text
stringlengths
1
3.78M
meta
dict
There are kits in Japan to make “butt pudding,” because of course there are. They are available to buy at Amazon Japan. video by bonobos25, GIF via kinokorin via kinokorin
{ "pile_set_name": "OpenWebText2" }
Dale Dougherty Dale Dougherty (born 1955) is a co-founder of O'Reilly Media, along with Tim O'Reilly. While not at the company in its earliest stages as a technical documentation consulting company, Dale was instrumental in the development of O'Reilly's publishing business. He is the author of the O'Reilly book sed & awk. Biography Dougherty was the founder, in 1993, and publisher of the Global Network Navigator (GNN), the first web portal and the first site on the internet to be supported by advertising. In 1995, AOL purchased GNN from O'Reilly & Associates. Part of the transaction included an investment by AOL of $3 million for 20 percent of O'Reilly's Songline Studios, which Dougherty ran. The organization published the Web Review and the Music Critic sites on the Internet. Dougherty helped popularize the term "Web 2.0" at the O'Reilly Media Web 2.0 Conference in late 2004, though it was coined by Darcy DiNucci in 1999. Dougherty is the CEO of Maker Media, a spin-off from O'Reilly Media. The company publishes Make magazine, has an ecommerce site (Makershed), and conducts Maker Faires worldwide. He is considered by some as the Father of the Maker Movement. In 2017 Dougherty came under fire for questioning the authenticity of female maker Naomi Wu. Dougherty publicly apologized to Wu for "my recent tweets questioning your identity," saying they represented a failure to live up to the inclusivity Make magazine should value. Wu herself considers the matter settled. See also Maker culture Makerspace References External links Profile at O'Reilly Network Interview on CNN's The Next List , February 12, 2012 Category:Living people Category:1955 births Category:O'Reilly Media
{ "pile_set_name": "Wikipedia (en)" }
NOT FOR PUBLICATION File Name: 06a0116n.06 Filed: February 14, 2006 No. 05-5447 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, ON APPEAL FROM THE v. UNITED STATES DISTRICT COURT FOR THE WESTERN HONEY LYNN WOLFE, DISTRICT OF KENTUCKY Defendant-Appellee. __________________________________/ BEFORE: SUHRHEINRICH and GRIFFIN, Circuit Judges, and HOOD,* District Judge. SUHRHEINRICH, J., Circuit Judge. The government appeals from an order of the district court suppressing incriminating statements made by Defendant Honey Lynn Wolfe (“Wolfe” or “Defendant”) during a murder investigation of an infant on a U.S. Army base. The issue presented is whether the taint from a temporary detention was sufficiently attenuated that Defendant’s subsequent incriminating statements are admissible in evidence. We hold that it was, and reverse and remand for further proceedings. I. Background Defendant, the wife of an American soldier stationed in Korea, was babysitting three-month- old infant Braydon Grover on the morning of August 6, 2002, at her home on the U.S. Army base at Fort Campbell, Kentucky. Braydon’s mother was stationed at Fort Campbell. At approximately * The Honorable Joseph M. Hood, United States District Judge for the Eastern District of Kentucky, sitting by designation. 10:30 a.m., Defendant called 911 to report that the child had stopped breathing. Paramedics were dispatched to the scene. They transported the child to the base hospital, where he was pronounced dead. At approximately 10:45 a.m., Military Policeman Sergeant Steven Wentzel arrived to investigate. According to Wentzel, Defendant told him that she had put the baby to sleep “at 0600 hours, and placed it face down, boxed in with blankets, because that’s the way the baby likes to sleep.” “She then said that she checked on the baby right before she called 911, because it wasn’t breathing.” “[S]he said at 0730 was the last time she heard the baby cry, because the baby would cry when it wasn’t sleeping.” Wentzel stated that Defendant told him that it normally took the baby about an hour to fall asleep and that “if it wasn’t sleeping it was always crying.” The military policemen secured the scene until agents from the Central Investigations Command (“CID”) arrived. CID Special Agent David Maier arrived at about 11:50 a.m. After being briefed by the military policemen, Maier asked Defendant if he could speak to her, and she agreed. She further agreed to go back to his office to discuss the matter. Maier stated that he did not tell Defendant that she had to go to the CID office. Maier did not read Defendant her Miranda rights at any point. Military police escorted Defendant to the CID office, which is about five minutes away from her home. Defendant was placed in the interview suite. Defendant waited there approximately two hours. The interview began about 2:00 p.m. Maier did not read Defendant her Miranda rights, because in his view, “to that point there was nothing that led me to believe that she had committed any crime.” During the course of the interview, one of Maier’s colleagues, Agent Shawn Burke, returned from the hospital with pictures of the baby, which had been taken at 11:56 a.m. The photographs showed lividity (pooled blood) on both the back and front of the baby. Maier felt that the -2- photographs raised “inconsistencies with the information that she had given me up until that point dealing with the time line and the way that she found the child and how that was inconsistent with the lividity found on the child.” Maier decided to advise Defendant of her Miranda rights, utilizing a DA form 3881, military rights waiver. Defendant stated that she understood her rights and executed the waiver. The interview ended around 4:30 p.m. FBI Special Agent Franklin Charles also interviewed Defendant. Charles asked Defendant if she would be willing to come back to the FBI office and take a polygraph examination, and Defendant assented. She further agreed to wait the three hours it would take for the polygraph examiner, FBI Special Agent Carl Christiansen, to arrive. Charles’ interview with Defendant ended at about 4:30 p.m. While waiting to be transported to the FBI office to take the polygraph examination, Defendant was kept in a locked holding area, which consisted of a room approximately seven feet by twenty feet with a bench. She was allowed to take smoking and bathroom breaks outside the room. The FBI asked Maier to get a written statement from Defendant, which he took at approximately 6:40 p.m. Defendant’s statement read: “I got drilled and questioned about what happened. Then they demanded a lie detector test. Now I’m writing–now I’m waiting on that. I have told the whole truth. No one believes me.” At approximately 7:30 p.m., a CID officer transported Defendant to the FBI office. Agent Charles, who was waiting for Defendant, introduced her to the polygraph examiner, Agent Christiansen. Christiansen testified that he made Defendant aware that she was not under arrest, and that “no matter what happened that evening she was not going to be arrested.” Defendant signed -3- a consent form.1 Christiansen also advised Defendant of her Miranda rights and she signed another form identifying those rights and waiving them, agreeing “to answer questions without a lawyer present.” The questioning and advice prior to the commencement of the polygraph examination took approximately an hour and a half. The polygraph examination itself lasted approximately fifteen minutes. The room where the questioning and examination took place was locked from the outside, but anyone inside the room could get out. After Christiansen analyzed the results of the polygraph examination, he concluded Defendant was lying about the day’s events. Christiansen told Defendant that, in his opinion, she was not being truthful, and that he “wanted to talk to her about that and try to figure out why she didn’t do well on the test.” Christiansen then questioned her for several more hours. Christiansen said that Defendant changed her story a number of times during this period of questioning, but that she eventually told him that she may have wrapped the baby so tight in a blanket that it stopped breathing.2 At this point, Christiansen called Agent Charles into the room. Christiansen asked 1 The consent form explained: “You have the right to refuse to take the polygraph test. If you agree to take the polygraph test, you have the right to stop the test at any time. If you agree to take the polygraph test, you have the right to refuse to answer any individual questions.” The consent form also contained the following acknowledgments: “I have read this statement of my rights and I understand what my rights are. I voluntarily agree to be examined by means of the polygraph during this interview. I understand what I am doing. No threats or promises have been used against me to obtain my consent to use the polygraph.” 2 The district court noted that in his notes, Christiansen recorded that Defendant agreed with him that she was in bed sleeping and that she snapped when the baby was crying and suffocated him. During the suppression hearing, however, Christiansen stated that Defendant volunteered the statement, rather than merely agreeing with his statement of the purported events. The court noted that Christiansen’s choice of words in his notes was ambiguous, in that one could agree with a statement and also freely volunteer a statement. On the other hand, “the choice could have significance.” The court also found that there was a credibility issue–namely between Christiansen’s account that Defendant’s denial that she made a confession at all. -4- Defendant to repeat to Charles what she allegedly had told to him. Defendant refused to say anything and the interview was terminated, at approximately 3:00 a.m. On November 5, 2003, Defendant was indicted on one count of second-degree murder, in violation of 18 U.S.C. § 1111. Defendant moved to suppress all statements that she made to the investigators. The government opposed the motion, arguing that Defendant’s “temporary detention” at the CID office “was supported by probable cause” and that “her statements to law enforcement authorities . . . should be admitted because they were entirely voluntary and consistent with her written waivers of her Miranda rights.” After holding an evidentiary hearing, the district court granted Defendant’s motion to suppress. The court found that Defendant “voluntarily agreed to go” to the CID office and was not under arrest when she was transported to the CID. The district court further found that Defendant was placed in custody when her Miranda rights were read to her at about 2:25 p.m. The district court held that the government did not have probable cause to arrest Defendant at that time. Specifically, the court determined that the photographs of the baby showing pooled blood on both the baby’s front and back were “not sufficient to establish probable cause,” because “they did not show that Ms. Wolfe had done anything wrong nor . . . lead to a reasonable conclusion that Ms. Wolfe’s statements were inconsistent.” The court held that the prosecution had not identified what statements made by Defendant led Maier to believe that she was not telling the truth, and, in fact, Maier had actually testified that Defendant “‘continued to provide [him] the same time lines of her story for the duration of [his] portion of the interview.’” Thus, the district court ruled that the prosecution had not met its burden of showing that there were inconsistencies within Defendant’s statements to justify Maier’s finding of probable cause. The district court therefore -5- concluded that Defendant was the victim of an illegal arrest that lacked probable cause, and that, as a result, her subsequent statements must be suppressed. Although it suppressed Defendant’s statements, the district court also made a finding that they were voluntary under the Fifth Amendment. The court felt that the length of the interrogation, the location of the interrogation, and the continuity of the interrogation were all factors that weighed in favor of finding the alleged confession was involuntary, but that the totality of the circumstances, did not demonstrate that Ms. Wolfe was coerced into an alleged confession. “Ms. Wolfe was read her Miranda rights, she was not mistreated in anyway [sic], she had a high school degree with some college education, she was 31 years old and married, and there is no basis for finding that the officers used coercive techniques.” The court granted the motion to suppress, however, “because Ms. Wolfe was arrested without probable cause.” The government moved for reconsideration, arguing that even if Defendant had been illegally arrested at the CID office, her statements at the FBI office were purged of any taint of that illegality because of intervening events and the passage of time, so that her subsequent statements to the FBI polygraph examiner should be admissible. The district court denied the government’s motion for reconsideration. The district court stated in pertinent part: The Supreme Court found that police misconduct . . . does not have to include physical abuse or a confession that was involuntary under the Fifth Amendment. Taylor v. Alabama, 457 U.S. 687, 693 (1982). Instead, it is enough that an interrogation takes place “in the hope that something would turn up.” Id. That is exactly what happened in this case. Ms. Wolfe was interrogated for hours by several different investigators hoping that they would get a “breakthrough.” The Supreme Court also noted that a longer length of time does not make a significant impact as an intervening circumstance where as here the defendant was in polic[e] custody, unrepresented by counsel, and questioned on several occasions. Id. at 691. After 2:25 p.m., Ms. Wolfe was in continuous custody and was being transported by officers, locked in a cell, interrogated, or [sic] given a break upon her request. Ms. Wolfe was not represented by counsel. In contrast to the Government’s assertion -6- that Ms. Wolfe should have felt she was free to go, when Ms. Wolfe was asked to make a statement, she stated that the officers had demanded that she take a polygraph. No intervening circumstances have purged the taint from Ms. Wolfe’s illegal arrest. The United States appeals both rulings. II. Analysis A. Standard of Review This court reviews a district court’s findings of fact in a suppression hearing for clear error and its conclusions of law de novo. United States v. Lopez-Arias, 344 F.3d 623, 627 (6th Cir. 2003). B. Merits The government concedes that Defendant was unlawfully detained at the CID office when she was kept in a locked room for several hours while she waited to be transported to the FBI office to take the polygraph examination. The government further assumes for purposes of this appeal that there were insufficient grounds to detain her at that time. Notwithstanding, the government argues that Defendant’s inculpatory statements were not causally related to her period of detention at the CID office. Specifically, the government maintains that even if Defendant was unlawfully detained when she was held in a locked room at the CID office, the admissions she made at the FBI office approximately six hours later, after she failed the polygraph examination, were not the fruit of that unlawful detention. The government claims that the mild nature of the detention and its benign purpose, as well as the events intervening between that detention and Defendant’s admissions, establish that her admissions were sufficient acts of free will to purge the taint of any unlawful detention. See Brown v. Illinois, 422 U.S. 590, 602 (1975). -7- An illegal detention or arrest does not render all subsequently discovered evidence inadmissible per se. Wong Sun v. United States, 371 U.S. 471 (1963). Rather, the question is “whether, granting establishment of the primary illegality, the evidence . . . has been come at by exploitation of that illegality or instead by means sufficiently distinguishable to be purged of the primary taint.” Id. at 488 (quotation omitted). Thus, a confession obtained through custodial interrogation following an illegal arrest in violation of the Fourth Amendment must be excluded from evidence unless the confession was “‘sufficiently an act of free will to purge the primary taint.’” Brown, 422 U.S. at 602 (quoting Wong Sun, 371 U.S. at 486). The threshold requirement for admissibility under Brown is that the confession must have been voluntary for purposes of the Fifth Amendment. Id. at 601-02. The Brown Court also articulated a number of factors that a court should take into account in determining the admissibility of a confession following a custodial arrest: The Miranda warnings are an important factor, to be sure, in determining whether the confession is obtained by exploitation of an illegal arrest. But they are not the only factors to be considered. The temporal proximity of the arrest and the confession, the presence of intervening circumstances, and, particularly, the purpose and flagrancy of the official misconduct are all relevant. Brown, 422 U.S. at 603-04 (internal citations omitted). The government has the burden of proving the admissibility of a confession following an illegal arrest. Kaupp v. Texas, 538 U.S. 626, 633 (2003) (per curiam) 1. Voluntariness As noted, the threshold issue for admission under Brown is that the confession must have been voluntary for purposes of the Fifth Amendment. Brown, 422 U.S. at 602; accord United States v. Reed, 349 F.3d 457, 463 (7th Cir. 2003). The district court found that Defendant’s incriminatory -8- statements at the FBI office were voluntary under Fifth Amendment principles. As noted above, the court ruled that the totality of the circumstances did not demonstrate that Defendant was coerced into an alleged confession because she received her Miranda warnings, was not mistreated or subjected to coercive tactics, and has a high school education. Defendant does not contest this ruling. Thus, this factor supports the admission of Defendant’s alleged confession. With this in mind, we turn to the other Brown factors. 2. Temporal Proximity Before discussing the second Brown factor, we must consider the government’s argument concerning the establishment of the primary illegality, namely that Defendant was not in custody until around 4:30 p.m., when she was placed in the locked holding cell, and not at 2:30 p.m., after she was shown the photographs and read her Miranda rights, as the district court held. a. In Custody First, the government challenges the district court’s ruling that Defendant was “in custody by the time Agent Maier gave her the Miranda warnings at 2:25 p.m.” The government contends that Defendant was not detained prior to being confined in the locked holding area at the CID office. While it is true that Miranda warnings are required when “a suspect’s freedom of action is curtailed to a ‘degree associated with a formal arrest,’” Berkemer v. McCarty, 468 U.S. 420, 440 (1984) (quoting California v. Beheler, 463 U.S. 1121, 1125 (1983) (per curiam)), the mere reading of Miranda warnings does not convert a noncustodial interview into a custodial interrogation, United States v. Lewis, 556 F.2d 446, 449 (6th Cir. 1977) (per curiam) (“The precaution of giving Miranda rights in what is thought could be a non-custodial interview should not be deterred by -9- interpreting the giving of such rights as a restraint on the suspect, converting a non-custodial interview into a custodial interrogation for Miranda purposes.”). The district court’s ruling that Defendant was in custody at the CID office when she was read her Miranda rights at approximately 2:25 p.m. was based on the view that custody resulted from Maier’s act of giving those warnings and Maier’s subjective belief that he had probable cause to arrest her. This ruling is contrary to both Lewis and Berkemer. See Berkemer, 468 U.S. at 442 (officer’s subjective intention “has no bearing on the question whether a suspect is ‘in custody’”).3 Also, the fact Maier confronted Defendant with the photographs and indicated that he thought she was lying also does not, without more, transform the encounter into a custodial interrogation. Cf. Oregon v. Mathiason, 429 U.S. 492, 495-96 (1977) (per curiam) (stating that an officer’s false statement about having discovered the suspect’s fingerprints at the scene had “nothing to do with whether respondent was in custody for purposes of the Miranda rule”). Further, nothing in the record suggests that a reasonable person in Defendant’s position would believe that he or she was being detained or compelled to answer Maier’s questions. Rather, the record shows that Maier’s interview with Defendant, even after Maier gave her the Miranda warnings, was “a calm exchange between two people trying to ascertain what had happened.” Cf. United States v. Drayton, 536 U.S. 194, 204 (2002) (holding that an encounter was consensual, 3 Defendant contends that Lewis is distinguishable because the suspect in that case came by himself to the interview, was given his Miranda warnings prior to any discussion, and no new information was presented during the questioning. See Lewis, 556 F.2d at 447. Here, by contrast, Defendant was taken to the CID office in her pajamas and questioned for some time before Maier read Defendant her Miranda warnings and confronted her with the pictures of the dead child. Defendant’s argument must be rejected. Most importantly, the district court found as a matter of fact that Defendant voluntarily accompanied the officers to the CID office. Thus, the fact that she did not drive herself is immaterial. -10- despite the suspect’s subjective belief that he must cooperate, because the officers did nothing that objectively made the encounter coercive: “no application of force, no intimidating movement, no overwhelming show of force, no brandishing of weapons, no blocking of exits, no threat, no command, not even an authoritative tone of voice”). b. Temporal Relationship Brown also directs courts to consider the temporal proximity of the arrest and the confession. Brown, 422 U.S. at 603. However, “there is no ‘bright-line’ test for temporal proximity.” United States v. Reed, 349 F.3d 457, 463 (7th Cir. 2003) (citations omitted). Here, the time between the initiation of the illegal detention and the alleged confession was almost ten hours. Although longer than the period of time in Brown, see Brown, 422 U.S. at 604-05 (less than two hour interval between illegal arrest and first statement with no intervening event “of significance whatsoever” not sufficient to cure taint), and Dunaway, see Dunaway v. New York, 442 U.S. 200, 218 (1979) (two hour interval with no intervening event of significance; holding that taint was not cured), the time frame here is still within the ambit of that in Taylor, see Taylor v. Alabama, 457 U.S. 687, 691 (1982) (holding that six hour length of time between illegal arrest and confession was not a significant amount of time to break the connection between the illegal arrest and the petitioner’s confession where the petitioner was in police custody, without counsel, was questioned on several occasions, fingerprinted, and subjected to a lineup). We therefore consider the temporal proximity factor in conjunction with any intervening circumstances. See Reed, 349 F.3d at 464. 3. Intervening Circumstances Next, Brown directs courts to consider whether any circumstances intervened between the initial detention and the challenged statements. As noted, the Supreme Court has observed that the -11- mere giving of Miranda warnings does not sufficiently break the connection between the illegal detention and the confession or search. Taylor, 457 U.S. at 691 (holding that three Miranda warnings did not sufficiently purge the taint of the illegal arrest). Instead, there must be present intervening events that sever the causal connection between the illegal arrest or search and the discovery of the incriminating evidence. See, e.g., Rawlings v. Kentucky, 448 U.S. 98,108-09 (1980) (discovery of other incriminating evidence was attenuating circumstance); Wong Sun, 371 U.S. at 491 (holding that confession made several days after illegal arrest and preceded by arraignment and release from custody was admissible); cf. Reed, 349 F.3d at 464 (holding that non-confrontational interviews between the defendant and police, and the defendant’s periods of solitary reflection combined with fact that confession occurred within six hours of illegal arrest was not sufficient to sever the connection). The government claims that there are two intervening events of significance. First, it claims that Defendant’s unlawful detention ended when she arrived at the FBI office and was told by Christiansen that she was not under arrest, that she was free to leave at any time, and that she would not be arrested in any event. Second, the government claims that Defendant’s admissions were the result of being told that she failed the polygraph examination, which she voluntarily agreed to take, and not the result of her detention at the CID office. The district court did not address the events at the FBI office, but simply held that Defendant was in continuous custody after 2:25 p.m. Defendant, for her part, states that she did not consent to take a polygraph, pointing to her handwritten statement that the officers “demanded” a polygraph. Nonetheless, Defendant did sign a “Consent to Interview With Polygraph” form, which explicitly provided that: “I voluntarily agree to be examined by means of the polygraph. . . . No threats or -12- promises have been used against me to obtain my consent.” Furthermore, and most importantly, as the district court found, Defendant agreed to take the polygraph examination and further agreed to wait three hours for the polygraph examiner to arrive. We hold that these voluntary decisions by Defendant –to take the polygraph examination (both times), and to wait three hours for the polygraph examiner–were acts of free will sufficient to purge the taint of the illegal arrest. The government cites as the second intervening circumstance the polygraph examination, or more precisely, Defendant’s reaction to the results of the polygraph examination. It is apparent that Defendant’s allegedly incriminatory admissions were triggered by the information that she failed the polygraph examination, and not by the fact that she was illegally detained for three hours while voluntarily waiting for the polygraph examiner nearly ten hours earlier. She maintained her exculpatory explanation throughout the day to each of the officers who questioned her, including Christiansen. Defendant only allegedly began to change her story after Christiansen told her she had failed the polygraph examination. Furthermore, she had no difficulty ending the interview at 3:00 a.m. In short, as the district court found this was not a situation were “a defendant’s will [had] been overcome and a false confession obtained.” In sum, we conclude that Defendant’s consent to take the polygraph examination, both at 4:30 p.m. and again when she signed the consent form, and her agreement to wait three hours for the examiner, were “intervening independent act[s] of free will to purge the primary taint” of the illegal detention. The district court erred in concluding otherwise. 4. Purpose and Flagrancy of Police Misconduct Fourth, Brown requires consideration of the purpose and flagrancy of the official misconduct. Brown, 422 U.S. at 604. This factor is considered “particularly” important, see Brown, 422 U.S. at -13- 604; United States v. Fazio, 914 F.2d 950, 958 (7th Cir. 1990) (citing Brown), because it is linked directly to the rationale underlying the exclusionary rule–deterrence of police misconduct, Reed, 349 F.3d at 465 (citing Brown, 422 U.S. at 600); Reed, 349 F.3d at 464-65; Fazio, 914 F.2d at 958. Relevant considerations include whether “the arrest, both in design and in execution, was investigatory,” Brown, 422 U.S. at 605, and also whether the arrest was calculated “to cause surprise, fright, and confusion,” id. This factor weighs against suppression. Defendant was not questioned during the period she was illegally detained, and she was not questioned at the FBI office until after she was again advised that she was not under arrest. Cf. Taylor, 457 U.S. at 691 (finding purposeful misconduct because in a six-hour period between the illegal arrest and confession, the petitioner was unrepresented by counsel, questioned on several occasions, fingerprinted, and subjected to a lineup). The conditions of Defendant’s detention in the locked holding area at the CID office were mild. She was never placed under arrest, handcuffed, or even placed in a traditional cell. It is clear that the purpose of this detention was merely to await the arrival of the polygraph examiner at the FBI office, and Defendant had already agreed to undergo a polygraph examination. Thus, the police misconduct in this case was not flagrant or purposeful in the sense that the officers used the period of the illegal detention to procure a confession. This was not a situation where the defendant was unlawfully detained for interrogation in the hope that something would “turn up.” See Kaupp, 538 U.S. at 628-33 (officers removed the petitioner from his home in the middle of the night without any probable cause); Taylor, 457 U.S. at 693 (finding flagrancy in the fact that police effectuated an investigatory arrest without probable cause, based on an uncorroborated informant’s tip, and involuntarily transported the defendant to -14- the police station for interrogation in the hope that “something would turn up”); Dunaway, 457 U.S. at 218 (holding that the petitioner was seized without probable cause based only on a tip from a jail inmate that admittedly did not supply enough information to obtain a warrant, brought to police headquarters and placed in an interrogation room where he was questioned “in the hope that something might turn up,” and confessed without any intervening circumstances); Brown, 422 U.S. at 605 (finding that the illegality had a quality of purposefulness, that the impropriety of the arrest was obvious from the detectives’ concession that the arrest was investigatory; officers admitted lack of any probable cause to arrest, let alone remove suspect from his residence); cf. Lopez-Arias, 344 F.3d at 630 (finding that illegality of the arrest was “blatant,” and cases discussed therein). Defendant was the only eye witness to the alleged crime, and was therefore naturally a suspect. She volunteered at the outset that the baby had been crying. Even at that, as the district court found, initially the officers did not detain her in any way, and she voluntarily agreed to go to the CID office to make a statement. She was seated in the waiting room until Maier arrived at the CID office. Most importantly, Defendant was not questioned during the three-hour period when she waited for the polygraph examiner to arrive. Under these circumstances, it cannot be said that the illegal detention was an attempt to obtain evidence by “exploitation.” See Fazio, 914 F.2d at 958. “Because the primary purpose of the exclusionary rule is to discourage police misconduct, application of the rule does not serve this deterrent function when the police action, although erroneous, was not undertaken in an effort to benefit the police at the expense of the suspect’s protected rights.” Id. As in Rawlings, “the conduct of the police here does not rise to the level of conscious or flagrant misconduct requiring prophylactic exclusion of petitioner’s statements.” Rawlings, 448 U.S. at 110. -15- Defendant’s illegal detention lacks the “quality of purposefulness” condemned in Brown. See Brown, 422 U.S. at 605. Nor do the circumstances indicate that the manner of Defendant’s detention was “calculated to cause surprise, fright, or confusion.” Id. In short, this factor, the “most important” factor, Reed, 349 F.3d at 464, reinforces the conclusion that Defendant’s alleged statements4 were the act of free will and not the product of an illegal detention. III. Conclusion For the foregoing reasons, this matter is REVERSED and REMANDED for further proceedings consistent with this opinion. 4 As the district court observed, there is a credibility issue on this point that can be presented to the finder of fact. -16-
{ "pile_set_name": "FreeLaw" }
Improvement of response time with an additional bias beam in a BaTiO(3) self-pumped phase-conjugate mirror. Improvement of the response time of the BaTiO(3) self-pumped phase-conjugate mirror is demonstrated with a simple configuration. It is based on beam amplification in the crystal driven by an additional bias beam.
{ "pile_set_name": "PubMed Abstracts" }
#!/usr/bin/perl =head1 NAME Iplogs =cut =head1 DESCRIPTION unit test for Iplogs =cut use strict; use warnings; use DateTime; use DateTime::Format::Strptime; use lib '/usr/local/pf/lib'; use pf::ip4log; use pf::dal::ip4log; use pf::dal::ip4log_history; use pf::dal::ip4log_archive; BEGIN { #include test libs use lib qw(/usr/local/pf/t); #Module for overriding configuration paths use setup_test_config; } use Test::More tests => 34; use Test::Mojo; use Test::NoWarnings; my $t = Test::Mojo->new('pf::UnifiedApi'); #pre-cleanup pf::dal::ip4log->remove_items(); pf::dal::ip4log_history->remove_items(); pf::dal::ip4log_archive->remove_items(); #run unittest on empty dB $t->get_ok('/api/v1/ip4logs' => json => { }) ->json_is('/items',[]) ->status_is(200); #setup data my $ip = '0.0.0.1'; my $mac = '00:01:02:03:04:05'; my $escaped_mac = '00%3A01%3A02%3A03%3A04%3A05'; my $lease_length = 120; my $dt_format = DateTime::Format::Strptime->new(pattern => '%Y-%m-%d %H:%M:%S'); my $dt_start = DateTime->now(time_zone=>'local'); my $dt_end = DateTime->now(time_zone=>'local')->add(seconds => $lease_length); #insert good data my $status = pf::ip4log::open($ip, $mac, $lease_length); #run unittest on single dB entry $t->get_ok('/api/v1/ip4logs') ->status_is(200) ->json_is('/items/0/mac',$mac) ->json_is('/items/0/ip',$ip) ->json_has('/items/0/start_time') ->json_has('/items/0/end_time') ; #run unittest on list by mac $t->get_ok('/api/v1/ip4logs/open/'.$mac) ->status_is(200) ->json_is('/item/ip',$ip) ->json_is('/item/mac',$mac) ->json_has('/item/start_time') ->json_has('/item/end_time') ; #run unittest on list by mac $t->get_ok('/api/v1/ip4logs/open/'.$escaped_mac) ->status_is(200) ->json_is('/item/ip',$ip) ->json_is('/item/mac',$mac) ->json_has('/item/start_time') ->json_has('/item/end_time') ; #run unittest on history list by mac $t->get_ok('/api/v1/ip4logs/history/'.$mac => json => { }) ->status_is(200) ->json_is('/items/0/ip',$ip) ->json_is('/items/0/mac',$mac) ->json_has('/items/0/start_time') ->json_has('/items/0/end_time') ; #run unittest on archive list by mac $t->get_ok('/api/v1/ip4logs/archive/'.$mac => json => { }) ->json_is('/items/0/ip',$ip) ->json_is('/items/0/mac',$mac) ->json_has('/items/0/start_time') ->json_has('/items/0/end_time') ->status_is(200) ; #debug output #my $j = $t->tx->res->json; #use Data::Dumper;print Dumper($j); #post-cleanup pf::dal::ip4log->remove_items(); pf::dal::ip4log_history->remove_items(); pf::dal::ip4log_archive->remove_items(); =head1 AUTHOR Inverse inc. <info@inverse.ca> =head1 COPYRIGHT Copyright (C) 2005-2020 Inverse inc. =head1 LICENSE This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. =cut 1;
{ "pile_set_name": "Github" }
Mucosal immunity: overcoming the barrier for induction of proximal responses. Vaccination represents one of the most efficacious and cost-effective medical interventions. It is the only medical intervention proven to eliminate disease at a global level. Many of the pathogens against which we most require adequate vaccines infect via the highly exposed mucosal surfaces. For this reason the mucosa is often considered the first, and sometimes only, line of defense. Therefore, responses that protect the local mucosa are vital. In this review, we first explore the immunological mechanisms that protect the mucosa. We then review the literature of mucosal vaccines within the principles of antigenic composition, dose, and danger, highlighting the need and niche for the next generation of mucosal vaccines.
{ "pile_set_name": "PubMed Abstracts" }
List of public art in Sylt This is a list of public art, including dolmen, on the island of Sylt. Archsum Kampen Keitum Westerland Misc Sylt Public art
{ "pile_set_name": "Wikipedia (en)" }
Circulating zinc-α2-glycoprotein is reduced in women with polycystic ovary syndrome, but can be increased by exenatide or metformin treatment. The study was to investigate circulating zinc-α2-glycoprotein (ZAG) concentrations in women with PCOS, and changes in ZAG levels after exenatide or metformin treatment. One hundred eighty-two women with polycystic ovary syndrome (PCOS) who met the 2003 Rotterdam diagnostic criteria and 150 controls without PCOS were recruited. We partitioned women with PCOS into groups according to body mass index or blood glucose concentrations, determined serum ZAG, anthropometric parameters, metabolic and endocrine indicators, and inflammatory markers, and statistically analyzed the results. Eighty-two overweight/obese subjects of the recruited women with PCOS were then randomly assigned to groups administered either 12 weeks of exenatide injection (10 μg b.i.d.) or oral metformin (1,000 mg b.i.d.). Circulating ZAG levels were determined after 12 weeks of treatment. The results showed that circulating ZAG was significantly lower in PCOS women than in healthy women (p < 0.01). Overweight/obese women and those with higher blood glucose levels had lower circulating ZAG. After 12 weeks of exenatide or metformin treatment, there were significant increases (p < 0.01) in circulating ZAG in both treatment groups (the exenatide baseline level was 46.54 ± 2.38 ng/mL vs. 56.41 ± 2.02 ng/mL after treatment, p < 0.01; metformin baseline was 47.81 ± 2.14 ng/mL vs. 55.67 ± 2.01 ng/mL after treatment, p < 0.01), however there was no statistical difference between the 2 treatments (p > 0.05). Circulating ZAG is closely related to PCOS and could be an important adipokine involved in the occurrence and development of PCOS. ZAG might possibly be applicable as a new observational indicator in the treatment of PCOS.
{ "pile_set_name": "PubMed Abstracts" }
Art reception to display winners' work January 6, 2012 Martin Luther King Jr. poster contest submission Students who took top honors in the 2012 Martin Luther King Jr. poster and essay contests will have their work displayed during a reception Tuesday, Jan. 17, from 4 to 6 p.m. in Perspective Gallery in Squires Student Center at Virginia Tech. This year 26 schools submitted over 500 posters and essays. This is the largest participation the Office for Diversity and Inclusion has had since the inception of the contests. This year’s theme, "Life’s most persistent and urgent question is, what are you doing for others?," was taken from a sermon King delivered in which he challenged people to reflect on how they live their lives. The theme guided students to create posters and write essays that expressed how they have or would like to help others in their community. The winning posters and essays will be displayed Jan. 17 though Feb. 4 at Perspective Gallery. The gallery is open Tuesday through Saturday from noon until 9 p.m. and Sunday from noon until 7 p.m. Posters are judged on how effectively the artwork expresses individuality through unique ideas, how the artwork illustrates imaginative and meaningful ideas, and how well the artwork relates to the theme. Essays are judged on how well the student articulates imaginative, thoughtful perspectives and insights to describe a personal plan of action that corresponds to the theme; whether the essay contains proper grammar; and if the essay has a coherent topic that includes an introduction, body, and conclusion. The purpose of the poster and essay contests is to encourage students to think critically about King’s legacy. First, second, and third place winners in each grade will receive a U.S. savings bond and be recognized at the annual community brunch that is scheduled for Jan. 16 at The Inn at Virginia Tech and Skelton Conference Center. Dedicated to its motto, Ut Prosim (That I May Serve), Virginia Tech takes a hands-on, engaging approach to education, preparing scholars to be leaders in their fields and communities. As the commonwealth’s most comprehensive university and its leading research institution, Virginia Tech offers 240 undergraduate and graduate degree programs to more than 31,000 students and manages a research portfolio of $513 million. The university fulfills its land-grant mission of transforming knowledge to practice through technological leadership and by fueling economic growth and job creation locally, regionally, and across Virginia.
{ "pile_set_name": "Pile-CC" }
Nonimmune complexed HCV RNA titer in serum as a predictor of interferon response in patients with chronic hepatitis C. Hepatitis C virus (HCV) has been reported to exist in the circulation of patients in various forms such as free virions, immune complexes, and nucleocapsids. To clarify the clinical significance of serum HCV titers according to the forms of virus particles, we evaluated the immune complexed (IC) and nonimmune complexed (NIC) HCV RNA titers in 77 chronic hepatitis patients treated with interferon (IFN). IC and NIC forms in pretreatment serum were separated by immunoprecipitation using antihuman immunoglobulin antibody, and quantified by reverse transcription polymerase chain reaction. Serum titers of NIC HCV RNA were correlated with those of whole serum HCV RNA (r = 0.96, p < 0.01) and IC HCV RNA (r = 0.98, p < 0.01), but they were not with the aminotransferase levels, gamma-globulin concentration, and grading or staging of liver histology. Nonresponders to IFN had significantly high NIC HCV RNA titers compared with sustained responders (10(4.93 +/- 0.81) copies/ml vs 10(4.06 +/- 0.69) copies/ml, p < 0.01). It is noteworthy that the relative amount of NIC HCV RNA to whole serum HCV RNA was also significantly higher in nonresponders than in sustained responders (0.66 +/- 0.10 vs 0.50 +/- 0.11, p < 0.0001). Multivariate analysis showed that low NIC HCV RNA titer (p < 0.01) and genotype 2 (p = 0.02) were independent variables contributing to sustained response to IFN, but the whole serum HCV RNA titer was not. Pretreatment NIC HCV RNA titer is a more reliable predictive marker than genotype or whole serum HCV RNA of a sustained response to IFN monotherapy. This finding suggests that humoral immunity may affect the response to IFN.
{ "pile_set_name": "PubMed Abstracts" }
module("Keyboard"); (function () { test("Document keypress event binding", function () { /* Initialization */ $('#t').append('<img id="test-img" src="data/elephant.jpg" />'); stop(); var keyPressed = false; $(document).bind('keydown keypress', function () { keyPressed = true; }); $('#test-img').imgAreaSelect({ onInit: function (img, selection) { $(document).keydown(); $(document).keypress(); ok(keyPressed, 'Check if the original document keypress/keydown ' + 'event handler is called after plugin initialization'); $('#test-img').imgAreaSelect({ remove: true }); testCleanup(); start(); } }); }); })();
{ "pile_set_name": "Github" }
Rat jejunal absorptive function after intestinal transplantation. Effects of extrinsic denervation. Jejunal absorptive function was evaluated following small intestinal transplantation to determine the effects of extrinsic denervation. In particular, water and sodium absorption were measured following transplantation (denervated) and compared to a control group (Thiry-Vella). Water flow was initially secretory two days after transplantation (-41 +/- 27 microliters/min/g dry tissue weight) but became absorptive at day 8 (25 +/- 25). Water flow in the Thiry-Vella group was not significantly different (P > 0.05) from the transplant group at days 8 (17 +/- 7) and 10 (47 +/- 42). Sodium flows were also initially secretory in the transplant group and became absorptive. This study refutes previous claims that small bowel transplants have a deficiency of water absorption due to extrinsic denervation of the bowel and suggests normal absorptive function of water, electrolytes, and protein.
{ "pile_set_name": "PubMed Abstracts" }
Leukocyte adhesion in local versus hemorrhage-induced ischemia. The objective of this study was to compare the leukocyte-endothelial cell adhesive interactions elicited in postcapillary venules by either local ischemia-reperfusion or hemorrhage-reperfusion. Leukocyte rolling, adherence, and emigration were monitored in cat mesenteric venules exposed to an 85% reduction in blood flow (induced by either hemorrhage or local restriction of arterial inflow) for 1 h, followed by 1 h reperfusion. Leukocyte-endothelial cell interactions, venular diameter, and red blood cell velocity were measured during baseline, ischemia, and reperfusion periods. Both local and hemorrhage-induced ischemia reperfusion caused a reduction in leukocyte rolling velocity and increases in leukocyte adherence and emigration. Quantitatively, the adherence and emigration responses in both ischemia models were nearly identical. However, the two models differed in their response to immunoneutralization of the leukocyte adhesion glycoprotein CD11/CD18 with monoclonal antibody (MAb) IB4. The MAb had a more profound effect in attenuating leukocyte adherence and emigration in the local ischemia model. These results indicate that different factors may contribute to leukocyte-endothelial cell adhesive interactions observed in local vs. systemic models of ischemia-reperfusion.
{ "pile_set_name": "PubMed Abstracts" }
1. Field This invention relates generally to the field of network communications and more particularly to the field of communications over a network with a gaming machine. 2. Description of Related Art Wagering game makers continually provide new and entertaining games. One way of increasing entertainment value associated with casino-style wagering games (e.g., video slots, video poker, video black jack, and the like) includes offering a base game and a variety of bonus events. However, despite the variety of bonus events, players often lose interest in repetitive gaming content. In order to maintain player interest, wagering game machine makers frequently update game themes, game settings, bonus events, and other gaming content. In order to satisfy player demands, gaming machine operators continuously license and deploy new gaming content to gaming machines operating in the field. Gaming machine operators typically update gaming content by manually delivering updated gaming content to each gaming machine. For example, when a gaming machine's gaming content becomes undesirable or a license expires, an operator typically replaces existing media (e.g. ROM, CD-ROM, or flash RAM) with new media containing updated gaming and licensing content. For gaming machine operators owning scores of machines, this process can be laborious and expensive.
