “caudal” direction of movement is a movement from the patient's middle toward the patient's feet. Known C-arm X-ray imaging systems acquire 3-dimensional images by rotating the source and detector (fixed in geometric relationship by the C-arm) of the imaging system about a system specified acquisition axis. This rotation about a single acquisition axis forces a beam axis to be contained in a single plane, throughout the movement of the C-arm. This acquisition geometry places the majority of metal artifact adjacent to the artifact generating object and within planes in the reconstructed image that are parallel to the acquisition plane (perpendicular the acquisition axis). As seen in FIGS. 2 and 3, metal artifact can negatively affect the readability and diagnostic value of the acquired images and, by virtue of the mechanism by which the imaging data is acquired, the metal artifact is focused in the acquisition plane.
Additionally, a great deal of effort has been spent improving the quality of 3-dimensional images that contain metal artifacts, by attempting to improve the quality of the data within the signals acquired. However, solutions that shift metal artifacts within the image do not reduce the overall effect of the metal artifacts in the image because the image data is acquired along a planar path. Image data acquired along a planar path will still contain the effects of metal artifacts. Several post processing techniques to reduce the overall effect of metal artifacts have been made. The main disadvantage of post processing techniques to reduce overall effects of the metal artifacts is that the metal artifacts exist in the image data acquired. There is a need to reduce the overall effects of the metal artifacts present in the image data acquired. A system according to invention principles addresses these deficiencies and related problems.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Earlier today, a company known as Blink Media announced that it is working on a project known as “Game Nation”. This project entails a theme park, complete with resort, that is aimed at providing a unique video game experience. Few details are available at this time, but it appears as though completion of the project is still several years away, with Blink Media stating that it will be deciding on a suitable location for the theme park in the next twelve months.
The statement that was released indicates the visitors to the park will be able to take on the role of a character created by themselves, and take part in various video game-based activities. Blink Media describes the park as the world’s first living-MMORPG.
More information can be found on the Game Nation website, which can be found here.
|
{
"pile_set_name": "OpenWebText2"
}
|
The sun beats down hard on the town of Chili Verde New Mexico - where temperatures flare and passions reach boiling in the midday heat. The locals spend their days downing Tequila and breaking bottles over heads... and thats just the womenfolk! When Abel Wood an enigmatic lone cowboy type comes riding into town the locals immediately suspect that he has come in search of the legendary buried
A dressing powder and blood coagulant for use on certain types of wounds, cuts and abrasions. Formulated for use on horses and show stock. A caustic and drying agent for slow-healing lesions and excessive granulated tissue (proud flesh). It contains a deodorant to remove objectionable odors from foul or infected wounds.
Healthy Pet okocat Natural Paper Dust Free Litter 12.3lb offers long lasting odor control in a dust-free formula. Made from 100% paper fiber and free from chemicals, dyes and other synthetics, its specially formulated pellets are firm on the outside and soft on the inside. It is fortified with long lasting odor control technology and has been lab-tested and proven to absorb more than times its
Celtic Training Top - WhiteTrain at your best as you support your favourite team. Styled with textured NB and CFC logos to the chest area with Sponsor heat transfer logo positioned below, you can wear this Celtic Training Top for pride and team style.Benefits:NB Dry fabric Technology releases moisture away from the body and is fast drying100% polyester interlock with 100% Polyester stretch square
Beat the chill in this warm padded jacket thats the perfect companion for blustery days. A concealed hood is hidden inside a neck hugging collar thats just right for keeping out any sudden draughts. A suede-feel trim and dropped hem only add to this jackets appeal.
An epic Western that spans centuries countries and lifetimes. When she is disturbed by a burglar and gets the better of him an old woman tells him the story of her familys past. At the turn of the Twentieth century in t...
This delicate mesh top has a chic silk organza collar and semi-fitted shape. The grid mesh is made up of tiny cut beads that are unevenly cut at the edges, meaning that they give extra sparkle as they catch the light.
