text
stringlengths
1
3.78M
meta
dict
/* * net/sched/cls_basic.c Basic Packet Classifier. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. * * Authors: Thomas Graf <tgraf@suug.ch> */ #include <linux/module.h> #include <linux/slab.h> #include <linux/types.h> #include <linux/kernel.h> #include <linux/string.h> #include <linux/errno.h> #include <linux/rtnetlink.h> #include <linux/skbuff.h> #include <net/netlink.h> #include <net/act_api.h> #include <net/pkt_cls.h> struct basic_head { u32 hgenerator; struct list_head flist; struct rcu_head rcu; }; struct basic_filter { u32 handle; struct tcf_exts exts; struct tcf_ematch_tree ematches; struct tcf_result res; struct tcf_proto *tp; struct list_head link; struct rcu_head rcu; }; static int basic_classify(struct sk_buff *skb, const struct tcf_proto *tp, struct tcf_result *res) { int r; struct basic_head *head = rcu_dereference_bh(tp->root); struct basic_filter *f; list_for_each_entry_rcu(f, &head->flist, link) { if (!tcf_em_tree_match(skb, &f->ematches, NULL)) continue; *res = f->res; r = tcf_exts_exec(skb, &f->exts, res); if (r < 0) continue; return r; } return -1; } static unsigned long basic_get(struct tcf_proto *tp, u32 handle) { unsigned long l = 0UL; struct basic_head *head = rtnl_dereference(tp->root); struct basic_filter *f; if (head == NULL) return 0UL; list_for_each_entry(f, &head->flist, link) { if (f->handle == handle) { l = (unsigned long) f; break; } } return l; } static int basic_init(struct tcf_proto *tp) { struct basic_head *head; head = kzalloc(sizeof(*head), GFP_KERNEL); if (head == NULL) return -ENOBUFS; INIT_LIST_HEAD(&head->flist); rcu_assign_pointer(tp->root, head); return 0; } static void basic_delete_filter(struct rcu_head *head) { struct basic_filter *f = container_of(head, struct basic_filter, rcu); tcf_exts_destroy(&f->exts); tcf_em_tree_destroy(&f->ematches); kfree(f); } static void basic_destroy(struct tcf_proto *tp) { struct basic_head *head = rtnl_dereference(tp->root); struct basic_filter *f, *n; list_for_each_entry_safe(f, n, &head->flist, link) { list_del_rcu(&f->link); tcf_unbind_filter(tp, &f->res); call_rcu(&f->rcu, basic_delete_filter); } RCU_INIT_POINTER(tp->root, NULL); kfree_rcu(head, rcu); } static int basic_delete(struct tcf_proto *tp, unsigned long arg) { struct basic_filter *f = (struct basic_filter *) arg; list_del_rcu(&f->link); tcf_unbind_filter(tp, &f->res); call_rcu(&f->rcu, basic_delete_filter); return 0; } static const struct nla_policy basic_policy[TCA_BASIC_MAX + 1] = { [TCA_BASIC_CLASSID] = { .type = NLA_U32 }, [TCA_BASIC_EMATCHES] = { .type = NLA_NESTED }, }; static int basic_set_parms(struct net *net, struct tcf_proto *tp, struct basic_filter *f, unsigned long base, struct nlattr **tb, struct nlattr *est, bool ovr) { int err; struct tcf_exts e; struct tcf_ematch_tree t; tcf_exts_init(&e, TCA_BASIC_ACT, TCA_BASIC_POLICE); err = tcf_exts_validate(net, tp, tb, est, &e, ovr); if (err < 0) return err; err = tcf_em_tree_validate(tp, tb[TCA_BASIC_EMATCHES], &t); if (err < 0) goto errout; if (tb[TCA_BASIC_CLASSID]) { f->res.classid = nla_get_u32(tb[TCA_BASIC_CLASSID]); tcf_bind_filter(tp, &f->res, base); } tcf_exts_change(tp, &f->exts, &e); tcf_em_tree_change(tp, &f->ematches, &t); f->tp = tp; return 0; errout: tcf_exts_destroy(&e); return err; } static int basic_change(struct net *net, struct sk_buff *in_skb, struct tcf_proto *tp, unsigned long base, u32 handle, struct nlattr **tca, unsigned long *arg, bool ovr) { int err; struct basic_head *head = rtnl_dereference(tp->root); struct nlattr *tb[TCA_BASIC_MAX + 1]; struct basic_filter *fold = (struct basic_filter *) *arg; struct basic_filter *fnew; if (tca[TCA_OPTIONS] == NULL) return -EINVAL; err = nla_parse_nested(tb, TCA_BASIC_MAX, tca[TCA_OPTIONS], basic_policy); if (err < 0) return err; if (fold != NULL) { if (handle && fold->handle != handle) return -EINVAL; } fnew = kzalloc(sizeof(*fnew), GFP_KERNEL); if (!fnew) return -ENOBUFS; tcf_exts_init(&fnew->exts, TCA_BASIC_ACT, TCA_BASIC_POLICE); err = -EINVAL; if (handle) { fnew->handle = handle; } else if (fold) { fnew->handle = fold->handle; } else { unsigned int i = 0x80000000; do { if (++head->hgenerator == 0x7FFFFFFF) head->hgenerator = 1; } while (--i > 0 && basic_get(tp, head->hgenerator)); if (i <= 0) { pr_err("Insufficient number of handles\n"); goto errout; } fnew->handle = head->hgenerator; } err = basic_set_parms(net, tp, fnew, base, tb, tca[TCA_RATE], ovr); if (err < 0) goto errout; *arg = (unsigned long)fnew; if (fold) { list_replace_rcu(&fold->link, &fnew->link); tcf_unbind_filter(tp, &fold->res); call_rcu(&fold->rcu, basic_delete_filter); } else { list_add_rcu(&fnew->link, &head->flist); } return 0; errout: kfree(fnew); return err; } static void basic_walk(struct tcf_proto *tp, struct tcf_walker *arg) { struct basic_head *head = rtnl_dereference(tp->root); struct basic_filter *f; list_for_each_entry(f, &head->flist, link) { if (arg->count < arg->skip) goto skip; if (arg->fn(tp, (unsigned long) f, arg) < 0) { arg->stop = 1; break; } skip: arg->count++; } } static int basic_dump(struct net *net, struct tcf_proto *tp, unsigned long fh, struct sk_buff *skb, struct tcmsg *t) { struct basic_filter *f = (struct basic_filter *) fh; struct nlattr *nest; if (f == NULL) return skb->len; t->tcm_handle = f->handle; nest = nla_nest_start(skb, TCA_OPTIONS); if (nest == NULL) goto nla_put_failure; if (f->res.classid && nla_put_u32(skb, TCA_BASIC_CLASSID, f->res.classid)) goto nla_put_failure; if (tcf_exts_dump(skb, &f->exts) < 0 || tcf_em_tree_dump(skb, &f->ematches, TCA_BASIC_EMATCHES) < 0) goto nla_put_failure; nla_nest_end(skb, nest); if (tcf_exts_dump_stats(skb, &f->exts) < 0) goto nla_put_failure; return skb->len; nla_put_failure: nla_nest_cancel(skb, nest); return -1; } static struct tcf_proto_ops cls_basic_ops __read_mostly = { .kind = "basic", .classify = basic_classify, .init = basic_init, .destroy = basic_destroy, .get = basic_get, .change = basic_change, .delete = basic_delete, .walk = basic_walk, .dump = basic_dump, .owner = THIS_MODULE, }; static int __init init_basic(void) { return register_tcf_proto_ops(&cls_basic_ops); } static void __exit exit_basic(void) { unregister_tcf_proto_ops(&cls_basic_ops); } module_init(init_basic) module_exit(exit_basic) MODULE_LICENSE("GPL");
{ "pile_set_name": "Github" }
Q: How to implement like-HtmlHelper HtmlHelpers are really useful, also i was using AjaxHelpers untill i wanted to do something they can't... so now i'm prefering jquery+javascript, but i don't like to write in javascript (mayby because i never know it as good as i wanted) and to make life easier i wanted to implement something like JQueryHelper, but right now i don't know how I wanted to use inside of "Helper" resolved URL's, because most methods would just pass data to controllers etc... and update some parts of UI, so i'd like to create something like AjaxHelper, but based on JQuery, not MSScripts. What should I include in such class? how can i get context, url's and generate proper javascript code which can by dynamicly injected into ex. <div onclick=JQuery.Action("<ActionName>", "<Controller>", new { param1, param2}, <Id to Update>)> My Div</div> How is it implemented in HtmlHelper or AjaxHelper? Edit: I've tried few simple implementation, but i think I'm lack of knowledge and don't know how to implement class with extensions exacly. I've ClassA(class) and ClassAExt(extensions): I've something like that: static public class ClassAExt{ public static MvcHtmlString Method(this ClassA classA) { } } But in View(), when I'm using ClassAExt.Method() i have to pass also instance of ClassA (in helpers Ajax and Html this argument is grey (optional? not needed?), how to get such effect). A: I am not sure if I understand your question correctly. The HtmlHelper also get instantiated (i.e. new HtmlHelper()) during the course of page rendering and user control rendering. Ajax and URL helpers also get instantiated and this is what give one access to the various variables such HttpContext etc. So in order for you to use your helper class related to ClassA you too will need to instantiate it. I think then the question leads to how do I do this? You will probably need to extend the ViewPage, ViewUserControl and ViewMasterPage classes.
{ "pile_set_name": "StackExchange" }
News is what somebody somewhere wants to suppress; all the rest is advertising. Mugging at Jane and Lawrence Toronto Police report that two young men were mugged at the corner of Jane and Lawrence last week. Four men approached the pair and demanded their cell phones and cash. One mugger said that he was armed, but, according to police, did not show his weapon. The muggers also demanded the victim’s bank PIN number, and the victim provided it.
{ "pile_set_name": "Pile-CC" }
Q: Puppet does not honor 'require' modules I have created a module to add a user as follows: user { 'test': ensure => 'present', comment => 'Test User', home => '/home/test', shell => '/bin/bash', managehome => 'true', gid => 'postgres', groups => 'users', password => '$1$PIp.c9J6$gdAyd76OhBk7n9asda80wm0', require => [ Package['rubygem-ruby-shadow'], Class['postgres'] ], } It requires the class postgres as I need its primary group to be assigned to postgres, and the rubygem-ruby-shadow dependency is for the password setup. My problem is puppet does not honor these requirements. Puppet will always execute the useradd module first before rubygem-ruby-shadow, and this causes the password setup to fail. I have also tried to include rubygem-ruby-shadow in the same class as useradd but to no avail. The output upon running puppet agent -t: linux-z14x:~ # puppet agent -t info: Caching catalog for linux-z14x.playground.local info: /User[test]: Provider useradd does not support features manages_passwords; not managing attribute password info: Applying configuration version '1425978163' notice: /Stage[main]/Users/Package[rubygem-ruby-shadow]/ensure: created notice: /User[test]/ensure: created notice: Finished catalog run in 78.19 seconds Running it the second time: linux-z14x:~ # puppet agent -t info: Caching catalog for linux-z14x.playground.local info: Applying configuration version '1425978163' notice: /Stage[main]/Users/User[test]/password: changed password notice: Finished catalog run in 74.79 seconds My rubygem-ruby-shadow class: package { 'rubygem-ruby-shadow': ensure => 'installed', require => Class['myrepo'], provider => 'zypper', } How do I get rubygem-ruby-shadow module to run first before the useradd? Puppet master version is 3.7.4-1 (on CentOS) and puppet client is 2.6.12-0.10.1 (on SLES 11 SP2). Thanks. A: This is unfortunate. The provider detects the absence of ruby-shadow during agent initialization, and does not update its capabilities during the transaction. This may be limitation of Puppet that might be fixed in a more recent version (what are you using?) I do try and make sure to provide ruby-shadow along with Puppet itself everywhere, to avoid this very issue.
{ "pile_set_name": "StackExchange" }
Q: PHP variable changes itself although not passed by reference In the following code, I am having trouble understanding why the variable $service_category_tree changes by itself. Somehow, the subscription_tree alter's the parameter variable although it is not passed by reference. $service_category_tree = $this->service_category_model->with_request_forms(); foreach ($this->view_data['users'] as &$user) { echo md5(serialize($service_category_tree))."<br>"; // To check if the variable is changed. $user->service_categories = $this->merchant_model->subscription_tree($user->id, $service_category_tree); } The output of the MD5 statement, as you can see shows that the variable is changed: 10066a31bb6e191fbb94b8dc61fd6e55 10066a31bb6e191fbb94b8dc61fd6e55 fd1e22aa74c048e88751c85528d23254 752e0cef4357d7a33e47b90ef207d396 8b5b6ea856080bf32b9bfecc4e43a3f6 8b5b6ea856080bf32b9bfecc4e43a3f6 8b5b6ea856080bf32b9bfecc4e43a3f6 3f3e7619e59e3776c395065e4278c3f8 3f3e7619e59e3776c395065e4278c3f8 dbfebae62d65bd04ce4ce74f2046f90e 34498709256b34ce4d843c1f735c4c6a The method subscription_tree does not have an ampersand on the second parameter as seen in the following code. function subscription_tree($merchant_id, $tree_array = NULL){ if($tree_array === NULL){ $this->load->model('service_category_model'); $tree_array = $this->service_category_model->with_request_forms(); } if(is_array($tree_array) && count($tree_array)){ $my_request_forms = $this->request_forms($merchant_id)->result(); $my_service_categories = $this->service_categories($merchant_id)->result(); foreach ($tree_array as &$sc) { // Indicate subscribed service categories $sc->subscribed = FALSE; if(is_array($my_service_categories) && count($my_service_categories)) { foreach ($my_service_categories as $my_sc_key => $my_sc) { if($my_sc->id == $sc->id){ $sc->subscribed = TRUE; unset($my_service_categories[$my_sc_key]); } } } // Indicate subscribed request forms if(is_array($sc->request_forms) && count($sc->request_forms)) { foreach ($sc->request_forms as &$rf) { $rf->subscribed = FALSE; if(count($my_request_forms)) { foreach($my_request_forms as $mrf_key => $my_request_form){ if ( $my_request_form->id == $rf->id ) { $rf->subscribed = TRUE; unset($my_request_forms[$mrf_key]); break; } } } } } } } return $tree_array; } A: In PHP objects are always passed by reference: Thus lines foreach ($tree_array as &$sc) { // Indicate subscribed service categories $sc->subscribed = FALSE; could change the $tree_array object, which is a reference to $service_category_tree You could also make a deep-copy of your array: $new_tree = array(); foreach ($service_category_tree as $k => $v) { $new_tree[$k] = clone $v; } and pass it to the function. Or make a deep-copy in the function... More info at http://php.net/manual/en/language.oop5.references.php
{ "pile_set_name": "StackExchange" }
A developmental study of the relationship between geometry and kinematics in drawing movements. Trajectory and kinematics of drawing movements are mutually constrained by functional relationships that reduce the degrees of freedom of the hand-arm system. Previous investigations of these relationships are extended here by considering their development in children between 5 and 12 years of age. Performances in a simple motor task--the continuous tracing of elliptic trajectories--demonstrate that both the phenomenon of isochrony (increase of the average movement velocity with the linear extent of the trajectory) and the so-called two-thirds power law (relation between tangential velocity and curvature) are qualitatively present already at the age of 5. The quantitative aspects of these regularities evolve with age, however, and steady-state adult performance is not attained even by the oldest children. The power-law formalism developed in previous reports is generalized to encompass these developmental aspects of the control of movement.
{ "pile_set_name": "PubMed Abstracts" }
About This Game -Online co-op campaign -- do the entire campaign online and with your friends!-Unique Physics-Based Abilities and Weapons -- shred the hordes of oncoming aliens!-Innovative Swarm Gameplay -- shape and manipulate the oncoming enemy formations to maximize destruction!-Deep Tactical Gameplay -- only the best vikings can master the hardest difficulties and achieve the high-scores. It takes a high degree of cooperation and individual skill to defeat the hardest difficulty. A warning to the weak!-Blast through throngs of enemies from 3 dimensions! Battle the fleets of the Federites, face the gory horror of the Sluglings, and feel the wrath of the Sugarfiends. Assault them on their homeworlds, destroy their buildings, raid their lands, and take the elementium that you came for!-10 Missions, with fully voice acted dialogue! Roughly 5 hours to complete the campaign for the first time.-Singleplayer, and 2-4 player co-op campaign supported.-Xbox controller support. (General Gamepad Support)-3 different difficulty settings for a more chill experience or legendary mode for the try-hards.-A large selection of epic music to splatter your foes to.-4 Playable characters, each with many unique abilities.[YouTube Reviews]-Endless mode, survive as long as you can with limited health and energy against the endless horde.-PvP nutball (soccer / football mode)-More levels-Got ideas? Join the Discord!Space Viking Raiders is a co-op action role-playing game set in a comedic, sci-fi multiverse. 1 to 4 people can play the 3-5 hour campaign locally or through ONLINE MULTIPLAYER!! Our badass energy axes and special abilities are similar to popular MOBA mechanicsChoose 1 of 4 Space Vikings, raid other dimensions and engage thousands of aliens in intense futuristic combat. Launch your destructive onslaught with 10 devastating abilities that will obliterate enemies and landscapes alike. Use brute force and aggression to smash through enemy waves or pick your moment and strike with tactical precision. Once you’ve vaporized all foes in your path you must destroy the enemy base with it’s spawners, energy shields and defensive turrets. In the center of each base, the “heart building”, destroy it, the base crumbles and you’ll claim it’s precious Elementium.Play online or locally with up to 4 people. Take advantage of different play styles and abilities using complimentary weapon systems to line up the best combos. When you and your fellow raiders run out of Energy, you’ll have to maneuver and melee, timing your attacks just right to keep the enemies at bay. Navigating the alien worlds will be a perilous venture and require careful platforming skills. As you move through canyons, over archipelagos and across the sugary desserts, you’ll have to bounce over cliffs, carefully maneuver moving platforms and avoid destroying the very ground under your feet.The 10 level campaign you will play through follows the story of legendary Space Viking Raider, Dredrick ‘Deadeyes’ and his ruthless and irreverent crew of Space Viking misfits. Nakano ‘Zica’ Zicarus, the audacious munitions expert and technical prodigy. Tommy K., the crew’s resident Berserker, brain damaged, and suffering from frequent bouts of memory loss and psychedelia. And Athelia, the crew’s 2nd in command and pilot, her competence and measured personality paired with a fierce loyalty to Dredrick. After raiding a science vessel and looting inter-dimensional portalling technology they begin raiding alien worlds. The arid canyons of the sluglings. The lush archipelago of the Federites. And the sugary desserts of the Sugarfiends.We play on hard.Based in Vancouver, Multiball Studios was created by Adam Thompson and Scott Banducci. Using their complementary skill sets and funded with their own money, they set out to build an indie game studio from the ground up.Despite having minimal time and resources, Multiball was able attract some of the best talent from Vancouver's rich game and film ecosystem. Sound engineers from feature film productions, artists from AAA gaming studios and modelers and animators from the indie game scene. Using a network of connections locally in Vancouver and from around the world they've pulled in music and voice acting from places like New Zealand and Scotland.The idea we believe in is both simple and difficult: the best way to become a successful indie game studio is to start making games. If our games are good, the money will flow. With veteran lead developer Adam Thompson at the helm we expect this first game will demonstrate the tremendous potential of Multiball Studios creativity and network of talented individuals.
{ "pile_set_name": "OpenWebText2" }
Q: Comparing two fields using LINQ I'm facing a weird problem. As shown in the image actually I selected record number 37 but lightswitch is highlighting as record number 1. 1) The FristName,LastName & HospitalName are unique indexes in the table Doctors since each doctor can have multiple addresses. 2) I'm validating this drop down field as below to avoid user from selecting doctors who are not part of the hospital patient belongs to. partial void DoctorsMasterItem_Validate(EntityValidationResultsBuilder results) { if (this.DoctorsMasterItem != null) { if (this.HospitalName != this.DoctorsMasterItem.HospitalName) { results.AddPropertyError("Make Sure the Hospital Patient belongs to and Doctor is also part of that hospital else your letters address would be wrong"); } } } The data model is A: A better approach would be to filter the dropdown box, so the user isn't presented with invalid choices. Have a look at these two articles. This is what I believe you should be doing, nested (or cascading) comboboxes: Nested AutoCompleteBox For Data Entry Nested AutoCompleteBox for data entry Part 2
{ "pile_set_name": "StackExchange" }
Indigenous health in Australia Indigenous health in Australia examines health and wellbeing indicators of Indigenous Australians compared with the rest of the population. Statistics indicate that Aboriginal Australians and Torres Strait Islanders are much less healthy than other Australians. Various government strategies have been put into place to try to remediate the problem; there has been some improvement in several areas, but statistics between Indigenous Australians and the rest of the Australian population still show unacceptable levels of difference. Colonisation and ongoing disadvantage European colonisation impacted the health of Indigenous Australians via land dispossession, social marginalisation, political oppression, incarceration, acculturation and population decline. The process began with the arrival of the British in 1788. With them came foreign diseases, dispossession, exploitation, warfare and violence for the Indigenous population, and the immediate effect was a widespread increase in mortality and disease. By the end of the 19th century, Indigenous Australians were greatly reduced in numbers and the survivors were largely confined to remote reserves and missions.They were associated in the public mind with disease, which led to exclusion from institutions and isolation from non-Indigenous society for fear of contamination. These colonial policies resulted in segregated oppression and a lack of access to adequate medical care, leading to further disease and mortality. The Australian government proceeded to deny the Indigenous people of their civil rights, including property rights; the ability to work and receive wages; and access to medical care and educational institutions. Legislation also allowed for the separation of Indigenous families, with guardianship being awarded to government officials called Protectors. Indigenous children forcibly removed from their families under Protection legislation in the first half of the 20th century are referred to as the Stolen Generations. Many of these children were neglected, abused, and denied of an education. The Australian government forced the Indigenous populations to assimilate into the colonisers’ culture through schools and programs, where Indigenous languages were banned and any resistance to these practices could result in imprisonment or death. This process of acculturation has led to trauma, including historical, inter-generational, and social trauma. Issues such as anxiety, stress, grief, and sadness are produced from this trauma, which have led to higher suicide rates, violence, substance abuse and incarceration of Indigenous peoples today. Social, political and economic factors that result from colonisation present barriers to quality healthcare, health education, and health behaviours. Acculturation has produced xenophobia, which has socially marginalized Indigenous people and excluded them from society. Social inclusion is a social determinant of health, and social marginalisation allows for injustices against Indigenous people to persist. Political disempowerment prevented them from accessing social services, sickness benefits, and from voting until the 1960s. Socio-economic inequality has resulted in poor employment opportunities, housing, education and healthcare. One in seven Indigenous Australians reported difficulty in accessing healthcare for their children, which include transportation costs and prescription costs. Displacement and disenfranchisement prevents access to healthcare resources such as screening programs, and results in delayed or inadequate treatment. An example of this can be seen in the high rates of cervical cancer, where a meta-analysis of Indigenous women from Australia, New Zealand, Canada and the United States attributed these rates to “socio-economic disenfranchisement resulting from colonialism”, rather than genetics. The displacement of Indigenous Australians to reserves and the isolation from society led to generations suffering from starvation and malnutrition. This has had profound effects on physical and intellectual development; Indigenous communities today in remote locations continue to suffer from malnutrition and chronic health problems, as well as lower levels of education. The persistence of inequality in educational attainment among contemporary Indigenous communities is viewed as a product of historical, political and social factors. European colonisers believed that Indigenous people were intellectually inferior, and education was thus denied as it was considered pointless. Low levels of education increase the likelihood of engaging in high risk health behaviors, as well as lower rates of participation in health screening and treatment. However, poor health behaviours and low utilisation of healthcare resources can be due to a combination of many factors. Racial discrimination towards Indigenous peoples that stems from processes of colonialism leads to a cumulative exposure to racism, and this is related to negative health outcomes. It produces feelings of anger and shame, which limits active participation in the mainstream healthcare system and society at large. Health issues cannot be separated from social and cultural factors such as racism, discrimination, cultural disconnection and lack of employment and educational opportunities. Colonisation has had an ongoing impact. Overcrowding and poor housing contributes to poor health and family dysfunction and violence. High rates of incarceration of adults and youth contribute to early death and poor mental health. Hospitalisation rate Indigenous Australians go to hospital at a higher rate than non-Indigenous Australians. In 2010–11, Indigenous Australians used hospitals 2.5 times more frequently than non-Indigenous people. This rate comes from an age-standardised separation rate (hospital check-out) of 911 per 1,000 for Indigenous people. The 2010–11 age-standardised separation rate for Indigenous people living in the NT was 1,704 per 1,000, 7.9 times the rate for non-Indigenous people. About 80% of the difference between these rates was due to higher separations for Indigenous people admitted for renal dialysis. Life expectancy From 1996 to 2001, the Australian Bureau of Statistics (ABS) used indirect methods for its calculations, because census results were deemed to be unreliable, and figures published in 2005 (59.4 years for males and 64.8 years for females) indicated a widely quoted gap of 17 years between indigenous and non-indigenous life expectancy, though the ABS does not now consider the 2005 figures to be reliable. The Social Justice Report: 2005 by the Australian Human Rights Commission reported a seventeen-year gap between the life expectancy of Indigenous Australians and non-Indigenous Australians. This prompted health and human rights activists to establish the "Close the Gap" campaign, which focused on health equality for Indigenous Australians, including increasing life expectancy, and associated factors such as housing. In 2009, after previous methods of comparing life expectancy rates proved unreliable, a new method was developed by the ABS, based on tracing the deaths of people identified as Indigenous at the 2006 census. In 2009 the ABS estimated life expectancy at 67.2 years for Indigenous men (11.5 years fewer than for non-Indigenous) and 72.9 years for Indigenous women (9.7 years fewer than for non-Indigenous). Estimated life expectancy of Indigenous men ranged from 61.5 years for those living in the Northern Territory to a high of 69.9 years for those living in New South Wales, and for Indigenous women, 69.2 years for those living in the Northern Territory to a high of 75.0 years for those living in New South Wales. As of 2010, life expectancy for Aboriginal and Torres Strait Islander men was estimated to be 11.5 years less than that of non-Indigenous men – 67.2 years and 78.7 years respectively. For Aboriginal and Torres Strait Islander women, the 2010 figures show a difference of 9.7 years – 72.9 years for Aboriginal and Torres Strait Islander women and 82.6 years for non-Indigenous women. Indigenous Australians are more likely to die at a younger age than their non-indigenous counterparts due to being unhealthy. A 2013 study, referring to the national Indigenous reform policy launched in 2008, Closing the Gap (see below), looked at the difficulties in interpreting the extent of the gap because of differing methods of estimating life expectancy between 2007 and 2012. It concluded: The 2019 report by the Close the Gap campaign reported that the gap in life expectancy was "widening rather than closing". Government initiatives In 1989, the National Aboriginal Health Strategy was created. Another attempt by the federal government to address health issues was via the creation of the Office of Aboriginal and Torres Strait Islander Health (OATSIH) in 1994, but this is no longer in existence. In 2007/08, the Australian government focused mainly on decreasing "overcrowding" within remote indigenous communities in endeavours to improve health in rural populations. The Implementation of Australian Rural Accommodation (ARIA) Programme was granted over four years to induce a significant level of housing reform. In 2010-2011, health expenditure for Aboriginal and Torres Strait Islander people was estimated at , or 3.7% of Australia's total recurrent health expenditure. The Aboriginal and Torres Strait Islander population comprised 2.5% of the Australian population at this time. Expenditure equated to per Indigenous person, which was 1.47 times greater than the spent per non-Indigenous Australian in the same year. In 2010-2011, Governments funded 91.4% of health expenditure for Indigenous people, compared with 68.1% for non-Indigenous people. In July 2018, Health Minister Greg Hunt and Ken Wyatt, then Minister for Indigenous Health, announced in funding for 28 new health initiatives through the National Health and Medical Research Council (NHMRC), including expanding renal health units in remote parts so that patients could stay on country with their families. The NHMRC also launched a plan to help direct Indigenous health and research investment for the next ten years. Closing the Gap The Council of Australian Governments initiated the first multi-sector approach in regards to initiating strategies to overcome the large discrepancy between Indigenous and European health statistics. The strategy, named Closing the Gap, was launched in 2008. The plan's success was dependent on the level of collaboration between all levels of the Australian Government, Indigenous leaders/communities and the health sector. Although there was some improvement in some areas, only two out of its seven targets were met. In July 2019, at the end of the first 10-year phase of Closing the Gap, the National Indigenous Australians Agency was established in July 2019, under the Minister for Indigenous Australians, Ken Wyatt, and this agency is now responsible for "lead[ing] and coordinat[ing] the development and implementation of Australia’s Closing the Gap targets in partnership with Indigenous Australians". Health status Overall A 2007 study found that the 11 largest preventable contributions to the indigenous burden of disease in Australia were from tobacco, alcohol, illicit drugs, high body mass, inadequate physical activity, low intake of fruit and vegetables, high blood pressure, high cholesterol, unsafe sex, child sexual abuse and intimate partner violence. In 2009, 26% of Indigenous Australians living in remote areas experienced 40% of the health gap of Indigenous Australians overall. In 2010–11 the most common cause of hospital admissions for Indigenous Australians in mainland Australia was for kidney dialysis treatment. Summary table (2003) Health problems with the highest disparity (compared with the non-Indigenous population) in incidence as of 2003 are outlined in the table below: Each of these indicators is expected to underestimate the true prevalence of disease in the population due to reduced levels of diagnosis. In addition, the following factors have been at least partially implicated in the inequality in life expectancy: poverty insufficient education substance abuse for remote communities, poor access to health services for urbanised Indigenous Australians, cultural pressures which prevent access to health services cultural differences resulting in poor communication between Indigenous Australians and health workers Diabetes In some areas of Australia, particular the Torres Strait Islands, the prevalence of type 2 diabetes among Indigenous Australians is between 25 and 30%. In Central Australia high incidences of type-2 diabetes has led to high chronic kidney disease rates amongst Aboriginals. The most common cause of hospital admissions for Indigenous Australians in mainland Australia was for dialysis treatment. Indigenous women experience twice the adjusted-age risk of gestational diabetes, thus leading to Indigenous women having a higher risk of developing type 2 diabetes after pregnancy and birth. Compared with the general Australian population, Indigenous Australians develop type 2 diabetes at a younger age. Cancers The incidence rate of cancer in Indigenous Australians compared with non-Indigenous Australians has varied between 2009 and 2017 and by state, but mostly showing a higher rate at between 1.1% and 1.4% for all cancers. Lung and breast cancers were the most common in the Indigenous population, and both lung and liver cancers were more common in the Indigenous than non-Indigenous population. Overall mortality rate from cancer was higher in New South Wales, Victoria, Queensland, WA, and the NT 2007–2014 (50% vs 65%, or 1.3 times as likely to die); this may be because they are less likely to receive the necessary treatments in time, or because the cancers that they tend to develop are often more lethal than other cancers. Human T-lymphotropic virus 1 In central Australia, Indigenous Australians have human T-lymphotropic virus 1 at a rate thousands of times higher than non-Indigenous Australians. Smoking In 2008, 45% of Aboriginal and Torres Strait Islander adults were current daily smokers. Smoking is one of the main factors contributing to chronic disease. Amongst Indigenous Australians 1 in 5 mortalities are caused by smoking. If the number of smoking Indigenous Australians is reduced to equal the number of non-smoking non-Indigenous individuals there is a potential decrease of 420 mortalities among Aboriginal and Torres Strait Islanders. In 2010 the Australian Government have put in place a 10-year program aimed at improving the health of Indigenous and Torres Strait Island. Pacific types of cancer including lung and cervical cancer occurs to 52% of indigenous women due to their smoking habit. Mental health In 2010, the rate of high or very high levels of psychological distress for Aboriginal and Torres Strait Islander adults was more than twice that of non-Indigenous Australians. A 2007 study in The Lancet found that the four greatest preventable contributions to the Indigenous mental health burden of disease were: alcohol consumption, illicit drugs, child sexual abuse and intimate partner violence. Up to 15% of the 10 year life expectancy gap compared to non-Indigenous Australians has been attributed to mental health disorders. Mental health should be taken into consideration in the Aboriginal concept of health and well being. In the incidence of children and the elderly many problems tend to be hidden. Some of the behavioural problems encountered tend to be linked to neurodevelopment delay and a failing education system. Mental health, suicide and self-harm remain major concerns, with the suicide rate being double that of the non-Indigenous population in 2015, and young people experiencing rising mental health rates. A 2017 article in The Lancet described the suicide rate among Indigenous Australians as a "catastrophic crisis": The report advocates Indigenous-led national response to the crisis, asserting that suicide prevention programmes have failed this segment of the population. The ex-prisoner population of Australian Aboriginal people is particularly at risk of committing suicide; organisations such as Ngalla Maya have been set up to offer assistance. There are high incidences of anxiety, depression, PTSD and suicide amongst the Stolen Generations, with this resulting in unstable parenting and family situations. Some mental health problems are attributed to the inter-generational trauma brought about by the Stolen Generations. There are known links between mental health and substance abuse. Substance abuse Many Indigenous communities suffer from a range of health, social and legal problems associated with substance abuse of both legal and illegal drugs, including but not limited to alcohol abuse, petrol sniffing, the use illegal drugs such as methamphetamines and cannabis and smoking tobacco. Tobacco use has been estimated to be the "greatest contributor (23%) to the gap in the disease burden between Indigenous and non-Indigenous Australians", with Indigenous people more than 2.5% likely to smoke daily than non-Indigenous Australians. The 2004–05 National Aboriginal and Torres Strait Islander Health Survey (NATSIHS) by the ABS found that, after adjusting for age differences between the two populations, Indigenous adults were more than twice as likely as non-Indigenous adults to be current daily smokers of tobacco. NATSIHS 2004/5 found that the proportion of the Indigenous adult population engaged in "risky" and "high-risk" alcohol consumption (15%) was comparable with that of the non-Indigenous population (14%), based on age-standardised data. The definition of "risky" and "high-risk" consumption used is four or more standard drinks per day average for males, two or more for females. The 2007 National Drug Strategy Household Survey reported that Indigenous peoples were "more likely than other Australians to abstain from alcohol consumption (23.4% versus 16.8%) and also more likely to consume alcohol at risky or high-risk levels for harm in the short term (27.4% versus 20.1%)". These NDSHS comparisons are non-age-standardised; the paper notes that Indigenous figures are based on a sample of 372 people and care should be exercised when using Indigenous figures. A 2016 study reported that in the Northern Territory (which has the greatest proportion of Indigenous Australians than any other state or territory, at 32%), per capita alcohol consumption for adults was 1.5 times the national average. In addition to the health risks associated with alcohol use, there is a relationship among alcohol abuse, violence and trauma. There has been increasing media attention to this problem, but it defies simple analysis or solutions as the issues are complex and intertwined. The study attempted to collate existing data on the problems and attempts to address them, concluding that more funding is needed to investigate the feasibility and suitability of the various interventional approaches in the Northern Territory. Indigenous Australians were 1.6 times as likely abstain completely from alcohol than non-Indigenous people in 2012–3. Twice as many men as women drink alcohol, and more likely to drink to risky levels. Foetal alcohol syndrome has been a problem, but the rate of pregnant women drinking had dropped from 20% in 2008 to 10% in 2015. To combat the problem, a number of programs to prevent or mitigate alcohol abuse have been attempted in different regions, many initiated from within the communities themselves. These strategies include such actions as the declaration of "dry zones" within Indigenous communities, prohibition and restriction on point-of-sale access, and community policing and licensing. In the 1980s, the psychoactive drug kava was introduced into the NT by Pacific Islander missionaries in the 1980s as an alternative to alcohol, as a safer alternative to alcohol. In 2007, commercial import of kava was banned, but Fiji and Vanuatu have asked the government to lift the ban. Petrol sniffing has been a problem among some remote Indigenous communities. Petrol vapour produces euphoria and dulling effect in those who inhale it, and due to its widespread availability, became a popular drug. Proposed solutions to the problem became a topic of heated debate among politicians and the community at large. In 2005 this problem among remote Indigenous communities was considered so serious that a new, low aromatic petrol Opal was distributed across the Northern Territory to combat it. A 2018 longitudinal study by the University of Queensland, commissioned by the National Indigenous Australians Agency, reported that the number of people sniffing petrol in the 25 communities studied had declined by 95.2%, from 453 to just 22. However volatile substance misuse (VSM) was found to continue to occur in several communities, mostly occasionally and opportunistically. The 2018 UQ study also reported that alcohol and cannabis were the drugs causing most concern in many of the 25 communities studied. "Alcohol was reported as being in regular use in 22 communities, and occasionally present in two others. Cannabis was reported as being in regular use in all 25 communities, and a serious problem in 20 communities. Ice was reported to be present in 8 of the 25 communities" (although mostly only occasional use). Violence and accidents Aboriginal and Torres Strait Islander Australians, particularly males, are far more likely than the rest of the community to experience injury and death from accidents and violence. Infant mortality The Aboriginal and Torres Strait Islander infant mortality rate varies across Australia. In New South Wales, the rate was 7.7 deaths per 1,000 live births in 2006-2008, compared with the non-Indigenous infant mortality rate of 4.3 deaths per 1,000 live births. In the Northern Territory, the Aboriginal and Torres Strait Islander infant mortality rate was over three times as high as the non-Indigenous infant mortality rate (13.6 deaths per 1,000 live births compared with 3.8 deaths per 1,000 live births). Male Aboriginal and Torres Strait Islander infant mortality in the Northern Territory was about 15 deaths per 1,000 live births, while female Aboriginal and Torres Strait Islander infant mortality was 12 deaths per 1,000. For non-Indigenous males the rate was 4.4 deaths per 1,000 births and for females it was 3.3 deaths per 1,000 (ABS 2009b). Between 1998 and 2008 the Indigenous to non-Indigenous rate ratio (the Aboriginal and Torres Strait Islander rate divided by the rate for other Australians) for infant mortality declined in the Northern Territory an average of 1.7% per year, while the rate difference (the Aboriginal and Torres Strait Islander rate minus the rate for other Australians) almost halved from 18.1 to 9.8 deaths per 1,000 births, which suggests that the gap between Aboriginal and Torres Strait Islander and non-Indigenous infant mortality in the Northern Territory has reduced (ABS 2009b). Pneumococcal disease Indigenous Australians have a higher rate of Invasive pneumococcal disease (IPD) than the wider Australian population. In Western Australia between 1997–2007, the IPD incidence rate was 47 cases per 100,000 population per year among Aboriginal people and 7 cases per 100,000 population per year in non-Aboriginal people. After the introduction of a pneumococcal conjugate vaccine (7vPCV), total IPD rates among Aboriginal children decreased by 46% for those less than 2 years of age and by 40% for those 2–4 years of age. Rates decreased by 64% and 51% in equivalent age groups for non-Aboriginal children. Oral health Until the 1980s Aboriginal children were recognised as having better oral health than non-Aboriginal children. Today, average rates of tooth decay in Aboriginal children are twice as high as non-Aboriginal children. Between 1991 and 2001, the rate of tooth decay amongst Aboriginal children living in metropolitan areas fell, going against the increase in child tooth decay in remote areas. A study performed in 2001-2002 showed that Indigenous Australian patients showed a higher ratio of missing or decayed teeth than European patients, but a lower ratio of filled teeth. A 2003 study found that complete loss of all natural teeth was higher for Aboriginal people of all age groups (16.2%) compared to non-Aboriginal people (10.2%). In remote communities, those with diabetes were found to have over three times the number of missing teeth than those without diabetes. Type 2 diabetes has been related to poor oral health. Changes in the Australian Indigenous diet away from a traditional diet, which had originally contained high levels of protein and vitamins. High in fibre and sugar and low in saturated fats – to a diet high in sugar, saturated fats and refined carbohydrates has negatively affected the oral health of Indigenous Australians. A 1999 study found that the water in rural and remote areas of Australia is less likely to be fluoridated than metropolitan areas, reducing access for many Aboriginal communities to fluoridated water. Fluoridated water has been shown to prevent dental decay. Hearing loss Aboriginals experience a high level of conductive hearing loss largely due to the massive incidence of middle ear disease among the young in Aboriginal communities. Aboriginal children experience middle ear disease for two and a half years on average during childhood compared with three months for non indigenous children and if untreated it can leave a permanent legacy of hearing loss. The higher incidence of deafness in turn contributes to poor social, educational and emotional outcomes for the children concerned. Such children as they grow into adults are also more likely to experience employment difficulties and find themselves caught up in the criminal justice system. Research in 2012 revealed that nine out of ten Aboriginal prison inmates in the Northern Territory suffer from significant hearing loss. Health dynamics A number of factors help to explain why Aboriginal and Torres Strait Islander people have poorer health than other Australians. In general, Aboriginal and Torres Strait Islander people are more likely to have lower levels of education, lower health education, higher unemployment, inadequate housing and access to infrastructure than other Australians. In particular, crowded housing has been identified as contributing to the spread of infectious diseases. Aboriginal and Torres Strait Islander Australians are also more likely to smoke, have poor diets and have high levels of obesity. A 2007 study found that the 11 largest preventable contributions to the indigenous burden of disease in Australia were tobacco, alcohol, illicit drugs, high body mass, inadequate physical activity, low intake of fruit and vegetables, high blood pressure, high cholesterol, unsafe sex, child sexual abuse and intimate partner violence. The 11 risk factors considered together explain 37% of the total burden of disease experienced by Indigenous Australians. The remaining 63% consists of a range of known and unknown risk factors, yet to be identified or quantified. Contemporary diet Poor-quality diet among the Indigenous population is a significant risk factor for three of the major causes of premature death in Indigenous Australians – cardiovascular disease, cancer and type 2 diabetes. Much of this burden of disease is due to extremely poor nutrition throughout life. A 2013 study of Indigenous dietary patterns in Northern Territory communities found there was a high expenditure on beverages and corresponding high intake of sugar-sweetened beverages coupled with low expenditure (and low intakes) of fruit and vegetables. Similarly high per capita consumption of sugar-sweetened beverages has also been reported among Aboriginal and Torres Strait Islander children at the national level. Modern Aboriginal Australians living in rural areas tend to have nutritionally poor diets, where higher food costs drive people to consume cheaper, lower quality foods. The average diet is high in refined carbohydrates and salt, and low in fruit and vegetables. There are several challenges in improving diets for Aboriginal Australians, such as shorter shelf lives of fresh foods, resistance to changing existing consumption habits, and disagreements on how to implement changes. Some suggest the use of taxes on unhealthy foods and beverages to discourage their consumption, but this approach is questionable. Providing subsidies for healthy foods has proven effective in other countries, but has yet to be proven useful for Aboriginal Australians specifically. Cross-cultural miscommunication Among the factors that have been at least partially implicated in the inequality in life expectancy between Indigenous and non-Indigenous people in Australia are cultural differences resulting in poor communication between Indigenous Australians and health workers. According to Michael Walsh and Ghil'ad Zuckermann, Western conversational interaction is typically "dyadic", between two particular people, where eye contact is important and the speaker controls the interaction; and "contained" in a relatively short, defined time frame. However, traditional Aboriginal conversational interaction is "communal", broadcast to many people, eye contact is not important, the listener controls the interaction; and "continuous", spread over a longer, indefinite time frame. Hospital partnerships with traditional healers The ngangkari are traditional healers of the Anangu Aboriginal people of the Western Desert cultural bloc, who have been invited to partner with hospitals in South Australia to offer traditional healing services. Studies relating to Aboriginal people only The following studies are confined to Aboriginal peoples only, although not necessarily only true of those populations: A 2015 study showed that Aboriginal Australians have disproportionately high rates of severe physical disability, as much as three times that of non-Aboriginal Australians, possibly due to higher rates of chronic diseases such as diabetes and kidney disease. The study found that obesity and smoking rates were higher among Aboriginal people, which are contributing factors or causes of serious health issues. The study also showed that Aboriginal Australians were more likely to self-report their health as "excellent/very good" in spite of extant severe physical limitations. One study reports that Aboriginal Australians are significantly affected by infectious diseases, particularly in rural areas. These diseases include strongyloidiasis, hookworm caused by Ancylostoma duodenale, scabies, and streptococcal infections. Because poverty is also prevalent in Aboriginal populations, the need for medical assistance is even greater in many Aboriginal Australian communities. The researchers suggested the use of mass drug administration (MDA) as a method of combating the diseases found commonly among Aboriginal peoples, while also highlighting the importance of "sanitation, access to clean water, good food, integrated vector control and management, childhood immunisations, and personal and family hygiene". A study examining the psychosocial functioning of high-risk-exposed and low-risk-exposed Aboriginal Australians aged 12–17 found that in high-risk youths, personal well-being was protected by a sense of solidarity and common low socioeconomic status. However, in low-risk youths, perceptions of racism caused poor psychosocial functioning. The researchers suggested that factors such as racism, discrimination and alienation contributed to physiological health risks in ethnic minority families. The study also mentioned the effect of poverty on Aboriginal populations: higher morbidity and mortality rates. Aboriginal Australians suffer from high rates of heart disease. Cardiovascular diseases are the leading cause of death worldwide and among Aboriginal Australians. Aboriginal people develop atrial fibrillation, a condition that sharply increases the risk of stroke, much earlier than non-Aboriginal Australians on average. The life expectancy for Aboriginal Australians is 10 years lower than non-Aboriginal Australians. Technologies such as the Wireless ambulatory ECG are being developed to screen at-risk individuals, particularly rural Australians, for atrial fibrillation. See also Health in Australia Australian Indigenous HealthInfoNet - internet resource Opal (fuel), fuel developed to stop petrol sniffing Race and health New World Syndrome References Further reading Category:History of Indigenous Australians Category:Healthcare in Australia Category:Children's health in Australia Category:Mental health in Australia Category:Health policy in Australia
{ "pile_set_name": "Wikipedia (en)" }
A woman's video of a man masturbating in front of her on a train in France has gone viral, in yet another example of the rampant sexual harassment that many women face on public transportation. Natacha Bras, vice-president of MoiAussiAmnesie, a group that provides support to sexual assault victims who suffer amnesia, filmed the incident on a Poitiers-bound train on June 22. The video, which Bras posted on Twitter without blurring the harasser's face, has since been viewed more than 110,000 times. The France 24 Observers is not authorized to publish the video on YouTube, but is including a screenshot in which the man can be seen with his hand in the crotch of his pants. Bras said on Twitter that the man had changed seats to be closer to her and began masturbating while looking at her. "He did this for an hour and 15 minutes and then followed me toward the bathroom. I am going to file a complaint because this man will do this again, for sure. I have other videos as well,” Bras wrote. Bras later told local radio station France Bleu that train car was almost empty. "I didn’t see any staff on board until Poitiers, where the man who had been masturbating got off the train,” Bras said. “I started filming because I thought it might be my only way to defend myself.” The French national railway operator SNCF said in a reply to Bras' tweets that it "regretted the difficult travel conditions" she endured and that in the future she should notify train personnel or call SNCF's emergency number if she encountered a similar situation. The perpetrator could face one year in prison and receive a 15,000-euro fine, according to the French magazine L'Obs. But because French privacy laws often protect individuals from having their image taken without their consent, Bras could risk facing one year in prison and a fine of 45,000 euros. "I can be sentenced to a heavier penalty" than the perpetrator, Bras wrote on Twitter. "Do you think it is acceptable?"