{ "pile_set_name": "USPTO Backgrounds" }
// Copyright (c) 2017 The Chromium Embedded Framework Authors. All rights // reserved. Use of this source code is governed by a BSD-style license that // can be found in the LICENSE file. // // --------------------------------------------------------------------------- // // This file was generated by the CEF translator tool. If making changes by // hand only do so within the body of existing method and function // implementations. See the translator.README.txt file in the tools directory // for more information. // #include "libcef_dll/cpptoc/views/browser_view_cpptoc.h" #include "libcef_dll/cpptoc/views/button_cpptoc.h" #include "libcef_dll/cpptoc/views/label_button_cpptoc.h" #include "libcef_dll/cpptoc/views/menu_button_cpptoc.h" #include "libcef_dll/cpptoc/views/panel_cpptoc.h" #include "libcef_dll/cpptoc/views/scroll_view_cpptoc.h" #include "libcef_dll/cpptoc/views/textfield_cpptoc.h" #include "libcef_dll/cpptoc/views/view_cpptoc.h" #include "libcef_dll/cpptoc/views/window_cpptoc.h" #include "libcef_dll/ctocpp/views/view_delegate_ctocpp.h" namespace { // MEMBER FUNCTIONS - Body may be edited by hand. cef_label_button_t* CEF_CALLBACK button_as_label_button( struct _cef_button_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefLabelButton> _retval = CefButtonCppToC::Get(self)->AsLabelButton( ); // Return type: refptr_same return CefLabelButtonCppToC::Wrap(_retval); } void CEF_CALLBACK button_set_state(struct _cef_button_t* self, cef_button_state_t state) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(self)->SetState( state); } cef_button_state_t CEF_CALLBACK button_get_state(struct _cef_button_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CEF_BUTTON_STATE_NORMAL; // Execute cef_button_state_t _retval = CefButtonCppToC::Get(self)->GetState(); // Return type: simple return _retval; } void CEF_CALLBACK button_set_ink_drop_enabled(struct _cef_button_t* self, int enabled) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(self)->SetInkDropEnabled( enabled?true:false); } void CEF_CALLBACK button_set_tooltip_text(struct _cef_button_t* self, const cef_string_t* tooltip_text) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Verify param: tooltip_text; type: string_byref_const DCHECK(tooltip_text); if (!tooltip_text) return; // Execute CefButtonCppToC::Get(self)->SetTooltipText( CefString(tooltip_text)); } void CEF_CALLBACK button_set_accessible_name(struct _cef_button_t* self, const cef_string_t* name) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Verify param: name; type: string_byref_const DCHECK(name); if (!name) return; // Execute CefButtonCppToC::Get(self)->SetAccessibleName( CefString(name)); } cef_browser_view_t* CEF_CALLBACK button_as_browser_view( struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefBrowserView> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->AsBrowserView(); // Return type: refptr_same return CefBrowserViewCppToC::Wrap(_retval); } cef_button_t* CEF_CALLBACK button_as_button(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefButton> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->AsButton(); // Return type: refptr_same return CefButtonCppToC::Wrap(_retval); } cef_panel_t* CEF_CALLBACK button_as_panel(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefPanel> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->AsPanel(); // Return type: refptr_same return CefPanelCppToC::Wrap(_retval); } cef_scroll_view_t* CEF_CALLBACK button_as_scroll_view( struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefScrollView> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->AsScrollView(); // Return type: refptr_same return CefScrollViewCppToC::Wrap(_retval); } cef_textfield_t* CEF_CALLBACK button_as_textfield(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefTextfield> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->AsTextfield(); // Return type: refptr_same return CefTextfieldCppToC::Wrap(_retval); } cef_string_userfree_t CEF_CALLBACK button_get_type_string( struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefString _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetTypeString(); // Return type: string return _retval.DetachToUserFree(); } cef_string_userfree_t CEF_CALLBACK button_to_string(struct _cef_view_t* self, int include_children) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefString _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ToString( include_children?true:false); // Return type: string return _retval.DetachToUserFree(); } int CEF_CALLBACK button_is_valid(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsValid(); // Return type: bool return _retval; } int CEF_CALLBACK button_is_attached(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsAttached(); // Return type: bool return _retval; } int CEF_CALLBACK button_is_same(struct _cef_view_t* self, struct _cef_view_t* that) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: that; type: refptr_same DCHECK(that); if (!that) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsSame( CefViewCppToC::Unwrap(that)); // Return type: bool return _retval; } struct _cef_view_delegate_t* CEF_CALLBACK button_get_delegate( struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefViewDelegate> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->GetDelegate(); // Return type: refptr_diff return CefViewDelegateCToCpp::Unwrap(_retval); } struct _cef_window_t* CEF_CALLBACK button_get_window(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefWindow> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->GetWindow(); // Return type: refptr_same return CefWindowCppToC::Wrap(_retval); } int CEF_CALLBACK button_get_id(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute int _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetID(); // Return type: simple return _retval; } void CEF_CALLBACK button_set_id(struct _cef_view_t* self, int id) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetID( id); } int CEF_CALLBACK button_get_group_id(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute int _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetGroupID(); // Return type: simple return _retval; } void CEF_CALLBACK button_set_group_id(struct _cef_view_t* self, int group_id) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetGroupID( group_id); } struct _cef_view_t* CEF_CALLBACK button_get_parent_view( struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefView> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->GetParentView(); // Return type: refptr_same return CefViewCppToC::Wrap(_retval); } struct _cef_view_t* CEF_CALLBACK button_get_view_for_id( struct _cef_view_t* self, int id) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return NULL; // Execute CefRefPtr<CefView> _retval = CefButtonCppToC::Get( reinterpret_cast<cef_button_t*>(self))->GetViewForID( id); // Return type: refptr_same return CefViewCppToC::Wrap(_retval); } void CEF_CALLBACK button_set_bounds(struct _cef_view_t* self, const cef_rect_t* bounds) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Verify param: bounds; type: simple_byref_const DCHECK(bounds); if (!bounds) return; // Translate param: bounds; type: simple_byref_const CefRect boundsVal = bounds?*bounds:CefRect(); // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetBounds( boundsVal); } cef_rect_t CEF_CALLBACK button_get_bounds(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefRect(); // Execute cef_rect_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetBounds(); // Return type: simple return _retval; } cef_rect_t CEF_CALLBACK button_get_bounds_in_screen(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefRect(); // Execute cef_rect_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetBoundsInScreen(); // Return type: simple return _retval; } void CEF_CALLBACK button_set_size(struct _cef_view_t* self, const cef_size_t* size) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Verify param: size; type: simple_byref_const DCHECK(size); if (!size) return; // Translate param: size; type: simple_byref_const CefSize sizeVal = size?*size:CefSize(); // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetSize( sizeVal); } cef_size_t CEF_CALLBACK button_get_size(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefSize(); // Execute cef_size_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetSize(); // Return type: simple return _retval; } void CEF_CALLBACK button_set_position(struct _cef_view_t* self, const cef_point_t* position) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Verify param: position; type: simple_byref_const DCHECK(position); if (!position) return; // Translate param: position; type: simple_byref_const CefPoint positionVal = position?*position:CefPoint(); // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetPosition( positionVal); } cef_point_t CEF_CALLBACK button_get_position(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefPoint(); // Execute cef_point_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetPosition(); // Return type: simple return _retval; } cef_size_t CEF_CALLBACK button_get_preferred_size(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefSize(); // Execute cef_size_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetPreferredSize(); // Return type: simple return _retval; } void CEF_CALLBACK button_size_to_preferred_size(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->SizeToPreferredSize(); } cef_size_t CEF_CALLBACK button_get_minimum_size(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefSize(); // Execute cef_size_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetMinimumSize(); // Return type: simple return _retval; } cef_size_t CEF_CALLBACK button_get_maximum_size(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return CefSize(); // Execute cef_size_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetMaximumSize(); // Return type: simple return _retval; } int CEF_CALLBACK button_get_height_for_width(struct _cef_view_t* self, int width) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute int _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetHeightForWidth( width); // Return type: simple return _retval; } void CEF_CALLBACK button_invalidate_layout(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->InvalidateLayout( ); } void CEF_CALLBACK button_set_visible(struct _cef_view_t* self, int visible) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetVisible( visible?true:false); } int CEF_CALLBACK button_is_visible(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsVisible(); // Return type: bool return _retval; } int CEF_CALLBACK button_is_drawn(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsDrawn(); // Return type: bool return _retval; } void CEF_CALLBACK button_set_enabled(struct _cef_view_t* self, int enabled) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetEnabled( enabled?true:false); } int CEF_CALLBACK button_is_enabled(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsEnabled(); // Return type: bool return _retval; } void CEF_CALLBACK button_set_focusable(struct _cef_view_t* self, int focusable) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->SetFocusable( focusable?true:false); } int CEF_CALLBACK button_is_focusable(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsFocusable(); // Return type: bool return _retval; } int CEF_CALLBACK button_is_accessibility_focusable(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->IsAccessibilityFocusable(); // Return type: bool return _retval; } void CEF_CALLBACK button_request_focus(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>(self))->RequestFocus(); } void CEF_CALLBACK button_set_background_color(struct _cef_view_t* self, cef_color_t color) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return; // Execute CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->SetBackgroundColor( color); } cef_color_t CEF_CALLBACK button_get_background_color(struct _cef_view_t* self) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Execute cef_color_t _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->GetBackgroundColor(); // Return type: simple return _retval; } int CEF_CALLBACK button_convert_point_to_screen(struct _cef_view_t* self, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointToScreen( pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } int CEF_CALLBACK button_convert_point_from_screen(struct _cef_view_t* self, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointFromScreen( pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } int CEF_CALLBACK button_convert_point_to_window(struct _cef_view_t* self, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointToWindow( pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } int CEF_CALLBACK button_convert_point_from_window(struct _cef_view_t* self, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointFromWindow( pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } int CEF_CALLBACK button_convert_point_to_view(struct _cef_view_t* self, struct _cef_view_t* view, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: view; type: refptr_same DCHECK(view); if (!view) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointToView( CefViewCppToC::Unwrap(view), pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } int CEF_CALLBACK button_convert_point_from_view(struct _cef_view_t* self, struct _cef_view_t* view, cef_point_t* point) { // AUTO-GENERATED CONTENT - DELETE THIS COMMENT BEFORE MODIFYING DCHECK(self); if (!self) return 0; // Verify param: view; type: refptr_same DCHECK(view); if (!view) return 0; // Verify param: point; type: simple_byref DCHECK(point); if (!point) return 0; // Translate param: point; type: simple_byref CefPoint pointVal = point?*point:CefPoint(); // Execute bool _retval = CefButtonCppToC::Get(reinterpret_cast<cef_button_t*>( self))->ConvertPointFromView( CefViewCppToC::Unwrap(view), pointVal); // Restore param: point; type: simple_byref if (point) *point = pointVal; // Return type: bool return _retval; } } // namespace // CONSTRUCTOR - Do not edit by hand. CefButtonCppToC::CefButtonCppToC() { GetStruct()->as_label_button = button_as_label_button; GetStruct()->set_state = button_set_state; GetStruct()->get_state = button_get_state; GetStruct()->set_ink_drop_enabled = button_set_ink_drop_enabled; GetStruct()->set_tooltip_text = button_set_tooltip_text; GetStruct()->set_accessible_name = button_set_accessible_name; GetStruct()->base.as_browser_view = button_as_browser_view; GetStruct()->base.as_button = button_as_button; GetStruct()->base.as_panel = button_as_panel; GetStruct()->base.as_scroll_view = button_as_scroll_view; GetStruct()->base.as_textfield = button_as_textfield; GetStruct()->base.get_type_string = button_get_type_string; GetStruct()->base.to_string = button_to_string; GetStruct()->base.is_valid = button_is_valid; GetStruct()->base.is_attached = button_is_attached; GetStruct()->base.is_same = button_is_same; GetStruct()->base.get_delegate = button_get_delegate; GetStruct()->base.get_window = button_get_window; GetStruct()->base.get_id = button_get_id; GetStruct()->base.set_id = button_set_id; GetStruct()->base.get_group_id = button_get_group_id; GetStruct()->base.set_group_id = button_set_group_id; GetStruct()->base.get_parent_view = button_get_parent_view; GetStruct()->base.get_view_for_id = button_get_view_for_id; GetStruct()->base.set_bounds = button_set_bounds; GetStruct()->base.get_bounds = button_get_bounds; GetStruct()->base.get_bounds_in_screen = button_get_bounds_in_screen; GetStruct()->base.set_size = button_set_size; GetStruct()->base.get_size = button_get_size; GetStruct()->base.set_position = button_set_position; GetStruct()->base.get_position = button_get_position; GetStruct()->base.get_preferred_size = button_get_preferred_size; GetStruct()->base.size_to_preferred_size = button_size_to_preferred_size; GetStruct()->base.get_minimum_size = button_get_minimum_size; GetStruct()->base.get_maximum_size = button_get_maximum_size; GetStruct()->base.get_height_for_width = button_get_height_for_width; GetStruct()->base.invalidate_layout = button_invalidate_layout; GetStruct()->base.set_visible = button_set_visible; GetStruct()->base.is_visible = button_is_visible; GetStruct()->base.is_drawn = button_is_drawn; GetStruct()->base.set_enabled = button_set_enabled; GetStruct()->base.is_enabled = button_is_enabled; GetStruct()->base.set_focusable = button_set_focusable; GetStruct()->base.is_focusable = button_is_focusable; GetStruct()->base.is_accessibility_focusable = button_is_accessibility_focusable; GetStruct()->base.request_focus = button_request_focus; GetStruct()->base.set_background_color = button_set_background_color; GetStruct()->base.get_background_color = button_get_background_color; GetStruct()->base.convert_point_to_screen = button_convert_point_to_screen; GetStruct()->base.convert_point_from_screen = button_convert_point_from_screen; GetStruct()->base.convert_point_to_window = button_convert_point_to_window; GetStruct()->base.convert_point_from_window = button_convert_point_from_window; GetStruct()->base.convert_point_to_view = button_convert_point_to_view; GetStruct()->base.convert_point_from_view = button_convert_point_from_view; } template<> CefRefPtr<CefButton> CefCppToCRefCounted<CefButtonCppToC, CefButton, cef_button_t>::UnwrapDerived(CefWrapperType type, cef_button_t* s) { if (type == WT_LABEL_BUTTON) { return CefLabelButtonCppToC::Unwrap(reinterpret_cast<cef_label_button_t*>( s)); } if (type == WT_MENU_BUTTON) { return CefMenuButtonCppToC::Unwrap(reinterpret_cast<cef_menu_button_t*>(s)); } NOTREACHED() << "Unexpected class type: " << type; return NULL; } #if DCHECK_IS_ON() template<> base::AtomicRefCount CefCppToCRefCounted<CefButtonCppToC, CefButton, cef_button_t>::DebugObjCt = 0; #endif template<> CefWrapperType CefCppToCRefCounted<CefButtonCppToC, CefButton, cef_button_t>::kWrapperType = WT_BUTTON;
{ "pile_set_name": "Github" }
Inundation Inundation (from the Latin inundatio, flood) is both the act of intentionally flooding land that would otherwise remain dry, for military, agricultural, or river-management purposes, and the result of such an act. Definition The noun "inundation" refers to both the act of inundating; an overflow; a flood; a rising and spreading of water over grounds; and to the state of being inundated; flooding. It should therefore be distinguished from other types of flooding, not caused by man. It should also be recognised that this type of flooding would not take place without the intentional human act. So e.g. tidal flooding of areas that fall dry at ebb tide, and periodical river floods are not inundations in the sense intended here. The latter condition implies that in most topographies the act usually applies to causing an overflow of a river or stream by damming it. This is also the only method foreseen in the 1888 British military textbook that discusses the technique correctly under "military obstacles". However, in areas that have been reclaimed from the sea, marches or lakes, and are artificially protected from the waters (either accumulated precipitation, or the water source that would flood the reclaimed area, if it were not artificially protected), as in e.g. the artificial hydrological entities, known as Polders, may be inundated by simply giving the water source access again. In the latter perspective inundation may simply be a form of hydraulic engineering. Before we limit the concept to military uses, it should be recognised that there are at least two other possible uses of inundation as a human act: agricultural uses, as in preparing paddy fields for the growing of semi-aquatic rice in many countries; river management, in the form of diverting flood waters in a river at flood stage upstream from areas that are considered more valuable than the areas that are sacrificed in this way (what one may call "prophylactic hydraulic engineering").This may be done ad hoc as in the 2011 intentional breach of levees by the United States Army Corps of Engineers in Missouri or permanently, as in the so-called (literally:"let-overs"), an intentionally lowered segment in Dutch riparian levees, like the Beerse Overlaat in the left levee of the Meuse between the villages of Gassel and Linden, North Brabant. Military inundation Military inundation creates an obstacle in the field that is intended to impede the movement of the enemy. This may be done both for offensive and defensive purposes. Furthermore, in so far as the methods used are a form of hydraulic engineering, it may be useful to differentiate between controlled inundations (as in most historic inundations in the Netherlands under the Dutch Republic and its successor states in that area and exemplified in the two Hollandic Water Lines, the Stelling van Amsterdam, the Frisian Water Line, the IJssel Line, the Peel-Raam Line, and the Grebbe line in that country) and uncontrolled ones (as in the second Siege of Leiden during the first part of the Eighty Years' War, and the Inundation of Walcheren, and the Inundation of the Wieringermeer during the Second World War). To count as controlled, a military inundation has to take the interests of the civilian population into account, by allowing them a timely evacuation, by making the inundation reversible, and by making an attempt to minimize the adverse ecological impact of the inundation. As Vandenbohed discusses, that impact may also be adverse in a hydrogeological sense if the inundation lasts a long time. From a legal point of view, a military inundation should therefore be seen as a government "taking" of private property under the constitutional protection of private property in many countries. In the Netherlands, this was the subject of art. 152 of the Dutch constitution of 1887. Notes and references Notes References Sources Category:Flood control Category:Flood Category:Hydrology Category:Bodies of water Category:Artificial landforms Category:Polders Category:Military history of the Netherlands Category:Hydraulic engineering Category:Water resources management
{ "pile_set_name": "Wikipedia (en)" }
Oblon's Post-Grant Practice Group handles all aspects of USPTO post issuance proceedings, including practice before the Patent Trial & Appeal Board (PTAB), and appeals to the Court of Appeals for the Federal Circuit (CAFC). ass="alignleft size-thumbnail wp-image-1402" title="denied" src="http://www.patentspostgrant.com/wp-content/uploads/2010/02/denied-150x150.jpg" alt="denied" width="85" height="88" />As first reported by PatentsPostGrant.com in November 2009, the patent reexaminations of NTP vs. RIM infamy were soundly shot down by the BPAI.[1] In November of 2009, the BPAI began issuing a series of decisions affirming the rejections of the five NTP patents. As expected, in December of 2009, NTP requested the BPAI rehear arguments in these cases. Earlier this month, the BPAI, in tersely worded responses, denied rehearing in the ’592 ‘172, and ‘960 patents. As the issues in the ‘670 and ‘451 patent are common, namely, consideration of certain declaration and the public availability of certain prior art, it is expected that the remaining two denials will follow shortly. Next stop for NTP is the Federal Circuit. The Federal Circuit will be quite busy with NTP in the coming months. In addition to the five patents noted above, NTP has two additional appeals from the BPAI headed to the court. NTP patent, 5,438,611 appears to be out in front of the pack of (7) appeals, with the first formal CAFC appeal notice filed this past January. The ‘611 Patent, and NTP patent 5,479,472 were asserted against Sprint, T-Mobile, AT&T and Palm, in 2006. As with the five patents above, the BPAI mostly affirmed the rejections applied in reexamination. Stay tuned. [1] Rejection of all claims were affirmed in 6,317,592, 5,819,172, and 6,067,451; Rejections were affirmed-in-part in 5,436,960 and 5,625,670, (the surviving ‘670 claims appear to have been added in reexamination, claim 15 of the ‘960 appears to be the only surviving claim successfully asserted against RIM) The opinions, commentary and characterizations provided to this online forum by the authors and moderators are provided for encouraging discussion, thought and debate on important post grant issues. These postings are in no way representative of the opinions of Oblon et al., or its clients.
{ "pile_set_name": "Pile-CC" }
Re: Growth spurt...cluster feeding!!! Oatmeal for you or for baby? Oatmeal for you might help- if the cluster feeding means baby's trying to increase your supply, oatmeal might give you an extra boost. Oatmeal for baby is unlikely to do a thing- this link explains why: http://www.kellymom.com/nutrition/so...ids-sleep.html Re: Growth spurt...cluster feeding!!! I feel ya! My guy seems to be going though it too. He is clusting feeding everynight for the last three nights and only going 1.5 to 2 hours between feeds during the day. I have been having oatmeal, oatmeal cookies and mother's milk tea. It seems to be helping. Good Luck!
{ "pile_set_name": "Pile-CC" }
Q: same branch same quarter number calculation What I need to add is when employee title X switches to a different title (Y or Z) within the SAME branch, to modify their Total FTE for the time in the quarter that they were in that new title (Y or Z). So the logic is: For position X to Y IF [Position Start Date] is between [Q2 start date] AND [Q2 end date] and [Employee Title] of [Employee ID] was X and is now Y THEN [Total FTE calculated] = (((([Position Start Date] - [Quarter Start Date])/[Days in Quarter]) * [Total FTE]) + ((([Quarter End Date] - [Position Start Date])/[Days in Quarter]) * [Total FTE]) * 0.5) For position X to Z AND IF [Position Start Date] is between [Q2 start date] AND [Q2 end date] AND [Employee Title] of [Employee ID] was X and is now Z THEN [Total FTE calculated] = ([Position Start Date] - [Quarter Start Date])/[Days in Quarter]) * [Total FTE]) ELSE [Total FTE Calculated] = [Total FTE] * 1 END As you can see I'm missing knowledge of some of the SQL operators to do this properly. Any help you can provide would be greatly appreciated! Please and thank you! A: A rough sketch, date arithmetic differs a lot between different vendors of DBMS so I used your expressions. I've used the variable :new_emplyee_title for the new title. update Employees set [Total FTE calculated] = case when :new_emplyee_title = Y then [ expression for Y ] else [ expression for Z ] end where [Position Start Date] between [Q2 start date] AND [Q2 end date] and [Employee Title] = X and :new_emplyee_title in (Y,Z); If you DBMS support triggers, this would fit like hand in glove in an update trigger.
{ "pile_set_name": "StackExchange" }
fileFormatVersion: 2 guid: e227d0e11c8e0498a88231ab7e5f9da8 timeCreated: 1510610474 licenseType: Free MonoImporter: externalObjects: {} serializedVersion: 2 defaultReferences: [] executionOrder: 0 icon: {instanceID: 0} userData: assetBundleName: assetBundleVariant:
{ "pile_set_name": "Github" }
Q: How do you pronounce the הוי״ה in hataras nedarim (annulment of vows) before Rosh HaShanah? In the siddurs I've seen, we ask for annulment for vows made "with the name הוי״ה ". That word is left unvowelized. How is it pronounced? A: Usually I hear it pronounced "havaya." I think we refer to the four-letter name (yud-kay-vov-kay) as "havaya" ("existence") because it has the same letters and same root. Has anyone heard otherwise?
{ "pile_set_name": "StackExchange" }
Slidredomen Slidredomen (Slidre kyrkje) is a medieval era church located at Vestre Slidre municipality in Oppland, Norway. The church is situated on a hill in Slidre at the northern end of Slidrefjord. History The church was built around 12th century and celebrated it 800-year anniversary in 1987. The building material is stone and brick. The church contains 200 seats. During the Middle Ages, this was the parish church for Slidre as well as the deanery for Valdres. The altarpiece dates to 1665 and was painted by Ola Hermundsson Berge (1768-1825) in 1797. Berge performed significant painting in the church between 1797-98. The pulpit was carved by Hans Jonassen Felde in 1797. An organ was built by German born organ builder Albert Hollenbach (1850-1904) in 1891. It was replaced in 1983 by a new mechanical organ from Norsk Orgel- og Harmoniumfabrikk of Snertingdal in Gjøvik. References Category:Churches in Oppland Category:Vestre Slidre Category:Stone churches in Norway Category:11th-century churches
{ "pile_set_name": "Wikipedia (en)" }
#ifndef __STARTUP_DIALOG_H__ #define __STARTUP_DIALOG_H__ #include "UmodelSettings.h" class UIStartupDialog : public UIBaseDialog { public: UIStartupDialog(CStartupSettings& settings); bool Show(); protected: CStartupSettings& Opt; UICheckboxGroup* OverrideGameGroup; UICombobox* OverrideEngineCombo; UICombobox* OverrideGameCombo; void FillGameList(); virtual void InitUI(); }; #endif // __STARTUP_DIALOG_H__
{ "pile_set_name": "Github" }
Wednesday, March 22, 2006 The FBI Fumbles the Future Too Frequently " In the United States, the FBI was long believed to be a leader in using technology to fight crime. Actually, this reputation is, in many respects, undeserved. The FBI was caught particularly flat footed three decades ago when personal computers, and the age of cheaper computing, began. The FBI never really got going in this area. In the last ten years, there have been a series of embarrassing revelations about failed attempts to catch up. The latest one has to do with FBI agents not being able to get government e-mail accounts because there's no money in the budget for it. Oh, and that experiment that equipped 200 agents with Balckberry's, it had to be cancelled because of lack of money as well. In both cases, it was obvious that the people at the top are still out of touch when it comes to the need for computer technology. For example, by way of comparison, every soldier and officer in the army has a government email account, and in the navy, even support staff at navy school's get Blackberrys. But it gets worse. Three years ago the FBI found it was having some serious recruiting problems as it tried to expand its staff of computer experts. To the FBI, most qualified geeks that apply are "tainted goods." The elite of the FBI are the "Special Agents." Like pilots in the air force, the Special Agents are the anointed leaders of their organization. Becoming one requires above average mental and physical skills, as well as a clean background. The kind of computer experts the FBI is recruiting, all qualify on the high-IQ front, but run into problems when it comes to physical fitness and an unblemished background. Geeks are known for spending endless hours in front of a computer, not for taking breaks to do push-ups or run laps. The diet of Jolt Cola and junk food doesn't help either. The Internet wizards the FBI needs the most would not survive the FBI Academy obstacle course. Many would not survive a background check either. The best hackers have often hacked places they shouldn't have. Even if they weren't caught, they often weren't shy about describing their exploits on the net. In other words, most of these guys "have a past" in the indictable sense. The FBI has lesser positions for computer experts and technicians, but if you aren't a Special Agent, you don't have much influence on decisions. This is why the FBI has such primitive computer technology. FBI computer experts, who were not special agents, have urged upgrades for decades. But too many Special Agents were not all that computer literate and little progress was made. After several humiliations during the 1990s, the FBI finally undertook a major effort to get current with computer technology. This meant spending $1.1 billion to catch up in the computer technology department, including $76 million to computerize a billion paper documents that are currently very difficult to search. Both of these program ran into problems, largely because of leadership problems at, and near, the top. The FBI has little choice but to move forward. Even before September 11, 2001, they were in a fight with the Department of Defense over who would defend America from attacks via the Internet. Incredibly, the FBI won that fight. But now they have to deliver the technical services, and technical people, to make that work. At the moment, the FBI continues to slog forward. There are some bright spots, as tech savvy Special Agents rise through the ranks, and provide the technical leadership that the bureau has long lacked. But the FBI is far from being a leader in the use of technology to combat crime. Oh, and everyone is supposed to have their own FBI email box by the end of 2006. That's more than thirty years after email was invented.
{ "pile_set_name": "Pile-CC" }
Q: On free Jazz and Ornette Coleman Why is Ornette Coleman considered one of the best musicians on the Jazz world? I have had the chance to listen to one of his albums, "The Shape of the Jazz to Come," and to be honest, I don't find it easy to follow. One friend, who loves Jazz, by the way, once told me that Ornette Coleman produces him nausea. Ive read somewhere that the final divorce between Jazz and the African American audience was, in big parts, due to the jazz that Coleman, Coltrane, Sun Ra, etc were making during the 60's. Is this an accurate statement? A: I think if you look beyond taste/personal preference it's easy to see that Coleman was an extremely skilled musician. I think it's easy in this day and age to undervalue how much of a impact The Shape of Jazz to Come had. He took the improvisation element of jazz to an extreme. Artists that take music to new levels tend to inspire others even if the music itself is not palatable to the general public. A rock example would be The Velvet Underground. If you find it difficult to listen to, I suggest Coltrane's Ascension which is far more out there and makes The Shape of Jazz to Come seem almost pop. As far as the divorce from African Americans, I am not sure how that is supported. I'd love to read the article you mentioned. Jazz was already suffering from the explosion of rock. Dave Brubeck's Time Out was one of the last significant jazz albums to do well on the charts, and that was in 1959. I think that jazz had divorced itself from all American culture by the 60's and would attempt to reclaim it with fusion, but it never saw the levels of popularity it had once enjoyed. I think what jazz artists began to do in the 60s was challenging for most people, and it became a niche genre, from which it has never truly recovered, even with outliers like Herbie Hancock's "Rockit". Also, we can't ignore that jazz was an older form of music and Baby Boomers wanted something their own and rock music provided that even when they borrowed elements from jazz, and in some ways took music just as far out as Coleman and Coltrane. Never underestimate the power of not listening to your parents' music. A: Jazz is a challenging form of music by nature. It's technically demanding, it uses exotic chords and rhythms, it's dissonant and improvisational. Even when covering familiar material, it departs from the canonical melodies and harmonizations. Perhaps for this reason, while there have always been more pop-oriented, crowd-pleasing versions of jazz, the forms that have garnered the most critical praise are the ones that are furthest from the mainstream, the ones that are most abstract, intellectual and modernist, the ones that are hardest for the casual listener to appreciate. For proof by contradiction, Kenny G is a talented and popular jazz musician who is extremely "easy to follow," but few (if any) jazz purists would count him among the "best musicians [in] the jazz world." There's a real sense that jazz is not meant to be "easy." In contrast, there's no disconnect between being a rock purist and celebrating a three-chord basic-as-dirt barn burner --simple, crowd-pleasing songs are the very heart of rock. While the rarefied nature of experimental jazz may not have helped its popularity in the black community, I personally find it less likely that black audiences were turned off by (black) musicians like Coleman and Coltrane, and more likely that they had already moved on to wholly different styles of music. Traditionally, the black American music audience drives musical innovation in America, embracing new genres and discarding old ones well in advance of the whiter mainstream.
{ "pile_set_name": "StackExchange" }
Florida will finally play the final game of Will Muschamp's final season as head coach on Saturday. It will come six weeks after Muschamp's not-really-but-yes-it-was-a-firing more than a month after the final game of Florida's regular season, more than three weeks after Jim McElwain was hired as the Gators' next head football coach, and almost two full days after an undefeated Florida State saw its season end in fiery failure, the latter of which can only be attributable to either the football gods having a sense of humor or 2014 Florida State finally letting the fire its hair had been on for about four months burn down to the scalp. It's one or the other, I'm sure. Anyway: I don't care about this bowl game. Florida's played in 22 bowl games in my 24 years and change on this planet, and all of them fell into (at least) one of four categories, up until the 2015 Birmingham Bowl: Bowl in the state of Florida (Outback, Citrus/Capitol One, Gator, Orange) Peach Bowl Sugar Bowl National championship game in Fiesta Bowl Those games have either been local to the bulk of Gators fans — even the Peach isn't more than about eight hours from most Florida fans, and flying to Atlanta is a cinch — or in New Orleans, or for a national title. (One of them was both!) Gators who have wanted to go to bowls have been able to day-trip, been able to combine a bowl trip with boozing on Bourbon Street or visiting Atlanta, or been able to justify a flight to Arizona for a chance at seeing a national championship victory. This year, they get the privilege of going to beautiful, historic Birmingham, Alabama! It's less than an hour closer to Gainesville than New Orleans! There is assuredly at least one restaurant in town that serves barbecue! And, hey, Florida's playing East Carolina, a team Florida hasn't played since 1983, and won't play again until ... wait, September? Oh, and those fans who go to the Birmingham Bowl? They're gonna miss Florida hosting defending national champion and insta-nemesis UConn in the O'Connell Center in what should be a hell of a game between two teams that need a big win desperately. It suffices to say that I am not going to Birmingham, and that I will not nearly be alone in that regard. Pat Dooley has dubbed this the Afterthought Bowl, in a dispatch from B-Town in which the desk clerk at the media hotel doesn't know there's a bowl game in town, and yet that dispatch is primarily Dooley rolling out reasons the bowl matters: Impressing recruits, avoiding embarrassment, building momentum. Sorry, Pat. That's just not true. Recruits will care, certainly, but they will know soon what has been fairly obvious since McElwain hired Geoff Collins as defensive coordinator: The coaches in Gators polos on this Saturday will mostly be donning them for the last time. Interim coach D.J. Durkin and offensive coordinator Kurt Roper have both been hired over, and linebackers coach Coleman Hutzler — a Durkin lieutenant who could well follow Durkin to Michigan, if the former Stanford assistant joins Jim Harbaugh in Ann Arbor — isn't staying if Florida brings in Randy Shannon. Running backs coach Brian White might be replaced by former McElwain assistant Tim Skipper. Travaris Robinson has been seen as an flight risk to Auburn since the day Muschamp was hired there, and the tea leaves are suggesting he'll head west. Reports of Florida sniffing around Texas defensive line coach Chris Rumph exist, casting a shadow on Brad Lawing's future with the team, and, of the last three coaches yet mentioned, Chris Leak was coaching the wrong position in 2014, Derek Lewis coached Florida's least productive position in 2014, and Mike Summers is widely expected to stay. So, yeah, recruits could care about how Florida looks — but only offensive line recruits can reasonably expect the coach in charge of their position for the Gators on Saturday to be that coach by the spring. As for embarrassment: No, nothing that could happen Saturday is trumping Georgia Southern. Nothing trumps a trouncing by Missouri on Homecoming, or a home loss to South Carolina in bewildering fashion. Florida went to triple overtime with Kentucky at home this year, and lost to Vanderbilt for the first time in decades last year. Losing to a really good mid-major team in a bowl game that kicks at 11 a.m. local time won't be any more embarrassing than anything that's happened over the last two years. Did you note the won't? I did it on purpose. I do, honestly, expect Florida to lose this game. Too many of the players Dooley thinks will be auditioning for NFL scouts or their future coaches won't care, and defending the honor of being a Gator — or using the disrespect of being shipped to Birmingham to play in a game owned and operated by ESPN that is so low-profile that it is the only bowl without a named corporate sponsor this year, and such a money bath that both teams will almost certainly lose more money on the game than they make from it — just doesn't seem like something this beaten-down team is likely to do. That's a shame, because Florida really does match up well with the Pirates. Florida's "just" No. 23 in pass defense this season, but that ranking is skewed considerably by meltdowns against Kentucky and Alabama early this season, and garbage-time throwing by Georgia. Since yielding an unfathomable 449 passing yards to the Crimson Tide, Florida's allowed one team — Georgia — to post a passer rating of better than 103.00. That bar Florida has dipped under in seven of eight games would be the No. 4 pass efficiency defense nationally, if it were one; Florida, despite allowing a 217.76 rating against Alabama, is No. 11 as it is. Yeah, sure, Justin Hardy is incredible, with 110 catches for 1,334 yards in 2014 ... but he hasn't seen anyone close to as good as Vernon Hargreaves III (or Jalen Tabor, or maybe even Quincy Wilson) this year. Oh, and ECU's defense is, well, not good. East Carolina's ninth nationally in rush defense, but it hasn't seen an offense ranked in the top 50 in rush offense (Florida is No. 43), and yet has seen four of the nation's 12 worst running games; its pass defense, ranked 107th, needs no such qualifiers to be classified as bad. ECU foes have cleared 100.00 in pass efficency in all but three games against the Pirates this year, and Ruffin McNeill's defense has given up 250 or more passing yards in nine of 12 games, too. A motivated Florida team would make mincemeat of East Carolina. I really believe that. It's not just Florida that might be lacking for motivation, either. East Carolina is playing for Hardy and senior quarterback Shane Carden, who will be playing their last games in purple, gold, and black (well, while), but ECU's coaches have to know that a win at The Swamp would be way more valuable to their program than a win in a glorified exhibition. If there's a choice between putting something in the playbook to beat Florida tomorrow and keeping it under wraps until a shot at the big, bad SEC team in its own fortress, wouldn't there be at least some consideration of discretion? And so it's a shame this game is happening in January and not, say, October, because that game — with East Carolina firing on all cylinders, rather than coming off a loss to UCF as improbable as Florida's to South Carolina (or Florida basketball's loss to Florida State), and Florida's fearsome defense rarin' for the challenge of shutting down the Pirates' potent passing game — would've been awesome. This one will be awful, like most bowls, and I'm going to watch the first half until I leave for the O'Dome because, well, what else am I going to do on an early Saturday afternoon? I'll catch the rest out of obligation, on a DVR, or on YouTube, and by, like, Tuesday. I'll write about it, eventually. But I just don't care. And I can't compel you to care, either.
{ "pile_set_name": "OpenWebText2" }
Component Icons in Unity Hierarchy December 31, 2018 Some time ago I built a small Unity editor extension that shows at a glance which components are attached to a game object via icons in the Hierarchy window. Lights display a light bulb icon, cameras a camera icon, and so forth. I promptly abandoned the project. Recently someone asked that I make it compatible with Unity 2018.3 — it referenced long-obsolete component types — so I dusted off the repo and updated it to work with the latest and greatest. Compiler errors begone. If this is something you might find useful, download it from GitHub and add the scripts to an Editor folder. Then blow a kiss to your coworkers.
{ "pile_set_name": "OpenWebText2" }
Q: can capacitor increase flow/quantity of water in water pump can capacitor increase flow/quantity of water in water pump. we are already using capacitor of 25 uf. can water quantity be increased if we use capacitor of 30 uf or any higher which u suggest. A: No, the wrong sized capacitor will make things worse. The purpose of a run capacitor is to energise a second winding in the motor. It's capacitance is chosen to produce the correct phase difference between the windings. A smaller value will produce less torque. A higher value will overheat the motor. simulate this circuit – Schematic created using CircuitLab See Single-phase induction motors Motor Capacitor FAQ
{ "pile_set_name": "StackExchange" }
I have been often asked to explain what I mean by the 3 tenets that my life and my company/productivity stand by. I always thought it was obvious enough, that I needn’t explain such simple concepts. This below, then, is my new year’s gift to all I know. Perfect, Yet Changing! When we talk about IDEAL – in terms of humans, we’re not talking about a fixed set of qualities that would make someone ideal or not ideal. In my understanding, an ideal person is one who thinks rationally, follows a logical and rational philosophy in order to gain the best or the most he can out of life. Hence, an ideal human would be one who is constantly learning, constantly upgrading, constantly seeking improvement in his work and thoughts – who in other words keeps on changing. Let me go so far as to even say when talking in terms of human beings it is not only “PERFECT, YET CHANGING”, but CONSTANTLY CHANGING for the better, to achieve perfection – in other words, without change or improvement in this context, PERFECTION or IDEAL is impossible! Limitless Possibilities! Infinity is a contradictory notion, when applied to that WHICH EXISTS! The problem is mostly semantic, than metaphysical, most people probably mean or want to mean “limitless” or “boundless”. It’s impossible because infinite isn’t a number, it’s a concept, of something that’s bigger than anything else. As soon as you assign a number to it, infinity is bigger. To have infinite knowledge, one would have to have knowledge that is greater than the knowledge that one has/can have. Hence, replace infinite with boundless or limitless: To have boundless or limitless knowledge, one’s knowledge would have to extend beyond the limits of one’s knowledge. Simple. There is always a simple way to run the Universe, and THIS is IT: Limitless Possibilities! Why “Atlantis”? The idea of a lost, but highly advanced civilization has captured the interest of people for centuries. Perhaps the most compelling of these tales is the story of Atlantis. In Greek mythology, Atlantis was the paradise City of the Gods. It was said that Only Gods or heroes were allowed to enter Atlantis. We’re heroes, when we decide to be free. Because, you see, life was not meant to be weighed down with routine, boredom, gravity or authority…but for fun and learning! Our imagination is focused on bringing out that inner child in all of us. We worship that light-bulb look. We cherish heroes. So we decided to invite that playful, elusive creature back into our lives: JOY!
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="utf-8"?> <!-- ~ Copyright 2014 Eduardo Barrenechea ~ ~ Licensed under the Apache License, Version 2.0 (the "License"); ~ you may not use this file except in compliance with the License. ~ You may obtain a copy of the License at ~ ~ http://www.apache.org/licenses/LICENSE-2.0 ~ ~ Unless required by applicable law or agreed to in writing, software ~ distributed under the License is distributed on an "AS IS" BASIS, ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. ~ See the License for the specific language governing permissions and ~ limitations under the License. --> <TextView android:id="@+id/text_item" xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="72dp" android:gravity="center_vertical" android:paddingLeft="72dp" android:textAppearance="?android:attr/textAppearanceMedium" tools:text="Sample text"/>
{ "pile_set_name": "Github" }
Q: What is wrong with this for loop? Hi guys I have an array that I'm trying to append to the DOM! Here is the code: function inputFeedContent(data){ for(var k=0; k < columns; k++) { var col = "<div class='col-1'>"; for(var j=0; j < data.sample[k].length; j++) { col += "<p>"+data.sample[k][j]+"</p>"; } col += "</div>"; $('.sliding-window').append(col); } } where columns = 12. Problem is I only get five of these: <div class="col-1"> <p>Some text</p> </div> What am I doing wrong here? Keep in mind I'm a noob :) Thanks! A: I think you're trying to print each column separately, hence not row after row. Try this: function inputFeedContent(data) { for(var k=0; k < columns; k++) { var col = "<div class='col-1'>"; for(var j=0; j < data.sample.length; j++) { col += "<p>"+data.sample[j][k]+"</p>"; } col += "</div>"; $('.sliding-window').append(col); } }
{ "pile_set_name": "StackExchange" }
Doyle, 54, said at the company's investor day meeting that he was not leaving the business and would take six months to relax and plan his next move. "Every other theory about what I'm going to be doing is incorrect," said Doyle, who led a turnaround at Domino's that has enriched investors and fuelled speculation that he may be recruited to lead Chipotle.