There is nothing more pleasing than perfectly polished nails. With Leighton Deny High Performance Colour nail varnish you can create high performance nails with opacity and evenness which is difficult to beat. The advanced premium formula provides a colour that doesnt fade and creates a high gloss shine that lasts. Also available in a never-ending list of shades Angel Dust creates a different
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
get result using startActivityForResult()
I am trying to open my calculator and value from it then I am done here is my code for my page (where the main point is as it shows how I tried to get result)
TextView.OnClickListener listener = new TextView.OnClickListener()
{
public void onClick(View v)
{
startActivityForResult(new Intent("com.easyPhys.start.calculator"), 1);
}
};
@Override
protected void onActivityResult(int requestCode, int resultCode, Intent data)
{
// TODO Auto-generated method stub
super.onActivityResult(requestCode, resultCode, data);
if(resultCode==1)
{
Toast.makeText(this, "Pass", Toast.LENGTH_LONG).show();
}
}
this is how I tried to give a result from calculator.java:
mClickListener = new ButtonClickListener();
int idList[] = { R.id.button0, R.id.button1, R.id.button2,
R.id.button3, R.id.button4, R.id.button5, R.id.button6,
R.id.button7, R.id.button8, R.id.button9, R.id.buttonLeftParen,
R.id.buttonRightParen, R.id.buttonPlus, R.id.buttonDone,
R.id.buttonMinus, R.id.buttonDivide, R.id.buttonTimes,
R.id.buttonDecimal, R.id.buttonBackspace, R.id.buttonClear, R.id.buttonPow, R.id.buttonSin, R.id.buttonCos,R.id.buttonTan,R.id.buttonAcos,R.id.buttonAtan,R.id.buttonAsin,R.id.buttonLog,R.id.buttonLog10,R.id.buttonComma,R.id.buttonToradians,R.id.buttonTodegrees };
for(int id : idList) {
View v = findViewById(id);
v.setOnClickListener(mClickListener);
}
private class ButtonClickListener implements OnClickListener {
@Override
public void onClick(View v) {
case R.id.buttonDone:
if(mMathString.length() > 0);
Bundle bundle = new Bundle();
bundle.putString("str", mMathString.toString());
Intent in = new Intent();
in.putExtras(bundle);
setResult(1, in);
new View.OnClickListener() {
@Override
public void onClick(View v) {
// TODO Auto-generated method stub
finish();
}
};
break;
can anyone help me to understand where I went wrong as program does not close and give an answer?
A:
Have you verified that your onClick method is being called? The reason I ask is that you show the code for onClick but you don't show that you set this for the equals button by calling setOnClickListener.
|
{
"pile_set_name": "StackExchange"
}
|
c) -2 (d) -0.4 (e) -360
b
Which is the closest to 1/3? (a) 293 (b) 2/3 (c) -7405 (d) -5
b
Which is the nearest to -2/49? (a) 5/668 (b) 2/5 (c) -514
a
What is the nearest to 4.5 in 5, 582, 10?
5
What is the nearest to -1 in 2052682, 1, 2?
1
Which is the nearest to 2/49? (a) -9/4 (b) -172 (c) 0.2
c
Which is the closest to 1.814? (a) 4 (b) 29 (c) 13
a
What is the nearest to -15.315 in -1, -3, 7?
-3
What is the nearest to -88/21 in 0.3, 6118, -1?
-1
Which is the nearest to 0? (a) 356 (b) 9 (c) 0.2 (d) 0.037
d
Which is the closest to -0.029? (a) -0.3 (b) -1 (c) -3 (d) -2639
a
What is the nearest to 0.1 in -0.2, -787, -5, 2143, -1?
-0.2
What is the nearest to -2 in 17, 4/5, -1, 10318, 1/4, 3?
-1
Which is the closest to 0.2? (a) 0.04 (b) 3 (c) -5 (d) 0.1028 (e) -21
d
Which is the closest to -5? (a) 5 (b) -832/5 (c) -34 (d) 3
d
Which is the closest to 1? (a) 0.21 (b) 4 (c) 354.39
a
What is the nearest to -0.3 in 2, 383, -38, -5, -1/4, 1/3?
-1/4
Which is the nearest to 0? (a) 6067 (b) 0.4 (c) -4 (d) -0.23 (e) -1/12 (f) 0.2
e
Which is the closest to -1/4? (a) -3 (b) 1/3 (c) 993 (d) -5504
b
What is the closest to 2.12 in 14, -1/4, -1/6, 33.5?