{ "pile_set_name": "OpenWebText2" }
Rudnik, Starachowice County Rudnik () is a village in the administrative district of Gmina Brody, within Starachowice County, Świętokrzyskie Voivodeship, in south-central Poland. It lies approximately south of Brody, south-east of Starachowice, and east of the regional capital Kielce. The village has a population of 373. References Rudnik
{ "pile_set_name": "Wikipedia (en)" }
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Document</title> </head> <body> <script type="text/javascript"> var obj = { name: 'test', age: 3, foo: function() {} }; console.log('-------------for...in-------------'); // 利用for...in遍历,for...in会遍历所有可枚举的属性,包含原型对象上的 for (var prop in obj) { console.log(prop, obj[prop]); } console.log('-------------使用hasOwnProperty过滤原型属性-------------'); // 使用hasOwnProperty过滤原型属性 for (var prop2 in obj) { if (obj.hasOwnProperty(prop2)) { console.log(prop2, obj[prop2]); } } console.log('-------------es5支持(IE9+)-------------'); console.log('-------------keys-------------'); // 通过Object.keys获得对象的所有属性名组成的数组 console.log(Object.keys(obj)); console.log('-------------es6支持-------------'); console.log('-------------values-------------'); // 通过Object.values获得对象的所有值组成的数组 console.log(Object.values(obj)); console.log('-------------entries-------------'); // 通过Object.entries获得对象的键值对组成的的多维数组 console.log(Object.entries(obj)); </script> </body> </html>
{ "pile_set_name": "Github" }
Q: The filter does not return anything even after match in Javascript so I am trying use this Filter in one of my functions but the filter return empty array even though there are few matches . code filteredCardList: function () { if (this.monthFilter.length > 0) { return this.cardList.filter((card) => { this.monthFilter.forEach(function (val) { if (val.toString() == card.months) { console.log('Matched') return true; } else { console.log('NoMatch') return false; } }); }) } else { return this.cardList } } Any ideas , most welcome thanks A: Ok, assuming monthFilter is an array and you want to filter cardList by the values inside using an any sort of match, try using Array.prototype.some filteredCardList: function () { if (this.monthFilter.length > 0) { return this.cardList.filter(card => { return this.monthFilter.some(val => { return val.toString() == card.months }) }) } else { return this.cardList } } Your problem was that your return true / return false was simply returning from the forEach callback and nothing was returned in the filter callback.
{ "pile_set_name": "StackExchange" }
Manitoba Metis Federation The Manitoba Metis Federation () is the official democratic and self-governing political representative for the Metis Nation’s Manitoba Metis Community in Manitoba, Canada. Its current president is David Chartrand. MMF is an affiliate of the Métis National Council. History Long before Manitoba Metis Federation was formed there were Métis organizations in The Pas, Norway House, Thompson, Camperville, Berens River, Fort Ellice (St. Lazare) and the John Boscoe Local in Winnipeg. By 1964 a joint Métis and First Nation committee had been formed in Churchill. Their only vehicle for meeting together had been the annual Indian and Métis Conference in Winnipeg. In 1964, the Métis delegates met separately and called for better organizing of Métis communities in order to strengthen their voice at the annual conferences. The Northern Halfbreed Association was formed in Manitoba in the early 1930s to represent the Métis and Non-Status Indians of the Métis settlements near The Pas, Moose Lake and Cedar Lake. The settlements were: The Thomas Settlement, Wooden Tent (Metikewap), Pine Bluff, Moose Lake, Big Eddy, Young Point, Rall’s Island and Umphreville. Prior to the incorporation of the MMF in 1967, the primary organization for social action for the Native people in Manitoba was the annual Indian and Métis Conference (founded in 1954) which was sponsored by the Community Welfare Planning Council of Winnipeg. The MMF had its start in the 1950s when these annual conferences began to apply pressure on the senior levels of government for housing programs. Whereas the federal government (DIA) had introduced housing programs on reserves, the Métis were ineligible for housing assistance. The Métis formed several housing associations in order to pressure the Province of Manitoba for Métis housing programs. Subsequently, these housing associations amalgamated to form the Manitoba Métis Housing Association. At the March 1967 annual Indian and Métis Conference this association tabled the results of housing surveys in 16 Métis communities and a list of eleven resolutions and proposals. This included a proposal that the Province of Manitoba address the issue of housing in remote areas. During this annual meeting of the Indian and Métis Conference, sponsored by the Winnipeg Community Welfare and Planning Council, a number of Métis attending the meeting realized that they could only make their concerns heard if they had an independent voice. They subsequently met in private and decided to form a Federation of Métis people. Thus the Manitoba Metis Federation was founded on October 1, 1967 and incorporated as a non-profit association under the Companies Act of Manitoba in December 1967. Those present at the first meeting, who can be called the founders of MMF, were Adam Cuthand, Elizabeth Isbister, Edward "Ed" Simard, Tom Eagle and Angus Spence. Adam Cuthand was appointed as the first voluntary non-paid president. Manitoba Metis Federation and the Native Council of Canada: The Native Council of Canada arose out of a November 16, 1970 meeting of the Métis Associations of Manitoba, Saskatchewan, and Alberta with the British Columbia As-sociation of Non-Status Indians at Victoria, British Columbia. Several subsequent meetings led to the official launch and opening of a NCC national office in Ottawa in April of 1971. Prior to the holding of the constitutionally guaranteed First Minister Conference to further identify and define the rights of the Aboriginal peoples of Canada, it became apparent that the Métis Nation needed to be able to once again represent itself at a national level through its own voice - a Métis voice. The pan-Aboriginal structures of the Native Council of Canada (now known as the Congress of Aboriginal Peoples) and its affiliates did not allow the Métis Nation to effectively represent itself. As a result, in March 1983, the Métis Nation separated from the Native Council of Canada to form the Métis National Council (MNC) - its own Métis-specific national representative body. The presidents of NCC up to the MNC split were; Tony Belcourt (1971-1972), Kermit Moore (1972-1973), Gloria George (1973-1975), and Smokey Bruyere (1981-1983). The Native Council of Canada continued its operations until 1994, when it changed its name to the Congress of Aboriginal Peoples. It is now an alliance of Non-Status Indians from across the country and Métis from areas such as Labrador and the Maritimes and other Eastern Provinces. As a sidebar to the NCC discussion; in 1983 Walter Menard formed a competing group called the Métis Confederacy of Manitoba of which he was president (while still holding his VP position with MMF). After MMF left NCC, the Métis Confederacy of Manitoba held the two Manitoba seats in NCC. After MMF under President Don McIvor did away with delegate voting for elections in favour of one-person-one-vote in 1983, the Métis Confederacy of Manitoba dissolved. Manitoba Metis Federation and the Métis Constitutional Alliance: This Alliance was formed in Winnipeg on October 7, 1982 when the Manitoba Métis Federation and the Federation of Métis Settlements (Alberta) declared their independence from the Native Council of Canada with the goal of pursuing Métis constitutional issues at the upcoming Section 37 Constitutional Conference. The MCA proclamation was signed by Elmer Ghostkeeper on behalf of FMS and Don McIvor on behalf of MMF. At an NCC meeting on January 13-14, 1982 it was clear that the NCC emphasis was on representing the needs of Non-Status Indians to the detriment on Métis concerns. The Métis wanted both NCC seats at the conference and NCC offered to split them. As a result Jim Sinclair resigned as chairman of the NCC Constitutional Committee and Sinclair along with Elmer Ghostkeeper, Don McIvor and Sam Sinclair left the NCC meeting. On the 18th of January 1983 the MCA telexed Prime Minister Trudeau to announce their withdrawal from NCC and their demand that NCC be decertified as a Métis representative at the constitutional conference. On January 22, 1983 over 100 elected Métis representatives met in Edmonton to discuss formation of a new national Métis political group. However, they could not solve the issue of structure, but agreed to formalize an alliance called the Métis Constitutional Conference (MCC) for the purposes of representation at the constitutional talks. This group was composed of the three prairie provincial associations and the FMS with the under-standing that the Métis from British Columbia and northwestern Ontario would join later. Jim Sinclair then negotiated with NCC for one seat their seats to be assigned to MCC at the constitutional talks. Elmer Ghostkeeper took the MCC seat for the talks in February 1983. On February 28 under pressure from AFN and ICNI the federal Justice Minister announced that they would only recognize NCC as the Métis representative and MCC was effectively expelled from the talks. Manitoba Metis Federation and the Metis National Council: On March 3, 1983 representatives of MMF, AMNSIS and MAA reached an accord on a national Métis representative body. The boards of the charter members then met and the Métis National Council was officially formed on March 8, 1983. Notably, Federation of Metis Settlements (FMS) had been left out. The delegates also decided to establish a position for a national representative to attend the first minister’s conference. Clément Chartier was elected to that post. He signed the 1983 Constitutional Accord on behalf of MNC. After the first ministers conference of 1983 the MNC dealt with requests for admission by the other Métis associations contiguous with the three Prairie Provinces and the Louis Riel Métis Association of British Columbia, and the Northwestern Ontario Métis Federation were admitted. The assembly also eliminated the position of national representative but continued with a small lobby office in Ottawa. A committee under Clem Chartier including Elmer Ghostkeeper from FMS was to steer policy development in the interim. In the constitutional conferences of 1885 the MNC decided that only the Provincial affiliate presidents would sit at the table for MNC. At the annual MNC assembly of October 16, 1988 the boards of the member affiliates elected W. Yvon Dumont from Manitoba as MNC president. Dumont served as president until 1993; successor presidents are Gerald Morin (1993-2003, suspended, January 12, 2003), Audrey Poitras (January 12, 2003 interim President and National spokesperson), Clément Chartier (October 2003 to present). The current affiliates of MNC are the Métis Nation of Ontario, the Manitoba Métis Federation, the Métis Nation - Saskatchewan, the Métis Nation of Alberta, and the Métis Nation British Columbia. Leadership The first MMF non-elected Board of Directors was Adam Cuthand, Joe Keeper and Alfred Disbrowe. Political leaders are elected through province-wide ballot box elections. Each of the seven regions elects a Vice-President and two additional board members. The President is elected by province-wide ballot. The provincially elected Spokeswoman of Infinity Women is also a board member. Thus the Board of Governors of the Manitoba Metis Federation has 23 elected members. The successive presidents of the MMF have been: Further reading Barkwell, Lawrence J. The History of the Manitoba Metis Federation. Winnipeg: Louis Riel Institute, 2018. Barkwell, Lawrence J., Leah Dorion, and Audreen Hourie. Métis legacy Michif culture, heritage, and folkways. Métis legacy series, v. 2. Saskatoon: Gabriel Dumont Institute, 2006. Barkwell, Lawrence J., Leah Dorion and Darren Prefontaine. "Metis Legacy: A Historiography and Annotated Bibliography". Winnipeg: Pemmican Publications Inc. and Saskatoon: Gabriel Dumont Institute, 2001. Chartrand, Paul L. A. H. Manitoba's Métis Settlement Scheme of 1870. Saskatoon: Native Law Centre, University of Saskatchewan, 1991. Ens, Gerhard J. and Joe Sawchuk. From New Peoples to New Nations: Aspects of Metis History and Identity from the Eighteenth to Twenty-First Centuries. Toronto: University of Toronto Press, 2016. Flanagan, Thomas. Metis Lands in Manitoba. Calgary: University of Calgary Press, 1991. McFee, Janice. Famous Manitoba Métis. Winnipeg: Manitoba Métis Federation Press, 1974. Morrison, Sheila Jones. Rotten to the Core The Politics of the Manitoba Métis Federation. Victoria, B.C.: 101060, 1995. Pelletier, E. A Social History of the Manitoba Métis. Winnipeg: Manitoba Métis Federation Press, 1977. Sawchuk, Joe. The Metis of Manitoba Reformulation of an Ethnic Identity. Toronto: P. Martin Associates, 1978. Sealey, D. Bruce. Statutory Land Rights of the Manitoba Metis. Winnipeg, Man: Manitoba Métis Federation Press, 1975. Sealey, D. Bruce. Education of the Manitoba Metis An Historical Sketch. Winnipeg: Dept. of Education, Native Education Branch, 1977. St-Onge, Nicole J. M. Saint-Laurent, Manitoba Evolving Métis Identities, 1850-1914. Canadian plains studies, 45. Regina: Canadian Plains Research Center, University of Regina, 2004. Category:Indigenous rights organizations in North America Category:Non-profit organizations based in Manitoba Category:Métis organizations Category:1967 establishments in Manitoba
{ "pile_set_name": "Wikipedia (en)" }
Q: ActionMailer observers not working with delayed_job I have an ActionMailer observer that's working just fine during normal sends, but when I send the delivery to delayed_job, it doesn't get called at all. Is this a function of delayed_job itself, or something specific with my observer? Controller: BulkMailer.delay.blast(recipients, email, template) Initializer: ActionMailer::Base.register_observer(MailObserver) Observer class MailObserver def self.delivered_email(message) Rails.logger.debug 'Message: finished' end end A: The code itself was fine, Delayed Job and ActionMailer observers are compatible. My problem was solved by restarting the workers.
{ "pile_set_name": "StackExchange" }
Far Eastern Commission It was agreed at the Moscow Conference of Foreign Ministers, and made public in communique issued at the end of the conference on December 27, 1945 that the Far Eastern Advisory Commission (FEAC) would become the Far Eastern Commission (FEC), it would be based in Washington, and would oversee the Allied Council for Japan. As agreed in the communique the FEC and the Council were dismantled following the Japanese Peace Treaty of September 8, 1951. The arrangement of commission overseeing a council was similar to those that the Allies had put in place for overseeing the defeated Axis powers in Europe. It was a mirror image of those Axis countries, like Hungary, which fell to the Soviet Union and were occupied by the Red Army alone, Japan having fallen to the United States and occupied by the U.S. Army, the United States was given the dominant position on the Tokyo-based Allied Council for Japan. The change in name of the FEAC to FEC was significant because as the U.S. Secretary of State James F. Byrnes reported after the Conference "As early as August 9 we invited the Soviet Union, Great Britain, and China to join with us in carrying out the objectives of the Potsdam Declaration and the Terms of Surrender for Japan. The Far Eastern Advisory Commission was established in October, but Great Britain had reservations regarding its advisory character, and the Soviet Union requested a decision regarding control machinery in Tokyo before joining the work of the Commission". Background Following the surrender of the Japanese Empire in August 1945, the US government began making preparations for the occupation of Japan as set in Potsdam Declaration. Friction evolved between the US government and other Allied governments, which were dissatisfied with US dominant position in Japan. In order to give other Allied governments token representation in the occupation of Japan, the US government on August 21, 1945 submitted a proposal for the establishing of the "Far Eastern Advisory Commission" to the governments of the Soviet Union, UK and China. The proposal provided for the council to consist of representatives of those countries whose governments join the agreement. According to that proposal, the powers of the commission were to make policy recommendations to the US government in enforcing the provisions of the instrument of surrender. Agreement about the formation of the commission was reached at the London Conference of Foreign Ministers (September 11 to October 2, 1945), as US Secretary of State James Byrnes and British Foreign Minister Ernest Bevin agreed to establish the commission along the lines of the US proposal made on August 21, for the purpose of preparing plans for an Allied Council for Japan. The Far Eastern Commission formulated policies for Japan to fulfil under the terms of surrender it consisted of 13 members, decisions were taken by a majority vote but U.S., U.K, USSR, and China were able to veto decisions made in the commission. Between 10 July 1947 and 23 December 1948 the FEC made 13 policy decisions which fell into three categories: disarmament; democratization; and economic recovery. Disarmament In order to further remove Japan as a potential future threat to the U.S. the Far Eastern Commission decided that Japan was to be partly de-industrialized. The necessary dismantling of Japanese industry was foreseen to have been achieved when Japanese standards of living had been reduced to those existing in Japan the period 1930–1934. (see Great Depression) References Establishment of the Commission Minter to Makin Letter CANBERRA, 3 January 1946. An Historical Publication on the website of the Australian Government's Department of Foreign Affairs and Trade. Footnotes Further reading 3-4 Establishing Far Eastern Commission and its Meetings with GHQ Documents with Commentaries Part 3 Formulation of the GHQ Draft and Response of the Japanese Government Transcript of Twenty-Seventh Meeting of the Far Eastern Commission, Held in Main Conference Room, 2516 Massachusetts Avenue, N.W., Saturday, September 21, 1946 Glossary of abbreviations relating to the Birth of the Constitution of Japan. (National Diet Library website) Category:Aftermath of World War II in the United States Category:International organizations based in Asia Category:Japan–Soviet Union relations Category:Aftermath of World War II in Japan
{ "pile_set_name": "Wikipedia (en)" }
We all remember last year when the shirtless father & son mullet team jumped on the field during a White Sox/Royals game and attacked the Royals first base coach. Well he ended up getting only a 30 months' probation. But the stupidity of the judge really shined through on this incident... Some interesting snips of the article first from Judge Leo Holt... "Baseball is a microcosm of the society, and as such, has both the desirable and undesirable," Judge Leo Holt said. "The violence that ballplayers are exposed to comes from within. "What fan has not seen a pitcher intentionally hurl a baseball at a player's head at 90 miles per hour?" the judge continued. "Who has not seen a batter leave home plate headed for the pitcher's mound, bat in hand, bent on mischief and mayhem?" MLB spokesman... Baseball is not a violent game, and it never has been," said Richard Levin, spokesman for Major League Baseball. "There have been on-field incidents, but regardless, it doesn't excuse the kind of violence that was exhibited against Coach Gamboa last year." White Trash Dad... I'm going to try to put all of it behind me now," Ligue told an encampment of reporters in the building's lobby. "I just want to thank the public for being behind me in this stressful time in my life." Idiot defense Lawyer Ligue's attorney, Assistant Public Defender Ed Ptacek, has blamed the incident on Ligue's drinking. He rejected the idea that the sentence and Ligue's experience is not a deterrent, pointing out that his client spent time in jail, followed by weeks of alcohol treatment, and now will spend 30 months on probation. "Does the average person in the public want to go through that?" Ptacek asked Royals 1st base coach... "Nobody ever said judges or our legal system (are) perfect," Gamboa said as he readied for the game. "Life isn't fair, and in this case I think I'm not alone in saying that the judge made a mistake. But he's only human. "I'm a compassionate guy myself," he said. "But personally I'm stuck with a permanent reminder of this because of the stuffiness in my right ear." -Where to start, How dumb as hell is this judge! Giving this guy an excuse because basebrawls happen? (Wrestlers Beware!)... Kobe quick think of a movie that has a rape scene in it This white Trash dude must be on the sauce constantly. Who in the public was on his side giving support!??? Chi-Town posters you better ring in on this, tell me there wasn't support for this guy... By the way lawyer scum, agree probation and alcohol treatment doesn't sound like fun. That's why I DON'T jump on the field and beat up elderly coaches! As a Chicago White Sox fan who goes to 10-15 games a year, I can safely say the guy is a blight upon the place. Security has gotten insane since his little expedition onto the field, which ruins it for everybody. He should have gone to jail for a nice long time to show people what happens when you field jump. Seriously, this guy is a buffoon, but that's to be expected since he's from the south suburbs (Alsip I believe) which everyone knows is a shithole
{ "pile_set_name": "Pile-CC" }
Imaging of the Vasa Nervorum Using Contrast-Enhanced Ultrasound. We describe the use of intravenous contrast-enhanced ultrasonography to study vasa nervorum using contrast-enhanced ultrasound. We imaged the median, femoral, or sciatic nerves in 4 patients in longitudinal plane using high-resolution ultrasound after intravenous bolus of activated Perflutren lipid microspheres. The images were acquired as photopic images (in brown color) in real time using 2-dimensional B-Flow mode scan within a selected region of interest. The vasa nervorum was seen as focal ovoid enhancement along either the superior and inferior aspects of the nerve most pronounced during arterial phase (peak enhancement) in all 4 patients. The fluctuating intensity of enchancement during cardiac cycle confirmed the arterial origin of enhacement. Punctate, linear, or diffuse enhancement was also seen along the trunk of the nerve. We were able to identify the vasa nervorum along the outer aspect of the studied nerves using contrast-enhanced ultrasound.
{ "pile_set_name": "PubMed Abstracts" }
Comparison of primary lung tumor incidences in the rat evaluated by the standard microscopy method and by multiple step sections. The data presented in this paper have been derived from a carcinogenicity experiment with rats as part of a comprehensive research project focused on experimental studies on the toxicity and carcinogenicity of intratracheally instilled granular dusts [Ernst H, Rittinghausen S, Bartsch W, Creutzenberg O, Dasenbrock C, Görlitz B-D et al. Pulmonary inflammation in rats after intratracheal instillation of quartz, amorphous SiO(2), carbon black, and coal dust and the influence of poly-2-vinylpyridine-N-oxide (PVNO). Exp Toxicol Pathol 2002; 54: 109-26; Ernst H, Kolling A, Bellmann B, Rittinghausen S, Heinrich U, Pott F. Pathogenetische und immunbiologische Untersuchungen zur Frage: Ist die Extrapolation der Staubkanzerogenität von der Ratte auf den Menschen gerechtfertigt? Teil II: Histologie. Abschlussbericht. Umweltforschungsplan des Bundesministeriums für Umwelt, Naturschutz und Reaktorsicherheit. November 2005. http://www.umweltdaten.de/publikationen/fpdf-l/3033.pdf]. The results of the standard approach to histological sampling in rodent carcinogenicity inhalation studies were compared to those obtained after supplemental evaluation of step sections at intervals of 250microm through the entire lung. Seven lung tissue specimens (six sections) each of 251 rats (55 rats of the control group, 53 rats of the group treated with quartz DQ 12, 56 rats of the group treated with quartz DQ 12 and PVNO (poly-2-vinylpyridine-N-oxide), 53 rats of the group treated with amorphous SiO(2), and 17 rats each of the groups treated with coal dust and carbon black) were evaluated by light microscopy. At least 60 hematoxylin and eosin (H&E)-stained sections per lung were evaluated of 99 female rats (30 rats of the control group, 7 rats each of the groups treated with quartz, quartz and PVNO, and carbon black, 31 rats of the group treated with amorphous SiO(2), and 17 rats treated with coal dust). For the neoplastic and pre-neoplastic lesions detected in the serial slides an approximate value of the whole tumor volume was calculated. The detection of tumors with a diameter of 0.25mm was possible. Based on the size distribution of 75 tumor volumes, the probability of detecting a tumor was 86% when using 12 sections. The addition of step sections enhanced the tumor detection rate from 17 to a total number of 44 lung tumors in the quartz-treated rats, from 6 to 10 in the quartz- and PVNO-treated rats, from 4 to 11 in the amorphous SiO(2)-treated rats, and from 4 to 10 in the carbon black-treated rats. Both the tumor multiplicity and the number of rats with pre-neoplastic lesions increased. These additional data corroborated the initial findings in all experimental groups and provided statistically significant results confirming the equivocal evidence of carcinogenic activity of amorphous SiO(2) in female Wistar rats. This technique offered accurate information on the incidence, histological type, size, and location of proliferative lesions in the entire lung, but the benefit must be balanced against the extra financial effort.
{ "pile_set_name": "PubMed Abstracts" }
by Nick Mikhailovsky, CEO and Co-Founder of NTRLab. Marc Andreessen said, “…the life of any startup can be divided into two parts – before product/market fit and after product/market fit.” It’s a kind of magic thing, without which a startup stands little chance of success. That said, how do you define it beyond “you know it when you see it?” The idea of Product/Market Fit (PMF) probably started with Steve Blank’s description in his book “Four Steps to the Epiphany,” although he didn’t call it that. Later, the term itself was used in “Startup Marketing” by Sean Ellis. He created Startup’s Pyramid and described its life cycles. Since then, every early stage startup’s goal is to reach PMF (and thus become a later stage startup). Marc Andreessen wrote a series of posts in his Pmarca blog, “The Pmarca Guide to Startups.” In part 4 he writes that PMF is the only thing that matters. At the same time, his way of defining PMF is akin to the proof of a theorem that says: “We omit the proof as obvious”: You can always feel when product/market fit isn’t happening. The customers aren’t quite getting value out of the product, word of mouth isn’t spreading, usage isn’t growing that fast, press reviews are kind of “blah,” the sales cycle takes too long, and lots of deals never close. And you can always feel product/market fit when it is happening. The customers are buying the product just as fast as you can make it or usage is growing just as fast as you can add more servers. Money from customers is piling up in your company’s bank account. You’re hiring sales and customer support staff as fast as you can. Reporters are calling because they’ve heard about your hot new thing and they want to talk to you about it. You start getting entrepreneur of the year awards from Harvard Business School. Investment bankers are staking out your house. You could eat free for a year at Buck’s. Tren Griffin wrote a long article called 12 Things about PMF, but still does not provide any specific measurable way of determining whether or not PMF happened. First he quotes Andreessen, then Eric Ries. “The term product/market fit describes ‘the moment when a startup finally finds a widespread set of customers that the product resonates with.’” Furthermore, he writes, it is impossible to quantify PMF: “The “satisfy the market” part of the Andreessen definition is where the PMF concept necessarily starts to get qualitative. Various math tests have been devised in an attempt to quantify PMF, but they are proxies for something that is fundamentally like Justice Stewart’s famous definition of pornography: “I know it when I see it.” Even if there is a best practices test for whether PMF exists that does not mean that creating PMF can be reduced to a formula.” I respectfully disagree. Our experience working with dozens of early stage startups, primarily on the software development side, says that PMF, for a significant number of start-ups, is achieved when at least one user acquisition channel meets the following condition: CAC < Expected LTV, (1) where CAC – Customer Acquisition Cost (money spent on acquiring 1 paying customer), Expected LTV – mathematical expectation of full earnings from the client (after deduction of COGS – Cost of Goods Sold) The left side of the inequality relates to the market. We can symbolically represent a user acquisition channel as [user acquisition channel] = [client segment] * [traffic source] * [conversion instruments] (2) Client segment is a group of (potential) clients for which you have a specific unique value proposition. Traffic source is a marketing channel, such as adwords, cold calls, word of mouth, etc. Conversion instruments are things like landing pages, presentations, call scripts and other tools to close a sale/conversion. The customer acquisition cost depends on all three parts. One can optimize them, iterating in an embedded way: for i in [client segment] for j in [traffic source] for k in [conversion instruments] … The right side of the inequality relates to the product. It is influenced both by the margin we have on a single transaction, and the number of such transactions we have with the customer until he leaves for good. You can express it this way: (3) where P k is the probability of k-th purchase/billing of the customer PRICE k is the price of the k-th purchase/billing of the customer COGS k is the cost of goods sold at k-th purchase/billing of the customer Neither side of the equation (1) includes fixed costs. This is because if the above condition for PMF is achieved, we can raise funds, spend money on marketing, acquire a lot of users, and *eventually* our earnings from *A LOT OF* users *may become* more than our fixed costs and we will make a profit. Achieving a product-market fit does not mean that we are already profitable. Quite to the contrary, user growth typically requires a lot of investment, and the cash flow will be negative during that process. Moreover, depending on the nature of the product, the user acquisition cost can grow with time/number of users, thus limiting potential growth. Suppose we have a single-product online store: we buy an item at a price of X and sell it at a (larger) price of Y. Suppose also that our customers only buy once. If CAC < Y-X we make a unit profit on this sale. Of course, we have fixed costs that are not related to a specific sale, but, as the sales volume grows the fixed costs will be offset by the volume of our sales: (Y-X-CAC)*N > F where N is the number of sales for a specific time period, F are the fixed costs for the same period. Taking it a step further, let’s assume now that the customer makes the next purchase with probability 0.5. Summing the series, we obtain Expected LTV = 2(у-х). Then we can acquire customers more expensively than у-х (but cheaper than 2(у-х)), and eventually make a profit on these customers. However, in order to keep the startup running until we get this profit, we would need more operating capital. Definitely, the CAC for each user acquisition channel will be different, and that should be accounted for properly. The situation is more complicated in “true” bilateral markets, such as AirBnB, where CAC applies to attracting both buyers and sellers. There are, however, many simplified bilateral markets where one of the sides can be taken for granted initially. A good example of such a simplified bilateral market is any digital media business where you can initially rely on adwords and other readymade advertising products for (lousy) monetization. It is sometimes possible to further simplify the situation by converting a bilateral market into a unilateral one by, for example, monetizing a media audience through offline events like conferences. There have also been products with PMF so strong that CAC was nearly 0. Slack is a famous example of a PMF so powerful that it scaled without the need to spend on advertising at all. It is more difficult to apply the formula in the case of enterprise applications. In that case, the cost of the initial sale for a startup is often very high until there are enough cases to show customers and the unit economy only becomes positive if the startup is paid for implementation services. In cases like this, our formula may not be the best way to determine product-market fit. As startups start to scale, other factors come into play, such as the cost of customer retention, which can significantly affect the financial dynamics. This is especially true for SaaS startups, but that is another story for a different post. Now you are equipped with most of the tools to determine numerically if your startup has a product-market fit — or not. Contact Nick via email nickm@ntrlab.com and connect with us on Linkedin! Let us know what you think about this subject in the comments below. Share this article with your network.
{ "pile_set_name": "OpenWebText2" }
the c'th term of -13, 23, 107, 239, 419, 647, 923? 24*c**2 - 36*c - 1 What is the p'th term of 30, 110, 250, 450, 710? 30*p**2 - 10*p + 10 What is the c'th term of 8899, 8900, 8901, 8902? c + 8898 What is the x'th term of 12, 52, 120, 216, 340, 492? 14*x**2 - 2*x What is the k'th term of 53, 89, 99, 71, -7, -147? -2*k**3 - k**2 + 53*k + 3 What is the u'th term of -280, -300, -320, -340, -360? -20*u - 260 What is the s'th term of -18, -29, -40, -51, -62, -73? -11*s - 7 What is the k'th term of -2, -20, -50, -98, -170, -272? -k**3 - 11*k + 10 What is the n'th term of -508, -1000, -1492? -492*n - 16 What is the y'th term of 811, 3220, 7231, 12838, 20035, 28816, 39175? -y**3 + 807*y**2 - 5*y + 10 What is the x'th term of 40, 82, 146, 226, 316, 410, 502, 586? -x**3 + 17*x**2 - 2*x + 26 What is the g'th term of -290, -583, -888, -1211, -1558, -1935, -2348? -g**3 - 286*g - 3 What is the v'th term of 69, 144, 219, 294, 369? 75*v - 6 What is the g'th term of -337, -338, -339, -340, -341, -342? -g - 336 What is the l'th term of -126, -104, -82, -60, -38? 22*l - 148 What is the p'th term of 26, 30, 26, 8, -30? -p**3 + 2*p**2 + 5*p + 20 What is the o'th term of 5111, 10219, 15327? 5108*o + 3 What is the z'th term of -6, -16, -14, 6, 50, 124, 234, 386? z**3 - 17*z + 10 What is the x'th term of 131, 139, 147, 155, 163? 8*x + 123 What is the s'th term of -13, -53, -117, -205, -317? -12*s**2 - 4*s + 3 What is the o'th term of -72, -74, -76, -78? -2*o - 70 What is the a'th term of -206, -171, -112, -29? 12*a**2 - a - 217 What is the v'th term of 1306, 1303, 1300, 1297? -3*v + 1309 What is the i'th term of 192, 768, 1728, 3072? 192*i**2 What is the d'th term of -4, -28, -70, -130, -208? -9*d**2 + 3*d + 2 What is the a'th term of -18, -64, -140, -246, -382, -548, -744? -15*a**2 - a - 2 What is the u'th term of -764, -1529, -2296, -3065, -3836, -4609? -u**2 - 762*u - 1 What is the z'th term of 694, 688, 682, 676? -6*z + 700 What is the s'th term of -8, -31, -60, -89, -112, -123, -116, -85? s**3 - 9*s**2 - 3*s + 3 What is the k'th term of -9, -14, -19, -24, -29? -5*k - 4 What is the b'th term of -374, -375, -376, -377, -378, -379? -b - 373 What is the y'th term of 310, 339, 366, 391, 414, 435, 454? -y**2 + 32*y + 279 What is the q'th term of -113, -111, -109, -107, -105? 2*q - 115 What is the s'th term of -9, -38, -91, -168? -12*s**2 + 7*s - 4 What is the a'th term of -8, -6, 16, 52, 96? -a**3 + 16*a**2 - 39*a + 16 What is the d'th term of -7, 10, 29, 44, 49, 38? -d**3 + 7*d**2 + 3*d - 16 What is the i'th term of 10, 44, 136, 316, 614, 1060, 1684, 2516? 5*i**3 - i**2 + 2*i + 4 What is the z'th term of -224, -454, -682, -902, -1108? z**3 - 5*z**2 - 222*z + 2 What is the b'th term of 919, 949, 981, 1015, 1051, 1089, 1129? b**2 + 27*b + 891 What is the h'th term of -1, 6, 13, 20, 27, 34? 7*h - 8 What is the p'th term of 5158, 5157, 5156? -p + 5159 What is the b'th term of -215, -190, -149, -86, 5, 130? b**3 + 2*b**2 + 12*b - 230 What is the m'th term of -191, -316, -441, -566, -691? -125*m - 66 What is the f'th term of 148, 140, 118, 76, 8, -92? -f**3 - f**2 + 2*f + 148 What is the b'th term of -93, -175, -231, -249, -217, -123? 2*b**3 + b**2 - 99*b + 3 What is the s'th term of 1364, 1383, 1404, 1427, 1452, 1479, 1508? s**2 + 16*s + 1347 What is the y'th term of -27, -130, -301, -540, -847, -1222, -1665? -34*y**2 - y + 8 What is the c'th term of 68, 71, 84, 113, 164, 243, 356, 509? c**3 - c**2 - c + 69 What is the z'th term of -41, -85, -129, -173, -217, -261? -44*z + 3 What is the c'th term of -241, -493, -759, -1045, -1357, -1701, -2083? -c**3 - c**2 - 242*c + 3 What is the y'th term of 186, 132, -18, -312, -798, -1524, -2538? -8*y**3 + 2*y + 192 What is the w'th term of 311, 624, 937? 313*w - 2 What is the c'th term of 473, 473, 475, 479, 485? c**2 - 3*c + 475 What is the d'th term of -10, -28, -58, -100, -154? -6*d**2 - 4 What is the b'th term of 13, 11, 5, -5, -19, -37, -59? -2*b**2 + 4*b + 11 What is the f'th term of 4, -3, -12, -23, -36, -51, -68? -f**2 - 4*f + 9 What is the k'th term of 26, 48, 74, 110, 162, 236, 338, 474? k**3 - 4*k**2 + 27*k + 2 What is the j'th term of -2650, -2649, -2648, -2647, -2646? j - 2651 What is the j'th term of 194, 195, 196, 197, 198, 199? j + 193 What is the j'th term of 680, 1346, 2012? 666*j + 14 What is the w'th term of 35, 54, 119, 254, 483, 830, 1319? 4*w**3 - w**2 - 6*w + 38 What is the y'th term of -91, -360, -809, -1438, -2247? -90*y**2 + y - 2 What is the h'th term of 210, 215, 220, 225, 230, 235? 5*h + 205 What is the h'th term of -62, -60, -58, -56, -54, -52? 2*h - 64 What is the v'th term of -18, -36, -58, -84? -2*v**2 - 12*v - 4 What is the d'th term of 126, 139, 154, 171? d**2 + 10*d + 115 What is the x'th term of 333, 662, 991, 1320? 329*x + 4 What is the f'th term of 55, 129, 219, 331, 471, 645? f**3 + 2*f**2 + 61*f - 9 What is the o'th term of -13, -108, -349, -808, -1557, -2668, -4213, -6264? -12*o**3 - o**2 - 8*o + 8 What is the h'th term of 351, 346, 331, 300, 247? -h**3 + h**2 - h + 352 What is the j'th term of -32, -64, -94, -122, -148, -172, -194? j**2 - 35*j + 2 What is the k'th term of 11, -11, -71, -187, -377, -659? -3*k**3 - k**2 + 2*k + 13 What is the h'th term of -9, -18, -27? -9*h What is the w'th term of 130, 264, 398? 134*w - 4 What is the m'th term of 39, 298, 1003, 2376, 4639? 37*m**3 + m**2 - 3*m + 4 What is the s'th term of -8, -52, -126, -230, -364, -528? -15*s**2 + s + 6 What is the c'th term of 68, 112, 156? 44*c + 24 What is the y'th term of 2, 14, 32, 56? 3*y**2 + 3*y - 4 What is the r'th term of 54, 89, 124, 159, 194, 229? 35*r + 19 What is the y'th term of 1345, 2704, 4063, 5422, 6781? 1359*y - 14 What is the a'th term of -6153, -6156, -6161, -6168, -6177, -6188, -6201? -a**2 - 6152 What is the m'th term of 69, 136, 205, 276, 349, 424, 501? m**2 + 64*m + 4 What is the i'th term of 54, 95, 122, 129, 110? -i**3 - i**2 + 51*i + 5 What is the r'th term of 31, 83, 145, 217, 299, 391, 493? 5*r**2 + 37*r - 11 What is the f'th term of 153, 159, 161, 153, 129, 83? -f**3 + 4*f**2 + f + 149 What is the u'th term of 32, 70, 84, 62, -8, -138, -340, -626? -2*u**3 + 52*u - 18 What is the p'th term of 67, 90, 121, 154, 183, 202? -p**3 + 10*p**2 + 58 What is the l'th term of -986, -985, -984? l - 987 What is the p'th term of -118, -193, -318, -493, -718? -25*p**2 - 93 What is the d'th term of 119, 248, 385, 536, 707, 904, 1133? d**3 - 2*d**2 + 128*d - 8 What is the v'th term of 716, 1445, 2150, 2819, 3440, 4001, 4490? -2*v**3 + 743*v - 25 What is the b'th term of -37, -28, -15, 2, 23, 48? 2*b**2 + 3*b - 42 What is the v'th term of 129, 269, 411, 555, 701? v**2 + 137*v - 9 What is the v'th term of -64, -70, -76, -82, -88? -6*v - 58 What is the i'th term of -12, 5, 46, 123, 248, 433, 690? 2*i**3 + 3*i - 17 What is the a'th term of 138, 120, 102, 84? -18*a + 156 What is the d'th term of -40, -354, -1198, -2836, -5532, -9550, -15154, -22608? -44*d**3 - d**2 - 3*d + 8 What is the j'th term of 12, 24, 48, 90, 156, 252? j**3 + 5*j + 6 What is the y'th term of 3167, 3166, 3165? -y + 3168 What is the z'th term of 13, 41, 69, 97, 125, 153? 28*z - 15 What is the f'th term of 169, 339, 511, 685, 861, 1039? f**2 + 167*f + 1 What is the j'th term of -307, -311, -317, -325? -j**2 - j - 305 What is the w'th term of -72, -66, -54, -36? 3*w**2 - 3*w - 72 What is the y'th term of 317, 315, 313, 311? -2*y + 319 What is the k'th term of -68, -34, 8, 58, 116, 182, 256? 4*k**2 + 22*k - 94 What is the h'th term of 71, 150, 231, 314, 399, 486, 575? h**2 + 76*h - 6 What is the d'th term of -87, -280, -601, -1050, -1627, -2332, -3165? -64*d**2 - d - 22 What is the a'th term of -127, -539, -1235, -2215? -142*a**2 + 14*a + 1 What is the y'th term of -246, -247, -248, -249, -250, -251? -y - 245 What is the i'th term of 568, 1150, 1732, 2314, 2896, 3478? 582*i - 14 What is the u'th term of 62, 132, 240, 380, 546, 732, 932? -u**3 + 25*u**2 + 2*u + 36 What is the c'th term of -134, -268, -402, -536? -134*c What is the c'th term of 281, 560, 825, 1070, 1289, 1476? -c**3 - c**2 + 289*c - 6 What is the k'th term of 23, 43, 77, 125, 187, 263, 353? 7*k**2 - k + 17 What is the u'th term of -24, 68, 228, 462, 776? u**3 + 28*u**2 + u - 54
{ "pile_set_name": "DM Mathematics" }
Dig New York's "hot cop" Miguel Pimentel? You won't be seeing tattooed officers in these parts anymore. View Full Caption Instagram/Getty Images CHICAGO — Last week, the Internet went crazy over New York City Sheriff's deputy Miguel Pimentel's Instagram selfies that showed off his tattoos and muscles while out on the job in uniform. Despite clear public demand for more buff, tattooed officers, the Chicago Police Department issued a mandate on Monday that may be bad news for Pimentel fan's and CPD staff alike: Chicago police officers are no longer allowed to have visible tattoos. The mandate, which takes effect Friday, says "tattoos and body brandings will not be visible while on duty or representing the Department, whether in uniform, conservative business attire, or casual dress." Police blog Second City Cop did not seem thrilled about the change. The site posted a meme saying "56 shot - 12 fatally - over Memorial Day weekend. ... Change the uniform order." "No tats - hello long sleeves and ties. All summer," the blog added. Jen Sabella discusses the new policy: And they're right: according to the uniform change memo, "members assigned to uniform duty with tattoos or body brandings on their arms or legs that are visible when wearing the short-sleeve shirt or shorts will wear the prescribed long-sleeve shirt and long pants with appropriate neck wear, regardless of season." If clothing doesn't cover your tattoo, prepare to invest in some Band-Aids. Chicago Police officers would have to cover exposed tattoos with bandages -- like LeBron James had to do in high school in Ohio. [Getty Images] "Members with tattoos or body brandings on their hands, face, neck, or other area not covered by a long-sleeve shirt, long pants, or appropriate attire will cover them with a matching skin tone adhesive bandage or tattoo cover up tape." The department has not publicly commented on what prompted the change in uniform policy. Other updates to the uniform policy include discontinued use of knit caps and baseball caps, though a "trooper cap" (think Elmer Fudd) can be worn when temps fall below 40 degrees and a "nylon mesh (ventilated) cap" can be worn in the summer. Mustaches are still legit (this is Chicago, after all) as long as they're trimmed and beards are still not permitted. Dig tattooed officers? You might want to follow Pimentel on Instagram. Or in Playgirl, if the magazine gets its wish. Oh you know, just drinking a monster on this beautiful day 😎 #nyc#dominican#washingtonheights#uptown#deputy#coplife#tattoos#leo#tbl#fitcop A photo posted by Miguel Pimentel (@officialpimentel) on May 7, 2015 at 8:31am PDT For more neighborhood news, listen to DNAinfo Radio here:
{ "pile_set_name": "OpenWebText2" }
(Seychelles News Agency) - France Albert Rene, Seychelles’ longest-serving president who led the island nation for more than a quarter century during one-party rule, died on Wednesday in the early morning at the Seychelles Hospital. He was 83. Rene, who held office from 1977 until he retired in 2004, took power following a coup d’état that ousted James Mancham. The former president's legacy will likely remain complicated -- even controversial. He is remembered as a powerful leader with a strong vision for Seychelles that included free education and healthcare, but also for leading a government responsible for unsolved deaths and disappearances of its citizens. Born November 16, 1935, to Price Rene, an island manager, and Louisa Rene, a seamstress, a teenage Rene performed well academically and was offered a bursary from the Catholic Church. At 17 he left Seychelles for Capuchin Seminary of St Maurice in the canton Valais in Switzerland. After his first year Rene was transferred to the St Mary’s College in England where he began his legal studies. Stepping into politics Rene returned to Seychelles to work as a lawyer in 1957 and immediately felt disappointed with the social policies of British colonialism, which he felt created gross injustice among the population. As a result, Rene formed the Seychelles People’s United Party (SPUP) in 1964 in a bid to participate in the political development of his country and also to represent the aspirations of many inhabitants whose living conditions were deplorable. He also launched his own newspaper 'The People’. In 1966, Rene was elected as a member of the Legislative Council for Praslin and La Digue. In 1970, he was elected in the new Legislative Assembly for East Mahe. His relentless crusade for independence was rewarded in 1975 when he went to London to participate in the Constitutional Conference as the Leader of the Opposition. That same year Seychelles, 115 islands in the western Indian Ocean, became a self-governing colony with a council of ministers and Rene was appointed Minister of Works and Land Development. On June 29, 1976, Seychelles became Independent and Rene was appointed as Prime Minister under President James Mancham, his political rival. Following a coup d’état on June 5, 1977, Rene was installed as the President of the Republic of Seychelles. France Albert Rene took the oath of allegiance as the new Prime Minister together with The new President of Seychelles James Mancham on the day of Independence on June 29, 1976. (Mahe Publications Ltd) Photo License: All Rights Reserved For several decades Rene ruled under a one-party state under egalitarian principles of socialism. During his presidency, he created various social institutions, housing developments and medical services and ensured that all segments of society had access to free education and healthcare. Dolor Ernesta who served as minister in Rene’s government said he first met Rene in 1978. "The President will be remembered as a true leader, who led the fight for independence. I will also remember him as having a great vision for the development of the new Seychelles as we know it today, for he truly loved his country." Paul Chow, who was forced into exile under the Rene regime, said that two men has made history in Seychelles – both are former presidents. "And they are James Mancham and France Albert Rene. For Rene, whether we liked him or not only history will judge him.” Chow added that “Rene’s vision was nothing less than acquiring and retaining absolute power for himself at all costs. He should be judged not on what he said but on what he did.” After the return of multi-party politics in 1993, Rene won the Presidential elections in 1998 and 2001. In 2004, he stepped down and handed over power to his Vice-President, James Alix Michel. He however continued as Leader of the Seychelles People’s Progressive Front which replaced the SPUP in June 1978. After his retirement as head of state, Rene remained active within his party, where he was honored as the founding father. Up to 2018, the former president continued to come down to his office at the party's headquarters at Maison du Peuple. Rene is survived by his wife Sarah and his children.
{ "pile_set_name": "OpenWebText2" }
On the replication of Kristofferson's (1980) quantal timing for duration discrimination: some learning but no quanta and not much of a Weber constant. This study revisited Kristofferson's (Perception & Psychophysics 27:300-306, 1980) report showing that, with sufficient practice at interval discrimination, the relationship between timing variability and physical time is a step function-in other words, that psychological time is quantized. Two participants completed 260 sessions of a temporal discrimination task, 20 consecutive sessions for each of 13 base durations ranging from 100 to 1,480 ms. The data do not replicate Kristofferson's (Perception & Psychophysics 27:300-306, 1980) quantal finding, and it is argued that the effect Kristofferson reported may have been due to specific methodological decisions. Importantly, the data show (1) some limitation of Weber's law for time, even for the narrow range of the present investigation, and (2) that extensive training provides some modest benefit to temporal discrimination, mainly for longer intervals, and that this benefit primarily occurs in the first few sessions.
{ "pile_set_name": "PubMed Abstracts" }
Steinem Edits a History of U.S. Women Patricia Holt Published 4:00 am, Sunday, April 19, 1998 Secrets and discoveries seem to come pouring out of feminist leader and author Gloria Steinem whenever she sits down for a chat. During a recent appearance for City Arts and Lectures at the Herbst Theater, for example, she disclosed the real reason she named her famous magazine Ms. -- "Sister" was thought to be too religious, "Sojourner" too much like a travel magazine and "Bimbo" considered not funny. Example No. 2: Steinem agreed to write a biography of Marilyn Monroe only because she had used the paperback edition of her essay collection, "Outrageous Acts and Everyday Rebellions," as a premium to bring in new subscriptions for Ms., which couldn't pay her publisher for the books. Ms. at the time was in deep financial trouble because of its editorial policies, so when her book publisher said he had obtained unpublished photographs of Monroe and wanted to do a book, Steinem asked him, "If I write the book, will you forgive the debt?" The result was one of the most original and insightful books on Monroe yet written. The book is so clear and straightforward that you can't believe something as bland and unthreatening as the Equal Rights Amendment ("Men and women shall have equal rights throughout the United States and every place subject to its jurisdiction") never passed, or that anyone would dispute the fact that "poverty has long been a women's issue." Steinem's big discovery in writing the book, she says, was the realization that the Iroquois Confederacy of six major northeastern tribes "inspired the structure of the U.S. Constitution, a fact only recently acknowledged in legal history"; its matrilinear society inspired the suffragist movement. "The Iroquois guaranteed the social and political power of women to such an extent," says Steinem, "that suffragists like Elizabeth Cady Stanton and Susan B. Anthony, who talked and listened to women from nearby tribes, were able to imagine a life of equality they had never known." Thus the American women's movement -- seen as radical and subversive in many of its stages -- was nothing new, the book states, quoting Cherokee scholar Rayna Green: "A feminist revolution here would simply honor American tradition, not overthrow it." Steinem is clearly proud of the book, proud to be a part of a historic struggle and proud today to be one of the many feminists who, she believes, have been maligned by the press in its coverage of Bill Clinton and the alleged White House sex scandals. She makes no secret of her feelings about the matter. "I believe the women who have accused Clinton, just for starters," she says. "I think that clearly Clinton needs sex addiction therapy -- but not impeachment. The press needs a short course in working definitions, because it seems to think all sex is the same. It's important to understand that there are very significant differences between, say, the cases of Robert Packwood and Clarence Thomas, whose sexual demands were unwanted and continued over a period of years, and the case of Clinton, who didn't persist when the women turned him down. Even Paula Jones says that when she refused, Clinton said, 'Well, I wouldn't want you to do anything you don't want to do.' "What worries me in the Monica Lewinsky case is the use of the term 'sexual harassment' to characterize what Lewinsky has told us did not happen against her will. I fear that there's an effort to do to sexual harassment law what was done to affirmative action law. The incredible distortion that we kept hearing about affirmative action -- how it lowered standards instead of raising them, how somebody was told, 'you can't have this job because we have to hire a left-handed Lithuanian' and all these stories that were just bulls-- -- is now being applied to sexual harassment." Steinem points to the many stories in the media "about how sexual harassment law has gone too far. The problem is that any time a law allows the powerless to address the powerful, it's perceived by some as 'going too far.' " Steinem wrote a piece about the matter for the Op Ed page of the New York Times. She was immediately accused of being a hypocrite for supporting a president who thought so little of women that he cheated on his wife and used the system to have his way with aides and assistants who were younger and less powerful than he. "A lot of women have been called inconsistent in this regard," Steinem said. "I'm proud to see that feminists haven't been stampeded into saying what the right wing wants us to say. Conservatives are the ones who think all sex outside of marriage, and that can't end in conception, is wrong. We don't think that. It's their problem. But the media appears to have absorbed their view. It seems to me the real hypocrisy lies in trying to get rid of Clinton and sexual harassment law."