{ "pile_set_name": "Pile-CC" }
These rigid 2" Dia. X 5-1/4" 120 grit aluminum oxide sanding sleeves are perfect for use with popular oscillating spingle sanders and sanding drum kits. Keep plenty of these consumable sanding sleeves on hand. Sold in a 3 pk.
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="UTF-8"?> <CONFIG> <Makefile Value="2"/> <Params Value=" -Fu../../packager/units/$(CPU_TARGET)-$(OS_TARGET);../lazutils/lib/$(CPU_TARGET)-$(OS_TARGET);../freetype/lib/$(CPU_TARGET)-$(OS_TARGET);../../lcl/units/$(CPU_TARGET)-$(OS_TARGET);. -MObjFPC -Scghi -O1 -g -gl -l -venibq -vw-h- -vm4046 debuggerintf.pas"/> </CONFIG>
{ "pile_set_name": "Github" }
I’ve been researching polar exploration for more than 40 years, so going to Svalbard and Spitsbergen was an incredible opportunity. You go out in small boats and make landings in all kinds of weather, which allows you to experience a little bit of what it was like for the explorers who went to these places 200 years ago. You’re where they were, and you can juxtapose the things you see with what they saw, whether it’s the wildlife or the geography. Sharing these stories with passengers is my job when I’m travelling with One Ocean. Here’s an example. In 1818, the British sent two ships, HMS Dorothea and HMS Trent, to try and cross the Arctic Ocean from Spitsbergen, sailing through the Bering Strait and into the Pacific. On the Trent was a man who had never sailed in the Arctic before but who would one day be renowned for his journeys in the region: John Franklin. Impenetrable sea ice meant that by July 6 the ships had reached their farthest point — 80°34’ N — the exact spot we reached with One Ocean 198 years later, to the day. Moments and stories like that astound people. At first they can’t believe they’re at the same places, but then they really start to connect with explorers and the idea of exploration. As a historian, being there brought everything full circle for me. It’s hard to imagine a more complete experience. The Arctic was my very first love. I read a lot of exploration books as a teenager, and I fell for the Arctic by seeing it through the eyes of explorers — by seeing it as a stage where people could express emotions ranging from cowardice to endurance and, ultimately, face life or death. But if you ask me why I go to the Arctic now, there’s a much simpler answer: to continue to see things I’ve never seen before. As a naturalist, my whole life has been guided by the ability to get people excited about the natural world. When it comes to the North, I’m fascinated by how life has adapted over long periods of time to the extreme climate, and I love sharing my expertise on Arctic wildlife with passengers, especially when we can see it up close. Being able to experience the Arctic from a ship or a boat is a unique experience that gives you a perspective on the region that you can’t get any other way. On one trip, we were cruising in a Zodiac along the rocky shoreline of one of the Savage Islands, which are at the mouth of Frobisher Bay, when we spotted a polar bear nearby. After it stared at us for about 15 minutes, the bear started walking, and as it reached a high point of the shoreline, the light hit it from behind, creating a golden halo around it. It was one of those magical moments that you just can’t plan for. – Franco Mariotti Naturalist and guide with One Ocean Expeditions since 2015
{ "pile_set_name": "Pile-CC" }
Les liquides que j'ai reçu sont franchement très bon, certain doivent steepé encore un peu. Mais les liquides sont excellent et mes choix ont été respecté et ça sa fait plaisir, 93ml pour une box d'une valeur de 60euro a 27,90euro ça fait doublement plaisir. Je renouvelle pour le mois de Août par curiosité de ce que je vais recevoir par rapport a mes nouveaux choix. En tout cas merci a Liquidbox de proposé de super liquide et la rapidité de leur livraison
{ "pile_set_name": "OpenWebText2" }
Nate Silver Offers Up a Statistical Analysis of Your Failing Relationship While data shows that overall happiness in your relationship fell 8 more points, there is still a 31 percent chance of makeup sex this Friday, depending on average energy levels after work and how proactive you’re feeling (see chart). However, if you just order $18 of Chinese takeout like you did last weekend, projections show a 16.8 percent drop in possible intercourse and a whopping 74.2 percent upswing in Netflix-streaming, with both of you falling asleep long before the movie is over. In an exit poll from Monday evening, exactly one half of the duo in attendance said they had an unfavorable opinion of the chosen restaurant—Arby’s—wondering if it was some sort of retribution, or if this is sadly what it’s come to. Between the hours of 6 and 7 p.m. tonight, there was a 77.1 percent increase in annoyance and a 54 percent rise in revulsion based on the way you slurped your capellini, drank 65 percent too much wine and prattled on about your ex-girlfriend Sarah for some reason, even though she has a new boyfriend with a sailboat, and you’ve supposedly moved on, too. The logic here is that you are 44 percent over Sarah after 3 years, but there is only a 3.6 percent chance of her taking you back, which is reduced by nearly half of a percentage point every time she steps foot on that boat. In a very local poll released just this week, 50 percent of those in your current relationship said it bothers them when you leave your shoes in the middle of the carpet and added that, if you could clean a dirty dish or two—putting in a minimal effort of just 5 minutes—stress would be reduced by 39 percent, along with a telling 54 percent decrease in shouting matches and escalating threats to leave forever. You’ve lost nearly 100 hairs on your head every day since March, 2011, when the two of you met, which is almost 36,500 hairs in the last year and nearly 73,000 hairs in the last two years. This is, ultimately, why you’ll be 84 percent bald by the time you’re 45. In a survey conducted with your partner’s biological parents between Tuesday and Wednesday, you are currently ranked seventh most popular on the list of known boyfriends, after Andrew R., Bryan, Kevin, Seth, Shawn and Kyle, but before Andrew Y. who refused to apply labels to relationships and wanted to “keep things loose.” Of the seven ex-boyfriends listed above, two of them (Andrew R. and Seth) have sent a combined two emails to your girlfriend this month, totaling about 2,200 words, both of which have gone 100 percent unmentioned. The aforementioned emails were placed in a folder marked “SAVE,” which actually contains 26 messages you’ve never seen, 23 of which would immediately increase your base paranoia by 87 percent. There are upwards of 12,000 couples within 10 square miles of your house who had more measurable fun than you did in the last eight weeks, as evidenced by this graph (right). The red line is indicative of genuine laughter, the purple line represents long, meaningful stares, the blue line shows a water sport or plane ride, and the orange line depicts sunsets or sunrises enjoyed without irony or arguments. Your current net approval rating is at 42 percent, revealing a divided house. If you look to your approval rating at this same time last year, it stood at 59 percent while, two years ago, it was at an all-time high of 81 percent, excepting that flu-week when you wore the same sweatpants for 6 straight days. Your incessant, fever-stricken whining lowered your then-approval to 54 percent (although sympathy conversely rose 13.6 percent in that same timeframe). However, it’s important to note that there is no rebound this time, according to polls with a margin of +/- 1. Across the board, you’re less popular now than ever before. According to a survey conducted last month, your partnership ranks as the second most doomed on your block, behind the couple who stand on their lawn and shriek at each other. Yours is statistically guaranteed to end three years sooner than that really attractive woman’s, the one who recently moved in across the street and is home a mere 32 percent of the week. Of the 16 occasions you’ve peered through your blinds and noticed her walking to her car, she is on the phone with her boyfriend 53 percent of the time and there’s an 91.5 percent chance that it’s serious. The trend line shows that the odds of remaining in this current relationship hover steadily at 1 in 52, the very same chances of drawing the queen of hearts out of a deck of well-shuffled playing cards. My procedures are not skewed toward your relationship failing, as I have a macro perspective on commitment and monogamy. By using quantitive polls and demographics—and after talking to numerous individuals who knew dozens of unhappy couples—I’ve accurately predicted exactly 50 out of 50 breakups this year. There is no reason to doubt my system. Valuations show that yours will meet a comparable end and that I will be right for the 51st consecutive time. My breakup forecast shows you losing 35 of the albums you bought together at garage sales, leaving you with only 15, including Sting’s fourth solo record, Ten Summoner’s Tales, which neither of you really wanted. The album does contain the song “If I Ever Lose My Faith In You,” which seems prescient in hindsight and which made it to #17 on the Billboard charts in 1993. There is a 97 percent chance you’ll listen to the song at least 20 times. Additionally, there is a 62.8 percent likelihood that your girlfriend will be dating somebody new within three months of your split. If this happens, there is an 84 percent chance that it’s that new friend from the gym you keep hearing about (see photo). Ultimately, please don’t give me too much credit for this accumulated data. Although 0.0 percent of your mutual friends were willing to say anything, 93.9 percent of them saw this coming from the start. - - - Available in print with The Best of McSweeney’s Internet Tendency
{ "pile_set_name": "OpenWebText2" }
WARNING - DISTURBING CONTENT: A man has been charged with murder after allegedly walking into a police station carrying his wife’s severed head. Abhijit Das cycled into a Patharpratima police station in India on Monday with the head in a bag, Times of India reports. Das reportedly told police he believed his wife Amba was having an affair with a neighbour. An Indian man has reportedly carried his wife's severed head into a police station and confessed to murdering her. Source: Getty Images (file pic) More He also reportedly confessed to killing her and cutting off her head but police didn’t believe him until he removed it from the bag. Das was taken into custody while police searched his home two hours away. Police found Amba’s headless body in a pool of blood in Das’s home. The man was then charged with his wife’s murder. Do you have a story tip? Email: newsroomau@yahoonews.com. You can also follow us on Facebook, download the Yahoo News app from iTunes or Google Play and stay up to date with the latest news with Yahoo’s daily newsletter. Sign up here.
{ "pile_set_name": "OpenWebText2" }
Fétorané Fétorané is a village in the Bourzanga Department of Bam Province in northern Burkina Faso. It has a population of 380. References Category:Populated places in the Centre-Nord Region Category:Bam Province
{ "pile_set_name": "Wikipedia (en)" }
Third-Party Partners with Advertising Cookies on Glassdoor Glassdoor works with the following ad networks and other third parties in connection with serving you advertising. You may click on the links below to visit their websites directly to opt out of cookie placement.
{ "pile_set_name": "Pile-CC" }
My photos and video from a recent trip to Lithuania.. I had just bought the camera, so what you see is me learning how to use it and experimenting:) One sel35f18 fixed lens and the Sony a6300 Playing with the settings, filming and snapping some pictures, but most of all creating a visual diary.
{ "pile_set_name": "Pile-CC" }
South Carolina shot from almost no solar energy to having enough to power nearly 100,000 homes in less than four years, but it's about to slam on the brakes. When the state legislature passed its landmark energy bill in 2014, it ushered in a net-metering system that allows residential and smaller-scale commercial power customers with solar panels to get credit at retail rates for the power they produce and send back to the grid. But the legislation had a catch: Once solar output reached 2 percent of utilities' peak power production, the utilities could cap the program. On July 31, Duke Energy plans to do just that for a large swath of the state. Two other utilities are also expected to hit 2 percent in the coming months, solar installers say. Customers who already have net metering won't see any change until the whole program is due to expire in 2025, but Duke Energy customers who add solar after this month will get much less favorable rates. This is all coming three years earlier than expected, and it could put as many as 3,000 solar jobs at risk. Sign up for InsideClimate News Weekly Our stories. Your inbox. Every weekend. State lawmakers have been trying to raise the cap, but their effort failed in the legislature last month. A state agency has now started up a new round of policy discussions among business and environment interests to try to find compromise, and the matter has crept into the governor's race. "We have seen really great solar adoption in South Carolina at a pace that is great for the state and that has exceeded expectations," said Lauren Bowen, a staff attorney with the Southern Environmental Law Center. "Now, it's important to figure out what's next and make sure we are not killing renewable energy and an industry everyone worked hard to build just a couple of years ago." Solar installers are worried. "When July 31 hits, very few companies are going to continue to sell solar in the Upstate because, mathematically, nobody is going to want to buy solar," said Tyson Grinstead, a public policy director for Sunrun, which leases and sells solar systems in 23 states including South Carolina. "The sales jobs will be affected first," he said. "Then the installation jobs will go elsewhere." Right now, he said, "we are in a situation where there's a lot of uncertainty." South Carolina Seen as a Model for Solar Growth The 2014 law, the Distributed Energy Resource Program Act, ushered in net metering, which allows customers with solar panels to offset their bills—some of the highest in the nation—with electricity they produce and get credit at retail rates for any surplus power they send to the grid. It also made it easier for customers to lease solar panels from businesses that provide solar services. (More than 60 percent of installations in the state are through leases, according to the South Carolina Energy Office.) Combined with other federal, state and utility incentives, solar installations quickly surged, from enough to power about 500 homes to the capacity to power nearly 100,000, according to the Solar Energy Industries Association. The trade association ranks the state 16th in the country for solar capacity. With that kind of growth, the South Carolina-based Savannah River National Laboratory concluded that the law could serve as a model to neighboring states that still have little solar power, including Alabama and Mississippi. The program has had some hiccups—local governments were swamped by zoning and permitting requests, for example, and building inspectors and tax assessors knew little about solar technology. But the national lab said it demonstrated how effective policy can "transform and grow a near nonexistent state industry into one that flourishes." Whether that growth continues will depend on how the state navigates the coming months, as two other utilities—SCE&G and Duke Energy Progress, another Duke utility—are expected to exercise their prerogative to cap net metering. A Duke Energy spokesman said net metering in South Carolina was never meant to be permanent. "Net metering was agreed to ... as a temporary incentive to help a nascent solar industry grow and help customers overcome the high cost of going solar," said Ryan Mosier, spokesman for Duke Energy South Carolina. "Solar companies have benefited greatly from the incentive (and) the costs of installation are shrinking rapidly. We need to get to a long-term, sustainable system that is fair for everyone." He declined to elaborate on any specific path forward. "We made our market a little too hot in South Carolina," said Bruce Wood, a veteran installer and owner of Sunstore Solar, who acknowledged Duke's position. "We will get a good solution worked out." Net Metering Has Been Targeted in Other States This is just the latest example of U.S. utilities fighting over net metering. Kentucky's solar industry, for example, successfully fought utility efforts to get rid of the practice earlier this year. Indiana and Michigan recently moved to phase out net metering. The solar industry saw what could happen in 2015 when Nevada ended its net-metering program. Major solar installers, including Sunrun and SolarCity, announced they were stopping local operations, closing offices and cutting hundreds of jobs. That state reversed course in 2017, when Gov. Brian Sandoval signed a bill restoring net metering after the political backlash. Utilities have argued that customers without solar panels are subsidizing those who have them. Solar advocates contend that residential rooftop solar provides benefits to utilities and the electrical grid and that utilities just want to preserve their monopolies. One practical effect in South Carolina will be substantially less favorable economic terms for future solar customers. Duke has said that customers who add solar systems will still be able to sell the electricity they produce and Duke will credit them at essentially a wholesale rate—or about 60 percent less than existing customers with solar are getting. But customers with new solar won't be able to directly offset their bills at the higher retail rate anymore, Mosier confirmed. Like in neighboring Georgia, the solar debate is driven in part by the failure of another kind of energy—nuclear power. The typical Georgia Power customer has been paying an extra $100 a year since 2011 for reactors that won't start generated electricity until at least 2021, helping to drive a rapid growth in large-scale solar there. In South Carolina, SCE&G's parent company SCANA and Santee Cooper abandoned construction of two new reactors, leaving ratepayers stuck with what University of South Carolina political science professor Neil Woods described as a "$9 billion hole in the ground." The utility is fighting in court over state lawmakers' efforts to reduce the burden on SCE&G ratepayers from 18 percent of a typical bill to 3.2 percent. Solar Becomes an Issue in the Governor's Race The nuclear costs have created a strong anti-utility sentiment, Woods said, making people pay attention to solar power as an alternative and drawing an embrace from politicians among Democrats and Republicans alike. Republican incumbent Gov. Henry McMaster does not seem hostile to sun-powered electricity, Woods said. McMaster's challenger, state Rep. James Smith, a Democrat, led the legislative effort to get the 2 percent cap lifted. The bill won majority support in both houses, but was defeated at the last minute by an amendment that required a two-thirds vote for it to pass. "I expect the Smith campaign will try to make it an issue," Woods said, though he added that voters in South Carolina are still likely to be more interested in larger economic issues, roads, school safety and social issues. McMaster's press office did not respond to requests for comment. Smith said electric utilities threw their weight around to scuttle his bill and he's not giving up. "What it has meant for our state is thousands of jobs, billions in new investments and more competitive utility rates," he told InsideClimate News. "This is about our future and ratepayers' ability to access the power of the sun for themselves, their businesses and their families." Despite the uncertainties, solar advocates are optimistic they can work something out. Republican and Democrat candidates have both said they want to lift the cap, said Thad Culley, a regional director of Vote Solar, a national solar advocacy group. "To the extent it becomes a political issue, it will be jockeying over who is doing more or who is not doing enough," he said.
{ "pile_set_name": "OpenWebText2" }
AIM MSN Website URL ICQ Yahoo Jabber Skype Location Interests MY FIRST BUILD! 1976 Datson 280z pictures of how it sits now are posted below. LOOKING TOO... * Install chevy performance shop connect and cruise LS376/480 with 4L70E *280Z LS3 Swap Kit for engine and transmission. SUGGESTIONS? Can I buy this online, if so where? *Install suspension that can handle 475 LB-FT... I NEED SUGGESTIONS?? [NOT looking to spend over $1,500] *disc brake conversion [rear] Does anyone sell simple bolt on kit for this, if so where? *cheap paint job [$1k - $2k] *Dyno mat the car *Install 225-50-15 tires *Install aluminum drive shaft. Can I buy this online, if so where? *cheap cold air intake [$500 - $1k] Suggestions??? *Aluminum radiator with high performance 11” fans [2x] I live in the desert lol *Add 20 gallon fuel cell without cutting into the trunk where the spear goes [if possible] can I use the OEM??? Also need fuel pump Suggestions? PLEASE DONT GET CRAAAZZZY WITH COAST [I'M NOT RICH LOL] SERIOUSLY THOUGH How's it goin? Well I have an issue with my 1977 280z 2+2, stock everything. I have run into the issue of the fuel becoming too hot and I just wanna know what others with the same or in the same general area. Any info/suggestions much appreciated! Hello, I recently got my car running this past week after it was in hibernation for over a year. I bought the car in 2014 and never took the time to learn much about what I had. I was hoping someone could help me figure out what has been done to my engine. To my knowledge the motor and computer is from an '83 zx turbo. Also I told by another user that my valve cover breather hose is causing a major vaccum leak. What should I do? This album is from a previous post, but it has a few good pictures of the engine bay and motor. http://imgur.com/a/4uGkb (Not sure where to post this) I cross posted this to members projects as well. Hello, Was browsing multiple forums and decided to try out Hybridz for advice. I bought a 1977 280z Frankenstein of a car with an '83 280zx turbo engine swap in 2014 for around five grand. I drove it around for a year or so and it died on me after removing the previous owners sound system. Life got in the way and the car had a parasitic draw and sat for around 15 months. I just brought it to a shop and had the fuel system flushed with new filters, however, got robbed on the price in my opinion. I did some general maintenance (oil, spark plugs, coolant) and have been driving it around for the past week. The car is far from stock and I was hoping some of you guys could help me by identifying what I have. Any help is much appreciated! Below is a numbered imgur album. Sorry it is alot of pictures. My knowledge is weak and I know I need to find a service manual, but I don't know where to start. Its pretty fast when the turbo kicks in, I believe its running around 12 pounds of boost if the gauge is accurate. Definitely kicks your head back. http://imgur.com/a/4uGkb (Not sure where to post this) I cross posted this to members projects as well. Hello, Was browsing multiple forums and decided to try out Hybridz for advice. I bought a 1977 280z Frankenstein of a car with an '83 280zx turbo engine swap in 2014 for around five grand. I drove it around for a year or so and it died on me after removing the previous owners sound system. Life got in the way and the car had a parasitic draw and sat for around 15 months. I just brought it to a shop and had the fuel system flushed with new filters, however, got robbed on the price in my opinion. I did some general maintenance (oil, spark plugs, coolant) and have been driving it around for the past week. The car is far from stock and I was hoping some of you guys could help me by identifying what I have. Any help is much appreciated! Below is a numbered imgur album. Sorry it is alot of pictures. My knowledge is weak and I know I need to find a service manual, but I don't know where to start. Its pretty fast when the turbo kicks in, I believe its running around 12 pounds of boost if the gauge is accurate. Definitely kicks your head back. http://imgur.com/a/4uGkb I just bought my first 1976 280zx and its a rebuild for sure i found a good condition RB25 N/A motor really cheap from a friend have read things about swapping it but haven't found out the stuff i will need to swap it like what transmission and stuff like that can anyone help me out? And with the rb25 n/a what would be some good stuff to pull some extra horse power out ofthe motor i would like to be right around the 300hp to the wheels? Hey guys. I am going to apologize immediately because it has been a while since I posted anything on a forum, and I know all of these sites have different procedures and rules as far as posting goes. I am purchasing a 1972 240z from one of my customers (I am a car salesman and he asked me if I wanted to buy a car while his wife was signing paperwork). He is the original owner. The car has just over 50k miles on it. The entire car has been race prepped to run in SCCA races. The engine was built by Bob Sharp and it has a lot of first gen performance parts on it. The car has been stored in a heated garage since it was purchased, but just like every car from this time period it has some cancer in the metal. The good news is that I was a sheet metal welder, so replacing the sheet metal doesn't worry me. On to my first question. The car has not run since 1991, and the current owner told me that I should check with some knowledgeable people (aka you guys) on what steps I should take to turn over the motor. He knows his stuff when it comes to working on the car because he did most of the work on the car back in the day, but he also said that I should start doing my own research in order to get myself more oriented with the whole restoration process. He did mention something about taking out the spark plugs and pouring some penetrating oil in to loosen up the engine in case it was stuck. So, what steps should I take to turn this baby over? Thanks in advance! Hello i am new to this forum so i am not sure im doing this right but. i recently bought a ms2 DIY kit from diyautotune and all was going well until i was instructed to download the firmware. I got the firmware and downloader from msextra, i run the program and i get a message (in picture). i have checked my power multiple times and the megasquirt has passed all the previous tests using the db9 adaptor from diyautune and the stimulator. i have researched everything and can not find any information on how to get the firmware downloaded with this problem. Ive been struggling with this for a total of 7 hours by now and i just want it to work. ive tried everything. HELP ME!!!!! lol. I generally keep my car in the garage in the winter. So far, it has only had the occasional struggle starting when left out in the cold. However, this last weekend it was down to -37C, and I was over at a friend's place now it's Tuesday, -10C, and it still wont start (cranks but no firing at all). I have heated it well beyond what it should need to start (using several devices). with no luck. I have found the following, the pump still works, there is spark, it cranks just fine, and it won't start even when jumped. It runs and starts just fine above +5C (with no external heater). There is a possibility the fuel lines have frozen but that seems unlikely, and I have no way to test compression, but I hear that is another possibility. Does anyone have ideas or suggestions? Hi all I would like a quick run down of the wiring schematic or any kind of help to get this 1jz started outside of the car. Came with all wiring stock from factory as well as ECU. ECU has four plugs and is a jzx100 motor. Etcs What wires do I need to hook up to get this baby to run Hello, I am new to this forum. So far, I have found the search function doesn't work as well as some other forums I am on. So if this topic has been beaten to death I apologize, but I did look (both on here and through google). As many posts here have acknowledged, the stock alternators on the S30 leave much to be desired (particularly at idle). I found sites discussing swapping to smaller diameter pulleys, but only in a generic sense. Therefore, I don't know what the alternator on a 1975 280z can handle ...or if it would even help. Has anyone tried putting a smaller pulley in to increase the idle alternator RPM? What are your thoughts and what size might you suggest? Obviously, it will wear faster and I don't want to over spin it. On the note of wear, what do you think of swapping for a clutched pulley while I am at it? If no one answers, I will just try swapping in a internally regulated 70-Amp alternator from a 1986 300zx. Hello everyone! I hope you are all having a pleasant day. I recently bought a 1970 240z after saving money for a long time. I was excited and said that it will be easy, that I am gonna build it within the next few months. I was naive and after reading a certain post on this website, i was "enlightened". "For the newbie car guys on this forum.. New to building Z cars and etc.." Is the post I read. I now want to take my time to enjoy building the car and learn as much as i can through this "journey". I would like to mention that there is no budget concerning this project since I think it will last a life time Here I am now to ask all of you who have experienced building a Z. I ask you for all the advice you can give me and to answer any question listed below if you please. If you think there is a link that will answer or help me in anyway, go ahead and add it. 1. What would you recommend to have in a garage in order to modify a car in general? I am new to this so please list everything you deem necessary 2. What are the reasons you chose a certain engine? The Z i bought has an rb25de neo and I wondering about the positives and negatives about the engines (2JZ, SR20DET, RB26DETT, etc) 3. For a newbie like me, what would you recommend I do in order to gain more experience? 4. Where do I begin? 5. Which differential do you use and why? This is my first time posting so I do apologize for any grammer/spelling mistakes as English is not my first language. I also do not know what information am I missing in this post so, if there is anything you would like to know about me or the Z, please ask away! Regards! Hey guys, I have owned this car since high school (1999). I have always wanted to fix it up and have it as a weekend cruiser, however I never had the money.....until now! I am in the Richmond, VA area but I am willing to tow this car to DC/Baltimore/MD area or NC area. I am looking for somebody to help me restore this car. It has been sitting for awhile and needs to be gone through to get it back running again. If anybody can point me in the right direction please let me know. I want to get this car running again, I need help with engine/turbo/fuel/electrical etc, but I will handle the body/paint/cosmetic side (unless feasible in area). Thanks, Andrew Hello everyone, i had a question regarding the sr20det swap into the s30 chassis more specifically a 280z. What needs to be done so that the egnine can get enough fuel for about 250-300 crank horsepower reiably? Getting a fuel cell isnt really an option since i plan to daily this car in the future. I was just curious what everyone else was using in terms of fueling in their ka/sr swaps. I have a 260z thats wiring wise all stock. My fuel, clock and tach(sometimes) gauges all work. My voltage is stuck somewhere in negative so I'm not sure if thats electrical issues involving alternator but i don't mind that one not working. My oil and water gauge does not work. I have a newly bought oil sender, the bullet type water temp sender(is this the sender) with single bullet connector connected but the sensor next to it with two wires coming out isn't connected because they were cut completely off. I took off gauge and put battery + terminal to ign(G) and the black wire to ground. i then grounded my oil wire(Y/B) and it only moves to the 0 position. i thought it was supposed to move all the way? Is the gauge bad? Any help is appreciated as i really can't afford one right now and don't want to run my car without either of these gauges. Also how can i tell if my water pump is working? I have no leaks but i feel the engine gets very hot very quickly. I took the radiator cap off and i thought bubbles would come out or you would see the coolant flowing or moving but it was very still. I'm afraid thats also bad. hey guys I currently have a stock 76 280Z and i was wondering if it would be possible to get 16x9 with a 15 offset on without the use of flares ( not a huge fan of flares ) im pretty sure i would need to get my fender rolled but i still need some more knowledge on this. If i could fit them what about tire sizes and etc ? Also i may lower the car with eibach springs in the next couple of months will i still be good without the flares then ? thank you for any help Ok, So I need some help with wiring. I am swaping a 1981 l28et into a 1976 280z I recently just found out that the wiring harness and ECU that I have is from an 1982; after checking the serial # on the computer and noticing that the wiring harness did not have a hook up for the dropping resistors. I have been having difficulty understanding the wiring diagrams for both the 1981/2 harness and the 1976 harness. I have been using the Bumble Z ( wiring torutrial as a reference but I am still confused. Most of what I have figured out is quite simple: the injectors, CAS, other sensors, but thats about it. Problems 1. The Coil and Ignitor This is my original coil. What can I remove from this harness what should I keep? This is my "new" coil I do not have the part of the harness that plugs into it but I have firgured out a way to make a plug for it I just need to know what goes to what. The pins on the ignitor are shaped like a T (a Black w/ whit wire and a Blue wire run to the ignitor from the coil) I cant figure what I should wire to this But I am pretty sure it has to do with the computers spark control. 2. Fuseable Links I have both fuseable links right now for the old engine and the "new" In this picture I have them mounted next to each other. I understand from the Bumble Z tutorial the only wires I need are the green a brown wire on the "new" harness. I am a little uneasy about removing or cutting any of the wires that lead to the existing fusable links. (Do I need this to run my lights or fuel pump?) 3. Ignition Harness This was pluged into what I belive is the ignition harness of the "new" ECU and the back end of this plug should somehow run to the ignitor/coil. In the bumble z tutorial he had a 6 prong plug, his one has 8. 4. Switched Power In the tutorial there are a lot of things that need to be run to switched power what should I use? I think I have firgured out that the black w/ white wire that runs to the coil should be switched power but im not really sure. I will really apreciate some input please dont tell me to search more, maybe at least point me in the right direction. I live in the Seattle area but my car is in lakewood (hour south of seattle). If there are any wiring gurus that can help me I would more than greatfull. Also I am a college student at Seattle University studying photography. i am willing to trade som automotive photography services for help with the wirring. Side Note: I am really losing morale I already have had one of the turbo engines I was working on stolen that I bought for $1000, wich is a lot of money to a college student. Thanks for all the help!!! So yesterday, my car was totaled. I was at a red light at the bottom of a bridge, and on the left lane there was a guy who was pushing his car because he was having car problems. 30 seconds into waiting for the red light to turn green, I looked into my rearview, I saw a Honda coming at me at least 45 mph. I saw him 2 seconds before he hit me, so I braced for impact. He pushed me to the other side of the intersection. I tried to exit the car but the feders trapped the door, so I climbed out the window. I went up to the driver and asked what happened with him and told him off for being reckless. He told me that he was distracted by the guy pushing his car because he wanted to help him out. So I called insurance and cops took a report. Today the adjuster came and said the car is a total loss. He said they'll get back to me within a few days with an offer. I've put a lot of time and money restoring this car, but I have a feeling they will try to lowball me. Has anyone had a similar experience? How much were you compensated? How can I make sure I get back what I put in? Hey everyone, I own a 1971 240z with a vg30e motor swap that was done by a previous owner. I'm looking for more power and have read up quite a bit on the nA to turbo conversions. I have found a 1985 300zx turbo donor car and I'd like to do the conversion. I'm no mechanic so i do need help. Does anyone have any shop or mechanic recommendations for this type of work? im new to this. so i pulled my stock vg30 out and have been in the process of a v8 swap. i have the v8 all built heads cam carb but im having a problem i have been trying to mock up the motor location so i can built my motor mounts and the damn oil pan is hitting the rack n pinion. anyone have this problem or know what kind of oil pan i should switch to any help would be great thank you Hey, I havn't hardly posted on here, cause I really couldnt find reason too. Everything I was looking for was already on here asked by 300 other people lol. I seen the last few days yall been having trouble with the website, I'm glad its back up cause seriously this is my #1 source for info on my 280Z. Since I bought it a few years back I've finally got the efi to work and get the car up to where I can enjoy it. The motor is coming out near the end of the season and gonna put some flat tops and megasquirt. I seriously cannot wait to do all this. I just wanted to let everyone here on this forum that posts their fixes, problems, and issues THANK YOU! You've helped me tons and on a limited budget! Not to mention great reading about some of your guys and gals cars in here. Tommorrow the cars gonna get flogged on some north ga mountain roads near my house all thanks to you guys. I bought a 1977 280Z off my neighbor for $400 garage kept for 20 years when he stopped driving it due to him becoming handicapped. Been driving it for a while, but I do want to do an engine swap on it. I hear alot about these LS1, LS2, LS6's being good also pretty easy being that holley makes kits for them. My friend told me to put an engine from a 90-95 300zx either single turbo, twin turbo, or non turbo. He also suggested a turbo 3000cc or an F20c. I guess what i'm asking is for the more senior car men to give me suggestions on what I will give me the most bang for my buck. Im open to all suggestions of other engines. Well Guys, First of all Hi! I'm new to the forum, I purchase a 240z about a month now & I started dismantling the car (IS A PROJECT)... so the old owner made a swap already, to a turbo of a newer version, but I'm not sure about the exact model or year of this engine I will guess is a 280zx engine because is turbo, but not sure about it... please check this photo... I'm not sure if keep this engine or make an RB25dett swap from a GTS Skyline Please need some urgent help of what should I do how many hp this engine gives and what about the RB Thank You All
{ "pile_set_name": "Pile-CC" }
Ablative facial resurfacing. Ablative resurfacing is a powerful tool for rejuvenation of the aging face and for the treatment of a wide array of skin lesions. In the proper hands, it is a safe and effective way to treat many of the problems of photodamaged skin that surgery or nonablative methods cannot address. This article discusses the three most common modalities used in ablative facial resurfacing: chemical peels, dermabrasion, and laser resurfacing. Indications, mechanism of action, techniques, results, and complications all are reviewed.
{ "pile_set_name": "PubMed Abstracts" }
Towards Artsakh Towards Artsakh () is an Armenian Entertainment television program. The series premiered on Armenia 1 on September 21, 2014. Each series of the TV program presents some area of life of today’s hospitable Artsakh and reveals its most interesting aspects. What is Artsakh famous for? What has remained in the shadow up today? The program covers these questions as well as refers to the interests of young people and concerns of the older generation. Artsakh’s legends and true stories are presented through the eyes of eyewitnesses. External links Towards Artsakh on Armenia 1 Category:Armenian-language television programs Category:Nonlinear narrative television series Category:Armenia 1 television programs Category:Nagorno-Karabakh Category:2010s Armenian television series
{ "pile_set_name": "Wikipedia (en)" }
Do you need a more specific solution? Concrete Buckets No matter what size concrete-pouring project you’re facing, Herc Rentals concrete buckets are built to take them all on. From half-yard buckets to two-yard buckets, these lightweight, round-gate designs provide for easy mobility and pours.
{ "pile_set_name": "Pile-CC" }
Details Zen Garden Ring set ♥ Inspired by Zen Gardens. ♥ Feminine and delicate look- A set of 6 rings diamond band is good to get a variety of clasic looks. When you want dazling diamond effect stack all 6 rings together, no one will miss this rich look. When you want more modest, delicate look, stack 2-4 diamond bands. you can wear the other 2 on the other hand. When you want Rihanna / Beyonce look put rings on all of your fingers for the music star look. I promise you this - these rings are Always in fashion & will always be chic.
{ "pile_set_name": "Pile-CC" }
Home Cities Chandigarh Punjab: Two judges prematurely retire after HC orders Punjab: Two judges prematurely retire after HC orders Sources said that the Punjab and Haryana HC had recommended premature compulsory retirement of the Additional District and Sessions Judge Harjinder Pal Singh after a full court decision on March 6. The Punjab government has terminated the services of two lower court judges following a full court recommendation from the Punjab and Haryana HC for their premature compulsory retirement. Both the judicial officers have been relieved from their services. Sources said that the Punjab and Haryana HC had recommended premature compulsory retirement of the Additional District and Sessions Judge Harjinder Pal Singh after a full court decision on March 6 following a complaint against him that he “pressurised” a junior judge in adjudication of a matrimonial matter. HC, after the full court’s recommendation, had withdrawn the judicial work from him. A division bench comprising Justices AB Chaudhari and Inderjit Singh on May 1 was informed about the government notification by HC’s own counsel Rajeev Kawatra during hearing of Harjinder’s petition against the withdrawal of judicial work. “The copy of the notification is handed over to DS Patwalia, the learned senior Advocate, who may amend the petition, if so advised. Leave to amend,” the division bench has said in the order. Advocate Saurabh Arora, who appears in the case along with senior Advocate Patwalia, told The Indian Express that the petition has now been amended following the government’s notification. “We were informed about the government’s decision only during the hearing of the case on May 1. Our main contention is that the decision has been passed without holding any inquiry,” he said. The order in the case of Harjinder(58), has been passed with retrospective effect with his retirement to be considered from the age of 55. The government has also ordered the premature retirement of Chief Judicial Magistrate KK Bansal and he also has been relieved from his services. Sources said that the complaints against Bansal relate to disciplinary rules and regarding some judicial decisions in NDPS cases. His judicial work had been withdrawn prior to Harjinder but the notifications regarding their premature retirement have been passed in the last week of April. 📣 The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines For all the latest Chandigarh News, download Indian Express App.
{ "pile_set_name": "OpenWebText2" }
Rice engineering majors breathe new life into ventilators in low-resource settings. By Mike Williams, Rice University05.02.19 Natalie Dickman squeezed the bag again and again in an effort to revive a victim of cardiac arrest. After a mere 3 minutes, she could squeeze no more. “The patient had been down for 30 minutes and there wasn’t much hope, unfortunately,” said the Rice University student, a soon-to-be graduate of the Brown School of Engineering, who was covering a shift with Houston EMS as required by a Rice class in emergency medical techniques. “I was allowed to bag, but they make you switch in EMS settings because they know you won’t be as accurate once you hit that 2-to-3-minute mark. You get really tired.” She thought about that often over the last year when she and her senior teammates worked at Rice’s Oshman Engineering Design Kitchen (OEDK) to perfect a cost-effective device that automates the compression of manual bag valve masks, which feed fresh air to the lungs of intubated patients. The team has developed a system that compresses the bags for hours, rather than minutes, with settings to feed the right amount of air to adults, children and infants. The device seems simple—a box with paddles that rhythmically squeeze the bulb a programmed amount—but the engineering behind it is not. The students used a $25, off-the-shelf motor and $5 microcontroller to power and program the rack-and-pinion device made primarily of plastic parts 3D-printed at the OEDK. They hope their use of inexpensive materials and the growing availability of 3D printers will make their machines easy to repair on-site. They anticipate the device, which cost them $117 in parts to build, will be most useful in low-resource hospitals or during emergencies when there aren’t enough portable ventilators to meet the need. Dr. Rohith Malya, an assistant professor of emergency medicine at Baylor College of Medicine, brought the problem to the OEDK after witnessing family members at the Kwai River Christian Hospital in Thailand, where he is director of emergency medical services, squeezing intubation bags for hours on end to keep loved ones alive. “There is no reliable ventilation,” said Malya, who spends a month at the hospital every year. “Once we intubate somebody, the family has to bag the patient. But the family will get tired after a day and say, ‘They’re not getting better right now, just pull the tube and see what happens.’ And then the patient dies.” Malya previously worked with Rice engineering students to develop a syringe regulating pump, and did not hesitate to bring a new idea to the OEDK. “The bag mask is ubiquitous, like the syringe,” he said. “Nothing has challenged it for 80 years. It’s stood the test of time, it’s reliable and it’s simple. And now we’re adding a modification to the original device so families don’t have to make those decisions. “This will broaden the access to mechanical ventilation to a tremendous part of the world that doesn’t have typical ventilators,” said Malya, who plans to take the proof-of-concept device to Thailand for field testing next spring. The device is much smaller than the sophisticated ventilators found in American hospitals and portable versions used in emergency situations. Critically, it has to be able to operate for long stretches. In its most recent test, the team ran the device for more than 11 hours without human intervention. The students expect another Rice team will build a more robust version next year, and hope it will eventually be manufactured for use in low-resource and emergency settings. They anticipate a better-sealed and filtered box will be more suitable for hot, dusty environments, and said future designs should include more sophisticated controls. For its efforts this year, the team won two prizes at the school’s annual Engineering Design Showcase, the Willy Revolution Award for Outstanding Innovation and the best interdisciplinary engineering design award. But the real payoff would be seeing the device further developed and deployed around the world. “If they can get it working fully in that kind of environment, this will be saving lives,” Nasteff said. Cookies help us to provide you with an excellent service. By using our website, you declare yourself in agreement with our use of cookies. You can obtain detailed information about the use of cookies on our website by clicking on "More information”.