-1/6
Which is the nearest to 385.853? (a) 5 (b) -0.2 (c) 6
c
Which is the nearest to -8? (a) 1 (b) 12/13 (c) -0.2 (d) 21.754 (e) -1/4
e
What is the nearest to -2404 in 10, 1/2, 1, -3/7, -2/9, 6?
-3/7
Which is the closest to -0.43? (a) -1/21 (b) -0.7 (c) 381 (d) 4
b
Which is the closest to 3? (a) -2/3 (b) -3761 (c) 2/9 (d) 1/4
d
What is the closest to -21/4 in 565, 5, -1, 18/5, -4?
-4
Which is the closest to -9? (a) -1/9 (b) -1325 (c) -1/10 (d) 0.3 (e) -1/8
e
What is the closest to -3238/27 in 4/3, -0.1, -4, 2, -1?
-4
What is the nearest to -1/2 in -0.1, 0.33, -2/11, -224?
-2/11
Which is the nearest to -4? (a) -11 (b) 0.05 (c) 1.8 (d) -63 (e) 0.2
b
Which is the nearest to -1? (a) 1.4 (b) 0 (c) 3/13 (d) 334
b
Which is the closest to -37? (a) 4 (b) -0.1 (c) -2/15 (d) -3/11 (e) -5/22
d
Which is the nearest to -0.6? (a) -0.3 (b) -3410/13 (c) -5 (d) 2/3 (e) -4
a
Which is the closest to 1.2? (a) 2 (b) -4/5 (c) 12 (d) -4064
a
Which is the nearest to 0? (a) 1.2 (b) -2/3 (c) 3920 (d) 4
b
What is the closest to 0.2 in -8382, 0.2, -0.8, -1/61, 2/11?
0.2
What is the closest to 0.1 in 2/3, 16586213, 3?
2/3
What is the nearest to 0 in 44.9, 9/35, -1/8?
-1/8
Which is the nearest to 2? (a) 3 (b) -427 (c) -2/13 (d) -2216 (e) 2
e
What is the closest to 20 in -99, 0.2, -16, -11?
0.2
What is the nearest to -3/5 in -0.1, 285/503, -1/6?
-1/6
Which is the closest to -5? (a) -1 (b) -543 (c) 3 (d) -1/6 (e) 2 (f) 68
a
What is the nearest to 0 in 1/50, 13, -0.5, -2/3, 1, 8/45?
1/50
Which is the closest to 2? (a) 5 (b) -10 (c) -0.1 (d) -10868
c
Which is the closest to 1? (a) -3 (b) -687 (c) 2/11 (d) 20 (e) 21
c
What is the closest to 1 in 4179.7, 0.5, 101, -2/13?
0.5
What is the nearest to -2 in 40, -12, 613, 27?
-12
What is the nearest to -0.03 in 2/9, 14/9, 0.3, 392?
2/9
What is the nearest to -3 in -2/11, -0.04, 42, 3.4, 2/11?
-2/11
Which is the nearest to -2? (a) -13/73 (b) 18 (c) -2/9 (d) -1.5
d
What is the closest to -1/3 in -80281/5, 1/6, 4, -1, -0.8?
-0.8
What is the nearest to -2/17 in 0.06, 0.4, -0.007, -5/8?
-0.007
Which is the nearest to -6? (a) -5 (b) -0.0682 (c) -1/9 (d) -0.3 (e) 0.2
a
What is the nearest to 0.33 in 0, -2/7, 5, -4405, 1/3?
1/3
Which is the closest to -2? (a) -11 (b) 25 (c) -86.32
a
What is the nearest to -6225 in 0.03, 0.3, -151/2, 3?
-151/2
Which is the nearest to 45? (a) -17 (b) -0.43 (c) 1 (d) 3 (e) -3/2
d
Which is the closest to -10? (a) -2/13 (b) 3/13 (c) -16 (d) -20.2 (e) 5
c
Which is the nearest to -26? (a) -0.05 (b) 1 (c) -16
c
What is the nearest to 1 in 3.8, 0.013444, 0.5, 0?
0.5
Which is the nearest to -26? (a) -1.56 (b) -1/5 (c) 1/29 (d) -2 (e) -0.8
d
What is the nearest to -9879 in 0.59, -3, 1/7?