{ "pile_set_name": "Pile-CC" }
The White House on Friday strongly denied a New York Times story claiming the administration is talking to South Korea about reducing the number of U.S. troops stationed in that country. "The New York Times story is utter nonsense," national security adviser John Bolton said in a statement. Bolton said the Pentagon has not discussed a troop drawdown with South Korea. "The President has not asked the Pentagon to provide options for reducing American forces stationed in South Korea," he added. ADVERTISEMENT The Times reported late Thursday that President Trump Donald John TrumpOmar fires back at Trump over rally remarks: 'This is my country' Pelosi: Trump hurrying to fill SCOTUS seat so he can repeal ObamaCare Trump mocks Biden appearance, mask use ahead of first debate MORE had asked the Pentagon to consider reducing the number of troops on the Korean Peninsula. The request reportedly worried military officials who raised concerns that it could undercut U.S. ties with South Korea and alarm Japan. Pentagon spokeswoman Dana White also dismissed the report at a briefing on Thursday. "This department has not gotten any word on that," White said about a possible withdrawal. "Our posture remains the same." The report comes as Trump is slated to meet with Kim Jong Un as soon as this month in an unprecedented meeting between a U.S. president and North Korean leader. North Korea has reportedly agreed to halt its provocative missile tests ahead of the meeting, which Trump has suggested take place at a border village between North and South Korea. Any discussion between the U.S. and North Korea would likely involve the status of the large U.S. force on the peninsula, which regularly conducts war games with South Korean forces. The U.S. currently has more than 28,000 soldiers stationed on the Korean Peninsula, where U.S. forces have supported South Korea since the Korean War. Rebecca Kheel contributed.
{ "pile_set_name": "OpenWebText2" }
<!DOCTYPE html> <html> <head> <title>Api Documentation</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="viewport" content="width=device-width, initial-scale=1"> <link type='text/css' rel='stylesheet' href='../../apidoc/stylesheets/bundled/bootstrap.min.css'/> <link type='text/css' rel='stylesheet' href='../../apidoc/stylesheets/bundled/prettify.css'/> <link type='text/css' rel='stylesheet' href='../../apidoc/stylesheets/bundled/bootstrap-responsive.min.css'/> <link type='text/css' rel='stylesheet' href='../../apidoc/stylesheets/application.css'/> <!-- IE6-8 support of HTML5 elements --> <!--[if lt IE 9]> <script src="//html5shim.googlecode.com/svn/trunk/html5.js"></script> <![endif]--> </head> <body> <div class="container-fluid"> <div class="row-fluid"> <div id='container'> <ul class='breadcrumb'> <li> <a href='../../apidoc/v2.cs_CZ.html'>Foreman v2</a> <span class='divider'>/</span> </li> <li class='active'> Auth source externals </li> <li class='pull-right'> &nbsp;[ <a href="../../apidoc/v2/auth_source_externals.pt_BR.html">pt_BR</a> | <a href="../../apidoc/v2/auth_source_externals.de.html">de</a> | <a href="../../apidoc/v2/auth_source_externals.it.html">it</a> | <a href="../../apidoc/v2/auth_source_externals.sv_SE.html">sv_SE</a> | <a href="../../apidoc/v2/auth_source_externals.zh_CN.html">zh_CN</a> | <a href="../../apidoc/v2/auth_source_externals.en_GB.html">en_GB</a> | <b><a href="../../apidoc/v2/auth_source_externals.cs_CZ.html">cs_CZ</a></b> | <a href="../../apidoc/v2/auth_source_externals.fr.html">fr</a> | <a href="../../apidoc/v2/auth_source_externals.ru.html">ru</a> | <a href="../../apidoc/v2/auth_source_externals.ja.html">ja</a> | <a href="../../apidoc/v2/auth_source_externals.es.html">es</a> | <a href="../../apidoc/v2/auth_source_externals.ko.html">ko</a> | <a href="../../apidoc/v2/auth_source_externals.ca.html">ca</a> | <a href="../../apidoc/v2/auth_source_externals.gl.html">gl</a> | <a href="../../apidoc/v2/auth_source_externals.en.html">en</a> | <a href="../../apidoc/v2/auth_source_externals.zh_TW.html">zh_TW</a> | <a href="../../apidoc/v2/auth_source_externals.nl_NL.html">nl_NL</a> | <a href="../../apidoc/v2/auth_source_externals.pl.html">pl</a> ] </li> </ul> <div class='page-header'> <h1> Auth source externals <br> <small></small> </h1> </div> <div class='accordion' id='accordion'> <hr> <div class='pull-right small'> <a href='../../apidoc/v2/auth_source_externals/index.cs_CZ.html'> >>> </a> </div> <div> <h2> <a href='#description-index' class='accordion-toggle' data-toggle='collapse' data-parent='#accordion'> GET /api/auth_source_externals </a> <br> <small>List external authentication sources</small> </h2> <h2> <a href='#description-index' class='accordion-toggle' data-toggle='collapse' data-parent='#accordion'> GET /api/locations/:location_id/auth_source_externals </a> <br> <small>List external authentication sources per location</small> </h2> <h2> <a href='#description-index' class='accordion-toggle' data-toggle='collapse' data-parent='#accordion'> GET /api/organizations/:organization_id/auth_source_externals </a> <br> <small>List external authentication sources per organization</small> </h2> </div> <div id='description-index' class='collapse accordion-body'> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.examples">Examples</span></h3> <pre class="prettyprint">GET /api/auth_source_externals 200 { &quot;total&quot;: 1, &quot;subtotal&quot;: 1, &quot;page&quot;: 1, &quot;per_page&quot;: 20, &quot;search&quot;: null, &quot;sort&quot;: { &quot;by&quot;: null, &quot;order&quot;: null }, &quot;results&quot;: [ { &quot;created_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;updated_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;id&quot;: 408068537, &quot;name&quot;: &quot;External&quot;, &quot;locations&quot;: [], &quot;organizations&quot;: [] } ] }</pre> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.params">Params</span></h3> <table class='table'> <thead> <tr> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.param_name">Param Name</span></th> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.description">Description</span></th> </tr> </thead> <tbody> <tr style='background-color:rgb(255,255,255);'> <td> <strong>location_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by locations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>organization_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by organizations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>search </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>výsledky filtru</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>order </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Sort field and order, eg. ‘id DESC’</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>page </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>stránkovat výsledky</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>per_page </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>počet položek na požadavek</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> </tbody> </table> </div> <hr> <div class='pull-right small'> <a href='../../apidoc/v2/auth_source_externals/show.cs_CZ.html'> >>> </a> </div> <div> <h2> <a href='#description-show' class='accordion-toggle' data-toggle='collapse' data-parent='#accordion'> GET /api/auth_source_externals/:id </a> <br> <small>Show an external authentication source</small> </h2> </div> <div id='description-show' class='collapse accordion-body'> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.examples">Examples</span></h3> <pre class="prettyprint">GET /api/auth_source_externals/408068537 200 { &quot;created_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;updated_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;id&quot;: 408068537, &quot;name&quot;: &quot;External&quot;, &quot;external_usergroups&quot;: [], &quot;locations&quot;: [ { &quot;id&quot;: 255093256, &quot;name&quot;: &quot;Location 1&quot;, &quot;title&quot;: &quot;Location 1&quot;, &quot;description&quot;: null } ], &quot;organizations&quot;: [ { &quot;id&quot;: 447626438, &quot;name&quot;: &quot;Organization 1&quot;, &quot;title&quot;: &quot;Organization 1&quot;, &quot;description&quot;: null } ] }</pre> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.params">Params</span></h3> <table class='table'> <thead> <tr> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.param_name">Param Name</span></th> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.description">Description</span></th> </tr> </thead> <tbody> <tr style='background-color:rgb(255,255,255);'> <td> <strong>location_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by locations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>organization_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by organizations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.required">Required</span> </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be an identifier, string from 1 to 128 characters containing only alphanumeric characters, space, underscore(_), hypen(-) with no leading or trailing space.</p> </li> </ul> </td> </tr> </tbody> </table> </div> <hr> <div class='pull-right small'> <a href='../../apidoc/v2/auth_source_externals/update.cs_CZ.html'> >>> </a> </div> <div> <h2> <a href='#description-update' class='accordion-toggle' data-toggle='collapse' data-parent='#accordion'> PUT /api/auth_source_externals/:id </a> <br> <small>Update an external authentication source</small> </h2> </div> <div id='description-update' class='collapse accordion-body'> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.examples">Examples</span></h3> <pre class="prettyprint">PUT /api/auth_source_externals/408068537 { &quot;auth_source_external&quot;: { &quot;organization_names&quot;: [ &quot;Organization 1&quot; ], &quot;location_ids&quot;: [ 255093256 ] } } 200 { &quot;created_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;updated_at&quot;: &quot;2019-02-20 13:34:38 UTC&quot;, &quot;id&quot;: 408068537, &quot;name&quot;: &quot;External&quot;, &quot;external_usergroups&quot;: [], &quot;locations&quot;: [ { &quot;id&quot;: 255093256, &quot;name&quot;: &quot;Location 1&quot;, &quot;title&quot;: &quot;Location 1&quot;, &quot;description&quot;: null } ], &quot;organizations&quot;: [ { &quot;id&quot;: 447626438, &quot;name&quot;: &quot;Organization 1&quot;, &quot;title&quot;: &quot;Organization 1&quot;, &quot;description&quot;: null } ] }</pre> <h3><span class="translation_missing" title="translation missing: cs-CZ.apipie.params">Params</span></h3> <table class='table'> <thead> <tr> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.param_name">Param Name</span></th> <th><span class="translation_missing" title="translation missing: cs-CZ.apipie.description">Description</span></th> </tr> </thead> <tbody> <tr style='background-color:rgb(255,255,255);'> <td> <strong>location_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by locations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>organization_id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p>Scope by organizations</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>id </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.required">Required</span> </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be an identifier, string from 1 to 128 characters containing only alphanumeric characters, space, underscore(_), hypen(-) with no leading or trailing space.</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>auth_source_external </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.required">Required</span> </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Hash</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(250,250,250);'> <td> <strong>auth_source_external[name] </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(250,250,250);'> <td> <strong>auth_source_external[location_ids] </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> , &lt;span class=&quot;translation_missing&quot; title=&quot;translation missing: cs-CZ.apipie.nil_allowed&quot;&gt;Nil Allowed&lt;/span&gt; </small> </td> <td> <p>REPLACE locations with given ids</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be an array of any type</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(250,250,250);'> <td> <strong>auth_source_external[organization_ids] </strong><br> <small> <span class="translation_missing" title="translation missing: cs-CZ.apipie.optional">Optional</span> , &lt;span class=&quot;translation_missing&quot; title=&quot;translation missing: cs-CZ.apipie.nil_allowed&quot;&gt;Nil Allowed&lt;/span&gt; </small> </td> <td> <p>REPLACE organizations with given ids.</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be an array of any type</p> </li> </ul> </td> </tr> </tbody> </table> </div> </div> </div> </div> <hr> <footer></footer> </div> <script type='text/javascript' src='../../apidoc/javascripts/bundled/jquery.js'></script> <script type='text/javascript' src='../../apidoc/javascripts/bundled/bootstrap-collapse.js'></script> <script type='text/javascript' src='../../apidoc/javascripts/bundled/prettify.js'></script> <script type='text/javascript' src='../../apidoc/javascripts/apipie.js'></script> </body> </html>
{ "pile_set_name": "Github" }
Q: What kind of indexing are used in MyISAM and InnobDB engines? I read that InnobDB uses B+ Tree and Clustered indexing on Primary Key and Hash(H) Tree and Non Clustered indexing on multiple keys (unique key). But I did not get any explanation for MyISAM.. And what I read for InnobDB is correct ? A: Yes you are correct regarding the InnoDB. For MyISAM see below B-tree indexes Yes T-tree indexes No Hash indexes No Read Here more
{ "pile_set_name": "StackExchange" }
// // PieceAnimation.swift // ADPuzzleLoader // // Created by Anton Domashnev on 1/9/16. // Copyright © 2016 Anton Domashnev. All rights reserved. // import UIKit extension CAAnimation { //MARK: - Interface static func basicForwardPieceAnimation(piece: Piece, velocity: Double, delay: CFTimeInterval, scale: Double) -> CAAnimation { func setDefaultValuesForAnimation(animation: CAAnimation) { animation.fillMode = kCAFillModeForwards animation.removedOnCompletion = false animation.timingFunction = CAMediaTimingFunction(name: kCAMediaTimingFunctionEaseOut) } func setAnimationDurationBasedOnVelocity(animation: CAAnimation, velocity: Double) { animation.duration = 10.0 / velocity } let moveAnimation: CABasicAnimation = CABasicAnimation(keyPath: "position") setDefaultValuesForAnimation(moveAnimation) setAnimationDurationBasedOnVelocity(moveAnimation, velocity: velocity) moveAnimation.fromValue = NSValue(CGPoint: piece.initialPosition) moveAnimation.toValue = NSValue(CGPoint: piece.desiredPosition) moveAnimation.timingFunction = CAMediaTimingFunction(controlPoints: 0.0, 0.84, 0.49, 1.00) let scaleAnimation: CABasicAnimation = CABasicAnimation(keyPath: "transform.scale") setDefaultValuesForAnimation(scaleAnimation) setAnimationDurationBasedOnVelocity(scaleAnimation, velocity: velocity) scaleAnimation.fromValue = scale scaleAnimation.toValue = 1 scaleAnimation.timingFunction = CAMediaTimingFunction(controlPoints: 0.0, 0.84, 0.49, 1.00) let forwardAnimation = CAAnimationGroup() setDefaultValuesForAnimation(forwardAnimation) setAnimationDurationBasedOnVelocity(forwardAnimation, velocity: velocity) forwardAnimation.animations = [moveAnimation, scaleAnimation] forwardAnimation.beginTime = CACurrentMediaTime() + delay return forwardAnimation } static func basicBackwardPieceAnimation(piece: Piece, velocity: Double, delay: CFTimeInterval, scale: Double) -> CAAnimation { func setDefaultValuesForAnimation(animation: CAAnimation) { animation.fillMode = kCAFillModeForwards animation.removedOnCompletion = false animation.timingFunction = CAMediaTimingFunction(name: kCAMediaTimingFunctionEaseOut) } func setAnimationDurationBasedOnVelocity(animation: CAAnimation, velocity: Double) { animation.duration = 10.0 / velocity } let moveAnimation: CABasicAnimation = CABasicAnimation(keyPath: "position") setDefaultValuesForAnimation(moveAnimation) setAnimationDurationBasedOnVelocity(moveAnimation, velocity: velocity) moveAnimation.fromValue = NSValue(CGPoint: piece.initialPosition) moveAnimation.toValue = NSValue(CGPoint: piece.desiredPosition) moveAnimation.timingFunction = CAMediaTimingFunction(controlPoints: 1.0, 0.0, 1.0, 0.67) let scaleAnimation: CABasicAnimation = CABasicAnimation(keyPath: "transform.scale") setDefaultValuesForAnimation(scaleAnimation) setAnimationDurationBasedOnVelocity(scaleAnimation, velocity: velocity) scaleAnimation.fromValue = 1 scaleAnimation.toValue = scale scaleAnimation.timingFunction = CAMediaTimingFunction(controlPoints: 1.0, 0.0, 1.0, 0.67) let forwardAnimation = CAAnimationGroup() setDefaultValuesForAnimation(forwardAnimation) setAnimationDurationBasedOnVelocity(forwardAnimation, velocity: velocity) forwardAnimation.animations = [moveAnimation, scaleAnimation] forwardAnimation.beginTime = CACurrentMediaTime() + delay return forwardAnimation } }
{ "pile_set_name": "Github" }
Keywords Using new data sets that we have assembled at the highest available temporal resolutions, the results indicate that women tend to be key players in both high-profile online and offline settings. For the online setting, we analyze individuals on the global social media outlet VKontakte ( www.vk.com ) who become linked when they decide to follow the same online pro-ISIS group page (see Materials and Methods). For the offline setting, we consider time-resolved data ( 5 , 6 ) concerning the Provisional Irish Republican Army (PIRA) ( 5 – 13 ) covering three decades from 1970 to 1998, where individuals become linked when they decide to collaborate on planning and executing an attack. Although men dominated numerically in each case, we find that women emerge with superior network connectivity at the collective level that is associated with benefits for system robustness and survival ( 14 , 15 ). The networks that we analyze were not cherry-picked: In addition to being the only such operational networks for which detailed longitudinal information is known concerning the links and nodes over time, they are also the most successful examples for each genre ( 5 – 13 , 16 ). Moreover, the network links reflect operational behavior over time, not simple social acquaintance, which means that our results are not clouded by potential differences between women and men in terms of numbers of friends. Males are overrepresented within terrorist groups ( 1 ). Although examples of famous and historically important female terrorists exist ( 2 , 3 ), there is still a common tendency to assume that women in general will play more minor, subservient roles than men in terrorist groups that personify highly dangerous and aggressive environments. Indeed, current discourse tends to assume that female ISIS (Islamic State) recruits are “lured,” whereas males are “recruited” ( 4 ). Such assumptions, influenced by long-standing cultural and societal norms, come at the expense of attempting to understand terrorist behavior and the immediate operational context in which it plays out. This paper typifies the latter approach by conducting a series of social network analyses to test how important women are within such extreme networks despite any numerical and perceived physical disadvantage. Online pro-ISIS groups on VKontakte are sporadically shut down by external agents ( 25 , 26 ). One might ask whether the presence of women in such online groups has any bearing on that group’s longevity. In Fig. 3A , we observe that the longevity of an online pro-ISIS group does indeed tend to increase with the fraction of women that are in it. Turning to the offline PIRA, Fig. 3B draws a related conclusion concerning additional longevity associated with women: Women’s connections in the PIRA network have superior longevity to men’s and are also superior to a null model where we randomly shuffle members’ gender. Such a result is consistent with women’s tendency to be better embedded in the network. Figure 2A illustrates that the evolution of this PIRA network is accompanied by a marked increase in the number of IED events over this period ( Fig. 2B ). This evolution culminated in the 1990’s peace process. The increase in activity ( Fig. 2B ) is not accompanied by an increase in available actors (fig. S2). The number of actors appears to decrease, thereby contradicting the simplistic argument that an increase in productivity of such a terrorist organization results from an increase in its size. Compared to ISIS, the PIRA network is small because of the low number of PIRA actors, which is not surprising given that PIRA was an on-street operation whose individuals were targeted by security forces and imprisoned, or killed by opposing paramilitary groups. Such threats also extended to their families and children, strongly motivating PIRA members to remain “under the radar.” Despite being a small minority in PIRA, the average BC of women increases over time to values well above those of men ( Fig. 2C ), whereas their average degree centrality ( Fig. 2D ) decreases faster than that of men. Although we cannot prove conscious intent in either case, the fact that the risks of on-street PIRA activity are much more direct than those of online ISIS activity offers an explanation as to why PIRA women might have wanted to reduce their average degree centrality over time ( Fig. 2D ), whereas pro-ISIS women maintained theirs. A full description of PIRA’s network evolution and women’s involvement undoubtedly requires many additional sociological factors. In Fig. 2E , we momentarily suspend such concerns, adopting instead one possible implication of women’s high BC to see what this helps predict about other PIRA network features. Given that high BC is associated with more shortest paths and hence better passing of materials and brokerage, we will momentarily assume that individuals with high BC (that is, women) are more inclined to act as team players than those with lower BC (that is, men). We will also assume that women then spread this team ethic to other individuals in network clusters within which these women sit (see fig. S3 for details). We set this spreading process running on the back of a model of fission-fusion dynamics that was proposed, with empirical support, to describe the internal dynamics in terrorist organizations ( 21 – 24 ). This simulation of a network is necessary because we only have PIRA network data on a yearly scale, whereas such spreading likely happens on the scale of weeks or months. Although obviously massively oversimplified, this setup is at least consistent with the fact that a team ethic was known to have spread within PIRA after reorganization. Running this computer simulation yields results that are indeed close to the empirical data for the PIRA network evolution ( Fig. 2E ). Figure 2 summarizes our findings for PIRA, whose operations were entirely offline during the active period. Not only did PIRA manage to survive a remarkably long period opposing a technologically advanced enemy (UK). It is also regarded as the most successful terrorist network in history in terms of innovating and implementing improvised explosive devices (IEDs) ( 5 – 13 ). Starting as an army-like structure, PIRA effectively reorganized itself over a period of a few years between the end of the 1970s and the start of the 1980s, forming a collection of dynamic, self-organized, bottom-up operational units with significant autonomy ( 5 – 13 ). We constructed time-resolved networks for each year in the subsequent period from the early 1980s onward, with a link connecting any two individuals involved in the same IED event during that year. Degree centrality (see Materials and Methods for definition) shows strong daily fluctuations as we might expect: Individuals whose degree centrality becomes high on a given day suddenly have more direct connections and thus become more noticeable to opposing agencies, thereby providing an incentive to rectify this in subsequent days. Despite this, we find that women also achieve a significantly higher average degree centrality than men (red versus blue vertical line in Fig. 1C ) and that the women’s value is significantly higher than that of a null model where we randomly shuffle the gender of nodes in the underlying time-averaged network (bell-shaped curves in Fig. 1C ). The Z score of the degree centrality of men is −4.7, whereas that of women is 4.7. On days when women show higher BC than men, women do not necessarily have a higher degree centrality than men. The net result is that women effectively avoided being noticeable “stars” ( Fig. 1D , left) while simultaneously providing the global network benefits of high BC ( Fig. 1D , right). Figure 1B shows the betweenness centrality (BC) for this pro-ISIS network on a daily basis. Materials and Methods indicates the standard definition of BC that we use, whereas fig. S1 demonstrates the meaning of BC and its calculation. The average BC for the women consistently peaks much higher than that for the men (red versus blue spikes in Fig. 1B ). Such a high BC can bring global benefits to the network because the BC of a node measures the fraction of shortest paths from all nodes to all others that pass through that given node. Shortest paths between members in covert networks are considered crucial for passing items between any two nodes, because every extra step represents extra risk and potential cost ( 17 – 20 ). Hence, the high average BC for women suggests that women can, on average, play a more central role in passing items such as recruitment messages, files, prayers, and video and audio propaganda; brokering distant parts of the network (for example, aligning narratives); and channeling funds. This importance of high BC was recently noted by Roberts and Everton ( 18 ), who state that intelligence officers in northern Iraq successfully identified “… actors in an insurgent network who scored high in terms of betweenness centrality (BC) as information insertion points. The effort was … successful in rolling up the insurgency.” However, gender-specific roles were not accounted for in that study. ( A ) Illustrative, time-resolved snapshots of a subset of the global online pro-ISIS network on VKontake.com ( www.vk.com ). Over a 2-month period in early 2015, we observed 16,931 females and 24,883 males. ( B ) Female versus male average BCs over time. Women show frequent large peaks (red) as compared to men (blue). ( C ) Female versus male degree centralities averaged over time. The women’s value is more than 4 SDs σ (that is, Z > 4) larger than the mean null model result obtained by randomly shuffling node genders, and much larger than the men’s value. The opposite is true for men. ( D ) Left: The central node has high BC and high degree centrality. Peripheral nodes have low values of each. Right: The central node has high BC but low degree centrality. Figure 1 summarizes our findings from analyzing the online network of ISIS support. To date, ISIS is the most successful example in terms of attracting attention online; its status as the number one terrorist organization is arguably based on its online ability to gather support and spread fear globally ( 16 ). Although many millions of online users may casually mention ISIS activity in passing on social media such as Twitter and Facebook, for example, following a recent piece of news, our focus is on the social network of those who share and promote pro-ISIS operational materials, including videos of beheadings, to make a meaningful comparison with the operational offline network of PIRA. Intensive online manual searching in which we trace such narratives and material (see Materials and Methods) revealed that such followers congregate around online group pages of non-U.S. Facebook equivalents, in particular VKontakte. Facebook shuts down such pro-ISIS activity immediately, whereas these online pages manage to grow on VKontakte and become disabled only sporadically. Figure 1A illustrates daily snapshots of a subset of this pro-ISIS network in which individuals are shown as connected if they belong to the same online group page on that given day. DISCUSSION In our analysis of these offline and online networks, we observed that the topological role of women can differ significantly from that of men. In particular, we observed that the BC of women in both types of network could reach much higher values than that of men. Although further studies of other networks are desirable, our findings suggest that female-centric approaches can be adopted to affect or reengineer extreme networks, even when women are in a minority, by focusing on women’s interconnectivity. By contrast, traditional approaches focus on targeting individual members (invariably men) who may act as hubs (highest degree centrality). More generally, our work raises questions about who the important members are for the development of a network and whether the individual contributions of potentially underrepresented members would be better evaluated in terms of a collective network measure (for example, BC) instead of a local one (degree centrality of individual stars; that is, hubs) (27). We stress that in no way are we suggesting any sort of targeting of women with high BC; instead, our results led us to believe that an effective strategy for reengineering or affecting a network would be to engage with these women. One limitation of our study is the fact that despite the closure that we achieved during data collection, we cannot prove that our networks are complete. At the very least, however, they are likely representative. Second, a myriad of external events can help shape network evolution. However, uncorrelated noise is unlikely to add additional structure to the network measures upon which we focus (for example, BC). Third, one might wonder if the emergence of women in such key positions in these networks is a consequence of their “exceptional” status. For our ISIS data, the percentage of women followers can reach 50%, ruling out the argument of rarity as a driver. Moreover, available demographic information of highly central individual women does not indicate any features that are statistically different from their male counterparts. Furthermore, the frequency distribution of women’s BC has a broad distribution that contradicts the notion of “exceptionality” of a few individuals (see fig. S4). For the PIRA case, we were able to test the exceptionality hypothesis by comparing the actual list of highest-ranked individuals to lists of candidate women produced independently by several subject matter experts based on the reputation of individual women. There was no correlation—notably, none of the highest-ranking women were those whose reputation was deemed highest by the experts. Fourth, one might wonder whether the central role of women in the PIRA network is the consequence of them monopolizing, or being assigned to, certain operational roles. Because our PIRA data captured demographic and operational information of every PIRA member, we were able to investigate BC as a function of operational role. Figure S5 indicates that there is no clear evidence of network position being tied to a specific operational role. Fifth, we have only discussed here two measures of a social network: BC and degree centrality. However, these measures are standard ones for social networks (17). Although higher-order measures (that is, multinode correlation functions) may, in principle, reveal more detail, the measures that we calculate and their behaviors are real effects. Furthermore, one has to be careful with pursuing increasing detail from such higher-order statistical moments, because they generally require larger amounts of data to give reliable results and are more prone to noise. Sixth, it may happen that the women on online platforms that are dominated by men will naturally attract more attention. However, Fig. 3A suggests that the increased lifetime of a group is actually associated with having more women, which, by that argument, would make the group more noticeable, hence more likely to be shut down, and thus have a shorter lifetime in contrast to the empirical data in Fig. 3A. Finally, we note that we have purposely avoided discussing how our findings might fit into wider debates concerning gender issues in society (28–33) because the present paper is focused on—and limited to—terrorist support online and offline. However, we hope that our findings might one day be incorporated into such wider discourse. Our results do feed into a growing literature on the importance of centrality in networks that benefits communications, transmission of items, and brokerage (17–20). In their landmark paper, Everton and Cunningham (20) specifically chose BC and degree centrality as measures that are considered important for communication in an extreme network. Their studies of real covert networks, but in another context and without focusing on gender as we do, show that “…the network became increasingly more reliant on a handful of individuals for the brokerage of information and other resources as time went by.” It is also known [for example, Kenney et al. (12)] that non-Western covert networks develop flatter structures akin to PIRA; hence, our results are of more general interest, in particular given that followers of any current or future extremist organization are likely to share files containing propaganda online and hence stand to benefit from high numbers of pathways and high BC (27). It is already known that this passing of material is an essential part of ISIS spreading its message quickly to a broad audience, with audio lectures being circulated by prominent sheikhs (leaders of a Muslim organization or group, or preachers), in addition to prayers, ISIS official videos, links to other sites where the information is shared, and religious books. Such pathways also serve to channel funds and organize the prayer (“dua”) for the fighters. Perhaps most importantly, our work feeds into current discussions about the role of women combatants in conflict and terrorism, and how this can differ from stereotypes in which women adopt a more minor role. In particular, Cohen (34) has explored how women in some African conflicts have been as bloodthirsty or violent as men—and in some cases even more so. Bloom (2) has shown that women can indeed be the source of radicalization in terrorist movements, whereas Sjoberg and Gentry (35) have shown that militarized women have incentives to overcompensate and be more aggressive. Concerning ISIS, our study focuses on women’s activity in the online world; however, it would be fascinating to relate this to actual women fighters within ISIS as studied, for example, by Saltman and Smith (36) and Bloom and Winter (37, 38). In addition, it would be interesting to quantify how specific changes in pressure change the centrality of women, and how women’s participation transfers across generations within a given family.
{ "pile_set_name": "OpenWebText2" }
Dopamine (DA) signaling has received considerable attention for its role in reward-related processes, including the motivation to seek drugs and relapse in response to drug-associated cues (1-4). Destruction of DA cells in the ventral tegmental area (VTA), or DA terminals in regions such as the nucleus accumbens, disrupts drug self-administration (5-6) and administration of DA receptor antagonists attenuates the ability of drug-associated stimuli to promote reinstatement (7). In human addicts, striatal DA release in response to drug-associated stimuli is associated with increased drug craving and future relapse (8,9). Though DA has been generally implicated in drug taking and relapse, DA systems have thus far not been manipulated with the temporal precision and cell-type specificity required to isolate their role in specific aspects of those behaviors. Optogenetic tools have been applied to target DA neurons in transgenic mice, demonstrating that DA signaling supports behavioral conditioning and facilitates instrumental responding for food (20-21). More recently, a Th:Cre transgenic ratline was developed that allows for the selective targeting of DA neurons with optogenetic methods (22-23) in more complex behavioral paradigms optimized for use in rats. In this proposal, I will utilize Th:Cre rats, incorporating in vivo optogenetics and electrophysiology in combination with sophisticated behavioral analyses, to probe the causal contribution of DA signaling to different aspects of instrumental cocaine intake and relapse in response to Pavlovian cocaine stimuli. First, in Aim 1 I propose to test the sufficiency of VTA DA neuron activation to modulate cocaine self-administration and cocaine cue-induced reinstatement. Second, in Aim 2 I propose to test the necessity of DA signaling, via inhibition of VTA DA neurons, for cocaine intake and reinstatement. Additionally, the VTA contains a heterogeneous mixture of not only DA neurons, but also a substantial fraction of non-DA neurons that contribute to motivational processing (11-19), but little is known about how different populations of neurons in the VTA encode drug-related behaviors. Thus, in Aim 3 I propose to characterize the firing patterns optogenetically-identified VTA DA neurons (16) during self-administration and reinstatement.
{ "pile_set_name": "NIH ExPorter" }
/* * dice_hwdep.c - a part of driver for DICE based devices * * Copyright (c) Clemens Ladisch <clemens@ladisch.de> * Copyright (c) 2014 Takashi Sakamoto <o-takashi@sakamocchi.jp> * * Licensed under the terms of the GNU General Public License, version 2. */ #include "dice.h" static long hwdep_read(struct snd_hwdep *hwdep, char __user *buf, long count, loff_t *offset) { struct snd_dice *dice = hwdep->private_data; DEFINE_WAIT(wait); union snd_firewire_event event; spin_lock_irq(&dice->lock); while (!dice->dev_lock_changed && dice->notification_bits == 0) { prepare_to_wait(&dice->hwdep_wait, &wait, TASK_INTERRUPTIBLE); spin_unlock_irq(&dice->lock); schedule(); finish_wait(&dice->hwdep_wait, &wait); if (signal_pending(current)) return -ERESTARTSYS; spin_lock_irq(&dice->lock); } memset(&event, 0, sizeof(event)); if (dice->dev_lock_changed) { event.lock_status.type = SNDRV_FIREWIRE_EVENT_LOCK_STATUS; event.lock_status.status = dice->dev_lock_count > 0; dice->dev_lock_changed = false; count = min_t(long, count, sizeof(event.lock_status)); } else { event.dice_notification.type = SNDRV_FIREWIRE_EVENT_DICE_NOTIFICATION; event.dice_notification.notification = dice->notification_bits; dice->notification_bits = 0; count = min_t(long, count, sizeof(event.dice_notification)); } spin_unlock_irq(&dice->lock); if (copy_to_user(buf, &event, count)) return -EFAULT; return count; } static __poll_t hwdep_poll(struct snd_hwdep *hwdep, struct file *file, poll_table *wait) { struct snd_dice *dice = hwdep->private_data; __poll_t events; poll_wait(file, &dice->hwdep_wait, wait); spin_lock_irq(&dice->lock); if (dice->dev_lock_changed || dice->notification_bits != 0) events = EPOLLIN | EPOLLRDNORM; else events = 0; spin_unlock_irq(&dice->lock); return events; } static int hwdep_get_info(struct snd_dice *dice, void __user *arg) { struct fw_device *dev = fw_parent_device(dice->unit); struct snd_firewire_get_info info; memset(&info, 0, sizeof(info)); info.type = SNDRV_FIREWIRE_TYPE_DICE; info.card = dev->card->index; *(__be32 *)&info.guid[0] = cpu_to_be32(dev->config_rom[3]); *(__be32 *)&info.guid[4] = cpu_to_be32(dev->config_rom[4]); strlcpy(info.device_name, dev_name(&dev->device), sizeof(info.device_name)); if (copy_to_user(arg, &info, sizeof(info))) return -EFAULT; return 0; } static int hwdep_lock(struct snd_dice *dice) { int err; spin_lock_irq(&dice->lock); if (dice->dev_lock_count == 0) { dice->dev_lock_count = -1; err = 0; } else { err = -EBUSY; } spin_unlock_irq(&dice->lock); return err; } static int hwdep_unlock(struct snd_dice *dice) { int err; spin_lock_irq(&dice->lock); if (dice->dev_lock_count == -1) { dice->dev_lock_count = 0; err = 0; } else { err = -EBADFD; } spin_unlock_irq(&dice->lock); return err; } static int hwdep_release(struct snd_hwdep *hwdep, struct file *file) { struct snd_dice *dice = hwdep->private_data; spin_lock_irq(&dice->lock); if (dice->dev_lock_count == -1) dice->dev_lock_count = 0; spin_unlock_irq(&dice->lock); return 0; } static int hwdep_ioctl(struct snd_hwdep *hwdep, struct file *file, unsigned int cmd, unsigned long arg) { struct snd_dice *dice = hwdep->private_data; switch (cmd) { case SNDRV_FIREWIRE_IOCTL_GET_INFO: return hwdep_get_info(dice, (void __user *)arg); case SNDRV_FIREWIRE_IOCTL_LOCK: return hwdep_lock(dice); case SNDRV_FIREWIRE_IOCTL_UNLOCK: return hwdep_unlock(dice); default: return -ENOIOCTLCMD; } } #ifdef CONFIG_COMPAT static int hwdep_compat_ioctl(struct snd_hwdep *hwdep, struct file *file, unsigned int cmd, unsigned long arg) { return hwdep_ioctl(hwdep, file, cmd, (unsigned long)compat_ptr(arg)); } #else #define hwdep_compat_ioctl NULL #endif int snd_dice_create_hwdep(struct snd_dice *dice) { static const struct snd_hwdep_ops ops = { .read = hwdep_read, .release = hwdep_release, .poll = hwdep_poll, .ioctl = hwdep_ioctl, .ioctl_compat = hwdep_compat_ioctl, }; struct snd_hwdep *hwdep; int err; err = snd_hwdep_new(dice->card, "DICE", 0, &hwdep); if (err < 0) return err; strcpy(hwdep->name, "DICE"); hwdep->iface = SNDRV_HWDEP_IFACE_FW_DICE; hwdep->ops = ops; hwdep->private_data = dice; hwdep->exclusive = true; return 0; }
{ "pile_set_name": "Github" }
1. Field of the Invention This invention relates to catalysts for chemiluminescent systems. More particularly, this invention relates to catalysts for two component chemiluminescent systems wherein one component is a hydrogen peroxide component and the other component is an oxalate ester-fluorescer component. 2. Description of the Prior Art Two component chemiluminescent systems which utilizes a reaction mixture of a hydrogen peroxide component and an oxalate ester-fluorescer component to produce light are well known. In such systems a solution of hydrogen peroxide in dimethyl phthalate or a mixture of dimethyl phthalate and t-butyl alcohol and a solution of an oxalate ester such as bis(2,4,5-trichlorocarbobutoxyphenyl) oxlate, and a fluorescer, for example 9,10-diphenyl anthracene, in a solvent such as dibutyl phthalate are mixed and allowed to react whereupon light is produced. In two component chemiluminescent systems of the type described, a catalyst is generally included as part of the hydrogen peroxide component. Many catalysts have been tried. Of the catalysts tried, sodium salicylate and various tetraalkylamminoum salicylates have been the most widely used. Sodium salicylate and tetraalkylammonium salicylates are excellent catalysts for chemiluminescent systems of the type described. However, they have certain disadvantages. First, they are not highly soluble in mixtures of dimethyl phthalate and t-butyl alcohol which are the most commonly used solvents for the hydrogen peroxide component. Because of their relatively low solubility, systems which will produce short duration high intensity light cannot be produced. Short duration, high intensity light systems require fairly large concentrations of catalyst. Second, even at relatively low concentrations, sodium salicylate and the tetraalkylammonium salicylates tend to precipitate out of dimethyl phthalate and mixtures of dimethyl phthalate and t-butyl alcohol at low temperatures. This is obviously undesirable when one realizes that chemiluminescent devices may be required to operate at low temperatures.
{ "pile_set_name": "USPTO Backgrounds" }
IN THE MISSOURI COURT OF APPEALS WESTERN DISTRICT DANIEL L. TAYLOR, ) ) Appellant, ) v. ) WD83238 ) ) OPINION FILED: THE CURATORS OF THE ) June 2, 2020 UNIVERSITY OF MISSOURI, ) ) Respondent. ) Appeal from the Circuit Court of Boone County, Missouri The Honorable J. Hasbrouck Jacobs, Judge Before Division Two: Mark D. Pfeiffer, Presiding Judge, and Alok Ahuja and Gary D. Witt, Judges This appeal presents a procedural scenario in which the second count in a lawsuit relating to one “claim” was dismissed by the Circuit Court of Boone County, Missouri (“trial court”). Because the trial court’s ruling does not qualify as a “final judgment” pursuant to section 512.020(5),1 Wilson v. City of St. Louis, No. SC97544, 2020 WL 203137 (Mo. banc Jan. 14, 2020), we are required to dismiss the appeal. 1 All statutory references are to the REVISED STATUTES OF MISSOURI 2016, as supplemented. Factual and Procedural Background2 The Curators of the University of Missouri (“Curators”) is the governing body of the University of Missouri, which operates University Hospital (“Hospital”) in Columbia, Missouri. In 2014, the Hospital provided medical care to Mr. Daniel L. Taylor (“Taylor”) following a farming accident, which resulted in the amputation of Taylor’s left hand. At the time the Hospital provided services to Taylor, he was uninsured. Taylor agreed to be personally responsible for the medical billing since he did not have any health insurance. When Taylor did not pay his medical bills, Curators asserted a hospital lien in the amount of $134,661.64. In 2015, Taylor entered into a settlement agreement with his employer’s farm liability insurer in the amount of $1,005,000. The liability insurer withheld $134,661.64 from the settlement amount to satisfy the hospital lien. In 2016, Curators filed suit against the liability insurer to foreclose the lien, resulting in the liability insurer paying the full amount of the hospital lien to Curators. In 2018, Taylor filed suit against Curators, alleging that the Hospital represented on its “Financial Assistance” website that Hospital charges for uninsured patients were “automatically discounted” 60% and physician charges were “automatically discounted” 25%. He contended that because he was uninsured when he was admitted to the Hospital in 2014, the Hospital should have applied this “uninsured discount policy” to the amount of the medical billing. Taylor alleged that Curators’ receipt of $134,661.64 from the insurer was an “overpayment” of $75,082.53. Subsequently, Taylor filed a Second Amended Petition containing two counts. In Count I, Taylor alleged that Curators “refused to honor the ‘Uninsured Patient Discount’ and refused to 2 In reviewing a judgment granting a motion to dismiss with prejudice, “[w]e assume all facts alleged in the petition are true and liberally construe all reasonable inferences in favor of the plaintiff.” Williams v. Bayer Corp., 541 S.W.3d 594, 599 (Mo. App. W.D. 2017) (citing Smith v. Humane Soc’y of United States, 519 S.W.3d 789, 798 (Mo. banc 2017)). 2 reduce the medical billing to [Taylor], thereby breaching the contractual relationship entered in by [Taylor] and [Curators].” He alleged that Curators’ suit against the liability insurer “for payment of its full hospital lien” was “in violation of the contractual agreement.” He further alleged that “[a]s a result of the overpayment, [Curators] breached its contract with [Taylor] to accept discounted payment because of [Taylor’s] uninsured status and [Taylor] is thereby damaged in the same amount as the overpayment and for attorney’s fees.” In Count II, Taylor incorporated by reference the allegations in Count I and repeated allegations regarding the hospital lien relating to Curators’ effort to successfully obtain the full amount of the hospital lien in violation of its automatic deduction agreement with its uninsured patients. In this count, however, Taylor sought a different remedy for the Curators’ alleged misdeeds, alleging that the actions of Curators were a violation of the Missouri Merchandising Practices Act (“MMPA”) due to the Curators’ “misrepresentation, unfair practices, and suppression in that the asserted lien was for the full amount of the medical billing and did not include the required automatic discount for an uninsured patient.” Taylor sought all statutorily authorized damages for the alleged MMPA violation by Curators. Curators filed a motion to dismiss Taylor’s Second Amended Petition. Curators argued that Count I for breach of contract should be dismissed because Taylor failed to plead sufficient facts to show that he entered into a contract with Curators for a discount in his medical bills. Curators argued that Count II should be dismissed because Taylor failed to plead facts establishing that an exception to sovereign immunity applied that would subject Curators to liability under the MMPA. The trial court issued a judgment of dismissal as to Count II only and purported to certify its ruling as “final” and immediately appealable pursuant to Rule 74.01(b).3 3 All rule references are to I MISSOURI COURT RULES – STATE 2019. 3 Taylor appealed from the judgment of dismissal, asserting trial court error in its application of sovereign immunity and in its statutory interpretation of the MMPA. Curators filed a Motion to Dismiss Interlocutory Appeal, alleging that the trial court’s partial dismissal did not qualify as a “final judgment” subject to interlocutory appeal. For the reasons hereinafter explained, we grant Curator’s motion and dismiss Taylor’s appeal for lack of a final judgment. Analysis Recently, the Missouri Supreme Court in Wilson v. City of St. Louis, No. SC97544, 2020 WL 203137 (Mo. banc Jan. 14, 2020), clarified the analysis of what trial court rulings constitute “judgments” and, of those rulings, which are “final” for purposes of appeal.4 “‘The right to appeal is purely statutory and, where a statute does not give a right to appeal, no right exists.’” Id. at *3 (quoting First Nat’l Bank of Dieterich v. Pointe Royale Prop. Owners’ Ass’n, Inc., 515 S.W.3d 219, 221 (Mo. banc 2017)). The statute pertinent to this case is section 512.020(5), which provides, in relevant part: Any party to a suit aggrieved by any judgment of any trial court in any civil cause from which an appeal is not prohibited by the constitution, nor clearly limited in special statutory proceedings, may take his or her appeal to a court having appellate jurisdiction from any: .... (5) Final judgment in the case or from any special order after final judgment in the cause . . . . (Emphasis added.) For purposes of section 512.020(5), a “final judgment” must satisfy two criteria: (1) “it must be a judgment (i.e., it must fully resolve at least one claim in a lawsuit and establish all the rights and liabilities of the parties with respect to that claim)”; and (2) “it must be “[T]he question of whether a judgment is eligible for certification under Rule 74.01(b) is a question of law 4 on which the circuit court has no discretion; only the question of whether an eligible judgment should be certified under Rule 74.01(b) is left to the sound exercise of the circuit court’s discretion.” Wilson, 2020 WL 203137, at *5. 4 ‘final,’ either because it disposes of all claims (or the last claim) in a lawsuit, or because it has been certified for immediate appeal pursuant to Rule 74.01(b).” Wilson, 2020 WL 203137, at *5. As to the second step in the “final judgment” analysis: A judgment is eligible to be certified under Rule 74.01(b) only if it disposes of a “judicial unit” of claims, meaning it: (a) disposes of all claims by or against at least one party, or (b) it disposes of one or more claims that are sufficiently distinct from the claims that remain pending in the circuit court. Id. Wilson instructs us that the “final judgment” analysis is a conjunctive two-step analysis and not a disjunctive analysis. An appellant must have both a judgment and finality in order to appeal pursuant to section 512.020(5).5 Here, Taylor appeals from the trial court’s purported judgment, dismissing with prejudice Count II (MMPA claim) of Taylor’s Second Amended Petition against Curators and certifying the judgment under Rule 74.01(b) as a final judgment for purposes of appeal. Whether viewed as the failure to resolve a distinct “claim,” or as the failure to resolve a distinct “judicial unit,” the result is the same: we lack appellate jurisdiction over the circuit court’s purported judgment.6 Before analyzing the second step in the “final judgment” formula (i.e., the trial court’s Rule 74.01(b) certification), we must analyze the first step—whether the trial court’s dismissal ruling constitutes a “judgment.” As our Missouri Supreme Court has observed: There is persistent confusion surrounding the issues of what a judgment is, what form it takes, and when it is entered. The first, and most important, of these issues is definitional: a judgment is a legally enforceable judicial order that fully resolves at least one claim in a lawsuit and establishes all the rights and liabilities of the parties with respect to that claim. 5 In Wilson v. City of St. Louis, No. SC97544, 2020 WL 203137, at *8 n.7 (Mo. banc Jan. 14, 2020), the Missouri Supreme Court took care to note that the previous Supreme Court precedent of Gibson v. Brewer, 952 S.W.2d 239, 244 (Mo. banc 1997), was incorrect to the extent that it stated that Rule 74.01(b) was an “exception” to the mandate that only “final judgments” are appealable. 6 We recognize that there is some confusion in the case law concerning whether the factual overlap between separate legal theories means that the legal theories constitute a single “claim,” a single “judicial unit,” or both. It is unnecessary for us to resolve that issue here, since Taylor’s appeal fails under either analysis. 5 State ex rel. Henderson v. Asel, 566 S.W.3d 596, 598 (Mo. banc 2019) (emphasis added). Taylor argues that the trial court’s judgment dismissing Count II is final and appealable because, even though both counts arise from the same set of facts, the remedies asserted in the two counts (breach of contract and MMPA) are different. Taylor’s argument is unavailing. “Claims are considered separate if they require proof of different facts and the application of distinguishable law, subject to the limitation that severing the claims does not run afoul of the doctrine forbidding the splitting of a cause of action.” Wilson, 2020 WL 203137, at *5 (quoting Comm. for Educ. Equal. v. State, 878 S.W.2d 446, 451 (Mo. banc 1994)). Here, Counts I and II of Taylor’s Second Amended Petition, although seeking different remedies, arise from one set of facts, namely:  the imposition of a hospital lien for Taylor’s unpaid medical bills without an “uninsured patient discount” that Taylor alleged was “stated” on the Hospital website;  Curators’ imposition of a hospital lien for the full amount of the medical billing;  Curators’ suit against the insurer to foreclose on the hospital lien;  Curators’ receipt of insurance proceeds to cover the full amount of the hospital lien; and  Taylor’s attempt to recover the alleged “overpayment” of $75,082.53 from Curators. Consequently, the purported judgment of dismissal of Count II has not “fully resolve[d] at least one claim in a lawsuit” nor “establishe[d] all the rights and liabilities of the parties with respect to that claim.” Wilson, 2020 WL 203137, at *3. Simply put, then, the trial court’s ruling dismissing Count II cannot be designated a “judgment” in the first instance. Even if the breach of contract and MMPA counts of Taylor’s petition are considered different “claims,” they constitute part of a single “judicial unit,” and therefore would not be certifiable under Rule 74.01(b). Wilson explained that, where a dispositive ruling does not wholly resolve all claims brought by or against a particular party, it only involves a discrete “judicial unit” 6 if it “disposes of one or more claims that are sufficiently distinct from the claims that remain pending in the circuit court.” Wilson, 2020 WL 203137, at *5. As explained above, even if the breach of contract and MMPA counts were considered separate “claims,” they both arise from the same underlying set of operative facts, and constitute parts of a single “judicial unit.” Accordingly, because the October 9, 2019 judgment is not a “final judgment” subject to certification under Rule 74.01(b), we have no choice but to dismiss this appeal. Id. at *1. Conclusion This Court grants Curator’s motion to dismiss and dismisses Taylor’s appeal for lack of jurisdiction. /s/Mark D. Pfeiffer Mark D. Pfeiffer, Presiding Judge Alok Ahuja and Gary D. Witt, Judges, concur. 7
{ "pile_set_name": "FreeLaw" }
Atlas before the court Peace and stability in the world are mainly due to the U.S. Once again, the United States is being castigated for its supposed "unilateralism" and its determination to act without the approval of the international community. Although the focus of this disapproval is on our having bypassed the United Nations in taking action against Iraq, the deeper criticism is that the U.S. is proceeding in defiance of international law. Those who would accord international law a supreme place in maintaining peace and security in the world are not ill-intentioned, but merely indulge the delusion that the ambitions of rulers and states have been tamed after millennia of war and competition. FOR THE RECORD - This story contains corrected material, published April 4, 2003. Unfortunately, the record reveals that hope to be illusory. The League of Nations was the first effort to institutionalize the concept of a higher law governing the behavior of states. The league emerged out of a determination to prevent a repetition of World War I that had been produced by the reckless competition of the European powers. The effort was a noble one, but history lists few, if any, significant successes on the part of the league. Its many failings, however, have earned a permanent place in the record of nations. Japan's invasion and annexation of Manchuria in 1931 was one of the few international threats that prompted the league to action, in this instance producing condemnation and a recommendation that economic sanctions be imposed. Unfortunately, the impact on Japan proved to be virtually nil, and failed to prevent its further aggression against China in 1937. A more momentous failure was the impotence demonstrated by the league following Italy's invasion of Ethiopia in 1935. The resulting crisis and inability to generate any pressure against Italy effectively eliminated any remaining hope that the league could ever play an important role in world affairs. The league's failure was a major influence on the design of the United Nations, which was in large part motivated by President Franklin D. Roosevelt's determination to extend the cooperation of the Allied powers into the post-World War II era (this sentence as published has been corrected in this text). Although a no-nonsense realist, Roosevelt convinced himself that the major powers would share a common interest in maintaining stability around the world. He was wrong in this assumption primarily because he believed that a murderous dictator like Stalin would share the same interests as the liberal democracies. That fatally flawed view of the world remains the basis of the United Nations and of international law. While the UN has proven to be of some use in areas such as disease prevention, its role in reducing conflict in the world is little better than that of the league. Far from disposing of global threats, its most recent failure was its inability to broker a compromise between the Greeks and Turks on the island of Cyprus, despite the fact that virtually all of the parties involved wanted a settlement. The reality is that the United Nations and international law work only if everyone wants them to work. But that is rarely the case. The mechanisms easily break down in the face of determined resistance. Of all the weaknesses of international law, the principal one is the lack of an enforcement mechanism. That function can only be carried out by countries such as the United States. The United Nations could have passed an unlimited number of resolutions denouncing Iraq's invasion of Kuwait in 1990, but, had the freedom of the Kuwaiti people depended upon the UN's taking action, they would even now be living under Saddam Hussein's tyranny. Hussein was driven out of Kuwait only by force, largely that of the United States. Former President George Bush was able to utilize the UN in putting together an international coalition against Iraq, but the resulting effort still relied largely on U.S. plans and forces. Even if forced to do so alone, the U.S. would have liberated Kuwait. Some people maintain that if the UN and international law cannot uphold peace and order by themselves, they nevertheless must be respected as the only source of legitimacy. But what legitimacy could possibly be bestowed by the current roster of non-permanent members of the UN Security Council: Chile, Angola, Cameroon, Guinea, Mexico, Bulgaria, Pakistan and Syria? Some are authoritarian regimes guilty of considerable oppression and human-rights abuses at home and possess only tenuous claims to legitimacy themselves. The other two members--Spain and Germany--are substantial countries, yet Germany has refused any significant responsibility for maintaining peace and security in the international system. No reasonable person would assert that this group is capable of conveying a legitimacy of any meaning.