{ "pile_set_name": "Pile-CC" }
Q: HOWTO: Call Managed C# Interface From Unmanaged C++ On WindowsCE Compact Framework I have extensive unmanaged Windows CE 5 C++ code that provides a UI that I want to use in a new product by combining it with a large amount of newer business and communications logic written in managed C# on Windows CE 6 and the Compact Framework. The UI may know about the business logic, but I want the business logic ignorant of the UI such that I can later replace it with a managed version, or any other UI that I choose as a front-end. I found an article that describes how to use COM as the bridge in the Windows world, but I'm having difficulty applying it in the .NET CF under WinCE. In the past, I've imported type libraries and used COM calls (CoInitialize(), CoCreateInstance()) to obtain pointers to interfaces on other Windows platforms, and that's the strategy I'm pursuing at the moment: using COM directly in the unmanaged C++ library to access the C# interfaces in my managed library, assuming that the same facility is provided in WinCE. Here's my problem: the typelib. It's not available from my managed C# library as I've used it in the past via a '#import "SomeCPPLibrary.dll"' statement. I believe it's buried in the .dll assembly, stored in a different manner than it has been in the past and hence, not directly available through a #import of the library itself. I think that I can #import a typelib, but I cannot find a way to extract the typelib from my managed .dll, and while I might be able to hack together an interface definition file (.idl) and use the platform's midl.exe to generate a .tlb from it, there's no guarantee that my .idl, and hence, resulting .tlb, would really match what is in my C# .dll. I don't even know if the platform midl.exe works in this manner but assume that it does. Am I barking up the wrong tree? Is it possible to use a managed C# interface in unmanaged C++ through a corresponding COM interface? Does setting the [assembly: ComVisible(true)] attribute in its AssemblyInfo.cs file make all interfaces in the managed assembly available through COM in the unmanaged world via the GUID the AssemblyInfo.cs defines, or do I have to do something more? How do I get the typelib out of the managed .dll so that my unmanaged C++ library can #import it? I tried adding my managed C# library project as a reference in the unmanaged C++ library project, but that didn't seem to help. Is such a reference relevant at all in this situation? Is there a better approach to solving the basic problem of calling managed C# code from the unmanaged C++ world? Something I just read about here is a mixed mode libarary with a managed translation layer to bridge the unmanaged/managed gap. I'm not sure that is a good strategy as call response speed is an important factor, but might it be better in the long run as I plan to rewrite the UI to managed C# at some point, and thus puts all the effort on the throw-away UI rather than mucking with the more permanent business/comms logic? Regardless of the answer to this question, I'd still like to solve the problem of using COM, if for no other reason than curiosity. A: I have attempted to call C# from C++ in WinCE. I don't believe there is any COM support provided by the Compact Framework, so you can't use ComVisible(true). I also couldn't find a way to host .NET in C++ because again the functionality wasn't exposed in the Compact Framework. My solution was to create a stub C# application and communicate with the C++ host via Msg Queues. This also solves the data marshaling issue. Performance for my usage is fine. The biggest cost is the startup time of the stub which you'd have to pay anyway if you're complete app was C#.
{ "pile_set_name": "StackExchange" }
Viewed from the shore at Lau Fau Shan village fish market in Hong Kong’s New Territories, Shenzhen is an imposing behemoth of high rises and skyscrapers. Guangdong’s second largest metropolis was China’s first global city, designated a special economic zone and opened to foreign capital in 1980. From semi-rural county, it grew to be the Silicon Valley of the People’s Republic in just a few decades. More than 8 million of its estimated 13 million population are migrant labourers. This week, they are returning to work after the extended lunar new year holiday, but the city remains in a partial lockdown due to the coronavirus outbreak, after Guangdong became the second most infected province in China. One thousand kilometres north, the largest quarantine in human history is ongoing: a total lockdown of maybe 60 million people in Hubei province and its capital, Wuhan, the epicentre of the epidemic. Partial lockdowns continue in Guangzhou and China’s key industrial zone, the Pearl River Delta (which includes Shenzhen), and the four big coastal cities of Zhejiang province in the Yangtze River Delta, another important industrial zone exploiting millions of migrant workers. So too Beijing and Shanghai. At least two cities, Tianjin and Xian have imposed entry restrictions for people from affected areas. In all, more than 80 cities in 20 provinces reportedly are affected. “It’s every province. Every province has shutdowns”, Lu (not his real name) says over the phone from Handan, a city of about 10 million in Hebei province. “Here all buses have been stopped. The schools are shut until March. All businesses are shut except supermarkets and the vegetable markets – although I haven’t been outside for five days so maybe it is changing with people going back to work. Everyone is upset about the cover-up. Even pro-government people. But mainly the anger is with the local government [in Wuhan], not Beijing.” More than 1,000 people are dead in Hubei. The ruling Communist Party initially failed to respond to warnings from medics in Wuhan. City officials are accused of orchestrating a cover-up, ignoring or supressing information about the outbreak and harassing and detaining doctors who sounded the alarm. Before the shutdown in late January, several million people potentially exposed to the coronavirus had already left (lunar new year celebrations are a time of great human movement in China). The pathogen hitched a ride with some of them. When authorities flipped from censors to crowd controllers, the quarantine declaration came eight hours before its enforcement, prompting an estimated 1 million people to flee to other parts of China. Again, the virus travelled with some of them. The lockdowns soon proliferated. “The situation is very tense. There have been no notifications when it is going to reopen again”, says a resident via email from a quarantined Hubei city. “The closures came very suddenly and there are no exceptions at all. But the problem is that the logistics support to go hand in hand with this closure has not been ready at all. There are now lots of SOS requests in Wuhan city coming from individual citizens. Here, all necessities are in short supply. Masks and hygienic wipes cannot be bought. People feel that the lockdown is necessary ... But we are all very angry at the government for lying about the virus ... They shouldn’t just do propaganda in this type of situation. We want open information; transparency ... And we need professionals, mutual aid groups within the community so that individual citizens can have their needs met.” The lockdown of Wuhan, Hubei and then other areas may have been a panic or a belated display of “decisive action” from the Communist Party. Putting aside that it was botched from the start, and that greater death and suffering in Wuhan may well have been the result, it is not clear whether it has been effective in slowing the spread of the virus. But it unquestionably contributed to broader anxieties as the focus shifted to a perceived collective carrier: people from within the quarantine zones as agents of or proxies for the plague. As the death toll and the number of infections rose, the fear arrived. Washington Post China correspondent Gerry Shih noted: “As the epidemic radiated out from Hubei’s capital, Wuhan, in recent weeks, Chinese have turned against those who hail from the province ... Those from Hubei found in other parts of China are tracked down, accosted and locked at home by neighbors ... On social media, Chinese have condemned the 5 million so-called ‘public enemies’ — Wuhan residents who fled the city in the days before and immediately after the government’s lockdown order ... In the northern city of Shijiazhuang, neighborhood committees offered bounties of $280 to anyone who reported someone who had visited Wuhan ... In Jiangxi’s provincial capital, Nanchang, hotels asked guests to answer surveys asking if they had travelled to Hubei. A receptionist at a major international chain assured a visitor that there were no guests from Hubei in the building. ‘We’ve rejected them all’, he said.” Panic is contagious. Travel bans and restrictions, and partial suspensions or full closures of borders were implemented by almost all of China’s neighbouring states as it became clear that Beijing had lost control and that official information was unreliable: Afghanistan, Bhutan, Kazakhstan, Kyrgyzstan, Laos, Mongolia, Nepal, Pakistan, Russia, Tajikistan, Taiwan and Vietnam. Significantly, North Korea closed its borders the day Wuhan was locked down; Pyongyang shutting the gates on the country that guarantees its survival was an early indication of the potential seriousness of the outbreak. So too with Macau. The semi-autonomous territory shut its casinos for two weeks, a de facto border closure, while panicked authorities deported people from Hubei back to the mainland. ————— Dread is spreading throughout Hong Kong. The virus is here. Public congregations and family gatherings are discouraged. The libraries are closed. The schools are closed. The museums are closed. The universities are closed. Water is not flowing from public drinking fountains. Even the morning bird watching in Hong Kong Park has been cancelled. Loudspeakers at metro stations implore people to wear a mask, to wash their hands, to not touch their mouth or nose, nor rub their eyes. Don’t spit. Sneeze only into a tissue. Carry and use sanitiser regularly. The territory’s chief executive, Carrie Lam, has told everyone to stay home if possible. On the second floor of the Tang Lung Chau wet market in Causeway Bay, cleaners are nervous. Doctors without Borders is briefing about basic hygiene and how to stay safe. “There’s no-one here to help us – we have to help ourselves”, an elderly cleaner says once the presentation is done. “Be careful when working. Stay hygienic. We must stay optimistic.” When the NGO leaves, a volunteer with the cleaners’ union makes a speech about government inaction. Another worker agrees. “The government has not provided enough equipment”, he says through a translator. “There may not be enough [masks and gloves] to get through next month.” When I pull out a stash of masks, hand sanitiser and alcohol wipes picked up in Australia, there are audible gasps. “This is like gold here!”, says the union volunteer. Asia’s World City, as Hong Kong likes to call itself, is in chaos. On Nathan Road in Tsim Sha Tsui, a queue outside a cosmetics shop stretches 30 metres. The woman at the front says she’s been here for three hours, waiting to get medical masks. Two weeks ago, when a trading company announced it had 11,000 boxes of them, more than 10,000 people queued overnight. On Sunday morning in Causeway Bay, hundreds are waiting in line. Is this for masks? “Only for Indonesians”, a woman says. They are domestic workers. Presumably their employers want them fit for duties. A young woman walks by with two bags full of boxes of tissues – panic buying. Many supermarkets have been cleared of rice and toilet paper after rumours spread, much faster than the virus has thus far in Hong Kong, of impending shortages. The government has fucked up big time. There’s no other way of putting it. Almost two decades after severe acute respiratory syndrome (SARS, another coronavirus) killed 299 people in the territory amid claims of coverups and inaction, Hong Kong appears thoroughly unprepared. The city’s vaunted free market capitalism has failed. There aren’t enough masks. There’s no sanitiser. Four quarantine zones have hastily been declared, but they are either in or are close to residential areas and some of the locals are apoplectic. Why hadn’t proper sites on government land been prepared earlier? Last week, 7,000 medical workers from the newly formed Hospital Authority Employees Alliance went on strike to protest the government’s response. They raised five demands: forbid all travellers from entering Hong Kong via China, ensure a sufficient supply of masks, provide isolation wards and stop all non-emergency services, provide support and facilitation for healthcare staff caring for patients under isolation, and publicly commit to not take disciplinary action against striking workers. Much has been made about the so-called xenophobia at the heart of the demand to close the border. But that is a misreading of the situation. Anti-mainlander sentiment certainly exists here – how could it not when the Communist Party is infiltrating every political and civil society institution in Hong Kong and the territory is being forcibly integrated into China? Yet while some groups are trying to use the panic to push an anti-mainlander agenda, the border demand is animated by panic – and a recognition that the already strained and under-funded health system will collapse under the weight of a pandemic. “The Border closure has to be looked at in the context of SARS. 2003 is very close in people’s memories”, a local activist says. “China hid the outbreak until too late, and a lot of Hongkongers died because of it. Closing the border is looked at from almost exclusively a public healthcare perspective.” But what about the right wing of the movement for Hong Kong’s self-determination, is it gaining support in such a reactive situation? “The ‘right wing’ of the movement is incredibly small, as most of the ‘right wing’ in Hong Kong is the pro-government, pro-Beijing parties. That’s where you find the anti-LGBT, anti-immigrant anti-refugee candidates”, he says. “That’s not to say we don’t have some nativists on our side, but they are a minority with not that much pull. They only look bigger than they are because both the tankies and US far right media latched onto them as something they could use for their political agendas and spread that imagery around constantly when it is totally non-representative of the movement here. The strike was supported, and unionising has been a huge part of the build towards finding more ways to put pressure on this government.” A volunteer with the cleaners’ union echoes this. She seems slightly puzzled by my probing. “Macau and Taiwan have done it, why not here? It’s not against Chinese people – it’s the virus”, she says. The issue is also intertwined with the collapse in the government’s authority, which looms large. A Hong Kong Public Opinion Research Institute poll last month found that just 19 percent of people trust the government. Seventy percent say they have no trust. The territory’s leader by law must be a China loyalist and the current chief executive, Lam, is widely seen as a stooge. So when she labelled as “discriminatory” the calls to shut the border, it riled people – Beijing’s puppet telling everyone that their legitimate fears are just anti-Chinese racism. Socialists generally, and rightly, are opposed to the national borders which divide workers from one another and create barriers to building a united movement of oppressed against oppressor. But at this point in the struggle, that arbitrary little line that we despise is the only thing standing between Hong Kong and totalitarianism – its disappearance, when it comes, will be the triumph of reaction over the already limited freedoms that exist here. That fact should give people in the West pause for thought before branding all talk about border controls here inherently reactionary. The authorities’ lack of legitimacy, and the paucity of information about the virus itself and about the real situation in China, also means that any story on social media seems more plausible than official statements. One widely heard conspiracy is that Lam’s inaction on the border is a deliberate ploy to make people sick in retaliation for the ongoing pro-democracy movement. It is far-fetched, but that so many people don’t rule it out is indicative of the deep anti-government sentiment. Lam reluctantly closed all but three of the border crossings. And she announced a quarantine of all travellers arriving from the mainland. I also discover a “frontier closed area” along the border when a cop at a roadblock orders me from the number 55K bus on a trip to Sha Tau Kok, a village in the north-eastern New Territories. Two leading scientists – Leung Chi-chiu, chairman of the Advisory Committee on Communicable Diseases under the Hong Kong Medical Association, and infectious diseases professor Yuen Kwok-yung from the University of Hong Kong – say that these measures were prudent because drastic action is required to stop the transmission chain. “Yuen said every measure should be taken to minimise the spread, including further border closures”, reported Lilian Cheng and Gary Cheung in the South China Morning Post Several days ago. “The priority for the 14 days from Saturday was to stop more people from the mainland with the virus entering Hong Kong, Yuen said.” Time will tell whether these measures save lives, although there is quiet confidence on the part of Yuen that the situation is now manageable. But while Hong Kong holds its breath, across the border the Chinese economy is stuttering; the Communist Party wants industrial production restarted. The markets demand movement – movement of goods and movement of labour. If the shutdowns were nothing but reactive, useless (or worse) political stunts, then switching to a focus on growing GDP, with all the attendant health risks that come with that enterprise in regular times, will at least be a good thing for lifting the restrictions on people’s civil liberties. Today though, the official figures from the Chinese government suggest that the situation is getting worse. What if cracking the whip on tens of millions of migrant workers in the middle of an epidemic results in a new wave of infections?
{ "pile_set_name": "OpenWebText2" }
Q: Sum of numbers in array I am new to programming and I try to solve problems in online-judging system. There is a problem, which looks very interesting and important, but unfortunately I have no idea how to solve that. I would appreciate any hints. Here is the problem: Given an array as an input. Print 1 if there are two subarrays, which have the same sum of numbers, otherwise print 0. Input: 2 1 1 Output: 1 Input: 3 2 5 3 Output: 1 Input: 3 1 4 7 Output: 0 Thanks A: This is known as the partition problem (or at least a variant of the partition problem). It's a problem that requires what is called a dynamic programming solution. This is a pretty advanced problem for someone who is just beginning to learn how to program. I advise starting on some easier challenges. If, however, you are interested in tackling this beast, check out this link: http://people.csail.mit.edu/bdean/6.046/dp/. The link on this page to the 'partition problem' shows a video explanation of a working solution.
{ "pile_set_name": "StackExchange" }
Reggie just brought around a whole stack of confirms of pulp & paper deals that came into the fax area. Is anyone looking for this stack of confirms? If not, I'll have Reggie walk them down to Joe Hunter.
{ "pile_set_name": "Enron Emails" }
Q: What does it mean to start a server in your own computer and access the application through you computer? I understand that the rails s command starts a server and you can access your Rails application because of this command. However, don't you usually have to connect to some other server outside of one's computer? A: Why that? A server is just a "computer" and it can be your one. One difference is that you make HTTP request in your local network (from the browser to the server on your machine). While in a request to a real server the request also starts from your browser but reach a server elsewhere.
{ "pile_set_name": "StackExchange" }
Influence of HLA-DR phenotype and myopia on the risk of nonproliferative and proliferative diabetic retinopathy. The relationship between HLA-DR phenotype, refractive error, and risk of both nonproliferative and proliferative diabetic retinopathy was studied among 227 insulin-dependent diabetics participating in a case-control study of diabetic retinopathy. In the absence of myopia, risk of both proliferative and nonproliferative diabetic retinopathy was increased for HLA-DR phenotypes 4/0, 3/0, and X/X (HLA susceptible) compared to HLA-DR phenotypes 3/4, 3/X, and 4/X (HLA nonsusceptible). Odds ratios equalled 11.8 and 7.4 respectively. In the presence of myopia this increased risk associated with HLA status was abolished. Myopia decreased the risk of proliferative and nonproliferative diabetic retinopathy among HLA-susceptible individuals, odds ratio equalled .09 and .09, but had no protective influence among HLA-nonsusceptible individuals.
{ "pile_set_name": "PubMed Abstracts" }
Q: Weird directory entries in FAT file system So I'm trying to figure out how the FAT FS works and got confused by the root directory table. I have two files in the partition: test.txt and innit.eh which results in the following table: The entries starting with 0xE5 are deleted, so I assume these were created due to renaming. The entries for the actual files look like this: TEST TXT *snip* INNIT EH *snip* What I don't understand is where the entries like At.e.s.t......t.x.t Ai.n.n.i.t.....e.h. are coming from and what are they for. They do not start with 0xE5, so should be treated as existing files. By the way, I'm using Debian Linux to create filesystems and files, but I noticed similar behaviour on FS and files created on Windows. A: The ASCII parts of the name (where the letters were close to each other) is the legacy 8.3 DOS shortname. You see it only uses capital letters. In DOS, only these would be there. The longer parts (with 0x00 in between) is the long name (shown in Windows) which is Unicode, and uses 16bits per character.
{ "pile_set_name": "StackExchange" }
Gmail is used for MAIL on ipad 2, The app gmail is like before, ok! But in mail, since the upgrade, i receive nothing in inbox! I can sent only! In mail, hotmail seems to work ok! So it is an incompatibility? Beetween Ios6 and gemail on ipad 2? With the new ipad, nothing changed since ios 6! Perfect! Using too gmail! In MAIL or in gmail app! Useful Searches About iPadForums.net iPadForums.net is a community dedicated to the Apple iPad. We discuss various topics including iPad Help, iPad Reviews, iPad Apps, iPad Accessories (such as iPad Keyboards, iPad Cases, iPad Covers), iPad Games and more. iPadForums.net is not affiliated with Apple. We are an enthusiast site dedicated to everything Apple iPad (iPad 1 and iPad 2)
{ "pile_set_name": "Pile-CC" }
Latest Patch: 1.69. If you have an earlier version, please download the latest patch as soon as possible. The download has been updated to version 1.69. It includes all fixes up to this point. There is no need to re-download if you have patched in the fixes separately. You know that game many aspiring devs create? The one starring their friends, often times based on a chat room, or some forums, or a MMO... or perhaps a fangame that barely resembles its source material. The one that gets maybe a half hour of gameplay finished and is completely unintelligible to anyone except that group of friends. Yeah, that one. Now, what if someone actually saw that project all the way through, and attempted to actually make it a fun, accessible, and playable game that was faithful to its source material? Enter Legend of Balance. This game originally started out as a fun little project for friends, starring characters from Final Fantasy XIV. Over time, and with a ton of effort, it changed into a complete game of its own. It still stars our characters, and there are still a few injokes, but the plot has been set up as such that any Final Fantasy fan can get into the game and enjoy it as a light hearted Final Fantasy romp. Players of FFXIV will find quite a bit to enjoy as well. The story of the game takes place inbetween the end of FFXIV 1.0 and the start of A Realm Reborn(if you haven't played FFXIV, this part probably doesn't matter, and the game can be standalone). The game revolves around a group of heroes, champions of the realm of Eorzea. In the midst of an intense battle to decide the fate of Eorzea, the heroes are transported away before facing certain death at the hands of Bahamut. Finding themselves separated in a brand new world, the heroes begin a journey to reunite and find a way home. However what starts off as a simple quest quickly unfolds into a classic journey of crystals, great evil, and steadfast allies. Before this adventure ends, they will discover the truth behind this strange new world, and uncover the binds that tie it to their own home and beyond. -30 to 40 hours of gameplay, including a multitude of sidequests. -Enjoy a faithfully recreated Final Fantasy battle system. Everything is as you remember it from the classics! -Utilize classic abilities, including commands such as Jump, Runic, Blitz, Mime, Throw, Mix, Blue Magic, Dualcast, and much more, along with new commands and abilities based on other games in the series, such as Draw Out from Tactics. Latest Blog First off I want to say thank you so much to everyone who voted for our fangame in the Misaos! We won in a few categories and got pretty close to winning in a few others. I was very humbled by all of your support and am very grateful as well. I know Rydiamist feels the same way, So again thank you everyone! Your support is huge motivation booster to get stuff done on our next fan game! Rydia has been working on making a small little bonus to the game to celebrate getting 5000 downloads! I personally have moved away from working on Legend of Balance other than looking into bug reports we get here and there… but I that doesn’t mean I don’t have something new to contribute to it as well! I have been spending a lot of time working on our next Final Fantasy fangame, making sprites, looping music, making maps and tilesets, all sorts of fun stuff… but in addition to that, I have been trying to recreate some cool Final Fantasy animations in RPG maker. Let me tell you guys something… I HATE RPG makers animation editor so much, it is so hard to work with… but you have to do what you have to do. One of the animations that I have been working on has been Fenrir. Now, I always thought it was strange that Legend of Balance didn’t have a Fenrir Magicite since (spoilers) you fight Fenrir in the game. However! For the 5000 download patch, I would like to present to you, Fenrir's Animation~! author=magnaangemon01It's not showing me any mirrors. Maybe it's just me. Hmm, I will take a look and make sure that the mirror link under the Downloads tab works. In the meantime, I will send you a message with the link to the mirror, and if that does not work we will see what we can do! Rebel: Unfortunately, after extensive testing the only solution we've found to be able to alleviate that issue is to just restart the game. We squashed the major memory leaks but that was one of the only things we weren't able to figure out how to fix. After about 30 minutes or so it just starts lagging out on the world map, and in extreme cases, in towns. A fresh load of the game clears it up though. I will have another look at the world map. I think all of the testers had pretty beefy PCs so might be that we did not notice how bad it actually is. That said I already have really aggressive antilag going, so I"m going to see if maybe there is an errant event somewhere. Thanks for the heads up! I think it's related to the mode 7 script for the airship. Removing that seemed to stop the fps from going down, but unfortunately the game kind of needs that script, so I'm seeing what I can do about it. ;; I'm glad that restarting the game fixes it though! I'll keep trying to figure out a better fix, though. Thanks for playing. =) I'm sorry for the trouble. There is a mirror link, but I think I should probably swap them around because Mediafire really seems to be giving people trouble with the stupid captchas. I think I may also just put up a version in .rar or .7zip format to avoid RPGMaker extractor problems as well. Thank you for sticking it out though! EDIT: Let me get a .rar up right now. I'd put it up on the site but I am pretty sure the download is too big. EDIT2: Uploading a version in a rar to my google drive, that should be hassle free for people while I work out a better link. On that note, the download has been updated to Version 1.1. This version has the world map lag fix included, and is hosted on a different service for easier downloading(unfortunately, this reset the download counter, boo). It is also in a .zip file, so it should be completely painless for anyone to extract and play. Thanks for being patient, everyone, and I hope you enjoy the game! =)
{ "pile_set_name": "Pile-CC" }
--- abstract: 'We investigated the spin coherence of high-mobility two-dimensional electron gases confined in multilayer GaAs quantum wells. The dynamics of the spin polarization was optically studied using pump-probe techniques: time-resolved Kerr rotation and resonant spin amplification. For double and triple quantum wells doped beyond the metal-to-insulator transition, the spin-orbit interaction was tailored by the sample parameters of structural symmetry (Rashba constant), width and electron density (Dresselhaus linear and cubic constants) which allows us to attain long dephasing times in the nanoseconds range. The determination of the scales: transport scattering time, single-electron scattering time, electron-electron scattering time, and spin polarization decay time further supports the possibility of using n-doped multilayer systems for developing spintronic devices.' author: - 'S. Ullah' - 'G. M. Gusev' - 'A. K. Bakarov' - 'F. G. G. Hernandez' bibliography: - 'JAP\_FGGH\_final.bib' title: | Long-lived nanosecond spin coherence in high-mobility 2DEGs\ confined in double and triple quantum wells --- Introduction ============ Long-lived spin coherence time ($T_{2}^{*}$) for ensembles is a milestone for practical applications of spintronic devices.[@wu] The tunability of $T_{2}^{*}$ have been widely studied in semiconductor quantum wells (QWs) with a large variety of optical techniques developed for the study of spin polarization dynamics and spin relaxation mechanisms.[@5; @6; @7; @8] In n-type samples, for example, it was observed that the doping level has a major role to attain long coherence time or to limit it with $T_{2}^{*}$ changing from tens of picoseconds up to nanoseconds.[@13; @22; @28; @30] The turning point, where $T_{2}^{*}$ decreases with an increase of the electron concentration, was found at the metal-to-insulator transition for bulk[@dzhioev02; @romer] ($2\times10^{16}$ cm$^{-3}$) and GaAs QWs[@sandhu] ($5\times10^{10}$ cm$^{-2}$). Beyond this point, the Dyakonov-Perel (DP) spin relaxation mechanism is dominant and controlled by electron-electron collisions.[@leyland] The DP mechanism defines that the decay time of the spin polarization $t_z$ (along the QW out-of-plane direction) is limited by the spin-orbit interaction which give us a path to control spin coherence. It can be calculated according to: $t_z^{-1}=8D_sm^2\hbar^{-4}[\alpha^{2}+(\beta_1-\beta_3)^2+\beta_3^2)]$, where $D_s$ is the spin diffusion constant, $\alpha$ is the Rashba coefficient due to structural inversion asymmetry, and $\beta_1$ and $\beta_3$ are the linear and cubic Dresselhaus constants due to bulk inversion asymmetry.[@walser; @kainz] Recently, the authors demonstrated that multilayer QWs are exceptional platforms for the investigation of current-induced spin polarization effects.[@31; @3] While such complex systems also offer new possibilities for applications, for example in the production of spin blockers[@souma] and filters,[@23] the study of long-lived spin coherence in double (DQW) and triple quantum wells (TQW) is still required. Here, we report on the coherent spin dynamics in multilayer quantum wells using time-resolved Kerr rotation (TRKR) and resonant spin amplification (RSA). The sample structure allowed us to tailor the spin-orbit constants by the well width, symmetry and subband concentration parameters. Remarkably, it results in coherence times in the nanoseconds range even for DQW and TQW samples with individual subband density beyond the metal-to-insulator transition. Materials and Experiment ======================== We investigated two different samples grown in the \[001\] direction, one double and one triple quantum well, both containing a dense two-dimensional electron gas (2DEG) with equal total density. For both samples, the barriers were made of short-period AlAs/GaAs superlattices (SPSL) in order to shield the doping ionized impurities and efficiently enhance the mobility.[@bakarov] The density of the Si delta-doping was $2.2\times10^{12}$cm$^{-2}$ symmetrically separated from the QW by 7 periods of the SPSL with 4 AlAs monolayers and 8 GaAs monolayers per period. The DQW sample consists of a wide doped GaAs well with w $=45$ nm, total electron density $n_{t}=9.2\times10^{11}$cm$^{-2}$ and mobility $\mu=1.9\times10^{6}$cm$^2$/Vs at low temperature. The electronic system has a DQW configuration with symmetric and antisymmetric wave functions for the two lowest subbands with subband separation $\Delta_{12}=1.4$ meV and approximately equal subband density $n_{s}$.[@wiedmannDQW] Fig. 1(a) shows the calculated DQW band structure and the charge density for both subbands. The second sample is a symmetrically doped GaAs TQW with 2 nm-thick $Al_{0.3}Ga_{0.7}As$ barriers, $n_{t}=9\times10^{11}$cm$^{-2}$ and $\mu=5\times10^{5}$cm$^2$/Vs measured at low temperature. The central well width is 22 nm and both side wells have equal width of 10 nm. The central well has a larger width in order to be populated because the electron density tends to concentrate mostly in the side wells as a result of electron repulsion and confinement. The estimated density in the central well is 35% smaller than in the side wells. The coupling strength between the quantum wells is characterized by the separation energies $\Delta_{ij}$ of the three occupied subbands ($i,j=1,2,3$) given by $\Delta_{12}=1.0$ meV, $\Delta_{23}=2.4$ meV, $\Delta_{13}=3.4$ meV.[@wiedmannTQW] TRKR and RSA were used to probe the coherent spin dynamics in the electron gas. For optical excitation, we used a mode-locked Ti-sapphire laser with pulse duration of 100 fs and repetition rate of $f_{rep}=$ 76 MHz corresponding to a repetition period ($t_{rep}$) of 13.2 ns. The time delay $\Delta t$ between pump and probe pulses was varied by a mechanical delay line. The pump beam was circularly polarized by means of a photo-elastic modulator operated at a frequency of 50 kHz. The rotation of the probe polarization was recorded as function of $\Delta t$ and detected with a balanced bridge using coupled photodiodes. The laser wavelength was tuned looking for the TRKR energy dependence in each sample. The samples were immersed in the variable temperature insert of a split-coil superconductor magnet in the Voigt geometry. Results and Discussion ====================== The time evolution of the spin dynamics for the DQW is displayed in Fig. 1(b) up to 2 T with pump/probe power of 1 mW/300 $\mu$W. The TRKR oscillations are associated with the precession of coherently excited electron spins about an in-plane magnetic field. To obtain the spin coherence time, the evolution of the Kerr rotation angle can be described by an exponentially damped harmonic: $$\theta_{K}(\Delta t) = A \exp(-\Delta t/T_{2}^{*})\cos(\omega_{L}\Delta t + \phi)$$ where $A$ is the initial spin polarization build-up by the pump, $\phi$ is the oscillation phase, and $\omega_{L}=g\mu_{B}$B/$\hbar$ is the Larmor frequency with magnetic field B, electron g-factor (absolute value) $g$, Bohr magneton $\mu_{B}$, and reduced Planck’s constant $\hbar$. The magnetic field dependence of $\omega_{L}$ and T$_{2}^{*}$ are shown in Fig. 1(c) and (d). Solid lines are fits to the data. One can clearly see that the spin precession frequency increases with B following the linear dependence of the Larmor frequency on the applied field. The value of the fitted g-factor is 0.453 which is close to absolute value for bulk GaAs and similar to the value measured for a quase-two-dimensional system in a single barrier heterostructure with two-subbands occupied.[@zhangEPL] ![(a) DQW band structure and charge density for the first and second subbands. (b) KR as function of the pump-probe delay for different magnetic fields. (c) Larmor frequency $\omega_L$ and (d) T$_{2}^{*}$ fitted as function of B.](Figure1_final.jpg){width="1\columnwidth"} According to the Dyakonov-Perel mechanism, the observed exponential decay at B $=$ 0 corresponds to the strong scattering regime. In the opposite case, where the spin precess more than a revolution before being scattered, an oscillatory behavior would be expected.[@leyland; @brand] The measured value for the decay time of the spin polarization along the z-direction (out-of-plane) is 1.1 ns at zero external field. For our symmetric, wide and dense quantum well; we estimate $\alpha\simeq0$, $\beta_1=-\gamma(\pi/w)^2=0.49\times10^{-13}$eVm, and $\beta_3=-\frac{1}{2}\gamma\pi n_s=0.70\times10^{-13}$eVm for the first subband using $\gamma=-$10 eV$\AA^3$.[@walserprb] The charge diffusion constant can be estimated, using the effective mass $m$ and the electron’s charge $e$, from the Fermi velocity $v_F=\hbar\sqrt{2\pi n_s}/m$ and the transport scattering time $\tau=\mu m/e=70$ ps by $D_c=v_F^2\tau/2=$ 3 m$^2$/s. The diffusion constant for spins is approximately two orders of magnitude smaller than for charge.[@walser] Scaling $D_s=100$ to 300 cm$^2$/s, we obtain $t_z\sim[8D_sm^2\hbar^{-4}\beta_3^2]^{-1}=$ 1.1 to 3.3 ns. The data at B $=$ 0 thus agrees with a DP mechanism where the spin dynamics is dominated by the cubic Dresselhaus term. The cancellation of $\alpha\simeq0$ and $\beta_1-\beta_3\simeq0$ due to the sample parameters shows a practical path for long-lived spin coherence in highly doped QWs. Increasing the magnetic field up to 0.5 T, we found a systematic increase of T$_{2}^{*}$. In this situation, the cyclotron motion acts as momentum scattering and leads to a less efficient spin relaxation in agreement with the DP model.[@griesbeck] It is important to note that the in-plane magnetic field was applied using Voigt configuration and the the cyclotron motion is perpendicular to the QW plane. The increase follows a quadratic dependence[@41] with $T_{2}^{*}(B)/T_{2}^{*}(0)=1+(\omega_{c}\tau_p^*)^2$ where $\omega_{c}$ is the cyclotron frequency and $\tau_p^*$ is the single-electron momentum scattering time. We found $\tau_p^*=$ 0.92 ps in agreement with the magnitude of the quantum lifetime measured by transport from the Dingle factor of the magneto-intersubband oscillations on the same sample.[@wiedmann2010] The value for $\tau_p^*$ is also in agreement with the determination of approximately 0.5 ps for QWs of shorter width.[@walserprb] One of the reasons for the large difference between $\tau$ and $\tau_p^*$ is the insensibility of the first to electron-electron scattering. The ratio of $\tau/\tau_p^*\simeq100$ implies that the dominant scattering from impurities is due to remote instead of background impurities.[@macleod] If we consider that $1/\tau_p^*=1/\tau+1/\tau_{ee}$, we get a time scale of $\tau_{ee}=\tau_p^*$ which demonstrates that electron-electron collisions dominate the microscopic scattering mechanisms as expected.[@leyland] Additionally, a further increase of the magnetic field leads to a strong decay due to the spread of the g-factor within the measured ensemble.[@greilichprl2006; @zhukov2007] The size of the inhomogeneity $\Delta g$ can be inferred by fitting the data according to $1/T_{2}^{*}(B)=1/T_{2}^{*}(0)+\Delta g\mu_BB/\sqrt{2}\hbar$ as shown in Fig. 1(d). From the 1/B dependence,[@22; @28] we obtain $\Delta g=0.002$ or 0.44% and $T_{2}^{*}(0)=$ 2 ns. The optical power influence on the spin dynamics for the DQW sample is shown in Fig. 2(a) at 1 T. Only at low pump power, we observed negative delay oscillations of considerably large amplitude. To find electron spin polarization before the pump pulse arrival indicates that the spin polarization persists from the previous pump pulse, which took place $t_{rep}=13.2$ ns before. The excitation power dependence of T$_{2}^{*}$ was plotted in Fig. 2(b) yielding an exponential decay. For single QW structures, the decrease of the coherence time at high pump density was associated with the electrons delocalization caused by their heating due to the interaction with the photogenerated carriers.[@zhukov2007] A similar decrease was also attributed to an increased efficiency of the Bir-Aronov-Pikus mechanism induced by the larger hole photogenerated density in GaAs QWs.[@37] However, it is unlikely to be relevant in our dense 2DEG where the photogenerated hole loses its spin and energy quickly and fast recombines with an electron from the 2DEG. Nevertheless, being a key parameter for spin devices, we note that T$_{2}^{*}$ remains near the nanoseconds range when the power is raised by almost one order of magnitude. At higher excitation power, an additional short-lived component in the signal becomes more significant. In systems where T$_{2}^{*}$ is comparable or longer than the laser repetition period, one can use the RSA technique to extract the spin dephasing time by scanning the magnetic field at a fixed pump-probe delay.[@22] We note that the 2DEG dynamics is associated with the long lasting oscillations, rather than with excitons or photo-excited electrons.[@zhukov2007] ![(a) TRKR of the DQW as function of pump power and (b) the corresponding T$_{2}^{*}$.](Figure2_final.jpg){width="1\columnwidth"} ![(a) RSA scans of the DQW system obtained for different time delays. (b) Lorentzian fit of the zero-field resonance peak. (c) T$_{2}^{*}$ and (d) Amplitude dependence on $\Delta t$ from (b).](Figure3_final.jpg){width="1\columnwidth"} Fig. 3(a) displays the RSA signals measured for different $\Delta t$ with pump/probe power of 1 mW/300 $\mu$W. We observed a series of sharp resonance peaks as a function of B corresponding to the electron spin precession frequencies which are commensurable with the pump pulse repetition period obeying the periodic condition: $\Delta B = (h f_{rep})/(g \mu_B)$.[@22] As function of the magnetic field, the RSA peaks amplitude decreases as a result of the g-factor variation within the measured ensemble as noted above. The RSA resonances are modulated by a slow oscillation that depends on $f_{d}=1/\Delta t$ according to the same periodic condition. We will focus on the zero field resonance. T$_{2}^{*}$ can be directly evaluated from the width of the zero-th resonance using a Hanle (Lorentzian) model:[@3; @22] $$\theta_{K}=A/[(\omega_{L}T_{2}^{*})^{2}+1]$$ with half-width $B_{1/2}=\hbar/(g\mu_{B}T_{2}^{*})$. The fitting result is displayed in Fig. 3(b) for negative and positive delays. The extracted values for T$_{2}^{*}$ and for the amplitude are shown in Fig. 3(c) and (d) as function of $\Delta t$. For positive delays, both quantities display an exponential decay (solid line). Increasing the pump-probe delay cause the broadening of RSA peaks according to a shorter spin dephasing time. However, the system coherence is recovered just before pump arrival for the long-lived spin component in the system dynamics.[@yugova2012] The RSA amplitude measured at negative delay was T$_{2}^{*}=$ 4.4 ns. ![(a) RSA scans of the DQW sample measured for different pump-probe wavelengths. (b) Fitting of the zero-field resonance. (c) Spin coherence time T$_{2}^{*}$ and (d) Amplitude extracted from (b).](Figure4_final.jpg){width="1\columnwidth"} Concerning the subband dependence, the spin relaxation time was calculated to be identical in an electron system with two occupied subbands, although the higher subband may have a much larger inhomogeneous broadening, due to strong intersubband Coulomb scattering.[@weng; @zhangEPL] In our samples, we studied the pump/probe wavelength dependence as reported in TRKR[@zhangEPL] and photoluminescence[@pussep2; @pussep3] studies on similar multilayer systems. Figure 4(a) displays the RSA scans of the DQW sample for different pump-probe wavelengths at fixed delay. Panel 4(b) shows a comparison between the zero-field resonances where the solid line is a Hanle fit to the data as described above. T$_{2}^{*}$ and the amplitude obtained from (b) increase with the pump-probe wavelength as shown in Figures 4(c) and 4(d). Increasing the pump-probe energy about 3 meV ($\simeq2\Delta_{12}$), from 817 nm to 815 nm, leads to a T$_{2}^{*}$ decrease of less than 10% in Figure 4(d). In comparison, Figure 1 shows negative delay oscillations in the same wavelength range.[@SM] This small change could be associated with the relative similitude between the charge density distribution for both subbands. On the other side, fast intersubband scattering may be hiding differences expected in the spin-orbit interaction for the second subband.[@egues] ![(a) Band diagram and charge density for the TQW sample. (b) TRKR measured as function of the magnetic field. RSA scans of the TQW sample measured for different pump-probe delays with the corresponding extracted spin dephasing time at (c) 821 nm and (d) 823 nm.](Figure5_final.jpg){width="1\columnwidth"} Finally, we focus on the results for the TQW sample. Fig. 5(a) shows the calculated band diagram and charge density for three occupied subbands. The TRKR scans measured as function of the magnetic field yield g $=$ 0.452. Due to the long spin coherence comparable with the laser repetition period, there is almost no decay over the measured time window (2.5 ns). In analogy to the DQW sample, we used the constructive interference of the coherence oscillations from successive pulses to extract the spin coherence time by the RSA technique. Fig. 5(c) and (d) show the magnetic field scans of the KR amplitude performed at different pump/probe separation for 821 and 823 nm, respectively. From the Lorentzian fit of the zero-field peak, the spin dephasing for the TQW sample was obtained revealing the longest T$_{2}^{*}=$ 10.42 ns at negative delay as for the DQW. In this case, the same energy increase ($\sim$3 meV $\simeq\Delta_{13}$), leads to strong T$_{2}^{*}$ decrease of almost 50%/30% at negative/positive delay. We note that, contrary to the DQW case, the third subband for the TQW have opposite charge distribution if compared with the lower subbands. While the third subband has the charge density more localized in the central well, the electrons in the first and second subbands are distributed in the side wells. Conclusions =========== In conclusion, we have studied the spin dynamics of a two-dimensional electron gas in multilayer QWs by TRKR and RSA. The dependence of spin dephasing time on the experimental parameters: magnetic field, pump power, and pump-probe delay was demonstrated. In the DQW sample, T$_{2}^{*}$ extends to 4.4 ns. Additionally, for the TQW sample, T$_{2}^{*}$ exceeding 10 ns was observed. The results found are among the longest T$_{2}^{*}$ reported for samples of similar doping level [@sandhu; @41] and comparable with nominally undoped narrow GaAs QWs [@dzhioev] and low density 2DEGs in CdTe QWs [@zhukov2007]. The measured long spin dephasing time was tailored by the control of the QW width, symmetry and electron density. The spin dynamics is dominated through the cubic Dresselhaus interaction by the DP mechanism. All the relevant time scales were determined indicating the importance of each scattering mechanism in the spin dynamics. We demonstrate that the wave function engineering in multilayer QWs may provide practical paths to control the dynamics in spintronic devices. Acknowledgments =============== F.G.G.H. acknowledges financial support from Grants No. 2009/15007-5, No. 2013/03450-7, and No. 2014/25981-7 of the São Paulo Research Foundation (FAPESP). S.U. acknowledges TWAS/CNPq for financial support.