-3
What is the nearest to -0.02 in 1/3, 0.06141, 2/11?
0.06141
Which is the nearest to -112.7? (a) -7 (b) 29 (c) -4/3 (d) -20
d
Which is the nearest to -178? (a) -6 (b) -0.3 (c) 0.77
a
What is the nearest to 1/2 in 20, 2434, -0.2, -0.074?
-0.074
What is the nearest to -6/25 in 20, -10983, 0.4?
0.4
Which is the closest to -27? (a) 4/5 (b) -3/8 (c) -3/2 (d) -2 (e) 3 (f) -0.24
d
Which is the closest to -0.1? (a) -63 (b) -0.0291 (c) -5 (d) -1/15 (e) 0.06
d
Which is the closest to 510.9? (a) -2 (b) 5.8 (c) 1/5 (d) 3 (e) -69
b
Which is the closest to 50? (a) 2553 (b) 0 (c) -2/67 (d) -1
b
Which is the closest to 1/4? (a) -0.033 (b) -0.01 (c) 10284
b
What is the nearest to 0.319 in 2/13, -2.3, -0.4, -4/127?
2/13
Which is the nearest to -0.6? (a) -174 (b) 2/275 (c) -12
b
What is the closest to -14/3 in 1, -112, 7, -3?
-3
What is the nearest to -7/502 in 72/7, 0.2, -0.6?
0.2
What is the closest to -4801 in 1, 4, -1/8, 40?
-1/8
What is the closest to -15 in -9/5, 0.3, -8/13, 0.1, -1/57?
-9/5
What is the nearest to -0.3 in 57/167, -5, -2/147?
-2/147
Which is the closest to 2? (a) -40/1303 (b) -2/21 (c) -0.6 (d) 0.06 (e) 3/4
e
Which is the closest to -2? (a) 3 (b) -1313 (c) -3/7
c
Which is the closest to -0.2? (a) -0.08 (b) 3/2 (c) 2/9 (d) -151 (e) 5/8
a
Which is the nearest to -0.1? (a) -1/3 (b) -0.02 (c) -0.1 (d) 111 (e) -819
c
Which is the nearest to -0.029? (a) 0 (b) 5 (c) 0.5 (d) -4010
a
Which is the nearest to 1? (a) 1 (b) -5/6 (c) 0.5503 (d) 0.1 (e) 89
a
What is the closest to 0.3 in 4/3, -8/89, -0.3, 9?
-8/89
What is the closest to -1 in 1, 27986, -0.1, 13?
-0.1
What is the closest to -553407 in 1/6, 0.4, -4, 0.3?
-4
Which is the nearest to 2/5? (a) -1 (b) 11/4 (c) -45179
a
What is the closest to 0 in 1428/11, -6.4, -0.1, 5, 6?
-0.1
What is the closest to -1/2 in 36, -2/13, -17292?
-2/13
What is the nearest to 1 in 6, 0.39, 5, 62, -2?
0.39
Which is the closest to -8/3? (a) 5 (b) -0.15 (c) -0.078 (d) -0.5
d
Which is the closest to 0? (a) 183 (b) 5 (c) -12 (d) 3 (e) -62
d
Which is the closest to 1? (a) 122 (b) -3 (c) -0.7 (d) 1.8
d
Which is the closest to 10? (a) 14 (b) -2/11 (c) -2349
a
Which is the nearest to 6? (a) 4 (b) 0.916 (c) -23 (d) 0
a
What is the closest to 87 in -316, 0, -1.8, 4?
4
What is the closest to 2/7 in -2, -32, -5/3, -13?
-5/3
Which is the closest to 0.3? (a) 1 (b) 1.41557 (c) 8 (d) 0
d
What is the closest to 1 in 3/5, 0, 4, -56, -439, -2/39?
3/5
Which is the nearest to 2? (a) 4/7 (b) 0.127 (c) -0.16283
a
Which is the nearest to 5? (a) 2 (b) -1/12 (c) 102/7 (d) -0.5 (e) 2/37
a
What is the nearest to 0 in 59771, -0.5, -0.01, 4?
-0.01
What is the closest to -2 in -465, 4/11, -3?
-3
What is the nearest to -1 in 3/5, 1644, -119, -1/5?