{ "pile_set_name": "Pile-CC" }
Keith, don't beat yourself up. I can see why it seemed logical to include the TimeAlarm library within the Time folder. Unfortunately, Arduino does not currently handle library installation or inter-library dependencies very well, which is why I chose to have TimeAlarms as a separate library. Perhaps when Arduino support a simple mechanism for installing libraries, problems such as yours will go away. Krodal Hello Michael,I placed this code in a class: http://playground.arduino.cc//Main/DS1302And I could add the 'get', 'set', 'read' and 'write' functions. But I don't understand the difference between the 'sysTime' and the time in the RTC.Are they synchronized with the 'syncInterval' ?If the Arduino is running a little slow, it is no problem.If the Arduino is running a little faster, it could cause a glitch for the number of seconds. How is this handled ?I do not know how this is done in a PC or other embedded system. I was just wondering what would happen. I'm attempting to use the Time.h library in a program, but the program won't compile due to an issue in the .cpp file: /Users/.../libraries/Time/Time.cpp: In function 'time_t now()':/Users/.../libraries/Time/Time.cpp:240: error: 'millis' was not declared in this scope/Users/.../libraries/Time/Time.cpp: In function 'void setTime(time_t)':/Users/.../libraries/Time/Time.cpp:268: error: 'millis' was not declared in this scope I'm not an expert, so I'd rather not go digging in the library files. I just updated to 1.0.3 from what I assume was the beta version. djlamm Hello everyone, I'm trying to use the Arduino time library at http://playground.arduino.cc/Code/Time in my code, but the download link brings me to a page that says "The page "Time/Zip" doesn't exist." JuraKa I just downloaded new update of Time library. When I try to compile it gives me an error:sketchbook/libraries/Time/DateStrings.cpp:41:56: error: variable 'monthNames_P' must be const in order to be put into read-only section by means of '__attribute__((progmem))'sketchbook/libraries/Time/DateStrings.cpp:58:54: error: variable 'dayNames_P' must be const in order to be put into read-only section by means of '__attribute__((progmem))'sketchbook/libraries/Time/DateStrings.cpp:59:51: error: variable 'dayShortNames_P' must be const in order to be put into read-only section by means of '__attribute__((progmem))' editor1979 Hello,I'm sorry if this has been covered but I couldn't find it.I modified the 'TimeSerialDateStrings' to include a 16x2 I²C LCD Display.It seems to display okay for a minute, but then seems to get erroneous data causing it to display incorrect information. It would start off displaying:10:38:16 MonApr 08, 2013 but after a minute it would change to something seemingly random like:21:11:26 FriAug 29, 2104 and it doesn't do this once. I haven't been able to get a time interval of when these errors occur, but if I could get some help fixing them, it would be appreciated. I have also seen it display years that contain 5 digits. That may have been an alignment issue tho. void loop(){ if(Serial.available() ) { processSyncMessage(); } if(timeStatus()!= timeNotSet) { digitalClockDisplay(); } //delay(1000); //Disabled because I am not sending time to the Serial Monitor. //I'm sending it to an LCD and the 1 second delay causes it to apear like it skips 1 second every 11 seconds even tho it really doesn't.} time_t requestSync(){ //Serial.print(TIME_REQUEST,BYTE); //return 0; // the time will be sent later in response to serial mesg}A non-void function MUST return a value. Since this is your sync function, the fact that it doesn't return anything is what is screwing up your clock. The art of getting good answers lies in asking good questions. editor1979 Last night, I got this message. I re-enabled the two lines in question then resent the time code.I then applied external power and removed the Serial Line and shut down my computer to leave it running without the computer.It ran all night. I just got home from work and turned on my computer. The Arduino Clock is still in perfect sync with my PC.It is displaying all the correct information. Hi all...I'm working at my first project using Arduino and it's IDE and I want to use a macro which is inside the Time.h..For example,after a reset or a power supply fault to the board, I want to calculate the second of the day when the board recovers, therefore to find in which cycle of a finite state machine the program is..For this I want to use the elapsedSecsToday, but I'm far from knowing how to use it, efectivelly...Here is my code,until now, and I want to run this macro in the set-up sequence..Can you give me a clue how to do it? while ( ! valid ){ getGPS(); } if (valid){ RTC.set(local);// DS1307 set to the local time from timezone.. Serial.println ( "DS set");//debug only delay(1000);//debug only } //Serial.println (elapsedSecsToday()); setSyncProvider(RTC.get); // the function to get the time from the RTC if(timeStatus()!= timeSet) Serial.println("Unable to sync with the RTC"); else Serial.println("RTC has set the system time"); delay(500);//debug only }void loop(){ if (interruptComplete){ if (valid){ // If GPS sentence is valid,write the time, if not, skip.. RTC.set(local);// DS1307 set to the local time from timezone.. Serial.println ( "beep");//debug only } if (! valid){ Serial.println ("No GPS");// Serial2---->Ethernet... } RTC.get();// time from DS1307... monitor_out(); //print it... //readreg(); interruptComplete = false; } getGPS();// get data from GPS}
{ "pile_set_name": "Pile-CC" }
In an uplink for LTE-Advanced, which is a developed version of 3GPP LTE (3rd Generation Partnership Project Long Term Evolution), support for transmission by a terminal using multiple antennas (SU-MIMO: single user-multiple input multiple output) is being studied. The SU-MIMO is a technique in which one terminal transmits data signal of the same frequency at the same time from multiple antenna ports and spatial-multiplexes data signals using a virtual communication path (stream) in space. In order to improve communication performance by SU-MIMO, a base station must know the status of a propagation path (channel) from each antenna of a terminal using a sounding reference signal, one of the reference signals (hereinafter referred to as “sounding reference signal (SRS)”). Thus, the terminal must transmit an SRS from each antenna. “Sounding” refers to estimation of the quality of a propagation path between a terminal and a base station. The SRS in the LTE is time-multiplexed with data, i.e. the symbol at the tail end of a subframe and transmitted to estimate the channel quality of an uplink data channel. In LTE, because a terminal has one transmission antenna, the terminal transmits one SRS from the antenna. On the other hand, in LTE-Advanced, because a terminal has N antennas, overhead for SRS transmission may increase to N times, causing shortage of domains for SRS. In order to increase the number of SRSs that can be transmitted in a cell every unit time, i.e. enhance the SRS capacity, a known method uses a code resource for reference signals for data demodulation (hereinafter referred to as “demodulation reference signal (DMRS)”) (see NPL 1). NPL 1 discloses a base station that uses scheduling information for uplink (also referred to as an UL grant) to instruct a terminal to transmit SRS. An SRS for which transmission is prompted by scheduling information transmitted from a base station is called “scheduled SRS”. FIG. 1 shows information reported by an UL grant that gives an instruction on transmission of a data signal in LTE. The UL grant contains predetermined numbers of bits, each indicating a piece of information such as a frequency hopping flag (FH flag) that indicates the presence or absence of frequency hopping between slots and the amount of cyclic shift for DMRS (hereinafter referred to as “amount of CS (cyclic shift for DMRS)”). Upon receiving the instruction on SRS transmission contained in an UL grant from a base station, a terminal transmits an SRS using the single carrier-frequency division multiple access (SC-FDMA) symbol in the physical uplink shared channel (PUSCH) in which a DMRS is to be assigned. A DMRS is transmitted using the symbol at the center in each slot of one subframe, as shown in FIG. 2, the subframe being consisting of two slots and being a scheduling unit of data signal. A DMRS and an SRS are signals using a cyclic shift sequence having the same sequence (ZC (Zadoff-Chu) sequence) cyclic-shifted. Hence, an SRS can be code-multiplexed in the same band as a DMRS using the amount of CS that is different from that for DMRS. In the LTE specification, an SRS is transmitted using only the symbol at the tail end of one subframe. NPL 1 discloses transmission of SRS using the symbol at the center of a slot (position of the symbol for DMRS) in addition to the symbol at the tail end of one subframe, thus enhancing the SRS capacity. Here, the FH flag contained in the UL grant for DMRS can also be applied to the scheduled SRS. That is, in the case where the Fit flag indicates that FH will be performed (“with FH”), there is an advantage that the channel quality can be measured for a plurality of bands because SRSs can be transmitted in two bands of slots 1 and 2. On the other hand, in the case where the FH flag indicates that FH will not be performed (“without FH”), there is an advantage that SRSs can be equalized in the same band of slot 1 and slot 2 and an influence of interference can be reduced (randomized). Furthermore, multiplication of the Walsh sequence with SRSs in the same band of slot 1 and slot 2 has another advantage in that an SRS can be multiplexed with DMRS in a different bandwidth.
{ "pile_set_name": "USPTO Backgrounds" }
Ali Karimi Ali Karimi ( ; born 8 November 1978) is an Iranian football coach and retired player. He has played for Fath Tehran, Persepolis, Al-Ahli Dubai, Bayern Munich, Qatar SC, Steel Azin, Schalke 04, Tractor Sazi, and the Iran national team for which he scored 38 goals in 127 appearances. In 2004, he became the fourth Iranian player to win the Asian Footballer of the Year. He announced his retirement at the end of the 2013–14 season and, on 11 April 2014, played the final game of his 18-year career. Karimi's professional career began with Fath Tehran, where he made his first-team debut in 1996 aged 18. He then played three seasons with Persepolis, winning the Iranian league twice and the Hazfi Cup once with the club. In July 2001 Karimi signed a two-year contract with UAE Pro League club Al-Ahli Dubai. While an Al-Ahli player, Karimi won two cup titles, and was the top-goalscorer in the 2003–04 season, an impressive feat for a midfielder. After leaving the club in 2005 aged-26, Karimi made a long-awaited move to Europe to play for Bayern Munich. At the club he had relative success, winning both the Bundesliga and the DFB-Pokal in 2005–06 season. Later in his career, he rejoined former coach Felix Magath and won a second German Cup with Schalke 04. Karimi ended his playing career in Iran with Persepolis and Tractor Sazi, and with the latter won the Hazfi Cup in the final season of his career. In international football, Karimi made his Iran debut on 13 October 1998, at the age of 19. He made 127 career appearances in total, appearing at five major tournaments including 1998 Asian Games, 2000, 2004, and 2007 Asian Cups and 2006 FIFA World Cup. Renowned for his on-the-ball skill, dribbling runs and playmaking ability, he was often referred to as the Asian Maradona and The Magician. He was believed to be one of Asia's greatest players, and is often listed as one of the greatest Iranian players of all time. Club career Karimi started his professional career with second division side Fath Football Club in 1997 where training was conducted on the streets with a plastic ball. Persepolis In 1998, Karimi joined Persepolis football club, which won the domestic double in 1999 and the championship again in 2000. He attended a trial with Perugia Calcio, but the transfer was aborted when Perugia deemed the transfer fee too high. There was also reportedly an offer from Spain's Atlético Madrid who were willing to pay Karimi £4.3 million in a four-year contract, but Karimi opted for United Arab Emirates side Al-Ahli because he wanted to stay close to home. Al-Ahli Karimi signed with Al Ahli in the United Arab Emirates in 2001, for a reported salary of $1.3 million for two years. In that season, Al-Ahli managed to win its first trophy, when they became the Winners of the President Cup in 2001–02 season. He scored a league-high 14 goals for Al Ahli in 2004. Bayern Munich On 3 May 2005, Bundesliga champions Bayern Munich's website announced that they had signed a one-year contract with Karimi, who became the third Iranian after Ali Daei and Vahid Hashemian to try his luck with Bayern. In October 2004, Iran hosted Germany in a friendly game in which Karimi played. The magazine kicker picked Karimi as the man of the match. FC Bayern's scouts studied Karimi in Dubai closer and came back with a recommendation not to sign the player due to doubts over his fitness. Felix Magath decided to go ahead with the signing despite the negative recommendations. On 13 August 2005, Karimi made his starting debut for Bayern when Felix Magath put him on the starting line-up of a 5–2 victory against Bayer Leverkusen on the second day of Bundesliga, in which he played on the left side of the midfield. Karimi made an assist to Roy Makaay for Bayern's second goal followed by his first goal in the Bundesliga. He came off in the 58th minute for Brazilian international Zé Roberto and received a warm ovation from the traveling Munich fans. Karimi scored on his first UEFA Champions League appearance against Rapid Vienna on 22 November 2005. On 17 December 2005, Karimi played for 88 minutes and scored a goal in Bayern's 2–1 win over Borussia Dortmund. Karimi made his 25th appearance for Bayern on 4 March 2006 against Hamburg, which resulted in an automatic 12-month extension to his one-year contract that expired on 30 June 2007. However, he injured his ankle in the same game, which sidelined him for six weeks. In the 2006–07 season, Karimi was often kept on the bench. Karimi expressed his belief that it was his last season with Bayern and his contract was not going to be renewed. Red Bull Salzburg offered Karimi a contract, which he rejected. Al-Ahli also made an official bid for him, which was eventually vetoed by Felix Magath as Munich's midfield was depleted by the sudden retirement of Sebastian Deisler. On 29 May 2007, Bayern Munich announced Karimi was leaving the club, though his new club was not yet known. Qatar SC On 3 July 2007, Karimi announced that he had signed a two-year deal with Qatar Sports Club. Karimi was believed to have signed a contract worth around £3.2 million, with a clause allowing him to return to Europe at any time. Al-Sailiya On 13 July 2008, Karimi signed a two-year contract with Al-Sailiya that is said to be worth around £4.7 million. Persepolis Persepolis' then chairman, Dariush Mostafavi, reached an agreement with Karimi after a one-hour-long telephone conversation. Persepolis had to pay Al-Sailiyah to release Karimi from his contract. Mostafavi claimed the release fee was around US$310,000. Karimi joined Persepolis on a loan, and signed with Persepolis on a one-year contract on 6 September 2008. Karimi scored his first goal since his return to Persepolis in the Tehran derby. With Esteghlal leading 1–0, Karimi equalized for Persepolis two minutes from time. On 9 October 2008, Karimi scored a hat trick against Abumoslem but could not prevent Persepolis losing 3–4. However, Karimi's contract was not extended reportedly because of a strained relationship with Persepolis chief executive Abbas Ansarifard. While Ansarifard claimed that the club offered Karimi a contract but he did not show up, Karimi claimed that Persepolis kept him waiting for four weeks for nothing. Steel Azin Karimi joined newly promoted Steel Azin on 29 July 2009 on a one-year deal. He was reportedly to be paid US$400,000 for the season. After joining Steel Azin, Karimi scored for four consecutive matches at the start of the season. On 14 August 2009, he scored the second goal in Steel Azin's 4–3 win over Saba. He scored a brace against Shahin in Steel Azin's 2–1 victory. On 4 December 2009, Karimi converted a penalty in the 52nd minute against Pas FC to score his 11th goal of the season. On 6 March 2010, during his team's match against Saipa, Karimi was sent off for pushing Majid Ayoubi after Ayoubi had fouled him. In January 2010, it was reported that Al-Ahli made an offer of US$500,000 to sign Karimi on a loan deal until the end of the 2009–10 season, which was rejected by Steel Azin. Karimi was sacked by the club in August 2010 for failure to observe the requirement to fast during Ramadan, but was reinstated a few days later after paying a fine. The player maintained that he had not shown disrespect to Islam. Schalke 04 Karimi signed a five-month deal for Schalke on 31 January 2011 upon passing a medical examination. He made his first appearance for the German club on 5 April 2011, coming on for Raúl in the second half in a Champions League quarter final match against Inter Milan before coming on as substitute against 1. FC Kaiserslautern in the German Bundesliga in his second and final match for Schalke. He won the German cup for the second time before the end of his contract. Persepolis On 15 June 2011, Persepolis chairman Habib Kashani announced that they reached an agreement with Karimi and he played for Persepolis in the 2011–12 Persian Gulf Cup and the 2011–12 Hazfi Cup. This was the second time that Karimi returned to his native club, Persepolis. Karimi was also appointed as Club captain. He made his debut in a match against Malavan and scored his first goal in the season for Persepolis in a match against Shahrdari Tabriz. He extended his contract with Persepolis for another season on 18 June 2012. He was injured a few times during the season and was not able to perform very well and at the end of the season he announced his retirement from football. Tractor Sazi On 13 June 2013, Karimi returned from retirement and joined Tractor Sazi. Karimi signed a one-year contract with Tractor Sazi. He made his first appearance for the Tractor Sazi in Iran Pro League against former club Persepolis. Karimi scored his first goal in the Iran Pro League in Tractor's 4–2 win over Zob Ahan. He helped Tractor to win the season's Hazfi Cup, his first title in Iranian football after his return from European Football. On 20 July 2014, Karimi announced his retirement through publishing a letter on his YouTube account. At the time, Karimi was aged 35 and played professional football for 18 years. International career Karimi made his debut for Iran national football team in October 1998 in a match against Kuwait. That same year, he won the Gold Medal with Iran at the 1998 Asian Games. Karimi scored one of Iran's two goals in the final against Kuwait. He was also one of Iran's main players in its 2002 FIFA World Cup qualification campaign. In 2001, after losing to Bahrain and drawing with Thailand, Iran finished second in their qualifying group and had to play a home-and-away play-off with the Republic of Ireland for a spot at the 2002 World Cup. Karimi started as an attacking midfielder in the first game in Dublin, and used his acceleration on the break and his dribbling to attack Ireland's defence. However, he was also off target on a number of occasions, and Iran lost the match 2–0. They won the return leg 1–0 but missed out on the final. At the 2004 Asian Cup, Karimi scored five goals that made him joint top scorer. Iran finished third in the overall tournament, behind Japan and China. In the quarter final, Karimi scored a hat trick in Iran's 4–3 win over South Korea. His first two goals were headers and the third a finish on a low cross from Mehdi Mahdavikia. Karimi was given the prestigious Asian Player of the Year award in 2004, joining his fellow Iranians, Mahdavikia in 2003, Ali Daei in 1999, and Khodadad Azizi in 1996. He also won the 2004 West Asian Football Federation Championship with Team Melli. His performance in the Iran–Germany friendly game for Bam victims held in Azadi Stadium in Tehran in October 2004 was said to be the reason behind Bayern's interest in the player. Coming off a serious ankle injury, Karimi had a poor World Cup finals at Germany 2006. He was unable to exert much influence on proceedings as the Iranians lost 1–3 to Mexico and 0–2 to Portugal. He was substituted in the 65th minute of the Portugal game and kicked the team's sports bags by the dugout. Iran's then manager Branko Ivankovic said he may drop Karimi in the upcoming game due to disciplinary reasons. Karimi did not play in the 1–1 draw against Angola, but Ivankovic attributed Karimi's omission to his refusal to play because of an injury. Karimi played in the 2007 Asian Cup. In May 2008, Karimi was banned from playing in the national team after he made criticisms towards the IRIFF in the Ardebil training ground, but has been reinstated in the national squad after intervention from Iranian President Mahmoud Ahmadinejad and Hassan Khomeini, the grandson of revolutionary leader Ayatollah Ruhollah Khomeini. In October 2008, Karimi retired from Team Melli. Ali Daei, the then Iran football coach, said Karimi will never be called up again. In April 2009, Karimi announced that he was ready again to serve his country, if he was to be picked by Team Melli coach, Afshin Ghotbi. He played in 2010 FIFA World Cup qualification for Team Melli and on 10 June 2009 Karimi scored in a 1–0 victory over U.A.E. to keep Iran's 2010 World Cup qualifying hopes alive. On 17 June 2009, he played in Iran's 1–1 draw with South Korea, a result that eliminated Iran from the 2010 World Cup finals. During the match, a number of Iranian players, including Karimi, wore green wristbands, which were interpreted to be a show of support for Iranian opposition leader Hossein Mousavi, who accused the Iranian government of vote rigging the election on 12 June. Western media reported after the game that the players who wore the green wristbands have been banned from the team for life, while a newspaper in Iran reported that the players concerned have retired. On 24 June 2009, FIFA wrote to Iran's football federation asking for clarification on the situation. The Iranian football federation replied that no disciplinary action has been taken against any player. On 3 March 2010, he returned for the 2011 AFC Asian Cup qualification match against Thailand. Karimi was not picked to be part of Iran's 2011 AFC Asian Cup squad as Ghotbi decided to use younger players in his position. He was invited to the national football team again by Carlos Queiroz in 2011 to play in the 2014 FIFA World Cup qualification and played for the team until his retirement in 2013. Queiroz later announced that Karimi is one of his best players during his coaching times. He is currently the third most capped player and the third highest scorer of Iran. On 27 March 2014, Carlos Queiroz announced in an interview that Karimi can return to the national team and will be using Karimi in the 2014 FIFA World Cup, if he accepts. However, Karimi was not included in Queiroz's final 30-man squad for the World Cup. Managerial career On 25 September 2014, Karimi was named as the assistant coach by Carlos Queiroz in the Iranian national team. However, he stepped down from his role shortly before the 2015 AFC Asian Cup. He was later appointed Naft Tehran in June 2017 manager but was not signed a contract with team and left the team before the start of the league. However, Karimi was resigned with Naft in September. On 1 January 2018, he became the head coach of Sepidrood while Sepidrood was in bottom two but he kept this team in the Persian Gulf Pro League. Career statistics Club Source: Assist goals Persepolis statistics International International statistics International goals Managerial statistics Awards and honours Club Persepolis Iranian Football League: 1998–99, 1999–2000 Hazfi Cup: 1998–99 AFC Champions League: 1999–2000 (Third-place), 2000–01(Third-place) Al-Ahli UAE Cup: 2001–02, 2003–04 Bayern Munich Bundesliga: 2005–06 DFB-Pokal: 2005–06 Schalke 04 DFB-Pokal: 2010–11 Tractor Sazi Hazfi Cup: 2013–14 National Asian Games Gold Medal: 1998 West Asian Football Federation Championship: 2000, 2004 AFC/OFC Cup Challenge: 2003 Asian Cup: Third-place 2004 Individual Asian Footballer of the Year: 2004 Runner-up: 2012 West Asian Football Federation Championship MVP: 2000 Top scorers UAE Pro League: 2003–04 Asian Cup Top Scorer: 2004 Asian Cup All-Star Team: 2004 AFC/OFC Cup Challenge MVP: 2003 AFC Asian Player of the Month: 2000 (June), 2001 (October), 2003 (October) Marca Fans' Top Iranian footballer of all time: 2019 AFC Asian Cup Fans' All-time Best XI: 2018 References External links (since 2010) RSSSF archive of Ali Karimi's international appearances Category:1978 births Category:Living people Category:2000 AFC Asian Cup players Category:2004 AFC Asian Cup players Category:2006 FIFA World Cup players Category:2007 AFC Asian Cup players Category:Steel Azin F.C. players Category:Al Ahli Club (Dubai) players Category:FC Bayern Munich footballers Category:Expatriate footballers in Germany Category:Expatriate footballers in Qatar Category:FIFA Century Club Category:Bundesliga players Category:Association football midfielders Category:Iran international footballers Category:Iranian expatriate footballers Category:Iranian footballers Category:People from Karaj Category:Persepolis F.C. players Category:Qatar SC players Category:Asian Games gold medalists for Iran Category:FC Schalke 04 players Category:Asian Footballer of the Year winners Category:Qatar Stars League players Category:Tractor S.C. players Category:Asian Games medalists in football Category:Footballers at the 1998 Asian Games Category:Persian people Category:Medalists at the 1998 Asian Games Category:Persian Gulf Pro League players Category:Azadegan League players Category:UAE Pro League players Category:Iranian expatriate sportspeople in Germany Category:Iranian expatriate sportspeople in Qatar
{ "pile_set_name": "Wikipedia (en)" }
Q: Avoid DD anomalies I have this problem called out by PMD (static code analyzer) more often that I would like, and would like to know how someone with more experience than me would write it. My code is functional but I find it inelegant, so I want to know how other programmers would write this piece. The case is, in a network/IO petition I may or may not get a result from, but my parent method is not null-proof so I always have to return something. I also don't like several returns on a method. public String getBingLocation(Coordinate... data) { String response = "Not Retrieved"; final Coordinate location = data[0]; JSONObject locationData; try { locationData = NetworkManager.getJSONResult(ApiFormatter .generateBingMapsReverseGeocodingURL(location.Latitude, location.Longitude)); if (null != locationData) { final String address = this.getAddressFromJSONObject(locationData); response = address; } } catch (final ClientProtocolException e) { LoggerFactory.consoleLogger().printStackTrace(e); return response; } catch (final JSONException e) { LoggerFactory.consoleLogger().printStackTrace(e); return response; } catch (final IOException e) { LoggerFactory.consoleLogger().printStackTrace(e); return response; } finally { location.Street = response; } return response; } Other example: public static Object loadObject(final String fileName, final Context context) { Object object = null; try { ObjectInputStream objectInputStream = null; try { final FileInputStream fileStream = context.openFileInput(fileName); objectInputStream = new ObjectInputStream(fileStream); object = objectInputStream.readObject(); } catch (final ClassNotFoundException catchException) { LoggerFactory.consoleLogger().printStackTrace(catchException); } catch (final ClassCastException catchException) { LoggerFactory.consoleLogger().printStackTrace(catchException); } catch (final Exception catchException) { LoggerFactory.consoleLogger().printStackTrace(catchException); } finally { if (objectInputStream != null) { objectInputStream.close(); } } } catch (final IOException catchException) { LoggerFactory.consoleLogger().printStackTrace(catchException); } return object; } A: Part of the problem is your functions have more than one responsibility. They are both getting a result and handling errors. You're also getting unnecessarily hung up trying to avoid multiple return points, which is a vestigial practice from C programming where it can cause memory leaks. You should use multiple returns if it clarifies your code, especially in short functions. I'm also guessing that your logging code is getting repeated all over the place. If you separate those concerns and try to avoid repeating yourself, you get something like this: public JSONObject getLoggedJSONResult(String api) { try { return NetworkManager.getJSONResult(api); } catch (final ClientProtocolException e) { LoggerFactory.consoleLogger().printStackTrace(e); } catch (final JSONException e) { LoggerFactory.consoleLogger().printStackTrace(e); } catch (final IOException e) { LoggerFactory.consoleLogger().printStackTrace(e); } return null; } public String getBingLocation(Coordinate... data) { final Coordinate location = data[0]; JSONObject locationData = getLoggedJSONResult( ApiFormatter.generateBingMapsReverseGeocodingURL( location.Latitude, location.Longitude)); if (null == locationData) { return "Not Retrieved"; } else { return this.getAddressFromJSONObject(locationData); } } As a general principle, most DD anomalies can be fixed by splitting the function. It's mostly a matter of figuring out where to split it. Your second example is trickier. That sort of situation is why try-with-resources statements were invented. You can use an early return to eliminate the DD anomaly on object, but you're not going to be able to do much about objectInputStream without a try-with-resources.
{ "pile_set_name": "StackExchange" }
#!/bin/bash # # Script to run Shadowsocks in daemon mode at boot time. # ScriptAuthor: icyboy # Revision 1.0 - 14th Sep 2013 #==================================================================== # Run level information: # chkconfig: 2345 99 99 # Description: lightweight secured socks5 proxy # processname: ss-server # Author: Max Lv <max.c.lv@gmail.com>; # Run "/sbin/chkconfig --add shadowsocks" to add the Run levels. #==================================================================== #==================================================================== # Paths and variables and system checks. # Source function library . /etc/rc.d/init.d/functions # Check that networking is up. # [ ${NETWORKING} ="yes" ] || exit 0 # Daemon NAME=shadowsocks-server DAEMON=/usr/bin/ss-server # Path to the configuration file. # CONF=/etc/shadowsocks-libev/config.json #USER="nobody" #GROUP="nobody" # Take care of pidfile permissions mkdir /var/run/$NAME 2>/dev/null || true #chown "$USER:$GROUP" /var/run/$NAME # Check the configuration file exists. # if [ ! -f $CONF ] ; then echo "The configuration file cannot be found!" exit 0 fi # Path to the lock file. # LOCK_FILE=/var/lock/subsys/shadowsocks # Path to the pid file. # PID=/var/run/$NAME/pid #==================================================================== #==================================================================== # Run controls: RETVAL=0 # Start shadowsocks as daemon. # start() { if [ -f $LOCK_FILE ]; then echo "$NAME is already running!" exit 0 else echo -n $"Starting ${NAME}: " #daemon --check $DAEMON --user $USER "$DAEMON -f $PID -c $CONF > /dev/null" daemon $DAEMON -u -c $CONF -f $PID fi RETVAL=$? [ $RETVAL -eq 0 ] && success echo [ $RETVAL -eq 0 ] && touch $LOCK_FILE return $RETVAL } # Stop shadowsocks. # stop() { echo -n $"Shutting down ${NAME}: " killproc -p ${PID} RETVAL=$? [ $RETVAL -eq 0 ] rm -f $LOCK_FILE rm -f ${PID} echo return $RETVAL } # See how we were called. case "$1" in start) start ;; stop) stop ;; restart) stop start ;; condrestart) if [ -f $LOCK_FILE ]; then stop start RETVAL=$? fi ;; status) status $DAEMON RETVAL=$? ;; *) echo $"Usage: $0 {start|stop|restart|condrestart|status}" RETVAL=1 esac exit $RETVAL
{ "pile_set_name": "Github" }
We All Follow United | Man Utd Fan Blog | Opinions & Transfer News Manchester United have to pay £175m to sign wantaway world-class star – report Bayern Munich will entertain bids of at least £175million for their star striker Robert Lewandowski according to reports from Germany. Lewa is wanted by a number of clubs after he stated that he is willing to leave the Bundesliga champions for a brand new challenge. The Bild (h/t The Mirror) claims that any club wanting to sign the 29-year-old Polish striker will have to part with £175million and the player was offered to a number of clubs by his agent Pini Zahavi. The report claims that Manchester United was one of the clubs that Lewa was offered to, with Chelsea and Paris Saint-Germain being the other sides. Lewa won four consecutive Bundesliga titles with Bayern and picked up two more during his earlier spell with rivals Borussia Dortmund and scored 151 goals in just 195 matches for the Bavarians. The Pole will be taking part in the World Cup too and will be hopeful of a good showing in Russia. A quality player but the price is too high Bringing in Lewandowski would certainly add more goals to our side and possibly make us the most lethal force in Europe given that we have Alexis Sanchez, Romelu Lukaku and Marcus Rashford too. However, the price point seems to be a little too high, even though Lewandowski is one of the most talented forwards to have ever played the game of football. Bayern slapping a price of £175million is crazy, to say the least, and hopefully, we can avoid spending this big on one single player and instead bring in reinforcements for other areas so that we have a stronger side next season.
{ "pile_set_name": "Pile-CC" }
149 F.2d 359 (1945) FIREMEN'S MUT. INS. CO. v. APONAUG MFG. CO., Inc., et al. No. 11270. Circuit Court of Appeals, Fifth Circuit. May 11, 1945. *360 *361 Ross R. Barnett, Rufus Creekmore, and H. H. Creekmore, all of Jackson, Miss., for appellants. Ben F. Cameron and Lester E. Wills, both of Meridian, Miss., Japtha F. Barbour, Sr., of Yazoo City, Miss., and Toxey Hall and Lee D. Hall, both of Columbia, Miss., for appellees. Before SIBLEY, HUTCHESON, and LEE, Circuit Judges. SIBLEY, Circuit Judge. This appeal is from a summary judgment for the defendants on a complaint brought by appellants against the appellees for damages as for a tort. The plaintiffs alleged that they were insurers against loss by fire of a cotton mill belonging to Aponaug Mfg. Co., Inc., when on Dec. 21, 1938, R. D. Sanders, its president and treasurer and sole stockholder, and exercising sole control over the corporation, in conspiracy with the mill superintendent, C. D. Kent, and one Noel McMahan, burned the mill to collect the insurance, and that $187,634 was paid on a statement of loss in that amount presented by R. D. Sanders for the Company; and that he fraudulently concealed the fact of the fraudulent fire. Judgment was prayed against all and each of the defendants. The Company's answer admitted the insurance, the fire and the collection of $187,634 on a statement of loss presented by Sanders, and that he was its president and treasurer, but denied that he was sole stockholder or exercised full control, and denied he had any authority to so conspire, or that any such conspiracy occurred. Kent answered admitting he was superintendent but denying the conspiracy, or knowledge of the insurance. Sanders denied he was sole stockholder or controlled the Company, but admitted he was president, treasurer, and a director of the Company, and a co-trustee of the stock along with two others, and that he was acting as general manager of the Company under bond, but he denied the conspiracy to burn the mill; and otherwise adopted the answer of the Company. McMahan was later made a defendant, but if served, he made no answer. No judgment was entered as to him. A jury trial was duly demanded. On the face of the pleadings therefore there were issues as to the fraud of the fire, and who were responsible for it; as to the concealment of the non-liability of the insurers when the loss was settled; and a subsidiary issue as to Sanders' ownership and control of the Company. These issues were material to the case or cases alleged. If Sanders, Kent and McMahan wilfully set fire to the mill, without the complicity of the corporation, in order to cause the insurers to pay, they committed a wrong, and would be individually liable for the injury intentionally done. The insurance would remain valid, and the corporation for its innocent stockholders and creditors could collect, and the insurers after paying would ordinarily be subrogated to the corporation's right of action against the burners of its property; and in our judgment, though subrogation is not expressly alleged in the complaint as a ground of recovery, the wilful setting of the fire and intentional injury to the insurers would give them a direct right to sue. 36 C.J.S., Fires, §§ 11, 12. Another, and more prominently stated ground of suit is based on the complicity of the insured corporation. If it set a fraudulent fire to collect its insurance, it would have no better right to the insurance money than an insured individual would; but there is the question whether the fire, even though wilfully set by someone connected with the corporation, was really set by the corporation. It seems that such act of an officer not authorized thereto by the stockholders, or the act of one but not the sole stockholder, will not be charged to the corporation to the prejudice of innocent stockholders; but if he is practically the sole stockholder, the corporate entity will be disregarded, and his fraud be held as that of the corporation. Sec. 29 Am. Jur., Insurance, § 1028, 1029. There is authority too to the effect that if the incendiary is in control of the business policies of the corporation, though not sole stockholder, the insurance is defeated by his fraud, Kimball Ice Co. v. Hartford, 4 Cir., 18 *362 F.2d 563, 52 A.L.R. 799, but we do not at present express an opinion on that point. The motions for summary judgment of course raised the question whether these issues, though in law material, were "genuine". Rule of Civil Procedure 56(e), 28 U.S.C.A. following section 723c. A pretended issue, one that no substantial evidence can be offered to maintain, is not genuine. The rule provides that the genuineness of an issue made by the pleadings may be promptly tested by summary proceedings before the judge in which ex parte affidavits may be used. In this case the defendants presented affidavits from Sanders, Kent and McMahan that there was no conspiracy, and no fraudulent fire, though it was evidently incendiary; and there was record proof that the stock of the Company was vested in three trustees under the will of J. W. Sanders, R. D. Sanders being a trustee and the beneficial owner of one-eighth of the stock. The trustees elected themselves as directors of the Company, and R. D. Sanders held the offices above stated. One trustee had died at the time of suit, but the third made affidavit that so far as he knew no one connected with the Company had anything to do with the fire or any authority to conspire to cause it. Against this the plaintiffs introduced two sworn statements made by McMahan to local police officers in 1940, that he and Kent had been hired by R. D. Sanders to burn the mill to collect the insurance, and that two efforts had failed but the third succeeded. It was proved that McMahan and Kent were indicted for the arson and McMahan was on his plea of guilty sentenced to the penitentiary. He had reiterated this account of the burning to the plaintiffs in a written statement shortly before the complaint was filed. Before the hearing his deposition was taken by the defendants and his testimony was a repudiation of these three statements, and that he knew nothing of the origin of the fire. The plaintiffs having thus lost their main witness were given time to secure other evidence. That presented included an affidavit that some time after the mill was burned Kent had told one affiant that the new automobile in which he was riding Sanders had given him, besides $5,000, for burning the mill. This affiant later gave another affidavit that Kent was quite intoxicated at the time and affiant paid no attention to what he said. There was also an affidavit from one Germany in brief that in 1938 he was friendly with Kent and through him met Sanders; Sanders asked if he wanted to make some money, that he wanted to get rid of the mill; a second time Sanders said he wanted the mill completely burned and would pay somebody $1,000 to do the job; and a third time Sanders said he had got Noel McMahan to do the work and affiant could help, but affiant declined; that the night of the fire, and just after the fire, affiant saw Kent who said he was going to celebrate with Noel, and would call Sanders up (who lived in another city) and tell him the damn job is over with; and affiant a few days later heard McMahan tell his wife to call Kent and Sanders up and tell them if they did not come and pay him out of jail he was going to tell the whole damn thing about burning the mill. A number of impeaching affidavits were filed attacking both the character and mentality of Germany, and some affidavits supporting him were also filed. A proposal was made by the plaintiffs to take his deposition in the presence of the judge that his manner and demeanor might be observed, but this was not done. Application was also made by plaintiffs to take regularly the deposition of J. C. Sanders, a brother of R. D. Sanders, who lived in Alabama and owned one-eighth of the Company's stock, and who it is claimed would testify to the full and complete control of R. D. Sanders over the Company's affairs. The taking of the deposition was opposed on a showing by certified transcript that the witness had been indicted in the District Court of the United States for the Southern District of Alabama for perjury in connection with a claim for insurance on another burned cotton mill, and that he was convicted and sentenced to the penitentiary. The judge held him an incompetent witness and ordered that his deposition be not taken. After argument and consideration the judge wrote a letter, in lieu of an opinion, in which he expressed the view that in a fraud case in Mississippi the evidence of the fraud must be more than a preponderance, but must be clear and convincing, that the testimony of Germany was unreasonable, and he had denied knowing anything about it right after the fire, and was so impeached otherwise as to be unworthy of belief; and the statements attributed to Kent would be only hearsay because made after the *363 alleged conspiracy had been consummated; so that if a verdict were rendered for the plaintiffs the court would be compelled to set it aside. Summary judgment was accordingly entered for the defendants. This judgment was erroneous. The statements of Kent were admissions of his own implication in the arson, whenever made. Likewise the three former statements of McMahan were admissions that could be used as evidence against McMahan. He would hardly have taken a penitentiary sentence on a plea of guilty if he did not burn the mill, and no motive for his burning it appears except that which he originally asserted. Germany's testimony that Sanders wanted to get rid of the mill and was trying to hire someone to burn it is monstrous, but such things have happened. It is not in a legal sense incredible, and is admissible against Sanders. There is thus some admissible evidence against each to show that each had a hand in a wilful fire, for which they may be liable in damages. The impeachment of the witness Germany is not a matter for decision on summary judgment. A jury trial had been demanded in this case, and it being a suit at common law, was a constitutional right. The success of an attempt to impeach a witness is always a jury question, as is the credibility of the witnesses where they contradict one another, or themselves. We do not think the judge ought on a motion for summary judgment to have considered the affidavits attacking or sustaining the character of the witness. He should not have concerned himself at this time with the question what he would do if the jury should render a verdict for plaintiffs. A judge indeed does not know what he would do in that regard until he has heard the trial in open court before the jury and has the benefit of the opinion of the jury expressed in their verdict. Only when the evidence is such that it is clear the jury would have none to go on, though they believed that unfavorable to the movant for summary judgment, can the motion be sustained and a jury trial denied. We think also that the testimony of J. C. Sanders ought to be allowed taken. He is a stockholder equally interested in the mill with R. D. Sanders and has had, it appears, fire troubles with his cotton mill. His testimony might throw light on the Company's affairs and liability. A conviction of perjury, though creating a general disqualification to testify at common law and in Mississippi, goes only to the convict's credit in a federal court, at least when the conviction is under the federal statute punishing prejury. Prior to 1909, under R. S. § 5392, a part of the punishment for perjury under the law of the United States was an incapacity to give testimony in any court of the United States. The Criminal Code, 18 U.S.C.A. § 231 and Historical Note, wholly omits that result of conviction, and expressly repealed R.S. § 5392. See Lucks v. United States, 5 Cir., 100 F.2d 908; Rosen v. United States, 245 U.S. 467, 38 S.Ct. 148, 62 L.Ed. 406. The Rosen case asserts the general modern tendency to hear the witness and let conviction of crime affect only his credibility. The Act of 1906, 28 U.S. C.A. § 631, made the competency of witnesses in a civil case to depend on the State law, but Rule of Civil Procedure, 43 (a), modifies this, and directs the admission of all evidence that is admissible either under the statutes of the United States or the rules observed in the federal courts or the rules applied in the courts of the State where the trial is held. Where the question depends on the effect of a conviction of perjury under the perjury statute of the United States, we think that statute controls, and having been altered in 1909 so as to make the testimony of the convict admissible it ought to be admitted. We need not decide what a Mississippi court would do under the statutes of Mississippi. We may observe finally that, though it might be difficult to conclude that one who as the president and treasurer of a corporation could not sell the corporation's plant without authority from the stockholders, could as a corporate act burn it to collect insurance, yet as the treasurer he has the authority and duty to represent the corporation in collecting the insurance, and any concealments or other frauds committed by him in so doing would be attributable to it. If persons not authorized by the corporation burned its mill, that would not affect the validity of the insurance, and a failure by the treasurer to tell what he knew about it would not necessarily be a fraudulent concealment. But if he knew that the mill was burned by authority of the corporation to collect the insurance, his making claim for insurance which he knew *364 was not owing, without disclosure of the facts, would be a fraudulent concealment. We do not wish to try to settle the law of the case at this time, but only to emphasize the difference in the basis on which liability may arise on the part of the corporation, and on the part of the individual defendants. The corporation can be liable only if it by competent authority fraudulently burned its mill and then by concealment of its fraud collected insurance not really due. The individuals sued may be liable if they wilfully burned the mill, though the corporation was not a party to any plan to do it. The case is such in our opinion that it ought to be fully developed before a jury in regular course, and not disposed of by summary judgment. Judgment reversed.
{ "pile_set_name": "FreeLaw" }
Q: Webview app code security I have an app which runs mostly in webview and opens an html file from my server and most of the logic happens in its javascript files. If you open the html file on your browser you will have all the code with a simple inspect element. I wanted to ask how can I secure my application and prevent my code from being seen and copied. Thanks A: By default WebView doesn't allow debugging of its contents (unlike Chrome), unless it runs on a debug build of Android. Thus if you don't reveal the URL anywhere, users will simply not know what to open in a browser. You can also minify/obfuscate your JavaScript code to make it barely readable, even if anyone somehow opens it. This also has a benefit of reducing download size. A radical approach would be to generate all the results on the server and send them to clients. This way, your clients will not have any code at all on them. But this will greatly complicate any attempts to make the results interactive.