{ "pile_set_name": "ArXiv" }
Around 200 ISIL militants killed in Bashiqa Uğur Ergan - ANKARA Turkish soldiers in northern Iraq’s Bashiqa Camp have been under continuous attack by the Islamic State of Iraq and the Levant (ISIL), while around 200 militants from the jihadist group have been killed in retaliation, military sources told daily Hürriyet.Military sources said that around 200 ISIL militants have been killed at Bashiqa since early January after Turkish troops and tanks were deployed to the camp. The ISIL offensives, which were conducted with Katyushas, were ineffective due to the security measures in place, the sources added.The latest ISIL attack on Bashiqa was on Feb. 15, the sources said.Turkey sent about 600 troops to the Bashiqa Camp near Mosul on Dec. 4, 2015, with the stated aim of training an Iraqi militia to fight the jihadist group, but the created tensions with the Baghdad government. Following strong reactions both from the United States and Iran, Turkey was forced to pull out a significant number of its troops and tanks from the camp.Turkey has stressed that the Bashiqa camp is a military facility where all groups in the international coalition fighting ISIL are represented, arguing that the troops are part of a mission to train Iraqi forces to fight ISIL militants and troops to protect them against rising security risks.
{ "pile_set_name": "OpenWebText2" }
3 years, 13 million:o: Wow....4.33 million a year for a slow version of Podsednik. That's a great move. champagne030 11-14-2006, 04:14 PM http://sports.espn.go.com/mlb/news/story?id=2661869 3 years, 13 million:o: He went from $675K last season to $4.33M. Pretty steep for a RH platoon player. Maybe the flubs think his year wasn't a fluke and will get him 500 AB's.....Still way to steep for a Mack type of player. MrX 11-14-2006, 04:16 PM Not only are they going to suck, but Hendry's going to bury them in bad contracts on his way out the door. DaleJRFan 11-14-2006, 04:22 PM Why is this a bad signing?? Because its the Cubs?? DeRosa is a very good player and a move to the mighty NL Central should significantly inflate his offensive numbers. I disagree completely about this being a bad signing, rather I'd say this is a very good signing for the Cubs. I was actually hoping that the Sox would make a move for DeRosa. He hits from the rightside (as we all know the Sox need a right-handed hitting bench/platoon guy), plays passable defense, hits for some power, can play the corner outfield spots and can backup Crede/Iguchi at 3B/2B. Only problem is Mack or Gload would have needed to be moved for that to have happened. I disagree with you guys, this is a good signing for the Cubs and would have been for any other MLB team, as long as he isn't relied on too heavily. CLR01 11-14-2006, 04:40 PM Why is this a bad signing?? Because its the Cubs?? DeRosa is a very good player and a move to the mighty NL Central should significantly inflate his offensive numbers. I disagree completely about this being a bad signing, rather I'd say this is a very good signing for the Cubs. I was actually hoping that the Sox would make a move for DeRosa. He hits from the rightside (as we all know the Sox need a right-handed hitting bench/platoon guy), plays passable defense, hits for some power, can play the corner outfield spots and can backup Crede/Iguchi at 3B/2B. Only problem is Mack or Gload would have needed to be moved for that to have happened. I disagree with you guys, this is a good signing for the Cubs and would have been for any other MLB team, as long as he isn't relied on too heavily. Paying 4+ million for a guy who can't be "relied on too heavily" is a good move? thedudeabides 11-14-2006, 04:40 PM Why is this a bad signing?? Because its the Cubs?? DeRosa is a very good player and a move to the mighty NL Central should significantly inflate his offensive numbers. I disagree completely about this being a bad signing, rather I'd say this is a very good signing for the Cubs. I was actually hoping that the Sox would make a move for DeRosa. He hits from the rightside (as we all know the Sox need a right-handed hitting bench/platoon guy), plays passable defense, hits for some power, can play the corner outfield spots and can backup Crede/Iguchi at 3B/2B. Only problem is Mack or Gload would have needed to be moved for that to have happened. I disagree with you guys, this is a good signing for the Cubs and would have been for any other MLB team, as long as he isn't relied on too heavily. I don't think it's a bad signing, but I wouldn't call it a very good signing. It sounds like the Cubs plan on him being their everyday 2b. $4 million plus per year for a player who's never been an everyday player is excessive. JUribe1989 11-14-2006, 04:41 PM Too bad, I love Mark DeRosa. Oh well, there's one Cub I like. It's way too high of a price, but DeRosa is a very good hitter and for a replacement RF he really played it well last year in Arlington. His numbers were insane at parts of the year last year, and with the great pitching in the NL Central, they should get even higher. DaleJRFan 11-14-2006, 04:42 PM I don't think it's a bad signing, but I wouldn't call it a very good signing. It sounds llike the Cubs plan on him being their everyday 2b. $4 million plus per year for a player who's never been an everyday player is excessive. He played everyday last year and did very well. He has done very well every year prior to 2005 in a platoon role... I agree the Flubs overpaid, but they probably did so to lock him up now and now have to outbid any other team. The Cubs picked up a good player for their every day 2B opening, but I agree - they did over pay. DaleJRFan 11-14-2006, 04:43 PM Paying 4+ million for a guy who can't be "relied on too heavily" is a good move? That's what Derrek Lee and Aramis Ramirez are for, in their lineup. I should have been more specific with that comment. I meant, if they expect him to bat 300/30/100 in the 3-hole, they are sadly mistaken. thedudeabides 11-14-2006, 04:51 PM He played everyday last year and did very well. He has done very well every year prior to 2005 in a platoon role... I agree the Flubs overpaid, but they probably did so to lock him up now and now have to outbid any other team. The Cubs picked up a good player for their every day 2B opening, but I agree - they did over pay. Why overpay before the bidding starts? He's 31 and has had one season with over 500 at bats and only one more with over 300 at bats ( a.239 average). I just think it's a reach. A decent player, but they overpaid. Either way it's not going to make or break them. Sox Fan 35 11-14-2006, 04:55 PM I like DeRosa but 4 million a year is too much. Foulke You 11-14-2006, 05:10 PM I have to echo the sentiments of others here. DeRosa is a nice little player but they threw too much money at him. Hendry is in a free spending mood and is setting the bar very high for free agents this offseason.:mad: StillMissOzzie 11-14-2006, 05:14 PM The 2006 Cubs are in a similar position to the 2003 Tigers, in that they HAVE to overpay to attract FAs to their last place hovel. SMO :gulp: Hitmen77 11-14-2006, 05:36 PM how is he defensively? Dick Allen 11-14-2006, 06:27 PM Well, I'm sure the local media will be hailing him as the new savior for the Flubs. Oh wait, that's for Soriano, Jason Schmidt, and all the others who will most certainly sign with the Flubs. JB98 11-14-2006, 07:24 PM The Cubs were in better shape at 2B last year with Todd Walker. DeRosa is best in a utility role. They threw a bunch of money at him to be the everyday second baseman. LOL. champagne030 11-14-2006, 07:26 PM how is he defensively? Mediocre at best at any position. His value is that he plays so many positions and kills LH pitching. munchman33 11-14-2006, 07:26 PM It's amazing that they're throwing out money like this when they still need four starters. mjmcend 11-14-2006, 07:34 PM This is the problem with the Cubs and Hendry. He throws money at mediocre players while simultaneously crying poor and missing on the top free agents. Would you rather have Furcal and Soriano, or DeRosa, Neifi, Izturis, Eyre, and Dempster? JB98 11-14-2006, 07:34 PM It's amazing that they're throwing out money like this when they still need four starters. You have to remember the average Cubs fan is not as astute as you or I. If they throw a bunch of money at several position players, they'll be able to hype the team as "much-improved," causing the sheep to charge through the turnstiles with glee again next season. Eventually, though, the reality of their poor starting rotation will set in, and they'll lose 90 games again. That's a terrible rotation, but the business model is more important than winning on the North Side. JB98 11-14-2006, 07:35 PM This is the problem with the Cubs and Hendry. He throws money at mediocre players while simultaneously crying poor and missing on the top free agents. Would you rather have Furcal and Soriano, or DeRosa, Neifi, Izturis, Eyre, and Dempster? Rumor has it they are looking at Ted Lilly and Miguel Batista to fill the massive holes in their rotation. That sounds like the recipe for a World Series championship. SOXSINCE'70 11-14-2006, 09:50 PM Rumor has it they are looking at Ted Lilly and Miguel Batista to fill the massive holes in their rotation. That sounds like the recipe for a World Series championship. If either of these signings should come to pass, White Sox fans should look forward to many fastballs or hanging off speed pitches thrown to Dye,Thome, Konerko or Crede when the teams meet 6 times next year.:cool: Soxfanspcu11 11-14-2006, 10:02 PM Everytime I think that this organization has reached the ceiling of stupidity, they do something new to prove me wrong. This organization can not seriously be this incompetent can they?? The way they run things has to be some sort of inside joke. Hitmen77 11-14-2006, 10:39 PM The Cubune spin on this signing is in full swing: DeRosa told the Tribune that he was sold by two factors – the chance to play second base and the atmosphere at Wrigley Field, which he experienced while with Atlanta during the first round of the 2003 playoffs. "I remember everything like it was yesterday,'' he said. "I saw for myself in '03 that that place is electric … Even at Turner Field, the Cub fans dominated in our ballpark. I felt like the Cubs had five home games.'' :rolleyes: uh, yeah...Did he tell the Tribune this before or after they gave him $13 million? I heard last year's free agent signings (Jones and Pierre) have really enjoyed the Wrigley atmosphere. I bet DeRosa can hardly wait to see the fans throwing trash on the field. CLR01 11-14-2006, 10:44 PM The Cubune spin on this signing is in full swing: "I remember everything like it was yesterday,'' he said. "I saw for myself in '03 that that place is electric … That's the 100 year old electrical work and the piss coated concrete. Gives you a nice little jolt. crazyozzie02 11-14-2006, 11:07 PM i just got done watching Fox Chicago and i was hearing the soundbite from his interview. This is a part of what it says..."The cubs deserve a winner, Chicago deserves a winner." If i remember right the Sox have had .500 plus seasons for quite a while now and last time i checked they won the world series only a year ago. Let the Mark DeRosa hating begin!!!!!!! SoxSideIrish 11-14-2006, 11:28 PM Per ESPN.com, the Cubs are closed a deal today with DeRosa for 3 yrs. & $13 million. Interesting pickup, I'm curious to see if he has a repeat performance next year or if this was a flash in the pan incident. Per ESPN.com, the Cubs are closed a deal today with DeRosa for 3 yrs. & $13 million. Interesting pickup, I'm curious to see if he has a repeat performance next year or if this was a flash in the pan incident. Cubs sign DeRosa doesn't quite describe the thread enough. :rolleyes: Oblong 11-14-2006, 11:51 PM At a game earlier this year with my 5 year old, DeRosa was up. My son said "If his first name was Pon, he'd be called Ponderosa" WizardsofOzzie 11-14-2006, 11:56 PM At a game earlier this year with my 5 year old, DeRosa was up. My son said "If his first name was Pon, he'd be called Ponderosa" :rolling: :rolling: :kneeslap: :roflmao: crazyozzie02 11-15-2006, 12:22 AM At a game earlier this year with my 5 year old, DeRosa was up. My son said "If his first name was Pon, he'd be called Ponderosa" Dude your son is awesome. I dont think ive heard anything this funny all week. EastCoastSoxFan 11-15-2006, 09:00 AM how is he defensively?He was a very good quarterback at my alma mater, the University of Pennsylvania. And one of my best friends was his right tackle for three years. On the baseball diamond his range is middle-of-the-pack and his arm is on the strong side. Goodman6 11-15-2006, 09:50 AM [quote=mjmcend;1410428]This is the problem with the Cubs and Hendry. He throws money at mediocre players while simultaneously crying poor and missing on the top free agents. Would you rather have Furcal and Soriano, or DeRosa, Neifi, Izturis, Eyre, and Dempster? Here are some stats that makes one wonder about Hendry: Mark De Rosa career stats: .273 BA, .331 OBP, 11 / 22 SB, .984 FPct at 2B. Tony Graffanino stats: .269 BA, .338 OBP, 53 / 77 SB, .981 FPct at 2B. Source: Baseball-Reference.com When you access this web site, it even references Tony Graffanino as a similar player to Mark De Rosa and vice-versa. In essence, Hendry paid $4.33M per year for a Tony Graffanino type player. GoSox2K3 11-15-2006, 10:26 AM [quote=mjmcend;1410428]This is the problem with the Cubs and Hendry. He throws money at mediocre players while simultaneously crying poor and missing on the top free agents. Would you rather have Furcal and Soriano, or DeRosa, Neifi, Izturis, Eyre, and Dempster? Here are some stats that makes one wonder about Hendry: Mark De Rosa career stats: .273 BA, .331 OBP, 11 / 22 SB, .984 FPct at 2B. Tony Graffanino stats: .269 BA, .338 OBP, 53 / 77 SB, .981 FPct at 2B. Source: Baseball-Reference.com When you access this web site, it even references Tony Graffanino as a similar player to Mark De Rosa and vice-versa. In essence, Hendry paid $4.33M per year for a Tony Graffanino type player. I like this comparison as what this tells me is that the Flubs paid $4.33M per year for a starting secondbasemen that is not even as good as the White Sox back-up player at that position. But I am sure the "sheep" are excited about the DeRosa signing and can't wait to fill the "Urinal" again next season. Hitmen77 11-15-2006, 01:07 PM Is De Rosa any better than Todd Walker? lakeviewsoxfan 11-15-2006, 01:15 PM Is De Rosa any better than Todd Walker? No. Ol' No. 2 11-15-2006, 01:17 PM Is De Rosa any better than Todd Walker?Maybe not even as good. Iwritecode 11-15-2006, 01:25 PM i just got done watching Fox Chicago and i was hearing the soundbite from his interview. This is a part of what it says..."The cubs deserve a winner, Chicago deserves a winner." If i remember right the Sox have had .500 plus seasons for quite a while now and last time i checked they won the world series only a year ago. Let the Mark DeRosa hating begin!!!!!!! Obviously nobody informed him that there's another team in Chicago. :rolleyes: I like this comparison as what this tells me is that the Flubs paid $4.33M per year for a starting secondbasemen that is not even as good as the White Sox back-up player at that position. But I am sure the "sheep" are excited about the DeRosa signing and can't wait to fill the "Urinal" again next season. [quote=GoSox2K3;1410839] Cintron made $1,600,000 in '06. And this is why the Cubs are stupid idiots. Sooner or later, people like Cintron come up for arbitration and contracts like that for DeRosa are held up as comparable. Foolish overpayment leads to more foolish overpayment.
{ "pile_set_name": "Pile-CC" }
Building off of a previous project that developed a Double Bobbin System for huge rolls of polyacrylonitrile at United Technologies: Aerospace Systems, the ME-09 team was tasked with researching, designing, and building a prototype that splices rolls of this fabric together. Because of tight space requirements, the team and customer opted for a mobile, non-automated system. The ME-09 team has developed a process accompanied by a cart system to aid in the procedure. The process developed will be thoroughly tested for maximum efficiency and any potential chances of misinterpretations. The goal is to provide United Technologies: Aerospace Systems with the optimal process and necessary tools for splicing polyacrylonitril rolls together.
{ "pile_set_name": "Pile-CC" }
Outlast 1 and 2 are coming to Nintendo Switch early next year, Big Red Barrels has announced. Outlast running on a Nintendo Switch. The first-person survival horror games hit Switch at some point during the first quarter of 2018, the developer said in a post on Facebook. Outlast 1 came out on PC back in 2013, before ports for PlayStation 4 and Xbox One came out in 2014. Outlast 2 came out earlier this year. In the update, Big Red Barrels said Outlast 2 will not get any DLC. "We've considered many options, but none of them felt appropriate for a DLC," the developer said. "Outlast 2 was created to make you feel like a rat in a maze, without any knowledge of what's outside the maze." Outlast 3 will be made "at some point... and answers will be given." Meanwhile, Big Red Barrels said it's working on another game set in the Outlast universe. This isn't a sequel to Outlast 1 or 2, but something different. "We can't say more right now, we first need to make sure we can make it work," the developer added. "Like I mentioned, we strive to be risk-takers and this one is a pretty big challenge. If all goes well, we'll soon be able to reveal more." If you played Outlast 2 and you're looking for story answers, Big Red Barrels suggested checking out the The Murkoff Account's epilogue, which takes places right after the events of the second game.
{ "pile_set_name": "OpenWebText2" }
Our future is at risk. The science is settled, in the main, though there are many details to continue to work out and there are unknowns. But no one doubts that business as usual release of fossil carbon into the atmosphere mainly as the greenhouse gas Carbon Dioxide spells big trouble for humanity and the planet Earth, including eventual massive sea level rise and highly disruptive changes in the Earth’s climatology that will make a mess of many things including our food supply. Think failed state. Think Syria. Now, think failed planet, Syria over half the globe, the other half merely a mess. That’s what we are heading for. We know less than we need to about the timing and severity of various impending disasters, but we already see the beginning. Sea level rise and warmer seas has made for some of the most severe tropical storm systems ever seen. That’s a genie we can not put into the bottle. And these storms don’t seem to always confine themselves to the tropics. Extreme cold and extreme heat, extreme precipitation and extreme dryness, floods, and other catastrophic weather related events are happening with increased frequency. Central Europe, Colorado, Calgary, Great Britain. Some of these weather and climate problems are clearly connected to climate change such as those related to extreme heat, increased drying through evaporation, and increase water vapor. Others, such as those caused by changes in the jet stream, are also probably connected to global warming but the climate scientists are still arguing about the details and extent of this, a normal part of the consensus building scientific process. For the most part, though, almost no one is saying “no connection.” And we can fix this or at least, ameliorate the effects on behalf of those who shall inherit whatever is left of this one Earth we’ve got, when we are done messing with it. Unless… Unless organized climate science denialists, right wing “morans” from the Tea Party, self interested paid-off politicians, and the likes of David and Charles Koch, get their way. Unless they get what they want, which is to interfere with the translation of climate science into science policy. Unless they also get their way by interfering with changes to how we approach and build for clean energy and updated infrastructure. I once said, and a lot of people (well, bad people, not any good people) got mad at me, that taking away the future of our children and grandchildren was a criminal act. Of course, you know it is. But in saying that, unfortunately, I can only be referring to “criminal act” as a metaphor, or perhaps as wishful thinking. There actually isn’t a law against ruining the planet and ending civilization as we know it, against taking part in the death and misery of countless humans, against carrying out acts of such utterly despicable selfishness and general terror that you will be placed among the ranks of the genocidal once all is said and done, if you get your way. Nope. That’s totally legal. Or is it? Or, at least, should it be? What if someone other than me came along with the opinion that “There oughta be a law” or at least, a serious proposal that organized climate science denialism and obstruction against implementation of planet-saving policies and technologies should be considered an act against humanity? What would happen is this. The very denialists who work so hard to ensure the misery of our grandchildren, for whatever mercenary, psychopathic, demented, or just very badly misguided reason they may have, will instantly spring to life and attack that person. Anthony Watts will sneer and kvetch, and call his minion of eleven or twelve climate science denying winged monkeys (and their myriad sock puppets) to arms. Christopher Monkton will pretend he is someone, pretend he has a functioning brain, pretend to sound smart and legal, and pretend to say pretend threatening things. Well, that happened. Lawrence Torcello of Rochester Institute of Technology stepped in it. He called them crooks. He said, in part, …critics of the case in L’Aquila are mistaken if they conclude that criminal negligence should never be linked to science misinformation. Consider cases in which science communication is intentionally undermined for political and financial gain. Imagine if in L’Aquila, scientists themselves had made every effort to communicate the risks of living in an earthquake zone. Imagine that they even advocated for a scientifically informed but costly earthquake readiness plan. If those with a financial or political interest in inaction had funded an organised campaign to discredit the consensus findings of seismology, and for that reason no preparations were made, then many of us would agree that the financiers of the denialist campaign were criminally responsible for the consequences of that campaign. I submit that this is just what is happening with the current, well documented funding of global warming denialism. More deaths can already be attributed to climate change than the L’Aquila earthquake and we can be certain that deaths from climate change will continue to rise with global warming. Nonetheless, climate denial remains a serious deterrent against meaningful political action in the very countries most responsible for the crisis. At first I was not sure if I agreed with Professor Torcello about L’Aquila. I think the scientists got thrown under the bus, as it wasn't mainly them who messed up, it morel likely that it was the administrative officials and politicians. But he's indicated to me that he saw L'Aquila as an example of the importance of science communication, not as a specific precedent. To be clear, Torcello is asking if the funding of science, in this case, climate science misinformation criminally negligent. But for the present, that is not an important detail; the point is, yes, you can lie to every one and then they fucking die because of your lies. That is for real. That is your fault if you do that. That makes you some kind of crook, even if at the moment there is not a law against your utterly misanthropic behavior. and that is how I see the hard core climate science denialists. And, of course, Anthony Watts is whining and Christopher Monkton is Mocking, and the Winged Monkeys are aloft. They are attacking Professor Torcello by demanding redress from his employers at Rochester. I sent a note to them supporting the good professor. If you are friend and not foe send me the secret handshake and I’ll send you the list of individuals I sent the letter to with their emails, and you can do the same if you want. ________________ Image is from The Lorax, which gives a message some people apparently missed.
{ "pile_set_name": "OpenWebText2" }
The development of adaptive skills in young people with Down syndrome. To help children with Down syndrome reach optimum levels of adaptive behaviour, caretakers need to know how and to what extent children with Down syndrome acquire adaptive skills. The adaptive levels of motor, daily living, communicative and social behavioural skills were determined in a group of 984 Dutch children with Down syndrome, aged between 0 and 12 years, and compared with the adaptive levels of typically developing children using a Dutch version of the Vineland Screener. Children with Down syndrome acquire their adaptive skills at a slower pace and reach their ceiling scores at about the age of 12 years, at a substantially lower level than a reference group of typically developing children. Down children seem to acquire skills in a similar sequence and according to a similar trajectory. Development of adaptive skills varies greatly between participants with Down syndrome. For that reason, cohort studies on the development of individuals with Down syndrome over a prolonged period of time are needed.
{ "pile_set_name": "PubMed Abstracts" }
Detection of HSV and EBV in esophageal carcinomas from a high-incidence area in Shantou China. An association between viral infection, particularly the human papillomavirus, and the development of esophageal carcinoma (EC) has been reported. However, reports concerning the relationship between herpes simplex virus (HSV) and Epstein-Barr virus (EBV) with EC are few. There are geographic variations in infection rates. This study was aimed to determine the co-incidence of infection of the two viruses' with esophageal carcinoma and the differentiation of cancer tissues and lymphocytes infiltration in the tumor stroma of the high-incidence area of Shantou China. To determine the association between viral infection (HSV and EBV) and EC, we applied in situ hybridization (ISH) and immunohistochemistry (IHC) in 164 esophageal carcinoma surgical specimens from the high-incidence area of Shantou China. HSV DNA and HSVI, II protein expression were found in 52 (31.7%) of the 164 tumors; EBV EBER and LMP-1 proteins were identified in only 10 (6.1%) carcinoma specimens by in situ hybridization and immunohistochemistry. In histopathology analysis, the positive cases of HSV appeared to be more predominant in well and moderately differentiated squamous cell carcinomas, and the positive cases of EBV were found in poorly differentiated squamous cell carcinomas or undifferentiated carcinomas with intense lymphoid infiltration. Our results confirm the involvement of HSV and EBV in esophageal carcinomas and the relationship between HSV and EBV infection and esophageal carcinoma cell differentiation with lymphocyte infiltration in the tumor stroma. However, the two herpes viruses, HSV and EBV, particularly the human HSV may be one of the etiological factors in development of this malignancy among the high-incidence population of Shantou China.
{ "pile_set_name": "PubMed Abstracts" }
Two syntheses of 3-amino-3-deoxy-alpha-D-altropyranosyl 3-amino-3-deoxy-alpha-D-altropyranoside, a new analog of alpha,alpha-trehalose, involving reduction of a diazide and reductive amination of a diketone. A new diamino sugar, 3-amino-3-deoxy-alpha-D-altropyranosyl 3-amino-3-deoxy-alpha-D-altropyranoside (5) was synthesized by two routes starting from alpha,alpha-trehalose. The first route involved reduction and deprotection of a previously described, benzylidenated diazido analog. The second approach proceeded from the known 2,2'-di-O-benzyl-4,6;4',6'-bis-O-benzylidene derivative of alpha-D-altropyranosyl alpha-D-altropyranoside, to the corresponding 3,3'-diketone, which was subjected to reductive amination with sodium cyanoborohydride and ammonium acetate. The major product, separated in 39% yield from by-products after N-acetylation, was deprotected to give 5. Four by-products were isolated in low yields and determined to be monoaminated analogs which comprise two epimeric, 3'-hydroxy structures and two 3'-epimeric, 3'-cyano-3'-hydroxy structures in their non-aminated residues. A number of observations concerning the 13C- and 1H-n.m.r. spectra of the products are discussed, especially with regard to chemical-shift dependencies for certain ring and substituent protons, and attention is drawn to some inter-residue shielding phenomena.
{ "pile_set_name": "PubMed Abstracts" }
About Eating Disorders The Academy for Eating Disorders is committed to disseminating information regarding these disorders to both educate, prevent and assist those in need. Below are facts about eating disorders for concerned friends, family members, healthcare providers, and individuals struggling with their eating. Eating disorders affect individuals irrespective of age, weight, gender, and race/ethnicity. It is important to keep in mind that there is significant symptom overlap among the eating disorder categories listed below, and that individuals can move from one diagnostic category to another over time. Anorexia Nervosa (AN) AN is characterized by failure to maintain an adequate body weight, body image disturbance, and excessive dietary restriction(1). It may be accompanied by periodic binge eating and purging (e.g., self-induced vomiting, laxative use). It affects approximately .4 out of every 1000 women in any 12 month period(1) and 9 out of 1000 at some point in their lives(2). Men are affected less often than women; the exact ratio of women to men who are affected by AN is difficult to determine, but estimates range from 3:12 to 10:11, and these may be underestimates because men are less likely to seek treatment and healthcare providers may fail to assess or diagnoseeating disorders in males(2). AN typically begins during early- to mid-adolescence(4), and warning signs include sudden weight loss, extreme dieting, food rituals (e.g., taking very small bites, eating foods in a certain order), hair loss, dry skin or hair, brittle nails, growth of fine, downy hair on the face and body. Certain medical conditions may co-occur with AN and include bone loss, difficulties with temperature regulation, loss of menstrual periods, low heart rate, and low blood pressure(1,5). Similarly, certain psychological conditions and features that often coincide with AN include anxiety, depression, social isolation, and perfectionism(6). Approximately 50-60% of individuals with AN recover over time, with better recovery rates observed in younger patients and those with a shorter duration of illness when diagnosed(7). For adolescents with AN, a form of family-based treatment has been shown to be successful in improving recovery from the illness(8). Unfortunately, the risk of death in AN is increased due to medical complications and suicide(7). Bulimia Nervosa (BN) BN is characterized by binge eating (consuming large amounts of food while feeling out of control) accompanied by compensatory behaviors to prevent weight gain, and body image disturbances(1). These compensatory behaviors may include self-induced vomiting, laxative, diuretic, or enema use or excessive exercise, fasting, or the misuse of certain medications such as insulin. Estimates of what percent of individuals are affected by BN vary between 1-1.5% over the course of their lives(2,3) to 1-1.5% of women in any 12 month period(1). Men are affected less often than women; the exact ratio of women to men who are affected by BN is difficult to determine, but estimates range from 3:12 to 10:11. These may be underestimates because men are less likely to seek treatment and healthcare providers may fail to assess or diagnose eating disorders in males(2). The typical age of onset is mid- to late-adolescence(9), and early warning signs include the disappearance of large amounts of food, frequent trips to the bathroom after meals, calluses on knuckles from using fingers to induce vomiting, and swelling of the face. Certain medical conditions that may accompany BN include electrolyte imbalance, esophageal ulcers, and tooth decay(5). Psychological conditions and features that often co-occur include anxiety, depression, substance use, and difficulties with impulse control(6). Approximately 70% of individuals with BN recover over time, and patients with fewer accompanying psychiatric problems seem to fare better(7). Treatments for BN in adults include cognitive-behavioral therapy, which has been successful in improving recovery from the illness(11), and the anti-depressant medication fluoxetine, which has been FDA-approved for the treatment of adults with BN(12). Unfortunately, risk of death is increased in BN, particularly death due to suicide(10). Binge-Eating Disorder (BED) BED is characterized by binge-eating without compensatory behaviors (as observed in BN; see above)(1). It affects 16 out of every 1000 women in any 12 month period(1) and 35 out of 1000 at some point in their lives(2). Estimates for men are that approximately 8 out of 1000 are affected in any 12 month period(1) and 20 out of 1000 at some point in their lives(2). The typical age of onset is during adolescence or young adulthood, but most individuals don’t present for treatment until middle adulthood(3,13). Warning signs include sudden weight gain and the disappearance of large amounts of food. Specific medical conditions that co-occur with BED include obesity(14) and other related conditions (e.g., type II diabetes, hypertension) and gastric problems(15). Related psychological conditions include anxiety, depression, and substance use(6). Approximately 70-80% of individuals with BED recover over time, and those with fewer interpersonal problems appear to have a better likelihood of recovery(7). For adults with BED, cognitive-behavioral and interpersonal treatments have been successful in increasing recovery from the illness while behavioral weight loss treatment may be helpful with weight loss(16). Avoidant and Restrictive Food Intake Disorder (ARFID) ARFID is characterized by an avoidance of eating that leads to a failure to meet nutritional or energy needs(1). This avoidance may be due to concerns regarding uncomfortable consequences of eating, displeasure with the tastes and/or textures of foods, or a number of other reasons. Importantly, this avoidance must not be explained by a normal culture practice or a food allergy. The results of this avoidance may be that the individual loses a significant amount of weight, or for children, fails to gain weight as expected, experiences a deficiency in important nutrients, requires food supplements or special feedings, or experiences substantial impairment in his/her life as a result of the avoidance (e.g., is unable/unwilling to socialize with others if food is involved). Although many of these features may be present in anorexia nervosa, a corresponding fear of weight gain and disturbance in body image is not present in ARFID. Information on the prevalence of AFRID are not yet available; however, ARFID most commonly begins in infancy or early childhood(1). Although picky-eating in young children is not unusual, warning signs of ARFID include such “pickiness” leading to a failure to gain weight as expected or the necessity of administering nutritional supplements in order to avoid experiencing a nutritional deficiency. ARFID may negatively affect family functioning, especially around mealtime(1). Related psychological conditions include anxiety disorders, autism spectrum disorder, obsessive-compulsive disorder, and attention deficit-hyperactivity disorder. Most common eating disorder diagnosis; affects ~4-5% of the population (17) ~4:1 female to male ratio (17) Typical age of onset is adolescence or young adulthood (18) Related medical and psychological conditions are similar to those for the other eating disorders These complications are just as severe for those with ED-NOS as for those with full-syndrome eating disorders (19) Warning signs are similar to those for related eating disorder diagnoses ~70% of individuals with ED-NOS recover over time, with the best outcomes observed for individuals with high social support (7) Some data suggest an increased risk of death in ED-NOS (10), but more research is needed on this understudied group Understanding Eating Disorders The NEDA recently reported that 14-30% of college women and men meet the criteria for an eating disorder and this number continues to rise annually. Impacting over 30 million men and women in the United States, eating disorders are a significant mental health issue, and education and conversation are two of the most important ways to help. In order to help start this dialogue with students who have had, or currently suffer from, an eating disorder as well as their families and friends, we’ve created a comprehensive guide that aims to: •Educate on the signs, symptoms, and treatments for the many types of eating disorders
{ "pile_set_name": "Pile-CC" }
Use <b>Daniel Wellington</b>&#39;s Glasgow<b> watch</b> to complete a contemporary look. Featuring a stainless steel case, fabric strap and Japanese-made movement, this sleek design will remain stylish for years to come.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to a light-emitting device using a light-emitting diode as a light source, and particularly, to a light-emitting device which is excellent in productivity as well as light resistance, moisture resistance, heat resistance, and heat dissipation. 2. Description of the Related Art As conventional representative light-emitting devices using a light-emitting diode (LED) element as a light source, there are light-emitting devices in which an LED element and specified portion of leads (power-feeding members) are integrally sealed with a sealing material having light transmissivity. As such sealing materials, there are generally used sealing materials of resin, such as epoxy resin, silicon resin, or the like, from the points of view of molding property, mass productivity, and cost. In recent years, blue LEDs with as high brightness as that of red and green LEDs have been developed, and thereby used in applications of LED traffic lights, white LEDs, and the like. Also, in order to obtain higher brightness, the development of high-power LEDs has proceeded, and high-power LEDs of a few watts have already been manufactured. In high-power LED elements, large current flows therethrough so that, from the points of view of light-emitting property and durability, an unnegligible level of heat is produced. In such LEDs, resin sealing materials have large thermal expansion coefficient, so that increasing heat with increasing power and light of LED elements causes an increase in internal stress due to thermal expansion, and therefore cracking in the package, and peeling resulting from thermal expansion differences between the members. There is also the disadvantage of fast optical deterioration in resin sealing materials, such as yellowing. Because particularly in high-power LEDs, the above-mentioned tendencies are developed notably, LEDs with excellent durability are desired. To improve such optical deterioration, heat resistance, and durability of LEDs, Japanese patent application laid-open No. 11-204838, for example, discloses using glass material as the sealing material. According to the conventional light-emitting device, because sealing LED elements, etc. with glass generally requires softening and thermocompression-bonding glass material, or fusing and molding glass for being integral with the LED elements, etc., the portions to be sealed expand thermally due to exposure to heat during the processing, and are formed integrally and with no stress in this state, which is returned to normal temperature. In this case, however, if the thermal expansion coefficient differences between the LED elements and mounting substrate, etc. are large, there are the problems that peeling thereof is caused in the mounting interface by thermal stress due to the thermal contraction differences, and that cracking is caused in the sealing glass material, which reduce reliability.