-1/5
Which is the closest to -0.4? (a) 30580 (b) 1 (c) -16 (d) -5
b
What is the closest to 0.05 in 4, 83, 24358?
4
Which is the closest to 1/4? (a) 4547 (b) 0.5 (c) -4/7 (d) -433
b
Which is the nearest to -1/15? (a) 3/2 (b) 1 (c) 2/5 (d) -4 (e) 0.019 (f) 0.1
e
Which is the closest to -96? (a) -8 (b) 0.4 (c) -29
c
Which is the nearest to 1/2? (a) 13/69 (b) 0.1494 (c) 5
a
What is the nearest to -3/8 in -7, -1/6, -1, -0.08, 1273, -3?
-1/6
What is the closest to 0.205 in 1/5, -8, -293?
1/5
Which is the nearest to 1.06? (a) -0.1 (b) -41 (c) -0.2 (d) 229
a
Which is the nearest to -1? (a) 4 (b) 0.2 (c) -3/1663 (d) 5 (e) 12 (f) 0.4
c
Which is the nearest to -2/7? (a) -0.03987 (b) -102 (c) 0.2 (d) -0.3
d
What is the closest to 8 in -4/3, 12, -19, 2/3, -2, -0.0685?
12
Which is the closest to 1? (a) -616 (b) -1.2 (c) 395
b
Which is the nearest to 2? (a) 7/260 (b) -0.5 (c) -724
a
Which is the closest to 0.3? (a) -1/87 (b) -0.5 (c) 4 (d) 0.09 (e) -1.5
d
Which is the nearest to 13541? (a) 0.4 (b) 4 (c) 1/7
b
Which is the nearest to 11470? (a) 4 (b) -2 (c) 0.14 (d) -0.2
a
Which is the nearest to -0.1? (a) -0.2 (b) 2054 (c) -7.1 (d) 0.06 (e) 0.2
a
What is the closest to -69 in -0.3, -4, -0.04, -593/7, 2, 0?
-593/7
What is the nearest to 3 in 0.1, -4/93, 0.3, 3, -2, -5/17?
3
What is the nearest to 14 in 5/11, -5, 25, 0?
25
What is the closest to 0.05 in -5, 2/9, 1.335, -2/7, 0?
0
Which is th
|
{
"pile_set_name": "DM Mathematics"
}
|
Q:
file uploading to folder with current time
I've created successful a file uploading-system.
but how do I move the uploaded-file to a folder with a random name? (current time)
index.php:
<!doctype html>
<body>
<form action="file-up.php" method="post" enctype="multipart/form-data">
<table>
<tr><td>File:</td><td><input type="file" name="myfile"></td></tr>
<tr><td> </td><td><input type="submit" value="Upload"></td></tr>
</table>
</div>
</form>
</body>
</html>
file-up.php:
<?php
$time = new DateTime();
$time->format('YmdHis');
$upload_dir = "uploads/";// . $time;
if (isset($_FILES["myfile"])) {
if ($_FILES["myfile"]["error"] > 0) {
echo "Error: " . $_FILES["file"]["error"] . "<br>";
} else {
move_uploaded_file($_FILES["myfile"]["tmp_name"], $upload_dir . $_FILES["myfile"]["name"]);
echo "Uploaded File: " . $_FILES["myfile"]["name"];
}
}
?>
A:
Try this Working Code
<?php
$time = new DateTime();
$time->format('YmdHis');
//$upload_dir = "uploads/";// . $time;
$folder_name=date('mds');
$new_folder=mkdir($folder_name, 0777, true);
if(file_exists($new_folder)){
echo "Folder already exist";
}
$upload_dir = $folder_name.'/';
if (isset($_FILES["myfile"])) {
if ($_FILES["myfile"]["error"] > 0) {
echo "Error: " . $_FILES["file"]["error"] . "<br>";
} else {
if(move_uploaded_file($_FILES["myfile"]["tmp_name"], $upload_dir. $_FILES["myfile"]["name"])){
echo "Uploaded File: " . $_FILES["myfile"]["name"];
} else {
echo $new_folder .'/'. $_FILES["myfile"]["name"];
echo "Folder created file not uploaded";
}
}
}
?>
|
{
"pile_set_name": "StackExchange"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.