{ "pile_set_name": "StackExchange" }
A communication system that provides pseudo-duplex communications between communication units. A control slot is used to allow a receiving unit to transmit a request to interrupt, and to instruct a transmitting unit to interrupt its transmissions and to begin receiving....http://www.google.com/patents/US5025442?utm_source=gb-gplus-sharePatent US5025442 - TDM/FDM communication system with pseudo-duplex capability TDM/FDM communication system with pseudo-duplex capabilityUS 5025442 A Abstract A communication system that provides pseudo-duplex communications between communication units. A control slot is used to allow a receiving unit to transmit a request to interrupt, and to instruct a transmitting unit to interrupt its transmissions and to begin receiving. Images(4) Claims(4) We claim: 1. In a time division multiplexed communication system wherein at least one time slot per TDM frame on at least one communication channel is a system control time slot that is used to substantially support communication control information, a method of providing pseudo-duplex communication between at least a first and second communication unit, comprising the steps of: (A) transmitting information from said first communication unit in a first time slot wherein the first time slot is assigned to said first communication unit via said system control time slot; (B) receiving said information by said second communication unit in said first time slot, wherein the reception is terminated by each one of the following conditions: (i) said first communication unit concludes transmitting, thereby allowing said second communication unit to begin transmitting; (iii) while said first communication unit is transmitting, said second communication unit transmits a talk request signal via said system control time slot, thereby causing said first communication unit to receive a transmit-abort instruction via said system control time slot, thereby allowing said second communication unit to transmit a message to said first communication unit, and said first communication unit to receive said message. 2. In a time division multiplexed communication system wherein at least one time slot per TDM frame on at least one communication channel is a system control time slot that is used to substantially support communication control information, a method of providing pseudo-duplex communication between at least a first and second communication unit, comprising the steps of: (A) transmitting information from said communication unit in a first time slot wherein the first time slot is assigned to said first communication unit via said system control time slot; (B) receiving said information by said second communication unit in said first time slot; (C) while said first communication unit is transmitting, transmitting from said second communication unit a talk request signal via said system control time slot, thereby causing said first communication unit to receive a transmit-abort instruction via said system control time slot, thereby allowing said second communication unit to transmit a message to said first communication unit, and said first communication unit to receive said message. 3. In a first communication unit for use in a time division multiplex communication system wherein at least one time slot per TDM frame on at least one communication channel is a system control time slot that is used to substantially support communication control information, a method of interrupting a transmission from the first communication unit to allow reception of a transmission from a second communication unit, comprising the steps of: (A) transmitting information in an assigned time slot, which time slot is assigned via the system control time slot; (B) receiving a transmit-abort instruction initiated by the second communication unit via the system control time slot; (C) in response to receiving the transmit abort intruction: (i) terminating further transmissions in the assigned time slot; and (ii) receiving a message initiated by the second communication unit in the assigned time slot. 4. In a first communication unit for use in a time division multiplex communication system wherein at least one time slot per TDM frame on at least one communication channel is a system control time slot that is used to substantially support communication control information, a method of interrupting a transmission from a second communication unit to allow transmission by the first communication unit, comprising the steps of: (A) receiving a transmission from the second communication unit in an assigned time slot, where the assigned time slot is assigned via the system control time slot; (B) transmitting, via the system control time slot, a talk request signal; (C) transmitting, via the assigned time slot, a message to the second communication unit. Description TECHNICAL FIELD This invention relates generally to radio frequency communication systems. BACKGROUND ART Radio frequency (RF) communication systems that make use of frequency division multiplexing (FDM) are known. In such systems, commonly known as trunked communication systems, communication channels are assigned for use from time to time to subscribers as needed. To facilitate the channel assignment mechanism, such systems generally provide either a dedicated control channel that supports the channel assignment signalling, or the control channel function is distributed amongst the voice channels; for example, by providing the control channel information subaudibly simultaneously with voice traffic. RF systems that make use of time division multiplexing (TDM) are also known. In these systems, a communication frequency (or pair of frequencies) is divided by time into frames and slots, and subscribers are assigned a slot to support their communication needs. Combined FDM/TDM systems are also known. In such systems, a subscriber will be assigned a particular time slot on a particular frequency (or pair of frequencies) to support its communication needs. These systems provide a control slot on one of the frequencies to support the channel assignment information. The known FDM, TDM, and FDM/TDM communications systems do not economically support many desired features. For example, full duplex RF capabilities must be provided in an FDM radio to support full duplex communications. While a properly configured TDM or FDM/TDM radio can support full duplex communications without full duplex RF capabilities, channel access time, channel monitoring capabilities and other features in such systems are often degraded. A need exists for a communication system that will economically support needed and desirable features and options while simultaneously offering high quality communications and operability. SUMMARY OF THE INVENTION These needs and others are substantially met through provision of the time division multiplexed, multiple frequency communication system disclosed herein. This system supports a plurality of TDM frames on at least some of its multiple frequencies, wherein each TDM frame includes a plurality of time slots. Some of these time slots are used to substantially support voice and data message communications, and two or more of these time slots are control information slots that are used to substantially support control information, such as channel assignment signalling. Depending upon the application, the control information slots may be on the same communication frequency, or on different frequencies. If on different frequencies, the control slots must still be in different time slots from one another to prevent contention and preferably are not in adjacent time slots. In one embodiment, frequency and slot assignments for voice and/or data communications are assigned in a way that assures that the assignments for a particular communication unit do not contend with at least one of the control information slots, thereby assuring that all communication units can gain access to at least one of the control slots at all times. Further, the system can be made particularly sensitive to such assignments, such that signalling information intended for a particular communication unit can be transmitted during a control slot that the communication unit is known to be monitoring, and not during the remaining control slots. In another embodiment, the slot assignment process can be made dynamically responsive to loading and/or the communication needs of a particular communication unit. In particular, the system can monitor one or more predetermined parameters that represent loading for the communication system, and assign a number of time slots to a requesting communication unit or modify the slot duration as commensurate with the monitored parameter. For example, higher voice quality may generally be attained by assigning two time slots for communication, as versus one, thus allowing transmission of greater speech coding information. During times of light communication traffic, two time slots may be assigned to a requesting unit without degrading the grade of service offered to other subscribers. In the alternative, during times of heavy traffic, it may be appropriate to provide a requesting unit with only one slot to support its voice communication traffic, thereby providing acceptable audio quality to the requesting unit while still retaining a capability of servicing other units as well. FIG. 9 comprises a timing diagram depicting an alternate full duplex communication; and FIG. 10 comprises a timing diagram depicting a full duplex communication being conducted simultaneously with reception of yet another signal. BEST MODE FOR CARRYING OUT THE INVENTION Referring to FIG. 1, a system implementing the invention can be seen as generally depicted by the numeral 100. The system (100) includes generally a central controller (101) that controls the allocation of communication channels (frequencies and time slots) to promote organized communication between various communication units. The central controller (101) connects via appropriate interconnections, in a known manner, to a plurality of repeaters (102), there being one repeater (102) for each supported frequency (or frequency pair, depending upon the application). The central controller (101) controls the operation of the repeaters (102) and provides control channel information. Each repeater (102) may include a microprocessor and associated digital circuitry, in which case the controlling actions of the central controller (101) may take the form of data packets transferred over an interconnecting network (106). The system also includes a reference timing generator (103) and one or more auxiliary interface units (107). The timing generator (103), which may include a high stability reference oscillator, provides various clock signals, including but not limited to the TDM frame clock, slot clock, and data bit clock, to the central controller (101) and the repeaters (102) to maintain time synchronization throughout the system so that symbols, slots and frames on all frequencies coincide in time. The auxiliary interfaces (107) provide means to interconnect the system (100) with non-RF communication units, such as telephone lines and dispatch consoles. The system also includes a plurality of TDM/FDM capable communication units (104). (As used herein, "communication unit" is intended to refer to any of a variety of radio platforms, including but not limited to mobile radios, portable radios, and fixed location radios, including both one-way and two-way devices.) Referring to FIG. 2, the repeater (102) will now be described. The repeater (102) includes a receive and a transmit section (201 and 202). The receiver section (201) includes an RF receiver (203) that receives signals via an appropriate antenna structure (204) and that provides at its output a baseband signal. The latter signal is passed to both a voice recovery block (205) and a data recovery block (206). The voice recovery block processes the received baseband signal to recover the voice information signal (207). This signal might represent some processed version of the original audio signal. (An example of this audio processing can be found in a commonly owned co-pending application filed Apr. 29, 1988 and having Ser. No. 187,685, incorporated herein by this reference.) Depending on the nature of the repeater interconnection network (106) the voice recovery block (205) may include an audio encoder/decoder to reformat the received voice signal (207). In the case of the aforementioned audio processing, this coding function could be accomplished with a digital signal processor, for example the Motorola DSP56000. The data recovery block operates in a known manner to recover any data information (such as, for instance, control slot information) included in the received signal, thus providing the received data signal (208). The recovered voice signal (207) and data signal (208) are passed to a repeater network interface (209), which communicates these to the central controller (101) or other repeaters (102) as is appropriate via the repeater interconnection network (106). So configured, the repeater (102) receives TDM RF signals and properly processes them to recover both voice and data information that may be present in the communication. The transmitter section (202) also includes a network interface (210) that receives voice signals (211) and data signals (212). The voice signals (211) comprise received voice signals (207) from the repeater's receiver section (201) or from the receiver sections (201) of other repeaters (102) in the system. The data signals (212) include control channel information from the central controller (101). The voice signal (211) and data signal (212) are processed by a transmitter controller (213) to provide an appropriately coded and slot and frame synchronized signal at its output. As in the receiver section (201), the transmitter controller (213) may include a DSP to reformat the voice signal (211) as appropriate for various receiving communication units. The output of the transmitter controller (213) is passed through a splatter filter (214) to an RF transmitter (215) that properly processes the signal to provide a signal that may be appropriately radiated from an antenna device (216) to cause transmission of the processed signal as desired. Referring to FIG. 3, a TDM/FDM capable communication unit (104) will be described. The communication unit (104) includes an RF transceiver (301) that couples to an appropriate antenna (302) to transmit and receive RF signals. The transceiver (301) provides a received baseband signal which is digitized by an analog to digital converter (303). The output of the A/D converter is passed to a microprocessor (304), such as, for example, the Motorola MC68000. The baseband signal is also passed to a sync and data recovery block (305) which processes the signal to establish frame and bit synchronization with the transmitting repeater (102). The communication unit also includes a clock generator (306) which provides timing signals as appropriate to support the TDM nature of the communications. The microprocessor (304) processes the received signal and passes the audio information to a DSP coder (307), such as, for example, the Motorola DSP56000, which provides a coding/decoding function used in this embodiment to properly encode (or decode) the audio information in a particular form. (Again, additional information regarding this form of encoding and decoding can be found in a commonly owned co-pending application filed Apr. 29, 1988 and having Ser. No. 187,685.) In an alternate embodiment, the DSP (307) could also perform the functions provided by the microprocessor (304) and the sync and data recovery block (305), resulting in a reduction of hardware complexity. The coder/decoder (307) couples through a filter and coder (308) to an appropriate speaker (309) and microphone (310) to allow received audio information to be rendered audible and to allow originating audio information to be processed and transmitted. Audio information to be transmitted is passed from the DSP (307) to the microprocessor (304) where additional information appropriate to the TDM nature of the communications is added. The resulting signal, properly coded and slot and frame synchronized, is passed in a digitized form to the digital to analog converter (311). The output of the D/A converter (311) is passed through a splatter filter (312) to the RF transceiver (301) which properly processes the signal to provide a signal that may be appropriately radiated from the antenna device (302) to cause transmission of the processed signal as desired. Referring to FIG. 4, the above described system functions in an FDM/TDM operating environment. While certain limited applications could effectively use a single channel, the remaining discussion will describe the more general case wherein at least two frequencies are available for the central (101) to assign for communication purposes, and where each of the frequencies are subdivided into frames and slots. In this particular embodiment, two channels A and B are depicted, each having frames (401) of 240 milliseconds with four slots (402) per frame (each slot being 60 milliseconds). While in the preferred embodiment described, each time slot is of uniform size, non-uniform slot sizes could be used where appropriate. Each frame window supports two control slots (403 and 404). In one embodiment, both control slots (403 and 404) may be on the same frequency. For example, channel A may support a control slot in slot 1 (403) and slot 3 (404) of each of its frames (401). In another embodiment, the control slots are on different frequencies. For example, channel A could support a control slot in slot 1 and channel B could support a control slot in slot 3. In yet another embodiment, the two control slots would be distributed specifically to occur in non-adjacent slots within each TDM frame window. This configuration reduces the maximum time that a communication unit must wait to transmit or receive system control information. For instance, for the four slot system shown in FIG. 4, the maximum time that system control information is unavailable is 60 msec, whereas if the control slots were adjacent, this time would be 120 msec. Regardless of how the control slots are apportioned among the available channels, however, there will always be at least two control slots for each frame window. A control slot supports communications control information. FIG. 5 depicts the outbound signalling information (i.e., information sent by the central (101) to the communication units (104) that may be provided in a control slot for this particular embodiment. In the 60 milliseconds provided for the slot, 5.75 milliseconds are used to provide 69 symbols that represent a dotting pattern (501) (which provide a transmit-to-receive transition period) followed by 1.33 milliseconds for 16 symbols that constitute a frame sync word (502) as well understood in the art. Up to 7 outbound signalling words (OSWs) (503) can be provided, with each OSW (503) comprising 84 symbols (7 ms). Finally, 3.92 milliseconds (504) are reserved at the conclusion of the slot. The 84 symbols comprising each OSW represent 31 data bits that are error encoded up to the 84 symbol limit. The 31 data bits themselves include 16 bits for a communication unit ID, 1 bit for call type, 10 bits for frequency assignment, and 4 bits that represent the assigned slot number. For example, 1 OSW could constitute a talk/request grant to a particular communication unit by identifying that communication unit by its ID, and identifying the assigned frequency and slot. With reference to FIG. 6, inbound signalling words (ISWs) are also provided by the communication units (104 and 105) to the central (101) via the control slots. (If the channel that supports the control slot actually comprises paired frequencies (one for transmitting and one for receiving) as often occurs in trunked communications, then ISWs and OSWs can be supported in a side-by-side manner. If the channel comprises a single frequency only, then ISW and OSW service must be staggered to prevent contention.) For ISWs, the 60 milliseconds of the control slot are subdivided into 4 subslots (601). Each subslot (601) includes a 5.6 millisecond 68 symbol dotting pattern (602) (to allow any transient effects known to occur in the transition from receive-to-transmit to settle) followed by 1.33 milliseconds of 16 symbol frame sync word information (603). 6.5 milliseconds are then allocated to allow 78 symbols of ISW information. These 78 symbols include 21 data bits that are error encoded up to the 78 symbols. The 21 data bits include 16 bits for the communication unit ID and 5 bits to indicate call type request. So configured, a communication unit (104 or 105) can request frequency and slot assignments via the two slots provided in each frame (401). Further, the central (101) can assign a requesting unit an appropriate frequency and slot assignment, via the two control slots provided in each frame (401). In an alternate embodiment, the control slots, via particular ISWs and OSWs, could also be used to transfer data packets between communications units (104). Pursuant to one embodiment, when making frequency and slot assignments, the central (101) makes the assignment in a way that will assure that the assigned communication unit (104) will still be able to communicate on at least one of the control slots. For example, with respect to FIG. 4, a requesting unit could be assigned to transmit on slot 1 of channel B and to receive on slot 2 of channel A. This would allow the assigned communication unit (104) to continue to monitor control information in the control slot (404) that occupies the third time slot of channel A. In this way, important system control information, such as emergency preemption messages, can be provided with assurance to all TDM communication units (104), regardless of whether such communication units (104) are currently engaged in communications with other communication units or not. In another embodiment, the central (101) could direct control information intended for the communication unit (104) previously assigned to slots 1 and 2 to only the control slot (404) known to be monitored by the communication unit (104). In yet another embodiment, communication units (104) may be of differing types with differing constraints as to how quickly a change in mode (receiving or transmitting) or a change in frequency could be accommodated. In a typical communication system, each unit (104) can be identified by a unique ID code. The time limit described above can be associated with the unit ID in a database maintained by the central (101). Accordingly, the central (101) would assign units so as to guarantee sufficient time to switch from participating in the assigned voice communication to monitoring the available control slot. In yet another embodiment, certain communication units (104), such as portable units, can benefit from a reduced duty cycle of receiver operation by reducing the current drain on the battery within the unit. To facilitate this benefit, the central (101) would direct control information intended for some or all of such battery operated units only to a particular system control slot, allowing these units to monitor only one control slot and thus save battery power. Other important benefits are available through provision of the two control slots as well. For example, with reference to FIG. 7, it may be necessary or appropriate (for instance, due to heavy communication traffic conditions) to assign only a single time slot (701) to 2 or more communication units (104) to support their communication. This would, of course, prevent a full duplex communication from occurring. Nevertheless, in this system, even if the assigned voice time slot (701) contends with one of the control slots (702), at least the remaining control slot (703) can still be monitored by both communication units, regardless of their transmit or receive status. Therefore, if a communication unit that is in a receive mode wishes to interrupt the transmitting communication unit, the receive mode communication unit will transmit an interrupt signal via an ISW on the available control slot (703), which the central (101) then relays via an OSW in a subsequent control slot. This signal will cause the transmit mode communication unit to cease transmitting and to begin receiving in the designated slot (701) regardless of its previous talk mode status. In this way, a receive mode communication unit can effectively interrupt a received message and begin transmitting to the previously transmitting party, and thereby achieve a simulated full duplex communication capability. While this capability is attainable with a single control slot, the provision of two control slots significantly improves system flexibility by allowing assignment of the communication to any slot (402) in the frame (401). (In the above discussion, the central controller (101) is seen to determine assignment strategies based on observed traffic conditions within the communications system. The traffic conditions could be monitored in several ways, two of which will be described here for illustrative purposes. The amount of time that a communication unit (104) must wait before sufficient resources are available to assign its request is related directly to traffic load. As load increases, the average wait time experienced by communication units increases. Thus the average wait time over some appropriate time interval becomes a measure of traffic load. It is also known that traffic on many communication systems vary regularly on a daily basis. Communication systems can thus be monitored and a daily pattern of traffic load may result. Based on this observed pattern, the traffic load can be predicted based on time of day, and assignment strategies modified appropriately.) Of course, with reference to FIG. 8, if traffic conditions or other exigencies permit, 2 time slots (801 and 802) can be made available to 2 or more communication units to support their transmit and receive needs, thereby allowing full duplex communications in a half duplex RF unit (i.e., a radio that can only transmit or receive at a single moment in time). Again, as noted above, the two time slots (801 and 802) assigned to support voice activities will be assigned by the central (101) in a way designed to ensure that at least one of the control slots (in this case, the control slot occupying slot 3 of channel A (803)) will remain uncontended by the voice channel assignment. With reference to FIG. 9, an alternative way of supporting such a full duplex communication would be to assign 1 time slot for voice activity (901) on channel B and a second time slot (902) to support voice activity on channel A. Again these assignments ensure that at least one of the control slots (in this case, slot 3 of channel A (903)) remains available to all of the communication units engaged in that particular assignment. Those skilled in the art will appreciate that multiple slot assignments can be used to facilitate other desirable features, such as, but not limited to, improved audio quality communications by permitting the use of speech coding algorithms requiring a higher information rate. In another embodiment, the duration of the time slots would be altered in response to traffic conditions. For example, a standard four-slot system might increase slot duration by one-third to 80 milliseconds during light traffic periods. The resulting three-slot system would provide improved audio quality communications. When heavy traffic conditions occur, the slot duration could be reduced to restore full system capacity. With respect to FIG. 10, two of the time slots (1001 and 1002) could be assigned to support a full duplex voice communication as described above, and one or more other communication units (104) could be assigned to receive in both time slots (1001 and 1002), thereby achieving a form of conference communications where two units conduct a full duplex communication, while one or more other units monitor both sides of the communication. Further, a third slot (1003) could be assigned to one of the communication units to allow substantially simultaneous reception (or transmission) of a data message that may be displayed on an appropriate display mechanism in the radio. Alternatively, the third slot (1003) could be assigned to one of the communication units to allow substantially simultaneous reception of another voice message that could be stored in memory for future playback. Again, even while supporting these multiple features, at least one control slot (1004) remains available to all of the communications units.
{ "pile_set_name": "Pile-CC" }
The Book of Azariah The Book of Azariah is a book by the Italian author and Roman Catholic mystic Maria Valtorta. It was written in 1946 and 1947 in Viareggio, Italy, where Valtorta was bedridden for several decades. The text is based on a series of "dictations" which Valtorta attributed to her guardian angel, Azariah. In the book Valtorta does not provide a specific biblical reference to Azariah himself, but simply refers to him as her guardian angel. The name Azariah, from Hebrew, means the Lord's help. The book consists of a set of "lessons", provided by Azariah on Sundays, whose starting points are the 58 Masses of the Roman Missal of the Catholic Church prior to the reforms of the Second Vatican Council in 1965. Maria Valtorta had originally called the book Angelical Masses, with the subtitle "Directions". But the first Italian edition in 1972 used the name of her guardian angel, "Azariah". As in other works by Maria Valtorta, the themes of continuous prayer and identification with the Person of Christ and his sacrifice are emphasized throughout the work. For instance, on May 26, 1946, the fifth Sunday after Easter, the Mass Gospel was John 16, 23-30 and Azariah's comments, in part, are quoted as follows: Generosity ought to be responded to with generosity. We, spirits who see men from the height of the Heavens and follow them with divine light as our guide, view the wonderful prodigies provoked by this competition in generosity between the soul giving itself to Him who has given Himself to it and God, who gives Himself even more to reward the generous one giving himself to Him. And we can truly say, in response to the questions of many about the humanly inexplicable ascents and descents of souls, that the rise or fall is linked to and follows from the degree of generosity with which a soul adheres to the Lord. The first lesson in the Book of Azariah was written on February 24, 1946, and the last on March 16, 1947. The book was thus written in parallel to Valtorta's best known work The Poem of the Man God, where the first episode was written on December 18, 1943, and major writing ended on April 28, 1947, although a few sections near the end were written later, concluding on December 8, 1951. However, unlike the Poem of the Man God, where she wrote a good number of the last episodes first, the order of the lessons in the Book of Azariah is sequential with respect to the date on which they were written. Sources Maria Valtorta, 1972 The Book of Azariah, Maria Valtorta, 1949 The Poem of the Man God, Notes Category:Catholic spirituality Category:Angels in Christianity Category:Italian non-fiction books Category:1947 non-fiction books Category:Channelled texts
{ "pile_set_name": "Wikipedia (en)" }
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. Categories Widget (Show All) Recent Articles Morgan's pack It's been a long time in coming and there has certainly been a lot of talk about it, but now we're going to take a look at the contents of Morgan's pack as carried in Going Home. This will be a series of articles as one will not cover it all. I will go into detail about the equipment carried and why. This should be interesting as there has been a lot of talk about the contents of the pack. Additionally, I'll link to a thread on the forum where you can go and follow the discussion and comment. Before we get started though I want to say something about the pack. The pack is real, as you'll see. The pack as about to be described is not for everyone, but it is for me for the scenario described in Going Home. I am a firm believer in the old adage of the more you know the less you need, you cannot loose, misplace or break knowledge. However, I also believe that having the proper equipment to ensure your survival is equally important. Certainly you can do without, but it is usually easier to have to proper item or tool for the task at hand. Take TP for a moment, you can use leaves, Mullien leaves are one of the finest of field expedient ass wipes, but isn't it easier to carry a small roll? One of the most common things I hear about the bag is that it would be so heavy no one could carry it. I assure you that is far from the case. Is it heavy? Yes, but there are a number of variables that go into what is considered heavy. What is heavy to you or I may not be to someone else. In the book Morgan has a long walk ahead of him and he knows that he will be totally self reliant upon the pack. Sure he might find some supplies on the road, but he wasn't counting on it. This is one of the primary reasons Morgan set his daily distance goal so low, better to over achieve and gain the psychological boost it would give than to set the goal so high as to be unattainable and never be met. With that in mind let's take a look at the pack. Here is the pack all loaded up. The small bag beside the pack is the Maxpedition Devildog. This small bag was discontinued by Maxpedtion and the closest thing to it now is the Proteus. You can see the two quart GI canteen and the one quart, with cup and stove inside the cover. Inside the top flap is a 100oz water bladder. Now lets take a look at the contents of the main compartment. In the top of the pic you can see the first aid kit, more on that later, below it is the Goal Zero Guide 10 Plus kit. This is a very handy piece of kit, capable of charging AA and AAA batteries as well cell phones and other electronics. Below and to the right of the Goad Zero is a Sweetwater hand filter. I prefer this filter over some of the others because the filter elements are housed in a plastic case. This makes them very robust, an important consideration when living out of a pack. Beside that is a REI 6X9 tarp with stakes and guy lines. Next you can see the ENO bug net in its blue stuff sack. This is another great piece of gear, especially for someone living in the woods in Florida. The hammock is in the large green waterproof bag to the right. Also in the bag are two pair of pants, long sleeve shirt, socks and underwear and the hygiene kit. The next item is the Primus Multi Fuel EX stove and fuel bottle. A multi fuel stove in a situation such as Morgan faced would be huge benefit, being able to use nearly any sort of fuel you come across gives the stove a level of versatility hard to deny. Lastly there is a green bag with its contents laid out, they are: a pair of EMT sheers, a film canister of cotton impregnated with Vaseline, a GI lensatic compass, a small pair of pruning sheers, a roll of heavy wax string, 100' of 550 cord, 2 MRE spoons, roll of trip wire, U dig it trowel and small cloth. The uses for these items are endless and many are obvious, only your imagination and needs will limit what can be done with these.
{ "pile_set_name": "Pile-CC" }
I just wanted to put in writing the dramatic event that affected us, Fr. Giampaolo, Sr. Gilberte and I, the abduction carried out by the Nigerian fundamentalist Islamic sect, called Boko Haram. The kidnapping occurred at about 23.00 (11.00 pm) on the 4th April 2014 in the Catholic mission of Tchère (in the diocese of Maroua-Mokolo, in the very North of Cameroon). The event ended happily after fifty seven days, with our being freed and handed over to Cameroonian Security Forces, on the night between Saturday 31 May and Sunday 1 June, 2014. Two months have passed since our liberation, two months in which I have been able to give an account of those 57 days on various occasions, frequently together with Giampaolo, deciphering, rather than the details of what happened, the sense that we have managed to discover it to be “a treasure hidden in a field”. So it is time to write, both to get my often fragmented thoughts as I give an account into order, and also so that this treasure in the field may be shared with those who, from near or far, shared in our suffering through friendship, affection or prayer. I especially wish to recall here the special brotherly closeness of Don Maurizio and Don Leopoldo (both of them also Fidei Donum priests from Vicenza to Maroua, in the Loulou Mission) who shared our story from the first moment, accompanying us in friendship and making of themselves a point of reference for friends and our communities. From now on I will speak in the plural, because I am sure that what I write now is not simply the fruit of my thoughts and my heart, but an account that comes from the three of us, already while we were being held as prisoners. Of course some touches are my own, coloured by reference points in my own vocational story and my spiritual journey. A little hell From a physical and psychological viewpoint, the kidnapping, the time of imprisonment and the circumstances of our being freed (yes, those too!!), can be defined as a little hell, an experience that we would never wish to live through again and which we would not wish on anyone. Being taken at gunpoint; feeling helpless, always at the hands of hostile strangers; living in a contested war zone with the real danger of suffering violence; living in poor physical conditions: in the humid heat of the savannah at the start of the rainy season, with zero hygiene conditions, with shortages of water and food, with the irksome presence of insects and other animals, and sleeping on the ground. This was not only a lived experience of radical poverty, but also an experience of being subjected to violence, deprived of liberty and friendship and being forced to remain at gunpoint the whole time. Even if we must say we were not ill-treated, not tied or beaten. A little hell under two large trees in the forest of the Nigerian savannah. What helped us Moments of discomfort were certainly not lacking, but mutual support, our speaking to one another and sharing our thoughts, led us to look on what was happening with greater serenity. In certain moments fear seemed to have the upper hand, but then recalling the words of Jesus in many gospel texts that recounted similar experiences (e.g. the calming of the storm) helped us to make the Gospel real…the sunshine after the storm, the dawn after the night. Then was the time to check how much the faith believed and proclaimed (as apostles and missionaries) really had the capacity to light up our steps. We gave time each day to prayer, to fraternal sharing and to meditation on the Gospel. Then in silence, personal prayer sealed what we had shared together. The communion of saints Our faith, nourished by the communion of prayer and affection of so many, many people and communities sustained us, giving us serenity and peace. Only after our liberation did we realise that what we shared among the three of us in prison has been the “communion of Saints”, not just believed, but lived as a shining chain of communion and prayer with the Church reaching “to the ends of the Earth”. The Communion of Saints has been truly extraordinary and has allowed that the grace of God sustain and ultimately save us. For sure, we thought that there were people and communities who were praying for us, just as we never stopped praying for all those dear to us and for our communities, because we imagined the great suffering of not knowing how we were. But we could never have imagined the mobilisation of graces deployed for the three of us. So the Word of Jesus always kept us never abandoned and transformed the drama of the abduction into “a treasure hidden in a field”. Signs of light From the first moment we experienced signs of light that most might judge that it was chance, rather than the loving presence of the Lord, that brought about certain circumstances favourable to saving our lives. Here are some examples: how did it happen that on the night of the kidnapping our bare feet, were not scratched or pierced by some millet stalk or stone or thorn, while traversing in the dark the route from the Mission to the paved road where a car was waiting to take us away? We do not know. Luck? Chance? (Thank you, Lord) Upon arrival in the morning, after eleven hours of travel, at the prison camp in Nigeria, we were given some things that the kidnappers had robbed from our rooms: a small bag with my spare glasses (thank you, Lord!), pen and paper, later used by sister Gilberte to write a diary (thanks, Lord!); and finally – get it! – my bag with all the things to celebrate the Eucharist. Stunned and incredulous we thought that surely they must not have known what they were, probably taking them to be things to eat or some medicines. Thus we made use of them and for four days, there on the mat on the ground, we celebrated the Eucharist, while our guards, just 5-6 metres away were exerting themselves obsessively chanting the Koran out loud. Thank you Lord for coming with us to the forest and for breaking the Bread of your presence. Thank you Lord for “laying your mat among us”, for accompanying us in what was a long Lent, a desert of temptations and a special advent in confident waiting for liberation. However, after four days, following complaint by a young guard who had sensed that we were praying, the bag was taken away from us, with the promise that it would be given back to us at the moment of our liberation. This in fact did not happen for unforseen circumstances; so the chalice, paten, hosts and wine have remained there as a sign… like the “empty tomb”. The Eucharistic celebration was taken away from us, but in fact what was not taken from us was the Eucharistic bread of the Word of Jesus, which we shared, meditated, and contemplated each day, selecting Gospel passages, recounted from memory; the Eucharistic bread made of other moments of common prayer which we took turns to lead: the Rosary, morning and evening prayer; the Eucharistic bread made of our lived fraternity in spiritual conversation, telling our life-stories (we had the time!), along with keeping each other going in moments of greatest discomfort and in the service of caring for one another. A “different” missionary presence With prayer on our lips and the Gospel in our hearts we told ourselves that that experience, though unwanted, was turning into a great call to live, although in the extreme, a missionary presence, a missionary Church presence, (“where two or three are gathered in my name, there am I among them”) where no missionary would have come to on his own initiative. It was the last place that a missionary would have chosen, and we were there, “moved by the Spirit”. We do not know how Jesus might have met the hearts of our captors, certainly, however, he met them with our fraternal presence, our serenity and our prayer for them. These were, in this manner, an experience and an advertisement for a poor Church, stripped of all means, even of the “spoken word” (they couldn’t understand us), leave space, the whole space to the Spirit who blows where he wills, when he wills, on whom he wills, by means of the presence of a powerless Church. This awareness questioned us and among ourselves there was much discussion thinking of the missionary life in the parish of Tchere. What is the Lord saying to us? Why did so well established a Mission (this year we would have celebrated 20 years since its foundation) now unexpectedly find itself having to rethink things? While continuing to support it with a certain amount of aid, we cannot hide from ourselves the fact that it will no longer be as before. Should we nevertheless not then rethink our missionary work? Our presence, priorities, style and means? Perhaps the New Evangelization affects not only the countries of ancient Christian tradition, but also the missionary Churches on the different continents. A path of conversion The discovery of this treasure hidden in a field led us also to review our personal lives in terms of conversion. What is the Lord calling us to be and do after making us live this long Lent and this advent of liberation? A powerful word that often emerged in our conversation was: stripping. Indeed, there we experienced what ‘stripping’ means in all senses: we were impoverished, helpless, and fragile, at the mercy of men and of nature. And in those conditions we came into contact with the fatherhood of God through our own fraternity and the inspiration of the heart. Thus an awareness took root in us that the poverty of spirit of the Beatitudes can only come through a certain poverty of means, through a real stripping of securities, through helplessness. Only in this way can there also be a real and respectful sharing with the poor. In this context, for me personally, the Prayer of Abandonment of Charles de Foucauld became more concrete and intelligible and choosing the ‘last place’ a path to follow with confidence. Another strong word was: fraternity-communion We lived understanding that the Lord had given us the gift of “being together” to face the storm. We learned that what unites is stronger than that which divides; that one’s strength is the strength of all and that one’s weakness is the opportunity to draw on the power of God and the light of the Resurrection. The mercy of God comes through the mercy of a brother. The prayers of various Christian communities for us prisoners brought out forcefully the image of the body whose strongest members bend to support the weakest members. Another strong word: peace. A peace to search for, to ask for in prayer. Peace for Nigeria, for Cameroon, peace for the churches involved, peace for the various religious communities, Christians and Moslems. Prayer to open doors to the Spirit of God who by wisdom and grace can touch souls and find paths of reconciliation, of understanding and of freedom. A peace worth fighting for, rejecting all violence as a way of finding justice. Violence, while searching for one’s rights, tramples the rights of another. Arms, the manufacture and trading of arms, are not in the heart or plan of God. Holy Week 2014 will remain unforgettable. Participation in the death and resurrection of Jesus has been fully existential this year: on the night of our liberation at a certain point we had serious and palpable reasons to believe that the negotiations and accords had turned sour and that we would therefore have to return to “the tomb” in the forest, the savannah. We intensified our prayer, our abandonment, and our humility in pleading for the impossible. “All is possible for one who believes…” (Mk.9,23), Lord if then all is possible…all is possible…free us! At the moment of death, when all seems to be truly finished (“…He is already four days in the tomb” Jn.11, 39), it is at that moment that the light of the Resurrection becomes reality. On Saturday 31 May, the feast of the Visitation of our Lady, we left the prison camp for what was to be the previously announced freedom and that night we feared our not achieving it, but through the intercession of Mary the mother of Jesus and our mother, we were finally freed … on the feast of the Ascension, ”he took captives with him” (Eph. 4, 8), to our joy and the joy of those who love us.
{ "pile_set_name": "Pile-CC" }
Q: LWJGL 3 Shaders version 150 and above rendering nothing I'm using LWJGL 3 on OSX. The shaders work fine when using a version <150 but porting the code to 330 nothing renders. My shaders are as simple as possible: vertex shader: #version 330 core in vec3 position; void main(void) { gl_Position = vec4(position, 1.0); } fragment shader: #version 330 core out vec4 outColour; void main(void) { outColour = vec4(1.0, 0.0, 0.0, 1.0); } I create a simple triangle like this (Scala): val vertices = Array( 0.0f, 0.5f, 0.0f, -0.5f, -0.5f, 0.0f, 0.5f, -0.5f, 0.0f ) val vertexBuffer = BufferUtils.createFloatBuffer(vertices.length) vertexBuffer.put(vertices) vertexBuffer.flip() val buffer = GL15.glGenBuffers() GL15.glBindBuffer(GL15.GL_ARRAY_BUFFER, buffer) GL15.glBufferData(GL15.GL_ARRAY_BUFFER, vertexBuffer, GL15.GL_STATIC_DRAW) and I draw it like this: GL20.glUseProgram(shader) GL20.glEnableVertexAttribArray(0) GL15.glBindBuffer(GL15.GL_ARRAY_BUFFER, buffer) GL20.glBindAttribLocation(shader, 0, "position") GL20.glVertexAttribPointer(0, 3, GL11.GL_FLOAT, false, 0, 0) GL11.glDrawArrays(GL11.GL_TRIANGLES, 0, 9) GL20.glDisableVertexAttribArray(0) GL20.glUseProgram(0) The shaders compile fine and the program runs but I just get a blank screen! Is there anything obviously wrong with my code? A: Vertex Array Objects (VAOs) are required for rendering in a Core context. In Compatibility contexts they're optional. However, you can just generate one at startup and leave it bound if you're feeling lazy :)
{ "pile_set_name": "StackExchange" }
AutoZone Park AutoZone Park is a Minor League Baseball stadium located in downtown Memphis, Tennessee, and is home to the Memphis Redbirds of the Pacific Coast League (PCL) and Memphis 901 FC of the USL Championship. The Redbirds are the Triple-A affiliate of Major League Baseball's (MLB) St. Louis Cardinals. In 2009, the stadium was named Minor League Ballpark of the Year by Baseball America. History Designed by Looney Ricks Kiss Architects of Memphis with Kansas City-based HOK Sport, AutoZone Park cost $80.5 million to build. This is by far the most money ever spent on a structure dedicated to a minor league baseball team. AutoZone Park was built to "MLB standards", but with the absence of outfield seats or food vendors far down the foul lines, making it, for comparison purposes, a major league stadium with only the 'good' seats". It opened in 2000, replacing Tim McCarver Stadium. The stadium also hosts some games for the University of Memphis baseball team, and most notably, the annual game with Ole Miss. The Redbirds had been unique in baseball until recently, in that they were owned by a non-profit community foundation, the Memphis Redbirds Foundation; the Green Bay Packers of the NFL have a similar ownership structure. However, the Foundation defaulted on its bond payment in 2010. On November 15, 2013, the Foundation announced that the default would be remedied by the St. Louis Cardinals paying off the bonds at a discount and acquiring the Redbirds, while the city of Memphis resumes ownership of the stadium. The stadium hosted the 2003 Triple-A All-Star Game in which the International League All-Stars defeated the Pacific Coast League All-Stars, 13–9. In October 2004 and 2005 AutoZone Park was home to the Greater Mid-South Jaycees Field of Screams Haunted House. In October 2005, AutoZone Park became the first venue outside of New Orleans to host the Voodoo Music Experience. One day of this music festival was moved to Memphis due to Hurricane Katrina. On December 4, 2006, at the Major League Baseball Winter Meetings, MLB announced that an exhibition game to be called the Civil Rights Game would be held at AutoZone Park, with the first game on March 31, 2007. The game featured the Cardinals and the Cleveland Indians, with the Cardinals winning 5-1. The second game was played on March 29, 2008, between the Chicago White Sox and the New York Mets. The Mets defeated the White Sox 3-2. On August 31, 2008, the ballpark's largest crowd to date witnessed the Redbirds lose to the Oklahoma RedHawks, 10-7 in front of 18,620 fans. AutoZone Park was the site of the 2016 Triple-A National Championship Game in which the Scranton/Wilkes-Barre RailRiders, champions of the International League, defeated the PCL-champion El Paso Chihuahuas 3–1 before a crowd of 9,471 people on September 20. The stadium once again hosted the championship game on September 17, 2019, in which the PCL's Sacramento River Cats defeated the Columbus Clippers 4-0 with 9,123 on hand. Size AutoZone Park has a seating capacity of 10,000, and has been aptly described as "one-third" of a major league baseball park. For its construction of concrete were used, or enough to cover . There are of brick walls surrounding it, utilizing 380,000 specially manufactured bricks. It holds of steel and of electrical wiring. To build the playing field, of clay, and of sand were needed. The outfield contains of sod. The infield is capable of draining of rain per hour. while remaining playable, which means that the field only rarely has to be covered during games. AutoZone Park also has one of the largest video screens in minor league baseball. It is located above the play field, giving a view of the board to many areas of downtown Memphis. On January 10, 2012 the Memphis Commercial Appeal reported that the Redbirds will install a full HD video display, replacing the old video screen. The new video board will be the largest in "Minor League Baseball" . Amenities AutoZone Park contains several special seating sections designed to give patrons a variety of viewing options. The Family Leisure Picnic Pavilion is located on the east of the park, and contains several picnic tables and space for vending food. It is commonly used for special event hosting, and can seat up to 500 people. The Bluffs, located in each corner of the park has grass covered lawn seating, and tickets to this area are sold cheaply, but in limited numbers. It is a favorite spot for many fans because of the picnic atmosphere. Chairs are not allowed on the Bluff. The upper club levels contain 700 seats in 48 suites, and are generally reserved to groups or local companies. Many larger Memphis companies retain one suite for the entire season, for all games. The normal club seating have access to an air conditioned concourse, along with several restaurants and bars located on the concourse itself. In total, the ballpark has 1,600 club seats. There are two open-air party decks, each of which seats up to 175 people, and three pre-game balconies. Attendance records AutoZone Park's single-game attendance record was set on August 31, 2008, for a game between the Redbirds and the Oklahoma RedHawks in front of a sellout crowd of 18,620 people. The park's season attendance record of 887,976 and average attendance record of 12,507 were both set in 2001. Attendance records through the completion of the 2019 season are as follows. Single-game attendance Bold indicates the winner of each game. Season attendance References External links Memphis Redbirds: AutoZone Park AutoZone Park Views - Ball Parks of the Minor Leagues Category:Memphis Redbirds Category:Minor league baseball venues Category:Sports venues in Memphis, Tennessee Category:Baseball venues in Tennessee Category:Soccer venues in Tennessee Category:2000 establishments in Tennessee Category:Sports venues completed in 2000 Category:Memphis 901 FC
{ "pile_set_name": "Wikipedia (en)" }
Q: Significance of Proton Tunneling It has been repeatedly emphasized that proton transfers "involving" three or four membered ring transition states are not favorable and should not be drawn as the primary mechanism for any reaction. However, with regard to a recent discussion involving $\ce{H3CSH}$ it was noted that the rate of proton tunneling in the anionic form $\ce{H3CS-}$ was likely extremely high. Carbon-Sulfur Bond Lengths; Resonance Effects (Or Lack Thereof) So: a) Is this a valid rule of thumb: avoid intramolecular proton transfers unless the transition state has 5 or 6 members in its ring? b) What's more significant with regard to proton transfer - proton tunneling or physical proton transfer? Or is the answer an "it depends"? A: a) Is this a valid rule of thumb: avoid intramolecular proton transfers unless the transition state has 5 or 6 members in its ring? Yes b) What's more significant with regard to proton transfer - proton tunneling or physical proton transfer? Or is the answer an "it depends"? It depends, at temperatures around absolute zero, tunneling can become significant. At ambient temperatures or above, physical proton transfer is much more common. As to the methyl mercaptan anionic example you cite, to the extent that the various carbon-sulfur double bond resonance structures contribute, I would expect a lowering of the barrier around carbon anion planarization - and consequently a lowering of the barrier to inversion at the carbon atom in the anion. Therefore, it is not clear to me that tunneling of the sulfur bound proton would be preferred to carbon inversion in order to bring about the syn-anti interconversion, especially since any presumed experiments to generate the anion would not be performed near absolute zero.
{ "pile_set_name": "StackExchange" }
The away trips to Estonia and Belarus follow a month after the end of the League One season and less than three weeks before pre-season training is due to begin back at United. Whyte, perhaps expectedly, isn't keen to miss out on any international action but is understanding of his manager's concerns. "I want to play for Northern Ireland any chance I can get," he told the Belfast Telegraph. "There is nothing I can do really. The gaffer is saying what he wants to say about it because of the state I'm in. He wants to look after me and make sure I'm right for next season. "I haven't really spoken to anyone about it yet but maybe this week I can get a good chat and see where it's at." It's not the first time Robinson has come under Northern Ireland supporters' spotlights, having raised eyebrows back in October when he said he was 'gutted' he would be without Whyte during the international break. Robinson claimed that if Oxford hadn't signed Whyte, he wouldn't have become an international player. O'Neill then hit back at what he saw as 'belittling' comments. Lifting the lid about his first season in League One, however, Whyte is full of praise for both his club and international bosses. "I really, really like (Robinson)," he said. "For my first season in professional football, he's been brilliant with me. He respects that I've just moved up from playing part-time and have done as well as I have. We've had lots of chats and he just wants to do everything to help me to progress, the same as Michael O'Neill. "Having two managers like that is a massive help to me." So what of this 'chronic fatigue'? The Oxford physios are putting it down to a sharp increase in the amount of football Whyte is playing and the constant stress being placed on his body. He has already featured in an eye-watering 49 games for club and country this season and 'wasn't meant to be playing' on Monday afternoon. A grade two tear in his quad after the recent international break set him back and, after playing 90 minutes against Wimbledon the previous weekend, he was left out of the squad that beat Charlton on Saturday. "I woke up the morning after the Wimbledon game in the worst pain I've felt all season," he explained. "My hamstrings are tight and my gluts as well. "I obviously don't want to be feeling like this but the physios say that over the close-season, it's a case of strengthening my hamstrings and my quads and making sure that this doesn't happen again next season. "I feel ok today (the morning after his hat-trick heroics) but then it's really two days after that it hits so I'll maybe feel it more tomorrow. " All that still couldn't stop him netting three to haul his Oxford side to a 3-2 win at Shrewsbury, much to the delight of the travelling support. Whyte had managed hat-tricks for Crusaders against both Carrick Rangers and Glenavon, but his first one in professional football, he says, is 'special', the match ball stowed away and ready to present it to his mum who, he assures me, will frame it. "To go out and get a hat-trick was unbelievable," he said. "My first goal was actually my favourite as I hooked the ball over the keeper but scoring the other goals in front of the away end was incredible." He's hoping manager Robinson will give him the nod to play in the club's final home game of the season against Doncaster this weekend, even if it means missing out on the away game at Luton that draws a line under his first full-time campaign. Sitting behind him in central midfield will, no doubt, be former Glenavon star Mark Sykes. He has now started eight League One games since his January switch. If Whyte has taken to full-time football with apparent ease, even he concedes Sykes has surpassed all expectations. "Hopefully a senior international call-up is not too far away for Mark now," said Whyte. "When I was on the phone to him talking about him signing, I was warning him that he would have to bide his time and wouldn't come in and play every week straight away. "Central-midfield is more difficult than on the wing to make that step up but he's loving every minute of it. He plays with no fear. He looks like he's playing in the park with his mates. He plays with confidence and he offers something that our other central-midfielders don't so that's why he's starting." It's fairly safe to say, even at this early stage, that both Irish League graduates have made a good choice in terms of their first full-time club. "It was all about picking the right move and I think I've done that," agreed Sykes. "I wanted to go somewhere that I was going to get games and then maybe eventually have a chance of moving up. Right now though I'm fully focused on doing well for Oxford - I'm loving it here. "This season has been amazing. I've played far more games than I expected to at a tough level. I think I'm a better player now than I was last year as well. I've adjusted to full-time training and I'm stronger and quicker now. It's been a great year and I'm looking forward to a break now." He has plenty to be excited about once the season ends on May 4 - maybe except that strengthening work in the gym. That's because he'll be straight onto the plane home to see three-year-old daughter Lily. "I'm buzzing to see her," he said. "I've been looking forward to it for months so I can't wait now. "I try and get over as often as I can to see her. She was over here with me for a month so when she left, it was hard to get used to not seeing her wake up every day and then when I get back in from training, it's so quiet." As chance would have it, he'll also be arriving back in Belfast the day after his old club Crusaders face Ballinamallard in the Irish Cup final. "The Ballinamallard captain Richard Clarke actually text me yesterday after my hat-trick," he said. "I was buzzing for him getting to the cup final. He's one of the best players I played with at Crusaders, no doubt. I would like the Crues to win but I'd love Richard to have a great game." The end-of-season break isn't far away for Gavin. The only question is whether it's going to be interrupted by an international trip. It's all part of the management of another of the recent Irish League graduates making their way in the world of professional football.