{ "pile_set_name": "USPTO Backgrounds" }
Datensucht von Facebook und Google : „Lachen wird ein Rohstoff“ Künftig werden unsere Kühlschränke über uns Witze machen, sagt der Internetkritiker Evgeny Morozov. Deshalb will er den Kapitalismus abschaffen. taz: Herr Morozov, kennen Sie einen guten Witz über Google? Evgeny Morozov: Da müsste ich mal googeln. Nein, ich glaube, ich kenne keinen. Uns ist auch keiner eingefallen. Der Tech-Community fehlt da einfach der Humor. Leute, die über das Netz schreiben, gehen oft davon aus, dass sie den wichtigsten Epochenwandel seit Gutenberg begleiten. Sie betrachten alles mit einer gewissen Gravität. Auch wenn sie Hoodies und Flipflops tragen. Man findet bei ihnen keine Spur von Selbstironie. Sie haben kürzlich darüber geschrieben, dass in Zukunft selbst Kühlschränke versuchen werden, witzig zu sein. Haushaltsgeräte also, die mit dem Internet verbunden sind und Scherze machen. Sie sehen das kritisch. Wieso? Das war eine Reaktion auf den Essay eines Neurowissenschaftlers. Früher ging es bei Witzen nur um die Analyse von Text, um Elemente, die man kombinieren musste, argumentiert er. Das konnte man Rechnern nicht beibringen. Heute kann man dafür mit Sensoren arbeiten. Die Sensoren in Ihrem smarten Kühlschrank könnten dann feststellen, dass Sie gerade Zutaten in Ihr Omelette mischen, die nicht zusammenpassen, und einen Scherz darüber machen. Und was finden Sie daran schlimm? Der Mann freute sich, dass unsere schlauen Häuser bald Witze für uns machen werden. Aber die Sensoren gehören Unternehmen, die so viel wie möglich über uns erfahren wollen, um noch zielgerichtetere Werbung zu schalten. Klar: Vielleicht bringen diese Unternehmen uns zum Lachen. Aber es wird ein Lachen sein wie in Aldous Huxleys „Schöner neuer Welt“, und keines wie in spontanen Alltagssituationen. Unternehmen werden unseren Alltag übernehmen bis hin zu so grundlegenden Emotionen wie dem Lachen. im Interview: Evgeny Morozov Das Werk: Mit seinen Büchern „The Net Delusion: The Dark Side of Internet Freedom“ und „To Save Everything, Click Here: Technology, Solutionism, and the Urge to Fix Problems that Don't Exist“ hat Evgeny Morozov die internationale Debatte über die Digitalisierung geprägt wie kaum ein anderer. Zurzeit lebt er in den USA und arbeitet an der Eliteuniversität Harvard an einem Buch über die Geschichte des Internets. Der Mann: Morozov wurde 1984 in Weißrussland geboren. Er machte seinen Bachelor in Bulgarien und studierte in Berlin am kleinen European College of Liberal Arts, heute Bart College. Währenddessen arbeitete er für die Prager Nichtregierungsorganisation Transitions Online. Dort gewann er die Einsichten für sein erstes Buch. „Ich habe gemacht, was jeder in Berlin macht. Mit einem Laptop im Café sitzen“, erinnert er sich. Der Kühlschrank könnte also sagen: Sie wollten doch abnehmen! Und jetzt ein Snickers?! Ja, es geht auch um soziale Erwartungen. Selbst Lachen wird jetzt Teil von etwas, das französische Philosophen Gouvernementalität nennen würden. Es kann nun also Arbeit verrichten, einen dazu antreiben, gesünder zu essen, sich mehr zu bewegen. Lachen wird eine Ressource. Für so eine Ansage brauchen Sie keinen computergesteuerten Kühlschrank. Das sagt Ihnen schon heute jeder Arzt. In Deutschland beginnt das mit der Verhaltenspsychologie erst langsam, auch das Nudging, das Anstupsen, mit dem man jemandem sanft bedeutet, sich zu ändern. In Großbritannien läuft das seit Anfang der 90er Jahre, in den USA oder in Dänemark genauso. Es gibt eine Allianz zwischen den Anhängern der Verhaltensforschung in der Politik mit jenen, die Apps und Sensoren zur Verfügung stellen, die messen, was wir essen, was wir konsumieren, wie viel Sport wir machen. Und was macht Sie so besorgt? Die Eingriffe finden bei den Bürgern statt. Es geht nicht mehr darum, die Ernährungsindustrie davon abzuhalten, schädliches Fastfood bei Kindern zu bewerben oder Deals für gesundes Essen mit Schul-Cafeterias abzuschließen. Stattdessen präsentiert man uns nun diese unternehmerische „Wir sollten alle gesund sein“-Einstellung. Aber wenn ich in Kalifornien in der Nähe von Los Angeles lebe, dann bringt es gar nichts, mich dazu aufzufordern, mehr zu laufen, weil ich da einfach nirgendwo laufen kann. Was hindert Sie daran? Die Infrastruktur ist eine für Autos. Man könnte ja darüber nachdenken, diese Infrastruktur anzupassen. Solche Lösungen werden aber immer weniger denkbar. Weil wir uns nur darauf konzentrieren, wie wir mit diesem unternehmerischen Ansatz und seinen technischen Möglichkeiten den Leuten vorschreiben, was sie zu tun oder zu lassen haben. Man negiert so die vergangenen Dekaden sozialer Bewegungen. Die haben gezeigt, wie politisch der Alltag ist. Gesundheit ist politisch, Essen ist politisch. Was wir essen, ist nicht nur ein Produkt im Supermarkt. Es gibt schon vorher eine Kette von Herstellern und Unternehmen. Man kann sich nicht nur auf das Endprodukt konzentrieren. Eine erste Krankenkasse in Deutschland richtet ihre Beiträge jetzt am Verhalten ihrer Mitglieder aus. Sie leben in den USA, hat sich Ihre Versicherung schon gemeldet? Ich bin über meine Universität, über Harvard, versichert. Ich bin gesund, ich habe in den vergangenen Jahren vierzig Kilo abgenommen. Ich habe meinen Part erledigt, ohne Apps. Bei fünf, sechs Unternehmen in den USA gibt es Bestrebungen, die Angestellten mit Trackern auszustatten und zu überwachen, wie viel sie laufen, wie viel Sport sie machen. Ich reduziere meine Interaktionen mit dem amerikanischen Staat und Unternehmen auf ein Minimum. Der einzige Berührungspunkt ist Amazon, das mir Bücher schickt. Aha, Amazon also! Das nutze ich. Ich kaufe viele Bücher aus den 50er und 60er Jahren, die kriegst du einfach nicht in jedem Buchladen. Fürchten Sie eine Gesundheitsdiktatur? Nennen Sie es, wie Sie wollen. Dem Staat fehlt einfach das Geld, um viele Leistungen zu gewährleisten. Also stellt er das Gesundheitssystem auf Prävention um. Ihm bleibt nichts anderes übrig. Die Gesundheitsdiktatur ist im Grunde die Folge eines dauerhaften finanziellen Mangels. Auch die Unternehmen wollen Geld sparen. Also gibt es gesetzliche Anreize, damit die Menschen ihre Daten den Versicherern geben, sodass sie weniger zahlen. Wir können es uns nicht mehr leisten, krank zu werden. Den Begriff der Diktatur halten Sie für die Analyse jedenfalls für hilfreich? Ich würde es eher eine Diktatur des Marktes nennen. Oder die Diktatur des Neoliberalismus. Diktatur darf man das gern nennen. Ich gehöre nicht zu den Leuten, die den Begriff ausschließlich für Nordkorea reservieren wollen. Sie sind in einer der letzten europäischen politischen Diktaturen aufgewachsen, in Weißrussland. Schärft das Ihren Blick für autoritäre Erscheinungen in Demokratien? Die mit meiner Herkunft verbundenen Erfahrungen sind eher eine Hürde. Die muss man überwinden, um zu begreifen, was heute passiert. Wir leben nicht in einer Orwell’schen Gesellschaft. Wir geben unsere Daten nicht her, weil uns jemand eine Knarre an den Kopf hält. Sondern weil es einen finanziellen Anreiz gibt. Wenn Sie das aus dem alten Blickwinkel betrachten, es gehe immer um den Staat, der den Zwang ausübe, analysieren Sie am entscheidenden Punkt vorbei: Es ist heute ein ökonomischer Zwang, der Ihnen als Anreiz präsentiert wird. Man muss nicht in einer Diktatur aufgewachsen sein, um zu verstehen, was die NSA tut. Alles andere ist eine extreme Form des Kapitalismus. Das hat mit dem Kommunismus nichts zu tun. Hat Sie die Ankunft des Kapitalismus in Osteuropa sensibler dafür gemacht, die Nachteile einer ungezügelten Ökonomie zu erkennen? Jeder will meine Arbeit mit meinem psychosozialen Hintergrund erklären. Aber: nein. Nein! Ich habe in Bulgarien studiert und viel in Osteuropa gearbeitet, das stimmt. Ich kenne die Mentalität dort ganz gut. Ich denke aber nicht, dass einem das bei diesem Thema besonders hilft. Nein, nein, nein. Wir fragen, inwieweit Ihr Leben Ihr Werk als Autor beeinflusst. Ich glaube nicht, dass meine Herkunft aus Weißrussland viel über meine Ansichten erzählt. Für manche Erkenntnisse meines ersten Buchs, wie digitale Medien eingesetzt werden können, waren meine Erfahrungen vielleicht inspirierend. Meist haben die Leute diese Medien aus Spaß benutzt, zur Unterhaltung. Es ist also nicht so, dass wir umso politischer werden, je mehr Videos wir auf YouTube sehen können. Ich habe früh verstanden, dass die Rhetorik von der befreienden Kraft digitaler Medien aus Brüssel und Washington nicht der Realität entspricht. Da hat mir meine Herkunft sicher geholfen, das zu begreifen. Ihre Sicht auf das Internet hat sich stark verändert, Sie haben seine Möglichkeiten früher sehr positiv eingeschätzt. Warum sind Sie heute so skeptisch? Als ich in Berlin gelebt habe, habe ich für NGOs gearbeitet, ich bin viel durch die Länder der ehemaligen Sowjetunion und des früheren Ostblocks gereist. Wir haben oppositionellen Politikern und Aktivisten angeboten, ihnen den Umgang mit neuen Medien beizubringen, mit sozialen Netzwerken, Podcasts. Wir wollten den politischen Wandel beschleunigen. Das ist mehr oder weniger fehlgeschlagen. Auch weil die Staaten schnell klüger geworden sind, sie setzten diese Techniken auch ein, beispielsweise zur Propaganda. Und dann erkannte ich, dass es den Zusammenhang, den amerikanische Politiker und Intellektuelle oft konstruieren, den zwischen Internet und Freiheit, so nicht gibt. Für mich hatten solche Theorien nichts Substanzielles mehr. Ich habe meine Meinung nicht an einem bestimmten Punkt geändert, es war ein Prozess zunehmender Frustration. Verfolgen Sie den Ukraine-Konflikt? Den Georgienkrieg habe ich aufmerksamer verfolgt. Konzentrieren Sie sich nicht auf Internetaktivismus. Sehen Sie sich die Staaten und deren Handeln an. Wie sich ein Sender wie Russia Today überall ausbreitet, mit Büros in London, in Berlin. Das zählt. Während des Arabischen Frühlings wurden Blogger zu Helden. In der Ukraine scheint es keine zu geben. Es gibt nichts zu feiern, also sind da auch keine Helden. Dass wir uns die Helden derzeit nicht erfinden, das finde ich eher positiv. Warum sollte man über Blogger in der Ukraine schreiben? Dort herrscht doch Krieg. Sie fragen, warum es keine Internethelden gibt. Sie könnten genauso fragen, warum es keine Bauernhelden gibt. Die Antwort ist dieselbe: weil sie in diesem Konflikt keine Rolle spielen. Die Rolle des Internets ist überbewertet? Wir schleppen intellektuellen Ballast mit uns herum, wenn wir „das Internet“ zum Rahmen machen, in dem sich unsere Gedanken bewegen. Wir reden über Fragen wie: Zerstört das das Internet? Hält das Internet das aus? Macht das das Internet besser? Die einen sagen, das Internet wurde öffentlich finanziert, es muss öffentlich bleiben. Die anderen erwidern: Nein, nein, das Internet entstand aus Start-ups, finanziert von privatem Geld, das ist die wahre Industrie, man muss sie gewähren lassen. Wie wir das Internet sehen, ist eine Frage unseres politischen Standpunkts. Auch seine Geschichte ist ein politisches Projekt. Wollen Sie bestreiten, dass technische Entwicklungen Auswirkungen auf Politik haben? Es wäre gefährlich, dem Internet eine eigene Handlungsfähigkeit zuzuschreiben, als wäre es eine eigenständige Kraft. Dann nämlich würde die Sprache des Internets die der Wirtschaft und Politik ersetzen. Es wäre fatal, wenn die Menschen über Netzneutralität reden und die Frage, wessen Daten wie schnell transportiert werden, als wäre das eben keine streng politische und ökonomische Frage. Die Frage ist doch: Vertrauen wir den Unternehmen, das zu regeln? Oder muss das der Staat tun, die öffentliche Hand? In den USA wird die letzte Option gar nicht diskutiert. Da ist völlig klar: Unternehmen regeln das, man muss sie nur gut kontrollieren. Niemand stellt infrage, dass ihnen die Infrastruktur gehört. Das ist ein Fehler. Die Rede vom Internet entpolitisiert unsere Gespräche und wischt die radikaleren Fragen vom Tisch. Würden Sie sich als Kapitalismuskritiker bezeichnen? Klar. Mit diesem Begriff habe ich kein Problem. Hält man Sie, diesen Typen aus Weißrussland, in den USA für einen Kommunisten? Ich hatte Glück. Das Gegenteil ist der Fall. Weil ich aus Weißrussland stamme, denken alle, ich müsse den Kommunismus richtig hassen. Ich sei ein geborener Kapitalist. Mein Pass hilft mir da sehr. Ich könnte wahrscheinlich ein Trotzki-T-Shirt tragen, und die würden immer noch denken, ich bewerbe den Kapitalismus. Ist noch niemandem aufgefallen, wie sehr sich die Leute da verschätzt haben? Meine Kritik hat sich bisher auf den Technologiesektor konzentriert. Und Menschen, die Tech-Unternehmen hassen, gibt es nun wirklich genug. Es gibt auch Marktliberale, die Facebook oder Amazon kritisieren, weil das Monopole sind. Die Technologiediskussion ist so umfassend, dass ich diese Botschaft jeden Tag herausschreien kann, die Leute werden immer noch denken, ich will ihnen bloß ihre Maschinen nehmen und nur noch mit Schreibmaschine schreiben. So denken viele über mich. Man kann ihnen erklären, dass dem nicht so ist. Dass man für Technologie, für Fortschritt sein kann, aber für eine andere Art des Fortschritts. Die Option gibt es in den USA nicht. Und in Europa immer weniger. Welche Art Fortschritt wollen Sie? Derzeit gehen wir von der Annahme aus, dass Daten der jeweiligen Firma gehören, mit deren Ressourcen sie hergestellt worden sind. Suchen gehört Google. Soziale Kontakte gehören Facebook. Die Information darüber, wohin mich mein Fahrer fährt, gehört dem Taxi-Dienst Uber. Das ist das Paradigma des Silicon Valley. Gerade entsteht noch ein anderes Paradigma, das besagt: Die Daten gehören den Bürgern. Und die könnten mit ihren Daten handeln, Geld verdienen. Vielleicht ist das so ein neuer Ansatz, um Arbeitslosigkeit zu bekämpfen. Man verkauft seine Daten, damit man dafür Geld bekommt. Ich glaube, beide Ideen führen in eine demokratische und politische Sackgasse. Was wäre die Alternative? Niemand sollte Daten besitzen. Luft gehört auch keinem. Bürger sollen mit ihren Daten etwas tun dürfen. Sie haben also eine digitale Identität, die extrem gut verschlüsselt ist und sicher. Der Staat gewährleistet den Zugang, auch Unternehmen dürfen die Daten nutzen. Vielleicht gegen eine Gebühr. Und Google? Würden Sie das Unternehmen zerschlagen, wie es derzeit diskutiert wird? Statt Google komplett zu zerschlagen, müssten wir Konzerne aufteilen. Erst einmal bräuchte es einen kostenlosen Basisdienst im Internet. Dafür sollte weder mit Geld noch mit Werbung bezahlt werden. Wenn ich also rausfinden möchte, in welchem Film Tom Cruise 1993 spielte, lässt sich das nachschauen. Dafür braucht man keine künstliche Intelligenz. Nur eine besser strukturierte Form von Wikipedia. Das kann gratis zur Verfügung gestellt werden, im Zweifel eben steuerfinanziert. Die nächste Ebene wäre einfach: Google kann erweiterte Services verkaufen. Wenn ich Ortungsdienste will oder andere Features, dann gegen eine Gebühr. Ich zahle 3 Dollar, und gut ist. Aber für den Basisdienst zahlt der Staat. Es gibt keine Werbung. Und mit meinen Daten passiert in diesem Basisdienst nichts. Wer stellt den Basisdienst zur Verfügung? Google? Oder ein Konsortium aus unterschiedlichen Anbietern. Am besten wäre ein gemeinsamer Pool von Wissen und Fakten, um den herum auch andere Systeme entstehen dürfen. Wenn Sie also ein Start-up gründen wollen, das mit diesen Daten das Wetter vorhersagt, gut. Ich bin nicht gegen Unternehmen, ich möchte nur gern diesen Automatismus unterbrechen, nach dem sie immer mächtiger werden, je mehr Daten sie sammeln. Zurzeit ist Uber mehr als 40 Milliarden Dollar wert. Was besitzen die? Nichts. Keine Fahrer, keine Autos. Nur einen Algorithmus und einen Haufen Daten. Wenn Google Uber kaufen würde, hätten beide Unternehmen noch mehr Daten. Ich möchte aber nicht, dass Google diese Macht hat. Wenn diese Daten in einer allgemein zugänglichen Datenbank lagerten, wäre das Problem gelöst. Sie müssten so verschlüsselt werden, dass sie nicht zu manipulieren sind. Das ist die entscheidende Hürde. Damit würden Sie die Werbeindustrie komplett ausschalten. Ja, damit könnte ich sehr gut leben. Eliminiert die Werbeindustrie. Die Technologieindustrie würde weiterhin bezahlt werden. Über Gebühren, Abonnements, Steuern. Ein solches Modell würde auch den Wettbewerb um Kundenservice und Innovationen viel mehr ankurbeln. Wie das? Derzeit schafft es kein Unternehmen, Google ernsthaft Konkurrenz zu machen, weil ihm die große Menge an Daten fehlen, die Google schon gesammelt hat. Es ist unmöglich, Google zu schlagen. Sie können als Start-up den besten Algorithmus der Welt bauen – die Daten, mit denen er am besten lernt, hätten sie immer noch nicht. Daher müssen wir die Daten vergemeinschaften, sie sozialisieren. Das derzeitige Modell funktioniert so, als würden Firmen anfangen uns Luft zu verkaufen, indem sie uns bei jedem Atemzug Werbung zeigen. Sie vergleichen Daten mit Luft. Sollte es Menschen verboten sein, mit ihnen zu handeln? Ja. Das würde die Daten aus diesem Kreislauf nehmen. Schauen Sie Uber an. Warum muss ich die Fahrer bewerten, warum müssen die mich bewerten, warum muss Uber wissen, wer ich bin? Weil die Plattform diese Daten braucht, um Vertrauen zu etablieren. Sie wollen kein Geld ausgeben, um sicherzustellen, dass ihre Kunden ehrliche Menschen sind, also vertrauen sie auf einen Bewertungsmarkt. Dafür besorgt der Fahrdienst Uber Ihnen ein Verkehrsmittel, wenn Sie es brauchen, zu einem erschwinglichen Preis. Das ginge auch anders, nämlich komplett anonymisiert. Ich sehe auch keinen Sinn darin, jeden Morgen um acht Uhr einen Bus fahren zu lassen, obwohl den niemand benutzt. Das ist verrückt in einer Zeit, in der man mit seinem Telefon nachschauen und planen kann, wo man hinfahren möchte. Man könnte dem Bus sagen, wann er wo sein soll. So sollte es laufen. Und dass es nicht so läuft, liegt daran, dass die notwendigen Daten nicht in den Händen der Bürger sind. Sie sind nicht in den Händen der Gemeinden, und auch nicht in den Händen der Städte. In einem Roman des Science-Fiction-Autors Cory Doctorow wird Geld durch Reputation ersetzt. So können auch arme Menschen durch gute Taten oder Charme Ansehen erwerben und reich werden. Reputation könnte die Welt gerechter machen. Was spricht dagegen? Eine furchtbare Vorstellung. Ich würde in diesem System nicht überleben. Ich will mir keine Sorgen darüber machen, ob meine Scherze lustig genug sind. Lustig für eine ausreichende Anzahl von Leuten. Ich möchte nicht ständig bewertet werden für das, was ich tue. Das ist nicht gut für die Psyche. Ich will, dass Leute Risiken eingehen und sie nicht meiden, aus Angst, sie könnten an Reputation verlieren. Sie haben also Angst, dass Ihre Witze nicht lustig genug sind. Ich weiß nicht, ob ich witzig bin. Es ist mir auch egal. Ich habe neulich mit dem Philosophen Slavoj Zizek zusammengesessen. Denkt er, dass er lustig ist? Keine Ahnung. Leute lachen über ihn. Ich bemühe mich wenigstens, manche tun nicht mal das.
{ "pile_set_name": "OpenWebText2" }
Lineage (Buddhism) A lineage in Buddhism is a line of transmission of the Buddhist teaching that is "theoretically traced back to the Buddha himself." The acknowledgement of the transmission can be oral, or certified in documents. Several branches of Buddhism, including Chan (including Zen and Seon) and Tibetan Buddhism maintain records of their historical teachers. These records serve as a validation for the living exponents of the tradition. The historical authenticity of Buddhist lineage is questionable. Stephen Batchelor has claimed, speaking about specifically Japanese Zen lineage, "the historicity of this “lineage” simply does not withstand critical scrutiny." Erik Storlie has noted that transmission "is simply false on historical grounds." Edward Conze said "much of the traditions about the early history of Chan are the inventions of a later age." Vinaya In the lineage of the vinaya, the requirements for ordination as a bhikkhu ("monk") or a bhikkhuni ("nun") include the presence of at least five other monks, one of whom must be a fully ordained preceptor, and another an acharya (teacher). This lineage for ordaining bhikshunis became extinct in the Theravada school and in Tibetan Buddhism. Therefore, when śrāmaṇerikās like Tenzin Palmo wanted full ordination, she had to travel to Hong Kong. Mahasiddha Lineages in the Mahasiddha tradition do not necessarily originate from Gautama Buddha, but are ultimately grounded, like all Buddhist lineages, in the Adi-Buddha. Chan and Zen lineages Construction of lineages The idea of a patriarchal lineage in Chan Buddhism dates back to the epitaph for Fărú (法如 638–689), a disciple of the 5th patriarch, Hóngrĕn (弘忍 601–674). In the Long Scroll of the Treatise on the Two Entrances and Four Practices and the Continued Biographies of Eminent Monks, Daoyu and Huike are the only explicitly identified disciples of Bodhidharma. The epitaph gives a line of descent identifying Bodhidharma as the first patriarch. In the 6th century biographies of famous monks were collected. From this genre the typical Chan-lineage was developed: D. T. Suzuki contends that Chan's growth in popularity during the 7th and 8th centuries attracted criticism that it had "no authorized records of its direct transmission from the founder of Buddhism" and that Chan historians made Bodhidharma the 28th patriarch of Buddhism in response to such attacks. Six patriarchs The earliest lineages described the lineage from Bodhidharma to Huineng. There is no generally accepted 7th Chinese Patriarch. The principle teachers of the Chan, Zen and Seon traditions are commonly known in English translations as "Patriarchs". However, the more precise terminology would be "Ancestors" or "Founders" () and "Ancestral Masters" or "Founding Masters" (), as the commonly used Chinese terms are gender neutral. Various records of different authors are known, which give a variation of transmission lines: Continuous lineage from Gautama Buddha Eventually these descriptions of the lineage evolved into a continuous lineage from Gautama Buddha to Bodhidharma. The idea of a line of descent from Gautama is the basis for the distinctive lineage tradition of Chan. According to the Song of Enlightenment (證道歌 Zhèngdào gē) by Yǒngjiā Xuánjué (665-713), one of the chief disciples of Huineng, Bodhidharma was the 28th Patriarch of Buddhism in a line of descent from Gautama Buddha through his disciple Mahākāśyapa: The Denkoroku gives 28 patriarchs in this transmission, and 53 overall: Transmission to Japan Twenty-four different Zen lineages are recorded to be transmitted to Japan. Only three survived until today. Sōtō was transmitted to Japan by Dōgen, who travelled to China for Chan training in the 13th century. After receiving Dharma transmission in the Caodong school, he returned to Japan and established the lineage there, where it is called the Sōtō. The Linji school was also transmitted to Japan several times, where it is the Rinzai school. Jōdo Shinshū In Jōdo Shinshū, "Patriarch" refers to seven Indian, Chinese and Japanese masters before its founder, Shinran. Tibetan Buddhism The 14th Dalai Lama, in the foreword to Karmapa: The Sacred Prophecy states:Within the context of Tibetan Buddhism, the importance of lineage extends far beyond the ordinary sense of a particular line of inheritance or descent. Lineage is a sacred trust through which the integrity of Buddha's teachings is preserved intact as it is transmitted from one generation to the next. The vital link through which the spiritual tradition is nourished and maintained is the profound connection between an enlightened master and perfectly devoted disciple. The master-disciple relationship is considered extremely sacred by all the major schools of Tibetan Buddhism. Karma Kagyu Possession of lineage Wallace renders into English a citation of Karma Chagme (, fl. 17th century) that contains an embedded quotation attributed to Nāropā (956-1041 CE): Preservation of lineages Gyatrul (b. 1924), in a purport to Karma Chagme, conveys Dilgo Khyentse's 'samaya', diligence and humility in receiving Vajrayana empowerment, lineal Dharma transmission and rlung, as rendered into English by Wallace (Chagmé et al., 1998: p. 21): Chöd Chöd is an advanced spiritual practice known as "Cutting Through the Ego." This practice, based on the Prajnaparamita sutra, uses specific meditations and tantric ritual. There are several hagiographic accounts of how chöd came to Tibet. One namtar (hagiography) asserts that shortly after Kamalaśīla won his famous debate with Moheyan as to whether Tibet should adopt the "sudden" route to enlightenment or his own "gradual" route, Kamalaśīla enacted phowa, transferring his mindstream to animate a corpse polluted with contagion in order to safely move the hazard it presented. As the mindstream of Kamalaśīla was otherwise engaged, a mahasiddha named Dampa Sangye came across the vacant kuten or "physical basis" of Kamalaśīla. Dampa Sangye was not karmically blessed with an aesthetic corporeal form, and upon finding the very handsome and healthy empty body of Kamalaśīla, which he assumed to be a newly dead fresh corpse, used phowa to transfer his own mindstream into Kamalaśīla's body. Dampa Sangye's mindstream in Kamalaśīla's body continued the ascent to the Himalaya and thereby transmitted the Pacification of Suffering teachings and the Indian form of Chöd which contributed to the Mahamudra Chöd of Machig Labdrön. The mindstream of Kamalaśīla was unable to return to his own kuten and so was forced to enter the vacant body of Dampa Sangye. See also Dharma transmission Gotra Religious order Sangharaja Zen lineage charts Notes References Sources External links The Lineages and History of Buddhism Chö/Chöd/Lineages associated with Machig Labdrön Schools of Zen Buddhism at the Zen Buddhism WWW Virtual Library Zen Ancestors in China - The Five Houses Caodong and Linji lineage chart of present-day Chan Master Sheng-yen Buddhist masters Category:Buddhist philosophical concepts Category:Buddhist orders Category:Zen Buddhist terminology Category:Tibetan Buddhism
{ "pile_set_name": "Wikipedia (en)" }
Q: how prove the following statment for this matrix. Let $A:=[a_{ij}]_{n×n}$ , $a_{ij}=0$ or $a_{ij}=1$ and $\exists m \in\mathbb N$ such that $A^m=J-I$, where $I$ is the identity matrix and $J=[1]_{n×n}$ (each entry is $1$). How to prove: $\exists a \in\mathbb N$ such that $n=a^m+1$, and $m$ is odd. Thanks in advance. A: (The problem statement is false when $n=1$, but we will ignore this degenerate case.) We have at least three proofs. Proof 1 (adapted from the proof by Anon; see his/her comment). We have $$\det (A)^m=\det (A^m)=\det(J-I)=(-1)^{n-1}(n-1)$$ and therefore $n=|\det(A)|^m+1$. Proof 2 (adapted from Theorem 1 of C. W. H. Lam, J. H. van Lint, Directed Graphs with Unique Paths of Fixed Length, Journal of Combinatorial Theory B, vol. 24, No. 3, 1978; thanks to @darij_grinberg for the information): $A^m=J−I$ implies that $AJ−A=A^{m+1}=JA−A$. Hence $AJ=JA$, i.e. all row sums and column sums of $A$ are equal to some natural integer $c$. Thus $AJ=JA=cJ$ and in turn $A^mJ=c^mJ$. But by property of $A$, we also have $A^mJ=(J−I)J=(n−1)J$. Therefore $c^m=n−1$. Proof 3: As $2 = 1^m+1$, we may assume that $n\ge3$. Since $A$ is an entrywise nonnegative, by Perron-Frobenius theorem, the spectral radius $\rho(A)$ of $A$ is a maximal eigenvalue of $A$. Hence $\rho(A)^m$ a maximal eigenvalue of $A^m$. But when $n\ge3$, the maximal eigenvalue of $A^m=J-I$ is unique, namely $n-1$. Hence $\rho(A)^m=n-1$, or $n=\rho(A)^m+1$. Finally, as the eigenvalues of $A^m=J-I$ are $n-1$ (simple eigenvalue) and $-1$ (with multiplicity $n-1$), the eigenvalues of $A$ are $\rho(A)=(n-1)^{1/m}$ and a number of $m$-th roots of $-1$. Hence $\rho(A)=|\det(A)|$ and in turn $\rho(A)$ is an integer.
{ "pile_set_name": "StackExchange" }
The relation between symptom improvement and gastric emptying in the treatment of diabetic and idiopathic gastroparesis. The relationship between symptom improvement (SI) and acceleration of gastric emptying (GE) for different drugs used in the treatment of idiopathic and diabetic gastroparesis is uncertain. In this paper we examined the study-specific correlations between SI and GE, and we performed a meta-regression analysis of the association across multiple studies. The MEDLINE database (1,946 to present) was searched, and only controlled trials or trials with an established effective comparator that compared both SI and GE were included. Studies were identified for metoclopramide (n=6), domperidone (n=6), cisapride (n=14), erythromycin (n=3), botulinum toxin (n=2), and levosulpiride (n=3). Even though most drugs concomitantly improved symptoms and accelerated GE, no study reported a significant correlation between SI and GE. Moreover, a correlation analysis over all studies using meta-regression did not show a significant relationship between SI and GE. Our findings need to be qualified by inconsistencies in study methods, which is a limitation but also suggests that our findings are robust to methodological factors. In this review, no evidence of a relationship between SI and GE was identified for different drugs used for the treatment of gastroparesis. This finding questions the use of GE measurement to direct drug development for gastroparesis.
{ "pile_set_name": "PubMed Abstracts" }
// // SendPaxViewController.swift // Blockchain // // Created by Alex McGregor on 4/23/19. // Copyright © 2019 Blockchain Luxembourg S.A. All rights reserved. // import DIKit import ERC20Kit import EthereumKit import Foundation import PlatformKit import PlatformUIKit import RxCocoa import RxSwift import SafariServices import ToolKit protocol SendPaxViewControllerDelegate: class { func onLoad() func onAppear() func onConfirmSendTapped() func onSendProposed() func onPaxEntry(_ value: CryptoValue?) func onFiatEntry(_ value: FiatValue) func onAddressEntry(_ value: String?) func onErrorBarButtonItemTapped() func onExchangeAddressButtonTapped() func onQRBarButtonItemTapped() var rightNavigationCTAType: NavigationCTAType { get } } class SendPaxViewController: UIViewController { // MARK: Public Properties weak var delegate: SendPaxViewControllerDelegate? // MARK: Private IBOutlets @IBOutlet private var outerStackView: UIStackView! @IBOutlet private var topGravityStackView: UIStackView! @IBOutlet private var sourceAccountTitleLabel: UILabel! @IBOutlet private var sourceAccountValueLabel: UILabel! @IBOutlet private var destinationAddressTitleLabel: UILabel! @IBOutlet private var destinationAddressIndicatorLabel: UILabel! @IBOutlet private var destinationAddressTextField: UITextField! @IBOutlet private var feesTitleLabel: UILabel! @IBOutlet private var networkFeesLabel: UILabel! @IBOutlet private var maxAvailableLabel: ActionableLabel! @IBOutlet private var cryptoTitleLabel: UILabel! @IBOutlet private var cryptoAmountTextField: UITextField! @IBOutlet private var fiatTitleLabel: UILabel! @IBOutlet private var fiatAmountTextField: UITextField! @IBOutlet private var sendNowButton: UIButton! @IBOutlet private var exchangeAddressButton: UIButton! private var fields: [UITextField] { [ destinationAddressTextField, cryptoAmountTextField, fiatAmountTextField ] } // MARK: Private Properties private var coordinator: SendPaxCoordinator! private let alertViewPresenter: AlertViewPresenter = AlertViewPresenter.shared private let loadingViewPresenter: LoadingViewPresenting = LoadingViewPresenter.shared private var qrScannerViewModel: QRCodeScannerViewModel<AddressQRCodeParser>? private let analyticsRecorder: AnalyticsEventRecording = resolve() private var maxAvailableTrigger: ActionableTrigger? { didSet { guard let trigger = maxAvailableTrigger else { maxAvailableLabel.text = "" return } let maxText = NSMutableAttributedString( string: trigger.primaryString, attributes: useMaxAttributes() ) let CTA = NSAttributedString( string: trigger.callToAction, attributes: useMaxActionAttributes() ) maxText.append(CTA) maxAvailableLabel.attributedText = maxText } } // MARK: Class Functions @objc class func make() -> SendPaxViewController { SendPaxViewController.makeFromStoryboard() } // MARK: Lifecycle override func viewDidLoad() { super.viewDidLoad() coordinator = SendPaxCoordinator( interface: self, exchangeAddressPresenter: SendExchangeAddressStatePresenter(assetType: .pax) ) fields.forEach({ $0.delegate = self }) topGravityStackView.addBackgroundColor(#colorLiteral(red: 0.8039215803, green: 0.8039215803, blue: 0.8039215803, alpha: 1)) sendNowButton.layer.cornerRadius = 4.0 sendNowButton.setTitle(LocalizationConstants.continueString, for: .normal) maxAvailableLabel.delegate = self delegate?.onLoad() setupKeyboard() setupAccessibility() } override func viewWillAppear(_ animated: Bool) { super.viewWillAppear(animated) delegate?.onAppear() } private func setupAccessibility() { sourceAccountTitleLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.sourceAccountTitleLabel sourceAccountValueLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.sourceAccountValueLabel destinationAddressTitleLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.destinationAddressTitleLabel destinationAddressTextField.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.destinationAddressTextField destinationAddressIndicatorLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.destinationAddressIndicatorLabel feesTitleLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.feesTitleLabel networkFeesLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.feesValueLabel maxAvailableLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.maxAvailableLabel cryptoTitleLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.cryptoTitleLabel cryptoAmountTextField.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.cryptoAmountTextField fiatTitleLabel.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.fiatTitleLabel fiatAmountTextField.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.fiatAmountTextField exchangeAddressButton.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.exchangeAddressButton sendNowButton.accessibilityIdentifier = AccessibilityIdentifiers.SendScreen.continueButton } private func setupKeyboard() { let bar = UIToolbar() let doneButton = UIBarButtonItem(barButtonSystemItem: .done, target: self, action: #selector(dismissKeyboard)) let flexibleSpace = UIBarButtonItem(barButtonSystemItem: .flexibleSpace, target: self, action: nil) bar.items = [ flexibleSpace, doneButton ] bar.sizeToFit() destinationAddressTextField.inputAccessoryView = bar fiatAmountTextField.inputAccessoryView = bar cryptoAmountTextField.inputAccessoryView = bar hideKeyboardWhenTappedAround() } private func apply(_ update: SendMoniesPresentationUpdate) { switch update { case .cryptoValueTextField(let amount): guard cryptoAmountTextField.isFirstResponder == false else { return } if amount?.amount == 0 { cryptoAmountTextField.text = "" } else { cryptoAmountTextField.text = amount?.toDisplayString(includeSymbol: false) } case .feeValueLabel(let fee): networkFeesLabel.text = fee case .toAddressTextField(let address): destinationAddressTextField.text = address case .fiatValueTextField(let amount): guard fiatAmountTextField.isFirstResponder == false else { return } if amount?.amount == 0 { fiatAmountTextField.text = "" } else { fiatAmountTextField.text = amount?.toDisplayString(includeSymbol: false, locale: Locale.current) } case .loadingIndicatorVisibility(let visibility): switch visibility { case .hidden: loadingViewPresenter.hide() case .visible: loadingViewPresenter.show(with: LocalizationConstants.loading) } case .sendButtonEnabled(let enabled): sendNowButton.isEnabled = enabled sendNowButton.alpha = enabled ? 1.0 : 0.5 case .textFieldEditingEnabled(let editable): fields.forEach({ $0.isEnabled = editable }) case .showAlertSheetForError(let error): handle(error: error) case .showAlertSheetForSuccess: let alert = AlertModel( headline: LocalizationConstants.success, body: LocalizationConstants.SendAsset.paymentSent, image: #imageLiteral(resourceName: "eth_good"), style: .sheet ) let alertView = AlertView.make(with: alert, completion: nil) alertView.show() case .hideConfirmationModal: ModalPresenter.shared.closeAllModals() case .updateNavigationItems: if let navController = navigationController as? BaseNavigationController { navController.update() } case .walletLabel(let accountLabel): sourceAccountValueLabel.text = accountLabel case .maxAvailable(let max): maxAvailableTrigger = ActionableTrigger( text: LocalizationConstants.SendAsset.useTotalSpendableBalance, CTA: max?.toDisplayString(includeSymbol: true) ?? "..." ) { [weak self] in guard let max = max else { return } self?.delegate?.onPaxEntry(max) } case .fiatCurrencyLabel(let fiatCurrency): fiatTitleLabel.text = fiatCurrency case .exchangeAddressButtonVisibility(let isVisible): exchangeAddressButton.isHidden = !isVisible case .useExchangeAddress(let address): destinationAddressTextField.text = address if address == nil { exchangeAddressButton.setImage(UIImage(named: "exchange-icon-small"), for: .normal) destinationAddressTextField.isHidden = false destinationAddressIndicatorLabel.text = nil } else { exchangeAddressButton.setImage(UIImage(named: "cancel_icon"), for: .normal) destinationAddressTextField.isHidden = true destinationAddressIndicatorLabel.text = String( format: LocalizationConstants.Exchange.Send.destination, CryptoCurrency.pax.displayCode ) } case .showAlertForEnabling2FA: alertViewPresenter.standardNotify( title: LocalizationConstants.Errors.error, message: LocalizationConstants.Exchange.twoFactorNotEnabled ) } } // MARK: Private Helpers private func useMaxAttributes() -> [NSAttributedString.Key: Any] { let fontName = Constants.FontNames.montserratRegular let font = UIFont(name: fontName, size: 13.0) ?? UIFont.systemFont(ofSize: 13.0) return [ .font: font, .foregroundColor: UIColor.darkGray ] } private func useMaxActionAttributes() -> [NSAttributedString.Key: Any] { let fontName = Constants.FontNames.montserratRegular let font = UIFont(name: fontName, size: 13.0) ?? UIFont.systemFont(ofSize: 13.0) return [ .font: font, .foregroundColor: UIColor.brandSecondary ] } fileprivate func handle(error: SendMoniesInternalError) { fields.forEach({ $0.resignFirstResponder() }) var alert = AlertModel( headline: error.title, body: error.description, image: #imageLiteral(resourceName: "eth_bad"), style: .sheet ) if error == .insufficientFeeCoverage { guard let url = URL(string: Constants.Url.ethGasExplanationForPax) else { return } let action = AlertAction(style: .confirm(LocalizationConstants.learnMore), metadata: .url(url)) alert.actions = [action] } let alertView = AlertView.make(with: alert) { [weak self] action in guard let self = self else { return } guard let metadata = action.metadata else { return } switch metadata { case .url(let url): let viewController = SFSafariViewController(url: url) viewController.modalPresentationStyle = .overFullScreen self.present(viewController, animated: true, completion: nil) case .block, .pop, .payload, .dismiss: break } } alertView.show() } // MARK: Actions @IBAction private func sendNowTapped(_ sender: UIButton) { delegate?.onSendProposed() } @IBAction private func exchangeAddressButtonPressed() { delegate?.onExchangeAddressButtonTapped() } } extension SendPaxViewController: UITextFieldDelegate { func textFieldDidEndEditing(_ textField: UITextField) { guard let text = textField.text, !text.isEmpty else { return } if textField == cryptoAmountTextField { let value = CryptoValue.paxFromMajor(string: text) delegate?.onPaxEntry(value) } if textField == fiatAmountTextField { let currencyCode = BlockchainSettings.App.shared.fiatCurrencyCode let value = FiatValue.create(amountString: text, currencyCode: currencyCode) delegate?.onFiatEntry(value) } } func textFieldShouldClear(_ textField: UITextField) -> Bool { if textField == destinationAddressTextField { delegate?.onAddressEntry("") } return true } func textField(_ textField: UITextField, shouldChangeCharactersIn range: NSRange, replacementString string: String) -> Bool { guard let text = textField.text else { return true } let replacementInput = (text as NSString).replacingCharacters(in: range, with: string) if textField == destinationAddressTextField { delegate?.onAddressEntry(replacementInput) } if textField == cryptoAmountTextField { let value = CryptoValue.paxFromMajor(string: replacementInput) delegate?.onPaxEntry(value) } if textField == fiatAmountTextField { let currencyCode = BlockchainSettings.App.shared.fiatCurrencyCode let value = FiatValue.create(amountString: replacementInput, currencyCode: currencyCode) delegate?.onFiatEntry(value) } return true } } extension SendPaxViewController: NavigatableView { func navControllerRightBarButtonTapped(_ navController: UINavigationController) { if let type = delegate?.rightNavigationCTAType, type == .error { delegate?.onErrorBarButtonItemTapped() } else if let type = delegate?.rightNavigationCTAType, type == .qrCode { delegate?.onQRBarButtonItemTapped() } else if let parent = parent as? AssetSelectorContainerViewController { parent.navControllerRightBarButtonTapped(navController) } } func navControllerLeftBarButtonTapped(_ navController: UINavigationController) { if let parent = parent as? AssetSelectorContainerViewController { parent.navControllerLeftBarButtonTapped(navController) } } var rightNavControllerCTAType: NavigationCTAType { delegate?.rightNavigationCTAType ?? .qrCode } var rightCTATintColor: UIColor { guard let delegate = delegate else { return .white } if delegate.rightNavigationCTAType == .qrCode || delegate.rightNavigationCTAType == .activityIndicator { return .white } return .pending } } extension SendPaxViewController: SendPAXInterface { func apply(updates: Set<SendMoniesPresentationUpdate>) { updates.forEach({ self.apply($0) }) } func display(confirmation: BCConfirmPaymentViewModel) { let confirmView = BCConfirmPaymentView( frame: view.frame, viewModel: confirmation, sendButtonFrame: sendNowButton.frame )! confirmView.confirmDelegate = self ModalPresenter.shared.showModal( withContent: confirmView, closeType: ModalCloseTypeBack, showHeader: true, headerText: LocalizationConstants.SendAsset.confirmPayment ) } func displayQRCodeScanner() { scanQrCodeForDestinationAddress() } } extension SendPaxViewController: ConfirmPaymentViewDelegate { func confirmButtonDidTap(_ note: String?) { delegate?.onConfirmSendTapped() } func feeInformationButtonClicked() { // TODO } } extension SendPaxViewController { func hideKeyboardWhenTappedAround() { let tap: UITapGestureRecognizer = UITapGestureRecognizer(target: self, action: #selector(SendPaxViewController.dismissKeyboard)) tap.cancelsTouchesInView = false view.addGestureRecognizer(tap) } @objc func dismissKeyboard() { view.endEditing(true) } } // TODO: Clean this up, move to Coordinator extension SendPaxViewController { @objc func scanQrCodeForDestinationAddress() { guard let scanner = QRCodeScanner() else { return } let parser = AddressQRCodeParser(assetType: .pax) let textViewModel = AddressQRCodeTextViewModel() qrScannerViewModel = QRCodeScannerViewModel( parser: parser, additionalParsingOptions: .lax(routes: [.exchangeLinking]), textViewModel: textViewModel, scanner: scanner, completed: { [weak self] result in self?.handleAddressScan(result: result) } ) let viewController = QRCodeScannerViewControllerBuilder(viewModel: qrScannerViewModel)? .with(presentationType: .modal(dismissWithAnimation: false)) .build() guard let qrCodeScannerViewController = viewController else { return } DispatchQueue.main.async { guard let controller = AppCoordinator.shared.tabControllerManager.tabViewController else { return } controller.present(qrCodeScannerViewController, animated: true, completion: nil) } } private func handleAddressScan(result: Result<AddressQRCodeParser.Address, AddressQRCodeParser.AddressQRCodeParserError>) { if case .success(let assetURL) = result { let address = assetURL.payload.address delegate?.onAddressEntry(address) destinationAddressTextField.text = address guard let amount = assetURL.payload.amount, let value = CryptoValue.paxFromMajor(string: amount) else { return } delegate?.onPaxEntry(value) cryptoAmountTextField.insertText(amount) } } } extension SendPaxViewController: ActionableLabelDelegate { func targetRange(_ label: ActionableLabel) -> NSRange? { maxAvailableTrigger?.actionRange() } func actionRequestingExecution(label: ActionableLabel) { guard let trigger = maxAvailableTrigger else { return } analyticsRecorder.record(event: AnalyticsEvents.Send.sendFormUseBalanceClick(asset: .pax)) trigger.execute() } }
{ "pile_set_name": "Github" }
Stringing together a picture of superconductors Share Comment For decades, physicists have been trying to reconcile the two major theories that describe physical behavior. The first, Einstein’s theory of general relativity, uses gravity — forces of attraction — to explain the behavior of objects with large masses, such as falling trees or orbiting planets. However, at the atomic and subatomic level, particles with negligible masses are better described using another theory: quantum mechanics. A “theory of everything” that marries general relativity and quantum mechanics would encompass all physical interactions, no matter the size of the object. One of the most popular candidates for a unified theory is string theory, first developed in the late 1960s and early 1970s. String theory holds that electrons and quarks (the building blocks of larger particles) are one-dimensional oscillating strings, not the dimensionless objects they are traditionally thought to be. Physicists are divided on whether string theory is a viable theory of everything, but many agree that it offers a new way to look at physical phenomena that have otherwise proven difficult to describe. In the past decade, physicists have used string theory to build a connection between quantum and gravitational mechanics, known as gauge/gravity duality. MIT physicists, led by Hong Liu and John McGreevy, have now used that connection to describe a specific physical phenomenon — the behavior of a type of high-temperature superconductor, or a material that conducts electricity with no resistance. The research, published in the Aug. 5 online edition of Science, is one of the first to show that gauge/gravity duality can shed light on a material’s puzzling physical behavior. So far, the team has described a few aspects of behavior of a type of superconducting materials called cuprates. However, the researchers hope their work could lead to more general theories to describe other materials, and eventually predict their behavior. “That’s the ultimate theoretical goal, and we haven’t really achieved that,” says Liu. MIT graduate student Nabil Iqbal and recent PhD recipients Thomas Faulkner and David Vegh are also authors of the paper. At the atomic level, cuprates are classified as a “many-body system” — essentially a vast collection of electrons that interact with each other. Such systems are usually described using quantum mechanics. However, so far, physicists have found it difficult to describe cuprates, because their behavior is so different from other materials. Understanding that behavior could help physicists find new materials that superconduct at even higher temperatures. These new materials would have potentially limitless applications. Unlike most materials, cuprates do not obey Fermi’s laws, a set of quantum-mechanics principles that govern microscopic behavior at very low temperatures (close to absolute zero, or -273 degrees Celsius). Instead, cuprates become superconductors. Just above the temperature at which they begin to superconduct, they enter a state called the “strange metal” state. In this study, the researchers focused on two properties that distinguish those cuprate strange metals from Fermi liquids. In ordinary Fermi liquids, electrical resistivity and the rates of electron scattering (deflection from their original course caused by interactions with each other) are both proportional to the temperature squared. However, in cuprates (and other superconducting non-Fermi liquids), electron scattering and resistivity are proportional to the temperature. “There’s really no theory of how to explain that,” says Liu. Drawing a parallel Using gauge/gravity duality — the connection between quantum and gravitational mechanics — the MIT team identified a system that has the same unusual properties as strange metals, but could be explained by gravitational mechanics. In this case, the model they used was a gravitational system with a black hole. “It’s a mathematical abstraction which we hope may shed light on the physics of the real system,” says Liu. In their model, they can study behavior at high and low energy (determined by how the excitation energy of a single electron compares to the average energy of an electron in the system), and it turns out that at low energy, the black-hole model exhibits many of the same unusual traits seen in non-Fermi liquids such as cuprates. For example, in both systems, when an electron at the lowest possible energy level is excited (by a photon or another particle), the resulting interaction between the electron and the hole left behind cannot be described as a quasiparticle (as it can in ordinary metals), because the electron excitation decays so quickly. (The electrons decay so quickly because their scattering rate is proportional to the temperature.) Furthermore, the electrical resistance of the black-hole system is directly proportional to temperature — just as it is in cuprates. Gauge/gravity duality offers a “map” that correlates certain features of the black-hole model to corresponding features of strange metals. Therefore, once the physicists calculated the features of the model, using general relativity, those values could be translated to the corresponding values in the strange-metal system. For example, the value of an electromagnetic field in the gravitational system could correspond to the density of electrons in the quantum system. Physicists have previously used gauge/gravity duality to describe some characteristics of quark gluon plasma, the “hot soup” of elementary particles that existed in the first millionths of a second after the Big Bang. However, this is the first time it has been used to give insight into a type of condensed matter (solids and liquids are condensed matter). For that reason, the paper should have a significant impact in theoretical physics, says Joseph Polchinski, a theoretical physicist at the University of California at Santa Barbara. “Whenever people have systems they can’t understand in other ways, this might be a tool to try to understand it,” he says. The MIT team believes the approach could shed light on a group of rare metal compounds known as heavy fermion metals, whose electrons behave as if their masses were 100 to 1,000 times greater than those in ordinary metals. They also display some of the same non-Fermi liquid behavior seen in the strange metal phase of cuprates.