{ "pile_set_name": "Pile-CC" }
Self-care in the community: moving away from a culture of dependency. As ever greater pressure is brought to bear by the current economic climate, one simple step may yield a very significant release of time and money. Leaders from primary care and the non-prescription medicines industry are in agreement that the time has come to break the national culture of dependency on the NHS, estimated to cost every general practice in England an average of pound250,000 annually, equivalent to an astonishing pound2 billion across primary care. It also actively denies people the confidence to take control of their own, and their families' health and therefore 'the opportunity to set up good behaviours for the longer term' according to Dr Laurence Buckman. This paper examines the role community nurses can play in helping to change this culture.
{ "pile_set_name": "PubMed Abstracts" }
# Copyright (c) 2008-2013 Michael Dvorkin and contributors. # # Fat Free CRM is freely distributable under the terms of MIT license. # See MIT-LICENSE file or http://www.opensource.org/licenses/mit-license.php #------------------------------------------------------------------------------ (($) -> window.crm ||= {} crm.init_sortables = -> $('[data-sortable]').each -> $el = $(this) checkEmpty = -> $el.children('.empty').toggle($el.sortable('toArray').length is 1) $el.sortable( forcePlaceholderSize: true connectWith: $el.data('sortable-connect-with') handle: $el.data('sortable-handle') create: checkEmpty update: -> ids = [] for dom_id in $el.sortable('toArray') ids.push dom_id.replace(/[^\d]/g, '') data = {} data[$el.attr('id')] = ids $.post($el.attr('data-sortable'), data) checkEmpty() ) $(document).ready -> crm.init_sortables() $(document).ajaxComplete -> crm.init_sortables() ) jQuery
{ "pile_set_name": "Github" }
Architecture School can be a lonely place at times despite being surrounded by your friends and colleagues. I know from personal experience that at times, it easy to question your drive, dedication, talent, or ability. Maybe you shouldn’t be in architecture school … you don’t have what it takes. You spend a million hours in design studio learning new skills and techniques – always looking for that great idea – something that will help guide you through your design problem and leave you feeling good about the end result … and it doesn’t ever come. Every now and then I get an email or a comment that makes me think I need to write a post on the subject. It used to happen far more frequently but since I’ve been at this blog thing for a while, I think I’ve hit all the typical questions in some form or fashion. Earlier this week, I had an exchange with an architecture student that was both happy and sad at the same time. This persons situation and comment weren’t entirely unique, many people have emailed me asking for advice on finding their place in the world of architecture, but for some reason, this one struck me slightly different from the others. I have inserted a screengrab of the original comment exchange below: There are few architects that haven’t had moments of insecurity, where they questioned their abilities, or even if after practicing architecture for a while, didn’t wonder if they didn’t make a wrong decision somewhere along the line. I don’t really think this experience is unique to architects but that doesn’t mean we don’t grab and hold on to it as our own. It is fairly well documented on this site that I knew I wanted to be an architect from the age of 5. When I finally made it to architecture school, I quickly realized that I wasn’t as great as I thought I was. I looked at the work the geniuses around me were creating and had a fairly sizable panic attack when it dawned on me that all I ever wanted to be was an architect and I was terrible at it. (You can read more about that moment in the post ‘ Do you want to be an Architect? The College Years‘) My father gave me a piece of advice back then that has stuck with me and I have shared many times over : “People go to college to learn how to learn …” This has turned out to be a great piece of advice – particularly when you find yourself sitting on the couch at night responding to the worried emails of young people who haven’t had enough time to find their way in life or figure out who they are … yet. I think it’s important that college architecture students hear that it’s okay that they haven’t got it all figured out. “You are still incredibly young so try not to spend too much time figuring yourself out or limiting what you think you are capable of. As a student, you spend a lot of time on the proverbial island and all you can do is look across the way at what other people are doing on their island. Real life isn’t like this so relax…” I’d like to say that despite my architectural career not following the path I planned, I’m pretty happy with where I’ve landed. If I had paid too much attention to those moments of self-doubt, who knows where I’d be. The same thing holds true for everybody – things that are the hardest become the most worthwhile. Show up, work hard, and relax … everything is probably going to be just fine.
{ "pile_set_name": "OpenWebText2" }
218 N.W.2d 164 (1974) Verdell J. SUEDEL, Plaintiff-Appellant, v. NORTH DAKOTA WORKMEN'S COMPENSATION BUREAU, Defendant-Appellee. Civ. No. 8974. Supreme Court of North Dakota. May 20, 1974. Rehearing Denied June 4, 1974. Robert A. Alphson, Grand Forks, for plaintiff-appellant. David L. Evans, Special Asst. Atty. Gen., Bismarck, for defendant-appellee. ERICKSTAD, Chief Justice. Verdell J. Suedel, now Johnson, filed an application with the North Dakota Workmen's Compensation Bureau for the payment of benefits in connection with the death of her husband, Robert A. Suedel, in which she alleged that Robert was employed at the time of the injury which caused his death by KTYN, KNOX, Grand Forks, North Dakota; that he received this injury while in the course of employment on the 16th day of November 1971; that said injury consisted of a ruptured aneurysm which resulted from "excessive pressure of work"; that this injury resulted in his death on the 25th day of November 1971. The employer, KNOX Radio, Inc., filed a report with the Workmen's Compensation Bureau in conjunction with this claim to the effect that Mr. Suedel was employed by it as an announcer; that no accident occurred on the job; that, however, Mr. Suedel complained of headaches while on the job, and that on one day they became so severe that he asked to be relieved and was taken to the hospital by one of the staff. Apparently it was on the 16th of November 1971 that Mr. Suedel was taken to the hospital, where he remained until he *165 died on the 25th of November 1971. Subsequent to a hearing on March 7, 1973, the Workmen's Compensation Bureau, on May 7, 1973, issued its findings of fact, conclusions of law, and order denying the claim. On May 24, 1973, Mrs. Johnson took an appeal from the order of the Workmen's Compensation Bureau, in which she contended that the Bureau erred in determining that the evidence failed to prove a causal relationship between the deceased's occupation and the ruptured aneurysm which resulted in his death. The district court, on August 9, 1973, affirmed the order of the Workmen's Compensation Bureau, concluding that the Bureau's findings of fact were supported by the evidence and that its conclusions of law were in accordance with the findings and were supported by law. On appeal to this court Mrs. Johnson asserts that the trial court erred in so concluding. In Haggart v. North Dakota Workmen's Compensation Bureau, 171 N. W.2d 104 (N.D.1969), we determined the scope of review in cases such as this. In Syllabus ¶ 2 we said: "The trial de novo in the district court on the record made before an administrative agency and in the Supreme Court on an appeal from the district court in an administrative agency proceeding, as it relates to a determination of the facts, is limited to determining whether there is substantial evidence to support the administrative agency's findings of fact." Haggart v. North Dakota Workmen's Compensation Bureau, supra, 171 N.W. 2d 104 at 105. See also Ambroson v. North Dakota Workmen's Compensation Bureau, 210 N.W.2d 85 (N.D.1973), Syllabus ¶ 2. Because of the importance of the findings and conclusions of the Bureau, we set them forth at this time. "FINDINGS OF FACT "I. "That the deceased began experiencing severe headaches in July or August, 1971, and was hospitalized on November 16, 1971. "II. "That the deceased expired on November 25, 1971, and the cause of death was diagnosed as: `Massive subarchnoid hemorrhage with intracerebral hematoma, right, secondary to ruptured aneurysm anomalous, right posterior communicating artery.' "III. "That evidence adduced indicates that a condition such as that experienced by the deceased could be the result of weakness in the vessel finally getting to the point of rupture. "IV. "That leaking aneurysms do not heal but get progressively worse. "V. "That the aneurysm could have been leaking for some time and could have been the cause of deceased's headaches starting in July. "VI. "That the pain from the headaches would tend to cause stress which could raise blood pressure which in turn could cause the eventual fatal rupture. "VII. "That the deceased normally worked a 10 hour day with one 18 hour day being *166 worked on October 14, 1971, at the deceased's own request. "VIII. "That the deceased carried out his normal occupational duties during the time immediately prior to his hospitalization, and testimony indicates that the deceased enjoyed his work, was a better than average employee, and was to be promoted just prior to his death. "IX. "That enjoyable or pleasant experiences do not cause stress. "X. "That the testimony of Doctors Wallace, a psychologist, and Olmstead, an internist, was based on a hypothetical question and their knowledge of medical reports on file in this case, and not on any personal knowledge of the deceased's previous physical health nor his psychological state. "XI. "That the aneurysm itself was an underlying condition and it could have ruptured under any number of circumstances. "Based upon the above Findings of Fact, the Commissioners of the North Dakota Workmen's Compensation Bureau make the following: "CONCLUSIONS OF LAW "I. "That the evidence submitted to the Bureau fails to establish and prove a causal relationship between the deceased's ruptured aneurysm and subsequent death and his occupation. "II. "That the claimant has failed to prove that she is entitled to benefits under the North Dakota Workmen's Compensation Act as the result of the death of Robert A. Suedel on November 25, 1971." To determine whether there is substantial evidence to support the findings, we shall review the evidence submitted to the Bureau. Mrs. Verdell Johnson, formerly Verdell Suedel, hereinafter referred to as Mrs. Suedel, testified that she and Robert Suedel were married on October 29, 1966, at Petersburg, North Dakota; that prior to Mr. Suedel's employment with KNOX the Suedels lived in Minneapolis; that they moved to her father's farm in May of 1971; that Mr. Suedel's health was fine in March and April of 1971; that prior to their marriage Mr. Suedel had been involved in an automobile accident and that two or three days before they were married he had been hospitalized in "St. Mike's" Hospital; that prior to their marriage Mr. Suedel had surgery on his back; that in May and June of 1971 his health was fine; that while living with her parents at Petersburg Mr. Suedel commuted daily to Grand Forks in connection with his employment as a radio announcer for KNOX and its predecessor; that he commenced work with the radio station on the 1st of June 1971; that he worked extra hours on many days and worked all weekends; that in August she noticed that Mr. Suedel was slowly getting more rundown from working so many hours and driving back and forth; that sometime in September or October the station switched over to tapes and that this required a lot of extra work on Mr. Suedel's part in learning the new process; that in order to be at work on time he had to get up at 5:30 in the morning; that he drove 60-some miles each way; that two weeks before he became sick necessitating his hospitalization he had a terrific headache on his day off, and that on that occasion his headache was so bad *167 that he couldn't see to drive an automobile; that Mr. Suedel said the work was really hectic; that towards the last when the station acquired the new computer for tapes, Mr. Suedel was always checking and rechecking to make sure it was right; that he became forgetful; that upon arriving home after a twelve-hour day he was exhausted; that he didn't complain about being in radio, because it was his lifetime dream; that he did say that the hours were long; that he would say that maybe after a good night's sleep things would be better; that towards the last he was more nervous than usual, although he didn't seem like the nervous type; that towards the last he was a completely different man. Mr. Robert Hanson, the vice president, auditor, and accountant for KNOX, testified that he was not associated with Mr. Suedel or the company which employed Mr. Suedel until KNOX purchased the business on September 9, 1971; that the company from which KNOX purchased the station was Valley Broadcasting Company; that KNOX bought the assets of the corporation, not the corporation itself; that Mr. Suedel worked 262 hours during the month of October 1971; that Mr. Suedel was paid overtime after forty hours per week; that Mr. Suedel worked 128¾ hours for KNOX from November 1 through November 16, 1971; that Mr. Suedel worked 187 hours from September 9 through September 30 for KNOX; that during the time that Mr. Suedel was employed with KNOX the company had no program director, but that Mr. Lockhart managed that part of the station and was Mr. Suedel's supervisor. In response to an inquiry as to what were Mr. Suedel's average work hours per day, Mr. Hanson testified: "A Any one day? Well, it appears that generally his work schedule was ten hours a day. Now, there were some days—for instance, the September one, one day was a twelve-hour day and three days were six-hour days and one day was a nine-hour day, and in October there was a twelve, a nine and three-quarters and then five ten-hour days, a five-hour day, three more ten-hour days, a six-hour day and an eighteen-hour day, that being the largest one of all the time, and I understand at that time he was asked by one of the other employees to cover for him, which he did. It wasn't at our insistence or anything. "Q So in other words, he worked two shifts; his own and someone else's? "A Yes. Then on October 31st, the period ending that date, there is a five-hour day, five ten-hour days, a seven-hour day, four ten-hour days and two seven-hour days, and the last period in November, with the exception of the Saturday shift, they were all ten-hour days. "Q What was the Saturday? "A A seven and—seven and three-fourths." Dr. John Wallace of Grand Forks, North Dakota, whose formal education includes a bachelor's degree from the University of North Dakota, a master's degree from the New School for Social Research, and a doctor's degree in psychology from the University of Vienna, Austria, testified in response to a hypothetical question. The hypothetical question and other questions and the answers of the doctor follow: "Assume that Robert Suedel, age 36, was employed in the radio broadcasting work and that prior to his employment he had a history of good health without any significant complaints; that during the month of October 1971 he put in 262 hours working time for his employer in the broadcasting field; and that in November of 1971 from a period of November 1st to November 16th, at the time when he entered the hospital on November 16th, he had put in 128 hours; *168 "Assume further that during this time he showed signs of exhaustion, he showed signs of fatigue through falling asleep while waiting for supper, complaints of stress and irritation and that of being tense; and assume further that he was hospitalized from the period of November 16, 1971 until the date of his death, November 25, 1971; and assume further that he had at this time prior to his death a cerebral aneurism; and assume further that this cerebral aneurism hemorrhaged and the findings on autopsy were a massive subarachnoid hemorrhage with intracerebral hematoma on the right side and a ruptured anomalous aneurism of the right posterior communicating artery. "Now, based upon those assumed facts, can you give an opinion, based on reasonable probability, whether the conditions that were recited in the hypothetical question relating to his work and hours of work and the effect upon the individual from his hours of work, whether or not those conditions could cause, precipitate or contribute to the rupture of the aneurism? "A Yes. "Q And what is your opinion? "A My opinion is that from the studies I have made and some of the sources I have consulted, that it is highly likely that these pre-existing psychological conditions precipitated stress which eventually led to the rupturing of the blood vessels in the brain. [Emphasis added.] "Q Now, can you give this Commissioner the basis, as you did in your letter, the basis upon which you would form such an opinion? "A The basis was this: That assuming the history of long hours of work and assuming that this led to exhaustion, furthermore taking into account the coroner's report which stated in part, `Massive subarachnoid hemorrhage with cerebral hematoma secondary to ruptured anomalous aneurism of the right posterior communicating artery,' that taking these into account, plus the references I looked up in the text by Weiss and English on psychosomatic medicine, that there is a line of reasoning here which is reasonable and leads one to the professional conclusion that it is quite likely that these pre-existing conditions can lead to physical damage, which then eventually leads to death. "Q Now what were the reasonings that your authorities set forth as to forming such a conclusion or basis? "A Well, according to their research and experience—I am referring in my letter here particularly to points 3 and 4 that when you consider that stress arising from frustration and conflict-ridden situations leads to restriction and pulling of the arteries at the base of the brain and the main branches, and, point number 4, to the detention and dilation of the intercranial arteries, that these workings within the brain can then lead to the mechanical failure of the arterial system itself, and this mechanical failure statistically is correlated with death in approximately twenty-five percent of the cases which Weiss and English have through their studies predicted. [Emphasis added.] "Q Would your opinion in this case be based on reasonable probabilities? "A It is my opinion, yes, that it is based on reasonable probabilities. Twenty-five per cent is a very high level of agreement. "Q What do you mean? What does the twenty-five per cent represent? "A The total number of deaths which, so far as I understand it, of course, that Weiss and English are referring to from their samples of people whose deaths have been investigated, that the precipitating or pre-existing stress on the emotional basis played a significant role in the outcome. *169 "Q That emotional stress played a significant role in causing or precipitating their death? "A Yes." Cross-examination of Dr. Wallace disclosed that he had not known or examined Mr. Suedel during his lifetime and that his opinion was based on a report from pathologists, Dr. W. A. Wasdahl and Dr. R. Hejela, and a letter from Mr. Alphson, counsel for Mrs. Suedel, which outlined the history of the pre-existing working conditions. The pertinent paragraph of Mr. Alphson's letter reads: "I have enclosed a copy of the autopsy report which shows that he died from a ruptured aneurism. The history shows that he was a radio station announcer and that he had been working all summer long under difficult situations, lack of help, working from 7:00 A.M. to 1:00 in the morning, that he would be totally exhausted when he came home and was very nervous and restless because of his overwork and the upset conditions at the station, according to the history from his wife." [Emphasis added.] Although Dr. Wallace testified that everything that makes people unhappy causes stress, he said that that would be an oversimplified view of what causes stress, and that stress is a condition which exists in the body itself. In response to an inquiry as to whether pleasant occurrences could be considered to cause stress, he replied in the negative. Dr. Edwin Guy Olmstead, an Associate Professor of Medicine at the University of North Dakota and the Associate Director of the Mental Health Center in Grand Forks, testified that in addition to the usual medical training and degrees he had received slightly over two years of training in psychiatry at Battle Creek, Michigan. In response to the same hypothetical question asked of Dr. Wallace, and an additional question phrased by counsel for claimant in this case, Dr. Olmstead gave his view. "Now, based upon those assumed facts, will you give us an opinion which would enable you to state with reasonable medical probability whether or not those conditions that I have outlined, such as fatigue, exhaustion, long work hours, strain and stress, could cause or precipitate the rupture of a pre-existing cerebral aneurism? "A Yes; I believe they could. [Emphasis added.] "Q And would you give us your medical opinion supporting the basis for your opinion? "A Well, an aneurism of an artery is an outpocketing of the artery and it doesn't always have muscle coats, it is thin, and there are some good physical principles as to why it tends to get bigger and bigger as time goes on, but in many instances when it ruptures, it ruptures because there has been some increase in the blood pressure; it doesn't have to be very much, and things you have outlined such as stress, overwork, fatigue, are things that will cause the blood pressure to fluctuate, and if the circumstances are right, the elevation of the blood pressure will rupture the aneurism, and that would be my feeling as to why it is possible that this was the case, the basis of which you have told me. "Q And is your opinion, Doctor, based upon reasonable medical probability? "A Yes; it is based in part on experience. This is not a rare disease. It is the commonest cause of death in people under thirty-five. "Q Would you explain what is meant by a pre-existing aneurism? "A Two per cent of all post mortems that are done, regardless of what the *170 cause of death is, if a pathologist is careful, two out of every hundred will have at least one aneurism in this part of the brain. That doesn't mean that they all blow up, so two out of every hundred people carry this around. "Q Would you explain in some detail what an aneurism is and just exactly how it is formed. "A Well, an aneurism such as we are talking about here in the part of the brain called the Circle of Willis, which is the arterial supply of the brain, these aneurisms are congenital, one is born with them, and an aneurism is part of the blood vessel that doesn't have all the coats on, it outpockets, it pouches out like a balloon. It is thin and under certain types of stress, it breaks. "Q Now, when they refer to what is called intracerebral hematoma, what is that in connection with his ruptured aneurism? "A Well, when the aneurism ruptured, the blood spread out over the subarachnoid space, but also some of it penetrated into the brain substance proper because there was arterial bleeding under a fairly good head of pressure. Hematoma is really a collection of blood that escaped from the artery and compressed in the brain and it can be thought of somewhat in terms of a tumor because sometimes these are evacuated surgically." He testified in response to cross-examination that oftentimes before the final rupture the aneurysm will leak blood into the subarachnoid space and that this produces a headache. Dr. Olmstead said that prior to testifying he had reviewed the autopsy, which included a clinical summary prepared by Dr. John Lambie. The pertinent parts of that letter read: "Robert Suedel was hospitalized by me at St. Michael's Hospital from November 16th to November 25th, 1971. The patient was a thirty-six-year-old male who was admitted following onset of severe postoccipital and cervical headache while at work the morning of admission. "He was admitted for evaluation of his headaches and subsequently expired on November 25, 1971. "Patient was seen and treated by Dr. Suresh Ramnath, Neurosurgeon, during this period of time and it was felt that his headache at that time was due to a ruptured berry aneurism. "Before all studies could be completed patient suffered another hemorrhage and expired. An autopsy was performed and this showed massive subarachnoid hemorrhage with intracerebral hematoma on the right side. This was secondary to a ruptured anomalous aneurism of the right posterior communicating artery." In defining stress and its effect upon the human body, Dr. Olmstead said: "* * * I use the term `stress' in terms of either psychological or physical stress which works through what we call the sympathetic nervous system and causes an output of a hormone called adrenalin which raises the blood pressure." In response to a question as to whether the doctor thought that enjoyment of a job would reduce the stress level, he replied: "I think it would reduce the stress level if he enjoyed it; on the other hand, if he did it too long I suppose you would get yourself overly fatigued." Mr. Wayne A. "Bob" Lockhart, the operations manager for KNOX and station manager for KYTN-FM, employed Mr. Suedel and apparently supervised him during the entire period of Mr. Suedel's employment for KNOX and its predecessor. He testified that Mr. Suedel was a perfect employee; that in his opinion there isn't much to operating the equipment of a radio station; that the new equipment went *171 on the air on October 17, 1971, and that it switches back and forth automatically, but that while Mr. Suedel worked for the station, when the commercial breaks came, he had to manually turn on another recorder; that this, in effect, made it easier for Mr. Suedel, because he was in control of the machine, whereas now under the automatic feature the machine is in control. Mr. Lockhart further testified that there isn't much to operating the equipment; that he was concerned that Mr. Suedel might become bored with the work and for that reason he encouraged him to interview the news director so that he might become a newsman; that the hours of time recorded in the ledger for Mr. Suedel did not include his driving time; that Mr. Suedel received a monthly allowance at one of the gas stations in town, whereby he received gas and oil and repair work for his automobile in conjunction with driving to and from work; that Mr. Suedel informed him that it was tough on him to drive in every day from the farm and that Mr. Lockhart tried through his father-in-law to find a place in Grand Forks for Mr. Suedel and his family to live. In light of this record, can we say that the Bureau's findings are not supported by the evidence? Without attempting to characterize the medical opinions of Doctors Wallace and Olmstead, but assuming for the sake of argument that their opinions were to the effect that Mr. Suedel died as a result of a ruptured aneurysm, which rupture was caused by the stress of his work as a radio announcer, we believe that there is sufficient evidence in the record to support the Bureau's finding that the rupture of the aneurysm was not caused by the stress of his work, but was the result of an ordinary disease of life to which the general public is exposed. In light of the fact that Mr. Suedel's wife and his supervisor, Mr. Lockhart, both testified that he was doing what he always wanted to do and seemingly enjoyed the work, it is just as probable or even perhaps more probable that if stress caused the rupture of his aneurysm, the stress was due to the driving to and from work rather than to his work on the job, or to the normal activities of life, as indicated by the fact that he had one of his most severe headaches on an occasion of a day off from work. We think in fairness we should state that had the Workmen's Compensation Bureau concluded to the contrary and found that the stress of the employment caused the rupture of the aneurysm the evidence could have supported such a finding also. In other words, as we have said on other occasions, it is not our function to try the facts in the first instance; it is merely our function to review the facts to determine whether or not the findings are supported by the facts. In support of the Bureau's findings, we think it should be pointed out that the hypothetical question assumes a fact which is not supported by the facts, and that is that Suedel worked from 7 a.m. to 1 a.m. regularly. It may be that he did this on the occasion when he worked two consecutive shifts, but not otherwise. This brings us to the language of Section 65-01-02(8), N.D.C.C., which we believe is pertinent. "65-01-02. Definitions.—Whenever used in this title: * * * * * * "8. `Injury' shall mean only an injury arising in the course of employment including an injury caused by the willful act of a third person directed against an employee because of his employment, but such term shall not include an injury caused by the employee's willful intention to injure himself or to injure another, nor any injury received because of the use of narcotics or intoxicants while *172 in the course of the employment. Such term, in addition to an injury by accident, shall include: "A. Any disease which can be fairly traceable to the employment. Compensation shall not be paid, however, for any condition which existed prior to the happening of a compensable injury nor for any disability chargeable to such condition. Ordinary diseases of life to which the general public outside of the employment is exposed shall not be compensable except where the disease follows as an incident to, and in its inception is caused by a hazard to which an employee is subjected to in the course of his employment. The disease must be incidental to the character of the business and not independent of the relation of employer and employee. The disease includes impairment and effects from radiation fairly traceable to the employment. It need not have been foreseen or expected, but after it is contracted, it must appear to have had its origin in a risk connected with the employment and to have flowed from that source as a rational consequence; * * *" N.D.C.C. In essence, what the Workmen's Compensation Bureau found was that Mr. Suedel died of an ordinary disease of life, to which the general public outside of employment is exposed, and that neither the rupture nor the aneurysm was incident to or had its inception with his employment. Before we conclude our opinion, however, we think it proper to discuss herein some of the authorities relied upon by Mrs. Suedel. Perhaps her most significant reference is to Larson, The Law of Workmen's Compensation. In that work, Larson discusses injuries from usual exertion or exposure. He divides that subject into three categories: Section 38.20 Category 1: Routine Exertion Causing "Breakage"; Section 38.30 Category 2: Routine Exertion Causing Injury From "Generalized Conditions"; and Section 38.40 Category 3: Routine Exposure Causing Freezing or Sunstroke. In conjunction with Category 1, we read: "A large majority of jurisdictions now hold that when usual exertion leads to something actually breaking, herniating, or letting go, with an obvious sudden mechanical or structural change in the body, the injury is accidental. "So we find an overwhelming majority compensating for hernia, even when the exertion was not out of line with the usual demands of the job. Two states, Missouri and North Carolina, continue to insist upon abnormal exertion in hernia cases. Michigan and Pennsylvania, which at one time required unusual exertion in hernia claims, have produced awards in other types of cases which indicate that they would now follow the majority rule as to hernias. Ohio, which also looked for overexertion in hernia cases, has since altered its general statutory formula, and no longer requires evidence of unusual exertion. Nebraska has also amended its statute in a way that has been construed to eliminate the unusual exertion requirement in this general class of cases. "Similarly, since a so-called `slipped intervertebral disc' is a herniation or rupture, and thus mechanically comparable to an inguinal hernia, it is not surprising to find that a heavy preponderance of jurisdictions afford compensation for this type of injury without exacting proof of unusual exertion or mishap as a cause. Indiana and Maryland, and apparently Missouri, hold contra. North Carolina, here as in the inguinal hernia cases, has produced decisions pointing both ways, with the more recent holdings in each instance rejecting compensability. *173 "An overwhelming majority of jurisdictions also find adequate accidental quality in the element of `breakage' present in such injuries as cerebral hemorrhage, ruptured aneurysm, ruptured aorta, broken blood vessel, apoplexy, aortic regurgitation, hemorrhage in eye, and pulmonary hemorrhage." 1A Larson's Workmen's Compensation Law § 38.20, pp. 7-11 through 7-23. Although we have not reviewed all of the cases referred to in the footnotes to this section, we believe what is said about Nebraska is illustrative of what is taking place in this nation and indicates that there is a trend toward allowing recovery without proof of unusual exertion. An example may be found in the following quotation from Larson: "Nebraska: Brokaw v. Robinson, 183 Neb. 760, 164 N.W.2d 461 (1969). Claimant suffered a cerebral vascular accident after performing strenuous work. His first symptoms occurred on the job, when he felt dizzy and his right arm and leg felt numb. By the next day he could not stand up or talk very well. The court held that the amendments to § 48-151(2), R.R.S. 1943, which were enacted in 1963, eliminated the requirement of unusual exertion, and the unexpected event which occurred here, happening suddenly and violently and producing objective symptoms at the time of injury constituted an accident. * * * "The new statutory language reads as follows: "`The word accident as used in this act shall, unless a different meaning is clearly indicated by the context, be construed to mean an unexpected or unforeseen injury happening suddenly or violently, with or without human fault, and producing at the same time objective symptoms of an injury.' Neb.R.R.S.1943, Section 48-151(2), as amended by Laws 1963, c. 287, § 1, p. 862. "As examples of pre-amendment holdings, see the following: "Roccaforte v. State Furniture Co., 142 Neb. 768, 7 N.W.2d 656 (1943). Embolism in retinal artery due to lifting bench; usual-exertion test definitely rejected. [Claim denied.] "Gilkeson v. Northern Gas Engineering Co., 127 Neb. 124, 254 N.W. 714 (1934). Mitral regurgitation of heart due to pushing automobile to prevent its rolling over a bank." [Claim denied.] 1A Larson's Workmen's Compensation Law § 38.20, p. 7-28. Further in support of her position, Mrs. Suedel refers us to a 1957 decision of the supreme court of Michigan, which she describes as a case representing the modern day thinking of courts. Sheppard v. Michigan National Bank, 348 Mich. 577, 83 N. W.2d 614 (1957). In that case, Justice Black, who was one of the justices who concurred, in separate opinion, in the opinion written by Justice Smith, indicated that the case was one arising out of a strain. A brief quotation from his opinion, quoting from the record, follows: "`* * * the plaintiff leaned over to pick up a tray of cards from a tub file. The tray stuck, and then the plaintiff yanked on it, and when she yanked, the "pains flew all over" her back.' * * *" Sheppard v. Michigan National Bank, supra, 83 N.W.2d 614 at 627. Much of the discussion in the separate opinions written by Justices Smith, Black, Edwards, Dethmers, and Kelly, affirming the award, centered around the significance of 1943 amendments to the Michigan workmen's compensation law, wherein most references to the word "accidental" were removed from the law. In summary, the majority opinions seem to hold that thereafter Workmen's Compensation claims should not be found to be *174 non-compensable merely because they were non-accidental. There is one statement in Sheppard which is pertinent to the instant case, and that is contained in Justice Smith's opinion: "The determination of causation rests with the commission. We are not a super-compensation commission any more than we are a super-racing commission. Hazel Park Racing Ass'n, Inc. v. Racing Commissioner, 343 Mich. 1, dissent, 10, 71 N.W.2d 692. We urge our return to our exercise of an appellate function." Sheppard v. Michigan National Bank, supra, 83 N.W.2d 614 at 621. In North Dakota, as in Michigan, our function as an appellate court is not to determine the facts in the first instance, but merely to review the findings of the Bureau in light of the evidence submitted to the Bureau, to determine whether there is substantial evidence to support the findings of the Bureau. The trial court in reviewing the findings of the Bureau on appeal to it relied in part on Sandlie v. Workmen's Compensation Bureau, 70 N.D. 449, 295 N.W. 497 (1941). In Sandlie a claim was filed with the Bureau by an auditor employed by the North Dakota Mill and Elevator Association, wherein the auditor asserted that in the course of his employment he suffered a stroke of paralysis which totally disabled and incapacitated him. He asserted that in auditing and checking inventories of flour it was necessary for him to do heavy lifting and moving of heavy sacks of flour and that this heavy lifting caused overexertion, producing a rupture of a blood vessel, resulting in a stroke. The claim was denied by the Bureau, but upon appeal to the trial court the plaintiff's claim was allowed. In Sandlie the plaintiff had suffered from high blood pressure, or hypertension, for over ten years. In reversing the trial court and in affirming the Workmen's Compensation Bureau, the court said: "While it appears to be the generally accepted rule that the acceleration of a pre-existing condition may be considered in certain cases to be the proximate cause of the injury sustained, we can not overlook the fact that every exertion has its effect upon the physical system; and if we carry the theory to extremes, then every movement in the course of employment would accelerate the natural condition of the physical body toward disease and decay and death. There must be more than this to justify a holding that the exertion or emotional disturbance was the proximate cause in this case. "We have examined the evidence carefully and have considered it in the light of the medical testimony. We are clear that the stroke was not the result of the employment, but rather of the condition which existed prior to the employment, and was not aggravated by the employment so as to cause additional injury." Sandlie v. North Dakota Workmen's Compensation Bureau, supra, 295 N.W. 497 at 499, 500, rehearing denied 1941. [Emphasis added.] In essence, in this emphasized material this court was saying that there must be proof of unusual exertion for a claimant to recover for aggravation of a pre-existing condition such as this. The evidence in Sandlie was to the effect that the plaintiff in connection with his work was required to lift sacks of flour of various weights from 24 pounds to 98 pounds, and that in many instances he was required to raise these sacks above his head in order to pile them; that on the date he received the stroke he had engaged in an altercation with a representative of the mill and elevator of Duluth, Minnesota, in connection with the conduct of business; that this altercation caused him to become unduly excited and resulted in a stroke. *175 In light of those circumstances, which under the decisions of some States would seem to justify an award, both the Bureau and the supreme court of this State concluded that the claimant was not entitled to recover. See also McKinnon v. North Dakota Workmen's Compensation Bureau, 71 N.D. 228, 299 N.W. 856 (1941); Pace v. North Dakota Workmen's Compensation Bureau, 51 N.D. 815, 201 N.W. 348 (1924). Since the Bureau found that the rupture in the instant case was an aggravation of the pre-existing aneurysm and was not brought on by the stress of the employment, usual or unusual, and we have concluded that those findings are supported by the evidence, we leave for another day the determination of the survival of the unusual-exertion test. For the reasons stated in this opinion, the judgment of the trial court is affirmed. KNUDSON, PAULSON and TEIGEN, JJ., concur. VOGEL, Judge (dissenting). I regret that I must dissent. I simply do not find any substantial evidence to support the decision, and I believe, therefore, that the law requires a reversal. I would add a little to the facts stated. The distance from Petersburg, where the decedent and his wife lived, to Grand Forks is about 45 miles, so the decedent drove about 90 miles a day to and from work. The two hours or so consumed by the driving were in addition to the long hours worked, as set out in the majority opinion. The only medical evidence was offered by the claimant. The Bureau offered nothing, except by cross-examination. Both of the expert witnesses were highly qualified, one in psychology and the other in psychosomatic medicine. Both of them testified on the basis of hypothetical questions to which no objection was made. The questions were based entirely upon facts testified to by the widow of the decedent, time records of the employer, and the autopsy records and medical records received without objection. Dr. Wallace, the psychologist, testified that in his opinion, based upon reasonable probability, "it is highly likely that these preexisting psychological conditions precipitated stress which eventually led to the rupturing of the blood vessels in the brain," and, "The basis was this: That assuming the history of long hours of work and assuming that this led to exhaustion, furthermore taking into account the coroner's report which stated in part, `Massive subarachnoid hemorrhage with cerebral hemotoma secondary to ruptured anomalous aneurism of the right posterior communicating artery,' that taking these into account, plus the references I looked up in the text by Weiss and English on psychosomatic medicine, that there is a line of reasoning here which is reasonable and leads one to the professional conclusion that it is quite likely that these pre-existing conditions can lead to physical damage, which then eventually leads to death." Incidentally, the letter from claimant's counsel containing the inaccurate statement as to the decedent's working hours (italicized in the majority opinion) was not referred to in the hypothetical question to Dr. Wallace, nor in his answer. The letter was later brought up in cross-examination by the attorney for the Bureau after queries about the documents which had been furnished to Dr. Wallace. Dr. Olmstead testified that, based upon a reasonable medical probability, a rise in blood pressure can be caused by stress, overwork, or fatigue and can rupture a pre-existing aneurysm such as the decedent had. We have always held that aggravation or acceleration of a pre-existing condition may be an injury compensable under the *176 Workmen's Compensation Act. Pfeiffer v. North Dakota Workmen's Compensation Bureau, 57 N.D. 326, 221 N.W. 894 (1928); Pace v. North Dakota Workmen's Compensation Bureau, 51 N.D. 815, 201 N.W. 348 (1924). In Pfeiffer, the injury was due to a slight blow which, because of a pre-existing tumor, resulted in plaintiff's blindness, and in Pace, the pre-existing condition was high blood pressure and arteriosclerosis which made decedent more vulnerable to "brain hemorrhage, otherwise known as apoplexy," from which he died after working in excessive heat. The latter case is particularly pertinent to the present case, where the pre-existing condition was an aneurysm, which burst after decedent worked long hours over an extended period, and likewise caused death by a hemorrhage in the brain. Other jurisdictions have allowed awards in cases where long hours contributed to the injury or death. In J. D. Jewell, Inc. v. Peck, 116 Ga.App. 405, 157 S.E.2d 806 (1967), the decedent was overweight and hypertensive and suffered a fatal heart attack partly because of the long hours he worked. The claimant was allowed compensation. And see Bingham v. Workmen's Compensation Appeals Board, 261 Cal.App.2d 842, 68 Cal.Rptr. 410 (1968) [finding for Bureau set aside and action remanded because of error in application of law], and Georgia-Pacific Corp. v. Craig, 243 Ark. 538, 420 S.W.2d 854 (1967). In the case before us, the only basis for the Bureau's decision that the death was not compensable is that there was testimony that the decedent enjoyed his work, from which the Bureau drew the inference that he was under no strain, and therefore the death could not have been caused by strain or overwork. This is not only an "awfully over-simplified" view, as Dr. Wallace described it; it is also illogical and unreasonable. To illustrate, I would suppose that a professional football player or an astronaut enjoys his work, but no one can say that he is not under stress, either in the common sense of the term or the medical sense. But if either the football player or the astronaut should drop dead from a burst aneurysm during employment, surely no one could successfully contend that the right to claim compensation for his death would be lost solely because of the fact that he enjoyed his work. Similarly, I know that busy trial lawyers or businessmen can enjoy their work and still have strokes precipitated by the stress of their work, but surely no one could claim that the Workmen's Compensation Bureau would not be compelled to provide coverage for the hospitalization for treatment of the resulting strokes. Nor do I read Sandlie v. North Dakota Workmen's Compensation Bureau, 70 N.D. 449, 295 N.W. 497 (1941), or any other of our cases, as having adopted the "unusual-exertion test" in this State. Sandlie states that the general rule is that acceleration of a pre-existing condition may be considered to be the proximate cause, but observes that this rule should not be carried to ridiculous extremes, and holds that the claimant did not sustain the burden of proof. As I read the decision, it does not adopt the "unusual-exertion test." We should not do so now, or even "leave for another day the determination of the survival of the unusual-exertion test." A rule that never lived cannot "survive." To adopt such a rule would be, I believe, a move backward and against the modern trend and contrary to the rule in the "overwhelming majority of jurisdictions." See quotations from Larson, Workmen's Compensation Law, Section 38.20, in majority opinion. As the majority opinion points out, a large majority of the States (even including those which otherwise follow the unusual-exertion test) hold that where "usual exertion" leads to a rupture or breaking or herniating, as of an aneurysm, a recovery is allowed. It also points out that the trend is for more States to join this large majority. Why, then, should we go in the opposite direction? The majority opinion seems to be based on the belief that we are bound by language of the Sandlie case and *177 by a duty to sustain the Workmen's Compensation Bureau where there is a factual basis for its findings. But I believe that the majority misreads the Sandlie case, which really holds only that the claimant did not sustain her burden of proof, and I would hold that there is no factual basis for the decision of the Bureau in the present case. As I see it, this case offers an interesting contrast with Foss v. North Dakota Workmen's Compensation Bureau, 214 N. W.2d 519 (N.D.1974), which we decided only a short time ago. In Foss, the plaintiff simply failed to present proof of a causal connection between the employment and the death occurring in the course of employment. We held there that "a compensation award cannot be made on surmise, conjecture, or mere guess" when the medical proof is adverse to the claimant. In the same way, we should hold here that an award cannot be denied on the basis of surmise, conjecture, or mere guess when all the medical evidence is favorable to the claimant. I would reverse the judgment of the lower court, on the ground that there is no substantial evidence to support it.
{ "pile_set_name": "FreeLaw" }
Study of innervation, sensory neuropeptides, and serotonin in murine contact allergic skin. Density of nerve fibers, axonal growth, calcitonin gene-related peptide (CGRP), and substance P, and serotonin immunoreactivity as well as concentration were all determined in a murine model of contact allergy. Female Balb/c mice were sensitized on the back with oxazolone and 6 days later challenged with the same antigen on the dorsal surface of the ears, while control mice received the vehicle only. Then, 24 hr postchallenge, one ear was processed for immunohistochemical staining, while the other was frozen and processed for gas chromatography-mass spectrometry or radioimmunoassay (RIA). Protein gene product 9.5 (PGP 9.5) positive nerve fibers showed a tendency to increase in inflamed ears versus control ears in epidermis as well as the dermis. Growth-associated protein-43 (GAP-43) positive fibers in the epidermis were increased (p < .01) in inflamed ears, compared with control ears, as was the case for the dermal fibers, indicating increased axonal growth. Total (epidermis and dermis) numbers of CGRP and substance P positive nerve fibers tended to increase in the inflamed skin in contrast to control skin. In contrast, RIA demonstrated a lower (p < .05) concentration of CGRP in the inflamed ears compared with controls and a tendency for substance P to decrease in concentration in eczematous ears versus controls. There was no difference in serotonin concentration, or in the number of serotonin positive mast cells, between the inflamed and control skin, whereas semiquantification of serotonin positive platelets showed an increase in the inflamed (+/+) compared with control ears (+). Our results indicate that 24 hr after being challenged with the antigen, at the peak of murine skin inflammation, axonal growth, sensory neuropeptides, as well as serotonin may be involved.
{ "pile_set_name": "PubMed Abstracts" }
In electrophotography, known processes for converting an electrostatic latent image formed on a photoconductive photoreceptor or the like into a visible image with a toner include, for example, magnetic brush development, cascade development and powder cloud development. Toners for use in these development processes are generally mixtures of a thermoplastic resin and a colorant. The toner image formed on a photoconductive photoreceptor or the like by the above or other development processes is transferred to a support such as paper and fixed thereto by pressing and/or heating. With the recent increasing requirement to provide higher image quality in copies, various improvements have been tried to make in both copiers and developers. In particular, a technique frequently used for improving image quality is to employ a toner having a reduced average particle diameter. The use of a toner having a reduced average particle diameter is an effective means for improving image quality. However, this technique is disadvantageous in that triboelectric charging amount is enhanced, resulting in difficulties in obtaining a desired color density, and that the amount of charges which the toner can have per particle decreases, resulting in blurring. Various limitations are hence imposed on the use thereof. Employed for improving the developing ability are, e.g., a technique of using a carrier having a reduced diameter so as to have an enlarged chargeable surface area and/or a reduced electrical resistance or a technique for development in which toner particles are flown by means of an AC electric field. These techniques are effective in enabling toners having a high-triboelectric charging amount and a small diameter to have a highly improved developing ability and to satisfactorily ensure a maximum color density in solid parts of from 1.5 to 1.9. With respect to the line density in images having a width of from 150 to 500 .mu.m, the above described conventional techniques are capable of ensuring a line density of 1.0 or higher to enable line or character images made up of such thin lines to be clearly recognizable. However, the conventional techniques described above have the following problems. In the reproduction of lines or characters (6 to 8 points) having a line width of 100 .mu.m, which reproduction is recently required to attain further higher image quality in terms of line density and character image density, the reproduced line or character images have a image density of 1.0 or lower and are hence light and unclear. Even when it is attempted to form black toner particles in two or more layers so as to form a thin line having a high image density, the resulting black toner particles are only formed in almost a single layer. This is because the electrostatic latent images on the photoreceptor which correspond to the thin lines have a smaller charge amount unlike solid parts. If the content of carbon black as a colorant is increased in order to obtain a high density, use of the resulting black toner for development in an AC electric field poses a problem that blurring is caused by charge injection due to combinations of the black toner containing a large proportion of carbon black and having a low electrical resistance with a carrier having a low electrical resistance, resulting in image defects. Furthermore, if an electrostatic latent image corresponding to thin lines or small characters (6 to 8 points) having a line width of 100 .mu.m is formed on a photoreceptor in such a manner that the resulting image has a line width larger than 100 .mu.m in order to heighten only the image density of these lines and characters, there are problems, for example, that the resulting images are deformed although a heightened image density is obtained. In this method, repeated copying operations result in an increase in the line widths of both the thin lines and the characters.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Uniformization of Kodaira fibered surfaces Consider a Kodaira fibration. i.e. a smooth non-isotrivial fibration $X\rightarrow C$ with $X$ a smooth complex surface and $C$ a smooth complex curve, such that both the genus of $C$ and genus of the fibers (which are complex curves) are at least $2$. By abuse of notation I call $X$ a Kodaira fibered surface. What is known about the structure of the universal cover of $X$? In particular, when is it a bounded symmetric domain? I know that $X$ is a minimal algebraic surface of general type and that the universal cover of $X$ can never be a ball in $\mathbb{C}^{2}$. A: Here are the arguments to exclude polydisk and the ball (there are no other complex 2-dimensional bounded symmetric domains: In fact, one can do without this and argue that any domain other than the ball would have rank $\ge 2$ and, hence, Margulis superrigidity theorem would apply). Kefeng Liu ("Geometric height inequalities", Math. Research Letters, 3 (1996), 693–702) proved that a compact complex-hyperbolic surface cannot admit a holomorphic submersion to a Riemann surface. This excludes the complex ball. Consider the 2-dimensional polydisk $D^2$ and a group $\Gamma$ acting discretely, holomorphically and cocompactly on $D^2$. Then $\Gamma$ is a lattice in $Isom(D^2)$ and by Margulis' superrigidity theorem either $\Gamma$ is reducible or it is superrigid, and , ehnce, does not admit an epimorphism to a surface group. The second is impossible in the case of fibrations over Riemann surfaces, the first contradicts non-isotriviality assumption in the question. On the other hand, the universal cover of your complex manifold $X$ is a certain bounded domain in ${\mathbb C}^2$: This result could be found in P.A. Griffiths, Complex-analytic properties of certain Zariski open sets on algebraic varieties. Ann. of Math. (2) 94 (1971), 21–51. who proves it using Bers' simultaneous uniformization. A: If an algebraic surface has the bidisk as universal cover, then, by Hirzebruch's proportionality theorem, its topological index is 0 (the index is 1/3 (c_1^2 - 2 c_2)). But Kodaira proved that for Kodaira fibrations the index is strictly positive. To exclude the case that the universal covering is the ball, where c_1^2 = 3 c_2, again by Hirzebruch's theorem, is harder and was done by Kefeng Liu. You may look in my article with Rollenske for more results on Kodaira fibrations. Regards, Fabrizio Catanese.
{ "pile_set_name": "StackExchange" }
We're in the thick of the Major League Baseball regular season, and the injuries have sidelined some of the game's top players. We have every single MLB injury chronicled here and updated often to let you know who is in or out each night and beyond. But this page will look at the most important injuries in MLB and how they are affecting teams and players moving forward. Notable MLB injuries Javier Baez CHC • SS • 9 BA .281 R 88 HR 29 RBI 85 SB 11 View Profile • Injury: Hairline fracture in left thumb • Status: On 10-day IL; timetable unknown • Sept. 17 update: Baez underwent an MRI that revealed a hairline fracture on his left thumb after suffering the injury on a slide. The shortstop is unlikely to play again before the regular season comes to end. Baez will be re-evaluated at the end of the week, and could gain clearance to begin rehabbing if his evaluation goes well at the end of the week. The hope for Chicago is that he'll be able to return for the playoffs, should the Cubs qualify. Corey Kluber SP • ERA 5.80 WHIP 1.65 IP 35.2 BB 15 K 38 • Injury: Oblique strain • Status: On 60-day IL; timetable unknown • Sept. 13 update: Kluber played catch with a team trainer on Friday. Kluber hasn't pitched in a big-league game since early May, first due to a fractured forearm and then after straining his oblique. He's unlikely to return before the regular season ends, but Kluber could be able to help Cleveland in some capacity if the team reaches the playoffs. Gary Sanchez NYY • C • 24 BA .233 R 62 HR 34 RBI 77 SB 0 View Profile • Injury: Left groin strain • Status: On 10-day IL; timetable unknown • Sept. 17 update: Sanchez was diagnosed with a left groin strain on Sept. 13, and he hasn't played in a game since Sept. 12. The Yankees starting catcher still has a chance to return before the end of the regular season, but his timeline remains unclear. Out for the 2019 season
{ "pile_set_name": "OpenWebText2" }
Concurrent functional endoscopic sinus surgery and rhinoplasty: pros. Despite historical concerns about the spread of infection from the sinuses to the nasal tissues,concurrent septorhinoplasty and endoscopic sinus surgery may be performed safely in most patients who meet the criteria for sinus surgery. However, otolaryngologists should use good medical judgment in selecting patients appropriate for the combined procedures.Patients with extensive sinus pathology or systemic illness are not the ideal candidates for concurrent surgery. It is recommended to perform the septal and sinus surgery first, so that the surgeon may postpone the elective rhinoplasty procedure if unfavorable intraoperative circumstances develop. Overall, when performed in carefully selected patients, contemporaneous rhinoplasty and endoscopic sinus surgery is safe and effective and offers many advantages for the patient.