{ "pile_set_name": "Pile-CC" }
Complete detail about VPS (virtual private server) hosting This type of web hosting is used to host websites on the Virtual Private Server. VPS hosting is divided into two types of hosting first is managed and second is unmanaged VPS hosting. Managed VPS is more expensive than another type of hosting since the web hosting company handles everything like system settings and installs the control panel so that the customer only needs to manage their web hosting account basis. If you are familiar with Linux and server-side, unmanaged VPS Server is still a good choice, because it is more affordable than a managed VPS hosting. Pros and cons of virtual private server: Pros of VPS hosting: Safer because in order to correct the server segment, the host installing a software layer that dedicates part of the server for you, this makes completely separate from other customers. On VPS hosting you get more resources to use on your website. On VPS hosting you have your own Root access to your server; you can make adjustments according to your needs and you have more control over your hosting environment. You can upgrade the resources of VPS hosting when your website grows. Cons of VPS hosting: The virtual private server is more expensive than shared hosting while fewer users share the same server, you should pay more. Configure the server requires more technical experience. Compared to dedicated hosting, VPS hosting is less demanding for users but still requires some technical experience to control your server. On the VPS server, you do not have full control over your server. Compared to, VPS hosting, dedicated hosting users do not have full control. Your resources are not allocated appropriately. This is because the webs host you probably having more selling space. It may cause a server problem that will affect all the other sites on that server. Top 4 Features of virtual private server hosting: 1. on the basis Security VPS is like having an insulated container with its own resources (including disk space) that is independent of the others. You not only share resources on larger servers running your site, mixing with other websites in the same room. The best half concerning security and managed VPS hosting is that you just really do the required security configuration for you. This enables you time to figure on your business, while not being slowed down by technical issues. 2. on the basis Cost and Time All the advantages represented above yield alternative advantages of managed VPS and this is often the time savings in business terms this interprets into price savings. The value of getting a managed VPS could also be quite the cost of having a shared hosting set up, however, if you’re taking into consideration the general profit managed VPS then the savings are a lot of higher. The fact that servers run by your provider, take care of the problem virtually the benefits are priceless, especially if you are not sure how to do these things on your own. Having a technology expert at the other end of the line when you need it, it can sometimes be a savior, and when you do not have to worry about it, and you can concentrate on your business. 3. on the basis performance of VPS hosting Statistics show that users visit a web site is additionally possible to go away if the web site doesn’t load in 6-7 seconds. additionally, it’s a well-known undeniable fact that the speed utilized by Google as a ranking issue that incorporates a quicker means that additional web site visits and primarily more customers. If you run an online store, blog or website company pay $ 50 for a managed VPS plans per month is not a high-cost performance advantage especially for VPS plans can offer you. 4. on the basis Customer Service Scalability is a factor that leads to customer service benefits. When you are part of a VPS hosting and if you are facing any type of problem-related to hosting than there is always someone to help you. If you have questions or concerns about your plan or service, there is always someone to email, chat with or just talking to on the phone. They generally will be able to help you immediately and take care of immediate problems, such as adding more resources or help you with the configuration server. For business owners service of your hosting provider is very important because you do not want to have under your business without knowing what to do. Conclusion The virtual private server (VPS) is a perfect solution for small enterprises and business owners. There is nothing like having peace of mind that your website is in good hands and that there are others who take care of technical hassles for you. Your task is to grow your business.
{ "pile_set_name": "Pile-CC" }
Q: Convert DOM childs to JSON var allmenus = $('.dragger-menu').map(function() { var li = {}; $(this).children('li').each(function() { switch ($(this).data("menu")) { case "page": li.page = { id: $(this).data("menu-id") }; break; case "external-link": li["external-link"] = { title: $(this).text().trim(), url: $(this).data("menu-link"), icon: $(this).children("i").attr("class") } break; case "dropdown": li.dropdown = {}; li.dropdown.title = $(this).contents().filter(function() { return this.nodeType == Node.TEXT_NODE; }).text().trim(); li.dropdown.data = $(this).children("ol").map(function() { var data = {}; $(this).children("li").each(function() { switch ($(this).data("menu")) { case "page": data.page = { id: $(this).data("menu-id") }; break; case "external-link": data["external-link"] = { title: $(this).text().trim(), url: $(this).data("menu-link"), icon: $(this).children("i").attr("class") } break; } }); return data; }).get(); break; } }); return li; }).get(); var obj = { menu: allmenus }; var jsondata = JSON.stringify(obj, null, 2); console.log(jsondata); <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <ol class="dragger-menu"> <li class="list-group-item" data-menu="page" data-menu-id="24">Online Register</li> <li class="list-group-item" data-menu="page" data-menu-id="26">Secondly Page</li> <li class="list-group-item" data-menu="dropdown"> <i class="fa fa-caret-square-o-down"></i> Dropdown Menu <ol class=""> <li class="list-group-item" data-menu="page" data-menu-id="25">Contact Us</li> <li class="list-group-item" data-menu="external-link" data-menu-link="https://twitter.com/your-page"><i class="fa fa-Twitter"></i> Twitter</li> <li class="list-group-item" data-menu="external-link" data-menu-link="https://facebook.com/your-page"><i class="fa fa-Facebook"></i> Facebook</li> </ol> </li> </ol> <ol class="dragger-menu"> <li class="list-group-item" data-menu="page" data-menu-id="28">Ahmet Deneme</li> <li class="list-group-item" data-menu="page" data-menu-id="21">Secondly Page</li> </ol> The above javascript code does not pass the same type element to json. Example: If you are run the code, you see only page 26, not 24. This code only get last elem in same elem. I want the all elements in json data. What should i do in javascript code ? Sorry for my bad englısh . Thanks for all. A: Don't build JSON by concatenating strings. Create an object and then use JSON.stringify. And use jQuery's .each() and .map() methods to loop through the DOM, rather than for loops. var allmenus = $('.dragger-menu').map(function() { var li = {}; $(this).children('li').each(function() { switch ($(this).data("menu")) { case "page": li.page = { id: $(this).data("menu-id") }; break; case "external-link": li["external-link"] = { title: $(this).text().trim(), url: $(this).data("menu-link"), icon: $(this).children("i").attr("class") } break; case "dropdown": li.dropdown = {}; li.dropdown.title = $(this).contents().filter(function() { return this.nodeType == Node.TEXT_NODE; }).text().trim(); li.dropdown.data = $(this).children("ol").map(function() { var data = {}; $(this).children("li").each(function() { switch ($(this).data("menu")) { case "page": data.page = { id: $(this).data("menu-id") }; break; case "external-link": data["external-link"] = { title: $(this).text().trim(), url: $(this).data("menu-link"), icon: $(this).children("i").attr("class") } break; } }); return data; }).get(); break; } }); return li; }).get(); var obj = { menu: allmenus }; var jsondata = JSON.stringify(obj, null, 2); console.log(jsondata); <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <ol class="dragger-menu"> <li class="list-group-item" data-menu="page" data-menu-id="24">Online Register</li> <li class="list-group-item" data-menu="external-link" data-menu-link="https://facebook.com/your-page"><i class="fa fa-facebook"></i> Facebook</li> <li class="list-group-item" data-menu="dropdown"> <i class="fa fa-caret-square-o-down"></i> Dropdown Menu <ol class=""> <li class="list-group-item" data-menu="page" data-menu-id="25">Contact Us</li> <li class="list-group-item" data-menu="external-link" data-menu-link="https://twitter.com/your-page"><i class="fa fa-Twitter"></i> Twitter</li> </ol> </li> </ol> <ol class="dragger-menu"> <li class="list-group-item" data-menu="page" data-menu-id="28">Ahmet Deneme</li> </ol> The code to get the title of the dropdown came from How to get the text node of an element?. It would be easier if you put that text inside a <span> so you can write a selector for it.
{ "pile_set_name": "StackExchange" }
Q: Categories with post from child categories on front page I am developing my first WordPress site and I am using the Customizr theme. I need to build a front page, that shows the latest posts from 2 categories - News and Events and all their child categories. So my category tree looks like this: Articles -News --First news child category --Second news child category -Events --First events child category --Second events child category and I want the front page to show the category News and the category Events with all the posts in their child categories packed in 2 containers with the headlines News and Events respectively. I am a total newbie in WordPress and I've searched for days for a solution, but I think I'm searching with the wrong keywords, because I didn't found what I need. I've created a child theme, and I'm currently trying to make an index.php with The Loop to achieve that. I've also tried making a static front page which uses a different template. So which is the right way to do that? Can you please at least give me some pointers? Thank you! A: Normally you'd use the pre_get_posts filter for this, but for your specific case, since you probably want to customize how the posts are displayed (separately), I'd recommend setting a static front page and using a shortcode in the content that uses get_posts (yet this also means that your theme's "Blog" template won't be used.) eg. add_shortcode('custom_news_and_events','my_custom_news_and_events'); function my_custom_news_and_events() { $news = get_posts(array('category'=>'1','posts_per_page'=>'7')); $childnews1 = get_posts(array('category'=>'2','posts_per_page'=>'3')); $childnews2 = get_posts(array('category'=>'3','posts_per_page'=>'3')); $events = get_posts(array('category'=>'4','posts_per_page'=>'7')); $childevents1 = get_posts(array('category'=>'5','posts_per_page'=>'3')); $childevents2 = get_posts(array('category'=>'6','posts_per_page'=>'3')); $output = '<div id="frontpagenews">'; $output .= '<h3>News</h3>'; if (count($childnews1) > 0)) {foreach $news as $post) { $output .= custom_post_display($post); } } $output .= '<h4>Child News 1</h4>'; if (count($childnews1) > 0)) {foreach $childnews1 as $post) { $output .= custom_post_display($post); } } $output .= '<h4>Child News 2</h4>'; if (count($childnews2) > 0)) {foreach $childnews2 as $post) { $output .= custom_post_display($post); } } $output .= '</div>'; $output = '<div id="frontpageevents">'; $output .= '<h3>Events</h3>'; if (count($events) > 0)) {foreach $events as $post) { $output .= custom_post_display($post); } } $output .= '<h4>Child Events 1</h4>'; if (count($childevents1) > 0)) {foreach $childevents1 as $post) { $output .= custom_post_display($post); } } $output .= '<h4>Child Events 2</h4>'; if (count($childevents2) > 0)) {foreach $childevents2 as $post) { $output .= custom_post_display($post); } } $output .= '</div>'; return $output; } (setting the correct category IDs for each get_posts of course.) the posts_per_page settings gives you more fine-grained control over how many posts from each category you get, but of course you can pass more arguments to get_posts (see the codex page) ...this is an example function called in each display loop: function custom_post_display($post) { $display = '<div class="postitem">'; $display .= '<h5><a href=".get_permalink($post->ID).">'; $display .= $post->post_title.'</a></h5>'; $display .= '<p>'.$post->post_excerpt.'</p>'; $display .= '</div>'; return $display; } ...or displaying anything else you want from the WP_Post object... and now that is all there use the shortcode [custom_news_and_events] on the static page. you can then style the #frontpagenews and #frontpageevents divs and .postitem class etc if you don't need the child category subheadings you can remove them and replace the get_post calls to simply: $news = get_posts(array('category'=>'1,2,3','posts_per_page'=>'10')); $events = get_posts(array('category'=>'4,5,6','posts_per_page'=>'10')); which will then get the latest 10 posts from the main and subcategories (as the default for the orderby argument is date.)
{ "pile_set_name": "StackExchange" }
Akuapem dialect Akuapem, also known as Akuapim, Akwapem Twi, and Akwapi, is one of the three principal members of the Akan dialect continuum, along with Asante, with which it is collectively known as Twi, and Fante, with which it is mutually intelligible. There are 626,000 speakers of Akuapem, mainly concentrated in Ghana and southeastern Cote D'Ivoire. It is the historical literary and prestige dialect of Akan, having been chosen as the basis of the Akan translation of the Bible. Etymology The name Akuapem is thought to derive from either Akan nkoa apem ("thousand subjects") or akuw-apem ("thousand companies"). History Akuapem's orthography was first developed by missionaries at the Gold Coast Basel Mission in 1842, but its written history begins in 1853 with the publication of two grammars, the German Elemente des Akwapim Dialects der Odshi Sprache and the English Grammatical Outline and Vocabulary of the Oji Language with especial reference to the Akwapim Dialect, both written by Hans Nicolai Riis, nephew of the Gold Coast Basel Mission's founder Andreas Riis. These would not be followed in the bibliography of Akuapem writing until the translation of the New Testament. Akuapem was chosen as a representative dialect for Akan because the missionaries at Basel felt it a suitable compromise. Christaller, who had himself learned Akyem but believed Akuapem was the better choice, described the issue, and its solution, in the introduction to his 1875 Grammar of the Asante and Fante language called Tshi:It [Akuapem] is an Akan dialect influenced by Fante, steering in the middle course between other Akan dialects and Fante in sounds, forms and expressions; it admits peculiarities of both branches as far as they do no contradict each other, and is, therefore, best capable of being enriched from both sides. Bible Akuapem's history as a literary dialect originates with its selection to serve as the basis of the Akan translation of the New Testament, published in 1870 with a second edition in 1878, and the entire Bible, published in 1871. Both were written by the Gold Coast Basel Mission, principally by German missionary and linguist Johann Gottlieb Christaller and native Akan linguists and missionaries David Asante, Theophilus Opoku, Jonathan Palmer Bekoe, and Paul Keteku. Despite the publication of the Bible, Akan literacy would not be widespread among the Akan for some time, nor even among the European colonizers. For instance, when British officer Sir Garnet Wolseley, who was and still is known in Ghana as "Sargrenti" (a corruption of "Sir Garnet"), began his campaign into Ghana during the Third Anglo-Ashanti War in 1873, he intended to address his summons to war to Asante king Kofi Karikari in English and Asante, only to find that, to their knowledge, "no proper written representation of the Fante or Asante dialect existed", delaying the dispatch of the summons for almost two weeks; all this even though an Akuapem New Testament had existed for three years and the entire Bible for two. Grammar and dictionary Christaller's A Grammar of the Asante and Fante language called Tshi (1875) and A Dictionary of the Asante and Fante language called Tshi (1881), written with reference to Akuapem, remain the definitive academic grammar and dictionary of Twi, despite the dialects' orthography, vocabulary, and grammar having changed in the century since their publication. Phonology References Category:Kwa languages Category:Languages of Ghana Category:Akan
{ "pile_set_name": "Wikipedia (en)" }
woensdag 28 september 2011 30 days lolita challenge! (finaly!!) After some months of thinking and doubting about this challenge I decided to join this challenge. I know I'm late, still I hope that my lovely followers will read this posts. It's also a sort of challenge for me, because I have troubles with finishing things. I want to finish this challenge! ^_^ This is the challenge: Day 1 – 10 things about your lolita bubble. Day 2 – 10 things you love in lolita. Day 3 – 10 things you hate in lolita. Day 4 – 10 different kinds of food you like. Day 5 – 10 items from your wishlist. Day 6 – 10 things you can’t live without in lolita. Day 7 – 10 people who inspire your lolita style. Day 8 – 10 songs that inspire you for lolita. Day 9 – 10 things you will never do in lolita. Day 10 – What’s in your bag? Day 11 – One day in your lolita life in pictures. Day 12 – A picture of yourself before lolita came in to your life. Day 13 – A picture of your favorite sweets. Day 14 – A picture of your dream item. Day 15 – A picture of your last lolita purchase. Day 16 – Your outfit for the day. Day 17 – What do you want more then anything right now? Day 18 – A picture of your favorite lolita style. Day 19 – What’s in your make-up bag? Day 20 – A picture of a lolita friend. Day 21 – Your favorite fictional lolita. Day 22 – A picture of your room. Day 23 – A picture of your handwriting. Day 24 – A picture of you from a meet. Day 25 – Your favorite lolita themed artwork. Day 26 – Your Facebook profile picture. Day 27 – One song that fits your favorite lolita style. Day 28 – A picture of the perfect lolita location. Day 29 – A picture of a lolita you would love to meet for real. Day 30 – A photo of yourself taken today and 3 good things that’s happened over the last 30 days. Day 1 – 10 things about your lolita bubble: 1. It's quite special that I wear lolita clothes now. When I was younger I hated girly clothes and I hated gothic clothes, I was pretty sacred of goths! After my goth/emo 'era' I started to wear lolita, isn't that weird? I mean at this time I have worn all kinds of clothes I hated when I was a kid. 2. My favourite brands are Angelic Pretty and Moi-même-Moitié 3. I love to wear lolita still I don't wear it very often. I would like to wear lolita more often but I can't. I need to look a little bit 'professional' for my study. I wear once a week lolita clothes, I'm always very happy to wear my favourite clothes! 4. I admire Mana-Sama, he is my lolita idol. It's more like a love/hate thingy, I always talk about how much I hate him because I spend all my money on pretty Moitié clothes but secretly I admire him. It's so unfair, he is more than 20 (??) years older than me, wears dresses (it's man for those who don't know that ) and still looks better than me >.< 9. I'm a sort of lifestyle lolita even though I don't wear it every day. I love to design my own clothes, I make my own clothes, I collect stuffed animals, I love to bake especially cupcakes, I 'collect' Ball Jointed Dolls, I read every day lolita blogs and I'm always searching for new lolita clothes. 3 opmerkingen: Nice to read about your 'bubble'. ^^I feel the same about nr.4. How does he manage to look so good, at his age? And he always manages to make me broke when releasing a new item..Or indirectly on egl_sales buying Moitié.. Follow this blog with bloglovin Followers About me Hello, my name is Violet. Nice to meet you! I'm a girl who lives in an angelic cute world with a touch of darkness. This place is called Angelic Nostalgia,I collect my good memories here. I'm a Gothic Lolita and in Summer I wear Sweet Lolita from time to time. I love traveling, art, books, ball jointed dolls, cats, food and cute things. Thank you for visiting my blog! Do you want to know more about me? Please ask me. ^__^
{ "pile_set_name": "Pile-CC" }
Politicians in northwestern Pakistan have denounced the women’s marches that took place around the country earlier this month as “anti-Islamic,” after people took to the streets to celebrate International Women’s Day. The marches, which took place on International Women’s Day on March 8th, involved Pakistani women marching through the streets while carrying posters demanding more right’s for women and attacking Pakistan’s male-dominated society. However, Lawmakers in the provincial parliament of Khyber Pukhtunkhwa unanimously adopted a resolution on Wednesday denouncing the marches as a “shameless and un-Islamic act.” According to Dawn, the resolution “stated that although the provincial assembly supports the rights granted to women and minorities by Islam, the “obscenity” witnessed on March 8th was not acceptable to it.” It also demanded that local authorities ask the federal government to “expose” such forces and “prepare a strategy to deal with such incidences in the future.” “Some hidden forces have sped up their efforts to destroy our family system and social customs, the practical demonstration of which took place on March 8, 2019, in various big cities on Women’s Day,” the resolution read. Those who signed the petition include lawmakers from Imran Khan’s ruling Tehreek-e-Insaf party and from opposition parties, including the left-wing Pakistan People’s Party now led by the son of former Prime Minister Benazir Bhutto. Pakistan remains one of the most repressive societies in the world for women, mainly as a result of strict adherence to Islamic Law. According to Human Rights Watch 2018 report, “violence against women and girls—including rape, murder through so-called honor killings, acid attacks, domestic violence, and forced marriage—remains routine.” Follow Ben Kew on Facebook, Twitter at @ben_kew, or email him at bkew@breitbart.com.
{ "pile_set_name": "OpenWebText2" }
Must-Reads from Around the World: April 18, 2012 Lawyers for a Libyan military commander, Abdel Hakim Belhadj, said they are taking legal action against Britain's former foreign secretary Jack Straw over claims he approved the Libyan's rendition to face imprisonment and torture. Clutching at Straw – With former British Foreign Secretary Jack Straw now being accused of complicity in the rendition and alleged torture of Libyan dissident Abdel Hakim Belhadj, The Weekinvestigates why MI6 agents have let blame fall upon the politician, suggesting that the “the spooks are plotting their revenge,” after the “corporate shame” of their diminished reputation under former British Prime Minister Tony Blair. Choppy Waters – China Daily has shot back at the governor of Tokyo’s announced aspiration for Japan to buy part of the disputed Senkaku Islands, which China calls the Diaoyu Islands. “Any unilateral action taken by the Japanese side… is illegal and invalid, and will not change the fact that these islands belong to China,” Chinese Foreign Ministry spokesman Liu Weimin reportedly said. Aiming High – India’s Hindu newspaper reveals details of Wednesday’s launch of the country’s longest range missile to date, the Agni-V, which can reportedly hit targets up to 5,000 kilometers away. “The success of the mission will enable India join a select band of nations with capability to design, develop and produce Inter-Continental Ballistic Missiles,” the newspaper says. Giant Killing – Australia-based Global Mailreports from Kenya on how demand for ivory in China is reversing decades of reduced elephant poaching in Africa — and how local NGOs are struggling to stop it. “Changing the attitude of China’s booming middle-class is a big task for an African-based anti-poaching movement, and until people stop buying, poaching will continue,” it writes. The End Of Spring – Al Jazeera argues that Tunisia, perceived to be an Arab Spring “success story,” is facing a “social crisis” with a growing gap between those benefiting and those losing out from the revolution, with the working classes experiencing “little improvement in their daily lives.” The piece warns against Western powers seeing Tunisia’s revolution as “mission accomplished.” Scripted Settlement – As Iran prepares to negotiate with the U.S. over its nuclear program, The Washington Postviews Tehran’s bargaining rhetoric as the mark of a “dignified process” of making concessions, in which the U.S. government can call its easing of sanctions on Iran as “reciprocity” rather than a “climb-down,” and Iran can label its moves as “confidence-building” measures.
{ "pile_set_name": "Pile-CC" }
1. Introduction {#sec1-molecules-17-05339} =============== 1,4-Dihydropyridines as analogues of nicotinamide adenine dinucleotide (NADH) coenzymes exhibit a wide range of biological activities, such as calcium channel blocking, and today they are widely used in pharmacology \[[@B1-molecules-17-05339]\]. Acridines which possess the 1,4-dihydropyridine parent nucleus have interesting pharmaceutical properties such as a positive iontropic effects promoting the entry of calcium to the intracellular space \[[@B2-molecules-17-05339]\], and 1,8-(2*H*,5*H*)-acridinediones are known as laser dyes \[[@B3-molecules-17-05339]\]. 1,8-(2*H*,5*H*)-Acridinediones were synthesized by the adoption of the Hantzsch procedure, *i.e.*, by the thermal reaction of 5,5-dimethyl-1,3-cyclohexanedione (dimedone) with an aldehyde and ammonia. Most of the methods reported previously usually require long reaction times, afford 1,4-dihydropyridines in relatively low yield, and suffer from utilizing harmful organic solvents in most cases \[[@B4-molecules-17-05339],[@B5-molecules-17-05339],[@B6-molecules-17-05339],[@B7-molecules-17-05339],[@B8-molecules-17-05339],[@B9-molecules-17-05339],[@B10-molecules-17-05339],[@B11-molecules-17-05339]\]. On the other hand, with the increasing environmental concerns, green chemistry has attracted intensive attention in recent years. Multicomponent one-pot reactions as a kind of economical and efficient procedure has been widely used for the synthesis of heteroatom-containing compounds \[[@B12-molecules-17-05339],[@B13-molecules-17-05339],[@B14-molecules-17-05339]\]. Moreover, organic reactions in water as the reaction medium, which represents a clean, economical, and environmental-safe protocol, has attracted considerable attention. We have already reported the one-pot synthesis of 10-unsubstituted 1,8-(2*H*,5*H*)-acridinediones by the thermal reaction of 5,5-dimethyl-1,3-cyclohexanedione (dimedone) with an aldehyde and ammonium acetate in pure water without any additives \[[@B15-molecules-17-05339]\]. In this paper, ammonium acetate has been replaced by aniline and 4-methylaniline for the synthesis of *N*-substituted 1,8-(2*H*,5*H*)-acridinediones by the Hantzsch reaction in refluxing water. 2. Results and Discussion {#sec2-molecules-17-05339} ========================= 1,8-(2*H*,5*H*)-Acridinediones were synthesized by the one-pot three-component Hantzsch condensation for a designated time of paraformaldehyde, dimedone and NH~4~HCO~3~, or NH~4~OAc, or aniline, or 4-methyl-aniline in refluxing water without any additives. The reaction times and yields are listed in [Table 1](#molecules-17-05339-t001){ref-type="table"}. From [Table 1](#molecules-17-05339-t001){ref-type="table"}, one can see that the reaction yields of ammonium compounds (entry 1 and 2) are higher than for aromatic amines (entry 3 and 4). This is probably due to the lower solubility of the aromatic amines in water and lower reactivity than that of the ammonium compounds. It should be mentioned that the amount of the amine in the reactions was different. When an aromatic amine was used (entry 3 and 4), the molar ratio of **1**, **2**, and **3** was 1:2:1; when an ammonium compound was used (entry 1 and 2), the molar ratio of **1**, **2**, and **3** was 1:2:4. The increasing of the dosage of ammonium compound is because of the easy resolvability. In order to obtain a higher yield, we tried to add a phase-transfer catalyst (PTC) to the reaction mixtures. Cetyltrimethylammonium bromide (CTAB) was previously applied by us to the aqueous Michael reaction of dimedone with chalcones \[[@B16-molecules-17-05339]\], and now in this Hantzsch condensation of aldehyde, dimedone and aniline, addition of 10% mol of CTAB produced *N*-substituted 1,8-(2*H*,5*H*)-acridinediones in much better yield. The reaction yields, as well as the melting points for the Hantzsch reactions with the molar ratio of aromatic aldehydes **1**, dimedone (**2**), and aniline or 4-methylaniline **3**, and CTAB as 1:2:1:0.1 in refluxing water are listed in [Table 2](#molecules-17-05339-t002){ref-type="table"}. Reaction times are all 90 min. In our protocol, no organic solvents were used during the reaction process. Furthermore, since the product is solid and precipitates out from the reaction mixtures, the work-up procedure involves simple filtration. The desired products of high purity were obtained by column chromatography or recrystallization. From [Table 2](#molecules-17-05339-t002){ref-type="table"}, one can see that all these reactions gave good to excellent yields, reflecting that dimedone has high solubility in water and high reactivity. The yields of *N*-substituted acridinediones for the aromatic aldehydes with an electron-withdrawing group are higher than those for aromatic aldehydes with electron-donating groups. We also tried 3,4-dimethoxybenzaldehyde, but the reaction yield is lower than 50%. We have attempted to extend the above methods to different 1,3-dicarbonyl compounds for the synthesis of unsymmetrically substituted 1,4-dihydropyridines such as polyhydroquinoline derivatives. Ethyl acetoacetate and 1,3-cyclohexanedione smoothly undergo a four-component reaction with aromatic aldehyde and ammonium acetate to produce polyhydroquinoline derivatives in refluxing water catalyzed by CTAB. Because of the lower activity for the synthesis of unsymmetrically substituted 1,4-dihydropyridines than the symmetrically substituted 1,4-dihydropyridines, ammonium acetate was used to replace the aromatic amines. The reaction yields, as well as the melting points for the Hantzsch reaction with the molar ratio of aromatic aldehydes **1**, dimedone (**2**), ethyl acetoacetate (**6**), ammonium acetate (**3**), and CTAB as 1:1:1:4:0.1 in refluxing water are listed in [Table 3](#molecules-17-05339-t003){ref-type="table"}. Reaction times are all 90 min. Among the acridinediones and polyhydroquinoline products **5c** and **5f** were unknown compounds and were characterized by their melting point, IR, ^1^H-NMR, ^13^C-NMR spectra and elemental analysis. Structures of known compounds were confirmed by comparison of their melting points and ^1^H-NMR spectra with the reported data. It should be mentioned that the melting point of **5d** was obviously higher than the reported in the literature \[[@B17-molecules-17-05339]\]. However, our measured IR, ^1^H-NMR, ^13^C-NMR spectral data and elemental analysis are consistent with the series of acridinediones products, exhibiting the same identities. The different mp might be ascribed to the presence of an impurity or solvent in product **5d** from the reported literature, because even a trace amount could have a great effect on the m.p. of a compound with high m.p. 3. Experimental {#sec3-molecules-17-05339} =============== 3.1. General {#sec3dot1-molecules-17-05339} ------------ ^1^H-NMR spectra were recorded on a Bruker Avance-400 (400 MHz) spectrometer (Bruker, Switzerland), and chemical shifts (δ) are reported in parts per million relative to tetramethylsilane and coupling constants (*J*) in Hz. Splitting patterns are designated as s, singlet; d, doublet; br, broad. ^13^C-NMR spectra were recorded on the same spectrometer (at 100 MHz) with complete proton decoupling, and chemical shifts are reported in parts per million relative to the solvent resonance used as the internal standard (CDCl~3~, δ 77.16 ppm; DMSO-d6, δ 39.52 ppm). IR spectra were taken on a Bruker Vector-22 spectrometer (Bruker, Switzerland) in KBr pellets and are reported in cm^−1^. Melting points were determined on an XT-4 apparatus (Beijing Tech Instrument Co., Beijing, China). Analytical TLC and column chromatography were performed on silica gel GF254 and silica gel H60, respectively. 3.2. Typical Procedure for the Synthesis of Acridinediones: 3,3,6,6-Tetramethyl-9,10-diphenyl-3,4,6,7,9,10-hexahydro-1,8-(2H,5H)-acridinedione *(**5a**)* {#sec3dot2-molecules-17-05339} --------------------------------------------------------------------------------------------------------------------------------------------------------- A mixture of **1a** (106.1 mg, 1 mmol), **2** (280.4 mg, 2 mmol), **3c** (93.1 mg, 1 mmol) and CTAB (36.4 mg, 0.1 mmol) in water (4 mL) was vigorously stirred under reflux. The reaction was completed after 90 min, as monitored by TLC. Due to the high yields of **5a**, the work-up procedure involved simple filtration and washing twice with water (10 mL). The obtained solid products were nearly pure. The desired product of high purity were further achieved by column chromatography with petroleum ether/ethyl acetate or recrystallization from 75% aqueous ethanol. *3*,*3*,*6*,*6-Tetramethyl-9-(4-cyanophenyl)-10-phenyl-3*,*4*,*6*,*7*,*9*,*10-hexahydro-1*,*8-(2H*,*5H)-acridinedione* (**5c**). IR (KBr): υ 2956 (s), 2872 (m), 2223 (m), 1643 (s), 1576 (s), 1492 (m), 1362 (s), 1297 (w), 1262 (m), 1174 (w), 1144 (m), 1122 (w), 1000 (m), 851 (s), 704 (s), 569 (s) cm^−1^; ^1^H-NMR (CDCl~3~): δ 0.79 (s, 6H, CH~3~), 0.95 (s, 6H, CH~3~), 1.85 (d, *J* = 17.5 Hz, 2H, CH~2~), 2.11 (d, *J* = 17.5 Hz, 2H, CH~2~), 2.12 (d, *J* = 16.2 Hz, 2H, CH~2~), 2.21 (d, *J* = 16.2 Hz, 2H, CH~2~), 5.31 (s, 1H, CH), 7.25 (d, *J* = 8.0 Hz, 2H, ArH), 7.54 (d, *J* = 8.6 Hz, 2H, ArH), 7.58 (d, *J* = 8.0 Hz, 2H, ArH), 7.59 (m, 3H, ArH); ^13^C-NMR (CDCl~3~): δ 195.8, 151.6, 150.6, 138.6, 131.9, 129.7, 128.8, 119.3, 113.4, 109.5, 50.1, 41.8, 33.7, 32.4, 29.6, 26.7; Anal. Calcd. for C~30~H~30~N~2~O~2~: C, 79.97; H, 6.71; N, 6.22; Found: C, 79.97; H, 6.80; N, 6.17. *3*,*3*,*6*,*6-Tetramethyl-9-(4-nitrophenyl)-10-phenyl-3*,*4*,*6*,*7*,*9*,*10-hexahydro-1*,*8-(2H*,*5H)-acridinedione* (**5d**). IR (KBr): υ 2956 (m), 1635 (s), 1594 (w), 1514 (m), 1349 (s), 1224 (m), 1176 (w), 1144 (w), 1113 (w), 1003 (m), 864 (w), 830 (w), 703 (m), 572 (w), 513 (w) cm^−1^; ^1^H-NMR (CDCl~3~): δ 0.72 (s, 6H, CH~3~), 0.88 (s, 6H, CH~3~), 1.77 (d, *J* = 17.5 Hz, 2H, CH~2~), 2.03 (d, *J* = 17.5 Hz, 2H, CH~2~), 2.04 (d, *J* = 16.3 Hz, 2H, CH~2~), 2.14 (d, *J* = 16.3 Hz, 2H, CH~2~), 5.28 (s, 1H, CH), 7.18 (d, *J* = 8.2 Hz, 2H, ArH), 7.53 (d, *J* = 8.2 Hz, 2H, ArH), 7.54 (s, 1H, ArH), 7.55 (d, *J* = 8.8 Hz, 2H, ArH), 8.05 (d, *J* = 8.8 Hz, 2H, ArH); ^13^C-NMR (CDCl~3~): δ 195.6, 153.6, 150.4, 146.2, 138.7, 129.7, 128.8, 123.5, 113.6, 50.1, 41.9, 33.6, 32.4, 29.6, 26.7; Anal. Calcd. for C~29~H~30~N~2~O~4~: C, 74.02; H, 6.43; N, 5.95; Found: C, 73.63; H, 6.43; N, 5.91. *3*,*3*,*6*,*6-Tetramethyl-9-(3*,*4-dichlorophenyl)-10-phenyl-3*,*4*,*6*,*7*,*9*,*10-hexahydro-1*,*8-(2H,5H)-acridine-dione* (**5f**). IR (KBr): υ 2962 (m), 2948 (m), 1650 (s), 1638 (s), 1573 (m), 1471 (m), 1360 (s), 1224 (s), 1143 (m), 1027 (w), 1002 (w), 878 (m), 704 (s), 574 (m) cm^−1^; ^1^H-NMR (CDCl~3~): δ 0.80 (s, 6H, CH~3~), 0.93 (s, 6H, CH~3~), 1.83 (d, *J* = 17.6 Hz, 2H, CH~2~), 2.08 (d, *J* = 17.6 Hz, 2H, CH~2~), 2.17 (m, 4H, CH~2~), 5.21 (s, 1H, CH), 7.22 (m, 2H, ArH), 7.28 (m, 2H, ArH), 7.50 (s 1H, ArH), 7.56 (m, 3H, ArH); ^13^C-NMR (CDCl~3~): δ 195.7, 150.3, 146.6, 138.7, 131.9, 130.0, 129.9, 129.6, 127.6, 113.8, 50.1, 41.8, 32.4, 29.7, 26.8; Anal. Calcd. for C~29~H~29~Cl~2~NO~2~: C, 70.44; H, 5.91; N, 2.83; Found: C, 70.40; H, 6.01; N, 2.78. 4. Conclusions {#sec4-molecules-17-05339} ============== In summary, acridinediones and polyhydroquinoline derivatives were synthesized by the one-pot Hantzsch condensation of an aromatic aldehyde, 5,5-dimethyl-1,3-cyclohexanedione, ethyl acetoacetate and amine. It represents a straightforward protocol for the eco-friendly and efficient synthesis of a series of 1,4-dihydropyridines with potential biological activities. We are grateful for financial support from the Natural Science Foundation of Anhui Province Education Department (KJ2010B049) and Anhui Provincial Natural Science Foundation (1208085QB24). *Sample Availability*: Samples of the compounds **5a**--**n**, **7a**--**d** are available from the authors. Supplementary materials can be accessed at: <http://www.mdpi.com/1420-3049/17/5/5339/s1>. ###### Click here for additional data file. molecules-17-05339-t001_Table 1 ###### Reaction time and yield for the reaction of different amines/ammonium salts. ![](molecules-17-05339-i001) Entry Amine Reaction time/min Product R Yield / % ^a^ ------- ------------------------ ------------------- --------- ------------------ --------------- 1 NH~4~OAc 40 min **4a** H 86 2 NH~4~HCO~3~ 40 min **4b** H 83 3 C~6~H~5~-NH~2~ 90 min **4c** C~6~H~5~ 71 4 4-CH~3~-C~6~H~5~-NH~2~ 90 min **4d** 4-CH~3~-C~6~H~4~ 69 ^a^ Isolated yield of the pure product recrystallized from 75% aqueous ethanol. molecules-17-05339-t002_Table 2 ###### Yields and melting points for the one-pot synthesis of *N*-substituted acridinediones. ![](molecules-17-05339-i002) Entry R R' Product Yield / % ^a^ m.p. (lit.) / °C ------- --------------------- ------------------ --------- --------------- --------------------------------------------------- 1 C~6~H~5~ C~6~H~5~ **5a** 80 220--222 (200--205) \[[@B17-molecules-17-05339]\] 2 4-Cl-C~6~H~4~ C~6~H~5~ **5b** 86 243--245 (233--235) \[[@B18-molecules-17-05339]\] 3 4-CN-C~6~H~4~ C~6~H~5~ **5c** 88 265--267 4 4-NO~2~-C~6~H~4~ C~6~H~5~ **5d** 85 281--282 (216--218) \[[@B17-molecules-17-05339]\] 5 3- NO~2~-C~6~H~4~ C~6~H~5~ **5e** 84 272--274 (276--278) \[[@B19-molecules-17-05339]\] 6 3,4- Cl~2~-C~6~H~3~ C~6~H~5~ **5f** 90 274--275 7 4-CH~3~O-C~6~H~4~ C~6~H~5~ **5g** 70 291--293 (290--291) \[[@B20-molecules-17-05339]\] 8 C~6~H~5~ 4-CH~3~-C~6~H~4~ **5h** 81 261--263 (264--266) \[[@B21-molecules-17-05339]\] 9 4-Cl-C~6~H~4~ 4-CH~3~-C~6~H~4~ **5i** 85 270--272 (271--272) \[[@B21-molecules-17-05339]\] 10 4-CN-C~6~H~4~ 4-CH~3~-C~6~H~4~ **5j** 88 268--270 (273--275) \[[@B21-molecules-17-05339]\] 11 4-NO~2~-C~6~H~4~ 4-CH~3~-C~6~H~4~ **5k** 83 \>300 (\>300) \[[@B22-molecules-17-05339]\] 12 3-NO~2~-C~6~H~4~ 4-CH~3~-C~6~H~4~ **5l** 85 281--283 (283--284) \[[@B23-molecules-17-05339]\] 13 3,4-Cl~2~-C~6~H~3~ 4-CH~3~-C~6~H~4~ **5m** 88 253--255 (250--252) \[[@B23-molecules-17-05339]\] 14 4-CH~3~O-C~6~H~4~ 4-CH~3~-C~6~H~4~ **5n** 72 280--282 (281--283) \[[@B23-molecules-17-05339]\] ^a^ Isolated yield of the pure product recrystallized from 75% aqueous ethanol. molecules-17-05339-t003_Table 3 ###### Yields and melting points for the one-pot synthesis of polyhydroquinoline derivatives. ![](molecules-17-05339-i003) Entry R Product Yield / % ^a^ m.p. (lit.) / °C ------- ------------------- --------- --------------- --------------------------------------------------- 1 C~6~H~5~ **7a** 85 224--226 (228--229) \[[@B24-molecules-17-05339]\] 2 4-CH~3~O-C~6~H~4~ **7b** 81 257--259 (260--262) \[[@B24-molecules-17-05339]\] 3 4-Cl-C~6~H~4~ **7c** 90 244--266 (245--246) \[[@B24-molecules-17-05339]\] 4 4-NO~2~-C~6~H~4~ **7d** 88 242--244 (241--242) \[[@B24-molecules-17-05339]\] ^a^ Isolated yield of the pure product recrystallized from 75% aqueous ethanol.