{ "pile_set_name": "PubMed Abstracts" }
Nude beaches in west virginia On special nights the hosts provide Greek and Indian dinners. The continue another 1. Our third recommended beach for the nude traveler to Naxos island is Aliko beach. A high standard studio on Skiathos island with a lovely completely enclosed garden and hot tub suitable for naturism at all times. Continue uphill to find two more impressive waterfalls. Clubs By Region Inside West Virginia's Only Nudist Resort When you pass a fence, you are technically outside the park and in the property of Eglin Airforce Base, which funnily enough is the place where the most sunbathers searching for the all over tan seem to congregate. The primary enforcement targets are the two locations where nudists have occupied territory the NPS deemed not sufficiently removed from throngs of textiles—namely Lighthouse Beach and Smith Point Beach, the two car-accessible nude beaches toward each end of the island. This is Avalon, owned and operated by Phyllis and Patrick Gaffney. Mid-summer was full of business travel and camping at textile locations. It is visited almost exclusively by those who regularly vacation in the community and is not widely known to others. Naked Places, USA: Middle Atlantic & Upper South For refreshments you can visit the nearby taverna but you will have to put some clothes on. Really cheap and really yummy! On this page we will give what our friendly neighbourhood naturists have advised to be the best places to gain that all over tan in the Keys. Farther east in Nassau County, Jones Beach is a huge and popular public beach, while Tobay Beach several miles to the east is a comparatively smaller beach with a restrictive entrance policy that favors local residents. This small group of islands stretches from the Greek mainland across the Aegean Sea, all the way to Turkey. Continue uphill to find two more impressive waterfalls. Nude beaches go as far back as the 's, when public nude bathing was common in the UK. Vritomartis Naturist Resort. Despite its downhill profile, the steep and rugged terrain descending into and climbing out of the gorge adds some difficulty to an otherwise moderate hike. Fun activities on the Ionian islands:. Three well equipped villas set in an acre of terraced gardens.
{ "pile_set_name": "Pile-CC" }
While much of the Republican Party spent Monday fantasizing about thwarting Donald Trump at the party’s convention, John Kasich — the “moderate” governor of Ohio whom Sen. Marco Rubio’s campaign has decided to blame for its own manifest failures — was amiably chatting with Yahoo’s Katie Couric instead. And, wouldn’t you know it, the whole poisoning-children-in-Flint scandal, which Republicans have so far mostly ignored, actually came up. Not on the merits, of course, but rather as a potential source for some vapid partisan squabbling, the bread and butter of the campaign press. Advertisement: Still, when Couric asked Kasich about Hillary Clinton’s recent call for Michigan’s Republican governor, Rick Snyder, to either resign or be recalled, the answer he gave was illuminating: I think he has been held accountable. I think this is a guy who has had many sleepless nights,” Kasich said. “When Hillary starts talking ‘He should resign,’ what about the server in her house and the possibility she had classified information on that server?” “That is demagoguery out of her,” he added. “I know her, and I don’t like that. I’m really agitated with the fact that here she is calling on someone else to resign, with her history and the history of her family? Give me a break.” Kasich has gotten a lot of credit during this campaign cycle for being less of an ogre than most of his GOP competition. Some of it has been deserved. For the most part, though, evidence of Kasich having a big ol’ bleeding heart has been hard to find. Examples of the “fuck you, I got mine” ethos that first propelled him to Congress as part of the Gingrich Revolution, on the other hand, have been abundant. (“You’d get over it.”) But Kasich’s response didn’t just reveal him to be a person who lacks basic empathy. Much worse, it revealed him to be a person to whom black lives don’t really matter. Advertisement: That’s not to say that Kasich hates black people. I suspect he doesn’t. At the same time, however, the “Black Lives Matter” slogan was never about that kind of raw, unvarnished racism. The folks who pine for the halcyon days of slavery and Jim Crow were never its intended target. “Black Lives Matter” is about complacency, not hate. It’s about calling out the shrugging indifference that so often characterizes the mainstream’s response to black people’s suffering and oppression. What does that shrugging indifference sound like? Well, it sounds like Kasich implying that poisoning thousands of black children — in a way that could very well change their entire lives, for the worse — is comparable to having your own server. (Or having a philandering husband, assuming that’s what “the history of her family” quip meant.) It sounds like Kasich saying that allowing thousands of mostly black people to be poisoned isn’t such a mistake that Snyder deserves to lose his job. Advertisement: The gist is that while it’d be preferable if bad things didn’t happen to black people, their suffering doesn’t necessitate the same degree of action that would be required if the victims were white. However much a white life is worth, the unconscious but determinative assumption is that a black life is worth less. At least, that seems to be the position of John Kasich, the GOP’s reigning moderate.
{ "pile_set_name": "OpenWebText2" }
A police investigation has been launched into a theft on the set of the new "Star Wars" TV series, and Lucasfilm is scrambling to make sure no major secrets to the show have been compromised. Sources close to production tell The Blast all hell broke loose after a bunch of expensive equipment went missing from the set of Jon Favreau's "The Mandalorian" while shooting at a studio in Manhattan Beach. We're told the working theory is that the gear was stolen overnight while the set was dark. We're told the buzz among the crew is that the stolen equipment was from the camera department, and production is extremely worried a memory card containing sensitive information may have been jeopardized. Both Lucasfilm and police have launched investigations to try and locate the missing gear, and our sources say the main crew members grilled during the initial probe were those that deal with the cameras. An official for the Manhattan Beach Police Department confirmed that their officers responded to the theft call around 11 AM and the situation is under investigation. Along with police, the crew had a very special visitor to set this week when George Lucas stopped by to check things out. "The Mandalorian" takes place in the "Star Wars" universe after "Return of the Jedi," and will follow a lone gunfighter around the galaxy who belongs to the same race of people as familiar bounty hunter, Boba Fett. Favreau has been tapped as the writer and executive producer, and Disney is pumping a ton of money into production, with each episode reportedly costing $10 million. We've reached out to reps for Lucasfilm regarding the theft.
{ "pile_set_name": "OpenWebText2" }
Tag Archive | Daniel Craig Just another reference to the Black Card in popular culture. This time the titanium beauty is handed-over at a luxurious hotel to maintain the always wealthy and sheik image of Mr. Bond. Why would he carry any other card in his wallet?
{ "pile_set_name": "Pile-CC" }
The Weather Channel: Your Local Weather Outlook--Miami, FL (33151) Local Weather Outlook for Miami, FL (33151). Since 1982, The Weather Channel has brought timely weather information to the world. Now via our Local Weather Outlook RSS feed we can keep you up-to-date on the latest weather affecting the cities of your choi
{ "pile_set_name": "Pile-CC" }
The Justice Department refused on Friday to cooperate with a judge’s demand that it publicly release transcripts of recorded conversations between Michael Flynn and Russia’s ambassador to the United States in December 2016. The refusal was a response to U.S. District Judge Emmet G. Sullivan, who ordered earlier this month that the Justice Department release several materials related to the case against Flynn, who was President Donald Trump’s campaign adviser and his national security adviser until being ousted for lying about his contacts with the Russians. In their refusal, the federal prosecutors said they hadn’t used those recordings of Flynn’s conversations to establish his guilt or recommend a sentencing. “The government further represents that it is not relying on any other recordings, of any person, for purposes of establishing the defendant’s guilt or determining his sentence, nor are there other recordings that are part of the sentencing record,” the court filing’s lone statement on the request read. One of the Washington Post journalists who first reported the story, Carol Leonnig, tweeted that it may be unprecedented for the government to refuse a court order in such a way.
{ "pile_set_name": "OpenWebText2" }
Cruise Tip #1: Selecting a Cruise Port by Paul Motter | Tuesday, 05 Mar. 2013 This is the first article in a CruiseMates series on "The Best Cruise Secrets," offering tips for both new and experienced cruisers from seasoned cruise writers and travel agents. This series will include 10 articles, each on a different topic, but all suggesting ways to get the best deals and the most value from your cruise dollars. After we've published them all on our site, the articles will be compiled as an e-book available for download on your Kindle or other reader. 1. Selecting a Cruise Port When budgeting your cruise, be sure to figure in the cost of getting to the ship. Airfare is not cheap. And for domestic flights, you'll have to pay a checked baggage fee on most airlines (unless you're an elite member of the carrier's frequent flyer program). If you fly overseas, you should be allowed to check one bag per person at no additional fee. Be sure to distribute the contents of your luggage carefully, weigh your bags before you arrive at the airport, and check your airline's baggage weight limits – an overweight bag charge can be very expensive, and you might not have a chance to re-pack once your bags are checked. Drive-to cruises are a great alternative to flying to the ship these days. "Drive-to" refers to ships sailing from U.S. ports that are within a reasonable drive from your home. Here are the current U.S. port cities: Seattle, San Francisco, Los Angeles, San Diego, Honolulu, Galveston, New Orleans, Tampa, Miami, Ft Lauderdale, Port Canaveral, Charleston (S.C.), Baltimore, New York (Manhattan and Brooklyn), Bayonne (N.J.), and Boston. Florida – Cruise Capital of the World The cruise industry got its start in Miami because it is the gateway to the Caribbean. Cruise ships can reach more Caribbean islands from Miami than from any other U.S. mainland city. Because of this, the best cruises – i.e., the newest and most exciting ships and the most extensive itineraries – sail from southern Florida. But getting to Miami isn't always easy, so let's look at alternatives to Miami first. West Coast Cruises West Coast cruises out of San Diego, Los Angeles, San Francisco and Seattle go to Mexico and Hawaii in the winter, and to Alaska in the summer. (U.S. citizens should consider the ease of sailing out of Seattle vs. Vancouver due to customs at the airport.) The west coast does not have the variety of destinations that the east coast enjoys. And cruises to Mexico have become less popular due to rumors of danger to tourists, so the cruise lines have cut back to visiting only certain ports like Ensenada, Cabo San Lucas and Puerto Vallarta. These places are safe, and rumors of dangers for cruise tourists have been somewhat overblown; however, the cruise lines must react to public perception. Here is a cruise industry secret: Every year, demand is soft in certain cruising regions for any number of reasons. There may be political turmoil (which rarely affects you as a tourist), or just too many ships deployed in the region – meaning the cruise lines have a surplus of empty cabins to sell. Remember, cruise lines always want to fill up every departure because they make more money from having occupied cabins at any price than they make with empty cabins. A few years ago, cruises to Mexico were the biggest bargain in the industry, but the number of cruises going there has been cut in half since 2005 – and so prices have recovered. Today, a seven-day Mexico cruise on a new ship in a balcony cabin should cost about $100 a day, per person. This is an average "good price" for most cruises. Other Options for West Coast Cruisers If you want to see the Caribbean, you can cruise to many of the same destinations from Galveston as you can from Florida, so people in the West can drive there or find cheaper airfares. New Orleans is similar. You can fly from Los Angeles to Galveston for $220, and arrive early enough to catch the ship. When you have a group of four people, airfare adds up fast. Another challenge for West Coast cruisers is the time zone change. Flying from Los Angeles to Florida, you lose three hours, so a five-hour flight means you arrive eight hours later in the day, in local time. Typically, you should plan to arrive in your port city no later than four hours before your ship leaves, which means you need to book a non-stop 5:00 a.m. flight from Los Angeles to Florida – and hope there are no delays. That's why most western cruisers choose to fly into Florida a day early. I personally consider the newer ships to be the best. The newest ships tend to sail out of Miami – and if this is what you want, that is the price you have to pay. But you can sail on some ships that are almost as new out of Galveston or New Orleans and visit Cozumel, Jamaica, Grand Cayman, Roatan, Costa Maya and other popular Western Caribbean itineraries identical to those out of Florida. Midwest Options Driving to a cruise from the Midwest might make more sense than you think. It is 925 miles from Chicago to New Orleans. Roundtrip, the fuel cost is about $250. You will need a motel halfway, for about $150. That equals $400 to get a family of five to your cruise, vs. airfare of around $1,350. My favorite web site for calculating driving costs is Travelmath.com. From Chicago, it is 1,100 miles to Orlando but just 700 miles to Baltimore. East Coast Options If you live on the East Coast and want to take a tropical cruise, you can leave from several different cities. Most people want a tropical cruise in the dead of winter. You can cruise from New York City year round, but in January your ship won't hit even moderately warm weather until the third day. A balcony cabin on such a cruise is not needed, although it is always nice. Sailing on a seven-day cruise from New York, you will visit Port Canaveral and two stops in the Bahamas, no further south than Miami. A nine-night cruise from New York yields far more bang for the buck – with far warmer weather – by reaching as far south as Puerto Rico. Prices from Baltimore are similar.
{ "pile_set_name": "Pile-CC" }
Q: Having an issue with callback function So I have some code like this const getAPIData = (symbol, callback) => { var options = { url: "https://api.binance.com/api/v3/ticker/price", method: "GET", qs: { symbol }, }; request(options, (err, res, body) => { body = JSON.parse(body); callback(body); }); }; var isValid = 0; getAPIData(symbol, (body) => { console.log(body); if (body.symbol) { console.log("yes"); isValid = 1; } else { console.log("no"); } }); After this callback is executed the "isValid" variable still remains 0 no matter what the outcome is. Although the console gets logged with yes and no both. The isValid variable still remains 0 when I debug the program. How can the console.log function work and not set the isValid to 1? it's like it's just skipping that line or I'm not sure. Please help me out! A: This is the way asynchronous calls work. var isValid = 0; getAPIData(symbol, (body) => { console.log(body); if (body.symbol) { console.log("yes"); isValid = 1; console.log(isValid); // 1 } else { console.log("no"); } }); console.log(isValid); // 0 // when the JS engine gets here, isValid will still be 0 // since getAPIData is asynchronous and it's still in progress at this point // also, you cannot use any results of getAPIData here
{ "pile_set_name": "StackExchange" }
Q: XmlAttribute value and innertext I have a piece of code that fills a hashtable with strings, per example: ("name", Oscar). I want to use them to fill (just by memory usage) values and innertexts of XMLAtributes. But there is one problem. XmlElement Co = newDoc.CreateElement("Co1"); XmlAttribute series = Co.Attributes.Append(newDoc.CreateAttribute("series")); series.InnerText = (string)vector["series"]; series.Value = (string)vector["series"]; MessageBox.Show((string)vector["series"]); MessageBox.Show(Co.Attributes["series"].InnerText.ToString()); MessageBox.Show(Co.Attributes["series"].Value.ToString()); When ever I want the system to show me the value or the innertext (within the xml create method this piece of code is in) it has it returns nothing. Then It passes to the next atribute and returns a "Object reference not set to an instance of an object.". The next piece of code is this one: XmlAttribute folio = Co.Attributes.Append(newDoc.CreateAttribute("folio")); folio.InnerText = vector["folio"].ToString(); The error hits in the last line. In any other place of the class I can see and retrieve the values of the hastable by the .ToString() method and the cast. It seems that Im not properly getting the value out of my hashtable or there is something I am missing with the XMLAtributes... ¿What is the proper way to do so? A: You are doing this the hard way: var folio = Convert.ToString(vector["folio"]); Co.SetAttribute("folio", folio); There is no need to worry about things like InnerText.
{ "pile_set_name": "StackExchange" }
Belgium Changes Controversial War Crimes Law - 2003-08-01 The Belgian parliament has enacted legislation to change a controversial war crimes law under which cases were filed against President Bush and many other world leaders. The Senate passed the measure Friday, following approval by the lower House earlier in the week. Under the new legislation the jurisdiction of Belgian courts is limited to cases involving long-term Belgian citizens or residents, who were victims or suspects at the time of an alleged crime. The changes also ensure immunity for world leaders and officials who visit Belgium. The original law gave Belgian courts the power of universal jurisdiction, to try war crimes cases, no matter where the acts were allegedly committed, and no matter what the nationality of those involved. The law angered Washington when lawsuits were filed against President Bush and other senior U.S. officials accusing them of war crimes in Iraq. Subsequently, U.S. Defense Secretary Donald Rumsfeld said Washington would be reluctant to send American officials to NATO meetings in Brussels, and that the United States opposed further spending on a new NATO headquarters in Belgium. The original law provoked a number of controversies. One prominent case against Israeli Prime Minister Ariel Sharon was thrown out by the Belgian Supreme Court earlier this year. Even Belgian Foreign Minister Louis Michel was affected, when an opposition party filed a complaint against him, accusing him of illegally authorizing arms shipments to Nepal. Mr. Michel told the Senate Friday that the noble cause that prompted the parliament to adopt the law, was abused and manipulated for political ends. He said relations have been damaged with nations that Belgium traditionally has excellent ties with. Critics say the old law, originally passed in 1993, made Belgium somewhat of a joke on the world stage. The law was first applied to prosecute two Rwandan nuns on genocide charges in 2001. This prompted a series of other lawsuits against a number of world figures.
{ "pile_set_name": "Pile-CC" }
Q: Integrating Factor - Not getting the answer given? $y' - 4y = t$ My integrating factor is $e^{-4t}$ $\int e^{-4t}y'$ - $\int 4e^{-4t}y$ = $\int te^{-4t}$ $\int (e^{-4t}y)'$ = $\int te^{-4t}$ $e^{-4t}y$ = $-4te^{-4t}$ - $e^{-4t}$ I end up with $y' = -4t -1 + ce^{4t}$ Where did I go wrong? A: You integrated $\int te^{-4t}\mathrm dt$ incorrectly. It should be $$\int te^{-4t}\mathrm dt=-\dfrac{t}{4}e^{-4t}-\dfrac{1}{16}e^{-4t}+c$$ Then multiplying both sides by $e^{4t}$ gives you $$y=-\dfrac{t}{4}-\dfrac{1}{16}+ce^{4t}$$ A: Let $u=t$, $du=dt$, $dv=e^{-4t}$, and $v=-\cfrac{1}{4}e^{-4t}$, then using integration by parts, $\displaystyle\int te^{-4t}\, dt$ should be \begin{align} \int te^{-4t}\, dt&=-\cfrac{t}{4}e^{-4t}+\cfrac{1}{4}\int e^{-4t}\,dt\\ &=-\cfrac{t}{4}e^{-4t}+\cfrac{1}{4}\left(-\cfrac{1}{4}e^{-4t}\right)+C\\ &=-\cfrac{t}{4}e^{-4t}-\cfrac{1}{16}e^{-4t}+C\\ \end{align}
{ "pile_set_name": "StackExchange" }
Introduction ============ Human performance is affected by both the genetic makeup of the individual and the environmental factors. Current research and interest in sports genetics focus on genetic variants that may make a significant contribution to the individual's performance. It is known that personal traits such as endurance, strength, power, muscular coordination, and psychological willingness and motivation, all have a genetic background.[@b1-geg-7-2015-001] The most frequently investigated genetic polymorphisms in terms of athletic performance or predisposition to athletic capacity are angiotensin-1 converting enzyme (ACE) gene and α-actinin-3 (ACTN3) gene.[@b2-geg-7-2015-001] Variants in these genes have been reported to be associated with elite athletic performance and with quantitative physical performance traits in the general population.[@b3-geg-7-2015-001]--[@b5-geg-7-2015-001] *ACTN3* was the first structural gene specific to skeletal muscle that has been associated with athletic performance.[@b6-geg-7-2015-001] The actinins, major and important Z line functional and structural proteins in sarcomers, are members of the actin-binding protein family.[@b7-geg-7-2015-001] *ACTN3* codes for ACTN3 in humans, and its expression is restricted to fast, type 2 fibers.[@b8-geg-7-2015-001] North et al[@b9-geg-7-2015-001] reported that a deficiency of α-actinin protein because of a premature stop codon in *ACTN3* alters the designation for the amino acid arginine to a stop codon at position 577 (R577X; dbSNP rs1815739) in exon 16 and may contribute to the possibility of differential fitness. The *ACTN3* 577R allele and 577RR genotype are associated with top-level, power-orientated athletic performance in a wide array of ethnic groups.[@b10-geg-7-2015-001] The *ACTN3* R577X polymorphism has been reported to be associated with elite athletic status,[@b6-geg-7-2015-001] endurance athletes,[@b11-geg-7-2015-001] and many other groups.[@b12-geg-7-2015-001]--[@b16-geg-7-2015-001] *ACE* is located on chromosome 17q23 and comprises 26 exons and 25 introns. It contains a polymorphism due to an insertion (I) or a deletion (D) of a 287 bp Alu sequence in intron 16, resulting in the three genotypes of insertion/insertion (II), insertion/deletion (ID), and deletion/deletion (DD).[@b17-geg-7-2015-001] The I/D polymorphism is associated with circulating and tissue ACE levels. Individuals homozygous for the D allele had higher tissue and plasma ACE concentrations than heterozygotes and II homozygotes.[@b18-geg-7-2015-001] Many of the case--control studies reported that success in speed-strength disciplines, such as short-distance running, long jump, high jump, and short-distance swimmers, is associated with *ACE* DD genotype.[@b19-geg-7-2015-001],[@b20-geg-7-2015-001] On the other hand, individuals with the II genotype have a lower ACE serum concentration and have more success in endurance-related disciplines such as medium- and long-distance running, race walking, and rowing.[@b21-geg-7-2015-001],[@b22-geg-7-2015-001] Two different studies involving Spanish and Lithuanian football players showed that players had a significantly higher percentage of the *ACE* ID genotype when compared to the nonathletic population.[@b23-geg-7-2015-001],[@b24-geg-7-2015-001] Previous studies, including related genetic polymorphisms and football players, are very limited, especially in Turkish subjects. The aim of this study was to determine the genotype and allele distribution of *ACTN3* and *ACE* in Turkish male football players and assess the impact on predisposition to football. Materials and Methods ===================== Study subjects -------------- All players enrolled for the study had Turkish ancestry and were members of a Turkish football team. The study was conducted in accordance with the principles of the Declaration of Helsinki II. Üsküdar University Ethical Committee approved the study protocol, and written informed consent was obtained from each player once prospective participants understood and accepted the aim and protocol of the study. Genotyping ---------- DNA isolation was carried out by using High Pure Polymerase Chain Reaction Template Preparation Kit (Roche Diagnostics) using peripheral blood. The region of interest, *ACTN3*, was amplified using the following primers: forward 5′-CTG TTG CCT GTG GTA AGT GGG-3′ and reverse 5′-TGG TCA CAG TAT GCA GGA GGG-3′, as described previously.[@b5-geg-7-2015-001] Polymerase chain reaction (PCR) was performed by initial denaturation at 95°C for five minutes, followed by 35 cycles of denaturation at 95°C for 30 seconds, annealing and extension at 72°C for one minute, and a final extension for seven minutes at 72°C. Genotyping of the *ACTN3* R577X was maintained by restriction length polymorphism method. The 290-bp amplicons were digested by DdeI (New England Biolabs) as recommended by the manufacturer. Digested fragments were separated on 10.0% polyacrylamide gel electrophoresis and visualized under UV light by ethidium bromide staining. The wild-type allele, 577R, showed fragments of 205 and 85 bp, whereas the variant allele, 577X, showed fragments of 108, 97, and 85 bp ([Fig. 1](#f1-geg-7-2015-001){ref-type="fig"}). For the *ACE* genotype, conventional PCR amplifications were carried out. Primers 5′-CTGGAGACCAC TCCCATCCTTTCT-3′ and 5′-GATGTGGCCATCACAT TCGTCAGAT-3′ were used for the amplification. The final volume of the PCR mixture was 50 μL and contained 50--100 ng genomic DNA, 1 mM of each primer, 50 mM KCl, 1 mM deoxynucleotide triphosphate (dNTP), 1.5 mM MgCl~2~, 10 mM Tris--HCl, pH 8.0, and 1 U Taq DNA polymerase. An initial denaturation at 94°C for five minutes was followed by annealing at 58°C for one minute and extension at 72°C for two minutes. Amplification was finalized with 30 cycles: denaturation at 94°C for one minute, annealing at 58°C for one minute, and extension at 72°C for two minutes, followed by a final elongation at 94°C for one minute, annealing at 58°C for one minute, and extension at 72°C for seven minutes. Amplicons were separated by electrophoresis on a 2% agarose gel and visualized under UV light after ethidium bromide staining. Electrophoresis gave rise to three possible patterns: a 490-bp band (II genotype), a 190-bp band (DD genotype), or both 490- and 190-bp bands (I/D genotype) ([Fig. 2](#f2-geg-7-2015-001){ref-type="fig"}). Amplicons had 190 bp in the presence of the D allele and 490-bp fragment in the presence of the I allele. Results ======= The percentage of the *ACE* genotype in the examined players was 16, 44, and 40 for II, ID, and DD genotypes, respectively. For the *ACTN3* genotype, the respective frequencies were 20, 36, and 44 for XX, RX, and RR. An allelic count gave rise to 19 (38%) I and 31 (62%) D alleles for *ACE* and 31 (62%) R and 19 (38%) X alleles for *ACTN3*. [Table 1](#t1-geg-7-2015-001){ref-type="table"} lists the genotype and allelic frequencies of *ACE* and *ACTN3*. According to the genotypes, nine different combinations were found, five of the players had DD + RR, the same number of the players had ID + RR, four players had ID + RX, three players had DD + RX, two players had DD + XX, the same number of the players had ID + XX, two players had II + RX, one player had II + XX, and one player had II + RR (data not shown in table). Discussion ========== Recent studies have indicated that several genes are involved in determining the performance of the players, both physiologically and psychologically.[@b25-geg-7-2015-001] Genetic models could be developed and used to find the optimal genetic endowment of a player to help scientists establish which genetic polymorphisms are advantageous for proper performance in different sports types. Therefore, the creation of genomic databases will be very useful for sport scientists. In this study, we solely examined 25 senior football players in terms of *ACE* and *ACTN3* polymorphisms and aimed to associate these polymorphisms with predisposition to football. In our study cohort, the RR genotype for *ACTN3* genotype was higher than XX and RX. The R allele, considered to be the wild-type allele of the gene and associated with the rapid contraction of the sarcomers, was also high when compared to X allele. Egorova et al[@b26-geg-7-2015-001] reported similar results in Russian football players; they examined 240 football players, and 46.25% had the RR genotype. Santiago et al[@b16-geg-7-2015-001] analyzed 60 Brazilian football players, and in their cohort, 48.3% of the players had RR genotype. Pimenta et al[@b27-geg-7-2015-001] aimed to compare acute inflammatory responses, muscle damage, and hormonal variations with eccentric training in soccer athletes and examined 37 professional soccer players of which 40.5% were RR. To the best of our knowledge, this is the first report in Turkish male professional soccer players, and our results were in agreement with previous studies, indicating R allele and RR genotype superiority for soccer players. In our cohort, 44% of the players had ID genotype, 40% of the players had DD genotypes for *ACE*, and 84% of the players had at least one D allele. The allelic count revealed D allele as 62% in players. D allele is responsible for high ACE concentration and is associated with success in speed-strength disciplines.[@b17-geg-7-2015-001] Gineviciene et al[@b24-geg-7-2015-001] examined 199 Lithuanian football players and reported similar results to ours. They showed that ID was the highest genotype (46.7%), and together with DD genotype, the percentage of the players having at least one D allele was 76.3%. Juffer et al[@b23-geg-7-2015-001] analyzed 54 male professional soccer players, and ID was the most detected genotype. Unlike our results, Egorova et al[@b26-geg-7-2015-001] examined 213 Russian football players and found the frequency of ID and DD genotypes as 28.6% and 50.7%, respectively, giving both genotypes an overall frequency of 79.3%, which is similar to our results. The cumulative effect of genotypes in human metabolism had always received great attention. In an attempt to find the optimal genotypes, several researchers have examined candidate genes separately, in different populations, to create a pool of genomic data. Genotype combinations are very useful for identifying a certain metabolism, or a part of a metabolism, if they are part of the same reaction. For example, *ACTN3* and *ACE* have crucial roles for their metabolisms, but they do not have roles in the same biologic pathway. But it is important to understand performance-enhancing polymorphisms to create an optimal genomic score for being an elite athlete. In our cohort, five of the players had the DD + RR genotype combinations and the same number had ID + RR genotypes. The D and R alleles were found together in these genotypes, the most important similarity between these genotypes. On the other hand, one player had the II + XX genotype, thought to be associated with endurance capacity. The number of the subjects examined in the current study is the main limitation. We hope this preliminary study will guide new studies, with extended numbers of players in different kinds of sports to evaluate the effect of the combination of these polymorphisms more accurately. Conclusion ========== In this study, we examined the distribution of *ACE* and *ACTN3* polymorphisms in male Turkish professional soccer players for the first time. *ACTN3* RR genotype and R allele and *ACE* ID genotype and D allele dominated our cohort. These polymorphisms are well known and have been examined in different populations. Therefore, we did not compare the genomic results with sedentary people; rather, we examined the combined effect of these polymorphisms. According to our previous and current results, we hypothesize that elite soccer players tend to have a power/strength-oriented genotype. These polymorphisms, alone or in combination with the additional polymorphisms, should be taken into account when deciding a genomic score profile for success in sports. **ACADEMIC EDITOR:** Christian Bronner, Editor in Chief **PEER REVIEW:** Four peer reviewers contributed to the peer review report. Reviewers' reports totaled 526 words, excluding any confidential comments to the academic editor. **FUNDING:** Authors disclose no funding sources. **COMPETING INTERESTS:** Authors disclose no potential conflicts of interest. Paper subject to independent expert blind peer review. All editorial decisions made by independent academic editor. Upon submission manuscript was subject to anti-plagiarism scanning. Prior to publication all authors have given signed confirmation of agreement to article publication and compliance with all applicable ethical and legal requirements, including the accuracy of author and contributor information, disclosure of competing interests and funding sources, compliance with ethical requirements relating to human and animal study participants, and compliance with any copyright requirements of third parties. This journal is a member of the Committee on Publication Ethics (COPE). Provenance: the authors were invited to submit this paper. **Author Contributions** Conceived and designed the experiments: KU. Analyzed the data: CS, TB. Wrote the first draft of the manuscript: KU. Contributed to the writing of the manuscript: CS. Agree with manuscript results and conclusions: KU, CS, TB. Jointly developed the structure and arguments for the paper: KU, CS. Made critical revisions and approved final version: All authors. All authors reviewed and approved of the final manuscript. ![Polyacrylamide gel electrophoresis images of *ACTN3* polymorphisms (M: 100 bp molecular marker, Lanes 1 and 2: RR genotype, Lane 3: XX genotype, Lane 4: RX genotype).](geg-7-2015-001f1){#f1-geg-7-2015-001} ![Agarose gel images of *ACE* polymorphisms.](geg-7-2015-001f2){#f2-geg-7-2015-001} ###### Genotypic and allelic distribution of the *ACE* and *ACTN3* in the examined players. GENOTYPE ALLELE FREQUENCY ------------------ -------- ---------- ------------------ -------- ------- ------- *ACE* (n = 25) Number 4 11 10 19 31 Percentage (%) 16 44 40 38 62 **XX** **RX** **RR** **X** **R** *ACTN3* (n = 25) Number 5 9 11 19 31 Percentage (%) 20 36 44 38 62
{ "pile_set_name": "PubMed Central" }
The (non-)sense of detecting anti-cardiolipin and anti-β2glycoprotein I IgM antibodies in the antiphospholipid syndrome. The antiphospholipid syndrome (APS) is characterized by thrombosis and/or pregnancy morbidity with the persistent presence of lupus anticoagulant (LAC), anti-cardiolipin (aCL) and/or anti-β2glycoprotein I (aβ2GPI) antibodies of the immunoglobulin G/immunoglobulin M (IgG/IgM) isotype. However, the role of aCL and aβ2GPI IgM as a serologic marker in APS is debated. We aimed to assess the diagnostic and clinical value of IgM antiphospholipid antibodies (aPL) in APS within the classification criteria. Our multicenter study comprised 1008 patients, including APS patients and controls. Anti-CL and aβ2GPI IgG and IgM antibodies were detected with four commercially available solid phase assays. Positivity for aCL and/or aβ2GPI antibodies was significantly correlated with thrombosis and pregnancy morbidity, independent of the isotype and solid phase assay. Higher odds ratios were obtained for IgG compared to IgM positivity. Isolated IgM was rare in thrombotic APS, but more frequent in obstetric APS, ranging from 3.5% to 5.4% and 5.7% to 12.3%, respectively, dependent on the solid phase assay. In a multivariate logistic regression analysis of aPL, IgM positivity was found to be associated with pregnancy morbidity. However, detection of IgM was not independently associated with thrombosis. Combined positivity for LAC, IgG, and IgM was highly associated with thrombosis and pregnancy morbidity. Our data support testing for aCL and aβ2GPI IgM in women suspected of obstetric APS. However, no added value was found for testing IgM in patients suspected of thrombotic APS. Still, IgM aPL might be useful as a second-line test to improve thrombotic risk stratification.
{ "pile_set_name": "PubMed Abstracts" }
Antizyme delays the restoration by spermine of growth of polyamine-deficient cells through its negative regulation of polyamine transport. Effects of antizyme on polyamine transport and spermine restoration of the growth of polyamine-deficient cells were examined by using mouse FM3A cells transfected with pMAMneoZ1 possessing rat antizyme cDNA under the control of glucocorticoid-inducible promoter. Treatments of the transfected cells with alpha-difluoromethylornithine (DFMO), an inhibitor of ornithine decarboxylase (ODC), and dexamethasone, an inducer of antizyme, both caused a decrease in ODC activity and polyamine contents and inhibition of cell growth. However, spermine uptake of the transfected cells was repressed by dexamethasone but stimulated by DFMO. The decrease in the rate of spermine uptake in dexamethasone-treated cells was attributed to an increase in Km value and a slight decrease in Vmax value. Accordingly, restoration of cell growth by spermine was less effective in dexamethasone-treated cells than DFMO-treated cells. These results clearly indicate that antizyme has dual functions: one for ODC degradation and the other for negative regulation of polyamine transport.
{ "pile_set_name": "PubMed Abstracts" }
Maiestas spiculatus Maiestas spiculatus (formerly Recilia spiculatus) is a species of bug from the Cicadellidae family that is endemic to India. The species was moved from Recilia to Maiestas in 2009. References Category:Insects described in 1998 Category:Endemic fauna of India Category:Hemiptera of Asia Category:Maiestas
{ "pile_set_name": "Wikipedia (en)" }
When carbon black is incorporated in a room temperature vulcanizable composition such as described in U.S. Pat. No. 4,111,890 to Getson et al, the resultant composition is thixotropic, but exhibits poor shelf-life. Moreover, when the composition is cured in atmospheric moisture, the surface cure appears to be incomplete and the carbon black can be easily transferred (rubbed-off) from the surface of the cured composition. However, it has been found that when the carbon black is treated with a hydrophobic agent, a thixotropic composition is obtained which upon curing to an elastomeric solid is resistant to the transfer (rub-off) of carbon black from the cured surface. Furthermore, it has been found that the resultant composition exhibits better shelf stability over longer periods of time. Therefore it is an object of this invention to provide a room temperature vulcanizable composition which is thixotropic and has non-slump properties. Another object of this invention is to provide a room temperature vulcanizable composition containing carbon black which is substantially free of carbon black rub-off from the cured surface. A further object of this invention is to provide a method for incorporating carbon black into a room temperature vulcanizable composition without inhibiting the surface cure of the composition. A still further object of this invention is to provide a method of incorporating carbon black into a room temperature vulcanizable composition and eliminate rub-off of the carbon black from the cured surface.
{ "pile_set_name": "USPTO Backgrounds" }
<!--{}--> <template> <div v-on:b=" !function ( a , b ) { ; } " ></div> </template>
{ "pile_set_name": "Github" }
Liberty Global CEO Mike Fries said his company's $21.8 billion asset sale to Vodafone is just the start of mobile consolidation in Europe. On Wednesday, British-based Vodafone struck a deal to buy some European assets of U.S. cable company Liberty Global, a move the CEO said will benefit both investors and mobile users. "It's all about scale," Fries told CNBC's "Power Lunch" on Wednesday. "This transaction is about creating a national challenger with converged scale, meaning fixed and mobile scale. It's a natural combination. I think you're going to see that continue, in Europe in particular, both mobile and mobile." Vodafone, the world's second-largest mobile carrier, operates in Europe, Asia, Africa and Oceania. In the deal, Vodafone is buying Liberty Global's businesses in Germany, Hungary, Romania and the Czech Republic. But, critics argue that the deal with hinder competition and regulators may not approve. Deutsche Telekom is the largest competitor in Europe. Fries, however, isn't worried. "We absolutely anticipate regulatory approval of this deal," said Fries, who also serves as vice chairman of Liberty Global. "It will be approved at the EU level. Not necessarily in Germany or any of the individual markets. That's an important distinction." The CEO pointed out that Deutsche Telekom — "who we know [in the U.S.] as T-Mobile" — already dominates the German market, with 50 percent of the country's broadband customers. And the German market, he said, "has been screaming for consolidation and a real national challenger. So together, Vodafone and our business, Liberty Global, will present a great opportunity for consumers. They're going to see innovation, investment. All kinds of benefits over the long haul."
{ "pile_set_name": "OpenWebText2" }
Q: Volumetric rendering fundamental concepts and terminology Literature on rendering volumetric materials and effects tends to use a lot of mathematical physics terminology. Let's say that I have a decent handle on the concepts involved in surface rendering. What concepts do I need to understand for volumetric rendering? (Both real-time and offline rendering.) What exactly is meant by light scattering in the context of volumetric rendering? (And why is it split into in-scattering and out-scattering?) What is the relationship between transmission, attenuation, and absorption? What is a phase function and how does it play into volumetric rendering? (In particular, the Henyey-Greenstein phase function.) What is the Beer-Lambert law and how is it related to light scattering? Basically, how do I make sense out of diagrams like this? A: When I was first reading about all of this I stumbled upon this link which helped me better understand this large subject. Also this goes into some more detail on things mentioned here. Light scattering is a natural phenomenon which arises when light interacts with particles distributed in a media as it travels through it. From Wikipedia: Light scattering can be thought of as the deflection of a ray from a straight path, for example by irregularities in the propagation medium, particles, or in the interface between two media In computer graphics there are models that have been developed to simulate the effect of light traversing volume objects from an entry point (Point A) to an exit point (Point B). As the light travels from A to B it is changed due to interactions with particles and these interactions are often referred to as Absorption, Out Scattering and In Scattering. Often you will see these split into two groups; Transmittance (Absorption and Out Scattering) which I like to think of as 'light lost' and In-Scattering ('light gained'). Absorption is basically incident light energy that is transformed into some other form of energy and therefore 'lost'. Transmittance Transmittance describes how light reflected behind a volume will be attenuated due to Absorption as it travels through a medium from A to B. This is usually calculated with the Beer-Lambert law which relates the attenuation of light to the properties of the material through which it is travelling. As the light travels through the medium there is a chance that the photons can be scattered away from their incident direction and therefore not make it to the eye of the observer and this is referred to as Out-Scattering. In most models the Transmittance equation is changed slightly to introduce the concept of Out-Scattering. In Scattering Above we have seen how light can be lost due to photons been scattered away from the viewing direction. At the same time light can be scattered back into the viewing direction as it is travelling from A to B and this is called In-Scattering. Particle In-Scattering itself is a pretty complex topic but basically you can split it into Isotropic and Anisotropic scattering. Modelling Anisotropic scattering would take a considerable amount of time so usually in computer graphics this is simplified by using a Phase Function which describes the amount of light from the incident light direction that is scattered into the viewing direction as it travels from A to B. One commonly used non-isotropic Phase Function is called the Henyey-Greenstein phase function which can model Backward and Forward scattering. It usually has a single parameter, g ∈ [−1,1], that determines the relative strength of forward and backward scattering.
{ "pile_set_name": "StackExchange" }
Power tools including battery operated tools are well-known. These tools typically include an electric motor having an output shaft that is coupled to a spindle for holding a tool. The tool may be a drill bit, sanding disc, a de-burring implement, or the like. The power source may be a battery source such as a Ni-Cad or other rechargeable battery that may be de-coupled from the tool to charge the battery and coupled to the tool to provide power. The power source is coupled to the electric motor through a power switch. The switch includes input electrical contacts for coupling the switch to the power source. Within the switch housing, a moveable member, sometimes called a switch, is coupled to the input electrical contacts and to a wiper of a potentiometer. As the moveable member is pressed against the biasing component of the switch, it causes the input electrical contacts to close and provide current to one terminal of the electric motor and to the wiper of the potentiometer. The moveable member is biased so that the biasing force returns the moveable member to the position where the input electrical contacts are open when the moveable member is released. The current is coupled to a timing signal generator, such as a “555” circuit, through the potentiometer. As the member or trigger continues to be pulled against the biasing force so that the wiper reduces the resistance of the potentiometer from an open circuit to a low resistance or short circuit condition, the level of the current supplied to the timing signal generator increases. The output of the timing signal generator is coupled to the gate of a solid state device, such as a MOSFET. The source and drain of the solid state device are coupled between a second terminal of the electric motor and electrical ground. In response to the timing signal turning the solid state device on and off, the motor is selectively coupled to electrical ground through the solid state device. Thus, as the timing signal enables the solid state device to couple the motor to electrical ground for longer and longer intervals, the current flows through the motor for longer intervals. The longer the motor is coupled to power, the faster the electric motor rotates the output shaft of the motor. Consequently, the tool operator is able to vary the speed of the motor and, correspondingly, the rotational speed of the tool in the spindle by manipulating the trigger for the power switch. The timing signal generated by the timing circuit selectively couples the motor to the power source because it alternates between a logically on-state and a logically off-state. During the logically off-state, the motor is no longer coupled to the power source. The windings in the motor, however, still have current in them. To provide a path for this current, a freewheeling diode is provided across the terminals of the motor. The trigger of the power switch is also coupled to two sets of contacts. One of these contact sets is called the bypass contact set. When the trigger reaches the stop position of its travel against the biasing component, it causes the bypass contacts to close. The closing of the bypass contacts causes the current through the motor to bypass the solid state device and be shunted to electrical ground. This action enables the motor to remain continuously coupled to the power source and reach its maximum speed. The other set of electrical contacts controlled by the switch trigger are the brake contacts. These contacts are closed when the trigger is at the fully biased off position. As the trigger is moved against the biasing force, the brake contacts open. The brake contacts couple one terminal of the electric motor to the other terminal of the motor. In response to the trigger being released from a position that enables power to be supplied to the motor, the brake contacts close to provide a current path through the motor for dynamic braking of the motor. This enables the motor to stop more quickly than if the motor simply coasted to a stop under the effects of friction. While the power switch described above is effective for tool speed control, it suffers from some limitations. Known power switches are limited because of the effect of carrying the battery current through the switch. When the battery current is first applied to the contacts, the current level may be sufficient to cause arcing. Arcing may cause the contacts to become pitted or otherwise damaged. Additionally, large currents also tend to heat the components within the switch. Consequently, the switch may require a heat sink or a larger volume to dissipate heat within the switch. The larger size of the housing for the switch may also impact the design of the tool housing to accommodate the switch geometry. Another factor affecting the geometry or size of the switch housing is the potentiometer that generates the variable speed signal. Typically, the distance traveled by the wiper of the potentiometer is approximately the same as the distance traveled by the trigger. In many cases, this distance is approximately 7 mm and this distance must be accommodated by the potentiometer and the housing in which the potentiometer is mounted. The direction of motor rotation depends upon whether the battery current flows through the motor from the first terminal to the second terminal or vice versa. Because bidirectional rotation of battery operated tools is desirable, most tools are provided with a two position switch that determines the direction of battery current through the electric motor. In some previously known switches for battery operated tools, this two position switch is incorporated in its own housing that is mounted to the switch housing. The additional two position switch housing may exacerbate the space issues already noted. In other known switches, the two position switch may be integrated within the switch housing. This arrangement, while perhaps smaller than the two housing construction, adds another set of contacts to the switch with the attendant heat or contact deterioration concerns that arise from the motor current flowing through these contacts. Another limitation of known power switches relates to the torque control for power tools. In some battery operated tools, mechanical clutches are used to set a torque limit for the tool. When the resistance to the rotation of the tool causes the torque generated by the tool to increase to the torque limit, the clutch slips to reduce the torque. The torque may then build again until it reaches the limit and the clutch slips again. The iterating action of clutch slippage followed by renewed torque buildup is sensed by the operator as vibration. This vibration informs the operator that the tool is operating at the set torque limit. This slippage also causes wear of the mechanical components from friction and impact. Electric drills suffer the foregoing limitations. Moreover, electric drills are usually constructed as straight-drilling machines in which the drill spindle extends parallel to the motor shaft and axis of the housing and, for specific purposes, as angular-drilling machines in which the drill spindle is aligned at a right angle to the motor shaft and housing axis. In certain applications in which both straight and angular drilling must be carried out, as is the case in installations in wooden house construction, the two machines must be at hand for continuous alternation. What is needed is an articulating power hand tool which does not require a large housing for mechanical switches. What is further needed is an articulating power hand tool with a reduced forward section and a compact articulating system to allow for use of the tool in confined areas.
{ "pile_set_name": "USPTO Backgrounds" }
A new kind of spell-casting: Arm yourself with a wide array of spells and then unleash their true, destructive potential by altering their effects on the fly with spell-shaping. Arm yourself with a wide array of spells and then unleash their true, destructive potential by altering their effects on the fly with spell-shaping. Destructible environments: Turn villages and castles against their inhabitants with well-placed spells, reducing them to deadly, flying debris. Turn villages and castles against their inhabitants with well-placed spells, reducing them to deadly, flying debris. Choose your own adventure: Navigate a procedurally generated world map as you make choices that will alter the flow of your journey. Do you stop to help a wealthy town in need, or do you save your energy for later? Navigate a procedurally generated world map as you make choices that will alter the flow of your journey. Do you stop to help a wealthy town in need, or do you save your energy for later? Relive your past lives: Visit the Void to read up on the exploits of your previous incarnations, examining the choices that led them to their ultimate fate. A reign of terror never feels so satisfying as when you leave a literal pile of rubble in your wake. Fictorum is an action role-playing game that features fully-destructible structures, a randomized node-based world map, and a satisfying magic system with on-the-fly spell shaping and customization.In Fictorum, your mage wields real, legendary power right from the start—unlike those found in most magic-centric games. Our spellcasting and shaping system grants the player an unrivaled level of customization and reconfiguration. Up to three runes can be applied to a spell, each affecting a different spell characteristic, and can be changed to suit the player’s current need, interest, or whim. You might amplify ice blasts to freeze enemies in place, expand the radius of a fireball explosion to crumble a bridge and hinder pursuers, or chain a lightning attack together to strike several clustered targets. Shaping makes spellcasting tactical and satisfying; an experience more about tailoring your magical arsenal to effectively, efficiently, and enthusiastically destroy every obstacle.Yet, challenge is abundant—the wizard must bring down a sprawling empire by himself. Your journey across the randomly-generated world map features locations chock full of enemies and structures to destroy. Fictorum™ uses the Unreal® Engine. Unreal® is a trademark or registered trademark of Epic Games, Inc. in the United States of America and elsewhere.” and “Unreal® Engine, Copyright 1998 – 2017, Epic Games, Inc. All rights reserved.
{ "pile_set_name": "OpenWebText2" }
Q: ConcurrentDictionary Introduction I'm building an API wrapper for the SE API 2.0 Currently, I'm implementing a cache feature, this wasn't an issue until now. Now I'm taking concurrency into account. This would be my test method: Code public static void TestConcurrency() { Stopwatch sw = new Stopwatch(); sw.Start(); IList<Task> tasks = new List<Task>(); for (int i = 0; i < 1000; i++) { tasks.Add(Task.Factory.StartNew(p => client.GetAnswers(), null)); } Task.WaitAll(tasks.ToArray()); sw.Stop(); Console.WriteLine("elapsed: {0}", sw.Elapsed.ToString()); Console.ReadKey(); } Description Internally, the client has a RequestHandler class, which attempts to fetch a value from the cache, and if it fails to do so, it performs the actual request. Code /// <summary> /// Checks the cache and then performs the actual request, if required. /// </summary> /// <typeparam name="T">The strong type of the expected API result against which to deserialize JSON.</typeparam> /// <param name="endpoint">The API endpoint to query.</param> /// <returns>The API response object.</returns> private IApiResponse<T> InternalProcessing<T>(string endpoint) where T : class { IApiResponse<T> result = FetchFromCache<T>(endpoint); return result ?? PerformRequest<T>(endpoint); } Description The code that actually performs the request is irrelevant to this issue. The code that attempts to access the cache does the following: Code /// <summary> /// Attempts to fetch the response object from the cache instead of directly from the API. /// </summary> /// <typeparam name="T">The strong type of the expected API result against which to deserialize JSON.</typeparam> /// <param name="endpoint">The API endpoint to query.</param> /// <returns>The API response object.</returns> private IApiResponse<T> FetchFromCache<T>(string endpoint) where T : class { IApiResponseCacheItem<T> cacheItem = Store.Get<T>(endpoint); if (cacheItem != null) { IApiResponse<T> result = cacheItem.Response; result.Source = ResultSourceEnum.Cache; return result; } return null; } Description The actual implementation of the cache store works on a ConcurrentDictionary, when the Get<T>() method is invoked, I: Check whether the dictionary has an entry for endpoint. If it does, I verify whether or not it holds a response object. If it doesn't already have a response object, the cache item's state will be Processing, and the thread will be put to sleep for a small amount of time, waiting on the actual request being completed. Once or if the response is "commited" to the cache store (this happens once the request is completed), the cache item is returned. If the cache item was too old or the request processing timed out, the entry is removed from the store. If the cache didn't have an entry for endpoint, null is pushed into the cache as the response for endpoint, signaling a request on that endpoint is being processed and there is no need to issue more requests on the same endpoint. Then null is returned, signaling an actual request should be made. Code /// <summary> /// Attempts to access the internal cache and retrieve a response cache item without querying the API. /// <para>If the endpoint is not present in the cache yet, null is returned, but the endpoint is added to the cache.</para> /// <para>If the endpoint is present, it means the request is being processed. In this case we will wait on the processing to end before returning a result.</para> /// </summary> /// <typeparam name="T">The strong type of the expected API result.</typeparam> /// <param name="endpoint">The API endpoint</param> /// <returns>Returns an API response cache item if successful, null otherwise.</returns> public IApiResponseCacheItem<T> Get<T>(string endpoint) where T : class { IApiResponseCacheItem cacheItem; if (Cache.TryGetValue(endpoint, out cacheItem)) { while (cacheItem.IsFresh && cacheItem.State == CacheItemStateEnum.Processing) { Thread.Sleep(10); } if (cacheItem.IsFresh && cacheItem.State == CacheItemStateEnum.Cached) { return (IApiResponseCacheItem<T>)cacheItem; } IApiResponseCacheItem value; Cache.TryRemove(endpoint, out value); } Push<T>(endpoint, null); return null; } The issue is indeterminately, sometimes two requests make it through, instead of just one like it is designed to happen. I'm thinking somewhere along the way something that's not thread safe is being accessed. But I can't identify what that might be. What could it be, or how should I debug this properly? Update The issue was I wasn't always being thread safe on the ConcurrentDictionary This method wasn't retuning a boolean indicating whether the cache was successfully updated, therefore if this method failed, null would have been returned twice by Get<T>(). Code /// <summary> /// Attempts to push API responses into the cache store. /// </summary> /// <typeparam name="T">The strong type of the expected API result.</typeparam> /// <param name="endpoint">The queried API endpoint.</param> /// <param name="response">The API response.</param> /// <returns>True if the operation was successful, false otherwise.</returns> public bool Push<T>(string endpoint, IApiResponse<T> response) where T : class { if (endpoint.NullOrEmpty()) { return false; } IApiResponseCacheItem item; if (Cache.TryGetValue(endpoint, out item)) { ((IApiResponseCacheItem<T>)item).UpdateResponse(response); return true; } else { item = new ApiResponseCacheItem<T>(response); return Cache.TryAdd(endpoint, item); } } Description The solution was to implement the return value, and changing Get<T>() adding this: Code if (Push<T>(endpoint, null) || retries > 1) // max retries for sanity. { return null; } else { return Get<T>(endpoint, ++retries); // retry push. } A: IApiResponseCacheItem<T> cacheItem = Store.Get<T>(endpoint); if (cacheItem != null) { // etc.. } A ConcurrentDirectionary is thread-safe but that doesn't automatically make your code thread safe. The above snippet is the core of the problem. Two threads could call the Get() method at the same time and get a null. They'll both continue on and call PerformRequest() concurrently. You'll need to merge the InternalProcessing() and FetchFromCache() and ensure that only one thread can call PerformRequest by using a lock. That might produce poor concurrency, perhaps you could just drop a duplicate response. In all likelihood, the requests get serialized by the SE server anyway so it probably doesn't matter.
{ "pile_set_name": "StackExchange" }
Share “Former Oklahoma State University student...” Former Oklahoma State University student pleads not guilty to fourth sexual battery charge Former Oklahoma State University student Nathan Cochran pleaded not guilty to a fourth sexual battery charge Monday. Cochran faces charges for three incidents in which he is accused of targeting male students while they slept. STILLWATER — Former Oklahoma State University student Nathan Cochran on Monday pleaded not guilty to a fourth sexual battery charge. Nathan Cochran The former OSU student is accused of targeting sleeping male victims in a series of assaults. Cochran appeared in Payne County District Court on Monday morning. Cochran's attorney said his client is innocent of the charges against him, and questioned the accusations three men brought against Cochran. Cochran, 22, faces four counts of sexual battery in connection with three incidents where he is accused of targeting male students while they slept. Those incidents occurred between Nov. 3, 2011, and Aug. 15, 2012, according to court documents. Cochran pleaded not guilty to the three previous charges in December. His next scheduled court appearance is at 10 a.m. March 4. The newest charge alleges Cochran placed his hands on a male victim's leg and lower back and attempted to place his hands in the man's pants without the man's consent while the man tried to sleep. The man also told police Cochran told him he wanted to know what it was like to be with a man sexually, according to the charge. John Coyle, Cochran's attorney, said he was concerned by “interrelationships” among Cochran's accusers. None of the three men is named in court documents. Coyle said he also found it suspicious that at least one of the men waited more than a year before contacting police about the alleged incident. “It's a very interesting case,” Coyle said. One of the incidents took place Nov. 3, 2011, according to court documents. In that case, a man told police Cochran groped him while he was asleep.
{ "pile_set_name": "Pile-CC" }
Prime Loops are extremely proud to present "Minimal & Tech House Drums", which contains 1,000 skilfully handcrafted drums painstakingly designed over a period of 6 months - from scratch. Using over 20 high-grade analogue synths including: Access Virus B/TI, Korg Prophecy, Jomox Airbase99, Polivox Synthesizer, Juno-106 and many others. The drums have been mastered using TL Audio Ivory and enhanced using a host of the finest studio hardware processors. Each drum sample has been sonically moulded and skilfully sculpted to perfection using advanced synthesis techniques and has been designed with today's evolving music scene in mind - no corners have been cut in the making of this epic collection which has been duly executed with synthesised precision for maximum originality in the mix. After months of hard work "Minimal & Tech House Drums" is finally available! Many drum libraries currently available simply contain old, over-used and re-sampled drum hits dating back to the 80's - this releases is different, the drum sounds cannot be found anywhere else having been made from scratch, and therefore containing truly original content with a host of future sounds for enhanced music production. "Minimal & Tech House Drums" quite simply is a must-have for modern music producers, with over 1,000 innovative sounds from a drum library you can rely on. Reviews Computer Music "From chitinous, metallic hats and percs to beefy kicks and high-impact tones, noises and mod-FX, this pack is a real electronic feast. You get about 1000 kicks, claps, snares, hats, cymbals, toms, percussion hits and FX, from such classic machines as the Korg Prophecy, Access Virus and Juno-106." 9/10 Rekkerd.org I always tell myself that I don’t need more electronic drum sounds (and it’s the truth isn’t it), but since Prime Loops was kind enough to send me a copy of Minimal & Tech House Drums I now have yet another 1,000 samples in my sample library. How will I ever be able to use them all? Well, probably not. Anwyay, this is a great collection of drum sounds. Perhaps not so surprising since the guy behind these samples is none other than Cyberworm. Doesn’t ring a bell? He runs a website called Rhythm Lab, where he has been offering quality free samples since 2007 (the Vermona DRM1 MKIII samples he released a few weeks ago are top notch). At just under $20 this library is a regular steal. Certainly when you do need more electronic drum sounds, but perhaps also when you don’t. No complaints. Go in.
{ "pile_set_name": "Pile-CC" }
[Appearance of the resection area of brain tumors in intraoperative MRI imaging]. During MRI-controlled resection of brain tumors using an open MRI system, operation-induced alterations may occur, especially enhancement of the resection cavity wall. This may simulate tumor areas, resulting in false assessment of the resection or resection of non-tumorous areas. Based on 42 MRI- and biopsy-controlled brain tumor resections in an 0.5 T open MRI (Signa SP, GE), the appearance and origin of operation-induced reactions are analyzed. In our opinion, there is a superposition of preformed peritumoral reactions by operation-induced microcontusions. The beginning of the cavity wall enhancement needs at least 10-15 min. MRI-controlled analysis of the intraoperative steps by the neurosurgeon and neuroradiologist allows discrimination of operation-induced reactions from tumor areas and leads to safe operation.
{ "pile_set_name": "PubMed Abstracts" }
To tell the truth, I found Bean Bird a little charming — but the approach is definitely an easy target for snark, and if LG isn't judicious in using the little guy (or gal?), Bean Bird will earn a well-deserved place alongside Clippy. Watching the bird wave a surrender flag to protest your attempt to skip the Wi-Fi setup once is amusing — having to live with it all the time would be the exact opposite. Luckily, LG tells me that it's just a first-use experience. A smaller ambition for a bigger screen Still, once you get into actually using the webOS interface on LG's smart TVs, you'll be struck by the consistency of the experience. Vonshak says that the design was inspired by the same "war cry" of making TV simple. "The strong colors, and the lines, really come from old TVs and how even the 'no signal' used to look," Vonshak says. "We really found that as a great inspiration source to how to focus specifically on content, on TV itself, and what that thing is." TV first is a good philosophy, but creating (and branding) the interface with webOS doesn't necessarily seem, well, necessary. Why webOS? Vonshak clearly still has faith in the mission of the open web. "We really believe that the web is the right path forward and the web will win because it's the right ecosystem," he says. Missionary zeal aside, using HTML (and Enyo) makes very good sense for smart TVs — many of the core apps that consumers demand are already available in HTML on the web itself, so it's relatively trivial to get them working on LG's smart TVs. Earlier I called webOS on smart TVs "a smaller ambition for a bigger screen" and after seeing how webOS works now, that assessment still stands. LG hasn't solved any of the truly thorny problems in the living room. But executing well on a smaller ambition is still to be commended — and my initial impression is that LG may have pulled it off. webOS will never achieve the goals its original creators had set for it. And, to be honest, it won't generate massive consumer demand for LG's TVs. But what it could do is make your next smart TV a little less painful to use. Five years ago at this very show, webOS dreamt big. After seeing those dreams burn in up a conflagration of missed opportunities, even that small victory is a pleasant surprise.
{ "pile_set_name": "OpenWebText2" }
Back to Basics: Lawn & Landscape Management Forestry & Wildlife Inseparable Partners by Rhett Johnson I often tell people that biologist don’t manage wildlife, foresters do. That, of course, is an exaggeration, but basically true. Admittedly, the wildlife we enjoy today is here in large part because of the protection provided by wildlife agencies now and in the past. When the state or federal government sets bag limits and seasons, or decides that some species should be protected, those decisions are based on research and good sound wildlife biology. read more... Forestry, Wildlife and Natural Resource Management … To many outdoor enthusiasts, springtime in Alabama... more Alabama Natural Resources Council (ANRC) The Alabama Natural Resources Council is a state wide organization that works to develop programs that increase the values of the state's forest resources. These programs are managed by three Council appointed committees: the County Outreach Committee, the Treasure Forest Committee, and the Forest Resources Committee.
{ "pile_set_name": "Pile-CC" }
Q: Can I untangle this nesting of 'when' promise invocations? I'm new to the when.js javascript library, but I'm familiar with async programming in C#. That's why I find this code to be unwieldy: filters.doFilter('filter1name', reqAndPosts).then(function(filter1) { filters.doFilter('filter2name', filter1).then(function(filter2) { filters.doFilter('filter3name', filter2).then(function (posts) { renderView(posts); }); }); return filter1; }); I basically want three methods to be called in sequence, with the output of each being piped to the next method. Is there anyway I can refactor this code to be more "sequence-like" - i.e. get rid of the nesting? I feel like there's something I'm missing with the when-framework here. I'm not doing it right, right? A: Since doFilter returns a promise, we can do filters.doFilter('filter1name', reqAndPosts) .then(function(filter1) { return filters.doFilter('filter2name', filter1); }) .then(function(filter2) { return filters.doFilter('filter3name', filter2); }) .then(renderView); A: There is another option to have both advantages of cleaner indentation and previous results available: using withThis. filters.doFilter('filter1name', reqAndPosts).withThis({}).then(function(filter1) { this.filter1 = filter1; // since we used withThis, you use `this` to store values return filters.doFilter('filter2name', filter1); }).then(function(filter2) { // use "this.filter1" if you want return filters.doFilter('filter3name', filter2); }).then(renderView);
{ "pile_set_name": "StackExchange" }
ANNOUNCEMENT {#s1} ============ Cryptosporidium parvum is one of the two major species of the protozoan parasite Cryptosporidium that infect humans and cause gastrointestinal disease ([@B1]). C. parvum is considered zoonotic and has a wide host range, in which cattle and small ruminants are the predominant reservoir hosts ([@B2]). However, some subtypes of C. parvum, such as the IIc gp60 subgroup, are considered to be human adapted ([@B2]), because they are mainly reported in humans, with only a few reports in European hedgehogs ([@B3]). Whole-genome sequencing (WGS) provides a means for comparing isolates to identify markers important in distinguishing routes of transmission and potential virulence traits for better epidemiological analysis and risk assessment. The objective of this work was to sequence a zoonotic isolate of C. parvum. We sequenced a human isolate of C. parvum, UKP1, isolated at the Public Health England and Public Health Wales Cryptosporidium Reference Unit and identified as gp60 type IIaA17G1R1 (GenBank accession no. [JX971701](https://www.ncbi.nlm.nih.gov/nuccore/JX971701)). This subtype has a global distribution and has been observed in humans, cattle, pigs, and sheep ([@B4], [@B5]). Zoonotic linkages with cases in England and Wales have been demonstrated with IIaA17G1R1 (4). Oocysts were semipurified from stool using a salt flotation and hypochlorite treatment. DNA was extracted with the QIAamp DNA extraction kit (Qiagen, Hilden, Germany) and whole-genome amplified with the REPLI-g kit (Qiagen) before 454 GS FLX Titanium and Illumina HiSeq 2500 sequencing. A total of 472.6 Mbp, representing 1.6 million reads, were obtained from the 454 GS FLX Titanium sequencing, and 12.8 Gbp, representing 26 million reads, were produced on an Illumina MiSeq instrument. The quality of the reads was examined using FastQC ([@B6]). Illumina and 454 reads were mapped against a reference C. parvum isolate (GenBank accession no. [NZ_AAEE00000000](https://www.ncbi.nlm.nih.gov/nuccore/NZ_AAEE00000000)) using Bowtie 2 v. 2.3.3.1 ([@B7]), and the mapped reads were then *de novo* assembled using SPAdes v. 3.11.0 ([@B8]). The initial assembly was used in a second round of assembly using the \--trusted-contigs flag with SPAdes. Iterative polishing of the assembly was done by mapping the reads back to the assembly with Bowtie 2 and correcting them with Pilon 1.22 ([@B9]). The 8 C. parvum chromosomes assembled into 14 contigs with a total genome size of 8,881,956 bp, a G+C content of 30.20%, an *N*~50~ value of 1,092,230 bp, and a largest contig length of 1,333,759 bp. Data availability. {#s1.1} ------------------ This whole-genome shotgun project has been deposited at DDBJ/EMBL/GenBank under the accession no. [PYCJ00000000](https://www.ncbi.nlm.nih.gov/nuccore/PYCJ00000000), and raw sequence reads are available under the BioProject no. [PRJNA439211](https://www.ncbi.nlm.nih.gov/bioproject/?term=PRJNA439211). We are grateful to Brian Boyle (Genomics Sequencing Platform, IBIS, Université de Laval, Quebec City, Quebec, Canada) for whole-genome amplification and generating the 454 and Illumina sequence data. Funding for this work was provided by the Public Health Agency of Canada. [^1]: **Citation** Nash JHE, Robertson J, Elwin K, Chalmers RA, Kropinski AM, Guy RA. 2018. Draft genome assembly of a potentially zoonotic *Cryptosporidium parvum* isolate, UKP1. Microbiol Resour Announc 7:e01291-18. <https://doi.org/10.1128/MRA.01291-18>.
{ "pile_set_name": "PubMed Central" }
Party of Nine Big damn heroes. First Session of Nine Well, there were rabbits. 9 APR/13 I’ll update this more later on. For now, as we left off, there was a rather hare-y situation at the nobles’ tavern left with much blood, sweat, and tears upon the ground, as well as a hallucinating halfling, a dwarf with most of his face still bloodied, albeit with help from a friendly cleric, a human barbarian reeling from rage after-effects, and mostly just a confuse dbunch. Where will they next awaken? Only time will tell.
{ "pile_set_name": "Pile-CC" }
People don’t want to be rich any more. It’s a world turned upside down. Genies are having to completely rethink their planning strategies in anticipation of an era of altruistic lamp-rubbers. Suddenly they’ve got to find a way to make wishing for world peace turn round and bite you on the arse. “I’m thinking maybe an all-life destroying pestilence so that the ‘world peace’ is the silence that follows the death of every living thing,” a genie who refused to be named told me. “But I’m just talking off the top of my turban.” “It’s actually a fez.” “Sorry – I haven’t looked in a mirror for two millennia. Genies can’t see their own reflection.” “That’s vampires.” After that the interview turned a bit sour and he refused to be drawn on whether Donald Trump has got any wishes left. “It’s genie-client confidentiality. But I will say I’ve been reading a hell of a lot of books about golf.” What I actually mean is that people don’t want to be called rich. They still want the trappings of wealth, I imagine. Big houses, big baths, big dinners, leg-room, gold, a willingness to use the sort of cash machine that charges you £1.50. Everyone wants all that. They just don’t want it to be known that they’re getting any of it, if indeed they are – or for the amount of it they’re getting to qualify them for that unfortunate section of society, the fortunate. The rich are the bad guys – so, being called rich, whether or not you are, is to be called bad This notion that there’s something unlucky about being called lucky occurred to me last week in the wake of John McDonnell’s controversial definition of the rich as those earning “above £70,000 to £80,000 a year”. A lot of people objected to that, and even more objected to those objections. The first group pointed out that £70k a year is far from unimaginable wealth, PIYLIL (particularly if you live in London). So, if your image of a rich person is someone in a gold hat lighting a cigar with a £50 note, then the adjective is unfairly applied to a demographic of dutiful mortgage-paying graduates who occasionally go to Carluccio’s. These complainants’ detractors, pausing only to mime playing the world’s smallest violin, countered with the undeniable statistical fact that earning £70k puts you in the richest 6% of the British workforce, and the richest 0.09% of the global population. In this row, comparatives and superlatives are oddly less controversial than the terms from which they’re derived. Richest doesn’t necessarily mean rich any more than poorest means poor. Tony Blair must have been the poorest man at many plutocratic dinners he’s attended around the world, but that doesn’t mean he needs to argue over who ordered extra chips. It’s easy to define who’s richer than whom, but at what point do you become actually rich? Are you rich if you’re richer than average? If so, the £70k bunch might qualify as “very rich”. Are you tall if you’re taller than average? Possibly. I reckon many who are only marginally taller than the mean would consent to the adjective tall (which is not to imply that mean people are short). But then a lot of us want to be tall, while we don’t seem to want to be considered rich. Maybe it’s always been like that. Wealth generates hostility so there’s nothing to be gained from drawing attention to it. “Get it quietly,” as they say in poker. But I don’t think that’s the whole story. What happened to “greed is good”, to conspicuous consumption, to Labour grandees being “intensely relaxed about people getting filthy rich”, to the whole Thatcherite dream of the promise of wealth driving ambition, invention and hard work, to Britain’s entrepreneurs being lured forward in slavering pursuit of commerce’s golden bra, and the whole of society benefiting from any consequent trickle down? Facebook Twitter Pinterest Illustration by David Foldvari. I’m not saying I miss all that bombast, but there was something coherent about it. It was a bold rebuke to the Communist bloc, an explicit elevation of liberty over equality. In a free society, the idea goes, people must be able to improve their circumstances, they must be offered the potential reward of riches. Which unfortunately means you have to have rich and poor. But rich and poor beats poor and poor and, in a land of capitalist opportunity, at least the poor have hope. In that world, there’s no shame in being called rich. Many would be proud of it and, as with tallness, lay claim to it when it’s only marginally justified. In the society Thatcher was supposed to have ushered in, “rich” and “successful” would be synonyms and the phrase “well deserved success” a tautology. That’s why last week’s scuffle to pin on others, or tear off oneself, the label “rich” is interesting. It’s become a term of abuse, like “aristocrat” in the French Revolution. Far from assuming the rich deserve their wealth, we’re now assuming the contrary. The rich are the bad guys – so, being called rich, whether or not you are, is to be called bad. “Society’s all wrong and you’re why!” is what it means. This is unfair because it’s a generalisation. But that doesn’t make it an unfair generalisation. I suspect very few people feel rich, either in the neutral sense of having lots of money, or the contemporary one of being a profiteer of injustice. All of us, except Bill Gates on the one hand and some poor sod whose name posterity will never record, and who’ll be dead by the time you read this, on the other, are aware of people richer and people poorer than we are. So, subjectively, we’re all the squeezed middle. And, in these unnerving times, even if you know you’re loaded, you probably still won’t feel particularly safe or lucky. Hardly any of us think we’re part of the problem, which is part of the problem. For Thatcher’s divisive concept to work even on its own terms, it required Britain to continue to become more meritocratic. Not fairer necessarily – because there’s nothing inherently fair about the distribution of merit – but a country where success is based on what you do, not the circumstances you were born in. If you’re holding a rat race, the prize must go to the fastest rat. No ideological alternative has really caught on enough to sweep aside Thatcher’s vision of Britain, but the fact that high earnings are now a source of social shame demonstrates how tawdry and discredited it has become. Let’s bear that in mind as our current prime minister exhorts us to vote for it again.
{ "pile_set_name": "OpenWebText2" }
define([ 'jquery', 'underscore', 'backbone', 'models/linkPeer', 'views/modal', 'text!templates/modalAddLocPeer.html' ], function($, _, Backbone, LinkPeerModel, ModalView, modalAddLocPeerTemplate) { 'use strict'; var ModalAddLocPeerView = ModalView.extend({ className: 'add-location-peer-modal', template: _.template(modalAddLocPeerTemplate), title: 'Add Location Peer', okText: 'Add', initialize: function(options) { this.link = options.link; this.location = options.location; this.locations = options.locations; ModalAddLocPeerView.__super__.initialize.call(this); }, body: function() { return this.template({ location_id: this.location, locations: this.locations.toJSON() }); }, onOk: function() { var peerId = this.$('.peer-id select').val(); if (!peerId) { this.setAlert('danger', 'Missing peer.', '.peer-id'); return; } this.setLoading('Adding location peer...'); var model = new LinkPeerModel(); model.save({ link_id: this.link, location_id: this.location, peer_id: peerId }, { success: function() { this.close(true); }.bind(this), error: function(model, response) { this.clearLoading(); if (response.responseJSON) { this.setAlert('danger', response.responseJSON.error_msg); } else { this.setAlert('danger', this.errorMsg); } }.bind(this) }); } }); return ModalAddLocPeerView; });
{ "pile_set_name": "Github" }
{ "id": "stone-egg-outfit", "name": "Stone-egg Outfit", "games": { "nh": { "orderable": false, "customizable": false, "sellPrice": { "currency": "bells", "value": 1200 }, "recipe": { "stone-egg": 3 }, "variations": { "yellow": "Yellow" } } }, "category": "Dresses" }
{ "pile_set_name": "Github" }
I do not keep anything in stock; computers, parts, software etc are orderedas and when they are needed which ensures everything is obtained at the best possible price for each client. If you require any items of computerhardware or software, get in touch withme for advice which will be free andtotally impartial.I make no profit from anything that myclients purchase based on myrecommendation. I have no affiliation tonor receive any sales commission fromany manufacturer or supplier hence theadvice I give is without bias.Compare this to the situation in a largePC / electrical warehouse wheresalesmen are only able to recommendthe brands and products they keep instock and whose salesmen will tend tosteer customers towards makingpurchases that help them achieve theirvarious targets.When advising clients, we discuss therequirements and I will then searchsuitable suppliers for the products which in my opinion are most suited to theclient's needs and budget. There's no charge for this advice but Ido expect people who take my advice to Computer hardwareAdvice is available for the followingcomputer hardware and I can supply toorder: be willing to call me in the future whenthey need repairs or other help with theircomputer systems, internet set-ups etc.I do not keep anything in stock;computers, parts, software etc areordered as and when they are neededwhich ensures everything is obtained atthe best possible price for each client.I only charge fees to clients for theworking time I spend providing their ITservices and where this involves thesupply of goods they will be at costprice.I operate this way to ensure themaximum transparency, simplicity andfairness when discussing pricing. Following my advice, clients are free tobuy direct if they wish.I do prefer it if clients contact meBEFORE making a purchase if theyintend to ask for my help so that I'm notsubsequently required to work withunsuitable components.
{ "pile_set_name": "Pile-CC" }
-e ../datadog_checks_dev
{ "pile_set_name": "Github" }
Introduction {#sec1} ============ Gamma-delta T cells represent a small subset of normal human T cells that possess a distinct T-cell receptor (TCR) on their surface. Their exact function has not yet been determined, but these cells are known to play a role in both the adaptive and innate immune system.[@bib1] The World Health Organization currently recognizes 2 subtypes of γδ T-cell lymphoma, primary cutaneous γδ T-cell lymphoma and hepatosplenic γδ T-cell lymphoma,[@bib2] both of which are rare. Primary cutaneous γδ T-cell lymphoma has an aggressive clinical behavior and poor prognosis, with a meager response to multiagent chemotherapy. However, with the advent of detecting TCR-γδ in paraffin-embedded sections, a few reports have shown examples of indolent γδ T-cell proliferations within the skin, namely in pityriasis lichenoides (PL) and lymphomatoid papulosis (LyP).[@bib3], [@bib4], [@bib5] In contrast to primary cutaneous γδ T-cell lymphoma, a retrospective study of TCR-γδ expression in cases of PL and LyP found that such cases have a benign clinical course, with most patients achieving eventual resolution of the lesions and none having lymphoma.[@bib4] Here we describe such an example, with a rare case of γδ LyP type D histopathologically mimicking primary cutaneous γδ T-cell lymphoma but having an indolent clinical course. This case further highlights the expanding classification scheme of LyP and aims to bring awareness to this newly described entity to allow distinction from primary cutaneous γδ T-cell lymphoma. Case report {#sec2} =========== An otherwise healthy 46-year-old white woman presented with a 3-month history of a rash, primarily on the extremities. The lesions began as erythematous papules, which eventually ulcerated and then self-resolved. The patient denied pruritus or tenderness associated with the lesions and had no systemic symptoms. She was initially treated with a 3-week course of prednisone with mild improvement. Outside biopsy found a markedly atypical lymphoid infiltrate composed of T cells that were weakly CD8^+^, positive for granzyme and TIA-1, and TCR-βF^-^. The cells also expressed TCR-γ and TCR-δ, leading to a diagnosis of primary cutaneous γδ T-cell lymphoma. The patient was subsequently referred to our institution for further workup. At the time of presentation to our clinic, most of her lesions had resolved with only a few erythematous papules remaining on the forearms and lower legs ([Fig 1](#fig1){ref-type="fig"}).Fig 1Clinical presentation of a patient with γδ lymphomatoid papulosis type D. Small erythematous papules involving the extremities. The lesions are asymptomatic, last approximately 1 month and then self-resolve. Repeat biopsy of the left forearm found an atypical epidermotropic lymphoid infiltrate expressing CD2, CD3, CD7, CD8, TIA-1, CD30, diminished CD5, TCR-γ, TCR-δ, and lack of CD4 and βF1 ([Fig 2](#fig2){ref-type="fig"}, *A-C*). Complete blood count, metabolic panel, and lactate dehydrogenase were significant only for mildly elevated liver function. Flow cytometry showed 17% of the total T-cell population expressing TCR-γδ, with an absolute count of 221 cell/μL. The immunophenotype of the γδ TCR expressing cells was not aberrant: CD2^+^, CD3^+^, CD5^+^ (diminished), CD7^+^, CD8^+^ (diminished minor subset), CD16^+^ (diminished), CD45^+^, CD56^+^ (diminished), CD57^+^ (subset), and TCR-γδ. They were CD4^-^, CD19^-^, CD26^-^, CD38^-^, and negative for TCR-αβ. After review with the hematology/oncology department, this minor increase in γδ T cells was deemed physiologic. Peripheral blood smear showed only rare atypical large granular lymphocytes. Polymerase chain reaction for T-cell receptor gene rearrangement performed on the peripheral blood was negative for any clonal *TRG* gene rearrangement or T-cell clones. Put together, these findings ruled out peripheral involvement of a lymphoproliferative process. The patient declined systemic treatment. She continues to get intermittent, small, erythematous papules that last approximately 1 month and then self-resolve without treatment. She follows regularly with the hematology/oncology and dermatology departments and will have repeat testing for complete blood count with differential, metabolic panel, lactate dehydrogenase and leukemia/lymphoma immunophenotyping annually. At 10-month follow-up, the patient had no evidence of systemic disease.Fig 2Histopathologic findings in γδ lymphomatoid papulosis, type D. Biopsy reveals epidermotropic enlarged and atypical lymphoid cells (**A**, Hematoxylin-eosin stain; original magnification: ×200). These cells express TCR gamma (**B**, ×200) and TCR delta (**C**, ×200). Discussion {#sec3} ========== Primary cutaneous γδ T-cell lymphoma accounts for less than 1% of all cutaneous T-cell lymphomas. Patients typically experience extranodal and nodal dissemination, with 5-year overall survival rates ranging from 11% to 15%. This lymphoma typically presents with plaques, tumors, ulcers, or panniculitis. Histologically, the lesions are typically composed of atypical medium-to-large sized lymphocytes expressing CD3 and CD2, with variable expression of C7 and CD56, and strong positivity for cytotoxic proteins such as granzyme B, perforin, and TIA-1. CD8 positivity is seen rarely, but most cases are negative for both CD4 and CD8. The T cells express the γδ receptor by definition and are negative for TCR-βF1.[@bib6], [@bib7], [@bib8] Our patient showed these histopathologic features; however, the atypical lymphocytes showed epidermotropism and were CD30^+^ and CD8^+^. Epidermotropism and CD30 positivity are common in LyP type D but would typically not occur in γδ T-cell lymphoma. The complete histologic picture as well as the clinical course of relapsing and remitting erythematous papules and lack of systemic symptoms led to the ultimate diagnosis of LyP, specifically LyP type D. LyP is a chronic, recurrent, CD30^+^ lymphoproliferative disorder with various histopathologic subtypes (A-F), described. The diagnosis of LyP can be histologically challenging because of its variability and overlapping features of other cutaneous lymphomas. Clinical correlation is crucial for diagnosis and appropriate management. Type D is a rare subtype of LyP, typically composed of CD8^+^ T cells, which can histologically mimic aggressive epidermotropic CD8^+^ cytotoxic T-cell lymphoma.[@bib9], [@bib10] Although LyP type D is rare, the expression of TCR-γδ is even more uncommon. This type of LyP was first reported by Morimura et al[@bib3] in 2011, and subsequently TCR-γδ expression has been found in a few additional cases of PL and LyP.[@bib3], [@bib4], [@bib5] To date, all reported cases have shown an indolent course (follow-up ranging from 3-64 months). With advancing immunohistochemistry and gene rearrangement techniques, more cases of γδ LyP type D will likely emerge. Clinical awareness of this indolent entity is prudent given the poor prognosis of primary cutaneous γδ T-cell lymphoma. Unlike patients with primary cutaneous γδ T-cell lymphoma, patients with LyP do well and do not require aggressive intervention. However, as with other cases of LyP, patients require long-term follow-up and should be routinely screened for other systemic lymphomas. Although histologically similar, the clinical behavior of γδ LyP type D differs greatly from that of primary cutaneous γδ T-cell lymphoma. This newly described entity should be kept in mind, as clinicopathologic correlation is necessary for correct diagnosis. The authors kindly thank Dr Geraldine S. Pinkus for the TCR-γ and -δ immunohistochemical studies used in this report. Funding sources: None. Conflicts of interest: None disclosed.
{ "pile_set_name": "PubMed Central" }
The invention is directed to an antenna particularly suited for use on a motor vehicle. Antennas for motor vehicles generally include a base secured to the body of the car and a rod that comprises the active element of the antenna. In known applications, the rod of the antenna can be fixed or oriented with respect to the base and it may be connected to the base itself by a removable connection, for example, screws, pins and the like. One of the drawbacks of known antennas is that unauthorized persons can readily remove the antenna from the support with appropriate tools which are easily acquired. The present invention seeks to eliminate or deter this disadvantage. In particular, one aim of the invention is to provide an antenna suitable for installation on a motor vehicle that would have anti-theft features, and particulary features for preventing the removal of the rod from the support base. Another aim of the invention is to provide an antenna with such anti-theft features, both on an arrangement having a fixed rod or an adjustable rod.
{ "pile_set_name": "USPTO Backgrounds" }
Rigabad, Maskun Rigabad (, also Romanized as Rīgābād; also known as Rik Abad) is a village in Maskun Rural District, Jebalbarez District, Jiroft County, Kerman Province, Iran. At the 2006 census, its population was 107, in 22 families. References Category:Populated places in Jiroft County
{ "pile_set_name": "Wikipedia (en)" }
I believe in the bible and its teachings But I don't think everything in it should be taken literally, or forced upon others, it should just help guide you to be a better person 521 shares
{ "pile_set_name": "OpenWebText2" }
*y(m). -10*m**3 Let i(u) = 154*u + 4. Let a be i(2). Let k(w) = 6*w**3 - 301 + 11*w**2 + a - 8*w**3. Let j(l) = l**2 + 1. What is -22*j(n) + 2*k(n)? -4*n**3 Let z(l) = -384*l**3 + 13*l**2 - 88*l. Let v(c) = 189*c**3 - 6*c**2 + 46*c. Determine -11*v(o) - 5*z(o). -159*o**3 + o**2 - 66*o Let u(l) = 21*l + 21. Let n(g) be the third derivative of 5*g**4/24 + 5*g**3/6 - g**2 + 12*g + 15. Calculate -9*n(c) + 2*u(c). -3*c - 3 Let v(f) = -14905*f + 29806*f - 14900*f. Let a(n) = 9*n**2 + 7*n. Give 3*a(m) - 21*v(m). 27*m**2 Let l(k) = 5*k + 19. Let z(i) be the second derivative of 2*i**3/3 + 10*i**2 + 4353*i. Determine 3*l(f) - 4*z(f). -f - 23 Let m(v) = -v + 1. Let o be (-4 + 2)/(322/1449). Let x(j) = 4*j - 5. Determine o*m(u) - 2*x(u). u + 1 Let s be 0 - -4*2/4. Let v(i) = -434 + i**2 - s*i**2 + 2*i + 214 + 224. Let h(o) = -6*o**2 + 11*o + 19. Give -2*h(w) + 11*v(w). w**2 + 6 Suppose -v - 3*w = -26, -3*v + 2*w + 15 = -30. Suppose 5*s = v + 108. Let u(x) = 28*x + s*x - 54*x. Let d(j) = j - 1. What is d(l) + 3*u(l)? -2*l - 1 Let k(x) = 16*x**2 + 11*x + 3. Let p(q) = -5*q**2 - 4*q - 1. Suppose 3*v - 23 = -5*s, -7*v + 6*v = -5*s + 19. Calculate s*k(b) + 11*p(b). 9*b**2 + 1 Let z(u) be the first derivative of -u**4/24 + 10*u**2 - 137. Let h(w) be the second derivative of z(w). Let t(b) = 8*b - 2. Determine -5*h(x) - t(x). -3*x + 2 Let f(i) = i + 9*i**2 - i + 61 + 61 - 127 + 3*i. Let u(l) = l**2 - l + 1. Calculate f(q) + 4*u(q). 13*q**2 - q - 1 Let c be (3 - (3 + -5)) + -1 + 1. Let r(b) = -c + 0*b - 5*b + 5 + 3 + 0. Let t(v) = -v + 1. Give r(k) - t(k). -4*k + 2 Let c(u) = u**3 + 5*u**2 + 4. Let n(a) = 13*a**3 + 20*a**2 + 326. Let x(q) = -3*q**3 - 5*q**2 - 73. Let s(b) = -2*n(b) - 9*x(b). Determine 5*c(w) - 4*s(w). w**3 + 5*w**2 Let j(g) be the third derivative of -5*g**4/12 - 5*g**3/6 + g**2. Let c(p) = 717*p + 9. Let d(v) = -538*v - 7. Let x(o) = -3*c(o) - 4*d(o). Give j(u) + 5*x(u). -5*u Let t(k) = 76*k**2 + 5*k - 5. Let b(d) = -151*d**2 - 11*d + 7. Give 4*b(z) + 9*t(z). 80*z**2 + z - 17 Let u(l) = -66*l**3 + 14*l**2 + 1422*l - 7. Let q(h) = 47*h**3 - 10*h**2 - 948*h + 5. Determine -7*q(y) - 5*u(y). y**3 - 474*y Let g(p) = 164*p**3 + 10*p**2 - 4*p. Let h(v) = v**3 - 2*v**2 + v. Give g(y) + 6*h(y). 170*y**3 - 2*y**2 + 2*y Let r(s) be the second derivative of -s**2 + 53*s + 0 - 1/2*s**3. Let d(i) = 2*i + 3. What is 5*d(q) + 4*r(q)? -2*q + 7 Let y(r) = -7*r + 2. Let g(i) = -938*i + 8. Give g(b) - 3*y(b). -917*b + 2 Let v(g) = -45*g**2 + 16*g. Let l = 542 + -538. Let q(i) = 3*i**2 - 11*i + 7. Let u be q(l). Let p(x) = -9*x**2 + 3*x. Calculate u*p(k) - 2*v(k). -9*k**2 + k Let s(z) = 3*z**2 + 9*z + 31. Let p(u) = 8*u**2 + 17*u + 61. What is 2*p(x) - 5*s(x)? x**2 - 11*x - 33 Let s(i) = -7*i**3 + 3*i**2 - 5*i. Let p = -13128 - -13123. Let u(h) = -10*h**3 + 5*h**2 - 8*h. Give p*u(q) + 8*s(q). -6*q**3 - q**2 Let o(w) = 3*w**2 - 1. Let t(k) = 3*k**3 + 12*k**2 + 5*k - 8. Calculate -6*o(i) + t(i). 3*i**3 - 6*i**2 + 5*i - 2 Let d(r) = r. Let w(b) = -6*b**3 - 2*b**2 + b - 5. Let x be w(0). Let c(o) = -12*o - 2. What is x*d(l) - c(l)? 7*l + 2 Let n(s) = 5*s + 1. Let k(d) = 1. Let w = -2580 + 2581. Calculate w*k(r) - n(r). -5*r Let f(x) = -4*x + 5. Suppose -5*n + 3*n - 18 = 3*k, -22 = 4*k + 2*n. Let c(l) = 16 + 12 - 53 + 8*l + 16. Determine k*c(y) - 7*f(y). -4*y + 1 Let h = -2 - -5. Let u(j) be the first derivative of -3*j - 58. Let m(i) = i - 5. Determine h*m(x) - 5*u(x). 3*x Let u(l) = -2*l - 346. Let o(p) = p + 173. Calculate 7*o(r) + 4*u(r). -r - 173 Let o(f) = -7*f**3 - 9*f**2 + 9. Let x(k) = -75*k**3 + 195*k**3 - 1 + 0 - 119*k**3 + 3*k**2 - 2*k**2. Give -4*o(t) - 36*x(t). -8*t**3 Let j(t) be the third derivative of 0 + 0*t + 1/6*t**3 - 29*t**2. Let c(o) = o - 1. Let x be 5/10 + 2/4. Give x*c(d) + 3*j(d). d + 2 Let i(c) = -5882*c**2 + 2*c - 5. Let p(g) = -11796*g**2 + 5*g - 11. Determine 7*i(d) - 3*p(d). -5786*d**2 - d - 2 Let s(f) be the second derivative of -5*f**4/3 + 11*f**2 + f. Let a be 40/(-16)*4/(-5). Let b(u) = 67*u**2 - 1 - 66*u**a + 0. Give -44*b(z) - 2*s(z). -4*z**2 Let i(x) = -10920*x - 54. Let a(r) = -5459*r - 23. Calculate 7*a(l) - 3*i(l). -5453*l + 1 Suppose 5*y = d + 34, -145 = 5*d - 5*y - 115. Let l(f) = -f**3 + 2*f**2 - 4*f - 29. Let q(w) = -w**2 + w - 1. Determine d*l(m) + 2*q(m). -m**3 - 2*m - 31 Let y = 1494304 - 1494311. Let b(f) = -2 + 0*f**2 + 3*f + f + f**2. Let w(z) = -5*z - 3 + 4*z + 7*z + 2*z**2. What is y*b(l) + 5*w(l)? 3*l**2 + 2*l - 1 Let d(k) = -k**3 + 6. Let c be (-2 + -12)/(-12 + 10). Let q(t) = -7. Let p(r) = -4. Let l(g) = -7*p(g) + 3*q(g). Give c*d(n) - 6*l(n). -7*n**3 Suppose 5*d = -m - 5, 2*d = -5*m + 14 + 30. Let n(k) = 19 - 27 + m. Let x(q) = q + 1. Give 3*n(g) - 4*x(g). -4*g + 2 Let f(s) = -s**2 - 164*s - 170*s + 334*s + 2 - 3. Let r(a) be the first derivative of 5*a**4/4 - 2*a**3/3 - 2*a + 1. What is -2*f(p) + r(p)? 5*p**3 Let k(l) = 9*l**3 - 41*l**2 - 11*l + 13. Let u(r) be the first derivative of 5*r**4/4 - 7*r**3 - 3*r**2 + 7*r - 1731. Give -6*k(d) + 11*u(d). d**3 + 15*d**2 - 1 Let k(l) = 7*l - 2. Suppose 0*x - 11*x = -176. Let d be x + -14 - (-4)/1. Let c(p) = 8*p - 2. Give d*k(o) - 5*c(o). 2*o - 2 Let g(f) be the first derivative of -f**2/2 - 2*f - 1013. Let m(n) = -3*n - 4. Calculate -10*g(o) + 4*m(o). -2*o + 4 Let b(i) = 42*i. Let m(u) = 145*u. What is -4*b(d) - 88*m(d)? -12928*d Let x(c) = 21*c**3 + 11*c**2 + 11. Let k(o) = -4*o + 4*o + 2 + 7*o**3 - 5158*o**2 + 2 + 5162*o**2. Determine 11*k(w) - 4*x(w). -7*w**3 Let m(b) = 2*b**2 + 5*b - 3. Let p(i) = i - 1. Let s(h) = 3*h + 85. Let r be s(-25). Suppose 35 = -r*v - 25. Let x = 54 - 53. What is v*p(f) + x*m(f)? 2*f**2 - f + 3 Let p(s) = -5*s**3 + 2*s**2 - s + 2. Let b(h) = h**3 - h**2 + h - 1. Let q = 3375 - 3377. Determine q*p(x) - 4*b(x). 6*x**3 - 2*x Let s = -366 - -363. Let v be (540/(-36))/(s + 0). Let w(r) = 4*r**2 + 7*r + 5. Let t(x) = 6*x**2 + 11*x + 8. What is v*t(o) - 8*w(o)? -2*o**2 - o Let t(w) = -28*w - 1161. Let i be t(-41). Let p(k) = 10*k**2 + 8. Let o(u) = -20*u**2 - 17. Determine i*p(v) - 6*o(v). -10*v**2 - 2 Let l(s) = -43*s + 5. Let y(m) = 14*m - 1. Let r(i) = -l(i) - 5*y(i). Let j(h) = 9*h. Determine 17*j(g) + 6*r(g). -9*g Let g(x) = -32*x**2. Let s be 4/(-16) - 43/4. Let q(r) = 5968 + 11*r**2 - 5968. Calculate s*q(m) - 4*g(m). 7*m**2 Let i(q) = 4*q**3 - 15*q**2 + 3. Let g(x) = -3*x**3 + 16*x**2 - 2. Let t be 32/6*(-273)/364. Give t*i(h) - 6*g(h). 2*h**3 - 36*h**2 Let l(d) = 4*d**3 + 35*d**2 - 10580*d. Let t(i) = 3*i**3 + 25*i**2 - 7053*i. Calculate -5*l(c) + 7*t(c). c**3 + 3529*c Let j(h) = 9*h**3 - 4*h**2 - 11414*h - 4. Let y(q) = -7*q**3 + 3*q**2 + 11417*q + 3. Give -3*j(c) - 4*y(c). c**3 - 11426*c Let f(k) = -42*k - 15. Let w(g) = 51*g + 90. Let r be w(-5). Let h be (r/(-22))/(3/(-6)). Let s(p) = -6*p - 2. Calculate h*s(d) + 2*f(d). 6*d Let x(z) = 91*z**2 - 4*z - 9. Let n(w) = -46*w**2 + 2*w + 5. Determine 5*n(v) + 3*x(v). 43*v**2 - 2*v - 2 Let b(d) = 2*d**3 + 321*d**2 - 4. Let j(n) = -2*n**2. Give b(q) - 7*j(q). 2*q**3 + 335*q**2 - 4 Let t(u) = -u**2 - u + 1. Let k(w) = -15*w**2 - 4*w + 2. Suppose -61*n - 72 = 172. What is n*t(a) + k(a)? -11*a**2 - 2 Let l(q) = -15*q**3 + 3*q**2 - 2*q + 3. Let w(a) be the second derivative of 7*a**5/10 - a**4/6 + a**3/3 - a**2 - 34*a - 8. Give 2*l(o) + 3*w(o). 12*o**3 + 2*o Let w(c) = -9*c - 4. Let u(q) = 22*q + 10. Let k(o) = -5*u(o) - 12*w(o). Let t(d) be the first derivative of d**2/2 + d + 53. Determine 4*k(s) + 10*t(s). 2*s + 2 Let j(v) = -5*v + 2. Let m(b) be the first derivative of -5/2*b**2 - 29 + 2*b. What is 4*j(c) - 3*m(c)? -5*c + 2 Let o(t) = 2*t - 10. Let d(f) = 4*f - 21. Give d(l) - o(l). 2*l - 11 Let x(u) = -167*u**3 + 36*u**2 - 2*u - 7. Let s(d) = -d**3 - 7*d**2 + d + 1. What is -5*s(j) - x(j)? 172*j**3 - j**2 - 3*j + 2 Let o(r) = -51*r + 66. Let q(w) = -13*w + 17. Let l(k) = 4*o(k) - 15*q(k). Let n(z) = 5*z - 4. Let h be (-2)/((-51)/(-78) - 2/13). Determine h*l(a) - 9*n(a). -9*a Let l(u) = -2*u**3 - 6*u**2 + 48*u - 140. Let k(m) = m**2 - 8*m - 1. Give -6*k(g) - l(g). 2*g**3 + 146 Let q(r) = 495*r**3 + 3*r**2 - 9*r - 1. Let g(w) = -1980*w**3 - 13*w**2 + 39*w + 3. Determine 3*g(j) + 13*q(j). 495*j**3 - 4 Let s(r) = 12. Let f(l) be the first derivative of l**2/2 - l + 83. Calculate -4*f(w) -
{ "pile_set_name": "DM Mathematics" }