{ "pile_set_name": "PubMed Central" }
1. Field of the Invention The present invention relates to art for a printer connectable to a network and to a controller therefor. More particularly, the present invention relates to art for a multitask program that is executed by this controller. 2. Description of the Related Art Pursuant to the advancement in network technology in recent years, printers have come to be connected to a network via a network interface and shared by a plurality of host computers. This network interface is equipped with a dedicated processor and a buffer, and communicates with the host computers by a specific protocol, thereby receiving printing job data and storing them in the buffer. The controller connected to the printer unit is also equipped with a processor, and prints by receiving image data stored in the network interface buffer whenever necessary, while generating image data and issuing control commands to a print engine. Specifically, with the above-mentioned conventional network printer, the network interface and the controller each have a processor, and the network interface and the controller are connected by internal dedicated buses. Consequently, the processor of the controller performs its print control while making image data transmission requests to the network interface so that there is no undesired variance in the printing results, without any consideration given to controlling the communication with the host computers.
{ "pile_set_name": "USPTO Backgrounds" }
Managing moods It is very common for living with persistent pain to get you down. You may feel depressed, angry, frustrated and stressed. Although these emotions are understandable, they actually make pain signals in the body worse. These pages offer tools, tips and knowledge to help you manage your moods. Many people with pain have found coping better with moods can lead to less pain which improves their quality of life. Making mood changes is not easy and often takes practice – but, importantly, it usually works.
{ "pile_set_name": "Pile-CC" }
Idaea deversaria Idaea deversaria is a moth of the family Geometridae. It is found in most of Europe, east to central Asia and southern Siberia. The wingspan is 22–28 mm. The adults fly from June to July. The larvae feed on low growing plants and deciduous trees. Notes The flight season refers to Germany. This may vary in other parts of the range. External links Fauna Europaea Lepiforum.de Category:Sterrhini Category:Moths of Europe Category:Moths of Asia Category:Moths described in 1847 Category:Taxa named by Gottlieb August Wilhelm Herrich-Schäffer
{ "pile_set_name": "Wikipedia (en)" }
College student Ross Price had just put in a long study session, and he wasn't prepared for what he found moving by his parking space. At first, it looked like the parking block had shifted. Then he saw something far scarier: An 11-foot reticulated python had slithered under his roommate's Toyota Camry. "I'm used to seeing snakes, but nothing that big," said Price, 24, a student at Nova Southeastern University. "You just don't expect something like that wandering around your house." Price and his roommate, James Hand, called an exterminator on that Feb. 1 night, but the person who answered said it was too late to send someone. So they called police, and reported that a snake about six feet long had crawled under Hand's car. Officer Tony Bernardo, a 20-year-veteran who is the department's go-to guy for dealing with wildlife, responded along with two other officers. The snake put up a fight, twisting and moving deeper into the Camry's engine compartment as the officers attempted to slowly pull it out. It took them about 15 minutes to remove the clinging reptile. "Bigger than I initially thought it was," said Price, who along with Hand stood nearby watching the extraction. Hand, 25, also an NSU student, said it was lucky that Price saw the snake when he did. "I thought about it later," he said. "What if it had crawled up into my car and made its way inside as I was driving? ... I don't want to think about it." Davie police spokesman Sgt. Mark Leone said the snake probably was once a pet because it was found in a residential area. Once it was removed from the car, police took a video of Bernardo holding up the snake, which they say appeared calm. Later, it was turned over to Strictly Reptiles, a company licensed by the state to care for exotic animals. Leone said the snake is not the same as a Burmese python, the species that has invaded the Everglades and has been discovered closer to populated areas. Four Burmese pythons, including a 16-foot female, were found earlier this week huddled inside an old bunker at the defunct U.S. military base in the Florida Keys. Earlier this month, school children found a 10-foot Burmese python near the abandoned Homestead Golf Course. (c)2017 the Sun Sentinel (Fort Lauderdale, Fla.)
{ "pile_set_name": "OpenWebText2" }
Toei Animation chairman Kozo Morishita said at the MIPCOM trade event in Cannes, France that he is hoping that production on the CG film project Saint Seiya the Movie will be completed in July 2013. Morishita added that he is considering producing a new television anime series in the Saint Seiya franchise after the film opens. Regarding the possible new television anime series, Morishita said, "In the past we'd produced a TV series first and then a film, but we've found that delivering a movie before starting to develop a series is a great way to test the appetite of audience, and limit risks." Morishita said of the 3D film that "Compared with other Toei Animation films, this 'Saint Seiya' feature will have a top-level budget, and will be delivered in S3D and CGI 3D. In Japan, audiences are not yet fond of stereotropic films, but it's crucial to provide a 3D version for territories like China." Keiichi Satou (Tiger & Bunny, Ashura), is helming the CG film project. Tomohiro Suzuki, a scriptwriter for six episodes of Tiger & Bunny, is writing the screenplay. The film is listed as the new "Masami Kurumada Project," and Kurumada, the original creator of the Saint Seiya mythological fantasy manga, is credited for the original story. Toei Animation confirmed in February 2011 that production on a new computer-animated film of Saint Seiya had been green-lit. Source: Variety Image © Masami Kurumada/Shueisha, Toei Animation
{ "pile_set_name": "OpenWebText2" }
[Chronic thallium poisoning (author's transl)]. A rare case of criminal, chronic thallium poisoning is described. In spite of the general prohibition of the cosmetics, drugs and rodent exterminators containing thallium thallium intoxications are still observed occasionally. In the reported case typical symptoms as initial pain, dryness of the skin, constipation and insomnia were missing. The clinical picture was dominated by a polyneuropathy more pronounced in the lower extremities, a lesion of the optic nerve and the psychic symptoms of organic damage. A particular feature was the early loss of sensitivity of the anterior rami of the intercostal nerves.
{ "pile_set_name": "PubMed Abstracts" }
Q: Using fromarray from PIL to save an image vector of 4 channels and then re-reading it I have an image vector v with the (100, 100, 4) dimensions. To save this image vector, I used PIL as follows. im = Image.fromarray(v) The image vector is not RGB, As it have 4 channels. I got the following error. TypeError: Cannot handle this data type I also got few more errors. I think, there is some issue with the type of my array. The type of v vectors is as follows. print(type(v)) <class 'numpy.ndarray'> A: You will get this error if your basic datatype is unacceptable to Image.fromarray(). So, for example, it will happily accept an array of unsigned 8-bit integers: i=np.zeros((100,100,4),dtype=np.uint8) # specify unsigned 8-bit ints print(i.dtype) # prints dtype('uint8') im = Image.fromarray(i) # works fine Now try with unacceptable type: i=np.zeros((100,100,4),dtype=np.int16) print(i.dtype) # prints dtype('int16') im = Image.fromarray(i) TypeError: Cannot handle this data type So, the answer is that your underlying datatype is unacceptable. Check it with v.dtype.
{ "pile_set_name": "StackExchange" }
Today I want to point out how cool is having no schema when it is time to add properties to your documents. Suppose that your Player entity changed and you add a new property called Description and you already saved some Players on RavenDb. The question is: what happens when you try to save a new Player now that the class has another property? What happens when you load an old entity, that was saved when that property did not exist? Since we have no schema we have absolutely no problem, just save another object to Raven and you can find that it got saved without even a warning. Figure 1: New object is saved without any problem even if it is different from the old one If you double click a Document (Raven call each object saved to the db a Document) you can simply look at its content and the new property called Description got saved without any problem. Figure 2: The object contains the new Description property Probably you had already recognized JSON format to store the object, but the question is, what happened to the old object saved before you added the Description property ? The answer is: it is still there, clearly without the Description property. Figure 3: The old object does not contain the Description property, but it can coexist with the new one without any problem Now if you load all object from the database, you can find that for this instance Description property is simply null, because it did not exists in the database, but no error or warning occurred. If you simply load all Player entities and finally issue a SaveChanges, as shown in the following snippet:
{ "pile_set_name": "Pile-CC" }
# Change Log **ATTN**: This project uses [semantic versioning](http://semver.org/). ## [Unreleased] ## 1.20.0 - 2017-08-10 ### Fixed * `HandleExitCoder` is now correctly iterates over all errors in a `MultiError`. The exit code is the exit code of the last error or `1` if there are no `ExitCoder`s in the `MultiError`. * Fixed YAML file loading on Windows (previously would fail validate the file path) * Subcommand `Usage`, `Description`, `ArgsUsage`, `OnUsageError` correctly propogated * `ErrWriter` is now passed downwards through command structure to avoid the need to redefine it * Pass `Command` context into `OnUsageError` rather than parent context so that all fields are avaiable * Errors occuring in `Before` funcs are no longer double printed * Use `UsageText` in the help templates for commands and subcommands if defined; otherwise build the usage as before (was previously ignoring this field) * `IsSet` and `GlobalIsSet` now correctly return whether a flag is set if a program calls `Set` or `GlobalSet` directly after flag parsing (would previously only return `true` if the flag was set during parsing) ### Changed * No longer exit the program on command/subcommand error if the error raised is not an `OsExiter`. This exiting behavior was introduced in 1.19.0, but was determined to be a regression in functionality. See [the PR](https://github.com/urfave/cli/pull/595) for discussion. ### Added * `CommandsByName` type was added to make it easy to sort `Command`s by name, alphabetically * `altsrc` now handles loading of string and int arrays from TOML * Support for definition of custom help templates for `App` via `CustomAppHelpTemplate` * Support for arbitrary key/value fields on `App` to be used with `CustomAppHelpTemplate` via `ExtraInfo` * `HelpFlag`, `VersionFlag`, and `BashCompletionFlag` changed to explictly be `cli.Flag`s allowing for the use of custom flags satisfying the `cli.Flag` interface to be used. ## [1.19.1] - 2016-11-21 ### Fixed - Fixes regression introduced in 1.19.0 where using an `ActionFunc` as the `Action` for a command would cause it to error rather than calling the function. Should not have a affected declarative cases using `func(c *cli.Context) err)`. - Shell completion now handles the case where the user specifies `--generate-bash-completion` immediately after a flag that takes an argument. Previously it call the application with `--generate-bash-completion` as the flag value. ## [1.19.0] - 2016-11-19 ### Added - `FlagsByName` was added to make it easy to sort flags (e.g. `sort.Sort(cli.FlagsByName(app.Flags))`) - A `Description` field was added to `App` for a more detailed description of the application (similar to the existing `Description` field on `Command`) - Flag type code generation via `go generate` - Write to stderr and exit 1 if action returns non-nil error - Added support for TOML to the `altsrc` loader - `SkipArgReorder` was added to allow users to skip the argument reordering. This is useful if you want to consider all "flags" after an argument as arguments rather than flags (the default behavior of the stdlib `flag` library). This is backported functionality from the [removal of the flag reordering](https://github.com/urfave/cli/pull/398) in the unreleased version 2 - For formatted errors (those implementing `ErrorFormatter`), the errors will be formatted during output. Compatible with `pkg/errors`. ### Changed - Raise minimum tested/supported Go version to 1.2+ ### Fixed - Consider empty environment variables as set (previously environment variables with the equivalent of `""` would be skipped rather than their value used). - Return an error if the value in a given environment variable cannot be parsed as the flag type. Previously these errors were silently swallowed. - Print full error when an invalid flag is specified (which includes the invalid flag) - `App.Writer` defaults to `stdout` when `nil` - If no action is specified on a command or app, the help is now printed instead of `panic`ing - `App.Metadata` is initialized automatically now (previously was `nil` unless initialized) - Correctly show help message if `-h` is provided to a subcommand - `context.(Global)IsSet` now respects environment variables. Previously it would return `false` if a flag was specified in the environment rather than as an argument - Removed deprecation warnings to STDERR to avoid them leaking to the end-user - `altsrc`s import paths were updated to use `gopkg.in/urfave/cli.v1`. This fixes issues that occurred when `gopkg.in/urfave/cli.v1` was imported as well as `altsrc` where Go would complain that the types didn't match ## [1.18.1] - 2016-08-28 ### Fixed - Removed deprecation warnings to STDERR to avoid them leaking to the end-user (backported) ## [1.18.0] - 2016-06-27 ### Added - `./runtests` test runner with coverage tracking by default - testing on OS X - testing on Windows - `UintFlag`, `Uint64Flag`, and `Int64Flag` types and supporting code ### Changed - Use spaces for alignment in help/usage output instead of tabs, making the output alignment consistent regardless of tab width ### Fixed - Printing of command aliases in help text - Printing of visible flags for both struct and struct pointer flags - Display the `help` subcommand when using `CommandCategories` - No longer swallows `panic`s that occur within the `Action`s themselves when detecting the signature of the `Action` field ## [1.17.1] - 2016-08-28 ### Fixed - Removed deprecation warnings to STDERR to avoid them leaking to the end-user ## [1.17.0] - 2016-05-09 ### Added - Pluggable flag-level help text rendering via `cli.DefaultFlagStringFunc` - `context.GlobalBoolT` was added as an analogue to `context.GlobalBool` - Support for hiding commands by setting `Hidden: true` -- this will hide the commands in help output ### Changed - `Float64Flag`, `IntFlag`, and `DurationFlag` default values are no longer quoted in help text output. - All flag types now include `(default: {value})` strings following usage when a default value can be (reasonably) detected. - `IntSliceFlag` and `StringSliceFlag` usage strings are now more consistent with non-slice flag types - Apps now exit with a code of 3 if an unknown subcommand is specified (previously they printed "No help topic for...", but still exited 0. This makes it easier to script around apps built using `cli` since they can trust that a 0 exit code indicated a successful execution. - cleanups based on [Go Report Card feedback](https://goreportcard.com/report/github.com/urfave/cli) ## [1.16.1] - 2016-08-28 ### Fixed - Removed deprecation warnings to STDERR to avoid them leaking to the end-user ## [1.16.0] - 2016-05-02 ### Added - `Hidden` field on all flag struct types to omit from generated help text ### Changed - `BashCompletionFlag` (`--enable-bash-completion`) is now omitted from generated help text via the `Hidden` field ### Fixed - handling of error values in `HandleAction` and `HandleExitCoder` ## [1.15.0] - 2016-04-30 ### Added - This file! - Support for placeholders in flag usage strings - `App.Metadata` map for arbitrary data/state management - `Set` and `GlobalSet` methods on `*cli.Context` for altering values after parsing. - Support for nested lookup of dot-delimited keys in structures loaded from YAML. ### Changed - The `App.Action` and `Command.Action` now prefer a return signature of `func(*cli.Context) error`, as defined by `cli.ActionFunc`. If a non-nil `error` is returned, there may be two outcomes: - If the error fulfills `cli.ExitCoder`, then `os.Exit` will be called automatically - Else the error is bubbled up and returned from `App.Run` - Specifying an `Action` with the legacy return signature of `func(*cli.Context)` will produce a deprecation message to stderr - Specifying an `Action` that is not a `func` type will produce a non-zero exit from `App.Run` - Specifying an `Action` func that has an invalid (input) signature will produce a non-zero exit from `App.Run` ### Deprecated - <a name="deprecated-cli-app-runandexitonerror"></a> `cli.App.RunAndExitOnError`, which should now be done by returning an error that fulfills `cli.ExitCoder` to `cli.App.Run`. - <a name="deprecated-cli-app-action-signature"></a> the legacy signature for `cli.App.Action` of `func(*cli.Context)`, which should now have a return signature of `func(*cli.Context) error`, as defined by `cli.ActionFunc`. ### Fixed - Added missing `*cli.Context.GlobalFloat64` method ## [1.14.0] - 2016-04-03 (backfilled 2016-04-25) ### Added - Codebeat badge - Support for categorization via `CategorizedHelp` and `Categories` on app. ### Changed - Use `filepath.Base` instead of `path.Base` in `Name` and `HelpName`. ### Fixed - Ensure version is not shown in help text when `HideVersion` set. ## [1.13.0] - 2016-03-06 (backfilled 2016-04-25) ### Added - YAML file input support. - `NArg` method on context. ## [1.12.0] - 2016-02-17 (backfilled 2016-04-25) ### Added - Custom usage error handling. - Custom text support in `USAGE` section of help output. - Improved help messages for empty strings. - AppVeyor CI configuration. ### Changed - Removed `panic` from default help printer func. - De-duping and optimizations. ### Fixed - Correctly handle `Before`/`After` at command level when no subcommands. - Case of literal `-` argument causing flag reordering. - Environment variable hints on Windows. - Docs updates. ## [1.11.1] - 2015-12-21 (backfilled 2016-04-25) ### Changed - Use `path.Base` in `Name` and `HelpName` - Export `GetName` on flag types. ### Fixed - Flag parsing when skipping is enabled. - Test output cleanup. - Move completion check to account for empty input case. ## [1.11.0] - 2015-11-15 (backfilled 2016-04-25) ### Added - Destination scan support for flags. - Testing against `tip` in Travis CI config. ### Changed - Go version in Travis CI config. ### Fixed - Removed redundant tests. - Use correct example naming in tests. ## [1.10.2] - 2015-10-29 (backfilled 2016-04-25) ### Fixed - Remove unused var in bash completion. ## [1.10.1] - 2015-10-21 (backfilled 2016-04-25) ### Added - Coverage and reference logos in README. ### Fixed - Use specified values in help and version parsing. - Only display app version and help message once. ## [1.10.0] - 2015-10-06 (backfilled 2016-04-25) ### Added - More tests for existing functionality. - `ArgsUsage` at app and command level for help text flexibility. ### Fixed - Honor `HideHelp` and `HideVersion` in `App.Run`. - Remove juvenile word from README. ## [1.9.0] - 2015-09-08 (backfilled 2016-04-25) ### Added - `FullName` on command with accompanying help output update. - Set default `$PROG` in bash completion. ### Changed - Docs formatting. ### Fixed - Removed self-referential imports in tests. ## [1.8.0] - 2015-06-30 (backfilled 2016-04-25) ### Added - Support for `Copyright` at app level. - `Parent` func at context level to walk up context lineage. ### Fixed - Global flag processing at top level. ## [1.7.1] - 2015-06-11 (backfilled 2016-04-25) ### Added - Aggregate errors from `Before`/`After` funcs. - Doc comments on flag structs. - Include non-global flags when checking version and help. - Travis CI config updates. ### Fixed - Ensure slice type flags have non-nil values. - Collect global flags from the full command hierarchy. - Docs prose. ## [1.7.0] - 2015-05-03 (backfilled 2016-04-25) ### Changed - `HelpPrinter` signature includes output writer. ### Fixed - Specify go 1.1+ in docs. - Set `Writer` when running command as app. ## [1.6.0] - 2015-03-23 (backfilled 2016-04-25) ### Added - Multiple author support. - `NumFlags` at context level. - `Aliases` at command level. ### Deprecated - `ShortName` at command level. ### Fixed - Subcommand help output. - Backward compatible support for deprecated `Author` and `Email` fields. - Docs regarding `Names`/`Aliases`. ## [1.5.0] - 2015-02-20 (backfilled 2016-04-25) ### Added - `After` hook func support at app and command level. ### Fixed - Use parsed context when running command as subcommand. - Docs prose. ## [1.4.1] - 2015-01-09 (backfilled 2016-04-25) ### Added - Support for hiding `-h / --help` flags, but not `help` subcommand. - Stop flag parsing after `--`. ### Fixed - Help text for generic flags to specify single value. - Use double quotes in output for defaults. - Use `ParseInt` instead of `ParseUint` for int environment var values. - Use `0` as base when parsing int environment var values. ## [1.4.0] - 2014-12-12 (backfilled 2016-04-25) ### Added - Support for environment variable lookup "cascade". - Support for `Stdout` on app for output redirection. ### Fixed - Print command help instead of app help in `ShowCommandHelp`. ## [1.3.1] - 2014-11-13 (backfilled 2016-04-25) ### Added - Docs and example code updates. ### Changed - Default `-v / --version` flag made optional. ## [1.3.0] - 2014-08-10 (backfilled 2016-04-25) ### Added - `FlagNames` at context level. - Exposed `VersionPrinter` var for more control over version output. - Zsh completion hook. - `AUTHOR` section in default app help template. - Contribution guidelines. - `DurationFlag` type. ## [1.2.0] - 2014-08-02 ### Added - Support for environment variable defaults on flags plus tests. ## [1.1.0] - 2014-07-15 ### Added - Bash completion. - Optional hiding of built-in help command. - Optional skipping of flag parsing at command level. - `Author`, `Email`, and `Compiled` metadata on app. - `Before` hook func support at app and command level. - `CommandNotFound` func support at app level. - Command reference available on context. - `GenericFlag` type. - `Float64Flag` type. - `BoolTFlag` type. - `IsSet` flag helper on context. - More flag lookup funcs at context level. - More tests &amp; docs. ### Changed - Help template updates to account for presence/absence of flags. - Separated subcommand help template. - Exposed `HelpPrinter` var for more control over help output. ## [1.0.0] - 2013-11-01 ### Added - `help` flag in default app flag set and each command flag set. - Custom handling of argument parsing errors. - Command lookup by name at app level. - `StringSliceFlag` type and supporting `StringSlice` type. - `IntSliceFlag` type and supporting `IntSlice` type. - Slice type flag lookups by name at context level. - Export of app and command help functions. - More tests &amp; docs. ## 0.1.0 - 2013-07-22 ### Added - Initial implementation. [Unreleased]: https://github.com/urfave/cli/compare/v1.18.0...HEAD [1.18.0]: https://github.com/urfave/cli/compare/v1.17.0...v1.18.0 [1.17.0]: https://github.com/urfave/cli/compare/v1.16.0...v1.17.0 [1.16.0]: https://github.com/urfave/cli/compare/v1.15.0...v1.16.0 [1.15.0]: https://github.com/urfave/cli/compare/v1.14.0...v1.15.0 [1.14.0]: https://github.com/urfave/cli/compare/v1.13.0...v1.14.0 [1.13.0]: https://github.com/urfave/cli/compare/v1.12.0...v1.13.0 [1.12.0]: https://github.com/urfave/cli/compare/v1.11.1...v1.12.0 [1.11.1]: https://github.com/urfave/cli/compare/v1.11.0...v1.11.1 [1.11.0]: https://github.com/urfave/cli/compare/v1.10.2...v1.11.0 [1.10.2]: https://github.com/urfave/cli/compare/v1.10.1...v1.10.2 [1.10.1]: https://github.com/urfave/cli/compare/v1.10.0...v1.10.1 [1.10.0]: https://github.com/urfave/cli/compare/v1.9.0...v1.10.0 [1.9.0]: https://github.com/urfave/cli/compare/v1.8.0...v1.9.0 [1.8.0]: https://github.com/urfave/cli/compare/v1.7.1...v1.8.0 [1.7.1]: https://github.com/urfave/cli/compare/v1.7.0...v1.7.1 [1.7.0]: https://github.com/urfave/cli/compare/v1.6.0...v1.7.0 [1.6.0]: https://github.com/urfave/cli/compare/v1.5.0...v1.6.0 [1.5.0]: https://github.com/urfave/cli/compare/v1.4.1...v1.5.0 [1.4.1]: https://github.com/urfave/cli/compare/v1.4.0...v1.4.1 [1.4.0]: https://github.com/urfave/cli/compare/v1.3.1...v1.4.0 [1.3.1]: https://github.com/urfave/cli/compare/v1.3.0...v1.3.1 [1.3.0]: https://github.com/urfave/cli/compare/v1.2.0...v1.3.0 [1.2.0]: https://github.com/urfave/cli/compare/v1.1.0...v1.2.0 [1.1.0]: https://github.com/urfave/cli/compare/v1.0.0...v1.1.0 [1.0.0]: https://github.com/urfave/cli/compare/v0.1.0...v1.0.0
{ "pile_set_name": "Github" }
Q: ¿Cómo puedo ingresar un Nodo en sql server desde TreeView? C# y Windows Form Tengo un TreeView en 3 capas, ya me carga mi TreeView desde sql a visual studio mediante un funcion recursiva, pero no logro hacer que se me guarde en la base de datos, se me guarda en la vista porque logro ver el nodo con su nombre pero al cerrar la aplicación desaparece, y es porque no se está guardando en la base de datos, me pueden decir si es que tengo la función de InsertarNodos desde mi capa Datos mal? Capa Datos: public void InsertarNodos(datostreeview parametros) { comandSql.Connection = con.AbrirConexion(); comandSql.CommandText = "sp_InsertarNodos"; comandSql.CommandType = CommandType.StoredProcedure; comandSql.Parameters.AddWithValue("@Codigo", parametros.Codigo); comandSql.Parameters.AddWithValue("@Nombre", parametros.Nombre); comandSql.Parameters.AddWithValue("@CodigoRapido", parametros.Codigorapido); comandSql.Parameters.AddWithValue("@Idpadre", parametros.Idpadre); comandSql.ExecuteNonQuery(); comandSql.Parameters.Clear(); con.CCerraConexion(); } Capa Negocio: public void InsertarAttr(string codigo, string nombre, string codigorapido, int idpadre) { obje_cdtreeview.Codigo = codigo; obje_cdtreeview.Nombre = nombre; obje_cdtreeview.Codigorapido = Convert.ToInt32(codigorapido); obje_cdtreeview.Idpadre = idpadre; } capa presentación: private void button1_Click(object sender, EventArgs e) { if (editar == false) { try { if (textBox1.Text != "" || textBox2.Text != "") { nodoSeleccionado = treeView1.SelectedNode; padre = int.Parse(dataTableNodos.Rows[int.Parse(nodoSeleccionado.Tag.ToString())]["IdPCuentas"].ToString()); textBox1.Text = textBox1.Text + "."; string Codigo = textBox1.Text; textBox2.Text = textBox2.Text.ToUpper(); string Nombre = textBox2.Text; textBox3.Text = Codigo.Replace(".", ""); string Codigorapido = textBox3.Text; objc_treeview.InsertarAttr(Codigo, Nombre, Codigorapido, padre); MessageBox.Show("Se guardo el Registro"); textBox1.Enabled = false; textBox2.Enabled = false; TreeNode nodoInsertado = new TreeNode(); nodoInsertado.Text = Codigo + " " + Nombre; nodoSeleccionado.Nodes.Add(nodoInsertado); } Corregido el error pero sigue sin guardarme. A: EDITO, tras la rectificación del error anterior El método InsertarNodos insertar nodos parece correcto, sin conocer el contenido del procedimiento almacenado sp_InsertarNodos. El problema es que este método no lo llamas en ninguna parte, jamás va a entrar en la inserción de la base de datos. ** FIN DE LA EDICIÓN ** Parece un error muy simple: Agregas el parámetro comandSql.Parameters.AddWithValue("Idpadre", parametros.Idpadre); Cuando debería ser comandSql.Parameters.AddWithValue("@Idpadre", parametros.Idpadre); Por otro lado asegúrate que los parámetros @Codigo, @Nombre, @CodigoRapido y @Idpadre están exactamente escritos en tu procedimiento almacenado-
{ "pile_set_name": "StackExchange" }
Q: CFZip of certain file type Is it possible to use cfzip to create a zip folder containing of a certain type. I need to do this to take out .bak files from a folder with different filetypes and insert them into a zip folder. Thanks Colin A: Steve already pointed you to the CF documentation which has example of delete. To create a zip, the simplest way is as follows: <cfset fileName = createUUID() /> <cfzip file="D:\#fileName#.zip" action="zip" source="D:\myfolder" filter="*.bak" recurse="No" > If you want to add the files of a sub-directory, then make recurse="yes". To filter multiple file types you can simply use comma separated file type in filter like this filter="*.jpg, *.gif, *.png" Note: I have used dynamic file name in case you want to run this script multiple times and have different file name, or multiple users are accessing this script at the same time.
{ "pile_set_name": "StackExchange" }
Search form Expertise and Governance EuroMarine involvement in IPBES Since its inception, EuroMarine has seen the value in engaging with the marine community to improve the flow of science through to policy. As such, EuroMarine acts as a marine science resource and knowledge hub for the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES). The IPBES is an intergovernmental body which assesses the state of biodiversity and of the ecosystem services it provides to society, in response to requests from decision makers. It aims to strengthen the science-policy interface for biodiversity and ecosystem services for their conservation and sustainable use, long-term human well-being and sustainable development. The IPBES works to achieve this through assessment, knowledge generation, policy support and capacity building. Established in 2012, IPBES was founded by over 100 governments as a means to provide scientific information in response to requests from policy makers. The platform currently comprises of 126 member governments. The first IPBES work program was approved in 2014, and thousands of scientists worldwide currently contribute to the work of IPBES on a voluntary basis, including experts from EuroMarine member organisations. Experts are nominated by their government or an organisation and are selected by the Multidisciplinary Expert Panel. Peer review forms a key component, ensuring the work reflects a range of views, and is completed to the highest scientific standards. The IPBES assessment of biodiversity and ecosystem services covers four regions (Europe and Central Asia; Africa; Americas; and Asia-Pacific) in six regional assessment chapters: Setting the scene Nature’s contributions to people and quality of life Status, trends and future dynamics of biodiversity and ecosystems underpinning nature’s contributions to people Direct and indirect drivers of change in the context of different perspectives on quality of life Integrated and cross-scale analysis of interactions of the natural world and human society Options for governance, institutional arrangements and private and public decision making across scales and sectors As an official stakeholder in IPBES, EuroMarine looks to strengthen the representation of the Oceans and the marine in such global and regional reports. EuroMarine disseminates IPBES calls to its members and mobilises the marine community through the identification and nomination of authors. What upcoming events/activities can EuroMarine members participate in? Scientists can register as an IPBES Stakeholder to become part of an open registry of individuals or organisations who can benefit from or contribute to the implementation of the IPBES work programme, or who can motivate others to do so. By engaging the widest range of relevant stakeholders, IPBES will strengthen the science-policy interface. TOOLS & more EUROPEAN MARINE RESEARCH NETWORK . A consortium of research and academic organisations advancing marine science. EuroMarine aims at identifying and addressing important emerging scientific topics or issues and at fostering new services relevant to the marine scientific community. > MORE ON EUROMARINE
{ "pile_set_name": "Pile-CC" }
Henrik Ibsen Museum Welcome to Henrik Ibsen Museum in Skien. Henrik Ibsen’s childhood home, Venstøp, is just a few kilometres north of Skien city. Henrik Ibsen was born in Skien on 20 March 1828. At first the family lived at Stockmanngården on the market square, later moving to Altenburggården a little way up the hill. In 1834, when Henrik was seven, the family moved to the country. They continued to live at Venstøp until he was 15. Exhibitions at The Henrik Ibsen Museum Take a break in the museum café with a piece of honey cake, Ibsen’s favourite. Our well-stocked gift shop carries many books about Ibsen alongside the dramatist’s own works. Children can have fun dressing up and playing theatre in the barn. A beautiful farm Venstøp consists of the preserved farmhouse (dating from 1815), the wash house, the farm labourers’ quarters, the barn and the storehouse.The farm is set amid a beautiful agricultural landscape. In the large orchard, we have recreated an 1830s bowling alley, which you are welcome to use when you visit Venstøp – just as Ibsen’s parents, Knud and Marichen Ibsen’s guests did almost 200 years ago
{ "pile_set_name": "Pile-CC" }
Q: How can I get my CheckBoxList to have three possible states? How can I get my CheckBoxList to have three possible states ? More precisely, is there a way to have three possible states for each checkbox : checked, unchecked, undefined (in most GUIs this is represented as a full square). Alternatively, do you recommend another control that would meet these needs ? UPDATE : Ok, given that HTML does not support tri-state checkboxes, I'm looking for a way to 'CSS' (color fill, highlight, etc...) the checkboxes of the items that are in that 'undefined' state from my server point of view. A: Not all GUIs represent undefined as a full square. That's why it's going to be clearer to use one of the following: 1. Radio boxes 2. Dropdown 3. ListBox A: I have decided to use CheckBoxList anyway, since I need two states accessible by the user, and a third one not accessible by the user but to display inconsistencies. The way I have solved this is through Javascript + CSS. Some bits of ideas here: http://css-tricks.com/indeterminate-checkboxes/
{ "pile_set_name": "StackExchange" }
Sheela Patel Sheela Patel (born 1952) is an activist and academic involved with people living in slums and shanty towns. Early life In 1974, Patel received her Masters in Social Work from the Tata Institute of Social Sciences in Mumbai. She was then involved with a community centre called the Nagpada Neighbourhood House. SPARC With Prema Gopalan, Patel is the founding director of the Society for the Promotion of Area Resource Centres (SPARC), which she set up in Mumbai in 1984 as an advocacy group for the pavement dwellers of Mumbai. SPARC continues to this day to play a major role in the politics of slum development in India and throughout the Third World. In 2000, SPARC was the recipient of the United Nations Human Settlement Award. Groups Patel works closely with the National Slum Dwellers Federation (NSDF) and Mahila Milan, two community-based groups working on with the poor in Indian cities. She worked in the National Technical Advisory Group (NTAG) for the Jawaharlal Nehru National Urban Renewal Mission (JNNURM). She has founded the Asian Coalition for Housing Rights, the Asian Women and Shelter Network and Swayam Shikshan Prayog (SSP), an organisation that works with women's collectives in more than 600 villages in Maharashtra. Patel is also a founder and current chairperson of Slum Dwellers International, a network of community-based organisations in 33 countries spanning Africa, Asia, Latin America and the Caribbean. Awards 2011: Padma Shri award, the fourth highest civilian honor in India. 2009: David Rockefeller Bridging Leadership Award 2000: UN-Habitat Scroll of Honour Award Selected works Patel, Sheela; Arputham, Jockin; Bartlett, Sheridan. 2015. '"We beat the path by walking": How the women of Mahila Milan in India learned to plan, design, finance and build housing.' Environment & Urbanization, 28(1) Free access Patel, Sheela. 2013. 'Upgrade, Rehouse or Resettle? An Assessment of the Indian Government's Basic Services for the Urban Poor (BSUP) Programme'. Environment & Urbanization, 25(1): 177-188. Patel, Sheela. 2012. 'Supporting data collection by the poor' Alliance Magazine Patel, Sheela; Baptist, Carrie Baptist; D'Cruz, Celine. 2012. 'Knowledge is power – Informal Communities Assert Their Right to the City through SDI and Community-led Enumerations'. Environment & Urbanization, 24(1). Patel, Sheela. 2011. 'Are Women Victims, or Are They Warriors?' in Women's Health and the World's Cities, chapter 6, (eds) Afaf Ibrahim, Meleis, Eugénie L. Birch, Susan M. Wachter, Philadelphia: University of Pennsylvania Press. Patel, Sheela. 2011. 'Recasting the Vision of Megacities in the South. Emerging Challenges for the North-South Dialogue in Development', in (ed)Robertson-von Trotha, Caroline Y. (ed.): Europe: Insights from the Outside Kulturwissenschaft interdisziplinär/Interdisciplinary Studies on Culture and Society, Vol 5 Baden-Baden Patel, Sheela & Mitlin, Diana. 2010. 'Gender Issues and Slum/Shack Dweller Federations' (report). International Institute for Environment and Development. Patel, Sheela; Sheuya, Shaaban; Howden-Chapman, Philippa . 2007. 'The Design of Housing and Shelter Programs: The Social and Environmental Determinants of Inequalities' in Journal of Urban Health, 84(1) 98-108. Patel, Sheela; Burra, Sundar; D'Cruz, Celine. 2001 'Slum/Shack Dwellers International (SDI) – Foundations to treetops' in Environment and Urbanization 13(2) 45-59. References Category:Indian urban planners Category:1952 births Category:Living people Category:Recipients of the Padma Shri in social work Category:20th-century Indian architects Category:Indian women architects Category:20th-century Indian women artists Category:20th-century Indian educators Category:Indian women activists Category:Indian human rights activists Category:Artists from Mumbai Category:Women artists from Maharashtra
{ "pile_set_name": "Wikipedia (en)" }
10.00 % of Gross if cancelled once confirmed , 100.00 % of Gross if cancelled within 5 days Before Usage , 50.00 % of Gross if cancelled within 15 days Before Usage , 25.00 % of Gross if cancelled within 29 days Before Usage , 100.00 % of Gross if cancelled no show fee 4 Enquire Here Please use the filter below to further refine the results shown. Date In Date Out Duration Units Adults Children 2019-09-15 - 2019-09-14 FREE 1/2 Half Day Perth & Fremantle Tour 2019/20 $0 Enquire Now ENQUIRE NOW Leave us your details and we will be in touch with you as soon as possible Thank you for your Enquiry BOOK YOUR TRIP THANK YOU FOR BOOKING A TRIP SUBSCRIBE TO OUR NEWSLETTER Sign Up To receive exculsive and pre-release sales and travel deals THANK YOU FOR SUBSCRIBING You can now receive our newsletters. Broome, Kimberley & Beyond (formerly Broome & the Kimberley Holidays) is a specialist travel wholesaler with over 20 years of experience. We started with the Kimberley but have extended our product range over the years to now include all of Western Australia, Northern Territory, South Australia, Christmas Island and Cocos Keeling Islands. Our team are undoubtedly the industry leaders in providing sound knowledge and advice for any traveller wishing to explore all of our regions. Read more SUBSCRIBE TO OUR NEWSLETTER: FOLLOW US ON: Broome, Kimberley & Beyond has received a fantastic 5.0/5 star rating from 1 Client on Google. A huge thank you to our wonderful clients!
{ "pile_set_name": "Pile-CC" }